All My People Right Here, Right Now: Management of Group Co-Presence on a Social Networking Site
dc.contributor.author | Lampinen, Airi | |
dc.contributor.author | Tamminen, Sakari | |
dc.contributor.author | Oulasvirta, Antti | |
dc.date.accessioned | 2023-06-08T11:44:32Z | |
dc.date.available | 2023-06-08T11:44:32Z | |
dc.date.issued | 2009 | |
dc.description.abstract | A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individual. This primarily qualitative study concentrates on the point of view of individual SNS users and their perspectives on multiple group affiliations. After charting the perceived multiplicity of groups on the social networking site Facebook, we investigated the relevance of multiple groups to the users and the effect of group co-presence on psychological identification processes. Users deal with group co-presence by managing the situation to prevent anticipated conflictive and identity-threatening situations. Their behavioral strategies consist of dividing the platform into separate spaces, using suitable channels of communication, and performing self-censorship. Mental strategies include both the creation of more inclusive in-group identities and the reciprocity of trusting other users and being responsible. In addition to giving further evidence of the existence of group co-presence on SNSs, the study sheds light on the management of the phenomenon. Management of group co-presence should be supported, since otherwise users may feel the urge to resort to defensive strategies of social identity protection such as ceasing to use SNSs altogether or, less dramatically, limit their use according to the least common denominator". Hence, the phenomenon merits the attention of researchers, developers, and designers alike." | en |
dc.identifier.doi | 10.1145/1531674.1531717 | |
dc.identifier.uri | https://dl.eusset.eu/handle/20.500.12015/4883 | |
dc.language.iso | en | |
dc.publisher | Association for Computing Machinery | |
dc.relation.ispartof | Proceedings of the 2009 ACM International Conference on Supporting Group Work | |
dc.subject | group co-presence | |
dc.subject | social networking site | |
dc.subject | groups | |
dc.subject | social networking | |
dc.subject | computer-mediated communication | |
dc.title | All My People Right Here, Right Now: Management of Group Co-Presence on a Social Networking Site | en |
gi.citation.publisherPlace | New York, NY, USA | |
gi.citation.startPage | 281–290 | |
gi.citations.count | 92 | |
gi.citations.element | Yasmeen Rashidi, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su (2020): "It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(4), doi:10.1145/3392827 | |
gi.citations.element | Frederic Stutzman, Woodrow Hartzog (2012): Boundary regulation in social media, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, doi:10.1145/2145204.2145320 | |
gi.citations.element | Jill Palzkill Woelfer, David G. Hendry (2012): Homeless young people on social network sites, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2207676.2208686 | |
gi.citations.element | Pranut Jain, Rosta Farzan, Adam J. Lee (2021): Context-based Automated Responses of Unavailability in Mobile Messaging, In: Computer Supported Cooperative Work (CSCW) 3(30), doi:10.1007/s10606-021-09399-z | |
gi.citations.element | Mucheol Kim, Sangyong Han (2016): Cognitive social network analysis for supporting the reliable decision-making process, In: The Journal of Supercomputing 8(74), doi:10.1007/s11227-016-1858-9 | |
gi.citations.element | Seyed Hadi Mirisaee, Margot Brereton, Paul Roe, Fiona Redhead (2013): Understanding the fabric of social interactions for ridesharing through mining social networking sites, In: Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, doi:10.1145/2541016.2541071 | |
gi.citations.element | Javed Ahmed, Serena Villata, Guido Governatori (2017): Information and friend segregation for online social networks: a user study, In: AI & SOCIETY 4(34), doi:10.1007/s00146-017-0789-1 | |
gi.citations.element | Maritza Johnson, Serge Egelman, Steven M. Bellovin (2012): Facebook and privacy, In: Proceedings of the Eighth Symposium on Usable Privacy and Security, doi:10.1145/2335356.2335369 | |
gi.citations.element | Michael Netter, Sebastian Herbst, Gunther Pernul (2011): Analyzing Privacy in Social Networks--An Interdisciplinary Approach, In: 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, doi:10.1109/passat/socialcom.2011.22 | |
gi.citations.element | Ben Marder, Avi Shankar, David Houghton, Adam Joinson (2017): “What if my mum sees it?”, In: Information Technology & People 1(30), doi:10.1108/itp-10-2015-0263 | |
gi.citations.element | Rajesh Bejugam, Kristen LeFevre (2011): enList: Automatically Simplifying Privacy Policies, In: 2011 IEEE 11th International Conference on Data Mining Workshops, doi:10.1109/icdmw.2011.74 | |
gi.citations.element | Priscilla N. Y. Wong, Aneesha Singh, Duncan P. Brumby (2024): I Just Don't Quite Fit In: How People of Colour Participate in Online and Offline Climate Activism, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(8), doi:10.1145/3637347 | |
gi.citations.element | Wei Liu, Zeming Zheng, Gan Pan, Shijian Li (2011): SoPhoNet: Photo Sharing Based on Participatory Sensing, In: 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, doi:10.1109/ithings/cpscom.2011.119 | |
gi.citations.element | Nora McDonald, Andrea Forte (2020): The Politics of Privacy Theories: Moving from Norms to Vulnerabilities, In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3313831.3376167 | |
gi.citations.element | Camellia Zakaria, Kenneth Goh, Youngki Lee, Rajesh Balan (2019): Exploratory Analysis of Individuals' Mobility Patterns and Experienced Conflicts in Workgroups, In: Proceedings of the 5th ACM Workshop on Mobile Systems for Computational Social Science, doi:10.1145/3325426.3329946 | |
gi.citations.element | Gul Calikli, Mark Law, Arosha K. Bandara, Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart, Mark Levine, Bashar Nuseibeh (2016): Privacy dynamics, In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, doi:10.1145/2897053.2897063 | |
gi.citations.element | Nora McDonald, Andrea Forte (2021): Powerful Privacy Norms in Social Network Discourse, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3479565 | |
gi.citations.element | Bryan C. Semaan, Lauren M. Britton, Bryan Dosono (2016): Transition Resilience with ICTs, In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858109 | |
gi.citations.element | Shelly D. Farnham, Elizabeth F. Churchill (2011): Faceted identity, faceted lives, In: Proceedings of the ACM 2011 conference on Computer supported cooperative work, doi:10.1145/1958824.1958880 | |
gi.citations.element | Shuo Zhang, Khaled Alanezi, Mike Gartrell, Richard Han, Qin Lv, Shivakant Mishra (2018): Understanding Group Event Scheduling via the OutWithFriendz Mobile Application, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4(1), doi:10.1145/3161200 | |
gi.citations.element | Jacqueline C. Pike, Patrick J. Bateman, Brian S. Butler (2017): Information from social networking sites: <scp>C</scp>ontext collapse and ambiguity in the hiring process, In: Information Systems Journal 4(28), doi:10.1111/isj.12158 | |
gi.citations.element | Eden Litt, Eszter Hargittai (2016): “Just Cast the Net, and Hopefully the Right Fish Swim into It”, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2819933 | |
gi.citations.element | Lauren Britton, Louise Barkhuus, Bryan Semaan (2019): "Mothers as Candy Wrappers": Critical Infrastructure Supporting the Transition into Motherhood, In: Proceedings of the ACM on Human-Computer Interaction GROUP(3), doi:10.1145/3361113 | |
gi.citations.element | Houda Elmimouni, Eric P. S. Baumer, Andrea Forte (2024): On Being an Expert: Habitus as a Lens for Understanding Privacy Expertise, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(8), doi:10.1145/3637379 | |
gi.citations.element | Patrick Gage Kelley, Robin Brewer, Yael Mayer, Lorrie Faith Cranor, Norman Sadeh (2011): An Investigation into Facebook Friend Grouping, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-23765-2_15 | |
gi.citations.element | Amy Voida, Judith S. Olson, Gary M. Olson (2013): Turbulence in the clouds, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2470654.2481313 | |
gi.citations.element | Michael Muller, Werner Geyer, Todd Soule, John Wafer (2014): Geographical and organizational distances in enterprise crowdfunding, In: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, doi:10.1145/2531602.2531716 | |
gi.citations.element | Peter Tolmie, Andy Crabtree (2017): The practical politics of sharing personal data, In: Personal and Ubiquitous Computing 2(22), doi:10.1007/s00779-017-1071-8 | |
gi.citations.element | Bryan Semaan, Heather Faucett, Scott Robertson, Misa Maruyama, Sara Douglas (2015): Navigating Imagined Audiences, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675187 | |
gi.citations.element | Derek Doran (2015): On the discovery of social roles in large scale social systems, In: Social Network Analysis and Mining 1(5), doi:10.1007/s13278-015-0290-0 | |
gi.citations.element | Harmanpreet Kaur, Cliff Lampe, Walter S. Lasecki (2020): Using affordances to improve AI support of social media posting decisions, In: Proceedings of the 25th International Conference on Intelligent User Interfaces, doi:10.1145/3377325.3377504 | |
gi.citations.element | Nedim Karakayali, Aysenur Kilic (2013): More Network Conscious Than Ever? Challenges, Strategies, and Analytic Labor of Users in the Facebook Environment, In: Journal of Computer-Mediated Communication 2(18), doi:10.1111/jcc4.12005 | |
gi.citations.element | Michel Walrave, Sofie Robbé, Luna Staes, Lara Hallam (2023): Mindful sharenting: how millennial parents balance between sharing and protecting, In: Frontiers in Psychology, doi:10.3389/fpsyg.2023.1171611 | |
gi.citations.element | Alessandra Mazzia, Kristen LeFevre, Eytan Adar (2012): The PViz comprehension tool for social network privacy settings, In: Proceedings of the Eighth Symposium on Usable Privacy and Security, doi:10.1145/2335356.2335374 | |
gi.citations.element | Mary Helen Millham, David Atkin (2016): Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors, In: New Media & Society 1(20), doi:10.1177/1461444816654465 | |
gi.citations.element | Na Chen, Xiaoyu Liu, Yanan Zhai, Xueyan Hu (2023): Development and validation of a robot social presence measurement dimension scale, In: Scientific Reports 1(13), doi:10.1038/s41598-023-28817-4 | |
gi.citations.element | Andrea Forte, Denise Agosto, Michael Dickard, Rachel Magee (2016): The Strength of Awkward Ties, In: Proceedings of the 19th International Conference on Supporting Group Work, doi:10.1145/2957276.2957282 | |
gi.citations.element | Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, John Zimmerman (2011): Are you close with me? are you nearby?, In: Proceedings of the 13th international conference on Ubiquitous computing, doi:10.1145/2030112.2030140 | |
gi.citations.element | Jorge Goncalves, Vassilis Kostakos, Jayant Venkatanathan (2013): Narrowcasting in social media, In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, doi:10.1145/2492517.2492570 | |
gi.citations.element | Sangho Byeon, Sungeun Chung, Borae Jin (2017): Self-censorship on large corporations in SNS: the effect of news exposure, knowledge, and perceived power, In: Digital Policy, Regulation and Governance 2(19), doi:10.1108/dprg-02-2016-0009 | |
gi.citations.element | Nazanin Andalibi, Margaret E. Morris, Andrea Forte (2018): Testing Waters, Sending Clues, In: Proceedings of the ACM on Human-Computer Interaction CSCW(2), doi:10.1145/3274288 | |
gi.citations.element | Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, Lorrie Faith Cranor (2013): The post that wasn't, In: Proceedings of the 2013 conference on Computer supported cooperative work, doi:10.1145/2441776.2441865 | |
gi.citations.element | Scott Banghart, Michael Etter, Cynthia Stohl (2018): Organizational Boundary Regulation Through Social Media Policies, In: Management Communication Quarterly 3(32), doi:10.1177/0893318918766405 | |
gi.citations.element | Aparna Gonibeed, M. N. Ravishankar (2016): Exploring How Individuals Manage Their Image When Interacting with Professional Contacts Online, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-45234-0_36 | |
gi.citations.element | Michael Netter, Sebastian Herbst, Günther Pernul (2012): Interdisciplinary Impact Analysis of Privacy in Social Networks, In: Security and Privacy in Social Networks, doi:10.1007/978-1-4614-4139-7_2 | |
gi.citations.element | Tingan Tang, Matti Hämäläinen, Antti Virolainen, Juho Makkonen (2011): Understanding user behavior in a local social media platform by social network analysis, In: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, doi:10.1145/2181037.2181067 | |
gi.citations.element | Shion Guha, Jeremy Birnholtz (2013): Can you see me now?, In: Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, doi:10.1145/2493190.2493209 | |
gi.citations.element | Houda Elmimouni, Erica Shusas, Patrick Skeba, Eric P. S. Baumer, Andrea Forte (2023): What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies, In: Lecture Notes in Computer Science, doi:10.1007/978-3-031-28032-0_20 | |
gi.citations.element | Eran Toch, Yang Wang, Lorrie Faith Cranor (2012): Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems, In: User Modeling and User-Adapted Interaction 1-2(22), doi:10.1007/s11257-011-9110-z | |
gi.citations.element | Robert E. Wilson, Samuel D. Gosling, Lindsay T. Graham (2012): A Review of Facebook Research in the Social Sciences, In: Perspectives on Psychological Science 3(7), doi:10.1177/1745691612442904 | |
gi.citations.element | Jason Watson, Andrew Besmer, Heather Richter Lipford (2012): +Your circles, In: Proceedings of the Eighth Symposium on Usable Privacy and Security, doi:10.1145/2335356.2335373 | |
gi.citations.element | Ariane Ollier-Malaterre (2019): La compétence numérique de gestion des frontières sur les réseaux sociaux numériques : un capital culturel technologique à la Bourdieu, In: Lien social et Politiques 81, doi:10.7202/1056307ar | |
gi.citations.element | Hui-Lien Chou, Chien Chou (2021): How teens negotiate privacy on social media proactively and reactively, In: New Media & Society 6(25), doi:10.1177/14614448211018797 | |
gi.citations.element | Oliver L. Haimson, Jed R. Brubaker, Lynn Dombrowski, Gillian R. Hayes (2015): Disclosure, Stress, and Support During Gender Transition on Facebook, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675152 | |
gi.citations.element | Fred Stutzman, Jacob Kramer-Duffield (2010): Friends only, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1753326.1753559 | |
gi.citations.element | Wouter Martinus Petrus Steijn (2013): The Cost of Using Facebook: Assigning Value to Privacy Protection on Social Network Sites Against Data Mining, Identity Theft, and Social Conflict, In: Reloading Data Protection, doi:10.1007/978-94-007-7540-4_15 | |
gi.citations.element | Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, Lorrie Faith Cranor (2011): "I regretted the minute I pressed share", In: Proceedings of the Seventh Symposium on Usable Privacy and Security, doi:10.1145/2078827.2078841 | |
gi.citations.element | Michel Fayole Dounla (2022): WhatsApp et continuité pédagogique à l’ère de la COVID 19 : l’exemple de l’Université internationale Jean-Paul II et de l’Institut universitaire royal de Baboutcha-Nintcheu (Cameroun), In: Revue internationale des technologies en pédagogie universitaire 2(19), doi:10.18162/ritpu-2022-v19n2-05 | |
gi.citations.element | Simon Jones, Eamonn O'Neill (2010): Feasibility of structural network clustering for group-based privacy control in social networks, In: Proceedings of the Sixth Symposium on Usable Privacy and Security, doi:10.1145/1837110.1837122 | |
gi.citations.element | Nazanin Andalibi, Andrea Forte (2018): Announcing Pregnancy Loss on Facebook, In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3173574.3173732 | |
gi.citations.element | Simon Jones, Eamonn O'Neill (2011): Contextual dynamics of group-based sharing decisions, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979200 | |
gi.citations.element | Gina Merchant, Nadir Weibel, Kevin Patrick, James H Fowler, Greg J Norman, Anjali Gupta, Christina Servetas, Karen Calfas, Ketaki Raste, Laura Pina, Mike Donohue, William G Griswold, Simon Marshall (2014): Click “Like” to Change Your Behavior: A Mixed Methods Study of College Students’ Exposure to and Engagement With Facebook Content Designed for Weight Loss, In: Journal of Medical Internet Research 6(16), doi:10.2196/jmir.3267 | |
gi.citations.element | Kelly Quinn (2014): An Ecological Approach to Privacy: “Doing” Online Privacy at Midlife, In: Journal of Broadcasting & Electronic Media 4(58), doi:10.1080/08838151.2014.966357 | |
gi.citations.element | Louise Barkhuus, Juliana Tashiro (2010): Student socialization in the age of facebook, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1753326.1753347 | |
gi.citations.element | Mucheol Kim, Jiwan Seo, Sanghyun Noh, Sangyong Han (2011): Identity management‐based social trust model for mediating information sharing and privacy enhancement, In: Security and Communication Networks 8(5), doi:10.1002/sec.379 | |
gi.citations.element | Manya Sleeper, Lorrie Faith Cranor, Sarah K. Pearman (2017): Exploring Topic-Based Sharing Mechanisms, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3025453.3025840 | |
gi.citations.element | Nazanin Andalibi (2020): Disclosure, Privacy, and Stigma on Social Media, In: ACM Transactions on Computer-Human Interaction 3(27), doi:10.1145/3386600 | |
gi.citations.element | Wouter M.P. Steijn, Alexander P. Schouten (2013): Information Sharing and Relationships on Social Networking Sites, In: Cyberpsychology, Behavior, and Social Networking 8(16), doi:10.1089/cyber.2012.0392 | |
gi.citations.element | Mark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, Margaret E. Morris (2011): It's not that i don't have problems, i'm just not putting them on facebook, In: Proceedings of the ACM 2011 conference on Computer supported cooperative work, doi:10.1145/1958824.1958876 | |
gi.citations.element | Elena Ferrari, Marco Viviani (2013): Privacy in Social Collaboration, In: Handbook of Human Computation, doi:10.1007/978-1-4614-8806-4_70 | |
gi.citations.element | Avelie Stuart, Arosha K. Bandara, Mark Levine (2019): The psychology of privacy in the digital age, In: Social and Personality Psychology Compass 11(13), doi:10.1111/spc3.12507 | |
gi.citations.element | Priya Kumar, Sarita Schoenebeck (2015): The Modern Day Baby Book, In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675149 | |
gi.citations.element | Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh (2013): "i read my Twitter the next morning and was astonished", In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2470654.2466448 | |
gi.citations.element | Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, Sakari Tamminen (2011): We're in it together, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979420 | |
gi.citations.element | Chloë Brown, Vincenzo Nicosia, Salvatore Scellato, Anastasios Noulas, Cecilia Mascolo (2012): The importance of being placefriends, In: Proceedings of the 2012 ACM workshop on Workshop on online social networks, doi:10.1145/2342549.2342557 | |
gi.citations.element | Sanjay Kairam, Joseph 'Jofish' Kaye, John Alexis Guerra-Gomez, David A. Shamma (2016): Snap Decisions?, In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858451 | |
gi.citations.element | Nora McDonald, Andrea Forte (2022): Privacy and Vulnerable Populations, In: Modern Socio-Technical Perspectives on Privacy, doi:10.1007/978-3-030-82786-1_15 | |
gi.citations.element | Hedviga Tkáčová, Martina Pavlíková, Zita Jenisová, Patrik Maturkanič, Roman Králik (2021): Social Media and Students’ Wellbeing: An Empirical Analysis during the Covid-19 Pandemic, In: Sustainability 18(13), doi:10.3390/su131810442 | |
gi.citations.element | Hana Habib, Neil Shah, Rajan Vaish (2019): Impact of Contextual Factors on Snapchat Public Sharing, In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3290605.3300256 | |
gi.citations.element | Manya Sleeper, Alessandro Acquisti, Lorrie Faith Cranor, Patrick Gage Kelley, Sean A. Munson, Norman Sadeh (2015): I Would Like To..., I Shouldn't..., I Wish I..., In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, doi:10.1145/2675133.2675193 | |
gi.citations.element | Jun-Ki Min, Jason Wiese, Jason I. Hong, John Zimmerman (2013): Mining smartphone data to classify life-facets of social relationships, In: Proceedings of the 2013 conference on Computer supported cooperative work, doi:10.1145/2441776.2441810 | |
gi.citations.element | Camellia Zakaria, Youngki Lee, Rajesh Balan (2021): Detection of Social Identification in Workgroups from a Passively-sensed WiFi Infrastructure, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(5), doi:10.1145/3449145 | |
gi.citations.element | Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, Michelle L. Mazurek (2016): Sharing Personal Content Online, In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858170 | |
gi.citations.element | Ashwin Bahulkar, Boleslaw K. Szymanski, Kevin Chan, Omar Lizardo (2018): Impact of Attributes on Group Formation, In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), doi:10.1109/asonam.2018.8508658 | |
gi.citations.element | Jayan Chirayath Kurian (2015): Facebook use by the open access repository users, In: Online Information Review 7(39), doi:10.1108/oir-02-2015-0055 | |
gi.citations.element | Ben Marder, David Houghton, Adam Joinson, Avi Shankar, Eleanor Bull (2016): Understanding the Psychological Process of Avoidance-Based Self-Regulation on Facebook, In: Cyberpsychology, Behavior, and Social Networking 5(19), doi:10.1089/cyber.2015.0564 | |
gi.citations.element | Grant Blank, Gillian Bolsover, Elizabeth Dubois (2014): A New Privacy Paradox: Young People and Privacy on Social Network Sites, In: SSRN Electronic Journal, doi:10.2139/ssrn.2479938 | |
gi.citations.element | Joseph Seering, Felicia Ng, Zheng Yao, Geoff Kaufman (2018): Applications of Social Identity Theory to Research and Design in Computer-Supported Cooperative Work, In: Proceedings of the ACM on Human-Computer Interaction CSCW(2), doi:10.1145/3274771 | |
gi.citations.element | Moritz Riesner, Michael Netter, Gunther Pernul (2012): An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites, In: 2012 Seventh International Conference on Availability, Reliability and Security, doi:10.1109/ares.2012.20 | |
gi.citations.element | Anne‐Marie van Prooijen, Coen Wirtz, Naomi Ellemers (2024): Organisational antecedents of employee ambassadorship on social network sites, In: European Journal of Social Psychology 6(54), doi:10.1002/ejsp.3094 | |
gi.citations.element | Ariane Ollier-Malaterre, Nancy P. Rothbard, Justin M. Berg (2013): When Worlds Collide in Cyberspace: How Boundary Work in Online Social Networks Impacts Professional Relationships, In: Academy of Management Review 4(38), doi:10.5465/amr.2011.0235 | |
gi.citations.element | Michelle Richey, Aparna Gonibeed, M. N. Ravishankar (2017): The Perils and Promises of Self-Disclosure on Social Media, In: Information Systems Frontiers 3(20), doi:10.1007/s10796-017-9806-7 | |
gi.conference.location | Sanibel Island, Florida, USA |