Philosophy and Technology 25 (3):415-434 (2012)
The article provides an instructive in-depth analysis of communicative practices in the personal blog. Its aim is to document the discursive dynamics and interactional ethics of blogging, with a specific focus on negotiations of the blogging self in-between public and private. Based on key findings from an empirical case study of personal blogs, the article addresses the negotiation of the blogging self from three interdependent perspectives: the network structures, patterns of interaction, and thematic orientations of the blog. Instead of approaching the online self as the individual blogger’s self-presentation to an often unknown and unfamiliar audience, I analyse and discuss the ‘blogging self’ as a relational and collaborative accomplishment, as something that is constantly subject to negotiation between author and readers, and is framed by the blog as a communicative genre. The theoretical foundation for this relational approach to the self is inspired by the work of sociologist Georg Simmel on how individuals attune to their networks of affiliation in a process of socialisation (Simmel 1955). The article contributes to the discussion of ethical behaviour and privacy protection in social media by highlighting the role of phatic communication in the blog. Specifically, I demonstrate how participants in the blog network negotiate and maintain an ethos of privacy protection in and through practices associated with the phatic. They do this by adhering to a ‘principle of sociability’, allowing them to experience their communication as personal but not private.
|Keywords||Negotiated selves Blogging Network Ethos of privacy Phatic communication Principle of sociability Simmel|
|Categories||categorize this paper)|
References found in this work BETA
The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185-200.
Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
Reflective Judgment and Enlarged Thinking Online.May Thorseth - 2008 - Ethics and Information Technology 10 (4):221-231.
Citations of this work BETA
Ethical Issues in the Employment of User-Generated Content as Experimental Stimulus: Defining the Interests of Creators.Ben Merriman - 2014 - Research Ethics 10 (4):196-207.
Similar books and articles
Interactivity and Prioritizing the Human: A Code of Blogging Ethics.Martin Kuhn - 2007 - Journal of Mass Media Ethics 22 (1):18 – 36.
Ensayando el blog - Qué aporta tu post (Essaying the blog - Your post's contribution).José Angel García Landa - manuscript
“Comment Me Back”: Expectations of Intimacy in the Culture of Blog.Kalynne Hackney Pudner - 2007 - International Journal of Applied Philosophy 21 (1):65-71.
The Sport-Blogging Community and the Public Sphere: An Israeli Perspective.Yair Galily, Ilan Tamir & Ofer Muchtar - 2012 - Journal for Communication and Culture 2 (1):68-87.
Online Privacy as a Corporate Social Responsibility: An Empirical Study.Irene Pollach - 2011 - Business Ethics 20 (1):88-102.
Inaccuracy as a Privacy-Enhancing Tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
The Roles, Reasons and Restrictions of Science Blogs.John S. Wilkins - 2008 - Trends in Ecology and Evolution 23 (8):411-413.
Blogs and the Narrativity of Experience.José Angel García Landa - 2008 - Information Systems: Behavioral and Social Methods Working Papers Series 2 (6).
“Myspace” or Yours? The Ethical Dilemma of Graduate Students' Personal Lives on the Internet.Keren Lehavot - 2009 - Ethics and Behavior 19 (2):129 – 141.
Privacy in (Mobile) Telecommunications Services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
"If I Break a Rule, What Do I Do, Fire Myself?" Ethics Codes of Independent Blogs.David D. Perlmutter & Mary Schoen - 2007 - Journal of Mass Media Ethics 22 (1):37 – 48.
Toward an Approach to Privacy in Public: Challenges of Information Technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
Added to index2011-04-09
Total downloads31 ( #166,463 of 2,172,874 )
Recent downloads (6 months)2 ( #172,512 of 2,172,874 )
How can I increase my downloads?