Trust into Collective Privacy? The Role of Subjective Theories for Self-Disclosure in Online Communication
Abstract
:1. Introduction
2. Subjective Theories: Trust into Collective Privacy
2.1. The Everyday Experiences of Online Users
2.2. The Subjective Collective-Privacy Theory
- a)
- must also experience information overload.
- b)
- must have similarly limited time and/or motivation to read everything.
- c)
- must therefore also select which posts to really read.
- d)
- infer that other users have similar reading criteria (for example that they only read things they find interesting).
- e)
- estimate which or whose information potential readers might find interesting.
2.3. Anecdotal Evidence for the CP-Theory
3. Default Trust: Consequences for (Meta-) Cognitive Processes
3.1. Memory
3.2. Metacognitive Accuracy
4. General Discussion
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Petronio, S. Boundaries of Privacy: Dialectics of Disclosure; State University of New York Press: Albany, NY, USA, 2002. [Google Scholar]
- Boyd, D. Taken out of context: American teen sociality in networked publics. Doctoral Dissertation; School of Information: University of California-Berkeley, 2008. Available online: http://www.danah.org/papers/TakenOutOfContext.pdf (accessed on 22 August 2012).
- Laurenceau, J.P.; Barrett, L.F.; Pietromonaco, P.R. Intimacy as a process: The importance of self-disclosure and responsiveness in interpersonal exchanges. J. Pers. Soc. Psychol. 1998, 74, 1238–1251. [Google Scholar] [PubMed]
- Ellison, N.; Steinfield, C.; Lampe, C. The benefits of Facebook ‘friends’: Exploring the relationship between college students’ use of online social networks and social capital. J. Comput. Mediat. Commun. 2007, 12, 1143–1168. [Google Scholar] [CrossRef]
- Steinfield, C.; Ellison, N.; Lampe, C. Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. J. Appl. Dev. Psychol. 2008, 29, 434–445. [Google Scholar] [CrossRef]
- Valenzuela, S.; Park, N.; Kee, K.F. Is there social capital in a Social Network Site? Facebook use and college students’ life satisfaction, trust, and participation. J. Comput. Mediat. Commun. 2009, 14, 875–901. [Google Scholar] [CrossRef]
- Cozby, O.C. Self-disclosure: A literature review. Psychol. Bull. 1973, 79, 73–91. [Google Scholar] [CrossRef] [PubMed]
- Altman, I.; Taylor, D.A. Social Penetration: The Development of Interpersonal Relationships; Rinehart & Winston: New York, NY, USA, 1973. [Google Scholar]
- Kunnel, A. Eine integrative Theorie der Vertrauenskommunikation in sozialen Onlinenetzwerken [An integretaive theory of trust communication in Online Social Networks]. Westfälische Wilhelms-Universität Münster, Münster, Germany, 2014. [Google Scholar]
- Coleman, J.S. Social capital in the creation of human capital. Am. J. Sociol. 1988, 94, 95–120. [Google Scholar] [CrossRef]
- Vitak, J. The impact of context collapse and privacy on Social Network Site disclosures. J. Broadcast Electron. Media 2012, 56, 451–470. [Google Scholar] [CrossRef]
- Vitak, J.; Ellison, N.B. ‘There’s a network out there you might as well tap’: Exploring the benefits of and barriers to exchanging informational and support-based resources on Facebook. New Media Soc. 2013, 15, 243–259. [Google Scholar] [CrossRef]
- Vitak, J.; Kim, J. “You can’t block people offline”: Examining how Facebook’s affordances shape the disclosure process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, Baltimore, MD, USA, 15–19 February 2014.
- Burke, M.; Marlow, C.; Lento, T. Social network activity and social well-being. In Proceedings of the ACM conference of Computers in Human Interaction, Firenze, Italy, 10–14 April 2010; pp. 1909–1912.
- Grossklags, J.; Acquisti, A. When 25 Cents is too much: An experiment on willingness-To-sell and willingness-to-protect personal pnformation. In Proceedings of the Sixth Workshop on the Economics of Information Security, Pittsburgh, PA, USA, 7–8 June 2007.
- Binder, J.; Howes, A.; Sutcliffe, A. The Problem of Conflicting Social Spheres: Effects of Network Structure on Experienced Tension in Social Network Sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Boston, MA, USA, 7 April 2009; pp. 965–974.
- Rui, J.R.; Stefanone, M. Strategic image management online. Inform Comm. Soc. 2013, 16, 1286–1305. [Google Scholar] [CrossRef]
- Norberg, P.A.; Horne, D.R.; Horne, D.A. The privacy paradox: Personal information disclosure intentions versus behaviors. J. Consum. Aff. 2007, 41, 100–126. [Google Scholar] [CrossRef]
- Altman, I. The Environment and Social Behavior; Wadsworth: Belmont, CA, USA, 1975. [Google Scholar]
- Xu, H.; Teo, H.-H.; Tan, B.C.Y.; Agarwal, R. The role of push-pull technology in privacy calculus: The case of location-based services. J. Manage Inform. Syst. 2009, 26, 135–174. [Google Scholar] [CrossRef]
- Acquisti, A. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the EC’04, New York, NY, USA, 17–20 May 2004; pp. 21–29.
- Margulis, S.T. On the status and contribution of Westin’s and Altman’s theories of privacy. J. Soc. Issues 2003, 59, 411–429. [Google Scholar] [CrossRef]
- Trepte, S.; Dienlin, T. Privatsphäre im Internet [Privacy on the Internet]. In Neue Medien und deren Schatten [New Media and Their Shadows]; Porsch, T., Pieschl, S., Eds.; Hogrefe: Göttingen, Germany, 2014. [Google Scholar]
- Solove, D.J. Conceptualizing privacy. Calif. Law Rev. 1997, 90, 1087–1156. [Google Scholar] [CrossRef]
- Groeben, N.; Scheele, B. Dialogue-hermeneutic method and the “research program subjective theories”. Available online: http://www.qualitative-research.net/index.php/fqs/article/view/1079/2354 (accessed on 11 February 2014).
- Keil, F.C. Folkscience: Coarse interpretations of a complex reality. Trends Cogn. Sci. 2003, 7, 368–373. [Google Scholar] [CrossRef] [PubMed]
- Dweck, C.S.; Chiu, C.; Hong, Y. Implicit theories elaboration and extension of the model. Psychol. Inq. 1995, 6, 322–333. [Google Scholar] [CrossRef] [Green Version]
- Gelman, S.A.; Noles, N.S. Domains and naïve theories. Wiley Interdiscip. Rev. Cogn. Sci. 2011, 2, 490–502. [Google Scholar]
- Beckedahl, M.; Meister, A. (Eds.) Überwachtes Netz: Edward Snowden und der größte Überwachungsskandal der Geschichte [Surveillance of the Internet: Edward Snowden and the Largest Surveillance Scandal in History]; epubli GmbH: Berlin, Germany, 2013.
- Toffler, A. Future Shock; Random House: New York, NY, USA, 1970. [Google Scholar]
- Franck, G. Ökonomie der Aufmerksamkeit—Ein Entwurf [Economy of Attention—A Blueprint]; Hanser: München, Germany, 1998. [Google Scholar]
- Lundblad, N. Privacy in the noise society. Scand. Stud. Law 2004, 47, 349–371. [Google Scholar]
- Nickerson, R.S.; Baddeley, A.; Freeman, B. Are people’s estimates of what other people know influenced by what they themselves know? Acta Psychol. 1987, 64, 245–259. [Google Scholar] [CrossRef]
- Michaelian, K. (Social) Metacognition and (Self-)Trust. Rev. Philos. Psychol. 2012, 3, 481–514. [Google Scholar] [CrossRef] [Green Version]
- Jost, J.T.; Kruglansky, A.W.; Nelson, T.O. Social metacognition: An Expansionist’s view. Pers. Soc. Psychol. Rev. 1998, 2, 137–154. [Google Scholar] [CrossRef] [PubMed]
- Premack, D.; Woodruff, G. Does the chimpanzee have a theory of mind? Behav. Brain Sci. 1978, 1, 515–526. [Google Scholar] [CrossRef]
- Litt, E. Knock knock. Who’s there? The imagined audience. J. Broadcast Electron. Media 2012, 56, 330–345. [Google Scholar] [CrossRef]
- Marwick, A.E.; Boyd, D. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media Soc. 2011, 13, 114–133. [Google Scholar] [CrossRef]
- Hoadley, C.M.; Xu, H.; Lee, J.J.; Rosson, M.B. Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 2010, 9, 50–60. [Google Scholar] [CrossRef]
- Boyd, D. Facebook’s privacy trainwreck: Exposure, invasion, and social convergence. Convergence 2008, 14, 13–20. [Google Scholar]
- Ackoff, R.L. From Data to Wisdom. J. Appl. Syst. Anal. 1989, 16, 3–9. [Google Scholar]
- Solove, D.J. ‘I’ve got nothing to hide’ and other misunderstandings of privacy. San Diego Law Rev. 2007, 44, 745–772. [Google Scholar]
- Scheele, B.; Groeben, N. Dialog-Konsens-Methoden Zur Rekonstruktion Subjektiver Theorien: Die Heidelberger Struktur-Lege-Technik (SLT), Konsensuale Ziel-Mittel-Argumentation Und Kommunikative Flußdiagramm-Beschreibung von Handlungen; Francke: Tübingen, Germany, 1988. [Google Scholar]
- Sperber, D.; Clément, F.; Heintz, C.; Mascaro, O.; Mercier, H.; Origgi, G.; Wilson, D. Epistemic vigilance. Mind Lang. 2010, 25, 359–393. [Google Scholar] [CrossRef]
- Koriat, A. Monitoring one’s own knowledge during study: A cue-utilization approach to judgments of learning. J. Exp. Psychol. 1997, 126, 349–370. [Google Scholar] [CrossRef]
- Pintrich, P.R. A conceptual framework for assessing motivation and self-regulated learning in college students. Educ. Psychol. Rev. 2004, 16, 385–407. [Google Scholar] [CrossRef]
- Brown, A.; Hornstein, S.; Memon, A. Tracking conversational repetition: An evaluation of target monitoring ability. Appl. Cogn. Psychol. 2006, 20, 85–95. [Google Scholar] [CrossRef]
- Gopie, N.; MacLeod, C.M. Destination memory—Stop me if I told you this before. Psychol. Sci. 2009, 20, 1492–1499. [Google Scholar] [CrossRef] [PubMed]
- Marsh, R.L.; Hicks, J.L. Comparisons of target output monitoring and source input monitoring. Appl. Cogn. Psychol. 2002, 16, 845–862. [Google Scholar] [CrossRef]
- Grudin, J. Desituating action: Digital representation of context. Hum.-Comput. Interact. 2001, 16, 269–286. [Google Scholar] [CrossRef]
- Schwarz, N.; Bless, H.; Strack, F.; Klumpp, G.; Rittenauer-Schatka, H.; Simons, A. Ease of retrieval as information: Another look at the availability heuristic. J. Pers. Soc. Psychol. 1991, 61, 195–202. [Google Scholar] [CrossRef]
- McCloy, R.; Byrne, R.M.J.; Johnson-Laird, P.N. Understanding cumulative risk. Q. J. Exp. Psychol. 2010, 63, 499–515. [Google Scholar] [CrossRef]
- Moll, R.; Pieschl, S.; Bromme, R. Competent or clueless? Users’ knowledge and misperceptions about their online privacy management. Comput. Hum. Behav. 2014, 41, 212–219. [Google Scholar] [CrossRef]
- Moll, R.; Pieschl, S.; Bromme, R. Sharing in the dark? Target memory and risk awareness in online communication. In Proceedings of the 35th Annual Conference of the Cognitive Science Society, Berlin, Germany, 31 July–3 August 2013; Knauff, M., Pauen, M., Sebanz, N., Wachsmuth, I., Eds.; Cognitive Science Society: Austin, TX, USA, 2013; pp. 3092–3097. [Google Scholar]
- Pieschl, S.; Moll, R. For they know not what they do? Target memory and metacognitive monitoring of self-disclosures in Online Social Networks. Westfälische Wilhelms-Universität Münster: Münster, Germany, Unpublished work. 2014. [Google Scholar]
- Flavell, J.H. Metacognition and cognitive monitoring: A new area of cognitive-developmental inquiry. Am. Psychol. 1979, 34, 906–911. [Google Scholar] [CrossRef]
- Nelson, T.O.; Narens, L. Metamemory: A theoretical framework and new findings. Psychol. Learn. Motiv. 1990, 26, 125–173. [Google Scholar]
- Pieschl, S. Metacognitive calibration—An extended conceptualization and potential applications. Metacogn. Learn 2009, 4, 3–31. [Google Scholar] [CrossRef]
- Kruger, J.; Dunning, D. Unskilled and unaware of it: How difficulties in recognizing one’s own incompetence lead to inflated self-assessments. J. Pers. Soc. Psychol. 1999, 77, 1121–1134. [Google Scholar] [CrossRef] [PubMed]
- Alter, A.L.; Oppenheimer, D.M. Suppressing secrecy through metacognitive ease—Cognitive fluency encourages self-disclosure. Psychol. Sci. 2009, 20, 1414–1419. [Google Scholar] [CrossRef] [PubMed]
- Metcalfe, J.; Schwartz, B.L.; Joaquim, S.G. The cue-familiarity heuristic in metacognition. J. Exp. Psychol. Learn. 1993, 19, 851–864. [Google Scholar] [CrossRef]
- Molden, D.C.; Dweck, C.S. Finding ‘meaning’ in psychology: A lay theories approach to self-regulation, social perception, and social development. Am. Psychol. 2006, 61, 192–203. [Google Scholar] [CrossRef]
- Stutzman, F.; Capra, R.; Thompson, J. Factors mediating disclosure in Social Network Sites. Comput. Hum. Behav. 2011, 27, 590–598. [Google Scholar] [CrossRef]
- Anderson, C.A.; Lindsay, J.J. The development, perseverance, and change of naive theories. Soc. Cogn. Spec. Issue: Naive Theor. Soc. Judgm. 1998, 16, 8–30. [Google Scholar]
- Adler, P.S.; Kwon, S.-W. Social capital: Prospects for a new concept. Acad. Manag. Rev. 2002, 27, 17–40. [Google Scholar]
- 1Similar concepts are addressed as implicit, intuitive, lay, naïve, or folk theories.
© 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Moll, R.; Pieschl, S.; Bromme, R. Trust into Collective Privacy? The Role of Subjective Theories for Self-Disclosure in Online Communication. Societies 2014, 4, 770-784. https://doi.org/10.3390/soc4040770
Moll R, Pieschl S, Bromme R. Trust into Collective Privacy? The Role of Subjective Theories for Self-Disclosure in Online Communication. Societies. 2014; 4(4):770-784. https://doi.org/10.3390/soc4040770
Chicago/Turabian StyleMoll, Ricarda, Stephanie Pieschl, and Rainer Bromme. 2014. "Trust into Collective Privacy? The Role of Subjective Theories for Self-Disclosure in Online Communication" Societies 4, no. 4: 770-784. https://doi.org/10.3390/soc4040770