Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Smythe (1977)
Communications: Blindspot of Western MarxismCtheory, 1
David Mcdonald, Joseph McCarthy, Suzanne Soroczak, David Nguyen, A. Rashid (2008)
Proactive displays: Supporting awareness in fluid social environmentsACM Trans. Comput. Hum. Interact., 14
R. Clarke (1988)
Information technology and dataveillanceCommun. ACM, 31
Anthony Miyazaki (2008)
Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated PatronageJournal of Public Policy & Marketing, 27
H. Nissenbaum (2004)
Privacy as contextual integrityWashington Law Review, 79
Andrew Tappenden, James Miller (2009)
Cookies: A deployment study and the testing implicationsACM Trans. Web, 3
C. Fuchs (2010)
Social Software and Web 2.0: Their Sociological Foundations and Implications
R. Mansell (2002)
From Digital Divides to Digital Entitlements in Knowledge SocietiesCurrent Sociology, 50
Fernando Bermejo (2009)
Audience manufacture in historical perspective: from broadcasting to GoogleNew Media & Society, 11
B. Wellman, C. Haythornthwaite (2002)
The Internet in everyday lifeContemporary Sociology, 32
Kirsti Ala-Mutka, D. Broster, Romina Cachia, Isabel Mediavilla, C. Feijóo, A. Haché, S. Kluzer, Sven Lindmark, Wainer Lusoli, Gianluca Misuraca, Corina Pascu, Y. Punie, J. Albacete (2009)
The Impact of Social Computing on the EU Information Society and Economy
J. Rappaport (1987)
Terms of empowerment/exemplars of prevention: Toward a theory for community psychologyAmerican Journal of Community Psychology, 15
A. Barth, Anupam Datta, John Mitchell, H. Nissenbaum (2006)
Privacy and contextual integrity: framework and applications2006 IEEE Symposium on Security and Privacy (S&P'06)
Daniel Solove (2022)
The Digital Person
Zizi Papacharissi (2010)
Privacy as a luxury commodityFirst Monday, 15
Amelia Arsenault, M. Castells (2008)
The Structure and Dynamics of Global Multi-Media Business NetworksJournal of Communications
L. Kool, A. Plas, N. Eijk, N. Helberger, B. Sloot (2011)
A bite too big: dilemma's bij de implementatie van de Cookiewet in Nederland
J. Dijck, D. Nieborg (2009)
Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestosNew Media & Society, 11
M. Graber, D. D'Alessandro, Jill Johnson-West (2002)
Reading level of privacy policies on Internet health Web sites.The Journal of family practice, 51 7
Purpose – The advent of Web 2.0 or so‐called social media have enabled a new kind of communication, called mass self‐communication. These tools and the new form of communication are believed to empower users in everyday life. The authors of this paper observe a paradox: if this positive potential is possible, the negative downside is also possible. There is often a denial of this downside and it is especially visible in social media at the level of privacy and dataveillance. The purpose of this paper is to illustrate this point through an analysis of cookies. Design/methodology/approach – The paper illustrates how mass self‐communication in social media enables a new form of vulnerability for privacy. This is best shown by redefining privacy as flows of Personal Identifiable Information (PII) that are regulated by informational norms of Nissenbaum's concept of contextual integrity. Instead of analysing these contexts on a general level, the paper operationalises them on the user level to illustrate the lack of user awareness regarding cookies. The results of the research were gathered through desk research and expert interviews. Findings – The positive aspects of cookies, unobtrusiveness and ease of use, are also the main challenges for user privacy. This technology can be disempowering because users are often hardly aware of its existence. In that way cookies can obfuscate the perceived context of personal data exposure. Originality/value – The research shows how user disempowerment in social media is often overlooked by overstressing their beneficial potential.
Info – Emerald Publishing
Published: Sep 27, 2011
Keywords: Cookies; PII; Privacy; Social media; Web 2.0
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.