View
2.520
Download
0
Category
Preview:
DESCRIPTION
Fred Stutzman and Woodrow Hartzog, UNC-Chapel HillThis research explore the creations and use of multiple profiles on a social media site as a communication boundary regulation mechanism. Utilizing grounded methods to analyze twenty theoretically-derived, semi-structured interviews, we identified three methods of boundary regulation: Two or more profiles on one site, use of privacy mechanisms to create functionally different audience zones, and the use of different social media tools for different audiences. Three types of boundary regulation in social media were identified. The first type, pseudonymity, was comprised of individuals who kept their identities private and unlinked. Practical obscurity, the second type, covered a majority of individuals studied. Individuals who utilize practical obscurity did not necessarily engage in concealment of identity, but they did not actively link between identities. Finally, those utilizing transparent separations created multiple, interlined identities largely for utility purposes. Our analysis of boundary regulation behavior identified four motives: Privacy, identity, utility and propriety. We hypothesize that individual motivational emphasis may predict the type of boundary regulation adopted. Finally, we evaluate boundary regulation for self-reported measures of efficacy and burden. We find mixed results; Level of technical skill or understanding may mediate efficacy, and size of friend network may mediate perceptions of burden.
Citation preview
Fred Stutzman and Woodrow Hartzog
School of Information and Library ScienceSchool of Journalism and Mass Communication
UNC-Chapel Hill
Boundary Regulation in Social Media
(Lenhart 2009)
Fred Stutzman, fred.stutzman@unc.edu
ContextPrivacy
Disclosure
Fred Stutzman, fred.stutzman@unc.edu
Managing Contexts
• Friendster
• “Burners, gay men and bloggers”
• Myspace
• Teens and mirror profiles
(boyd, 2006 & 2007) http://www.flickr.com/photos/foxgrrl/3676857198/
Fred Stutzman, fred.stutzman@unc.edu
Managing Contexts
• Presence of multiple social groups
• Behavioral Strategies
• Mental Strategies
• “Least Common Denominator”
(Lampinen et. al., 2009)
http://bit.ly/yS8yI
Fred Stutzman, fred.stutzman@unc.edu
Context Tension• Connections across
status and power boundaries
• Propriety, work/family
• Inadvertent disclosures leading to harms
(Skeels and Grudin, 2009)
http://bit.ly/6HTDB
Fred Stutzman, fred.stutzman@unc.edu
Conceptions of Privacy
• Privacy as selective control (Altman, 1975)
• Privacy as information practice (Dourish & Anderson, 2006)
• Privacy as boundary management (Petronio, 2002)
Fred Stutzman, fred.stutzman@unc.edu
CPM
• Communications Privacy Management
• Rule Development
• Boundary Coordination
• Boundary Turbulence
(Petronio, 2002)
Fred Stutzman, fred.stutzman@unc.edu
Study Goals
• Why are motives for using multiple profiles?
• What strategies to people employ in managing multiple profiles?
• Is this an effective strategy?
Fred Stutzman, fred.stutzman@unc.edu
Method
• Criteria: multiple profiles on one social media site
• Twenty in-depth interviews, Summer 2009
• In-person/phone/Skype
• Analyzed using grounded theory
Fred Stutzman, fred.stutzman@unc.edu
Respondents• Six in their 20’s, Seven
in their 30’s, Six in their 40’s, and one was 57
• Twelve females, eight males
• Respondents from US (NC, VA, GA, CA, FL) and UK
Fred Stutzman, fred.stutzman@unc.edu
Motives
•Privacy
•Identity
•Utility
•Proprietyhttp://www.flickr.com/photos/gi/435888435/
Fred Stutzman, fred.stutzman@unc.edu
Privacy• Control of access to the self;
withdrawal from public domain
• Safety
• Confidentiality
“I know some young kids who tweeted ‘I’m going to lunch at so and so’ and they came back to their apartment and they had been robbed...”
Fred Stutzman, fred.stutzman@unc.edu
Privacy
• For many respondents, multiple profiles:
• Functioned as shield, protecting identifiable information
• Enabled content production
Fred Stutzman, fred.stutzman@unc.edu
Identity
• Multiple profiles allowed for establishment of distinct identities (personal/professional)
[Created second Facebook profile so] “I could be all about business” [On personal profile] “could be a place where I have opinions, where I express personal stuff.”
Fred Stutzman, fred.stutzman@unc.edu
Utility• Multiple profiles enable:
• Accomplishment of promotional and collaborative goals
• Catering to specific audiences at specific times
• Not having to apologize for off-topic posts
Fred Stutzman, fred.stutzman@unc.edu
Utility• Segment volume of disclosure
• Offer differing information streams (topic/interest)
“If somebody on my personal Twitter says ‘oh gosh you are inundating me with too many updates,’ I will tell them that they can follow my public profile that I update substantially less”
Fred Stutzman, fred.stutzman@unc.edu
Propriety
• Multiple profiles used to manage conformity to norms and customs
• Befriending the boss or parent
[On the personal profile] “when my boss pops up and Facebook tells me ‘we think you should be friends,’ I don’t say yes because she’s my boss.”
Fred Stutzman, fred.stutzman@unc.edu
Forms of Regulation
• Multiple identities in a single space
• Single account, highly segmented privacy controls
• Segmentation by site
• Different social media for different audiences
Fred Stutzman, fred.stutzman@unc.edu
Axes of Regulation
• Regulation by linkage
• Regulation by concealment
http://www.flickr.com/photos/thosch66/270060125/
Fred Stutzman, fred.stutzman@unc.edu
Linkages
• Links to the identity
"I have two different identities, I have a personal one. [and] one geared towards my professional stuff, there's not much personal information there. But, I do have a separate Flickr account, I have separate Twitter accounts, I have separate Myspace pages”
Fred Stutzman, fred.stutzman@unc.edu
Linkages
• Regulation by linked interconnections
“But I don’t try and hide the fact that I’m one or the other. You know in my [personal] bio, I say something about [my business twitter]. So its not like I’m trying to hide my two different identities.”
Fred Stutzman, fred.stutzman@unc.edu
Concealment
• Three genres identified
• Pseudonymity
• Practical Obscurity
• Obscure name variants, non-disclosure of identity
• Transparent Separations
Fred Stutzman, fred.stutzman@unc.edu
Concealment
Fred Stutzman, fred.stutzman@unc.edu
Evaluation
• Do these techniques provide privacy?
“The thing going into it is I don’t put anything out there that I wouldn’t want everybody to know”
“I have to be careful about - that I say something that's generic enough”
“I’m very conscious of the fact I am basically speaking to an open mic”
Fred Stutzman, fred.stutzman@unc.edu
Evaluation
• Is the process burdensome?
• High burden: Number of accounts maintained, large number of contacts
• High burden: Degree of linkage disassociation
Fred Stutzman, fred.stutzman@unc.edu
Evaluation
• Technical strategies
• Most participants reported “bleedover”
• Segmenting by device
• Segmenting by time and location
Fred Stutzman, fred.stutzman@unc.edu
Implications
• Multiple profile maintenance consistent with the theoretical provisions of Altman and Petronio
• Process reduces potential harms, and encourages disclosures
• Represents a reaction to limitations inherent in sites
Fred Stutzman, fred.stutzman@unc.edu
Thank you!
Fred Stutzman: fred.stutzman@unc.edu@fstutzmanhttp://fredstutzman.com
Woodrow Hartzogwhartzog@email.unc.edu@hartzoghttp://ssrn.com/author=1107005
Fred Stutzman, fred.stutzman@unc.edu
Axis of Linkages
Fred Stutzman, fred.stutzman@unc.edu
Pseudonymity
Fred Stutzman, fred.stutzman@unc.edu
Practical Obscurity
Fred Stutzman, fred.stutzman@unc.edu
Transparent Separations
Recommended