Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

"It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media

Published: 29 May 2020 Publication History

Abstract

Sanctions play an essential role in enforcing and sustaining social norms. On social networking sites (SNS), sanctions allow individuals to shape community norms on appropriate privacy respecting behaviors. Existing theories of privacy assume the use of such sanctions but do not examine the extent and effectiveness of sanctioning behaviors. We conducted a qualitative interview study of young adults (N=23), and extend research on collective boundary regulation by studying sanctions in the context of popular SNS. Through a systematization of sanctioning strategies, we find that young adults prefer to use indirect and invisible sanctions to preserve strong-tie relationships. Such sanctions are not always effective in helping the violator understand the nature of their normative violation. We offer suggestions on supporting online sanctioning that make norms more visible and signal violations in ways that avoid direct confrontation to reduce the risk of harming on-going social relationships.

References

[1]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole, Monterey, CA.
[2]
Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of the 2016 SIGCHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, 3906--3918. https://doi.org/10.1145/2858036.2858096
[3]
Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, and Ilse De Bourdeaudhuij. 2015. `Can I afford to help?' How Affordances of Communication Modalities Guide Bystanders' Helping Intentions Towards Harassment on Social Network Sites. Behaviour & Information Technology, Vol. 34, 4 (2015), 425--435.
[4]
Roy F Baumeister, Liqing Zhang, and Kathleen D Vohs. 2004. Gossip as Cultural Learning. Review of general psychology, Vol. 8, 2 (2004), 111--121.
[5]
Andrew V Beale and Kimberly R Hall. 2007. Cyberbullying: What School Administrators (and Parents) Can Do. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, Vol. 81, 1 (2007), 8--12.
[6]
Jörg R Bergmann. 1993. Discreet Indiscretions: The Social Organization of Gossip. Aldine, Chicago, IL.
[7]
Andrew Besmer and Heather Richter Lipford. 2010. Moving Beyond Untagging: Photo Privacy in a Tagged World. In Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, 1563--1572. https://doi.org/10.1145/1753326.1753560
[8]
Lindsay Blackwell, Tianying Chen, Sarita Schoenebeck, and Cliff Lampe. 2018. When Online Harassment is Perceived as Justified. In Proceedings of the 12th International AAAI Conference on Web and Social Media. AAAI Press.
[9]
Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '17). ACM, New York, NY, USA, Article 24, 19 pages. https://doi.org/10.1145/3134659
[10]
danah boyd. 2002. Faceted Id/entity: Managing Representation in a Digital World. Ph.D. Dissertation. Massachusetts Institute of Technology.
[11]
Penelope Brown and Stephen C Levinson. 1987. Politeness: Some Universals in Language Usage. Vol. 4. Cambridge University Press, Cambridge, UK.
[12]
Judee K Burgoon. 1978. A Communication Model of Personal Space Violations: Explication And an Initial Test. Human Communication Research, Vol. 4, 2 (1978), 129--142.
[13]
Judee K Burgoon. 1993. Interpersonal Expectations, Expectancy Violations, and Emotional Communication. Journal of Language and Social Psychology, Vol. 12, 1--2 (1993), 30--48.
[14]
Gary Burnett and Laurie Bonnici. 2003. Beyond the FAQ: Explicit and Implicit Norms in Usenet Newsgroups. Library & Information Science Research, Vol. 25, 3 (2003), 333--351.
[15]
Kelly Erinn Caine. 2009. Exploring Everyday Privacy Behaviors and Misclosures. Ph.D. Dissertation. Georgia Institute of Technology.
[16]
Stevie Chancellor, Jessica Annette Pater, Trustin Clear, Eric Gilbert, and Munmun De Choudhury. 2016. #Thyghgapp: Instagram Content Moderation and Lexical Variation in Pro-Eating Disorder Communities. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, 1201--1213. https://doi.org/10.1145/2818048.2819963
[17]
Eshwar Chandrasekharan, Mattia Samory, Shagun Jhaver, Hunter Charvat, Amy Bruckman, Cliff Lampe, Jacob Eisenstein, and Eric Gilbert. 2018. The Internet's Hidden Rules: An Empirical Study of Reddit Norm Violations at Micro, Meso, and Macro Scales. Proceedings of ACM Human-Computer Interaction, Vol. 2, CSCW, Article 32 (Nov. 2018), 25 pages. https://doi.org/10.1145/3274301
[18]
Nadine Chaurand and Markus Brauer. 2008. What Determines Social Control? People's Reactions to Counternormative Behaviors in Urban Environments. Journal of Applied Social Psychology, Vol. 38, 7 (2008), 1689--1715.
[19]
Peggy Chekroun and Markus Brauer. 2002. The Bystander Effect and Social Control Behavior: The Effect of the Presence of Others on People's Reactions to Norm Violations. European Journal of Social Psychology, Vol. 32, 6 (2002), 853--867.
[20]
Elizabeth Chell. 2004. Critical Incident Technique. In Essential Guide to Qualitative Methods in Organizational Research. SAGE Publications, 45--60.
[21]
Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2014. How Community Feedback Shapes User Behavior. In Proceedings of the 8th International AAAI Conference on Web and Social Media .
[22]
Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2015. Antisocial Behavior in Online Discussion Communities. In Proceedings of the 9th International AAAI Conference on Web and Social Media .
[23]
Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, 503--514. https://doi.org/10.1145/2818048.2819996
[24]
Natalia Criado and Jose M Such. 2015. Implicit Contextual Integrity in Online Social Networks. Information Sciences, Vol. 325 (2015), 48--69.
[25]
Michael A. DeVito, Jeremy Birnholtz, and Jeffery T. Hancock. 2017. Platforms, People, and Perception: Using Affordances to Understand Self-Presentation on Social Media. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 740--754. https://doi.org/10.1145/2998181.2998192
[26]
Paul Dourish and Ken Anderson. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Proceedings of Human-Computer Interaction, Vol. 21, 3 (2006), 319--342.
[27]
Robert C Ellickson. 1991. Order Without Law. Harvard University Press, Cambridge, MA.
[28]
Nicole Ellison, Rebecca Heino, and Jennifer Gibbs. 2006. Managing Impressions Online: Self-presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication, Vol. 11, 2 (2006), 415--441.
[29]
Nicole B. Ellison, Megan French, Eden Litt, S. Shyam Sundar, and Penny Trieu. 2018. Without a Trace: How Studying Invisible Interactions Can Help Us Understand Social Media. In Proceedings of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '18). ACM, New York, NY, 129--132. https://doi.org/10.1145/3272973.3274544
[30]
Ernst Fehr and Urs Fischbacher. 2004. Social Norms and Human Cooperation. Trends in cognitive sciences, Vol. 8, 4 (2004), 185--190.
[31]
Katleen Gabriels and Charlotte JS De Backer. 2016. Virtual Gossip: How Gossip Regulates Moral Life in Virtual Worlds. Computers in Human Behavior, Vol. 63 (2016), 683--693.
[32]
Vaibhav Garg, Sameer Patil, Apu Kapadia, and L. Jean Camp. 2013. Peer-produced Privacy Protection. In IEEE International Symposium on Technology and Society (ISTAS). 147--154. https://doi.org/10.1109/ISTAS.2013.6613114
[33]
Ilana Gershon. 2010. The breakup 2.0: Disconnecting Over New Media. Cornell University Press, Ithaca, NY.
[34]
Anthony Giddens, Mitchell Duneier, Richard P Appelbaum, and Deborah Carr. 2006. Essentials of Sociology. W. W. Norton, New York.
[35]
Eric Gilbert. 2013. Widespread Underprovision on Reddit. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, 803--808. https://doi.org/10.1145/2441776.2441866
[36]
Erving Goffman. 1959. The Presentation of Self in Everyday Life. Anchor Books, New York.
[37]
Erving Goffman. 2009. Stigma: Notes on the Management of Spoiled Identity. Simon and Schuster.
[38]
Caroline Haythornthwaite. 2005. Social networks and Internet connectivity effects. Information, Community & Society, Vol. 8, 2 (2005), 125--147.
[39]
George Caspar Homans. 1950. The Human Group. Harcourt, New York.
[40]
Val Hooper and Tarika Kalidas. 2012. Acceptable and Unacceptable Behaviour on Social Networking Sites: A Study of The Behavioural Norms of Youth on Facebook. Electronic Journal of Information Systems Evaluation, Vol. 15, 3 (2012), 259.
[41]
Christine Horne. 2003. The Internal Enforcement of Norms. European Sociological Review, Vol. 19, 4 (2003), 335--343.
[42]
Craig D Howard, Andrew F Barrett, and Theodore W Frick. 2010. Anonymity to Promote Peer Feedback: Pre-Service Teachers' Comments in Asynchronous Computer-Mediated Communication. Journal of Educational Computing Research, Vol. 43, 1 (2010), 89--112.
[43]
Julie Hui, Amos Glenn, Rachel Jue, Elizabeth Gerber, and Steven Dow. 2015. Using Anonymity and Communal Efforts to Improve Quality of Crowdsourced Feedback. In Proceedings of the 3rd AAAI Conference on Human Computation and Crowdsourcing (HCOMP '15). 72--82.
[44]
Haiyan Jia and Heng Xu. 2016. Autonomous and Interdependent: Collaborative Privacy Management on Social Networking Sites. In Proceedings of the 2016 SIGCHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, 4286--4297. https://doi.org/10.1145/2858036.2858415
[45]
Rosabeth Moss Kanter. 2008. Men and Women of The Corporation. Basic, New York.
[46]
Matthew Kay, Cynthia Matuszek, and Sean A. Munson. 2015. Unequal Representation and Gender Stereotypes in Image Search Results for Occupations. In Proceedings of the 2015 SIGCHI Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, 3819--3828. https://doi.org/10.1145/2702123.2702520
[47]
Rob Kling, Ya-ching Lee, Al Teich, and Mark S Frankel. 1999. Assessing anonymous communication on the internet: Policy deliberations. The Information Society, Vol. 15, 2 (1999), 79--90.
[48]
Robert E Kraut and Paul Resnick. 2012a. Building Successful Online Communities: Evidence-based Social Design .MIT Press, Cambridge, MA, Chapter Regulating Behavior in Online Communities, 125--177.
[49]
Robert E Kraut and Paul Resnick. 2012b. Building Successful Online Communities: Evidence-based Social Design. MIT Press, Cambridge, MA.
[50]
Cliff Lampe, Nicole B. Ellison, and Charles Steinfield. 2008. Changes in Use and Perception of Facebook. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (CSCW '08). ACM, New York, NY, 721--730. https://doi.org/10.1145/1460563.1460675
[51]
Cliff Lampe and Erik Johnston. 2005. Follow the (Slash) Dot: Effects of Feedback on New Members in an Online Community. In Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work (GROUP '05). ACM, New York, NY, 11--20. https://doi.org/10.1145/1099203.1099206
[52]
Cliff Lampe, Erik Johnston, and Paul Resnick. 2007. Follow the Reader: Filtering Comments on Slashdot. In Proceedings of the 2007 SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, New York, NY, 1253--1262. https://doi.org/10.1145/1240624.1240815
[53]
Cliff Lampe, Jessica Vitak, Rebecca Gray, and Nicole Ellison. 2012. Perceptions of Facebook's Value As an Information Source. In Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, 3195--3204. https://doi.org/10.1145/2207676.2208739
[54]
Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it Together: Interpersonal Management of Disclosure in Social Network Services. In Proceedings of the 2011 SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 3217--3226. https://doi.org/10.1145/1978942.1979420
[55]
Airi Lampinen, Sakari Tamminen, and Antti Oulasvirta. 2009. All My People Right Here, Right Now: Management of Group Co-presence on a Social Networking Site. In Proceedings of the 2009 ACM International Conference on Supporting Group Work (GROUP '09). ACM, New York, NY, 281--290. https://doi.org/10.1145/1531674.1531717
[56]
Maria Knight Lapinski and Rajiv N Rimal. 2005. An Explication of Social Norms. Communication theory, Vol. 15, 2 (2005), 127--147.
[57]
Lawrence Lessig. 1999. Code and Other Laws of Cyberspace. Basic Books, Inc., New York.
[58]
Aart C Liefbroer and Francesco C Billari. 2010. Bringing Norms Back In: A Theoretical and Empirical Discussion of Their Importance for Understanding Demographic Behaviour. Population, Space and Place, Vol. 16, 4 (2010), 287--305.
[59]
Eden Litt, Erin Spottswood, Jeremy Birnholtz, Jeff T Hancock, Madeline E Smith, and Lindsay Reynolds. 2014. Awkward Encounters of an Other Kind: Collective Self-presentation and Face Threat on Facebook. In Proceedings of the 2014 ACM conference on Computer Supported Cooperative Work & Social Computing (CSCW '14). ACM, New York, NY, 449--460. https://doi.org/10.1145/2531602.2531646
[60]
Marisela Gutierrez Lopez and Saila Ovaska. 2013. A Look at Unsociability on Facebook. In Proceedings of the 27th International BCS Human Computer Interaction Conference (BCS-HCI '13). British Computer Society, Swinton, UK, UK, Article 13, 10 pages.
[61]
Davan Maharaj. 1997. UCI Internet Hate Mail Case Ruled a Mistrial. https://www.latimes.com/archives/la-xpm-1997-nov-22-mn-56652-story.html Accessed Apr 4., 2019.
[62]
Lena Mamykina, Bella Manoim, Manas Mittal, George Hripcsak, and Björn Hartmann. 2011. Design Lessons From the Fastest Q&a Site in the West. In Proceedings of the 2011 SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 2857--2866. https://doi.org/10.1145/1978942.1979366
[63]
Alice E Marwick and danah boyd. 2014. Networked privacy: How Teenagers Negotiate Context in Social Media. New media & society, Vol. 16, 7 (2014), 1051--1067.
[64]
Caitlin McLaughlin and Jessica Vitak. 2012. Norm Evolution and Violation on Facebook. New media & society, Vol. 14, 2 (2012), 299--315.
[65]
Jae Yun Moon and Lee S Sproull. 2008. The Role of Feedback in Managing the Internet-Based Volunteer Work Force. Information Systems Research, Vol. 19, 4 (2008), 494--515.
[66]
Jonathan T. Morgan and Anna Filippova. 2018. 'Welcome' Changes?: Descriptive and Injunctive Norms in a Wikipedia Sub-Community. Proceedings of the ACM Human-Computer Interaction, Vol. 2, CSCW, Article 52 (Nov. 2018), 26 pages. https://doi.org/10.1145/3274321
[67]
Alison R. Murphy, Madhu C. Reddy, and Heng Xu. 2014. Privacy Practices in Collaborative Environments: A Study of Emergency Department Staff. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '14). ACM, New York, NY, 269--282.
[68]
David M Newman. 2018. Sociology: Exploring the Architecture of Everyday Life. Sage Publications.
[69]
Christena E Nippert-Eng. 2010. Islands of Privacy. University of Chicago Press, Chicago, IL.
[70]
Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Redwood City.
[71]
Karl-Dieter Opp. 2001. How Do Norms Emerge? An Outline of a Theory. Mind & Society, Vol. 2, 1 (2001), 101--128.
[72]
Elinor Ostrom. 1990. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press.
[73]
Leysia Palen and Paul Dourish. 2003. Unpacking “Privacy” for a Networked World. In Proceedings of the 2003 SIGCHI Conference on Human Factors in Computing Systems (CHI '03). ACM, New York, NY, 129--136. https://doi.org/10.1145/642611.642635
[74]
Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY.
[75]
Richard A Posner and Eric B Rasmusen. 1999. Creating and Enforcing Norms, with Special Reference to Sanctions. International Review of Law and Economics, Vol. 19, 3 (1999), 369--382.
[76]
Tom Postmes, Russell Spears, and Martin Lea. 2000. The Formation of Group Norms in Computer-Mediated Communication. Human Communication Research, Vol. 26, 3 (2000), 341--371.
[77]
Artemio Ramirez Jr and Shuangyue Zhang. 2007. When Online Meets Offline: The Effect of Modality Switching on Relational Communication. Communication Monographs, Vol. 74, 3 (2007), 287--310.
[78]
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. "You don't want to be the next meme": College Studentstextquoteright Workarounds to Manage Privacy in the Era of Pervasive Photography. In Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS 2018) (SOUPS '18). USENIX Association, Baltimore, MD, 143--157.
[79]
Carmen Santamar'ia-Garc'ia. 2014. Evaluative Discourse and Politeness in University Students' Communication Through Social Networking Sites. Evaluation in context, Vol. 242 (2014), 387.
[80]
Richard Schaefer and Robert LAMM. 1995. Sociology. McGraw-Hill, New York.
[81]
Sarita Yardi Schoenebeck. 2013. The Secret Life of Online Moms: Anonymity and Disinhibition on Youbemom. com. In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media .
[82]
Joseph Seering, Robert Kraut, and Laura Dabbish. 2017. Shaping Pro and Anti-Social Behavior on Twitch Through Moderation and Example-Setting. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 111--125. https://doi.org/10.1145/2998181.2998277
[83]
Linda Shallcross, Michael Sheehan, and Sheryl Ramsay. 2008. Workplace Mobbing: Experiences in The Public Sector. Workplace Mobbing: Experiences in the public sector, Vol. 13, 2 (2008), 56--70.
[84]
Christina Parajon Skinner. 2011. Unprofessional Sides of Social Media and Social Networking: How Current Standards Fall Short. SCL Rev., Vol. 63 (2011), 241.
[85]
Aaron Smith and Monica Anderson. 2018. Social Media Use in 2018. https://www.pewinternet.org/2018/03/01/social-media-use-in-2018/ Accessed Mar. 31, 2019.
[86]
Daniel J Solove. 2005. A Taxonomy of Privacy. U. Pa. L. Rev., Vol. 154 (2005), 477--564.
[87]
Daniel J Solove. 2007. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. Yale University Press, New Haven, CT.
[88]
Anna C Squicciarini, Heng Xu, and Xiaolong Luke Zhang. 2011. CoPE: Enabling Collaborative Privacy Management in Online Social Networks. Journal of the Association for Information Science and Technology, Vol. 62, 3 (2011), 521--534.
[89]
Anselm Strauss and Juliet Corbin. 1998. Basics of Qualitative Research : Techniques and Procedures for Developing Grounded Theory. Sage Publications, Thousand Oaks, CA.
[90]
Fred Stutzman and Woodrow Hartzog. 2012. Boundary Regulation in Social Media. In Proceedings of the 2012 ACM Conference on Computer Supported Cooperative Work (CSCW '12). ACM, New York, NY, 769--778. https://doi.org/10.1145/2145204.2145320
[91]
Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends Only: Examining a Privacy-enhancing Behavior in Facebook. In Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 1553--1562. https://doi.org/10.1145/1753326.1753559
[92]
Jose M Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, 3821--3832.
[93]
John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior, Vol. 7, 3 (2004), 321--326.
[94]
Lee Taber and Steve Whittaker. 2018. Personality Depends on The Medium: Differences in Self-Perception on Snapchat, Facebook and Offline. In Proceedings of the 2018 SIGCHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, Article 607, 13 pages. https://doi.org/10.1145/3173574.3174181
[95]
Alex S. Taylor and Richard Harper. 2003. The Gift of the Gab?: A Design Oriented Sociology of Young People's Use of Mobiles. Computer Supported Cooperative Work, Vol. 12, 3 (July 2003), 267--296. https://doi.org/10.1023/A:1025091532662
[96]
Twitter. 2019. About your activity dashboard. https://help.twitter.com/en/managing-your-account/using-the-tweet-activity-dashboard Accessed June. 26, 2019.
[97]
Suvi Uski and Airi Lampinen. 2016. Social Norms and Self-presentation on Social Network Sites: Profile Work in Action. New media & society, Vol. 18, 3 (2016), 447--464.
[98]
Daniel Villatoro, Giulia Andrighetto, Jordi Sabater-Mir, and Rosaria Conte. 2011. Dynamic Sanctioning for Robust and Cost-Efficient Norm Compliance. In Proceedings of the 22nd International AAAI Conference on Joint Conference on Artificial Intelligence. AAAI Press, Barcelona, 414--419.
[99]
Joseph B Walther, Brandon Van Der Heide, Lauren M Hamel, and Hillary C Shulman. 2009. Self-generated Versus Other-generated Statements and Impressions in Computer-Mediated Communication: A Test of Warranting Theory Using Facebook. Communication Research, Vol. 36, 2 (2009), 229--253.
[100]
Joseph B Walther, Brandon Van Der Heide, Sang-Yeon Kim, David Westerman, and Stephanie Tom Tong. 2008. The Role of Friends' Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep? Human Communication Research, Vol. 34, 1 (2008), 28--49.
[101]
Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, and Lorrie Faith Cranor. 2013. Privacy Nudges for Social Media: An Exploratory Facebook Study. In Proceedings of the 22Nd International Conference on World Wide Web (WWW '13). ACM, New York, NY, 763--770. https://doi.org/10.1145/2487788.2488038
[102]
Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for My Space: Coping Mechanisms for SNS Boundary Regulation. In Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, 609--618. https://doi.org/10.1145/2207676.2207761
[103]
Loreen Wolfer. 2014. They shouldn't post that! Student Perception of Inappropriate Posts on Facebook Regarding Alcohol Consumption and The Implications for Peer Socialization. Journal of Social Sciences, Vol. 10, 2 (2014), 77--85.
[104]
Heng Xu. 2011. Reframing privacy 2.0 in online social network. Constitutional Law, Vol. 14 (2011), 1077.
[105]
Nick Yee, Jeremy N Bailenson, Mark Urbanek, Francis Chang, and Dan Merget. 2007. The Unbearable Likeness of Being Digital: The Persistence of Nonverbal Social Norms in Online Virtual Environments. CyberPsychology & Behavior, Vol. 10, 1 (2007), 115--121.

Cited By

View all
  • (2024)A Review of Online Information Privacy Theories Advanced in Eight AIS Journals Over the Last DecadeInformation Resources Management Journal10.4018/IRMJ.34997737:1(1-22)Online publication date: 5-Aug-2024
  • (2024)Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children’s Online PrivacyProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642447(1-17)Online publication date: 11-May-2024
  • (2024)Does exposure to online content encouraging illegal driving influence behaviour? Exploring perspectives of different age groupsTransportation Research Part F: Traffic Psychology and Behaviour10.1016/j.trf.2024.07.004105(154-162)Online publication date: Aug-2024
  • Show More Cited By

Index Terms

  1. "It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 4, Issue CSCW1
      CSCW
      May 2020
      1285 pages
      EISSN:2573-0142
      DOI:10.1145/3403424
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 May 2020
      Published in PACMHCI Volume 4, Issue CSCW1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. boundary regulation
      2. communication privacy management
      3. norms
      4. sanctions
      5. social networking sites

      Qualifiers

      • Research-article

      Funding Sources

      • National Science Foundation

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)178
      • Downloads (Last 6 weeks)11
      Reflects downloads up to 16 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Review of Online Information Privacy Theories Advanced in Eight AIS Journals Over the Last DecadeInformation Resources Management Journal10.4018/IRMJ.34997737:1(1-22)Online publication date: 5-Aug-2024
      • (2024)Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children’s Online PrivacyProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642447(1-17)Online publication date: 11-May-2024
      • (2024)Does exposure to online content encouraging illegal driving influence behaviour? Exploring perspectives of different age groupsTransportation Research Part F: Traffic Psychology and Behaviour10.1016/j.trf.2024.07.004105(154-162)Online publication date: Aug-2024
      • (2024)Social Sanctions in Response to Injunctive Norm ViolationsCurrent Opinion in Psychology10.1016/j.copsyc.2024.101850(101850)Online publication date: Jul-2024
      • (2024)Social Acceptability of Health Behavior Posts on Social Media: An ExperimentAmerican Journal of Preventive Medicine10.1016/j.amepre.2024.01.002Online publication date: Jan-2024
      • (2023)Information behavior and psychological well-beingRecord and Library Journal10.20473/rlj.V9-I2.2023.319-3339:2(319-333)Online publication date: 19-Dec-2023
      • (2023)Ignore the Affordances; It's the Social Norms: How Millennials and Gen-Z Think About Where to Make a Post on Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/36101027:CSCW2(1-26)Online publication date: 4-Oct-2023
      • (2023)User Preferences for Interdependent Privacy Preservation Strategies in Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/36100627:CSCW2(1-30)Online publication date: 4-Oct-2023
      • (2023)Opportunities for Social Media to Support Aspiring Entrepreneurs with Financial ConstraintsProceedings of the ACM on Human-Computer Interaction10.1145/35796197:CSCW1(1-27)Online publication date: 16-Apr-2023
      • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media