skip to main content
10.1145/2078827.2078841acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

"I regretted the minute I pressed share": a qualitative study of regrets on Facebook

Published:20 July 2011Publication History

ABSTRACT

We investigate regrets associated with users' posts on a popular social networking site. Our findings are based on a series of interviews, user diaries, and online surveys involving 569 American Facebook users. Their regrets revolved around sensitive topics, content with strong sentiment, lies, and secrets. Our research reveals several possible causes of why users make posts that they later regret: (1) they want to be perceived in favorable ways, (2) they do not think about their reason for posting or the consequences of their posts, (3) they misjudge the culture and norms within their social circles, (4) they are in a "hot" state of high emotion when posting, or under the influence of drugs or alcohol, (5) their postings are seen by an unintended audience, (6) they do not foresee how their posts could be perceived by people within their intended audience, and (7) they misunderstand or misuse the Facebook platform. Some reported incidents had serious repercussions, such as breaking up relationships or job losses. We discuss methodological considerations in studying negative experiences associated with social networking posts, as well as ways of helping users of social networking sites avoid such regrets.

References

  1. Social networks: Primates on Facebook. The Economist, Feb. 2009.Google ScholarGoogle Scholar
  2. Ask Facebook Your Privacy Questions. http://bits.blogs.nytimes.com/2010/05/06/ask-facebook-your-privacy-questions, 2010.Google ScholarGoogle Scholar
  3. ToneCheck email plugin is like spellcheck for your emotions - PCWorld. http://www.pcworld.com/article/221671/tonecheck.html, Mar. 2011.Google ScholarGoogle Scholar
  4. A. Acquisti. Nudging privacy: The behavioral economics of personal information. IEEE Security and Privacy, 7(6):82--85, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the Facebook. 6th Workshop on Privacy Enhancing Technologies, pages 36--58, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Alexa. Alexa: Top sites on the web, Aug. 2010.Google ScholarGoogle Scholar
  7. I. Altman. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, Monterey, California 93940 ($6.95 cloth), 1975.Google ScholarGoogle Scholar
  8. A. Besmer and H. Lipford. Tagged photos: concerns, perceptions, and protections. In Proceedings of CHI2009 extended abstract, pages 4585--4590, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. d. boyd. Taken out of context American teen sociality in networked publics. 2008.Google ScholarGoogle Scholar
  10. d. boyd and N. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007.Google ScholarGoogle Scholar
  11. d. boyd and E. Hargittai. Facebook privacy settings: Who cares? First Monday, 15(8), 2010.Google ScholarGoogle Scholar
  12. d. boyd and J. Heer. Profiles as conversation: Networked identity performance on friendster. In Proceedings of the 39th Hawaii International Conference on System Sciences (HICCS'06), pages 15--38, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Boyle. Pittsburgh Pirate pierogi mascot fired for bashing team on Facebook page. NY Daily News, 2010.Google ScholarGoogle Scholar
  14. CBS Interactive. Did the Internet Kill Privacy? Facebook Photos Lead to a Teacher Losing Her Job; What Expectations of Privacy Exist in the Digital Era? http://www.cbsnews.com/stories/2011/02/06/sunday/main7323148.shtml, Feb. 2011.Google ScholarGoogle Scholar
  15. S. Consolvo, D. W. McDonald, and J. A. Landay. Theory-driven design strategies for technologies that support behavior change in everyday life. In Proceedings of CHI2009, pages 405--414, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. S. Downs, M. B. Holbrook, S. Sheng, and L. F. Cranor. Are your participants gaming the system?: screening Mechanical Turk workers. In Proceedings of the 28th international conference on human factors in computing systems, CHI '10, pages 2399--2402, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. R. Dunbar. Grooming, Gossip, and the Evolution of Language. Harvard University Press, Oct. 1998.Google ScholarGoogle Scholar
  18. N. Ellison, C. Steinfield, and C. Lampe. The Benefits of Facebook "Friends:" Social Capital and College Students' Use of Online Social Network Sites. Journal of Computer-Mediated Communication, 12(4):1143--1168, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  19. A. Esuli and F. Sebastiani. SENTIWORDNET: a publicly available lexical resource for opinion mining. In Proceedings of the 5th Conference on Language Resources and Evaluation (LREC '06), pages 417--422, 2006.Google ScholarGoogle Scholar
  20. J. Fogel and E. Nehmad. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1):160, 153, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. Gilbert, K. Karahalios, and C. Sandvig. The network in the garden: an empirical analysis of social media in rural life. In Proceeding of CHI2008, pages 1603--1612, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Gilovich and V. H. Medvec. The experience of regret: What, when, and why. Psychological Review, 102(2):379--395, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  23. E. Goffman. The Presentation of Self in Everyday Life. Anchor, 1 edition, June 1959.Google ScholarGoogle Scholar
  24. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71--80, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. N. Joinson. Looking at, looking up or keeping up with people?: motives and use of Facebook. In Proceeding of CHI2008, pages 1027--1036, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Kaufman, N. Christakis, and K. Lewis. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1):79--100, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  27. P. G. Kelley, R. Brewer, P. Mayer, L. F. Cranor, and N. Sadeh. An Investigation into Facebook Friend Grouping. In Proceedings of 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT'2011), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. Kittur, E. H. Chi, and B. Suh. Crowdsourcing user studies with Mechanical Turk. In Proceeding of the 26th annual SIGCHI conference on human factors in computing systems, pages 453--456, Florence, Italy, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. L. Knapp, L. Stafford, and J. A. Daly. Regrettable messages: Things people wish they hadn't said. Journal of Communication, 36(4):40--58, Dec. 1986.Google ScholarGoogle ScholarCross RefCross Ref
  30. C. Lampe, N. B. Ellison, and C. Steinfield. Changes in use and perception of Facebook. In Proceedings of CSCW2008, pages 721--730, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Lampinen, S. Tamminen, and A. Oulasvirta. All my people right here, right now: management of group co-presence on a social networking site. In Proceedings of Group2009, pages 281--290, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. G. Loewenstein. Out of control: Visceral influences on behavior. Organizational Behavior and Human Decision Processes, 65(3):272--292, Mar. 1996.Google ScholarGoogle ScholarCross RefCross Ref
  33. M. Madden and A. Smith. Reputation management and social media. Technical report, Pew Internet & American Life Project, 2009.Google ScholarGoogle Scholar
  34. M. Madejski, M. Johnson, and S. M. Bellovin. The failure of online social network privacy settings. Technical Report CUCS-010-11, Columbia University, Feb. 2011.Google ScholarGoogle Scholar
  35. M. Morrison and N. J. Roese. Regrets of the typical american: Findings from a nationally representative sample. Social Psychological and Personality Science, Mar. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  36. O. Nov and S. Wattal. Social computing privacy concerns: antecedents and effects. In Proceedings of CHI2009, pages 333--336, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129--136, Ft. Lauderdale, Florida, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. B. Pang and L. Lee. Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval, 2(1--2):1--135, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. R. Pieters and M. Zeelenberg. A theory of regret regulation 1.1. Journal of Consumer Psychology, 17(1):29--35, Jan. 2007.Google ScholarGoogle ScholarCross RefCross Ref
  40. T. V. Pollet, S. G. B. Roberts, and R. I. M. Dunbar. Use of social network sites and instant messaging does not lead to increased offline social network size, or to emotionally closer relationships with offline network members. Cyberpsychology, Behavior and Social Networking, 14(4):253--258, Apr. 2011. PMID: 21067280.Google ScholarGoogle ScholarCross RefCross Ref
  41. K. Raynes-Goldie. Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15(1), Jan. 2010.Google ScholarGoogle Scholar
  42. D. Reisinger. Sorry, Facebook friends: Our brains can't keep up. http://news.cnet.com/8301-13506_3-10440330-17.html, Jan. 2010.Google ScholarGoogle Scholar
  43. I. Ritov and J. Baron. Status-quo and omission biases. Journal of Risk and Uncertainty, 5(1), Feb. 1992.Google ScholarGoogle ScholarCross RefCross Ref
  44. N. J. Roese and A. Summerville. What we regret most...and why. Personality & social psychology bulletin, 31(9):1273--1285, Sept. 2005.Google ScholarGoogle Scholar
  45. B. R. Schlenker. Impression management: The self-concept, social identity, and interpersonal relations. Brooks/Cole Pub. Co., 1980.Google ScholarGoogle Scholar
  46. B. Schneier. A taxonomy of social networking data. Security & Privacy, IEEE, 8(4):88, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. M. M. Skeels and J. Grudin. When social networks cross boundaries: A case study of workplace use of facebook and LinkedIn. In Proceedings of Group2009, pages 95--104, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. F. Stutzman and J. Kramer-Duffield. Friends only: examining a privacy-enhancing behavior in facebook. In Proceedings of CHI2010, pages 1553--1562, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. R. H. Thaler and C. R. Sunstein. Libertarian paternalism. American Economic Review, 93(2):175--179, May 2003.Google ScholarGoogle ScholarCross RefCross Ref
  50. R. Tourangeau and T. Yan. Sensitive questions in surveys. Psychological Bulletin, 133(5):859, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  51. Z. Tufekci. Can you see me now? audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1):20--36, 2008.Google ScholarGoogle Scholar

Index Terms

  1. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
      July 2011
      253 pages
      ISBN:9781450309110
      DOI:10.1145/2078827

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 July 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of49submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader