• Ei tuloksia

MAKING SENSE OF PRIVACY ! IN SOCIAL NETWORK SERVICES! User Perspectives

N/A
N/A
Info
Lataa
Protected

Academic year: 2022

Jaa "MAKING SENSE OF PRIVACY ! IN SOCIAL NETWORK SERVICES! User Perspectives"

Copied!
23
0
0

Kokoteksti

(1)

MAKING SENSE OF PRIVACY !

IN SOCIAL NETWORK SERVICES!

User Perspectives

T-110.5220

Information Security and Usability April 11 2013

Airi Lampinen

Helsinki Institute for Information Technology

& University of Helsinki, social psychology

(2)

(NETWORKED) PRIVACY

• Organizational

• Interpersonal (interactional/social)

How are different types of privacy connected?

What type of privacy regulation do SNSs support?

Where do SNSs direct their users’ attention?

(3)

STARTING POINT

Four forces that regulate social systems (Lessig 2006):

• Market

• Law

• Social norms

• Code (/architecture)

(4)

SELF-PRESENTATION (Goffman)

Presenting oneself to others - and to oneself

Cues given and cues given off

“What kind of a person am I and how am I to be treated?”

(5)

INTERPERSONAL BOUNDARY REGULATION

Altman (1975; 1977)

“Privacy as a process of interpersonal boundary control that paces and controls interaction”

“An interpersonal boundary process by which an

individual or a group regulates interaction with others.

Stakes: Social interaction, social relationships, self-identity

(6)

BOUNDARY REGULATION IN PHYSICAL SPACES

Picture credit: TenSafeFrogs

(7)

BOUNDARY REGULATION !

IN THE NETWORKED WORLD

Palen & Dourish (2003)

DISCLOSURE: Privacy and publicness IDENTITY: Self and others

TEMPORALITY: Past, present, future

(8)

CHARACTERISTICS OF THE NETWORKED CONTEXT (boyd, 2008)

1.  Persistence 2.  Replicability 3.  Scalability 4.  Searchability

See also “THE ETERNAL MEMORY”

(Viktor Mayer-Schonberger: Delete: The Virtue of

Forgetting in the Digital Age)

(9)

SHARING WITH MULTIPLE GROUPS

(10)

SHARING ON BEHALF OF OTHERS

(11)

SHARING VIA AUTOMATION (VS MANUALLY)

(12)

HOW DO WE REGULATE BOUNDARIES?

(13)

BOUNDARY REGULATION IS NOT JUST…

…updating “privacy settings”

…choosing from the options predetermined in the UI

(14)

TYPOLOGY OF INTERPERSONAL !

BOUNDARY REGULATION PRACTICES

1. Individual & collaborative 2. Preventive & corrective 3. Behavioral & mental

Discuss: What do you think are the pros and cons of different

practices?

(15)

PHOTO CREDIT: NCINDC ON FLICKR"

BOUNDARY REGULATION IS COOPERATIVE (1)  Supporting others, face

work & rule of

considerateness (2)  Negotiating shared

codes of conduct,

making joint efforts

(16)

Negotiating Access to/within 


Domestic Spaces via Couchsurfing!

(17)

BOUNDARY REGULATION AS A GROUP:

Delegation & cooperation"

Photo credit: heschong

(18)

Sharetribe: Online-supported Exchange 


in Local Communities!

(19)

BOUNDARY REGULATION"

in networked and physical"

settings are part of the"

same whole."

(20)

A LOT OF TALK ABOUT PUTTING PEOPLE IN CONTROL OF ʻTHEIR DATAʼ


When considered in terms of interpersonal

boundary regulation, there are limits to how fully an individual can be in control.


But what if people had (better)


access to ʻtheir dataʼ?"

(21)

AUTOMATED SHARING


ON LAST.FM WITH THE SCROBBLER

(22)

MEDIA FINGERPRINT ON SCOOPINION!

(23)

1. Look beyond ʻonlineʼ"

2. Look beyond ʻthe individualʼ"

3. Empower people with ʻtheir dataʼ"

IN DESIGNING GREAT ONLINE EXPERIENCES

Viittaukset

LIITTYVÄT TIEDOSTOT

To summarise, it seems that conflict- whether resolved or unresolved- rarely affects the process of interpersonal knowledge transfer only in a positive or negative way.. In context

 How do the four types of semiotic resources of the interaction order – the sense of time, perceptual spaces, interpersonal distances and the personal front –

Toistaiseksi yritykset ovat perustaneet toimintansa siihen, että käyttäjät ovat huolettomia heihin liitetyn tiedon kaupallistamisessa, mutta suunta voi muuttua

lastensuojelun ja lapsiperheiden sosi- aalityöstä, jota on kehitetty YK:n lap- sen oikeuksien sopimuksen (1989) ja lastensuojelulain (2007) pohjalta vah- vasti

strating normatively appropriate behavior in personal acts and interpersonal relationships. Ethical leadership behavior can be defined as organizational action in which norms

strating normatively appropriate behavior in personal acts and interpersonal relationships. Ethical leadership behavior can be defined as organizational action in which norms

research, the continuous and subtle co-operation that takes place through supporting of others’ boundary regulation efforts manifested itself in the emphasis

The fix uses public- key cryptography – the user equipment encrypts the long-term identity of the subscriber using the public key of the home network and sends the resulting ci-