All My People Right Here, Right Now: Management of Group Co-Presence on a Social Networking Site

dc.contributor.authorLampinen, Airi
dc.contributor.authorTamminen, Sakari
dc.contributor.authorOulasvirta, Antti
dc.date.accessioned2023-06-08T11:44:32Z
dc.date.available2023-06-08T11:44:32Z
dc.date.issued2009
dc.description.abstractA mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individual. This primarily qualitative study concentrates on the point of view of individual SNS users and their perspectives on multiple group affiliations. After charting the perceived multiplicity of groups on the social networking site Facebook, we investigated the relevance of multiple groups to the users and the effect of group co-presence on psychological identification processes. Users deal with group co-presence by managing the situation to prevent anticipated conflictive and identity-threatening situations. Their behavioral strategies consist of dividing the platform into separate spaces, using suitable channels of communication, and performing self-censorship. Mental strategies include both the creation of more inclusive in-group identities and the reciprocity of trusting other users and being responsible. In addition to giving further evidence of the existence of group co-presence on SNSs, the study sheds light on the management of the phenomenon. Management of group co-presence should be supported, since otherwise users may feel the urge to resort to defensive strategies of social identity protection such as ceasing to use SNSs altogether or, less dramatically, limit their use according to the least common denominator". Hence, the phenomenon merits the attention of researchers, developers, and designers alike."en
dc.identifier.doi10.1145/1531674.1531717
dc.identifier.urihttps://dl.eusset.eu/handle/20.500.12015/4883
dc.language.isoen
dc.publisherAssociation for Computing Machinery
dc.relation.ispartofProceedings of the 2009 ACM International Conference on Supporting Group Work
dc.subjectgroup co-presence
dc.subjectsocial networking site
dc.subjectgroups
dc.subjectsocial networking
dc.subjectcomputer-mediated communication
dc.titleAll My People Right Here, Right Now: Management of Group Co-Presence on a Social Networking Siteen
gi.citation.publisherPlaceNew York, NY, USA
gi.citation.startPage281–290
gi.citations.count92
gi.citations.elementYasmeen Rashidi, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su (2020): "It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(4), doi:10.1145/3392827
gi.citations.elementFrederic Stutzman, Woodrow Hartzog (2012): Boundary regulation in social media, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145320
gi.citations.elementJill Palzkill Woelfer, David G. Hendry (2012): Homeless young people on social network sites, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2207676.2208686
gi.citations.elementPranut Jain, Rosta Farzan, Adam J. Lee (2021): Context-based Automated Responses of Unavailability in Mobile Messaging, In: Computer Supported Cooperative Work (CSCW) 3(30), doi:10.1007/s10606-021-09399-z
gi.citations.elementMucheol Kim, Sangyong Han (2016): Cognitive social network analysis for supporting the reliable decision-making process, In: The Journal of Supercomputing 8(74), doi:10.1007/s11227-016-1858-9
gi.citations.elementSeyed Hadi Mirisaee, Margot Brereton, Paul Roe, Fiona Redhead (2013): Understanding the fabric of social interactions for ridesharing through mining social networking sites, In: Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, doi:10.1145/2541016.2541071
gi.citations.elementJaved Ahmed, Serena Villata, Guido Governatori (2017): Information and friend segregation for online social networks: a user study, In: AI & SOCIETY 4(34), doi:10.1007/s00146-017-0789-1
gi.citations.elementMaritza Johnson, Serge Egelman, Steven M. Bellovin (2012): Facebook and privacy, In: Proceedings of the Eighth Symposium on Usable Privacy and Security, doi:10.1145/2335356.2335369
gi.citations.elementMichael Netter, Sebastian Herbst, Gunther Pernul (2011): Analyzing Privacy in Social Networks--An Interdisciplinary Approach, In: 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, doi:10.1109/passat/socialcom.2011.22
gi.citations.elementBen Marder, Avi Shankar, David Houghton, Adam Joinson (2017): “What if my mum sees it?”, In: Information Technology & People 1(30), doi:10.1108/itp-10-2015-0263
gi.citations.elementRajesh Bejugam, Kristen LeFevre (2011): enList: Automatically Simplifying Privacy Policies, In: 2011 IEEE 11th International Conference on Data Mining Workshops, doi:10.1109/icdmw.2011.74
gi.citations.elementPriscilla N. Y. Wong, Aneesha Singh, Duncan P. Brumby (2024): I Just Don't Quite Fit In: How People of Colour Participate in Online and Offline Climate Activism, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(8), doi:10.1145/3637347
gi.citations.elementWei Liu, Zeming Zheng, Gan Pan, Shijian Li (2011): SoPhoNet: Photo Sharing Based on Participatory Sensing, In: 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, doi:10.1109/ithings/cpscom.2011.119
gi.citations.elementNora McDonald, Andrea Forte (2020): The Politics of Privacy Theories: Moving from Norms to Vulnerabilities, In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3313831.3376167
gi.citations.elementCamellia Zakaria, Kenneth Goh, Youngki Lee, Rajesh Balan (2019): Exploratory Analysis of Individuals' Mobility Patterns and Experienced Conflicts in Workgroups, In: Proceedings of the 5th ACM Workshop on Mobile Systems for Computational Social Science, doi:10.1145/3325426.3329946
gi.citations.elementGul Calikli, Mark Law, Arosha K. Bandara, Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart, Mark Levine, Bashar Nuseibeh (2016): Privacy dynamics, In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, doi:10.1145/2897053.2897063
gi.citations.elementNora McDonald, Andrea Forte (2021): Powerful Privacy Norms in Social Network Discourse, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3479565
gi.citations.elementBryan C. Semaan, Lauren M. Britton, Bryan Dosono (2016): Transition Resilience with ICTs, In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858109
gi.citations.elementShelly D. Farnham, Elizabeth F. Churchill (2011): Faceted identity, faceted lives, In: Proceedings of the ACM 2011 conference on Computer supported cooperative work, doi:10.1145/1958824.1958880
gi.citations.elementShuo Zhang, Khaled Alanezi, Mike Gartrell, Richard Han, Qin Lv, Shivakant Mishra (2018): Understanding Group Event Scheduling via the OutWithFriendz Mobile Application, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4(1), doi:10.1145/3161200
gi.citations.elementJacqueline C. Pike, Patrick J. Bateman, Brian S. Butler (2017): Information from social networking sites: <scp>C</scp>ontext collapse and ambiguity in the hiring process, In: Information Systems Journal 4(28), doi:10.1111/isj.12158
gi.citations.elementEden Litt, Eszter Hargittai (2016): “Just Cast the Net, and Hopefully the Right Fish Swim into It”, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work &amp; Social Computing, doi:10.1145/2818048.2819933
gi.citations.elementLauren Britton, Louise Barkhuus, Bryan Semaan (2019): "Mothers as Candy Wrappers": Critical Infrastructure Supporting the Transition into Motherhood, In: Proceedings of the ACM on Human-Computer Interaction GROUP(3), doi:10.1145/3361113
gi.citations.elementHouda Elmimouni, Eric P. S. Baumer, Andrea Forte (2024): On Being an Expert: Habitus as a Lens for Understanding Privacy Expertise, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(8), doi:10.1145/3637379
gi.citations.elementPatrick Gage Kelley, Robin Brewer, Yael Mayer, Lorrie Faith Cranor, Norman Sadeh (2011): An Investigation into Facebook Friend Grouping, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-23765-2_15
gi.citations.elementAmy Voida, Judith S. Olson, Gary M. Olson (2013): Turbulence in the clouds, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2470654.2481313
gi.citations.elementMichael Muller, Werner Geyer, Todd Soule, John Wafer (2014): Geographical and organizational distances in enterprise crowdfunding, In: Proceedings of the 17th ACM conference on Computer supported cooperative work &amp; social computing, doi:10.1145/2531602.2531716
gi.citations.elementPeter Tolmie, Andy Crabtree (2017): The practical politics of sharing personal data, In: Personal and Ubiquitous Computing 2(22), doi:10.1007/s00779-017-1071-8
gi.citations.elementBryan Semaan, Heather Faucett, Scott Robertson, Misa Maruyama, Sara Douglas (2015): Navigating Imagined Audiences, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing, doi:10.1145/2675133.2675187
gi.citations.elementDerek Doran (2015): On the discovery of social roles in large scale social systems, In: Social Network Analysis and Mining 1(5), doi:10.1007/s13278-015-0290-0
gi.citations.elementHarmanpreet Kaur, Cliff Lampe, Walter S. Lasecki (2020): Using affordances to improve AI support of social media posting decisions, In: Proceedings of the 25th International Conference on Intelligent User Interfaces, doi:10.1145/3377325.3377504
gi.citations.elementNedim Karakayali, Aysenur Kilic (2013): More Network Conscious Than Ever? Challenges, Strategies, and Analytic Labor of Users in the Facebook Environment, In: Journal of Computer-Mediated Communication 2(18), doi:10.1111/jcc4.12005
gi.citations.elementMichel Walrave, Sofie Robbé, Luna Staes, Lara Hallam (2023): Mindful sharenting: how millennial parents balance between sharing and protecting, In: Frontiers in Psychology, doi:10.3389/fpsyg.2023.1171611
gi.citations.elementAlessandra Mazzia, Kristen LeFevre, Eytan Adar (2012): The PViz comprehension tool for social network privacy settings, In: Proceedings of the Eighth Symposium on Usable Privacy and Security, doi:10.1145/2335356.2335374
gi.citations.elementMary Helen Millham, David Atkin (2016): Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors, In: New Media &amp; Society 1(20), doi:10.1177/1461444816654465
gi.citations.elementNa Chen, Xiaoyu Liu, Yanan Zhai, Xueyan Hu (2023): Development and validation of a robot social presence measurement dimension scale, In: Scientific Reports 1(13), doi:10.1038/s41598-023-28817-4
gi.citations.elementAndrea Forte, Denise Agosto, Michael Dickard, Rachel Magee (2016): The Strength of Awkward Ties, In: Proceedings of the 19th International Conference on Supporting Group Work, doi:10.1145/2957276.2957282
gi.citations.elementJason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, John Zimmerman (2011): Are you close with me? are you nearby?, In: Proceedings of the 13th international conference on Ubiquitous computing, doi:10.1145/2030112.2030140
gi.citations.elementJorge Goncalves, Vassilis Kostakos, Jayant Venkatanathan (2013): Narrowcasting in social media, In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, doi:10.1145/2492517.2492570
gi.citations.elementSangho Byeon, Sungeun Chung, Borae Jin (2017): Self-censorship on large corporations in SNS: the effect of news exposure, knowledge, and perceived power, In: Digital Policy, Regulation and Governance 2(19), doi:10.1108/dprg-02-2016-0009
gi.citations.elementNazanin Andalibi, Margaret E. Morris, Andrea Forte (2018): Testing Waters, Sending Clues, In: Proceedings of the ACM on Human-Computer Interaction CSCW(2), doi:10.1145/3274288
gi.citations.elementManya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, Lorrie Faith Cranor (2013): The post that wasn't, In: Proceedings of the 2013 conference on Computer supported cooperative work, doi:10.1145/2441776.2441865
gi.citations.elementScott Banghart, Michael Etter, Cynthia Stohl (2018): Organizational Boundary Regulation Through Social Media Policies, In: Management Communication Quarterly 3(32), doi:10.1177/0893318918766405
gi.citations.elementAparna Gonibeed, M. N. Ravishankar (2016): Exploring How Individuals Manage Their Image When Interacting with Professional Contacts Online, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-45234-0_36
gi.citations.elementMichael Netter, Sebastian Herbst, Günther Pernul (2012): Interdisciplinary Impact Analysis of Privacy in Social Networks, In: Security and Privacy in Social Networks, doi:10.1007/978-1-4614-4139-7_2
gi.citations.elementTingan Tang, Matti Hämäläinen, Antti Virolainen, Juho Makkonen (2011): Understanding user behavior in a local social media platform by social network analysis, In: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, doi:10.1145/2181037.2181067
gi.citations.elementShion Guha, Jeremy Birnholtz (2013): Can you see me now?, In: Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, doi:10.1145/2493190.2493209
gi.citations.elementHouda Elmimouni, Erica Shusas, Patrick Skeba, Eric P. S. Baumer, Andrea Forte (2023): What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies, In: Lecture Notes in Computer Science, doi:10.1007/978-3-031-28032-0_20
gi.citations.elementEran Toch, Yang Wang, Lorrie Faith Cranor (2012): Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems, In: User Modeling and User-Adapted Interaction 1-2(22), doi:10.1007/s11257-011-9110-z
gi.citations.elementRobert E. Wilson, Samuel D. Gosling, Lindsay T. Graham (2012): A Review of Facebook Research in the Social Sciences, In: Perspectives on Psychological Science 3(7), doi:10.1177/1745691612442904
gi.citations.elementJason Watson, Andrew Besmer, Heather Richter Lipford (2012): +Your circles, In: Proceedings of the Eighth Symposium on Usable Privacy and Security, doi:10.1145/2335356.2335373
gi.citations.elementAriane Ollier-Malaterre (2019): La compétence numérique de gestion des frontières sur les réseaux sociaux numériques : un capital culturel technologique à la Bourdieu, In: Lien social et Politiques 81, doi:10.7202/1056307ar
gi.citations.elementHui-Lien Chou, Chien Chou (2021): How teens negotiate privacy on social media proactively and reactively, In: New Media &amp; Society 6(25), doi:10.1177/14614448211018797
gi.citations.elementOliver L. Haimson, Jed R. Brubaker, Lynn Dombrowski, Gillian R. Hayes (2015): Disclosure, Stress, and Support During Gender Transition on Facebook, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing, doi:10.1145/2675133.2675152
gi.citations.elementFred Stutzman, Jacob Kramer-Duffield (2010): Friends only, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1753326.1753559
gi.citations.elementWouter Martinus Petrus Steijn (2013): The Cost of Using Facebook: Assigning Value to Privacy Protection on Social Network Sites Against Data Mining, Identity Theft, and Social Conflict, In: Reloading Data Protection, doi:10.1007/978-94-007-7540-4_15
gi.citations.elementYang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, Lorrie Faith Cranor (2011): "I regretted the minute I pressed share", In: Proceedings of the Seventh Symposium on Usable Privacy and Security, doi:10.1145/2078827.2078841
gi.citations.elementMichel Fayole Dounla (2022): WhatsApp et continuité pédagogique à l’ère de la COVID 19 : l’exemple de l’Université internationale Jean-Paul II et de l’Institut universitaire royal de Baboutcha-Nintcheu (Cameroun), In: Revue internationale des technologies en pédagogie universitaire 2(19), doi:10.18162/ritpu-2022-v19n2-05
gi.citations.elementSimon Jones, Eamonn O'Neill (2010): Feasibility of structural network clustering for group-based privacy control in social networks, In: Proceedings of the Sixth Symposium on Usable Privacy and Security, doi:10.1145/1837110.1837122
gi.citations.elementNazanin Andalibi, Andrea Forte (2018): Announcing Pregnancy Loss on Facebook, In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3173574.3173732
gi.citations.elementSimon Jones, Eamonn O'Neill (2011): Contextual dynamics of group-based sharing decisions, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979200
gi.citations.elementGina Merchant, Nadir Weibel, Kevin Patrick, James H Fowler, Greg J Norman, Anjali Gupta, Christina Servetas, Karen Calfas, Ketaki Raste, Laura Pina, Mike Donohue, William G Griswold, Simon Marshall (2014): Click “Like” to Change Your Behavior: A Mixed Methods Study of College Students’ Exposure to and Engagement With Facebook Content Designed for Weight Loss, In: Journal of Medical Internet Research 6(16), doi:10.2196/jmir.3267
gi.citations.elementKelly Quinn (2014): An Ecological Approach to Privacy: “Doing” Online Privacy at Midlife, In: Journal of Broadcasting &amp; Electronic Media 4(58), doi:10.1080/08838151.2014.966357
gi.citations.elementLouise Barkhuus, Juliana Tashiro (2010): Student socialization in the age of facebook, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1753326.1753347
gi.citations.elementMucheol Kim, Jiwan Seo, Sanghyun Noh, Sangyong Han (2011): Identity management‐based social trust model for mediating information sharing and privacy enhancement, In: Security and Communication Networks 8(5), doi:10.1002/sec.379
gi.citations.elementManya Sleeper, Lorrie Faith Cranor, Sarah K. Pearman (2017): Exploring Topic-Based Sharing Mechanisms, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3025453.3025840
gi.citations.elementNazanin Andalibi (2020): Disclosure, Privacy, and Stigma on Social Media, In: ACM Transactions on Computer-Human Interaction 3(27), doi:10.1145/3386600
gi.citations.elementWouter M.P. Steijn, Alexander P. Schouten (2013): Information Sharing and Relationships on Social Networking Sites, In: Cyberpsychology, Behavior, and Social Networking 8(16), doi:10.1089/cyber.2012.0392
gi.citations.elementMark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, Margaret E. Morris (2011): It's not that i don't have problems, i'm just not putting them on facebook, In: Proceedings of the ACM 2011 conference on Computer supported cooperative work, doi:10.1145/1958824.1958876
gi.citations.elementElena Ferrari, Marco Viviani (2013): Privacy in Social Collaboration, In: Handbook of Human Computation, doi:10.1007/978-1-4614-8806-4_70
gi.citations.elementAvelie Stuart, Arosha K. Bandara, Mark Levine (2019): The psychology of privacy in the digital age, In: Social and Personality Psychology Compass 11(13), doi:10.1111/spc3.12507
gi.citations.elementPriya Kumar, Sarita Schoenebeck (2015): The Modern Day Baby Book, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing, doi:10.1145/2675133.2675149
gi.citations.elementManya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh (2013): "i read my Twitter the next morning and was astonished", In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2470654.2466448
gi.citations.elementAiri Lampinen, Vilma Lehtinen, Asko Lehmuskallio, Sakari Tamminen (2011): We're in it together, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979420
gi.citations.elementChloë Brown, Vincenzo Nicosia, Salvatore Scellato, Anastasios Noulas, Cecilia Mascolo (2012): The importance of being placefriends, In: Proceedings of the 2012 ACM workshop on Workshop on online social networks, doi:10.1145/2342549.2342557
gi.citations.elementSanjay Kairam, Joseph 'Jofish' Kaye, John Alexis Guerra-Gomez, David A. Shamma (2016): Snap Decisions?, In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858451
gi.citations.elementNora McDonald, Andrea Forte (2022): Privacy and Vulnerable Populations, In: Modern Socio-Technical Perspectives on Privacy, doi:10.1007/978-3-030-82786-1_15
gi.citations.elementHedviga Tkáčová, Martina Pavlíková, Zita Jenisová, Patrik Maturkanič, Roman Králik (2021): Social Media and Students’ Wellbeing: An Empirical Analysis during the Covid-19 Pandemic, In: Sustainability 18(13), doi:10.3390/su131810442
gi.citations.elementHana Habib, Neil Shah, Rajan Vaish (2019): Impact of Contextual Factors on Snapchat Public Sharing, In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3290605.3300256
gi.citations.elementManya Sleeper, Alessandro Acquisti, Lorrie Faith Cranor, Patrick Gage Kelley, Sean A. Munson, Norman Sadeh (2015): I Would Like To..., I Shouldn't..., I Wish I..., In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing, doi:10.1145/2675133.2675193
gi.citations.elementJun-Ki Min, Jason Wiese, Jason I. Hong, John Zimmerman (2013): Mining smartphone data to classify life-facets of social relationships, In: Proceedings of the 2013 conference on Computer supported cooperative work, doi:10.1145/2441776.2441810
gi.citations.elementCamellia Zakaria, Youngki Lee, Rajesh Balan (2021): Detection of Social Identification in Workgroups from a Passively-sensed WiFi Infrastructure, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(5), doi:10.1145/3449145
gi.citations.elementManya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, Michelle L. Mazurek (2016): Sharing Personal Content Online, In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858170
gi.citations.elementAshwin Bahulkar, Boleslaw K. Szymanski, Kevin Chan, Omar Lizardo (2018): Impact of Attributes on Group Formation, In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), doi:10.1109/asonam.2018.8508658
gi.citations.elementJayan Chirayath Kurian (2015): Facebook use by the open access repository users, In: Online Information Review 7(39), doi:10.1108/oir-02-2015-0055
gi.citations.elementBen Marder, David Houghton, Adam Joinson, Avi Shankar, Eleanor Bull (2016): Understanding the Psychological Process of Avoidance-Based Self-Regulation on Facebook, In: Cyberpsychology, Behavior, and Social Networking 5(19), doi:10.1089/cyber.2015.0564
gi.citations.elementGrant Blank, Gillian Bolsover, Elizabeth Dubois (2014): A New Privacy Paradox: Young People and Privacy on Social Network Sites, In: SSRN Electronic Journal, doi:10.2139/ssrn.2479938
gi.citations.elementJoseph Seering, Felicia Ng, Zheng Yao, Geoff Kaufman (2018): Applications of Social Identity Theory to Research and Design in Computer-Supported Cooperative Work, In: Proceedings of the ACM on Human-Computer Interaction CSCW(2), doi:10.1145/3274771
gi.citations.elementMoritz Riesner, Michael Netter, Gunther Pernul (2012): An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites, In: 2012 Seventh International Conference on Availability, Reliability and Security, doi:10.1109/ares.2012.20
gi.citations.elementAnne‐Marie van Prooijen, Coen Wirtz, Naomi Ellemers (2024): Organisational antecedents of employee ambassadorship on social network sites, In: European Journal of Social Psychology 6(54), doi:10.1002/ejsp.3094
gi.citations.elementAriane Ollier-Malaterre, Nancy P. Rothbard, Justin M. Berg (2013): When Worlds Collide in Cyberspace: How Boundary Work in Online Social Networks Impacts Professional Relationships, In: Academy of Management Review 4(38), doi:10.5465/amr.2011.0235
gi.citations.elementMichelle Richey, Aparna Gonibeed, M. N. Ravishankar (2017): The Perils and Promises of Self-Disclosure on Social Media, In: Information Systems Frontiers 3(20), doi:10.1007/s10796-017-9806-7
gi.conference.locationSanibel Island, Florida, USA

Files

Collections