This study aims to develop an in-depth understanding of the underlying dynamics of an emergent shared information practice within a Facebook group, and the resources the group…
Abstract
Purpose
This study aims to develop an in-depth understanding of the underlying dynamics of an emergent shared information practice within a Facebook group, and the resources the group develops to sustain this practice.
Design/methodology/approach
In-depth semi-structured interviews were carried out with twenty members from the group. The findings are based on comparative analysis combined with narrative analysis and were interpreted using theories of situated learning and Community of Practice.
Findings
The study shows that although members of this multicultural mothers group endorsed different, sometimes opposing parenting practices, the group had to find common ground when sharing information. Managing these challenges was key to maintaining the group as an open information resource for all members. The group produced a shared repertoire of resources to maintain its activities, including norms, rules, shared understandings, and various monitoring activities. The shared online practice developed by the community is conceptualised in this article as an information practice requiring shared, community-specific understandings of what, when, and how information can or should be sought or shared in ways that are valued in this specific community. The findings show that this shared information practice is not static but continually evolves as members negotiate what is, or not, important for the group.
Originality/value
The research provides novel insights into the underlying dynamics of the emergence, management, and sustainability of a shared information practice within a contemporary mothers group on Facebook.
Details
Keywords
Xiaoli Tian and Daniel A. Menchik
To understand the phenomena of people revealing regrettable information on the Internet, we examine who people think they’re addressing, and what they say, in the process of…
Abstract
Purpose
To understand the phenomena of people revealing regrettable information on the Internet, we examine who people think they’re addressing, and what they say, in the process of interacting with those not physically or temporally co-present.
Methodology/approach
We conduct qualitative analyses of interviews with student bloggers and observations of five years’ worth of their blog posts, drawing on linguists’ concepts of indexical ground and deictics. Based on analyses of how bloggers reference their shared indexical ground and how they use deictics, we expose bloggers’ evolving awareness of their audiences, and the relationship between this awareness and their disclosures.
Findings
Over time, writers and their regular audience, or “chorus,” reciprocally reveal personal information. However, since not all audience members reveal themselves in this venue, writers’ disclosures are available to those observers they are not aware of. Thus, their overdisclosure is tied to what we call the “n-adic” organization of online interaction. Specifically, and as can be seen in their linguistic cues, n-adic utterances are directed toward a non-unified audience whose invisibility makes the discloser unable to find out the exact number of participants or the time they enter or exit the interaction.
Research implications
Attention to linguistic cues, such as deictics, is a compelling way to identify the shifting reference groups of ethnographic subjects interacting with physically or temporally distant others.
Originality/value
We describe the social organization of interaction with undetectable others. n-adic interactions likely also happen in other on- and offline venues in which participants are obscured but can contribute anonymously.
Details
Keywords
Purpose – The overall purpose of this chapter is to discuss what is known about serious forms of bias violence, obstacles to studying bias violence, and how alternative…
Abstract
Purpose – The overall purpose of this chapter is to discuss what is known about serious forms of bias violence, obstacles to studying bias violence, and how alternative theoretical and methodological approaches can advance our understanding of bias violence in the twenty-first century.
Design/methodology/approach – Following a review of the literature, the applicability of identity fusion theory for explaining bias violence is considered and applied to the anti-racial mass shooting at an historically Black church in Charleston, South Carolina. Data come from an innovative open-source project known as the United States Extremist Crime Database.
Findings – Drawing from identity fusion theory, information from open-source data on the Charleston church shooting suggests that the perpetrator was a highly fused individual who perceived African Americans as a threat toward his social identity group and committed an act of extreme behavior (i.e., bias homicide) as a means for stabilizing his self-views.
Originality/value – This chapter builds upon prior studies of bias violence by demonstrating how (1) publicly available open sources (e.g., court documents and media reports) may be systematically compiled and used as reliable data for studying serious forms of bias violence, and (2) the use of social psychological theories, specifically identity fusion theory, can help to explain the role of personal and group identities in discriminatory violence.
Details
Keywords
Ben B. Beck, J. Andrew Petersen and Rajkumar Venkatesan
Allocating budget optimally to marketing channels is an increasingly difficult venture. This difficulty is compounded by an increase in the number of marketing channels, a rise in…
Abstract
Allocating budget optimally to marketing channels is an increasingly difficult venture. This difficulty is compounded by an increase in the number of marketing channels, a rise in siloed data between marketing technologies, and a decrease in individually identifiable data due to legislated privacy policies. The authors explore the rich attribution modeling literature and discuss the different model types and approaches previously used by practitioners and researchers. They also investigate the changing landscape of marketing attribution, discuss the advantages and disadvantages of different data handling approaches (i.e., aggregate vs. individualistic data), and present a research agenda for future attribution research.
Details
Keywords
This chapter is the result of an interest in the professional and research literature exploring the intersection between education and digital technology. Decades of research and…
Abstract
Purpose
This chapter is the result of an interest in the professional and research literature exploring the intersection between education and digital technology. Decades of research and press have largely focused on the ways in which particular devices might be productively used in the K-12 classroom. Educational radio, educational television, the computer, and more recently the tablet have all been framed as being valuable for supporting student learning. Critics such as Neil Selwyn have argued that research in educational technology needs to focus less on supporting particular devices and more on the nature of social interactions that are mediated, constrained, and enabled by various technological affordances.
Methodology/approach
This chapter reviews four theoretical frameworks in terms of their approach the social nature of the use of technology in education.
Findings
The chapter introduces a number of conceptual frameworks that are helpful for considering the social implications of using digital technologies to support the needs of diverse learners in a teacher education classroom.
Research implications
Scholars, especially who are also teacher educators can consider using and developing frameworks that are more robust for thinking about digital learning in education.
Originality/value
The value in this chapter lies in the critical conceptions explored and interrogated. The author demonstrates the complexity of teacher knowledge overlaid with technology.
Details
Keywords
Xinlin Yao, Yuxiang Chris Zhao, Shijie Song and Xiaolun Wang
While anonymous online interactions could be helpful and less risky, they are usually not enough for LGBTQ+ people to satisfy the need of expressing their marginalized identity to…
Abstract
Purpose
While anonymous online interactions could be helpful and less risky, they are usually not enough for LGBTQ+ people to satisfy the need of expressing their marginalized identity to networks of known ties (i.e. on identified social media like Facebook, WeChat, and TikTok). However, identified social media bring LGBTQ+ people both sources and challenges like “context collapse” that flattens diverse networks or audiences that are originally separated. Previous studies focus on LGBTQ+ people's disclosure and responses to context collapse, few studies investigate how their perceptions of context collapse are shaped and their privacy management beyond regulating disclosure on social media. Drawing on identity theory and communication privacy management (CPM), this study aims to investigate how the need of LGBTQ+ people for self-identity affects their perceived context collapse and results in privacy management on identified social media.
Design/methodology/approach
Given the target population is LGBTQ+ people, The authors recruited participants through active LGBTQ+ online communities, influential LGBTQ+ activists, and the snowballing sampling. The authors empirically examined the proposed model using the PLS-SEM technique with a valid sample of 232 respondents concerning their identity practices and privacy management on WeChat, a typical and popular identified social media in China.
Findings
The results suggested that the need for expressing the self and the need for maintaining continuity of self-identity have significant influences on perceived context collapse, but vary in directions. The perceived context collapse will motivate LGBTQ+ individuals to engage in privacy management to readjust rules on ownership, access, and extension. However, only ownership management helps them regain the perceived privacy control on social media.
Originality/value
This study incorporated and highlighted the influence of LGBTQ+ identity in shaping context collapse and online privacy management. This study contributes to the literature on privacy and information communication and yields practical implications, especially on improving privacy-related interactive design for identified social media services.
Details
Keywords
This paper aims to define the conceptual boundary of the selfie and to discuss the role of the selfie in the social media marketplace.
Abstract
Purpose
This paper aims to define the conceptual boundary of the selfie and to discuss the role of the selfie in the social media marketplace.
Design/methodology/approach
This paper extensively reviews and draws themes from the extant literature on consumer identities in the social media marketplace to explain the selfie phenomenon and to identify potentially fruitful directions for further research.
Findings
Current insights into the selfie phenomenon can be understood from socio-historical, technological, social media, marketing and ethical perspectives.
Research limitations/implications
Despite the limitations of a general review (e.g. absence of empirical data and analysis), this paper identifies multiple avenues to extend existing lines of inquiry on the selfie phenomenon. Thus, this paper should encourage further research on the topic in the academic and scientific community.
Practical implications
The selfie can be used as a marketing tool to improve marketing performance and accomplish marketing-related goals.
Originality/value
This paper sheds light on how marketing academics and practitioners can better understand the impact of the selfie in the social media marketplace.
Details
Keywords
Rita Alcaire, Sofia José Santos and Filipa Subtil
Stemming from a critical approach towards technology (understood as a producer of meanings, subjectivity and agency, and, thus, shaped by power relations) and taking into account…
Abstract
Stemming from a critical approach towards technology (understood as a producer of meanings, subjectivity and agency, and, thus, shaped by power relations) and taking into account the role of broader societal norms and structures in technological uses and gratifications, this chapter explores the (re)negotiations of gender and sexual identities among Portuguese young adult app users. It focuses on if app usage allows these users to break heterocisnormativity and hegemonic notions of masculinity. For that purpose, the study conducted six focus groups involving 31 participants and 25 semi-structured interviews with young adults (18–30 years old). The scripts were designed to collect data about mobile app usage practices and what meanings interviewees attribute to used platforms, navigating through imaginaries, meanings, appropriations, incorporations and mostly negotiations. Analytically, this study contributes to an enhanced understanding of how apps might change young adult lives concerning gender and sexual identities and to challenging uses and gratifications theory, which, after almost 80 years since its first formulations, has gained new impetus with the ongoing digitisation process and the so-called interactive technologies that integrate it.