Necessary, unpleasant, and disempowering: reputation management in the internet age

In this paper, we report on a qualitative study of how users manage their reputation online. We focus particularly on people who are bothered by content online about themselves and how they manage reputation damage and repair. We describe how users view reputation management chores as necessary but unpleasant, and how they feel disempowered to repair their online reputation. Participants were unable to identify feasible repair mechanisms and ultimately failed to resolve their problems. Given the current state of dysfunction indicated by our findings, we advocate for increased HCI research attention to this area.

[1]  Viktor Mayer-Schönberger,et al.  Delete: The Virtue of Forgetting in the Digital Age , 2009 .

[2]  Ross A. Malaga Web-Based Reputation Management Systems: Problems and Suggested Solutions , 2001, Electron. Commer. Res..

[3]  Jean-François Blanchette,et al.  Total Recall: How the E-memory Revolution Will Change Everything; DELETE: The Virtue of Forgetting in the Digital Age , 2010, J. Assoc. Inf. Sci. Technol..

[4]  Meredith Ringel Morris,et al.  Augmenting web pages and search results to support credibility assessment , 2011, CHI.

[5]  Aniket Kittur,et al.  Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia , 2008, CSCW.

[6]  mitchellfrom Protecting your company’s online reputation , 2016 .

[7]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[8]  Elizabeth F. Churchill,et al.  Profanity use in online communities , 2012, CHI.

[9]  Frank A. Pasquale Asterisk Revisited: Debating a Right of Reply on Search Results , 2008 .

[10]  Airi Lampinen,et al.  We're in it together: interpersonal management of disclosure in social network services , 2011, CHI.

[11]  Alice E. Marwick,et al.  The Drama! Teen Conflict, Gossip, and Bullying in Networked Publics , 2011 .

[12]  Sean A. Munson,et al.  Attitudes toward online availability of US public records , 2011, dg.o '11.

[13]  Danielle Keats Citron,et al.  Criminalizing Revenge Porn , 2014 .

[14]  Daniel J. Solove The Future of Reputation: Gossip, Rumor, and Privacy on the Internet , 2007 .

[15]  David R. Millen,et al.  Identity management: multiple presentations of self in facebook , 2007, GROUP.

[16]  Xuan Zhao,et al.  The many faces of facebook: experiencing social media as performance, exhibition, and personal archive , 2013, CHI.

[17]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[18]  D. Citron Cyber Civil Rights , 2008 .

[19]  Jacob Kramer-Duffield,et al.  Friends only: examining a privacy-enhancing behavior in facebook , 2010, CHI.

[20]  Douglas Lichtman,et al.  Privacy in a Networked World , 2008 .

[21]  Karen Holtzblatt,et al.  Contextual design , 1997, INTR.

[22]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[23]  S. Raj On Its Own , 2014 .

[24]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[25]  Geelan Fahimy Liable for Your Lies: Misrepresentation Law as a Mechanism for Regulating Behavior on Social Networking Sites , 2013 .

[26]  Eran Toch,et al.  Retrospective privacy: managing longitudinal privacy in online social networks , 2013, SOUPS.

[27]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[28]  Georgios Zervas,et al.  Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud , 2015, Manag. Sci..

[29]  John Mark Agosta,et al.  Highlighting disputed claims on the web , 2010, WWW '10.

[30]  Blase Ur,et al.  "i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets , 2013, CHI.

[31]  Lei Shi,et al.  She gets a sports car from our donation: rumor transmission in a Chinese microblogging community , 2013, CSCW.

[32]  Ann Bartow,et al.  Internet Defamation as Profit Center: The Monetization of Online Harassment , 2009 .

[33]  David R. Thomas,et al.  A General Inductive Approach for Analyzing Qualitative Evaluation Data , 2006 .