817
Views
11
CrossRef citations to date
0
Altmetric
Original Articles

Self-reflection on privacy research in social networking sites

, , , &
Pages 459-469 | Received 18 May 2016, Accepted 20 Sep 2016, Published online: 17 Oct 2016

References

  • Acquisti, Alessandro, and Ralph Gross. 2006. “Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.” In Privacy Enhancing Technologies, edited by George Danezis and Phillippe Golle, 36–58. Berlin: Springer.
  • Agre, Philip, and Marc Rotenberg. 2001. Technology and Privacy: The New Landscape. Cambridge: MIT Press.
  • Altman, Irvin. 1976. “Privacy: A Conceptual Analysis.” Environment and Behavior 8 (1): 7–29. doi: 10.1177/001391657600800102
  • Bauman, Zygmunt, and David Lyon. 2013. Liquid Surveillance. Cambridge: Polity Press.
  • Berendt, Bettina, Oliver Günther, and Sarah Spiekermann. 2005. “Privacy in E-commerce: Stated Preferences vs. Actual Behavior.” Communications of the ACM 48 (4): 101–106. doi: 10.1145/1053291.1053295
  • Bernstein, Michael, Eytan Bakshy, Moira Burke, and Brian Karrer. 2013. “Quantifying the Invisible Audience in Social Networks.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 21–30. New York: ACM.
  • boyd, danah. 2008a. “Taken Out of Context: American Teen Sociality in Networked Publics.” PhD diss., University of California–Berkeley, School of Information, CA.
  • boyd, danah. 2008b. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence: The International Journal of Research into New Media Technologies 14 (1): 13–20. doi:10.1177/1354856507084416.
  • Brandimarte, Laura, Alessandro Acquisti, and George Loewenstein. 2012. “Misplaced Confidences: Privacy and the Control Paradox.” Social Psychological and Personality Science 4: 340–347. doi:10.1177/1948550612455931.
  • Brey, Philip, Adam Briggle, and Edward Spence. 2012. The Good Life in a Technological Age. New York: Routledge.
  • Brown, Rebecca. 2012. “The Pedagogy of Regret: Facebook, Binge Drinking and Young Women.” Continuum-Journal of Media & Cultural Studies 26 (3): 357–369. doi:10.1080/10304312.2012.665834.
  • Cauffman, Elizabeht, and Laurance Steinberg. 2000. “(Im)maturity of Judgment in Adolescence: Why Adolescents may be Less Culpable than Adults.” Behavioral Sciences & the Law 18 (6): 741–760. doi:10.1002/bsl.416
  • Chen, Houn-Gee, Charlie Chen, Louis Lo, and Samuel Yang. 2008. “Online Privacy Control via Anonymity and Pseudonym: Cross-cultural Implications.” Behaviour and Information Technology 27 (1): 229–242. doi: 10.1080/01449290601156817
  • Coté, Marc, and Jennifer Pybus. 2007. “Learning to Immaterial Labour 2.0:MySpace and Social Networks.” Ephemera: Theory & Politics in Organization 7 (1): 88–106.
  • De Hert, Paul. 2012. “Accountability and System Responsibility: New Concepts in Data Protection Law and Human Rights Law.” In Managing Privacy Through Accountability, edited by Daniel Guagnin, Leon Hempel, Carla Ilten, Inga Kroener, Daniel Neyland, and Hector Postigo, 193–232. Bastingstoke: Palgrave Macmillan.
  • Foucault, Michel (1979) [1976]. The History of Sexuality Volume 1: An Introduction. London: Allen Lane.
  • Fuchs, Christian. 2012. “The Political Economy of Privacy on Facebook.” Television & New Media 13 (2): 139–159. doi:10.1177/1527476411415699.
  • Gandy, Oscar. 2003. “Data Mining and Surveillance in the Post-9/11 Environment.” In The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age, edited by Kristie Ball and Frank Webster, 26–41. Sterling, VA: Pluto Press.
  • Giddens, Anthony. 1991. The Consequences of Modernity. Stanford, CA: Stanford University Press.
  • Gillespie, Tarleton, Pablo Boczkowski, and K. A. Foot. 2014. Media Technologies: Essays on Communication, Materiality, and Society. Cambridge, Massachusetts: MIT Press.
  • Greenwald, Glenn. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan Books.
  • Gürses, Seda, and Claudia Diaz. 2013. “Two Tales of Privacy in Online Social Networks.” IEEE Security & Privacy 11 (3): 29–37. doi:10.1109/MSP.2013.47.
  • Hackett, Edward, Olga Amsterdamska, Michael Lynch, and Judy Wajcman. 2008. “Introduction.” In The Handbook of Science and Technology Studies (3rd), edited by Edward Hackett, Olga Amsterdamska, Michael Lynch, and Judy Wajcman, 1–7. Cambridge: MIT Press.
  • Insafe. 2012. “Educational Resources for Teachers.” Retrieved from http://www.saferinternet.org.
  • Kelman, Herbert. 1965. “Manipulation of Human Behavior: An Ethical Dilemma for the Social Scientist.” Journal of Social Issues 21 (2): 31–46. doi:10.1111/j.1540-4560.1965.tb00494.x.
  • Kelman, Herbert. 2001. “Ethical Limits on the Use of Influence in Hierarchical Relationships.” In Social Influences on Ethical Behavior in Organizations, edited by John Darley, David Messick, and Tom Ryler, 11–20. Mahwah, NJ: Lawrence Erlbaum.
  • Kelman, Herbert, Donald Warwick, and G. Bermant. 1978. “The Ethics of Social Intervention: Goals, Means, and Consequences.” In The Ethics of Social Intervention, 3–33. New York: Wiley.
  • Kimmel, Allan. 1988. Ethics and Values in Applied Social Research. London: Sage.
  • Knijnenburg, Bart, Alfred Kobsa, and Hongxia Jin. 2013. “Preference-based Location Sharing: Are More Privacy Options Really Better?” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2667–2676. New York: ACM.
  • Latour, Bruno. 1992. “Where are the Missing Masses? The Sociology of a Few Mundane Artifacts.” In Shaping Technology/ Building Society: Studies in Sociotechnical Change, edited by Wiebe Bijker and John Law, 225–258. Cambridge, MA: MIT Press.
  • Litt, Eden. 2013. “Understanding Social Network Site Users’ Privacy Tool Use.” Computers in Human Behavior 29 (4): 1649–1656. doi: 10.1016/j.chb.2013.01.049
  • Lohmann, Larry. 2013. “Performative Equations and Neoliberal Commodification: The Case of Climate.” In Nature Inc.: Environmental Conservation in the Neoliberal age, edited by Bram Büschler, Wolfram Dressler, and Robert Fletcher, 158–180. University of Arizona Press.
  • Madden, Mary, Aamanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, Aaron Smith, and Meredith Beaton. 2013. “ Teens, Social Media, and Privacy (No. PEW Report).” http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/.
  • Markham, Annette. 2013. “The Dramaturgy of Digital Experience.” In The Drama of Social Life: A Dramaturgical Handbook, edited by Charles Edgley, 279–293. Burlington, VT: Ashgate Press.
  • Martin, Nigel, John Rise, and Robin Martin. 2015. “Expectations of Privacy and Trust: Examining the Views of IT Professionals.” Behaviour and Information Technology 35 (6): 500–510. doi: 10.1080/0144929X.2015.1066444
  • Morton, Anthony, Bettina Berendt, Seda Gürses, and Jo Pierson. 2013. “‘Tool Clinics’ – Embracing Multiple Perspectives in Privacy Research and Privacy-sensitive Design.” Dagstuhl Reports 3 (7): 96–104.
  • Mun, Min, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark Hansen, and Ramesh Govindan. 2010. “Personal Data Vaults: A Locus of Control for Personal Data Streams.” In Proceedings of the 6th International Conference. New York: ACM, 17:1–17:12.
  • Nissenbaum, Helen. 2004. “Privacy as Contextual Integrity.” Washington Law Review 79 (1): 101–158.
  • Papacharissi, Zizi. 2012. “Afterword: A Remediation of Theory.” In Produsing Theory in a Digital World, edited by Rebecca An Lind, 195–203. New York: Peter Lang International Academic.
  • Patchin, Justin, and Sameer Hinduja. 2010. “Changes in Adolescent Online Social Networking Behaviors from 2006 to 2009.” Computers in Human Behavior 26 (6): 1818–1821. doi:10.1016/j.chb.2010.07.009.
  • Petronio, Sandra. 2002. Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: New York Press.
  • Purtova, Nadezhda. 2010. “Private Law Solutions in European Data Protection: Relationship to Privacy, and Waiver of Data Protection Rights.” Netherlands Quarterly of Human Rights 28 (2): 179–198.
  • Raynes-Goldie, Kate. 2010. “Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the Age of Facebook.” First Monday 15 (1). http://firstmonday.org/ojs/index.php/fm/article/view/2775. doi: 10.5210/fm.v15i1.2775
  • Rouvroy, Antoinette, and Yves Poullet. 2009. “The Right to Informational Self-determination and the Value of Self-development: Reassessing the Importance of Privacy for Democracy.” In Reinventing Data Protection? edited by Serge Gutwirth, 45–76. Amsterdam, The Netherlands: Springer.
  • Warren, Samuel, and Louis Brandeis. 1890. “The Right to Privacy.” Harvard Law Review 4: 193–220. doi: 10.2307/1321160
  • Samuelson, Pamela. 2000. “Privacy as Intellectual Property?” Stanford Law Review 52 (52): 1125–1173. doi: 10.2307/1229511
  • Solove, Daniel. 2006. “A Taxonomy of Privacy.” University of Pennsylvania Law Review 154 (3): 477–560. doi: 10.2307/40041279
  • Stutzman, Fred, Ralph Gross, and Alessandro Acquisti. 2013. “Silent Listeners: The Evolution of Privacy and Disclosure on Facebook.” Journal of Privacy and Confidentiality 4 (2): 7–41.
  • Tejedor, Santiago, and Christina Pulido. 2012. “Challenges and Risks of Internet Use by Children. How to Empower Minors?” Comunicar 20 (39): 65–72. doi:10.3916/C39-2012-02-06.
  • Vanderhoven, Ellen, Tammy Schellens, and Martin Valcke. 2014a. “Educational Packages about the Risks on Social Network Sites: State of the Art.” Procedia – Social and Behavioral Sciences 112 (112): 603–612. doi:10.1016/j.sbspro.2014.01.1207.
  • Vanderhoven, Ellen, Tammy Schellens, and Martin Valcke. 2014b. “Exploring the Usefulness of School Education about Risks on Social Network Sites: A Survey Study.” The Journal of Media Literacy Education 5 (1): 285–294.
  • Verbeek, Peter-Paul. 2011. Moralizing Technology: Understanding and Designin the Morality of Things. Chicago, IL: University of Chicago Press.
  • Walrave, Michel, and Wannes Heirman. 2013. “Adolescents, Online Marketing and Privacy: Predicting Adolescents’ Willingness to Disclose Personal Information for Marketing Purposes.” Children & Society 27 (6): 434–447. doi:10.1111/j.1099-0860.2011.00423.x.
  • Wang, Yang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Leon, and Lorrie Cranor. 2011. “‘ I Regretted the Minute I Pressed Share’: A Qualitative Study of Regrets on Facebook.” In Proceedings of the Seventh Symposium on Usable Privacy and Security. New York: ACM, 10:1–10:16.
  • Waskul, Dennis. 2005. “Ekstasis and the Internet: Liminality and Computer-mediated Communication.” New Media & Society 7 (1): 47–63. doi:10.1177/1461444805049144.
  • Westin, Alan. 1967. Privacy and Freedom. New York: Atheneum.
  • Williams, Robin, and David Edge. 1996. “The Social Shaping of Technology.” Research Policy 25: 865–899. doi: 10.1016/0048-7333(96)00885-2
  • Xu, Heng. 2012. “Reframing Privacy 2.0 in Online Social Networks.” University of Pennsylvania Journal of Constitutional Law 14 (4): 1077–1102.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.