Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010
DOI: 10.1145/1753326.1753560
|View full text |Cite
|
Sign up to set email alerts
|

Moving beyond untagging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 163 publications
(14 citation statements)
references
References 12 publications
1
13
0
Order By: Relevance
“…Here YouTube had proved to be a double-edged sword: it saved the effort for sharing to some extent, but it also brought new problems and concerns to our older participants with little knowledge of the tactics of social network sites (e.g., using nicknames, obscuring real identities online, controlling privacy settings). This finding resonates with other online actions such as "un-tagging" on social network sites among young people (Besmer & Richter Lipford, 2010;Lang & Barton, 2015). This may result in anxieties in relation to self-presentation a phenomenon that is common offline (Baumeister et al, 1989) and has become apparent in online communication contexts among younger generations (e.g., Farnham & Churchill, 2011;Thomas, Briggs, Hart, & Kerrigan, 2017).…”
Section: Tensions In Identity Management Onlinesupporting
confidence: 75%
“…Here YouTube had proved to be a double-edged sword: it saved the effort for sharing to some extent, but it also brought new problems and concerns to our older participants with little knowledge of the tactics of social network sites (e.g., using nicknames, obscuring real identities online, controlling privacy settings). This finding resonates with other online actions such as "un-tagging" on social network sites among young people (Besmer & Richter Lipford, 2010;Lang & Barton, 2015). This may result in anxieties in relation to self-presentation a phenomenon that is common offline (Baumeister et al, 1989) and has become apparent in online communication contexts among younger generations (e.g., Farnham & Churchill, 2011;Thomas, Briggs, Hart, & Kerrigan, 2017).…”
Section: Tensions In Identity Management Onlinesupporting
confidence: 75%
“…As a result of insufficient support for MPCs in current OSN infrastructures, users employ manual coping strategies [17,77,152,153], such as trying to anticipate consequences for others [77], seeking approval before making a post [77,116], applying self-censorship or less frequently engaging with OSNs [24,153], changing their offline behavior [17,77], imposing sanctions against privacy violators [117], and negotiating privacy policies with other users [17,77,116,152]. Research has extensively studied these strategies that users use to try to cope with MPCs in current OSN infrastructures.…”
Section: Conventional Coping Strategies To Manage Mpcsmentioning
confidence: 99%
“…Concerns. Besmer and Richter Lipford study user privacy concerns related to the sharing and tagging of photos on OSNs [Besmer and Richter Lipford 2010]. Using three focus groups, with a total of N = 14 individuals, they identify the different actors who are perceived as adversaries (i.e., potential viewers) by individuals.…”
Section: Multimedia Datamentioning
confidence: 99%
“…Besmer and Richter Lipford propose a corrective method as a collaborative access-management tool for photo sharing on FB: it enables co-owners (i.e., individuals who appear on the photo) to suggest restrictions to the owner (i.e., the uploader) [Besmer and Richter Lipford 2010]. The authors use three focus groups (with a total of N = 14) from a US university population (from staff and students) to identify the concerns of individuals and the coping mechanisms they use to limit the negative effects of shared photos.…”
Section: Cooperativementioning
confidence: 99%