Jjcmcom 0361
Jjcmcom 0361
Jjcmcom 0361
doi:10.1111/j.1083-6101.2007.00400.x
Introduction
As social network sites (SNS) gain users and visibility, a wide range of websites have
adopted SNS features (boyd & Ellison, this issue). YouTube began as a video sharing
platform, but it also offers users a personal profile page—which YouTube calls
a ‘‘channel page’’—and enables ‘‘friending.’’ Research on SNSs has shown that the
meanings of social network site practices and features differ across sites and indi-
viduals (boyd, 2006). This article explores how YouTube users employ the technical
and social affordances of the site to calibrate access to their videos by members of
their social circle. Specifically, it examines how video sharing can support social
networks by facilitating socialization among dispersed friends. An important goal
of the article is to document how youth and young adults use YouTube’s video
sharing and commenting features to project identities that affiliate with particular
social groups. The analysis also evaluates to what extent YouTube’s video sharing
practices are conducted in public view (versus as private video exchanges) and how
these choices reflect different kinds of social relationships. For example, how does
sharing videos with certain friends but not others reflect different kinds of friend-
ships? More generally, how do young people maintain and delineate distinct social
networks through public video sharing?
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 361
In order to address these questions and themes, I begin by describing theoretical
frameworks that illustrate the relationship between media exchange and the pro-
cesses whereby social networks are negotiated online and in public. I then discuss
how youth and young adults manipulate both technical features and social mecha-
nisms to achieve different levels of visibility in their media sharing activities. Using
a combination of ethnographic methods that included semi-structured, formal inter-
views and analyses of videos, comments, and video responses, I argue that ‘‘friend-
ship linkages’’ are not the only—or even the primary—way in which some
participants express social linkages. Furthermore, I suggest that YouTube participa-
Background
The concept of ‘‘social networks’’ is difficult to define. Wellman (1996) argues that
online and offline social networks do not exist as such, but that they are useful
analytic constructs for understanding social dynamics. A social network will look
different depending upon how one measures it (counting the number of interactions
between members versus rating the closeness of relationships, for instance). A social
network is defined here as relations among people who deem other network mem-
bers to be important or relevant to them in some way (Wellman, 1996). Using media
to develop and maintain social networks is an established practice (Baym, 2000;
Horst & Miller, 2006; Ito & Okabe, 2005; Kendall, 2002).
One way that social networks are articulated and negotiated on social network
sites is through linking and viewing profiles (Donath & boyd, 2004; Gross & Acquisti,
2005). The linking of profiles through friendship requests and acceptances and the
ability to view the resulting connections on others’ profiles are tangible mechanisms
that reflect existing social networks. They also reflect change, as when friends are
added (Ellison, Steinfield, & Lampe, 2007). By studying social and technical choices
that participants make on social network sites, it is possible to analyze how different
social networks are created, maintained, and negotiated through media (Ellison
et al., 2007; Gross & Acquisti, 2005).
Social network sites are defined as websites that allow participants to construct
a public or semi-public profile within the system and that formally articulate their
relationship to other users in a way that is visible to anyone who can access their
profile (boyd & Ellison, this issue). This definition does not specify the closeness of
any given connection, but only that participants are linked in some fashion. Simi-
larly, this article considers social networks in a broad sense and examines their
362 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
sub-instantiations as they are visibly reflected on YouTube through friending prac-
tices, video sharing, and posting comments to videos.
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 363
Interrogating the Public/Private Dichotomy
Scholars invoking the public/private dichotomy typically use one of two analytically
distinct metaphors (Weintraub, 1997). The first is ‘‘what is hidden or withdrawn
versus what is open, revealed, or accessible’’ (pp. 4–5). Private things are ‘‘things that
we are able and/or entitled to keep hidden, sheltered, or withdrawn from others’’ (p. 6).
Similarly, ‘‘individuals have privacy to the extent that others have limited access to
information about them, to the intimacies of their lives, to their thoughts or bodies’’
(Sheehan, 2002, p. 22). This includes preventing physical access to materials, as well
as using symbols that are not easily understood by people outside a small social
364 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
determine public/private boundaries, rather than incorporating both lenses (Barnes,
2006; Sandvig, 2006) or 2) do not consider how contexts other than the one they are
analyzing shed light on public/private dimensions (Al-Saggaf, 2006). Such limita-
tions are unsurprising, given that entire volumes grapple with these complex terms
(Schoeman, 1984; Weintraub & Kumar, 1997). Yet, nuances and gradations exist in
who can access, manipulate, and distribute information. What do these nuances and
gradations look like within different contexts? How do social and technical affor-
dances enable or limit particular configurations? If communication technologies are
eroding these boundaries, what are the social responses to this erosion?
Method
The analysis that follows is based on an ethnographic investigation into young
people’s engagement with online video sharing on YouTube. The data include
semi-structured interviews, fieldnotes on observations conducted several times
a week over the course of one year on YouTube, analyses of posted videos and
comments, and examination of subscription and friending practices.1 The 54 inter-
viewees ranged in age from 9 to 43, although most were in the mid-teens to early 20s
range. In keeping with the project’s focus, most of the interviewees were from the
United States, although two were from Canada and two were from Europe. Formal
interviews lasted from one to three hours and included a pre-interview survey on
interviewees’ demographic background and media use. Twenty-nine interviews were
conducted over the phone, 15 interviews were conducted via instant messaging chat,
and 10 interviews were conducted face-to-face.
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 365
Observations were collected during varied activities, including watching the
main YouTube page to see what videos were featured, reading the YouTube video
blog, watching videos of interviewees and others, reading video comments, and
observing how YouTube participants responded to commentary (such as addressing
a comment in a video). Other data include observations gathered at video-themed
events that I attended in Los Angeles, San Francisco, and New York, including
a YouTube meet-up on July 7, 2007 in New York City.
Interviewees were recruited in several ways, such as asking members of the
research team’s personal networks for interviews and sending email requests for
366 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
Results
Creating and Negotiating Social Networks Through Video Sharing
Posting text comments and video responses to videos enacts Rouse’s (1991) concept
of media circuits that illustrates particular social network patterns. For example, an
aunt of two boys that I interviewed posted a comment on one of their videos. Living
several states away, the boys rarely see her. But by viewing her nephews’ videos and
posting comments, she re-affirms her position in a familial social network. When the
boys read her posted comments, they complete a media circuit that began with an
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 367
dorm’s hallway. One was wearing combat gear and the other, a set of medieval
armor. Several people filmed the incident, one of whom filmed it to share on
YouTube, given its reputation for similar spontaneous and playful videos. The video,
referred to here as Ninjas and Knights, was posted on September 30, 2006. Some of
the students noted that they did not know each other well prior to the mediated
incident. They further said that filming the incident for YouTube encouraged them
to meet and interact with each other.
Brian2:
368 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
the comment, ‘‘Can I please have my five minutes and seven seconds back?’’ In an
interview, one of the video makers said that he did not know the person who had
posted this comment from either his online or offline social networks. Further, he
did not appreciate the comment, nor did he feel compelled to interact with the
commenter. Thus, by posting a comment that did not display affinity with the video
maker, the comment discouraged the video maker from pursuing additional social
contact.
Conversely, interviewees reported that people who post comments of affinity or
leave thoughtful comments may prompt the video maker to respond to the poster of
Publicly Private
On YouTube, some participants broadcast extensive information about their iden-
tity. Moreover, they craft videos with content that is broadly appealing, and they
aggressively promote and disseminate their videos. This can be considered quite
public video making and viewing, because all three factors—identity information
about the video maker, content relevance, and technical access to videos—are
designed to be broadly appealing and widely available. On the private end of the
spectrum, video makers may choose to restrict information about their identity in
videos, and they may make videos with content that appeals only to a few close
friends. They can also restrict access to the videos technically, by using few or
cryptic tags or by invoking YouTube’s ‘‘friends-only’’ viewing feature, according
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 369
to which only members designated as the video maker’s friends may access the
video.
Other important categories of participation exist. Participants may share private
experiences through video but do so in a ‘‘public way,’’ by revealing personal identity
information. This behavior may be characterized as ‘‘publicly private,’’ in that they
disclose identity information about themselves. At the same time, they use mecha-
nisms to limit physical access to the videos or to limit understanding of their con-
tents. The first part of this compound expression thus refers to the amount of identity
information imparted by video makers. The second part refers to the available phys-
370 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
the video description, it will be impossible to use the tagging and search systems to
search for his videos. Only his close friends and family—whether online or offline—
are likely to find his videos using the tagging system as it was implemented at the
time of this writing. Unlike some other participants, he does not widely promote his
videos (such as by posting comments and directing viewers to his videos). Of his nine
videos, six of them received fewer than 200 views over periods ranging from five to 11
months. Even though YouTube enables global video sharing, relatively few people
view his videos there. With regard to tagging practices, it should be noted that
nuances in public and private access to videos are not only based on the video
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 371
of what constitutes a ‘‘friend’’ (boyd, 2006), YouTube participants apply different
definitions of what constitutes a ‘‘public’’ video. Despite the fact that YouTube
offers potential connections to a large public, some people choose to create less
public videos, some of which are not available or interesting to people beyond a few
close friends.
Anjin:
.And like I said, I don’t really feel too bad about [the swastika video] because I
don’t, like, display it super publicly. I guess people could stumble onto it
Privately Public
YouTube participation may take another hybrid form.3 Being ‘‘privately public’’
means making connections with many other people, while being relatively private
with regard to sharing identity information. Participants in this category conceal
certain aspects of their identity, while expanding their friend and subscriber base and
making videos with widely accessible content. Privately public individuals who were
interviewed included YouTube celebrities and non-famous participants who wished
to retain some anonymity. For instance, one person did not want his identity
revealed, lest it compromise professional credibility with clients and co-workers.
Other people cited concerns about safety and the desire to avoid stalkers.
One privately public video, which is referred to here as Vlad The Impaler, showed
a mask-wearing monster. ‘‘Vlad’s’’ menacing speech echoes the sentiments of other
participants who wish to interact with many people, but in a way that conceals
identifying information. The video announces a series of videos that he and his
friends intend to make. In this video, Vlad outlines the level of identity that people
should expect.
Vlad:
We have a strict rule [governing] our society that there are some things that
should never be seen, should never be known, [which is] more for our
protection than yours. If people knew that we were doing such things, [we]
372 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
would be punished, so you’ll never know our real names or our real faces but
you will know our entertainment.
In a chat interview, CT, a youth in his mid-teens, said that he created this character
with select friends as a secret joke. Although CT is in the costume, another friend
provided a narrative voice over, in which his voice was modulated to sound lower. CT
made the video after another friend (RJ) ‘‘jokingly’’ told him that he didn’t need CT’s
help to make videos. RJ implied that CT’s contribution was technically lacking. In
response, CT and some other friends created the ‘‘Vlad the Impaler’’ character. CT’s
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 373
Interviewer: .
It is rather [surprising] to me that RJ did not notice that video. I scanned
through [Vlad’s] subscriber list and it is not that long.
CT:
well one day he had seen it
and then he showed it to me that day because we had subscribed to him (he
always checks that) and was like hey [CT] look at this noob4
i had to comment on the cool [lighting] effect
Figure 2 MysteryGuitarMan
374 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
more personal information than does MadV. For instance, MGM speaks and shows
himself on camera, albeit usually behind glasses and often wearing a hat.5 In contrast,
MadV wears a Guy Fawkes6 mask, does not disclose much personal information
about himself, and never speaks.7
Although MadV’s participation is public, in that a large number of people view
his work and have a connection to him (as a YouTube ‘‘friend’’ or subscriber), the
person behind the persona does not disclose identity details such as name, location,
occupation, age, and gender.8 MadV has maintained relative anonymity, although he
said that this is becoming ‘‘trickier’’ as he attains greater popularity and participates
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 375
MadV supports is one in which he is the center of a directed social network in which the
fans watch and comment on his videos, but he does not engage in these same practices
toward fans. His practices are quite different from those that other interviewees
reported, in which small, close groups of friends post and watch videos intended for
consumption by a limited group. This and the other examples presented above illustrate
how by examining participants’ choices with regard to video sharing practices, processes
of social network maintenance, delineation, and negotiation are revealed.
376 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
In addition, some interviewees used their view counts and comment systems as
a way of gauging viewership, determining that their videos were not ‘‘super public’’ if
they did not garner much response. Just as prior research on blogging demonstrated
(Nardi, Schiano, & Gumbrecht, 2004; Viégas, 2005), a few interviewees were indif-
ferent to being watched. Further, they did not express awareness about how their
material could be accessed in ways outside their control. For instance, after the
purchase of YouTube, Google enabled its search engine to return results from general
searches that included YouTube videos. Such a feature widens video makers’ expo-
sure to being viewed, if they use tags that people searching Google also use to find
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 377
were lost in large, mediated, social networks. In the context of liberal friending
practices, discourse through comments and video responses provides another way
for participants to establish meaningful social connections.
Conclusion
This article demonstrated how YouTube participants used both technical and sym-
bolic mechanisms to attempt to delineate different social networks. It proposed new
categories of nuanced behavior types that are neither strictly public nor strictly
Notes
1 On YouTube channel pages, participants can display friend and subscription links or
withhold them from view, even from other YouTube friends. This contrasts to Donath
and boyd’s (2004) finding that friendship links are assumed by many participants to be
‘‘mutual’’ and ‘‘public’’ on social network sites. Subscriptions mean that when a new
video is posted, all the video maker’s subscribers are alerted through email about it.
Some interviewees had difficulty distinguishing the social difference between accepting
a friend request and subscribing to their videos.
2 The claim here is not that all viewers interested in racism or other subjects will actually
view a particular video, but rather, as Weintraub (1997) points out, that some subjects
are considered more public than others. What scholars have characterized as relatively
378 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association
more public issues are those that concern a larger collective versus, for example, gossip
that involves an event that relatively few people know or care about.
3 The two intermediate forms (‘‘publicly private’’ and ‘‘privately public’) discussed here
are not the only ones. However, these forms emerged as particularly salient in the
dataset used in this study.
4 A ‘‘noob’’ (short for ‘‘newbie’’) is a person who is new to a social group, typically an
online environment. The term is often used in a derogatory way to characterize
someone who is unfamiliar with the technical and social aspects of a particular online
community or activity.
References
Al-Saggaf, Y. (2006). The online public sphere in the Arab world: The war in Iraq on the
Arabiya Website. Journal of Computer-Mediated Communication, 12(1), article 16.
Retrieved July 1, 2007 from http://jcmc.indiana.edu/vol12/issue1/al-saggaf.html
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday,
11(9). Retrieved July 1, 2007 from http://www.firstmonday.org/issues/issue11_9/barnes/
index.html
Baym, N. (2000). Tune in Log On: Soaps, Fandom, and Online Community. Thousand Oaks,
CA and London: Sage.
boyd, d. (2006). Friends, Friendsters, and Top 8: Writing community into being on social
network sites. First Monday, 11(12). Retrieved February 28, 2007 from http://
www.firstmonday.org/issues/issue11_12/boyd/
Donath, J., & boyd, d. (2004). Public displays of connection. BT Technology Journal, 22(4),
71–82.
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook ‘‘friends:’’ Social
capital and college students’ use of online social network sites. Journal of
Computer-Mediated Communication, 12(4), article 1. Retrieved August 28, 2007 from
http://jcmc.indiana.edu/vol12/issue4/ellison.html
Feder, J. (1988). Fractals. New York and London: Plenum Press.
Friedman, S. L. (2006). Watching twin bracelets in China: The role of spectatorship and
identification in an ethnographic analysis of film reception. Cultural Anthropology, 21(4),
603–632.
Gal, S. (2002). A semiotics of the public/private distinction. Differences: A Journal of Feminist
Cultural Studies, 13(1), 77–95.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks.
Proceedings of WPES’05 (pp. 71–80). Alexandria, VA: ACM.
‘‘The gunpowder plot.’’ (2006). Retrieved February 28, 2007 from http://www.parliament.uk/
documents/upload/g08.pdf
Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association 379
Horst, H. A., & Miller, D. (2006). The Cell Phone: An Anthropology of Communication.
Oxford, UK and New York: Berg.
Ito, M., & D. Okabe (2005). Technosocial situations: Emergent structurings of mobile email
use. In M. Ito, D., Okabe, & M. Matsuda (Eds.), Personal, Portable, Pedestrian: Mobile
Phones in Japanese Life. Cambridge, MA: MIT Press.
Kendall, L. (2002). Hanging Out in the Virtual Pub: Identity, Masculinities, and Relationships
Online. Davis: University of California Press.
Lange, P. G. (2007 March). Commenting on comments: Investigating responses to
antagonism on YouTube. Paper presented at the Annual Conference of the Society for
380 Journal of Computer-Mediated Communication 13 (2008) 361–380 ª 2008 International Communication Association