2,653
Views
40
CrossRef citations to date
0
Altmetric
Article

Blogging: self presentation and privacy

Pages 3-23 | Published online: 14 Mar 2008
 

Abstract

Blogs are permeating most niches of social life, and addressing a wide range of topics from scholarly and political issuesFootnote1 to family and children's daily lives. By their very nature, blogs raise a number of privacy issues as they are easy to produce and disseminate, resulting in large amounts of sometimes personal information being broadcast across the Internet in a persistent and cumulative manner. This article reports the preliminary findings of an online survey of bloggers from around the world. The survey explored bloggers' subjective sense of privacy by examining their blogging practices and their expectations of privacy when publishing online. The findings suggest that blogging offers individuals a unique opportunity to work on their self-identity via the degree of self-expression and social interaction that is available in this medium. This finding helps to explain why bloggers consciously bring the ‘private’ to the public realm, despite the inherent privacy risks they face in doing so.

Notes

 1. Glenn, D (Citation2003) Scholars who blog, The Chronicle of Higher Education, 49(39), A14, in F B Viegas (2005) Bloggers expectations of privacy and accountability: an initial survey, Journal of Computer-Mediated Communication, 10(3), article 12. Available at <http://jcmc.indiana.edu/vol10/issue3/viegas.html>. Accessed 27 February 2008.

 2. Epstein, R A (Citation2000) Deconstructing privacy: and putting it back together again, Social Philosophy & Policy, 17(2), 1; Frey, R G (Citation2000) Privacy, control, and talk of rights, Social Philosophy & Policy, 17(2), 45; Rosenberg, A (Citation2000) Privacy as a matter of taste and right, Social Philosophy & Policy, 17(2), 68; Weinreb, L L (Citation2000) The right to privacy, Social Philosophy & Policy, 17(2), 25.

 3. The literature on privacy is vast. Legal, historical, sociological and policy-centred approaches are all available. This discussion centres on the function of privacy and therefore focuses on the philosophical debate.

 4. Warren, S D and Brandeis, L (Citation1890) The right to privacy, Harvard Law Review, 4(5), 193. Available at< http://library.louisville.edu/law/brandeis/privacy.html>. Accessed 27 February 2008.

 5. Westin, A F (Citation1967) Privacy and Freedom, New York: Atheneum Press, 7.

 6. Bloustein, E (1964) Privacy as an aspect of human dignity, in F D Schoeman (ed) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press, 973, 974.

 7. Reiman, J H (Citation1978) Privacy, intimacy, and personhood, Philosophy and Public Affairs, 6(1), 26, reprinted in F D Schoeman (ed) (1984) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press, 300–316.

 8. Benn, S I (1971) Privacy, freedom, and respect for persons, in R Pennock and J Chapman (eds) Privacy Nomos XIII, New York, NY: Atherton, 26.

 9. Van Hove, E (Citation1995) The legislation on privacy protection and social research, Computers in Human Services, 12(2), 53.

10. Clarke, R (Citation1999) Internet privacy concerns confirm the Ccse for intervention, Communications of the ACM 60, 42(2). Available at< http://www.anu.edu.au/people/Roger.Clarke/DV/CACM99.html>. Accessed 27 February 2008.

11. Van Den Haag, E (Citation1971) On privacy, Nomos, 13, 149 cited in L D Introna (1997) Privacy and the computer: why we need privacy in the information society, Metaphilosophy, 28(3), 262.

12. Rachels, J (Citation1975), Why privacy is important, Philosophy and Public Affairs, 4, 292.

13. DeCew, J (Citation1997) In Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca: Cornell University Press, 61.

14. Ibid., 62.

15. Ibid., 78.

16. Ibid., 75.

17. Ibid., 75.

18. Ibid., 76.

19. Benn, S I (Citation1984) Privacy, freedom, and respect for persons, in F D Schoeman (ed) (Citation1984) Philosophical Dimensions of Privacy: An Anthology: New York: Cambridge University Press, 223–244; Prosser, W L (Citation1960) Privacy, California Law Review, 48(3), 338, reprinted in F D Schoeman (ed) (Citation1984) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press, 104–155; Reiman, J H (Citation1978) Privacy, intimacy, and personhood, Philosophy and Public Affairs, 6(1), 26, reprinted in F D Schoeman (ed) (1984) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press, 300–316.

20. Schoeman, F D Privacy and Social Freedom, op cit, fn 21, 15.

21. Goffman, E (Citation1963) Behaviour in Public Places: Notes on the Social Organization of Gatherings, New York: The Free Press; Goffman, E (Citation1969) The Presentation of Self in Everyday Life, London: Penguin.

22. Fried, C (Citation1968) Privacy, Yale Law Journal, 77(3), 475, reprinted in F D Schoeman (ed) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press, 203–223; Gerstein, R G (Citation1978) Intimacy and privacy, Ethics, 89(1), 76, in F D Schoeman, (ed) (1984) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press, 265–272; Reiman, J H, op cit, fn 19.

23. Giddens, A (Citation1994) Modernity and Self-Identity: Self and Society in the Late Modern Age, Palo Alto: Stanford University Press.

24. Ibid., 54.

25. Ibid., 185.

26. Ibid., 186.

27. Ibid., 148.

28. Manchester University, Manchester Metropolitan University (student mail list), and Queen's University Belfast (computer and law students only).

29. Herring, S C, Scheidt, L A, Bonus, S. and Wright, E (2004a) Bridging the gap: a genre analysis of weblogs, Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37), Los Alamitos: IEEE Computer Society Press. Available at< http://www.blogninja.com/DDGDD04.doc>, 5. Last accessed 27 February 2008.

30. Combination of married and living together.

31. Herring, S C, Scheidt, L A, Bonus, S and Wright, E (2004). Bridging the gap: a genre analysis of weblogs, Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37), Los Alamitos: IEEE Computer Society Press. Available at< http://www. blogninja.com/DDGDD04.doc>. Accessed 27 February 2008; Nardi, B, Schiano, D and Gumbrecht, M (2004) Blogging as social activity, or, would you let 900 million people read your diary?, Proceedings of Computer Supported Cooperative Work 2004. Available at< http://home.comcast.net/%7Ediane.schiano/CSCW04.Blog.pdf>. Accessed 27 February 2008.

32. Whyte, W H (Citation1990) City: Rediscovering the Center, New York, NY: Anchor.

33. Herring, S C, Scheidt, L A, Bonus, S. and Wright, E (2004a) Bridging the gap: a genre analysis of weblogs, Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37), Los Alamitos: IEEE Computer Society Press. Available at< http://www.blogninja.com/DDGDD04.doc>. Accessed 27 February 2008.

34. Ibid., 10.

35. Herring, S C, Kouper, I, Scheidt, L A. and Wright, E (2004b) Women and children last: the discursive construction of weblogs, in L Gurak, S Antonijevic, L Johnson, C Ratliff and J Reyman (eds), Into the Blogosphere: Rhetoric, Community, and Culture of Weblogs. Available at <http://blog.lib.umn.edu/blogosphere/women_and_children.html>. Last accessed 27 February 2008.

36. Nardi, B, Schiano, D, and Gumbrecht, M (2004) Blogging as social activity, or, would you let 900 million people read your diary?, Proceedings of Computer Supported Cooperative Work 2004. Available at <http://home.comcast.net/%7Ediane.schiano/CSCW04.Blog.pdf>, 4. Accessed 27 February 2008.

37. Nardi, B, Schiano, D, and Gumbrecht, M (2004) Blogging as social activity, or, would you let 900 million people read your diary?, Proceedings of Computer Supported Cooperative Work 2004. Available at <http://home.comcast.net/%7Ediane.schiano/CSCW04.Blog.pdf>, 6. Accessed 27 February 2008.

38. Gumbrecht, M (2004) Blogs as ‘protected space’, WWW2004 Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics. Available at< http://www.blogpulse.com/papers/www2004gumbrecht.pdf>. Accessed 27 February 2008.

39. Palen, L and Dourish, P (2003) Unpacking ‘privacy’ for a networked world, Proceedings of the ACM CHI. Available at <http://delivery.acm.org/10.1145/650000/642635/p129-palen.pdf?key1=642635&key2=7273414711&coll=&dl=GUIDE&CFID=15151515&CFTOKEN=6184618>. Accessed 27 February 2008.

40. Rosen, J (2000) The Unwanted Gaze: The Destruction of Privacy in America, Vintage Books: New York.

41. Grudin, J (2001) Desituating action: digital representation of context, Human-Computer Interaction, 16(2–3), 269–286.

42. Op cit, fn 41.

43. Grudin, J (2001) Desituating action: digital representation of context, Human-Computer Interaction, 16(2–3), 269–286.

44. Grudin, J (Citation2001) Desituating action: digital representation of context, Human-Computer Interaction, 16(2–3), 11.

45. Rosen, J (2000) The Unwanted Gaze: The Destruction of Privacy in America, New York: NY: Vintage Books.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.