skip to main content
10.1145/2335356.2335373acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

+Your circles: sharing behavior on Google+

Published:11 July 2012Publication History

ABSTRACT

Users are sharing and consuming enormous amounts of information through online social network interaction every day. Yet, many users struggle to control what they share to their overlapping social spheres. Google+ introduces circles, a mechanism that enables users to group friends and use these groups to control their social network feeds and posts. We present the results of a qualitative interview study on the sharing perceptions and behavior of 27 Google+ users. These results indicate that many users have a clear understanding of circles, using them to target information to those most interested in it. Yet, despite these positive perceptions, there is only moderate use of circles to control information flow. We explore reasons and risks associated with these behaviors and provide insight on the impact and open questions of this privacy mechanism.

References

  1. I. Altman. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole Pub. Co, Monterey, Calif, 1975.Google ScholarGoogle Scholar
  2. A. Besmer and H. Lipford. Tagged photos: Concerns, perceptions, and protections. In Proceedings of the 27th international conference extended abstracts on Human factors in computing systems, CHI EA '09, pages 4585--4590, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. d. boyd. Friends, friendsters, and myspace top 8: Writing community into being on social network sites. First Monday, 11(2), 2006.Google ScholarGoogle Scholar
  4. d. boyd and N. B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1):210, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Egelman, A. Oates, and S. Krishnamurthi. Oops, I did it again: Mitigating repeated access control errors on Facebook. In Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pages 2295--2304, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. B. Ellison, C. Lampe, C. Steinfield, and J. Vitak. With a little help from my friends: How social network sites affect social capital processes. In A networked self: Identity, community and culture on social network sites, pages 124--145. Routledge, New York, NY, USA, 2010.Google ScholarGoogle Scholar
  7. S. Jones and E. O'Neill. Feasibility of structural network clustering for group-based privacy control in social networks. In Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pages 9:1--9:13, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Kairam, M. Brzozowski, D. Huffaker, and E. Chi. Talking in circles: Selective sharing in Google+. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pages 1065--1074, Austin, TX, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Karr-Wisniewski, D. Wilson, and H. Richter-Lipford. A new social order: Mechanisms for social network site boundary regulation. In AMCIS 2011 Proceedings, AMCIS '11, page 9, Aug. 2011.Google ScholarGoogle Scholar
  10. P. G. Kelley, R. Brewer, Y. Mayer, L. F. Cranor, and N. Sadeh. An investigation into Facebook friend grouping. In Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III, INTERACT'11, pages 216--233, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Lampinen, S. Tamminen, and A. Oulasvirta. All my people right here, right now: management of group co-presence on a social networking site. In Proceedings of the ACM 2009 international conference on Supporting group work, GROUP '09, pages 281--290, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Nissenbaum. Privacy as contextual integrity. Washington Law Review, 79(1), 2004.Google ScholarGoogle Scholar
  13. J. S. Olson, J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In CHI '05 extended abstracts on Human factors in computing systems, CHI EA '05, pages 1985--1988, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Patil and J. Lai. Who gets to know what when: Configuring privacy permissions in an awareness application. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI '05, pages 101--110, Portland, Oregon, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Richter, A. Besmer, and J. Watson. Understanding privacy settings in Facebook with an audience view. In Proceedings of the 1st Conference on Usability Psychology and Security, UPSEC '08, San Francisco, CA USA, Apr. 2008. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Strater and H. Richter. Examining privacy and disclosure in a social networking community. In Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pages 157--158, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. Stutzman and W. Hartzog. Boundary regulation in social media. In Proceedings of ACM Conference on Computer Supported Cooperative Work, CSCW '12, pages 769--778, Seattle, Washington, United States, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Z. Tufekci. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1):20--36, Feb. 2008.Google ScholarGoogle Scholar
  19. Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor. "I regretted the minute I pressed share": A qualitative study of regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, pages 10:1--10:16, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Wisniewski, H. Lipford, and D. Wilson. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pages 609--618, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. +Your circles: sharing behavior on Google+

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
      July 2012
      216 pages
      ISBN:9781450315326
      DOI:10.1145/2335356

      Copyright © 2012 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 July 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of49submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader