Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

How Do People Change Their Technology Use in Protest?: Understanding

Published: 07 November 2019 Publication History

Abstract

Researchers and the media have become increasingly interested in protest users, or people who change (protest use) or stop (protest non-use) their use of a company's products because of the company's values and/or actions. Past work has extensively engaged with the phenomenon of technology non-use but has not focused on non-use (nor changed use) in the context of protest. With recent research highlighting the potential for protest users to exert leverage against technology companies, it is important for technology stakeholders to understand the prevalence of protest users, their motivations, and the specific tactics they currently use. In this paper, we report the results of two surveys (n = 463 and n = 398) of representative samples of American web users that examine if, how, and why people have engaged in protest use and protest non-use of the products of five major technology companies. We find that protest use and protest non-use are relatively common, with 30% of respondents in 2019 reporting they were protesting at least one major tech company. Furthermore, we identify that protest users' most common motivations were (1) concerns about business models that profit from user data and (2) privacy; and the most common tactics were (1) stopping use and (2) leveraging ad blockers. We also identify common challenges and roadblocks faced by active and potential protest users, which include (1) losing social connections and (2) the lack of alternative products. Our results highlight the growing importance of protest users in the technology ecosystem and the need for further social computing research into this phenomenon. We also provide concrete design implications for existing and future technologies to support or account for protest use and protest non-use.

Supplementary Material

ZIP File (cscw087aux.zip)
Survey questionnaires used in the study

References

[1]
Anders Albrechtslund. 2008. Online social networking as participatory surveillance. First Monday 13, 3 (2008).
[2]
Eric P. S. Baumer. 2018. Socioeconomic Inequalities in the Non Use of Facebook. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18), 616:1-616:14.
[3]
Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, and Paul Dourish. 2015. On the Importance and Implications of Studying Technology Non-use. interactions 22, 2 (February 2015), 52-56.
[4]
Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 3295-3298.
[5]
Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, Leaving, and (Re)Lapsing: An Exploration of Facebook Non-use Practices and Experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3257-3266.
[6]
Eric PS Baumer, Morgan G Ames, Jenna Burrell, Jed R Brubaker, and Paul Dourish. 2015. Why study technology non-use? First Monday 20, 11 (2015).
[7]
Eric PS Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K Gay. 2015. Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Social Media+ Society 1, 2 (2015), 2056305115614851.
[8]
Eric P.S. Baumer, Xiaotong Xu, Christine Chu, Shion Guha, and Geri K. Gay. 2017. When Subjects Interpret the Data: Social Media Non-use As a Case for Adapting the Delphi Method to CSCW. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 1527-1543.
[9]
Spencer Beecher, Don van der Drift, David Martin, Lindsay Vass, Sergey Goder, Benedict Lim, and Matt Langner. 2019. facebookincubator/bootstrapped. bootstrapped Github Repository. Retrieved from https://github.com/facebookincubator/bootstrapped.
[10]
US Census Bureau. Income and Poverty in the United States: 2017. Retrieved June 23, 2019 from https://www.census.gov/data/tables/2018/demo/income-poverty/p60-263.html.
[11]
US Census Bureau. 2017 National Population Projections Tables. Retrieved August 12, 2019 from https://www.census.gov/data/tables/2017/demo/popproj/2017-summary-tables.html.
[12]
Pierre Dragicevic. 2016. Fair statistical communication in HCI. In Modern Statistical Methods for HCI. Springer, 291- 330.
[13]
Kerry Flynn. 2018. Facebook's making more money per user in North America than ever before. Digiday. Retrieved April 3, 2019 from https://digiday.com/marketing/facebooks-making-money-per-user-north-america-ever/.
[14]
Batya Friedman and Helen Nissenbaum. 1996. Bias in Computer Systems. ACM Trans. Inf. Syst. 14, 3 (July 1996), 330- 347.
[15]
José González Cabañas, Ángel Cuevas, and Rubén Cuevas. 2017. FDVT: Data Valuation Tool for Facebook Users. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 3799-3809.
[16]
Kevin Granville. 2018. Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens. N. Y. Times (March 2018). Retrieved from https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html.
[17]
Rebecca Greenfield, Sarah Frier, and Ben Brody. 2018. NAACP Seeks Week-Long Facebook Boycott Over Racial Targeting. Bloomberg.com (December 2018). Retrieved from https://www.bloomberg.com/news/articles/2018-12-17/naacp-calls-for-week-long-facebook-boycott-over-racial-targeting.
[18]
Jens Grossklags and Alessandro Acquisti. 2007. When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information. In WEIS.
[19]
Shion Guha, Eric P.S. Baumer, and Geri K. Gay. 2018. Regrets, I'Ve Had a Few: When Regretful Experiences Do (and Don'T) Compel Users to Leave Facebook. In Proceedings of the 2018 ACM Conference on Supporting Groupwork (GROUP '18), 166-177.
[20]
Shion Guha and Jeremy Birnholtz. 2013. Can you see me now?: location, visibility and the management of impressions on foursquare. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, 183-192.
[21]
Shion Guha and Stephen B. Wicker. 2015. Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1010-1020.
[22]
Eszter Hargittai. 2007. Whose space? Differences among users and non-users of social network sites. Journal of computer-mediated communication 13, 1 (2007), 276-297.
[23]
Astead W. Herndon. 2019. Elizabeth Warren Proposes Breaking Up Tech Giants Like Amazon and Facebook. The New York Times. Retrieved April 4, 2019 from https://www.nytimes.com/2019/03/08/us/politics/elizabeth-warren-amazon.html.
[24]
Daniel C Howe and Helen Nissenbaum. 2017. Engineering privacy and protest: A case study of AdNauseam. In CEUR Workshop Proceedings, 57-64.
[25]
Isaac L. Johnson, Yilun Lin, Toby Jia-Jun Li, Andrew Hall, Aaron Halfaker, Johannes Schöning, and Brent Hecht. 2016. Not at Home on the Range: Peer Production and the Urban/Rural Divide. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 13-25.
[26]
Jana Kasperkevic. 2018. Amazon faces boycott ahead of holidays as public discontent grows. the Guardian (December 2018). Retrieved from https://www.theguardian.com/technology/2018/dec/17/amazon-boycott-customers-holiday-shopping.
[27]
Brayden King. 2016. Reputation, risk, and anti-corporate activism: How social movements influence corporate outcomes. The Consequences of Social Movements (January 2016), 215-236.
[28]
Brayden G. King and Mary Hunter McDonnell. 2015. Good firms, good targets: The relationship among corporate social responsibility, reputation, and activist targeting. Corporate Social Responsibility in a Globalizing World (January 2015), 430-454.
[29]
Sebastian Koos. 2012. What drives political consumption in Europe? A multi-level analysis on individual characteristics, opportunity structures and globalization. Acta Sociologica 55, 1 (March 2012), 37-57.
[30]
Cliff Lampe, Jessica Vitak, and Nicole Ellison. 2013. Users and nonusers: Interactions between levels of adoption and social capital. In Proceedings of the 2013 conference on Computer supported cooperative work, 809-820.
[31]
Jaron Lanier and E Glen Weyl. 2018. A Blueprint for a Better Digital Society. Harvard Business Review (2018).
[32]
Hanlin Li, Bodhi Alarcon, Sara Milkes Espinosa, and Brent Hecht. 2018. Out of Site: Empowering a New Approach to Online Boycotts. Proc. ACM Hum.-Comput. Interact. 2, CSCW (November 2018), 106:1-106:28.
[33]
Kimberly Ling, Gerard Beenen, Pamela Ludford, Xiaoqing Wang, Klarissa Chang, Xin Li, Dan Cosley, Dan Frankowski, Loren Terveen, Al Mamunur Rashid, Paul Resnick, and Robert Kraut. 2005. Using Social Psychology to Motivate Contributions to Online Communities. Journal of Computer-Mediated Communication 10, 4 (July 2005), 00-00.
[34]
Michael Livingston. 2018. Here's when boycotts have worked and when they haven't. latimes.com (December 2018). Retrieved from https://www.latimes.com/nation/la-na-boycotts-history-20180228-htmlstory.html.
[35]
Amanda Lotz. 2019. "Big Tech" isn't one big monopoly - it's 5 companies all in different businesses. Retrieved from https://theconversation.com/big-tech-isnt-one-big-monopoly-its-5-companies-all-in-different-businesses-92791.
[36]
Farhad Manjoo. 2018. Stumbles? What Stumbles? Big Tech Is as Strong as Ever. The New York Times. Retrieved April 4, 2019 from https://www.nytimes.com/2018/08/01/technology/big-tech-earnings-stumbles.html.
[37]
Antonio García Martínez. 2019. Facebook Is Not a Monopoly, but It Should Be Broken Up. Wired. Retrieved April 4, 2019 from https://www.wired.com/story/facebook-not-monopoly-but-should-broken-up/.
[38]
Rahat Masood, Dinusha Vatsalan, Muhammad Ikram, and Mohamed Ali Kaafar. 2018. Incognito: A Method for Obfuscating Web Data. In Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18, 267- 276.
[39]
Arunesh Mathur, Jessica Vitak, Arvind Narayanan, and Marshini Chetty. 2018. Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 2018.
[40]
J. Nathan Matias. 2016. Going Dark: Social Factors in Collective Action Against Platform Operators in the Reddit Blackout. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 1138-1151.
[41]
Mary-Hunter McDonnell, Brayden G King, and Sarah A. Soule. 2015. A Dynamic Process Model of Private Politics: Activist Targeting and Corporate Receptivity to Social Challenges. Am Sociol Rev 80, 3 (June 2015), 654-678.
[42]
Michael J. Muller. 2003. The Human-computer Interaction Handbook. In Julie A. Jacko and Andrew Sears (eds.). L. Erlbaum Associates Inc., Hillsdale, NJ, USA, 1051-1068.
[43]
Benjamin J. Newman and Brandon L. Bartels. 2011. Politics at the Checkout Line: Explaining Political Consumerism in the United States. Political Research Quarterly 64, 4 (2011), 803-817.
[44]
Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, and Seda Gürses. 2018. POTs: Protective Optimization Technologies. arXiv preprint arXiv:1806.02711 (2018).
[45]
Eric A Posner and E Glen Weyl. 2018. Radical Markets: Uprooting Capitalism and Democracy for a Just Society. Princeton University Press.
[46]
Joseph Reagle and Lauren Rhue. 2011. Gender Bias in Wikipedia and Britannica. International Journal of Communication 5, 0 (August 2011), 21.
[47]
Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2016. How I Learned to Be Secure: A Census-Representative Survey of Security Advice Sources and Behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), 666-677.
[48]
Kenneth Rogoff. 2019. Big tech has too much monopoly power - it's right to take it on. the Guardian (April 2019). Retrieved from https://www.theguardian.com/technology/2019/apr/02/big-tech-monopoly-power-elizabeth-warren-technology.
[49]
Shruti Sannon, Natalya N Bazarova, and Dan Cosley. 2018. Privacy lies: Understanding how, when, and why people lie to protect their privacy in multiple online contexts. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 52.
[50]
Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7, 9-16.
[51]
Sarita Yardi Schoenebeck. 2014. Giving Up Twitter for Lent: How and Why We Take Breaks from Social Media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 773-782.
[52]
Alana Semuels. 2017. Why #DeleteUber and Other Boycotts Matter. Atlantic (February 2017). Retrieved from https://www.theatlantic.com/business/archive/2017/02/why-deleteuber-and-other-boycotts-matter/517416.
[53]
Jun Shao. 2003. Impact of the bootstrap on sample surveys. Statistical Science 18, 2 (2003), 191-198.
[54]
Aaron Shaw and Eszter Hargittai. 2018. The Pipeline of Online Participation Inequalities: The Case of Wikipedia Editing. J Commun 68, 1 (February 2018), 143-168.
[55]
Aaron Shaw, Haoqi Zhang, Andrés Monroy-Hernández, Sean Munson, Benjamin Mako Hill, Elizabeth Gerber, Peter Kinnaird, and Patrick Minder. 2014. Computer supported collective action. interactions 21, 2 (March 2014), 74-77.
[56]
Stefan Stieger, Christoph Burger, Manuel Bohn, and Martin Voracek. 2013. Who commits virtual identity suicide? Differences in privacy concerns, internet addiction, and personality between Facebook users and quitters. Cyberpsychology, Behavior, and Social Networking 16, 9 (2013), 629-634.
[57]
Nicholas Vincent, Brent Hecht, and Shilad Sen. 2019. "Data Strikes": Evaluating the Effectiveness of New Forms of Collective Action Against Technology Platforms. In Proceedings of The Web Conference 2019.
[58]
Robert Wright. 2018. Why We Can't Let Google Monopolize AI. Wired. Retrieved April 4, 2019 from https://www.wired.com/story/google-artificial-intelligence-monopoly/.
[59]
Sally ME Wyatt, Nelly Oudshoorn, and Trevor Pinch. 2003. Non-users also matter: The construction of users and nonusers of the Internet. Now users matter: The co-construction of users and technology (2003), 67-79.
[60]
Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy Protection Strategies on Facebook. Information, Communication & Society 16, 4 (May 2013), 479-500.
[61]
2018. History of Successful Boycotts - Ethical Consumer. Retrieved from https://www.ethicalconsumer.org/ethicalcampaigns/boycotts/history-successful-boycotts.
[62]
Standing up for what's right | Uber Newsroom. Retrieved June 24, 2019 from https://www.uber.com/newsroom/standing-up-for-whats-right-3/.
[63]
Buycott. Buycott App. Retrieved July 11, 2018 from https://www.buycott.com/.
[64]
Prime Day: activists protest against Amazon in cities across US. The Guardian. Retrieved August 14, 2019 from https://www.theguardian.com/technology/2019/jul/15/prime-day-activists-plan-protests-in-us-cities-and-a-boycott-of-e-commerce-giant.
[65]
Why Thousands Of Amazon Workers Are Striking On Prime Day | HuffPost. Retrieved August 14, 2019 from https://www.huffpost.com/entry/amazon-prime-day-minnesota-strike-germany-protest_n_5d2d52f8e4b02fd71dd95281.

Cited By

View all
  • (2024)Building, Shifting, & Employing Power: A Taxonomy of Responses From Below to Algorithmic HarmProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency10.1145/3630106.3658958(1093-1106)Online publication date: 3-Jun-2024
  • (2024)Data Agency Theory: A Precise Theory of Justice for AI ApplicationsProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency10.1145/3630106.3658930(631-641)Online publication date: 3-Jun-2024
  • (2024)Cleaning house or quiet quitting? Large-scale analysis of account deletion behaviour on TumblrBehaviour & Information Technology10.1080/0144929X.2024.2370432(1-21)Online publication date: 18-Jul-2024
  • Show More Cited By

Index Terms

  1. How Do People Change Their Technology Use in Protest?: Understanding

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 3, Issue CSCW
    November 2019
    5026 pages
    EISSN:2573-0142
    DOI:10.1145/3371885
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2019
    Published in PACMHCI Volume 3, Issue CSCW

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. online survey
    2. protest users
    3. technology non-use

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)171
    • Downloads (Last 6 weeks)24
    Reflects downloads up to 17 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Building, Shifting, & Employing Power: A Taxonomy of Responses From Below to Algorithmic HarmProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency10.1145/3630106.3658958(1093-1106)Online publication date: 3-Jun-2024
    • (2024)Data Agency Theory: A Precise Theory of Justice for AI ApplicationsProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency10.1145/3630106.3658930(631-641)Online publication date: 3-Jun-2024
    • (2024)Cleaning house or quiet quitting? Large-scale analysis of account deletion behaviour on TumblrBehaviour & Information Technology10.1080/0144929X.2024.2370432(1-21)Online publication date: 18-Jul-2024
    • (2023)Hate Raids on Twitch: Understanding Real-Time Human-Bot Coordinated Attacks in Live Streaming CommunitiesProceedings of the ACM on Human-Computer Interaction10.1145/36101917:CSCW2(1-28)Online publication date: 4-Oct-2023
    • (2023)Escaping the Walled Garden? User Perspectives of Control in Data Portability for Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/36101887:CSCW2(1-27)Online publication date: 4-Oct-2023
    • (2023)Opt-out, abstain, unplug. A systematic review of the voluntary digital disconnection literatureTelematics and Informatics10.1016/j.tele.2023.10198081:COnline publication date: 13-Jul-2023
    • (2022)Why Users Hack: Conflicting Interests and the Political Economy of SoftwareProceedings of the ACM on Human-Computer Interaction10.1145/35557746:CSCW2(1-26)Online publication date: 11-Nov-2022
    • (2022)Warm Solutions: Centering Nurse Contributions in Medical MakingProceedings of the ACM on Human-Computer Interaction10.1145/35557716:CSCW2(1-25)Online publication date: 11-Nov-2022
    • (2022)Risk, Resilience and Reward: Impacts of Shifting to Digital Sex WorkProceedings of the ACM on Human-Computer Interaction10.1145/35556506:CSCW2(1-37)Online publication date: 11-Nov-2022
    • (2022)From 'Friends with Benefits' to 'Sextortion:' A Nuanced Investigation of Adolescents' Online Sexual Risk ExperiencesProceedings of the ACM on Human-Computer Interaction10.1145/35551366:CSCW2(1-32)Online publication date: 11-Nov-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media