Article
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Prior research has established the phenomenon of the ‘Chilling Effect’ where people constrain the self they present online due to peer-to-peer surveillance on Social Network Sites (SNS). However currently uninvestigated is the possibility that the threat of such surveillance on these sites might constrain the self presented offline in ‘reality’, known here as ‘the extended chilling effect’. The purpose of this study is to examine the existence of this ‘extended chilling effect’. Drawing on theories of self-awareness and self-presentation, the impact of surveillance in SNS is theorized to lead to an awareness of online audiences in offline domains, stimulating a self-comparison process that results in impression management. A mixed methods study of semi-structured interviews (n = 28) and a 2 × 2 between-subjects experiment (n = 80), provides support for offline impression management in order to avoid an undesired image being projected to online audiences. The novel finding that the chilling effect has extended highlights the potential dangers of online peer-to-peer surveillance for autonomy and freedom of expression in our offline lives.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... The presence of unrealistic models on social networks, which respond to cultural ideals of beauty (being fit, thin, fashionable), usually represents an ideal self-model for most adolescents and influence their behavior. Online audiences can impact behavior by stimulating different outcomes: warning (when new behaviors are favored by online audiences) and chilling effects, when behaviors are restricted by the online audiences (Marder et al., 2016;Lavertu et al., 2020). The impact of online audiences on offline behavior can be either warming or chilling, depending on the individual's goal. ...
... The impact of online audiences on offline behavior can be either warming or chilling, depending on the individual's goal. Therefore, the extended chilling effect of social media is «the constraining of behavior in reality (i.e., offline) as a consequence of the perceived expectation these online audiences hold» (Lavertu et al., 2020, p.1); for example, people would avoid smoking in the fear that a photo would be posted on social media (Marder et al., 2016). In accordance with Marder et al. (2016), «people could respond in a 'chilling' manner for a number of reasons, including fear of external sanctions and social disapproval, regardless of whether or not that threat of sanction is real or not» (p.582). ...
... Therefore, the extended chilling effect of social media is «the constraining of behavior in reality (i.e., offline) as a consequence of the perceived expectation these online audiences hold» (Lavertu et al., 2020, p.1); for example, people would avoid smoking in the fear that a photo would be posted on social media (Marder et al., 2016). In accordance with Marder et al. (2016), «people could respond in a 'chilling' manner for a number of reasons, including fear of external sanctions and social disapproval, regardless of whether or not that threat of sanction is real or not» (p.582). Moreover, Lavertu et al. (2020) proposed that public self-awareness (based on imaginary and real audiences online) can also be a positive self-referent (warning effect), for an individual's behavior (e.g. ...
Article
Full-text available
According to recent studies, social media are settings where adolescents construct their identities while engaging in social interactions. In digital spaces, adolescents can interact with, display, and receive feedback about themselves, contributing to the development of a clear and integrated sense of self. This paper reviews the available empirical evidence and discusses four overarching themes related to identity construction in social media: self-presentation (attempting to control images of self to others), social comparison (compare themselves with others, especially evaluating the self), role model (media figures that are social references for behavior), and online audience (friends, peers, unknow/know referents with whom users may interact online). Moreover, it proposes a new contextual perspective on identity development on social media. Informed by research on these themes that social media features allow adolescents to perform self-presentations, offering the opportunity to express interests, ideas, and beliefs about themselves (identification and role exploration). The image presented on social media exposes them to feedback, online audiences, and social comparison with peers or social models. Audiences have an impact on how adolescents think about themselves (self-concept validation). Role models can facilitate the learning of behaviors through imitation and identification (exploration and commitment). Thus, the digital world provides a context for the development of adolescents’ personal identity. This proposal aims to contribute to the construction of future theories on identity in social media and advance this area of research.
... Previous studies confirmed the applicability of self-awareness theory in the context of social networking. Drawing on the theory of self-awareness, Marder et al. (2016) posited that the impact of SNS surveillance might make people feel monitored by audiences even in real life. Furthermore, Lavertu et al. (2020) found that the offline salience of online audiences will increase people's public selfawareness and external motivation, thus increasing people's willingness to participate in offline prosocial activities. ...
... In sum, active SNS use increases awareness of the audience's presence (Tu and McIsaac, 2002;Marder et al., 2016;Lavertu et al., 2020), creating a higher public self-awareness. In turn, higher public Overview of the proposed moderated mediation model. ...
... Governments or companies may post pro-environmental information on SNS platforms with low anonymity or strong social ties. These contexts may make users more concerned about impression management and more inclined to environmental protection (Marder et al., 2016;Lee and Jang, 2019). In addition, companies can design products with conspicuous pro-environmental symbols to encourage SNSs users to purchase. ...
Article
Full-text available
A growing body of literature suggests a link between the usage of social networking sites (SNSs) and green consumption. However, researchers have shown that not all types of SNS usage have the same effect on individuals; therefore, to fully understand the relationship between a particular SNS use type and green consumption, as well as the mechanisms underlying the relationship, more research is required. This study examined a moderated mediation model based on self-awareness theory to explain the “how” and “why” of the relationship between active SNS use and green consumption. An offline survey (N = 210) and an online survey (N = 348) were conducted. The results suggest that active SNS use is positively associated with green consumption via public self-awareness and that impression management motives moderate the mediating role of public self-awareness in the relationship between active SNS use and green consumption. By examining the connection between a specific type of SNS use (active SNS use) and green consumption, our study adds to the body of literature on the causes of green consumption. The results have substantial implications for future research promoting socially responsible consumption behavior.
... This statement is indicative of a growing concern with surveillance in the academy. Prior research has found that the perception of social media surveillance produced a chilling effect on speech and behavior that extended even to offline situations (Lavertu et al., 2020;Marder, et al., 2016;Stoycheff, et al., 2019). These findings, along with a growing chorus of concerns about cancel culture in higher education, raise questions about the types of surveillance anticipated by scholars and how perceptions of surveillance may influence the ways that academics present themselves on social media. ...
... Few academic institutions have policies to guide faculty or administrators in such instances (Pomerantz et al., 2015), and the results of this study will further assist higher education in these efforts. In addition, as anticipation of surveillance has been shown to produce a chilling effect on speech and behavior (i.e., self-presentation) (Lavertu et al., 2020;Marder, et al., 2016;Stoycheff, et al., 2019), understanding scholars' perceptions in this regard helps to determine the scope of cancel culture and as it relates to academic speech. Indeed, this study is among the first to gather empirical data from academics, or any population, on the notion of cancel culture. ...
... Through the convergence of digital, mobile, and social media technologies, surveillance-watching and being watched-is now an everyday experience and a defining characteristic of the present culture (Lyon, 2017). The perception of being visible to online audiences shapes how people present themselves, not only on social media but also offline in "real life" Lavertu et al., 2020;Marder, 2018;Marder et al., 2016;Marwick et al., 2017;Pitcan et al., 2018;Scolere et al., 2018;Stoycheff et al., 2019). Strategically adapting one's speech and behavior to avoid negative evaluation is a normal part of impression management ). ...
Thesis
Full-text available
The purpose of this qualitative descriptive study was to explore how academics in the United States described their social media self-presentations (SMSPs) in the context of imagined surveillance. Moral Reasoning Theory drove two RQs: (1) How do academics describe construction of SMSPs in the context of imagined surveillance? (2) How do academics describe the influence of imagined surveillance on their personal SMSPs? 106 academics from across the U.S. were recruited by convenience sampling from two scholarly associations. Data were collected from closed-/open-ended questionnaires (n=102) and semi-structured interviews (n=20). Data analysis applied a six-phased Reflexive Thematic Analysis procedure of inductive coding to generate five themes and 14 subthemes. Academics described SMSP construction as negotiating (1) promises and perils of in/visibility, including (a) unspoken rules, (b) overlapping identities, (c) social support, and (d) personal opinion-sharing, which was profoundly shaped by (2) the rise of cancel culture, or an (a) enforced ideology, (b) activist subgroup, and (c) pressure to signal support. Imagined surveillance influenced SMSPs toward (3) protection over participation by (a) withdrawal from social media, viewing (b) tenure as insufficient, and (c) safe social media strategies; (4) trepidation while teaching due to (a) classroom recording prompted (b) strategic instruction; and (5) resistance and rebellion to (a) push back on cancel culture with a (b) duty to speak out. This study advanced understanding of social media surveillance as a normalizing force on speech and behavior. Findings may be applied to policy and practice regarding social media use in education and other professional settings.
... When previously victimized women find themselves in an online or hybrid college course, their instructor will require them to engage in online peer discussion boards without considering how these women's past bullying experiences have led them to avoid online engagement with people they do not trust. While scholarship has found that the chilling effect of cyberbullying (i.e., the defensive coping strategies adopted by victims) extends into the physical classroom causing students to behave inauthentically to appear desirable to their peers (Marder et al., 2016), these works have not addressed how the chilling effect of cyberbullying might extend into peer interactions in the online classroom. As a result, the current research fails to address if some students are entering the online course with a different attitude or set of strategies for participating on online discussion boards. ...
... Instead of reporting the bully to their university's support services or seeking counseling, victimized students often adopt technical solutions such as blocking the bully on social media, increasing their own privacy settings, and choosing not to post content on social media (Alipan et al., 2018). Often referred to as the chilling effect of online harassment (Marder et al., 2016), these defensive coping strategies create distance between the victim and the cyberbullying, but can isolate the victim from their online community and self-censor their participation (Alipan et al., 2018;Chadha et al., 2020). This chilling effect serves to avoid interpersonal confrontation, or drama, as it is later referred to in this paper. ...
... Women and girls commonly self-censor after negative online interactions like cyberbullying and online harassment (e.g., Duggan, 2017). Marder et al. (2016) found that the chilling effect of cyberbullying extends into face-to-face and social media interaction finding that college students "normalize" their behavior to perform the role of "the perceived standards, expectations and values of the perceived surveyor" (pg. 583). ...
Article
Cyberbullying affects the majority of undergraduate women, contributing to withdrawal from social media and chilling their participation in the growing world of collaborative online discussions. This pilot mixed-methods study integrates surveys, observations, and interviews of nine undergraduate women at a Mid-Atlantic research university to investigate how the chilling effect of cyberbullying may extend into peer interactions within an increasingly common online instructional practice: online discussion boards. It is observed that, in comparison to their non-victimized peers, participating women with prior cyberbullying experiences enact lower social presence and adopt self-silencing and conflict avoidant coping strategies. In particular, these women avoid ever disagreeing with peers out of fear of starting “drama.” Findings challenge educators to consider the potential unintended consequences of instructional design choices and contributes to our understanding of how to design more equitable online learning environments for today’s socially networked learners.
... According to Penny and Marder et al. 's definition of the chilling effect, it can be understood as "the effect of audience monitoring on constrained behavior [56]". Based on previous research, Stubenvoll et al. translated chilling effect-related behaviors into reduced online search behavior, online expression of opinions, and use of websites, news, and social media [57]. ...
... Based on previous research, Stubenvoll et al. translated chilling effect-related behaviors into reduced online search behavior, online expression of opinions, and use of websites, news, and social media [57]. A study by Ben Marder et al. revealed for the first time the potentially far-reaching implications of online peer-to-peer surveillance, revealing the importance of further research into this phenomenon [56].To understand whether the threat of such surveillance on websites related to AI products affects users' continued willingness to use them, this study expands on the original model by focusing on the chilling effect as a new perspective that affects willingness to use. ...
Article
Full-text available
Background The rapid growth of artificial intelligence (AI) technologies has been driven by the latest advances in computing power. Although, there exists a dearth of research on the application of AI in medical education. Methods this study is based on the TAM-ISSM-UTAUT model and introduces STARA awareness and chilling effect as moderating variables. A total of 657 valid questionnaires were collected from students of a medical university in Dalian, China, and data were statistically described using SPSS version 26, Amos 3.0 software was used to validate the research model, as well as moderated effects analysis using Process (3.3.1) software, and Origin (2021) software. Results The findings reveal that both information quality and perceived usefulness are pivotal factors that positively influence the willingness to use AI products. It also uncovers the moderating influence of the chilling effect and STARA awareness. Conclusions This suggests that enhancing information quality can be a key strategy to encourage the widespread use of AI products. Furthermore, this investigation offers valuable insights into the intersection of medical education and AI use from the standpoint of medical students. This research may prove to be pertinent in shaping the promotion of Medical Education Intelligence in the future.
... In studying data sharing behaviors, it would be negligent to dismiss the ever-presence of surveillance. In fact, increased awareness of surveillant technology and actors has fostered a new sense of surveillance or 'chilling' effect online, which influences the way people search (Penney, 2016(Penney, , 2021 and share information (Citron & Penney, 2019;Marder et al., 2016;Marthews & Tucker, 2017). Chilling effects have been proposed as a theory of social conformity, with the feeling of being watched restricting an individual's range of freedom to make choices as a result of the perceived social norms exhibited by the audience around them (Penney, 2021). ...
... While it has been proven that surveillance has a significant effect on behavior, the research is not consistent on what exactly that effect will be due to various surveillance operationalizations. While chilling effects research would expect people to share less under surveillance (Marder et al., 2016;Marthews & Tucker, 2017;Penney et al., 2016), other work (Bickman & Rosenbaum, 1977;Bateson et al., 2006) would predict a salutary effect, where people are more socially proactive and responsible. Nevertheless, this study expects that the watchful eye effect will have a significant impact on the PMT framework. ...
Article
Mobile phones have evolved to allow individuals to easily access and disclose the private information of others to a seemingly infinite network. Notably, the permanent nature of mobile data has aided its path between individuals and the police, storing integral evidence for criminal investigations in the palms of peoples' hands. Understanding cognitive factors that predict when an individual would choose to report mobile data to the police is integral, particularly in a time of heightened controversy over data access limits and ubiquitous surveillance. This study extends Protection Motivation Theory (PMT) through incorporating the watchful eye effect and the theory of contextual integrity to analyze predictors of intention to share data with the police. The results of a 2 (Situational severity: high or low) x 2 (Surveillance: present or absent) between-subjects factorial vignette methodology (N = 222) revealed that participants behaved independently of feeling watched, but that such sharing can be causally attributed to situational severity. Further, we found PMT variables—including perceived severity, response-efficacy, self-efficacy, and response cost—as well as perception of the police to serve as predictors of intentions to share with the police, with some of these factors mediating the effects of situational severity and surveillance. This study not only provides a theoretical contribution to PMT but also practical recommendations for mobile design that considers surveillance normalization and prioritizes data autonomy.
... Presenting multiple facets of ourselves is not well supported on most single services, in part because group systems are underutilized, and users are far more likely to self-censor rather than to utilize audience management tools on social media platforms (Fiesler et al., 2017). This is also known as the "lowest common denominator" effect where the most easily offended audience acts to "chill" expression (Marder et al., 2016), meaning that online audiences to act as a type of information control (Fiesler et al., 2017;Hogan, 2010 (Piwek & Joinson, 2016), LinkedIn continues to advertise itself as the "world's largest professional network," in comparison to other apps or range of sites used for sexual expression and flirting (e.g., Tinder, Grindr) (Albury, 2017). Hence, there are nuances to how users negotiate their identities, whether content is cross-posted and when (especially with increasing integration of services), and how their perceptions change when you can be "nameless" on a platform (e.g., Reddit, Instagram to an extent but it links with Facebook accounts). ...
... This article sought to provide a novel approach to explore online settings by utilizing the RGTs alongside semi-structured interviews, specifically here, social media identities and self-presentation across platforms. We found that participants do maintain multiple presentations of self across multiple sites, and do engage in a set of (not necessarily efficient) self-regulation behaviors (Hogan, 2010;Marder et al., 2016). ...
... Inclusive lending can leave farmers with heavy debt burdens (Jakhar & Kait, 2021), which is a contributing factor to farmer suicides (Arunkumar et al., 2018). Therefore, a household falling into energy poverty and loan repayment difficulties can impact neighboring households in the same village (Marder et al., 2016). Since farmers tend to be risk-averse (Alexander & Moran, 2013), neighboring households in rural areas will reduce their energy expenditure to avoid heavy debt burdens (Betto et al., 2020), which reduces the likelihood of energy poverty to a certain extent. ...
Article
Full-text available
Financial inclusion and energy poverty have an interactive relationship; however, this two-way relationship lacks sufficient research. This study investigates the two-way mechanisms of financial inclusion, energy poverty, and neighborhood spillover effects. Using a spatial simultaneous equation model, this study examines 2615 Chinese rural households in 2020. Results reveal a statistically significant positive interaction between financial inclusion and energy poverty. In addition, the neighborhood spillover effects of financial inclusion and energy poverty are both significantly positive, whereas their neighborhood interaction spillover effects are significantly negative.
... (Wolfowicz , 2021;Muratbekova-Touron, & Leon, 2021;DeMoya & Pallud, 2020;Stark et al., 2020;Stiff, 2019;Crossler & Posey, 2017;Elhai & Hall, 2016). Based on the Table Matrix 2, although obtrusive surveillance is used for beneficial purpose at an individual level, such as contact tracing through disease-control ehealth monitoring technology (Ehrari et al., 2020) or COVID-19 application (Wnuk etal., 2021;Urbaczewski & Lee, 2020), social networking monitoring through social media (Mullen, & Fox, 2016), e-commerce through identity eco-systems (Crossler & Posey, 2017), online impression management (Marder et al., 2016) or peer-to-peer monitoring (Tokunaga, 2011) or online sharing of personal data using social media/online blogs (Park et al., 2012) etc., there is still a risk of data being disclosed if not handled carefully or used for commercial purposes (Bhatt et al., 2022;Martin, 2016;Park et al., 2012;Wills, & Zeljkovic, 2011). Similarly, non-obtrusive surveillance, at an individual level, may be used either for beneficial purpose such as using GPS or smartphones sensors for location tracking (Park & Jang, 2014), self-monitoring one's health using smart wearable devices (DeMoya & Pallud, 2020) or for the purpose of marketing or advertising such as collecting unauthorized data for interpreting one's behavioral or purchasing patterns using data analytics (Mai, 2016;Zuboff, 2015), collecting personally identifiable information (Bansal & Nah, 2022;kauffman et al., 2011) etc. Further, non-obtrusive surveillance may also be used for cyberattacks through web-tracking (Samarasinghe & Mannan, 2019), adware, malware, phishing, DoS etc. (Kim et al., 2011) and cyber bullying by collecting others' personal information from Facebook profiles and posts (Stiff, 2019). ...
... It is important to note some of the behavioural challenges those social media users face. For example, Marder et al. [8] argue that "information on any social network is publicly disclosed, at least in the network of connected friends, with low levels of anonymity to multiple audiences simultaneously". This leads to what the authors call the chilling effect. ...
Article
Full-text available
This paper seeks to clarify the notable phenomena known as the Proteus effect. This phenomena clarifies the ability of avatar characteristics within digital gaming environments to have a noticeable impact on people’s actions in the real world. The research question that informs the conceptual framework put forward in this academic discourse is the following: if the Proteus effect is clearly perceptible among members of online gaming communities, might it not possibly also apply to users of social networking platforms? The study will use an example from the science fiction anthology series “Black Mirror” to explain and support this theoretical claim. It is hypothesised that once people create a social media presence, they start creating a digital identity or “avatar”, the development of which has the potential to have a substantial impact on their behaviour in real life. The Proteus effect’s plausible expansion outside of the online gaming industry, where it was first documented, is the main hypothesis that this paper seeks to clarify through the use of a hypothetical scenario taken from modern cinematic narratives. This article’s hypothesis imagines a future in which people eventually become like their digital avatars, leading to a time when real people resemble their virtual counterparts.
... Specifically, we propose professional SNSs to heighten professional public self-focused attention (cognition of one's professional self as perceived by other professionals, herein PSFA), which leads to imposter thoughts. Support for professional SNS usage serving as a stimulus for PSFA comes from prior findings that public self-focused attention increases when individuals perceive the presence of an audience, as observed in general Facebook browsing (e.g., Marder et al., 2016b) and interactions with colleagues (Leary, 1996). Thus, we expect similar effects for professional SNS usage, as it involves viewing/posting content from/for professional others. ...
Article
Full-text available
We attend to the unexamined intersection between professional social network site (SNS) usage and imposter syndrome. Specifically, we provide the first examination of: do such sites cause imposter thoughts ("others think I am more competent than I think I am"); if so, why and when this happens, and what effect this has on well-being and consumption-related results. Supported by objective self-focused attention theory and two online experiments, we show that professional SNS usage heightens professional self-focused attention, triggering imposter thoughts. This results in negative emotions and consumption-related effects. We further examine two boundary conditions, showing that effects are reduced for individuals high in narcissism or work centrality. From these findings, we extend the sociocognitive theorization of the imposter phenomenon by uncovering, first, context-specific self-focused attention as the reason "why" people feel imposter-ish in particular circumstances and second, consumption-related consequences. We further contribute imposter thoughts as a new alternative explanation for negative emotions experienced whilst using professional SNSs. K E Y W O R D S compensatory consumption, imposter phenomenon, imposter syndrome, LinkedIn, objective self-focused attention, social network sites, well-being
... In particular, future research may investigate how the various identities performed by unions interact and influence each other. Does union online identity performance shape the narrative construction of union identity in other communicational spaces, as research conducted at the individual level would suggest (Marder et al., 2016) ? Or are these different forms of identity performed independently, thus contributing to a layering of union identities? ...
Article
Full-text available
With the rise of social media, unions are increasingly performing their identity on the digital scene. While this displacement has generated much academic speculation, the literature still largely ignores how unions concretely stage ‘who they are’ on social media. This article elaborates upon Goffman's approach to identity performance by analysing how eight Quebecois trade unions present themselves online. The findings highlight four types of online identity performance: self-caricaturing bureaucracy, fading service provider, opponent polarizing and community narcissizing identity performance. The article makes two main contributions to the literature. First, it enriches debates about unions’ use of social media by showing that digital technologies may not be considered as universally good, bad or neutral for unions’ online identities. Second, it contributes to discussions about the nature of unions’ identities by highlighting how communicational spaces help to shape them.
... As a result, the levels of interaction between users and activist groups can be considered as almost predetermined due to the creation of online 'echo chambers' i.e. spaces where users are only exposed to content they are more likely to agree with and interact with other users who are of like mind or opinion; 'the looping of self-declared cause/identity with the information that the relevant user encounters, with little intervening friction' (Valluvan, 2019: 187 potentially be accepted as reasonable. It is evident that the level of surveillance of social media platforms is also impacting on users in the offline realm, where an increased sense of self-awareness leads to offline behaviours adhering to them in the likely possibility that they may be captured and become available for online audiences (Marder et al., 2016). The use of these commercialised platforms by activist groups within the progressive anti-racist movement in the United Kingdom seems rather paradoxical considering their stance against neoliberalism. ...
Thesis
Full-text available
In recent years, the rise of right-wing populism and post-truth politics has created a dangerous cocktail, enabling ‘immigration’ and ‘anti-racism’ to be framed within dominant political and media coverage in such a way that it stigmatises and marginalises foreign nationals migrating to the United Kingdom, replicating social injustice. Several activist groups within the broader anti-racist movement are engaging in contemporary forms of video activism alongside protest action to resist and challenge these frames and framing processes. This thesis makes the necessary four-way theoretical and methodological links between hegemony, qualitative frame analysis, video activism and knowledge production to explore the ways in which dominant framings of immigration are resisted by the broader anti-racist movement. Using a broad framework combining film theory/studies and cinematography, the analysis of the visual strategies employed by eight activist groups within this movement within video activist footage disseminated on YouTube and Facebook provides unique insights into the groups themselves, and the various stylistic, shot, angling, sound and editing strategies employed that open up opportunities for framing. A further qualitative, and discursive, frame analysis explores the various frames that are used by the groups through video activism itself; persecution, hardship, heroism, empowerment, incompetence and anti-racism; producing different new knowledges surrounding organisational knowledges of the movement (including collective identity), social injustice in general, dominant hegemonic narratives, and, most importantly, the struggles of migrants and refugees. In doing so, it makes significant contribution to knowledge by proposing three unique typologies to demonstrate how the contemporary hegemonic post-truth narratives surrounding immigration can be, and are being, resisted in order to reinforce social justice.
... Constant monitoring can prevent the public from voicing their opinions and criticisms for fear of reprimanding (Penney, 2016;Stoycheff et al., 2019). Not only is online behavior affected by surveillance, but it also extends to the offline domain too, where individuals choose to play safe by being compliant, conformist, and submissive (Marder et al., 2016). This 'chilling effect' suppressed freedom of expression as one of the fundamental human rights protected by international law (Bernal, 2016). ...
Article
Full-text available
Southeast Asia is home to about 8.5 percent of the world’s total population and 10 percent of its internet users, yet it is also home to 12.7 percent of the world’s social media users. The exponential growth in internet and social media utilization poses both opportunities and challenges towards democratization. This paper aims to examine how the digital sphere may or may not support inclusive and deliberative democracy in the region. Using elaboration on case studies from Indonesia, Malaysia, the Philippines, and Vietnam, the current study is reflecting upon shared challenges and opportunities in preserving democracy amidst the rapid development of cyberspace as a mode of political communication. The findings suggest that digital space has been instrumental in harassing dissent or jailing opposition members in countries like the Philippines and Vietnam. On the other hand, the utilization of technology offers an opportunity that has prospects for nurturing deliberative and a more inclusive democracy for Indonesia and Malaysia. The study contributes to the wider conversation on democracy and the digital sphere in Association of Southeast Asian Nations (ASEAN) member countries.
... Subjective norms are defined as an individual's perception of social pressure [20]. According to theory of Reasoned Action and theory of Planned Behavior, behavior is affected by subjective norms. ...
Article
Full-text available
Initial purchase expectation disconfirmation does not necessarily reduce consumer repurchase intention on a knowledge payment platform. This paper constructs a moderated mediation model to explore the positive impact mechanism and boundary conditions of initial purchase expectation disconfirmation on repurchase intention. With 524 questionnaire surveys, this paper conducts empirical analysis. The main findings are as follows: First, initial purchase expectation disconfirmation positively affects consumer repurchase intention by stimulating the platform search effort. Second, three boundary conditions affect such a mediation mechanism: subjective norms, anticipated regret, and alternative attractiveness. Specifically, the higher the subjective norms and anticipated regret the consumer has, the stronger the stimulating effect of initial purchase expectation disconfirmation on platform search efforts. The higher the platform alternative attractiveness, the stronger the optimistic prediction of platform search efforts on the platform repurchase intention. The conclusion deepens the theoretical mechanism of how initial purchase expectation disconfirmation affects platform repurchase intention.
... People would presumably be less concerned with social approval in more private or anonymous environments. One small study showed that lack of privacy online can even influence behavior offline; people behaved in a more socially desirable way in real life when they believed that their actions might be posted on social media (Marder et al., 2016). A more extreme example of how lack of privacy and anonymity can increase socially desirable behavior was documented in the wake of the surveillance program implemented by the U.S. National Security Agency (NSA). ...
Article
Full-text available
We evaluate how features of the digital environment free or constrain the self. Based on the current empirical literature, we argue that modern technological features, such as predictive algorithms and tracking tools, pose four potential obstacles to the freedom of the self: lack of privacy and anonymity, (dis)embodiment and entrenchment of social hierarchy, changes to memory and cognition, and behavioral reinforcement coupled with reduced randomness. Comparing these constraints on the self to the freedom promised by earlier digital environments suggests that digital reality can be designed in more freeing ways. We describe how people reassert personal agency in the face of the digital environment’s constraints and provide avenues for future research regarding technology’s influence on the self.
... A top-down thematic analysis was employed (Braun & Clarke, 2006). This analytical technique is often used within qualitative studies when the overall research project is predominately quantitative (see Marder, Joinson, Shankar, & Houghton, 2016). ...
Article
Social media influencers (SMIs) offer a unique form of electronic word-of-mouth (eWOM), disclosing personal information (e.g., daily routines, major life events) as part of their pitch when promoting products. To date, no research has explored if, and how, social self-disclosure impacts the way recipients respond to promotions and the influencer themselves. Through four studies deploying a mixed method design (total N = 888), we redress this knowledge gap. We find that increased depth and breadth in social self-disclosure is viewed as inappropriate, reducing trust and purchase intent. We further validate appropriateness as the critical mediator in understanding the impact of self-disclosure within this marketing context. We also establish that the context of the post (sponsored vs non-sponsored) and the audiences’ social media usage intensity together act as a boundary condition to the effects of high self-disclosure by SMI’s.
... Hence, higher levels of publicness on these sites would represent the collapse of interaction context across diverse audiences, which may lead socially anxious individuals to experience higher challenges for impression and privacy management (Alkis et al., 2017;Gil-Lopez et al., 2018;Vitak, 2012). In turn, these concerns may result in more safety strategies, such as inhibiting self-expression (Green et al., 2016;Luo et al., 2019;Marder et al., 2016a). Evidence from a two-wave panel suggests that individuals with higher fear of social isolation are more likely to inhibit their expressive behaviors on SNSs; this tendency was stronger when their network had a higher level of publicness (H.-T. ...
Article
Full-text available
Though socially anxious individuals tend to seek safety, little is known about whether this relationship depends on context, including the affordances of social networking sites (SNSs) to provide anonymity and publicness, and whether safety-seeking can be explained by impression management, privacy calculus or both. Based on the psychobiological model of social anxiety, we conducted two studies (Study 1: N = 103, Study 2: N = 1,184) to examine the contextual dependence of safety-seeking behaviors and to disentangle which types of concerns mediate the effect of social anxiety on safety-seeking behaviors. Results indicated that socially anxious individuals tend to seek safety on SNSs, and this tendency is stronger in less anonymous SNSs. Both evaluative concerns and privacy concerns mediate the relation between social anxiety and safety-seeking behaviors, while the indirect effect of evaluative concerns is stronger than that of privacy. Publicness of an SNS strengthened these indirect effects. These findings highlight the importance of safety perceptions in different online environments, and thereby enrich the literature related to social anxiety and social media use.
... As such, if a researcher is interested in examining how individuals are affected by social desirability biases when interacting online, a platform like Facebook (with high networked information access) is likely to be a more appropriate context of study than a platform like YouTube. When posting on Facebook, users are likely to be much more aware of the fact that friends and family will have access to what they post, thus encompassing the multiple audience problem and potential "chilling" effects (Marder et al., 2012(Marder et al., , 2016. ...
Article
The internet is often viewed as the source of a myriad of benefits and harms. However, there are problems with using this notion of "the internet" and other high-level concepts to explain the influence of communicating via everyday networked technologies on people and society. Here, we argue that research on social influence in computer-mediated communication (CMC) requires increased precision around how and why specific features of networked technologies interact with and impact psychological processes and outcomes. By reviewing research on the affordances of networked technologies, we demonstrate how the relationship between features of "the internet" and "online behaviour" can be determined by both the affordances of the environment and the psychology of the user and community. To achieve advances in this field, we argue that psychological science must provide nuanced and precise conceptualisations, operationalisations, and measurements of "internet use" and "online behaviour". We provide a template for how future research can become more systematic by examining how and why variables associated with the individual user, networked technologies, and the online community interact and intersect. If adopted, psychological science will be able to make more meaningful predictions about online and offline outcomes associated with communicating via networked technologies.
... Specifically, social media is mostly asynchronous (i.e., there is time lapse due to the time taken to construct messages, though videoconferencing is an exception), permanent (i.e., texts and other content is stored or can be recorded), public (i.e., usually accessible by large audiences), almost universally available (i.e., can be shared regardless of physical location), lacks certain cues (i.e., physical cues such as gesture may be absent), quantifiable (i.e., use of social metrics, such as likes), and visual (i.e., use of photographs and videos). According to proponents of the transformation framework, these aspects of social media communication can have an impact in five key ways: changing the frequency and/or immediacy of experiences (e.g., frequency may be higher, leading to increased friendship quality and well-being; e.g., Burke & Kraut, 2016); amplifying experiences and demands (e.g., being available all the time elicits feelings of pressure or guilt to be available online and to respond to communication; Fox & Moreland, 2015); altering the qualitative nature of interactions (e.g., misinterpretation of information in online conversations leading to higher levels of social anxiety; Kingsbury & Coplan, 2016); facilitating new opportunities for compensatory behaviours (e.g., higher self-esteem in shy or introverted adolescents interacting with exclusively online friends; van Zalk et al., 2014), and; creating entirely novel behaviours (e. g., adolescents adjusting their offline behaviours to avoid a negative self-image presentation to their online audience through statements, pictures, or videos; Marder et al., 2016). ...
Article
Full-text available
In adolescence, smartphone use in general and social media use in particular has often been associated with negative effects, such as higher anxiety levels and body dissatisfaction. Other outcomes – such as fundamental cognitive abilities and skills (e.g., intelligence, information processing, spatial perception) – have rarely been the focus of research. Here, we analysed data from a large sample of adolescents (12–16 years; N > 12,000) who performed a series of psychometric tests ranging from intelligence, spatial perception, and information processing, to practical numeracy, and compared their test results with their social media usage (average active and passive time per day, problematic social media use). We additionally applied a random-forest model approach, useful for designs with many predictors and expected small effect sizes. Almost all associations did not outperform known age- and sex-differences on social media use; that is, effect sizes were small-to-tiny and had low importance in the random-forest analyses compared to dominant demographic effects. Negative effects of social media use may have been overstated in past research, at least in samples with adolescents.
... Sharing too little may send signals that undermine closeness between coworkers. Some employees ignore (or accept only with access restrictions) connection requests that make them uncomfortable, because of fears related to privacy invasion (boyd, 2007;Lewis et al., 2008), interpersonal surveillance (Marder et al., 2016;Trottier, 2012), discrimination (Miller & Mundey, 2015), and even harassment by certain coworkers (Chauhan, 2017). However, refusing to connect can create relational distance (Landers & Callan, 2014). ...
Article
Individuals are increasingly connected with their coworkers on personal and professional social network sites (SNS) (e.g., Facebook), with consequences for workplace relationships. Drawing on SNS research and on social identity and boundary management theory, we surveyed 202 employees and found that coworkers’ friendship acts (e.g., liking, commenting) were positively associated with closeness to coworkers when coworkers were similar in age to or older than the respondent and were positively associated with organizational citizenship behaviors towards coworkers (OCBI) when coworkers were similar in age. Conversely, harmful behaviors from coworkers (e.g., disparaging comments) were negatively associated with closeness when coworkers were older than the respondent, and with OCBI when coworkers were older than the respondent and coworkers’ friendship acts were high. Preferences for work-life segmentation moderated the relationship between coworkers’ friendship acts and OCBI (but not closeness) such that the positive relationship was stronger when the respondent had low (vs. high) preferences for segmentation. We discuss the theoretical and practical implications of this study and propose an agenda for future research.
... According to Marder et al. (2016), social media can be described as an arena of surveillance, holding the potential of the manager controlling employees and potential employees, but it can also be understood the other way around, thus constructing social media as an ambiguous arena, adding to previous claims of information-and communication technology as a 'double-edged sword' of control (Cortini 2009, p. 301). Even though relationships established through two-way communication over the internet can be understood as essentially democratic (Blood 2003;Morsing & Schultz 2006), issues related to power are still very present. ...
Article
Full-text available
Given how social media are commonly used in contemporary Nordic countries, social media platforms are emerging as crucial for relational work between employers, employees, and potential employees. By means of a discursive psychology approach, this study investigates employers’ constructs of relational work on social media through the use of two interpretative repertoires: the repertoire of loss of control and the repertoire of ever-presence. The consequences of these interpretative repertoires are a masking of power relations, especially between employers and young employees in precarious labor market positions and those with limited digital knowledge or financial means. Further, the positioning of social media as part of a private sphere of life means the invasion of not only employees’, but also managers’ private time and persona. The result of this study hence calls for the need to understand relational work on social media as part of normative managerial work.
... As college life moves online, there is a noted rise in students experiencing online harassment and cyberbullying (V. L. Byrne, 2020aByrne, , 2020bWashington, 2015), which has been found to relate to significant academic, psychological, and psychosocial repercussions (e.g., Duggan, 2017;Juvonen & Gross, 2008;Marder et al., 2016;Varjas et al., 2009), as well as chilling of future online social engagement (Alipan et al., 2018). While existing research has documented the scope and impact of first-hand victimization (e.g., V. L. Byrne, 2020b), current research on undergraduates fails to identify the scope and impact of secondary victimization experiences, such as witnessing a friend being harassed online, cyberbullied, or cyberstalked. ...
Article
Online harassment is a growing concern in higher education with evident social, psychological, and academic repercussions. While students’ victimization experiences are well documented, the existing research fails to address the extent to which students witness online harassment or how they cope with the, possible, secondary trauma. This paper presents findings from 571 undergraduate students’ survey responses. Findings suggest that witnessing online harassment is increasingly common and can result in the adoption of defensive online behaviors.
... Generative discipline can also take the form of self-surveillance through self-imposed behavioral norms due to perceived visibility fostering actual or suspected surveillance. Even one's offline behavior and impression management may be constrained by the awareness of potential online coverage, creating an "extended chilling effect" (Marder, Joinson, Shankar, & Houghton, 2016), a self-imposed indirect form of CC, somewhat similar to the Panopticon effect (Foucault, 1998). Thus visibility may enhance generative discipline (P3c). ...
Article
Full-text available
Concertive control (CC) theory has primarily been applied to traditional offline, work-based, closed membership teams. New organizational forms such as online communities have opened up additional sites in which CC processes may operate. This article makes several contributions to CC theory and research. First, it increases the applicability of CC theory by extending it from offline to online, work to non-work, and closed to open membership contexts. Second, it increases our understanding of CC processes by elaborating on three mechanisms of CC (group autonomy, group identification, and generative discipline) and how they operate differently in online work/non-work and closed/open contexts. Third, it develops propositions about how these mechanisms interact with three prominent media affordances (visibility, persistence and editability) within those contexts. Extending CC theory to online communities helps to explain individuals’ responses to normative group pressures online, which is highly relevant in our increasingly culturally and politically polarized society.
... In other cases, informants stated that they would alter their behaviours if they were observable by other users, akin to the mechanisms known from self-monitoring theory (Snyder, 1987). Here, the prospect of having other users observe one's behaviour creates a 'chilling effect' (Marder et al., 2016) that might lead users to modify their behaviours to match the expectations of the observers or to perform impression management (Leary et al., 1990). While such modified or 'curated' behaviours are an expected consequence, when viewed in the light of self-representation theory, it is an important nuance to bring to the field of eWOB. ...
Article
Full-text available
The opinions and behaviours of others are recognised as powerful mechanisms for social influence in the digital sphere. The former, often referred to as electronic word of mouth (eWOM), is a thoroughly researched topic in the Information Systems literature. Conversely, the digital display of users' behaviours (e.g., number of past purchases) is less well understood despite the widespread adoption of this practice on digital platforms. Quantitative research has explored this interesting domain and found that observing others' behaviours entice observers to follow suit, but has left unaddressed the question of what sensemaking users derive from behavioural information. This is problematic as behavioural information is more open to interpretation compared to eWOM. In this article, we adopt the concept of electronic word of behaviour (eWOB) to denote such behavioural information. Through the lens of basic psychological needs theory and the qualitative means‐end chain approach, we expose how eWOB is interpreted and used by users of a digital platform, the music service Spotify. We find that eWOB leads to satisfaction of the basic psychological needs for relatedness and competence when observing others' behaviours. We also show how exposure to one's own past behaviours can yield a positive sense of self when presented in meaningful and private manners, but that it can also negatively impact users when their needs for autonomy and competence are not heeded by the digital platform. Finally, based on our empirical findings we offer a set of design implications for how digital platforms can optimise the use of eWOB.
Article
Prior studies suggest that the primary function of graphicons, such as emoji and stickers, is to enable more effective digital communication between individuals. In a digitally interactive environment, graphicons are an important means of expressing and exchanging sentiments, emotions, and thoughts. However, there is little understanding of the use of graphicons in the context of social and cultural conditions and their effect on impression management. Through analysis of in-depth interview data, the present study identifies three strategic applications of graphicons: social necessity, pursuit of social propriety, and expression of authentic self. Our findings suggest that individuals utilize various tools in the digital space to facilitate impression management. Graphicons are specifically used to convey relational meanings, and their usage is strongly related to social and cultural contexts and norms.
Article
Purpose This empirical study investigates the potential impact on freedom of expression arising from the accumulation of user-generated content on the web. The purpose of this study is to serve as a valuable reference for countries and regions that have not yet implemented web archiving due to similar concerns. Design/methodology/approach To achieve the goals, the author conducted a web-based survey experiment using sentiment analysis of book reviews as a representation of general topics. This approach enabled the author to objectively examine whether the expression of content undergoes changes in accordance with social conformity theory. Findings The study’s findings suggest that, at least for general topics, the observed chilling effect is minimal at best. This provides support for the proposition that it is advisable to proceed to the subsequent phase, where more sensitive subjects can be thoroughly explored in the context of web archiving and its associated chilling effects. Originality/value To the best of the author’s knowledge, this study is the first attempt to conduct a survey experiment addressing potential chilling effects resulting from the collection of user-generated content. Notably, the measurement of chilling effects remains contentious and comes with inherent limitations, adding a nuanced perspective to the discourse.
Article
Full-text available
Background Personal exposure is a crucial aspect of digital socialization. It pertains to the amount of time spent on social networks, the number of active accounts, interactions on different platforms, the content published on social networks, the purpose for which the content is shared, the degree of personal exposure, and the changes in social life caused by the exposure. Gender plays an important role in predicting online behavior, but previous studies have yielded contradictory results. Objective To characterize personal exposure to social media in young Cubans (networks used, hours of exposure, published content, how much of one’s private life is exposed, alterations due to its use). To define the differences in personal exposure based on the gender variable. Design A survey specifically created for this research was used. The sample was composed of 3345 young Cuban residents between 18 and 35 years old. Results The young people spent a considerable amount of time per day on WhatsApp, Instagram*, and Facebook/Messenger*. Users shared content related to humor, music/art, and their personal lives. These interactions served as a source of entertainment, a means of communication and socialization, and a platform for expressing opinions on various topics. Personal content was shared frequently. The young people reported experiencing disturbances such as family demands, decreased attention span, difficulty sleeping, and decreased social interactions. There were gender differences in the level of personal exposure, with females reporting higher levels of exposure. Conclusion There are high levels of personal exposure among Cuban youth. Different qualities are manifested according to gender. Females reflect the highest levels of personal exposure.
Article
The availability of online data has altered the role of social media. By offering targeted online advertising, that is, persuasive messages tailored to user groups, political parties profit from large data profiles to send fine-grained advertising appeals to susceptible voters. This between-subject experiment ( N = 421) investigates the influence of targeted political advertising disclosures (targeting vs. no-targeting disclosure), political fit (high vs. low), and issue fit (high vs. low) on recipients’ party evaluation and chilling effect intentions. The mediating role of targeting knowledge (TK) and perceived manipulative intent (PMI), two dimensions of persuasion knowledge, are investigated. The findings show that disclosing a targeting strategy and a high political fit activated individuals’ TK, that is, their recognition that their data had been used to show the ads, which then increased the evaluation of the political party and individuals’ intentions to engage in future chilling effect behaviors. High political fit decreased individuals’ reflections about the appropriateness of the targeted political ads (i.e., PMI), which then increased party evaluation. Issue fit did not affect individuals’ persuasion knowledge.
Article
Full-text available
The actions and inactions of intermediaries have resulted in both private and public harms. Public harms include the illicit influence of voting behavior through manipulation of public opinion, directly undermining democracy. Although the Supreme Court of India recognized such public harms that result from intermediary behavior, it did not go beyond the privacy framework in addressing these harms. Based on an analysis of Indian law, the article proposes a new normative category—constitutional harms—to refocus attention on a special class of public harms, thereby opening up the debate on new remedies to address such harms.
Chapter
Chapter 1 introduces readers to scholarship on privacy and surveillance. It discusses conceptions of privacy in China and the West and provides a succinct review of scholarship on reciprocal, commercial, and state surveillance. It follows by discussing the implications of surveillance and how citizens in China and the West perceive privacy and surveillance.
Book
Full-text available
Digital surveillance is a daily and all-encompassing reality of life in China. This book explores how Chinese citizens make sense of digital surveillance and live with it. It investigates their imaginaries about surveillance and privacy from within the Chinese socio-political system. Based on in-depth qualitative research interviews, detailed diary notes, and extensive documentation, Ariane Ollier-Malaterre attempts to ‘de-Westernise’ the internet and surveillance literature. She shows how the research participants weave a cohesive system of anguishing narratives on China’s moral shortcomings and redeeming narratives on the government and technology as civilising forces. Although many participants cast digital surveillance as indispensable in China, their misgivings, objections, and the mental tactics they employ to dissociate themselves from surveillance convey the mental and emotional weight associated with such surveillance exposure. The book is intended for academics and students in internet, surveillance, and Chinese studies, and those working on China in disciplines such as sociology, anthropology, social psychology, psychology, communication, computer sciences, contemporary history, and political sciences. The lay public interested in the implications of technology in daily life or in contemporary China will find it accessible as it synthesises the work of sinologists and offers many interview excerpts.
Article
This research examines how frontline retail employees respond to customers whom they think might write an online review about their experience. Across six experiments (one field and five online) we show that when employees identify potential online review authors, often by what the customer says or does, it catalyzes them to deliver better service. This ensues because they experience a rise in determination to do well, motivated by the prospect of being associated with a positive review, which they believe will impress the retailer. Thus, they go ‘above and beyond’. However, determination is tempered by two boundary conditions. When employees (i) do not consider that being associated with an online review is beneficial (i.e., not goal relevant) or (ii) feel poorly equipped to serve the customer (i.e., low in self-efficacy), then a better service delivery will not occur. We also show that retailers can enhance customer service through internal championing of the importance of online reviews, so long as this is framed as promotional rather than punitive.
Article
Many adolescents face pressure when it comes to securing social media attention in the form of views, comments and/or likes on their posted content. The purpose of this study was to examine how this pressure impacts adolescents’ current relationships with friends in addition to their mental health over time. Participants were Canadian adolescents (Time 1 n = 345; Mage = 17.29; 80.6% female) who reported on their felt pressure to gain social media attention, friendship closeness and internalizing symptoms in 3 surveys approximately 4 months apart (from August 2020 to June 2021). We used latent curve modeling with structured residuals (LCM-SR) to model the lagged relations between the aforementioned variables, while also controlling for time spent on social media and number of likes received. LCM-SR builds on multivariate latent curve modeling and autoregressive latent trajectory and allows for the simultaneous testing of between- and within-person stability and change over time. In line with our first hypothesis, results demonstrated that at time points when adolescents experienced more pressure to gain social media attention than usual, their friendship closeness decreased at the next time point. Social media pressure was not a significant predictor of internalizing symptoms, however. Results emphasize the importance of teasing apart within- and between-person effects when examining impacts of adolescent social media use. They also highlight the importance of targeting felt pressures to gain social media attention in order to support healthy adolescent relationships.
Article
Given the urgent need to address plastic pollution, fashion companies are implementing diverse strategies to reduce plastic in their production processes. To communicate their commitment to plastic waste reduction, companies have started including symbols on their products (i.e., sustainability cues). However, the effect of these symbols on consumer behaviour remains unclear. Thus, through a mixed method involving three focus groups and two online experiments, we investigate the effect of sustainability cues on consumers' preferences. Our findings show that including sustainability cues on a product is not always an effective business strategy. Hence, we expand the ongoing debate on the effects of environmental strategies, offering new insights into consumers' perceptions of sustainability cues and demonstrating the importance of perceived proximity and environmental concern in enhancing or reducing buying intentions towards sustainable products. For fashion companies, we reveal if and how sustainability cues can represent a competitive leverage prompting environmentally friendly purchases.
Chapter
This chapter lays the foundation for a framework of authenticity in social media practices based on theories of performativity. It also describes how posting on social media carries with it intention and visibility, meaning it could be framed as a form of performance. Rather than seeing authenticity as a consistent mode of presentation, the proposition is that if authenticity is performative then it is an interval, which is temporal and deconstructive, and that it reveals what Derrida (Speech and Phenomena: and Other Essays on Husserl’s Theory of Signs (David Allison, Trans.). Northwestern University Press, 1973) described as ‘the trace’. As a result, there is affective transference and a ‘doing’ as a result of the revelation of the authentic trace.
Chapter
Due to their audiovisual anonymity and asynchronicity, social media have the potential to enhance self-disclosure, and thereby facilitate closeness among existing friends. In this chapter, the author highlights findings relating to the beneficial social connectedness outcomes that can be linked to online self-disclosure, synthesizes relevant literature that addresses who reaps the most benefits from online self-disclosure, and makes suggestions to direct future research in this area. Theoretical perspectives are identified throughout the chapter that are relevant to understanding the benefits of online self-disclosure, the relation between personal characteristics as predictors of online self-disclosure, and moderating factors of the effect of online self-disclosure on social connectedness. Empirical findings support both social compensation and social enhancement perspectives.
Chapter
Substance use, aggression/violence, delinquency, and risky sexual behaviors emerge and peak during adolescence, as teens enter new social and digital ecologies. This chapter reviews the literature on the co-occurrence and mutual influences between adolescent digital media use and engagement in online and offline health risk behaviors, with attentions to the mechanisms underlying these associations. Research suggests the quantity of time adolescents spend online is less important than the quality of how they spend that time, and that many well-documented peer influence processes (first studied in face-to-face peer interactions) are also emerging in online spaces. Shared vulnerabilities, peer selection, peer socialization, and identity development are important mechanisms helping us understand why adolescents engage in online and offline risk taking (and thus potential targets of interventions to reduce risk processes). This chapter highlights directions for future research, emphasizing longitudinal and experimental designs to improve causal inference and testing directionality of effects.
Article
This study builds on previous surveillance and censorship research that has uncovered the chilling effects of these online technologies. It tests the assumption that political chilling occurs through affective heuristics. By manipulating an online privacy policy to include the presence of either website cookies, as a means of surveillance, or content moderation, as a form of censorship, this research indicates that both website features activate negative affect, but only surveillance engenders problematic chilling effects. The additional presence of U.S. national security justifications accompanying the website cookies or content moderation suppressed some feelings of fear, but did not reduce political chilling. These findings prompt a discussion of how website and application cookies impact expression in digital spaces.
Chapter
Full-text available
Araştırma, UNWTO (2019) verilerine göre Dünya’nın en çok turist alan ilk on ülkesinin destinasyon pazarlama sürecinde resmi web sitelerini gastronomi turizmi açısından değerlendirmeyi amaçlamaktadır. Bu amaç doğrultusunda araştırmada nitel araştırma yöntemlerinden doküman inceleme tekniği kullanılmıştır. Araştırmanın kapsamını dünyanın en çok turist alan ilk on ülkesinin resmi web sitelerinde yer alan gastronomi turizmine yönelik pazarlama ve tanıtım çalışmaları oluşturmaktadır. Bu kapsamda veriler, 1 Aralık 2020 ile 10 Ocak 2021 tarihleri arasında ilgili ülkelerin İngilizce dilindeki resmi turizm web sitelerinden metin, fotoğraf ve video şeklinde toplanmıştır. Elde edilen verilere içerik analizi uygulanmıştır. Analiz sonuçları incelenen ülkelerin tamamının gastronomiyle ilgili bir sayfası veya kategorisi bulunduğunu, bazı ülkelerin ciddi eksiklikleri olmasına rağmen genel olarak değerlendirildiğinde dünyanın en çok turist ağırlayan ilk on ülkesinin destinasyon pazarlama sürecinde resmi web sitelerinde gastronomi turizmine yönelik tanıtım ve pazarlama çalışmaları yaptıklarını göstermektedir.
Article
Full-text available
31 Aralık 2019 tarihinde ilk kez Çin’in Wuhan kentinde ortaya çıkan daha sonra Dünya Sağlık Örgütü (DSÖ) tarafından salgın olarak ilan edilen Covid-19 ile birlikte üniversitelerdeki eğitim ve öğretim faaliyetleri kesintiye uğramıştır. Üniversitelerin ani bir şekilde kapanmasıyla birlikte eğitim kurumları uzaktan eğitim sistemlerine yönelmiştir. Bu nedenle, geleneksel eğitimden çevrim içi derslere geçiş yapılmıştır. Bu araştırma, Covid-19 salgını sürecinde turizm eğitimi alan lisans öğrencilerinin çevrim içi öğrenmeye hazırbulunuşluk düzeylerini belirlemeyi ve demografik özellikleri arasındaki ilişkiyi incelemeyi amaçlamaktadır. Veriler, online anket tekniğiyle elde edilmiştir. Araştırmada ilişkisel tarama modeli kullanılmıştır. Anket tekniğiyle toplanan verilerin analizinde, SPSS programı ile yüzde, frekans, t-testi ve varyans analizlerinden yararlanılmıştır. Araştırma bulgularına göre; lisans öğrencilerinin çevrim içi iletişim öz yeterliği ve öğrenen kontrolü yüksek; bilgisayar öz yeterliği ve kendi kendine öğrenme orta düzeyde ve e-öğrenmeye yönelik motivasyon faktörü ise düşük olarak bulunmuştur. Araştırma bulguları, lisans öğrencilerinin çevrim içi öğrenmeye hazır olduklarını göstermektedir. Covid-19 salgını sürecinde Türkiye’de çevrim içi eğitimlerin niceliğinin ve niteliğinin artırılması yönünde iyileştirmeler yapılması gerekmektedir.
Conference Paper
Full-text available
Bu çalışmanın amacı, kültürel miras turizmi amacıyla kültürel miras alanlarını ziyaret eden turistlerin memnuniyeti ve hizmet kalitesi ile alanı tekrar ziyaret etme niyeti arasındaki ilişkiyi araştırmaktır. Bu amaçla, 2019 yılı Ağustos ayında Bergama kültürel miras alanlarını ziyarete gelen toplam 400 yerli ve yabancı turiste anket tekniği uygulanarak araştırmanın verileri elde edilmiştir. Çalışmada, turist memnuniyeti ve hizmet kalitesinin, turistlerin kültürel miras alanını tekrar ziyaret etme niyeti ile arasındaki ilişkiyi incelemeye yönelik hipotezler geliştirilmiştir. Geliştirilen hipotezlerin analizinde iki yönlü ki-kare bağımsızlık testinden faydalanılmıştır. Çalışmanın bulguları değerlendirildiğinde, turistlerin harcadığı masraflara ve zamana göre memnuniyetin kültürel miras alanını tekrar ziyaret etme niyeti ile ilişkisi olduğu tespit edilmiştir. Diğer bir bulgu da hizmet kalitesi ile kültürel miras alanını tekrar ziyaret etme niyeti arasında ilişkinin bulunmasıdır. Sonuç olarak, turistlerin tekrar ziyaret etme niyeti ile istatistiksel olarak anlamlı ilişkisi bulunan turist memnuniyetinin ve hizmet kalitesinin sağlanması, turistik destinasyon olan kültürel miras alanlarının temel amaçlar arasında olmalıdır.
Article
Full-text available
People create profiles on social network sites and Twitter accounts against the background of an audience. This paper argues that closely examining content created by others and looking at one's own content through other people's eyes, a common part of social media use, should be framed as social surveillance. While social surveillance is distinguished from traditional surveillance along three axes (power, hierarchy, and reciprocity), its effects and behavior modification is common to traditional surveillance. Drawing on ethnographic studies of United States populations, I look at social surveillance, how it is practiced, and its impact on people who engage in it. I use Foucault's concept of capillaries of power to demonstrate that social surveillance assumes the power differentials evident in everyday interactions rather than the hierarchical power relationships assumed in much of the surveillance literature. Social media involves a collapse of social contexts and social roles, complicating boundary work but facilitating social surveillance. Individuals strategically reveal, disclose and conceal personal information to create connections with others and tend social boundaries. These processes are normal parts of day-to-day life in communities that are highly connected through social media.
Article
Full-text available
Self-disclosure is popular on social network site (SNS). However, teenagers’ self-disclosure behavior and their regret of posting, a negative emotional experience, have been seldom studied. Using data from a nationally representative survey, this study tries to investigate teenagers’ self-disclosure and regret of posting on SNS. We further examine how demographic variables, SNS use, different types of “friends”, trust, and privacy control behavior relate to self-disclosure and regret of posting. We find that though teenagers reveal moderately high level of personal information on SNS, they do not disclose all types of personal information equally. Results also show that male and older teens disclose more personal information. Frequent SNS use, large SNS network size, and having strangers in SNS friend list increase both self-disclosure and posting regret. Setting SNS profile private is related to lower level of self-disclosure. Implications for privacy design of SNS are discussed.
Article
Full-text available
Evidence suggests that compliance with accessibility standards does not always guarantee a satisfying user experience on the Web. The literature indicates that addressing the expectations users have about online content and functionalities is crucial to bridge this gap. We examine the role played by subjectiveness, experience and, particularly, expectations on how users experience the accessibility on the Web. To do so, 11 blind participants were enquired through interviews and questionnaires about 12 tasks they completed in four websites. Thematic analysis on the transcriptions reveals that expectations are often built up on previous experiences and preconceived ideas. Particularly, the content which is explicitly labelled as accessible arises the curiosity and creates high expectations about the accessibility of the website. We also find that, in addition to unmet expectations, prejudices on branding issues and the memories evoked by past experiences or emotional bonds does not only affect the way in which users perceive and experience accessibility, but also the overall user experience. Identifying the nature of expectations is key (i) to formalise more exhaustive user testing protocols and (ii) to complement and complete existing accessibility guidelines.
Article
Full-text available
Social networking services (SNSs) such as Facebook or Twitter have experienced an explosive growth during the few past years. Millions of users have created their profiles on these services because they experience great benefits in terms of friendship. SNSs can help people to maintain their friendships, organize their social lives, start new friendships, or meet others that share their hobbies and interests. However, all these benefits can be eclipsed by the privacy hazards that affect people in SNSs. People expose intimate information of their lives on SNSs, and this information affects the way others think about them. It is crucial that users be able to control how their information is distributed through the SNSs and decide who can access it. This paper presents a list of privacy threats that can affect SNS users, and what requirements privacy mechanisms should fulfill to prevent this threats. Then, we review current approaches and analyze to what extent they cover the requirements.
Article
Full-text available
Recent market studies reveal that augmented reality (AR) devices, such as smart glasses, will substantially influence the media landscape. Yet, little is known about the intended adoption of smart glasses, particularly: Who are the early adopters of such wearables? We contribute to the growing body of research that investigates the role of personality in predicting media usage by analyzing smart glasses, such as Google Glass or Microsoft Hololens. First, we integrate AR devices into the current evolution of media and technologies. Then, we draw on the Big Five Model of human personality and present the results from two studies that investigate the direct and moderating effects of human personality on the awareness and innovation adoption of smart glasses. Our results show that open and emotionally stable consumers tend to be more aware of Google Glass. Consumers who perceive the potential for high functional benefits and social conformity of smart glasses are more likely to adopt such wearables. The strength of these effects is moderated by consumers’ individual personality, particularly by their levels of openness to experience, extraversion and neuroticism. This article concludes with a discussion of theoretical and managerial implications for research on technology adoption, and with suggestions for avenues for future research.
Article
Full-text available
This paper examines how firm investments in technology-based employee monitoring impact both misconduct and productivity. We use unique and detailed theft and sales data from 392 restaurant locations from five firms that adopt a theft monitoring information technology (IT) product. We use difference-in-differences models with staggered adoption dates to estimate the treatment effect of IT monitoring on theft and productivity. We find significant treatment effects in reduced theft and improved productivity that appear to be primarily driven by changed worker behavior rather than worker turnover. We examine four mechanisms that may drive this productivity result: economic and cognitive multitasking, fairness-based motivation, and perceived increases of general oversight. The observed productivity results represent substantial financial benefits to both firms and the legitimate tip-based earnings of workers. Our results suggest that employee misconduct is not solely a function of individual differences in ethics or morality, but can also be influenced by managerial policies that can benefit both firms and employees. This paper was accepted by Serguei Netessine, operations management.
Article
Full-text available
This study explores how norms on social network sites evolve over time and how violations of these norms impact individuals’ self-presentational and relationship goals. Employing Expectancy Violations Theory (Burgoon, 1978) as a guiding framework, results from a series of focus groups suggest that both the content of the violation and the users’ relationship to the violator impact how individuals react to negative violations. Specifically, acquaintances who engage in minor negative violations are ignored or hidden, while larger infractions (that could negatively impact the individual) result in deletion of the offending content and – in extreme cases – termination of the Facebook friendship. Negative violations from close friends (that did not impact participants’ goals) resulted in confrontations, while similar violations from acquaintances were often ignored by participants in an effort to ‘keep the peace.’ Furthermore, positive violations were more likely to arise from acquaintances than close friends.
Article
Full-text available
The present research seeks to extend existing theory on self-disclosure to the online arena in higher educational institutions and contribute to the knowledge base and understanding about the use of a popular social networking site (SNS), Facebook, by college students. We conducted a non-experimental study to investigate how university students (N = 463) use Facebook, and examined the roles that personality and culture play in disclosure of information in online SNS-based environments. Results showed that individuals do disclose differently online vs. in-person, and that both culture and personality matter. Specifically, it was found that collectivistic individuals low on extraversion and interacting in an online environment disclosed the least honest and the most audience-relevant information, as compared to others. Exploratory analyses also indicate that students use sites such as Facebook primarily to maintain existing personal relationships and selectively used privacy settings to control their self-presentation on SNSs. The findings of this study offer insight into understanding college students’ self-disclosure on SNS, add to the literature on personality and self-disclosure, and shape future directions for research and practice on online self-presentation.
Article
Full-text available
Forty heterosexual undergraduate students (24 females, 16 males) who were currently in a romantic relationship filled out a modified version of The Facebook Jealousy questionnaire (Muise, Christofides, & Desmarais, 2009). The questionnaire was filled out twice, once with the participant’s own personal responses, and a second time with what each participant imagined that his/her romantic partner’s responses would be like. The data indicated that females were more prone to Facebook-evoked feelings of jealousy and to jealousy-motivated behavior than males. Males accurately predicted these sex differences in response to the jealousy scale, but females seemed unaware that their male partners would be less jealous than themselves.
Article
Full-text available
The authors examined ought, ideal, and feared self-discrepancies as predictors of agitation- and dejection-related affects. Overall, discrepancy from feared selves predicted anxiety and guilt, preempting the role of discrepancies from ought selves; ideal and feared discrepancies both predicted depression. Further analyses revealed interactions between actual-ought and actual-feared discrepancies in predicting anxiety and guilt. Among participants who were relatively near their feared selves, discrepancies from ought selves were unrelated to these affects. In contrast, among those whose feared selves were more distant, ought discrepancies did predict agitation-related affect, consistent with self-discrepancy theory. Discussion centers on a view in which an avoidance motive (feared self) dominates anxiety and guilt if the feared element is nearby but in which an associated approach motive (ought self) dominates anxiety and guilt if the feared element is more remote.
Article
Full-text available
This chapter challenges traditional models of deindividuation. These are based on the assumption that such factors as immersion in a group and anonymity lead to a loss of selfhood and hence of control over behaviour. We argue that such models depend upon an individualistic conception of the self, viewed as a unitary construct referring to that which makes individuals unique. This is rejected in favour of the idea that self can be defined at various different levels including the categorical self as well as the personal self. Hence a social identity model of deindividuation (SIDE) is outlined. Evidence is presented to show that deindividuation manipulations gain effect, firstly, through the ways in which they affect the salience of social identity (and hence conformity to categorical norms) and, secondly, through their effects upon strategic considerations relating to the expression of social identities. We conclude that the classic deindividuation paradigm of anonymity within a social group, far from leading to uncontrolled behaviour, maximizes the opportunity of group members to give full voice to their collective identities.
Article
Full-text available
Social media technologies collapse multiple audiences into single contexts, making it difficult for people to use the same techniques online that they do to handle multiplicity in face-to-face conversation. This paper investigates how content producers navigate 'imagined audiences' on Twitter. We talked to participants with different types of followings to understand their techniques, including targeting multiple audiences, concealing subjects, and maintaining authenticity. For some, the techniques of audience management resemble those of 'micro-celebrity' and personal branding, representing strategic self-commodification. Our model of the networked audience assumes a many-to-many communication through which individuals conceptualize an imagined audience evoked through their tweets.
Conference Paper
Full-text available
The problem of conflicting social spheres occurs when communications are simultaneously visible to multiple audiences within a social network, as commonly occurs on social network sites (SNS). In this environment users may suffer from social anxiety as they worry that communications seen as negative by certain audiences may be shared with those same groups. This issue rests on four assumptions: (1) that a social network encompasses a variety of social spheres, (2) that users believe they are being watched by these spheres, (3) that the social spheres differ in the norms, standards and expectations they hold about an individual and (4) that users largely do not employ measures to separate communications to different spheres. The present research aims to provide evidence for these assumptions. Self-discrepancy theory (SDT) [1] is used as a lens to view social norms, and as a novel way of understanding social spheres. Moreover, the research investigates any link between the magnitude of ought self-discrepancies and the social anxiety felt between relational dyads. An online survey with 313 participants offers strong support for these assumptions and provides evidence of a significant association between the magnitude of negative ought-other discrepancies and anxiety within dyads. This evidence strengthens the argument that SNS can cause anxiety and tension in social relations.
Article
Full-text available
Thematic analysis is a poorly demarcated, rarely acknowledged, yet widely used qualitative analytic method within psychology. In this paper, we argue that it offers an accessible and theoretically flexible approach to analysing qualitative data. We outline what thematic analysis is, locating it in relation to other qualitative analytic methods that search for themes or patterns, and in relation to different epistemological and ontological positions. We then provide clear guidelines to those wanting to start thematic analysis, or conduct it in a more deliberate and rigorous way, and consider potential pitfalls in conducting thematic analysis. Finally, we outline the disadvantages and advantages of thematic analysis. We conclude by advocating thematic analysis as a useful and flexible method for qualitative research in and beyond psychology.
Article
Full-text available
A survey on 143 university students was conducted to examine what motives young adults have for Facebook use, which of those motives were endorsed more than the others, and how those motives were related to the tendency of expressing one’s “true self” through Facebook use. According to the results, primary motive for Facebook use was to maintain long-distance relationships. This motive was followed by game-playing/entertainment, active forms of photo-related activities, organizing social activities, passive observations, establishing new friendships, and initiating and/or terminating romantic relationships. Another interesting result was that individuals’ tendency for expressing one’s true self on the Net had an influence on their Facebook use motives: The ones with high tendency to express their true self on the Internet reported to use Facebook for establishing new friendships and for initiating/terminating romantic relationships more than the individuals’ with low and medium levels of the same tendency did.
Article
Full-text available
Three experiments with 257 undergraduates investigated the effects of self-directed attention on dissonance reduction. Ss were induced to write counterattitudinal essays. In Exp I, mirror presence during either an attitude premeasure or the counterattitudinal behavior led to reduced attitude change. Exp II explored whether the discrepancy between present and prior research was due to the manner in which self-attention was manipulated. Ss were exposed either to a mirror or to a TV camera and were asked to report both their post-behavioral attitudes and their perceptions of their counterattitudinal behavior. Consistent with the results of the 1st study, Ss in the mirror condition again showed the least amount of attitude change. They did, however, reduce dissonance by altering their perceptions of their behavior. Consistent with prior findings, Ss in the camera condition tended to reduce dissonance by changing their attitudes, but did not distort their behavior. Exp III conceptually replicated these results by selecting Ss on the basis of their chronic levels of private and public self-consciousness. (35 ref) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Full-text available
Tested the proposition, derived from the authors' (in press) differential self-awareness theory, that only 1 type of antecedent variable traditionally associated with deindividuation (attentional cues) and a single aspect of self-awareness (private) are involved in the deindividuation process. 48 male undergraduates were assigned to groups of 4 and were exposed to factorial combinations of attentional cues (internal vs external focus of attention) and accountability cues (potential accountability to authority figures and victims) and then allowed to aggress against a victim. As predicted, attentional cues affected private but not public self-awareness, whereas accountability cues altered public but not private self-attention. External attentional cues and low accountability cues disinhibited aggression relative to internal attentional cues and high accountability cues, respectively. Exposure to external attentional cues created an internal state of deindividuation, composed of reduced private self-awareness and altered experience, that mediated aggression. Two major types of collective aggression were identified: One category resulted from group members' assessments of the possibility of an authority figure's and the victim's surveillance of their attacks; the other category resulted from the decreased cognitive mediation of behavior evoked by the deindividuation process. (34 ref) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Full-text available
The use of single-item measures has been encouraged by several authors asserting that single-item measures are appropriate and can substitute multiple-item measures in many cases. This study focuses on the characteristics of single-item measures in Likert scale format. There are two motives behind it: first, the Likert scale has been called problematic and its usage discouraged by the very proponents of single-item measures; and second, the reverse wording of Likert items has led to many problems with multiple-item measures. Because the Likert scale is one of the most used scales in marketing and management, and more researchers may decide to use single-item measures in Likert scale format, it becomes necessary to answer the question if it is usable or not. This research scrutinizes the characteristics of the Likert scale in a positive-negative continuum: from positive to negative with different levels of intensities. Based on collected sample data for three popular computer brands, the main conclusion is that only positively worded Likert items with a fairly high level of intensity should be used as single-item measures. The supporting empirical evidence includes: (1) positively and negatively worded items are not true opposites, (2) items with reversed scores inflate means, (3) items with neutral intensity have unique conceptual meaning, (4) dependent variables are predicted best by independent variables with similar intensity and (5) negatively worded items contain a method factor that limits their ability to capture the measured concept. The results also suggest that the effect of the method factor is expressed more when respondents are not familiar with the object of the measured concept. The findings in this study provide guidelines for the practical use of measures in Likert format. Scales in other formats should undergo similar scrutiny.
Article
Full-text available
Social network sites (SNSs) are commonly used to maintain existing relationships and form connections with new contacts. Recently, concerns of have been expressed over the way these Web-based technologies are used. Estimates suggest that people are increasingly using SNSs for engaging in the surveillance of others. Given the relatively high rates of prevalence, it can be argued that SNSs have been reinvented into a tool for interpersonal surveillance along with their social networking capabilities. This article expands on the concept of interpersonal electronic surveillance and applies it in the specific context of romantic partners’ use of SNSs. The relationships between surveillance over SNSs and demographic, relational, and Internet use and efficacy variables are studied. The findings reveal that interpersonal surveillance over SNSs is influenced by age, the time individuals spend on their partners’ profiles, the integration of SNSs into daily routines, and Internet self-efficacy.
Article
Full-text available
Different methods of inducing self-awareness have generally been assumed to be interchangeable. The present paper argues that the two most widely used manipulations of self-awareness—audiences and mirrors—differ in an important way: specifically, audiences increase focus on the public aspects of the self, whereas mirrors focus attention on the private aspects of the self. It is further argued that the standards that are used to regulate behavior depend upon which of these self-aspects is taken as the object of attention. Attention to the private self may result in behavior that reflects personal attitudes; attention to the public self may cause behavior to become more consistent with societal expectations. This reasoning was tested in two studies in which subjects served as “teachers” in an aggression paradigm. Each subject in Experiment 1 opposed the use of punishment in learing, but felt that other people favored it. Compared to the control condition, the presence of a mirror led to decreased levels of shock, and the presence of an evaluative audience led to increased levels of shock. Experiment 2 made use of subjects who favored the use of punishment but felt that others were against its use. Compared to the control group, the presence of a mirror led to increased levels of shock whereas the presence of an evaluative audience led to decreased levels of shock. Taken together, these findings indicate that self-awareness manipulations need to be chosen according to the aspect of self that is to be the object of self-attention. Discussion centers on the implications of the public-private distinction.
Conference Paper
Full-text available
Using data from a popular online social network site, this paper explores the relationship between profile structure (namely, which fields are completed) and number of friends, giving designers insight into the importance of the profile and how it works to encourage connections and articulated relationships between users. We describe a theoretical framework that draws on aspects of signaling theory, common ground theory, and transaction costs theory to generate an understanding of why certain profile fields may be more predictive of friendship articulation on the site. Using a dataset consisting of 30,773 Facebook profiles, we determine which profile elements are most likely to predict friendship links and discuss the theoretical and design implications of our findings.
Article
Individuals communicate and form relationships through Internet social networking websites such as Facebook and MySpace. We study risk taking, trust, and privacy concerns with regard to social networking websites among 205 college students using both reliable scales and behavior. Individuals with profiles on social networking websites have greater risk taking attitudes than those who do not; greater risk taking attitudes exist among men than women. Facebook has a greater sense of trust than MySpace. General privacy concerns and identity information disclosure concerns are of greater concern to women than men. Greater percentages of men than women display their phone numbers and home addresses on social networking websites. Social networking websites should inform potential users that risk taking and privacy concerns are potentially relevant and important concerns before individuals sign-up and create social networking websites.
Article
The critical literature on commercial monitoring and so-called “free labor” (Terranova, 2000) locates exploitation in realms beyond the workplace proper, noting the productivity of networked activity including the creation of user-generated-content and the profitability of commercial sites for social networking and communication. The changing context of productivity in these realms, however, requires further development of a critical concept of exploitation. This article defines exploitation as the extraction of unpaid, coerced, and alienated labor. It considers how such a definition might apply to various forms of unpaid but profit-generating online activity, arguing that commercial monitoring redoubles the conscious, intentional activity of users in ways that render it amenable to a critique of exploitation. Given the role of commercial monitoring in the emerging online economy, the paper emphasizes the importance of supplementing privacy critiques with approaches that identify the ways in which new forms of surveillance represent a form of power that seeks to manage and control consumer behavior.
Article
Impression management, the process by which people control the impressions others form of them, plays an important role in interpersonal behavior. This article presents a 2-component model within which the literature regarding impression management is reviewed. This model conceptualizes impression management as being composed of 2 discrete processes. The 1st involves impression motivation-the degree to which people are motivated to control how others see them. Impression motivation is conceptualized as a function of 3 factors: the goal-relevance of the impressions one creates, the value of desired outcomes, and the discrepancy between current and desired images. The 2nd component involves impression construction. Five factors appear to determine the kinds of impressions people try to construct: the self-concept, desired and undesired identity images, role constraints, target's values, and current social image. The 2-component model provides coherence to the literature in the area, addresses controversial issues, and supplies a framework for future research regarding impression management.
Article
This paper offers a theory of communication visibility based on a field study of the implementation of a new enterprise social networking site in a large financial services organization. The emerging theory suggests that once invisible communication occurring between others in the organization becomes visible for third parties, those third parties could improve their metaknowledge (i.e., knowledge of who knows what and who knows whom). Communication visibility, in this case made possible by the enterprise social networking site, leads to enhanced awareness of who knows what and whom through two interrelated mechanisms: message transparency and network translucence. Seeing the contents of other's messages helps third-party observers make inferences about coworkers' knowledge. Tangentially, seeing the structure of coworkers' communication networks helps third-party observers make inferences about those with whom coworkers regularly communicate. The emerging theory further suggests that enhanced metaknowledge can lead to more innovative products and services and less knowledge duplication if employees learn to work in new ways. By learning vicariously rather than through experience, workers can more effectively recombine existing ideas into new ideas and avoid duplicating work. Moreover, they can begin to proactively aggregate information perceived daily rather than engaging in reactive search after confronting a problem. I discuss the important implications of this emerging theory of communication visibility for work in the knowledge economy.
Article
We report results from an exploratory analysis examining "last-minute" self-censorship, or content that is filtered after being written, on Facebook. We collected data from 3.9 million users over 17 days and associate self-censorship behavior with features describing users, their social graph, and the interactions between them. Our results indicate that 71% of users exhibited some level of last-minute self-censorship in the time period, and provide specific evidence supporting the theory that a user's "perceived audience" lies at the heart of the issue: posts are censored more frequently than comments, with status updates and posts directed at groups censored most frequently of all sharing use cases investigated. Furthermore, we find that: people with more boundaries to regulate censor more; males censor more posts than females and censor even more posts with mostly male friends than do females, but censor no more comments than females; people who exercise more control over their audience censor more content; and, users with more politically and age diverse friends censor less, in general. Copyright © 2013, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved.
Article
Privacy is of prime importance to many individuals when they attempt to develop online social relationships. Nonetheless, it has been observed that individuals' behavior is at times inconsistent with their privacy concerns, e.g., they disclose substantial private information in synchronous online social interactions, even though they are aware of the risks involved. Drawing on the hyperpersonal framework and the privacy calculus perspective, this paper elucidates the interesting roles of privacy concerns and social rewards in synchronous online social Interactions by examining the causes and the behavioral strategies that individuals utilize to protect their privacy. An empirical study involving 251 respondents was conducted in online chat rooms. Our results indicate that individuals utilize both self-disclosure and misrepresentation to protect their privacy and that social rewards help explain why individuals may not behave in accordance with their privacy concerns. In addition, we find that perceived anonymity of others and perceived intrusiveness affect both privacy concerns and social rewards. Our findings also suggest that higher perceived anonymity of self decreases individuals' privacy concerns, and higher perceived media richness increases social rewards. Generally, this study contributes to the information systems literature by integrating the hyperpersonal framework and the privacy calculus perspective to identify antecedents of privacy trade-off and predict individuals' behavior in synchronous online social interactions.
Article
Facebook is the most popular social networking site (SNS) in the world. This study explored the methods individuals use to manage perceived invasions of privacy in the form of undesirable Facebook photos uploaded and tagged by other users. Limited previous research has focused solely on untagging, deletion request, privacy setting and face-to-face management methods. A series of qualitative focus group discussions identified these and further management methods, such as emailing or texting the uploader to request the removal of the image. An online quantitative questionnaire examined the relationship of the identified methods with age, gender and personality traits. Untagging was the most frequently cited management method in both the focus group discussions and online questionnaire. Contrary to previous studies, the findings suggested that women were not more likely to untag than men. Younger Facebook users were found to be more likely to untag than older users but were not more likely to use Facebook management methods. Agreeable individuals were more likely to use direct management methods. On average participants chose three methods they would use to manage these undesirable impressions. Future research should investigate the influence of the photo content and the tagged user’s relationship with the uploader on the management of undesirable SNS photos.
Article
The present research investigated how individual, interpersonal, and cultural variables influence positive self-presentation in online social networking. In particular, we examined the role of self-consciousness, actual-to-total Friends ratio, and culture in positive self-presentation on Facebook. A cross-sectional survey was conducted with college-age participants in the United States (n = 183) and South Korea (n = 137). Results showed that self-consciousness (public vs. private) and actual-to-total Friends ratio were not significantly associated with positive self-presentation on Facebook; however, culture showed a statistically significant association with positive self-presentation on Facebook, with the U.S. participants engaging in positive self-presentation on Facebook to a greater extent than the South Korean participants. More interestingly, culture significantly moderated the relationship between public self-consciousness and positive self-presentation as well as the relationship between actual-to-total Friends ratio and positive self-presentation. Specifically, positive self-presentation showed a significant positive association with public self-consciousness and a significant negative association with actual-to-total Friends ratio only among the South Korean participants and not among the U.S. participants. Theoretical and practical implications for understanding cross-cultural differences in self-presentation behaviors on social network sites were discussed.
Article
This paper studies Facebook users’ learning-based attitude formation and the relationship between member attitude and self-disclosure. Through the theoretical lens of learning theories, we recognize the key antecedents to member attitude toward a social networking as stemming from classical conditioning, operant conditioning, and social learning-related factors. In addition, we explore the underlying process through which member attitude affects self-disclosure extent and theorize the mediating role of site usage rate on the relationship between attitude and self-disclosure extent. Analysis of 822 survey data results provides strong support for the role of learning theories in explaining Facebook members’ attitude development. The results also confirm a significant, partial mediating effect of site usage rate. A series of post-hoc analyses on gender difference further reveal that attitude formation mechanisms remain constant between male and female Facebook users; gender difference exists on the association between attitude and self-disclosure extent and the association between site usage rate and self-disclosure extent; and the mediating effect of site usage rate exists in male user group only. Our research, therefore, contributes to the literature on social networking sites, as well as providing behavioral analysis useful to the service providers of these sites.
Book
Business Research Methods contains new and revised chapters on quantitative methods and visual research, while cutting-edge material on inclusivity and bias in research, feminist perspectives, and decolonial and indigenous research is also introduced. The book is composed of four parts. The first part looks at the research process. It covers research strategies and designs, as well as ethics in business research and writing up business research. Part 2 looks at quantitative research and details the nature of quantitative research, sampling, structured interviewing, and questions. It also looks at secondary analysis and statistics. The next part is about qualitative research. This part examines ethnography, participant observation, interviewing, focus groups, language, and document data. The final part is about mixed methods of research.
Article
The present study examined the link between neuroticism, extraversion, as well as presentation of the real, the ideal, and the false self on Facebook. Self-reports were collected from 261 young adults (ages 18–30) about personality, online self-presentation, and Facebook use. Level of extraversion was positively associated with Facebook activity level. A series of regression analyses revealed that young adults high in neuroticism reported presenting their ideal and false self on Facebook to a greater extent whereas those low in extraversion reported engaging in greater online self-exploratory behaviors. Findings suggest that young adults who are experiencing emotional instability may be strategic in their online self-presentation perhaps to seek reassurance, and those who have self-doubt further explore their self online.
Article
A number of studies have examined the relationship between privacy concerns, perceived control over information, trust and online self-disclosure, highlighting different points of view to understand this connection. This paper intends to compare these different models of explanation for self-disclosure behaviors in online social networks. Three different hypotheses are verified, using mediation and moderation analyses. The results allow underling the effect of the interaction between privacy concerns and trust on online self-disclosure, along with the absence of a direct influence of privacy concerns on disclosure itself. The results suggest practical implications for online social network providers, most of all with regard to privacy policies in online environments.
Article
From the Fourth Amendment to George Orwell’s Nineteen Eighty-Four, our culture is full of warnings about state scrutiny of our lives. These warnings are commonplace, but they are rarely very specific. Other than the vague threat of an Orwellian dystopia, as a society we don’t really know why surveillance is bad, and why we should be wary of it. To the extent the answer has something to do with “privacy,” we lack an understanding of what “privacy” means in this context, and why it matters. Developments in government and corporate practices have made this problem more urgent. Although we have laws that protect us against government surveillance, secret government programs cannot be challenged until they are discovered. And even when they are, courts frequently dismiss challenges to such programs for lack of standing, under the theory that mere surveillance creates no tangible harms, as the Supreme Court did recently in the case of Clapper v. Amnesty International. We need a better account of the dangers of surveillance.This article offers such an account. Drawing on law, history, literature, and the work of scholars in the emerging interdisciplinary field of “surveillance studies,” I explain what those harms are and why they matter. At the level of theory, I explain when surveillance is particularly dangerous, and when it is not. Surveillance is harmful because it can chill the exercise of our civil liberties, especially our intellectual privacy. It ialso gives the watcher power over the watched, creating the the risk of a variety of other harms, such as discrimination, coercion, and the threat of selective enforcement, where critics of the government can be prosecuted or blackmailed for wrongdoing unrelated to the purpose of the surveillance.At a practical level, I propose a set of four principles that should guide the future development of surveillance law, allowing for a more appropriate balance between the costs and benefits of government surveillance. First, we must recognize that surveillance transcends the public-private divide. Even if we are ultimately more concerned with government surveillance, any solution must grapple with the complex relationships between government and corporate watchers. Second, we must recognize that secret surveillance is illegitimate, and prohibit the creation of any domestic surveillance programs whose existence is secret. Third, we should recognize that total surveillance is illegitimate and reject the idea that it is acceptable for the government to record all Internet activity without authorization. Fourth, we must recognize that surveillance is harmful. Surveillance menaces intellectual privacy and increases the risk of blackmail, coercion, and discrimination; accordingly, we must recognize surveillance as a harm in constitutional standing doctrine.
Article
The study tested the predictions that (a) donors who believe that a third-party request on behalf of a recipient is known to the recipient will be more generous than donors who believe the recipient is unaware of the request, and (b) donors who believe a third-party requestor will monitor their compli ance will help more than will donors who believe monitoring to be impossible. Both predictions were supported.
Article
Considers the conditions which cause the consciousness to focus on the self as an object. The theory that self-awareness has motivational properties deriving from social feedback is discussed and considered with relation to conformity, attitude-behavior discrepancies, and communication sets. (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
The internet has become an integral part of many people’s everyday lives. It is unclear what its role is in maintaining intimate offline relationships and whether the use of the internet might cause conflicts between partners about what constitutes acceptable online behavior. An online survey of 920 married couples in the UK who used the internet investigated whether partners have similar netiquettes. There were high levels of agreement between married partners about the unacceptability of online infidelities; similarly they agreed more than two random individuals about the acceptability of entertainment activities which, in excess, might be addictive. Partners further showed high correspondence in surveillance behavior. Women were more concerned about their own and their partner’s behavior and were more likely to monitor their partner’s online activities. These findings suggest that a netiquette is developed and consciously or subconsciously negotiated within intimate relationships. Nevertheless, traditional gender differences as regards risk perception still hold; women are more likely to problematies their own and their partners behaviors.
Article
Early research on online self-presentation mostly focused on identity constructions in anonymous online environments. Such studies found that individuals tended to engage in role-play games and anti-normative behaviors in the online world. More recent studies have examined identity performance in less anonymous online settings such as Internet dating sites and reported different findings. The present study investigates identity construction on Facebook, a newly emerged nonymous online environment. Based on content analysis of 63 Facebook accounts, we find that the identities produced in this nonymous environment differ from those constructed in the anonymous online environments previously reported. Facebook users predominantly claim their identities implicitly rather than explicitly; they “show rather than tell” and stress group and consumer identities over personally narrated ones. The characteristics of such identities are described and the implications of this finding are discussed.