{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T03:31:39Z","timestamp":1764732699682,"version":"build-2065373602"},"reference-count":42,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T00:00:00Z","timestamp":1478217600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/100023308","name":"Office of the Privacy Commissioner of Canada","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100023308","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2018,3]]},"abstract":"<jats:p> Earlier research using qualitative techniques suggests that the default conception of online social networks is as public spaces with little or no expectation of control over content or distribution of profile information. Some research, however, suggests that users within these spaces have different perspectives on information control and distribution. This study uses Q methodology to investigate subjective perspectives with respect to privacy of, and control over, Facebook profiles. The results suggests three different types of social media users: those who view profiles as spaces for controlled social display, exerting control over content or audience; those who treat their profiles as spaces for open social display, exercising little control over either content or audience; and those who view profiles as places to post personal information to a controlled audience. We argue that these different perspectives lead to different privacy needs and expectations. <\/jats:p>","DOI":"10.1177\/1461444816675184","type":"journal-article","created":{"date-parts":[[2016,11,5]],"date-time":"2016-11-05T01:31:06Z","timestamp":1478309466000},"page":"845-861","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":11,"title":["Display and control in online social spaces: Towards a typology of users"],"prefix":"10.1177","volume":"20","author":[{"given":"Alexandre","family":"Fortier","sequence":"first","affiliation":[{"name":"McGill University, Canada"}]},{"given":"Jacquelyn","family":"Burkell","sequence":"additional","affiliation":[{"name":"The University of Western Ontario, Canada"}]}],"member":"179","published-online":{"date-parts":[[2016,11,4]]},"reference":[{"issue":"2","key":"bibr1-1461444816675184","first-page":"137","volume":"8","author":"Allen M","year":"2012","journal-title":"Washington Journal of Law, Technology & Arts"},{"key":"bibr2-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.325"},{"key":"bibr3-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501608"},{"key":"bibr4-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/0196859912473777"},{"key":"bibr5-1461444816675184","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i12.1418"},{"key":"bibr6-1461444816675184","first-page":"119","volume-title":"Youth, Identity, and Digital Media","author":"boyd D","year":"2007"},{"volume-title":"Political Subjectivity","year":"1980","author":"Brown SR","key":"bibr7-1461444816675184"},{"key":"bibr8-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.870591"},{"key":"bibr9-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"bibr10-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"bibr11-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0411"},{"key":"bibr12-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812458432"},{"volume-title":"Equifax-Harris Mid-decade Consumer Privacy Survey","year":"1995","author":"Harris L","key":"bibr13-1461444816675184"},{"key":"bibr14-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610385893"},{"key":"bibr15-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.030"},{"journal-title":"The Guardian","year":"2010","author":"Johnson B","key":"bibr16-1461444816675184"},{"key":"bibr17-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0374"},{"key":"bibr18-1461444816675184","first-page":"170","volume":"23","author":"Lee B","year":"2000","journal-title":"Operant Subjectivity"},{"key":"bibr19-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.04.025"},{"key":"bibr20-1461444816675184","doi-asserted-by":"crossref","unstructured":"Litt E, Hargittai E (2016) The imagined audience on social network sites. Social Media + Society 2(1). Available at: http:\/\/www.webuse.org\/pdf\/LittHargittai-ImaginedAudience2016.pdf","DOI":"10.1177\/2056305116633482"},{"key":"bibr21-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00246"},{"key":"bibr22-1461444816675184","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985512"},{"volume-title":"Teens, Social Media, and Privacy","year":"2013","author":"Madden M","key":"bibr23-1461444816675184"},{"key":"bibr24-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"bibr25-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890929"},{"key":"bibr26-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.007"},{"key":"bibr27-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814530099"},{"key":"bibr28-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808099577"},{"volume-title":"Boundaries of Privacy","year":"2002","author":"Petronio S","key":"bibr29-1461444816675184"},{"key":"bibr30-1461444816675184","unstructured":"Schmolck P (2014) PQMethod software. Available at: http:\/\/schmolck.userweb.mwn.de\/qmethod\/ (accessed 16 August 2016)."},{"key":"bibr31-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820066"},{"key":"bibr32-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818207"},{"key":"bibr33-1461444816675184","unstructured":"Statista (2016) Global social networks ranked by number of users 2016. Available at: http:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/ (accessed 16 August 2016)."},{"key":"bibr34-1461444816675184","first-page":"769","volume-title":"ACM 2012 conference on computer supported cooperative work","author":"Stutzman F","year":"2012"},{"key":"bibr35-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1202129109"},{"key":"bibr36-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"bibr37-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01474.x"},{"key":"bibr38-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/1461444805052282"},{"key":"bibr39-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1177\/0163443712468605"},{"volume-title":"Doing Q Methodological Research","year":"2012","author":"Watts S","key":"bibr40-1461444816675184"},{"volume-title":"\u2018Am I bothered?\u2019 Using Q methodology to explore what bothers young people on Facebook","year":"2013","author":"Wint FE","key":"bibr41-1461444816675184"},{"key":"bibr42-1461444816675184","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2013.801686"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816675184","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816675184","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816675184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T15:02:22Z","timestamp":1740754942000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816675184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,4]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["10.1177\/1461444816675184"],"URL":"https:\/\/doi.org\/10.1177\/1461444816675184","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"type":"print","value":"1461-4448"},{"type":"electronic","value":"1461-7315"}],"subject":[],"published":{"date-parts":[[2016,11,4]]}}}