Self-reflection on privacy research in social networking sites

被引:9
作者
De Wolf, Ralf [1 ,2 ]
Vanderhoven, Ellen [3 ]
Berendt, Bettina [4 ]
Pierson, Jo [1 ]
Schellens, Tammy [3 ]
机构
[1] Vrije Univ Brussel, Dept Media & Commun Studies Iminds SMIT VUB, Brussels, Belgium
[2] Univ Ghent, Dept Commun Sci Cepec, Iminds MICT Ugent, Ghent, Belgium
[3] Univ Ghent, Dept Educ Studies, Ghent, Belgium
[4] Katholieke Univ Leuven, Dept Comp Sci, Heverlee, Belgium
关键词
Social networking sites; privacy; self-reflection; human rights; science and technology studies; tool clinics; INTERNET; RISKS;
D O I
10.1080/0144929X.2016.1242653
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing popularity of social networking sites has been a source of many privacy concerns. To mitigate these concerns and empower users, different forms of educational and technological solutions have been developed. Developing and evaluating such solutions, however, cannot be considered a neutral process. Instead, it is socially bound and interwoven with norms and values of the researchers. In this contribution, we aim to make the research process and development of privacy solutions more transparent by highlighting questions that should be considered. (1) Which actors are involved in formulating the privacy problem? (2) Is privacy perceived as a human right or as a property right on one's data? (3) Is informing users of privacy dangers always a good thing? (4) Do we want to influence users' attitudes and behaviours? (5) Who is the target audience? We argue that these questions can help researchers to better comprehend their own perspective on privacy, that of others, and the influence of the solutions they are developing. In the discussion, we propose a procedure called tool clinics' for further practical implementations.
引用
收藏
页码:459 / 469
页数:11
相关论文
共 58 条
  • [1] Privacy and rationality - A survey
    Acquisti, A
    Grossklags, J
    [J]. PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, 2006, : 15 - 29
  • [2] Agre P., 2001, Technology and Privacy: The New Landscape
  • [3] PRIVACY - CONCEPTUAL ANALYSIS
    ALTMAN, I
    [J]. ENVIRONMENT AND BEHAVIOR, 1976, 8 (01) : 7 - 29
  • [4] [Anonymous], 2008, TAKEN OUT CONTEXT AM
  • [5] [Anonymous], 2011, Proceedings of the Seventh Symposium on Usable Privacy and Security, DOI [10.1145/2078827.2078841, DOI 10.1145/2078827.2078841]
  • [6] [Anonymous], 2013, Proceedings of the SIGCHI conference on human factors in computing systems, DOI 10.1145/2470654.2470658
  • [7] Bauman Zygmunt., 2013, Liquid Surveillance: A Conversation
  • [8] Privacy in E-commerce:: Stated preferences vs. actual behavior
    Berendt, B
    Günther, O
    Spiekermann, S
    [J]. COMMUNICATIONS OF THE ACM, 2005, 48 (04) : 101 - 106
  • [9] boyd d., 2008, Convergence, V14, P1, DOI DOI 10.1177/1354856507084416
  • [10] Misplaced Confidences: Privacy and the Control Paradox
    Brandimarte, Laura
    Acquisti, Alessandro
    Loewenstein, George
    [J]. SOCIAL PSYCHOLOGICAL AND PERSONALITY SCIENCE, 2013, 4 (03) : 340 - 347