skip to main content
10.1145/2207676.2207761acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Fighting for my space: coping mechanisms for sns boundary regulation

Authors Info & Claims
Published:05 May 2012Publication History

ABSTRACT

Sharing information online via social network sites (SNSs) is at an all-time high, yet research shows that users often exhibit a marked dissatisfaction in using such sites. A compelling explanation for this dichotomy is that users are struggling against their SNS environment in an effort to achieve their preferred levels of privacy for regulating social interactions. Our research investigates users' SNS boundary regulation behavior. This paper presents results from a qualitative interview-based study to identify "coping mechanisms" that users devise outside explicit boundary-regulation interface features in order to manage interpersonal boundaries. Our categorization of such mechanisms provides insight into interaction design issues and opportunities for new SNS features.

References

  1. Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Springer Berlin / Heidelberg, (2006).Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Agosto, D. E. Bounded Rationality and Satisficing in Young People's Web-Based Decision Making. Journal of American Society for Information Science and Technology 53, 1, (2002), 16--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Altman, I. The environment and social behavior. Brooks/Cole Monterey, CA, (1975).Google ScholarGoogle Scholar
  4. Babbie, E. The Practice of Social Research. Wadsworth Publishing Company, Belmont, CA., (2004).Google ScholarGoogle Scholar
  5. Besmer, A. and Lipford, H. R. Moving beyond untagging: photo privacy in a tagged world. Proceedings of the 28th international conference on Human factors in computing systems, Atlanta, Georgia, USA, ACM. (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Debatin, B., Lovejoy, J. P., Horn, A.-K. and Hughes, B. N. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication 15, 1, (2009), 83--108.Google ScholarGoogle ScholarCross RefCross Ref
  7. Ellison, N. B., Vitak, J., Steinfield, C., Gray, R. and Lampe, C. (In press). Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environments.Google ScholarGoogle Scholar
  8. Gross, R. and Acquisti, A. Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA, USA, ACM. (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Horney, K. Our Inner Conflicts: A Constructive Theory of Neurosis. W. W. Norton & Company Inc, New York, (1945).Google ScholarGoogle Scholar
  10. Karr-Wisniewski, P., Lipford, H. and Wilson, D. (2011). A New Social Order: Mechanisms for Social Network Site Boundary Regulation. Americas Conference on Information Systems. Detroit, MI.Google ScholarGoogle Scholar
  11. Katherine, A. Boundaries: Where You End and I Begin. MJF Books Hazelden Foundation, (1991).Google ScholarGoogle Scholar
  12. Lampinen, A., Lehtinen, V., A., L. and Tamminen, S. We're in It Together: Interpersonal Management of Disclosure in Social Network Services. CHI'11 Proceedings of the annual conference on Human factors in computing systems, Vancouver, BC. (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lipford, H. R., Besmer, A. and Watson, J. Understanding Privacy Settings in Facebook with an Audience View. Usability, Psychology, and Security 2008 (UPSEC 2008), Berkeley, CA. (2008 ). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Matyszczyk, C. (2010). Zuckerberg: I know that people don't want privacy. Retrieved February 21, 2011, from http://news.cnet.com/8301-17852_310431741-html?tag=digg2.Google ScholarGoogle Scholar
  15. Milgram, S. The experience of living in cities. Science 167, (1970), 1461--1468.Google ScholarGoogle ScholarCross RefCross Ref
  16. Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. Proceedings of the SIGCHI conference on Human factors in computing systems, Ft. Lauderdale, Florida, USA, ACM. (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Petronio, S. Boundaries of privacy: dialectics of disclosure. SUNY Press, (2002).Google ScholarGoogle Scholar
  18. Simon, H. A. A Behavioral Model of Rational Choice. Quarterly Journal of Economics 69, 1, (1955), 99--118.Google ScholarGoogle ScholarCross RefCross Ref
  19. Strauss, A. L. and Corbin, J. M. Basics of qualitative research: techniques and procedures for developing grounded theory. Sage Publications, (1998).Google ScholarGoogle Scholar
  20. Stutzman, F. and Hartzog, W. Boundary Regulation in Social Media. AOIR 2009, Milwaukee, WI. (2009).Google ScholarGoogle Scholar
  21. Tufekci, Z. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society 28, 1, (2008), 20--36.Google ScholarGoogle Scholar
  22. Tyma, A. Rules of Interchange: Privacy in Online Social Communities - A Rhetorical Critique of MySpace. Com. JCSTAND, (2007), 31--31.Google ScholarGoogle Scholar
  23. Xu, H., Reddy, M. and Zhang, X. L. Collaborative Privacy Practices in Social Media. The 2011 ACM Conference on Computer Supported Cooperative Work, Hangzhou, China. (2011).Google ScholarGoogle Scholar

Index Terms

  1. Fighting for my space: coping mechanisms for sns boundary regulation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      May 2012
      3276 pages
      ISBN:9781450310154
      DOI:10.1145/2207676

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 May 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader