1 / 75

Social Networking

Social Networking. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship.

ewa
Download Presentation

Social Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Networking

  2. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Definition of SNS: “web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system.” • They avoid using the term networking because it implies that people are primarily using the sites to make new contacts as opposed to keeping up with existing relationships • Authors present a timeline of SNS history dating back to 1997 • Note that SNS sites differentiate themselves primarily by their default and customizable structures related to visibility and access • Reasons that people connect to one another are varied, and on some sites the links are not bi-directional, so one can be a “fan” but not necessarily a confirmed friend

  3. A theoretical model of intentional social action in online social networks • Most approaches to technology adoption are based on individual decision making • Authors present a research model on intentional social action in online social networks • Use the notion of collective intention • Another objective to validate existing measures of collective intention and to validate three modes of social influence in the context of social networks

  4. A theoretical model of intentional social action in online social networks • explores the role of compliance (subjective norm), internalization (group norm), and identification (social identity) in explaining collective intention (we-Intention) to participate in social networks • We-intentions, reflecting group influences and group influence on individual decision making is most appropriate to understanding participation in social networks • Definition we-intention (Tuomela) “commitment of an individual to participate in joint action, and involves in an implicit and explicit agreement between the participants to engage in that joint action”

  5. A theoretical model of intentional social action in online social networks

  6. A theoretical model of intentional social action in online social networks • Some findings indicate that compliance (subjective norm) is important in the early stages of technology acceptance and that as the user gains experience, internalization (group norm) plays more of a role (note: internalization used a little differently here than Kelman’s original intent) • Hypotheses • “H1. A stronger subjective norm leads to a higher level of We-Intention to participate in an online social networking site.” • “H2. Stronger group norm leads to a higher level of We-Intention to participate in an online social networking site. • “

  7. A theoretical model of intentional social action in online social networks • Components of the social identity form of influence: • “▪ Cognitive social identity: The self-categorization process renders the self stereotypically interchangeable with other group members, and stereotypically distinct from outsiders. • ▪ Evaluative social identity: The evaluation of self-worth on the basis of belonging to a particular group. • ▪ Affective social identity: A sense of emotional involvement with the group, which is characterized by identification with, involvement in, and emotional attachment to the group.”

  8. A theoretical model of intentional social action in online social networks • “H3. A stronger social identity leads to a higher level of We-Intention to participate in an online social networking site.” • Expected significant main effects for each of the components of social identity • Methods • Facebook users who responded to a solicitation on one of several student groups on the site were instructed to think about up to five friends they interacted with on Facebook • Collected 389 usable online questionnaires • Measure of We-Intention “WE1: I intend that our group (i.e., the group that I identified above) interacts on Facebook together sometime during the next 2 weeks. Dholakia et al. • WE 2: We (i.e., the group that I identified above) intend to interact on Facebook together sometime during the next 2 weeks. (2004) • [Seven-point “Strongly disagree to Strongly agree” scale]

  9. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • Among the privacy concerns that some facebook users have is concern about identity theft and threats to personal security • “The overarching goal of the present research was to gain a better understanding of what can be found in online social networking profiles, specifically, FACEBOOK™.” • “Apart from collecting data on the kinds of information users were choosing to include (and exclude) in their personal profiles, the study examines the impact of individual characteristics on the type of information that is likely to be present in an online profile (i.e., information that is self-disclosed as a function of characteristicsincluding age, gender and relationship status)”

  10. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • Study 1 • Primary purpose to develop a scoring instrument for what could be revealed on Facebook • Sample: data from 400 randomly selected, accessible, personal profiles from 8 Canadian FACEBOOK™ networks (four university, four community) was collected • “a final checklist comprised of 97 dichotomously scored items (i.e., whether the piece of information was present or absent) and 3 identification items (i.e., username link, the network searched, and the size of the overall network) was constructed” • The 400 participant profiles were rated against the checklist

  11. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • Most disclosed: “(available on 63% or more of the profiles) described personally identifying information (i.e., birth date, gender, profile pictures, photo albums, tagged photos and general photos of the user) as well social connections (i.e., groups joined, and friends viewable). In addition, education information (college/university attended) and regular update information(status, wall and mini-feed) were included. Finally, playful communications such as acceptance of pokes, messages, and gifts and applications were frequently provided” • Least disclosed:”key personal information (zip/postal code), phone numbers (both land line and mobile), home address, city or town, website and former name. Inaddition, there was also limited amount of information provided regarding some aspects of educational experience (i.e., school mailbox, courses, degree, awards, and room). Finally, optional ‘‘wallfeatures” (i.e., Super Wall and Advanced Wall) market place listings”

  12. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • People on average disclosed only 25% of what it was possible to disclose • Study 2 explored two types of threats, identity theft and theft to self or groups because of being associated with certain activities or persons • Three disclosure categories developed “The first category reflected personal identity information, the second involved sensitive personal information, and the third involved potentially stigmatizing information. Thematic analysis was conducted to construct each of the three categories”

  13. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • Used research assistants and even the police to develop personal identity index ranging from 0-8: street address, city/town, postal code, gender, birth day, birth year, profile picture and email • Sensitive personal information “email, employer, job position, status, mini-feed, regular wall, profile picture, photo albums, self-selected photos, tagged photos, message, poke, send a gift, and friends viewable (possible scores ranged from 0 to 14).”

  14. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • Potentially stigmatizing information: “religious views, political views, birth year, sexual orientation, photos, friends viewable, interests, activities, favorite music, favorite movies, favorite TV shows, favorite books, favorite quotes, and about me (possible scores ranged from 0 to 14).” • Findings: • 1. “Specifically, users who provided information about their gender (present or absent), relationship status, and age disclosed more default/standard information, more sensitive personal information, and more potentially stigmatizing information in their online profiles than their peers who did not disclose their gender, relationship status or age” • 2. “users who indicated their relationship status as either single or in a relationship disclosed significantly more default/standard information … and sensitive personal Information …than users who did not indicate their relationship status”

  15. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • Single users shared the most stigmatizing information, then users in a relationship, and last those who didn’t indicate status • No effects for age or type of network • As age increased, disclosure decreased • Study 3 • “Through discussion and then factor analysis , the following 11 scales were created: • “personal information, photo and update information, work information, education information, message and poke acceptance (whether users allow for receipt of private messages and nudges from other users), photo album and profile picture information, age information, contact information, view information, other wall presence, and relationship information”

  16. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • Findings • “users who belonged to a community network were more likely to include their political and religious views in their personal profiles than were their university network counterparts” • “users who indicated their gender, also had higher levels of disclosure for: personal information, photo and update information, education information, photo album and profile picture information, and age information”

  17. All about me: Disclosure in online social networking profiles: The case of FACEBOOK • More findings • “males expressed more information about their political and religious views than did females” • “disclosing one’s relationship status was related to higher levels of disclosure of various topics, including: personal information, photo and update information, photo album and profile picture information, age information; and view information” • “Users who disclosed their age also disclosed more education information” • Age predicted disclosure on 5 of the ten topics • Single users disclosed more on most of the topics

  18. A theoretical model of intentional social action in online social networks • Results • Did structural equation modeling • Although there was a significant chi-square, all of the other indicators were good, indicating that the model was a good fit to the data Model accounted for 32% of the variance in We-Intention • Hypotheses: all factors (except group norm) had a significant effect on We-Intention, with subjective norm the strongest, • “social identity is a second-order factor with cognitive social identity, affective social identity, and evaluative social identity as second-order factors exhibiting significant impact on We-Intention to use an online social networking site” • Interesting that subjective norm is still influential even after they are actively using Facebook-counter to prediction

  19. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Some sites which now support SN did not originally start out that way, and their original forms varied • Attribute decline of Friendster (although they do boast 73 million profiles on the site currently) to technology problems, cultural clashes as the general public became aware of the site, Fakester issues, announcement that they would become fee-based • Notes migration of photo and videosharing sites to SNS • MySpace offered new features with page customization, connection to bands, acceptance of minors • Proliferation of non-US SNS which have received little attention from US scholars

  20. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Some SNS sites have thrived by restricting public access, creating boundaries and exclusivity of one kind or another • Some government agencies and corporations have restricted usage of SNS for their employees • Difference between SNS and earlier online communities forums may be the organization not around common interests but around the social networks of individual members • “The world is composed of networks, not groups”

  21. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • SNS research topics • Impression management and friendship performance • Profiles and friendship networks as tools of identity management; friends provide context or a backdrop for impression formation • Articles on this topic we’ve read include • Tong, S. T., Van Der Heide, B., Langwell, L, & Walther, J. (2008). Too much of a good thing? The relationship between number of friends and interpersonal impressions on Facebook. • Zhao, S., Grasmuck, S., & Martin, J. (2008). Identity construction on Facebook: Digital empowerment in anchored relationships.

  22. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • SNS research topics, cont’d • Networks and network structure-using massive datasets collected by programs like Fetch (from Fetch Technologies, a company started by USC researchers) or donated by the SNS itself • Article on SNS networks we’ve read • Liu, H. (2007). Social network profiles as taste performances. • This category could also include typologies of users or profiles

  23. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Researchers in this area want to understand large scale structural features • Ex. Backstrom et al., “Group Formation in Large Social Networks: Membership, Growth, and Evolution,” a study of LiveJourna,l asked: • “What are the structural features that affect if someone will join a particular subgroup, and • “How does the probability of joining a subgroup p depend on the number of friends k who are already members of the group?” • In the groups examined p was a negatively accelerating function of k- a law of diminishing returns in that k keeps affecting p but at an increasingly smaller rate • Other influential factors are not just the number of friends but, for moderate values of k, whether or not those friends are mutually connected to each other • Groups with very large number of triangles of mutual friends seem to grow more slowly

  24. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Bridging online and offline social networks • Primary motivation for using SNS seems to be to connect to friends rather than to meet strangers • How will this be affected by LBS? One of the basic findings in social psychology of friendship is that physical proximity is often a sufficient basis for friendship formation, while similarity is necessary for people to maintain friendship relationship with geographically distant others • Reading from our syllabus • Chan, D. K., & Cheng, G. (2004). A comparison of offline and online friendship qualities at different stages of relationship development.

  25. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Privacy • Several researchers have been interested in the extent to which information supplied to SNS for public consumption can compromise the privacy or the personal identity of members, particularly young people who seem to be somewhat less concerned about privacy issues • For example, Stutzman, “An Evaluation of Identity-Sharing Behaviorin Social Network Communities,” surveyed students using Facebook Friendster and MySpace to found out what they were revealing about themselves on the sites. He found that most of them thought that maintaining privacy was very important, and were not confident that their personal information was safe on these sites, but they were not particularly concerned about it • See also Wolak, J., Finkelhor, D., * Mitchell, K. (2008). Is talking online to unknown people always risky? Distinguishing online interaction styles in a national sample of youth internet users from our readings on “The Dark Side of CMC” • Are Facebook profiles public or private? Do police have the right to “search” them?

  26. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Other study areas • Boundaries on SNS; • Study conducted at Georgia Tech found that 1/3 of students surveyed did not believe professors should be allowed on Facebook (2006 pub date) • Contact with professor on Facebook had no impact, positive or negative, on ratings of professor

  27. boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. • Future research • Need for experimental, longitudinal studies • More studies outside US

  28. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Networks where user-owned or created content is shared are becoming more commonplace • Not much is known about the norms and values surrounding the online “giving” of content for semi-public consumption • This would lie somewhere along a continuum from posting a file on a web page which anybody can access to attaching a file to email (the private end of the continuum) • The authors refer to this as the “Space where directed content and social relationships co-evolve”

  29. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Studies of contributions of end-user content online have focused either on motivations for sharing or on issues related to social loafing where selfish users download but do not contribute • Little explicit attention to the recipient end in terms of users’ feelings about to whom they want to contribute • Aspects of the sharing experience seem to have much in common with an anthropological take on gift-giving

  30. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Gifting: three central concepts: social bonds, other-orientedness and reciprocity • Interesting why they chose a gift-giving perspective, as opposed to, say, authorship, or other perspectives such as self-promotion or desire for social influence • Two modes of gift transfers (coercion and exchange are not considered) • Reciprocity • Pure gift-giving • Coercion and Exchange vs. Reciprocity and Pure Gift-Giving continuum- categories arrayed along a continuum anchored by • Self-centered motivations vs Other-oriented motivations • Economic man vs Social bonds • Cost–benefit vs .Reciprocal ambiguity

  31. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Researchers are interested in the end of the continuum where it is uncertain whether or if you will get something in return, and if so, what you will get • Digital goods have the characteristic that you can give them without losing them, and that once you give them you lose control over how they are distributed to others • Affordances of Internet allow digital goods to be transferred at little or no cost • Sharing networks are increasingly taking on a social component which factors into how and with whom goods are shared (e.g. influenced by the existence of affinity groups and subnetworks) as well as on the willingness to engage in pure gifting as opposed to exchange or reciprocity

  32. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Research questions: what end-user concerns characterize semipublic content contributions on the Internet? • what is given, to whom, how, and why • Authors looked at Flickr, a photo-sharing network • Principal activities consist of uploading photos, tagging (applying metadata to photos) • Tags can be searched, result in user-generated “folksonomies” or taxonomy of pictures • Users can look at photos bookmarked as favorites by others as well as others’ contacts • Users can get comments on their photos, and there are feedback mechanisms including popularity ratings • Users can create groups • On Flickr, social networks emerge from sharing of material

  33. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Data: • Analyzed 760 forum posts (no details on how these were selected were provided) • Did follow-up interviews with 17 users • Used a sort of grounded theory process using the whom, what, how and why categories for coding, while looking for emergent features

  34. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing

  35. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Results • What: Social content and metadata • “Novice users quickly became aware that when providing material for others in a networked environment, you are also exposing links to other files, metadata, conversations, persons or even networks and vividly described difficulties and concerns they had when facing this fact” • Ex. Being OK with making their photos public but not the tags, especially if tagged with the names of friends or other users • Ex. That their pictures could be used in somebody else’s offsite blog with a track back to them on Flickr-allowed unathorized people to have a path into your life • Ex. Concerns about visibility of contacts-friends might have photos they don’t want their parents to see

  36. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Other concerns • Not being able to upload photos anonymously • Being named as a contact whether you liked it or not • Wanting to make friends’ comments on photos separately not viewable by family (and perhaps vice versa) • So any discussion of end—user digital content needs to include the associated metadata like tags, including the social metadata (network of contacts, friends’ comments on photos, etc)

  37. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Whom: recipients and their relationships • A flaw in Flickr was that the level of settings for privacy was not graduated enough-ex. Friends and family lumped together, only a few categories (public, contacts, friends and family, private) • Ex. Child of divorce has photos with Mom’s side of family, Dad’s side and don’t want to subject one to the other but still want to share photos with family • Groups were used to address certain pictures to particular groups of recipients on a long-term basis but was not a good solution for short-term or one-time occasions

  38. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Groups often subdivided into splinter groups who did not subscribe to the rules of the larger group about what sorts of pictures could be posted • How: sociotechnical means • Dealing with the issues of not being able to precisely and on-the-fly control the recipients for pictures led people to either develop technical workarounds, which may have led them offsite, or to simply refrain from posting • Wanted a mechanism for “banning”-making public material semi-public if the content was offensive

  39. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • Why: semi-public motivations • did not want to trouble others with nonrelevant goods; • receivers requested it • an offline (intimate) social bond • perceived similarities with receivers • intended a (personalized) experience with the goods; • experienced a conflict of interest between different receiving relations and groups • the gift, if provided publicly, might produce requests for additional gifts

  40. Skageby (2008),Semi-public end-user content contributions—A case-study of concerns and intentions in online photo-sharing • People need to be able to put relations into silos (sometimes temporary) and to “gift material in excludable ways” • Need to be able to “control the digital rights” • The presence of tags, links, commenting mechanisms, publishing photos straight to blogs, etc. all raise the costs of gifting • The association of the photos with all of this metadata increases the likelihood of a desire for semi-public gifting and technical mechanisms to support it • Some users wanted to be able to make it clear that their photos were in the public domain and free for anyone to use for any purpose • Interesting to think about their data from a perspective other than gifting, say impression management or self-as-source

  41. Shin, D., & Kim, W. (2008). Applying the technology acceptance model and flow theory to Cyworld user behavior: Implication of the Web2.0 user acceptance. • Focus on hugely popular Korean site which nearly 90% of young people use • Applies a modified TAM model adding in the concepts of synchronicity, involvement, and flow as enhancing constructs to predict users’ attitudes toward and intention to use Cyworld • A user’s personal space on Cyworld is called a “minihompy” and it features blogging, photos, message board, guest book, personal bulletin board, and a room for their avatar, a mini-me • Users can link to other users minihompys • Users can buy clothes for their avatars, furnishings for their rooms, and other accoutrements

  42. Shin, D., & Kim, W. (2008). Applying the technology acceptance model and flow theory to Cyworld user behavior: Implication of the Web2.0 user acceptance. • Technology acceptance model • Offshoot of theory of reasoned action • Attitude toward an action, subjective norm both influence behavioral intention • Behavioral intention is known to be a strong predictor of actually taking an action • Perceived usefulness and perceived ease of use are major factors influencing behavioral intention to use a technology; didn’t see ease of use in this application • Three new variables specific to Cyworld incorporated into the model: synchronicity, involvement, and flow experience

  43. Shin, D., & Kim, W. (2008). Applying the technology acceptance model and flow theory to Cyworld user behavior: Implication of the Web2.0 user acceptance. H6: There is a positive relationship between perceived involvement and perceived enjoyment. H7: There is a positive relationship between perceived involvement and attitude toward Web2.0. (?) H8: There is a positive relationship between perceived synchronicity and perceived usefulness. H9: There is a positive relationship between perceived synchronicity and attitude toward Cyworld. H10: Flow experience has a strong effect on intention to use Cyworld • Hypotheses: • H1: Attitude toward Cyworld is positively related to the intention to use Cyworld. • H2: There is a positive relationship between perceived usefulness and intention to use Cyworld. • H3: There is a positive relationship between perceived usefulness and attitude toward Cyworld. • H4: There is a positive relationship between perceived enjoyment and intention to use Cyworld. • H5: There is a positive relationship between perceived enjoyment and attitude toward Cyworld.

  44. Shin, D., & Kim, W. (2008). Applying the technology acceptance model and flow theory to Cyworld user behavior: Implication of the Web2.0 user acceptance. • Got a sample of 950 home pages using the “random home page finder” feature of Cyworld (now that’s convenient! Wonder how “random” it really is) • Posted recruitment information and a copy of the survey instrument on the users’ bulletin boards (wow, this is a researcher’s dream! Especially when combined with the nonymity feature which ties the user to a state issued ID number) • 352 respondents completed the survey for a very good response rate of 37% (by my calculations; the researchers claim a response rate of 43.3% (maybe some confusion here as to whether this represented a total after a second wave of posting surveys) • No information is provided on how concepts were measured, reliability of measure, etc.

  45. Shin, D., & Kim, W. (2008). Applying the technology acceptance model and flow theory to Cyworld user behavior: Implication of the Web2.0 user acceptance. • Results • Used SEM to analyze the data • The author does not report the chi-square result for some reason (probably significant given such a large sample size?) but the other indicators suggest that the model is a good fit • Eight of the ten hypotheses were supported, and two rejected (some of the significance levels were p<.10 which is not a very stringent criterion) • Rejected hypotheses were the direct paths from perceived usefulness and perceived enjoyment to intention to use Cyworld • Perceived usefulness is usually a good predictor in TAM studies

  46. Shin, D., & Kim, W. (2008). Applying the technology acceptance model and flow theory to Cyworld user behavior: Implication of the Web2.0 user acceptance. Flow is out here all alone

  47. Shin, D., & Kim, W. (2008). Applying the technology acceptance model and flow theory to Cyworld user behavior: Implication of the Web2.0 user acceptance. • There is an error on page 381 where instead of saying that perceived usefulness and perceived enjoyment would mediate the relationship between perceived synchronicity and perceived intention, the text states perceived involvement. • The only variable which had a direct effect on behavioral intention was perceived flow • The effects of perceived synchronicity and perceived involvement on intention were mediated by perceived usefulness and perceived enjoyment • However, the direct effects of perceived synchronicity and involvement on attitude were stronger than their mediated effects through, respectively, perceived usefulness and perceived enjoyment • Lack of direct effect of usefulness and enjoyment on intention to use suggests that maybe there is something different about this particular technology that requires a higher level of usefulness or enjoyment to predict regular use • It may be that since everybody uses Cyworld it is a less discretionary choice and you may not need to enjoy it or even find it particularly useful to feel you need to use it?

  48. Donath (2007). Signals in Social Supernets. • Grooming, Gossip, and Online Friending • Are social networks sites going to provide the tools that are needed to be able to efficiently expand the scale of one’s social networks? • Presumably there are limits to the number of contacts one can manage f2f or through conventional means • While apes use grooming to nourish and maintain their social ties, they can only pick so many lice • Humans are able to use language to accomplish many of the same relational formation and maintenance tasks, but again their resources to do this are limited given the many demands of daily living • Author argues that although tools like email enable you to keep in touch with or send news to multiple others, there is a greater need to be able to keep up with the news of others in context, to learn about their relationships, and to have a basis for the development of trust • These are the services that social networks would seek to provide, enabling social networks of much greater scale

  49. Donath (2007). Signals in Social Supernets. • Author’s goal to offer a theoretical framework for assessing the potential of SNS to transform social relations and to provide guidance to designers for making SNS better social tools • The analysis is based on signaling theory, which “models why some communications are reliably honest and others are not” • Thus a central focus is on how SNS can more fully address the issue of interpersonal trust, particularly as it affects the establishment of reliable identity

  50. Donath (2007). Signals in Social Supernets. • Signaling theory • The extent to which we require communications to be scrupulously honest is highly variable and depends on the consequences of dishonesty in a particular context • On a message board talking about sports it may not matter so much as it would on, say, a forum talking about brain cancer • To be a reliable signal, the costs of deceptively producing the signal must outweigh the benefits. • What types of signals and situations bring this about?

More Related