Privacy and Empowerment in Connective Media

  • Jo Pierson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9089)


In order to explore the roadmap and future directions of social, mobile and ubiquitous media technologies for privacy from an Internet Science perspective we take an interdisciplinary perspective, building on research in Media and Communication Studies and Science and Technology Studies. In order to assess to what extent and how people are effectively ’empowered’ in relation to their privacy, we investigate how they socially engage with these media and how their communication is being (re)configured. For this we first take a macro perspective by discussing recent interdisciplinary views on the changing internet landscape. Next we take a micro perspective on the position of users of ‘connective media’. We then explain and situate user empowerment in relation to online privacy and how this is related to vulnerability. This perspective is used for discussing (young) people and their privacy management, based on the findings of online privacy research projects.


Privacy Empowerment Connective media Interdisciplinarity Vulnerability 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Freeman, C., Soete, L.: The economics of industrial innovation. Continuum, London (1997)Google Scholar
  2. 2.
    Perez, C.: Technological revolutions and financial capital: the dynamics of bubbles and golden ages. Edward Elgar Pub., Cheltenham (2003)Google Scholar
  3. 3.
    NN: The third great wave. The Economist: Special report - The world economy, pp. 3–4 (2014)Google Scholar
  4. 4.
    van Dijck, J.: The culture of connectivity: a critical history of social media. Oxford University Press, Oxford (2013)CrossRefGoogle Scholar
  5. 5.
    van Dijck, J.: Flickr and the culture of connectivity: sharing views, experiences, memories. Memory Studies 4, 1–15 (2010)Google Scholar
  6. 6.
    Pierson, J.: Online privacy in social media: a conceptual exploration of empowerment and vulnerability. Communications & Strategies (Digiworld Economic Journal) 4, 99–120 (2012)Google Scholar
  7. 7.
    Castells, M.: Communication power. Oxford University Press, Oxford (2009)Google Scholar
  8. 8.
    Haythornthwaite, C.A., Wellman, B.: The Internet in everyday life. In: Wellman, B., Haythornthwaite, C.A. (eds.) The Internet in Everyday Life, pp. 3–41. Blackwell, Oxford (2002)Google Scholar
  9. 9.
    Zimmerman, M., Rappaport, J.: Citizen participation, perceived control and psychological empowerment. American Journal of Community Psychology 16, 725–743 (1988)CrossRefGoogle Scholar
  10. 10.
    Mansell, R.: From digital divides to digital entitlements in knowledge societies. Current Sociology 50, 407–426 (2002)CrossRefGoogle Scholar
  11. 11.
    Villagran, J.C.: Vulnerability: a conceptual and methodological review. United Nations University - Institute for Environment and Human Security (2006)Google Scholar
  12. 12.
    Chambers, R.: Vulnerability, coping and policy (Editorial introduction). IDS Bulletin 37, 33–40 (2006)CrossRefGoogle Scholar
  13. 13.
    Ball, K.: Exposure: exploring the subject of surveillance. Information, Communication and Society 12, 639–657 (2009)CrossRefGoogle Scholar
  14. 14.
    Watts, M.J., Bohle, H.-G.: The space of vulnerability: the causal structure of hunger and famine. Progress in Human Geography 17, 43–67 (1993)CrossRefGoogle Scholar
  15. 15.
    Bohle, H.-G.: Vulnerability Article 1: Vulnerability and Criticality. IHDP Newsletter UPDATE, p. 4. International Human Dimensions Programme on Global Environmental Change Bonn (2001)Google Scholar
  16. 16.
    Norman, D.A.: The psychology of everyday things. Basic Books, New York (1988)Google Scholar
  17. 17.
    Pierson, J., Jacobs, A., Dreessen, K., Van den Broeck, I., Lievens, B., Van den Broeck, W.: Walking the interface: uncovering practices through ‘proxy technology assessment’. In: Ethnographic Praxis in Industry Conference - EPIC. American Anthropological Association (2006)Google Scholar
  18. 18.
    Hand, M., Shove, E., Southerton, D.: Explaining Showering: a Discussion of the Material, Conventional, and Temporal Dimensions of Practice. Sociological Research Online 10 (2005)Google Scholar
  19. 19.
    Oudshoorn, N., Pinch, T.J.: How users matter: the co-construction of users and technologies. MIT Press, Cambridge (2003)Google Scholar
  20. 20.
    Akrich, M.: The de-scription of technical objects. In: Bijker, W., Law, J. (eds.) Shaping Technology/Building Society: Studies in Sociotechnical Change, pp. 205–223. MIT Press, Cambridge (1992)Google Scholar
  21. 21.
    Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact 2003, pp. 709–712. IOS Press (2003)Google Scholar
  22. 22.
    Brandimarte, L., Acquisti, A., Loewenstein, G., Babcock, L.: Privacy concerns and information disclosure: an illusion of control hypothesis. In: iConference. IDEALS, Chapel Hill (2009)Google Scholar
  23. 23.
    Goffman, E.: The presentation of self in everyday life. Penguin, Harmondsworth (1971)Google Scholar
  24. 24.
    Petronio, S.S.: Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany (2002)Google Scholar
  25. 25.
    Mead, G.H., Morris, C.W.: Mind, self and society from the standpoint of a social behaviorist. University of Chicago Press, Chicago (1934)Google Scholar
  26. 26.
    Hewitt, J.P.: Self and society: a symbolic interactionist social psychology. Allyn and Bacon, Boston (2007)Google Scholar
  27. 27.
    Boyd, D.: It’s complicated: the social lives of networked teens. Yale Univesity Press, New Haven (2014)Google Scholar
  28. 28.
    Boyd, D., Marwick, A.: Social privacy in networked publics: teens’ attitudes, practices, and strategies. In: Oxford Internet Institute Decade in Internet Time Symposium, p. 22 (2011)Google Scholar
  29. 29.
    Deuze, M.: Media life. Polity, Cambridge (2012)Google Scholar
  30. 30.
    De Wolf, R., Willaert, K., Pierson, J.: Managing privacy boundaries together: exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35, 444–454 (2014)CrossRefGoogle Scholar
  31. 31.
    Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: Interpersonal management of disclosure in social network services. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 3217–3226. ACM (2011)Google Scholar
  32. 32.
    Litt, E.: Understanding social network site users’ privacy tool use. Computers in Human Behavior 29, 1649–1656 (2013)CrossRefGoogle Scholar
  33. 33.
    Stutzman, F.D., Hartzog, W.: Boundary regulation in social media. In: ACM Conference on Computer Supported Collaborative Work and Social Computing, pp. 769–778. ACM (2009)Google Scholar
  34. 34.
    Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: Coping mechanisms for SNS boundary regulation. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 609–618. ACM (2012)Google Scholar
  35. 35.
    Pötzsch, S.: Privacy awareness: A means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  36. 36.
    Deuker, A.: Addressing the privacy paradox by expanded privacy awareness – the example of context-aware services. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity. IFIP AICT, vol. 320, pp. 275–283. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  37. 37.
    Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11 (2006)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Vrije Universiteit Brussel (iMinds-SMIT)BrusselsBelgium

Personalised recommendations