skip to main content
10.1145/2818048.2819996acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study

Published: 27 February 2016 Publication History

Abstract

Users of social network services (SNSs) have to cope with a new set of privacy challenges because personal information on an SNS is often co-owned and co-managed by various distributed social ties. Using a multi-methods and multinational approach, we investigated Facebook users' privacy behavior by focusing on how they co-manage private information. Our findings from focus-group interviews (n = 28) and online surveys (n = 299) suggest that Facebook users primarily apply four different practices of privacy management: collaborative strategies, corrective strategies, preventive strategies, and information control. The four dimensions of privacy management display selective relationships with theoretical antecedents (e.g., self-efficacy, collective-efficacy, attitudes, privacy concern), indicating that each behavior is motivated by a different combination of conditions. Implications for research and practice are discussed.

References

[1]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Cole Publishing Company, Monterey, CA.
[2]
Irwin Altman, Anne Vinsel, and Barbara B. Brown. 1981. Dialectic conceptions in social psychology: An application to social penetration and privacy regulation. Advances in Experimental Social Psychology 14: 107– 160.
[3]
Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, and Gorrell Cheek. 2009. Social applications: exploring a more secure framework. In Proceedings of the 5th Symposium on Usable Privacy and Security, 110.
[4]
Yunan Chen and Heng Xu. 2013. Privacy management in dynamic groups: Understanding information privacy in medical practices. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW'13), 541–552.
[5]
Jeffrey T. Child and David A. Westermann. 2013. Let's be Facebook friends: Exploring parental Facebook friend requests from a communication privacy management (CPM) perspective. Journal of Family Communication 13, 1: 46–59.
[6]
Hichang Cho, Jae-Shin Lee, and Siyoung Chung. 2010. Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior 26, 5: 987–995. http://doi.org/10.1016/j.chb.2010.02.012
[7]
Hichang Cho, Milagros Rivera-Sánchez, and Sun Sun Lim. 2009. A multinational study on online privacy: global concerns and local responses. New Media & Society 11, 3: 395–416.
[8]
Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, 1: 83–108.
[9]
Nicole B. Ellison, Jessica Vitak, Charles Steinfield, Rebecca Gray, and Cliff Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environment. In Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, Sabine Trepte and Leonard Reinecke (eds.), Springer, 19–32.
[10]
Bethany D. Frampton and Jeffrey T. Child. 2013. Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Computers in Human Behavior 29, 6: 2257–2264.
[11]
Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71–80.
[12]
Bernie Hogan. 2010. The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online. Bulletin of Science, Technology & Society 30, 6: 377 –386. http://doi.org/10.1177/0270467610385893
[13]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference, 103–112.
[14]
Magid Igbaria, Tor Guimaraes, and Gordon B. Davis. 1995. Testing the determinants of microcomputer usage via a structural equation model. Journal of Management Information Systems: 87–114.
[15]
Adam N. Joinson. 2008. Looking at, looking up or keeping up with people?: Motives and use of Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'08), 1027–1036.
[16]
Maggie Kanter, Tamara Afifi, and Stephanie Robbins. 2012. The impact of parents 'friending' their young adult child on Facebook on perceptions of parental privacy invasions and parent–child relationship quality. Journal of Communication 62, 5: 900–917.
[17]
Cliff Lampe, Donghee Yvette Wohn, Jessica Vitak, Nicole B. Ellison, and Rick Wash. 2011. Student use of Facebook for organizing collaborative classroom activities. International Journal of ComputerSupported Collaborative Learning 6, 3: 329–347.
[18]
Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it together: interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'11), 3217–3226.
[19]
Dale G. Larson and Robert L. Chastain. 1990. Selfconcealment: Conceptualization, measurement, and health implications. Journal of Social and Clinical Psychology 9, 4: 439–455.
[20]
Kevin Lewis, Jason Kaufman, and Nicholas Christakis. 2008. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication 14, 1: 79–100.
[21]
Yabing Liu, Krishna P. Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2011. Analyzing Facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 61– 70.
[22]
Stephen T Margulis. 2003. On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues 59, 2: 411–429.
[23]
Alison R. Murphy, Madhu C. Reddy, and Heng Xu. 2014. Privacy practices in collaborative environments: A Study of emergency department staff. In Proceedings of the 2014 Conference on Computer Supported Cooperative Work & Social Computing (CSCW'14), 269-282.
[24]
Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.
[25]
Xinru Page, Karen Tang, Fred Stutzman, and Airi Lampinen. 2013. Measuring networked social privacy. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work Companion, 315–320.
[26]
Leysia Palen and Paul Dourish. 2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'03), 129–136.
[27]
Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press.
[28]
Sandra Petronio. 2013. Brief status report on communication privacy management theory. Journal of Family Communication 13, 1: 6–14.
[29]
Robert J. Sampson, Stephen W. Raudenbush, and Felton Earls. 1997. Neighborhoods and violent crime: A multilevel study of collective efficacy. Science 277, 5328: 918–924.
[30]
Dong-Her Shih, Sheng-Fei Hsu, David C. Yen, and Chia-Chia Lin. 2012. Exploring the individual's behavior on self-disclosure online. International Journal of Human-Computer Interaction 28, 10: 627– 645. http://doi.org/10.1080/10447318.2011.654198
[31]
H. Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: An interdisciplinary review. MIS Quarterly 35, 4: 989–1016.
[32]
Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web, 521– 530.
[33]
Anna C. Squicciarini, Heng Xu, and Xiaolong Luke Zhang. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62, 3: 521–534.
[34]
Frederic Stutzman and Woodrow Hartzog. 2012. Boundary regulation in social media. In Proceedings of the 2012 Conference on Computer Supported Cooperative Work (CSCW'12), 769–778.
[35]
Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends only: examining a privacy-enhancing behavior in facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'10), 1553–1562.
[36]
Bernard CY Tan, Kwok-Kee Wei, Richard T. Watson, Danial L. Clapper, and Ephraim R. Mclean. 1998. Computer-mediated communication and majority influence: Assessing the impact in an individualistic and a collectivistic culture. Management Science 44, 9: 1263–1278.
[37]
Jodie B. Ullman 2006. Structural equation modeling: Reviewing the basics and moving forward. Journal of Personality Assessment 87, 1: 35-50.
[38]
Jessica Vitak, Pamela Wisniewski, Xinru Page, et al. 2015. The Future of Networked Privacy: Challenges and Opportunities. In Proceedings of the 2015 ACM Conference Companion on Computer Supported Cooperative Work & Social Computing (CSCW'15), 267–272.
[39]
Alan F. Westin. 1967. Privacy and Freedom. Atheneum, New York, NY.
[40]
Pamela Wisniewski, Bart P. Knijnenburg, and H. Richter Lipford. 2014. Profiling Facebook users' privacy behaviors. In SOUPS2014 Workshop on Privacy Personas and Segmentation. 1-6.
[41]
Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'12), 609–618.
[42]
Ralf De Wolf, Koen Willaert, and Jo Pierson. 2014. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35: 444– 454.
[43]
Heng Xu. 2011. Reframing privacy 2.0 in online social network. University of Pennsylvania Journal of Constitutional Law 14: 1077-1102.
[44]
Heng Xu, Tamara Dinev, H. Jeff Smith, and Paul Hart. 2008. Examining the formation of individual's privacy concerns: Toward an integrative view. In International Conference on Information Systems (ICIS) 2008 Proceedings, 1-16.

Cited By

View all
  • (2024)Designing the informing process with streamers and bystanders in live streamingProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696916(315-332)Online publication date: 12-Aug-2024
  • (2024)Let me quickly share it - Time Pressure when Sharing on Social MediaProceedings of the International Conference on Mobile and Ubiquitous Multimedia10.1145/3701571.3701578(280-299)Online publication date: 1-Dec-2024
  • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
  • Show More Cited By
  1. Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '16: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing
    February 2016
    1866 pages
    ISBN:9781450335928
    DOI:10.1145/2818048
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 February 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Collaborative privacy practice
    2. Networked privacy management
    3. Privacy
    4. Social computing
    5. Social network service

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSCW '16
    Sponsor:
    CSCW '16: Computer Supported Cooperative Work and Social Computing
    February 27 - March 2, 2016
    California, San Francisco, USA

    Acceptance Rates

    CSCW '16 Paper Acceptance Rate 142 of 571 submissions, 25%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)63
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Designing the informing process with streamers and bystanders in live streamingProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696916(315-332)Online publication date: 12-Aug-2024
    • (2024)Let me quickly share it - Time Pressure when Sharing on Social MediaProceedings of the International Conference on Mobile and Ubiquitous Multimedia10.1145/3701571.3701578(280-299)Online publication date: 1-Dec-2024
    • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
    • (2024)Collective Privacy Sensemaking on Social Media about Period and Fertility Tracking post Roe v. WadeProceedings of the ACM on Human-Computer Interaction10.1145/36410008:CSCW1(1-35)Online publication date: 26-Apr-2024
    • (2024)Cross-Country Examination of People’s Experience with Targeted Advertising on Social MediaExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3650780(1-10)Online publication date: 11-May-2024
    • (2024)Self-Efficacy and Security Behavior: Results from a Systematic Review of Research MethodsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642432(1-32)Online publication date: 11-May-2024
    • (2024)Feeling Safer Than Peers: Influence of Privacy-related Perceptions and Parental Mediation on Teen Tiktok Users’ Comparative Optimism about Privacy RisksJournal of Broadcasting & Electronic Media10.1080/08838151.2024.240754168:5(758-777)Online publication date: 17-Oct-2024
    • (2023)A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on TwitterProceedings of the ACM on Human-Computer Interaction10.1145/36100457:CSCW2(1-40)Online publication date: 4-Oct-2023
    • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
    • (2023)Do Streamers Care about Bystanders' Privacy? An Examination of Live Streamers' Considerations and Strategies for Bystanders' Privacy ManagementProceedings of the ACM on Human-Computer Interaction10.1145/35796037:CSCW1(1-29)Online publication date: 16-Apr-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media