The focus of this paper is upon how people handle the sharing of personal data as an interactional concern. A number of ethnographic studies of domestic environments are drawn upon in order to articulate a range of circumstances under which data may be shared. In particular, a distinction is made between the in situ sharing of data with others around you and the sharing of data with remote parties online. A distinction is also drawn between circumstances of purposefully sharing data in some way and circumstances where the sharing of data is incidental or even unwitting. On the basis of these studies, a number of the organisational features of how people seek to manage the ways in which their data is shared are teased out. The paper then reflects upon how data sharing practices have evolved to handle the increasing presence of digital systems in people’s environments and how these relate to the ways in which people traditionally orient to the sharing of information. In conclusion, a number of ways are pointed out in which the sharing of data remains problematic and there is a discussion of how systems may need to adapt to better support people’s data sharing practices in the future.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
What the Oxford English Dictionary defines as “The quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical or mechanical recording media.” (see https://en.oxforddictionaries.com/definition/data)
The coinage of this term relates to its Greek origins and the works of Plato and Aristotle where it is associated with the active pursuit of policies to facilitate the governance of specific communities and the associated accountabilities of the governors and the governed. Here we are interested in how those policies are produced and made visible through the conduct of our everyday affairs, and how they are practically managed in our ongoing interactions with and our accountability to specific cohorts of people.
There is, of course, a whole literature regarding the management of online ‘identity’ that relates to this, e.g. , but we have not the space to tackle this topic directly here.
This is itself an important point because, for the larger part, it is clear that people do not sit and concern themselves with this afresh each time they share personal data online. Rather, actively reasoning about whether something might be made visible to third parties is an occasioned matter. That is, to take an extreme example, members of extremist organisations might take pause before sharing something that would risk making this visible to government, police or military authorities. As we also go onto point out in this section, however, it is notable how often the background expectation remains even in such extreme circumstances, and there are plenty of examples of people being caught out in just this fashion.
Ackerman MS, Cranor LF, Reagle J (1999) Proceedings of E-COMMERCE. In: Privacy in E-commerce: examining user scenarios and privacy preferences, vol 99. ACM, New York, pp 1–8
Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. Springer, Privacy Enhancing Technologies
Al-Fedaghi S (2007) How sensitive is your personal information?, Proceedings of SAC’07, ACM
Anderson J, Diaz C, Bonneau J, Stajano F (2009) Privacy-enabling social networking over untrusted networks. In: Proceedings of the 2nd ACM workshop on Online social networks (WOSN ‘09). ACM, New York, NY, pp 1–6
Balebako R, Jung J, Lu W, Cranor LF, Nguyen C (2013) “Little brothers watching you”: Raising awareness of data leaks on smartphones, Proceedings of SOUPS ‘13. ACM, New York
Barnes SB (2006) A privacy paradox: social networking in the Unites States, First Monday, vol 11, No 9, 4 September 2006
Beach S, Schulz R, Downs J, Matthews J, Barron B, Seelman K (2009) Transactions on Accessible Computing (TACCESS), Volume 2 Issue 1. In: Disability, age, and informational privacy attitudes in quality of life technology applications: results from a national web survey. ACM, New York
Bellotti V and Sellen A (1993) Design for privacy in ubiquitous computing environments, Proceedings of ECSCW ‘93, Springer
Bonneau, Joseph, Jonathan Anderson, and George Danezis. (2009) “Prying data out of a social network.” Social network analysis and mining. ASONAM’09. International Conference on Advances in. IEEE.
Boyle M and Greenberg S (2005) The language of privacy: learning from video media space analysis and design, Transactions on Computer-Human Interaction (TOCHI), Volume 12 Issue 2, New York: ACM
Brody et al (2012) Social networking and impression management: self-presentation in the digital age, Lexington
Capra R, Teevan J (2012) Personal information management in a socially networked world, Proceedings of CSCW’12. ACM, New York
Chakraborty S, Raghavan KR, Johnson MP, Srivastava MB (2013) A framework for context-aware privacy of sensor data on mobile systems, Proceedings of HotMobile’13. ACM, New York
Chen Y, Jones GJF (2010) Augmenting human memory using personal lifelogs, Proceedings of AH’10. ACM, New York
Chen Y, Xu H (2013) Privacy management in dynamic groups: understanding information privacy in medical practices, Proceedings of CSCW ‘13. ACM, New York
Clarke J, Castro RR, Sharma A, Lopez J, Suri N (2012) Trust & Security RTD in the internet of things: opportunities for international cooperation, Proceedings of SecurIT’12. ACM, New York
Crabtree A, Rodden T, Tolmie P, Mortier R, Lodge T, Brundell P, Pantidi N (2014) House rules: the collaborative nature of policy in domestic networks. Personal and Ubiquitous Computing 19(1):203–215
Crabtree A, Mortier R (2015) Proceedings of the 14th European Conference on Computer Supported Cooperative Work. In: Human data interaction: historical lessons from social studies and CSCW. Springer, Oslo, pp 1–20
Crabtree A and Mortier R (2016) “Personal data, privacy and the Internet of Things: the shifting locus of agency and control”, Social Science Research Network
Crabtree A, Lodge T, Colley J, Greenhalgh C, Mortier R and Haddadi H (2016) “Enabling the new economic actor: data protection, the digital economy, and the databox”, Personal and Ubiquitous Computing
Crabtree A, Tolmie P & Knight W (2017) Repacking ‘privacy’ for a networked world, to appear in Proceedings of ECSCW ‘17, Springer
Donath J, Boyd D (2004) Public displays of connection. BT Technol J, October 2004 22(4):71–82
Dourish P, Grinter BE, Flor JDDL, Joseph M (2004) Security in the wild: user strategies for managing security as an everyday, practical problem. Pers Ubiquit Comput 8(6):2004
Durrant A, Golembewski M, Kirk DS, Beford S, Rowland D, McAuley D (2011) Exploring a digital economy design space in theme parks, Proceedings of DESIRE ‘11. ACM, New York
Dwyer C, Hiltz SR, Passerini K (2007) Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. AMCIS 2007
Ellison NB, Steinfield C, Lampe C (2007) The benefits of Facebook “friends”. Social capital and college students’ use of online social network sites, Journal of Computer-Mediated Communication, Wiley
Emanuel L, Bevan C, Hodges D (2013) What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces, Proceedings of CHI EA ‘13. ACM, New York
Froehlich J, Chen MY, Consolvo S, Harrison B, Landay JA (2007) MyExperience: a system for in situ tracing and capturing of user feedback on mobile phones, Proceedings of MobiSys’07. ACM, New York
Garfinkel H (1967) Studies in ethnomethodology. Prentice-Hall, Englewood Cliffs
Ghani NA and Sidek Z M (2008) Controlling your personal information disclosure, Proceedings of ISP’08, WSEAS
Goulden M et al (2017) Living with interpersonal data: observability and accountability in the age of pervasive ICT, to appear in New Media and Society
Greenberg S, Rounding M (2001) The notification collage: Posting information to public and personal displays, Proceedings of CHI’01. ACM, New York, pp 514–521
Guha S, Wicker S (2015) Proc. of CSCW. In: Do birds of a feather watch each other? Homophily and social surveillance in location-based social networks. ACM, Vancouver, pp 1010–1020
Haddadi H, Mortier R, Hand S, Brown I, Yoneki E, McAuley D, Crowcroft J (2012) Privacy analytics, SIGCOMM Computer Communication Review, vol 42, Issue 3, New York: ACM
Hardt M, Nath S (2012) Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ‘12). In: Privacy-aware personalization for mobile advertising. ACM, New York, NY, pp 662–673
Hawkey K, Inkpen KM (2006) Keeping up appearances: understanding the dimensions of incidental information privacy, Proceedings of CHI ‘06. ACM, New York
Hoffman DL, Novak TP, Peralta M (1999) Building consumer trust online. Commun ACM 1999
Hughes J, King V, Rodden T, Andersen H (1994) Moving out of the control room: ethnography in system design. In: Proceedings of the Conference on Computer-Supported Cooperative Work (CSCW’94). ACM Press, Chapel Hill, pp 429–438
Joinson AN (2008) Looking at, looking up or keeping up with people?: motives and use of Facebook, Proceedings of CHI’08. ACM, New York
Kaasten S, Greenberg S and Edwards C (2002) How people recognize previously seen WWW pages from titles, URLs and thumbnails. In Proc. of Human Computer Interaction 2002, Springer Verlag, 247–265.
Karr-Wisniewski P, Wilson D, and Richter-Lipford H (2011) A new social order: mechanisms for social network site boundary regulation. In AMCIS 2011 Proceedings, AMCIS ‘11, page 9, Aug 2011.
Kim P, Podlaseck M, Pingali G (2004) Personal chronicling tools for enhancing information archival and collaboration in enterprises, Proceedings of CARPE’04. ACM, New York
Kirk DS and Sellen A (2010) On human remains: values and practice in the home archiving of cherished objects, Transactions on Computer-Human Interaction (TOCHI), vol 17 Issue 3, New York: ACM
Klasnja P, Consolvo S, Jung J, Greenstein BM, LeGrand L, Powledge P and Wetherall D (2009) “When I am on Wi-Fi, I am fearless:” privacy concerns & practices in everyday WiFi use, Proceedings of CHI 2009, ACM
Krishnan A and Jones S (2005) TimeSpace: activity-based temporal visualisation of personal information spaces, Personal and Ubiquitous Computing, January 2005, vol 9, Issue 1
Kwan GCE and Skoric MM (2013) Facebook bullying: an extension of battles in school, Computers in Human Behavior, vol 29 Issue 1, Elsevier
Lampinen A, Tamminen S, and Oulasvirta A (2009) All my people right here, right now: management of group co-presence on a social networking site. In Proceedings of the ACM 2009 International Conference on Supporting Group Work, GROUP ‘09, pages 281–290, New York, NY, USA, 2009. ACM.
Lenhart A and Madden M (2007) Teens, privacy & online social networks: how teens manage their online identities and personal information in the age of MySpace, Pew Internet & American Life Project
Li I, Forlizzi J, Dey A (2010) Know thyself: monitoring and reflecting on facets of one’s life, Proceedings of CHI EA’10. ACM, New York
Lin J, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing, Proceedings of UbiComp ‘12. ACM, New York
Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc, June 2008 10(3):393–411
Milberg SJ, Burke SJ, Smith HJ, Kallman EA (1995) Values, personal information privacy, and regulatory approaches. Commun ACM 38:65–74 Issue 12, Dec 1995
Morris ME, Consolvo S, Munson S, Patrick K, Tsai J, Kramer ADI (2011) Proceedings of CHI EA ‘11. In: Facebook for health: opportunities and challenges for driving behavior change. ACM, New York
Mortier R et al (2010) The personal container, or your life in bits, Proceedings of Digital Futures
Mortier R, Haddadi H, Henderson T, McAuley D, Crowcroft J (2013) Challenges & opportunities in human-data interaction, The Fourth Digital Economy All-hands Meeting: Open Digital (DE). November 4–6, 2013. Salford, UK
Multisilta J, Milrad M (2009) Sharing experiences with social mobile media, Proceedings of MobileHCI’09. ACM, New York
Murphy MS (2011) Notes toward a politics of personalization, Proceedings of iConference’11. ACM, New York
Nath S, Lin FX, Ravindranath L, Padhye J (2013) SmartAds: bringing contextual ads to mobile apps, Proceedings of MobiSys ‘13. ACM, New York
Page X, Knijnenburg B, Kobsa A (2013) Proc. of CSCW. In: What a tangled web we weave: lying backfires in location-sharing social media. ACM, San Antonio, pp 273–284
Patil S, Norcie G, Kapadia A and Lee AJ (2012) Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice, Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2012, ACM
Phelps J, Nowak G, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Mark 19(1):27–41 (Spring, 2000)
Raij A, Ghosh A, Kumar S, Srivastava M (2011) Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment, Proceedings of CHI’11. ACM, New York
Ryle G (1949) The concept of mind. Hutchinson, London
Sacks H (1992) Lectures on conversation, volumes I & II, (edited by G. Jefferson), Malden, MA: Blackwell.
Schneier B (2010) A taxonomy of social networking data. Security & Privacy, IEEE 8(4):88
Schrammel J, Koffel C, Tscheligi M (2009) How much do you tell?: information disclosure behaviour in different types of online communities, Proceedings of C&T ‘09. ACM, New York
Sellen AJ, Fogg A, Aitken M, Hodges S, Rother C, Wood K (2007) Do life-logging technologies support memory for the past?: an experimental study using sensecam, Proceedings of CHI’07. ACM, New York
Sheridan J, Bryan-Kinns N, Reeves S, Marshall J, Lane G (2011) Graffito: crowd-based performative interaction at festivals, Proceedings of CHI ‘11 Extended Abstracts on Human Factors in Computing Systems (CHI EA ‘11). ACM, New York, pp 1129–1134
Sleeper M, Cranshaw J, Kelley PG, Ur B, Acquisti A, Cranor LF, Sadeh N (2013) “I read my Twitter the next morning and was astonished”: a conversational perspective on Twitter regrets, Proceedings of CHI’13. ACM, New York
Smale S and Greenberg S (2006) Transient life: collecting and sharing personal information, Proceedings of OZCHI’06, ACM
Song J, Lee S and Kim J (2013) I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata, Proceedings of WWW’13, IWWWCSC
Stutzman F, and Hartzog W (2012) Boundary regulation in social media. In Proceedings of ACM Conference on Computer Supported Cooperative Work, CSCW ‘12, pages 769–778, Seattle, Washington, United States, 2012.
Tang KP, Hong JI, Siewiorek DP (2011) Understanding how visual representations of location feeds affect end-user privacy concerns, Proceedings of UbiComp ‘11. ACM, New York
Taylor C, Dajani L (2008) The future of homecare systems in the context of the ubiquitous web and its related mobile technologies, Proceedings of PETRA’08. ACM, New York
Tolmie P, Crabtree A, Rodden T, Colley J and Luger E (2016) “‘This has to be the cats’—personal data legibility in networked sensing systems”, Proceedings of the 19th Conference on Computer Supported Cooperative Work, pp. 491-502, San Francisco, ACM.
Viswanath B, Kiciman E, Saroiu S (2012) Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks (WOSN ‘12). In: Keeping information safe from social networking apps. ACM, New York, NY, pp 49–54
Wang Y, Norcie G, Komanduri S, Acquisti A, Leon PG, Cranor LF (2011) “I regretted the minute I pressed share”: a qualitative study of regrets on Facebook, Proceedings of SOUPS’11. ACM, New York
Watson J Besmer A, Richter Lipford H (2012) +Your circles: sharing behavior on Google+, Proceedings of Symposium on Usable Privacy and Security (SOUPS 2012, ACM
Wisniewski P, Lipford H, and Wilson D. (2012) Fighting for my space: coping mechanisms for SNS boundary regulation. In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, CHI ‘12, pages 609–618, New York, NY, USA, 2012. ACM
Zhao S, Grasmuck S and Martin J (2008) Identity construction on Facebook: digital empowerment in anchored relationships. Computers in human behavior, Elsevier
This work was supported by the Engineering and Physical Sciences Research Council [grant numbers EP/F064276/1, EP/K039911/1, EP/M001636/1, EP/N028260/1] and the European Commission [FP7-ICT project ID 611001]. Thanks are also extended to the numerous household inhabitants who have participated in the studies over the past 10 years. Data supporting this publication is not openly available, as University of Nottingham ethics approval does not allow for the release of transcripts containing personal data to third parties.
About this article
Cite this article
Tolmie, P., Crabtree, A. The practical politics of sharing personal data. Pers Ubiquit Comput 22, 293–315 (2018). https://doi.org/10.1007/s00779-017-1071-8
- Personal data
- Information sharing
- Domestic data management practices