{"id":2738,"date":"2016-11-09T11:00:20","date_gmt":"2016-11-09T11:00:20","guid":{"rendered":"http:\/\/www.rumbletalk.com\/blog\/?p=2738"},"modified":"2021-06-15T07:44:27","modified_gmt":"2021-06-15T07:44:27","slug":"online-community-value","status":"publish","type":"post","link":"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/","title":{"rendered":"Online Community Security and Value &#8211; the Role of Boundary Negotiation"},"content":{"rendered":"<p>Whether you&#8217;re a social media junkie\u00a0or just lurk silently in a private online community, the shaky state of internet security probably hasn&#8217;t escaped you.<\/p>\n<p>Small leaks with monumental consequences make the headlines on a daily basis:<\/p>\n<p>Emails toppling public figures and prompting FBI investigations. Soundbites swinging election consensus like a pendulum. The list is endless, really.<\/p>\n<p>Yet despite what we have seen, industry and private internet use has taken a \u201cboot first, ask questions later\u201d approach to security.<\/p>\n<p>Individual use of internet text, audio, and video platforms is at an all-time high and growing. And the fact that we are less secure than ever appears to have no effect on the trend.<\/p>\n<p>Even in the risk-averse realms of business and government, telecommuting has\u00a0exploded\u00a0over the last ten years. Organizations rely more and more on text, voice and video communication as they become increasingly interconnected and remote.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-medium\" src=\"https:\/\/rumbletalk-images-upload.s3.amazonaws.com\/8cb8eaa7aa0c8efdda886127cc4b7953\/1478689394-private-online.jpg\" alt=\"online communitt. Private in the digital era. \" width=\"700\" height=\"465\" \/><\/p>\n<p>So, what\u2019s happened? Have we stopped caring about security?<\/p>\n<p>Doubtful.<\/p>\n<p>Social media users struggling with addiction still consider privacy to be a\u00a0<a href=\"http:\/\/news.cornell.edu\/stories\/2015\/12\/addicted-facebook-why-we-keep-returning\">critical factor<\/a>\u00a0in their decision to defect or revert. Others\u00a0are increasingly\u00a0opting for\u00a0private online communities\u00a0to meet their online social needs.<\/p>\n<p>If anything, the past few years have given us reason to rethink what privacy means and how security relates to it.<\/p>\n<p>The good news it, not all of security boils down to just keeping people away from information that can harm us.<\/p>\n<h2><strong>Negotiating Boundaries means Negotiating Value<\/strong><\/h2>\n<p>If privacy is the gateway between power and being powerless, security is the key to that gate.<\/p>\n<p>But does everything we consider private have to be secure?<\/p>\n<p>Let\u2019s be honest for a moment. Do you really know where every unflattering picture of yourself is lurking? Social media comments? Phone numbers? Passwords?<\/p>\n<p>Do you really know the\u00a0<em>exact<\/em>\u00a0whereabouts of your social security number?<\/p>\n<p>There\u2019s probably a massive amount of information about you floating around the internet and chances are you haven\u2019t made the effort to collect or track it.<\/p>\n<p>And that\u2019s ok.<\/p>\n<p>Because aside from all the fraud-prevention initiatives, insurance and other gimmicks we use to reassure ourselves, there\u2019s another factor at play \u2013 strategic boundary negotiation.<\/p>\n<p>You see, a lot of \u201cprivate\u201d stuff is private not because it can hurt you, but because it can help you. Both private and public network users allow rather broad access to \u201cprivate\u201d information in exchange for some kind of benefit.<\/p>\n<p>The practice of determining where that line sits &#8212;\u00a0<em>personally,\u00a0<\/em>for\u00a0<em>you<\/em>\u00a0&#8212; goes a long way in encouraging online activity and generating value for community members.<\/p>\n<p>So in an abstract sense, security is all about boundaries. And this is but one example of how it applies.<\/p>\n<p>To an online community, this means\u00a0more than just\u00a0protocols.<\/p>\n<p>A single\u00a0admin moderating for content, removing trolls and conducting general QA goes a long way.\u00a0It indicates that members can take your community seriously.<\/p>\n<p>Security here means leveraging\u00a0the value of information you wish to disseminate\u00a0&#8212; under your terms.<\/p>\n<h2><strong>Your Online Community Thrives on\u00a0Exclusivity<\/strong><\/h2>\n<p>Common interests and goals provide the value which binds an online community together. The currency for that value involves secured transactions of information.<\/p>\n<p>Suppose a famous author announces a reading of brand-new material on a private platform, allowing access to only a limited number of attendees.<\/p>\n<p>If she does this on the radio, the information is at the bottom tier of the leverage pyramid. But compartmentalization opens the door to charging premiums, generating hype and selecting the audience.<\/p>\n<p>Security plays an enabling role in all this.<\/p>\n<p>Whether die-hard fans or even the press distinguish between\u00a0<em>http<\/em>\u00a0and\u00a0<em>https<\/em>\u00a0protocols is almost irrelevant. That eavesdropping hacker isn\u2019t going to deter them from capitalizing on what\u00a0<em>they\u00a0<\/em>perceive as exclusivity.<\/p>\n<p>The fact that online\u00a0<em>safety<\/em>\u00a0might seem illusory today doesn&#8217;t mean that exclusivity is no longer an option. People will always want the greener grass.<\/p>\n<p>Thus even the most pessimistic host can encourage online activity by leveraging security.<\/p>\n<p>In light of all this, however, traditional security concerns probably still lurk on the back-burner. This is where our discussion turns to culture.<\/p>\n<h2><strong>Where to Go and Who to Trust<\/strong><\/h2>\n<p>Culture provides valuable insight as to\u00a0the nature\u00a0of an end product.<\/p>\n<p>Facebook\u2019s intention to launch a private online community platform, for example, has met with some understandable\u00a0<a href=\"http:\/\/www.onlinecommunityresults.com\/2016\/10\/17\/facebook-launches-private-community-platform-can-you-trust-it\/?\">skepticism.<\/a><\/p>\n<p>The company\u2019s notorious, unilateral and sudden changes to terms of privacy\u00a0are a recurring theme. Each time they nudge \u201cconsent\u201d a little further and make the opt-out more complicated.<\/p>\n<p>This practice routinely draws\u00a0protest from users, generating waves of\u00a0<a href=\"http:\/\/www.forbes.com\/sites\/miketempleman\/2015\/10\/05\/your-facebook-privacy-disclaimer-is-just-embarrassing\/#20aab6bc44a0\">lengthy disclaimers<\/a>\u00a0filled with fanciful legal jargon.<\/p>\n<p>Although the effort is understandable, they might as well be\u00a0trying to paddle a canoe upstream with a toothpick.<\/p>\n<p>There&#8217;s a reason Facebook waited until 2013 before making https the default standard. Their bottom line is sharing information &#8212; not protecting it. And social media giants have\u00a0the fiscal and legal resources to reach that goal regardless of what you post.<\/p>\n<p>But it goes beyond just legal tactics and choice of platform.<\/p>\n<p>Sure, RumbleTalk&#8217;s clients can\u00a0relax or tighten privacy settings per their own specifications. They can also request we do it for them.<\/p>\n<p>But our priority is and will always be to make sure no one but the client can make or demand\u00a0these changes.<\/p>\n<p>Social media isn&#8217;t\u00a0evil. Their culture is just based on inclusion and publicity.<\/p>\n<p>Companies devoted to privacy operate on exclusivity and focused activity. The private online community culture drives the market to prioritize\u00a0individual privacy.<\/p>\n<p>If the classical notion of security is a must, stick with the pro&#8217;s. Choose a platform where\u00a0keeping your information safe is a mission, not an obligation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you&#8217;re a social media junkie\u00a0or just lurk silently in a private online community, the shaky state of internet security probably hasn&#8217;t escaped you. Small leaks with monumental consequences make the headlines on a daily basis: Emails toppling public figures and prompting FBI investigations. Soundbites swinging election consensus like a pendulum. The list is endless, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"featured_image_url":"","seo_focus_kw":"","seo_meta_desc":""},"categories":[9],"tags":[249],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online Community Security and Value - the Role of Boundary Negotiation<\/title>\n<meta name=\"description\" content=\"Whether you&#039;re a social media junkie or just lurk silently in a private online community, the shaky state of internet security probably hasn&#039;t escaped you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Community Security and Value - the Role of Boundary Negotiation\" \/>\n<meta property=\"og:description\" content=\"Whether you&#039;re a social media junkie or just lurk silently in a private online community, the shaky state of internet security probably hasn&#039;t escaped you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/\" \/>\n<meta property=\"og:site_name\" content=\"Online Group Chat Room Plugin for Websites and Live events\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/rumbletalk\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-09T11:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-15T07:44:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rumbletalk-images-upload.s3.amazonaws.com\/8cb8eaa7aa0c8efdda886127cc4b7953\/1478689394-private-online.jpg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rumbletalk\" \/>\n<meta name=\"twitter:site\" content=\"@rumbletalk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/\",\"url\":\"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/\",\"name\":\"Online Community Security and Value - the Role of Boundary Negotiation\",\"isPartOf\":{\"@id\":\"https:\/\/rumbletalk.com\/blog\/#website\"},\"datePublished\":\"2016-11-09T11:00:20+00:00\",\"dateModified\":\"2021-06-15T07:44:27+00:00\",\"author\":{\"@id\":\"https:\/\/rumbletalk.com\/blog\/#\/schema\/person\/25d71b46ff2470eaf367d02f9d47726c\"},\"description\":\"Whether you're a social media junkie or just lurk silently in a private online community, the shaky state of internet security probably hasn't escaped you.\",\"breadcrumb\":{\"@id\":\"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rumbletalk.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Community Security and Value &#8211; the Role of Boundary Negotiation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rumbletalk.com\/blog\/#website\",\"url\":\"https:\/\/rumbletalk.com\/blog\/\",\"name\":\"Online Group Chat Plugin for Websites and Event\",\"description\":\"Embed a social group chat for communities and events. Grow your online audience with the next evolution of HTML chat room. Attach files, Mobile, Audio and Video calls.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rumbletalk.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/rumbletalk.com\/blog\/#\/schema\/person\/25d71b46ff2470eaf367d02f9d47726c\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rumbletalk.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1944e05b00ac133489dacf7fca386d64?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1944e05b00ac133489dacf7fca386d64?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"description\":\"This is the admin of the kingdom :)\",\"sameAs\":[\"https:\/\/rumbletalk.com\"],\"url\":\"https:\/\/rumbletalk.com\/blog\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online Community Security and Value - the Role of Boundary Negotiation","description":"Whether you're a social media junkie or just lurk silently in a private online community, the shaky state of internet security probably hasn't escaped you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/","og_locale":"en_US","og_type":"article","og_title":"Online Community Security and Value - the Role of Boundary Negotiation","og_description":"Whether you're a social media junkie or just lurk silently in a private online community, the shaky state of internet security probably hasn't escaped you.","og_url":"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/","og_site_name":"Online Group Chat Room Plugin for Websites and Live events","article_publisher":"https:\/\/www.facebook.com\/rumbletalk","article_published_time":"2016-11-09T11:00:20+00:00","article_modified_time":"2021-06-15T07:44:27+00:00","og_image":[{"url":"https:\/\/rumbletalk-images-upload.s3.amazonaws.com\/8cb8eaa7aa0c8efdda886127cc4b7953\/1478689394-private-online.jpg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_creator":"@rumbletalk","twitter_site":"@rumbletalk","twitter_misc":{"Written by":"Editor","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/","url":"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/","name":"Online Community Security and Value - the Role of Boundary Negotiation","isPartOf":{"@id":"https:\/\/rumbletalk.com\/blog\/#website"},"datePublished":"2016-11-09T11:00:20+00:00","dateModified":"2021-06-15T07:44:27+00:00","author":{"@id":"https:\/\/rumbletalk.com\/blog\/#\/schema\/person\/25d71b46ff2470eaf367d02f9d47726c"},"description":"Whether you're a social media junkie or just lurk silently in a private online community, the shaky state of internet security probably hasn't escaped you.","breadcrumb":{"@id":"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rumbletalk.com\/blog\/index.php\/2016\/11\/09\/online-community-value\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rumbletalk.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Online Community Security and Value &#8211; the Role of Boundary Negotiation"}]},{"@type":"WebSite","@id":"https:\/\/rumbletalk.com\/blog\/#website","url":"https:\/\/rumbletalk.com\/blog\/","name":"Online Group Chat Plugin for Websites and Event","description":"Embed a social group chat for communities and events. Grow your online audience with the next evolution of HTML chat room. Attach files, Mobile, Audio and Video calls.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rumbletalk.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/rumbletalk.com\/blog\/#\/schema\/person\/25d71b46ff2470eaf367d02f9d47726c","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rumbletalk.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1944e05b00ac133489dacf7fca386d64?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1944e05b00ac133489dacf7fca386d64?s=96&d=mm&r=g","caption":"Editor"},"description":"This is the admin of the kingdom :)","sameAs":["https:\/\/rumbletalk.com"],"url":"https:\/\/rumbletalk.com\/blog\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2738"}],"collection":[{"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2738"}],"version-history":[{"count":20,"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2738\/revisions"}],"predecessor-version":[{"id":10516,"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2738\/revisions\/10516"}],"wp:attachment":[{"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rumbletalk.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}