SlideShare una empresa de Scribd logo
1 de 39
Theorizing the Future of Computer-Mediated Communication: The Changing Role of Self-Presentation, Audience, and Interaction  Jessica Vitak  |  @jvitak Michigan State University Theorizing the Web | April 9, 2011
Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 2 Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
CMC is as old as the Internet 3 Usenet (1979) Best-known and widely researched online discussion forum. Newsgroups for every topic imaginable. See Baym (1998) & Donath (1999) for examples of research using Usenet.  Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
CMC is as old as the Internet 4 The WELL (1985) Became widely known through Howard Rheingold’s book, “The Virtual Community” Strong geographic component.  Highlighted the modality-switching capabilities of the Internet. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
CMC is as old as the Internet 5 AOL connected millions of people to the Internet and served as both an ISP and as a homebase for establishing an online identity. AOL Chat Rooms enabled large-group pseuodonymous, synchronous interactions. AIM (1996) enabled synchronous one-to-one interactions. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
6
CMC is as old as the Internet 7 Online dating sites serve a very specific purpose: finding someone to date (casually or seriously)  Modality switching.  Static profiles  asynchronous communication  synchronouscommunication  face-to-face meetings.  See Ellison, Gibbs & Heino’s (2006) research for more. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
CMC is as old as the Internet 8 Boyd and Ellison (2007) define SNSs as “web-based services that allow individuals to:  	(1) construct a public or semi-public profile within a bounded system; 	(2) articulate a list of other users with whom they share a connection, and  	(3) view and traverse their list of connections and those made by others within the system.” Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 9 Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Theories of CMC 10 Cues-filtered-out approach (Culnan & Markus, 1987) Dominant in 1980s and into the 1990s CMC is impersonal; less social/personal; leaner than in-person interactions "CMC, because of its lack of audio or video cues, will be perceived as impersonal and lacking in normative reinforcement, so there will be less socioemotional content exchanged" (Rice & Love, 1987). < Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Theories of CMC 11 Social Information Processing (SIP) Theory (Walther, 1992) Direct response to cues filtered out approach.  Relationships can and do form online, albeit at a slower rate than in face-to-face environments. = Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Theories of CMC 12 Hyperpersonal Model (Walther, 1996) Sometimes, the unique affordances of CMC allow individuals to develop develop relationships that are “more socially desirable than we tend to experience in parallel FtFinteraction” (p. 17).  Role of sender, receiver, channel, and feedback.  > Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Theories of CMC 13 Social Identity Model of Deindividuation Effects (SIDE; Reicher, Spears, & Postmes, 1995 ) In deindividuated/depersonalized settings, individual identity is submerged into the group identity.  We identify with the “in group” and disassociate with the “outgroup.”  ✔ Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 14 Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Evolution of CMC 15 CMC’s early features: Asynchronous Examples: Email, discussion forums Benefits: Allows user to carefully compose and edit messages prior to sending. Drawbacks: limited/no real-time interactions  slowed down processes (2) Reduced-cues environment 	Examples: any text-only online interaction Benefits: selective self-presentation, identity play Drawbacks: No visual cues misinterpretations of messages, deception Theories of CMC are based off of these properties. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Evolution of CMC 16 CMC in 2011 is:  (1) Highly interactive  (2) Highly visual (3) Synchronous, near synchronous, and asynchronous communication (4) Interactions are with FRIENDS, not strangers Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
The Problem 17 CMC has changed… BUT the theories that attempt to predict, explain, and control it have not. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Enter my research… 18 https://www.msu.edu/~nellison/TOIL
Enter my research… 19 What do we study? The relationship between Facebook use and social capital: We have found that various measures of Facebook use, including FBI (Ellison et al., 2007), actual friends on the site (Ellison et al., in press), connection strategies (Ellison et al., in press), and engagement in reciprocal communication (Vitak et al., 2011) predict perceptions of social capital. But this only tells part of the story. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Enter my research… 20 Problems with this research: Atheoretical?  Does not account for two inter-related and        critical components of SNS use: -- Audience -- Self-Presentation (a la disclosures) Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
What’s audience got to do with it? 21 danahboyd (2008) identified three dynamics that differentiate networked publics from traditional publics:   invisible audiences  context collapse  blurring of public and private  Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Selective Self-Presentation via CMC 22 Goffman’s (1959) dramaturgical approach:  … a performer tends to conceal or underplay those activities, facts, and motives which are incompatible with an idealized version of himself… a performer often engenders in his audience the belief that he is related to them in a more ideal way than is always the case (p. 48). Hyperpersonal Model (Walther, 1996): senders engage in selective self-presentations // receivers idealize the sender // behavioral confirmation through feedback So how do we selectively self-present on SNSs? Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
23 Selective Self-Presentation in our SNS Profiles Profile Picture Highlighted Pictures Friends ,[object Object]
Who are they?
Who is highlighted?Status updates
24 Communication Channels on SNSs Public: Status Updates, Comments, Likes, Posting Photos, Sharing Links  Private: Messages, Chat, Filtering Posts with privacy settings Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Blurring of Public and Private 25 Marwick and boyd (2011):  “We may understand that the Twitter or Facebook audience is potentially limitless, but we often act as if it were bounded.” But Facebook is just my friends! Technical features enable sharing of “private” information far beyond your articulated network. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Blurring of Public and Private 26
Blurring of Public and Private 27 Canadian woman on medical leave dropped from insurance for not looking depressed in Facebook photos (story)
Blurring of Public and Private 28 Eagles employee fired over status update (story)
But what does it all mean? 29
But what does it all mean? 30 We cannot rely on older theories of CMC to explain current  user experiences.         Older theories focus on reduced cues, asynchronous              communication. ,[object Object],Social Information Processing Hyperpersonal SIDE Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
But what does it all mean? 31 We cannot rely on older theories of CMC to explain current  user experiences. ,[object Object],One’s audience—both known and unknown      —is critical. ,[object Object],Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
32
33 Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
But what does it all mean? 34 We cannot rely on older theories of CMC to explain current  user experiences. ,[object Object],2. One’s audience—both known and unknown—is     critical. ,[object Object],3.   While scary things can and do happen, online       communication is full of benefits for those       who choose to engage. Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Looking forward 35 How can we theoretically explain the communication and relationship building that occurs online? Don’t treat online and offline as separate entities. We don’t necessarily need to build new theories from scratch  ,[object Object]
Can we adapt existing social science theories explaining offline interaction?Jessica Vitak   |   Theorizing the Web   |   April 9, 2011
Looking forward: Where to start? 36 Equity Theory (Adams, 1965) ,[object Object]

Más contenido relacionado

La actualidad más candente

Technique of Developing Materials
Technique of Developing MaterialsTechnique of Developing Materials
Technique of Developing MaterialsMusfera Nara Vadia
 
CMC and English Language Teaching and Learning, Abderrahmane BABNI
CMC and English Language Teaching and Learning,  Abderrahmane BABNICMC and English Language Teaching and Learning,  Abderrahmane BABNI
CMC and English Language Teaching and Learning, Abderrahmane BABNISaadia Morcenet secretary
 
Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...
Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...
Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...April Seifert
 
Approaches to discoourse analysis
Approaches to discoourse analysisApproaches to discoourse analysis
Approaches to discoourse analysisDuaa Ahmed
 
Communicative competence
Communicative competenceCommunicative competence
Communicative competenceJess Sarabia
 
Osgood-Schramm model of communication
Osgood-Schramm model of communicationOsgood-Schramm model of communication
Osgood-Schramm model of communicationAmberRomeike
 
Teaching Speaking in EFL Classroom
Teaching Speaking in EFL ClassroomTeaching Speaking in EFL Classroom
Teaching Speaking in EFL ClassroomZana Abbas
 
Second language acquisition stages
Second language acquisition stagesSecond language acquisition stages
Second language acquisition stagesdamarisescobar1911
 
Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)
Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)
Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)John Turnbull
 
Task-Based Language Teaching (TBLT)
Task-Based  Language Teaching (TBLT)Task-Based  Language Teaching (TBLT)
Task-Based Language Teaching (TBLT)King Saud University
 
Task based-language-teaching
Task based-language-teachingTask based-language-teaching
Task based-language-teachingEl Yazid Kanane
 
Brief Introduction to Psycholinguistics
Brief Introduction to PsycholinguisticsBrief Introduction to Psycholinguistics
Brief Introduction to PsycholinguisticsIqra Abadullah
 
Register And Style
Register And StyleRegister And Style
Register And StyleUwe Klemm
 
Communicative Language Teaching (Complete)
Communicative Language Teaching (Complete)Communicative Language Teaching (Complete)
Communicative Language Teaching (Complete)Haidee Sanchez
 

La actualidad más candente (20)

Universal grammar
Universal grammarUniversal grammar
Universal grammar
 
Technique of Developing Materials
Technique of Developing MaterialsTechnique of Developing Materials
Technique of Developing Materials
 
CMC and English Language Teaching and Learning, Abderrahmane BABNI
CMC and English Language Teaching and Learning,  Abderrahmane BABNICMC and English Language Teaching and Learning,  Abderrahmane BABNI
CMC and English Language Teaching and Learning, Abderrahmane BABNI
 
Motivation in SLA
Motivation in SLAMotivation in SLA
Motivation in SLA
 
Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...
Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...
Social Media Communication: Uncertainty Reduction Theory & Transactional Mode...
 
Approaches to discoourse analysis
Approaches to discoourse analysisApproaches to discoourse analysis
Approaches to discoourse analysis
 
Teaching oral skills
Teaching oral skillsTeaching oral skills
Teaching oral skills
 
Communicative competence
Communicative competenceCommunicative competence
Communicative competence
 
Osgood-Schramm model of communication
Osgood-Schramm model of communicationOsgood-Schramm model of communication
Osgood-Schramm model of communication
 
Teaching Speaking in EFL Classroom
Teaching Speaking in EFL ClassroomTeaching Speaking in EFL Classroom
Teaching Speaking in EFL Classroom
 
Clt and tbl methods
Clt and tbl methodsClt and tbl methods
Clt and tbl methods
 
L1 interference
L1 interferenceL1 interference
L1 interference
 
Second language acquisition stages
Second language acquisition stagesSecond language acquisition stages
Second language acquisition stages
 
Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)
Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)
Manufactured Silences (Bonny Norton on Identity and Second-Language Acquisition)
 
Communication Privacy Management Theory (CPM)
Communication Privacy Management Theory (CPM)Communication Privacy Management Theory (CPM)
Communication Privacy Management Theory (CPM)
 
Task-Based Language Teaching (TBLT)
Task-Based  Language Teaching (TBLT)Task-Based  Language Teaching (TBLT)
Task-Based Language Teaching (TBLT)
 
Task based-language-teaching
Task based-language-teachingTask based-language-teaching
Task based-language-teaching
 
Brief Introduction to Psycholinguistics
Brief Introduction to PsycholinguisticsBrief Introduction to Psycholinguistics
Brief Introduction to Psycholinguistics
 
Register And Style
Register And StyleRegister And Style
Register And Style
 
Communicative Language Teaching (Complete)
Communicative Language Teaching (Complete)Communicative Language Teaching (Complete)
Communicative Language Teaching (Complete)
 

Destacado

SIDE Model and Coordinated Management of Meaning
SIDE Model and Coordinated Management of MeaningSIDE Model and Coordinated Management of Meaning
SIDE Model and Coordinated Management of MeaningSreyoshi Dey
 
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLocal Social Summit
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeJessica Vitak
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...ACSM @ VU University Amsterdam
 
Technologically/Computer Mediated Communication
Technologically/Computer Mediated CommunicationTechnologically/Computer Mediated Communication
Technologically/Computer Mediated CommunicationAbid Zafar
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social mediaAgnese Vellar
 
Communication Strategies in synchronous CMC and face-to-face interactions
Communication Strategies in synchronous CMC and face-to-face interactionsCommunication Strategies in synchronous CMC and face-to-face interactions
Communication Strategies in synchronous CMC and face-to-face interactionsCristina Palomeque
 
The Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal BrandThe Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal BrandAnthony Juliano, MA, MBA
 
The effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentationThe effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentationJethro Elsden
 
The Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your NetworkThe Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your NetworkAnthony Juliano, MA, MBA
 
Men are from Mars: Gender differences in word choices in social media
Men are from Mars: Gender differences in word choices in social mediaMen are from Mars: Gender differences in word choices in social media
Men are from Mars: Gender differences in word choices in social mediaAnnie Pettit, Research Methodologist
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking SitesStefanie Duguay
 
Identifying perception barriers
Identifying perception barriersIdentifying perception barriers
Identifying perception barriersJawe Querimit
 

Destacado (20)

SIDE Model and Coordinated Management of Meaning
SIDE Model and Coordinated Management of MeaningSIDE Model and Coordinated Management of Meaning
SIDE Model and Coordinated Management of Meaning
 
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
 
A private sphereslideshare
A private sphereslideshareA private sphereslideshare
A private sphereslideshare
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook Age
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
 
Technologically/Computer Mediated Communication
Technologically/Computer Mediated CommunicationTechnologically/Computer Mediated Communication
Technologically/Computer Mediated Communication
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
 
Communication Strategies in synchronous CMC and face-to-face interactions
Communication Strategies in synchronous CMC and face-to-face interactionsCommunication Strategies in synchronous CMC and face-to-face interactions
Communication Strategies in synchronous CMC and face-to-face interactions
 
The Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal BrandThe Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal Brand
 
The effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentationThe effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentation
 
The Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your NetworkThe Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your Network
 
Thesis Defense
Thesis DefenseThesis Defense
Thesis Defense
 
Men are from Mars: Gender differences in word choices in social media
Men are from Mars: Gender differences in word choices in social mediaMen are from Mars: Gender differences in word choices in social media
Men are from Mars: Gender differences in word choices in social media
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
 
Identifying perception barriers
Identifying perception barriersIdentifying perception barriers
Identifying perception barriers
 

Similar a Theorizing the Future of Computer-Mediated Communication: The Changing Role of Self-Presentation, Audience, and Interaction

02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
Civic Leadership in 2011: It's All About the Networks
Civic Leadership in 2011: It's All About the NetworksCivic Leadership in 2011: It's All About the Networks
Civic Leadership in 2011: It's All About the NetworksScott Hutcheson, Ph.D.
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and OverviewDuke Network Analysis Center
 
Rete e Reti: Per-che' e per-chi?
Rete e Reti: Per-che' e per-chi?Rete e Reti: Per-che' e per-chi?
Rete e Reti: Per-che' e per-chi?Paolo Massa
 
Rethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital FluencyRethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital FluencyJudy O'Connell
 
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdfINST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdfbozo18
 
Thinking in networks – #RENAschool
Thinking in networks – #RENAschoolThinking in networks – #RENAschool
Thinking in networks – #RENAschoolAlberto Cottica
 
How Social Networking is Changing How We Collaborate and Share Information
How Social Networking is Changing How We Collaborate and Share InformationHow Social Networking is Changing How We Collaborate and Share Information
How Social Networking is Changing How We Collaborate and Share InformationLynn Reyes
 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theoriesTajanik Oliver
 
Workshopvin2 A Socio Legal View On Virtual Individual Networks
Workshopvin2 A Socio Legal View On Virtual Individual NetworksWorkshopvin2 A Socio Legal View On Virtual Individual Networks
Workshopvin2 A Socio Legal View On Virtual Individual Networksimec.archive
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Structure for Collective Learning Organizations Version 5
Structure for Collective Learning Organizations Version 5Structure for Collective Learning Organizations Version 5
Structure for Collective Learning Organizations Version 5Jaap van Till
 
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011filippotrevisan
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
The social networks and the new social order between the individualized socia...
The social networks and the new social order between the individualized socia...The social networks and the new social order between the individualized socia...
The social networks and the new social order between the individualized socia...INFOGAIN PUBLICATION
 
Week+2+-+Socio-digital+theories.pptx
Week+2+-+Socio-digital+theories.pptxWeek+2+-+Socio-digital+theories.pptx
Week+2+-+Socio-digital+theories.pptxRyanMowat2
 

Similar a Theorizing the Future of Computer-Mediated Communication: The Changing Role of Self-Presentation, Audience, and Interaction (20)

Witness session - Drs Seaman and Elliott
Witness session - Drs Seaman and ElliottWitness session - Drs Seaman and Elliott
Witness session - Drs Seaman and Elliott
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
Civic Leadership in 2011: It's All About the Networks
Civic Leadership in 2011: It's All About the NetworksCivic Leadership in 2011: It's All About the Networks
Civic Leadership in 2011: It's All About the Networks
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
 
Rete e Reti: Per-che' e per-chi?
Rete e Reti: Per-che' e per-chi?Rete e Reti: Per-che' e per-chi?
Rete e Reti: Per-che' e per-chi?
 
Rethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital FluencyRethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital Fluency
 
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdfINST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
 
Stakeholder Assessment ByteBack NGO
Stakeholder Assessment ByteBack NGO Stakeholder Assessment ByteBack NGO
Stakeholder Assessment ByteBack NGO
 
Thinking in networks – #RENAschool
Thinking in networks – #RENAschoolThinking in networks – #RENAschool
Thinking in networks – #RENAschool
 
How Social Networking is Changing How We Collaborate and Share Information
How Social Networking is Changing How We Collaborate and Share InformationHow Social Networking is Changing How We Collaborate and Share Information
How Social Networking is Changing How We Collaborate and Share Information
 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theories
 
Workshopvin2 A Socio Legal View On Virtual Individual Networks
Workshopvin2 A Socio Legal View On Virtual Individual NetworksWorkshopvin2 A Socio Legal View On Virtual Individual Networks
Workshopvin2 A Socio Legal View On Virtual Individual Networks
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Structure for Collective Learning Organizations Version 5
Structure for Collective Learning Organizations Version 5Structure for Collective Learning Organizations Version 5
Structure for Collective Learning Organizations Version 5
 
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
L19 Social
L19 SocialL19 Social
L19 Social
 
The social networks and the new social order between the individualized socia...
The social networks and the new social order between the individualized socia...The social networks and the new social order between the individualized socia...
The social networks and the new social order between the individualized socia...
 
Week+2+-+Socio-digital+theories.pptx
Week+2+-+Socio-digital+theories.pptxWeek+2+-+Socio-digital+theories.pptx
Week+2+-+Socio-digital+theories.pptx
 

Más de Jessica Vitak

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesJessica Vitak
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...Jessica Vitak
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lectureJessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaJessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Jessica Vitak
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Jessica Vitak
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...Jessica Vitak
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Jessica Vitak
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingJessica Vitak
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An OverviewJessica Vitak
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutJessica Vitak
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersJessica Vitak
 

Más de Jessica Vitak (13)

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lecture
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re Heading
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An Overview
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult Users
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Theorizing the Future of Computer-Mediated Communication: The Changing Role of Self-Presentation, Audience, and Interaction

  • 1. Theorizing the Future of Computer-Mediated Communication: The Changing Role of Self-Presentation, Audience, and Interaction Jessica Vitak | @jvitak Michigan State University Theorizing the Web | April 9, 2011
  • 2. Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 2 Jessica Vitak | Theorizing the Web | April 9, 2011
  • 3. CMC is as old as the Internet 3 Usenet (1979) Best-known and widely researched online discussion forum. Newsgroups for every topic imaginable. See Baym (1998) & Donath (1999) for examples of research using Usenet. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 4. CMC is as old as the Internet 4 The WELL (1985) Became widely known through Howard Rheingold’s book, “The Virtual Community” Strong geographic component. Highlighted the modality-switching capabilities of the Internet. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 5. CMC is as old as the Internet 5 AOL connected millions of people to the Internet and served as both an ISP and as a homebase for establishing an online identity. AOL Chat Rooms enabled large-group pseuodonymous, synchronous interactions. AIM (1996) enabled synchronous one-to-one interactions. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 6. 6
  • 7. CMC is as old as the Internet 7 Online dating sites serve a very specific purpose: finding someone to date (casually or seriously)  Modality switching. Static profiles  asynchronous communication  synchronouscommunication  face-to-face meetings. See Ellison, Gibbs & Heino’s (2006) research for more. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 8. CMC is as old as the Internet 8 Boyd and Ellison (2007) define SNSs as “web-based services that allow individuals to: (1) construct a public or semi-public profile within a bounded system; (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system.” Jessica Vitak | Theorizing the Web | April 9, 2011
  • 9. Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 9 Jessica Vitak | Theorizing the Web | April 9, 2011
  • 10. Theories of CMC 10 Cues-filtered-out approach (Culnan & Markus, 1987) Dominant in 1980s and into the 1990s CMC is impersonal; less social/personal; leaner than in-person interactions "CMC, because of its lack of audio or video cues, will be perceived as impersonal and lacking in normative reinforcement, so there will be less socioemotional content exchanged" (Rice & Love, 1987). < Jessica Vitak | Theorizing the Web | April 9, 2011
  • 11. Theories of CMC 11 Social Information Processing (SIP) Theory (Walther, 1992) Direct response to cues filtered out approach. Relationships can and do form online, albeit at a slower rate than in face-to-face environments. = Jessica Vitak | Theorizing the Web | April 9, 2011
  • 12. Theories of CMC 12 Hyperpersonal Model (Walther, 1996) Sometimes, the unique affordances of CMC allow individuals to develop develop relationships that are “more socially desirable than we tend to experience in parallel FtFinteraction” (p. 17). Role of sender, receiver, channel, and feedback. > Jessica Vitak | Theorizing the Web | April 9, 2011
  • 13. Theories of CMC 13 Social Identity Model of Deindividuation Effects (SIDE; Reicher, Spears, & Postmes, 1995 ) In deindividuated/depersonalized settings, individual identity is submerged into the group identity. We identify with the “in group” and disassociate with the “outgroup.” ✔ Jessica Vitak | Theorizing the Web | April 9, 2011
  • 14. Let’s take a walk through CMC’s past… 1. Computer-mediated communication is not a new phenomenon. 2. Theories of CMC have evolved with the technology. 3. BUT this evolution cannot keep pace with technological developments. 14 Jessica Vitak | Theorizing the Web | April 9, 2011
  • 15. Evolution of CMC 15 CMC’s early features: Asynchronous Examples: Email, discussion forums Benefits: Allows user to carefully compose and edit messages prior to sending. Drawbacks: limited/no real-time interactions  slowed down processes (2) Reduced-cues environment Examples: any text-only online interaction Benefits: selective self-presentation, identity play Drawbacks: No visual cues misinterpretations of messages, deception Theories of CMC are based off of these properties. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 16. Evolution of CMC 16 CMC in 2011 is: (1) Highly interactive (2) Highly visual (3) Synchronous, near synchronous, and asynchronous communication (4) Interactions are with FRIENDS, not strangers Jessica Vitak | Theorizing the Web | April 9, 2011
  • 17. The Problem 17 CMC has changed… BUT the theories that attempt to predict, explain, and control it have not. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 18. Enter my research… 18 https://www.msu.edu/~nellison/TOIL
  • 19. Enter my research… 19 What do we study? The relationship between Facebook use and social capital: We have found that various measures of Facebook use, including FBI (Ellison et al., 2007), actual friends on the site (Ellison et al., in press), connection strategies (Ellison et al., in press), and engagement in reciprocal communication (Vitak et al., 2011) predict perceptions of social capital. But this only tells part of the story. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 20. Enter my research… 20 Problems with this research: Atheoretical? Does not account for two inter-related and critical components of SNS use: -- Audience -- Self-Presentation (a la disclosures) Jessica Vitak | Theorizing the Web | April 9, 2011
  • 21. What’s audience got to do with it? 21 danahboyd (2008) identified three dynamics that differentiate networked publics from traditional publics: invisible audiences context collapse blurring of public and private Jessica Vitak | Theorizing the Web | April 9, 2011
  • 22. Selective Self-Presentation via CMC 22 Goffman’s (1959) dramaturgical approach: … a performer tends to conceal or underplay those activities, facts, and motives which are incompatible with an idealized version of himself… a performer often engenders in his audience the belief that he is related to them in a more ideal way than is always the case (p. 48). Hyperpersonal Model (Walther, 1996): senders engage in selective self-presentations // receivers idealize the sender // behavioral confirmation through feedback So how do we selectively self-present on SNSs? Jessica Vitak | Theorizing the Web | April 9, 2011
  • 23.
  • 26. 24 Communication Channels on SNSs Public: Status Updates, Comments, Likes, Posting Photos, Sharing Links Private: Messages, Chat, Filtering Posts with privacy settings Jessica Vitak | Theorizing the Web | April 9, 2011
  • 27. Blurring of Public and Private 25 Marwick and boyd (2011): “We may understand that the Twitter or Facebook audience is potentially limitless, but we often act as if it were bounded.” But Facebook is just my friends! Technical features enable sharing of “private” information far beyond your articulated network. Jessica Vitak | Theorizing the Web | April 9, 2011
  • 28. Blurring of Public and Private 26
  • 29. Blurring of Public and Private 27 Canadian woman on medical leave dropped from insurance for not looking depressed in Facebook photos (story)
  • 30. Blurring of Public and Private 28 Eagles employee fired over status update (story)
  • 31. But what does it all mean? 29
  • 32.
  • 33.
  • 34. 32
  • 35. 33 Jessica Vitak | Theorizing the Web | April 9, 2011
  • 36.
  • 37.
  • 38. Can we adapt existing social science theories explaining offline interaction?Jessica Vitak | Theorizing the Web | April 9, 2011
  • 39.
  • 40.
  • 41. People seek to maximize rewards while minimizing costs.Jessica Vitak | Theorizing the Web | April 9, 2011
  • 42.
  • 43. Main concepts: cost, benefit, outcome, comparison level, satisfaction, and dependenceJessica Vitak | Theorizing the Web | April 9, 2011
  • 44.
  • 45. establishment of plans and strategies for interacting with others
  • 46. development and maintenance of self-identityJessica Vitak | Theorizing the Web | April 9, 2011
  • 47. 39 Thanks! Twitter: Email: @jvitakvitakjes@msu.edu Website: http://vitak.wordpress.com Jessica Vitak | Theorizing the Web | April 9, 2011

Notas del editor

  1. Usenet created in 1979 by some Duke students : users post messages to newsgroups; no central server  rather it is distributed across a large number of more localized servers.Baym studied a soap opera form, focused on norms guiding site useDonath focused broadly on identity and deception online (signaling theory), used Usenet as the example.
  2. Started in San Fran in 1985.See Rheingold’s website for links to early meetups.
  3. Commercials tell us 1 in 5 relationships begin on an online dating website.
  4. Some interesting points: Ellison et al. found that people are not really using SNSs to develop new relationships but to reconnect and maintain existing relationships. One exception to this could be when it comes to SNGs (our research).Donath &amp; boyd (2004) suggest that displaying a connection with another user signals one’s willingness to risk their reputation. Mutual connections help place an individual within a larger network and can help establish common ground.
  5. Rooted in social presence theory andmedia richness
  6. CFO effects are limited to a narrow range of experiences, specifically zero-history, one-shot interactions.
  7. message features—including the ability to edit messages before sending, minimize cue leakage, and reallocate cognitive resources—allow individuals to more thoroughly engage in selective self-presentation
  8. Note that this is a bit of an oversimplification of what is going on but at a high level holds true.For example, researchers have expanded on the hyperpersonal model to include visual cues and synchronous communication, but all of these theories are about impression formation rather than relationship maintenance and impression management.
  9. Some would argue that while we apply the social capital framework, it is not a theory. Others argue that social capital is recursive, that it includes everything and therefore it includes nothing.
  10. Talk about these inter-relatedly
  11. Sites like Lamebook and Failbooking aggregate pictures and updates that may have been marked as “private” but were copied by a friend and submitted to the site.
  12. http://gawker.com/#!321802/your-privacy-is-an-illusion/bank-intern-busted-by-facebookKevin Colvin, an intern at Anglo Irish Bank&apos;s North American arm got into trouble after he got caught in a lie on Facebook.
  13. Talk about social capital research, how we see this relationship as a weighing of risks and benefits. Could bring in lowest-common-denominator approach, but point to problems inherent in that.
  14. Talk about social capital research, how we see this relationship as a weighing of risks and benefits. Could bring in lowest-common-denominator approach, but point to problems inherent in that.
  15. Talk about social capital research, how we see this relationship as a weighing of risks and benefits. Could bring in lowest-common-denominator approach, but point to problems inherent in that.
  16. Inputs: time, effort, loyalty, hard work, commitment, ability, flexibility, toleranceOutcomes: Sense of achievement, praise, recognition, reputation, social support
  17. Outcome = benefits – costsSatisfaction = outcome – comparison levelDependence = outcome – comparison level of alternativesCritique: human interaction isn’t always rational