Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions chapter2.html
Original file line number Diff line number Diff line change
Expand Up @@ -46,9 +46,9 @@ <h2>Introduction</h2>

<p><a href="#networked-publics">Section 4</a> examines social media and blog use, including how one's <em>imagined audience</em> affects self-presentation in public, and how <em>context collapse</em> might occur when the actual audience is different to expected. There are several examples of techniques for managing who sees which 'version' of oneself, and the types of 'versions' of self that are commonly seen to be constructed on social media, and with what degree of transparency they are linked together. Most of the longitudinal studies in this space are of teenagers and young people, who have never known a world without social media, and who may incorporate it naturally and seamlessly into their daily practices, thus making it a core part of their identity during formative years. I draw a contrast between the relationship-driven architecture of contemporary social networking sites, and the more personal, customisable blogging platforms which preceded them. Studies of bloggers and blogging communities reveal some different priorities and habits than what is common practice today, and offer insight into how online self-presentation is evolving.</p>

<p>Throughout literature from both social and computer sciences, privacy is a common concern. In <a href="everybody-knows-im-a-dog">section 5</a> we look further at how tensions between users and the privacy settings of systems they use impact on personal information disclosure. Does self-censorship affect identity formation? How do people weigh up the risks and benefits of exposing themselves online? This is particularly pertinent for future systems development, as more and more people become aware of state surveillance, for-profit data collection, and their diminished rights over their personal data.</p>
<p>Throughout literature from both social and computer sciences, privacy is a common concern. In <a href="#everybody-knows-im-a-dog">section 5</a> we look further at how tensions between users and the privacy settings of systems they use impact on personal information disclosure. Does self-censorship affect identity formation? How do people weigh up the risks and benefits of exposing themselves online? This is particularly pertinent for future systems development, as more and more people become aware of state surveillance, for-profit data collection, and their diminished rights over their personal data.</p>

<p>Finally we introduce the relatively new Web Science concept of Social Machines in <a href="the-ghost-in-the-social-machine">section 6</a> in order to recapture the circular interdependencies between humans, technologies, and communities. We propose to build on current work of describing and classifying social machines to better account for the individual perspectives of participants.</p>
<p>Finally we introduce the relatively new Web Science concept of Social Machines in <a href="#the-ghost-in-the-social-machine">section 6</a> in order to recapture the circular interdependencies between humans, technologies, and communities. We propose to build on current work of describing and classifying social machines to better account for the individual perspectives of participants.</p>

<p>Ultimately we posit that online is simultaneously a reflection, a distortion, an enhancement, and a diminishment of the offline world. They impact each other in complex ways, particularly with regards to self-presentation and identity formation. The various theories and studies described in this chapter form the basis for which we conduct the investigative and technical work in the remainder of this thesis.</p>

Expand Down