2009
DOI: 10.1007/s10676-009-9186-x
|View full text |Cite
|
Sign up to set email alerts
|

Self-exposure and exposure of the self: informational privacy and the presentation of identity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
20
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(23 citation statements)
references
References 26 publications
1
20
0
Order By: Relevance
“…Trends found in photos as well as locations associated with status updates were found to enrich such predictions, which conforms with the findings of previous research (Kosinski et al, 2013). Shoemaker (2010) argues that patterning pieces of information provided by a user which, when considered separately, might not implicate one's identity, nonetheless purport to provide substantial information about the person in question when taken together; our results similarly showed that when concepts are consistently included in photos uploaded from the time when the profile was created to the most recent shares, many personality dimensions can be predicted; moreover, if the inferences are incorrect, this can cause embarrassment or shame for the affected person. Our results also showed that if photos are mined out of context and aggregated over time, potentially incorrect attributes could be attached to users; this bothered the participants, consequently blurring the temporal boundary of intended disclosure.…”
Section: Temporal Boundariessupporting
confidence: 90%
See 1 more Smart Citation
“…Trends found in photos as well as locations associated with status updates were found to enrich such predictions, which conforms with the findings of previous research (Kosinski et al, 2013). Shoemaker (2010) argues that patterning pieces of information provided by a user which, when considered separately, might not implicate one's identity, nonetheless purport to provide substantial information about the person in question when taken together; our results similarly showed that when concepts are consistently included in photos uploaded from the time when the profile was created to the most recent shares, many personality dimensions can be predicted; moreover, if the inferences are incorrect, this can cause embarrassment or shame for the affected person. Our results also showed that if photos are mined out of context and aggregated over time, potentially incorrect attributes could be attached to users; this bothered the participants, consequently blurring the temporal boundary of intended disclosure.…”
Section: Temporal Boundariessupporting
confidence: 90%
“…In either case, this single construct cannot adequately explain a user's choice of disclosure genre since both types of information use are governed by different types of privacy concerns and therefore by different attitudes. While behavioral reactions including disclosure are associated with privacy concerns (Min, 2016;Smith, Dinev, & Xu, 2011), different privacy concerns about direct data use and inferred information influence behavioral intentions to different extents. Therefore, our research suggests that secondary use is not a single construct but a composition of direct and inferred constructs.…”
Section: Implications For Research and Practicementioning
confidence: 99%
“…Absolute and relative identity are formal relations grounded in the natures of the entities they involve; identity-as-selfhood seems, rather, to be grounded in an attitude or stance which the user takes towards their avatar. David W. Shoemaker (2010) discusses the strengths and weaknesses of a variety of potential accounts of identity-as-selfhood -however, his starting point assumes some relatively circumscribed and united set of properties or entities from which the self is composed. The key question at hand isn't which of an already defined set of properties or entities do in fact compose the self but rather whether the avatar and the user can enter into such a unity.…”
Section: Identity-as-selfhoodmentioning
confidence: 99%
“…Moor, , 2005; J.H. Moor, 1997;Nissenbaum, 2010;Shoemaker, 2009;H. Tavani, 2007;Tavani & Moor, 2001; H.T.…”
Section: Privacy With a Focus On Information Privacymentioning
confidence: 99%