ABSTRACT
In the age of the internet, the ability to fully control online information about oneself is no longer possible; once information is online, it is easily disseminated and quickly becomes part of the internet archive. In this paper, we explore data from a set of in-person questionnaires and contextual interviews with both searchers and searched individuals and an additional data set from an online survey of internet users to identify strategies for vetting, managing, and interpreting content online. We see a desire for agency, a contextualization of information based on social context and temporal context, and a desire to constrain the exploration of online content to a relevant subset of information when searching others, i.e. a desire for selectiveness. We offer an evocative design sketch to highlight these issues and foster a discussion of emerging socio-cultural norms around online search behavior.
- Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy enhancing technologies, Springer, 36--58. http://doi.org/10.1007/11957454_3 Google ScholarDigital Library
- Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Communications of the ACM 42, 12: 40--46. http://doi.org/10.1145/322796.322806 Google ScholarDigital Library
- Oshrat Ayalon and Eran Toch. 2013. Retrospective Privacy: Managing Longitudinal Privacy in Online Social Networks. Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM, 4:1--4:13. http://doi.org/10.1145/2501604.2501608 Google ScholarDigital Library
- J. Ball. 2014. EU's right to be forgotten: Guardian articles have been hidden by Google, The Guardian, http://www.theguardian.com/commentisfree/2014/jul/0 2/eu-right-to-be-forgotten-guardian-googleGoogle Scholar
- Andy Beal and Judy Strauss. 2009. Radically transparent: Monitoring and managing reputations online. John Wiley & Sons. Google ScholarDigital Library
- Richard Berendsen, Bogomil Kovachev, EvangeliaParaskevi Nastou, Maarten de Rijke, and Wouter Weerkamp. 2012. Result Disambiguation in Web People Search. In Advances in Information Retrieval, Ricardo Baeza-Yates, Arjen P. de Vries, Hugo Zaragoza, et al. (eds.). Springer Berlin Heidelberg, 146--157. Google ScholarDigital Library
- Bettina Berendt, Oliver Günther, and Sarah Spiekermann. 2005. Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM 48, 4: 101--106. Google ScholarDigital Library
- Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced Confidences Privacy and the Control Paradox. Social Psychological and Personality Science 4, 3: 340--347. http://doi.org/10.1177/1948550612455931Google ScholarCross Ref
- Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, and Kevin Borders. 2008. Social Networks and Context-aware Spam. Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, ACM, 403--412. http://doi.org/10.1145/1460563.1460628 Google ScholarDigital Library
- Bill Buxton. 2010. Sketching user experiences: getting the design right and the right design: getting the design right and the right design. Morgan Kaufmann. Google ScholarDigital Library
- Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why, when, & What People Want to Share. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 81--90. http://doi.org/10.1145/1054972.1054985 Google ScholarDigital Library
- Gregory Conti. 2008. Could Googling Take Down a President? Commun. ACM 51, 1: 71--73. http://doi.org/10.1145/1327452.1327485 Google ScholarDigital Library
- Gregory Conti and Edward Sobiesk. 2007. An Honest Man Has Nothing to Fear: User Perceptions on Webbased Information Disclosure. Proceedings of the 3rd Symposium on Usable Privacy and Security, ACM, 112--121. http://doi.org/10.1145/1280680.1280695 Google ScholarDigital Library
- Juliet M. Corbin and Anselm Strauss. 1990. Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative sociology 13, 1: 3--21.Google Scholar
- Joan Morris DiMicco and David R. Millen. 2007. Identity Management: Multiple Presentations of Self in Facebook. Proceedings of the 2007 International ACM Conference on Supporting Group Work, ACM, 383--386. http://doi.org/10.1145/1316624.1316682 Google ScholarDigital Library
- Paul Dourish and Ken Anderson. 2006. Collective Information Practice: Emploring Privacy and Security As Social and Cultural Phenomena. Hum.-Comput. Interact. 21, 3: 319--342. http://doi.org/10.1207/s15327051hci2103_2 Google ScholarDigital Library
- Dinei Florencio and Cormac Herley. 2007. A Largescale Study of Web Password Habits. Proceedings of the 16th International Conference on World Wide Web, ACM, 657--666. http://doi.org/10.1145/1242572.1242661 Google ScholarDigital Library
- Batya Friedman, David Hurley, Daniel C. Howe, Edward Felten, and Helen Nissenbaum. 2002. Users' conceptions of web security: a comparative study. CHI'02 extended abstracts on Human factors in computing systems, ACM, 746--747. Google ScholarDigital Library
- Ralph Gross and Alessandro Acquisti. 2005. Information Revelation and Privacy in Online Social Networks. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, ACM, 71--80. http://doi.org/10.1145/1102199.1102214 Google ScholarDigital Library
- Ido Guy, Sigalit Ur, Inbal Ronen, Sara Weber, and Tolga Oral. 2012. Best Faces Forward: A Large-scale Study of People Search in the Enterprise. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 1775--1784. http://doi.org/10.1145/2207676.2208310 Google ScholarDigital Library
- Adam N. Joinson, Ulf-Dietrich Reips, Tom Buchanan, and Carina B. Paine Schofield. 2010. Privacy, trust, and self-disclosure online. Human-Computer Interaction 25, 1: 1--24.Google ScholarCross Ref
- Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My Data Just Goes Everywhere:" User Mental Models of the Internet and Implications for Privacy and Security. 39--52.Google Scholar
- Predrag Klasnja, Sunny Consolvo, Jaeyeon Jung, et al. 2009. When i am on wi-fi, i am fearless: privacy concerns & practices in eeryday wi-fi use. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 1993--2002. Google ScholarDigital Library
- Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Preference-based Location Sharing: Are More Privacy Options Really Better? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2667--2676. http://doi.org/10.1145/2470654.2481369 Google ScholarDigital Library
- Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12: 1144--1162. http://doi.org/10.1016/j.ijhcs.2013.06.003 Google ScholarDigital Library
- Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing Privacy in Online Social Networks. Proceedings of the First Workshop on Online Social Networks, ACM, 37--42. http://doi.org/10.1145/1397735.1397744 Google ScholarDigital Library
- Balachander Krishnamurthy and Craig E. Wills. 2009. On the Leakage of Personally Identifiable Information via Online Social Networks. Proceedings of the 2Nd ACM Workshop on Online Social Networks, ACM, 7--12. http://doi.org/10.1145/1592665.1592668 Google ScholarDigital Library
- Sebastian Labitzke, Irina Taranu, and Hannes Hartenstein. 2011. What your friends tell others about you: Low cost linkability of social network profiles. Proc. 5th International ACM Workshop on Social Network Mining and Analysis, San Diego, CA, USA.Google Scholar
- Cliff A.C. Lampe, Nicole Ellison, and Charles Steinfield. 2007. A Familiar Face(Book): Profile Elements As Signals in an Online Social Network. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 435--444. http://doi.org/10.1145/1240624.1240695 Google ScholarDigital Library
- Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We'Re in It Together: Interpersonal Management of Disclosure in Social Network Services. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 3217--3226. http://doi.org/10.1145/1978942.1979420 Google ScholarDigital Library
- Catherine C. Marshall and Siân E. Lindley. 2014. Searching for Myself: Motivations and Strategies for Self-search. Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, ACM, 3675--3684. http://doi.org/10.1145/2556288.2557356 Google ScholarDigital Library
- Antony Mayfield. 2010. Me and My Web Shadow: How to Manage Your Reputation Online. A&C Black. Google ScholarDigital Library
- A. Morton and M.A. Sasse. 2014. Desperately seeking assurances: Segmenting users by their informationseeking preferences. 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST), 102--111. http://doi.org/10.1109/PST.2014.6890929Google ScholarCross Ref
- Paul Newland, James A. Powell, and Chris Creed. 1987. Understanding architectural designers' selective information handling. Design Studies 8, 1: 2--16.Google ScholarCross Ref
- Judith S. Olson, Jonathan Grudin, and Eric Horvitz. 2005. A Study of Preferences for Sharing and Privacy. CHI '05 Extended Abstracts on Human Factors in Computing Systems, ACM, 1985--1988. http://doi.org/10.1145/1056808.1057073 Google ScholarDigital Library
- Kim Bartel Sheehan. 2002. Toward a typology of Internet users and online privacy concerns. The Information Society 18, 1: 2--32.Google ScholarCross Ref
- Colleen Swanson, Ruth Urner, and Edward Lank. 2010. Naïve Security in a Wi-Fi World. In Trust Management IV. Springer, 32--47. Retrieved January 12, 2016 from http://link.springer.com/chapter/10.1007/978-3-64213446-3_3Google Scholar
- Wouter Weerkamp, Richard Berendsen, Bogomil Kovachev, Edgar Meij, Krisztian Balog, and Maarten de Rijke. 2011. People Searching for People: Analysis of a People Search Engine Log. Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, 45--54. http://doi.org/10.1145/2009916.2009927 Google ScholarDigital Library
- Allison Woodruff. 2014. Necessary, Unpleasant, and Disempowering: Reputation Management in the Internet Age. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 149--158. http://doi.org/10.1145/2556288.2557126 Google ScholarDigital Library
- 2009. When all video all. BBC. Retrieved January 15, 2016 from http://news.bbc.co.uk/2/hi/uk_news/magazine/8010098 .stmGoogle Scholar
- 2016. Sousveillance. Wikipedia, the free encyclopedia. Retrieved January 15, 2016 from https://en.wikipedia.org/w/index.php?title=Sousveillan ce&oldid=698556497Google Scholar
- MIT web site gathers and displays information on government. MIT News. Retrieved January 15, 2016 from http://news.mit.edu/2003/giaGoogle Scholar
- Reputation Management Consultants. www.reputationmanagementconsultants.comGoogle Scholar
- Reputation.com. www.reputation.comGoogle Scholar
- Streisand effect. http://en.wikipedia.org/wiki/Streisand_effectGoogle Scholar
- The Right to be Forgotten, European Court of Justice Ruling, Costeja vs Google, (2014). http://ec.europa.eu/justice/data-protection/files/ factsheets/factsheet_data_protection_en.pdfGoogle Scholar
- XKCD Comic on Password Strength (https://xkcd.com/936/)Google Scholar
Index Terms
- People Searched by People: Context-Based Selectiveness in Online Search
Recommendations
Buyers' Choice of Online Search Strategy and Its Managerial Implications
The Internet offers several tools such as shopping bots and search engines that help potential buyers search for lower prices. This paper defines buyers' online search strategy as using one or more of these tools to search for lower prices, and ...
How people recall, recognize, and reuse search results
When a person issues a query, that person has expectations about the search results that will be returned. These expectations can be based on the current information need, but are also influenced by how the searcher believes the search engine works, ...
Comments