Professional Documents
Culture Documents
Social network sites, privacy and the blurring boundary between public and private spaces
Stefan Strau1,* and Michael Nentwich1
1
Institute of Technology Assessment, Austrian Academy of Sciences, Strohgasse 45/5, A-1030 Vienna, Austria. *Corresponding author. Email: sstrauss@oeaw.ac.at.
With social network sites (SNS) becoming a pervasive phenomenon, already existing conflicts with privacy are further intensified. As shown in this paper, online and (once) offline contexts increasingly conflate, thereby posing new challenges to the protection of the private sphere. SNS quickly evolve their features and challenge privacy preferences, often without user consent; social graphs make social relations highly transparent; social plugins interconnect user traces from within and outside the SNS. As the large amounts of personal information available in SNS are processed with context-rich information, the individuals informational self-determination is heavily strained. These data attract potential and real observers for behavioural advertising and also for profiling by security authorities. We argue that the emerging usage of SNS (social plugins, increasing role of biometrics and mobile computing) multiplies privacy challenges as all types of privacy become affected. This raises additional demand for public policy to foster privacy-by-design combined with awareness-raising mechanisms to improve informational self-determination. Keywords: SNS; privacy; socio-technical transformation; technology assessment.
1. Introduction
Social network sites (SNS) are now a widespread phenomenon on the internet. In line with the social need to communicate, SNS provide a wide range of opportunities for sharing, exchanging, creating content and collaborating with others. Despite their relative novelty, there are various studies on the usage and impact of SNS. They cover sociological aspects (Ellison et al. 2007; Steineld et al. 2008; Wanhoff 2011), psychological issues such as internet addiction (Livingstone 2008; Valkenburg et al. 2006) and commercial aspects relating to SNS business models, including data mining for marketing and other purposes (Elmer 2004; Fraser and Dutta 2008), as well as academic usage (Nentwich and Ko nig 2012). Several studies explore (non-)usage patterns with a particular focus on young users (Lenhart and Madden 2007; Hargittai 2007). Further hot issues include the potential misuse of SNS, including risks for child safety, emotional abuse, online bullying etc. (Boyd 2007a). In contrast to those negative aspects, other researchers focus on a
variety of positive effects such as: stimulating creativity, social learning, enabling new modes of participation, strengthening community building and empowerment (Pratchett et al. 2009; Wimmer 2009). Besides their wide scope for application, the sharing of personal data and information is essential to SNS, as every form of social interaction requires a certain amount of information about the parties involved. Thus, SNS are mainly designed to stimulate interactions and elicit or seduce users into revealing personal information. Accordingly, their novel modes of interactivity and networking mechanisms plus the new dynamics of information ows entailed, also challenge privacy in a variety of ways. The potential conicts between social media and the private sphere are among the heavily debated issues in the information society. A number of scholars also focus on user perception and particularly, on privacy and trust (Barnes 2006; Cain et al. 2009; Dwyer et al. 2007; Fuchs 2009; Gross and Acquisti 2005; Lack et al. 2009; Lehavot 2009; Lewis et al. 2008). However, only few studies have analysed privacy
The Author 2013. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com
2 of 9
S. Strauss and M. Nentwich Social interaction relies on sharing (personal) information, which is therefore a core aspect of the design of SNS. A major part of most SNS are the users personal proles with information about themselves, such as interests and activities, which are contained within a digital space that can usually only be accessed upon registration (Nentwich and Ko nig 2012: 20; Schmidt 2009: 23). The prole provides the entry point for further services and applications within the network environment. As the technical functionality and target groups vary, we may distinguish different types of SNS. They vary according to the intended usage forms. In some SNS, private purposes prevail, such as dating or seeking friends (e.g. Friendster), whereas others focus on professional elds with applications such as job seeking, education, business contacts (e.g. Xing, LinkedIn, ResearchGate and Yammer); yet others feature a combination of private and professional use (e.g. Facebook and Google+). Requirements for access also vary: some are open, i.e. they only require a simple registration (Richter and Koch 2008). This is the case with many popular SNS (e.g. Facebook and MySpace). Other platforms offer limited free access, but charge users fees for the full service (e.g. Xing). While many SNS are open for everyone, there are specialised networks that are only open to certain communities, such as a company or research group (e.g. the Ning platform for customisable SNS). The available communication forms vary according to the respective needs (e.g. nudging, chatting, private mailing vs. open communication, micro-blogging, additional functions such as bibliographic search, job exchange, rating etc.). In summary, it can be said that there is an enormous variety of SNS providing users with multiple, new and improved options for networking, participation, collaboration, marketing, doing business, gaming etc. This variety of interactions entails information owing widely across different usage contexts.
aspects in connection with SNS design and usage contexts. This paper contributes to stimulating research in this regard. Based on a literature review as well as on practical tests of different SNS functions and applications, this paper explores the implications of SNS on the notions of privacy and informational self-determination. We focus on the diminishing boundaries between public and private spaces and argue that online and (previously) ofine contexts increasingly conate and hence pose new challenges to the protection of the private sphere.1
Depending on the applied denition and its interpretation, various services can be categorised under this label, evidently including Facebook, LinkedIn, MySpace, Google+ etc. As the scope and use of other platforms has expanded over time, it is reasonable to also include micro-blogging services (e.g. Twitter), video platforms (e.g. YouTube), social bookmarking services (e.g. Delicious) and even video-conferencing tools (e.g. Skype). As we are interested in the full breadth and variety of the impact SNS may have on the privacy of their users, for the purpose of this paper, we adhere to a broad denition.
It is not merely some form of public communication but involves a deliberative quality that transforms public communication into public opinion (Frazer 2007; Trenz 2008).The emergence of this deliberative quality is linked
Social network sites, privacy and the blurring boundary between public and private spaces to the private sphere, referring to spaces where individuals are able to be and act freely and without interference from others. Where privacy is given and people are enabled:
. . . to engage in worthwhile activities that they would otherwise nd difcult or impossible. (Solove 2006: 484)
3 of 9
The relationship between the private and the public spheres is thus complementary: individuals develop their opinions in their private sphere; by communicating and interacting with others they embody the public sphere (Habermas 1989 (German original 1962)). Both spheres need space to emerge and develop places where individuals can meet, share thoughts, discuss their opinions, exchange ideas etc. without impediment. Limitations on such space for open, communicative exchange might reduce the deliberative quality and transformative capacity which is vital for the formation of the democratic will. In the analogue world, different types of public spaces provide room for both spheres to converge. Where are SNS situated in this regard? At a rst glance, one might conceptualise SNS environments as public spaces, as:
. . . non-domestic physical sites that are distinguished by their relative accessibility [. . .]. (Humphreys 2010: 2)
For Boyd (2007b), SNS can be seen similar as mediated publics and yet another form of public space. However, there are signicant differences between SNS and traditional public spaces. Considering that access to SNS usually demands user authentication, it is a specic space on the internet, which is to some extent separated from others: a sort of semi-public space. A particularly distinguishing characteristic is the visibility of interactions: in a (real-world) public square the behaviour, movements and interactions of individuals are generally visible to others nearby, but there is usually no systematic monitoring of interactions and communication content, which makes this visibility rather ckle, with varying levels of privacy. In SNS, however, social relations and interactions including the content are explicitly observable (and observed) because references between personal (friends, contacts etc.) and non-personal entities (interests, content used, shared, linked, liked, produced etc.) are part of the information processed. With the rapid expansion of the SNS universe additional information is produced. The notion of Web 2.0 also referred to a new software model (web services and outsourcing) where testing of software before commercial release is reduced in favour of economic considerations. This results in a kind of permanent beta status with continuous adjustments incorporating users activities and their feedback (OReilly 2005). In this context, SNS can be understood as a test bed for new applications and technologiesa trend that is exemplied by the many quickly evolving features, functionalities and modalities, which often entail signicant changes in user requirements
and challenge privacy preferences without the users informed consent (e.g. Facebooks obligatory introduction of the timeline feature or the myriads of changes in its interface). Recently, SNS have started to include social graphs using this information to create a map of the social relations of users on a global level.2 This fosters personalised search and enables the search for an individuals specic interests. Together with the information gathered by social plugins from the web outside Facebook, the social graph can be used to map a persons interactions both within and outside the original network. While SNS users can change their privacy settings in their proles and determine which information is accessible to others, this is a rather weak mechanism with limited functionality: the information remains accessible, as interactions may comprise personal and non-personal entities (e.g. content). In addition, user awareness of privacy settings is often lownot least due to the frequent changes in features and settings (Debatin et al. 2009). Furthermore, some user groups seem more concerned about privacy than others. Some reports state that students are reluctant to use their private SNS accounts for e-learning purposes (Nentwich and Ko nig 2012: 39). At least part of the reluctance of researchers to join SNS may be explained by fear of losing control over their privacy (Nentwich and Ko nig 2012: 47). If researchers are very active on various SNS, they will indeed create signicant digital traces across platforms that can be analysed by data-mining tools (Nentwich and Ko nig 2012: 185). This is certainly also true of other user groups. These issues are affected to some extent by the interplay between privacy awareness, different usage patterns and features supported by the SNS. While SNS were a closed environment rather detached from the rest of the web in their early days, their wider diffusion also extended their outreach. A comparison of Facebooks privacy settings in 2005 with those in 2010 shows a signicant growth of information accessible by default, not restricted to SNS users, but also including outside entities.3 Such a trend reveals how privacyby-default turned into what we call disclosure-by-default. This transformation fostered de- and re-contextualisation of (personal) information ows. With an increasing trend towards integrated services and applications the SNS provides a space where users also collect content from the outside web (such as embedded audio, video etc.). This trend became systematised with social plugins, which play a crucial role in the expansion of SNS. Social plugins (most prominently the like button) enable the integration of SNS features into websites outside the SNS environment, and vice versa. These plugins process additional data and build bridges between sites that are otherwise not connected to the SNS. These developments make it not merely challenging for users to customise their
4 of 9
S. Strauss and M. Nentwich are explicitly made visible in SNS. The capability of SNS to map social relations on a global level provides deep insights into the identity and behavioural patterns of individuals. A conict arises between the users intentions to share information and the way this information is used by the SNS (e.g. behavioural targeting and processing of user data for commercial interests). Privacy settings do not provide protection:
. . . since leaking graph information enables transitive loss: insecure friends proles can be correlated to a user with a private prole. (Bonneau et al. 2009: 6)
Hence, these quickly evolving technologies increase, in combination with SNS, the possibility of identifying and tracking users in an unprecedented manner (see Section 5). These data have considerable value for the surveillant assemblage, that is:
. . . a heterogeneous, loosely coupled set of institutions that seek to harness the raw power of information by xing ows of information cognitively and spatially. (Cohen 2008)
These potential and effective observers of online activities in the public and the private sector benet from further growth of SNS data (e.g. Facebook already counts more than one billion users). The large amount of personal information available via SNS is valuable for business models based on behavioural advertising and for predicting new trends.5 Under the umbrella term predictive policing, security authorities reinforce their efforts to observe online activities and aim at real-time surveillance to identify suspicious behaviour and prevent crimes (Uchida 2010). Recent developments in Europe and the USA for standardised backdoors in cloud services and virtual applications carry these developments forward.6
Social network sites, privacy and the blurring boundary between public and private spaces
. behaviour and action: this type addresses the: . . . ability to behave in public, semi-public or ones private space without having actions monitored or controlled by others.
5 of 9
This involves:
. . . sensitive issues such as sexual preferences and habits, political activities and religious practices . communication: the ability to communicate freely via
different media and without interception including the avoidance of different forms of wiretapping and surveillance of communication . data and image: this type involves the individuals claim that data should not be automatically available to other individuals and organisations. Individuals should have a substantial degree of control over their data and its usage (Clarke 2006); image is a particular:
. . . form of personal data can be mined for biometric data and used to identify, monitor and/or track individuals as they move about public or semi-public space. (Finn et al. 2013) . thoughts and feelings: this privacy type addresses a
persons freedom to think and feel whatever he/she likes without restriction. This type differs from behaviour as thoughts do not necessarily translate into behaviour . location and space: ones right to move freely in private, public or semi-public space without being identied, tracked or monitored . association (including group privacy): addresses the right to associate with whoever they wish without being monitored; this also includes groupings or proles over which one has no control (e.g. involvement in discussion groups) Table 1 outlines those privacy types affected by currently common SNS usage compared to emerging SNS usage.
Table 1.
Privacy types and SNS usage Common SNS usage Emerging SNS usage X X X X X X X
Privacy of . . .
the person behaviour and action communication data and image thoughts and feelings location and space association (including group privacy)
(X) X X (X) X
This mapping can only be general, as the privacy impact depends on the application context: hence it provides an overview and not a strict assignment. Nonetheless, Table 1 indicates how privacy impacts might multiply due to current trends, further developments and the diffusion of SNS. Common usage refers to a standard prole without mobile access and location-based services. Emerging usage incorporates the developments identied in this paper that are capable of extending the array of privacy types affected. These are described below. Finn et al. (2013) developed this classication based on different emerging technologies such as body scanners, biometrics or un-manned aerial vehicles. It enables a differentiated view to examine the privacy impacts of a particular technology. In our context it provides a fruitful heuristic to point out the extending privacy impacts of emerging SNS usage. Contemporary SNS use already affects several privacy types, as Table 1 outlines. Privacy of communication, data and image as well as privacy of association are so far the main types that are most affected, as these are at the core of any SNS usage: communicating and interacting, sharing and creating different forms of content and interacting with other users and user groups. The modes of interaction in SNS include both personal and non-personal entities. The connections and linkages between the different entities produce large amounts of additional data that may also provide insights into behaviour and action (e.g. due to postings on others proles, their interests etc.), as well as users thoughts and feelings. Some SNS features aim at seducing users to reveal more information and directly ask users how are you feeling?, what are you doing? etc. New features such as the like button and other social plugins provide deeper insights into ones interests and preferences. Thus, these types of privacy are also affected, though not to the same extent as the other three types. With further usage and extension to other devices, impacts in this regard are expected to grow further and extend beyond the SNS environment. Considering the fast evolution and continued diffusion of SNS, a reinforcement of existing privacy impacts as well as an extension to additional privacy types can be expected. The list of bulleted points above outlines which privacy types are affected by common and by emerging SNS use, including three major developments that are strongly related to SNS and foster the conation between online and ofine spaces in different ways:
. Social plugins: With the increasing diffusion of social
Source: Own table based on privacy types suggested by Finn et al. (2013). X indicates that a privacy type is widely affected, (X) means that a privacy type is partially affected
media, SNS have become attractive environments to integrate other services and technologies. Social plugins are a major tool of this integration. They allow SNSto be embedded into other websites and enable the absorption of data from the outside web
6 of 9
into the SNS environment and vice versa. This creates additional information on usage patterns also beyond the original SNS environment. As the boundaries between SNS and detached spaces dwindle, different online spaces conate. . Increasing role of biometrics: Face recognition technologies become more sophisticated and are integrated in SNS contexts.7 In 2011, Facebook was the rst SNS to enable the tagging of people on photos and the creation of a link to their proles.8 Google brought in a patent for facial recognition with social network aiding.9 Law enforcement also strengthens efforts to use face recognition combined with photos available on the web.10 This enables a persons physical and virtual appearance to be linked. In addition to face recognition technologies there are already SNS-alike online services that even make use of DNA data.11 . Mobile computing and signicant growth in mobile SNS usage: Mobile social media represent a fast growing market. The amount of mobile data doubled from 2011 to 2012.12 Users increasingly access their SNS proles via mobile devices13 (smart phones, tablets etc.); mobile apps and location-based services (LBS) make SNS usage more attractive. This also affects locational privacy and enables an SNS environment to gather data on location and space (e.g. via location tracking) and to gain deeper insights into users movements and behaviour in the analogue world. Montjoye et al. (2013) highlight the deep privacy impacts of mobile data and demonstrate the unique identication of 95% of individuals by their location data. As mobile computing in general is among the fastest growing markets, protecting locational privacy is one of the main challenges. Together with SNS the array of privacy impacts further expands not least due to apps and LBS that widen personal information ows in addition to location data. To some extent, quickly evolving smart devices such as intelligent glasses (e.g. Google Glass)14 or other wearable computers in the eld of augmented reality (AR) represent the next generation of mobile social media and thus reinforce and trigger additional privacy challenges. With an integrated camera they may enable two-fold tracking: where people are and what they do, a persons movements and actions, and also what this person is looking at. ISD might become heavily stressed with sophisticated AR concepts as they might impose a view on reality enriched with (context) information that subsequently complicates her very own perception of reality and thus her ISD. These trends refer to the emerging role of as ubiquitous computing that successively manifests (C 2011).
Social network sites, privacy and the blurring boundary between public and private spaces also for testing the privacy modalities of SNS and PbD implementation. The more systematic PbD approaches are claimed by policy-makers, the more a systematic scrutiny of the according features in an SNS environment (and beyond) can be conducted. PbD can be understood as a means to bring forward the public value of privacy that has to be protected in a pro-active manner (Nissenbaum 2010). That is, to prevent and avoid privacy infringements instead of merely reacting ex-post to infringements which occur, as this setting is no longer applicable in our informational ecosystem.
7 of 9
2.
3.
4.
5.
7. Conclusions
SNS are a prominent example of a far-reaching transformation of the boundary between public and private as well as online and ofine spaces. Previously separated (online) application contexts merge and also increasingly reach out to previously analogue environments. Complex modes of information processing (partially in cloud infrastructures) also strain the distinction between personal information and user content. Integrative services and technologies foster this conation. Given the rapidly growing number of SNS users, these trends entail a wide range of societal impacts and shift privacy concerns to a higher level. This entails a further loss of ISD, exacerbated mainly by manifold and undetermined usage contexts. With these contexts still increasing, a key challenge for more effective privacy protection can be identied: how to explicitly decouple contexts and related spaces? If privacy is not to become lost in this conation, there is a need to reconsider its public value in a way that reduces commercial exploitation of personal information without shifting responsibility for data protection exclusively onto the users. Accordingly, policy-makers are challenged to foster the implementation of PbD features in combination with mechanisms which raise users awareness of privacy issues. This contributes to upholding ISD and improving controllability over those usage contexts that process personal information. Strengthening the role of Data Protection Agencies in their function of scrutinising privacy protection with regards to the effectiveness of PbD features implemented in SNS environments is also a core aspect of revitalise privacy as a public value. 6.
7.
8.
9.
10.
11.
Notes
1. This paper mainly focuses on the social dimension of privacy in relation to SNS. It does not address a legal perspective. As SNS are a global phenomenon, incorporating such a perspective would suggest analysing a wider array of different regulatory frameworks which is beyond the scope of this paper. However, our analysis addresses some of the major
12. 13.
14. 15.
problems of SNS that can be helpful for policymakers when adapting regulatory frameworks. Such as Facebooks open graph <https://developers. facebook.com/docs/opengraph> accessed 10 July 2013. See <http://www.yalelawtech.org/control-privacytechnology/evolution-of-facebook-privacy> accessed 10 July 2013. Judgment of the First Senate from 15 December 1983, 1 BvR 209/83 et al. Population Census, BVerfGE 65, 1. See, for instance <http://www.insidefacebook.com/ category/social-media-monitoring/> accessed 10 July 2013. See <http://www.edri.org/edrigram/number10.15/etsilawful-implementation-standard> accessed 10 July 2013. With the exposure of PRISM and the Tampora project, there is further strong evidence of large-scale surveillance of online activities by law enforcement agencies. See <http://www.zdnet.com/ prism-heres-how-the-nsa-wiretapped-the-internet7000016565/> and <http://www.guardian.co.uk/uk/ 2013/jun/21/gchq-cables-secret-world-communications-nsa> accessed 10 July 2013. See <http://www.csoonline.com/article/686959/facerecognition-and-social-media-meet-in-theshadows>accessed 10 July 2013. See <http://www.dailymail.co.uk/sciencetech/article2000744/Facebook-face-recognition-technology-Nowknows-look-like.html> accessed 10 July 2013. See <https://www.informationweek.com/internet/ google/google-seeks-social-networking-face-reco/ 229218484> accessed 10 July 2013. For instance, in the next generation identication program of the Federal Bureau of Investigation (FBI) that includes automatic comparing of photos on the web against a national repository of images held by the FBI <http://www.newscientist.com/ article/mg21528804.200-fbi-launches-1-billion-facerecognition-project.html> accessed 10 July 2013. For instance, genebase which promises to nd the perfect matching partner based on DNA samplings. <http://mashable.com/2008/03/07/genebase-dna/> accessed 10 July 2013. Another example is 23andme, which provides online health checks based on genetic testing. See <http://www.ericsson.com/ericsson-mobilityreport> accessed 10 July 2013. See <http://www.comscoredatamine.com/2012/02/ more-than-half-of-people-that-access-social-networkson-their-smartphone-do-so-on-a-near-daily-basis> accessed 10 July 2013. See <https://en.wikipedia.org/wiki/Google_Glass> accessed 10 July 2013. See <http://diasporial.com> accessed 10 July 2013.
8 of 9
16. For instance, Facebook is censoring images they nd offensive according to their usage policy <http://www. dailymail.co.uk/sciencetech/article-2104424/Face books-bizarre-secretive-graphic-content-policyrevealed-leaked-document.html> accessed 10 July 2013. This is a highly controversial and complex issue affecting other fundamental rights such as freedom of expression, which cannot be discussed here. However, if SNS providers are technically able to interfere with user content, then it might be more appropriate to foster anonymisation of personal photos and images, for instance on the basis of legal regulation to protect users privacy instead of censoring their content.
References
Barnes, S. B. (2006) A privacy paradox: Social networking in the United States, First Monday, 11/6 <http://rstmonday. org/ojs/index.php/fm/article/view/1394/1312> accessed 10 July 2013. Bonneau, J., Anderson, J., Anderson, R. and Stajano, F. (2009) Eight friends are enough: Social graphs approximation via public listings, SNS 2009, 138 <http://www.cl.cam.ac.uk/ rja14/Papers/8_friends_paper.pdf> accessed 10 July 2013. Boyd, D. M. (2007a) Why youth (heart) social network sites: The role of networked publics in teenage social life. In: Buckingham, D. (ed.) MacArthur Foundation Series on Digital Learning Youth, Identity, and Digital Media Volume, pp. 11942. Cambridge, MA: MIT Press. (2007b) Social network sites: Public, private, or what?. Knowledge Tree, 13, May <http://www.danah.org/papers/ KnowledgeTree.pdf> accessed 10 July 2013. and Ellison, N. B. (2007) Social network sites: Denition, history, and scholarship, Journal of Computer-Mediated Communication, 13: 21030. Cain, J., Scott, D. R. and Akers, P. (2009) Pharmacy students Facebook activity and opinions regarding accountability and e-professionalism, American Journal of Pharmaceutical Education, 73/6: Article 104 <http://www.ajpe.org/aj7306/ aj7306104/aj7306104.pdf> accessed 10 July 2013. as, J. (2011) Ubiquitous computing, privacy and data protecC tion: Options and limitations to reconcile the unprecedented contradictions. In: Gutwirth, S., Poullet, Y., Hert, P. D. and Leenes, R. (eds) Computers, Privacy and Data Protection: An Element of Choice, pp. 13969. Berlin: Springer. Cavoukian, A. (2009) Privacy by design . . . take the challenge. Information and Privacy Commissioner of Ontario, Canada <http://www.privacybydesign.ca/content/uploads/2010/03/ PrivacybyDesignBook.pdf> accessed 10 July 2013. Clarke, R. C. (2006) Whats privacy? <http://www.roger clarke.com/DV/Privacy.html> accessed 10 July 2013. Cohen, J. E. (2008) Privacy, visibility, transparency, and exposure, University of Chicago Law Review, 75: 181201. Debatin, B., Lovejoy, J. P., Horn, A. K. and Hughes, B. N. (2009) Facebook and online privacy: Attitudes, behaviors, and unintended consequences, Journal of ComputerMediated Communication, 15: 83108. Dwyer, C., Hiltz, S. and Passerini, K. (2007) Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, In: Proceedings of the Thirteenth Americas Conference on Information Systems, held 912 August 2007, Keystone, CO <http://citeseerx.ist.psu.
Social network sites, privacy and the blurring boundary between public and private spaces
Project <http://apo.org.au/?q=node/16749> accessed 10 July 2013. Lewis, K., Kaufman, J. and Christakis, N. (2008) The taste for privacy: An analysis of college student privacy settings in an online social network, Journal of Computer-Mediated Communication, 14: 79100. Livingstone, S. (2008) Taking risky opportunities in youthful content creation: Teenagers use of social networking sites for intimacy, privacy and self-expression, New Media and Society, 10: 393411. Mack, D., Behler, A., Roberts, B. and Rimland, E. (2007) Reaching students with Facebook: Data and best practices, Electronic Journal of Academic and Special Librarianship, 8/2 <http://southernlibrarianship.icaap.org/content/v08n02/ mack_d01.html> accessed 10 July 2013. Montjoye, Y.-A. D., Hidalgo, C. A., Verleysen, M. and Blondel, V. D. (2013) Unique in the crowd: The privacy bounds of human mobility, Nature Scientic Reports, 3/1376 <http://www.nature.com/srep/2013/130325/srep01376/ pdf/srep01376.pdf> accessed 10 July 2013. Nentwich, M. and Ko nig, R. (2012) Cyberscience 2.0. Research in the Age of Digital Social Networks. New York: Campus. Nissenbaum, H. (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford University Press. OReilly, T. (2005) What is Web 2.0? Design patterns and business models for the next generation of software <http://www.oreilly.de/artikel/web20.html> accessed 30 August 2011. Pratchett, L., Durose, C., Lowndes, V., Smith, G. et al. (2009) Empowering communities to inuence local decision making. Evidence-based lessons for policy makers and practioners. London: Communities and Local Government Publications. Richter, A. and Koch, M. (2007) Social Software Status quo und Zukunft. Mu t fu nchen, Germany: Fakulta r Informatik, Universita t der Bundeswehr Mu nchen, <http://www.unibw. de/wow5_3/forschung/social_software> accessed 10 July 2013. and (2008) Funktionen von Social-NetworkingDiensten. In: Bichler, M., Hess, T., Kramar, H.,
9 of 9
Lechner, U. et al. (eds) Multikonferenz Wirtschaftsinformatik 2008, pp. 123950. Berlin: GITO Verlag. Schmidt, J. (2009) Das neue Netz. Merkmale, Praktiken und Folgen des Web 2.0. Konstanz, Germany: UVK. Solove, D. (2006) A taxonomy of privacy, University of Pennsylvania Law Review, 154: 477560. Steineld, C., Ellison, N. B. and Lampe, C. (2008) Social capital, self-esteem, and use of online social network sites: A longitudinal analysis, Journal of Applied Developmental Psychology, 29: 43445. Strau, S. (2011) The limits of control (Governmental) identity management from a privacy perspective. In: Fischer-Hu bner, S., Duquenoy, P., Hansen, M., Leenes, R. and Zhang, G. (eds) Privacy and Identity Management for Life - IFIP Advances in Information and Communication Technology - AICT vol. 352, pp. 20618. Berlin: Springer. Trenz, H. J. (2008) In search of the European public sphere. Between normative overstretch and empirical disenchantment, RECON Online Working Paper 2008/07 <http://www. reconproject.eu/main.php/RECON_wp_0807.pdf?leitem= 16662548> accessed 10 July 2013. Uchida, C. (2010) A national discussion on predictive policing: Dening our terms and mapping successful implementation strategies. Washington, DC: US Department of Justice, <https://www.ncjrs.gov/pdfles1/nij/grants/230404.pdf> accessed 10 July 2013. Valkenburg, P. M., Peter, J. and Schouten, A. P. (2006) Friend networking sites and their relationship to adolescents wellbeing and social self-esteem, CyberPsychology and Behavior, 9: 58490. Wanhoff, T. (2011) Wa(h)re Freunde - Wie sich unsere Beziehungen in sozialen Online-Netzwerken verandern. Heidelberg, Germany: Spektrum Akademischer Verlag. Wimmer, J. (2009) The publics behind political web campaigning. The digital transformation of classic counter-public spheres. In: Baringhorst, S., Kneip, V. and Niesyto, J. (eds) Political Campaigning on the Web, pp. 3151. Bielefeld, Germany: Transcript Verlag.