SlideShare a Scribd company logo
11.08.10 Thesis Proposal
Laura Janet Rodriguez
Researchable Question
How could a cognitive artifact1
for reflective cognition 2
be integrated into the profile management
process 3
of 18-24 4
year old participants of social networking sites?
Sub Questions
How could a cognitive artifact...
...encourage a synergistic relationship 5
with participants?
...reveal a participant’s pattern of online behavior that puts them at risk?
...communicate the permanence of online information?
...expose the susceptibility of the future self?
Areas of Investigation
1
Cognitive Artifact: According to Donald Norman, an expert of cognitive science, cognitive artifacts are “those artificial devices that maintain,
display, or operate upon information in order to serve a representational function and that affect human cognitive performance.”
2
Reflective Cognition: According to Donald Norman, “the reflective mode is that of comparison and contrast, of thought, of decision making.”
3
Profile Management Process: The input of information within the boundaries of one’s personal profile page—via text or photo—that can be viewed
by approved outsiders.
4
18-24: There is empirical evidence that the 15-24 year old age group have similar perspectives on online privacy and similar online behaviors within
the realm of social networking. I narrowed down the age group further to 18-24 in an effort to exploit the affordances of participants that are not
under parental supervision.
5
Synergistic Relationship: The interaction of two or more agents or forces so that their combined effect is greater than the sum of their individual effects.
social networking
18-24 year olds
participants
cognitive artifact
cognitive artifact
reflective cogntion
synergistic relationship online
patterns
permanence
of online info
susceptibility
of future self
11.08.10 Thesis Assumptions, Justification, & Limitations
Laura Janet Rodriguez
Assumptions
	 While there are many different kinds of social networking services, this thesis will focus on personal networks,
like Facebook, Friendster and MySpace. These social networking services are designed to give viewers a sense of the
participant’s true self, making their virtual identities similar to who they are in the real world. Most of the people in these
networks are not hiding behind facades, since socially connecting with existing friendships is the main objective. Paul
DiMaggio, et al writes in “Social Implications Of The Internet”, that “Online communities come in very different shapes
and sizes, ranging from virtual communities that connect geographically distant people with no prior acquaintance who
share similar interests, to settings that facilitate interactions among friendship networks or family members, to community
networks that focus on issues relevant to a geographically defined neighborhood. Research on “online community” should
distinguish among these forms, lest results appear contradictory and confusing“ (DiMaggio).
	 Personal networks allow participants to create detailed online profiles and connect with other participants, with an
emphasis on social relationships. They often involve the sharing of information with other approved participants, such as
gender, age, interests, educational background and employment. These platforms may also share selected information with
individuals and applications that are not authorized contacts (Fact Sheet 35).
Justification
	 The legalities on information privacy are currently fuzzy, so it is difficult to determine where the government is
allowed to intervene. Our new ‘age of information’ is proliferating the exchange of private data without concise regulations
on how collected information can be used. Participants of personal networks need to be cautious whenever inputting
information, but caution and safety seem to dissipate within the framework of personal networks due to skewed perceptions
on what is safe and trustworthy. Many participants of online social networks do not know the terms of use of the interface
they interact and contribute to on a daily basis and they have no idea what role third party applications play or who truly has
access to their information.
	 The use of social networking sites is growing in popularity, and participants are not always aware of the lack of
privacy in even a semi-public online environment. Although the 18-24 year old group only makes up 9% of social networking
participants in the United States (Google Ad Planner: United States demographics data), they are proven to consistently
post more information at a higher percentage than any other age group (Williams, Kaven, 2009). The amount of information
participants post in their profiles could present risks to their privacy and safety; including identity theft, phishing scams,
cyber harassment, cyber stalking, and cyber bullying. There should also be concern over the 18-24 age group because they
soon will be entering the workforce with habits formed from long term risky behaviors online that could impact the security
policy of their future workplace.
Limitations
	 Although there are many touchpoints where information privacy is at risk within the realm of online social
networking, this study will focus solely on the profile management process where participants are confronted with specific
motivations and prompts for sharing information. Although people aged 35-44 are the majority of social networking
participants (Google Ad Planner: United States demographics data), older users are more concerned with information
privacy than younger internet users ( I. Brown T. Zukowski, 2007). The 18-24 year old demographic, as whole, have similar
online behaviors and attitudes toward privacy that place them at risk and will guide my design investigation’s purpose and
outcome.
Literature Review
 started reading
reflection
participants
18-24 years
cognitive artifact
social networking
Protect Your Digital Privacy:
Survival Skills for the Information Age
Glee Harrah & Cady McGregor
 Things That Make Us Smart
Donald Norman
Grown Up Digital
Don Tapscott
Imagination and play
in the electronic age
Singer, Dorothy G.
Privacy Nudges
Lorrie Faith Cranor, director of the Carnegie Mellon Usable
Privacy and Security Laboratory at Carnegie Mellon University
Visceral Nudges
Ryan Calo, fellow at the Center for Internet and Society at
Stanford Law School
 Cyberpsychology
Kent L. Norman
 Privacy as a Behavioral Phenomenon
Journal of Science Issues
 World Without Secrets
Richard Hunter
Designing Interaction: Psychology at
the Human-Computer Interface
John M. Carroll
The second self : computers
and the human spirit
Sherry Turkle
The Cognitive Artifacts of Designing
Willemien Visser
Relevant
Projects
11.08.10 Thesis References
Laura Janet Rodriguez

More Related Content

PPT
The Internet is a magnifying glass
PPTX
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
PDF
From Self Expression to Collective Action
PPTX
Final thesis preso april 2013
PPTX
Locating Social Media
PPTX
Social Network Theory & Analysis
PPTX
Trusting the internet
PDF
The Role of Social Networking in Securing Cyberspace
The Internet is a magnifying glass
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
From Self Expression to Collective Action
Final thesis preso april 2013
Locating Social Media
Social Network Theory & Analysis
Trusting the internet
The Role of Social Networking in Securing Cyberspace

What's hot (20)

PDF
Impact of trust, security and privacy concerns in social networking: An explo...
PDF
Network Theory: A Brief Introduction june 2012
DOC
A Call to Action: Protecting the Right to Consumer Privacy Online
PPTX
Chapter 2
PPTX
Chapter 2
PPTX
Chapter 2
PDF
Summary of my Doctoral Research, Interests
PPTX
Network Theory
PDF
Preproc 03
PDF
Suazo, martínez & elgueta english version
PDF
Online persuasion and compliance
PPTX
Social surveillance aoife shona
PPTX
Social Network Theory
PDF
critere de peerce
PPTX
Social Network Structures in Online Communities
PDF
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
PDF
An Online Social Network for Emergency Management
PPTX
Netnography in online dating services
PDF
Conference Report Final 11.18
PPTX
New Media Activism Presentation
Impact of trust, security and privacy concerns in social networking: An explo...
Network Theory: A Brief Introduction june 2012
A Call to Action: Protecting the Right to Consumer Privacy Online
Chapter 2
Chapter 2
Chapter 2
Summary of my Doctoral Research, Interests
Network Theory
Preproc 03
Suazo, martínez & elgueta english version
Online persuasion and compliance
Social surveillance aoife shona
Social Network Theory
critere de peerce
Social Network Structures in Online Communities
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
An Online Social Network for Emergency Management
Netnography in online dating services
Conference Report Final 11.18
New Media Activism Presentation
Ad

Similar to Thesis proposal v3 (20)

PDF
Cyber reputation
PDF
Analysis of social networking websites and its effect on academic students
PPT
Virtual identity
PPT
Walking on Clouds: Managing your digitial identity
PPT
Lis 768 Privacy Presentation
PPT
Social media and Missing workshop
PDF
Abigail McAlpine - Children's Data Online - Basics of Sharenting and PII of M...
PPTX
Social mediaforseniors
PDF
Social media platform and Our right to privacy
DOCX
Concerns of social networking sites Eileen M.docx
PDF
Social Media Networking Site Usage Demographics Stats
PDF
Privacy Matters
PPT
Digital Tattoo Workshop for VPL
PPTX
Group-3-Gen.-Ed.-002.pptxdimuresmoduless
PPTX
So-Sial Networking
PDF
Pew internet research report reputation management and social media
PDF
Pip reputation management
PDF
Research: Online reputation management
PDF
Teen Privacy Online
PDF
Norms of disclosure mesch&becker
Cyber reputation
Analysis of social networking websites and its effect on academic students
Virtual identity
Walking on Clouds: Managing your digitial identity
Lis 768 Privacy Presentation
Social media and Missing workshop
Abigail McAlpine - Children's Data Online - Basics of Sharenting and PII of M...
Social mediaforseniors
Social media platform and Our right to privacy
Concerns of social networking sites Eileen M.docx
Social Media Networking Site Usage Demographics Stats
Privacy Matters
Digital Tattoo Workshop for VPL
Group-3-Gen.-Ed.-002.pptxdimuresmoduless
So-Sial Networking
Pew internet research report reputation management and social media
Pip reputation management
Research: Online reputation management
Teen Privacy Online
Norms of disclosure mesch&becker
Ad

Recently uploaded (20)

PPT
aksharma-dfs.pptgfgfgdfgdgdfgdfgdgdrgdgdgdgdgdgadgdgd
PDF
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
PPTX
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
PPT
EthicsNotesSTUDENTCOPYfghhnmncssssx sjsjsj
PDF
321 LIBRARY DESIGN.pdf43354445t6556t5656
PPTX
22CDH01-V3-UNIT III-UX-UI for Immersive Design
PDF
Urban Design Final Project-Context
PDF
intro_to_rust.pptx_123456789012446789.pdf
PPTX
a group casestudy on architectural aesthetic and beauty
PDF
Chalkpiece Annual Report from 2019 To 2025
PDF
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
PDF
THEORY OF ID MODULE (Interior Design Subject)
PDF
SOUND-NOTE-ARCHITECT-MOHIUDDIN AKHAND SMUCT
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PPTX
Media And Information Literacy for Grade 12
PPTX
rapid fire quiz in your house is your india.pptx
PPTX
EDP Competencies-types, process, explanation
PPTX
NEW EIA PART B - Group 5 (Section 50).pptx
PPTX
timber basics in structure mechanics (dos)
PDF
Interior Structure and Construction A1 NGYANQI
aksharma-dfs.pptgfgfgdfgdgdfgdfgdgdrgdgdgdgdgdgadgdgd
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
EthicsNotesSTUDENTCOPYfghhnmncssssx sjsjsj
321 LIBRARY DESIGN.pdf43354445t6556t5656
22CDH01-V3-UNIT III-UX-UI for Immersive Design
Urban Design Final Project-Context
intro_to_rust.pptx_123456789012446789.pdf
a group casestudy on architectural aesthetic and beauty
Chalkpiece Annual Report from 2019 To 2025
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
THEORY OF ID MODULE (Interior Design Subject)
SOUND-NOTE-ARCHITECT-MOHIUDDIN AKHAND SMUCT
DOC-20250430-WA0014._20250714_235747_0000.pptx
Media And Information Literacy for Grade 12
rapid fire quiz in your house is your india.pptx
EDP Competencies-types, process, explanation
NEW EIA PART B - Group 5 (Section 50).pptx
timber basics in structure mechanics (dos)
Interior Structure and Construction A1 NGYANQI

Thesis proposal v3

  • 1. 11.08.10 Thesis Proposal Laura Janet Rodriguez Researchable Question How could a cognitive artifact1 for reflective cognition 2 be integrated into the profile management process 3 of 18-24 4 year old participants of social networking sites? Sub Questions How could a cognitive artifact... ...encourage a synergistic relationship 5 with participants? ...reveal a participant’s pattern of online behavior that puts them at risk? ...communicate the permanence of online information? ...expose the susceptibility of the future self? Areas of Investigation 1 Cognitive Artifact: According to Donald Norman, an expert of cognitive science, cognitive artifacts are “those artificial devices that maintain, display, or operate upon information in order to serve a representational function and that affect human cognitive performance.” 2 Reflective Cognition: According to Donald Norman, “the reflective mode is that of comparison and contrast, of thought, of decision making.” 3 Profile Management Process: The input of information within the boundaries of one’s personal profile page—via text or photo—that can be viewed by approved outsiders. 4 18-24: There is empirical evidence that the 15-24 year old age group have similar perspectives on online privacy and similar online behaviors within the realm of social networking. I narrowed down the age group further to 18-24 in an effort to exploit the affordances of participants that are not under parental supervision. 5 Synergistic Relationship: The interaction of two or more agents or forces so that their combined effect is greater than the sum of their individual effects. social networking 18-24 year olds participants cognitive artifact cognitive artifact reflective cogntion synergistic relationship online patterns permanence of online info susceptibility of future self
  • 2. 11.08.10 Thesis Assumptions, Justification, & Limitations Laura Janet Rodriguez Assumptions While there are many different kinds of social networking services, this thesis will focus on personal networks, like Facebook, Friendster and MySpace. These social networking services are designed to give viewers a sense of the participant’s true self, making their virtual identities similar to who they are in the real world. Most of the people in these networks are not hiding behind facades, since socially connecting with existing friendships is the main objective. Paul DiMaggio, et al writes in “Social Implications Of The Internet”, that “Online communities come in very different shapes and sizes, ranging from virtual communities that connect geographically distant people with no prior acquaintance who share similar interests, to settings that facilitate interactions among friendship networks or family members, to community networks that focus on issues relevant to a geographically defined neighborhood. Research on “online community” should distinguish among these forms, lest results appear contradictory and confusing“ (DiMaggio). Personal networks allow participants to create detailed online profiles and connect with other participants, with an emphasis on social relationships. They often involve the sharing of information with other approved participants, such as gender, age, interests, educational background and employment. These platforms may also share selected information with individuals and applications that are not authorized contacts (Fact Sheet 35). Justification The legalities on information privacy are currently fuzzy, so it is difficult to determine where the government is allowed to intervene. Our new ‘age of information’ is proliferating the exchange of private data without concise regulations on how collected information can be used. Participants of personal networks need to be cautious whenever inputting information, but caution and safety seem to dissipate within the framework of personal networks due to skewed perceptions on what is safe and trustworthy. Many participants of online social networks do not know the terms of use of the interface they interact and contribute to on a daily basis and they have no idea what role third party applications play or who truly has access to their information. The use of social networking sites is growing in popularity, and participants are not always aware of the lack of privacy in even a semi-public online environment. Although the 18-24 year old group only makes up 9% of social networking participants in the United States (Google Ad Planner: United States demographics data), they are proven to consistently post more information at a higher percentage than any other age group (Williams, Kaven, 2009). The amount of information participants post in their profiles could present risks to their privacy and safety; including identity theft, phishing scams, cyber harassment, cyber stalking, and cyber bullying. There should also be concern over the 18-24 age group because they soon will be entering the workforce with habits formed from long term risky behaviors online that could impact the security policy of their future workplace. Limitations Although there are many touchpoints where information privacy is at risk within the realm of online social networking, this study will focus solely on the profile management process where participants are confronted with specific motivations and prompts for sharing information. Although people aged 35-44 are the majority of social networking participants (Google Ad Planner: United States demographics data), older users are more concerned with information privacy than younger internet users ( I. Brown T. Zukowski, 2007). The 18-24 year old demographic, as whole, have similar online behaviors and attitudes toward privacy that place them at risk and will guide my design investigation’s purpose and outcome.
  • 3. Literature Review  started reading reflection participants 18-24 years cognitive artifact social networking Protect Your Digital Privacy: Survival Skills for the Information Age Glee Harrah & Cady McGregor  Things That Make Us Smart Donald Norman Grown Up Digital Don Tapscott Imagination and play in the electronic age Singer, Dorothy G. Privacy Nudges Lorrie Faith Cranor, director of the Carnegie Mellon Usable Privacy and Security Laboratory at Carnegie Mellon University Visceral Nudges Ryan Calo, fellow at the Center for Internet and Society at Stanford Law School  Cyberpsychology Kent L. Norman  Privacy as a Behavioral Phenomenon Journal of Science Issues  World Without Secrets Richard Hunter Designing Interaction: Psychology at the Human-Computer Interface John M. Carroll The second self : computers and the human spirit Sherry Turkle The Cognitive Artifacts of Designing Willemien Visser Relevant Projects 11.08.10 Thesis References Laura Janet Rodriguez