Philosophy & Technology

, Volume 25, Issue 3, pp 415–434

Negotiating Privacy Through Phatic Communication. A Case Study of the Blogging Self

Special Issue


The article provides an instructive in-depth analysis of communicative practices in the personal blog. Its aim is to document the discursive dynamics and interactional ethics of blogging, with a specific focus on negotiations of the blogging self in-between public and private. Based on key findings from an empirical case study of personal blogs, the article addresses the negotiation of the blogging self from three interdependent perspectives: the network structures, patterns of interaction, and thematic orientations of the blog. Instead of approaching the online self as the individual blogger’s self-presentation to an often unknown and unfamiliar audience, I analyse and discuss the ‘blogging self’ as a relational and collaborative accomplishment, as something that is constantly subject to negotiation between author and readers, and is framed by the blog as a communicative genre. The theoretical foundation for this relational approach to the self is inspired by the work of sociologist Georg Simmel on how individuals attune to their networks of affiliation in a process of socialisation (Simmel 1955). The article contributes to the discussion of ethical behaviour and privacy protection in social media by highlighting the role of phatic communication in the blog. Specifically, I demonstrate how participants in the blog network negotiate and maintain an ethos of privacy protection in and through practices associated with the phatic. They do this by adhering to a ‘principle of sociability’, allowing them to experience their communication as personal but not private.


Negotiated selves Blogging Network Ethos of privacy Phatic communication Principle of sociability Simmel 


  1. Baumer, E., Sueyoshi, M. and Tomlinson B. (2008). Exploring the role of the reader in the activity of blogging. Proceeding of the Twenty-Sixth Annual Sigchi Conference On Human Factors In Computing Systems, 11111120. Florence, ItalyGoogle Scholar
  2. Baym, N. K. (2000). Tune in, log on. Soaps, fandom, and online community. Thousand Oaks, California: Sage PublicationsGoogle Scholar
  3. Boyd, D.M. (2008). Taken out of context. American teen sociality in networked publics, PhD Thesis. University of California, Berkeley. Retrieved from
  4. Bruns, A. (2008). Blogs, wikipedia, second life, and beyond: From production to produsage. New York: Peter Lang.Google Scholar
  5. Ess, C. (2009). Digital media ethics. Cambridge, UK: Polity Press.Google Scholar
  6. Ess, C. & AoIR Ethics Working Committee (2002). Ethical decision-making and Internet research: Recommendations from the AoIR Ethics Working Committee. Retrieved from
  7. Finnemann, N. O. (2003). Netværk, medier og identitet. In I. Bondebjerg & H. Bang (Eds.), Netværksbegrebet og netværkssamfundet (pp. 37–53). Copenhagen: Modinet, Working paper no. 4.Google Scholar
  8. Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 7, 185–200.CrossRefGoogle Scholar
  9. Furukawa, T., Matsuo, Y., Ohmukai, I., Uchiyama, K., & Ishizuka, M. (2007). Social networks and reading behavior in the blogosphere. Proceedings of ICWSM, 2007, 51–58.Google Scholar
  10. Gajjala, R. (2009). How can researchers make sense of the issues involved in collecting and interpreting online and offline data: Response to Shani Orgad. In A. N. Markham & N. K. Baym (Eds.), Internet Inquiry: conversations about method (pp. 61–68). Thousand Oaks, CA: Sage Publications.Google Scholar
  11. Garfinkel, H. (1967). Studies in ethnomethodology. Englewood Cliffs, New York: Prentice-Hall.Google Scholar
  12. Harrison, S. (2008). Turn taking in email discussions. In S. Kelsey & K. St.Amant (eds.). Handbook of Research on Computer Mediated Communication (pp. 755–772). Hershey, PA: Information Science Reference.Google Scholar
  13. Haythornthwaite, C. (2000). Online personal networks: Size, composition and media use among distance learners. New Media & Society, 2(2), 195–266.CrossRefGoogle Scholar
  14. Herring, S. (1999). Interactional Coherence in CMC. Journal of Computer-Mediated Communication, 4(4) Google Scholar
  15. Herring, S. C., & Paolillo, J. C. (2006). Gender and genre variation in weblogs. Journal of Sociolinguistics, 10(4), 439–459.CrossRefGoogle Scholar
  16. Honeycutt, C., & Herring, S. C. (2009). Beyond microblogging: Conversation and collaboration via Twitter. Proceedings of the Forty-Second Hawai’i International Conference on System Sciences (HICSS-42). Los Alamitos, CA: IEEE Press.Google Scholar
  17. Kendall, L. (2007). "Shout Into the Wind, and It Shouts Back". Identity and interactional tensions on LiveJournal. First Monday, 12(9) Google Scholar
  18. Lomborg, S. (2009). Navigating the blogosphere: towards a genre-based typology of weblogs. First Monday, 14(5)Google Scholar
  19. Miller, V. (2008). New media networking and phatic culture. Convergence, 14(4), 387–400.Google Scholar
  20. Moor, J. (2002). Towards a theory of privacy in the information age. In R. M. Baird, R. Ramsower, & S. E. Rosenbaum (Eds.), Cyberethics: Social and moral issues in the computer age (pp. 200–212). Amherst, N.Y: Prometheus Books.Google Scholar
  21. Nardi, B. A., Schiano, D. J., & Gumbrecht, M. (2004). Blogging as social activity, or, would you let 900 million people read your diary? Proceedings of the 2004 ACM conference on Computer Supported Cooperative Work, 222–231.Google Scholar
  22. Rettberg, J. W. (2008). Blogging. Cambridge, UK: Polity Press.Google Scholar
  23. Sacks, H. (1992). In G. Jefferson (Ed.), Lectures on conversation. Oxford, UK & Cambridge, US: Blackwell Publishing.Google Scholar
  24. Shoemaker, D. W. (2010). Self-exposure and exposure of the self: informational privacy and the presentation of identity. Ethics and Information Technology, 12, 3–15.CrossRefGoogle Scholar
  25. Simmel, G. (1955). Conflict and the web of group-affiliations. New York: The Free Press.Google Scholar
  26. Simmel, G. (1971). Sociability. In D. N. Levine & Simmel Georg (Eds.), On individuality and social forms. Selected writings (pp. 127–140). Chicago and London: The University of Chicago Press.Google Scholar
  27. Strikwerda, L. (2011). Information privacy, the right to receive information and (mobile) ICTs. In C. Ess & M. Thorseth (Eds.), Trust and virtual worlds: Contemporary perspectives. London: Peter Lang.Google Scholar
  28. Thorseth, M. (2008). Reflective judgment and enlarged thinking online. Ethics and Information Technology, 10, 221–231.CrossRefGoogle Scholar
  29. Viégas, F. B. (2005). Bloggers' expectations of privacy and accountability: an initial survey. Journal of Computer-Mediated Communication, 10(3)Google Scholar
  30. Werry, C. (1996). Linguistic and interactional features of internet relay chat. In S. C. Herring (Ed.), Computer-mediated communication: Linguistic, social and cross-cultural perspectives (pp. 47–64). Amsterdam: John Benjamins.Google Scholar

Copyright information

© Springer-Verlag 2011

Authors and Affiliations

  1. 1.Department of Information and Media StudiesAarhus UniversityAarhusDenmark

Personalised recommendations