Frances Ryan CSI Supervisors: Hazel, Alistair, Peter Background: Undergrad: Public relations and historical tourism w/ specialisation in wine studies (yes, really) Mlitt in Media and Culture More than 15 years’ experience in communication industry
Two main themes: How people build and create their OWN identities and reputations How they evaluate or assess the reputations of others
What does that mean?
It’s about how what you share – or don’t share – on social networking sites such as LI, Twitter, FB might impact your overall “whole world” or “real world” reputation.
How do individuals build identities for themselves online?
How do individuals use online information to build and manage their reputations?
How do individuals asses the identities and reputations of others based on the information available to them online?
To what extent are individuals actively practicing identity and reputation building and assessment online?
Information science – including citation analysis and everyday life information seeking
However! Much of the literature is dispersed across a number of other domains
Deleting posts after negative reactions, self-reflection, or simple errors Limiting access to information for some connections / limiting connections
School of Computing PhD Research Conference Presentation
Frances VC Ryan
Supervisors: Professor Hazel Hall, Alistair Lawson, and Peter Cruickshank
email@example.com | @cleverfrances | www.JustAPhD.com
Centre for Social Informatics
“The role of online
information in the building,
maintenance, and evaluation
of personal reputation”
What’s the research about?
How online information contributes to the building, maintenance,
and evaluation of personal reputations
― Personal reputation: Private individuals, rather than corporate identity and brand
Two broad research themes:
(1) The means by which people evaluate or assess the personal
reputations of others from the online evidence available to them
(2) How people manage their own personal reputations through their use
of online information, and to what extent those behaviours are intentional
Where’s the literature found?
Everyday life information seeking (ELIS)
Human resources management
Management and organisational studies
Media and communication studies
Physical and mental health
1 2 3 4 5
How can I investigate both research themes?
The challenge? Establishing a way to examine both research themes
Qualitative methods deemed most appropriate
Semi-structured, in-depth interviews to discuss participants’ own
Answering questions on evaluation of others proved more difficult
Several solutions were considered
1 2 3 4 5 6
Tradition in everyday life information seeking (ELIS) research
Rich data are reliable sources of information and eliminate the
potential for inaccurate reporting
(Narayan, Case, & Edwards, 2011, p. 3)
Several studies use a combination of diary-keeping and interviews
(Agosto & Hughes-Hassell, 2005; Dervin, 1983; McKenzie, 2003; Rieh, 2004)
Although studies vary, they share a common theme: combining the
robustness of two forms of data
The solution? Diaries and interviews
1 2 3 4 5 6 7
How did the diary work?
Participants kept diary for one
Simple instructions; no
Got participants thinking about
their information behaviours
Diaries helped form interview
1 2 3 4 5 6 7 8
Collecting the data
Sample of 45 UK-based participants
Gen Y, Gen X, and Baby boomers
Short background survey
Diary for one week (electronic or hand-written)
One-hour semi-structured interviews (face-to-face or Skype)
1 2 3 4 5 6 7 8 9
Social media an extension of
Varying levels self-censorship
Intentional practices based on
Managing “the blur”
Generation X: Early findings
1 2 3 4 5 6 7 8 9 10
Difficult to convey evaluations of others
Negative views when opinions are
in stark contrast to their own
Conflicting views on anonymous
accounts and pseudonyms used by
More forgiving or lenient when known
in an offline environment
Generation X: Early findings
1 2 3 4 5 6 7 8 9 10 11
Complete data analysis
Determine thesis structure
1 2 3 4 5 6 7 8 9 10 11 12
Ausloos, J. (2012). The “Right to be forgotten”: Worth remembering? Computer Law & Security Review, 28(2), 143–152.
Bates, M. J. (1999). The invisible substrate of information science. Journal of the American Society for Information
Science, 50(12), 1043–1050. doi:10.1002/(SICI)1097-4571(1999)50:12<1043::AID-ASI1>3.3.CO;2-O
Cronin, B. & Askins, H.B. (2000). The web of knowledge: a festschrift in honor of Eugene Garfield. Medford, NJ:
Duguay, S. (2014). “He has a way gayer Facebook than I do”: Investigating sexual identity disclosure and context collapse
on a social networking site. New Media & Society, 1–17. doi:10.1177/1461444814549930
Fieseler, C., Meckel, M., & Ranzini, G. (2014). Professional personae: How organizational identification shapes online
identity in the workplace. Journal of Computer-Mediated Communication, 1–18. doi:10.1111/jcc4.12103
Finocchiaro, G. & Ricci, A. (2013). Quality of information, the right to oblivion, and digital reputation. In B. Custers, T.
Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society (Vol. 3, pp. 289–299).
Berlin, Heidelberg: Springer Berlin Heidelberg. doi:10.1007/978-3-642-30487-3
Greidanus, E. & Everall, R. D. (2010). Helper therapy in an online suicide prevention community. British Journal of
Guidance & Counselling, 38(2), 191–204. doi:10.1080/03069881003600991
Howkins, J. (2009). Creative ecologies: Where thinking is a proper job. St Lucia, Queensland: University of Queensland
Kluemper, D. H. & Rosen, P. A. (2009). Future employment selection methods: Evaluating social networking web sites.
Journal of Managerial Psychology, 24(6), 567–580. doi:10.1108/02683940910974134
Lingel, J. & boyd, d. (2013). “Keep it secret, keep it safe”: Information poverty, information norms, and stigma. Journal of
the American Society for Information Science and Technology, 64(5), 981–991. doi:10.1002/asi.22800
Madera, J. M. (2012). Using social networking websites as a selection tool: The role of selection process fairness and job
pursuit intentions. International Journal of Hospitality Management, 31(4), 1276–1282. doi:10.1016/j.ijhm.2012.03.008
Mesch, G. S. & Beker, G. (2010). Are norms of disclosure of online and offline personal information associated with the
disclosure of personal information online? Human Communication Research, 36(4), 570–592. doi:10.1111/j.1468-
1 2 3 4 5 6 7 8 9 10 11 12 13
Ollier-Malaterre, A., Rothbard, N. P., & Berg, J. M. (2013). When worlds collide in cyberspace: How boundary work in
online social networks impacts professional relationships. Academy of Management Review, 38(4), 645–669.
Savolainen, R. (2008). Everyday information practices: a social phenomenological perspective. Lanham, MD: Scarecrow
Uski, S. & Lampinen, A. (2014). Social norms and self-presentation on social network sites: Profile work in action. New
Media & Society, 1–18. doi:10.1177/1461444814543164
Vaast, E. (2007). Playing with masks: Fragmentation and continuity in the presentation of self in an occupational online
forum. Information Technology & People, 20(4), 334–351. doi:10.1108/09593840710839789
Van Dijck, J. (2013). “You have one identity”: Performing the self on Facebook and LinkedIn. Media, Culture & Society,
35(2), 199–215. doi:10.1177/0163443712468605
Slide 10: Creative commons copyright Horatio3K (www.flickr.com/horatio3k)
Slide 11: Creative commons copyright (1) Martin Tews (www.flickr.com/airpark); (2) Sarah
Slide 12: Copyright British Broadcasting Corporation
All other images copyright Frances VC Ryan
Indicative bibliography (cont.)
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Slides available at: www.slideshare.net/justfrances