skip to main content
research-article

"It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media

Published:29 May 2020Publication History
Skip Abstract Section

Abstract

Sanctions play an essential role in enforcing and sustaining social norms. On social networking sites (SNS), sanctions allow individuals to shape community norms on appropriate privacy respecting behaviors. Existing theories of privacy assume the use of such sanctions but do not examine the extent and effectiveness of sanctioning behaviors. We conducted a qualitative interview study of young adults (N=23), and extend research on collective boundary regulation by studying sanctions in the context of popular SNS. Through a systematization of sanctioning strategies, we find that young adults prefer to use indirect and invisible sanctions to preserve strong-tie relationships. Such sanctions are not always effective in helping the violator understand the nature of their normative violation. We offer suggestions on supporting online sanctioning that make norms more visible and signal violations in ways that avoid direct confrontation to reduce the risk of harming on-going social relationships.

References

  1. Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole, Monterey, CA.Google ScholarGoogle Scholar
  2. Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of the 2016 SIGCHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, 3906--3918. https://doi.org/10.1145/2858036.2858096Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, and Ilse De Bourdeaudhuij. 2015. `Can I afford to help?' How Affordances of Communication Modalities Guide Bystanders' Helping Intentions Towards Harassment on Social Network Sites. Behaviour & Information Technology, Vol. 34, 4 (2015), 425--435.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Roy F Baumeister, Liqing Zhang, and Kathleen D Vohs. 2004. Gossip as Cultural Learning. Review of general psychology, Vol. 8, 2 (2004), 111--121.Google ScholarGoogle Scholar
  5. Andrew V Beale and Kimberly R Hall. 2007. Cyberbullying: What School Administrators (and Parents) Can Do. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, Vol. 81, 1 (2007), 8--12.Google ScholarGoogle ScholarCross RefCross Ref
  6. Jörg R Bergmann. 1993. Discreet Indiscretions: The Social Organization of Gossip. Aldine, Chicago, IL.Google ScholarGoogle Scholar
  7. Andrew Besmer and Heather Richter Lipford. 2010. Moving Beyond Untagging: Photo Privacy in a Tagged World. In Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, 1563--1572. https://doi.org/10.1145/1753326.1753560Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Lindsay Blackwell, Tianying Chen, Sarita Schoenebeck, and Cliff Lampe. 2018. When Online Harassment is Perceived as Justified. In Proceedings of the 12th International AAAI Conference on Web and Social Media. AAAI Press.Google ScholarGoogle ScholarCross RefCross Ref
  9. Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '17). ACM, New York, NY, USA, Article 24, 19 pages. https://doi.org/10.1145/3134659Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. danah boyd. 2002. Faceted Id/entity: Managing Representation in a Digital World. Ph.D. Dissertation. Massachusetts Institute of Technology.Google ScholarGoogle Scholar
  11. Penelope Brown and Stephen C Levinson. 1987. Politeness: Some Universals in Language Usage. Vol. 4. Cambridge University Press, Cambridge, UK.Google ScholarGoogle ScholarCross RefCross Ref
  12. Judee K Burgoon. 1978. A Communication Model of Personal Space Violations: Explication And an Initial Test. Human Communication Research, Vol. 4, 2 (1978), 129--142.Google ScholarGoogle ScholarCross RefCross Ref
  13. Judee K Burgoon. 1993. Interpersonal Expectations, Expectancy Violations, and Emotional Communication. Journal of Language and Social Psychology, Vol. 12, 1--2 (1993), 30--48.Google ScholarGoogle Scholar
  14. Gary Burnett and Laurie Bonnici. 2003. Beyond the FAQ: Explicit and Implicit Norms in Usenet Newsgroups. Library & Information Science Research, Vol. 25, 3 (2003), 333--351.Google ScholarGoogle ScholarCross RefCross Ref
  15. Kelly Erinn Caine. 2009. Exploring Everyday Privacy Behaviors and Misclosures. Ph.D. Dissertation. Georgia Institute of Technology.Google ScholarGoogle Scholar
  16. Stevie Chancellor, Jessica Annette Pater, Trustin Clear, Eric Gilbert, and Munmun De Choudhury. 2016. #Thyghgapp: Instagram Content Moderation and Lexical Variation in Pro-Eating Disorder Communities. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, 1201--1213. https://doi.org/10.1145/2818048.2819963Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Eshwar Chandrasekharan, Mattia Samory, Shagun Jhaver, Hunter Charvat, Amy Bruckman, Cliff Lampe, Jacob Eisenstein, and Eric Gilbert. 2018. The Internet's Hidden Rules: An Empirical Study of Reddit Norm Violations at Micro, Meso, and Macro Scales. Proceedings of ACM Human-Computer Interaction, Vol. 2, CSCW, Article 32 (Nov. 2018), 25 pages. https://doi.org/10.1145/3274301Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Nadine Chaurand and Markus Brauer. 2008. What Determines Social Control? People's Reactions to Counternormative Behaviors in Urban Environments. Journal of Applied Social Psychology, Vol. 38, 7 (2008), 1689--1715.Google ScholarGoogle ScholarCross RefCross Ref
  19. Peggy Chekroun and Markus Brauer. 2002. The Bystander Effect and Social Control Behavior: The Effect of the Presence of Others on People's Reactions to Norm Violations. European Journal of Social Psychology, Vol. 32, 6 (2002), 853--867.Google ScholarGoogle ScholarCross RefCross Ref
  20. Elizabeth Chell. 2004. Critical Incident Technique. In Essential Guide to Qualitative Methods in Organizational Research. SAGE Publications, 45--60.Google ScholarGoogle Scholar
  21. Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2014. How Community Feedback Shapes User Behavior. In Proceedings of the 8th International AAAI Conference on Web and Social Media .Google ScholarGoogle ScholarCross RefCross Ref
  22. Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2015. Antisocial Behavior in Online Discussion Communities. In Proceedings of the 9th International AAAI Conference on Web and Social Media .Google ScholarGoogle Scholar
  23. Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, 503--514. https://doi.org/10.1145/2818048.2819996Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Natalia Criado and Jose M Such. 2015. Implicit Contextual Integrity in Online Social Networks. Information Sciences, Vol. 325 (2015), 48--69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Michael A. DeVito, Jeremy Birnholtz, and Jeffery T. Hancock. 2017. Platforms, People, and Perception: Using Affordances to Understand Self-Presentation on Social Media. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 740--754. https://doi.org/10.1145/2998181.2998192Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Paul Dourish and Ken Anderson. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Proceedings of Human-Computer Interaction, Vol. 21, 3 (2006), 319--342.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Robert C Ellickson. 1991. Order Without Law. Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  28. Nicole Ellison, Rebecca Heino, and Jennifer Gibbs. 2006. Managing Impressions Online: Self-presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication, Vol. 11, 2 (2006), 415--441.Google ScholarGoogle Scholar
  29. Nicole B. Ellison, Megan French, Eden Litt, S. Shyam Sundar, and Penny Trieu. 2018. Without a Trace: How Studying Invisible Interactions Can Help Us Understand Social Media. In Proceedings of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '18). ACM, New York, NY, 129--132. https://doi.org/10.1145/3272973.3274544Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ernst Fehr and Urs Fischbacher. 2004. Social Norms and Human Cooperation. Trends in cognitive sciences, Vol. 8, 4 (2004), 185--190.Google ScholarGoogle Scholar
  31. Katleen Gabriels and Charlotte JS De Backer. 2016. Virtual Gossip: How Gossip Regulates Moral Life in Virtual Worlds. Computers in Human Behavior, Vol. 63 (2016), 683--693.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Vaibhav Garg, Sameer Patil, Apu Kapadia, and L. Jean Camp. 2013. Peer-produced Privacy Protection. In IEEE International Symposium on Technology and Society (ISTAS). 147--154. https://doi.org/10.1109/ISTAS.2013.6613114Google ScholarGoogle Scholar
  33. Ilana Gershon. 2010. The breakup 2.0: Disconnecting Over New Media. Cornell University Press, Ithaca, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Anthony Giddens, Mitchell Duneier, Richard P Appelbaum, and Deborah Carr. 2006. Essentials of Sociology. W. W. Norton, New York.Google ScholarGoogle Scholar
  35. Eric Gilbert. 2013. Widespread Underprovision on Reddit. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, 803--808. https://doi.org/10.1145/2441776.2441866Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Erving Goffman. 1959. The Presentation of Self in Everyday Life. Anchor Books, New York.Google ScholarGoogle Scholar
  37. Erving Goffman. 2009. Stigma: Notes on the Management of Spoiled Identity. Simon and Schuster.Google ScholarGoogle Scholar
  38. Caroline Haythornthwaite. 2005. Social networks and Internet connectivity effects. Information, Community & Society, Vol. 8, 2 (2005), 125--147.Google ScholarGoogle ScholarCross RefCross Ref
  39. George Caspar Homans. 1950. The Human Group. Harcourt, New York.Google ScholarGoogle Scholar
  40. Val Hooper and Tarika Kalidas. 2012. Acceptable and Unacceptable Behaviour on Social Networking Sites: A Study of The Behavioural Norms of Youth on Facebook. Electronic Journal of Information Systems Evaluation, Vol. 15, 3 (2012), 259.Google ScholarGoogle Scholar
  41. Christine Horne. 2003. The Internal Enforcement of Norms. European Sociological Review, Vol. 19, 4 (2003), 335--343.Google ScholarGoogle ScholarCross RefCross Ref
  42. Craig D Howard, Andrew F Barrett, and Theodore W Frick. 2010. Anonymity to Promote Peer Feedback: Pre-Service Teachers' Comments in Asynchronous Computer-Mediated Communication. Journal of Educational Computing Research, Vol. 43, 1 (2010), 89--112.Google ScholarGoogle ScholarCross RefCross Ref
  43. Julie Hui, Amos Glenn, Rachel Jue, Elizabeth Gerber, and Steven Dow. 2015. Using Anonymity and Communal Efforts to Improve Quality of Crowdsourced Feedback. In Proceedings of the 3rd AAAI Conference on Human Computation and Crowdsourcing (HCOMP '15). 72--82.Google ScholarGoogle ScholarCross RefCross Ref
  44. Haiyan Jia and Heng Xu. 2016. Autonomous and Interdependent: Collaborative Privacy Management on Social Networking Sites. In Proceedings of the 2016 SIGCHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, 4286--4297. https://doi.org/10.1145/2858036.2858415Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Rosabeth Moss Kanter. 2008. Men and Women of The Corporation. Basic, New York.Google ScholarGoogle Scholar
  46. Matthew Kay, Cynthia Matuszek, and Sean A. Munson. 2015. Unequal Representation and Gender Stereotypes in Image Search Results for Occupations. In Proceedings of the 2015 SIGCHI Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, 3819--3828. https://doi.org/10.1145/2702123.2702520Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Rob Kling, Ya-ching Lee, Al Teich, and Mark S Frankel. 1999. Assessing anonymous communication on the internet: Policy deliberations. The Information Society, Vol. 15, 2 (1999), 79--90.Google ScholarGoogle ScholarCross RefCross Ref
  48. Robert E Kraut and Paul Resnick. 2012a. Building Successful Online Communities: Evidence-based Social Design .MIT Press, Cambridge, MA, Chapter Regulating Behavior in Online Communities, 125--177.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Robert E Kraut and Paul Resnick. 2012b. Building Successful Online Communities: Evidence-based Social Design. MIT Press, Cambridge, MA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Cliff Lampe, Nicole B. Ellison, and Charles Steinfield. 2008. Changes in Use and Perception of Facebook. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (CSCW '08). ACM, New York, NY, 721--730. https://doi.org/10.1145/1460563.1460675Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Cliff Lampe and Erik Johnston. 2005. Follow the (Slash) Dot: Effects of Feedback on New Members in an Online Community. In Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work (GROUP '05). ACM, New York, NY, 11--20. https://doi.org/10.1145/1099203.1099206Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Cliff Lampe, Erik Johnston, and Paul Resnick. 2007. Follow the Reader: Filtering Comments on Slashdot. In Proceedings of the 2007 SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, New York, NY, 1253--1262. https://doi.org/10.1145/1240624.1240815Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Cliff Lampe, Jessica Vitak, Rebecca Gray, and Nicole Ellison. 2012. Perceptions of Facebook's Value As an Information Source. In Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, 3195--3204. https://doi.org/10.1145/2207676.2208739Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it Together: Interpersonal Management of Disclosure in Social Network Services. In Proceedings of the 2011 SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 3217--3226. https://doi.org/10.1145/1978942.1979420Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Airi Lampinen, Sakari Tamminen, and Antti Oulasvirta. 2009. All My People Right Here, Right Now: Management of Group Co-presence on a Social Networking Site. In Proceedings of the 2009 ACM International Conference on Supporting Group Work (GROUP '09). ACM, New York, NY, 281--290. https://doi.org/10.1145/1531674.1531717Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Maria Knight Lapinski and Rajiv N Rimal. 2005. An Explication of Social Norms. Communication theory, Vol. 15, 2 (2005), 127--147.Google ScholarGoogle Scholar
  57. Lawrence Lessig. 1999. Code and Other Laws of Cyberspace. Basic Books, Inc., New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Aart C Liefbroer and Francesco C Billari. 2010. Bringing Norms Back In: A Theoretical and Empirical Discussion of Their Importance for Understanding Demographic Behaviour. Population, Space and Place, Vol. 16, 4 (2010), 287--305.Google ScholarGoogle ScholarCross RefCross Ref
  59. Eden Litt, Erin Spottswood, Jeremy Birnholtz, Jeff T Hancock, Madeline E Smith, and Lindsay Reynolds. 2014. Awkward Encounters of an Other Kind: Collective Self-presentation and Face Threat on Facebook. In Proceedings of the 2014 ACM conference on Computer Supported Cooperative Work & Social Computing (CSCW '14). ACM, New York, NY, 449--460. https://doi.org/10.1145/2531602.2531646Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Marisela Gutierrez Lopez and Saila Ovaska. 2013. A Look at Unsociability on Facebook. In Proceedings of the 27th International BCS Human Computer Interaction Conference (BCS-HCI '13). British Computer Society, Swinton, UK, UK, Article 13, 10 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Davan Maharaj. 1997. UCI Internet Hate Mail Case Ruled a Mistrial. https://www.latimes.com/archives/la-xpm-1997-nov-22-mn-56652-story.html Accessed Apr 4., 2019.Google ScholarGoogle Scholar
  62. Lena Mamykina, Bella Manoim, Manas Mittal, George Hripcsak, and Björn Hartmann. 2011. Design Lessons From the Fastest Q&a Site in the West. In Proceedings of the 2011 SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 2857--2866. https://doi.org/10.1145/1978942.1979366Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Alice E Marwick and danah boyd. 2014. Networked privacy: How Teenagers Negotiate Context in Social Media. New media & society, Vol. 16, 7 (2014), 1051--1067.Google ScholarGoogle Scholar
  64. Caitlin McLaughlin and Jessica Vitak. 2012. Norm Evolution and Violation on Facebook. New media & society, Vol. 14, 2 (2012), 299--315.Google ScholarGoogle Scholar
  65. Jae Yun Moon and Lee S Sproull. 2008. The Role of Feedback in Managing the Internet-Based Volunteer Work Force. Information Systems Research, Vol. 19, 4 (2008), 494--515.Google ScholarGoogle ScholarCross RefCross Ref
  66. Jonathan T. Morgan and Anna Filippova. 2018. 'Welcome' Changes?: Descriptive and Injunctive Norms in a Wikipedia Sub-Community. Proceedings of the ACM Human-Computer Interaction, Vol. 2, CSCW, Article 52 (Nov. 2018), 26 pages. https://doi.org/10.1145/3274321Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Alison R. Murphy, Madhu C. Reddy, and Heng Xu. 2014. Privacy Practices in Collaborative Environments: A Study of Emergency Department Staff. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '14). ACM, New York, NY, 269--282.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. David M Newman. 2018. Sociology: Exploring the Architecture of Everyday Life. Sage Publications.Google ScholarGoogle Scholar
  69. Christena E Nippert-Eng. 2010. Islands of Privacy. University of Chicago Press, Chicago, IL.Google ScholarGoogle Scholar
  70. Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Redwood City.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Karl-Dieter Opp. 2001. How Do Norms Emerge? An Outline of a Theory. Mind & Society, Vol. 2, 1 (2001), 101--128.Google ScholarGoogle ScholarCross RefCross Ref
  72. Elinor Ostrom. 1990. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press.Google ScholarGoogle Scholar
  73. Leysia Palen and Paul Dourish. 2003. Unpacking “Privacy” for a Networked World. In Proceedings of the 2003 SIGCHI Conference on Human Factors in Computing Systems (CHI '03). ACM, New York, NY, 129--136. https://doi.org/10.1145/642611.642635Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY.Google ScholarGoogle Scholar
  75. Richard A Posner and Eric B Rasmusen. 1999. Creating and Enforcing Norms, with Special Reference to Sanctions. International Review of Law and Economics, Vol. 19, 3 (1999), 369--382.Google ScholarGoogle ScholarCross RefCross Ref
  76. Tom Postmes, Russell Spears, and Martin Lea. 2000. The Formation of Group Norms in Computer-Mediated Communication. Human Communication Research, Vol. 26, 3 (2000), 341--371.Google ScholarGoogle ScholarCross RefCross Ref
  77. Artemio Ramirez Jr and Shuangyue Zhang. 2007. When Online Meets Offline: The Effect of Modality Switching on Relational Communication. Communication Monographs, Vol. 74, 3 (2007), 287--310.Google ScholarGoogle ScholarCross RefCross Ref
  78. Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. "You don't want to be the next meme": College Studentstextquoteright Workarounds to Manage Privacy in the Era of Pervasive Photography. In Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS 2018) (SOUPS '18). USENIX Association, Baltimore, MD, 143--157.Google ScholarGoogle Scholar
  79. Carmen Santamar'ia-Garc'ia. 2014. Evaluative Discourse and Politeness in University Students' Communication Through Social Networking Sites. Evaluation in context, Vol. 242 (2014), 387.Google ScholarGoogle Scholar
  80. Richard Schaefer and Robert LAMM. 1995. Sociology. McGraw-Hill, New York.Google ScholarGoogle Scholar
  81. Sarita Yardi Schoenebeck. 2013. The Secret Life of Online Moms: Anonymity and Disinhibition on Youbemom. com. In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media .Google ScholarGoogle Scholar
  82. Joseph Seering, Robert Kraut, and Laura Dabbish. 2017. Shaping Pro and Anti-Social Behavior on Twitch Through Moderation and Example-Setting. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 111--125. https://doi.org/10.1145/2998181.2998277Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Linda Shallcross, Michael Sheehan, and Sheryl Ramsay. 2008. Workplace Mobbing: Experiences in The Public Sector. Workplace Mobbing: Experiences in the public sector, Vol. 13, 2 (2008), 56--70.Google ScholarGoogle Scholar
  84. Christina Parajon Skinner. 2011. Unprofessional Sides of Social Media and Social Networking: How Current Standards Fall Short. SCL Rev., Vol. 63 (2011), 241.Google ScholarGoogle Scholar
  85. Aaron Smith and Monica Anderson. 2018. Social Media Use in 2018. https://www.pewinternet.org/2018/03/01/social-media-use-in-2018/ Accessed Mar. 31, 2019.Google ScholarGoogle Scholar
  86. Daniel J Solove. 2005. A Taxonomy of Privacy. U. Pa. L. Rev., Vol. 154 (2005), 477--564.Google ScholarGoogle ScholarCross RefCross Ref
  87. Daniel J Solove. 2007. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. Yale University Press, New Haven, CT.Google ScholarGoogle Scholar
  88. Anna C Squicciarini, Heng Xu, and Xiaolong Luke Zhang. 2011. CoPE: Enabling Collaborative Privacy Management in Online Social Networks. Journal of the Association for Information Science and Technology, Vol. 62, 3 (2011), 521--534.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Anselm Strauss and Juliet Corbin. 1998. Basics of Qualitative Research : Techniques and Procedures for Developing Grounded Theory. Sage Publications, Thousand Oaks, CA.Google ScholarGoogle Scholar
  90. Fred Stutzman and Woodrow Hartzog. 2012. Boundary Regulation in Social Media. In Proceedings of the 2012 ACM Conference on Computer Supported Cooperative Work (CSCW '12). ACM, New York, NY, 769--778. https://doi.org/10.1145/2145204.2145320Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends Only: Examining a Privacy-enhancing Behavior in Facebook. In Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 1553--1562. https://doi.org/10.1145/1753326.1753559Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Jose M Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, 3821--3832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior, Vol. 7, 3 (2004), 321--326.Google ScholarGoogle Scholar
  94. Lee Taber and Steve Whittaker. 2018. Personality Depends on The Medium: Differences in Self-Perception on Snapchat, Facebook and Offline. In Proceedings of the 2018 SIGCHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, Article 607, 13 pages. https://doi.org/10.1145/3173574.3174181Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Alex S. Taylor and Richard Harper. 2003. The Gift of the Gab?: A Design Oriented Sociology of Young People's Use of Mobiles. Computer Supported Cooperative Work, Vol. 12, 3 (July 2003), 267--296. https://doi.org/10.1023/A:1025091532662Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Twitter. 2019. About your activity dashboard. https://help.twitter.com/en/managing-your-account/using-the-tweet-activity-dashboard Accessed June. 26, 2019.Google ScholarGoogle Scholar
  97. Suvi Uski and Airi Lampinen. 2016. Social Norms and Self-presentation on Social Network Sites: Profile Work in Action. New media & society, Vol. 18, 3 (2016), 447--464.Google ScholarGoogle Scholar
  98. Daniel Villatoro, Giulia Andrighetto, Jordi Sabater-Mir, and Rosaria Conte. 2011. Dynamic Sanctioning for Robust and Cost-Efficient Norm Compliance. In Proceedings of the 22nd International AAAI Conference on Joint Conference on Artificial Intelligence. AAAI Press, Barcelona, 414--419.Google ScholarGoogle Scholar
  99. Joseph B Walther, Brandon Van Der Heide, Lauren M Hamel, and Hillary C Shulman. 2009. Self-generated Versus Other-generated Statements and Impressions in Computer-Mediated Communication: A Test of Warranting Theory Using Facebook. Communication Research, Vol. 36, 2 (2009), 229--253.Google ScholarGoogle Scholar
  100. Joseph B Walther, Brandon Van Der Heide, Sang-Yeon Kim, David Westerman, and Stephanie Tom Tong. 2008. The Role of Friends' Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep? Human Communication Research, Vol. 34, 1 (2008), 28--49.Google ScholarGoogle Scholar
  101. Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, and Lorrie Faith Cranor. 2013. Privacy Nudges for Social Media: An Exploratory Facebook Study. In Proceedings of the 22Nd International Conference on World Wide Web (WWW '13). ACM, New York, NY, 763--770. https://doi.org/10.1145/2487788.2488038Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for My Space: Coping Mechanisms for SNS Boundary Regulation. In Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, 609--618. https://doi.org/10.1145/2207676.2207761Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Loreen Wolfer. 2014. They shouldn't post that! Student Perception of Inappropriate Posts on Facebook Regarding Alcohol Consumption and The Implications for Peer Socialization. Journal of Social Sciences, Vol. 10, 2 (2014), 77--85.Google ScholarGoogle ScholarCross RefCross Ref
  104. Heng Xu. 2011. Reframing privacy 2.0 in online social network. Constitutional Law, Vol. 14 (2011), 1077.Google ScholarGoogle Scholar
  105. Nick Yee, Jeremy N Bailenson, Mark Urbanek, Francis Chang, and Dan Merget. 2007. The Unbearable Likeness of Being Digital: The Persistence of Nonverbal Social Norms in Online Virtual Environments. CyberPsychology & Behavior, Vol. 10, 1 (2007), 115--121.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. "It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!