Evaluating social media privacy settings for personal and advertising purposes

Purpose – The purpose of this paper is to define two types of privacy, which are distinct but often reduced to each other. It also investigates which form of privacy is most prominent in privacy settings of online social networks (OSN). Privacy between users is different from privacy between a user and a third party. OSN, and to a lesser extent researchers, often reduce the former to the latter, which results in misleading users and public debate about privacy. Design/methodology/approach – The authors define two types of privacy that account for the difference between interpersonal and third-party disclosure. The first definition draws on symbolic interactionist accounts of privacy, wherein users are performing dramaturgically for an intended audience. Third-party privacy is based on the data that represent the user in data mining and knowledge discovery processes, which ultimately manipulate users into audience commodities. This typology was applied to the privacy settings of Facebook, LinkedIn and Twit...

[1]  Alice E. Marwick,et al.  Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies , 2011 .

[2]  S. Livingstone,et al.  Social networking, age and privacy , 2011 .

[3]  Daniel J. Solove,et al.  Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .

[4]  Ralf De Wolf,et al.  Privacy by Design Through a Social Requirements Analysis of Social Network Sites form a User Perspective , 2013, European Data Protection.

[5]  C. Fuchs Dallas Smythe Today - The Audience Commodity, the Digital Labour Debate, Marxist Political Economy and Critical Theory. Prolegomena to a Digital Labour Theory of Value. , 2012 .

[6]  Serge Gutwirth,et al.  European Data Protection: Coming of Age , 2013, European Data Protection.

[7]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[8]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[9]  Kate Raynes-Goldie,et al.  Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the Age of Facebook , 2010, First Monday.

[10]  Anita Everett,et al.  Obsessed with Facebook , 2013 .

[11]  M. Coté,et al.  Learning to immaterial labour 2.0: MySpace and social networks , 2007 .

[12]  D. Boyd Taken Out of Context: American Teen Sociality in Networked Publics , 2010 .

[13]  Nicole S. Cohen The Valorization of Surveillance: Towards a Political Economy of Facebook , 2008 .

[14]  G. Mead Mind, Self, and Society: From the Standpoint of a Social Behaviorist (Works of George Herbert Mead, Vol. 1) , 1934 .

[15]  Christian Fuchs,et al.  Dallas Smythe Today - The Audience Commodity, the Digital Labour Debate, Marxist Political Economy and Critical Theory. , 2012 .

[16]  Jennifer King,et al.  Privacy: is there an app for that? , 2011, SOUPS.

[17]  Mireille Hildebrandt,et al.  Privacy and Identity , 2006 .

[18]  J. Hewitt Self and Society: A Symbolic Interactionist Social Psychology , 1976 .

[19]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[20]  Manuel Castells,et al.  Communication Power and Counter-power in the Network Society , 2007 .

[21]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[22]  Thorsten Strufe,et al.  Improving the Usability of Privacy Settings in Facebook , 2011, ArXiv.

[23]  C. Fuchs The Political Economy of Privacy on Facebook , 2012 .

[24]  Mireille Hildebrandt Profiling: From data to knowledge , 2006, Datenschutz und Datensicherheit - DuD.

[25]  O. Günther,et al.  Privacy concerns and identity in online social networks , 2009 .

[26]  R. Collins Four Sociological Traditions , 1994 .

[27]  Donald A. Norman,et al.  Affordance, conventions, and design , 1999, INTR.

[28]  Jeffrey Rosen Out of context : The purposes of privacy , 2001 .

[29]  Jo Pierson,et al.  Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications , 2009, Computer.

[30]  D. Smythe Communications: Blindspot of Western Marxism , 1977 .

[31]  S. Petronio,et al.  Communication Privacy Management Theory : Understanding Families , 2006 .

[32]  Seda Gürses,et al.  Understanding the landscape of privacy technologies 1 , 2012 .

[33]  Christian Fuchs New Media, Web 2.0 and Surveillance , 2011 .

[34]  D. Boyd Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life , 2007 .

[35]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[36]  J. Rappaport Terms of empowerment/exemplars of prevention: Toward a theory for community psychology , 1987, American journal of community psychology.

[37]  Ralf De Wolf,et al.  Symbolic Interactionist Perspective on Linking Privacy and Identity in Social Network Sites , 2012 .

[38]  Andrew Wang,et al.  Clinical problem-solving. Taken out of context. , 2008, The New England journal of medicine.

[39]  Drew Westen,et al.  Self and Society: Narcissism, Collectivism, and the Development of Morals , 1985 .