Abstract
Sanctions play an essential role in enforcing and sustaining social norms. On social networking sites (SNS), sanctions allow individuals to shape community norms on appropriate privacy respecting behaviors. Existing theories of privacy assume the use of such sanctions but do not examine the extent and effectiveness of sanctioning behaviors. We conducted a qualitative interview study of young adults (N=23), and extend research on collective boundary regulation by studying sanctions in the context of popular SNS. Through a systematization of sanctioning strategies, we find that young adults prefer to use indirect and invisible sanctions to preserve strong-tie relationships. Such sanctions are not always effective in helping the violator understand the nature of their normative violation. We offer suggestions on supporting online sanctioning that make norms more visible and signal violations in ways that avoid direct confrontation to reduce the risk of harming on-going social relationships.
- Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole, Monterey, CA.Google Scholar
- Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of the 2016 SIGCHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, 3906--3918. https://doi.org/10.1145/2858036.2858096Google Scholar
Digital Library
- Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, and Ilse De Bourdeaudhuij. 2015. `Can I afford to help?' How Affordances of Communication Modalities Guide Bystanders' Helping Intentions Towards Harassment on Social Network Sites. Behaviour & Information Technology, Vol. 34, 4 (2015), 425--435.Google Scholar
Digital Library
- Roy F Baumeister, Liqing Zhang, and Kathleen D Vohs. 2004. Gossip as Cultural Learning. Review of general psychology, Vol. 8, 2 (2004), 111--121.Google Scholar
- Andrew V Beale and Kimberly R Hall. 2007. Cyberbullying: What School Administrators (and Parents) Can Do. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, Vol. 81, 1 (2007), 8--12.Google Scholar
Cross Ref
- Jörg R Bergmann. 1993. Discreet Indiscretions: The Social Organization of Gossip. Aldine, Chicago, IL.Google Scholar
- Andrew Besmer and Heather Richter Lipford. 2010. Moving Beyond Untagging: Photo Privacy in a Tagged World. In Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, 1563--1572. https://doi.org/10.1145/1753326.1753560Google Scholar
Digital Library
- Lindsay Blackwell, Tianying Chen, Sarita Schoenebeck, and Cliff Lampe. 2018. When Online Harassment is Perceived as Justified. In Proceedings of the 12th International AAAI Conference on Web and Social Media. AAAI Press.Google Scholar
Cross Ref
- Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '17). ACM, New York, NY, USA, Article 24, 19 pages. https://doi.org/10.1145/3134659Google Scholar
Digital Library
- danah boyd. 2002. Faceted Id/entity: Managing Representation in a Digital World. Ph.D. Dissertation. Massachusetts Institute of Technology.Google Scholar
- Penelope Brown and Stephen C Levinson. 1987. Politeness: Some Universals in Language Usage. Vol. 4. Cambridge University Press, Cambridge, UK.Google Scholar
Cross Ref
- Judee K Burgoon. 1978. A Communication Model of Personal Space Violations: Explication And an Initial Test. Human Communication Research, Vol. 4, 2 (1978), 129--142.Google Scholar
Cross Ref
- Judee K Burgoon. 1993. Interpersonal Expectations, Expectancy Violations, and Emotional Communication. Journal of Language and Social Psychology, Vol. 12, 1--2 (1993), 30--48.Google Scholar
- Gary Burnett and Laurie Bonnici. 2003. Beyond the FAQ: Explicit and Implicit Norms in Usenet Newsgroups. Library & Information Science Research, Vol. 25, 3 (2003), 333--351.Google Scholar
Cross Ref
- Kelly Erinn Caine. 2009. Exploring Everyday Privacy Behaviors and Misclosures. Ph.D. Dissertation. Georgia Institute of Technology.Google Scholar
- Stevie Chancellor, Jessica Annette Pater, Trustin Clear, Eric Gilbert, and Munmun De Choudhury. 2016. #Thyghgapp: Instagram Content Moderation and Lexical Variation in Pro-Eating Disorder Communities. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, 1201--1213. https://doi.org/10.1145/2818048.2819963Google Scholar
Digital Library
- Eshwar Chandrasekharan, Mattia Samory, Shagun Jhaver, Hunter Charvat, Amy Bruckman, Cliff Lampe, Jacob Eisenstein, and Eric Gilbert. 2018. The Internet's Hidden Rules: An Empirical Study of Reddit Norm Violations at Micro, Meso, and Macro Scales. Proceedings of ACM Human-Computer Interaction, Vol. 2, CSCW, Article 32 (Nov. 2018), 25 pages. https://doi.org/10.1145/3274301Google Scholar
Digital Library
- Nadine Chaurand and Markus Brauer. 2008. What Determines Social Control? People's Reactions to Counternormative Behaviors in Urban Environments. Journal of Applied Social Psychology, Vol. 38, 7 (2008), 1689--1715.Google Scholar
Cross Ref
- Peggy Chekroun and Markus Brauer. 2002. The Bystander Effect and Social Control Behavior: The Effect of the Presence of Others on People's Reactions to Norm Violations. European Journal of Social Psychology, Vol. 32, 6 (2002), 853--867.Google Scholar
Cross Ref
- Elizabeth Chell. 2004. Critical Incident Technique. In Essential Guide to Qualitative Methods in Organizational Research. SAGE Publications, 45--60.Google Scholar
- Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2014. How Community Feedback Shapes User Behavior. In Proceedings of the 8th International AAAI Conference on Web and Social Media .Google Scholar
Cross Ref
- Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2015. Antisocial Behavior in Online Discussion Communities. In Proceedings of the 9th International AAAI Conference on Web and Social Media .Google Scholar
- Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, 503--514. https://doi.org/10.1145/2818048.2819996Google Scholar
Digital Library
- Natalia Criado and Jose M Such. 2015. Implicit Contextual Integrity in Online Social Networks. Information Sciences, Vol. 325 (2015), 48--69.Google Scholar
Digital Library
- Michael A. DeVito, Jeremy Birnholtz, and Jeffery T. Hancock. 2017. Platforms, People, and Perception: Using Affordances to Understand Self-Presentation on Social Media. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 740--754. https://doi.org/10.1145/2998181.2998192Google Scholar
Digital Library
- Paul Dourish and Ken Anderson. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Proceedings of Human-Computer Interaction, Vol. 21, 3 (2006), 319--342.Google Scholar
Digital Library
- Robert C Ellickson. 1991. Order Without Law. Harvard University Press, Cambridge, MA.Google Scholar
- Nicole Ellison, Rebecca Heino, and Jennifer Gibbs. 2006. Managing Impressions Online: Self-presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication, Vol. 11, 2 (2006), 415--441.Google Scholar
- Nicole B. Ellison, Megan French, Eden Litt, S. Shyam Sundar, and Penny Trieu. 2018. Without a Trace: How Studying Invisible Interactions Can Help Us Understand Social Media. In Proceedings of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '18). ACM, New York, NY, 129--132. https://doi.org/10.1145/3272973.3274544Google Scholar
Digital Library
- Ernst Fehr and Urs Fischbacher. 2004. Social Norms and Human Cooperation. Trends in cognitive sciences, Vol. 8, 4 (2004), 185--190.Google Scholar
- Katleen Gabriels and Charlotte JS De Backer. 2016. Virtual Gossip: How Gossip Regulates Moral Life in Virtual Worlds. Computers in Human Behavior, Vol. 63 (2016), 683--693.Google Scholar
Digital Library
- Vaibhav Garg, Sameer Patil, Apu Kapadia, and L. Jean Camp. 2013. Peer-produced Privacy Protection. In IEEE International Symposium on Technology and Society (ISTAS). 147--154. https://doi.org/10.1109/ISTAS.2013.6613114Google Scholar
- Ilana Gershon. 2010. The breakup 2.0: Disconnecting Over New Media. Cornell University Press, Ithaca, NY.Google Scholar
Digital Library
- Anthony Giddens, Mitchell Duneier, Richard P Appelbaum, and Deborah Carr. 2006. Essentials of Sociology. W. W. Norton, New York.Google Scholar
- Eric Gilbert. 2013. Widespread Underprovision on Reddit. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, 803--808. https://doi.org/10.1145/2441776.2441866Google Scholar
Digital Library
- Erving Goffman. 1959. The Presentation of Self in Everyday Life. Anchor Books, New York.Google Scholar
- Erving Goffman. 2009. Stigma: Notes on the Management of Spoiled Identity. Simon and Schuster.Google Scholar
- Caroline Haythornthwaite. 2005. Social networks and Internet connectivity effects. Information, Community & Society, Vol. 8, 2 (2005), 125--147.Google Scholar
Cross Ref
- George Caspar Homans. 1950. The Human Group. Harcourt, New York.Google Scholar
- Val Hooper and Tarika Kalidas. 2012. Acceptable and Unacceptable Behaviour on Social Networking Sites: A Study of The Behavioural Norms of Youth on Facebook. Electronic Journal of Information Systems Evaluation, Vol. 15, 3 (2012), 259.Google Scholar
- Christine Horne. 2003. The Internal Enforcement of Norms. European Sociological Review, Vol. 19, 4 (2003), 335--343.Google Scholar
Cross Ref
- Craig D Howard, Andrew F Barrett, and Theodore W Frick. 2010. Anonymity to Promote Peer Feedback: Pre-Service Teachers' Comments in Asynchronous Computer-Mediated Communication. Journal of Educational Computing Research, Vol. 43, 1 (2010), 89--112.Google Scholar
Cross Ref
- Julie Hui, Amos Glenn, Rachel Jue, Elizabeth Gerber, and Steven Dow. 2015. Using Anonymity and Communal Efforts to Improve Quality of Crowdsourced Feedback. In Proceedings of the 3rd AAAI Conference on Human Computation and Crowdsourcing (HCOMP '15). 72--82.Google Scholar
Cross Ref
- Haiyan Jia and Heng Xu. 2016. Autonomous and Interdependent: Collaborative Privacy Management on Social Networking Sites. In Proceedings of the 2016 SIGCHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, 4286--4297. https://doi.org/10.1145/2858036.2858415Google Scholar
Digital Library
- Rosabeth Moss Kanter. 2008. Men and Women of The Corporation. Basic, New York.Google Scholar
- Matthew Kay, Cynthia Matuszek, and Sean A. Munson. 2015. Unequal Representation and Gender Stereotypes in Image Search Results for Occupations. In Proceedings of the 2015 SIGCHI Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, 3819--3828. https://doi.org/10.1145/2702123.2702520Google Scholar
Digital Library
- Rob Kling, Ya-ching Lee, Al Teich, and Mark S Frankel. 1999. Assessing anonymous communication on the internet: Policy deliberations. The Information Society, Vol. 15, 2 (1999), 79--90.Google Scholar
Cross Ref
- Robert E Kraut and Paul Resnick. 2012a. Building Successful Online Communities: Evidence-based Social Design .MIT Press, Cambridge, MA, Chapter Regulating Behavior in Online Communities, 125--177.Google Scholar
Digital Library
- Robert E Kraut and Paul Resnick. 2012b. Building Successful Online Communities: Evidence-based Social Design. MIT Press, Cambridge, MA.Google Scholar
Digital Library
- Cliff Lampe, Nicole B. Ellison, and Charles Steinfield. 2008. Changes in Use and Perception of Facebook. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (CSCW '08). ACM, New York, NY, 721--730. https://doi.org/10.1145/1460563.1460675Google Scholar
Digital Library
- Cliff Lampe and Erik Johnston. 2005. Follow the (Slash) Dot: Effects of Feedback on New Members in an Online Community. In Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work (GROUP '05). ACM, New York, NY, 11--20. https://doi.org/10.1145/1099203.1099206Google Scholar
Digital Library
- Cliff Lampe, Erik Johnston, and Paul Resnick. 2007. Follow the Reader: Filtering Comments on Slashdot. In Proceedings of the 2007 SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, New York, NY, 1253--1262. https://doi.org/10.1145/1240624.1240815Google Scholar
Digital Library
- Cliff Lampe, Jessica Vitak, Rebecca Gray, and Nicole Ellison. 2012. Perceptions of Facebook's Value As an Information Source. In Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, 3195--3204. https://doi.org/10.1145/2207676.2208739Google Scholar
Digital Library
- Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it Together: Interpersonal Management of Disclosure in Social Network Services. In Proceedings of the 2011 SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 3217--3226. https://doi.org/10.1145/1978942.1979420Google Scholar
Digital Library
- Airi Lampinen, Sakari Tamminen, and Antti Oulasvirta. 2009. All My People Right Here, Right Now: Management of Group Co-presence on a Social Networking Site. In Proceedings of the 2009 ACM International Conference on Supporting Group Work (GROUP '09). ACM, New York, NY, 281--290. https://doi.org/10.1145/1531674.1531717Google Scholar
Digital Library
- Maria Knight Lapinski and Rajiv N Rimal. 2005. An Explication of Social Norms. Communication theory, Vol. 15, 2 (2005), 127--147.Google Scholar
- Lawrence Lessig. 1999. Code and Other Laws of Cyberspace. Basic Books, Inc., New York.Google Scholar
Digital Library
- Aart C Liefbroer and Francesco C Billari. 2010. Bringing Norms Back In: A Theoretical and Empirical Discussion of Their Importance for Understanding Demographic Behaviour. Population, Space and Place, Vol. 16, 4 (2010), 287--305.Google Scholar
Cross Ref
- Eden Litt, Erin Spottswood, Jeremy Birnholtz, Jeff T Hancock, Madeline E Smith, and Lindsay Reynolds. 2014. Awkward Encounters of an Other Kind: Collective Self-presentation and Face Threat on Facebook. In Proceedings of the 2014 ACM conference on Computer Supported Cooperative Work & Social Computing (CSCW '14). ACM, New York, NY, 449--460. https://doi.org/10.1145/2531602.2531646Google Scholar
Digital Library
- Marisela Gutierrez Lopez and Saila Ovaska. 2013. A Look at Unsociability on Facebook. In Proceedings of the 27th International BCS Human Computer Interaction Conference (BCS-HCI '13). British Computer Society, Swinton, UK, UK, Article 13, 10 pages.Google Scholar
Digital Library
- Davan Maharaj. 1997. UCI Internet Hate Mail Case Ruled a Mistrial. https://www.latimes.com/archives/la-xpm-1997-nov-22-mn-56652-story.html Accessed Apr 4., 2019.Google Scholar
- Lena Mamykina, Bella Manoim, Manas Mittal, George Hripcsak, and Björn Hartmann. 2011. Design Lessons From the Fastest Q&a Site in the West. In Proceedings of the 2011 SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 2857--2866. https://doi.org/10.1145/1978942.1979366Google Scholar
Digital Library
- Alice E Marwick and danah boyd. 2014. Networked privacy: How Teenagers Negotiate Context in Social Media. New media & society, Vol. 16, 7 (2014), 1051--1067.Google Scholar
- Caitlin McLaughlin and Jessica Vitak. 2012. Norm Evolution and Violation on Facebook. New media & society, Vol. 14, 2 (2012), 299--315.Google Scholar
- Jae Yun Moon and Lee S Sproull. 2008. The Role of Feedback in Managing the Internet-Based Volunteer Work Force. Information Systems Research, Vol. 19, 4 (2008), 494--515.Google Scholar
Cross Ref
- Jonathan T. Morgan and Anna Filippova. 2018. 'Welcome' Changes?: Descriptive and Injunctive Norms in a Wikipedia Sub-Community. Proceedings of the ACM Human-Computer Interaction, Vol. 2, CSCW, Article 52 (Nov. 2018), 26 pages. https://doi.org/10.1145/3274321Google Scholar
Digital Library
- Alison R. Murphy, Madhu C. Reddy, and Heng Xu. 2014. Privacy Practices in Collaborative Environments: A Study of Emergency Department Staff. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '14). ACM, New York, NY, 269--282.Google Scholar
Digital Library
- David M Newman. 2018. Sociology: Exploring the Architecture of Everyday Life. Sage Publications.Google Scholar
- Christena E Nippert-Eng. 2010. Islands of Privacy. University of Chicago Press, Chicago, IL.Google Scholar
- Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Redwood City.Google Scholar
Digital Library
- Karl-Dieter Opp. 2001. How Do Norms Emerge? An Outline of a Theory. Mind & Society, Vol. 2, 1 (2001), 101--128.Google Scholar
Cross Ref
- Elinor Ostrom. 1990. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press.Google Scholar
- Leysia Palen and Paul Dourish. 2003. Unpacking “Privacy” for a Networked World. In Proceedings of the 2003 SIGCHI Conference on Human Factors in Computing Systems (CHI '03). ACM, New York, NY, 129--136. https://doi.org/10.1145/642611.642635Google Scholar
Digital Library
- Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY.Google Scholar
- Richard A Posner and Eric B Rasmusen. 1999. Creating and Enforcing Norms, with Special Reference to Sanctions. International Review of Law and Economics, Vol. 19, 3 (1999), 369--382.Google Scholar
Cross Ref
- Tom Postmes, Russell Spears, and Martin Lea. 2000. The Formation of Group Norms in Computer-Mediated Communication. Human Communication Research, Vol. 26, 3 (2000), 341--371.Google Scholar
Cross Ref
- Artemio Ramirez Jr and Shuangyue Zhang. 2007. When Online Meets Offline: The Effect of Modality Switching on Relational Communication. Communication Monographs, Vol. 74, 3 (2007), 287--310.Google Scholar
Cross Ref
- Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. "You don't want to be the next meme": College Studentstextquoteright Workarounds to Manage Privacy in the Era of Pervasive Photography. In Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS 2018) (SOUPS '18). USENIX Association, Baltimore, MD, 143--157.Google Scholar
- Carmen Santamar'ia-Garc'ia. 2014. Evaluative Discourse and Politeness in University Students' Communication Through Social Networking Sites. Evaluation in context, Vol. 242 (2014), 387.Google Scholar
- Richard Schaefer and Robert LAMM. 1995. Sociology. McGraw-Hill, New York.Google Scholar
- Sarita Yardi Schoenebeck. 2013. The Secret Life of Online Moms: Anonymity and Disinhibition on Youbemom. com. In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media .Google Scholar
- Joseph Seering, Robert Kraut, and Laura Dabbish. 2017. Shaping Pro and Anti-Social Behavior on Twitch Through Moderation and Example-Setting. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 111--125. https://doi.org/10.1145/2998181.2998277Google Scholar
Digital Library
- Linda Shallcross, Michael Sheehan, and Sheryl Ramsay. 2008. Workplace Mobbing: Experiences in The Public Sector. Workplace Mobbing: Experiences in the public sector, Vol. 13, 2 (2008), 56--70.Google Scholar
- Christina Parajon Skinner. 2011. Unprofessional Sides of Social Media and Social Networking: How Current Standards Fall Short. SCL Rev., Vol. 63 (2011), 241.Google Scholar
- Aaron Smith and Monica Anderson. 2018. Social Media Use in 2018. https://www.pewinternet.org/2018/03/01/social-media-use-in-2018/ Accessed Mar. 31, 2019.Google Scholar
- Daniel J Solove. 2005. A Taxonomy of Privacy. U. Pa. L. Rev., Vol. 154 (2005), 477--564.Google Scholar
Cross Ref
- Daniel J Solove. 2007. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. Yale University Press, New Haven, CT.Google Scholar
- Anna C Squicciarini, Heng Xu, and Xiaolong Luke Zhang. 2011. CoPE: Enabling Collaborative Privacy Management in Online Social Networks. Journal of the Association for Information Science and Technology, Vol. 62, 3 (2011), 521--534.Google Scholar
Digital Library
- Anselm Strauss and Juliet Corbin. 1998. Basics of Qualitative Research : Techniques and Procedures for Developing Grounded Theory. Sage Publications, Thousand Oaks, CA.Google Scholar
- Fred Stutzman and Woodrow Hartzog. 2012. Boundary Regulation in Social Media. In Proceedings of the 2012 ACM Conference on Computer Supported Cooperative Work (CSCW '12). ACM, New York, NY, 769--778. https://doi.org/10.1145/2145204.2145320Google Scholar
Digital Library
- Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends Only: Examining a Privacy-enhancing Behavior in Facebook. In Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 1553--1562. https://doi.org/10.1145/1753326.1753559Google Scholar
Digital Library
- Jose M Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, 3821--3832.Google Scholar
Digital Library
- John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior, Vol. 7, 3 (2004), 321--326.Google Scholar
- Lee Taber and Steve Whittaker. 2018. Personality Depends on The Medium: Differences in Self-Perception on Snapchat, Facebook and Offline. In Proceedings of the 2018 SIGCHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, Article 607, 13 pages. https://doi.org/10.1145/3173574.3174181Google Scholar
Digital Library
- Alex S. Taylor and Richard Harper. 2003. The Gift of the Gab?: A Design Oriented Sociology of Young People's Use of Mobiles. Computer Supported Cooperative Work, Vol. 12, 3 (July 2003), 267--296. https://doi.org/10.1023/A:1025091532662Google Scholar
Digital Library
- Twitter. 2019. About your activity dashboard. https://help.twitter.com/en/managing-your-account/using-the-tweet-activity-dashboard Accessed June. 26, 2019.Google Scholar
- Suvi Uski and Airi Lampinen. 2016. Social Norms and Self-presentation on Social Network Sites: Profile Work in Action. New media & society, Vol. 18, 3 (2016), 447--464.Google Scholar
- Daniel Villatoro, Giulia Andrighetto, Jordi Sabater-Mir, and Rosaria Conte. 2011. Dynamic Sanctioning for Robust and Cost-Efficient Norm Compliance. In Proceedings of the 22nd International AAAI Conference on Joint Conference on Artificial Intelligence. AAAI Press, Barcelona, 414--419.Google Scholar
- Joseph B Walther, Brandon Van Der Heide, Lauren M Hamel, and Hillary C Shulman. 2009. Self-generated Versus Other-generated Statements and Impressions in Computer-Mediated Communication: A Test of Warranting Theory Using Facebook. Communication Research, Vol. 36, 2 (2009), 229--253.Google Scholar
- Joseph B Walther, Brandon Van Der Heide, Sang-Yeon Kim, David Westerman, and Stephanie Tom Tong. 2008. The Role of Friends' Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep? Human Communication Research, Vol. 34, 1 (2008), 28--49.Google Scholar
- Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, and Lorrie Faith Cranor. 2013. Privacy Nudges for Social Media: An Exploratory Facebook Study. In Proceedings of the 22Nd International Conference on World Wide Web (WWW '13). ACM, New York, NY, 763--770. https://doi.org/10.1145/2487788.2488038Google Scholar
Digital Library
- Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for My Space: Coping Mechanisms for SNS Boundary Regulation. In Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, 609--618. https://doi.org/10.1145/2207676.2207761Google Scholar
Digital Library
- Loreen Wolfer. 2014. They shouldn't post that! Student Perception of Inappropriate Posts on Facebook Regarding Alcohol Consumption and The Implications for Peer Socialization. Journal of Social Sciences, Vol. 10, 2 (2014), 77--85.Google Scholar
Cross Ref
- Heng Xu. 2011. Reframing privacy 2.0 in online social network. Constitutional Law, Vol. 14 (2011), 1077.Google Scholar
- Nick Yee, Jeremy N Bailenson, Mark Urbanek, Francis Chang, and Dan Merget. 2007. The Unbearable Likeness of Being Digital: The Persistence of Nonverbal Social Norms in Online Virtual Environments. CyberPsychology & Behavior, Vol. 10, 1 (2007), 115--121.Google Scholar
Cross Ref
Index Terms
"It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media
Recommendations
Disclosure, Privacy, and Stigma on Social Media: Examining Non-Disclosure of Distressing Experiences
Disclosures of distress and stigma on identified social media can be beneficial. Yet, many who may benefit from such disclosures do not engage in them. I examine factors that inform decisions to not disclose stigmatized experiences on identified social ...
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Online Bonding and Bridging Social Capital via Social Networking Sites
This research aimed to explore types of online social capital bridging and bonding that the Emiratis perceive in the context of social networking site SNS usage. A snow-ball sample of 230 Emiratis from two Emirates, Abu Dhabi and Dubai was used. The ...






Comments