Abstract
Social network sites are known for intruding their users’ privacy per default. The networks use and sell demographic information for targeted advertising (Acquisti et al. 2007). Data are replicated by users and transferred to unknown third parties; the user’s utterances (e.g., on fan pages) are searched, analyzed, and scaled in market research (Nissenbaum 2009). Although users seem to be aware of this situation, the majority of users do not complain or change their self-disclosure online (boyd and Hargittai 2010, p. 320; Christofides et al. 2009). We find a very loose and laissez-faire behavior in terms of how users deal with the threats to and their own concerns about informational privacy online. Scholars have termed this contradiction the “privacy paradox,” indicating that people seem to know about privacy threats on the one hand, but do not enact their privacy needs on the other (Barnes 2006).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Acquisti A, Gross R (2006) Awareness, information sharing, and privacy on the Facebook. Paper presented at the 6th Workshop on Privacy Enhancing Technologies, Cambridge, 28–30 June 2006
Acquisti A, Gritzalis S, Lambrinoudakis C, De Capitani di Vimercati S (eds) (2007) Digital privacy: theory, technologies, and practices. Auerbach, Boca Raton
Altman I (1975) The environment and social behavior: privacy, personal space, territory, crowding. Brooks/Cole, Monterey
Bargh JA, McKenna KYA, Fitzsimons GM (2002) Can you see the real me? Activation and expression of the “true self” on the internet. J Soc Issues 58(1):33–48
Barnes SB (2006) A privacy paradox: Social networking in the Unites States. First Monday 11(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1394/1312. Accessed 25 May 2009
Ben-Ze’ev A (2003) Privacy, emotional closeness, and openness in cyberspace. Comput Hum Behav 19(4):451–567
Berry DS (1991) Accuracy in social perception: contributions of facial and vocal information. J Pers Soc Psychol 61(2):298–307
boyd d, Hargittai E (2010) Facebook privacy settings: Who cares? First Monday 15(8)
Buchanan T, Paine C, Joinson AN, Reips U-D (2007) Development of measures of online privacy concern and protection for use on the internet. J Am Soc Inform Sci Tech 58(2):157–165
Burgoon JK (1982) Privacy and communication. In: Burgoon M (ed) Communication yearbook 6. Sage, Beverly Hills, pp 206–249
Burgoon JK, Parrott R, Le Poire BA, Kelley DL, Walther JB, Perry D (1989) Maintaining and restoring privacy through communication in different types of relationships. J Soc Pers Relat 6:131–158
Cho H, Rivera-Sanchez M, Lim SS (2009) A multinational study on online privacy: global concerns and local responses. New Media Soc 11(3):395–416
Christofides E, Muise A, Desmarais S (2009) Information disclosure and control on facebook: are they two sides of the same coin or two different processes? Cyberpsychol Behav 12(3):341–345
Debatin B, Lovejoy JP, Horn A-K, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput Mediat Commun 15:83–108
Deci EL, Ryan RM (2000) The “what” and “why” of goal pursuits: human needs and the self-determination of behavior. Psychol Inq 11(4):227–268
Ekman P, Friesen WV, Ancoli S (2001) Facial signs of emotional experience. In: Parrott W (ed) Emotions in social psychology: essential readings. Psychology Press, New York, pp 255–264
Harter S (2002) Authenticity. In: Snyder CR, Lopez SJ (eds) Handbook of positive psychology. Oxford University Press, Oxford, pp 382–394
Hassin R, Trope Y (2000) Facing faces: studies on the cognitive aspect of physiognomy. J Pers Soc Psychol 78(5):837–852
Hinduja S, Patchin JW (2008) Personal information of adolescents on the internet: a quantitative content analysis of myspace. J Adolesc 31:125–146
Hodgins HS, Knee CR (2002) The integrating self and conscious experience. In: Deci EL, Ryan RM (eds) Handbook of self-determination research. University of Rochester Press, Rochester, pp 87–100
Joinson AN (2001) Self-disclosure in computer-mediated communication: the role of self-awareness and visual anonymity. Eur J Soc Psychol 31:177–192
Kernis MH, Goldman BM (2005) Authenticity, social motivation, and psychological adjustment. In: Forgas JP, Williams KD, Laham SM (eds) Social motivation: conscious and unconscious processes. Cambridge University Press, New York, pp 210–227
Kernis MH, Goldman BM (2006) A multicomponent conceputalization of authenticity: theory and research. In: Zana MP (ed) Advances in experimental social psychology, vol 38. Elsevier Academic Press, San Diego, pp 283–357
Lampe C, Ellison NB, Steinfield C (2007) A familiar Face(book): profile elements as signals in an online social network. In: Proceedings of the SIGCHI conference on human factors in computing systems, Association for Computing Machinery, New York, pp 435–444
Lewis K, Kaufman J, Christakis N (2008) The taste for privacy: an analysis of college student privacy settings in an online social network. J Comput Mediat Commun 14:79–100
Margulis ST (2003) On the status and contribution of Westin’s and Altman’s theories of privacy. J Soc Issues 59(2):411–429
Nardi BA, Schiano DJ, Gumbrecht M (2004). Blogging as social activity, or, would you let 900 million people read your diary? In: Proceedings of computer supported cooperative work 2004, Chicago. http://home.comcast.net/~diane.schiano/CSCW04.Blog.pdf. Accessed 10 May 2007
Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Palo Alto
Paine C, Reips U-D, Stieger S, Joinson AN, Buchanan T (2007) Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. Int J Hum Comput St 65:526–536
Schouten AP, Valkenburg PM, Peter J (2007) Precursors and underlying processes of adolescents’ online self-disclosure: developing and testing an “internet-attribute-perception” model. J Media Psychol 10:292–315
Sheldon KM, Ryan RM, Rawsthorne LJ, Ilardi B (1997) Trait self and true self: cross-role variation in the big-five personality traits and its relations with psychological authenticity and subjective well-being. J Pers Soc Psychol 73(6):1380–1393
Tidwell LS, Walther JB (2002) Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations. Getting to know one another a bit at a time. Hum Commun Res 28(3):317–348
Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. B Sci Technol Soc 28(1):20–36
Turkle S (1996) Life on the screen: identity in the age of the internet. Weidenfeld & Nicolson, London
Viegas FB (2005). Bloggers’ expectations of privacy and accountability: an initial survey. J Comput-Mediat Commun 10(3), Article 12
Vinsel A, Brown BB, Altman I, Foss C (1980) Privacy regulation, territorial displays, and effectiveness of individual functioning. J Pers Soc Psychol 39(6):1104–1115
Walther JB (1996) Computer-mediated communication: impersonal, interpersonal, and hyperpersonal interaction. Commun Res 23:1–43
Westin AF (1967) Privacy and freedom. Atheneum, New York
Westin AF (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431–453
Wood AM, Linley PA, Maltby J, Baliousis M, Joseph S (2008) The authentic personality: a theoretical and empirical conceptualization and the development of the authenticity scale. J Couns Psychol 55(3):385–399
Yao MZ, Rice RE, Wallis K (2007) Predicting user concerns about online privacy. J Am Soc Inform Sci Tech 58(5):710–722
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Trepte, S., Reinecke, L. (2011). The Social Web as a Shelter for Privacy and Authentic Living. In: Trepte, S., Reinecke, L. (eds) Privacy Online. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21521-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-21521-6_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21520-9
Online ISBN: 978-3-642-21521-6
eBook Packages: Computer ScienceComputer Science (R0)