skip to main content
10.1145/1180875.1180946acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
Article

A grounded theory of information sharing behavior in a personal learning space

Published:04 November 2006Publication History

ABSTRACT

This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, ePortfolio, and social networking functionality. It is primarily used within education as a tool to enhance learning, but is also used as a knowledge management tool and to develop communities of practice. Our results identify privacy as a main concern for users of a personal learning space and illustrate challenges users face in ensuring privacy of their information and strategies they employ to achieve the desired level of privacy. We then identify factors that affect users' decisions regarding disclosure of their personal artifacts to various people and groups in a personal learning space. The three main themes as emerged in our study include current stage in the information life cycle, the nature of trust between the owner and the receiver of information, and the dynamics of the group or community within which the information is being shared. Together, these themes portrayed a clearer picture of users' perspective on the privacy of their information in a personal learning space. The findings offer some ideas about how to create privacy management mechanisms for personal learning spaces that are based on users' mental model of information privacy. Practical implications of the results are also discussed.

References

  1. Adams, A., Users' perception of privacy in multimedia communication, Extended Abstract, in Proceedings of CHI 1999, Pittsburgh Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adams, A., The Implications of Users' Privacy Perception on Communication and Information Privacy Policies, in Proceedings of Telecommunications Policy Research Conference, Washington DC, 1999Google ScholarGoogle Scholar
  3. Adams, A., Sasse, M. A., Privacy in multimedia communications: protecting users not just data, in Proceedings of IMH HCI, 2001, pages 49--64Google ScholarGoogle ScholarCross RefCross Ref
  4. Batson, T., Electronic Portfolio Boom: What's it all about? Syllabus 2002, available online at http://www.syllabus.com/article.asp?id=6984Google ScholarGoogle Scholar
  5. Cohn, E. R., Hibbitts, B. J., Beyond the Electronic Portfolio: A Lifetime Personal Web Space, 2004, available online at http://www.educause.edu/apps/eq/eqm04/eqm0441.asp.Google ScholarGoogle Scholar
  6. Corritore, C. L., Kracher, B., Wiedenbeck, S., On-line trust: concepts, evolving themes, a model, in International Journal of Human-Computer Studies, Volume 58, Issue 6, June 2003, pages 737--758 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Erickson, T. From PIM to GIM: Personal Information Management in Group Contexts, in Communications of the ACM, January 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. The Elgg project home page: http://elgg.net/Google ScholarGoogle Scholar
  9. Glaser, B., Strauss, A., The Discovery of Grounded Theory: Strategies for Qualitative Research, Chicago, 1967Google ScholarGoogle Scholar
  10. Gathercoal, P., Love, D., Bryde, B., McKean, G., On Implementing Web-Based Electronic Portfolios, in Educause Quarterly 25(2), 2002, pages 29--37, available online at http://www.educause.edu/ir/library/pdf/eqm0224.pdfGoogle ScholarGoogle Scholar
  11. The GUSSE project home page: http://gusse.org/Google ScholarGoogle Scholar
  12. Karvonen, K., Creating Trust, in Proceedings of the Nordsec'99, the Fourth Nordic Workshop on Secure IT systems, November 1999, Kista, SwedenGoogle ScholarGoogle Scholar
  13. Lewicki, R.J., Bunker, B., Developing and maintaining trust in work relationships, in Trust in Organizations: Frontiers of Theory and Research, Sage, Newbury Park, CA, 1996, pp. 114--139Google ScholarGoogle Scholar
  14. Love, D., McKean, G., Gathercoal, P., Portfolios to Webfolios and Beyond: Levels of Maturation, in Educause Quarterly, Volume 27 Number 2, May 2004, available online at http://www.educause.edu/pub/eq/eqm04/eqm0423.asp?print=yesGoogle ScholarGoogle Scholar
  15. Morse, J. M., Richards, L., README FIRST for a User's Guide to Qualitative Methods, Sage publications, 2002Google ScholarGoogle Scholar
  16. Olson, J.S., Grudin, J., and Horvitz, E., A study of preferences for sharing and privacy, in Proceedings of CHI 2005, Portland, Oregon Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Patil, S, Lai, J. Who gets to know what, when: Configuring privacy permissions in an awareness application, in Proceedings of CHI 2005, Portland, Oregon Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tosh, D., Werdmuller, B., ePortfolios and weblogs: one vision for ePortfolio development, March 2004, available online at http://www.eradc.org/papers/ePortfolio_Weblog.pdfGoogle ScholarGoogle Scholar
  19. Whalen, T., Gates, C., Private Lives: User attitudes towards personal information on the web, poster, in SOUPS 2000Google ScholarGoogle Scholar

Index Terms

  1. A grounded theory of information sharing behavior in a personal learning space

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
        November 2006
        548 pages
        ISBN:1595932496
        DOI:10.1145/1180875

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 November 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate2,235of8,521submissions,26%

        Upcoming Conference

        CSCW '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader