ABSTRACT
Within Human-Computer Interaction and Internet Studies there is a growing interest in non-users, which articulates the increasingly diverse modes of digital media engagement that slip between established categories of user/non-user, online/offline and self/other. In this paper we aim to build on these concerns and their disciplinary intersections to map emerging forms of computer interaction and social media participation that can be grouped together under the concept of proxy users -- intermediaries that act on behalf of others. This preliminary mapping work, surveying a number of research projects and studies involving the authors, begins to trace the diversity of agents, roles, contexts, and motivations of proxy users.
- Alper, M. Digital Youth with Disabilities. The MIT Press Cambridge, Massachusetts (2014).Google ScholarCross Ref
- Barthel, R., Mackley, K. L., Hudson-Smith A., Karpovich, A., de Jode, M., and Speed, C. An Internet of Old Things as an Augmented Memory System. Personal Ubiquitous Computing 17 (2013), 321--333. Google ScholarDigital Library
- boyd, d. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications. In Z. Papacharissi, ed. A Networked Self: Identity, Community, and Culture on Social Network Sites. New York: Routledge (2010), 39--58.Google Scholar
- Brubaker, J. R., and Vertesi, J. Death and the Social Network. Proc. CHI 2010 Workshop on HCI at the End of Life: Understanding Death, Dying, and the Digital (2010).Google Scholar
- Brubaker, J. R., Ananny, M., and Crawford, K. Departing Glances: A Sociotechnical Account of 'Leaving' Grindr. New Media & Society, DOI: 10.1177/1461444814542311Google Scholar
- Ebert, R. TWEET! TWEET! TWEET! Robert Ebert's Journal. 11 June 2010.Google Scholar
- Gallicano, T., Brett, K. and Hopp, T. Is Ghost Blogging Like Speechwriting? A survey of practitioners about the ethics of ghost blogging. Public Relations Journal, 7. 3 (2013), 1--41Google Scholar
- Hutchinson, J. I Can Haz Likes: Cultural Intermediation to Facilitate "Petworking" M/C Journal 17, 2 (2014).Google ScholarCross Ref
- Karppi, T. 'Change Name To No One. Like People's Status': Facebook Trolling and Managing Online Personas. Fibreculture Journal 22 (2013).Google Scholar
- Kleenman, J. Web Immortality: The Social Media Sites that Keep You Alive in the Digital World. The Guardian, 7 June, 2014.Google Scholar
- Kennedy, J., Arnold, M., Nansen, B., Wilken, R., and Gibbs, M. Digital Housekeepers and Digital Expertise in the Networked Home. Convergence 21, 4 (2015), 408--422.Google Scholar
- Kumar, P., and Schoenebeck, S. The Modern Day Baby Book: Enacting Good Mothering and Stewarding Privacy on Facebook. Proceedings of CSCW 2015, March 14-18, Vancouver, Canada (2015). Google ScholarDigital Library
- Light, B. and Cassidy, E. Strategies or the Suspension and Prevention of Disconnection: Rendering Disconnection as Socioecenomic Lubricant with Facebook. New Media & Society 16, 7 (2014), 1169--1184.Google ScholarCross Ref
- Marwick, A. and boyd, d. To See and Be Seen: Celebrity Practice on Twitter. Convergence 17, 2 (2011), 139--158.Google Scholar
- Meese, J., Gibbs, M., Carter, M., Arnold, M., Nansen, B., Kohn, T. Selfies at Funerals: Mourning and Presencing on Social Media Platforms. International Journal of Communication 9 (2015), 1818--1831.Google Scholar
- Nansen, B. Accidental, Assisted, Automated: An Emerging Repertoire of Infant Mobile Media Techniques. M/C Journal 18, 5 (2015).Google ScholarCross Ref
- Nansen, B., and Jayamene, D. Infants, Interfaces, and Intermediation: Digital Parenting in the Production of 'iPad Baby' YouTube Videos. Journal of Broadcasting and Electronic Media (forthcoming).Google Scholar
- Nansen, B., Arnold, M., Wilken, R., and Gibbs, M. Users and Non-Users of Next Generation Broadband. Proceedings of the 14th Annual Conference of the Association of Internet Researchers (2013).Google Scholar
- Odom, W., Harper, R., Sellen, A., Kirk, D., and Banks, R. Passing On & Putting To Rest: Understanding Bereavement in the Context of Interactive Technologies. Proc. of the SIGCHI conference on Human Factors in computing systems (2010), 1831--1840. Google ScholarDigital Library
- Papacharissi, Z. The Presentation of Self in Virtual Life: Characteristics of Personal Home Pages. Journalism and Mass Communication Quarterly, 79, 3 (2002), 643--660.Google ScholarCross Ref
- Park, S., Middleton, C., and Allen, M. Conceptualizing the (Non) Users of the Internet. Proceedings of the 14th Annual Conference of the Association of Internet Researchers (2013).Google Scholar
- Portwood-Stacer, L. Media Refusal and Conspicuous Non-Consumption: The Performative and Political Dimensions of Facebook Abstention. New Media & Society 15, 7 (2013), 1041--1057.Google Scholar
- Ronson, J. So You've Been Publicly Shamed. Pan Macmillan, London (2015).Google Scholar
- Russell, N. Death and Life in Cyberspace. Sunday Star Times, 11 March 2012.Google Scholar
- Satchell, C. and Dourish, P. Beyond the User: Use and Non-Use in HCI. In Proc. OZCHI 2009, ACM Press (2009). Google ScholarDigital Library
- Selwyn, N. Exploring the Role of Children in Adults' Adoption and Use of Computers. Information Technology & People 17, 1 (2004), 53--70.Google ScholarCross Ref
- Tolmie P., Crabtree A., Rodden T., et al. Making the Home Network at Home: Digital Housekeeping. In Proceedings of the European Conference on Computer-Supported Cooperative Work (2007).Google ScholarCross Ref
- Warschauer, M. Technology and Social Inclusion: Rethinking the Digital Divide. MIT Press, Cambridge (2003). Google ScholarDigital Library
- Wyatt, S. Non-Users Also Matter: The Construction of Users and Non-Users of the Internet. In Pinch and Oudshoorn, eds. How Users Matter. MIT Press, Cambridge (2003), 67--79.Google Scholar
Index Terms
- Proxy Users, Use By Proxy: Mapping Forms of Intermediary Interaction
Recommendations
MASTH proxy: an extensible platform for web overload control
WWW '09: Proceedings of the 18th international conference on World wide webMany overload control mechanisms for Web based applications aim to prevent overload by setting limits on factors such as admitted load, number of server threads, buffer size. For this they need online measurements of metrics such as response time, ...
A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies
The Domain Name System (DNS) provides a critical service for the Internet -- mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard set of metrics quantifying the Quality of Domain Name Service (QoDNS), let ...
Comments