Online Privacy in Social Media: A Conceptual Exploration of Empowerment and Vulnerability

Current transitions in the media and technology landscape go together with a shift from mass media and personal media to media for 'mass self-communication'. This is illustrated by the way that Web 2.0 or social media (like social network sites and micro-blogging) are becoming commercially engrained in Western everyday life, and the belief that the user is in the driver's seat of socio-technical innovation. However we observe a paradox. On the one hand the instruments and means for empowering users through social media are proliferating, reinforcing the idea of users effectively becoming empowered. On the other hand we find that empirical evidence about what user empowerment really consists of is too a large extent missing and that a risk of denial of the empowerment downside exists. After all if we indeed find opportunities for user empowerment, also the counterpart of disempowerment is at stake. The latter is particularly visible in the relation between social media, empowerment and privacy. In this paper we take a closer look at how people's disempowerment and vulnerability is being reconfigured within the changing media landscape of mass self-communication. To illustrate these transitions, we focus on issues of privacy in relation to social media. In particular we take a critical view on how vulnerability takes shape in online consumer privacy. For this we first discuss the notions of mass self-communication, empowerment and privacy more generally. Next we highlight to what extent privacy for consumers using social media is different and how their vulnerability changes from an external and internal perspective. The transition from the classic view on privacy to online privacy to online consumer privacy illustrates that the notion 'privacy' needs to be rethought. The paper is based on a literature review to deconstruct and explore the key concepts empowerment, disempowerment, vulnerability and privacy in relation to mass self-communication and social media.

[1]  Don Tapscott,et al.  Wikinomics: How Mass Collaboration Changes Everything , 2006 .

[2]  Andrea Saveri and Howard Rheingold and Kathi Vian Technologies of Cooperation , 2005 .

[3]  Yves Punie Introduction: New Media Technologies and User Empowerment.Is there a Happy Ending? , 2011, New Media Technologies and User Empowerment.

[4]  Hans Hoeken Advertising and the new media , 2003 .

[5]  S. Greenberg,et al.  The Psychology of Everyday Things , 2012 .

[6]  Toffler Alvin The third wave. 1st ed. , 1980 .

[7]  J. Rappaport Terms of empowerment/exemplars of prevention: Toward a theory for community psychology , 1987, American journal of community psychology.

[8]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[9]  C. Fuchs The Political Economy of Privacy on Facebook , 2012 .

[10]  Graham Vickery,et al.  Participative Web And User-Created Content: Web 2.0 Wikis and Social Networking , 2007 .

[11]  David B. Nieborg,et al.  Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos , 2009, New Media Soc..

[12]  Kirstie Ball,et al.  EXPOSURE: Exploring the subject of surveillance , 2009 .

[13]  Yves Punie,et al.  The Impact of Social Computing on the EU Information Society and Economy , 2009 .

[14]  B. Wellman,et al.  The Internet in everyday life , 2002 .

[15]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[16]  Robin Mansell,et al.  Imagining the Internet: Communication, Innovation, and Governance , 2012 .

[17]  Aleecia M. McDonald,et al.  The Cost of Reading Privacy Policies , 2009 .

[18]  Philip Barker,et al.  Blogs, Wikipedia, Second Life, and beyond: From Production to Produsage , 2009 .

[19]  Ralf De Wolf,et al.  Privacy beyond the individual: analyzing group based access control models on social network sites from a user perspective. , 2012 .

[20]  M. Turshen Development as Freedom , 2001 .

[21]  José van Dijck,et al.  Users like you? Theorizing agency in user-generated content , 2009 .

[22]  Manuel Castells,et al.  The Structure and Dynamics of Global Multi-Media Business Networks , 2008 .

[23]  Tim O'Reilly,et al.  What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software , 2007 .

[24]  R. Silverstone Media and morality : on the rise of the mediapolis , 2006 .

[25]  D. Smythe Communications: Blindspot of Western Marxism , 1977 .

[26]  M. Graber,et al.  Reading level of privacy policies on Internet health Web sites. , 2002, The Journal of family practice.

[27]  Christine Bauer,et al.  On the Value of Information – What Facebook Users are Willing to Pay , 2012, ECIS.

[28]  D. Norman The psychology of everyday things , 1990 .

[29]  Pramod K. Nayar,et al.  The Internet in everyday life , 2004, J. Assoc. Inf. Sci. Technol..

[30]  Jo Pierson,et al.  Social media and cookies: challenges for online privacy , 2011 .

[31]  Celia Lury,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[32]  James Kohnen,et al.  Groundswell: Winning in a World Transformed by Social Technologies , 2011 .

[33]  Donald A. Norman,et al.  Affordance, conventions, and design , 1999, INTR.

[34]  R. Mansell From Digital Divides to Digital Entitlements in Knowledge Societies , 2002 .

[35]  K. Hui,et al.  Economics of Privacy , 2005 .

[36]  Clinton D. Lanier,et al.  Understanding Consumer Privacy: A Review and Future Directions , 2008 .

[37]  W. Smit,et al.  De wederzijdse beinvloeding van technologie en maatschappij: een Technology Assessment-benadering , 1999 .

[38]  David Lyon,et al.  Surveillance as social sorting : Computer codes and mobile bodies , 2005 .

[39]  A. Danna,et al.  All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .

[40]  Doc Searls,et al.  The Cluetrain Manifesto: The End of Business as Usual , 2000 .

[41]  M. Farinosi Deconstructing Bentham’s Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment , 2011 .

[42]  J. Rubenfeld The Right of Privacy , 1989 .

[43]  Zizi Papacharissi,et al.  Privacy as a luxury commodity , 2010, First Monday.

[44]  Nanette Page,et al.  Empowerment: What Is It?. , 1999 .

[45]  Pascu Corina,et al.  An Empirical Analysis of the Creation, Use and Adoption of Social Computing Applications , 2008 .

[46]  Andrew McStay The Mood of Information: A Critique of Online Behavioural Advertising , 2011 .

[47]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[48]  C. Prahalad,et al.  Co-creation experiences: The next practice in value creation , 2004 .

[49]  Lara C. Stache,et al.  Internet and Society: Social Theory in the Information Age , 2012, Rhetoric and Public Affairs.

[50]  R. Chambers,et al.  Vulnerability, Coping and Policy (Editorial Introduction) , 2006 .

[51]  Katrien Dreessen,et al.  Walking the Interface: Uncovering Practices Through 'Proxy Technology Assessment' , 2006 .

[52]  Ellen R. Foxman,et al.  Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues , 1993 .

[53]  Danah Boyd,et al.  Facebook privacy settings: Who cares? , 2010, First Monday.

[54]  Ralf De Wolf,et al.  Privacy by Design Through a Social Requirements Analysis of Social Network Sites form a User Perspective , 2013, European Data Protection.

[55]  C. Fuchs Social Software and Web 2.0: Their Sociological Foundations and Implications , 2010 .

[56]  M. Castells Communication Power: Mass Communication, Mass Self-Communication and Power Relationships in the Network Society , 2009, Media and Society.

[57]  Clay Shirky Here Comes Everybody: The Power of Organizing Without Organizations , 2008 .

[58]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[59]  R. Cabecinhas,et al.  International Association for Media and Communication Research , 2000 .

[60]  Daniel J. Solove Identity Theft, Privacy, and the Architecture of Vulnerability , 2003 .

[61]  Chris Arney Wikinomics: How Mass Collaboration Changes Everything , 2008 .

[62]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[63]  S. O'Donohoe,et al.  Groundswell: Winning in a World Transformed by Social Technologies , 2008 .

[64]  Fernando Bermejo,et al.  Audience manufacture in historical perspective: from broadcasting to Google , 2009, New Media Soc..

[65]  Trevor Pinch,et al.  How users matter : The co-construction of users and technologies , 2003 .

[66]  Christian Fuchs,et al.  Some Reflections on Manuel Castells??? Book ???Communication Power??? , 1970 .

[67]  Elizabeth Shove,et al.  Explaining Showering: A Discussion of the Material, Conventional, and Temporal Dimensions of Practice , 2005 .

[68]  D. W. Hill Media Life , 2013 .

[69]  A. Acquisti The Economics of Personal Data and the Economics of Privacy , 2010 .

[70]  Corina Pascu,et al.  The potential disruptive impact of Internet2 based technologies , 2007, First Monday.

[71]  Jessica Vitak,et al.  Digital footprints: online identity management and search in the age of transparency , 2007 .

[72]  Juan Carlos Valencia Rincón Internet and Surveillance: The Challenges of Web 2.0 and Social Media , 2012 .

[73]  Howard Rheingold,et al.  Smart Mobs: The Next Social Revolution , 2002 .

[74]  J. Barlow,et al.  Smart Mobs: The Next Social Revolution , 2003 .

[75]  S. O'Donohoe,et al.  Groundswell: Winning in a World Transformed by Social Technologies , 2008 .

[76]  M. Watts,et al.  The space of vulnerability: the causal structure of hunger and famine , 1993 .

[77]  Ralf De Wolf,et al.  Evaluating social media privacy settings for personal and advertising purposes , 2014 .

[78]  Juan Carlos,et al.  Vulnerability: a conceptional and methodological review , 2006 .

[79]  C. Fuchs,et al.  Internet and Surveillance: The Challenges of Web 2.0 and Social Media , 2011 .

[80]  D. Boyd Taken Out of Context: American Teen Sociality in Networked Publics , 2010 .