SlideShare a Scribd company logo
1 of 13
PRACTICES OF BALANCING
PRIVACY AND PUBLICNESS
IN SOCIAL NETWORK SERVICES
GROUP 2010
DOCTORAL COLLOQUIUM
NOVEMBER 7, 2010
AIRI LAMPINEN
Researcher, PhD Student in Social Psychology
http://www.flickr.com/photos/ncindc/3229050640/
Balancing Privacy and Publicness in Social Network Services
How do users balance
PRIVACY AND PUBLICNESS
in social network services?
Boundary regulation (Altman)
→ privacy as a process of
interpersonal boundary control
that paces and controls
interaction
Networked privacy
→ disclosure, identity & temporality
(Palen & Dourish)
→ persistence, replicability,
scalability, searchability
(boyd)
Self-presentation
(Goffman)
Identity
(Snyder, Tajfel)
Performativity
(Butler)
Boundary Regulation
(Altman)
“The real problem with personal privacy in social
systems then is how to reconcile the co-presence
of various groups that one identifies with,
in terms of what to share with whom,
in a flexible and straightforward way.”
(Razavi & Iverson, 2009)
GROUP CO-PRESENCE
“A situation in which many groups
important to an individual are
simultaneously present in one context
and their presence is
salient for the individual”
(Lampinen, Oulasvirta & Tamminen, 2009)
INTERDEPENDENCE
disclosure as an interpersonal process
of boundary regulation, in which
people are dependent on what others
choose to disclose about them
Collaborative ↔ Individual
Preventive ↔ Corrective
Internal ↔ External
Thanks!
Questions? Ideas?
Airi Lampinen
airi.lampinen@hiit.fi
www.hiit.fi/~lampinen

More Related Content

Viewers also liked

Stop censoring china web results google
Stop censoring china web results googleStop censoring china web results google
Stop censoring china web results googleMaximumHit Ltd
 
revolucion francesa
revolucion francesarevolucion francesa
revolucion francesarafaccf
 
Feb 3, 2016 calgary economic development presentation
Feb 3, 2016 calgary economic development presentationFeb 3, 2016 calgary economic development presentation
Feb 3, 2016 calgary economic development presentationPetroLMI
 
Picture analysis
Picture analysisPicture analysis
Picture analysisBailey549
 
Avenue of Flags
Avenue of FlagsAvenue of Flags
Avenue of FlagsRobinTroy03
 
100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - Chile
100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - Chile100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - Chile
100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - ChileAlhejandro
 
Tootmine ja turundus
Tootmine ja turundusTootmine ja turundus
Tootmine ja turundusMartin Sillaots
 
Materi TIK Kelas IX BAB 3
Materi TIK Kelas IX BAB 3Materi TIK Kelas IX BAB 3
Materi TIK Kelas IX BAB 3NabilaFarah22
 
Licencia medica
Licencia medicaLicencia medica
Licencia medicac0n_sue
 
Publication Design
Publication DesignPublication Design
Publication DesignAshley Bott
 
Final Portfolio for Production and Design
Final Portfolio for Production and DesignFinal Portfolio for Production and Design
Final Portfolio for Production and DesignAshley Bott
 

Viewers also liked (15)

Stop censoring china web results google
Stop censoring china web results googleStop censoring china web results google
Stop censoring china web results google
 
revolucion francesa
revolucion francesarevolucion francesa
revolucion francesa
 
Feb 3, 2016 calgary economic development presentation
Feb 3, 2016 calgary economic development presentationFeb 3, 2016 calgary economic development presentation
Feb 3, 2016 calgary economic development presentation
 
Picture analysis
Picture analysisPicture analysis
Picture analysis
 
Tipos De Pruebas
Tipos De PruebasTipos De Pruebas
Tipos De Pruebas
 
Photos effet miroir1
Photos effet miroir1Photos effet miroir1
Photos effet miroir1
 
Avenue of Flags
Avenue of FlagsAvenue of Flags
Avenue of Flags
 
100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - Chile
100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - Chile100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - Chile
100 preguntas sobre Sexualidad Adolescente - Municipalidad de Santiago - Chile
 
Tootmine ja turundus
Tootmine ja turundusTootmine ja turundus
Tootmine ja turundus
 
04 Gazebo_IngAleViotti
04 Gazebo_IngAleViotti04 Gazebo_IngAleViotti
04 Gazebo_IngAleViotti
 
Materi TIK Kelas IX BAB 3
Materi TIK Kelas IX BAB 3Materi TIK Kelas IX BAB 3
Materi TIK Kelas IX BAB 3
 
Licencia medica
Licencia medicaLicencia medica
Licencia medica
 
Publication Design
Publication DesignPublication Design
Publication Design
 
Final Portfolio for Production and Design
Final Portfolio for Production and DesignFinal Portfolio for Production and Design
Final Portfolio for Production and Design
 
Chap 1 basic chemistry
Chap 1 basic chemistryChap 1 basic chemistry
Chap 1 basic chemistry
 

Similar to Balancing Privacy and Publicness in Social Network Services

Reading Data Selves
Reading Data SelvesReading Data Selves
Reading Data SelvesMG Lee
 
Presentation1
Presentation1Presentation1
Presentation1eliza2187
 
How Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform EducationHow Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform EducationAlec Couros
 
Teaching Metaliteracy in the Post-Truth World
Teaching Metaliteracy in the Post-Truth WorldTeaching Metaliteracy in the Post-Truth World
Teaching Metaliteracy in the Post-Truth WorldTom Mackey
 
Networked Learning & Identity Development in Open Online Spaces
Networked Learning & Identity Development in Open Online SpacesNetworked Learning & Identity Development in Open Online Spaces
Networked Learning & Identity Development in Open Online SpacesCatherine Cronin
 
In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...Patrick Lowenthal
 
A CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMS
A CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMSA CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMS
A CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMSIJMIT JOURNAL
 
A case study on autho socialization in online platforms
A case study on autho socialization in online platformsA case study on autho socialization in online platforms
A case study on autho socialization in online platformsIJMIT JOURNAL
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingNeville Wiles
 
Objectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative ConnotationsObjectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative ConnotationsBeth Johnson
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumUniversity of Southern California
 
AECT 2015 - Defining social presence
AECT 2015 - Defining social presenceAECT 2015 - Defining social presence
AECT 2015 - Defining social presencePatrick Lowenthal
 
The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016Zoetanya Sujon
 
NFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hourNFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hourmikewilhelm
 
Information experience: a new domain and object of research
Information experience: a new domain and object of researchInformation experience: a new domain and object of research
Information experience: a new domain and object of researchKate Davis
 
Toward Networked Literacies
Toward Networked LiteraciesToward Networked Literacies
Toward Networked LiteraciesAlec Couros
 
Conference: Towards a Social Science of Web 2.0
Conference: Towards a Social Science of Web 2.0Conference: Towards a Social Science of Web 2.0
Conference: Towards a Social Science of Web 2.0tumbo
 
Scholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional IdentitiesScholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional IdentitiesBonnie Stewart
 
OpenEd14_Washington_Nov2014_VRolfe
OpenEd14_Washington_Nov2014_VRolfeOpenEd14_Washington_Nov2014_VRolfe
OpenEd14_Washington_Nov2014_VRolfeViv Rolfe
 
Social presence theory
Social presence theorySocial presence theory
Social presence theorySiti Syazana
 

Similar to Balancing Privacy and Publicness in Social Network Services (20)

Reading Data Selves
Reading Data SelvesReading Data Selves
Reading Data Selves
 
Presentation1
Presentation1Presentation1
Presentation1
 
How Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform EducationHow Informal Learning Networks Can Transform Education
How Informal Learning Networks Can Transform Education
 
Teaching Metaliteracy in the Post-Truth World
Teaching Metaliteracy in the Post-Truth WorldTeaching Metaliteracy in the Post-Truth World
Teaching Metaliteracy in the Post-Truth World
 
Networked Learning & Identity Development in Open Online Spaces
Networked Learning & Identity Development in Open Online SpacesNetworked Learning & Identity Development in Open Online Spaces
Networked Learning & Identity Development in Open Online Spaces
 
In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...
 
A CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMS
A CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMSA CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMS
A CASE STUDY ON AUTO SOCIALIZATION IN ONLINE PLATFORMS
 
A case study on autho socialization in online platforms
A case study on autho socialization in online platformsA case study on autho socialization in online platforms
A case study on autho socialization in online platforms
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social Networking
 
Objectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative ConnotationsObjectification Is A Word That Has Many Negative Connotations
Objectification Is A Word That Has Many Negative Connotations
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
AECT 2015 - Defining social presence
AECT 2015 - Defining social presenceAECT 2015 - Defining social presence
AECT 2015 - Defining social presence
 
The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016
 
NFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hourNFAR | New Ethical Dilemmas 1.5 hour
NFAR | New Ethical Dilemmas 1.5 hour
 
Information experience: a new domain and object of research
Information experience: a new domain and object of researchInformation experience: a new domain and object of research
Information experience: a new domain and object of research
 
Toward Networked Literacies
Toward Networked LiteraciesToward Networked Literacies
Toward Networked Literacies
 
Conference: Towards a Social Science of Web 2.0
Conference: Towards a Social Science of Web 2.0Conference: Towards a Social Science of Web 2.0
Conference: Towards a Social Science of Web 2.0
 
Scholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional IdentitiesScholars in the Open: Networked Identities vs. Institutional Identities
Scholars in the Open: Networked Identities vs. Institutional Identities
 
OpenEd14_Washington_Nov2014_VRolfe
OpenEd14_Washington_Nov2014_VRolfeOpenEd14_Washington_Nov2014_VRolfe
OpenEd14_Washington_Nov2014_VRolfe
 
Social presence theory
Social presence theorySocial presence theory
Social presence theory
 

More from airilmpnn

Algoritmit, ihmiset, ja vallankäyttÜ
Algoritmit, ihmiset, ja vallankäyttÜAlgoritmit, ihmiset, ja vallankäyttÜ
Algoritmit, ihmiset, ja vallankäyttÜairilmpnn
 
Algorithmic Systems, Strategic Interaction, and Bureaucracy
Algorithmic Systems, Strategic Interaction, and BureaucracyAlgorithmic Systems, Strategic Interaction, and Bureaucracy
Algorithmic Systems, Strategic Interaction, and Bureaucracyairilmpnn
 
Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...
Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...
Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...airilmpnn
 
Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...
Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...
Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...airilmpnn
 
Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...
Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...
Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...airilmpnn
 
Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...
Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...
Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...airilmpnn
 
Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...
Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...
Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...airilmpnn
 
Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...
Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...
Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...airilmpnn
 
ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...
ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...
ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...airilmpnn
 
Indebtedness and Reciprocity in Local Online Exchange
Indebtedness and Reciprocity in Local Online ExchangeIndebtedness and Reciprocity in Local Online Exchange
Indebtedness and Reciprocity in Local Online Exchangeairilmpnn
 
CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...
CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...
CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...airilmpnn
 
Automated Sharing in Social Network Services
Automated Sharing in Social Network ServicesAutomated Sharing in Social Network Services
Automated Sharing in Social Network Servicesairilmpnn
 
Everyday Favors: A Case Study of a Local Online Gift Exchange System
Everyday Favors: A Case Study of  a Local Online Gift Exchange System Everyday Favors: A Case Study of  a Local Online Gift Exchange System
Everyday Favors: A Case Study of a Local Online Gift Exchange System airilmpnn
 

More from airilmpnn (13)

Algoritmit, ihmiset, ja vallankäyttÜ
Algoritmit, ihmiset, ja vallankäyttÜAlgoritmit, ihmiset, ja vallankäyttÜ
Algoritmit, ihmiset, ja vallankäyttÜ
 
Algorithmic Systems, Strategic Interaction, and Bureaucracy
Algorithmic Systems, Strategic Interaction, and BureaucracyAlgorithmic Systems, Strategic Interaction, and Bureaucracy
Algorithmic Systems, Strategic Interaction, and Bureaucracy
 
Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...
Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...
Market Design for HCI: Successes and Failures of Peer-to-Peer Exchange Platfo...
 
Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...
Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...
Sharing Economies: Insights from Academic Research about Peer-to-Peer Exchang...
 
Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...
Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...
Hosting via Airbnb: Motivations and Financial Assurances in Monetized Network...
 
Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...
Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...
Networked Privacy
 Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...
 
Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...
Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...
Challenges to Participation in the Sharing Economy / Airi Lampinen / Open Com...
 
Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...
Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...
Luottamus sosiaalisessa mediassa (Trust in Social Media, in Finnish) / Airi L...
 
ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...
ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...
ďżźMonetizing Network Hospitality: Hospitality and Sociability in the Context o...
 
Indebtedness and Reciprocity in Local Online Exchange
Indebtedness and Reciprocity in Local Online ExchangeIndebtedness and Reciprocity in Local Online Exchange
Indebtedness and Reciprocity in Local Online Exchange
 
CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...
CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...
CHI2011: Were In It Together: Interpersonal Management of Disclosure in Socia...
 
Automated Sharing in Social Network Services
Automated Sharing in Social Network ServicesAutomated Sharing in Social Network Services
Automated Sharing in Social Network Services
 
Everyday Favors: A Case Study of a Local Online Gift Exchange System
Everyday Favors: A Case Study of  a Local Online Gift Exchange System Everyday Favors: A Case Study of  a Local Online Gift Exchange System
Everyday Favors: A Case Study of a Local Online Gift Exchange System
 

Recently uploaded

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1Jamie (Taka) Wang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 

Recently uploaded (20)

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 

Balancing Privacy and Publicness in Social Network Services

Editor's Notes

  1. Identity, self-presentation, performance, impression management, roles Plurality of identities and audiences Their own and that of others – collaboration, interdependence Social network services –so far, research mainly focuses on facebook but the wording SITE would be misleading, as entry points may be through different devices etc
  2. both inputs and outputs in interaction are regulated in order to achieve a desired level of privacy, which might differ from the one that is actually achieved disclosure, identity and temporality as three boundaries that are central to privacy management. These boundaries refer to balancing privacy and publicity, managing self- presentations, and the sequence disclosures form over time.
  3. both inputs and outputs in interaction are regulated in order to achieve a desired level of privacy, which might differ from the one that is actually achieved disclosure, identity and temporality as three boundaries that are central to privacy management. These boundaries refer to balancing privacy and publicity, managing self- presentations, and the sequence disclosures form over time.
  4. Identity: social (group), interpersonal (roles), personal
  5. Framework for mapping end-users’ strategies