Skip to main content

Online Social Network Privacy Management

  • Reference work entry
  • First Online:
Encyclopedia of Social Network Analysis and Mining
  • 69 Accesses

Synonyms

Managing online information flows; Online privacy heuristics; Online privacy risk management

Glossary

Contextual integrity:

The norms of personal information flow depend on the social context of the interaction

Ephemeral messaging:

The mobile-to-mobile transmission of multimedia messages that automatically disappear from the recipient’s screen after the message has been viewed. The word “ephemeral” describes something that only lasts for a short period of time

Impression management:

Maintaining a desired social presence, which includes adjustments and behavioral changes in response to feedback within a social setting

Obfuscation:

To preserve privacy by producing misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating bad data from good

Privacy by design:

A software design approach that protects privacy by embedding it into the design specifications of technologies, business practices, and physical...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Boyd D (2007) Social network sites: public, private, or what. Knowledge Tree 13(1):1–7

    Google Scholar 

  • Boyd D, Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput-Mediat Commun 13(1), article 11

    Article  Google Scholar 

  • Boyd D, Marwick AE (2011) Social privacy in networked publics: teens attitudes, practices, and strategies. In: A decade in internet time: symposium on the dynamics of the internet and society, Oxford

    Google Scholar 

  • Carey R, Burkell J (2009) A heuristics approach to understanding privacy-protecting behaviors in digital social environments. In: Kerr I, Steeves V, Lucock C (eds) Lessons from the identity trail. Oxford University Press, New York

    Google Scholar 

  • Chen X, Michael K (2012) Privacy issues and solutions in social network sites. Technol Soc Mag IEEE 31(4):43–53

    Article  MathSciNet  Google Scholar 

  • Collins R, Dwyer C, Hiltz S, Shrivastav H (2012) Do I know what you can see? Social networking sites and privacy management. Paper presented at the AMCIS, Seattle

    Google Scholar 

  • Dwyer C (2008) Appropriation of privacy management within social networking sites. PhD, New Jersey Institute of Technology, Newark. Retrieved from http://library.njit.edu/. 24 Aug 2016

  • Dwyer C, Hiltz SR (2008) Designing privacy into online communities. Paper presented at the proceedings of Internet Research 9.0, Copenhagen

    Google Scholar 

  • Gürses S, Troncoso C, Diaz C (2011) Engineering privacy by design. Comp Priv Data Protect 14:3

    Google Scholar 

  • Madden M (2012) Privacy management on social media sites. Pew internet report. Retrieved from http://pewinternet.org/Reports/2012/Privacy-management-on-social-media. aspx 24 Aug 2016

  • Madejski M, Johnson M, Bellovin S (2011) The failure of online social network privacy settings. Technical report CUCS-010-11, Columbia University

    Google Scholar 

  • Marwick A (2014) Networked privacy: how teenagers negotiate context in social media. New Media Soc 16(7):1051–1067. https://doi.org/10.1177/1461444814543995

    Article  Google Scholar 

  • Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Standford University Press, Stanford

    Google Scholar 

  • Petronio S (2002) Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany

    Google Scholar 

  • Pew Research Center (2015) Social media use over time. Retrieved from http://www.pewinternet.org/data-trend/social-media/social-media-use-all-users/. 24 Aug 2016

  • Simon H (1955) A behavioral model of rational choice. Q J Econ 69(1):99–118

    Article  Google Scholar 

  • Stutzman FD, Hartzog W (2009) Boundary regulation in social media. SSRN eLibrary. https://doi.org/10.2139/ssrn.1566904

  • Xu B et al (2016) Automatic archiving versus default deletion: what snapchat tells us about ephemerality in design. In: Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. ACM, 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Catherine Dwyer .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Dwyer, C. (2018). Online Social Network Privacy Management. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_338

Download citation

Publish with us

Policies and ethics