39
1 Renee Powers COMM 500 - Rojecki December 11, 2012 Compulsory Participation in Social Networking Sites: Exploring Why We Share We have become reliant on social media to prove our existence. We check in on Foursquare, review our favorite coffee spots on Yelp, connect with our friends on Facebook, take photos of our pets on Instagram, pin our wish lists on Pinterest, share our thoughts on Tumblr and Wordpress, and tell our followers what we are eating for lunch on Twitter. Subsequently, targeted advertisements follow our digital footprints and market products specifically catered to us as individuals. Beyond commercial interests, if an individual vaguely threatens the President of the United States through a status update, it is only a matter of time before law enforcement agents are knocking on his or her door. If we know that companies and our government are watching us, why are we so willing to share personal information online? Is this simply a new cultural moment of sharing or is it something more sinister?

Compulsory Participation in Social Networking Sites: Exploring Why We Share

Embed Size (px)

DESCRIPTION

Final paper for COMM 500: Introduction to Communication Research at University of Illinois at Chicago

Citation preview

Page 1: Compulsory Participation in Social Networking Sites: Exploring Why We Share

1

Renee PowersCOMM 500 - Rojecki

December 11, 2012

Compulsory Participation in Social Networking Sites: Exploring Why We Share

We have become reliant on social media to prove our existence. We check in on

Foursquare, review our favorite coffee spots on Yelp, connect with our friends on

Facebook, take photos of our pets on Instagram, pin our wish lists on Pinterest, share our

thoughts on Tumblr and Wordpress, and tell our followers what we are eating for lunch

on Twitter. Subsequently, targeted advertisements follow our digital footprints and

market products specifically catered to us as individuals. Beyond commercial interests, if

an individual vaguely threatens the President of the United States through a status update,

it is only a matter of time before law enforcement agents are knocking on his or her door.

If we know that companies and our government are watching us, why are we so willing

to share personal information online? Is this simply a new cultural moment of sharing or

is it something more sinister?

A shift in social norms

Pew Internet Research and American Life Project found that 66 percent of

American adults use social networking sites (Smith, 2011). For the most part, users cite

keeping in touch with family and friends, old and new, as the primary reasons for joining

sites like Facebook, Twitter, and LinkedIn. A second Pew Internet study found that

Facebook users have more close friends and receive more social support than most

people (Hampton, et al., 2011), which suggests that social networking sites may enhance

a user’s quality of life. As more of our offline friends benefit from these sites, our

Page 2: Compulsory Participation in Social Networking Sites: Exploring Why We Share

2

interpersonal connections become increasingly active online. When our friends join, we

feel the need to join as well.

In a study of how teenagers use social networking sites, danah boyd (2007)

discusses the expected sociability of online spaces like MySpace. She finds that many

teens feel compelled to join because their friends are all members of the site. For those

who resist joining for political reasons (MySpace is owned by NewsCorp) or because

they do not think it is “cool,” boyd notes that many actually do maintain profiles but do

not visit the site as often. To put it succinctly, she writes: “Teens often turn to sites like

MySpace for entertainment; social voyeurism passes time while providing insight into

society at large” (boyd, 2007, p. 10). Not only do teens use these online spaces for

socializing, but it is clear they also use them to learn about the world around them. As

social networking sites like Facebook broaden their audiences beyond teenagers, the

impetus to join our friends online becomes even stronger. But what is it about this

moment that makes sharing personal information and connecting with our friends online

so enticing?

Michael Stefanone, Derek Lackaff, and Devan Rosen (2010) identify an increase

in the popularity of reality television and a corresponding increase in social networking

use. They suggest that social networking users take their cues from reality television in

that these programs invite us to share. The goal is to become famous in our own circles

through our mediated identities: “The [social networking site] platform both enables and

encourages activities traditionally associated with celebrity, such as the primacy of image

and appearance in social interaction” (Stefanone et al., 2010, p. 513), much like when a

celebrity appears on a talk show. The authors point out that reality television suggests

Page 3: Compulsory Participation in Social Networking Sites: Exploring Why We Share

3

anyone can be a public celebrity. Social networking sites are the realization and

reproduction of this notion. Therefore, because our friends are members of these social

networks, we feel compelled to join. And because of our fascination with reality

celebrities, we are inspired to share personal details of our life for the smallest

resemblance of fame. Users need not be computer geniuses; social networking sites make

connecting and sharing simple.

Nancy Van House (2009) suggests that sharing on social networking is simply

easy, and that is the primary motivation for willingly doing so. In her discussion of digital

photo sharing, she reasons that individuals merely do not have time to sit through a

slideshow of vacation pictures, thus they prefer to share the photos through image-based

social networking sites like Flickr. Not only is sharing information simple, it is

encouraged. Social networking sites advance excessive sharing through their

technological design. In its update box, Twitter used to ask, “What are you doing?” and

now it asks, “What’s going on?” Facebook asks, “What’s on your mind?” All of our

friends are answering these questions, sharing tidbits of their lives to feel a bit more like

their favorite celebrities, and doing so with ease. Yet many wonder what is so compelling

about sharing with your friends the contents of your dinner.

Jose Van Dijck (2011) writes that social networking values the everyday: “The

value of textual communication in real time lies in an everyday routine that favours

phatic rather than cognitive messages” (p. 340). Thus, it seems reasonable to conclude

that we feel compelled to participate in social networking sites for the simple reason that

they exist, are easy to access, and because our existing (offline) social networks

participate as well. It is no wonder that we feel as though we do not exist unless we are

Page 4: Compulsory Participation in Social Networking Sites: Exploring Why We Share

4

plugged in. As one teenager notes, “If you’re not on MySpace, you don’t exist” (boyd,

2006, p. 1).

Social networking use is characterized and determined by a number of factors. As

I have shown, many users desire to keep in touch with friends and family, some use

social media become their own celebrity, others recognize how easy it is to distribute

digital photographs on social networks, and every user is encouraged to share. No longer

is the internet the domain of geeks or computer nerds. With social networking technology

literally in our pockets, connecting online is for everyone and for every reason. Social

networking use has become nearly compulsory and omnipresent. We feel the need to

participate because we fear being left out. We share because we see our friends share. In

other words, “In technologically mediated sociality, being seen by those we wish to be

seen by, in ways we wish to be seen, and thereby engaging in identity expression,

communication and impression management are central motivations” (Tufekci, 2008, p.

21). It is possible that the participatory culture cultivated by new media technologies

points to a cultural moment of sharing. That would be the simple explanation. However,

our friends are not the only ones reading our status updates and benefitting from our

check-ins, likes, and connections. This ubiquitous sharing leads to an erosion of privacy

on a grand and unprecedented scale. We must consider the states and corporations that

gain from our seemingly compulsory sharing.

The popular press attempts to explain who is watching us

Who is watching us? In short, everyone is. Our peers, our government,

companies, and ourselves all keep tabs on our online activity. This is no secret, as the

Page 5: Compulsory Participation in Social Networking Sites: Exploring Why We Share

5

following review of popular press articles illustrates. Social networking users who read

the newspaper online or offline are aware of the omnipresent forces that keep watch over

social networking sites. In addition to the (often vague and wordy) privacy policy notices

distributed to all users, journalists are quick to cover the ever-changing issues

surrounding social technology, particularly in regards to who sees our personal

information and, sometimes, how they use that information.

Good journalism surprises us, and this story is no different. Stephanie Clifford

(2010) of The New York Times points out the astonishing range of commercial industries

that use personal electronic data:

The budgeting Web site Mint.com, for example, displays discount offers from

cable companies or banks to users who reveal their personal financial data,

including bank and credit card information. The clothing retailer Bluefly could

send offers for sunglasses to consumers who disclose that they just bought a

swimsuit. And location-based services like Foursquare and Gowalla ask users to

volunteer their location in return for rewards like discounts on Pepsi drinks or

Starbucks coffee (1).

As this quote illustrates, not only are we opting into sharing personal information, we are

allowing the mobile technology in our pockets to disclose data on our behalf. Popular

internet radio company Pandora received a subpoena regarding its information-sharing

practices on its mobile app. Their app was allegedly one among many that gathered

demographic data of the smartphone user to sell to advertising networks (Efrati, Thurm,

& Searcey, 2011).

Page 6: Compulsory Participation in Social Networking Sites: Exploring Why We Share

6

In addition to mobile apps, social widgets on external websites, such as

Facebook’s “like” button or Twitter’s “tweet” button on news websites or blogs, also

contribute to data collection. For every external “like” or “tweet” button clicked,

Facebook or Twitter tracks what websites its user visits. The Wall Street Journal reports

that, of the 1000 most-visited websites, these buttons appear on up to 25 percent (Efrati,

2011).

As it is reported in The Washington Post, the Federal Communication

Commission reprimanded Google in 2010 for collecting sensitive personal data. In

addition to taking photographs intended for its “street view” feature on Google Maps,

Google also gathered information about personal WiFi networks, email addresses,

passwords, and web browsing history (Kang, 2010). Google, one of the largest

corporations in the world, may seem altruistic, but the popular press often points out its

true colors. In an interview with The New York Times, notable privacy scholar Alessandro

Acquisti describes Google searches as follows: “Every search on Google, Mr. Acquisti

notes, is implicitly a transaction, involving a person ‘selling’ personal information and

‘buying’ search results” (Lohr, 2010, p. BU3). However, he continues, people simply do

not conceive of internet searches in this way. Instead, we opt in to share information,

especially on social networking sites. It is reasonable to assume that the more often users

are prompted to share, the less thought users give to actually sharing their data. However,

it is not just Google that stores users’ data.

Law enforcement agencies often request information from telecommunications

companies. For example, according to Miguel Helft and Claire Cain Miller (2011) of The

New York Times, Google received over 4000 of these requests from January to June in

Page 7: Compulsory Participation in Social Networking Sites: Exploring Why We Share

7

2010 and Facebook received 10 to 20 each day in 2009. Even the United States

Department of Justice has requested this kind of information, as it did with Twitter in the

WikiLeaks scandal (Helft & Miller, 2011). Despite government’s use of social

networking data, there are efforts to reassure users’ right to privacy.

Though sharing personal information through social networks has been around

since the early 2000s, it was only February of 2012 that the United States government

developed an official position. In its report, officially entitled Consumer Data Privacy in

a Networked World: A Framework for Protecting Privacy and Promoting Innovation in

the Global Digital Economy, the White House explicates a Consumer Privacy Bill of

Rights and delineates the federal government’s role in ensuring individual privacy rights.

This document emphasizes transparency, contextual privacy, security, accuracy, and

accountability. Yet the challenges to such a position continue, as reported in The

Washington Post. As recently as November 2012, the Federal Trade Commission’s

efforts to ensure consumer privacy through the “Do Not Track” initiative experienced

setbacks. Though supported by the White House and privacy advocates, the advertising

industry representatives on the committee have pushed back (Timberg, 2012).

Instead of considering data gathering as an innocent activity, it is clear even to the

popular press that social networking users need to reconsider these acts as acts of

surveillance. However, the aforementioned tales from newspapers do not treat the issue

with the seriousness it deserves. This is likely because many of these newspapers have

commercial interests, too, and do not want to harm their own and their advertisers’

relationships to social networked sites their access to targeted advertising. Therefore, it is

imperative that we examine this issue critically.

Page 8: Compulsory Participation in Social Networking Sites: Exploring Why We Share

8

Acts of surveillance

As I mentioned above, data gathering must be reconsidered as an act of

surveillance. There are several different types of surveillance we must consider, as they

all relate to how corporations use the information we disclose and how social networking

users determine what information to disclose. The types explicated here include

institutional surveillance, interpersonal surveillance, and self-surveillance. As a reference,

this analysis relies on Foucault’s notion of the Panopticon1 to further examine the power

inherent to surveillance activities. This is a kind of disciplinary inaction via surveillance;

that is, order can be maintained through the threat of being observed instead of through

physical exercises of power.

Institutional Surveillance

I have identified two different kinds of institutional surveillance: state

surveillance and corporate surveillance. Though useful for many reasons, the Foucauldian

perspective of surveillance as internalized discipline may no longer apply to the state, as

attention has shifted from disciplining specific populations such as prisoners to “the

control of whole groups, populations and environments – not community control, but the

1 The Panopticon is a central watchtower in a prison system. The prisoners can always be seen from the Panopticon but cannot tell when exactly they are being watched. Foucault (1975/1995) outlines the effect:

…to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power. So to arrange things that the surveillance is permanent in its effects, even if it is discontinuous in its action; that the perfection of power should tend to render its actual exercise unnecessary; that this architectural apparatus should be a machine for creating and sustaining a power relation independent of the person who exercises it; in short, that the inmates should be caught up in a power situation of which they are themselves the bearers (p. 201).

Page 9: Compulsory Participation in Social Networking Sites: Exploring Why We Share

9

control of communities” (Cohen, 1985, p. 127). This is achieved in a number of ways:

through data collection for large-scale databases, such as fingerprinting and facial

recognition technology, to the installation of security cameras and wiretapping devices.

Government can instill self-surveillance attitudes through the rhetoric of readiness

and patriotism, but it can also continue to monitor its citizens in a literal way. Though

local officials have used security cameras as a technique for crime prevention since 1973,

government-sponsored surveillance has ballooned in the years following the September

11 attacks. In order to prevent terrorist attacks, video recording technology has been

installed and/or updated in public spaces (Yesil, 2006) and wiretapping devices became

increasingly common (Fitsanakis, 2003). These technologies must also be considered in

conjunction with social networking sites as sources of information. However, despite the

ubiquity of surveillance technology and emergence of self-disclosure on social

networking sites, law enforcement officials declare their concern for public safety and

their purpose for watching out for the public, not just watching the public (Yesil, 2006, p.

401). The rhetoric of care, protection, and safety is a dominant theme. National security is

clearly being used as leverage, however this occurs in the workplace, as well.

Valerie Fournier (1999) describes this governance via surveillance in reference to

disciplining company employees. She writes, “[O]rganisations are urged to mobilise

employees’ potential for innovation and self-actualisation by relaxing rigid bureaucratic

mechanisms of control and according employees more autonomy” (p. 291). However, in

doing so, these organizations reinforce self-discipline through autonomous governance,

otherwise known as corporate surveillance. Self-disciplined employees maintain

corporate-defined professionalism through the internalized surveillance of a company.

Page 10: Compulsory Participation in Social Networking Sites: Exploring Why We Share

10

Thus, the company maintains control by governing at a distance “in the name of the client

and the self” (p. 299), much the same way Foucault’s Panoptical disciplines prisoners at a

distance.

Interpersonal Surveillance

Deemed social surveillance by some (Marwick, 2012) and lateral surveillance by

others (Andrejevic, 2006b), interpersonal surveillance involves the anonymous

monitoring of peers for the purpose of gathering personal data. Interpersonal surveillance

involves the internalized responsibility individuals feel from an authority to watch over

other individuals. An appropriate example of a type of benevolent social surveillance is

the Neighborhood Watch program2. However, this monitoring of peers through

interpersonal surveillance is not used in the sense of mutual watching, “which implies

transparent, reciprocal observation, but in the asymmetrical, nontransparent sense” (p.

397). In other words, interpersonal surveillance involves purposeful monitoring of private

citizens by private citizens, sometimes for security reasons and sometimes for personal

reasons.

Through the proliferation of networked technology such as mobile devices and

social networking sites, surveillance of one’s peers has become much easier.

“Interpersonal interaction always contains an element of mutual monitoring, but the

deployment of interactive networked communication technology allows individuals to

avail themselves of the forms of asymmetrical, nontransparent information gathering

modeled by commercial and state surveillance practices” (Andrejevic, 2006b, p. 398).

2 The Neighborhood Watch program may be effective when used appropriate, though we have seen through stories like the murdering of Trayvon Martin that this can be exploited (Robertson & Schwartz, 2012).

Page 11: Compulsory Participation in Social Networking Sites: Exploring Why We Share

11

Technologies once used solely by the government have been co-opted by the private

citizen. But interpersonal surveillance is not limited to high-tech monitoring devices.

Interpersonal surveillance in the digital age “…is characterized as surreptitious

strategies individuals use over communication technologies to gain awareness of another

user’s offline and/or online behaviors” (Tokunaga, 2011, p. 706). Social networking sites,

like Twitter, Foursquare, and Facebook in particular, facilitate a mild form of casual

stalking. In fact, some users believe Facebook was created with this intention (Trottier,

2012) and anticipate some degree of monitoring (Marwick, 2012; Trottier, 2012).

However, serious Facebook stalking mirrors real world stalking in a number of ways.

Termed online obsessive relational intrusion, serious Facebook stalking can involve

unwanted gifts or messages, anonymous monitoring, and following a user to virtual

spaces (e.g. Facebook groups) or real-life locations (Chaulk & Jones, 2011). Individuals

using others’ information inappropriately can evolve into cyberstalking or domestic

violence.

The power differential is important to note, as interpersonal surveillance involves

a nontransparent hierarchical display of power. The observer’s goal is closeness whereas

the goal of the observed is autonomy (Tokunaga, 2011). This power dynamic inherent to

surveillance is exacerbated by the anonymous nature of the internet, “…which allow[s]

individuals to lurk in an environment that reduces the threat of being discovered” (p.

705). Thus, those seeking to take advantage of another individual can simply use data the

potential victim self-discloses on a social networking site. However, many users

recognize this threat and take measures to monitor themselves.

Page 12: Compulsory Participation in Social Networking Sites: Exploring Why We Share

12

Self-Surveillance

Self-surveillance is characterized by the internalization of the surveillance society.

Our mediated selves perpetuate this; that is, the proliferation of image-capturing

technology and social sharing invites us to watch and consider how we portray ourselves.

This can affect how we understand a situation and perhaps how we will act in the future:

“The recorded behavior has power over the lived experience because exposure to the

recorded behavior can replace or alter one’s understanding of the event based on one’s

lived experience of it (Humphreys, 2011, p. 578).

This differs from disciplinary surveillance and Foucault’s panopticon in a key

way: This surveillance is not thrust upon us. We willingly participate in the practice of

self-monitoring (Humphreys, 2011). As the disciplinary institutions dissolve, surveillance

is dispersed, creating a web of individuals who participate in self-discipline (Best, 2010)

In this sense, surveillance is participatory, “…perpetuated by the subjects of surveillance

themselves” (p. 9). States can take advantage of this neoliberal notion of self-discipline

and personal responsibility and exert silent, internalized power. Mark Andrejevic (2006a)

points out that the Bush regime relied on individual citizens to prepare themselves for

attack through practices such as becoming a good lie detector. Self-betterment and self-

surveillance under the guise of homeland security further contributes to a society of

surveillance.

As boyd (2007) mentions, social networking users often disclose information

while considering the imagined audience. That is, they keep in mind those who may or

may not be reading when they choose to update personal information online. Teenaged

users of MySpace also take social cues from their peers on the network and conform to

Page 13: Compulsory Participation in Social Networking Sites: Exploring Why We Share

13

socially sanctioned practices of disclosure. Therefore, we can understand this self-

disciplining as self-surveillance as well.

Internalized male gaze

Self-surveillance can further be understood from a feminist perspective as the

internalization of the male gaze. Coined by film theorist Laura Mulvey (1975/1999), the

male gaze refers to the spectatorial position of the camera, which forces the audience to

identify with a male protagonist. In other words, the cinematic apparatus takes the

position of the male protagonist’s point of view, particularly when focused on women.

According to psychoanalysis, cinema takes advantage of our unconscious desires and

replicates a dreamlike state. Therefore, this male gaze is voyeuristic, scopophilic, and

controlling—all facets of patriarchal power. It transcends looking or monitoring into

surveilling and manipulating. The woman on the screen becomes an erotic object for the

characters in the film as well as for the audience, connoting what Mulvey describes as

“to-be-looked-at-ness.” That is, the woman (on screen and off) internalizes the male gaze

and attempts to maintain patriarchal ideals of femininity through acts of self-surveillance.

Foucault (1975/1995) also links the inspecting gaze beyond gender to brute power

through his discussion of self-surveillance.

Again, in regards to social networking sites, users discipline themselves according

to what they witness other users doing: “By looking at others’ profiles, teens get a sense

of what types of presentations are socially appropriate; others’ profiles provide critical

cues about what to present on their own profile” (boyd, 2007, p. 10). Self-presentation

decisions determined by perceived social norms in an online space can be considered

Page 14: Compulsory Participation in Social Networking Sites: Exploring Why We Share

14

self-surveillance as well. Because bodies are not present online, they must be written into

being, and, in doing so, users write into being best versions of themselves for an

imagined audience, determined by how a user understands he or she should be presented

(boyd, 2007). The imagined audience’s gaze is internalized for social networking users,

much the same way the male gaze is often internalized by women. Therefore, though we

are more inclined to share on social networks, we do so with others’ opinions in mind.

This does not necessarily contribute to a cultural moment of sharing, though whom users

consider when self-monitoring is likely to be peers, not corporations. Herein lies the

problem.

Surveillance and free labor in the name of capitalism

While others watch users online, users insist on working for free. Philip Napoli

(2010) examines the relationship between labor and social networking sites. He finds

what is most remarkable about content produced on sites like YouTube and Facebook is

“the extent to which individuals engage in the production of media products absent any

guarantee—or even expectation—of financial compensation” (p. 512). Instead of

compensating the user/producer of the content, advertisers and corporations generate

profit. So, in addition to unpaid labor in maintaining a positive mediated presence

through self-surveillance, Marxist feminism may be extended to include free labor as

negotiated by the corporations that run the social networking sites.

Interpersonal and institutional surveillance as labor

Page 15: Compulsory Participation in Social Networking Sites: Exploring Why We Share

15

Contributing to the reproduction of social hierarchies is the actual labor involved

in creating internet content and policing it via interpersonal or self-surveillance. Napoli

(2010) points out that new media “…empowers the audience to serve as both receivers

and senders of mass communication” (p. 511). In doing so, new media users effectively

self-govern the content they produce. Because there is no international internet governing

body, it is up to the users to determine codes of conduct.

Maintaining these codes, in addition to producing content, essentially is free

labor. Social networking sites like YouTube, Twitter, or Facebook make money from this

labor via advertising. Corporations like these sell our self-disclosed personal information

in order to generate specifically targeted advertisements. Therefore, the more a user

shares, the more money these corporations make. This revenue is guaranteed but still

necessitates a form of institutional (corporate) surveillance. Nicole Cohen (2008)

illustrates this relationship succinctly:

By providing a constant stream of content about the online activities and thoughts

of people in one’s social networks, Facebook taps into members’ productivity

through the act of surveillance… While these sites can offer participants

entertainment and a way to socialize, the social relations present on a site like

Facebook can obscure economic relations that reflect larger patterns of capitalist

development in the digital age (p. 7).

Surveillance in this sense is two-fold: Users keep an eye on the content and govern other

users and themselves, all while corporations keep an eye on the content to see what kinds

of self-disclosed information can be capitalized. Users’ intentions for surveillance run the

gamut, but are likely to maintain social spaces and relationships, privacy, or reputation.

Page 16: Compulsory Participation in Social Networking Sites: Exploring Why We Share

16

However, corporations’ intentions are not nearly as altruistic. As Cohen (2008) points

out, corporate surveillance is used to make money, through selling our information to

third-parties and by using our information to encourage us to return to the website,

capitalizing on the power differential between users and corporations.

Marxist feminism

Marxist feminism expands on this power differential between users and

corporations and can further be applied to surveillance studies. Marxist feminism takes

Marx’s economic inequity a step further to include a sexual division of labor:

Although there are some variations as to what labor each sex does, men generally

have primary responsibility for subsistence activities; women’s contribution to

this varies. What does not vary is that, whatever else they do, women have

primary responsibility for childcare and most of the everyday household work

(Holmstrom, 1984, p. 463).

Feminism recharacterizes labor as going beyond work for wages to include unpaid

everyday labor within the home. However, Tong (2009) argues that women’s work is not

limited to child and household care. Women must also work to maintain their appearance.

Thus, this sexual division of labor has several social consequences, most notably self-

surveillance:

In the same way wageworkers may be alienated from the product(s) on which

they work, women, viewed simply as women, may be alienated from the

product(s) on which they typically work—their bodies…They most likely shape

and adorn their flesh primarily for the pleasure of men. Women do not have final

Page 17: Compulsory Participation in Social Networking Sites: Exploring Why We Share

17

or total say about when, where, how, or by whom their bodies will be used (Tong,

2009, p. 113).

This indicates connections among capitalism, patriarchy, and self-surveillance, much like

Mulvey’s theory of the male gaze. Unbalanced monitoring simply adds to the highly

stratified and hierarchical society: “Surveillance contributes increasingly to the

reproduction and reinforcing of social divisions” (Lyon, 2002, p. 242).

This socialist, Marxist approach can also be applied to sharing personal

information online. Cohen (2008) demonstrates how Facebook capitalizes on member

activity for free labor. Disclosing information and connecting to friends can be

considered work without wages. Cohen explains that Facebook’s reliance on its users

freely giving up personal information is immaterial labor that contributes to the

corporation’s existence in a capitalist market. Cohen’s article was written prior to

Facebook’s IPO, which allows the company to be traded publicly, further exacerbating

the issue of free labor.

To examine the issue of work without wages as it relates to worker privacy more

closely, Christian Fuchs (2012) applies a socialist conception of privacy in contrast to a

liberal conception of privacy. He writes:

The liberal conception of privacy (and its reality) as an individual right within

capitalism protects the rich and their accumulation of more wealth from public

knowledge. A socialist conception of privacy as a collective right of workers and

consumers can protect humans from the misuse of their data by companies (p.

141).

Page 18: Compulsory Participation in Social Networking Sites: Exploring Why We Share

18

This literature supports the capitalist notion of surveillance as it relates to the nearly

compulsory participation in sharing personal information on social networking sites.

Fuchs (2012) notes that much of the conversation focuses too closely on individual

behaviors surrounding privacy, as is illustrated by the previous discussion of popular

press stories. Clearly, the discourse needs to shift to consider “societal contexts of

information technologies” (Fuchs, 2012, p. 143), that is, the procedural rhetoric that

disciplines how, what, why, and to whom we share, the impetus for sharing, and who

benefits from our disclosure. Furthermore, social networking corporations like Facebook

ought to be more forthcoming with how they use our data. We recognize the targeted

advertisements, yet how they reach us is not a transparent process, and it should be.

Transparency counters corporate surveillance, transferring power back to the user.

Beyond the simple need for transparency, Fuchs (2012) argues for the decommodification

of the internet and a socialist approach to privacy in order to combat this

hypercommercialism and exploitation of users’ content and information. However, this

can only be achieved once social networks are designed in the users’ best interests, not

the corporations’.

Procedural rhetoric as corporate persuasion

The technologies of these social networks particularly are created in the

corporations’ best interests. That is, the corporation determines all the privacy settings,

requests for information, and ways to connect with others. Ian Bogost (2007) refers to

this kind of information disciplining as procedural rhetoric, which is the practice of using

processes persuasively. In other words, there are elements of technology that are

Page 19: Compulsory Participation in Social Networking Sites: Exploring Why We Share

19

inherently persuasive through the representation of procedures. Bogost states that

computer procedurality is unique because it is the only representation that represents a

process with another process. Thus, technology forms an argument through the

implementation and execution of algorithms, behavioral rules, and programming. These

procedures are fixed because they lack a human element, putting a great emphasis on “the

expressive capacity afforded by rules of execution” (Bogost, 2007, p. 5). Bogost (2007)

gives the example that procedures involving humans can be change at will. That is, a

customer may return an item past the window of time allotted for returns if another

person decides to deviate from the procedure. This is not the case for technology, for it

does not allow for exceptions. Though Bogost’s discussion refers primarily to video

games, it is particularly well suited for and relevant in the discussion of social networking

sites, which are among the most procedural and most widely used of computer

technologies.

Procedural rhetoric helps explain how social networking processes are not as

democratic as we would like to think. Indeed, we may complete our profiles with unique

or even untrue information in order to play with our identities, as Sherry Turkle (1995)

theorized in Life on the Screen. However, where we can supply our information, what

kinds of relationships we can identify, and even what kinds of photographs we can

supply3 are all determined and disciplined by the social networking site’s inherent

technology as decided upon by the corporation in an effort to generate more revenue. If

there is a box to supply our telephone number, we are more likely to supply that

information. If there is no way to limit the visibility of our profile information to

3 Facebook has a history of marking photographs of women breastfeeding as offensive and even shutting down the accounts of women who post such photographs (Conley, 2012).

Page 20: Compulsory Participation in Social Networking Sites: Exploring Why We Share

20

strangers, we must take other precautions with our information. This exemplifies the

procedural rhetoric of social networking sites as well as explicates the nature and extent

of corporate surveillance within the social network itself.

Conclusion

Despite all of the threats to our privacy and commodification of our personal

information, social media users are still less concerned that their future employers or

government are looking at their profiles than if their peers are looking (Tufekci, 2008).

However, I have demonstrated that users absolutely should be concerned about whose

best interests are served by our ubiquitous participation in social networking sites. Our

participation on social media is not simply a cultural moment of sharing, rather

corporations are capitalizing on our now-commodified relationships, self-disclosed

information, and free labor all disciplined by the choices the technology itself affords.

Furthermore, the networks these corporations run are inherently designed to produce

specific information that can be used to generate revenue.

Is specifically targeted advertising worth the disclosure of personal information?

Or is it a kind of exploitative practice? While some users may consider corporations’ use

of our information a necessary evil, others likely do not consider the capitalist power

inherent to social media participation. Popular press stories fail to explicate the power

differential and money trail in social networks. Though the Consumer Privacy Bill of

Rights is a step in the right direction, we must continue to question what is the impetus

behind the ubiquitous need to share our data, information, experiences, and relationships

Page 21: Compulsory Participation in Social Networking Sites: Exploring Why We Share

21

in online social networks, and critically consider the actual audiences, not just the

imagined one.

Page 22: Compulsory Participation in Social Networking Sites: Exploring Why We Share

22

References

Andrejevic, M. (2006a). Interactive (in)security: The participatory promise of ready.gov. Cultural Studies, 20, 441-458.

Andrejevic, M. (2006b). The discipline of watching: Detection, risk, and lateral surveillance. Critical Studies in Media Communication, 23, 391-407.

Best, K. (2010). Living in the control society: Surveillance, users and digital screen technologies. International Journal of Cultural Studies, 13(1), 5-24.

Bogost, I. (2007). Persuasive games: The expressive power of videogames. Cambridge, MA: The MIT Press.

boyd, d. m. (2007). Why youth (heart) social networking sites: The role of networked publics in teenage social life. In D. Buckingham (Ed.), MacArthur foundation series on digital learning – youth, identity, and digital media volume. Cambridge, MA: The MIT Press.

Chaulk, K., & Jones, T. (2011). Online obsessive relational intrusion: Further concerns about Facebook. Journal of Family Violence, 26, 245-254.

Clifford, S. (2010, May 31). Web start-ups offer bargains for users’ data. The New York Times, p. A1.

Cohen, N. (2008). The valorization of surveillance: Towards a political economy of Facebook. Democratic Communique, 22, 5-22.

Conley, M. (2012, February 8). Breastfeeding advocates protest Facebook with nurse-in. ABC News. Retrieved December 7, 2012 from http://abcnews.go.com/Health/breastfeeding-advocates-hold-facebook-protest/story?id=15530012#.UMZFmrY3HMg

Efrati, A., Thurm, S., & Searcey, D. (2011, April 5). Mobile-app makers face U.S. privacy investigation. Wall Street Journal, p. B.1.

Efrati, A. (2011, May 19). ‘Like’ button follows web users. Wall Street Journal, p. B.1.

Fitsanakis, J. State-sponsored communications interception facilitating illegality. Information, Communication & Society, 6, 404-429.

Foucault. M. (1975/1995). Discipline and punish: The birth of the prison (A. Sheridan, Trans.) (5th ed). New York: Vintage Books.

Page 23: Compulsory Participation in Social Networking Sites: Exploring Why We Share

23

Fournier, V. (1999). The appeal to ‘professionalism’ as a disciplinary mechanism. The Sociological Review, 47(2), 280-307.

Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13, 139-159.

Hampton, K. N., Goulet, L. S., Rainie, L., & Purcell, K. (2011). Social networking sites and our lives. Washington, DC: Pew Internet & American Life Project.

Helft, M. & Miller, C. C. (2011, January 10). Web outruns privacy law. The New York Times, p. A1.

Holmstrom, N. (1984). A Marxist theory of women’s nature. Ethics, 94, 456-473.

Humphreys, L. (2011). Who’s watching whom? A study of interactive technology and surveillance. Journal of Communication, 61, 575-595.

Kang, C. (2010, November 10). FCC probes Google over Street View program’s collection of personal data. The Washington Post. Retrieved December 7, 2012 from http://www.washingtonpost.com/wp-dyn/content/article/2010/11/10/AR2010111007003.html

Lohr, S. (2010, July 18). You want my personal data? Reward me for it. The New York Times, p. BU3.

Lyon, D. (2002). Everyday surveillance: Personal data and social classifications. Information, Communication & Society, 5, 242-257.

Marwick, A. E. (2012). The public domain: Social surveillance in everyday life. Surveillance and Society, 9, 378-393.

Mulvey, L. (1975/1999). Visual pleasure and narrative cinema. In L. Braudy & M. Cohen (Eds.), Film theory and criticism (833-844). New York City, NY: Oxford University Press.

Napoli, P. M. (2010). Revisiting ‘mass communication’ and the ‘work’ of the audience in the new media environment. Media, Culture & Society, 32(3), 505-516.

Robertson, C. & Schwartz, J. (2012, March 22). Shooting focuses attention on a program that seeks to avoid guns. The New York Times. Retrieved December 7, 2012 from http://www.nytimes.com/2012/03/23/us/trayvon-martin-death-spotlights-neighborhood-watch-groups.html

Smith, A. (2011). Why Americans use social media. Washington, DC: Pew Internet & American Life Project.

Page 24: Compulsory Participation in Social Networking Sites: Exploring Why We Share

24

Stefanone, M. A., Lackaff, D., & Rosen, D. (2010). The relationship between traditional mass media and “social media”: Reality television as a model for social network site behavior. Journal of Broadcasting & Electronic Media, 54(3), 508-525.

Timberg, C. (2012, November 27). ‘Do not track’ internet privacy initiative struggles to keep momentum. The Washington Post. Retrieved December 7, 2012 from http://www.washingtonpost.com/business/economy/do-not-track-internet-privacy-initiative-struggles-to-keep-momentum/2012/11/27/38988a7a-38c7-11e2-b01f-5f55b193f58f_story.html/

Tokunaga, R. S. (2011). Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior, 27, 705-713.

Tong, R. (2009). Feminist thought: A more comprehensive introduction (3rd ed). Boulder, CO: Westview Press.

Trottier, D. (2012). Interpersonal surveillance on social media. Canadian Journal of Communication, 3, 319-332.

Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social networking sites. Bulletin of Science Technology & Society, 28, 20-36.

Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York: Simon & Schuster.

Van Dijck, J. (2011). Tracing Twitter: The rise of a microblogging platform. International Journal of Media and Cultural Politics, 7(3), 333-348.

Van House, N. (2009). Collocated photo sharing, story-telling, and the performance of self. International Journal of Human-Computer Studies, 67(12), 1073-1086.

Yesil, B. (2006). Watching ourselves: Video surveillance, urban space and self-responsibilization. Cultural Studies, 20, 400-416.