Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3173574.3173627acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

"We Are the Product": Public Reactions to Online Data Sharing and Privacy Controversies in the Media

Published: 19 April 2018 Publication History

Abstract

As online platforms increasingly collect large amounts of data about their users, there has been growing public concern about privacy around issues such as data sharing. Controversies around practices perceived as surprising or even unethical often highlight patterns of privacy attitudes when they spark conversation in the media. This paper examines public reaction "in the wild" to two data sharing controversies that were the focus of media attention-regarding the social media and communication services Facebook and WhatsApp, as well as the email service unroll.me. These controversies instigated discussion of data privacy and ethics, accessibility of website policies, notions of responsibility for privacy, cost-benefit analyses, and strategies for privacy management such as non-use. An analysis of reactions and interactions captured by comments on news articles not only reveals information about pervasive privacy attitudes, but also suggests communication and design strategies that could benefit both platforms and users.

References

[1]
Alessandro Acquisiti and Ralph Gross. 2006. Imagined communities: awareness, information sharing, and privacy on the Facebook. Proceedings of the International Workshop on Privacy Enhancing Technologies: 36--58.
[2]
Julio Angulo. 2015. "WTH.!?!" Experiences, reactions, and expectations related to online privacy panic situations. Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
[3]
Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, and Carolyn Nguyen. 2013. ''Little brothers watching you'': raising awareness of data leaks on smartphones. Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
[4]
Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, leaving, and (re)lapsing. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). 3257.
[5]
Allan Bell. 1994. Media (mis)communication on the science of climate change. Public Understanding of Science 3, 3, 259--275.
[6]
Joseph Bonneau and Sören Preibusch. 2010. The privacy jungle: on the market for data protection in social networks. In Economics of Information Security and Privacy, Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer International Publishing, London, UK, 121--167.
[7]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2, 77--101.
[8]
Juan Pablo Carrascal, Christopher Riederer, Vijay Erramilli, Mauro Cherubini, and Rodrigo de Oliveira. 2013. Your browsing behavior for a big mac: Economics of personal information online. Proceedings of the International Conference on World Wide Web (WWW).
[9]
Jennifer A. Chandler, Jeffrey A Sun, and Eric Racine. 2017. Online public reactions to fMRI communication with patients with disorders of consciousness?: Quality of life, end-of-life decision making, and concerns with misdiagnosis. AJOB Empirical Bioethics 8, 1, 40--51.
[10]
Ramón Compañó and Wainer Lusoli. 2010. The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In Economics of Information Security and Privacy, Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer International Publishing, London, UK, 169--185.
[11]
Mary J. Culnan and Cynthia Clark Williams. 2009. How ethics can enhance organizational privacy: lessongs from the Choicepoint and TJX data breaches. MIS Quarterly 33, 4, 673--687.
[12]
Kim Doyle. 2015. Facebook, WhatsApp and the commodification of affective labour. Communication Politics & Culture 48, 1, 51--65.
[13]
Catherine Dwyer. 2011. Privacy in the age of google and facebook. IEEE Technology and Society Magazine 30, 3, 58--63.
[14]
Ap Felt, Elizabeth Ha, Serge Egelman, and Ariel Haney. 2012. Android permissions: user attention, comprehension, and behavior. Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
[15]
Casey Fiesler, Cliff Lampe, and Amy S. Bruckman. 2016. Reality and perception of copyright terms of service for online content creation. Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW).
[16]
Emma L Giles, Matthew Holmes, Elaine McColl, Falko F Sniehotta, and Jean M Adams. 2015. Acceptability of financial incentives for breastfeeding: thematic analysis of readers' comments to UK online news reports. BMC Pregnancy and Childbirth 15, 1, 116.
[17]
Nicole Marie Glenn, Claudine C. Champion, and John C. Spence. 2012. Qualitative content analysis of online news media coverage of weight loss surgery and related reader comments. Clinical Obesity 2, 5--6, 125--131.
[18]
Timothy R. Graeff and Susan Harmon. 2002. Collecting and using personal data: consumers' awareness and concerns. Journal of Consumer Marketing 19, 4, 302--318.
[19]
Eszter Hargittai and Alice Marwick. 2016. "What Can I Really Do?" Explaining the Privacy Paradox with Online Apathy. International Journal of Communication 10, 3737--3757.
[20]
Jojo Hedaya. 2017. We Can Do Better. Unroll.me Blog. Retrieved April 23, 2017 from http://blog.unroll.me/we-can-do-better/
[21]
Natalie Henrich and Bev Holmes. 2013. Web news readers' comments: Towards developing a methodology for using on-line comments in social inquiry. Journal of Media and Communication Studies 5, 1, 1--4.
[22]
Avery Holton, Nayeon Lee, and Renita Coleman. 2014. Commenting on Health?: A Framing Analysis of User Comments in Response to Health Articles Online. 825--837.
[23]
Mike Isaac. 2017. Uber's CEO plays with fire. The New York Times. Retrieved from https://www.nytimes.com/2017/04/23/technology/tr avis-kalanick-pushes-uber-and-himself-to-theprecipice.html
[24]
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My data just goes everywhere": user mental models of the internet and implications for privacy and security. The Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 39--52.
[25]
Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing privacy notices: an online study of the nutrition label approach. The Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 1573--1582.
[26]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2013. Privacy as part of the app decision-making process. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI).
[27]
Joop De Kraker, Sacha Kuijs, Ron Cörvers, and Astrid Offermans. 2014. Internet public opinion on climate change: a world views analysis of online reader comments. International Journal of Climate Change Strategies and Management 6, 1, 19--33.
[28]
Airi Lampinen. 2010. Practices of balancing privacy and publicness in social network services. The Proceedings of the ACM International Conference on Supporting Group Work (GROUP), 343--344.
[29]
Pedro Giovanni Leon, Blase Ur, Yang Wang, et al. 2013. What matters to users?: factors that affect users' willingness to share information with online advertisers. Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
[30]
Ilias Leontiadis, Christos Efstratiou, Marco Picone, and Cecilia Mascolo. 2012. Don't kill my ads! Balancing privacy in an ad-supported mobile application market. The Proceedings of Hotmobile 2012 13th ACM Sigmobile Workshop on Mobile Computing Systems and Applications, 2:1--2:6.
[31]
Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norma Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. Proceedings of the ACM Conference on Pervasive and Ubiquitous Computing (UbiComp).
[32]
Edith Manosevitch and D Walker. 2009. Reader comments to online opinion journalism: a space of public deliberation. The Proceedings of the Symposium on Online Journalism 10, 1--30.
[33]
Helia Marreiros, Richard Gomer, Michael Vlassopoulos, and Mirco Tonin. 2015. Scared or naive? An exploratory study of users' perceptions of online privacy disclosures. IADIS International Journal of WWW/Internet 13, 2, 1--16.
[34]
Maxwell McCombs and Donald L. Shaw. 1972. The Agenda-Setting Function of Mass Media. Public Opinion Quarterly 36, 2, 176--187.
[35]
Aleecia M. Mcdonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society 4, 543--565.
[36]
Jessica Miller, Batya Friedman, Gavin Jancke, and Brian Gill. 2007. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system. Proceedings of the ACM Conference on Supporting Group Work (GROUP), 281--290.
[37]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79, 101--139.
[38]
Jennifer A Pereira, Susan Quach, Huy Hao Dao, et al. 2013. Contagious Comments?: What Was the Online Buzz About the 2011 Quebec Measles Outbreak? PLoS One 8(5).
[39]
Chanda Phelan, Ann Arbor, and Paul Resnick. 2016. It's creepy, but it doesn't bother me. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), 5372--5384.
[40]
Joseph Phelps, Glen Nowak, and Elizabeth Ferrell. 2000. Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing 19, 1, 27--41.
[41]
Lee Rainie, Aaron Smith, and Maeve Duggan. 2013. Coming and Going on Facebook. Pew Internet Center Research. Retrieved from http://pewinternet.org/Reports/2013/Coming-andgoing-on-facebook.aspx
[42]
Michel Schreiner and Thomas Hess. 2015. Examining the role of privacy in virtual migration: the case of WhatsApp and Threema. Proceedings of the 21st Americas Conference on Information Systems, 1--11.
[43]
Fuming Shih, Ilaria Liccardi, and Daniel Weitzner. 2015. Privacy tipping points in smartphones privacy preferences. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), 807--816.
[44]
Irina Shklovski, Scott D Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and creepiness in app space: perceptions of privacy and mobile app use. Proceedings of the ACM conference on Human Factors in Computing Systems (CHI), 2347--2356.
[45]
Irina Shklovski, Scott D Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and creepiness in app space: perceptions of privacy and mobile app use. Proceedings of the ACM conference on Human Factors in Computing Systems (CHI), 2347--2356.
[46]
Judith Simon and Irina Shklovski. 2015. Lessening the Burden of Individualized Responsibility in the Socio-technical World. Proceedings of ISIS Summit - The Information Society at the Crossroads, 1--5. Retrieved from https://sciforum.net/conference/isissummit-vienna-2015/paper/2885/download/pdf
[47]
Stefan Stieger, Christoph Burger, Manuel Bohn, and Martin Voracek. 2013. Who commits virtual identity suicide? Differences in privacy concerns, Internet addiction, and personality between Facebook users and quitters. Cyberpsychology, Behavior, and Social Networking 16, 9, 629--634.
[48]
Marisa Torres. 2015. What do users have to say about online news comments? Readers ' accounts and expectations of public debate and online moderation?: a case study. Journal of Audience and Reception Studies 12(2), 32--44.
[49]
John Vines, Anja Thieme, Rob Comber, Mark Blythe, Peter Wright, and Patrick Olivier. 2013. HCI in the Press: Online Public Reactions to Mass Media Portrayals of HCI Research. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI).
[50]
Jessica Vitak, Katie Shilton, and Z. Ashktorab. 2016. Beyond the Belmont Principles: ethical challenges, practices, and beliefs in the online data research community. Proceedings of the ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW).
[51]
Laura C. Wilson, Alesha D. Ballman, and Theresa J. Buczek. 2015. News Content About Mass Shootings and Attitudes Toward Mental Illness. Journalism & Mass Communication Quarterly, 1-- 15.
[52]
Pamela Wisniewski, Xu Heng, Heather Lipford, and Emmanuel Bello-Ogunu. 2015. Facebook apps and tagging: the trade-off between personal privacy and engaging with friends. Journal of the Association for Information Science and Technology 66, 9, 1883--1896.
[53]
Pamela Wisniewski, A.K.M. Najmul Islam, Bart P Knijnenburg, and Sameer Patil. 2015. Give social network users the privacy they want. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW), 1427--1441.
[54]
Heng Xu, Tamara Dinev, Jeff Smith, and Paul Hart. 2011. Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems 12, 12, 798-- 824.
[55]
Rodrigo Zamith and Seth C. Lewis. 2014. From public spaces to public sphere. Digital Journalism 2, 4, 558--574.

Cited By

View all
  • (2024)Working with AI Sound: Exploring the Future of Workplace AI Sound TechnologiesProceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work10.1145/3663384.3663391(1-21)Online publication date: 25-Jun-2024
  • (2024)Ethics Pathways: A Design Activity for Reflecting on Ethics Engagement in HCI ResearchProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660714(3515-3533)Online publication date: 1-Jul-2024
  • (2023)Governing principles: Articulating values in social media platform policiesNew Media & Society10.1177/14614448231156580(146144482311565)Online publication date: 7-Mar-2023
  • Show More Cited By

Index Terms

  1. "We Are the Product": Public Reactions to Online Data Sharing and Privacy Controversies in the Media

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
    April 2018
    8489 pages
    ISBN:9781450356206
    DOI:10.1145/3173574
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 April 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data
    2. data sharing
    3. ethics
    4. journalism
    5. non-use
    6. online comments
    7. online platforms
    8. policy
    9. privacy
    10. social media
    11. terms of service

    Qualifiers

    • Research-article

    Conference

    CHI '18
    Sponsor:

    Acceptance Rates

    CHI '18 Paper Acceptance Rate 666 of 2,590 submissions, 26%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)253
    • Downloads (Last 6 weeks)25
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Working with AI Sound: Exploring the Future of Workplace AI Sound TechnologiesProceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work10.1145/3663384.3663391(1-21)Online publication date: 25-Jun-2024
    • (2024)Ethics Pathways: A Design Activity for Reflecting on Ethics Engagement in HCI ResearchProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660714(3515-3533)Online publication date: 1-Jul-2024
    • (2023)Governing principles: Articulating values in social media platform policiesNew Media & Society10.1177/14614448231156580(146144482311565)Online publication date: 7-Mar-2023
    • (2023)Escaping the Walled Garden? User Perspectives of Control in Data Portability for Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/36101887:CSCW2(1-27)Online publication date: 4-Oct-2023
    • (2023)From Human to Data to Dataset: Mapping the Traceability of Human Subjects in Computer Vision DatasetsProceedings of the ACM on Human-Computer Interaction10.1145/35794887:CSCW1(1-33)Online publication date: 16-Apr-2023
    • (2023)Comprehension from Chaos: Towards Informed Consent for Private ComputationProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623152(210-224)Online publication date: 15-Nov-2023
    • (2023)Facebook Data Shield: Increasing Awareness and Control over Data used by Newsfeed-Generating AlgorithmsProceedings of the Seventeenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3569009.3573116(1-6)Online publication date: 26-Feb-2023
    • (2023)Architecture for Confidential Digital Asset Transfer on Blockchain Through Obfuscation2023 IEEE 31st International Conference on Network Protocols (ICNP)10.1109/ICNP59255.2023.10355588(1-6)Online publication date: 10-Oct-2023
    • (2023)Robust Decentralised Proof-of-Position Algorithms for Smart City Applications2023 62nd IEEE Conference on Decision and Control (CDC)10.1109/CDC49753.2023.10384054(112-119)Online publication date: 13-Dec-2023
    • (2023)The marketplace of interpretations: a method to trace diversity in digital interpretive tracesInformation, Communication & Society10.1080/1369118X.2023.2291461(1-19)Online publication date: 12-Dec-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media