ABSTRACT
In this paper, we report on a qualitative study of how users manage their reputation online. We focus particularly on people who are bothered by content online about themselves and how they manage reputation damage and repair. We describe how users view reputation management chores as necessary but unpleasant, and how they feel disempowered to repair their online reputation. Participants were unable to identify feasible repair mechanisms and ultimately failed to resolve their problems. Given the current state of dysfunction indicated by our findings, we advocate for increased HCI research attention to this area.
- Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on Facebook. Proc. PET 2006, 36--58. Google ScholarDigital Library
- Andalo, D. Ban Cyber-Bullying Clips, Johnson to Urge Websites. The Guardian, April 10, 2007.Google Scholar
- Anderson, N. 'Algorithms Can Have Errors': One Man's Quest to Purge Horrific Pictures from His Google Results. Ars Technica, March 4, 2012.Google Scholar
- Angie's List. www.angieslist.comGoogle Scholar
- Ayalon, O., and Toch, E. Retrospective Privacy: Managing Longitudinal Privacy in Online Social Networks. Proc. Soups 2013, Article 4. Google ScholarDigital Library
- Barack, L. Protect Your (Online) Rep. Registered Rep, February 27, 2012.Google Scholar
- Bartow, A. Internet Defamation as Profit Center: The Monetization of Online Harassment. Harvard J. of Law and Gender 32, 2 (2009), 101--147.Google Scholar
- BeenVerified. www.beenverified.comGoogle Scholar
- Beyer, H., and Holtzblatt, K. Contextual Design: Defining Customer-Centered Systems. Morgan Kaufman, San Francisco, 1998. Google ScholarDigital Library
- Bilton, N. Erasing the Digital Past. The New York Times, April 1, 2011.Google Scholar
- Citron, D. K. Cyber Civil Rights. Boston University Law Review 89, 61 (2009), 61--125.Google Scholar
- Citron, D. K. and Franks, M. A. Criminalizing Revenge Porn. Wake Forest Law Review (forthcoming 2014).Google Scholar
- Crowell, G. Comprehensive Interview with Michael Roberts. ReelSEO.com, August 24, 2010.Google Scholar
- Daley, S. On Its Own, Europe Backs Web Privacy Fights. The New York Times, August 9, 2011.Google Scholar
- Davis, J. The Stalking of Korean Hip Hop Superstar Daniel Lee. Wired, April 24, 2012.Google Scholar
- DiMicco, J. M. and Millen, D. R. Identity Management: Multiple Presentations of Self in Facebook. Proc. Group 2007, 383--386. Google ScholarDigital Library
- DontDateHimGirl. www.dontdatehimgirl.comGoogle Scholar
- Ennals, R., Trushkowsky, B., and Agosta, J. M. Highlighting Disputed Claims on the Web. Proc. WWW 2010, 341--350. Google ScholarDigital Library
- Fahimy, G. Liable for Your Lies: Misrepresentation Law as a Mechanism for Regulating Behavior on Social Networking Sites. Pepperdine Law Review 39, 2 (2012), 367--421.Google Scholar
- Flynn, L. Google Says It Doesn't Plan to Change Search Results. The New York Times, April 13, 2004.Google Scholar
- Gawker. www.gawker.comGoogle Scholar
- Hollaback! www.ihollaback.comGoogle Scholar
- Ingram, M. Yes, Virginia, HR Execs Check Your Facebook Page. GigaOm, January 27, 2010.Google Scholar
- Jøsang, A., Ismail, R., and Boyd, C. A Survey of Trust and Reputation Systems for Online Service Provision. J. Decision Support Systems 43, 2 (2007), 618--644. Google ScholarDigital Library
- Kittur, A., Suh, B. and Chi, E. Can You Ever Trust a Wiki?: Impacting Perceived Trustworthiness in Wikipedia. Proc. CSCW 2008, 477--480. Google ScholarDigital Library
- Lampinen, A., et al. We're in It Together: Interpersonal Management of Disclosure in Social Network Services. Proc. CHI 2011, 3217--3226. Google ScholarDigital Library
- Liao, Q., and Shi, L. She Gets a Sports Car From Our Donation: Rumor Transmission in a Chinese Microblogging Community. Proc. CSCW 2013, 587--598. Google ScholarDigital Library
- Luca, M. and Georgios, Z. Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud. Harvard Business School Working Paper 14-006, 2013.Google Scholar
- Maag, C. A Hoax Turned Fatal Draws Anger but No Charges. The New York Times, November 28, 2007.Google Scholar
- Madden, M., and Smith, A. Reputation and Social Media. Pew Internet Report, May 26, 2010.Google Scholar
- Malaga, R. A. Web-based Reputation Management Systems: Problems and Suggested Solutions. Electronic Commerce Research 1, 4 (2001), 403--417. Google ScholarDigital Library
- Martinez, J. Harsh Reality for Hopefuls: You are What You Tweet. Politico, May 5, 2011.Google Scholar
- Marwick, A. E., and boyd, d. The Drama! Teen Conflict, Gossip, and Bullying in Networked Publics. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society 2011.Google Scholar
- Mayer-Schönberger, V. Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press, 2009. Google ScholarDigital Library
- McLaughlin, M. Mug Shot Websites Face Lawsuit Alleging Violations of Arrestee Publicity Rights. The Huffington Post, January 14, 2013.Google Scholar
- Munson, S. A., et al. Attitudes Toward Online Availability of US Public Records. Proc. dg.o 2011, 2--9. Google ScholarDigital Library
- MyLife. www.mylife.comGoogle Scholar
- Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. Proc. CHI 2003, 129--136. Google ScholarDigital Library
- Pasquale, F. Asterisk Revisited: Debating a Right of Reply on Search Results. J. Bus. & Tech. 3, 1 (2008), 61--85.Google Scholar
- Piett, T. How Law Enforcement Uses Social Media for Forensic Investigation. Mashable, February 3, 2012.Google Scholar
- Rate My Teachers. www.ratemyteachers.comGoogle Scholar
- Reputation Management Consultants. www.reputationmanagementconsultants.comGoogle Scholar
- Reputation.com. www.reputation.comGoogle Scholar
- Resnick, P., et al. Reputation Systems. CACM 43, 12 (2000), 45--48. Google ScholarDigital Library
- Ripoff Report. www.ripoffreport.comGoogle Scholar
- Schwarz, J. and Morris, M. R. Augmenting Web Pages and Search Results to Support Credibility Assessment. Proc. CHI 2011, 1245--1254. Google ScholarDigital Library
- Sleeper, M., et al. 'I read my Twitter the next morning and was astonished': A Conversational Perspective on Twitter Regrets. Proc. CHI 2013, 3277--3286. Google ScholarDigital Library
- Snapchat. www.snapchat.comGoogle Scholar
- Solove, D. J. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. Yale Univ. Press, 2007. Google ScholarDigital Library
- Sood, S., Antin, J., and Churchill, E. F. Profanity Use in Online Communities. Proc. CHI 2012, 1481--1490. Google ScholarDigital Library
- Sorensen, D. Protecting Your Company's Online Reputation. Direct Selling News, March 1, 2011.Google Scholar
- Stutzman, F. and Kramer-Duffield, J. Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. Proc. CHI 2010, 1553--1562. Google ScholarDigital Library
- Sullivan, P. Negative Online Data Can Be Challenged, at a Price. The New York Times, June 10, 2011.Google Scholar
- Thomas, D. R. A General Inductive Approach for Analyzing Qualitative Evaluation Data. American J. Evaluation 27, 2 (2006), 237--246.Google Scholar
- Wang, Y., et al. 'I regretted the minute I pressed share': A Qualitative Study of Regrets on Facebook. Proc. SOUPS 2011, Article 10. Google ScholarDigital Library
- Wonkette. www.wonkette.comGoogle Scholar
- Yelp. www.yelp.comGoogle Scholar
- Zhao, X., et al. The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Archive. Proc. CHI 2013, 1--10. Google ScholarDigital Library
Index Terms
- Necessary, unpleasant, and disempowering: reputation management in the internet age
Recommendations
Using TOPSIS and modified TOPSIS methods for evaluating the competitive advantages of internet shopping malls
Taking into consideration personal innovativeness on information technology, web quality dimension, information and e-service dimension, incentives and post purchase service and online reputation, this research explores how internet shopping malls to ...
Predicting the perceived quality of online mathematics contributions from users' reputations
CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsThere are two perspectives on the role of reputation in collaborative online projects such as Wikipedia or Yahoo! Answers. One, user reputation should be minimized in order to increase the number of contributions from a wide user base. Two, user ...
Sybil proof anonymous reputation management
SecureComm '08: Proceedings of the 4th international conference on Security and privacy in communication netowrksMany new Internet applications base on openness to externally contributed content. The numerous user contributions offer both opportunities and threats. A priori, the quality of those user-generated contributions is unknown. The customers have to decide ...
Comments