281 research outputs found
Why Youth (heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life
Part of the Volume on Youth, Identity, and Digital Media Social network sites like MySpace and Facebook serve as "networked publics." As with unmediated publics like parks and malls, youth use networked publics to gather, socialize with their peers, and make sense of and help build the culture around them. This article examines American youth engagement in networked publics and considers how properties unique to such mediated environments (e.g., persistence, searchability, replicability, and invisible audiences) affect the ways in which youth interact with one another. Ethnographic data is used to analyze how youth recognize these structural properties and find innovative ways of making these systems serve their purposes. Issues like privacy and impression management are explored through the practices of teens and youth participation in social network sites is situated in a historical discussion of youth's freedom and mobility in the United States
“Keep it Secret, Keep it Safe”: Information Poverty, Information Norms, and Stigma
When information practices are understood to be shaped by social context, privilege and marginalization alternately affect not only access to, but also use of information resources. In the context of information, privilege, and community, politics of marginalization drive stigmatized groups to develop collective norms for locating, sharing, and hiding information. In this paper, we investigate the information practices of a subcultural community whose activities are both stigmatized and of uncertain legal status: the extreme body modification community. We use the construct of information poverty to analyze the experiences of 18 people who had obtained, were interested in obtaining, or had performed extreme body modification procedures. With a holistic understanding of how members of this community use information, we complicate information poverty by working through concepts of stigma and community norms. Our research contributes to human information behavior scholarship on marginalized groups and to Internet studies research on how communities negotiate collective norms of information sharing online
Reflections on friendster, trust and intimacy
ABSTRACT By asking users to articulate and negotiate intimate information about themselves and their relationships, Friendster.com positions itself as a site for identity-driven intimate computing. Yet, trust issues are uncovered as users repurpose the site for playful intimacy and creativity. To flesh out the tension between purpose and desire, i reflect on Friendster's architecture, population and usage
Recommended from our members
Response to FCC Notice of Inquiry 09-94: “Empowering Parents and Protecting Children in an Evolving Media Landscape”
his paper is a response to the FCC's Notice of Inquiry (09-94) on Empowering Parents and Protecting Children in an Evolving Media Landscape (PDF). The response synthesizes current research and data on the media practices of youth, focusing on three main areas -- 1) Risky Behaviors and Online Safety, 2) Privacy, Publicity and Reputation, and 3) Information Dissemination, Youth-Created Content and Quality of Information -- in order to highlight issues of genuine concern, such as growing participation and literacy gaps, and, crucially, in order to discuss the positive and creative opportunities that electronic media provide for young people. In each area, potential policy responses are discussed
Faceted Id/Entity : managing representation in a digital world
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2002.Includes bibliographical references (leaves 113-118).In this thesis, i articulate a theory of how and why individuals use context to convey only a facet of their identity in social interactions. Through this lens, i discuss current issues in digital identity management. In this discussion, i focus on the role of design in affecting an individual's ability to maintain control of personal representation and identity information. I argue that the architecture of current digital environments has altered our notions of context, motivating users to develop new mechanisms for managing their presentation. I take the stance that users should have the ability to control their digital identity for the same reasons that they seek to control their physical identity, most notably to present themselves in an appropriate manner in relation to the current situation. From this perspective, i argue for a design approach that will aid sociable designers in developing human-centered technologies that allow for individual control over personal identity. First, i argue the need for mechanisms of self-awareness and discuss what forms of awareness users should have. In doing so, i analyze current approaches to awareness and critique my own work on Social Network Fragments, a visualization tool for revealing the structure of one's digital social network. Alongside self-awareness, i present the need for identity management and critique my work on SecureId, a prototype intended to give users control over their digital presentation by offering security through identity-based knowledge. This thesis argues for empowering users through awareness and control, so that they may provide the level of regulation that is desirable. In doing so, i offer a novel approach to context and identity management in digital social interaction.by Danah Boyd.S.M
Networked trafficking: Reflections on technology and the anti-trafficking movement.
Abstract In this essay, we offer field notes from our ongoing ethnographic research on sex trafficking in the United States. Recent efforts to regulate websites such as Craigslist and Backpage have illuminated activist concerns regarding the role of networked technologies in the trafficking of persons and images for the purposes of sexual exploitation. We frame our understanding of trafficking and technology through a network studies approach, by describing anti-trafficking as a counter-network to the sex trafficking it seeks to address. Drawing from the work of Annelise Riles and other scholars of feminist science and technology studies, we read the anti-trafficking network through the production of expert knowledge and the crafting of anti-trafficking techniques. By exploring anti-trafficking activists' understandings of technology, we situate the activities of anti-trafficking experts and law enforcement as efforts toward network stabilization
- …