IDEAS home Printed from https://ideas.repec.org/a/sae/socres/v27y2022i3p690-706.html
   My bibliography  Save this article

What Happens Next? Using the Story Completion Method to Surface the Affects and Materialities of Digital Privacy Dilemmas

Author

Listed:
  • Ash Watson

    (UNSW Sydney, Australia)

  • Deborah Lupton

    (UNSW Sydney, Australia)

Abstract

People’s ideas and practices concerning their personal data and digital privacy have received growing attention in social inquiry. In this article, we discuss findings from a study that adopted the story completion method together with a theoretical perspective building on feminist materialism to explore how people make sense of and respond to digital privacy dilemmas. The Digital Privacy Story Completion Project presented participants with a set of four story prompts (‘stems’) for them to complete. Each introduced a fictional character facing a privacy dilemma related to personal data generated from their online interactions or app use. Our analysis surfaces how privacy is imagined as simultaneously personal and social, redolent with affective intensities, and framed through relational connections of human and nonhuman agents. While the story stems involved scenarios using digital technologies, participants’ stories extended beyond the technological. These stories offer insight into why and how the potential for and meaning of digital privacy unfolds into more-than-digital worlds.

Suggested Citation

  • Ash Watson & Deborah Lupton, 2022. "What Happens Next? Using the Story Completion Method to Surface the Affects and Materialities of Digital Privacy Dilemmas," Sociological Research Online, , vol. 27(3), pages 690-706, September.
  • Handle: RePEc:sae:socres:v:27:y:2022:i:3:p:690-706
    DOI: 10.1177/13607804221084343
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/13607804221084343
    Download Restriction: no

    File URL: https://libkey.io/10.1177/13607804221084343?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Seweryn Rudnicki, 2017. "The Body, Technology and Translation: Mapping the Complexity of Online Embodiment," Sociological Research Online, , vol. 22(2), pages 35-47, May.
    2. Minna Ruckenstein & Julia Granroth, 2020. "Algorithms, advertising and the intimacy of surveillance," Journal of Cultural Economy, Taylor & Francis Journals, vol. 13(1), pages 12-24, January.
    3. Julia Brannen, 2013. "Life Story Talk: Some Reflections on Narrative in Qualitative Interviews," Sociological Research Online, , vol. 18(2), pages 48-58, May.
    4. Caroline Lancelot Miltgen & Dominique Peyrat-Guillard, 2014. "Cultural and generational influences on privacy concerns: a qualitative study in seven european countries," Post-Print hal-01116067, HAL.
    5. Sonia Livingstone, 2008. "Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression," LSE Research Online Documents on Economics 27072, London School of Economics and Political Science, LSE Library.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mª Victoria Bordonaba-Juste & Laura Lucia-Palacios & Raúl Pérez-López, 2020. "Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services," Information Systems and e-Business Management, Springer, vol. 18(1), pages 35-60, March.
    2. Elisabeth Staksrud & Kjartan Ólafsson & Sonia Livingstone, 2013. "Does the use of social networking sites increase children’s risk of harm?," LSE Research Online Documents on Economics 45016, London School of Economics and Political Science, LSE Library.
    3. Pal, Debajyoti & Zhang, Xiangmin & Siyal, Saeed, 2021. "Prohibitive factors to the acceptance of Internet of Things (IoT) technology in society: A smart-home context using a resistive modelling approach," Technology in Society, Elsevier, vol. 66(C).
    4. Laura Lucia-Palacios & Victoria Bordonoba-Juste & Raúl Pérez-López, 2021. "Consumer-to-consumer reselling adoption among European countries: differences between old and young millennials," Service Business, Springer;Pan-Pacific Business Association, vol. 15(2), pages 253-279, June.
    5. Montgomery, Kathryn C., 2015. "Youth and surveillance in the Facebook era: Policy interventions and social implications," Telecommunications Policy, Elsevier, vol. 39(9), pages 771-786.
    6. Tamara Shepherd, 2012. "Persona rights for user-generated content: a normative framework for privacy and intellectual property regulation," LSE Research Online Documents on Economics 59450, London School of Economics and Political Science, LSE Library.
    7. Van Royen, Kathleen & Poels, Karolien & Vandebosch, Heidi, 2016. "Harmonizing freedom and protection: Adolescents' voices on automatic monitoring of social networking sites," Children and Youth Services Review, Elsevier, vol. 64(C), pages 35-41.
    8. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
    9. Julia Schmitt & Klaus Miller & Bernd Skiera, 2021. "The Impact of Privacy Laws on Online User Behavior," Working Papers hal-03857505, HAL.
    10. Daria J. Kuss & Mark D. Griffiths, 2011. "Online Social Networking and Addiction—A Review of the Psychological Literature," IJERPH, MDPI, vol. 8(9), pages 1-25, August.
    11. Joyce Vissenberg & Leen d'Haenens, 2020. "Protecting Youths’ Wellbeing Online: Studying the Associations between Opportunities, Risks, and Resilience," Media and Communication, Cogitatio Press, vol. 8(2), pages 175-184.
    12. Omar A. Alismaiel, 2023. "Digital Media Used in Education: The Influence on Cyberbullying Behaviors among Youth Students," IJERPH, MDPI, vol. 20(2), pages 1-19, January.
    13. Omrani, Nessrine & Soulié, Nicolas, 2017. "Culture, Privacy Conception and Privacy Concern: Evidence from Europe before PRISM," 14th ITS Asia-Pacific Regional Conference, Kyoto 2017: Mapping ICT into Transformation for the Next Information Society 168531, International Telecommunications Society (ITS).
    14. Ruwan Bandara & Mario Fernando & Shahriar Akter, 2020. "Privacy concerns in E-commerce: A taxonomy and a future research agenda," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(3), pages 629-647, September.
    15. Aditi Khodke & Atsushi Watabe & Nigel Mehdi, 2021. "Implementation of Accelerated Policy-Driven Sustainability Transitions: Case of Bharat Stage 4 to 6 Leapfrogs in India," Sustainability, MDPI, vol. 13(8), pages 1-25, April.
    16. Hanna Krasnova & Thomas Widjaja & Peter Buxmann & Helena Wenninger & Izak Benbasat, 2015. "Research Note—Why Following Friends Can Hurt You: An Exploratory Investigation of the Effects of Envy on Social Networking Sites among College-Age Users," Information Systems Research, INFORMS, vol. 26(3), pages 585-605, September.
    17. Amy C. Wood & Jacqueline M. Wheatcroft, 2020. "Young Adult Perceptions of Internet Communications and the Grooming Concept," SAGE Open, , vol. 10(1), pages 21582440209, March.
    18. Röding, Tobias & Steinmann, Sascha & Wagner, Gerhard & Schramm-Klein, Hanna, 2023. "A classification of information-oriented PoS technology from customer perception," Journal of Retailing and Consumer Services, Elsevier, vol. 70(C).
    19. Jung, Yoonhyuk & Park, Jonghwa, 2018. "An investigation of relationships among privacy concerns, affective responses, and coping behaviors in location-based services," International Journal of Information Management, Elsevier, vol. 43(C), pages 15-24.
    20. Kim, Hakkyun & Lee, Kyoungmi & Park, Kiwan, 2015. "Balancing out feelings of risk by playing it safe: The effect of social networking on subsequent risk judgment," Organizational Behavior and Human Decision Processes, Elsevier, vol. 131(C), pages 121-131.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:socres:v:27:y:2022:i:3:p:690-706. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.