Practices of information and secrecy in a punk rock subculture

By examining the information practices of a punk-rock subculture, we investigate the limits of social media systems, particularly limits exposed by practices of secrecy. Looking at the exchange of information about "underground" shows, we use qualitative interviews to examine uses of social media among fans. This initial analysis centers on understanding the tactical practices of information and technology to avoid police detection, particularly by comparing uses of more traditional online forums, such as message boards, with social network sites, such as Facebook. Understanding the uses and preferences for distinct technologies sheds light on how localized social context drives technological use. These findings are furthermore useful in their implications for design of applications sensitive to granular needs of users for secrecy.

[1]  Paul Dourish,et al.  Divining a Digital Future - Mess and Mythology in Ubiquitous Computing , 2011 .

[2]  D. Merten,et al.  ENCULTURATION INTO SECRECY AMONG JUNIOR HIGH SCHOOL GIRLS , 1999 .

[3]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[4]  N. Hoffart Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .

[5]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[6]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[7]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[8]  Reijo Savolainen Information Behavior and Information Practice: Reviewing the “Umbrella Concepts” of Information‐Seeking Studies1 , 2007, The Library Quarterly.

[9]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[10]  Monica J. Barratt,et al.  Beyond recruitment? Participatory online research with people who use drugs , 2010 .

[11]  G. Fine,et al.  Secrecy, Trust, and Dangerous Leisure: Generating Group Cohesion in Voluntary Organizations , 1996 .

[12]  Daniel M. Goldstein,et al.  Toward a Critical Anthropology of Security , 2010, Current Anthropology.

[13]  B. Erickson Secret Societies and Social Structure , 1981 .