Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alice E. Marwick is active.

Publication


Featured researches published by Alice E. Marwick.


New Media & Society | 2011

I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience

Alice E. Marwick; danah boyd

Social media technologies collapse multiple audiences into single contexts, making it difficult for people to use the same techniques online that they do to handle multiplicity in face-to-face conversation. This article investigates how content producers navigate ‘imagined audiences’ on Twitter. We talked with participants who have different types of followings to understand their techniques, including targeting different audiences, concealing subjects, and maintaining authenticity. Some techniques of audience management resemble the practices of ‘micro-celebrity’ and personal branding, both strategic self-commodification. Our model of the networked audience assumes a many-to-many communication through which individuals conceptualize an imagined audience evoked through their tweets.


Convergence | 2011

To See and Be Seen: Celebrity Practice on Twitter:

Alice E. Marwick; danah boyd

Social media technologies let people connect by creating and sharing content. We examine the use of Twitter by famous people to conceptualize celebrity as a practice. On Twitter, celebrity is practiced through the appearance and performance of ‘backstage’ access. Celebrity practitioners reveal what appears to be personal information to create a sense of intimacy between participant and follower, publicly acknowledge fans, and use language and cultural references to create affiliations with followers. Interactions with other celebrity practitioners and personalities give the impression of candid, uncensored looks at the people behind the personas. But the indeterminate ‘authenticity’ of these performances appeals to some audiences, who enjoy the game playing intrinsic to gossip consumption. While celebrity practice is theoretically open to all, it is not an equalizer or democratizing discourse. Indeed, in order to successfully practice celebrity, fans must recognize the power differentials intrinsic to the relationship.


New Media & Society | 2014

Networked privacy: How teenagers negotiate context in social media

Alice E. Marwick; danah boyd

While much attention is given to young people’s online privacy practices on sites like Facebook, current theories of privacy fail to account for the ways in which social media alter practices of information-sharing and visibility. Traditional models of privacy are individualistic, but the realities of privacy reflect the location of individuals in contexts and networks. The affordances of social technologies, which enable people to share information about others, further preclude individual control over privacy. Despite this, social media technologies primarily follow technical models of privacy that presume individual information control. We argue that the dynamics of sites like Facebook have forced teens to alter their conceptions of privacy to account for the networked nature of social media. Drawing on their practices and experiences, we offer a model of networked privacy to explain how privacy is achieved in networked publics.


Public Culture | 2015

Instafame: Luxury Selfies in the Attention Economy

Alice E. Marwick

The popular photo-sharing app Instagram has created a new breed of celebrities: the Instafamous. This essay examines the phenomenon—from Singaporean socialites showing off shoe collections to high school sophomores with ten thousand followers—and its relationship to celebrity and tabloid culture.


Journal of Broadcasting & Electronic Media | 2012

“There Isn't Wifi in Heaven!” Negotiating Visibility on Facebook Memorial Pages

Alice E. Marwick; Nicole B. Ellison

Today, social network sites are a key site for public displays of connection and grieving. Mourners weigh the benefits of publicness with the problems associated with large and diverse audiences. The replicability, scalability, persistence, and searchability features of networked publics influence both how mourners grieve and their control over depictions of the deceased. This article analyzes a corpus of posts and comments on Facebook memorial pages (N = 37). We examine how the social and technical affordances of social media, and Facebook in particular, affect public displays of grief and portrayals of the deceased. The visibility of social media both encourages performative displays of mourning and allows wider audiences to pay respects. This openness allows for context collapse and potentially unwelcome participants such as “trolls.” We consider the ways in which the publicness of the SNS memorial page affects displays of grieving, specifically around efforts to engage in impression management of the deceased.


Social media and society | 2017

“Nobody Sees It, Nobody Gets Mad”: Social Media, Privacy, and Personal Responsibility Among Low-SES Youth

Alice E. Marwick; Claire Fontaine; danah boyd

While few studies examine the online privacy practices or attitudes of young people of low socio-economic status (SES), they are often at the most risk of and most susceptible to privacy violations. This participatory, collaborative study of 28 low-SES young adults in the New York City area investigates how they view online information sharing. Like most Americans, our participants viewed online privacy as an individual responsibility. We make two primary contributions. First, participants revealed extensive awareness of the risks of sharing information online, and many avoided social media, self-censored, or obfuscated their contributions as a result. Second, many participants had extensive experience with policing and physical surveillance and were aware they could not avoid such encounters through their own efforts. This window into structural discrimination provides an alternate frame to that of “individual responsibility” that educators and researchers can use to conceptualize how privacy is violated online. Framing online privacy violations as inevitable and widespread may not only help foster activist anger and strategic resistance but also avoid the victim-blaming narratives of some media literacy efforts. By examining the experiences of these young people, who are often left out of mainstream discussions about privacy, we hope to show how approaches to managing the interplay of on- and offline information flows are related to marginalized social and economic positions.


New Media & Society | 2012

Reading YouTube: The Critical Viewer’s Guide:

Alice E. Marwick

critical in shaping audience members’ relationships with other forms of social media, and scholars should pick up where this book leaves off. In summary, Global Advertising is a rich text that advances reception theory with respect to advertising. Whether one agrees with him or not, Wilson seeks to systematically demonstrate the weaknesses of the inductivist approach to studying advertising. The book is a nuanced look at advertising in its current form and how audiences experience advertising messages. With its focus and examples, this book can be utilized in a wide range of graduate classroom settings and for future theorizing.


Ethics and Information Technology | 2017

Scandal or sex crime? Gendered privacy and the celebrity nude photo leaks

Alice E. Marwick

In 2014, a large archive of hacked nude photos of female celebrities was released on 4chan and organized and discussed primarily on Reddit. This paper explores the ethical implications of this celebrity nude photo leak within a frame of gendered privacy violations. I analyze a selection of a mass capture of 5143 posts and 94,602 comments from /thefappening subreddit, as well as editorials written by female celebrities, feminists, and journalists. Redditors justify the photo leak by arguing the subjects are privileged because they are celebrities; that the celebrities are at fault for failing to appropriately protect their information; and that the only person ethically responsible for the leak is the hacker. The popular press primarily took a feminist perspective, linking the photo leak to institutionalized sexism and misogyny. I argue that the Reddit participants frame the privacy violations within a context of geek masculinity, in which references to masturbation and pornography and casually misogynist language are used to signify a normative masculine self. Privacy violations are de-emphasized when the victims are women and gender or feminist concerns are rejected. Entitlement to viewing women’s bodies and male sexual desire are prioritized over ethical concerns over privacy violations. The paper contributes to understanding how privacy violations are normatively gendered and reinforced by gender inequality.


Information, Communication & Society | 2018

Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online

Alice E. Marwick; Eszter Hargittai

ABSTRACT What incentives and disincentives do Internet users weigh as they consider providing information to institutional actors such as government agencies and corporations online? Focus group participants list several benefits to sharing information including convenience, access to information, personalization, financial incentives, and more accurate health information, but also recognize that not all sharing may be in their interest. Disincentives to sharing include skepticism, distrust, and fears of discrimination. Decisions about sharing are related to the information type, the context in which information is revealed, and the institution to which they are – or think they are – providing information. Significantly, many participants were mistrustful of both governmental and corporate actors. Participants displayed awareness of privacy risks, but frequently mischaracterized the extent to which information could be aggregated and mined. They displayed resignation towards privacy violations, suggesting that they perceived little control over their ability to protect their privacy, which may influence their privacy behaviors. This calls into question the privacy calculus, as individuals misunderstand the risks of their information provision and do not believe opting out of information-sharing is possible.


Journal of Computer-Mediated Communication | 2018

Performing a Vanilla Self: Respectability Politics, Social Class, and the Digital World

Mikaela Pitcan; Alice E. Marwick; danah boyd

“Respectability politics” describes a self-presentation strategy historically adopted by African-American women to reject White stereotypes by promoting morality while de-emphasizing sexuality. While civil rights activists and feminists criticize respectability politics as reactionary, subordinated groups frequently use these tactics to gain upward mobility. This paper analyzes how upwardly mobile young people of low socio-economic status in New York City manage impressions online by adhering to normative notions of respectability. Our participants described how they present themselves on social media by self-censoring, curating a neutral image, segmenting content by platform, and avoiding content and contacts coded as lower class. Peers who post sexual images, primarily women, were considered unrespectable and subject to sexual shaming. These strategies reinforce racist and sexist notions of appropriate behavior, simultaneously enabling and limiting participants’ ability to succeed. We extend the impression management literature to examine how digital media mediates the intersection of class, gender, and race.

Collaboration


Dive into the Alice E. Marwick's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jean Burgess

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Thomas Poell

University of Amsterdam

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

J. van Dijck

University of Amsterdam

View shared research outputs
Top Co-Authors

Avatar

Cliff Lampe

University of Michigan

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Frederic Stutzman

University of North Carolina at Chapel Hill

View shared research outputs
Researchain Logo
Decentralizing Knowledge