skip to main content
research-article

Participating Through Data: Charting Relational Tensions in Multiplatform Data Flows

Published:01 November 2018Publication History
Skip Abstract Section

Abstract

Engagements with social media today frequently involve the use of multiple platforms, which often exchange personal data about users. We explore individuals' experiences with the flow of personal data across platforms through interviews about dating apps, often requiring integration with a Facebook account. Inductive analysis revealed complex and, at times, conflicted ideas over what appropriate behaviors around personal data should look like in multiplatform engagements-central to these tensions were the multiple relationships that must be managed through participation in these ecosystems. For example, individuals talked of resignation in relation to specific platforms and the 'cost" of using free services (people:platform), a lack of clarity and agency in defining what personal data might be shared between platforms (people:platform:platform), and, of course, the role of personal data in their efforts to establish and maintain relationships with other users in these 'social discovery" ecosystems (people:people). We explore how these attitudes can be understood as morally charged, drawing attention to the ways in which personal data flows can enact expectations and obligations between various sociotechnical actors in personal data ecosystems and how these compound relationships reveal the complexity and texture of multiplatform participation.

References

  1. Adams, T. 2018. Facebook's week of shame: the Cambridge Analytica fallout. The Guardian.Google ScholarGoogle Scholar
  2. Angwin, J. et al. 2017. Facebook (Still) Letting Housing Advertisers Exclude Users by Race. ProPublica.Google ScholarGoogle Scholar
  3. Angwin, J. and Parris, Jr., T. 2016. Facebook Lets Advertisers Exclude Users by Race. ProPublica.Google ScholarGoogle Scholar
  4. Beyer, H. and Holtzblatt, K. 1997. Contextual Design: Defining Customer-Centered Systems. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bødker, S. and Klokmose, C.N. 2012. Dynamics in Artifact Ecologies. Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (New York, NY, USA, 2012), 448--457. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Coughlan, T. et al. 2012. The conceptual framing, design and evaluation of device ecologies for collaborative activities. International Journal of Human-Computer Studies. 70, 10 (Oct. 2012), 765--779. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Crabtree, A. et al. 2016. Enabling the New Economic Actor: Data Protection, the Digital Economy, and the Databox. Personal Ubiquitous Comput. 20, 6 (Nov. 2016), 947--957. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dearman, D. and Pierce, J. 2008. It's on my other computer!: computing with multiple devices. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, Ny, USA, 2008), 767--776. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dillet, R. 2016. Instagrammers really want you to turn on notifications to avoid death by algorithm. TechCrunch.Google ScholarGoogle Scholar
  10. Dourish, P. et al. 1996. Your place or mine? Learning from long-term use of Audio-Video communication. Computer Supported Cooperative Work (CSCW). 5, 1 (Mar. 1996), 33--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dourish, P. and Anderson, K. 2006. Collective Information Practice: Emploring Privacy and Security As Social and Cultural Phenomena. Hum.-Comput. Interact. 21, 3 (Sep. 2006), 319--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Egelman, S. 2013. My Profile is My Password, Verify Me!: The Privacy/Convenience Tradeoff of Facebook Connect. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2013), 2369--2378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ellison, N. et al. 2006. Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication. 11, 2 (Jan. 2006), 415--441.Google ScholarGoogle ScholarCross RefCross Ref
  14. Erickson, I. and Jarrahi, M.H. 2016. Infrastructuring and the Challenge of Dynamic Seams in Mobile Knowledge Work. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (New York, NY, USA, 2016), 1323--1336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Eslami, M. et al. 2015. 'I always assumed that I wasn't really that close to {her}": Reasoning about Invisible Algorithms in News Feeds. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (2015), 153--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Forlizzi, J. 2008. The Product Ecology: Understanding Social Product Use and Supporting Design Culture. International Journal of Design. 2, 1 (2008).Google ScholarGoogle Scholar
  17. Gibbs, J.L. et al. 2011. First Comes Love, Then Comes Google: An Investigation of Uncertainty Reduction Strategies and Self-Disclosure in Online Dating. Communication Research. 38, 1 (Feb. 2011), 70--100.Google ScholarGoogle ScholarCross RefCross Ref
  18. González, V.M. and Juárez, R. 2013. How Do You Understand Twitter?: Analyzing Mental Models, Understanding and Learning about Complex Interactive Systems. Human Computer Interaction. Springer, Cham. 103--110.Google ScholarGoogle Scholar
  19. Guadagno, R.E. et al. 2012. Dating deception: Gender, online dating, and exaggerated self-presentation. Computers in Human Behavior. 28, 2 (Mar. 2012), 642--647. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Houben, S. et al. 2014. ActivitySpace: Managing Device Ecologies in an Activity-Centric Configuration Space. Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces (New York, NY, USA, 2014), 119--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Isaacs, E. et al. 2012. Integrating Local and Remote Worlds Through Channel Blending. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (New York, NY, USA, 2012), 617--626. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Jokela, T. et al. 2015. A Diary Study on Combining Multiple Information Devices in Everyday Activities and Tasks. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (New York, NY, USA, 2015), 3903--3912. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jung, H. et al. 2008. Toward a Framework for Ecologies of Artifacts: How Are Digital Artifacts Interconnected Within a Personal Life? Proceedings of the 5th Nordic Conference on Human-computer Interaction: Building Bridges (New York, NY, USA, 2008), 201--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Jung, H. et al. 2008. Toward a Framework for Ecologies of Artifacts: How Are Digital Artifacts Interconnected Within a Personal Life? Proceedings of the 5th Nordic Conference on Human-computer Interaction: Building Bridges (New York, NY, USA, 2008), 201--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Koh, Y. 2016. Twitter to Expand Tweet's 140-Character Limit to 10,000. Wall Street Journal.Google ScholarGoogle Scholar
  26. Kramer, A.D.I. et al. 2014. Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences. 111, 24 (Jun. 2014), 8788--8790.Google ScholarGoogle ScholarCross RefCross Ref
  27. Krasnova, H. et al. 2014. Dangers of 'Facebook Login' for Mobile Apps: Is There a Price Tag for Social Information? ICIS 2014 Proceedings. (Dec. 2014).Google ScholarGoogle Scholar
  28. Krasnova, H. et al. 2013. Does This App Ask For Too Much Data? The Role Of Privacy Perceptions In User Behavior Towards Facebook Applications And Permission Dialogs. ECIS 2013 Completed Research. (Jul. 2013).Google ScholarGoogle Scholar
  29. Madianou, M. and Miller, D. 2013. Polymedia: Towards a new theory of digital media in interpersonal communication. International Journal of Cultural Studies. 16, 2 (Mar. 2013), 169--187.Google ScholarGoogle ScholarCross RefCross Ref
  30. Marwick, A.E. and Boyd, D. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society. 13, 1 (Feb. 2011), 114--133.Google ScholarGoogle ScholarCross RefCross Ref
  31. Marwick, A.E. and Boyd, D. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society. (Jul. 2014), 1461444814543995.Google ScholarGoogle Scholar
  32. Nissenbaum, H. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Oulasvirta, A. and Sumari, L. 2007. Mobile Kits and Laptop Trays: Managing Multiple Devices in Mobile Information Work. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2007), 1127--1136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Proferes, N. 2017. Information Flow Solipsism in an Exploratory Study of Beliefs About Twitter. Social Media + Society. 3, 1 (Mar. 2017), 2056305117698493.Google ScholarGoogle Scholar
  35. Rader, E. and Gray, R. 2015. Understanding user beliefs about algorithmic curation in the Facebook news feed. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (2015), 173--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Ringland, K.E. et al. 2016. "Will I Always Be Not Social?": Re-Conceptualizing Sociality in the Context of a Minecraft Community for Autism. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), 1256--1269. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Santosa, S. and Wigdor, D. 2013. A Field Study of Multi-device Workflows in Distributed Workspaces. Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (New York, NY, USA, 2013), 63--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Satchell, C. and Dourish, P. 2011. The moral economy of social media. From Social Butterfly to Engaged Citizen?: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. M. Foth et al., eds. MIT Press. 21--37.Google ScholarGoogle Scholar
  39. Shklovski, I. et al. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (New York, NY, USA, 2014), 2347--2356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Someren, M.W. van et al. 1994. The think aloud method: a practical guide to modelling cognitive processes. Academic Press.Google ScholarGoogle Scholar
  41. Sørensen, H. and Kjeldskov, J. 2014. Concepts of multi-artifact systems in artifact ecologies. ACHI 2014 - 7th International Conference on Advances in Computer-human Interactions. (2014), 141--146.Google ScholarGoogle Scholar
  42. Stolterman, E. et al. 2013. Device Landscapes?: A New Challenge to Interaction Design and HCI Research. Archives of Design Research. 26 (2), (2013), 7--33.Google ScholarGoogle Scholar
  43. Thompson, E.P. 1971. The Moral Economy of the English Crowd in the Eighteenth Century. Past & Present. 50 (1971), 76--136.Google ScholarGoogle ScholarCross RefCross Ref
  44. Tolmie, P. and Crabtree, A. 2018. The Practical Politics of Sharing Personal Data. Personal Ubiquitous Comput. 22, 2 (Apr. 2018), 293--315. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Toma, C.L. et al. 2008. Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles. Personality and Social Psychology Bulletin. 34, 8 (Aug. 2008), 1023--1036.Google ScholarGoogle ScholarCross RefCross Ref
  46. Toma, C.L. and Hancock, J.T. 2010. Looks and Lies: The Role of Physical Attractiveness in Online Dating Self-Presentation and Deception. Communication Research. 37, 3 (Jun. 2010), 335--351.Google ScholarGoogle ScholarCross RefCross Ref
  47. Turner, T. et al. 2010. Exploring the Workplace Communication Ecology. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2010), 841--850. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Vasiliou, C. et al. 2015. An Artifact Ecology in a Nutshell: A Distributed Cognition Perspective for Collaboration and Coordination. Human-Computer Interaction -- INTERACT 2015 (Sep. 2015), 55--72.Google ScholarGoogle Scholar
  49. Vertesi, J. et al. 2016. Data Narratives: Uncovering Tensions in Personal Data Management. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (New York, NY, USA, 2016), 478--490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Vertesi, J. 2014. Seamful Spaces: Heterogeneous Infrastructures in Interaction. Science, Technology, & Human Values. 39, 2 (Mar. 2014), 264--284.Google ScholarGoogle Scholar
  51. Voida, A. et al. 2013. Turbulence in the Clouds: Challenges of Cloud-based Information Work. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2013), 2273--2282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Watson-Manheim, M.B. and Bélanger, F. 2007. Communication Media Repertoires: Dealing with the Multiplicity of Media Choices. MIS Quarterly. 31, 2 (2007), 267--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Wolf, C.T. and Veinot, T.C. 2015. Struggling for space and finding my place: An interactionist perspective on everyday use of biomedical information. Journal of the Association for Information Science and Technology. 66, 2 (Feb. 2015), 282--296. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Participating Through Data: Charting Relational Tensions in Multiplatform Data Flows

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 2, Issue CSCW
      November 2018
      4104 pages
      EISSN:2573-0142
      DOI:10.1145/3290265
      Issue’s Table of Contents

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 November 2018
      Published in pacmhci Volume 2, Issue CSCW

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader