Skip to main content

Privacy and Empowerment in Connective Media

  • Conference paper
Internet Science (INSCI 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9089))

Included in the following conference series:

Abstract

In order to explore the roadmap and future directions of social, mobile and ubiquitous media technologies for privacy from an Internet Science perspective we take an interdisciplinary perspective, building on research in Media and Communication Studies and Science and Technology Studies. In order to assess to what extent and how people are effectively ’empowered’ in relation to their privacy, we investigate how they socially engage with these media and how their communication is being (re)configured. For this we first take a macro perspective by discussing recent interdisciplinary views on the changing internet landscape. Next we take a micro perspective on the position of users of ‘connective media’. We then explain and situate user empowerment in relation to online privacy and how this is related to vulnerability. This perspective is used for discussing (young) people and their privacy management, based on the findings of online privacy research projects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Freeman, C., Soete, L.: The economics of industrial innovation. Continuum, London (1997)

    Google Scholar 

  2. Perez, C.: Technological revolutions and financial capital: the dynamics of bubbles and golden ages. Edward Elgar Pub., Cheltenham (2003)

    Google Scholar 

  3. NN: The third great wave. The Economist: Special report - The world economy, pp. 3–4 (2014)

    Google Scholar 

  4. van Dijck, J.: The culture of connectivity: a critical history of social media. Oxford University Press, Oxford (2013)

    Book  Google Scholar 

  5. van Dijck, J.: Flickr and the culture of connectivity: sharing views, experiences, memories. Memory Studies 4, 1–15 (2010)

    Google Scholar 

  6. Pierson, J.: Online privacy in social media: a conceptual exploration of empowerment and vulnerability. Communications & Strategies (Digiworld Economic Journal) 4, 99–120 (2012)

    Google Scholar 

  7. Castells, M.: Communication power. Oxford University Press, Oxford (2009)

    Google Scholar 

  8. Haythornthwaite, C.A., Wellman, B.: The Internet in everyday life. In: Wellman, B., Haythornthwaite, C.A. (eds.) The Internet in Everyday Life, pp. 3–41. Blackwell, Oxford (2002)

    Google Scholar 

  9. Zimmerman, M., Rappaport, J.: Citizen participation, perceived control and psychological empowerment. American Journal of Community Psychology 16, 725–743 (1988)

    Article  Google Scholar 

  10. Mansell, R.: From digital divides to digital entitlements in knowledge societies. Current Sociology 50, 407–426 (2002)

    Article  Google Scholar 

  11. Villagran, J.C.: Vulnerability: a conceptual and methodological review. United Nations University - Institute for Environment and Human Security (2006)

    Google Scholar 

  12. Chambers, R.: Vulnerability, coping and policy (Editorial introduction). IDS Bulletin 37, 33–40 (2006)

    Article  Google Scholar 

  13. Ball, K.: Exposure: exploring the subject of surveillance. Information, Communication and Society 12, 639–657 (2009)

    Article  Google Scholar 

  14. Watts, M.J., Bohle, H.-G.: The space of vulnerability: the causal structure of hunger and famine. Progress in Human Geography 17, 43–67 (1993)

    Article  Google Scholar 

  15. Bohle, H.-G.: Vulnerability Article 1: Vulnerability and Criticality. IHDP Newsletter UPDATE, p. 4. International Human Dimensions Programme on Global Environmental Change Bonn (2001)

    Google Scholar 

  16. Norman, D.A.: The psychology of everyday things. Basic Books, New York (1988)

    Google Scholar 

  17. Pierson, J., Jacobs, A., Dreessen, K., Van den Broeck, I., Lievens, B., Van den Broeck, W.: Walking the interface: uncovering practices through ‘proxy technology assessment’. In: Ethnographic Praxis in Industry Conference - EPIC. American Anthropological Association (2006)

    Google Scholar 

  18. Hand, M., Shove, E., Southerton, D.: Explaining Showering: a Discussion of the Material, Conventional, and Temporal Dimensions of Practice. Sociological Research Online 10 (2005)

    Google Scholar 

  19. Oudshoorn, N., Pinch, T.J.: How users matter: the co-construction of users and technologies. MIT Press, Cambridge (2003)

    Google Scholar 

  20. Akrich, M.: The de-scription of technical objects. In: Bijker, W., Law, J. (eds.) Shaping Technology/Building Society: Studies in Sociotechnical Change, pp. 205–223. MIT Press, Cambridge (1992)

    Google Scholar 

  21. Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact 2003, pp. 709–712. IOS Press (2003)

    Google Scholar 

  22. Brandimarte, L., Acquisti, A., Loewenstein, G., Babcock, L.: Privacy concerns and information disclosure: an illusion of control hypothesis. In: iConference. IDEALS, Chapel Hill (2009)

    Google Scholar 

  23. Goffman, E.: The presentation of self in everyday life. Penguin, Harmondsworth (1971)

    Google Scholar 

  24. Petronio, S.S.: Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany (2002)

    Google Scholar 

  25. Mead, G.H., Morris, C.W.: Mind, self and society from the standpoint of a social behaviorist. University of Chicago Press, Chicago (1934)

    Google Scholar 

  26. Hewitt, J.P.: Self and society: a symbolic interactionist social psychology. Allyn and Bacon, Boston (2007)

    Google Scholar 

  27. Boyd, D.: It’s complicated: the social lives of networked teens. Yale Univesity Press, New Haven (2014)

    Google Scholar 

  28. Boyd, D., Marwick, A.: Social privacy in networked publics: teens’ attitudes, practices, and strategies. In: Oxford Internet Institute Decade in Internet Time Symposium, p. 22 (2011)

    Google Scholar 

  29. Deuze, M.: Media life. Polity, Cambridge (2012)

    Google Scholar 

  30. De Wolf, R., Willaert, K., Pierson, J.: Managing privacy boundaries together: exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35, 444–454 (2014)

    Article  Google Scholar 

  31. Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: Interpersonal management of disclosure in social network services. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 3217–3226. ACM (2011)

    Google Scholar 

  32. Litt, E.: Understanding social network site users’ privacy tool use. Computers in Human Behavior 29, 1649–1656 (2013)

    Article  Google Scholar 

  33. Stutzman, F.D., Hartzog, W.: Boundary regulation in social media. In: ACM Conference on Computer Supported Collaborative Work and Social Computing, pp. 769–778. ACM (2009)

    Google Scholar 

  34. Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: Coping mechanisms for SNS boundary regulation. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 609–618. ACM (2012)

    Google Scholar 

  35. Pötzsch, S.: Privacy awareness: A means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  36. Deuker, A.: Addressing the privacy paradox by expanded privacy awareness – the example of context-aware services. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity. IFIP AICT, vol. 320, pp. 275–283. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  37. Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jo Pierson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Pierson, J. (2015). Privacy and Empowerment in Connective Media. In: Tiropanis, T., Vakali, A., Sartori, L., Burnap, P. (eds) Internet Science. INSCI 2015. Lecture Notes in Computer Science(), vol 9089. Springer, Cham. https://doi.org/10.1007/978-3-319-18609-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18609-2_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18608-5

  • Online ISBN: 978-3-319-18609-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics