Glossary
- Contextual integrity:
-
The norms of personal information flow depend on the social context of the interaction
- Ephemeral messaging:
-
The mobile-to-mobile transmission of multimedia messages that automatically disappear from the recipient’s screen after the message has been viewed. The word “ephemeral” describes something that only lasts for a short period of time
- Impression management:
-
Maintaining a desired social presence, which includes adjustments and behavioral changes in response to feedback within a social setting
- Obfuscation:
-
To preserve privacy by producing misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating bad data from good
- Privacy by design:
-
A software design approach that protects privacy by embedding it into the design specifications of technologies, business practices, and physical...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boyd D (2007) Social network sites: public, private, or what. Knowledge Tree 13(1):1–7
Boyd D, Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput-Mediat Commun 13(1), article 11
Boyd D, Marwick AE (2011) Social privacy in networked publics: teens attitudes, practices, and strategies. In: A decade in internet time: symposium on the dynamics of the internet and society, Oxford
Carey R, Burkell J (2009) A heuristics approach to understanding privacy-protecting behaviors in digital social environments. In: Kerr I, Steeves V, Lucock C (eds) Lessons from the identity trail. Oxford University Press, New York
Chen X, Michael K (2012) Privacy issues and solutions in social network sites. Technol Soc Mag IEEE 31(4):43–53
Collins R, Dwyer C, Hiltz S, Shrivastav H (2012) Do I know what you can see? Social networking sites and privacy management. Paper presented at the AMCIS, Seattle
Dwyer C (2008) Appropriation of privacy management within social networking sites. PhD, New Jersey Institute of Technology, Newark. Retrieved from http://library.njit.edu/. 24 Aug 2016
Dwyer C, Hiltz SR (2008) Designing privacy into online communities. Paper presented at the proceedings of Internet Research 9.0, Copenhagen
Gürses S, Troncoso C, Diaz C (2011) Engineering privacy by design. Comp Priv Data Protect 14:3
Madden M (2012) Privacy management on social media sites. Pew internet report. Retrieved from http://pewinternet.org/Reports/2012/Privacy-management-on-social-media. aspx 24 Aug 2016
Madejski M, Johnson M, Bellovin S (2011) The failure of online social network privacy settings. Technical report CUCS-010-11, Columbia University
Marwick A (2014) Networked privacy: how teenagers negotiate context in social media. New Media Soc 16(7):1051–1067. https://doi.org/10.1177/1461444814543995
Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Standford University Press, Stanford
Petronio S (2002) Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany
Pew Research Center (2015) Social media use over time. Retrieved from http://www.pewinternet.org/data-trend/social-media/social-media-use-all-users/. 24 Aug 2016
Simon H (1955) A behavioral model of rational choice. Q J Econ 69(1):99–118
Stutzman FD, Hartzog W (2009) Boundary regulation in social media. SSRN eLibrary. https://doi.org/10.2139/ssrn.1566904
Xu B et al (2016) Automatic archiving versus default deletion: what snapchat tells us about ephemerality in design. In: Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. ACM, 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media LLC, part of Springer Nature
About this entry
Cite this entry
Dwyer, C. (2018). Online Social Network Privacy Management. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_338
Download citation
DOI: https://doi.org/10.1007/978-1-4939-7131-2_338
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-7130-5
Online ISBN: 978-1-4939-7131-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering