Abstract
We offer a qualitative analysis of on-line safety practices and expectations in a community setting to look at trust practices that contribute to the complexity of information behaviors in the use of social media. Staging an encounter between local families by bringing together grandmothers and granddaughters at a workshop, we interrogate resulting discussions to understand how information practices are deployed to perform and interpret social identity. The analysis reveals the importance of trust practices and in particular, shows the tension between inward-looking and outward-looking behavior and how different perspectives on trust influence the manner in which communities work to protect members and police alternative uses of Facebook. In doing so, we add to knowledge about on-line safety and trust practices and the roles that families and tools play in supporting, enforcing and augmenting these practices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barnard-Wills, D., Ashenden, D.: Public sector engagement with online identity management. Identity in the Information Society, 1–18 (2010)
Belk, R., Wallendorf, M., Sherry Jnr, J.F.: The Sacred and the Profane in Consumer Behavior: Theodicy on the Odyssey. J. Consumer Research 16(1), 1–38 (1989)
Binder, T.: Why Design:Labs? In: NORDES 2007, 2nd Nordic Design Research Conference, Konstfack, Stockholm (May 2007)
Butler, J.: Gender Trouble: Feminism and the Subversion of Identity. Routledge, NY (1990)
Coles-Kemp, L., Kani-Zabihi, E.: Practice Makes Perfect: Motivating confident on-line privacy protection practices. In: IEEE International Conference on Social Computing (2011)
Dourish, P., Anderson, K.: Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. J. HCI 21(3), 319–342 (2006)
Dourish, P., Bell, G.: Divining a Digital Future: Mess and Mythology in Ubiquitous Computing. MIT (2011)
Hodkinson, P., Lincoln, S.: Online Journals as Virtual Bedrooms?’ In Young: Nordic Journal of Youth Research (2008)
Knoblauch, H., Schnettler, B., Raab, J., Soeffner, H. (eds.): Video Analysis: Methodology and Methods. Peter Lang (2006)
Light, A.: Adding Method to Meaning: a technique for exploring peoples’ experience with digital products. Behaviour & Information Technology 25(2), 175–187 (2006)
Light, A.: HCI as heterodoxy: Technologies of Identity and the Queering of Interaction Design. IwC 23(5) (2011)
Miller, D.: Tales from Facebook. Polity Press (2011)
NISA: To Log or Not to Log? – Risk and Benefits of Life-Logging Applications (2011), http://www.enisa.europa.eu/activities/risk-management/emerging-and-future-risk/deliverables/life-logging-risk-assessment (retrieved)
Nissenbaum, H.: Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books (2009)
Odom, W., Zimmerman, J., Forlizzi, J.: Designing for Dynamic Family Structures: Divorced Families and Interactive Systems. In: Proc. DIS 2010, pp. 151–160 (2010)
O’Hara, K.: Transparent government, not transparent citizens: a report on privacy and transparency for the Cabinet Office. London, GB, Cabinet Office (2011)
Reeves, B., Nass, C.: The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places. CUP, Cambridge (1996)
Sambasivan, N., Cutrell, E., Toyama, K., Nardi, B.A.: Intermediated technology use in developing communities. In: Proc. CHI 2010 (2010)
Stutzman, F., Kramer-Duffield, J.: Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. In: Proc. CHI 2010 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Light, A., Coles-Kemp, L. (2013). Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook. In: Huth, M., Asokan, N., ÄŒapkun, S., Flechais, I., Coles-Kemp, L. (eds) Trust and Trustworthy Computing. Trust 2013. Lecture Notes in Computer Science, vol 7904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-38908-5_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38907-8
Online ISBN: 978-3-642-38908-5
eBook Packages: Computer ScienceComputer Science (R0)