Information Technology Reference
In-Depth Information
emergence of complicit risk communities where
personal information becomes social capital which
is traded and exchanged and where the concept
of public or private can be defined through the
nature of users' access, gaze, and the transactions
and interactions they permit.
The culture of social networking sites thrives
on the narcissistic and the performative, on one
hand, and reciprocity and exchange, on the other.
Hence the potential dangers and risks of willingly
disclosing and displaying personal details become
part of the architecture or code of these sites. The
appropriation of new technologies by individuals
in order to communicate, form new communities,
and maintain existing relationships signifies new
ways in which risk becomes embedded and en-
coded into our social practices, posing new ethical
and legal challenges which inadvertently expand
the landscape of risk.
Bentley, F., Metcalf, C., & Harboe, G. (2006).
Personal vs. commercial content: The similari-
ties between consumer use of photos and music.
Proceedings of the SIGCHI conference on Human
Factors in computing systems , April 22-27, 2006,
Montréal, Québec, Canada
Boyd, D. (2004). Friendster and publicly articu-
lated social networking. CHI 2004, April 24-29,
2004, Vienna, Austria.
Boyd, D. (2007). Social network sites: public,
private or what? Knowledge Tree , 13, Retrieved
Dec 12, 2007, from http://kt.flexibelearning.net.
au/tkt2007/?page_id=28
Boyd, D., & Ellison, N. B. (2007). Social network-
ing sites: Definition, history and scholarship. Jour-
nal of Computer Mediated Communication, 13 (1),
11. Retrieved Dec 12, 2007, from http://jcmc.
indiana.edu/vol13/issue1/boyd.ellison.html
Boyd, D., & Heer, J. (2006). Profiles as con-
versation: Networked identity performance on
friendster. Proceedings of the Hawaii Interna-
tional Conference on System Sciences (HICSS-39) ,
January 4-7, Persistent Conversation Track, Kauai,
Hawaii.
reFerenCes
Anderson, P. (2007). What is Web 2.0? Ideas,
technologies and implications for education .
JISC Technology & Standards Watch . Retrieved,
July 19, 2008, from http://www.jisc.ac.uk/media/
documents/techwatch/tsw0701b.pdf
Caverlee, J., Liu, L., & Webb, S. (2008). Towards
robust trust establishment in web-based social
networks with social trust. [Beijing, China.].
WWW , 2008 (April).
Backstrom, L., Cynthia, D., & Kleinberg, J. (2007).
Wherefore art thou R3579X? Anonymized social
networks, hidden patterns, and structural steganog-
raphy. Proceedings of the WWW 2007 conference ,
May 8-12, 2007, Alberta, Canada.
Chapman, C., & Lahav, M. (2008). International
ethnographic observation of social networking
sites. Proceedings of the CHI 2008 conference
on Human Factors in Computing Systems , April
5-10, 2008, Florence, Italy.
Barnes, S. B. (2006). A privacy paradox: Social
networking in the United States. First Monday,
1 (9). Retrieved July 19, 2008, from http://first-
monday.org/issues/issue11_9/barnes/index.html
Diani, M. (2000). Social movement net-
works: Virtual and real. Information Com-
munication and Society , 3 (3), 386-401.
doi:10.1080/13691180051033333
Search WWH ::




Custom Search