Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries

F. Asiri, D. Millard
{"title":"Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries","authors":"F. Asiri, D. Millard","doi":"10.1109/NCG.2018.8593046","DOIUrl":null,"url":null,"abstract":"With the emergence of Social Networking Sites (SNSs), privacy management has been a great area of concern for SNSs’ population. Moreover, most of the studies reach contradictory findings regarding how people regulate their online privacy. This lack of clarity around behaviours and attitudes makes creating legislation and designing new systems to protect privacy challenging. Communication Privacy Management theory (developed in the context of fact-to-face interactions) suggests that when communicating people manage a complex set of imaginary boundaries, and use a variety of strategies to enforce them. In this paper, we explore to what extent this has been observed in online behaviour. Consequently, this paper presents a broad review of the literature published between 2003-2017 relating to privacy protection strategies. This reveals 10 distinct strategies: 5 technological and 5 social. It also reveals a strong bias towards Facebook, and a majority American or European context. Our findings suggest that previous work may have overlooked some of the strategies, even in the technological category, and that may explain the behavioural discrepancies observed. It also indicates that more needs to be done to understand privacy behaviour on a wider set of platforms, and with a broader cultural context","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st Saudi Computer Society National Computer Conference (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCG.2018.8593046","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the emergence of Social Networking Sites (SNSs), privacy management has been a great area of concern for SNSs’ population. Moreover, most of the studies reach contradictory findings regarding how people regulate their online privacy. This lack of clarity around behaviours and attitudes makes creating legislation and designing new systems to protect privacy challenging. Communication Privacy Management theory (developed in the context of fact-to-face interactions) suggests that when communicating people manage a complex set of imaginary boundaries, and use a variety of strategies to enforce them. In this paper, we explore to what extent this has been observed in online behaviour. Consequently, this paper presents a broad review of the literature published between 2003-2017 relating to privacy protection strategies. This reveals 10 distinct strategies: 5 technological and 5 social. It also reveals a strong bias towards Facebook, and a majority American or European context. Our findings suggest that previous work may have overlooked some of the strategies, even in the technological category, and that may explain the behavioural discrepancies observed. It also indicates that more needs to be done to understand privacy behaviour on a wider set of platforms, and with a broader cultural context
社交网络中的隐私实践:用户加强隐私边界的保护策略
随着社交网站(sns)的出现,隐私管理已经成为社交网站用户关注的一个重要领域。此外,关于人们如何管理自己的网络隐私,大多数研究得出了相互矛盾的结果。行为和态度缺乏明确性,使得制定保护隐私的立法和设计新系统具有挑战性。通信隐私管理理论(在事实-面对面交互的背景下发展起来的)表明,在沟通时,人们管理一组复杂的想象边界,并使用各种策略来执行它们。在本文中,我们探讨了这种情况在网络行为中观察到的程度。因此,本文对2003-2017年间发表的有关隐私保护策略的文献进行了广泛的回顾。这揭示了10种不同的策略:5种技术策略和5种社交策略。它还揭示了对Facebook的强烈偏见,以及大多数美国或欧洲人的背景。我们的研究结果表明,以前的工作可能忽略了一些策略,甚至在技术范畴,这可能解释了观察到的行为差异。这也表明,在更广泛的平台和更广泛的文化背景下,需要做更多的工作来了解隐私行为
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信