Skip to main content

Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook

  • Conference paper
Trust and Trustworthy Computing (Trust 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7904))

Included in the following conference series:

Abstract

We offer a qualitative analysis of on-line safety practices and expectations in a community setting to look at trust practices that contribute to the complexity of information behaviors in the use of social media. Staging an encounter between local families by bringing together grandmothers and granddaughters at a workshop, we interrogate resulting discussions to understand how information practices are deployed to perform and interpret social identity. The analysis reveals the importance of trust practices and in particular, shows the tension between inward-looking and outward-looking behavior and how different perspectives on trust influence the manner in which communities work to protect members and police alternative uses of Facebook. In doing so, we add to knowledge about on-line safety and trust practices and the roles that families and tools play in supporting, enforcing and augmenting these practices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barnard-Wills, D., Ashenden, D.: Public sector engagement with online identity management. Identity in the Information Society, 1–18 (2010)

    Google Scholar 

  2. Belk, R., Wallendorf, M., Sherry Jnr, J.F.: The Sacred and the Profane in Consumer Behavior: Theodicy on the Odyssey. J. Consumer Research 16(1), 1–38 (1989)

    Article  Google Scholar 

  3. Binder, T.: Why Design:Labs? In: NORDES 2007, 2nd Nordic Design Research Conference, Konstfack, Stockholm (May 2007)

    Google Scholar 

  4. Butler, J.: Gender Trouble: Feminism and the Subversion of Identity. Routledge, NY (1990)

    Google Scholar 

  5. Coles-Kemp, L., Kani-Zabihi, E.: Practice Makes Perfect: Motivating confident on-line privacy protection practices. In: IEEE International Conference on Social Computing (2011)

    Google Scholar 

  6. Dourish, P., Anderson, K.: Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. J. HCI 21(3), 319–342 (2006)

    Google Scholar 

  7. Dourish, P., Bell, G.: Divining a Digital Future: Mess and Mythology in Ubiquitous Computing. MIT (2011)

    Google Scholar 

  8. Hodkinson, P., Lincoln, S.: Online Journals as Virtual Bedrooms?’ In Young: Nordic Journal of Youth Research (2008)

    Google Scholar 

  9. Knoblauch, H., Schnettler, B., Raab, J., Soeffner, H. (eds.): Video Analysis: Methodology and Methods. Peter Lang (2006)

    Google Scholar 

  10. Light, A.: Adding Method to Meaning: a technique for exploring peoples’ experience with digital products. Behaviour & Information Technology 25(2), 175–187 (2006)

    Article  Google Scholar 

  11. Light, A.: HCI as heterodoxy: Technologies of Identity and the Queering of Interaction Design. IwC 23(5) (2011)

    Google Scholar 

  12. Miller, D.: Tales from Facebook. Polity Press (2011)

    Google Scholar 

  13. NISA: To Log or Not to Log? – Risk and Benefits of Life-Logging Applications (2011), http://www.enisa.europa.eu/activities/risk-management/emerging-and-future-risk/deliverables/life-logging-risk-assessment (retrieved)

  14. Nissenbaum, H.: Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books (2009)

    Google Scholar 

  15. Odom, W., Zimmerman, J., Forlizzi, J.: Designing for Dynamic Family Structures: Divorced Families and Interactive Systems. In: Proc. DIS 2010, pp. 151–160 (2010)

    Google Scholar 

  16. O’Hara, K.: Transparent government, not transparent citizens: a report on privacy and transparency for the Cabinet Office. London, GB, Cabinet Office (2011)

    Google Scholar 

  17. Reeves, B., Nass, C.: The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places. CUP, Cambridge (1996)

    Google Scholar 

  18. Sambasivan, N., Cutrell, E., Toyama, K., Nardi, B.A.: Intermediated technology use in developing communities. In: Proc. CHI 2010 (2010)

    Google Scholar 

  19. Stutzman, F., Kramer-Duffield, J.: Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. In: Proc. CHI 2010 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Light, A., Coles-Kemp, L. (2013). Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook. In: Huth, M., Asokan, N., ÄŒapkun, S., Flechais, I., Coles-Kemp, L. (eds) Trust and Trustworthy Computing. Trust 2013. Lecture Notes in Computer Science, vol 7904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38908-5_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38907-8

  • Online ISBN: 978-3-642-38908-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics