1. Computer-mediated communication theories have not evolved as quickly as the technologies they aim to explain.
2. Older theories focused on asynchronous and reduced-cue environments, but modern communication occurs across synchronous, visual, and networked platforms.
3. Understanding one's audience, both known and unknown, and how people selectively present themselves online, are now critical to developing updated theories of computer-mediated communication.
I would like to share here my ppt presentation of this SLA theory. It was hard finding and putting together the right materials or articles for my report but my Professor liked this final presentation^^ Through other presentations I found online, I somehow gained the idea on what and how to report it.
I hope this will also help other MALED students researching for this topic^^
Kindly inform me if I failed to cite other sources that you know or see. Thank you very much.
gender and language chapter 3 discourse definitions gendered discourse cofp
GEE
discourse
basic leveL discourse
linguistic discourse
sociolinguistic discourse
social and cultural discourse
definition of discourse
characteristics of discourse in language and gender
supporting discourse
competing discourse
relation
analysing
FPDA
FCDA
gendered discourse
gendered identity
feminist linguistics
community of practice
The social and cultural transformation and even social interaction that has been influenced by computer and internet is evident in the recent decade. The role played by the new media has increased and is always on the rise, transforming every single life that it touches effecting the individual, but sometimes it has positive and negative effects.
Computer Mediated Communication can simply be put as a transaction between two or more network computer like chartroom, emails, SNS (Social Networking Sites), text messages etc. This growing topic has been talked and argued by theorists and scholars Joseph Walther, Ramirez and Zhang, Denis McQuail, etc., and has been debated and many other scholars continue to debate and argue on CMC, its scope and reach on vast field in New Media. The following summary throws light on CMC
Code-switching is one of the phenomenon of language which occurs in societies to make the communication more effective and meaningful. But it has also some negative impacts.
Here, we have tried to present all things based on English and Bengali language.
I would like to share here my ppt presentation of this SLA theory. It was hard finding and putting together the right materials or articles for my report but my Professor liked this final presentation^^ Through other presentations I found online, I somehow gained the idea on what and how to report it.
I hope this will also help other MALED students researching for this topic^^
Kindly inform me if I failed to cite other sources that you know or see. Thank you very much.
gender and language chapter 3 discourse definitions gendered discourse cofp
GEE
discourse
basic leveL discourse
linguistic discourse
sociolinguistic discourse
social and cultural discourse
definition of discourse
characteristics of discourse in language and gender
supporting discourse
competing discourse
relation
analysing
FPDA
FCDA
gendered discourse
gendered identity
feminist linguistics
community of practice
The social and cultural transformation and even social interaction that has been influenced by computer and internet is evident in the recent decade. The role played by the new media has increased and is always on the rise, transforming every single life that it touches effecting the individual, but sometimes it has positive and negative effects.
Computer Mediated Communication can simply be put as a transaction between two or more network computer like chartroom, emails, SNS (Social Networking Sites), text messages etc. This growing topic has been talked and argued by theorists and scholars Joseph Walther, Ramirez and Zhang, Denis McQuail, etc., and has been debated and many other scholars continue to debate and argue on CMC, its scope and reach on vast field in New Media. The following summary throws light on CMC
Code-switching is one of the phenomenon of language which occurs in societies to make the communication more effective and meaningful. But it has also some negative impacts.
Here, we have tried to present all things based on English and Bengali language.
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
Strata Conference
New York
September 23, 2011
http://strataconf.com/stratany2011/public/schedule/detail/21484
http://youtu.be/PKUI9iz0l9g
The first generation of chief privacy officers were typically attorneys, charged with the formulation and enforcement of privacy policies. Times have changed. Given the speed and complexity of technology, the privacy policy is necessary but hardly sufficient. Because we live much of our lives in public, both online and offline, the Internet is transforming the anonymity of our cities into the familiarity of small towns. Privacy is deeply ingrained within the technology that manages this personal data. The products and services driving this transformation must consider privacy from the earliest design sessions.
Today’s engineer CPO, and I’m one, must deeply involve themselves with the technology and product design process to bake-in privacy. This new breed of CPO is comfortable in an engineering scrum, product focus group, reviewing pending regulations, or analyzing A/B test results. They have the historical awareness, frontier spirit, regulatory caution, technical chops, and innovator’s curiosity to work through the toughest data issues. The promise of the engineer CPO is that products, not only safeguard privacy, but compete on it.
Managing Privacy and Context Collapse in the Facebook AgeJessica Vitak
The growth of social media—online sites driven by the public sharing on personal information with a wide audience—raises new questions related to how individuals manage their privacy and self-presentation. The technical features of sites such as Facebook, Google Plus, and Twitter lower the transaction costs of connecting and interacting with a large and diverse audience. At the same time, they may raise the costs of managing self-presentation across different contexts and ensuring that private information is not shared with unintended audiences.
Discussions related to self-presentation and privacy have featured prominently in the social sciences for more than half a century. For example, Goffman (1959) argued that individuals’ self-presentation varies based on the audience for whom they are performing. Likewise, Altman (1975) viewed privacy not as a static process, but one of dynamic boundary regulation, in which individuals make decisions regarding which pieces of personal information to share with whom, as well as the context in which that information is disclosed.
In online social networking communities, additional social and technical features make the process of managing privacy and self-presentation more complicated. Unlike anonymous forums, where users can create virtual identities not connected to their “real” selves, SNSs are tied to real identities, and because users often share a significant amount of personal information through these sites (Nosko et al., 2010), privacy becomes a critical element to determining both who to connect with and what to disclose. Boyd (2008) characterizes SNSs as
“networked publics,” and describes three features that differentiate them from other publics: invisible audiences, context collapse, and the blurring of public and private. Each of these factors is critical in evaluating how individuals can regulate boundaries and get the most out of their use of these sites.
Context collapse—the flattening of multiple distinct audiences into a homogeneous group—offers benefits and barriers to individuals. The average American adult has 229 Facebook “friends” (Hampton et al., 2011) who comprise a variety of personal and professional contexts. While Facebook enables users to quickly diffuse information across their entire network, communicating with such a diverse set of others through the same channel (e.g., status updates) may become problematic when it prevents individuals from varying their self-presentation for different audiences or when their full audience is unclear.
When facing these challenges, individuals have a number of options. Bernie Hogan (2010) suggests that users employ a “lowest common denominator” approach, whereby only content appropriate for all audiences is shared on the site. On the other hand, users may employ advanced privacy settings to segregate audiences, so they can still share relevant content with their various connections.
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
Presented at CHI 2013
When you share content in an online social network, who is listening? Users have scarce information about who actually sees their content, making their audience seem invisible and difficult to estimate. However, understanding this invisible audience can impact both science and design, since perceived audiences influence content production and self-presentation online. In this paper, we combine survey and large-scale log data to examine how well users’ perceptions of their audience match their actual audience on Facebook. We find that social media users consistently underestimate their audience size for their posts, guessing that their audience is just 27% of its true size. Qualitative coding of survey responses reveals folk theories that attempt to reverse-engineer audience size using feedback and friend count, though none of these approaches are particularly accurate. We analyze audience
logs for 222,000 Facebook users’ posts over the course of one month and find that publicly visible signals — friend count, likes, and comments — vary widely and do not strongly indicate the audience of a single post. Despite the variation, users typically reach 61% of their friends each month. Together, our results begin to reveal the invisible undercurrents of audience attention and behavior in online social networks.
CSJournalism Digital Communication specialists Noah Echols and Clay Duda presentation about transparency vs. anonymity on the Internet at Geekend 2011 in Savannah, Ga.
Novemeber 12, 2011.
Mark Zuckerberg, founder of Facebook, argues for complete transparency (thus accountability) on the Internet. Christopher "Moot" Poole, founder of the image message board 4Chan, argues for the anonymity and the freedom it brings.
Both perspectives affect how we interact and communicate online, and increasingly within the world around us as our culture becomes more and more tech-saturated.
In this presentation Echols and Duda examine each arguments and the respective founder's real-world actions within the historical context of communication and interpersonal studies.
How has context collapse reshaped the way you communicate? Are you aware of the shift?
The scope and trends of Organizations have been chaged after the emergence of Technological Revolution. It has changed our culture and social order. This Presentation is related to the Technologically Mediated Communication in organizations...
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
Introduzione al corso per gli studenti delle Lauree Magistrali di Comunicazione Pubblica e Politica e Comunicazione ICT e Media - Università degli Studi di Torino http://goo.gl/B6vE6M
Perhaps we are all speaking English but men and women do it just a little bit differently. Find out what words are used more often by men or women and see how you fit the stereotype.
This presentation is about my MSc research relating to the way that multiple groups of acquaintances on social networking sites, such as Facebook, can create environments ripe for context collapse - untailored identity performances to unintended audiences. More info here: http://stefanieduguay.com/?page_id=595
Dr Claire Seamen - Social Media and Communities: Multi-Rational Approaches to Linking Public Services, Businesses and Families pp. 1- 18.
Dr Ian Elliot - Social media & #PublicServices pp. 19 - 30.
In this session, we talk about the mobile and social web, and how it shapes economy, individual behavior and well-being, political events, and society as a whole.
Presentazione di Paolo Massa nell'ambito del Seminario residenziale “L’approccio territoriale tra aiuto e crescita” - 22-23 giugno 2012 - Villa Flangini - Asolo - Organizzato dal SerAT (Servizio Alcologia e Tabagismo Ulss 8)
Con il contributo di ACAT-ULSS 8 onlus e Cooperativa Sonda. Con il patrocinio di Alcologia Ecologica
Rethinking Learning in the Age of Digital FluencyJudy O'Connell
Digital connectivity is a transformative phenomenon of the 21st century. While many have debated its impact on society, educators have been quick to mandate technology in school development - often without analysing the digital fluency of those involved, and the actual impact on learning. Is being digitally tethered creating a new learning nexus for those involved?
In order for the internet to play a greater role as an instrument for social and personal empowerment, we need to understand what the everyday life of an individual belonging to a minority or marginalized community encompasses. Such an approach calls for closer examination of the practices, system of relations and context of particular minority and marginalized users in order to figure out what is meaningful to them and how they use (or do not use) different forms of the internet for meeting their objectives. There is a need to acknowledge the multiple conceptualizations and forms of internet use as disadvantaged users apply these differently for meeting specific agendas.
This article presented three projects working with minority and marginalized users. In the context of future research on internet use, three broad sets of variables are closely connected and require careful attention:
• The type of marginalized group;
• The goals, expectations and identification of what particular marginalized users consider to be meaningful in their everyday life; and
• The selected method of research.
How Social Networking is Changing How We Collaborate and Share InformationLynn Reyes
The "social" factor in the way things really work and how we might think about it from discovery, strategic planning and design, execution, measurement and management.
Presentation made at the Convurge Conference in June 2007.
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
Over a billion and a half people signed up for Facebook. This site the most used site for people when using the Internet. People are not watching TV so much anymore - they using Facebook, Youtube and Netflix and number of popular web sites.
Some people denote their time working for others online. What drives people to write an article on Wikipedia? They don´t get paid. Companies are enlisting people to help with innovations and sites such as Galaxy Zoo ask people to help identifying images. And why do people have to film themselves singing when they cannot sing and post the video on Youtube?
In this lecture we talk about how people are using the web to interact in new ways, and doing stuff.
The social networks and the new social order between the individualized socia...INFOGAIN PUBLICATION
The new Social Networks (SN) evolved very quickly. They conquered of wide population as well in the cities as in the campaigns. They pushed aside values, attitudes, behavior…; In countries with strong social culture, they modified these values and modified the social rules formerly considered as unchanging.In this paper, an empirical study concerned the case of the Moroccans and their behavior with regard to the social networks in numerous domains as those of society, economy, consumption, social and societal relationships, information and communication, politics, etc. The traditional conventional social order is today in deep transformation. This paper contributes to the understanding of behavior change currently facing Moroccan society at all levels.The designers of software or applications bound to the social networks have to integrate these new behavior in their strategies.
CSCW 2016: Beyond the Belmont PrinciplesJessica Vitak
Pervasive information streams that document people and their routines have been a boon to social computing research. But the ethics of collecting and analyzing available—but potentially sensitive—online data present challenges to researchers. In response to increasing public and scholarly debate over the ethics of online data research, this paper analyzes the current state of practice among researchers using online data. Qualitative and quantitative responses from a survey of 263 online data researchers document beliefs and practices around which social computing researchers are converging, as well as areas of ongoing disagreement. The survey also reveals that these disagreements are not correlated with disciplinary, methodological, or workplace affiliations. The paper concludes by reflecting on changing ethical practices in the digital age, and discusses a set of emergent best practices for ethical social computing research.
Leveraging Your Audience Through Social MediaJessica Vitak
Presentation at the University of Maryland's Women's Studies Summer Technology Institute (#wmststi) on the powerful role of social media and other sites in creating an online brand and locating & disseminating information.
Leveraging Your Audience Through Social Media Jessica Vitak
Presentation at the University of Maryland's Women's Studies Summer Technology Institute (#wmststi) on the powerful role of social media and other sites in creating an online brand and locating & disseminating information.
Connecting in the Facebook Age: Development and Validation of a New Measure o...Jessica Vitak
Presentation of ICA paper, "Connecting in the Facebook Age: Development and Validation of a New Measure of Relationship Maintenance." This presentation includes details from additional validity and reliability testing using confirmatory factor analysis.
Link to paper: http://vitak.files.wordpress.com/2009/02/ica2014-relmaintenance-toshare.pdf
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
I’ve spent my career so far studying the social outcomes people derive from their use of new communication systems like Facebook. These sites contain numerous affordances that differentiate them from other forms of communication & create low-cost environments for things like relationship maintenance and exchange of resources. I have found this research to be extremely rewarding, as it is important to understand how these social systems extend our capabilities for human interaction, beyond the more traditional forms of communication we have relied on previously.
But, there's a flip side to this story. Humans, by nature, are very social beings and want to interact, want to disclose information and share it with others. Social network sites and their like facilitate this through a variety of features. However, as individuals have moved their communication from offline spaces, where the interactions tend to be much more ephemeral and audiences are generally known, to online spaces, where the lines between public and private become much more blurred, I believe that thoughts of privacy of personal information are often lost in the novelty of the technologies. Now, as we begin to think about this issue more and more, I believe it’s time to step back and re-evaluate how we conceptualize our privacy in this highly networked world and to integrate that understanding into solutions that will help individuals become more savvy users of the technology.
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...Jessica Vitak
Read the paper here: http://vitak.files.wordpress.com/2009/02/vitak-cscw2014-distance.pdf
Abstract: The increasing ubiquity of information and communication technologies has dramatically impacted interpersonal communication and relationship maintenance processes. These technologies remove temporal and spatial constraints, enabling communication at a distance for low to no physical costs. Research has established that technologies such as email supplement other forms of communication in relationship maintenance, but to what extent do newer technologies—which contain a unique set of affordances—facilitate these processes? Furthermore, do SNS users engage in different practices through the site and obtain different relational benefits based on specific characteristics of the tie? Findings from a survey of adult Facebook users (N=415) indicate that geographically distant Facebook Friends, as well as those who rely on the site as their primary form of communication, engage in relationship maintenance strategies through the site to a greater extent and perceive the site to have a more positive impact on the quality of their relationships.
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Jessica Vitak
Although Facebook is the largest social network site in the U.S. and attracts an increasingly diverse userbase, some individuals have chosen not to join the site. Using survey data collected from a sample of non-academic staff at a large Midwestern university (N=614), we explore the demographic and cognitive factors that predict whether a person chooses to join Facebook. We find that older adults and those with higher perceived levels of bonding social capital are less likely to use the site. Analyzing open-ended responses from non-users, we find that they express concerns about privacy, context collapse, limited time, and channel effects in deciding to not adopt Facebook. Finally, we compare non-adopters against users who differ on three dimensions of use. We find that light users often have social capital outcomes similar to, or worse than, non-users, and that heavy users report higher perceived bridging and bonding social capital than either group.
To view the paper: http://vitak.files.wordpress.com/2009/02/lampe_vitak_ellison-2013-cscw.pdf
Social Media: Where We Stand, Where We’re HeadingJessica Vitak
Guest lecture at Elon University on 10/19/12 in COM 371, The Future of the Internet, talking about social media research and thoughts on where social media is heading in the coming years.
Social Support and Information-Sharing on Facebook by Adult UsersJessica Vitak
These slides are from a presentation at the National Communication Association annual conference on November 16, 2010 in San Francisco. The presentation summarizes findings from a qualitative study of adult Facebook users and focuses on two key constructs of social capital: social support and information-seeking.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Theorizing the Future of Computer-Mediated Communication: The Changing Role of Self-Presentation, Audience, and Interaction
1. Theorizing the Future of Computer-Mediated Communication: The Changing Role of Self-Presentation, Audience, and Interaction Jessica Vitak | @jvitak Michigan State University Theorizing the Web | April 9, 2011
2. Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 2 Jessica Vitak | Theorizing the Web | April 9, 2011
3. CMC is as old as the Internet 3 Usenet (1979) Best-known and widely researched online discussion forum. Newsgroups for every topic imaginable. See Baym (1998) & Donath (1999) for examples of research using Usenet. Jessica Vitak | Theorizing the Web | April 9, 2011
4. CMC is as old as the Internet 4 The WELL (1985) Became widely known through Howard Rheingold’s book, “The Virtual Community” Strong geographic component. Highlighted the modality-switching capabilities of the Internet. Jessica Vitak | Theorizing the Web | April 9, 2011
5. CMC is as old as the Internet 5 AOL connected millions of people to the Internet and served as both an ISP and as a homebase for establishing an online identity. AOL Chat Rooms enabled large-group pseuodonymous, synchronous interactions. AIM (1996) enabled synchronous one-to-one interactions. Jessica Vitak | Theorizing the Web | April 9, 2011
7. CMC is as old as the Internet 7 Online dating sites serve a very specific purpose: finding someone to date (casually or seriously) Modality switching. Static profiles asynchronous communication synchronouscommunication face-to-face meetings. See Ellison, Gibbs & Heino’s (2006) research for more. Jessica Vitak | Theorizing the Web | April 9, 2011
8. CMC is as old as the Internet 8 Boyd and Ellison (2007) define SNSs as “web-based services that allow individuals to: (1) construct a public or semi-public profile within a bounded system; (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system.” Jessica Vitak | Theorizing the Web | April 9, 2011
9. Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 9 Jessica Vitak | Theorizing the Web | April 9, 2011
10. Theories of CMC 10 Cues-filtered-out approach (Culnan & Markus, 1987) Dominant in 1980s and into the 1990s CMC is impersonal; less social/personal; leaner than in-person interactions "CMC, because of its lack of audio or video cues, will be perceived as impersonal and lacking in normative reinforcement, so there will be less socioemotional content exchanged" (Rice & Love, 1987). < Jessica Vitak | Theorizing the Web | April 9, 2011
11. Theories of CMC 11 Social Information Processing (SIP) Theory (Walther, 1992) Direct response to cues filtered out approach. Relationships can and do form online, albeit at a slower rate than in face-to-face environments. = Jessica Vitak | Theorizing the Web | April 9, 2011
12. Theories of CMC 12 Hyperpersonal Model (Walther, 1996) Sometimes, the unique affordances of CMC allow individuals to develop develop relationships that are “more socially desirable than we tend to experience in parallel FtFinteraction” (p. 17). Role of sender, receiver, channel, and feedback. > Jessica Vitak | Theorizing the Web | April 9, 2011
13. Theories of CMC 13 Social Identity Model of Deindividuation Effects (SIDE; Reicher, Spears, & Postmes, 1995 ) In deindividuated/depersonalized settings, individual identity is submerged into the group identity. We identify with the “in group” and disassociate with the “outgroup.” ✔ Jessica Vitak | Theorizing the Web | April 9, 2011
14. Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 14 Jessica Vitak | Theorizing the Web | April 9, 2011
15. Evolution of CMC 15 CMC’s early features: Asynchronous Examples: Email, discussion forums Benefits: Allows user to carefully compose and edit messages prior to sending. Drawbacks: limited/no real-time interactions slowed down processes (2) Reduced-cues environment Examples: any text-only online interaction Benefits: selective self-presentation, identity play Drawbacks: No visual cues misinterpretations of messages, deception Theories of CMC are based off of these properties. Jessica Vitak | Theorizing the Web | April 9, 2011
16. Evolution of CMC 16 CMC in 2011 is: (1) Highly interactive (2) Highly visual (3) Synchronous, near synchronous, and asynchronous communication (4) Interactions are with FRIENDS, not strangers Jessica Vitak | Theorizing the Web | April 9, 2011
17. The Problem 17 CMC has changed… BUT the theories that attempt to predict, explain, and control it have not. Jessica Vitak | Theorizing the Web | April 9, 2011
19. Enter my research… 19 What do we study? The relationship between Facebook use and social capital: We have found that various measures of Facebook use, including FBI (Ellison et al., 2007), actual friends on the site (Ellison et al., in press), connection strategies (Ellison et al., in press), and engagement in reciprocal communication (Vitak et al., 2011) predict perceptions of social capital. But this only tells part of the story. Jessica Vitak | Theorizing the Web | April 9, 2011
20. Enter my research… 20 Problems with this research: Atheoretical? Does not account for two inter-related and critical components of SNS use: -- Audience -- Self-Presentation (a la disclosures) Jessica Vitak | Theorizing the Web | April 9, 2011
21. What’s audience got to do with it? 21 danahboyd (2008) identified three dynamics that differentiate networked publics from traditional publics: invisible audiences context collapse blurring of public and private Jessica Vitak | Theorizing the Web | April 9, 2011
22. Selective Self-Presentation via CMC 22 Goffman’s (1959) dramaturgical approach: … a performer tends to conceal or underplay those activities, facts, and motives which are incompatible with an idealized version of himself… a performer often engenders in his audience the belief that he is related to them in a more ideal way than is always the case (p. 48). Hyperpersonal Model (Walther, 1996): senders engage in selective self-presentations // receivers idealize the sender // behavioral confirmation through feedback So how do we selectively self-present on SNSs? Jessica Vitak | Theorizing the Web | April 9, 2011
26. 24 Communication Channels on SNSs Public: Status Updates, Comments, Likes, Posting Photos, Sharing Links Private: Messages, Chat, Filtering Posts with privacy settings Jessica Vitak | Theorizing the Web | April 9, 2011
27. Blurring of Public and Private 25 Marwick and boyd (2011): “We may understand that the Twitter or Facebook audience is potentially limitless, but we often act as if it were bounded.” But Facebook is just my friends! Technical features enable sharing of “private” information far beyond your articulated network. Jessica Vitak | Theorizing the Web | April 9, 2011
47. 39 Thanks! Twitter: Email: @jvitakvitakjes@msu.edu Website: http://vitak.wordpress.com Jessica Vitak | Theorizing the Web | April 9, 2011
Editor's Notes
Usenet created in 1979 by some Duke students : users post messages to newsgroups; no central server rather it is distributed across a large number of more localized servers.Baym studied a soap opera form, focused on norms guiding site useDonath focused broadly on identity and deception online (signaling theory), used Usenet as the example.
Started in San Fran in 1985.See Rheingold’s website for links to early meetups.
Commercials tell us 1 in 5 relationships begin on an online dating website.
Some interesting points: Ellison et al. found that people are not really using SNSs to develop new relationships but to reconnect and maintain existing relationships. One exception to this could be when it comes to SNGs (our research).Donath & boyd (2004) suggest that displaying a connection with another user signals one’s willingness to risk their reputation. Mutual connections help place an individual within a larger network and can help establish common ground.
Rooted in social presence theory andmedia richness
CFO effects are limited to a narrow range of experiences, specifically zero-history, one-shot interactions.
message features—including the ability to edit messages before sending, minimize cue leakage, and reallocate cognitive resources—allow individuals to more thoroughly engage in selective self-presentation
Note that this is a bit of an oversimplification of what is going on but at a high level holds true.For example, researchers have expanded on the hyperpersonal model to include visual cues and synchronous communication, but all of these theories are about impression formation rather than relationship maintenance and impression management.
Some would argue that while we apply the social capital framework, it is not a theory. Others argue that social capital is recursive, that it includes everything and therefore it includes nothing.
Talk about these inter-relatedly
Sites like Lamebook and Failbooking aggregate pictures and updates that may have been marked as “private” but were copied by a friend and submitted to the site.
http://gawker.com/#!321802/your-privacy-is-an-illusion/bank-intern-busted-by-facebookKevin Colvin, an intern at Anglo Irish Bank's North American arm got into trouble after he got caught in a lie on Facebook.
Talk about social capital research, how we see this relationship as a weighing of risks and benefits. Could bring in lowest-common-denominator approach, but point to problems inherent in that.
Talk about social capital research, how we see this relationship as a weighing of risks and benefits. Could bring in lowest-common-denominator approach, but point to problems inherent in that.
Talk about social capital research, how we see this relationship as a weighing of risks and benefits. Could bring in lowest-common-denominator approach, but point to problems inherent in that.
Inputs: time, effort, loyalty, hard work, commitment, ability, flexibility, toleranceOutcomes: Sense of achievement, praise, recognition, reputation, social support