1. The document analyzes user behavior on anonymous (Jodel) and non-anonymous (Instagram) social media platforms.
2. It examines how anonymity impacts user motivations and behavior based on the uses and gratifications theory, which identifies key motivations as self-presentation, information, socialization, and entertainment.
3. The study distinguishes between three types of social media users - producers, participants, and consumers - and analyzes how their behavior may differ depending on their role and the level of anonymity on different platforms.
Twitter is going to become much less important as a person to person (peer to peer) communication medium and instead become more of a content-delivery medium like TV, where content is broadcast to a large number of followers. It's just going to become a new way to follow celebrities, corporations, and the like.
These are the findings of research by two business school professors. Their paper "Intrinsic versus Image-Related Motivations in Social Media: Why do People Contribute to Twitter?", was published in the journal Marketing Science. The professors are Olivier Toubia of Columbia Business School and Andrew T. Stephen of the University of Pittsburgh.
In Professor Toubia’s words, “Get ready for a TV-like Twitter".
The research examined the motivations behind why everyday people, with no financial incentive, contribute to Twitter.The study examined roughly 2500 non-commercial Twitter users. In a field experiment, the profs randomly selected some of those users and, through the use of other synthetic accounts, increased the selected group's followers. At first, they noticed that as the selected group's followers increased, so did the posting rate. However, when that group reached a level of stature — a moderately large amount of followers — the posting rate declined significantly.
"Users began to realize it was harder to continue to attract more followers with their current strategy, so they slowed down.When posting activity no longer leads to additional followers, people will view Twitter as a non-evolving, static structure, like TV."
Based on the analyses, the profs predict Twitter posts by everyday people will slow down, yet celebrities and commercial users will continue to post for financial gain.
The paper is attached on Slideshare.
Running head: Social Media 5
Social Media
Thesis Statement
The emergence of social media has led to new perspective on the public domain about privacy issues: it has changed the debate about right to privacy.
Annotated Bibliography
Bauerlein, P. (2011). The Digital Divide: Arguments for and Against Facebook, Google, Texting, and the Age of Social Networking. New York: Penguin Group.
Having been a professor of communication, the author explores various arguments that are raised against and for the social media. The book will be instrumental in this research since it tackles the issues surrounding privacy apparent in the emerging age of social media. In particular, the first part of the book is dedicated in analyzing various aspects of privacy that the new media has touched on specifically, Facebook, Twitter and other platforms. The author also includes essays from various renowned authors such as Douglas Rushkoff as well as Todd Gitlin just to mention but two. The author also divides the book into various sections that will be very instrumental in unveiling the security and privacy issues raised by the book. For instance, the book has section name, ‘social and personal life’ that informs the research. In essence, the book is an important primary source of information that will help in approving or disapproving the thesis statement.
Bill, H., Reyns, W. & Fisher, B. (2011). Security in the 21st century: examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(1),251-153.
This scholarly article is important and critical as a primary source of information since it synthesizes information from three acclaimed authors and professors. The authors attempt to establish a correlation between contemporary social networks with privacy. The journal also seeks to examine the link between the social networks with interpersonal victimization. Throughout the journal, it is apparent from the inferences made by the authors that there is exists a correlation between social media and the manner in which people perceive their security. As such, the book will not only provide insightful information about new social networking sites but also how they may affect the public perspectives on security. As the authors posit, the social media has also led to privacy issues that do not affect the physical domain of the users but have unprecedented impact on the emotional and psychological aspects of the users. To that end, the journal answers the question, ‘Does social media raise privacy issues especially in the wake of 21st century?’
Gleibs, H. (2014). Turning Virtual Public Spaces into Laboratories: Thoughts on Conducting Online Field Studies Using Social Network Sites. Analyses of Social Issues and Public Policy, 1(1), 1-19.
Gleibs is a renowned author in the field of interpersonal communication. In this journal that provides information not only to public but also shapes the publi.
Unpacking the Social Media Phenomenon: Towards a Research AgendaIan McCarthy
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance the conceptualization of social media in public affairs research. Finally, we combine the individual research questions for each building block back into the honeycomb model to illustrate how the theories in combination provide a powerful macro-lens for research on social media dynamics.
Unpacking the social media phenomenon: towards a research agendaAndrey Markin
You can access PDF here http://busandadmin.uwinnipeg.ca/silvestrepdfs/PDF04.pdf
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and
offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using
a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through
appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance
the conceptualization of social media in public affairs research. Finally, we combine the individual research questions
for each building block back into the honeycomb model to illustrate how the theories in combination provide a
powerful macro-lens for research on social media dynamics
Demographics, Psychographics and the Uses and Gratifications Theory, Understa...ijtsrd
The issues of how the media affect people and what people do with the media have presented perennial and perplexing questions for communication scholars. Some of the research results in these areas are more controversial than useful. Uses and gratification studies straddle the two domains of media effects and people’s employment of the media. The field of gratification research holds great promise in the continual search for comprehensive knowledge on how and why we use the media. Drawing from a wide range of local and international literature, this paper presents a clear and concise review of the ontological, epistemological and axiological assumptions of the uses and gratifications theory. Paleowei, Zikena Cletus "Demographics, Psychographics and the Uses and Gratifications Theory, Understanding Text and Preferences" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd56314.pdf Paper URL: https://www.ijtsrd.com.com/humanities-and-the-arts/education/56314/demographics-psychographics-and-the-uses-and-gratifications-theory-understanding-text-and-preferences/paleowei-zikena-cletus
Chapter One MediaSociety in a Digital WorldNote Read the summ.docxtiffanyd4
Chapter One: Media/Society in a Digital World
Note: Read the summary below and click on all supplemental links as part of this lecture;the videos and articles provided will assist with your understanding of this chapter.
Key Questions:
1. How can we understand the importance of media in relationship to socialization, structure and agency?
2. How can a sociological lens help us understand the relationship between media and social context?
3. What roles do structure and agency play in our understanding of media culture?
Themes:
1.1 Definitions: Media vs. Medium & Interpersonal vs. Mass Media
1.2 Technology, Interactivity & Consumption
1.3 Cultural Experience & Socialization
1.4 Sociology: Social Relations, Structure & Agency
1.5 Model of Media
1.1 Definitions: Media vs. Medium & Interpersonal vs. Mass Media
Before we examine and critique the role(s) of media in our social world(s), it is essential to identify and narrow our scope by defining terms; after all, "media" is a term used very loosely in contemporary culture. As Croteau & Hoynes (2019) explain in your textbook , the term "media" is the PLURAL of medium and is derived from medius,which is the Latin term for "middle."
A helpful way to think about these concepts is that mediumsfacilitate communication between (are in the middle of) a sender and receiver; for example, television is a medium that facilitates programming from producers/creators/networks to audiences. Other mediums include radio, print, film, and the internet, and notices that they are both digital and non-digital (print).
The term "media" is the plural of these mediums, but is often used incorrectly; although it doesn't sound like correct grammar, the proper way (within the field of Media Studies) to use "media" in a sentence is "media are" not "media is." When individuals, including politicians, members of non-profits, etc. say "media is" and fail to recognize that the concept of "media" actually encompasses many different mediums with various logics, there is an assumption that all mediums function the same, include the same message, and follow the same regulations and economic structure. For example, when "the media" is blamed for violent action or political outcomes, there is a misunderstanding that needs to be refined; are we talking about film? Television? News media? Are we talking about the digital edition of the news? Are we talking about the Tweets that come from that news organization? In other words, it is important to be specific about mediums when making claims about impact, and when referring to "media" it is important to remember that this is a plural term.
Now, the next step in introductory terminology is to identify which media are "interpersonal" and which mediums are considered "mass" - this course focuses on "mass" media. Some of you may have taken Communications courses that focus more on interpersonal communication, which is one-to-one, includes a single known receiver, and is very interactive (.
Twitter is going to become much less important as a person to person (peer to peer) communication medium and instead become more of a content-delivery medium like TV, where content is broadcast to a large number of followers. It's just going to become a new way to follow celebrities, corporations, and the like.
These are the findings of research by two business school professors. Their paper "Intrinsic versus Image-Related Motivations in Social Media: Why do People Contribute to Twitter?", was published in the journal Marketing Science. The professors are Olivier Toubia of Columbia Business School and Andrew T. Stephen of the University of Pittsburgh.
In Professor Toubia’s words, “Get ready for a TV-like Twitter".
The research examined the motivations behind why everyday people, with no financial incentive, contribute to Twitter.The study examined roughly 2500 non-commercial Twitter users. In a field experiment, the profs randomly selected some of those users and, through the use of other synthetic accounts, increased the selected group's followers. At first, they noticed that as the selected group's followers increased, so did the posting rate. However, when that group reached a level of stature — a moderately large amount of followers — the posting rate declined significantly.
"Users began to realize it was harder to continue to attract more followers with their current strategy, so they slowed down.When posting activity no longer leads to additional followers, people will view Twitter as a non-evolving, static structure, like TV."
Based on the analyses, the profs predict Twitter posts by everyday people will slow down, yet celebrities and commercial users will continue to post for financial gain.
The paper is attached on Slideshare.
Running head: Social Media 5
Social Media
Thesis Statement
The emergence of social media has led to new perspective on the public domain about privacy issues: it has changed the debate about right to privacy.
Annotated Bibliography
Bauerlein, P. (2011). The Digital Divide: Arguments for and Against Facebook, Google, Texting, and the Age of Social Networking. New York: Penguin Group.
Having been a professor of communication, the author explores various arguments that are raised against and for the social media. The book will be instrumental in this research since it tackles the issues surrounding privacy apparent in the emerging age of social media. In particular, the first part of the book is dedicated in analyzing various aspects of privacy that the new media has touched on specifically, Facebook, Twitter and other platforms. The author also includes essays from various renowned authors such as Douglas Rushkoff as well as Todd Gitlin just to mention but two. The author also divides the book into various sections that will be very instrumental in unveiling the security and privacy issues raised by the book. For instance, the book has section name, ‘social and personal life’ that informs the research. In essence, the book is an important primary source of information that will help in approving or disapproving the thesis statement.
Bill, H., Reyns, W. & Fisher, B. (2011). Security in the 21st century: examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(1),251-153.
This scholarly article is important and critical as a primary source of information since it synthesizes information from three acclaimed authors and professors. The authors attempt to establish a correlation between contemporary social networks with privacy. The journal also seeks to examine the link between the social networks with interpersonal victimization. Throughout the journal, it is apparent from the inferences made by the authors that there is exists a correlation between social media and the manner in which people perceive their security. As such, the book will not only provide insightful information about new social networking sites but also how they may affect the public perspectives on security. As the authors posit, the social media has also led to privacy issues that do not affect the physical domain of the users but have unprecedented impact on the emotional and psychological aspects of the users. To that end, the journal answers the question, ‘Does social media raise privacy issues especially in the wake of 21st century?’
Gleibs, H. (2014). Turning Virtual Public Spaces into Laboratories: Thoughts on Conducting Online Field Studies Using Social Network Sites. Analyses of Social Issues and Public Policy, 1(1), 1-19.
Gleibs is a renowned author in the field of interpersonal communication. In this journal that provides information not only to public but also shapes the publi.
Unpacking the Social Media Phenomenon: Towards a Research AgendaIan McCarthy
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance the conceptualization of social media in public affairs research. Finally, we combine the individual research questions for each building block back into the honeycomb model to illustrate how the theories in combination provide a powerful macro-lens for research on social media dynamics.
Unpacking the social media phenomenon: towards a research agendaAndrey Markin
You can access PDF here http://busandadmin.uwinnipeg.ca/silvestrepdfs/PDF04.pdf
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and
offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using
a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through
appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance
the conceptualization of social media in public affairs research. Finally, we combine the individual research questions
for each building block back into the honeycomb model to illustrate how the theories in combination provide a
powerful macro-lens for research on social media dynamics
Demographics, Psychographics and the Uses and Gratifications Theory, Understa...ijtsrd
The issues of how the media affect people and what people do with the media have presented perennial and perplexing questions for communication scholars. Some of the research results in these areas are more controversial than useful. Uses and gratification studies straddle the two domains of media effects and people’s employment of the media. The field of gratification research holds great promise in the continual search for comprehensive knowledge on how and why we use the media. Drawing from a wide range of local and international literature, this paper presents a clear and concise review of the ontological, epistemological and axiological assumptions of the uses and gratifications theory. Paleowei, Zikena Cletus "Demographics, Psychographics and the Uses and Gratifications Theory, Understanding Text and Preferences" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd56314.pdf Paper URL: https://www.ijtsrd.com.com/humanities-and-the-arts/education/56314/demographics-psychographics-and-the-uses-and-gratifications-theory-understanding-text-and-preferences/paleowei-zikena-cletus
Chapter One MediaSociety in a Digital WorldNote Read the summ.docxtiffanyd4
Chapter One: Media/Society in a Digital World
Note: Read the summary below and click on all supplemental links as part of this lecture;the videos and articles provided will assist with your understanding of this chapter.
Key Questions:
1. How can we understand the importance of media in relationship to socialization, structure and agency?
2. How can a sociological lens help us understand the relationship between media and social context?
3. What roles do structure and agency play in our understanding of media culture?
Themes:
1.1 Definitions: Media vs. Medium & Interpersonal vs. Mass Media
1.2 Technology, Interactivity & Consumption
1.3 Cultural Experience & Socialization
1.4 Sociology: Social Relations, Structure & Agency
1.5 Model of Media
1.1 Definitions: Media vs. Medium & Interpersonal vs. Mass Media
Before we examine and critique the role(s) of media in our social world(s), it is essential to identify and narrow our scope by defining terms; after all, "media" is a term used very loosely in contemporary culture. As Croteau & Hoynes (2019) explain in your textbook , the term "media" is the PLURAL of medium and is derived from medius,which is the Latin term for "middle."
A helpful way to think about these concepts is that mediumsfacilitate communication between (are in the middle of) a sender and receiver; for example, television is a medium that facilitates programming from producers/creators/networks to audiences. Other mediums include radio, print, film, and the internet, and notices that they are both digital and non-digital (print).
The term "media" is the plural of these mediums, but is often used incorrectly; although it doesn't sound like correct grammar, the proper way (within the field of Media Studies) to use "media" in a sentence is "media are" not "media is." When individuals, including politicians, members of non-profits, etc. say "media is" and fail to recognize that the concept of "media" actually encompasses many different mediums with various logics, there is an assumption that all mediums function the same, include the same message, and follow the same regulations and economic structure. For example, when "the media" is blamed for violent action or political outcomes, there is a misunderstanding that needs to be refined; are we talking about film? Television? News media? Are we talking about the digital edition of the news? Are we talking about the Tweets that come from that news organization? In other words, it is important to be specific about mediums when making claims about impact, and when referring to "media" it is important to remember that this is a plural term.
Now, the next step in introductory terminology is to identify which media are "interpersonal" and which mediums are considered "mass" - this course focuses on "mass" media. Some of you may have taken Communications courses that focus more on interpersonal communication, which is one-to-one, includes a single known receiver, and is very interactive (.
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance the conceptualization of social media in public affairs research. Finally, we combine the individual research questions for each building block back into the honeycomb model to illustrate how the theories in combination provide a powerful macro-lens for research on social media dynamics.
Unpacking the social media phenomenon: towards a research agendaIan McCarthy
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance the conceptualization of social media in public affairs research. Finally, we combine the individual research questions for each building block back into the honeycomb model to illustrate how the theories in combination provide a powerful macro-lens for research on social media dynamics.
Social media? It's serious! Understanding the dark side of social mediaIan McCarthy
Research and practice have mostly focused on the “bright side” of social media, aiming to understand and help in leveraging the manifold opportunities afforded by this technology. However, it is increasingly observable that social media present enormous risks for individuals, communities, firms, and even for society as a whole. Examples for this “dark side” of social media include cyberbullying, addictive use, trolling, online witch hunts, fake news, and privacy abuse. In this article, we aim to illustrate the multidimensionality of the dark side of social media and describe the related various undesirable outcomes. To do this, we adapt the established social media honeycomb framework to explain the dark side implications of each of the seven functional building blocks: conversations, sharing, presence, relationships, reputation, groups, and identity. On the basis of these reflections, we present a number of avenues for future research, so as to facilitate a better understanding and use of social media.
A Comprehensive Study on Social Network Mental Disorders Detectionijtsrd
The explosive development in prominence of social networking prompts the problematic usage. An expanding number of social network mental scatters SNMDs, for example, Cyber Relationship Addiction, Information Overload, and Net Compulsion, have been as of late noted. Side effects of this psychological issue are typically watched inactively today, bringing about deferred clinical mediation. In this work, we contend that mining on the web social conduct gives a chance to effectively distinguish SNMDs at a beginning time. It is trying to identify SNMDs in light of the fact that the psychological status cant be straightforwardly seen from online social action logs. Our methodology, new and inventive to the act of SNMD location, doesnt depend on self uncovering of those psychological variables by means of surveys in Psychology. Rather, we propose an AI structure, in particular, Social Network Mental Disorder Detection SNMDD that endeavors highlights removed from social network information to precisely recognize potential instances of SNMDs. We likewise abuse multi source learning in SNMDD and propose another SNMD based Tensor Model STM to improve the exactness. To build the versatility of STM, we further improve the effectiveness with execution ensure. Tabeer Jan | Er. Vandana "A Comprehensive Study on Social Network Mental Disorders Detection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38529.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/38529/a-comprehensive-study-on-social-network-mental-disorders-detection/tabeer-jan
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
Contents lists available at ScienceDirectComputers in Huma.docxbobbywlane695641
Contents lists available at ScienceDirect
Computers in Human Behavior
journal homepage: www.elsevier.com/locate/comphumbeh
Full length article
Deindividuation effects on normative and informational social influence
within computer-mediated-communication
Serena Coppolino Perfumia,b,∗, Franco Bagnolic, Corrado Caudekd, Andrea Guazzinie
a Department of Sociology, Stockholm University, S-106 91, Stockholm, Sweden
bDepartment of Educational Sciences and Psychology, University of Florence, 50135, Florence, Italy
c Department of Physics and Astronomy and Center for the Study of Complex Dynamics (CSDC), University of Florence, 50019 Sesto Fiorentino, also INFN sec, Florence,
Italy
dDepartment of Neuroscience, Psychology, Drug Research and Children's Health (NEUROFARBA) – sect. Psychology, University of Florence, 50135, Florence, Italy
e Department of Educational Sciences and Psychology and Center for the Study of Complex Dynamics (CSDC), University of Florence, 50135, Florence, Italy
A R T I C L E I N F O
Keywords:
Social influence
Conformity
Computer-mediated-communication
Anonymity
Deindividuation
A B S T R A C T
Research on social influence shows that different patterns take place when this phenomenon happens within
computer-mediated-communication (CMC), if compared to face-to-face interaction. Informational social influ-
ence can still easily take place also by means of CMC, however normative influence seems to be more affected by
the environmental characteristics. Different authors have theorized that deindividuation nullifies the effects of
normative influence, but the Social Identity Model of Deindividuation Effects theorizes that users will conform
even when deindividuated, but only if social identity is made salient.
The two typologies of social influence have never been studied in comparison, therefore in our work, we
decided to create an online experiment to observe how the same variables affect them, and in particular how
deindividuation works in both cases. The 181 experimental subjects that took part, performed 3 tasks: one
aiming to elicit normative influence, and two semantic tasks created to test informational influence. Entropy has
been used as a mathematical assessment of information availability.
Our results show that normative influence becomes almost ineffective within CMC (1.4% of conformity) when
subjects are deindividuated.
Informational influence is generally more effective than normative influence within CMC (15–29% of con-
formity), but similarly to normative influence, it is inhibited by deindividuation.
1. Introduction
With the diffusion of social networking platforms, the social and
information seeking-related human behaviors have been affected by the
“new” environment. Information seeking increasingly takes place on
social media platforms, relying on what a users' contacts and followed
pages share (Zubiaga, Liakata, Procter, Hoi, & Tolmie, 2016).
Because of this filtering and selection, the users' knowl.
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance the conceptualization of social media in public affairs research. Finally, we combine the individual research questions for each building block back into the honeycomb model to illustrate how the theories in combination provide a powerful macro-lens for research on social media dynamics.
Unpacking the social media phenomenon: towards a research agendaIan McCarthy
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance the conceptualization of social media in public affairs research. Finally, we combine the individual research questions for each building block back into the honeycomb model to illustrate how the theories in combination provide a powerful macro-lens for research on social media dynamics.
Social media? It's serious! Understanding the dark side of social mediaIan McCarthy
Research and practice have mostly focused on the “bright side” of social media, aiming to understand and help in leveraging the manifold opportunities afforded by this technology. However, it is increasingly observable that social media present enormous risks for individuals, communities, firms, and even for society as a whole. Examples for this “dark side” of social media include cyberbullying, addictive use, trolling, online witch hunts, fake news, and privacy abuse. In this article, we aim to illustrate the multidimensionality of the dark side of social media and describe the related various undesirable outcomes. To do this, we adapt the established social media honeycomb framework to explain the dark side implications of each of the seven functional building blocks: conversations, sharing, presence, relationships, reputation, groups, and identity. On the basis of these reflections, we present a number of avenues for future research, so as to facilitate a better understanding and use of social media.
A Comprehensive Study on Social Network Mental Disorders Detectionijtsrd
The explosive development in prominence of social networking prompts the problematic usage. An expanding number of social network mental scatters SNMDs, for example, Cyber Relationship Addiction, Information Overload, and Net Compulsion, have been as of late noted. Side effects of this psychological issue are typically watched inactively today, bringing about deferred clinical mediation. In this work, we contend that mining on the web social conduct gives a chance to effectively distinguish SNMDs at a beginning time. It is trying to identify SNMDs in light of the fact that the psychological status cant be straightforwardly seen from online social action logs. Our methodology, new and inventive to the act of SNMD location, doesnt depend on self uncovering of those psychological variables by means of surveys in Psychology. Rather, we propose an AI structure, in particular, Social Network Mental Disorder Detection SNMDD that endeavors highlights removed from social network information to precisely recognize potential instances of SNMDs. We likewise abuse multi source learning in SNMDD and propose another SNMD based Tensor Model STM to improve the exactness. To build the versatility of STM, we further improve the effectiveness with execution ensure. Tabeer Jan | Er. Vandana "A Comprehensive Study on Social Network Mental Disorders Detection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38529.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/38529/a-comprehensive-study-on-social-network-mental-disorders-detection/tabeer-jan
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
Contents lists available at ScienceDirectComputers in Huma.docxbobbywlane695641
Contents lists available at ScienceDirect
Computers in Human Behavior
journal homepage: www.elsevier.com/locate/comphumbeh
Full length article
Deindividuation effects on normative and informational social influence
within computer-mediated-communication
Serena Coppolino Perfumia,b,∗, Franco Bagnolic, Corrado Caudekd, Andrea Guazzinie
a Department of Sociology, Stockholm University, S-106 91, Stockholm, Sweden
bDepartment of Educational Sciences and Psychology, University of Florence, 50135, Florence, Italy
c Department of Physics and Astronomy and Center for the Study of Complex Dynamics (CSDC), University of Florence, 50019 Sesto Fiorentino, also INFN sec, Florence,
Italy
dDepartment of Neuroscience, Psychology, Drug Research and Children's Health (NEUROFARBA) – sect. Psychology, University of Florence, 50135, Florence, Italy
e Department of Educational Sciences and Psychology and Center for the Study of Complex Dynamics (CSDC), University of Florence, 50135, Florence, Italy
A R T I C L E I N F O
Keywords:
Social influence
Conformity
Computer-mediated-communication
Anonymity
Deindividuation
A B S T R A C T
Research on social influence shows that different patterns take place when this phenomenon happens within
computer-mediated-communication (CMC), if compared to face-to-face interaction. Informational social influ-
ence can still easily take place also by means of CMC, however normative influence seems to be more affected by
the environmental characteristics. Different authors have theorized that deindividuation nullifies the effects of
normative influence, but the Social Identity Model of Deindividuation Effects theorizes that users will conform
even when deindividuated, but only if social identity is made salient.
The two typologies of social influence have never been studied in comparison, therefore in our work, we
decided to create an online experiment to observe how the same variables affect them, and in particular how
deindividuation works in both cases. The 181 experimental subjects that took part, performed 3 tasks: one
aiming to elicit normative influence, and two semantic tasks created to test informational influence. Entropy has
been used as a mathematical assessment of information availability.
Our results show that normative influence becomes almost ineffective within CMC (1.4% of conformity) when
subjects are deindividuated.
Informational influence is generally more effective than normative influence within CMC (15–29% of con-
formity), but similarly to normative influence, it is inhibited by deindividuation.
1. Introduction
With the diffusion of social networking platforms, the social and
information seeking-related human behaviors have been affected by the
“new” environment. Information seeking increasingly takes place on
social media platforms, relying on what a users' contacts and followed
pages share (Zubiaga, Liakata, Procter, Hoi, & Tolmie, 2016).
Because of this filtering and selection, the users' knowl.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
2. 1.INTRODUCTION
As early as 1993, Peter Steiner portrayed the concept of
online anonymity with his adage “On the Internet, nobody
knows you’re a dog.” The cartoon features two dogs, one of
them sitting on a chair in front of a computer and speaking
thecaptiontoaseconddogsittingonthefloorandlistening.
His cartoon marks a notable moment in the history of the
Internet and symbolizes a certain understanding of privacy
and personal identity on the web. You can hide your real
personality behind the screen and create a new identity.
Gender, age, looks—everything is up to you. Thus, facts
about one’s self may be true, but alternatively they can
be fabricated or exaggerated and used for legal or illegal
purposes (Morahan-Martin & Schumacher, 2000; Jordan,
2002). However, this has changed over time through the
privacy policies of some social networking services (SNSs)
(Krishnamurthy & Wills, 2009; Peddinti, Ross, & Cappos,
2014). These enforce a real-name policy that requires users
to reveal their legal name. On such SNSs, if we create an
account by adding a profile picture and name, we make
ourselves easily identifiable to others. Other SNSs omit this
principle as they do not have a real-name policy or do not
require creating a profile in general, for example, Yik Yak,
7 Cups, Blind, Jodel, and Whisper. A user can decide what
kind of SNSs he or she wants to use and for what purpose.
The recurring emergence of SNSs supporting anonymous
usage indicates the existing demand for such an option and
is a topic of contemporary importance (Zhang & Kizilcec,
2014; Peddinti et al., 2014; Scott & Orlikowski, 2014). It is
thereforeimportanttofindoutwhatarethepossiblemotives
to use anonymous or non-anonymous SNSs. Furthermore,
it is interesting to know whether there are any differences
in the use of such services depending on the different user
roles.
1.1.ResearchBackground
A popular approach to understanding mass
communication is the uses and gratifications theory
(U>) by Blumler and Katz (1974). This theory follows
the approach that people use media to satisfy their specific
needs in the form of gratifications. Based on Katz, Blumler,
and Gurevitch (1973) and Blumler and Katz (1974), the
theory places more focus on the audience instead of the
actual sender by asking “what people do with media” rather
than “what media does to people.” It assumes that members
of the audience are not passive, but take an active role in
interpreting and integrating media into their own lives
(McQuail, 1994). It is furthermore suggested that SNSs are
applied by users to satisfy their needs for self-presentation,
information, socialization, or entertainment. In this study
we are going to investigate whether the non-anonymous
and anonymous SNSs are being actively applied to meet
differentneedsoftheusers.
Usually there are three different ways of dealing with
social media: We produce (e.g., create a post), consume
(e.g., read a post), and participate (e.g., like or comment on
a post). Therefore, we take on different roles when using
SNSs, which leads to the theoretical constructs of different
user types: producers, participants, and consumers. Shao
(2009)assumesthateverygratificationisrelatedtoaspecific
user role. For example, content is produced to satisfy the
need for self-representation, it is consumed to satisfy the
craving for information and entertainment, and, finally,
usersparticipateinordertointeractsocially.
According to Zimmer, Scheibe, and Stock (2018), user
roles are not limited to a specific gratification type but each
rolemaybypursuedtoobtaindifferenttypesofgratification.
Thus, a consumer, producer, or participant can satisfy his or
her need for entertainment, information (Lee & Ma, 2012),
and self-representation, as well as socialization. In the role
of consumer, users act only passively in social media. They
listentoorwatchoccurrencesonsocialmediainordertobe
informed or entertained. In addition, a user can consume
social media in order to identify herself or himself with
other users as well as gain insights into the living conditions
of others. In the role of a producer, users actively contribute
to social media. They produce and send content on SNSs
to represent themselves. Also, a user can produce content
to inform or entertain others. In addition, a producer has
the opportunity to make new acquaintances by addressing
otherusers.Intheroleofaparticipant,userspartakeactively
in social media, but their input is not as extensive as the one
of the producers. Since they participate in events on social
media, they are simultaneously consumers. They comment
on, like, or share content with other users to maintain social
contacts and promote engaging topics through positive
feedback. Users can also participate to share or complete
their opinions about certain information. In addition, by
participating in SNSs, users can help others in their self-
expression (through, for example, likes or positive as well
as negative comments and ratings). The different roles that
users take on during their social media usage can lead to
obtaining different gratifications. Therefore, we are going
to examine whether user behavior changes with respect
to the role he or she assumes (i.e., consumer, producer, or
participant).
26
JISTaP Vol.6 No.3, 25-36
3. 1.2.ResearchQuestionsandObjectives
This study examines the impact of anonymity on the
behavior of users on Jodel compared to non-anonymous
usage of Instagram as well as the possible differences
between the different roles that the user can take on. We
formulatetworesearchquestions:
Whatarethedifferencesinsocialmediausagemotivation
onanonymousandnon-anonymousplatforms?
Does the social media usage behavior change when
consideringthedifferentusertypes(producers,participants,
andconsumers)?
As seen in Fig. 1, we distinguish two types of social media
usage, namely non-anonymous and anonymous. Non-
anonymous users are clearly identifiable by their real name
or pseudonym (including artist name). Anonymous (also
pseudo-anonymous) users are not identifiable. Pseudo-
anonymous users are users who have no visible identifier
or information that can be linked to them. However, this
does not mean that messages cannot be traced back to their
sources because a user’s identifier is available to service
providers or website administrators in the form of login ID’s
or IP addresses. It is not clear to other users who the real
person is because there is no name or image connected to
theprofile.
In a further step, we assign different roles to the users.
Here, a distinction is made between producers, consumers,
and participants. All users are consumers, users producing
content are producers, and users who react to posts in
the form of likes, votes, or comments are participants. We
assume that each user in each role applies social media to
obtain certain gratifications. Following U>, we selected
four gratification types: self-presentation, information,
socialization, and entertainment (Katz et al., 1973; Blumler
& Katz, 1974; McQuial, 1994; Zimmer et al., 2018). These
are needs that a user with a particular role wants to satisfy
by using anonymous or non-anonymous social media
platforms.
To target users of anonymous and non-anonymous social
media, we have chosen to study two mobile SNSs, namely
Jodel and Instagram. Instagram represents an SNS in which
users can be identifiable, whereas Jodel is an SNS where
users remain anonymous. These two services were chosen
because they are very successful as well as of high quality
(Nowak, Jüttner, & Baran, 2018; Scholl, 2015). They both
have a high number of active users and can therefore be
considered as suitable media for estimating a representative
mass.
Instagram is a free online sharing service for photos and
videos owned by Facebook Inc. It was developed in 2010
by Kevin Systrom and Mike Krieger. It is a combination of
a microblog and an audiovisual platform. When creating
a profile on Instagram, users can decide whether or not to
use a real name and profile picture. With 800 million active
users worldwide, Instagram is currently one of the most
popular social media platforms (Sheldon & Bryant, 2016).
We have chosen Instagram as an example of a platform that
can be applied by non-anonymous users characterized by a
highdegreeofidentifiability.
Jodel is an anonymous mobile social media application
that is mostly used by students. It was developed in 2014
by Alessio Borgmeyer in Aachen, Germany and quickly
became popular in German-speaking countries. The free
app allows users to send short messages that anyone in the
community can read. Those short messages may contain
jokes, opinions, questions, discussions, or (real-time) photos
and can be seen by community members who are located
within the radius of about ten kilometers. Each of these
so-called “Jodel” can be positively or negatively evaluated
Anonymousand
nonanonymous
useofsocialmedia
Userroles
Producer Consumer Participant
Gratificationtypes
Self-presentation Information Socialization Entertainment
Fig. 1. Our research model.
(a) (b)
Fig. 2. Post on Instagram (a) and posts on Jodel (b).
Anonymous and Non-anonymous User Behavior on Social Media
http://www.jistap.org
27
4. (applyingup-anddown-votes)andcommentedonbyother
community members situated nearby. The valuation is
ultimateandcannotbeundone.IfaJodelreceivesanegative
valuation of minus five, it is removed from the feed. The
community is self-regulating and decides independently
what it wants to see in the feed. One of Jodel’s features is
“Karma,” which is displayed in the top right corner of the
app (Thiele, 2015). According to the developers of Jodel, the
karma points indicate how much good has been done for
theJodelcommunitysofar.Jodel’suseisalwaysanonymous.
There are no friends or followers. It only counts who is
nearby (Nowak et al., 2018; Wielert, 2017). In general,
Jodel is similar to Yik Yak, a former successful anonymous
application which ceased operation in May 2017 (Kolodny,
2017). In Fig. 2 we can see an example of a post on
Instagram(lefthandside)andonJodel(righthandside).
2.RELATEDWORKS
Anonymity, even in the form of quasi-anonymity,
offers users a new way of communicating and expressing
themselves. Non-anonymous social media can put pressure
on users to manifest themselves as consistent, optimistic,
and competent all the time. If this is the case, our user
behaviorcanchangeassoonasweareanonymous.Another
possibility is that there is no behavioral change in the use of
social media and, thus, no difference between identifiable
andanonymoususage.
The fact that anonymity strongly influences people’s
behavior has long been established by socio-psychological
research. One of the most remarkable works was done by
Zimbardo (1969). In a series of experiments he found out
that people in an anonymous state develop a tendency
towards greater aggression and violence. Katzer (2016) also
indicates that the behavior of an individual changes when
in a group and that anonymity promotes this process of
deindividuation. Similar behavior can also be observed on
SNSs.Butdoweonlyuseanonymoussocialmediatosatisfy
ourneedforaggression,violence,andimmoralactions?
Several studies have shown how the state of anonymity
affects online behavior (Bernstein et al., 2011; Postmes,
Spears, & Lea, 1998; Seigfried-Spellar & Lankford, 2017;
Saveski, Chou, & Roy, 2016; Black, Mezzina, & Thompson,
2015; Wielert, 2017; Wodzicki, Schwämmlein, Cress, &
Kimmerle, 2011). Generally, they indicate that anonymity
can have both a positive as well as a negative effect on user
behavior. Negative influences include mob and antisocial
behaviors, which are triggered by the “online disinhibition
effect” (Suler, 2005). Disinhibition can also have a positive
effect on communities and their online behavior. For
example, anonymity can provide coverage for intimate and
open conversations. This is also stated by Peddinti et al.
(2014), who found a correlation between content sensitivity
and a user’s decision to be anonymous. Zhang and Kizilcec
(2014) state that anonymous sharing is a popular choice,
especially for controversial content. In addition, anonymity
can encourage experimentation with new ideas or memes.
Furthermore, under the mask of anonymity, failures (e.g.,
no reaction to threads) can be mitigated (Dibbell, 2010),
whereas identifiability preserves the memory of failure and
feelingsofbeingignoredforalongertime.Blacketal.(2015)
and Saveski et al. (2016) found no significant differences
in the usage behavior of anonymous and non-anonymous
users on social media with regard to the content of posts.
Only a slight increase in vulgarity usage was identified for
anonymoususers.
Seigfried-SpellarandLankford(2017)goonestepfurther,
not distinguishing between anonymous and identifiable
users, but focusing on individuals (posters, trolls, lurkers,
confessors) on the anonymous social media platform Yik
Yak. They suggest that there are differences in behavior in
terms of online environment and morality of individuals
who post, troll, confess, or passively lurk on anonymous
socialmedia.
So far no one has investigated how anonymity affects the
user behavior of consumers, producers, and participants,
also without reference to aggression, vulgarity, and violence.
When disregarding aggression, violence, and anti-social
or unrestrained behavior, is there a difference between
anonymous and non-anonymous producers, consumers,
and participants in terms of gratifications they seek when
usingasocialmediaplatform?
3.METHODS
To find out how anonymity affects user behavior in
terms of the four motivation categories (self-presentation,
information, socialization, and entertainment) and with
regard to the three user roles (consumers, participants,
and producers), a questionnaire for Jodel and Instagram
users was created. Since Jodel is most popular in German-
speaking countries, we restricted our investigation to
German-speaking users and created an online survey in
German(Fig.3).
First, we inquired whether the survey participant has
an Instagram and Jodel account. If the participant has an
28
JISTaP Vol.6 No.3, 25-36
5. account on both platforms, we asked for the durability and
the type of activity on each of them. In order to identify
the different user types, we asked how frequently a user
performs different actions on each platform (e.g., posting,
voting,orcommenting).
The following questions addressed the four motivation
categories of the U> adjusted to the three user types.
The first category, self-presentation, includes such factors
as identifying oneself with other users, presenting oneself,
or helping others in their self-presentation. The second
motivation category, information, covers the questions
whether the user distributes, receives, or complements
news and information. For the third category, socialization,
we asked if the user is on Instagram or Jodel to establish
contactsandwhethertheuserwantstogaininsightsintothe
lives of others. For the fourth category, entertainment, we
asked if the users apply the service to entertain themselves
or others and if they promote entertaining content. In order
to exclude anonymous Instagram users, we asked if the
user is registered with his or her real name on Instagram.
Subsequently, we asked about the user’s attitude towards
being anonymous on Instagram and Jodel, and how
he or she values anonymity. Finally, we collected socio-
demographic data (gender, birth year, and educational
background).
To adequately measure Jodel and Instagram usage
behavior of the survey participants we applied a 7-point
Likert scale for the responses. Likert (1932) developed the
principleofmeasuringattitudesbyaskingpeopletorespond
to a series of statements about a topic. The responses can be
marked on a 7-point scale where 1 stands for disagreement
and 7 for full agreement. This way it is possible to provide
a neutral response (4) as well as a precise evaluation of the
tendencyoftheanswers.
The online survey was distributed in the period from
October 31, 2017 to November 22, 2017 on various social
media channels such as Facebook, Jodel, and Instagram.
This ensured that both Instagram and Jodel users could
be reached. Since Jodel is a location-based service, we
artificially altered the location in order to distribute the
survey throughout Germany. We focused on cities with
universities or other institutions of higher education so
that we could reach a large amount of Jodel users (who
are usually students). Based on these criteria 40 cities were
selectedtodistributethesurveyviaJodel.
The collected data were not normally distributed
(Shapiro-Wilk test). Therefore, for the evaluation we
calculated median and the interquartile range for each
investigated aspect distinguished by the application (non-
anonymous Instagram and anonymous Jodel usage), user
type (consumer, participant, and producer) and motivation
category (information, self-presentation, entertainment,
and socialization). We applied the Wilcoxon signed-rank
test to investigate the differences between anonymous
and non-anonymous usage behavior. The test was
proposed by chemist and statistician Wilcoxon (1945)
and is a nonparametric statistical test that uses two paired
(dependent) samples to check the equality of the key trends
intheunderlyingpopulations.
To determine the different user types, we referred to the
posting, liking, or voting behavior. The consumer category
included all users of the respective social media. Producers
were the ones who generated content more than once a
week. Participants were those who responded to content
morethanonceaweek.Inordertoinvestigatethedifference
between sought gratifications while using an anonymous
andanon-anonymousplatform,weselecteduserswhowere
producers or participants on both platforms, Instagram and
Jodel, for the statistical analysis with Wilcoxon signed-rank
test.
I use Instagram, ...
Self-presentation *
The distance between two values is always the same.
to identify myself with other users.
to present myself.
to present myself or help others
representing themselves through likes or
positive/negative comments.
disagree
1 2 3 4 5 6
fully agree
7
Fig. 3. Sample question from the online survey (translated from German).
Anonymous and Non-anonymous User Behavior on Social Media
http://www.jistap.org
29
6. 4.RESULTS
Out of 746 respondents, 664 completed the questionnaire.
Out of these, 224 (33.8%) respondents were male, 420
(63.4%) female, and 16 (2.4%) of another gender. 4.5% of the
respondentswere14to17yearsold,71.3%oftherespondents
were in the age range of 18 to 24, 16.8% were 25 to 30 years
old, and 6.8% were more than 30 years old. We had 426
consumers on Instagram and 424 on Jodel. Participants
included 411 Instagram users and 422 Jodel users. The
producersincluded371Instagramusersand351Jodelusers.
Table 1 shows the medians and interquartile ranges
for consumers, producers, and participants regarding
the sought gratification categories of self-representation,
information, socialization, and entertainment while using
Instagram (not anonymous) and Jodel (anonymously).
For the gratification type socialization there is no result
for participants, because it could not be investigated. The
reason is the impracticability of anonymous participants to
stay in contact with friends. They are not able to recognize
their new or old friends, so they cannot be compared to
participantswhoareidentifiable.
Strong differences between anonymous and non-
anonymous social media usage are particularly noticeable
among participants who are motivated by information and
among producers who are motivated by entertainment and
self-presentation.Nearlyalldifferencesbetweenanonymous
and non-anonymous usage are statistically significant, with
the exception of socialization by producers. In the following,
we investigate the different gratification types for each user
rolemoreclosely.
TheresultsinFig.4showboxplotsfordifferentgratification
Table 1. Sought gratifications of identifiable (Instagram) and anonymous (Jodel) consumers, producers and participants
Consumer
(n=245)
Participant
(n=232)
Producer
(n=174)
Instagram Jodel
Siga)
Instagram Jodel
Siga)
Instagram Jodel Siga)
Median IQR Median IQR Median IQR Median IQR Median IQR Median IQR
Self-presentation 3 3 4 3 *** 3 3 3 4 * 4 3 2 2 ***
Information 5 2 6 1 ** 2 2 4 3 *** 3 3 4 3 ***
Socialization 5 2 4 3 *** NA NA NA NA NA 2 3 2 3 NSb)
Entertainment 6 2 7 1 *** 4 2 5 3.5 *** 2 4 4 3 ***
Likertscalefrom1(“donotagree”)to7(“fullyagree”).
IQR,interquartilerange;Sig,significanceofdifference;NA,notapplicable;NS,notsignificant.
*
P<0.05,**
P<0.01,***
P<0.001;a)
Wilcoxonranktest;b)
P>0.05.
2
3
4
5
6
7
1
Self-presentation
onInstagram
Self-presentation
onJodel
Informationon
Jodel
Socializationon
Jodel
Entertainment
onInstagram
Entertainment
onInstagram
Informationon
Instagram
Socializationon
Instagram
465
491
364
380
391
561
426
493
590
383
408
505
493
86
16
55
145
552
640
42
354
214
198
628
406
544
338
86
Likert
scale
values
Fig. 4. Sought gratifications of identifiable (Instagram) and anonymous (Jodel) consumers.
30
JISTaP Vol.6 No.3, 25-36
7. types distinguished between anonymous and identifiable
social media usage by consumers. Considering the
motivation category self-representation, consumers on the
anonymous platform are rather moderately motivated by
thisfactor(medianof4onthe7-pointLikertscale),whereas
on the non-anonymous platform (Instagram) the tendency
is rather negative (median of 3). As for the motivation
category information, consumers on both platforms seem
to be driven by this factor. The need for information is,
however, stronger when using Jodel (median amounts
to 6) than when using Instagram (median of 5). When
using Jodel, consumers are rather neutral regarding the
socialization (median of 4), while when applying Instagram
they have a slightly higher interest in the living conditions
and lifestyles of others (median of 5). Usage of both
platforms is strongly driven by the need for entertainment,
especially on Jodel where the median reaches the highest
possible value of 7. Still, the use of Instagram is also strongly
motivated by this factor (median of 6). All differences
between Jodel and Instagram usage are statistically
significant(atleastatthelevelP<0.01).
All in all, the results show clear differences in usage
behavior when using anonymous and non-anonymous
platforms. When being anonymous (Jodel), consumers
wanttoidentifythemselveswithothersandtheyseekagreat
deal of information and even more entertainment. While
being identifiable (Instagram), the consumers are more
likelytogratifytheirneedforsocialization.
The boxplots in Fig. 5 summarize the responses from
producers on the two investigated platforms. It can be
observed that producers do not apply media in which they
are anonymous to represent themselves; this is shown by
a very low median of 2 for Jodel. The non-anonymous
usage of Instagram is more motivated by this factor with
a median of 4, which is a rather neutral value, but the
highest one for usage of Instagram in the role of producer.
We observe that producers prefer not to use Instagram to
spread information or news (median of 3). They are more
neutral about this factor when applying Jodel (median of 4).
For the motivation category socialization both usage types
by the producers, anonymous as well as non-anonymous
ones, have a median of 2, meaning that producers do not
seek social relationships on either of the platforms. For
this motivation category there is no significant difference
betweenthetwousagetypes.
Itcanbeobservedthatproducersseekmoreentertainment
on the anonymous platform than on the non-anonymous
one (median of 4 for Jodel in contrast to median of 2 for
Instagram). Thus, anonymous producers tend to entertain
users more than while using a non-anonymous platform.
However, the interquartile range for Instagram is very high
(4), meaning that there are also producers who might be
slightly motivated by this factor, as there are many answers
in the spectrum between 1 and 5. Still, these results are very
surprising, especially regarding the behavior of producers
onnon-anonymousplatform.OnInstagram,theyarerather
“neutral” towards self-presentation, not very motivated by
information, and very negatively opposed to socialization
Likert
scale
values
2
3
4
5
6
7
1
Self-presentation
onInstagram
Self-presentation
onJodel
Informationon
Jodel
Socializationon
Jodel
Informationon
Instagram
Socializationon
Instagram
628
6
189
Entertainment
onInstagram
Entertainment
onInstagram
Fig. 5. Sought gratifications of identifiable (Instagram) and anonymous (Jodel) producers.
Anonymous and Non-anonymous User Behavior on Social Media
http://www.jistap.org
31
8. and entertainment. On Jodel they are neutral about
information and entertainment, whereas for entertainment
we can recognize a rather positive tendency (spectrum
between 3 and 6). Finally, there appears to be no seeking for
self-presentationandsocializationonthisplatform.
When analyzing the results for participants (Fig. 6), we
canrecognizethatthereareagainvisibledifferencesbetween
anonymous and non-anonymous usage. With a median of
2 (and interquartile range between 1 and 3), participants
on Instagram do not seem to want to spread or receive
information at all, while on Jodel they are more neutral
about it (median of 4 with a rather positive tendency).
Participants seem to be little interested in self-presentation
aswell,asmedianamountsof3forbothplatforms(however,
withamorepositivetendencyonJodel).Finally,participants
on Instagram are rather neutral regarding entertainment
(median of 4) while on Jodel they are more motivated by
thisfactor(medianof5).
Overall, participants are more likely to promote
entertainment on an anonymous platform as well as help
others in their self-representation and evaluate or comment
on information than on a non-anonymous one. Altogether
the differences between anonymous and non-anonymous
usagearesignificant.
The boxplots in Fig. 7 show the users’ attitudes towards
being anonymous on Instagram and Jodel. The differences
are according to Wilcoxon rank test significant (Table 2). As
expected,identifiableusersofInstagramhaveaneutralopinion
(median of 4) regarding being anonymous on this platform.
In contrast, they appreciate being anonymous on Jodel. The
median of 7 on the Likert scale represents an unambiguous
attitude. In contrast to the anonymous use of Jodel (median
of 6), when anonymously using Instagram, the users would
still not dare more when producing content or participating
in exchanges (median of 4). This could indicate that the
general type of social media platform—one being purely
anonymous (Jodel), the other enabling either anonymous or
non-anonymous usage (Instagram)—has an impact on user
behavior.Ingeneral,anonymityseemstoplayaminorroleon
Instagramand,logically,averyhighoneonJodel.
Likert
scale
values
2
3
4
5
6
7
1
Self-presentation
onInstagram
Self-presentation
onJodel
Entertainment
onInstagram
Informationon
Jodel
Informationon
Instagram
569
631
257
143
Entertainment
onInstagram
Fig. 6. Sought gratifications of identifiable (Instagram) and anonymous (Jodel) participants.
Table 2. Attitudes towards anonymity on Instagram and Jodel by non-anonymous Instagram users (n=132)
Instagram Jodel
Median IQR Median IQR Siga)
I(would)liketobeanonymouson… 4 3 7 1 ***
I(would)daremorewhen(Iwere)anonymouson… 4 3 6 2 ***
Likertscalefrom1(“donotagree”)to7(“fullyagree”).
IQR,interquartilerange;Sig,significanceofdifference.
***
P<0.001;a)
Wilcoxonranktest.
32
JISTaP Vol.6 No.3, 25-36
9. 5.DISCUSSION
Anonymity plays an increasingly important role on the
Internet and on social media in particular. There are more
and more applications that allow users to preserve their
anonymity. Such applications, like Jodel, are particularly
popular among students. Anonymity offers users new
opportunities to express themselves in a community and to
satisfy certain needs that one would suppress under other
circumstances.Therearealreadysomestudiesthatdealwith
anonymity on social media, but many questions remained
open. With our study we tried to close this research gap.
For this purpose we conducted an online survey and
determinedwhetherusersaremotivatedbydifferentaspects
when taking on different roles (as producers, consumers,
and participants) and whether this changes when using
anonymity-basedandnon-anonymity-basedplatforms.
Regarding the three user roles the output of the survey
shows that there are significant differences between
anonymous and identifiable usage. Consumers, when
being anonymous, seek for some self-presentation (i.e., they
try to identify themselves with others), as well as a large
amount of information and entertainment, while when
being identifiable they are looking for socialization (which is
doomed to be rather unsuccessful when being anonymous).
When being anonymous, the participants seek especially
more entertainment and some information, whereas when
being identifiable they are not interested in information at all,
but instead a little bit in entertainment. Producers seek more
information and entertainment when being anonymous,
and more self-presentation when being identifiable. Except
for socialization as a consumer and self-presentation as a
producer, in eight remaining cases the median values for
sought gratifications are either higher or at least the same
for anonymous usage (Jodel). Only for producers seeking
socialization is there no statistically significant difference
betweenanonymousandidentifiableusage.
Do users change their usage behavior when they are
anonymous? Previous studies showed that anonymity has
different influences on the (online) behavior of people.
Anonymity can promote negative behaviors such as
aggression, antisociality, and violence (Zimbardo, 1969;
Katzer, 2016; Suler, 2005) as well as positive behaviors
such as intimacy, openness, the promotion of ideas, and
concealment of failures (Peddinti et al., 2014; Zhang &
Kizilcec, 2014). Similarly, there are some studies that found
no significant differences between anonymity and non-
anonymity(Blacketal.,2015;Saveskietal.,2016).Theresults
of this study show that anonymous and non-anonymous
usage exhibit great significant differences for all user types.
There are two considerable differences between anonymous
and non-anonymous usage, where the difference of the
median values equals 2. The first one is given between
anonymous and non-anonymous usage by participants
who are seeking information. When being anonymous, the
participantstendtorateandcommentmoreoninformation
rather than when they are identifiable. The second major
difference is apparent between anonymous and non-
Likert
scale
values
2
3
4
5
6
7
1
Iwoulddaremoreif Iwere
anonymous(onInstagram)
Iwoulddaremoreif Iwere
anonymous(onJodel)
356
325
302
Iliketobeanonymouson
Instagram
Iliketobeanonymouson
Jodel
464
417
402
294
325
302
660
299 310
342
239
Fig. 7. Attitudes towards being anonymous on social media.
Anonymous and Non-anonymous User Behavior on Social Media
http://www.jistap.org
33
10. anonymous usage by producers seeking self-presentation.
When being identifiable, producers tend to post more
content in order to present themselves rather than when
being anonymous. This outcome is not surprising, since
when being anonymous one cannot present him or herself
to the fullest extent as it is possible on non-anonymous
platforms.
Especially for self-presentation there are (for all users) low
median values (of 4 or less). When being both, anonymous
or identifiable, users rarely use social media to represent
themselves or identify themselves with others. This result
is surprising, as self-presentation was often named as an
important motivational factor (Shao, 2009; Shang, Chen, &
Liao, 2006; Heinonen, 2011; Livingstone, 2008). However,
there are also studies which indicated the opposite.
Friedländer (2017), for instance, showed that only about
11 percent of all producers of social live streaming services
name self-expression as one of their motives to produce
content.AsforthelivestreamingplatformYouNow,Scheibe,
Zimmer, and Fietkiewicz (2017) identified 18 percent of
users applying this service because of self-presentation. As
for Instagram and Jodel, this motivational factor seems to
be barely relevant. Overall, users are more likely to consume
media, both anonymously and non-anonymously, rather
than produce content. This is in line with other research
results on social media; e.g., Scheibe, Fietkiewicz, and Stock
(2016) found for social live streaming services that about 60
percent of all users consume streams, but only 45 percent
producetheirowncontent.
Omitting aggressiveness, anti-social behavior, or violence,
and focusing on the motives self-presentation, information,
socialization, and entertainment, and considering different
user roles, it can be seen that anonymous and non-
anonymous usage more or less satisfies the needs for
entertainment through consuming as well as rating and
commenting (i.e., participating); however, not in producing
content on non-anonymous platform. Nearly all consumers
and participants seek entertainment on both platforms.
This is understandable, given the premise that users use
social media to entertain and distract themselves from
everyday life. Heinonen (2011) explains that entertainment
isunderstoodasanactfor“relaxationorescape.”
When on an anonymous platform, users prefer to stay
that way, whereas on non-anonymous ones they do not care
about anonymity. In addition, on an anonymous platform
usersdaremoretopostorcommentonandratecontent.On
a non-anonymous platform (Instagram), users would dare
more to post or respond to posts if they were anonymous,
though not to the same extent as they do on Jodel. Similar
results were also discovered by Wielert (2017), who found
that anonymity is of great importance to Jodel users,
especially with regard to creating posts. In the case of votes,
however,anonymitydoesnotplayasignificantrole.Thisisto
be expected, since posts are considered much more personal
statementsthanreviewsintheformoflikesorvotes.
In summary it can be said that both systems, anonymous
as well as non-anonymous ones, can be popular and
successful (Nowak et al., 2018; Scholl, 2015). This is mainly
due to the different user gratifications. As mentioned above,
this is especially noticeable for participants and consumers,
where the behavior between anonymous and non-
anonymous usage is very different. For system developers,
it would be interesting to implement a function allowing
users to switch between anonymity and identifiability. With
our results, the services can better estimate what form of use
they should provide to approach a specific type of potential
users. If they are looking for users who are supposed to rate
and comment on content, they should consider ensuring an
adequate level of privacy. In contrast, when their platform
is supposed to be built upon user-generated content and
evolve around the users themselves (self-presentation), they
should focus on producers who do not necessarily look for
anonymity,butpreferbeingidentifiable(and,thisway,being
able to personally receive appreciation for content they
created). This can be especially applicable to the so-called
influencers or micro-celebrities who, through an intensive
self-branding, create an “influential” online persona
(Fietkiewicz, Dorsch, Scheibe, Zimmer, & Stock, 2018) and
need to remain identifiable to their fans. This, however,
does not stand for content creation in the categories of
information or entertainment. Here, a good example of
successful platforms for producing information could be
Reddit, whereas for entertainment—the meme-sharing
platforms 4chan or 9gag. On all of them the users are not
required to reveal their identity and can publish content
anonymously.
6.LIMITATIONS AND OUTLOOK
Until now some studies have covered the aspect of
anonymity and non-anonymity regarding aggressiveness,
antisociality, and violence on social media. Shao (2009)
examined the adaptation of U> on social media with a
focus on self-representation, socialization, information, and
entertainment.Still,therewerenoresultscombiningbothof
theseaspectssofar.
Considering the median values for producers over
34
JISTaP Vol.6 No.3, 25-36
11. all gratification types, which is only neutral (4) or below
on the 7-point Likert scale, the question arises: What do
producers want on social media, especially when they are
not being anonymous? To better understand why non-
anonymous producers tend to act passively in terms of the
uses and gratifications of socialization, information, and
entertainment, while anonymous producers tend to be only
moderatelyactiveregardinginformationandentertainment,
their motivation needs to be investigated more closely.
Qualitative interviews should be an adequate method to
disclose the motives of producers. In addition, one could
change the consideration of the user groups in further
studies. This study looked at and evaluated users who use
both—Instagram and Jodel. To exclude the possibility of
usagepatternswhenusingbothsystems,onemightconsider
users who use only Jodel or only Instagram; however, not
both.
The limitations of our study concern the regional
distribution of the survey. Since Jodel is an app developed
in Germany, it is only well known in German speaking
countries. Our survey was therefore created in German to
reachthemajorityoftheusersofJodel.Thatalsomeansthat
the whole study, including the investigation of Instagram
usage, is limited to German speaking users. To conduct a
broader study it is necessary to design a survey in English
and distribute it in other countries. However, this would
poseanotherlimitation,namelythatusersinothercountries
might be unfamiliar with Jodel. Therefore, an alternative
to Jodel as a mobile app enabling solely anonymous usage
should be investigated. Or perhaps Jodel will become as
successful in the English-speaking world as formerly Yik
Yak, since the company is planning to expand into the USA
(Gruenderszene,2017).
REFERENCES
Bernstein, M. S., Monroy-Hernández, A., Harry, D., André,
P., Panovich, K., & Vargas, G. G. (2011). 4chan and/
b: An analysis of anonymity and ephemerality in a
large online community. In Proceedings of the Fifth
International AAAI Conference on Weblogs and Social
Media (pp. 50-57). Palo Alto, CA: Association for the
AdvancementofArtificialIntelligencePress.
Black, E. W., Mezzina, K., & Thompson, L. A. (2015).
Anonymous social media: Understanding the content
and context of Yik Yak. Computers in Human Behavior,
57,17-22.
Blumler,J.,&Katz,E.(1974).Theusesofmasscommunications:
Current perspectives on gratifications research. Beverly
Hills,CA:Sage.
Dibbell, J. (2010). Radical opacity. Technology Review,
113(5),82-86.
Fietkiewicz, K. J., Dorsch, I., Scheibe, K., Zimmer, F., &
Stock, W. G. (2018). Dreaming of stardom and money:
Micro-celebrities and influencers on live streaming
services. In G. Meiselwitz (Ed.). Social computing and
social media. User experience and behavior. SCSM
2018 (pp.240-253).Cham,Switzerland:Springer.
Friedländer, M. B. (2017). Streamer motives and user-
generated content on social live-streaming services.
Journal of Information Science Theory and Practice,
5(1),65-84.
Gruenderszene (2017). Studenten-App Jodel erhält sechs
Millionen: und will in die USA expandieren [Student
app Jodel receives six million: and wants to expand
into the US]. Retrieved Jun 30, 2018 from https://www.
gruenderszene.de/allgemein/jodel-studenten-app-usa-
millionen.
Heinonen, K. (2011). Consumer activity in social media:
Managerial approaches to consumers’ social media
behavior. Journal of Consumer Behavior, 10(6), 356-
364.
Jordan, T. (2002). Cyberpower: The culture and politics of
cyberspace and the Internet.NewYork,NY:Routledge.
Katz, E., Blumler, J. G., & Gurevitch, M. (1973). Uses and
gratificationsresearch.Public Opinion Quarterly,37(4),
509-523.
Katzer, C. (2016). Cyberpsychologie: Leben im Netz: Wie das
Internet uns verändert [Cyberpsychology: Life on the
Net: How the Internet changes us]. Munich, Germany:
DeutscherTaschenbuchVerlag.
Kolodny,L.(2017).Yik Yak shuts down after Square paid $1
million for its engineers. Retrieved Jun 30, 2018 from
https://techcrunch.com/2017/04/28/yik-yak-shuts-
down-after-square-paid-1-million-for-its-engineers/
Krishnamurthy, B., & Wills, C. E. (2009). On the leakage of
personally identifiable information via online social
networks. In Proceedings of the 2nd ACM Workshop
on Online Social Networks (pp. 7-12). New York, NY:
ACM.
Lee, C. S., & Ma, L. (2012). News sharing in social media:
The effect of gratifications and prior experience.
Computers in Human Behavior,28(2),331-339.
Likert, R. (1932). A technique for the measurement of
attitudes.Archives of Psychology,140,1-55.
Livingstone, S. (2008). Taking risky opportunities in
youthful content creation: Teenagers’ use of social
Anonymous and Non-anonymous User Behavior on Social Media
http://www.jistap.org
35
12. networking sites for intimacy, privacy and self-
expression.New Media & Society,10(3),393-411.
McQuail, D. (1994). Mass communication theory. London,
UK:Sage.
Morahan-Martin, J., & Schumacher, P. (2000). Incidence
and correlates of pathological internet use among
collegestudents.Computers in Human Behavior,16(1),
13-29.
Nowak,P.,Jüttner,K.,&Baran,K.S.(2018).Postingcontent,
collecting points, staying anonymous: An evaluation
of Jodel. In G. Meiselwitz (Ed.). Social computing
and social media. User experience and behavior. 10th
International Conference, SCSM 2018, Held as Part of
HCI International 2018 (pp. 67-86). Cham, Switzerland:
Springer.
Peddinti, S. T., Ross, K. W., & Cappos, J. (2014). On the
Internet, nobody knows you’re a dog: A Twitter case
study of anonymity in social networks. In Proceedings
of the Second ACM Conference on Online Social
Networks (pp.83-94).NewYork,NY:ACM.
Postmes, T., Spears, R., & Lea, M. (1998). Breaching or
building social boundaries? SIDE-effects of computer-
mediated communication. Communication Research,
25(6),689-715.
Saveski, M., Chou, S., & Roy, D. (2016). Tracking the Yak:
An empirical study of Yik Yak. In International AAAI
Conference on Web and Social Media (ICWSM)
(pp. 671-674). Palo Alto, CA: Association for the
AdvancementofArtificialIntelligencePress.
Scheibe, K., Fietkiewicz, K. J., & Stock, W. G. (2016).
Information behavior on social live streaming services.
Journal of Information Science Theory and Practice,
4(2),6-20.
Scheibe, K., Zimmer, F., & Fietkiewicz, K. (2017). Das
InformationsverhaltenvonStreamernundZuschauern
bei Social Live-Streaming Diensten am Fallbeispiel
YouNow [The information behavior of streamers and
viewers in social live streaming services in the case of
YouNow]. Information: Wissenschaft & Praxis, 68(5-
6),352-364.
Scholl, H. (2015). Instant profits guide to Instagram success.
Budapest:PublishDrive.
Scott, S. V., & Orlikowski, W. J. (2014). Entanglements in
practice: Performing anonymity through social media.
MIS Quarterly,38(3),873-893.
Seigfried-Spellar, K. C., & Lankford, C. M. (2017).
Personality and online environment factors differ
for posters, trolls, lurkers, and confessors on Yik Yak.
Personality and Individual Differences,124,54-56.
Shang, R. A., Chen, Y. C., & Liao, H. J. (2006). The value
of participation in virtual consumer communities on
brandloyalty.Internet Research,16(4),398-418.
Shao,G.(2009).Understandingtheappealofuser-generated
media: A uses and gratification perspective. Internet
Research,19(1),7-25.
Sheldon, P., & Bryant, K. (2016). Instagram: Motives for its
use and relationship to narcissism and contextual age.
Computers in Human Behavior,58,89-97.
Steiner, P. (1993). On the Internet, nobody knows you’re a
dog[Cartoon.]The New Yorker,69(20),61.
Suler, J. (2005). The online disinhibition effect. International
Journal of Applied Psychoanalytic Studies, 2(2), 184-
188.
Thiele, P. (2015). Jodel-App: Karma-Punkte. Das steckt
dahinter [Jodel App: Karma Points. That's behind it].
RetrievedJun30,2018fromhttps://praxistipps.chip.de/
jodel-app-karma-punkte-das-steckt-dahinter_43924
Wielert, E. (2017). Die Rolle von Anonymität und Lokalität
in einem sozialen Netzwerk am Beispiel von Jodel [The
role of anonymity and locality in a social network using
the example of Jodel] (Unpublished bachelors thesis).
Christian-Albrechts-UniversityKiel,Germany.
Wilcoxon, F. (1945). Individual comparisons by ranking
methods.Biometrics Bulletin,1(6),80-83.
Wodzicki, K., Schwämmlein, E., Cress, U., & Kimmerle,
J. (2011). Does the type of anonymity matter? The
impact of visualization on information sharing in
online groups. Cyberpsychology, Behavior, and Social
Networking,14(3),157-160.
Zhang, K., & Kizilcec, R. F. (2014). Anonymity in social
media: Effects of content controversiality and social
endorsement on sharing behavior. In International
AAAI Conference on Web and Social Media (ICWSM)
(pp. 643-646). Palo Alto, CA: Association for the
AdvancementofArtificialIntelligencePress.
Zimbardo, P. G. (1969). The human choice: Individuation,
reason, and order versus deindividuation, impulse, and
chaos. Nebraska Symposium on Motivation, 17, 237-
307.
Zimmer, F., Scheibe, K., & Stock, W. G. (2018). A model for
information behavior research on social live streaming
services(SLSSs).InG.Meiselwitz(Ed.).Socialcomputing
and social media: User experience and behavior. 10th
International Conference, SCSM 2018 (pp. 429-448).
Cham,Switzerland:Springer.
36
JISTaP Vol.6 No.3, 25-36