Learn More
This paper investigates the uses of social networking site Facebook, and the gratifications users derive from those uses. In the first study, 137 users generated words or phrases to describe how they used Facebook, and what they enjoyed about their use. These phrases were coded into 46 items which were completed by 241 Facebook users in Study 2. Factor(More)
As the Internet grows in importance, concerns about online privacy have arisen. We describe the development and validation of three short Internet-administered scales measuring privacy related attitudes ('Privacy Concern') and behaviors ('General Caution' and 'Technical Protection'). Internet Privacy Scales 1 In Press: Journal of the American Society for(More)
Formed on an analysis of design practices, the behaviour chain model stipulates that social network designer's ultimate aim is to encourage users to adopt the social network site by entering a phase of true commitment. During this phase, social network users are driven to connect to known or unknown others by engaging in instrumental uses that create value(More)
A growing body of research has been exploring the use of control mechanisms to address the privacy concerns raised by location-tracking technology. We report on a qualitative study of two family groups who used a custom-built tracking application for an extended period of time. Akin to sociological breaching experiments, the study focuses on the(More)
  • A Joinson
  • 1999
It has been argued that behavior on the Internet differs from similar behavior in the "real world" (Joinson, 1998a). In the present study, participants completed measures of self-consciousness, social anxiety, self-esteem, and social desirability, using either the World-Wide Web (WWW) or pen and paper, and were assigned to either an anonymous or a(More)
Candid self-disclosure is desirable for many behavioral science studies. Although there is ample evidence that self-disclosure is increased when people communicate or participate in research over the Internet, few studies have looked at ways of increasing this effect. In the present pilot study, participants were randomly allocated to either a condition in(More)
Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number of limitations on the methods that can be effectively employed. We discuss how we addressed this problem in an empirical study of mobile(More)