Publication Cover
Journal of Media Ethics
Exploring Questions of Media Morality
Volume 37, 2022 - Issue 3
858
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Design Factors of Ethics and Responsibility in Social Media: A Systematic Review of Literature and Expert Review of Guiding Principles

ORCID Icon & ORCID Icon
Pages 156-178 | Received 08 Dec 2021, Accepted 26 Jul 2022, Published online: 01 Aug 2022

References

  • Ahmad, W., & Liccardi, I. (2020). Addressing anonymous abuses: Measuring the effects of technical mechanisms on reported user behaviors. (Ed.). Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Honolulu, Hawaiʻi, USA.
  • Allen, D. S. (2014). The ethical roots of the public forum: Pragmatism, expressive freedom, and Grenville clark. Journal of Mass Media Ethics, 29(3), 138–152. doi:10.1080/08900523.2014.919231
  • Ashktorab, Z., & Vitak, J. (2016a). Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, California, USA. doi:10.1145/2858036.2858548
  • Ashktorab, Z., & Vitak, J. (2016b). Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. (Eds.). Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose.
  • Baumer, E. P. S. (2018). Socioeconomic inequalities in the non use of facebook. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal QC, Canada.
  • Beck, J. (2018). People are changing the way they use social media. The Atlantic. https://www.theatlantic.com/technology/archive/2018/06/did-cambridge-analytica-actually-change-facebook-users-behavior/562154/
  • Binns, A. J. J. P. (2012). DON’T FEED THE TROLLS! Managing troublemakers in magazines’ online communities. Journalism Practice, 6(4), 547–562.
  • Blackwell, L., Hardy, J., Ammari, T., Veinot, T., Lampe, C., & Schoenebeck, S. (2016). LGBT parents and social media: Advocacy, privacy, and disclosure during shifting social movements. (Ed.). Proceedings of the 2016 CHI conference on human factors in computing systems. San Jose, California, USA.
  • Blackwell, L., Dimond, J., Schoenebeck, S., & Lampe, C. (2017). Classification and its consequences for online harassment: Design insights from heartmob. Proceedings of the ACM on Human-Computer Interaction, 1(CSCW), 1–19. doi:10.1145/3134659
  • Boatwright, B. C., & White, C. (2020). Is privacy dead? Does it matter? How Facebook frames its data policy through public communication. The Journal of Public Interest Communications, 4(1), 78. doi:10.32473/jpic.v4.i1.p78
  • Bowler, L., Mattern, E., & Knobel, C. (2014). Developing design interventions for cyberbullying: Anarrative-based participatory approach. iConference 2014. Illinois.
  • boyd, d. (2010). Social network sites as networked publics: Affordances, dynamics, and implications (A networked self) (pp. 47–66). Routledge.
  • Bozdag, E., & Van Den Hoven, J. (2015). Breaking the filter bubble: Democracy and design. Ethics and Information Technology, 17(4), 249–265. doi:10.1007/s10676-015-9380-y
  • Brandtzaeg, P. B., Lüders, M., Spangenberg, J., Rath-Wiggins, L., & Følstad, A. (2015). Emerging journalistic verification practices concerning social media. Journalism Practice, 10(3), 323–342. doi:10.1080/17512786.2015.1020331
  • Braun, V., & Clarke, V. (2012). Thematic analysis.
  • Carlson, C. R., & Cousineau, L. S. (2020). Are you sure you want to view this community? Exploring the ethics of reddit’s quarantine practice. Journal of Media Ethics, 35(4), 202–213. doi:10.1080/23736992.2020.1819285
  • Chen, R., Fang, F., Norton, T., McDonald, A. M., & Sadeh, N. (2021). Fighting the fog: Evaluating the clarity of privacy disclosures in the age of CCPA. (Ed.). Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society.
  • Cheng, J., Bernstein, M., Danescu-Niculescu-Mizil, C., & Leskovec, J. (2017). Anyone can become a troll: Causes of trolling behavior in online discussions. (Ed.). Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. Portland, Oregon, USA.
  • Cheng, J., Burke, M., & Davis, E. G. (2019). Understanding perceptions of problematic Facebook use. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI. Glasgow, UK. ‘19.
  • Choe, S.-H., & Lee, S.-H. (2019). Suicides by K-Pop stars prompt soul-searching in South Korea. The New York Times. https://www.nytimes.com/2019/11/25/world/asia/goo-hara-kpop-suicide.html
  • Costa, E. (2018). Affordances-in-practice: An ethnographic critique of social media logic and context collapse. New Media & Society, 20(10), 3641–3656. doi:10.1177/1461444818756290
  • Dailey, D., & Starbird, K. (2017). Social media seamsters: Stitching platforms & audiences into local crisis infrastructure. (Ed.). Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. Portland, Oregon, USA.
  • Denef, S., Bayerl, P. S., & Kaptein, N. A. (2013). Social media and the police: Tweeting practices of British police forces during the August 2011 riots. (Ed.). proceedings of the SIGCHI conference on human factors in computing systems. Paris, France.
  • Dennis, J. (2018). Beyond slacktivism: political participation on social media. Cham, Switzerland. Springer.
  • Ellison, N. B., Vitak, J., Steinfield, C., Gray, R., & Lampe, C. (2011). Negotiating privacy concerns and social capital needs in a social media environment (Privacy online) (pp. 19–32). Berlin, Heidelberg. Springer.
  • The European Commission. (2019). The EU approach for trustworthy artificial intelligence.
  • Flintham, M., Karner, C., Bachour, K., Creswick, H., Gupta, N., & Moran, S. (2018). Falling for fake news: Investigating the consumption of news via social media. (Ed.). Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montréal, Canada.
  • Foth, M., Tomitsch, M., Satchell, C., & Haeusler, M. H. (2015). From users to citizens: Some thoughts on designing for polity and civics. (Ed.). Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction. Parkville, VIC, Australia.
  • Facebook. (2020). Facebook Community Standards. Retrieved March from https://www.facebook.com/communitystandards/introduction
  • Geeng, C., Yee, S., & Roesner, F. (2020). Fake news on Facebook and Twitter: Investigating how people (don’t) investigate, Ed.
  • Gehanno, J.-F., Rollin, L., & Darmoni, S. (2013). Is the coverage of Google Scholar enough to be used alone for systematic reviews. BMC Medical Informatics and Decision Making, 13(1), 1–5. doi:10.1186/1472-6947-13-7
  • Goldman, E. (2020). An introduction to the California consumer privacy act (CCPA). Santa Clara Univ. Legal Studies Research Paper.
  • Golf-Papez, M., & Veer, E. J. J. o. M. M. (2017). Don’t feed the trolling: rethinking how online trolling is being defined and combated. Journal of Marketing Management, 33(15–16), 1336–1354.
  • Grace, R., Kropczynski, J., & Tapia, A. (2018). Community coordination: Aligning social media use in community emergency management. (Ed.). Proceedings of the 15th ISCRAM Conference. Rochester, NY, USA.
  • Grimmelmann, J. (2019). Continuity and change in internet law. Communications of the ACM, 62(5), 24–26. doi:10.1145/3319077
  • Hagman, W., Andersson, D., Västfjäll, D., & Tinghög, G. (2015). Public views on policies involving nudges. Review of Philosophy and Psychology, 6(3), 439–453. doi:10.1007/s13164-015-0263-2
  • Hawdon, J., Ranganathan, S., Leman, S., Bookhultz, S., & Mitra, T. (2020). Social media use, political polarization, and social capital: Is social media tearing the U.S. apart? (pp. 243–260). Switzerland. Springer International Publishing. doi:10.1007/978-3-030-49570-1_17
  • Hemsley, J., Jacobson, J., Gruzd, A., & Mai, P. (2018). Social media for social good or evil: An introduction. Social Media+ Society, 4(3), 2056305118786719.
  • Horwitz, J. (2021). The Facebook files: A wall street journal investigation. The Wall Street Journal. https://www.wsj.com/articles/the-facebook-files-11631713039?mod=bigtop-breadcrumb
  • Hoyle, R., Das, S., Kapadia, A., Lee, A. J., & Vaniea, K. (2017). Was my message read?: Privacy and signaling on Facebook Messenger. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems - CHI ‘17. Denver, Colorado, USA.
  • Iivari, N., & Kuutti, K. (2017). Critical design research and information technology: Searching for empowering design. Proceedings of the 2017 Conference on Designing Interactive Systems, Edinburgh, United Kingdom. doi:10.1145/3064663.3064747.
  • Instagram. (2020). Community Guidelines. Retrieved March from https://www.facebook.com/help/instagram/477434105621119
  • Introne, J., Gokce Yildirim, I., Iandoli, L., DeCook, J., & Elzeini, S. (2018). How people weave online information into pseudoknowledge. Social Media+ Society, 4(3), 2056305118785639.
  • Jhaver, S., Ghoshal, S., Bruckman, A., & Gilbert, E. (2018). Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI), 25(2), 1–33.
  • Jiang, J. A., Middler, S., Brubaker, J. R., & Fiesler, C. (2020). Characterizing community guidelines on social media platforms. (Ed.). Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing.
  • Johnson, B. G. (2017). Speech, harm, and the duties of digital intermediaries: Conceptualizing platform ethics. Journal of Media Ethics, 32(1), 16–27. doi:10.1080/23736992.2016.1258991
  • Kelly, S. U., Sung, C., & Farnham, S. (2002). Designing for improved social responsibility, user participation and content in on-line communities. (Ed.). Proceedings of the SIGCHI conference on Human factors in computing systems. Minneapolis, Minnesota, USA.
  • Kim, J. (2017). # iamafeminist as the “mother tag”: Feminist identification and activism against misogyny on Twitter in South Korea. Feminist Media Studies, 17(5), 804–820. doi:10.1080/14680777.2017.1283343
  • Kluger, J. (2020). The misinformation age has exacerbated—and been exacerbated by—the coronavirus pandemic. Time. https://time.com/5870464/coronavirus-pandemic-misinformation/?utm_source=newsletter&utm_medium=email&utm_campaign=coronavirus-brief&utm_content=20200723&et_rid=95420026
  • Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in Human Behavior, 28(2), 434–443.
  • Lee, J.-S., & Nerghes, A. (2018). Refugee or migrant crisis? Labels, perceived agency, and sentiment polarity in online discussions. Social Media+ Society, 4(3), 2056305118785638.
  • Lee, K. S., & Wei, H. 2019. Design interventions against trolling in social media: A classification of current strategies based on behaviour change theories. IASDR 2019.
  • Leonardi, P. M. (2014). Social media, knowledge sharing, and innovation: Toward a theory of communication visibility. Information Systems Research, 25(4), 796–816. doi:10.1287/isre.2014.0536
  • Li, L., Zhang, Q., Wang, X., Zhang, J., Wang, T., Gao, T., … Wang, F. (2020). Characterizing the propagation of situational information in social media during COVID-19 epidemic: A case study on Weibo. IEEE Transactions on Computational Social Systems, 7(2), 556–562. doi:10.1109/TCSS.2020.2980007
  • Liao, Q. V., & Fu, W.-T. (2013). Beyond the filter bubble: interactive effects of perceived threat and topic involvement on selective exposure to information. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). Paris, France.
  • Lockton, D., Harrison, D., Holley, T., & Stanton, N. A. (2009) Influencing interaction: development of the design with intent method. In Proceedings of the 4th International Conference on Persuasive Technology (Persuasive '09). Claremont, California, USA.
  • Ma, X., Hancock, J., & Naaman, M. (2016). Anonymity, intimacy and self-disclosure in social media. (Ed.). Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. San Jose, California, USA.
  • Majchrzak, A., Faraj, S., Kane, G. C., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer-Mediated Communication, 19(1), 38–55. doi:10.1111/jcc4.12030
  • Masaki, H., Shibata, K., Hoshino, S., Ishihama, T., Saito, N., & Yatani, K. (2020). Exploring nudge designs to help adolescent SNS users avoid privacy and safety threats. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Honolulu, Hawaiʻi, USA.
  • Maudet, N. (2019). Dead angles of personalization: Integrating curation algorithms in the fabric of design. (Ed.). Proceedings of the 2019 on Designing Interactive Systems Conference. San Diego, California, USA.
  • Nagatsu, M. (2015). Social nudges: Their mechanisms and justification. Review of Philosophy and Psychology, 6(3), 481–494. doi:10.1007/s13164-015-0245-4
  • Nelimarkka, M., Rancy, J. P., Grygiel, J., & Semaan, B. (2019). (Re)Design to mitigate political polarization. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW), 1–25. doi:10.1145/3359243
  • Ngai, E. W. T., Moon, K.-L. K., Lam, S. S., Chin, E. S. K., & Tao, S. S. C. (2015). Social media models, technologies, and applications. Industrial Management & Data Systems, 115(5), 769–802. doi:10.1108/imds-03-2015-0075
  • O’Brien, N., Heaven, B., Teal, G., Evans, E. H., Cleland, C., Moffatt, S., … Moynihan, P. (2016). Integrating evidence from systematic reviews, qualitative research, and expert knowledge using co-design techniques to develop a web-based intervention for people in the retirement transition. Journal of Medical Internet Research, 18(8), e5790.
  • Oukemeni, S., Rifà-Pous, H., & Puig, J. M. M. (2019). Privacy analysis on microblogging online social networks. ACM Computing Surveys, 52(3), 1–36. doi:10.1145/3321481
  • Pennycook, G., McPhetres, J., Zhang, Y., Lu, J. G., & Rand, D. G. (2020). Fighting COVID-19 misinformation on social media: Experimental evidence for a scalable accuracy-nudge intervention. Psychological Science, 31(7), 770–780. doi:10.1177/0956797620939054
  • Reisach, U. (2020). The responsibility of social media in times of societal and political manipulation. European Journal of Operational Research, 291(3), 906–917. doi:10.1016/j.ejor.2020.09.020
  • Renaud, K., & Zimmermann, V. (2018). Ethical guidelines for nudging in information security & privacy. International Journal of Human-Computer Studies, 120, 22–35. doi:10.1016/j.ijhcs.2018.05.011
  • Reuter, C., Kaufhold, M.-A., Spielhofer, T., & Hahne, A. S. (2017). Social media in emergencies: A representative study on citizens’ perception in Germany. Proceedings of the ACM on Human-Computer Interaction, 1(CSCW), 90. doi:10.1145/3134725
  • Reuter, C., Hughes, A. L., & Kaufhold, M.-A. (2018). Social media in crisis management: An evaluation and analysis of crisis informatics research. International Journal of Human–Computer Interaction, 34(4), 280–294. doi:10.1080/10447318.2018.1427832
  • Sambasivan, N., Consolvo, S., Batool, A., Ahmed, N., Matthews, T., Thomas, K., and Churchill, E. (2019). They don’t leave us alone anywhere we go. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI ‘19. Glasgow, UK.
  • Sandelowski, M. (1998). The call to experts in qualitative research. Research in Nursing & Health, 21(5), 467–471. doi:10.1002/(SICI)1098-240X(199810)21:5<467::AID-NUR9>3.0.CO;2-L
  • Seo, Y. (2020). Dozens of young women in South Korea were allegedly forced into sexual slavery on an encrypted messaging app. CNN. https://edition.cnn.com/2020/03/27/asia/south-korea-telegram-sex-rooms-intl-hnk/index.html
  • Shaw, F. (2018). Beyond ‘report, block, ignore’: Informal responses to trolling and harassment on social media (The Routledge Companion to Media and Activism (pp. 395–403). London, UK. Routledge.
  • Shipman, F. M., & Marshall, C. C. (2020). Ownership, privacy, and control in the wake of Cambridge analytica: The relationship between attitudes and awareness. (Ed.). Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Honolulu, Hawaiʻi, USA.
  • Sobolewski, M., Mazur, J., & Paliński, M. (2017). GDPR: A step towards a user-centric Internet? Intereconomics, 52(4), 207–213. doi:10.1007/s10272-017-0676-5
  • Statista. (2020). Social media: Global penetration rate 2020, by region. https://www.statista.com/statistics/269615/social-network-penetration-by-region/
  • Stewart, D. R. C., & Littau, J. (2016). Up, periscope: Mobile streaming video technologies, privacy in public, and the right to record. Journalism & Mass Communication Quarterly, 93(2), 312–331. doi:10.1177/1077699016637106
  • Stroud, S. R. (2019). Pragmatist media ethics and the challenges of fake news. Journal of Media Ethics, 34(4), 178–192. doi:10.1080/23736992.2019.1672554
  • Stutzman, F., & Kramer-Duffield, J. (2010). Friends only: Examining a privacy-enhancing behavior in Facebook. (Ed.). Proceedings of the SIGCHI conference on human factors in computing systems. Atlanta, Georgia, USA.
  • Stutzman, F., & Hartzog, W. (2012). Boundary regulation in social media. (Ed.). Proceedings of the ACM 2012 conference on computer supported cooperative work. Seattle, Washington, USA.
  • Stutzman, F., Vitak, J., Ellison, N. B., Gray, R., & Lampe, C. (2012). Privacy in interaction: Exploring disclosure and social capital in Facebook. (Ed.). Sixth international AAAI conference on weblogs and social media. Dublin, Ireland.
  • Szymczak, H., Kuecuekbalaban, P., Knuth, D., & Schmidt, S. (2015). Trust towards social media in emergencies: A perspective of professional emergency personnel in Europe. (Ed.). International Conference on Human-Computer Interaction. Los Angeles, California, USA.
  • Taber, L., & Whittaker, S. (2018). Personality depends on the medium: Differences in self-perception on Snapchat, Facebook and offline. (Ed.). Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montréal, Canada.
  • Tim, Y., Pan, S. L., Ractham, P., & Kaewkitipong, L. (2017). Digitally enabled disaster response: The emergence of social media as boundary objects in a flooding disaster. Information Systems Journal, 27(2), 197–232. doi:10.1111/isj.12114
  • Twitter. (2020). The Twitter Rules. Retrieved March from https://help.twitter.com/en/rules-and-policies/twitter-rules
  • Vashistha, A., Garg, A., Anderson, R., & Raza, A. A. (2019). Threats, abuses, flirting, and blackmail. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI. Glasgow, UK. ‘19.
  • Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science, 359(6380), 1146–1151. doi:10.1126/science.aap9559
  • Walrave, M., Van Ouytsel, J., Ponnet, K., & Temple, J. R. (2018). Sharing and caring? The role of social media and privacy in sexting behaviour (pp. 1–17). Switzerland. Springer International Publishing. doi:10.1007/978-3-319-71882-8_1
  • Wang, L., & Fussell, S. R. (2020). More than a click: Exploring college students’ decision- making processes in online news sharing. Proceedings of the ACM on Human-Computer Interaction, 4(GROUP), 1–20. doi:10.1145/3375189
  • Ward, K. (2018). Social networks, the 2016 US presidential election, and Kantian ethics: Applying the categorical imperative to Cambridge Analytica’s behavioral microtargeting. Journal of Media Ethics, 33(3), 133–148. doi:10.1080/23736992.2018.1477047
  • White, C. L., & Boatwright, B. (2020). Social media ethics in the data economy: Issues of social responsibility for using Facebook for public relations. Public Relations Review, 46(5), 101980. doi:10.1016/j.pubrev.2020.101980
  • Wisniewski, P., Lipford, H., & Wilson, D. (2012). Fighting for my space: Coping mechanisms for SNS boundary regulation. (Ed.). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Austin, Texas, USA.
  • Yaqub, W., Kakhidze, O., Brockman, M. L., Memon, N., & Patil, S. (2020). Effects of credibility indicators on social media news sharing intent. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA. doi:10.1145/3313831.3376213
  • YouTube. (2020). Community Guidelines. Retrieved March from https://www.youtube.com/howyoutubeworks/policies/community-guidelines
  • Zaeem, R. N., & Barber, K. S. (2021). The effect of the GDPR on privacy policies. ACM Transactions on Management Information Systems, 12(1), 1–20. doi:10.1145/3389685
  • Zappavigna, M. (2018). Searchable talk: Hashtags and social media metadiscourse. London, UK. Bloomsbury Publishing.
  • Zhang, W., Johnson, T. J., Seltzer, T., & Bichard, S. L. (2010). The revolution will be networked: The influence of social networking sites on political attitudes and behavior. Social Science Computer Review, 28(1), 75–92. doi:10.1177/0894439309335162

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.