skip to main content
10.1145/2901790.2901853acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
research-article

People Searched by People: Context-Based Selectiveness in Online Search

Published:04 June 2016Publication History

ABSTRACT

In the age of the internet, the ability to fully control online information about oneself is no longer possible; once information is online, it is easily disseminated and quickly becomes part of the internet archive. In this paper, we explore data from a set of in-person questionnaires and contextual interviews with both searchers and searched individuals and an additional data set from an online survey of internet users to identify strategies for vetting, managing, and interpreting content online. We see a desire for agency, a contextualization of information based on social context and temporal context, and a desire to constrain the exploration of online content to a relevant subset of information when searching others, i.e. a desire for selectiveness. We offer an evocative design sketch to highlight these issues and foster a discussion of emerging socio-cultural norms around online search behavior.

References

  1. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy enhancing technologies, Springer, 36--58. http://doi.org/10.1007/11957454_3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Communications of the ACM 42, 12: 40--46. http://doi.org/10.1145/322796.322806 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Oshrat Ayalon and Eran Toch. 2013. Retrospective Privacy: Managing Longitudinal Privacy in Online Social Networks. Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM, 4:1--4:13. http://doi.org/10.1145/2501604.2501608 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Ball. 2014. EU's right to be forgotten: Guardian articles have been hidden by Google, The Guardian, http://www.theguardian.com/commentisfree/2014/jul/0 2/eu-right-to-be-forgotten-guardian-googleGoogle ScholarGoogle Scholar
  5. Andy Beal and Judy Strauss. 2009. Radically transparent: Monitoring and managing reputations online. John Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Richard Berendsen, Bogomil Kovachev, EvangeliaParaskevi Nastou, Maarten de Rijke, and Wouter Weerkamp. 2012. Result Disambiguation in Web People Search. In Advances in Information Retrieval, Ricardo Baeza-Yates, Arjen P. de Vries, Hugo Zaragoza, et al. (eds.). Springer Berlin Heidelberg, 146--157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bettina Berendt, Oliver Günther, and Sarah Spiekermann. 2005. Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM 48, 4: 101--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced Confidences Privacy and the Control Paradox. Social Psychological and Personality Science 4, 3: 340--347. http://doi.org/10.1177/1948550612455931Google ScholarGoogle ScholarCross RefCross Ref
  9. Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, and Kevin Borders. 2008. Social Networks and Context-aware Spam. Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, ACM, 403--412. http://doi.org/10.1145/1460563.1460628 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bill Buxton. 2010. Sketching user experiences: getting the design right and the right design: getting the design right and the right design. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why, when, & What People Want to Share. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 81--90. http://doi.org/10.1145/1054972.1054985 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Gregory Conti. 2008. Could Googling Take Down a President? Commun. ACM 51, 1: 71--73. http://doi.org/10.1145/1327452.1327485 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gregory Conti and Edward Sobiesk. 2007. An Honest Man Has Nothing to Fear: User Perceptions on Webbased Information Disclosure. Proceedings of the 3rd Symposium on Usable Privacy and Security, ACM, 112--121. http://doi.org/10.1145/1280680.1280695 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Juliet M. Corbin and Anselm Strauss. 1990. Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative sociology 13, 1: 3--21.Google ScholarGoogle Scholar
  15. Joan Morris DiMicco and David R. Millen. 2007. Identity Management: Multiple Presentations of Self in Facebook. Proceedings of the 2007 International ACM Conference on Supporting Group Work, ACM, 383--386. http://doi.org/10.1145/1316624.1316682 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Paul Dourish and Ken Anderson. 2006. Collective Information Practice: Emploring Privacy and Security As Social and Cultural Phenomena. Hum.-Comput. Interact. 21, 3: 319--342. http://doi.org/10.1207/s15327051hci2103_2 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Dinei Florencio and Cormac Herley. 2007. A Largescale Study of Web Password Habits. Proceedings of the 16th International Conference on World Wide Web, ACM, 657--666. http://doi.org/10.1145/1242572.1242661 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Batya Friedman, David Hurley, Daniel C. Howe, Edward Felten, and Helen Nissenbaum. 2002. Users' conceptions of web security: a comparative study. CHI'02 extended abstracts on Human factors in computing systems, ACM, 746--747. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ralph Gross and Alessandro Acquisti. 2005. Information Revelation and Privacy in Online Social Networks. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, ACM, 71--80. http://doi.org/10.1145/1102199.1102214 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ido Guy, Sigalit Ur, Inbal Ronen, Sara Weber, and Tolga Oral. 2012. Best Faces Forward: A Large-scale Study of People Search in the Enterprise. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 1775--1784. http://doi.org/10.1145/2207676.2208310 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Adam N. Joinson, Ulf-Dietrich Reips, Tom Buchanan, and Carina B. Paine Schofield. 2010. Privacy, trust, and self-disclosure online. Human-Computer Interaction 25, 1: 1--24.Google ScholarGoogle ScholarCross RefCross Ref
  22. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My Data Just Goes Everywhere:" User Mental Models of the Internet and Implications for Privacy and Security. 39--52.Google ScholarGoogle Scholar
  23. Predrag Klasnja, Sunny Consolvo, Jaeyeon Jung, et al. 2009. When i am on wi-fi, i am fearless: privacy concerns & practices in eeryday wi-fi use. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 1993--2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Preference-based Location Sharing: Are More Privacy Options Really Better? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2667--2676. http://doi.org/10.1145/2470654.2481369 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12: 1144--1162. http://doi.org/10.1016/j.ijhcs.2013.06.003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing Privacy in Online Social Networks. Proceedings of the First Workshop on Online Social Networks, ACM, 37--42. http://doi.org/10.1145/1397735.1397744 Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Balachander Krishnamurthy and Craig E. Wills. 2009. On the Leakage of Personally Identifiable Information via Online Social Networks. Proceedings of the 2Nd ACM Workshop on Online Social Networks, ACM, 7--12. http://doi.org/10.1145/1592665.1592668 Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sebastian Labitzke, Irina Taranu, and Hannes Hartenstein. 2011. What your friends tell others about you: Low cost linkability of social network profiles. Proc. 5th International ACM Workshop on Social Network Mining and Analysis, San Diego, CA, USA.Google ScholarGoogle Scholar
  29. Cliff A.C. Lampe, Nicole Ellison, and Charles Steinfield. 2007. A Familiar Face(Book): Profile Elements As Signals in an Online Social Network. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 435--444. http://doi.org/10.1145/1240624.1240695 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We'Re in It Together: Interpersonal Management of Disclosure in Social Network Services. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 3217--3226. http://doi.org/10.1145/1978942.1979420 Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Catherine C. Marshall and Siân E. Lindley. 2014. Searching for Myself: Motivations and Strategies for Self-search. Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, ACM, 3675--3684. http://doi.org/10.1145/2556288.2557356 Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Antony Mayfield. 2010. Me and My Web Shadow: How to Manage Your Reputation Online. A&C Black. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. A. Morton and M.A. Sasse. 2014. Desperately seeking assurances: Segmenting users by their informationseeking preferences. 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST), 102--111. http://doi.org/10.1109/PST.2014.6890929Google ScholarGoogle ScholarCross RefCross Ref
  34. Paul Newland, James A. Powell, and Chris Creed. 1987. Understanding architectural designers' selective information handling. Design Studies 8, 1: 2--16.Google ScholarGoogle ScholarCross RefCross Ref
  35. Judith S. Olson, Jonathan Grudin, and Eric Horvitz. 2005. A Study of Preferences for Sharing and Privacy. CHI '05 Extended Abstracts on Human Factors in Computing Systems, ACM, 1985--1988. http://doi.org/10.1145/1056808.1057073 Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Kim Bartel Sheehan. 2002. Toward a typology of Internet users and online privacy concerns. The Information Society 18, 1: 2--32.Google ScholarGoogle ScholarCross RefCross Ref
  37. Colleen Swanson, Ruth Urner, and Edward Lank. 2010. Naïve Security in a Wi-Fi World. In Trust Management IV. Springer, 32--47. Retrieved January 12, 2016 from http://link.springer.com/chapter/10.1007/978-3-64213446-3_3Google ScholarGoogle Scholar
  38. Wouter Weerkamp, Richard Berendsen, Bogomil Kovachev, Edgar Meij, Krisztian Balog, and Maarten de Rijke. 2011. People Searching for People: Analysis of a People Search Engine Log. Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, 45--54. http://doi.org/10.1145/2009916.2009927 Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Allison Woodruff. 2014. Necessary, Unpleasant, and Disempowering: Reputation Management in the Internet Age. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 149--158. http://doi.org/10.1145/2556288.2557126 Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. 2009. When all video all. BBC. Retrieved January 15, 2016 from http://news.bbc.co.uk/2/hi/uk_news/magazine/8010098 .stmGoogle ScholarGoogle Scholar
  41. 2016. Sousveillance. Wikipedia, the free encyclopedia. Retrieved January 15, 2016 from https://en.wikipedia.org/w/index.php?title=Sousveillan ce&oldid=698556497Google ScholarGoogle Scholar
  42. MIT web site gathers and displays information on government. MIT News. Retrieved January 15, 2016 from http://news.mit.edu/2003/giaGoogle ScholarGoogle Scholar
  43. Reputation Management Consultants. www.reputationmanagementconsultants.comGoogle ScholarGoogle Scholar
  44. Reputation.com. www.reputation.comGoogle ScholarGoogle Scholar
  45. Streisand effect. http://en.wikipedia.org/wiki/Streisand_effectGoogle ScholarGoogle Scholar
  46. The Right to be Forgotten, European Court of Justice Ruling, Costeja vs Google, (2014). http://ec.europa.eu/justice/data-protection/files/ factsheets/factsheet_data_protection_en.pdfGoogle ScholarGoogle Scholar
  47. XKCD Comic on Password Strength (https://xkcd.com/936/)Google ScholarGoogle Scholar

Index Terms

  1. People Searched by People: Context-Based Selectiveness in Online Search

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      DIS '16: Proceedings of the 2016 ACM Conference on Designing Interactive Systems
      June 2016
      1374 pages
      ISBN:9781450340311
      DOI:10.1145/2901790

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 June 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      DIS '16 Paper Acceptance Rate107of418submissions,26%Overall Acceptance Rate1,158of4,684submissions,25%

      Upcoming Conference

      DIS '24
      Designing Interactive Systems Conference
      July 1 - 5, 2024
      IT University of Copenhagen , Denmark

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader