Computer-Mediated Communication

Download Report

Transcript Computer-Mediated Communication

Computer-Mediated
Communication
Social Privacy in a Networked World
Coye Cheshire & Jen King
// 16 February 2016
Quick Review
 Privacy in CMC (but specifically social
networks):
 Highly contextual
 Audience dependent
 Personal disclosure is a fundamental
human activity
 Disclosure explained by (at least in part):
 Different aspects of privacy (psych, social,
info), building social capital
2/16/16
Cheshire & King— Computer-Mediated Communication
1
What’s happening on the
ground?
2/16/16
Cheshire & King— Computer-Mediated Communication
2
Info harvesting/reuse/predictions
 Jernigan & Mistree’s
2009 Gaydar study
 It’s not just what you
make explicit, it’s also
what you can infer
 Other examples of
inferences (correct or
not)?
http://immediatefuture.co.uk/blog/new-software-can-predict-personality-traits-what-does-your-facebook-profile-sayabout-you/
2/16/16
Cheshire & King— Computer-Mediated Communication
3
Prediction accuracy of classification for dichotomous/dichotomized attributes expressed by the
AUC.
Michal Kosinski et al. PNAS 2013;110:5802-5805
Private traits and attributes are predictable from digital records of human behavior
©2013 by National Academy of Sciences
Turn an Email Address into a Social Profile.
When all you have is an email address, Flowtown can give you a name, age, gender,
occupation, location and all the social networks that person is on.
2/18/16
Cheshire & King— Computer-Mediated Communication
5
User Misunderstandings
2/16/16
Cheshire & King— Computer-Mediated Communication
6
2/18/16
Cheshire & King— Computer-Mediated Communication
7
2/16/16
Cheshire & King— Computer-Mediated Communication
8
Facebook privacy settings circa Dec 2009
2/16/16
Cheshire & King— Computer-Mediated Communication
9
Facebook privacy settings circa July 2010
2/16/16
Cheshire & King— Computer-Mediated Communication
10
http://mattmckeon.com/facebook-privacy/
2/18/16
Cheshire & King— Computer-Mediated Communication
11
http://mattmckeon.com/facebook-privacy/
2/18/16
Cheshire & King— Computer-Mediated Communication
12
http://mattmckeon.com/facebook-privacy/
2/18/16
Cheshire & King— Computer-Mediated Communication
13
http://mattmckeon.com/facebook-privacy/
2/18/16
Cheshire & King— Computer-Mediated Communication
14
Silent Listeners (Stutzman et al.)
 Facebook users over time became more privacy
seeking by progressively limiting data shared
publicly with strangers
 Facebook’s 2009 changes reversed this
 amount of info users revealed to connected
friends increased, as well as to third party apps;
often occurred w/o explicit consent or awareness;
the network remains an “imagined” community
that does not map to actual audiences
2/16/16
Cheshire & King— Computer-Mediated Communication
15
Boundary Management
 Litt & Hargittai’s paper
 Incorporates the work of Sandra Petronio (using
an updated version of Altman’s theory:
Communication Privacy Management)
 Privacy == individuals’ information boundary
(rule) management w/r/t others
 Turbulence == breakdown in expectations when
personal info goes beyond a person’s desired
boundaries
2/16/16
Cheshire & King— Computer-Mediated Communication
16
Key findings
 Skill is a key concern in Hargittai’s work – found those with more
Internet skills less likely to experience negative outcomes
 Self monitoring: “ability & motivation to pick up on social cues and
modify their self-presentations”
 Higher self-monitoring skills & privacy behaviors == more turbulence
 Context collapse, or perceived vs. actual privacy misaligned, also control
paradox
 Higher self monitors might be more sensitive, more aware negatives
exist, better at ID’ing it, not necessarily more likely to experience
 Prior negative experiences may also contribute
2/16/16
Cheshire & King— Computer-Mediated Communication
17
Misplaced Confidences –
Control Paradox
 Individuals’ perceived control over release and
access of private info increases willingness to
disclose
 Questions assumptions about rational, informed
choice
 Part of a larger body of research by Acquisti
questioning decision-making models; role of
heuristics
 Posits that privacy preferences are contextual
and subject to manipulation
2/16/16
Cheshire & King— Computer-Mediated Communication
18
Design solutions?
 Better (re)designed
privacy controls
 Privacy “nudges”
 Predictive privacy
preferences
 Incorporating
longitudinal aspects
2/16/16
Cheshire & King— Computer-Mediated Communication
19
2/18/16
Cheshire & King— Computer-Mediated Communication
20
2/18/16
Cheshire & King— Computer-Mediated Communication
21