SlideShare a Scribd company logo
1 of 21
Assessing the available and accessible evidence:
How personal reputations are determined
and managed online
by Frances VC Ryan
Presentation delivered at the
Information: Interactions and Impact (i³) Conference
24th June 2015, Aberdeen, Scotland
Co-authors: Professor Hazel Hall, Alistair Lawson, and Peter Cruickshank
f.ryan@napier.ac.uk | @cleverfrances | www.JustAPhD.com
1
Let’s chat about …
 Overview
 Domains of study
 Key terms
 Key themes
 Evidence
 The gaps
 Research questions
 Next steps
1 2
What’s it all about?
How online information contributes to the building and assessment
of personal reputations
 How people manage their own personal reputations through their use
of online information
 The means by which people evaluate the personal reputations of
others from the online evidence available to them
– Personal reputation: Private individuals, rather than corporate identity and brand
1 2 3
Where’s the literature found?
(Almost) Everywhere!
 Information science
 Computing
 Employment research
 Human-computer interaction
 Human resources management
 Information systems
 Management and organisational studies
 Marketing
 Media and communication studies
 Physical and mental health
1 2 3 4
 Created by the individual that
the identity represents – and
others
 Different presentations of self for
different audiences
 “Representations of self/selves”
that individuals create for or
about themselves
Key terms: Identity
1 2 3 4 5
Key terms: Reputation
 Everyone has (at least) one!
 Determined by others based on
the information available to them
 The personal opinions and
character judgements one
individual has for another
1 2 3 4 5 6
Key terms: “Real world”
 Blurred lines
 Intentional transfer of offline
activities to online environments
 Trading information for online
conveniences
 If you’re not online, are you real?
1 2 3 4 5 6 7
Key themes in the literature
 Information sharing
 Information quality and accuracy
 Employment and career
opportunities
 Friends and friends-of-friends
 “Real names”, pseudonyms,
and anonymity
1 2 3 4 5 6 7 8
What does the literature tell us?
Employers conduct
social media reviews
pre- and post-
employment
1 2 3 4 5 6 7 8 9
What does the literature tell us?
Friends and friends-of-
friends can impact reputation
1 2 3 4 5 6 7 8 9 10
What does the literature tell us?
“Real names” and
anonymity are key
debates
1 2 3 4 5 6 7 8 9 10 11
1 2 3 4 5 6 7 8 9 10 11 12
At least some self-regulation and
censorship by individuals
What does the literature tell us?
Mind the gap! (1)
 To what extent are individuals evaluating the reputations of others
based on the information found about them online?
 What processes do individuals follow to identify and collect online
information about others?
 How is online information about individuals rated, assessed, or
validated for the purposes of reputation evaluation?
 To what extent does the quality of information collected impact the
determination of individuals’ reputations?
1 2 3 4 5 6 7 8 9 10 11 12 13
Mind the gap! (2)
 How do individuals manage online information regarding their combined
professional and private reputations?
 How do individuals manage their online and offline reputations as one
“real world” reputation?
 To what extent do individuals feel more or less free or restricted
because of the blurred lines between their online and offline worlds?
 To what extent do individuals actively monitor their online footprints for
the purpose of reputation management? If so, how and to what extent?
1 2 3 4 5 6 7 8 9 10 11 12 13 14
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
 How do people relate to, seek,
and use information?
(Bates, 1999, p. 6)
 How do we handle ideas and
knowledge, both our own and
other people’s?
(Howkins, 2009, p. 1)
Alignment with some “big questions”
The research questions
 How do individuals build identities for themselves online?
 How do individuals use online information to build and manage their
reputations?
 How do individuals asses the identities and reputations of others
based on the information available to them online?
 To what extent are individuals actively practicing identity and
reputation building and assessment online?
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Next steps
 Pilot study being designed
 Scope and test possible
approaches for main study
 Largely qualitative work
 Preliminary results expected
by end of summer
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Let’s chat about …
 Sample for main study
 Potential secondary methods
of investigation
 Other thoughts on the literature
or doctoral investigation
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Indicative bibliography
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ausloos, J. (2012). The “Right to be forgotten”: Worth remembering? Computer Law & Security Review, 28(2), 143–152.
doi:10.1016/j.clsr.2012.01.006
Bates, M. J. (1999). The invisible substrate of information science. Journal of the American Society for Information
Science, 50(12), 1043–1050. doi:10.1002/(SICI)1097-4571(1999)50:12<1043::AID-ASI1>3.3.CO;2-O
Cronin, B. & Askins, H.B. (2000). The web of knowledge: a festschrift in honor of Eugene Garfield. Medford, NJ:
Information Today
Duguay, S. (2014). “He has a way gayer Facebook than I do”: Investigating sexual identity disclosure and context collapse
on a social networking site. New Media & Society, 1–17. doi:10.1177/1461444814549930
Fieseler, C., Meckel, M., & Ranzini, G. (2014). Professional personae: How organizational identification shapes online
identity in the workplace. Journal of Computer-Mediated Communication, 1–18. doi:10.1111/jcc4.12103
Finocchiaro, G. & Ricci, A. (2013). Quality of information, the right to oblivion, and digital reputation. In B. Custers, T.
Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society (Vol. 3, pp. 289–299).
Berlin, Heidelberg: Springer Berlin Heidelberg. doi:10.1007/978-3-642-30487-3
Greidanus, E. & Everall, R. D. (2010). Helper therapy in an online suicide prevention community. British Journal of
Guidance & Counselling, 38(2), 191–204. doi:10.1080/03069881003600991
Howkins, J. (2009). Creative ecologies: Where thinking is a proper job. St Lucia, Queensland: University of Queensland
Press.
Kluemper, D. H. & Rosen, P. A. (2009). Future employment selection methods: Evaluating social networking web sites.
Journal of Managerial Psychology, 24(6), 567–580. doi:10.1108/02683940910974134
Lingel, J. & boyd, d. (2013). “Keep it secret, keep it safe”: Information poverty, information norms, and stigma. Journal of
the American Society for Information Science and Technology, 64(5), 981–991. doi:10.1002/asi.22800
Madera, J. M. (2012). Using social networking websites as a selection tool: The role of selection process fairness and job
pursuit intentions. International Journal of Hospitality Management, 31(4), 1276–1282. doi:10.1016/j.ijhm.2012.03.008
Mesch, G. S. & Beker, G. (2010). Are norms of disclosure of online and offline personal information associated with the
disclosure of personal information online? Human Communication Research, 36(4), 570–592. doi:10.1111/j.1468-
2958.2010.01389.x
Ollier-Malaterre, A., Rothbard, N. P., & Berg, J. M. (2013). When worlds collide in cyberspace: How boundary work in
online social networks impacts professional relationships. Academy of Management Review, 38(4), 645–669.
doi:10.5465/amr.2011.0235
Savolainen, R. (2008). Everyday information practices: a social phenomenological perspective. Lanham, MD: Scarecrow
Press.
Uski, S. & Lampinen, A. (2014). Social norms and self-presentation on social network sites: Profile work in action. New
Media & Society, 1–18. doi:10.1177/1461444814543164
Vaast, E. (2007). Playing with masks: Fragmentation and continuity in the presentation of self in an occupational online
forum. Information Technology & People, 20(4), 334–351. doi:10.1108/09593840710839789
Van Dijck, J. (2013). “You have one identity”: Performing the self on Facebook and LinkedIn. Media, Culture & Society,
35(2), 199–215. doi:10.1177/0163443712468605
Copyright attributions
Slides 2 & 18: Creative commons copyright Andy Wright (www.flickr.com/rightee)
Slide 4: Creative commons copyright GotCredit (www.flickr.com/jakerust)
Slide 5: Creative commons copyright (1) José Luís Agapito (www.flickr.com/blvesboy); (2) Red Rose Exile
(www.flickr.com/redroseexile); (3) Stefano Mortellaro (www.flickr.com/fazen)
Slide 6: Creative commons copyright (1) Martin Tews (www.flickr.com/airpark); (2) Sarah Reid (www.flickr.com/sarahreido)
Slide 10: Creative commons copyright Horatio3K (www.flickr.com/horatio3k)
All other images copyright Frances VC Ryan
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Indicative bibliography (cont.)
Thank you!
f.ryan@napier.ac.uk
@cleverfrances
www.JustAPhD.com
Slides available at: www.slideshare.net/justfrances

More Related Content

What's hot

Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
Micah Altman
 
Do you ever use facebook
Do you ever use facebookDo you ever use facebook
Do you ever use facebook
hgfhjjff
 

What's hot (20)

Reputation Management for Early Career Researchers
Reputation Management for Early Career ResearchersReputation Management for Early Career Researchers
Reputation Management for Early Career Researchers
 
Sharing Internship Experience on the Internet: A Study of Tourism and Hotel M...
Sharing Internship Experience on the Internet: A Study of Tourism and Hotel M...Sharing Internship Experience on the Internet: A Study of Tourism and Hotel M...
Sharing Internship Experience on the Internet: A Study of Tourism and Hotel M...
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspective
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacy
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
 
Facebook psychology
Facebook psychologyFacebook psychology
Facebook psychology
 
Do you ever use facebook
Do you ever use facebookDo you ever use facebook
Do you ever use facebook
 
Using social media to enhance your research profile
Using social media to enhance your research profileUsing social media to enhance your research profile
Using social media to enhance your research profile
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
20110128 connected action-node xl-sea of connections
20110128 connected action-node xl-sea of connections20110128 connected action-node xl-sea of connections
20110128 connected action-node xl-sea of connections
 
Open learning spaces_twitter.ppt
Open learning spaces_twitter.pptOpen learning spaces_twitter.ppt
Open learning spaces_twitter.ppt
 
Why ethics?
Why ethics?Why ethics?
Why ethics?
 
Constructing a purposive interview sample of bloggers
Constructing a purposive interview sample of bloggersConstructing a purposive interview sample of bloggers
Constructing a purposive interview sample of bloggers
 
Group Project Compilation
Group Project CompilationGroup Project Compilation
Group Project Compilation
 
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13
 
Edmedia2011 online.surveys
Edmedia2011 online.surveysEdmedia2011 online.surveys
Edmedia2011 online.surveys
 
Online survey tools_google-forms_nv_nsh (2) (2)
Online survey tools_google-forms_nv_nsh (2) (2)Online survey tools_google-forms_nv_nsh (2) (2)
Online survey tools_google-forms_nv_nsh (2) (2)
 

Viewers also liked

Carver strategic management plan smp1
Carver strategic management plan smp1Carver strategic management plan smp1
Carver strategic management plan smp1
andrea7411
 

Viewers also liked (13)

School of Computing PhD Research Conference Presentation
School of Computing PhD Research Conference PresentationSchool of Computing PhD Research Conference Presentation
School of Computing PhD Research Conference Presentation
 
Plaquette accessoires et permanents 2015 et bon de commande
Plaquette accessoires et permanents 2015 et bon de commandePlaquette accessoires et permanents 2015 et bon de commande
Plaquette accessoires et permanents 2015 et bon de commande
 
Online information: Building reputation one status update at a time
Online information: Building reputation one status update at a timeOnline information: Building reputation one status update at a time
Online information: Building reputation one status update at a time
 
Surrender all to Him
Surrender all to HimSurrender all to Him
Surrender all to Him
 
Life in a Digital Fishbowl: Managing your reputation online
Life in a Digital Fishbowl: Managing your reputation onlineLife in a Digital Fishbowl: Managing your reputation online
Life in a Digital Fishbowl: Managing your reputation online
 
2014 FECCI Presentation
2014 FECCI Presentation2014 FECCI Presentation
2014 FECCI Presentation
 
Carver strategic management plan smp1
Carver strategic management plan smp1Carver strategic management plan smp1
Carver strategic management plan smp1
 
Surrender your life to your Creator!
Surrender your life to your Creator!Surrender your life to your Creator!
Surrender your life to your Creator!
 
AS media-Danielle King
AS media-Danielle KingAS media-Danielle King
AS media-Danielle King
 
Power and energy sector of bangladesh abdullahil mamun, dba, iiuc
Power and energy sector of bangladesh  abdullahil mamun, dba, iiucPower and energy sector of bangladesh  abdullahil mamun, dba, iiuc
Power and energy sector of bangladesh abdullahil mamun, dba, iiuc
 
Firbush PhD Introduction
Firbush PhD IntroductionFirbush PhD Introduction
Firbush PhD Introduction
 
Catalogue Boutique pompiers 2015
Catalogue Boutique pompiers 2015Catalogue Boutique pompiers 2015
Catalogue Boutique pompiers 2015
 
Eras ppt
Eras pptEras ppt
Eras ppt
 

Similar to Assessing the available and accessible evidence: How personal reputations are determined and managed online

ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
lorent8
 

Similar to Assessing the available and accessible evidence: How personal reputations are determined and managed online (20)

Personal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t controlPersonal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t control
 
Using What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowUsing What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to Know
 
Skills in Sight: How Social Media Affordances Increase Network Awareness
Skills in Sight: How Social Media Affordances Increase Network AwarenessSkills in Sight: How Social Media Affordances Increase Network Awareness
Skills in Sight: How Social Media Affordances Increase Network Awareness
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
655-Final
655-Final655-Final
655-Final
 
Who am I? Blogtalk 2010 presentation
Who am I? Blogtalk 2010 presentation Who am I? Blogtalk 2010 presentation
Who am I? Blogtalk 2010 presentation
 
Bigdatahuman
BigdatahumanBigdatahuman
Bigdatahuman
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social Science
 
Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...
 
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
 
pepe842
pepe842pepe842
pepe842
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
Dina Pinsky, "Digital Ethnography and the IRB"
Dina Pinsky, "Digital Ethnography and the IRB"Dina Pinsky, "Digital Ethnography and the IRB"
Dina Pinsky, "Digital Ethnography and the IRB"
 
Lecture series: Using trace data or subjective data, that is the question dur...
Lecture series: Using trace data or subjective data, that is the question dur...Lecture series: Using trace data or subjective data, that is the question dur...
Lecture series: Using trace data or subjective data, that is the question dur...
 
The Gendering of Digital Media Knowledge
The Gendering of Digital Media KnowledgeThe Gendering of Digital Media Knowledge
The Gendering of Digital Media Knowledge
 
Career Counselor Technology Forum (CCTF) - Online Communication Tools
Career Counselor Technology Forum (CCTF) - Online Communication ToolsCareer Counselor Technology Forum (CCTF) - Online Communication Tools
Career Counselor Technology Forum (CCTF) - Online Communication Tools
 
Higher Ed Digital Identity
Higher Ed Digital IdentityHigher Ed Digital Identity
Higher Ed Digital Identity
 
Netnography in online dating services
Netnography in online dating servicesNetnography in online dating services
Netnography in online dating services
 

More from Frances Ryan

Build, manage, and evaluate: Information practices and personal reputations o...
Build, manage, and evaluate: Information practices and personal reputations o...Build, manage, and evaluate: Information practices and personal reputations o...
Build, manage, and evaluate: Information practices and personal reputations o...
Frances Ryan
 

More from Frances Ryan (6)

Build, manage, and evaluate: Information practices and personal reputations o...
Build, manage, and evaluate: Information practices and personal reputations o...Build, manage, and evaluate: Information practices and personal reputations o...
Build, manage, and evaluate: Information practices and personal reputations o...
 
Blurred reputations: Managing professional and private information online
Blurred reputations: Managing professional and private information onlineBlurred reputations: Managing professional and private information online
Blurred reputations: Managing professional and private information online
 
Building your academic reputation online
Building your academic reputation onlineBuilding your academic reputation online
Building your academic reputation online
 
Academics online: Alternative reputations
Academics online: Alternative reputationsAcademics online: Alternative reputations
Academics online: Alternative reputations
 
Online information's role in reputation: A thesis in three minutes
Online information's role in reputation: A thesis in three minutes Online information's role in reputation: A thesis in three minutes
Online information's role in reputation: A thesis in three minutes
 
IDIMC 5-minute madness presentation
IDIMC 5-minute madness presentationIDIMC 5-minute madness presentation
IDIMC 5-minute madness presentation
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Assessing the available and accessible evidence: How personal reputations are determined and managed online

  • 1. Assessing the available and accessible evidence: How personal reputations are determined and managed online by Frances VC Ryan Presentation delivered at the Information: Interactions and Impact (i³) Conference 24th June 2015, Aberdeen, Scotland Co-authors: Professor Hazel Hall, Alistair Lawson, and Peter Cruickshank f.ryan@napier.ac.uk | @cleverfrances | www.JustAPhD.com 1
  • 2. Let’s chat about …  Overview  Domains of study  Key terms  Key themes  Evidence  The gaps  Research questions  Next steps 1 2
  • 3. What’s it all about? How online information contributes to the building and assessment of personal reputations  How people manage their own personal reputations through their use of online information  The means by which people evaluate the personal reputations of others from the online evidence available to them – Personal reputation: Private individuals, rather than corporate identity and brand 1 2 3
  • 4. Where’s the literature found? (Almost) Everywhere!  Information science  Computing  Employment research  Human-computer interaction  Human resources management  Information systems  Management and organisational studies  Marketing  Media and communication studies  Physical and mental health 1 2 3 4
  • 5.  Created by the individual that the identity represents – and others  Different presentations of self for different audiences  “Representations of self/selves” that individuals create for or about themselves Key terms: Identity 1 2 3 4 5
  • 6. Key terms: Reputation  Everyone has (at least) one!  Determined by others based on the information available to them  The personal opinions and character judgements one individual has for another 1 2 3 4 5 6
  • 7. Key terms: “Real world”  Blurred lines  Intentional transfer of offline activities to online environments  Trading information for online conveniences  If you’re not online, are you real? 1 2 3 4 5 6 7
  • 8. Key themes in the literature  Information sharing  Information quality and accuracy  Employment and career opportunities  Friends and friends-of-friends  “Real names”, pseudonyms, and anonymity 1 2 3 4 5 6 7 8
  • 9. What does the literature tell us? Employers conduct social media reviews pre- and post- employment 1 2 3 4 5 6 7 8 9
  • 10. What does the literature tell us? Friends and friends-of- friends can impact reputation 1 2 3 4 5 6 7 8 9 10
  • 11. What does the literature tell us? “Real names” and anonymity are key debates 1 2 3 4 5 6 7 8 9 10 11
  • 12. 1 2 3 4 5 6 7 8 9 10 11 12 At least some self-regulation and censorship by individuals What does the literature tell us?
  • 13. Mind the gap! (1)  To what extent are individuals evaluating the reputations of others based on the information found about them online?  What processes do individuals follow to identify and collect online information about others?  How is online information about individuals rated, assessed, or validated for the purposes of reputation evaluation?  To what extent does the quality of information collected impact the determination of individuals’ reputations? 1 2 3 4 5 6 7 8 9 10 11 12 13
  • 14. Mind the gap! (2)  How do individuals manage online information regarding their combined professional and private reputations?  How do individuals manage their online and offline reputations as one “real world” reputation?  To what extent do individuals feel more or less free or restricted because of the blurred lines between their online and offline worlds?  To what extent do individuals actively monitor their online footprints for the purpose of reputation management? If so, how and to what extent? 1 2 3 4 5 6 7 8 9 10 11 12 13 14
  • 15. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15  How do people relate to, seek, and use information? (Bates, 1999, p. 6)  How do we handle ideas and knowledge, both our own and other people’s? (Howkins, 2009, p. 1) Alignment with some “big questions”
  • 16. The research questions  How do individuals build identities for themselves online?  How do individuals use online information to build and manage their reputations?  How do individuals asses the identities and reputations of others based on the information available to them online?  To what extent are individuals actively practicing identity and reputation building and assessment online? 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
  • 17. Next steps  Pilot study being designed  Scope and test possible approaches for main study  Largely qualitative work  Preliminary results expected by end of summer 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
  • 18. Let’s chat about …  Sample for main study  Potential secondary methods of investigation  Other thoughts on the literature or doctoral investigation 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
  • 19. Indicative bibliography 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Ausloos, J. (2012). The “Right to be forgotten”: Worth remembering? Computer Law & Security Review, 28(2), 143–152. doi:10.1016/j.clsr.2012.01.006 Bates, M. J. (1999). The invisible substrate of information science. Journal of the American Society for Information Science, 50(12), 1043–1050. doi:10.1002/(SICI)1097-4571(1999)50:12<1043::AID-ASI1>3.3.CO;2-O Cronin, B. & Askins, H.B. (2000). The web of knowledge: a festschrift in honor of Eugene Garfield. Medford, NJ: Information Today Duguay, S. (2014). “He has a way gayer Facebook than I do”: Investigating sexual identity disclosure and context collapse on a social networking site. New Media & Society, 1–17. doi:10.1177/1461444814549930 Fieseler, C., Meckel, M., & Ranzini, G. (2014). Professional personae: How organizational identification shapes online identity in the workplace. Journal of Computer-Mediated Communication, 1–18. doi:10.1111/jcc4.12103 Finocchiaro, G. & Ricci, A. (2013). Quality of information, the right to oblivion, and digital reputation. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society (Vol. 3, pp. 289–299). Berlin, Heidelberg: Springer Berlin Heidelberg. doi:10.1007/978-3-642-30487-3 Greidanus, E. & Everall, R. D. (2010). Helper therapy in an online suicide prevention community. British Journal of Guidance & Counselling, 38(2), 191–204. doi:10.1080/03069881003600991 Howkins, J. (2009). Creative ecologies: Where thinking is a proper job. St Lucia, Queensland: University of Queensland Press. Kluemper, D. H. & Rosen, P. A. (2009). Future employment selection methods: Evaluating social networking web sites. Journal of Managerial Psychology, 24(6), 567–580. doi:10.1108/02683940910974134 Lingel, J. & boyd, d. (2013). “Keep it secret, keep it safe”: Information poverty, information norms, and stigma. Journal of the American Society for Information Science and Technology, 64(5), 981–991. doi:10.1002/asi.22800 Madera, J. M. (2012). Using social networking websites as a selection tool: The role of selection process fairness and job pursuit intentions. International Journal of Hospitality Management, 31(4), 1276–1282. doi:10.1016/j.ijhm.2012.03.008 Mesch, G. S. & Beker, G. (2010). Are norms of disclosure of online and offline personal information associated with the disclosure of personal information online? Human Communication Research, 36(4), 570–592. doi:10.1111/j.1468- 2958.2010.01389.x
  • 20. Ollier-Malaterre, A., Rothbard, N. P., & Berg, J. M. (2013). When worlds collide in cyberspace: How boundary work in online social networks impacts professional relationships. Academy of Management Review, 38(4), 645–669. doi:10.5465/amr.2011.0235 Savolainen, R. (2008). Everyday information practices: a social phenomenological perspective. Lanham, MD: Scarecrow Press. Uski, S. & Lampinen, A. (2014). Social norms and self-presentation on social network sites: Profile work in action. New Media & Society, 1–18. doi:10.1177/1461444814543164 Vaast, E. (2007). Playing with masks: Fragmentation and continuity in the presentation of self in an occupational online forum. Information Technology & People, 20(4), 334–351. doi:10.1108/09593840710839789 Van Dijck, J. (2013). “You have one identity”: Performing the self on Facebook and LinkedIn. Media, Culture & Society, 35(2), 199–215. doi:10.1177/0163443712468605 Copyright attributions Slides 2 & 18: Creative commons copyright Andy Wright (www.flickr.com/rightee) Slide 4: Creative commons copyright GotCredit (www.flickr.com/jakerust) Slide 5: Creative commons copyright (1) José Luís Agapito (www.flickr.com/blvesboy); (2) Red Rose Exile (www.flickr.com/redroseexile); (3) Stefano Mortellaro (www.flickr.com/fazen) Slide 6: Creative commons copyright (1) Martin Tews (www.flickr.com/airpark); (2) Sarah Reid (www.flickr.com/sarahreido) Slide 10: Creative commons copyright Horatio3K (www.flickr.com/horatio3k) All other images copyright Frances VC Ryan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Indicative bibliography (cont.)

Editor's Notes

  1. Two main themes: How people build and create their OWN identities and reputations How they evaluate or assess the reputations of others
  2. Information science – including citation analysis and everyday life information seeking However! Much of the literature is dispersed across a number of other domains
  3. Within the domain of information science, some of these discussions explore identity creation through citation practices, and how identity is not necessarily created by the individual that the identity represents (for example, Cronin & Shaw, 2002b; Hyland, 2012). Geoffman’s work on presentations of self ring true within the context of online presentations of self. Information science researchers Bullinghman and Vasconcelos, talk about opportunities to create multiple identities—without the need to reveal one’s true, physical self online This desire for some individuals to use information for the projection of more than one identity, coupled with a perceived anonymity of the Internet, has provided a platform for individuals to construct multiple online identities without revealing their offline identities. This paper looks at identity as “representations of self/selves”
  4. And also notes that the reputation of individuals is determined by others based on the information available to them.
  5. The idea that online and offline worlds have merged to create a “real world” is becoming an accepted concept But there is not a consensus on how or why the amalgamation happens. Hongladarom argues that the blurring between online and offline environments occurs as individuals project themselves onto social media and social networking sites. He also suggests that there is essentially no difference between individuals’ online and offline selves because of this, thus causing them to merge into one “real world”. Other studies have indicated that some individuals intentionally transfer their offline activities and interactions to online environments (Amichai-Hamburger & Vinitzky, 2010, p. 1294). However, Craig and Ludloff (2011) suggest that some of the blurring between online and offline worlds happens not because of individuals’ specific desires to share information about their offline worlds online, but rather the convenience of conducting some of their activities online. They argue that individuals trade personal information about themselves for the conveniences of services including ecommerce, instant messaging/communication, and connecting with others through networking sites (Craig & Ludloff, 2011, pp. 1-4). This is not necessarily due to an intentional desire to merge the two worlds. Anecdotal evidence asking about online/offline by HR managers and social media users alike.
  6. A quick Google search for “twitter got me fired” brings up dozens of stories about people who found themselves unemployed because of a tweet. Emma Way – the infamous “bloody cyclists” tweeter was fired after her flippant and unremorseful tweet about knocking over a cyclist with her car. Paris Brown was asked to step down less than 24 hours after taking on a post as xxx because racist tweets she’d made years earlier were brought to light. And young Cella was fired the day before she started her job at a pizza place after complaining that she was starting “this [censored] job tomorrow”.
  7. But we know that these gaps align with some of the “big questions” related to information science research. Specifically: How do people relate to, seek, and use information? (Bates, 1999, p. 6) How do we handle ideas and knowledge, both our own and other people’s? (Howkins, 2009, p. 1)
  8. Keeping those questions in mind, along with the gaps in the literature previously discussed, four research questions have been identified for the larger doctoral investigation: How do individuals build identities for themselves online? How do individuals use online information to build and manage their reputations? How do individuals asses the identities and reputations of others based on the information available to them online? To what extent are individuals actively practicing identity and reputation building and assessment online?