195 research outputs found

    Older Adults and Information and Communication Technologies in the Global North

    Get PDF
    At all ages, people are incorporating information and communication technologies (ICTs) into their lives. It is not that they have stopped talking with each other in-person, it is that ICTs complement their interactions when they cannot be together face-to-face. Since the 1990s, email has provided a routine way to stay in touch and sustain meaningful contact over distance. But not all age groups have adopted ICTs with the same enthusiasm. Research in the Global North has consistently reported that age plays an important role in ICT adoption and use (Anderson and Perrin 2017). For example, older adults have been the least likely to use ICTs, and even when they do use ICTs, they are less active in their use (Blank and Groselji 2014; Haight, Quan-Haase, and Corbett 2014; Schreurs, Quan-Haase, and Martin 2017). Yet, this is changing. As more older adults use ICTs, analysts are wondering how such ICTs affect older adults’ social networks (Wang, Zhang and Wellman 2018; Wellman, Quan-Haase and Harper forthcoming): Are ICTs helping older adults build, maintain, or diminish personal networks? And how are they supporting or limiting the exchange of social support both for local and long-distance social networks? Moreover, are ICTs affecting different types of social ties differently—be they kin, friend, neighbor, workmate, or churchgoer; or strong or weak

    Beyond the call of duty: Why customers contribute to firm-hosted commercial online communities

    Get PDF
    Firm-hosted commercial online communities, in which customers interact to solve each other's service problems, represent a fascinating context to study the motivations of collective action in the form of knowledge contribution to the community. We extend a model of social capital based on Wasko and Faraj (2005) to incorporate and contrast the direct impact of commitment to both the online community and the host firm, as well as reciprocity, on quality and quantity of knowledge contribution. In addition, we examine the moderating influence of three individual attributes that are particularly relevant to the firm-hosted community context: perceived informational value, sportsmanship, and online interaction propensity. We empirically test our framework using self-reported and objective data from 203 members of a firm-hosted technical support community. In addition to several interesting moderating effects, we find that a customer's online interaction propensity, commitment to the community, and the informational value s/he perceives in the community are the strongest drivers of knowledge contribution

    When algorithms shape collective action: Social media and the dynamics of cloud protesting

    Get PDF
    How does the algorithmically mediated environment of social media restructure social action? This article combines social movement studies and science and technology studies to explore the role of social media in the organization, unfolding, and diffusion of contemporary protests. In particular, it examines how activists leverage the technical properties of social media to develop a joint narrative and a collective identity. To this end, it offers the notion of cloud protesting as a theoretical approach and framework for empirical analysis. Cloud protesting indicates a specific type of mobilization that is grounded on, modeled around, and enabled by social media platforms and mobile devices and the virtual universes they identify. The notion emphasizes both the productive mediation of social and mobile media and the importance of activists’ sense-making activities. It also acknowledges that social media set in motion a process that is sociotechnical in nature rather than merely sociological or communicative, and thus can be understood only by intersecting the material and the symbolic dimensions of contemporary digitally mediated collective action. The article shows how the specific materiality of social media intervenes in the actors’ meaning work by fostering four mechanisms—namely performance, interpellation, temporality, and reproducibility—which concur to create a "politics of visibility" that alters traditional identity dynamics. In addition, it exposes the connection between organizational patterns and the role of individuals, explaining how the politics of visibility is the result of a process that originates and ends within the individual—which ultimately creates individuals-in-the-group rather than groups

    Digital Inequality and Second-Order Disasters: Social Media in the Typhoon Haiyan Recovery

    Get PDF
    This article investigates the intersection of digital and social inequality in the context of disaster recovery. In doing so, the article responds to the optimism present in recent claims about “humanitarian technology” which refers to the empowering uses and applications of interactive technologies by disaster-affected people. Drawing on a long-term ethnography with affected communities recovering from Typhoon Haiyan that hit the Philippines in 2013 triggering a massive humanitarian response, the article offers a grounded assessment of the role of social media in disaster recovery. In particular, the article focuses on whether any positive consequences associated with digital media use are equally spread among better off and socially marginalized participants. The analysis reveals sharp digital inequalities which map onto existing social inequalities. While some of our already better-off participants have access to a rich media landscape which they are able to navigate often reaping significant benefits, low-income participants are trapped in a delayed recovery with diminished social media opportunities. The fact that some participants are using social media to recover at a rapid pace while others are languishing behind represents a deepening of social inequalities. In this sense, digital inequality can amplify social inequalities leading to a potential “second-order disaster.” This refers to humanly perpetuated disasters that can even surpass the effects of the natural disaster

    Perspectives on privacy in the use of online systems

    Get PDF
    Human-Computer Interaction looks to better understand the relationship between people and computers. Our work considers this relationship in the context of privacy and the privacy expectations users have when using online systems. While many surveys suggest the public care about this subject, users often act in a manner perceived contrary to their claims; a notion termed the ‘Privacy Paradox’. However, research suggests privacy is inherently subjective and contextual, leading us to question: do users actually define ‘private online behaviour’ in the same manner as those who study the topic? Although our exploratory survey found a general intersection between participants’ perceptions and those in existing literature, opinions differed in several key areas. For example, we found users often conceptualise protection in less-technical terms and are prone to conflating privacy and security. We believe that when we expand our analyses to the general public, we will see an even greater disparity between privacy perceptions. Through this research we look to inform the development of systems and privacy-protective tools that users can actually appreciate
    • 

    corecore