Upload
jan-schmidt
View
1.397
Download
0
Embed Size (px)
DESCRIPTION
Presentation at the General Online Research (GOR) Conference, 12th march 2008, Hamburg
Citation preview
Privacy Management and the Social Web
Dr. Jan Schmidt
Senior Researcher for Digital Interactive Media and Political Communication
GOR 2008, Hamburg, 13.02.2008
Dr. Jan Schmidt Page 2 of 17
The Social Web: Key Functions
Social Web facilitates practices of…
www.flickr.com/photos/44029537@N00/12760664/
– Identity management (Expressing individual interests, experiences, opinions, skills, etc.)
http://flickr.com/photos/mylesdgrant/495698908/
– Relationship management (articulating and maintaining existing relationships, finding and contacting new people)
http://www.flickr.com/photos/axels_bilder/1267008046/
– Information management (finding, selecting and sharing information and content)
Dr. Jan Schmidt Page 3 of 17
e.g. blogging
Dr. Jan Schmidt Page 4 of 17
e.g. Social Network Sites (1)
Dr. Jan Schmidt Page 5 of 17
e.g. Social Network Sites (2)
Dr. Jan Schmidt Page 6 of 17
Social Web and Privacy
Online-based identity- and relationship management assist
1. Formation and maintenance of social networks which provide social capital (useful for exchange of information; socio-emotional support; stabilizing group identites; etc.)
Dr. Jan Schmidt Page 7 of 17
Visualizing social networks
Dr. Jan Schmidt Page 8 of 17
Social Web und Privacy
Online-based identity- and relationship management assist
1. Formation and maintenance of social networks which provide social capital (useful for exchange of information; socio-emotional support; stabilizing group identites; etc.)
2. Formation of public spheres on different topics and with different reach / audience sizes; especially important: „personal publics“ dealing with topics of personal relevance and aiming at rather small audiences
Dr. Jan Schmidt Page 9 of 17
Personal publics in Facebook
Dr. Jan Schmidt Page 10 of 17
Social Web and Privacy
Online-based identity- and relationship management assist
1. Formation and maintenance of social networks which provide social capital (useful for exchange of information; socio-emotional support; stabilizing group identites; etc.)
2. Formation of public spheres on different topics and with different reach / audience sizes; especially important: „personal publics“ dealing with topics of personal relevance and aiming at rather small audiences
Users of the social web provide personal information within social networks and (personal) publics, thus shifting boundaries between private and public spheres
– Characteristics of online-based publics (cf. boyd 2007)– Persistence– Searchibility– Replicability– Invisible Audiences
These characteristics of online-based publics call for practices of „privacy management“: ways of regulating access to personal information
Dr. Jan Schmidt Page 11 of 17
Individual and situated use of social web applications is framed by three structural dimension which get (re)produced through social action (cf. Schmidt 2007 for general analytical model)
– Rules: Shared expectations and routines how to adequately use a given application for identity- and relationship management in a given situation; e.g. what personal information to share on a business network or in a private blog
– Relations: hypertextual and social networks which are articulated through social web applications; subcultural-, age- or gender-specific networks will [presumably] share different rules on how to engage in identity- and relationship management, which in turn will lead to more open or more closed networks
– Code: Software of social web applications provides specific options and restrictions for identity- and relationship management (e.g. allowing to restrict access to personal information to confirmed contacts only); „application programming interfaces“ (API) provide means for sharing data between different applications (e.g. Google‘s „open social“ inititative)
Privacy management practices: Analytical framework
Situated use-Identity management
-Relationship management-Information management
Code
Relations Rules
Dr. Jan Schmidt Page 12 of 17
Rules: Different routines for identity- and relationship management
Dr. Jan Schmidt Page 13 of 17
Rules: Different routines for identity- and relationship management
Dr. Jan Schmidt Page 14 of 17
Code assisting privacy management
Dr. Jan Schmidt Page 15 of 17
Code assisting formation of personal publics
Dr. Jan Schmidt Page 16 of 17
Summary and outlook
1. Social Web provides various tools and means to articulate, maintain and expand social relations
2. Mediated identity- and relationship management leads to formation of personal publics3. Personal publics shift boundaries between private and public spheres, calling for new
practices of privacy management4. Privacy management happens in respect to certain social networks (= audiences) and
includes both socially shared routines and expectations as well as options and restrictions layed out in software code
5. Routines, expectations and instances of software code should be topic of social discourse on questions like:– Do I have full control over my personal information? How and when can I allow or prevent anyone
else (A friend of mine? The company providing an application? An unkown person data-mining my profile?) access to my information?
- Who owns relational data, e.g. the information that me and person x are friends since we‘ve met at the Tokio Hotel concert two years ago?
- Should there be an „expiry date“ for personal data?- How far can privacy be regulated through code? Who is shaping and regulating the code itself?
Dr. Jan Schmidt Page 17 of 17
Thank You!
Dr. Jan Schmidt
Hans-Bredow-Institut
Warburgstr. 8-10, 20354 Hamburg
www.hans-bredow-institut.de
www.schmidtmitdete.de
Dr. Jan Schmidt Page 18 of 17
Facets of digital identity
http://www.flickr.com/photos/fredcavazza/278973402/
Dr. Jan Schmidt Page 19 of 17
Further Reading
– Bendrath, Ralf (2007): Der „gläserne Bürger“ und der vorsorgliche Staat. Zum Verhältnis von Überwachung und Sicherheit in der Informationsgesellschaft. In: kommunikation@gesellschaft, Jg. 8, Beitrag 7, 2007. Online: http://www.soz.unifrankfurt.de/K.G/B7_2007_Bendrath.pdf
– Boyd, Danah (2007): Incantations for Muggles: The role of ubiquitious Web 2.0 technologies in everyday life. Vortrag bei der O‘Reilly Emerging Technology Conference, San Diego, 28.3.2007. Online: http://www.danah.org/papers/Etech2007.html
– Hogben, Giles (2007) Security Issues and Recommendations for Online Social Networks. ENISA Position Paper Nr. 1. Online: http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_social_networks.pdf
– Renz, Florian (2007): Praktiken des Social Networking. Eine kommunikationssoziologische Studie zum online-basierten Netzwerken am Beispiel von openBC (XING). Boizenburg: Verlag Werner Hülsbusch
– Schmidt, Jan (2007): Social Software: Facilitating information-, identity- and relationship managament. In: Burg, Thomas N. / Jan Schmidt (Eds.): BlogTalks Reloaded. Social Software - Research and Cases. Vienna/Norderstedt: Books on Demand. 2007. 31-49. Online: http://www.bamberg-gewinnt.de/wordpress/wp-content/pdf/blogtalksreloaded_3_schmidt.pdf .