Home > Sample essays > Annotated Bibliography: Privacy and Social Networking Sites

Essay: Annotated Bibliography: Privacy and Social Networking Sites

Essay details and download:

  • Subject area(s): Sample essays
  • Reading time: 5 minutes
  • Price: Free download
  • Published: 1 April 2019*
  • Last Modified: 31 July 2024
  • File format: Text
  • Words: 1,306 (approx)
  • Number of pages: 6 (approx)
  • Tags: Facebook essays

Text preview of this essay:

This page of the essay has 1,306 words.

Journal 1

Title: Privacy in Context: Technology, Policy, and the Integrity of Social Life
Author: Helen Nissenbaum
Summary: This seminal work by Helen Nissenbaum introduces the concept of “contextual integrity,” a framework for understanding privacy in the digital age. Nissenbaum argues that privacy is not merely about controlling information but about ensuring appropriate flows of information according to social norms and contextual purposes. She posits that privacy norms are rooted in specific contexts, such as healthcare or social networking, and that violations occur when information flows deviate from these entrenched norms. For instance, on platforms like Facebook, privacy concerns arise not simply because personal data is shared, but because the sharing often happens outside the expected social context, leading to breaches of trust and misuse of data by third parties.

Link: Privacy in Context: Technology, Policy, and the Integrity of Social Life

Analysis: Nissenbaum’s theory of contextual integrity provides a robust framework for analyzing privacy issues in contemporary socio-technical systems. Her approach diverges from traditional privacy theories that focus on individual control or the sensitivity of the information. Instead, contextual integrity emphasizes the role of context-specific informational norms. This perspective is particularly useful for understanding privacy on social networking sites, where the boundaries between public and private spheres are often blurred. Nissenbaum’s framework helps elucidate why users feel violated when their data is used in unexpected ways, such as for targeted advertising or by third-party applications. By focusing on the appropriateness of information flows within given contexts, policymakers and technologists can design systems that respect users’ privacy expectations more effectively. This theory has profound implications for privacy regulations and the design of digital platforms, suggesting that privacy protections need to be tailored to the contextual norms of different online activities.

Reference:
Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.


Journal 2

Title: Teens On the Internet: Interpersonal Connection, Identity, and Information
Authors: Patricia M. Greenfield, Kaveri Subrahmanyam, and Brendesha M. Tynes
Summary: This study explores how teenagers use the internet for interpersonal connections, identity formation, and information seeking. It delves into the ways teens navigate online privacy and the implications of their digital interactions for personal development. The research highlights the dual role of the internet as a space for both self-expression and potential privacy risks.

Link: Teens On the Internet: Interpersonal Connection, Identity, and Information

Analysis: The paper provides valuable insights into the online behaviors of teenagers, focusing on how they manage privacy while engaging in self-expression and identity formation. Greenfield et al. argue that teens often perceive the internet as an extension of their social world, using it to maintain relationships and explore their identities. However, this digital engagement also exposes them to privacy risks, such as oversharing personal information or encountering cyberbullying. The study employs frameworks from developmental psychology to understand these behaviors, noting that the adolescent drive for peer acceptance and exploration can sometimes conflict with privacy preservation. By applying theories such as Erikson’s stages of psychosocial development, the authors explain why teenagers might prioritize social connection over privacy concerns. This research underscores the need for better privacy education and more robust privacy settings on social networking sites to help teens navigate these challenges effectively.

Reference:
Greenfield, P. M., Subrahmanyam, K., & Tynes, B. M. (2006). Teens On the Internet: Interpersonal Connection, Identity, and Information. Journal of Applied Developmental Psychology, 42, 1-10. doi:10.1016/j.appdev.2015.11.005.


Journal 3

Title: The Privacy Paradox: Investigating Discrepancies between Expressed Privacy Concerns and Actual Online Behavior – A Systematic Literature Review
Authors: Patricia L. Racherla and Subodha Kumar
Summary: This systematic literature review examines the “privacy paradox,” where users express high levels of concern about their privacy but often engage in behaviors that compromise it. The review synthesizes findings from multiple studies to understand the underlying reasons for this discrepancy and discusses the implications for privacy management on social networking sites.

Link: The Privacy Paradox

Analysis: Racherla and Kumar’s review delves into the persistent issue of the privacy paradox, highlighting a critical challenge in online privacy management. The paradox refers to the contradiction where users claim to value their privacy highly but often behave in ways that undermine it, such as sharing personal information on social media platforms. The review categorizes the literature into several thematic areas, including cognitive biases, social influences, and the role of technology design in user behavior. The authors draw on theories from behavioral economics and psychology, such as the theory of planned behavior and bounded rationality, to explain why users might act contrary to their stated privacy preferences. They also discuss the implications of the privacy paradox for designing better privacy interfaces and policies that align more closely with users’ expressed concerns. This comprehensive review provides a foundation for future research and practical applications aimed at bridging the gap between privacy attitudes and behaviors.

Reference:
Racherla, P. L., & Kumar, S. (2017). The Privacy Paradox: Investigating Discrepancies between Expressed Privacy Concerns and Actual Online Behavior – A Systematic Literature Review. Journal of Management Information Systems, 34(2), 504-536. doi:10.1080/07421222.2017.1334482.


Journal 4

Title: The Role of Friends’ Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep?
Authors: Nicole B. Ellison, Charles Steinfield, and Cliff Lampe
Summary: This article investigates how the appearance and behavior of an individual’s friends on Facebook influence perceptions of the individual. It explores the concept of “the company we keep” and how social associations on social networking sites impact personal evaluations and judgments by others.

Link: The Role of Friends’ Appearance and Behavior on Evaluations of Individuals on Facebook

Analysis: Ellison, Steinfield, and Lampe’s study delves into the social psychological aspects of online identity formation and perception. Using the theoretical framework of social identity theory and impression management, the authors examine how the behaviors and appearances of one’s Facebook friends influence how others perceive the individual. Their findings suggest that people make judgments based not only on an individual’s online content but also on the content and behavior of their friends. This phenomenon is tied to the broader concept of “guilt by association,” where individuals are evaluated based on their social connections. The study’s implications are significant for understanding the dynamics of online social networks, where peer associations can impact one’s digital reputation and identity. The research also highlights the importance of curating one’s online network and being aware of how friends’ actions can affect personal perceptions. This insight is crucial for both users and platform designers who aim to foster positive online environments.

Reference:
Ellison, N. B., Steinfield, C., & Lampe, C. (2011). The Role of Friends’ Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep?. Human Communication Research, 37(1), 100-124. doi:10.1111/j.1468-2958.2010.01309.x.


Journal 5

Title: Taking Risky Opportunities in Youthful Content Creation: Teenagers’ Use of Social Networking Sites for Intimacy, Privacy, and Self-Expression
Authors: Sonia Livingstone
Summary: This paper explores how teenagers use social networking sites to navigate intimacy, privacy, and self-expression. It discusses the risks and opportunities associated with youth content creation and the strategies teens employ to balance their desire for connection with privacy concerns.

Link: Taking Risky Opportunities in Youthful Content Creation

Analysis: Livingstone’s research provides a comprehensive analysis of how teenagers use social networking sites to express themselves while managing privacy and intimacy. Drawing on developmental psychology and media studies, the paper highlights the dual nature of social media as both a space for self-exploration and a source of privacy risks. The study reveals that teens are not passive users but actively engage in sophisticated privacy management practices, such as using privacy settings, pseudonyms, and selective sharing to control their online personas. Livingstone also discusses the concept of “context collapse,” where the boundaries between different social contexts blur, making privacy management more challenging. The research underscores the need for digital literacy programs

Discover more:

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Annotated Bibliography: Privacy and Social Networking Sites. Available from:<https://www.essaysauce.com/sample-essays/2015-12-15-1450211880/> [Accessed 12-12-24].

These Sample essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.