skip to main content
10.1145/2556288.2557126acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access

Necessary, unpleasant, and disempowering: reputation management in the internet age

Published:26 April 2014Publication History

ABSTRACT

In this paper, we report on a qualitative study of how users manage their reputation online. We focus particularly on people who are bothered by content online about themselves and how they manage reputation damage and repair. We describe how users view reputation management chores as necessary but unpleasant, and how they feel disempowered to repair their online reputation. Participants were unable to identify feasible repair mechanisms and ultimately failed to resolve their problems. Given the current state of dysfunction indicated by our findings, we advocate for increased HCI research attention to this area.

References

  1. Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on Facebook. Proc. PET 2006, 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Andalo, D. Ban Cyber-Bullying Clips, Johnson to Urge Websites. The Guardian, April 10, 2007.Google ScholarGoogle Scholar
  3. Anderson, N. 'Algorithms Can Have Errors': One Man's Quest to Purge Horrific Pictures from His Google Results. Ars Technica, March 4, 2012.Google ScholarGoogle Scholar
  4. Angie's List. www.angieslist.comGoogle ScholarGoogle Scholar
  5. Ayalon, O., and Toch, E. Retrospective Privacy: Managing Longitudinal Privacy in Online Social Networks. Proc. Soups 2013, Article 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Barack, L. Protect Your (Online) Rep. Registered Rep, February 27, 2012.Google ScholarGoogle Scholar
  7. Bartow, A. Internet Defamation as Profit Center: The Monetization of Online Harassment. Harvard J. of Law and Gender 32, 2 (2009), 101--147.Google ScholarGoogle Scholar
  8. BeenVerified. www.beenverified.comGoogle ScholarGoogle Scholar
  9. Beyer, H., and Holtzblatt, K. Contextual Design: Defining Customer-Centered Systems. Morgan Kaufman, San Francisco, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bilton, N. Erasing the Digital Past. The New York Times, April 1, 2011.Google ScholarGoogle Scholar
  11. Citron, D. K. Cyber Civil Rights. Boston University Law Review 89, 61 (2009), 61--125.Google ScholarGoogle Scholar
  12. Citron, D. K. and Franks, M. A. Criminalizing Revenge Porn. Wake Forest Law Review (forthcoming 2014).Google ScholarGoogle Scholar
  13. Crowell, G. Comprehensive Interview with Michael Roberts. ReelSEO.com, August 24, 2010.Google ScholarGoogle Scholar
  14. Daley, S. On Its Own, Europe Backs Web Privacy Fights. The New York Times, August 9, 2011.Google ScholarGoogle Scholar
  15. Davis, J. The Stalking of Korean Hip Hop Superstar Daniel Lee. Wired, April 24, 2012.Google ScholarGoogle Scholar
  16. DiMicco, J. M. and Millen, D. R. Identity Management: Multiple Presentations of Self in Facebook. Proc. Group 2007, 383--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. DontDateHimGirl. www.dontdatehimgirl.comGoogle ScholarGoogle Scholar
  18. Ennals, R., Trushkowsky, B., and Agosta, J. M. Highlighting Disputed Claims on the Web. Proc. WWW 2010, 341--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fahimy, G. Liable for Your Lies: Misrepresentation Law as a Mechanism for Regulating Behavior on Social Networking Sites. Pepperdine Law Review 39, 2 (2012), 367--421.Google ScholarGoogle Scholar
  20. Flynn, L. Google Says It Doesn't Plan to Change Search Results. The New York Times, April 13, 2004.Google ScholarGoogle Scholar
  21. Gawker. www.gawker.comGoogle ScholarGoogle Scholar
  22. Hollaback! www.ihollaback.comGoogle ScholarGoogle Scholar
  23. Ingram, M. Yes, Virginia, HR Execs Check Your Facebook Page. GigaOm, January 27, 2010.Google ScholarGoogle Scholar
  24. Jøsang, A., Ismail, R., and Boyd, C. A Survey of Trust and Reputation Systems for Online Service Provision. J. Decision Support Systems 43, 2 (2007), 618--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Kittur, A., Suh, B. and Chi, E. Can You Ever Trust a Wiki?: Impacting Perceived Trustworthiness in Wikipedia. Proc. CSCW 2008, 477--480. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Lampinen, A., et al. We're in It Together: Interpersonal Management of Disclosure in Social Network Services. Proc. CHI 2011, 3217--3226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Liao, Q., and Shi, L. She Gets a Sports Car From Our Donation: Rumor Transmission in a Chinese Microblogging Community. Proc. CSCW 2013, 587--598. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Luca, M. and Georgios, Z. Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud. Harvard Business School Working Paper 14-006, 2013.Google ScholarGoogle Scholar
  29. Maag, C. A Hoax Turned Fatal Draws Anger but No Charges. The New York Times, November 28, 2007.Google ScholarGoogle Scholar
  30. Madden, M., and Smith, A. Reputation and Social Media. Pew Internet Report, May 26, 2010.Google ScholarGoogle Scholar
  31. Malaga, R. A. Web-based Reputation Management Systems: Problems and Suggested Solutions. Electronic Commerce Research 1, 4 (2001), 403--417. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Martinez, J. Harsh Reality for Hopefuls: You are What You Tweet. Politico, May 5, 2011.Google ScholarGoogle Scholar
  33. Marwick, A. E., and boyd, d. The Drama! Teen Conflict, Gossip, and Bullying in Networked Publics. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society 2011.Google ScholarGoogle Scholar
  34. Mayer-Schönberger, V. Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. McLaughlin, M. Mug Shot Websites Face Lawsuit Alleging Violations of Arrestee Publicity Rights. The Huffington Post, January 14, 2013.Google ScholarGoogle Scholar
  36. Munson, S. A., et al. Attitudes Toward Online Availability of US Public Records. Proc. dg.o 2011, 2--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. MyLife. www.mylife.comGoogle ScholarGoogle Scholar
  38. Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. Proc. CHI 2003, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Pasquale, F. Asterisk Revisited: Debating a Right of Reply on Search Results. J. Bus. & Tech. 3, 1 (2008), 61--85.Google ScholarGoogle Scholar
  40. Piett, T. How Law Enforcement Uses Social Media for Forensic Investigation. Mashable, February 3, 2012.Google ScholarGoogle Scholar
  41. Rate My Teachers. www.ratemyteachers.comGoogle ScholarGoogle Scholar
  42. Reputation Management Consultants. www.reputationmanagementconsultants.comGoogle ScholarGoogle Scholar
  43. Reputation.com. www.reputation.comGoogle ScholarGoogle Scholar
  44. Resnick, P., et al. Reputation Systems. CACM 43, 12 (2000), 45--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Ripoff Report. www.ripoffreport.comGoogle ScholarGoogle Scholar
  46. Schwarz, J. and Morris, M. R. Augmenting Web Pages and Search Results to Support Credibility Assessment. Proc. CHI 2011, 1245--1254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Sleeper, M., et al. 'I read my Twitter the next morning and was astonished': A Conversational Perspective on Twitter Regrets. Proc. CHI 2013, 3277--3286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Snapchat. www.snapchat.comGoogle ScholarGoogle Scholar
  49. Solove, D. J. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. Yale Univ. Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Sood, S., Antin, J., and Churchill, E. F. Profanity Use in Online Communities. Proc. CHI 2012, 1481--1490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Sorensen, D. Protecting Your Company's Online Reputation. Direct Selling News, March 1, 2011.Google ScholarGoogle Scholar
  52. Stutzman, F. and Kramer-Duffield, J. Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. Proc. CHI 2010, 1553--1562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Sullivan, P. Negative Online Data Can Be Challenged, at a Price. The New York Times, June 10, 2011.Google ScholarGoogle Scholar
  54. Thomas, D. R. A General Inductive Approach for Analyzing Qualitative Evaluation Data. American J. Evaluation 27, 2 (2006), 237--246.Google ScholarGoogle Scholar
  55. Wang, Y., et al. 'I regretted the minute I pressed share': A Qualitative Study of Regrets on Facebook. Proc. SOUPS 2011, Article 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Wonkette. www.wonkette.comGoogle ScholarGoogle Scholar
  57. Yelp. www.yelp.comGoogle ScholarGoogle Scholar
  58. Zhao, X., et al. The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Archive. Proc. CHI 2013, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Necessary, unpleasant, and disempowering: reputation management in the internet age

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2014
      4206 pages
      ISBN:9781450324731
      DOI:10.1145/2556288

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 April 2014

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '14 Paper Acceptance Rate465of2,043submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader