[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Exploring the Utility Versus Intrusiveness of Dynamic Audience Selection on Facebook

Published: 18 October 2021 Publication History

Abstract

In contrast to existing, static audience controls that map poorly onto users' ideal audiences on social networking sites, dynamic audience selection (DAS) controls can make intelligent inferences to help users select their ideal audience given context and content. But does this potential utility outweigh its potential intrusiveness? We surveyed 250 participants to model users' ideal versus their chosen audiences with static controls and found a significant misalignment, suggesting that DAS might provide utility. We then designed a sensitizing prototype that allowed users to select audiences based on personal attributes, content, or context constraints. We evaluated DAS vis-a-vis Facebook's existing audience selection controls through a counterbalanced summative evaluation. We found that DAS's expressiveness, customizability, and scalability made participants feel more confident about the content they shared on Facebook. However, low transparency, distrust in algorithmic inferences, and the emergence of privacy-violating side channels made participants find the prototype unreliable or intrusive. We discuss factors that affected this trade-off between DAS's utility and intrusiveness and synthesize design implications for future audience selection tools.

References

[1]
Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies. Springer, 36--58.
[2]
Davide Alberto Albertini, Barbara Carminati, and Elena Ferrari. 2016. Privacy settings recommender for online social network. In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). IEEE, 514--521.
[3]
Saleema Amershi, James Fogarty, and Daniel Weld. 2012. Regroup: interactive machine learning for on-demand group creation in social networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). Association for Computing Machinery, 21--30. https://doi.org/10.1145/2207676.2207680
[4]
Eric PS Baumer and M Six Silberman. 2011. When the implication is not to design (technology). In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2271--2274.
[5]
Joey Benedek and Trish Miner. 2002. Measuring Desirability: New methods for evaluating desirability in a usability lab setting. Proceedings of Usability Professionals Association, Vol. 2003, 8--12 (2002), 57.
[6]
Michael S Bernstein, Eytan Bakshy, Moira Burke, and Brian Karrer. 2013. Quantifying the invisible audience in social networks. In Proceedings of the SIGCHI conference on human factors in computing systems. 21--30.
[7]
Jens Binder, Andrew Howes, and Alistair Sutcliffe. 2009. The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09). Association for Computing Machinery, 965--974. https://doi.org/10.1145/1518701.1518849
[8]
Herbert Blumer. 1954. What is wrong with social theory? American sociological review, Vol. 19, 1 (1954), 3--10.
[9]
Glenn A Bowen. 2006. Grounded theory and sensitizing concepts. International journal of qualitative methods, Vol. 5, 3 (2006), 12--23.
[10]
David Russell Brake. 2012. Who do they think they're talking to? Framings of the audience by social media users. International journal of communication, Vol. 6 (2012), 21.
[11]
Eliane Bucher, Christian Fieseler, and Anne Suphan. 2013. The stress potential of social media in the workplace. Information, Communication & Society, Vol. 16, 10 (2013), 1639--1667.
[12]
Moira Burke and Robert E Kraut. 2014. Growing closer on facebook: changes in tie strength through social network site use. In Proceedings of the SIGCHI conference on human factors in computing systems. 4187--4196.
[13]
Gorrell P Cheek and Mohamed Shehab. 2012. Policy-by-example for online social networks. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies. 23--32.
[14]
Ramnath K Chellappa and Raymond G Sin. 2005. Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information technology and management, Vol. 6, 2--3 (2005), 181--202.
[15]
Sauvik Das and Adam Kramer. 2013. Self-censorship on Facebook. In Seventh international AAAI conference on weblogs and social media .
[16]
Serge Egelman, Andrew Oates, and Shriram Krishnamurthi. 2011. Oops, I did it again: mitigating repeated access control errors on facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). Association for Computing Machinery, 2295--2304. https://doi.org/10.1145/1978942.1979280
[17]
Nicole Ellison, Rebecca Gray, Jessica Vitak, Cliff Lampe, and Andrew T Fiore. 2013. Calling all Facebook friends: Exploring requests for help on Facebook. In Seventh international AAAI conference on Weblogs and social media. Citeseer.
[18]
Sindhu Kiranmai Ernala, Asra F Rizvi, Michael L Birnbaum, John M Kane, and Munmun De Choudhury. 2017. Linguistic markers indicating therapeutic outcomes of social media disclosures of schizophrenia. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--27.
[19]
Motahhare Eslami, Aimee Rickman, Kristen Vaccaro, Amirhossein Aleyasen, Andy Vuong, Karrie Karahalios, Kevin Hamilton, and Christian Sandvig. 2015. " I always assumed that I wasn't really that close to [her]" Reasoning about Invisible Algorithms in News Feeds. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. 153--162.
[20]
Jennifer Fereday and Eimear Muir-Cochrane. 2006. Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme Development. International Journal of Qualitative Methods, Vol. 5, 1 (Mar 2006), 80--92. https://doi.org/10.1177/160940690600500107
[21]
S Frederic and H Woodrow. 2012. Boundary regulation in social media. In Proc. CSCW, Vol. 769.
[22]
Eric Gilbert. 2012. Designing social translucence over social networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2731--2740.
[23]
Erving Goffman et al. 1978. The presentation of self in everyday life .Harmondsworth London.
[24]
Anatoliy Gruzd, Barry Wellman, and Yuri Takhteyev. 2011. Imagining Twitter as an Imagined Community. American Behavioral Scientist, Vol. 55, 10 (Oct 2011), 1294--1318. https://doi.org/10.1177/0002764211409378
[25]
Andrew F Hayes, Dietram A Scheufele, and Michael E Huge. 2006. Nonparticipation as self-censorship: Publicly observable political activity in a polarized opinion climate. Political Behavior, Vol. 28, 3 (2006), 259--283.
[26]
Bernie Hogan. 2010. The presentation of self in the age of social media: Distinguishing performances and exhibitions online. Bulletin of Science, Technology & Society, Vol. 30, 6 (2010), 377--386.
[27]
Sanjay Kairam, Mike Brzozowski, David Huffaker, and Ed Chi. 2012. Talking in circles: selective sharing in google
[28]
. In Proceedings of the SIGCHI conference on human factors in computing systems. 1065--1074.
[29]
Harmanpreet Kaur, Cliff Lampe, and Walter S Lasecki. 2020. Using affordances to improve AI support of social media posting decisions. In Proceedings of the 25th International Conference on Intelligent User Interfaces. 556--567.
[30]
Patrick Gage Kelley, Robin Brewer, Yael Mayer, Lorrie Faith Cranor, and Norman Sadeh. 2011. An investigation into facebook friend grouping. In IFIP Conference on Human-Computer Interaction. Springer, 216--233.
[31]
A Can Kurtan and Pinar Yolum. 2021. Assisting humans in privacy management: an agent-based approach. Autonomous Agents and Multi-Agent Systems, Vol. 35, 1 (2021), 1--33.
[32]
Qingrui Li, Juan Li, Hui Wang, and Ashok Ginjala. 2011. Semantics-enhanced privacy recommendation for social networking sites. In 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 226--233.
[33]
Eden Litt. 2012. Knock, knock. Who's there? The imagined audience. Journal of broadcasting & electronic media, Vol. 56, 3 (2012), 330--345.
[34]
Eden Litt and Eszter Hargittai. 2016. The Imagined Audience on Social Network Sites. Social Media
[35]
Society, Vol. 2, 1 (Jan 2016), 205630511663348. https://doi.org/10.1177/2056305116633482
[36]
Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, Vol. 15, 4 (Dec 2004), 336--355. https://doi.org/10.1287/isre.1040.0032
[37]
Alice E Marwick and Danah Boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New media & society, Vol. 13, 1 (2011), 114--133.
[38]
Alice E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society, Vol. 16, 7 (2014), 1051--1067.
[39]
Gaurav Misra and Jose M Such. 2017. Pacman: Personal agent for access control in social media. IEEE Internet Computing, Vol. 21, 6 (2017), 18--26.
[40]
Bernardo Reynolds, Jayant Venkatanathan, Jorge Goncc alves, and Vassilis Kostakos. 2011. Sharing ephemeral information in online social networks: privacy perceptions and behaviours. In IFIP Conference on Human-Computer Interaction. Springer, 204--215.
[41]
M. D. Roblyer, Michelle McDaniel, Marsena Webb, James Herman, and James Vince Witty. 2010. Findings on Facebook in higher education: A comparison of college faculty and student uses and perceptions of social networking sites. The Internet and Higher Education, Vol. 13, 3 (Jun 2010), 134--140. https://doi.org/10.1016/j.iheduc.2010.03.002
[42]
Mary Beth Rosson and John M Carroll. 2009. Scenario based design. Human-computer interaction. boca raton, FL (2009), 145--162.
[43]
Jeffrey M Rzeszotarski, Emma S Spiro, Jorge Nathan Matias, Andrés Monroy-Hernández, and Meredith Ringel Morris. 2014. Is anyone out there? Unpacking Q&A hashtags on Twitter. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2755--2758.
[44]
Meredith M. Skeels and Jonathan Grudin. 2009. When social networks cross boundaries: a case study of workplace use of facebook and linkedin. In Proceedings of the ACM 2009 international conference on Supporting group work (GROUP '09). Association for Computing Machinery, 95--104. https://doi.org/10.1145/1531674.1531689
[45]
Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work. 793--802.
[46]
Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, and Michelle L Mazurek. 2016. Sharing personal content online: Exploring channel choice and multi-channel behaviors. In Proceedings of the 2016 CHI conference on human factors in computing systems. 101--112.
[47]
Erik Stolterman and Mikael Wiberg. 2010. Concept-driven interaction design research. Human-Computer Interaction, Vol. 25, 2 (2010), 95--118.
[48]
Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends only: examining a privacy-enhancing behavior in facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). Association for Computing Machinery, 1553--1562. https://doi.org/10.1145/1753326.1753559
[49]
Kaveri Subrahmanyam, Stephanie M. Reich, Natalia Waechter, and Guadalupe Espinoza. 2008. Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology, Vol. 29, 6 (Nov 2008), 420--433. https://doi.org/10.1016/j.appdev.2008.07.003
[50]
Omer Tene and Jules Polonetsky. 2013. A theory of creepy: technology, privacy and shifting social norms. Yale JL & Tech., Vol. 16 (2013), 59.
[51]
Ashwini Tonge, Cornelia Caragea, and Anna Squicciarini. 2018. Uncovering scene context for predicting privacy of online shared images. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 32.
[52]
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, and Alec Wolman. 2009. Lockr: better privacy for social networks. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09). Association for Computing Machinery, 169--180. https://doi.org/10.1145/1658939.1658959
[53]
Zeynep Tufekci. 2008. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, Vol. 28, 1 (2008), 20--36.
[54]
Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012a. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In proceedings of the eighth symposium on usable privacy and security. 1--15.
[55]
Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012b. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). Association for Computing Machinery, 1--15. https://doi.org/10.1145/2335356.2335362
[56]
Jessica Vitak. 2012. The impact of context collapse and privacy on social network site disclosures. Journal of broadcasting & electronic media, Vol. 56, 4 (2012), 451--470.
[57]
Jessica Vitak, Stacy Blasiola, Sameer Patil, and Eden Litt. 2015. Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users. International Journal of Communication, Vol. 9, 0 (May 2015), 20.
[58]
Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, and Norman Sadeh. 2014. A field trial of privacy nudges for facebook. In Proceedings of the SIGCHI conference on human factors in computing systems. 2367--2376.
[59]
Jason Watson, Michael Whitney, and Heather Richter Lipford. 2009. Configuring audience-oriented privacy policies. In Proceedings of the 2nd ACM workshop on Assurable and usable security configuration (SafeConfig '09). Association for Computing Machinery, 71--78. https://doi.org/10.1145/1655062.1655076
[60]
Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 609--618.
[61]
Sijia Xiao, Danaë Metaxa, Joon Sung Park, Karrie Karahalios, and Niloufar Salehi. 2020. Random, Messy, Funny, Raw: Finstas as Intimate Reconfigurations of Social Media. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.
[62]
Heng Xu, Xin Robert Luo, John M Carroll, and Mary Beth Rosson. 2011. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems, Vol. 51, 1 (2011), 42--52.
[63]
Qian Yang. 2018. Machine learning as a UX design material: How can we imagine beyond automation, recommenders, and reminders?. In AAAI Spring Symposia .
[64]
Qian Yang, Aaron Steinfeld, Carolyn Rosé, and John Zimmerman. 2020. Re-examining Whether, Why, and How Human-AI Interaction Is Uniquely Difficult to Design. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, 1--13. https://doi.org/10.1145/3313831.3376301
[65]
Xuan Zhao, Cliff Lampe, and Nicole B Ellison. 2016. The social media ecology: User perceptions, strategies and challenges. In Proceedings of the 2016 CHI conference on human factors in computing systems. 89--100.
[66]
Haoti Zhong, Anna Cinzia Squicciarini, David J Miller, and Cornelia Caragea. 2017. A Group-Based Personalized Model for Image Privacy Classification and Labeling. In IJCAI, Vol. 17. 3952--3958.

Cited By

View all
  • (2024)The Hidden Burden: Encountering and Managing (Unintended) Stigma in Children with Serious IllnessesProceedings of the ACM on Human-Computer Interaction10.1145/36410218:CSCW1(1-35)Online publication date: 26-Apr-2024
  • (2024)Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy RisksProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642116(1-19)Online publication date: 11-May-2024
  • (2024)Observer Effect in Social Media UseProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642078(1-20)Online publication date: 11-May-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
CSCW2
October 2021
5376 pages
EISSN:2573-0142
DOI:10.1145/3493286
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2021
Published in PACMHCI Volume 5, Issue CSCW2

Permissions

Request permissions for this article.

Check for updates

Badges

  • Honorable Mention

Author Tags

  1. Facebook
  2. audience controls
  3. dynamic audience selection
  4. human-AI interaction
  5. privacy
  6. privacy through design
  7. social media

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)5
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Hidden Burden: Encountering and Managing (Unintended) Stigma in Children with Serious IllnessesProceedings of the ACM on Human-Computer Interaction10.1145/36410218:CSCW1(1-35)Online publication date: 26-Apr-2024
  • (2024)Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy RisksProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642116(1-19)Online publication date: 11-May-2024
  • (2024)Observer Effect in Social Media UseProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642078(1-20)Online publication date: 11-May-2024
  • (2022)Building a Personalized Model for Social Media Textual Content CensorshipProceedings of the ACM on Human-Computer Interaction10.1145/35556576:CSCW2(1-31)Online publication date: 11-Nov-2022

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media