Abstract
In order to explore the roadmap and future directions of social, mobile and ubiquitous media technologies for privacy from an Internet Science perspective we take an interdisciplinary perspective, building on research in Media and Communication Studies and Science and Technology Studies. In order to assess to what extent and how people are effectively ’empowered’ in relation to their privacy, we investigate how they socially engage with these media and how their communication is being (re)configured. For this we first take a macro perspective by discussing recent interdisciplinary views on the changing internet landscape. Next we take a micro perspective on the position of users of ‘connective media’. We then explain and situate user empowerment in relation to online privacy and how this is related to vulnerability. This perspective is used for discussing (young) people and their privacy management, based on the findings of online privacy research projects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Freeman, C., Soete, L.: The economics of industrial innovation. Continuum, London (1997)
Perez, C.: Technological revolutions and financial capital: the dynamics of bubbles and golden ages. Edward Elgar Pub., Cheltenham (2003)
NN: The third great wave. The Economist: Special report - The world economy, pp. 3–4 (2014)
van Dijck, J.: The culture of connectivity: a critical history of social media. Oxford University Press, Oxford (2013)
van Dijck, J.: Flickr and the culture of connectivity: sharing views, experiences, memories. Memory Studies 4, 1–15 (2010)
Pierson, J.: Online privacy in social media: a conceptual exploration of empowerment and vulnerability. Communications & Strategies (Digiworld Economic Journal) 4, 99–120 (2012)
Castells, M.: Communication power. Oxford University Press, Oxford (2009)
Haythornthwaite, C.A., Wellman, B.: The Internet in everyday life. In: Wellman, B., Haythornthwaite, C.A. (eds.) The Internet in Everyday Life, pp. 3–41. Blackwell, Oxford (2002)
Zimmerman, M., Rappaport, J.: Citizen participation, perceived control and psychological empowerment. American Journal of Community Psychology 16, 725–743 (1988)
Mansell, R.: From digital divides to digital entitlements in knowledge societies. Current Sociology 50, 407–426 (2002)
Villagran, J.C.: Vulnerability: a conceptual and methodological review. United Nations University - Institute for Environment and Human Security (2006)
Chambers, R.: Vulnerability, coping and policy (Editorial introduction). IDS Bulletin 37, 33–40 (2006)
Ball, K.: Exposure: exploring the subject of surveillance. Information, Communication and Society 12, 639–657 (2009)
Watts, M.J., Bohle, H.-G.: The space of vulnerability: the causal structure of hunger and famine. Progress in Human Geography 17, 43–67 (1993)
Bohle, H.-G.: Vulnerability Article 1: Vulnerability and Criticality. IHDP Newsletter UPDATE, p. 4. International Human Dimensions Programme on Global Environmental Change Bonn (2001)
Norman, D.A.: The psychology of everyday things. Basic Books, New York (1988)
Pierson, J., Jacobs, A., Dreessen, K., Van den Broeck, I., Lievens, B., Van den Broeck, W.: Walking the interface: uncovering practices through ‘proxy technology assessment’. In: Ethnographic Praxis in Industry Conference - EPIC. American Anthropological Association (2006)
Hand, M., Shove, E., Southerton, D.: Explaining Showering: a Discussion of the Material, Conventional, and Temporal Dimensions of Practice. Sociological Research Online 10 (2005)
Oudshoorn, N., Pinch, T.J.: How users matter: the co-construction of users and technologies. MIT Press, Cambridge (2003)
Akrich, M.: The de-scription of technical objects. In: Bijker, W., Law, J. (eds.) Shaping Technology/Building Society: Studies in Sociotechnical Change, pp. 205–223. MIT Press, Cambridge (1992)
Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact 2003, pp. 709–712. IOS Press (2003)
Brandimarte, L., Acquisti, A., Loewenstein, G., Babcock, L.: Privacy concerns and information disclosure: an illusion of control hypothesis. In: iConference. IDEALS, Chapel Hill (2009)
Goffman, E.: The presentation of self in everyday life. Penguin, Harmondsworth (1971)
Petronio, S.S.: Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany (2002)
Mead, G.H., Morris, C.W.: Mind, self and society from the standpoint of a social behaviorist. University of Chicago Press, Chicago (1934)
Hewitt, J.P.: Self and society: a symbolic interactionist social psychology. Allyn and Bacon, Boston (2007)
Boyd, D.: It’s complicated: the social lives of networked teens. Yale Univesity Press, New Haven (2014)
Boyd, D., Marwick, A.: Social privacy in networked publics: teens’ attitudes, practices, and strategies. In: Oxford Internet Institute Decade in Internet Time Symposium, p. 22 (2011)
Deuze, M.: Media life. Polity, Cambridge (2012)
De Wolf, R., Willaert, K., Pierson, J.: Managing privacy boundaries together: exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35, 444–454 (2014)
Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: Interpersonal management of disclosure in social network services. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 3217–3226. ACM (2011)
Litt, E.: Understanding social network site users’ privacy tool use. Computers in Human Behavior 29, 1649–1656 (2013)
Stutzman, F.D., Hartzog, W.: Boundary regulation in social media. In: ACM Conference on Computer Supported Collaborative Work and Social Computing, pp. 769–778. ACM (2009)
Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: Coping mechanisms for SNS boundary regulation. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 609–618. ACM (2012)
Pötzsch, S.: Privacy awareness: A means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)
Deuker, A.: Addressing the privacy paradox by expanded privacy awareness – the example of context-aware services. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity. IFIP AICT, vol. 320, pp. 275–283. Springer, Heidelberg (2010)
Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Pierson, J. (2015). Privacy and Empowerment in Connective Media. In: Tiropanis, T., Vakali, A., Sartori, L., Burnap, P. (eds) Internet Science. INSCI 2015. Lecture Notes in Computer Science(), vol 9089. Springer, Cham. https://doi.org/10.1007/978-3-319-18609-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-18609-2_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18608-5
Online ISBN: 978-3-319-18609-2
eBook Packages: Computer ScienceComputer Science (R0)