Creepy but inevitable?: the evolution of social networking

This paper focuses on the fifth year of a cross-sectional trend study of enterprise social networking. Several stable patterns are evident--some activities have plateaued, others steadily increase in frequency. The fifth year did see a new development: As social networking companies visibly embraced behavior tracking and targeted advertising, concerns shifted from boundary regulation within personal networks to unsettling evidence of activity monitoring. However, benefits of use continue to outweigh drawbacks.

[1]  Kate Raynes-Goldie,et al.  Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the Age of Facebook , 2010, First Monday.

[2]  Cliff Lampe,et al.  Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environment , 2011, Privacy Online.

[3]  Lindsay T. Graham,et al.  A Review of Facebook Research in the Social Sciences , 2012, Perspectives on psychological science : a journal of the Association for Psychological Science.

[4]  Eszter Hargittai,et al.  Whose Space? Differences Among Users and Non-Users of Social Network Sites , 2007, J. Comput. Mediat. Commun..

[5]  D. Boyd Taken Out of Context: American Teen Sociality in Networked Publics , 2010 .

[6]  Rosta Farzan,et al.  Results from deploying a participation incentive mechanism within the enterprise , 2008, CHI.

[7]  Mor Naaman,et al.  Is it really about me?: message content in social awareness streams , 2010, CSCW '10.

[8]  Jill Palzkill Woelfer,et al.  Homeless young people on social network sites , 2012, CHI.

[9]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[10]  Anna Wu,et al.  Detecting professional versus personal closeness using an enterprise social network site , 2010, CHI.

[11]  David R. Millen,et al.  Learning by seeing: photo viewing in the workplace , 2009, CHI.

[12]  Yang Wang,et al.  Privacy in Online Social Networking at Workplace , 2009, 2009 International Conference on Computational Science and Engineering.

[13]  Zeynep Tufekci,et al.  Facebook, Youth and Privacy in Networked Publics , 2012, ICWSM.

[14]  K. Seers Qualitative data analysis , 2011, Evidence Based Nursing.

[15]  Cliff Lampe,et al.  Perceptions of facebook's value as an information source , 2012, CHI.

[16]  Michael J. Muller,et al.  Use and reuse of shared lists as a social content type , 2008, CHI.

[17]  David R. Millen,et al.  Identity management: multiple presentations of self in facebook , 2007, GROUP.

[18]  B. Hogan The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online , 2010 .

[19]  Cliff Lampe,et al.  A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.

[20]  Robert E. Kraut,et al.  Using facebook after losing a job: differential benefits of strong and weak ties , 2013, CSCW.

[21]  Pernilla Qvarfordt,et al.  Exploring the workplace communication ecology , 2010, CHI.

[22]  Mary Beth Rosson,et al.  How and why people Twitter: the role that micro-blogging plays in informal communication at work , 2009, GROUP.

[23]  Ban Al-Ani,et al.  Bridging between organizations and the public: volunteer coordinators' uneasy relationship with social computing , 2012, CHI.

[24]  Jonathan Grudin,et al.  A longitudinal study of Facebook, LinkedIn, & Twitter use , 2012, CHI.

[25]  Cliff Lampe,et al.  Bowling online: social networking and social capital within the organization , 2009, C&T.

[26]  Werner Geyer,et al.  People Sensemaking and Relationship Building on an Enterprise Social Network Site , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[27]  A. Brenner Twitter Use 2012 , 2012 .

[28]  Elizabeth F. Churchill,et al.  Faceted identity, faceted lives: social and technical issues with being yourself online , 2011, CSCW.

[29]  Tad Hogg,et al.  Effects of feedback and peer pressure on contributions to enterprise social media , 2009, GROUP.

[30]  Jonathan Grudin,et al.  When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.

[31]  Deirdre K. Mulligan,et al.  Stopping spyware at the gate: a user study of privacy, notice and spyware , 2005, SOUPS '05.

[32]  Alfred Kobsa,et al.  Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns , 2012, ICWSM.

[33]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[34]  P. Leonardi,et al.  Social Media Use in Organizations: Exploring the Affordances of Visibility, Editability, Persistence, and Association , 2013 .

[35]  Ed H. Chi,et al.  Talking in circles: selective sharing in google+ , 2012, CHI.

[36]  Jun Zhang,et al.  A case study of micro-blogging in the enterprise: use, value, and related issues , 2010, CHI.

[37]  Robert E. Kraut,et al.  Social capital on facebook: differentiating uses and users , 2011, CHI.

[38]  Mikhil Masli,et al.  An open, social microcalender for the enterprise: timely? , 2011, CHI.

[39]  Frederic Stutzman,et al.  Boundary regulation in social media , 2012, CSCW.

[40]  Jonathan Grudin,et al.  Crossing Boundaries: A Case Study of Employee Blogging , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[41]  Michael J. Muller,et al.  Motivations for social networking at work , 2008, CSCW.

[42]  J. DiMicco,et al.  People Sensemaking and Relationship Building on an Enterprise Social Network Site , 2009 .

[43]  David R. Millen,et al.  Stuff IBMers Say: Microblogs as an Expression of Organizational Culture , 2012, ICWSM.

[44]  Cliff Lampe,et al.  Changes in use and perception of facebook , 2008, CSCW.

[45]  Kate Ehrlich,et al.  Microblogging Inside and Outside the Workplace , 2010, ICWSM.

[46]  B MilesMatthew,et al.  Qualitative Data Analysis , 2009, Approaches and Processes of Social Science Research.

[47]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[48]  Ian Sommerville,et al.  The Management and Use of Social Network Sites in a Government Department , 2011, Computer Supported Cooperative Work (CSCW).