-
Notifications
You must be signed in to change notification settings - Fork 6
/
chapter2.html
432 lines (288 loc) · 88.6 KB
/
chapter2.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta charset="utf-8" />
<title>The Presentation of Self Online</title>
<meta content="width=device-width, initial-scale=1" name="viewport" />
<link href="thesis.css" media="all" rel="stylesheet" title="Thesis do" />
<link href="https://dokie.li/media/css/basic.css" media="all" rel="stylesheet alternate" title="Basic" />
<link href="https://dokie.li/media/css/dokieli.css" media="all" rel="stylesheet" />
<script src="https://dokie.li/scripts/dokieli.js"></script>
<script src="thesis.js"></script>
<link href="https://rhiaro.co.uk/incoming/" rel="http://www.w3.org/ns/ldp#inbox" />
<link href="https://linkedresearch.org/annotation/rhiaro/thesis/" rel="http://www.w3.org/ns/oa#annotationService" />
<style>
h1:before {
content:"Chapter 2\A" !important;
white-space:pre;
font-size:0.75em;
}
</style>
</head>
<body about="" prefix="rdf: http://www.w3.org/1999/02/22-rdf-syntax-ns# rdfs: http://www.w3.org/2000/01/rdf-schema# owl: http://www.w3.org/2002/07/owl# xsd: http://www.w3.org/2001/XMLSchema# dcterms: http://purl.org/dc/terms/ dctypes: http://purl.org/dc/dcmitype/ foaf: http://xmlns.com/foaf/0.1/ pimspace: http://www.w3.org/ns/pim/space# cc: https://creativecommons.org/ns# skos: http://www.w3.org/2004/02/skos/core# prov: http://www.w3.org/ns/prov# mem: http://mementoweb.org/ns# qb: http://purl.org/linked-data/cube# schema: http://schema.org/ void: http://rdfs.org/ns/void# rsa: http://www.w3.org/ns/auth/rsa# cert: http://www.w3.org/ns/auth/cert# wgs: http://www.w3.org/2003/01/geo/wgs84_pos# bibo: http://purl.org/ontology/bibo/ sioc: http://rdfs.org/sioc/ns# doap: http://usefulinc.com/ns/doap# dbr: http://dbpedia.org/resource/ dbp: http://dbpedia.org/property/ sio: http://semanticscience.org/resource/ opmw: http://www.opmw.org/ontology/ deo: http://purl.org/spar/deo/ doco: http://purl.org/spar/doco/ cito: http://purl.org/spar/cito/ fabio: http://purl.org/spar/fabio/ oa: http://www.w3.org/ns/oa# as: https://www.w3.org/ns/activitystreams# ldp: http://www.w3.org/ns/ldp# solid: http://www.w3.org/ns/solid/terms# acl: http://www.w3.org/ns/auth/acl# dio: https://w3id.org/dio# rel: https://www.w3.org/ns/iana/link-relations/relation#" typeof="schema:CreativeWork sioc:Post prov:Entity">
<main>
<article about="" typeof="schema:Article">
<h1 property="schema:name">The Presentation of Self Online</h1>
<div id="content">
<section id="introduction" resource="#introduction" rel="schema:hasPart">
<h2>Introduction</h2>
<div>
<p>Web users are engaging in computer-mediated self-expression in varying ways. The technology that enables this is developing fast, and how it does so is influenced by many more factors than just the needs of the people it touches. This chapter explores literature about the impact of computer-mediated self-expression on:</p>
<ul>
<li>people's everyday lives.</li>
<li>individual self-expression and exploration.</li>
<li>interactions and relations with others.</li>
<li>interactions with and expectations of society and community.</li>
</ul>
<p>We ground our discussion in established literature about non-digital self-expression and identity from the social sciences. This raises the key theme of individuals desiring control over how others see us, yet wanting to behave in a way that is authentic, or consistent with their internal identities. There is also emphasis on the collaborative and collective nature of identity formation; that is, our self-presentation fluctuates depending on the people we're with, the situation we're in, and norms of the society we're part of. The focus on face-to-face interactions and embodiment leads us to draw contrasts between online and offline experiences, and to look at the substitutes for the body in digital spaces.</p>
<p>The extent to which online and offline identities interact and overlap is hotly debated. Is creating an online identity a chance to reset, to reshape yourself as an ideal? Or are you simply using it to convey true information about what is happening in your daily offline life? Is it a shallow, picture of you, or a forum for deep self-exploration? How does the way one portrays oneself in digital spaces feedback to ones offline self-presentation? We explore these questions in <a href="#offline-to-online-and-back-again">section 3</a>.</p>
<p><a href="#networked-publics">Section 4</a> examines social media and blog use, including how one's <em>imagined audience</em> affects self-presentation in public, and how <em>context collapse</em> might occur when the actual audience is different to expected. There are several examples of techniques for managing who sees which 'version' of oneself, and the types of 'versions' of self that are commonly seen to be constructed on social media, and with what degree of transparency they are linked together. Most of the longitudinal studies in this space are of teenagers and young people, who have never known a world without social media, and who may incorporate it naturally and seamlessly into their daily practices, thus making it a core part of their identity during formative years. I draw a contrast between the relationship-driven architecture of contemporary social networking sites, and the more personal, customisable blogging platforms which preceded them. Studies of bloggers and blogging communities reveal some different priorities and habits than what is common practice today, and offer insight into how online self-presentation is evolving.</p>
<p>Throughout literature from both social and computer sciences, privacy is a common concern. In <a href="everybody-knows-im-a-dog">section 5</a> we look further at how tensions between users and the privacy settings of systems they use impact on personal information disclosure. Does self-censorship affect identity formation? How do people weigh up the risks and benefits of exposing themselves online? This is particularly pertinent for future systems development, as more and more people become aware of state surveillance, for-profit data collection, and their diminished rights over their personal data.</p>
<p>Finally we introduce the relatively new Web Science concept of Social Machines in <a href="the-ghost-in-the-social-machine">section 6</a> in order to recapture the circular interdependencies between humans, technologies, and communities. We propose to build on current work of describing and classifying social machines to better account for the individual perspectives of participants.</p>
<p>Ultimately we posit that online is simultaneously a reflection, a distortion, an enhancement, and a diminishment of the offline world. They impact each other in complex ways, particularly with regards to self-presentation and identity formation. The various theories and studies described in this chapter form the basis for which we conduct the investigative and technical work in the remainder of this thesis.</p>
<section id="perspective" rel="schema:hasPart">
<h3>My perspective on this review</h3>
<div>
<p>I'd like to take a moment to note that whilst reading various studies about young peoples' reactions to and interactions with rapidly evolving digital technologies from the 2000s, it occurred to me that the subject of these studies is in fact my own age group. Some of the results are instinctively familiar to me; I was there, I experienced these things. Some are ridiculous. I don't know how my first-hand experience of growing up with technology (I was born in the same year as the Web, and my parents were early adopters) affects my reading of these studies, or my ability to study others' use of technology, but it is something I ponder.</p>
</div>
</section>
</div>
</section>
<section id="performing-the-self" rel="schema:hasPart">
<h2>Performing the self</h2>
<div>
<p>The obvious place to start when embarking on a discussion about self-presentation is Goffman [<a href="appendices#ref-goffman1959">goffman1959</a>]. In <em>The Presentation of Self in Everyday Life</em>, Goffman posits several, now well-established, theories using drama as a metaphor:</p>
<ul>
<li>Everyone is performing. The front-stage of our performance is what we create for others - the audience - to see, so that they may evaluate and interact appropriately with us.</li>
<li>We also have a back-stage; how we act when there is no audience, or an audience of our <em>team</em>. Our team participate alongside and collude with us on the front-stage.</li>
<li>Our performances have both conscious and unconscious aspects. That is, we consciously <em>give</em> information about ourselves to others in order to manage their impression of us, but we also unconsciously <em>give off</em> information that others may pick up on and take into account when deciding how to interact with us.</li>
<li>Both actors and audiences are complicit in maintaining the cohesion of a situation. Performances break down if actors break character, deliberately or accidentally, or if there is a mismatch between parties' definition of the situation.</li>
</ul>
<p>These theories emphasise the collaborative or social nature of self-presentation, and apply to face-to-face interaction.</p>
<p>Whilst Goffman's dramaturgy refers mostly to body language, a related theory is Brunswik's lens model [<a href="appendices#ref-brunswick56">brunswick56</a>, <a href="appendices#ref-lens01">lens01</a>], part of which suggests that individuals infer things about others based on "generated artifacts", or things left behind. In [<a href="appendices#ref-bedrooms02">bedrooms02</a>] this model is used to study how personal spaces (offices and bedrooms) affect observers' assessments of the characteristics of the owner of the space. This study links individuals to their environments by:</p>
<ul>
<li>self-directed identity claims (eg. purposeful decorations like posters or use of colour);</li>
<li>other-directed identity claims (eg. decorations which communicate shared values that others would recognise);</li>
<li>interior behavioural residue (ie. "physical traces of activities conducted within an environment");</li>
<li>exterior behavioural residue (ie. traces of activities conducted outside of the immediate environment which nonetheless provide some cues as to the personality of the environment occupant).</li>
</ul>
<p>Self-presentation is largely unconscious in the physical realm and comes naturally to most people. People may also use in-crowd markers (like a shirt with a band logo on) consciously to send certain messages to people who will recognise them, whilst not drawing any attention from people who won't [<a href="appendices#ref-boydfacid">boydfacid</a>]. Later in this chapter I look at how our presence in digital spaces fail and succeed to take the place of the physical body when it comes to interactions and identity formation.</p>
<!-- <div class="notes">
<h2>https://thesocietypages.org/cyborgology/2013/01/10/context-collapse-a-literature-review/</h2>
<p>Social psychologists argue that we come to know ourselves by seeing what we do and how others react to us, and that through interaction, actors seek to maintain the identity meanings associated with each role (Burke and Stets 2009; Cooley 1902; Mead 1934). Indeed, Mead (1934) contends that for each role the actor plays, there is a separate Generalized Other, or larger moral understanding of who the person is and how the person is expected to be in the world, and that social actors manage their roles by adhering to disparate expectations as is situationally necessary. Similarly, Goffman (1959) demonstrates the skillful ways in which social actors reveal and conceal aspects of themselves for varying audiences, maintaining separate faces within distinct social arenas, while Leary (1995) discusses playing to each audience, their values, and their perceived positive opinion of the actor.</p>
</div> -->
<section id="the-self-in-context" rel="schema:hasPart">
<h3>The self in context</h3>
<div>
<blockquote><p>By reflexively adjusting one’s perception of self in reaction to society, people construct their individual identity. [<a href="appendices#ref-boydfacid">boydfacid</a>]</p></blockquote>
<p>Development of personal identity is not only something that happens internally. We are strongly influenced by feedback (conscious and unconscious) from others around us, as well as the particular setting and culture in which we find ourselves. How we react to things outside of our control in part determines our identity construction, and some people adjust their behaviour in response to feedback more than others [<a href="appendices#ref-snyder74">snyder74</a>]. Thus identity is <em>socially</em> constructed, and often is dynamically adjusted according to context [<a href="appendices#ref-boydfacid">boydfacid</a>].</p>
<!-- <p><span class="notes">(self-awareness is identity situated as in society.)</span> A person's understanding of the context in which they are performing impacts their performance [boydfacid]. boyd argues that online, people find it much more difficult to evaluate this context, and thus run increased risk of performing inappropriately, or experience <em>context collapse</em> when multiple audiences are inadvertently combined. This is explored further in <a href="#growing-up-online">section 4</a>.</p> -->
<!-- <p class="notes">…. political, cultural, racial. stuff about web dissolving these [Turkle], but not really. [Kenny] study about people using identity language (with a corpus of terms that corresponds to culture/society), but in content not wrt themselves or in their profiles.</p> -->
</div>
</section>
<section id="the-project-of-the-self" rel="schema:hasPart">
<h3>The project of the self</h3>
<div>
<p>Giddens [<a href="appendices#ref-giddens84">giddens84</a>] looks at the relationship between macro and micro views of the world, acknowledging that broader effects of society impact individual behaviour, and vice versa, with neither one being the primary driving force. This suits well my ideas about online self-presentation, confirming the complex interplay between technological affordances, individual actions, and the place of both in a cultural and social context.</p>
<p>Giddens argues that self-identity is an aggregation of a person's experiences, an ongoing account, and a continuous integration of events. In contrast to Goffman's dramaturgy, Giddens downplays the role of an audience, and in contrast to Brunswik's lens theory, he downplays what we can learn from the traces someone leaves behind. Giddens argues that self-identity cannot be uncovered from a moment, but something which is ongoing, over time. Modern society, according to Giddens, affords us more freedom to create our own narratives to determine our self-identity. In the past, rigid social expectations dictated our roles for us. However, increased choices about what to do with ourselves may also increase stress and prove problematic. Awareness of the body is central to awareness of the self, as the body is directly involved in moments we experience in daily life. As we are now explicitly constructing a narrative about our identities, rather than having one ascribed to us by society, the self is an ongoing project which takes work to maintain [<a href="appendices#ref-giddens91">giddens91</a>].</p>
<p>The focus on explicit actions and decision making about self-presentation is pertinent when it comes to digital representations of identity.</p>
</div>
</section>
<section id="extending-self" rel="schema:hasPart">
<h3>Extending the self</h3>
<div>
<p>Early to mid 20th century philosophers and social scientists complicate notions of the 'self' by combining it and extending it with our physical surroundings, and this view emerged long before the Web. Heidegger expresses technology as coming into being through use by a human; when tools are used the tool and its user do not exist as independent entities, but as the experience of the task at hand (using the example of a carpenter hammering, unaware of himself or his hammer) [<a href="appendices#ref-manhammer">manhammer</a>]. McLuhan discusses media, literate and electronic, from the printing press and electric light to radio, TV and telephone, and its impact on how we communicate. He places communication technologies as simultaneously extensions of and amputations of our bodies and senses, which continuously and fundamentally re-shape the way we (humans) see and place ourselves the world [<a href="appendices#ref-mcluhan">mcluhan</a>]. More recently, Clark's Extended Mind Theory uses the example of a notebook as a means of externally processing information that would otherwise be carried out by the brain, drawing the external world in as party to our cognitive processes [<a href="appendices#ref-clarkmind">clarkmind</a>].</p>
<p>The next logical step is to consider how the modern digital technologies of Web and social networking can also be considered extensions of the self, and this is addressed in part by Luppicini's notion of Technoself [<a href="appendices#ref-technoself">technoself</a>].
Technoself incorporates (amongst other things) extension of the self through physical technology embedded in the body (cyborgology); in our changing understanding of what it is to <em>be</em>, as life is extended and augmented through advancing healthcare; but also in our relationships with our virtual selves. This is not a topic into which I will dive deeply from a philosophical standpoint, but the idea of the Web and online social networks as extensions to the self rather than as separate entities or concepts is worth bearing in mind as this thesis proceeds to explore the complexities of intertwined digital and offline identities.</p>
<!-- <p class="notes">maybe something to do with hyperreality, Baudrillard, Simulacra and Simulation</p> -->
</div>
</section>
</div>
</section>
<section id="offline-to-online-and-back-again" rel="schema:hasPart">
<h2>Offline to online… and back again</h2>
<div>
<p>When people use digital technologies to communicate, they are passing a version of themselves through the filter of the platform they use. In this section I discuss the relationships between online and offline selves.</p>
<p>One might assume that the disembodied nature of the interactions lets people have more control over how they are "seen" by others; Turkle claims that it is "easy" to create and tweak a perfect self online [<a href="appendices#ref-Turkle2015">Turkle2015</a>]. In reality this control is affected by a great number of factors. Turkle writes that computer-mediated communication is predictable even in the ways it is unpredictable, and that people seek out this predictability in preference to face-to-face interactions, and in preference to facing emotional vulnerability. <!-- Perhaps in the early days of the Web the "nobody knows I'm a dog" meme rang true, but most of the social media systems in mainstream use at the time of writing are too large and complex for the average user to fully grasp the implications of their inputs. --> Turkle's argument assumes that we have full understanding and control of the digital systems we use and the audiences we are reaching through them. It presumes we know exactly how and where and when the data we input will be output in the short and long term, and how others will interpret it. <!-- One aspect of this is data <em>given off</em> by users as a side effect of scrolling, typing, tapping and clicking in their browser and mobile apps which is collected in the background by a plethora of third-parties. This generates a view of the individual that they may not even realise is being compiled, and over which they certainly have no control. Further, the affordances of the technical platform may dictate how a user is able to actively express themselves, or influence what they want to share on a subconscious level. We will discuss both of these issues in more detail later in this chapter. --></p>
<p>Turkle's argument neglects that at every crossroad in these 'predictable' systems are stationed unpredictable humans, perhaps with conflicting interests and motivations, from the conception of a social system, to its realisation and use. Turkle has been studying for decades how people explore, experiment and find themselves through technology, and her overriding narrative is of a desire to express an idealised version of the self; one that is not subject to any interpretation other than what the expresser desires. However, as discussed further in <a href="#networked-publics">the next section</a> numerous studies of social media users find a variety of other types of motivation for participation.</p>
<p>Keen [<a href="appendices#ref-digitalvertigo">digitalvertigo</a>] on the other hand emphasises the risks that individuals become trapped by technology of which they have neither understanding nor control. Being swept up in cultural technology trends, social media users may unwittingly become "prisoners" of a carefully curated digital "hyperreality", the importance of which supplants their offline lives. Similarly, [<a href="appendices#ref-inreallife">inreallife</a>] suggests that "fantasy gets in the way of real progress" when it comes to self improvement, but studies only examples of "catfishing", where individuals create exaggerated online profiles in order to deliberately mislead potential romantic interests. The idea that the online self <em>replaces</em> rather than supplements the offline self also misses the nuances of how and why people use social media in the first place. Nonetheless, I agree that online worlds are certainly not just a mirror of the offline.</p>
<p>On the contrary, not only are online identities some form of reflection of offline identities, but the inverse can be true as well. In ethnographic studies of teenagers' use of mobile apps for socialising, it is reported that crafted online personas both reflect and feed back into teenagers' true sense of self [<a href="appendices#ref-appgen">appgen</a>]. Numerous studies from the field of psychology, reported in [<a href="appendices#ref-infinitereality">infinitereality</a>], demonstrate various ways in which playing a role online or in a virtual world reflects back and directly changes people's offline behaviour. Avatars can be used to build confidence and reveal suppressed personality traits. Relatedly, study participants who were asked to interact from behind avatars which conveyed different appearances of age, race, and body type expressed affinity with these previously unfamiliar experiences, and responded differently in personality evaluations before and after. A longitudinal study of teenage girls roleplaying online, a process through which they developed their identity through narrative, revealed positive impacts on their confidence, through new friendships [<a href="appendices#ref-youth">youth</a>].</p>
<p>There is a long history of assessments of online interactions which proclaim that the self-centered nature of social media makes people narcissistic, that competition for reputation isolates us [<a href="appendices#ref-digitalvertigo">digitalvertigo</a>], and that the construction of an ideal self or facade is damaging, especially to young people. However, [<a href="appendices#ref-appgen">appgen</a>] argues that narcissism is not created by the Web, but enabled by it, as an existing need for validation is more readily satisfied.</p>
<p>Several studies [<a href="appendices#ref-insta17">insta17</a>, <a href="appendices#ref-Rousseau17">Rousseau17</a>, <a href="appendices#ref-haferkamp10">haferkamp10</a>] find that people's self confidence or body image drops after viewing the online profiles of people who appear to be more attractive or more successful than them. [<a href="appendices#ref-wellbeing17">wellbeing17</a>] explains that passive use of social media is what appears to have a negative impact on people, whereas active use has a positive effect on well-being. This is shown in several studies, including [<a href="appendices#ref-toma10">toma10</a>], which explores the beneficial effects of browsing one's own Facebook profile; [<a href="appendices#ref-nemer15">nemer15</a>] which discusses how selfies can empower marginalised communities; and [<a href="appendices#ref-noland06">noland06</a>] which finds a positive impact on self-esteem of teenaged girls who engage in "auto-photography".</p>
<p>It is also worth bearing in mind that experience in the virtual world can cause physical reactions - laughter, tears - and the virtual and the physical blur together in the subject stream of experiences, adding to an identity which is made of virtual and physical events blended together [<a href="appendices#ref-youth">youth</a>].</p>
<section id="authenticity" rel="schema:hasPart">
<h3>Authenticity and integrity</h3>
<div>
<p>In an interview, Facebook founder Zuckerberg said that "having two identities for yourself is an example of lack of integrity" [<a href="appendices#ref-fbeffect">fbeffect</a>]. This received public backlash at the time, and on several more occasions as Facebook and other social networking sites imposed real name policies, sometimes linked to an official ID [<a href="appendices#ref-boyd2012politics">boyd2012politics</a>]. This removes a level of identity control which many people take for granted. A particularly clear example can be seen in the reaction of a community of drag queens who were used to being able to interact online using chosen names. Real name requirements removes a vital aspect of fluidity from their interactions, glossing over the seams which provide poignant performance material and a route towards a group identity [<a href="appendices#ref-lingel2015face">lingel2015face</a>, <a href="appendices#ref-barmann14drag">barmann14drag</a>]. Additionally the requirement for real names and the ability to report 'fake names' became a mechanism whereby a marginalised group could be harassed and silenced [<a href="appendices#ref-hotmess2015selfies">hotmess2015selfies</a>]. In general, an attitude that people should be happy to connect all of their identities together under a single legal name is an expression of social privilege: a result of having no features or proclivities which are socially censored.</p>
<p>Sandberg, whilst COO of Facebook in 2012, commented that profiles as detailed self portraits is a "shift towards authenticity" [<a href="appendices#ref-digitalvertigo">digitalvertigo</a>], but her organisation's notion of 'integrity' as a single complete version of oneself that is the same no matter to whom one is presenting is somewhat at odds with authenticity. Neither are people "intraviduals", caught between competing identities as claimed by Conley in 2009 [<a href="appendices#ref-conleyintra">conleyintra</a>], but expressing aspects of themselves appropriately and according to context. This is behaviour which we have already established via Goffman as ordinary offline, and so shouldn't be considered unusual online. One's 'authentic' self-presentation may be partial or moderated and no less genuine for that. Indeed, some individuals find they are more able to express their authentic selves online than they are offline due to oppression or social expectations which are disjoint from their core values.</p>
<p>However, in highly commercialised or competitive online environments, 'authenticity' is a quality to strive for, to maintain an audience. A Web search for 'authenticity on social media' will reveal a plethora of guides on how to craft an 'authentic' persona, how to maintain personal-but-not-too-personal ties with one's audience so that they see that you're just like them. For individuals who set out to explore and express their identity online, this can be a tricky world to navigate [<a href="appendices#ref-duffy15b">duffy15b</a>]. True authenticity in online communities is seen as disjoint with self-promotion and celebrity; popularity implies a reduction in authenticity, perhaps linked to 'selling out' or 'pandering' to an audience [<a href="appendices#ref-donathboyd04">donathboyd04</a>, <a href="appendices#ref-ellison07">ellison07</a>]. Whereas authenticity is often seen from an outside perspective as always something manufactured, an idealized reality [<a href="appendices#ref-Marwick2010">Marwick2010</a>].</p>
<p>The idea that online spaces are under control of their owners suggests others may be suspicious of their authenticity [<a href="appendices#ref-tong08">tong08</a>] but reinforcement of social identity from others can counteract this. Warranting theory describes how information that appears to be outside of the subject's control—for example, a message posted publicly by a friend on someone's profile—can reinforce the trustworthiness of the other profile data to an outside observer [<a href="appendices#ref-warrant">warrant</a>, <a href="appendices#ref-warrant1">warrant1</a>, <a href="appendices#ref-warrant2">warrant2</a>].</p>
<!-- <p>"strive to be honest and honerable" [inreallife]</p> -->
</div>
</section>
<section id="dishonesty-and-deception" rel="schema:hasPart">
<h3>Dishonesty and deception</h3>
<div>
<blockquote><p>"Some argue that distinct contexts are unnecessary and only encourage people to be deceptive. This is the crux of the belief that only those with something to hide need privacy." - [<a href="appendices#ref-boydnp10">boydnp10</a>]</p></blockquote>
<p>Most people like to consider themselves to be quite honest in their communications with friends, family and acquaintances. However, even honest people routinely modulate what they share, omitting and sometimes falsifying information in order to reduce social friction, avoid confrontation, defuse awkward situations, or to save face [<a href="appendices#ref-buller1996interpersonal">buller1996interpersonal</a>, <a href="appendices#ref-burgoon1989maintaining">burgoon1989maintaining</a>]. Hancock et. al. introduced the term <em>butler lies</em> to refer to a common use of simple lies to manage communications, such as smoothly exiting from an unwanted conversation [<a href="appendices#ref-hancock2009butler">hancock2009butler</a>]. Online, the notion of who our 'friends' are has become increasingly blurred and difficult to define. In such settings, people commonly navigate different social spaces, projecting and varying self-presentation according to the ways they want to be perceived by each [<a href="appendices#ref-Marwick2010">marwick2010TweetHonestly</a>]. </p>
<p>Whilst part of tailoring one's presentation to an audience is the ability to carry out some level of <em>deception</em>, with personal communications, there is an implicit expectation of authenticity [<a href="appendices#ref-aoki2005Ambiguity">aoki2005Ambiguity</a>]. However, online, the need to navigate multiple and uncertain audiences means that we may constantly vary our self-presentation. Authenticity becomes a social construct derived from the social context and how we wish to be perceived by a given audience [<a href="appendices#ref-boydfacid">boyd2002faceted</a>]. We may be deceiving, at least to some extent, nearly constantly without even being conscious of it.</p>
<p>Deception has long been studied, both within and outwith the HCI community. Traditionally, deception has been cast in a negative light [<a href="appendices#ref-bok1978lying">bok1978lying</a>], to be used only if no other option is available. In the 1980s, however, communications researchers began to investigate the positive aspects of lying, in particular <em>white lies</em> - socially acceptable lies which cause little or no harm to the recipient [<a href="appendices#ref-camden1984WhiteLies">camden1984WhiteLies</a>]. </p>
<p>In 1992, McCornack cast deception as an understandable response to complexity: "[r]esearchers studying deception recently have begun to argue that deceptiveness is a message property that reflects a kind of functional adaptation to the demands of complex communication situations" [<a href="appendices#ref-mccornack1009InformationManipulation">mccornack1009InformationManipulation</a>]. People then manipulate the information which they share as a necessary part of participation in society. This has led to recent work on the positive aspects of deception in human computer interaction, in particular how butler lies are used to ease social situations [<a href="appendices#ref-hancock2009butler">hancock2009butler</a>], and how systems can deceive their users for beneficial reasons [<a href="appendices#ref-adar2013Benevolent">adar2013Benevolent</a>].</p>
<p>Several different taxonomies of lying and deceptive behaviours have been proposed [<a href="appendices#ref-camden1984WhiteLies">camden1984WhiteLies</a>, <a href="appendices#ref-depaulo1996lying">depaulo1996lying</a>, <a href="appendices#ref-lindskold1983categories">lindskold1983categories</a>]; Anolli et al. examined a family of deceptive miscommunications, including self-deception and white lies [<a href="appendices#ref-anolli2001DeceptiveMiscommunication">anolli2001DeceptiveMiscommunication</a>]. They look at <em>omission</em> of relevant information, <em>concealment</em> using diversionary information, <em>falsifaction</em> and <em>masking</em> with alternative, false information. Of particular interest is their claim that "a deceptive miscommunication theory should be included in a general framework capable of explaining the default communication", that is that deception should not be seen as a psychologically different activity than 'normal' communication. This tallies with the earlier approach of McCornack [<a href="appendices#ref-mccornack1009InformationManipulation">mccornack1009InformationManipulation</a>] who situates deceptive messages within the spectrum of <em>information manipulation</em>. This, combined with the lens of Gricean conversational maxims, allows for an explanation of deceptions where some of the truth is told, but information which the speaker knows is relevant to the listener is omitted or obscured [<a href="appendices#ref-grice1970logic">grice1970logic</a>].</p>
<p>Motivations for lying have also been extensively studied in social psychology. Turner et al.'s taxonomy included <em>saving face</em>; guiding social interaction; avoiding tension or conflict; affecting interpersonal relationships; and achieving interpersonal power [<a href="appendices#ref-turner1975information">turner1975information</a>]. Camden et. al. [<a href="appendices#ref-camden1984WhiteLies">camden1984WhiteLies</a>] develop a detailed categorisation of lies to do with basic needs, managing affiliation with others, self-esteem and miscellaneous practices such as humour and exaggeration. </p>
<p>Many malicious or undesirable behaviours are facilitated by the ability to create and alter identities. <em>Astroturfing</em> [<a href="appendices#ref-cho2011astroturfing">cho2011astroturfing</a>] has become common online [<a href="appendices#ref-zhang2014astroturfing">zhang2014astroturfing</a>], with corporations and governments employing sophisticated identity management software to carry out large scale operations.
Possibly the most famous of this is the <q>50 Cent Party</q>, hired by the government of the People's Republic of China to post favourable comments towards party policy [<a href="appendices#ref-fiftycent">fiftycent</a>].
On a smaller scale, <em>sock-puppets</em> — multiple accounts controlled by a single person — are used to skew ideas of consensus and distort discussion in online societies, leading to attempts to automatically identify such accounts [<a href="appendices#ref-bu2013sock">bu2013sock</a>, <a href="appendices#ref-solorio2013case">solorio2013case</a>].
Personas can be constructed for the purpose of <em>trolling</em>, whether it is overtly offensive in order to cause outrage or more subtle manipulation to trick people into wasting effort or taking caricatured positions, and correlations have been shown between enjoyment of trolling and everyday <em>sadism</em> [<a href="appendices#ref-buckels2014trolls">buckels2014trolls</a>].</p>
<p>Many of these activities are a form of <em>obfuscation</em>, in some way hiding the truth, polluting the data pool and diminishing trust. The ethical issues here are complex and contextual, with the viewpoints of different actors having considerable divergence [<a href="appendices#ref-brunton2011vernacular">brunton2011vernacular</a>]. </p>
<p>Another strand of research borrows from information warfare, to look at the possibilities for disinformation. Disinformation tactics are most useful when a channel of information cannot be completely closed, but can be rendered useless by being filled with incorrect, but plausible, assertions in order to lower its overall signal-to-noise ratio [<a href="appendices#ref-wiki:disinformation">wiki:disinformation</a>]. The intended target of the lie may not be the official recipient of the message: lies can be directed at those who are eavesdropping on the communications channel or surveilling the participants [<a href="appendices#ref-alexander2010Disinformation">alexander2010Disinformation</a>]. Techniques used include <em>redaction</em> to remove parts of the message, <em>airbrushing</em> to blur parts of the message and <em>blending</em> to make the message similar to other plausible messages, as well as other forms of <em>information distortion</em> [<a href="appendices#ref-alexander2010Disinformation">alexander2010Disinformation</a>].</p>
<p>In <a href="chapter3">chapter 3</a> I carry out two studies which aim to bring together these general theories of deceptive behaviour with a closer look at how and why people might engage in them online.</p>
</div>
</section>
</div>
</section>
<section id="networked-publics" rel="schema:hasPart">
<h2>Networked publics</h2>
<div>
<p>Social media technologies blur the boundaries between private and public, and this affects identity performance. Ten years ago, boyd hoped that educators and technologists would succeed in easing the cultural transition for young people into the networked era [<a href="appendices#ref-boyd-sns07">boyd-sns07</a>]. She describes social networking sites as a type of "networked publics", technologically-mediated spaces where people can virtually go to interact with their friends, and where they may be subject to observation or interjection by passers-by. Differently to offline public spaces, online publics may be persistent, scalable, searchable, replicable, and/or have invisible audiences. These features of networked publics affect how people express themselves and interact, however they do not directly dictate participants' behaviour [<a href="appendices#ref-boydnp10">boydnp10</a>]. Networked publics are not only spaces, but collections of people or "imagined community"; different publics can serve different purposes, but can also intersect with each other [<a href="appendices#ref-boyd2014s">boyd2014s</a>].</p><!-- <p>"Networked publics must be understood in terms of “publics,” a contested and messy term with multiple meanings that is used across different disciplines to signal different concepts ... In short, I contend that networked publics are publics that are restructured by networked technologies; they are simultaneously a space and a collection of people ... My approach accepts the messiness and, instead, focuses on the ways in which networked technologies extend and complicate publics in all of their forms ... publics that have been transformed by networked media" [boydnp10]</p> -->
<p>Over subsequent years, boyd and many others proceed to explore the effects of these differences on those who engage with online social media to different degrees. In this section I recount some of these studies and findings.</p>
<p>A benefit of participation in networked publics is that a wider variety of communities are accessible than offline. Niche identities don't have to be set aside to fit in [<a href="appendices#ref-appgen">appgen</a>]. Online interactions are "not simply a dialogue between two interlocutors, but a performance of social connection before a broader audience" [<a href="appendices#ref-boyd2014s">boyd2014s</a>]. boyd looks specifically at teenagers in networked publics, who she says have sought online spaces in recent years as they are not allowed to 'hang out' any more in physical spaces like malls [<a href="appendices#ref-boyd2014s">boyd2014s</a>, <a href="appendices#ref-marwickdrama14">marwickdrama14</a>].</p>
<!-- <p class="notes">cues by social partners affect observers' impressions of the profile owner. Profiels offer interactive and static features and are complicated by input of others. Less control by initiator. </p>
<p>.</p>
<p>"Comments are not simply a dialogue between two interlocutors, but a performance of social connection before a broader audience. " [boydnp10]</p>
<p>[modern American] teens create their own publics. Digital spaces because they're not allowed in physical ones (like malls). Being themselves, to see and be seen. "What makes a particular site more or less public is... how it is situated within the broader social ecosystem." [boyd2014s]</p>
<p>performance in public. 'drama' as a defense mechanism for teens. Saving face, get attention, manipulate perceptions of others. Larger audience than school halls. distinguish from adult-defined practices like bullying, so for autonomy and control. elicit support. [marwickdrama14]</p>
<p>reconceptualise audiences as co-present and participatory. misalignment potential increases with SNS. [baym12]</p>
<p>change from bi to unidirectional connects as norm with Twitter. asymmetrical disclosure. reinforces weak ties, lowers barrier to communication. [ellison13]</p> -->
<p>First I reflect on the digital substitutions for the physical body in online social interactions. Then, in comparing and contrasting 'old school' style blogging with contemporary (circa 2013-2017) social networking sites I look deeper into how differences in technological affordances impact peoples' interactions and self-expression.</p>
<p>Audiences for identity performance as well as the context in which the performance takes place are critical, but online both of these may be unknown or dynamic, or both. I'll introduce work around imagined audience and context collapse, both of which pioneer our understanding of identity behaviours in networked publics. When audiences and contexts are known, we can examine how people connect with others and form communities; in the final section I look at trust, social reinforcement of identity, and studies of what social media participants choose to disclose or conceal.</p>
<!-- <p class="notes">Unfortunately, networked publics appear to reproduce many of the biases that exist in other publics-social inequalities, including social stratification around race, gender, sexuality, and age, are reproduced online (Chen and Wellman, 2005; Hargittai, 2008). Political divisions are also reproduced (Adamic and Glance, 2005)" [boydnp10]</p>
<p class="notes">humans are reduced into packages of information... digital is separate from true humanness [digitalvertigo]</p> -->
<section id="profiles-embodiment" rel="schema:hasPart">
<h3>Profiles and embodiment</h3>
<div>
<p>In Faceted Id/entity [<a href="appendices#ref-boydfacid">boydfacid</a>], boyd highlights several differences between self-representation offline compared to online. Embodiment is a key factor in self-presentation and she claims that there is considerable difference between performing one's identity through appearance, eg. fashion and body language, when walking into a room, compared to explicitly describing oneself by entering attributes and other personal information into an online form to create a profile. The disembodied nature of online interactions means that people must find new ways to express themselves, and manage the impressions other people have of them, or "a new type of body" [<a href="appendices#ref-youth">youth</a>]. A lack of control over one's online self presentation is compounded by the inability to visualise - or perhaps even be aware of - the data that is collected by the systems we use. Online activities are logged over time to an extent that most individuals are not aware of; these activities, an individual's <em>expressions given off</em> (Goffman), are used, largely unknowingly, for the commercial benefits of third parties; this constitutes a kind of implicit or unconscious profile. boyd suggests that visualising all of one's personal information that is available online, as well as visualising one's 'audience' or social network connections, would provide an individual with better awareness of, and so better control over, their online image. In boyd's prototype interfaces, users are explicitly asked for personal data in order to build a profile of themselves, and boyd does point out the problematic nature of this, compared with the unconscious or implicit identity performance one conducts in offline social settings.</p>
<p>Counts in [<a href="appendices#ref-counts09">counts09</a>] explores the impact of profile attribute selection on self presentation, and finds that upon completing the values for 10 attributes, participants converge on their "ideal" representation of themselves. This study also finds that free-form attributes are better than ones with preset choices for participants' satisfaction with how they have portrayed themselves. This study does not take into account that most online profiles are created in a particular context, with a particular purpose in mind. Asking participants to express their ideal self-presentation 'in general' vastly oversimplifies reality. Participants are not told who the consumers of the profile they are creating are expected to be, or how it is to be presented; nor are participants given an opportunity to indicate who their expected audience is or what they think the profile is for.</p>
<p>Since boyd's prototypes were designed, social media gained widespread popularity. Most, if not all, mainstream systems request input of explicit personal data to build an initial profile, despite the discord of this activity compared with offline identity expression. However, unlike in boyd's prototypes, it doesn't stop there. Such systems encourage ongoing engagement through adding and messaging contacts with various degrees of publicness, creating status updates to broadcast a current situation, production of creative media content, and feedback on content and updates created by others. As we will see in <a href="chapter3">chapter 3</a>, contemporary social media builds one's profile from various combinations of these online activities, and typically use far more than the explicit data entered by the user to generate a representation of a person. This increases the likelihood that individuals may not have an accurate impression of what this representation looks like to others.</p>
<!-- <p class="todo">Expression through avatars, design, visuals - pull from blogging and sns studies</p> -->
<p>Recent studies confirm that visuals are a key part of expressing identity online. Many focus on selfies as a modern substitute for the body [<a href="appendices#ref-vanhouse11">vanhouse11</a>, <a href="appendices#ref-lasen15">lasen15</a>, <a href="appendices#ref-senft15">senft15</a>, <a href="appendices#ref-frosch15">frosch15</a>], but [<a href="appendices#ref-bunnies17">bunnies17</a>] examines self-presentation through other kinds of photos. Examples include humorous images from popular culture or photographs of other things with an overlayed caption, coupled with a tag (eg. #currentstate) that indicates the poster relates to this concept; as well as photos of items that people carry with them day to day. In [<a href="appendices#ref-papatwit12">papatwit12</a>], self-expression is performed through use of Twitter hashtags, and [<a href="appendices#ref-food15">food15</a>] suggests that food photography is a means of self-presentation.</p>
<blockquote><p>Pointing at something and saying that one has chosen it as self-representative makes the assemblage of tags, text, and image a culturally intelligible self-representation [<a href="appendices#ref-bunnies17">bunnies17</a>].</p></blockquote>
<p>A lack of embodiment can also have a distinct advantage. In [<a href="appendices#ref-stendal12">stendal12</a>] several studies of people with disabilities who use online social systems are reviewed, and reveal findings about increased control over disclosure of disability (which may not be possible offline) and reduced isolation when people are able to interact online.</p>
<!-- <p>Beyond simply visualising all of one's personal information, and the connections between social network contacts to show how personal data may flow through a network, boyd suggests that these visualisations can be used to actively segregate one's contacts along parameters which correspond to one's personal information, permitting an individual to perform identity more appropriately in digital spaces. However in practice, designing user interfaces for this proves to be challenging. For one, people aren't used to explicitly thinking about audience and context, so dividing their contacts up this way is not natural.</p> -->
<!-- <p>Transparency of the collection of any of this data, and control over how it is distributed are key to boyd's thesis of how to empower individuals online. Sadly, the situation here has not improved in the intervening years. Indeed, private corporations are collecting more and more personal data through free social networking sites, and granting the subjects zero rights with regard to access or distribution. <a href="#everybody-knows-im-a-dog">Later in this chapter</a> we elaborate on how privacy concerns impact online disclosure and profile creation behaviours; in <a href="chapter3#social-media-makers">chapter 3</a> we build on the existing literature with an empirical study of a community of hackers intent on decentralised and personally-owned data storage as a means to greater control.</p> -->
<p>Next we look more closely at the behaviour of users of Social Network Sites, of which "profiles" are a key feature [<a href="appendices#ref-boydsns07">boydsns07</a>].</p>
</div>
</section>
<section id="sns" rel="schema:hasPart">
<h3>Social Network Sites</h3>
<div>
<p>In 2007 boyd and Ellison defined Social Network Sites (SNS) to be Web-based, bounded, public or semi-public, and afford creating and viewing connections with or between other users [<a href="appendices#ref-boydsns07">boydsns07</a>]. They note that users of these systems tend to connect with others with whom they already have a 'real life' social relationship, and present a fairly thorough history of SNS from 1997 onwards, which I won't recount here. This definition is pertinent to this thesis due to its emphasis on profiles, implying self-presentation, as a core feature of SNS. In 2013 they updated their definition to incorporate different types of content and data into profiles; to de-emphasise the traversal of connections (as this became more important to machines than humans); and to emphasise participants' interaction with streams of user-generated content [<a href="appendices#ref-ellison13">ellison13</a>]. I will proceed to focus on case studies and experiments which were carried out since these definitions, and due to the rapid pace of change in this area, prioritise those from the last four years. <!-- I will revisit boyd's criteria for SNS at the end of this section. --></p>
<!-- <p class="notes">SNS have: profiles, friends lists, public communication, stream-based updates." [boydnp10]</p> -->
<p>Many studies of identity formation on social media focus on young people and teenagers. One reason is because this is a crucial point in life for understanding oneself and asserting a personal identity. Other studies approach teenagers as somewhat alien "digital natives", born into a world of social technology which is expected to fundamentally change how they interact with the world compared with older generations, who don't or can't distinguish between online and offline [<a href="appendices#ref-borndigi">borndigi</a>]. I will relate the results of these studies, but note that I disagree with the notion of a "digital native" because being born in a particular year or even raised around modern technology does not automatically give one a natural instinct for identity expression in digital spaces, and not even necessarily more opportunity to experiment and reflect than older SNS users [<a href="appendices#ref-boyd2014s">boyd2014s</a>].</p>
<p>Digital communication technologies can help or hinder identity formation. <em>The App Generation</em> [<a href="appendices#ref-appgen">appgen</a>] provides a balanced argument between the pros and cons of teenagers socialising through mobile applications. They find that some applications provide a "prepackaged identity" for users to adopt rather than encouraging experimentation. The affordances of applications shape the forms of expression that are available, and so identity formation is in a way controlled by the application designer. <em>Born Digital</em> [<a href="appendices#ref-borndigi">borndigi</a>] suggests that teenagers experiment with identity online, but aren't fully aware, or don't care about, the traces that are left behind when they do so.</p>
<p>In some cases, for example fan communities, self-presentation shifts between a more playful fictional identity performance, and an identity which is closer to 'real life' [<a href="appendices#ref-baker09">baker09</a>]. In others, such as professional self-presentation, individuals lean on automatically generated metrics by the system they use to convey a positive image, with gamification or commodification of the self becoming commonplace [<a href="appendices#ref-academicqs16">academicqs16</a>]. When SNS provide a platform for professionalising passions such as content creation, [<a href="appendices#ref-duffy15">duffy15</a>] notes that participants may be even more vulnerable to the consequences of performing and maintaining one's self-presentation in an exposed online space, as well as the "labour of visibility" that goes into it.</p>
<p>Most people occupy multiple roles offline, find ways to establish and maintain boundaries between them, and continue to do so to different degrees when taking representations of these roles to online spaces. SNS increase the permeability of boundaries, but users employ various tactics to manage their identity when a one-identity-per-person model is imposed on them [<a href="appendices#ref-quinn15">quinn15</a>].</p>
<p>[<a href="appendices#ref-singh15">singh15</a>] describes how Twitter users subvert features of the system to express themselves in new ways, as well as reflecting on how changes to the functionality of they system affect how people use it. This supports [<a href="appendices#ref-papatwit12">papatwit12</a>] which, through content analysis of trending hashtags, also describes how people work around technical constraints of Twitter to meet their self-presentation needs.</p>
<p>Even in the early days of SNS (specifically Facebook) beginning to rise to popularity when use was overflowing into the workplace, the access control settings offered by Facebook were considered too complicated to enable most people to realistically manage connections with both professional and personal contacts from a single profile, despite the potential advantages of connecting with colleagues through the platform [<a href="appendices#ref-DiMicco07">DiMicco07</a>]. More recently, we see that SNS users manage tensions between their multiple roles and the affordances of systems by segregating their audience across multiple platforms. The interview study in [<a href="appendices#ref-Zhao16">Zhao16</a>] found that sharing decisions across multiple sites are made primarily based on the known audiences of the different sites, and the content being shared. This study also recounts previous work on motivations for using different SNS, including to connect with old friends, and share pictures, which feed into decisions taking regarding content sharing. A similar study found that family was a crucial audience to whom more private sharing was desired [<a href="appendices#ref-Farnham11">Farnham11</a>], and findings in [<a href="appendices#ref-Vitak14">Vitak14</a>] indicate that Facebook users desire to re-asssert their offline boundaries when online, and concurs that managing this through the tools that Facebook provides is cost-intensive. Facebook itself compounds this issue by using identity information as a "social lubricant" which encourages people to make new connections [<a href="appendices#ref-ellison11fb">ellison11fb</a>].</p>
<p></p>
<!-- <p>In Alone Together, she says people are reduced to profiles</p> -->
<!-- <p class="todo">is definition from [ellison13] still good?</p>
<p class="notes">A social network site is a networked communication platform in which participants 1) have uniquely identifiable profiles that consist of user-supplied content, content provided by other users, and/or system-provided data; 2) can publicly articulate connections that can be viewed and traversed by others; and 3) can consume, produce, and/or interact with streams of user-generated content provided by their connections on the site.</p> -->
</div>
</section>
<section id="bloggers" rel="schema:hasPart">
<h3>Blogging and personal homepages</h3>
<div>
<p>Personal homepages and blogs have been around for considerably longer than SNS, though remain a comparatively specialist practice. It is widely accepted that blog or website owners have more control over their online space than do users of SNS, [<a href="appendices#ref-intlblog">intlblog</a>, <a href="appendices#ref-markus06">markus06</a>], including freedom to innovate with the site's appearance and thus explore more individualistic aspects of the online self [<a href="appendices#ref-alist05">alist05</a>]. Relatedly, communities of bloggers are not owned or controlled by a single entity [<a href="appendices#ref-dennen09">dennen09</a>].</p>
<p>Through observations of over 200 blogs within a particular community and semi-structured interviews with 40 bloggers, [<a href="appendices#ref-dennen09">dennen09</a>] identifies five aspects which affect how bloggers build their identity: name and blog title; descriptive attributes; post content; voice; affiliations; and visual design. All of these are subject to change over time, and sometimes major offline transitions can cause a shift to a new pseudonym or blog altogether; often the audience is invited along however. Blogs are often designed to reinforce community norms, to enhance a sense of belonging; as a result, the community develops and evolves its own identity, which in turn influences how newcomers choose to present themselves. Bloggers' contributions are fragmented across different domains, and where their writing style and topics constitute a part of their identity, so it fragments their identity.</p>
<p>Blogging communities are traditionally more accepting of pseudonyms but [<a href="appendices#ref-dennen09">dennen09</a>] notes that distrust is not of other community members, but rather of personally-known community outsiders who may accidentally stumble across blog entries.</p>
<!-- <p>"homepages became an important site of identification, as early web users posted biographies, photos, and entertaining links for viewers who surfed to their page (Döring, 2002) [ellison13]"</p> -->
<p>Earlier in this chapter I mentioned Brunswik's lens model which describes a way in which identity can be constituted through physical traces left behind. This model has also been used to understand how observers make personality judgments about people based on the traces left in their <em>digital space</em>, ie. personal homepages [<a href="appendices#ref-gosling08">gosling08</a>, <a href="appendices#ref-markus06">markus06</a>, <a href="appendices#ref-vazire04">vazire04</a>, <a href="appendices#ref-papacharissi02">papacharissi02</a>].</p>
<p>The importance of themes and designs of blogs and homepages is emphasised by [<a href="appendices#ref-dennen09">dennen09</a>], who mentions that whilst some blog consumers use a feed reader to receive new content from the blogs they are interested in, they often click through to the original post to view it in the context of the author's own space.</p>
<p>On the other hand, [<a href="appendices#ref-blogdesign">blogdesign</a>] takes a snapshot of a random sample of blogs in 2003 and maps the state of the blogosphere through analysing visual elements in depth and tracking commonalities. The conclusion is that significant customisation of blog templates was in fact relatively rare, with most people only slightly tweaking colours or adding custom images. A likely explanation for this is that bloggers lacked the technical expertise to do so.</p>
<p>Studies of blogging communities outside of the US demonstrate that blogging is not a uniform practice that can be understood as a whole [<a href="appendices#ref-intlblog">intlblog</a>]. Certain communities (in this case, Muslim ones) which are seen by outsiders as homogeneous use blogging to highlight their uniqueness and individuality. Others (for example in China) emphasise their ethnicity and culture as a key part of their identity. Blogs from the Paris Banlieues in fact had a direct impact on how the mainstream media portrayed their plight; an example of how personal identity expression in networked publics was able to affect a broader social understanding of that identity. The overriding message from these studies is cultural taboos and offline societal context affect narrative about identity, and this is reflected online.</p>
<!-- <p>[papa04blog] is a content analysis of blogs, and suggests that self expression through blogging is spontaneous</p> -->
</div>
</section>
<section id="imagined-audience" rel="schema:hasPart" style="page-break-before: always">
<h3>Imagined audience</h3>
<div>
<p>The audience to whom one performs is critical in forming the context in which one is performing [<a href="appendices#ref-boydnp10">boydnp10</a>]. On SNS, people are often expressing themselves to multiple audiences simultaneously. When people are aware of this, they take different strategies when it comes to navigating what they share; individuals with many followers on Twitter practiced self-censorship (only posting things they are happy for the worst-case audience to read) and practicing coded communication (strategically targeting some posts at some audience members, and others at others, to maintain overall interest) [<a href="appendices#ref-Marwick2010">Marwick2010</a>].</p>
<p>However, given the many possible ways in which Tweets can be discovered and consumed ([<a href="appendices#ref-Marwick2010">Marwick2010</a>] questioned people who post publicly) it is virtually impossible to determine the actual audience for one's content. Thus, people imagine who their audience is likely to be, and express themselves accordingly. Obviously these imaginings, which may stem from understanding of the affordances of a particular platform, or a particular community or topic of discussion, impact how people express themselves online.</p>
<p>[<a href="appendices#ref-litt12">litt12</a>] theorises about how the imagined audience is synthesised, and draws in Giddens' structurational framework, noting a combination of macro- (social roles, technical affordances) and micro-level (individual motivations, technical skills) factors. [<a href="appendices#ref-litt12">litt12</a>] ultimately concludes that asking people about their imagined audience is prone to errors or misinterpretations, as imagined audience is a concept which is both difficult to measure and difficult to express.</p>
<p>Relatedly, as people perform in networked publics, they must contend with a "networked audience," who are not connected only with the performer, but also with each other [<a href="appendices#ref-Marwick2010">Marwick2010</a>].</p>
</div>
</section>
<section id="context-collapse" rel="schema:hasPart">
<h3>Context collapse</h3>
<div>
<p>I have so far discussed how people attempt to map boundaries from their offline lives into their online interaction spaces, and the notion of imagined audience. Context collapse occurs when boundaries come down and personas intended for different audiences are merged [<a href="appendices#ref-Marwick2010">Marwick2010</a>]. The consequences of this may range from slight social awkwardness, to direct breaches of privacy and potential danger, and have been examined in a variety of different circumstances, such as [<a href="appendices#ref-daviscontext">daviscontext</a>, <a href="appendices#ref-contextwesch">contextwesch</a>, <a href="appendices#ref-duguay14">duguay14</a>, <a href="appendices#ref-duguay13">duguay13</a>].</p>
<p>Thanks to the properties of networked publics such as searchability and persistence, contexts may also collapse when information is consumed later, or through a different systems, whereby it may be interpreted differently by the consumer than how it was originally intended [<a href="appendices#ref-boydnp10">boydnp10</a>].</p>
<p>As we look forward to how SNS and online self-presentation in general will evolve, we must consider how the lines people have drawn around their contexts are tethered to particular (versions of) systems. What happens when these systems change, merge, or disappear? As designers of new systems, we must be cognisant of the role technical affordances play in creating, enabling, and destroying social boundaries.</p>
</div>
</section>
</div>
</section>
<section id="everybody-knows-im-a-dog" rel="schema:hasPart">
<h2>Everybody knows I’m a dog</h2>
<div>
<blockquote><p>"While once viewed as a set of technologies built in resistance to the ugliness of the dot-com era, social media is now intertwined with neoliberal capitalism and data surveillance" - [<a href="appendices#ref-boyd15">boyd15</a>]</p></blockquote>
<p>We are rapidly moving into a world where information about nearly every aspect of our lives is becoming sensed, recorded, captured and made available in digital form. Data is captured and shared voluntarily, as tools invite ever more intimate participatory surveillance [<a href="appendices#ref-albrechtslund2008Participatory">albrechtslund2008Participatory</a>]. While the abundance of information traces has unlocked a wide range of new kinds of applications (eg. [<a href="appendices#ref-Akker:2014:TRP:2684563.2684638">Akker:2014:TRP:2684563.2684638</a>, <a href="appendices#ref-Consolvo:2008:ASW:1357054.1357335">Consolvo:2008:ASW:1357054.1357335</a>]), the creation and potential for disclosure poses new threats to individual privacy and autonomy. The overall lack of transparency by manufacturers regarding how they are capturing and handling personal information has created a heightened sense of unease among many, in addition to the potential threats dealing with their unintentional disclosure or misuse [<a href="appendices#ref-fife2012privacy">fife2012privacy</a>, <a href="appendices#ref-metzger2004privacy">metzger2004privacy</a>, <a href="appendices#ref-featherman2010reducing">featherman2010reducing</a>].</p>
<p>Various data and surveillance scandals involving private companies and governments [<a href="appendices#ref-dcent">dcent</a>, <a href="appendices#ref-crit12">crit12</a>] that gained media attention mean that awareness of surveillance and personal data collection is growing amongst the general public. There are many studies examining peoples' awareness of and attitudes towards privacy and surveillance on SNS, but I will not detail them here. During studies in the 1990s, Westin defined three categories to describe how ordinary people feel about privacy: "pragmatists", "fundamentalists" and "unconcerned." Privacy pragmatists accept that there may be tradeoffs between benefits to information sharing and the intrusiveness of requests for information. Fundamentalists distrust organisations which request personal data. The unconcerned are comfortable with sharing personal data with organisations in exchange for services [<a href="appendices#ref-krane2002privacy">krane2002privacy</a>]. Westin found, prior to the Web becoming mainstream, that approximately half of the general public are pragmatists; just over half of the remainder are fundamentalists, and a minority are unconcerned. Suffice it to say that people <em>do</em> care about privacy, and are just finding new ways to manage it [<a href="appendices#ref-boydnp10">boydnp10</a>], contrary to what certain tech executives might claim [<a href="appendices#ref-zuckpriv">zuckpriv</a>, <a href="appendices#ref-googpriv">googpriv</a>]. My main concern in terms of this thesis is how privacy infringement might impact presentation of self. We have already seen that online identity performance may alter a general understanding of oneself, which reflects in the offline world. So I must ask: when people self-censor online due to privacy concerns, how does this stifle self-expression, and in turn impact internal identity construction?</p>
<p>Furthermore, implications of our online sharing decisions affect more than just ourselves; "interpreted selves" are created by recognising patterns across millions of people [<a href="appendices#ref-boydpriv12">boydpriv12</a>].<!-- "we are the product of the people we know and the socio-cultural environment in which we are situated". privacy through information control will fail - non-experts, leaks, informed decisions not possible. Privacy in context - NISSENBAUM. social stegonography between teens. "don't stop algorithmic [mis]interpretation of their interactions. Freedom to share without affecting how others lives are interpeted." [boydpriv12] --></p>
<p>There is often an asymmetry about the collection and use of data. To take a relatively prosaic example, Facebook introduced 'read receipts' on messaging, which indicate when a user has seen a message. This feature has been shown to cause anxiety when present in email systems, as users seek to maintain their <em>responsiveness image</em>, the impression which they project to others about how they respond to input and partition their attention [<a href="appendices#ref-tyler2003can">tyler2003can</a>]. Once ambiguity about attention has been removed, a whole class of white lies - 'The internet was bad, I couldn't check my messages' - are no longer possible, and people develop alternative strategies, such as not opening messages until they feel prepared to respond. The key difference in the context of SNS is that the user does not have the same degree of control over the channel - email receipts can be switched off, but SNS offer different levels of control.</p>
<p>The social aspects of privacy relate to what DeCew terms <em>expressive</em> privacy - a freedom from peer pressure and an ability to express one's own identity [<a href="appendices#ref-decew1997pursuit">decew1997pursuit</a>]. Nissenbaum's contextual integrity [<a href="appendices#ref-nissenbaum2004privacy">nissenbaum2004privacy</a>, <a href="appendices#ref-nissenbaum2009privacy">nissenbaum2009privacy</a>] seeks to understand "appropriate sharing", looking at the ways in which flows of information are governed by norms, which may be easily violated as technological systems repurpose and share data.</p>
<!-- <p>"I argue that privacy is simply in a state of transition as people try to make sense of how to negotiate the structural transformations resulting from networked media. ... just because people are adopting tools that radically reshape their relationship to privacy does not mean they are interested in giving up their privacy. " [boydnp10]</p> -->
<!-- <div class="notes">
<p><strong>From licloud paper background:</strong></p>
<h3>Deception in the age of pervasive surveillance</h3>
<p>We are rapidly moving into a world where information about nearly every aspect of our lives is becoming sensed, recorded, captured and made available in digital form. Increasingly, every app on our smartphones, wirelessly connected devices in our homes, and on-body worn sensing devices are capturing what we do in unprecedented detail. Dodge and Kitchin \cite{dodge2005codes} introduced the term \emph{capta} to cover the data about us which are selected and captured as we go about our lives. In addition, vast amounts of data are captured and shared voluntarily, as tools invite ever more intimate \emph{participatory surveillance} \cite{albrechtslund2008Participatory}. While the abundance of information traces has unlocked a wide range of new kinds of applications~(eg. \cite{Akker:2014:TRP:2684563.2684638} \cite{Consolvo:2008:ASW:1357054.1357335}), the creation and potential for disclosure poses new threats to individual privacy and autonomy. The overall lack of transparency by manufacturers regarding how they are capturing and handling personal information has created a heightened sense of unease among many, in addition to the potential threats dealing with their unintentional disclosure or misuse\cite{fife2012privacy, metzger2004privacy, featherman2010reducing}. </p>
<p>There is often an asysmmetry about the collection and use of data. To take a relatively prosaic example, Facebook introduced `read receipts' on messaging, which indicate when a user has seen a message. This feature has been shown to cause anxiety when present in email systems, as users seek to maintain their \emph{responsiveness image}, the impression which they project to others about how they respond to input and partition their attention~\cite{tyler2003can}. Once ambiguity about attention has been removed, a whole class of white lies---`The internet was bad, I couldn't check my messages'---are no longer possible, and people develop alternative strategies, such as not opening messages until they feel prepared to respond.</p>
<p>The key difference in the context of social networks is that the user does not have the same degree of control over the channel---email receipts can be switched off, while social networks offer different levels of control. In response, a spectrum of tools and practises have emerged to re-introduce attentional privacy in messaging systems (see Section \ref{sec:existing-tools}).</p>
<p>Beyond sensing and storing this information, these apps and devices often disclose it, such as to the app or product's manufacturer's cloud data services, or to third-party companies and services for marketing and other purposes. </p>
<p>For those wanting to not be tracked, the two primary options available: try to suppress the amount of information being shared, or discontinue their use altogether. In practice, however, neither option is feasible or effective; first, the ever-increasing and varied ways people are now being tracked means that people are hardly aware of how they are being tracked to begin with. For example, most end-users have little awareness of the information being captured about them by their smartphone apps~\cite{mylonas2013delegate, wetherall2011privacy}. Second, many of the tools that track people are so vital to their everyday work or social activities that discontinuing their use is simply not practical~\cite{} . Finally, suppressing or falsifying information given to services only works insofar as that information is both manually supplied and inessential to delivering the provided services. Since people's greatest concerns surround information automatically sensed and captured, such as a person's physical location or activities, suppression may simply be impossible. With the promise of further Internet-connected `smart' sensors becoming increasingly invisible, the problem of even knowing where embedded in the environment these devices are may simply become impossible.</p>
<p>In contrast, a different strategy to suppressing information is the use of \emph{disinformation}, in which false information is strategically added to an information channel to discredit and draw attention away from true information that could not be suppressed~\cite{}. Such strategies have been used heavily in wartime by various counterintelligence agencies in order to reduce the damage of leaked sensitive information~\cite{alexander2010Disinformation} \ToCite{CVDazzle? Similar stuff?}. While such measures may seem extreme, they are, the concept of disinformation is quite simple. In this paper, we hypothesise that that, when applied selectively and appropriately in contexts, the use of disinformation, like other forms of deception, can be made to benefit end-users, system designers, and even those who are disinformation targets. </p>
<p>We are rapidly moving into a world where information about nearly every aspect of our lives is becoming sensed, recorded, captured and made available in digital form. Data is captured and shared voluntarily, as tools invite ever more intimate participatory surveillance \cite{albrechtslund2008Participatory}. While the abundance of information traces has unlocked a wide range of new kinds of applications~(eg. \cite{Akker:2014:TRP:2684563.2684638} \cite{Consolvo:2008:ASW:1357054.1357335}), the creation and potential for disclosure poses new threats to individual privacy and autonomy. The overall lack of transparency by manufacturers regarding how they are capturing and handling personal information has created a heightened sense of unease among many, in addition to the potential threats dealing with their unintentional disclosure or misuse~\cite{fife2012privacy, metzger2004privacy, featherman2010reducing}.</p>
<p>Many tools have been dedicated to helping people carry out various kinds of digital deception for the purpose of protecting their privacy. Without aspirations of comprehensiveness, we mention some here. Tools for masking identity are currently available for all levels of the software stack, from tools like \emph{tor} for masking the origin and destination at the network level~\cite{dingledine2004tor}, to privacy-enhancing features at the browser level. Such browser features include \emph{Do Not Track}~\cite{tene2012track}, user-agent spoofing, and tracker and cookie-blocking capabilities~\cite{eckersley2010unique}. At the application level, anonymous e-mail re-mailers~\cite{gulcu1996mixing}, anonymous e-Cash and cryptocurrencies~\cite{casale2015cryptocurrencies}, and anonymous secure file sharing systems~\cite{scarlata2001responder} have started to support certain activities offering guarantees of privacy under specified conditions.</p>
</div> -->
</div>
</section>
<section id="commoditised-self" rel="schema:hasPart">
<h2>The commoditised self</h2>
<div>
<p>Social systems which involve content creation (like YouTube) or knowledge generation (like Wikipedia) are commonly seen as cooperative communities, whose participants generate value both for each other and also for the organisation behind the system. In [<a href="appendices#ref-vand09">vand09</a>], van Dijck et. al. contest several uncritical manifestos for the business and communal interests of revolutionary Web 2.0 peer-production. They point out that seemingly open co-creation platforms are still profit-driven commercial entities. These entities do not provide tools out of benevolence, but in order to harvest metadata about their users, which they can process and resell. The balance of power between individuals and corporations is not swinging back towards the individual, as proponents of user-generated content sites claim, but the illusion is created that it is.</p>
<p>Users of systems often have little understanding of how their activities are being exploited - or nudged [<a href="appendices#ref-vand09b">vand09b</a>]. Even as users are empowered by technology to create media, products, or services they desire, [<a href="appendices#ref-vand09b">vand09b</a>] calls into question their <em>agency</em> when participants are being used and manipulated by commercial entities under the guise of community formation or participatory culture. [<a href="appendices#ref-dbeer08">dbeer08</a>] describes SNS profiles as "commodities, both produced and consumed." In more recent years, awareness of this fact has spread. A popular refrain from advocates of less commercial alternatives is that "if you're not paying for it, you're the product."<sup><a href="#fn-product1">1</a>, <a href="#fn-product2">2</a>, <a href="#fn-product3">3</a></sup></p>
<p>In a similar vein to the previous section, we must also wonder about the impact of external commercial and economic forces which shape the tools and systems people are using to express themselves online. As a contrast, in the second half of this thesis, I focus on decentralised systems, which are potentially much less likely to exploit user metadata for profit.</p>
<!-- Maybe this is also a good place to cite people who sold their personal data on auction etc -->
</div>
</section>
<section id="the-ghost-in-the-social-machine" rel="schema:hasPart">
<h2>The ghost in the (social) machine</h2>
<div>
<p>Social Machines are systems for which the human and computational aspects are equally critical. In most cases, humans do the creative work whilst machines do the administrative tasks [<a href="appendices#ref-Timbl1999">Timbl1999</a>]. Up to now, systems have not been designed <em>to be</em> Social Machines; rather, the concept and definition of a Social Machine is derived from observations of existing (usually Web-based) systems. Many are products of the contemporary social web, on many different scales and in many different domains, often evolving, responding to technological and social developments, and interacting with each other [<a href="appendices#ref-Hendler2010">Hendler2010</a>, <a href="appendices#ref-ByrneEvans2013">ByrneEvans2013</a>, <a href="appendices#ref-DeRoure2013">DeRoure2013</a>, <a href="appendices#ref-Strohmaier2013">Strohmaier2013</a>]. Social Machines can be identified within and across social media networks, within and across online communities, and within and across technological spaces.</p>
<p>Social Machines are pertinent to our work here as they provide a lens through which we can examine sociotechnical phenomena which emphasises the interdependence between humans and technology. In studies of social networks discussed previously in this chapter, humans are considered as <em>users</em> of systems, and discussions focus around how people react to technology, how people behave in the context of particular technical or social constraints, or how people's lives are changed in response to their interactions with and through digital environments. It is important to also reflect upon the ways in which technology evolves or is reconceptualised as a result of passive (mis)use and active (mis)appropriation by humans. We similarly must recognise technical systems in the wider context of society, and include in our dialogue the developers who design and build technical systems, the organisations and legal entities which finance and drive them, and the cultural and economic climate in which they are situated.</p>
<p>Social Machines which have been studied so far have been described and categorised in terms of purpose [<a href="appendices#ref-DeRoure2013">DeRoure2013</a>], motivations and incentives, technology used, goals and processes, quality assessment of outputs, and user participation and interaction [<a href="appendices#ref-Smart2014">Smart2014</a>]. The emphasis in this work is on discussing Social Machines in collective terms; that is, 'a' Social Machine - wherever its boundaries happen to have been drawn (so far these boundaries are typically drawn around the edge of a "service" [<a href="appendices#ref-Smart2014">Smart2014</a>]) - is considered as a coherent whole. The circumstances of the individual human participants not been given extensive consideration. For any given Social Machine, individual participants are diverse and participate in different ways, with varying goals, motivations and outcomes. As we have seen through studies of social media mentioned previously, they manipulate their online presence(s) so that they may behave in different ways according to different contexts, or may work together to construct a single image controlled by multiple people [<a href="appendices#ref-Dalton2013">Dalton2013</a>]. Such behaviour impacts our understanding of roles, autonomy and awareness, incentives and attribution, and accountability and trustworthiness of participants. Overlooking unique individual perspectives when observing a Social Machine as a whole can cause incorrect assumptions, for example: believing that participants who lie about who they are have negative intentions in a Social Machine whose overall "purpose" is to strengthen social ties. We must also bear this in mind when designing systems, so that a system may grow in response to unexpected actions of participants rather than hampering their explorations.</p>
<p>I argue that due to the complex nature of online identity, understanding nuanced individual behaviours of participants in a more granular way is crucial for Social Machine observation. I advance this argument in the next chapter through an empirical study of a Social Machine centered around creative media production.</p>
</div>
</section>
<section id="conclusions" rel="schema:hasPart">
<h2>Conclusions</h2>
<div>
<p>Present day social media has dramatically increased participation in publishing and sharing online content. Easy-to-use services lower the barrier to entry for connecting with and pushing thoughts out to an audience. Identities expressed through social media are inherently collaborative; every interaction is pushed to a network, and part of a dynamic cycle of consumption and creation feedback. Commenting on someone else's post automatically links the post to your own profile, and often it appears there as well, accessible from two different contexts. Yet SNS permit little customisation, providing preset options for content or reaction templates, and consistent inflexible designs for profile pages. This tips the balance away from the individual aspect of identity construction performed by bloggers in the earlier years of the Web. Yet blogs and personal homepages are left wanting for a dynamically constructed and low barrier to entry network, which impedes the collaborative aspects of identity construction.</p>
<p>People manage shortcomings with the affordances of both blogging platforms and SNS in different ways—contending with invisible audiences and collapsed contexts, as well as reduced expectations of privacy—through carefully crafted personas, strategically omitting or amending the information they post online, or simply using different platforms for different purposes. We see that there are a multitude of factors which affect people's presentation of self online, which vary according to broader cultural or technological contexts, as well as personal motivations and abilities.</p>
<p>Along with their updated definition of SNS mentioned earlier, [<a href="appendices#ref-ellison13">ellison13</a>] calls for social media scholars who are studying individuals or communities online to systematically describe the technology in which their participants are situated, and the practices of the users. Technologies are changing rapidly still, so studies which are a snapshot in time can be linked to a broader discourse or overview, and remain relevant as time progresses, if they situate themselves appropriately. One way of accessing this bigger picture is through an organising framework that helps to record the background state of the environment being studied, and so surfaces connections between work that is otherwise perhaps not directly comparable [<a href="appendices#ref-vand09b">vand09b</a>]. In <a href="chapter3">chapter 3</a> I use several studies of my own on diverse identity behaviours across various social network sites in order to propose such a framework.</p>
</div>
</section>
<aside class="note" style="page-break-before: always;">
<p id="fn-product1"><sup>1</sup> <a href="http://www.information-age.com/facebook-is-deliberately-killing-privacy-says-schneier-1290603/">Facebook is “deliberately killing privacy”, says Schneier (Information Age)</a></p>
<p id="fn-product2"><sup>2</sup> <a href="https://lifehacker.com/5697167/if-youre-not-paying-for-it-youre-the-product">If You're Not Paying for It; You're the Product (LifeHacker)</a></p>
<p id="fn-product3"><sup>3</sup> <a href="https://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/#1a01a99a5d6e">If You're Not Paying For It, You Become The Product (Forbes)</a></p>
</aside>
</div>
</article>
</main>
<script>
get_refs();
</script>
</body>
</html>