Self-reflection on privacy research in social networking sites

ABSTRACT The increasing popularity of social networking sites has been a source of many privacy concerns. To mitigate these concerns and empower users, different forms of educational and technological solutions have been developed. Developing and evaluating such solutions, however, cannot be considered a neutral process. Instead, it is socially bound and interwoven with norms and values of the researchers. In this contribution, we aim to make the research process and development of privacy solutions more transparent by highlighting questions that should be considered. (1) Which actors are involved in formulating the privacy problem? (2) Is privacy perceived as a human right or as a property right on one’s data? (3) Is informing users of privacy dangers always a good thing? (4) Do we want to influence users’ attitudes and behaviours? (5) Who is the target audience? We argue that these questions can help researchers to better comprehend their own perspective on privacy, that of others, and the influence of the solutions they are developing. In the discussion, we propose a procedure called ‘tool clinics’ for further practical implementations.

[1]  D. Boyd Facebook's Privacy Trainwreck , 2008 .

[2]  Tammy Schellens,et al.  Exploring the Usefulness of School Education about Risks on Social Network Sites: A Survey Study , 2013, Journal of Media Literacy Education.

[3]  Nadezhda Purtova,et al.  Private Law Solutions in European Data Protection: Relationship to Privacy, and Waiver of Data Protection Rights , 2010 .

[4]  Charlie C. Chen,et al.  Online privacy control via anonymity and pseudonym: Cross-cultural implications , 2008, Behav. Inf. Technol..

[5]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[6]  Heng Xu Reframing Privacy 2.0 in Online Social Networks , 2012 .

[7]  A. Giddens The consequences of modernity , 1990 .

[8]  Murray L. Wax Ethics and Values in Applied Social Research , 1989 .

[9]  Deborah Estrin,et al.  Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.

[10]  Pamela Samuelson,et al.  Privacy as intellectual property , 2000 .

[11]  D. Edge,et al.  The social shaping of technology , 1988 .

[12]  Kevin Jiang Introduction , 2013, Nature Medicine.

[13]  Y. Poullet,et al.  The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy , 2009 .

[14]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[15]  Michael S. Bernstein,et al.  Quantifying the invisible audience in social networks , 2013, CHI.

[16]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[17]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[18]  G. Evans,et al.  Environment and Behavior , 2001 .

[19]  Peter-Paul Verbeek,et al.  Moralizing Technology: Understanding and Designing the Morality of Things , 2011 .

[20]  Harold C. Releya Technology and privacy: The new landscape , 1998 .

[21]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[22]  Oscar H. Gandy,et al.  IAMCR Data Mining : Gandy 7 / 11 / 2002 1 Data mining and surveillance in the post-9 . 11 environment , 2002 .

[23]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[24]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[25]  K. Foot,et al.  Media Technologies: Essays on Communication, Materiality, and Society , 2014 .

[26]  Glenn Greenwald,et al.  No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .

[27]  Dennis Waskul,et al.  Ekstasis and the internet: liminality and computer-mediated communication , 2005, New Media Soc..

[28]  Herbert C. Kelman Ethical limits on the use of influence in hierarchical relationships , 2001 .

[29]  J. Rubenfeld The Right of Privacy , 1989 .

[30]  A. Briggle,et al.  The Good Life in a Technological Age , 2012 .

[31]  Bettina Berendt,et al.  "Tool Clinics" - Embracing Multiple Perspectives in Privacy Research and Privacy-Sensitive Design , 2013 .

[32]  Kate Raynes-Goldie,et al.  Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the Age of Facebook , 2010, First Monday.

[33]  Alfred Kobsa,et al.  Preference-based location sharing: are more privacy options really better? , 2013, CHI.

[34]  M. Coté,et al.  Learning to immaterial labour 2.0: MySpace and social networks , 2007 .

[35]  W. Heirman,et al.  Adolescents, Online Marketing and Privacy: Predicting Adolescents’ Willingness to Disclose Personal Information for Marketing Purposes , 2013 .

[36]  Kilroy,et al.  No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. By Glenn Greenwald, New York, NY: Metropolitan Books, 2014. , 2016 .

[37]  C. Fuchs The Political Economy of Privacy on Facebook , 2012 .

[38]  P Golle,et al.  Acquisti, Alessandro, and Gross, Ralph. . Imagined Communities: and Privacy on the Facebook. , 2006 .

[39]  Paul De Hert Accountability and System Responsibility: New Concepts in Data Protection Law and Human Rights Law , 2012, Managing Privacy through Accountability.

[40]  Tammy Schellens,et al.  Educational packages about the risks on social network sites : state-of-the-art , 2014 .

[41]  Justin W. Patchin,et al.  Changes in adolescent online social networking behaviors from 2006 to 2009 , 2010, Comput. Hum. Behav..

[42]  Melissa Gregg,et al.  The pedagogy of regret: Facebook, binge drinking and young women , 2012 .

[43]  L. Steinberg,et al.  (Im)maturity of judgment in adolescence: why adolescents may be less culpable than adults. , 2000, Behavioral sciences & the law.

[44]  Seda Gurses,et al.  Two Tales of Privacy in Online Social Networks , 2013, IEEE Security & Privacy.

[45]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[46]  M. Foucault,et al.  The History of Sexuality, Volume 1: An Introduction , 1990 .

[47]  B. Latour 10 ''Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts'' , 1992 .

[48]  Annette N. Markham Dramaturgy of digital experience , 2013 .

[49]  Nigel Martin,et al.  Expectations of privacy and trust: examining the views of IT professionals , 2016, Behav. Inf. Technol..

[50]  I. Altman A Conceptual Analysis , 1976 .

[51]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[52]  I. Altman Privacy: A Conceptual Analysis. , 1976 .

[53]  L. Lohmann Performative Equations and Neoliberal Commodification:: The Case of Climate , 2014 .

[54]  Herbert C. Kelman,et al.  Manipulation of Human Behavior: An Ethical Dilemma for the Social Scientist* , 1965 .

[55]  Eden Litt,et al.  Understanding social network site users' privacy tool use , 2013, Comput. Hum. Behav..

[56]  S. Tejedor,et al.  Challenges and Risks of Internet Use by Children. How to Empower Minors , 2012 .

[57]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .