Search results

1 – 10 of over 8000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 25 February 2020

Ameera Mansour

This study aims to develop an in-depth understanding of the underlying dynamics of an emergent shared information practice within a Facebook group, and the resources the group…

3980

Abstract

Purpose

This study aims to develop an in-depth understanding of the underlying dynamics of an emergent shared information practice within a Facebook group, and the resources the group develops to sustain this practice.

Design/methodology/approach

In-depth semi-structured interviews were carried out with twenty members from the group. The findings are based on comparative analysis combined with narrative analysis and were interpreted using theories of situated learning and Community of Practice.

Findings

The study shows that although members of this multicultural mothers group endorsed different, sometimes opposing parenting practices, the group had to find common ground when sharing information. Managing these challenges was key to maintaining the group as an open information resource for all members. The group produced a shared repertoire of resources to maintain its activities, including norms, rules, shared understandings, and various monitoring activities. The shared online practice developed by the community is conceptualised in this article as an information practice requiring shared, community-specific understandings of what, when, and how information can or should be sought or shared in ways that are valued in this specific community. The findings show that this shared information practice is not static but continually evolves as members negotiate what is, or not, important for the group.

Originality/value

The research provides novel insights into the underlying dynamics of the emergence, management, and sustainability of a shared information practice within a contemporary mothers group on Facebook.

Details

Journal of Documentation, vol. 76 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Access Restricted. View access options
Book part
Publication date: 23 February 2016

Xiaoli Tian and Daniel A. Menchik

To understand the phenomena of people revealing regrettable information on the Internet, we examine who people think they’re addressing, and what they say, in the process of…

Abstract

Purpose

To understand the phenomena of people revealing regrettable information on the Internet, we examine who people think they’re addressing, and what they say, in the process of interacting with those not physically or temporally co-present.

Methodology/approach

We conduct qualitative analyses of interviews with student bloggers and observations of five years’ worth of their blog posts, drawing on linguists’ concepts of indexical ground and deictics. Based on analyses of how bloggers reference their shared indexical ground and how they use deictics, we expose bloggers’ evolving awareness of their audiences, and the relationship between this awareness and their disclosures.

Findings

Over time, writers and their regular audience, or “chorus,” reciprocally reveal personal information. However, since not all audience members reveal themselves in this venue, writers’ disclosures are available to those observers they are not aware of. Thus, their overdisclosure is tied to what we call the “n-adic” organization of online interaction. Specifically, and as can be seen in their linguistic cues, n-adic utterances are directed toward a non-unified audience whose invisibility makes the discloser unable to find out the exact number of participants or the time they enter or exit the interaction.

Research implications

Attention to linguistic cues, such as deictics, is a compelling way to identify the shifting reference groups of ethnographic subjects interacting with physically or temporally distant others.

Originality/value

We describe the social organization of interaction with undetectable others. n-adic interactions likely also happen in other on- and offline venues in which participants are obscured but can contribute anonymously.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78560-785-1

Keywords

Access Restricted. View access options
Book part
Publication date: 27 June 2022

Carolyn A. Lin and David J. Atkin

Abstract

Details

The Emerald Handbook of Computer-Mediated Communication and Social Media
Type: Book
ISBN: 978-1-80071-598-1

Access Restricted. View access options
Book part
Publication date: 6 September 2018

Kayla Allison

Purpose – The overall purpose of this chapter is to discuss what is known about serious forms of bias violence, obstacles to studying bias violence, and how alternative…

Abstract

Purpose – The overall purpose of this chapter is to discuss what is known about serious forms of bias violence, obstacles to studying bias violence, and how alternative theoretical and methodological approaches can advance our understanding of bias violence in the twenty-first century.

Design/methodology/approach – Following a review of the literature, the applicability of identity fusion theory for explaining bias violence is considered and applied to the anti-racial mass shooting at an historically Black church in Charleston, South Carolina. Data come from an innovative open-source project known as the United States Extremist Crime Database.

Findings – Drawing from identity fusion theory, information from open-source data on the Charleston church shooting suggests that the perpetrator was a highly fused individual who perceived African Americans as a threat toward his social identity group and committed an act of extreme behavior (i.e., bias homicide) as a means for stabilizing his self-views.

Originality/value – This chapter builds upon prior studies of bias violence by demonstrating how (1) publicly available open sources (e.g., court documents and media reports) may be systematically compiled and used as reliable data for studying serious forms of bias violence, and (2) the use of social psychological theories, specifically identity fusion theory, can help to explain the role of personal and group identities in discriminatory violence.

Details

Homicide and Violent Crime
Type: Book
ISBN: 978-1-78714-876-5

Keywords

Access Restricted. View access options
Book part
Publication date: 27 September 2021

Ben B. Beck, J. Andrew Petersen and Rajkumar Venkatesan

Allocating budget optimally to marketing channels is an increasingly difficult venture. This difficulty is compounded by an increase in the number of marketing channels, a rise in…

Abstract

Allocating budget optimally to marketing channels is an increasingly difficult venture. This difficulty is compounded by an increase in the number of marketing channels, a rise in siloed data between marketing technologies, and a decrease in individually identifiable data due to legislated privacy policies. The authors explore the rich attribution modeling literature and discuss the different model types and approaches previously used by practitioners and researchers. They also investigate the changing landscape of marketing attribution, discuss the advantages and disadvantages of different data handling approaches (i.e., aggregate vs. individualistic data), and present a research agenda for future attribution research.

Details

Marketing Accountability for Marketing and Non-marketing Outcomes
Type: Book
ISBN: 978-1-83867-563-9

Keywords

Access Restricted. View access options
Book part
Publication date: 7 October 2015

Shawn Michael Bullock

This chapter is the result of an interest in the professional and research literature exploring the intersection between education and digital technology. Decades of research and…

Abstract

Purpose

This chapter is the result of an interest in the professional and research literature exploring the intersection between education and digital technology. Decades of research and press have largely focused on the ways in which particular devices might be productively used in the K-12 classroom. Educational radio, educational television, the computer, and more recently the tablet have all been framed as being valuable for supporting student learning. Critics such as Neil Selwyn have argued that research in educational technology needs to focus less on supporting particular devices and more on the nature of social interactions that are mediated, constrained, and enabled by various technological affordances.

Methodology/approach

This chapter reviews four theoretical frameworks in terms of their approach the social nature of the use of technology in education.

Findings

The chapter introduces a number of conceptual frameworks that are helpful for considering the social implications of using digital technologies to support the needs of diverse learners in a teacher education classroom.

Research implications

Scholars, especially who are also teacher educators can consider using and developing frameworks that are more robust for thinking about digital learning in education.

Originality/value

The value in this chapter lies in the critical conceptions explored and interrogated. The author demonstrates the complexity of teacher knowledge overlaid with technology.

Details

Exploring Pedagogies for Diverse Learners Online
Type: Book
ISBN: 978-1-78441-672-0

Keywords

Access Restricted. View access options
Article
Publication date: 10 October 2022

Xinlin Yao, Yuxiang Chris Zhao, Shijie Song and Xiaolun Wang

While anonymous online interactions could be helpful and less risky, they are usually not enough for LGBTQ+ people to satisfy the need of expressing their marginalized identity to…

781

Abstract

Purpose

While anonymous online interactions could be helpful and less risky, they are usually not enough for LGBTQ+ people to satisfy the need of expressing their marginalized identity to networks of known ties (i.e. on identified social media like Facebook, WeChat, and TikTok). However, identified social media bring LGBTQ+ people both sources and challenges like “context collapse” that flattens diverse networks or audiences that are originally separated. Previous studies focus on LGBTQ+ people's disclosure and responses to context collapse, few studies investigate how their perceptions of context collapse are shaped and their privacy management beyond regulating disclosure on social media. Drawing on identity theory and communication privacy management (CPM), this study aims to investigate how the need of LGBTQ+ people for self-identity affects their perceived context collapse and results in privacy management on identified social media.

Design/methodology/approach

Given the target population is LGBTQ+ people, The authors recruited participants through active LGBTQ+ online communities, influential LGBTQ+ activists, and the snowballing sampling. The authors empirically examined the proposed model using the PLS-SEM technique with a valid sample of 232 respondents concerning their identity practices and privacy management on WeChat, a typical and popular identified social media in China.

Findings

The results suggested that the need for expressing the self and the need for maintaining continuity of self-identity have significant influences on perceived context collapse, but vary in directions. The perceived context collapse will motivate LGBTQ+ individuals to engage in privacy management to readjust rules on ownership, access, and extension. However, only ownership management helps them regain the perceived privacy control on social media.

Originality/value

This study incorporated and highlighted the influence of LGBTQ+ identity in shaping context collapse and online privacy management. This study contributes to the literature on privacy and information communication and yields practical implications, especially on improving privacy-related interactive design for identified social media services.

Details

Journal of Documentation, vol. 79 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Access Restricted. View access options
Article
Publication date: 12 September 2016

Weng Marc Lim

This paper aims to define the conceptual boundary of the selfie and to discuss the role of the selfie in the social media marketplace.

7731

Abstract

Purpose

This paper aims to define the conceptual boundary of the selfie and to discuss the role of the selfie in the social media marketplace.

Design/methodology/approach

This paper extensively reviews and draws themes from the extant literature on consumer identities in the social media marketplace to explain the selfie phenomenon and to identify potentially fruitful directions for further research.

Findings

Current insights into the selfie phenomenon can be understood from socio-historical, technological, social media, marketing and ethical perspectives.

Research limitations/implications

Despite the limitations of a general review (e.g. absence of empirical data and analysis), this paper identifies multiple avenues to extend existing lines of inquiry on the selfie phenomenon. Thus, this paper should encourage further research on the topic in the academic and scientific community.

Practical implications

The selfie can be used as a marketing tool to improve marketing performance and accomplish marketing-related goals.

Originality/value

This paper sheds light on how marketing academics and practitioners can better understand the impact of the selfie in the social media marketplace.

Details

European Journal of Marketing, vol. 50 no. 9/10
Type: Research Article
ISSN: 0309-0566

Keywords

Access Restricted. View access options
Book part
Publication date: 27 November 2024

Rita Alcaire, Sofia José Santos and Filipa Subtil

Stemming from a critical approach towards technology (understood as a producer of meanings, subjectivity and agency, and, thus, shaped by power relations) and taking into account…

Abstract

Stemming from a critical approach towards technology (understood as a producer of meanings, subjectivity and agency, and, thus, shaped by power relations) and taking into account the role of broader societal norms and structures in technological uses and gratifications, this chapter explores the (re)negotiations of gender and sexual identities among Portuguese young adult app users. It focuses on if app usage allows these users to break heterocisnormativity and hegemonic notions of masculinity. For that purpose, the study conducted six focus groups involving 31 participants and 25 semi-structured interviews with young adults (18–30 years old). The scripts were designed to collect data about mobile app usage practices and what meanings interviewees attribute to used platforms, navigating through imaginaries, meanings, appropriations, incorporations and mostly negotiations. Analytically, this study contributes to an enhanced understanding of how apps might change young adult lives concerning gender and sexual identities and to challenging uses and gratifications theory, which, after almost 80 years since its first formulations, has gained new impetus with the ongoing digitisation process and the so-called interactive technologies that integrate it.

Available. Content available
Book part
Publication date: 2 April 2021

Shuhan Chen and Peter Lunt

Free Access. Free Access

Abstract

Details

Chinese Social Media
Type: Book
ISBN: 978-1-83909-136-0

1 – 10 of over 8000
Per page
102050