Successfully reported this slideshow.
Your SlideShare is downloading. ×

School of Computing PhD Research Conference Presentation

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
I poke you, you poke me
I poke you, you poke me
Loading in …3
×

Check these out next

1 of 15 Ad

More Related Content

Slideshows for you (20)

Similar to School of Computing PhD Research Conference Presentation (20)

Advertisement

More from Frances Ryan (11)

Recently uploaded (20)

Advertisement

School of Computing PhD Research Conference Presentation

  1. 1. Frances VC Ryan Supervisors: Professor Hazel Hall, Alistair Lawson, and Peter Cruickshank f.ryan@napier.ac.uk | @cleverfrances | www.JustAPhD.com Centre for Social Informatics 1 “The role of online information in the building, maintenance, and evaluation of personal reputation”
  2. 2. What’s the research about? How online information contributes to the building, maintenance, and evaluation of personal reputations ― Personal reputation: Private individuals, rather than corporate identity and brand Two broad research themes: (1) The means by which people evaluate or assess the personal reputations of others from the online evidence available to them (2) How people manage their own personal reputations through their use of online information, and to what extent those behaviours are intentional 1 2
  3. 3. OK, but what does that mean? © Frances Ryan 1 2 3
  4. 4. 1 2 3 4
  5. 5. Where’s the literature found? (Almost) Everywhere!  Information science  Everyday life information seeking (ELIS)  Citation analysis  Computing  Employment research  Human-computer interaction  Human resources management  Information systems  Management and organisational studies  Marketing  Media and communication studies  Physical and mental health 1 2 3 4 5
  6. 6. How can I investigate both research themes?  The challenge? Establishing a way to examine both research themes simultaneously  Qualitative methods deemed most appropriate  Semi-structured, in-depth interviews to discuss participants’ own practices  Answering questions on evaluation of others proved more difficult  Several solutions were considered 1 2 3 4 5 6
  7. 7.  Tradition in everyday life information seeking (ELIS) research  Rich data are reliable sources of information and eliminate the potential for inaccurate reporting (Narayan, Case, & Edwards, 2011, p. 3)  Several studies use a combination of diary-keeping and interviews (Agosto & Hughes-Hassell, 2005; Dervin, 1983; McKenzie, 2003; Rieh, 2004)  Although studies vary, they share a common theme: combining the robustness of two forms of data The solution? Diaries and interviews 1 2 3 4 5 6 7
  8. 8. How did the diary work?  Participants kept diary for one week  Simple instructions; no formatting guidelines  Got participants thinking about their information behaviours  Diaries helped form interview guides 1 2 3 4 5 6 7 8
  9. 9. Collecting the data  Sample of 45 UK-based participants  Gen Y, Gen X, and Baby boomers  Short background survey  Diary for one week (electronic or hand-written)  One-hour semi-structured interviews (face-to-face or Skype) 1 2 3 4 5 6 7 8 9
  10. 10.  Social media an extension of everyday lives  Varying levels self-censorship behaviours  Deleting posts  Intentional practices based on platform use  Managing “the blur” Generation X: Early findings 1 2 3 4 5 6 7 8 9 10
  11. 11.  Difficult to convey evaluations of others  Negative views when opinions are in stark contrast to their own  Conflicting views on anonymous accounts and pseudonyms used by others  More forgiving or lenient when known in an offline environment Generation X: Early findings 1 2 3 4 5 6 7 8 9 10 11
  12. 12. Next steps  Complete data analysis  Determine thesis structure  Thesis write-up  Viva  The Doctor 1 2 3 4 5 6 7 8 9 10 11 12
  13. 13. Indicative bibliography Ausloos, J. (2012). The “Right to be forgotten”: Worth remembering? Computer Law & Security Review, 28(2), 143–152. doi:10.1016/j.clsr.2012.01.006 Bates, M. J. (1999). The invisible substrate of information science. Journal of the American Society for Information Science, 50(12), 1043–1050. doi:10.1002/(SICI)1097-4571(1999)50:12<1043::AID-ASI1>3.3.CO;2-O Cronin, B. & Askins, H.B. (2000). The web of knowledge: a festschrift in honor of Eugene Garfield. Medford, NJ: Information Today Duguay, S. (2014). “He has a way gayer Facebook than I do”: Investigating sexual identity disclosure and context collapse on a social networking site. New Media & Society, 1–17. doi:10.1177/1461444814549930 Fieseler, C., Meckel, M., & Ranzini, G. (2014). Professional personae: How organizational identification shapes online identity in the workplace. Journal of Computer-Mediated Communication, 1–18. doi:10.1111/jcc4.12103 Finocchiaro, G. & Ricci, A. (2013). Quality of information, the right to oblivion, and digital reputation. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society (Vol. 3, pp. 289–299). Berlin, Heidelberg: Springer Berlin Heidelberg. doi:10.1007/978-3-642-30487-3 Greidanus, E. & Everall, R. D. (2010). Helper therapy in an online suicide prevention community. British Journal of Guidance & Counselling, 38(2), 191–204. doi:10.1080/03069881003600991 Howkins, J. (2009). Creative ecologies: Where thinking is a proper job. St Lucia, Queensland: University of Queensland Press. Kluemper, D. H. & Rosen, P. A. (2009). Future employment selection methods: Evaluating social networking web sites. Journal of Managerial Psychology, 24(6), 567–580. doi:10.1108/02683940910974134 Lingel, J. & boyd, d. (2013). “Keep it secret, keep it safe”: Information poverty, information norms, and stigma. Journal of the American Society for Information Science and Technology, 64(5), 981–991. doi:10.1002/asi.22800 Madera, J. M. (2012). Using social networking websites as a selection tool: The role of selection process fairness and job pursuit intentions. International Journal of Hospitality Management, 31(4), 1276–1282. doi:10.1016/j.ijhm.2012.03.008 Mesch, G. S. & Beker, G. (2010). Are norms of disclosure of online and offline personal information associated with the disclosure of personal information online? Human Communication Research, 36(4), 570–592. doi:10.1111/j.1468- 2958.2010.01389.x 1 2 3 4 5 6 7 8 9 10 11 12 13
  14. 14. Ollier-Malaterre, A., Rothbard, N. P., & Berg, J. M. (2013). When worlds collide in cyberspace: How boundary work in online social networks impacts professional relationships. Academy of Management Review, 38(4), 645–669. doi:10.5465/amr.2011.0235 Savolainen, R. (2008). Everyday information practices: a social phenomenological perspective. Lanham, MD: Scarecrow Press. Uski, S. & Lampinen, A. (2014). Social norms and self-presentation on social network sites: Profile work in action. New Media & Society, 1–18. doi:10.1177/1461444814543164 Vaast, E. (2007). Playing with masks: Fragmentation and continuity in the presentation of self in an occupational online forum. Information Technology & People, 20(4), 334–351. doi:10.1108/09593840710839789 Van Dijck, J. (2013). “You have one identity”: Performing the self on Facebook and LinkedIn. Media, Culture & Society, 35(2), 199–215. doi:10.1177/0163443712468605 Copyright attributions Slide 10: Creative commons copyright Horatio3K (www.flickr.com/horatio3k) Slide 11: Creative commons copyright (1) Martin Tews (www.flickr.com/airpark); (2) Sarah Reid (www.flickr.com/sarahreido) Slide 12: Copyright British Broadcasting Corporation All other images copyright Frances VC Ryan Indicative bibliography (cont.) 1 2 3 4 5 6 7 8 9 10 11 12 13 14
  15. 15. Slides available at: www.slideshare.net/justfrances Thank you! f.ryan@napier.ac.uk @cleverfrances www.JustAPhD.com

Editor's Notes

  • Frances Ryan
    CSI
    Supervisors: Hazel, Alistair, Peter
    Background:
    Undergrad: Public relations and historical tourism w/ specialisation in wine studies (yes, really)
    Mlitt in Media and Culture
    More than 15 years’ experience in communication industry
  • Two main themes:
    How people build and create their OWN identities and reputations
    How they evaluate or assess the reputations of others
  • What does that mean?

    It’s about how what you share – or don’t share – on social networking sites such as LI, Twitter, FB might impact your overall “whole world” or “real world” reputation.
  • Four RQs

    How do individuals build identities for themselves online?

    How do individuals use online information to build and manage their reputations?

    How do individuals asses the identities and reputations of others based on the information available to them online?

    To what extent are individuals actively practicing identity and reputation building and assessment online?
  • Information science – including citation analysis and everyday life information seeking

    However! Much of the literature is dispersed across a number of other domains
  • Deleting posts after negative reactions, self-reflection, or simple errors
    Limiting access to information for some connections / limiting connections

×