Lecture 1: Introduction, utopian, and dystopian view on media infiltration
(Martin Tanis)
Trends in de media and media-use: From push to pull choosing from large offering of media content,
Dissolving media boundaries, increasing interactivity & content creation by ‘customers’
Utopian: a community or society that possesses highly desirable or nearly perfect qualities for its
citizens: Optimism about future, strong belief in technological development, push to invest in
technological developments & cultural change toward individuation and individual empowerment
Dystopia: a community or society that is undesirable or frightening
lecture 2. introduction to privacy (Martin Tanis)
privacy is defined by culture, times, and individuals
Altman: privacy is for us:
group vs individual
non monotonic
dynamic
by direction
desired vs actual
westwin: privacy is interaction with others
purpose: autonomy, self-evaluation, emotional release & limited protected
state: intimacy, anonymity, reserve & solitude
petrino: privacy as information, ownership and sharing
ownership
rules around information
control of distribution
collective privacy boundaries
privacy turbulences
Self-disclosure (openbaring) is the act of revealing personal information to others
Walther - introduction to privacy
About the introduction of privacy and disclosure: how more disclosure (openbaring) about yourself,
how more benefits people get online: There are 3 factors confronting users of online systems:
1. A misplaced presumption that online behavior is private
2. Nature of the Internet at a mechanical level is quite incommensurate with privacy
3. One’s expectation of privacy does not constitute privileged communication.
Bazarove - self disclosure in social media
About self-disclosure. Social media affordances reflect users’ p
Sources of value that hoped to attain through self-disclosure:
1. social validation
2. self-expression
3. relational development
4. identity clarification
5. social control
Social media affordances reflect users’ perceptions of media utility in supporting social practices with
four kinds:
Data permanence
Communal visibility of social information and communication
Message edibility
Associations between individuals
lecture 3. personalization, privacy and surveillance (Martin Tanis)
, Privacy as a right -> privacy as a commodity
Privacy trade-off -> more useful to share
Sharing benefits are financial, social and personalization
The privacy calculus presumes that users always make
rational economic choices.
Behavior quite often guided by ‘heuristics’
- Social proof
- Persuasive techniques by platforms: foot in the door
or door in the face
- Affect heuristics: We give more information on a
website which looks nice and save
- Framing effects
Privacy fatigue: A sense of weariness toward privacy issues, in which individuals believe that here is
no effective means of managing their personal information on the internet =
Cynicism = disinterest/skeptic about someone's social privacy because of a lack of trust
emotional exhaustion = tried to think about someone’s online privacy
surveillance capitalism = data collection as a process of capital accumulation, with the purpose to
‘predict and modify human behavior to produce revenue and market control’ Main risk of surveillance
economy: normalization of data collection, so that users become comfortable with increased
surveillance and quantification
Dienlin, Trepte: Is the privacy paradox a relic of the past
The new approach distinguishes types of privacy: Informational privacy, social privacy, psychological privacy.
The privacy paradox states that online privacy concerns do not sufficiently explain online privacy behaviors
on SNS. The results of the study show that online privacy behaviors are not paradoxical in nature but that they
are based on distinct privacy attitudes. The privacy paradox can be considered a relic of the past.
Choi, Park & Jung: The role of privacy fatigue in online privacy behavior
H1a) higher level of privacy concern will result in less intention to disclose personal information
H1b) higher level of privacy concern will result in less disengagement.
H2a) higher level of privacy fatigue will result in higher intention to provide personal
information
H2b) higher level of privacy fatigue will result in
higher
Privacy fatigue is a multi-dimensional concept including exhaustion and cynicism
There is a significant effect of privacy fatigue on privacy coping behaviors
Privacy fatigue has a stronger impact on disengagement behavior than privacy concern.
,Lecture 4. Trolling, Flaming, Grieving and harassment: online safety issues for you and the people
you know (Wai Yen Tang)
Ortiz: Trolling as a Collective Form of Harassment: Trolling = exercising power domination
over marginalized groups, racism, and sexism. discrimination, distraction, identity-based
harassment, politically motivated and resentment to societal changes. Trolls are actual persons
who intentionally initiate online controversy and conflict to provoke emotional responses from other
social media users. and Bots aim to make a topic or person appear to be more heavily engaged.
Anonymity is a reason for trolling online: Visual anonymity (no profile picture) And pseudonymous
(hebben van schuilnamen), Untraceable anonymity. Absence of social cues of the self and others AND
social context - online conflict. Because everyone is anonymous should they also be considered
equals
Online disinhibition effect (ontremming, los gaat online = omdat het kan)
1. Dissociative anonymity – being a different ‘type’ of person on the internet
2. Invisibility – people don’t know that you look like
3. Asynchronicity – waiting time between massages (not directly)
4. Solipsistic introjection – self projection the tone of the message
5. Dissociative imagination – imagining the feelings of the message etc.
6. Minimization of authority – you are the only one who sees the message
Deindividuation to explain crowd violence and mob mentality = Loss of personal identity, Loss of
self-awareness, Blending into the (online) crowd, Loss of accountability & Disinhibition
Cognitive side:
Personal identity subsumed to salient group identity
Online social cues more important to people on how to behave in social environment
How to behave include prosocial and antisocial acts
Greater conformity to social and group norms (especially for personally identities)
Ingroups VS outgroups dynamics & Higher self-awareness
Strategic side:
Making use of one’s identity and presence in given social environment
Trolls using anonymity and pseudonymity as a strategic tool to harm others (shield)
Disconnecting their online identity from the physical identity
For vulnerable groups in presence of powerful groups and hostile groups
For social support and for someone’s privacy
online abuses lead to a spiral of silence, avoiding certain platform to escape harm leading less online
participation among vulnerable groups emotional reactance: anger, hostility, and psychological
consequences: anxiety, Depression, PTSD, lower self-esteem
ignoring, not giving attention and not reacting to online abuses: problem is they will escalate greater
threats, think the abuse is tolerated and without consequences and not know about norms and rules.
to stem online abuses in online communities: active and volunteer moderation and clear community
rules of contact.
Sambaraju & McVittie: Examining abuse in online media- Rahul Sambaraju & Chris McVittie =
offensive languages can be studied in two ways: focus on the message itself and focus on interaction
consequences.
- Psychopathy – lack of empathy
- Sadism – enjoying the suffrage of others
- Machiavellianism – disposition to manipulate others
- Narcissism – feeling entitled and better than others
, Lecture 5: Scientifics and journalists being targeted: online safety issues for professional
communicators (Wai Yen Tang)
The personal impact of being targeted of online safety issues is:
- Personal distress
- Guilt and self-blame in bringing harm to self and others
- Increased concern of one’s safety and their loved ones
- Emotional exhaustion
- Reading those negative comments in survey data is distressful
Chilling effect:
- Discourage early-career researchers and students from examining sensitive and controversial
topics
- Discourage researchers from studying violent and extremist groups, especially without
organizational support and safety measures.
Doerfler: I'm a professor, which isn't usually a dangerous job
Doerfler thinks that women, members of LBGTQ+ community and academic rank are more likely to be
targeted by online harassment such as swating, death threats, angry communication, delegitimizing
their work and calling for censure, firing or canceling
They are targeted because of: Studying extremist and terrorist groups, Research addressing issues
surrounding race, gender and marginalization & Research perceived as ‘unscientific’ ‘invalid’ ‘politically
motivated’ ‘ideologically motivated ‘biased’ ‘agenda-driven’ ‘challenging their worldview’ ‘illegitimate.
Different kinds of Internet-facilitated harassment
Cyberbullying = repeated hostile behavior towards a well-identified target
Cyber-aggression = various forms of harassment (hate, speech, misogyny, racism)
Doxing = publicly broadcasting private or identifying information about an individual, often
leads to coordinated harassment efforts by ad-hoc mobs organized in third-party communities
Two forms of motivation behind harassment whereby the stated motivations differ from the true
motivations of harassers that are often about issues of race and gender are:
Patent bigotry = individuals and groups that hold – and acknowledge – beliefs we might
classify as racist, misogynist, or homophobic reached out to researchers directly to inform
them that their findings or conclusions were incorrect.
Political objections = individuals who do not believe themselves to be bigoted, but find that
research challenges their views, or feel it implies they are bigoted, often object loudly and
publicly to this work.
Motivations for harassment of public figures:
- self-preservation
- Ideology
- Performative.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Amber2308. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.32. You're not tied to anything after your purchase.