First Monday

A privacy paradox: Social networking in the United States by Susan B. Barnes



Abstract
Teenagers will freely give up personal information to join social networks on the Internet. Afterwards, they are surprised when their parents read their journals. Communities are outraged by the personal information posted by young people online and colleges keep track of student activities on and off campus. The posting of personal information by teens and students has consequences. This article will discuss the uproar over privacy issues in social networks by describing a privacy paradox; private versus public space; and, social networking privacy issues. It will finally discuss proposed privacy solutions and steps that can be taken to help resolve the privacy paradox.

Contents

A privacy paradox
Public versus private boundaries
Privacy
Privacy issues
Privacy solutions
Will the solutions resolve the paradox?
Conclusion

 


 

A privacy paradox

The popularity of social networking sites on the Internet introduces the use of mediated–communication into the relationship development process. Teenagers now use organized social Web sites to meet others and explore identity formation. These sites can be viewed within a larger trend that shifts the influence of interpersonal correspondence to mediated messages. James Beniger (1986) described how in 1870 a crisis of control in the production sector of the United States evolved into a shift from personal relationships to bureaucratic organizational processes. Information processing systems were central to this change, and computers with microprocessors accelerated it. Beniger states: “The rise of the Information Society itself, more than even the parallel development of formal information theory, has exposed the centrality of information processing, communication, and control to all aspects of human society and social behavior.” [1] “As societies achieve higher degrees of organization, mechanisms of social control will inevitably expand.” [2] To run efficient control systems, a considerable amount of information needs to be collected about participants.

Today we have organizational and software procedures that control the exchange of interpersonal information in social networking sites, text messaging, instant messenger programs, bulletin boards, online role–playing games, computer–supported collaborative work (CSCW), and online education. All of these application fit into the larger category of social media, or media that support social collaboration. The term social media is an umbrella concept that describes social software and social networking. “Social software refers to various, loosely connected types of applications that allow individuals to communicate with one another, and to track discussions across the Web as they happen.” [3] These terms may be new, but the idea of using media as a form of social control has been evolving for a long time.

Benniger (1987) describes how mass media has gradually replaced interpersonal communication as a socializing force. Further, social networking sites have become popular sites for youth culture to explore themselves, relationships, and share cultural artifacts [4]. The sites centralize and help coordinate the interpersonal exchanges between American teens and global brands. Sites, such as MySpace, can use the social exchanges of American youth to glean marketing information about youth culture and reinforce brand images [5].

The personal information revealed by teenagers on these sites also attracts sexual predators. There have been a number of reports of sexual predators locating victims through social networking sites [6]. As a result of growing concern over the misuse of social networking, a new bill has been introduced into the United States Congress to protect teenagers. The newly proposed Deleting Online Predators Act of 2006 (Fitzpatrick, 2006) states the term “commercial social networking website” means a commercially operated Internet Web site that

“(i) allows users to create web pages or profiles that provide information about themselves and are available to others users; and

(ii) offers a mechanism for communication with other users, such as a forum, chat room, email, or instant messenger.” [7]

Commercial social networking sites thrive “on a sense of immediacy and community. The spirit is independent, even rebellious.” [8] Teenagers are learning how to use social networks by interacting with their friends, rather than learning these behaviors from their parents or teachers. “[Public conventions] generate our manners and morals — our shared assumptions — and allow communications.” [9] Often parents have no clue about the information teens are publicly revealing (Sullivan, 2005). Currently, a new type of communication behavior is emerging amongst teenagers as they explore their identities, experiment with behavioral norms, date, and build friendships.

Social networking sites, including Friendster.com, Tagged.com, Xanga.com, LiveJournal, MySpace, Facebook, and LikedIn have developed on the Internet over the past several years. For instance, MySpace was launched in January, 2004 and last November the Nielsen/Net Ratings, estimated that there were 24.5 million unique visitors to the site. More recently, the site boosted 90 million members or nearly one–third of the U.S. population (Noguchi, 2006). DeWolfe and Anderson, employees of Intermix Media, Inc. wanted to create MySpace as an Internet portal to rival Yahoo, MSN, and Google. In contrast to information seeking or news, their site would be based on user–generated content. The original content offered was music and band promotions, and the site quickly attracted many celebrities and fans. In March 2006, MySpace was the second most trafficked site on the Internet with Facebook at number 7. At times, MySpace has had more traffic than Google (Duffy, 2006).

Last September, Rupert Murdoch purchased MySpace from Intermix for a reported $580 million cash buyout. Currently, “Murdoch is getting: a gold mine of market research, a microscope into the content habits and brand choices of America’s capricious youth market — not to mention millions of potential new customers for News Corp.’s Fox subsidiaries.” [10]. Similarly, Christine Rosen, a fellow at the Ethics and Public Policy Center, observed that some of the discussion groups on Facebook look like mailing lists. The same names of discussion groups are also the names used in marketing directories [11]. The commercial aspect of the site is quite apparent.

According to ComScore Media Metrix (2006), more teens visit MySpace than Yahoo MSN or Electronic Arts, which is a gaming site. Social networking sites “play a key role in youth culture because they give youth a space to hang out amongst friends and peers, share cultural artifacts (like links to funny Web sites, comments about TV shows), and work out an image of how they see themselves.” [12] MySpace provides young people with the ability to blog, flirt, diarize, post pictures, share videos, creative artwork, and meet new people. Similarly, Facebook is a national online directory that connects students together at local schools and schools around the nation. Young people are “pouring their minds, if not their hearts, into cyberspace. They are doing it to clear their heads, stow their thoughts and get feedback from peers.” [13].

In America, we live in a paradoxical world of privacy. On one hand, teenagers reveal their intimate thoughts and behaviors online and, on the other hand, government agencies and marketers are collecting personal data about us. For instance, the government uses driver license databases to find “dead–beat dads” or fathers who are behind on their child support payments. Many government records have been turned into digital archives that can be searched through the Internet. Every time we use a shopping card, a retail store collects data about our consumer spending habits. Credit card companies can create even larger profiles of our shopping behaviors. Locked away on hundreds of servers is every minute detail of our daily lives from our individual buying preferences to personal thoughts. Galkin (1996) states: “Much of the information that people would like to keep secret is already lawfully in the possession of some company or government entity, and what we want is to stop further disclosure without authorization.” [14] Many people may not be aware of the fact that their privacy has already been jeopardized and they are not taking steps to protect their personal information from being used by others.

In an age of digital media, do we really have any privacy?

In an age of digital media, do we really have any privacy? Form Oscar Gandy’s (1993) perspective, we probably do not. Using the metaphor of a Panopticon — an architectural design that allowed prisoners to be monitored by observers — Gandy argues that surveillance systems can exert the same type of control in contemporary culture. He states: “the panoptic sort is an antidemocratic system of control that cannot be transformed because it can serve no purpose other than that for which it was designed — the rationalization and control of human existence.” [15] He calls for an agency that will be charged with ensuring the survival of privacy.

In post 9/11 America, government agencies appear to be doing the opposite. In 2005, the Department of Defense proposed to create a marketing and recruitment database to track students for military recruitment. According to the Electronic Frontier Foundation (2005), “Among the information kept on students were ethnicity, phone numbers, e–mail addresses, intended fields of study and extracurricular activities. The record system even included parents’ attitudes about military recruitment.” [16] But, the system was set up before notifying the public, a violation of the Privacy Act. Thus, establishing government agencies may not be a solution to the privacy dilemma. In a post 9/11 world, the U. S. government utilizes computer technology to exert some degree of control over its citizens, rather than protect their privacy.

Katz and Rice (2002) describe the Internet as a panopticon. They view the premise of the panopticon is a “constant view of individuals through parasocietal mechanisms that influence behavior simply because of the possibility of being observed.” [17] Internet software can be used as parasocietal mechanisms for the observation of online interactions. Online social networks allow for high levels of surveillance. In addition to marketers, college officials and parents can access social networking sites. Students may think that their Facebook or MySpace journal entries are private but they are actually public diaries.

Social networking sites create a central repository of personal information. These archives are persistent and cumulative [18]. Instead of replacing old information with new materials, online journals are archive–oriented compilations of entries that can be searched. While American adults are concerned about how the government and corporations are centrally collecting data about citizens and consumers, teenagers are freely giving up personal and private information in online journals. Marketers, school officials, government agencies, and online predators can collect data about young people through online teenage diaries. Herein lies the privacy paradox. Adults are concerned about invasion of privacy, while teens freely give up personal information. This occurs because often teens are not aware of the public nature of the Internet.

 

++++++++++

Public versus private boundaries

The private versus public boundaries of social media spaces are unclear. On the Internet, the illusion of privacy creates boundary problems. “New users and those engaged exclusively in recreational domains probably feel this illusion most strongly.” [19] For example, in a television interview about Facebook, one of my students stated that she was concerned about revealing personal information online. When the reporter asked to see her Facebook page, the page contained her home address, phone numbers, and pictures of her young son. Without being aware of the dangers of online social sites, she had revealed too much personal information.

Similarly, Viégas’ (2005) research on bloggers suggests “there is a disconnect between the way users say they feel about the privacy settings of their blogs and how they react once they experience unanticipated consequences form a breach of privacy.” [20] Lenhart (2005) reports that 81 percent of parents and 79 percent of online teens report “that teens are not careful enough about giving out their personal information online.” [21] Moreover, parents of younger teens are more apt to be concerned about the disclosure of personal data.

Social networking tools, have almost become indispensable for teenagers, who often think theirs lives are private as long as their parents are not reading their journals. Teen use of social networking sites has increased to an average of one hour 22 minutes per day [22]. Social networking sites are “already creating new forms of social behavior that blur the distinctions between online and real–world interactions.” [23] For example, “when students began posting pictures of themselves at parties holding a beer and leaving messages that were hurtful, defamatory or demeaning, schools began considering ways to regulate the speech on [MySpace].” [24] Adults tend to use the Web as a supplement to real–world activities while teenagers tend to ignore the difference between life online and off–line.

Unlike a written journal that can be kept private, online journals are written for others to read. Who should have access to these online records? “Some say that if the journal is open online, it should be available to parents. Others argue that [parents] reading journals is no different from eavesdropping on their kids.” [25] Still, others argue the safety issue. Teens use social networking sites as a form of entertainment, but occasionally online predators use these sites to stalk victims. Several young girls have been molested by men they have met on social networking sites [26].

Social networking tools, have almost become indispensable for teenagers, who often think theirs lives are private as long as their parents are not reading their journals.

In an attempt to better understand student attitudes toward social networking sites and privacy, a classroom attitudinal survey was conducted to collect data about student attitudes about Facebook [27]. In an exploratory survey, conducted with 64 undergraduate students, it was learned that 65 percent of the students used Facebook or MySpace. A Likert scale was utilized to collect data about student attitudes about privacy when they use social networking sites. When asked if they agreed or disagreed with the following statements:

I like to reveal information about myself to others through Facebook;
I trust the people I interact with on Facebook;
I can share my personal thoughts with others on Facebook; and,
I have included personal information in my profile,

the attitudinal results were neutral. There were no clear privacy attitudes related to the student’s use of Facebook. The only significant finding discovered was a strong disagreement with the statement: “everybody should know everything about everyone else.” Students wanted to keep information private, but did not seem to realize that Facebook is a public space. Sharing their personal information on social networking sites is not only sharing with online friends. Parents, future employers, and university officials can also read journal entries.

Some of the confusion about the public versus private space associated with social networks is the sign–up procedure. Sullivan (2005) states that “the sites deserve some blame for the release of personal information. In the sign–up process, many ask for e–mail addresses, for example.” [28] Asking for this type of information and setting up requirements for membership tend to make kids think it is safe to reveal personal information online. Friendster has a registration process and LickedIn is for people with professional affiliations. Additionally, Facebook requires an affiliation with a college or high school, which also creates the idea of a semi–private space. Sitting at home alone typing into a computer may feel like a private exchange. However, once private information is posted on the Internet, it becomes available for others to read. We have no control over who can read our seemingly private words.

 

++++++++++

Privacy

Privacy can be viewed from many different perspectives, including political policies, the rights of citizens, and protection for consumers. From a policy perspective, Schement and Curtis (1995) describe privacy “as security against intrusion by government.” [29] Garfinkel (2000) notes that the word privacy does not indicate the scope of the issues of privacy in the United States today. “Privacy isn’t just about hiding things. It’s about self–possession, autonomy, and integrity.” [30] Privacy is the “right of people to control what details about their lives stay inside their own houses and what leaks to the outside.” [31] Citizens and consumers should know who collects what information and how it is going to be used.

Students sharing drinking and fraternity pledging photos with their friends on social networking sites probably do not expect university administrators to use these images as evidence to reprimand student behavior [32]. A social exchange between friends has now become a way for universities to monitor student behavior. The question becomes, how is information posted on social networking sites being used by others? “When personal data about individuals are collected, processed, stored and retrieved without their consent, their information security is under threat. Information security also means that people are free to determine what information about themselves they want to share with others.” [33]. Young people do not seem to be aware of the uses of their personal information.

Laws regulate citizen and consumer rights. In commerce, much of the erosion of individual privacy occurs with the consent of the individual. For example, credit applications collect personal information and requests for catalogs can be used to compile direct mailing lists [34]. Moreover, collecting, analyzing, and interpreting personal information stored in databases has become a data–mining industry. As teenagers voluntarily provide information about themselves on social networking sites, this information could also be used by data–miners.

Many societies provide spaces for individual autonomy, a space that respects privacy. In legal cases an individual’s expectations about privacy is generally debated. Another privacy issue raised by commercial social networking sites is the users’ expectations of privacy. In the exploratory survey, students were asked to respond to the statement: “Facebook respects my privacy.” The student responses were neutral with a slight tendency to disagree with the statement. Similarly when asked the following statement: “In mediated environments like Facebook, my personal privacy is made public.” The student responses were again neutral on a Likert scale. Some students may be aware that Facebook is not a private space, but many act as if it is private.

When asked in an open-ended question about the meaning of privacy, the responses varied from flip comments to serious answers (see appendix). For example, one student wrote: “Refer to the dictionary.com definition of privacy.” And, another stated: “Privacy is being able to keep things from public knowledge/access.” A third student’s answer directly related to Facebook: “You aren’t required to show anything except your name and school email. So anything you post beyond that is your choice.” But, choosing to reveal information and then having it used for a different purpose by third parties is a privacy issue [35]. Disclosure of private information on social networking sites can have a negative impact on students. Because schools, college admissions officers, and future employers are checking these sites, personal information and pictures revealed online can directly influence a student’s educational, employment and financial future.

Moreover, teenagers sometimes fabricate information to post on these sites. “Increasingly, many teenagers feel pressured to show themselves doing more risqué things, even if they are not actually doing them.” [36] For instance, girls have “blogged about weekends of dinking and debauchery, while in reality they were coloring with their younger siblings or watching old movies with Grandma.” [37] What happens when a parent or college admissions officer reads these false postings? One can only imagine. As teens flock to the Internet to share their intimate thoughts, social networking sites raise a number of privacy issues that need to be addressed.

 

++++++++++

Privacy issues

Etzioni (1999) argues the first step in examining a privacy issue is to determine whether or not there is a problem. Do we have a problem with the sharing of private information on social networking sites? According to the popular press and recent reports, there are a number of social concerns associated with social networking sites including the following: teenagers revealing too much information about themselves online (Bahrampour and Aratani, 2006; Downes, 2006; Komblum, 2005; Sullivan, 2005; Viser, 2005); children being exposed to pedophiles (Huffaker and Calvert, 2005; Lenhart, 2005); teenagers being raped by people they meet on social networking sites (Antone, 2006; Associated Press, 2006a; Reuters, 2006b); companies using the sites to collect marketing information (Hempel and Lehman, 2005; Verini, 2006); and, children under the age of 14 using social networks (Antone, 2006; Reuters, 2006b). “Under–14s are not supposed to use MySpace but tens of thousands ignore that stipulation, inventing ages and high schools careers still beyond their reach, and sometimes posting sexually precocious pictures.” [38]

According to three 2005 Pew Reports (Lenhart, 2005; Lenhart, et al., 2005; Lenhart and Madden, 2005), 87 percent of American teens aged 12–17 are using the Internet. Fifty–one percent of these teenagers state that they go online on a daily basis. Approximately four million teenagers or 19 percent say that they create their own weblogs (personal online journals) and 22 percent report that they maintain a personal Web page (Lenhart and Madden, 2005). In blogs and on personal Web sites, teenagers are providing so much personal information about themselves that it has become a concern. Today, content creation is not only sharing music and videos, it involves personal diaries,

Commercial social networking sites have been designed to enable users to create their own online content. “Brad Greenspan, an early MySpace investor no longer affiliated with the site, said that after observing Friendster, ‘we realized that to allow people more personalization and control would give people more attachment to their Web pages’.” [39] This appears to be working because MySpace is now one of the most trafficked sites on the Internet. Lenhart and Madden (2005) report that 57 percent of online teens are creating Internet content. Additionally, more teenagers write and read weblogs, than adults. Often teenage weblogs contain personal information.

An analysis of weblogs revealed that the types of personal information revealed online includes name, address, birth date, location, and numerous contacts, including e–mail addresses, instant messaging user names, and links to personal Web pages (Huffaker and Calvert, 2005). “Because teenage bloggers are revealing a considerable amount of personal information, as well as multiple ways to contact them online, the danger of cyberstaking and communicating with strangers online is a serious issue.” [40]

Marketers who target teen consumers can use stated, personal information gathered from social networking sites for purposes other than what users intend. Today, the commoditization of information has made it necessary to consider the invasion of privacy by corporations. Schement and Curtis (1995) state that “information is gathered so that the economy can support its participants.” [41] In a capitalistic society, marketers can use personal information collected in public online databases for commercial purposes. Additionally, companies such as Coke, Apple Computer and Proctor & Gamble are using social networking sites as promotional tools [42] For instance, Apple Computer sponsors the Apple discussion list on Facebook.

Schools can also access and use the information posted on social networking sites. At Chicago’s Loyola University, athletes were told to get off Facebook and MySpace or risk losing their scholarships (Sports Illustrated, 2006). In May 2006, a number of hazing photos appeared on a site called badjocks.com showing athletes from Princeton, Michigan, Fordham, and UC–Santa Barbara behaving badly. As a result, schools have started investigations into student athlete behavior.

Parents, schools, social networking companies and government officials consider the outpouring of personal information in public social networking sites to be a problem. As a result, a number of social, technological and legal solutions are currently being explored. Last April, MySpace hired a safety czar to oversee its site and they began deleting 5,000 under–age profiles a day (Reuters, 2006b). Additionally, they are requiring all members under the age of 18 to review safety tips before they can register for the site. The company also restricts the profiles of users under the age of 16. These efforts are only a few of a number of potential solutions to the social networking privacy problem.

 

++++++++++

Privacy solutions

Solutions to protecting privacy in online social networking sites can be approached in three different ways — social solutions, technical solutions, and legal solutions. Parents, schools, and social networking sites are working on various social solutions to the privacy problem. Experts (Sullivan, 2005) agree that the first step in building protections for teenage bloggers starts with parents. A representative from Wired Safety.org remarked that “parents need to be much more involved with their kids’ computer use than they are.” [43] A growing gap is evolving between teenage and parent use of new technology and parents need to spend time learning about these differences. “The Federal Bureau of Investigation and the National Center for Missing and Exploited Children offer parents advice for detecting whether their child is engaging in appropriate behavior.” [44]

Schools have also taken action to protect the safety of young individuals in social networking sites and they are scrambling to come up with policies on social networking sites. “In many cases, schools are being forced to respond to real world problems which only came to their attention because this information was so publicly accessible on the Web.” [45] But schools are not clear about what actions they should take about student participation in social networking sites.

Principals have called, written, and sent e–mail to parents about teens placing too much personal information on the Internet. Some schools have banned blogs and asked students to take their information off the network (Kornblum, 2005). Other schools have refused to let students register for social networking sites with a school e–mail address. Additionally, schools are warning students that college admissions officers and future employers are checking social networking sites to read what applicants have written online [46]. Colleges and universities have taken action as a result of hazing photographs of athletes appearing on the Internet. Teams have been suspended and student athletes are requested to take their images off of the Internet. Additionally, students are being warned that they will be reprimanded for pictures posted on the Internet that reveal misbehavior (Wolverton, 2006).

Currently, commercial social networking companies are reacting to the problem of teens online. MySpace has reported “working with the National Center for Missing and Exploited Children and the Advertising Council to create the largest–ever online safety program using nationwide public service advertisements.” (Auchard, 2006). MySpace is posting safety ads. “The spots, which computer users can see on MySpace in the form of banner ads, were also slated to begin running on a host of News Corp. outlets, including other Fox Interactive Media Web sites, the 28 Fox Networks Group broadcast networks, Fox All Access Radio and the New York Post.” (Associated Press, 2006b).

Protection of teens is a parental responsibility. But the education of teens and their parents to the growing privacy problem will require an educational effort that involves schools, social networking organizations, and government agencies.

In addition to social awareness, social networking sites are exploring technological solutions to better protect their users. “A few cases of online friendships that turned violent or even homicidal have pressured social–network sites to provide better security for their members. Facebook recently overhauled its privacy setting to give members tighter controls over who sees what.” [47] Additionally, MySpace utilizes software to try and identify children under the age of 14. But, they admitted that it was difficult to verify the age of all their users (Reuters, 2006a). As a result, Massachusetts Attorney General Tom Reilly has “asked MySpace to install an age and identity verification system, equip Web pages with a ‘Report Inappropriate Content’ link, respond to all reports of inappropriate content within 24 hours and significantly raise the number of staff who review images and content.” [48]

Legal solutions to privacy issues involve both the human monitoring of social networking sites and technological solutions. On 10 May 2006 Representative Michael Fitzpatrick, a Pennsylvania Republican, introduced a new bill into Congress. It is called the Deleting Online Predators Act (DOPA). “The proposed law would extend current regulations that require all federally funded schools and libraries to deploy Internet filters. The law is so broadly defined that it would limit access to any commercial site that allows users to create a profile and communicate with strangers.” [49] Although, this bill will help to protect teens who access social networking sites through libraries and schools, it would not protect teens using computers in their own homes. Protection of teens is a parental responsibility. But the education of teens and their parents to the growing privacy problem will require an educational effort that involves schools, social networking organizations, and government agencies.

 

++++++++++

Will the solutions resolve the paradox?

Commercial social networking sites have been set up to support the flow of information created by individuals. The purpose of these sites is to advertise and promote brand recognition in consumers, especially teenagers. This is a new type of subtle promotion and standards are needed to protect the interests of consumers. At one level, privacy issues on commercial social networking sites are an industry issue. How is the information collected in social databases being used by others? For instance, the T–mobile phone service automatically backs up pictures on remote servers. When a young woman lost her cell phone with a built–in camera, she purchased a new one and found pictures of the person using the lost phone. The incident ended with the arrest of a 16–year–old on charges of possessing the missing phone [50]. People are not always aware of how information is being stored on databases. As consumers, individuals need to clearly know how their personal information is being stored and used by others.

On a second level, K–12 schools as well as colleges need to educate students about the proper and improper use of the Internet. Duboff (2006) reports a number of stories where college police have used Facebook as a crime–fighting tool. From under age drinking to misbehavior, college officials can use social networking sites as a method for locating students involved in inappropriate behavior. To educate college students about social networking sites, Tracy Mitrano (2006), Director of IT Policy and Computer Policy and Law Program at Cornell University, created an introduction to Facebook for college students. She warns “on Facebook, you have absolutely no expectation of privacy.” [51] Schools are now actively involved in the process of teaching students about the privacy issues associated with the use of social networking sites.

Marino (2006) emphasized the idea of individual responsibility when using social networking sites. Developing responsible citizens occurs at the family level. Parents also need to be educated about how to teach their children to be responsible Internet citizens. The social solutions to the privacy paradox begin at home.

Finally, from the legal level, government officials are proposing legislation to protect minors against the misuse of their personal information by predators. Although, predatory behavior is a major social concern and one not to be easily dismissed, the root of the privacy paradox is the collection and control of personal information. Steps to be taken To resolve this paradox, steps need to be taken at all levels of society, beginning with the education of parents and teenagers about the use and potential misuse of personal information. Moreover, social networking companies and advertisers need to establish policies about the proper use of personal information posted on these sites. What do we gain and what do we lose when personal information is collected on the Internet?

 

++++++++++

Conclusion

Currently social responses to privacy in social networks do not tend to deal with the potential misuse of personal information. Instead the response is based on the protection of children against predators, which is only one aspect of the privacy paradox. Similarly, a legal response has been the proposal of a bill to protect underage children. The government and industry responses tend to focus on the issue of predators and this focus distracts from the actual privacy issue — the social behavior of teenagers on the Internet and the use and misuse of their private information.

The solution to the paradox is not simple. It will take all levels of society to tackle the social issues related to teens and privacy. Awareness is key to solving the solution. We as individuals need to be more proactive about educating each other and protecting our privacy on the Internet. End of article

 

About the author

Susan B. Barnes is a Professor in the Department of Communication at the Rochester Institute of Technology (RIT). She is the author of Online connections: Internet interpersonal relationships (Creskill, N.J.: Hampton Press, 2001), Computer–mediated communication: Human to human communication across the Internet (Boston: Allyn & Bacon, 2002), and Web research: Selecting, evaluating, and citing (with Marie L. Radford & Linda R. Barr; Boston: Allyn & Bacon, 2002, 2006). Currently, she is the Associate Director of the Lab for Social Computing at RIT.
E–mail: Susan [dot] Barnes [at] rit [dot] edu

 

Notes

1. Beniger, 1986, p. 436.

2. Hamelink, 2000, p. 131.

3. Tepper, 2003, p. 19.

4. Jenkins and Boyd, 2006, par. 7.

5. See Hempel and Lehman, 2005.

6. Antone, 2006; Reuters, 2006b.

7. Fitzpatrick, 2006, Section 254(h)(7) of HR5319 IH.

8. Howe, 2005, p. 218.

9. Karnow, 1997, p. 255.

10. Verini, 2006, p. 244.

11. See Bugeja, 2006.

12. Jenkins and Boyd, 2006, para. 7.

13. Hoang, 2006, p. 8E.

14. Galkin, 1996, para. 14.

15. Gandy, 1993, p. 227.

16. Electronic Frontier Foundation, 2005, par. 4.

17. Katz and Rice, 2002, p. 272.

18. See Viégas, 2005.

19. Katz and Rice, 2002, p. 270.

20. Viégas, 2005, para. 22.

21. Lenhart, 2005, p. 15.

22. See Hempel and Lehman, 2005, para. 9.

23. Hempel and Lehman, 2005, para. 7.

24. Duffy, 2006, para. 5.

25. Kornblum, 2005, para. 35.

26. See Kornblum, 2005; Antone, 2006.

27. An attitudinal survey about privacy and the use of Facebook was conducted in two classes at the Rochester Institute of Technology for the purposes of discussing privacy issues on the Internet in the classroom.

28. Sullivan, 2005, para. 24.

29. Schement and Curtis, 1995, p. 136.

30. Garfinkel, 2000, p. 4.

31. Ibid.

32. See Wolverton, 2006.

33. Hamelink, 2000, p. 132.

34. See Hamelink, 2000.

35. See Galkin, 1996.

36. Bahrampour and Aratani, 2006, para. 38.

37. Ibid.

38. Reuters, 2006b, para. 15.

39. Associated Press, 2006a, para. 17.

40. Huffaker and Calvert, 2005, para. 63.

41. Schement and Curtis, 1995, p. 137.

42. See Hempel and Lehman, 2005.

43. Cited in Sullivan, 2005, para. 26.

44. Downes, 2006, para. 8.

45. Jenkins and Boyd, 2006, para. 10.

46. See Bahrampour and Aratani, 2006.

47. Duffy, 2006, para. 6.

48. Reuters, 2006a, para. 15.

49. Jenkins and Boyd, 2006, para. 22.

50. See Confessore, 2006.

51. Mitrano, 2006, para. 15.

 

References

Rod Antone, 2006. “Another isle man allegedly baits teen victim on MySpace,” Honolulu Star Bulletin (9 March), at http://starbulletin.com/2006/03/09/news/story05.html, accessed 21 March 2006.

Associated Press. 2006a. “Police: Teens may have met assailants on MySpace.com,” CNN.com (3 February), at http://www.cnn.com/2006/TECH/internet/02/03/myspace.assaults.ap/index.html, accessed 21 February 2006.

Associated Press, 2006b. “MySpace.com posts safety ads,” CNN.com (11 April), at http://www.cnn.com/2006/TECH/internet/o4/11/myspace.safety.ap/index.html, accessed 12 April 2006.

Eric Auchard, 2006. “MySpace.com hires child safety czar from Microsoft,” Reuters (10 April), at http://today.reuters.com/news/articlebusiness.aspx?type=media&storyID=nN101347&from=business, accessed 12 April 2006.

Tara Bahrampour and Lori Aratani, 2006. “Teens’ bold blogs alarm area schools,” Washington Post (17 January), at http://www.washingtonpost.com/wp-dyn/content/article/2006/01/16/AR2006011601489.html, accessed 18 January 2006.

James R. Beniger, 1986. The control revolution: Technological and economic origins of the information society. Cambridge, Mass.: Harvard University Press.

Michael J. Bugeja, 2006. “Facing the Facebook,” Chronicle of Higher Education (27 January), pp. C1, C4, and at http://chronicle.com/jobs/2006/01/2006012301c.htm, accessed 20 August 2006.

ComScore Media Metrix, 2006. “The score: Teens highly engaged online,” at http://www.imediaconnection.com/content/8691.asp, accessed 30 March 2006.

Nicholas Confessore, 2006. “Tale of a lost cellphone, and untold static,” New York Times (21 June), at http://www.nytimes.com/2006/06/21/nyregion/21sidekick.html?ei=5088&en=d381f9622c0c59ce&ex=1308542400&adxnnl=1&partner=rssnyt&emc=rss&adxnnlx=1157227924-dvrT8tKZ+G/JDx8IfLec4A, accessed 21 June 2006.

Michael G. Fitzpatrick, 2006. “Deleting Online Predators Act of 2006 (DOPA), A bill introduced into the United States Congress, 9 May 2006,” at http://thomas.loc.gov/, accessed 20 August 2006.

Sue Downes, 2006. “Teens who tell too much,” New York Times (15 January), at http://www.nytimes.com/, accessed 18 January 2006.

Josh Duboff, 2006. “Throwing the ‘Book’ at them,” MSNBC.com, at http://www.msnbc.msn.com/id/12209620/site/newsweek/, accessed 13 July 2006.

Michael Duffy, 2006. “A dad’s encounter with the vortex of Facebook,” Time (19 March), at http://www.time.com/time/magazine/article/0,9171,1174704,00.html, accessed 21 March 2006.

Amitai Etzioni, 1999. The limits of privacy. New York: Basic Books.

William S. Galkin, 1996. “Privacy: What is it?” Computer Law Observer, issue 14 (May), http://www.awcircle.com/issue14.html, accessed 23 December 1997.

Oscar H. Gandy, 1993. The panoptic sort: A political economy of personal information. Boulder, Colo.: Westview Press.

Simson Garfinkel, 2000. Database nation: The death of privacy in the 21st century. Sebastopol, Calif.: O’Reilly.

Cees J. Hamelink, 2000. The ethics of cyberspace. Thousand Oaks, Calif.: Sage.

Jessi Hempel and Paula Lehman, 2005. “The MySpace generation,” BusinessWeek (12 December), at http://www.businessweek.com/, accessed 8 December 2005.

Vivi Hoang, 2006. “Young feel the urge to say it with a blog,” Rochester, N.Y. Democrat and Chronicle (12 February), pp. 1E and 8E.

Jeff Howe, 2005. “The hit factory,” Wired, volume 13, number 11 (November), pp. 200–205, 218, and at http://www.wired.com/wired/archive/13.11/myspace.html, accessed 20 August 2006.

David A. Huffaker and Sandra L. Calvert, 2005. “Gender, identity, and langugage use in teenage blogs,” Journal of Computer–Mediated Communication, volume 10, number 2), at http://jcmc.indiana.edu/vol10/issue2/huffaker.html, accessed 6 April 2005.

Henry Jenkins and Danah Boyd, 2006. “Discussion: MySpace and Deleting Online Predators Act (DOPA),” (24 May), at http://www.danah.org/papers/MySpaceDOPA.html, accessed 26 May 2006.

Curtis E. A. Karnow, 1997. Future codes: Essays in advanced computer technology and the law. Boston: Artech House.

James E. Katz and Ronald E. Rice, 2002. Social consequences of Internet use: Access, involvement, and interaction. Cambridge, Mass.: MIT Press.

Janet Kornblum, 2005. “Teens wear their hearts on their blog,” USA Today (30 October), at http://www.usatoday.com/tech/news/techinnovations/2005-10-30-teen-blogs_x.htm, accessed 1 November 2005.

Amanda Lenhart, 2005. “Protecting teens online,” Pew Internet & American Life Project, at http://www.pewinternet.org/pdfs/PIP_Filters_Report.pdf, accessed 14 March 2005.

Amanda Lenhart and Mary Madden, 2005. “Teen content creators and consumers,” Pew Internet & American Life Project, at http://www.pewinternet.org/pdfs/PIP_Teens_Content_Creation.pdf, accessed 14 March 2005.

Amanda Lenhart, Mary Madden, and Paul Hitlin, 2005. “Teens and technology: Youth are leading the transition to a fully wired and mobile nation,” Pew Internet & American Life Project, at http://www.pewinternet.org/PPF/r/162/report_display.asp, accessed 14 March 2005.

Tracy Mitrano, 2006. “Thoughts on Facebook,” at http://www.cit.cornell.edu/oit/policy/memos/facebook.html, accessed 26 July 2006.

Yuki Noguchi, 2006. “MySpace pushes public service: Social–networking site to hold contest to promote volunteerism,” Washington Post (5 July), p. D2, and at http://www.washingtonpost.com/wp-dyn/content/article/2006/07/04/AR2006070401016.html, accessed 20 August 2006.

Reuters, 2006a. “State wants MySpace to raise minimum age,” (3 May) at http://www.rapidnewswire.com/5036-myspace-0245.htm, accessed 20 August 2006.

Reuters, 2006b. “As freedom shrinks, teens seek MySpace to hang out,” (11 May), at http://today.reuters.com/news/articlebusiness.aspx?type=media&storyID=nN09287157&from=business, accessed 20 August 2006.

Jorge Reina Schement and Terry Curtis, 1995. Tendencies and tensions of the information age: The production and distribution of information in the United States. New Brunswick, N.J.: Transaction Publishers.

Sports Illustrated, 2006. “Blogs, photo sites give everyone a peek at athletes’ lives,” (26 May), at http://www.si.com, accessed 26 May 2006.

Bob Sullivan, 2005. “Kids, blogs and too much information: Children reveal more online than parents know,” MSNBC.com, at http://www.msnbc.msn.com/id/7668788/print/1/displaymode/1098/, accessed 21 March 2006.

Michele Tepper, 2003. “The rise of social software,” netWorker, volume 7, number 3, pp. 18–23. http://dx.doi.org/10.1145/940830.940831

James Verini, 2006. Will success spoil MySpace? Vanity Fair (March), pp. 238–249, and at http://www.vanityfair.com/commentary/content/articles/060308roco01, accessed 20 August 2006.

Fernanda B. Viégas, 2005. “Blogger’s expectations of privacy and accountability: An initial survey,” Journal of Computer–Mediated Communication, volume 10, number 3, at http://jcmc.indiana.edu/vol10/issue3/viegas.html accessed 29 November 2005.

Matt Viser, 2005. “Website’s power to overexpose teens stirs a warning,” Boston Globe (8 December), at http://www.boston.com/business/personaltech/articles/2005/12/08/websites_power_to_overexpose_teens_stirs_a_warning/, accessed 8 December 2005.

Brad Wolverton, 2006. “Hazing photos spur debates on complicity of coaches: Athletics officials suspend teams and restrict sharing of pictures on the Internet,” Chronicle of Higher Education (2 June), pp. A1, A33–34, and at http://chronicle.com/free/v52/i39/39a00101.htm, accessed 20 August 2006.


Editorial history

Paper received 26 July 2006; accepted 15 August 2006.


Contents Index

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 License.

A privacy paradox: Social networking in the United States by Susan B. Barnes
First Monday, volume 11, number 9 (September 2006),
URL: http://firstmonday.org/issues/issue11_9/barnes/index.html