Professional Documents
Culture Documents
Copyright Page
Edited by Simeon J. Yates and Ronald E. Rice
The Oxford Handbook of Digital Technology and Society
Edited by Simeon J. Yates and Ronald E. Rice
Print Publication Date: Aug 2020 Subject: Sociology Online Publication Date: Aug 2020
ISBN 978–0–19–093259–6
1 3 5 7 9 8 6 4 2
Page 1 of 1
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Preface
Preface
Edited by Simeon J. Yates and Ronald E. Rice
The Oxford Handbook of Digital Technology and Society
Edited by Simeon J. Yates and Ronald E. Rice
Print Publication Date: Aug 2020 Subject: Sociology Online Publication Date: Aug 2020
(p. v) Preface
Introduction
THIS book is based upon work undertaken as part of the UK Economic and Social Re
search Council commissioned project “Ways of Being in a Digital Age”—for which Simeon
was Principal Investigator and Ronald was a member of the Steering Group. The primary
goal of the project was to identify the upcoming research questions and challenges facing
the social sciences as they address the impacts that digital media and technologies are
having and may have. This included a systematic review of prior work and a “horizon
scanning” derived from expert opinion. This book is therefore as full of questions as it is
of findings or answers. In particular, it identifies the topics that the social sciences, often
in interdisciplinary collaboration, will need to tackle—probably sooner rather than later.
The book is structured around the themes of the project—slightly reworked in the light of
the findings. We have called these “domains.” The following list presents their initial de
scriptions, while the last part of Chapter 1 describes the ESRC and subsequent confer
ence and workshops in more detail, the final domains, and their main questions.
Page 1 of 7
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Preface
Challenges
The project, the book, and research on the social impacts of digital media and technology
have faced and will continue to face a number of key challenges. One of the great chal
lenges of working in this field is that of avoiding simplistic “technological determinism”—
or what Grint and Woolgar (2013) call “technism”—an inherent or implied reliance on
“obvious or intrinsic” features of the technology in explanations of technology develop
ment, use, or effects. Technism falls short of “technological determinism”—an approach
that Grint and Woolgar argue is very rarely fully taken—but implies the assumption that
technologies have intrinsic features that determine outcomes. We hope that we have
sought to avoid this as much as we can, and to have captured the reflective and reflexive
nature of the interactions among technologies, social systems and structures, and people.
The interdisciplinary perspectives and the way new technologies have been developing
have also introduced new ethical challenges in our research objects as well as our prac
tices as researchers. Questions around automation, security, surveillance, and privacy
Page 2 of 7
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Preface
(chapters 10, 12, 13, 16, 17, 18, 19, and 22) have complicated how we think about the
(p. vii) relationship between humans and machines and what are the roles of govern
ments, technology companies, and civil society in their design, use, and regulation. When
it comes to conducting research on these subjects or using digital technologies to exam
ine them, researchers also face new ethical challenges of what they can and should ac
cess, collect, analyze, and then present or publish. Digital media and technologies, then,
have complicated how we do research, how we think about our research objects and sub
jects, and who is involved in these processes.
Another challenge is the volume of work out there needing to be reviewed and assessed.
As we note in chapter 2, it is a feature of our contemporary world that the volume of aca
demic work continues to increase at a far greater rate than can be followed. As Petticrew
and Roberts note:
The problem is not just one of inconsistency, but one of information overload. The
past 20 years have seen an explosion in the amount of research information avail
able to decision makers and social researchers alike. With new journals launched
yearly, and thousands of research papers published, it is impossible for even the
most energetic policymaker or researcher to keep up-to-date with the most recent
research evidence, unless they are interested in a very narrow field indeed.
In the ESRC project, and in many of the non-ESRC chapters, we have turned to digital
tools to help manage this mass of literature—to extract topics and concepts from close to
thousands of articles in few hours rather than in tens of thousands of hours. This is an ex
ample of the well-documented fact that digital tools are therefore transforming how we
undertake many aspects of social research. The project therefore provided an opportunity
to experiment with several of these tools and methods (see chapter 2). Thus, two charac
teristics of this Handbook of Digital Technology and Society is the broad range of litera
ture covered in most chapters, and the frequent use of computer-based programs and
techniques for collecting, analyzing, and displaying the results of that literature.
Constant Change
Another key challenge for work in this field is the constantly changing nature of the arte
facts, contexts, and social practices as technologies develop and change, and are adapted
and socially constructed. This is often a clearly two-way street as social change (p. viii)
and regulation change systems and new systems create new opportunities, debates, and
challenges. This influences research as scholars seek to address current issues, new tech
nologies, new behaviors, and new implications. The ESRC chapters have reflected on this
by contrasting the development of concepts and topics over the period of the sampled lit
erature and through the reflections of the experts involved in the ESRC project.
Page 3 of 7
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Preface
This constant change generates a specific set of challenges for theory and methods: Do
we need new theory and methods? Or do our existing tools still work—if slightly modi
fied? We have found in exploring the literature a highly varied mix of work. In many cases
the work is inductive, documenting and evidencing digital media and technology use and
impacts but not testing or evaluating theory—with a good number of papers being “theo
ry free.” Having said this, many papers draw on key social theories—with the notable re-
use and revision of older theory. Uses and Gratifications is one notable “older” social the
ory that has been given new life by examinations of digital media use (see chapters 8, 9,
18, and 21). In other cases, new theory has had to be developed and honed to explore
specific issues or to address challenges specific to digital technology use. An example
here would be “unified user acceptance” theory or models (see chapter 13). Questions
concerning theory that we might address include,
We hope that by documenting issues of theory and method the book can help colleagues
reflect on issues of theory selection and testing, as well as appropriate methodology. In
this way, the book provides a snapshot from a brief period in time, assembling what has
been studied in the area of digital media and technologies with an eye to the future of this
research.
The chapters in the book either present the outcomes from the respective domains of the
ESRC project or they are developed from responses to an open call as part of the Ways of
Being Conference held in 2017 (both of which are described more fully in chapter 1). The
non-ESRC contribution chapters represent reviews, reflections on the state of the art, or
Page 4 of 7
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Preface
the application of reviews to various kinds of evidence in each of the domains. The Table
of Contents provides detailed listings of the sections of each chapter as a guide to their
content and focus. The online versions of each chapter also provide an abstract.
All of the chapters should help provide overviews for, and spark ideas for and debates
about, future research directions in the broad and evolving area of digital technology and
society. As such, we would hope that current and future scholars can draw upon these as
a resource when planning their work, using these chapters as foundations and baselines
for literature reviews, as well as identifying central concepts and topics and larger re
search areas that need more attention and explication. We have also provided a range of
supporting materials and visualizations via the project website at https://
waysofbeingdigital.com.
The production of the materials presented in the ESRC chapters was a complex process
involving contributions of the core research team, the project post-doctoral researchers,
and other colleagues. The ESRC chapters follow a fairly similar and standard initial for
mat developed by the core team—especially Sim Yates, Jordana Blejmar, and Elinor Carmi
—and revised and finalized by Ron Rice. In listing the authorships of these chapters, we
have tried to reflect as accurately as we can the contributions to these chapters from core
project team members, either directly or via Delphi or workshop materials. We more gen
erally acknowledge the contributions made by all across the project.
Ron conceptualized the structure and flow of chapters, worked with Oxford University
Press to develop a shared approach to the book, worked with the chapter authors through
multiple versions of all 25 chapters, and developed and continually updated the surround
ing material to ensure consistency of text and reference format, correspondence of terms,
cross-referencing, and style.
Ron and Sim engaged in multiple iterations of the materials, raising questions, resolving
questions, and sharing detailed descriptions of all the things going on in our personal and
academic lives that continually got in the way of completing the book. Irony, dark humor,
encouragement, promises, arcane analysis details, Byzantine university politics, strikes,
Brexit, floods, fires, emergency administration meetings, changes in contributors’ affilia
tions, reshuffling of chapter order, and debates about the proper use of “concept” or “top
ic” pervaded these email and Skype conversations.
Primary audiences for the Oxford Handbook of Digital Technology and Society are re
searchers, faculty, and graduate students, in one or more of the seven theme areas. The
entire book, and certainly specific chapters, provide required reading for anyone interest
ed in the multifaceted nature of relationships between digital technology and society. Se
condary audiences are policymakers, research funding agencies, libraries, and upper-lev
el college students working on academic projects. The chapters should provide exception
al resources for those working on projects needing literature background and sources for
deeper insights, research results, and theoretical foundations. Readers will benefit from
Page 5 of 7
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Preface
Conclusion
This book was born out of a need to understand what the future research challenges will
be for social research in understanding the relationships among digital technology and
society. It is not meant as a definitive guide to this, but as rather a set of starting points
and provocations to fellow scholars (and ourselves) as to the next steps in research, prac
tice, and policy.
Particular thanks need to go to our colleagues Jordana Blejmar and Elinor Carmi. Jordana
was instrumental in organizing the conference from which the non-ESRC chapters came.
Both Jordana and Elinor managed many of the practicalities of getting the ESRC chapters
together, and they were quick and detailed in providing additional literature reviews and
editorial suggestions for all the ESRC chapters. We obviously need to thank all the con
tributors to the project and to the book without whose input neither the research nor the
contributions to this volume would have been possible.
Sim thanks the ESRC, which funded the project, and the UK Defence Science Technology
Laboratory and the US National Science Foundation, which funded the workshops. He al
so thanks Ron, Jordana, and Elinor for their patience as he got distracted over the life of
the project and book writing by role changes, a secondment to government, and a univer
sity promotion. As ever, thanks to his family: Rachel, Ciaran, Ethan, and Niamh for just
being there (and typing up workshop “yellow stickies”—if only for extra pocket money!).
Ron thanks the Arthur N. Rupe Foundation for funding his UC Santa Barbara endowed
professorship, which supported travel and other resources involved in this project. He al
so thanks Claire for her ongoing tolerance of his frequent late-night editing work, and our
cats Tinker and Belle for their frequent occupation of his desk and keyboard during those
times.
Page 6 of 7
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Preface
We very much appreciate the enthusiastic initial response to our book proposal by Hallie
Stebbins at Oxford University Press, and the ongoing support by the Oxford University
Press Editor Sarah Humphreville. Thanks, too, to the copyeditor Suzanne Copenhagen,
the production team at SPi Global, and indexer Robert Swanson.
Grint, K., & Woolgar, S. (2013). The machine at work: Technology, work and organization.
New York, NY: John Wiley & Sons.
Petticrew, M., & Roberts, H. (2008). Systematic reviews in the social sciences: A practical
guide. New York, NY: John Wiley & Sons.
Page 7 of 7
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
List of Figures
List of Figures
Edited by Simeon J. Yates and Ronald E. Rice
The Oxford Handbook of Digital Technology and Society
Edited by Simeon J. Yates and Ronald E. Rice
Print Publication Date: Aug 2020 Subject: Sociology Online Publication Date: Aug 2020
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
List of Figures
Page 2 of 2
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
List of Tables
List of Tables
Edited by Simeon J. Yates and Ronald E. Rice
The Oxford Handbook of Digital Technology and Society
Edited by Simeon J. Yates and Ronald E. Rice
Print Publication Date: Aug 2020 Subject: Sociology Online Publication Date: Aug 2020
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
List of Tables
4.2 CTM with 15 Manually Selected Topics Merged into Nine Thematically
(p. xxiv)
Page 2 of 5
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
List of Tables
Page 3 of 5
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
List of Tables
Page 4 of 5
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
List of Tables
Page 5 of 5
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Print Publication Date: Aug 2020 Subject: Sociology Online Publication Date: Aug 2020
Simeon J. Yates
(PhD, Open University UK, 1993) is Professor of Digital Culture and Associate Pro-
Vice-Chancellor Research Environment and Postgraduate Research at University of
Liverpool. His research on the social, political, and cultural impacts of digital media
includes a long-standing focus on digital media and interpersonal interaction. More
recently, he has worked on projects that address issues of digital inclusion and exclu
sion. He was seconded to the UK Government’s Department of Digital, Culture, Me
dia, and Sport (DCMS) in 2017 to act as research lead for the Digital Culture team.
He remains the joint-chair of the DCMS Research Working Group on Digital Skills and
Inclusion. His prior work covered topics such as the use of digital technologies in the
workplace, digital media use during crises, and ICT use by the security services. The
majority of his research has been funded by the Economic and Social Research Coun
cil (ESRC), the Arts and Humanities Research Council (AHRC), EU, and industry.
Simeon’s work has often been interdisciplinary and has predominantly involved cre
ative and digital industry partners. He led on a major Engineering and Physical
Sciences Research Council (EPSRC) funded interdisciplinary program (Engineering
for Life) while at Sheffield Hallam. Simeon has been researching the impacts of the
internet and digital media on language and culture since 1990. His PhD thesis (1993)
is a large-scale linguistic comparison of speech, writing, and online interaction. Sub
sequent published work has covered analyses of gender differences in computer-me
diated communication (CMC), gender and computer gaming, email and letter writing,
and science in the mass media. Simeon has written text books on social research
Page 1 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Ronald E. Rice
(PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the Social Effects of
Mass Communication in the Department of Communication at University of Califor
nia, Santa Barbara. Dr. Rice has been awarded an Honorary Doctorate from Universi
ty of Montreal (2010), an International Communication Association (ICA) Fellow, se
lected President of the ICA (2006–2007), awarded a Fulbright Award to Finland
(2006), and appointed as the Wee Kim Wee Professor at the School of Communication
and Information and the Visiting University Professor, both at Nanyang Technological
University in Singapore (Augusts 2007–2009 and June 2010). (p. xxx) His co-authored
or co-edited books include Organizations and unusual routines: A systems analysis of
dysfunctional feedback processes (2010); Media ownership: Research and regulation
(2008); The Internet and health care: Theory, research and practice (2006); Social
consequences of internet use: Access, involvement and interaction (2002); The Inter
net and health communication (2001); Accessing and browsing information and com
munication (2001); Public communication campaigns (1981, 1989, 2001, 2012); Re
search methods and the new media (1988); Managing organizational innovation
(1987); And The new media: Communication, research and technology (1984). He has
published over 150 refereed journal articles and 70 book chapters. Dr. Rice has con
ducted research and published widely in communication science, public communica
tion campaigns, computer-mediated communication systems, methodology, organiza
tional and management theory, information systems, information science and biblio
metrics, social uses and effects of the Internet, and social networks. http://
www.comm.ucsb.edu/people/ronald-e-rice
Authors
Audrey N. Abeyta
(MA, UCSB) is a doctoral candidate at the University of California, Santa Barbara and
an instructor in the Department of Communication at the University of Missouri. Her
research explores the creation and consumption of online information, focusing
specifically on individuals’ motivations to share information online and their assess
Page 2 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
ment of that information. Audrey teaches courses in public speaking, group communi
cation, research methods, and statistics.
Sarah Barnard
Jordana Blejmar
Catherine Brooks
Page 3 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
(PhD, University of California) is the Founder and Director of the Center for Digital
Society and Data Studies (CDSDS), Director of Arizona’s iSchool, and an Associate
Professor in the School of Information. Catherine’s primary research interests focus
on issues of language and culture, with particular concern about data privacy and dig
ital exclusion. She established the CDSDS as an interdisciplinary research center
meant to explore today’s grand challenges related to a digital society and data-driven
culture. Catherine has spent more than 20 years in higher education, she developed
the new Information Science and eSociety degree program for the School of Informa
tion at UA, and has published work on a variety of topics to include supporting faculty
online and training students for life and work in a digital society.
Elinor Carmi
Marta E. Cecchinato
Page 4 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Rob Comber
Crispin Coombs
Page 5 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
pointed to the Board of the UK Academy of Information Systems in 2015 and is a Vis
iting Professor at the University of Sao Paulo, Brazil.
Caitlin D. Cottrill
Anna L. Cox
was the Marie Curie Advanced Researcher Fellow in the Department of Computer
Science at the University of York 2016–2018 during the writing of the chapter. She is
currently Assistant Professor at the Department of Product and Systems Design Engi
neering, University of the Aegean, Greece. Her research interests are in accessibility,
service design and systems thinking, and information design. She has worked on col
laborative research projects funded by the European Union on HCI, intelligent tutor
ing, decision support, library and information systems, and universal design. She also
has an interest in accessibility issues in international (ISO) and European (CEN/CEN
Page 6 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
ELEC) standardization efforts through her voluntary work with ANEC (www.anec.gr).
She has published widely on all these subjects.
Emese Domahidi
William H. Dutton
Jennifer Edmond
is Associate Professor of Digital Humanities at Trinity College Dublin and the co-di
rector of the Trinity Center for Digital Humanities. She holds a PhD in Germanic Lan
guages and Literatures from Yale University, and applies her training as a scholar of
language, narrative, and culture to the study and promotion of advanced methods in
and infrastructures for the arts and humanities. Jennifer is President of the Board of
Directors of the pan-European research infrastructure for the arts and humanities,
DARIAH, and was the Principal Investigator for the European Commission-funded
KPLEX Project.
Page 7 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Peter Edwards
Jerome Fuselier
has been an Associate Researcher at the University of Liverpool since 2008. Before
that he was a Postdoc at Xerox Research Centre Europe. He was awarded his PhD in
2006 at the Université Savoie Mont Blanc.
Nicola Green
Page 8 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
has run the gamut of social sciences, HCI, science and technology studies, media and
cultural studies, and surveillance studies; all intersecting via projects on digital media
technologies and/or sustainabilities of various sorts. Her projects have included work
on virtual reality technologies; mobile devices and everyday mobilities; the rise and
spread of mobile data and “big data”; digital trust, risk, and privacy; and lifestyles,
consumption, and environment. Issues explored across these projects have included
embodiment and identity, organization and discourse, popular media and culture, as
well as the development of qualitative research methodologies and their use in both
HCI research and within social sciences more generally—particularly in respect of
ethnographic, mixed, feminist, and participatory methodologies.
Elisabeth Günther
Ingunn Hagen
Paul Hepburn
is a Research Associate at Heseltine Institute for Public Policy and Practice, Universi
ty of Liverpool. His research interests lie in exploring the potential of the new digital
media to enhance local democracy and local governance. He is also (p. xxxv) interested
in methods and tools for analyzing and explaining the structure of online networks.
Page 9 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Prior to pursuing an academic career, Paul worked in local government conducting re
search, developing policy, and, lately, implementing an e-government program.
Iona C. Hine
Arne Hintz
is Senior Lecturer at the School of Journalism, Media and Culture at Cardiff Universi
ty, where he leads the MA Digital Media and Society, and co-directs the Data Justice
Lab. His research addresses questions of digital democracy, datafication, and commu
nication policy. He has led several collaborative research projects, including Digital
Citizenship and Surveillance Society: State-Media-Citizen Relations after the Snow
den Leaks and Towards Democratic Auditing: Civic Participation in the Scoring Soci
ety. His publications include, among others, Beyond WikiLeaks (Palgrave, 2013) and
Digital Citizenship in a Datafied Society (Polity, 2018).
Donald Hislop
Page 10 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Naomi Jacobs
Page 11 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Gerwyn Jones
Sharron Kuznesof
Yenn Lee
Rich Ling
(PhD, University of Colorado) has focused his work on the social consequences of mo
bile communication. He was a professor at the IT University of Copenhagen, where he
Page 12 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
has served in department management, and he works at Telenor near Oslo, Norway.
Ling has been the Pohs visiting professor of communication studies (2005) at the Uni
versity of Michigan in Ann Arbor, where he has an adjunct position. He is the author
of the book Taken for grantedness (2012 MIT Press), which was recently the subject
of a complementary review in the journal Science. He has also written New tech, new
ties (2008, MIT), The mobile connection (Morgan Kaufmann) and, along with Jonathan
Donner, he has written the book Mobile phones and mobile communication (2009,
Polity). Ling is a founding co-editor of the Sage journal Mobile Media and (p. xxxvii)
Communication. He is the co-editor of the Oxford University Press series Studies in
Mobile Communication with Gerard Goggin and Leopoldina Fortunati. Along with
Scott Campbell he is the founding editor of The Mobile Communication Research
Series and he is an associate editor for The Information Society, The Journal of Com
puter Mediated Communication, and Information Technology and International Devel
opment.
Eleanor Lockley
is Research Fellow and Associate Lecturer at Sheffield Hallam University. Her re
search falls broadly under communication studies and information studies, and work
ing in C3RI means that she has worked on a variety of different interdisciplinary
projects since 2008. One day she can be a human-computer interaction researcher—
the next she can be investigating issues associated with user centered design! Her
previous role in C3RI involved engaging with knowledge transfer activity—meaning
that she has worked on commercial consultancy, as well as on academic projects. She
has recently worked on several European-funded projects; two of note are COURAGE
(2014–2016) and ATHENA (2013–2016). The former involved developing a research
agenda for cybercrime and cyberterrorism based upon user-centered research. Her
role in the latter focused upon human factors and best practices for crisis sense-mak
ing and communication and, in particular, how social media can be best used for cri
sis and disaster management. ATHENA is creating a prototype to enhance the ability
of Local Education Agencies of police, first responders, and citizens in their use of
mobile and smart devices in crisis situations.
Adrian Meier
Page 13 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Georgina Nugent-Folan
Helen Petrie
Michael Pidd
Page 14 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Laura Robinson
Liz Robson
Page 15 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
ized film venues and events within regional provision, as well as how digital platforms
feature in the venue and event-based film experience.
Karen Salt
is Director of the Centre for Research in Race and Rights (C3R) and Assistant Profes
sor at the University of Nottingham. She is an interdisciplinary scholar with (p. xxxix)
strong interests in transnational American studies and Afrodiasporic studies. A signifi
cant portion of her work investigates how black nation-states have fought for their
continued existence within a highly racialized world. As this work has developed, Dr.
Salt has considered the relationship of sovereignty and race to environmental con
sumption and protection, enabling her to craft new research on racial ecologies. In
addition to this work, she currently leads or co-leads projects on reparative trust, col
lective activism, racial equity, and transformative justice politics.
Alison Scott-Baumann
Boyka Simeonova
Page 16 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Stanimira Taneva
is currently Senior Researcher and REF Impact Officer, School of Sociology and So
cial Policy, University of Nottingham, United Kingdom. During the work on her chap
ter, she was a Senior Research and Enterprise Associate and a member of the Centre
for Professional Work and Society at the School of Business and Economics at Lough
borough University. Her background is in developmental and work/organizational psy
chologies, as well as psychometrics. Stanimira’s work experience is a combination of
academia and practice—she has been in academic, research, management, and ex
pert roles in the public, private, and third-sector. Stanimira has conducted a variety of
academic and applied research programs in areas such as developing and managing
careers, (age-) diversity, well-being, and performance in organizations. In 2013 she
was awarded a Marie Curie Fellowship from the European Commission for her cross-
cultural research on successful aging at work. Stanimira’s most recent research inter
ests include cross-disciplinary research impact and the exploration of the impacts of
new technology (e.g., AI) on work. She is a fellow at the UK Research and Innovation
Future Leaders Fellowships program Peer Review College.
Claire Taylor
is Gilmour Chair of Spanish and Professor of Hispanic Studies at the University of Liv
erpool. She is a specialist in Latin American literature and culture and has published
widely on a range of writers, artists, and genres from across the region. Her particu
lar geographical areas of interest are Colombia, Argentina, and Chile, although she
also worked on literature, art, and culture from other regions. Within (p. xl) Latin
American Cultural Studies, she takes a particular interest in the varied literary and
cultural genres being developed online by Latin(o) Americans, especially hypertext
novels, e-poetry, and net art. She has published numerous articles and book chapters
on these topics, and she is the co-author of the recent volume Latin American identity
in online cultural production (New York: Routledge, 2012) and author of the recent
monograph Place and politics in Latin America digital culture: Location and Latin
American net art (New York: Routledge, 2014). She is currently working on an AHRC-
funded project focusing on memory, victims, and representation of the Colombian
conflict.
Page 17 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Leanne Townsend
is a Senior Social Scientist working within the Social, Economic, and Geographical
Sciences Group at the James Hutton Institute, Aberdeen, Scotland. Leanne leads re
search on a number of projects exploring digitization and innovation in various rural
contexts, including agriculture, rural entrepreneurship, and rural community develop
ment.
Sharon Wagg
Paul Watry
Vishanth Weerakkody
Page 18 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Monica Whitty
Page 19 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
About the Contributors
Nicole Zamanzadeh
received her PhD from the University of California, Santa Barbara. Her research in
terests include new media, stress, and family resilience. Her current work investi
gates questions about media use habits such as media multitasking as a potential
source of stress or resilience for individuals and the family system. (p. xlii)
Page 20 of 20
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.1
This chapter summarizes the main themes associated with relationships between digital
technology and society. It first proposes four central characteristics of digital technology
that differentiate this concept from the more general term “information society.” Then it
maps the growth of the use of terms associated with digital technology in articles in acad
emic databases from 1972 through 2018, and in books from 1967 through 2008. Howev
er, the main focus is on summarizing the emergent themes associated with 89 recent
books on digital technology society: (A) theory and conceptualization of this vast social
change; (B) technology (venues and characteristics), (C) issues (content, creation; big da
ta; civic issues; participation, engagement; inclusion, exclusion, discrimination; ethics,
ethical issues; and managing the digital experience), (D) contexts (digitization of self and
others; health; relationships; user groups; culture, everyday life, education, learning;
work and organizations; and law, policy, regulation), and (E) effects (negative; positive;
societal; contradictions, paradoxes, tensions, unintended). Finally, it describes the origins
and motivations for this handbook and its main themes.
Keywords: academic databases, books on digital technology, digital technology, digital technology society, infor
mation society, social change
Introduction
MANY developed countries have become information or knowledge societies, whereby
cognitive activities, symbolic and data analysis, and information resources are replacing
agriculture and manufacturing as the primary sectors of developed countries’ economies.
This idea of the information society or economy has been identified, discussed, and ana
lyzed since the 1960s. For example, Machlup’s (1962) analysis of the US economy identi
fied an information sector, primarily devoted to information activities necessary to pro
duce physical goods and services. Porat (1971) reanalyzed Machlup’s data to define the
key components of the growing information society. Bell (1973) explained the post-indus
Page 1 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
trial economy, whereby knowledge becomes the primary resource, allowing freedom from
constraints of labor, land, and machines.
But we can argue that the concept of an information society does not, in itself, require
computers or digitization (Beniger, 1989). The extensive collection and analysis of infor
mation, especially about transactions and inventory, but also about local and regional ad
ministration, has existed from early civilizations (Egypt, Mesoamerica, Mesopotamia).
Nevertheless, it can be argued that the information society as we see it now has roots in
the growth of the British Empire and systematic organizational management (Yates,
1993); the need to control and market industrial revolution technologies and products
(p. 4) (Beniger, 1989); and even the development of dictionaries, maps, and classification
schemes during the “age of enlightenment” (Headrick, 2002). The core argument is that
the basis of wealth is shifting to the collecting, management, analysis, and application of
data and information (Daley, 2015; Nonaka & Takeuchi, 1995). This shift is also a manifes
tation of the rise of information capitalism and the exploitation of knowledge labor
(Castells, 2000; Curtin & Sanson, 2016; Fuchs, 2014). Thus, information is a crucial as
pect of modern economies, as well as everyday life, in most countries, although with con
siderable disparities across countries and even within regions, cities, and towns.
But the digital society involves additional dimensions. While mainframe digital computers
had played major roles in WWII and after in telephone switching, office automation, and
manufacturing in the 1960s and 1970s, the advent of end-user computing, widescale so
cial uses of computing, and networked communication such as email and the Internet re
quired the interaction of several factors. Although literature on the history of computing,
transmission networks, the Internet, and programming is vast, we need to note only four
basic components that underpin the transformative nature of the digital world.
The first is digitization, or more specifically, the encoding of information into bits (binary
digits). Negroponte (1995) was an early (but not the first) popularizer of the understand
ing that “being digital” was the foundation for widespread, pervasive, and unique
changes in our social, economic, and political world. He articulated the main difference
between the analog and digital world: the first, traditional, world was based on atoms
(physical material), while the second, digital, world was based on bits, standing for “bina
ry digits”: symbolic or electronic signals indicating presence or absence, “on” or “off,” or
more colloquially, “0s” and “1s.” By converting information from analogue to digital rep
resentation the information contained within or collected about a process or artefact
(Zuboff, 1985), one could “free” the information from its material “packaging.” For exam
ple, in the analog world, a book means the paper-based bound set of pages on which
words and images are printed. However, in the digital world, the content becomes inde
pendent of any particular physical form. So digital information is freed from the analog,
material world. In 1987 (though he had earlier raised this point in a 1984 Hacker’s Con
ference; http://www.rogerclarke.com/II/IWtbF.html), Brand (1987) claimed that “Informa
tion wants to be free,” in a slightly different way. First, its cost approaches zero because
it is freed from material resources and so is easily storable, copyable, and distributable—
although today we can recognize the infrastructural and environmental costs of moving
Page 2 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
data around. He also noted at the same time that information wants to be expensive be
cause it may require exceptional resources to create initially, and can be extremely valu
able if held privately or used in combination with other information. Importantly, he noted
that there seemed to be a tension between these two tendencies, which may rise or fall in
different contexts. He also noted that information sought to be politically free as access to
high-quality information and free speech fosters political freedom—though we might to
day note that propaganda and misinformation are just as easily distributed. The key point
is that digitizing information—converting frequencies, symbols, material dimensions, etc.
to bits in a flow of information—means that content (p. 5) in general is wholly or partly in
dependent from the material used to convey the information (such as a the text in a print
ed book). This is one of the foundations for digital convergence: the same or different por
tions of content can appear via multiple devices, at the same or different times; and all
digital media can partake of the same content in different forms.
The second component is computing. Digitization also means that this content can now be
treated as data by computer processes, vastly increasing what can be done with, or by,
that content. For example, instead of one or two “see also” cards in a library’s card cata
log associating a given book with other books, now almost any content in a digitized
source can be searched and associated with similar or related content in the same or oth
er sources. At present it is not perfect for all content (such as images, sounds, smells) but
iterations of improved computing power and algorithms make this easier and easier.
Thus, any kind of content (information in various forms) can be processed through com
puting programs. Information becomes a powerful raw resource and can be transformed,
combined, integrated, and analyzed. This is the essence of datafication and digitization:
anything that can be formally and systematically represented in a digital form can then
be processed, combined, and analyzed, for a vast and growing range of purposes.
Practically related but conceptually distinct, the third component is microprocessors via
integrated circuits, the increasingly small and powerful devices for performing a wide ar
ray of computer processes. The integration of basic computing functions into one chip in
creased computing functionality, speed, and power, yet reduced computing size and com
puting power cost, leading to the ability to embed computing power into ever smaller ob
jects. Current smartphones and games consoles easily outperform super computers of the
1980s and early 1990s (as measured by calculations per second). Recent developments in
massive multiprocessing and quantum computing, and embedding of computing power
onto and into tiny devices and our bodies, will extend this growth in power and decrease
in size.
Page 3 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
using various protocols to standardize and facilitate exchange of digital information from
source to receiver. Wireless networking allows devices and people to communicate with
each other without constraints of physical wiring, also enabling computing power to be
distributed throughout space (such as in the Internet of things, radio-frequency identifica
tion [RFID], and mobile phones).
The transformative power of the digital comes from combining these elements. If we put
these together, we can move artefacts and ideas around the globe, and at increasing
speed. We can undertake a 3D scan of a contemporary artwork or new product, send the
data around the world, and print it out on a 3D printer minutes later. Citizen journalists
(p. 6) can live-stream news events as they happen. Doctors can diagnose patients from
thousands of miles away. Consumers can watch almost any film or listen to almost any
music ever recorded. Grandparents can see and talk to the grandkids in Australia. Politi
cians can directly message followers to their heart’s content. The examples are ever ex
panding.
The four primary terms that have been used to refer to such changes are digital age, digi
tal era, digital society, and digital technology. In the spirit of some of the literature analy
ses to follow that utilize digital tools to extract and evaluate academic discussions about
the social impacts of digital, we have used databases to explore how these terms were
first used. Tables 1.1 through 1.4 show the first entries that used these terms in major
academic reference, news, and periodicals databases (Web of Science, Science Direct,
Nexis Uni News, and Proquest Periodicals Index Online, respectively). While in general all
four terms began being mentioned in publications covered by these four sources between
1972 and 1983, the earliest terms used were “digital technology” (1967) and “digital soci
ety” (1968), followed by “digital era” (1970) and then “digital age” (1982). Naturally,
most were mentioned in reference to the growth and development of computers and digi
tization. For example, “digital technology” typically referred to computers, computerized
control, data flow, and the computer-based telephone switching network. “Digital society”
noted the diffusion of technology use in everyday contexts. “Digital era” highlighted the
Page 4 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
introduction of the personal computer, digital satellites, and industrial automation; while
the “digital age” referenced the transition of technology to digital forms, and twice with
specific reference to analog models. However, not all mentions of these terms related on
ly to new technological developments at the time. Both “digital technology” and “digital
society” were associated with new training and education, and the first discussion of “dig
ital technology” (in 1967) specifically emphasized its potential social and economic im
pacts. Some of these (p. 7) (p. 8) (p. 9) impacts of the “digital age” were quite novel: for
example, an early concern about the switch to digital clocks was that people would no
longer know what “clockwise” meant. So we see that right from the beginning that social
aspects and implications (both positive and negative) were part of the discussion, even
though the very first uses of these four terms were stimulated by technological develop
ments.
Page 5 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Page 6 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Newstead, A. (1977). Australia’s telecom 2000. Telecom
munications Policy, 1(2), 158–162. “Continue network studies
on optimum rate of transition to digital technologies in
transmission and switching …”
Schnieder, E. (1977). Control of DC-drives by microproces
sors. IFAC Proceedings Volumes, 19(10), 603–608. “The
current signal is the only analogue variable requiring A/D
conversion, since speed measurement can be performed
by digital techniques thus disposing of analogue trans
mitters such as DC tachometers.”
Fujii, K., Takeda, N., Kogure, Y., Neda, T., … Abe, M.
(1977). Recent computerized power generation plant au
tomation and advanced man-machine interface system.
IFAC Proceedings Volumes,10(1), 16–20. “In the future,
their reliability will have to be highly improved using mi
crocomputerized digital technology for example.”
Nyborg, P. S. (1977). Computer technology and US com
munications law. Telecommunications Policy, 1(5), 374–
380. “Significant technologies, among others, are large-
scale integration, software control of switching devices
and terminals, digital technology, and new services and
techniques relating to audio transmission (including satel
lite).”
Owen, E. W. & Moseley, E. C. (1977). A user-compatible
terminal for medical applications. Computers in Biology
and Medicine, 7(2), 165–176. “He is currently working on
the application of microprocessor and related digital
technologies to these fields.”
Page 7 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Table 1.3 First Appearances of Four Major Digital Terms in Nexis Uni
(News)
Page 8 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Table 1.5 lists the earliest mentions of these same four terms in books that Google has
digitized and indexed, and that were retrieved through their Ngram Viewer (https://
books.google.com/ngrams). For some of these, the plots do indicate entries before 1967,
but either those do not retrieve an entry, do not retrieve a book entry, or are snippets
from journals whose starting publishing date was in that time range, but the document
with the term occurred in a much later issue. Ngram Viewer provides results through
2008. Figure 1.1 shows the trends in these four sets of terms over time. In books, the
“digital technology” focus is the most frequently mentioned over time, really increasing
during 1975–1995. However, the terms “digital society” (1965) and “digital era” (1969)
appeared a bit earlier. The term “digital age” was the last to be introduced, around 20
years later, but quickly became the most used term indicating the societal aspects of digi
tal technology.
Page 9 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Page 10 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Page 11 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Presuming that books integrate and distill considerable prior work, and represent topics
that are important, salient, and likely of broad and timely concern, we turn to recent
(p. 10) books for indicators of the main issues and contexts about digital technology and
society. Using the same four sets of terms, we searched Amazon Books for relevant titles,
and relevant recommended titles, in the past decade. We ended up with 89 books, from
2009 to 2018 (M = 2015.2). There are of course many more books related to various as
pects of digital technology and society, both those retrievable through other terms and
from earlier (p. 11) years, but this seems a reasonable sample (in both size and source) to
represent the most frequent and important issues and contexts. Within this sample 77
Page 12 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
were (co)authored, and 12 were edited (including one encyclopedia); 16 were general
(i.e., textbook, overview or coverage of many issues), and 73 were specific (about an iden
tifiable issue or topic; e.g., youth and media, or Internet governance). Again, as our goal
was to identify main issues and contexts, we did not analyze the text of each book; rather,
we collected information about each book, including summaries, reviews, prefaces, and
table of contents; that is, what do the authors and others think the book is “about,” or
what topics do they emphasize? We combined all those materials about each book into a
file for each book. The total text across all books constituted around 29,000 words. We
read each file, compiling a list of possible issues and contexts from each one. We then re
viewed that compilation, reorganizing, regrouping, and combining terms into an alpha
betized list of main codes and subcodes. This grouped list provided our initial a priori
coding scheme. Needless to say, others might have developed a more or less different list,
many of the subcodes could have been included with other main codes, and more or less
different main codes could have been developed. We will return to a possible different
grouping of the main codes later on. The purpose of the following overview is to identify
some of the primary themes and topics of recent books in this domain.
We entered those 89 book summary files and the initial coding taxonomy into NVivo 11.
Then we re-read each book file and coded the materials using the initial codes, as well as
adding new codes as they arose. After coding all files, we revisited the coding taxonomy
and again reorganized, regrouped, and combined terms, and then re-coded the book files.
For the following overview of the issues and contexts covered in these books, we re-orga
nized the main codes by general themes: (A) Theory and Conceptualization, (B) Digital
Technology, (C) Issues, (D) Contexts, and (E) Effects. Table 1.6 lists the general themes,
their main codes and their subcodes, along with the number of sources that used that
code and the number of times (references) that code was used.
Page 13 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Table 1.6 Themes, Main Codes and Subcodes Used to Identify Issues
and Concerns in Recent Books on Digital Technology and Society
Diffusion (39)
A2. Names for new digital technology and society era [49]
Page 14 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Page 15 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
B. Technology
Blockchain (81)
Smart homes, cities, e-government (5, 11, 37, 39, 41, 77, 81)
Social media-networking sites (4, 11, 39, 51, 57, 79, 80, 85)
Page 16 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
C. Issues
Crowdfunding (7)
C2. Big data, data mining, data storage, analytics, user data [56]
Big data, data mining, data analytics (5, 11, 14, 29, 39, 51, 56, 59, 71,
84)
Data user, personal, online, digital traces (22, 35, 51, 55, 61, 73, 75,
83, 84)
Page 17 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Privacy, surveillance, security, anonymity (5, 10, 12, 15, 18, 19, 26, 39,
40, 45, 48, 53, 59, 61, 64, 69, 82, 84, 87)
Engagement, participation civic (3, 5, 27, 37, 46, 53, 59, 65)
C4. Participation, engagement [7] (5, 12, 27, 45, 48, 70)
Inclusion, exclusion; equality, inequality (7, 18, 37, 53, 54, 59, 69, 81,
88)
C6. Ethics, ethical issues [6] (28, 29, 45, 47, 64)
C7. Manage digital experience [8] (23, 29, 35, 38, 39, 41, 53, 57, 60,
79, 81)
D. Contexts
Page 18 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Biosensing, quantified self & animals (5, 10, 47, 49, 52, 55, 59, 61, 67,
84)
Friendship (44)
Identity, selfhood (12, 18, 19, 22, 38, 40, 43, 44, 51, 54, 64, 65, 82, 87)
Social (interactions, relationships, networks (6, 18, 35, 46, 54, 70, 72,
82)
African-Americans (38)
Page 19 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Worshippers (8)
Youth (6, 12, 39, 44, 45, 53, 54, 64, 69, 80)
Domesticity (26)
Education, learning (5, 13, 30, 37, 41, 44, 53, 54, 64, 69)
Everyday life, practice (4, 9, 21, 26, 38, 39, 53, 54, 58, 80)
Labor, creative, digital, employment (7, 13, 30, 33, 39, 76, 77)
Organizations & business (10, 21, 24, 39, 41, 57, 71, 79, 81)
D7. Law, policy, regulation [12] (23, 29, 35, 38, 39, 41, 53, 57, 60, 79,
81)
E. Effects
Page 20 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Multitasking (82)
Creativity (34)
Crime (36)
Economy, economics (13, 30, 39, 41, 58, 71, 81, 87)
Page 21 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
A1. Theory. Theoretical perspectives are not likely to be highlighted in book summaries
or reviews, especially in edited books. However, of those mentioned, several appear multi
ple times. A socio-technical approach appears in Athique’s (2013) overview of digital me
dia and society; Beyes, Leeker, and Schipper’s (2017) analysis of digital performance: and
Dourish and Bell’s (2011) discussion of ubiquitous computing. Network theory is an obvi
ous framework for considering digital technologies due to their networked nature and the
rise of a global network society, and how they connect people through social networks
and social networking sites (González-Bailón, 2017; Graham & Dutton, 2014; Krieger &
Belliger, 2014; Lindgren, 2017). Similarly, as digital technologies provide mediated com
munication, representation, and interaction, mediation and materiality theories are rele
vant (Cubitt, 2016; Fotopoulou, 2017; Gillespie, Boczkowski, & Foot, 2014). Other speci
fied theoretical approaches include critical studies, sociological theories, and others rang
ing from public goods and social capital to diffusion of innovations and digital divide. Sev
eral books emphasize multiple theories, related to areas such social media, cyber-opti
mism, social interaction, social change, identity, development, education, and participa
tion (Lindgren, 2017; Livingstone, 2009).
Names for new social era. Based on the article and NGram analysis, we might refer to
the emergence of relationships between digital technology and society as the “Digital
Age.” Indeed, several books use some variant of that (Bauerlein, 2011; Bennett, Chin, &
Jones, 2015; Berry, 2015; Lindgren, 2017). However, in recent books authors have used a
wide variety of terms. Some refer to a broad phenomenon (culture of connectivity, digital
age/society/revolution, ecosystem of connective media in a culture of connectivity, fourth
industrial revolution, global information/network society, the familiar term (p. 15) informa
tion society, next Internet, the participatory condition, second machine age, super con
nected society, and third wave of computing technologies). Several of these emphasize
the increased opportunities for connecting, communicating, and networking (Barney et
al., 2016; Castells, 2015; Chayko, 2017; Chun, 2017; James, 2014; Van Dijck, 2013).
Barney et al. (2016) refers to this as the “participatory condition,” whereby participation
has become the theme for most everyday activities; similarly, Van Dijck (2013) shows how
social media in particular have created a “culture of connectivity,” and Chayko (2017) ar
gues that the Internet and digital media in general have made social life “superconnect
ed.” Others indicate more specific aspects (age of big data, the attention economy, mass
surveillance society, new mobile age, and the “softwarization” of society; Berry, 2015;
Kvedar, Colman, & Cella, 2017; Lynch, 2016; Schneier, 2015; Wu, 2017). Note that all but
one of these are concerned with how large-scale collection of user behavior both fuels the
Page 22 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
economy as well as enables individual, corporate, and government surveillance. More
common, however, is a general reference to the integration of biological, cultural, eco
nomic, environmental, political, psychological, social, and technological dimensions.
Athique (2013) and Berry (2015), for example, discuss how digital systems pervade all as
pects of our lives, especially given vast global information and communication networks
(Castells, 2015). Many of these broader approaches emphasize how the technological and
the social are interrelated (e.g., Graham & Dutton, 2014).
B. Digital Technology
B1. Technology venues. Many other books explain and study specific digital technolo
gies, but those mentioned in the context of societal concerns in these books range from
3D printing/fabrication to online gaming and ubiquitous computing. More frequent are
associations with algorithms, cloud computing, Internet of things, mobility, robots (includ
ing social robots), smart homes and cities, social media, and wearable computing devices/
sensors. Algorithms are both based on, and influence, our search behaviors, news view
ing, online friends, and shopping (Cheney-Lippold, 2017; Turow, 2017), shape who gets
access to social services (Eubanks, 2018), and affect how race and gender are portrayed
in search engine results (Noble, 2018). Cloud computing seems abstract and ethereal, yet
requires massive infrastructure and energy (Hu, 2015), and raises issues of privacy (Gra
ham & Dutton, 2014). The miniaturization of computing power and the increasing reach
and strength of wireless networking provide the foundations for the Internet of things
(Bunz & Meikle, 2017), ranging from interactive refrigerators to worldwide tracking of
shipping containers (Dourish & Bell, 2011), as well as “smart” cities and governments
(Barney et al., 2016; Hanna, 2016). Robots have already replaced many manufacturing
jobs (Ford, 2015), while social robots can provide physical, and emotional support to pa
tients, the elderly, and coworkers (Mosco, 2017). Turkle (2011) argues that mobile phones
are social robots.
B2. Technology characteristics. While not much mentioned at the general level
(p. 16)
of our source documents, some work does approach digital technologies not from their
purely physical or technical aspects, but, rather, from their main functions or capabilities,
the ways in which they mediate. The argument here is that particular technologies and
their manifestations are always changing, so a more conceptual approach is more endur
ing and generalizable. This approach is variously labeled here as affordances, habit, ma
teriality, and mediation. For example, from a patient’s or a physician’s perspective, persis
tent awareness of the patient’s condition is more crucial than a particular medical device
(Rains, 2018), or from a project team’s perspective, searchability of a database in order to
share knowledge is critical independent of the system used (Rossignoli, Virili, & Za,
2017). Continuing, everyday use of a digital technology may, however, make these capa
bilities and affordances become taken-for-granted, habitual, and invisible (Chun, 2017).
Page 23 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
C. Issues
C1. Content, creation. Digital technologies make it possible for all kinds of people to
find, create, share, reshape, and link a dizzying array of existing and unforeseeable con
tent. Familiar content issues include produsage, crowdfunding/sourcing, digital media
production, and online expression. Yet less common topics are discussed as well. Soft
ware, computing, devices, and networks enable new kinds of and ways of presenting, art,
performance, dance, music, and design (Beyes, Leeker, & Schipper, 2017; Gronlund, 2016).
New kinds of digital images (from space and the deep sea) may foster more engaged re
sponses to environmental threats (Cubit, 2016). A major motivation for creating, viewing,
and sharing online content is its humorous nature (Phillips & Milner, 2018), while consid
erable research attempts to understand the power and rapid diffusion of certain memes
(Shifman, 2014). Digital storytelling can be multi-modal, collaborative, and interactive
(Barney et al., 2016).
C2. Big data, data mining, data storage, analytics, user data. Transforming informa
tion and communication from analog to digital has a major, inherent implication: the con
tent is (potentially, depending on the context and laws) now easily captured, stored, ana
lyzed, associated, separated, (re)combined, transmitted, and networked. Thus, there is
considerable recent coverage of issues relating to both specific and very large scale (big)
user data. Such data capture and mining provide the economic model for much digital
media, marketers, and vendors (think social media and search engines, especially), lead
ing to terms such as the attention economy or the attention market, and fundamental
changes in the nature of media audiences (Anand, 2016; Daley, 2015; Napoli, 2011; Sch
neier, 2015; Turow, 2012, 2017; Webster, 2014).
But big data, from personal biosensors to Google searches, also allow both scientific and
commercial analyses of topics otherwise not possible (González-Bailón, 2017; Graham &
Dutton, 2014; Lupton, 2016; Rudder, 2014). For example, Webster (2014) argues that the
expansion of multiple media sources and content allows audiences to (p. 17) both concen
trate attention on, as well as overlap with other audiences across, some outlets and con
tent. The generation, access, analysis, and selling of such personal data also lead to con
cerns about anonymity, privacy, and surveillance. Several have noted the irony in the fact
that while digital technology inspires so much participation and sharing, that very partici
pation generates information that may be used to control, influence, or otherwise shape
us and our possibilities (Barney et al., 2016; Bunz & Meikle, 2017). As Turkle (2011, p.
243) wrote, “Facebook looks like ‘home,’ but you know that it puts you in a public square
with a surveillance camera turned on.”
C3. Civic issues. For some, civic issues are at the heart of debates about digital technol
ogy and society. Awareness, participation, freedom of speech, and exposure to diverse
ideas are crucial for the practice and maintenance of democracy. The public sphere is
now online, but not necessarily civil. Digital and online technology can both facilitate and
constrain, improve and harm, these activities. It provides opportunities for political en
gagement and citizen marketing as well as tools for political message targeting, and opin
Page 24 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
ion control by both governments and corporations (Anduiza et al., 2012; Athique, 2013;
Penney, 2017; White, 2014), but increasingly also by interest groups and individuals. Of
fline divides by class, disability, ethnicity, gender, and race potentially may be overcome
online, but often are reinforced (Reed, 2014). Online spaces provide meeting ground, sup
port, and solidarity for countercultural communities (Lingel, 2017), and citizen and politi
cal activism and collective action, from small towns to governments, and from nations to
global regions, sometimes successful, sometimes not (Castells, 2015; Graham & Dutton,
2014). Online citizen engagement also represents opportunities for and means of identity
expression (Penney, 2017). Some work discusses implications of site and system design,
accessibility, and use on the nature of civic engagement (Godron & Mihailidis, 2016). Un
derlying these civic issues are questions about power and politics shape and are shaped
by new forms of participation and their actors (Barney et al., 2016; Hu, 2015).
C4. Participation, engagement. As noted in the overview about labeling this changing
social condition, a central underlying theme is the increased amount, diversity, forms, and
actors in online participation in general (i.e., other than civic or political). Social media in
particular enable people to engage in communication and activities in multiple ways, con
tinuously (boyd, 2014), often leading to over-dependence and disconnection from ethical
and moral behavior (James, 2014). Yet features and designs, as well as online attitudes
and behavior, still limit participation by those with disabilities (Ellcessor, 2016).
Page 25 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
C6. Ethics, ethical issues. As most commenters note, ethical issues receive limited cov
erage in digital technology discussions. The online environment provides extensive and
new challenges to professional journalism ethics (Elliott & Spence, 2017), data mining
and algorithms distance consequences from ethical criteria (Eubanks, 2018), and youth
users seldom make connections between their online behaviors and more general moral
ethical implications, experiencing ethical blind spots (James, 2014). The very process of
mediation often distances awareness or knowledge of ethical implications (Palfrey &
Gasser, 2016), and the beneficial use of social robots nonetheless has ethical implications
such as emotional dependency and privacy (Kvedar, Colman, & Cella, 2017).
C7. Managing the digital experience. While nearly all books on digital technology and
society have sections on policy, implementation, and individual recommendations, some
specifically focus on advice, based on research, on how to manage and improve one’s dig
ital experience. James (2014), for example, explicates the concept of conscientious con
nectivity, which involves both ethical thinking as well as awareness of and sensitivity to
online dilemmas. Other approaches include exercises for mindful technology use (Levy,
2016), and thriving online (Rheingold, 2012). Johnson (2015) develops the idea of an in
formation diet, or how to evaluate and balance one’s online behaviors and use of informa
tion. Other guides are designed for parents interested in protecting their family from the
negative aspects of the digital age (Steiner, Adair, & Barker, 2013), attempting to protect
your online data and identity (Schneier, 2015), and reducing online shame and hate (Sch
eff & Schorr, 2017). Rowan-Kenyon, Aleman, and Savitz-Romer (2018) specifically honed
in on how universities can improve the experience and retention of first-generation col
lege students through their engagement with digital technology.
D. Contexts
D1. Digitization of self and others. As devices become smaller, and more powerful,
wireless, and connected, very personalized uses have developed, creating the quantified
(p. 19) self movement. People use biosensors (such as fitness trackers, smartphones, eye-
and face-scanners, and even implants) to record their activities and responses, both for
personal interest and health monitoring (Kvedar, Colman, & Cella, 2017; Lupton, 2016),
but also for advertising and consumer user behavior (Turow, 2017). Interestingly, while in
one way this allows people to develop a more detailed sense of their own identity, shared
quantified self data creates online communities who compare and even compete (includ
ing, for example, brain scans; Barney et al., 2016). To some extent, this is one form of the
cyborg or the singularity, or the melding of humans and machines (Beyes, Leeker, &
Schipper, 2017; Kember & Zylinska, 2012; Mosco, 2017). Further, large-scale collection of
such data can be used for medical diagnoses, genetic and epidemiological analyses, and
possible threats to insurance and employment. As a form of the Internet of things, these
applications extend to animals as well, for tracking their diet and health, as well as prove
nance, ownership, location, and migration, from cats to cattle to whales (Pschera & Lauf
fer, 2016). As a complement to this digital data collection via bodily devices and social
media, Humphreys (2018) shows how people have been recording and commenting on
Page 26 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
their personal information for ages, through baby books, photo albums, pocket diaries,
and postcards, to account for their everyday lives.
D2. Health. Health is another major context for digital technology, including computer
ized medical instrumentation, digital device implants, data collection and analysis, health
information monitoring, digital records, network sharing of medical information, online
health information seeking, and mediated communication within support communities
and between patients and caregivers (Rains, 2018; Turkle, 2011). Such technologies can
be used for large-scale as well as personalized health interventions, improve one’s life-
span and health-span (Kvedar, Colman, & Cella, 2017), as well as help manage end-of-life
and bereavement (Rains, 2018).
D3. Relationships. From a communication and interaction perspective, personal and so
cial relationships are a major context for the use and implications of digital technologies.
A frequent focus is on how people create, manage, promote, and try to protect, their
(multiple) online identities and selfhood (Lindgren, 2017). This is especially salient for
youth users (boyd, 2014; Ito et al., 2009; Palfrey & Gasser, 2016; Turkle, 2011), in their
social and classroom lives (Livingstone, Sefton, & Green, 2016). Other central foci are
about online ethnic, gender, racial, and sexual identities (Graham, 2014; Reed, 2014), and
about how data mining entities construct and constrain our online and even offline identi
ties (Cheney-Lippold, 2017). Online communities and services also hold the promise for
bringing together individual identities to create a more powerful and positive (or nega
tive) collective identity (González-Bailón, 2017; Rheingold, 2012), but also blur the dis
tinctions between public and private, and offline and online, identities (White, 2014).
Digital technology and society of course involve far more than just individual-level identi
ty. More relational contexts include engaging in online intimacy even though the content
may be public (Ito et al., 2009). Yet our technologies may be distorting intimacy; as Turkle
(2011) notes, immersion in social media and mobile phones may create an illusion of inti
macy while distancing actual personal relationships. The mobile phone (p. 20) and social
media may help maintain family relationships, especially when children move away to col
lege (Rowan-Kenyon, Aleman, & Savitz-Romer, 2018), but also serve to wrest control
away from parental monitoring and socialization (Graham, 2014; Ito et al., 2009; Living
stone & Green, 2016), both by youth and by their peers and marketing companies (Stein
er, Adair, & Barker, 2013). And, of course, much work concerns the nature, engagement
in, and effects of online communities, ranging from political to health and culture (Lind
gren, 2017).
D4. User groups. Different kinds of audiences, groups, or users have different motiva
tions for and experiences with online and digital technology, so some books focus on spe
cific user groups. These include how African Americans use such technologies to deal
with inequalities (Graham, 2014), how students engage with technology to manager their
transition from home to their first year at college (Rowan-Kenyon, Aleman, & Savitz-
Romer, 2018), how the elderly can manage the end of their lifespan (Rains, 2018), how
LGBTQ members engage in media activism, promote visibility, and work to combat sui
Page 27 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
cide (Fotopoulou, 2017 Gordon & Mihailidis, 2016), and how worshippers participate in
mediated liturgy practices, such as digital prayer chapels and live-streaming of religious
services (Berger, 2017). Much work looks at how youth use digital media, with both posi
tive and negative implications (Bauerlein, 2011). For example, boyd (2014) considers why
youth share so much online and why they are so obsessed with social media, Graham and
Dutton’s book (2014) includes chapters on children’s Internet use and next generation
digital divides, and Steiner, Adair, and Barker (2013) consider how the digital age is sig
nificantly affecting childhood.
D5. Culture, everyday life, education, learning. More general daily concerns include
the ways in which ubiquitous computing might affect the form and meaning of domestici
ty (Dourish & Bell, 2011) and everyday life practices, such as how society is becoming
embedded in software (Berry, 2015), the digital experiences of African Americans (Gra
ham, 2014), and how the Internet is interwoven throughout children’s lives at home,
school, and play (Livingstone, 2009). Research investigates the role of digital technology
in education and learning, such as the participatory potential for education (Barney et al.,
2016; Brynjolfsson & McAfee, 2014), the need for greater civic education (Gordon & Mi
hailidis, 2016), how young people do, or do not, learn through digital media within their
daily class contexts (Livingstone, Sefton, & Green, 2016), the need for greater digital lit
eracy (Johnson 2015; Rheingold, 2012) and ways in which educational technologies such
as MOOCs and scholarly publishing are changing the nature of teaching and research
(Reed, 2014). Concerns about digital culture include how digital technology shapes and is
influenced by broad societal culture (Wiesinger & Beliveau, 2016), artistic and creative
culture (Reed, 2014), and the culture(s) associated with particular media, such as mobile
phones (Lindgren, 2017).
D6. Work and organizations. Another major context, work and organizations, is consid
ered much more in the management and information systems literature. However, recent
digital technology and society books discuss how business models, industries, and
economies are being transformed, such as through crowdsourcing, crowdfunding, (p. 21)
and microcelebrity (Bennett, Chin, & Jones, 2015); the “gig” economy such as Uber and
Airbnb (Daley, 2015); and the ability to identify and monetize attention (Wu, 2017). They
also discuss how the very nature of organizations and industries is changing, towards
more networked, virtual, and distributed forms (Graham & Dutton, 2014).
Note that these opportunities and challenges also apply to not necessarily commercial or
for-profit contexts, such as health provision and caregiving (Kvedar, Colman, & Cells,
2017), and smart cities and technology parks (Hanna, 2016). Not only are innovation
processes crucial to the development and diffusion of new digital technologies, but such
technologies are also necessary for implementing other innovations. For example, innova
tions in medical technologies can transform experiences and possibilities for the disabled
(Ellcessor, 2016), patients (Sonnier, 2017), and caregivers (Rossignoli, Virili, & Za, 2017),
and innovative designs for egovernment (such as ways to visualize data, involvement in
open policymaking, engaging young and feminist activists) can foster greater civic en
gagement (Gordon & Mihailidis, 2016). Digital innovations are making work-life bound
Page 28 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
aries more permeable (Alter, 2017; Schwab, 2017), increasing the ability to share and
manage knowledge (Botto & Resende, 2017), and threatening the loss of traditional and
even knowledge work through artificial intelligence, algorithms, blockchain technology,
and robots (Ford, 2015; Tapscott & Tapscott, 2018).
D7. Law, policy, regulation. As many have noted, technology develops and diffuses
faster than laws, policy, and regulation can keep up with. Should the Internet and social
media be regulated as a common carrier, or subject to the same regulations and liabilities
as other publishers (Graham & Dutton, 2014)? Who should govern what aspects of the In
ternet (Mueller, 2010)? What are the effects of supporting or removing net neutrality?
Should algorithms affecting search results and service provision be regulated and made
explicit (Eubanks, 2018)? What policies and regulations best stimulate public ICT provi
sion (Hanna, 2016)? Is a HIPAA sufficient to protect personal digital medical records
(Sonnier, 2017)?
E. Effects
E1. Negative effects. An enduring research, policy, and popular topic is the extent to
which digital technologies are associated with negative or positive effects. The list of pos
sible implications is endless. The books included here refer to just a few. Addiction is at
the top of many people’s list, both alphabetically and behaviorally (Alter, 2017). As Turkle
(2011, p. 154) notes, “Always on and (now) always with us, we tend the Net, and the Net
teaches us to need it.” But she argues that addiction is not inherent to the technology;
rather it’s to how we practice the use of that technology. For example, social pressures to
be constantly accessible and to respond quickly create stress and reinforce dependencies
(Turkle, 2011). Excessive use also ends up wasting considerable time, often fostering feel
ings of guilt (Goldsmith, 2016). Watching YouTube music videos, and endlessly scrolling
friends’ text messages, do not strengthen personal relations or get one’s (home) work
done.
As noted in the terms associated with digital technology and society, attention has
(p. 22)
gained a lot of attention, not only in regard to the commercial focus on collecting and an
alyzing user attention, but also about the cognitive effects of excessive screen use and
multitasking on attention span (Bauerlein, 2011; Carr, 2011). Further, excessive attention
to our devices reduces our attention to those people around us (Turkle, 2011, p. 268). Re
search has identified a wide array of possible dangers, harms, and risk, including cyber
bullying (Bauerlein, 2011), information overload (Johnson, 2015), threats to children (Liv
ingstone, 2009), and loss of control over one’s identity in the present and the future.
Turkle (2011), for example, notes people’s vulnerability is not just limited to their commu
nication or site content, but also to anyone taking a photo of them or posting comments
about them. There is thus a constant worry about one’s offline behavior being recorded
and distributed. This leads some to self-censor and self-surveil both their online and of
fline comments and behavior. Another kind of harm is online harassment, shaming, hat
Page 29 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
ing, and trolling (Scheff & Schorr, 2017), negatively affecting everyone from children to
CEOs and celebrities.
E2. Positive effects. Needless to say, digital technologies are associated with many posi
tive benefits. Chief among these is the ability to connect and communicate with others,
from family and friends to fellow group members, and with people and organizations oth
erwise unknown and inaccessible, allowing the co-creation of meaning and sharing of re
sources, from emotional support to complex information (Barney et al., 2016). Computing
and networking support new and distributed forms of collaboration and cooperation, in
creasingly between humans and machines, necessary for accomplishing tasks, creating
content, and generating innovative ideas (Brynjolfsson & McAfee, 2014; Rheingold, 2012;
Rossignoli, Virili, & Za, 2017). Tools such as mobile phones and GPS also improve one’s
safety (boyd, 2014), and keep others aware of your locations and activities (Turkle, 2011).
This support for connectivity and relationships also develops social and cultural capital
(Graham, 2014).
E3. Societal effects. More societal negative effects include the uses of digital technolo
gies for crime, including hacking and identity theft, fomenting hate crimes, and drug and
sex trafficking, among many others (Goodman, 2015). Also, little understood is the in
creasingly devastating environmental implications of digital technology, including cloud
computing (with its need for massive server farms consuming increasingly more energy)
and toxic materials recycling (Cubitt, 2016, Hu, 2015, Mosco, 2017). Digital, networked
ICTs have a wide range of negative and positive implications for economies and econom
ics, such as facilitating rapid and global financial crises, and threats to particular indus
tries and jobs, but also making information and transactions more transparent and effi
cient, and supporting micro-economic and entrepreneurial activities and produsage (Gra
ham & Dutton, 2014; Hanna, 2016; Martin, 2017). ICTs have held great promise for the
developing world, from markets and health, to farming and education (Hanna, 2016;
White, 2014). Other global impacts include occasions for (more or less successful) citizen
participation (Castells, 2015), and broader intercultural communication (Cover, 2015).
Page 30 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
(Beyes, Leeker, & Schipper, 2017). For example, Turkle (2011) identifies the following
paradoxes (p. 176, 280):
• Connectivity brings us closer, but some use technology to hide from others
• In order to feel like themselves, users must be connected to their devices and others
• It is easy to find others to interact with, but also to become tired by demands to per
form
• It is possible to make many new connections, but they are often tentative and tempo
rary
• Mobile phones enable as well as inhibit separation from parents, partners, work
• Nonstop connection also means limited attention by self or others
• People can play with identity but are less free from their past
• People like online linkages and features that are based on knowledge about one’s
use, but they are also concerned about the loss of privacy and are constrained by ex
ternally created online identity
• People reject real-time phone but get lost in real-time online gaming
• Providing online content may be available to immediate and broad audiences, but the
content is often depersonalized and abbreviated
• The ability to work from anywhere means one cannot escape work
• Users develop expectations of instant connections to and response from others, but
they themselves are then expected to always be available and respond ourselves
• Users themselves acknowledge tensions between good and bad aspects, and often
say they are resigned to this condition.
What some researchers or users may perceive as a positive aspect may be considered
negative by others. For example, increased ability to participate online may take the form
of reading and posting only to groups with the same interest or political position, thus
limiting exposure to diverse ideas and strengthening polarization (though Webster, 2014,
argues that audiences are fragmented, but also participate in various venues, (p. 24) cre
ating overlapping audiences). By accident or user intent, technology may be used in ways
that designers, vendors, or implementers did not intend, expect, or imagine (Lingel,
2017). For example, González-Bailón (2017) shows how data mining and network analysis
can reveal unintended consequences of individual behavior for collective outcomes. Even
use of digital technology that might be critiqued as “wasting time” can provide a context
for allowing thoughtfulness and creativity (Goldsmith, 2016). The same systems and fea
tures can promote support and caring (Rains, 2018) as well as international crime and
terrorism (Goodman, 2015), democratization as well as authoritarianism (Berry, 2015),
learning as well as fragmented attention (Bauerlein, 2011), empowerment as well as ad
diction (Alter, 2017). ICTs may increase the pace of development and economic growth,
but also increase inequities, work dislocation, and environmental degradation (Cubitt,
2016; Gershenfeld, Gershenfeld, & Cutcher-Gershenfeld, 2017; Hanna, 2016).
Page 31 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Summary
The preceding sections reviewed the main arguments and concerns about digital technol
ogy and society, organized by the emergent coding of subthemes and then the main codes
of Theory and Conceptualization, Technology, Issues, Contexts, and Effects. This provides
a subjective conceptual framework for identifying the most noted and discussed topics of
89 recent books. Another way to identify general arguments and concerns is to assess
how those coded themes co-occur across the material about the 89 books. Figure 1.2
shows the hierarchical clustering of the coded themes, based on the Jaccard similarity co
efficients derived from the co-occurrence of the codes in each source text (provided
through NVivo 11). What constitutes a cluster, or main theme, depends on the cutoff be
tween sets of codes one wants to use. The most general distinction is among three prima
ry clusters.
The first cluster includes Content, creation; Digitization of self & others; Ethics, ethical
issues; Participation, engagement; and Manage digital experience. Given that many of the
Ethics, ethical issues have to do with personal data privacy, much of the Content, creation
material has to do with individual use or production of content, and Manage digital expe
rience emphasizes how individual can (more, or less, effectively) attempt to manage their
own digital usage, this cluster could be considered to represent a major general theme of
Individual uses.
The second cluster contains two subclusters. The first subcluster consists of Theory; Cul
ture, everyday life, education, learning; Relationships; and User groups. This as a some
what diverse grouping, but seems to represent the central social and theoretical contexts
of digital technology: groups, relationships, culture. The second subcluster reflects more
societal issues, such as policy, societal effects, civic and public sphere behavior, inequali
ties, organizations and technology, and very broad issues of the nature of the developing
Page 32 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
societal changes, along with big data. Thus, the entire two-fold cluster might be labeled
Societal and technological issues.
The third cluster is mostly about Effects, notably in the health arena, as well as as
(p. 25)
pects of technologies that might shape or influence those effects. Note that specific nega
tive or positive effects are subsumed within the more complex topic of contradictory and
unintended effects.
Related Work
A detailed analysis of the full content of these books would provide a comprehensive re
view of topics associated with digital technology and society, to say nothing of what indi
vidual articles and chapters discuss. There is, of course, a huge range of review articles,
chapters, books, and handbooks on the many aspects of digital media and society. There
are journals in specific disciplines that publish reviews, and there are handbooks in a
wide variety of related research areas. Almost all of those, however, focus on one disci
pline (e.g., management, information systems, sociology), or one dimension (organization
al communication, privacy, identity), or one technology (e.g., Internet, social media,
videogames). Further, edited books or handbooks in these areas bring together diverse,
expert authors who contribute on the topic of their own specialty, often without an under
lying integrative foundation. Finally, many books on the “digital age” are more popular,
applied, or oriented toward marketing, technology, management, or consulting practice.
For example, Salganik’s Bit by bit: Social research in the digital age (2017) is
(p. 26)
about the conduct and design of research in the digital environment, such as using big
data, experiments, and collaborative studies. Baym’s Personal connections in the digital
age (2015) emphasizes the communication discipline and relationships. Similarly, the
book edited by Wright and Web, Computer-mediated communication in personal relation
ships (2011) exclusively focuses on relational communication. Other books, such as Noble
and Tynes’ (2016) The intersectional Internet: Race, sex, class, and culture online do take
a more interdisciplinary and multi-dimensional approach, applied to a range of digital me
dia, platforms, and infrastructures, in more global and social contexts, but is primarily fo
cused on the issue of intersectionality instead of on more general life in the digital age.
Perhaps the single best overview is that of Mansell et al. (2015) International encyclope
dia of digital communication and society, which covers 150 topics, ranging in length from
2,000 to 10,000 words.
More relevant to this book, there are also handbooks on specific topics and media such as
The Oxford handbook of Internet studies (Dutton, 2014); Routledge handbook of Internet
politics (Chadwick & Howard, 2009); Oxford handbook of Internet psychology (Joinson &
McKenna, 2009); Internet studies (Consalvo & Ess, 2012)–their book’s chapters do cover
a number of similar topics, such as society, and culture, but again focus on the Internet;
and Economics of the Internet (Bauer & Latzer, 2016). The two-volume Handbook of re
search on computer-mediated communication (Kelsey & St.-Amant, 2008) also covers
some similar areas, such as identity (though from a credibility perspective), community
Page 33 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
and information exchange, and culture, but also different areas, such as instruction, de
sign, discourse, and libraries, as well as chapters on specific technology contexts. Similar
ly, more handbooks on the mobile phone are appearing: Handbook of mobile communica
tion studies (Katz, 2008) and Research on human social interaction in the age of mobile
devices (Xu, 2016); as well as for related new media, such as Handbook of digital games
(Angelides & Angus, 2014), and Sage handbook of social media (Poell & Marwick, 2018).
Some handbooks are focused on particular populations, such as Handbook of children and
the media (Singer & Singer, 2011). Sundar’s (2015) Handbook of the psychology of com
munication technology covers a wider array of digital contexts than many of the other
books but does take a primarily individual and group perspective (reasonable, given the
title), though also includes health issues. However, our book does not in any way overlap
with the intriguing Handbook of porous media (Vafal, 2015).
The only recent book that provides a similar multi-dimensional, interdisciplinary, and the
matic review of recent research on life in the digital age is Graham and Dutton’s (2014,
Oxford University Press) edited book Society & the Internet: How networks of informa
tion and communication are changing our lives. That excellent book frames the work as a
major foundation for the new field of Internet studies (along with Dutton’s 2014 Oxford
Handbook of Internet studies). Somewhat similar to the UK Economic and Social Re
search (ESRC) project theme chapters in our book (see the next section), the chapters in
Graham and Dutton’s book evolved from research work and a lecture series at the Oxford
Internet Institute. Their 23-chapter book covers some of the same main areas as (p. 27)
our book (with main sections called: Internet studies of everyday life; Information and
culture on the line; Networked politics and governments; Networked businesses, indus
tries, and economics; and Technological and Regulatory histories and futures). That book
complements this book, but is primarily focused on the Internet, and does not have the
organizing framework of the ESRC project reviews.
The purpose of chapters in this handbook is to provide detailed reviews of central topics
about digital technology and society within our seven domain sections. It includes inter
disciplinary, comprehensive reviews on central aspects of the current digital age. After
the following chapter on project methodology, the next sections move from more individ
ual and relational domains (Section 2: Health, Age, and Home; Section 3: Communication
and, Relationships) to more organizational, community, and citizenship domains (Section
4: Organizational Contexts; Section 5: Communities, Identities, and Class; Section 6: Citi
zenship, Politics, and Participation), and then to more societal and governance domains
(Section 7: Data, Representation, and Sharing; and Section 8: Governance and Account
ability). It ends with Section 9: Synthesis. The chapters within each section provide a sol
id foundation for understanding the current state of research and theory in each of these
areas and for grounding future research, theory, and practice. They also bring to bear lit
Page 34 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
erature from a wide variety of disciplines, necessary for understanding the interrelation
ships between digital technology and society.
Origins
How did these chapters come to life? In 2016, the UK Economic and Social Research
Council (http://www.esrc.ac.uk/) noted that
“[t]he 21st century has witnessed significant changes due to digital technological
advancements, which impacts the way we communicate, receive, consume and
process information, travel, shop and do our work. The presence of digital technol
ogy mediates our perceptions, behaviours and practices across these areas and in
fluences our ways of living, learning, sharing, engaging and seeing the world
around us. This raises a number of fundamental questions about our ways of being
in a digital age, the risks and opportunities associated with digital living, and our
understanding of the individual, community and society [. …] It is apparent that
there is a real need for meta-analytic work to synthesise and interpret the existing
literature and data, to refine and consolidate existing understanding of the social,
cultural, economic, political, psychological and other effects of digitalisation. This
(p. 28) will enable the development of new insights, ideas and methods to be ap
plied to a practical context. This approach will facilitate the exploitation of exist
ing research, but also build new knowledge on synthetic work” (p. 2).
The University of Liverpool, in collaboration with a core project team, and 17 other part
ner Universities and organizations from the UK, EU, USA and Singapore, lead the UK
Economic and Social Research Council (ESRC) scoping review on Ways of Being in a Digi
tal Age (see https://waysofbeingdigital.com/ for details on the project, people, events, and
reports). That scoping study developed a multi-domain holistic view of how digital tech
nology mediates our lives, and of the way technological and social change co-evolve and
shape each other. The project involved an interdisciplinary research team across the so
cial sciences, arts and humanities, engineering, physical sciences and health. The final re
port included reviews and analyses in six domains: Communication, community, and iden
tity; Citizens, politics, and governance; Understanding the platform economy; Data and
digital literacies for engaged and included citizens; Everyday digital health and well-be
ing; and Digital inequalities.
The final ESRC report recommended funding initiatives to emphasize these six core ar
eas. The work should have a strongly social science focus, even where it is interdiscipli
nary. The topics should avoid areas that are already well researched or have been sup
ported by recent or current funding programs. Research efforts need to look more holisti
cally at the social, economic, political, cultural, and community impacts and roles of digi
tal technologies. The ESRC report proposed the following six areas, each with associated
Page 35 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
research topics derived from the literature reviews and analyses, the Delphi surveys and
discussions, and the stakeholder workshops and discussions.
• Role and impact of major corporate digital platforms (Impacts on firms of digital plat
forms, Role of digital monopolies and large corporations)
• Forms of digital labor (Impacts of digital labor on people’s life experience, Gig econo
my, linked to platforms)
Page 36 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Digital inequalities
For this book, these have been reorganized into the following seven ESRC domain
(p. 30)
chapters:
Page 37 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
Beyond the ESRC Project
As culmination of this project, a conference to present project findings and provide a con
text for debate was held on October 10 and 11 2017 at the University of Liverpool
(https://waysofbeingdigital.com/conference/). To complement and critique the work of the
ESRC project reviews, a call was publicized (through association email lists and websites,
and the conference website) to invite others to submit their extended abstracts for pre
sentation at the conference. Each presentation was attended by at least one of the edi
tors. After the conference, the editors went through the program and decided which of
the other researchers to invite to prepare their abstracts, presentations, or papers as full
reviews for the edited book. We were particularly interested in papers that built on re
views to offer analysis of research gaps and challenges for social research in the digital
age. Contributions come from established, early career, and PhD scholars who systemati
cally reviewed a research issue within one of the seven foci of the ESRC project.
Two further workshops developed a closer focus on issues of work and automation. The
joint UK ESRC and Defence Science and Technology Laboratory workshop held on 7th
and 8th of October 2016 at University of Liverpool in London considered the topic of The
Automation of Future Roles. This meeting brought together 33 academics, policy makers,
and industry stakeholders to explore the likely future impact of digital tools in the work
place, in particular the possible implications of the continued “automation” of human
tasks, roles, and jobs; knowledge, skills, and attributes; organizational structures, cul
tures, and development; workforce training, recruitment, engagement, and motivation;
and decision-making in organizations. A joint UK ESRC and US National Science Founda
tion workshop was held on October 12 and 13 2017 at the University of Liverpool on the
topic of Changing Work, Changing Lives in the New Technological World. This brought to
gether 35 experts from the academic and professional community, as well as top execu
tive and program directors from the U.K. Economic and Social Research Council and the
U.S. National Science Foundation to discuss shared programmatic research. In both cases
the two days consisted of intensely interactive group activities, generating extensive in
formation about issues, research programs, and timelines for possible impacts. The write-
up (p. 31) and analysis of these insights provided the basis for chapter 24, which synthe
sizes the implications of the domains for research and practice.
Thus, two primary contributions of the book’s review chapters are their unifying ap
proach and review focus, as well as the diversity of the authors’ expertise and disciplines.
The central ESRC domain reviews are the product of extensive, multi-method, cumulative
work, and provide a macro context for the associated more focused reviews of specific ar
eas within that section. The non-ESRC chapters hone in on more specific topics within
each of the domains, bringing to bear multi-disciplinary reviews and analyses. Overall,
the sections and chapters provide a multi-dimensional perspective on one of the most
consequential aspects of contemporary times: relationships between digital technology
and society.
Page 38 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
References in Main Text
Bell, D. (1973). The coming of post-industrial society: A venture in social forecasting. New
York: Basic Books.
Beniger, J. (1989). The control revolution: Technological and economic origins of the infor
mation society. Boston, MA: Harvard University Press.
Brand, S. (1987). The Media Lab: Inventing the future at MIT. New York: Viking Penguin.
Castells, M. (2000). The rise of the network society. Malden, MA: Blackwell.
Curtin, M. & Sanson, K. (Eds.) (2016). Precarious creativity: Global media, local labor.
Berkeley, CA: University of California Press.
Daley, B. (2015). Where data is wealth: Profiting from data storage in a digital society.
Stoke-On-Trent, UK: Play Technologies.
Machlup, F. (1962). The production and distribution of knowledge in the United States
(Vol. 278). Princeton, NJ: Princeton University Press.
Nonaka, I., & Takeuchi, H. (1995). The knowledge creating company. NY: Oxford Univer
sity Press.
Porat, M. U. (1971). The information economy. Ann Arbor, MI: University of Michigan Li
brary.
Yates, J. (1993). Control through communication: The rise of system in American manage
ment. Baltimore: Johns Hopkins University Press.
1. Alter, A. (2017). Irresistible: The rise of addictive technology and the business of keep
ing us hooked. London: Penguin.
2. Anand, B. (2016). The content trap: A strategist’s guide to digital change. New York:
Random House Group.
Page 39 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
3. Anduiza, E., Perea, E. A., Jensen, M. J., & Jorba, L. (Eds.). (2012). Digital media
(p. 32)
4. Athique, A. (2013). Digital media and society: An introduction. Hoboken, NJ: John Wiley
& Sons.
5. Barney, D., Coleman, G., Ross, C., Sterne, J., & Tembeck, T. (Eds.) (2016). The participa
tory condition in the digital age. University of Minnesota Press.
6. Bauerlein, M. (2011). The digital divide: Arguments for and against Facebook, Google,
texting, and the age of social networking. London: Penguin.
7. Bennett, L., Chin, B., & Jones, B. (Eds.). (2015). Crowdfunding the future: Media indus
tries, ethics, and digital society (No. 98). Bern, Switzerland: Peter Lang.
8. Berger, T. (2017). @ Worship: Liturgical practices in digital worlds. New York: Rout
ledge.
9. Berry, D. M. (2015). Critical theory and the digital. New York: Bloomsbury Publishing
USA.
10. Beyes, T., Leeker, M., & Schipper, I. (Eds.). (2017). Performing the digital: Perfor
mance studies and performances in digital cultures. Bielefeld, Germany: Transcript-Ver
lag.
11. Botto, R. & Resende, L.M. (2017). Digital transformations: Technological innovations
in society in the connected future. Independently published via Amazon Digital Services.
12. Boyd, D. (2014). It’s complicated: The social lives of networked teens. New Haven, CT:
Yale University Press.
13. Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and
prosperity in a time of brilliant technologies. New York: WW Norton & Company.
14. Buckland, M. (2017). Information and society. Cambridge, MA: MIT Press.
15. Bunz, M., & Meikle, G. (2017). The Internet of things. Hoboken, NJ: John Wiley &
Sons.
16. Carr, N. (2011). The shallows: What the Internet is doing to our brains. New York: WW
Norton & Company.
17. Castells, M. (2015). Networks of outrage and hope: Social movements in the Internet
age. Hoboken, NJ: John Wiley & Sons.
18. Chayko, M. (2017). Superconnected: The internet, digital media, and techno-social
life. Thousand Oaks, CA: Sage Publications.
Page 40 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
19. Cheney-Lippold, J. (2017). We are data: Algorithms and the making of our digital
selves. New York: NYU Press.
20. Chun, W. H. K. (2017). Updating to remain the same: Habitual new media. Cambridge,
MA: MIT Press.
21. Couldry, N. (2012). Media, society, world: Social theory and digital media practice.
Cambridge, UK: Polity.
22. Cover, R. (2015). Digital identities: Creating and communicating the online self. Cam
bridge, MA: Academic Press.
24. Daley, B. (2015). Where data is wealth: Profiting from data storage in a digital society.
Play Technologies.
25. Dey, A. (2018). Nirbhaya, New media and digital gender activism. Bingley, UK: Bing
ley, UK: Emerald Group Pub Ltd.
26. Dourish, P., & Bell, G. (2011). Divining a digital future: Mess and mythology in ubiqui
tous computing. Cambridge, MA: The MIT Press.
27. Ellcessor, E. (2016). Restricted access: Media, disability, and the politics of participa
tion. New York: NYU Press.
28. Elliott, D., & Spence, E. H. (2017). Ethics for a digital era. Hoboken, NJ: John Wiley &
Sons.
(p. 33) 29. Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police,
and punish the poor. New York: St. Martin’s Press.
30. Ford, M. (2015). Rise of the robots: Technology and the threat of a jobless future. New
York: Basic Books.
31. Fotopoulou, A. (2017). Feminist activism and digital networks: Between empowerment
and vulnerability. New York: Springer.
32. Gershenfeld, N., Gershenfeld, A., & Cutcher-Gershenfeld, J. (2017). Designing reality:
How to survive and thrive in the third digital revolution. New York: Basic Books.
33. Gillespie, T., Boczkowski, P. J., & Foot, K. A. (Eds.). (2014). Media technologies: Essays
on communication, materiality, and society. Cambridge, MA: The MIT Press.
34. Goldsmith, K. (2016). Wasting time on the Internet. New York: Harper Perennial.
35. González-Bailón, S. (2017). Decoding the social world: Data science and the unintend
ed consequences of communication. Cambridge, MA: The MIT Press.
Page 41 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
36. Goodman, M. (2015). Future crimes: Inside the digital underground and the battle for
our connected world. New York: Random House.
37. Gordon, E., & Mihailidis, P. (Eds.). (2016). Civic media: Technology, design, practice.
Cambridge, MA: MIT Press.
38. Graham, M. & Dutton, W. H. (Eds.) (2014). Society & the Internet: How networks of
information and communication are changing our lives. Oxford, UK: Oxford University
Press.
39. Graham, R. (2014). The digital practices of African Americans: An approach to study
ing cultural change in the information society. Bern, Switzerland: Peter Lang.
40. Gronlund, M. (2016). Contemporary art and digital culture. New York: Routledge.
41. Hanna, N. K. (Ed.). (2016). Mastering digital transformation: Towards a smarter soci
ety, economy, city and nation. Bingley, UK: Emerald Group Publishing Limited.
42. Hu, T. H. (2015). A prehistory of the cloud. Cambridge, MA: MIT Press.
43. Humphreys, L. (2018). The qualified self: Social media and the accounting of everyday
life. Cambridge, MA: MIT Press.
44. Ito, M., Baumer, S., Bittanti, M., boyd, d., Cody, R., Stephenson, B. H., Horst, H. A., …
& Tripp, L, (2009). Hanging out, messing around, and geeking out: Kids living and learn
ing with new media. Cambridge, MA: MIT Press.
45. James, C. (2014). Disconnected: Youth, new media, and the ethics gap. Cambridge,
MA: MIT Press.
46. Johnson, C. A. (2015). The information diet: A case for conscious consumption. Se
bastopol, CA: O’Reilly Media, Inc.
47. Kember, S., & Zylinska, J. (2012). Life after new media: Mediation as a vital process.
Cambridge, MA: MIT Press.
48. Krieger, D. J., & Belliger, A. (2014). Interpreting networks: Hermeneutics, actor-net
work theory & new media (Vol. 4). Bielefeld, Germany: Transcript-Verlag.
49. Kvedar, J. C., Colman, C., & Cella, G. (2017). The new mobile age: How technology will
extend the healthspan and optimize the lifespan. Amazon Digital Services.
50. Levy, D. M. (2016). Mindful tech: How to bring balance to our digital lives. New
Haven, CN: Yale University Press.
51. Lindgren, S. (2017). Digital media and society. Thousand Oaks, CA: Sage.
52. Lingel, J. (2017). Digital countercultures and the struggle for community. Cambridge,
MA: MIT Press.
Page 42 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
53. Livingstone, S. (2009). Children and the Internet. Cambridge, UK: Polity.
54. Livingstone, S., & Sefton-Green, J. (2016). The class: Living and learning in the
(p. 34)
55. Lupton, D. (2016). The quantified self. Hoboken, NJ: John Wiley & Sons.
56. Lynch, M. P. (2016). The internet of us: Knowing more and understanding less in the
age of big data. New York: WW Norton & Company.
57. Mansell, R., Ang, P. H, Steinfield, C., van der Graaf, S., Ballon, P., Kerr, A., …
Grimshaw, D. J. (Eds.). (2015). The International encyclopedia of digital communication
and society (3 volume set). Hoboken, NJ: Wiley Blackwell.
58. Martin, W. J. (2017). The global information society. New York: Routledge.
59. Mosco, V. (2017). Becoming digital: Toward a post-Internet society. Bingley, UK: Emer
ald Publishing Limited.
60. Mueller, M. L. (2010). Networks and states: The global politics of Internet
governance. Cambridge, MA: MIT Press.
61. Nafus, D. (Ed.). (2016). Quantified: Biosensing technologies in everyday life. Cam
bridge, MA: MIT Press.
62. Napoli, P. M. (2011). Audience evolution: New technologies and the transformation of
media audiences. New York: Columbia University Press.
63. Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism.
New York: NYU Press.
64. Palfrey, J., & Gasser, U. (2016). Born digital: How children grow up in a digital age.
New York: Basic Books.
65. Penney, J. (2017). The citizen marketer: Promoting political opinion in the social media
age. Oxford, UK: Oxford University Press.
66. Phillips, W., & Milner, R. M. (2018). The ambivalent Internet: Mischief, oddity, and an
tagonism online. Hoboken, NJ: John Wiley & Sons.
67. Pschera, A. & Lauffer, E. (translator) (2016). Animal Internet: Nature and the digital
revolution. New York: New Vessel Press.
68. Rains, S. A. (2018). Coping with illness digitally. Cambridge, MA: MIT Press.
69. Reed, T. V. (2014). Digitized lives: Culture, power, and social change in the Internet
era. New York: Routledge.
70. Rheingold, H. (2012). Net smart: How to thrive online. Cambridge, MA: The MIT
Press.
Page 43 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
71. Rossignoli, C., Virili, F., & Za, S. (Eds.). (2017). Digital technology and organizational
change: Reshaping technology, people, and organizations towards a global society. New
York: Springer.
72. Rowan-Kenyon, H. T., Alemán, A. M. M., & Savitz-Romer, M. (2018). Technology and
engagement: Making technology work for first generation college students. New
Brunswick: Rutgers University Press.
73. Rudder, C. (2014). Dataclysm: Love, sex, race, and identity—What our online lives tell
us about our offline selves. Crown.
74. Scheff, S., & Schorr, M. (2017). Shame nation: The global epidemic of online hate.
Naperville, IL: Sourcebooks, Inc.
75. Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and con
trol your world. New York: WW Norton & Company.
76. Scholz, T. (Ed.). (2012). Digital labor: The Internet as playground and factory. New
York: Routledge.
77. Schwab, K. (2017). The fourth industrial revolution. New York: Crown Business.
78. Shifman, L. (2014). Memes in digital culture. Cambridge, MA: MIT press.
(p. 35) 79. Sonnier, P. (2017). The fourth wave: Digital health. https://
storyofdigitalhealth.com/fourth-wave-book
80. Steiner-Adair, C. & Barker, T. H. (2013). The big disconnect: Protecting childhood and
family relationships in the digital age. New York: Harper Business.
81. Tapscott, D. & Tapscott, A. (2018). Blockchain revolution: How the technology behind
Bitcoin and other cryptocurrencies is changing the world. New York: Portfolio-Penguin.
82. Turkle, S. (2011). Alone together: Why we expect more from technology and less from
each other. New York: Basic Books.
83. Turow, J. (2012). The daily you: How the new advertising industry is defining your
identity and your worth. New Haven, CT: Yale University Press.
84. Turow, J. (2017). The aisles have eyes: How retailers track your shopping, strip your
privacy, and define your power. New Haven, CT: Yale University Press.
85. Van Dijck, J. (2013). The culture of connectivity: A critical history of social media. Ox
ford, UK: Oxford University Press.
86. Webster, J. G. (2014). The marketplace of attention: How audiences take shape in a
digital age. Cambridge, MA: The MIT Press.
Page 44 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
87. White, A. (2014). Digital media and society: Transforming economics, politics and so
cial practices. New York: Springer.
88. Wiesinger, S., & Beliveau, R. (2016). Digital literacy: A primer on media, identity, and
the evolution of technology. Bern, Switzerland: Peter Lang.
89. Wu, T. (2017). The attention merchants: The epic scramble to get inside our heads.
New York: Vintage
Ronald E. Rice
Ronald E. Rice (PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the
Social Effects of Mass Communication in the Department of Communication at Uni
versity of California, Santa Barbara. Dr. Rice has been awarded an Honorary Doctor
ate from University of Montreal (2010), an International Communication Association
(ICA) Fellow, selected President of the ICA (2006–2007), awarded a Fulbright Award
to Finland (2006), and appointed as the Wee Kim Wee Professor at the School of
Communication and Information and the Visiting University Professor, both at
Nanyang Technological University in Singapore (Augusts 2007–2009 and June 2010).
His co-authored or co-edited books include Organizations and unusual routines: A
systems analysis of dysfunctional feedback processes (2010); Media ownership: Re
search and regulation (2008); The Internet and health care: Theory, research and
practice (2006); Social consequences of internet use: Access, involvement and inter
action (2002); The Internet and health communication (2001); Accessing and brows
ing information and communication (2001); Public communication campaigns (1981,
1989, 2001, 2012); Research methods and the new media (1988); Managing organi
zational innovation (1987); And The new media: Communication, research and tech
nology (1984). He has published over 150 refereed journal articles and 70 book chap
ters. Dr. Rice has conducted research and published widely in communication sci
ence, public communication campaigns, computer-mediated communication systems,
methodology, organizational and management theory, information systems, informa
tion science and bibliometrics, social uses and effects of the Internet, and social net
works. http://www.comm.ucsb.edu/people/ronald-e-rice
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
Page 45 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Introduction to the Oxford Handbook of Digital Technology and Society:
Terms, Domains, and Themes
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Jordana Blejmar
Page 46 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.2
This chapter summarizes and describes the methodology used to generate and analyze
the literature for the ESRC Review Chapters (3, 8, 11, 14, 16, 18, and 22). A core goal of
the project was to undertake a systematic literature review and synthesis to identify gaps
in current research. This process included Delphi reviews, digital and manual coding of
the literature to identify topics and trends, and stakeholder engagement. The first section
describes the project team and its participants, what they contributed, and how other
stakeholders were engaged. The second section identifies the initial scoping areas and
how these were used to identify seven primary domains, to which separate project teams
were assigned. These scoping areas included the use of theory and methods. The next
section introduces the Delphi process, the eight administrations and six related work
shops, based on the initial scoping areas. Key questions, topics, challenges, and literature
identified through the Delphi and workshop activities were then used as comparisons to,
and guidelines for, the literature reviews. The project developed narrative reviews from
the database of over 6,000 publications, using a variety of digital humanities tools and
manual content analysis (to code for theory, method, and population sample). The digital
tools included concept mapping and topic analysis, and were used to identify the most
frequent topics or concepts and related terms or themes. Manual content analysis was
used to summarize main discipline, theories used in empirical work, theory development,
empirical methods, population studies, and data analysis methods.
Keywords: digital and manual coding, digital humanities tools, Delphi reviews, ESRC Review, manual content
analysis, narrative reviews
Introduction
AS noted in chapter 1 of this book, many of the chapters are developed from the findings
of the “Ways of Being in a Digital Age” project commissioned by the UK Economic and So
cial Research Council (ESRC). This scoping review project was commissioned to provide a
more holistic view of research on how digital technology mediates our lives, and of the
ways technological and social change co-evolve and impact each other. A core goal of the
Page 1 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
project was to undertake a systematic literature review and synthesis of expert opinions
so as to identify gaps in current research. This chapter sets out how the data and results
presented in the ESRC overview chapters of this book were generated (chapters 3, 8, 11,
14, 16, 18, and 22). The methods used were in part defined by the nature of the chal
lenge: as the project was commissioned to complete the review in just under 12 months, a
considerable part of the project had to be automated in some manner. This provided the
opportunity to examine a range of “digital” methods by which a large body of literature,
data, and evidence could be summarized.
Participants
Project Team
The core project team consisted of staff who, at the time, were based at the University of
Liverpool, University of Sheffield, and University of Newcastle. A broader group of UK co-
investigators and non-UK advisors from 16 universities across the UK, EU, USA, and Sin
gapore also supported the project. This provided expertise across a range of social (p. 37)
(p. 38) science, arts, engineering, and science backgrounds (see Table 2.1). Overall these
colleagues predominantly provided input to the Delphi elements of the project, work
shops, and conferences. The key contribution from all these colleagues was the provision
of initial inclusion criteria, key words, and key citations for the systematic reviews. The
main technical partner for this project was the Digital Humanities Institute (DHI) at the
University of Sheffield. In this project the DHI provided the technical and analytical skills
to undertake the concept-modelling work needed to explore the full range of literature
covered by the review chapters. The work of the DHI was complimented by University of
Liverpool researchers using related methods.
Page 2 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Page 3 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Page 4 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Page 5 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Page 6 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Stakeholder Engagement
In order for both academics and potential stakeholders to have an opportunity to inform
the review within the short time frame, the team made use of key networks of which they
were already members. As will be detailed in the section on the Delphi methods, these ex
isting networks were key to the initial data collection. To connect with non-academics, the
project worked with the Digital Leaders network as a route to engage private sector, pub
lic sector, and third sector partners (http://digileaders.com). Established by Martha Lane
Fox, the Digital Leaders network provides access to around 40,000 corporate, Small and
Medium Sized Enterprise (SME), national government, local government, academic, and
charity staff and organizations. The project lead (Yates) ran the Digital Leaders Research
theme. Yates and Helsper are also members of the Department for Digital, Culture, Media
and Sport’s (DCMS) Digital Skills and Inclusion Research Working Group, which under
takes reviews of UK digital engagement strategy and policy research. All of the UK Steer
ing Group members have been members of relevant ESRC, Arts and Humanities Research
Council, or Engineering and Physical Sciences Research Council networks, funded pro
grams, or have had senior roles in UK Research and Innovation policy and practice in re
gard to digital research. Other networks that the overall team are part of include the
Communities and Cultures Network; New Social Media, New Social Science Network; Eu
ropean Sociological Association (Communities and Digital Cultures groups); International
Communication Association (Communication and (p. 39) Technology Section); US Partner
ship for Progress on the Digital Divide; Digital Latin American Cultures Network; Centre
for Research and Evidence on Security Threats; the Cabinet Office Behavioural Science
Expert Group; ESRC Emoticon Network; EU COST Action on Social Media and Social
Networks; ECREA Material Digital Cultures group; British Sociological Association Digi
tal Sociology group; the EU e-forum; and the Meccsa Policy Group.
The ESRC commission identified a number of potential questions for future research
work. The scoping review took these as a starting point that could be added to, devel
oped, and validated. The team separated these into seven major foci for the review (see
Table 2.2). We have called these seven foci “domains.” The goal of the review was to as
sess the following for each domain:
• What existing literature addressed these domains and what central topics
(p. 40)
Page 7 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
The reviews also sought to describe and assess the use of theory and of methods in each
of the domains.
Page 8 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Use of Theory
This element of the analysis considered how theories are used both deductively to set up
empirical work and/or to provide explanation and conclusions from inductive work. Some
key questions around theory included: How is the digital socially and technically concep
tualized? Which theories are predominant in which domains? What new theory has been
developed, and/or is “old theory” adequate to the task of explaining the social impacts
and use of the digital? To what extent is digital research theoretically or empirically dri
ven? Which concepts and key themes cluster and link regardless of theoretical or empiri
cal approach? Can a new “theoretical framework” for understanding the digital be gener
ated, and is this needed? To what extent have interdisciplinary approaches modified or
developed theory?
Use of Methods
This element emphasized the range of methods, types of data, and research contexts in
the examined literature. Some key questions that were addressed include: Which meth
ods predominate in which domains of work? Does the availability of large volumes of digi
tal data change how the digital is studied and/or the approaches taken to the social in a
digital world? Are certain methods intrinsically linked to certain domains or theories?
How are methods tied to the social contexts around digital research? Have interdiscipli
nary approaches modified or prioritized certain methods in the study of the digital?
Delphi Process
As a starting point the project undertook seven sets of Delphi process interviews (Lin
stone & Turoff, 1975). An eighth set, run with non-academic stakeholders, was undertak
en via a series of workshops and “salon events.” Round one of the Delphi process was un
dertaken with the project Steering Group. The results from this were used to develop a
snowball sample of additional domain experts. Round two was undertaken with this iden
tified sample. Round three consisted of a confirmatory survey of international scholars
and a consultation workshop with the UK Steering Group and a set of invited UK acade
mics. Delphi methods have a long history going back to the 1950’s and were initially de
signed as a method for forecasting or predicting outcomes in complex situations. More re
Page 9 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
cently, the methods have been employed as a set of tools for systematic knowledge elicita
tion in complex domains.
structured groups. In a standard Delphi process the selected experts answer question
naires or semi-structured surveys in two or more rounds. The results of each round are
summarized by the team managing the process and provided back as an anonymized sum
mary to the expert panel. The panel is then provided the opportunity to revise their an
swers in light of these summaries, with the goal of reaching either an overall consensus,
or statistically acceptable “mean” or average, where numeric predictions are being
sought.
We modified our Delphi process to incorporate the outcomes of the literature review
work. Rounds one and two helped to provide the basis of both the literature work and po
tential research gaps. Round one was conducted with the project Steering Group (see Ta
ble 2.1). This included the opportunity for the team to identify key scholars in the field for
round two of the Delphi process as well as starting points for the literature review. Delphi
reviews are often undertaken anonymously—in that the experts do not know who the oth
er contributors are—and are also conducted remotely. In our case Round one was con
ducted with the steering group, so this was not anonymous. Round two was undertaken
anonymously among the experts identified in Round one. Invitations to contribute were
sent out by email, and the data were collected via an online survey tool. Experts were in
vited to contribute answers around one of the seven domains relevant to their back
grounds as identified by the core team. The team only changed this allocation when ex
perts notably self-identified with a different domain to that which they had been allocat
ed. Round three consisted of a consultation workshop based on the Delphi and literature
Page 10 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
review findings and a confirmatory survey. The survey was sent to all prior participants,
asking asked them to rank the identified topics and challenges in terms of importance for
future research. The Delphi process therefore identified four sets of data for each do
main:
Initial scoping questions for future programs of research. Though Table 2.2 details
the initial scoping questions set by the ESRC, we utilized rounds one and two of the Del
phi process to validate and expand these as required. In all cases, this led to the initial
scoping questions being modified. The specific changes to each of these domains are de
tailed in the ESRC review chapters (Chapters 3, 8, 11, 14, 16, 18, and 22). In some cases,
this involved expansion of the questions (e.g., in the Communication and Relationships
domain), or focusing on specific interpretations of terms (e.g., in the Health and Well-be
ing domain). Delphi respondents were asked to use their interpretation of the domain
scoping questions as the basis for their answers to the Delphi survey.
Key authors and key literature for each domain. The experts were asked for key au
thors, key items of literature, and key search terms (derived from their scoping ques
tions) for the (p. 43) collection of the domain literature. This information was then used to
systematically collect literature from key databases (Web of Science-ISI Web of Knowl
edge; Social Sciences Citation Index; Google Scholar).
Key topics to be addressed within these programs of work. The survey first explored
which “topics” the experts believed needed further research within the domain. These
might be areas where there is a lack of research, where further research was needed, or
where specific questions needed to be unpacked further. The responses provided the ba
sis for assessing future research areas in the domain. They could also be matched against
and compared with the concepts and topics identified in the literature review.
Key challenges when undertaking these programs of research. The survey next
asked experts to highlight the methodological, practical, and other challenges that might
be faced when attempting to address the topic areas they had identified. These might be
existing challenges for relevant research but also new ones due to the digital context of
the research. The methodological challenges could be compared to and contrasted with
the methods and approaches identified in the literature. One of the key features of the
Delphi process results was the commonality of responses to the “challenges” questions
across all seven domains. We have therefore reported these cross-cutting challenges as a
separate chapter (Chapter 25) and sought to identify specific challenges when reporting
on each domain.
Page 11 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
The project organized a range of facilitated workshops to engage academic and non-acad
emic stakeholder partners. The main one of these was a final consultation workshop to re
view the outcomes of the Delphi process. This was attended by the majority of the UK
members of the Steering Group as well as UK colleagues identified in the Delphi process,
via the literature review and the other workshops. Two additional workshops explored the
impacts of Automation on work and society and were supported by the ESRC, the UK De
fence Science and Technology Laboratory (DSTL), and the US National Science Founda
tion (NSF). A total of six workshop programs contributed to the project:
gy Interface.”
4) A joint MECSSA and project supported workshop on “digital policy,” which exam
ined the policy and policy-making issues arising from digital media.
5) A project and UK Department of Digital, Culture, Media and Sport workshop to
explore the impacts of digital on the arts and cultural sector.
6) An academic symposium discussing the results from the project and seeking fur
ther invited review papers, some of which are in this volume, conducted by the
project just prior to the ESRC and NSF workshop.
Approach. As noted above the Delphi process provided the literature survey with three
initial starting points for the literature review:
• Key authors
• Key words—from the scoping questions
• Key literature—as the starting point for citation searchers
The collection of literature was undertaken twice, following rounds one and two of the
Delphi process. This produced two overlapping sets of key literature that were combined
for the final analytical work and content analysis. Given the volume of published work
within the seven domains, undertaking a meta-analysis to synthesise the quantitative re
sults of available empirical studies (Blundell, 2013) was not possible. Nor, as the ESRC
Review chapters (Chapters 3, 8, 11, 14, 16, 18, and 22) point out, were there enough em
Page 12 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
pirical studies of similar design and focus (either deductive or inductive) to undertake
such a process. Rather, to address the challenges of dealing with such a large body of da
ta, a partly automated systematic narrative review (Popay et al., 2006) was undertaken
with the goal of synthesizing primary studies and descriptively exploring the heterogene
ity of work.
This hopefully provides the basis for targeted systematic literature reviews for hypothesis
generation (Petticrew & Roberts, 2008) likely to be undertaken by future studies. A key
element defining the approach was the need to address the large volume of work in each
domain within the limited timescale of a few months. The project had an overall database
of just under 6,000 potential target publications from key authors and flowing from cita
tions of key papers, identified by the two rounds of the Delphi work. The databases
searched to collect this material were the ISI Web of Science (http://
webofknowledge.com/), the International Bibliography of the Social Sciences and Google
Scholar. Google Scholar produced results outside the date range and some non-academic
“grey literature.” Other bibliographic studies, especially social studies of science, under
taking citation analyses have been able to gain formally agreed commercial access to
publisher APIs (application programming interfaces)—so as to be able to “scrape”
searched-for (p. 45) items—this was not feasible within the budget and timescale of the
project. As a result, the majority of papers were downloaded manually or by utilizing tools
with limits on downloads. Of the initial 6,000 target cases, once non-academic “grey liter
ature,” papers published outside the main sampling frame date range (2000–2016), and
items not available in digital format were removed, this left 3,971 publications included in
the analysis. We estimated that to systematically read, review, and code these by hand for
all of the various aspects discussed in the review chapters of the analyses below (that is,
coding for all overlapping concepts and topics, theory, methods and analytical approach)
would have taken as a minimum 12,000 person hours or around seven person years of
work. This challenge is not unique to contemporary research in all academic fields, and
reflects a growing problem for academic work, as Petticrew and Roberts note:
The problem is not just one of inconsistency, but one of information overload. The
past 20 years have seen an explosion in the amount of research information avail
able to decision makers and social researchers alike. With new journals launched
yearly, and thousands of research papers published, it is impossible for even the
most energetic policymaker or researcher to keep up-to-date with the most recent
research evidence, unless they are interested in a very narrow field indeed.
We would also argue that this issue is compounded for inherently interdisciplinary work,
such as the study of the social impacts of digital media and technologies. Relevant papers
on a question such as the role of digital media in interpersonal interaction may be found
in psychology, sociology, linguistics, computer science, information studies, philosophy,
and health care publications. To solve this dilemma, we looked to digital technology solu
tions. The survey was therefore in part an “experimental” consideration of the use of digi
Page 13 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
tal tools developed in digital humanities, social sciences, and linguistics to analyze large
bodies of text. These tools supported the core team in undertaking the review through lin
guistic, content, and reflective methods. Similar, both automated and non-automated,
methods have been applied to the contents of this volume in chapter 25.
More specifically, undertaking a systematic review in the social sciences involves a num
ber of challenges that are less of a concern in other science contexts. First, a large pro
portion of the work will be case study based. Second, a considerable amount of work will
be in long form (books and edited collections) and will contain mostly narrative and theo
retical content. Third, other work, mainly in journals, will be predominantly empirical. We
therefore needed:
• An overall content analysis across theory, method, research topic, and context
• A predominantly narrative systematic review across the material to address descrip
tive, case study, theoretical, qualitative, and quantitative publications
Digital tools. As a first step, the literature was analyzed using linguistic, text mining and
computational tools to identify predominant topics and concepts within each domain,
(p. 46) involving three approaches: concept-modelling and two kinds of topic analysis.
Then a traditional manual content analysis was applied to assess theory and methods.
In the initial sample of documents supplied to the DHI team, “business” was discovered to
be strongly linked to “competence” (and vice versa), “consumer” with “self-service,” and
“knowledge” with “seeker.” Table 2.3 shows these concept-pairs with the first 20 associat
ed words arranged alphabetically (ranking of the associated words represents a further
Page 14 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
analytical step). This type of concept-modelling is distinct from topic modelling, in that it
focuses on sections of discourse that are shorter than a text, with a goal of extracting
conceptual structure and tracing patterns and change in language and thought.
Page 15 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Page 16 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Note: Only the first 20 associated alphabetic terms are listed under
the three example concepts.
In practice, the process begins by identifying parts of speech and lemmas (in this case we
used Helmut Schmidt’s TreeTagger). The machine-readable texts then pass through a fur
ther algorithm pipeline that uses frequency and location to identify prominent lemma
pairs, applying a refined statistical probability calculation based on Pointwise Mutual In
formation. The core process can be repeated to identify other lemmas co-occurring re
peatedly with each pair, which have here been termed “associates.” These lexical rela
tionships can then be visualized via clustering algorithms and network diagrams. Con
cept-modelling is considered more nuanced than topic modelling, because it pays atten
tion to the relative location of words. The end result is a “concept model” that enables
users to explore how ideas, theories, and methods relating to ways of being in the digital
age emerge and evolve across the literature. As a tool, it provides a data-driven map for
identifying trends and anomalies that might warrant further study. Concept-modelling
outputs were presented via a range of visualizations including bubble maps (Figure 2.2)
and tree maps (Figure 2.3), with specific versions in each of (p. 47) the ESRC Review
chapters. An interactive browser-friendly version and further documentation may be
found online at https://dhi.ac.uk/waysofbeingdigital/.
Page 17 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Topic analysis. As a follow up to this analysis, the team applied two further digital meth
ods to the full data set of literature gathered after round 2 of the Delphi process. The first
involved the application of project-specific tools developed using Python to extract topics
through the statistical analysis of word frequency within individual documents. This work
was undertaken by a team at the University of Liverpool following methods outlined by
Sievert and Shirley (2014) and Chuang et al. (2012). This produced interactive maps of
topics (Figure 2.4) and key words (Figure 2.5).
Page 18 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Second, the same data were examined utilizing the commercial WordStat tool (https://
provalisresearch.com). The data were examined in WordStat at a paragraph (p. 48) rather
than document level. WordStat split the papers into paragraph segments and then con
structed a word-by-segment frequency matrix. This matrix is subjected to an exploratory
factor analysis using a Varimax rotation, from which a set of “factors” is extracted—these
should map onto consistent topics in the data. All words with a loading higher than a tar
get criterion (we used 0.3) are then defined as being an extracted topic (Figure 2.6). Us
ing this tool produced similar results to those from the University of Liverpool topic
analysis. Combining these three results allowed the team to develop a thematic meta-
analysis of the overall themes and issues in the literature (Petticrew & Roberts, 2008).
The results from these three approaches are presented in the ESRC Review chapters for
each of the domains (chapters 3, 8, 11, 14, 16, 18, and 22). Though the underlying text-
mining methods are relatively established, these are novel and experimental approaches
Page 19 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
within the context of a study review such as this. In using these tools it was hoped that
the team would gain an overall appreciation of their usefulness for future research. Im
portantly they provided a route to understanding key concepts and topics within this very
large (p. 49) literature set within a short time frame, and allowed the team to compare the
literature topics with the proposed future topics identified in the Delphi process. Interac
tive visualizations of the topic-based data can be examined at https://
waysofbeingdigital.com/literature-analysis-interactive-results/; these are also explained as
a note in relevant ESRC Review chapters.
Content analysis. The final stage of the literature review was a content analysis focus
ing on the methods, theory, and data in the collected papers. The initial plan was to con
duct a random sample of papers so as to manage both volume and timescale, as this work
could not be done easily via digital tools. An initial test run found that nearly all of the re
quired information could be found in the abstracts, methods, and conclusion sections of
the papers, cutting down the time needed to code papers. This allowed a team of six re
searchers working in parallel to code the full corpus over a period of six weeks. The
project took inspiration from a recent in-depth content analysis of the Communication
Studies literature (Borah, 2017) on the social impact of the Internet, covering 56 journals
over a 16-year period (1998 to 2014). Borah’s analysis found that 70 percent of journal
papers on this subject did not employ any core theoretical position, nor use theory to de
fine a research question. Instead, papers predominantly reported on case studies or pre
sented analyses of empirical data sets. Following a similar method to Borah, the content
analysis systematically documented six aspects the publications in each domain:
The results of this content analysis are presented in each of the ESRC review chapters
(chapters 3, 8, 11, 14, 16, 18, and 22). The results show considerable variation across do
mains, with some favoring strongly quantitative work and others more varied approaches.
Page 20 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
As with Borah’s (2017) work, the formal use of theory to either develop hypotheses or ex
plore data was fairly limited in most domains.
Conclusion
This chapter has presented the approach to the analysis of both the literature review and
Delphi processes undertaken by the ESRC project “Ways of being in a digital age.” The
methods used addressed two challenges:
(p. 53) • Undertaking the analysis within a limited time frame of less than one calendar
year
• Utilizing and evaluating digital tools as far as possible in the analysis
It is important to note that the digital processes utilized by the project can be coupled
with tools to present the results in interactive—often visual—forms. Such processes there
by provide an opportunity to explore the data and literature in novel ways. This allows re
searchers to make use of the different views and representations as routes into the litera
ture and data in ways not previously available. The use of tools and processes in this
project was effectively experimental, exploring their to manage, review, and assess a
large body of literature. One of the team’s future research area recommendations is to
further assess such approaches to examining prior research publications. As we noted
earlier in this chapter, the challenge of having to deal with a large body of literature, or a
considerable body of academic evidence or opinion, is not specific to this project or this
research area. It is somewhat ironic that in support of an ever-growing range of academic
publications, and facilitating their ready access, digital media are also making it harder to
overview and assess these bodies of knowledge. Again, somewhat ironically, digital tools
(including algorithmic solutions) provide a route to manage this volume. In reflecting on
the process, the team would note that having multiple views, and importantly different
“algorithmic solutions” underlying these views, provides routes to cross-reference and
cross-validate results, as well as provide different insights. This digitally-derived insight
must also be combined with the insights from the extensive engagement of the re
searchers with the source materials.
References
Blundell, M. (2013). Understanding and synthesising my numerical data. In A. Boland, M.
G. Cherry, & R. Dickson (Eds.), Doing a systematic review: A student’s guide (pp. 94–124).
London: Sage.
Castells, M. (2011). The rise of the network society (Vol. 12). New York: John Wiley &
Sons.
Page 21 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Chuang, J., Manning, C. D., & Heer, J. (2012, May). Termite: Visualization techniques for
assessing textual topic models. In Proceedings of the international working conference on
advanced visual interfaces (pp. 74–77). New York: ACM.
Fitzmaurice, S., Robinson, J. A., Alexander, M., Hine, I. C., Mehl, S., & Dallachy, F.
(2017a). Linguistic DNA: Investigating conceptual change in early Modern English dis
course. In Studia Neophilogica, 89 Suppl, 1: Interfacing individuality and collaboration:
Patterns in English language research (Guest editors: I. Taavitsa, J. Smith, & M. Kytö).
2017. http://dx.doi.org/10.1080/00393274.2017.1333891.
Fitzmaurice, S., Robinson, J. A., Alexander, M., Hine, I. C., Mehl, S., & Dallachy, F.
(2017b). Reading into the past: Materials and methods in historical semantics research.
In T. Säily, A. Nurmi, M. Palander-Collin, & A. Auer (Eds.), Exploring future paths for his
torical sociolinguistics. Amsterdam: John Benjamins.
Okoli, C. & Pawlowski, S. D. (2004). The Delphi method as a research tool: An ex
(p. 54)
ample, design considerations and applications. Information & Management, 42(1), 15–29.
Petticrew, M., & Roberts, H. (2008). Systematic reviews in the social sciences: A practical
guide. Hoboken, NJ: John Wiley & Sons.
Popay, J., Roberts, H., Sowden, A., Petticrew, M., Arai, L., Rodgers, M., … Duffy, S. (2006).
Guidance on the conduct of narrative synthesis in systematic reviews. ESRC Methods
Programme. https://www.researchgate.net/publication/
233866356_Guidance_on_the_conduct_of_narrative_synthesis_in_systematic_reviews_A_produ
download doi:10.13140/2.1.1018.4643
Sievert, C. & Shirley, K. (2014). LDAvis: A method for visualizing and interpreting topics.
In Proceedings of the workshop on interactive language learning, visualization, and inter
faces (pp. 63–70). Baltimore, MD.
Van Dijk, J. A. (2013). A theory of the digital divide. In The digital divide (pp. 49–72). New
York: Routledge.
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Page 22 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Methodology
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Iona C. Hine
Michael Pidd
Michael Pidd is Digital Director of HRI Digital at the Humanities Research Institute,
University of Sheffield, one of the United Kingdom’s leading Digital Humanities cen
ters. Michael has over 20 years of experience in developing, managing, and deliver
ing large collaborative research projects in the humanities and heritage subject do
mains.
Jerome Fuselier
Paul Watry
Paul Watry is Principal Investigator for the Multivalent Digital Preservation Architec
ture project and the Cheshire digital library system. His primary area of interest is in
computational linguistics and in bibliographic analysis. A core activity is to develop
and implement a strategy which will embrace both electronic and traditional infor
mation resources and address the needs of both research and learning.
Page 23 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.3
This chapter describes the analyses and results for the ESRC Domain of Health and Well-
Being, guided by a three-part main question: “whether technology makes us healthier,
better educated, and more productive.” It first provides an initial overview of the major
insights from the literature review and analysis, the Delphi surveys, and workshop discus
sions about the relevant range of the concepts of health and well-being in a digital age.
The resulting focus is initially mostly about the technology but later on users, health, and
research. Eight main topics emerged, including health care, measures and measurement,
mobile and smartphone devices, social support, and weight loss. The analyses also high
lighted theory, methods, and approaches in the literature, showing a relatively even dis
tribution of deductive–inductive approaches and quantitative–qualitative approaches, us
ing several well-known theories from psychology (e.g., theories of behavior change) and
sociology (social networks). The review provides examples of literature from the project’s
study period that illustrate these topics. The chapter concludes with a discussion of fu
ture research directions (e.g., cross-platform or holistic assessments examining the ef
fects of broad, everyday digital technology use on health and well-being) and research
challenges (e.g., methods, rapid change in health care technology, big data for health,
and linking of personal and clinical health data with well-being outcomes).
Keywords: digital technology, ESRC Review, health, health care, mobile and smartphone devices, psychology, so
cial networks, social support, sociology, weight loss
Introduction
THIS chapter provides an overview of the results from analyses of the literature, the Del
phi process, and any relevant workshops for the Health and Well-Being domain. The ini
tial ESRC scoping question for this area of work was: “whether technology makes us
healthier, better educated, and more productive?” We first explore the results of the vari
ous digital humanities analyses of the literature and the review of methods and theory,
Page 1 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
and then set out the results of the Delphi process. We compare these results, and we con
clude with recommendations for areas of future study.
Initial Comments
This domain generated the largest set of literature of all. This appears to reflect discipli
nary differences with other domains. Much of the literature was within health studies and
health research journals. There was a stronger tendency to report experimental and em
pirical findings and there were far fewer general reviews. The responses to the Delphi
process focused on health and mainly health-based, well-being issues but not much on the
education element. We have also bracketed off the productivity issue in the health domain
as this was extensively addressed in the Automation Workshop and therefore is presented
in chapter 24. Workshops we ran with stakeholders via the UK Digital Leaders network
focused on two main areas: health inequalities and access to digital technologies and pri
vatization of health delivery through digitization. As a result, the one element of (p. 58)
the ESRC brief that is under-represented here is the question, “Does digital media make
us better educated?” We would argue that in relation to formal education this area is well
served by work on educational technology, so that issue is not analyzed here. In regard to
informal learning and also the specifics of both basic and complex digital skills—digital
literacies—this issue clearly runs through many of the chapters and analyses in this vol
ume.
Literature Analysis
Topics
As with the other literature analysis chapters in this volume, we aimed to identify two
sets of data. The first was key concept pairs and topics within the existing literature. This
allowed the comparison with areas of importance identified by the Delphi review. The sec
ond was a content analysis of the literature to explore the predominance of specific theo
ries, methods, and approaches.
The 11 most common concept pairs identified in the Round-1 literature are listed in Table
3.1. These represent the topics covering 2% or more of the identified cases. Table 3.2 lists
the main and second (sub) concepts identified.
Page 2 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Concepts Percent
Disease 7.3
Body 4.6
Care 4.0
Health 3.8
Behavior 3.7
Loss 3.3
Activity 3.2
Network 2.6
Communication 2.4
Child 2.2
Intervention 2.1
Page 3 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 4 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 5 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
follow-up 4.29
Note: bolded term is the main concept; the unbolded terms below that and above the line are the related subcon
cepts.
Page 6 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Figures 3.1 and 3.2 display the changing nature and frequency of concept pairs from the
periods 2000–2004 and 2012–2016.1 Clearly the focus in the early period was on the tech
nology (computers, system, information, Internet, data, navigation, space, robot, phone)
with some relationships with people (user, scientist, and group), and only an emerging fo
cus explicitly on the health context (care, health, support, intervention, (p. 59) effects,
weight). By the later period, the most frequent concepts involve health (health, care, in
tervention, participant, patient, group, support) with the most frequent concept pairs in
volving those items, and then some emphasis on research (study, intervention, analysis,
data, control, outcome, effect, trial).
Page 7 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
All the literature collected from both rounds was analyzed using Wordstat. Wordstat iden
tified 18 topics, presented in Table 3.3.
Page 8 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 9 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 10 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 11 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 12 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 13 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Con Dis Body Care Healt Be Loss Activ Net Com Child Inter
cept/ ease h hav ity work mu ven
Topic ior nica tion
tion
Pallia X X
tive
care
Stop X X
ping
smok
ing
Hy X
perte
nsion
Effi
cacy
Weigh X X
t loss
Page 14 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Chron X
ic dis
eases
Dis X
ease
out
break
sur
veil
lance
Fami X
ly
Prod X
uct
quali
ty
Eth
nicity
and
gen
der
Page 15 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Con
trolle
d trial
Mo X X
bile
de
vices
Social X
sup
port
net
work
analy
sis
Social X
media
Edu X
cation
al
tech
nolo
gy
Page 16 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Mea
sures
Activi X
ty
Healt X
h care
Page 17 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
As we can see in Table 3.4, there is a good overlap between the two analyses. We would
argue that the analyses point to literature that is focused on the use of digital technolo
gies and social media in three main areas. First, monitoring and supporting individuals in
changing health behaviors (such as weight loss or stopping smoking); second, using digi
tal technologies to monitor and support patients with chronic illness (e.g., hypotension);
and third, using digital technologies to support health communication or as part of health
support communities.
Separate from this, the literature is focused on the measurement and evaluation of the ef
ficacy of such interventions. This evaluation fits with the content analysis on methods and
theory that follows. A section of the literature also included work on educational technol
ogy with some crossover to technologies to support health education.
Six key areas stand out from the analysis (Table 3.3): educational technology, health care,
measures and measurement, mobile and smartphone devices, social support, and weight
loss. As noted earlier, we put the “educational technology” issue to one (p. 60) side, ex
cept where it overlaps with issues of health and well-being. In the following sections we
consider some examples of how these issues have been examined in the recent literature.
Health care. Work on the interaction in health care provision between social, occupa
tional, and organizational roles and digital media has a long history. For example, Aydin
and Rice (1991) argued that membership of specific occupational and departmental social
worlds can help to explain attitudes toward medical information systems within health
care organizations. They noted that
Physicians, for example, expected involvement in decision-making and felt the sys
tem had become primarily an administrative system, while other medical employ
ees were more concerned with computer use as infringement on their patient care
activities.
(p. 132)
More recently the focus has moved to the role of digital systems in the range of health
services including public health and personalized health. The analysis by the University
(p. 61) of Sheffield shows that literature before 2004 had a stronger emphasis on informa
tion systems and users, whereas more recent work has focused on care, intervention, and
health information for patients. For example, Bennett and Glasgow (2009) discuss advan
tages in public health interventions conducted via the Internet and Web 2.0. Within this
domain they point out that there are also challenges, such as reach (access), sustainabili
ty of effects, reporting in standardized measures, and attrition. Bennett and Glasgow ar
gue that these challenges could be overcome with more tailored messages and greater
use of social networking functions. This shift from a system focus to a user or “person” fo
cus can be found in a lot of the literature on digital media use. This represents a shift
from the novelty and specifics of technologies to the integration of these into everyday
practice. ennett and Glasgow see advantages for digital media in reach and efficacy in
health-related interventions, as “Internet-based implementation allows participants to ac
Page 18 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
cess intervention content at their convenience, in a manner that can feel largely
anonymous” (p. 276). Combined with available data, “Internet interventions can be struc
tured to provide highly personalized messages” (p. 276). As digital technologies (p. 62) of
ten have low marginal costs, providing specific services can be undertaken while lower
ing costs. As a result they conclude that
[g]iven their potential for low costs, scalability, adaptability, and effectiveness, In
ternet interventions may be appropriate for dissemination to a range of settings
(e.g., health systems, health plans, employers, municipalities). However, each of
these settings varies considerably with regard to their resources, expertise, inter
est, and ability to implement Internet interventions independently.
(p. 279)
(p. 63) This shift also reflects the rise of new digital forms such as social media. For
(p. 64)
example, Chou et al. (2009) pointed out that US-based health-related communication pro
grams, which seek to impact population health (such as smoking cessation and dietary in
terventions), should consider carefully key social factors when looking to communicate
via social media. They argue that
social networking sites by far attract the most users, making them an obvious tar
get for maximizing the reach and impact of health communication and eHealth in
terventions.
(p. 9)
In looking specifically at communication around cancer they found that among family
members who had cancer, there was a high prevalence of Internet and social media use.
This therefore made social media a potentially fruitful route to “‘secondary audiences,’
that is, caregivers, family, and friends of cancer patients” (pp. 9–10). Thus they concluded
that “social media promise to be a way to reach the target population regardless of so
cioeconomic and health-related characteristics” (p. 10).
Househ et al. (2014) also explored the role of social media, in community empowerment
in US health care contexts. They argued that
(p. 56)
On the other hand, they point out key challenges related to the use of social media for
health care, such as
Page 19 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
privacy, security, the usability of social media programs, the manipulation of iden
tity, and misinformation. These factors can pose serious threats to patient safety if
not addressed appropriately by those who wish to engage patients through social
media.
(p. 56)
Measures and measurement. Another theme in the literature is the interplay between
using digital media derived data, using digital tools to collect data, and measuring the im
pacts of digital media use or digital media interventions in the health context. Very often
these three elements are combined. In the early 2000s the focus around measurement ap
pears to be on tools such as Internet surveys. For example, Eysenbach and Wyatt (2002)
examined the use of the Internet to conduct research as well as other parts of the analy
sis. They provided recommendations for implementing Internet-based surveys as well as
emphasizing ethical considerations. They focused on Internet survey methods and did not
address the use of “big data” nor data scraped from social media, issues that have be
come more prevalent in recent years. But two of their key warnings are still very rele
vant:
In ‘open’ surveys conducted via the Internet where Web users, newsgroup read
ers, or mailing list subscribers are invited to participate by completing a question
naire, (p. 65) selection bias is a major factor limiting the generalizability (external
validity) of results … The ethical issues involved in any type of online research
should not be forgotten. These include informed consent as a basic ethical tenet of
scientific research on human populations, protection of privacy, and avoiding psy
chological harm.
(p. 4)
As noted earlier, the analysis of the literature sees a strong shift towards issues of digital
media in health interventions. For example, Glasgow (2007) examines the measurement
and assessment of eHealth intervention and behavior change programs and provides rec
ommendations on design, measurement, and methods, concluding with four main recom
mendations, First, explore outside of research silos, meaning work across different ill
nesses taking into account multiple variables. Second, explore the role of human support,
which could be the most important contextual factor. Third, tailor experiment design and
reporting criteria to eHealth questions, meaning that they have to be interactive, user-
centered, dynamic, and evolving. Fourth, follow translation and diffusion theories of tech
nology uptake and innovation. They point out that
[t]he majority of evidence-based health care procedures fail to translate into prac
tice. Part of the reason for this failure to translate is because of the research
methods most often used to evaluate interventions. In particular, typical designs
do not address external validity concerns or provide information relevant to poli
cymakers or to those considering program adoption.
Page 20 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
(p. 120)
He concludes that “eHealth is complex, contextual, evolving, and has effects at multiple
levels. The designs and measures for eHealth research need to have these same
characteristics” (p. 125).
Given the nature of this domain, the focus of many papers is on the empirical evaluation
of specific digital interventions from bespoke digital tools to general social media cam
paigns. Often these involve the application of a digital media format to a specific health
intervention. One example is provided by Coyle and Doherty (2009), who examined the
use of a 3D computer game developed to support adolescent mental health interventions.
This was a goal-oriented computer game that adolescents and therapists could play to
gether in sessions. In the evaluation, the shortcomings that therapists mentioned are ap
plicable to many digital technology interventions. These included an over-reliance on lit
eracy skills, lack of engagement with the specific technology, and a need to adapt to
clients’ needs (for example, choosing more suitable characters). As we have noted else
where in this volume (especially chapters 18, 19, and 20), issues of digital literacy and
digital efficacy underpin many aspects of digital media use. Having noted these shortcom
ings, Cole and Doherty argue, “The initial clinical evaluation of [the game] has provided
evidence that computer games have the potential to assist therapists working with ado
lescent clients” (p. 2058). But they add that
[f]uture projects in the MHC [mental health care] domain may benefit from more
rigorously applying traditional user-centered requirements gathering techniques.
However, the problem of access to clients by HCI researchers still remains. (p. 66)
Techniques are required which help HCI researchers to gain access to the tacit
knowledge of MHC professionals.
(p. 2058)
Such work points out a challenge found in many other domains (e.g., social care, govern
ment policy interventions, etc.), where existing design and evaluation tools are designed
around existing practice and need to take on methods from digital and computer science
disciplines. Coyle and Doherty also note that development and evaluation of digital sys
tems is time-consuming; therefore “systems should aim to be useful to a broad range to
therapists, in a broad range of settings and with a broad range of clients” (p. 2059).
Not only are digital media forms (e.g., games and social media) being applied in health
settings, but also digital devices are now key to monitoring and evaluating health, both
personal (e.g., wearables) and public (e.g., environmental monitoring and sensors). Again
the number and range of papers in this area is vast. An example from our corpus is Pan
telopoulos and Bourbakis (2008), who reviewed the research and development of wear
able biosensor systems for health monitoring. These can provide low-cost unobtrusive so
lutions for continuous all-day and any-place health, mental, and activity status monitor
ing. The article outlines the technical challenges of these technologies. As with many oth
er evaluations in this area, they found that many of the systems in fact remain poorly de
Page 21 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
signed for wearability, for many practical reasons to do with size, weight, and complexity.
Alternatively, they propose that integration of these tools into clothing and textile mod
ules is an efficient alternative approach, though it has the disadvantage of being less scal
able. There is then a tension between scalability (e.g., mass availability) and wearability.
As with other digital technologies in the medical domain, security is a key concern. They
concluded that “integration of proper encryption and authentication mechanisms is re
quired to ensure privacy and security of personal health data” (p. 4890).
Mobile and smart phone devices. Over the same period, mobile and smartphone de
vices have increased in popularity globally. They clearly have become a major target for
digital health solutions from health and activity monitoring to information and advice to
supporting behavior change. It is unsurprising therefore that this is a topic identified in
the literature. For example, Dennison et al. (2013) argue that young, currently healthy
adults have interest in apps that attempt to support health-related behavior change. The
factors that most influence their app use were accuracy and legitimacy, security, effort re
quired, and immediate effects on their mood and well-being. However, they point to draw
backs, such as context skepticism and security and privacy of health-related data, espe
cially keeping control over what apps can do with the user’s health data. Dennison et al.
raise doubts “around whether users will use behaviour change apps for long periods of
time, a critical issue that will affect the effectiveness of many behavior change apps” (p.
8). As was noted in the work on wearables, there are concerns about usability and accura
cy. Dennison et al. noted that “participants lacked faith in the accuracy with which a
smartphone could sense relevant states (e.g., mood, activity levels) (p. 67) and expected
that incorrect and irritating suggestions would make them mistrust the app and cease us
ing it” (p. 9). Importantly, this work identified concerns among users as to whether health
apps were linked to digital media such as social networks.
Self-diagnosis apps (…) state and engage with the discourses of healthism and
control that pervade contemporary medicine. They also participate in the quest for
patient ‘engagement’ and ‘empowerment’ that is a hallmark of digital health
rhetoric
(p. 132)
Lupton and Jutel point out that the implied medical authority combined with the apparent
accuracy of “algorithms” provides a basis for both their promotion and use. Yet the users
themselves are well aware of their own status as “not medically qualified.” The combina
tion of both user uncertainty and, in some cases, the lack of robust medical evaluation
Page 22 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
and transparent algorithms means that there remain many challenges to making such
systems work. Such work highlights the challenge found elsewhere outside the health do
main, that digital technologies disrupt (for good or ill) existing systems and in many cases
both individual practice and necessary societal regulation may take time to catch up.
One area that is strongly prevalent in the literature is that of using mobile and smart
phone devices to support patients with long-term (chronic) conditions. For example, Gol
lamudi et al. (2016) find that smartphones data allow these patients to make informed
health decisions, though they point out that this changes the dynamics of health care re
lationships:
[O]ne of the more intriguing aspects of this technology as a tool to enhance indi
vidual health is that data is collected, stored, and presented digitally without the
need for direct interaction between the user and (as traditional) health profession
al.
(p. 12)
Another area of work we noted in the literature and which may need to be better devel
oped and formalized within the medical domain is the systematic comparison of digital so
lutions. For example, in the case of enhanced self-management of the chronic arthritic-
like condition of gout, Nguyen et al. (2016) reviewed 57 mobile health apps. Very few
apps met the internationally accepted gout management guidelines, with only one meet
ing all requirements. As noted previously, it is clear that more systematic work (p. 68) is
needed to assess the viability of such apps. Nguyen et al. point out a range of limitations
in the apps with regard to this specific condition, especially the lack of routes for access
ing health care professionals, but still argue that
(p. 71)
Social support. With the rise of social media, we also see a range of literature con
cerned with social support in health contexts. This work goes back to some of the earliest
work around online communities with a focus on Internet fora. For example, Richardson
(2004) explored issues of Internet use and heath debates across Cancer, SARS, and the
debate about the measles/mumps/rubella vaccine and Autism. Such work has taken on
much greater importance in recent years as citizens and patients have become able to en
gage others, often of like minds, on such issues via social media. This range of work is
very broad and overlaps with research around online communities, issues of identity, and
political debate where health issues are tied to policy issues. We will focus here on the
more clinical health and well-being issues. As with other material discussed in this chap
ter, many of the publications evaluate a specific intervention or compare across technolo
Page 23 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
gy contexts, with foci ranging from perceptions to behavior change to the links between
digital media use and health.
An example of comparative work is Barrera et al. (2002), who examined if diabetes pa
tients change their perception about support following their participation in Internet-
based support groups. The study finds that after three months of intervention, patients
who participated in Internet-based social support significantly changed their views com
pared to those patients who had only participated in computer access to information
about diabetes. This was achieved with patients who did not have previous experience
with the Internet. In another comparative study, Barak et al. (2009) review the literature
about Internet-supported psychological therapeutic interventions, conceptualizing them
into four categories: web-based interventions, online counselling and therapy, Internet
operated therapeutic software, and other online activities (e.g., as supplements to face-to-
face therapy). They concluded that
[T]he ability to develop feasible and effective alternatives by exploiting the Inter
net for clinical work—alternatives that suit many people and distress areas—
should be regarded as broadening and expanding the availability of professional
help, especially for those who feel comfortable in the virtual environment.
(p. 14)
Such work highlights the conceptual challenge of tidying up the conceptualization of, and
regulating and assessing different forms of, digital media-based interventions in the med
ical context.
Overall, much of the work in this area is not about direct clinical support interventions
but rather about fostering patient and citizen empowerment in online support (p. 69)
groups. As an example, earlier work by Barak et al. (2008) point out that online support
groups encourage well-being, a sense of control, self-confidence, feeling of more indepen
dence, social interactions and self-image, loneliness, optimism, and mood state. There
fore, the authors argue that participation in online support groups can foster personal
empowerment, which can help in dealing with feelings of distress, but do not necessarily
help in producing therapeutic changes. These groups also have drawbacks, such as devel
oping dependence, developing distance from interpersonal contacts, and experiencing un
comfortable situations which are part of online social interactions. Barak et al. argue that
(p. 1878)
Page 24 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
They conclude, however, that such groups are not a substitute for professional treatment
where such clinical intervention is needed but can offer a complementary component to
such interventions. Yet, there are always challenges in regard to communication, digital
skills, and competences in such circumstances. These may interact with and influence
both outcomes and well-being in and of themselves. Wright et al. (2013) argue that inter
personal motives, increased face-to-face communication, communication competence,
and computer competence can predict whether college students are feeling more de
pressed. One of the most important skills to reduce depression was found to be communi
cation competence, which is a set of skills that enable college students to mobilize social
support in a better way.
Weight loss. One area that brings all these issues of health care, social support, device
use, monitoring, measurement, and personal digital technology use is that of weight loss.
This is a domain where online groups, digital media, and apps have all been both promot
ed and critiqued as routes to intervention (or not). It is not unsurprising then that this has
been highlighted as one of the few specific health topics in the analysis of the literature.
One immediate question is the extent of the link between digital media use (or at least da
ta on digital media use) and the prevalence of obesity. For example, Chunara et al. (2013)
examined the relationship between online social environments via web-based social net
works and population obesity prevalence. Their main finding is that activity-related inter
ests (such as television watching as opposed to sports) across the United States and
neighborhoods in New York City were significantly linked with obesity. They argue that
their study
corroborates the association of social environments and obesity, and also begins to
uncover aspects of the environment, such as interests in the online medium, and
how they are positively or negatively related to this outcome. Sharing of these
norms through Facebook may also be magnified because network connections are
‘friends’; people who likely share demographic profiles, meaning there messages
are better focused.
Issues of digital self-monitoring are also found in the literature. Steinberg and oth
(p. 70)
ers (2013) examine the impact of weight loss interventions that focus on self-monitoring
digital techniques such as “smart scales” (which displayed current weight and sent it di
rectly to a website), a web-based weight loss graph, and weekly tailored feedback via
emails. These interventions have proved to be successful when combined with other inter
vention elements. They found that
(p. 8)
Page 25 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
With regard to mobile and smartphone interventions, Svetkey et al. (2015) examined the
efficacy of mobile health weight loss intervention apps in young adults: smartphone self-
monitoring, or personal coaching enhanced by smartphone self-monitoring (PC), com
pared with a control group. They concluded that digital interventions were not success
ful. This lead them to the conclusion that a combination of methods, both digital and so
cial support of human interaction which are adaptive can be more beneficial. The re
searchers found that relative to the control group: “neither a mobile app alone nor per
sonal coaching with mobile self-monitoring resulted in statistically significant weight loss
after 24 months” (p. 2139). Like many other studies, they concluded that iterative and
rapid development and testing of health interventions in context are needed to ensure the
best outcomes.
Summary. We would argue that there has been a shift in focus from health care tech
nologies, to interaction with health care technologies, to a greater focus on the role of
digital technologies in intervention, especially in regard to health behaviors and percep
tions. Where the focus is on non-clinical and community interventions, there is notable
overlap with the literature around digital communities. In regard to digital clinical inter
ventions from this selection of literature, it is clear that much more work is needed on the
veracity, development, and regulation of such tools.
As with the other review chapters, this analysis builds on Borah (2017). A slight majority
of the analyzed papers (52%) were deductive, applying existing theory (Table 3.5). Nearly
(p. 71) half of papers utilized primary collected data (48%), with 43% of the papers using
secondary data (Table 3.6). In line with the focus on health interventions and health be
havior, the main disciplines from which theory was used or for which theory was devel
oped were psychology (50%), sociology (19%), health studies (8%), communication and
media (8%), and information studies (5%). There was considerable variety in the specific
theories applied from these disciplines. Theories of behavior change, social cognition, and
planned behavior (each 8% of total) were the main theories in psychology studies, while
social network analysis was the most frequent theory (2% of total) in sociology articles.
There was a fairly even split between statistical and qualitative approaches (Table 3.7).
For those items that undertook empirical research, the main research methods were pre
dominantly quantitative: experiments or comparisons (19%), surveys (11%), social net
work analysis (3%), and meta-analysis (4%) (Table 3.8). The majority of the empirical
work focused on specific groups, but with a larger proportion of general population stud
ies (31.5%) than in the other domains (Table 3.9). Less than 2% of the work described it
self as using a “big data” approach.
Page 26 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Percent
Percent
Percent
Discourse (textual—linguistic-discourse) .7
Page 27 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Percent
Other 22.0
Experiment 18.8
Survey 10.8
Interview(s) 6.6
Ethnography .4
Percent
This domain is notably different than the others in two clear respects. First, the number
of published papers by identified authors was much higher, and second, the majority of
these reported quantitative empirical studies. Much of the work was broadly psychologi
cal and focused on the role of digital technologies in supporting or driving health behav
ior changes. This is reflected in the main theories identified in the literature. Unlike the
Page 28 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
other domains, there is a limited amount of reflection on the broader social or health im
pacts of digital media.
Delphi Review
This section provides details of the results of the Delphi process for the Health and Well-
Being domain, covering suggested scoping or research questions, key topics to address
within these questions, and key challenges to researching these questions.
Page 29 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Health user needs What are the factors that lead to development
of health information technology programs
that meet the needs and capacities of differ
ent users?
How can research be used to guide the strate
gic development of health information tech
nology programs that meet the needs of dif
ferent users?
How can we engage different technology
users in developing and implementing strate
gic health information systems that will meet
their health information and support needs?
Page 30 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
(p. 73) The consultation workshop found these scoping areas too broad and noted that the
issue of “design” created a focus on devices and away from a more holistic view of soci
etal health and well-being. The workshop suggested other scoping areas or questions.
These include that more should be done to understand the role of digital technologies in
health inequalities (do they help to alleviate, reproduce or deepen these inequalities?)
and to link educational technology and health (for example, to think about learning
(p. 74) about well-being and the role of digital technology in this). The workshop also sug
gested addressing the governance of digital health technologies and the need for detailed
systematic evidence of the impact and lived experience of everyday health technologies
(e.g., fitbits). Finally, they recommended looking at the broader socio-economic and tech
nical challenges of “joining up” health providers and services through digital technolo
gies, and examining more questions of health and well-being in the digital workplace.
The topics identified in the Delphi review were then coded into 11 categories as detailed
in Table 3.12, with their ranked importance from the confirmatory survey are presented
in Table 3.13. As with the scoping questions, those topics that were most (p. 75) common
ly cited in the Delphi workshop were not those deemed most important in the review. The
four most frequent were device, environment, and service design; benefits and harm from
digital technology use; health communication; and education. Benefits and harm from
digital technology use received by far the highest importance ratings, followed by health
communication and privacy.
Page 31 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Topic Percent
Health communication 15
Education 10
Digital literacy 5
Other 5
Digital divide 3
Organizational change 3
Privacy 3
Page 32 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 33 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 34 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
The consultation workshop identified a set of additional potential topics within the health
care domain. These were: what are “healthy” environments or “life worlds” and what role
can digital technologies have in these; how do or can digital technologies help people to
generate their own definition of a healthy “lifeworld”; and finally, understanding the im
pact of major digital platforms on behavior, perception of health and well-being, and
routes to health information.
Research Challenges
The challenges in undertaking research in this area identified by the Delphi panel were
placed into seven categories. These categories are detailed in Table 3.14 and ranked by
the percentage of coded items. The ranking of these by the confirmation survey are pre
sented in Table 3.15. The methods category was twice as frequent as the next category,
processes of co-design, followed by collecting and accessing data. Methods were also rat
ed as the most important challenge, followed by rapid changes, big data for health, and
interdisciplinarity.
Challenge Percent
Processes of co-design 21
Education 4
Interdisciplinarity 4
Page 35 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Page 36 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
The consultation workshop agreed with the challenges identified by the Delphi process, in
particular focusing on “big” health data, personal and commercial uses of health data,
linking personal and clinical health data with well-being outcomes, governance in digital
health care, and digital technologies’ role in the rich pathways of health and social care.
Combining this broad range of ideas with the material in the literature provides a clearer
picture. The next section undertakes this reflection.
To summarize, the majority of the literature in the Health and Well-Being domain is fo
cused on the evaluation of digital health technologies. There appears to be a limited liter
ature on the broader question of the impacts of digital lifestyles on health and well-being
and limited work on the negative impacts of the digital technologies. Moreover, the
broader social questions identified in the Delphi work and consultation workshops that
appear to go beyond the literature include the following:
References
Aydin, C. E., & Rice, R. E. (1991). Social worlds, individual differences, and implementa
tion: Predicting attitudes toward a medical information system. Information & Manage
ment, 20(2), 119–136.
Page 37 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Barak, A., Boniel-Nissim, M., & Suler, J. (2008). Fostering empowerment in online support
groups. Computers in Human Behavior, 24(5), 1867–1883.
Barak, A., Klein, B., & Proudfoot, J. G. (2009). Defining internet-supported therapeutic in
terventions. Annals of Behavioral Medicine, 38(1), 4–17.
Barrera, M., Glasgow, R. E., Mckay, H. G., Boles, S. M., & Feil, E. G. (2002). Do Internet-
based support interventions change perceptions of social support? An experimental trial
of approaches for supporting diabetes self-management. American Journal of Community
Psychology, 30(5), 637–654.
Bennett, G. G., & Glasgow, R. E. (2009). The delivery of public health interventions via the
Internet: Actualizing their potential. Annual Review of Public Health, 30, 273–292.
Bennett, G. G., Steinberg, D. M., Stoute, C., Lanpher, M., Lane, I., Askew, S., … & Baskin,
M. L. (2014). Electronic health (eHealth) interventions for weight management among
racial/ethnic minority adults: A systematic review. Obesity Reviews, 15, 146–158.
(p. 78) Chou, W. Y. S., Hunt, Y. M., Beckjord, E. B., Moser, R. P., & Hesse, B. W. (2009). So
cial media use in the United States: Implications for health communication. Journal of
Medical Internet Research, 11(4).
Chunara, R., Bouton, L., Ayers, J. W., & Brownstein, J. S. (2013). Assessing the online so
cial environment for surveillance of obesity prevalence. PloS One, 8(4), e61373.
Coyle, D., & Doherty, G. (2009, April). Clinical evaluations and collaborative design: De
veloping new technologies for mental healthcare interventions. In Proceedings of the
SIGCHI conference on human factors in computing systems (pp. 2051–2060). ACM.
Dennison, L., Morrison, L., Conway, G., & Yardley, L. (2013). Opportunities and challenges
for smartphone applications in supporting health behavior change: Qualitative study. Jour
nal of Medical Internet Research, 15(4).
Eysenbach, G., & Wyatt, J. (2002). Using the Internet for surveys and health research.
Journal of Medical Internet Research, 4(2).
Gollamudi, S. S., Topol, E. J., & Wineinger, N. E. (2016). A framework for smartphone-en
abled, patient-generated health data analysis. PeerJ: Life and Environment, 4, e2284.
https://doi.org/10.7717/peerj.2284
Page 38 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Househ, M., Borycki, E., & Kushniruk, A. (2014). Empowering patients through social me
dia: The benefits and challenges. Health Informatics Journal, 20(1), 50–58.
Lupton, D., & Jutel, A. (2015). “It’s like having a physician in your pocket!” A critical
analysis of self-diagnosis smartphone apps. Social Science & Medicine, 133, 128–135.
Nguyen, A. D., Baysari, M. T., Kannangara, D. R., Tariq, A., Lau, A. Y., Westbrook, J. I., &
Day, R. O. (2016). Mobile applications to enhance self-management of gout. International
Journal of Medical Informatics, 94, 67–74.
Pantelopoulos, A., & Bourbakis, N. (2008, August). A survey on wearable biosensor sys
tems for health monitoring. In Engineering in Medicine and Biology Society, 2008. EMBS
2008. 30th annual international conference of the IEEE (pp. 4887–4890). IEEE.
Richardson, K. (2004). Internet discourse and health debates. New York: Palgrave
MacMillan.
Steinberg, D. M., Tate, D. F., Bennett, G. G., Ennett, S., Samuel-Hodge, C., & Ward, D. S.
(2013). The efficacy of a daily self-weighing weight loss intervention using smart scales
and e-mail. Obesity, 21(9), 1789–1797.
Svetkey, L. P., Batch, B. C., Lin, P. H., Intille, S. S., Corsino, L., Tyson, C. C., … & Gallis, J.
A. (2015). Cell phone intervention for you (CITY): A randomized, controlled trial of behav
ioral weight loss intervention for young adults using mobile technology. Obesity, 23(11),
2133–2141.
Wright, K. B., Rosenberg, J., Egbert, N., Ploeger, N. A., Bernard, D. R., & King, S. (2013).
Communication competence, social support, and depression among college students: A
model of Facebook and face-to-face support network influence. Journal of Health Commu
nication, 18(1), 41–57.
Notes:
(1.) As part of the review, The Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/ provides ac
cess to the top 50 most frequently occurring pairs and trios through a series of data visu
alizations. Click on View Data Visualizations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
Page 39 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Leanne Townsend
Leanne Townsend is a Senior Social Scientist working within the Social, Economic,
and Geographical Sciences Group at the James Hutton Institute, Aberdeen, Scotland.
Leanne leads research on a number of projects exploring digitization and innovation
in various rural contexts, including agriculture, rural entrepreneurship, and rural
community development.
Monica Whitty
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Health and Well-Being
five books, the latest being Cyberpsychology: The study of individuals, society and
digital technologies (Wiley, 2017, with Garry Young). She is currently leading an in
terdisciplinary project funded by TIPS (ESPRC) titled, Detecting and Preventing
Mass-Marketing Fraud.
Ronald E. Rice
Ronald E. Rice (PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the
Social Effects of Mass Communication in the Department of Communication at Uni
versity of California, Santa Barbara. Dr. Rice has been awarded an Honorary Doctor
ate from University of Montreal (2010), an International Communication Association
(ICA) Fellow, selected President of the ICA (2006–2007), awarded a Fulbright Award
to Finland (2006), and appointed as the Wee Kim Wee Professor at the School of
Communication and Information and the Visiting University Professor, both at
Nanyang Technological University in Singapore (Augusts 2007–2009 and June 2010).
His co-authored or co-edited books include Organizations and unusual routines: A
systems analysis of dysfunctional feedback processes (2010); Media ownership: Re
search and regulation (2008); The Internet and health care: Theory, research and
practice (2006); Social consequences of internet use: Access, involvement and inter
action (2002); The Internet and health communication (2001); Accessing and brows
ing information and communication (2001); Public communication campaigns (1981,
1989, 2001, 2012); Research methods and the new media (1988); Managing organi
zational innovation (1987); And The new media: Communication, research and tech
nology (1984). He has published over 150 refereed journal articles and 70 book chap
ters. Dr. Rice has conducted research and published widely in communication sci
ence, public communication campaigns, computer-mediated communication systems,
methodology, organizational and management theory, information systems, informa
tion science and bibliometrics, social uses and effects of the Internet, and social net
works. http://www.comm.ucsb.edu/people/ronald-e-rice
Elinor Carmi
Page 41 of 41
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.4
Keywords: computational content analysis, computer-mediated communication, Internet mental health, scoping
review, social media
Introduction
SINCE the earliest days of Internet, mobile phone, and social media use, researchers and
the general public have debated how computer-mediated communication (CMC) is relat
ed to mental health (e.g., Kraut et al., 1998; Kross et al., 2013; Turkle, 2011; Twenge,
Martin, & Campbell, 2018). Today, various disciplines (e.g., communication, psychology,
sociology, medicine) investigate a smorgasbord of CMC variables in relation to a great va
riety of negative (i.e., psychopathology) and positive (i.e., psychological well-being) mark
ers of mental health. Research in this field asks questions as diverse as, is loneliness a
driver or outcome of Facebook use (Song et al., 2014)? Does passively browsing through
Instagram increase depression levels by eliciting upward social comparison and envy
Page 1 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
(Verduyn, Ybarra, Résibois, Jonides, & Kross, 2017)? Does mobile voice communication in
crease social capital and, hence, affective well-being (Chan, 2015)?
This diverse interdisciplinary field has become seemingly impossible to overview, with
both primary research studies and reviews being published at what appears to be a rapid
ly increasing rate. Currently, various reviews exist, each synthesizing only a fraction of
the available evidence on the relation between CMC and mental health (e.g., Domahidi,
2018; Huang, 2010; Huang, 2017; Liu, Ainsworth, & Baumeister, 2016). This fragmented
state of the research landscape calls for a higher-level integration. (p. 80) We answer this
call in the form of a scoping review (Colquhoun et al., 2014; Pham et al., 2014), using both
computational and qualitative methods to chart the boundaries of this emerging research
field and to identify its core topics.
In defining and mapping the field of CMC and mental health research, we integrate this
fast-growing and interdisciplinary literature in the hopes of assisting researchers in navi
gating through it. Therefore, this review has three main goals:
1. To assess the scope, growth, and current state of the field by tracing the develop
ment of core topics in research on CMC and mental health for the last 20 years.
2. To characterize the publication behavior in the field, specifically by illuminating
who contributes to it (i.e., journals and disciplines).
3. To identify patterns of how the key construct of mental health has been studied in
relation to CMC.
We first define our key constructs, CMC and mental health, and provide a brief overview
of the state of the field. Guided by five research questions and three hypotheses, our
scoping review then addresses the goals outlined. Results of this comprehensive assess
ment of the literature are discussed with regard to implications for a future research
agenda.
As a first step towards an overview of the research field, the key constructs—CMC and
mental health—require thorough definition. We understand both terms as umbrella con
structs for a variety of technological (i.e., CMC) and psychological (i.e., mental health)
phenomena and consequently define them broadly.
We reviewed classical and more contemporary uses of the term (e.g., Hiltz & Turoff,
1978; Lee & Oh, 2015; Walther, 1992), and arrived at a broad definition of computer-me
diated communication (CMC) as multimodal human-to-human social interaction mediated
by information and communication technologies (ICTs). Social interaction here encom
passes all forms of interpersonal behavior, including everything from mere social atten
Page 2 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
tion (e.g., browsing through the Facebook News Feed) to deep communication (e.g., a
conversation via voice call; cf. Hall, 2018). We also limit our definition to those ICTs
whose primary and original—though not exclusive—function is the facilitation of CMC as
social interaction (e.g., email, chat, mobile text messaging, instant messenger, social net
work sites, but not, e.g., games).
Turning to our second umbrella construct, mental health is commonly understood from
two distinct perspectives: mental illness (psychopathology) and mental (p. 81) thriving
(psychological well-being). Psychopathology (PTH) refers to “any pattern of behavior—
broadly defined to include actions, emotions, motivations, and cognitive and regulatory
processes—that causes personal distress or impairs significant life functions, such as so
cial relationships, education, work, and health maintenance” (Lahey, Krueger, Rathouz,
Waldman, & Zald, 2017, p. 143). Psychological well-being (PWB), in contrast, is under
stood as a positive condition characterized by “optimal psychological functioning and
experience” (Ryan & Deci, 2001, p. 142). Note that we exclude physical health, as well as
socio-economic well-being, with these definitions.
This review is based on the extended two-continua model of mental health developed by
Meier and Reinecke (2020). Based on previous two-continua models (Greenspoon &
Saklofske, 2001; Keyes, 2007), they integrate the PTH and PWB perspective into a coher
ent framework and argue for a simultaneous assessment of both the negative (PTH) and
positive (PWB) side of mental health in relation to CMC. Based on a review of recent PTH
and PWB literature (e.g., Huta & Waterman, 2014; Lahey et al., 2017), Meier and Rei
necke (2020) further differentiate indicators of PTH (into externalizing and internalizing
disorders and symptoms) and PWB (into hedonic and eudaimonic dimensions) and com
plement the two mental health continua with risk factors (e.g., loneliness, stress, poor
sleep) and resilience factors (e.g., social resources, self-esteem), which are frequently
studied in relation to CMC. Note that these risk and resilience factors are understood as
important predictors of PTH and PWB, but not indicators of mental health in a strict
sense.
Next, we specify how CMC and mental health can relate to each other and which of these
relationships is eligible for our proposed definition of the field. This review is motivated
by the long-standing public and research debate on the key question of whether the avail
ability and usage of CMC hampers or contributes to “the good life” (e.g., Kraut et al.,
1998). Accordingly, we limit our review to two perspectives that address how the usage of
CMC relates to indicators of mental health. In the first perspective, CMC is understood as
a causal factor contributing to declines or improvements in mental health (i.e., the tech
nology effects perspective), while in the second, mental health is understood as a causal
factor explaining amount or types of CMC usage (i.e., the technology selection perspec
tive). Other approaches to CMC and mental health (e.g., inferring mental health from
CMC data traces or delivering mental health treatments via CMC) go beyond the focus of
this review.
Page 3 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
The State of the Research Field
This section provides a brief narrative overview of the development and current state of
research on CMC and mental health in order to illustrate why we believe the field can
benefit from a higher-level scoping review.
Following a long-standing research debate about the quality of social interaction via CMC
vs. face-to-face communication (e.g., Rice, 1980; Walther, 1992), the first study to explicit
ly investigate CMC in relation to mental health and hence virtually constitute (p. 82) this
field was Kraut et al.’s (1998) HomeNet study. In a longitudinal panel, 73 households
were surveyed during their first two years of Internet use. Although the authors found
that participants had frequently used the Internet for social interaction, higher levels of
Internet use were negatively related to indicators of social involvement and mental
health. The authors explained these negative effects through the displacement of offline
social activity and strong tie communication. The study received various critical respons
es (e.g., Walther & Parks, 2002) and follow-up studies both succeeded (e.g., Nie, Hillygus,
& Erbring, 2002) and failed (e.g., Kraut et al., 2002) to replicate its findings. Specifically,
the same authors in a later wave of the HomeNet panel found no evidence for social dis
placement (Kraut et al., 2002). Instead, in a second sample, they reported evidence for
positive effects of Internet use on mental health, at least for users high in extraversion
and social support, labeling this a “rich get richer” or social enhancement effect (as com
pared to a “poor get richer” or social compensation effect). For reviews of this early re
search, see, for example, Bargh and McKenna (2004), Huang (2010), Katz and Rice
(2002), or Valkenburg and Peter (2009). Since then, numerous studies have addressed the
core question of whether Internet use and CMC impact social resources, and, hence,
mental health (for recent reviews, see, e.g., Domahidi, 2018; Forsman & Nordmyr, 2015;
Liu et al., 2016; Mikal, Rice, Abeyta, & DeVilbiss, 2013).
However, beyond the focus on social resources, the field has markedly branched out in re
cent years, specifically since CMC via social network sites (SNS) and mobile
(smart)phones has permeated much of daily life. While researchers continue to address
social resources in relation to these newer ICTs (e.g., Chan, 2015; Ellison, Steinfield, &
Lampe, 2007), numerous other lines of inquiry have emerged. Researchers have, for in
stance, started to address how passively consuming others’ positively biased self-presen
tations in SNS is linked to mental health, specifically through the lenses of social compar
ison and envy (Verduyn et al., 2017). The authenticity of SNS self-presentations has also
been linked to the mental health of the presenters themselves (Twomey & O’Reilly, 2017).
Furthermore, studies have repeatedly linked “screen time” as a global indicator of ICT us
age to the mental health of adolescents (Przybylski & Weinstein, 2017; Twenge, Martin et
al., 2018). Various theoretical links between CMC and decreased or increased mental
health have also been confirmed, including self-affirmation (Toma & Hancock, 2013), so
cial sharing of emotions (Choi & Toma, 2014), extended self theory (Clayton, Leshner, &
Almond, 2015), multitasking (van der Schuur, Baumgartner, Sumter, & Valkenburg, 2015),
or deficient self-regulation (Meier, Reinecke, & Meltzer, 2016), among many others. Si
multaneously, a more clinical “addiction” or “problematic usage” approach to CMC and
Page 4 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
mental health has gained traction (for reviews, see, e.g., Carli et al., 2013; Tokunaga &
Rains, 2010).
Overall, the field appears to have grown considerably in recent years and has become in
creasingly difficult to overview for individual researchers. While several reviews of specif
ic relationships between forms of CMC (e.g., SNS use) and single indicators of mental
health (e.g., depression) exist (e.g., Baker & Algorta, 2016), there is little awareness of
the research field as a whole. This is problematic for at least two reasons: First, re
searchers may simply not be aware of similar or related work being done outside of their
“disciplinary bubbles” or “invisible colleges” (Zuccala, 2006). Without awareness (p. 83) of
a field as a whole, researchers may unnecessarily “reinvent the wheel,” especially every
time a new ICT grasps (younger) users’ attention. Second, while the diversity of research
questions and theoretical concepts in this field seems staggering, several of the topics
outlined earlier also show considerable conceptual overlap. Integrating this literature to
achieve consensus about its basic concepts (i.e., CMC and mental health), their relation,
as well as its core underlying themes and topics, thus appears paramount.
Based on the available literature on CMC and mental health and its deficient higher-level
integration as a larger research field, we arrive at three distinct foci for our review: (1)
core topics, (2) publication behavior in the field, and (3) mental health concepts.
1. While our brief narrative review highlights some of the issues that research on CMC
and mental health has addressed, it does so in an inherently selective manner. In con
trast, here we aim to systematically identify a variety of core topics that have received
considerable research attention in the field. Moreover, the development of these topics
over time and their relative impact on the field as a whole remain unclear: While some
topics may continuously dominate the field, others may have fallen or risen in research
attention. Accordingly, we ask the following research questions:
RQ1: What are the core topics of research on CMC and mental health?
2. Beyond identifying core topics, we also aim to characterize the publication behavior in
the research field, that is, the publication rate, publication outlets, and contribution of
different disciplines. These criteria allow an assessment of the trajectory of research on
CMC and mental health (publication rate) and a critical examination of who (journals and
disciplines) contributes to this field. The latter, in particular, may have implications for
the kind of research questions asked, the concepts studied (see focus 3: mental health
concepts), and the representativeness of research findings.
First, based on the increasing public debate on the relationship between CMC and mental
health (e.g., Turkle, 2011; Twenge, Martin et al., 2018), a rise in systematic review arti
cles on this issue in recent years (Meier & Reinecke, 2020), and a general upward trend
Page 5 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
in overall publication output (Günther & Domahidi, 2017), we assume that this research
field is growing:
H1: The number of publications in CMC and mental health research has in
creased over time.
Second, we aim to identify key publication outlets that particularly contribute to research
on CMC and mental health. This is important for two reasons: First, researchers previous
ly unfamiliar with this field can benefit from knowing which key outlets to turn to for both
(p. 84) targeted literature searches and to submit publications that reach an audience
likely to be interested in their work. Second, publication outlets can serve as proxies to
identify the contributions of different disciplines to this field (see H2 and RQ4). Accord
ingly, we ask:
RQ3: What are the key outlets that publish research on CMC and mental health?
Third, beyond assessing the publication outlets, another approach to mapping a research
field lies in assessing its disciplinary boundaries (e.g., de Chavez, Backett-Milburn, Parry,
& Platt, 2005). Interdisciplinary research creates a rich and multifaceted literature, but
may come at the price of insufficient research integration, for example, because re
searchers are not aware of relevant work being published outside of their discipline. Our
review attempts to further integration by making visible who contributes to the field of
CMC and mental health.
However, based on our narrative review and the nature of the subject matter studied, we
feel safe to assume that the field has been particularly driven by researchers with a back
ground in psychology (e.g., Twenge, Martin et al., 2018) and by papers published in psy
chological journals (e.g., Kraut et al., 1998; Meier & Reinecke, 2020). Accordingly, we ex
pect:
Beyond psychology, however, there may be various other disciplines contributing to this
research field due to the increasing concern over and recognition of technology’s impact
on society and the individual (see this Handbook). We thus ask:
Page 6 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
lumping together PTH and PWB indicators under the PWB label). Researchers in this field
often fail to address whether the mental health indicators they empirically assessed allow
statements about PTH or PWB or both (e.g., Kraut et al., 1998). Moreover, at least from a
media effects perspective, the choice of mental health indicators in empirical studies
should depend on whether one expects CMC to impair mental health, which should favor
PTH indicators, or contribute to mental health, which should favor PWB. The choice of
mental health concepts—that is, whether researchers measure indicators of PTH or PWB
—thus at least partly reflects researchers’ (implicit) (p. 85) assumptions about whether
CMC is more relevant for mental illness (PTH) or mental thriving (PWB). These assump
tions may vary over time (e.g., due to researchers shifting their focus from negative to
positive technology effects, or because some mental health indicators become more rele
vant with the emergence of new ICTs) as well as discipline and topic (e.g., some disci
plines focus on topics that relate CMC only to PTH while others focus on CMC in relation
to PWB; cf. de Chavez et al., 2005). This leads us to ask:
RQ5: How are the mental health concepts PTH and PWB distributed (a) over
time, (b) within and between disciplines, and (c) within and between topics?
While we are interested in the general trajectory of both concepts, there is some reason
to believe that, overall, studies will address PTH more often than PWB. Typically, new me
dia and communication technologies are met with cultural critique, skepticism, or even
moral panic (e.g., Jensen, 1990; Buckingham & Strandgaard Jensen, 2012). This is cer
tainly the case with CMC, as illustrated by fierce public and research debates about the
impact of each new and popular ICT, especially on younger users (e.g., Kraut et al., 1998;
Turkle, 2011; Twenge, Joiner, Rogers, & Martin, 2018; Walther & Parks, 2002). With re
gard to mental health, researchers are then more likely to address CMC in relation to im
pairments of mental health (i.e., PTH) rather than to contributions to optimal psychologi
cal functioning (i.e., PWB). Accordingly, we expect:
However, over time, researchers typically go beyond a “negative effects” paradigm and
start investigating the positive potentials of media and communication technologies. Tele
vision research, for instance, started by addressing the potentially negative impact on ag
gression, people’s tendency to seek escape, or cultivation effects, but later turned to posi
tive potentials for mood management and meaningful entertainment (for an overview, see
Reinecke & Oliver, 2017). We expect a similar shift with regard to CMC and mental
health. Specifically, we expect to see a larger increase in research studying CMC in rela
tion to the positive (PWB) than the negative side of mental health (PTH).
H3b: Over time, the rate of research investigating PWB will increase more than
the rate of research investigating PTH.
Page 7 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Method
Scoping Review Methodology
To chart the vast, highly fragmented, and fast growing literature on CMC and mental
health we make use of scoping review methodology (Colquhoun et al., 2014; Pham et al.,
2014). In reaction to the exponential rise in research output (Günther & Domahidi, 2017),
scoping reviews have become a popular approach for research synthesis in many disci
plines. The main function of this type of review is “to map a vast body of research litera
ture in a field of interest in terms of the volume, nature, and characteristics of the prima
ry research” (Pham et al., 2014, p. 371). Scoping reviews are particularly relevant when a
field of interest is highly heterogeneous in nature (Mays, Roberts, & Popay, 2001) and
helpful in tracing the emergence of new (sub-)fields. Moreover, they can illuminate a
field’s main lines of inquiry (i.e., its topics) as well as its disciplinary boundaries; uncover
gaps and trends in the literature; and, most importantly, point to future directions for fur
ther research integration.
Scoping reviews have rarely been applied in the field of communication (e.g., Peng,
Zhang, Zhong, & Zhu, 2013), although research on mass media, ICTs, and CMC is inher
ently interdisciplinary and growing fast (Günther & Domahidi, 2017). We believe that this
type of review represents a useful method to assess the state of research on the relation
ship between CMC and mental health. As research in this area is currently particularly
fragmented and likely growing exponentially, a “classical” review approach that involves
hand searches and manual coding would be highly resource-intensive. We therefore make
use of economical and effective computational methods that have recently gained popu
larity in communication (e.g., Günther & Domahidi, 2017; Peng et al., 2013; Rauchfleisch,
2017). Besides allowing us to conduct a scoping review based on a great amount of infor
mation (Tsafnat et al., 2014), computational methods facilitate thematically comprehen
sive reviews, as they are typically based on large-scale systematic sampling and quantita
tive analysis (Borenstein, Hedges, Higgins, & Rothstein, 2009). To also provide more in-
depth and detailed accounts of the reviewed body of literature, we combine these compu
tational methods with qualitative manual coding wherever necessary (e.g., to select the
topics relevant for our research question, or to further illustrate the meaning of topics
identified by our quantitative analysis).
Sample
Page 8 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
The final search string was then applied to search articles’ abstracts via the meta-data
base EBSCO Host from 1998 (i.e., the year of publication of Kraut et al.’s pivotal article)
until April 4th 2018. EBSCO Host offers access to a wide range of databases and journals
and (p. 87) allows downloading abstracts and metadata (though not full texts) for all
search results as an .xml file. We searched 10 databases within EBSCO Host representing
a broad variety of disciplines that may conduct research on CMC and mental health (see
Table 4.1). Automated content analysis is highly dependent on language; thus, only publi
cations in English were included. Included publication formats were journal articles, dis
sertations, and conference proceedings.
Page 9 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
After downloading, we excluded all duplicates and entries with missing abstract and/or ti
tle data, resulting in our final sample of 4,118 potentially relevant documents. All our
analyses are based on articles’ abstracts and metadata (i.e., title, year of publication,
journal title).
Analytical Approach
Topic modeling. To process the large sample, we opted for an automated content analy
sis, specifically topic modeling. Topic modeling is an unsupervised machine learning ap
proach “inferring topics from recurring patterns of word occurrence in
documents” (Maier et al., 2018, p. 94). Note that topic models are mixed membership ap
proaches, meaning that documents can be associated with multiple topics (Maier et al.,
2018). Given the characteristics of our sample (i.e., topics are likely to be correlated), we
estimated a (p. 88) Correlated Topic Model (CTM) based on the text in articles’ abstracts
(Blei & Lafferty, 2009). Common preprocessing steps such as word stemming and TFIDF
weighting were implemented (Manning, Raghavan, & Schütze, 2008) with the R package
tm:0.7-3 (Feinerer, Hornik, & Meyer, 2008). Following a common approach, we estimated
90 topic models from k = 20 to k = 200 in order to find the number of topics k that deliv
ers the best model fit for our data. We then estimated our CTM with the resulting para
meter value of k = 110 topics using the R topicmodels_0.2-7 package (Grün & Hornik,
2011). Based on the estimated hyperparameter values, we observed a few dominant top
ics per document (instead of a high number of equally distributed topics). To avoid
skewed results, we selected the two topics with the highest probability, meaning the like
lihood that a topic k occurs in a given abstract. Additionally, we only considered topics
with a minimum probability of 0.1 in a given abstract.
Manual topic selection and merger. After the automated analysis, we manually
checked abstracts and titles for all topics that appeared as first or second most probable
in more than 50 documents (Maier et al., 2018). Out of the identified 110 topics, we man
ually selected only those topics that fit our specific research focus for further analysis
(see the section on Defining key constructs). This manual topic selection resulted in a re
duction of our sample to 15 topics (N = 1780 abstracts). All analyses are based on this re
duced sample. We then merged the 15 topics into nine based on our qualitative assess
ment that they showed high thematic overlap. That is, we retained the algorithmically
identified 15 topics, but manually grouped them together on a more general level, based
on common research themes investigated in these topics. This merger was done to en
sure a parsimonious yet still exhaustive analysis. For each of the nine merged topics, we
chose a label that best represents its content on a conceptual level above and beyond the
words associated with each topic (see Table 4.2).
Publication behavior in the field. Journal names were determined from article metada
ta. Additionally, we manually coded journals’ disciplinary affiliations for all journals that
had published three or more articles in our sample. Coding was based on a journal’s So
cial Science Citation Index (SSCI) categorization (see end of chapter for URL). In a few
cases, journals were not listed in the SSCI; disciplinary affiliations were then coded based
Page 10 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
on the journal’s self-description taken from its web presence. In a next step, SSCI sub-dis
cipline categories (e.g., developmental psychology, social psychology, clinical psychology)
were grouped in broad disciplines (e.g., psychology) to ensure comparability of results
across a reasonable number of disciplines. Note that journals can be listed for multiple
disciplines in the SSCI and were coded and analyzed accordingly (71 journals belonged to
only one discipline, 30 belonged to two disciplines, five belonged to three disciplines, and
two belonged to four disciplines). Publication outlets other than journals (e.g., Disserta
tion Abstracts databases) were not coded for disciplinary affiliation.
Concepts. The two key mental health concepts, psychopathology (PTH) and psychologi
cal well-being (PWB), were identified via a keyword search based on lists of relevant ex
pressions which we applied to the downloaded abstracts, title, and keywords of all (p. 89)
1780 documents (see Table 4.1). The keyword search included terms from our literature
search string as well as additional terms originally not included in the literature search
string due to high rates of false-positive search results (e.g., “social capital” or “disor
der”). We ensured that both concepts were operationalized with roughly the same num
ber of keywords to avoid bias.
Software. All data management, cleaning, and analysis was performed using R (R Core
Team, 2018). All visualization was done with the R package ggplot2_2.2.1 (Wickham,
2009).
Results
Core Topics
To answer RQ1, we illustrate each topic based on example research themes derived from
documents associated with each of the 15 topics grouped into nine core topics (see Table
4.2). Due to the high number of documents, we can only include exemplary citations for
each topic, taken from the complete topic modeling dataset (N = 1780). These only serve
to illustrate a topic and do not represent the definitive state of the respective sub-field.
However, we generally chose the most recent and most thematically fitting publications in
order to provide an accurate description of the current state of the topic. The complete
references for these citations can be found in the appendix. Topics are sorted in descend
ing order based on the (aggregated) number of documents associated with each topic.
Page 11 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Table 4.2 CTM with 15 Manually Selected Topics Merged into Nine
Thematically Overlapping Topic Clusters, Sorted by Aggregated Fre
quencies (k = 110, N = 1780, Max. 2 topics/Document, Prob ≥ 0.1)
Page 12 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Internet addiction & problematic Internet use. Internet addiction (IA; topic 1a) is a
controversially debated, but dominant, approach to the study of CMC and mental health
since the earliest days of commercial Internet use (e.g., Young & Rodgers, 1998). It postu
lates that excessive Internet use—for some—can result from or reflect impulse control,
substance abuse, or compulsive disorders (Widyanto & Griffiths, 2006). While some use
the terminology interchangeably, problematic or pathological Internet use (PIU; 1b) often
represents one of several alternative approaches to this issue (e.g., Caplan, 2003; Karde
felt-Winther, 2014; Tokunaga, 2014). PIU recognizes problematic behaviors surrounding
(excessive) Internet use, but does not necessarily see these behaviors as indicative of be
havioral addiction.
Numerous studies have linked IA/PIU to various psychopathological symptoms and disor
ders (e.g., Floros, Siomos, Stogiannidou, Giouzepas, & Garyfallos, 2014) or lacking social
resources (e.g., Wu et al., 2016). However, beyond providing evidence of construct validi
ty and assessing comorbidity, studies finding negative relationships between IA/PIU and
mental health appear somewhat tautological, as its measures often include impaired men
tal health as a diagnostic criterion. Furthermore, a much contended issue pertains to the
causal direction between comorbid psychopathology and IA/PIU (e.g., Carli et al., 2013).
Page 13 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
(p. 90)Facebook & SNS use. With the rise of SNS, specifically Facebook, a second large
research topic has emerged. Often, studies extend classic research on CMC and mental
health (e.g., on the displacement of face-to-face contact) to the SNS context (e.g., Dienlin,
Masur, & Trepte, 2017). While some studies appear largely atheoretical and “effects-
driven” (e.g., Huang, 2017; Shakya & Christakis, 2017), increasingly research (p. 91) illu
minates how the passive consumption of others’ (often positively biased) self-presenta
tions on SNS elicits upward social comparison and emotional reactions such as envy (e.g.,
Blease, 2015; Kross et al., 2013; Tromholt, 2016; Verduyn et al., 2015). Some of this re
search gathers under the label of “Facebook depression” (Steers, 2016). In contrast to
this negative perspective on SNS and mental health, much work has assessed positive
mental health effects of social support and social capital derived from SNS use (e.g.,
Nabi, Prestin, & So, 2013), albeit also finding mixed results (e.g., Utz & Breuer, 2017).
Another theme within this broader topic has been the relationship between individuals’
loneliness and their SNS use (i.e., social compensation vs. social enhancement; e.g., Song
et al., 2014). It should be noted that the Facebook sub-topic (2a) was considerably more
frequent than the general SNS topic (2b), reflecting a “Facebook bias” in this research
(see Table 4.2).
Mobile & smartphone use. Research on the role of mobile phones (3a) and smart
phones (3b) in mental health shows a variety of themes: Epidemiological and medical
work, for example, is linking mobile screen time to impaired mental health, especially
among adolescent users (e.g., Babic et al., 2017). Early mobile research, in contrast, has
identified the emotional attachment that users have to their mobile devices as a double-
edged sword (Vincent, 2006), providing positive feelings of connectedness to social ties,
but eliciting anxiety once the mobile is absent (sometimes termed “nomophobia”; e.g.,
Hoffner, Lee, & Park, 2016). Another recent line of research investigates “phubbing,” the
snubbing of conversation partners by using mobiles phones during face-to-face talk,
which has been linked to reduced quality of social interactions and relationship satisfac
tion (e.g., Rotondi, Stanca, & Tomasuolo, 2017). Studies have also investigated the posi
tive (Pearson, Mack, & Namanya, 2017) and negative (Xie, Zhao, Xie, & Lei, 2016) sides
of mobile phone usage in rural and developing areas.
Research on attachment theory (4a) investigates how different attachment styles (e.g.,
anxious vs. avoidant) impact CMC usage in (romantic) relationships (Oldmeadow, Quinn,
& Kowert, 2013) and its effects on relationship well-being (e.g., intimacy or satisfaction).
Morey, Gentzler, Creasy, Oberhauser, and Westerman (2013), for instance, find that at
tachment style moderated most of the effects between CMC and relationship quality. Oth
er work has studied how attachment style is related to using CMC for break-ups or moni
toring of ex-partners via SNS (Weisskirch & Delevi, 2012).
Page 14 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Self-disclosure (4b) crucially contributes to maintaining interpersonal relationships and
receiving social support, and is hence beneficial for mental health. Often coming from a
hyperpersonal perspective (e.g., High & Caplan, 2009), this line of research investigates
how social anxiety relates to more disinhibited disclosures in CMC (Schouten, Valken
burg, & Peter, 2007) and provides evidence for social compensation (“poor get richer”) ef
fects (Weidman et al., 2012).
Finally, research on friendship and dating via CMC (4c) finds further evidence for
(p. 92)
such compensation effects (e.g., Desjarlais & Willoughby, 2010; Selfhout, Branje, Delsing,
ter Bogt, & Meeus, 2009), but also for social enhancement (“rich get richer”) effects in
online dating (Valkenburg & Peter, 2007). In dating relationships among adolescents, the
role of social anxiety has further been studied with regard to “electronic intrusion,” that
is, overcontrolling behavior towards one’s partner via CMC (Reed, Tolman, Ward, & Safy
er, 2016).
Chatting & texting. The research clustered around chatting (5a) and texting (5b) inves
tigates several of the issues outlined previously with a specific focus on text-based CMC.
Partly in reaction to Kraut et al.’s (1998) survey, researchers have, for instance, assessed
the relation between chatting and mental health experimentally and found positive effects
—specifically, reductions in depression and loneliness as well as increases in social sup
port and self-esteem (e.g., Shaw & Gant, 2002). However, researchers have also studied
chatting and texting from an addiction perspective, sometimes under the label of compul
sive Internet use (CIU; van den Eijnden, Meerkerk, Vermulst, Spijkerman, & Engels,
2008), and found CIU to be linked longitudinally to higher depression levels. Text messag
ing has also been differentially associated with relationship well-being (Park, Lee, &
Chung, 2016) and affective well-being (Hall, 2017). Notably, many studies in this topic as
sess and confirm mental health variables as predictors (e.g., loneliness, social anxiety, or
depression symptoms), rather than outcomes of texting behavior (e.g., Coyne, Padilla-
Walker, & Holmgren, 2018; Reid & Reid, 2010).
Cyberbullying. The phenomenon of cyberbullying (6) has received much research atten
tion over the past 20 years (Chen, Ho, & Lwin, 2017). Researchers have, for instance,
studied whether cyberbullying extends or replaces offline bullying (Kubiszewski,
Fontaine, Potard, & Auzoult, 2015) and tested whether cyberbullying uniquely contributes
to victims’ mental health impairments when controlling for offline bullying (Hase, Gold
berg, Smith, Stuck, & Campain, 2015; Sjursø, Fandrem, & Roland, 2014). Typical out
comes of cyber victimization include internalizing and externalizing psychopathology
(Schultze-Krumbholz, Jäkel, Schultze, & Scheithauer, 2012), and stress (Wright, 2015).
Researchers have also found psychopathology to predict whether adolescents become cy
berbullies (Chen et al., 2017). Research on this topic shows a unique focus on children
and adolescents, but has also recognized cyberbullying as a prevalent phenomenon in the
workplace (Vranjes, Baillien, Vandebosch, Erreygers, & de Witte, 2018) and in the form of
online trolling behavior (Hong & Cheng, 2018).
Page 15 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
ICT adoption. This topic (7) focusses on how the adoption of or access to ICTs affect the
well-being of different (marginalized) populations (e.g., elderly, rural inhabitants, low-in
come individuals, inhabitants of developing regions; Greyling, 2018; Ihm & Hsieh, 2015;
Tseng & Hsieh, 2015). Some of this research comes from a digital divide or digital in
equality perspective (e.g., Nie, Sousa-Poza, & Nimrod, 2017), studying differences in ac
cess, adoption, and effects depending on various sociodemographic factors. In contrast to
emphasizing the desirability of equal access to ICTs, researchers have also proposed that
increased ICT access can negatively affect well-being, for instance, by (p. 93) raising ma
terial aspirations (Lohmann, 2015). Overall, research on this topic takes a more sociologi
cal and economical macro perspective.
Work-related CMC. With the radical shift in work-environments towards email and mo
bile communication, research has been paying attention to the role that CMC plays for
workers’ well-being (8). For instance, research has explored how email usage contributes
to “technostress” and burnout (Carmago, 2008; Ninaus, Diehl, Terlutter, Chan, & Huang,
2015) or the well-being tradeoffs made when resisting interruptions from emails during
work tasks (Russell, Woods, & Banks, 2017). Research by Sonnentag, Reinecke, Mata,
and Vorderer (2018), however, shows that the effects of interruptions through messages
at work are not uniformly negative and depend on the user’s responsiveness. The impact
of incivility in email communication on well-being within organizations is another theme
within this topic (e.g., Giumetti, McKibben, Hatfield, Schroeder, & Kowalski, 2012). Con
cerning positive effects, researchers also recognize the potential of CMC technologies to
allow for micro-breaks at work, facilitating recovery and, hence, well-being (Ivarsson &
Larsson, 2011).
ICT use & sleep. Finally, emerging research increasingly links ICT use to poor sleep
quality (9), for example, through sleep displacement (e.g., Rosen, Carrier, Miller, Rokkum,
& Ruiz, 2016; Thomée, Eklöf, Gustafsson, Nilsson, & Hagberg, 2007). Poor sleep is a cru
cial risk factor for various psychopathologies. Research on this topic has found increased
social media use, both overall and nighttime-specific, to be linked to decreased sleep
quality among adolescents (Woods & Scott, 2016). A study also found that the collapse of
social contexts resulting from constant connectivity via ubiquitously used ICTs created
“telepressure” among college students (Barber & Santuzzi, 2017), which contributed to
poorer sleep hygiene (e.g., not going to bed at a regular time).
Concerning the development of these nine core topics over time (RQ2), some topics did
increase particularly sharply in the last decade (see Figure 4.1). While topic 2 “Facebook
& SNS use” is only represented with one publication in 1998 and only two in 2008, in the
year 2017 we already find 62 publications on the topic. The same is true for topic 1 “In
ternet addiction & problematic Internet use,” a topic only represented with four publica
tions in 1998 and eleven in 2008, but 74 in 2017. Other topics such as topic 6 “cyberbul
lying” (2002: n = 1, 2008: n = 1, 2017: n = 28) increased less in the last decade. Overall,
Page 16 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
we observe a sharp increase in research on CMC and mental health since 1998. Accord
ingly, H1 was supported.
Concerning RQ3, the number of outlets for research on CMC and mental health is very
high, with 715 different publication outlets in our final sample. However, the number of
(p. 94) (p. 95) documents per outlet is often low (i.e., the distribution is highly skewed to
wards a few outlets that publish most of the research in the field). Figure 4.2 displays the
output of the 20 outlets with the highest number of documents in our sample. When inter
preting these results, it is important to keep in mind that outlets differ both in terms of
how far their archives date back, and in their yearly output (affected by number of issues
per year and articles per issue). We clearly find two psychological journals, Computers in
Human Behavior (n = 174) and Cyberpsychology, Behavior and Social Networking (n =
110) to have published the largest relative share of research on CMC and mental health.
Interestingly, genuine communication journals do not play an important role, with only
the Journal of Computer Mediated Communication (n = 14) among the top 20 publication
outlets. Note that while journals dominate the publication outlets, there is also a high
number of dissertations on CMC and mental health both in the “Sciences and
Engineering” (Diss. Abstract B, n = 133) and “Humanities and Social Sciences” (Diss. Ab
stracts A, n = 51).
Page 17 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
We also analyzed the relative importance of disciplines for this research field. Clearly (see
Figure 4.3), psychology is the discipline publishing most research on CMC and mental
health (n = 510). We thus find support for H2. To answer RQ4, we look at the other disci
plines and find psychiatry (117), other social sciences (101), health and medicine (74),
and other (the residual category; 70), followed by communication (69), computer and in
formation science (60), and education (55) to considerably contribute to this field. The re
maining publications (n = 832) were either scattered over other outlets (e.g., Diss. Ab
stracts), which we could not clearly classify by discipline, or they were (p. 96) published in
journals with fewer than three articles on CMC and mental health and hence not included
in this analysis.
Disciplines vary with regard to their growth rates of publications on CMC and mental
health. Communication is not represented in the year 1998, has three articles in 2008,
while the rate increased fourfold to 13 articles in 2017. Psychology has a similar output of
only three articles in 1998 and 11 in 2008, but an almost sevenfold increase to 73 articles
in 2017. The interest of psychology in CMC and mental health research thus seems to
have increased particularly sharply.
Page 18 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
In order to answer RQ5a and test H3, we searched for terms representing each of the two
concepts, psychopathology (PTH) and psychological well-being (PWB), in our sample. In
general (see Figure 4.4), we found that research on PTH (n = 1205) is more prevalent
than on PWB (n = 808). We thus find support for H3a. However, a number of publications
addressed both concepts simultaneously (n = 368)—that is, they included both terms as
sociated with PTH and terms associated with PWB. Note that 135 abstracts could not be
classified in our sample as they included neither a term indicative of PTH or of PWB;
specifically, the search term “mental health” was considered to capture both concepts
and thus not included in the concept analysis (see Table 4.1 for details on the terms used).
In order to test H3b we look at the increase over time in number of publications contain
ing each concept. While PTH is represented with seven publications in the year 1998, and
32 in 2008, in 2017 we find 176 publications. PWB is represented with five publications in
1998, 19 in 2008, and 128 in 2017. While the increase rate is the same for both concepts
(p. 97) for the last two decades (factor 25), we find a slightly higher increase for PWB in
the last decade (factor 6.7) than for PTH (factor 5.5). Hence, we find weak support for
H3b.
Page 19 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
With regard to RQ5b, we find differences concerning the disciplines that publish research
on both concepts (see Table 4.3). While in communication journals the concept PTH (n =
49) is only 1.1 times as common as the concept PWB (n = 37), in psychology the rate is
1.8 (PTH: n = 397; PWB: n = 222), and in psychiatry studies on PTH (n = 90) were three
times more common than on PWB (n = 31).
Page 20 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational Scoping Review of an Interdisciplinary
Field
Communication 49 37 21 4
Psychiatry 90 31 16 12
Education 40 27 14 2
Social Sciences 65 51 19 4
(Other)
Other disciplines 45 32 11 4
Note: PTH = psychopathology; PWB = psychological well-being. Based on the data from our CTM with manual se
lection of 15 relevant topics, merged into nine topics based on high thematic overlap, k = 110, N = 1780, max. 2 top
ics/document with topic probability ≥ 0.1.
Page 21 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Regarding the question of how the two mental health concepts are distributed over topics
(RQ5c), we find several noteworthy differences (see Table 4.4). In most topics such as “In
ternet addiction & PIU,” “mobile & smartphone use,” “relationships & CMC,” (p. 98)
“chatting & texting,” “cyberbullying,” and “ICT use & sleep,” we find a clear focus on
PTH. On the contrary, research on “Facebook & SNS use” shows an almost balanced dis
tribution of the concepts, while in the topics “ICT adoption” and “work-related ICT use”
we find more publications on PWB.
Page 22 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational Scoping Review of an Interdisciplinary
Field
Cyberbullying 151 66 43 11
ICT adoption 47 96 17 10
Work-related CMC 67 81 41 8
Page 23 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational Scoping Review of an Interdisciplinary
Field
Note: PTH = psychopathology; PWB = psychological well-being; based on the data from our CTM with manual se
lection of 15 relevant topics, merged into nine topics based on high thematic overlap, k = 110, N = 1780, max. 2 top
ics/document with topic probability ≥ 0.1.
Page 24 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Discussion
Summary and Contribution
Since the mid-1990s, Internet and ICT use has firmly established itself in the everyday
lives of billions of people around the globe (International Telecommunications Union,
2018). As this Handbook summarizes, a large part of our daily social behavior is now me
diated by technology. The question of whether and how such computer-mediated commu
nication is related to the mental health of users has been the center of much public de
bate and research attention. With the emergence of new, heterogeneous, and interdisci
plinary lines of research on CMC and mental health (Meier & Reinecke, 2020), the chal
lenge of defining and navigating this field has arisen. We face this challenge by present
ing this scoping review, which identifies core topics as well as structural properties of the
field.
Our results underline that research interest in CMC and mental health has increased dra
matically in the last 10 years. Beyond the general increase in publication output across
disciplines (e.g., Günther & Domahidi, 2017), a likely explanation for this is the radical es
tablishment of social media (e.g., SNS) and smartphones in daily life, and an increase in
societies’ and researchers’ concerns surrounding their potential impact (e.g., Twenge,
Martin et al., 2018). With regard to the core topics, research on Internet addiction and
problematic Internet usage clearly dominates the field. However, there is a variety of top
ics that offer alternative approaches to the study of CMC and mental health. Specifically,
there is a strong and fast growing research focus on Facebook and SNS, as well as on mo
bile (smart)phone usage, and the role that CMC plays in close interpersonal relationships.
Our qualitatively derived topic descriptions imply that, instead of largely atheoretical
overpathologizing of everyday life behavior (Billieux, Schimmenti, Khazaal, Maurage, &
Heeren, 2015), researchers now also apply more fine-grained theoretical approaches that
specify both how CMC can impact mental health (e.g., social comparison or attachment
theory) and how mental health can be a predictor rather than an outcome of CMC (e.g.,
social compensation vs. social enhancement). The topics also highlight that while the fo
cus of the first research decade (i.e., how CMC impacts social resources) is still very
much present in the literature (Domahidi, 2018), there are numerous other important
connections between CMC and users’ mental health that receive considerable research
attention.
Our qualitative topic descriptions also further specify the fragmentation and lack of theo
retical integration of the research field. While research on some topics such as (p. 99)
“ICT adoption” or “ICT use & sleep” seems to focus more on global usage indicators such
as access to ICTs or time spent in front of screens, research on other topics investigates
the interpersonal communication unfolding within a specific ICT channel (see, e.g., “rela
tionships & CMC”). That is, research on different topics focuses on different aspects and
indicators of CMC, with potentially unique implications for its relation to mental health. A
Page 25 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
much needed systematization and integration of these different operationalizations of
CMC would go beyond the focus of this scoping review, representing an important im
pulse for future research.
Concerning mental health, both topics and disciplines differed in how much they ad
dressed the two key concepts, psychopathology and psychological well-being. Overall, the
research in this field emphasizes PTH, which may indicate a dominant presumption that
CMC is more related to mental illness than to mental thriving. While this could also be in
terpreted as studies investigating how CMC reduces risks of mental illness (hence also fo
cusing on PTH instead of PWB), the topics identified here suggest that this was not a
common approach in our sample. However, some topics showed a focus on PWB, while
only research on the topic “Facebook & SNS use” overall equally addressed both PTH and
PWB concepts. We also found research on PWB to increase slightly more frequently in the
last decade, potentially indicating researchers’ increasing—or reemerging (cf. Hiltz &
Turoff, 1978)—recognition of the positive potentials of CMC for PWB. We encourage fu
ture researchers to further reflect upon whether a sole focus on negative (PTH) or posi
tive (PWB) markers of mental health is justified for their specific research question and
whether their investigation can benefit from a more comprehensive appreciation of the
full mental health spectrum (Meier & Reinecke, 2020).
Concerning the structural properties of the field, we find clear evidence for a dominance
of psychological research. This appears understandable, given that any study of human
behavior in relation to mental health requires a thorough understanding of the human
psyche. However, it may also affect the kind of research questions that are (not) studied
with regard to CMC and mental health. While psychological research typically focusses
on an individual’s cognition, affect, and behavior vis-à-vis CMC, sociological research, for
instance, may seek to explain relationships between CMC and mental health by investi
gating differences in users’ network structures (e.g., Haythornthwaite, 2005). Similarly,
communication research may add a more detailed conceptualization of different aspects
of communication unfolding within CMC channels (e.g., Walther & Parks, 2002), instead
of conflating them in global “time spent” or “screen time” indicators of technology use.
More research from perspectives beyond psychology may thus help fully understand how
CMC affects and is affected by ICT users’ mental health.
Limitations
The results of this scoping review need to be interpreted in light of several limitations
concerning both sampling and analysis. First, our review only includes publications that
explicitly mentioned both CMC and mental health concepts (as operationalized by our
(p. 100) search string) in their abstracts. Many more empirical and theoretical articles
may inform research on how CMC relates to mental health and vice versa, but fail to men
tion this in their abstracts.
Second, our review relies on a systematically drawn sample of publications on CMC and
mental health. Systematic reviews, in general, can hardly include all available literature
Page 26 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
or even draw a representative sample, as the population of relevant documents is typical
ly unknown. Instead, we aimed to balance the precision of our search (e.g., by excluding
certain terms that resulted in high numbers of false-positives) with an adequately com
prehensive recall of eligible articles (e.g., by relying on a broad interdisciplinary database
search). Still, some research that may be relevant to this field could not be included here.
For instance, we explicitly excluded the search term “suicide” due to very high numbers
of false-positives in our initial literature searches. Research on how some forms of CMC
(e.g., SNS use) may be related to suicide is thus not represented here (e.g., Twenge, Join
er et al., 2018). Third, the accessibility of databases used for sampling is contingent on a
researcher’s institutional access to EBSCO Host, which in our case was provided by the
Free University of Berlin, Germany. Fourth, each journal’s terms of publication (frequen
cy of issues and number of articles per year), the year in which a journal was launched,
and the extent to which older issues are digitized determine the availability and total
number of abstracts and metadata online. Not all journal archives are fully digitized; thus,
some relevant abstracts may be missing from our dataset. Fifth, we only included re
search published in English. Research from some parts of the world is likely underrepre
sented in this review.
Concerning the impact of different disciplines on the research field, we only assessed dis
ciplines based on journals’ SSCI categories and our manual aggregation of these cate
gories into broad groups of disciplines. However, researchers from various disciplines
may publish in journals relevant to their research topics, not just those from their home
discipline. For example, communication researchers also publish in psychological journals
(e.g., Meier et al., 2016). Accordingly, our statements about disciplinary impact are only
based on journals’, not researchers’, disciplinary affiliations. Moreover, 34% of (p. 101)
coded journals belonged to more than one discipline, indicating that many journals them
selves are somewhat interdisciplinary. Also, while our sample includes over 700 publica
tion outlets, some of these may be duplicates due to slightly different spelling in different
databases searched by EBSCO Host. We only deduplicated outlets with three or more
Page 27 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
documents in our sample. Accordingly, the actual number of unique outlets may be slight
ly lower.
Finally, with regard to our two umbrella constructs, CMC and mental health, we only ana
lyzed the mental health concepts PTH and PWB in detail. A similar analysis with regard to
CMC concepts could not be realized, as a consistent typology of CMC concepts is current
ly missing from the literature and would go beyond the scope of this review.
Based on this review, we suggest several directions for future research. First, researchers
should reflect more on whether their research question implies a relation between CMC
and PTH, or PWB, or both. Addressing both PWB and PTH appears preferable, as it
avoids overlooking potential positive associations between CMC and mental health that
are difficult to capture with PTH indicators only (and vice versa). Second, future research
syntheses on this field should treat PTH and PWB in a more detailed manner than was
possible here. For instance, research on CMC and mental health could be further differ
entiated by whether externalizing versus internalizing PTH or hedonic versus eudaimonic
PWB is addressed (Meier & Reinecke, 2020). Third, theory-driven research beyond a psy
chological and clinical (e.g., addiction) paradigm is much needed to achieve a fuller un
derstanding of the complex relationships between CMC and mental health. Fourth, a
more in-depth and systematic synthesis of research from some of the broader topics (e.g.,
“Facebook & SNS use,” “relationships & CMC,” or “mobile & smartphone use”) appears
warranted in order to assess how relationships between specific aspects of CMC (e.g., ac
tive vs. passive SNS use) differ with regard to mental health. Finally, while our concept
analysis only focused on mental health, we encourage researchers to develop analytical
frameworks for the analysis of the various concepts and indicators of CMC that have been
studied in relation to mental health. Without a more systematic approach to both umbrel
la constructs, CMC and mental health, further integration of the fast growing literature is
hampered. We believe that our review represents one step in this direction by providing a
first higher-level overview of the emerging research field and by charting its development
over the last 20 years.
References
Baker, D. A., & Algorta, G. P. (2016). The relationship between online social networking
and depression: A systematic review of quantitative studies. Cyberpsychology, Behavior,
and Social Networking, 19(11), 638–648. https://doi.org/10.1089/cyber.2016.0206
Bargh, J. A., & McKenna, K. Y. A. (2004). The internet and social life. Annual Re
(p. 102)
Billieux, J., Schimmenti, A., Khazaal, Y., Maurage, P., & Heeren, A. (2015). Are we over
pathologizing everyday life? A tenable blueprint for behavioral addiction research. Jour
nal of Behavioral Addictions, 4(3), 119–123. https://doi.org/10.1556/2006.4.2015.009
Page 28 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Blei, D. M., & Lafferty, J. D. (2009). Topic models. In A. N. Srivastava & M. Sahami (Eds.),
Text mining: Classification, clustering, and applications (pp. 71–94). Boca Raton, FL: CRC
Press.
Borenstein, M., Hedges, L. V., Higgins, J. P.T., & Rothstein, H. R. (2009). Introduction to
meta-analysis. Chichester, UK: Wiley.
Buckingham, D., & Strandgaard Jensen, H. (2012). Beyond “media panics”: Reconceptual
ising public debates about children and media. Journal of Children and Media, 6(4), 413–
429. https://doi.org/10.1080/17482798.2012.740415
Carli, V., Durkee, T., Wasserman, D., Hadlaczky, G., Despalins, R., Kramarz, E., … Kaess,
M. (2013). The association between pathological internet use and comorbid psychopathol
ogy: A systematic review. Psychopathology, 46(1), 1–13. https://doi.org/
10.1159/000337971
Chan, M. (2015). Mobile phones and the good life: Examining the relationships among
mobile use, social capital and subjective well-being. New Media & Society, 17(1), 96–113.
https://doi.org/10.1177/1461444813516836
Choi, M., & Toma, C. L. (2014). Social sharing through interpersonal media: Patterns and
effects on emotional well-being. Computers in Human Behavior, 36, 530–541. https://
doi.org/10.1016/j.chb.2014.04.026
Clayton, R. B., Leshner, G., & Almond, A. (2015). The extended iSelf: The impact of iPhone
separation on cognition, emotion, and physiology. Journal of Computer-Mediated Commu
nication, 20(2), 119–135. https://doi.org/10.1111/jcc4.12109
Colquhoun, H. L., Levac, D., O’Brien, K. K., Straus, S., Tricco, A. C., Perrier, L., … Moher,
D. (2014). Scoping reviews: Time for clarity in definition, methods, and reporting. Journal
of Clinical Epidemiology, 67(12), 1291–1294. https://doi.org/10.1016/j.jclinepi.
2014.03.013
De Chavez, A. C., Backett-Milburn, K., Parry, O., & Platt, S. (2005). Understanding and re
searching wellbeing: Its usage in different disciplines and potential for health research
and health promotion. Health Education Journal, 64(1), 70–87. https://doi.org/
10.1177/001789690506400108
Domahidi, E. (2018). The associations between online media use and users’ perceived so
cial resources: A meta-analysis. Journal of Computer-Mediated Communication, 23, 181–
200. https://doi.org/10.1093/jcmc/zmy007
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” So
cial capital and college students’ use of online social network sites. Journal of Computer-
Mediated Communication, 12(4), 1143–1168.
Feinerer, I., Hornik, K., & Meyer, D. (2008). Text mining infrastructure in R. Journal of
Statistical Software, 25(5). https://doi.org/10.18637/jss.v025.i05
Page 29 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Forsman, A. K., & Nordmyr, J. (2015). Psychosocial links between Internet use and mental
health in later life: A systematic review of quantitative and qualitative evidence. Journal
of Applied Gerontology, 36(12), 1471–1518. https://doi.org/
10.1177/0733464815595509
Grün, B., & Hornik, K. (2011). Topicmodels: An R package for fitting topic models. Journal
of Statistical Software, 40(13). https://doi.org/10.18637/jss.v040.i13
Günther, E., & Domahidi, E. (2017). What communication scholars write about: An
(p. 103)
Hall, J. A. (2018). When is social media use social interaction? Defining mediated social
interaction. New Media & Society, 20(1), 162–179. https://doi.org/
10.1177/1461444816660782
Hiltz, S. R., & Turoff, M. (1978). The network nation: Human communication via comput
er. London: Addison-Wesley.
Huang, C. (2017). Time spent on social network sites and psychological well-being: A
meta-analysis. Cyberpsychology, Behavior, and Social Networking, 20(6), 346–354.
Huta, V., & Waterman, A. S. (2014). Eudaimonia and its distinction from hedonia: Devel
oping a classification and terminology for understanding conceptual and operational defi
nitions. Journal of Happiness Studies, 15(6), 1425–1456. https://doi.org/10.1007/
s10902-013-9485-0
Katz, J. E., & Rice, R. E. (2002). Social consequences of Internet use: Access, involvement,
and interaction. Cambridge, MA: MIT Press.
Page 30 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Keyes, C. L. M. (2007). Promoting and protecting mental health as flourishing: A comple
mentary strategy for improving national mental health. The American Psychologist, 62(2),
95–108. https://doi.org/10.1037/0003-066X.62.2.95
Kraut, R., Kiesler, S., Boneva, B., Cummings, J., Helgeson, V., & Crawford, A. (2002). In
ternet paradox revisited. Journal of Social Issues, 58(1), 49–74. https://doi.org/
10.1111/1540-4560.00248
Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukophadhyay, T., & Scherlis, W.
(1998). Internet paradox: A social technology that reduces social involvement and psycho
logical well-being? American Psychologist, 53(9), 1017–1031. https://doi.org/
10.1037/0003-066X.53.9.1017
Kross, E., Verduyn, P., Demiralp, E., Park, J., Lee, D. S., Lin, N., … Sueur, C. (2013). Face
book use predicts declines in subjective well-being in young adults. PLOS One, 8(8),
e69841. https://doi.org/10.1371/journal.pone.0069841
Lahey, B. B., Krueger, R. F., Rathouz, P. J., Waldman, I. D., & Zald, D. H. (2017). A hierar
chical causal taxonomy of psychopathology across the life span. Psychological Bulletin,
143(2), 142–186. https://doi.org/10.1037/bul0000069
Lee, E.-J., & Oh, S. Y. (2015). Computer-mediated communication. Retrieved from http://
www.oxfordbibliographies.com/view/document/obo-9780199756841/
obo-9780199756841-0160.xml
Liu, D., Ainsworth, S. E., & Baumeister, R. F. (2016). A meta-analysis of social networking
online and social capital. Review of General Psychology, 20(4), 369–391. https://doi.org/
10.1037/gpr0000091
Maier, D., Waldherr, A., Miltner, P., Wiedemann, G., Niekler, A., Keinert, A., … Adam, S.
(2018). Applying LDA topic modeling in communication research: Toward a valid and reli
able methodology. Communication Methods and Measures, 12(2–3), 93–118. https://
doi.org/10.1080/19312458.2018.1430754
Mays, N., Roberts, E., & Popay, J. (2001). Synthesising research evidence. In N. Fulop, P.
Allen, A. Clarke, & N. Black (Eds.), Studying the organisation and delivery of health ser
vices: Research methods. London: Routledge.
Meier, A., & Reinecke, L. (2020, April 6). Computer-mediated communication, social me
dia, and mental health: A conceptual and empirical meta-review. https://doi.org/10.31234/
osf.io/573ph.
Meier, A., Reinecke, L., & Meltzer, C. E. (2016). “Facebocrastination”? Predictors of using
Facebook for procrastination and its effects on students’ well-being. Computers in Human
Behavior, 64, 65–76. https://doi.org/10.1016/j.chb.2016.06.011
Page 31 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Mikal, J. P., Rice, R. E., Abeyta, A., & DeVilbiss, J. (2013). Transition, stress and computer-
mediated social support. Computers in Human Behavior, 29(5), A40–A53. https://doi.org/
10.1016/j.chb.2012.12.012
Nie, N. H., Hillygus, D. S., & Erbring, L. (2002). Internet use, interpersonal relations and
sociability: Findings from a detailed time diary study. In B. Wellman & C. Haythornth
waite (Eds.), The Internet in everyday life (pp. 215–243). Malden, MA: Blackwell.
Peng, T.-Q., Zhang, L., Zhong, Z.-J., & Zhu, J. J. H. (2013). Mapping the landscape of inter
net studies: Text mining of social science journal articles 2000–2009. New Media & Soci
ety, 15(5), 644–664. https://doi.org/10.1177/1461444812462846
Pham, M. T., Rajić, A., Greig, J. D., Sargeant, J. M., Papadopoulos, A., & McEwen, S. A.
(2014). A scoping review of scoping reviews: Advancing the approach and enhancing the
consistency. Research Synthesis Methods, 5(4), 371–385. https://doi.org/10.1002/jrsm.
1123
Przybylski, A. K., & Weinstein, N. (2017). A large-scale test of the goldilocks hypothesis:
Quantifying the relations between digital-screen use and the mental well-being of adoles
cents. Psychological Science, 28(2), 204–215. https://doi.org/
10.1177/0956797616678438
R Core Team. (2018). R: A language and environment for statistical computing. Vienna,
Austria: R Foundation for Statistical Computing. Retrieved from https://www.R-
project.org/
Reinecke, L., & Oliver, M. B. (2017). Media use and well-being: Status quo and open ques
tions. In L. Reinecke & M. B. Oliver (Eds.), The Routledge handbook of media use and
well-being: International perspectives on theory and research on positive media effects
(pp. 3–13). New York, NY: Routledge.
Ryan, R. M., & Deci, E. L. (2001). On happiness and human potentials: A review of re
search on hedonic and eudaimonic well-being. Annual Review of Psychology, 52(1), 141–
166.
Song, H., Zmyslinski-Seelig, A., Kim, J., Drent, A., Victor, A., Omori, K., & Allen, M. (2014).
Does Facebook make you lonely? A meta analysis. Computers in Human Behavior, 36,
446–452. https://doi.org/10.1016/j.chb.2014.04.011
Page 32 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Tokunaga, R. S., & Rains, S. A. (2010). An evaluation of two characterizations of the rela
tionships between problematic Internet use, time spent using the Internet, and psychoso
cial problems. Human Communication Research, 36(4), 512–545. https://doi.org/
10.1111/j.1468-2958.2010.01386.x
Toma, C. L., & Hancock, J. T. (2013). Self-affirmation underlies Facebook use. Per
(p. 105)
Tsafnat, G., Glasziou, P., Choong, M. K., Dunn, A., Galgani, F., & Coiera, E. (2014). Sys
tematic review automation technologies. Systematic Reviews, 3, 74. https://doi.org/
10.1186/2046-4053-3-74
Turkle, S. (2011). Alone together: Why we expect more from technology and less from
each other. New York, NY: Basic Books.
Twenge, J. M., Joiner, T. E., Rogers, M. L., & Martin, G. N. (2018). Increases in depressive
symptoms, suicide-related outcomes, and suicide rates among U.S. adolescents after 2010
and links to increased new media screen time. Clinical Psychological Science, 6(1), 3–17.
https://doi.org/10.1177/2167702617723376
Twenge, J. M., Martin, G. N., & Campbell, W. K. (2018). Decreases in psychological well-
being among American adolescents after 2012 and links to screen time during the rise of
smartphone technology. Emotion. Advance online publication. https://doi.org/10.1037/
emo0000403
Valkenburg, P. M., & Peter, J. (2009). Social consequences of the Internet for adolescents.
Current Directions in Psychological Science, 18(1), 1–5. https://doi.org/10.1111/j.
1467-8721.2009.01595.x
Van der Schuur, W. A., Baumgartner, S. E., Sumter, S. R., & Valkenburg, P. M. (2015). The
consequences of media multitasking for youth: A review. Computers in Human Behavior,
53, 204–215. https://doi.org/10.1016/j.chb.2015.06.035
Verduyn, P., Ybarra, O., Résibois, M., Jonides, J., & Kross, E. (2017). Do social network
sites enhance or undermine subjective well-being? A critical review. Social Issues and Pol
icy Review, 11(1), 274–302. https://doi.org/10.1111/sipr.12033
Walther, J. B., & Parks, M. R. (2002). Cues filtered out, cues filtered in: Computer-mediat
ed communication and relationships. In M. L. Knapp & J. A. Daly (Eds.), Handbook of in
terpersonal communication (3rd ed., pp. 529–563). Thousand Oaks, CA: Sage.
Page 33 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Wickham, H. (2009). ggplot2: Elegant graphics for data analysis. New York: Springer.
Zuccala, A. (2006). Modeling the invisible college. Journal of the American Society for In
formation Science and Technology, 57(2), 152–168. https://doi.org/10.1002/asi.20256
Babic, M. J., Smith, J. J., Morgan, P. J., Eather, N., Plotnikoff, R. C., & Lubans, D. R. (2017).
Longitudinal associations between changes in screen-time and mental health outcomes in
adolescents. Mental Health and Physical Activity, 12, 124–131. https://doi.org/10.1016/
j.mhpa.2017.04.001
Barber, L. K., & Santuzzi, A. M. (2017). Telepressure and college student employment:
The costs of staying connected across social contexts. Stress and Health, 33(1), 14–23.
https://doi.org/10.1002/smi.2668
Blease, C. R. (2015). Too many ‘friends,’ too few ‘likes’? Evolutionary psychology and
‘Facebook depression’. Review of General Psychology, 19(1), 1–13. https://doi.org/
10.1037/gpr0000030
(p. 106) Caplan, S. E. (2003). Preference for online social interaction: A theory of problem
atic Internet use and psychosocial well-being. Communication Research, 30(6), 625–648.
https://doi.org/10.1177/0093650203257842
Carli, V., Durkee, T., Wasserman, D., Hadlaczky, G., Despalins, R., Kramarz, E., … Kaess,
M. (2013). The association between pathological internet use and comorbid psychopathol
ogy: A systematic review. Psychopathology, 46(1), 1–13. https://doi.org/
10.1159/000337971
Carmago, M. R. (2008). A grounded theory study of the relationship between e-mail and
burnout. Information Research, 13(4), paper 383.
Chen, L., Ho, S. S., & Lwin, M. O. (2017). A meta-analysis of factors predicting cyberbully
ing perpetration and victimization: From the social cognitive and media effects approach.
New Media & Society, 19(8), 1194–1213. https://doi.org/10.1177/1461444816634037
Desjarlais, M., & Willoughby, T. (2010). A longitudinal study of the relation between ado
lescent boys’ and girls’ computer use with friends and friendship quality: Support for the
social compensation or the rich-get-richer hypothesis? Computers in Human Behavior,
26(5), 896–905. https://doi.org/10.1016/j.chb.2010.02.004
Page 34 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Dienlin, T., Masur, P. K., & Trepte, S. (2017). Reinforcement or displacement? The reci
procity of FtF, IM, and SNS communication and their effects on loneliness and life satis
faction. Journal of Computer-Mediated Communication, 22(2), 71–87. https://doi.org/
10.1111/jcc4.12183
Floros, G., Siomos, K., Stogiannidou, A., Giouzepas, I., & Garyfallos, G. (2014). The rela
tionship between personality, defense styles, Internet addiction disorder, and psy
chopathology in college students. Cyberpsychology, Behavior and Social Networking,
17(10), 672–676. https://doi.org/10.1089/cyber.2014.0182
Giumetti, G. W., McKibben, E. S., Hatfield, A. L., Schroeder, A. N., & Kowalski, R. M.
(2012). Cyber incivility @ work: The new age of interpersonal deviance. Cyberpsychology,
Behavior and Social Networking, 15(3), 148–154. https://doi.org/10.1089/cyber.
2011.0336
Greyling, T. (2018). Internet access and its relationship to subjective well-being in a de
veloping region. South African Journal of Economic and Management Sciences, 21(1),
a1841. https://doi.org/10.4102/sajems.v21i1.1841
Hall, J. (2017). The experience of mobile entrapment in daily life. Journal of Media Psy
chology, 29(3), 148–158. https://doi.org/10.1027/1864-1105/a000228
Hase, C. N., Goldberg, S. B., Smith, D., Stuck, A., & Campain, J. (2015). Impacts of tradi
tional bullying and cyberbullying on the mental health of middle school and high school
students. Psychology in the Schools, 52(6), 607–617. https://doi.org/10.1002/pits.
21841
High, A. C., & Caplan, S. E. (2009). Social anxiety and computer-mediated communication
during initial interactions: Implications for the hyperpersonal perspective. Computers in
Human Behavior, 25(2), 475–482. https://doi.org/10.1016/j.chb.2008.10.011
Hoffner, C. A., Lee, S., & Park, S. J. (2016). “I miss my mobile phone!”: Self-expansion via
mobile phone and responses to phone loss. New Media & Society, 18(11), 2452–2468.
https://doi.org/10.1177/1461444815592665
Hong, F.-Y., & Cheng, K.-T. (2018). Correlation between university students’ online trolling
behavior and online trolling victimization forms, current conditions, and personality
traits. Telematics and Informatics, 35(2), 397–405. https://doi.org/10.1016/j.tele.
2017.12.016
Huang, C. (2017). Time spent on social network sites and psychological well-be
(p. 107)
Ihm, J., & Hsieh, Y. P. (2015). The implications of information and communication technol
ogy use for the social well-being of older adults. Information, Communication & Society,
18(10), 1123–1138. https://doi.org/10.1080/1369118X.2015.1019912
Page 35 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Ivarsson, L., & Larsson, P. (2011). Personal Internet usage at work: A source of recovery.
Journal of Workplace Rights, 16(1), 63–81. https://doi.org/10.2190/WR.16.1.e
Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukophadhyay, T., & Scherlis, W.
(1998). Internet paradox: A social technology that reduces social involvement and psycho
logical well-being? American Psychologist, 53(9), 1017–1031. https://doi.org/
10.1037/0003-066X.53.9.1017
Kross, E., Verduyn, P., Demiralp, E., Park, J., Lee, D. S., Lin, N., … Sueur, C. (2013). Face
book use predicts declines in subjective well-being in young adults. PLOS ONE, 8(8),
e69841. https://doi.org/10.1371/journal.pone.0069841
Kubiszewski, V., Fontaine, R., Potard, C., & Auzoult, L. (2015). Does cyberbullying overlap
with school bullying when taking modality of involvement into account? Computers in Hu
man Behavior, 43, 49–57. https://doi.org/10.1016/j.chb.2014.10.049
Lohmann, S. (2015). Information technologies and subjective well-being: Does the Inter
net raise material aspirations? Oxford Economic Papers, 67(3), 740–759. https://doi.org/
10.1093/oep/gpv032
Morey, J. N., Gentzler, A. L., Creasy, B., Oberhauser, A. M., & Westerman, D. (2013). Young
adults’ use of communication technology within their romantic relationships and associa
tions with attachment style. Computers in Human Behavior, 29(4), 1771–1778. https://
doi.org/10.1016/j.chb.2013.02.019
Nabi, R. L., Prestin, A., & So, J. (2013). Facebook friends with (health) benefits? Exploring
social network site use and perceptions of social support, stress, and well-being. Cy
berpsychology, Behavior, and Social Networking, 16(10), 721–727. https://doi.org/
10.1089/cyber.2012.0521
Nie, P., Sousa-Poza, A., & Nimrod, G. (2017). Internet use and subjective well-being in
China. Social Indicators Research, 132(1), 489–516. https://doi.org/10.1007/
s11205-015-1227-8
Ninaus, K., Diehl, S., Terlutter, R., Chan, K., & Huang, A. (2015). Benefits and stressors—
Perceived effects of ICT use on employee health and work stress: An exploratory study
from Austria and Hong Kong. International Journal of Qualitative Studies on Health and
Well-Being, 10, 28838. https://doi.org/10.3402/qhw.v10.28838
Oldmeadow, J. A., Quinn, S., & Kowert, R. (2013). Attachment style, social skills, and Face
book use amongst adults. Computers in Human Behavior, 29(3), 1142–1149. https://
doi.org/10.1016/j.chb.2012.10.006
Page 36 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Park, N., Lee, S., & Chung, J. E. (2016). Uses of cellphone texting: An integration of moti
vations, usage patterns, and psychological outcomes. Computers in Human Behavior, 62,
712–719. https://doi.org/10.1016/j.chb.2016.04.041
Pearson, A. L., Mack, E., & Namanya, J. (2017). Mobile phones and mental well-being: Ini
tial evidence suggesting the importance of staying connected to family in rural, remote
communities in Uganda. PLOS One, 12(1), e0169819. https://doi.org/10.1371/
journal.pone.0169819
Reed, L. A., Tolman, R. M., Ward, L. M., & Safyer, P. (2016). Keeping tabs: Attach
(p. 108)
ment anxiety and electronic intrusion in high school dating relationships. Computers in
Human Behavior, 58, 259–268. https://doi.org/10.1016/j.chb.2015.12.019
Reid, F. J. M., & Reid, D. J. (2010). The expressive and conversational affordances of mo
bile messaging. Behaviour & Information Technology, 29(1), 3–22. https://doi.org/
10.1080/01449290701497079
Rosen, L., Carrier, L. M., Miller, A., Rokkum, J., & Ruiz, A. (2016). Sleeping with technolo
gy: Cognitive, affective, and technology usage predictors of sleep problems among col
lege students. Sleep Health, 2(1), 49–56. https://doi.org/10.1016/j.sleh.2015.11.003
Rotondi, V., Stanca, L., & Tomasuolo, M. (2017). Connecting alone: Smartphone use, qual
ity of social interactions and well-being. Journal of Economic Psychology, 63, 17–26.
https://doi.org/10.1016/j.joep.2017.09.001
Russell, E., Woods, S. A., & Banks, A. P. (2017). Examining conscientiousness as a key re
source in resisting email interruptions: Implications for volatile resources and goal
achievement. Journal of Occupational and Organizational Psychology, 90(3), 407–435.
https://doi.org/10.1111/joop.12177
Schouten, A. P., Valkenburg, P. M., & Peter, J. (2007). Precursors and underlying process
es of adolescents’ online self-disclosure: Developing and testing an “Internet-attribute-
perception” model. Media Psychology, 10(2), 292–315. https://doi.org/
10.1080/15213260701375686
Schultze-Krumbholz, A., Jäkel, A., Schultze, M., & Scheithauer, H. (2012). Emotional and
behavioural problems in the context of cyberbullying: A longitudinal study among Ger
man adolescents. Emotional and Behavioural Difficulties, 17(3-4), 329–345. https://
doi.org/10.1080/13632752.2012.704317
Selfhout, M. H. W., Branje, S. J. T., Delsing, M., ter Bogt, T. F. M., & Meeus, W. H. J. (2009).
Different types of Internet use, depression, and social anxiety: The role of perceived
friendship quality. Journal of Adolescence, 32(4), 819–833. https://doi.org/10.1016/
j.adolescence.2008.10.011
Page 37 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Shakya, H. B., & Christakis, N. A. (2017). Association of Facebook use with compromised
well-being: A longitudinal study. American Journal of Epidemiology, 185(3), 203–211.
https://doi.org/10.1093/aje/kww189
Shaw, L. H., & Gant, L. M. (2002). In defense of the Internet: The relationship between In
ternet communication and depression, loneliness, self-esteem, and perceived social sup
port. CyberPsychology & Behavior, 5(2), 157–171. https://doi.org/
10.1089/109493102753770552
Sjursø, I. R., Fandrem, H., & Roland, E. (2014). Emotional problems in traditional and cy
ber victimization. Journal of School Violence, 15(1), 114–131. https://doi.org/
10.1080/15388220.2014.996718
Song, H., Zmyslinski-Seelig, A., Kim, J., Drent, A., Victor, A., Omori, K., & Allen, M. (2014).
Does Facebook make you lonely? A meta analysis. Computers in Human Behavior, 36,
446–452. https://doi.org/10.1016/j.chb.2014.04.011
Sonnentag, S., Reinecke, L., Mata, J., & Vorderer, P. (2018). Feeling interrupted–being re
sponsive: How online messages relate to affect at work. Journal of Organizational Behav
ior, 39(3), 369–383. https://doi.org/10.1002/job.2239
Steers, M.-L. N. (2016). ‘It’s complicated’: Facebook’s relationship with the need to be
long and depression. Current Opinion in Psychology, 9, 22–26. https://doi.org/10.1016/
j.copsyc.2015.10.007
Thomée, S., Eklöf, M., Gustafsson, E., Nilsson, R., & Hagberg, M. (2007). Prevalence of
perceived stress, symptoms of depression and sleep disturbances in relation to informa
tion and communication technology (ICT) use among young adults: An explorative
prospective (p. 109) study. Computers in Human Behavior, 23(3), 1300–1321. https://
doi.org/10.1016/j.chb.2004.12.007
Tromholt, M. (2016). The Facebook experiment: Quitting Facebook leads to higher levels
of well-being. Cyberpsychology, Behavior, and Social Networking, 19(11), 661–666.
https://doi.org/10.1089/cyber.2016.0259
Tseng, S.-F., & Hsieh, Y. P. (2015). The implications of networked individualism for social
participation. American Behavioral Scientist, 59(9), 1157–1172. https://doi.org/
10.1177/0002764215580620
Utz, S., & Breuer, J. (2017). The relationship between use of social network sites, online
social support, and well-being: Results from a six-wave longitudinal study. Journal of Me
dia Psychology, 29(3), 115–125. https://doi.org/10.1027/1864-1105/a000222
Page 38 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Valkenburg, P. M., & Peter, J. (2007). Who visits online dating sites? Exploring some char
acteristics of online daters. CyberPsychology & Behavior, 10(6), 849–852. https://
doi.org/10.1089/cpb.2007.9941
Van den Eijnden, R. J. J. M., Meerkerk, G.-J., Vermulst, A. A., Spijkerman, R., & Engels, R.
C. M. E. (2008). Online communication, compulsive Internet use, and psychosocial well-
being among adolescents: A longitudinal study. Developmental Psychology, 44(3), 655–
665. https://doi.org/10.1037/0012-1649.44.3.655
Verduyn, P., Lee, D. S., Park, J., Shablack, H., Orvell, A., Bayer, J., … Kross, E. (2015). Pas
sive Facebook usage undermines affective well-being: Experimental and longitudinal evi
dence. Journal of Experimental Psychology: General, 144(2), 480–488. https://doi.org/
10.1037/xge0000057
Vincent, J. (2006). Emotional attachment and mobile phones. Knowledge, Technology &
Policy, 19(1), 39–44. https://doi.org/10.1007/s12130-006-1013-7
Vranjes, I., Baillien, E., Vandebosch, H., Erreygers, S., & de Witte, H. (2018). When work
place bullying goes online: Construction and validation of the inventory of cyberbullying
acts at work (ICA-W). European Journal of Work and Organizational Psychology, 27, 28–
39. https://doi.org/10.1080/1359432X.2017.1363185
Weidman, A. C., Fernandez, K. C., Levinson, C. A., Augustine, A. A., Larsen, R. J., & Rode
baugh, T. L. (2012). Compensatory internet use among individuals higher in social anxiety
and its implications for well-being. Personality and Individual Differences, 53(3), 191–195.
https://doi.org/10.1016/j.paid.2012.03.003.
Weisskirch, R. S., & Delevi, R. (2012). Its ovr b/n u n me: Technology use, attachment
styles, and gender roles in relationship dissolution. Cyberpsychology, Behavior and Social
Networking, 15(9), 486–490. https://doi.org/10.1089/cyber.2012.0169
Widyanto, L., & Griffiths, M. (2006). ‘Internet addiction’: A critical review. International
Journal of Mental Health and Addiction, 4(1), 31–51. https://doi.org/10.1007/
s11469-006-9009-9
Woods, H. C., & Scott, H. (2016). #Sleepyteens: Social media use in adolescence is asso
ciated with poor sleep quality, anxiety, depression and low self-esteem. Journal of Adoles
cence, 51, 41–49. https://doi.org/10.1016/j.adolescence.2016.05.008
Wright, M. F. (2015). Cyber victimization and perceived stress. Youth & Society, 47(6),
789–810. https://doi.org/10.1177/0044118X14537088
Wu, X.-S., Zhang, Z.-H., Zhao, F., Wang, W.-J., Li, Y.-F., Bi, L., … Sun, Y.-H. (2016). Preva
lence of Internet addiction and its association with social support and other related fac
tors among (p. 110) adolescents in China. Journal of Adolescence, 52, 103–111. https://
doi.org/10.1016/j.adolescence.2016.07.012
Page 39 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Computer-Mediated Communication and Mental Health: A Computational
Scoping Review of an Interdisciplinary Field
Xie, X., Zhao, F., Xie, J., & Lei, L. (2016). Symbolization of mobile phone and life satisfac
tion among adolescents in rural areas of China: Mediating of school-related relationships.
Computers in Human Behavior, 64, 694–702. https://doi.org/10.1016/j.chb.
2016.07.053
Young, K. S., & Rodgers, R. C. (1998). The relationship between depression and Internet
addiction. CyberPsychology & Behavior, 1(1), 25–28. https://doi.org/10.1089/cpb.
1998.1.25
Adrian Meier
Emese Domahidi
Elisabeth Günther
Page 40 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.5
This review explores the role of digital inclusion in women’s health and well-being in rur
al communities. This involves reviewing existing research that focuses on the information
experiences of women, specifically those who were digitally excluded or limited users of
the Internet, who have benefitted from the support of digital inclusion initiatives and
technology. There is a global gender digital divide in which more women than men often
lack access to information and digital skills, particularly in rural areas. Digital inclusion
initiatives are attempting to close this divide and to enable women to make informed deci
sions about their health and well-being and their families. The review also identifies that
digital inclusion is a complex situation of enquiry; there is limited, fragmented research
in which the concepts of information literacy and digital inclusion have been brought to
gether; and significant tensions and contradictions exist within digital inclusion practice.
The review also highlights the opportunity for further research and theory development.
Keywords: digital inclusion, digital inclusion initiatives, digital skills, gender, Internet, rural communities,
women’s health
Introduction
DIGITAL inclusion is of global importance as government digital-by-default agendas in
creasingly recognize the need for society to possess strong digital skills and capabilities
to fully benefit from living in a digital world. Yet a global gender digital divide exists
where women lack access to information and digital skills, particularly in rural areas
(IFLA & TASCHA, 2017). Women are 14% less likely to own a mobile phone than men in
low and middle income countries (GSMA, 2015); globally, the proportion of women using
the Internet is 12% lower than that of men using the Internet (ITU, 2017a); and while the
gender gap in Internet access has narrowed in most regions since 2013, it has widened in
Africa, where the proportion of women using the Internet is 25% lower than the propor
tion of men (ITU, 2017a, p. 3).
Page 1 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Digital inclusion initiatives around the world, designed to provide access and the develop
ment of digital skills, are critical to bridging the digital divide in local communities
(Mervyn et al. 2014). However, the multiple factors that contribute to digital exclusion are
complex and make the task of implementing workable digital inclusion solutions particu
larly challenging for policymakers (Bach et al., 2013).
Information literacy helps people make informed choices and decisions about their lives,
including the health and well-being of individuals and their families (CILIP, 2018, p. 5).
However, as argued by Dunn (2013), “insufficient attention is being paid to the urgency of
information literacy as a key component to any strategy to redress the digital (p. 112)
divide” (p. 326), potentially leaving those newly connected to the Internet or with low in
formation literacy vulnerable to poor information content and choices. Anderson and
Johnston (2016) argue that without the development of information literacy, “the benefits
of digital participation will be significantly diminished” (p. 8). Challenges to access and
meaningful use of online information underline the necessity of increased levels of infor
mation literacy. “While this may affect both men and women, the challenges are often
greater for women (particularly in developing countries) because past information isola
tion leaves them less equipped to deal with these challenges” (IFLA & TASCHA, 2017, p.
80).
Broadly, digital inclusion refers to the activities necessary to ensure that all individuals
and communities, including the most disadvantaged, have access to and meaningful use
of information and communication technologies (ICTs). Digital inclusion activities essen
tially include five key elements: (1) affordable, broadband Internet service, (2) Internet-
enabled devices, (3) quality technical support, (4) applications and online content de
signed to enable and encourage self-sufficiency, participation, and collaboration, and (5)
access to digital skills training (NDIA, 2017, n.p.). Such activities are driven by govern
ments to address the digital divide (those without access, skills or the motivation to use
ICTs), and implement the digital-by-default agenda (the drive to replace services deliv
ered through face-to-face, telephone and paper-based interactions, with web-based ser
vices), and are delivered by a plethora of organizations and community partners (ITU,
2017b; Rhinesmith, 2016).
Digital inclusion research emerged from research on the digital divide, a topic widely ac
cepted as a complex and dynamic issue, that continues to evolve, particularly as ICTs
evolve and diffuse (Jaeger et al., 2012; Van Dijk, 2005). Digital inclusion is addressed by
researchers across various disciplines, but compared to the established area of research
on the digital divide, digital inclusion research is relatively new (Jaeger et al., 2012). In
deed, the Rapid review of evidence for basic digital skills (McGillivray et al., 2017) con
cluded that there is a notable dearth of academic research in relation to digital inclusion
solutions and initiatives, and particularly in relation to the role and responsibilities digital
inclusion intermediaries and actors play. Similar to research on the digital divide, digital
inclusion is a complex area of enquiry and suffers from conceptual inconsistencies and di
Page 2 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
chotomies that lead to ambiguities in understanding why and what it takes to be included
in the information society (Nemer, 2015).
The Library and Information Association defines information literacy as “the ability to
think critically and make balanced judgements about any information we find and use.
(p. 113) It empowers us as citizens to develop informed views and to engage fully with
society” (CILIP, 2018, p. 3). This definition relates to information in all its forms, including
digital and online, reinforcing the relevance and need to consider information literacy
when using and accessing the Internet for online information (Anderson & Johnston,
2016; CILIP, 2018; Dunn, 2013). While some scholars advocate information literacy as a
set of skills (Andretta, 2005; Burke, 2010), others advocate information literacy as a way
of learning (Kuhlthau, 1993), or as an appreciation of the complex ways of interacting
with information (Bruce, 2000, p. 97).
Yet information literacy research as a concept has traditionally been siloed in the library
and information science sector. While there is a significant amount of information literacy
research within educational (Corrall, 2008; Secker & Coonan, 2013) and workplace
(Lloyd, 2010) settings, and an emerging body of research in information literacy in every
day life contexts (Martzoukou & Abdi, 2017), information literacy research within commu
nity settings (relevant to digital inclusion) is barely recognized as a research area (Hep
worth & Walton, 2013). However, the CILIP definition emphasizes how information litera
cy is relevant to everyone in a wide variety of contexts, specifically the contexts of every
day life, health, citizenship, education, and the workplace (Secker, 2018), and as such
makes information literacy relevant to digital inclusion and an essential part of this re
view.
The importance of digital inclusion and information literacy has been emphasized in a few
areas including health and well-being (Ferreira et al., 2016; Park, 2017. It is further em
phasized that access to online services could lead to improved health and well-being, par
ticularly in rural areas (Freeman et al., 2016; Hart et al., 2004). However, the specific
benefits of digital inclusion and information literacy to women’s health and well-being in
rural communities have not been explicated. Therefore, the review aims to examine the
literature to outline the specific benefits of digital inclusion initiatives on women’s health
and well-being in rural communities.
This systematic literature review considers research that focuses on the information ex
periences of women, specifically those who were previously digitally excluded or limited
users of the Internet, especially in rural communities, and have benefitted from the sup
port of digital inclusion initiatives and technology. The review provides an opportunity to
Page 3 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
unpack the complexity of this situation of enquiry by problematizing the concept of digital
inclusion; exploring if and how digital inclusion has been linked with the concept of infor
mation literacy and digital skills training; providing insight on the role of digital inclusion
on women’s health and well-being in rural communities; and revealing tensions and con
tradictions within digital inclusion practice.
To guide this systematic literature review, the following two questions are ad
(p. 114)
dressed. (1) What role do digital inclusion initiatives play with regard to women’s health
and well-being in rural communities? (2) How have the concepts of digital inclusion with
information literacy been linked with regard to digital inclusion skills training? The chap
ter concludes with an agenda for future research within the realms of digital inclusion
and information literacy. The chapter includes the following sections: an outline of the
methodology of the systematic literature review; description of the reviewed literature;
the findings from the selected papers (with respect to theory and methodologies, termi
nologies, approaches to digital inclusion initiatives, digital inclusion training, digital inclu
sion, information literacy, health, and well-being); a brief discussion; and a conclusion.
Methods
The review was conducted on journal articles—excluding conference proceedings, PhD
theses and book chapters—reporting primary research published worldwide in English
language sourced from the Web of Science and Scopus. Search terms included the phras
es information literacy, and digital inclusion, combined with the terms rural, gender,
health and well-being appearing in the topic. The search yielded 194 results, which fol
lowing the exclusion of conference proceedings, duplicates, articles that were irrelevant,
or in a non-English language, was refined to a final set of 66 journal articles. Articles
were identified and selected on the basis of their relevance to digital inclusion and
women’s health and well-being in rural communities and links to the concept of informa
tion literacy within that context.
Due to the multidisciplinary nature of the topic, articles were identified across different
research domains such as information science, educational research, computer science,
and the broader field of social science research. Drawing on the researcher’s previous ex
perience in digital inclusion and librarianship, a small collection of relevant grey litera
ture (16 items) was also selected to provide richness, context, and currency to the review.
These items were predominantly in the form of reports published by third-sector, corpo
rate, and public policy organizations, such as Development and Access to Information
(IFLA & TASCHA, 2017), Lloyds Bank consumer digital index (Lloyds, 2017), and “Smart
phone by default” internet users (Ofcom, 2016). Grey literature is cited hereafter with an
asterisk (*) to differentiate it from journal articles.
The final set of materials (n = 82) of 66 journal articles and 16 grey literature items was
coded using thematic analysis. This first involved a general categorization of the articles
into a number of foci important on the basis of digital inclusion and information literacy,
such as Internet access, digital skills, social inclusion, and learning. The second level of
Page 4 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
analysis involved the meticulous reading of the texts in order to identify and refine
themes and subthemes. Through this process the following themes and subthemes
emerged: Theory and Methodologies; Terminology (including subthemes on Digital
(p. 115) Inclusion, Information Literacy, and Rurality); Approaches to Digital Inclusion (in
Although all the papers were coded, for the purpose of conciseness not every paper is re
ferred to in the text of the analysis; however, a supplementary reference list provides the
complete set of analyzed journal articles and grey literature.
Journal articles focused across a range of demographics, with a limited number related to
just women. Indeed, only a fraction of the academic studies sourced, such as Freeman et
al. (2016), Jiménez-Cortés et al. (2015), Martínez-Cantos (2017), Potnis (2015), Rashid
(2016), and Rebollo and Vico (2014) specifically link digital inclusion and women’s health
and well-being in rural communities.
The majority of the journal articles tended to be more focused on the digital divide
(Adhikari et al., 2016) and digital inclusion initiatives across a range of sub-groups in de
veloping countries (Correa & Pavez, 2016) and developed countries (Freeman & Park,
2015; Shade, 2014; Turkalj et al., 2013); the development of information literacy (Papen,
2013; Yu et al., 2017) and health information literacy (Enwald et al., 2016; Niemelä et al.,
2012) or digital literacy skills (Hughes et al., 2017); gender differences in attitudes and
use of ICTs and the Internet (Singh, 2017); and the relationships between digital inclu
sion, digital inequalities, and social inclusion (Park, 2017). Journal articles related to in
formation literacy tended to come from the discipline of information science, although re
searchers in other fields used varying terminology such as multiliteracy, transliteracy, or
digital literacy to describe aspects of information literacy (Aires, 2014). In comparison,
journal articles related to digital inclusion came from a wider selection of disciplines such
as ICT for Development (ICT4D), Human Computer Interaction, Geography, Education,
Health, Rural Studies, and Information Science.
There was only a limited crossover between the concepts of digital inclusion and informa
tion literacy. Journal articles related to information literacy tended to focus on effective
use of the Internet (Berger & Croll, 2012) or Internet/technology adoption (Chiu & Liu,
2017; Yu et al., 2017). Whereas journal articles regarding digital inclusion referred to a
plethora of vocabulary related to digital skills and literacies, and technology and infra
structure, the angle of the articles was often influenced by the research discipline of the
Page 5 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
journal. For example, journal articles from Computer Science and ICT4D (p. 116) tended
to have more of a bias towards digital infrastructure, technology and access (Ferreira et
al., 2016; Whitney et al., 2011) whereas Geography focused more on rurality (Roberts et
al., 2015) and Information Science on digital skills and motivation (Thompson & Paul,
2016).
Overall, the limited number of journal articles specifically on the review topic highlights
that there is little academic research in relation to digital inclusion on women’s health
and well-being in rural communities. While the majority of the journal articles focused
more broadly around the subject of the review, academic research on this topic appears
fragmented, meaning research is spread across a range of disciplines and the focus of the
articles, theoretical stance, and methods used vary, thus potentially hampering the devel
opment of a coherent body of work (Meijer & Bekkers, 2015). The inclusion of some grey
literature was essential in addition to the academic literature in order to provide further
understanding, richness, and currency. Therefore, the review includes interdisciplinary
research in the area and the grey literature, while highlighting gaps and setting an agen
da for future research.
Page 6 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Theories Methods
Activity Theory is discussed by Aires (2014) to explore the opinions of parents and teach
ers on the Magellan (Magalhães) digital inclusion Initiative in Portugal, to investigate
common understandings and contradictions in the dissemination of the digital technolo
gies and digital inclusion in families and schools in rural communities; Diffusion of Inno
vation (DOI) theory is used in two articles. Correa et al. (2017) use elements of DOI com
bined with Van Dijk’s (2005) Relational/Network approach to understanding digital inclu
sion, where consideration of people’s context, position in a community, resources, and so
cial networks are necessary to understand their adoption of ICTs. Kapondera and Hart
(2016) invoke DOI as a theoretical framework to examine the factors influencing the use
of telecentres in rural areas by means of a case study of Lupaso Community Telecentre, in
a remote region of Malawi. Potnis (2015) employs the Global Model of (p. 117) Human In
formation Behavior as a conceptual model using three constituent constructs—(1) context
of information needs, (2) information-seeking behavior, and (3) information processing
and use—to examine the information use of poor female mobile phone users in rural In
dia. Hughes et al. (2017) use Informed Learning theory to underpin the development of a
new framework to support digital literacy learning through social living labs examined
through, a voluntary community organisation in North Queensland, Australia. Madon et
al. (2009) apply Institutional theory to analyze three digital inclusion projects to identify
processes of institutionalization crucial to the long-term value, sustainability, and scalabil
ity of digital inclusion projects. Yu et al. (2017) use Media Richness theory to discover the
psychological factors that influence ICT adoption behavior of residents in a rural village
in Taiwan. Finally, Structuration theory is used by Correa and Pavez (2016) to explore In
ternet adoption in isolated rural communities in remote villages in Chile, considering
people’s capabilities to choose what they value (i.e., psychological resources, attitudes to
Page 7 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
ward technologies) and social structures (social institutions, cultural norms, and social
context).
Terminology
Due to the interdisciplinary nature of the review topic, the theme of the need for shared
vocabulary and standardization of terminology emerged from the journal articles, particu
larly in relation to the concepts of digital inclusion and information literacy.
Digital Inclusion
Very few journal articles defined or attempted to describe or explain the concept of digi
tal inclusion. Indeed, not all journal articles specifically included the phrase “digital inclu
sion,” (p. 118) but were clearly focused on research in relation to digital inclusion activi
ties using alternative phrases such as adoption of the Internet and ICT access. Jaeger et
al. (2012) define digital inclusion as “the policy developed to close the digital divide” and
to “promote digital literacy through outreach to unserved and underserved
populations” (p. 3). Thompson et al. (2016) state that digital inclusion is a key component
of modern social justice as “the ability of the individual to participate fully in society is in
creasingly tied to the ability to access and to use digital technologies in a meaningful way
for social, political, and economic participation” (p. 93). Hashim et al. (2012) propose that
digital inclusion encompasses three areas: access, technology literacy, and content ser
vices. According to Rashid (2016), digital inclusion focuses not just on levels of access to
ICTs, but also on factors such as motivation, knowledge, and skills that enable individuals
to have the ability to meaningfully engage with technology and online information.
Information Literacy
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
specific context, and argue that “information literacy is an important factor in new ICT
adoption and increased ICT usage” (p. 206).
Information literacy is also clarified in relation to how it helps make informed choices re
lating to the health and well-being of individuals and families, such as in articles referring
to the concepts of health information literacy (HIL) (Martzoukou & Abdi, 2017) and every
day life health information literacy (EHIL) (Niemelä et al., 2012). The presence of HIL “is
essential for making health decisions and is considered an important prerequisite for pro
moting and maintaining an individual’s health” (Martzoukou & Abdi, 2017 p. 649) and for
“engaging in an informed dialogue with healthcare professionals” (CILIP, 2018, p. 5).
The issue of rurality was discussed within the journal articles but with limited clarifica
tion of the actual meaning of the term. Despite the high levels of connectivity in devel
oped countries and growing Internet access in developing countries, digital inclusion in
rural areas remains a strong concern for policymakers (Correa & Pavez, 2016; Yueh et al.,
2013). Indeed, despite many policymaking efforts that have promoted Internet connection
in rural areas, the evidence suggests that digital inclusion is a multifaceted and complex
phenomenon that is not “solved” after access is provided (Correa et al., 2017).
Boulos et al. (2015) discuss how the higher costs associated with the installation of digital
infrastructure for mobile and broadband in rural areas compared to urban areas is over
come through the concept of “distributed cities,” where small neighboring towns and vil
lages (e.g., the Scottish Highlands and Islands) unite together and pool their resources to
form a larger “distributed city” and improved economies of scale.
Pavez et al. (2017) highlight the importance of understanding rurality, and exploring how
people from rural and geographically isolated contexts may experience digital connection
differently from an urban perspective. This supports findings by Correa and Pavez (2016)
which showed that remote rural communities face specific characteristics, such as lack of
economic resources, geographic isolation, an aging population, and out-migration of
young people, that need to be considered when thinking about digital inclusion initiatives
for their particular context.
Page 9 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Differentiation of Digital Inclusion Initiatives: Levels and Approaches
When describing approaches to digital inclusion initiatives, journal articles tend to use a
macro- or micro-level perspective. Journal articles using a macro-level perspective take a
top-down approach to describing digital inclusion and focus primarily on digital inclusion
policy and agenda setting issues on a national or international scale (Hughes et al., 2017;
Shade, 2014; Martínez-Cantos, 2017). This compares with journal articles taking a
(p. 120) micro-level perspective, which look at specific local or regional digital inclusion
projects and case studies (Madon et al., 2009). Some journal articles initially provide a
macro perspective and then provide an example of an initiative at micro-level (Berger &
Croll, 2012; Broadbent & Papadopoulos, 2013).
Digital inclusion initiatives are also described in relation to their activities. For example,
Armenta et al. (2012) differentiates digital inclusion initiatives between those that take an
access driven/infrastructure approach and those that take a user-centric approach. In
deed, the debate that the provision of technology, infrastructure, and access alone is not
enough to get people online is acknowledged in several journal articles (Correa et al.,
2017; Freeman & Park, 2015; Haenssgen, 2018; Livingstone & Helsper, 2007).
Haenssgen (2018) adds that the techno-centric focus in ICT4D has been criticized for its
emphasis on the social embeddedness of technology, user behavior, and different forms of
use, yet highlights that the discipline is gradually transitioning towards broader research
on technological and social development that permits locally grounded conclusions. Ar
menta et al. (2012) provide an example of how a techno-centric approach in Mexico was
not effective and lacked community participation. Correa and Pavez (2016) note similar
findings when evaluating the experiences of individuals in rural communities in Chile that
had benefitted from a public/private initiative called Todo Chile Comunicado (All Chile
Connected), which provided subsidies for 3G wireless connections. They found a lack of
motivation and a level of skepticism among the community participants in adopting the
new mobile technologies, again confirming physical access alone is not sufficient.
Correa et al. (2017) highlight government top-down approaches to digital inclusion initia
tives by discussing programs in Latin America targeting rural areas in Argentina, Bolivia,
Brazil, Chile, and Colombia. Their research confirmed that most of these policymaking
initiatives focused on the provision of infrastructure; yet while access to both devices and
infrastructure connection cannot be dismissed as a logical first step, it does not necessar
ily entail Internet adoption, particularly in isolated, rural contexts. The researchers rec
ommend that policymakers take into account the social, cultural, and economic context of
where these initiatives are implemented.
In comparison, Madon et al. (2009) provide a micro-level analysis of three digital inclu
sion projects: the Akshaya e-literacy project in the state of Kerala in India, a community-
based ICT project in South Africa, and a telecenter project in Sau Paulo in Brazil. The re
searchers describe how the projects changed significantly over time and demonstrate a
Page 10 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
complex mix of success and failure, and how, while the projects are unique in themselves,
they also share common features:
The Kerala project, for example, got symbolic acceptance by the community by linking the
e-literacy project to Kerala’s development philosophy through grassroots (p. 121) cam
paigning; and stimulated valuable social activity in relevant social groups by widespread
participation of groups, such as Muslim women who are often part of the socially exclud
ed. Madon et al. (2009) argue these successful common features are of relevance to digi
tal inclusion projects, particularly in the developing world.
The main drivers behind most digital inclusion initiatives aimed at women are related to
ensuring access, improving digital literacy, and working towards gender equality and par
ticipation of women in the digital world (ITU, 2017a*). ITU’s Gender Digital Inclusion Map
(2017b*) provides a list of digital inclusion initiatives from 97 countries around the world
aimed at women.
In the grey literature, the report Development and access to information (IFLA &
TASCHA, 2017*) has a specific focus on women and the need for meaningful access to in
formation and information capabilities, and it provides examples of digital inclusion initia
tives, mainly in public libraries. In Uganda, the National Library’s digital skills training
program is offered in local languages and is designed for female farmers. In Burkina Fa
so, the Girls’ Mobile Health Clubs located in village libraries provide access to health in
formation while providing information literacy and technology skills. In Chile, women,
young adults, and low-income families receive preferential access to all BiblioRedes,
Chile’s national network of some 400 library-based infocentros, which offer free digital lit
eracy classes. Additionally, governments have started to consolidate public-private collab
oration with different organizations, driving initiatives that empower women through
technology. Some examples are Intel’s “She Will Connect” program in Kenya, Nigeria,
and South Africa; Mexico’s “Código X;” and India’s “Internet Saathi” (IFLA & TASCHA,
2017*). In most cases these digital inclusion initiatives, through the use of technology,
empowered women by ensuring that they have equal access to information and educa
tion, enabling them to gain knowledge and confidence and make informed decisions on is
sues such as family planning and health care. Chile’s network of Infocentros, designed to
be women-friendly spaces, is an example of an initiative that has empowered women
through the combination of providing a trusted, safe place with digital skills training that
has enabled them to develop knowledge and skills which they can use in their everyday
life. Importantly, this initiative has stepped away from the “macho culture found in Inter
Page 11 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
net cafés,” enabling women to talk and help each other and get help from directors of the
centers (often female), in a way not possible with men (IFLA & TASCHA, p. 81, 2017*).
However, for any of this digital inclusion work to happen, social barriers such as cultural
demands, illiteracy, and lack of access to education need to be overcome (IFLA &
TASCHA, 2017*). The World Wide Web Foundation (2015*) supports this point, stating
that “the Internet can support women in making informed choices about their bodies and
health, but without adequate access to safe, legal and affordable sexual and reproductive
(p. 122) health services and action against practices such as early marriage, these choices
As alluded to earlier, only a very small proportion of the journal articles sourced in the re
view—such as Freeman et al. (2016), Jiménez-Cortés et al. (2015), Martínez-Cantos
(2017), Potnis (2015), Rashid (2016), and Rebollo and Vico (2014)—specifically related to
digital inclusion initiatives aimed at women, with reference to health and well-being in
rural communities. This therefore highlights the limited amount of research on this topic
and the potential for further research. The gender digital divide was clearly referenced in
the literature and was particularly evidenced in case studies from the developing world
and in rural areas (Ferreira et al., 2016; Rashid, 2016; Rebollo & Vico, 2014). These out
lined the information experiences of women, particularly in relation to their access and
adoption of using technology and the Internet and the barriers that they faced. A recent
report by Intel (2013*) entitled Women and the Web reported that one in five women in
India believes the Internet is “not appropriate” for them or useful, and that their families
would disapprove. Yet positive aspects about being more connected included how moth
ers noted that it supports their children with homework and education (Correa et al.,
2016).
Rashid (2016) states that research on gender and ICTs has for the most part been cen
tered on the concept of the gender digital divide, particularly in relation to access to pro
vision and the fact that proportionally more men than women use the Internet. However,
other articles, such as Martínez-Cantos (2017), looked more towards gender differences
in attitudes, self-efficacy, and the experiences of men and women in using computers and
the Internet. Shade (2014) provides a critical overview of the changing digital inclusion
agenda in Canada, describing how that country played an international role in promoting
gender equity in access to the Internet. Yet in recent years, despite the continued persis
tent issue of digital exclusion, the government agenda of online gender equity has signifi
cantly diminished and there has been a gradual disinvestment in funding for programs for
Internet access.
As highlighted by Rashid (2016), to reduce the gender digital divide there is a need for
digital inclusion policy interventions to not only focus on the supply-side of providing ICT
equipment and connectivity infrastructure, but to also include “a more nuanced under
standing of the behavior and use of ICTs by women in meaningful ways to enable them to
fulfil specific individual motivations and needs” (p. 327).
Page 12 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
The Use of Mobile Technology in Digital Inclusion
The use of mobile technology was identified as a key element in digital inclusion activities
in the review. In the grey literature, IFLA and TASCHA, (2017*) confirm that “for the bil
lions of people coming online for the first time, mobile phone and increasingly smart
phones are their point of entry to the Internet” (p. 31). GSMA’s report Bridging the gen
der gap: Mobile access and usage in low-and middle-income countries (2015*), and the
report Development and access to information (IFLA & TASCHA, 2017*), both provide in
sights (p. 123) into the use of mobile technology by women and its impact on digital inclu
sion. Although not specifically focused on women, the UK Ofcom report “Smartphone by
default” internet users (2016*) provides further insight into the use and behavior of indi
viduals whose only access to the Internet is via a smartphone, and the implications this
has in relation to the user experience and digital inclusion. For example, completing on
line forms (for government services) and creating and editing a document (such as for a
CV) via a mobile phone were cited as being particularly challenging. In the Good Things
Foundation’s Library Digital Inclusion Fund Action Research project evaluation, the use
of mobile technology was a key enabler for the research participants getting online
through public library WiFi (Good Things Foundation, 2016c*).
The use of mobile technology was also referenced in the academic literature. Correa et al.
(2016) found that despite not being able to get good service, many people from Chilean
rural communities purchased mobile phones to use when they travelled outside their vil
lage. Haenssgen’s (2018) study in rural India argued that households without mobile
phones are increasingly disadvantaged in their health care access, stating that “phone
diffusion leads [healthcare] providers to expect health-related phone use among the
population” (p. 371).
Rashid (2016; based on research in developing countries) found that although women re
ly less on computers and the Internet, they are more likely to use mobile phones com
pared to men. Yet Potnis’s (2016) research on rural women in India highlighted that
women often spoke about rumors and gossip on how mobile phones can cause health
problems, thus deterring them from adopting and using mobile phones. Focus group dis
cussions in research by Pavez et al. (2017) also revealed negative perceptions of how the
Internet and mobile devices were viewed as intrusive and disruptive to their way of life,
with participants referring to the “adverse and harmful consequences attributed to the
Internet, including addiction and isolation” (p. 17).
Haenssgen (2018) also states that mobile technology has become so pervasive in some
domains of Western urban life that it is simply expected of everyone to use it so as to not
inconvenience others. Yet as stated by Freeman et al. (2016), not everyone has access,
the motivation, or indeed the skills to use online services, and many rural regions strug
gle with slow or unreliable broadband and mobile phone connectivity.
Page 13 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Digital Inclusion Frameworks, Measurements, and Evaluations
Only a limited number of articles focused on the actual process of measuring or evaluat
ing the success and outcomes of digital inclusion initiatives, highlighting a lack of both
underpinning theory as well as evaluation procedures to guide digital inclusion research.
Smith (2015) provides a conceptual framework for analyzing the success of digital inclu
sion projects, and Madon et al. (2009) identify three crucial factors that must be consid
ered when planning digital inclusion initiatives: the value, sustainability, and scalability of
the project. Armenta et al. (2012) provide a seven-stage framework for rural, under
served and less-privileged populations: (1) identification and evaluation of regional so
cioeconomic condition, (2) assessment of external factors that impact the region’s sus
tainable development, (3) identification of those ICT more favorable to (p. 124) support
sustainable development, (4) analysis of financial viability of ICT infrastructure and oper
ations deployment, (5) development and implementation of a technology adoption and
training program, (6) development and implementation of and ICT application focused on
the regional sustainable development needs, and (7) evaluation of the project.
The work of Boulos et al. (2015) related to digital inclusion provides well-being measures
calculated through the Organization for Economic Co-operation Development (OECD)
Better Life Index for the 34 OECD member countries, and the related OECD Regional
Well-Being “How’s life where you are?” tool that covers 362 OECD regions. In addition,
digital inclusion research by Jones et al. (2015) include Tennant’s Short Warwick-Edin
burgh Mental Well-Being Scale (SWEMWBS) to measure well-being.
Page 14 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Digital Inclusion Training
The review identified digital skills training as an important aspect of digital inclusion and
the effective use of ICT (Hughes et al., 2017; Yueh et al., 2013). For example, Martinez-
Cantos (2017) note that the EU, in line with academic research and other political institu
tions around the world, “considers that digital literacy and associated competences play a
key role in the development of the Information Society, and is becoming a priority in ini
tiatives for social inclusion and human capital” (p. 420). As stated by Ferreira (2016)
“users need to feel capable of using ICT administered through (p. 125) training classes
and peer support to overcome lack of experience and to encourage participation” (p. 39).
Only a small fraction of the studies linked the concepts of digital inclusion and informa
tion literacy. For example, the research of Yu et al. (2017) on understanding factors influ
encing ICT adoption behavior found that when a digital divide exists, it is important to
keep on investing in information literacy development activities for rural communities to
help them develop their ICT competence. Wyatt et al. (2005) extend this point by clarify
ing that while there needs to be an ability to find and make sense of information found
online, it is also important to have “the ability to make sense of generic information that
is relevant to one’s own circumstances” (p. 213).
Approaches to digital inclusion digital skills training are also discussed. Pischetola (2011)
emphasizes the need for investment in education and training in schools to use the ICT
infrastructure and enhance learning. Berger and Croll (2012), in their work on training in
basic Internet skills for special target groups in non-formal educational settings, discuss
the trainer/learner relationship and the importance of trust. The researchers highlight a
successful intervention in Germany where a female teacher was appointed for a group of
female learners to prevent them from feeling intimidated and to help create an open
learning atmosphere where any question could be raised without embarrassment. Madon
et al.’s (2009) research confirms the importance of this approach, highlighting how a digi
tal inclusion project in Mpumalanga, South Africa failed for a number of reasons, includ
ing that the trainers were outsiders whose motives were often suspected.
While the review identified the importance of digital skills training, and provided details
of specific approaches, there appeared to be a lack of depth in relation to what and how
was actually being taught, and this thus provides another opportunity for further re
search.
Page 15 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
For example, Broadbent and Papadopoulos (2013) found that participants reported some
improvement in their sense of well-being attributed to the provision of ICT, citing con
necting with relatives, reading news in their own language, and getting access to online
services as important conduits to improved health and well-being. Other journal articles
referred specifically to health practices. For instance, Freeman et al. (2016) state how
poor connectivity inhibits basic health practices, such as contact between patients, physi
cians, and colleagues, and how rural health services would benefit enormously from effec
tive mobile and Internet services, particularly to communicate with their patients. Hart et
al. (2004) highlight how the use of the Internet can increase patients’ knowledge about
their health conditions, although patients in their study were often too overwhelmed by
the information available on the Internet to make an informed decision about their own
care.
In the grey literature, as part of their evaluation of the NHS Widening Digital Participa
tion, Good Things Foundation (2016a*) stated there is “a huge crossover between those
who are digitally excluded, and those at risk of poor health” (p. 8). Although not specifi
cally aimed at women or rural areas, the project was set up to help improve the digital
health skills of people in hard-to-reach communities. Similarly, the English My Way
project, also evaluated by Good Things Foundation, designed to help people gain English
language skills through a blend of digital tools and face-to-face training sessions, found
that participants gained health and well-being benefits (Good Things Foundation,
2016b*). Both projects depended on a network of hyperlocal community organizations
and agents who were able to reach out to hard-to-reach communities. Deloitte’s (2014*)
report highlights how an empirical study undertaken in rural villages in India to analyze
the impact of Internet access on child mortality rates found that villages with Internet ac
cess that “provided specific online health information to women during and after preg
nancy had 14% lower child mortality rates than villages without the Internet” (p. 19*).
As referred to earlier, information literacy is important for health and well-being (Mart
zoukou & Abdi, 2017) and people’s adoption of the Internet (Yu et al., 2017). Williamson
and Asla (2009) state that information literacy is crucial to the well-being of people in the
“fourth age” (a stage of increasing dependence and disability, for those aged 85+). Mart
zoukou and Abdi’s (2017) work on information literacy in everyday life makes a specific
reference to the significant role information literacy can play in both the physical and
psychological well-being of women. This is particularly the case in a critical life situation,
for example, during pregnancy and childbirth, where the way in which women evaluate
Page 16 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
different sources of information can have a significant impact. Adekannbi and Adeniran’s
(2017) work on the information literacy of women in rural communities in Nigeria discov
ered that women had limited, basic knowledge of family planning and that the acquisition
of information on family planning was accidental, as a majority of research participants
did not have access to health centers.
For example, very few journal articles defined or attempted to describe or explain the
concept of digital inclusion, which as evidenced from conducting this review, has led to
ambiguities in the understanding and meaning of digital inclusion in academic research.
Further confirmation of this tension was revealed by practitioners, funders, policymakers,
and other key digital inclusion stakeholders at the 2016 Net Inclusion Summit, who iden
tified a lack of a shared vocabulary in defining digital inclusion (Rhinesmith & Siefer,
2017*). Jaeger et al. (2012) neatly sum up the consequence of this tension stating, “it is a
challenge to solve a problem you cannot define, and the inconsistency of definitions has
affected policymaking processes that have attempted to address these issues” (p. 4).
Similarly, tensions in relation to information literacy and how it relates to digital inclusion
are also identified through the review. For example, information literacy, despite its asso
ciation with critical thinking skills (Bingham et al., 2016) and its clear relevance to digital
literacy and digital inclusion (Adhikari et al., 2016; Turkalj et al., 2015), continues to be
overlooked in digital inclusion policy and practice. This is also confirmed by the lack of
linkages found between digital inclusion and information literacy in the review (Wyatt et
al., 2005; Yu et al., 2017), as highlighted earlier. The reason for this is partly explained in
the work by Jaeger et al. (2012), which explores the inter-relationships between digital lit
eracy, digital inclusion, and public policy, and the fragmented nature of research in this
area. They highlight that “while the terms digital divide and digital literacy have entered
into common usage, the term digital inclusion is still in its infancy” (p. 3). This suggests
that the use of digital inclusion as a term may grow over the forthcoming years, thus pro
viding future opportunities to reveal linkages with information literacy.
Another explanation for the lack of linkages found between digital inclusion and informa
tion literacy within the review, and a further tension, as alluded to earlier, is that re
searchers in other fields use varying terminology to describe information literacy and dig
ital inclusion concepts. For example, a small selection of authors including Britz et al.
(2012) referred to the application of Amartya Sen’s Capability Approach in relation to an
(p. 128) information-based rights framework, in which an individuals’ ability to use infor
Page 17 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
mation is influenced by their relative capabilities. Whilst this approach displays similari
ties with the concepts of information literacy and digital inclusion, it is also highlights the
need for a shared vocabulary within digital inclusion research to reduce ambiguities and
fragmentation of the research landscape.
Contradictions were also revealed within the review. For example, a clear split was identi
fied between digital inclusion initiatives in developing countries and those in developed
countries, which were often discussed in contradictory terms. Research in developed
countries tended to make a number of assumptions in relation to access, knowledge, and
skills. For example, Whitney et al. (2011) ascertained through their research in five Euro
pean countries that there is increasingly an assumption that people should be able to par
ticipate in a wide range of formal activities such as eGovernment, eHealth and eEduca
tion via their computers and mobile phones. Research in developing countries, however,
tended to be more about access and infrastructure; how access does not necessarily en
tail Internet adoption, particularly in isolated contexts; and how digital inclusion needs
the support of reliable broadband and electricity (Correa, et al., 2017; Pavez et al., 2017;
Potnis, 2015).
Another major insight identified from the review is the tension regarding the need to bet
ter understand the complexity of digital inclusion initiatives (Madon et al., 2009). For ex
ample, only a small number of journal articles, as noted earlier, contain an underpinning
theory to guide the research and attempt to unpick the complexity of digital inclusion
projects. This in turn has led to clear gaps in digital inclusion research, such as (p. 129)
the lack of insight on the content of digital skills training, leaving scope for criticism, but
also providing opportunities for future research into this area.
Conclusion
This review provides a number of contributions to the existing literature on digital inclu
sion and information literacy. First, while the review confirms that there is a global gen
der digital divide where women lack access to information and digital skills, particularly
Page 18 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
in rural areas, there is limited research with regard to the role of digital inclusion in
women’s health and well-being in rural communities. Second, the review identifies that
digital inclusion initiatives are attempting to close the digital divide by providing infra
structure and access to digital technologies; by building capabilities and skills in how to
use such technologies and online information; and that mobile technology is playing an
increasing role in digital inclusion initiatives. Third, from the limited research that does
exist, the review confirms that digital inclusion has the potential to contribute to the im
provement of women’s health and well-being in rural communities and that information
literacy can play a key role in digital inclusion. Fourth, the review confirms that digital in
clusion is a complex area of enquiry, and that digital inclusion research appears frag
mented and requires more depth (particularly in relation to terminology, digital skills
training, linkages with information literacy and use of theory). Indeed, the inclusion of
some grey literature was essential in the review in order to provide further understand
ing, richness and currency. Finally, the review reveals that significant tensions and con
tradictions exist within digital inclusion practice and policy.
The review does come with its limitations. This review was limited to using two databas
es, and a selection of grey literature, and so is by no means exhaustive. The exclusion of
books and conference papers rendered the search more manageable, as did the omission
of the phrase “digital divide” from the search terms which, if included, would have pro
duced a far greater number of articles but perhaps with less specific relevance.
The identification of such issues in the literature and limitations of this study helps identi
fy a future research agenda. First, there is a need for further systematic reviews across
more databases and grey literature on the research topic with inclusion of a greater num
ber of search terms/phrases. Second, there is opportunity for further research, particular
ly in relation to (1) the processes and mechanisms of digital inclusion initiatives, (2) digi
tal inclusion digital skills training where the concepts of information literacy and digital
inclusion are brought together, and (3) the experiences of women who have benefitted
from digital inclusion initiatives. Finally, there is scope to incorporate more underpinning
research theory in digital inclusion research to make sense of this complex situation of
enquiry and provide a deeper foundation for both shaping research in this area as well as
in understanding and evaluating the process and results.
Bach, A., Shaffer, G., & Wolfson, T. (2013). Digital human capital: Developing a framework
for understanding the economic impact of digital exclusion in low-income communities.
Journal of Information Policy, 3, 247–266.
Page 19 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Bruce, C. (2000). Information literacy research: Dimensions of the emerging collective
consciousness. Australian Academic & Research Libraries, 31(2), 91–109.
Dunn, H. S. (2013). Information literacy and the digital divide: Challenging e-exclusion in
the Global South. In Information Resources Management Association (2013) digital litera
cy: Concepts, methodologies, tools, and applications (pp. 20–38). Hershey, PA: IGI Global.
Hepworth, M., & Walton, G. (2013). Developing people’s information capabilities: Foster
ing information literacy in educational, workplace and community contexts. Bingley, UK:
Emerald Publishing.
Lloyd, A. (2010). Framing information literacy as information practice: Site ontology and
practice theory. Journal of Documentation, 66(2), 245–258.
McGillivray, D., Jenkins, N., & Mamattah, S. (2017). Rapid review of evidence for basic
digital skills. School of Media, Culture & Society, University of the West of Scotland, Ayr,
Scotland. https://digitalparticipation.storage.googleapis.com/reports/
Tackling_Digital_Exclusion_Literature_Review.pdf
Meijer, A., & Bekkers, V. (2015). A metatheory of e-government: Creating some order in a
fragmented research field. Government Information Quarterly, 32, 237–245.
Mervyn, K., Simon, A., & Allen, D. K. (2014). Digital inclusion and social inclusion: A tale
of two cities. Information, Communication & Society, 17(9), 1086–1104.
Nemer, D. (2015). From digital divide to digital inclusion and beyond: A positional review.
Journal of Community Informatics, 11(1). http://ci-journal.org/index.php/ciej/article/
view/1030
Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York: Free Press.
Secker, J. & Coonan, E. (2013). Rethinking information literacy: A practical framework for
supporting learning. London: Facet.
Page 20 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Secker, J. (2018). The revised CILIP definition of information literacy. Journal of Informa
tion Literacy, 12(1), 156–158.
Van Dijk, J. A. G. M. (2005). The deepening divide: Inequality in the information society.
Thousand Oaks, CA: Sage Publications.
* Grey literature
Adekannbi, J. O., & Adeniran, O. M. (2017). Information literacy of women on family plan
ning in rural communities of Oyo State Nigeria. Information Development, 33, 351–360.
doi:10.1177/0266666916661387
Adhikari, J., Mathrani, A., & Scogings, C. (2016). Bring your own devices classroom: Ex
ploring the issue of digital divide in the teaching and learning contexts. Interactive Tech
nology and Smart Education, 13(4), 323–343. doi:10.1108/ITSE-04-2016-0007
Armenta, A., Serrano, A., Cabrera, M., & Conte, R. (2012). The new digital divide: The
confluence of broadband penetration, sustainable development, technology adoption and
community participation. Information Technology for Development, 18, 345–353. doi:
10.1080/02681102.2011.625925
Berger, A., & Croll, J. (2012). Training in basic Internet skills for special target groups in
non-formal educational settings: Conclusions from three pilot projects. Research in Learn
ing Technology, 20(4).https://journal.alt.ac.uk/index.php/rlt/article/view/1330
Bingham, T. J., Wirjapranata, J., & Chinnery, S. (2016). Merging information literacy and
evidence-based practice for social work students. New Library World, 117(3/4), 201–213.
Blackstock, O. J., Cunningham, C. O., Haughton, L. J., Garner, R. Y., Norwood, C., & Hor
vath, K. J. (2016). Higher eHealth literacy is associated with HIV risk behaviors among
HIV-infected women who use the Internet. Journal of the Association of Nurses in Aids
Care, 27(1), 102–108. **
Boulos, K., Tsouros, A. D., & Holopainen, A. (2015). Social, innovative and smart cities are
happy and resilient: Insights from the WHO EURO 2014 International Healthy Cities Con
ference. International Journal of Health Geographics, 14(3).https://ij-
healthgeographics.biomedcentral.com/articles/10.1186/1476-072X-14-3
Page 21 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Britz, J., Hoffmann, A., Ponelis, S., Zimmer, M., & Lor, P. (2012). On considering the appli
cation of Amartya Sen’s capability approach to an information-based rights framework.
Information Development, 29(2), 106–113. doi:10.1177/0266666912454025
Broadbent, R., & Papadopoulos, T. (2013). Impact and benefits of digital inclusion for so
cial housing residents. Community Development, 44(1), 55–67.
Carretero, S., Vuorikari, R., & Punie, Y. (2017). DigComp 2.1: The Digital Competence
Framework for Citizens with eight proficiency levels and examples of use. EUR 28558 EN,
doi:10.2760/38842 https://ec.europa.eu/jrc/en/publication/eur-scientific-and-tech
nical-research-reports/digcomp-21-digital-competence-framework-citizens-eight-
proficiency-levels-and-examples-use *
Chiu, C. J., & Liu, C. W. (2017). Understanding older adult’s technology adoption and
withdrawal for elderly care and education: Mixed method analysis from national survey.
Journal of Medical Internet Research, 19(11), e374.
CILIP (2018). What is information literacy. Library and Information Professionals Associa
tion.http://www.cilip.org.uk/?page=informationliteracy *
Correa, T., & Pavez, I. (2016). Digital inclusion in rural areas: A qualitative explo
(p. 132)
Correa, T., Pavez, I., & Contreras, J. (2017). Beyond access: A relational and resource-
based model of household Internet adoption in isolated communities. Telecommunications
Policy, 41, 757–768.
Crawford, J., & Irving, C. (2007). Information literacy: The link between secondary and
tertiary education project and its wider implications. Journal of Librarianship and Infor
mation Science, 39(1), 17–26. doi:10.1177/0961000607074812 **
Deloitte (2014). Value of connectivity: Economic and social benefits of expanding internet
access. https://www2.deloitte.com/content/dam/Deloitte/ie/Documents/Technolo
gyMediaCommunications/2014_uk_tmt_value_of_connectivity_deloitte_ireland.pdf
*
Dorner, D. G., & Gorman, G. E. (2011). Contextual factors affecting learning in Laos and
the implications for information literacy education. Information Research, 16, 1–23.
Enwald, H., Hirvonen, N., Huotari, M. L., Korpelainen, R., Pyky, R., Savolainen, M., &
Niemelä, R. (2016). Everyday health information literacy among young men compared
with adults with high risk for metabolic syndrome: A cross-sectional population-based
study. Journal of Information Science, 42(3), 344–355. https://doi.org/
10.1177/0165551516628449
Page 22 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Eynon, R., & Helsper, E. (2015). Family dynamics and Internet use in Britain: What role
do children play in adults’ engagement with the Internet? Information, Communication &
Society, 18(2), 156–171. doi:10.1080/1369118X.2014.942344 **
Ferreira, S. M., Sayago, S., & Blat, J. (2016). Going beyond telecenters to foster the digi
tal inclusion of older people in Brazil: Lessons learned from a rapid ethnographical study.
Information Technology for Development, 22, sup 1, 26–46. doi:
10.1080/02681102.2015.1091974
Fotopoulou, A. (2016). Digital and networked by default? Women’s organisations and the
social imaginary of networked feminism. New Media & Society, 18(6), 989–1005. **
Fourie, I., and Meyer, A. (2016). Role of libraries in developing an informed and educated
nation. Library Hi Tech, 34, 422–432. doi:10.1108/LHT-01-2016-0009
Freeman, J., & Park, S. (2015). Rural realities: Digital communication challenges for rural
Australian local governments. Transforming Government: People, Process and Policy,
9(4), 465–479.
Freeman, J., Park, S., Middleton, C., & Allen, M. (2016). The importance of broadband for
socio-economic development: A perspective from rural Australia. Australasian Journal of
Information Systems, 20, 1–18.
Gerli, P., Wainwright, D., & Whalley, J. (2017). Infrastructure investment on the margins of
the market: The role of niche infrastructure providers in the UK. Telecommunications Pol
icy, 41, 743–756. **
Good Things Foundation. (2016a). Health & digital: Reducing inequalities, improving soci
ety: An evaluation of the Widening Digital Participation programme.https://
www.goodthingsfoundation.org/sites/default/files/research-publications/
improving_digital_health_skills_report_2016_1.pdf *
Good Things Foundation. (2016b). English My Way Phase 2 Evaluation: Final evaluation
report.https://www.goodthingsfoundation.org/sites/default/files/research-publica
tions/emw-phase-2-evaluation-report_-_rev_a.pdf *
Good Things Foundation. (2016c). Library Digital Inclusion Fund Action Research Project
evaluation final report.https://www.goodthingsfoundation.org/sites/default/files/re
search-publications/
library_digital_inclusion_fund_action_research_project_final_report.pdf *
GSMA. (2015). Bridging the gender gap: Mobile access and usage in low-and mid
(p. 133)
dle-income countries.https://www.gsma.com/mobilefordevelopment/wp-content/up
loads/2016/02/GSM0001_03232015_GSMAReport_NEWGRAYS-Web.pdf *
Haenssgen, M. J. (2018). The struggle for digital inclusion: Phones, healthcare, and mar
ginalisation in rural India. World Development, 104, 358–374.
Page 23 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Hart, A., Henwood, F., & Wyatt, S. (2004). The role of the Internet in patient-practitioner
relationships: Findings from a qualitative research study. Journal of Medical Internet Re
search, 6(3), 1.
Hashim, R., Kartika, S. I., Ustadi, Y. A., Merican, F. M., & Fuzi, S. F. S. M. (2012). Digital
inclusion and lifestyle transformation among the Orang Asli: Sacrificing culture for
modernity? Asian Social Science, 8(12), 80–87.
Hatlevik, O. E., Ottestad, G., & Throndsen, I. (2015). Predictors of digital competence in
7th grade: A multilevel analysis paper. Journal of Computer Assisted Learning, 31, 220–
231. doi:10.1111/jcal.12065
Hughes, H., Wolf, R., & Foth, M. (2017). Informed digital learning through social living
labs as participatory methodology: The case of Food Rescue Townsville. Information and
Learning Science, 118(9/10), 518–534.
IFLA & TASCHA. (2017). Development and access to information. International Federa
tion of Library Associations and Institutions, and Technology & Social Change Group. Uni
versity of Washington.https://da2i.ifla.org/sites/da2i.ifla.org/files/uploads/docs/
da2i-2017-full-report.pdf *
Jacobs, H. L. M., & Berg, S. (2011). Reconnecting information literacy policy with the
core values of librarianship. Library Trends, 60(2), 383–394.
Jaeger, P. T., Bertot, J. C., Thompson, K. M., Katz, S. M., & DeCoster, E. J. (2012). The in
tersection of public policy and public access: Digital divides, digital literacy, digital inclu
sion, and public libraries. Public Library Quarterly, 31(1), 1–20. doi:
10.1080/01616846.2012.654728
Jones, R. B., Ashurst, E. J., Atkey, J., & Duffy, B. (2015). Older people going online: Its val
ue and before-after evaluation of volunteer support. Journal of Medical Internet Research,
17(5), 1. doi:10.2196/jmir.3943
Julien, H., & Breu, R. D. (2005). Instructional practices in Canadian public libraries. Li
brary & Information Science Research, 27, 281–301. doi:10.1016/j.lisr.2005.04.002 **
Page 24 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Kapondera, S. K., & Hart, G. (2016). The use of multipurpose community telecentres and
their services in Malawi: The case of Lupaso Community Telecentre. South African Jour
nal of Libraries and Information Science, 82(1), 13–25. doi:10.7553/82-1-1589
Livingstone, S., & Helsper, E. (2007). Gradations in digital inclusion: Children, young peo
ple and the digital divide. New Media & Society, 9(4), 671–696.
Madon, S., Reinhard, N., Roode, D., & Walsham, G. (2009). Digital inclusion
(p. 134)
Martínez-Cantos, J. L. (2017). Digital skills gaps: A pending subject for gender digital in
clusion in the European Union. European Journal of Communication, 32(5), 419–438.
Martzoukou, K., & Abdi, E. S. (2017). Towards an everyday life information literacy mind-
set: A review of literature. Journal of Documentation, 73(4), 634–665.
Mehra, B. (2017). Mobilization of rural libraries toward political and economic change in
the aftermath of the 2016 Presidential election. Library Quarterly: Information, Communi
ty, Policy, 87(4), 369–390. **
Niemelä, R., Ek, S., Eriksson- Backa, K., & Huotari, M. L. (2012). A screening tool for as
sessing everyday health information literacy. Libri, 62, 125–134.
Pavez, I., Correa, T., & Contreras, J. (2017). Meanings of (dis)connection: Exploring non-
users in isolated rural communities with internet access infrastructure. Poetics, 63, 11–
21.
Pischetola, M. (2011). Digital media and learning evolution: A research on sustainable lo
cal empowerment. Global Media Journal, 11(18), 1–14.
Page 25 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Rashid, A. T. (2016). Digital inclusion and social inequality: Gender differences in ICT ac
cess and use in five developing countries. Gender, Technology and Development, 20(3),
306–332.
Real, B., Bertot, J. C., & Jaeger, P. T. (2014). Rural public libraries and digital inclusion: Is
sues and challenges. Information Technology and Libraries, 33(1), 6–24. doi:10.6017/
ital.v33i1.5141
Roberts, E., Farrington, J., & Skerratt, S. (2015). Evaluating new digital technologies
through a framework of resilience. Scottish Geographical Journal, 131(3–4), 253–264.
Salinas, A., & Sánchez, J. (2009). Digital inclusion in Chile: Internet in rural schools. In
ternational Journal of Educational Development, 29, 573–582. doi:10.1016/j.ijedudev.
2009.04.003
Sanchez, M. S. O., & Sanchez, M. R. F. (2017). Digital technologies and rural women’s en
trepreneurship. Prisma Social, 18, 259–277. **
Singh, S. (2017). Bridging the gender digital divide in developing countries. Jour
(p. 135)
Smith, C. (2015). An analysis of digital inclusion projects: Three crucial factors and four
key components. Journal of Information Technology Education: Research, 14(1), 179–188.
Stevenson, S. A., & Domsy, C. (2016). Redeploying public librarians to the front-lines: Pri
oritizing digital inclusion. Library Review, 65, 370–385. doi:10.1108/LR-02-2016-0015 **
Thompson, K. M., & Paul, A. (2016). “I am not sure how much it will be helpful for me”:
Factors for digital inclusion among middle-class women in India. Library Quarterly: Infor
mation, Community, Policy, 86(1), 93–106.
Page 26 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Turkalj, D., Bilos, A., & Kelic, I. (2015). Integration of Croatian farmers in the EU informa
tion society—Issues and implications. Ekonomski Vjesnik, 28, 41–52. doi:http://
www.efos.unios.hr/ekonomski-vjesnik/en/table-of-contents-by-issue/
Wei, Z., Jiang, G., Niu, T., Zou, T., & Dong, E. (2013). A tale of two counties: How two
school libraries in rural western China serve local needs. Library Trends, 62, 205–233.
doi:10.1353/lib.2013.0029
Whitney, G., Keith, S., Buhler, C., Hewer, S., Lhotska, L., Miesenberger, K., … Engelen, J.
(2011). Twenty five years of training and education in ICT design for all and assistive
technology. Technology and Disability, 23(3), 163–170.
Williamson, K., & Asla, T. (2009). Information behavior of people in the fourth age: Impli
cations for the conceptualization of information literacy. Library & Information Science
Research, 31, 76–83.
World Wide Web Foundation. (2015). Women’s Rights Online: Translating Access into Em
powerment—Global Report October 2015. http://webfoundation.org/docs/2015/10/
womens-rights-online21102015.pdf *
Wyatt, S., Henwood, F., Hart, A., & Smith, J. (2005). The digital divide, health information
and everyday life. New Media & Society, 7, 199–218. doi:10.1177/1461444805050747
Yu, T.-K., Lin, M.-L., & Liao, Y.-K. (2017). Understanding factors influencing information
communication technology adoption behavior: The moderators of information literacy and
digital skills. Computers in Human Behavior, 71, 196–208. doi:10.1016/j.chb.2017.02.005
Yueh, H. P., Chen, T. L., Chiu, L. A., & Lin, W. C. (2013). Exploring factors affecting
learner’s perception of learning information and communication technology: A HLM
analysis of a national farmers’ training program in Taiwan. Educational Technology and
Society, 16, 231–242.
Zhou, C., & Purushothaman, A. (2015). The need to foster creativity and digital inclusion
among women users in developing context: Addressing second order digital divide in on
line skills. iJET (International Journal of Emerging Technologies in Learning), 10(3), 69–
74.
Sharon Wagg
Page 27 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Inclusion and Women’s Health and Well-Being in Rural Communi
ties
Good Things Foundation, and has a master’s degree in Librarianship (Distinction)
from the University of Sheffield. Her PhD dissertation investigated digital inclusion
initiatives in the context of rural communities in the United Kingdom.
Louise Cooke
Boyka Simeonova
Page 28 of 28
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.6
This chapter reviews recent research on digital technology to support older people. The
review concentrates on research emphasizing the design and evaluation of technologies
used by older people, rather than the technical implementation of the technologies. Such
papers provided insight into the needs and interests for this group, how older people
were involved in the research, and what outcomes were achieved. 407 papers were iden
tified and grouped into 16 major topics of research. Four of these topics are discussed in
detail, as well as several of the general themes that emerged from the research.
Keywords: ageingaging population, being digital, digital technology, lived experience, mainstream digital tech
nologies, older people, older people’s welfare
Introduction
ONE of the great challenges facing the world today is the aging of the population. The
United Nations (2017) estimates that in 2017 there were 962 million people aged 60 or
over worldwide, but by 2050 there will be 2.1 billion people in that group, a rise from
12.7% to 21.5% of the population. Currently, Europe and Japan have the greatest percent
age of population aged 60 or over (over 25%), but by 2050 all regions of the world except
Africa will have nearly a quarter or more of their populations aged over 60. An important
consequence of the aging population is that the ratio of people of working age to older
people (the Potential Support Ratio, PSR) is declining. Thus, there will be fewer people of
working age to care and support the older population. Europe currently has a PSR of ap
proximately 4 younger people for each older one, although many European countries
have a PSR of less than 3 younger/older, and Japan’s is the lowest at 2.1 (United Nations,
2017).
Digital technologies are often presented as a major solution to this increasing problem of
providing care to older people. Increasingly, particularly in the wealthier countries, it is
expected that older people will be cared for and will care for themselves using digital
Page 1 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
technologies. However, the relationship between digital technologies and older people is
rather more complex than many commentators suggest. First, old age spans from people
in their 60s to people well over 100 years old. People currently in their 60s may have
been using digital technologies for many years, whereas those much older may have little
experience with these technologies. So the acceptance and familiarity of digital technolo
gies may be very different for different cohorts of older people.
Second, we can think of two different ways of “being digital” for older people. In the first
way of “being digital”, their use of mainstream technologies, older people both need
(p. 137) and want to be able to use the many mainstream digital technologies that have
emerged in recent years and that are continuing to emerge. For example, automated
teller machines (ATMs) are now the most common way of withdrawing cash from one’s
bank account. Twenty years ago, people over 60 rarely used ATMs (van Schaik, Petrie &
Kirby, 1995). But as these machines have become more and more common, and bank
branches less common, everyone, including older people, needs to use them, whether
they wish to or not. Consequently, banks and ATM manufacturers have had to consider
the needs of older users, for example that very short time-outs may not be appropriate,
and that text, button sizes and colors need to be suitable for older eyes and fingers. In ad
dition, older people want to use many mainstream digital technologies. For example, they
often realize that the best way to communicate with their children and grandchildren is
via email, Skype, or a social networking site (e.g., Sayago, Forbes & Blat, 2012).
In the second way of “being digital”, the use of technologies specially developed to assist
older people with problems they encounter in their daily lives, technologies have provid
ed many opportunities for assisting older people in overcoming such problems. This may
be as simple as an electronic pillbox that reminds older people to take their medicines, or
complex systems involving the use of the global positioning system of satellites (GPS) to
assist older people in navigating unfamiliar environments (Petrie, Johnson, & Strothotte,
1997) and to monitor and locate older people with dementia, who may wander and be
come confused (Jönsson & Svensk, 1995). So, these digital technologies must be accept
able and usable by older people.
This chapter presents a review of recent research on digital technologies for older peo
ple, highlighting research in both of these ways of “being digital”. First, we will present
the scope of our review and an overview of the 16 different research topics that emerged
from this review. Then we will consider in more depth four of the topics of research, three
related to the first way of “being digital”, that is older people’s use of mainstream digital
technologies. These three emerged most frequently in our review, namely: older people’s
1) interaction with digital technologies, 2) lived experience of digital technologies, and 3)
use of digital technologies for communication and social interaction. The fourth topic to
be considered in depth is related to the second way of “being digital”: i.e. digital tech
nologies that are specially developed to assist older people, with the specific topic being
4) that of monitoring their welfare. Finally, we reflect on some of the overarching themes
Page 2 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
that emerged from the research, some of the limitations of recent research, and further
areas of research that need to be undertaken.
cal implementation of the technologies. This means that papers should provide insight in
to what area of need or interest for older people is being addressed, how older people
were involved in the research, and what outcomes were achieved. A range of mainstream
outlets in human-computer interaction and human factors, as well as specialist outlets in
gerontology and rehabilitation technology, were selected (see Table 6.1). Outlets were se
lected for inclusion based on their Impact Factor (Thomson Reuters, 2013); journals with
the highest impact factors for their sector were chosen. The Australian Research
Council’s (2012) rankings of journals and conferences were also used in the decisions.
Page 3 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Mainstream outlets
Journals
Human Factors
Conferences
Specialist outlets
Journals
Educational Gerontology
Conferences
Page 4 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Papers were included if they used words relevant to older people and technology in the ti
tle, abstract, or keywords. Terms included “older people”, “older adults,” or “elders” in
mainstream papers (which were by definition about technology, although this was
checked) and in addition terms such as “computer/s” and “assistive technology” in the
specialist papers. Table 6.2 provides the search terms and how they were used. Only pa
pers published in English were included. There is not a well-established definition of
when old age begins and therefore at what age people become “older” or “elderly”. Typi
cally, 60 or 65 years of age are used to indicate the start point of old age in chronological
terms, although it is well accepted that there are wide individual differences in the aging
process. Therefore, we made no attempt to impose a definition of older people (p. 139) on
the selection of papers; if the paper stated it was about older people, it was included in
the review. This process identified 407 papers. See the appendix at the end of the chapter
for the full list of references analyzed.
Table 6.2 Terms Related to Older People Used to Select Papers for In
clusion in the Review
Category Term
An initial analysis, based on the area of need or interest of older people, rather than on
the technology deployed, grouped the research conducted into 16 topics (see Table 6.3).
Page 5 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Topic Number
of pa
pers
Page 6 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
This topic investigated how older people physically interact with mainstream digital tech
nologies, the problems they might encounter, and different solutions that have been de
veloped to overcome these problems. It was the most frequent in the research reviewed,
Page 7 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
(p. 140) with 90 papers addressing it. This topic included four subtopics: physical
(p. 141)
Physical interaction. Physical interaction might include pointing and clicking with a
mouse, or tapping on a touchscreen; research considered how these interaction styles
might be adapted for older users. Hwang and colleagues (Hwang, Hollinworth, &
Williams, 2013) proposed several ways in which items on a computer display, such as
icons, can be expanded to make them easier for older people to select. They found that
using such techniques substantially improved selection time and reduced error rates.
Sayago and Blat (2008) found that older people were not concerned about how fast they
could interact, but were very concerned about not making errors, so this second result is
particularly important. Jochems, Vetter, and Schlick (2013) compared younger and older
people in their use of mouse, touchscreen, and eye gaze control, and found that both
groups were fastest with a touchscreen, particularly the older group. They also investi
gated combining eye gaze with input from a keyboard, speech input, or a foot pedal, find
ing that the best combination was eye gaze with keyboard confirmation.
In research on touchscreen interaction specifically, Apted, Kay, and Quigley (2006) intro
duced older people to interaction with a tabletop computer using a digital photograph
sharing application. They found that older people coped well with tasks in this applica
tion, although they took longer to complete them than did younger people. They also un
derstood the new interface elements, although initially they had some difficulty with one
of the elements, a copy operation. This was overcome with further training. Lepicard and
Vigouroux took a more experimental approach to touchscreen interaction, investigating
one-hand versus two-hand interaction (Lepicard & Vigouroux, 2010), and single-touch
versus multi-touch interaction (Lepicard & Vigouroux, 2012). In relation to number of
hands, older people were faster and more accurate when using one hand than using two
hands. In relation to multi-touch, both younger and older people had more difficulty with
multi-touch interaction, but especially the older people. Nicolau and Jorge (2012) investi
gated text entry via a touchscreen, comparing mobile phone input with tablet computer
input. Older participants made more errors on a mobile than on a tablet; although input
speed, but not accuracy, correlated with experience with the QWERTY keyboard. On the
mobile in particular, the amount of hand tremor (a common problem for older people) cor
related strongly with less accuracy. Wulf, Garschall, Klein et al. (2014) investigated
younger and older people’s gesture performance on a tablet touchscreen, including drag
ging, pinching and rotating. Older people were slower than younger people, but both
groups were more accurate when the tablet was in portrait rather than landscape orien
tation. Finally, Muskens, van Lent, Vijfvinkel et al. (2014) designed touchscreen applica
tions to be particularly usable by older people. They successfully eliminated problems
with button size, navigation, readability of fonts, and gesture execution. They found that
older people had strong preferences for designs with low numbers of icons, direct input,
no deep hierarchies, large buttons with immediate feedback, clear notification that
screens have changed, and bright colors.
Page 8 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Spoken dialogue interaction. In terms of more natural interaction paradigms, only two
papers reviewed investigated spoken dialogue interaction for older people. (p. 142)
Wolters, Kilgour, MacPherson et al. (2015) explored a bottom-up approach to adapting
spoken dialogue systems for older people. In an analysis of a corpus of spoken interac
tions between an intelligent computer agent and both younger and older people, they
found two main groups of people, a factual group and a social group. The factual users
adapted quickly to the dialogue system and interacted with it efficiently; the social users
treated the system more like a human being and did not change their interaction style
when it did not understand their requests. Almost all the social users were older, although
about a third of older users were factual in style. The authors concluded that spoken dia
logue systems need to adapt to users based on observed behavior of users, not age per
se. Vacher, Caffiau, Portet et al. (2015) also found that older users were more inclined to
treat a spoken dialogue system as a human being and were disturbed by the rigid gram
mars needed to use such systems.
Multimodality. Four papers explored multimodal aspects of interaction for older people.
Carrasco, Epelde, Moreno et al. (2008) and Diaz-Orueta, Etxaniz, Gonzalez et al. (2014)
studied the use of avatars for older people with Alzheimer’s disease, using a TV screen to
display the avatar and a TV remote control for input. Both studies found that older people
readily understood this interaction metaphor and were able to interact successfully in
simple dialogues. Nunes, Kerwin, and Silva (2012) also tested a TV platform for interac
tion but used text and icons rather than a visual avatar. Again, they found that older peo
ple could interact successfully with the system, although there were interesting usability
problems, for example around understanding standard icons for the video player. On the
basis of a number of evaluations, the authors produced a set of guidelines for TV-based
applications for older people. Finally, Warnock, McGee-Lennon, and Brewster (2013) in
vestigated using multimodal notifications for home care reminder systems for older peo
ple. There were no particular differences between younger and older people in their reac
tions to textual, pictographic, abstract visual, speech, sound, tactile, and olfactory notifi
cations in the context of playing a game in a laboratory setting.
Security. A number of papers investigated security issues in interacting with digital tech
nologies for older people. Renaud and Ramsay (2007) explored authentication mecha
nisms that would be easier for older users but equally secure, including recognition of
handwritten numerals and doodles. Nicholson, Coventry, and Briggs (2013a) compared
face-based and picture-based authentication systems, finding that older people performed
better with the face-based authentication while younger people performed better with the
picture-based authentication. However, in further work, Nicholson, Coventry, and Briggs
(2013b) reported that older people performed better with age-appropriate faces.
This topic addresses older people’s lived experience of digital technologies. It includes re
search into how older people understand meaningful practices with technology as (p. 143)
well as issues such as quality of life, well-being, and aging-in-place, and how these might
Page 9 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
impact existing and future technologies. It was the second most frequent topic in the re
search reviewed, with 58 papers addressing it. Research reviewed often addressed issues
of older people’s acceptance of, and motivation to use digital technologies, including re
search about understanding values (Briggs & Thomas, 2015); how older people account
for their difficulties in learning to use a computer (Turner, Turner, & van de Walle, 2007);
older people’s concerns about using mobile phones (Kurniawan, 2008); their emailing
practices and the barriers to using email (Sayago & Blat, 2010); their use and sharing of
YouTube videos (Sayago et al., 2012); their perceptions of telecare (Bentley, Powell, Orrell
et al., 2014); and their attitudes toward robots as supportive devices (Pigini, Facal, Blasi
et al., 2012; Scopelliti, Giuliani, & Fornara, 2005). These issues constituted four
subtopics: types of technology, acceptance of technology, value of technology, and the im
portance of stigma.
Page 10 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Value of technology. Sayago and Blat (2008; also Sayago et al., 2012), studying older
people at a computer club, found they had great motivation to learn. They wanted to use
email and share videos to maintain social communication, especially with their families.
For this motivated group, the researchers concluded that reducing cognitive load was
more important in the design of systems for these older people than interface design
(e.g., screen size, button size). For example, to reduce cognitive load in their use of
YouTube each older people made use of familiar practices, such as copying and pasting
links from emails, rather than querying the search engine; if using the search function,
they typed complete sentences into the search box, rather than first using categories to
narrow down the search (Sayago et al., 2012). In another study with older people learn
ing to use computers, Turner et al. (2007) investigated the values older people placed on
this activity. In practice this meant understanding the ways older people viewed their ex
periences and accounted for their learning difficulties and those of their peer group.
Seven value-based explanations emerged: alienation (“not my world”); lack of fit with
one’s identity (“I worked with people not machines”); agency (the computer being in con
trol, rather than the person; in addition, the pressure to use technology); anxiety; belief in
being too old to learn; being too busy; and finally, questioning the purpose of learning to
use computers. The researchers concluded that it is important to seek out older people’s
values and understandings of themselves in relation to digital technologies and help them
to reframe these values in more optimistic and positive ways.
Larsson et al. (2013) investigated how older people’s perceptions and experiences of In
ternet activities reflected more generally on their being able to participate in society. Old
er people perceived that not undertaking Internet-based activities implied being moved to
the sidelines. For instance, one interviewee explained that in a group she participates in,
the group leader sent out information by email, forgetting that not all participants have
access to this technology. Participants also noted that services with traditional delivery,
such as health services, now take much longer compared to Internet-based delivery. This
study was conducted with older people who were open to technology, but who also cited
conditions that are required for them to engage in Internet activities, such as support and
continual use (so that they remember what they have learnt), as well as problems with
trust (e.g., buying online). A further issue was whether some Internet activities (e.g., so
cial networking sites) are useful for older people, since the most commonly cited need
was that of communication with family and friends, which they accomplished via email
and video links.
These findings were also echoed in other research with older people learning computer
skills. Wanting to see whether the commonly used measures of usability, such as time to
complete task, were relevant for older people, Sayago and Blat (2008) found slow task
completion was not an issue. The participants valued accuracy more than efficiency and
wanted to take their time. For them, it was important not to make mistakes, for they often
found they could not recover from mistakes without asking for help. The researchers not
Page 11 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
ed the importance of self-efficacy: they reported how one participant said that she
(p. 145) enjoyed feeling of being competent despite never using a computer before and
The importance of stigma. Bentley et al. (2014) discovered that stigma was a strong
reason for non-acceptance of digital technologies by older people. They investigated
whether telecare products, such as pendants and panic button systems, were considered
acceptable by older people who were not current users of such products. They found re
sistance to these systems: older people saw them as symbols of old age and loss of auton
omy and claimed that their designs were stigmatizing as well as impractical. However,
the overall concept of being able to summon help was considered useful and important,
and participants acknowledged that they might use such systems in the future. Other
studies of home deployment of technologies also found that stigma was a concern. For in
stance, Doyle, Bailey, Scanaill et al. (2014) explained that an alertness awareness cushion
was specifically designed to fit in with the home environment, and not look like a piece of
assistive technology.
Communication and social interaction are very important activities for health and well-be
ing in later life, and the lessening of these activities poses risks as serious as those for
cigarette smoking, high blood pressure, and obesity (Cohen, Underwood, & Gottlieb,
2000). Therefore, it is not surprising that there was a considerable amount of research on
this topic with 52 papers addressing this topic in the papers reviewed. Subtopics included
social networking, facilitating interaction, motivations for interaction, intergenerational
interaction, communication habits, obstacles to communication, reminiscing, and loneli
ness.
Social networking. Nine papers investigated the use of social networking sites (SNSs).
A network analytic approach comparing different age groups (Arjan, Pfeil, & Zaphiris,
2008) revealed a number of interesting differences, including that, compared to younger
people, older people had smaller networks of friends in SNSs and a greater variety in the
age of their friends, and represented themselves in more formal ways. A study of older
people in the UK and in Cyprus revealed the effect of different cultures in their attitudes
to and use of online social support communities (Michailidou, Parmaxi, & Zaphiris, 2015).
Older people in the UK who used such communities were happy to interact with people
outside their family, but were reluctant to reveal too much about themselves, due to their
fears about security in online situations. On the other hand, older people in Cyprus most
ly used such communities to interact with family members: they were generally aware of
and confident about online security issues, having discussed them with their families.
Other studies about SNSs (Gibson, Moncur, Forbes et al., 2010; Lehtinen, Näsänen, &
Sarvas, 2009) investigated older people’s attitudes to such sites after the researchers
demonstrated and helped them register on the network. In both these studies, the older
Page 12 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
users (located in Finland and Scotland) reported they did not feel they needed
(p. 146)
this channel of communication: they were happy communicating with people they knew
by email. Privacy was a problem for two reasons: older people were wary of giving infor
mation about themselves, and they worried about information accidentally becoming pub
lic. They also felt it was not socially acceptable to broadcast information about them
selves on SNSs. Results from an online questionnaire (Prieto & Leahy, 2012) supported
these findings, noting that the main reasons for not using SNSs were privacy issues, com
plexity of their use, and friends not using them. Also, most older people who were users
of SNSs had been using them for less than five years and got to know about them from
family more than from friends. However, the researchers suggest that SNSs might be a
more interesting way of introducing older people to computer usage than by browsing
websites.
Studying older users and their social interactions off and online, Harley, Howland, Harris
et al. (2014) noted that older people were often passive users on Facebook, logging in to
see what family members were doing, especially younger members who did not use email
to communicate with them, but did not themselves post on Facebook. Norval, Arnott, and
Hanson (2014) proposed recommendations for making SNSs more usable for older people
who had expressed interest in using such sites, but for whom the complexity of the appli
cations was a barrier. Finally, Coelho, Rito, Luz et al., (2015) investigated the problem of
easier interactions for older people on SNSs, using familiar technologies like television
and alternative interaction types such as speech and tapping on tablets. They also identi
fied the functions that older people most value: to share photos and television content
with family and close friends, and to be able to manage different groups of acquain
tances.
Page 13 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Lehmuskallio, Hedman et al. (2010) showed that for many older people, the Internet, and
in particular, email and online calendars, had become important (p. 147) means of main
taining and even initiating new social contacts. The older people felt that these tools
helped them to cope with the stresses and conflicts of the transition from working to re
tirement which involved new activities and commitments, housing arrangements, etc.
Communication habits. Researchers have also examined the nature of older people’s
habits with their communication technologies. Many older people prefer to sustain close
relationships that are meaningful to them, rather than seek to make new acquaintances
(Lindley, Harper, & Sellen, 2008). Older people are prepared to spend time keeping in
touch with valued friends and maintaining family links (Lindley, Harper, & Sellen, 2009).
Sokoler and Svensson (2007) concentrated on ways to include technologies for enabling
social interaction that would not stigmatize older users as lonely people craving compan
ionship. Dowds and Masthoff (2015) described a system to provide live video feeds for
people who are unable to visit each other in person. The idea is that the “window on the
outside world” will be stimulating and may lead to a desire to participate online in other
activities. Doyle et al. (2010) reported on the deployment of a touchscreen device for
communication activities. The device was designed to broadcast some content, with
health suggested as being of particular interest to older people. The hypothesis was that
the broadcast content would act as the trigger to begin interactions, as older people
might send messages or call one another to comment on the broadcast program. In fact,
it was found that the broadcasts were not much attended to, partly due to the fixed
broadcast times. However, the long deployment period (7-9 weeks) yielded much informa
tion about how older people felt about such communication. While they agreed it would
be useful for people who are housebound, particularly for calling and messaging, they
were concerned about issues of disturbance and availability. Finally, Otjacques, Krier,
Feltz et al. (2009) conducted an exploratory study in a large residential care facility about
a social activities management system, allowing residents to book places on outings and
Page 14 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
events. The researchers noted a tendency for the physical spaces where the technologies
are installed to become face-to-face meeting places for residents.
between family carers of people with Alzheimer’s disease, often spouses and hence older
people themselves. Their results showed that online support could help facilitate meeting
arrangements and help continue communication between carers of people with
Alzheimer’s. Such support would help reinforce the interaction between carers that was
already taking place, but only maintained via face-to face meetings. Kalman, Geraghty,
Thompson et al. (2012) attempted to indirectly diagnose aphasia, showing that it could be
reliably detected in online messages. Mahmud, Limpens, and Martens (2013) investigated
the design of a tool for manipulating digital photographs to be used to communicate
everyday happenings and stories. Both the researchers dealing with aphasia and those
dealing with dementia sought to stimulate social interactions, making use of technologies
to initiate reminiscence, which has been shown to be beneficial for older people.
Page 15 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
questionnaire at the beginning of the study and again a year later. Their responses were
assessed in relation to both emotional loneliness (missing an intimate relationship) and
social loneliness (missing a wider social network). Analysis showed that use of the system
for social interaction was positive and that feelings of both emotional and (more so) social
loneliness were reduced.
Research on monitoring older people’s welfare has investigated various aspects of safety
and security. These included ways to monitor sleep, wandering, falls, and risky behaviors,
via recording vital signs or tracking people’s movements. Indications that people may
need help included irregular pulse or not moving. Since falls are a major source of acci
dents and anxiety about them is high, fall prevention is an active area of research (Kepski
& Kwolek, 2012; Oberzaucher, Jagos, Zödl et al., 2010; Schikhof, Mulder, & Choenni,
2010). Older people were also monitored for activity patterns, to determine behaviors
that might be unusual, for instance spending a long time in the corridor or opening the
front door. Other possibilities included monitoring activities of daily living by interpreting
data from sensors placed in various parts of the home (e.g., on the fridge, in the bath
room) (Lexis, Everink, van der Heide et al., 2013), or interpreting sleep behavior (Carey-
Smith, Evans, & Orpwood, 2013; Nijhof, van Gemert Pijnen, de Jong et al., 2012), as well
as locating people who may have wandered out of the house, or who may be exhibiting er
ratic behaviors, e.g., not completing normal routines. Technologies for monitoring, quality
of life, ethical concerns, and beneficiaries of monitoring systems were the subtopics.
Technologies for monitoring. The term monitoring conjures up visions of people being
under surveillance by closed circuit TV cameras, possibly without their knowledge, but in
fact a range of technologies has been developed that track older people’s movements and
vital functions in ways that are transparent to the users. Some are designed to enable old
er people to control their home environment with smart home technologies (Abascal, de
Castro, LaFuente & Cia, 2008). Such technologies can be configured to individuals’
needs: for example, where mobility is an issue, they can enable remote opening and clos
ing of windows, curtains and doors, or remote checking of who is at the front door. Simi
larly, environmental sensor-activated systems (Lexis et al., 2013) can be set up to switch
on lights as an older person comes into a room, to keep rooms at appropriate tempera
tures, to check on appliances to ensure they are not left on, etc. Other monitoring tech
nologies include a range of wearables such as watches, belts, or pendants (Ahanathapil
lai, Amor & James, 2015; Holliday, Ward, Fielden et al., 2015; Nijhof et al., 2012), and
even shoe insoles (Oberzaucher et al., 2010). The purpose of these is to monitor vital
signs (e.g., heart beat or pulse), to send alerts (e.g., time to take medication, call for help
in an emergency), or to monitor gait to prevent falls (as noted earlier, a common and seri
ous occurrence amongst older people). Recently robotic devices (e.g., Mehdi & Berns,
2014) have been developed to search autonomously for an older person, to check their
status, rather than have them under constant human supervision. Although most of the
technologies are for indoor use, in private homes (e.g., Abascal et al., 2008; Casas, Marin,
Page 16 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Robinet et al., 2008; Lozano, Hernáez, Picón et al., 2010; Orpwood, Gibbs, Adlam et al.,
2005), or in assisted care settings (e.g., Lexis et al., 2013; Martin, Nugent, Wallace et al.,
2007; Schikhof et al., 2010), some have been (p. 150) developed for outdoor use, to allow
people to move outside but still be protected from getting lost when wandering (Boulos,
Anastasiou, Bekiaris et al., 2011; Wan, Müller, Wulf et al., 2014).
Quality of life. Beyond concerns with physical safety and security, research in the moni
toring topic investigated general quality of life. For instance, Schikhof et al. (2010) found
that care staff in an assisted living facility expressed a concern about their charges, who
were older people with dementia, having panic attacks while alone in their rooms. One of
the technological solutions proposed and tested as a result was a system to detect if older
people with dementia in the facility were having a panic attack: if an attack were detect
ed, the system would help the care staff to quickly intervene to comfort and reassure
them.
Ethical concerns. Ethics was an important recurring subtopic. Some papers addressed
this only in passing, as it was not the main thrust of the work being reported. Neverthe
less, it was an important dimension of the type of work being undertaken. For example,
there is a fine divide between tracking, monitoring, and surveillance (Holzinger, Searle,
Kleingerger et al., 2008). Other papers treated this theme more fully: for instance, inves
tigating the notion of trust (Ahanathapillai et al., 2015), and the ambivalence of feelings
regarding freedom versus monitoring (Boström, Kjellström, & Björklund, 2013), while
Casas, Marco, and Falcó et al. (2006) developed the basis for an ethics framework associ
ated with digital technologies for older people.
Page 17 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Our review of recent research on the use of digital technologies for older people shows
that this is a vibrant area of research, with much activity on many different topics and
over 400 papers identified. The four topics chosen for detailed discussion in this chapter
demonstrate a range of themes and subtopics within them that together give a
(p. 151)
In the first topic, older people’s interaction with digital technologies, in addition to the
obvious subtopics corresponding to the interaction types based on current technologies
such as natural dialogue and touch, there are also intriguing insights, such as the lack of
concern for speed and greater ease with face-based than picture-based authentication
systems. The second topic, older people’s lived experience of digital technologies, illus
trated the wide range of technologies, both established and emergent, being investigated,
from technologies deployed in smart homes, to those employed in health and well-being.
In terms of particular subtopics of interest within this topic, researchers investigated
people’s acceptance of technologies, developing a deeper understanding their value sys
tems and beliefs. This included their dislike of technologies that declared too obviously
that they needed assistance.
The third topic, older people’s use of digital technology for communication and social in
teraction, moved to a specific application area, although involving many types of digital
technologies. Social networking sites (SNSs) featured prominently, and age differences in
their use were particularly interesting, showing that older people have smaller networks
of friends, and were mostly passive users of such systems, feeling that to broadcast infor
mation about oneself publicly is not socially acceptable. Often researchers investigated
ways to facilitate digital interaction for older people, for example in terms of interface de
sign. But researchers also investigated older people’s motivations for using these tech
nologies, for instance, for keeping in touch with their families, particularly grandchildren.
They sought to understand better what older people’s communication habits are, and also
obstacles to communication. They found that reminiscing, a well-known technique to en
courage social communication, could be encouraged with some technologies, and that
loneliness could be reduced. Finally, the fourth topic, monitoring older people’s welfare,
was chosen as an example of an area in which emerging technologies are being deployed
in the care of older people. Besides the range of ways to monitor, subtopics that emerged
from this topic were quality of life and ethical concerns, but also a call for clarity about
acknowledging who are the beneficiaries of such systems.
Page 18 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Although the papers discussed in detail in this chapter covered four different topics,
there were a number of themes that recurred across the topics. Here, we highlight two of
these themes, control and familiarity.
The issue of who is in control of digital technologies came up in many ways throughout
the review. For instance, in the longitudinal study by Leitner et al. (2012) in which older
people kept equipment for 36 months, they were able to pick and choose what they want
ed installed, gradually gaining confidence and knowing they could ask for components to
be removed. Also, Lexis et al. (2013) helped older people to understand the kind of data
that was being collected from sensors in their bathrooms. They had imagined it (p. 152)
might be photographs but were shown that it was just numbers. Orpwood et al. (2005)
found that a common problem for older people with dementia is flooding caused by bath
room or kitchen taps being left on. An engineering solution to this problem could use a
sensor so that the water supply turns off when the water reaches too high a level. Howev
er, this would take control away from the older person and could confuse them, as they
would find later that the taps no longer work. Instead, a system of reminder messages
triggered by the sensor was proposed. Scopelliti et al. (2005) found that older people
were more apprehensive than younger people at the prospect of a robot in the home, and
so would like to be in control of it. Accordingly, they expressed preferences for robots to
be small, slow moving, with limited autonomy, and with fixed well-defined tasks. The re
quirement that it is important that older people feel in control of their environment was
also highlighted in the research by Doyle et al. (2014) and Pigini et al. (2012). One of the
technologies deployed in people’s homes in the study by Doyle et al. (2014) for a balance
and exercise system was meant to use a chair, but this was cumbersome and took up too
much space. The kitchen sink was then proposed by the participants themselves as a sta
ble place to hold onto while doing exercises, even if this meant the camera and screen
had to be positioned in the kitchen. Thus, the older people reconfigured the positioning of
the new technology themselves. Pirgini et al. (2012) found that older people voiced fears
that a robot might be uncontrollable and clumsy, and damage or break things. The older
people voiced strong psychological attachments to their homes, furniture, and ornaments,
and said they would prefer no technology rather than technology they could not control
and thus that might harm those possessions.
The second theme, familiarity, in the context of this review refers to building upon older
people’s existing knowledge and learning strategies (Ballegaard, Pedersen, & Bardram,
2006; Lehtinen et al., 2009). There was much support for the idea that at different stages
in their lives people use different strategies when learning to use technology: trial and er
ror is favored by young people, the reading of instructions and manuals by older people;
and as well, older people often prefer to ask experts for help (Larsson et al., 2013; Leitner
et al., 2012). This was found in numerous settings and technologies, from older people’s
behavior in computer classes to their learning to use home monitoring systems. Following
the principle of familiarity also means that the cognitive load to learn new routines will
lessen the negative impact the perceived utility of the technology (Heerink et al., 2009;
Page 19 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Sayago and Blat, 2010). Familiarity also referred to the technology fitting in with people’s
routines or their physical environments. For example, the importance of building on ob
jects and systems that people are already familiar with was discussed by Doyle et al.
(2014) and Holzinger, Schaupp, and Eder-Halbedl (2008). That of fitting new technologies
appropriately into older people’s lived routines was discussed by Dickinson and Gregor
(2006) and Orpwood et al. (2005).
It is important to note some of the limitations of the studies, as well as areas that could
benefit from further research. In all the disciplines with research on older people, typical
ly, (p. 153) chronological age is used as the measure of old age. But this is not a reliable
guide, since there is a great deal of heterogeneity between older people, and even if a
more specific set of groupings is sometimes used, for example “young-old”, “old-old”, and
“oldest-old” (Petrie, 2001), people vary in experience and abilities. Particularly at present,
in terms of digital literacy, someone aged 60 may have used computers in the workplace,
while someone aged 80 may not. The questionnaire developed by Arning and Ziefle
(2008) to assess computer experience and expertise was an interesting attempt to ad
dress this problem. Also, physical and mental health varies considerably across older peo
ple of different ages, and even with the same age.
A further aspect that could offer more nuanced understandings of older people’s use of
digital technologies is to address contextual and cultural differences in research. It was
clear that many of the studies investigated technological practices embedded in a particu
lar societal and organizational setting, such as residential assisted care homes in Holland
(Nijhof et al., 2014), occupational therapy in Sweden (Molin, Pettersson, & Jonsson et al.,
2007), and computer classes for older people in Spain (Sayago & Blat, 2008). There were
also instances in the research when it was clear that cultural practices had an important
effect on the outcomes of studies. The higher amount of religious content watched on
television in Brazil compared to Spain meant the proposed interactive television service
that was based around religious content was of more interest to older people in Brazil but
did not work so well in Spain (Ferreira et al., 2014). Older people in the UK and in Cyprus
revealed the effect of different cultures in their attitudes to and use of online social sup
port communities (Michailidou et al., 2015). The different levels of Internet penetration in
different countries was also important. Older people in Denmark mentioned that airline
tickets could only be booked online and many government services were online (Ferreira
et al., 2014), and Internet-based healthcare services were available for older people in
Sweden (Larsson et al., 2013), but such services are not yet available in other countries.
Other culture-based attitudes were noted by Pigini et al. (2012). Although older people in
Germany, Italy, and Spain attached a similar level of importance to food preparation, so
that the suggestion to have a robot help prepare meals by heating food in a microwave
was considered a useless function, participants from Germany and Italy objected more to
the proposed robot cooking functions than did their Spanish counterparts. Such results
Page 20 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
highlight the challenges of cultural influences on digital technology use and attitudes
amongst older people.
It is also important that researchers disseminate their results back to the appropriate di
verse disciplines. Awareness of issues and updates are important within disciplines, and
across disciplines, as seen by papers that dealt with lack of awareness about telecare and
fall alert systems (Bentley et al., 2014), or were about health and social care professionals
who need help to bridge gaps in organizational knowledge about what technology is avail
able and how to determine what is suitable for their older people (Molin et al., 2007).
We have attempted to illustrate the range of research on digital technologies for older
people. Research in this area is particularly challenging as it needs to draw on work from
many disciplines as different as gerontology and engineering. It is also vital to work very
closely with the relevant users, older people themselves but also other stakeholders such
(p. 154) as family members, carers, and professionals, to ensure that digital technologies
are useful to, and are acceptable, understandable, and usable by, older people and their
caregivers.
Conclusion
This review has shown that research on digital technologies for older people, both the use
of mainstream technologies and the use of specially developed technologies, is a very di
verse area of endeavor, with many lines of research on a wide range of themes. Research
ranges from studies that are developing new methods to help older people physically in
teract with digital technologies to those exploring the meanings of digital technologies for
older people. As with all research, the more we explore these topics, the more questions
we raise.
Acknowledgments
The research for this chapter has been partly funded by the European Union under the
Marie Skłodowska-Curie Action Experienced Researcher Fellowship Program, as part of
the Education and Engagement for inclusive Design and Development of Digital Systems
and Services Project (E2D3S2, Grant No. 706396). We would like to thank Bláithín Gal
lagher and Leonardo Sandoval for their help in gathering material for this chapter.
References
Abascal, J., de Castro, I. F., Lafuente, A., & Cia, J. M. (2008). Adaptive interfaces for sup
portive ambient intelligence environments. In Proceedings of 11th international confer
ence on computers helping people with special needs (ICCHP ‘08) (pp. 30–37).
Ahanathapillai, V., Amor, J. D., & James, C. J. (2015). Assistive technology to monitor activ
ity, health and wellbeing in old age: The wrist wearable unit in the USEFIL project. Tech
nology and Disability, 27(1–2), 17–29.
Page 21 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Apted, T., Kay, J., & Quigley, A. (2006). Tabletop sharing of digital photographs for the el
derly. In Proceedings of the SIGCHI conference on human factors in computing systems
(CHI 2006) (pp. 781–790).
Arjan, R., Pfeil, U., & Zaphiris, P. (2008). Age differences in online social networking. In
Extended abstracts on human factors in computing systems (CHI EA ‘08) (pp. 2739–
2744).
Arning, K., & Ziefle, M. (2008). Development and validation of a computer expertise ques
tionnaire for older adults. Behaviour and Information Technology, 27(1), 89–93.
Australian Research Council. (2012). Excellence in research for Australia (ERA): ERA out
comes 2012. Available at: http://www.arc.gov.au/era-outcomes-2012
Ballegaard, S. A., Pedersen, J. B., & Bardram, J. E. (2006). Where to, Roberta? Reflecting
on the role of technology in assisted living. In Proceedings of the 4th Nordic conference
on human-computer interaction (NordiCHI ‘06) (pp. 373–376).
Bentley, C. L., Powell, L. A, Orrell, A., & Mountain, G. A. (2014). Addressing design and
suitability barriers to telecare use: Has anything changed? Technology and Disability, 26,
221–235.
(p. 155) Boström, M., Kjellström, S., & Björklund, A. (2013). Older persons have ambiva
lent feelings about the use of monitoring technologies. Technology and Disability, 25(2),
117–125.
Boulos, M. N. K., Anastasiou, A., Bekiaris, E., & Panou, M. (2011). Geo-enabled technolo
gies for independent living: Examples from four European projects. Technology and Dis
ability, 23(1), 7–17.
Brajnik, G., & Giachin, C. (2014). Using sketches and storyboards to assess impact of age
difference in user experience. International Journal of Human-Computer Studies, 72, 552–
566.
Briggs, P., & Thomas, L. (2015). An inclusive, value sensitive design perspective on future
identity technologies. ACM Transactions on Computer-Human Interaction, 22(5), art 23.
Carey-Smith, B., Evans, N. M., & Orpwood, R. (2013). A user-centred design process to
develop technology to improve sleep quality in residential care homes. Technology and
Disability, 25(1), 49–58.
Carrasco, E., Epelde, G., Moreno, A., Ortiz, A., Garcia, I., Buiza, C. et al. (2008). Natural
interaction between avatars and persons with Alzheimer’s disease. In Proceedings of 11th
international conference on computers helping people with special needs (ICCHP ‘08)
(pp. 38–45).
Page 22 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Casas, R., Marco, Á., Falcó, J. L., Artigas, J. I., & Abascal, J. (2006). Ethically aware design
of a location system for people with dementia. In Proceedings of 10th computers helping
people with special needs (ICCHP ‘06) (pp. 777–784).
Casas, R., Marín, R. B., Robinet, A., Delgado, A. R., Yarza, A. R., McGinn, J. et al. (2008).
User modelling in ambient intelligence for elderly and disabled people. In Proceedings of
11th international conference on computers helping people with special needs (ICCHP
‘08) (pp. 114–122).
Coelho, J., Rito, F., Luz, N., & Duarte, C. (2015). Prototyping TV and tablet Facebook inter
faces for older adults. In J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque, & M.
Winckler (Eds.), Proceedings of human-computer interaction (INTERACT 2015). Lecture
Notes in Computer Science, 9296 (pp. 110–128).
Cohen, S., Underwood, L. G., & Gottlieb, B. H. (2000). Social support measurement and
intervention: A guide for health and social scientists. Oxford, UK: Oxford University
Press.
Conci, M., Pianesi, F., & Zancanaro, M. (2009). Useful, social and enjoyable: Mobile
phone adoption by older people. In T. Gross et al. (Eds.), Proceedings of human-computer
interaction (INTERACT 2009). Lecture Notes in Computer Science, 5726, (pp. 63–76).
Diaz-Orueta, U., Etxaniz, A., Gonzalez, M. F., Buiza, C., Urdaneta, E., & Yanguas, J. (2014).
Role of cognitive and functional performance in the interactions between elderly people
with cognitive decline and an avatar on TV. Universal Access to the Information Society,
13, 89–97.
Dickinson, A., & Gregor, P. (2006). Computer use has no demonstrated impact on the well-
being of older adults. International Journal of Human-Computer Studies, 64(8), 744–753.
Dowds, G., & Masthoff, J. (2015). A virtual “window to the outside world”: Initial design
and plans for evaluation. In Proceedings of the 2015 British HCI conference (British HCI
‘15) (pp. 265–266).
Doyle, J., Bailey, C., Scanaill, C. Ni, & Berg, F. (2014). Lessons learned in deploying inde
pendent living technologies to older adults’ homes. Universal Access in the Information.
Society, 13(2), 191–204.
Doyle, J., Skrba, Z., McDonnell, R., & Arent, B. (2010). Designing a touch screen commu
nication device to support social interaction amongst older adults. In Proceedings of the
24th BCS interaction specialist group conference (BCS HCI ‘10) (pp. 177–185).
Ferreira, S. M., Sayago, S., & Blat, J. (2014). Towards iTV services for older people: Ex
ploring their interactions with online video portals in different cultural backgrounds.
Technology and Disability, 26(4), 199–209.
Page 23 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Fuchsberger, V., Sellner, W., Moser, C., & Tscheligi, M. (2012). Benefits and hur
(p. 156)
dles for older adults in intergenerational online interactions. In: Proceedings of 13th in
ternational conference on computers helping people with special needs (ICCHP 2012)
(pp. 697–704).
Gamliel, T., & Gabay, N. (2014). Knowledge exchange, social interactions, and empower
ment in an intergenerational technology program at school. Educational Gerontology,
40(8), 597–617.
Gibson, L., Moncur, W., Forbes, P., Arnott, J., Martin, C., & Bhachu, A. S. (2010). Design
ing social networking sites for older adults. In Proceedings of the 24th BCS interaction
specialist group conference (BCS HCI ‘10) (pp. 186–194).
Harley, D., Howland, K., Harris, E., & Redlich, C. (2014). Online communities for older
users: What can we learn from local community interactions to create social sites that
work for older people. In Proceedings of the 28th international BCS human computer in
teraction conference on HCI 2014 (BCS-HCI ‘14) (pp. 42–51).
Heerink, M., Kröse, B., Wielinga, B., & Evers, V. (2009). Measuring the influence of social
abilities on acceptance of an interface robot and a screen agent by elderly users. In Pro
ceedings of the 23rd British HCI group annual conference on people and computers: cele
brating people and technology (pp. 430–439).
Holliday, N., Ward, G., Fielden, S., & Williams, S. (2015). Exploration of information needs
and development of resources to inform and support those at risk of falling. Technology
and Disability, 27(1–2), 31–40.
Holzinger, A., Searle, G., Kleingerger, T., Seffah, A., & Javahery, H. (2008). Investigating
usability metrics for the design and development of applications for the elderly. In Pro
ceedings of 11th international conference on computers helping people with special
needs (ICCHP 2008) (pp. 98–105).
Hwang, F., Hollinworth, N., & Williams, N. (2013). Effects of target expansion on selec
tion performance in older computer users. ACM Transactions on Accessible Computing,
5(1), 1.
Jochems, N., Vetter, S., & Schlick, C. (2013). A comparative study of information input de
vices for aging computer users. Behaviour and Information Technology, 32(9), 902–919.
Jönsson, B., & Svensk, A. (1995). Isaac—a personal digital assistant for the differently
abled. In I. Placencia-Porrero, & R. Puig de la Bellacasa (Eds.), The European context for
Page 24 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
assistive technology (Proceedings of the 2nd TIDE Congress) (pp. 356–361). Amsterdam:
IOS Press.
Kalman, Y. M., Geraghty, K., Thompson, C. K., & Gergle, D. (2012). Detecting linguistic
HCI markers in an online aphasia support group. In Proceedings of the 14th International
ACM SIGACCESS conference on computers and accessibility (ASSETS ‘12) (pp. 65–70).
Kepski, M., & Kwolek, B. (2012). Fall detection on embedded platform using Kinect and
wireless accelerometer. In Proceedings of 13th international conference on computers
helping people with special Needs (ICCHP ‘12) (pp. 407–414).
Kurniawan, S. (2008). Older people and mobile phones: A multi-method investigation. In
ternational Journal of Human-Computer Studies, 66(12), 889–901.
Larsson, E., Larsson-Lund, M., & Nilsson, I. (2013). Internet Based Activities (IBAs): Se
niors’ experiences of the conditions required for the performance of and the influence of
these conditions on their own participation in society. Educational Gerontology, 93(3),
155–167.
Lehtinen, V., Näsänen, J., & Sarvas, R. (2009). “A little silly and empty-headed”: Older
adults’ understandings of social networking sites. In Proceedings of British HCI 2009 (pp.
45–54).
Leitner, G., Fercher, A. J., Felfernig, A., & Hitz, M. (2012). Reducing the entry
(p. 157)
threshold of AAL systems: Preliminary results from Casa Vecchia. In Proceedings of 13th
international conference on computers helping people with special needs (ICCHP 2012
(pp. 709–715).
Lepicard, G., & Vigouroux, N. (2010). Touch screen user interfaces for older subjects: Ef
fect of the targets number and the two hands use. In Proceedings of 12th international
conference on computers helping people with special needs (ICCHP ‘10) (pp. 592–599).
Lepicard, G., & Vigouroux, N. (2012). Comparison between single-touch and multi-touch
interaction for older people. In Proceedings of 13th international conference on comput
ers helping people with special needs (ICCHP ‘12) (pp. 658–665).
Lexis, M., Everink, I., van der Heide, L., Spreeuwenberg, M., Willems, C., & de Witte, L.
(2013). Activity monitoring technology to support homecare delivery to frail and psy
chogeriatric elderly persons living at home alone. Technology and Disability, 25(3), 189–
197.
Lindley, S. E., Harper, R., & Sellen, A. (2008). Designing for elders: Exploring the com
plexity of relationships in later life. In Proceedings of BCS HCI 2008 (pp. 77–86).
Lindley, S. E., Harper, R., & Sellen, A. (2009). Desiring to be in touch in a changing com
munications landscape: Attitudes of older adults. In Proceedings of the SIGCHI confer
ence on human factors in computing systems (CHI ‘09) (pp. 1693–1702).
Page 25 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Lozano, H. Hernáez, I., Picón, A., Camarena, J., & Navas, E. (2010). Audio classification
techniques in home environments for elderly/dependant people. In Proceedings of 12th
international conference on computers helping people with special needs (ICCHP ‘10)
(pp. 320–323).
Mahmud, A. A., Limpens, Y., & Martens, J.-B. (2013). Expressing through digital pho
tographs: an assistive tool for persons with aphasia. Universal Access in the Information
Society, 12(3), 309–326.
Martin, S., Nugent, C., Wallace, J., Kernohan, G., McCreight, B., & Mulvenna, M. (2007).
Using context awareness within the “Smart home” environment to support social care for
adults with dementia. Technology and Disability, 19(2,3), 143–152.
Michailidou, E., Parmaxi, A., & Zaphiris, P. (2015). Culture effects in online social support
for older people: perceptions and experience. Universal Access in the Information
Society, 14(2), 281–293.
Molin, G., Pettersson, C., Jonsson, O., & Keijer, U. (2007). Living at home with acquired
cognitive impairment—Can assistive technology help? Technology and Disability, 19(2, 3),
91–101.
Mubin, O., Shahid, S., & Mahmud, A. A. (2008). Walk 2 Win: Towards designing a mobile
game for elderly’s social engagement. In Proceedings of the 22nd British HCI conference
(BCS-HCI ‘08) (pp. 11–14).
Muskens, L., van Lent, R., Vijfvinkel, A., van Cann, P., & Shahid, S. (2014). Never too old
to use a tablet: Designing tablet applications for the cognitively and physically impaired
elderly. In Proceedings of 14th international conference on computers helping people
with special needs (ICCHP ‘14) (pp. 391–398).
Nicholson, J., Coventry, L., & Briggs, P. (2013a). Faces and pictures: Understanding age
differences in two types of graphical authentications. International Journal of Human-
Computer Studies, 71(10), 958–966.
Nicholson, J., Coventry, L., & Briggs, P. (2013b). Age-related performance issues for PIN
and face-based authentication systems. In Proceedings of the SIGCHI conference on hu
man factors in computing systems (CHI ‘13) (pp. 323–332).
Proceedings of the 14th international ACM SIGACCESS conference on computers and ac
cessibility (ASSETS ‘12) (pp. 127–134).
Nijhof, N., van Gemert-Pijnen, J. E. W. C., de Jong, G. E. N., Ankoné, J. W., & Seydel, E. R.
(2012). How assistive technology can support dementia care: A study about the effects of
Page 26 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
the IST Vivago watch on patients’ sleeping behavior and the care delivery process in a
nursing home. Technology and Disability, 24(2), 103–115.
Nijhof, N., van Hoof, J., van Rijn, H., & van Gemert-Pijnen, J. E. W. C. (2014). The behav
ioral outcomes of a technology-supported leisure activity in people with dementia. Tech
nology and Disability, 25(4), 263–273.
Norval, C., Arnott, J. L., & Hanson, V. L. (2014). What’s on your mind? Investigating rec
ommendations for inclusive social networking and older adults. In Proceedings of the
SIGCHI conference on human factors in computing systems (CHI ‘14) (pp. 3923–3932).
Nunes, F., Kerwin, M., & Silva, P. A. (2012). Design recommendations for TV user inter
faces for older adults: Findings from the eCAALYX project. In Proceedings of the 14th in
ternational ACM SIGACCESS conference on computers and accessibility (ASSETS ‘12)
(pp. 41–48).
Oberzaucher, J., Jagos, H., Zödl, C., Hlauschek, W., & Zagler, W. (2010). Using a wearable
insole gait analyzing system for automated mobility assessment for older people. In Pro
ceedings of the 12th international conference on computers helping people with special
Needs (ICCHP’10) (pp. 600–603).
Orpwood, R., Gibbs, C., Adlam, T., Faulkner, R., & Meegahawatte, D. (2005). The design of
smart homes for people with dementia—user-interface aspects. Universal Access in the
Information Society, 4(2), 156–164.
Otjacques, B., Krier, M., Feltz, F., Ferring, D., & Hoffmann, M. (2009). Helping older peo
ple to manage their social activities at the retirement home. In Proceedings of the 23rd
British HCI group annual conference on people and computers (BCS-HCI ‘09) (pp. 375–
380).
Petrie, H. (2001). Accessibility and usability requirements for ICTs for disabled and elder
ly people: A functional classification approach. In J. G. Abascal & C. Nicolle (Eds.), Inclu
sive guidelines for human computer interaction (pp. 47–78). London: Taylor and Francis.
0-748,409-48-3.
Petrie, H., Gallagher, B., & Darzentas, J. (2014). A critical review of eight years of re
search on technologies for disabled and older people. In Proceedings of 14th internation
al conference on computers helping people with special needs (ICCHP ‘14) (pp. 260–266).
Petrie, H., Johnson, V., Strothotte, T., Michel, R., Raab, A., Reichert, L., & Schalt, A.
(1997). User-centred design in the development of a navigational aid for blind travellers.
In Proceedings of human-computer interaction: INTERACT ‘97 (IFP TC13 international
conference on human-computer interaction) (pp. 220–227). London: Chapman and Hall.
ISBN 0 412 80,950 8.
Page 27 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Pigini, L., Facal, D., Blasi, L., & Andrich, R. (2012). Service robots in elderly care at home:
Users’ needs and perceptions as a basis for concept development. Technology and Dis
ability, 24(4), 303–312.
Prieto, G., & Leahy, D. (2012). Online social networks and older people. In Proceedings of
the 13th international conference on computers helping people with special needs (IC
CHP’12) (pp. 666–672).
Renaud, K., & Ramsay, J. (2007). Now what was that password again? A more flexible way
of identifying and authenticating our seniors. Behaviour and Information Technology,
26(4), 309–322.
Sáenz-de-Urturi, Z., Zapirain, B. G., & Zorrilla, A. M. (2015). Elderly user experi
(p. 159)
Salovaara, A., Lehmuskallio, A., Hedman, L., Valkonen, P., & Näsänen, J. (2010). Informa
tion technologies and transitions in the lives of 55–65-year-olds: The case of colliding life
interests. International Journal of Human-Computing Studies, 68(11), 803–821.
Scopelliti, M., Giuliani, M. V., & Fornara, F. (2005). Robots in a domestic setting: A psy
chological approach. Universal Access to the Information Society, 4(2), 146–155.
Sayago, S., & Blat, J. (2008). Exploring the role of time and errors in real-life usability for
older people and ICT. In Proceedings of the 11th international conference on computers
helping people with special needs (ICCHP 2008) (pp. 46–53).
Sayago, S., & Blat, J. (2010). Telling the story of older people e-mailing: An ethnographi
cal study. International Journal of Human-Computer Studies, 68(1–2), 105–120.
Sayago, S., Forbes, P., & Blat, J. (2012). Older people’s social sharing practices in
YouTube through an ethnographical lens. In Proceedings of the 26th annual BCS interac
tion specialist group conference on people and computers (BCS-HCI ‘12) (pp. 185–194).
Schikhof, Y., Mulder, I., & Choenni, S. (2010). Who will watch (over) me? Humane moni
toring in dementia care. International Journal of Human-Computer Studies, 68(6), 410–
422.
Šimšík, D., Galajdová, A., Siman, D., Bujňák, J., Andrášová, M., & Novák, M. (2012). Mon
AMI platform in elderly household environment: Architecture, installation, implementa
tion, trials and results. In Proceedings of 13th international conference on computers
helping people with special needs (ICCHP 2012) (pp. 419–422).
Siriaraya, P., & Ang, C. S. (2014). Recreating living experiences from past memories
through virtual worlds for people with dementia. In Proceedings of the SIGCHI confer
ence on human factors in computing systems (CHI ‘14) (pp. 3977–3986).
Page 28 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Sokoler, T., & Svensson, M. S. (2007). Embracing ambiguity in the design of non-stigma
tizing digital technology for social interaction among senior citizens. Behaviour and Infor
mation Technology, 26(4), 297–307.
Spreicer, W., Ehrenstrasser, L., & Tellioğlu, H. (2012). kommTUi: Designing communica
tion for elderly. In Proceedings of the 13th international conference on computers helping
people with special needs (ICCHP’12) (pp. 705–708).
Thomson Reuters. (2013). The Thomson Reuters impact factor. Available at: http://ip
science-help.thomsonreuters.com/inCites2Live/indicatorsGroup/aboutHandbook/
usingCitationIndicatorsWisely/jif.html
Tixier, M., & Lewkowicz, M. (2015). Looking for respite and support: Technological oppor
tunities for spousal caregivers. In Proceedings of the 33rd Annual ACM conference on hu
man factors in computing systems (CHI ‘15) (pp. 1155–1158).
Turner, P., Turner, S., & Van De Walle, G. (2007). How older people account for their expe
riences with interactive technology. Behaviour and Information Technology, 26(4), 287–
296.
United Nations (2017). World population prospects: Key findings and advance tables
(2017 revision). New York: United Nations.
Vacher, M., Caffiau, S., Portet, F., Meillon, B., Roux, C., Elias, E., Lecouteux, B., &
Chahuara, P. (2015). Evaluation of a context-aware voice interface for ambient assisted
living: Qualitative user study vs quantitative system evaluation. ACM Transactions on Ac
cessible Computing, 7(2), art. 5.
van der Heide, L. A., Willems, C. G., Spreeuwenberg, M. D., De Witte, L. P., & Rietman, J.
(2012). Implementation of CareTV in care for the elderly: The effects on feelings of loneli
ness and safety and future challenges. Technology and Disability, 24(4), 283–291.
van Schaik, P., Petrie, H., & Kirby, V. (1995). Task performance and technology ac
(p. 160)
Vutborg, R., Kjeldskov, J., Vetere, F., & Pedell, S. (2010). Family storytelling for grandpar
ents and grandchildren living apart. In Proceedings of NordiCHI 2010 (pp. 531–540).
Wan, L., Müller, C., Wulf, V., & Randall, D. W. (2014). Addressing the subtleties in demen
tia care: Pre-study and evaluation of a GPS monitoring system. In Proceedings of the
SIGCHI conference on human factors in computing systems (CHI ‘14) (pp. 3987–3996).
Warnock, D., McGee-Lennon, M., & Brewster, S. (2013). Multiple notification modalities
and older users. In Proceedings of the SIGCHI conference on human factors in computing
systems (CHI ‘13) (pp. 1091–1094).
Page 29 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Wolters, M. K., Kilgour, J., MacPherson, S. E., Dzikovska, M., & Moore, J. D. (2015). The
CADENCE corpus: A new resource for inclusive voice interface design. In Proceedings of
the SIGCHI conference on human factors in computing systems (CHI 2015) (pp. 3963–
3966).
Wulf, L., Garschall, M., Klein, M., & Tscheligi, M. (2014). The influence of age and device
orientation on the performance of touch gestures. In Proceedings of the 14th internation
al conference on computers helping people with special needs (ICCHP’14) (pp. 583–590).
Abascal, J., de Castro, I. F., Lafuente, A., & Cia, J. M. (2008). Adaptive interfaces for sup
portive ambient intelligence environments. In Proceedings of 11th international confer
ence on computers helping people with special needs (ICCHP ‘08) (pp. 30–37).
Adam, S., Mukasa, K. S., Breiner, K., & Trapp, M. (2008). An apartment-based metaphor
for intuitive interaction with ambient assisted living applications. In Proceedings of the
22nd British HCI group annual conference (BCS-HCI ‘08) (pp. 67–75).
Ahanathapillai, V., Amor, J. D., & James, C. J. (2015). Assistive technology to monitor activ
ity, health and well being in old age: The wrist wearable unit in the USEFIL project. Tech
nology and Disability, 27(1–2), 17–29.
Ahmad, D., Komninos, A., & Baillie, L. (2008). Future mobile health systems: Designing
personal mobile applications to assist self diagnosis. In Proceedings of the 22nd British
HCI group annual conference (BCS-HCI ‘08) (pp. 39–42).
Aksan, N., Dawson, J. D., Emerson, J. L., Yu, L., Uc, E. Y., Anderson, S. W., & Rizzo, M.
(2013). Naturalistic distraction and driving safety in older drivers. Human Factors, 55(4),
841–853.
Albinet, C., Tomporowski, P. D., & Beasman, K. (2006). Aging and concurrent task perfor
mance: Cognitive demand and motor control. Educational Gerontology, 32(9), 689–706.
Alelis, G., Bobrowicz, A., & Ang, C. S. (2015). Comparison of engagement and emotional
responses of older and younger adults interacting with 3D cultural heritage artefacts on
personal devices. Behaviour and Information Technology, 34(11), 1064–1078.
Al Mahmud, A., Limpens, Y., & Martens, J. B. (2013). Expressing through digital pho
tographs: An assistive tool for persons with aphasia. Universal Access in the Information
Society, 12(3), 309–326.
Al Mahmud, A., Mubin, O., Shahid, S., & Martens, J. B. (2008). Designing and evaluation
the tabletop game experience for senior citizens. In K. Tollmar, & B. Jönsson (Eds.), Pro
ceedings of the 5th Nordic conference on human-computer interaction (NordiCHI ‘08)
(pp. 403–406).
Page 30 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Almer, S., Kolbitsch, J., Oberzaucher, J., & Ebner, M. (2012). Assessment test
(p. 161)
framework for collecting and evaluating fall-related data using mobile devices. In Pro
ceedings of 13th international conference on computers helping people with special
needs (ICCHP ‘12) (pp. 83–90).
Arning, K., & Ziefle, M. (2008). Development and validation of a computer expertise ques
tionnaire for older adults. Behaviour and Information Technology, 27(4), 325–329.
Arning, K., & Ziefle, M. (2009). Effects of age, cognitive and personal factors on PDA
menu navigation performance. Behaviour and Information Technology, 28(3), 251–268.
Astell, A., Alm, N., Dye, R., Gowans, G., Vaughan, P., & Ellis, M. (2014). Digital video
games for older adults with cognitive impairment. In Proceedings of 14th international
conference on computers helping people with special needs (ICCHP ‘14) (pp. 264–271).
Augusto, J., Mulvenna, M., Zheng, H., Wang, H., Martin, S., McCullagh, P., & Wallace, J.
(2014). Night optimised care technology for users needing assisted lifestyles. Behaviour
and Information Technology, 33(12), 1261–1277.
Aula, A. (2005). User study on older adults’ use of the Web and search engines. Universal
Access in the Information Society, 4(1), 67–81.
Ayoade, M., Uzor, S., & Baillie, L. (2013). The development and evaluation of an interac
tive system for age related musculoskeletal rehabilitation in the home. In P. Kotzé, G.
Marsden, G. Lindgaard, J. Wesson, & M. Winckler (Eds.), Proceedings Human-computer
interaction, Part IV (INTERACT 2013). Lecture Notes in Computer Science 8117 (pp. 1–
18).
Baecker, R., Sellen, K., Crosskey, S., Boscart, V., & Neves, B. (2014). Technology to reduce
social isolation and loneliness. In Proceedings of the 15th international ACM SIGACCESS
conference on computers and accessibility (ASSETS ‘14) (pp. 27–34).
Bagalkot, N., Nassi, E., & Sokoler, T. (2010). Facilitating continuity: Exploring the role of
digital technology in physical rehabilitation. In E. Hvannberg, M. K. Lárusdóttir, A. Bland
ford, & J. Gulliksen (Eds.), Proceedings of the 6th Nordic conference on human-computer
interaction (NordiCHI ‘10) (pp. 42–51).
Baharin, H., Rintel, S., & Viller, S. (2013). Rhythms of the domestic soundscape: Eth
nomethodological soundwalks for phatic technology design. In P. Kotzé, G. Marsden, G.
Lindgaard, J. Wesson, & M. Winckler (Eds.), Proceedings Human-computer interaction
Part IV (INTERACT 2013). Lecture Notes in Computer Science 8117 (pp. 463–470).
Baharin, H., Viller, S., & Rintel, S. (2015). SonicAIR: Supporting independent living with
reciprocal ambient audio awareness. ACM Transactions on Computer-Human Interaction,
22(4), Art. 18.
Page 31 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Ballegaard, S. A., Bunde-Pedersen, J., & Bardram, J. E. (2006). Where to, Roberta? Re
flecting on the role of technology in assisted living. In A. Mørch, K. Morgan, T. Bratteteig,
G. Ghosh, & D. Svanaes (Eds.), Proceedings of the 4th Nordic conference on human-com
puter interaction (NordiCHI ‘06) (pp. 373–376).
Bauer, S. M., & Lane, J. P. (2006). Convergence of assistive devices and mainstream prod
ucts: Keys to university participation in research, development and commercialization.
Technology and Disability, 18(2), 67–77.
Beach, S., Schulz, R., Downs, J., Matthews, J., Barron, B., & Seelman, K. (2009). Disability,
age, and informational privacy attitudes in quality of life technology applications: Results
from a national web survey. ACM Transactions on Accessible Computing, 2(1), Art. 5.
Bechtold, U., & Sotoudeh, M. (2008). Participative approaches for “Technology and Au
tonomous Living”. In Proceedings of 11th international conference on computers helping
people with special needs (ICCHP ‘08) (pp. 78–81).
Beer, J. M., Smarr, C.-A., Fisk, A. D., & Rogers, W. A. (2015). Younger and older
(p. 162)
Bentley, C. L. (2014). Addressing design and suitability barriers to telecare use: Has any
thing changed? Technology and Disability, 26(4), 221–235.
Berkowsky, R. W., Cotton, S. R., Yost, E. A., & Winstead, V. P. (2013). Attitudes towards
and limitations to ICT use in assisted and independent living communities: Findings from
a specially-designed technological intervention. Educational Gerontology, 39(11), 797–
811.
Bertera, E. M. (2014). Storytelling slide shows to improve diabetes and high blood pres
sure knowledge and self-efficacy: Three-year results among community dwelling older
African Americans. Educational Gerontology, 40(11), 785–800.
Bertera, E. M., Bertera, R. L., Morgan, R., Wuertz, E., & Attey, A. M. O. (2007). Training
older adults to access health information. Educational Gerontology, 33(6), 483–500.
Bidwell, N. J., & Jay Siya, M. J. (2013). Situating asynchronous voice in rural Africa. In P.
Kotzé, G. Marsden, G. Lindgaard, J. Wesson, & M. Winckler (Eds.), Proceedings Human-
computer interaction, Part III (INTERACT 2013). Lecture Notes in Computer Science
8117 (pp. 36–53).
Page 32 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Bobillier Chaumon, M. E., Michel, C., Tarpin Bernard, F., & Croisile, B. (2014). Can ICT
improve the quality of life of elderly adults living in residential home care units? From ac
tual impacts to hidden artefacts. Behaviour and Information Technology, 33(6), 574–590.
Boechler, P. M., Foth, D., & Watchorn, R. (2007). Educational technology research with
older adults: Adjustments in protocol, materials, and procedures. Educational Gerontol
ogy, 33(3), 221–235.
Boström, M., Kjellström, S., & Björklund, A. (2013). Older persons have ambivalent feel
ings about the use of monitoring technologies. Technology and Disability, 25(2), 17–25.
Boulos, M. N. K., Anastasiou, A., Bekiaris, E., & Panou, M. (2011). Geo-enabled technolo
gies for independent living: Examples from four European projects. Technology and Dis
ability, 23(1), 7–17.
Boulton-Lewis, G. M., Buys, L., Lovie-Kitchin, J., Barnett, K., & David, N. L. (2007). Age
ing, learning, and computer technology in Australia. Educational Gerontology, 33(3), 253–
270.
Brajnik, G., & Giachin, C. (2014). Using sketches and storyboards to assess impact of age
difference in user experience. International Journal of Human-Computer Studies, 72(6),
552–566.
Brandtzaeg, P. B., Heim, J., & Karahasanović, A. (2011). Understanding the new digital di
vide: A typology of Internet users in Europe. International Journal of Human-Computer
Studies, 69(3), 123–138.
Briggs, P., & Thomas, L. (2015). An inclusive, value sensitive design perspective on future
identity technologies. ACM Transactions on Computer-Human Interaction, 22(5), Art. 23.
Brown, P. S., & Hanks, R. S. (2008). Implementing an online writing assessment strategy
for gerontology. Educational Gerontology, 34(5), 397–399.
Bruder, C., Blessing, L., & Wandke, H. (2014). Adaptive training interfaces for less-experi
enced, elderly users of electronic devices. Behaviour and Information Technology, 33(1),
4–15.
Cabreira, A. T., & Hwang, F. (2016). How do novice older users evaluate and perform mid-
air gesture interaction for the first time? In S. Björk, E. Eriksson, M. Fjeld, S. Bødker,
(p. 163) W. Barendregt, & M. Obaid (Eds.) Proceedings of the 9th Nordic conference on
Cahill, S., Begley, E., Faulkner, J. P., & Hagen, I. (2007). “It gives me a sense of indepen
dence”— Findings from Ireland on the use and usefulness of assistive technology for peo
ple with dementia. Technology and Disability, 19(2–3), 133–142.
Cahill, S., Macijauskiene, J., Nygård, A.-M., Faulkner, J.-P., & Hagen, I. (2007). Technology
in dementia care. Technology and Disability, 19(2–3), 55–60.
Page 33 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Caird, J. K., Chisholm, S. L., & Lockhart, J. (2007). Do in-vehicle advanced signs enhance
older and younger driver’s intersection performance? Driving simulation and eye move
ment results. International Journal of Human-Computer Studies, 66(3), 132–144.
Caird, J. K., Edwards, C. J., Creaser, J. I., & Horrey, W. J. (2005). Older driver failures of at
tention at intersections: Using change blindness methods to assess turn accuracy. Human
Factors, 47(2), 235–249.
Caprani, N., Doyle, J., Komaba, Y., & Inomata, A. (2015). Exploring healthcare profession
als’ preferences for visualising sensory data. In Proceedings of the 2015 British human
computer interaction conference (British HCI 2015) (pp. 26–34).
Carey-Smith, B. E., Evans, N. M., & Orpwood, R. D. (2013). A user-centred design process
to develop technology to improve sleep quality in residential care homes. Technology and
Disability, 25(1), 49–58.
Carmichael, A., Rice, M., MacMillan, F., & Kirk, A. (2010). Investigating a DTV-based
physical activity application to facilitate wellbeing in older adults. In Proceedings of the
24th BCS interaction specialist group conference (BCS HCI ‘10) (pp. 278–288).
Caroux, L., Consel, C., Dupuy, L., & Sauzeon, H. (2014). Verification of daily activities of
older adults: A simple, non-intrusive, low-cost approach. In Proceedings of the 16th inter
national ACM SIGACCESS conference on computers and accessibility (ASSETS ‘14) (pp.
43–50).
Carrasco, E., Epelde, G., Moreno, A., Ortiz, A., Garcia, I., Buiza, C., … Arruti, A. (2008).
Natural interaction between avatars and persons with Alzheimer’s disease. In Proceed
ings of 11th international conference on computers helping people with special needs (IC
CHP ‘08) (pp. 38–45).
Carrington, P., Kuber, R., Anthony, L., Hurst, A., & Prasad, S. (2012). Developing an inter
face to support procedural memory training using a participatory-based approach. In Pro
ceedings of the 26th annual BCS interaction specialist group conference on people and
computers (BCS-HCI ‘12) (pp. 333–338).
Casas, R. (2008). User modelling in ambient intelligence for elderly and disabled people.
In Proceedings of 11th international conference on computers helping people with special
needs (ICCHP ‘08) (pp. 114–122).
Casas, R., Marco, A. Falco, J. Artigas, J., & Abascal, J. (2006). Ethically aware design of a
location system for people with dementia. In Proceedings of 10th international confer
ence on computers helping people with special needs (ICCHP ‘06) (pp. 777–784).
Castilla, D., Garcia-Palacios, A., Breton-Lopez, J., Miralles, I., Banos, R. M., Etchemendy,
E.,… Botella, C. (2013). Process of design and usability evaluation of a telepsychology
web and virtual reality system for the elderly: Butler. International Journal of Human-
Computer Studies, 71(3), 350–362.
Page 34 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Cesta, A., Cortellessa, G., Giuliani, V., Pecora, F., Rasconi, R., Scopellitti, M., & Tiberio, L.
(2007). Proactive assistive technology: An empirical study. In C. Baranauskas, P.
Palanque, J. Abascal, & S. D. J. Barbosa. (Eds.), Proceedings Human-computer interaction
(INTERACT 2007). Lecture Notes in Computer Science, 4662, (pp. 255–268).
Chaffin, A. J., & Harlow, S. D. (2005). Cognitive learning applied to older adult
(p. 164)
Chen, J.-M., Chen, Y.-C., & Chen, Y.-C. (2012). The K-shape learning project for senior citi
zens. Educational Gerontology, 38(12), 841–853.
Chen, S.-Y. (2008). Reading practices and profiles of older adults in Taiwan. Educational
Gerontology, 34(5), 427–441.
Chou, W. H., Lai, Y.-T., & Liu, K.-H. (2013). User requirements of social media for the el
derly: A case study in Taiwan. Behaviour and Information Technology, 32(9), 920–937.
Chu, C., Rebola, C. B., & Kao, J. (2015). BUMP: Bridging unmet modes of participation. In
Proceedings of the 2015 British human computer interaction conference (British HCI
2015) (pp. 261–262).
Chung, J., Chaudhuri, S., Le, T., Chi, N.-C., Thompson, H. J., & Demiris, G. (2015). The use
of think-aloud to evaluate a navigation structure for a multimedia health and wellness ap
plication for older adults and their caregivers. Educational Gerontology, 41(12), 916–929.
Coelho, J., & Duarte, C. (2015). Socially networked or isolated? Differentiating older
adults and the role of tablets and television. In J. Abascal, S. Barbosa, M. Fetter, T. Gross,
P. Palanque, & M. Winckler (Eds.), Proceedings Human-computer interaction, Part I (IN
TERACT 2015). Lecture Notes in Computer Science, 9296, (pp. 129–146).
Coelho, J., Rito, F., Luz, N., & Duarte, C. (2015). Prototyping TV and tablet Facebook inter
faces for older adults. In J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque, & M.
Winckler (Eds.), Proceedings Human-computer interaction, Part 1 (INTERACT 2015). Lec
ture Notes in Computer Science, 9296 (pp. 110–128).
Conci, M., Pianesi, F., & Zancanaro, M. (2009). Useful, social and enjoyable: Mobile
phone adoption by older people. In T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P.
Planaque, R. Oliveira Prates & M. Winckler (Eds.), Proceedings Human-computer interac
tion (INTERACT 2009). Lecture Notes in Computer Science 5726 (pp. 63–76).
Convertino, G., Farooq, U., Rosson, M. B., Carroll, J. M., & Meyer, B. J. F. (2007). Support
ing intergenerational groups in computer supported cooperative work (CSCW). Behaviour
and Information Technology, 26(4), 275–285.
Page 35 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Cornejo, R., Tentori, M., & Favela, J. (2013). Enriching in-person encounters through so
cial media: A study on family connectedness for the elderly. International Journal of Hu
man-Computer Studies, 71(9), 889–899.
Cresci, M. K., Jarosz, P. A., & Templin, T. A. (2012). Are health answers online for older
adults? Educational Gerontology, 38(1), 10–19.
Cresci, M. K., Yarandi, H. N., & Morell, R. W. (2010). Pro-nets versus no-nets: Differences
in urban older adults’ predilections for Internet use. Educational Gerontology, 36(6), 500–
520.
Crete-Nishihata, M., Baecker, R. M., Massimi, M., Ptak, D., Campigotto, R., Kaufman, L.
D., … Black, S. E. (2012). Reconstructing the past: Personal memory technologies are not
just personal and not just for memory. Human-Computer Interaction, 27(1–2), 92–123.
Czaja, S. J., Schulz, R., Perdomo, D., & Nair, S. N. (2014). The feasibility and efficacy of
technology-based support groups among family caregivers of persons with dementia. In
Proceedings of 14th international conference on computers helping people with special
needs (ICCHP ‘14) (pp. 455–458).
(p. 165) Dahn, I., Ferdinand, P., & Lachmann, P. (2014). Supporting senior citizen using
tablet computers. In Proceedings of 14th international conference on computers helping
people with special needs (ICCHP ‘14) (pp. 323–330).
Dale, O. (2010). Usability and usefulness of GPS based localization technology used in de
mentia care. In Proceedings of 12th international conference on computers helping peo
ple with special needs (ICCHP ‘10) (pp. 300–307).
Darroch, I., Goodman, J., Brewster, S., & Gray, P. (2005). The effect of age and font size on
reading text on handheld computers. In M. F. Costabile & F. Paternò (Eds.), Proceedings
Human-computer interaction (INTERACT 2005), Lecture Notes in Computer Science
(LNCS), 3585, (pp. 253–266).
Davidse, R. J., Hagenzieker, M. P., van Wolffelaar, P. C., & Brouwer, W. H. (2009). Effects of
in-car support on mental workload and driving performance of older drivers. Human Fac
tors, 51(4), 463–476.
de Beer, R., Keijers, R., Shahid, S., Al Mahmud, A., & Mubin, O. (2010). PMD: Designing a
portable medicine dispenser for persons suffering from Alzheimer’s Disease. In Proceed
ings of 12th international conference on computers helping people with special needs (IC
CHP ‘10) (pp. 332–335).
Page 36 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
DeCoster, V. A., & George, L. (2005). An empowerment approach for elders living with di
abetes: A pilot study of a community-based self-help group—The Diabetes Club. Educa
tional Gerontology, 31(9), 699–733.
Diaz-Orueta, U., Etxaniz, A., Gonzalez, M. F. Buiza, C., Urdaneta, E., Yanguas, J., Carras
co, E., & Epelde, G. (2014). Role of cognitive and functional performance in the interac
tions between elderly people with cognitive decline and an avatar on TV. Universal Access
in the Information Society, 13(1), 89–97.
Dickinson, A., Arnott, J., & Prior, S. (2007). Methods for human–computer interaction re
search with older people. Behaviour and Information Technology, 26(4), 343–352.
Dickinson, A., Eisma, R., Gregor, P., Syme, A., & Mile, S. (2005). Strategies for teaching
older people to use the World Wide Web. Universal Access in the Information Society,
4(1), 3–15.
Dickinson, A., & Gregor, P. (2006). Computer use has no demonstrated impact on the well-
being of older adults. International Journal of Human-Computer Studies, 64(8), 744–753.
Dickinson, A., & Hill, R. L. (2007). Keeping in touch: Talking to older people about com
puters and communication. Educational Gerontology, 33(8), 613–630.
Dickinson, A., Smith, M., Arnott, J., Newell, A., & Hill, R. (2007). Approaches to web
search and navigation for older computer novices. In Proceedings of the SIGCHI confer
ence on human factors in computing systems (CHI 2006) (pp. 281–290).
Diño, M. J. S., & de Guzman, A. B. (2015). Using partial least squares (PLS) in predicting
behavioural intention for telehealth use among Filipino elderly. Educational Gerontology,
41(1), 53–68.
Dobosz, K., Dobosz, M., Fiolka, T., Wojaczek, M., & Depta, T. (2014). Tablets in the reha
bilitation of memory impairment. In Proceedings of 14th international conference on com
puters helping people with special needs (ICCHP ‘14) (pp. 399–402).
Dogruel, L., Joeckel, S., & Bowman, N. D. (2015). The user and acceptance of new media
entertainment technology by elderly users: Development of an expanded technology ac
ceptance model. Behaviour and Information Technology, 34(11), 1052–1063.
Donorflo, L. K. M., & Healy, C. (2008). Teaching an interactive television course on adult
hood and aging: Making it happen. Educational Gerontology, 34(6), 531–549.
Dorin, M. (2007). Online education of older adults and its relation to life satisfac
(p. 166)
Dowds, G., & Masthoff, J. (2015). A virtual “Window to the Outside World”: Initial design
and plans for evaluation. In Proceedings of the 2015 British human computer interaction
conference (British HCI 2015) (pp. 265–266).
Page 37 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Doyle, J., Bailey, C., Ni Scanaill, C., & van den Berg, F. (2014). Lessons learned in deploy
ing independent living technologies to older adults’ homes. Universal Access in the Infor
mation Society, 13(2), 191–204.
Doyle, J., O’Mullane, B., McGee, S., & Knapp, R. B. (2012). YourWellness: Designing an
application to support positive emotional wellbeing in older adults. In Proceedings of the
26th annual BCS interaction specialist group conference on people and computers (BCS-
HCI ‘12) (pp. 221–226).
Doyle, J., Sassu, A., & McDonagh, T. (2013). “We were all the same age once”: Experi
ences of intergenerational app. design. In Proceedings of the 27th international BCS hu
man computer interaction conference (BCS-HCI ‘13) (Art. 24).
Doyle, J., Skrba, Z., McDonnell, R., & Arent, B. (2010). Designing a touch screen commu
nication device to support social interaction amongst older adults. In Proceedings of the
24th BCS interaction specialist group conference (BCS HCI ‘10) (pp. 177–185).
Duff, P. & Dolphin, C. (2007). Cost-benefit analysis of assistive technology to support inde
pendence for people with dementia–Part 1: Development of a methodological approach to
the ENABLE cost-benefit analysis. Technology and Disability, 19(2–3), 73–78.
Duff, P. & Dolphin, C. (2007). Cost-benefit analysis of assistive technology to support inde
pendence for people with dementia–Part 2: Results from employing the ENABLE cost-ben
efit model in practice. Technology and Disability, 19(2–3), 79–90.
Eaton, J., & Salari, S. (2005). Environments for lifelong learning in senior centers. Educa
tional Gerontology, 31(6), 461–480.
Edlund, C., & Björklund, A. (2011). Family caregivers’ conceptions of usage of and infor
mation on products, technology and Web-based services. Technology and Disability, 23(4),
205–214.
Ejupi, A., Gschwind, Y. J., Valenzuela, T., Lord, S. R., & Delbaere, K. (2016). A Kinect and
inertial sensor-based system for the self-assessment of fall risk: A home-based study in
older people. Human-Computer Interaction, 31(3–4), 261–293.
Elias, S. M., Smith, W. L., & Barney, C. E. (2012). Age as a moderator of attitude towards
technology in the workplace: Work motivation and overall job satisfaction. Behaviour and
Information Technology, 31(5), 453–467.
Elton, E., & Nicolle, C. (2013). Designing inclusive products for everyday environments:
The effects of everyday cold temperatures on older adults’ dexterity. Universal Access in
the Information Society, 12(3), 247–261.
Ezer, N., Fisk, A. D., & Rogers, W. (2008). Age-related differences in reliance behaviour
attributable to costs within a human-decision aid system. Human Factors, 50(6), 853–863.
Page 38 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Fan, C., Forlizzi, J., & Dey, A. (2012). Considerations for technology that support physical
activity by older adults. In Proceedings of the 14th international ACM SIGACCESS confer
ence on computers and accessibility (ASSETS ‘12) (pp. 33–40).
Fang, Y.-M. & Chang, C.-C. (2016). Users’ psychological perception and perceived read
ability of wearable devices for elderly people. Behaviour and Information Technology,
35(3), 225–232.
Farina, K., & Nitche, M. (2015). Outside the brick: Exploring prototyping for the elderly.
In Proceedings of the 2015 British Human Computer Interaction Conference (British HCI
2015) (pp. 11–17).
Fernandes, F., Rodrigues, A., Duarte, C., Jion-Neira, R., & Carrico, L. (2014). Web
(p. 167)
Ferreira, S. M., Sayago, S., & Blat, J. (2014). Towards iTV services for older people: Ex
ploring their interactions with online video portals in different cultural backgrounds.
Technology and Disability, 26(4), 199–209.
Ferreira, S. M., Sayago, S., & Blat, J. (2017). Older people’s production and appropriation
of digital videos: An ethnographic study. Behaviour and Information Technology, 36(6),
557–574.
Ferreira, S., Torres, A., Mealha, O., & Veloso, A. (2015). Effects on older adults in informa
tion and communication technologies considering psychosocial variables. Educational
Gerontology, 41(7), 482–493.
Fezzani, K., Albinet, C., Thon, B., & Marquie, J. C. (2010). The effect of motor difficulty on
the acquisition of a computer task: A comparison between young and older adults. Behav
iour and Information Technology, 29(2), 115–124.
Fried-Oken, M., Rowland, C., Baker, G., Dixon, M., Mills, C., Schultz, D., & Oken, B.
(2009). The effect of voice output on AAC-supported conversations of persons with
Alzheimer’s disease. ACM Transactions on Accessible Computing, 1(3), Art. 15.
Fronemann, N., Weisener, A., Pollmann, K., & Peisnner, M. (2016). Happily ever after: Pos
itive aging through positive design. In S. Björk, E. Eriksson, M. Fjeld, S. Bødker, W. Baren
dregt, & M. Obaid, (Eds.), Proceedings of the 9th Nordic conference on human-computer
interaction (NordiCHI ‘16) (Art. 105).
Fuchsberger, V., Sellner, W., Moser, C., & Tscheligi, M. (2012). Benefits and hurdles for
older adults in intergenerational online interactions. In Proceedings of 13th international
conference on computers helping people with special needs (ICCHP ‘12) (pp. 697–704).
Gagliardi, C., Mazzarini, G., Papa, R., Giuli, C., & Marcellini, F. (2008). Designing a learn
ing program to link old and disabled people to computers. Educational Gerontology,
34(1), 15–29.
Page 39 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Gamliel, T. & Gabay, N. (2014). Knowledge exchange, social interactions, and empower
ment in an intergenerational technology program at school. Educational Gerontology,
40(8), 597–617.
Gao, Q., & Sun, Q. (2015). Examining the usability of touch screen gestures for older and
younger adults. Human Factors, 57(5), 835–863.
Gappa, H., Nordbrock, G., Mohamad, Y., Pullmann, J., & Velasco, C. A. (2012). Controlled
natural language sentence building as a model for designing user interfaces for rule edit
ing in assisted living systems–A user study. In Proceedings of 13th international confer
ence on computers helping people with special needs (ICCHP ‘12) (pp. 415–418).
Gappa, H., Nordbrock, G., Thelen, M., Pullmann, J., Mohamad, Y., & Velasco, C. A. (2014).
Extended scaffolding by remote collaborative interaction to support people with dementia
in independent living–A user study. In Proceedings of 14th international conference on
computers helping people with special needs (ICCHP ‘14) (pp. 445–450).
Gatto, S. L., & Tak, S. H. (2008). Computer, internet, and e-mail use among older adults:
Benefits and barriers. Educational Gerontology, 34(9), 800–811.
Gibson, L., Moncur, W., Forbes, P., Arnott, J., Martin, C., & Bhachu, A. S. (2010). Design
ing social networking sites for older adults. In Proceedings of the 24th BCS interaction
specialist group conference (BCS HCI ‘10) (pp. 186–194).
Gil, S. R. & Sánchez Martín, V. (2014). ELDERS-UP! Adaptive system for enabling the el
derly collaborative knowledge transference to small companies. In Proceedings of 14th in
ternational conference on computers helping people with special needs (ICCHP ‘14) (pp.
148–151).
(p. 168) Giusti, L., Mencarini, E., & Zancanaro, M. (2010). “Luckily, I don’t need it”: Elder
ly and the use of artifacts for time management. In E. Hvannberg, M. K. Lárusdóttir, A.
Blandford & J. Gulliksen (Eds.), Proceedings of the 6th Nordic conference on human-com
puter interaction (NordiCHI ‘10) (pp. 198–206).
González, A. M., Ramírez, P., & Viadel, V. (2012). Attitudes of the elderly toward informa
tion and communications technologies. Educational Gerontology, 38(9), 585–594.
Goodman, J., Brewster, S. A., & Gray, P. (2005). How can we best use landmarks to sup
port older people in navigation. Behaviour and Information Technology, 24(1), 3–20.
Grabowski, P. J., & Mason, A. H. (2014). Age differences in the control of a precision
reach to grasp task within a desktop virtual environment. International Journal of Human-
Computer Studies, 72(4), 383–392.
Gramss, D., & Struve, D. (2009). Instructional videos for supporting older adults who use
interactive systems. Educational Gerontology, 35(2), 164–176.
Page 40 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Grill, T., Osswald, S., & Tscheligi, M. (2012). Task complexity and user model attributes:
An analysis of user model attributes for elderly drivers. In Proceedings of 13th interna
tional conference on computers helping people with special needs (ICCHP ‘12) (pp. 642–
649).
Grimes, G. A., Hough, M. G. Mazur, E., & Signorella, M. L. (2010). Older adults’ knowl
edge of internet hazards. Educational Gerontology, 36(3), 173–192.
Gudur, R. R., Blackler, A., Popovic, V., & Mahar, D. (2013). Ageing, technology anxiety and
intuitive use of complex interfaces. In P. Kotzé, G. Marsden, G. Lindgaard, J. Wesson, & M.
Winckler (Eds.), Proceedings Human-computer interaction, Part III (INTERACT 2013).
Lecture Notes in Computer Science, 8117, (pp. 564–581).
Gusi, N., Prieto, J., Forte, D., Gomez, I., & González-Guerreroc, J.-L. (2008). Needs, inter
ests, and limitations for the promotion of health and exercise by a web site for sighted
and blind elderly people: A qualitative exploratory study. Educational Gerontology, 34(6),
449–461.
Hakobyan, L., Lumsden, J., & O’Sullivan, D. (2014). Participatory research with older
adults with AMD: Co-designing a SMART diet diary app. In Proceedings of the 28th Inter
national BCS human computer interaction conference on HCI (BCS-HCI ‘14) (pp. 32–41).
Hakobyan, H., Lumsden, J., O’Sullivan, D., & Bartlett, H. (2012). Understanding the IT-re
lated attitudes and needs of persons with age-related macular degeneration: A case study.
In Proceedings of the 26th annual BCS interaction specialist group conference on people
and computers (BCS-HCI ‘12) (pp. 239–244).
Hakobyan, L., Lumsden, J., O’Sullivan, D., & Bartlett, H. (2013). Designing a mobile diet
diary application with and for older adults with AMD: A case study. In Proceedings of the
27th International BCS human computer interaction conference (BCS-HCI ‘13) (Art. 17).
Hancock, H. E., Fisk, A. D., & Rogers, W. A. (2005). Comprehending product warning in
formation: Age-related effects and the roles of memory, inferencing and knowledge. Hu
man Factors, 47(2), 219–234.
Hanson, V. L., & Crayne, S. (2005). Personalization of Web browsing: Adaptations to meet
the needs of older adults. Universal Access in the Information Society, 4(1), 46–58.
Harada, S., Sato, D., Takagi, H., & Asakawa, C. (2013). Characteristics of elderly user be
haviour on mobile multi-touch devices. In P. Kotzé, G. Marsden, G. Lindgaard, J. Wesson,
& M. Winckler (Eds.), Proceedings Human-computer interaction, Part IV (INTERACT
2013). Lecture Notes in Computer Science, 8117, (pp. 323–341).
Page 41 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Hardt, J. H., & Hollis-Sawyer, L. (2007). Older adults seeking healthcare informa
(p. 169)
Harley, D., Howland, K., Harris, E., & Redlich, C. (2014). Online communities for older
users: What can we learn from local community interactions to create social sites that
work for older people. In Proceedings of the 28th International BCS human computer in
teraction conference on HCI (BCS-HCI ‘14) (pp. 32–41).
Hart, T. A., Chaparro, B. S., & Halcomb, C. G. (2008). Evaluating websites for older
adults: Adherence to “senior-friendly” guidelines and end-user performance. Behaviour
and Information Technology, 27(3), 191–199.
Hawthorn, D. (2007). Interface design and engagement with older people. Behaviour and
Information Technology, 26(4), 333–341.
Heerink, M., Krose, B., Wielinga, B., & Evers, V. (2009). Measuring the influence of social
abilities on acceptance of an interface robot and a screen agent by elderly users. In Pro
ceedings of the 23rd British HCI group annual conference on people and computers
(BCS-HCI ‘09) (pp. 430–439).
Hendriks, N., Truyen, F., & Duval, E. (2013). Designing with dementia: Guidelines for par
ticipatory design together with persons with dementia. In P. Kotzé, G. Marsden, G.
Lindgaard, J. Wesson, & M. Winckler (Eds.), Proceedings Human-computer interaction,
Part I (INTERACT 2013). Lecture Notes in Computer Science, 8117, (pp. 649–666).
Hernández-Encuentra, E., Pousadaa, M., & Gómez-Zúñigaa, B. (2009). ICT and older peo
ple: Beyond usability. Educational Gerontology, 35(3), 225–245.
Hirotomi, T., Hosomi, Y., & Yano, H. (2008). Brake control assist on a four-castered walker
for old people. In Proceedings of 11th international conference on computers helping peo
ple with special needs (ICCHP ‘08) (pp. 1269–1276).
Hogeboom, D. L., McDermotta, R. J., Perrina, K. M., Osmana, H., & Bell-Ellison, B. A.
(2010). Internet use and social networking among middle aged and older adults. Educa
tional Gerontology, 36(2), 93–111.
Holliday, N., Ward, G., Fielden, S., & Williams, S. (2015). Exploration of information needs
and development of resources to inform and support those at risk of falling. Technology
and Disability, 27(1–2), 31–40.
Hollinworth, N., & Hwang, F. (2009). Learning how older adults undertake computer
tasks. In Proceedings of the 11th international ACM SIGACCESS conference on comput
ers and accessibility (ASSETS ‘09) (pp. 245–246).
Holllinworth, N., & Hwang, F. (2011). Investigating familiar interactions to help older
adults learn computer applications more easily. In Proceedings of the 25th international
BCS human computer interaction conference (BCS HCI ‘11) (pp. 473–478).
Page 42 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Holzinger, A., Sammer, P., & Hofmann-Wellenhof, R. (2006). Mobile computing in medi
cine: Designing mobile questionnaires for elderly and partially sighted people. In Pro
ceedings of 10th international conference on computers helping people with special
needs (ICCHP ‘06) (pp. 732–739).
Holzinger, A., Searle, G., Kleinberger, T., Seffah, A., & Javahery, H. (2008). Investigating
usability metrics for the design and development of applications for the elderly. In Pro
ceedings of 11th international conference on computers helping people with special
needs (ICCHP ‘08) (pp. 98–105).
Hoshi, K., Ohberg, F., & Nyberg, A. (2011). Designing blended reality space: Con
(p. 170)
ceptual foundations and applications. In Proceedings of the 25th international BCS hu
man computer interaction conference (BCS HCI ‘11) (pp. 217–226).
Huber, L. & Watson, C. (2014). Technology: Education and training needs of older adults.
Educational Gerontology, 40(1), 16–25.
Huldtgren, A., Mertl, F., Vormann, A., & Geiger, C. (2015). Probing the potential of multi
media artefacts to support communication of people with dementia In J. Abascal, S. Bar
bosa, M. Fetter, T. Gross, P. Palanque, & M. Winckler (Eds.), Proceedings Human-comput
er interaction, Part III (INTERACT 2015). Lecture Notes in Computer Science, 9296, (pp.
71–79).
Hurtienne, J., Horn, A. M., Langdon, P. M., & Clarkson, P. J. (2013). Facets of prior experi
ence and the effectiveness of inclusive design. Universal Access in the Information Soci
ety, 12(3), 297–308.
Hwang, F., Hollingworth, N., & Williams, N. (2013). Effects of target expansion on section
performance in older computer users. ACM Transactions on Accessible Computing, 5(1),
Art. 1.
Hwang, M.-Y., Hong, J.-C., Hao, Y.-W., & Jong, J. T. (2011). Elders’ usability, dependability,
and flow experiences on embodied interactive video games. Educational Gerontology,
37(8), 715–731.
Iacono, I., & Marti, P. (2014). Engaging older people with participatory design. In V. Roto,
J. Häkkilä, Lárusdóttir, K. Väänänen-Vainio-Mattila, O. Juhlin, T. Olsson, & E. Hvannberg
(Eds.), Proceedings of the 8th Nordic conference on human-computer interaction
(NordiCHI ‘14) (pp. 859–864).
Infeld, D. L., & Adams, W. C. (2013). Using the Internet for gerontology education: Assess
ing and improving Wikipedia. Educational Gerontology, 39(10), 707–716.
Page 43 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Inoue, K., Sakuma, N., Okada, M., Sasaki, C., Nakamura, M., & Wada, K. (2014). Effective
application of PALRO: A humanoid type robot for people with dementia. In Proceedings of
14th international conference on computers helping people with special needs (ICCHP
‘14) (pp. 451–454).
Iwarsson, S., & Wilson, G. (2006). Environmental barriers, functional limitations, and
housing satisfaction among older people in Sweden: A longitudinal perspective on hous
ing accessibility. Technology and Disability, 18(2), 57–66.
Jang, Y., Yoon, H., Marti, C. N., & Kim, M. T. (2015). Aging IQ intervention with older Ko
rean Americans: A comparison of internet-based and in-class education. Educational
Gerontology, 41(9), 642–652.
Jastrzembski, T., Charness, N., Holley, P., & Feddon, J. (2005). Input devices for web
browsing: Age and hand effects. Universal Access in the Information Society, 4(1), 39–45.
Jochems, N., Vetter, S., & Schlick, C. (2013). A comparative study of information input de
vices for aging computer users. Behaviour and Information Technology, 32(9), 902–919.
Johansson, K., Lundberg, S., & Borell, L. (2011). “The Cognitive Kitchen”–Key principles
and suggestions for design that includes older adults with cognitive impairments as
kitchen users. Technology and Disability, 23(1), 29–40.
Jung, Y., Peng, W., Moran, M., Jin, S.-A., McLaughlin, M., Cody, M., Jordan-Marsh, M., Al
bright, J., & Silverstein, M. (2010). Low-income minority seniors’ enrollment in a cyber
café: Psychological barriers to crossing the digital divide. Educational Gerontology, 36(3),
193–212.
Kahana, B., Kahan, E., Lovegree, L., & Seckin, G. (2006). Compensatory use of computers
by disabled older adults. In Proceedings of 10th international conference on computers
helping people with special needs (ICCHP ‘06) (pp. 766–769).
Kaklanis, N., Moschonas, P., Moustakas, K., & Tsovaras, D. (2013). Virtual user
(p. 171)
models for the elderly and disabled for automatic simulated accessibility and ergonomy
evaluation of designs. Universal Access in the Information Society, 12(4), 403–425.
Kaklanis, N., Moustakas, K., & Tzovaras, D. (2008). A methodology for generating virtual
user models of elderly and disabled for the accessibility assessment of new products. In
Proceedings of 11th international conference on computers helping people with special
needs (ICCHP ‘08) (pp. 295–302).
Kalman, Y. M., Geraghty, K., Thompson, C. K., & Gergle, D. (2012). Detecting linguistic
HCI markers in an online aphasia support group. In Proceedings of the 14th international
ACM SIGACCESS conference on computers and accessibility (ASSETS ‘12) (pp. 65–70).
Kamiliaris, A., Kondepudi, S., & Danial, N. (2015). Understanding the activities and areas
of concern of elderly population: The case of Singapore. Technology and Disability, 27(4),
141–153.
Page 44 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Kamollimsakul, S., Petrie, H., & Power, C. (2014). Web accessibility for older readers: Ef
fects of font type and font size on skim reading webpages in Thai. In Proceedings of 14th
international conference on computers helping people with special needs (ICCHP ‘14)
(pp. 332–339).
Kepski, M., & Kwolek, B. (2012). Fall detection on embedded platform using Kinect and
wireless accelerometer. In Proceedings of 13th international conference on computers
helping people with special needs (ICCHP ‘12) (pp. 407–414).
Kim, H. J., Jarochawski, B., & Ryu, D. H. (2006). A proposal for a home-based health moni
toring system for the elderly or disabled. In Proceedings of 10th international conference
on computers helping people with special needs (ICCHP ‘06) (pp. 473–479).
Kim, Y. B. (2006). A ubiquitous social community portal service for social networking with
convenient accessibility. In Proceedings of 10th international conference on computers
helping people with special needs (ICCHP ‘06) (pp. 263–270).
Kim, Y. S. (2008). Reviewing and critiquing computer learning and usage among older
adults. Educational Gerontology, 34(8) 709–735.
Kobayashi, M., Hiyam, A., Miura, T., Asakawa, C., Hirose, M., & Ifukube, T. (2011). Elderly
user evaluation of mobile touchscreen interactions. In P. Campos, N. Graham, J. Jorge, N.
Nunes, P. Palanque, and M. Winckler (Eds.), Proceedings Human-computer interaction
(INTERACT 2011). Lecture Notes in Computer Science, 6947, (pp. 83–99).
Kobayashi, M., Ishihara, T., Kosugi, A., Takagi, H., & Asakawa, A. (2013). Question-answer
cards for an inclusive micro-tasking framework for the elderly. In P. Kotzé, G. Marsden, G.
Lindgaard, J. Wesson, & M. Winckler (Eds.), Proceedings Human-computer interaction,
Part III (INTERACT 2013). Lecture Notes in Computer Science, 8117, (pp. 590–607).
Komori, T., Takagi, T., Kurozumi, K., Shoda, K., & Murakawa, K. (2010). A device to evalu
ate broadcast background sound balance using loudness for elderly listeners. In Proceed
ings of 12th international conference on computers helping people with special needs (IC
CHP ‘10) (pp. 560–567).
Kort, H. S. M., & van Hoof, J. (2014). Design of a website for home modifications for older
persons with dementia. Technology and Disability, 26(1), 1–10.
Kurniawan, S. (2008). Older people and mobile phones: A multi-method investigation. In
ternational Journal of Human-Computer Studies, 66(12), 889–901.
Page 45 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Laganà, L. (2008). Enhancing the attitudes and self-efficacy of older adults toward com
puters and the internet: Results of a pilot study. Educational Gerontology, 34(9), 831–849.
Larsson, E., Larsson-Lund, M., & Nilsson, I. (2013). Internet based activities (IBAs): Se
niors’ experiences of the conditions required for the performance of and the influence of
these conditions on their own participation in society. Educational Gerontology, 39(3),
155–167.
Lee, B., Lee, M., Sook, M. S., You, H., Park, H., Jung, K., Lee, B. H., Na D. L., & Kim, G. H.
(2015). The effects of age, gender, and hand on force control capabilities of healthy
adults. Human Factors, 57(8), 1348–1358.
Lee, C. C., Czaja, S. J., & Sharit, J. (2008). Training older workers for technology-based
employment. Educational Gerontology, 35(1), 15–31.
Lehtinen, V., Nasanen, J., & Sarvas, R. (2009). “A little silly and empty-headed”: Older
adults’ understandings of social networking sites. In Proceedings of the 23rd British HCI
group annual conference on people and computers (BCS-HCI ‘09) (pp. 45–54).
Leinonen, E., Syrjanen, A.-L., & Isomursu, M. (2014). Designing assistive and cooperative
HCI for older adults’ movement. In V. Roto, J. Häkkilä, Lárusdóttir, K. Väänänen-Vainio-
Mattila, O. Juhlin, T. Olsson & E. Hvannberg (Eds.), Proceedings of the 8th Nordic confer
ence on human-computer interaction (NordiCHI ‘14) (pp. 877–882).
Leitner, G., Fercher, A. J., Felfernig, A., & Hitz, M. (2012). Reducing the entry threshold of
AAL Systems: Preliminary results from Casa Vecchia. In Proceedings of 13th international
conference on computers helping people with special needs (ICCHP ‘12) (pp. 709–715).
Leonard, V. K., Jacko, J. A., & Pizzimenti, J. J. (2005). An exploratory investigation of hand
held computer interaction for older adults with visual impairments. In Proceedings of the
7th international ACM SIGACCESS conference on computers and accessibility (ASSETS
‘05) (pp. 12–19).
Leonard, V. K., Jacko, J. A., & Pizzimenti, J. J. (2006). An investigation of handheld device
use by older adults with age-related macular degeneration. Behaviour and Information
Technology, 25(4), 313–332.
Lepicard, G., & Vigouroux, N. (2010). Touch screen user interfaces for older subjects: Ef
fect of the targets number and the two hands use. In Proceedings of 12th international
conference on computers helping people with special needs (ICCHP ‘10) (pp. 592–599).
Lepicard, G., & Vigouroux, N. (2012). Comparison between single-touch and multi-touch
interaction for older people. In Proceedings of 13th international conference on comput
ers helping people with special needs (ICCHP ‘12) (pp. 658–665).
Leung, R., Findlater, L., McGrenere, J., Graf, P., & Yang, J. (2010). Multi-layered interfaces
to improve older adults’ initial learnability of mobile applications. ACM Transactions on
Accessible Computing, 3(1), Art. 1.
Page 46 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Leung, R., McGrenere, J., & Graf, P. (2011). Age-related differences in the initial usability
of mobile device icons. Behaviour and Information Technology, 30(5), 629–642.
Leung, R., Tang, C., Haddad, S., McGrenere, J., Graf, P., & Ingriany, V. (2012). How older
adults learn to use mobile devices: Survey and field investigations, ACM Transactions on
Accessible Computing, 4(3), Art. 11.
Lexis, M., Everink, I., van der Heide, L., Spreeuwenber, M., Willems, C., & de Witte, L.
(2013). Activity monitoring technology to support homecare delivery to frail and psy
chogeriatric elderly persons living at home alone. Technology and Disability, 25(3), 189–
197.
Li, H., Rau, P.-L. P., Fujimura, K., Gao, Q., & Wang, L. (2012). Designing effective
(p. 173)
web forms for older web users. Educational Gerontology, 38(4), 271–281.
Liao, M.-J., Wu, Y., & Sheu, C.-F. (2014). Effects of perceptual complexity on older and
younger adults’ target acquisition performance. Behaviour and Information Technology,
33(6), 591–605.
Liao, Q. V. & Fu, W.-T. (2014). Age differences in credibility judgements of online health
information. ACM Transactions on Computer-Human Interaction, 21(1), Art. 2.
Lindley, S. E. (2012). Before I forget: From personal memory to family history Human-
Computer Interaction, 27(1–2), 13–36.
Lindley, S. E., Harper, R., & Sellen, A. (2008). Designing for elders: Exploring the com
plexity of relationships in later life. In Proceedings of the 22nd British HCI group annual
conference (BCS-HCI ‘08) (pp. 77–86).
Lindley, S. & Wallace, J. (2015). Placing in age: Transitioning to a new home in later life.
ACM Transactions on Computer-Human Interaction, 22(4), Art. 20.
Little, L., Briggs, P., & Coventry, L. (2011). Who knows about me? An analysis of age-relat
ed disclosure preferences. In Proceedings of the 25th international BCS human computer
interaction conference (BCS HCI ‘11) (pp. 84–87).
Liu, C.-L. (2014). A study of detecting and combating cybersickness with fuzzy control for
the elderly within 3D virtual stores. International Journal of Human-Computer Studies,
72(12), 796–804.
Lockhart, T. E., Smith, J. L., & Woldstad, J. C. (2005). Effects of aging on the biomechanics
of slips and falls. Human Factors, 47(4), 708–729.
Lozano, H., Hernáez, I., Picón, A., Camarena, J., & Navas, E. (2010). Audio classification
techniques in home environments for elderly/dependent people. In Proceedings of 12th
international conference on computers helping people with special needs (ICCHP ‘10)
(pp. 320–323).
Page 47 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
McBride, S. E., Rogers, W. A., & Fisk, A. D. (2011). Understanding the effect of workload
on automation use for younger and older adults. Human Factors, 53(6), 672–686.
McCann, R. M., & Keaton, S. A. (2013). A cross cultural investigation of age stereotypes
and communication perceptions of older and younger workers in the USA and Thailand.
Educational Gerontology, 39(5), 326–341.
McCarthy, S., Sayers, H., & McKevitt, P. (2007). Investigating the usability of PDAs with
ageing users. In Proceedings of the 21st British HCI group annual conference (BCS-HCI
‘07) (pp. 67–70).
McLaughlin, A. C., Rogers, W. A., & Fisk, A. D. (2009). Using direct and indirect input de
vices: Attention demands and age-related differences. ACM Transactions on Computer-
Human Interaction, 16(1), Art. 2.
Macek, J., & Kleindienst, J. (2011). Exercise support system for elderly: Multi-sensor phys
iological state detection and usability testing. In P. Campos, N. Graham, J. Jorge, N.
Nunes, P. Palanque, & M. Winckler (Eds.), Proceedings Human-computer interaction (IN
TERACT 2011). Lecture Notes in Computer Science, 6947, (pp. 81–88).
Maciuszek, D., Aberg, J., & Shahmehri, N. (2005). What help do older people need?: Con
structing a functional design space of electronic assistive technology applications. In Pro
ceedings of the 7th international ACM SIGACCESS conference on computers and accessi
bility (ASSETS ‘05) (pp. 4–11).
Magnusson, L. & Hanson, E. (2012). Partnership working: The key to the AT-technology
transfer process of the ACTION service (Assisting Carers using Telematics Interventions
to meet Older people’s Needs) in Sweden. Technology and Disability, 24(3), 219–232.
(p. 174) Malinowsky, C., Kottorp, A., & Nygård, L. (2013). Everyday technologies’ levels of
difficulty when used by older adults with and without cognitive impairment–Comparison
of self-perceived versus observed difficulty estimates. Technology and Disability, 25(3),
167–176.
Malinowsky, C., Kottorp, A., Patomella, A.-H., Rosenberg, L., & Nygård, L. (2015).
Changes in the technological landscape over time: Relevance and difficulty levels of
everyday technologies as perceived by older adults with and without cognitive impair
ment. Technology and Disability, 27(3), 91–101.
Mann, W. C., Belchior, P., Tomita, M. R., & Kemp, B. J. (2005). Computer use by middle-
aged and older adults with disabilities. Technology and Disability, 17(1), 1–9.
Mann, W. C., Locher, S., Justiss, M. D., Wu, S., & Tomita, M. (2005). A comparison of fall
ers and non-fallers in the frail elderly. Technology and Disability, 17(1), 25–32.
Marquis-Faulkes, F., McKenna, S. J., Newell, A. F., & Gregor, P. (2005). Gathering the re
quirements for a fall monitor using drama and video with older people. Technology and
Disability, 17(4), 227–236.
Page 48 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Marston, H. R. (2013). Design recommendations for digital game design within an ageing
society. Educational Gerontology, 39(2), 103–118.
Marston, H. R., Greenlay, S., & van Hoof, J. (2013). Understanding the Nintendo Wii and
Microsoft Kinect consoles in long-term care facilities. Technology and Disability, 27(2),
77–85.
Martin, S., Nugent, C., Wallace, J., Kernohan, G., McCreight, B., & Mulvenna, M. (2007).
Using context awareness within the “Smart home” environment to support social care for
adults with dementia. Technology and Disability, 19(2–3), 143–152.
Matthews, J. T., Beach, S. R., Downs, J., de Bruin, W. B., Mecca, L. P., & Schulz, S. (2010).
Preferences and concerns for quality of life technology among older adults and persons
with disabilities: National survey results. Technology and Disability, 22(1–2), 5–15.
Mayer, C., Morandell, M., Gira, M., Hackbarth, K., Petzold, M., & Fagel, S. (2012). AALuis,
a user interface layer that brings device independence to users of AAL systems. In Pro
ceedings of 13th international conference on computers helping people with special
needs (ICCHP ‘12) (pp. 650–657).
Mehdi, S. A., & Berns, K. (2014). Behavior-based search of human by an autonomous in
door mobile robot in simulation. Universal Access in the Information Society, 13(1), 45–
58.
Meza-Kubo, V., Morán, A. L., & Rodríguez, M. D. (2014). Bridging the gap between illiter
ate older adults and cognitive stimulation technologies through pervasive computing. Uni
versal Access in the Information Society, 13(1), 33–44.
Michailidou, E., Parmaxi, A., & Zaphiris, P. (2015). Culture effects in online social support
for older people: Perceptions and experience. Universal Access in the Information
Society, 14(2), 281–293.
Miotto, A., Lessiter, J., Freeman, J., Carmichael, R., & Ferrrari, E. (2013). Cognitive train
ing via interactive television: Drivers, barriers and potential users. Universal Access in
the Information Society, 12(1), 37–54.
Miura, T., Yabu, K.-I., Hiyama, A., Inamura, N., Hirose, M., & Ifukube, T. (2015). Smart
phone-based gait measurement application for exercise and its effects on the lifestyle of
senior citizens. In J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque, & M. Winckler
(Eds.), Proceedings Human-computer interaction, Part III (INTERACT 2015). Lecture
Notes in Computer Science, 9296, (pp. 80–98).
Moffatt, K., & McGrenere, J. (2007). Slipping and drifting: Using older users to
(p. 175)
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Moffatt, K., & McGrenere, J. (2009). Exploring methods to improve pen-based menu selec
tion for younger and older adults. ACM Transactions on Accessible Computing, 2(1), Art.
3.
Moffatt, K., Yuen, S., & McGrenere, J. (2008). Hover or tap?: Supporting pen-based menu
navigation for older adults. In Proceedings of the 10th international ACM SIGACCESS
conference on computers and accessibility (ASSETS ‘08) (pp. 51–58).
Mohadis, H. M., Ali, N. M., & Smeaton, A. F. (2016). Designing a persuasive physical ac
tivity application for older workers: Understanding end-user perceptions. Behaviour and
Information Technology, 35(12), 1102–1114.
Molin, G., Pettersson, C., Jonsson, O., & Keijer, U. (2007). Living at home with acquired
cognitive impairment: Can assistive technology help? Technology and Disability, 19(2–3),
91–101.
Moloney, K. P., Jacko, J. A., Vidakovic, B., Sainfort, F., Leonard, V. K., & Shi, B. (2006).
Leveraging data complexity: Pupillary behaviour of older adults with visual impairment
during HCI. ACM Transactions on Computer-Human Interaction, 13(3), 376–402.
Mubin, O., Shahid, S., & Al Mahmud, A. (2008). Walk 2 Win: Towards designing a mobile
game for elderly’s social engagement. In Proceedings of the 22nd British HCI group an
nual conference (BCS-HCI ‘08) (pp. 11–14).
Murata, A., and Iwase, H. (2005). Usability of touch-panel interfaces for older adults. Hu
man Factors, 47(4), 767–776.
Muskens, L., van Lent, R., Vijfvinkel, A., van Cann, P., & Shahid, S. (2014). Never too old
to use a tablet: Designing tablet applications for the cognitive and physically impaired el
derly. In Proceedings of 14th international conference on computers helping people with
special needs (ICCHP ‘14) (pp. 391–398).
Nansen, B., Vetere, F., Robertson, T., Downs, J., Brereton, M., & Durick, J. (2014). Recipro
cal habituation: A study of older people and the Kinect. ACM Transactions on Computer-
Human Interaction, 21(3), Art. 18.
Nawaz, A., Skjaeret, N., Ystmark, K., Helbostad, J. L., Vereijken, B., & Svanaes, D. (2014).
Assessing seniors’ user experience (UX) of exergames for balance training. In V. Roto, J.
Häkkilä, Lárusdóttir, K. Väänänen-Vainio-Mattila, O. Juhlin, T. Olsson & E. Hvannberg
Page 50 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Németh, G., Olaszy, G., Bartalis, M., Kiss, G., Zainkó, C., Mihajlik, P., & Haraszti, C.
(2008). Automated drug information system for aged and visually impaired persons. In
Proceedings of 13th international conference on computers helping people with special
needs (ICCHP ‘12) (pp. 238–241).
Newell, A. F., Dickinson, A., Smith, M. J., & Gregor, P. (2006). Designing a portal for older
users: A case study of an industrial/academic collaboration. ACM Transactions on Com
puter-Human Interaction, 13(3), 347–375.
Ng, C.-H. (2007). Motivation among older adults in learning computing technolo
(p. 176)
Nicholson, J., Coventry, L., & Briggs, P. (2013). Faces and pictures: Understanding age dif
ferences in two types of graphical authentications. International Journal of Human-Com
puter Studies, 71(10), 958–966.
Nicolau, H., & Jorge, J. (2012). Elderly text-entry performance on touchscreens. In Pro
ceedings of the 14th international ACM SIGACCESS conference on computers and acces
sibility (ASSETS ‘12) (pp. 127–134).
Nijhof, N., van Gemert-Pijnen, J. E. W. C., de Jong, G. E. N., Ankoné, J. W., & Seydel, E. R.
(2012). How assistive technology can support dementia care: A study about the effects of
the IST Vivago watch on patients’ sleeping behavior and the care delivery process in a
nursing home. Technology and Disability, 24(2), 103–115.
Nijhof, N., van Hoof, J., van Rijn, H., & van Gemert-Pijnen, J. E. W. C. (2013). The behav
ioural outcomes of a technology-supported leisure activity in people with dementia. Tech
nology and Disability, 25(4), 263–273.
Nunes, F., Kerwin, M., & Silva, P. A. (2012). Design recommendations for TV user inter
faces for older adults: Findings from the eCAALYX Project. In Proceedings of the 14th in
ternational ACM SIGACCESS conference on computers and accessibility (ASSETS ‘12)
(pp. 41–48).
Nygård, L. (2009). The stove timer as a device for older adults with cognitive impairment
or dementia: Different professionals’ reasoning and actions. Technology and Disability,
21(3), 53–66.
Oberzaucher, J., Jagos, H., Zodl, C., Hlauschek, W., & Zagler, W. (2010). Using a wearable
insole gait analyzing system for automated mobility assessment for older people. In Pro
ceedings of 12th international conference on computers helping people with special
needs (ICCHP ‘10) (pp. 600–603).
Page 51 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
O’Brien, M., Rogers, W. A., & Fisk, A. D. (2012). Understanding age and technology expe
rience differences in use of prior knowledge for everyday technology interactions. ACM
Transactions on Accessible Computing, 4(2), Art. 9.
Ofei-Dodoo, S., Medvene, L. J., Nilsen, K. M., Smith, R. A., & DiLollo, A. (2015). Exploring
the potential of computers to enrich home and community-based services clients’ social
networks. Educational Gerontology, 41(3), 216–225.
Ogawa, M., Inagaki, H., & Gondo, Y. (2006). Usage of IT and electronic devices, and its
structure, for community-dwelling elderly. In Proceedings of 10th international confer
ence on computers helping people with special needs (ICCHP ‘06) (pp. 752–758).
Omori, M., Miyao, M., Kanamoriand, H., & Atsumi, B. (2008). Visual cognitive perfor
mance of elderly people: Effects on reading time of age, character size and visual dis
tance. Behaviour and Information Technology, 27(4), 313–318.
Orpwood, R., Gibbs, C., Adlam, T., Faulkner, R., & Meegahawatte, D. (2005). The design of
smart homes for people with dementia–user-interface aspects. Universal Access in the In
formation Society, 4(2), 156–164.
Osman, Z., Poulson, D., & Nicolle, C. (2005). Introducing computers and the Internet to
older users: Findings from the Care OnLine project. Universal Access in the Information
Society, 4(1), 16–23.
Östlund, B. (2008). The revival of research circles: Meeting the needs of modern aging
and the third age. Educational Gerontology, 34(4), 255–266.
Otjacques, B., Krier, M., Feltz, F., Ferring, D., & Martin Hoffman, M. (2009). Helping old
er people to manage their social activities at the retirement home. In Proceedings of the
(p. 177) 23rd British HCI group annual conference on people and computers (BCS-HCI
Panek, P., & Zagler, W. L. (2008). A living lab for ambient assisted living in the Municipali
ty of Schwechat. In Proceedings of 11th international conference on computers helping
people with special needs (ICCHP ‘08) (pp. 777–784).
Paredes, H., Cassola, F., Morgado, L., de Carvalho, F., Ala, S., Cardoso, F., Benjamim, B.,
& Martins, P. (2014). Exploring the usage of 3D virtual worlds and Kinect interaction in
exergames with elderly. In Proceedings of 14th international conference on computers
helping people with special needs (ICCHP ‘14) (pp. 297–300).
Parekh, M., & Baber, C. (2010). Tool use as gesture: New challenges for maintenance and
rehabilitation. In Proceedings of the 24th BCS interaction specialist group conference
(BCS HCI ‘10) (pp. 241–249).
Page 52 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Pasoule, E., & Koutsabasis, P. (2014). Redesigning web sites for older adults: A case study.
Behaviour and Information Technology, 33(6), 561–573.
Patomella, A.-H., Kottorp, A., Malinowsky, C., & Nygård, L. (2011). Factors that impact
the level of difficulty of everyday technology in a sample of older adults with and without
cognitive impairment. Technology and Disability, 23(4), 243–250.
Pedlow, R., Kasnitz, D., Shuttleworth, R. (2010). Barriers to the adoption of cell phones
for older people with impairments in the USA: Results from an expert review and field
study. Technology and Disability, 22(3), 147–158.
Petrie, H., Darzentas, J. S., & Power, C. (2014). Self-service terminals for older and dis
abled users: Attitudes of key stakeholders. In Proceedings of 14th international confer
ence on computers helping people with special needs (ICCHP ‘14) (pp. 340–347).
Pigini, L., Facal, D., Blasi, L., & Andrich, R. (2012). Service robots in elderly care at home:
Users’ needs and perceptions as a basis for concept development. Technology & Disabili
ty, 24(4), 303–311.
Pigini, L., Facal, D., Garcia, A., Burmester, M., & Andrich, R. (2012). The proof of concept
of a shadow robotic system for independent living at home. In Proceedings of 13th inter
national conference on computers helping people with special needs (ICCHP ‘12) (pp.
634–641).
Piper, A.-M., Weibel, N., & D. Hollan, H. D. (2014). Designing audio-enhanced paper pho
tos for older adult emotional wellbeing in communication therapy. International Journal of
Human-Computer Studies, 72 (8–9), 629–639.
Pitts, K., Pudney, K., Zachos, K., Maiden, N., Krogstie, B., Jones, S., … Turner, A. (2015).
Using mobile devices and apps to support reflective learning about older people with de
mentia. Behaviour and Information Technology, 34(6), 613–631.
Plaisant, C., Clamage, A., Hutchinson, H. B., Bederson, B. B., & Druin, A. (2006). Shared
family calendars: Promoting symmetry and accessibility. ACM Transactions on Computer-
Human Interaction, 13(3), 313–346.
Pradhan, A. K., Hammel, K. R., DeRamus, R., Pollatsek, A., Noyce, D. A., & Fisher, D. L.
(2005). Using eye movements to evaluate effects of driver age on risk perception in a dri
ving simulator. Human Factors, 47(4), 840–852.
Price, M. M., Pak, R., Muller, H., & Stronge, A. (2013). Older adults’ perceptions of useful
ness of personal health records. Universal Access in the Information Society, 12(2), 191–
204.
Priest, L., Nayak, L., & Stuart-Hamilton, I. (2007). Website task performance by older
adults. Behaviour and Information Technology, 26(3), 189–195.
Page 53 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Prieto, G., & Leahy, D. (2012). Online social networks and older people. In Pro
(p. 178)
Proctor, R. W., Vu, K.-P. L., & Pick, D. F. (2005). Aging and response selection in spatial
choice tasks. Human Factors, 47(2), 250–269.
Qadri, S. S., Wang, J., Ruiz J. G., & Roos, B. A. (2009). Personal digital assistant as point-
of-care tools in long-term care facilities: A pilot study. Educational Gerontology, 35(4),
296–307.
Rasquin, S. M. C., Willems, C., de Vlieger, S., Geers, R. P. J., & Soede, M. (2007). The use
of technical devices to support outdoor mobility of dementia patients. Technology and Dis
ability, 19(2–3), 113–120.
Rassmus-Gröhn, K., & Magnusson, C. (2014). Finding the way home-supporting wayfind
ing for older users with memory problems. In V. Roto, J. Häkkilä, Lárusdóttir, K. Väänä
nen-Vainio-Mattila, O. Juhlin, T. Olsson & E. Hvannberg (Eds.), Proceedings of the 8th
Nordic conference on human-computer interaction (NordiCHI ‘14) (pp. 247–255).
Rau, P.-L. P., & Hsu, J.-W. (2005). Interaction devices and web design for novice older
users. Educational Gerontology, 31(1), 19–40.
Ren, X., & Zhou, X. (2011). An investigation of the usability of the stylus pen for various
age groups on personal digital assistants. Behaviour and Information Technology, 30(6),
709–726.
Renaud, K., Blignaut, R., & Venter, I. (2013). Designing mobile phone interfaces for age
diversity in South Africa: “One world” versus diverse “islands.” In P. Kotzé, G. Marsden,
G. Lindgaard, J. Wesson, & M. Winckler (Eds.), Proceedings Human-computer interaction,
Part III (INTERACT 2013). Lecture Notes in Computer Science, 8117, (pp. 1–17).
Renaud, K., & Ramsay, J. (2007). Now what was that password again? A more flexible way
of identifying and authenticating our seniors. Behaviour and Information Technology,
26(4), 309–322.
Renold, C., Meronk, C., & Kelly, C. (2005). Technology in community-based organizations
that serve older People: High tech meets high touch. Educational Gerontology, 31(3),
235–245.
Rice, M., & Carmichael, A. (2013). Factors facilitating or impeding older adults’ creative
contributions in the collaborative design of a novel DTV-based application. Universal Ac
cess in the Information Society, 12(1), 5–19.
Page 54 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Rice, M., Newell, A., & Morgan, N. (2007). Forum theatre as a requirements gathering
methodology in the design of a home telecommunication system for older adults. Behav
iour and Information Technology, 26(4), 323–331.
Riikonen, M., Paavilainen, E., & Salo, H. (2013). Factors supporting the use of technology
in daily life of home-living people with dementia. Technology and Disability, 25(4), 233–
243.
Robertson, T., Durick, J., Brereton, M., Vaisutis, K. Vetere, F., Nanse, B., & Howard, H.
(2013). Emerging technologies and the contextual and contingent experiences of ageing
well. In P. Kotzé, G. Marsden, G. Lindgaard, J. Wesson, & M. Winckler (Eds.), Proceedings
Human-computer interaction, Part III (INTERACT 2013). Lecture Notes in Computer
Science, 8117, (pp. 582–589).
Rogers, W. A., Fisk, A. D., McLauglin, A. C., & Pak, R. (2005). Touch a screen or turn a
knob: Choosing the best device for the job. Human Factors, 47(2), 271–288.
Roring, R. W., Hines, F. G., & Charness, N. (2006). Age-related identification of emotions
at different image sizes. Human Factors, 48(4), 675–681.
Roring, R. W., Hines, F. G., & Charness, N. (2007). Age differences in identifying words in
synthetic speech. Human Factors, 49(1), 25–31.
Rudzicz, F., Wang, R., Begum, M., & Mihailidis, A. (2015). Speech interaction with person
al assistive robots supporting aging at home for individuals with Alzheimer’s disease.
ACM Transactions on Accessible Computing, 7(2), Art. 6.
Russell, H. (2008). Later life: A time to learn. Educational Gerontology, 34(3), 206–244.
Saenz-de-Urturi, Z., Garcia Zapirain, B., & Mendez Zorrilla, A. (2015). Elderly user expe
rience to improve a Kinect-based game playability. Behaviour and Information Technolo
gy, 34(11), 1040–1051.
Salovaara, A., Lehmuskallio, A., Hedman, L., Valkonen, P., & Näsänen, J. (2010). Informa
tion technologies and transitions in the lives of 55–65-year-olds: The case of colliding life
interests. International Journal of Human-Computer Studies. 68(11), 803–821.
Sanders, M. J., O’Sullivan, B., DeBurra, K., & Fedner, A. (2013). Computer training for se
niors: An academic-community partnership. Educational Gerontology, 39(3), 179–193.
Page 55 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Savitch, N., & Zaphiris, P. (2006). Accessible websites for people with dementia-a prelimi
nary investigation into information architecture. In Proceedings of 10th international con
ference on computers helping people with special needs (ICCHP ‘06) (pp. 144–151).
Sayago, S., & Blat, J. (2008). Exploring the role of time and errors in real-life for older
people and ICT. In Proceedings of 11th international conference on computers helping
people with special needs (ICCHP ‘08) (pp. 46–53).
Sayago, S., & Blat, J. (2010). Telling the story of older people e-mailing: An ethnographi
cal study. International Journal of Human-Computer Studies, 68(1–2), 105–120.
Sayago, S., Forbes, P., & Blat, J. (2012). Older people’s social sharing practices in
YouTube through an ethnographical lens. In Proceedings of the 26th annual BCS interac
tion specialist group conference on people and computers (BCS-HCI ‘12) (pp. 185–194).
Sayago, S., Forbes, P., & Blat, J. (2013). Older people becoming successful ICT learners
over time: Challenges and strategies through an ethnographical lens. Educational Geron
tology, 39(7), 527–544.
Sayago, S., Guijarro, J.-M., & Blat, J. (2012). Selective attention in web forms: An ex
ploratory case study with older people. Behaviour and Information Technology, 31(2),
171–184.
Schall, M. C. Jr., Rusch, M. L., Lee, J. D., Aksan, N., & Rizzo, M. (2013). Augmented reality
cues and elderly driver hazard perception. Human Factors, 55(3), 643–658.
Schikhof, Y., Mulder, I., & Choenni, S. (2010). Who will watch (over) me? Humane moni
toring in dementia care International. Journal of Human-Computer Studies, 68(5), 410–
422.
Schmettow, M., & Havinga, J. (2013). Are users more diverse than designs? Testing and
extending a 25 years old claim. In Proceedings of the 27th international BCS human com
puter interaction conference (BCS-HCI ‘13) (Art. 40).
Schneider, N., Schreiber, J., Wilkes, J., Grandt, M., & Schlick, C. M. (2008). Foundations of
an age-differentiated adaptation of the human-computer interface. Behaviour and Infor
mation Technology, 27(4), 319–324.
Schröder, S., & Ziefle, M. (2008). Effects of icon concreteness and complexity on
(p. 180)
semantic transparency: Younger vs. older users. In Proceedings of 11th international con
ference on computers helping people with special needs (ICCHP ‘08) (pp. 90–97).
Sciegaj, M. & Behr, R. A. (2010). Lessons for the United States from countries adapting to
the consequences of aging populations. Technology and Disability, 22(1–2), 83–88.
Scopelliti, M., Giuliani, M. V., & Fornara, F. (2005). Robots in a domestic setting: A psy
chological approach. Universal Access in the Information Society, 4(2), 146–155.
Page 56 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Seals, C. D., Clanton, K., Agarwal, R., Doswell, F., & Thomas, C. M. (2008). Lifelong learn
ing: Becoming computer savvy at a later age. Educational Gerontology, 34(12), 1055–
1069.
Sharit, J., Hernandez, M. A., Czaja, S. J., & Pirolli, P. (2008). Investigating the roles of
knowledge and cognitive abilities in older adult information seeking on the web. ACM
Transactions on Computer-Human Interaction, 15(1), Art. 3.
Sharit, J., Hernandez, M. A., Nair, S. N., Kuhn, T., & Czaja, S. J. (2011). Health problem
solving by older persons using a complex government web site: Analysis and implications
for web design. ACM Transactions on Accessible Computing, 3(3), Art. 11.
Shaw, S., & Roberson, L. (2013). Social connectedness of deaf retirees. Educational
Gerontology, 39(10), 750–760.
Shepherd, C. E., & Aagard, S. (2011). Journal writing with Web 2. 0 tools: A vision for old
er adults. Educational Gerontology, 37(7), 606–620.
Siek, K. A., Rogers, Y., & Connelly, K. H. (2005). Fat finger worries: How older and
younger users physically interact with PDAs. In M. F. Costabile and F. Paternò (Eds.), Pro
ceedings Human-computer interaction (INTERACT 2005), Lecture Notes in Computer
Science (LNCS), 3585, (pp. 267–280).
Simpson, T., Camfield, D., Pipingas, A., Macpherson, H., & Stough, C. (2012). Improved
processing speed: Online computer-based cognitive training in older adults. Educational
Gerontology, 38(7), 445–458.
Simsik, D., Galajdova, A., Siman, D., Bujnak, J., Andrasova, M., & Novak, M. (2012). Mon
AMI Platform in elderly household environment: Architecture, installation, implementa
tion, trials and results. In Proceedings of 13th international conference on computers
helping people with special needs (ICCHP ‘12) (pp. 419–422).
Siriaraya, P., Ang, C. S., & Bobrowicz, A. (2014). Exploring the potential of virtual worlds
in engaging older people and support healthy aging. Behaviour and Information Technolo
gy, 33(4), 283–294.
Sjölinder, M., Höök, K., Nilsson, L.-G., & Andersson, G. (2005). Age differences and the
acquisition of spatial knowledge in a three-dimensional environment: Evaluating the use
of an overview map as a navigation aid. International Journal of Human-Computer Stud
ies, 63(6), 537–564.
Slegers, K., van Boxtel, M. P. J., & Jolles, J. (2007). The effects of computer training and
internet usage on the use of everyday technology by older adults: A randomized con
trolled study. Educational Gerontology, 33(2), 91–110.
Smith, A. L., & Chaparro, B. S. (2015). Smartphone text input method performance, us
ability, and preference with younger and older adults. Human Factors, 57(6), 1015–1028.
Page 57 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Smith, D. J. (2005). Senior users of the internet: Lessons from the cybernun study. Univer
sal Access in the Information Society, 4(1), 59–66.
Sokoler, T., & Svensson, M. S. (2007). Embracing ambiguity in the design of non-stigma
tizing digital technology for social interaction among senior citizens. Behaviour and Infor
mation Technology, 26(4), 297–307.
Soubelet, A. (2012). Computer use and the relation between age and cognitive
(p. 181)
Spreicer, W., Ehrenstrasser, L., & Tellioglu, H. (2012). kommTUi: Designing communica
tion for elderly. In Proceedings of 13th international conference on computers helping
people with special needs (ICCHP ‘12) (pp. 705–708).
Stark-Wroblewski, K., Edelbaum, J. K., & Ryan, J. J. (2007). Senior citizens who use e-mail.
Educational Gerontology, 33(4), 293–307.
Stenitzer, M., Putzhuber, M., Nemecek, S., & Büchler, F. (2008). Accessible online shops
for the older generation and people with disabilities. In Proceedings of 11th international
conference on computers helping people with special needs (ICCHP ‘08) (pp. 462–465).
Stephens, E. C., Carswell, C. M., & Schumacher, M. M. (2006). Evidence for an elders’ ad
vantage in the naïve product usability judgments of older and younger adults. Human
Factors, 48(3), 422–433.
Stoltz-Loike, M., Morrell, R. W., & Loike, J. D. (2005). Usability testing of BusinessThink
ing™ e-Learning CD-ROMs with older adults. Educational Gerontology, 31(10), 765–786.
Stössel, C., & Blessing, L. (2010). Mobile device interaction gestures for older users. In E.
Hvannberg, M. K. Lárusdóttir, A. Blandford, & J. Gulliksen (Eds.), Proceedings of the 6th
Nordic conference on human-computer interaction (NordiCHI ‘10) (pp. 793–796).
Stronge, A. J., Rogers, W. A., & Fisk, A. D. (2006). Web-based information search and re
trieval: Effects of strategy use and age on search success. Human Factors, 48(3), 434–
446.
Struve, D., & Wandke, H. (2009). Video modeling for training older adults to use new
technologies. ACM Transactions on Accessible Computing, 2(1), Art. 4.
Such, M. J., Barberà, R., Poveda, R., Belda-Lois, J.-M., Gómez, A., López, A., Cort, J. M., &
Sánchez, M. (2006). The use of emotional design techniques in user oriented design of in
terfaces within a smart house environment: Case study. Technology and Disability, 18(4),
201–206.
Sveistrup, H., Lockett, D., Edwards, N., & Aminzadeh, F. (2006). Evaluation of bath grab
bar placement for older adults. Technology and Disability, 18(2), 45–55.
Page 58 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Swallow, D., Petrie, H., Power, C. and D. N. Edwards, A. D. N. (2015). Using photo diaries
to elicit user requirements from older adults: A case study on mobility barriers. In J. Abas
cal, S. Barbosa, M. Fetter, T. Gross, P. Palanque, & M. Winckler (Eds.), Proceedings Hu
man-computer interaction, Part I (INTERACT 2015). Lecture Notes in Computer Science,
9296, (pp. 147–164).
Szymkowiak, A., Morrison, K,., Gregor, P., Inglis, E. A., Shah, P., Evans, J. J., & Wilson, B.
A. (2006). A memory aid with remote communication: Preliminary findings. Technology
and Disability, 17(4), 217–225.
Tee, K., Bernheim Brush, A. J., & Inkpen, K. M. (2009). Exploring communication and
sharing between extended families. International Journal of Human-Computer Studies,
67(2), 128–138.
The, P.-L., Lim, W. M., Ahmed, P. K., Chan, A. H. S., Loo, J. M. Y., Cheong, S.-N., & Yap, W.-
J. (2017). Does power posing affect gerontechnology adoption among older adults? Behav
iour and Information Technology, 36(1), 33–42.
Thomas, L., & Briggs, P. (2014). An older adult perspective on digital legacy. In V. Roto, J.
Häkkilä, Lárusdóttir, K. Väänänen-Vainio-Mattila, O. Juhlin, T. Olsson & E. Hvannberg
(Eds.), Proceedings of the 8th Nordic conference on human-computer interaction
(p. 182)
Torun, M., van Kasteren, T., Incel, O. D., & Ersoy, C. (2012). Complexity versus page hier
archy of a GUI for elderly homecare applications. In Proceedings of 13th international
conference on computers helping people with special needs (ICCHP ‘12) (pp. 689–696).
Trewin, S., Richards, J. T., Hanson, V. L., Sloan, D., John, B. E., Swart, C., & Thomas, J. C.
(2012). Understanding the role of age and fluid intelligence in information search. In Pro
ceedings of the 14th international ACM SIGACCESS conference on computers and acces
sibility (ASSETS ‘12) (pp. 119–126).
Tsai, H.-Y. S., Shillair, R. Cotten, S. R., Winstead, V., & Yost, E. (2015). Getting grandma
online: Are tablets the answer for increasing digital inclusion for older adults in the U.S.?
Educational Gerontology, 41(10), 695–709.
Tsuji, A., Yabuno, N., Kuwahara, N., & Morimoto, K. (2014). The design and evaluation of
the body water management system to support the independent living of the older adult.
In Proceedings of 14th international conference on computers helping people with special
needs (ICCHP ‘14) (pp. 433–436).
Page 59 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Turner, P., Turner, S., & van de Walle, G. (2007). How older people account for their expe
riences with interactive technology. Behaviour and Information Technology, 26(4), 287–
296.
Uzor, S., Baillie, L., Skelton, D., & Fairlie, F. (2011). Identifying barriers to effective user
interaction with rehabilitation tools in the home. In P. Campos, N. Graham, J. Jorge, N.
Nunes, P. Palanque, & M. Winckler (Eds.), Proceedings Human-computer interaction (IN
TERACT 2011). Lecture Notes in Computer Science, 6947 (pp. 36–43).
Vacher, M., Caffiau, S., Portet, F., Meillon, B., Roux, C., Elias, E., … Chahuara, P. (2015).
Evaluation of a context-aware voice interface for ambient assisted living: Qualitative user
study vs. quantitative system evaluation. ACM Transactions on Accessible Computing,
7(2), Art. 5.
van den Heuvel, E., Jowitt, F., & McIntyre, A. (2012). Awareness, requirements and barri
ers to use of assistive technology designed to enable independence of people suffering
from Dementia (ATD). Technology and Disability, 24(2), 139–148.
van der Geest, T., van der Meij, H., & van Puffelen, C. (2014). Self-assessed and actual In
ternet skills of people with visual impairments. Universal Access in the Information Soci
ety, 13(2), 161–174.
van der Heide, L. A., Willems, C. G., Spreeuwenberg, M. D., Rietman, J., & de Witte, L. P.
(2012). Implementation of CareTV in care for the elderly: The effects on feelings of loneli
ness and safety and future challenges. Technology and Disability, 24(4), 283–291.
van Volkom, M., Stapley, J. C., & Malter, J. (2013). Use and perception of technology: Sex
and generational differences in a community sample. Educational Gerontology, 39(10),
729–740.
Vetere, F., Davis, H., Gibbs, M., & Howard, S. (2009). The Magic Box and Collage: Re
sponding to the challenge of distributed intergenerational play. International Journal of
Human-Computer Studies, 67(2), 165–178.
Vines, J., Blythe, M., Dunphy, P., & Monk, A. (2011). Eighty something: Banking for the
older old. In Proceedings of the 25th international BCS human computer interaction con
ference (BCS HCI ‘11) (pp. 64–73).
Viswanathan, P., Little, J. L., Mackworth, A. K., & Mihailidis, A. (2011). Navigation and ob
stacle avoidance help (NOAH) for older adults with cognitive impairment: A pilot study. In
Proceedings of the 13th international ACM SIGACCESS conference on computers and ac
cessibility (ASSETS ‘11) (pp. 43–50).
Volkmann, T., Sengpiel, M., & Jochems, N. (2016). Historytelling: A website for the
(p. 183)
Page 60 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Vutborg, R., Kjeldskov, J., Pedell, S., & Vetere, F. (2010). Family storytelling for grandpar
ents and grandchildren living apart. In E. Hvannberg, M. K. Lárusdóttir, A. Blandford & J.
Gulliksen (Eds.), Proceedings of the 6th Nordic conference on human-computer interac
tion (NordiCHI ‘10) (pp. 531–540).
Waara, N., & Risser, R. (2013). Exploring the influence of online traveller information ser
vices on the use of public transport by older people and people with functional limita
tions: A mixed methods approach. Technology and Disability, 25(1), 15–25.
Walker, B. L., & Harrington, S. S. (2008). Computer-based instruction and the Web for de
livering injury prevention training. Educational Gerontology, 34(8), 691–708.
Wang, L., Rau, P.-L. P., & Salvendy, G. (2011). Older adults’ acceptance of information
technology. Educational Gerontology, 37(12), 1089–1099.
Wang, L., Sato, H., Rau, P.-L. P., Fujimura, K., Gao, Q., & Asano, Y. (2008). Chinese text
spacing on mobile phones for senior citizens. Educational Gerontology, 35(1), 77–90.
Webster, G., Fels, D. I., Gowans, G., & Hanson, V. L. (2011). Portraits of individuals with
dementia: Views of care managers. In Proceedings of the 25th international BCS human
computer interaction conference (BCS HCI ‘11) (pp. 331–340).
Webster, G., & Hanson, V. L. (2014). Technology for supporting care staff in residential
homes. ACM Transactions on Accessible Computing, 5(3), Art. 8.
Werner, J. M., Carlson, M., Jordan-Marsh, M., & Clark, F. (2011). Predictors of computer
use in community dwelling, ethnically diverse older adults. Human Factors, 53(5), 431–
447.
Wherton, J. P., & Monk, A. F. (2008). Technological opportunities for supporting people
with dementia who are living at home. International Journal of Human-Computer Studies,
66(8), 571–586.
Wilkinson, C., Langdon, P., & Clarkson, J. (2010). Observing learning and conceptual de
velopment through novel product interaction. In Proceedings of the 24th BCS interaction
specialist group conference (BCS HCI ‘10) (pp. 328–336).
Wilson, J., Curzon, P., & Duncker, E. (2015). Exploring older women’s confidence during
route planning. Behaviour and Information Technology, 34(7), 725–740.
Wilson, M., Doyle, J., & McTaggart, G. (2015). Designing stress management interven
tions to older adults to improve wellbeing. In Proceedings of the 2015 British Human
Computer Interaction Conference (British HCI 2015) (pp. 307–308).
Page 61 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Wittenberg-Lyles, E., Parker Oliver, D. P., Demiris, G., & Shaunfield, S. (2012). Benefits
and challenges of the passport broadcast intervention in long-term care. Educational
Gerontology, 38(10), 691–698.
Wittland, J., Brauner, P., & Ziefle, M. (2015). Serious games for cognitive training in ambi
ent assisted living environments-a technology acceptance perspective. In J. Abascal, S.
Barbosa, M. Fetter, T. Gross, P. Palanque, & M. Winckler (Eds.), Proceedings Human-com
puter interaction, Part I (INTERACT 2015). Lecture Notes in Computer Science, 9296,
(pp. 453–471).
Wockl, B., Wimmer, B., Yildizoglu, U., Leitner, M., & Tscheligi, M. (2011). “Accept” or “De
cline”: Alternative options for video telephony tools for inter-generational family commu
nication. In Proceedings of the 25th international BCS human computer interaction con
ference (BCS HCI ‘11) (pp. 253–258).
Wockl, B., Yildizoglu, U., Buber, I., Diaz, B. A., Kruijff, E., & Tscheligi, M. (2012).
(p. 184)
Basic senior personas: A representation design tool covering the spectrum of European
older adults. In Proceedings of the 14th international ACM SIGACCESS conference on
computers and accessibility (ASSETS ‘12) (pp. 25–32).
Wolters, M., Georgila, K., Moore, J. D., & MacPherson, S. E. (2009). Being old doesn’t
mean acting old: How older users interact with spoken dialog systems. ACM Transactions
on Accessible Computing, 2(1), Art. 2.
Wood, E., Lanuza, C., Baciu, I., MacKenzie, M., & Nosko, A. (2010). Instructional styles,
attitudes and experiences of seniors in computer workshops. Educational Gerontology,
36(10–11), 834–857.
Wood, J. M., Tyrrell, R. A., & Carberry, T. P. (2005). Limitations in drivers’ ability to recog
nize pedestrians at night. Human Factors, 47, 644–653.
Wulf, L., Garschall, N., Himmersbach, H., & Tscheligi, M. (2014). Hands free-care free: El
derly people taking advantage of speech-only interaction. In V. Roto, J. Häkkilä, Lárusdót
tir, K. Väänänen-Vainio-Mattila, O. Juhlin, T. Olsson & E. Hvannberg (Eds.), Proceedings of
the 8th Nordic conference on human-computer interaction (NordiCHI ‘14) (pp. 203–206).
Wulf, L., Garschall, M., Klein, M., & Tscheligi, M. (2014). The influence of age and device
orientation on the performance of touch gestures. In Proceedings of 14th international
conference on computers helping people with special needs (ICCHP ‘14) (pp. 583–590).
Xie, B. (2007). Information technology education for older adults as a continuing peer-
learning process: A Chinese case study. Educational Gerontology, 33(5), 429–450.
Xie, B., Druin, A., Fails, J., Massey, S., Golub, E., Franckel, S., & Schneider, K. (2012).
Connecting generations: Developing co-design methods for older adults and children. Be
haviour and Information Technology, 31(4), 413–423.
Page 62 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Xie, B., Watkins, I., Golbecka, J., & Huanga, M. (2012). Understanding and changing older
adults’ perceptions and learning of social media. Educational Gerontology, 38(4), 282–
296.
Xu, Q., Ng, J. S. L., Tan, O. Y., & Huang, Z. (2015). Needs and attitudes of Singaporeans
towards home service robots: A multi-generational perspective. Universal Access in the
Information Society, 14(4), 477–486.
Yanguas, J. J., Buiza, C., Etxeberria, I., Galdona, N., Gonzalez, M. F., & Urdaneta, E.
(2006). A randomized, placebo-controlled study of the efficacy of cognitive intervention
on elderly people and on patients with Alzheimer’s disease. In Proceedings of 10th inter
national conference on computers helping people with special needs (ICCHP ‘06) (pp.
759–765).
Zakraoui, J., & Zagler, W. (2012). A method for generating CSS to improve web accessibil
ity for old users. In Proceedings of 13th international conference on computers helping
people with special needs (ICCHP ‘12) (pp. 329–336).
Zaphiris, P., & Sarwar, R. (2006). Trends, similarities, and differences in the usage of teen
and senior public online newsgroups. ACM Transactions on Computer-Human Interac
tion, 13(3), 403–422.
Zhang, B., Lau, P.-L. P., & Salvendy, G. (2009). Design and evaluation of smart home user
interface: Effects of age, tasks and intelligence level. Behaviour and Information Technol
ogy, 28(3), 239–249.
Zhang, C., Tian, Y., & Capezuti, E. (2012). Privacy preserving automatic fall detection for
elderly using RGBD Cameras. In Proceedings of 13th international conference on comput
ers helping people with special needs (ICCHP ‘12) (pp. 625–633).
Zheng, R., Spears, J., Luptak, M., & Wilby, F. (2015). Understanding older adults’
(p. 185)
Zhou, J., Rau, P.-L. P., & Salvendy, G. (2014). Age-related difference in the use of mobile
phones. Universal Access in the Information Society, 13(4), 401–413.
Zhou, J., Rau, P.-L. P., & Salvendy, G. (2014). Older adults’ use of smart phones: An investi
gation of the factors influencing the acceptance of new functions. Behaviour and Informa
tion Technology, 33(6), 552–560.
Ziefle, M., & Bay, S. (2005). How older adults meet complexity: Aging effects on the us
ability of different mobile phones. Behaviour and Information Technology, 24(5), 375–389.
Page 63 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Technology for Older People: A Review of Recent Research
Ziefle, M., & Bay, S. (2006). How to overcome disorientation in mobile phone menus: A
comparison of two different types of navigation aids. Human-Computer Interaction, 21,
393–433.
Ziefle, M., Pappachan, P., Jakobs, E. M., & Wallentowitz, H. (2008). Visual and auditory in
terfaces of advanced driver assistant systems for older drivers. In Proceedings of 11th in
ternational conference on computers helping people with special needs (ICCHP ‘08) (pp.
62–69).
Ziefle, M., Schroeder, U., Strenk, J., & Michel, T. (2007). How younger and older adults
master the usage of hyperlinks in small screen devices. In Proceedings of the SIGCHI
conference on human factors in computing systems (CHI 2006) (pp. 307–316).
Helen Petrie
Jenny S. Darzentas
Jenny S. Darzentas was the Marie Curie Advanced Researcher Fellow in the Depart
ment of Computer Science at the University of York 2016–2018 during the writing of
the chapter. She is currently Assistant Professor at the Department of Product and
Systems Design Engineering, University of the Aegean, Greece. Her research inter
ests are in accessibility, service design and systems thinking, and information design.
She has worked on collaborative research projects funded by the European Union on
HCI, intelligent tutoring, decision support, library and information systems, and uni
versal design. She also has an interest in accessibility issues in international (ISO)
and European (CEN/CENELEC) standardization efforts through her voluntary work
with ANEC (www.anec.gr). She has published widely on all these subjects.
Page 64 of 64
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.7
Humans beings in the 21st century face significant social and global change. Ever-evolv
ing digital technologies are increasingly embedded in the material, economic, and socio-
cultural milieu; while global crises in climate change present challenges to human and
global security and resilience. Social science and human-computer interaction research
has investigated how digital systems might help to understand current environmental
changes and intervene in the problematic human relationships to scarce resources of the
natural world. This chapter reviews research contributions of sustainable human-comput
er interaction (HCI) and the social sciences on human consumption of resources most
crucial to human life: water, energy, and food (WEF). Briefly outlining the current and on
going evolution of digital technologies particularly concerned with embedded urban digi
tal infrastructures in “smart” and automated technologies and the Internet of Things, it
then touches on the scope and scale of the simultaneous environmental challenges posed
by population growth and urbanization. It introduces sustainable HCI as one approach
that directly addresses both trends. The chapter then outlines the most significant ap
proaches that have informed the development of “sustainable HCI,” and reviews impor
tant empirical contributions underpinning the developing interdisciplinary research in the
field. It outlines the current understanding of household resource use and considers how
developing digital technologies might support domestic resource conservation and miti
gate intensive domestically based resource consumption. The chapter closes with obser
vations on the shifting relationships (and sustainable HCI research into them) that might
constitute future ways of being in a sustainable digital age.
Keywords: domestic resource conservation, domestic resource consumption, domestically based resource con
sumption, environmental challenges, household resource use, social science, sustainable HCI, sustainable human-
computer interaction
Page 1 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
At the same time, we have simultaneously seen challenges that pose fundamental ques
tions about the continued prosperity (or security, or in some cases even survival) of hu
mankind and our technological, economic, political, social, and cultural futures. Not least
of these challenges are those posed by both climate change, and a related and (p. 187) on
going large-scale depletion or waste of increasingly scarce natural resources. These chal
lenges are global (indeed also planetary) in nature, and are expressed over multiple
scales of human social life—from the practices and relations of the everyday, to the orga
nization of communities, cities and regions, to large-scale technical, economic, and politi
cal systems at national and international levels. It would be something of an understate
ment to remark that these are not inconsiderable environmental challenges for global hu
manity to be facing.
Given these two widespread and significant sets of rapid social change, this chapter con
siders the ways that humanity’s digital and environmental futures are becoming inter
twined, and how each domain is implicated in shaping the economic, cultural, and politi
cally mediated futures of the other: that is, a complex digital nexus.
Whilst the natural resources that human beings exploit are innumerable, the most funda
mental of these are those that are crucial for the sustenance of human life itself: The
availability of, and access to, Water, Energy, and Food (WEF). The ways that human be
ings exploit (or use, or consume, or transform) these crucial WEF resources are, of
Page 2 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
course, variable, and are considerably differentiated across globally interconnected soci
eties, depending on a range of variables such as: Historical systems of economic develop
ment, the deployment of technical systems at different scales, the politics of colonization
and globalization, and the social and cultural values and norms that define the relation
ships between “natures” and “cultures.”
At the beginning of the twenty-first century, however, further factors are increasingly
coming into play. Two of the most important of these are population growth and urbaniza
tion. On the one hand, pressures are increasing on the planetary WEF resource base at
tributable to the simple calculation of global population growth (Maheshwari et.al., 2014).
The United Nations Department of Economic and Social Affairs (UNDESA) currently esti
mates the global population at around 7.6 billion, with a projection to 2030 of 8.6 billion,
including “roughly 83 million being added to the world’s population every
year” (UNDESA, 2017a). Of those 7.6 billion around the world, 665 million have no access
to clean drinking water, 795 million are undernourished or malnourished, 1.4 billion have
no access to electricity, and 2.4 billion have no access to basic sanitation services (UN
DESA, 2017b). While the implications of such growth for the environment have been ap
parent for quite some time, studies in recent years have highlighted population growth as
an increasingly pressing challenge in relation to current global economic and political or
ganizations of resource capture, distribution and use.
On the other hand, populations are not only growing, they are also simultaneously and
progressively urbanizing. The United Nations (2018) estimates that 55% of the world’s
population currently live in urban areas, and project that this figure will reach 68% by
2050. This means that cities, and the organization of them, are becoming an ever-more
critical locus of resource deployment and consumption—and are therefore vital sites of
(p. 188) evaluation for those processes (Colucci et al., 2017). The dwelling places of con
A Nexus of Relationships
Alongside the critical role of the expansion of growing urban concentrations in relation to
population growth, attention has at the same time further been drawn to the relationships
between the core WEF resources themselves in a nexus of interdependencies (Abdul
Salam et al., 2017; Bhaduri et al., 2015). This nexus thinking has been largely framed by
the notion of a WEF nexus (or multiple nexii) of resources—the ways in which any shifts
or perturbations in the availability, process, distribution or consumption of one WEF re
source system will have a “tipping point” into “ripple effects” on the socio-technical sys
tems organizing the exploitation, deployment and consumption of the other resources
Page 3 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
(Beddington, 2009; McGrane et al., 2018; Smajgl et al., 2016), with widespread social im
plications.
The focus of this chapter is therefore to review environmental social science and human-
computer interaction (HCI) research on the ways in which digital systems can potentially
intervene in urban domestic spaces to investigate, analyses and understand household
WEF resource consumption, and design digital infrastructures to mitigate against unsus
tainable consumption.
Chapter Overview
Towards this more general goal, the chapter outlines social research-based responses to
the environmental challenges presented by population growth, urbanization and climate
change, and their effects on the consumption of related WEF resources.
The chapter then goes on to consider the various strands of theory that have informed the
conceptual development of Sustainable HCI over time, how those various theoretical
frameworks have been employed in empirical investigations of WEF resource use, and
their implications for digital systems in general and sustainable HCI in particular. (p. 189)
Accordingly, the section Investigating Physical Resource Use addresses those studies that
have attempted to represent the human activities that consume WEF resources across
different social domains, and the systems, organizations, and interactions involved—from
large-scale systems of resource distribution and consumption, to a range of micro-land
scapes of resource use (including studies employing digital technologies to such ends). In
the following section, Investigating Rational Choice and Behaviour Change, we then re
view those studies that have used theories of behaviour and cognition to analyses what
people do with physical resources in the process of consumption, and under what condi
tions. A particular concern here is to examine those research designs that are concerned
with the possibilities for behavioral influence and social change towards more sustainable
resource relationships.
We then turn to a review of those projects that have attempted to operationalize concepts
such as Attitudes, Values and Lifestyles in the pursuit of understanding the social aspects
of resource consumption that can then be used to guide the design, development and im
plementation of digital systems towards various dimensions of sustainability. In the final
section, Investigating Practices and Networks, we go on to consider how theories of prac
tices and networks have been deployed at different scales to both understand the dynam
ics of resource use, and to identify potential levers for “doing things differently” with and
Page 4 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
through digital systems. Table 7.1 summarizes the approaches, key concepts, methodolo
gies, and emphases in studies associated with each section.
Page 5 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Table 7.1 Summary of Approaches, Key Concepts, Methodologies, and Studies in Each Section
Page 6 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Surveys
Interviews
Rational choice and Behavioral psychol Individual action (including online) (including online)
behaviour change ogy Cognition Surveys Individually fo
Cognitive and social Agency Structured and se cussed
psychology mi-structured inter Single-resource fo
views cussed
Observation Aggregate digital
measurement of re
source use
Aggregate survey
responses
Individual qualita
tive responses
Page 7 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Practices and net Environmental, po Habits and routines (including online) Practice focussed
works litical, and cultural Material infrastruc Observation (doing) across so
sociology tures Ethnography cial scales
Socio-technical net Knowledge-mean Semi-structured in Nexus of systems,
works ing-action compe terviews things, thinking, do
Actor-network theo tencies Visual, virtual, and ing, and meaning
ry Human and non-hu sensory methods Negotiation of so
man (digital) agen Participatory meth cial complexity
cies ods
Revisiting sustain Extensively interdis Digital information (including online) (including online)
able HCI ciplinary approach transformation Participatory meth Digital feedback
es Influence ods systems
Computing-based Design-based meth Displays
Design-based ods Applications
Social science- Interventions Social media
based Ethnography Interventions
Semi-structured in Workshops
terviews Games
Visual, virtual, and Negotiation of digi
sensory methods tal-environmental-
social complexity
across scales
Page 8 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
HCI approaches to human-digital relations are focussed at the “interface” between com
puting systems and their human “users,” and involve both understanding the relationship
between them (given the contexts of their interactions), and planning design interven
tions for the development of alternative or improved digital systems. Based on critical de
sign studies, Blevis (2007, p. 503) argues that an important dimension of Sustainable HCI
is the efforts by technology designers to build sustainability into both material and data-
based computing products—including in their “invention, disposal, renewal and reuse.”
Mankoff et al. (2007) characterize this position as advocating (p. 190) (p. 191) (p. 192) “sus
tainability in design” (reducing the resource intensity of computing systems), to which
they add an orientation towards interaction in “sustainability through design”—designing
digital media technologies to influence broad socio-cultural trends towards sustainability.
According to DiSalvo et al., these two broad-based characterizations of the field of Sus
tainable HCI have since produced a proliferation of HCI sub-specialties in both pervasive
(in design) and persuasive (through design) computing systems oriented towards sustain
ability. Woodruff and Mankoff (2009) summarizes the combination of these approaches as
the “core challenges” of Sustainable HCI, “including monitoring the state of the physical
world; managing the direct and indirect impacts of large-scale human enterprises such as
agriculture, transport, and manufacturing; and informing individuals’ personal choices in
consumption and behavior” (DiSalvo et al., 2010, p. 1976). Drawing on Goodman’s (2009)
characterization of Sustainable HCI into three broad discursive and empirical clusters of
environment-digital understandings—including “sustainable interaction design,” “revi
sioning consumption,” and “citizen sensing”—DiSalvo et al. (2010) further extend an eval
uation of the relevant research literature to identify multiple sub-specialties in Sustain
able HCI that both relate to, and challenge, each other—and in doing so they provide an
excellent critical map of this extensive field.
In the following sections then, the chapter reviews the empirical research in HCI and en
vironmental social sciences that has variously addressed questions relating to human in
teraction with both digital technologies and resources in the consumption spaces of ur
ban domestic dwellings. From mapping physical systems and infrastructures via digital
Page 9 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
means, to considering the factors that affect human interaction with and transformation
or consumption of both natural resources and digital systems in the home, the chapter
aims to summarize the contemporary state of play in relevant research, and to indicate di
rections for development in sustainable digital design.
(p. 193) In the investigation of WEF relationships, natural science and engineering disci
plines tend to focus on the quantitative measurement of extant and available physical re
sources (and the modelling and visualization of available macro-scale national and inter
national data pertaining to such via digital systems). Such data may then be used by so
cial research that focuses on the human exploitation, organization, distribution and gov
ernance of such resources via economic and technical (especially urban) infrastructures
that make the harvest, supply, delivery and circulation of resources possible (Kalbar et
al., 2016, 2018; McGrane et al., 2018).
Relevant empirical examples may be derived from a number of sources,1 such as utility
companies’ annual supply and distribution reporting, analyzed with respect to official
population demographics (such as those from the Office for National Statistics) derived
via digitally generated data. In the case of water, for example, Ofwat (the independent UK
Water Services Regulation Authority) requires water utility companies to measure (via ag
gregate—both analogue and digital—water flow distribution meters) and report the cubic
metric distribution of water to households and non-households (business and industry), as
well as accounting for waste (leakages) and operational usage (Ofwat, 2018). Similar na
tional-level statistics, often generated via the deployment of digital metering systems, are
available via various government departments and agencies, such as (in the UK) the De
partment for Business, Energy and Industrial Strategy (DBEIS; for example, see their En
ergy Use in the UK, 2018a; Digest of UK Energy Statistics, 2018b) reporting on energy
use—households comprise 28% of total UK energy consumption (DBEIS, 2018a)—or vari
ous aggregate-level food statistics from the Department of Environment, Food and Rural
Affairs (DEFRA), the Environment Agency, and the Food Standards Agency (FSA).
Page 10 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Digital systems, of course, support the collection, processing, and analysis of such data.
But whereas the foregoing research attempts to map physical resource consumption at
the level of entire populations, digital developments situated in HCI often instead turn to
the innovation of digital systems to map such relationships at a more fine-grained scale.
Drawing on approaches where the focus is “sustainability in design,” a prominent ap
proach is the design of urban household sensor-based information systems that are capa
ble of collecting and managing data on local natural resource use. In the domestic
sphere, the ecosystems comprise the spaces of the built environments that are inhabited,
and the distribution and circulation of natural resources within (and beyond) them. The
intent in such digital systems, then, is the quantitative measurement of resource use or
consumption within dwellings in order to be able to understand how, where, and when re
source consumption is taking place. Such measurements can be both aggregated (for ex
ample, measuring total energy use within the dwelling via “smart” [digitally based] me
tering), and/or disaggregated (such as sensor systems to measure energy or water use
down to the appliance level, or for different daily or seasonal periods, or even in compari
son to comparable neighborhoods or areas).
Such feedback systems are largely informational, and as such they assume a rational and
decision-making human subject for their interpretation, and the ability to act on that in
formation and the interpretation of it. However, such digital systems (and the design of
them) are also sometimes significantly oriented towards persuasion and “behaviour
change”: As such, the design, deployment and use of persuasive digital systems is much-
debated in the Sustainable HCI literatures. In the following section we therefore consider
those studies that have deployed theories of cognition and behaviour to not only analyze
what people do with the physical WEF resources available to them in their domestic envi
ronments (and beyond), but also whether innovative digital systems might be designed
and developed to persuade consumers of the need for (or desirability of) change, or influ
Page 11 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
ence behaviour towards more sustainable practices of resource use within the domestic
sphere.
There are a number of accounts of nature-people relationships that have derived their ap
proaches from the discipline of social psychology in general, and environmental social
psychology more specifically. The focus of these approaches is to understand and explain
the ways that individuals encounter and experience WEF resources in their everyday
lives, and, most importantly, what they do with them. Here the focus shifts to the position
of the individuals as sovereign agents within such structures as economic decision mak
ers, exercising rational choice and acting in self-interest with respect to both the produc
tion and consumption of goods and services within markets (Barr et al., 2011b). With re
spect to the uses of WEF resources then, individuals are positioned predominantly as con
sumers, and the aggregate outcomes of individuals’ rational judgements in consumption
are assumed to maximize the efficiencies of resource supply and demand, and guarantee
rational resource distribution.
Alongside the more micro-scale investigations of digital systems mapping resource use in
domestic spaces then, there are a range of projects that attempt to simultaneously out
line individual (or household) environmentally focussed behaviour, especially where con
sumption is a matter of the intersections between economic decision making or behav
iour, and those activities concerned with resource use (Advani et al., 2013; Chitnis et al.,
2013, 2014; Druckman et al., 2011; Ofwat, 2011; Oikonomou et al., 2009).
If the concept of rational action positions the individual as a pre-eminent economic social
actor, further approaches in environmental psychology extend the conceptualization of
human action from the exclusively economic, to other social realms. The focus here is
again on what individuals do, rather than who they are or what they experience. Other
projects therefore focus towards more extensive behavioral dimensions of resource use it
self. In these types of quantitative studies, digital and online research tools become par
Page 12 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
In energy, Palmer and Terry’s (2014) Powering the nation is based on the Household Elec
tricity Survey, consisting of self-reported and retrospective behaviours of a sample of 250
UK households (another example of methodology using computer-assisted personal inter
views), alongside extensive digital energy consumption monitoring down to appliance lev
el. There are now also a significant number of larger-scale surveys of food behaviour. The
UK Food and You survey, for example, provides a broad-based snapshot of the United
Kingdom’s food provisioning, preserving, cooking, eating, and waste behaviors in a self-
reported representative questionnaire survey of 3,453 respondents (p. 196) (Food Stan
dards Agency, 2014a, 2014b). Similarly, the Waste and Resources Action Program (WRAP)
provides aggregate statistics on food waste, including that at the household level (WRAP,
2017).
It is within this broadly environmental social science research milieu that Sustainable
HCI is located, and where the broad question of potential digital interventions towards
sustainable behaviour might take place. According to the APA (2018) “behaviours” are de
fined as “an organism’s activities in response to external or internal stimuli, including ob
jectively observable activities, introspectively observable activities, … and non-conscious
processes.” In the case of WEF resource use, attention is therefore paid to those behav
iours directly related to environmental (causes and) effects. According to Stern (2000, p.
408), this “environmentally significant behaviour” is that which can
… reasonably be defined by its impact: the extent to which it changes the avail
ability of materials or energy from the environment or alters the structure and dy
namics of ecosystems or the biosphere itself … Some behavior, such as clearing
forest or disposing of household waste, directly or proximally causes environmen
tal change … Other behavior is environmentally significant indirectly, by shaping
the context in which choices are made that directly cause environmental change
… For example, behaviors that affect international development policies, commod
ity prices on world markets, and national environmental and tax policies can have
greater environmental impact indirectly than behaviors that directly change the
environment.
Stern goes on to note that the environmental impacts listed have historically been by-
products of activities aimed at the fulfilment of “human desires” (and the creation of tech
nologies and organizations to achieve them) rather than the straightforward sustenance
Page 13 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
of human life itself (Stern, 2000, p. 408: emphasis added). By conceptualizing environ
mentally significant behaviours as the product of human “desires” rather than of “needs,”
the approach therefore opens discursive space to invoke the possibility for change in hu
man behaviour with respect to the environment via social interventions, including via dig
ital interventions. The interventions proposed therefore tend towards persuasion of one
kind or another. If rational individuals can be convinced that maximizing their self-inter
ests can be aligned with a collective interest in maximizing resource use without damag
ing the sources of those resources (which will also therefore maximize future self-inter
ests), then changes to individual behaviour will “naturally” result as a consequence of ra
tional cognitive processes.3
Indeed, it is the design, development and evaluation of digital feedback systems toward
persuasion—whether aggregated or disaggregated—that are most extensively found in
the Sustainable HCI literature. That is, they include not only the measurement of re
source use to understand its dynamics, but also to represent that use and convey that in
formation to users in order to persuade them towards resource conservation—“sustain
ability through design” in “eco-feedback” systems (Froehlich et al., 2010). Studies explic
itly focussed on the creation of interventions for behaviour change tend to be directed to
wards the interactional design of their feedback components in terms of (p. 197) communi
cation, clarity, and goals, and the evaluation of the effectivity of such systems with re
spect to both human interactions with digital technologies, and/or concomitant impacts in
the form of observable changes in users’ behaviours towards sustainability (Fischer,
2008; Vassileva et al., 2013).
As is the case with studies of resource consumption in the social sciences more generally,
however, examples of intervention and persuasion here are often focussed on a single re
source—most commonly with respect to either energy (Bang et al., 2007; Bonino et al.,
2012; Froehlich, 2009; Gamberini et al., 2012; Oliveira et al., 2016; Riche et al., 2010; see
Hazas et al., 2011 for a useful review), or water (Erikson et al., 2012; Froehlich et al.,
2012; Kappel & Grechenig, 2009; Liu et al., 2015). Novel approaches to domestic prac
tices concerned with digital interaction design in food provisioning, preservation, prepa
ration and food waste have only more recently emerged in the Sustainable HCI research
base. Notable examples include understanding food consumption lifecycles using wear
able cameras (Ng et al., 2015), or “the pervasive fridge,” a fridge-based digital system
mitigating against food waste (Rouillard, 2012) (see also Farr-Wharton et al., 2014a,
2014b on the use of “fridge-cams” for similar purposes).
Murtagh et al. (2014) remark that a range of studies have tended to confirm the view that
resource usage feedback technologies—for example, In-Home Displays (IHDs)—can make
some (at least marginal) difference in resource demand reduction. They point out, howev
er, that there is considerable heterogeneity amongst individuals and households, and
their own project on energy use indicated that whilst located feedback appears to be of
immediate utility in persuasion towards changes in behaviour, its effectiveness diminishes
Page 14 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Others tend to concur (Burchell et al, 2016; Boucher et al., 2012; Foster et al., 2010; Tira
do Herrero et al., 2018), with some claiming that intentional HCI interventions towards
persuading individuals are at least relatively limited in their effectiveness, and at most
such interventions themselves “narrow our visions of sustainability” (Brynjarsdottir et al.,
2012, p. 947). DiSalvo et al. (2010a), in their critical review of sustainable HCI, acknowl
edge that while there is diversity in design among the digital systems developed to per
suade—from ambient awareness systems that seek to provide information for knowledge
and understanding, to systems that seek to change both thinking and action—their
premises are often problematic. On the one hand, they can render aspects of environ
ments and the consumption of resources visible. On the other hand, they might attempt,
with various degrees of intent, to influence users to behave in ways deemed “more sus
tainable.” As DiSalvo et al. (2010a, p. 22) point out, this involves specific value judge
ments about what constitutes “sustainable behaviour,” and as such are also politically in
flected (even ideologically aligned) positions:
change that users don’t want, who gets to decide what change should happen and
how? Whose needs are met, and whose values matter?
Such approaches have therefore attracted critique on the basis that they are both reduc
tionist (to the level of the individual and their actions), and deterministic (to largely iso
lated causes and effects; (Barr et al., 2011a). In response, other psychologically oriented
approaches have therefore added some level of nuance, acknowledging that more than a
single factor might be involved in any behaviour change: Various and multiple individual
motivations, as well as collective altruistic motivations, might simultaneously qualify as
“self-interest.” Moreover, seemingly contradictory choices between competing individual
and collective motivations might also qualify as “rational”—as some have argued, “choice
matters” (Murtagh et al., 2015; Uzzell et al., 2006).
The focus on behaviour change is certainly not limited to the HCI exploration of resource-
conservation behaviours, and there is a wide range of social science studies more broadly
that also take individuals and/or their behaviours as the starting point for investigating
resource consumption. These include studies, both within HCI and beyond, that have at
tempted to capture wider aspects of environmental practice such as attitudes, values, and
lifestyles.
Page 15 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
One important and extensively debated concept in recent years has related to the formu
lation and deployment of a meta-category labelled lifestyles in an attempt to link the psy
chologically and individualistically oriented concerns described by behavioral and cogni
tive processes with wider socio-cultural concerns that account for values, but which also
recognize the interplay between individuals and the extensive and diverse social and cul
tural collectivities (at various scales) of which they are a part. Some researchers have, for
example, advocated attempts to formulate a broadly conceived typology of “lifestyle
groups” based on, for example, “environmental values and concern,” (p. 199) “socio-demo
graphic variables,” and “psychological factors” (Barr & Gilg, 2006; Gilg et al., 2005).
Many of these have also been explicitly oriented towards describing a home or household
as engaged in lifestyles, rather than focusing at the level of the individual or behaviour
per se (Barr & Gilg, 2006; for reviews across frameworks see Barr, 2016; Evans & Abra
hamse, 2009).
As Evans and Abrahamse (2009) point out however, the historic influence of policy shifts
and their orientation towards persuasion has also meant that the discourse of “sustain
able lifestyles” has become ever-more ubiquitous, but also therefore ever-more politically
inflected. Instead, in nearly every case where “sustainable lifestyles” are invoked, the
analysis reverts almost immediately to a consideration of “sustainable consumption” as
definitive of lifestyles (Barr et al., 2011a; Connolly & Prothero, 2008: Evans, 2011a; Hob
son, 2002; Shove & Warde, 2002; Spaargaren, 2003; Spaargaren & Oosterveer, 2010;
Spaargaren & Van Vliet, 2000). Hobson (2002), for example, explores the relationship be
tween the pro-environmental meanings of consumption and values relating to social jus
tice, arguing that rationalized formulations of “sustainable consumption” carry little cul
tural meaning, and are therefore unable to address collective social concerns. Seyfang
(2006) addresses similar themes with respect to the intersection of “sustainable con
sumption” and the concept of “ecological citizenship.”4
One response to some of this complexity has been the more extensive development of
mixed methods approaches to understand resource consumption in the domestic sphere.
Pullinger et al. (2013), for example, extend behavioral questionnaires to a sub-sample of
qualitative interviews to further explore the combination of factors that might contribute
to environmentally aware action and interaction concerning water use. Still others have
Page 16 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
turned entirely to a range of qualitative methods (such as interviews, focus groups, or di
aries, amongst other methods) to explore dimensions of behaviour that concern knowl
edge, attitudes, beliefs, values and lifestyles (including aspirations and assumptions).
Some explore these issues with respect to a range of environmental issues of concern to
individuals and households (e.g., Barr, 2006; Barr & Gilg, 2006), whereas others turn
their attention to resource consumption—and specific resources—in particular (Owen et
al., 2009; Wutich, 2009).
In this broad context, the responses of research in Sustainable HCI have also included the
methodological as well as the analytic, with the development of mixed methods projects
that attempt to capture some of these multiple dimensions of human actions and interac
tions with computing and the digital, as they pertain to domestic resource consumption.
Given that the focus of HCI has historically been concerned with the interaction between
digital systems and their users, the challenges for Sustainable HCI here include ways to
capture the multidimensionality of material action and interaction alongside dimensions
of practice that remain “unobservable.” Some HCI studies have therefore turned to alter
native frameworks to explore the relationship between home inhabitants and embedded
resources via digital technologies more extensively. Schwartz et al. (2013), for example,
extend behavioral or cognitive approaches to consider explicitly phenomenological and
ethnomethodological aspects of interaction with energy—rendering it visible, perceptible,
and therefore (p. 200) “accountable” via “ordering structures”—thereby capturing both
the observable, and the implicit. This shift in focus allows them to examine observable sit
uated practices at the microcosmic scale—the connections between thinking, being, and
doing. This widening of topics within the sustainabilities literature has allowed both so
cial science practitioners, and HCI designers, to focus their research approaches on com
binations of methods that are specifically based on theories of those practices.
Furthermore, in all of these debates, the concept of agency becomes particularly impor
tant—and agency of different types, from humans to (digital) non-humans, and from the
individual to collectivities such as digital systems. Some, for example, have evolved “ide
al-typical” typologies to characterize “environmental agency” (Spaargaren & Oostvesteer,
2010). According to this argument, even at the everyday level of the household, forms of
environmental agency are at the same time also necessarily mediated by the technolo
gies, objects, and infrastructures of consumption practices (organized by “distant oth
ers”), in different modes of appropriation and provision—including digital systems (see al
so van Vliet et al., 2005). They argue that attention to both (distributed) human practices
and non-human (especially digital) interventions are crucial. To these ends, a substantial
body of environmental social sciences literatures has turned to theories of human prac
tices in order to fully explore how human-environment relations are embedded in multiple
networks of action, interaction, knowledge, meaning, organization, and power at different
scales of social life.
Page 17 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Page 18 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Some projects are concerned with attempting to empirically map household consumption
as a set of practices in-depth, rather than attempting to outline the breadth of common
practices across more general populations. Early research here focussed on the (particu
larly routinized and habitual) activities, knowledges, and materialities framing consump
tion, using observational, interview, and ethnographic methods of various sorts (Shove,
2003; Shove & Warde, 2002; Shove et al., 2012; Southerton 2013; Spaargaren & Van Vli
et, 2000). Research has extended more general household studies to include a particular
focus on specific single resources, such as those oriented towards energy (Butler et al.,
2016; Genus & Jensen, 2019; Moroşanu, 2016; Shove & Walker, 2014; Strengers, 2012),
water (Vannini & Taggert, 2016), or food (Crivits & Paredis, 2013; Paddock, 2017; Sa
hakian & Wilhite, 2014; Warde, 2013, 2014).
Increasingly, practice research is also turning to the “nexus of practices” (Hui et al.,
2017) that form consumption in relation to a nexus of resources—such as that between
water and energy (Strengers, 2011; Strengers & Maller 2017; Strengers et al., 2014). At
times these studies drill down their analytic focus to particular nexus points such as a
cluster of related practices—for example, showering (Shove 2003) or washing (Kuijer,
Page 19 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
2017), doing laundry (Jack, 2013), or eating practices (Devaney & Davies, 2016)—and al
so often entail the innovative use of novel participatory, design-based, or interventionist
methodological strategies. At other times, the analytic focus is on those nexus points that
are materialized in the infrastructures of everyday life—such as the nexus of food and en
ergy in the case of the domestic freezer (Hand & Shove, 2007; Southerton & Shove, 2000),
or energy and water in the (potentially digital) washing machine (Bourgeois et al., 2014).
This latter focus on everyday materialities is where the relationship between the focus on
practices and the focus on (digital) technological networks is most significant—whether
that is cast in terms of the “infrastructures of consumption” (van Vliet et al., 2005), or the
“socio-technical networks” of humans and non-humans in Actor-Network Theory (ANT)
research, for example in water (Sofoulis, 2005; Sofoulis & Williams, 2008) or energy
(Strengers, 2012).
In this regard then, practice theories are particularly well-situated to explore multi-di
mensional phenomena such as a WEF nexus (Hui, Shove, & Schatzki, 2017) across over
lapping social contexts and multiple scales. Therefore, while not without its critics
(Cairns & Krzywoszynska, 2016), and despite its potential limitations and partialities
(Taherzadeh, Bithell, & Richards, 2018), the notion of a WEF nexus of resource interde
pendencies could potentially provide a recursive lens alongside practice theories to un
derstand domestic resource use. The focus on materiality—associated significant tech
nologies and infrastructures—simultaneously provides a lens through which to view po
tential emerging interdependencies between digital systems, local practices, and (p. 203)
resource infrastructures. Such arguments are particularly congruent with a consideration
of socio-technical systems and “actor-networks.”
Actor-network approaches share practice theory’s concern with paying attention to the
materialities within which embodied human beings are embedded—the things/objects and
technologies through which humans act and interact in the world. In HCI most broadly,
this therefore involves understanding human-social relationships as co-constitutive of hu
man-computer/object relationships in the context of digitally mediated social processes.
In the case of Sustainable HCI, where the focus is simultaneously environmental, the con
sideration of digital networks-and/as-things is coupled with a consideration of physical-re
sources-as-things, and humans interact with both.
Page 20 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
non-humans as well as humans—and both are currently widely employed in both the envi
ronmental social sciences and HCI literatures.
Smart meters, and digital technologies such as (still and video) cameras and/or sensor ar
rays, have all been variously deployed to both measure and understand resource-related
domestic practices. Larrabee Sønderlund et al. (2014), for example, explore and review
the different types of smart metering of water and their associated user feedback sys
tems, whilst with respect to food, Ganglbauer (2013) introduced—in addition to inter
views and home tours—a “FridgeCam” within households to record the situated practices
of food waste (see also Ganglbauer et al., 2013). The FridgeCam consisted of a mobile
phone camera attached to the refrigerator door capturing images automatically when ac
tivated by refrigerator door-opening. The captured images were then further uploaded to
a Facebook site to be shared amongst interested parties, which encouraged the social me
dia discussion of “appropriate” or “inappropriate” practices leading to food waste and/or
its mitigation (to supplement the narrative data from participants in interviews and
tours). Through these (digitally based) “technology probe” methods, Ganglbauer et al.’s
study therefore sought to utilize practice theory to “design strategies to support dis
persed as well as integrated food practices” (2013, p. 1)—that is, to explore how digital
technologies might be deployed to understand, intervene in, and feed back to users on
the assemblages of practices associated with their preservation, preparation, consump
tion and disposal of food to mitigate against waste. Ganglbauer et al.’s research therefore
echoed Comber and Thieme’s (2012) earlier study that developed a similar technology in
tervention in the form of a “BinCam” (a mobile phone capturing images when triggered
by the bin [garbage] lid, capturing still images), while additionally also instituting an on
Page 21 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
line community amongst their study participants to discuss the practices concerned
(Thieme et al., 2012).
It is only more recently that Sustainable HCI research has come to focus explicitly on
WEF relationships—the ways that resources and their associated practices and networks
of actors in the domestic sphere are interrelated and mutually dependent—rather than fo
cusing simply or intensively on single resources. For example, with respect to food and
energy research in HCI, Clear et al. (2013) introduced a “cooker cam” to explore prac
tices of cooking within shared student accommodation—focusing on both energy and
food. The aim of this study was to uncover the observable mundane, ubiquitous, and ha
bitual practices of food preparation at the site of the cooker (stove/range) within student-
shared households, amongst a demographic where design interventions might have a sig
nificant impact in transitional life stages. The “cooker cam” consisted of a motion-trig
gered wildlife trail camera mounted above the cooker (dubbed the “hobcam”), capturing
still images every 30 seconds when motion-activated. This was supplemented with data
from real-time energy smart meter readings for each cooking session recorded, and fur
ther supplemented with interview narratives on the experiential process and meaning of
cooking. Such multiple methods uncovered several potential directions for innovative de
sign interventions, including various smart/digital modifications to cooking appliances,
the possibilities of encouraging communal organization of food responsibility and sociali
ty via the design of mobile and social media applications or (p. 205) add-ons, or developing
digital tools to render the carbon intensity of particular foods and their preparation more
accessible and transparent to users, encouraging less energy-intensive diets (see also
Clear et al., 2016; Hupfeld & Rodden, 2012).
In the case of water and energy, Chetty et al. (2008) focused on “in the moment” house
hold resource consumption to map the relative “visibility” of resources and their infra
structures to participants in the course of their consumption practices. The aim of the
study was to develop digital display and control system tools, both for reflection and en
gagement, and to support and underpin the management of domestic resource consump
tion based on current management practices, technology use, and interaction with out
side stakeholders. Using home tours, semi-structured interviews and (digital image-
based) visual methods, the findings of the study underlined the importance of household
ers’ understandings of domestic utility systems, or more likely, their invisibility in the
practice of everyday life. The design interventions considered on the basis of the research
findings therefore focussed towards ways of making the production of water and energy
more visible and available to consumers via domestic digital toolkits (at the same time as
providing comparative and “benchmarking” consumption information at different urban,
regional and national scales). The intervention thus accounted for both diversity and in
equality in the design of those digital systems, and supported more collective as well as
individual agency in “green” behaviour change via those same tools.
In a similar vein to Chetty et al., Strengers (2011) draws explicitly on both practice theo
ries and concepts in socio-technical networks to explore the potential role of digital feed
back systems in encouraging sustainable water and energy consumption. Her review of
Page 22 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
different approaches and empirical strategies draw on research derived via methodolo
gies variously including ethnographic interviews and home tours as well as the deploy
ment of digital technologies. The digital systems explored include In-Home Displays
(IHDs) and smart meters of a range of different types, from visualization tools to render
real-time consumption visible, to the intersection of digital information systems with what
are considered “negotiable” or “non-negotiable” domestic practices. Strengers (2011, p.
319) concludes from her comparative review of different digital systems that digital feed
back mechanisms
have the potential to legitimize particular practices and to overlook those consid
ered non-negotiable … IHDs [In-Home Displays] can play a role in making socio-
technical systems of energy and water provision more relevant to householders’
everyday lives, and in questioning and debating non-negotiable practices. This will
necessitate repositioning and blurring the roles and responsibilities of resource
providers and consumers.
As Strengers’ study indicates, both HCI and social science studies focussed on practices
through the deployment and use of digital technologies remain commonly oriented to
wards the development of (digital) tools for persuasion towards “behaviour change”—the
Sustainable HCI position of “sustainability through design” (Butler et al., 2016; Paddock,
2017; Thieme et al., 2012). It is this model of “persuasion” or “behaviour (p. 206)
change”—alongside debates over the conceptualization of “agency,” the material organi
zation of “consumption” processes or “sustainability” itself—that remain at the heart of
contemporary theory and empirical research design in Sustainable HCI. As such, Sustain
able HCI is playing a crucial and expanding role in the politics of ways of being digital.
Throughout the chapter, we have sought to review the approaches relevant to the devel
opment of Sustainable HCI, and evaluate the ways that they inform current empirical
studies in the field focussed towards domestic resource consumption. The preceding sec
tions reviewed the frameworks that have underpinned contemporary social science re
search on the relationships between humans and their digital and natural environments.
Page 23 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Such frameworks have variously focussed on: structural-level variables such as political
economy and facets of globalization; social psychological approaches encompassing indi
vidual behaviours, attitudes, values, norms and lifestyles; and mid-level theories focussed
on practices that attempt to connect relational processes across different scales of social
organization. As part of this latter discussion, we have also reviewed the focus on digital
materiality that is common to both theories of practices and to frameworks derived from
STS such as Actor-Network Theory.
Certainly digital technologies as they are empirically deployed in HCI studies might help
us to further understand the digital-physical-social webs of relationship within house
holds. How the results of that research are communicated in the public sphere is also of
import, given the scale of current environmental challenges. An overly emphatic focus on
“behaviour change” via digital systems might, however, also have unintended conse
quences, running the risk of unequally marginalising some already vulnerable popula
tions:
In contrast to aspirational claims for a “smart utopia” of greener, less energy in
tensive, and more comfortable homes currently present in market and policy dis
courses, we argue that SHTs [Smart Home Technologies] may reinforce unsustain
able energy consumption patterns in the residential sector, are not easily accessi
ble by vulnerable consumers, and do little to help the “energy poor” secure ade
quate and affordable access to energy at home.
While Sustainable HCI is therefore able—to some extent—to intervene positively toward
behaviour change, some argue that any influence derived from such interventions is not
straightforward, nor is it unproblematic (Burchell, Rettie, & Roberts, 2016). Demograph
ic, socio-economic, and life-cycle factors all have an impact on values, lifestyles, and con
sumption. Similarly, routine, habit, affect, and the meaning of home can also vary signifi
cantly amongst and between populations. Therefore any potential interventions are there
Page 24 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
fore likely to have extensively variable and uneven effects (Watson, 2017). There is there
fore also the question as to whether Sustainable HCI research currently only reaches
populations already positively oriented towards the environmental issues under scrutiny
(Vassileva et al., 2013).
If HCI recognizes that digital technologies are imbricated in “the domestic”—and domes
tic resource practices—in the complex assemblages outlined earlier, it is unsurprising
that the question of digital persuasion towards sustainabilities remains contested in the
HCI literature and beyond. Innovative approaches drawing on practice theory and ANT
have expanded the units and scales of analysis in Sustainable HCI to encompass a variety
of different forms of possible influence, such as the recognition of mutual or collective re
sponsibilities for sustainable consumption across different organization and civic scales.
For example, supermarkets/food providers and households could each be digitally linked
in local communities to hold collective responsibility for sustainable food provision.
It is for such reasons that there has been a movement within Sustainable HCI debates to
explicitly focus on digital “politics” (broadly defined) towards sustainability. In a timely
contribution, Dourish (2010, p. 8) adds a final and crucial consideration to any (p. 208)
characterization of environmentally oriented HCI as a broad field of endeavor—“the poli
tics of design and the design of politics.” According to Dourish (2010, p. 8), Sustainable
HCI must become more explicitly and self-consciously “political”; that is, he is making
Such approaches hold the potential to help us further understand how digital technolo
gies and the projects of Sustainable HCI might mediate the relationships between physi
cal resources, things, systems, people, their knowledge, skills, and activities. This under
standing might move us closer to resource security and resilience, and sustainable ways
of being in a digital age.
References
Abdul Salam, P., Shrestha, S., Prasad Pandey, P., & Kumar Anal, A. (2017). Water-energy-
food nexus: Principles and practices. Hoboken, NJ: American Geophysical Union, Wiley.
doi:10.1002/9781119243175.
Advani, A., Johnson, P., Leicester, A., & Stoye, G. (2013). Household energy use in the UK:
A distributional analysis. IFS Report R85, Institute for Fiscal Studies.
Akrich, M. (1992). The de-scription of technical objects. In W. Bijker & J. Law (Eds.),
Shaping technology, building society: Studies in sociotechnical change (pp. 205–224).
Cambridge, MA: MIT Press.
Page 25 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Appadurai, A. (Ed.) (1988). The social life of things: Commodities in cultural perspective.
Cambridge: Cambridge University Press.
Arroyo, E., Bonanni, L., & Selker, T. (2005). Waterbot: Exploring feedback and persuasive
techniques at the sink. In Proceedings of the SIGCHI conference on human factors in
computing systems (pp. 631–639). Portland, OR: ACM. doi:10.1145/1054972.1055059.
Bang, M., Gustafsson, A., & Katzeff, C. (2007). Promoting new patterns in household en
ergy consumption with pervasive learning games. In Proceedings of the international con
ference on persuasive technology, Persuasive 2007, LNCS 4744 (pp. 55–63).
Barac, M., & McFadyen, L. (2007). Connected space. Home Cultures, 4(2), 109–115.
Barr, S. (2003). Are we all environmentalists now? Rhetoric and reality in environmental
action. Geoforum, 35, 231–249. doi:10.1016/j.geoforum.2003.08.009.
Barr, S. (2006). Environmental action in the home: Investigating the “value-action” gap.
Geography, 91(1), 43–54.
Barr, S. (2016). Environment and society: Sustainability, policy and the citizen. London:
Routledge.
Barr, S., & Gilg, A. (2006). Sustainable lifestyles: Framing environmental action in and
around the home. Geoforum, 37, 906–920. doi:10.1016/j.geoforum.2006.05.002.
Barr, S., Gilg, A., & Shaw, G. (2011a). “Helping People Make Better Choices”: Exploring
the behaviour change agenda. Applied Geography, 31, 712–720. doi:10.1016/j.apgeog.
2010.12.003.
Barr, S., Gilg, A., & Shaw, G. (2011b). Citizens, consumers and sustainability: (Re) Fram
ing environmental practice in an age of climate change. Global Environment Change, 21,
1224–1233. doi:10.1016/j.gloenvcha.2011.07.009
Beddington, J. (2009). Food, energy, water and the climate: A perfect storm of global
events. In Lecture to Sustainable development UK conference. https://
assets.letemps.ch/sites/default/files/media/2014/03/19/2.1.3041002903.pdf
Bhaduri, A., Ringler, C., Dombrowski, I., Mohtar, R., & Scheumann, W. (2015). Sustainabil
ity in the water-energy-food nexus. Water International, 40(5–6), 723–732.
Blevis, E. (2007). Sustainable interaction design: Invention, disposal, renewal & reuse. In
Proceedings of SIGGCHI 2007 ACM annual conference on human factors in computing
Systems (pp. 503–512). ACM.
Page 26 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Bonino, D., Corno, F., & De Russis, L. (2012). Home Energy Consumption Feed
(p. 210)
back: A User Survey. Energy and Buildings, 47, 383–393. doi: 10.1016/j.enbuild.
2011.12.017.
Boucher, A., Cameron, D., & Jarvis, N. (2012). Power to the people: Dynamic energy mea
surement through communal cooperation. In Proceedings of the designing interactive sys
tems conference (pp. 612–620). June 11–15, Newcastle, UK.
Bourgeois, J., van der Linden, J., Kourtuem, G., Price, B. A., & Rimmer, C. (2014). Conver
sations with my washing machine: An in-the-wild study of demand shifting with self-gen
erated energy. Proceeding of ubiquitous computing conference, UBICOMP. September
11–13, Seattle, Washington. doi:10.1145/2632048.2632106.
Burchell, K., Rettie, R., & Roberts, T. (2016). Householder engagement with energy con
sumption feedback: The role of community action and communications. Energy Policy, 88,
178–186. doi:10.1016/j.enpol.2015.10.019.
Burgess, J., Bedford, T., Hobson, K., Davies, G., & Harrison, C. M. (2003). (Un)sustainable
consumption. In F. Berkhout, M. Leach, & I. Scoones (Eds.), Negotiating environmental
change: New perspectives from social science (chapter 10). Cheltenham: Edward Elgar.
Butler, C., Parkhill, K., & Pidgeon, N. (2016). Energy consumption and everyday life:
Choice, values and agency through a practice theoretical lens. Journal of Consumer Cul
ture, 16(3), 887–907. doi:10.1177/1469540514553691.
Brynjarsdottir, H., Håkansson, M., Pierce, J., Baumer, E., DiSalvo, C., & Sengers, P.
(2012). Sustainably unpersuaded: How persuasion narrows our vision of sustainability. In
Proceedings of the SIGGCHI 2012 ACM annual conference on human factors in comput
ing systems (pp. 947–956). ACM.
Cairns, R., & Krzywoszynska, A. (2016). Anatomy of a buzzword: The emergence of “the
water-energy-food nexus” in UK natural resource debates. Environmental Science and
Policy, 64, 164–170. doi:10.1016/j.envsci.2016.07.007.
Casado-Mansilla, D., López-de-Armentia, J., Ventura, D., Garaizar, P., & López-de-Ipiña, D.
(2016). Embedding intelligent eco-aware systems within everyday things to increase
people’s energy awareness. In Soft Computing, 20(5), 1695–1711.
Chetty, M., Tran, D., & Grinter, R. (2008). Getting to green: Understanding resource con
sumption in the home. In Proceedings of the 10th international conference on ubiquitous
computing, UbiComp (pp. 242–251). September 21–24. doi:10.1145/1409635.1409668.
Chitnis, M., Sorrell, S., Druckman, A., Firth, S. K., & Jackson, T. (2013). Turning lights in
to flights: Estimating direct and indirect rebound effects for UK households. Energy Poli
cy, 55, 234–250. doi:10.1016/j.enpol.2012.12.008.
Page 27 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Chitnis, M., Sorrell, S., Druckman, A., Firth, S. K., & Jackson, T. (2014). Who rebounds
most? Estimating direct and indirect rebound effects for different UK socioeconomic
groups. Ecological Economics, 106, 12–32. doi:10.1016/j.ecoecon.2014.07.003.
Clear, A., Hazas, M., Morley, J., Friday, A., & Bates, O. (2013). Domestic food and sustain
able design: A study of university student cooking and its impacts. Proceedings of the
SIGCHI Conference on human factors in computing systems. Paris, France, April 27-May
2, 2013. doi: 10.1145/2470654.2481339.
Clear, A. K., O’Neill, K., Friday, A. & Hazas, M. (2016). Bearing an open “Pandora’s box”:
HCI for reconciling everyday food and sustainability. ACM Transactions on Computer-Hu
man Interaction, 23(5), Article 28, doi:http://dx.doi.org/10.1145/2970817.
Connolly, J., & Prothero, A. (2008). Green consumption: Life politics, risk and contradic
tions. Journal of Consumer Culture, 8(1), 117–146. doi: 10.1177/1469540507086422.
Local Food systems as a case. Journal of Consumer Culture, 13(3), 306–336. doi:
10.1177/1469540513484321.
Colucci, A., Magoni, M., & Menoni, S. (Eds.) (2017). Peri-urban areas and food-energy-wa
ter nexus: Sustainability and resilience strategies in the age of climate change. Switzer
land: Springer.
Comber, R., & Thieme, A. (2012). Designing beyond habit: Opening space for improved
recycling and food waste behaviours through processes of persuasion, social influence
and aversive affect. Personal and Ubiquitous Computing, 17(6), 1197–1210. doi:10.1007/
s00779-012-0587-1.
Constanza, E., Ramchurn, S. D., & Jennings, N. (2012). Understanding domestic energy
consumption through interactive visualization: A field study. Proceedings of ubiquitous
computing conference, UbiComp (pp. 216–225). September 5–8, Pittsburgh, PA.
Coughlan, T., Leder Mackley, K., Brown, M., Martindale, S., Schlögl, S., Mallaband, B., …
Hine, N. (2013). Current issues and future directions in methods for studying technology
in the home. PsychNology Journal, 11(2), 159–184. Retrieved 15/02/2019, from
www.psychnology.org.
Dant, T. (1999). Material culture in the social world. Buckingham, UK: Open University
Press.
Department for Business, Energy and Industrial Strategy [DBEIS]. (2018a). Energy con
sumption in the UK. July 2018. https://assets.publishing.service.gov.uk/government/
uploads/system/uploads/attachment_data/file/729317/
Energy_Consumption_in_the_UK__ECUK__2018.pdf.
Page 28 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Department for Business, Energy and Industrial Strategy [DBEIS]. (2018b). Digest of
United Kingdom energy statistics [DUKES]: 2018 Main Report. July 2018. https://
assets.publishing.service.gov.uk/government/uploads/system/uploads/
attachment_data/file/729425/DUKES_2018.pdf.
Devaney, L., & Davies, A. (2016). Disrupting household food consumption through experi
mental HomeLabs: Outcomes, connections, contexts. Journal of Consumer Culture, 17(3),
823–844. doi:10.1177/1469540516631153.
DiSalvo, C., Sengers, P., & Brynjarsdóttir, H. (2010). Mapping the landscape of sustain
able HCI. In Proceedings of the SIGCHI conference on human factors in computing sys
tems (pp. 1975–1984). ACM.
DiSalvo, C., Sengers, P., & Brynjarsdóttir, H. (2010a). Navigating the terrain of sustain
able HCI. interactions, July-August 2010, 22–25. doi: 10.1145/1806491.1806497.
Dourish, P. (2010). HCI and environmental sustainability: the politics of design and the
design of politics. In DIS 10: Proceedings of the 8th ACM Conference on Designing Inter
active Systems (pp. 1–10). doi: 10/1145/1858171.1858173.
Druckman, A., Chitnis, C., Sorrell, S., & Jackson, T. (2011). Missing carbon reductions?
Exploring rebound and backfire effects in UK households. Energy Policy, 39, 3572–3581.
doi:10.1016/j.enpol.2011.03.058.
Energy Saving Trust. (2013). At home with water. Energy Saving Trust, Department for
Energy and Climate Change, Department of Environment, Food, and Rural Affairs. http://
www.energysavingtrust.org.uk/sites/default/files/reports/
AtHomewithWater%287%29.pdf.
Energy Saving Trust. (2014). At home with water 2. Technical Report. Energy Saving
Trust. http://www.energysavingtrust.org.uk/sites/default/files/reports/
AHHW2%20final.pdf.
Erickson, T., Podlaseck, M., Sahu, S., Dai, J. D., Chao, T., & Naphade, M. (2012). The
Dubuque water portal: Evaluation of the uptake, use and impact of residential water con
sumption feedback. In Proceedings of the SIGCHI conference on human factors in com
puting systems (pp. 675–684). ACM.
Evans, D., & Abrahamse, W. (2009). Beyond rhetoric: The possibilities of and for “sustain
able lifestyles.” Environmental Politics, 18(4), 486–502. doi:10.1080/09644010903007369.
Page 29 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Farr-Wharton, G., Hee-Jeong Choi, J., & Foth, M. (2014a). Food talks back: Exploring the
role of mobile applications in reducing domestic food wastage. In Proceedings of the 26th
Australian computer-human interaction conference on designing futures: The future of
design (pp. 352–361). ACM. doi:10.1145/2686612.2686665.
Farr-Wharton, G., Hee-Jeong Choi, J., & Foth, M. (2014b). Technicolouring the fridge: Re
ducing food waste through uses of colour-coding and cameras. In Proceedings of the 13th
international conference on mobile and ubiquitous multimedia (pp. 48–57). ACM. doi:
10.1145/2677972.2677990.
Fischer, C. (2008). Feedback on household electricity consumption: A tool for saving ener
gy? Energy Efficiency, 1(1), 79–104. doi:10.1007/s12053-008-9009-7.
Foster, D., Lawson, S., Blythe, M., & Cairns, P. (2010). Wattsup? Motivating reductions in
domestic energy consumption using social networks. In Proceedings of the 6th Nordic
conference on human-computer interaction: Extending boundaries (pp. 178–187). ACM.
doi:10.1145/1868914.1868938.
Froehlich, J. (2009). Promoting energy efficient behaviors in the home through feedback:
The role of human computer interaction. In Proceedings of HCIC workshop (pp. 1–11).
http://www.cs.umd.edu/~jonf/publications/
Froehlich_PromotingEnergyEfficientBehavirosInTheHomeThroughFeedback-
TheRoleOfHumanComputerInteraction_HCIC2009.pdf.
Froehlich, J., Findlater, L., & Landay, J. (2010). The design of eco-feedback technology. In
Proceedings of the SIGCHI conference on human factors in computing systems (pp. 1999–
2008). ACM. http://www.cs.umd.edu/~jonf/publications/
Froehlich_TheDesignOfEcoFeedbackTechnology_CHI2010.pdf.
Froehlich, J., Findlater, L., Ostergren, M., Ramanathan, S., Peterson, J., Wragg, I., Larson,
E., Fu, F., Bai, M., & Patel, S. (2012). The design and evaluation of prototype ecofeedback
displays for fixture-level water usage data. In Proceedings of SIGCHI 2010 conference on
human factors in computing systems (pp. 2367–2376). April 10–15, Atlanta, GA. ACM.
Gabrielson, T., Hall, C., Meyer, J. M., & Schlosberg, D. (Eds.) (2016). The Oxford handbook
of environmental political theory. Oxford: Oxford University Press.
Gamberini, L., Spagnolli, A., Corradi, N., Jacucci, G., Tusa, G., Mikkola, T., Zamboni, L., &
Hoggan, E. (2012). Tailoring feedback to users’ actions in a persuasive game for house
hold electricity conservation. In Proceedings of the international conference on persua
sive technology (pp. 100–111). Centre for eHealth & Wellbeing Research, Department of
Psychology, Health and Technology, University of Twente, The Netherlands.
Page 30 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Ganglbauer, E., Fitzpatrick, G., & Comber, R. (2013). Negotiating food waste: Using a
practice lens to inform design. ACM Transactions on Computer-Human Interaction, 20(2),
Art. 11. doi:10.1145/2463579.2463582.
Gatersleben, B., Murtagh, N., & Abrahamse, W. (2014). Values, identity and pro-environ
mental behaviour. Contemporary Social Science, 9(4), 374–392. doi:
10.1080/21582041.2012.682086.
Genus, A., & Jensen, C. (2019). Beyond “behaviour”: The institutionalisation of practice
and the case of energy-efficient lighting in Denmark. Journal of Consumer Culture, 19(3),
1–19. doi:10.1177/1469540517717781.
Gilg, A., Barr, S., & Ford, N. (2005). Green consumption or sustainable lifestyles?
(p. 213)
Granovetter, M. (1985). Economic action and social structure: The problem of embedded
ness. American Journal of Sociology, 91(3), 481–510.
Halkier, B., Katz-Gerro, T., & Martens, L. (2011). Applying practice theory to the study of
consumption: Theoretical and methodological considerations. Journal of Consumer Cul
ture, 11(1), 3–13. doi:10.1177/1469540510391765.
Hand, M., & Shove, E. (2007). Condensing practices: Ways of living with a freezer. Journal
of Consumer Culture, 7(1), 79–104. doi:10.1177/1469540507073509.
Hazas, M., Friday, A., & Scott, J. (2011). Look back before leaping forward: of domestic
energy inquiry. IEEE Pervasive Computing, 10, 13–19.
Hee-Jeong Choi, J., & Blevis, E. (2010). HCI & sustainable food culture: A design frame
work for engagement. In Proceedings of the 6th Nordic conference on human-computer
interaction: Extending boundaries (pp. 112–117). ACM.
Hitchings, R. (2004). At home with someone nonhuman. Home Cultures, 1(2), 169–186.
Horta, A., Wilhite, H., Schmidt, L., & Bartiaux, F. (2014). Socio-technical and cultural ap
proaches to energy consumption. Nature and Culture, 9(2), 115–121. doi: 10.3167/nc.
2014.090201.
Page 31 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Hui, A., Shove, E., & Schatzki, T. (2017). The nexus of practices: Connections, constella
tions, practitioners. London: Routledge.
Hui, A., & Walker, G. (2018). Concepts and methodologies for a new relational geography
of energy demand: Social practices, doing-places and setting. Energy Research and Social
Science, 36, 21–29. doi:10.1016/j.erss.2017.09.032.
Hupfeld, A., & Rodden, T. (2012). Laying the table for HCI: Uncovering ecologies of do
mestic food consumption. In Proceedings of the SIG conference on human factors in com
puting systems (pp. 119–128). May 05–10, 2012, Austin, Texas: ACM. doi:
10.1145/2207676.2207694.
Jackson, T. (2008). Challenges for sustainable consumption policy. In T. Jackson. (Ed.), The
Earthscan reader in sustainable consumption (pp. 109–129). London: Earthscan. doi:
10.1111/j.1530–9290.2008.00023.x.
Kalbar, P. P., Birkved, M., Hauschile, M., Kabin, S., & Elsborg Nygaard, S. (2018). Environ
mental impact of urban consumption patterns: Drivers and focus points. Resources, Con
servation and Recycling, 137, 260–269. doi:10.1016/j.resconrec.2018.06.019.
Kalbar, P. P., Birkved, M., Kabins, S., Nygaard, S. E. (2016). Personal-metabolism (PM)
coupled with life cycle assessment (LCA) model: Danish case study. Environment Interna
tional, 91, 168–179. doi:10.1016/j.envint.2016.02.032.
Kappel, K., & Grechenig, T. (2009). Show-me: Water consumption at a glance to promote
water conservation in the shower. In Proceedings of the 4th international conference on
persuasive technology (Art. 26). April 26–29, Claremont, California. ACM. doi:
10.1145/1541948.1541984.
Katz-Gerro, T., Greenspan, I., Handy, F., & Hoon-Young, L. (2017). The relationship be
tween value types and environmental behaviour in four countries: Universalism, benevo
lence, (p. 214) conformity and biospheric values revisited. Environmental Values, 26(2),
223–249. doi:10.3197/096327117X14847335385599.
Kenway, S. J., Lant, P. A., Priestley, A., & Daniels, P. (2011). The connection between water
and energy in cities: A review. Water Science and Technology. 63, 1983–1990. doi:
10.2166/wst.2011.070.
Kuijer, L. (2017). Splashing: The iterative development of a novel type of personal wash
ing. In D. Keyson., O. Guerra-Santin, & D. Lockton (Eds.), Living labs: Design and assess
ment of sustainable living (pp. 63–74). Switzerland: Springer. doi:
10.1007/978-3-319-33,527-8.
Page 32 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Kuznetsov, S., & Paulos, E. (2010). UpStream: Motivating water conservation with low-
cost water flow sensing and persuasive displays. In Proceedings of the SIGCHI confer
ence on human factors in computing systems (pp. 1851–1860). April 10–15, 2010, Atlanta,
Georgia. ACM. doi:10.1145/1753326.1753604.
Larrabee Sønderlund, A., Smith, J. R., Hutton, C., & Kapelan, Z. (2014). Using smart me
ters for household water consumption feedback: Knowns and unknowns. Procedia Engi
neering. 89, 990–997. doi: 10.1016/j.proeng.2014.11.216.
Latour, B. (2000). When things strike back: A possible contribution of “science studies” to
the social sciences. British Journal of Sociology, 51(1), 107–123.
Liu, A., Giurco, D., & Mukheibir, P. (2015). Motivating metrics for household water-use
feedback. Resources, Conservation and Recycling, 103, 29–46. doi:10.1016/j.resconrec.
2015.05.008.
Maheshwari, B., Purohit, R., Malano, H., Singh, V. P., & Amerasinghe, P. (Eds.) (2014). The
security of water, food, energy and liveability of cities: Challenges and opportunities for
peri-urban futures. Dordrecht: Springer.
Mankoff, J. C., Blevis, E., Borning, A., Friedman, B., Fussell, S. R., Hasbrouck, J.,
Woodruff, A., & Sengers, P. (2007). Environmental sustainability and interaction. In Pro
ceedings of the SIGGCHI EA (pp. 2121–2124). April 28-May 03 2007, San Jose, CA. ACM.
doi:10.1145/1240866.1240963.
McGrane, S. J., Acuto, M., Artioli, F., Chen, P., Comber, R., Cottee, J., Farr-Wharton, G.,
Green, N., Helfgott, A., Larcom, S., McCann, J., O’Reilly, P., Salmoral, G., Scott, M., Tod
man, L. C., van Gevelt, T., & Yan, X. (2018). Scaling the nexus: Towards integrated frame
works for analysing water, energy and food. The Geographical Journal, 185(4) 1–13. doi:
10.1111.geoj.12256.
Miller, D. (1998). Why some things matter. In D. Miller (Ed.), Material cultures: Why some
things matter (pp. 3–21). Chicago, IL: University of Chicago Press.
Mitchell, V., Leder Mackley, K., Pink, S., Escobar-Tello, C., Wilson, G. T., & Bhamra, T.
(2015). Situating digital interventions: Mixed methods for HCI research in the home. In
teracting with Computers, 27(1), 3–12. doi:10.1093/iwc/iwu034
Murtagh, N., Gatersleben, B., & Uzzell, D. (2014). Difference in energy behaviour and
conservation between and within households with electricity monitors. PLoS ONE, 9(3),
e92019, 1–12. doi:10.1371/journal.pone.0092019.
Page 33 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Murtagh, N., Gatersleben, B., Cowen, L., & Uzzell, D. (2015). Does perception of automa
tion undermine pro-environmental behaviour? Findings from three everyday settings.
Journal of Environmental Psychology, 42, 139–148.
Ng, K. H., Shipp, V., Mortier, R., Benford, S., Flintham, M., & Rodden, T. (2015). Under
standing food consumption lifecycles using wearable cameras. Personal and Ubiquitous
Computing, 19(7), 1183–1195. doi:10.1007/s00779-015-0871-y.
Ofwat. (2011). The use of revealed customer behaviour in future price limits: Fi
(p. 215)
nal report. Cascade Consultancy, Economics for the Environment Consultancy Ltd.
https://www.ofwat.gov.uk/wp-content/uploads/2015/11/rpt_com:
201105eftec_casc_reveal.pdf.
Ofwat. (2018). The long term potential for deep reduction in household water demand.
Artesia Consulting. https://www.ofwat.gov.uk/wp-content/uploads/2018/05/The-
long-term-potential-for-deep-reductions-in-household-water-demand-report-by-
Artesia-Consulting.pdf.
Oikonomou, V., Becchis, F., Steg, L., & Russolillo, D. (2009). Energy saving and energy ef
ficiency: Concepts for policy making. Energy Policy, 37, 4787–4796.
Oliveira, L., Mitchell, V., & May, A. (2016). Reducing temporal tensions as a strategy to
promote sustainable behaviours. Computers in Human Behavior, 62, 303–315. doi:
10.1016/j.chb.2016.04.004.
Owen, L., Bramley, H., & Tocock, J. (2009). Public understanding of sustainable water use
in the home. Final Report to the Department for Environment, Food and Rural Affairs.
Synovate, DEFRA: London.
Palmer, J., & Terry, N. (2014). Powering the nation 2: Electricity use in homes and how to
reduce it. Department of Energy and Climate Change (DECC), Department for Environ
ment, Food and Rural Affairs (DEFRA). https://assets.publishing.service.gov.uk/gov
ernment/uploads/system/uploads/attachment_data/file/325741/
Powering_the_Nation_2_260614.pdf.
Pierce, J., Odom, W., & Blevis, E. (2008). Energy aware dwelling: A critical survey of inter
action design for eco-visualizations. In Proceedings of the 20th Australasian conference
on computer-human interaction: Designing for habitus and habitat (pp. 1–8). December
08–12, Cairns, Australia. ACM. doi:10.1145/1517744.1517746.
Pink, S. (2011). Ethnography of the invisible: Energy in the multi-sensory home. Enthnolo
gia Europeae: Journal of European Ethnology, 41(1), 117–128.
Page 34 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Pink, S., & Leder Mackley, K. (2012). Video and a sense of the invisible: Approaching do
mestic energy consumption through the sensory home. Sociological Research Online, 17(1,
3). http://www.socresonline.org.uk/17/1/3.html. doi: 10.5153/sro.2583.
Pink, S., Mackley, K., Mitchell, V., Hanratty, M., Escobar-Tello, C., Bhamra, T., & Mo
roşanu, R. (2013). Applying the lens of sensory ethnography to sustainable HCI. ACM
Transactions on Computer-Human Interaction, 20(4), 1–18.
Pullinger, M., Browne, A., Anderson, B., & Medd, W. (2013). Patterns of water: The water
related practices of households in southern England, and their influence on water con
sumption and demand management. Final report of the ARCC-Water/SPRG Patterns of
Water projects March 2013. http://www.sprg.ac.uk/uploads/patterns-of-water-final-
report.pdf.
Riche, Y., Dodge, J., & Metoyer, R. A. (2010). Studying always-on electricity feedback in
the home. In Proceedings of the SIGCHI conference on human factors in computing sys
tems: Home eco behavior (pp. 1995–1998). April 10–15, 2010, Atlanta, GA. ACM.
Rouillard, J. (2012). The pervasive fridge. A smart computer system against uneaten food
loss. In ICONS 2012, The seventh international conference on systems (pp. 135–140).
Saint-Gilles–Reunion.
Sahakian, M., & Wilhite, H. (2014). Making practice theory practicable: Towards more
sustainable forms of consumption. Journal of Consumer Culture, 14(1), 25–44. doi:
10.1177/1469540513505607.
Schwartz, T., Stevens, G., Ramirez, L., & Wulf, V. (2013). Uncovering practices of
(p. 216)
Shove, E. (2003). Comfort, cleanliness and convenience: The social organization of nor
mality. Oxford: Berg.
Shove, E., Patzner, M. & Watson, M. (2012). The dynamics of social practice: Everyday life
and how it changes. London: Sage.
Shove, E., & Spurling, N. (Eds.). (2013). Sustainable practices: Social theory and climate
change. London: Routledge.
Shove, E., & Walker, G. (2014). What is energy for?: social practice and energy demand.
Theory, Culture and Society, 31(5), 41-58. doi:10.1177/0263276414536746.
Page 35 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Shove, E., & Warde, A. (2002). Inconspicuous consumption: The sociology of consump
tion, lifestyles and the environment. In R. Dunlap, F. Buttel, P. Dickens, & A. Gijswijt
(Eds.), Sociological theory and the environment: Classical foundations, contemporary in
sights (pp. 230–241). Lanham, MA: Rowman and Littlefield.
Smajgl, A., Ward, J., & Pluschke, L. (2016). The water-food-energy Nexus—Realising a
new paradigm. Journal of Hydrology, 533, 533–540. doi:10.1016/j.hydrol.2015.12.033.
Sofoulis, Z., & Williams, C. (2008). From pushing atoms to growing networks: Cultural in
novation and co-evolution in urban water conservation. Social Alternatives, 27(3), 50–57.
Southerton, D., & Shove, E. (2000). Defrosting the freezer: From novelty to convenience:
A narrative of normalization. Journal of Material Culture, 5(3), 301–319. doi:
10.1177/135918350000500303.
Spaargaren, G., & Van Vliet, B. (2000). Lifestyles, consumption and the environment: The
ecological modernization of domestic consumption. Environmental Politics, 9(1), 50–76.
doi:10.1080/09644010008414512
Srinivasan, V., Stankovic, J., & Whitehouse, K. (2011). Watersense: Water flow disaggrega
tion using motion sensors. In Proceedings of the third ACM workshop on embedded sens
ing systems for energy-efficiency in buildings (pp. 19–24). ACM.
Page 36 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Strengers, Y. (2011). Negotiating everyday life: The role of energy and water consump
tion feedback. Journal of Consumer Culture, 11(3), 319–338. doi:
10.1177/1469540511417994.
Strengers, Y. (2012). Peak electricity demand and social practice theories: Re
(p. 217)
framing the role of change agents in the energy sector. Energy Policy, 44, 226–234. doi:
10.1016/j.enpol.2012.01.046.
Strengers, Y., & Maller, C. (2017). Adapting to “extreme” weather: Mobile practice memo
ries of keeping warm and cool as a climate change adaptation strategy. Environment and
Planning A, 49(6), 1432–1450. doi:10.1177/0308518X17694029.
Strengers, Y., Nicholls, L., & Maller, C. (2014). Curious energy consumers: Humans and
non-humans in assemblages of household practice. Journal of Consumer Culture, 16(3),
761–780. doi:10.1177/1469540514536194.
Taherzadeh, O., Bithell, M., & Richards, K. (2018). When defining boundaries for nexus
analysis, let the data speak. Resources, Conservation and Recycling, 137, 314–315. doi:
10.1016/j.resconrec.2018.06.012.
Thieme, A., Comber, R., Miebach, J., Weeden, J., Kraemer, N., Lawson, S., & Olivier, P.
(2012). We’ve bin watching you: Designing for reflection and social persuasion to pro
mote sustainable lifestyles. In Proceedings of the SIGCHI conference on human factors in
computing systems (pp. 2337–2346). May 05–10, 2012, Austin, Texas. ACM. doi:
10.1145/2207676.2208394.
Tirado Herrero, S., Nicholls, L., & Strengers, Y. (2018). Smart home technologies in
everyday life: Do they address key energy challenges in households? Current Opinion in
Environmental Sustainability, 31, 65–70. doi:10.1016/j.cosust.2017.12.001.
United Nations Department of Economic and Social Affairs. (2017a). World Population
Prospects: The 2017 Revision. Population Division, United Nations. https://www.un.org/
development/desa/publications/world-population-prospects-the-2017-
revision.html.
United Nations Department of Economic and Social Affairs. (2017b). Sustainable Develop
ment Goals. Sustainable Development Knowledge Platform. https://
sustainabledevelopment.un.org/.
United Nations Department of Economic and Social Affairs (2018). 2018 Revision of
World Urbanization Prospects. https://www.un.org/development/desa/en/news/popu
lation/2018-revision-of-world-urbanization-prospects.html.
Page 37 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Uzzell, D., Muckle, R., Jackson, T., Ogden, J., Barnett, J., Gatersleben, B., Hegarty, P., Pap
athanasopoulou, E. (2006). Choice matters: Alternative approaches to encourage sustain
able consumption and production. Project Report. Report to the Department of the Envi
ronment, Food and Rural Affairs (DEFRA). Environmental Psychology Research Group,
University of Surrey, London: UK. http://epubs.surrey.ac.uk/729053/.
Van Vliet, B., Chappells, H., & Shove, E. (2005). Infrastructures of consumption: Environ
mental innovation in the utility industries. Oxford: Earthscan.
Vannini, P., & Taggart, J. (2016). Onerous consumption: The alternative hedonism of off-
grid domestic water use. Journal of Consumer Culture, 16(1), 80–100. doi:
10.1177/1469540513509642.
Vassileva, I., Dahlquist, E., Wallin, F., & Campillo, J. (2013). Energy consumption feedback
devices’ impact evaluation on domestic energy use. Applied Energy, 106, 314–320. doi:
10.1016/j.apevergy.2013.01.059.
Warde, A. (2013). Sustainable practices: Social theory and climate change. London: Rout
ledge.
Warde, A. (2014). After taste: Culture, consumption and theories of practice. Journal of
Consumer Culture, 14(3), 279–303. doi: 10.1177/1469540514547828.
Wood, G., & Newborough, M. (2003). Dynamic energy-consumption indicators for domes
tic appliances: Environment, behaviour and design. Energy and Buildings, 35(8), 821–
841.
WRAP (Waste & Resources Action Programme). (2017). Household food waste in the UK,
2015. http://www.wrap.org.uk/sites/files/wrap/
Household_food_waste_in_the_UK_2015_Report.pdf.
Wutich, A. (2009). Estimating household water use: A comparison of diary, prompted re
call and free recall methods. Field Methods, 21(1), 49–68. doi:
10.1177/1525822X08325673.
Notes:
(1.) The exemplar empirical research presented throughout the chapter citing national
statistics are derived from UK sources. Corresponding international statistics, especially
those produced by governmental bodies (or e.g., private utilities companies), can be rela
Page 38 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
tively easily located via the relevant corresponding national or international bodies, or via
straightforward Internet searches.
(2.) Environmental social sciences and philosophy addressing the macro-level have fo
cussed on both human-nature social relationships, as well as the salient cultural cate
gories through which those relationships are made meaningful and are understood. The
foundational theoretical literatures in environmental social sciences are extremely exten
sive, and have undergone considerable revision over the course of at least fifty years—not
least in light of feminist and post-colonial theories, and theories of globalisation. As such,
only an extremely brief indication of broad conceptual areas can be offered here, al
though those interested in reading towards further contemporary theoretical develop
ments might consult compendia readers such as Gabrielson et al. (2016).
(3.) A number of different models of persuasion towards “behaviour change” have been
proposed over time—and have also been deconstructed. For a critical review of AIDA
(Awareness-Information-Decision-Action) models, for example, see Barr (2006). For a cri
tique of 4E (Enable-Engage-Encourage-Exemplify) models, see Jackson (2006) and Spaar
garen (2011). Such models have also been adopted in different contexts—for example, in
public (often policy-generated) awareness campaigns towards “ecological citizenship,”
through to technology-driven techniques of persuasion (see chapter sections on Sustain
able HCI design and development). A key endeavor in these approaches is also identifying
“barriers to change.”
(4.) Over the past decade, the literature on “sustainable consumption” has grown rapidly,
and has entailed extensive debates not only on the conceptualization of sustainable con
sumption itself, but also the relation it bears to “consumerism” (Evans & Jackson, 2008)
and “citizenship” (Seyfang, 2016). For a review of these literatures see Jackson (2008).
(5.) Halkier, Katz-Gerro, and Martens (2011) provide a comprehensive review of the prac
tice theory literature via Bourdieu and Giddens, tracing their philosophical antecedents to
(amongst others) Durkheim, Heidegger, Husserl, Levi-Strauss, Marx, Mauss, Merleau-
Ponty, Weber, and Wittgenstein.
Nicola Green
Nicola Green is a Research Associate with the OpenLab, Newcastle University. She is
a sociologist by trade and a qualitative interdisciplinary researcher by inclination.
Her background has run the gamut of social sciences, HCI, science and technology
studies, media and cultural studies, and surveillance studies; all intersecting via
projects on digital media technologies and/or sustainabilities of various sorts. Her
projects have included work on virtual reality technologies; mobile devices and
everyday mobilities; the rise and spread of mobile data and “big data”; digital trust,
risk, and privacy; and lifestyles, consumption, and environment. Issues explored
across these projects have included embodiment and identity, organization and dis
course, popular media and culture, as well as the development of qualitative re
search methodologies and their use in both HCI research and within social sciences
Page 39 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
A Digital Nexus: Sustainable HCI and Domestic Resource Consumption
Rob Comber
Sharron Kuznesof
Sharron Kuznesof is a Senior Lecturer and applied qualitative social scientist work
ing in an interdisciplinary environment in the School of Natural and Environmental
Sciences, Newcastle University. Her research focuses on conceptual exploration of
the behaviors and practices of food consumers and innovative research methods to
support that endeavor. Related research includes Food Standards Agency–funded re
search with HCI staff at Newcastle University’s OpenLab to examine domestically sit
uated food safety practices.
Page 40 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.8
This chapter explores the outcomes of the literature review and expert Delphi review
process for the communication and relationships domain. The initial scoping question—
How are our relationships being shaped and sustained in and between various domains,
including family and work?—was considered too broad. So we instead focus on five cate
gories and associated questions articulated by the Delphi process, concerning digital lit
eracies, norms and values, platform affordances, quality of relationships and communica
tion, and relationship management. The most frequent topics emerging from the litera
ture analysis included friends, media, pair, group, adolescent, phone, communication, re
lationship, time, and medium. Over time the most frequent topic pairs shifted from focus
ing on relationships, pair/tie/link, communication, medium, and work, to more specific
media such as Facebook and related terms such as user, network, and friend. Three main
themes emerged from the literature analysis: social media platforms, young people and
adolescents, and social network analysis; each is illustrated through brief examples from
the literature. This literature emphasized inductive approaches, with two-thirds being dis
cursive reviews, largely from psychology, sociology, and communication and media disci
plines, with research methods spread across these reviews, surveys, and interviews. Of
the five Delphi categories, digital literacies, and quality of relationships and communica
tion, were rated as the most important.
Keywords: Delphi reviews, ESRC Review, Facebook, friendships, relationship formation, relationship management,
social media, social network
Introduction
THIS chapter explores the outcomes of the literature review and expert Delphi review
process for the Communication and Relationships domain. As with the other review chap
ters, the goal is not to work through a large number of examples from the literature. In
stead, building on the methods described in chapter 2, we will first set out the results of
the digital humanities-based analyses of the literature, highlighting the major topics,
Page 1 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
themes, and concepts within the literature, providing a few general examples. These are
not intended to be the “most important” examples from the literature but rather simply
indicative of the types of work. This is then followed by the presentation of the content
analysis that sought to identify the key theories and methods in use within the literature.
Next, we outline the results from the Delphi review of experts. This concludes with the
key questions, topics, and challenges we identified, comparing these to the results from
the literature work. The last section presents the recommendations for areas of future
study. As a reminder, the initial scoping question for this area of work was: “How are our
relationships being shaped and sustained in and between various domains, including fam
ily and work?”
Initial Comments
The original ESRC Domain question was criticized in the Delphi process for being too
broad and ambiguous. Importantly, it was asked whether it constitutes a viable stand-
alone question, since communicating and building relationships necessarily forms a piv
otal (p. 222) strand of nearly all activity in relation to “ways of being” in a digital society.
Therefore, looking for one very specific starting point was not seen as straightforward,
especially given the multiple ways in which relationships are expressed. Consequently,
both social behavior and results from research can vary as the context of interests, condi
tions, and constraints ebb and flow with changing digital technology. As a result, the
analysis put the initial ESRC scoping question to one side and utilized those derived from
the Delphi first round, shown in Table 8.1.
Page 2 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Of all the domains examined, the question of how media and technologies have affected
relationships and communication is one of the oldest, going back to Classical Greek de
bates over the value of orality and literacy. In the context of digital media, much early re
search in the 1980s and 1990s sought to understand how interaction without face-to-face
presence would function. This work has its roots in prior research comparing social pres
Page 3 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
ence in various pre-digital media (e.g., Short et al., 1976; Rutter 1987). These ideas were
taken up in relation to digital media in the 1980s around ideas of “cuelessness” and
formed the foundation of works such as Kiesler, Siegel and McGuire’s (1984) examination
of the effects of “reduced social cues.” Much of this work had a strongly social-psycholog
ical focus around group behavior. The cumulation and to (p. 223) a large extent rejection
of this line of work can be found in the SIDE model of online group behavior (see:
Postmes et al., 1998; Spears et al., 2002) that is also discussed in chapter 14. This is also
the basis of more recent work on deception and “anonymity” in online interaction. Some
clear parallels can be drawn between the “flaming” behavior identified by Kiesler, Siegel,
and McGuire and more recent work on contemporary anti-social behavior online (e.g.,
trolling). Other work examined the content of interaction such as the examination of so
cio-emotional content in computer conferencing by Rice and Love (1987), and how com
puter-mediated communication could foster organizational innovation (Rice, 1987, ex
tending the Short et al., 1976 work on social presence) which early on contributed to the
rejection that computer-mediated communication necessarily is cueless and therefore
generates de-regulated mediated content, such as flaming and depersonalization.
Separately, socio-linguistic work examined the textual and linguistic differences between
speech, writing, and online interaction (e.g., Herring, 1996; Yates, 1996).
Literature Analysis
The literature analysis was designed to create two analytic outcomes. First, the goal was
to identify key topics within the existing literature. This would allow for a comparison
with areas of future importance identified by the Delphi review. Second, we applied con
tent analysis of the literature to explore the predominance of specific theories, methods,
and approaches within the domain.1
Topics
As noted in chapter 2, the literature data were subjected to two analyses. The first round
of collected literature was analyzed to create concept pairs and trios, while the combined
first and second rounds of literature were analyzed to identify key topic clusters. The re
sults of these two approaches were then compared. The 10 most common concept pairs
identified by the Round 1 literature analysis are listed in Table 8.2. These represent the
concepts covering 2% or more of the identified cases. Table 8.3 lists concept pairings.
Page 4 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Concepts Percent
Friend 9.9
Media 8.2
Pair 8.0
Group 4.3
Adolescent 4.3
Phone 4.0
Communication 3.9
Relationship 2.5
Time 2.5
Medium 2.3
Level 2.1
Teen 2.1
Life 2.0
Parent 1.9
Page 5 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 6 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Multitasking 0.3
Page 7 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Richness 1.5
Storytelling 0.5
Page 8 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 9 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 10 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 11 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 12 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 13 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 14 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 15 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
All the literature collected from both rounds was then analyzed using Wordstat. Wordstat
identified 21 concepts, which are presented in Table 8.4. These map closely to the con
cept pairings identified in the above analysis.
As with the other domains, we can see a shift in focus within the literature between 2000
and 2016 (shown in Figures 8.1 and 8.2). The broad comparison of change over time in
the frequency of concept pairs associated with the subject “communication” based on the
smaller curated literature shows considerable differences between the periods 2000–
2004 and 2012–2016. Early on, the most frequent pairs involve relationships, (p. 224)
(p. 225) (p. 226) pair/tie/link, communication, medium, and work. Less frequently included
were terms such as information, use, Internet, and exchange. Thus the focus was on rela
tionships or network ties involving the process of communication, the medium of commu
nication, and the context of the relationship (work and information). By 2012–2016, there
was much less emphasis on general relationships and specific links, and more on the spe
cific medium of Facebook and related terms such as user, network, and friend. This obvi
ously reflects, in terms of more recent research, the commercial and social dominance of
the new platforms (especially Facebook) in western societies. It may also point to the fact
that data from these platforms is easily harvested along with the fact that many studies
appear to be of adolescents and colleague students—the concepts of “teen” and “college
student” are also notable in the analysis. Within this there is a distinct shift to social net
work analysis informed approaches, and this domain is one where this approach is high
lighted in the analysis. Contexts shifted from work to college, the family, students,
teens, and patient care. The mediated social network became central. Overall
(p. 227)
there appears to be a shift from studies that may have sought to generalize about digital
media—computer-mediated communication—to ones with a strong “platform focus.” The
challenges of a “platform” focus are discussed in chapter 25.
Page 16 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 17 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
In examining the papers and publications collected for this domain we found that the
identified themes and topics consistently cross cut and overlap. A paper on Facebook
would also likely raise issues about young adults, or a social network analysis would ad
dress issues of community. Underlying much of the literature are comparisons with face-
to-face, and occasionally other media (writing, TV, mass media). Such comparative goes
back to very early studies of digital media (computer-mediated communication) use dis
cussed above. We do not intend to review this work here though we would note that such
analyses are important in comparatively grounding studies in relation to existing (p. 228)
media practices. We would also note that many recent studies, and the examples exam
ined below, are more likely to explore the use of a specific digital media as part of a
citizen’s or user’s “suite” of communicative and media practices. We have therefore
pulled out three themes as starting points for the presentation of example literature in
this domain where the cross-cutting overlaps can be seen:
Social media “platform” studies. Taking Twitter and Facebook as examples of new plat
forms that have become the context of study, we find a range of different foci in the re
search literature. Many of these cross-cut the other themes identified in this domain but
also reflect broader social and media discussion. Much of the media coverage of Twitter,
Facebook, and other social media platforms has raised concerns about the level and ex
tent of data and information sharing by young people. Such concerns are also reflected in
research.
For example, Madden et. al (2013) examined the way teens share information on social
media. In fact, according to Madden et al.’s findings, few teens embrace a fully public ap
proach to social media. Instead, they take an array of steps to restrict and prune their
profiles, and their patterns of reputation management on social media vary greatly ac
cording to their gender and network size. As with many studies of new platforms, there is
a need to understand the basic features and demographics of their use. At the time of
writing Madden et al. noted an increase in the use of Twitter by teens from 16% in 2011
to 24% in 2013. They also noted that the median number of friends in Facebook was 300
and the number of Twitter followers was 79.
Their research found that teenagers were sharing more information about themselves on
such sites than they had in the past on other platforms and media. The research looked at
five different types of personal information sharing (examples of personal photos, or de
tails of school, city, email, and phone information) comparing 2006 and 2012. All five
types significantly increased. Nonetheless, many (60%) teenage Facebook users keep
their profiles private and a majority expressed high levels of confidence in managing set
tings. At the same time the research found that they have limited concerns about the use
of their data by third parties. Overall the respondents were found to utilize a range of
methods to manage their presentation of self and sharing of data online—including the
Page 18 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
deletion of other people from their networks. The focus group discussions undertaken by
the researchers found that respondents had a waning enthusiasm for Facebook for a
range of reasons. These included a dislike for the increased presence of adults on the
platform, pressures to be present, and issues around excessive and demanding levels of
posting. Yet they kept using the platform because participation was an important part of
overall teenage socializing (Madden et al., 2013). This trend has been seen to continue in
more recent studies (e.g., Anderson & Jiang, 2018). This change (p. 229) points out three
key topics researchers should emphasize when exploring the impact of specific platforms:
Similarly, Marwick and boyd (2014) examine how teenagers negotiate content in social
media. They argue that the dynamics of sites such as Facebook have forced teens to alter
their conceptions of privacy to account for the networked nature of social media. The re
searchers draw on examples from a large-scale ethnographic study consisting of 166 se
mi-structured interviews with teenagers and participant observation conducted across 17
US States to explore what they refer to as “networked privacy.” They argue that teens
conceive of privacy as the ability to control a particular situation that happens in a partic
ular place, stating that,
(p. 1056)
To achieve privacy, teens therefore use various strategies to gain control over the way
their information is distributed. Online privacy therefore becomes context-specific and
changes over time. Marwick and boyd note that,
How people achieve privacy depends not solely on their ability to navigate tech
nology, but requires them to fully understand the context in which they are operat
ing, influence others’ behaviors, shape who can interpret what information, and
possess the knowledge and skills necessary to directly affect how information
flows and is interpreted within that context.
(pp. 1062–1063)
Page 19 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
In addition, they argue that teens developed tactics to regulate who can access the infor
mation they share online, for example, encoding the content itself in order to limit the au
dience (rather than using the social media affordances of privacy settings). Thus,
(p. 1063)
Overlapping with the social network analysis theme, literature exploring specific
(p. 230)
social media often focuses on the nature of relationships in these networks (what it
means to link as a contact, friend or follower, etc.) For example, Mesch et al. (2012) ex
amine the effect of individual, relational (e.g., tie homophily, relationship type, tie dura
tion, and tie closeness), and cultural variables on communication via instant messaging
(IM). The study focuses on the frequency of interaction among users from Israel and
Canada. The researchers collected data from 785 participants between 2005 until 2006.
Participants in Israel completed a paper-and-pencil questionnaire in Hebrew, and partici
pants in Canada completed an online survey in English. Their findings show that in both
countries, IM was used primarily to keep in touch with close friends. Hours of daily IM
use was positively associated with frequency of communication via IM in both countries.
Relationship type predicted the frequency of communication via IM; for example, people
were messaging their romantic partner more frequently than with a close friend. Mesch
et al. argued that relationship variables are key to understanding IM behavior (rather
than ones relating to technology features). As they note,
The most salient result of this study is the explanatory power of relational vari
ables in the understanding of the use and content of IM. The current study pro
vides strong support for the argument that online communication is used primari
ly, but not exclusively, to maintain existing ties rather than to develop new ties.
(p. 750)
They also identified potential social and cultural variations, finding that,
Gender similarity was not associated with IM topic multiplexity in Canada, but had
a negative association in Israel. This finding suggests that in Canada same-sex and
opposite-sex pairs discuss diverse topics to the same extent, whereas in Israel
same-sex pairs are less likely than opposite-sex pairs to discuss a diverse set of
topics.
(p. 750)
They also found that IM had a specific role—mainly coordinating social activity—in rela
tionships and interactions, irrespective of the length or that relationship:
Page 20 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
(p. 751)
Overall, though, Mesch et al. found considerable similarities between the two groups of
users in Israel and Canada, stating that,
The results show that young people in both countries have strikingly similar pat
terns of usage. Participants in both countries indicated that their primary commu
nication partners to be close friends, and family members. Contacts who met on
line were rare (p. 231) in both countries, suggesting that IM is used to maintain ex
isting relationships rather than to generate new online ties.
(p. 753)
This result reminds us that much digital media use is embedded in the everyday lived
lives of people and not in some separate “cyberspace” world. This does not mean that
there are not online contexts that function primarily or solely online, but rather to point
out that digital media are now well embedded into the management of everyday social in
teraction.
Work on relationships in digital media and digital platforms also often cuts into issues of
community (see chapter 14). For example, Gruzd et al. (2011) examine the concept of
community on Twitter using Benedict Anderson’s idea of “imagined communities” (1983).
In addition to relying on Anderson’s work, they also apply two other notions of online
communities: Jones’s (1997) notion of “virtual settlement” and McMillan and Chavis’s
(1986) compilation of what constitutes a “sense of community.” In order to examine this,
the study used one of the researcher’s own Twitter accounts and examined his network
by using Twitter’s API to automatically retrieve a list of his followers and sources and to
also determine who follows whom. So as to trace changes in the Twitter network of mutu
al followers, the researchers collected these data twice: in August 2009 and February
2010. The researchers utilized a mix of social network analysis and content analysis of
the messages. They argued that,
Page 21 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
They noted that Twitter communities formed around “high centers” that include “… popu
lar individuals, celebrities, or organizations such as media companies. Yet even less popu
lar individuals on Twitter can play the role of local high centers of predominantly mutual
networks” (p. 1313).
In a similar approach, McEwen and Wellman (2013) examine how communities operate in
different contexts in light of social media such at Twitter. They argue that groups in such
media as Twitter are alternative places for people to connect with each other and that
such online interactions are just as real and authentic offline contact:
For the networked individual, ‘community’ is not geospecific but is defined as net
works of personal communities that provide sociability, support, information, a
sense of belonging, and social identity, managed on and offline using ICTs.
(p. 170)
As with many other studies, they find that Twitter groups are extensions of other
(p. 232)
social groups or communities—and that only a small proportion of Internet users met
someone new online. Thus:
These places are just alternate spaces for people of all ages to connect with their
friends and peers; technology-enabled interaction fits seamlessly into their every
day lives and complements other practices.
(p. 170)
As a result, social media platforms are not the sole focus of specific relationships; rather,
they mark one of many locations where relationship and community building work is
done:
(p. 173)
It is clear just from these example studies that social media platforms are key to under
standing communication patterns and relationships in a digital age and this behavior and
individual platforms are not separate from broader social interaction. The papers have al
Page 22 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
so cross-cut other domains, especially Community and Identity (chapter 14). We also find
that long-standing themes in social science—from presentation of self to community for
mation—form the underlying basis of the analysis.
Young people and adolescents. The use of digital media and its impacts on young peo
ple is prevalent in the literature for this domain. The review did not specifically seek to
explore the use of digital media by children—this is an area that has been extensively ex
plored in recent years from research and policy perspectives (see Livingstone, 2002;
Drotner & Livingstone, 2008; Livingstone & Sefton-Green, 2016). The literature discussed
here therefore focuses on adolescents and young adults and much of this work explores
how digital media are utilized in social interaction, relationships and socialization. For a
comprehensive review of how college students manage multiple media for purposes such
as relationships, see chapter 9.
Such research questions and concerns have a long history in the study of media—
digital or traditional, focusing on the use by and often the potential hazards that
media may hold for young people. These issues have also often been the focus of
media debates about adolescent behaviors—including many cases of media “moral
panics” (Critcher, 2003). Such debates have also influenced the direction and fo
cus of research questions. For example, prior work has explored the role of media
in the socialization of adolescents, with Arnett (1995) noting that: … media are
part of the process by which adolescents acquire—or resist acquiring—the behav
iors and beliefs of the social world, the culture, in which they live.
and consumption differs from other socializing agents such as family, school, community,
and the legal system. The key difference is that adolescents have greater control over
their media choices than they do over their socialization from these other sources:
Issues of socialization, media use, and family and community relationships are also all
bound up in issues of identity and its expression. Within the context of digital media use
this is often explored through the presentation of self online, or through form and content
of interactions via digital platforms. Here again concerns over potential harms as well as
benefits of digital media use can be found in both academic research and media cover
age. As an example, Valkenburg and Peter (2008) investigate the effects of adolescents’
Page 23 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
online identity on their offline social competence and self-conception, with an underlying
concern that digital media use might increase social anxiety. They conducted an online
survey in 2006 among 1,158 Dutch teens between 10 and 17 years old. They developed a
set of measurement scales of off-line social competence that included four subscales: ini
tiation, supportiveness, self-disclosure, and assertiveness. Their findings that even though
adolescents experimented with their online identity more have more often communicated
with people from different ages and backgrounds online, and “… although adolescents’
self-concept showed considerable variance, there was no evidence that their level of self-
concept unity is affected by engaging in online identity experiments” (Valkenburg & Pe
ter, 2008, pp. 225–226).
For some of these adolescents, this experience had positively contributed to their social
competence:
Although we did not find a positive relationship between social anxiety and online
identity experiments, our result did reveal that lonely adolescents significantly
more often used the Internet to experiment with their identity than nonlonely ado
lescents. Lonely adolescents apparently benefit from the relative anonymity of the
Internet to learn how to relate to people and to practice their social skills.
(p. 226)
(p. 234)
Such results remind us that many key explanatory variables underpinning interaction and
relationships via digital media are not “new”; they are based on a whole range of well-
known social, psychological, and cultural behaviors and factors. What may be new is the
specific manner and form in which digital media are used to support interaction and rela
tionships. For example, for a review of how computer-mediated communication are relat
ed to social support, especially during times of transition, see Mikal et al. (2013).
Page 24 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Similarly, research has focused on how teenagers and adolescents have appropriated
technologies and developed new forms of interaction in digital media. As an example,
Greenfield and Subrahmanyam (2003) examined the way participants in an adolescents’
online chatroom adapt to the features of chat to create coherence and distinct registers.
Once again, as noted above, the focus is on how digital interaction differs (or not) from
face-to-face interaction. In order to examine the strategies that adolescents use to
achieve coherence in online chats, Greenfield and Subrahmanyam conducted participant
observation in teen chatrooms, and analyzed the transcripts of the interactions. The re
searchers find two main strategies:
The strategies for achieving coherence in this environment address two important
functions—identifying a conversational partner and determining a relevant re
sponse. We suggest that adapting to the demands of online chatrooms uses re
sources from both oral and written discourse to produce a new register for online
chat.
Many of the strategies used to achieve coherence were found to be similar to those in
face-to-face conversation. These include such things as repetition and directly addressing
intended conversational partners. There are also media- and channel-specific strategies
tied to the technology or the specific norms of the group. There are also coherence be
haviors similar to those in face-to-face interaction that are articulated via the constraints
of the medium:
In addition to specific cues, there are also general judgments of topical relevance,
semantic relationship to a prior turn, and knowledge of who is participating in a
particular thread at a particular time that must come into play, both for us and for
the participants.
(p. 735)
The participants also used a range of textual and use visual cues and conventional codes,
constructing a distinct register. Use of this register marked them out as “native speakers”
of online chatrooms.
The visual nature of the online computer medium helps participants to overcome
the confusion of multiple overlapping conversations, changing participants, and
(p. 235) spatially and temporally separated conversation threads. Key strategies—
such as nickname format, use of numerals, distinctive script, standard graphic for
mat, and slot-filler framework—capitalize on the visual nature of the medium.
(p. 736)
Social network analysis. Throughout the history of the study of interactions via digital
media the “networked” nature of the interaction—especially in the context of group inter
action—has been a prominent feature. Many early studies of digital interaction focused
Page 25 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
on aspects of network structure, including power and influence, as well as the manage
ment of coherence in networked interaction (e.g., Paolillo, 2001), and how online network
links were related to emotional content and reciprocity (Rice, 1982; Rice & Love, 1987).
With the rise of “social networking sites” such as Facebook and Twitter (or their various
precursors such as MySpace or even Usenet) the nature of social-networks has become a
key topic for analysis. This has introduced the confusion of a “social network” as type of
digital media with the longstanding idea of a “social network” as an object of analysis in
social research. While also exploring their history and how academia had explored them
to date, boyd and Ellison (2007) looked to define the key characteristics of social network
sites (SNS). In this work boyd and Ellison argue that social “network sites” rather than
“networking” is a more accurate term, as it describes people communicating within their
networks rather than trying to be in these spaces solely for the sake of “networking.”
They define SNS as “services that allow individuals to (1) construct a public or semi-pub
lic profile within a bounded system, (2) articulate a list of other users with whom they
share a connection, and (3) view and traverse their list of connections and those made by
others within the system. The nature and nomenclature of these connections may vary
from site to site” (boyd & Ellison, 2007, p. 211).
As with other digital media, boyd and Ellison note how users appropriate the technology
to their needs, sometimes subverting the intentions or expectations of the technologies
designers. In particular they note the development of groups within SNS—networks with
in the network—defined by social, demographic, political, or cultural factors:
While SNSs are often designed to be widely accessible, many attract homoge
neous populations initially, so it is not uncommon to find groups using sites to seg
regate themselves by nationality, age, educational level, or other factors that typi
cally segment society …, even if that was not the intention of the designers.
(p. 214)
Importantly, boyd and Ellison point out something that has now become a core feature of
many studies of digital media—the use of SNS as a source of potentially
“naturalistic” (that is non-experimental) data for social and digital research (such as pro
file and linkage data); though more recent work has pointed out the potential biases of
such data sets (Blank, 2017; Blank & Lutz, 2017), and harmful implications for citizenship
and governance (chapters 16 and 18).
This question of methods is also present in much of the literature, as researchers look to
explore and examine new digital tools used to analyses SNS or new digital data sources
derived from SNS. Bruns and Stieglitz (2013) address aspects of this by (p. 236) consider
ing the use of standardized metrics to comparatively and systematically analyses Twitter
interaction. They are looking to
outline metrics which examine the total activity and visibility of individual partici
pants; metrics which establish the temporal flow of conversation, and of specific
forms of conversation; and metrics which combine these aspects to examine the
Page 26 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
relative contributions of specific, more or less active, user groups during each unit
of time.
They describe a catalogue of widely applicable, standardized metrics for analyzing Twit
ter-based communication, with particular focus on hashtagged exchanges in data “at
large scale.” They note the value of user-focused metrics but also look to address the
analysis of Twitter data over time, arguing,
While user-based metrics are valuable for analyzing the overall shape of the user
base of a specific hashtag, for highlighting especially active or visible contribu
tors, and for examining whether hashtags are used mainly for posting original
thoughts, for engagement within the community, or for sharing information, a sec
ond major group of metrics emerges from a breakdown of the total data-set not by
user, but by time.
(p. 99)
Bruns and Stieglitz suggest three areas for metrics: metrics which describe the contribu
tions made by specific users and groups of users; metrics which describe overall patterns
of activity over time; and metrics that combine these aspects to examine the contribu
tions by specific users and groups over time.
Such metrics and analyses also draw upon well-established methods for social network
analysis developed within sociology and information studies for the analysis of links be
tween individuals, groups, organizations or artefacts (e.g., Wasserman & Faust, 1994).
The application of such methods to explore the digital interactions or SNS interactions of
users and citizens often focus on specific communities (e.g., Rice, 1982’s over-time study
of computer conferencing groups), and therefore overlapping with the Community and
Identity (chapter 14) and Citizenship and Politics (chapter 16) domains.
For example, Vromen et al. (2015) examined how politically engaged young people inte
grate social media use into their organizations, political communication, and civic en
gagement. They conducted in-person focus groups with 12 civic groups of students from
the United States, United Kingdom, and Australia. All the groups reported that they use
social media to maintain the group, distribute related information, and organize different
kinds of events. As with many other similar studies, they found an integration between
digital media use, traditional media use, and physical and digital social networks:
While Facebook discussion does not replace meetings and events for the group
members at large, it has become essential for organizing any kind of offline group
(p. 237) meeting and ensuring event attendance. This is consolidated through so
cial media functionality, such as the public display of members saying they are at
tending an event, and especially the diary functions Facebook events add to.
Page 27 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
The analysis found four main ways that social media created or shaped the respondents’
political communication: “broadcast, new information, everyday political talk and new po
litical action” (Vromen et al., 2015, p. 90). Importantly, the researchers compared these
behaviors across three countries to explore the impact of cultural context, finding that,
the three dutiful-oriented party groups had more in common with one another in
terms of their citizenship norms and practices than they did with the identity and
issue-based groups within their own country.
(p. 95)
In the context of social network analysis, a key measure or research focus is that of social
capital—however measured. Ellison et al. (2007) examined the relationship between use
of Facebook and the formation and maintenance of social capital. They also explored the
dimension of social capital that assesses one’s ability to stay connected with members of
a previously inhabited community, which they called “maintained social capital.” The re
searchers conducted a survey with 800 undergraduate students from Michigan State Uni
versity. The students reported spending between 10 and 30 minutes on average using
Facebook each day and report having between 150 and 200 friends listed on their profile.
Ellison et al. noted that Facebook had a role in the processes by which their student re
spondents formed and maintained various aspects of social capital social capital. They al
so examined their well-being (self-esteem and satisfaction from life). Students who report
ed low satisfaction and low self-esteem seemed to gain social capital if they used Face
book more intensely. As a result they concluded that Facebook use is important for devel
oping bridging social capital:
This form of social capital—which is closely linked to the notion of ‘weak ties’—
seems well-suited to social software applications, as suggested by Donath and
boyd (2004), because it enables users to maintain such ties cheaply and easily.
As has been noted above and in many places throughout this volume, the study also found
that SNS use was integrated into everyday life. As a result, this digital media use formed
part of, rather than was a separate activity from, ongoing relationships:
Online interactions do not necessarily remove people from their offline world but
may indeed be used to support relationships and keep people in contact, even
when life changes move them away from each other.
(p. 1164)
Page 28 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
The main research methods (Table 8.7) were surveys (36%), interviews (24%), and litera
ture reviews (20%). Though many studies undertook to analyses respondents’ social net
works (often via surveys), only a small number of papers (4%) conducted formal statisti
cal social network analysis from scraped or surveyed SNS use. The majority of the empiri
cal work focused on specific groups (e.g., Facebook users) with a limited number of gen
eral population studies (Table 8.8). Less than 2% of studies overtly stated that they were
using a “big data” approach.
Percent
Percent
Page 29 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Percent
Ethnography 6.9
Experiment 9.5
Interview(s) 23.7
Other 18.0
Survey 36.0
Percent
Page 30 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Delphi Review
The following sections detail the results of the Delphi process for the Communication and
Relationship domain, covering three main areas: suggested scoping or research ques
tions, key topics to address within these questions, and key challenges to researching
these questions (see the initial comments section at the start of the chapter). The Delphi
review identified a set of scoping questions for the domain and these were coded into the
five categories detailed in Table 8.9: digital literacies, norms and values, platform affor
dances, quality of relationships and communication, and relationship management.
The ranking of these categories by the number of questions allocated to the category is
provided in Table 8.10, and by their ranked importance from the confirmatory survey is
given in Table 8.11. The two categories of scoping questions rated as the most important
were digital literacies, and quality of relationships and communication. It is important to
note that ranked importance is almost the inverse of the number of questions allocated to
the category. As has been noted already in regard to the literature, many of areas identi
fied in the scoping questions and challenges are cross-cutting of this and the other do
mains (see chapter 25), a key one of these being digital literacy.
Page 31 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 32 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Relationship management
Platform affordances
Digital literacies
Percent
The consultation workshop identified a set of issues or additional scoping questions for
each of the five categories, shown in Table 8.12. The workshop also noted that the follow
ing topics appeared to be missing from the results of the Delphi work:
Page 33 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 34 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Age 10 Integration 2
Education 6 Other 2
Politics 4 Sexuality 2
Dependency 2 Theory 2
Family 2
Page 35 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 36 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 37 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Topics
The topics identified in the Delphi review were coded into 25 categories as detailed in Ta
ble 8.13. The categories occurring the most frequently include friendships and relation
ship formation, age, privacy and ethics, work and organizations, education, and social and
community support. The consultation workshop also highlighted the following issues:
The ranked importance of these from the confirmatory survey are presented in Ta
(p. 242)
ble 8.14. As with the scoping questions, there is also divergence between those topics
that were most commonly cited in the Delphi workshop and those deemed most important
in the final workshop. However, two of the three top topics were the same: friendships
and relationship formation, and privacy and ethics, indicating these are central and im
portant topics for consideration.
The workshop participants also identified the following potential gaps in the Delphi topics
list:
• Culture
• Misinformation and miscommunication
• Teaching of digital literacies
• Exclusion/inclusion/participation
• Friendship formation (especially regarding young people)
Challenges
The challenges in undertaking research in this area identified by the Delphi panel were
placed into 16 categories. These categories are detailed in Table 8.15 and ranked by the
number of coded items, with four of those deemed to be domain specific by the consulta
tion workshop marked shown in in bold:
• Multi-platform studies
• Co-design
• Ethics and privacy
• Multi-disciplinary working
tionships. It questions how we should explore and how we assess the influence of any one
particular technological platform, when many important relationships involve so many
Page 38 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
platforms (as well as face-to-face, and “legacy media” such as phone, texting, or mass me
dia, etc.)? The question becomes how do we assess these complex combinations? (p. 244)
As a result, how do we research or follow people’s digital communication in their every
day lives—especially as looking at only one medium will likely only give us part of the
communications or relationships (social network) picture? Research on this domain
should therefore not make conclusions about relationships from single-media studies but
aim to understand communications platforms as multi-media and hybrid media, address
ing dynamic network analytics. Within this is the need to understand the physical and em
bodied use of the digital in communication activities and processes.
The third category—ethics and privacy—should look at the question of how using SNS da
ta, especially to effectively mine data about relationships (as SNS platforms themselves
do) affect our use, trust, or selection of digital technologies, whether for research, busi
ness or service provision?
Finally, multidisciplinary working is relevant to all the domains. Here it points to the need
for the research to integrate ideas from a range of disciplines to best examine and ex
plore the technical, performative, and dynamic nature of digital communication. Such col
laborations should include critical approaches (e.g., Marx, Gramsci, Hall, critical theory,
Bourdieu, Foucault) so as to question and reflect on the impacts of digital media use. In
conclusion, as with the other domains we believe that the complexity and variety of po
tential work warrants consideration to be taken of all the questions topics and challenges
identified.
Table 8.16 shows the eight most frequent challenges ranked by importance, with three of
the domain-specific in the top four listed as “very important”: ethics and privacy, multidis
ciplinary working, and multi-platform studies.
Page 39 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Co-design 13 Exclusion 2
Methods 4 Other 2
Page 40 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 41 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Noting this, we would argue that the analysis of the Delphi data suggests the following
key areas for future research (see Tables 8.10, 8.13, and 8.15):
Within these areas, future projects need to consider some key cross-cutting topics:
(p. 245)
• Multi-platform studies
• Ethics and privacy
Conclusion
Communication behaviors and relationships are fundamental to almost all online activi
ties, folded into and overlapping the other Domains. Digital media use on current scales
and developments likely to be undertaken (e.g., with the rise of the Internet of Things;
see chapter 23) make such engagements ubiquitous and almost invisible for many citi
zens. The overall impact of this expansion remains potentially unknown territory. Re
searching such change requires inter- and multi-disciplinary research methods and
groups. It was widely recognized in the literature, workshops, and by the team that a
whole new axis in communication has been brought about by the development and use of
social media. Already, scholarly research is abundant; however, many commentators felt
there were still under-researched areas, especially in terms of theory. Foremost was how
people are able integrate digital media so easily into their everyday lives. Experts ac
knowledge that there will be benefits and further potential in social media but also that
the well-documented concerns are still not well understood. These include a range of be
haviors that could normatively be described as negative, for example, hyper sociability,
Page 42 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
sexting, cyberbullying, online grooming, trolling, and more generally, the broad areas of
Internet safety and problematic use (see chapters 3 and 4).
There is an enduring concern with the virtual versus the physical aspects of com
(p. 246)
munication, with questions raised around costs and benefits of functioning effectively in a
digital world and particularly if individuals were “being shaped and diminished” by digital
technologies as opposed to proactively assessing and shaping future technologies. Under
standing what a digital person or a digital citizen becomes problematic as digital forms of
communication are folded seamlessly into lives.
A general observation was raised, that communication and relationships are impacted dif
ferently depending on the particular stages in the life course, e.g., children, adolescents,
students, adults and seniors (see chapters 5, 6, and 9) and also by the type of social rela
tions. The team noted that the literature in its breadth highlights how communication
density is intensified by digital technologies, so attention must be given to formulating re
search questions that take this into account. This is likely reflected in the topics and chal
lenges identified in the Delphi work around “multi-platform studies” within which there
needs to be focus on communication and relationships as they intersect with
• Other people
• Things and artefacts
• Our personal “curation” of self on platforms
• “Nodes” (people/artefacts/bots etc.) and networks themselves
Overall, reflecting on the literature and the data, the team noted the following general is
sues that appeared to cross-cut both the Delphi data and the literature analyses, and
which stand out as potential new questions:
The literature also indicates that Twitter and Facebook are well represented in contempo
rary literature, but research studies need to include investigations and comparisons of
other social media platforms. Moreover, the team had concerns about the attractiveness
of big data analytics, reflected in the Delphi results, as this might undermine more holis
tic multi-method approaches required to get at the dynamics of offline and online aspects
of communication and relationships.
Page 43 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
The future research identified in the Delphi process is different, though there are some
overlapping areas. The focus has shifted towards more general studies of communication
and relationship in everyday life and the need to understand the integration of multiple
media into communication and relationship behavior. The key questions, topics, and chal
lenges include: norms and values; the “affordances” that different platforms provide; the
quality of relationships and communication supported by digital media and technologies;
and the management of relationships via digital media and technologies. Within these ar
eas key issues to consider are: social and community aspects, privacy and ethics, exclu
sion, social change, and work and organizations.
References
Anderson, M. & Jiang, J. (2018). Teens, social media & technology 2018. Pew Research
Center, 31 (http://publicservicesalliance.org/wp-content/uploads/2018/06/Teens-
Social-Media-Technology-2018-PEW.pdf)
Arnett, J. J. (1995). Adolescents’ uses of media for self-socialization. Journal of Youth and
Adolescence, 24(5), 519–533.
Blank, G. (2017). The digital divide among Twitter users and its implications for
(p. 248)
Blank, G., & Lutz, C. (2017). Representativeness of social media in Great Britain: Investi
gating Facebook, Linkedin, Twitter, Pinterest, Google+, and Instagram. American Behav
ioral Scientist, 61(7), 741–756.
boyd, d. n., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholar
ship. Journal of Computer-mediated Communication, 13(1), 210–230.
Bruns, A. & Stieglitz, S. (2013). Towards more systematic Twitter analysis: Metrics for
tweeting activities. International Journal of Social Research Methodology, 16(2), 91–108.
Page 44 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Critcher, C. (2003). Moral panics and the media. London, UK: McGraw-Hill Education.
Donath, J. & Boyd, D. (2004). Public displays of connection. BT Technology Journal, 22(4),
71–82.
Drotner, K., & Livingstone, S. (Eds.). (2008). International handbook of children, media
and culture. Thousand Oaks, CA: Sage.
Durkheim, E. (1993). The division of labor in society. (transl. by G. Simpson), New York:
The MacMillan Company (originally published 1893).
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook friends: Social
capital and college students’ use of online social network sites. Journal of Computer-Medi
ated Communication, 12(4), 1143–1168.
Greenfield, P. M., & Subrahmanyam, K. (2003). Online discourse in a teen chatroom: New
codes and new modes of coherence in a visual medium. Journal of Applied Developmental
Psychology, 24(6), 713–738.
Goffman, E. (2002, 1959). The presentation of self in everyday life. New York, NY: Anchor
Books.
Gruzd, A., Wellman, B., & Takhteyev, Y. (2011). Imagining Twitter as an imagined commu
nity. American Behavioral Scientist, 55(10), 1294–1318.
Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-
mediated communication. American Psychologist, 39(10), 1123–1134.
Livingstone, S. (2002). Young people and new media: Childhood and the changing media
environment. Thousand Oaks, CA: Sage.
Livingstone, S., & Sefton-Green, J. (2016). The class: Living and learning in the digital
age. New York: NYU Press.
Madden, M., Lenhart, M., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M.
(2013, May 21). Teens, social media, and privacy. Pew Research Center. http://
assets.pewresearch.org/wp-content/uploads/sites/14/2013/05/
PIP_TeensSocialMediaandPrivacy_PDF.pdf
Marwick, A. E., & boyd, d. (2014). Networked privacy: How teenagers negotiate context
in social media. New Media & Society, 16(7), 1051–1067.
Page 45 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
McEwen, R., & Wellman, B. (2013). Relationships, community, and networked individuals.
In R. Teigland & D. Power. (Eds.), The immersive internet (pp. 168–179). London: Pal
grave Macmillan.
Mesch, G. S., Talmud, I. & Quan-Haase, A. (2012). Instant messaging social networks: In
dividual, relational, and cultural characteristics. Journal of Social and Personal Relation
ships, 29(6), 736–759.
Mikal, J. P., Rice, R. E., Abeyta, A., & DeVilbiss, J. (2013). Transition, stress and computer-
mediated social support. Computers in Human Behavior, 29(5), A40–A53.
Paolillo, J. C. (2001). Language variation on Internet Relay Chat: A social network ap
proach. Journal of Sociolinguistics, 5(2), 180–213.
Postmes, T., Spears, R., & Lea, M. (1998). Breaching or building social boundaries? SIDE-
effects of computer-mediated communication. Communication Research, 25(6), 689–715.
Rice, R. E., & Love, G. (1987). Electronic emotion: Socioemotional content in a computer-
mediated communication network. Communication Research, 14(1), 85–108.
Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications.
London: Wiley.
Spears, R., Lea, M., Corneliussen, R. A., Postmes, T., & Haar, W. T. (2002). Computer-me
diated communication as a channel for social resistance: The strategic side of SIDE. Small
Group Research, 33(5), 555–574.
Subrahmanyam, K., & Lin, G. (2007). Adolescents on the net: Internet use and well-being.
Adolescence, 42(168), 659–678.
Valkenburg, P. M., & Peter, J. (2008). Adolescents’ identity experiments on the Internet:
Consequences for social competence and self-concept unity. Communication Research
35(2), 208–231.
Page 46 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Vromen, A., Xenos, M. A., & Loader, B. (2015). Young people, social media and connective
action: From organisational maintenance to everyday political talk. Journal of Youth Stud
ies,18(1), 80–100.
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications
(Vol. 8). Cambridge, UK: Cambridge University Press.
Yates, S. J. (1996). Oral and literate linguistic aspects of CMC discourse: A corpus based
study in S. Herring (Ed.), Computer-mediated communication: Linguistic, social, and
cross-cultural perspectives (pp. 29–46). Amsterdam: John Benjamins (International Prag
matics Series).
Notes:
(1.) As part of the review, The Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/ provides ac
cess to the top 50 most frequently occurring pairs and trios through a series of data visu
alizations. Click on View Data Visualizations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
ticles at the top. Also, see https://waysofbeingdigital.com/literature-analysis-interactive-
results/ for interactive visualizations with mouse-overs of the main clusters of concepts
within each Domain, and the relative frequency of concepts associated with each cluster.
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Page 47 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Rich Ling
Rich Ling (PhD, University of Colorado) has focused his work on the social conse
quences of mobile communication. He was a professor at the IT University of Copen
hagen, where he has served in department management, and he works at Telenor
near Oslo, Norway. Ling has been the Pohs visiting professor of communication stud
ies (2005) at the University of Michigan in Ann Arbor, where he has an adjunct posi
tion. He is the author of the book Taken for grantedness (2012 MIT Press), which was
recently the subject of a complementary review in the journal Science. He has also
written New tech, new ties (2008, MIT), The mobile connection (Morgan Kaufmann)
and, along with Jonathan Donner, he has written the book Mobile phones and mobile
communication (2009, Polity). Ling is a founding co-editor of the Sage journal Mobile
Media and Communication. He is the co-editor of the Oxford University Press series
Studies in Mobile Communication with Gerard Goggin and Leopoldina Fortunati.
Along with Scott Campbell he is the founding editor of The Mobile Communication
Research Series and he is an associate editor for The Information Society, The Jour
nal of Computer Mediated Communication, and Information Technology and Interna
tional Development.
Laura Robinson
Page 48 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
mational inequalities. Her other publications explore interaction and identity work,
as well as new media in Brazil, France, and the United States.
Catherine Brooks
Catherine Brooks (PhD, University of California) is the Founder and Director of the
Center for Digital Society and Data Studies (CDSDS), Director of Arizona’s iSchool,
and an Associate Professor in the School of Information. Catherine’s primary re
search interests focus on issues of language and culture, with particular concern
about data privacy and digital exclusion. She established the CDSDS as an interdisci
plinary research center meant to explore today’s grand challenges related to a digital
society and data-driven culture. Catherine has spent more than 20 years in higher
education, she developed the new Information Science and eSociety degree program
for the School of Information at UA, and has published work on a variety of topics to
include supporting faculty online and training students for life and work in a digital
society.
Adam Joinson
Monica Whitty
Elinor Carmi
Page 49 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communication and Relationships
Page 50 of 50
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.9
The continuing evolution and use of a wide array of digital media represents challenges
to understand and learn new features and applications, as well as manage the contradic
tions and paradoxes of both positive and negative implications, often simultaneously. This
chapter explicates the concept of media mastery, the more or less conscious and more or
less successful ongoing process of how people master (understand, manage, make sense
of, cope with, and use) one or more new media in their everyday lives, as well as how me
dia in turn master (manage, control, or affect) individuals and their social relations.
Based on extensive and iterative analyses of transcripts of focus groups with college stu
dents in Norway and the United States and several rounds of reviewing research litera
ture about college students’ use of new media, we develop a typology of three sets of con
textual factors or occasions for media mastery (Technology, Social Aspects, and Individual
Aspects), and a set of Media Mastery factors (access, boundaries, constraints, managing
content, obstacles, and use awareness). We use this typology to produce a focused litera
ture review of 218 articles from 2010 to 2018. One implication is that the concept of me
dia mastery appears to underlie a variety of theoretical approaches to understanding uses
and effects of new media.
Keywords: college students, digital media, effects of new media, focus groups, media mastery, new media, uses of
new media
Introduction
DIGITAL media, from the early Arpanet and email through to current developments such
as social media and the Internet of Things, have changed our everyday lives and social re
lationships.1 But every aspect of society has also become more and more dependent on
that technology. We use digital media for information, education, entertainment, interac
tion, and consumption, and for managing countless aspects of our lives. Yet digital media
also compete for people’s attention, energy, time, identity, and relationships in a way that
can be challenging, risky, and harmful for individuals, groups, and society (Xu, Wang, &
Page 1 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
David, 2016). Our concern, then, is the tension between the process of trying to master
digital media, and the process of being mastered by them (Rice, Hagen, & Zamanzadeh,
2018). The purpose of this chapter is to synthesize and understand the uses and effects of
digital media among college students through the framework of media mastery, pervasive
but latent in the current literature. We do so by reviewing examples of media mastery fac
tors associated with social and individual contexts.
Different age cohorts and life span periods are associated with different exposure to and
use of information and communication technologies (ICTs), experiences of positive and
negative aspects of ICTs, and cognitive and emotional abilities used to manage ICTs (Rei
necke et al., 2017). We focus on college students, because they: have grown up with an in
creasingly diverse array of new media, are usually experiencing significant transitions
from their family and high school friends, are engaging in a wide variety of new social in
teractions and contexts, and are required to take personal control over (p. 251) their
tasks, schedules, and relationships (DeAndrea, Ellison, LaRose, Steinfield, & Fiore, 2012;
Manago, Taylor, & Greenfield, 2012; Turkle, 2011). They are also prodigious users of digi
tal media and experience a wide array of positive and negative uses and outcomes. We
note just a few examples.
Amount of use is considerable. In a 24-hour tracking study of the mobile phone use of 793
university students in four countries, Mihailidis (2014, p. 58) found that 31% of the par
ticipants logged into social networking apps more than 13 times in a 24-hour period,
clearly demonstrating the centrality of mobile Internet use for the “tethered generation.”
In Moreno et al.’s (2012) experience sampling study with 189 undergraduate students,
participants multitasked 56.5% of the time they were online.
Types of use are diverse. Analysis of a week’s worth of social media usage by college stu
dents documented content-sharing, text-based entertainment/discussion, relationships,
and video consumption as the main clusters of activity (Wang, Niiya, Mark, Reich, &
Warschauer, 2015).
Negative implications are extensive. A panel study among 484 undergraduate students
from the United States found negative effects of perceived “cyber-based overload” (e.g.,
e-mail volume, pressure to respond, perceived pressure to post content on social media
etc.) on perceived stress and overall health status (Misra & Stokols, 2012, p. 740). In a
survey study with 600 student participants, LaRose, Connolly, Lee, Li, and Hales (2014)
explored the effects of “connection overload” (p. 59) arising from the communication de
mands resulting from social media and e-mail use.
Page 2 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Media mastery is the more or less conscious and more or less successful ongoing process
of how people understand, manage, make sense of, cope with, and use one or more new
media in their everyday lives, as well as how media in turn come to manage, control, or
affect individuals and their social relations. Media mastery includes the choices, engage
ment, habits, and patterns people engage in and develop in their lives regarding the use
of media, its content, and its social connections (see also Picone, 2017). Our concept of
media mastery entails four main arguments.
1. Media mastery invokes the reciprocality among structure, actors, and technology
of structurational theory (Jones & Karsten, 2008) and adaptive structuration
(DeSanctis & Poole, 1994), in the context of individuals, groups, social contexts, and
new media. Thus, we apply the concept of media mastery in two ways. The first is
how we master the balance and use of one or more media in different (p. 252) con
texts. The second is the more subtle issue of the ways in and extent to which these
media master us—as our activities, concerns, and relationships are being shaped
through, facilitated and constrained by, and dependent upon, the use of these media.
For example, users may learn about themselves, and benefit from, online identities,
but managing and repairing those requires constant connectedness, awareness, re
vising, and tending (boyd, 2015). This awareness of the dual nature of media (or for
that matter, any technology) is not new: Postman (1996), in the context of television
and computers, claimed that more important than learning how to use media is
learning how they use us.
2. Crucial to the media mastery concept is the awareness, interpretation, and man
agement of both (often simultaneously) positive and negative aspects and implica
tions of media use. Katz and Rice (2002) applied a syntopian approach to the study of
Internet use specifically to reject either a utopian or dystopian perspective. Smith
(2015), summarizing a U.S. Pew survey, noted that while from 70% to over 90% re
ported positive benefits relative to disadvantages of their smartphone use, younger
users were more likely to report both positive as well as negative emotions about
their use. Best, Manktelow, and Taylor’s (2014) review of a decade’s worth of studies
on online communication, social media, and adolescent wellbeing, found both posi
tive implications (self-esteem, perceived social support, increased social capital, safe
identity experimentation and increased opportunity for self-disclosure) and negative
effects (exposure to harm, social isolation, depression and cyber-bullying). Much re
search and popular literature underscores the potential for various media dependen
cies, problematic use, and addiction (David, Kim, Brickman, Ran, & Curtis, 2015).
3. Tensions, contradictions, and paradoxes arise in and from media experiences. Re
search on new media in general and the Internet and mobile phones in particular has
identified tensions, contradictions and paradoxes in their use, social construction,
and implications, though with varying definitions and foci. For example, Rice, Hagen,
Page 3 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
and Zamanzadeh (2018) identified a variety of paradoxes associated with college stu
dents’ use of new media, such as being both stimulating and exhausting, and both
flexible and uncontrollable. Jarvenpaa and Lang’s (2005) analysis of urban mobile de
vice users in Helsinki, Tokyo, Hong Kong, and Austin grouped an initial set of 23
paradoxes into eight: empowerment/enslavement, independence/dependence, fulfills
needs/creates needs, competence/incompetence, planning/improvisation, engaging/
disengaging, public/private, and illusion/disillusion.
4. Media mastery is highly contextual, shaped by the user’s own and their social
groups’ values and attitudes towards media, their motivations for using media, and
the characteristics, capabilities, convergence, affordances, mobility, and personaliza
tion of media. Thus the balance between mastery of media by users, or of users by
media, shifts across media, contexts, and time. Using media for some goals in some
contexts may have different and even opposed interpretations or outcomes, or acti
vate or even preclude other goals, in other contexts.
We distinguish the concept of media mastery from a range of established as well as re
cent terms, ranging from the more individual to the more societal. Some approaches fo
cus on individuals’ self-regulation and attention, emphasizing both psychological and cog
nitive aspects. For example, Wu (2015) identified four dimensions of an online learning
motivated attention and regulatory strategies scale, comprising perceived attention dis
continuity, and social media notifications (constituting knowledge of attention), and be
havioral strategies, and mental strategies (constituting regulation of attention). Thus Wu
highlights the important role of meta-attention or motivated attention. Integrating those
with a variety of other measures, Wu clustered users into five categories: (1) motivated
strategic, (2) the unaware, (3) the hanging on, (4) the non-responsive, and (5) the self-dis
ciplined. Media mastery involves self-regulation but that is only one component of an
individual’s experience of mastery or of being mastered. A related approach is the con
cept and practice of mindfulness (Schonert-Reichl & Roeser, 2016)—which highlights the
importance of paying attention (in a non-judgmental way) to what you are paying atten
tion to, and to avoid being distracted—to the use of media (Hadar & Ergas, 2018; John
son, 2015; Levy, 2017). Levy’s exercises help students become more mindful and reflec
tive about their technology use, to reshape use and social interactions. Johnson suggests
thinking about media use as an information diet, leading to “conscious consumption.”
Media literacy is more general and more cognitively oriented, emphasizing the awareness
of media practices and the development of media-related skills (O’Neill & Hagen, 2009).
Rheingold (2012) integrates mindfulness with media literacy, also underscoring the im
portance of being aware of how we think about our media use. He proposes five central
digital literacies: conscious attention and intention, critical evaluation of content, partici
pation and managing your presentation, collaboration and sharing, and developing net
works and social capital. Literacy bolsters users’ awareness of various aspects of media,
Page 4 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
but via media mastery requires individuals to personalize this information to their capaci
ties, desires, and social surroundings.
James (2014) identifies three value-oriented ways of thinking about media use in relation
to others, manifesting different levels of conscientious connectivity, “the use of ethical
thinking skills, a sensitivity to the moral and ethical dimensions of online situation, and a
motivation to reflect on and wrestle with the associated dilemmas” (James, 2014, p. 109).
This varies both individually and across online communities. Thus, she asks, what are
young people thinking when they use new media? The vastly increased ability to interact
with (knowingly or not) diverse others across time and space deepens the gaps between
(1) consequence thinking (concerned with implications of a specific action for oneself), (2)
moral thinking (an application of principles with known individuals or a group) and (3)
ethical thinking (an other-focused consideration of the implications for a broader commu
nity or public, concerned with roles and responsibilities thinking, complex perspective
taking, and community thinking; James, 2014, pp. 5–7). A 2008–2012 study by James and
colleagues identified five ethically related themes related to the use of social network
sites, blogs, content-sharing sites, and gaming communities by youth and young (p. 254)
adults: “online identity, credibility, privacy, property, and participation” (p. 18). The con
cept of conscientious connectivity is about when and where youth thinking is sensitive to
moral or ethical issues, and where there are blind spots (favoring self-interest over oth
ers’ interests, and where other concerns diminish ethical concerns, but also including
blind spots about technical aspects of new media, such as the extent to which postings
can be viewed by the general public) and disconnects (more conscious and intentional
dismissal of or indifference to others’ interests in favor of self-interests).
Domestication theory explains how new media, through adoption, integration, and con
version, become embedded into daily practices (initially in the home, but then applied in
wider contexts), and blur traditional home/work/life boundaries (Haddon, 2003; Silver
stone & Hirsch, 1992). What is new eventually becomes an artifact (Rice, 1999). Taken-
for-grantedness is the social condition whereby a medium has become fully integrated in
to society, embedding expectations, interdependencies, and social practices (Ling, 2012),
or, in diffusion of innovations terms, structured and routinized (Rogers, 2003). This con
cept overlaps with the more individual behavior of media use habit, or habitual media
use, which itself overlaps with dependency, addiction, and general problematic use
(Wilmer & Chein, 2016). Domestication and routines play a role at individual and social
levels of media mastery. Over time, as individuals and societies adapt to, and adopt, the
tools they’ve created, used, learned, applied, and become familiar with or dependent on,
the skills for managing media and their positive or negative outcomes will change and
may improve.
Given the expanding realm of media choices, the concept of polymedia emphasizes that
understanding, choice, and use of a medium is relative to comparisons with other avail
able media (Madianou & Miller, 2013). Rainie and Wellman (2012) and others have dis
cussed the growth of this multiple media environment. Experiences, from small to large,
now involve multiple, multitasking, interdependent, layered, and blended media (Hilbert,
Page 5 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Vásquez, Halpern, Valenzuela, & Arriagada, 2017). Helles (2013) characterizes this new
environment with the term intermediality, especially as, with the widespread adoption
and constant evolution of the mobile phone, “the user becomes a mobile terminus for me
diated communicative interaction across the various contexts of daily life” (p. 14). For
merly distinct, independent, or location-specific features, and content are now available
through smartphones, laptops, and tablet computers. Thus digitization, mobility, and net
working create convergence across content and media, and allow or require comparisons
across media choices (Jensen, 2010). Burchell (2017, p. 409) highlights that “the
individual’s perception of [the] environment of increasingly differentiated communication
possibilities becomes a site for managing and partially negotiating the limits, form and or
ganization of one’s social world.” A related concept is Couldry’s (2012) media manifold,
where activities are embedded in a pervasive environment of networked media. Other
conceptualizations such as mediapolis (Silverstone, 2007) and medialife (Deuze, 2012) re
fer to the increasing embeddedness, interrelatedness and invisibility of media, creating a
pervasive social, sensory, and cognitive experience (Miller, 2014). Gershon (2010) dis
cussed media ideologies, which shape perceptions of media practice norms. Mediatization
focuses more on how media are at the center of (p. 255) significant cultural, political and
social developments, and become embedded and hidden (Deacon & Stanyer, 2014; Hjar
vard, 2009; Miller, 2014; Livingstone, 2009).
Media mastery takes a more micro focus (individuals and their social relations) than do
social construction of technology or social shaping of technology approaches. The social
construction of technology (Klein & Kleinman, 2002; Pinch & Bijker, 1987) centers around
five major components: Interpretive flexibility (social circumstances and intergroup nego
tiations affect interpretation and meaning of a technology, and thus varying final de
signs); multiple relevant social groups (shared and competing interpretations and mean
ings within and across groups affect technology development and outcome); closure and
stabilization (moving through and negotiating conflicting interpretations to resolution,
closure, and a stable artifact); the wider context (society, culture, politics, power); and the
technological frame (cognitive frame of a relevant group, with shared goals, problems,
theories, procedures, and exemplars). The social shaping of technology approach(es)
places more emphasis on the social, economic, and policy, in addition to the technical, as
pects of innovation processes and technology form. Social, cultural, economic and institu
tional forces affect each (conscious and unconscious) choice among technical options, of
ten exhibiting path dependence and varying levels of lock-in or closure, with subsequent
ly different innovation trajectories and social implications (MacKenzie & Wajcman, 1985;
Williams & Edge, 1996). Thus media mastery does not explicitly consider the origin, de
velopment, and design of technological innovations; rather, it is about the construction
and shaping by (mastering), and of (being mastered), individuals in their social settings of
the meanings, choices, uses, and consequences of, and by, new media already available to
them.
Page 6 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Our initial interest in college students’ use of digital media arose from our observations of
the way computers and mobile phones seemingly were already central technologies in
their daily lives in the early 2000s. Thus, we initiated the Media Mastery Project, where
the focus is on exploring the way college students attempt to use and master digital (es
pecially multiple) media. We first conducted a literature review and analyzed focus group
interviews with students at two universities in the U.S. and Norway in 2005/2006 (Rice &
Hagen, 2010). Based on those results and an updated literature review, we iteratively de
veloped and refined a detailed Media Mastery typology. We used that to code another
round of similar focus groups in 2016 (Rice, Hagen, & Zamanzadeh, 2018). For example,
we discovered that students experienced attempts (conscious or not) to master media
through their experiencing of paradoxes, contradictions, and tensions, while also being
themselves somewhat mastered (conscious or not) by these media. Based on those re
sults, we extended and further refined the typology to use in coding the current set of ar
ticles. Essentially, we followed Chaffee’s (1991) claim that “In practice the scholar begins
reading prior studies, moves to various steps in the explication process, refines the pre
liminary definition, and then returns to the literature search with a sharpened
definition” (p. 22). Our approach expands beyond an emergent-only or solely grounded-
theory approach, which would ignore a vast existing (p. 256) set of concepts and litera
ture, as well as a solely a priori approach, which would exclude insights beyond the initial
framework. Rather, it takes what Boell and Cecez-Kecmanovic (2014) call a hermeneutic
approach, by engaging in iterations between (cycles of) search and acquisition, and (cy
cles of) analysis and interpretation. But it takes that approach even further, by including
content and thematic analyses from a set of focus groups a decade apart. Both sources
provided some concepts not found in the other, and revealed some different insights in
different time periods. Thus the current review synthesizes how the concept of media
mastery illuminates the research literature about college students’ experiencing of digital
media, within social and individual contexts.
The initial literature review was based on Proquest Social Sciences databases, Google
Scholar, and other publications we were aware of, as well as foundational publications
from the 2010 literature review. New concepts or issues arising from the focus groups
lead us to seek additional relevant publications. Once the typology was fully developed,
we then conducted two literature searches. Both were for the period Jan 1 2010 – Jan 1
2018, full text articles in scholarly peer-reviewed journals, or book chapters. Search
terms were (student* AND (college OR university)) AND (digital OR social media OR lap
top OR mobile phone OR smartphone OR personal computer OR tablet computer OR IPad
OR Internet OR World Wide Web). We first searched in abstracts in Proquest (ERIC, Psy
chArticles, PsychInfo, Sociological Abstracts), retrieving 65, of which 7 were relevant.
Page 7 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Then we searched in the title or abstract in the Social Sciences Citation Index, which re
turned 3896 publications, which were sorted by relevance (using the SSCI feature); the
top 10% of the title and abstracts were read for relevance. Publications about “young
adults” were included if they specifically indicated college ages. Publications were not in
cluded about: use of media for campus campaigns, interventions, or activism; studies of
technology for pedagogy or educational policy, or evaluation of digital media use in class
room on performance, unless from the students’ perspective; and samples of college stu
dents without explicit focus on media use. Finally several recent highly relevant books
and book chapters were added. From all these sources, we identified 218 publications.
Thus our review is extensive and well-grounded and -developed, but is neither compre
hensive nor statistically representative.
Where possible, we obtained the full publication (.pdf, .html, .docx); 26 were not avail
able, so we used the title and abstract. These were imported into NVIVO 11, along with
the full coding typology (component code, subcodes, and subsubcodes, each of which can
be aggregated to its higher level analysis). We prepared a spreadsheet with the reference
and abstract for each publication. The articles and spreadsheet were separated into three
sets, grouped alphabetically, one for each author.
The media mastery typology includes three sets of contextual factors or occasions for me
dia mastery (Technology, Social Aspects, and Individual Aspects), and a set of Media Mas
tery factors. These media mastery factors are ways in which media can more or less “mas
ter” the user, and ways in which users can attempt to more or less “master” media. Table
9.1 summarizes and briefly defines these factors (codes) and their levels of subcodes. The
NVIVO project also included a Context category (location of media use by the respon
dents, the type of respondents, and country of the study), and a new emergent category
of Theory and Frameworks (includes explicit naming of a theory or a model, as well as of
primary concepts, used to frame or motivate the study), and a working category for emer
gent New Codes for later discussion, relabeling, and integration into the appropriate sub
codes.
Page 8 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
(p. 258) Table 9.1 Media Mastery Typology Codes and Sublevels
Page 9 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Cognition (rational,
mental information pro
cessing and outcomes
(attention, learning, re
call, etc.))
Note: Only the first and last subsubsubcodes for each subcode are
listed here. See Table 9.2 for a list of each subsubcode for the Media
Mastery subcodes. The full list of codes, subcodes, subsubcodes, and
subsubsubcodes, with short operational definition, is available in the
supplemental codebook.
Page 10 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Before coding, the three authors carefully reviewed and discussed every code on the ty
pology. We next read our spreadsheet’s set of titles and abstracts to get an overview of
the range of topics and terms. For coding, we first read each of our publications (exclud
ing abstract and references) to determine and code for (1) the motivating theory, model
or concept, and (2) for the population and country context. For each publication, we then
checked each paragraph (excluding abstract and references) for (3) any indicators of me
dia mastery codes. If so, we coded that paragraph for (4) any and all specific subsubcodes
of the media mastery component, (5) any instance of a specific technology/device/site
subsubcode, (6) any instance of a subcode in the other two Technology subcodes, or of a
Social or Individual subcode, and (7) any emergent codes into Theories and Frameworks,
or into New Codes, for later discussion, grouping, and inclusion. Finally, we each also
maintained and later discussed a journal within NVIVO to document any questions or sug
gestions.
We first each coded several of the same articles, and met to discuss ambiguities or addi
tions. From then on, each author worked on their set of one-third articles, grouped alpha
betically. In the next week we separately coded 10 articles each, met to discuss the
(p. 259) codings and clarifications, and documented any changes or additional codes. The
following week we repeated the coding and discussion process with the next 10 articles
each. Finding few additional codes by that time, we then proceeded to code and then dis
cuss the next 20 articles each from our separate sets, and repeated that process until all
articles were coded. At each meeting we discussed any new Theories or Frameworks
codes or any New Codes, and then each updated our coding file with those so all coders
had access to any new codes. As both the list of codes, and the coding process, evolved
most during the early stages, when all articles were coded, we removed the codes from
each of our first 10 articles, and recoded them using the full coding set and coding proce
dures.
When all articles were coded, we then met to discuss all the new Theories and Frame
works, and the New Codes, and grouped similar ones, especially those with few in
stances. For example, under Theories and Frameworks, bridging and bonding compo
nents were grouped with the general theory of social capital; or under New Codes, man
aging and expressing emotions were grouped under emotions. Finally, we decided where
to move each of the New Codes into the prior codes. The final typology reflects this exten
sive, iterative, multi-year, multi-study, and multi-data process. The typology and coding
operationalizations, as well as the full list of analyzed references, are available from the
first author.
Technologies, Context, and Theories were not the focus of the study, were coded for oc
currence anywhere in the article, and thus were not specifically related to text indicating
the media mastery components. Therefore, they are not included in the co-occurrence re
Page 11 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
view later in the chapter. A wide range of technologies appeared throughout the retrieved
literature. These include 58 devices (from alarm apps to YouTube), representing 182 arti
cles and 380 codings; 9 features (from accessories to personalizing settings), represent
ing 12 articles and 20 codings; and 51 uses (from achievement to writing), involving 30
articles and 60 codings. Nearly all (202) of the 242 population subsubcodes were of col
lege students, with a few samples consisting of adolescent or young adults that included
college students. There were 209 country subsubcodes, with the most to the United
States (88) and China (32), Turkey (14), and Taiwan (11), with at least one coding to an
other 36 countries (from Argentina to the United Kingdom). 133 out of the 218 articles
mentioned a total of 131 theories, models, frameworks, or primary concepts, with 239
coding instances, ranging from the accessibility hypothesis (Yang et al., 2017) to vertical
discourse (Bennett & Maton, 2010). The theories and frameworks mentioned in the most
articles included social capital (14 articles), uses-and-gratifications perspective (12), ad
diction (10), internet addiction (9), digital natives, social cognitive theory (6 each), attach
ment theory, problem behavior theory (4), and cognitive-behavioral theory, cyberbullying,
diffusion of innovations, life satisfaction, personality, smart phone addiction, and subjec
tive well-being (3).
Table 9.2 lists each of the Social, Individual, and Media Mastery codes and subcodes, and
in the case of Media Mastery the subsubcodes, along with the number of subsubcodes,
(p. 260) (p. 261) (p. 262) (p. 263) the number of articles jointly coded
(p. 264) (p. 265) (p. 266)
for a specific Media Mastery subsubcode and either a Social or an Individual subcode,
and the number of times each code was used, all provided by NVIVO.
For the following review, we then retrieved co-occurrences in NVIVO of media mastery
subsubcodes with each of the social aspects and individual aspects subcodes. Here, each
of the authors coded two different sets of the subsubcodes, so that coders and materials
were crossed between coding and reviewing. Only a few examples from the most frequent
and/or most interesting or unique co-occurrences are used. (All citations with three or
more authors are referred to as “et al.”)
Page 12 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Table 9.2 Co-occurrences of Media Mastery Subcodes with Social and Individual Aspects Subcodes
Page 13 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Access Social re Social in Self-pre Problem Health Traits Cognition
(A:158, R: lations fluence sentation atic use (SC:25, A: (SC:9, A: (SC:6, A:
750) (SC:24, A: (SC:21, A: (SC:17, A: (SC:22, A: 117, R: 58, R: 69, R:
105, R: 36, R:82) 49, 86, 309) 109) 217)
307) R:114) R:265)
1. access 6 0 0 9 17 1 6
2. access 0 0 0 0 2 1 3
(to a medi
um)
3. access 0 1 0 0 0 0 0
to others
4. accessi 105 28 26 74 64 29 38
bility—con
tent & peo
ple
Page 14 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
5. avail 75 8 10 20 25 20 13
ability of
self and
others
through
media
6. collabo 13 6 0 4 4 2 11
ration
through
media
7. conve 17 2 4 17 16 4 9
nience—
ease
8. notifica 1 0 0 0 0 0 0
tions
9. passive 4 2 0 6 3 2 3
—low ef
fort
10. social 8 1 1 0 6 1 3
coordina
tion ability
Page 15 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Bound Social re Social in Self-pre Problem Health Traits Cognition
aries lations fluence sentation atic use
(A:161, R:
894)
1. account 11 5 5 9 3 6 0
ability—re
sponsibility
2. 7 1 3 9 4 7 0
anonymity
3. audi 8 5 12 5 3 3 2
ence
4. balanc 1 0 2 2 1 1 0
ing online
and offline
self
5. balanc 2 1 1 0 1 0 0
ing online
and offline
social net
works
Page 16 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
6. barriers 0 0 0 0 0 0 0
to or facili
tators of
integration
across
boundaries
7. blending 12 5 4 4 5 3 17
—blurring
8. constant 35 9 8 28 31 9 14
connection
9. context 1 0 5 1 2 0 0
collapse
10. contin 3 2 0 0 1 0 3
uous co-
presence
11. divides 12 0 4 7 8 4 13
12. identi 0 0 0 0 2 0 0
ty disjunc
ture
Page 17 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
13. 1 1 0 1 1 0 0
parental
access
14. perma 3 3 4 3 1 0 1
nence
15. perpet 9 1 2 4 3 0 3
ual—per
sistent—
contact
(subset)
16. person 0 0 0 0 1 0 0
al space
17. perva 4 2 0 2 3 2 0
sive aware
ness
18. privacy 9 4 12 17 6 2 4
19. public 5 4 5 3 2 0 2
20. safety 8 2 6 6 8 1 0
Page 18 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
21. self- 22 10 41 5 6 9 2
broadcast
ing
22. self- 0 0 0 0 0 0 0
editing or
self-cen
sorship
23. surveil 5 3 1 4 3 3 1
lance
24. transi 25 2 4 3 18 3 7
tions
25. trust 5 1 3 0 2 1 0
26. ubiqui 3 1 2 4 2 1 5
ty
27. visibili 13 5 10 8 8 5 3
ty—trans
parency
28. vulner 14 3 4 27 36 14 3
ability
Page 19 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
29. watch 5 4 0 4 2 2 5
fulness
30. work— 0 0 0 1 0 0 4
nonwork
Con Social re Social in Self-pre Problem Health Traits Cognition
straints lations fluence sentation atic use
(A:101, R:
291)
1. ambiva 2 2 1 4 2 1 1
lence
2. contra 30 12 9 35 30 8 26
diction—
paradox—
tension
3. double- 0 1 0 0 1 0 0
standards
4. interpre 0 0 0 0 0 0 0
tive flexi
bility (con
trasts)
Page 20 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
5. irony 1 3 0 1 2 1 1
6. loss or 17 2 3 9 7 5 7
change of
some tradi
tional skills
or activi
ties or re
lations
7. negotiat 2 0 0 0 0 0 1
ing
8. unin 7 4 1 14 14 3 6
tended
conse
quence
Managing Social re Social in Self-pre Problem Health Traits Cognition
Content lations fluence sentation atic use
(A:129, R:
551)
1. ambigui 1 0 1 1 0 0 1
ty—uncer
tainty
Page 21 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
2. aware 3 2 3 7 2 1 2
ness
3. com 5 0 3 2 0 0 0
modifica
tion
4. con 7 4 3 7 6 0 1
sumption
5. control 0 0 0 0 1 0 0
over own
content
(5.4 man
aging con
tent)
6. gratify 26 8 12 16 13 10 14
ing—satis
fying
7. media 4 0 1 5 5 1 5
literacy
(learning
how to use
media)
Page 22 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
8. media 19 10 4 16 24 7 82
multitask
ing
9. personal 23 7 22 17 7 4 1
info
10. pro 10 7 10 6 2 4 4
dusers—to
share or
post
11. tempo 0 0 0 0 0 0 1
rary or
ephemeral
Obstacles Social re Social in Self-pre Problem Health Traits Cognition
(A:49, R: lations fluence sentation atic use
213)
1. access 4 0 1 4 3 1 6
2. battery 0 0 0 0 0 0 0
—no elec
outlet
Page 23 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
3. break 0 0 0 0 0 0 0
drop lose
phone or
computer
4. change 0 0 0 0 0 0 1
in technol
ogy; updat
ing or up
grading
5. compati 0 0 0 0 0 0 0
bility
6. com 0 0 0 0 0 0 1
plexity
7. connec 3 1 0 0 1 0 5
tions
8. costs (fi 4 0 2 6 5 0 11
nancial,
time,
psych)
9. distract 6 2 0 16 8 1 32
ing
Page 24 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
10. frustra 1 2 0 1 2 0 0
tion
11. info 1 0 0 1 5 1 5
overload
12. inter 4 0 0 3 4 1 7
ference
13. inter 2 3 0 2 2 1 5
ruptions
14. pass 0 0 0 0 0 0 0
words
15. spam 0 0 0 0 0 0 0
16. tech 1 0 0 1 1 0 1
problems
17. techno- 1 2 0 2 2 0 0
stress
18. time 0 0 0 0 1 0 0
zones
Page 25 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
19. viruses 0 0 0 0 0 0 0
—malware
Use Social re Social in Self-pre Problem Health Traits Cognition
Aware lations fluence sentation atic use
ness
(A:139, R:
630)
1. atti 16 6 4 16 12 11 10
tudes
about
one’s use
2. balance 0 0 2 0 0 0 0
of active
sharing or
just view
ing
3. balanc 8 5 3 1 2 1 2
ing self
and group
needs
Page 26 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
4. choices 24 9 14 16 17 8 9
—how
when use
5. exper 7 2 3 6 4 8 21
tise
6. filtering 3 1 1 2 1 0 0
7. media 9 8 3 2 0 1 2
compar
isons
8. media 1 0 0 0 0 2 0
conver
gence
9. media 0 0 0 0 0 0 0
habit
10. meta- 0 0 0 1 0 0 0
attention
11. moni 0 1 0 1 0 0 1
toring or
checking
frequently
Page 27 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
12. multi 1 0 0 0 0 0 0
ple conver
sations
13. prepar 5 0 4 1 3 2 0
ing re
sponses
14. self- 4 0 0 19 9 3 7
regulation
15. strate 0 0 0 0 0 0 1
gizing me
dia use for
coordina
tion
16. taken- 0 0 0 7 3 0 6
for-grant
edness
17. techno- 1 1 2 0 0 0 1
resistance
18. tool 4 2 2 9 1 1 5
awareness
Page 28 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
19. use of 1 1 1 4 3 4 2
multiple
media
As explained in the text, three components are not analyzed here: Technology: devices, services, sites (SC:58, A:182;
C:380), features (SC:9, A:12, R:20), and uses (SC:51, A:30, R:60); Context: location (of the respondents) (SC:8, A:8,
R:10), population (respondent type) SC:12, A:202, R:242), and country of the sample (SC:37, A:195, R:209); and The
ories and Frameworks (SC:131, A:133; C:239).
Page 29 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
The most frequent association of the subsubcodes for media access is accessibility of con
tent and people, with social relations. The second most frequent subsubcode is availabili
ty of self and others through media, also as it relates to social relations. The third most
frequent subsubcode is accessibility of content and media, in relation to problematic use
for individuals. Accessibility of content and people in association with the health of indi
viduals is also frequent.
Accessibility of content and people, and social relations. Research on college stu
dents’ use of communication technologies such as cell phones and internet platforms sug
gests that the students are “power users” of such communication technologies (Abeele &
Roe, 2011). These communication tools are significant because they enable students to
stay in touch with family and friends at home, and also with new college friends, as well
as search for information and enjoy online leisure activities. Aharony (2017) focused on
the functions provided by mobile phones, and how these relate to students’ personality
characteristics and motivation. Openness to experience and self-disclosure were impor
tant personality characteristics associated with mobile phone use.
College students are particularly engaged in use of social networking sites (SNSs), which
provide them with access to more information and more experiences than they would in a
more closed university environment (Chen & Marcus, 2012). If properly framed, these ex
panded exposures through SNSs can facilitate learning for university students, by use of
new social connections to share ideas, build their new student identities, and develop
their own learning paths. Thus, SNSs seem to facilitate the transition for students to their
new environment, both in terms of socialization and a sense of connection to their institu
tion (DeAndrea et al., 2012; Gray et al., 2013).
(2018) use the term “ecology of transition” to describe how social media were important
in making it meaningful for new students to be in college, as well in assisting their inte
gration into the university setting. However, the use of social media and being online can
also be a double-edged sword for students:
“Well, I think that it’s really bad if I’m not on top of my e-mail, and it’s really bad if
I’m not up to date on the class stuff that I have to do on the Internet. I also defi
nitely value keeping in touch with friends. So all those are things that I really like
to be able to do. But it’s tough, because it becomes a real time tradeoff. Often
when I do those things, I end up going to other places on the Internet that aren’t
so valuable to me.”
Page 30 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Accessibility of content and people, and problematic use. In addition to being com
munication tools, mobile phones provide access to the Internet and are digital environ
ments where students can seek entertainment, shop, and manage finances (Gökçearslan
et al., 2016). However, overuse creates new social problems (Bian & Leung, 2015). The
dramatic increase in use of smartphones worldwide has resulted in problematic use relat
ed to accessibility of content and people. Smartphone addiction is a concern in many
countries (Hong et al., 2012). According to Demirci et al. (2015), smartphone addiction
can be defined as the overuse of smartphones to the extent that it disturbs users’ daily
lives. These authors, like Aker et al. (2017), find that psychological problems such as de
pression and anxiety, and challenges such as insomnia and lack of family social support,
can predict smartphone addiction. Chen et al. (2016) find that both internet and mobile
phone addiction are closely related to interpersonal problems. According to Aladwani and
Almarzoug (2016), low self-esteem also correlates with compulsive use of social media.
More generally, social media and easy access to the internet seem to make students more
vulnerable to compulsive media use. However, for people with inter-personal problems
like social anxiety, face-to-face interaction can be challenging, so having contact with peo
ple on Facebook and via their smartphone could be easier (Clayton et al., 2013).
Several researchers are also concerned with how overuse of smartphones can have dam
aging effects on students’ academic performance (Aljomaa et al., 2016). Students may use
the phone and be inattentive during lectures, or they disturb others by sharing content
like new tones, songs, and YouTube videos with classmates and fellow students. However,
as the authors mentioned emphasize, one should not forget the potential positive effects
of smartphones in facilitating communication and in sharing information among teachers
and students. Also, many students develop various strategies to manage the distractions
of smartphones and laptops (Ames, 2013). Still, controlling intrusions can be challenging
because both work and distractions are present on the same devices. Thus, multi-tasking
is a constant temptation for a number of students (Flanagin & Babchuk, 2015). This is the
reason why Chen et al. (2016) characterize mobile phones as a “double-edged sword” for
young adults. Thus, Flanagin and Babchuk (2015) characterize (p. 268) social media as
“academic quicksand”; when you get in, it is hard to escape, even though students de
scribe how they try hard to manage social media.
A problematic aspect of the increased accessibility from the viewpoint of the film and mu
sic industry is the increasing digital piracy (Duarte et al., 2016). Even though the internet
has increased possibilities for distribution of their products, digital piracy is a daily worry
for these companies. Another problematic aspect of increasing accessibility of people via
new technologies is the growing phenomenon of cyberbullying (Crosslin & Golman,
2014). Experiencing cyberbullying can be so detrimental to the victims that some of them
—like the media-exposed cases of Tyler Clementi and Jessica Logan—have committed sui
cide.
Page 31 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Availability of self and others through media, and social relations. Smartphones
and social media are central in making self and others available, and thus impacting
people’s lives and especially their social relations (Amankwah & Ha, 2015). These authors
discuss smartphones as providing great self-broadcasting power, often through the use of
SNSs. However, while smartphones are demanding attention from users, many students
would emphasize that they would not interrupt a F2F interaction with a phone call (Ames,
2013). A number of students explained that they avoided checking messages or even hav
ing their phone out when with other people or in special social situations (like a date or a
dinner party). Others went out of their way not to be too accessible by phone.
Students, like other young people, are increasingly dependent on social networking sights
for their socialization, information-seeking, and self-broadcasting. Fang and Ha (2015)
claim that students’ SNS consumption is positively associated with social capital and so
cial support, especially for individuals with low psychological resources. However, Mana
go et al. (2012) ask whether there is a trade-off between having a large network on SNSs
like Facebook and being able to develop intimacy and social support among fellow emerg
ing adults. Their results confirm that Facebook mainly facilitates more distant kinds of re
lationships, like acquaintances and activity-based connections, while also reinforcing and
expanding the number of close relationships. According to Manogo and co-authors, the
major function of people’s status updates was emotional disclosure, which plays an im
portant role in developing intimacy. These results indicate that the nature of intimacy is
being transformed, and that large networks were related to higher levels of life satisfac
tion, and also of perceived social support.
Boundaries
Constant connection, with social relations. Constant connection easily creates ten
sion, due to the social effect of mediated communication, multi-tasking, and having con
stant (p. 269) technology access, especially facilitated through smartphones. Ames (2013)
notes that so-called digital natives negotiate with (both embracing and rejecting) the so
cial expectations enabled by new technologies. Marlowe et al.’s (2017) study interviewed
students in Auckland from five ethnic minority groups to examine the role of social media
in their social interactions. New media are especially impactful influences on their daily
lives, affecting friendship and family networks, providing access to community engage
ment, and helping a sense of belonging in their diverse society. In recent decades, new
web-based technologies and social media sites are also increasingly being integrated into
learning contexts as well as daily life, becoming “inevitable” (Pilli, 2015, p. 345).
Constant connection, with health. Internet addiction is increasingly a risk area among
college students, which, along with drug use, has been identified as risk factors for youth
Page 32 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
suicide (Aricak et al., 2015). Generally, it seems that smartphone addiction co-occurs with
other social, domestic, and academic problems among students. Hassell and Sukalich
(2016) note studies finding that higher levels of internet or social media use are negative
ly associated with life satisfaction. Turkle (2011, p. 276) underscores that “The time-con
suming constant demands for attention and performance becomes stressful and distract
ing, limiting creativity and reflection.” Hong et al. (2012) write about how mobile phone
addiction relates to anxiety and self-esteem, claiming that mobile phone addiction “has an
indirect effect upon the relationship between anxiety and mobile phone usage behavior
and between self-esteem and mobile phone usage behavior” (p. 2158). Similarly, Hussain
et al. (2017) report that smartphone dependency, mediated by constant use, can lead to
anxiety when the phone is not available.
Constant connection, with problematic use. A number of students report how the
smartphone allows for constant connection, being in contact with friends, wasting time,
and playing games. Ames (2013), for example, reports how some students felt that they
have lost their independence by being constantly connected and needing to check on and
with people. They also expressed that being constantly connected, they were hardly fully
present anywhere. A number of students also expressed resistance towards these con
stant connection norms and habits, and that multi-tasking was a constant temptation or
threat. Students depend on their technological devices to the extent that they feel anx
ious and tense when the technology is not readily available or when their attention is
drawn towards what the technology has to offer (Bicen & Arnavut, 2015).
Students spend much of their lives in an electronic world, which continuously demands
their attention. According to Dalton and Crosby (2013), social media have the most seduc
tive influence on college students’ attention. Since social media have become so engaging
for young students, they develop a digital identity, which is “the composite of images that
individuals present, share, and promote for themselves in the digital domain” (p. 1). Kim
and Lee (2011) distinguish between positive and more honest self-presentation on Face
book. With honest self-disclosure one is more likely to receive support from Facebook
friends, which can be beneficial to students’ social wellbeing and happiness. Sponcil and
Gitimu (2013) similarly suggest that intimate self-disclosures help produce greater inti
Page 33 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Transitions, with social relations. The transition between high school and college is a
major one, where students often move to a new location and have to establish new social
and academic networks, while trying to maintain old networks with family and friends.
Abeele and Roe (2011, p. 237) find that for American new students, “the transition to col
lege involves the task of building up a new social network, and communication technolo
gies play an important role in supporting this process.” Many students need support to
cope with problems they might face in order to adjust to transitions (Fang & Ha, 2015).
These authors argue for using the concept of self-efficacy to understand how young peo
ple continuously use information from both offline and online environments to reevaluate
themselves. DeAndrea et al. (2012) discuss a social media intervention intended to in
crease incoming students’ feelings of connectedness to the university, reduce uncertainty
about college, and influence positive expectancies, as understood within a social capital
framework, to foster a healthy college transition.
Vulnerability, with health and problematic use. Internet addiction disorder has be
come a clinical concept during the last two decades. Numerous studies find that smart
phone addiction is related to a number of psychological and behavioral problems. Kuang-
Tsan and Fu-Yuan (2017) argue that smartphone addiction may also be related to life-
stress for university students. Floros et al. (2014) suggest that college students are par
ticularly vulnerable to internet addiction disorder “due to the particular psychological
and developmental characteristics of late adolescence/young adulthood, ready access to
the Internet, and an expectation of computer/Internet use during studies” (p. 672). Stu
dents who scored high on internet addiction disorder were higher on psychopathology
and distress; they were more lonely, had lower self-esteem, and reported more anxiety
and depression than others. Moreno et al. (2015) found increased risk for problematic in
ternet use and addiction among those with most severe depression.
According to Polo et al. (2017), the mobile phone has caused traditional socializa
(p. 271)
tion spaces to be replaced by virtual ones. Mobile phone use can be risky for young peo
ple, especially because they use mobile phones almost constantly. This could be detrimen
tal to young people’s psychological and social functioning. Heavy users are also more
likely to become problematic or addicted users. Polo et al.’s results indicate that “age,
field of knowledge, victim/aggressor profile, and hours of mobile phone use are crucial
variables in the communication and emotional conflicts arising from the misuse of
mobile” (p. 245).
The large presence of self-injury sites on social media and YouTube24 is seen as alarming,
as self-injury exposure is feared to be socially contagious, inspiring vulnerable individuals
Page 34 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
to experiment with self-harm (Jarvi et al., 2017). Some vulnerable individuals such as
those with a tendency to seek novel and intense sensations and experiences may use dat
ing apps to look for drugs or sexual intercourse (Choi et al., 2017). Cyberbullying is a
very serious outcome of inappropriate use of technology, which has resulted in mental
health problems among victims and even suicide (Crosslin & Golman, 2014). Moreover,
cyberbullies themselves are impacted negatively by their bullying behaviors.
Constraints
The four most frequent occurrences involved contradiction/paradox/tensions (at the heart
of media mastery), with social relations, problematic use, health, and cognition. These
were followed by a loss or change of some traditional skills or activities or social rela
tions, and unintended consequences related to both problematic use, and to health. Here,
we focus on four of these few topics that are not much already covered in other sections.
Contradictions, and social influence. Social media help users keep in touch with peers
and groups, a source of social influence, and enable access to social support. But social
media can also create pervasive anxiety from a “fear of missing out” (FOMO) from salient
activities and discussions experienced by those others (Alt, 2015). Indeed, a central con
tradiction of these new media is that while connectivity is generally positive, the need to
constantly monitor others’ communication, and expectations from others for constant
connectivity, creates stress and excessive use. Many students are aware of, and con
cerned about, this contradiction (Ames, 2013). Also, in attempts to strengthen one’s
group identity and gain status, users may post messages and photos of activities that are
quite harmful (self-injury, for example; Jarvi et al., 2017).
Contradictions, and cognition. While thoughtful social media use can improve learning
experiences (Castillo-Manzano et al., 2017), compulsive use can degrade academic per
formance (Aladwani & Almarzouq, 2016), due to factors such as studying for shorter peri
ods and even being more susceptible to being victims of crime (Aljomaa et al., 2016).
Some students do attempt to engage in what Ames (2013) calls “techno-resistance” to ex
pectations for constant connectivity, by establishing boundaries or even disconnecting
(p. 272) from their devices, aiming to lower negative cognitive implications of multitask
ing. Some studies help explain some contradictions in results by showing that use and
knowledge of different Facebook features or activities differentially affect academic out
comes (Wohn & LaRose, 2014).
Loss or change, with social relations. Many authors have argued that new media, as
with prior communication technologies when they were new (Jensen, 1990; Marvin,
1990), are profoundly affecting individual and social relationships and norms (boyd, 2015;
Turkle. 2011). For example, social networks may develop and endure based on members’
using similar technology and apps, in order to avoid inconveniences in communicating
with everyone (Bicen & Arnavut, 2015). Or, because online social interactions are so com
mon and normative, factors such as introversion and extraversion may be far less influen
tial on people’s experienced lives (Yao et al., 2014), and users may be more aware of, and
Page 35 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
able to participate in, a more diverse array of identities and types of relationships (Yang,
2014). More subtly, people are more likely to communicate with multiple others online
while with others offline, and even just stay “connected” while not actually exchanging
messages (Vorderer et al., 2016).
Unintended consequences, with health. The very utility and attractiveness of smart
phones, social media, and other digital devices lead to a variety of unintended conse
quences. Primary among these is internet/smartphone addiction or problematic internet
use, associated with a wide variety of health dysfunctions, from depression to obesity (Li
et al., 2015). Sleep deprivation may be a consequence of excessive device use (Demirci et
al., 2015), with attendant schoolwork procrastination, and then students staying up late
to (ineffectively) rush through their work (Li et al., 2015). As college Facebook posts and
profiles present more images of alcohol use and drinking parties, from a peer norms theo
retical perspective, viewers (incorrectly) perceive higher alcohol use as descriptively nor
mative (Clayton et al., 2013), leading to more positive attitudes toward, and behaviors of,
excessive drinking. The pervasiveness of and dependence on digital devices for school
work as well as social relations and entertainment may also be associated with muscu
loskeletal symptoms (Dockrell, Bennett, & Culleton-Quinn, 2015).
Managing Content
The most frequent co-occurrences with managing content (including people) involved
having a gratifying-satisfying experience in relation to social relations as well as problem
atic use; media multitasking in association with social relations, health, and cognitions,
and personal information in the context of self-presentation and problematic use.
Gratifying and satisfying, and social relations. While using media for gratification
can become problematic, the social component of media mastery provides an explanation
for why media are gratifying. Social connection and social information are inherently em
bedded in media, especially social media, which has increased the availability (p. 273) and
diversity in connections and information available. Particularly, the need for social sup
port and connection motivate a great deal of media use. For example, New Zealand col
lege students with ethnic minority or migrant identities used social media not only to es
tablish and maintain intimacies, but also to exchange information about oneself, and oth
ers, to determine who will be admitted into existing friendship networks (Marlowe, Bart
ley, & Collins, 2017). Though the social support received through media use can improve
well-being, the need for social interaction and new social information often becomes ha
bitual (Meier et al., 2016). This suggests that media’s role in sharing social information
can become a source of tension as it both contributes to well-being and potentially de
tracts from it. For example, Meier et al. (2016) find the constant checking that becomes
habitual leads to usage conflicts which can ultimately reduce well-being and task perfor
mance.
Gratifying and satisfying, and problematic media use. Mastering media includes us
ing media for one’s own needs. People must manage content in ways in that fulfill their
Page 36 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
own desires. However, in the literature there is evidence that even when one can use me
dia to gratify their needs, that use can become problematic. Research on the addiction to
mobile devices and Internet finds that the reward experienced from media use can be
come dysfunctional and excessive. Meier et al. (2016), for instance, showed that students
use media to provide relief, reward and relaxation from work and from negative experi
ences. However, in pursuit of reward students express that they begin to procrastinate.
This procrastination on academic work can become detrimental. Likewise, Chiu (2014)
found that when experiencing life stressors, young adults use mobile phones to alleviate
their negative emotions. The gratification and stimulation experienced from using media,
however, had led to addiction for those who were not capable of self-regulation. While all
college students may experience the gratifications of using media, the motivation for, me
dia choices and outcomes of that use may reflect individual differences.
Media multitasking, and cognition. Within the media mastery framework, media mul
titasking or the splitting of attention between media and other tasks, is a method of man
aging the various content available. Thus far, cognition or the ability to focus and learn is
the commonly studied aspect of individual differences in the media multitasking litera
ture. Media multitasking appears not only a method for managing content but also for
managing focus and learning. Some master this management, others do not. Ames (2013)
reported that while some students report frequently media multitasking, the majority of
students expressed that they have set rules in order to reduce the negative cognitive ef
fects of media multitasking. This implicates that young adults are sensitive and strategic
in managing their media and media multitasking habits to avoid cognitive harm. In addi
tion to frequency, college students differ in the types of tasks with which they media mul
titask. Fan et al. (2017) noted that those that display higher metacognition engaged in
less irrelevant media multitasking during difficult learning tasks. This suggests that man
aging content via media multitasking involves managing the cognitive load and effects of
the media used.
Media multitasking, and social influence. However, managing media via me
(p. 274)
dia multitasking behaviors is not only driven by cognitive preferences and capacities.
Rather, Ames (2013) concluded that the social pressure to be available both to immediate
surroundings and extended networks formed a double-standard that created pressure to
media multitask. Students reported that media multitasking is coupled with constant guilt
both for not being fully present to their offline reality and for not being fully present to
their online reality.
Page 37 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
that people exaggerate and even misrepresent themselves on social networking sites.
However, the students still found this information valuable and used it to form first im
pressions of others. They shared that sometimes the personal information they found
about others was even accurate. They had friends whose SNS reflects them well. The
credibility of information online even on social networks was understood as flawed yet
useful. However, loss of control or management over one’s personal information and im
ages can severely affect one’s self-presentation, leading to cyberbullying, “revenge porn,”
and even suicide (Virden, Trujilo, & Predeger, 2014).
Personal information, and health. Though the personal information shared online has
social value, it can cause harm to young adult’s well-being. For instance, Tandoc et al.
(2015) explain how the information about others found online is also used to inform the
user about what’s attractive, and how people’s feedback can be used to identify how at
tractive one is to his/her social network, leading to social comparison. Tandoc et al.
(2015) provide an example of how young adults use this information to identify their so
cial rank. They contend that if students find themselves unattractive, they often feel envi
ous and depressed. Thus, though the information may be useful for navigating one’s so
cial network, this also fuels comparison which can be detrimental.
Obstacles
Physical and technical obstacles to college students’ use of media do not much appear in
research publications, though they were mentioned in the focus groups. The most fre
quently co-occurring were distracting, with problematic use, health, and cognition; costs
with problematic use, and cognition; interference, with cognition; and access, with cogni
tion.
Access, with cognition. It is obvious that not having access to relevant new media con
stitutes a grave challenge to students (Goode, 2010). While many students use mobile
(p. 275) devices for academic practices, Fasae and Adegbilero-Iwari (2015) reported that
many students are challenged by obstacles of low quality Internet connections and high
data subscription costs. Ironically, some students are concerned that pervasive access to
social media (diverting attention, energy, and time from academic work) may lead to ob
stacles to success later on (Flanagin & Babchuk, 2015). Further, relationships between
use of social media for online content creation are affected by more than just traditional
digital literacy—they include the kinds of peer support, practices, and technologies that
university students have access to, and bring with them, in the first place (Brown et al.,
2016), which also extends the concept of the digital divide. In turn, experience in digital
creation can provide advantage in the global society, possibly widening certain kinds of
disparities in access and use.
Costs, with problematic use. Intriguingly, smartphone costs are not only a form of ob
stacle to access, but also an aspect of problematic use, as over-dependence on smart
phones can foster excessive overspending on accessories, upgrades, apps, and data (Aljo
Page 38 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
maa et al., 2016). Indeed, some studies note that students want to have the most recent
device or product regardless of price (Bicen & Arnavut, 2015).
Distracting, with health. Many studies refer to the “double-edge” sword nature of the
mobile phone, which can provide personal, social, and business benefits as well as disad
vantages and harm. For example, many refer to the distractions from one’s own use and
the use by others, reducing focus and attention on activities and social relationships, and
creating physical and mental health problems (Chen et al., 2016). People may turn to
smartphone or internet over-dependence as a distraction from other health or life stress
issues (Chiu, 2014; Kuang-Tsan, & Fu-Yuan, 2017). Impaired inhibition and attention
deficit hyperactivity disorder (ADHD) are associated with increased risk of Internet addic
tion (Dalbudak et al., 2015). The increased need to maintain constant connectivity, and
engage in multitasking, can harm mental and emotional development and create ongoing
distractions from relationships and self-reflection (Davis, 2011).
Distracting, with cognition. Digital device use during class creates distractions for the
user, surrounding students, and even the instructor (Aljomaa et al., 2016; Jacobsen &
Forste, 2011), negatively affecting user academic performance (related to issues such as
reduced details in class note-taking, less cognitive processing of the content, and poorer
recall; Kuznekoff & Titsworth, 2013). Multitasking in general is frequent in class, and typ
ically negatively affects students’ ability to learn content (Judd, 2014; Junco, 2012). Simi
lar issues arise, but with much graver potential consequences, for students who are dis
tracted by their devices while walking or driving (Kim & Kim, 2017).
Use Awareness
Here, the most frequent co-occurrences involved attitudes about one’s use, with social re
lations and problematic use; choices as to how and when to use a medium, with social
(p. 276) relations, self-presentation, problematic use, and health; digital expertise, with
Attitudes about one’s use, and social relations. One aspect of media mastery becom
ing increasingly important with the ever-growing popular social media is people’s (espe
cially young adults’) perceptions of media as means and context for social connection. Pil
li (2015) found that students’ perceptions that Facebook was useful for their social adjust
ment and relationship maintenance explained why socially competent Facebook users ex
hibited better psychosocial well-being. This result highlights that individual dispositions
play a role in students’ likelihood to have positive attitudes towards their media use.
Attitudes about use, and problematic media use. While problematic use includes ad
diction and dependency, it also includes other dangers such as cyberbullying and revenge
porn. We found frequent co-occurrences between problematic use and the attitudes peo
ple have about their use of media. Virden et al. (2014) highlight how, especially among
young adults, perceptions of the use of media (for instance to explore their sexuality via
sexting) affects their likelihood to use media in ways that put them at risk. They found
that few young adults recognize the risk of engaging in these online sexual behaviors.
Page 39 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
The interpretation of their risk in using media affects their vulnerability to that risk.
Some studies (and our focus groups) find that students have generally positive attitudes
about their digital media, but are aware of wasting time, fear of missing out, being over-
dependent, and other problematic uses and effects, but feel they must continue to use
their media, and are even resigned to doing so, both on psychological and pragmatic
grounds (Turkle, 2011).
Choices, and self-presentation. Choices about how to use media are both individually
and socially motivated as people manage their online identities in the face of potential
context collapse; Thomas et al., 2017) and privacy issues. Hoy and Milne (2010) detailed,
for instance, how privacy protection practices varied from lying to post-hoc changes and
image management. These practices also varied by gender: men and women differed in
their concerns about self-presentation as a privacy issue and their strategies to cope with
potential problems, and those choices in turn were related to various media effects. With
the understanding of which practices are least to most successful, understanding the
choices users make in self-presentation could lead to more targeted and effective inter
ventions.
Choices, and health. Scholars are discovering ways to identify the profiles of usage that
are more likely related to diminished well-being. For example, Park et al. (2013) found a
relationship between depressive symptoms and uses of Facebook such that a user’s ac
tiveness and uses of features could be associated with specific symptoms, highlighting
that the ways people use media can reveal and reflect the state of their mental and emo
tional health. The researchers explore the possibility of using these profiles of how and
when people use media to improve or increase diagnostic capacity for depression.
Expertise, and self-presentation. In the articles discussing these two concepts, an im
portant and interesting set of tensions arises. Axelsson (2010) discusses that young adult
hood is a special developmental period in which the need to express oneself (p. 277) be
comes increasingly important. However, the ability to do so competently can rely on tech
nological skills, including one’s ability and understanding of Internet uses. He contends
that a lack of understanding and competence about the internet can translate into a lack
of competence in developmental integral capacities, including self-expression. Ishii et al.
(2017) argue that young adults with greater communication competence prefer face-to-
face communication for self-disclosure in order to most benefit from the increased cues.
Their perspective implies that while all young adults need self-expression, their choice to
not express online might not be due to a lack of Internet skills but rather better tradition
al communication skills.
Expertise, and traits. Expertise or the ability to use media with skill is perhaps one of
the most seemingly obvious forms of media mastery within use awareness. Chang et al.
(2014) documented that traits such as internet self-efficacy not only increased confidence
in an online course but affected perceptions of the online course as relevant and was as
sociated with better course performance. There were many similar findings across the lit
erature.
Page 40 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Media comparison, and social influence. Group level differences such as shared
norms also contribute to one’s preferences, comparisons, interpretations and uses of me
dia. Cultural differences provide one example of such social influence. Ishii et al. (2017)
concluded that US and Japan college students differentially perceived text-messaging as a
form of communication. The US students perceived text messaging as having more media
richness, reduced cues, quickness, ubiquity of the sender and the receiver, satisfaction,
effectiveness, and level of comfort than did the Japanese students. The authors proposed
that these perceptions follow cultural norms of communication; for example, that Ameri
cans prefer direct communication. Students interviewed by Ames (2013) said that pres
sures such to be constantly available did lead them to alter the particular medium they
used in order to meet both their own contexts and the expected contexts of their commu
nication partners.
Conclusion
In general, this review shows how the concept, and very detailed typology, of media mas
tery pervades the more familiar contexts, analyses, and results of research on college stu
dents’ use of new media. Each subsection of the review can generate one or more impli
cations of the media mastery framework. For example, mastery of media is a subjective
experience that involves believing in one’s expertise and capacity to use media. Masters
of media can engage in beneficial media multitasking, while those mastered by media
might engage in harmful media multitasking. Media mastery may occur through individ
ual interpretation but can be heavily influenced by the practices and expectations of one’s
social network. The masters and mastered potentially seek and react to the potential
Page 41 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
gratifications from media differently. The tensions in media mastery demonstrate how
young adults attempt, sometimes successfully, sometimes not, to navigate the complexi
ties of media use.
The media mastery framework allows a more analytical approach, by integrating a variety
of prior and new perspectives, highlighting the relevance of many diverse concepts, and
revealing associations among many otherwise disjointed or typically unlinked concepts.
As a complement to the theoretical perspectives appearing in most of the articles, media
mastery would have provided an especially relevant framework for some of the studies.
Media mastery could identify and describe a phenomenon heretofore with no name or
with a variety of unintegrated names (as summarized in the Related Concepts section),
especially the simultaneous two-way mastery of and by media. So the media mastery per
spective provides a lens, and allows for nuances, into how users (here, college students)
are potentially mastered by new media, but also attempt to potentially master those me
dia. As just one example, this perspective on the diverse research of college students’ dig
ital media use highlights the pervasive paradoxes and contradictions as manifestations of
the tensions between attempts to master media and the ways in which media master us.
The media mastery framework illuminates the double-edged nature of media technology
and especially social media in the lives of students as well as other young people. More
over, the notion of media mastery may also capture the contradictory and mixed feelings
(ranging from pleasure to guilt) that young students and others experience in their daily
use of contemporary media technologies. The vast range of ways mastery or being mas
tered occurs—in association with social and individual aspects, among others—may also
be a reflection of the complex, interdependent, and contextual nature of digital media.
The detailed and extensively developed media mastery framework may (p. 279) help re
searchers think in new ways about what questions their work attempts to answer—i.e.,
what aspects of media mastery does their work highlight or extend?
boyd, d. (2015). It’s complicated: The social lives of networked teens. New Haven, CT:
Yale University Press.
Page 42 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
David, P., Kim, J.-H., Brickman, J. S., Ran, W., & Curtis, C. M. (2015). Mobile phone dis
traction while studying. New Media & Society, 17(10), 661–679.
Deacon, D., & Stanyer, J. (2014). Mediatization: Key concept or conceptual bandwagon?
Media, Culture & Society, 36(7), 1032–1044.
DeAndrea, D. C., Ellison, N. B., LaRose, R., Steinfield, C., & Fiore, A. (2012). Serious so
cial media: On the use of social media for improving students’ adjustment to college. The
Internet and Higher Education, 15(1), 15–23.
Hadar, L. L. & Ergas, O. (2018). Cultivating mindfulness through technology in higher ed
ucation: A Buberian perspective. AI and Society, 1–9. https://link.springer.com/article/
10.1007/s00146-018-0794-z
Haddon, L. (2003). Domestication and mobile telephony. In J. E. Katz (Ed.), Machines that
become us (pp. 43–56). New Brunswick, NJ: Transaction Press.
Helles, R. (2013). Mobile communication and intermediality. Mobile Media & Communica
tion, 1(1), 14–19.
Hilbert, M., Vásquez, J., Halpern, D., Valenzuela, S., & Arriagada, E. (2017). One step, two
step, network step? Complementary perspectives on communication flows in twittered
citizen protests. Social Science Computer Review, 35(4), 444–461.
Hjarvard, S. (2009). Soft individualism: Media and the changing social character.
(p. 280)
James, C. (2014). Disconnected: Youth, new media, and the ethics gap. (The John D. and
Catherine T. MacArthur Foundation Series on Digital Media and Learning). Cambridge,
MA: The MIT Press.
Jarvenpaa, S. L. & Lang, K. R. (2005). Managing the paradoxes of mobile technology. In
formation Systems Management, 22(4), 7–23.
Page 43 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Jensen, K. B. (2010). Media convergence: The three degrees of network, mass, and inter
personal communication. London, UK & New York, NY: Routledge.
Jones, M. R. & Karsten, H. (2008). Giddens’s structuration theory and information sys
tems research. MIS Quarterly, 32(1), 127–157.
Katz, J. E. & Rice, R. E. (2002). Social consequences of Internet use: Access, involvement
and interaction. Cambridge, MA: The MIT Press.
LaRose, R., Connolly, R., Lee, H., Li, K., & Hales, K. D. (2014). Connection overload? A
cross cultural study of the consequences of social media connection. Information Systems
Management, 31, 59–73. doi:10.1080/10580530.2014.854097
Levy, D. M. (2017). Mindful tech: How to bring balance to our digital lives. New Haven,
CN: Yale University Press.
Ling, R. (2012). Taken for grantedness: The embedding of mobile communication into so
ciety. Cambridge, MA: The MIT Press.
MacKenzie, D. & Wajcman, J. (Eds.) (1985). The social shaping of technology: How the re
frigerator got its hum. London, UK: Open University Press.
Madianou, M. & Miller, D. (2013). Polymedia: Towards a new theory of digital media in in
terpersonal communication. International Journal of Cultural Studies, 16(2), 169–187.
Manago, A. M., Taylor, T., & Greenfield, P. M. (2012). Me and my 400 friends: The anato
my of college students’ Facebook networks, their communication patterns, and well-be
ing. Developmental Psychology, 48, 369–380. doi:10.1037/a0026338
Marvin, C. (1990). When old technologies were new: Thinking about electric communica
tion in the late nineteenth century. New York: Oxford University Press.
Mihailidis, P. (2014). A tethered generation: Exploring the role of mobile phones in the
daily life of young people. Mobile Media & Communication, 2, 58–72. doi:
10.1177/2050157913505558
Misra, S. & Stokols, D. (2012). Psychological and health outcomes of perceived informa
tion overload. Environment and Behavior, 44, 737–759. doi:10.1177/0013916511404408
Page 44 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Moreno, M. A., Jelenchick, L., Koff, R., Eikoff, J., Diermyer, C., & Christakis, D. A. (2012).
Internet use and multitasking among older adolescents: An experience sampling ap
proach. Computers in Human Behavior, 28, 1097–1102. doi:10.1016/j.chb.2012.01.016
O’Neill, B. & Hagen, I. (2009). Media literacy. Chapter 18. In S. Livingstone & L. Hadden
(Eds.), Kids online: Opportunities and risks for children. Bristol, UK: Policy Press.
Pinch, T. & Bijker, W. (1987). The social construction of facts and artifacts: Or how
(p. 281)
the sociology of science and the sociology of technology might benefit each other. In W.
Bijker, T. Hughes, & T. Pinch (Eds.), The social construction of technological systems: New
directions in the sociology and history of technology (pp. 17–50). Cambridge, MA: The
MIT Press.
Postman, N. (1996). The end of education: Redefining the value of school. New York, NY:
Vintage.
Rainie, L., & Wellman, B. (2012). Networked. The new social operating system.
Cambridge, MA: The Massachusetts Institute of Technology.
Reinecke, L., Aufenanger, S., Beutel, M. E., Dreier, M., Quiring, O., Stark, B., Wölfling, K.
& Müller, K. W. (2017). Digital stress over the life span: The effects of communication
load and Internet multitasking on perceived stress and psychological health impairments
in a German probability sample. Media Psychology, 20(1), 90–115. https://doi.org/
10.1080/15213269.2015.1121832
Rheingold, H. (2012). Net smart: How to thrive online. Cambridge, MA: The MIT Press.
Rice, R. E. (1999). Artifacts and paradoxes in new media. New Media and Society, 1(1),
24–32.
Rice, R. E. & Hagen, I. (2010). Young adults’ perpetual contact, social connectivity, and
social control through the Internet and mobile phones. In C. Salmon (Ed.), Communica
tion yearbook, 34 (pp. 2–39). London: Routledge.
Rice, R. E., Hagen, I., & Zamanzadeh, N. (2018). College students’ media mastery: Para
doxes in using computers and mobile phones. American Behavioral Scientist, 62(9), 1229–
1250.
Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York: Free Press.
Silverstone, R. (2007). Media and morality: On the rise of the mediapolis. Cambridge, UK:
Polity Press.
Page 45 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Smith, A. (April 1, 2015). U.S. smartphone use in 2015. Pew Research Center. http://
www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015/
Turkle, S. (2011). Alone together: Why we expect more from technology and less from
each other. New York: Basic Books.
Wang, Y., Niiya, M., Mark, G., Reich, S., & Warschauer, M. (2015). Coming of age (digital
ly): An ecological view of social media use among college students. Proceedings of the
18th ACM conference on computer supported cooperative work & social computing (pp.
571–582). New York: ACM. doi:10.1145/2675133.2675271
Williams, R. & Edge, D. (1996). The social shaping of technology. Research Policy, 25(6),
865–899.
Wu, J. Y. (2015). University students’ motivated attention and use of regulation strategies
on social media. Computers & Education, 89, 75–90.
Xu, S., Wang, Z. J., & David, P. (2016). Media multitasking and well-being of university
students. Computers in Human Behavior, 55, 242–250.
Abeele, M. V. & Roe, K. (2011). New life, old friends: A cross-cultural comparison of the
use of communication technologies in the social life of college freshmen. Young, 19(2),
219–240.
Aharony, N. (2017). Factors affecting LIS Israeli students’ mobile phone use: An
(p. 282)
Aker, S., Sahin, M. K., Sezgin, S., & Oguz, G. (2017). Psychosocial factors affecting smart
phone addiction in university students. Journal of Addictions Nursing, 28(4), 215–219.
Aljomaa, S. S., Al Qudah, M. F., Albursan, I. S., Bakhiet, S. F., & Abduljabbar, A. S. (2016).
Smartphone addiction among university students in the light of some variables. Comput
ers in Human Behavior, 61, 155–164. doi:http://dx.doi.org/10.1016/j.chb.2016.03.041
Alt, D. (2015). College students’ academic motivation, media engagement and fear of
missing out. Computers in Human Behavior, 49, 111–119.
Page 46 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Arıcak, O. T., Dündar, Ş., & Saldaña, M. (2015). Mediating effect of self-acceptance be
tween values and offline/online identity expressions among college students. Computers
in Human Behavior, 49, 362–374.
Axelsson, A. S. (2010). Perpetual and personal: Swedish young adults and their use of mo
bile phones. New Media & Society, 12(1), 35–54.
Bian, M. & Leung, L. (2015). Linking loneliness, shyness, smartphone addiction symp
toms, and patterns of smartphone use to social capital. Social Science Computer Review,
33(1), 61–79.
Bicen, H. & Arnavut, A. (2015). Determining the effects of technological tool use habits
on social lives. Computers in Human Behavior, 48, 457–462. doi:http://doi.org/10.1016/
j.chb.2015.02.012
boyd, d. (2015). It’s complicated: The social lives of networked teens. New Haven, CT:
Yale University Press.
Brown, C., Czerniewicz, L., & Noakes, T. (2016). Online content creation: Looking at stu
dents’ social media practices through a Connected Learning lens. Learning, Media and
Technology, 41(1), 140–159.
Castillo-Manzano, J. I., Castro-Nuño, M., L¢pez-Valpuesta, L., Sanz-D¡az, M. T., & Yñiguez,
R. (2017). To take or not to take the laptop or tablet to classes, that is the question. Com
puters in Human Behavior, 68, 326–333.
Chen, L., Yan, Z., Tang, W., Yang, F., Xie, X., & He, J. (2016). Mobile phone addiction levels
and negative emotions among Chinese young adults: The mediating role of interpersonal
problems. Computers in Human Behavior, 55, 856–866.
Chiu, S. I. (2014). The relationship between life stress and smartphone addiction on Tai
wanese university student: A mediation model of learning self-efficacy and social self-effi
cacy. Computers in Human Behavior, 34, 49–57.
Choi, E. P., Wong, J. Y., Lo, H. H., Wong, W., Chio, J. H., & Fong, D. Y. (2017). Association
between using smartphone dating applications and alcohol and recreational drug use in
conjunction with sexual activities in college students. Substance Use & Misuse, 52(4),
422–428.
Crosslin, K. & Golman, M. (2014). “Maybe you don’t want to face it”: College students’
perspectives on cyberbullying. Computers in Human Behavior, 41, 14–20.
Page 47 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Dalbudak, E., Evren, C., Aldemir, S., Taymur, I., Evren, B., & Topcu, M. (2015).
(p. 283)
Dalton, J. C. & Crosby, P. C. (2013). Digital identity: How social media are influencing stu
dent learning and development in college. Journal of College and Character, 14(1), 1–4.
doi:10.1515/jcc-2013–0001
Davis, K. (2011). A life in bits and bytes: A portrait of a college student and her life with
digital media. Teachers College Record, 113(9), 1960–1982.
DeAndrea, D. C., Ellison, N. B., LaRose, R., Steinfield, C. & Fiore, A. (2012). Serious social
media: On the use of social media for improving students’ adjustment to college. The In
ternet and Higher Education, 15(1), 15–23.
Demirci, K., Akgönül, M., & Akpinar, A. (2015). Relationship of smartphone use severity
with sleep quality, depression, and anxiety in university students. Journal of Behavioral
Addictions, 4(2), 85–92.
Dockrell, S., Bennett, K., & Culleton-Quinn, E. (2015). Computer use and musculoskeletal
symptoms among undergraduate university students. Computers & Education, 85, 102–
109.
Duarte-Hueros, J., Duarte-Hueros, A., & Ruano-Lopez, S. (2016). The audiovisual content
downloads among university students. Comunicar, 48.
Fan, Y., Gong, S., Wang, Y., & Wang, Z. (2017). The effects of learning task and learners’
metacognition on college students’ media multitasking behaviors. Advances in Psycholo
gy, 7(7), 895–902.
Fasae, J. K. & Adegbilero-Iwari, I. (2015). Mobile devices for academic practices by stu
dents of college of sciences in selected Nigerian private universities. The Electronic Li
brary, 33(4), 749–759.
Floros, G., Siomos, K., Stogiannidou, A., Giouzepas, I., & Garyfallos, G. (2014). The rela
tionship between personality, defense styles, internet addiction disorder, and psy
chopathology in college students. Cyberpsychology, Behavior, and Social Networking,
17(10), 672–676.
Gökçearslan, Ş., Mumcu, F. K., Haşlaman, T., & Çevik, Y. D. (2016). Modelling smartphone
addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyber
Page 48 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Goode, J. (2010). The digital identity divide: How technology knowledge impacts college
students. New Media & Society, 12(3), 497–513.
Gray, R., Vitak, J., Easton, E. W., & Ellison, N. B. (2013). Examining social adjustment to
college in the age of social media: Factors influencing successful transitions and persis
tence. Computers & Education, 67, 193–207.
Hassell, M. D. & Sukalich, M. F. (2016). A deeper look into the complex relationship be
tween social media use and academic outcomes and attitudes. Information Research: An
International Electronic Journal, 21(4), n4.
Hong, F. Y., Chiu, S. I., & Huang, D. H. (2012). A model of the relationship between psy
chological characteristics, mobile phone addiction and use of mobile phones by Tai
wanese university female students. Computers in Human Behavior, 28(6), 2152–2159.
young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45. doi:
10.1080/15252019.2010.10722168
Hussain, Z., Griffiths, M. D., & Sheffield, D. (2017). An investigation into problematic
smartphone use: The role of narcissism, anxiety, and personality factors. Journal of Behav
ioral Addictions, 6(3), 378–386.
Ishii, K., Rife, T. S., & Kagawa, N. (2017). Technology-driven gratifications sought through
text-messaging among college students in the US and Japan. Computers in Human Behav
ior, 69, 396–404.
Jacobsen, W. C. & Forste, R. (2011). The wired generation: Academic and social outcomes
of electronic media use among university students. Cyberpsychology, Behavior, and Social
Networking, 14(5), 275–280.
Jarvi, S. M., Swenson, L. P., & Batejan, K. L. (2017). Motivation for and use of social net
working sites: Comparisons among college students with and without histories of non-sui
cidal self-injury. Journal of American College Health, 65(5), 306–312.
Jiang, Z., & Shi, M. (2016). Prevalence and co-occurrence of compulsive buying, problem
atic Internet and mobile phone use in college students in Yantai, China: Relevance of self-
traits. BMC Public Health, 16(1), 1211.
Johnson, C. A. (2015). The information diet: A case for conscious consumption. Se
bastopol, CA: O’Reilly Media, Inc.
Judd, T. (2014). Making sense of multitasking: The role of Facebook. Computers & Educa
tion, 70, 194–202.
Page 49 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Kim, B. & Kim, Y. (2017). College students’ social media use and communication network
heterogeneity: Implications for social capital and subjective well-being. Computers in Hu
man Behavior, 73, 620–628.
Kim, J. & Lee, J.-E. R. (2011). The Facebook paths to happiness: Effects of the number of
Facebook friends and self-presentation on subjective well-being. Cyberpsychology, Behav
ior, and Social Networking, 14(6), 359–364. doi: 10.1089/cyber.2010.0374
Kuznekoff, J. & Titsworth, S. (2013). The impact of mobile phone usage on student learn
ing. Communication Education, 62(3), 233–252.
Li, W., O’Brien, J. E., Snyder, S. M., & Howard, M. O. (2015). Characteristics of internet
addiction/pathological internet use in US university students: A qualitative-method inves
tigation. PloS One, 10(2), e0117372.
Manago, A. M., Taylor, T., & Greenfield, P. M. (2012). Me and my 400 friends: The anato
my of college students’ Facebook networks, their communication patterns, and well-be
ing. Developmental Psychology, 48, 369–380. doi: 10.1037/a0026338
Marlowe, J. M., Bartley, A., & Collins, F. (2017). Digital belongings: The intersections of
social cohesion, connectivity and digital media. Ethnicities, 17(1), 85–102.
Meier, A., Reinecke, L., & Meltzer, C. E. (2016). “Facebocrastination”? Predictors of using
Facebook for procrastination and its effects on students’ well-being. Computers in Human
Behavior, 64, 65–76. doi:http://dx.doi.org/10.1016/j.chb.2016.06.011
Moreno, M. A., Swanson, M. J., Royer, H., & Roberts, L. J. (2011). Sexpectations:
(p. 285)
Male college students’ views about displayed sexual references on females’ social net
working web sites. Journal of Pediatric and Adolescent Gynecology, 24(2), 85–89.
Park, S., Lee, S. W., Kwak, J., Cha, M., & Jeong, B. (2013). Activities on Facebook reveal
the depressive state of users. Journal of Medical Internet Research, 15(10).
Picone, I. (2017). Conceptualizing media users across media: The case for ‘media user/
use’ as analytical concepts. Convergence, 23(4), 378–390.
Pilli, O. (2015). The changes in social media usage: Students’ perspective. The Anthropol
ogist, 22(2), 345–354.
Page 50 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Polo, M. I., Lázaro, S. M., del Barco, B. L., & Castaño, E. F. (2017). Mobile abuse in uni
versity students and profiles of victimization and aggression. Adicciones, 29(4), 245–255.
[Full article in Spanish]
Punyanunt-Carter, N. M., De La Cruz, J. J., & Wrench, J. S. (2017). Investigating the rela
tionships among college students’ satisfaction, addiction, needs, communication appre
hension, motives, and uses & gratifications with Snapchat. Computers in Human Behav
ior, 75, 870–875.
Sponcil, M. & Gitimu, P. (2013). Use of social media by college students: Relationship to
communication and self-concept. Journal of Technology Research, 4, 1–13.
Tandoc, E. C., Ferrucci, P. & Duffy, M. (2015). Facebook use, envy, and depression among
college students: Is facebooking depressing? Computers in Human Behavior, 43, 139–146.
Thomas, L., Briggs, P., Hart, A., & Kerrigan, F. (2017). Understanding social media and
identity work in young people transitioning to university. Computers in Human Behavior,
76, 541–553.
Turkle, S. (2011). Alone together: Why we expect more from technology and less from
each other. New York, NY: Basic Books.
Virden, A. L., Trujillo, A., & Predeger, E. (2014). Young adult females’ perceptions of high-
risk social media behaviors: A focus-group approach. Journal of Community Health Nurs
ing, 31(3), 133–144.
Wohn, D. Y. & LaRose, R. (2014). Effects of loneliness and differential usage of Facebook
on college adjustment of first-year students. Computers & Education, 76, 158–167.
Wu, J. Y. (2015). University students’ motivated attention and use of regulation strategies
on social media. Computers & Education, 89, 75–90.
Yang, H. C. (2014). Young people’s friendship and love relationships and technology: New
practices of intimacy and rethinking feminism. Asian Journal of Women’s Studies, 20(1),
93–124.
Yang, T., Yu, L., Oliffe, J. L., Jiang, S., & Si, Q. (2017). Regional contextual determinants of
internet addiction among college students: A representative nationwide study of China.
The European Journal of Public Health, 27(6), 1032–1037.
Page 51 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Yao, M. Z., He, J., Ko, D. M., & Pang, K. (2014). The influence of personality, parental be
haviors, and self-esteem on Internet addiction: A study of Chinese college students. Cy
berpsychology, Behavior, and Social Networking, 17(2), 104–110.
Abeele, M. V., & Roe, K. (2011). New life, old friends: A cross-cultural comparison of the
use of communication technologies in the social life of college freshmen. Young, 19(2),
219–240.
Aharony, N. (2015). What’s App: A social capital perspective. Online Information Review,
39(1), 26–42.
Aharony, N. (2017). Factors affecting LIS Israeli students’ mobile phone use: an explorato
ry study. The Electronic Library, 35(6), 1098–1121.
Akçayır, M., Dündar, H., & Akçayır, G. (2016). What makes you a digital native? Is it
enough to be born after 1980? Computers in Human Behavior, 60, 435–440.
Aker, S., Sahin, M. K., Sezgin, S., & Oguz, G. (2017). Psychosocial factors affecting smart
phone addiction in university students. Journal of Addictions Nursing, 28(4), 215–219.
Aladwani, A. M., & Almarzouq, M. (2016). Understanding compulsive social media use:
The premise of complementing self-conceptions mismatch with technology. Computers in
Human Behavior, 60, 575–581.
Al-Gamal, E., Alzayyat, A., & Ahmad, M. M. (2016). Prevalence of internet addiction and
its association with psychological distress and coping strategies among university stu
dents in Jordan. Perspectives in Psychiatric Care, 52(1), 49–61.
Aljomaa, S. S., Al.Qudah, M. F., Albursan, I. S., Bakhiet, S. F., & Abduljabbar, A. S. (2016).
Smartphone addiction among university students in the light of some variables. Comput
ers in Human Behavior, 61, 155–164. doi:http://dx.doi.org/10.1016/j.chb.2016.03.041
Alt, D. (2015). College students’ academic motivation, media engagement and fear of
missing out. Computers in Human Behavior, 49, 111–119.
Alwagait, E., Shahzad, B., & Alim, S. (2015). Impact of social media usage on students’
academic performance in Saudi Arabia. Computers in Human Behavior, 51, 1092–1097.
Alzayyat, A., Al-Gamal, E., & Ahmad, M. M. (2015). Psychosocial correlates of Internet ad
diction among Jordanian university students. Journal of Psychosocial Nursing and Mental
Health Services, 53(4), 43–51.
Amankwah, F. N., & Ha, L. (2015). Smartphones and self-broadcasting among college stu
dents in an age of social media. In A. Mesquita & C-W Tsai (Eds.), Human behavior, psy
Page 52 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
chology, and social interaction in the digital era (pp. 95–128). Hershey, PA: IGI Global. doi:
10.4018/978-1-4666-8450-8.
Annisette, L. E. & Lafreniere, K. D. (2017). Social media, texting, and personality: A test
of the shallowing hypothesis. Personality and Individual Differences, 115, 154–158.
Arıcak, O. T., Dündar, Ş., & Saldaña, M. (2015). Mediating effect of self-acceptance be
tween values and offline/online identity expressions among college students. Computers
in Human Behavior, 49, 362–374.
Armstrong, A., Thomas, J., & Smith, M. (2017). College students’ experiences with anony
mous social media: Implications for campus racial climate. Journal of College Student De
velopment, 58(7), 1101–1107.
Axelsson, A. S. (2010). Perpetual and personal: Swedish young adults and their use of mo
bile phones. New Media & Society, 12(1), 35–54.
Barkley, J. E., & Lepp, A. (2016). Mobile phone use among college students is a sedentary
leisure behavior which may interfere with exercise. Computers in Human Behavior, 56,
29–33.
(p. 287) Bauman, S., & Baldasare, A. (2015). Cyber aggression among college students:
Demographic differences, predictors of distress, and the role of the university. Journal of
College Student Development, 56(4), 317–330.
Bennett, S., & Maton, K. (2010). Beyond the “digital natives” debate: Towards a more nu
anced understanding of students’ technology experiences. Journal of Computer Assisted
Learning, 26(5), 321–331. doi:10.1111/j.1365–2729.2010.00360.x
Benson, V., Saridakis, G., & Tennakoon, H. (2015). Purpose of social networking use and
victimisation: Are there any differences between university students and those not in HE?
Computers in Human Behavior, 51, 867–872.
Bian, M., & Leung, L. (2015). Linking loneliness, shyness, smartphone addiction symp
toms, and patterns of smartphone use to social capital. Social Science Computer Review,
33(1), 61–79.
Bicen, H., & Arnavut, A. (2015). Determining the effects of technological tool use habits
on social lives. Computers in Human Behavior, 48, 457–462. doi:http://doi.org/10.1016/
j.chb.2015.02.012
Bjornsen, C. A., & Archer, K. J. (2015). Relations between college students’ cell phone use
during class and grades. Scholarship of Teaching and Learning in Psychology, 1(4), 326–
336.
Page 53 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Bobkowski, P., & Smith, J. (2013). Social media divide: characteristics of emerging adults
who do not use social network websites. Media, Culture & Society, 35(6), 771–781.
Boswell, S. S. (2012). “I deserve success”: Academic entitlement attitudes and their rela
tionships with course self-efficacy, social networking, and demographic variables. Social
Psychology of Education, 15(3), 353–365.
Brown, C., Czerniewicz, L., & Noakes, T. (2016). Online content creation: Looking at stu
dents’ social media practices through a Connected Learning lens. Learning, Media and
Technology, 41(1), 140–159.
Castillo-Manzano, J. I., Castro-Nuño, M., López-Valpuesta, L., Sanz-Díaz, M. T., & Yñiguez,
R. (2017). To take or not to take the laptop or tablet to classes, that is the question. Com
puters in Human Behavior, 68, 326–333.
Chang, C. S., Liu, E. Z. F., Sung, H. Y., Lin, C. H., Chen, N. S., & Cheng, S. S. (2014). Ef
fects of online college student’s Internet self-efficacy on learning motivation and perfor
mance. Innovations in Education and Teaching International, 51(4), 366–377.
Chan-Olmsted, S., & Shay, R. (2016). Understanding tablet consumers: Exploring the fac
tors that affect tablet and dual mobile device ownership. Journalism & Mass Communica
tion Quarterly, 93(4), 857–883.
Chen, L., Yan, Z., Tang, W., Yang, F., Xie, X., & He, J. (2016). Mobile phone addiction levels
and negative emotions among Chinese young adults: the mediating role of interpersonal
problems. Computers in Human Behavior, 55, 856–866.
Chi, X., Lin, L., & Zhang, P. (2016). Internet addiction among college students in china:
Prevalence and psychosocial correlates. Cyberpsychology, Behavior, and Social Network
ing, 19(9), 567–573.
Chiu, S. I. (2014). The relationship between life stress and smartphone addiction on Tai
wanese university student: A mediation model of learning self-efficacy and social self-effi
cacy. Computers in Human Behavior, 34, 49–57.
Choi, E. P., Wong, J. Y., Lo, H. H., Wong, W., Chio, J. H., & Fong, D. Y. (2017). Association
between using smartphone dating applications and alcohol and recreational drug use in
(p. 288) conjunction with sexual activities in college students. Substance Use & Misuse,
52(4), 422–428.
Choi, E. P., Wong, J. Y., Lo, H. H., Wong, W., Chio, J. H., & Fong, D. Y. (2016). The associa
tion between smartphone dating applications and college students’ casual sex encounters
and condom use. Sexual & Reproductive Healthcare, 9, 38–41.
Page 54 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Choi, M., & Toma, C. L. (2017). Social sharing with friends and family after romantic
breakups: Patterns of media use and effects on psychological well-being. Journal of Media
Psychology: Theories, Methods, and Applications, 29(3), 166–172.
Chou, C., Wu, H. C., & Chen, C. H. (2011). Re-visiting college students’ attitudes toward
the Internet-based on a 6-T model: Gender and grade level difference. Computers & Edu
cation, 56(4), 939–947.
Christakis, D. A., Moreno, M. M., Jelenchick, L., Myaing, M. T., & Zhou, C. (2011). Prob
lematic internet usage in US college students: A pilot study BMC Medicine, 9, 77. doi:
10.1186/1741-7015-9-77
Clavio, G., & Walsh, P. (2014). Dimensions of social media utilization among college sport
fans. Communication & Sport, 2(3), 261–281.
Clayton, R. B., Osborne, R. E., Miller, B. K., & Oberle, C. D. (2013). Loneliness, anxious
ness, and substance use as predictors of Facebook use. Computers in Human Behavior,
29(3), 687–693.
Crosslin, K., & Golman, M. (2014). “Maybe you don’t want to face it”–College students’
perspectives on cyberbullying. Computers in Human Behavior, 41, 14–20.
Dalbudak, E., Evren, C., Topcu, M., Aldemir, S., Coskun, K. S., Bozkurt, M., … & Canbal,
M. (2013). Relationship of Internet addiction with impulsivity and severity of psy
chopathology among Turkish university students. Psychiatry Research, 210(3), 1086–
1091.
Dalbudak, E., Evren, C., Aldemir, S., Taymur, I., Evren, B., & Topcu, M. (2015). The impact
of sensation seeking on the relationship between attention deficit/hyperactivity symptoms
and severity of Internet addiction risk. Psychiatry Research, 228(1), 156–161.
Dalton, J. C., & Crosby, P. C. (2013). Digital identity: How social media are influencing stu
dent learning and development in college. Journal of College and Character, 14(1), 1–4.
doi:10.1515/jcc-2013–0001
David, P., Kim, J.-H., Brickman, J. S., Ran, W. & Curtis, C. M. (2015). Mobile phone distrac
tion while studying. New Media & Society, 17(10), 661–1679.
Davila, J., Hershenberg, R., Feinstein, B. A., Gorman, K., Bhatia, V., & Starr, L. R. (2012).
Frequency and quality of social networking among young adults: Associations with de
pressive symptoms, rumination, and corumination. Psychology of Popular Media Culture,
1(2), 72–86. http://dx.doi.org/10.1037/a0027512
Davis, K. (2011). A life in bits and bytes: A portrait of a college student and her life with
digital media. Teachers College Record, 113(9), 1960–1982.
Page 55 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
De Leo, J. A., & Wulfert, E. (2013). Problematic Internet use and other risky behaviors in
college students: An application of problem-behavior theory. Psychology of Addictive Be
haviors, 27(1), 133–141.
DeAndrea, D. C., Ellison, N. B., LaRose, R., Steinfield, C. & Fiore, A. (2012). Serious social
media: On the use of social media for improving students’ adjustment to college. The In
ternet and Higher Education, 15(1), 15–23.
Demirci, K., Akgönül, M., & Akpinar, A. (2015). Relationship of smartphone use
(p. 289)
severity with sleep quality, depression, and anxiety in university students. Journal of Be
havioral Addictions, 4(2), 85–92.
Demirhan, E., Randler, C., & Horzum, M. B. (2016). Is problematic mobile phone use ex
plained by chronotype and personality? Chronobiology International, 33(7), 821–831.
Dockrell, S., Bennett, K., & Culleton-Quinn, E. (2015). Computer use and musculoskeletal
symptoms among undergraduate university students. Computers & Education, 85, 102–
109.
Dong, G., Wang, J., Yang, X., & Zhou, H. (2013). Risk personality traits of Internet addic
tion: a longitudinal study of Internet-addicted Chinese university students. Asia-Pacific
Psychiatry, 5(4), 316–321.
Duarte-Hueros, J., Duarte-Hueros, A., & Ruano-Lopez, S. (2016). The audiovisual content
downloads among university students. Comunicar, 48.
Egan, K. G., & Moreno, M. A. (2011). Prevalence of stress references on college freshmen
Facebook profiles. Computers, Informatics, Nursing: CIN, 29(10), 586–592.
Ekinci, B. (2014). The relationship between problematic internet entertainment use and
problem solving skills among university students. International Journal of Mental Health
and Addiction, 12(5), 607–617.
Fan, Y., Gong, S., Wang, Y., & Wang, Z. (2017). The effects of learning task and learners’
metacognition on college students’ media multitasking behaviors. Advances in Psycholo
gy, 7(7), 895–902.
Fang, L. & Ha, L. (2015). Do college students benefit from their social media experience?
Social media involvement and its impact on college students’ self-efficacy perception. In
A. Mesquita & C-W Tsai (Eds.), Human behavior, psychology, and social interaction in the
digital era (pp. 259–278). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8450-8.
Page 56 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Fasae, J. K., & Adegbilero-Iwari, I. (2015). Mobile devices for academic practices by stu
dents of college of sciences in selected Nigerian private universities. The Electronic Li
brary, 33(4), 749–759.
Floros, G., Siomos, K., Stogiannidou, A., Giouzepas, I., & Garyfallos, G. (2014). The rela
tionship between personality, defense styles, internet addiction disorder, and psy
chopathology in college students. Cyberpsychology, Behavior, and Social Networking,
17(10), 672–676.
Forbush, E., & Foucault-Welles, B. (2016). Social media use and adaptation among Chi
nese students beginning to study in the United States. International Journal of Intercul
tural Relations, 50, 1–12.
Garett, R., Liu, S., & Young, S. D. (2018). The relationship between social media use and
sleep quality among undergraduate students. Information, Communication & Society,
21(2), 163–173.
Genctanirim Kurt, D. (2015). Suicide risk in college students: The effects of Internet ad
diction and drug use. Educational Sciences: Theory and Practice, 15(4), 841–848.
Gökçearslan, Ş., Mumcu, F. K., Haşlaman, T., & Çevik, Y. D. (2016). Modelling smartphone
addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyber
loafing in university students. Computers in Human Behavior, 63, 639–649. doi:http://
dx.doi.org/10.1016/j.chb.2016.05.091
(p. 290) Goode, J. (2010a). Mind the gap: The digital dimension of college access. The Jour
nal of Higher Education, 81(5), 583–618.
Goode, J. (2010b). The digital identity divide: How technology knowledge impacts college
students. New Media & Society, 12(3), 497–513.
Gray, R., Vitak, J., Easton, E. W., & Ellison, N. B. (2013). Examining social adjustment to
college in the age of social media: Factors influencing successful transitions and persis
tence. Computers & Education, 67, 193–207.
Han, L., Geng, J., Jou, M., Gao, F., & Yang, H. (2017). Relationship between shyness and
mobile phone addiction in Chinese young adults: Mediating roles of self-control and at
tachment anxiety. Computers in Human Behavior, 76, 363–371.
Han, P., Wang, P., Lin, Q., Tian, Y., Gao, F., & Chen, Y. (2017). Reciprocal relationship be
tween internet addiction and network-related maladaptive cognition among Chinese col
lege freshmen: A longitudinal cross-lagged analysis. Frontiers in Psychology, 8, 1047.
Page 57 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Hassell, M. D., & Sukalich, M. F. (2016). A deeper look into the complex relationship be
tween social media use and academic outcomes and attitudes. Information Research: An
International Electronic Journal, 21(4), n4.
Haug, S., Castro, R. P., Kwon, M., Filler, A., Kowatsch, T., & Schaub, M. P. (2015). Smart
phone use and smartphone addiction among young people in Switzerland. Journal of Be
havioral Addictions, 4(4), 299–307.
Haverila, M. J. (2011). Cell phone feature preferences and gender differences among col
lege students. International Journal of Mobile Communications, 9(4), 401–419.
Hawi, N. S., & Samaha, M. (2016). To excel or not to excel: Strong evidence on the ad
verse effect of smartphone addiction on academic performance. Computers & Education,
98, 81–89.
Hawi, N. S., & Samaha, M. (2017). The relations among social media addiction, self-es
teem, and life satisfaction in university students. Social Science Computer Review, 35(5),
576–586.
Henderson, M., Selwyn, N., Finger, G., & Aston, R. (2015). Students’ everyday engage
ment with digital technology in university: Exploring patterns of use and “usefulness”.
Journal of Higher Education Policy and Management, 37(3), 308–319. doi:
10.1080/1360080X.2015.1034424
Hendrickson, B., & Rosen, D. (2017). Insights into new media use by international stu
dents: Implications for cross-cultural adaptation theory. Social Networking, 6, 81–106.
Hong, F. Y., Chiu, S. I., & Huang, D. H. (2012). A model of the relationship between psy
chological characteristics, mobile phone addiction and use of mobile phones by Tai
wanese university female students. Computers in Human Behavior, 28(6), 2152–2159.
Hou, J., Ndasauka, Y., Jiang, Y., Ye, Z., Wang, Y., Yang, L., … & Xu, F. (2017). Excessive use
of WeChat, social interaction and locus of control among college students in China. PloS
One, 12(8), e0183633.
Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young
adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45. doi:
10.1080/15252019.2010.10722168
Hussain, Z., Griffiths, M. D., & Sheffield, D. (2017). An investigation into problematic
smartphone use: The role of narcissism, anxiety, and personality factors. Journal of Behav
ioral Addictions, 6(3), 378–386.
Ishii, K., Rife, T. S., & Kagawa, N. (2017). Technology-driven gratifications sought through
text-messaging among college students in the US and Japan. Computers in Human Behav
ior, 69, 396–404.
Page 58 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Jacobsen, W. C., & Forste, R. (2011). The wired generation: Academic and social
(p. 291)
Jarvi, S. M., Swenson, L. P., & Batejan, K. L. (2017). Motivation for and use of social net
working sites: comparisons among college students with and without histories of non-sui
cidal self-injury. Journal of American College Health, 65(5), 306–312.
Jenkins-Guarnieri, M. A., Wright, S. L., & Johnson, B. (2013). Development and validation
of a social media use integration scale. Psychology of Popular Media Culture, 2(1), 38–50.
Jiang, Z., & Shi, M. (2016). Prevalence and co-occurrence of compulsive buying, problem
atic Internet and mobile phone use in college students in Yantai, China: Relevance of self-
traits. BMC public health, 16(1), 1211.
Jiang, Z., & Zhao, X. (2016). Self-control and problematic mobile phone use in Chinese
college students: The mediating role of mobile phone use patterns. BMC psychiatry, 16(1),
416.
Jiang, Z., & Zhao, X. (2017). Brain behavioral systems, self-control and problematic mo
bile phone use: The moderating role of gender and history of use. Personality and Individ
ual Differences, 106, 111–116.
Johnston, K., Tanner, M., Lalla, N., & Kawalski, D. (2013). Social capital: the benefit of
Facebook “friends”. Behaviour & Information Technology, 32(1), 24–36.
Judd, T. (2014). Making sense of multitasking: The role of Facebook. Computers & Educa
tion, 70, 194–202.
Karadağ, E., Tosuntaş, Ş. B., Erzen, E., Duru, P., Bostan, N., Şahin, B. M., … & Babadağ,
B. (2015). Determinants of phubbing, which is the sum of many virtual addictions: A
structural equation model. Journal of Behavioral Addictions, 4(2), 60–74.
Katikalapudi, R., Chellappan, S., Montgomery, F., Wunsch, D., & Lutzen, K. (2012). Associ
ating internet usage with depressive behavior among college students. IEEE Technology
and Society Magazine, 31(4), 73–80.
Page 59 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Kim, B., & Kim, Y. (2017). College students’ social media use and communication network
heterogeneity: Implications for social capital and subjective well-being. Computers in Hu
man Behavior, 73, 620–628.
Kim, H. J., Min, J. Y., Kim, H. J., & Min, K. B. (2017). Accident risk associated with smart
phone addiction: A study on university students in Korea. Journal of Behavioral Addic
tions, 6(4), 699–707.
Kim, J, & Lee, J.-E. R. (2011). The Facebook paths to happiness: Effects of the number of
Facebook friends and self-presentation on subjective well-being. Cyberpsychology, Behav
ior, and Social Networking, 14(6), 359–364. doi: 10.1089/cyber.2010.0374
Kim, J. H., Kim, M. S., & Nam, Y. (2010). An analysis of self-construals, motivations, Face
book use, and user satisfaction. International. Journal of Human–Computer Interaction,
26(11–12), 1077–1099.
Kim, Y., Liu, Y., & Shan, Z. (2017). Beyond touchdown: College students’ sports participa
tion, social media use, college attachment, and psychological well-being. Telematics and
Informatics, 34(7), 895–903.
Kim, Y., Sohn, D., & Choi, S. M. (2011). Cultural difference in motivations for us
(p. 292)
ing social network sites: A comparative study of American and Korean college students.
Computers in Human Behavior, 27(1), 365–372.
Kim, Y., Wang, Y., & Oh, J. (2016). Digital media use and social engagement: How social
media and smartphone use influence social activities of college students. Cyberpsycholo
gy, Behavior, and Social Networking, 19(4), 264–269.
Kobus, M. B., Rietveld, P., & Van Ommeren, J. N. (2013). Ownership versus on-campus use
of mobile IT devices by university students. Computers & Education, 68, 29–41.
Koc, M., & Gulyagci, S. (2013). Facebook addiction among Turkish college students: The
role of psychological health, demographic, and usage characteristics. Cyberpsychology,
Behavior, and Social Networking, 16(4), 279–284.
Koh, H., & Mackert, M. (2016). A study exploring factors of decision to text while walking
among college students based on Theory of Planned Behavior (TPB). Journal of American
College Health, 64(8), 619–627.
Kokkinos, C. M., Baltzidis, E., & Xynogala, D. (2016). Prevalence and personality corre
lates of Facebook bullying among university undergraduates. Computers in Human Be
havior, 55, 840–850.
Krasnova, H., Widjaja, T., Buxmann, P, Wenninger, H., & Benbasat, I. (2015). Why follow
ing friends can hurt you: An exploratory investigation of the effects of envy on social net
working sites among college-age users. Information Systems Research, 26(3), 585–605.
Page 60 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Kuang-Tsan, C., & Fu-Yuan, H. (2017). Study on relationship among university students’
life stress, smart mobile phone addiction, and life satisfaction. Journal of Adult Develop
ment, 24(2), 109–118.
Kuznekoff, J. & Titsworth, S. (2013). The impact of mobile phone usage on student learn
ing. Communication Education, 62(3), 233–252.
Lachmann, B., Duke, É., Sariyska, R., & Montag, C. (2017). Who’s addicted to the Smart
phone and/or the Internet? Psychology of Popular Media Culture, (Nov 20).
Lau, W. W. (2017). Effects of social media usage and social media multitasking on the aca
demic performance of university students. Computers in Human Behavior, 68, 286–291.
Lee, E. B. (2015). Too much information: Heavy smartphone and Facebook utilization by
African American young adults. Journal of Black Studies, 46(1), 44–61.
Lee, K. S., & Chen, W. (2017). A long shadow: Cultural capital, techno-capital and net
working skills of college students. Computers in Human Behavior, 70, 67–73.
Lee-Johnson, Y. L., Jiang, Y., & Li, Y. (2016). Comparing the digital literacy repertoire
among college students in China and the USA. Quarterly Journal of Chinese Studies, 4(4),
64–80.
Lepp, A., Li, J., Barkley, J. E., & Salehi-Esfahani, S. (2015). Exploring the relationships be
tween college students’ cell phone use, personality and leisure. Computers in Human Be
havior, 43, 210–219.
Li, W., O’Brien, J. E., Snyder, S. M., & Howard, M. O. (2015). Characteristics of internet
addiction/pathological internet use in US university students: A qualitative-method inves
tigation. PloS one, 10(2), e0117372.
Li, X., & Chen, W. (2014). Facebook or Renren? A comparative study of social networking
site use and social capital among Chinese international students in the United States.
Computers in Human Behavior, 35, 116–123.
Lian, L., & You, X. (2017). Specific virtues as predictors of smartphone addiction among
Chinese undergraduates. Current Psychology, 36(2), 376–384.
Lian, L., You, X., Huang, J., & Yang, R. (2016). Who overuses Smartphones? Roles
(p. 293)
of virtues and parenting style in Smartphone addiction among Chinese college students.
Computers in Human Behavior, 65, 92–99.
Lin, J. H. (2015). The role of attachment style in Facebook use and social capital: Evi
dence from university students and a national sample. Cyberpsychology, Behavior, and So
cial Networking, 18(3), 173–180.
Lin, J. H., Peng, W., Kim, M., Kim, S. Y., & LaRose, R. (2012). Social networking and ad
justments among international students. New Media & Society, 14(3), 421–440.
Page 61 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Lin, Y., & Sackey, E. (2015). Use of Facebook: A Comparative Study of US American and
Ghanaian College Students. Communication Research Reports, 32(3), 281–286.
Liu, D., & Brown, B. B. (2014). Self-disclosure on social networking sites, positive feed
back, and social capital among Chinese college students. Computers in Human Behavior,
38, 213–219.
Liu, D., Kirschner, P. A., & Karpinski, A. C. (2017). A meta-analysis of the relationship of
academic performance and Social Network Site use among adolescents and young adults.
Computers in Human Behavior, 77, 148–157.
Long, J., Liu, T. Q., Liao, Y. H., Qi, C., He, H. Y., Chen, S. B., & Billieux, J. (2016). Preva
lence and correlates of problematic smartphone use in a large random sample of Chinese
undergraduates. BMC psychiatry, 16(1), 408.
Madu, S. N., Otuka, C. C., & Adebayo, I. A. (2011). Attitude of male and female students
towards the use of internet. Gender and Behaviour, 9(1), 3817–3826.
Manago, A.M., Taylor, T., & Greenfield, P. M. (2012). Me and my 400 friends: The anatomy
of college students’ Facebook networks, their communication patterns, and well-being.
Developmental Psychology, 48, 369–380. doi: 10.1037/a0026338
Marlowe, J. M., Bartley, A., & Collins, F. (2017). Digital belongings: The intersections of
social cohesion, connectivity and digital media. Ethnicities, 17(1), 85–102.
Meier, A., Reinecke, L., & Meltzer, C. E. (2016). “Facebocrastination”? Predictors of using
Facebook for procrastination and its effects on students’ well-being. Computers in Human
Behavior, 64, 65–76. doi:http://dx.doi.org/10.1016/j.chb.2016.06.011
Michikyan, M., Subrahmanyam, K., & Dennis, J. (2015). Facebook use and academic per
formance among college students: A mixed-methods study with a multi-ethnic sample.
Computers in Human Behavior, 45, 265–272.
Mihailidis, P. (2014a). A tethered generation: Exploring the role of mobile phones in the
daily life of young people. Mobile Media & Communication, 2(1), 58–72.
Miller, R. A. (2017). “My voice is definitely strongest in online communities”: Students us
ing social media for queer and disability identity-making. Journal of College Student De
velopment, 58(4), 509–525.
Page 62 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Miller, R., & Melton, J. (2015). College students and risk-taking behaviour on Twitter ver
sus Facebook. Behaviour & Information Technology, 34(7), 678–684.
Misra, S., & Stokols, D. (2012). Psychological and health outcomes of perceived informa
tion overload. Environment and Behavior, 44(6), 737–759.
Mitchell, M. E., Lebow, J. R., Uribe, R., Grathouse, H., & Shoger, W. (2011). Inter
(p. 294)
net use, happiness, social support and introversion: A more fine grained analysis of per
son variables and internet activity. Computers in Human Behavior, 27(5), 1857–1861.
Mok, J. Y., Choi, S. W., Kim, D. J., Choi, J. S., Lee, J., Ahn, H., … & Song, W. Y. (2014). La
tent class analysis on internet and smartphone addiction in college students. Neuropsy
chiatric Disease and Treatment, 10, 817–827.
Monacis, L., de Palo, V., Griffiths, M. D., & Sinatra, M. (2017). Exploring individual differ
ences in online addictions: The role of identity and attachment. International Journal of
Mental Health And Addiction, 15(4), 853–868.
Montagni, I., Guichard, E., & Kurth, T. (2016). Association of screen time with self-per
ceived attention problems and hyperactivity levels in French students: A cross-sectional
study. BMJ open, 6(2), e009089.
Moreno, M. A., Jelenchick, L. A., & Breland, D. J. (2015). Exploring depression and prob
lematic internet use among college females: A multisite study. Computers in Human Be
havior, 49, 601–607.
Moreno, M. A., Jelenchick, L. A., & Christakis, D. A. (2013). Problematic internet use
among older adolescents: A conceptual framework. Computers in Human Behavior, 29(4),
1879–1887.
Moreno, M. A., Jelenchick, L., Koff, R., Eikoff, J., Diermyer, C., & Christakis, D. A. (2012).
Internet use and multitasking among older adolescents: An experience sampling ap
proach. Computers in Human Behavior, 28(4), 1097–1102.
Moreno, M. A., Swanson, M. J., Royer, H., & Roberts, L. J. (2011). Sexpectations: Male col
lege students’ views about displayed sexual references on females’ social networking web
sites. Journal of Pediatric and Adolescent Gynecology, 24(2), 85–89.
Morreale, S., Staley, C., Stavrositu, C., & Krakowiak, M. (2015). First-year college stu
dents’ attitudes toward communication technologies and their perceptions of communica
tion competence in the 21st Century. Communication Education, 64(1), 107–131.
Noh, D., & Kim, S. (2016). Dysfunctional attitude mediates the relationship between psy
chopathology and Internet addiction among Korean college students: A cross-sectional
observational study. International Journal of Mental Health Nursing, 25(6), 588–597.
Odacı, H., & Kalkan, M. (2010). Problematic Internet use, loneliness and dating anxiety
among young adult university students. Computers & Education, 55(3), 1091–1097.
Page 63 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Oh, S., & Kim, S. (2014). College students’ use of social media for health in the USA and
Korea. Information Research: An International Electronic Journal, 19(4), n4, article 643.
Orzech, K. M., Grandner, M. A., Roane, B. M., & Carskadon, M. A. (2016). Digital media
use in the 2 h before bedtime is associated with sleep variables in university students.
Computers in Human Behavior, 55, 43–50.
Ouyang, Z., Wang, Y., & Yu, H. (2017). Internet use in young adult males: From the per
spective of pursuing well-being. Current Psychology, 36(4), 840–848.
Pak, R., Rovira, E., McLaughlin, A. C., & Leidheiser, W. (2017). Evaluating attitudes and
experience with emerging technology in cadets and civilian undergraduates. Military Psy
chology, 29(5), 448–455.
Panek, E. T., Nardis, Y., & Konrath, S. (2013). Mirror or Megaphone?: How relationships
between narcissism and social networking site use differ on Facebook and Twitter. Com
puters in Human Behavior, 29(5), 2004–2012.
Park, N., Song, H., & Lee, K. M. (2014). Social networking sites and other media use, ac
culturation stress, and psychological well-being among East Asian college students in the
United States. Computers in Human Behavior, 36, 138–146.
(p. 295) Park, S., Lee, S. W., Kwak, J., Cha, M., & Jeong, B. (2013). Activities on Facebook
reveal the depressive state of users. Journal of Medical Internet Research, 15(10).
Percheski, C., & Hargittai, E. (2011). Health information-seeking in the digital age. Jour
nal of American College Health, 59(5), 379–386.
Pilli, O. (2015). The changes in social media usage: students’ perspective. The Anthropolo
gist, 22(2), 345–354.
Polo, M. I., Lázaro, S. M., del Barco, B. L., & Castaño, E. F. (2017). Mobile abuse in uni
versity students and profiles of victimization and aggression. Adicciones, 29(4), 245–255.
Primack, B. A., Shensa, A., Escobar-Viera, C. G., Barrett, E. L., Sidani, J. E., Colditz, J. B.,
& James, A. E. (2017). Use of multiple social media platforms and symptoms of depres
sion and anxiety: A nationally-representative study among U.S. young adults. Computers
in Human Behavior, 69, 1–9.
Punyanunt-Carter, N. M., De La Cruz, J. J., & Wrench, J. S. (2017). Investigating the rela
tionships among college students’ satisfaction, addiction, needs, communication appre
hension, motives, and uses & gratifications with Snapchat. Computers in Human
Behavior, 75, 870–875.
Raacke, J., & Bonds-Raacke, J. (2015). Are students really connected? Predicting college
adjustment from social network usage. Educational Psychology, 35(7), 819–834.
Page 64 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Ragan, E. D., Jennings, S. R., Massey, J. D., & Doolittle, P. E. (2014). Unregulated use of
laptops over time in large lecture classes. Computers & Education, 78, 78–86.
Rashid, T., & Asghar, H. M. (2016). Technology use, self-directed learning, student en
gagement and academic performance: Examining the interrelations. Computers in Hu
man Behavior, 63, 604–612.
Rayan, A., Dadoul, A. M., Jabareen, H., Sulieman, Z., Alzayyat, A., & Baker, O. (2017). In
ternet use among university students in South West Bank: Prevalence, advantages and
disadvantages, and association with psychological health. International Journal of Mental
Health and Addiction, 15(1), 118–129.
Reed, L. A., Tolman, R. M., & Safyer, P. (2015). Too close for comfort: Attachment insecu
rity and electronic intrusion in college students’ dating relationships. Computers in Hu
man Behavior, 50, 431–438.
Roberts, J. A., & Pirog III, S. F. (2012). A preliminary investigation of materialism and im
pulsiveness as predictors of technological addictions among young adults. Journal of Be
havioral Addictions, 2(1), 56–62.
Roberts, J. A., Petnji Yaya, L. H., & Manolis, C. (2014). The invisible addiction: Cell-phone
activities and addiction among male and female college students. Journal of Behavioral
Addictions, 3(4), 254–265. doi:10.1556/JBA.3.2014.015
Roberts, N., & Rees, M. (2014). Student use of mobile devices in university lectures. Aus
tralasian Journal of Educational Technology, 30(4), 415–426.
Rutledge, C. M., Gillmor, K. L., & Gillen, M. M. (2013). Does this profile picture make me
look fat? Facebook and body image in college students. Psychology of Popular Media Cul
ture, 2(4), 251–258.
Samaha, M., & Hawi, N. S. (2016). Relationships among smartphone addiction, stress,
academic performance, and satisfaction with life. Computers in Human Behavior, 57, 321–
325.
Sánchez, R. A., Cortijo, V., & Javed, U. (2014). Students’ perceptions of Facebook for aca
demic purposes. Computers & Education, 70, 138–149.
Selkie, E. M., Kota, R., Chan, Y. F., & Moreno, M. (2015). Cyberbullying, depres
(p. 296)
sion, and problem alcohol use in female college students: A multisite study. Cyberpsychol
ogy, Behavior, and Social Networking, 18(2), 79–86.
Page 65 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Servidio, R. (2014). Exploring the effects of demographic factors, Internet usage and per
sonality traits on Internet addiction in a sample of Italian university students. Computers
in Human Behavior, 35, 85–92.
Sheldon, P. (2013). Voices that cannot be heard: Can shyness explain how we communi
cate on Facebook versus face-to-face? Computers in Human Behavior, 29(4), 1402–1407.
Smith, R., Morgan, J., & Monks, C. (2017). Students’ perceptions of the effect of social
media ostracism on wellbeing. Computers in Human Behavior, 68, 276–285.
Sponcil, M. & Gitimu, P. (2013). Use of social media by college students: Relationship to
communication and self-concept. Journal of Technology Research, 4, 1–13.
Tandoc, E. C., Ferrucci, P. & Duffy, M. (2015). Facebook use, envy, and depression among
college students: Is facebooking depressing? Computers in Human Behavior, 43, 139–146.
Taylor, D. G., Voelker, T. A. & Pentina, I. (2011). Mobile application adoption by young
adults: A social network perspective. International Journal of Mobile Marketing, 6(2), 60–
70.
Teoh, A. N., Chong, L. X., Yip, C. C. E., Lee, P. S. H., & Wong, J. W. K. (2015). Gender as
moderator of the effects of online social support from friends and strangers: A study of
Singaporean college students. International Perspectives in Psychology: Research, Prac
tice, Consultation, 4(4), 254–266.
Thomas, L., Briggs, P., Hart, A., & Kerrigan, F. (2017). Understanding social media and
identity work in young people transitioning to university. Computers in Human Behavior,
76, 541–553.
Tu, B. M., Wu, H. C., Hsieh, C., & Chen, P. H. (2011). Establishing new friendships- from
face-to-face to facebook: A case study of college students. Proceedings of the 44th Hawaii
International Conference on System Sciences, Kauai, 4–7 January 2011, 1–10.
Turan, Z. (2013). The reasons for non-use of social networking websites by university stu
dents. Comunicar, 21(41), 137–145.
Page 66 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Turkle, S. (2011). Alone together: Why we expect more from technology and less from
each other. New York, NY: Basic Books.
Tynes, B. M., Rose, C. A., & Markoe, S. L. (2013). Extending campus life to the Internet:
Social media, discrimination, and perceptions of racial climate. Journal of Diversity in
Higher Education, 6(2), 102–114.
Villanti, A. C., Johnson, A. L., Ilakkuvan, V., Jacobs, M. A., Graham, A. L., & Rath, J. M.
(2017). Social media use and access to digital technology in US young adults in 2016.
Journal of Medical Internet Research, 19(6). e196
Virden, A. L., Trujillo, A., & Predeger, E. (2014). Young adult females’ perceptions
(p. 297)
Vorderer, P., Krömer, N., & Schneider, F. M. (2016). Permanently online–Permanently con
nected: Explorations into university students’ use of social media and mobile smart de
vices. Computers in Human Behavior, 63, 694–703.
Wang, H., Chua, V., & Stefanone, M. A. (2015). Social ties, communication channels, and
personal well-being: A study of the networked lives of college students in Singapore.
American Behavioral Scientist, 59, 1189–1202. doi: 10.1177/0002764215580590
Wang, J. L., Wang, H. Z., Gaskin, J., & Wang, L. H. (2015). The role of stress and motiva
tion in problematic smartphone use among college students. Computers in Human Behav
ior, 53, 181–188.
Wang, J.-L., Jackson, L. A., Gaskin, J., & Wang, H.-Z. (2014). The effects of Social Network
ing Site (SNS) use on college students’ friendship and wellbeing. Computers in Human
Behavior, 37(August), 229–236.
Wang, Y., Niiya, M., Mark, G., Reich, S., & Warschauer, M. (2015). Coming of age (digital
ly): An ecological view of social media use among college students. Proceedings of CSCW,
571–582. doi:10.1145/2675133.2675271
Wang, Z., Tchernev, J. M., & Solloway, T. (2012). A dynamic longitudinal examination of so
cial media use, needs, and gratifications among college students. Computers in Human
Behavior, 28(5), 1829–1839.
Wei, R., Lo, V. H., Xu, X., Chen, Y. N. K., & Zhang, G. (2014). Predicting mobile news use
among college students: The role of press freedom in four Asian cities. New Media & So
ciety, 16(4), 637–654.
Wendorf, J. E., & Yang, F. (2015). Benefits of a negative post: Effects of computer-mediat
ed venting on relationship maintenance. Computers in Human Behavior, 52, 271–277.
Page 67 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Whitehill, J. M., Brockman, L. N., & Moreno, M. A. (2013). “Just talk to me”: Communicat
ing with college students about depression disclosures on Facebook. Journal of Adoles
cent Health, 52(1), 122–127.
Wilmer, H. H., & Chein, J. M. (2016). Mobile technology habits: patterns of association
among device usage, intertemporal preference, impulse control, and reward sensitivity.
Psychonomic Bulletin & Review, 23(5), 1607–1614. doi:10.3758/s13423-016-1011-z
Wohn, D. Y., & LaRose, R. (2014). Effects of loneliness and differential usage of Facebook
on college adjustment of first-year students. Computers & Education, 76, 158–167.
Wu, J. Y. (2015). University students’ motivated attention and use of regulation strategies
on social media. Computers & Education, 89, 75–90.
Xu, S., Wang, Z. J., & David, P. (2016). Media multitasking and well-being of university
students. Computers in Human Behavior, 55, 242–250.
Xu, X., Lin, Q., Zhang, Y., Zhu, R., Sharma, M., & Zhao, Y. (2016). Influence of WeChat on
sleep quality among undergraduates in Chongqing, China: A cross-sectional study.
SpringerPlus, 5(1), 2066.
Yang, C. C., & Brown, B. B. (2013). Motives for using Facebook, patterns of Facebook ac
tivities, and late adolescents’ social adjustment to college. Journal of Youth and Adoles
cence, 42(3), 403–416.
Yang, C. C., & Brown, B. B. (2015). Factors involved in associations between Face
(p. 298)
book use and college adjustment: Social competence, perceived usefulness, and use pat
terns. Computers in Human Behavior, 46, 245–253.
Yang, H. C. (2014). Young people’s friendship and love relationships and technology: New
practices of intimacy and rethinking feminism. Asian Journal of Women’s Studies, 20(1),
93–124.
Yang, T., Yu, L., Oliffe, J. L., Jiang, S., & Si, Q. (2017). Regional contextual determinants of
internet addiction among college students: A representative nationwide study of China.
The European Journal of Public Health, 27(6), 1032–1037.
Yao, B., Han, W., Zeng, L., & Guo, X. (2013). Freshman year mental health symptoms and
level of adaptation as predictors of Internet addiction: A retrospective nested case-control
study of male Chinese college students. Psychiatry Research, 210(2), 541–547.
Page 68 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
Yao, M. Z., He, J., Ko, D. M., & Pang, K. (2014). The influence of personality, parental be
haviors, and self-esteem on Internet addiction: A study of Chinese college students. Cy
berpsychology, Behavior, and Social Networking, 17(2), 104–110.
Yubero, S., Navarro, R., Elche, M., Larrañaga, E., & Ovejero, A. (2017). Cyberbullying vic
timization in higher education: An exploratory analysis of its association with social and
emotional factors among Spanish students. Computers in Human Behavior, 75, 439–449.
Yuchang, J., Cuicui, S., Junxiu, A., & Junyi, L. (2017). Attachment styles and smartphone
addiction in chinese college students: The mediating roles of dysfunctional attitudes and
self-esteem. International Journal of Mental Health and Addiction, 15(5), 1122–1134.
Yuen, E. K., Koterba, E. A., Stasio, M. J. (2018). The effects of Facebook on mood in
emerging adults. Psychology of Popular Media Culture.
Zhang, Y., Mei, S., Li, L., Chai, J., Li, J., & Du, H. (2015). The relationship between impul
sivity and internet addiction in Chinese college students: A moderated mediation analysis
of meaning in life and self-esteem. PloS one, 10(7), e0131597.
Zhu, R., & Krever, R. (2017). Media use and cultural adaptation by foreign students in
Chinese universities. Continuum, 31(2), 307–324.
Notes:
(1.) We acknowledge support for data collection and software through Dr. Ronald E. Rice’s
endowed Arthur N. Rupe Professorship in the Social Effects of Mass Communication in
the Department of Communication, UC Santa Barbara.
Ronald E. Rice
Ronald E. Rice (PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the
Social Effects of Mass Communication in the Department of Communication at Uni
versity of California, Santa Barbara. Dr. Rice has been awarded an Honorary Doctor
ate from University of Montreal (2010), an International Communication Association
(ICA) Fellow, selected President of the ICA (2006–2007), awarded a Fulbright Award
to Finland (2006), and appointed as the Wee Kim Wee Professor at the School of
Communication and Information and the Visiting University Professor, both at
Nanyang Technological University in Singapore (Augusts 2007–2009 and June 2010).
His co-authored or co-edited books include Organizations and unusual routines: A
systems analysis of dysfunctional feedback processes (2010); Media ownership: Re
search and regulation (2008); The Internet and health care: Theory, research and
practice (2006); Social consequences of internet use: Access, involvement and inter
action (2002); The Internet and health communication (2001); Accessing and brows
ing information and communication (2001); Public communication campaigns (1981,
1989, 2001, 2012); Research methods and the new media (1988); Managing organi
zational innovation (1987); And The new media: Communication, research and tech
Page 69 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Media Mastery by College Students: A Typology and Review
nology (1984). He has published over 150 refereed journal articles and 70 book chap
ters. Dr. Rice has conducted research and published widely in communication sci
ence, public communication campaigns, computer-mediated communication systems,
methodology, organizational and management theory, information systems, informa
tion science and bibliometrics, social uses and effects of the Internet, and social net
works. http://www.comm.ucsb.edu/people/ronald-e-rice
Nicole Zamanzadeh
Nicole Zamanzadeh received her PhD from the University of California, Santa Bar
bara. Her research interests include new media, stress, and family resilience. Her
current work investigates questions about media use habits such as media multitask
ing as a potential source of stress or resilience for individuals and the family system.
Ingunn Hagen
Page 70 of 70
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.10
Introduction
THE growing number of mobile communication technologies and computer-mediated
communication (CMC) platforms has brought numerous benefits to and enrichments of
the way we work and socialize. However, they also lead to the challenge of being always
connected, which can be a source of stress (Barley, Meyerson, & Grodal, 2011). The ex
tent to, and the ways in, which digital technologies foster stress, especially in relation to
work-home boundary management, has been of particular interest in occupational psy
chology and to a lesser extent in human-computer interaction. Understanding this rela
Page 1 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
tionship has important implications for improving workplace well-being. In fact, work-re
lated stress is a major health problem in the work environment, costing over £5 billion a
year just in the United Kingdom (HSE, 2017).
Most work looking at how workers are affected by this constant connection to platforms
and devices belongs to the field of occupational psychology, where efforts have been di
rected towards understanding work-home boundary management practices and develop
ing boundary theory (e.g., Ashforth, Kreiner, & Fugate, 2000; Kossek, Ruderman, Braddy,
& Hannum, 2012; Rice, 2017). In contrast, work investigating the ways in which ubiqui
tous technology is changing our way of working comes primarily from the field of human-
computer interaction (HCI), where there is a large body of work looking at computer sup
ported mediated work and availability management (Cecchinato, Cox, & Bird, 2017; Maz
manian & Erickson, 2014). While the two fields complement each other nicely, there is
still little research that focuses on how the two (p. 300) overlap. In this chapter, we
present a critical review (Grant & Booth, 2009) of the literature from occupational psy
chology and HCI to create an up-to-date understanding of how communication technolo
gies are affecting work-home boundary management.
The social construction of technology (SCOT) approach guides our review to explain how
users experience work-home boundaries and their use of technology, as a result of inter
actions that define the experiences. This means, rather than relying on a false dichotomy
that technology can be good or bad, SCOT researchers have shown how there is a two-
way relationship in how technology is influencing society and vice-versa, otherwise
known as “interpretive flexibility” (Klein & Kleinman, 2002). Kalman (2016, p. 9) explains
that, “[i]t is not the use of ICTs that blurs the boundaries between work and home, but
rather the managers, colleagues or clients who expect work to be carried out at home (or
family and friends who expect employees to divert attention to them during the work
day).” Similarly, individuals co-construct, manage and negotiate boundaries around their
roles through social interactions. As Kreiner, Hollensbe and Sheep (2009) point out,
boundary theory offers an ideal lens to study work-home boundaries within the social-con
structionist approach. Our review focuses on the role that communication technologies
play in shaping boundary management. As such, we emphasize how the relationship be
tween individuals and technology can bring both enrichment and challenges, and by do
ing so, we are able to unearth strategies that can help individuals and organizations
around boundary management.
We start by covering how boundary research has evolved over time and in response to
changes in technology, and then explain how mobile devices have shifted work outside
the office (and family issues inside the office) through a proliferation of devices and CMC
platforms that can support and challenge boundary management, negotiation, and avail
ability. With particular focus on how this impacts knowledge workers (Pyöriä, 2005) who
have flexible working practices, we start by reviewing boundary theory to explain work-
home conflicts and enrichment. We then reflect on how these have changed as new com
munication technologies have been introduced. Finally, we conclude with an assessment
of boundary management strategies that can be applied top-down and bottom-up to show
Page 2 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
how policy makers, practitioners and individuals can support better boundary manage
ment. Understanding these aspects can help researchers guide future work on boundary
management in the digital age, and practitioners know where to focus efforts when de
signing interactions with communication technologies.
Terminology
As this chapter brings together research from different fields, we clarify key terms in our
review, namely what we mean by “boundary management” and “communication technolo
gies.”% We refer to boundary management as any practice that an individual puts in place
when creating, negotiating, and maintaining boundaries around work and home. (p. 301)
Boundary theory literature does not agree on the terms used to describe the domains
around the boundaries: as Allen (2013) points out, the terms work vs. home, work vs.
family, and work vs. life are often used interchangeably to cover the variety of life roles.
Here, we choose to use the umbrella expression work-home boundaries and to juxtapose
work vs. personal to broadly differentiate between life roles and domains that are not
necessarily confined to a specific time or space. For a deeper discussion around this ter
minology, see Moen (2011).
Work-Home Boundaries
Over the past 20 years, popular media have reported the growing interest in “work-life
balance,” or the ideal equilibrium of well-being in all aspects of one’s life (Kreiner et al.,
2009), as the outcome of a more complex process of work-home boundary management.
The idea of balance is rooted in balance theory, as first described by Fritz Heider (1946).
When people perceive important aspects of their life as being part of a system, they are
inclined to maintain a state of balance among these elements, often through a “a juggling
act,” where “some balls (roles) are larger (more demanding), some weigh more than
others” (Roche, 2015, p. 18). How we juggle all these roles depends on many factors,
some of which can have a positive impact on work-life balance (e.g., job satisfaction, tele
work), while others can impact it negatively (e.g., work overload and job demands).
Page 3 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Boundary Theory
In general, boundaries are delimitations of an area, which can refer to a physical space
(e.g., a country, a home), or a more abstract domain (e.g., a role). When referred to work
and personal domains, boundaries have been classified as physical, temporal, or psycho
logical (Clark, 2000). Physical boundaries for example can be the walls of an office, or a
dedicated desk in the home of a telecommuter. Temporal boundaries refer to strict sched
ules, like a nine to five job, and/or explicit transitions between working time and family
time, such as using the commute to shift and detach from one role to another. Finally, psy
chological boundaries are the series of rules self-created to establish which behaviors and
attitudes belong to which domain and preferences for the balance among the domains.
(Ashforth et al., 2000). At one end of the continuum are individuals who tend to have
work and home domains fully integrated, where “home” and “work” are “one giant cate
gory of social existence, for no conceptual boundary separates its contents or
meaning” (Nippert-Eng, 1996, p. 567). At the other end are those for whom work and
home are perceived as two completely separated worlds. Kossek, Ruderman, Braddy, and
Hannum (2012) describe three main boundary styles that extend the integration-segmen
tation continuum paradigm, and include: separators, volleyers, and integrators. While in
tegrators and separators reflect behaviors of those at the two extremes of Ashforth’s con
tinuum, volleyers are people who rely on both strategies and switch between them de
pending on job structure and family situation (Kossek, Baltes, & Matthews, 2011).
On a daily basis, individuals can experience repeated shifts between the different roles in
different domains, each having different responsibilities and resources (e.g., employee
and parent). These shifts are known as a “micro-role transitions” (Ashforth et al., 2000)
and happen, for example, when a parent receives a phone call or email from their child’s
school while at work. Ashforth, Kreiner and Fugate (2000) distinguish them from “macro-
role transitions,” where these shifts are less frequent and occur more generally within the
same domain from an old role to a new role, which comes with new responsibilities and
resources (e.g., moving from being a PhD student to becoming a faculty member).
The nature of the boundaries (physical, temporal, or psychological) and the degree of per
meability to which they allow cross-overs (or micro-role transitions) has been attributed
as the result of three factors: (1) identity centrality, (2) perceived sense of control (Kossek
et al., 2012), and (3) the importance of work norms (Park, Fritz, & Jex, 2011). These,
along with boundary strategies (which will be discussed at the end of the chapter), make
up one’s boundary management style (Kossek et al., 2012).
Page 4 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Perceived boundary control. This refers to a sense of control over how permeable bound
aries are and it is a psychological interpretation rather than a personal trait. Perceived
boundary control can be high or low. People with high boundary control feel they are in
control of when, how often, and in which direction boundary crossings occur, based on
their role demands and centrality. Contrarily, people with lower boundary control per
ceive lower agency around boundary spill-overs and are more likely to experience work-
family conflict. Kossek et al. (2012) found that boundary control is negatively correlated
with role conflict and stress and suggested that regardless of one’s preference for inte
gration or segmentation, what makes the difference in boundary management satisfac
tion is a sense of boundary control.
Work norms. Because of its basis in social-constructionism (i.e., the idea that boundaries
are constructed in relation to others), an individual’s integration-segmentation behavior
has been found to be consistent with segmenting norms in their workplace (p. 303) (Park
et al., 2011). That is to say, if a person experiences high segmentation in their organiza
tion, he or she will be more likely to adopt a more segmented boundary style, for example
by not check work emails outside of working hours. Similarly, there may be a certain ex
pectation of how one might integrate or segment, sometimes accompanied by company
policies or guidelines.
Work-Home Conflict
Each role of an individual comes with its own expectations of time, attention, and re
sources. However, these many roles may often conflict with each other. “Work-life conflict
occurs when the role demands in one domain interfere with meeting the demands of a
role in another domain” (Olson-Buchanan & Boswell, 2006, p. 436). Such conflict has
been linked to several undesirable outcomes, such as burnout, absenteeism, and stress
(Amstad, Meier, Fasel, Elfering, & Semmer, 2011; Greenhaus & Powell, 2006; Kreiner et
al., 2009). Just like different roles have different expectations, also different environ
ments like work and home have strong (but often contrasting) expectations around rules,
behaviors, and attitudes (Clark, 2000). The tensions, the interactions, and the manage
ment strategies thus created around the role/environment border are an interesting area
of investigation still underexplored.
Researchers (Ashforth et al., 2000; Hall & Richter, 1988) have suggested that more inte
gration of work and home can lead to negative consequences. For example, the perme
ability of an integrated role allows interruptions, which in turn leads to increased confu
sion as to what role to adopt at that moment. This implies that individuals with higher in
tegration have more difficulty disengaging from different roles when in a specific domain,
causing negative affect and less task enjoyment (Williams, Suls, Alliger, Learner, & Wan,
1991). This is especially true if we think about ubiquitous technology that, for example,
allows work communication to interrupt family time on a Sunday evening, or vice-versa,
personal emails to be sent to a work account while in the office. Those who sit on the inte
gration end of the continuum might be more likely to respond to a work email received
Page 5 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
out of office hours, interrupting their personal life; and the opposite scenario is just as
likely (Ashforth et al., 2000).
Interruptions can also challenge those who have more segmented boundaries and roles.
As Olson-Buchanan and Boswell (2006) point out, those with segmented roles have a
more negative reaction, feel more strained, and experience more inter-role conflict when
an interruption occurs, compared to individuals with more integrated roles. Let’s take the
example of receiving a work email outside of working hours: while for those who prefer to
integrate it can help them keep on top of work, for those who prefer to segment work-
home boundaries it can be a source of stress because they find it harder to ignore the
work message during non-work time (Cecchinato, Cox, & Bird, 2015b; Pielot, Church, &
de Oliveira, 2014). This role-referencing can result in mental preoccupation with another
role, leading to strain-based work-home conflict (Olson-Buchanan & Boswell, 2006).
While it is important to understand that cross-role interruptions and spill-overs can occur
for both integrators and separators, it is even more important to remember that (p. 304)
these conflicts have a bi-directional nature, meaning work can interrupt non-work and
non-work can equally disrupt work, depending on which role one choses to engage in
(Greenhaus & Powell, 2006; Kossek et al., 2012; Kreiner et al., 2009).
Work-Home Enrichment
Not all role-referencing and spill-overs have negative effects. Greenhaus and Powell
(2006) propose a model of Work-Family Enrichment in which work and family are allies,
and the enrichment comes from “the extent to which experiences in one role improve the
quality of life in the other role” (Greenhaus & Powell, 2006, p. 73). The authors offer an
extensive review on prior work measuring work-home enrichment and identify: (1) five re
sources that can promote work-family enrichment (skills and perspectives, psychological
and physical resources, social-capital resources, flexibility, and material resources); (2)
two mechanisms through which resources promote enrichment (performance, and affect);
and (3) several moderators that determine conditions for resources in one role to enrich
another role (salience of role, perceived relevance of resources, and consistency of re
sources with norms and requirements).
As with work-home conflict, work-home enrichment also has a bi-directional nature. One
of the five resources, flexibility, is of particular relevance. Flexibility is the ability to deter
mine location, timing, and pace with which role requirements are met; communication
technology enables us to achieve such flexibility, but also may impose too much flexibility
and obligations. In the next section we will analyze how affordances and features of com
munication technologies are affecting work-home boundaries.
Page 6 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
stitutes mobility, ranging from contrasting the static or mobile location of where a com
puter can be situated in the physical space (e.g., a desktop PC can only be on a table,
whereas a mobile phone can be carried in a pocket everywhere; Oulasvirta, Petit, Raento,
& Sauli, 2007), to more abstract interpretations that refer to mobility as the ability to
move across space and time through a mobile device for work or personal reasons
(Cousins & Robey, 2015).
Today’s workspace is distributed across multiple artefacts and locations, which yield to
trends in device specialization, parallelism, and fragmentation (Santosa & Wigdor, 2013).
This device specialization is not just limited to work spaces but also involves the home.
Devices are used differently depending on where they are used and for what reason.
Kawsar and Brush (2013), looking at how multiple devices were used in the home, identi
fied spatial and temporal habits of common Internet activities. In terms of location, more
personal activities (e.g., social networking) took place in private spaces (e.g., the bath
room) where interruptions are less acceptable and less likely to happen. More public and
shared spaces (e.g., kitchen) instead were used for work purposes, as well as personal
reasons.
To make sense of mobility and what it means for work-home boundaries, it is useful to re
ly on Harrison and Dourish’s (1996) distinction between space and place, where the for
mer is defined as a physical location and the latter prescribes behaviors for a specific
space. More simply, spaces become places through the social interactions that happen in
them. For workers with flexible working patterns, communication technology has made it
more complicated to distinguish between different places. Thinking about Kawsar and
Brush’s (2013) findings, the same space or locale (e.g., a kitchen) becomes populated
with different places (e.g., an office space to work, but also an eating area for the family).
Such places have temporal properties: “the same space can be different places at differ
ent times” (Harrison & Dourish, 1996, p. 7). What happens when those different times
overlap or are not clearly defined?
Page 7 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
More than twenty years later, we question what happens when digital spaces and physi
cal spaces are collocated, and particularly when they define incongruent work and per
sonal places with overlapping temporal properties. Multi-device interaction has in fact
created distributed workspaces, defined as “virtual areas spanning multiple devices
across all physical working locations” (Santosa & Wigdor, 2013, p. 63). Kawsar and
Brush’s insights are interesting and novel but not as discerning as they could have been,
for example taking Dourish’s (2006) distinction between space and place. For example,
what happens when digital and physical places overlap and create work-home conflict?
How can interactions with technology, especially for distributed workspaces, be better de
signed to avoid such conflicts?
Before mobile technologies were introduced in our everyday lives, boundaries between
work and home were more defined. Today, 77% of Americans own a smartphone, 51 per
cent (p. 306) own a tablet (Pew Research, 2018), 5% own a smartwatch (The NPD Group,
2017), and these numbers are growing. Thus, understanding user interactions across
multiple devices has become an active area of research, especially in more recent years.
Bødker and Klokmose talk about all the devices “that a person owns, has access to, and
uses” as “device ecologies” (Bødker & Klokmose, 2012, p. 448), and argue how these are
constantly changing and adapting to the environment and the user. How combinations of
devices are chosen and used for specific purposes needs to be understood, especially if
this is different for work and for personal reasons, thus affecting boundary management.
However, mobile devices (laptops, smartphones, and tablets) also constitute a bridge
across work and personal boundaries, as Dearman and Pierce (2008) and Fleck, Cox and
Robison (2015) found. Karlson, Meyers, Jacobs, Johns and Kane (2009) looked specifically
at multi-device use and the impact on boundaries and working time. Their data logs and
follow-up interviews showed that participants accessed work email outside working hours
and relied on their phone whenever they did not have access to a PC. They found that
people in their sample preferred to be constantly connected with work and life domains
through their mobile phones and emails, as this connectedness gave participants a
stronger sense of perceived control. These findings support Greenhaus and Powell’s
Page 8 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
(2006) idea of work-family enrichment, and the importance of perceived boundary control
supported by Kossek et al. (2012).
More recently, device ecologies have started to include also wearable technology, such as
smartwatches. In contrast to mobile devices that can be placed in pockets and bags,
wrist-worn devices are always in contact with its user and as such can be more discreet,
allowing minimal interference between the user and the task, but at the same time they
can also be more disruptive, as they are both “always on” in function as well as “always
on the user.” Therefore, smart wrist-worn devices introduce the opportunity to explore
new research areas of mobile user experience in relation to boundary management. So
far, very little work has looked at this, with one exception. Cecchinato and colleagues
(Cecchinato & Cox, 2017; Cecchinato, Cox, & Bird, 2015a; Cecchinato et al., 2017) ana
lyzed how smartwatches are used within device ecologies and how they impact boundary
management. We found that smartwatches are used strategically to better manage notifi
cations and filter important messages to the wrist, as well as to help individuals manage
their availability to others, by leveraging the limited functionalities and the (p. 307) mater
ial properties of the watch. For example, users would rely on the act of taking off the
watch at home or at the end of the day as a ritual to help them disconnect from their
work day.
The next section moves from devices to platforms to analyze how they impact work-home
boundaries, particularly when it comes to portraying ourselves and our availability
through CMC.
The typical individual enacts several roles throughout the day, such as parent, colleague,
friend, employee, etc., none of which exists in a vacuum. How we choose to use CMC plat
forms tells something about how we decide to portray ourselves to others and could help
inform how technology helps co-construct and negotiate work-home boundaries (Diaz,
Chiaburu, Zimmerman, & Boswell, 2012).
Goffman’s (1959) dramaturgical approach offers a lens to understand how users might
decide to portray themselves. Goffman builds on the idea that most behaviors are bound
ed in space and time, and guided by specific norms belonging to the context. Farnham
and Churchill apply this to the digital and physical self and call this “faceted identity,”
where “different aspects of identity are performed depending on context, and expect that
identity faceting will vary depending on the individual” (2011, p. 2). Similarly, Nippert-
Eng discussed how self and identity are negotiated around time and space, when dis
cussing what constitutes “work” and “home”: We each make “some sort of distinction be
tween who we are when we are ‘at work’ and ‘at home’. This distinction may be quite re
markable for some (currently segmenting) people, hardly noticeable for other (extremely
integrating) ones. However different our home and work selves are, though, boundary
work supports these variations in who we are” (Nippert-Eng, 1996, p. 569).
Page 9 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Market predictors have seen, and expect, a strong growth in the use of mobile devices for
any form of communication. Use of email on phones used to be an exception, done pri
marily when fully-featured computers were not available, but as work becomes more flex
ible, its use “on-the-go” is more popular and accepted: approximately 50% of email users
access it on their mobile devices (Radicati Group, 2015b; Specht, 2018). Instant messag
ing accounts, which today are over 3.2 billion, are expected to grow at a 4% rate until
2019, particularly for business use compared to personal use (Radicati Group, 2015a).
CMC platforms can be used for work purposes, personal reasons, or both, and the reason
may be influenced by the device they are accessed on. The ways in which people use com
munication technologies is rapidly evolving (Dery et al., 2014) and communication in the
workplace has become particularly challenging compared to personal communication be
cause it is becoming “more acceptable to have informal, non-informative, and non-work
related (e.g., personal) conversations via an instant message service or with mobile de
vices in the workplace” (Cho, Ramgolam, Schaefer, & Sandlin, 2011, p. 40; (p. 308) Fortu
nati, 2002). In fact, while work communication is fragmented across different devices, it
is now also distributed across a growing number of platforms, which go beyond just email
and include for example instant messaging (e.g., Skype, Slack, WhatsApp) and social me
dia (e.g., Facebook and Workplace by Facebook). As a result, some argue that we live in a
world of communication overload (Cho et al., 2011), where the rate and quantity of mes
sages sent and received over a growing number of devices and platform can make it hard
er for individuals to process them.
Despite the fragmentation of platforms, previous work has identified a trend for strong
curation of communication around different platforms, in order to keep work and person
al exchanges separate. This behavior can be associated with a desire to better manage
work and personal boundaries, as well as to improve retrieval of information (Cecchinato,
Sellen, Shokouhi, & Smyth, 2016). Recently, Nouwens, Griggio, and Mackay (2017) sug
gested that users may create idiosyncratic communication “places” within the “space” of
the same app (using Harrison and Dourish’s (1996) definitions), adjusting rules based on
the person they are communicating with. In other words, each platform (i.e., space) is as
sociated with different rules (i.e., making it a particular place) and these rules are per
sonal to the users, rather than inherent in the communication app. For example, the au
thors report the case of a participant who is friends with a colleague, so whenever he
wants to contact the colleague for non-work purposes he will use Facebook Messenger,
but he would not use WhatsApp because he sees it as a too personal platform. Other re
searchers have specifically compared different communication platform such as Facebook
vs. Gmail (Shen, Brdiczka, & Ruan, 2013) or WhatsApp vs SMS (Church & de Oliveira,
2013) and found similar results. When the rules for a particular platform are not respect
ed by others, work-home boundary conflict can occur. Cecchinato, Cox and Bird (2015b)
report the case of a participant whose friends and family would email her on her work ac
count when she is in the office instead of using what she would consider a personal plat
form (e.g., her personal account) because they know she is more likely to see the mes
sage in a timely manner. These examples emphasise how the context of a communication
Page 10 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
platform, the personal preference for use, as well as how it used in relation to others, can
affect work-home boundary management.
Given this fragmentation of platforms used for work and personal communications and
the risks that might arise for work-home boundary management, users have developed or
socially constructed new habits across devices and channels, and it is through these new
habits that work-home boundary management can be further challenged or enriched. For
example, Matthews, Pierce, and Tang (2009) found that users preferred their phone to
triage messages in the inbox because they could easily swipe to delete or archive emails,
while fully featured computers were used for reading and replying to emails, especially
work ones. They also observed that smartphones were used to maintain awareness of in
formation while away from a computer, e.g., by checking emails from remote collabora
tors. Other researchers have found that these checking or monitoring activities happen
primarily outside of working hours, such as early morning or evening, or at weekends
(Kawsar & Brush, 2013), reinforcing the notion that smartphones (p. 309) have the ability
to blur work-home boundaries, depending on how available one decides to be.
The use of communication technologies can have a positive effect, increasing work satis
faction (Diaz et al., 2012) and empowering users to work where and when they feel is
best, for example shifting an activity to a “dead time” to relieve pressure of availability
(Bittman, Brown, & Wajcman, 2009). However, it also facilitates the blurring of bound
aries (Boswell & Olson-Buchanan, 2007), increasing vulnerability to work-home conflict.
As a result, it is more difficult for employees to distance themselves from work during
non-working time (Park et al., 2011); that is, work-family boundary management tends to
be asymmetric (Rice, 2017). It is worth noting that unlike personal life, which is not nec
essarily bound in time, work life is generally confined within certain hours, even if these
are flexible and fragmented throughout the day. As a result, the challenges of constant
availability for work can have worse implications compared to personal and indeed have
been associated with stress and burnout (e.g., Amstad et al., 2011; Kossek et al., 2012).
However, while this phenomenon is more salient in the work context, it also applies to
personal life, whereby friends and family still expect timely responses (O’Hara, Massimi,
Harper, Rubens, & Morris, 2014) causing role conflict in the individual, who has to more
frequently complete micro-role transitions. In this section we will first analyse the chal
lenges of expecting availability, before we move on to how curating others’ awareness of
one’s availability and unavailability can help regain control over work-home boundary
cross-overs.
Managing availability after working hours can be so challenging, some refer to it as “the
new night shift,” where employees log back into work platforms (or never log out) to re
spond to messages (Boswell, Olson-Buchanan, Butts, & Becker, 2016). When this constant
connectivity is not motivated by the individual’s gains, it is generally the result of social
expectations and work pressures (Barley et al., 2011). As a result, an individual may feel
expected to be more attentive and responsive to incoming messages. Motivated by the de
Page 11 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
If availability is something that belongs to oneself, the awareness of that availability is in
stead obtained by those we interact with. Understanding how to manage the two sides of
this coin is crucial when taking a social-constructionist approach of boundary manage
ment. Awareness of one’s availability can be gained in a number of ways: by explicitly
asking/being told, by assumption, or by taking notice of the other person’s habits. Of rele
vance, there are specific features in communication platforms that are used to infer one’s
availability and attentiveness to messages: these are referred to as awareness cues
(Oulasvirta et al., 2007; Rice et al., 2017) and can be for example, read receipts, notifica
tions, or online statuses to infer other people’s activity (O’Hara et al., 2014). Understand
ing how people make use of awareness cues is important for work-home boundary man
agement, because it can help identify where conflicts might arise and how to reduce
them. Knowing when and how to communicate availability or unavailability can be a use
ful strategy to help shift between work and personal roles.
The first research to provide an in-depth analysis of the issues around awareness cues in
mobile devices was conducted by Oulavirta et al. (2007), who found that participants
were able to infer someone’s activity (e.g., sleeping), someone’s potential availability to
engage in some sort of communication (e.g., based on when they were last online), or
even social situation (e.g., if two people were in the same location). A substantial body of
work has looked at how these cues are used particularly in the work context to infer re
sponse times and one’s availability (e.g., Avrahami, Fussell, & Hudson, 2008; Birnholtz,
Page 12 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Bi, & Fussell, 2012; Dourish & Bellotti, 1992). Since the initial work was published in
2007, the inclusion of awareness cues in instant messaging tools has become widespread.
WhatsApp in particular allows users to be notified when a message is sent and delivered,
with the use of two separate ticks next to each message. In addition, it displays the last
time a user was online, a feature that can be disabled. Since that study was published,
WhatsApp has added an additional feature: a change in color (from grey to blue) in the
two ticks to notify when a message has been read. In their study of 20 WhatsApp users,
O’Hara et al. (2014) uncovered “doings,” i.e., ways of engaging with relationships
through IM-like applications. For example, the authors talk about “plausible deniability”
and “plausible accounting” when discussing awareness features (p. 311) (i.e., “last seen
online” and receipt ticks). They claim that these awareness features are not necessarily
perceived as a precursor of interaction and communication—as Nardi, Whittaker and
Bradner (2000) argue when discussing the use of IM in the office—but are instead mes
sages per se, which they define as an “encounter of knowing” (i.e., the user gains insight
about the interlocutor without having to communicate with him or her) as opposed to an
“encounter of communication.” These awareness features add temporal properties to a
communication, which need to be interpreted based on the interlocutor’s habits (e.g.,
how quickly are they likely to reply). O’Hara and colleagues (2014) explain how, when the
communication happens between friends or family, these temporal patterns can be easily
explained, but issues of social pressure to respond rise with particular, less intimate, rela
tionships, such as with acquaintances or work colleagues. In these circumstances, know
ing that someone has received and read a message can lead to an expectation that a reply
will be sent immediately.
As a consequence, user behavior has evolved as people have become more aware of how
their behavior can trigger these cues to be sent to others. Users therefore adopt strate
gies to avoid triggering such cues. For example, we found that one of the ways in which
smartwatches help people to manage their availability, and therefore their work-home
boundaries, is that they enable users to read the text of any incoming message without
any awareness cues being sent (Cecchinato & Cox, 2017; Cecchinato et al., 2017). Thus,
curating others’ awareness of one’s availability can help regain control over boundary
cross-overs.
Awareness cues are also used by receivers of a message as a way of communicating un
availability, and therefore protecting their personal (or work) time. For example, Birn
holtz and colleagues (Birnholtz, Guillory, Hancock, & Bazarova, 2010; Birnholtz, Hancock,
Smith, & Reynolds, 2012), and Patterson et al. (2008) report strategies to avoid being
constantly connected and create boundaries between devices and work and personal
roles, for example by marking oneself as “away” or “invisible” on messaging platforms,
despite being at their computer. Birnholtz et al. (2010) call these “butler lies,” but fo
cused in particular on explicitly verbalized lies or linguistic solutions to overcome the
technology design limitations in teenagers (e.g., saying “sorry I just saw you text” when
actually it was seen straight away). The authors highlight the importance of being able to
manage and coordinate one’s unavailability, especially in our always-connected society.
These “lies provide a useful window into the broader sociotechnical problem of unavail
Page 13 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
ability and inattention management” (Birnholtz, Hancock et al., 2012, p. 35). Unfortunate
ly, technology can give away the truth without the user necessarily realizing it. For exam
ple, automatic read receipts can uncover whether someone has really just read a message
or indeed had delayed a reply and verbally lied about it. Ultimately, this emphasizes how
managing work-home boundaries through communication technologies requires a multi-
pronged effort from individuals and those they interact with (based on what strategies
they use and how these are interpreted), organizations (what guidelines and training to
they put in place) and interaction designers (how they design technology to support
users’ boundary preferences). We discuss these aspects in the following final section.
Communication and mobile technologies have made it easier to stay connected and thus
facilitate an integration between work and personal life. However, Kossek, Lautsch and
Eaton (2006) found that segmentation is a strong predictor of well-being, consistent with
Ashforth et al. (2000), and Hall and Richter (1988), who point out that integration can
lead to negative consequences. While creating a sense of detachment from work can help
recovery from work stress (Park et al., 2011), segmenting can also be more demanding
from a psychological point of view (Ashforth et al., 2000): it is not always as easy to stop
thinking or worrying about a personal matter or a work related issue, as it is to disable
notifications. Building on initial work looking at physical boundary artefacts (Nippert-
Eng, 1996), more attention is being given to the role technology plays in boundary man
agement. Most of these efforts fall under top-down policies and guidelines (e.g., Kossek et
al., 2011), but more recently researchers have started to uncover bottom-up strategies
that individuals can adopt (e.g., Cousins & Robey, 2015).
One of the ways companies can influence people’s boundary strategies is through their
own policies. In the past few years, several policies and government precautions have
been put in place to in an attempt to help workers better manage work-home boundaries
(Cecchinato, Fleck, Brid, & Cox, 2015). These build upon family-friendly programs (e.g.,
shared parental leave) and manifest an acknowledgement on the institutions’ side of per
sonal life values, to help lessen the effects of role conflict. Additionally, companies that
pay for employees’ devices or have Bring Your Own Device (BYOD) policies are implicitly
Page 14 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
(or even explicitly in some cases) suggesting who is in control of boundary permeation
(Grevet, 2014). In the first case (buying devices for employees), an employee may feel he
or she is expected to be available around the clock; in the second case (adopting BYOD
policies) workers might feel legitimized to take personal communications while at work
(Fleck et al., 2015; Grevet, 2014). More recently, Boswell and collaborators have pro
posed a series of recommendations for organizations who want to help their employees
manage after hour-work communications (Boswell et al., 2016).
A variety of organizations have adopted policies with the aim of supporting work-
(p. 313)
home boundary segmentation. For example, in April 2014 officials from the Swedish city
Gothenburg launched a trial policy by adopting six-hour working days, expecting the men
tal and physical state of their employees to improve and their productivity to increase
(Crew, 2015; Gee, 2014). The experiment lasted two years and ended in early 2017: the
positive results of employees feeling healthier and more productive, however, were met
with some scalability concerns by the government (Alderman, 2017). Other European
countries have considered similar measures. For example, Germany’s labor minister has
been considering an “anti-stress” law as a measure to reduce mental health issues con
nected to the constantly available paradigm (i.e., checking emails after working hours)
and commissioned an investigation to determine binding thresholds (Stuart, 2014). More
recently, the French government introduced a law on the “right to disconnect” at the be
ginning of 2017, whereby employers should negotiate with employees how to reduce
work intruding in their personal life, sanctioning companies who fail to clearly state what
is expected of employees out of hours (Agence France—Presse, 2016).
All these examples assume a one-size fits all solution. However, how one manages work-
home boundaries depends on several factors. To this end, we compared different profes
sional groups within the same university and found that how email is managed across ac
counts and devices varies greatly based on personal preference, but also professional dif
ferences between staff in different roles (Cecchinato, Cox, et al., 2015b). As mentioned
previously, each role comes with certain expectations and resources and rather than sug
gesting that all employees should stop checking emails after a certain hour, researchers
have suggested offering training for employees to manage resources and expectations
more consciously and effectively (Jahn, Klesel, Lemmer, & Weigel, 2016).
Page 15 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
least identify types of boundary strategies and provide some actionable knowledge for in
dividuals.
Christena Nippert-Eng (1996) identified interesting behaviors and artefacts used for man
aging boundaries, like having separate calendars or key chains for work and personal
reasons. Kreiner et al. (2009) identified boundary work tactics pertinent to behavioral,
temporal, physical, and communicative aspects. Of particular interest are the (p. 314)
communicative tactics, identified as “setting expectations” and “confronting violations.”
Despite this work being published in 2009 when mobile technology was already main
stream, there is very little mention about the role technology plays in creating and using
these boundary tactics. The authors labelled a type of behavioral tactic as “leveraging on
technology” but did not provide detailed examples of how their participants actually
leveraged technology, other than relying on caller ID and voicemail. Olson-Buchanan and
Boswell (2006) discuss how technology can be used to set appropriate boundaries. They
found that when fewer boundaries around the use of communication technology during
non-work time are set, more work interference on non-work occurs compared to when
boundaries are put in place. Golden and Geisler (2007) were among the first to study the
use of a device as a boundary management strategy. They interviewed 42 users about
their use of a PDA (Personal Digital Assistant) and found that participants used their de
vices to support their boundary style preference—whether integrating, segregating, or
transcending boundaries between work and home. More recently, Cousins and Robey
(2015) identified a series of tactics that can be put in place to manage psychological
boundaries, including (1) designating certain rules for technology (e.g., having one phone
for personal use and one for work use), (2) setting permeating rules (e.g., logging out of
IM platforms when switching domain), or (3) creating connection/disconnection rules
(e.g., turning off devices after a certain hour).
While the strategies presented in the previous paragraph offer a classification of bound
ary management behaviors, they do not provide actionable strategies that other users can
pick up and use. To this end, Köffer, Anlauf, Ortbach and Niehaves (2015, p. 1) identified
three strategies for boundary integration, and three for segmentation. These primarily re
fer to the use of company devices for only work or both work and personal reasons, and
similarly the use of personal devices just for personal use or also for work purposes. The
authors emphasized the number of issues that users still encountered in fulfilling their
boundary preferences, and in particular how those who tended to integrate work and per
sonal life included also users who would prefer to segment the two domains but were not
successful because they were unable to manage their technology. Other actionable strate
gies come from Jahn et al. (2016), who classified IT-related tactics based on how these
tactics are put in place using technology: they can be automated (e.g., allowing automatic
push notifications) or implemented manually (e.g., pulling information as a result of dis
abled notifications). Finally, Cecchinato and colleagues found that communication tech
nology can be used to create microboundaries, i.e. strategies “to limit the impact of mi
cro-role transitions caused by cross-domain technology mediated
interruptions” (Cecchinato, Cox et al., 2015b, p. 3997). These strategies can be used to
set social microboundaries, (e.g., disabling notifications when out for dinner); temporal
Page 16 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
microboundaries (e.g., setting restrictions on when certain apps or websites can be ac
cessed); digital microboundaries (e.g., using separate applications to check work and per
sonal emails); and physical microboundaries (e.g., taking off a smartwatch as a symbol of
disconnecting from work; Cecchinato et al., 2017).
not to check work emails at certain times or in certain locations. Rather than encourag
ing seamless interactions, we have proposed the idea that for interactions to introduce
small hurdles (or designed frictions), that can help users stop and reflect about what they
are doing. In turn, this can help foster more mindful interactions with technology (Cox,
Gould, Cecchinato, Iacovides, & Renfree, 2016). As technologies become more ubiqui
tous, we call for more work to explore how technology should be designed to support indi
viduals’ boundary management practices.
Conclusion
Communication technologies have increased how easily, how frequently, and how many
boundary transitions can occur on a daily basis between one’s several life roles. This can
be problematic because disconnection from work is important for recovery from work-re
lated stress. Similarly, to ensure focus and productivity, it is important to ensure some
separation from personal matters while at work. Given the large number of people suffer
ing from work-related stress, it is crucial to understand how individuals, policy-makers,
and practitioners can help support better boundary management practices and thus bet
ter recovery. In this chapter, we have reviewed a large body of research, pointing out new
trends that bring together two fields—occupational psychology and HCI—by combining
literature on boundary theory, multi-device implications, and computer-mediated commu
nication use. The two fields offer complementary views on the use of technology and its
impact on our daily lives. By taking a social-constructionist view of technology, and partic
ularly relying on one of the four concepts of SCOT—interpretive flexibility—we have em
phasized how communication technologies can both support as well as challenge home-
work boundary management. This approach has allowed us to identify strategies that in
dividuals and organizations can rely on when socially constructing the boundaries be
tween work and home domains.
References
Agence France—Presse. (2016). French workers win legal right to avoid checking work
email out-of-hours. The Guardian. Retrieved February 18, 2018 from https://
www.theguardian.com/money/2016/dec/31/french-workers-win-legal-right-to-
avoid-checking-work-email-out-of-hours
Page 17 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Alderman, L. (2017). In Sweden, happiness in a shorter workday can’t overcome the cost.
The New York Times. Retrieved February 18, 2018 from https://www.nytimes.com/
2017/01/06/business/sweden-work-employment-productivity-happiness.html?
mtrref=query.nytimes.com
Allen, T. D. (2013). The work–family role interface: A synthesis of the research from indus
trial and organizational psychology. In I. B. Weiner (Ed.), Handbook of psychology (2nd
ed.) (pp. 698–718). Hoboken, NJ: Wiley & Sons, Inc.
Amstad, F. T., Meier, L. L., Fasel, U., Elfering, A., & Semmer, N. K. (2011). A meta-
(p. 316)
analysis of work–family conflict and various outcomes with a special emphasis on cross-
domain versus matching-domain relations. Journal of Occupational Health Psychology,
16(2), 151–169.
Ashforth, B., Kreiner, G. E., & Fugate, M. (2000). All in a day’s work: boundaries and mi
cro-role transitions. Academy of Management Review, 25(3), 472–491.
Avrahami, D., Fussell, S. R., & Hudson, S. E. (2008). IM waiting: Timing and responsive
ness in semi-synchronous communication. In Proceedings of the 2008 ACM conference on
computer supported cooperative work (pp. 285–294). Florence: ACM.
Axtell, C., Hislop, D., & Whittaker, S. (2008). Mobile technologies in mobile spaces: Find
ings from the context of train travel. International Journal of Human-Computer Studies,
66(12), 902–915. https://doi.org/10.1016/j.ijhcs.2008.07.001
Barley, S. R., Meyerson, D. E., & Grodal, S. (2011). E-mail as a source and symbol of
stress. Organization Science, 22(4), 887–906. https://doi.org/10.1287/orsc.1100.0573
Birnholtz, J., Bi, N., & Fussell, S. (2012). Do you see that I see? Effects of perceived visi
bility on awareness checking behavior. In Proceedings of the SIGCHI conference on hu
man factors in computing systems (pp. 1765–1774). Austin, TX: ACM.
Birnholtz, J., Guillory, J., Hancock, J., & Bazarova, N. (2010). “On my way”: Deceptive tex
ting and interpersonal awareness narratives. In Proceedings of the 2010 ACM conference
on computer supported cooperative work (pp. 1–4). Savannah, GA: ACM.
Birnholtz, J., Hancock, J., Smith, M., & Reynolds, L. (2012). Understanding unavailability
in a world of constant connection. Interactions, 19(5), 32.
Bittman, M., Brown, J. E., & Wajcman, J. (2009). The mobile phone, perpetual contact and
time pressure. Work, Employment and Society, 23(4), 673–691.
Page 18 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Boswell, W. R., Olson-Buchanan, J. B., Butts, M. M., & Becker, W. J. (2016). Managing “af
ter hours” electronic work communication. Organizational Dynamics, 45(4), 291–297.
Brown, B. & O’Hara, K. (2003). Place as a practical concern of mobile workers. Environ
ment and Planning A, 35(9), 1565–1587.
Cecchinato, M. E., Cox, A. L., & Bird, J. (2015a). Smartwatches: The good, the bad and
the ugly? In Proceedings of the 33rd annual ACM conference extended abstracts on hu
man factors in computing systems (pp. 2133–2138). Seoul: ACM.
Cecchinato, M. E., Cox, A. L., & Bird, J. (2015b). Working 9–5? Professional differences in
email and boundary management practices. In Proceedings of the SIGCHI conference on
human factors in computing system (pp. 3989–3998). Seoul: ACM.
Cecchinato, M. E., Cox, A. L., & Bird, J. (2017). Always on(line)? User experience of
smartwatches and their role within multi-device ecologies. In Proceedings of the 2017
CHI conference on human factors in computing systems (pp. 3557–3568). Denver, CO:
ACM.
Cecchinato, M. E., Fleck, R., Brid, J., & Cox, A. L. (2015). Online vs. Offline: Implications
for Work Identity. In CHI 2015 workshop: Between the lines: Reevaluating the online/of
fline binary (pp. 1–6). Seoul: ACM.
Cecchinato, M. E., Sellen, A., Shokouhi, M., & Smyth, G. (2016). Finding email in
(p. 317)
Cho, J., Ramgolam, D. I., Schaefer, K. M., & Sandlin, A. N. (2011). The rate and delay in
overload: An investigation of communication overload and channel synchronicity on iden
tification and job satisfaction. Journal of Applied Communication Research, 39(1), 38–54.
Church, K. & de Oliveira, R. (2013). What’s up with WhatsApp? Comparing mobile instant
messaging behaviors with traditional SMS. 15th international conference on human-com
puter interaction with mobile devices and services (pp. 352–361). Munich: ACM.
Clark, S. C. (2000). Work/family border theory: A new theory of work/family balance. Hu
man Relations, 53(6), 747–770.
Page 19 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Cousins, K. C. & Robey, D. (2015). Managing work-life boundaries with mobile technolo
gies. Information Technology & People, 28(1), 34–71.
Cox, A. L., Gould, S., Cecchinato, M. E., Iacovides, I., & Renfree, I. (2016). Design fric
tions for mindful interactions: The case for microboundaries. In CHI extended abstracts
on human factors in computing systems (pp. 1389–1397). San Jose, CA: ACM.
Crew, B. (2015). Sweden is shifting to a 6-hour work day. Retrieved February 18, 2018
from https://www.sciencealert.com/sweden-is-shifting-to-a-6-hour-workday
Dearman, D. & Pierce, J. S. (2008). It’s on my other Computer! Computing with multiple
devices. In Proceedings of the SIGCHI conference on human factors in computing sys
tems (pp. 767–776). Florence: ACM.
Dery, K., Kolb, D., & MacCormick, J. (2014). Working with connective flow: How smart
phone use is evolving in practice. European Journal of Information Systems, 23(5), 558–
570.
Diaz, I., Chiaburu, D. S., Zimmerman, R. D., & Boswell, W. R. (2012). Communication
technology: Pros and cons of constant connection to work. Journal of Vocational Behavior,
80(2), 500–508.
Dingler, T. & Pielot, M. (2015). I’ll be there for you: Quantifying attentiveness towards
mobile messaging. In Proceedings of the international conference on human-computer in
teraction with mobile devices and services (pp. 1–5). Copenhagen: ACM.
Dourish, P. (2006). Re-Space-ing place: “Place” and “Space” ten years on. In Proceedings
of the 2006 20th anniversary conference on computer supported cooperative work (pp.
299–308). Banff, AB: ACM.
Farnham, S. D. & Churchill, E. F. (2011). Faceted identity, faceted lives: Social and techni
cal issues with being yourself online. In Proceedings of the ACM conference on computer-
supported cooperative work (pp. 359–368). Hangzhou, China: ACM.
Fleck, R., Cox, A. L., & Robison, R. A. V. (2015). Balancing boundaries: Using multiple de
vices to manage work-life balance. In Proceedings of the ACM conference on human fac
tors in computing systems (pp. 3985–3988). Seoul: ACM.
Fortunati, L. (2002). The mobile phone: Towards new categories and social relations. In
formation, Communication & Society, 5(4), 513–528.
Gee, O. (2014). Swedes to give six-hour workday a go. The Local. Retrieved Febru
(p. 318)
Page 20 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Golden, A. G. & Geisler, C. (2007). Work-life boundary management and the personal digi
tal assistant. Human Relations, 60(3), 519–551.
Grant, M. J. & Booth, A. (2009). A typology of reviews: An analysis of 14 review types and
associated methodologies. Health Information and Libraries Journal, 26(2), 91–108.
Greenhaus, J. & Powell, G. N. (2006). When work and family are allies: A theory of work-
family enrichment. Academy of Management Review, 31(1), 77–92.
Grevet, C. (2014). Managing the work-home boundary in a BYOD (Bring Your Own De
vice) culture. In MobileHCI’14 workshop on socio-technical systems and work-home
boundaries (pp. 1–4). Toronto: ACM.
Hall, D. T. & Richter, J. (1988). Balancing work life and home life: What can organizations
do to help? Academy of Management Executive, 2(3), 213–223.
Harrison, S. & Dourish, P. (1996). Re-place-ing space. In Proceedings of the ACM confer
ence on computer supported cooperative work (pp. 67–76). Boston: ACM.
Heider, F. (1946). Attitudes and cognitive organization. The Journal of Psychology, 21(1),
107–112. https://doi.org/10.1080/00223980.1946.9917275
HSE (2017). Tackling work-related stress using the Management Standards approach
(Workbook). Health and Safety Executive. Retrieved February 18, 2018 from http://
www.hse.gov.uk/pubns/wbk01.htm
Jahn, K., Klesel, M., Lemmer, K., & Weigel, A. (2016). Individual boundary management:
An empirical investigation on technology-related tactics. In PACIS Proceedings (pp. 268–
280). Taiwan: AIS.
Kalman, Y. M. (2016). Why do we blame information for our overload? In D. I. Ballard &
M. S. McGlone (Eds.), Work pressures: New agendas in communication (pp. 45–62). New
York: Routledge.
Kalman, Y. M., Ravid, G., Raban, D. R., & Rafaeli, S. (2006). Pauses and response laten
cies: A chronemic analysis of asynchronous CMC. Journal of Computer-Mediated Commu
nication, 12(1), 1–23.
Karlson, A. K., Meyers, B. R., Jacobs, A., Johns, P., & Kane, S. (2009). Working overtime:
Patterns of smartphone and PC usage in the day of an information worker. In Internation
al conference on pervasive computing (pp. 398–405). Orlando, FL: ACM.
Page 21 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Kawsar, F. & Brush, A. (2013). Home computing unplugged: Why, where and when people
use different connected devices at home. In Proceedings of the 2013 ACM international
joint conference on pervasive and ubiquitous computing (pp. 627–636). Zurich: ACM.
Köffer, S., Anlauf, L., Ortbach, K., & Niehaves, B. (2015). The intensified blurring of
boundaries between work and private life through IT consumerization. In Proceedings of
the 23rd European conference on information systems (ECIS 2015) (pp. 1–17). Münster:
AIS.
Kossek, E. E., Baltes, B. B., & Matthews, R. A. (2011). How work-family research can fi
nally have an impact in organizations. Industrial and Organizational Psychology, 4(03),
352–369.
Kossek, E. E., Lautsch, B. A., & Eaton, S. C. (2006). Telecommuting, control, and bound
ary management: Correlates of policy use and practice, job control, and work–family ef
fectiveness. Journal of Vocational Behavior, 68(2), 347–367.
Kossek, E. E., Ruderman, M. N., Braddy, P. W., & Hannum, K. M. (2012). Work-
(p. 319)
Kreiner, G. E., Hollensbe, E. C., & Sheep, M. L. (2009). Balancing borders and bridges:
Negotiating the work-home interface via boundary work tactics. Academy of Management
Journal, 52(4), 704–730.
Matthews, T., Pierce, J., Road, H., Jose, S., & Tang, J. (2009). No smartphone is an island:
The impact of places, situation and other device on smart phone use. IBM RJ10452.,
10,452, 1–10.
Mazmanian, M. & Erickson, I. (2014). The product of availability: Understanding the eco
nomic underpinnings of constant connectivity. In Proceedings of the SIGCHI conference
on human factors in computing systems (pp. 763–772). Toronto: ACM.
Mazmanian, M., Orlikowski, W. J., & Yates, J. (2005). CrackBerrys: Exploring the social im
plications of ubiquitous wireless email devices. In Designing ubiquitous information envi
ronments: Socio-technical issues and challenges (pp. 337–343). Boston, MA: Springer.
Mazmanian, M., Yates, J., & Orlikowski, W. (2006). Ubiquitous email: Individual experi
ences and organizational consequences of Blackberry use. In Academy of Management
proceedings, Meeting abstract supplement, 1, D1–D6. Briarcliff Manor, NY 10510: Acade
my of Management.
Moen, P. (2011). From “work-family” to the “gendered life course” and “fit”: Five chal
lenges to the field. Community, Work, & Family, 14(1), 81–96.
Page 22 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Nardi, B. A., Whittaker, S., & Bradner, E. (2000). Interaction and outeraction: Instant
messaging in action. In Proceedings of the 2000 ACM conference on computer supported
cooperative work (pp. 79–88). Philadelphia, PA: ACM.
Nippert-Eng, C. (1996). Calendars and keys: The classification of “home” and “work.” So
ciological Forum, 11(3), 563–582.
Nouwens, M., Griggio, C. F., & Mackay, W. E. (2017). WhatsApp is for family, Messenger is
for friends: Communication places in app ecosystems. In Proceedings of the CHI confer
ence on human factors in computing systems (pp. 727–735). Denver, CO: ACM.
The NPD Group. (2017). Smartwatch ownership expected to increase nearly 60 percent
into 2019. Retrieved February 18, 2018 from https://www.npd.com/wps/portal/npd/us/
news/press-releases/2017/us-smartwatch-ownership-expected-to-increase-near
ly-60-percent-into-2019/
O’Hara, K. P., Massimi, M., Harper, R., Rubens, S., & Morris, J. (2014). Everyday dwelling
with WhatsApp. In Proceedings of the 17th ACM conference on computer supported coop
erative work & social computing (pp. 1131–1143). Baltimore, MA: ACM.
Oulasvirta, A., Petit, R., Raento, M., & Sauli, T. (2007). Interpreting and acting on mobile
awareness cues. Human-Computer Interaction, 22(October), 97–135.
Park, Y., Fritz, C., & Jex, S. M. (2011). Relationships between work-home segmentation
and psychological detachment from work: The role of communication technology use at
home. Journal of Occupational Health Psychology. 16(4), 457–467.
Patterson, D. J., Baker, C., Ding, X., Kaufman, S. J., Liu, K., & Zaldivar, A. (2008). Online
everywhere: Evolving mobile instant messaging practices. In Proceedings of the 10th in
ternational conference on ubiquitous computing (pp. 64–73). Seoul: ACM.
Pew Research. (2018). Demographics of mobile device ownership and adoption in the
United States. Pew Research Center. Retrieved February 18, 2018 from http://
www.pewinternet.org/fact-sheet/mobile/
Pielot, M., Church, K., & de Oliveira, R. (2014). An in-situ study of mobile phone
(p. 320)
Pyöriä, P. (2005). The concept of knowledge work revisited. Journal of Knowledge Man
agement, 9(3), 116–127.
Page 23 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Radicati Group. (2015a). Instant messaging statistics report, 2015–2019. Retrieved Feb
ruary 18, 2018 from https://www.radicati.com/wp/wp-content/uploads/2015/03/In
stant-Messaging-Statistics-Report-2015-2019-Executive-Summary.pdf
Radicati Group. (2015b). Mobile Statistics Report, 2015–2019. Retrieved February 18,
2018 from https://www.radicati.com/wp/wp-content/uploads/2015/02/Mobile-Statis
tics-Report-2015-2019-Executive-Summary.pdf
Rice, R. E. (2017). Flexwork, boundaries, and work-family conflicts: How ICTs and work
engagement influence their relationship. In G. Hertel, D. Stone, R. D. Johnson, & J. Pass
more (Eds.), Handbook of the psychology of the internet at work (pp. 175–193). London,
UK: Wiley Blackwell Industrial & Organizational Psychology Series.
Rice, R. E., Evans, S. K., Pearce, K. E., Sivunen, A., Vitak, J., & Treem, J. W. (2017). Orga
nizational media affordances: Operationalization and associations with media use. Journal
of Communication, 67(1), 106–130.
Roche, H. G. (2015). Managing work and life: The impact of framing. Unpublished Ph.D.
Dissertation. Seattle Pacific University. http://digitalcommons.spu.edu/iop_etd/4/
Shen, J., Brdiczka, O., & Ruan, Y. (2013). A comparison study of user behavior on Face
book and Gmail. Computers in Human Behavior, 29(6), 2650–2655.
Specht, B. (2018). The 2017 email client market share [Infographic]. Litmus Software,
Inc. Retrieved February 19, 2018 from https://litmus.com/blog/the-2017-email-client-
market-share-infographic
Stuart, K. (2014). German minister calls for anti-stress law ban on emails out of office
hours|Technology. The Guardian. Retrieved February 18, 2018 from https://
www.theguardian.com/technology/2014/aug/29/germany-anti-stress-law-ban-on-
emails-out-of-office-hours
Sturges, J. (2012). Crafting a balance between work and home. Human Relations, 65(12),
1539–1559. https://doi.org/10.1177/0018726712457435
Williams, K. J., Suls, J., Alliger, G. M., Learner, S. M., & Wan, C. K. (1991). Multiple role
juggling and daily mood states in working mothers: An experience sampling study. Journal
of Applied Psychology, 76(5), 664–674.
Marta E. Cecchinato
Page 24 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Boundary Management and Communication Technologies
Anna L. Cox
Page 25 of 25
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.11
One of the most significant recent technological developments concerns the application of
intelligent machines to jobs that up to now have been considered safe from automation.
These changes have generated considerable debate regarding the impacts that the wide
spread adoption of intelligent machines could have on the nature of work. This chapter
provides a thematic review, across multiple academic disciplines, of the current state of
academic knowledge regarding the impact of intelligent machines on knowledge and ser
vice work. Adopting a work-practice perspective, the chapter reviews the extant litera
ture concerning changing relations between workers and intelligent machines, the adop
tion and acceptance of intelligent machines, and ethical issues associated with greater
machine human collaboration. A key finding is that much of the research discusses intelli
gent machines complementing and extending human capabilities rather than removing
humans from work processes. The concept of augmentation of humans and human work,
rather than wholesale replacement from automation, flows through the literature across a
range of domains. The chapter concludes with a discussion of the main gaps in existing
knowledge and ways in which future research may provide a deeper understanding of
how people (currently and in the near future) experience intelligent machines in their
day-to-day work practice. These include the need for multi-disciplinary research, the role
of contexts, the need for more and better empirical research, the changing relationships
between humans and intelligent machines, the adoption and acceptance of the technolo
gy, and ethical issues.
Keywords: augmentation, automation, ethical issues, human work, intelligent machines, machine human collabo
ration, work-practice perspective
Introduction
ONE of the most significant recent technological developments concerns the application
of intelligent, interactive, and highly networked machines to jobs that up to now have
been considered safe from automation. These “intelligent machines” are characterized by
Page 1 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
autonomy, the ability to learn, and the ability to interact with other systems and with hu
mans. They draw on new advances in technologies such as artificial intelligence (AI) and
robotics, enabling them to undertake tasks that could previously only be completed by hu
man workers. We define and describe intelligent machines in detail in the following sec
tion. Referring to what some have called the second machine age, analysts and commen
tators have forecast mass unemployment from the automation of a wide range of pre
dictable, repetitive job roles (Brynjolfsson & McAfee, 2016). What sets this change apart
from previous technological revolutions, such as the automation of factory work in the
19th century, is the potential of intelligent machines to affect dramatic changes to the de
mand for skill-intensive, knowledge-based workers (Loebbecke & Picot, 2015). However,
there is considerable debate regarding the likely impacts of intelligent machines on work.
For example, Frey and Osborne (2017) suggest that as much as 47% of jobs in the United
States economy could be eliminated from widespread (p. 345) implementation of machine
learning and mobile robotics over the next one to two decades. The Bank of England pub
lished a report in 2015 suggesting that almost half of United Kingdom jobs (about 15 mil
lion) could be lost to automation and AI technologies. By contrast, Arntz et al. (2016)
found that only 9% of jobs were potentially automatable in Organization for Economic Co-
operation and Development (OECD) economies.
In order to explore the transformational effects of intelligent machines (such as AI and ro
botics), rather than capturing technological applications that are relatively mature (such
as those of robots in manufacturing contexts (Dorf & Kusiak, 1994; Khouja & Offodile,
1994), the review is focused upon service and knowledge work. Several authors have not
ed that service and knowledge work has traditionally been safe from automation (for ex
ample, compared to manufacturing) but have identified that recent intelligent machine
developments now threaten to erode many of these jobs (Brynjolfsson & McAfee, 2016;
Davenport & Kirby, 2016). Unlike the manufacturing sector, the service sector produces
intangible goods that may refer to a wide range of services in a variety of areas, including
finance and commerce, government, transportation, health care and social assistance,
tourism, arts, entertainment, and science. The growing size and importance of the service
(and knowledge) sector, in comparison to agriculture and manufacturing, is a trend that
has been occurring since the late 1970s in most developed economies. This idea links to
and builds from Daniel Bell’s vision of an information/knowledge society that was initially
articulated in the early 1970s (Bell, 1973). Knowledge work is formally defined as work
Page 2 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
that is intellectual, creative, and non-routine and that involves the use and creation of
knowledge (Hislop, Bosua, & Helms, 2018) and workers labelled as “symbolic
analysts” (Reich, 1991). The knowledge sector (that partially overlaps with the service
sector) is generally associated with work involving a great deal of research and develop
ment activities and the creation of innovative products. In a broader sense, the knowl
edge sector may refer to professional areas such as information and communication, con
sulting, pharmacology, and education (Kuusisto & Meyer, 2003). Thus, from an occupa
tional perspective, this chapter considers all forms of non-manual work, including white-
collar office and administrative work, service work and what can be labelled knowledge
work.
The chapter is organized as follows. First the notion of intelligent machines and the dif
ferent types of technologies that may be considered under this term are discussed. The
approach and procedures adopted to undertake the literature review are then (p. 346) ex
plained. The subsequent section presents the findings of the review. An overview of the
nature of the literature sample is provided, followed by a discussion of the three main
themes that emerged: human relations with intelligent machines; adoption and accep
tance of intelligent machines; and ethical issues associated with machine-human collabo
ration. The chapter concludes with a review of the key gaps in the existing literature and
suggestions for future research directions.
Artificial Intelligence
Several authors have acknowledged that it is difficult to define AI (DeCanio, 2016). For
example, it is possible to make a distinction between strong AI (or Artificial General Intel
ligence) and weak AI (or Artificial Narrow Intelligence; Bostrom & Yudkowsky, 2011).
Strong AI implies a system that has superhuman intelligence and at present remains a fic
tional aspiration. Weak AI describes AI in terms of being able to complete specific tasks
Page 3 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
that require single human capabilities such as visual perception or probabilistic reason
ing. In these tasks, AI can considerably outperform human capabilities. However, AI re
mains unable to make ethical decisions or manage social situations. In other words, weak
AI refers to the ability to complete the specific tasks that humans do rather than replicat
ing the way humans actually think (Hengstler, Enkel, & Duelli, 2016).
Despite these complexities, several authors have proposed definitions of AI. AI has been
defined as the development of computers to engage in human-like thought processes such
as learning, reasoning, and self-correction (Dilsizian & Siegel, 2014). (p. 347) Building on
the cognitive aspect, DeCanio (2016, p. 280) describes AI as a “broad suite of technolo
gies that can match or surpass human capabilities, particularly those involving cogni
tion.” Niu et al. (2016, p. 2) add that AI “aims to understand the essence of intelligence
and design intelligent machines that can act as human behavior.” Others have empha
sized the superiority of human intelligence over AI. For example, the computer scientist
Larry Tesler described human intelligence as “whatever machines haven’t done
yet” (Friend, 2018). All these definitions highlight the role of AI in modelling human be
havior and thought, but do not go as far as to talk about using AI technologies to build
other smart technologies.
AI may be presented in various forms such as natural language processing, affective com
puting systems, virtual reality (avatars), or humanoid and non-humanoid robots (e.g., Lux
ton, 2014). Johnson (2014) introduces the term “artificial agent” (AA) that refers general
ly to computational devices performing tasks on behalf of humans autonomously (i.e.,
without immediate, direct human control or intervention from humans). Some AAs are
software programs (e.g., bots undertaking Internet searches). A more advanced example
of such a system is Robotic Process Automation (RPA), a software solution (essentially a
software license) configured to do administrative work previously undertaken by humans.
RPA is suited to automating a process in which a human takes in many electronic data in
puts, processes these data using rules, adds data, and then enters this new information
into another system, such as an enterprise or customer relationship management system
(Willcocks, Lacity, & Craig, 2015).
Robots
A traditional view of robots that would be familiar to popular culture concerns service ro
bots. Those are robots that provide assistance to a human to complete a physical task,
such as scrubbing, cleaning, sorting, packaging instruments, and sending them for steril
ization for dentists (Chen, 2013); helping an elderly person pour a liquid (Xu, Tu, He, Tan,
& Fang, 2013); providing an intelligent interactive assistant for an office environment
(Wang et al., 2013), or serving meals in a restaurant (Yu et al., 2012). The goal of these ro
bots is to provide autonomous assistance to humans in undertaking these tasks but with
out the need for specific human guidance. By contrast, robot-assisted surgery concerns
the use of a human controlled robot to perform surgical procedures that result in less in
vasive procedures than those undertaken by human surgeons alone. The robotic system
(for example the Da Vinci robotic system) provides a three-dimensional view, hand-tremor
Page 4 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
filtering, fine dexterity, and motion scaling and are suitable for narrow, inaccessible oper
ative areas (Zaghloul & Mahmoud, 2016).
Moreover, some robots involve a human-machine interaction that resembles the interac
tion between humans. These are robots that are no longer confined to factories but are
specifically designed to interact with people in urban contexts. They are referred to as
“social robots” (Torras, 2015). Social robots may replace receptionists or shop assistants
in shopping malls, interact with elderly people or clinical patients, and even act as
(p. 348) support teachers and nannies (e.g., Calo et al., 2011; Torras, 2015). Most recent
The titles and abstracts from all 1581 items were reviewed. Items were excluded if they
were purely technical papers concerned with engineering and design issues related to the
Page 5 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
technologies examined, or they were not focused on the application of the selected tech
nologies in the context of service and knowledge work (i.e., studies focused purely on
manufacturing were excluded). While undertaking this reviewing of items identified via
the primary searches, a number of secondary items were identified for inclusion in the
study population. These were identified primarily via the abstracts and reference lists of
the primary search items, where additional, widely cited sources were identified. (p. 349)
After these additional steps were completed, the total number of sources identified for re
view and in-depth coding was 219.
The thematic synthesis was undertaken by all of the project team, with each team mem
ber being allocated a roughly equal proportion of papers to read. The thematic synthesis
of our review involved the creation of standardized summaries for each source that iden
tified the year of publication, whether it was a journal article or conference paper, the
context of the research, technology type, level of analysis (work practice, organizational
or societal), research method, topic areas, and key findings. For the purposes of this
chapter, we used the level of analysis categorization to extract items that focused on in
telligent machines at the work practice level, resulting in a subsample of 84 publications.
(Only those cited in this chapter are included in the References section; the Appendix
lists all 84 references). During the in-depth coding, we identified several topic areas relat
ed to the impacts of intelligent machines on (service or knowledge) work. We discussed
each of these topic areas and classified them into three broad categories: human rela
tions with intelligent machines, adoption and acceptance of intelligent machines, and eth
ical issues associated with machine-human collaboration.
Before presenting the findings, it is useful to give an overview of the analyzed sample.
Peer reviewed papers made up 79% of the sample, conference papers constituted 19%,
and the remaining 2% of sources were working papers. Just over half (54%) of the
sources were based on empirical studies, with the remainder either narrative discussions
of selected literature and conceptual papers (31%) or thought-leading articles (13%). The
embryonic nature of knowledge on the issues examined here is further reinforced by the
method of data used in the empirical studies: the most common empirical methods (35%)
were a “proof of concept” experiment, with case studies and survey research accounting
for 25% and 23%, respectively. Much of the reviewed research was undertaken in the
Sciences with Engineering and Technology (18%), Medicine, Dentistry, and Allied Health
(15%), Computer Science (14%), and Behavioral Sciences (13%), contributing 60% of the
sources. Social Sciences contributed a more modest 32% of the research literature, sug
gesting that current studies have been techno-centric in their focus and that a wider so
cial-centric view is presently lacking. The following sections discuss the three main
themes that emerged.
Page 6 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Several studies have documented examples of humans using robots to complement and,
in some cases, extend their abilities to complete specific social interaction tasks. The ma
jority of these studies have been undertaken in health or social care settings.
For example, Huijnen, Lexis, Jansens, and de Witte (2016) discuss the use of hu
(p. 350)
manoid robots to interact with children with autism spectrum disorders (ASD). Following
a systematic review of the literature and focus groups with 53 ASD professionals, they re
port that a range of different humanoid robots had been found to be an effective aid for
supporting health care professionals interviews with children with ASD, because the ro
bot provides more predictable and clearly defined cues compared to human-to-human in
teraction. Huijnen et al. (2016) observe that the most common use of the robot was
through remote-control in which an ASD professional operates the behavior of the robot,
rather than a fully autonomous robot. Therefore, the ASD professional is needed to read
the social situation with the child and control the robot accordingly. Interestingly, Huijnen
et al. (2016) add that this approach also creates an additional increase in workload on the
professional, and that often additional technical personnel are required to operate the ro
bot.
Khosla et al. (2013) reported on three field trials of Matilda, a human-like affective com
munication (service and companion) robot in care homes for the elderly in Australia. The
robot combines human communication tools (e.g., speech recognition) with artificial intel
ligence programs (e.g., emotionally intelligent, persuasive, diet suggestion dialog sys
tem). They found that the robot had the potential to increase the capacity of care homes
to provide care and also improve the well-being of the elderly. For example, the elderly
residents were keen for Matilda to participate in group activities and play games like Bin
go and Hoy with them. Normally, a care worker would be required to be involved with
calling the numbers for these games. However, Khosla et al. (2013) report that the resi
dents did not miss the care giver that would normally have led the game. The researchers
also refer to one of the residents performing a spontaneous clap and dance after winning
the game, as evidence of improved well-being. However, although a care worker is no
longer needed to perform the bingo calling task, the caregivers are free to complete addi
tional care tasks, as well as deciding when to introduce and remove Matilda from the care
environment and also monitoring the interaction between elderly residents and the robot.
Page 7 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
vice, or Robotized Stereotactic Assistant) in pediatric neurosurgery improves safety and
reduces intrusiveness of procedures. The ROSA system is composed of a compact robotic
arm and a touch screen, mounted on a mobile trolley for surgical procedures involving
the head of the patient. The surgeon can either supervise as the robot performs au
tonomously or directly control the surgical instrument during the procedure. The ROSA
system combined human decision making with the accuracy of machine technology by im
proving ergonomics, visualization, and the haptic ability of the surgeon. However, again,
the example illustrates that the surgeon works alongside the robot, either supervising or
controlling the robot, rather than being replaced by the machine.
An interesting vein of research is focusing on how workers collaborate with advanced ro
bots in hybrid robot/worker teams. Schwartz, Krieger, and Zinnikus (2016) describe the
conceptual organization of a hybrid team consisting of humans, robots, virtual charac
ters, and softbots that combine artificial intelligence and robotics. They believe that a key
challenge in establishing such hybrid teams is establishing intuitive interfaces between
humans that typically usually use speech, gestures and facial expressions to transfer in
formation, and intelligent machines that can use data streams to communicate with the
system and other artificial team members. They add that the development of (robotic)
team-competencies is also necessary to determine a suitable balance between au
tonomous behaviors of individual machines and coordinated teamwork. In experiments,
Gombolay et al. (2015) found that when people work with robots they may actually allo
cate more work to themselves than to their robot co-worker because of their preferences
for completing particular tasks, such as assembling compared to fetching. It was also
found that people attribute greater value to human team members in comparison to robot
team members. However, greater robot-autonomy positively affected the participants’ de
sire to work with the robot again.
In an experimental study, Mubin et al. (2014) investigated the role of a robot assistant in
office meetings. They constructed a hypothetical scenario of selecting a suitable job can
didate with human subjects acting as members of a selection panel tasked with achieving
agreement consensus regarding the most suitable candidate. The robot assistant was re
motely controlled and was either dynamic and interactive (e.g., reminding the subjects
that success would lie in sharing information), or passive (e.g., the robot would only inter
act when requested by the human subjects). Mubin et al. (2014) found that the human
subjects preferred the more interactive robot as a partner in meetings compared to the
passive robot, but also that the human subjects interacted with each other more than
they did with the robot. They concluded that humans might be willing to engage and in
teract with, and even receive guidance from, a robot in the form of an active assistant,
but not as a replacement for the human partner.
In sum, these studies provide several examples of AI and robots working in collaboration
to enhance the working practices of knowledge and service workers. These intelligent
machines appear to be assisting and augmenting existing work practices, in some cases
Page 8 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
replacing a small routine and repetitive task: for example, the ASD professional using a
robot as an advanced form of ventriloquist dummy to interview child patients, the care
worker no longer acting as bingo caller, and the surgeon being able to perform more pre
cise surgical procedures. In these situations, the intelligent machine appears to be seen
as a helpful additional aid to complete tasks in knowledge and service work. The intelli
gent machine is welcome in teams when the working circumstances allow people to take
on a proportionate amount of work in line with their task preferences (Gombolay et al.,
2015; Schwartz et al., 2016), and it does not add extra responsibility, such as monitoring
the robot’s work, to the human team members.
Machines
Following on from the exploration of human relations with robots, the adoption and ac
ceptance of intelligent machines in practice has been researched most extensively in the
health care and transport sectors. It has been suggested that the logistics of using robot
ic surgery, investment of time, and storage of bulky equipment may influence the adop
tion of the technologies, especially as it is deemed more expensive to run (Sananès et al.,
2011). Sananes et al. (2011) argue that when there are operating theatres dedicated to
robotic surgery, some of these logistical problems will no longer be an issue. In other cas
es, the technology requires less physical management. For example, Robotic Process Au
tomation (RPA) is a software solution (essentially a software license) configured to do the
work previously undertaken by humans, for example, structured tasks associated with
validating the sale of insurance premiums, generating utility bills, creating news stories,
paying health care insurance claims, and keeping employee records up to date (Willcocks
et al., 2015). Other robots have rather more modest aspirations: Nielsen et al. (2016)
found that robots being used to perform mundane tasks such as vacuuming were well re
ceived by managers in care home settings, mainly within the context of trying to modern
ize care of the elderly. The vacuum cleaners were viewed by managers as affordable and
effective. However, clients held mixed views towards robot vacuum cleaning—some not
happy with quality of cleaning or the reduction of contact with staff, whilst others enjoyed
the “on-demand” nature of vacuuming.
Over and above the practical issues of adoption, a clear factor for acceptance of AI and
robots is trust. Trust in the technology was reported as important for air traffic con
trollers’ willingness to accept increased levels of automation in two hypothetical scenar
ios (Bekier, Molesworth, & Williamson, 2011) and trust was also identified as important
for the human acceptance of AI enabled autonomous cars (Hengstler et al., 2016). Find
ings of a study by Kolbjørnsrud et al. (2017) show that managers have mixed feelings
about AI, and that top managers are more enthusiastic than mid/front-line managers.
When asked if they are comfortable with AI monitoring and evaluating their work, partici
Page 9 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
pants’ responses again became more negative lower in the management hierarchy. Kolb
jørnsrud et al. (2017) hint that this may be due to apprehension about the threat of job
losses as a result of AI implementation, although the study does not explicitly explore
what underpins these differences. It is possible to make distinctions between fostering
trust and enhancing confidence, as suggested by Pieters’ (2011) study on cyber security
and AI. There, system users’ trust was fostered through explanations about the security
and processes of the system (thus requiring an opening of the “black box”), and (p. 353)
confidence was enhanced through explanations about the validity of the decisions them
selves (here the “black box” can remain closed).
Cultural differences to AI were also noted, with managers in emerging economies (e.g. In
dia, China and Brazil) more open to the technology (Kolbjørnsrud et al., 2017). Some sug
gest that, where appropriate, unions should be involved in consultations regarding the
implementation of AI and robots. Further, the variability of the manual system and work
practices should be fully understood by the integrator before the automated system is im
plemented (Charalambous, Fletcher, & Webb, 2015). It is also advised that in order to en
hance trust in these new technologies, more support should be given to employees as
their roles change from being workers to becoming supervisors of automated processes
(Charalambous et al., 2015).
In sum, the findings of the literature in this area suggests that to facilitate the adoption
and acceptance of intelligent machines it is necessary to create a suitable workplace envi
ronment, in terms of physical configuration and design. Top managers wishing to adopt
intelligent machines may need to convince less senior managers that the implementation
of AI or robotics will lead to positive change. In particular, less senior managers are likely
to be concerned about worker fears regarding the loss of tasks and ultimately jobs, or
about role changes. For example, service workers such as cleaners may see the introduc
tion of robot vacuum cleaners as a threat to their long-term job security or may be appre
hensive regarding new role expectations of having responsibility for checking and moni
toring robot vacuum cleaner performance. There may also be a need for managers to pro
vide support to knowledge workers to adjust to working with and following decision sup
port provided by intelligent machines, such as supporting air traffic controllers’ develop
ment of trust in AI decision making for choosing aircraft flight patterns. Again, changes in
work roles and responsibilities may be a crucial area to be agreed regarding critical task
outcomes. If the new AI system for aircraft flight control recommends an incorrect deci
sion that the air traffic controller implements, where does the responsibility for this deci
sion reside? These types of ethical issues are considered in the followings section.
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
ical, psychological, and social boundaries between machines and humans will be. For ex
ample, robots will be “looking” after clinical patients, educating students, and making
complex financial or security decisions (e.g., Luxton, 2014; Torras, 2015). While the expe
rienced and anticipated benefits of these technologies for (p. 354) individuals, organiza
tions and societies are apparent (e.g., Calo et al., 2011; Luxton, 2014), rapid technologi
cal developments in this area may also posit some serious risks. For example, using simu
lations for patients with delusional or psychotic psychopathologies in the absence of care
ful monitoring may put the health of these patients at a great risk (Luxton, 2014). Torras
(2015) warns about potential negative impacts of robot nannies on children’s psychologi
cal development. For instance, how could a robot achieve a balance between protecting a
child from danger and restricting his/her freedom (hence, affecting the child’s develop
ment to become mature and autonomous)? Such progressing interactions between ma
chines and humans are psychologically complex and evoke some important ethical ques
tions. Thus, a robust ethical strategy that will ensure the safe use of advanced technolo
gies becomes an imperative (e.g., Luxton, 2014; Torras, 2015). The following paragraphs
present two key emerging themes associated with intelligent machine-related ethical is
sues in a work context; safety and risks during human-machine relations, and responsibil
ity and accountability for intelligent machines.
Page 11 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Hence, the related ethical issue here is not so much about whether, but how, to use intelli
gent machines.
Luxton (2014) emphasizes the importance of competency levels of the AICPs users for
avoiding putting patients at risk. Competency refers to both the design and ethical use of
intelligent machines. Increased complexity of AI systems causes greater difficulty in the
prediction and interpretation of machine behaviors and, therefore, presents higher risks
for the humans’ safety (e.g., Friend, 2018). Also, with the evolution of intelligent ma
chines the boundaries between the role of humans and machines may become less clear
and, therefore, more difficult to manage (Bostrom & Yudkowsky, 2011; Johnson, 2014). In
addition, when large numbers of people have been involved in the design and use of intel
ligent machines, it is not always obvious who the responsible individuals are. Examples in
this area refer to a variety of sectors including scenarios about the use of robotic health
care assistants, autonomous vehicles, AI in banking and commerce, etc. (e.g., Luxton,
2014; Torras, 2015). Both scientists and practitioners have vigorously argued about who
should take responsibility, and at what point, for the (potential) negative consequences of
the applications of intelligent machines (e.g., Johnson, 2014). One point upon which most
authors agree is that the ultimate responsibility should lie with the human stakeholders
(i.e., machine designers, manufacturers, implementers, and users (e.g., Luxton, 2014).
In sum, literature suggests that the transition of intelligent machines into the domain of
knowledge and service work, a domain that had been solely the purview of humans, may
present a number of ethical challenges, such as avoiding the creation of Turing (p. 356)
Page 12 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Deceptions at the work practice level. The studies provide examples of situations where
such problems arise with human patients anthropomorphizing AI simulated psychothera
pists or therapy robots such as Paro. Researchers argue that it will be important to focus
on the transparency of information in intelligent machines and whether a human or ma
chine is making the decisions. This transparency also has important implications for re
sponsibility and accountability debates regarding knowledge and service work. As knowl
edge and service work becomes more augmented by intelligent machines and the bound
aries of tasks and roles blur, decisions about responsibility and accountability will become
even more complex.
The previous sections have described three key themes that emerged from the literature
review regarding how intelligent machines may change knowledge and service work. In
the following section we present an agenda for research in these areas.
Cross-cutting Requirements
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
namics in hybrid teams (e.g., Schwartz et al., 2016; Gombolay et al., 2015) raises ques
tions about how humans team/co-work with intelligent machines, in relation to decision-
making authority over scheduling decisions. While there is an extensive body of literature
of human-computer interaction, future research needs to examine in rich detail the na
ture of this dynamic, in ways which take account of ongoing technological developments
in AI systems to communicate via increasingly human-like speech etc. The more human-
like these systems become, the greater the implications for human-technology dynamics
and interactions.
Empirical research. While this review has focused on empirically grounded analysis, the
majority of the current academic literature on these issues proposes theoretical models
or laboratory proof of concept experiments of intelligent machines rather than offering
empirical evidence. In the future, research should move on to more empirical exploration
of the context-specific issues. Given the complex nature of the topic, we recommend a
mixed-method approach involving the use of both qualitative and quantitative research
designs (e.g., experiments, real-time measurements, stakeholder surveys, focus groups,
case studies, system-collected usage data). For example, the theme on the adoption and
acceptance of these technologies highlighted the importance of human/user trust in tech
nology for its implementation and use to be effective. Arguably, something like a longitu
dinal, mixed-methods, case study-based approach has the ability to capture data on how
the attitudes and trust levels of different stakeholders (managers, IT staff, users etc.), dy
namically evolve during the implementation and use of AI systems.
real-life case studies (rather than in experimental settings) would offer crucial insights in
to the relationships between robots and humans in the workplace, which may discover in
teresting examples of how intelligent machines are assimilated and/or subverted in prac
tice. Being sensitive to the idea of “subversion via practice” is important, as the way any
Page 14 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
technology is used and appropriated is often different from how it is designed, with user
adaptation having significant implications for technology use (Beaudry & Pinsonneault,
2005). Thus, with the implementation and use of any form of AI, or advanced robotics, ac
count needs to be taken of this, which can only be done via in-depth qualitative studies,
which are sensitive to the micro-level subtleties of user behavior and intention. Aiming to
include a range of case studies from different countries, sectors, and organization sizes
would also enable research to begin unpacking some of the contextual factors that have
only been hinted at so far.
Investigating the adoption and acceptance of intelligent machines. Much of the re
search in this review discusses intelligent machines in terms of complementing and ex
tending human capabilities rather than removing humans from work processes. The con
cept of augmentation of humans and human work in a range of ways, rather than whole
sale replacement from robotized job automation, flows through the literature across a
range of domains (Davenport & Kirby, 2016). However, future research needs to better
account for the “multi-layered” nature of the work that humans carry out and where au
tomation fits. For example, the case of robot assisted surgery (e.g., De Benedictis et al.,
2017; Sananès et al., 2011) represents an important and interesting context where AI and
to robotics are augmenting the work of surgeons. Future research needs to examine, in a
fine-grained way, the diverse ways in which surgical work is changed, where some as
pects/roles/tasks may remain unchanged, and while others are radically transformed. To
gain a more accurate understanding of these issues a large-scale cross-country survey
study on experiences with implementation, trust issues, and feelings of confidence might
be a suitable research strategy. The inclusion of participant employment information with
regard to contract types, level, and job role would also help to find out more about how
users’ position in organizational hierarchies shapes their experiences with innovative
technologies in the workplace.
the current literature presents only a few examples of early attempts to create AI-related
legal and policymaking frameworks (Bryson, 2016). Zeng (2015) highlights that current
legislation refers mostly to low-tech technologies, leaving advanced AI systems unregulat
ed. Consequently, the legal and policymaking approaches to AI ethics are reactionary
(i.e., triggered sporadically by accidents that occur) rather than holistic (i.e., generally
Page 15 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
preventative; Ambrose, 2014). Further research that examines how legal and policy deci
sions are debated, agreed and implemented is needed to understand how different soci
eties are responding to the challenges and opportunities intelligent machines present for
knowledge and service work. Research that compares the emerging policy responses and
regulatory systems proposed by different national governments may provide valuable in
sights regarding ethical concerns related to the adoption of intelligent machines.
Conclusion
The evidence so far, such as it is, suggests that intelligent machines (here, AI and robots)
are augmenting what people are doing and enabling some degree of role expansion for
employees. Key questions are still open and require further analysis based on evidence of
how intelligent machines are being developed and implemented in practice, and how
workers and humans interacting with these machines experience these changes. Howev
er, it is important to keep in mind that workers, organizations, governments, and society
have the power to shape the future use of these new technologies. The future is mal
leable, but it is up to us to be pro-active in shaping it.
Acknowledgments
Funding Acknowledgement and Disclaimer: The Chartered Institute of Personnel and De
velopment (CIPD) funded the initial data collection for this study. The views expressed are
those of the authors and not necessarily those of the CIPD.
References
Ambrose, M. L. (2014). The law and the loop. In IEEE international symposium on ethics
in science, technology and engineering, ETHICS 2014. Chicago. http://doi.org/10.1109/
ETHICS.2014.6893374
Arntz, M., Gregory, T., & Zierahn, U. (2016). The risk of automation for jobs in OECD
countries: A comparative analysis (No. 189). Retrieved from www.oecd.org/els/working
papers
Bekier, M., Molesworth, B. R., & Williamson, A. (2011). Defining the drivers for accepting
decision making automation in air traffic management. Ergonomics, 54(4), 347–356.
http://doi.org/10.1080/00140139.2011.558635
(p. 360) Bell, D. (1973). The coming of post-industrial society. Harmondsworth: Penguin.
Page 16 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Bostrom, N., & Yudkowsky, E. (2011). The ethics of artificial intelligence. In K. Frankish &
W. Ramsey (Eds.), Cambridge handbook of artificial intelligence (pp. 1–20). New York:
Cambridge University Press. http://doi.org/10.1016/j.mpmed.2010.10.008
Brynjolfsson, E., & McAfee, A. (2016). The second machine age—work, progress, and
prosperity in a time of brilliant technologies. New York and London: WW Norton & Co.
Bryson, J. J. (2016). Patiency is not a virtue : Intelligent artefacts and the design of ethical
systems. In Association for the Advancement of Artificial Intelligence (pp. 1–18). Phoenix.
Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.299.5725
Burkhard, H.-D. (2013). Let the machines do. How intelligent is artificial intelligence? In
36th international convention on information and communication technology, electronics
and microelectronics (MIPRO) (pp. 947–952). Opatija.
Calo, C. J., Hunt-Bull, N., Lewis, L., & Metzler, T. (2011). Ethical implications of using the
Paro robot with a focus on dementia patient care. In Association for the Advancement of
Artificial Intelligence workshop (Vol. WS-11–12, pp. 20–24). San Francisco, CA. Retrieved
from http://www.scopus.com/inward/record.url?eid=2-
s2.0-80,054,913,481&partnerID=40&md5=cf9ad1b74f81299aa3f48be4f8e9700f
Charalambous, G., Fletcher, S., & Webb, P. (2015). Identifying the key organisational hu
man factors for introducing human-robot collaboration in industry: An exploratory study.
International Journal of Advanced Manufacturing Technology, 81(9–12), 2143–2155.
http://doi.org/10.1007/s00170-015-7335-4
Chen, L. (2013). The application of robots and eye tracking devices in a general dentist’s
clinic. In IEEE third international conference on consumer electronics (pp. 5–7). Berlin.
Davenport, T. H., & Kirby, J. (2016). Only humans need apply: Winners and losers in the
age of smart machines. New York: Harper Business.
De Benedictis, A., Trezza, A., Carai, A., Genovese, E., Procaccini, E., Messina, R., … Mar
ras, C. E. (2017). Robot-assisted procedures in pediatric neurosurgery. Neurosurgical Fo
cus, 42(5), 1–12. http://doi.org/10.3171/2017.2.FOCUS16579
Dilsizian, S. E., & Siegel, E. L. (2014). Artificial intelligence in medicine and cardiac imag
ing: Harnessing big data and advanced computing to provide personalized medical diag
nosis and treatment. Current Cardiology Reports, 16(441), 1–8. http://doi.org/10.1007/
s11886-013-0441-8
Dogan, E., Chatila, R., Chauvier, S., & Evans, K. (2016). Ethics in the design of automated
vehicles: The AVEthics project. In 1st workshop on ethics in the design of intelligent
agents (pp. 1–6). The Hague.
Page 17 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Dorf, R. C., & Kusiak, A. (1994). Handbook of design, manufacturing, and automation.
London and New York: Wiley.
Frey, C. B., & Osborne, M. A. (2017). The future of employment: How susceptible are jobs
to computerisation? Technological Forecasting and Social Change, 114, 254–280. http://
doi.org/10.1016/J.TECHFORE.2016.08.019
Friend, T. (2018, May). How frightened should we be of A.I.? The New Yorker, 1–19. Re
trieved from https://www.newyorker.com/magazine/2018/05/14/how-frightened-
should-we-be-of-ai
Gombolay, M. C., Huang, C., & Shah, J. A. (2015). Coordination of human-robot teaming
with human task preferences. In AAAI Fall symposium series on AI-HRI. Arlington.
Hengstler, M., Enkel, E., & Duelli, S. (2016). Applied artificial intelligence and
(p. 361)
trust: The case of autonomous vehicles and medical assistance devices. Technological
Forecasting and Social Change, 105, 105–120. http://doi.org/10.1016/j.techfore.
2015.12.014
Hislop, D., Bosua, R., & Helms, R. (2018). Knowledge management in organisations: A
critical introduction (4th ed.). Oxford: Oxford University Press.
Huijnen, C. A. G. J., Lexis, M. A. S., Jansens, R., & de Witte, L. P. (2016). Mapping robots
to therapy and educational objectives for children with autism spectrum disorder. Journal
of Autism and Developmental Disorders, 46(6), 2100–2114. http://doi.org/10.1007/
s10803-016-2740-6
Khangura, S., Konnyu, K., Cushman, R., Grimshaw, J., & Moher, D. (2012). Evidence sum
maries: The evolution of a rapid review approach. Systematic Reviews, 1(1), 10. http://
doi.org/10.1186/2046-4053-1-10
Khosla, R., Chu, M. T., & Nguyen, K. (2013). Affective robot enabled capacity and quality
improvement of nursing home aged care services in Australia. In IEEE 37th annual com
puter software and applications conference workshops (pp. 409–414). Kyoto. http://
doi.org/10.1109/COMPSACW.2013.89
Khouja, M., & Offodile, 0 Felix. (1994). The industrial robots selection problem: Litera
ture review and directions for future research. IIE Transactions, 26(4), 50–61. http://
doi.org/10.1080/07408179408966618
Kinne, E., & Stojanov, G. (2014). Grounding drones’ ethical use reasoning. In Association
for the Advancement of Artificial Intelligence (pp. 231–235). Québec City.
Page 18 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Kolbjørnsrud, V., Amico, R., & Thomas, R. J. (2017). Partnering with AI: How organiza
tions can win over skeptical managers. Strategy & Leadership, 45(1), 37–43. http://
doi.org/10.1108/SL-12-2016-0085
Kuusisto, J., & Meyer, M. (2003). Insights into services and innovation in the knowledge
intensive economy. Technology Review, 134. Helsinki: Tekes. Retrieved from https://
www.tekes.fi/globalassets/julkaisut/insights.pdf
Loebbecke, C., & Picot, A. (2015). Reflections on societal and business model transforma
tion arising from digitization and big data analytics: A research agenda. Journal of Strate
gic Information Systems, 24, 149–157. http://doi.org/10.1016/j.jsis.2015.08.002
Luxton, D. D. (2014). Recommendations for the ethical use and design of artificial intelli
gent care providers. Artificial Intelligence in Medicine, 62(1), 1–10. http://doi.org/
10.1016/j.artmed.2014.06.004
Metzler, T. A., Lewis, L. M., & Pope, L. C. (2016). Could robots become authentic compan
ions in nursing care? Nursing Philosophy, 17(1), 36–48. http://doi.org/10.1111/nup.
12101
Michelfelder, D. P. (2011). Dirty hands, speculative minds, and smart machines. Philoso
phy and Technology, 24(1), 55–68. http://doi.org/10.1007/s13347-010-0009-0
Mubin, O., D’Arcy, T., Murtaza, G., Simoff, S., Stanton, C., & Stevens, C. (2014). Active or
passive? Investigating the impact of robot role in meetings. In IEEE international work
shop on robot and human interactive communication (pp. 580–585). Edinburgh. http://
doi.org/10.1109/ROMAN.2014.6926315
Nielsen, J. A., Andersen, K. N., & Sigh, A. (2016). Robots conquering local government
services: A case study of eldercare in Denmark. Information Polity, 21(2), 139–151. http://
doi.org/10.3233/IP-160381
Niu, J., Tang, W., Xu, F., Zhou, X., & Song, Y. (2016). Global research on artificial intelli
gence from 1990–2014: Spatially-explicit bibliometric analysis. International Journal of
Geo-Information, 5(66), 1–19. http://doi.org/10.3390/ijgi5050066
Pieters, W. (2011). Explanation and trust: What to tell the user in security and AI?
(p. 362)
Reich, R. (1991). The work of nations: Preparing ourselves for 21st-century capitalism.
London: Simon & Schuster.
Sananès, N., Garbin, O., Hummel, M., Youssef, C., Vizitiu, R., Lemaho, D., … Wattiez, A.
(2011). Setting up robotic surgery in gynaecology: The experience of the Strasbourg
teaching hospital. Journal of Robotic Surgery, 5(2), 133–136. http://doi.org/10.1007/
s11701-010-0231-x
Page 19 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Schwartz, T., Krieger, H., & Zinnikus, I. (2016). Hybrid teams : Flexible collaboration be
tween humans, robots and virtual agents. In Proceedings of the 14th German conference
on multiagent system technologies (pp. 131–146). Klagenfurt.
Torras, C. (2015). Social robots: A meeting point between science and fiction. MÈTODE
Science Studies Journal, 5, 111–115. http://doi.org/10.7203/metode.82.3546
Wang, C.-M., Tseng, S.-H., Wul, P.-W., Xu, Y.-H., Liao, C.-K., Lin, Y.-C., … Fu, L.-C. (2013).
Human-oriented recognition for intelligent interactive office robot. In 13th International
conference on control, automation and systems (pp. 960–965). Gwangju. http://doi.org/
10.1093/gbe/evv015
Willcocks, L., Lacity, M. C., & Craig, A. (2015). The IT function and robotic process au
tomation. The Outsourcing Unit Working Research Paper Series. London. http://
eprints.lse.ac.uk/64519/1/OUWRPS_15_05_published.pdf
Xu, S., Tu, D., He, Y., Tan, S., & Fang, M. (2013). ACT-R-typed human–robot collaboration
mechanism for elderly and disabled assistance. Robotica, 32(November 2013), 1–11.
http://doi.org/10.1017/S0263574713001094
Yampolskiy, R., & Fox, J. (2013). Safety engineering for artificial general intelligence.
Topoi, 32(2), 217–226. http://doi.org/10.1007/s11245-012-9128-9
Yu, Q., Yuan, C., Fu, Z., & Zhao, Y. (2012). An autonomous restaurant service robot with
high positioning accuracy. The Industrial Robot, 39(3), 271–281. http://doi.org/
10.1108/01439911211217107
Zeng, D. (2015). AI Ethics: Science fiction meets technological reality. IEEE Intelligent
Systems, 3, 2–5.
Abdel Raheem, A., Song, H. J., Chang, K. D., Choi, Y. D., & Rha, K. H. (2017). Robotic
nurse duties in the urology operative room: 11 years of experience. Asian Journal of Urol
ogy, 4(2), 116–123. http://doi.org/10.1016/j.ajur.2016.09.012
Albu, A., & Stanciu, L. (2015). Benefits of using artificial intelligence in medical predic
tions. In 2015 e-health and bioengineering conference (EHB) (pp. 1–4). Iasi. http://
doi.org/10.1109/EHB.2015.7391610
Page 20 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Alizadehsani, R., Zangooei, M. H., Hosseini, M. J., Habibi, J., Khosravi, A., Roshanzamir,
M., … Nahavandi, S. (2016). Coronary artery disease detection using computational intel
ligence methods. Knowledge-Based Systems, 109, 187–197. http://doi.org/10.1016/
j.knosys.2016.07.004
Amershi, S., Fogarty, J., Kapoor, A., & Tan, D. (2011). Effective end-user interac
(p. 363)
tion with machine learning. In Proceedings of the twenty-fifth AAAI conference on artifi
cial intelligence (pp. 1529–1532). San Francisco. http://doi.org/
10.1145/2046396.2046416
Amrit, C., Paauw, T., Aly, R., & Lavric, M. (2017). Identifying child abuse through text min
ing and machine learning. Expert Systems with Applications, 88, 402–418. http://doi.org/
10.1016/j.eswa.2017.06.035
Aron, R., Dutta, S., Janakiraman, R., & Pathak, P. A. (2011). The impact of automation of
systems on medical errors : Evidence from field research. Information Systems Research,
22(3), 429–446.
Autor, D. H. (2015). Why are there still so many jobs? The history and future of workplace
automation. Journal of Economic Perspectives, 29(3), 3–30. http://doi.org/10.1257/jep.
29.3.3
Balfe, N., Sharples, S., & Wilson, J. R. (2015). Impact of automation: Measurement of per
formance, workload and behaviour in a complex control environment. Applied Ergonom
ics, 47, 52–64. http://doi.org/10.1016/j.apergo.2014.08.002
Balkin, T. J., Horrey, W. J., Graeber, R. C., Czeisler, C. a., & Dinges, D. F. (2011). The chal
lenges and opportunities of technological approaches to fatigue management. Accident
Analysis and Prevention, 43(2), 565–572. http://doi.org/10.1016/j.aap.2009.12.006
Balram, N., Tošić, I., & Binnamangalam, H. (2016). Digital health in the age of the infinite
network. In APSIPA Transactions on Signal and Information Processing (Vol. 5, pp. 1–13).
Cambridge. http://doi.org/10.1017/ATSIP.2016.6
Baril, C., Gascon, V., & Brouillette, C. (2014). Impact of technological innovation on a
nursing home performance and on the medication-use process safety. Journal of Medical
Systems, 38(3), 1–12. http://doi.org/10.1007/s10916-014-0022-4
Bekier, M., Molesworth, B. R., & Williamson, A. (2011). Defining the drivers for accepting
decision making automation in air traffic management. Ergonomics, 54(4), 347–356.
http://doi.org/10.1080/00140139.2011.558635
Bennett, C. C., & Hauser, K. (2013). Artificial intelligence framework for simulating clini
cal decision-making: A Markov decision process approach. Artificial Intelligence in Medi
cine, 57(1), 9–19. http://doi.org/10.1016/j.artmed.2012.12.003
Page 21 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Bocci, T., Moretto, C., Tognazzi, S., Briscese, L., Naraci, M., Leocani, L., … Sartucci, F.
(2013). How does a surgeon’s brain buzz? An EEG coherence study on the interaction be
tween humans and robot. Behavioral and Brain Functions : BBF, 9(1), 1–12. http://
doi.org/10.1186/1744-9081-9-14
Bogue, R. (2011). Robots in the nuclear industry: A review of technologies and applica
tions. Industrial Robot: An International Journal, 38(2), 113–118. http://doi.org/
10.1108/01439911111106327
Byun, S., & Buyn, S.-E. (2011). Exploring perceptions toward biometric technology in ser
vice encounters: a comparison of current users and potential adopters. Behaviour & Infor
mation Technology, 32(3), 217–230. http://doi.org/10.1080/0144929X.2011.553741
Calo, C. J., Hunt-Bull, N., Lewis, L., & Metzler, T. (2011). Ethical implications of using the
Paro robot with a focus on dementia patient care. In Association for the Advancement of
Artificial Intelligence workshop (Vol. WS-11-12, pp. 20–24). San Francisco. Retrieved from
http://www.scopus.com/inward/record.url?eid=2-s2.0–
80,054,913,481&partnerID=40&md5=cf9ad1b74f81299aa3f48be4f8e9700f
Chang, A. C. (2012). Primary prevention of sudden cardiac death of the young ath
(p. 364)
lete: The controversy about the screening electrocardiogram and its innovative artificial
intelligence solution. Pediatric Cardiology, 33(3), 428–433. http://doi.org/10.1007/
s00246-012-0244-5
Charalambous, G., Fletcher, S., & Webb, P. (2015). Identifying the key organisational hu
man factors for introducing human-robot collaboration in industry: an exploratory study.
International Journal of Advanced Manufacturing Technology, 81(9–12), 2143–2155.
http://doi.org/10.1007/s00170-015-7335-4
Charchat-Fichman, H., Uehara, E., & Santos, C. F. (2014). New technologies in assess
ment and neuropsychological rehabilitation. Trends in Psychology, 22(3), 539–553. http://
doi.org/10.9788/TP2014.3-01
Collins, J. W., Patel, H., Adding, C., Annerstedt, M., Dasgupta, P., Khan, S. M., … Wiklund,
P. N. (2016). Enhanced recovery after robot-assisted radical cystectomy: EAU robotic
urology section scientific working group consensus view. European Urology, 70, 649–660.
http://doi.org/10.1016/j.eururo.2016.05.020
Danilchenko, A., Balachandran, R., Toennies, J. L., Baron, S., Munske, B., Fitzpatrick, J.
M., … Labadie, R. F. (2011). Robotic mastoidectomy. Otology and Neurotology, 32(1), 11–
16. http://doi.org/10.1097/MAO.0b013e3181fcee9e.Robotic
Page 22 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
De Benedictis, A., Trezza, A., Carai, A., Genovese, E., Procaccini, E., Messina, R., … Mar
ras, C. E. (2017). Robot-assisted procedures in pediatric neurosurgery. Neurosurgical Fo
cus, 42(5), E7. http://doi.org/10.3171/2017.2.FOCUS16579
Decker, M., Fischer, M., & Ott, I. (2017). Service robotics and human labor: A first tech
nology assessment of substitution and cooperation. Robotics and Autonomous Systems,
87, 348–354. http://doi.org/10.1016/j.robot.2016.09.017
Dilsizian, S. E., & Siegel, E. L. (2014). Artificial intelligence in medicine and cardiac imag
ing: Harnessing big data and advanced computing to provide personalized medical diag
nosis and treatment. Current Cardiology Reports, 16(441), 1–8. http://doi.org/10.1007/
s11886-013-0441-8
Doryab, A., Min, J. K., Wiese, J., Zimmerman, J., & Hong, J. I. (2014). Detection of behavior
change in people with depression. In Twenty-eighth AAAI Conference on Artificial Intelli
gence workshop (pp. 12–16). Québec.
Drew, J. (2017). Real talk about artificial intelligence and blockchain. Journal of Accoun
tancy, 224(1), 22–26,28. Retrieved from https://ucd.idm.oclc.org/login?url=https://
search.proquest.com/docview/1917636631?accountid=14,507 %0Ahttp://
jq6am9xs3s.search.serialssolution.com?ctx_ver=Z39.88–2004&ctx_enc=info:ofi/
enc:UTF-8&rfr_id=info:sid/ProQ%3Aabiglobal&rft_val_fmt=info:ofi/fmt:kev:m
Drigas, A. S., & Ioannidou, R.-E. (2012). Artificial intelligence in special education: A
decade review. International Journal of Engineering Education, 28(6), 1366–1372.
Edwards, P., & Ramirez, P. (2016). When should workers embrace or resist new technolo
gy? New Technology, Work and Employment, 31(2), 99–113. http://doi.org/10.1111/
ntwe.12067
Gilbert, B. J., Goodman, E., Chadda, A., Hatfield, D., Forman, D. E., & Panch, T. (2015).
The Role of Mobile Health in Elderly Populations. Current Geriatrics Reports, 4(4), 347–
352. http://doi.org/10.1007/s13670-015-0145-6
Gombolay, M. C., Huang, C., & Shah, J. A. (2015). Coordination of human-robot teaming
with human task preferences. In AAAI Fall symposium series on AI-HRI. Arlington.
Hengstler, M., Enkel, E., & Duelli, S. (2016). Applied artificial intelligence and
(p. 365)
trust: The case of autonomous vehicles and medical assistance devices. Technological
Forecasting and Social Change, 105, 105–120. http://doi.org/10.1016/j.techfore.
2015.12.014
Page 23 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Hirsch, P. B. (2017). The robot in the window seat. Journal of Business Strategy, 38(4),
47–51. http://doi.org/10.1108/JBS-04-2017-0050
Holloway, B. B., Deitz, G. D., & Hansen, J. D. (2013). The benefits of sales force automa
tion (SFA): An empirical examination of SFA usage on relationship quality and perfor
mance. Journal of Relationship Marketing, 12(4), 223–242. http://doi.org/
10.1080/15332667.2013.846735
Huijnen, C. a G. J., Lexis, M. a S., Jansens, R., & de Witte, L. P. (2016). Mapping robots to
therapy and educational objectives for children with autism spectrum disorder. Journal of
Autism and Developmental Disorders, 46(6), 2100–2114. http://doi.org/10.1007/
s10803-016-2740-6
James, K. L., Barlow, D., Bithell, A., Hiom, S., Lord, S., Oakley, P., … Whittlesea, C. (2013).
The impact of automation on pharmacy staff experience of workplace stressors. Interna
tional Journal of Pharmacy Practice, 21(2), 105–116. http://doi.org/10.1111/j.
2042-7174.2012.00231.x
Jeong, G. M., Park, C. W., You, S., & Ji, S. H. (2014). A study on the education assistant
system using smartphones and service robots for children regular paper. International
Journal of Advanced Robotic Systems, 11(1), 1–9. http://doi.org/10.5772/58389
Jeske, D., & Santuzzi, A. M. (2015). Monitoring what and how: Psychological implications
of electronic performance monitoring. New Technology, Work and Employment, 30(1), 62–
78. http://doi.org/10.1111/ntwe.12039
Junejo, F., Amin, I., Hassan, M., Ahmed, A., Hameed, S., & Author, C. (2017). The applica
tion of artificial intelligence in grinding operation using sensor fusion. International Jour
nal of GEOMATE, 12(30), 11–18.
Jung, J., Song, H., Kim, Y., Im, H., & Oh, S. (2017). Intrusion of software robots into jour
nalism: The public’s and journalists’ perceptions of news written by algorithms and hu
man journalists. Computers in Human Behavior, 71, 291–298. http://doi.org/10.1016/
j.chb.2017.02.022
Kaivo-Oja, J., Roth, S., & Westerlund, L. (2017). Futures of robotics. Human work in digi
tal transformation. International Journal of Technology Management, 73(4), 176–205.
http://doi.org/10.1504/IJTM.2017.083074
Khosla, R., Chu, M. T., & Nguyen, K. (2013). Affective robot enabled capacity and quality
improvement of nursing home aged care services in Australia. In IEEE 37th annual com
puter software and applications conference workshops (pp. 409–414). Kyoto. http://
doi.org/10.1109/COMPSACW.2013.89
Kim, C., Kim, D., Yuan, J., Hill, R. B., Doshi, P., & Thai, C. N. (2015). Robotics to promote
elementary education pre-service teachers’ STEM engagement, learning, and teaching.
Computers and Education, 91, 14–31. http://doi.org/10.1016/j.compedu.2015.08.005
Page 24 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Klintong, N., Vadhanasindhu, P., & Thawesaengskulthai, N. (2012). Artificial intelligence
and successful factors for selecting product innovation development. In 3rd International
Conference on Intelligent Systems Modelling and Simulation (pp. 397–402). Kota Kina
balu. http://doi.org/10.1109/ISMS.2012.86
Kokina, J., & Davenport, T. H. (2017). The emergence of artificial intelligence: How au
tomation is changing auditing. Journal of Emerging Technologies in Accounting, 14(1),
115–122. http://doi.org/10.2308/jeta-51,730
Kolbjørnsrud, V., Amico, R., & Thomas, R. J. (2017). Partnering with AI: how organizations
can win over skeptical managers. Strategy & Leadership, 45(1), 37–43. http://doi.org/
10.1108/SL-12-2016-0085
Kraan, K. O., Dhondt, S., Houtman, I. L. D., Batenburg, R. S., Kompier, M. A. J., &
(p. 366)
Taris, T. W. (2014). Computers and types of control in relation to work stress and learn
ing. Behaviour & Information Technology, 33(10), 1013–1026. http://doi.org/
10.1080/0144929X.2014.916351
Kumar, S., Pragatheeswarane, M., Sharma, A. P., Bishnoi, K., Sharma, M. K., Panwar, V. K.,
& Sethi, S. (2017). Expanding the horizon of robotic surgery to large pelvic paragan
glioma. Journal of Robotic Surgery, 11(2), 247–250. http://doi.org/10.1007/
s11701-016-0648-y
Lacity, M. C., & Willcocks, L. P. (2016). Robotic process automation at telefónica O2. MIS
Quarterly Executive, 15(1), 21–35.
Lee, H., Troschel, F. M., Tajmir, S., Fuchs, G., Mario, J., Fintelmann, F. J., & Do, S. (2017).
Pixel-level deep segmentation: Artificial intelligence quantifies muscle on computed to
mography for body morphometric analysis. Journal of Digital Imaging, 30(4), 487–498.
http://doi.org/10.1007/s10278-017-9988-z
Mathers, N., Goktogen, A., Rankin, J., & Anderson, M. (2012). Robotic mission to Mars:
Hands-on, minds-on, web-based learning. Acta Astronautica, 80, 124–131. http://doi.org/
10.1016/j.actaastro.2012.06.003
Mubin, O., D’Arcy, T., Murtaza, G., Simoff, S., Stanton, C., & Stevens, C. (2014). Active or
passive? Investigating the impact of robot role in meetings. In IEEE International Work
shop on Robot and Human Interactive Communication (pp. 580–585). Edinburgh. http://
doi.org/10.1109/ROMAN.2014.6926315
Page 25 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Naik, G., & Bhide, S. S. (2014). Will the future of knowledge work automation transform
personalized medicine? Applied and Translational Genomics, 3(3), 50–53. http://doi.org/
10.1016/j.atg.2014.05.003
Nezhad, H. R. M. (2015). Cognitive assistance at work. In AAAI 2015 Fall symposium (pp.
37–40). Arlington.
Nielsen, J. A., Andersen, K. N., & Sigh, A. (2016). Robots conquering local government
services: A case study of eldercare in Denmark. Information Polity, 21(2), 139–151. http://
doi.org/10.3233/IP-160381
Peña, P., Del Hoyo, R., Vea-murguía, J., Rodrigálvarez, V., Calvo, J. I., & Martín, J. M.
(2016). Moriarty: Improving “time to market” in big data and artificial intelligence appli
cations. International Journal of Design & Nature and Ecodynamics, 11(3), 230–238.
http://doi.org/10.2495/DNE-V11-N3-230-238
Piccoli, M., Mullineris, B., Santi, D., & Gozzo, D. (2017). Advances in robotic transaxillary
thyroidectomy in Europe. Current Surgery Reports, 5(8), 1–7. http://doi.org/10.1007/
s40137-017-0180-7
Pieters, W. (2011). Explanation and trust: What to tell the user in security and AI? Ethics
and Information Technology, 13(1), 53–64. http://doi.org/10.1007/s10676-010-9253-3
Samarakou, M., Fylladitakis, E. D., Prentakis, P., & Athineos, S. (2014). Implementation of
artificial intelligence assessment in engineering laboratory education. In International
conference e-learning (pp. 299–303). Lisbon: International Association for Development of
the Information Society.
Sananès, N., Garbin, O., Hummel, M., Youssef, C., Vizitiu, R., Lemaho, D., … Wattiez, A.
(2011). Setting up robotic surgery in gynaecology: The experience of the Strasbourg
teaching hospital. Journal of Robotic Surgery, 5(2), 133–136. http://doi.org/10.1007/
s11701-010-0231-x
Schwartz, T., Krieger, H., & Zinnikus, I. (2016). Hybrid teams : Flexible collaboration be
tween humans, robots and virtual agents. In Proceedings of the 14th German conference
on multiagent system technologies (pp. 131–146). Klagenfurt.
Page 26 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Semerjian, A., & Pavlovich, C. P. (2017). Extraperitoneal robot-assisted radical prostatec
tomy: Indications, technique and outcomes. Current Urology Reports, 18(42), 1–7. http://
doi.org/10.1007/s11934-017-0689-4
Stalidis, G., Karapistolis, D., & Vafeiadis, A. (2015). Marketing decision support using arti
ficial intelligence and knowledge modeling: Application to tourist destination manage
ment. Procedia—Social and Behavioral Sciences, 175, 106–113. http://doi.org/10.1016/
j.sbspro.2015.01.1180
Sundararajan, S. C., & Nitta, S. V. (2015). Designing engaging intelligent tutoring systems
in an age of cognitive computing. IBM Journal of Research and Development, 59(6), 10:1–
10:9. http://doi.org/10.1147/JRD.2015.2464085
Sutton, S. G., Holt, M., & Arnold, V. (2016). “The reports of my death are greatly exagger
ated”—Artificial intelligence research in accounting. International Journal of Accounting
Information Systems, 22, 60–73. http://doi.org/10.1016/j.accinf.2016.07.005
Szalma, J. L., & Taylor, G. S. (2011). Individual differences in response to automation: the
five factor model of personality. Journal of Experimental Psychology. Applied, 17(2), 71–
96. http://doi.org/10.1037/a0024170
van de Merwe, K., Oprins, E., Eriksson, F., & van der Plaat, A. (2012). The influence of au
tomation support on performance, workload, and situation awareness of air traffic con
trollers. The International Journal of Aviation Psychology, 22(2), 120–143. http://doi.org/
10.1080/10508414.2012.663241
van Doorn, J., Mende, M., Noble, S. M., Hulland, J., Ostrom, A. L., Grewal, D., & Petersen,
J. A. (2017). Domo arigato Mr. Roboto: Emergence of automated social presence in orga
nizational frontlines and customers’ service experiences. Journal of Service Research,
20(1), 43–58. http://doi.org/10.1177/1094670516679272
Willcocks, L., Lacity, M. C., & Craig, A. (2015a). Robotic process automation at Xchanging
(The Outsourcing Unit Working Research Paper Series). London.
Willcocks, L., Lacity, M. C., & Craig, A. (2015b). The IT function and robotic process au
tomation. (The Outsourcing Unit Working Research Paper Series). London.
Page 27 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
Xu, J., Le, K., Deitermann, A., & Montague, E. (2014). How different types of users
(p. 368)
develop trust in technology: A qualitative analysis of the antecedents of active and pas
sive user trust in a shared technology. Applied Ergonomics, 45(6), 1495–1503. http://
doi.org/10.1016/j.apergo.2014.04.012
Yang, S., Wei, R., Guo, J., & Xu, L. (2017). Semantic inference on clinical documents: Com
bining machine learning algorithms with an inference engine for effective clinical diagno
sis and treatment. IEEE Access, 5, 3529–3546. http://doi.org/10.1109/ACCESS.
2017.2672975
Ye, J. J. (2015). Artificial intelligence for pathologists is not near-it is here: Description of a
prototype that can transform how we practice pathology tomorrow. Archives of Pathology
and Laboratory Medicine, 139(7), 929–935. http://doi.org/10.5858/arpa.2014-0478-OA
Crispin Coombs
Donald Hislop
Donald Hislop is Professor in the Business School at the University of Aberdeen. Pri
or to this he worked at Loughborough University and Sheffield University. His re
search interests are in two main areas: knowledge management and mobile working.
He has published on knowledge management in a range of journals, including Man
agement Learning, Journal of Information Technology, Technology Analysis & Strate
gic Management, and the Journal of Knowledge Management. He is also the author
of a popular and well-regarded textbook called Knowledge management in organiza
Page 28 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
The Changing Nature of Knowledge and Service Work in the Age of Intelli
gent Machines
tions: A critical introduction (now in its fourth edition, published in 2018). He is on
the editorial board of the journal New Technology, Work and Employment.
Stanimira Taneva
Stanimira Taneva is currently Senior Researcher and REF Impact Officer, School of
Sociology and Social Policy, University of Nottingham, United Kingdom. During the
work on her chapter, she was a Senior Research and Enterprise Associate and a
member of the Centre for Professional Work and Society at the School of Business
and Economics at Loughborough University. Her background is in developmental and
work/organizational psychologies, as well as psychometrics. Stanimira’s work experi
ence is a combination of academia and practice—she has been in academic, re
search, management, and expert roles in the public, private, and third-sector. Stan
imira has conducted a variety of academic and applied research programs in areas
such as developing and managing careers, (age-) diversity, well-being, and perfor
mance in organizations. In 2013 she was awarded a Marie Curie Fellowship from the
European Commission for her cross-cultural research on successful aging at work.
Stanimira’s most recent research interests include cross-disciplinary research impact
and the exploration of the impacts of new technology (e.g., AI) on work. She is a fel
low at the UK Research and Innovation Future Leaders Fellowships program Peer
Review College.
Sarah Barnard
Page 29 of 29
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.12
This chapter describes the analyses and results for the ESRC Domain of Communities and
Identities, guided by two main questions: How do we define and authenticate ourselves in
a digital age? What new forms of communities and work emerge as a result of digital
technologies? The chapter first provides an initial overview of the major insights from the
literature review and analysis, the Delphi surveys, and workshop discussions about the
relevant range of the concepts of community and identity in a digital age. The resulting
focus is primarily on more civic or political aspects of online communities and identities.
Eight main topics emerged, including online community (including group), mobile phone,
children, migration and diaspora, identity (psychology/social), gender, education, and
friendship network. The analyses also highlighted theory, methods, and approaches in the
literature. The review provides examples of literature in the project’s time period that il
lustrate these topics. The chapter ends with a discussion of future research directions
(e.g., digital community exclusion and inclusion) and research challenges (e.g., the need
to include history and culture in studies of online communities).
Keywords: ESRC Review, migration and diaspora, mobile phone, online communities and identities, social net
works
Introduction
THE initial scoping questions for this domain were: “How do we define and authenticate
ourselves in a digital age?” and “What new forms of communities and work emerge as a
result of digital technologies—for example, new forms of coordination including large-
scale and remote collaboration?” This chapter briefly explores the outcomes of the litera
ture review and expert Delphi review process for the communities and identities domain.
As with the other review chapters, the goal is not to work through a large number of ex
amples from the literature. Instead, building on the methods described in chapter 2, we
first set out the results of the digital humanities-based analyses of the literature and the
content analysis of methods and theory. We highlight the major themes and topics within
the literature—providing a few general examples. These are not intended to be the “most
Page 1 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
important” examples from the literature but, rather, simply indicative of the types of
work. This is then followed by the presentation of the content analysis that sought to
identify the key theories and methods in use within the literature. Next, we outline the re
sults from the Delphi review of experts. This concludes with the key questions, topics, and
challenges we identified, and we compare these to the results from the literature work. In
the last section, we present the recommendations for areas of future study.
In terms of the idea of identity, many of the responses to the Delphi questions demon
strated a notable uncertainty about the idea of “authentication” in the ESRC scoping
questions. Many of the responses interpreted authentication in terms of having an “au
thentic” sense of identity, rather than the technical process of individuals authenticating
themselves so as to use or access digital media, services, systems, or institutions. Obvi
ously, these issues overlap to some extent, but the majority of the responses and the sur
veyed literature pointed to wider questions of identity, self, and the links to community
membership and community identity. We should also note that issues of identity and com
munity appeared throughout all seven of the domains studied, with a considerable
amount of overlap in the area of citizenship and politics. Here the focus was on political
identity and political community or group membership. Such issues of community and
identity have a long history in digital media research, going back to the 1980s and 1990s,
evidenced by the Rheingold’s (1993) examination of the “Whole Earth ’Lectronic
Link” (WELL), or Turkle’s early work on technology and the self (1984), life online (1995)
and identity (1999). Much of the detailed analysis of group and community dynamics can
be found in the initial work during the 1980s and 1990s on both workplace and educa
tional collaboration (e.g., Mason & Kaye, 1989). Further, concerns about how best to de
sign and manage systems to support digital communities also appeared in the 1970s (e.g.,
Hiltz & Turoff, 1978), 1980s (e.g., Zuboff, 1988), and 1990s (e.g., Mynatt et al., 1997), and
continue (see Kraut & Resnick, 2011).
In general terms, our analysis of the literature focused on the period that Wellman and
Haythornthwaite (2002) called the “second age of the internet,” and considered changing
senses of community and identity in regards to networks and networked individualism. In
Page 2 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
overall terms, the main argument in the late 1990s and early 2000s was that community
is increasingly being developed on the basis of communication rather than inhabitancy or
physical proximity. Instead of communities arising from a shared location—from people
inhabiting the same physical location—instead, a networked sense of community devel
oped. These new types of communities form around shared values and social organiza
tion, and are built on choices and strategies of social actors, family, individuals, or social
groups. Wellman and Haythornthwaite (2002) argued that networks of interpersonal ties
provide sociability, support, information, and a sense of belonging and social identity. One
key transformation that arises in comparison to (p. 407) earlier, place-based communities
is the development of weak and strong networks in which users adapt digital resources to
meet the needs of network sociability.
More recently, Wellman with Rainie (2014) have deepened and extended this earlier argu
ment in line with the diffusion of digital services into social life. Currently, digitally sup
ported social networks are the “new social operating system.” The authors argue that
large, loosely knit social circles of networked individuals expand opportunities for learn
ing, problem solving, decision making, working, and personal interaction.
Literature Analysis
The literature analysis was designed to create two analytic outcomes. First, the goal was
to identify key topics within the existing literature. This would allow the comparison with
areas of future importance identified by the Delphi review. The first round of collected lit
erature was analyzed to create concept pairs and trios; the combined first and second
rounds of literature were then analyzed to identify key topic clusters. The results of these
two approaches were then compared. The second goal was to explore the predominance
of specific, theories, methods, and approaches within the data. As noted in chapter 2, the
literature data were subjected to two analyses.
Topics
Table 14.1 shows the 13 most common concepts (covering 2% or more of the identified
cases) identified from the first round of literature. Table 14.2 lists their subtopics. In Ta
ble 14.2 the main concept is marked in bold, and various concepts follow. Not surprising
ly, the two main concepts are “group” and “community,” followed by “identity” and “gen
der.” It is interesting to note that the analysis here pulled out more general aspects of
computer use rather than a specific social media or digital platform, as can also be seen
in the Citizenship and Politics domain (chapter 16).
Page 3 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Concepts Percent
Group 13.7
Computer 13.6
Community 10.8
Gender 6.8
Identity 6.5
Child 4.0
Knowledge 3.9
Network 3.8
Machine 3.4
Communication 3.2
Leadership 2.8
College 2.5
Game 2.1
Page 4 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 5 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 6 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 7 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
performance .5 object .4
word .5 program .5
programming .3
system .3
thing .5
way .8
world .5
network 3.8
Page 8 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
proportion .7
single .4
size .7
tie 2.0
Note: The bolded term is the main concept; the unbolded terms below that and above the line are the related sub
concepts.
Page 9 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
As with the other domains, we can see a shift in focus within the literature between 2000
and 2016 (see Figures 14.1 and 14.2).1 If we explore the visualizations of the data, we find
that in the 2000–2004 literature concept pairs such as group membership, group identity,
and group norms are some of the most common. This contrasts with the 2012–2016
where concept pairs such as community participation, community leadership, community
knowledge and community network are more common. Based on exploring the papers be
hind these results, there appears to have been a shift from more social-psychological
work on group membership and identity to more sociological work on community dynam
ics. We would argue that the long history of work in these areas, and their persistence as
research topics, though with clear changes in focus, indicate that (p. 408) (p. 409) (p. 410)
research into communities and identities remains fundamental to understanding how we
live in the digital age.
Page 10 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
As noted in chapter 2, the second approach to the analysis of the literature explored the
extraction of topics using a different methodology, based on a factor analysis of salience
and relevance measures. As noted in chapter 2, we utilized both bespoke tools and the
Wordstat software. Unlike the concept mapping, which pulled out some of the underlying
ontological links, the identification of topics produced groups that more overtly fitted the
ory and methods in the literature. This was the case for all of the literature analyses. The
12 topics identified (using Wordstat) are presented in Table 14.3. Table 14.4 presents an
analysis of the overlap between the topics and concepts analyses.
Page 11 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 12 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 13 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 14 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 15 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 16 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 17 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 18 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Con On Mo Chil Mi Iden Gen Edu Frie Face Com Gov Iden
cept/ line bile dren gra tity der catio nd book put er tity
Top com phon tion (Psy n ship ing nanc (As
ic mu e and chol net e sess
nity dias ogy/ work ment
pora So )
cial)
Chil X
d
Col
lege
Com X
mu
nica
tion
Com X X X X
mu
nity
Com X
put
er
Page 19 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Gam X
e
Gen X X
der
Grou X X
p
Iden
tity
Kno
wled
ge
Lead
er
ship
Ma X
chin
e
Net X X
work
Page 20 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Seven key topics stand out from the analysis (see Table 14.3): Online community, Identity,
Friendship network, Mobile phone, Children, Gender, and Education
Online community. The first thing to note is that the topic analysis has not brought out
the distinction between research focused on topics clustered around group as opposed to
community—with both featuring under the same topic. This points out the benefits of
(p. 411) using different approaches to the automatic evaluation of literature and the ex
traction of key terms. Differences in method and measures are likely to provide different
views on the same materials. For example, some approaches based on an ontology (model
of relations between concepts) drawn from theory or inductive coding may highlight cer
tain (p. 412) (p. 413) aspects of the data—such as the idea of “group membership,” where
as an inductive but statistical analysis of word frequency might highlight the use of a vari
ety of terms that form around elements of the idea of community.
As noted earlier, the study of online community has a long history going back to the early
1980s. It is important to remember that the literature examined here represents that
which was specifically identified as being about community or identity. Looking at all the
data we find that community or group membership forms a core part of the theoretical
backdrop to other domains, especially citizenship and politics, health and well-being, and
communication and relationships. While we cannot hope to summarize this breadth of
work here, it is important to note how community or group membership is fundamental to
these other domains. It is of course the case that in the past two decades, for many peo
ple in socio-economically well-developed societies, digitally mediated membership of com
munities is a vital part of their contemporary sense of self, identity, and well-being.
We can also note what might be described as apprehensions and even some unease about
the nature of “digital identity” and “community” in the literature, the Delphi data, and
workshops. We would argue that there remains a thread of argument around the “virtu
al,” “disembodied” or purely mediated identity and community concerning their credibili
ty and authenticity as compared to face-to-face interactions and contexts. This touches on
the distinction in the literature between discussions of identity and self in terms of their
“performance” via digital media, and the search for and methods to digitally check the
“authenticity” of identity online. We would go so far as to argue some these issues and
questions may arise form disciplinary perspectives on questions of identity and communi
ty as much as they do from the analysis of data and cases. As we shall discuss, current
theories are mainly drawn from social and behavioral psychology, networked approaches
to sociology, and the mixed approaches found in computer-mediated communication stud
ies.
As already noted, the literature appears to have shifted from a more social-psychological
focus on group processes and membership to a more sociological one focused on commu
nity dynamics, although there is no distinct dividing line, with both approaches prevalent
across the period. Papers that address aspects of group or community behavior or struc
ture cut across all the other domains—for example, group dynamics in relation to political
action, or group support in relation to health conditions. Along with aspects of the com
Page 21 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
munication and relationships domain, this appears to be one of the underpinning issues
for the study of digital media.
Identity. The discussion of online or digital groups is often tied up with social-psychologi
cal theories of group membership and identity. We have named the topic here “identity
(psychology/social)” to distinguish it from work on identity verification via technologies. It
is worth noting that there is a far greater breadth of literature—especially in journal arti
cle form—that takes a psychological or more likely social-psychological perspective on is
sues of digital identity. A prominent feature of this work is the SIDE model of online
group behavior (see: Postmes et al., 1998; Spears et al., 2002). More recent papers open
ly acknowledge that approaches to community need to take on board a variety of discipli
nary insights.
cal aspects of social networks via the idea of social capital (e.g., Steinfield et al., 2008). or
offer overall models to help understand online communities (e.g., de Souza & Preece,
2004). At the same time, more recent research concerns the linkage between “online”
community or interaction and other forms of community. In this context ideas of social
capital are understood in sociological terms, typically in line with the work of Putnam
(2000). In this characterization, social capital is understood as both a personal and com
munity commodity that is linked to civic and political engagement and the building of
community groups (e.g., Preece, 2002; Rainie & Wellman, 2012). These approaches are
now applied to very specific contexts such as political group membership or social and
psychological support within communities (digital and/or face-to-face; e.g., Wright et al.,
2013).
Mobile phone. The breadth of technologies covered by the literature includes MUDs
(multi-use dimensions) and MOOs (MUD, object-oriented;1990s) via social media (Twitter
and Facebook) through to current multiplayer online games. Notably, mobile phone use
appears prominently in this domain. The analysis picked out mobile phones and devices
as a key category. In looking at the literature we do not find a single focus for papers on
the mobile phone. There has been a broad literature on the use of the mobile phone for
quite some time (e.g., Katz & Aakhus, 2002; Ling, 2004), and research on mobile phone
use could be found in all domains. In the context of community, the examination of mo
biles often pointed to its use as part of existing communities or community maintenance,
from basic citizenship (e.g., Mossberger et al., 2012) through to friendship networks.
Children. Much of the work on mobile technologies and identity we identified focused on
children and adolescents, with debates around the level and extent of digital communica
tion in relation to personal development, friendship networks, and emotional well-being.
This touches on a body of literature that focuses on “fears” about the levels or any types
of use (e.g., whether high levels of use and highly immersive use might adversely affect
young peoples’ developmental processes) or the dangers of mobile use (such as cyber bul
lying). This work cuts across our domains—especially into the governance domain as it
touches on policy issues. Examples of such work include Livingstone (2003), Livingstone
Page 22 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
and Görzig (2014), and Subrahmanyam et al. (2001). Friendship networks form a consis
tent theme within the literature on young people, adolescent, and teen use of digital me
dia (e.g., Mesch & Talmud, 2006; Valkenburg & Peter, 2009). One area that clearly incor
porates both issues of identity and group membership is that of migrant and diasporic use
of communications media (e.g., Panagakos & Horst, 2006).
Gender. As well as age-related issues, another constant touchstone for the study of is
sues of identity in digital media has been the examination of gender variation in the uses
of the medium and the content generated. This work goes back to very early studies in
the 1980s of access to ICT to work in the 1990s on gender in relation to online interaction
(Herring, 1996). Exploring this literature makes clear the transition in the examination of
identity in digital media from assumptions of “anonymity” and lack of identity markers
(social cues) through to very detailed analyses of the performance of or function of social
and cultural categories in digital interaction. Current work where issues of gender
(p. 415) performance or variation are address cover topics as varied as: interpersonal sup
port (e.g., Spottswood et al., 2013), experimenting with identity in various media (e.g.,
Valkenburg & Peter, 2008), variations over time in gender behaviors online (e.g., Kapidzic
& Herring, 2011), gender and politics online (e.g., Vochocová et al., 2016), exposure to
risks online (e.g., Sasson & Mesch, 2016), the feminist examination of mobile and spatial
technologies (e.g., Leszczynski & Elwood, 2015), and many more. The methods and ap
proaches used in this work vary from controlled experiments, statistical models, and so
cio-linguistic analysis through to ethnographic observation, with theoretical approaches
varying from feminist linguistics to cognitive psychology. This all points to the fact that
questions of gender variations, gender inequalities, and the gendered performance of
identity in digital media remain key topics.
Education. As noted earlier, much of the work prior to 2000 on online community fo
cused on workplace and educational settings. This focus remains in the literature studied
here but with a growing focus on the use of social media platforms rather than bespoke
educational systems (e.g., Lampe et al., 2011). That said, a further analysis points to a
methodological reason for the prominence of an educational topics and concepts in the
literature. A very large proportion of the studies undertaken involve university students,
adolescents, and young people. There are a variety of reasons for this, one of the key ones
being that they are usually the early adopters of new digital media.
The focus on young people is extended into studies about the role and use of social media
in protests, social movements, and other types of civic mobilization. Boulianne’s (2015)
meta-analysis of 36 studies of social media and citizen engagement shows that the
strongest relationship between the use of social media and involvement civic or political
activities is by 18- and 24-year-olds. However, given the development media-hybridity
(Chadwick & Dennis, 2017) in political communication, attention is beginning to be fo
cused more on other age groups especially in areas of community, civic and political en
gagement (Wessels, 2018). Very often the focus is not directly on the age groups of those
using social media but rather on the contexts and purposes of use. These include, for ex
Page 23 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
ample, the way social media was used to organize clear-up activities in the 2014 floods in
England (Miller, 2015) and for mapping local social activities.
Summary. Our review therefore suggests that this domain is a relatively well-researched
area yielding reliable findings from a range of disciplines, wide scale surveys, and experi
ments.
It is important to note that only actual use of theory for the purposes of design, synthesis
or analysis were coded. General references to prior work and theory, such as broad refer
ence to “network society” (e.g., Castells) or the general discussion of ideas of “communi
ty” were not coded. This distinction is important as it highlights the use of theory to de
sign and analyze data or synthesize materials, as distinct from more general discussion.
There was considerable variety in the specific theories applied from three main disci
plines. Though there was no substantive clear preference, the most common theories
were:
• Sociological theories (38.1%), including Social network analysis (4%) and Technology
acceptance models (3%)
• Psychological theories (30.9%), including Social identity theory (7%) and Self-catego
rization theory (3%)
• Communications and media theories (19.6%), all identified as “Computer-mediated
communication” approaches
The main research methods were relatively evenly split across surveys (14%), interviews
(14%), literature reviews (14%) and experiments (12%; Table 14.7). The majority of the
empirical work focused on specific groups (e.g., Students or Twitter users) with a limited
number (14.3%) of general population studies (Table 14.8). Less than 3% of studies overt
ly stated that they were using a “big data” approach.
Page 24 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Percent
Percent
Page 25 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Percent
Survey 14.2
Interview(s) 13.5
Experiment 11.5
Ethnography 6.1
Other 2.7
Percent
Delphi Review
The literature review analysis explored the themes to be found within recent research
publications. The following section details the results of the Delphi process for the citi
zenship and politics domain. There were three parts to the Delphi review: an initial sur
Page 26 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
vey, a confirmatory questionnaire to address the findings from the survey, and a confirma
tory workshop. The goal of the Delphi process was to identify and prioritize areas for fu
ture research. These might include areas already covered by literature, but also new con
cerns, or the needs for a tighter focus on a specific issue. The process sought to identify
suggested future scoping or research questions, key topics to address within these ques
tions, and key challenges that might be encountered when researching these questions.
The Delphi review identified a set of scoping questions for the domain. These were coded
into the three categories detailed in Table 14.9. These are listed in order of their initial
and confirmatory survey ranked importance which matched, unlike some other.
Page 27 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 28 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
The consultation workshop noted that online vs offline is too much of a duality, as
(p. 418)
many communities have blended media use, which extensive research also shows. The
workshop also pointed out that the proposed questions from the Delphi survey focused
more on community than identity, and that understanding the relationship between iden
tity and community online is a key current and future research issue. They added that a
more contemporary question might be that of understanding the specifics or different
digital communities, building on the more general work already done. The workshop also
highlighted the challenge of managing identity—pseudo-anonymity, authenticity, actual
anonymity, and genuineness—and has argued that much of the existing research and the
Delphi materials appears to have an overly positive take on digital participation—there is
a need for work on negative aspects and the impacts of forced digital community partici
pation.
The topics within these areas identified in the Delphi review were coded into seven cate
gories. Table 14.10 lists the percentage of responses in each category. Table 14.11 (p. 419)
provides the ranked importance that respondents gave to categories, derived from the
confirmatory survey. There is clearly a strong overlap between both lists in this case, indi
cating that the categories repeatedly identified by respondents were also those they con
sidered most important.
Exclusion/Inclusion 17 Ethics 4
Diaspora 13 Meth 4
ods
Gender/race/ethnicity 13 Norms 4
Power 8 Toler 4
ance
Citizenship 4 Urban 4
Digital labor 4
Page 29 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 30 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 31 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
The consultation workshop noted that these topics were important but already well stud
ied for the majority of digital media. However, they also noted that new digital platforms
lead to new challenges. The workshop also considered the considerable crossover to the
Communication and Relationship domain. Workshop participants also identified potential
gaps in the Delphi topics list, namely: the need to include “social class” as an element of
digital identity, the need for a greater focus on identity rather than demographics, and
that for work with diaspora there is the need to avoid assuming the goal is simply about
national or community integration.
Research Challenges
In regard to the challenges of undertaking research in this area, six categories were iden
tified in the data from the Delphi survey. Table 14.12 lists these categories and their rank
based on the number of coded items, while Table 14.13 shows their ranking based on the
confirmation survey. There is some divergence in the rankings, with methods coming at
the top of the confirmation survey results, but a holistic understanding of online and of
fline behavior as the most frequently mentioned research challenge. In this case, all of
the challenges are also shared with other domains.
Challenge Percent
Representation of outputs 5
Page 32 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 33 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 34 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
The consultation workshop dug a little deeper into these lists and identified specific fur
ther challenges for research in this domain, namely:
(p. 421)
In conclusion, as with the other domains, we believe that the complexity and variety of
potential work warrants consideration to be taken of all the question, topics, and chal
lenges identified. While noting this, we would argue that the analysis here has identified
the following key areas for future research:
In sum, key domain-specific challenges are around the holistic understanding of online
and offline behavior within citizens’ lifeworlds.
Conclusion
What appears as a new concern in the Delphi materials that is not as present in the litera
ture is a range of concerns associated with issues of inequality in both access to and par
ticipation in online communities. The proposed research areas may typically probe
whether digital processes can include or exclude certain individuals/groups/communities
and if differences within and amongst these, whether physical, social, political or cultural,
have a negative bearing on the dynamics of inclusion and exclusion. The review high
lights that questions about identification, intersectionality, and tackling of systems of dis
crimination or disadvantage are of primary importance in understanding contemporary
processes of “digital opt out” and “digital opt in.” This contrasts with much early work
Page 35 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Overall we argue that the following issues need to be addressed. First, there should be
more comprehensive research into identity and community to generate a deeper under
standing of computer mediated communication (CMC) in terms of how, why, and where
individual identities are formed. Second, what is important to communities (digital, face-
to-face, or more likely blended) is the way digital services feature in community life.
Third, we need to improve our understanding of how online systems can be better de
signed to support communities. Fourth, research on understanding and analyses of the
dynamics of various types of online communities should beyond the knowledge gained in
the late 1990s and early 2000s. Fifth, research is needed in issues around digital skills
and how different communities or groups are impacted by linguistic and cultural specifici
ties, and the ways in which they engage with and utilize digital technologies. Sixth, an in
vestigation of digital diasporas, including their cultural, social, and political configura
tions and transformations of and through digital connectivity, is required. For example,
more research is needed about connected migrants—how migrants and refugees are us
ing digital technologies to connect with others, to find their place in the world, and to de
velop skills for employment and integration. Seventh, we need to understand how partici
pation in digital communities influences collective action, either from among members of
that community, or by members engaging collectively beyond those communities. Finally,
we need more critical analysis of online participation, i.e., what it means for individuals,
social groups, and society and is it empowering, exploitive, or both?
Existing research has employed fairly traditional methods such as surveys and interviews.
It is orientated towards psychological and sociological approaches, with some Informa
tion studies research. The work does not appear to have extensively employed digital
tools and big data methods, though those approaches are becoming more prominent.
Most notably the work appears to have been less “platform driven” or “platform specific,”
but does tend to emphasize children and younger people.
Moreover, the future research scopes identified in the Delphi process are substantially
similar: Community membership and processes, defining identity online, and understand
ing remote relationships. While this has remained relatively constant, the notable shift is
in the topics and challenges identified. As with other domains, there is a shift away from
technology and platform foci to broader social science questions, though there remain
some overlapping areas. As noted in the confirmatory workshop discussion, there is a
greater concern with the negative aspects of online identity and community. As with the
Communication and Relationships domain, there is a concern to look at multi-platform or
“holistic” aspects of digital media use. Suggested future topic areas include: digital com
munity exclusion/inclusion, digital community participation, action and social change,
power in online communities, understanding global diaspora as digital communities, and
Page 36 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
References
Borah, P. (2017). Emerging communication technology research: Theoretical and method
ological variables in the last 16 years and future directions. New Media & Society, 19(4),
616–636.
Boulianne, S. (2015). Social media use and participation: A meta-analysis of current re
search. Information, Communication and Society, 18(5), 524–538.
Chadwick, A. & Dennis, J. (2017). Social media, professional media and mobilization in
contemporary Britain: Explaining the strengths and weaknesses of the citizen’s move
ment 38 Degrees. Political Studies, 65(1), 931–950.
De Souza, C. S. & Preece, J. (2004). A framework for analyzing and understanding online
communities. Interacting with Computers, 16(3), 579–610.
Hiltz, S. R. & Turoff, M. (1978). Network nation: Human communication via computer.
Boston, MA: Addison-Wesley.
Katz, J. E. & Aakhus, M. (Eds.). (2002). Perpetual contact: Mobile communication, private
talk, public performance. New York, NY: Cambridge University Press.
Katz, J. E., Rice, R. E., Acord, S., Dasgupta, K., & David, K. (2004). Personal mediated
communication and the concept of community in theory and practice. In P. Kalbfleisch
(Ed.), Communication and community, communication yearbook 28 (pp. 315–370). Mah
wah, NJ: Erlbaum.
Kraut, R. E. & Resnick, P. (Eds.) (2011). Building successful online communities: Evi
dence-based social design. Cambridge, MA: MIT Press.
Lampe, C., Wohn, D. Y., Vitak, J., Ellison, N. B., & Wash, R. (2011). Student use of
(p. 424)
Leszczynski, A. & Elwood, S. (2015). Feminist geographies of new spatial media. The
Canadian Geographer/Le Géographe Canadien, 59(1), 12–28.
Page 37 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Ling, R. (2004). Just connect The social world of the mobile phone. Psychology Review,
11, 10–13.
Livingstone, S. (2003). Children’s use of the Internet: Reflections on the emerging re
search agenda. New Media & Society, 5(2), 147–166.
Livingstone, S. & Görzig, A. (2014). When adolescents receive sexual messages on the in
ternet: Explaining experiences of risk and harm. Computers in Human Behavior, 33, 8–15.
Mason, R. & Kaye, A. (Eds.). (1989). Mindweave: Communication, computers, and dis
tance education. Oxford, UK: Pergamon.
Mossberger, K., Tolbert, C. J., & Hamilton, A. (2012). Measuring digital citizenship: Mo
bile access and broadband. International Journal of Communication, 6(37), 2492–2528.
Mynatt, E. D., Adler, A., Ito, M., & O’Day, V. L. (1997, March). Design for network commu
nities. In Proceedings of the ACM SIGCHI conference on human factors in computing sys
tems (pp. 210–217). ACM.
Panagakos, A. N. & Horst, H. A. (2006). Return to Cyberia: Technology and the social
worlds of transnational migrants. Global Networks, 6(2), 109–124.
Postmes, T., Spears, R., & Lea, M. (1998). Breaching or building social boundaries? Side-
effects of computer-mediated communication. Communication Research, 25(6), 689–715.
Putnam, R. D. (2000). Bowling alone: The collapse and revival of American community.
New York: Simon and Schuster.
Rainie, L., & Wellman, B. (2012). Networked. The new social operating system. Massa
chussets: Massachusetts Institute of Technology.
Sasson, H. & Mesch, G. (2016). Gender differences in the factors explaining risky behav
iour online. Journal of Youth and Adolescence, 45(5), 973–985.
Spears, R., Lea, M., Corneliussen, R. A., Postmes, T., & Haar, W. T. (2002). Computer-me
diated communication as a channel for social resistance: The strategic side of SIDE. Small
Group Research, 33(5), 555–574.
Page 38 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Spottswood, E. L., Walther, J. B., Holmstrom, A. J., & Ellison, N. B. (2013). Person-cen
tered emotional support and gender attributions in computer-mediated communication.
Human Communication Research, 39(3), 295–316.
Steinfield, C., Ellison, N. B., & Lampe, C. (2008). Social capital, self-esteem, and use of
online social network sites: A longitudinal analysis. Journal of Applied Developmental Psy
chology, 29(6), 434–445.
Subrahmanyam, K., Greenfield, P., Kraut, R., & Gross, E. (2001). The impact of computer
use on children’s and adolescents’ development. Journal of Applied Developmental Psy
chology, 22(1), 7–30.
Turkle, S. (1984). The second self: Computers and the human spirit. New York,
(p. 425)
NY: Harper-Collins.
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York, NY: Si
mon & Schuster.
Valkenburg, P. M. & Peter, J. (2009). The effects of instant messaging on the quality of
adolescents’ existing friendships: A longitudinal study. Journal of Communication, 59(1),
79–97.
Wellman, B. & Haythornthwaite, C. (Eds.) (2002). The Internet in everyday life. Hoboken,
NJ: Blackwell Publishing.
Wellman, B. & Rainie, L. (2014). Networked: The new social operating system.
Cambridge, MA: The MIT Press.
Wright, K. B., Rosenberg, J., Egbert, N., Ploeger, N. A., Bernard, D. R., & King, S. (2013).
Communication competence, social support, and depression among college students: A
model of Facebook and face-to-face support network influence. Journal of Health Commu
nication, 18(1), 41–57.
Zuboff, S. (1988). In the age of the smart machine: The future of work and power. New
York, NY: Basic Books.
Page 39 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Notes:
(1.) As part of the review, the Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high-frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/ provides ac
cess to the top 50 most frequently occurring pairs and trios through a series of data visu
alizations. Click on View Data Visualisations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
ticles at the top. Also, see https://waysofbeingdigital.com/literature-analysis-interactive-
results/ for interactive visualizations with mouse-overs of the main clusters of concepts
within each domain, and the relative frequency of concepts associated with each cluster.
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
Page 40 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Jordana Blejmar
Bridgette Wessels
Claire Taylor
Claire Taylor is Gilmour Chair of Spanish and Professor of Hispanic Studies at the
University of Liverpool. She is a specialist in Latin American literature and culture
and has published widely on a range of writers, artists, and genres from across the
region. Her particular geographical areas of interest are Colombia, Argentina, and
Chile, although she also worked on literature, art, and culture from other regions.
Within Latin American Cultural Studies, she takes a particular interest in the varied
literary and cultural genres being developed online by Latin(o) Americans, especially
hypertext novels, e-poetry, and net art. She has published numerous articles and
book chapters on these topics, and she is the co-author of the recent volume Latin
American identity in online cultural production (New York: Routledge, 2012) and au
thor of the recent monograph Place and politics in Latin America digital culture: Lo
cation and Latin American net art (New York: Routledge, 2014). She is currently
Page 41 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Communities and Identities
Page 42 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.13
This chapter reviews prior work on technology acceptance and then reports on a national
ly representative survey of UK employees exploring both employee’s personal experi
ences of digital technologies at home and work and their evaluations of the effectiveness
of the technologies and the “digital culture” in their organization. Presenting the results
of 3040 UK workers, it seeks to explore the factors that influence digital roll-outs by fo
cusing on the experiences and perceptions of the UK workforce as a whole, with the ex
pectation that introducing new technology alone isn’t enough. This research explores how
“digitally ready” organizations are in the UK in terms of people, processes, and company
culture. It concludes that a large proportion of the UK workforce are not seeing the bene
fits of digital technologies. Importantly, there is a need for organizations to understand
that making digital solutions a success is a process of cultural change in their organiza
tion.
Keywords: cultural change, digital culture, digital roll-outs, digital solutions, digital technologies, UK employees,
UK workforce
Introduction
THE study of technology acceptance has generally focused on single technologies in spe
cific contexts, be that home, work, or a business sector. This chapter addresses the broad
er question of technology acceptance across the UK workforce as a whole. In doing so the
chapter tries to understand the non-technical barriers to UK industry taking up digital so
lutions. Over the last 60 years there have been repeated cases of digital technologies
causing substantive disruption to business practices and markets, often with both nega
tive and transformative impacts on those businesses and markets (e.g., email, Internet, or
office software, and more recently, iTunes and Uber). Predicting such disruptions is com
plex, and at times impossible. However, the digital sector itself argues that 25% of com
panies are likely to have their business, organizational structures, or work practices dis
rupted by digital solutions over the coming three years (Bradley et al., 2015; Brecher et
Page 1 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
al., 2016). This chapter is not focused on predicting such transformations, but rather
seeks to understand the broad organizational factors that might impact the ability of busi
nesses and institutions to respond to digital change. Tied to this is the fact that digital
technologies pervade the home as much as work. In everyday life, the ease of use of such
things as smart phones and apps gives the impression that the public, that is the work
force, can easily take on new technologies. Ensuring the engagement of the workforce is
essential when organizations are actively trying to prepare for digital (p. 370) disruption,
or to implement new digital solutions (Edwards & Ramirez, 2016; Reynolds, 2015). This
leads to questioning the extent to which organizations can rely upon digital skills trans
ferring from domestic or non-work settings to the workplace.
The public and media perception of the UK as a technologically and digitally engaged so
ciety masks a far more complex and less optimistic reality. This is very much the case for
personal digital media use, with considerable class and age differences in access and use
(see Yates et al., 2015; Yates & Lockley, 2018; and Chapter 15 in this volume). As prior re
search on commercial organizations has found, a large proportion (43%) of businesses
have yet to respond at a leadership or board level to the disruption that digital technolo
gies may bring to their sectors (Loucks et al., 2016). Others have found that around 30%
of UK SMEs are not online or using the Internet in very limited ways (Lloyds Bank, 2017).
One link between these home and work issues has been the focus of much government
policy on closing the digital divide by ensuring digital access at home (see GOV.UK, 2014:
Digital Inclusion Strategy). This is in part because it is assumed that digital skills at home
will transfer to other aspects of citizens’ lives. The digital divide at work, both between
organizations and their workers, has not been a major concern until recently—for exam
ple, moves to bring coding to the curriculum and the identification of substantive IT skills
gaps in the workforce. A future research and policy challenge is to understand access to
and use of digital in UK small and medium sized enterprises (SMEs).
As an initial step in understanding these issues, this chapter reports on a national survey
of UK employees of all grades and sectors. This survey explores employees’ personal ex
periences of digital technologies at home and work, their evaluations of the effectiveness
of the technologies, and the digital culture in their organization. In some research (Robey
& Azevedo, 1994), much digital industry marketing, and more general media coverage,
digital technologies are claimed to be quick and efficient fixes to complex organizational
issues (Lloyds Bank, 2017). This, along with potential digital transformations and issues
of access, use, and skills creates considerable challenges around ensuring the success of
digital technologies in the workplace. Such challenges raise questions about which orga
nizations are best able to manage such change, as well as the types of organizations and
the economic sectors that are engaging with new digital solutions. Questions considering
the major barriers to uptake are also important—especially practical challenges such as
finances and legacy systems, or issues of leadership, vision, and organizational culture.
By taking a national workers’ perspective, this chapter fills a gap identified in research
that looks into attitudes to digital technology acceptance. It explores the factors that in
fluence digital roll-outs by focusing on the experiences and perceptions of the UK work
Page 2 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
force as a whole with the expectation that introducing new technology alone is not
enough.
This chapter presents a review of approaches to technology uptake and applies the ideas
to the survey of 3040 UK workers, and is divided into eight sections. The background to
the report, including prior academic work concerning technology acceptance and the
framing of the research questions, is presented in section two. Section three examines
which organizations are rolling out new digital solutions, analyzed by sector and by orga
nization size. Section four examines the UK workforce’s experience with and use of digi
tal technologies at home. The experience of digital technologies and their implementation
at work by (p. 371) organization sector and size follows in section five. Section six further
explores the communication channels used by organizations when rolling out new digital
solutions. Section seven examines the UK workforce’s experience of organizational barri
ers to the implementation of digital solutions. Section eight develops a statistical model of
the most important factors that influence perceptions of the success (or not) of new digi
tal solutions, based upon the results from the previous sections. The chapter ends with an
overall summary, the importance of culture and strategy, and final conclusions including
the role of leadership.
• Perceived usefulness—the extent to which a worker or home user believes that using
a technology would enhance the task they are engaged in
• Perceived ease-of-use—the extent to which a worker or home user believes that using
a technology would be free from substantive effort
These two issues have been measured in a variety of ways in a range of studies (Adams,
et al., 1992; Segers & Grover, 1993; Szajna, 1994). Many of these studies have a very indi
vidualistic focus—they look at the motivations and rational behaviors of individual users.
The organizational or personal situation of users is a context in which they engage with
the technology. More recent research by Venkatesh and Davis (2000) has identified four
factors to explore:
Page 3 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
• Social influence is the degree to which an individual perceives that important others
believe he or she should use the new system.
• Facilitating conditions are the degree to which an individual believes that an organi
zational and technical infrastructure exists to support use of the system (Venkatesh &
Davis, 2000).
This chapter considers the role of context as well as personal factors implicit in these four
factors. It therefore explores how personal attitudes, use, and confidence mix with orga
nizational culture to influence attitudes to digital technologies at work.
This research has looked at the issue across a national sample of the UK work
(p. 372)
force, whereas technology acceptance models have tended to be applied to specific case
studies. These are mainly studies of the uptake of technologies by specific organizations,
from SME’s to large corporate organizations (Bruque & Moyano, 2007; Fitzgerald et al.,
2013). The majority of case studies are also focused on one single technology (e.g., social
media; Abduwaila & Ali 2013; Rauniar et al., 2014), or sector (e.g., healthcare; Cresswell
& Sheikh, 2013; Xie et al., 2013, or ICT and telecommunications; Barnes, 2012). This
chapter therefore presents a unique national picture of the issues, challenges, and best
practice around digital technology uptake and acceptance by the UK workforce.
Making use of the technology acceptance approach described above, a set of personal
and work factors that could be assessed were identified. Often ease of use, expected ease
of use; performance, and effort are measured in relation to specific technologies. The UK
workforce is today exposed to as many if not more technologies at home as they are at
work. It was therefore important to assess different aspects of home and work use: from
confidence, to the types and range of digital technology use. The survey questions about
the UK workforce’s personal use across home and work included
Page 4 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
What is meant by “the roll-out of digital solutions”? Often the focus is on high end, big
ticket, or disruptive digital technologies such as cloud solutions, social media, and mobile
applications. The UK workforce is more likely to encounter a wider range of business-crit
ical systems such as clocking on tools, or regulatory compliance tools. Considering this,
the following was articulated to all of the respondents at the start of the survey:
(p. 373)
The survey included Table 13.1 to provide examples and a reference point for respon
dents.
Page 5 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
The survey comprised 3040 online interviews with UK employees aged 16 and over. Data
was gathered between April 12 and 16, 2016. The survey was a nationally representative
structured sample of UK employees based on an existing panel managed by Censuswide
(www.censuswide.com). The survey was designed by the authors and administered by
Censuswide.
Page 6 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
• Ordinal and ratio data relations were subjected to bivariate correlation analyses, us
ing both Pearson and Spearman methods as appropriate.
• Comparison of ordinal and ratio data by category was undertaken using General Lin
ear Modelling (ANOVA, MANOVA).
(p. 374) • Home use data was grouped using the K-means Cluster method.
• The overall regression model was developed using SPSS Automatic Linear Modelling.
• Significance levels were set at p < .05, and for multiple tests significance levels were
set using the Bonferroni method
As the survey covered a representative sample of the UK workforce, this includes people
who do not use digital technologies at work, and those who have not seen any new digital
tools at work for quite some time. Indeed, overall 29% of the surveyed workers were not
aware of digital solutions being rolled out in their organizations. This number is in line
with prior research that found over 30% of SMEs were not online and not using many, if
any, digital tools (Lloyds Bank, 2017). Taking a binary measure of workers’ experiencing
digital rollouts (or not), employees of smaller organizations were statistically significantly
more likely to indicate that they had not experienced digital rollouts (see Figure 13.1;
one-way ANOVA, Welch (1, 3039) = 1384.6, p < .001, with a medium effect size (η2 [eta
squared] = .54)).
Page 7 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
The size of an organization might influence the number of digital solutions that the UK
workforce encounters. Looking at the number of new digital solutions the UK workforce
has reported, there is a statistically significant difference in relation to the size of organi
zations (one-way ANOVA, Welch (6, 2369) = 800.6, p < .001, medium to large effect size
(η2 = .11), with the average company size for no roll-outs being 50–99 employees. Those
working in organizations of 100 or more people are more likely to have encountered three
or more new digital technologies over the last two years than those in smaller organiza
tions (see Figure 13.2 and Table 13.2).
Page 8 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
None 50–99
One 100–249
Many 250–500
(p. 375) While more than 60% of the UK workforce in all sectors had knowledge of
(p. 376)
a digital solution roll-out in their organization, there are statistically significant differ
ences between the most active and least active sectors in terms of undertaking any digi
tal roll-outs (chi-square test, χ2 (13, 3039) = 93.75, p < .001, small to medium Cramer’s V
= .18). Comparing proportions (z-tests at p < .05 with Bonferroni adjustment), the work
force in the Other, Retail, and Catering & Leisure sectors were the least likely to see new
digital solutions. Not surprisingly, IT and telecoms, followed by Finance and by Profes
sional services, were statistically the most likely (see Figure 13.3).
The number of roll-outs the UK workforce has experienced at work in the last two
(p. 377)
years also significantly varies across sectors. The same sectors as above are statistically
more likely to have new digital solutions than the other sectors (see Figure 13.4; one-way
ANOVA, Welch (13, 2369) = 8.85, p < .001, small effect size (η2 = .05)).
Page 9 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
The survey also asked if the UK workforce had seen an increase in the number of digital
solutions deployed in their industry in the last two years. Employees of smaller organiza
tions were statistically less likely to report this (one-way ANOVA, Welch (2, 3040) = 16.5,
p < .001), but the effect size was very small (η2 = .01). There are some statistical differ
ences by sector (χ2 (13, 2616) = 37.53, p < .001, small to medium Cramer’s V = .12).
Based on comparing proportions (z-tests at p < .05 with Bonferroni adjustment), workers
in the IT & Telecoms sector were statistically most likely to indicate they had seen an in
crease in new solutions, while workers in the Other and in the Travel and transport sec
tors were the least likely (see Figure 13.5).
Page 10 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
(p. 378) Reasons for Digital Roll-outs, by Organizational Size and Sec
tor
Respondents who had experienced digital roll-outs were asked what they thought the
organization’s goals or reasoning had been for the implementation. The three main rea
sons given by the UK workforce were to cut costs, automate processes, and improve pro
ductivity (see Figure 13.6).
Page 11 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
There were some statistical differences by company size (χ2 (54, 9296) = 190.50, p < .
001, small to medium Cramer’s V = .12). Comparing proportions (z-tests at p < .05 with
Bonferroni adjustment), we find that workers in organizations with more than 500 em
ployees were statistically most likely to point to automation of processes. Those in organi
zations with 50 to 249 employees were more likely than those in larger organizations
(p. 379) to point to meeting regulatory requirements as a key reason, while those in orga
nizations with under 50 employees were less likely to point to regulatory requirements.
Similarly, there were differences between sectors that indicate workers in these areas un
derstood the different business contexts for digital solutions (χ2 (117, 15,063) = 288.62, p
< .001, small to medium Cramer’s V = .14). Comparing proportions (z-tests at p < .05
with Bonferroni adjustment):
• The HR, Manufacturing & Utilities, and Professional sectors were slightly more likely
to think the goal is to make the business more competitive
• The Health Care sector was slightly more likely to see the goal as being to meet reg
ulatory requirements
• The Other sector was more likely to be unsure of the reason for rollouts.
Both organizational size and sector are statistically linked with the UK workforce’s expe
rience of new digital solutions in their organizations. Workers in smaller SMEs were less
likely to encounter new digital solutions whereas workers in organizations with more
than 100 employees are more likely to encounter digital solutions being implemented.
Workers in the Professional and Technology sectors were more likely to have seen digital
solutions implemented in their organization. The rate of roll-outs was also influenced by
sector.
Page 12 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Confidence and Use at Home and at Work
UK workers generally felt confident in technology use at home (Table 13.3), and the ma
jority liked to have new technology at home (Table 13.4).
Using similar questions to Ofcom’s Media Literacy Survey (2016), Yates et al.
(p. 381)
(2015) identified five factors underlying the Ofcom Internet use questions. The current
survey deployed the five questions most strongly associated with the factors found by
Yates et al. Reponses to these were then subjected to a cluster analysis. Clustering Ofcom
respondents by their factor scores, Yates et al. identified seven categories of users. How
Page 13 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
ever, due to the lack of unemployed and retired respondents in our sample, it was not
likely we would find the same number of clusters.
The analysis undertook a two-stage approach to clustering the data. The first step used a
standard hierarchical cluster analysis under SPSS. As the factors were z-scores, a
squared Euclidean distance measure of cluster separation under Wards clustering
method was used. The final 10 steps of the analysis showed clear breaks in the rate of
change of the cluster coefficient scores at two, three and six clusters. Descriptive analysis
of the means for a two-cluster solution indicated that the clusters separated limited users
from the rest of the sample. Six clusters provided a more informative set of user types
than three and is therefore used here. The cluster analysis was therefore re-run with the
k-means cluster technique applied to the data with a target of six clusters and iterations
repeated until results converged. Table 13.5 presents the mean z-scores for our five fac
tor associated measures at the centroids of the clusters, and potential descriptors for
these groups.
Page 14 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Use Only social Social me General me Politically Very limited Non-politi
media users dia and dia only active ex users cal exten
general me users tensive sive users
dia users users
Page 15 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 16 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
As with the Ofcom analysis, older people were statistically more likely to use the internet
less at home and be Very limited users, General media users, or Only social media users
(one-way ANOVA, Welch (5, 2982) = 97.89, p < .001, large effect size (η2 = .13)). Also,
those in Senior manager/Professional roles were statistically more likely to be Politically
active extensive users or Non-political extensive users (χ2 (40, 2982) = 222.35, p < .001,
small to medium effect size, Cramer’s V = .12, comparing proportions (z-tests at p < .05
with Bonferroni adjustment)). The sample matches closely the national picture with re
gard to access, use, and confidence at home.
We next examine how home use and confidence is associated with attitudes and confi
dence at work. The survey directly asked about confidence in ICT use at work. Overall,
the (p. 382) UK workforce felt fairly effective in their use of digital tools at work. There
are no major statistical variations by sector or size of organization. As noted above, feel
ing effective in your use of technology is one of the key elements of technology accep
tance. These are of course responses from those workers who have experienced digital
technologies at work.
A key research question considered if home and work confidence were related. The claim
is that there is transference of digital efficacy from home to work and vice versa. In fact,
it was found that work and home confidence are only weakly statistically correlated. Giv
en that it is often claimed that younger people have greater digital skills, it was possible
that age might be a complicating factor, with young people being confident at work and
home, and older people less so. Again, though younger people are slightly more likely to
be confident with digital at home, this is a very weak statistical difference. The link is
even weaker for workplace confidence. Overall less than 1% (age) and 6.5% (home confi
dence) of the variance is explained in these correlations with respondents’ confidence
scores at work (see Table 13.6). In fact, type of work is a better predictor of (p. 383) confi
dence with digital than is age. Self-identifying knowledge workers in the survey had a sta
tistically much higher workplace confidence with digital technologies than did non-knowl
edge workers (one-way ANOVA, Welch (1, 2825) = 355.80, p < .001, very large effect size
(η2 = .83)). In contrast, level of employment was no better a predictor of workplace confi
dence than were age or home (weak correlation, r = .18, p < .01, two-tailed).
Page 17 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Age — —
Summary
The sample in this survey appears to contain similar user types to that of the annual UK
national Ofcom survey of Internet use. As with the Ofcom data, age and level of employ
ment were statistically linked to user types. Within the data, workplace confidence and
home confidence were not strongly linked: organizations cannot assume that their work
force will gain the digital skills they need from home use. Additionally, although younger
people are slightly more confident than older people in their use of digital at home and
work, this is not a substantial difference. The type of work (being a knowledge worker) is
more important in relation to workplace confidence than the level of employment.
Those workers who indicated that they handle knowledge and information in their work
had seen statistically significantly more roll-outs in their organization than other workers
(see Figure 13.7; one-way ANOVA, F (1, 2369) = 112.50, p < .001, medium effect size (η2
= .06)).
Page 18 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
In terms of attitudes to the number of roll-outs, there was no statistical variation by sec
tor. Overall 65% of the UK workforce who had experienced roll-outs thought the number
of roll-outs “were about enough.” Though there are no major statistical differences
between sectors in UK the workforce’s perceptions of successful roll-outs (see
(p. 384)
Figure 13.8), a third of workers who experienced roll-outs think that only some, few, or
none of these were successful. Importantly, as argued in regard to technology accep
tance, perceptions of the success of digital roll-outs are essential to their uptake and ac
ceptance and vice versa. The analyses in earlier sections indicate that 29% of UK workers
believe they have not seen new digital solutions at work. A third of the UK workforce be
lieving that the majority of digital roll-outs they experienced were not successful presents
a significant challenge to both UK business organizations but also to the suppliers and de
velopers of solutions. Predicting this measure of perceived success from aspects of orga
nizational culture, constraints, and communication methods will be discussed below.
Page 19 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
(p. 385) Experiences and Opinion of Roll-Outs by Job Position
Looking at the job position (level of employment) of the UK workforce, those in most pro
fessional management roles, and directors, are more likely to have experienced digital
roll-outs than other workers (see Figure 13.9, χ2 (8, 2982) = 213.94, p < .001, small to
medium effect size, Cramer’s V = .27, comparing proportions (z-tests at p < .05 with Bon
ferroni adjustment)).
The survey asked workers if the new digital technologies that had been brought to their
company had made a positive or negative impact on their job role. Figure 13.10 shows the
percentage of the respondents noting each statement.
Page 20 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Of the set of 10 possible positive impacts only three were statistically significantly associ
ated with the belief that roll-outs had been successful (univariate GLM, overall F(10,
1975) = 17.05, p < .001):
• It made it easier to do my job: (F(1, 1975) = 51.92, p < .001, small effect (ηp2 =.03))
• It made it quicker to do my job: (F(1, 1975) = 10.73, p < .001, small effect (ηp2 =.01))
• It streamlined internal processes: (F(1, 1975) = 11.98, p < .001, small effect (ηp2 = .
01))
(p. 386) This would imply that technologies that ensure these three impacts on workers’
job experience are more likely to be perceived as successful by the workforce. This fits
with the technology acceptance model described above, as perceived usefulness was a
key factor in acceptance.
Page 21 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
In the case of the eight possible negative impacts (Figure 13.11), two issues were statisti
cally significantly associated with a more negative attitude to digital rollout success (uni
variate GLM, overall F(8, 1975) = 14.43, p < .001):
• It made it harder to do my job (F(1, 1975) = 4.96, p < .023, very small effect (ηp2 = .
003))
• It disrupted internal processes already in place (F(1, 1975) = 13.38, p < .001, very
small effect (ηp2 = .007))
This implies that complex systems that disrupt existing process are less likely to
(p. 387)
be seen as successful by the UK workforce. This fits with the technology acceptance mod
el described above as perceived lack usefulness was a key factor in rejection of technolo
gies.
Before looking at how all the personal and workplace factors contribute to influence the
attitudes of the UK workforce to digital technologies, some conclusions can be drawn.
The UK workforce was predominantly digitally engaged: 83.6% stated that they have
(p. 388) confidence in their home use of digital technologies. The UK workforce were also
inclined to accept digital technologies in the workplace, with 45% stating that at least
half of their working day is spent using digital technology of some kind. Two thirds (67%)
of the respondents stated that digital technology has had a positive impact on the way
they work, with 56% saying it had made their job quicker and 50% saying it had made
their job easier. People are also pragmatic about being digital in the workplace: most
(65%) thought that the number of new digital services that had been rolled out in the past
Page 22 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
two years was just about right. Respondents who had experienced between three and five
roll-outs were the most positive. Workers also understood why their employers were im
plementing these services, with 58% stating it was to make the organization more pro
ductive, 51% to cut costs, and 47% to automate tasks. However, workers want a dialogue
on digital technologies: 64% said they were not all consulted prior to the provision of new
digital technologies, and 57% said they would have liked more information on how to use
new digital technologies, while 40% stated that the digital technology was not explained
effectively to them.
• Access to hardware
• Connectivity
• Legacy systems
• Financial pressures
• Leaders prioritizing digital
• Not seeing the significance of digital
• Resistance to digital within areas of the organization
• Need for training
Page 23 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
(p. 389) Sector is statistically associated only with organizational resistance, and
(p. 390)
need for training. In both cases this arises from small differences between the technology
intensive and organizational change sectors (IT, Architecture and HR) and the rest of the
UK workforce.
The levels of organizational challenges were compared to whether workers thought that
roll-outs were successful. Not surprisingly, workers who thought most or all solutions
were successful work in organizations with fewer challenges (see Figure 13.13).
Page 24 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Communication and Leadership
Communication channels. The survey also explored what methods organizations had
used to communicate with the workforce about the implementation of new digital tech
nologies. The four main methods were (see Figure 13.14).
• Email
• Face-to-face
• Dedicated training sessions
• Company intranets
The only statistically significant difference across the sectors was that the Profes
(p. 391)
sional services sector was more likely to use company intranets than were the other sec
tors.
Page 25 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Leadership. Four questions related to leadership around digital technology uptake in the
organization. Two questions were about positive aspects of leadership such as vision and
consultation, and two were about the absence of leadership around digital uptake and
planning. Combining these into an overall leadership score, there is a strong statistical
Page 26 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
relationship between high leadership scores and workers seeing digital roll-outs as being
successful (ANOVA, Welch (5, 159) = 25.84, p < .001; see Figure 13.17).
(p. 392) Some sectors demonstrated significantly much higher levels of digital
(p. 393)
leadership as perceived by the workforce (ANOVA, Welch (13,447) = 4.03, p < .001; see
Figure 13.18).
Summary
Three main conclusions can be drawn from the results presented in this section. First, the
UK workforce identifies several traditional practical barriers to digital solutions—from fi
nances to organizational structures. These challenges vary by organizational size and sec
Page 27 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
tor. Second, internal communication is key to employees’ perceptions of digital technolo
gies, both in terms of the specifics of a new digital solution and the overall approach and
vision of digital technologies for the organization. Third, leadership is key to ensuring
that the workforce perceives digital roll-outs as successful. These may seem somewhat
obvious and good practice, but it is important to remember that digital technologies are
often introduced to “solve” organizational challenges, perhaps being seen as the “magic
silver bullet,” when in fact successful digital roll-outs occur where these (p. 394) broader
organizational, leadership, and environment issues are already being addressed: in short,
where organizational culture supports implementation of digital technologies.
In the survey, 27 questions addressed workplace culture, organizational issues, and per
sonal confidence and use at both home and work. In order to make better sense of this
data and to identify underlying issues, all the items were entered into an exploratory fac
tor analysis.
All items were suitable, having correlation coefficients above.3 and communalities above .
3. The Kaiser-Meyer-Olkin value was .91, above the recommended value of.6 and
Bartlett’s Test of Sphericity was significant (χ2 (351) = 24519.03, p < .001). The PCA re
vealed the presence of four factors explaining 33.9%, 12.5%, 6.1%, and 5.5% of the vari
ance, respectively. The rotated solution indicated a relatively simple structure showing
strong loadings and all but one of the variables loading substantially on only one compo
nent (> 0.4). There was relatively weak correlation between factors (r < .30) except for
factors 1 and 4 (r = .59). These four factors were therefore retained and factor scores
were calculated using the Anderson-Rubin method. Table 13.7 provides the items, factors,
and loadings. The four factors appear to measure:
Page 28 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 29 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Item 1 2 3 4
Page 30 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 31 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 32 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 33 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 34 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 35 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 36 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
A Model of Factors Leading to Perceived Success in Digital Technolo
gy Implementation
It is now necessary to explore how all these issues work in combination. There are four
areas of the UK workforce’s experience and attitudes that might affect their perceptions
of digital roll-outs:
• Personal confidence at home (this is measured by the factor score; it is also useful to
include other personal aspects such as gender, age, job type, and level of home use)
• Personal confidence at work (this is measured with a survey question; it is also possi
ble to include other work aspects such as being a knowledge worker and level of em
ployment)
• Organizational factors (measured using the factor score; some other organizational
issues such as the size and sector of the organization can also be included)
• Organizational cultural factors (this can be measured using the positive and negative
culture factor scores)
It was also noted previously that there is a strong correlation between perceptions of use
fulness and the UK workforce’s belief that digital roll-outs were successful. Therefore,
this has been used as a measure of engagement with digital technologies.
As this was an exploratory analysis of the data, we undertook an All Possible Regressions
or Best Subsets Regression approach. Though there is debate over this approach, it has
been recommended by scholars in a number of recent statistical methodology texts (such
as Chatterjee & Hadi, 2015; Montgomery et al., 2012). All of the measures discussed in
the previous sections were therefore placed into an Automatic linear regression under
IBM SPSS. The analysis therefore develops a model providing the highest R2 solution.
This allows us to assess how much each factor affects the proportion of perceived roll-
outs seen as being successful.
The regression analysis produced a model that predicts 27% of attitudes to digital roll-
outs. This is a reasonably robust result in the context of social research—especially given
the complexity of the social and work context being studied. Within the model the follow
ing factors were most important: Confidence with ICT at work; Positive digital culture at
work; and Negative digital culture at work. Table 13.8 and Figure 13.19 present the key
features of the model.
Page 37 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal and Organizational Factors
Page 38 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
It is notable that confidence at work is the most important predictor here, and home con
fidence the least. Though statistically significant, home confidence explains barely 1% of
the variance, compared to 40% for work confidence. Positive cultural factors also out
weigh the (p. 397) (p. 398) impact of negative ones (26% to 13%). Issues such as organiza
tional sector, age, and company size are associated with the outcome but only by a small
amount (3% to 6%).
Positive attitudes to digital in the workplace are driven mainly by issues that organiza
tions can address:
There are, of course, practical problems to overcome, but these are secondary to the
workplace culture issues, with some sectors having greater challenges than others. Key
challenges perceived by workers are finances, connectivity, and legacy systems. Personal
factors such as gender, level of employment, home use, and being a knowledge worker,
though they show a significant association with perceptions of roll-outs, are not, in this
model, the major factors in predicting attitudes to digital roll-outs. Importantly, home con
fidence with digital technologies does not seem to spill over to positive attitudes at work.
Page 39 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
The implication for organizations is that they can shape the success of their digital roll-
outs. Organizational cultural factors outdo many traditional practical constraints. As the
technology acceptance models argue, linking the personal to the wider organization con
text is key:
• Ensuring that workers feel confident in their use of technologies through good train
ing and confidence in the leadership team through good communication
• Providing the organization with a well communicated clear digital vision
• Taking organizational pride in the adoption of digital technology
• Taking time to match digital solutions to worker expectations
• Valuing the contributions of workers and consulting employees prior to the provision
of new digital technologies
• Ensuring that digital solution use is built into staff development and rewards systems
These recommendations may seem like good “common sense,” but to take this approach
to digital technology solutions is in fact to turn the telescope around and look at the prob
lem from the opposite angle. Very often digital solutions are brought into organizations to
solve challenges that the organization faces. They are implemented to make things better
in and of themselves. However, instead they need to be considered just one part of an
overall process of culture change to address the challenges being faced—the integration
of digital technologies is only part of the solution. If organizations fail to address the cul
tural context into which they are placing often expensive and strategic digital solutions,
they risk such interventions adding to the challenges they face, not relieving them.
This research represents one of the few national surveys of attitudes to digital technolo
gy. It is also one of the few national studies of attitudes and opinions of the UK workforce,
unlike for instance the Ofcom (2016) research that focuses on personal and home use, or
other commercial research that focuses on business, such as the Lloyds Bank digital in
dex (2017). Academic studies have tended to focus on smaller case studies of businesses
and single technologies (Abduwaila & Ali, 2013; Barnes, 2012; Bruque & Moyano, 2007;
Cresswell & Sheikh, 2013; Fitzgerald et al., 2013; Rauniar, Rawski, Yang, & Johnson,
2014; Xie et al., 2013). Though the results presented are very much in line with prior
studies, the findings are scaled to a national context.
This study indicates that a large proportion of the UK workforce is not seeing the benefits
of digital solutions. In line with other research (Lloyds Bank, 2017), 29% of the UK work
force has not seen new digital tools at work. A further 33% of those experiencing new
digital tools did not think the tools have been very successful. A total of just over half of
the UK workforce (51%) say they do not have access to, or are holding negative views of,
Page 40 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
digital technologies. The findings also indicate that there may be a disconnect between
the use of technology at home and work. Individuals may feel they are digitally effica
cious at home, but this may not transfer to work. This is important for both organizations
and government, as it cannot be assumed that people are able to transfer skills from their
everyday social use of technology to the workplace. It also cannot be assumed that “digi
tal natives” and “millennials” entering the workforce represent a skills base or a resource
to further digitize organizations (GOV.UK, 2016).
Thus the challenges of making a digital UK cannot be solved simply by implementing the
latest new technology. Nor does it seem it will be solved by millennials taking a lead. But
this research does provide some clear guidance on a route forward that is in fact within
the ability of organizations to address.
“Culture eats strategy for breakfast” is a quote apocryphally attributed to the business
commentator Peter Drucker, although the idea that culture is key to the success of orga
nizational strategy is fairly well established in the academic literature (for example Harp
er & Utley, 2001; Jackson, 2011; Leidner & Kayworth, 2006; O’Reilly et al., 1991). In these
arguments, culture determines and limits strategies (Schein, 2010). Much of this work
highlights ways in which organizations can work with their culture. Culture is, in this con
text, the everyday practices, beliefs, and attitudes of workers in an organization which is
built upon its history, workers’ experiences, and the sectors it works in, as well as those
bigger issues of the national and community cultures outside the organization. (p. 400)
Many of these things organizations cannot change by themselves. But this work has found
that some of the most important aspects of organizational culture that impact digital are
those that can be changed. The following factors appear to influence attitudes to digital
solutions (though with widely varying strength):
• Personal experience and confidence at home (knowledge of ICTs from home use)
• Personal experience and confidence in use of work-based ICTs
• Company organizational issues (practical issues)
• Company/organizational sector
• Company/organization size
• Internal organizational issues (e.g., finances and legacy systems)
• Company leadership and attitudes (company culture)
• Attitudes to digital in the organization
• Digital leadership in the organization
Page 41 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
The overall model implies that the most important issues are clearly under the control of
the organization:
• Personal experience and confidence in use of work based ICTs (some things that can
be addressed through training support and good communication, through both face-to-
face and some mediated channels)
• Company leadership and attitudes (taking a lead on digital, making clear the bene
fits, listening to ideas and developments from colleagues, making digital an organiza
tion wide priority, planning for digital disruption and having a clear digital vision that
has been effectively shared)
• Attitudes to digital in the organization (ensuing that the benefits of digital solutions
are understood across the organization, understanding the likely points of resistance)
• Company organizational issues (ensuring that practical and traditional barriers to
digital systems—from poor equipment and connections to legacy systems and financial
constraints—are understood and addressed)
At the heart of the findings is the need for organizations to understand that making digi
tal solutions a success is a process of cultural change in their organization. This change
will need to be supported and managed, and certainly should not be driven by simply in
troducing digital tools and hoping they will force the change.
Final Conclusion
This research indicates that the UK workforce sees organizational culture and leadership
as barriers to taking up digital solutions—and not traditional factors such as legacy sys
tems or costs. This study provides evidence to suggest that organizations cannot rely on
the workforce bringing their personal expertise to the workplace. Social media savvy mil
lennials may not be the solution to help organizations face (p. 401) digital disruption and
transformation. Importantly, UK workers are generally positive about taking on digital
tools—where they have had experience of it—but they are looking for support, leadership,
and engagement to make these changes successful. More broadly, if personal private ex
perience with technology does not guarantee confidence at work, then it may be neces
sary to ensure that the UK workforce has the skills needed in the digitally transformed
workplace. The results indicate that smaller workplaces are less likely to take on new dig
ital solutions, and that practical challenges vary across sectors. But importantly the key
issues are leadership, vision, and the transformation of organizational culture.
References
Abduwaila, F. & Ali, M. (2013). The effect of organizational culture on CRM success. Eu
ropean, Mediterranean and Middle Eastern conference on information systems 2013 (EM
CIS2013), October 17–18, Windsor, United Kingdom.
Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and
usage of information technology: A replication. MIS Quarterly, 16(2), 227–247.
Page 42 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Barnes, S-A. (2012). The differential impact of ICT on employees: Narratives from a hi-
tech organization. New Technology, Work and Employment, 27(2), 120–132.
Bradley J., Loucks, J., Maccauley, J., Noronha, A., & Wade, M. (2015). Digital vortex: How
digital disruption is redefining industries. global centre for digital business transforma
tion. White Paper. Available at http://www.cisco.com/c/dam/en/us/solutions/collater
al/industry-solutions/digital-vortex-report.pdf Accessed 17 May 2017.
Brecher, D., Laurenceau, C., & Sloman, C. (2016). (2016) Digital disruption. Accenture
Strategy. White paper. Available at: https://www.accenture.com/
t00010101T000000__w__/gb-en/_acnmedia/PDF-4/Accenture-Strategy-Digital-
Workforce-Future-of-Work.pdf#zoom=50 Accessed 17 May 2017.
Chatterjee, S. & Hadi, A. S. (2015). Regression analysis by example, 5th ed. Hoboken, NJ:
John Wiley & Sons.
Cresswell, K. & Sheikh, A. (2013). Organizational issues in the implementation and adop
tion of health information technology innovations: An interpretative review. International
Journal of Medical Informatics, 82(5), e73–e86.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of
information technology. MIS Quarterly, 13(3), 319–340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technol
ogy: A comparison of two theoretical models. Management Science, 35(8), 982–1003.
Edwards, P. & Ramirez, P. (2016). When should workers embrace or resist new technolo
gy?. New Technology, Work and Employment, 31(2), 99–113.
GOV.UK. House of Commons Science and Technology Committee. (2016). Digital skills cri
sis. Government report https://www.publications.parliament.uk/pa/cm201617/cmse
lect/cmsctech/270/270.pdf Accessed 17 May 2017.
Page 43 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Leidner, D. E. & Kayworth, T. (2006). A review of culture in information systems research:
Toward a theory of information technology culture conflict. MIS Quarterly, 30(2), 357–
399.
Loucks, J., Maccauley, J., Noronha, A., & Wade, M. (2016). Workforce transformation in
the digital vortex: Reimagining work for digital business agility. Available at https://
connectedfutures.cisco.com/report/workforce-transformation-in-the-digital-vor
tex/Accessed 17 May 2017.
Montgomery, D. C., Peck, E. A., & Vining, G, G. (2012). Introduction to linear regression
analysis (Vol. 821). New York: John Wiley & Sons.
O’Reilly, C. A., Chatman, J., & Caldwell, D. F. (1991). People and organizational culture: A
profile comparison approach to assessing person-organization fit. Academy of Manage
ment Journal, 34(3), 487–516.
Reynolds, N-S. (2015). Making sense of new technology during organisational change.
New Technology, Work and Employment, 30(2), 145–157.
Rauniar, R., Rawski, G., Yang, J., & Johnson, B. (2014). Technology acceptance model
(TAM) and social media usage: an empirical study on Facebook. Journal of Enterprise In
formation Management, 27(1), 6–30.
Schein, E. H. (2010). Organizational culture and leadership (Vol. 2). New York: John Wiley
& Sons.
Segars, A. H. & Grover, V. (1993). Re-examining perceived ease of use and usefulness: A
confirmatory factor analysis. MIS Quarterly, 17(4), 517–525.
Szajna, B. (1994). Software evaluation and choice: Predictive validation of the technology
acceptance instrument. MIS Quarterly, 18(3), 319–324.
Page 44 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Venkatesh, V. & Davis, F. D. (2000). A theoretical extension of the technology acceptance
model: Four longitudinal field studies. Management Science, 46(2), 186–204.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of infor
mation technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Xie, S., Helfert, M., Lugmayr, A., Heimgärtner, R., & Holzinger, A. (2013, July). Influence
of organizational culture and communication on the successful implementation of infor
mation technology in hospitals. In International conference on cross-cultural design (pp.
165–174). Berlin, Heidelberg: Springer,
Yates, S., Kirby, J., & Lockley E. (2015). Digital media use: Differences and inequalities in
relation to class and age. Sociological Research Online, 20(4), 1–21.
Yates, S., & Lockley, E. (2018). Social media and social class. American Behavioral Scien
tist, 62(9), 1291–1316.
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Eleanor Lockley
Page 45 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Workplace “Digital Culture” and the Uptake of Digital Solutions: Personal
and Organizational Factors
Eleanor Lockley is Research Fellow and Associate Lecturer at Sheffield Hallam Uni
versity. Her research falls broadly under communication studies and information
studies, and working in C3RI means that she has worked on a variety of different in
terdisciplinary projects since 2008. One day she can be a human-computer interac
tion researcher—the next she can be investigating issues associated with user cen
tered design! Her previous role in C3RI involved engaging with knowledge transfer
activity—meaning that she has worked on commercial consultancy, as well as on aca
demic projects. She has recently worked on several European-funded projects; two of
note are COURAGE (2014–2016) and ATHENA (2013–2016). The former involved de
veloping a research agenda for cybercrime and cyberterrorism based upon user-cen
tered research. Her role in the latter focused upon human factors and best practices
for crisis sense-making and communication and, in particular, how social media can
be best used for crisis and disaster management. ATHENA is creating a prototype to
enhance the ability of Local Education Agencies of police, first responders, and citi
zens in their use of mobile and smart devices in crisis situations.
Page 46 of 46
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.14
This chapter describes the analyses and results for the ESRC Domain of Citizenship and
Politics, guided by two main questions: How digital technology impacts on our autonomy,
agency, and privacy; Whether and how our understanding of citizenship is evolving in the
digital age. It first provides an initial overview of the major insights from the literature re
view and analysis, the Delphi surveys, and workshop discussions about the relevant range
of the concepts of citizenship and politics in a digital age. Over time the literature shows
a shift from issues of public sphere and use of the Internet by government and candidates
to more focus on political participation and engagement, especially through online com
munities, social networks, and social media. Eight main topics emerged: public sphere,
measurement, social network analysis, protest and activism, governance, elections, cyber
hate crime, and partisan politics. The analyses also highlighted theory, methods, and ap
proaches in the literature. The review provides examples of literature in the project’s
time period that illustrate these topics. The chapter ends with a discussion of consider
able future research directions (e.g., mobilization and radicalization) and research chal
lenges (e.g., managing big data, and ethical issues).
Keywords: Citizenship, elections, ESCR Review, governance, Internet, politics, public sphere, social media, social
network
Introduction
THIS chapter briefly explores the outcomes of the literature review and expert Delphi re
view process for the citizenship and politics domain. As with the other review chapters
the goal is not to work through a large number of examples from the literature. Instead,
building on the methods described in chapter 2, we will first set out the results of the dig
ital humanities-based analyses of the literature and the content analysis of methods and
theory. We will highlight the major topics and concepts within the literature—providing a
few general examples. These are not intended to be the “most important” examples from
the literature but rather simply indicative of the types of work. This is then followed by
Page 1 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
the presentation of the content analysis that sought to identify the key theories and meth
ods in use within the literature. Next, we outline the results from the Delphi review of ex
perts. This concludes with the key questions, topics and challenges we identified, and we
compare these to the results from the literature work. In the last section, we will present
the recommendations for areas of future study. As a reminder, the initial scoping ques
tions for this area of work were:
Page 2 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 3 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
We would also like to highlight something that comes through in the comparison of the
concept maps from the 2000–2004 period with that of the 2012–2016 period (see Figures
16.1 and 16.2).1 In examining the visualizations of the data from these two periods we
find that concept pairs such as public sphere and a focus on government and candidate
Internet use are apparent in the earlier literature. These are replaced with foci around
participation and engagement for the later literature. We feel this marks a transition from
an initial focus on the potential for the Internet and digital media to facilitate public de
bate and enhance the public sphere, to one focused on the role of networks (social media)
to support and enhance political engagement. As noted later, we may now be in a third
stage where the focus is on the role of networks in creating “echo chambers” or “filter
bubbles,” therefore negating the potentials to enhance the public sphere or disrupt politi
cal institutions.
Scholars, particularly in political studies and media studies, have noted the rise of the use
of social media in civic and political spheres. In broad terms, attention has focused on the
ways in which social media facilitates engagement in politics and participation in politics
(Dahlgren, 2013) and the characteristics of that communication and relationship between
citizens and politics (Papacharissi, 2015). There is a general consensus that a number of
factors need to be addressed to realize the potential of digital communication to enhance
(p. 453) participation. A continuing issue of inequality remains, with social and political in
equality adding to any existing digital divides. Further, questions of how to develop open
and deliberative participation using online communication remain difficult to address.
There is a better understanding about the threats that digital communication poses in
terms of filter bubbles (Sunstein, 2001) and the personalization of news and other infor
mation that might limit an open debate. However, this is an area that requires more re
search.
Literature Analysis
The literature analysis was designed to create two analytic outcomes. First, the goal was
to identify key topics within the existing literature. This would allow the comparison
(p. 454) with areas of future importance identified by the Delphi review. Second, we con
ducted a content analysis of the literature to explore the predominance of specific, theo
ries, methods and approaches. As noted in the chapter 2, the literature data were subject
ed to two analyses. The first round of collected literature was analyzed to create concept
pairs and trios, and then the combined first and second rounds of literature were ana
lyzed to identify key topic clusters. The results of these two approaches were then com
pared.
Table 16.1 lists the 10 most common concepts identified from the first round of literature.
These represent the concepts covering 2% or more of the identified cases. Table 16.2 lists
the concept pairs within these groups. In Table 16.2 the first part of the concept pair is
marked in bold with various second elements presented in the list below this first part.
Unsurprisingly the concepts of citizenship, action and networks were ranked top. This re
Page 4 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
inforces the point that much of the underlying conceptual base of the literature on digital
media and politics is focused on the three-way interface between: citizens; political action
and engagement; and the role or impacts of networks (digital or otherwise).
Concept Percent
Citizen 7.56
Action 7.32
Network 6.21
Campaign 5.35
Citizenship 4.35
Channel 4.08
Access 3.46
Engagement 3.35
Government 2.92
Participation 2.81
Information 2.59
Link 2.43
Delivery 2.40
Page 5 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 6 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Note: bolded term is the main concept; the unbolded terms below that and above the line are the related subcon
cepts.
Page 7 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
(p. 455) Our second approach to the analysis of the literature explored the extrac
(p. 456)
tion of topics using a different methodology, based on a factor analysis of salience and rel
evance measures. We utilized both custom-developed tools and the WordStat software.
Unlike the concept mapping which pulled out some of the underlying ontological links,
the identification of topics produced groups that more overtly fitted theory and methods
in the literature. (This was the case for all of the literature analyses.) Table 16.3 presents
the 15 topics identified by WordStat, and Table 16.4 maps these to the concepts analysis.
Page 8 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 9 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 10 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 11 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 12 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 13 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Con Citi Ac Net Cam Citi Cha Ac En Gov Par In Link De
cept zen tion wor paig zen nnel cess gag ern tici for liv
/ k n ship eme men pa ma ery
Top nt t tion tion
ic
Twit X
ter
So X X
cial
net
work
anal
ysis
Ho
mop
hily
Cy X
ber
hate
crim
e
Page 14 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Po X
liti
cal
on
line
fora
Mo X X
bile
Gen X
der
and
eth
nici
ty
Elec X
tions
Par
tisan
poli
tics
Page 15 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Civic X X
en
gage
men
t
Web X
and
so
cial
me
dia
Prot X X X
est
and
ac
tivis
m
Mea X
sure
men
t
Page 16 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Pub
lic
sphe
re
Gov X
er
nanc
e
Page 17 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
The eight key areas emerging from the analysis (see Table 16.3) are Public sphere, Mea
surement, Social network analysis, Protest and activism, Governance, Elections, Cyber
hate crime, and Partisan politics.
The category of measurement reflects the greater proportion of work in this domain that
employs statistical analysis (see the following section on methods). Although the issue
and topic of governance is important in this domain, there is a separate full section of the
book (see Section 7) dedicated to this topic. In order of importance, the first topic reflects
the broader question of civil society and the public sphere whereas the others focus on
specific actions or contexts such as election campaigns—though of course ideally these is
sues should strongly intersect. From the analysis in Table 16.3 it is clear that the idea of
the public sphere is a key topic in the academic debate around the impact of digital me
dia on politics. This is clearly articulated in works by highly influential authors (e.g.,
Castells, 2008) but also in many individual studies. As we noted previously, one of the
general findings from the content analysis was the utilization of very wide-ranging ideas
or publications as “scene setters”—such as the idea from Castells (1996) of the “network
society”—but without the detail of this work being substantively engaged with. This ap
pears to be the case with the idea of the public sphere (Habermas, 1991), where the
Habermasian concept is repeatedly pointed to without the full theoretical model being
employed.
As we noted earlier, the longitudinal view over the last two decades points to a shift from
the focus on public sphere to one on more individualistic issues of participation and en
gagement. There also appears to be a shift away from the earlier literature that tended to
focus on the potentials for digital media to support the public sphere and deliberative
democracy. Papers exploring the idea of the public sphere were not uncritical but utilized
the concept to examine the potentials for deliberative democracy through digital media
either theoretically (e.g., Dahlberg, 2001, Dahlgren, 2005) or through the analysis of in
teractions (e.g., Papacharissi, 2004). The focus has since shifted towards the analysis of
actual network interactions (often via social media) and the extent to which political en
gagement, influence, and action are developed. In the time between the literature analy
sis undertaken by the ESRC project and the current publication the focus has shifted
somewhat to the failing of the public sphere and the rise of “echo chambers” and “mini
publics” (see Frame & Brachotte, 2015). This concern clearly comes through in the Del
phi analysis of experts reported later in the chapter.
As with several of the other domains, Twitter and social network analysis are two promi
nent and linked topics. The intersection of Twitter, politics, and citizenship is fraught with
challenges, especially as both the technology itself and its uses have continued to change
over the last decade (Bimber et al., 2015). As a result, it may not always be helpful to
draw comparisons with traditional political behavior. Within the actual study of the use of
Twitter in politics and political action there is a focus on collective action. For example,
Kende, van Zomeren, Ujhelyi, & Lantos et al. (2016) proposed and tested how the social
Page 18 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
affirmation use of social media motivates individuals for collective action to achieve social
change. In this frame of work, a good number of analyses are focused on the nature of
(p. 459) social capital, or psychological group membership measures, as routes to under
standing political social action undertaken through or supported by Twitter. Much of this
focuses on young citizens, but often has a strong element of networked individualism
(e.g., Rainie & Wellman, 2012) with the examination of the potential for platforms such as
Facebook, Twitter and YouTube to influence political stances and civic engagement (see
Loader et al., 2014). A reasonably comprehensive overview can be found in Weller et al.
(2014). There are many papers that take on board the theory or orientation of social net
work analysis (SNA) in their approach, such as the ideas of weak and strong ties or net
work power, or reference SNA-based studies, though they do not necessarily use specific
SNA methods. Examples include political participation (e.g., Bennett, 2012; Chan, 2016),
campaigning (Bruns & Highfield, 2013), and influence (e.g., Grudz et al., 2014). The spe
cific use of SNA methods was in fact very limited (see Table 16.6) and was to be found in
papers with a strong methodological focus. These may not take on politics and citizenship
directly but elucidate how influence may spread in both digital and non-digital communi
cations networks and how these interact (e.g., Haythorthwaite, 2002).
More pragmatically, the literature focuses on the actual practices and online behaviors.
Activism and protest appear in more recent literature, with authors focusing on the role
of social and networked media in engagement and organization of politics. For example,
Agarwal et al. (2014) compare the use of digital media by two very different political
groups: the Republican Tea Party movement and the Occupy Wall Street movement. Oth
er studies attempt to analyze the links between the types of social media used, contexts of
interaction with similar or other groups, and likely political participation (e.g., Kim &
Chen, 2016). Some studies try to assess the extent to which online activity leads to other
forms of political action (digital or not), from voting to collective action (e.g., Schumann
and Klein, 2015; Theocharis & Lowe, 2016).
In regard to elections this work goes back to the mid-1990s (e.g., Yates & Perrone, 1998)
and early 2000s (e.g., Coleman, 2001a, 2001b) with a strong focus on the United Kingdom
and the United States (e.g., Foot & Schneider, 2002). The breadth and variety of this work
has grown extensively over the past decade to include a wider variety of nations and
forms of electoral process (e.g., Gadekar et al., 2011; Vromen, 2015). The issue of “sec
ond screen” communication in the electoral context has also been receiving increasing at
tention, for example during important televised campaign debates in various countries.
Furthermore, questions of online hate or partisan interaction are at this time a key issue.
Studies range from analyses of homophily in political group membership (e.g., Colleoni,
et al., 2014) through arguments that social and digital media use have gone hand in hand
with more personalized politics (e.g., Bennett, 2012). This then bleeds over into issues of
digital governance and online crime, be it terrorism or hate crime. We would argue there
fore that there appears to be a general, though not universal, shift in the literature over
the last two decades, from ideas of the potential role of digital media in the broader pub
Page 19 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
lic sphere to much more specific and analytics-based assessments of the specifics of net
work dynamics in regard to political action, engagement, and participation.
This situation is seen in a range of areas, including political communication and news,
connective action, and the media hybridity. In the area of political communication,
(p. 460) research has identified that people access their news using both social media and
mainstream (whether public or commercial) media (Rainie et al., 2011; Oxford Reuters In
stitute for the Study of Journalism, 2016). The wider media environment for political com
munication has resulted in the development of media hybrid systems in political commu
nication (Chadwick & Dennis, 2017). What Chadwick and Dennis argue is that both tradi
tional media communication and social media communication are configured in different
ways to reach different social groups. There is an organizational dimension to this that
draws on the networked logic of social media; here, both connective action and collective
action is mobilized (Bennett & Segerberg, 2013).
As chapter 2 describes, the content analysis builds on Borah’s (2017) approach to analyz
ing a set of communications and media literature in regard to digital media use. Table
16.5 provides the results with regard to the empirical approach taken in the literature.
The majority of the papers (45%) undertook primary data collection, with 33% being theo
retical-synthesis of current or prior work. The main disciplines from which theory was
used or for which theory was developed were: politics and public administration (48.6%),
sociology (28.0%), and communication and media (14.3%). It is important to note that on
ly actual use of theory for the purposes of design, synthesis, or analysis were coded. Gen
eral references to prior work and theory, such as broad reference to “network
society” (Castells) or “public sphere” (Habermas), were not coded. This distinction is im
portant, as it highlights the use of theory to design and analyze data or synthesize materi
als, as distinct from more general discussion. There was considerable variety in the spe
cific theories applied from these disciplines, with no clear preference. Ideas of the public
sphere (6%) and political participation (5%) were the most common in the political sci
ence literature. The main research methods were literature reviews (33%), surveys
(29%), content analysis (8%), and interviews (7%; see Table 16.6). The majority of the em
pirical work focused on specific groups (e.g., Facebook users) with a limited number of
general population studies (see Table 16.7). Where new data was analyzed, the majority
(53%) of the analyses were qualitative, though the methods varied, the remainder being
statistical (see Table 16.8). Only one study overtly stated that they were using a “big da
ta” approach. Compared to the other domains, there is a stronger emphasis on both em
pirical data collection and quantitative analysis in the literature analyzed here. As with all
the domains, both big data and SNA are so far only used to a limited extent.
Page 20 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Percent
Percent
Survey 28.6
Interview(s) 6.9
Other 4.2
Experiment 3.2
Ethnography 3.2
Page 21 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Percent
Percent
None 8.3
Discourse (textual-linguistic-discourse) .9
Delphi Review
The literature review analysis explored the themes found within recent research publica
tions. The following sections detail the results of the Delphi process for the Citizenship
(p. 461) and Politics domain. There were three parts to the Delphi review: an ini
(p. 462)
tial survey, a confirmatory questionnaire to address the findings from the survey, and a
confirmatory workshop. The goal of the Delphi process was to identify and prioritize ar
eas for future research. These might include areas already covered by literature but also
new concerns, or the needs for a tighter focus on a specific issue. The process sought to
identify suggested future scoping or research questions, key topics to address within
these questions, and key challenges that might be encountered when researching these
questions.
Given the amount of input to the Delphi process for this domain, the suggestions for scop
ing and research questions were coded into the eight categories and 36 specific ques
tions, which were grouped into 21 questions, as detailed in Table 16.9. The process used
Page 22 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
two measures to assess the importance of these questions. The first was how (p. 463) fre
quently the suggestion came up in the Delphi survey, and the second was how important
these topics were ranked by the Delphi interviewees. Table 16.10 shows the ranking of
these categories by the number of questions allocated to the category and by their ranked
importance from the confirmatory survey. It is important to note that ranked importance
is almost same in both tables. As chapter 25 describes, there are a number of (p. 464) ar
eas identified in the scoping questions and challenges that are cross cutting, a key one of
these being governance. As a result, there are also some strong overlaps with the Gover
nance and Security domain (see chapters 22 and 23) that will be addressed there.
Page 23 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 24 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 25 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Key Topics
If we turn next to specific topics that might cross cut these questions, we find that topics
that were most commonly cited in the Delphi process were also those deemed most im
portant in the confirmatory survey (see Table 16.11 and Table 16.12). These topics also
closely match the proposed research and scoping questions. Given the number and detail
of the scoping questions provided in the initial rounds of the Delphi process, this overlap
was highly likely. One of the reasons for this was that as respondents interpreted differ
Page 26 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
ently the idea of there being two levels, one of overarching questions and then the topics
within them, questions for some respondents were topics for others. This distinction ap
peared to be clearer for other domains, where the volume of responses was lower. Over
all, though, this does provide reinforcing evidence, along with the broad support of the
consultation workshop, for the relevance of the questions and topics. We do note, howev
er, that a key comment made in the confirmatory workshop was that the literature and
Delphi work had not really addressed the issue of digital media use in the context of ma
jor state control and censorship. We agree that this is a topic that appears not to have
had as much attention in the literature we surveyed nor in the Delphi review.
Divides 8 Technologies 3
Mobilization 8 Civic 2
Talk 7 Commercial 2
Control 6 Cultural 2
Media 6 Empowerment 2
Other 6 Geopolitics 2
Participation 6 Policy 2
Citizenship 5 Trust 2
Governance 4 Contestation 1
Privacy 4 Parties 1
Identity 3 Populism 1
Methods 3 State 1
Page 27 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 28 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 29 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 30 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
If we leave aside the governance issues for chapters 22 and 23, then it is clear that the
Delphi panel, confirmatory survey, and the workshop see the future focus for research
(p. 465) to be focused on citizenship, participation, and engagement, with specific con
cerns about mobilization and radicalization. The questions about empowerment, public
sphere, links to older media, and emancipation that are present in some of the earlier lit
erature in this domain has moved down the list of priorities. Importantly, there is a grow
ing concern for how digital technologies are disrupting politics and political institutions.
Research Challenges
Our final set of questions asked the Delphi panel about the challenges that may be faced
in undertaking research in these areas. These were placed into 14 categories and ranked
by the number of coded items (Table 16.13). None of the main challenges was deemed to
be specific to any of the seven domains by the consultation workshop. Table 16.14 shows
the ranking of these by the confirmation survey. Such cross-cutting topics and challenges
are discussed in the concluding chapter 25.
Page 31 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Challenge Percent
Methods 42
Theory 14
Big data 12
Epistemology/ontology 7
Ethics 6
Psychology 5
Technology 4
Exclusion 2
Education 1
Funding 1
Impact 1
Individualism 1
Policy 1
Training 1
Page 32 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 33 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Conclusion
The concepts and topic mapping analyses generated very similar results, and these close
ly map onto the Delphi results. The close mapping of the Delphi and literature analyses
(p. 466) potentially indicates that this is a well-developed domain of research with clear fo
ci. The consensus around the consolidation of research questions in the consultation
workshop reinforces this. There may be a number of good clear reasons for this empha
sis. Political communication and behavior are substantive aspects of both communication
studies and political science. These are both areas that have been dramatically affected in
very public ways by digital media, in contrast to the very real but less visible impacts of
digital technologies on governance or public policy. There are also indications that the
visibility of digital media—from the web to social media—have made (at least some)
processes of political communication very visible and open to analysis.
Given that the literature and the Delphi recommendations strongly overlap, the research
has not identified any clear new topic gaps to highlight for future work. Rather, the Del
phi work appears to confirm the patterns found in the literature, with a move away from
the assessment of the potentials of digital media for deliberative politics, development of
the public sphere and broad civic engagement, to a clearer focus on the role of networks
in political mobilization, influence, partisan politics, and more (p. 467) individualistic mea
sures of engagement and political action. This may be a reaction to political changes ex
perienced over the last five years that have often been associated with the use of digital
media—such as the Arab Spring, Brexit, and the election of Donald Trump. It might also
reflect the nature of available data (e.g., Twitter and Facebook posts) or the nature of
these media which are more notably individualistic in form than either prior mass media
or even older forms of digital media (e.g., Rheingold, 1993). The disruption caused by so
cial media itself or its use and misuse in politics (cf. Cambridge Analytica scandal) are a
further clear set of contemporary questions. Yet underneath this is both an empirical and
theoretical need to fully understand what our current social media-based politics is telling
us about citizens’ behavior and political processes, and vice versa. We would argue that
for the health of democratic institutions, there is a need to empirically understand con
temporary political behavior and participation in the context of digital technology use.
As a word of caution, in the other domains we noticed a “platform focus” in many studies.
In the case of politics, an example might be a focus on political uses of Twitter, in contrast
to boarder studies of the full range of digital media that citizens may utilize for political
communication. Though there are examples of platform focus, it does not appear as pro
nounced in relation to political research as in other domains. As with the other domains,
we believe that the complexity and variety of potential work warrants consideration to be
taken of all the questions topics and challenges identified. Noting this, we would argue
that the analysis here has identified four key areas for future research:
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
We note that the Governance and Security domain significantly addresses the issue of
“Digital technologies and governance,” which was the top ranked topic in the confirmato
ry survey. The other key topics identified fit within these four scoping areas, except for
Digital and state control. This topic, identified as well in comments at the consultation
workshop, reminds us that not all politics are democratic and there is no necessary causal
link between digital media use and open societies.
References
Agarwal, S. D., Barthel, M. L., Rost, C., Borning, A., Bennett, W. L., & Johnson, C. N.
(2014). Grassroots organizing in the digital age: Considering values and technology in
Tea Party and Occupy Wall Street. Information, Communication & Society, 17(3), 326–
341.
Bennett, L. (2012). The personalization of politics: Political identity, social media, and
changing patterns of participation. Annals of the American Academy of Political and So
cial Science, 644(1), 20–39.
Bennett, W. L. & Segerberg, A. (2013). The logic of connective action: Digital media and
the personalization of contentious politics. Cambridge, UK: Cambridge University Press.
Bimber, B., Cunill, M. C., Copeland, L., & Gibson, R. (2015). Digital media and political
participation: The moderating role of political interest across acts and over time. Social
Science Computer Review, 33(1), 21–42.
Castells, M. (1996). The rise of the network society: The information age: Economy, soci
ety, and culture (Vol. I) (Information Age Series). London: Blackwell.
Castells, M. (2008). The new public sphere: Global civil society, communication networks,
and global governance. Annals of the American Academy of Political and Social Science,
616(1), 78–93.
Chadwick, A. & Dennis, J. (2017). Social media, professional media and mobilisation in
contemporary Britain: Explaining the strengths and weaknesses of the citizen’s move
ment 38 Degrees. Political Studies, 65(1), 931–950.
Page 35 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Chan, M. (2016). Social networks sites and political engagement: Exploring the impact of
Facebook connections and uses on political protest and participation. Mass Communica
tion and Society, 19(4), 430–451.
Coleman, S. (2001b). Click for democracy. The World Today, 57(5), 17–18.
Colleoni, E., Rozza, A., & Arvidsson, A. (2014). Echo public or public sphere? Pre
(p. 469)
dicting political orientation and measuring political homophily in Twitter using big data.
Journal of Communication, 64, 317–332.
Dahlberg, L. (2001). The Habermasian public sphere encounters cyber-reality. The Public,
8(3), 83–96.
Dahlgren, P. (2005). The internet, public spheres, and political communication: Dispersion
and deliberation. Political Communication, 22(2), 147–162.
Dahlgren, P. (2013). The political web: Media, participation and alternative democracy.
Basingstoke: Palgrave MacMillan.
Frame, A. & Brachotte, G. (Eds.). (2015). Citizen participation and political communica
tion in a digital world. Abingdon, UK: Routledge.
Gadekar, R. et al. (2011). Web Sites for E-electioneering in Maharashtra and Gujarat, In
dia. Internet Research, 21(4), 435–457.
Grudz, A. et al. (2014). Geography of Twitter networks. Social Networks, 34, 37–81.
Habermas, J. (1991). The structural transformation of the public sphere: An inquiry into a
category of bourgeois society. Cambridge, MA: The MIT press.
Haythorthwaite, C. (2002). Strong, weak, and latent ties and the impact of new media. In
formation Society, 18(5), 385–401.
Kende, A., van Zomeren, M., Ujhelyi, A., & Lantos, N. A. (2016). The social affirmation use
of social media as a motivator of collective action. Journal of Applied Social Psychology,
46(8), 453–469.
Kim, Y. & Chen H-T. (2016). Social media and online political participation: The mediating
role of exposure to cross-cutting and like-minded perspectives. Telematics and Informat
ics, 33, 320–330.
Page 36 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Loader, B. D., Vromen, A., & Xenos, M. A. (2014). The networked young citizen: Social
media, political participation and civic engagement. Information, Communication & Soci
ety, 17(2), 143–150.
Oxford Reuters Institute for the Study of Journalism. (2016). Reuters Institute Digital
News Report. http://reutersinstitute.politics.ox.ac.uk/sites/default/files/research/
files/Digital%2520News%2520Report%25202016.pdf Retrieved July 3, 2018.
Papacharissi, Z. (2004). Democracy online: Civility, politeness, and the democratic poten
tial of online political discussion groups. New Media & Society, 6(2), 259–283.
Papacharissi, Z. (2015). Affective publics: sentiments, technology and politics. Oxford, NY:
Oxford University Press.
Rainie, L., Purcell, K. & Smith, A. (2011). The Social Side of the Internet. Pew Research
Centre. http://www.pewinternet.org/2011/01/18/the-social-side-of-the-internet/
Retrieved July 3, 2018.
Rainie, L. & Wellman, B. (2012). The Individual in a networked world: Two scenarios. The
Futurist, July-August, 24–28.
Schumann, S. & Klein, O. (2015). Substitute or stepping stone? Assessing the impact of
low-threshold online collective actions on offline participation. European Journal of Social
Psychology, 45, 308–322.
(p. 470) Sunstein, C. (2001). Echo chambers: Bush v. Gore, impeachment and beyond.
Princeton, NJ: Princeton University Press.
Theocharis, Y. & Lowe, W. (2016). Does Facebook increase political participation? Evi
dence from a field experiment. Information, Communication & Society, 19(10), 1465–
1486.
Weller, K., Bruns, A., Burgess, J. E., Mahrt, M., & Puschmann, C. (2014). Twitter and soci
ety: An introduction. In K. Weller et al. (Eds.), Twitter and society (pp. xxix–xxxvii). New
York: Peter Lang.
Yates, S. J. & Perrone, J. L. (1998). Politics on the Web. Assignation, 15(4), 49–53.
Notes:
(1.) As part of the review, The Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
Page 37 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high-frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/ provides ac
cess to the top 50 most frequently occurring pairs and trios through a series of data visu
alizations. Click on View Data Visualisations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
ticles at the top. Also, see https://waysofbeingdigital.com/literature-analysis-interactive-
results/ for interactive visualizations with mouse-overs of the main clusters of concepts
within each domain and the relative frequency of concepts associated with each cluster.
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Bridgette Wessels
Page 38 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Paul Hepburn
Paul Hepburn is a Research Associate at Heseltine Institute for Public Policy and
Practice, University of Liverpool. His research interests lie in exploring the potential
of the new digital media to enhance local democracy and local governance. He is also
interested in methods and tools for analyzing and explaining the structure of online
networks. Prior to pursuing an academic career, Paul worked in local government
conducting research, developing policy, and, lately, implementing an e-government
program.
Alexander Frame
Vishanth Weerakkody
Page 39 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Citizenship and Politics
Page 40 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.15
Through a thematic mapping of the current literature and a gap analysis of the field, the
chapter sheds light on the discrepancies between emerging digital practices and estab
lished theories of free speech. In the contemporary digital age, censorship and surveil
lance are exercised more and more by private actors such as social media platform opera
tors, while self-expression increasingly takes the form of content forwarding, coded lan
guage, and non-human identities. We observe that the current literature shares a “patho
logical” approach; that is, undesirable content ought to be removed, avoided, and institu
tionally intervened upon. This approach, however, poses a new set of difficult questions
such as who decides what is intolerably extreme and what is acceptably moderate; who
designs and implements the filtering of extreme content; and how can the public ensure
the accountability of the filtering mechanism.
Keywords: Censorship, extreme content, filtering mechanism, free speech, self-expression, social media, surveil
lance, undesirable content
Introduction
THE political climate around the world in recent years, especially with regard to national-
level elections and referenda across Europe and in the United States, has been volatile
and conflictual. Observers have expressed concerns about the rise of populism or even
fascism (Allen, 2018; Merelli, 2016; O’Brien, 2018), and have attributed much of the phe
nomenon to the propagation of problematic online content, including deliberate disinfor
mation (a.k.a., “fake news”), racist and misogynous remarks, and material designed to
lead to religious or political radicalization (Beckett & Burke, 2017; Marwick & Lewis,
2017).
Many have attempted to define “populism,” but as Canovan (1981) points out, the term
has been used to describe such a wide variety of phenomena, left and right and democra
cy and dictatorship alike, that it seemingly evades a universal definition. Nevertheless,
Page 1 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Mudde and Kaltwasser (2017) have captured one of the most defining characteristics of
the term; that is, populism is a “thin” ideology, often “parasitic” on another ideology, and
it operates on the basis of dividing society into two antagonistic groups: the honest popu
lation and a corrupt elite. Albertazzi and McDonnell (2008) have added a third group,
“others,” stating that populism, as a political strategy, “pits a virtuous and homogeneous
people against a set of elites and dangerous ‘others’ who are together depicted as depriv
ing (or attempting to deprive) the sovereign people of their rights, values, prosperity,
identity and voice” (p. 3).
In this divisive process, one rhetorical tactic that all populist leaders commonly draw up
on is to assert that politics is easy but the elites and experts are lying that it is not.
Promising simple solutions to complex social issues is at the heart of the populist appeal,
(p. 472) which is why politicians “from India’s Narendra Modi to Turkey’s Recep Tayyip
Erdoğan, from Hungary’s Viktor Orbán to Poland’s Jaroslaw Kaczynski, and from France’s
Marine Le Pen to Italy’s Beppe Grillo sound surprisingly similar to each other despite
their considerable ideological differences,” according to Mounk (2018, p. 38). One of the
dangers with such populist rhetoric is that it further alienates people who are already at
the margins; that is, those who have typically been “othered” in a given society. On top of
that, researchers such as Brooker and Barnett (2016), Kaján (2017), and Jane (2018)
demonstrate the significant extent to which “othering” and hate speech have now gone
digital.
A key challenge in investigating this possible crisis is that in the digital age the bound
aries of a university campus are becoming more and more “porous.” In other words, while
being physically present on campus, students can also simultaneously interact with a
broader world through various digital means. In this context, millennials, who are also re
ferred to as “native” users of digital technology (Prensky, 2001), are often characterized
by their irreducible reliance upon major social media services to express themselves. In
creasingly marginalized in the traditional political arena (Sloam, 2014), young adults in
deed seem to be taking their politics to “online third spaces” nowadays and seeking new
ways to represent their interests and struggles (Graham, Jackson, & Wright, 2016;
Wright, 2012).
Page 2 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
One of the distinct features of the contemporary political landscape, particularly after the
2008 global financial crisis, is that the institutions of representative democracy are going
through a transformative shift worldwide. Europe, for example, has witnessed the mush
rooming of “non-traditional” political parties and their electoral successes, such as the
Five Star Movement in Italy (founded in 2009), the Pirate Party in Iceland (founded in
2012), and Podemos in Spain (founded in 2014). This shift to alternative forms of repre
sentation may not be an inherently positive or negative development. Regardless, the role
that social media have played is significant (Gerbaudo, 2018)—not in the sense of being a
replacement to traditional mass media, but of being an integral part of a wider informa
tion ecosystem where older and newer media interact, compete, collaborate, and learn
from each other (Chadwick, 2013).
What complicates matters is that in such a complex “hybrid” media environment there
have emerged technologically sophisticated attempts to hijack people’s attention (p. 473)
and manipulate public discourses. According to a 2017 report by international human
rights watchdog Freedom House (2017), bots and fake news outlets distorted elections in
at least 18 countries between 2016 and 2017. The Oxford Internet Institute in the United
Kingdom has also provided evidence of “cyber troops” and other formally organized so
cial media manipulation campaigns in operation in 48 countries as of 2018 (Bradshaw &
Howard, 2018).
In short, the propagation of problematic online content needs to be examined and under
stood against the backdrop of the hybridization of mass and social media, the emergence
of non-traditional forms of power and institutions, and the growing technological capacity
for manipulating information. All of these compel us to revisit and update the existing un
derstanding of speech acts, political participation, and public opinion formation. The
present chapter provides a thematic mapping of the current literature on free speech in
the digital age and points to where further research is needed. This review is concerned
in particular with how and to what extent the contours of free speech are contested and
redefined in today’s mesh of physical and digital worlds.
Methodology
In order to survey a field that is expanding and evolving rapidly, our methodology in
volves two key design decisions. First, for a more systematic and comprehensive monitor
ing of the latest developments, we have created and maintained a dynamic and hierarchi
cal list of “buzzwords” in media and public discourses, presented in Table 17.1. The list
has been developed with full awareness and caution that many of the words are contested
terms, such as “counter-terrorism” and “radicalization,” which makes them very difficult
to deal with online. Over 130 words or phrases have been added to the list between 2017
and 2018 (131 as of July 2018), including “algorithmic bias,” “alternative fact,” “attention
merchant” (Wu, 2016), “computational propaganda” (Howard & Kollanyi, 2016), “content
moderation,” “information disorder,” “micro-targeting,” and “meme.” These words and
phrases have then served as multiple entry points to the literature, and also as tools for
Page 3 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Page 4 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
(A posteriori) Keywords
themes
Page 5 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Cambridge Analytica
micro-targeting
psychographic profil
ing
Page 6 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
The other decision was to look beyond traditional research publications and pay equally
close attention to journalistic accounts and grey literature, with an aim to integrate schol
arly perspectives with media and public discourses. Many independent research insti
tutes, think tanks, and NGOs have been prolific contributors to moving the field forward.
These include Data & Society (a non-profit research institute, founded in New York in
2014, that explores the societal implications of data-driven technologies, https://
datasociety.net/), Demos (a UK think tank with a dedicated research branch for social me
dia analysis, https://www.demos.co.uk/), the Electronic (p. 474) (p. 475) Frontier Founda
tion (an international NGO committed to defending Internet civil liberties, https://
www.eff.org/), Freedom House (an international watchdog on human rights including dig
ital freedom of expression, https://freedomhouse.org/), and EU-funded research networks
such as VOX-Pol (focused on tackling violent online political extremism, https://
www.voxpol.eu/) and ONLINERPOL (focused on creating enabling online spaces of politi
cal expression, especially in the context of a multi-faith society such as India, http://
www.fordigitaldignity.com/). Meanwhile, an increasing number of higher education insti
tutions have established dedicated research centers, such as the University of Oxford’s
Oxford Internet Institute (https://www.oii.ox.ac.uk/), Harvard University’s Berkman Klein
Center (https://cyber.harvard.edu/) and First Draft (https://firstdraftnews.org/), New York
University’s AI Now Institute (https://ainowinstitute.org/), and Cardiff University’s Data
Justice Lab (https://datajusticelab.org/). Another noteworthy development is that Silicon
Valley’s tech giants are also expanding their research presence, examples of which in
clude Microsoft’s Social Media Collective (https://socialmediacollective.org/) and
Facebook’s own research department (https://research.fb.com/).
apparent. First, the existing literature treats free speech in a discrete and contrastive
fashion. Questions have been recurrently raised about whether one’s right to free speech
should ever be limited, especially in case the content is deemed harmful to others (free
speech versus hate speech); whether one truly has freedom of speech if there appears to
be a need to hold anything back (free speech versus political correctness and self-censor
ship); and whether individuals are now freer, or less free, to speak with the prevalence of
digital media (offline free speech versus online free speech). Second, the dominant dis
course is that undesirable content ought to be “pinpointed,” avoided, removed, and insti
tutionally intervened upon (Scrivens & Davies, 2018). Various government initiatives
across Europe for the “prevention of online radicalization” epitomize this “pathological”
approach (Conway et al., 2017; Home Affairs Committee, 2017). Van der Linden et al.
Page 7 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
(2017) extend the metaphor and suggest “inoculating the public against
misinformation” (see also Roozenbeek & van der Linden, 2018, for information on a game
rendition of this suggestion).
The approach that pathologizes certain ideas and practices, however, has so far thrown
up more questions than answers. Who decides what is intolerably extreme and what is ac
ceptably moderate? Who designs and implements a mechanism that filters out extreme
content? How can the public ensure the accountability of the filtering mechanism? These,
to name a few, are by no means new questions, but are now further complicated by dis
crepancies between emerging digital practices and established theories of freedom of ex
pression.
The remainder of this chapter exhibits those discrepancies—in four groupings—in order
to develop better understandings of the issues, and to invite further, empirically ground
ed research.
Findings
Beliefs, Opinions, and “Alternative Facts”
Freedom of speech traditionally refers to the right to express one’s ideas and opinions
without fear of government censorship or punishment. However, opinions are now in
creasingly taking the disguise of so-called “alternative facts.” Since first used by White
House aide Kellyanne Conway in January 2017 in an attempt to override the media’s de
piction of President Trump’s inauguration ceremony with a more flattering narrative of
the event, the phrase “alternative facts” has become a shorthand for factually incorrect
information that is nevertheless presented as if it were one of many equally valid options
(Associated Press, 2018).
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Motivations to pollute the information ecosystem and “hack our attention” vary, ranging
from financial to ideological, and in many cases such operations are also motivated by
ego and pleasure (boyd, 2017b; Wu, 2016). Regardless of the motivations, what “alterna
tive facts,” “fake news,” and giant Internet intermediaries such as Facebook and Google,
who profile their users and deliver targeted adverts accordingly, have together (p. 478)
created is a world where individual citizens no longer know if they are seeing the same
information that others are. Tufekci (2017) emphasizes that meaningful public debate and
deliberation are not possible “without a common basis of information,” and she goes fur
ther to call our time “the democracy-poisoning golden age of free speech” (Tufekci, 2018,
italics added).
In order to tackle this problem, earlier literature has placed the onus on individual users
to actively seek diverse and more “nutritious” sources of news and information, breaking
out of the so-called “filter bubbles” and “echo chambers,” or what Lim (2017) terms “al
gorithmic enclaves,” created by customized web experiences (Johnson, 2012; Miller,
2008; Newton, 2011). However, Freelon (2018a, 2018b) urges a more nuanced approach
to the issue, highlighting that there are “ideological asymmetries in the consumption, dis
Page 9 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Content travels faster and reaches farther than ever in the digital environment. To theo
rize that, much attention has been paid to the ubiquitous and interconnected nature of
online communication, but technological affordances do not fully explain the prevailing
online culture of relaying content created by someone else (e.g., “sharing,” “retweeting,”
“reblogging”).
In this context, a growing body of literature has looked at Internet memes and virals.
Shifman’s study (2012) of 30 prominent memetic videos on YouTube, for example, identi
fied six common features of such videos: focus on ordinary people, flawed masculinity, hu
mor, simplicity, repetitiveness, and whimsical content. Berger has written extensively on
the psychological dimensions of viral phenomena, and one of his core findings is that con
tent that produces greater emotional arousal—“making your heart race”—is more likely
to get shared (Rees-Jones et al., 2015; see also Berger, 2013; Berger & Milkman, 2012;
Milkman & Berger, 2014). Facebook’s in-house researcher Kramer and two co-authors at
the University of Cornell have claimed, on the basis of a massive real-life experiment on
the company’s platform, that “emotional contagion” occurs not only during in-person in
teraction, as previously assumed, but also on social media, even without direct exchanges
or the assistance of nonverbal cues (Kramer et al., 2014). Their paper is not (p. 479) about
viral content per se, but it is nevertheless noteworthy that it highlights the important role
that emotions play in digitally mediated interactions.
Here, digitally mediated interactions do not only refer to exchanging lengthy, articulate
messages. Frequently they involve nothing more than memes, hashtags, or even emojis,
and those seemingly frivolous devices offer more than meets the eye. Wiggins and Bow
ers (2015, p. 1886) define memes as “remixed, iterated messages which are rapidly
spread by members of participatory digital culture for the purpose of continuing a conver
sation.” At one level, by sharing relatable memes, one may feel “less alone” (Tait, 2017).
In many different cultures, memes are also often found to act as “a kind of moral police of
the internet,” enabling people to “express their values and disparage those of others in
less direct and more acceptable ways” (Miller et al., 2016, p. xvi).
Page 10 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
In consequence, memes can be a powerful tool for popular mobilization. The “grass-mud
horse” meme, which was born out of a subversive pun to mock online censors in China, is
an apt example (Wines, 2009). Considering memes in Chinese cyberspace as self-expres
sions in an authoritative climate, An (2013) calls them “the street art of the social web.”
However, while being remixed and passed on, memes and other viral content often take
on a life of their own, as seen in the case of online cartoon character Pepe the Frog. Its
creator, Matt Furie, ended up deciding to kill the character off after it was appropriated
as a symbol of white nationalism and the alt-right during the 2016 presidential election in
the United States (BBC, 2017). The artist’s efforts to reclaim the innocence of the charac
ter were to no avail. To put it another way, “a meme is never just a meme,” in the words of
Phillips and Milner (2017, italics added) with reference to Harvard’s decision to rescind
admission offers from ten prospective students for having posted rape-apologist, pe
dophilic, and violently racist memes on Facebook. A May 2018 court ruling in India, ob
serving that forwarding a social media post is equal to endorsing it, also echoes the point
that content sharing is a speech act in its own right (Ashok, 2018).
A similar evolution has been observed about hashtags. The initial function of hashtags on
Twitter was to facilitate the aggregation of related information within the confines of the
platform through a crowdsourced tagging system. However, a recently growing trend is
that users—especially when facing controversies, conflicts, and crises—choose a pithy
phrase, such as #BlackLivesMatter and #JeSuisCharlie [I am Charlie], that serves as a
“mini statement” in its own right (Giglietto & Lee, 2017). Papacharissi (2016) argues that
hashtags are signifiers that allow crowds to be rendered into “networked publics that
want to tell their story collaboratively and on their own terms” (p. 308), or as she also
calls them, “affective publics” (see also Anstead & O’Loughlin, 2011; Bruns & Burgess,
2015).
dom, 2017). The field has seen an exponential growth of publications and commentary on
content manipulation in both academic and non-academic outlets since 2016. Some have
focused on who produces propagandist disinformation (e.g., Kirby, 2016; Upadhye, 2018),
while others have examined the curious operations of bots and troll farms (e.g.,
Abeshouse, 2018; Albright, 2018; Confessore et al., 2018; Digital Forensic Research Lab,
2017; Freedom House, 2017; King et al., 2017; Lotan, 2014; Phillips, 2015). Criticism has
also been levelled at platform operators, namely Facebook, Twitter, and YouTube, for the
lack of algorithmic transparency and accountability (e.g., Ananny & Crawford, 2018; Bri
dle, 2017; Hill, 2017). Interesting to note is that much of the criticism has come from for
mer employees and other tech insiders (e.g., Cadwalladr, 2018; Lewis, 2017; Thompson &
Vogelstein, 2018).
Page 11 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Privatization of Censorship
Various metaphors have been invoked to describe this process. First, social media compa
nies have carefully positioned themselves as “platforms,” on which their users express
themselves. Gillespie (2010, 2017, 2018) points out that this positioning has helped the
companies demonstrate their commitment to individual users’ freedom of expression, but
simultaneously it has also helped them seek limited liability for what those users say. At
least in the US legislative context, being categorized as a common carrier, rather than a
publisher, proves to be vitally important. Section 230 of the Communications Decency Act
(CDA) of 1996 protects online service providers from being held liable for content posted
by their users, paving the way for Silicon Valley’s social media giants today (Electronic
Frontier Foundation, n.d.). Napoli and Caplan (2017) challenge the “common carrier” sta
tus of social media platforms and online content aggregators, arguing that their business
es in fact fit well within the established parameters of media organizations. A similar se
mantic tension is observed in various sectors other than media. The two authors present
Uber as an encapsulating example, since the company insists that it be considered as a
digital service, not a transportation company. Europe’s highest court ruled otherwise in
December 2017 (Scott, 2017).
It is to be borne in mind that the question about who should regulate social media con
tent is one question that receives differing responses in different countries. Based on a
small number of elite interviews, Miridjanian (2018) states that France and Germany are
in favor of the platforms themselves doing the job, and Italy thinks it should be the police,
while the United States maintains its stance that it is a First Amendment issue. Silicon
Valley companies, who shape digital practices around the world, are indeed routinely as
sociated with libertarianism, although writers such as Morozov (interviewed (p. 481) by
Summers, 2015) and Broockman et al. (2017) clarify that their philosophies do vary but
one commonality among them is that they explicitly oppose regulation. This anti-regulato
ry stance keeps coming up in various discussions on social media content moderation and
freedom of expression, as illustrated in Murgia and Warrell (2017, regarding hate
speech), Schulson (2018, regarding pseudoscience), and Swisher (2018, interviewing
Facebook’s Zuckerberg on “Holocaust denialism”).
With or without legal liability, social media platforms are known to monitor and moderate
user-generated content as per their own policies. Suzor (2018) points out that there has
been very little information, if at all, available to the public on what proportion of social
media posts get moderated and why. This is where the metaphor of “community” is called
on, as in Facebook’s Community Standards. Given the sheer volume of the content being
generated every moment, moderation is largely done algorithmically, but also draws on
cheap labor forces in developing countries (Liptak, 2017; Roberts et al., 2017). The un
Page 12 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
The opacity of the algorithms underlying how content is curated and regulated on search
engines and social media platforms has proved to pose a threat to democratic function
ing. As discussed earlier, individual citizens no longer have a common basis of informa
tion (Tufekci, 2017), and this problem cannot simply be resolved by opening up the black
box of algorithms. Ananny and Crawford (2018) point out that algorithmic transparency
does not automatically lead to fair and effective governance. They identify many limits of
the “transparency ideal,” the most notable of which is that it can “invoke neoliberal mod
els of agency,” shifting the burden onto ordinary users, while those users may not have
the expertise to scrutinize what they see nor the power to bring about changes where
necessary.
Another important point is raised by O’Neil (2017): despite the widely held belief that al
gorithms can make more objective and hence fairer decisions, they are in fact someone’s
“opinions embedded in code.” It is therefore unsurprising that Facebook has repeatedly
met with public outcries that the site bans posts it should allow (e.g., breastfeeding im
ages on the ground of its no-nudity policy), while allowing posts it should ban (e.g., those
glorifying violence against women on the ground of free speech; Hern, 2013; see also
Facebook’s first-ever Community Standards Enforcement Report, Facebook, 2018).
YouTube has also been subject to recurrent criticisms for its “algorithmic blind spot,”
which has in particular left children vulnerable to predatory content (Kobie, 2017). In this
context, the fundamental challenge is how to ensure checks and balances against the spe
cific visions and cultures of Silicon Valley companies shaping the rest of the world (Noble,
2018; Stark, 2018).
Platforms are not only becoming the arbiters of which content is worth seeing and shar
ing but also the facilitators of data-driven surveillance, often ending up benefiting (p. 482)
corporate and political power holders. Facebook, for example, has been implicated in a
series of privacy breach scandals over the past few years. The latest, and biggest to date,
is one that broke out in March 2018 revealing that a London-based political data analytics
firm called Cambridge Analytica had exploited a loophole in Facebook’s API and “harvest
ed” personal data from as many as 87 million users for “psychographic voter profiling” in
the run-up to the 2016 US presidential election, in order to aid, reportedly, then-candi
date Donald Trump. Kim et al. (2018) term this new, technologically enabled practice a
“stealth campaign,” warning that we are likely to observe more and more of it. The plat
form was also believed to have played a “determining role” in inciting violence and ha
tred against the Muslim Rohingya minority during a 2017 military crackdown in Myan
mar, according to Marzuki Darusman, chairman of the UN Independent International
Fact-Finding Mission on Myanmar (cited in Miles, 2018). Concerns have also been raised
Page 13 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
about the possible abuse of mobile phone location data for surveillance purposes, exem
plified in Lee’s case study (2011) of a South Korean corporate’s alleged tracking of “tar
geted workers” through GPS monitoring.
In parallel, China has launched a Social Credit System, an expansion of the concept of fi
nancial credit scoring. As per this system, each citizen is rated on all aspects of daily life,
rewarded for good deeds such as charity work and recycling, and losing points for social
ly undesirable behaviors or even relationships, both online and offline (Zeng, 2018). In
this setting, opting out altogether is easier said than done. It is reported that not being
online for a prolonged period is also considered as a cause for suspicion by the authori
ties, especially when it comes to Muslim minorities (Sulaiman & Eckert, 2017). This sys
tem, combined with the Chinese government’s keen investment into artificial intelligence
and facial recognition technology, has been compared to popular culture’s depictions of a
dystopian future, ranging from William Gibson’s iconic cyberpunk novel Neuromancer
(1984) to a British sci-fi TV series Black Mirror (2011 to present) (Friend, 2018).
Given the wide array of complexities and new challenges, as outlined so far, more schools
explicitly incorporate “information literacy” and “digital literacy” into their curricula
(e.g., Horowitz, 2017; National Literacy Trust, 2018). Such efforts include advising stu
dents to be mindful of the possible consequences of whatever they post and share online,
and in particular making them realize that on social media platforms their posts are not
demarcated by their original purposes and intended audiences. Markwick and boyd
(2011, 2014) refer to this phenomenon as a “context collapse,” i.e., social media technolo
gies lump together otherwise distinct audiences and information norms, making it ex
tremely difficult for individual users to manage their social presence and privacy (see also
Litt, 2012).
According to a 2013 survey by the Pew Research Center (Hampton et al., 2014),
(p. 483)
people are indeed reluctant to express their opinions on controversial subjects on social
media platforms, especially if they anticipate disagreement from their peers, and such re
luctance is greater on social media than in face-to-face settings. This finding is important
yet unsurprising, considering the highly networked and “public-by-default” nature of the
digital communication environment.
One of the tactics that Marwick and boyd (2014) have discovered being used among
American teenagers to safeguard their online privacy is to embed private or sensitive in
formation within what appears to be an ordinary message. This tactic of “hiding in plain
sight,” also known as steganography, predates the digital age, but what is remarkable in
the social media context is young users’ innovative application of it to create multi-lay
ered access points for what they are really conveying in their online posts. In order to see
past the surface content and unlock the full meaning of a post, members of the intended
audience need to be able to recognize multiple referents (p. 22). In other words, it is “a
sort of interpersonal encryption” achieved through use of “in-jokes, nicknames, code
Page 14 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
words, and ‘subtweeting,’ ” to name a few (boyd, cited in Quart, 2014). It has been ob
served, for example, that alt-right trolls are replacing racist slurs with everyday words
(“googles,” “skypes,” “yahoos,” and “skittles”) in their tweets to circumvent content mod
eration. In this lexicon, as Sonnad (2016) deciphers, “googles” means the n-word,
“skypes” means Jews, “yahoos” means “spic,” and “skittles” means Muslims and more
specifically Muslim refugees, resulting in unintelligible posts such as “Chain the googles.”
So far, empirical studies on the correlation between anonymity and undesirable social be
havior online have yielded mixed results. Rowe (2015), for example, has found that the
occurrence of uncivil reader comments was significantly higher on the Washington Post
website, where users are able to maintain their anonymity, than on the Facebook page of
(p. 484) the Washington Post, where commenters are identified. In contrast, Maia and
In this confusing landscape of digital information and communication, when someone de
cides against speaking unreservedly, that decision may not automatically amount to a
case of self-censorship. Giglietto and Lee’s analysis (2017) of 74,047 tweets containing
#JeNeSuisPasCharlie [I am not Charlie] in the wake of a shooting attack at the offices of
French satirical weekly Charlie Hebdo in January 2015 shows that online users mobilize a
repertoire of strategies and methods for engaging with sensitive subjects while navigat
ing the challenges specific to speaking in the social media environment. Such a reper
toire often includes being deliberately ambiguous or even cryptic, especially when the
users in question are a minority voice.
Page 15 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
The idea of someone opting for ambiguity, silence, or even invisibility online, however, sits
at odds with the mainstream depiction of free speech as a non-negotiable right that one
either possesses or does not. No law, including the First Amendment of the US Constitu
tion, protects individuals from all negative consequences of their speech acts. Neverthe
less, free speech advocates are extremely resistant to the notion of legal interventions
against speech acts. The crux of their argument is encapsulated in Justice Harlan’s epi
gram “one man’s vulgarity is another’s lyric” in a 1971 US Supreme Court case on free
dom of speech (cited in Kannabiran, 2017). To put it another way, the power to decide
what speech is socially acceptable should not be vested in the government or certain
groups of people, the point also reiterated by Rowland (2018), attorney of the American
Civil Liberties Union.
The age-old debate over the limits of free speech is now further complicated by disagree
ment on whether posts on social media are public or private. While many such posts are
indeed publicly accessible, Zimmer (2010, 2016) cautions that whoever accesses them,
especially researchers, should remember that the content is posted within a certain con
text, which carries with it certain norms and expectations of privacy—or what Nis
senbaum (2004) terms “contextual integrity.” Digitally mediated speech acts tend to at
tract particularly inconsistent interpretations of free speech. On the one hand, for exam
ple, an increasing number of universities in different parts of the world find themselves in
a position where they need to take disciplinary action against students for posting hateful
content on WhatsApp or Facebook (e.g., BBC, 2018a, 2018b), despite some arguing that
the content has been posted to a closed group, hence private. On the other hand, female
victims of digital harassment are often told that much of the blame is on them because
they have posted certain information online in the first place. Hill (2012) aptly describes
this tendency: “ ‘You’re too public with your digital data, ladies’ may be the new ‘your
skirt was too short and you had it coming.’ ”
There has already been a substantial literature on why people express themselves online
(e.g., Barnes, 2018; Miller et al., 2016; Reagle, 2015), but why people choose not to is still
a relatively underexplored question. Baumer (2015), Kania-Lundholm (2018), (p. 485)
Mayer-Schönberger (2009), and Robards and Lincoln (2017), among others, have redi
rected attention to this question, highlighting the need for a more nuanced understand
ing of voluntary disconnection or deletion from online services.
Again, this is an area where the existing “either/or” framework is not helpful, and re
quires further efforts for theoretical reconciliation. To this end, a useful insight can be
drawn from Lim’s statement (2014) that “the ability to be visible and invisible—present
and hidden, alternating between online and offline spheres—creates a possibility for a
movement to articulate its own view, identity, subjectivity and its own emancipation
through online and offline practices” (p. 62, italics in original). This statement is made in
the context of a study of social movements but in a broader interpretation it reminds us
that exercising individual agency in our time involves navigating in both digital and physi
Page 16 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
cal spaces, and being able to be both visible (to intended audiences) and invisible (from
surveillance and harassment).
The purpose of this chapter has been to provide a synthesis of latest developments in the
field of freedom of expression and digital media. It has identified several “tension points”
in the current literature, where emerging digital practices unsettle the existing philoso
phies of truth, authenticity and control. The environment in which we now communicate
is marked by an unprecedented level of hybridity. It is filled with humans and artificial
agents; assigned and chosen identities; physical and virtual spaces and presences; facts,
emotions, and convictions; and grassroots as well as “Astroturf”—or even “stealth”—cam
paigns (Kim et al., 2018; Klotz, 2007; see also Table 17.2 for a summary of new free-
speech challenges posed by digital technologies and practices).
Page 17 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Page 18 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Holding back what one Users have developed new and innov
wants to say to avoid sanc ative ways of managing their pres
tions is a case of self-cen ence and privacy in a “context-col
sorship. lapsed” digital environment, includ
ing deliberate ambiguity and strate
gic invisibility.
Consequently, nothing online can be taken at face value, but at the same time ordinary
users cannot solely assume the burden of spotting and dismantling all manipulative oper
ations. The strengthening of “media literacy,” “information literacy,” and “digital literacy”
of the public has been, to borrow the words of Livingstone (2018), “everyone’s favourite
solution” to ensuring a healthy information and communication ecosystem. Despite the
importance and usefulness of those concepts, however, attention has been focused too
much on individual citizens not being outsmarted by the media and the establishment. Ac
cording to boyd (2017a), that approach has now “backfired,” deepening the already exist
ing distrust of “liberal media” and experts and effectively contributing to the recent rise
of popular unreason.
One theme that runs across the present chapter is that pathologizing problematic online
content is not suited to addressing today’s heightened information disorder. As revealed
through news reports of the Russian information warfare (allegedly during the (p. 486)
(p. 487) Brexit referendum, the 2016 US presidential election, and the ongoing conflict in
Ukraine) and the Cambridge Analytica scandal, state-of-the-art innovations in the engi
neering of attention and persuasion are bound to outpace policymakers, regulators, and
the public. It will therefore be an almost unresolvable challenge for certain entities to de
fine what content is acceptable for all, to design a mechanism that filters out the unac
Page 19 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
ceptable, and to ensure that the mechanism is fair, inclusive, and accountable to the pub
lic it serves.
As one way of addressing the challenges just summarized, here we suggest some of the
attention be redirected from functional literacy (e.g., detecting fake news and avoiding
trolls) to the heuristic purposes of language. A few decades earlier Abercrombie (1969)
developed, with medical students, a paradigm of the “anatomy of judgement,” through
which she demonstrated the power of preconceptions to distort how one evaluates evi
dence and the common fear of changing one’s position. Adapting this paradigm, we con
sider that free speech should be grounded in analyzing one’s own decisions. In other
words, free speech is an ongoing process, not a static position, of reflection upon how one
decides what one believes and how one knows what one can say in a given situation
(Scott-Baumann, 2017, 2018).
Building on this literature review chapter, our next step will be to investigate the ways in
which university students understand and exercise their communicative agency in diffi
cult social and political situations, both online and offline, including ones that involve
charismatic speakers and provocative speech typical of populism. We are looking at how
university students in different parts of Europe and Asia navigate controversial topics of
race, gender, religion, and politics, and what enhances or undermines their agency, both
online and offline. The ultimate goal of our ongoing and long-term investigation is to re
connect young people to democratic processes and encourage them to realize their poten
tial as “diffusers” of innovative knowledge and attitudes (Rogers, 2003) in the face of so
cioeconomic and gender inequality.
We focus on university students because they are portrayed contradictorily. On the one
hand, the media warn that they are, unlike their counterparts in the 1960s and 1970s, be
coming indifferent and inactive to dangerous political developments around them (Sch
warz, 2018) or, worse yet, uncritically drawn to “hipster fascism” (Allen, 2018; O’Brien,
2018). On the other hand, in many countries, they are often steered away from political
matters through various legal and policy interventions. The UK government’s Prevent
agenda as part of the Counter-Terrorism and Security Act 2015 is one example of such in
terventions. Heath-Kelly (2017) shows that fears about students being radicalized into
terrorism creates the perception that universities are “pre-criminal space” (p. 312). Born
out of this perception, constraints are imposed upon the curriculum, upon the guest
speakers who can be invited onto campus (Scott-Baumann, 2018, p. 242), and upon what
student unions as charities may or may not comment upon (Charity Commission, 2018).
To put it another way, a university campus is an ironic site of populism, as it is seen both
as a symbol of elitism and intellectualism, which populists oppose, and as a place where
young and susceptible minds may be recruited into populist waves.
Our review suggests that policies to shield students from dissent and “dangerous
ideas” (e.g., Islam and Muslim culture on UK campuses) may inadvertently—but in some
Page 20 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
cases also intentionally—do a disservice to the students and render them unable to work
their way through to balanced discourse. Being exposed to opinions that are different
from the dominant narratives can help young citizens to develop their capability to decon
struct some of the false and socially harmful arguments that they may encounter on cam
pus as well as online, but more importantly such exposure can encourage them to anato
mize their own expressions and judgements.
References
Abercrombie, M. L. J. (1969). The anatomy of judgement: Investigation into the processes
of perception and reasoning. London: Free Association Books.
Abeshouse, B. (2018, February 8). Troll factories, bots and fake news: Inside the Wild
West of social media. Al Jazeera. Retrieved from http://www.aljazeera.com/blogs/amer
icas/2018/02/troll-factories-bots-fake-news-wild-west-social-
media-180207061815575.html
Albertazzi, D. & McDonnell, D. (2008). Introduction: The sceptre and the spectre. In D. Al
bertazzi & D. McDonnell (Eds.), Twenty-first century populism: The spectre of Western
European democracy (pp. 1–14). New York: Palgrave Macmillan.
Albright, J. (2018, February 15). Trolls on Twitter: How mainstream and local news out
lets were used to drive a polarized news agenda. Berkman Klein Center Collection. Re
trieved from https://medium.com/berkman-klein-center/trolls-on-twitter-how-
mainstream-and-local-news-outlets-were-used-to-drive-a-polarized-news-agenda-
e8b514e4a37a
Allen, C. (2018, July 30). “Hipster fascists”: The normalization of the radical right isn’t
just happening in America. Rantt Media. Retrieved from https://rantt.com/hipster-fas
cists-the-normalization-of-the-radical-right-isnt-just-happening-in-america/
An, X. M. (2013). Memes, the street art of the internet. CreativeMornings. Retrieved from
https://creativemornings.com/talks/an-xiao-mina/1 [video]
Ananny, M. & Crawford, K. (2018). Seeing without knowing: Limitations of the trans
parency ideal and its application to algorithmic accountability. New Media & Society,
20(3), 973–989.
Anstead, N. & O’Loughlin, B. (2011). The emerging viewertariat and BBC Question Time:
Television debate and real-time commenting online. The International Journal of Press/
Politics, 16(4), 440–462.
Ashok, K. M. (2018, May 11). Forwarding social media posts equal to endorsing it:
Madras HC denies anticipatory bail to BJP leader S. Ve Shekher. Live Law. Retrieved from
http://www.livelaw.in/forwarding-social-media-posts-equal-to-endorsing-it-
madras-hc-denies-anticipatory-bail-to-bjp-leader-s-ve-shekher/
Page 21 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Associated Press (2018, January 16). German linguists: “Alternative facts” the non-word
of 2017. AP News. Retrieved from https://www.apnews.com/
ea702667580744c2a53bf9475855b2c2/German-linguists:-
%E2%80%99Alternative-facts%E2%80%99-the-non-word-of-2017
Baumer, E. P. S., Ames, M. G., Burrell, J., Brubaker, J. R., & Dourish, P. (2015). Why study
technology non-use? First Monday, 20(11). Retrieved from http://firstmonday.org/ojs/
index.php/fm/article/view/6310/5137
BBC (2017, May 8). “Hijacked” Pepe the Frog “killed off.” BBC News. Retrieved from
http://www.bbc.co.uk/news/world-us-canada-39843468
BBC (2018a, March 20). Exeter university students suspended over racism and rape
claims. BBC News. Retrieved from https://www.bbc.co.uk/news/uk-england-de
von-43473517
BBC (2018b, May 9). University of Warwick suspends 11 students over hate posts. BBC
News. Retrieved from https://www.bbc.co.uk/news/uk-england-coventry-warwick
shire-44052070
Beckett, L. & Burke, J. (2017, May 27). Pathway to extremism: What neo-Nazis and jihadis
have in common. The Guardian. Retrieved from http://www.theguardian.com/us-news/
2017/may/27/extremism-terrorism-far-right-neo-nazi-devon-arthurs
Berger, J. (2013). Contagious: Why things catch on. New York, NY: Simon & Schuster.
Berger, J. & Milkman, K. L. (2012). What makes online content viral? Journal of Marketing
Research, 49(2), 192–205.
Blackburn, S. (2017, July). There’s nothing new about post-truth politics. Prospect. Re
trieved from https://www.prospectmagazine.co.uk/magazine/theres-nothing-new-
about-post-truth-politics
boyd, d. (2017a, January 5). l, Did media literacy backfire? Data & Society: Points. Re
trieved from https://points.datasociety.net/did-media-literacy-
backfire-7418c084d88d
boyd, d. (2017b, January 5). Hacking the attention economy. Data & Society: Points. Re
trieved from https://points.datasociety.net/hacking-the-attention-
economy-9fa1daca7a37
Bradshaw, S. & Howard, P. N. (2018). Challenging truth and trust: A global inventory of
organized social media manipulation. Oxford, UK: Oxford Internet Institute. Retrieved
from http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/93/2018/07/ct2018.pdf
Page 22 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Brandom, R. (2017, November 7). Why were the Russian Facebook ads so strange? The
Verge. Retrieved from https://www.theverge.com/2017/11/7/16620380/russia-face
book-ad-bernie-sanders-swimsuit
Bridle, J. (2017, November 6). Something is wrong on the internet. James Brindle. Re
trieved from https://medium.com/@jamesbridle/something-is-wrong-on-the-inter
net-c39c471271d2
Broockman, D., Ferenstein, G. F., & Malhotra, N. (2017). The political behaviour of
wealthy Americans: Evidence from technology entrepreneurs. Stanford GSB Working Pa
per 3581. Retrieved from https://www.gsb.stanford.edu/gsb-cmis/gsb-cmis-down
load-auth/441556
Brooker, P. D. & Barnett, J. (2016, December 13). Where is the “alt-left” on social media?
The Conversation. Retrieved from http://theconversation.com/where-is-the-alt-left-
on-social-media-70290
Bruns, A. & Burgess, J. (2015). Twitter hashtags from ad hoc to calculated publics. In N.
Rambukkana (Ed.), Hashtag publics: The power and politics of discursive networks (pp.
13–28). New York, NY: Peter Lang.
Cadwalladr, C. (2018, March 18). “I made Steve Bannon’s psychological warfare tool”:
Meet the data war whistleblower. The Guardian. Retrieved from: https://
www.theguardian.com/news/2018/mar/17/data-war-whistleblower-christopher-
wylie-faceook-nix-bannon-trump
Chadwick, A. (2013). The hybrid media system: Politics and power. Oxford: Oxford Uni
versity Press.
Chadwick, A., Vaccari, C., & O’Loughlin, B. (2018). Do tabloid poison the well of
(p. 490)
social media? Explaining democratically dysfunctional news sharing. New Media & Soci
ety. Advance online publication. https://doi.org/10.1177/1461444818769689
Confessore, N., Dance, G. J. X., Harris, R., & Hansen, M. (2018, January 27). The follower
factory. The New York Times. Retrieved from https://www.nytimes.com/interactive/
2018/01/27/technology/social-media-bots.html
Conway, M., Khawaja, M., Lakhani, S., Reffin, J., Robertson, A., & Weir, D. (2017). Disrupt
ing Daesh: Measuring takedown of online terrorist material and its impacts. VOX-Pol Net
work of Excellence. Retrieved from http://www.voxpol.eu/download/vox-
pol_publication/DCUJ5528-Disrupting-DAESH-1706-WEB-v2.pdf
Page 23 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Cuevas, J. A. (2018, January–February). A new reality? The far right’s use of cyberharass
ment against academics. Academe. Retrieved from https://www.aaup.org/article/new-
reality-far-rights-use-cyberharassment-against-academics#.WooQAxPFK8
Daniels, J. (2018, February). Far-right attacks on faculty hurt us all. Clarion. Retrieved
from http://www.psc-cuny.org/clarion/february-2018/far-right-attacks-faculty-hurt-
us-all
Digital Forensic Research Lab (2017, December 29). #BotSpot: How bot-makers decorate
bots. DFR Lab. Retrieved from https://medium.com/dfrlab/botspot-how-bot-makers-
decorate-bots-4d2ae35bdf26
Electronic Frontier Foundation (n.d.). Section 230 of the Communications Decency Act.
Retrieved from https://www.eff.org/issues/cda230
Esguerra, R. (2009, December10). Google CEO Eric Schmidt dismisses the importance of
privacy. Electronic Frontier Foundation. Retrieved from https://www.eff.org/deeplinks/
2009/12/google-ceo-eric-schmidt-dismisses-privacy
Freedom House (2017). Freedom on the net 2017: Manipulating social media to under
mine democracy. Freedom House. Retrieved from https://freedomhouse.org/report/
freedom-net/freedom-net-2017
Freelon, D. (2018a, March 8). Personalized information environments and their potential
consequences for disinformation. In Annenberg School for Communication (Ed.), Under
standing and addressing the disinformation ecosystem (pp. 38–44). Retrieved from
https://firstdraftnews.org/wp-content/uploads/2018/03/The-Disinformation-
Ecosystem-20180207-v2.pdf
Freelon, D. (2018b, May 2). Filter bubbles are only part of the problem. Trust, Media and
Democracy. Retrieved from https://medium.com/trust-media-and-democracy/filter-
bubbles-are-only-part-of-the-problem-d3add635651c
Friend, T. (2018, May 14). How frightened should we be of A.I.? The New Yorker. Re
trieved from https://www.newyorker.com/magazine/2018/05/14/how-frightened-
should-we-be-of-ai
Garland, C. (2018, April 3). “It needn’t be true as long as it’s believable”: Manipulating
data to strategize propaganda in the era of “alternative facts.” Discover Society. https://
Page 24 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
discoversociety.org/2018/04/03/it-neednt-be-true-as-long-as-its-believable-manip
ulating-data-to-strategize-propaganda-in-the-era-of-alternative-facts/
Gerbaudo, P. (2018). Social media and populism: An elective affinity? Media, Cul
(p. 491)
Gergen, K. J. (1991). The saturated self: Dilemmas of identity in contemporary life. New
York: Basic Books.
Giglietto, F. & Lee, Y. (2017). A Hashtag worth a thousand words: Discursive strategies
around #JeNeSuisPasCharlie after the 2015 Charlie Hebdo shooting. Social Media + Soci
ety, 3(1), 2,056,305,116,686,992.
Gillespie, T. (2010). The politics of “platforms.” New Media & Society, 12(3), 347–364.
Gillespie, T. (2017, August 24). The platform metaphor, revisited. Culture Digitally. Re
trieved from http://culturedigitally.org/2017/08/platform-metaphor/
Gillespie, T. (2018). Custodians of the internet: Platforms, content moderation, and the
hidden decisions that shape social media. London: Yale University Press.
Graham, T., Jackson, D., & Wright, S. (2016). “We need to get together and make our
selves heard”: Everyday online spaces as incubators of political action. Information, Com
munication & Society, 19(10), 1373–1389.
Hampton, K., Rainie, L., Lu, W., Dwyer, M., Shin, I., & Purcell, K. (2014). Social media and
the “spiral of silence.” Washington, DC: Pew Research Center. Retrieved from http://
assets.pewresearch.org/wp-content/uploads/sites/14/2014/08/PI_Social-networks-
and-debate_082614.pdf
Hern, A. (2013, October 22). Facebook’s changing standards: From beheading to breast
feeding images. The Guardian. Retrieved from: https://www.theguardian.com/technol
ogy/2013/oct/22/facebook-standards-beheading-breastfeeding-social-networking
Hill, K. (2012, April 2). The reaction to “Girls Around Me” was far more disturbing than
the “creepy” app itself. Forbes. Retrieved from https://www.forbes.com/sites/kash
mirhill/2012/04/02/the-reaction-to-girls-around-me-was-far-more-disturbing-
than-the-creepy-app-itself/#5efd768268d4
Hill, K. (2017, August 25). Facebook figured out my family secrets, and it won’t tell me
how. Gizmodo. Retrieved from http://gizmodo.com/facebook-figured-out-my-family-
secrets-and-it-wont-tel-1797696163
Page 25 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Home Affairs Committee (2017). Hate crime: Abuse, hate and extremism online. House of
Commons. Retrieved from https://publications.parliament.uk/pa/cm201617/cmse
lect/cmhaff/609/609.pdf
Horowitz, J. (2017, October 18). In Italian schools, reading, writing and recognizing fake
news. New York Times. Retrieved from https://www.nytimes.com/2017/10/18/world/
europe/italy-fake-news.html
Howard, P. N. & Kollanyi, B. (2016). Bots, #StrongerIn, and #Brexit: Computational pro
paganda during the UK–EU referendum. ArXiv:1606.06356 [cs.SI]. Retrieved from http://
arxiv.org/abs/1606.06356
Hurst, G. (2017, February 23). Lecturers offer advice on “stifling” right-wing views. The
Times. Retrieved from https://www.thetimes.co.uk/edition/news/lecturers-offer-ad
vice-on-stifling-right-wing-views-9xh78vwcm?
mc_cid=a8ee39dff5&mc_eid=7d3735eeeb
Jack, C. (2017). Lexicon of lies: Terms for problematic information. Data &
(p. 492)
Johnson, C. A. (2012). The information diet: A case for conscious consumption. Se
bastopol, CA: O’Reilly Media.
Joint Committee on Human Rights (2018). Freedom of speech in universities: Fourth re
port of session 2017–19. Retrieved from https://publications.parliament.uk/pa/
jt201719/jtselect/jtrights/589/589.pdf
Kania-Lundholm, M. (2018, May 31). Why online disconnection matters: Voluntary ICT
non-use. WIAS Talk, University of Westminster, London, UK.
Kannabiran, K. (2017, July 5). “Hard words break no bones”: Sedition, free speech, acade
mic freedoms and sovereignty in India. DiscoverSociety. Retrieved from https://
discoversociety.org/2017/07/05/hard-words-break-no-bones-sedition-free-speech-
academic-freedoms-and-sovereignty-in-india/
Kim, Y. M., Hsu, J., Neiman, D., Kou, C., Bankston, L., Kim, S. Y., …, & Raskutt, G. (2018).
The stealth media? Groups and targets behind divisive issue campaigns on Facebook. Po
litical Communication. Advance online publication. https://doi.org/
10.1080/10584609.2018.1476425
Page 26 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
King, G., Pan, J., & Roberts, M. E. (2017). How the Chinese government fabricates social
media posts for strategic distraction, not engaged argument. American Political Science
Review, 111(3), 484–501.
Kirby, E. J. (2016, December 5). The city getting rich from fake news. BBC News. Re
trieved from http://www.bbc.co.uk/news/magazine-38168281
Kirkpatrick, D. (2011). The Facebook effect: The real inside story of Mark Zuckerberg and
the world’s fastest growing company. London: Virgin Books.
Klotz, R. J. (2007). Internet campaigning for grassroots and Astroturf support. Social
Science Computer Review, 25(1), 3–12.
Kobie, N. (2017, November 24). YouTube, kids and Silicon Valley’s recurring algorithmic
blind spot. Wired. Retrieved from http://www.wired.co.uk/article/youtube-kids-mod
eration-google
Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-
scale emotional contagion through social networks. Proceedings of the National Academy
of Sciences, 111(24), 8788–8790.
Lee, K.-S. (2011). Interrogating “Digital Korea”: Mobile phone tracking and the spatial ex
pansion of labour control. Media International Australia, 141(1), 107–117.
Lewis, P. (2017, October 6). “Our minds can be hijacked”: The tech insiders who fear a
smartphone dystopia. The Guardian. Retrieved from http://www.theguardian.com/tech
nology/2017/oct/05/smartphone-addiction-silicon-valley-dystopia
Lim, M. (2014). Seeing spatially: People, networks and movements in digital and urban
spaces. International Development Planning Review, 36(1), 51–72.
Lim, M. (2017). Freedom to hate: Social media, algorithmic enclaves, and the rise of trib
al nationalism in Indonesia. Critical Asian Studies, 49(3), 411–427.
Liptak, A. (2017, May 21). Leaked moderation guidelines reveal how Facebook approach
es handling graphic content. The Verge. Retrieved from https://www.theverge.com/
2017/5/21/15672242/facebook-files-moderation-guidelines-graphic-content-on
line
Litt, E. (2012). Knock, knock. Who’s there? The imagined audience. Journal of
(p. 493)
Livingstone, S. (2018, May 8). Media literacy—everyone’s favourite solution to the prob
lems of regulation. LSE Media Policy Project Blog. Retrieved from http://blogs.lse.ac.uk/
mediapolicyproject/2018/05/08/media-literacy-everyones-favourite-solution-to-
the-problems-of-regulation/
Page 27 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Lotan, G. (2014, June 5). (Fake) friends with (real) benefits. I ♥ data. Retrieved from
https://medium.com/i-data/fake-friends-with-real-benefits-eec8c4693bd3
Marwick, A. & boyd, d. (2011). I tweet honestly, I tweet passionately: Twitter users, con
text collapse, and the imagined audience. New Media & Society, 13(1), 114–133.
Marwick, A. & boyd, d. (2014). Networked privacy: How teenagers negotiate context in
social media. New Media & Society 16(7), 1051–1067.
Marwick, A. & Lewis, R. (2017). Media manipulation and disinformation online. Data &
Society. Retrieved from https://datasociety.net/pubs/oh/
DataAndSociety_MediaManipulationAndDisinformationOnline.pdf
Mayer-Schönberger, V. (2009). Delete: The virtue of forgetting in the digital age. Prince
ton, NJ: Princeton University Press.
Merelli, A. (2016, November 29). The key difference between populism and fascism.
Quartz. Retrieved from https://qz.com/847040/the-key-difference-between-pop
ulism-and-fascism/
Miles, T. (2018, March 12). U.N. investigators cite Facebook role in Myanmar crisis.
Reuters. Retrieved from https://uk.reuters.com/article/us-myanmar-rohingya-face
book/u-n-investigators-cite-facebook-role-in-myanmar-crisis-idUKKCN1GO2PN
Milkman, K. L. & Berger, J. (2014). The science of sharing and the sharing of science. Pro
ceedings of the National Academy of Sciences, 111(Supplement 4), 13,642–13,649.
Miller, A. (2008, March). How the news distorts our worldview. TED. Retrieved from
https://www.ted.com/talks/alisa_miller_shares_the_news_about_the_news [video]
Miller, D., Costa, E., Haynes, N., McDonald, T., Nicolescu, R., Sinanan, J. Spyer, J., …
Wang, X. (2016). How the world changed social media. London: UCL Press. Retrieved
from http://discovery.ucl.ac.uk/1474805/1/How-the-World-Changed-Social-
Media.pdf
Miridjanian, A. (2018, January 22). Réseaux sociaux: Comment réguler sans (toujours)
censurer? Libération. Retrieved from http://www.liberation.fr/planete/2018/01/22/re
seaux-sociaux-comment-reguler-sans-toujours-censurer_1622027
Mounk, Y. (2018). The people vs. democracy: Why our freedom is in danger and how to
save it. Cambridge, MA: Harvard University Press.
Mudde, C. & Kaltwasser, C. R. (2017). Populism: A very short introduction. Oxford: Oxford
University Press.
Page 28 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Murgia, M. & Warrell, H. (2017, April 8). Why tech companies struggle with hate speech.
The Financial Times. Retrieved from https://www.ft.com/content/
2aaa13b2-1ba2-11e7-bcac-6d03d067f81f
Napoli, P. M. & Caplan, R. (2017). Why media companies insist they’re not media compa
nies, why they’re wrong, and why it matters. First Monday, 22(5). Retrieved from http://
journals.uic.edu/ojs/index.php/fm/article/view/7051/6124
National Literacy Trust (2018, February 7). We launch call for evidence on fake news and
critical literacy. National Literacy Trust. Retrieved from https://literacytrust.org.uk/
news/we-launch-call-evidence-fake-news-and-critical-literacy/
Newton, E. (2011). How much comfort news is in your information diet? Search
(p. 494)
Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism. New
York: NYU Press.
O’Brien, P. (2018, March 1). Fascism in Italy: The hipster fascists trying to bring Mussoli
ni back into the mainstream. Channel 4 News. Retrieved from https://
www.channel4.com/news/fascism-in-italy-the-hipster-fascists-trying-to-bring-
mussolini-back-into-the-mainstream [video]
O’Hehir, A. (2015, July 23). “A Gay Girl in Damascus”: Behind the twisted tale of a blogger
who “catfished” the whole world. Salon. Retrieved from https://www.salon.com/
2015/07/23/
a_gay_girl_in_damascus_behind_the_twisted_tale_of_a_blogger_who_catfished_the_whole_wor
O’Neil, C. (2017, April). The era of blind faith in big data must end. TED. Retrieved from
https://www.ted.com/talks/
cathy_o_neil_the_era_of_blind_faith_in_big_data_must_end. [video]
O’Reilly Media (2011, October 18). Chris Poole, “High Order Bit” talk. Web 2.0 Summit
2011. O’Reilly Media YouTube Channel. Retrieved from https://youtu.be/e3Zs74IH0mc
[video]
Perry, D. M. (2018, May 11). If you’re worried about free speech on campus, don’t fear
students—fear the Koch brothers. Pacific Standard. Retrieved from https://psmag.com/
education/koch-heads
Page 29 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Phillips, W. (2015). This is why we can’t have nice things: Mapping the relationship be
tween online trolling and mainstream culture. Cambridge, MA: MIT Press.
Phillips, W. & Milner, R. M. (2017, June 6). The Harvard case shows a meme is never
“just” a meme. Motherboard. Retrieved from https://motherboard.vice.com/en_us/ar
ticle/zmen4y/the-harvard-case-shows-a-meme-is-never-just-a-meme
Poushter, J. (2015, November 20). 40 percent of Millennials OK with limiting speech of
fensive to minorities. Pew Research Center. Retrieved from http://
www.pewresearch.org/fact-tank/2015/11/20/40-of-millennials-ok-with-limiting-
speech-offensive-to-minorities/
Prensky, M. (2001). Digital natives, digital immigrants: Part 1. On the Horizon, 9(5), 1–6.
Quart, A. (2014, April 25). Status update. The New York Times. Retrieved from https://
www.nytimes.com/2014/04/27/books/review/its-complicated-by-danah-boyd.html
Reagle, J. M., Jr. (2015). Reading the comments: Likers, haters, and manipulators at the
bottom of the web. Cambridge, MA: MIT Press.
Rees-Jones, L., Milkman, K. L., & Berger, J. (2015, April 14). The secret to online success:
What makes content go viral. Scientific American. Retrieved from https://
www.scientificamerican.com/article/the-secret-to-online-success-what-makes-
content-go-viral/
Robards, B. & Lincoln, S. (2017). Uncovering longitudinal life narratives: Scrolling back
on Facebook. Qualitative Research, 17(6), 715–730.
Roberts, S., Wells, B., Cassidy, C., & Howlader, S. (2017, May 28). Scrubbing the net: The
content moderators. Al Jazeera. Retrieved from http://www.aljazeera.com/pro
grammes/listeningpost/2017/05/scrubbing-net-content-
moderators-170527124251892.html
(p. 495) Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York: The Free Press.
Roozenbeek, J. & van der Linden, S. (2018, February 20). Now there’s a game you can
play to “vaccinate” yourself against fake news. The Conversation. Retrieved from https://
theconversation.com/now-theres-a-game-you-can-play-to-vaccinate-yourself-
against-fake-news-92074
Rowe, I. (2015). Civility 2.0: A comparative analysis of incivility in online political discus
sion. Information, Communication & Society, 18(2), 121–138.
Rowland, L. (2018, March 9). Free speech can be messy, but we need it. ACLU. Retrieved
from https://www.aclu.org/blog/free-speech/free-speech-can-be-messy-we-need-it
Page 30 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Schulson, M. (2018, June 8). Should Google and Facebook censor the pseudoscience post
ed to their sites? Slate. Retrieved from https://slate.com/technology/2018/06/should-
google-and-facebook-censor-pseudoscience.html
Schwarz, G. (2018, April 18). My family has a Nazi past. I see that ideology returning
across Europe. The Guardian. https://www.theguardian.com/commentisfree/2018/
apr/18/family-nazi-past-ideology-europe-germany-fascism-far-right
Scott, M. (2017, December 20). Uber is a transportation company, Europe’s highest court
rules. Politico. Retrieved from https://www.politico.eu/article/uber-ecj-ruling/
Scott-Baumann, A. (2017). Ideology, utopia and Islam on campus: How to free speech a
little from its own terrors. Education, Citizenship and Social Justice, 12(2), 159–176.
Scott-Baumann, A. (2018). “Dual use research of concern” and “select agents”: How re
searchers can use free speech to avoid “weaponising” academia. Journal of Muslims in
Europe, 7(2), 237–261.
Scrivens, R. & Davies, G. (2018, February 14). Identifying radical content online. VOX-Pol
Network of Excellence. Retrieved from http://www.voxpol.eu/identifying-radical-con
tent-online/
Shifman, L. (2012). An anatomy of a YouTube meme. New Media & Society, 14(2), 187–
203.
Sloam, J. (2014). New voice, less equal: The civic and political engagement of young peo
ple in the United States and Europe. Comparative Political Studies, 47(5), 663–688.
Solon, O. (2018, July 6). The rise of “pseudo-AI”: How tech firms quietly use humans to do
bots’ work. The Guardian. Retrieved from https://www.theguardian.com/technology/
2018/jul/06/artificial-intelligence-ai-humans-bots-tech-companies
Sonnad, N. (2016, October 1). Alt-right trolls are using these code words for racial slurs
online. Quartz. Retrieved from https://qz.com/798305/alt-right-trolls-are-using-
googles-yahoos-skittles-and-skypes-as-code-words-for-racial-slurs-on-twitter/
Stark, L. (2018, February 17). A lack of emotional intelligence is fueling misogyny and
racism at Google—and across Silicon Valley. Berkman Klein Center Collection. Retrieved
from https://medium.com/@lukestark/a-lack-of-emotional-intelligence-is-fueling-
misogyny-and-racism-at-google-and-across-silicon-2d50f3b4c6db
Sulaiman, E. & Eckert, P. (2017, September 11). China runs region-wide re-education
camps in Xinjiang for Uyghurs and other Muslims. Radio Free Asia. Retrieved from
https://www.rfa.org/english/news/uyghur/training-camps-09112017154343.html
Summers, J. (2015, December 26). Evgeny Morozov on Uber’s disruptive, libertarian lie:
“Whatever the CEO of Uber might say about Ayn Rand, the company itself is interested
only in producing regulation that works in its favor.” Salon. Retrieved from https://
Page 31 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
www.salon.com/2015/12/26/
evgeny_morozov_on_ubers_disruptive_libertarian_lie_whatever_the_ceo_of_uber_might_say_a
Suzor, N. (2018, May 8). What proportion of social media posts get moderated,
(p. 496)
Swisher, K. (2018, July 18). Zuckerberg: The Recode interview. Recode. Retrieved from
https://www.recode.net/2018/7/18/17575156/mark-zuckerberg-interview-face
book-recode-kara-swisher
Tait, A. (2017, March 31). It me: How memes made us feel less alone. New Statesman.
Retrieved from https://www.newstatesman.com/science-tech/internet/2017/03/it-
me-how-memes-made-us-feel-less-alone
Thompson, N. & Vogelstein, F. (2018, February 12). Inside Facebook’s two years of hell.
Wired. Retrieved from https://www.wired.com/story/inside-facebook-mark-zucker
berg-2-years-of-hell/
Townson, S. (2016, January 26). Why people fall for pseudoscience (and how academics
can fight back). The Guardian. Retrieved from https://www.theguardian.com/higher-
education-network/2016/jan/26/why-people-fall-for-pseudoscience-and-how-acad
emics-can-fight-back
Tufekci, Z. (2017, September). We’re building a dystopia just to make people click on ads.
TED. Retrieved from https://www.ted.com/talks/
zeynep_tufekci_we_re_building_a_dystopia_just_to_make_people_click_on_ads
[video]
Tufekci, Z. (2018). It’s the (democracy-poisoning) golden age of free speech. Wired. Re
trieved from https://www.wired.com/story/free-speech-issue-tech-turmoil-new-cen
sorship/
Upadhye, J. (2018, June 28). Meet Mexico’s king of fake news. BuzzFeed. Retrieved from
https://www.buzzfeed.com/watch/video/59338?utm:term=.doNP9YL1J [video]
Van der Linden, S., Leiserowitz, A., Rosenthal, S., & Maibach, E. (2017). Inoculating the
public against misinformation about climate change. Advanced Science News, 1(2), 1–7.
Van der Nagel, E. & Frith, J. (2015). Anonymity, pseudonymity, and the agency of online
identity: Examining the social practices of r/Gonewild. First Monday, 20(3). Retrieved
from http://firstmonday.org/ojs/index.php/fm/article/view/5615
Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science,
359(6380), 1146–1151.
Wardle, C. (2017, February 16). Fake news. It’s complicated. First Draft. Retrieved from
https://firstdraftnews.org:443/fake-news-complicated/
Page 32 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Weiss, B. (2018, May 8). Meet the renegades of the Intellectual Dark Web. The New York
Times. Retrieved from https://www.nytimes.com/2018/05/08/opinion/intellectual-
dark-web.html
Wilson, J. (2018, February 21). Crisis actors, deep state, false flag: the rise of conspiracy
theory code words. The Guardian. Retrieved from https://www.theguardian.com/us-
news/2018/feb/21/crisis-actors-deep-state-false-flag-the-rise-of-conspiracy-theo
ry-code-words
Wines, M. (2009, March 12). A dirty pun tweaks China’s online censors. New York Times.
Retrieved from http://www.nytimes.com/2009/03/12/world/asia/12beast.html
Wright, S. (2012). From “third place” to “third space”: Everyday political talk in non-polit
ical online spaces. Javnost—The Public, 19(3), 5–20.
Wu, T. (2016). The attention merchants: The epic scramble to get inside our
(p. 497)
Zeng, M. J. (2018, January 23). China’s Social Credit System puts its people under pres
sure to be model citizens. The Conversation. Retrieved from http://
theconversation.com/chinas-social-credit-system-puts-its-people-under-pressure-
to-be-model-citizens-89963
Zimmer, M. (2010). But the data is already public: On the ethics of research in Facebook.
Ethics & Information Technology, 12(4), 313–325.
Zimmer, M. (2016, May 14). OkCupid study reveals the perils of big-data science. Wired.
Retrieved from https://www.wired.com/2016/05/okcupid-study-reveals-perils-big-
data-science/
Yenn Lee
Yenn Lee (PhD, University of London) is a widely published researcher in the sociolo
gy of digital technologies, participation, and social change, with a special interest in
the Asia–Pacific region. She has also long collaborated with various activist and non-
profit organizations outside academia, including Freedom House for its annual report
Freedom on the Net since its first edition in 2011. In her current position as Senior
Page 33 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Ecology of Free Speech: Authenticity, Identity, and Self-Censorship
Alison Scott-Baumann
Page 34 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.16
This chapter describes the analyses and results for the ESRC Economy and Organizations
domain, guided by two main questions: How do we construct the digital to be open to all,
sustainable, and secure? And what impacts might the automation of the future workforce
bring? The chapter first provides an initial overview of the major insights from the litera
ture review and analysis, the Delphi surveys, and workshop discussions about the rele
vant range of the concepts of economy and organization (initially, economy and sustain
ability). Four main topics emerged: digital technology uptake by both business and con
sumers; social and economic capital of citizens; digital skills; and economic growth and
change. Analysis of a specially curated set of 1900 articles over the 2000-2016 period
showed perhaps the greatest change in focus over time of all the domains. The earlier lit
erature emphasized information as a product (involving property rights, markets, law),
and some technologies. The later literature highlighted knowledge seeking, skills, com
munication, and uses. The analyses also identified the roles of theory (rather under-uti
lized but, when used, were primarily from sociology) and methods (the most common be
ing literature reviews) in this domain. The chapter ends with a discussion of future re
search directions (e.g., the shaping and development of the digital economy while also
fostering sustainability and participation, and impacts of digital labor on people’s life ex
periences) and research challenges (e.g., measuring overall impact of a digital technology
on a business, and measuring new ways of working and consuming).
Keywords: automation, digital economy, digital labor, digital technology, economic growth and change, ESRC
economy and organizations, ESRC Review, future workforce, sustainability
Introduction
THIS chapter provides an overview of the analyses of the Delphi process, literature re
view and any relevant workshops material for what was originally defined as the Econo
my and Sustainability domain. This domain proved difficult to define via the Delphi work
—it both broadened out to wider economic issues while also overlapped with many of the
Page 1 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Initial Comments
This domain proved the most difficult for which to collect data. Response rates to the Del
phi process were low, and the data provided were more limited than in other domains.
One of the major current social, political, and economic concerns for this domain is the
impact of augmentation and automation, although that is notably absent (p. 324) from the
analysis of prior literature. The potential impact of automation and augmentation was ex
tensively addressed by two dedicated workshops jointly funded by the ESRC and the UK
Defence Science and Technology Laboratory, and by the ESRC and US National Science
Foundation, respectively. We speculate that a review of this domain undertaken in the
coming years would see this topic emerge as a major theme. Chapter 24 details more fully
the outcomes from these two workshops. In the present chapter, we report the Delphi da
ta in full, but we caution that this is not as large or robust a data set as that provided for
the other domains, so the data sets used for the consultation workshop were more limit
ed; therefore, the workshop participants provided additional commentary. Although very
useful, this makes the results here dependent on a smaller set of mainly UK expertise.
Literature Analysis
The literature analysis is designed to identify two sets of data. The first data set compris
es the key topics within the existing literature, which will allow the comparison with ar
eas of importance identified by the Delphi review. The second data set is a content analy
sis of the literature to explore the predominance of specific, theory, methods, and ap
proaches.
Topics
Despite the lower number of Delphi responses, the recommended literature was of com
parable size to the other domains. Table 11.1 lists the 10 most common (2% or more of
the identified cases) concepts identified in the Round 1 literature. Table 11.2 lists concept
pairs.
Page 2 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Concepts Percent
Information 13.4
Knowledge 10.3
Computer 9.2
Internet 6.6
Communication 6.0
Work 5.1
Datum 4.9
Medium 3.1
Chain 2.1
Organization 2.0
Page 3 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 4 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 5 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 6 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
All the literature collected from both rounds was analyzed using Wordstat. Word
(p. 325)
Page 7 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 8 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 9 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 10 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 11 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
In this case the two analyses do not strongly overlap except in the areas of digital skills
and product development. This may reflect substantive differences in the round 1 and
round 2 data sets, but as noted in chapter 2 (Methods), these are new and to an extent ex
perimental methods. Further research work is needed to explore the different representa
tions that alternative concept and topic modelling tools provide. We would also note that
the idea of “sustainability” was predominantly interpreted as the development of “tech
nologies to support environmental sustainability” such as smart meters. Also, it is clear
that our round 2 respondents took a broader “political economy” definition into account.
Finally, a considerable number of identified texts overlapped with the Citizenship and Par
ticipation (chapter 16), Communities and Identities (chapter 14), and Governance and Se
curity (chapter 22) literature. Looking at the underlying keywords in each analysis, seven
key areas stand out (see Table 11.3):
(p. 326)
Of these, Facebook use, and democracy and the public sphere, have been dealt
(p. 327)
with in the Communication and Relationships (chapter 8), Community and Identities
(chapter 14), and Citizenship and Politics (chapter 16) domains.
Looking over time at the smaller curated literature for the subject “economy,” we can see
an early focus in the literature (2000–2004) on information as a product: goods and pro
duction; costs; information as property, and information rights; markets, transactions,
strategy, law, organizations and firms; with a small focus on technologies, such as net
works, websites, the web, and channels. By 2012–2016, there was almost a complete shift
to emphasizing knowledge seeking, skills and experience, communication, uses (purposes
such as health, support, and attitudes such as anxiety and ambiguity), and more global is
sues such as energy and the information society. But in general the pattern of concepts
over time becomes quite diverse. Figures 11.1 and 11.2 display the changing nature and
frequency of concept pairs in the “economy” subject, from 2000–2004 and 2012–2016.1
Page 12 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 13 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
cial intelligence, and augmentation on economy and society were often highlighted (and
these issues are dealt with elsewhere; e.g., chapters 12 and 24). This was a strong soci
etal and media topic at the time of this work, so the ESRC commissioned the team to run
two further workshops on these topics. We therefore introduce some themes from the
stakeholder workshops run before and during the project. In these, SMEs (small and
medium sized enterprises) and corporate and government stakeholders predominantly
raised issues with regard to: product and technology development and uptake, the use of
social media and Internet platforms (Facebook, Twitter, Google), economic growth, intel
lectual property, and digital education and skills.
Given the variations between the analyses of the literature and the additional concerns of
stakeholders, picking key topics in the literature was challenging. We have therefore fo
cused here on the topics with a strong economic aspect that point to wider social issues:
(p. 329)
Digital technology uptake. In the ESRC and NSF workshop one of the economics con
tributors noted that “small investments in digital innovations can lead to disproportionate
accumulations in wealth.” This comment reinforces one of the key features of our digital
economy is the extent to which the initial development of digital systems can be relatively
low cost but have high economic returns. This has been the underlying drive behind the
substantive venture capital investment in digital start-ups. At the same time, govern
ments have identified basic and advanced digital skills and digital infrastructure invest
ments as key to developing national productivity (for example the UK government’s digi
tal and industrial strategies at the time of writing). It’s therefore clear that digital tech
nologies have and will continue to change, transform, and even transform many aspects
of the economy and business practices and processes. Social research therefore needs to
understand and examine the processes by which digital products are developed, de
ployed, and taken up by both businesses and consumers.
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
zations, Ifinedo notes that digital leadership is key to the uptake of digital technologies:
“The views of the participating SMEs seem to be indicating that top executive support is
considered crucial for IEBT to the accepted in the adopting organization” (Ifinedo, 2011,
p. 269).
Another key issue is how digital technologies change how organizations function, are
managed, and perceive themselves. There is a large body of literature exploring the par
ticular and general impactions of specific technologies or of digital tools in general that
we cannot explore in depth here. But as we note in the content analysis to come, no clear
theoretical position or approach stood out in the literature analyzed. There are examples,
though, of work that seeks to apply digital- or technology-oriented theory to these issues.
As an interesting take on this issue, Flyverbom et al. (2016), in their introduction to a
special issue on “visibility” in the digital age, argue that in order to understand how con
temporary organizations operate in a digital context, we need to understand how they
manage the “visibilities” provided by digital technologies. That is, how do they make
things transparent or keep things hidden within the organization? This in part refers to
the extent that such technologies allow for the observation of work (content) (p. 330) and
workers (connections). Flyverbom et al. identify four central affordances in digital tech
nologies that are enacted in the contemporary workplace: visibility, persistence, editabili
ty, and association. They argue that taking
They conclude:
Visibility is a root affordance in the digital age that helps to enable other branch
affordances, including persistence, editability, association, and likely many others.
In other words, these other affordances are possible because of the visibility affor
dance.
Similarly, there is the need to understand and theorize complex networks of people and
systems created by digital technologies—within companies, among citizens, and across
society and the economy. Contractor, Monge, and Leonardi (2011) provided a typology for
such multidimensional networks that draws from and builds on actor-network-theory and
includes multiple kinds of nodes and multiple kinds of relations, involving both human
and nonhuman actors. At the core of their argument is the claim that failing to conceptu
alize human actors and machines or technologies in complex multifaceted networks as in
Page 15 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
terrelated in dynamic processes would provide incomplete and partial research or theory.
They argue:
Adoption of technologies by consumers has also been extensively studied across a range
of disciplines. Such work often blends into the policy domain, as there is a focus on issues
such as digital inclusion, service provision, innovation, and market development. An ex
ample would be LaRose et al.’s (2012) study that examines broadband adoption and use
and offers design and monitoring of sustainable broadband adoption interventions. Again
this is an area where a variety of theories are employed. The authors develop a new theo
ry that takes people’s psychological considerations into account, rather than only demo
graphic factors, when thinking about broadband adoption. Another concept that is taken
under consideration as an improvement to the Diffusion of Innovation theory is self-effica
cy, as they argue that, “habitual Internet use can be expected to provide additional oppor
tunities to observe and directly experience the outcomes of broadband (p. 331) adoption
while bolstering beliefs about individual abilities to use the Internet effectively” (LaRose
et al., 2012). They conclude and reinforce this argument by stating that their “results sug
gest that demographic variables such as age, income, and race play a relatively smaller
role in intentions to adopt broadband, whereas socio-cognitive theory variables such as
self-efficacy and habit strength play a relatively larger role” (LaRose et al., 2012).
Social and economic capital. The other side of the discussion around the socio-econom
ic impact of digital media and technologies is that of growing “digital divides.” Though
discussion of digital inequalities can be found in all the domains reported in this book, a
good number of papers address this in terms of economic, social or cultural capital (see
also chapters 5 and 15). For example, Helsper (2012) proposes a theoretical model that
links social and digital exclusion. She shows how fields of social, economic, cultural, and
personal resources influence digital exclusion. Helsper further argues that offline exclu
sion fields influence digital exclusion and are mediated by access, skills, attitude, or moti
vation. But Helsper also contributes to the debate by noting how digital exclusion influ
ences social exclusion, which she categorizes as four digital impact mediators: relevance
(usefulness), quality of experience (ease of use), ownership (agency and empowerment),
and sustainability (social and financial). Helsper argues:
The four top level fields of offline and digital exclusion relate to each other; an in
dividual who is excluded from one is also likely to be excluded from another. Nev
ertheless, the fields are separate constructs addressing different (macro and mi
cro) aspects of exclusion. These economic, cultural, social, and personal fields are
Page 16 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
This is of course an issue across the globe. As an example, Cartier, Castells, and Qiu
(2005) examine the category of “information have-less” which described millions in
China’s income groups such as rural migrants, pensioners, and fired employees who are
sitting in a gray zone of China’s digital divide. Because of their lack of financial re
sources, they have to use inexpensive ICTs such as Internet cafes, prepaid phone cards,
and limited smart mobile phones. The people of this category tend to use “have-less” ICT,
which has three characteristics: inexpensive technologies and services; limited mobility
and low functional choice (usually constrained by time and space); and limited ability to
perform critical informational functions. They note:
The growth of have-less ICTs in China reflects the country’s economic boom since
the 1980s, which is characterized by increasing income inequality … Structural in
equality and institutional constraints can systematically keep the have-less from
accessing regular and high-end ICT services.
Skills. Within the debate on digital inequalities, a key concern is not just material access
but also skills. A considerable focus of such work is on the acquisition of digital skills
relevant to both work and to aspects of digital exclusion. Van Deursen and van
(p. 332)
Dijk (2010), building on their prior work, point to four types of digital skills:
Using two surveys of the Dutch population, Van Deursen and Van Dijk consider how the
levels of such skills vary with key demographics, concluding that
the original digital divide (defined as the gap between people who have and do not
have physical access to computers and the internet) has developed a second di
vide that includes differences in the skills to use the internet … In digital divide
research, the conclusion that operational and formal internet skills are not suffi
cient for an effective use of the internet so far only received little attention. Infor
mation and strategic internet skills are also required. In contemporary (and fu
ture) information society these skills increasingly determine people’s positions in
the labor market and in social life. Unfortunately, these skills appear to be the
most problematic and a large part of the Dutch population seems to be struggling
to equip themselves with the skills they need to participate in contemporary soci
ety.
Page 17 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Looking at a specific workplace context, Van Deursen and Van Dijk (2010) examine Dutch
civil servants’ Internet skills (operational, information, and strategic) across different
types of civil servant roles (administrators, executive, and policy advisors). As with the
general population, the authors found that these civil servants do not perform well when
it comes to skills involving information and strategic tasks. They conclude that “the levels
of operational and formal internet skills are higher than the levels of information and
strategic internet skills” (Van Deursen & Van Dijk, 2010, p. 140).
Age and position appear most important for the civil servant’s level of operational
and formal internet skills. Younger civil servants performed better than their older
counterparts, and the executive employees performed worse than policy advisors
and administrators.
Economic change and growth. A key area of concern is of course the specifics of eco
nomic change and growth that comes with the use of digital technologies and media. This
includes the challenges of creating global markets for digital technologies, how such
technologies and their users change both industries and markets, and shifts from “materi
al” to “digital or knowledge” products. This is an area of research that has been ongoing
since the rise of ICTs, predating much of the review work reported here. A part of such
work has been the understanding of how technology standards function to underpin mar
kets for digital technologies, or, conversely, the use of digital technologies (p. 333) to un
derpin markets. For example, David and Steinmueller’s (1996) article examined Global In
formation Infrastructures (GII) and the way that standards influence potential contribu
tions to international trade. They point to a fundamental need to reconcile various infor
mation and communication technology standards:
Especially because GII is not under the governance of one country, this brings new chal
lenges whereby parties try to negotiate power and control through common agreements
on standards. The authors argue that there are three economic reasons behind problems
around interoperability: innovation, individuals’ mass adoption of a particular technology,
and attractiveness of “super-setting” (adding features to a popular product on top of ac
cepted standards).
Page 18 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Somewhat supported by history, Sarkar, Butler, and Steinfield (1998) argued that inter
mediaries, termed as cybermediaries, and multi-organization structures, and what we
may now consider to be “platform economics” of organizations and platforms such as
Amazon, Netflix or Facebook, will play a key role in electronic markets:
The literature also examines the question of a shift from manufacturing to data or knowl
edge-based economics (see also chapter 1). Steinmueller (2002) points to the transition in
the structure of economic activities towards a knowledge-based economy, and its implica
tions for social development. The special characteristics of a knowledge-based economy—
where information is the main economic product—mean that there is a need for new
analyses and measures for economic growth that take into account their influence. Stein
mueller provides a brief and simplified summary of the unique characteristics of informa
tion:
Information, in turn, has important economic properties not shared by other eco
nomic commodities, namely: (1) nonexcludability (i.e., an individual’s possession
of information does not prevent another from using it as well); (2) non-rivalry in
use (providing a copy of information does not reduce information ‘holding’); and
(3) low marginal cost of reproduction (once the first copy of information has been
produced, subsequent copies are much cheaper to reproduce).
Some of the problems that arise are searching for, filtering, and evaluating information as
part of knowledge management. There are also regulatory issues that arise when trying
(p. 334) to commodify information, such as intellectual property right and competition pol
The openness of the Internet and the rapid ability to exchange information therefore po
tentially undermines more traditional aspects of material-based markets. This tension be
tween the ease of reproduction and market value has been played out in a range of indus
tries, especially media industries, which are based on the creation, distribution, commodi
fication, and, more recently, collection of information (see Rice, 2008), of the last decade.
Steinmueller, points out that restriction of access and digital “ownership” rights are re
quired in such markets:
Page 19 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
User data are both in China and the West’s surveillance-industrial complexes first
externalised and made public or semi-public on the Internet in order to enable
users’ communication processes, then privatised as private property by Internet
platforms in order to accumulate capital and finally particularised by secret ser
vices and the police who bring massive amounts of data under their control that
are made accessible and analysed with the help of profit-making security compa
nies.
He further points out the strong links between the various elements of the economy, espe
cially the information and finance sectors, in both China and the United States:
(p. 335)
Page 20 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
As in the other review chapters this analysis builds on Borah (2017), though as noted in
the introduction, the data collected in this area was not as strong as in the other domains.
Most of the analyzed papers (59%) were inductive, either describing findings or building
theory. The remainder were deductive, undertaking theory testing or assessment (see Ta
ble 11.4). Just under a third of the papers (30%) undertook primary data collection, with
55% being discursive reviews of, or reflective on, existing research (see Table 11.5).
Concerning the role of theory, only actual use of theory for the purposes of design or
analysis were coded, while general reference to prior work and theory were not. The ma
jority of papers (76%) did not utilize theory in the analysis of data. The main discipline
from which theory was taken was sociology (72% of all theory used). There was consider
able variety in the specific theories applied from any disciplines and no clear preference.
No one theory appeared more than three times. The main research method was literature
reviews (36%; Table 11.6). The majority of the empirical work focused on specific groups,
with a limited number of general population studies (see Table 11.7). No papers were
based on the use of big data.
Percent
Percent
Page 21 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Percent
Survey 11.0
Interview(s) 9.2
None 8.3
Other 6.8
Ethnography 6.1
Experiment 1.2
Percent
As noted earlier, this domain may have the least reliable Delphi data set and therefore the
least explicit starting point for the literature collection, although the identified literature
(p. 336) data set is of a similar scale to all the other domains. The literature appears to be
Page 22 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
strong political economy aspects of the topic analysis. Selecting areas for future work is
therefore more problematic here, especially as the issue of the automation of work has
been addressed separately.
Delphi Review
The following sections summarize the results of the Delphi process for the domain cover
ing: suggested scoping or research questions, key topics to address within these ques
tions, and key challenges to researching these questions.
The Delphi review responses indicated that the two ESRC scoping questions were
deemed broadly appropriate for the domain:
Only a limited number of additional questions were provided, so they were not grouped or
coded:
• How is the digital economy constructed through economic, cultural, and political
processes, and how could it be constructed to enable greater participation and sustain
ability?
• How to guide and assist all participating actors in the digital economy to ensure it is
open to all stakeholders, sustainable, and secure?
• How can the digital and society be shaped in order to be sustainable, participatory,
and fostering co-operation and inclusion?
• What interventions are feasible and desirable in order to shape the digital according
to any set of preferences?
• How should those preferences be established? How should those preferences be ne
gotiated, taking into account the global nature of digital?
• Under which conditions and in what contexts is it desirable to construct a digital
world that maximizes openness, and in which contexts is it desirable to construct a rel
atively closed digital environment?
• What conditions and problems can hinder the establishment of a participatory co-op
erative, sustainable, inclusive information society and digital society?
• In a given context, which approaches to openness are sustainable from a variety of
stakeholder points of view?
• What issues of security arise in each of these contexts that then limit the openness of
the digital world?
Page 23 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
As noted previously, we have introduced some themes from the stakeholder workshops
(Digital Leader Salons) run before and during the project. In these, SME and corporate
and government stakeholders predominantly raised issues with regard to product and
technology development, the use of social media and Internet platforms (Facebook, Twit
ter, Google), economic growth, intellectual property, and digital education and skills. The
confirmatory survey asked respondents to select the most important of these, presented
in Table 11.8. The three most frequently mentioned scoping questions (24% each for the
first two and 19% for the third) involved (1) the shaping and developing of the digital
economy, especially in ways that promote participation and sustainability, (2) the shaping
of the interrelations of the digital and society to improve sustainability, co-operation, and
inclusion, and (3) the conditions and problems hindering such shaping.
Page 24 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Question Per
cent
The consultation workshop noted potential gaps in the suggested scoping ques
(p. 338)
Page 25 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
economy (Uber), Amazon, eBay, and online selling; rural and informal economy, and re
gional or geographical implications (e.g., specialist regions)?
Topics
The topics identified in the Delphi review were coded into 14 categories, listed in Table
11.9. The most frequently mention topic was the role and impact of major corporate plat
forms, followed by disruptive technology, environment and sustainability, forms of digital
labor, and governance. Table 11.10 presents the ranked importance of these from the con
firmatory survey, which closely matches the initial Delphi list.
Governance 8 Politics 4
Productivity 4
Surveillance 4
Theory 4
Page 26 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 27 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
The consultation workshop offered a number of additional topics, some of which overlap
with those presented earlier:
• Impacts of digital labor on people’s life experience; impacts on firms of digital plat
forms
(p. 339) • Technology adoption in organizations
• Role of digital monopolies and large corporations; digital impacts on the state: taxa
tion, feedback to society
• Inequality and justice, social divides, financing, investment, crowd funding, lending
• Implications of the digital for energy/resource use (i.e., increased paper consump
tion)
• Enabling of sustainability through digital means through new platforms and apps
• Regional urban/rural development
Challenges
The challenges in undertaking research in this area identified by the Delphi panel were
grouped into six categories. Table 11.11 lists these categories, ranked by the number of
coded items, with those deemed to be domain specific by the consultation workshop
(p. 340) marked in bold. By far the highest percentage of cases involved new methods and
tools to study the digital economy, followed at much lower levels by access to data on the
digital economy, ethics, and representativeness of data. Table 11.12 shows their ranking
by the confirmation survey. There is an inverse relationship here between these lists, but
given the low response rates, we should not infer too much from this.
Challenge Percent
Ethics 13
Representativeness of data 13
Page 28 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 29 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Page 30 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
The consultation workshop proposed a set of further challenges, some of which overlap
with those mentioned previously. A number of these are reflected in the cross-cutting
challenges discussed in chapter 25. Here are the challenges, with domain-specific ones in
italics:
• The social sciences need to take place within a more technology-oriented area.
• Funding landscape is inevitably shaped by the status quo/current economic modes—
possibly making it harder for radically different modes to be researched.
• Concerns over the allure of “novelty,” as some “older topics” may also be
(p. 341)
highly needed.
• Measuring overall impact of a digital technology on a business is very difficult.
• Is there a bias towards quantitative data?
• Similarly measuring scale and scope of new ways of working and consuming
• Fluctuating and differentiation of prices make certain qualifications challenging
(e.g., consumer price index).
• Challenges around interdisciplinary/cross-sector working
• Incorporating new forms of data, limited resources, extracting information
Conclusion
Given the more limited data for this domain, making both broad and in-depth conclusions
are harder than it is for the other domains. The literature and the various inputs from
Delphi process, stakeholders, and review workshops tended to focus on the social and or
ganizational aspects. The theme of sustainability has not come through strongly, nor has
formal economics work. This likely points to the foci of the theme questions and limitation
of the sample. But we would argue it also points to the fact that understanding the eco
nomic impact of digital systems has a strong social and sociological element that needs to
be explored.
Overall further work needs to be done to explore the specifically economic disciplinary is
sues that digital technologies engender. Within the context of this review we would ar
gue, caveats concerning the representativeness of the data notwithstanding, that the
workshops, Delphi results, and stakeholder input have defined the following key areas for
future research:
1. The role and impact of major corporate digital platforms, including impacts on
firms of digital platforms and the role of digital monopolies and large corporations.
2. The uptake and impacts of digital technologies in organizations, especially au
tomation and augmentation on work and the economy.
3. Tied to both key areas 1 and 2 are forms of digital labor, including impacts of digi
tal labor on people’s life experience, and the gig economy (linked to platforms).
Page 31 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Two of the key challenges that cross-cut these are the finding of new methods and tools
to study digital economy, and access to data on the digital economy.
References
Borah, P. (2017). Emerging communication technology research: Theoretical and method
ological variables in the last 16 years and future directions. New Media & Society, 19(4),
616–636.
Cartier, C., Castells, M., & Qiu, J. L. (2005). The information have-less: Inequality, mobili
ty, and translocal networks in Chinese cities. Studies in Comparative International Devel
opment, 40(2), 9–34.
Castells, M. (2011). The rise of the network society. New York: John Wiley & Sons.
Contractor, N., Monge, P., & Leonardi, P. M. (2011). Network theory. Multidimensional
networks and the dynamics of sociomateriality: Bringing technology inside the network.
International Journal of Communication, 5, 39.
David, P. A., & Steinmueller, W. E. (1996). Standards, trade and competition in the emerg
ing global information infrastructure environment. Telecommunications Policy, 20(10),
817–830.
Flyverbom, M., Leonardi, P., Stohl, C., & Stohl, M. (2016). Digital age. The management
of visibilities in the digital age—introduction. International Journal of Communication, 10,
12.
Fuchs, C. (2016). Baidu, Weibo and Renren: The global political economy of social media
in China. Asian Journal of Communication, 26(1), 14–41.
Helsper, E. J. (2012). A corresponding fields model for the links between social and digital
exclusion. Communication Theory, 22(4), 403–426.
LaRose, R., DeMaagd, K., Chew, H. E., Tsai, H. Y. S., Steinfield, C., Wildman, S. S., &
Bauer, J. M. (2012). Broadband adoption. Measuring sustainable broadband adoption: an
innovative approach to understanding broadband adoption and use. International Journal
of Communication, 6, 25.
Rice, R. E. (Ed.). (2008). Media ownership: Research and regulation. Cresskill, NJ: Hamp
ton Press.
Sarkar, M., Butler, B., & Steinfield, C. (1998). Cybermediaries in electronic marketspace:
Toward theory building. Journal of Business Research, 41(3), 215–221.
Page 32 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
Van Deursen, A. & Van Dijk, J. (2010). Civil servants’ internet skills: Are they ready for e-
government? In M. A. Wimmer, H. Chappelet, M. Janssen, & H. J. Scholl (Eds.), Interna
tional conference on electronic government. EGOV 2010 (pp. 132–143). Berlin, Heidel
berg: Springer.
Van Deursen, A. & Van Dijk, J. (2011). Internet skills and the digital divide. New Media &
Society 13(6), 893–911.
Notes:
(1.) As part of the review, The Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high-frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/ provides ac
cess to the top 50 most frequently occurring pairs and trios through a series of data visu
alizations. Click on View Data Visualizations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
ticles at the top. Also, see https://waysofbeingdigital.com/literature-analysis-interactive-
results/ for interactive visualizations with mouse-overs of the main clusters of concepts
within each Domain, and the relative frequency of concepts associated with each cluster.
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
Page 33 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Paul Hepburn
Paul Hepburn is a Research Associate at Heseltine Institute for Public Policy and
Practice, University of Liverpool. His research interests lie in exploring the potential
of the new digital media to enhance local democracy and local governance. He is also
interested in methods and tools for analyzing and explaining the structure of online
networks. Prior to pursuing an academic career, Paul worked in local government
conducting research, developing policy, and, lately, implementing an e-government
program.
Ronald E. Rice
Ronald E. Rice (PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the
Social Effects of Mass Communication in the Department of Communication at Uni
versity of California, Santa Barbara. Dr. Rice has been awarded an Honorary Doctor
ate from University of Montreal (2010), an International Communication Association
(ICA) Fellow, selected President of the ICA (2006–2007), awarded a Fulbright Award
to Finland (2006), and appointed as the Wee Kim Wee Professor at the School of
Communication and Information and the Visiting University Professor, both at
Nanyang Technological University in Singapore (Augusts 2007–2009 and June 2010).
His co-authored or co-edited books include Organizations and unusual routines: A
systems analysis of dysfunctional feedback processes (2010); Media ownership: Re
search and regulation (2008); The Internet and health care: Theory, research and
practice (2006); Social consequences of internet use: Access, involvement and inter
action (2002); The Internet and health communication (2001); Accessing and brows
ing information and communication (2001); Public communication campaigns (1981,
1989, 2001, 2012); Research methods and the new media (1988); Managing organi
zational innovation (1987); And The new media: Communication, research and tech
nology (1984). He has published over 150 refereed journal articles and 70 book chap
ters. Dr. Rice has conducted research and published widely in communication sci
ence, public communication campaigns, computer-mediated communication systems,
methodology, organizational and management theory, information systems, informa
Page 34 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Economy and Organizations
tion science and bibliometrics, social uses and effects of the Internet, and social net
works. http://www.comm.ucsb.edu/people/ronald-e-rice
Bridgette Wessels
Elinor Carmi
Page 35 of 35
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.17
This chapter describes the analyses and results for the ESRC Domain of Data and Repre
sentation, guided by the question: “How do we live with and trust the algorithms and da
ta analysis used to shape key features of our lives?” It provides an initial overview of ma
jor insights from the literature review and analysis, the Delphi surveys, and workshop dis
cussions about the relevant concepts of data and representation in a digital age. It then
focuses on technology, development, and organizations but later emphasizes data issues
and, less frequently, policy, information, communication, technology, and research. Four
teen main topics emerged: global and urban culture, governance, Twitter and politics, cy
bercrime, Google, law and hate speech, big data, science and methods, health, gender,
consumer services, ethics and impact, mobile, and social media. The chapter provides
brief summaries of publications dealing with three key issues emerging from these topics:
data methods, data sources, ethics and impact, and data representation and other do
mains. The analyses also highlight theory, methods, and approaches in the literature,
showing predominantly inductive work, emphasizing reviews, commentary, or secondary
data. The main theoretical sources were by far sociology, then psychology and communi
cations and media. The plurality of articles involving research used case studies and vari
ous data collection methods. Finally, the chapter discusses future research and scoping
questions (e.g., with social impacts; privacy and surveillance; citizens/everyday life; and
open data/algorithm transparency/accountability) and research challenges (methods; so
cial theory and social questions; access to data; data literacy; education;, ethics; inequali
ty/exclusion/inclusion/divides; and interdisciplinarity).
Keywords: data analysis, data methods, data representation, data sources, ESRC Review, ethics
Introduction
THIS chapter provides an overview of the analyses of the literature review, the Delphi
process, and any relevant workshops for the Data and Representation domain. The chap
ter first explores the results of the various digital humanities analyses of the literature
Page 1 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
and the review of methods and theory, providing examples from specific studies. The
chapter then sets out the results of the Delphi Process, concluding with the key ques
tions, topics and challenges identified by the process. These two sets of results are then
compared. The last section presents recommendations for areas of future study. As a re
minder, the initial ESRC scoping question for this area of work was, “How do we live with
and trust the algorithms and data analysis used to shape key features of our lives?”
Initial Comments
The analysis of this domain was very distinct from the other six. Many of the issues and
questions here seemed to be “born digital” (Negroponte, 1995; Tapscott, 1999; see also
chapter 1). That is, they are questions that can only really be asked in and of a digital age.
This was also the area where the questions seemed to fit closest to the issues raised by
stakeholders in the various workshop sessions. In the discussion with stakeholders it was
the disruptive potential, the social impacts of data and automation, and the need for, or
lack of, clear governance of these that came to the fore. Although the questions and is
sues appear “born digital” in how they are articulated, however, they are not necessarily
“new” in that many could be and were asked of the impacts of ICTs over the last 30 years
or so. What makes them all very pertinent is the intensification of digitization, (p. 502) the
migration of digital into all aspects of everyday life, and the growth of platforms that de
liver key social and personal services as well as economic value, but whose use of data
and underlying algorithms are not overtly visible. Also of note is the number of publica
tions utilizing geographical data and information systems. This likely reflects the maturity
of the field in its use of, and discussions around, data derived from digital media and tech
nologies.
Literature Analysis
Topics
The literature analysis was designed to identify two sets of data. The first is key topics
within the existing literature. This allows the comparison with areas of importance identi
fied by the Delphi review. The second is a content analysis of the literature to explore the
predominance of specific, theory, methods, and approaches. Table 18.1 lists the 16 most
common concepts (2% or more of the cases) identified in the Round 1 literature analysis,
with the most frequent being data/datum, news, country, business, government, medium,
and consumer. Table 18.2 lists concept pairings.
Page 2 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Concepts Percent
Datum 10.4
News 6.7
Country 6.6
Business 6.2
Government 5.7
Medium 4.9
Consumer 4.7
Internet 4.1
Arrow 3.5
Community 3.2
Citizen 3.0
Privacy 2.6
Impact 2.4
Group 2.2
Science 2.2
Development 2.0
Page 3 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 4 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 5 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
pollution .70
price .95
resource 3.12
Note: bolded term is the main concept; the unbolded terms below that and above the line are the related subcon
cepts.
Page 6 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
All the literature collected from both rounds was analyzed using WordStat. WordStat
identified 14 topics (Global and urban culture, Governance, Twitter and politics, Cyber
crime, Google, Law and hate speech, Big data, Science and methods, Health, Gender,
(p. 503) Consumer services, Ethics and impact, Mobile, and Social media); see Table 18.3.
These topics map closely to the concepts identified in the concept analysis. Table 18.4
presents an analysis of the overlap between the two analyses.
Page 7 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 8 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 9 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 10 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 11 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 12 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Con So Sci Glo Con Big Eth Goo Hea Law Mo Gen Twi Gov Cy
cep cial enc bal su da ics gle lth and bile der tter er ber
t/ me e and mer ta and hat and nan cri
Top dia and ur ser im e pol ce me
ic met ban vice pac spe itic
hod cul s t ech s
s tur
e
Da
tum
Ne X
ws
Cou X
ntry
Busi X
ness
Gov X
ern
men
t
Page 13 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Med X
ium
Con X X X
sum
er
In X X
ter
net
Ar
row
Co X
mm
uni
ty
Citi X X
zen
Pri X
va
cy
Page 14 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Im X X
pact
Gro X X X
up
Scie X
nce
De X
vel
op
men
t
Page 15 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Unlike the other domains, several of the topics identified earlier—global culture, gover
nance, citizens—are not in and of themselves the focus of the current examination. In
fact, they represent elements of the other domains such as politics, governance, or
health. In examining the domain of “Data and Representation,” we were looking to
(p. 504) explore what new or existing research issues sat behind the social science topics.
Looking at the use of underlying keywords in each analysis over the period we find an im
portant shift.
As Figure 18.1 shows, in the period 2000–2004, the most frequent concept pairs were
fairly general, involving technology (including Internet, information, systems), con
sumers/people, development (along with country, environment, and world) and organiza
tions (including management and business).1 By the period 2012–2016 (Figure 18.2),
there was much more focus on data issues (not surprisingly), including data, access, use,
privacy and protection, and user, and, less frequently, policy, information, communication
(p. 505) (p. 506) and government, and reference to technology (Internet, service), as well
as research (research, science, project). Data (in the form of “datum”) co-occurred with
nearly all of these. So over the 16-year period, the literature clearly changed its focus
from general technology (including the Internet) use in a few contexts to a pervasive em
phasis on data in a wide variety of contexts.
Page 16 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Working through the analyses we would argue that the topics in the literature are split
between data methods, data sources, and ethical and social impacts. So for data methods
we find discussion of science and methods, use of big data, or specific technologies such
as Google. In terms of data sources there is discussion of data from social media (e.g.,
Twitter) and mobile devices. The areas of focus cover the breadth of the other domains in
this volume with topics such as: global and urban culture; consumer services; health; law
and hate speech; gender; politics; governance; and cybercrime. There are strong themes
of governance, ethics and social impact. As we will discuss later this is very similar to the
breakdown of research questions and challenges from the Delphi review.
The following sections address: data methods, data sources, ethics and impact, and data
representation and other domains. We are not looking here to consider what might
(p. 507) be described as the computing or computer science issues underlying the uses
and forms of data. Rather we are exploring how these issues intersect with social re
search questions and methods in regard to the social impacts of digital technologies. As
with the other ESRC review chapters that have analyzed a specific domain, the following
sections provide examples of literature to develop and highlight the identified themes and
issues. These are not intended to be exhaustive discussions of all the literature.
Data methods. As a starting point for the discussion of the uses of data, the literature
has a number of examples where researchers have reflected on the use of digital data—
often referred to as “big data” (see especially chapters 19 and 20). boyd and Crawford
(2012) raise six critical issues regarding the use of “big data” in research, concerning
what this data means, who has access, how it is analyzed, and for what purposes:
Page 17 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
2. The potential for misleading claims for objectivity and accuracy based on “vol
ume” of data.
(p. 508) 3. The need to understand that “bigger” data is not necessarily better, in fact
The authors define big data as a cultural, technological, and scholarly phenomenon that
rests on the interplay of technology, analysis and methodology:
Big Data offers the humanistic disciplines a new way to claim the status of quanti
tative science and objective method. It makes many more social spaces quantifi
able. In reality, working with Big Data is still subjective, and what it quantifies
does not necessarily have a closer claim on objective truth—particularly when con
sidering messages from social media sites.
(p. 667)
(p. 668)
Continuing the reflections of methods and technologies that researchers use, Ruppert et
al. (2013) examine social science methods in light of digital media and devices increasing
ly being the “stuff” that rework, mediate, mobilize, and materialize social life. Their arti
cle raises questions of how digital devices complicate social sciences’ “ways of knowing.”
As they argue, digital methods are not conducted in laboratories but involve large statisti
cal procedures which rely on interconnected devices. They are also defining and shaping
human relations. They note tha:
When we speak of methods here we mean the specific apparatuses that assemble
digital devices and data to ‘know’ the social and other relations. We are saying
that digital devices and the data they generate are both the material of social lives
and form part of many of the apparatuses for knowing those lives.
(p. 24)
Page 18 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Considering the way digital devices are entangled with social science research, Ruppert
et al. offer nine provocations for digital methods:
1. Much of the data from digital media is about transactional interactions of ac
tors (whether human or machine). It logs and measures the complex flows and net
works of transactions but may have limited detail on the specific actors. (p. 509) This
means that non-individualist and non-human accounts of the social can be examined,
2. We need to be mindful of the heterogeneity of actors in networks (Latour, 2010;
Latour & Woolgar, 1986) who create, translate and transmit the data—from people to
software agents. It is possible that the “human” description of society is replaced by
a socio-technical and transactional description.
3. The re-emergence of visualization is a key to social analysis. Though many “big
data” analyses remain statistical, visualizations have taken up a greater role in the
presentation, communication, and analysis of social data.
4. Some digital data are available over continuous time. Unlike surveys which are
at best temporal snapshots (e.g., in panel surveys) or ethnographic case studies that
might contain narrative accounts, many forms of digital data such as social media
can be traced over time. That said, many digital data sources do not get archived and
so leave no temporal trace.
5. Many digital data sets claim to have whole populations rather than samples—in
that all users are in the data set. Care needs to be taken here as these are whole
populations of their users—or more accurately of their transactions (see provocation
1)—but these may not be representative of relevant whole populations (within an
area or activity).
6. Slightly counter-intuitively, these whole populations and integrated data (see 5
and 1) allow for forms of granularity in analysis that other methods do not. Individu
als can be formed into groups inductively and statistically validated against criteria
to offer predicators or identify likely features (e.g., credit risk, re-offending, or cul
tural taste).
7. There is a potential changing role for expertise in data collection. If data is pro
duced as a by-product there is no need for experts to be involved in the design of the
tools used in its creation. You may not need a survey design expert, as all your cus
tomer data comes from their transactions. As such, non-social science specialists
such as computer scientists become more prominent mediators of how and what da
ta are collected. Social science expertise may come in after the fact in the forms of
the analysis, critique of the methods, and interpretation and presentation of the re
sults.
8. Data are now generated in complex social spaces that through mobile and mobi
lizing technologies are multi-faceted. You may generate personal data from your mo
bile device while sitting at work, generating occupational data via your laptop. Data
therefore may transcend current institutional boundaries. Many devices actively seek
users’ involvement in logging and selecting data (e.g., Facebook) and to an extent
generate data akin to Mass Observation work of the mid-20th century (Summerfield,
1985), yet on a greater scale and with less structure and obtrusiveness.
Page 19 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
whereby analyses and knowledge are properly validated. Whatever the balance be
tween these positions, they note that knowledge production may be less coherent in
the context of digital data.
in relation to digital devices, then, we need to get our hands dirty and explore
their affordances: how it is that they collect, store and transmit numerical, textual,
aural or visual signals; how they work with respect to standard social science
techniques such as sampling and comprehensiveness; and how they relate to so
cial and political institutions.
But of course, digital data are not confined to more quantitative forms. boyd (2015) dis
cusses the way ethnographers can capture ethnographic data when examining teens’
everyday life with technology. To do that, she undertook offline participant observation,
semi-structured interviews, content analysis and “deep hanging out.” One of the main
things boyd emphasizes is the need to discuss wider issues and not focus only on technol
ogy as context in order to understand how and why teens use digital systems. As implied
by Ruppert et al., digital data may be partial and focus on the transactional, and not the
person:
Getting at what teens do and why they do it requires triangulation and persever
ance. It requires being embedded in teen culture and talking with teens about
their practices. Social media may increase the visibility of certain teen practices,
but it does not capture the full story. More often than not, getting at the nuances
of teen life in a networked era requires going back to foundational practices.
(p. 95)
As noted previously (Ruppert et al., 2013), another key method and tool in digital re
search is visualization. Kennedy et al. (2016) highlight methodological and representa
tional concerns and critiques. They argue that data representation through visualizations
is often portrayed as objective and is valued as explanation. The visual structuring and
presentation of the data increases the persuasiveness of the results, especially by using
multiple techniques: showing the data sources, using a “clean” layout, creating order
with shapes and lines, and using two-dimensional viewpoints. They argue that such con
ventions
Page 20 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
work to imbue visualizations with the quality of objectivity (which brings together
other qualities such as transparency, scientific-ness and facticity). This produces
the impression that visualizations are showing the facts, telling it like it is, offer
ing windows onto data. It is not visualization designers who are creating this
sense of objectivity, we propose, but rather the conventions on which they neces
sarily draw in producing visualizations.
(p. 716)
These are necessary corollary concerns to raise as digital data are becoming ever
(p. 511)
Data sources. Digital media and technologies provide for a range of data types—from so
cial interactions, buying preferences, cultural consumption through geographic location
data and more. How we both understand and use this variety of data types to undertake
research and to understand our digital society is a key focus for this domain. As noted
earlier, digital data sources are not free of bias, may be skewed to certain aspects of so
cial behavior, and need to be understood in their context. One of the most obvious current
sources of digital data are social networking sites. boyd and Ellison (2007) examine key
characteristics of social network sites, while exploring their history and how academia
had been studying them up to that time. They defined social network sites as
(p. 211)
Of course, in the time since then, social networking sites have moved beyond the web to
mobile and smart devices, making them even more embedded in everyday life. boyd and
Ellison note how it is the social basis of the networked interaction that is key—even if
these social interactions have a transaction-like format. They note the same issues as all
social research: that understanding of the context and the social structures and groups
within (or that form through) the use of social networking are key.
One way to address such issues is to include communities in the collection and analysis of
data. For example, Elwood (2006a) combines participatory research with the use of GIS
data (sometimes termed as public participation GIS), in part through everyday practices
of knowledge production. The availability of large data sets with GIS data embedded
(e.g., from mobile devices) has expanded the range of potential analyses. As Elwood
notes, such work is not straightforward. Drawing on participatory practices involves ex
clusion and inclusion and also contradictory and ambiguous priorities and strategies for
social and spatial change. Elwood states:
Page 21 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
(p. 199)
Elwood also reiterates a version of the points made by Kennedy earlier—that representa
tions of digital data, in this case GIS data, are not neutral. They involve a range of
(p. 512) selection and presentational choices that link the final representations to the con
(p. 206)
But digital data also change how we “do” research; creating new opportunities and mak
ing new forms of analysis possible. But we have to take into account the points made ear
lier that data from digital systems may foreground certain behaviors (e.g., transactions)
and that we need to draw on other sources for a full picture. For example, Crampton et al.
(2013) provide an outline of the way big data affects the practice of critical human geog
raphy, showing how these are socially produced spaces that combine virtual and material
spaces. The authors propose five extensions to mapping geofenced data in what they call
“beyond the geotag”: going beyond (1) social media visualizations which include geo
graphic coordinates; (2) spatialities of the “here and now” and accounting for relations as
they evolve over time; (3) the proximate, meaning including more dimensions such as so
cial network analysis; (4) the human towards data that is produced by bots; and (5) the
geoweb, meaning to include different types of sources such as governmental data
sources. As they note of digitally generated data,
(p. 137)
Page 22 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Ethics and impact. The final points made previously in regard to “not always benign
ends” highlight the need to address the ethics of data derived from digital systems. Ethics
issues have been raised across all the domains, especially in regard to the use of data. It
seems fitting here to unpack these and indicate some prevalent concerns. We would ar
gue that there are four main areas of ethical concern for digital research and especially in
regard to data and representations. The first is digital inequalities—sometimes referred to
as digital divides, digital exclusion, ICT divides or information divides among other terms.
There are deep ethical concerns about the impacts of lack of digital access, skills and
knowledge can have on citizens. These are not just concerns about the economics of digi
tal exclusion—be that the costs of access or the work and employment consequences of
limited digital skills. Rather, they talk to the consequences for citizens in all the domains
addressed in this book of not having, having limited, or having differentiated, access to
digital technologies (see, for example, chapters 5, 15, and 19). As Mordini et al. (2009)
note,
(p. 513)
(p. 207)
Much research and policy has been undertaken to understand digital inequalities, but
these are not always framed in terms of ethics.
First, we would argue that these are fundamentally ethical issues, following Mordini et
al.:
We need a flexible and dynamic ethics of digitalisation which takes into account
not only the need to protect individuals from unlawful intrusions, but also the en
abling side of privacy and data protection, i.e., enabling individuals, with different
capabilities, to forge relationships, to stay authentically active in society, to ex
press and share their views.
(p. 218)
Second, we would argue that ethics may have taken a back seat to both technical and
business opportunity as digital technologies have been developed and deployed. These
concerns have been addressed in a variety of publications in our data. For example
Wright (2011) proposes a framework for ethical impact assessment that can be applied to
various information technology applications such as policy, service, projects, or programs.
The four principles that the ethical framework outlines are autonomy (which includes lib
Page 23 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
erty and agency), dignity, informed consent (freely given and informed), and safety. Other
issues to take into account are social solidarity, inclusion and exclusion, accessibility, dis
crimination and social sorting, value sensitive design, sustainability, equality and fairness,
and transparency. Some of the tools to investigate whether an application is ethical are
through consultations and surveys, expert workshops, a checklist of questions, an ethical
matrix, consensus conferences, and a citizens’ panel. The paper argues that:
(p. 223)
Third, there are many and complex issues around the use of digital data. This has recent
ly been framed in terms of the uses of “big data” but debates are pertinent to many forms
of data collected via digital media and technologies. As Crawford et al. (2014) note, criti
cal takes on “big data” cover politics, ethics, and epistemology. These are issues of power
and control over creation and use of big data, social values around its use, and the ethics
of what it represents. Akin to points discussed earlier by Ruppert et al. and by Kennedy et
al., they argue that
(p. 514)
It is big data’s opacity to outsiders and subsequent claims to veracity through vol
ume that discursively neutralizes the tendency to make errors, fail to account for
certain people and communities, or discriminate.
Fourth, and by no means last, there are the standard ethical concerns of conducting re
search. The accessibility, often in public contexts, of digital data may give rise to an as
sumption that it is simply available for research use. In fact, like all research, the analysis
of data from digital systems requires thorough ethical review. Nowhere is this clearer
than in digital health research. For example Ajunwa et al.’s (2016) article provides an eth
ical framework for health data collection conducted by corporate wellness programs. This
ethical framework focuses on three key areas: (1) informed consent to collect the data,
(2) data handling, and (3) employment discrimination concerns. When it comes to con
sent, employees should be informed of the benefits and disadvantages of joining the
health program. They should also be informed about the scientific evidence that backs
the program and should know whether the data collected is accurate. When it comes to
data handling, it is important to make sure there is transparency about who collects, con
trols, and owns the data. And lastly, there is a need to make sure wellness programs do
not become surveillance programs which exclude people who may cost more money to
the company. As they note:
Page 24 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Data representation and other domains. There is not space here to address how data
and representations are key to both the research questions and the methods for all the
domains discussed in this book. While these have implications for all the domains, some
domain literature emphasize this issue more than others. There are some social research
questions that are about data from or in digital systems. In particular there are questions
about what communities, groups, and individuals do with such data. For example, Elwood
(2006b) examines the way communities organize urban planning in creative and multifac
eted ways (see especially chapters 19 and 22). The work focuses on communities that use
digital spatial technologies such as geographic information systems (GIS) to deploy statis
tical and spatial data analysis as well as mapping to help them plan and monitor neigh
borhood changes. In particular, Elwood points out that communities produce flexible nar
ratives (neighborhood conditions, needs, goals, activities) for different audiences and
agendas, arguing that these communities
… have devised a more complicated institutional and spatial strategy that allows
them to maintain opportunities to insert their spatial knowledge into key decision-
making practices, sustain long-term working relationships with other influential
agents in urban spatial politics, and enhance their own capacities by drawing on
funds, expertise, and advocacy from other actors and institutions.
(p. 324)
This is a key point—data from digital systems can be used by many groups—there
(p. 515)
fore one of the key social research challenges is that of understanding which and how
communities, organizations, groups, and individuals are using such data.
Similarly there are social, political, governance, and research debates about how data are
generated, shared, and accessed. For example, McKee (2011) examines three issues that
have a huge impact on the future of the World Wide Web and Internet-based communica
tions: net neutrality, corporate data mining, and government surveillance. Net neutrality
is about the way content should be delivered equally across networks in terms of their
transmission speed and priority. Corporate data mining happens as most online services
are provided for free, including software that researchers use such as Google Docs. How
ever, this convenience comes with the cost of this data being captured and recorded and
then packaged, repackaged, and transferred (see Rice & Hoffman, 2018 for an analysis of
the changing business coverage of attention technologies). McKee concludes with advice
on the importance of educating citizens, teachers, researchers, and others about the
Page 25 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
changing behavioral patterns around the Internet, especially so as to encourage and pro
mote advocacy for web literacy:
Even as you read this, data about you is being collected, packaged, shipped and
sold all over the world. Data mining for ‘interest-based ads’ (Google’s term) and
‘instant personalization’ (Facebook’s term) is big business, pushing online compa
nies’ stock values soaring and challenging the boundaries of what online users will
accept.
(p. 280)
We note that revelations and concerns about these companies’ use of such data can also
cause their stock values to drop.
This therefore has implications for how to think about educating citizens—at all levels in
the education system—about the types of data collected about us, its uses, and the conse
quences of it being shared:
There are also deeper implications about how we do social research. In one of the project
workshops a question was raised about how research funding, design, and ethical assess
ment could keep pace with the need to undertake research “on the fly” or “in real time.”
As Ruppert et al. (2013) pointed out earlier, data from digital systems can be continuous
—often reflecting potentially much more rapid social processes. This creates the possibili
ty of not only undertaking research in real time but the need to understand these faster-
paced social phenomena. As an example, Elmer (2013) examines vertical tickers on lead
ing social media, focusing on the Canadian Broadcasting corporation, to (p. 516) show
how political parties intervene in real time on Twitter during political debates. Elmer sug
gests that Internet studies must engage with “live-research” in order to understand Inter
net politics and dynamics:
(p. 27)
Page 26 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Live research, as such, serves not only to question and understand the interface
time of social media practices and platforms, but also challenges the time-com
pressed and space-delimited sphere of academic scholarship.
(p. 28)
This analysis builds on Borah (2017). Most of the analyzed papers (70%) were inductive,
either describing findings or building theory (Table 18.5). The papers were predominantly
focused on reviews of prior work and secondary data (overall 70%) with only 29% under
taking primary data work (Table 18.6). Overall the literature is therefore far more reflec
tive and involving commentary on the issues than that in the other six domains. The main
disciplines from which theory was used or for which theory was developed (p. 517) were:
Sociology (62.5%), Communications and media (20%), and Psychology (17.5%). Only actu
al use of theory for the purposes of design or analysis were coded; general reference to
prior work and theory were not coded. There was considerable variety in the specific the
ories applied from these disciplines, though there was no substantive clear preference.
The main specific theories were from sociology (62.5%; sociomateriality, structuration,
and critical theory), and communications and media (20%; with uses and gratifications,
55% as the main one).
In this domain, the majority of studies (53%) did not involve research methods, with
about a quarter applying non-discourse qualitative analysis (26%) (see Table 18.7). Where
primary research was undertaken, the main research methods were surveys (14%), inter
views (14 percent), literature reviews (14 percent) and experiments (12 percent). The plu
rality of the empirical work focused on case studies (40%) with a limited number of gen
eral population studies (Table 18.8), reflecting the review and commentary nature of the
materials. Less than 2% of studies overtly stated that they were using a “big data” ap
proach.
Percent
Page 27 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Percent
Percent
Population Percent
This was the most distinct data set with limited empirical studies across the domains. At
the same time the topics and issues raised were far more clearly “born digital” in that
they focused on what the consultation workshop termed the “datafication” of people and
society. As already noted, some of these questions are not new, having been asked of the
impacts of ICT at home and work for much of the last 30 years. Yet, the intensity of the is
sues and the breadth and depth of the role of digital technologies adds considerable
weight to making such questions mainstream in social research topics, theories, methods,
and approaches.
Page 28 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
This was the only area where an overt discussion of the “social construction” of digital
technologies, data, and algorithms clearly surfaced. The team saw this as a (p. 518) foun
dational question for all the domains as it cuts to the heart of questions of technological
determinism that shadow research on society and technology. It was felt that such issues
should underpin any research within the other six domains. This domain also clearly had
the closest connection to debates on the uses and impacts of the digital tools in research
—though it presented very few studies actually using these! We would argue that a key el
ement of future research deploying digital tools should be robust reflection on their effi
cacy, and also clear documentation of the practical steps required for their use.
Delphi Review
Here, the results of the Delphi process for the Data and Representation domain cover:
suggested scoping or research questions, key topics to address within these questions,
and key challenges to researching these questions.
The Delphi review identified a set of scoping questions for the domain, which were coded
into the seven categories detailed in Table 18.9 (citizen and community use of data; citi
zen interaction with data and algorithms; data literacy; methods; power and accountabili
ty for data and algorithms; social construction of data and algorithms; and social implica
tions of data and automation). Their ranked importance from the confirmatory survey is
given in Table 18.10, with social implications ranked highest and power and accountabili
ty ranked second highest. These two lists closely match.
Page 29 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 30 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Social con Who are the organizations and groups that create
struction of socially consequential algorithms?
data and al How do socially consequential algorithms (e.g., for
gorithms social media news feeds and consumer recommen
dations) reflect the social backgrounds of their cre
ators?
How do representations and discourses produce
consent or dissent about algorithms and Big Data?
Social impli What are the possibilities that you see for identify
cations of da ing the social, economic, and political costs, as well
ta and au as the benefits to be derived from expanded use of
tomation algorithms, artificial intelligence, and data analysis
more generally?
What kind of research needs to be done to under
stand the scope and impact of algorithms?
What are the effects of algorithms and data analy
sis?
How do we live with the algorithms and data that
now shape key features of our lives?
How do we materialize data?
What do you see as the most promising paths to
ward the assessment, evaluation, and minimization
of the mal-distributed harms associated with ex
panded use of algorithms and massive data analy
sis?
How do we make sense of these materializations
and incorporate them into our everyday lives?
How to describe and analyze the consequences of
datafication as well as algorithmization?
Page 31 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Specific scoping questions identified in the Delphi review were coded into nine categories
(see Table 18.11), with social impacts ranked highest, but closely followed by privacy and
surveillance, citizens/everyday life, and open data/algorithm transparency/accountability:
The ranked importance of these from the confirmatory survey are presented in Table
18.12, showing that social implications; privacy and surveillance; citizens/everyday life
experiences and uses of data; and understanding open data/algorithm transparency/and
accountability were rated by over half of the participants as “very important.” As with the
scoping questions, those topics that were most commonly cited in the Delphi workshop
were generally also those deemed most important in the confirmatory survey.
Page 32 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Topic Percent
Social impacts 20
Citizens/everyday life 16
Exclusion/inclusion/divides 12
Methods 6
Digital identity 4
Economics 4
Page 33 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 34 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 35 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 36 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Research Challenges
The consultation workshop was in broad agreement with the preceding scoping questions
as research questions, but argued for a “data”-focused approach with five alternate ways
of viewing the questions and topics, presented in Table 18.13.
Topic Challenge
Page 37 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Challenge Percent
Methods 57.9
Concepts 15.8
Education 5.3
Ethics 7.9
Inequality/exclusion/inclusion/divides 5.3
Interdisciplinarity 5.3
Page 38 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 39 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Page 40 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
(p. 519) (p. 520) The Delphi panel identified eight categories of challenges in un
(p. 521)
dertaking research in this domain: methods; social theory and social questions; access to
data; data literacy; education, ethics; inequality/exclusion/inclusion/divides; and interdis
ciplinarity (see Table 18.14). Over half of the cases involved methods issues, so this cate
gory has been further divided into analytics and measurement; combining old and new so
cial research methods; concepts; social measures; and understanding and developing new
research methods. Over half of the participants ranked the three challenges of ethics; da
ta inequality/exclusion/inclusion/divides; and interdisciplinary working as “very
important” (Table 18.15). Although the ethics and inequality challenges rankings do not
match with their percentages in Table 18.14, these are, nonetheless, key cross-cutting is
sues. The challenges identified point towards specific concerns in working across the so
cial (p. 522) sciences, information studies, and computer science disciplines, as the tools
and methods being used often originate in computer science and information studies, but
must be integrated with or translated into social science. This was the only area where
there was explicit comment on the need to provide higher education support to develop
and train both students and researchers in new methods and deeper data literacy.
(p. 523) To conclude, this domain clearly separated out a set of social science research
questions and areas, with topics that mixed both research and methods issues. Chal
lenges were predominantly around methods.
Conclusion
Contemporary research in the Data and Representation domain studied here appears to
have focused on: data methods (science and methods, big data, and Google), data sources
(social media and mobile), areas of focus (global and urban culture, consumer services,
health, law and hate speech, gender, Twitter and politics, governance, and cybercrime),
and other topics (ethics and impact). These areas closely match the areas identified by
the Delphi process. These include social research questions (citizen and community use
of data, citizen interaction with data and algorithms, data literacy, power and accountabil
ity for data and algorithms, social construction of data and algorithms, and social implica
tions of data and automation). As well, they involve social research topics and challenges
(social impacts of data, privacy and surveillance, citizens/everyday life experiences and
uses of data, understanding open data/algorithm transparency/accountability, data exclu
sion/inclusion/divides, digital identity and data, data visualization/representation/social
construction of data, and economic impacts). And they also include methods challenges
(interdisciplinarity, analytics and measurement, combining old and new social research
methods, concepts, social measures, understanding and developing new research meth
ods).
Missing from this domain are substantive empirical studies of either the research
(p. 524)
questions, or of the implementation of digital methods. We would argue that this domain
therefore needs to develop a set of robust case studies addressing the key research ques
tions identified by the Delphi process.
Page 41 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
References
Ajunwa, I., Crawford, K., & Ford, J. S. (2016). Health and big data: An ethical framework
for health information collection by corporate wellness programs. Journal of Law, Medi
cine & Ethics, 44(3), 474–480.
boyd, d. (2015). Making sense of teen life: Strategies for capturing ethnographic data in a
networked era. In E. Hargittai & C. Sandvig (Eds.), Digital research confidential: The se
crets of studying behavior online (pp. 79–102). Cambridge, MA: The MIT Press.
boyd, d. & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship.
Journal of Computer-Mediated Communication, 13(1), 210–230.
boyd, d. & Crawford, K. (2012). Critical questions for big data: Provocations for a cultur
al, technological, and scholarly phenomenon. Information, Communication & Society,
15(5), 662–679.
Crampton, J. W., Graham, M., Poorthuis, A., Shelton, T., Stephens, M., Wilson, M. W., &
Zook, M. (2013). Beyond the geotag: Situating “big data” and leveraging the potential of
the geoweb. Cartography and Geographic Information Science, 40(2), 130–139.
Crawford, K., Gray, M. L., & Miltner, K. (2014). Big Data| Critiquing Big Data: Politics,
ethics, epistemology| Special section introduction. International Journal of Communica
tion, 8, 10.
Elmer, G. (2013). Live research: Twittering an election debate. New Media & Soci
(p. 525)
Kennedy, H., Hill, R. L., Aiello, G., & Allen, W. (2016). The work that visualisation conven
tions do. Information, Communication & Society, 19(6), 715–735.
Latour, B. (2010). Tarde’s idea of quantification. In M. Candea (Ed.), The social after
Gabriel Tarde: Debates and assessments (pp. 129–144). London: Routledge.
Latour, B. & Woolgar, S. (1986). Laboratory life: The construction of scientific facts.
Princeton, NJ: Princeton University Press.
Page 42 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
McKee, H. A. (2011). Policy matters now and in the future: Net neutrality, corporate data
mining, and government surveillance. Computers and Composition, 28(4), 276–291.
Mordini, E., Wright, D., Wadhwa, K., De Hert, P., Mantovani, E., Thestrup, J., … Vater, I.
(2009). Senior citizens and the ethics of e-inclusion. Ethics and Information Technology,
11(3), 203–220.
Rice, R. E. & Hoffman, Z. T. (2018). Attention in business press to the diffusion of atten
tion technologies, 1990–2017. International Journal of Communication, 12. http://
ijoc.org/index.php/ijoc/article/view/8250/2424
Ruppert, E., Law, J., & Savage, M. (2013). Reassembling social science methods: The chal
lenge of digital devices. Theory, Culture & Society, 30(4), 22–46.
Tapscott, D. (1999). Growing up digital: The rise of the net generation. New York: Mc
Graw-Hill.
Wright, D. (2011). A framework for the ethical impact assessment of information technol
ogy. Ethics and Information Technology, 13(3), 199–226.
Notes:
(1.) As part of the review, The Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high-frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/ provides ac
cess to the top 50 most frequently occurring pairs and trios through a series of data visu
alizations. Click on View Data Visualisations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
ticles at the top. Also, see https://waysofbeingdigital.com/literature-analysis-interactive-
results/ for interactive visualizations with mouse-overs of the main clusters of concepts
within each Domain, and the relative frequency of concepts associated with each cluster.
Simeon J. Yates
Page 43 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Liz Robson
Liz Robson is a Research Associate at the University of Newcastle. She has a back
ground in economic development with expertise in understanding labor markets, em
ployment, and skills. Liz Robson joined Center for Urban and Regional Development
Studies in September 2000 as a research associate, leaving in 2004 to work for the
Regional Development Agency as a skills and employment analyst. She returned in
2011 as a Visiting Fellow supporting the work of Ranald Richardson and the SIDE
(Social Inclusion through the Digital Economy) project to better understand how
young people might access the life-changing benefits offered by digital technologies.
Her recent research at CURDS has focused on the digital age, which throws up all
kinds of questions regarding how technology, social media, and the so-called fourth
industrial will impact on institutional and organizational arrangements. In June 2017,
she joined the department of sociology to work on a prestigious AHRC (Arts and Hu
manities Research Council) project, which is investigating the different ways audi
ences engage with specialized film outside of London. Research questions encom
pass the range of specialized film venues and events within regional provision, as
well as how digital platforms feature in the venue and event-based film experience.
Ronald E. Rice
Page 44 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Data and Representation
Ronald E. Rice (PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the
Social Effects of Mass Communication in the Department of Communication at Uni
versity of California, Santa Barbara. Dr. Rice has been awarded an Honorary Doctor
ate from University of Montreal (2010), an International Communication Association
(ICA) Fellow, selected President of the ICA (2006–2007), awarded a Fulbright Award
to Finland (2006), and appointed as the Wee Kim Wee Professor at the School of
Communication and Information and the Visiting University Professor, both at
Nanyang Technological University in Singapore (Augusts 2007–2009 and June 2010).
His co-authored or co-edited books include Organizations and unusual routines: A
systems analysis of dysfunctional feedback processes (2010); Media ownership: Re
search and regulation (2008); The Internet and health care: Theory, research and
practice (2006); Social consequences of internet use: Access, involvement and inter
action (2002); The Internet and health communication (2001); Accessing and brows
ing information and communication (2001); Public communication campaigns (1981,
1989, 2001, 2012); Research methods and the new media (1988); Managing organi
zational innovation (1987); And The new media: Communication, research and tech
nology (1984). He has published over 150 refereed journal articles and 70 book chap
ters. Dr. Rice has conducted research and published widely in communication sci
ence, public communication campaigns, computer-mediated communication systems,
methodology, organizational and management theory, information systems, informa
tion science and bibliometrics, social uses and effects of the Internet, and social net
works. http://www.comm.ucsb.edu/people/ronald-e-rice
Elinor Carmi
Page 45 of 45
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.18
“Digital citizenship” has become a prominent concept to understand the ways in which
we interact with our social, political, and economic environment through digital infra
structures and how our lives—and, more broadly, society—are transformed in the process.
Many accounts of digital citizenship have emphasized its empowering nature and sug
gested a shift towards enhanced agency by citizens and a democratizing trend in state-
citizen relations. However, as contemporary governance becomes increasingly centered
on the collection and analysis of personal data, the age of “datafication” requires us to re
think the concept and its implications. This chapter provides a thorough review of estab
lished understandings of digital citizenship and explores what it means when citizens are
increasingly subject to data processing and data-based categorization. It offers a perspec
tive on digital citizenship that combines the self-enacted and the institutional positioning
of citizens in society in the context of data infrastructures.
Keywords: contemporary governance, datafication, digital citizenship, personal data, state-citizen relations
Introduction
WE increasingly interact with our social and political environment through digital infra
structures. Digital tools and platforms have become essential for us to participate in soci
ety. Political engagement takes place through social media debates and online campaigns;
access to services requires online interactions between citizens and the state or commer
cial providers; and a plethora of digital traces affect and condition human activity, from
crossing borders to operating a phone. Everyday cultural practices involve social media
exchanges, and business transactions are mediated by the platform economy. In these
(and many more) ways, we increasingly enter the sphere of civic activity—and develop
agency—through digital media.
Digital citizenship has emerged as a concept to describe this condition. It has acquired in
creasing popularity although, or perhaps because, it lacks a narrow and commonly
agreed definition, and it is used for various purposes and to understand different prac
Page 1 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
tices. It has been applied to describe the centrality of digital infrastructure in contempo
rary social interactions, the implications for people’s identities and forms of belonging,
and necessary skillsets and conditions. Yet in most iterations it tries to understand the re
lation between the digital and the political, and thus the role of the digital subject as po
litical subject. While this may include being a subject to an authority, such as the state,
most accounts of digital citizenship have been interested in the digital citizen as a subject
of his or her own making. They have thus departed from classic understandings of the cit
izen as defined through membership of a nation-state, and have focused instead on the
self-creation and self-assertion of citizens as active participants in society through digital
acts. Such acts may include, for example, the use of digital tools for (p. 527) citizen jour
nalism, online campaigns and digital community-building, and the making of rights claims
in digital environments.
The notion of digital citizenship thus implies a focus on citizens’ agency and the empow
erment derived from the use of digital tools. However, the emerging condition of datafica
tion complicates this perspective. The pervasive collection of data through online plat
forms and smart devices, its analysis by corporate actors and the state, and the profiling
of people through an ever-increasing amount of data points all question the empowering
nature of digital environments. While digital tools continue to help citizens develop their
own position in society, they also enhance the opportunities for governmental and com
mercial institutions to assign – and restrict – citizenship roles through data analysis. In
this chapter, I will explore these conflicting dynamics and trace the consequences of di
verse power shifts between the citizen and the state. The goal is to develop an under
standing of digital citizenship that responds to the challenges of the “age of datafication.”
To start with, I will review key themes and trends in citizenship studies. Then I will ex
plore the notion of digital citizenship as the self-constitution of subjects in society through
digital acts. Finally, I will discuss how datafication challenges previous notions of digital
citizenship and explore the possibilities of agency in a datafied age. This, I hope, will en
hance our understanding of the changes and transformations of citizenship in societies
that are increasingly governed through “big data” analysis.1
Citizenship
Definitions of Citizenship
According to its classic understanding, citizenship denotes the formal relation between a
person and a nation-state. It is a notion of belonging and of membership to a political
community, formalized through documents such as the passport and typically received at
birth. As a concept it is closely connected to territory—the territory where someone is
born or chooses to live—but also to power, resources, and community. It is conferred by a
powerful actor, the state; it determines an individual’s access to and share in the state’s
collective resources; and it strongly affects questions of belonging and identity (Turner,
2009). Citizenship ties people to one another within the jurisdiction of the state and binds
Page 2 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
them to the state in specific ways (Tilly, 1997). This is underpinned by the rights (such as
voting) and obligations (such as taxation) of the individual in relation to the state. The ex
istence of, and demand for, civic, social, and political rights that ensure citizens’ equality
and protection is thus a key marker of citizenship (Marshall, 1950). Furthermore, and to
varying degrees, the concept entails the participation of citizens in the community’s polit
ical, social, and economic processes (Bellamy, 2008).
These past accounts have shaped how we think about citizenship. They point to a division
in its conception between active and passive forms (Turner, 1990). Active citizens are so
cially and politically engaged with their environment, while passive citizens focus on their
private matters in a given framework of rights, obligations, and protection. While modern
states typically combine political and legal citizenship, contemporary nation-states with
mass societies may reflect more prominently the Roman approach of providing state pro
tection across large territories. As citizens in contemporary societies, we may mostly op
erate as passive recipients of rights, but active engagement is occasionally encouraged or
even required, and more substantial participation in political life is certainly demanded
and enacted by civil society groups and social movements. So both forms of citizenship
are part of how the concept is understood today.
These traditional approaches to citizenship have been challenged from different direc
tions. In particular, critics have highlighted the exclusionary nature of citizenship as well
as its alleged equality and universality. Feminist and LGBTQ rights groups, as well as eth
no-cultural communities, have argued that citizenship rights are not distributed in an eq
uitable manner, and have pointed out biases in citizenship conceptions towards white,
male, and property-owning individuals (Fraser & Gordon, 1994; Lister, 1997; Young,
1989). The territorial focus of citizenship has been challenged by processes of globaliza
tion, internationalization, and transnationalization, which affect the autonomy of the na
tion state and its ability to confer rights. The rise of global corporations and civil society
Page 3 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
organizations, together with the growing role of both global and regional institutions
such as the UN and the EU, point to transnational forms of authority that convey rights
and generate obligations more widely (Urry, 1999). National rule-making has “become
embedded within more expansive sets of interregional relations and networks of
power” (Held & McGrew, 2003, p. 3) involving cities, provinces, states, and regional as
well as transnational institutions. Similarly, forms of belonging and affiliation have spread
from the national to local and regional communities as well as to transnational (p. 529) di
asporas and non-territorial associations, such as cultural communities and communities
of practice (McNevin, 2011). Further, a (related) challenge to classic forms of citizenship
emerged with the rise of neoliberalism in the late 20th century and the increasing prima
cy of the economic domain over the political (Mouffe, 2000). This has advanced the impor
tance of consumption in contemporary societies, de-emphasized political participation,
and weakened democratic institutions (Crouch, 2004). It has led to the emergence of a
“citizen-consumer” (Clarke et al., 2007) who is politically passive and interacts with soci
ety mainly as a consumer of privatized goods and service (Turner, 2017). Each of these
critiques addresses different dynamics, but together they show that classic reference
points that organize belonging are being challenged, political communities are witnessing
transformations, and new claims for inclusion are being made.
These challenges have led to diverse attempts to address the changing social, political,
and economic situation through new conceptions of citizenship. “Feminist
citizenship” (Lister, 1997), for example, has been proposed as a pluralist conception of
the citizen that is rooted in difference, rather than exclusionary homogeneity. “Postna
tional citizenship” (Soysal, 1994) responds to the growing reality of migration and is
“based on universal personhood rather than national belonging” (p. 1). While maintaining
the classic focus of citizenship models on participation in a political community, it propos
es forms of inclusion that are not bound to historical, cultural, or ethnic ties to that com
munity. “Transnational” (Bauböck, 1994) and “cosmopolitan” (Linklater, 2002) forms of
citizenship move the emphasis further away from the nation-state and respond to the
prominent role of trans-border communities, global civil society, and international law. Ac
cording to this school of thought, rights and obligations are increasingly determined and
implemented by international agreements and institutions, leading to “the emergence of
an international law of citizenship” (Spiro, 2011, p. 696). Without formal acknowledg
ment, transnational citizenship largely remains speculative and aspirational, but it
demonstrates a diversity of affiliations that are interacting with, and potentially supersed
ing, the nation-state. As Isin and Ruppert (2015) note, “the subject is a composite of mul
tiple forces, identifications, affiliations, and associations” (p. 21). They point to NSA
whistleblower Edward Snowden as a representative of a new form of international active
citizenship that responds to an emerging set of international responsibilities and corre
sponds with the transnational circulation (and global collection) of data (Isin & Ruppert,
2017).
Arguably, the most important shift in citizenship studies has come with an increased fo
cus on the acts of citizens in developing their own position in society. This perspective
emphasizes the practice, rather than the status, of citizenship, and views the latter as
Page 4 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
“the expression of agency” (Lister, 1997, p. 38). Citizenship scholars have drawn from
theories of performativity to investigate the ways in which people constitute themselves
as citizens (Isin, 2012) and in which they “do citizenship,” for example by claiming new
rights and implementing existing rights through their own acts (Zivi, 2012). As in the re
publican model, the focus here is on participation, but it goes beyond the mechanisms of
receiving citizenship and instead highlights practices of achieving citizenship by doing,
enacting, or performing citizen acts and thereby bringing citizen subjects into being.
(p. 530) This understanding of citizenship begins with the citizen as an active figure, not
with the nation-state or another form of belonging (Clarke et al., 2014). Citizenship thus
becomes a site of contestation and social struggle. Citizen engagement in civil society as
sociations and social movements—from neighborhood groups to NGOs to protest mobi
lizations—are important spaces for “doing citizenship,” and claiming new rights becomes
a key feature of performing and enacting one’s own role as a citizen.
This does not mean that belonging and obedience to the nation-state are magically re
placed by the citizen as a sovereign figure that enacts itself as a subject of power. We are
still members of national jurisdictions, with the rights and obligations assigned to them.
According to Isin and Ruppert (2015), legality remains a core force of subjectivation, as
does the imaginary aspect of national belonging, but these are complemented by perfor
mativity as a key pillar for understanding citizenship. Citizen agency and citizen acts are
thus placed in the forefront of our discussion of citizenship.
In societies that are increasingly mediated through digital technologies, digital acts be
come important means through which citizens create, enact, and perform their role in so
ciety. And just as citizens have traditionally re-asserted their position in relation to the
state by claiming human and civil rights, they are now “making rights claims” (Isin &
Ruppert, 2015, p. 4) in the digital environment. Digital acts may include the wide range of
activities that we are regularly involved with on the Internet, such as emailing, messag
ing, blogging, collaborating, coding, friending, liking, posting, tweeting, and uploading.
These and similar acts help create our role and position in society, and they serve as
claims to the right to act freely in digital environments (Isin & Ruppert, 2017). Yet among
the broad range of digital actions and interactions, we can identify a number of more spe
cific acts that demonstrate how citizens assert themselves. Digital protest and online
campaigns have been, arguably, the most prominent examples, and experiences which
have been widely discussed range from the Anonymous online protests to the use of so
cial media in uprisings such as the Arab Spring, the role of hashtags such as #MeToo,
and the proliferation of campaign platforms.
Page 5 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
While there are controversies regarding the extent to which digital tools have enabled re
cent waves of protest and activism (e.g., Dencik & Leistert, 2015; Morozov, 2011), the In
ternet has undoubtedly offered a significant domain for people to raise their concerns,
mobilize for action, generate recognition, and (re)claim rights. A plethora of practices
have emerged from what some have enthusiastically called “liberation
technology” (Diamond, 2010)—including online mobilizations, whistleblowing initiatives
such as (p. 531) WikiLeaks (Brevini, Hintz, & McCurdy, 2013) and Xnet (Siapera, 2016),
“sousveillance” by citizens watching authorities and exposing wrongdoing (Mann et al.,
2003), and many others. Communication tools and platforms are also applied for more di
rect forms of state-citizen communication and citizen participation in public administra
tion, for example for public consultations, citizen-based policy reviews, and participatory
budgeting (Simon et al., 2017). People have thus used a diverse set of tools and practices
to intervene into political debate and interact with their political environment.
Furthermore, the Internet has enabled assertive practices far beyond immediate political
interventions. Citizen journalism has advanced people’s ability to contribute their voice
and expertise to questions of public concern, and it has challenged established profes
sional media (Allan, 2013). Networks such as Indymedia and organizations such as Global
Voices have developed citizen-based platforms for news and debate, while groups like
Riseup.net have set up alternative technical infrastructure and offered online services
(such as web space and mailing lists) to fellow activists (Hintz & Milan, 2013; Milan,
2013). Digital storytelling has advanced processes of narrative exchange and offered
channels for citizen-based knowledges to enter the public realm (Hartley & McWilliam,
2009).
Opportunities for digital subjects to engage with their social and political environment
have opened up, moreover, as forms of social organization have come to be more fluid
and spontaneous in a digital context. “Smart mobs” (Rheingold, 2002) and “connective ac
tion” practices (Bennett & Segerberg, 2014) have reduced access barriers for the individ
ual to purposeful collective action and have challenged classic organizational models
from the pre-digital age. Similarly, participatory modes of production have allowed for en
hanced roles for digitally active subjects in the cultural and economic realm. Digital acts
may include the development of fan fiction, which has increasingly complemented classic
cultural production (Jenkins, 2008), the contribution of one’s skills to free software devel
opment or one’s knowledge to Wikipedia (Shirky, 2010), and a range of other practices of
online collaboration, networked production, and voluntary contributions to larger projects
(Benkler, 2006).
Digital Citizenship
These features of digital activity have been integrated—to varying degrees and with vary
ing priorities—in different iterations of the concept of digital citizenship. Outlining an ear
ly version of the notion in the late 1990s, Katz (1997) defined digital citizens according to
the extent of their Internet use but, at the same time, observed “a new political ethos”
and “a new political sensibility” among this emerging group. In his view, they were civic-
Page 6 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
minded, shared common values, revered civil liberties, and were committed to openness.
Digital citizens, according to Katz, regarded the Internet as a “tool for individual expres
sion, democratization, economic opportunity, community and education,” and technology
as “a force for good.” This perspective was certainly grounded in the optimism of cyber-
libertarian approaches of the time, which regarded the Internet as an (p. 532) autonomous
space where citizens (and private business) were freed from coercion by governments.
Just a year before, John Perry Barlow had formulated the promises of the Internet, in his
“Declaration of Independence of Cyberspace,” as a new space “where anyone, anywhere
may express his or her beliefs, no matter how singular, without fear of being coerced into
silence or conformity” (Barlow, 1996). The idea of cyberspace as a new “agora” of free
and democratic discussion was widely shared and restrictions to this freedom were hard
ly imaginable. Katz thereby set the tone for an understanding of digital citizenship that is
closely related to notions of democratization and empowerment.
Mossberger, Tolbert and McNeal (2007) refined the concept by focusing on the effective
ness of Internet use and on the consequences of an individual’s participation in society.
They adopt a similar starting-point by defining as “digital citizens” those who use the In
ternet frequently but highlight technical competence and information literacy skills for ef
fective use along with the conditions of access. They thereby respond to classic citizen
ship discourses around inclusion and exclusion, and to the conditions of membership in a
community. Yet they also pick up the positive perspective on the Internet as a force that
facilitates democratic participation and, thus, regard digital citizenship as the ability to
participate in society. Their approach has been supported by, for example, Lindgren
(2017), who notes that debates on digital citizenship address “the opportunities and re
sources that a person has to participate online in society and politics” (p. 147). Questions
of access and competence, and inequalities in the capacity to use digital tools, come to
the forefront here. More often, however, contemporary investigations into digital citizen
ship focus on how specific “digital acts” (Isin & Ruppert, 2015) and “acts of
citizenship” (Isin, 2008) constitute people’s role in society and generate their position as
active citizens. Couldry et al. (2014), for example, investigate digital storytelling as a
practice that forms citizenship. Using Dahlgren’s (2003) notion of civic culture which ex
amines the conditions for people’s participation in the public sphere and thereby identi
fies “the possibilities of people acting in the role of citizens” (pp. 154–155), they explore
the implications of digital acts for participation and, by extension, the building of citizen
ship. An important aspect for them is the notion of recognition, as “digital media and digi
tal infrastructures provide the means to recognize people in new ways as active narrators
of their individual lives” (Couldry et al., 2014, p. 615). This resonates with observations
on social media uses of young people who “write themselves and their communities into
being” (boyd, 2007, p. 14).
Extensive case studies have documented how digital acts can enact and perform citizen
ship (McCosker, Vivienne, & Johns, 2016) as a form of do-it-yourself citizenship (Ratto &
Boler, 2014). Taking matters into one’s own hands and becoming producers allows protag
onists to (re)construct identities, develop agency, and intervene into systems of authority
and power. Ratto and Boler reaffirm Hartley’s claim of “self-determination as the founda
Page 7 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
tion to citizenship” (Hartley, 1999, p. 178), but add that this act is politically transforma
tive as it leads to “new modalities of political participation” (p. 3). Their broader under
standing of “DIY citizenship” is grounded in what they call “critical making,” which en
compasses both online and offline practices, including non-digital forms of media and di
verse forms of crafting, hacking and making. This perspective connects (p. 533) with pre
vious analyses of how participation in older, non-digital media, such as community radio
and video activism, can generate recognition, self-actuation and community-building. Ro
driguez (2001), for example, conceptualized such practices and their implications in
terms of active “citizenship,” tracing how power relations in communities are changed as
a result, authority is questioned, and new identities (or even new communities) are
formed.
As the notion of “citizenship” is increasingly applied across studies that focus on prac
tices of participation, activism, or DIY culture, the contours of the concept may lose some
of their sharpness. Isin and Ruppert (2015) have addressed this problem by reconnecting
digital citizenship with the classic idea that rights claims against an authority are at the
basis of the (self-)creation of citizens. Digital citizens, in their view, do not just receive ex
isting rights, but also make claims to rights that may not yet exist. They do not just use
the Internet to conduct established forms of citizenship, but to develop new forms and
claim new rights. These go beyond established civic, political, and social rights and ad
dress the technological context of humanity’s future. Further, such rights are not neces
sarily limited to the territory of the nation-state but refer to a different kind of environ
ment—cyberspace—where people meet and interact. The result is, as Siapera (2017)
notes, a new ontology of the citizen, brought into being through digital acts.
What connects many of these accounts of digital citizenship is a focus on citizens’ agency
and the progressive social change that (may) result from it. At the core of most approach
es is an interest in how people enact themselves as subjects of power (Isin & Ruppert,
2015). Their self-organized acts are often related to social movements, counter-cultural
and political activism (Ratto & Boler, 2014). Effective use of the affordances of digital,
mobile and social media, it is argued, can enhance participation in society (Mossberger,
Tolbert, & McNeal, 2007) and generate innovation, social change, possibilities for con
test, capacity for creative cultures of practice, and public good—in short, “democratize
civic and political participation and facilitate social inclusion” (Vivienne, McCosker, &
Johns, 2016, p. 8).
The concept of digital citizenship therefore has an intrinsic connection with citizen em
powerment. Digital media, it is claimed (explicitly or implicitly) have allowed us to raise
our voice, be heard in social and public debate, and construct our role in society. This im
plies a democratizing trend in state-citizen relations. It does not mean, though, that schol
ars follow uncritically the cyberlibertarian dreams of the earlier phase of Internet devel
opment. Enacting ourselves and performing our own citizenship does not negate the exis
tence of traditional authorities that convey citizenship rights. Isin and Ruppert (2015) ac
Page 8 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
knowledge that digital citizens still submit to governments in which they are implicated.
Social media activists, similarly, submit to new regulatory regimes by platform providers.
Vivienne, McCosker, and Johns (2016, p. 8) recognize that digital media environments
may also affect user experiences “in ways that limit (p. 534) users’ agency and capacity to
shape decisions that govern their lives.” But despite these qualifications, the overarching
focus in studies of digital citizenship is on user actions and citizen agency, on claims and
contestations, and on the assertion of rights and voice.
The active digital citizen operates in an environment of changing affiliations and social
configurations. As noted earlier, critical citizenship studies have pointed to a fragmenta
tion of the public sphere into multiple publics and a loss of cohesion based on traditional
bonds. Classic reference points for citizenship—such as national borders and formal orga
nizations—have lost some of the key roles they played in traditional nation-state societies
and are complemented by a wider range of often looser and more fluid affiliations. The
debate over digital citizenship has advanced our understanding of these developments as
the Internet has given rise to new forms of online communities and networked publics.
The individual of the digital age relates to a variety of cultural, social, political and geo
graphic affiliations, which overlay the membership in a nation-state. As already noted, the
digital subject is “a composite” (Isin & Ruppert, 2015, p. 12) of multiple forces, identifica
tions and associations. Social and political belongings become less stable and classic or
ganizational forms less relevant as the collective “we” is increasingly replaced by tempo
rary collaborations of “I”s (Milan, 2013). With concepts such as “networked
individualism” (Rainie & Wellman, 2012) scholars have tried to capture these changing
social formations in and through digital society. As individuals adopt a variety of subjec
tivities and identities, form new kinds of associations and meet in new spaces (beyond the
national), the public sphere becomes divided into diverse sets of what Dean (2001) calls
“cybersalons.” Digital citizens participate in the “salons” that relate to their interests,
tastes, political affiliations or geographic communities, but not necessarily to their nation
al membership.
For Papacharissi (2010), the digital realm has led to the emergence of a “private sphere”
in which public and private activities become intertwined and hard to separate. Digital
citizens, she argues, often interact with their social and political environment (e.g., via so
cial media) from the private space of, for example, their bedroom (and, we may add, via
the privately owned medium of a commercial online platform). Seemingly private acts in
online communities may have public political effects, and civic engagement is often
shared with entertainment and a wider set of motivations—we may think of memes or of
the trolling actions of the Anonymous “smart mobs.” Papacharissi calls this “private citi
zenship,” and it resonates with the fluidity of actions and belongings mentioned earlier.
As noted by other observers, this form of citizenship comes along with a transformation of
social structures from masses and collectivities to “a variety of atomized
actions” (Papacharissi, 2010, p. 131). These actions are collaborative and interactive but
they lack the stability of life-long national affiliation or other traditional organizational
processes.
Page 9 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Digital Restrictions
However, with the evolution of technological infrastructure and the changing political-
economic context of its development and use, the conditions for digital citizenship have
changed. In the early phase of the popularization of the Internet (the 1990s), cyberspace
had challenged the law’s traditional reliance on territorial borders, and thus questioned
government’s ability to control citizens’ behavior. As Internet users moved freely across
the global network, cyberspace was widely seen as distinct from physical space, with a
distinct set of rules and doctrines (Johnson & Post, 1996). However, and contrary to
Barlow’s earlier claims that governments “have no sovereignty where we gather” (Barlow,
1996), states have managed to gain significant influence over technical infrastructures
and digital spaces of human interaction since the start of the new millennium. By exert
ing control over important nodes of the network and by providing regulatory frameworks
for infrastructure and content providers, they have introduced an increasing range of re
strictions and established virtual borders around state territories (Goldsmith & Wu,
2006). This has restricted content flows across territorial borders, most prominently ex
emplified by the “Great Firewall of China.” During times of protests and uprisings, gov
ernments are now routinely closing down online services in their country or in specific lo
cations, or interrupting connections to the outside world. Inside most countries, filtering
and blocking content that transcends moral, religious or political limits set by govern
ments has become common practice (e.g., Deibert et al., 2008). These forms of restric
tions are increasingly complemented by other forms of interventions into content, such as
the strategic dissemination and manipulation of information (Deibert et al., 2012). The
open environment for the creation and exchange of citizen acts is thus gradually trans
forming into a tightly controlled space in which DIY citizen activity is allowed within lim
its, rather than enabled naturally by the technological infrastructure.
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
governmental surveillance, as have ethnic and religious minorities. (p. 536) State authori
ties have used Facebook and other social media platforms to scrape the user data of al
leged dissidents and have distributed malware that installs spying software onto the in
fected computer, for example to capture webcam activity (Villeneuve, 2012). In many
countries, including the democracies of the West, the policing of protests and other civic
activities now includes the monitoring of social media activity and the identification of
“threats” through the analysis of social media traffic (Dencik, Hintz, & Carey, 2017).
The role of social media in state strategies points us to the political-economic context of
contemporary digital citizenship. The tools that we use to enact and perform our citizen
ship are increasingly a small set of commercial platforms, provided by a highly concen
trated business sector. We use these platforms to produce, submit, and share content,
connect with fellow users and engage with our environment, but this engagement takes
place in a context of commodification and monetization, and its boundaries are set ac
cordingly (Fuchs, 2014). Social media companies, “sharing” platforms, app stores and
other providers of crucial infrastructure regulate what is allowed on their sites, and they
thus act as gatekeepers that both allow and restrict the activities of digital citizens
(Hintz, 2015). Moreover, their core business model is the extraction, analysis and moneti
zation of personal data. The “data mine” (Andrejevic, 2012) of online platforms enables
the detailed monitoring and analysis of Internet users that is at the core of the emerging
mode of “platform capitalism” (Srnicek, 2016) and of current surveillance trends (Lyon,
2015).
This brief sketch of digital restrictions suggests two complications for the performative
and active (self-)construction of digital citizens. First, the tools, platforms and infrastruc
ture that digital citizens use are subject to limitations (in terms of their organizational
structures as well as interventions by states and the private sector) to the digital acts that
are allowed and enabled. Second, digital citizens are not only constituted through their
actions, but also because everything they do leaves data traces which are analyzed and
used in a variety of ways—not by digital citizens but by platform companies, data brokers,
and the state. The first of these two trends provides problems for digital citizens but does
not question, as such, the concept’s focus on self-enactment through digital acts and
rights claims. The second, however, complicates contemporary notions of digital citizen
ship more profoundly. It suggests that digital citizenship is not only self-constructed and
self-defined, but equally—if not more substantially—constructed by the governmental and
business realm.
Citizens’ active engagement with their environment through digital networks produces
data that is collected, processed and analyzed and can uncover a wide range of prefer
ences, personal traits and social networks. The increasingly close integration of digital
Page 11 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
technologies in our everyday lives means that we create data traces when we con
(p. 537)
nect with our friends on apps; share intimate information about our personal lives via
chats; vote, protest and campaign on platforms; and conduct business interactions that
allow us to go about our everyday life—from online banking to ordering food, transport
and lodging. Moreover, much of what previously would have been called “offline” activi
ties, such as moving in the geographical space of a “smart city” that is filled with sensors
or watching a movie on a “smart TV” in a “smart home,” can now produce detailed pro
files about us. Communication devices, which hold a vast range of information about our
personal and professional lives, now extend beyond computers and mobile phones (and,
thus, the tools through which digital citizens have traditionally enacted their role in cy
berspace) to light switches, cars and waste bins. Such data tracking renders ordinary
everyday lives increasingly transparent to large organizations whilst at the same time
those who collect and use the data remain invisible to those whose data are garnered and
used (i.e., citizens; Lyon, 2015).
The technical ability to turn our behavior and social activities into data points that can be
collected and analyzed has become the basis of the digital economy. From the platform
economy to the expanding data broker industry, an ever-growing range of data-driven
businesses develop revenue from the aggregation, re-packaging and circulation of
people’s data (Rieke et al., 2016; Srnicek, 2016), using a wide array of attention technolo
gies (Rice & Hoffman, 2018). The data-focused logic of accumulation that emerges here
has been called “surveillance capitalism” (Zuboff, 2015) as it relies on the processing of
data about people and their activities.
Governments, too, increasingly adopt practices of profiling, sorting and categorizing pop
ulations to allocate and manage public services (Ansorge, 2016). Government depart
ments and state agencies in many countries now rely on the mass collection of data on
people to inform security measures, provide services and devise policy in areas such as
education, child welfare and housing. Categorizations based on citizens’ consumption
habits, political preferences, ethnic backgrounds or geographic location affect the level of
services they get, the ways in which they are regarded as “risks,” or the ease with which
they may cross borders. In predictive policing, for example, data on neighborhood crime
rates, previous arrests, personal living conditions, and a range of other characteristics,
are combined to create categories of potential future criminals and affect sentencing
(Angwin et al., 2016; Trottier, 2015). Predictive risk models are also used to assign child
protective services, decide eligibility for health services, and “vet” migrants and refugees
(Crawford, 2016; Eubanks, 2018; Redden et al., 2019). To that end, citizens are increas
ingly assigned data scores, not just by commercial services such as financial institutions
and insurance agencies, but also by government and public administration (Chin & Wong,
2016; Dencik et al., 2019).
For the public sector, data-based decision-making promises more efficient delivery of pub
lic services, better allocation of resources, and better responses to social problems and a
variety of “risks.” It provides a seemingly “scientific” method for tackling uncertainty by
rendering it perceptible and justifying responses, even if the “science” on which it is
Page 12 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
based is often questionable (Amoore and Piotukh, 2016). It enables proactive forms
(p. 538) of governance that utilize the predictive capacities of algorithmic data processing
and allow for pre-emptive measures. The “logic of preemption” (Massumi, 2015) of data-
based governance holds particular attraction for public administration in the context of
security challenges and resource shortages.
Implications of Datafication
The logic of data-based governance requires the collection of the widest-possible range of
data and is therefore inherently in conflict with privacy concerns. Moreover, it establishes
trust in the processes, rationalities, techniques and outcomes of algorithmic decision
making (Aradou & Blanke, 2015). It relies on the assumption that data processing deliv
ers “objective” results. The root of “dataism,” as Van Dijck (2014) calls it, is thus an ideo
logical belief in particular forms of knowledge and social order. As a consequence, algo
rithms adjudicate more and more decisions in our lives and become “new power brokers
in society” (Diakopolous 2013, p. 2).
The ways in which people are “judged” through data lead us to, arguably, the most signifi
cant implication of datafication for digital citizenship—the changes in societal power dy
namics. With data-based sorting, scoring and categorizing, the emerging power relations
of the datafied age are between those who provide personal data (digital citizens) and
those who own, trade and control it (typically, large Internet companies and the state).
While datafication is by no means the first instance of the state using information pro
cessing to expand its influence over citizens (Mattelart, 2003), it provides vastly en
hanced possibilities to understand, predict and control citizen activities. This empowers
the state, particularly, in a context of dispersed and individualized social structures that
provide challenges for a comprehensive regulation of the citizenry by state authorities.
Monitoring and profiling the “atomized actions” of populations allows the state to address
a fragmented reality and create a new and governable collectivity. (p. 539) This points us
Page 13 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
to the original (French) meaning of the word surveillance: supervision. The digital citizen
is, at the same time, an active citizen and a supervised citizen.
What agency, then, does the datafied citizen have? Datafied subjects enact their role in
the digital world, in part, by challenging, mediating and negotiating data collection and
analysis. This has included, for example, practices of technological self-defense to restrict
data gathering. Forums to provide secure digital infrastructures for active digital citizens
have proliferated, with “numerous digital rights and Internet freedom initiatives seizing
the moment to propose new communication methods for activists (and everyday citizens)
that are strengthened through encryption” (Aouragh et al., 2015, p. 213). These have in
cluded privacy-enhancing tools such as the TOR browser, the GPG email encryption sys
tem and the encrypted phone and text messaging software Signal. Privacy guides such as
the Electronic Frontier Foundation’s “Surveillance Self-Defense” (https://ssd.eff.org/en)
and the Tactical Tech Collective’s “Security in a Box” (https://tacticaltech.org/projects/se
curity-box) explain the use of privacy-enhancing tools and offer advice on secure online
communication. “Crypto-parties” have brought necessary training in (p. 540) such tools to
towns and cities worldwide. Digital rights advocacy, moreover, has offered a promising
avenue for claiming rights in datafied spaces and address related challenges. In the UK,
for example, organizations such as Privacy International, the Open Rights Group, Big
Page 14 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Brother Watch, Article 19 and Liberty have regularly issued statements regarding their
concerns about data collection organized public debates and lobbied legislators.
Further, “data activism” has applied alternative forms of data use for social and political
purposes. Initiatives such as Occupy Data have supported social movements through data
gathering, analysis and visualization—both of public datasets that concern the move
ments’ agenda for social change, and of data collected by the movement itself, for exam
ple on police violence. Open Data campaigns have leveraged the availability of public da
ta to support campaigning efforts (Renzi and Langlois, 2015). Using data in empowering
ways and as a means for social and political change, data activism aims to “bring democ
ratic agency back into the analysis of how big data affect contemporary society” (Milan,
2017, p. 153). Data activism scholars suggest that it can empower users of digital infra
structures to be more critical about data collection and thereby alter the relationship be
tween citizens and data collectors. (Milan & van der Velden, 2016). Revisiting and updat
ing the practices of digital citizenship, it re-claims the agency of citizens that is at risk in
datafied societies. However, it does not change the underlying challenge of data collec
tion and analysis that is now inherent in every digital act. Data activism can, in this sense,
add bottom-up sousveillance and dissident data uses to existing top-down surveillance,
but it may expose citizens to the same mechanisms of data collection and profiling.
Page 15 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Conclusion
Digital citizenship has become an important framework for understanding people’s posi
tion as political subjects in digitized environments. The concept typically focuses on the
performative self-enactment of citizens and incorporates a wider set of affiliations and be
longings. It builds on digital acts, the use of digital tools, and digital rights claims, and
conceptualizes the resulting self-construction of people’s active role in society. The digital
realm has offered many possibilities for these acts and has promised citizen empower
ment. However, as we have seen, the technological, political and economic context of dig
ital life may restrict digital acts significantly. Particularly, the key role of data collection
and analysis in contemporary societies complicates an overly optimistic perspective on
citizen agency in online environments. Digital citizens are traced and tracked, scored and
profiled, assessed and monitored, and integrated into new categories of citizenship ac
cording to the data that is collected about them. They are thus constituted and managed,
at least in part, through data analysis by new (the platform economy) and traditional (the
state) institutions.
This questions key coordinates of the concept. It limits the agency of digital citizens as
well as the empowering characteristics of digital acts. Rather than advancing the self-en
actment of citizens, it suggests a power shift in the opposite direction—from the citizen to
the state. Whereas the concept of digital citizenship departed from classic understand
ings in which citizenship is conferred by a powerful actor, “datafied citizenship” returns
the focus towards traditional state-citizen relations. Digital or datafied citizens do have
new practices at their disposal, including techno-legal responses to datafication, claims to
privacy rights and to social justice in datafied environments, and new forms of data ac
tivism that apply the opportunities of data analysis constructively. However these take
place in the context of pervasive data collection and a governance model of data-based
profiling and social sorting that is outside the citizen’s reach. Digital citizenship thus in
tersects the empowered and controlled subject, and traverses the active and monitored
dimensions of citizenship.
What, then, are necessary conditions for digital citizens’ self-determination in datafied so
cieties? Research (Hintz et al., 2017) suggests they would need to include a trustworthy
technical infrastructure that accommodates user rights, such as privacy, in its design, its
physical construction, and its code. Further, they require a supportive legal and regulato
ry framework that limits the collection, analysis and use of personal data; adequate pub
lic knowledge of datafication; and an informed use of the relevant platforms and applica
tions. Underpinning such approaches, this chapter argues that we (p. 542) need a compre
hensive understanding of the changes and challenges to core principles of citizenship
that have emerged in times of datafication.
References
Allan, S. (2013). Citizen witnessing: Revisioning journalism in times of crisis. Cambridge:
Polity.
Page 16 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Amoore, L. & Piotukh, V. (2016). Introduction. In L. Amoore & V. Piotukh (Eds.), Algorith
mic life: Calculative devices in the age of big data (pp. 1–18). New York: Routledge.
Angwin, J., Larson, J., Mattu, S. and Kirchner, L. (2016, May 23). Machine Bias. Propublica.
https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-
sentencing
Ansorge, J. (2016). Identify & sort: How digital power changed world politics. London,
UK: Hurt & Company.
Aouragh, M., Gürses, S., & Rocha, J. (2015). Let’s first get things done! On division of
labour and techno-political practices of delegation in times of crisis. The Fibreculture
Journal, 26, 208–235.
Aradou, C. & Blanke, T. (2015). The (Big) Data-security assemblage: Knowledge and cri
tique. Big Data & Society, 2(2), 1–12.
Benkler, Y. (2006). The wealth of networks: How social production transforms markets
and freedom. New Haven and London: Yale University Press.
Bennett, L., & Segerberg, A. (2014). The logic of connective action: Digital media and the
personalization of contentious politics. Cambridge: Cambridge University Press.
boyd, d. (2007). Why youth (heart) social network sites: The role of networked publics in
teenage social life. In D. Buckingham (Ed.), Youth, identity, and digital media (pp. 119–
142). MacArthur Foundation Series on Digital Learning. Cambridge, MA: MIT Press.
Brevini, B., Hintz, A., & McCurdy, P. (Eds.) (2013). Beyond WikiLeaks: Implications for the
future of communications, journalism and society. Basingstoke: Palgrave MacMillan.
Cheney-Lippold, J. (2016). Jus Algoritmi: How the national security agency remade citi
zenship. International Journal of Communication, 10, 1721–1742. http://ijoc.org/
index.php/ijoc/article/view/4480
(p. 543) Cheney-Lippold, J. (2017). We Are data. New York: New York University Press.
Page 17 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Chin, J., & Wong, G. (2016, November 28). China’s new tool for social control: A credit
rating for everything. Wall Street Journal. http://www.wsj.com/articles/chinas-new-
tool-for-social-control-a-credit-rating-for-everything-1480351590
Clarke, J., Newman, J., Smith, N., Vidler, E., & Westmoreland, L. (2007). Creating citizen-
consumers: Changing publics and changing public services. London: Sage.
Clarke, J., Coll, K. M., Dagnino, E., & Neveu, C. (2014). Disputing citizenship. Bristol: Poli
cy Press.
Couldry, N., Stephanson, H., Fotopoulou, A., MacDonald, R., Clark, W., & Dickens, L.
(2014). Digital citizenship? Narrative exchange and the changing terms of civic culture.
Citizenship Studies, 18(6–7), 615–629.
Couldry, N. & Hepp, A. (2017). The mediated construction of reality. Cambridge: Polity
Press.
Crawford, K. (2016). Know your terrorist credit score! Presentation at Re:publica, May,
Berlin.
Dahlgren, P. (2003). Reconfiguring civic culture in the new media milieu. In J. Corner & D.
Pels (Eds.), Media and the restyling of politics (pp. 151–170). London: Sage.
Dean, J. (2001). Cybersalons and civil society: Rethinking the public sphere in transna
tional technoculture. Public Culture, 13(2), 243–266.
Deibert, R. J., Palfrey, J. G., Rohozinski, R., & Zittrain, J. (2008). Access denied: The prac
tice and policy of global Internet filtering. Cambridge: MIT Press.
Deibert, R., Palfrey, J. G., Rohozinski, R., & Zittrain, J. (2012). Access contested: Towards
the fourth phase of cyberspace controls. In R. Deibert, J. G. Palfrey, R. Rohozinski, & J. Zit
train (Eds.), Access contested: Security, identity and resistance in Asian cyberspace (pp.
3–20). Cambridge: MIT Press.
Dencik, L. & Leistert, O. (Eds.) (2015). Critical perspectives on social media and protest:
Between control and emancipation. Lanham, MD: Rowman and Littlefield.
Dencik, L., Hintz, A., & Carey, Z. (2017). Prediction, pre-emption and limits to dissent: So
cial media and big data uses for policing protests in the United Kingdom. New Media &
Society, 20(4), 1433–1450.
Dencik, L., Hintz, A., Redden, J., & Warne, H. (2019). The ‘golden view’: data-driven gov
ernance in the scoring society. Internet Policy Review 8(2). https://policyreview.info/ar
ticles/analysis/golden-view-data-driven-governance-scoring-society
Page 18 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish
the poor. New York: St. Martin’s Press.
Goldsmith, J. & Wu, T. (2006). Who controls the Internet? Illusions of a borderless world.
Oxford: Oxford University Press.
Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA and the surveillance
state. London: Hamish Hamilton Press.
Hartley, J. & McWilliam, K. (Eds.) (2009). Story circle: Digital storytelling around the
world. Oxford: Wiley-Blackwell.
(p. 544) Held, D. & McGrew, A. C. (2003). The great globalization debate. In D. Held, & A.
G. McGrew (Eds.), The global transformations reader (pp. 1–50). Cambridge: Polity Press.
Hintz, A. & Milan, S. (2013). Networked collective action and the institutionalised policy
debate: Bringing cyberactivism to the policy arena? Policy & Internet, 5(1), 7–26.
Hintz, A. (2015). Social media censorship, privatised regulation, and new restrictions to
protest and dissent. In L. Dencik & O. Leistert (Eds.), Critical perspectives on social me
dia and protest: Between control and emancipation (pp. 109–126). Lanham, MD: Rowman
and Littlefield.
Hintz, A., Dencik, L., & Wahl-Jorgensen, K. (2017). Digital citizenship and surveillance so
ciety. International Journal of Communication, 11, 731–739.
Hintz, A. & Brown, I. (2017). Enabling digital citizenship? The reshaping of surveillance
policy after Snowden. International Journal of Communication, 11, 782–801.
Hintz, A., Dencik, L., & Wahl-Jorgensen, K. (2018). Digital citizenship in a datafied society.
Cambridge: Polity Press.
Isin, E. (2008). Theorizing acts of citizenship. In E. Isin & G. Nielsen (Eds.), Acts of citi
zenship (pp. 15–43). London: Zed.
Page 19 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Isin, E. & Ruppert, E. (2015). Becoming digital citizens. Lanham, MD: Rowman & Little
field.
Jenkins, H. (2008). Convergence culture: Where old and new media collide. New York:
New York University Press.
Johnson, D. R. & Post, D. (1996). Law and borders: The rise of law in cyberspace. Stan
ford Law Review, 48(5), 1367–1402.
Katz, J. (1997). The digital citizen. Wired, January 12, 1997, https://www.wired.com/
1997/12/netizen-29/
Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable
computing devices for data collection in surveillance environments. Surveillance & Soci
ety, 1(3), 331–355.
Marshall, T. H. (1950). Citizenship and social class, and other essays. Cambridge: Cam
bridge University Press.
Massumi, B. (2015). Ontopower: War, powers, and the state of perception. Durham, NC:
Duke University Press.
McCosker, A., Vivienne, S., & Johns, A. (Eds.) (2016). Negotiating digital citizenship: Con
trol, contest and culture. London, UK: Rowman & Littlefield.
McNevin, A. (2011). Contesting citizenship: Irregular migrants and new frontiers of the
political. New York: Columbia University Press.
Milan, S. (2013). Social movements and their technologies: Wiring social change.
Basingstoke: Palgrave MacMillan.
Milan, S. (2017). Data activism as the new frontier of media activism. In G. Yang & V.
Pickard (Eds.), Media activism in the digital age (pp. 151–163). London: Routledge.
Milan, S., & van der Velden, L. (2016). The alternative epistemologies of data ac
(p. 545)
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Morozov, E. (2011). The net delusion: The dark side of Internet freedom. New York: Public
Affairs.
Mossberger, K., Tolbert, C., & McNeal, R. S. (2007). Digital citizenship: The Internet, soci
ety, and participation. Cambridge, MA: MIT Press.
Rainie, L. & Wellman, B. (2012). Networked: The new social operating system.
Cambridge, MA: MIT Press.
Ratto, M. & Boler, M. (Eds.) (2014). DIY citizenship: Critical making and social media.
Cambridge: MIT Press.
Renzi, A. & Langlois, G. (2015). Data activism. In G. Langlois, J. Redden, & G. Elmer
(Eds.), Compromised data: From social media to big data (pp. 202–225). New York:
Bloomsbury.
Rheingold, H. (2002). Smart mobs: The next social revolution. Basic Books.
Rice, R. E. & Hoffman, Z. T. (2018). Attention in business press to the diffusion of atten
tion technologies, 1990–2017. International Journal of Communication, 12.
Rieke, A., Yu, H., Robinson, D., & von Hoboken, J. (2016). Data brokers in an open society.
London: Open Society Foundation.
Shirky, C. (2010). Cognitive surplus: Creativity and generosity in a connected age. Lon
don, UK: Penguin.
Siapera, E. (2016). Digital citizen X. In A. McCosker, S. Vivienne, & A. Johns (Eds.), Nego
tiating digital citizenship: Control, contest and culture (pp. 97–114). London: Rowman
and Littlefield International.
Simon, J., Bass, T., Boelman, V., & Mulgan, G. (2017). Digital democracy: The tools trans
forming digital engagement. NESTA Working Paper. http://www.nesta.org.uk/publica
tions/digital-democracy-tools-transforming-political-engagement
Page 21 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Spiro, P. J. (2011). A new international law of citizenship. The American Journal of Interna
tional Law, 105(4), 694–746.
Trottier, D. (2015). Open source intelligence, social media and law enforcement: Visions,
constraints and critiques. European Journal of Cultural Studies, 18(4–5), 530–547.
Turner, B. S. (2009). TH Marshall, social rights and English national identity. Citizenship
Studies, 13(1), 65–73.
Van Dijck, J. (2014). Datafication, dataism and dataveillance: Big Data between scientific
paradigm and ideology. Surveillance & Society, 12(2), 197–208.
Villeneuve, N. (2012). Fake Skype encryption software cloaks DarkComet trojan. Trend
Micro Malware Blog, 20 April 2012. http://blog.trendmicro.com/fake-skype-encryp
tion-software-cloaks-darkcomet-trojan/
Vivienne, S., McCosker, A., & Johns, A. (2016). Digital citizenship as fluid interface: Be
tween control, contest and culture. In A. McCosker, S. Vivienne, & A. Johns (Eds.), Negoti
ating digital citizenship: Control, contest and culture (pp. 1–18). London: Rowman & Lit
tlefield.
Walzer, M. (1970). Obligations: Essays on disobedience, war, and citizenship. Boston, MA:
Harvard University Press.
Young, I. M. (1989). Polity and group difference: A critique of the ideal of universal citi
zenship. Ethics, 99(2), 250–274.
Zivi, K. (2012). Making rights claims: A practice of democratic citizenship. Oxford, UK:
Oxford University Press.
Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information
civilization. Journal of Information Technology, 30, 75–89.
Page 22 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digital Citizenship in the Age of Datafication
Notes:
(1.) The chapter is informed by a two-year project of empirical research on the conse
quences of datafication and, particularly, increasing surveillance on digital citizenship
(Hintz, Dencik, & Wahl-Jorgensen, 2017), and by the work of the Data Justice Lab at
Cardiff University. The argument presented here has been elaborated in more detail in
the book Digital citizenship in a datafied society (Hintz, Dencik, & Wahl-Jorgensen, 2018).
Arne Hintz
Arne Hintz is Senior Lecturer at the School of Journalism, Media and Culture at
Cardiff University, where he leads the MA Digital Media and Society, and co-directs
the Data Justice Lab. His research addresses questions of digital democracy, datafica
tion, and communication policy. He has led several collaborative research projects,
including Digital Citizenship and Surveillance Society: State-Media-Citizen Relations
after the Snowden Leaks and Towards Democratic Auditing: Civic Participation in the
Scoring Society. His publications include, among others, Beyond WikiLeaks (Pal
grave, 2013) and Digital Citizenship in a Datafied Society (Polity, 2018).
Page 23 of 23
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.19
One of the major terminological forces driving information and communication technolo
gy (ICT) integration in research today is “big data.” The characteristics of big data make
big data sound inclusive and integrative. However, in practice such approaches are highly
selective, excluding input that cannot be effectively structured, represented, or digitized;
in other words, excluding complex data. Yet complex data are precisely the kind that hu
man activity tends to produce, but the technological imperative to enhance signal
through the reduction of noise does not accommodate this richness. The objective of this
chapter is to explore the impact of bias in digital approaches to knowledge creation by in
vestigating the delimiting effect digital mediation and datafication can have on rich, com
plex cultural data. If rich or complex data prove difficult to fully represent on a small-
scale level, in the transition to a big data environment, we run the risk of losing much of
what makes this material useful or interesting in the first place. We will begin by review
ing some of the existing implicit definitions of data that underlie ICT-driven research. In
doing so will draw attention to the heterogeneity of definitions of data, to identify the key
terms associated with data demarcation and data use, and to then expand on the implica
tions of this heterogeneity.
Keywords: cultural complexity, big data, complex data, datafication, digital mediation, knowledge creation, cultur
al data, information and communication technology, ICT, data demarcation
Introduction
ONE of the major terminological forces driving information and communication technolo
gy (ICT) integration in research today is “big data.” While the characteristics, often de
fined by the multiple “V’s” of big data—volume, velocity, variety, veracity, and value
(BDIOT, 2018)—may make big data sound inclusive and integrative, such approaches are
in fact highly selective, excluding input that cannot be effectively structured, represent
ed, or digitized. Data of this complex sort is precisely the kind that human activity tends
Page 1 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
to produce, but the technological imperative to enhance signal through the reduction of
noise does not accommodate this richness.
Data and the computational approaches that facilitate “big data” have acquired a per
ceived objectivity that belies their curated, malleable, reactive, and performative nature.
In an input environment where anything can be “data” once it is entered and accepted in
to the system as “data,” data cleaning and processing, together with references to meta
data and information architectures that structure and facilitate our cultural archives, ac
quire a capacity to delimit what data are that is endemically under-acknowledged or ig
nored outright. This engenders a process of simplification that has major implications for
the potential of future innovation within research environments that depend on rich mate
rial yet are increasingly mediated by digital technologies that delimit, simplify and even
hide or make latent potentially important facets of this material.
The objective of this chapter is to explore the impact of bias in digital approaches
(p. 548)
to knowledge creation by investigating the delimiting effect digital mediation and datafi
cation can have on rich, complex cultural data. Cultural data refers to the rich, complex
data used in analyses of culture (such as anthropological field notes) or by humanities re
searchers (manuscripts, photographs, diaries). The data may often refer to objects that
are rare or even unique. These objects may have complex histories, particularly when it
comes to cultural data or objects that may have passed through hundreds of hands. These
objects may have been subject to rebinding, restoration, damage, losses, or intentional
edits (Edmond & Nugent-Folan, 2017). As Edmond notes, cultural data are particularly
difficult to incorporate into a digital research environment such as a database precisely
because such complexities are at odds with the very functionality of the database and the
findability of the material held within it:
How is this level of uncertainty, irregularity and richness to be captured and inte
grated, without hiding it “like with like” alongside archival runs with much less
convoluted narratives of discovery? Who is to say what […] is “signal” and what
[is] “noise”? Who can judge what critical pieces of information are still missing?
Cultural data can be contrasted with the comparably “simple” data output of population
counts or environmental sensor readings that may be immediately recognizable as data,
and comforting in their regularity and quantitative nature. Such readings accommodate
partial representations rather than fully representing the people or climate that has been
sampled; itself a near impossible task.
If rich or complex data prove difficult to fully represent on a small-scale level, then in the
transition to a big data environment, we run the risk of losing much of what makes this
material useful or interesting in the first place. We will begin by reviewing some of the ex
isting implicit definitions of data that underlie ICT-driven research. In doing so we will
draw attention to the heterogeneity of definitions of data, to identify the key terms associ
ated with data demarcation and data use, and to then expand on the implications of this
Page 2 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
heterogeneity. By establishing a clear taxonomy of existing theories and definitions of da
ta, we provide a foundation that will serve to underpin a more applied understanding of
the term, especially in both humanistic and technical contexts, while also working to un
derstand why these approaches to defining data are often presented in counterpoint, as
mutually exclusive, or antagonistic.
Our taxonomy of data definitions is backed up by the findings of a data mining exercise
wherein we examined usage of the terms “data” and “big data” in the proceedings of a
major international big data journal, the Journal of Big Data, from its inception to the
present day. It outlines key priorities associated with each conceptualization of data, to
gether with key (and under-acknowledged) points of divergence or differences in the use
of these conceptualizations and in the acts of data cleaning and data processing. In addi
tion to developing new perspectives on the rhetorical stakes and action implications of
differing concepts of the term “data,” the chapter moves towards a reconceptualization of
what data are, and how best to go about speaking of and about them.
The first section of this chapter explores how the word “data” is used, or indeed
(p. 549)
misused, in scientific discourse, and examines the implications of these discursive prac
tices. Following this, we will examine how data cleaning and the pre-processing of data
influence our conceptualization of data proper. Section two explores how strategies for
navigating the data deluge (e.g., metadata, keywords, search, and other algorithmic or
organizational strategies) can restrict the interpretative potential of data, and make us
susceptible to an implicit truth claim made on the basis of those strategies.
Pre-Data
Before we discuss data definitions, it is important to identify the difference between data
and what we might term pre-data, that is “data” before it is datafied and becomes data-
proper. It refers to objects and phenomena in the real world that might be, but have not
yet been, subjected to datification (with all of the losses and gains that that such a
process implies). “Pre-data” involves the material entity that undergoes datafication; it
Page 3 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
can be used to describe what data are like before they become, are captured, or are
transformed into data. In this sense, “pre-data” can be just about anything: a conversa
tion (that we may record or transcribe), a paper document (that we may scan or digitally
analyze), a natural phenomenon (that we may photograph, or seek to quantify). Electronic
records such as social media posts, created without the intent of creating data, may al
ready have the form of “data,” and be managed by a company as “data,” but they may not
necessarily be used as “data,” until for example a social researcher downloads and reuses
the post as a part of a corpus, or a third-party analytics firm uses the data to identify
users for advertisers.
If data proper can only ever be considered a partial simulacrum of a real life hap
(p. 550)
pening, event, or entity—not the thing in and of itself, but a recording of the thing—then
“pre-data” can either be the thing in and of itself, the thing in its totality, or the facets of
the thing that are not entirely recordable through datafication, such as context or envi
ronment.
Native Data
Native data are data as they exists/existed in their indigenous environment, the source
context or environ where the native data was extracted from; so it is data plus its environ
mental or source context. So for example, in the case of sensor data recording the sur
face temperature on a mountaintop, native data incorporates points about the environ
ment in which the data was drawn from. It contains all of the data readings in their en
tirety, not just the readings (maximum or minimum temperature) that researchers may be
looking to target or identify. That this additional contextual data may be included as meta
data illustrates just how difficult it can be to keep or maintain cognizance of the context
of your data: where on the mountaintop the sensor was placed, for example. Such infor
mation only makes sense if one has a wider understanding of the environments of con
texts beyond the immediate remit of the sensor, the geographic co-ordinates of the moun
tain, its elevation, the presence of nearby streams, wildlife, pollutants, etc.; such native
context can often only be maintained in a supplemental manner.
“Native data” can also mean, as Christine Borgman outlines in Big data little data no
data, the context(s) the data acquires when it transitions from a “native” to a “non-na
tive” environment; in other words, the data that retains the traces of datafication, the da
ta that is native to a specific software or program (Borgman, 2017, p. 22). So for example,
if a manuscript is scanned and subjected to optical character recognition, the native data
in this case is (depending upon the range and functions incorporate into the software in
question) the output of this initial scanning: it may or may not have been cleaned, or cor
rected for errors or misreadings. It may also retain traces or references to the scanning
process such as the inclusion of dust motes from the camera lens, or registration marks.
“Native data” is a useful term because it retains emphasis on the importance of context
apropos data. However, the term remains overwhelmingly underused.
Page 4 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
Raw Data
Raw data supposedly refers to data that has not undergone any processing, or more
specifically, any further processing, as the process of datafication in and of itself is a
transformative process. No data are inherently raw, but this term is nevertheless used to
refer to data we may consider to be relatively unprocessed. “Raw data” are distinct from
“native data” in that it can be considered a step further in terms of levels or degrees of
exposure to datafication. “Native data,” existing in its native environment, becomes “raw
data” when extracted from this native environment. A photograph of a yard full of (p. 551)
wildflowers can be considered the “native data” that allows a person to later study that
photo, identify and list down all the flowers they identify in that photo. This is their “raw
data,” while the photograph, in displaying the totality of the environment—the location of
the flowers, the time of day the time the image was captured, perhaps even the soil type,
and so on—can be considered the “native data.” Despite the existence of a relation be
tween the terms “native data”—that is data in its “rawest” or “native” state—and “raw da
ta,” even “native data” has been processed to a degree (the photographic image is itself a
processed entity), and so one can also argue, as Borgman does, that “Identifying the most
raw form of data may be an infinite regress to epistemological choices about what knowl
edge might be sought” (Borgman, 2017, p. 27). Ribes and Jackson are illuminating on the
processes “native data” undergoes to achieve “raw status” and, further still, the work
that goes into preserving data, observing that “we often think of raw data as following
straight and commonsense pathways from collection to database. Sometimes this is true
[ … ] however the more common story [ … ] [sees] data moving through complex, multi-in
stitutional networks” (Ribes & Jackson, 2013, p. 149).
The so-called “raw data” we are provided with or acquire as researchers has already un
dergone extensive, often undocumented cleaning to get it into a state where it is recog
nizable as data in the first place. And furthermore, what is “raw data” for one researcher
may not be “raw data” for another. For example, Person A collects “raw data” in the form
of a survey of the flowers in the aforementioned yard. This is their “raw data” as they en
deavor to create a very precise description of their garden. Person B takes this data and
adds it to five other such descriptions they have collected from other yards in the area.
This is their “raw data” as they work to develop a floral atlas of the locality. Another per
son (Person C) takes that atlas and extracts only information about purple flowers. This is
their “raw data” for a study of the attractiveness of purple flowers to pollinators. The pol
linators study becomes a part of the “raw data” basis for a study of agriculture, and so on.
Thus, as Borgman notes, “raw is a relative term” (Borgman, 2017, p. 26). While the con
cept of “raw data” is increasingly acknowledged as something of a misnomer or oxy
moron (in his contribution to the aptly titled collection of essays “Raw Data” is an oxy
moron, Matthew Stanley puts it nicely with the observation “raw data is not so raw”;
Stanley, 2013, p. 77), it is still widely used. Specifically at issue is the relativity of the raw
ness, with Borgman noting that “What is ‘raw’ depends on where the inquiry
begins” (Borgman, 2017, p. 26), and the variability of rawness may also be discipline-spe
cific, project-specific, or researcher-specific. In addition, in certain cases, “Only a small
Page 5 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
portion of what comes to be considered ‘raw data’ is actually generated in the
field” (Ribes & Jackson, 2013, p. 161). These so-called “raw” data are often subject to ex
tensive cleaning and modification that is not always acknowledged, fully accounted for, or
consistent. The result is that inter-disciplinary projects or conversations that make use of
these frustratingly abstract, idiosyncratic, and variable terms often run the risk of en
countering counter-productive “context collapse” (Marwick & boyd, 2010), to borrow a
term from research into social media in which it is identities rather than discourses that
collapse. Unless the referents of these terms are agreed on and maintained throughout
the course of the project, scholarly discourse may continue but without mutual under
standing.
Source data indicates the source of the data for any given research project. For some re
searchers, their source data may not be “native,” or even “raw”; it may already be data
proper and have undergone extensive processing. When understood as the data that is
necessary to conduct a research project, “source data” brings with it a number of impor
tant issues, and these arise well before it has undergone even the most preliminary analy
sis or testing. Particularly in a digital environment, where the contents of online news
sites, for example, change multiple times over the course of an hour, what is available to
you on one day may change, or not even be there, the next day: it may not be locatable in
exactly the same place, or even in the same format; the hyperlink that allowed you to ac
cess this material may not function indefinitely. A very basic example of this is the ever-
changing content interfaces of the digitally available newspapers, or the fact that the lev
els of a given mineral or nutrient recorded in a river will vary from day to day, so the mea
surements taken there over the course of a set period (for example, after an oil spill) will
not necessarily reflect the levels taken at a later date. Elsewhere, and again within a digi
tal environment, hyperlinks frequently become broken or dead (a process commonly re
ferred to as linkrot), and the 404 error message has become a near-universally recog
nized indication of a communications failure and an inability to locate the desired hyper
link. Thus, while one might assume that data that comes from a specific source is stable
or consistent, source data in fact can be variable or even become non-existent. This ties in
with the wider issue of the ephemerality and decay of online documents and their URLs
(Jones et al., 2016; Klein et al., 2014; Koehler, 2004; Mussell, 2012).
One result is that the collected data can quickly become “outdated data” because it no
longer matches or reflects the data at the original site or source of data acquisition. For
this reason researchers will often save their data source by storing duplicates of the data
elsewhere on their computer, in what is known as a cache memory. They may also indi
cate the date at which the data were obtained from a source, as in URL references that
specify a given article was “Accessed on [ … ]” a specific date. They may also include a
caveat that specifies the periodicity of their access to a given data source or the limits or
remits of their study, such as for example by making clear that they had access to the da
ta only for a set period (thereby acknowledging that it may have since changed), or that
the data was collected over a specific period in time, by stating for example “We obtained
Page 6 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
this data until the period of …”. Referring to sources in this manner acknowledges prove
nance, and facilitates traceability, which is important when it comes to producing trust
worthy, reliable, and replicable research. Interestingly, however, there is no single or
standardized response to this need, clearly a pressing one in an environment in which up
to 75% of web URLs lead to changed content (Jones et al., 2016). Different communities
will point to different potential solutions, with DOIs (Digital Object Identifiers) being a
preferred technical fix, and style sheets, such as APA or Chicago, suggesting their own,
alternate ways of managing the fact that data often become detached from their context
in the web of documents. None of these solutions, however, truly tackles the root of the
problem, that is that a researcher’s ability to trust data is often based upon (p. 553) tacit
clues derived from the analogue environment, as well as precisely the kinds of prove
nance information that is either not captured or not maintained effectively (Tenopir et al.,
2013, p. 31). The term “source data” therefore indicates where your data came from,
even when you may not be confident of your access to the provenance that implies. So,
whereas “raw data” comes from nowhere, “source data” always comes from somewhere
(and both the “source” and the “data” may change over time), even though the terms may
refer to one and the same object.
Researchers source their data from a wide variety of venues. Some source their data from
sensors or instruments, others from open online sources, from colleagues, or archives, or
their data may even have been purchased from companies. Each of these sources has
varying levels of quality and provenance, and this data may have been exposed to grada
tions of processing that are often left undocumented, or implicit. This is why acknowledg
ing the source of data are so important. Making sources available to others indicates con
fidence in the research and findings because it provides the ability of others to query and
test the research findings. As the previous sections have made clear, in many cases,
source data has already been exposed to extensive processing and curation. The list of
wild flowers that makes up a botanist’s raw data may be alphabetized, for example; or in
the case of the researcher investigating pollination, certain self-pollinating flowers may
have been removed from the dataset.
Some data sources, such as text for example, can appear relatively straightforward and
monovalent in terms of content. Other data can, though, be multivalent and contain input
from a variety of sources, such as from the web, newsfeed, legal documents, literature,
etc. Medical data, for example, can contain a myriad of different data forms or modes that
together make up the health profile of a patient, or for the purposes of a medical trial or
study, a section of the population. These data are multivalent and may contain both signal
and “noise” just as, for example, a radio signal may contain both music and static; or in
deed, from a user’s perspective, any given page on an online newsfeed contains text arti
cles, images, and advertisements, not all of which will be of equal interest or relevance to
the user. One of the characteristics of data as it is found in its source environment is that
it often contains noise. Therefore the data targeted at the onset of the study, the data
sought out to conduct the study, may exist in a noisy environment and has to be disassem
Page 7 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
bled or extracted or even estimated from the surrounding “noisy data,” the material that
is not required for the purposes of that particular study. As can be seen here then, the
term noise can have both a technical meaning (in the sense of “signal-to-noise ratio”) and
a “noise” in the sense of being superfluous, distracting, or even misleading, to the task at
hand.
Data quality can vary depending on the source. Indeed, the quality of source data is often
directly linked to where and how it was sourced, collected, or scraped. This again influ
ences the approaches one may take to clean, process, or analyze it. For example, (p. 554)
Facebook or Twitter or YouTube content may have language errors that need cleaning,
while content from a major newspaper (such as the Wall Street Journal) rarely includes
those kinds of problems.
Summary
It should be clear by now that to equate source data with pre-data, native data, or even
raw data is ill-advised. And while arguments that distinguish between native and raw da
ta run the risk of becoming tautological and tedious, transparency in relation to the data
source, the native context, and the degree of processing that data have been exposed to,
is clearly necessary. This is particularly so in relation to complex data (data that can have
more than one meaning, more than one signal) and concordantly in research environ
ments where complex data gives rise to situations where one person’s signal (data) may
be another person’s noise (as in dirty or messy data). For example, one person may
choose not to record instances of non-linguistic elements in a transcript of a conversa
tion. A later user will be unable to use this transcript to study the social function of
“backchannel” responses in conversation, as those elements of the exchange are no
longer a part of the available data.
Rosenberg outlines the history of “data” as a concept originating before the 20th century,
exploring how it acquired its “pre-analytical, pre-factual status” (Rosenberg, 2013, p. 18).
If “data” is “pre-analytical, pre-factual,” then what of “pre-data,” or “proto-data”? Rosen
thal (2017) presents data as an entity that “resists analysis,” an “object that cannot be
questioned.” Borgman further elaborates on this, stating that “Data are neither truth nor
Page 8 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
reality. They may be facts, sources of evidence, or principles of an argument that (p. 555)
are used to assert truth or reality” (Borgman, 2017, p. 17). Here already we have a not in
significant contradiction, however, in that two of the foremost theorists on data, Rosen
berg and Borgman, alternately describe data as “pre-factual” and “facts,” respectively.
How can an entity be both pre-factual and factual? How can data be “facts” if they are
pre-factual? Rosenberg further fuels this field of contradictions with the observation that
“When a fact is proven false, it ceases to be a fact. False data is data
nonetheless” (Rosenberg, 2013, p. 18). Rita Riley picks up on this contradiction when she
outlines the arguments for and against data surveillance, noting that such back and forth
arguments “imply that data is somehow neutral and that it is only the uses of data that
are either repressive or emancipatory” (Riley, 2013, p. 130). Data cannot be neutral if it is
a fact, and it cannot be a fact if it is false, yet individually it can be false, a fact, pre-factu
al, and also neutral. This uncertainty around the characteristics of “data” feeds in to a
larger discussion on distinctions between concepts such as data, information, and knowl
edge (Rice, McCredie, & Chang, 2001).
Data has been used to great emancipatory effect throughout projects such as American
slavery as it is, a groundbreaking project that, as Garvey notes, “helped to create the
modern concept of information, by isolating and recontextualizing data found in
print” (Garvey, 2013, p. 91). However, Garvey’s assertion that “data will out” (Garvey,
2013, p. 90) implies that there is some overarching truth-function to data, that it can
somehow speak for itself, as opposed to needing context and modification so as to take on
the values expected or sought out by the researcher. Data only, as Garvey described it,
“outs”—that is, invites interpretation—by means of a complex set of procedures that may
be discipline-specific, case-specific, or even researcher-specific. For example, a re
searcher with a background in palaeography is well suited to decipher the contents of a
manuscript, but not if that manuscript contains text in a language they do not read fluent
ly. They also may not be skilled in the encoding procedure necessary to transcribe the
contents into xml (extensible markup language) for the purpose of disseminating the ma
terial in a digital environment, or capable of building the system that could run and facili
tate this kind of digitally facilitated manuscript analysis. Conversely, the software engi
neer capable of building a system that facilitates the digital analysis of medieval manu
scripts may have little or no background in medieval scholarship or manuscript studies
(see Chandna et al., 2015).
The procedures that facilitate the interpretation of data are informed by pre-existing
knowledge bases. A researcher who speaks English but not French or Latin, for example,
will naturally focus on the English contents of a multi-lingual manuscript, to the neglect
of the other material. Furthermore, the purposes for engaging with or seeking out partic
ular data in the first place often determine the types of data obtained, and the interpreta
tions these data are subjected to. If, for example, material is being sought out (p. 556) for
a collection of early English poetry, then material in Latin or French is not required, and
Page 9 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
while it may be present within the “source data” or the data when it is in its native con
text, following scanning by OCR software, this material will be removed in order to make
the “raw data” necessary for and relevant to the project.
Many of these approaches to data processing adapt and evolve as the research progress
es. However, data processing choices and provenance records are often left undocument
ed and unaccounted for, with the result that data acquires a factual sheen that belies its
curated and processed status. Even a Google search presents only a certain perspective
on the data available to its search queries, limited by the nature of keyword search, the
way in which the algorithm ranks pages and, further upstream, by how data has been
captured and presented, with or without the context it needs to be exposed in a relevant
query (Horsley & Priddy, 2018). For example, in the case of Garvey’s essay on abolition
ists’ use of facts, “the ads were abstracted, their information pried loose and accumulat
ed, aggregated en masse” (Garvey, 2013, p. 91) in a manner that can be considered a very
early pre-computational approach to aggregating data in a manner akin to a Google
search. This data did not simply “out;” it was pried out.
It’s fitting then, that Rosenberg famously cites data as “rhetorical” (Rosenberg, 2013, p.
18), and Raley argues data are “performative” (Raley, 2013, p. 128). Perhaps these
rhetorical and performative facilities explain data’s mutative nature, for it seems data can
be anything, can mean anything, can be made to mean anything, or that anything can be
data once it is entered into the system as data. Data has largely become a devalued term,
perhaps best equivalent to “stuff” or “things,” sort of as a synonym for input. Data are
culturally specific, idiosyncratic and variable, and this point becomes obfuscated by the
discourse in which data can mean almost everything, and in doing so, mean next to noth
ing. If we subscribe to the argument that anything has the potential to be data, then any
definition of data (or the architecture that makes it available in an analogue or digital en
vironment) needs to maintain an awareness of the interpretative potential of the material
contained within its datasets. If data are of speculative value, then facets discarded or ob
fuscated during the cleaning process could become important or valuable at some point
in the future. But this later contextualization is only possible if the facets are still avail
able, and ideally available with their native context. Raley argues that “Data cannot
‘spoil’ because it is now speculatively, rather than statistically, calculated” (Raley, 2013, p.
124), suggesting both that data are inherently multiply interpretable (which is often
true), but also that “data” itself exists in some original pure form and can therefore never
degrade (which is misleading). Nevertheless, we have to remain cognizant then of “what
could be data to someone, for some purpose, at some point in time” (Borgman, 2017, p.
19).
Data can also become hidden, or be rendered latent within an archive, as a result of the
information architecture employed to organize it within a digital environment. In their
study of historical data and its sources, Horsley and Priddy (2018) draw attention to the
tension that exists between what they describe as the “quick win” of keyword searches
vs. the context and complexities of the material being sought out:
Page 10 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
(p. 557)
We know, or have known from at least as early as 1951 in Briet’s Qu’est-ce que la docu
mentation? that, “Data are not pure or natural objects with an essence of their own …
[data] exist in a context, taking on meaning from that context and from the perspective of
the beholder” (Borgman, 2017, p. 18). Nevertheless, it is difficult to ascertain a concrete
understanding of what data actually are that satisfies all the uses to which the term is
regularly put. Some of these statements or definitions of data outlined in the previous
(p. 558) section grant the term and its mobile referent a sort of authority it cannot possi
Page 11 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
bly obtain. While this is perhaps to be expected among the more philosophical or concep
tual approaches to defining data, inconsistencies and tacit disagreements over what data
are also exist within the computer science community. In a series of interviews conducted
with computer scientists regarding their conceptions of data, Edmond and Nugent-Folan
noted how many “elaborated on how hard it was to define data, nothing on the one hand
that while ‘everything that is not very well defined can cause confusion,’ it is nonetheless
very difficult to define data” (Edmond & Nugent-Folan, 2018, p. 114). However, this vari
ability remains largely undiscussed in the scientific literature: indeed, it seems to be an
acceptable part of the discourse. Within the confines of a single research paper (Tabard
et al., 2011), data can be both simple and complex, pre-epistemic and pre-processed, di
rectly comprehensible to humans and purely machine readable. The word “data” can be
used to refer to something newly drawn out of the environment (“captured,” “collected”)
or as something already available for access, analysis, navigation (“research data” or in
deed just “data”). It can refer to complex hybrid objects (“experimental data,” “digital da
ta”), or to comparatively simple strings of regular meter readings (“sensor data”; Tabard
et al., 2011).
The scale of this polysemy is quite striking and leads to an astonishing reliance on the
single term “data” within certain streams of scientific discourse. A random selection of
five articles from the Journal of Big Data in 2016 yielded over 650 occurrences of the
term “data,” including 325 of the composite phrase “big data” and 124 in the context of a
“dataset” or “database.” Within this corpus we observe such inconsistencies as idiosyn
crasies in spelling key terms within the one paper (dataset/data set); the same term used
to refer to specific data/datasets or to more general data/datasets; the same term used to
refer to different phases of investigation; to different data (data stream/data cluster/origi
nal data/evolved data/evolving data); and to data as a synecdochal term covering both the
whole and the part. The following quotations give a sense of what one finds:
Data pretreatment module is outside from online component and it is done to pre
process stream data from the original data which is produced by the previous com
ponent in the form of data stream.
In addition, we calculate the standard deviation for the entire data in the stream to
check whether all the data are of the same value or not.
Due to visiting data once during the processing data in stream, the performance of
processing data is crucial.
It is difficult, if not impossible, to keep track of what data are which in each of these cas
es, and it also appears that that writerly skill and the ability to construct persuasive argu
ments do not appear to be of value in this epistemic culture, where the term “data” takes
precedence above all else. Indeed, to take things further, a 2015 article by Najafabadi et
al. (2015) used the term data an incredible 507 times over the course of 21 pages, which
Page 12 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
equates to 24.1 mentions per page. Of these, 124 iterations pertained to “big data,”
which left 383 uses of data “proper.”
five randomly selected research papers each year from the Journal of Big Data from 2014
(the year of its inception) to 2017 (Volumes 1–4; with the exception of 2014, because of
the six articles in the issue only two papers were research oriented, the others being a
short report, two case studies, and a survey). As Table 20.1 shows, across the entire cor
pus of articles examined as part of this text mining exercise, the most frequent recurring
word, overwhelmingly, was “data,” occupying a staggering 2% of the total sampled cor
pus. The second most-frequent word in the corpus was “big” and, out of 782 appearances
of the adjective, all but seven related to “big data” (99.1%). So of all the words in these
articles from the Journal of Big Data, 2% are “data” and one quarter of those include
“big.” Our conversations on big data are directed and defined primarily by (apparently)
“small” data.
Page 13 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big Data Environment
Page 14 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big Data Environment
Page 15 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
If we consider that “big data” is increasingly held to different standards than “data,” then
this feature of “big data” research, namely its reliance on the term “data,” begins to ac
quire potentially worrying consequences. As mentioned previously, Rosenberg cites data
as “rhetorical” while also reminding us that “False data is data nonetheless” (Rosenberg,
2013, p. 18) and that “Data has no truth. Even today, when we speak about data, we make
no assumptions about veracity” (Rosenberg, 2013, p. 37). That last statement is impor
tant, because while, when we speak of data we perhaps make no assumptions about
truth, when we speak about big data, we do, as the five characteristics of big data, noted
earlier, are “volume, velocity, variety, veracity and value” (BDIOT, 2018). Somewhere in
the transition from data to big data, veracity becomes important, even if (p. 560) the
datasets that compose the big data are themselves, when taken on a small scale, repre
sentative of data that has “no truth,” that is “pre-factual,” or that can be described via
any of the definitions of data discussed previously. These conflicting conceptual defini
tions pose a major challenge: How can (small) data bring no assumptions of veracity, but
“big data” be veracious? If “big data” is to have different characteristics than “small da
ta,” then the terminological frame of reference for discussions on “big data” should differ
from that of regular data, but as the results just outlined make clear, this is not the case.
Researchers are speaking about entities with overwhelmingly different properties but us
ing the same terminology, terminology whose usage indicates or imports properties or
connotations that are characteristic of data but may be foreign to the characteristics of
big data, especially if that big data are prescribed as being by definition “veracious.”
The phrase “big data” is dictated by understandings of the term “data” that do not accord
with or accommodate—on a semantic level—veracity, one of the principal characteristics
of “big data,” with the term itself appearing highly malleable and manipulable. Rhetoric
such as this distracts from the fact that problems identifiable at the level of mere “data”
or singular “data points” are magnified when we take it to the scale of big data. “Big da
ta” in particular appears to have been infused with a corporate glow of being the cure for
just about any ill. One particularly striking example of this is the 2015 ad campaign by
Winton Global Investments, which presents “analysing big data” as “the secret to living
happily ever after” (Chandler, 2015). Continuing on the theme of fairy tales, Couldry
(2013) refers to big data as a “myth” because it “is oriented to the social world in a par
ticular way. It does not have as its domain a national population, or even the particular
collectivities that might gather online. It builds its population, data-bit by data-bit,
through a series of operations that bypass earlier ideas of social interrelations.”
People define data differently in the small scale, people interpret data differently in the
small scale, and the term “data” is heavily overdetermined in the small scale. The incon
sistencies of definitions and variability of what data can be, how it can be spoken of, and
what can or cannot be done with it, are striking. While they would indicate that
Rosenberg’s concept of data as “rhetorical” to some extent holds true, the sheer scale
and variance has significantly more impact than can be conveyed with the single term
“rhetoric.” For example, it is possible to have Ambiguous data, anonymous data, bad da
ta, bilingual data, chaotic data, contradictory data, computational data, dark data, hidden
data, implicit data, in-domain data, inaccurate data, inconclusive data,
Page 16 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
“information” (rather confusingly, several interviewees referred to data as “information”),
log data, loose data, machine processable data, missing data, noisy data, outdated data,
personal data, primary data, real data, repurposed data, rich data, standardized data, se
mi-structured data, sensitive data, stored data, true data, uncertain data. How exactly all
of these variances of data can be together combined under the umbrella term “big data”
without compromising on their small-scale specificities and complexities remains to be
seen.
To make things even more complex, any definition of data (or the architecture that shapes
it and makes it available in an analogue or digital environment) needs to maintain an
awareness of the speculative potential of the information contained within its datasets.
Remarking on definitions that work by example or by assigning attributes to (p. 561) ex
amples of data—Borgman observes that “any such list is at best a starting point for what
could be data to someone, for some purpose, at some point in time” (Borgman, 2017, p.
19). Not only can data be anything extant, then, it is also notional, and even speculative,
being dependent on its contents suggesting a definition, contents that may change from
discipline to discipline, or over time within a discipline. This again adds credence to
Raley’s notion of data as performative. As a performative entity it has the potential to be
other; to assume, perform, and acquire other values, according to the needs of the user.
An additional problem is that what data are, what can be done with data, and what can be
said about data—and conversely our understandings of what data itself can do to us, to its
interlocutors, environments and to its contexts—all vary drastically from discipline to dis
cipline, and even within disciplines. In addition, this overabundance of rhetorical strate
gies regarding what data are and how we are to speak about it also serves to create a cer
tain distance from data. Because we cannot say with certainty exactly what it is, it ac
quires a mystique that carries both a sense of authority, granting data a certain objectivi
ty that belies its curated, malleable, reactive, and performative nature.
Data Cleaning
Also known as data scrubbing, data cleaning is a process by which elements are removed
from a dataset or data stream, generally because they foul the desired processing, or one
wherein elements or formats are standardized so as to make processing easier. This
process is viewed by some communities as a central part of good research practice; oth
ers, however, view data scrubbing as a form of data manipulation that erodes the credibil
ity of research based upon it. If we are to accept Borgman’s observation regarding the
speculative potential for any item to be identified as, and function, as data “to someone,
for some purpose, at some point in time” (Borgman, 2017, p. 19), then data cleaning in
and of itself then is an interpretative act, because in doing so one establishes and distin
guishes between signal and noise, and removing or muting the noise so as to highlight
the signal. This means that the material scrubbed from the data when it was in its native
environment is no longer accessible, having been deemed external to the remit of data se
lected for inclusion. This expunges items of potential future (speculative) value or merit
as data. However, that which is not presently identified as data of a certain kind or value
Page 17 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
at one time, can or could be identified at any given point as data at another time; non-da
ta removed through cleaning thus arguably always has the potential to be or become da
ta. From this perspective all data streams are, to a certain degree, incomplete, and neces
sarily so: while noise may have the potential to be signal, signal can only become appar
ent after having been stripped of noise, such as through data cleaning, even if that mater
ial has the potential to be valuable.
In addition to a lack of transparency regarding the fact that different appearances of the
term data potentially signifies different data, and to the lack of transparency in relation to
the transformations that are applied to data, the technique of cleaning data so as to pro
duce more refined data are not systematized. Rather, it is presented as an almost (p. 562)
esoteric process, one that brings with it implicit assumptions regarding the methods used
to clean or process; assumptions that are not only discipline specific, but often topic-and
researcher-specific. The fact that salient aspects of an original record might have been
lost along the way as data passes through the hands and servers of different actors is not
only not recognized as potentially problematic, it is obliquely recognized as a part of the
scientific process. In her analysis of a collection of papers belonging to Roger Casement,
Edmond (2016) illuminates on what she refers to as the “potential complexity of historical
sources” and the problems they pose when it comes to the provision of workable “big da
ta” environments for historians or other researchers that work with cultural data:
No less than three previous owners of the papers are referenced (one of which is
only known for his or her status as a member of the aristocracy). Their place in
Casement’s life (and indeed his own place in Irish history) is explained, chronolog
ically and in terms of his thematic interests. The material status of the collection is
given, including the fact that it consists of “mainly” (but not exclusively?) letters.
A surprising anecdote is relayed regarding how the archive came to realize they
held such a significant collection, which illustrates how the largely tacit knowl
edge of the archivist enabled their discovery and initial interpretation. This exam
ple is not an exceptional one. How is this level of uncertainty, irregularity and rich
ness to be captured and integrated, without hiding it “like with like” alongside
archival runs with much less convoluted narratives of discovery? Who is to say
what in this account is “signal” and what “noise”? Who can judge what critical
pieces of information are still missing?
(Edmond, 2016)
The NASA protocol for describing the processing levels of research data carefully (see the
next section: Data Variants and Data Treatment) grades data from level 0 (raw or native
data) through 4 additional levels of processing. However, as Borgman observes, these dis
tinctions only pertain to the onset of the research, the point where data are gathered;
thereafter, when the data are taken on by a new researcher or for a new project, the num
ber resets and the data are once again considered raw, until it is subjected to further pro
cessing (Borgman, 2017, p. 26). Transparency regarding the transformations the data
have undergone, and acts of pre-processing, processing, and cleaning should be flagged
Page 18 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
for the attention of other potential users of this data. It seems obvious that this should be
a requirement of scientific analysis and publication, as should be accountability regarding
both the provenance of a given dataset, and of the researchers involved in the collection
and curation of that data.
Rather than attempt something akin to a “definition of culture” that is machine readable,
or a taxonomy of complex cultural data that are digitally compatible, one that would allow
us to somehow create a universal definition for data, we would perhaps be best (p. 563)
served by creating a typology of data variants. This typology would be based upon usage
or how the material is treated, and ultimately how many levels the data are “away from”
its origin material—material that itself may be complex or simple, human created or ma
chine readable—or indeed by adopting one of the many examples of these protocols al
ready in use. This sees data defined by what researchers do to the data to make it data.
One of the most useful example of this comes in the form of NASA’s Earth Observing Sys
tem Data Information System (EOS DIS) (NASA EOS DIS Data Processing Levels, n.d.)
wherein, as Borgman notes, “Data with common origin are distinguished by how they are
treated” (Borgman, 2017, p. 21). The EOS DIS is perhaps one of the most functional defi
nitions of data available because it not only acknowledges the levels of processing materi
al undergoes to become data, but tiers this scrubbing or cleaning process, therein ac
knowledging that some material undergoes more extensive modification than others, and
maintaining traceability to the source context or environ from which the “native data”
was extracted.
Page 19 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
Da Description
ta
level
Lev Level 1A data that have been processed to sensor units (not
el 1B all instruments have Level 1B source data).
Table 20.2 reproduces the EOS DIS, ranging from “Level 0” data comprising of “Recon
structed, unprocessed instrument and payload data at full resolution, with any and all
communications artifacts [ … ] removed,” to “Level 4” data comprised of “Model output
or results from analyses of lower-level data (e.g., variables derived from multiple
measurements)” (NASA EOS DIS Data Processing Levels, n.d.). The lowest level of data
on the scale is referred to as “unprocessed” yet it has already been processed to a de
gree, as the table clearly states that “any and all communications artifacts [have been] re
moved.” This approach, then, is clearly not without its problems or idiosyncrasies. Fur
thermore, this system of data categorization is incomplete because of the absence of ac
Page 20 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
knowledgement (p. 564) of a level that precedes “level 0,” referred to in passing by
Borgman as “native data,” a phrase that has been discussed earlier in this chapter. Se
cond, while the distinctions between levels are relatively explicit here, as noted previous
ly they only pertain to the onset of the research, the point where data are gathered at the
onset of the study:
Although NASA makes explicit distinctions between raw and processed data for
operational purposes, raw is a relative term, as others have noted [ … ] What is
‘raw’ depends on where the inquiry begins. To scientists combining level 4 data
products from multiple NASA missions, those may be the raw data with which
they start. At the other extreme is tracing the origins of data backward from the
state when an instrument first detected a signal.
Interestingly, not one of the categories employed has an analogous one in the humanities
(aside from the rather loose concept of primary, secondary, and tertiary sources). That is
not to say that a clear, lucid gradation of data that distinguishes how the material has
been treated, or at least flags the fact that the data has been subjected to transforma
tions, would not be beneficial for humanities researchers. A “data provenance record”
that flags the processing, transformations, and contextualization the material has been
exposed to, or expunged from, would be useful here, but maintaining such a record can
be challenging (Edmond, 2016). Again, the fact that the EOS DIS distinctions only apply
up to the point where analysis begins (at which point the data, irrespective of processing
level, becomes “raw data” within the context of that inquiry) is itself problematic.
Even when it comes to an ordered definition as seemingly precise as the EOS DIS, howev
er, we still have to acknowledge the arbitrariness of what we’re dealing with, as Borgman
explains:
No matter how sharp these distinctions between categories may appear, all are ar
bitrary to some degree. Every category, and name of category, is the result of deci
sions about criteria and naming. Even the most concrete metrics, such as temper
ature, height, and geo-spatial location, are human inventions. Similarly, the mea
surement systems of feet and inches, meters and grams, and centigrade and
Fahrenheit reflect centuries of negotiation.
While this argument is ontological and has the potential to take a philosophical tangent
that is anathematic to the pragmatic aims of this chapter, it is nevertheless worth keeping
in mind that categories or taxonomies that appear neutral or objective now, may not have
been so in the past and may not appear so in the future. Furthermore, different approach
es to the measuring of natural phenomena such as those outlined earlier tend to converge
over time, whereas human societies tend to change out from under them. In other words,
established methodologies may not always fit the changing societies that use them. The
Page 21 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
changing vocabularies around issues of gender classification, with the recognition of
transgender and intersex identities, are examples of how evolving social norms drive data
practices to evolve as well, as are the evolving societal understandings of the makeup of a
“family” to incorporate same-sex parents or single-parent families. (p. 565) The evolution
of census forms and social surveys to accommodate these changes, such as the removal
in 1860 of questions about household slaves in the US Census questionnaire, illustrate
how the data domain must at times change to accommodate changing societal values, as
established ones may no longer be flexible enough for the contemporary era (United
States Census Bureau, n.d.). Acknowledging that research is the project of, and reflective
of, specific cultural periods and research practices is important, particularly when it
comes to capturing and reflecting the ambiguities of complex cultural data in a digital
age where, as noted, decisions to digitize or not and how objects are classified can have
an impact on the material available for the development of cultural identities. In other
words, different people interpret and interact with data differently. As Edmond and Nu
gent-Folan note, in the case of “a simple seashell”:
Any given seashell can be said to have certain core properties about which there
is likely to be broad consensus: it is hard, it is hollow, is has a certain color. But
these core properties have the potential to take on—or be attributed with—very
different meanings depending on who or what interacts with them, and what inter
pretation they lay over these core properties. A child, for example, will most likely
appropriate it for use in a manner that is very different from that of a hermit crab.
A fashion designer may take the item and, by inscribing designs on the shell, fun
damentally alter the makeup of the item in and of itself, a factor that would influ
ence how a museum cataloguer, working decades later, would catalogue the item
for display within a GLAM [cultural heritage] institution.
Put another way, each of the agents encountering the shell creates a narrative,
capturing the meaning of the shell for them and for the moment in which they ap
propriate it.
If even such a seemingly simple object can have such a multitude of facets and interpreta
tive avenues available to any agent that interacts with it, then cataloguers, archivists, and
database managers clearly play a pivotal and difficult role in ensuring these interpreta
tive avenues are available, while facilitating an operable digital research environment.
This is largely done through the data these figures provide or generate on the data they
are cataloguing or archiving, referred to as “metadata.”
Metadata
With this in mind, we will now turn to a discussion of the issue of metadata’s contextual
and formative influence on data. Metadata is, quite literally, data about data. Metadata
describes data, what it is, what it is comprised or made up of, where it has come from,
Page 22 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
who has catalogued it, and so on. It plays a central role in navigating a database, digital
catalogue or digital research environment, and is considered necessary for functionality,
for practicality (planning research trips, navigating the archive etc.) and for documenting
the contents of the archive, to the point where its role as a mediator between scholar/
user (p. 566) and archive has become standard; metadata is now not only an obligatory in
termediary between a scholar and an archive, but a structural facet of the information ar
chitecture that mediates the space between user interface and the database.
The PREMIS Data Dictionary for Preservation Metadata is considered “the international
standard for metadata to support the preservation of digital objects and ensure their
long-term usability” (Premis, n.d.). Traditional examples of metadata include the kinds of
information available beside a painting hanging in a gallery: the artist’s name (if it is
known), the artists’ dates of birth and death (if they are known), the title of the painting
(if it is known), the materials used to realize it (such as oil on canvas, or watercolor, etc.),
the dimensions of the painting, the current owners (or, if it belongs to the museum, who
donated it and when, or when the museum acquired it), and perhaps even a short descrip
tion of facets of the piece that may be considered particularly interesting. In a new media
environment where this image may be reproduced digitally, this same information can al
so be provided in both human and machine readable formats, so you may also be able to
quickly search out and compare it with other paintings by the same artist that may be
held in another collection, or you may be able to view the painting from alternative an
gles, or see further images of the painting pre- and post-restoration. So metadata pro
vides basic, often standardized information about the data one is interacting with, access
ing, or using, and therefore it is an integral and unavoidable tool for researchers as they
seek to use and understand their data.
But questions remain as to how much of this context is being redacted, modified, or hid
den by the surrounding information architecture. In the transition from analogue to digi
tal, data loses facets of its native context: the smell, touch, or feel of the material docu
ment. In the case of a paper manuscript, these may include ink or coffee stains, or pen
tests that may indicate the onset of a new writing session. It also acquires new contexts
in the form of how metadata situates it in the digital environment, such as a keyword as
signment that has the potential to connect seemingly unrelated documents. “Raw” or “na
tive” data can be shaped by the contexts imported onto it in the form of metadata in and
of itself. In addition to the impact of these new contexts, the “native” or “source” contexts
that accompanied the data within its “original,” “pre-data,” or “native” environment, may
not always be transferred to and catered for in the database.
Classification systems and documentation standards are based upon high level, non-gran
ular categories such as author/creator, title, location, or date. Such categories are an ad
vantage because they allow for the classification of diverse and abundant quantity of da
ta, but a disadvantage because they flatten out the data and make the granular more diffi
cult to identify and access. In the previous section we introduced Raley’s concept of data
as “performative” (Raley, 2013, p. 128). Others refer to how data can become “a sort of
actor” “reshaping” (Ribes & Jackson, 2013, p. 148) the social world, or how data can car
Page 23 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
ry the imprint of “the original interpretative framework through which they were con
structed, collected or collated” (Drucker, 2014, p. 128). Now if data are performative or
rhetorical, and possess the capacity to shape and be shaped by its contexts, both native
and acquired, the same can be said for the structures that facilitate data access, such as
metadata. Metadata standards such as Dublin Core, MARC 21 or EAD (see, for example,
(p. 567) http://www.loc.gov/ead/) can influence how we approach and conceptualize data,
to the extent that metadata dictates how we read and interact with data; indeed, many
would say that that is their very purpose. As the name implies metadata standards orga
nize diverse objects and information in order to increase their findability and reuse value.
But like bias, this influence can be good or bad. At its most basic level metadata is data
about data—it points the researcher in the direction of data, and gives them more data on
the data they are looking for. In other words, metadata delimits or demarcates data—rep
resenting rich context as or through lean data—and can therefore be similarly argued to
have a performative or rhetorical nature in that it persuades you to consider the material
it relates or refers to as data proper. There is a balance to be struck then between meta
data and data structuring as delimiters of data, but also as a necessary part of navigating
data-rich environments where categories, structuring, and metadata represent attempts
to provide simpler, shorter, and processable indicators of the underlying data, which oth
erwise would be impossible to manage. It is worth considering then what makes up your
data, and what terms we have to refer to the data we have on our data, that is, our meta
data. Both of these aspects can have a significant impact on what you can know about da
ta and how you can access and use it. Furthermore, as Horsley and Priddy note, in the
case of complex cultural data, metadata plays such a central role that these “description
of items [metadata]” was often “acknowledged [by archivists working in cultural heritage
institutions] to be loaded with artefacts of its journey to the user, which become inscribed
in this metadata and are inseparable from the data itself” (Horsley & Priddy, 2018).
The performative facet of metadata is magnified when we are working on the scale of big
data, and is particularly problematic when we are dealing with “uncertain,” “ambiguous”
or “complex” data. This performative effect—intended, deliberate, or unforeseen—is a
phenomenon well illustrated by Presner’s analysis of the relationship between research
subject, research data, and system metadata in the Shoah Visual History Archive (Shoah
Foundation, n.d.). Presner argues that these relationships require an holistic approach to
the conglomeration of complex cultural data in order to achieve “ ‘ethical’ modes of
computation” (Presner, 2016, p. 179). It goes without saying that great sensitivity is re
quired of any project dealing with the personal testimonies of victims of the Holocaust
within a digital environment where the need for “responsible and ethical representations
of the Holocaust” is “dependent on algorithmic calculations, information processing, and
discrete representations of data in digitized formats (such as numbers, letters, icons, and
pixels)” (Presner, p. 179). It is far too easy to err either on the side of losing sight of the
many victims who died anonymously (by focusing on the more famous stories like Elie
Wiesel or Anne Frank), or to lose sight of the human suffering at the core of the holocaust
experience by focusing on the scale of the tragedy (as many have said of the Digital Mon
ument to the Jewish Community in the Netherlands; Joods Monument, n.d.). An algorith
Page 24 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
mic approach to the records of the holocaust should, in theory, be able to reconcile these
poles of human frailty in the face of enormous data corpora. However, as Presner ob
serves, the Shoah VHA was reliant on human cataloguers for the creation of metadata
and catalogues or other finding aids, leading to an approach (p. 568) to uncertainty within
the digital archive that saw certain material categorized as “ ‘indeterminate data’ such as
‘non-indexable content’ ” (p. 193). But that which is considered indeterminate or ambigu
ous differs dramatically, ranging from repetition, pauses, emotion, noise, or silence and
even, most troublingly, material the indexer “doesn’t want to draw attention to (such as
racist sentiments against Hispanics, for example, in one testimony)” (p. 192). What re
mains, as Presner notes, is “a kind of ‘normative story’ (purged of certain contingencies
and unwanted elements)” (p. 192).
What about researchers who are interested in what happens to the “non-normative” sec
tions of the dialogues or archival material, the material that is not assigned a keyword or
other metadata indicator? Who, after all, gets to designate the normative and delimit the
non-normative? This is, after all, a central question underlying thesaurus-based indexing
or individual cataloguer indexing (see Horsley & Priddy, 2018, p. 16). Privileging one
facet of the datafied document neglects and undercuts the importance of the other, and
vice versa. Each section assigned a keyword has a relationship with the material on ei
ther side of it within the text, but this un-indexed material is left “silent,” “hidden” (in
certain cases, especially cases such as the one mentioned earlier in which facets of the
testimonies are “purged” (Presner, p. 192) from the keyword thesaurus of the archive), or
alternatively left latent and unstructured in the archive, without a keyword.
It is for this reason that traditionally trained archivists and librarians struggle with meta
data standards that incorporate provenance such as that developed by the International
World Wide Web Standards Community W3C (https://www.w3.org/Consortium/). To even
begin to represent the richness of an archival record, which may have been passed
through numerous hands and families, or contain such a variety of material that its even
tual relevance is hard to judge, transcends the kinds of clear categories and linear rela
tionships such standards propose. We should also remember in this respect that metadata
is not the only technique that hides from us as much as it possibly exposes. Whether or
not something is digitized, for example, and how and where it is made publically avail
able, can have the same effect. Unintentional processes have a different impact, however,
on findability than does the standardization of the descriptors of complex objects by
means of metadata.
Conclusion
This chapter has outlined some of the costs incurred as a result of the imprecision in the
term “data” in an age when our data may be big, but our ability to express its heterogene
ity is limited. Data are teleologically flexible, epistemologically variable, arbitrary, and
categorically indistinct; data sources are also arbitrary and indistinct, particularly in the
humanities. Data also contain errors and unintelligible material. Data can be considered
Page 25 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
to have near limitless interpretability, and if curated correctly, any facet of the native
(p. 569) material input can be identified as data at any point. Furthermore, the integration
Irrespective of how one elects to theorize why “data” is or has become so problematic,
the gradations of data one can encounter in a digital environment can lead to extensive
confusion. We have data at the level of input, we have data that have been cleaned, we
have data that is present but not encoded, we have data that only becomes data when it is
excised from its original context and situated in another context. But for all of these dif
ferent phases or evolutions of data, we have only one term; and thus we have minimal op
portunities (aside from context within an article, discipline specific intuition, explanatory
footnotes, etc.) to deduce what is being referred to when the term “data” is being used,
or what has been done to “this data” to make it different from “that data.”
There needs to be consensus in terms of what we speak about when we speak about data,
one that acknowledges how difficult it is to “define” data when it comes to the diverse
cultural resources that fuel humanities research. Much of this, as this chapter has made
clear, is due to the poverty of our vocabulary for speaking about data—a term whose us
age spans a huge variety of practices—in a way that can accommodate the richness, di
versity, and complexity that is often a feature of cultural data (Edmond, Nugent-Folan, &
Doran, 2019). We need systems that expose their uncertainty regarding what data are, or
the limits of their data, in comprehensible ways for the average user, so that we can see,
for example, where machine translation strips away cultural complexity because it is un
able to transmit the subtle differences in word or phrase the original speaker may have
intended, the web of intertextual references, or indeed the note of sarcasm or irony a hu
man translator would work to convey. Perhaps most importantly, we need the vocabulary
and the knowledge to, as Duportail (2017) puts it, “feel” data, to ascertain the tangible
facets of its materiality, of its provenance, of its makeup that may not be fully accessible
in a digital environment. Human knowledge creation is multi-modal and embodied. As it
is currently conceived, digital information and data struggle to harness this affordance.
To achieve this worthy goal, we will inevitably have to face the fact that data are not, as
the hackneyed phrase has come to suggest, the “new oil” (Humby, 2006; Marr, 2018). The
status of digital information objects as “data” is not a result of fixed and stable processes,
but rather of an individual, corporate, or social recognition of certain information as hav
ing a certain value and place in various stakeholders’ knowledge creation processes. Only
by stripping “big data” of its tacit claims to authority by virtue of qualities it may not even
possess can we actually expose the true value of data, one that can build bridges of
knowledge, rather than silos.
Page 26 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
References
BDIOT 2nd international conference on big data and the internet of things. (2018). [Call
for papers]. Retrieved from http://www.bdiot.org/cfp.html
Borgman, C. (2017). Big data little data no data. Cambridge, MA: MIT Press.
Chandna, S., Tonne, D., Jejkal, T., Stotzka, R., Krause, C., Vanscheidt, P., … & Prabhune, A.
(2015, February). Software workflow for the automatic tagging of medieval manuscript
images (SWATI). In Document recognition and retrieval XXII (Vol. 9402, p. 940206). Inter
national Society for Optics and Photonics.
Couldry, N. (2013, December 13). A necessary disenchantment: The myth of big data.
Retrieved July 16, 2018, from Culture Digitally, http://culturedigitally.org/2013/12/a-
necessary-disenchantment-the-myth-of-big-data/
Chandler, David. (2015, April 26). #BigData—“the secret to living happily ever after”—
Winton Global Investment ad, St. Pancras International, London. [Twitter post]. Retrieved
from https://twitter.com/davidch27992090/status/592415056052236289
Drucker, J. (2014). Graphesis: Visual forms of knowledge. Cambridge, MA: Harvard Uni
versity Press.
Duportail, J. (2017, September 26). I asked Tinder for my data. It sent me 800 pages of
my deepest, darkest secrets. Retrieved July 9, 2018, from The Guardian, https://
www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-
messages-hacked-sold
Edmond, J. (2016). Will historians ever have big data? Theoretical and infrastructural per
spectives. In B. Bozic, G. Mendel-Gleason, C. Debruyne, & D. O’Sullivan (Eds.), Computa
tional history and data-driven humanities (CHDDH 2016). IFIP Advances in Information
and Communication Technology, 482, 91–105. Switzerland: Springer Nature Switzerland
AG.
Edmond J., & Nugent-Folan G. (2017). Data, metadata, narrative. Barriers to the reuse of
cultural sources. In E. Garoufallou, S. Virkus, R. Siatri, & D. Koutsomiha D. (Eds), Metada
ta and semantic research. MTSR 2017. Communications in Computer and Information
Science, 755. Springer, Cham.
Page 27 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
Edmond, J., & Nugent-Folan, G. (2018). Redefining what data is and the terms we use to
speak of it. Retrieved from https://kplex-project.eu/deliverables/
Edmond, J., Nugent-Folan, G., & Doran, M. T. (2019). Reconciling the cultural complexity
of research data: can we make data interdisciplinary without hiding disciplinary knowl
edge? Data Science (in press). Retrieved from http://hdl.handle.net/2262/83156
Horsley, N., & Priddy, M. (2018). Report on historical data as sources. Retrieved from
https://kplex-project.eu/deliverables/
Humby, C. (2006). Talk delivered at ANA Senior marketer’s summit, Kellogg School. Re
trieved from: http://ana.blogs.com/maestros/2006/11/data_is_the_new.html
Jones S. M., Van de Sompel, H., Shankar, H., Klein, M., Tobin, R., & Grover, C.
(p. 571)
(2016). Scholarly context adrift: Three out of four url references lead to changed content.
PLoS One, 11(12), e0167475.
Khalilian, M., Mustapha, N., & Sulaiman, N. (2016). Data stream clustering by divide and
conquer approach based on vector model. Journal of Big Data, 3, 1. doi:10.1186/
s40537-015-0036-x
Klein, M., Van de Sompel, H., Sanderson, R., Shankar, H., Balakireva, L., Zhou, K., & To
bin, R. (2014). Scholarly context not found: One in five articles suffers from reference rot.
PloS One, 9(12), e115253.
Marr, B. (2018). Here’s why data is not the new oil. Forbes, Retrieved March 5, 2018,
from https://www.forbes.com/sites/bernardmarr/2018/03/05/heres-why-data-is-not-
the-new-oil/#1beb06343aa9
Marwick, A. & boyd, d. (2010). I tweet honestly, I tweet passionately: Twitter users, con
text collapse, and the imagined audience. New Media and Society, 13(1), 114–133. doi:
10.1177/1461444810365313
Mussell, J. (2012). The passing of print: Digitising ephemera and the ephemerality of the
digital. Media History, 18(1), 77–92.
Najafabadi et al. (2015). Deep learning applications and challenges in big data analytics.
Journal of Big Data, 2(1), 1.
Page 28 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
NASA EOS DIS Data Processing Levels. (n.d.). Retrieved from: https://science.nasa.gov/
earth-science/earth-science-data/data-processing-levels-for-eosdis-data-products
PREMIS Data Dictionary for Preservation Metadata. (n.d.). Retrieved from: http://
www.loc.gov/standards/premis/
Presner, T. (2016). The ethics of the algorithm: close and distant listening to the Shoah
Foundation visual history archive. In C. Fogu, W. Kansteiner, & T. Presner (Eds.), Probing
the ethics of holocaust culture (pp. 175–202). Boston, MA: Harvard University Press.
Ribes, D., & Jackson, S. J. (2013). Data bite man: The work of sustaining a long-term
study. In L. Gitelman (Ed.), “Raw Data” is an oxymoron (pp. 147–166) Cambridge, MA:
MIT Press.
Rice, R. E., McCreadie, M., & Chang, S-J. (2001). Accessing and browsing information and
communication. Cambridge, MA: MIT Press.
Rosenberg, D. (2013). Data before the fact. In L. Gitelman (Ed.), “Raw Data” is an oxy
moron (pp. 15–40). Cambridge, MA: MIT Press.
Rosenthal, J. (2017, April 1). Introduction: “Narrative against data.” Genre, 50(1), 1–18.
doi:10.1215/00166928–3,761,312
Rowlands, I., Nicholas, D., Williams, P., Huntington, P., Fieldhouse, M., Gunter, B., &
Tenopir, C. (2008). The Google generation: The information behaviour of the researcher of
the future. Aslib Proceedings, 60(4), 290–310. Retrieved from: https://doi.org/
10.1108/00012530810887953
Stanley, M. (2013). Where is that moon, anyway? The problem of interpreting historical
solar eclipse observations. In L. Gitelman (Ed.), “Raw Data” is an oxymoron (pp. 77–88).
Cambridge, MA: The MIT Press.
Tabard, A., Hancapié-Ramos, J. D., Esbensen, M., & Bardram, J. (2011). The
(p. 572)
Tenopir, C., Allard, S., Levine, K., Volentine, R., Christian, L., Boehm, R., Nichols, F.,
Christensen, R., Nicholas, D., Watkinson, A., Hamid, R., Eti, J., & Thornley, C. (2013).
Trust and authority in scholarly communications in the light of the digital transition.
Nashville: University of Tennessee & CIBER Research Ltd.
Page 29 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Digitizing Cultural Complexity: Representing Rich Cultural Data in a Big
Data Environment
United States Census Bureau (n.d.). Retrieved from: https://www.census.gov/history/
www/through_the_decades/index_of_questions/1860_1.html
Georgina Nugent-Folan
Jennifer Edmond
Page 30 of 30
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.20
Online knowledge sharing systems (KSS) allow individuals to share and retrieve informa
tion across geographic and temporal boundaries. Generally, individuals’ use of these in
formation repositories is voluntary, so scholars have examined the motivating factors un
derlying the use of KSS. Integrating research from diverse disciplines, this chapter pro
vides a comprehensive review of extant research in this area. To begin, the chapter de
scribes the review’s framework and defines key concepts. It then broadly categorizes mo
tivations for knowledge sharing as self- or other-oriented and summarizes research on the
primary motivations within each category. Subsequently, the chapter reviews several con
textual factors that modify the relationships between motivations and online knowledge
sharing. To close, the chapter reflects on the review material, generating several areas
for future research.
Keywords: knowledge contributing, knowledge collecting, motivations, online knowledge sharing systems, public
goods theory
Introduction
ONLINE knowledge sharing systems (KSS) greatly reduce the cost and effort of organiz
ing, finding, and sharing knowledge and social connections, particularly when the content
and users are geographically and temporally dispersed. Through these systems, individu
als can make their privately held knowledge publicly available, and large groups can
more easily share knowledge to support collective action (Bimber, Flanagin, & Stohl,
2005). Despite these advantages, there is often little obvious reward given to those who
contribute knowledge; thus, individuals must be motivated by other factors. Extant re
search on motivations for online knowledge sharing is widely dispersed and can be found
in a variety of disciplines. Moreover, this body of research has generated interesting—but
at times contradictory or problematic—findings. Accordingly, this review synthesizes and
organizes relevant theory and research on motivations for online knowledge sharing.
Page 1 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
The first section of this review provides its framework. The following two sections catego
rize motivations for online knowledge sharing by their source or stimulus, moving from
more self-oriented motivations to more other-oriented motivations. The subsequent sec
tion summarizes three factors (self-efficacy, trust, and venue) that are not direct motiva
tors but may provide preconditions or a moderating context. Finally, the review concludes
with suggestions for future research.
Five distinctions bound this review: the first three explain what is included and excluded,
and the final two define fundamental concepts. First, we focus on research and theory on
more general Internet (and intranet) sites whereby individuals can both collect and con
tribute content. As a result, we do not consider reference databases or data repositories
from which users search and retrieve formally-structured information. Second, we do not
consider technical aspects of knowledge sharing, such as system features or affordances
or user search strategies, except as they are significant influences on the motivations for
knowledge sharing. Third, we distinguish among the components of the knowledge-seek
ing and utilization process (Case & Given, 2016; Rice, McCreadie, & Chang, 2001), which
includes (a) seeking (the process of browsing, accessing, or searching), (b) sharing
(including direct, generalized, or indirect reciprocity, as exchanging tends to imply more
direct reciprocity or even a dyadic transaction), (c) collecting (the process of receiving or
actively obtaining knowledge, which may include posting requests or questions), (d) con
tributing (the process of providing knowledge, either through generalized posting or pro
viding responses to specific requests or questions), (e) evaluating (for accuracy, credibili
ty, or utility), and (f) utilizing (or applying) that knowledge. Here, we focus on sharing as
the general process, and collecting and contributing when they are specifically refer
enced. Fourth, although access to information can refer to knowledge, technology, com
munication, and data or facts, we use the general term knowledge to emphasize the po
tential value of shared information.
Fifth, we group individuals’ motivations to contribute to online KSS into two broad cate
gories: self-focused and other-focused motivations. Based on the source or stimulus of the
motivation, this distinction acknowledges the inherent and crucial social dilemma in KSS:
the tension between individual costs and benefits and collective costs and benefits (Heinz
& Rice, 2009). When people are driven to contribute by self-focused motivations, they
conceive of themselves as unique individuals, acting primarily in their self-interest, who
obtain a personal benefit as a result of contributing. In contrast, individuals driven by
other-focused motivations conceive of themselves as members of a social context, whose
actions are likely to affect or influence others in some way. Moreover, their contributions
may be judged or influenced by a group identity or compared to others’ contributions or
group norms. This distinction is somewhat similar to De Dreu and Nauta’s (2009) concep
tualization of self-interest and other-orientation, but our use refers to the individual or so
Page 2 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
cial source or stimulus of the motivation. Self- and other-focused motivations may seem
redundant with the more common distinction between intrinsic and extrinsic motivations
(discussed later in the chapter), but they are conceptually separate. Intrinsic and extrin
sic motivations hinge on the locus of control: intrinsically motivated individuals feel in
control of their actions, whereas extrinsically motivated individuals respond to (p. 575) an
external force. In contrast, self- and other-focused motivations are differentiated by indi
viduals’ perceptions of themselves in relation to others.
Having explained the five distinctions guiding this review, the following section provides
a brief overview of public goods theory, which is foundational to an understanding of on
line knowledge sharing, and briefly introduces several common forms of KSS.
Using KSS, individuals can collaboratively produce a public good or a good that is both
non-rival (i.e., one individual’s use of the system or its knowledge does not affect
another’s use of it) and non-excludable (i.e., all members of the collective audience can
benefit from the resource, regardless of their contributions to it). Because of these defin
ing characteristics, contribution to online repositories is discretionary: individuals are not
required to contribute their knowledge to the pool, and they can benefit from the pool
without contributing to it (Connolly & Thorn, 1990). Consequently, the rational individual
will act as a free rider or a social loafer; that is, he or she will benefit from others’ contri
butions to the pool but withhold his or her private knowledge (Fulk, Flanagin, Kalman,
Monge, & Ryan, 1996). However, if each individual acted in his or her own interest, on
line repositories would be degraded and eventually destroyed (Hardin, 1968). Thus, the
decision to contribute to online repositories represents a social dilemma, or a situation in
which the interest of the individual is in opposition to the interest of the collective
(Dawes, 1980). Nevertheless, some individuals do share their private knowledge; in doing
so, they are engaging in collective action, an action undertaken by two or more people
that results in the production of a public good (Marwell & Oliver, 1993).
Individuals can share knowledge through a diverse array of online KSS, and research in
this area refers to a dizzying number of systems. In the hopes of providing clarity, we
briefly define three frequently referenced KSS—online repositories, communities or net
works of practice, and social network sites—and characterize them by their level of con
nectivity and communality (Fulk, Flanagin, Kalman, Monge, & Ryan, 1996). Connectivity
refers to the degree to which individuals are directly linked to one another in the net
work, whereas communality describes the extent to which individuals jointly hold, main
tain, and benefit from the knowledge provided in the repository.
Page 3 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Communities of practice involve the exchange of knowledge about a shared practice, but
their members typically engage in face-to-face communication and have strong relational
ties with one another (Brown & Duguid, 2000; Wenger, 1998). Both researchers and prac
titioners have noted that communities of practice can arise in virtual communities and
have identified several ways that social media can help facilitate (p. 576) communities of
practice (Barab, 2003; Hoadley, 2012; Johnson, 2001). In the online context, communities
of practice are sometimes also referred to as problem-solving virtual communities (Yu,
Jiang, & Chan, 2007) or electronic networks of practice (Deng & Poole, 2011; Wasko &
Teigland, 2004). Linked by weak ties, these individuals may never meet face-to-face but
are able to exchange knowledge about their shared, specific topic through the network.
Like online repositories, both communities and networks of practice are characterized by
high levels of communality. However, they are also marked by individuals’ mutual engage
ment with one another (Wasko & Teigland, 2004), and therefore exhibit higher levels of
connectivity than online repositories generally do. For instance, wikis not only support
the sharing, revising, and pooling of both explicit and tacit knowledge and the develop
ment of knowledge bases, but they also support conversations about that knowledge, in
cluding revealing revision histories as a kind of threaded conversation (Arazy & Gellatly,
2012).
Web 2.0 and social media are becoming pervasive contexts for diverse kinds of informa
tion sharing for a wide range of purposes (Ellison, Gibbs, & Weber, 2015; Ostauyi, 2013).
Social network sites (SNS) are Web-based services through which individuals create a
public or semi-public profile and maintain connections with other users of the system (El
lison & boyd, 2014). Because of their emphasis on social interaction, SNS can promote
very high levels of connectivity. Additionally, SNS notifications and postings support ambi
ent awareness among users, increasing knowledge sharing (Leonardi & Meyer, 2015).
Some systems (such as Facebook) enable group and network members to easily collect
and contribute knowledge, while others (such as Twitter) allow for rapid contribution to
large numbers of unknown followers (Osatuyi, 2013). However, users of some SNS can
mask their personal information and interactions through privacy settings, resulting in
lower levels of communality than online repositories.
As the preceding paragraphs demonstrate, a wide variety of KSS exist, and these varia
tions are described by a multitude of specific terms. Khansa, Ma, Liginlal, and Kim (2015)
provide an excellent, succinct overview of virtual knowledge collaboration sites, which
consist of organizational knowledge management systems, online professional communi
ties, Wikipedia and other open-source sharing communities, customer-based firm-hosted
online communities, and online question and answer communities. Similarly, Phang,
Kankanhalli, and Huang (2014) present a theoretical model of participation in online poli
cy deliberation forums, which includes knowledge sharing, emotional support, interest- or
hobby-oriented, product consumption, review, and citizen science project sites.
Page 4 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Self-Oriented Motivations
This section explores the more self-oriented motivations for online knowledge sharing, in
cluding enjoyment and entertainment, altruism, expertise, feedback, reputation, (p. 577)
incentives, and expected benefits and costs. To allow for a better understanding of these
motivations, we first provide an overview of three relevant theoretical perspectives—mo
tivational theories, transactive memory theory, and social exchange theory.
Extrinsically motivated individuals, on the other hand, engage in an activity to satisfy ex
ternal pressures or to earn a tangible reward (Ryan & Deci, 2000). For these individuals,
the desired goal or reward is distinct from the activity itself, and their behavior is often
controlled by external contingencies, such as rewards sought or punishments avoided
(Deci & Ryan, 2013). As a result, individuals engaging in extrinsically motivated behavior
feel pressure and tension, and they may also experience feelings of anxiety and lower
self-esteem (Deci & Ryan, 1985). Several self-oriented motivations are extrinsically moti
vated; for instance, individuals who engage in online knowledge sharing to enhance their
reputation or to earn rewards are extrinsically motivated.
Page 5 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Lastly, social exchange theory (Blau, 1964) can provide a better understanding of self-ori
ented motivations. This perspective portrays individuals as rational beings and (p. 578) ar
gues that their behavior is based on cost-benefit analyses. Blau (1964) asserts that indi
viduals are driven to maximize their personal benefits while minimizing their personal
costs. Accordingly, they will only engage in an activity if the benefits of doing so outweigh
any associated costs. Following this logic, individuals’ decision to contribute to online
repositories is based on the expected costs and benefits of contributing.
For some individuals, online knowledge sharing is enjoyable and entertaining and thus
considered an intrinsically motivated behavior. For example, users of social network sites
identified enjoyment (Lin & Lu, 2011), as well as fun and entertainment (Quan-Haase &
Young, 2010), as primary motivations to share knowledge. Participants in online discus
sion forums (Wasko & Faraj, 2000; Yang, Li, Tan, & Teo, 2007) and online travel communi
ties (Wang & Fesenmaier, 2003) also cited feelings of enjoyment as their motivation to
contribute. Similarly, Wikipedia contributors are primarily motivated by the fun (Nov,
2007) and enjoyment (Hoisl, Aigner, & Miksch, 2007; Moore & Serva, 2007; Schroer &
Hertel, 2009) they derive from contributing. Although many studies have found feelings of
enjoyment and entertainment to motivate online knowledge contribution, others have not.
For example, a study of Wikipedia contributors (Yang & Lai, 2010) found that enjoyment
was not a significant predictor of self-reported knowledge sharing frequency. Similarly,
members of an online photo sharing community with a longer tenure were not motivated
by enjoyment to post or tag photos, though newer members were (Nov, Naaman, & Ye,
2010).
Altruism
Because individuals do not usually receive immediate benefits or rewards in exchange for
contributing to an online repository, some have argued that altruism—“absolute lack of
self-concern in the motivation for an act” (Kankanhalli, Tan, & Wei, 2005, p. 122)—plays a
motivational role. Although this definition suggests that altruism could be considered an
other-oriented motivation, most studies consider it to be an individual, internal motiva
tion; thus, we also consider it to be a self-oriented motivation.
Both qualitative and quantitative work have supported the relationship between altruism
and online knowledge sharing (e.g., Cho et al., 2010; Hew & Hara, 2007; Moore & Serva,
2007). Surveys of participants in a question and answer site (Lou et al., 2013) and a virtu
Page 6 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
al community (Chang & Chuang, 2011) indicated that altruism was a significant, positive
predictor of both knowledge contribution quantity and quality. Similarly, individuals who
provided health-related knowledge in a question and answer site (p. 579) (Oh, 2012) and
participants in online technical forums (Wasko & Faraj, 2000) were most motivated by
feelings of altruism. Kankanhalli et al. (2005) noted that altruism was positively associat
ed with individuals’ contribution to electronic organizational repositories, and Jadin,
Gnambs, and Batinic (2013) reported that individuals with a prosocial orientation were
significantly more likely to be authors—as opposed to just readers—of Wikipedia articles.
However, altruism is not always associated with knowledge sharing. For example, Hung,
Durcikova, Lai, and Lin (2011) found that individuals high in altruism did not contribute
significantly more ideas during a computer-mediated group brainstorming task than indi
viduals low in altruism. It is possible that these inconsistent results stem from the various
ways that altruism is conceptually and operationally defined. Whereas many researchers
define altruism as feelings of enjoyment derived from helping others (e.g., Chang &
Chuang, 2011; Cho et al., 2010; Hung et al., 2011; Oreg & Nov, 2008), Hew and Hara
(2007) refer to altruism as feelings of empathy and compassion for others, and Fugelstad
et al. (2012) measured altruism by assessing the frequency at which individuals per
formed helpful behaviors (e.g., giving up a seat on the bus). Theoretically, the existence of
“true” or “selfless” altruism is a matter of some contention. Some scholars argue that al
truism is an evolutionary instinct to reward others for cooperation or adherence to norms
(Fehr & Fischbacher, 2003), but others argue that an altruistic motivation to help others
is actually due to more egotistic reasons (see Andreoni, 1990; Batson, 2014). This sug
gests that relative altruism, in which an act is motivated only by minor self-concern
(Smith, 1981), may also foster knowledge sharing. In sum, whether or not altruism,
specifically, is the correct term (a conceptual issue), and a strong motivating factor (an
empirical issue), is still unclear.
Expertise
Expertise of the collector or the contributor may motivate online knowledge sharing. Al
though Surowiecki (2004) and others argue for the wisdom of the crowd (i.e., aggregated
knowledge contributed by laypeople can generate a more accurate answer than one gen
erated by a single expert), other scholars suggest that aggregated knowledge resources
must include some number of experts or knowledgeable contributors in order to achieve
an accurate and valuable outcome (Sunstein, 2006); this is especially relevant for some
knowledge domains, such as health (Rice, 2004). Not only is expertise needed to con
tribute information, but users also need relevant expertise to determine which knowledge
to collect and to subsequently evaluate it (Rice, McCreadie, & Chang, 2001). Although
self-rated expertise was not a significant predictor of knowledge sharing amount or quali
ty in an online professional association (Wasko & Faraj, 2005), tenure and experience in
the domain were positively related to contribution. Additionally, the expectation that ex
perts will retrieve and use knowledge contributed by team members was positively relat
ed to the likelihood of members contributing knowledge (Huang et al., 2013). However,
experts may contribute less in some contexts because they fear they (p. 580) will lose their
Page 7 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Feedback
Reputation
Page 8 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Rice, 2009; Wasko & Faraj, 2005). The importance of reputation in professional communi
ties is underscored by Oreg and Nov’s (2008) study of contributors to open source
projects, which revealed that reputation was a stronger motivator of knowledge sharing
for open source software developers than for open source content creators (e.g.,
Wikipedia editors). Whereas open source content creation is accessible to all interested
individuals and rarely requires peer review, open source software developers must pos
sess a degree of expertise, and their work is vetted by a review process; as result, devel
opers’ contributions could result in professional reputation-building that benefits their ca
reers (Oreg & Nov, 2008).
Incentives
Individuals are sometimes offered virtual or tangible incentives in exchange for contribut
ing knowledge to online repositories. For example, some repositories (e.g., TripAdvisor,
Yelp, Foursquare, and Wikipedia) recognize contributors with virtual badges, whereas
other repositories may provide contributors with tangible incentives (such as free prod
ucts or monetary compensation). Rewards have been found to be a significant, positive
predictor of knowledge contribution quantity (Lou, Fang, Lim, & Peng, 2013), and person
ally meaningful incentives are especially motivating (Karau & Williams, 1995). For exam
ple, Farzan and Brusilovsky (2011) offered students access to a career planning tool in ex
change for their contributions to a course recommendation system. The incentive was an
effective motivator: students who had access to the career planning tool contributed sig
nificantly more knowledge to the system than those who did not.
Individuals’ motivation to contribute to online goods is dependent on the costs and bene
fits they expect to experience as a result of sharing their knowledge (Fulk et al., 1996;
Heinz & Rice, 2009). Like social exchange theory, information foraging theory (Pirolli &
Page 9 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Card, 1995) suggests that online information seekers make an a priori estimation of the
costs and benefits associated with information from certain sources as part of the online
information search (and subsequent sharing) process (Taraborelli, 2008).
In addition to the motivations already discussed, the online knowledge sharing literature
reveals a number of motivating individual benefits in these systems (Ardichvili, 2008),
such as improved work performance or social activities, emotional benefits, intellectual
benefits, and material gain. Additionally, KSS allow individuals to save time, compare in
formation from different sources and experts, search at their own pace during problem-
solving, engage in asynchronous use, and access information without having to know the
specific individual provider (Yuan, Rickard, Xia, & Scherer, 2011).
However, users also incur individual costs from using a KSS. Learning to use the KSS, as
well as browsing, collecting, evaluating, and managing information requires time, energy,
and expertise. Contributing knowledge requires similar resources, and users must learn
how to codify their knowledge for retrieval and use by others. Additionally, individuals
must consider the potential decrease in competitive advantage when sharing exclusive or
valuable knowledge (Allen, 1990; Fulk et al., 1996), and they must also consider the po
tential damage to themselves or others from sharing low-quality or incorrect knowledge
(such as in scientific KSS; Kim & Adler, 2015).
Although users differ in their perception of these costs and benefits, most users value in
formation accessibility over quality (Simon, 1972) or sufficiency (Chen, Duckworth, &
Chaiken 1999). However, individuals with a high need for information tend to weigh infor
mation quality more heavily than accessibility (Lu & Yuan, 2011). Thus, users’ motivation
to commit their time and effort to sharing accurate information will depend on the pur
pose of the information (i.e., benefits) and the consequence (i.e., costs) of collecting inac
curate information (Metzger, 2007). For example, individuals may be more motivated to
share and collect accurate health or financial information than information of less conse
quential types, such as entertainment-related.
Other-Oriented Motivations
As discussed, self-oriented motivations do not sufficiently explain all online knowledge
sharing. Indeed, some studies (e.g., Chiu, Hsu, & Wang, 2006; Rashid et al., 2006) sug
gest that self-oriented benefits may not be the strongest motivations for online knowledge
sharing. Thus, this section explores these other-oriented motivations, which include reci
procity, social comparison, social loafing, group belonging and sociality, and social/group
identity. Before these motivating factors are addressed, we provide an (p. 583) overview of
the social identity approach, which allows for a better understanding of other-oriented
motivations.
According to social identity theory (SIT; Tajfel & Turner, 1986; Turner, 1975, 1991), indi
viduals possess both personal (i.e., those based on individual characteristics) and social
(i.e., those based on group membership) identities; together, these identities constitute
Page 10 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
individuals’ self-concept. Individuals are motivated to attain and maintain a positive self-
concept, and they frequently engage in social comparisons to assess their standing rela
tive to others; depending on the context, these comparisons are based on either their per
sonal or social identities. When social identity is salient, self-categorization theory (SCT;
Turner, 1991; Turner, Hogg, Oakes, Reicher, & Wetherell, 1987) argues that individuals
see themselves as representatives of their social group rather than unique individuals;
consequently, their behavior is guided by the values and norms of their group. Moreover,
individuals—driven by their desire for a positive self-concept—engage in behavior that
will increase their social group’s status. The social identity approach provides a theoreti
cal explanation for many other-oriented motivations, such as social comparison and group
identification. Although SIT and SCT are relevant to many other-oriented motivations, so
cial exchange theory (summarized in the previous section, Self-Oriented Motivations) can
also explain several other-oriented motivations, such as reciprocity.
Reciprocity
Changes in the online environment have expanded this one-to-one relationship to a one-
to-many relationship. Thus, reciprocity can also be indirect or generalized; that is, a
(p. 584) contribution to a community can be reciprocated in the future by other communi
ty members or through access to a community resource (e.g., Ekeh, 1974; Kollock, 1999;
Putnam, 2000; van Doorn & Taborsky, 2012; Wasko, Teigland, & Faraj, 2009). In fact, the
ories of social capital indicate that people volunteer or become civically active because
they anticipate a “long term and conjectural” (Putnam, 2000, p. 135) return—not because
they expect direct, immediate reciprocity. Scholars have used indirect or generalized reci
procity to help explain motivations for online knowledge sharing with varying success. In
Page 11 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
their larger knowledge sharing model, Cho et al. (2010) reported that a sense of belong
ing positively influenced generalized reciprocity, which positively influenced intention to
share knowledge in Wikipedia. Similarly, teachers participating in an online community of
practice were frequently motivated by the expectation of generalized reciprocity (Hew &
Hara, 2007). Thus, in many online communities, a sense of generalized reciprocity is like
ly more motivating than expected direct reciprocity.
Social Comparison
According to social comparison theory, individuals evaluate their opinions and abilities by
comparing themselves to groups of similar or valued others, especially when objective,
non-social criteria are few or non-existent (Festinger, 1954). If these comparisons reveal a
discrepancy between an individual’s opinions or abilities and those of their group, the in
dividual will attempt to reduce the discrepancy by improving his or her deficient opinion
or ability. To do so, the individual may try to influence other group members, or—in the
case of extreme discrepancies—they may try to redefine, disidentify with, or leave the
group. Because most online sharing sites do not enforce or require membership, the easi
est response to highly unfavorable social comparisons concerning contributions is to con
tinue social loafing or to leave the group (Rice, 1987).
Prior research (Samak & Sheremeta, 2013) has shown that social comparison influences
online knowledge contribution. For example, Farzan et al. (2008) implemented a ranking
system in an enterprise social networking site that highlighted the most productive con
tributors, making their reputation visible to other users of the site; following the imple
mentation of this system, users contributed significantly more content to the site. Similar
ly, Hung et al. (2011) motivated participants in a computer-mediated group brainstorming
task to contribute by providing them with information about their unique contributions
and their ranking relative to other members of the group. After receiving this informa
tion, participants contributed significantly more ideas (quantity), and their ideas were sig
nificantly more useful and more creative (quality). Feedback that includes specific social
comparison information (i.e., positive or negative comparisons of an individual’s contribu
tions to those of other users) is also associated with future knowledge sharing (Cheshire
& Antin, 2008; Harper, Li, Chen, & Konstan, 2007).
In a field experiment, Harper et al. (2007) provided some users of a user-generated movie
rating and recommendation site with information about their contribution amount com
pared to other users of comparable tenure in the community. Users who (p. 585) received
this information rated significantly more movies in the following week than users who
were not given this information; they were also more likely to express a desire to increase
their standing, relative to other users, and they exceeded their lifetime average weekly
contribution amount. Interestingly, there was a decline in the number of reviews provided
by “above average” contributors in the week following receipt of the information, indicat
ing users’ tendency to alter behavior to correspond to the social comparison norm.
Page 12 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
One context for social comparison is social facilitation, which refers to the increase in ef
fort that individuals exhibit when they are working coactively and know they can be com
pared to others (Huang & Fu, 2013). In social facilitation research, individuals work col
lectively with others, but their individual efforts are identifiable and, therefore, potential
ly evaluable. As a result, individuals experience increased motivation because they be
lieve they are in competition with others (Cottrell, 1972) or because the possibility of
evaluation leads to increased self-awareness (Carver & Scheier, 1981) and concerns about
self-presentation (Bond, 1982). Extended to online repositories, this approach suggests
that new contributors who experience an ambiguous situation may be influenced to con
tribute more knowledge when they are provided with statistics about users’ past contri
bution amounts (i.e., social comparison), especially if these statistics are based on high
contributors; however, prior contributors would need different motivations.
Social Loafing
mance (Harkins, 1987). Individuals’ tendency to engage in social loafing has been attrib
uted to the reduced ability to monitor the efforts of any one individual (Karau & Williams,
1995). Harkins (1987) found that individuals participating in collective tasks were more
productive and more accurate when their efforts would be evaluated than when they
would be pooled. Thus, reduced visibility may be the primary cause of social loafing.
Williams, Harkins, and Latané (1981) concluded that identifiability mediates the relation
ship between collective tasks and social loafing. Based on this line of research, the collec
tive effort model (Karau & Williams, 1995) posits that social loafing will be reduced when
individuals believe others can evaluate their efforts, which requires visibility and identifi
ability, and when they feel an affinity for or identify with the group with which they are
Page 13 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
working. Thus, expectations of being able to engage in social loafing can serve as a moti
vation to not share knowledge.
The possibility of social loafing is heightened in the online context, due to factors such as
anonymity (i.e., low identifiability or visibility), ephemeral group membership, few expec
tations of future interaction, ease of access, decreased costs of storage and transmission,
and the negligible or absent costs of non-participation, or “lurking” (Rice, 1987; Shirky,
2008). Several studies of online knowledge sharing support this line of reasoning. For in
stance, Samak and Sheremeta (2013) conducted a laboratory experiment in which indi
viduals participated in a computer-mediated public goods game; participants’ contribu
tions were either private (not visible) or public (visible). When all participants’ contribu
tions were visible, participants contributed significantly more than when participants’
contributions were not. Erickson and Kellogg (2000) argued that, in face-to-face interac
tions, individuals’ behavior is based on social cues that are often absent in mediated con
texts. To reduce this problem, they designed a socially translucent knowledge-sharing
system that allowed for visibility, awareness, and accountability. As a result, users were
more aware of other individuals’ presence and felt more accountable for their actions.
Zhang, de Pablos, and Zhou (2013) examined the effect of visibility on sharing behavior in
an organizational knowledge management system, taking into account organizational re
ward and exchange ideology, or the belief that an individual’s work effort is dependent on
the organization’s treatment of the individual. Organizational reward was not significant
ly related to knowledge sharing behavior when visibility was low; however, when visibility
was high, the relationship between organizational reward and knowledge sharing behav
ior was stronger for individuals with high exchange ideology.
People may be more likely to share and seek knowledge online when they perceive simi
larity between themselves and other community members, perceive a sense of belonging
with other online community members, or identify with the community or group, even
when they do not know the others’ true identity (Chiu et al., 2006; Cho et al., 2010;
(p. 587) Flanagin, Hocevar, & Samahito, 2013; Lampe et al., 2010; Ling et al., 2005;
Users of a movie recommendation site were significantly more likely to rate a movie when
they believed their rating would benefit movie viewers who were similar to them (Rashid
et al., 2006). People are likely to seek out, evaluate, and select knowledge from online
health information sharing communities using heuristic cues that are based in perceived
similarity with other users, even if they do not know them personally (Sillence, Briggs,
Harris, & Fishwick, 2007). A desire to maintain interpersonal connectivity has also been
positively linked to perceived contribution to an online community (Lampe et al., 2010).
Similarly, affiliative tendency, or positive expectations in social relationships, positively
corresponds with knowledge sharing amount even when the knowledge was shared with
others unknown to the contributor (Lee & Jang, 2010). This supports research that has in
dicated a potential “social” nature of online knowledge sharers, even when the sites or
Page 14 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
systems used are mostly or wholly anonymous (Burke et al., 2009; Correa, Hinsley, & Gil
de Zúñiga, 2010; Hocevar, Flanagin, & Metzger, 2014; Hughes, Rowe, Batey, & Lee, 2012;
Mikal, Rice, Kent, & Uchino, 2015).
Group Identity
Research has shown a direct relationship between shared group identity and online con
tent contribution. Individuals’ identification with a particular virtual community can be a
significant, positive predictor of both the quantity and quality of knowledge contribution
(Chang & Chuang, 2011). Nov, Anderson, and Arazy (2010) showed that individuals who
were affiliated with a project team contributed more to SETI@home, a volunteer science
computing project, than those who were not.
Group identity may also have indirect effects with online knowledge sharing. In Nov et
al.’s (2010) study, team membership moderated the negative relationship between project
tenure and contribution; in other words, the general decline in contribution over time was
not as steep for individuals affiliated with a team. However, in order to be effective, this
group identity must be salient or meaningful to the individuals. Flanagin et al. (2013) un
covered an indirect relationship between group identity, motivation, and contribution to
an online course rating site. When individuals believed other users of the site were simi
lar to them (i.e., high group identification), they experienced higher motivation to con
tribute and submitted more knowledge to the site than those who believed (p. 588) the
other users of the site were dissimilar to them (i.e., low group identification). Similarly,
Dholakia, Bagozzia, and Pearo (2004) surveyed participants in several types of online
communities (e.g., email lists, bulletin boards, newsgroups, chat rooms, multiplayer
games) and also discovered an indirect relationship between social identity and contribu
tion. Social identity was a significant predictor of individuals’ desire to interact with their
community, which significantly predicted their commitment to participate in a joint ac
tion.
Expected collective benefits and costs are other-oriented motivations. Collective benefits
include establishing ties with others, building a stronger, more sustainable online commu
nity, enhancing the relevant profession or community, broadly distributing relevant
knowledge throughout a profession or community, and reinforcing normative considera
Page 15 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
tions such as shared values, reciprocity, and conformity (Bagozzi & Tsai, 2014; Chen &
Hung, 2010; Heinz & Rice, 2009; Yates, Wagner, & Majchrzak, 2010). Collective costs may
occur through difficulty in filtering, collecting, and interpreting relevant knowledge in
massive online systems. Additionally, the community’s credibility or reputation may be
damaged by the spread of incorrect or harmful knowledge, breach of confidential or pro
prietary knowledge, and fluctuations in membership (Kraut & Resnick, 2011).
Contextual Factors
The preceding sections reviewed self- and other-oriented motivations that drive online
knowledge sharing. This section briefly reviews several contextual factors. These factors
do not motivate contribution, but they serve as preconditions or moderators of relation
ships between motivations and online knowledge sharing.
Self-Efficacy
Self-efficacy refers to a person’s judgment of his or her ability to execute a behavior and
generally correlates with better performance (Bandura, 1997). Some scholars have sug
gested that self-efficacy can directly influence knowledge sharing; for example, self-effica
cy positively relates to the amount of knowledge exchanged via an organizational knowl
edge management system (Cabrera, Collins, & Salgado, 2006). Studies have also suggest
ed that self-efficacy indirectly affects knowledge sharing, either by mediating the rela
tionship between sense of belonging and intent to contribute knowledge (Cho et al.,
2010), or by predicting personal outcome expectations (i.e., positive personal outcomes
associated with knowledge sharing), which then predict knowledge sharing (p. 589) intent
(Hsu, Ju, Yen, & Chang, 2007). Self-efficacy can also reduce the perceived difficulty of an
online knowledge seeking activity (David, Song, Hayes, & Fredin, 2007). Although self-ef
ficacy can enhance performance, it may or may not be thoughtfully processed or per
ceived by an individual as a motivation to engage in an activity. Thus, self-efficacy may be
more of a precondition of online knowledge sharing than a motivating factor by itself.
Trust
Trust is positively associated with the quality of knowledge shared in online virtual com
munities (Chang & Chuang; 2011; Chiu et al., 2006), and trust based on identification
with a virtual community of practice positively relates to knowledge sharing (Usoro, Shar
ratt, Tsui, & Shekhar, 2007). Indeed, trust and community- or group-related motivations
likely go hand in hand, as people are more likely to trust those with whom they share
group or community membership (Turner, 1991). However, a certain level of trust may be
a necessary precondition of knowledge sharing rather than a motivation itself, as the po
tential knowledge sharer must have some level of additional motivation (Ardichvili, 2008).
Huang et al.’s (2013) study of 17 work groups across the US and Western Europe ex
plained how trust is required for developing both connective and communal knowledge
and for knowing what knowledge is valuable and usable for collecting and contributing.
Page 16 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Venue
The venue—or the contextual, design, or environmental factors of specific online KSS—
may influence the relationship between motivations and sharing. Research on organiza
tional technology-mediated KSS indicates a host of such factors. These include organiza
tional support or incentives, an organizational culture that is supportive of knowledge
sharing, job autonomy, level of activity load, team characteristics, and KSS affordances
(Cabrera et al., 2006; Ellison, Gibbs, & Weber, 2015; Heinz & Rice, 2009; Rice et al.,
2017; Wang & Noe, 2010; Yu, Lu, & Liu, 2010). In contexts such as organizational in
tranets, where knowledge sharing carries potential, professional risk, or the sharers may
know each other personally, factors such as power differences between seeker and shar
er, desire for impression management, evaluation apprehension, and organizational cul
ture may influence sharing (Cabrera et al., 2006; Kim & Lee, 2006; see reviews in Hall,
2001; Heinz & Rice, 2009; Wang & Noe, 2010). Unfortunately, few studies compare moti
vations for knowledge sharing across venues or sites/systems.
One problem with the knowledge sharing literature, particularly in the online context, is
that many scholars tend to implicitly presume that all users of all kinds of online knowl
edge sharing venues have similar motivations for various sharing behaviors. An exception
is Moore and Serva’s (2007) review of the literature on motivations for (p. 590) contribu
tion to virtual communities, which classified 14 motivations identified by prior studies by
their relevance in different types of virtual communities at that time. Prior studies had
identified motivations to contribute to Internet forums and wikis to include altruism, be
longing, recognition, and reputation, while motivations for blog contribution included
recognition and reputation, but not altruism or belonging. In Fuglestad et al.’s (2012)
study of MovieLens.com users, different reasons for joining the online community were
similarly associated with different patterns of knowledge sharing.
Though the fundamental challenge to online knowledge contribution is the social dilem
ma of individual self-interest versus collective action and public goods, more conceptual
Page 17 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
work needs to distinguish which motivations are clearly self-oriented versus other-orient
ed, and which aspects of those motivations involve one or the other, or both. For example,
reputation typically refers to an individual motivation, but reputation is created through
and embedded in social norms, comparisons, and consequences. Further, both intrinsic
and extrinsic motivations can be more or less self- versus other-oriented.
Unfortunately, the literature examining online knowledge sharing only rarely distinguish
es between knowledge collecting and contributing (typically referring to “sharing” or “ex
change”). For example, Chai, Das, and Rao’s (2011) integrated model of motivations for
knowledge-sharing behaviors does not distinguish between collecting and contributing.
Nor does much prior research analyze relations between motivations and the quality
(accuracy, helpfulness, usefulness, depth, etc.) and quantity (number or length of (p. 591)
contributions) of the content (for two exceptions, see Chang & Chuang, 2011; Phang,
Kankanhali, & Huang, 2014). Understanding what motivates users to share high quality
knowledge is critical to the larger understanding of factors that influence the overall
quality of Internet information (especially, for example, health information). One of the at
tributes of information that can influence its value is its accuracy (Laxminarayan &
Macauley, 2012). In traditional media effects and persuasion literature, message charac
teristics such as information accuracy can influence perceptions and behavior (e.g., Mil
lar & Millar, 2000; Petty & Cacioppo, 1986). In the online context, people who are knowl
edgeable about and involved in a topic may identify inaccuracies about that topic and
thus be motivated to contribute content of their own (e.g., comments or edits) to correct
it. This is especially valued in open source software communities and the Wikipedia com
munity (Kittur & Kraut, 2008; Nov, 2007; Schroer & Hertel, 2009). Few studies have ex
amined motivations for online sharing of high-quality knowledge, though Chang and
Chuang (2011) and Chiu et al. (2006) reported that trust, community-related outcome ex
pectations, shared vision, social interaction, and reputation significantly predict shared
knowledge quality. Some research in virtual communities suggests that group identifica
tion positively relates to the quantity but not quality of shared knowledge (Chiu et al.,
2006). Interestingly, out of many factors that predicted knowledge sharing quantity
(social interaction ties, norms of reciprocity, identification, shared language, and shared
vision), only trust, community-related outcome expectations, and shared vision (i.e.,
whether members share the same goals and values about knowledge sharing) significant
ly also predicted knowledge sharing quality. While group identification was not a signifi
cant predictor of knowledge quality, other group- or community-based variables (i.e.,
shared values/vision, community outcome expectations) were.
Page 18 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Few studies consider both individual and collective levels of both costs and benefits as
motivations for of online sharing, as reviewed by Heinz and Rice (2009); an exception is
Brake’s consideration of benefits of online community knowledge sharing at both levels
(2014). Finally, while much research considers a wide variety of aspects of KSS venues,
few relate those to motivations for sharing. Extending Morre and Serva’s (2007) ap
proach, it would be useful to conceptually or operationally define multiple motivations
and venues, and to provide a theoretical rationale for the relationships found between
each motivation and venue.
Conclusion
Digital KSS (such as online repositories, networks of practice, and social network sites)
have fostered the development of diverse online public goods, such as connectivity among
known and unknown users worldwide as well as communality of shared content. This
sharing has raised the question of why individuals would voluntarily share knowledge,
when rational actor theory and self-interest would argue against engaging in (p. 592) di
rectly unreciprocated activity. So identifying and explaining the motivations for such on
line knowledge sharing has generated considerable research, although often contradicto
ry and confounded. By identifying two categories of motivations, based on self-oriented
and other-oriented factors, along with contextual factors such as self-efficacy, trust, and
the social and technological venue, this chapter has aimed to clarify distinctions and sum
marize considerable research on this fundamental question. Figure 21.1 portrays the or
ganizing framework of motivations for online knowledge sharing.
Page 19 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Yet a variety of research questions remain. As digital technology continues to evolve and
diffuse, answering these questions will help system designers, practitioners, researchers,
and users better understand how to motivate the important process of sharing knowledge
online. However, ongoing developments in digital technology will likely reveal other moti
vations, possibilities, obstacles, and contextual factors.
References
Allen, B. (1990). Information as an economic commodity. American Economic Review, 80,
268–273.
Andreoni, J. (1990). Impure altruism and donations to public goods: A theory of warm-
glow giving. Economic Journal, 401, 464–477. https://doi.org/10.2307/2234133
Arazy, O., & Gellatly, I. R. (2012). Corporate wikis: The effects of owners’ motivation and
behavior on group members’ engagement. Journal of Management Information Systems,
29(3), 87–116. doi:10.2753/MIS0742-1222290303
Bagozzi, R. P. & Tsai, H-T. (2014). Contribution behavior in virtual communities: Cogni
tive, emotional, and social influences. MIS Quarterly, 38(1), 143–164. https://doi.org/
10.25300/misq/2014/38.1.07
Bandura, A. (1997). Self-efficacy: The exercise of control. New York, NY: W. H. Freeman
and Company.
Barab, S. A. (2003). An introduction to the special issue: Designing for virtual communi
ties in the service of learning. Information Society, 19, 197–201. https://doi.org/
10.1080/01972240309467
Bimber, B., Flanagin, A. J., & Stohl, C. (2005). Reconceptualizing collective action in the
contemporary media environment. Communication Theory, 15, 365–388. doi:10.1111/j.
1468–2885.2005.tb00340.x
Blau, P. M. (1964). Exchange and power in social life. New York, NY: Wiley.
Bock, G. W., Zmud, R. W., Kim, Y. G., & Lee, J. N. (2005). Behavioral intention formation in
knowledge sharing: Examining the roles of extrinsic motivators, social-psychological
forces, and organizational climate. MIS Quarterly, 29, 87–111. https://doi.org/
10.2307/25148669
Page 20 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Brake, D. R. (2014). Are we all online content creators now? Web 2.0 and digital divides.
Journal of Computer-Mediated Communication, 19(3), 591–609. doi:10.1111/jcc4.12042
Brown, J. S., & Duguid, P. (2000). The social life of information. Boston, MA: Harvard Busi
ness Press.
Burke, M., Marlow, C., & Lento, T. (2009). Feed me: Motivating newcomer contribution in
social network sites. In Proceedings of CHI 2009 (pp. 945–954). New York, NY: ACM
Press. https://doi.org/10.1145/1518701.1518847
Cabrera, Á., Collins, W. C., & Salgado, J. F. (2006). Determinants of individual engage
ment in knowledge sharing. The International Journal of Human Resource Management,
17(2), 245–264. https://doi.org/10.1080/09585190500404614
Cameron, J., & Pierce, W. D. (1994). Reinforcement, reward, and intrinsic motivation: A
meta-analysis. Review of Educational Research, 64(3), 363–423. https://doi.org/
10.2307/1170677
Carver, C., & Scheier, M. (1981). The self-attention-induced feedback loop and social facil
itation. Journal of Experimental Social Psychology, 17, 545–568. https://doi.org/
10.1016/0022–1031(81)90039–1
Case, D. O. & Given, L. M. (2016). Looking for information: A survey of research on infor
mation seeking, needs, and behavior (4th ed.). Bingley, UK: Emerald Group Publishing
Ltd.
Chai, S., Das, S., & Rao, H. R. (2011). Factors affecting bloggers’ knowledge shar
(p. 594)
Chang, H. H., & Chuang, S. S. (2011). Social capital and individual motivations on knowl
edge sharing: Participant involvement as a moderator. Information & Management, 48(1),
9–18. https://doi.org/10.1016/j.im.2010.11.001
Chen, S., Duckworth, K., & Chaiken, S. (1999). Motivated heuristic and systematic pro
cessing. Psychological Inquiry, 10(1), 44–49. https://doi.org/10.1207/
s15327965pli1001_6
Cheng, R., & Vassileva, J. (2005, January). User motivation and persuasion strategy for
peer-to-peer communities. Proceedings of the 38th annual Hawaii international confer
ence on system sciences, user motivation and persuasion strategy for peer-to-peer com
Page 21 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
munities (10 pp.). Hawaii: Institute of Electrical and Electronics Engineers (IEEE).
https://doi.org/10.1109/hicss.2005.653
Cheshire, C., & Antin, J. (2008). The social psychological effects of feedback on the pro
duction of Internet information pools. Journal of Computer-Mediated Communication, 13,
705–727. doi:10.1111/j.1083–6101.2008.00416.x
Cheung, C. M., Lee, M. K., & Lee, Z. W. (2013). Understanding the continuance intention
of knowledge sharing in online communities of practice through the post-knowledge-shar
ing evaluation processes. Journal of the American Society for Information Science and
Technology, 64, 1357–1374. doi:10.1002/asi.22854
Chiu, C. M., Hsu, M. H., & Wang, E. T. G. (2006). Understanding knowledge sharing in vir
tual communities: An integration of social capital and social cognitive theories. Decision
Support Systems, 42(3), 1872–1888. doi:10.1016/j.dss.2006.04.001
Cho, H., Chen, M., & Chung, S. (2010). Testing an integrative theoretical model of knowl
edge-sharing behavior in the context of Wikipedia. Journal of the American Society for In
formation Science and Technology, 61(6), 1198–1212. doi:10.1002/asi.21316
Clary, E. G., Snyder, M., Ridge, R. D., Copeland, J., Stukas, A. A., Haugen, J., & Miene, P.
(1998). Understanding and assessing the motivations of volunteers: A functional ap
proach. Journal of Personality and Social Psychology, 74(6), 1516–1530. https://doi.org/
10.1037//0022–3514.74.6.1516
Connolly, T, & Thorn, B. K. (1990). Discretionary databases: Theory, data, and implica
tions. In J. Fulk, & C.W. Steinfield (Eds.), Organizations and communication technology
(pp. 219–233). Newbury Park, CA: Sage.
Correa, T., Hinsley, A. W., & Gil de Zúñiga, H. (2010). Who interacts on the Web? The in
tersection of users’ personality and social media use. Computers in Human Behavior,
26(2), 247–253. doi:10.1016/j.chb.2009.09.003
Cova, B., Pace, S., & Skålén, P. (2015). Brand volunteering: Value co-creation with unpaid
consumers. Marketing Theory, 15(4), 465–485. doi:10.1177/1470593115568919
David, P., Song, M., Hayes, A., & Fredin, E. S. (2007). A cyclic model of information seek
ing in hyperlinked environments: The role of goals, self-efficacy, and intrinsic motivation.
International Journal of Human-Computer Studies, 65(2), 170–182. doi:10.1016/j.ijhcs.
2006.09.004
https://doi.org/10.1146/annurev.ps.31.020180.001125
Page 22 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Deci, E. L., & Ryan, R. M. (1985). Intrinsic motivation and self-determination in human
behavior. New York: Plenum.
Deci, E. L., & Ryan, R. M. (2013). Motivation, personality, and development within embed
ded social contexts: An overview of self-determination theory. In R. M. Ryan (Ed.), The Ox
ford handbook of human motivation (pp. 85–107). Oxford, UK: Oxford University Press.
Dholakia, U. M., Bagozzi, R. P., & Pearo, L. K. (2004). A social influence model of con
sumer participation in network-and small-group-based virtual communities. International
Journal of Research in Marketing, 21, 241–263. https://doi.org/10.1016/j.ijresmar.
2003.12.004
Ekeh, P. (1974). Social exchange theory: The two traditions. Boston: Harvard University
Press.
Ellison, N. B. & boyd, D. M. (2014). Sociality through social network sites. In W. H. Dutton
(Ed.), The Oxford handbook of internet studies (pp. 153–172). Oxford, UK: Oxford Univer
sity press.
Ellison, N. B., Gibbs, J. L., & Weber, M. S. (2015). The use of enterprise social network
sites for knowledge sharing in distributed organizations: The role of organizational affor
dances. American Behavioral Scientist, 59(1), 103–123. doi:10.1177/000276421450510
Farzan, R., & Brusilovsky, P. (2011). Encouraging user participation in a course recom
mender system: An impact on user behavior. Computers in Human Behavior, 27, 276–284.
doi:10/1016/j.chb.2010.08.005
Farzan, R., DiMicco, J. M., Millen, D. R., Dugan, C., Geyer, W., & Brownholtz, E. A. (2008,
April). Results from deploying a participation incentive mechanism within the enterprise.
In Proceedings of the SIGCHI conference on Human factors in computing systems (pp.
563–572). ACM. https://doi.org/10.1145/1357054.1357145
Fehr, E., & Fischbacher, U. (2003). The nature of human altruism. Nature, 425(6960),
785–791. https://doi.org/10.1038/nature02043
Page 23 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Flanagin, A. J., & Metzger, M. J. (2013). Trusting expert- versus user-generated ratings
online: The role of information volume, valence, and consumer characteristics. Computers
in Human Behavior, 29(4), 1626–1634. doi:10.1016/j.chb.2013.02.001
Flanagin, A. J., Hocevar, K. P., Samahito, S. N. (2013). Connecting with the user-generated
web: How group identification impacts online information sharing and evaluation. Infor
mation, Communication, & Society, 17(6), 683–694. doi:10.1080/1369118x.2013.808361
Fuglestad, P. T., Dwyer, P. C., Moses, J. F., Kim, J. S., Mannino, C. A., Terveen, L., & Snyder,
M. (2012). What makes users rate (share, tag, edit & )? Predicting patterns of participa
tion in online communities. In Proceedings of CSCW ‘12 (pp. 969–978). New York, NY:
ACM Press. https://doi.org/10.1145/2145204.2145349
Fulk, J., Flanagin, A. J., Kalman, M. E., Monge, P. R., & Ryan, T. (1996). Connective
(p. 596)
Fulk, J., Heino, R., Flanagin, A. J., Monge, P. R., & Bar, F. (2004). A test of the individual
action model for organizational information commons. Organization Science, 15(5), 569–
585. https://doi.org/10.1287/orsc.1040.0081
Harkins, S. G. (1987). Social loafing and social facilitation. Journal of Experimental Social
Psychology, 23, 1–18. https://doi.org/10.1016/0022-1031(87)90022-9
Harper, F. M., Li, S. X., Chen, Y., & Konstan, J. A. (2007). Social comparisons to motivate
contributions to an online community. In Y. de Cort, W. Ijsselsteijn, C. Midden, B. Eggen,
& B. J. Fogg (Eds.), Persuasive technology: Second international conference on persuasive
technology, PERSUASIVE 2007, Palo Alto, CA, USA, April 26–27, 2007, Revised Selected
Papers (pp. 148–159). Berlin, Germany: Springer Berlin Heidelberg. https://doi.org/
10.1007/978-3-540-77,006-0_20
Hew, K. F., & Hara, N. (2007). Empirical study of motivators and barriers of teacher on
line knowledge sharing. Educational Technology Research and Development, 55(6), 573–
595. doi:10.1007/s11423-007-9049-2
Page 24 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Hoadley, C. (2012). What is a community of practice and how can we support it? In D.
Jonassen & S. Land (Eds.), Theoretical foundations of learning environments (pp. 286–
300). New York, NY: Routledge.
Hocevar, K. P., Flanagin, A. J., & Metzger, M. J. (2014). Social media self-efficacy and in
formation evaluation online. Computers in Human Behavior, 39, 254–262. doi: 10.1016/
j.chb.2014.07.020
Hoisl, B., Aigner, W., & Miksch, S. (2007). Social rewarding in wiki systems—Motivating
the community. In D. Schuler (Ed.), Online communities and social computing (pp. 362–
371). Berlin, Germany: Springer Berlin Heidelberg.
Hollingshead, A. B., Fulk, J., & Monge, P. (2002). Fostering intranet knowledge sharing:
An integration of transactive memory and public goods approaches. In P. Hinds, & S.
Kiesler (Eds.), Distributed work (pp. 335–355). Cambridge, MA: MIT Press.
Hsu, M. H., Ju, T. L., Yen, C. H., & Chang, C. M. (2007). Knowledge sharing behavior in
virtual communities: The relationship between trust, self-efficacy, and outcome expecta
tions. International Journal of Human-Computer Studies, 65(2), 153–169. doi:10.1016/
j.ijhcs.2006.09.003
Huang, M., Barbour, J., Su, C., & Contractor, N. (2013). Why do group members provide
information to digital knowledge repositories? A multilevel application of transactive
memory theory. Journal of the Association for Information Science and Technology, 64(3),
540–557. doi:10.1002/asi.22805
Huang, S. W., & Fu, W. T. (2013, April). Don’t hide in the crowd!: Increasing social trans
parency between peer workers improves crowdsourcing outcomes. Proceedings of the
SIGCHI conference on human factors in computing systems (pp. 621–630). Paris, France:
Association for Computing Machinery. https://doi.org/10.1145/2470654.2470743
Hughes, D., Coulson, G., & Walkerdine, J. (2005). Free riding on Gnutella revisited: The
bell tolls? Distributed Systems Online, IEEE, 6(6), 1–18. doi:10.1109/MDSO.2005.31
Hughes, D. J., Rowe, M., Batey, M., & Lee, A. (2012). A tale of two sites: Twitter
(p. 597)
vs. Facebook and the personality predictors of social media usage. Computers in Human
Behavior, 28(2), 561–569. doi:10.1016.j.chb.2011.11.001
Hung, S. Y., Durcikova, A., Lai, H. M., & Lin, W. M. (2011). The influence of intrinsic and
extrinsic motivation on individuals’ knowledge sharing behavior. International Journal of
Human-Computer Studies, 69, 415–427. doi:10.1016/j.ijhcs.2011.02.004
Jadin, T., Gnambs, T., & Batinic, B. (2013). Personality traits and knowledge sharing in on
line communities. Computers in Human Behavior, 29, 210–216. doi:10.1016/j.chb.
2012.08.007
Page 25 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Javanmardi, S., Ganjisaffar, Y., Lopes, C., & Baldi, P. (2009). User contribution and trust in
Wikipedia. In Proceedings of the 5th international ICST conference on collaborative com
puting: networking, applications, worksharing (pp. 1–5). https://doi.org/10.4108/
icst.collaboratecom2009.837
Jeon, S. H., Kim, Y. G., & Koh, J. (2011). Individual, social, and organizational contexts for
active knowledge sharing in communities of practice. Expert Systems with Applications,
38, 12,423–12,431. doi:10.1016/j.eswa.2011.04.023
Kalman, M. E., Monge, P., Fulk, J., & Heino, R. (2002). Motivations to resolve communica
tion dilemmas in database-mediated collaboration. Communication Research, 29, 125–
154. doi:10.1177/0093650202029002002
Kang, M., Kim, B., Gloor, P., & Bock, G-W. (2011). Understanding the effect of social net
works on user behaviors in community-driven knowledge services. Journal of the Ameri
can Society for Information Science and Technology, 62(6), 1066–1074. doi:10.1002/asi.
21533
Kankanhalli, A., Tan, B. C., & Wei, K. K. (2005). Contributing knowledge to electronic
knowledge repositories: an empirical investigation. MIS Quarterly, 29, 113–143. https://
doi.org/10.2307/25148670
Karau, S. J., & Williams, K. D. (1995). Social loafing: Research findings, implications, and
future directions. Current Directions in Psychological Science, 4, 134–139. https://
doi.org/10.1111/1467–8721.ep10772570
Khansa, L., Ma, X., Liginlal, D., & Kim, S. S. (2015). Understanding members’ active par
ticipation in online question-and-answer communities: A theory and empirical analysis.
Journal of Management Information Systems, 32(2), 162–203. doi:
10/1080/07421222.2015.1063293
Kim, H. W., Zheng, J. R., & Gupta, S. (2011). Examining knowledge contribution from the
perspective of an online identity in blogging communities. Computers in Human Behavior,
27, 1760–1770. doi:10.1016/j.chb.2011.03.003
Kim, S., & Lee, H. (2006). The impact of organizational context and information technolo
gy on employee knowledge-sharing capabilities. Public Administration Review, 66(3),
370–385. doi:10.1111/j.1540–6210.2006.00595.x
Kim, Y. & Adler, M. (2015). Social scientists’ data sharing behaviors: Investigating the
roles of individual motivations, institutional pressures, and data repositories. Internation
al Journal of Information Management, 35(4), 408–418. doi:10.1016/j.ijinfomgt.
2015.04.007
Page 26 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Kittur, A., & Kraut, R. E. (2008, November). Harnessing the wisdom of crowds in
wikipedia: quality through coordination. In Proceedings of the 2008 ACM conference on
Computer supported cooperative work (pp. 37–46). New York, NY: ACM.
Kittur, A., Chi, E. H., Pendleton, B. A., Suh, B., & Mytkowicz, T. (2007, April). Power of the
few vs. wisdom of the crowd: Wikipedia and the rise of the bourgeoisie. Proceedings of
the ACM conference on human factors in computing systems (pp. 1–9). San Jose, CA: As
sociation for Computing Machinery. https://doi.org/10.1145/1460563.1460572
Kollock, P. (1999). The economies of online cooperation: Gifts and public goods in
(p. 598)
Lakhani, K. R., & Von Hippel, E. (2003). How open source software works: “Free” user-to-
user assistance. Research Policy, 32, 923–943. https://doi.org/10.2139/ssrn.290305
Lampe, C., Wash, R., Velasquez, A., & Ozkaya, E. (2010). Motivations to participate in on
line communities. In Proceedings of the 28th international conference on Human factors
in computing systems—CHI 10 (pp. 1927–1936). New York, NY: ACM Press. doi:
10.1145/1753326.1753616
Lee, E. J., & Jang, J. (2010). Profiling good Samaritans in online knowledge forums: Ef
fects of affiliative tendency, self-esteem, and public individuation on knowledge sharing.
Computers in Human Behavior, 26(6), 1336–1344. doi:10.1016/j.chb.2010.04.007
Leonardi, P. M. & Meyer, S. R. (2015). Social media as social lubricant: How ambient
awareness eases knowledge transfer. American Behavioral Scientist, 59(1), 10–34.
https://doi.org/10.1177/0002764214540509
Lepper, M. R., Greene, D., & Nisbett, R. E. (1973). Undermining children’s intrinsic inter
est with extrinsic reward: A test of the “overjustification” hypothesis. Journal of Personali
ty and Social Psychology, 28, 129–137. https://doi.org/10.1037/h0035519
Li, X. (2011). Factors influencing the willingness to contribute information to online com
munities. New Media & Society, 13(2), 279–296. doi:10.1177/146444810372164
Lin, K., & Lu, H. (2011). Why people use social networking sites: An empirical study inte
grating network externalities and motivation theory. Computers in Human Behavior, 27,
1152–1161. doi:10.1016/j.chb.2010.12.009
Page 27 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Lin, M. J. J., Hung, S. W., & Chen, C. J. (2009). Fostering the determinants of knowledge
sharing in professional virtual communities. Computers in Human Behavior, 25, 929–939.
https://doi.org/10.1016/j.chb.2009.03.008
Ling, K., Beenen, G., Wang, X., Chang, K., Frankowski, D., Resnick, P., & Kraut, R. E.
(2005). Using social psychology to motivate contributions to online communities. Journal
of Computer Mediated Communication, 10(4). https://doi.org/10.1111/j.1083–
6101.2005.tb00273.x
Lou, J., Fang, Y., Lim, K. H., & Peng, J. Z. (2013). Contributing high quantity and quality
knowledge to online Q&A communities. Journal of the American Society for Information
Science and Technology, 64, 356–371. doi:10.1002/asi.22750
Lu, L., & Yuan, Y. C. (2011). Shall I Google it or ask the competent villain down the hall?
The moderating role of information need in information source selection. Journal of the
American Society for Information Science and Technology, 62(1), 133–145. doi:10.1002/
asi.21449
Marwell, G., & Oliver, P. (1993). The critical mass in collective action: A micro-social theo
ry. New York, NY: Cambridge University Press.
Metzger, M. J. (2007). Making sense of credibility on the Web: Models for evaluating on
line information and recommendations for future research. Journal of the American Soci
ety for Information Science and Technology, 58(13), 2078–2091. doi:10.1002/asi.20672
Mikal, J. P., Rice, R. E., Kent, R., & Uchino, B. (2015). 100 million strong: A case study of
group identification and deindividuation on imgur.com. New Media & Society,18(11),
2485–2506. doi:10.1177/1461444815588766
(p. 599) Millar, M. G., & Millar, K. U. (2000). Promoting safe driving behaviors: The influ
ence of message framing and issue involvement. Journal of Applied Social Psychology,
30(4), 853–866. https://doi.org/10.1111/j.1559–1816.2000.tb02827.x
Moore, T. D., & Serva, M. A. (2007). Understanding member motivation for contributing
to different types of virtual communities: A proposed framework. In Proceedings of SG
MIS-CPR ‘07 (pp. 153–158). New York, NY: ACM Press. https://doi.org/
10.1145/1235000.1235035
Nov, O. (2007). What motivates Wikipedians? Communications of the ACM, 50, 60–64. doi:
10.1145/1297797.1297798
Nov, O., Anderson, D., & Arazy, O. (2010, April). Volunteer computing: A model of the fac
tors determining contribution to community-based scientific research. Proceedings of the
19th international conference on World Wide Web (pp. 741–750). Raleigh, NC: Associa
tion for Computer Machinery. http://dx.doi.org/10.1145/1772690.1772766
Page 28 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Nov, O., Naaman, M., & Ye, C. (2010). Analysis of participation in an online photo-sharing
community: A multidimensional perspective. Journal of the American Society for Informa
tion Science and Technology, 61, 555–566. doi:10.1002/asi.21278
Oh, S. (2012). The characteristics and motivations of health answerers for sharing infor
mation, knowledge, and experiences in online environments. Journal of the American So
ciety for Information Science and Technology, 63, 543–557. doi:10.1002/asi.21676
Oh, S., & Syn, S. Y. (2015). Motivations for sharing information and social support in so
cial media: A comparative analysis of Facebook, Twitter, Delicious, YouTube, and Flickr.
Journal of the Association for Information Science and Technology, 66(10), 2045–2060.
doi:10.1002/asi.23320
Olson, M. (1965). The logic of collective action: Public goods and the theory of groups.
Cambridge, MA: Harvard University Press.
Oreg, S., & Nov, O. (2008). Exploring motivations for contributing to open source initia
tives: The roles of contribution context and personal values. Computers in Human Behav
ior, 24(5), 2055–2073. doi:10.1016/j.chb.2007.09.007
Osatuyi, B. (2013). Information sharing on social media sites. Computers in Human Be
havior, 29(6), 2622–2631. doi:10.1016/j.chb.2013.07.001
Petty, R. E., & Cacioppo, J. T. (1986). The elaboration likelihood model of persuasion. Ad
vances in Experimental Social Psychology, 19, 123–205. doi:10.1016/
S0065-2601(08)60214–2
Phang, C. W., Kankanhalli, A., & Huang, L. (2014). Drivers of quantity and quality of par
ticipation in online policy deliberation forums. Journal of Management Information Sys
tems, 31(3), 172–212. doi:10.1080/07421222.2014.995549
Pirolli, P., & Card, S. (1995, May). Information foraging in information access environ
ments. In Proceedings of the SIGCHI conference on Human factors in computing systems
(pp. 51–58). New York, NY: ACM Press. https://doi.org/10.1145/223904.223911
Putnam, R. D. (2000). Bowling alone: The collapse and revival of American community.
New York, NY: Simon & Schuster.
Quan-Haase, A., & Young, A. L. (2010). Uses and gratifications of social media: A compar
ison of Facebook and instant messaging. Bulletin of Science, Technology & Society, 30,
350–361. doi:10.1177/027046761038009
Rashid, A. M., Ling, K., Tassone, R. D., Resnick, P., Kraut, R., & Riedl, J. (2006, April). Mo
tivating participation by displaying the value of contribution. Proceedings of the SIGCHI
conference on human factors in computing systems (pp. 955–958). New York, NY: ACM
Press. doi:10.1145/1124772.1124915
Page 29 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
and research. In P. Lee, L. Leung, & C. So (Eds.), Impact and issues in new media: Toward
intelligent societies (pp. 173–204). Cresskill, NJ: Hampton Press.
Rice, R. E., Evans, S. K., Pearce, K. E., Sivunen, A., Vitak, J., & Treem, J. W. (2017). Orga
nizational media affordances: Operationalization and associations with media use. Journal
of Communication, 67(1), 106–130. doi:10.1111/jcom.12273
Rice, R. E., McCreadie, M., & Chang, S. J. L. (2001). Accessing and browsing information
and communication. Cambridge, MA: MIT Press.
Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: Classic definitions
and new directions. Contemporary Educational Psychology, 25, 54–67. doi: 10.1006/ceps.
1999.1020
Samak, A., & Sheremeta, R. (2013, May 6). Visibility of contributors and cost of informa
tion: An experiment on public goods. Retrieved from https://mpra.ub.uni-
muenchen.de/46779/1/MPRA_paper_46,779.pdf
Schroer, J., & Hertel, G. (2009). Voluntary engagement in an open web-based encyclope
dia: Wikipedians and why they do it. Media Psychology, 12(1), 96–120. doi:
10.1080/15213260802669466
Shirky, C. (2008). Here comes everybody: The power of organizing without organizations.
New York, NY: Penguin Books.
Shirky, C. (2010). Cognitive surplus: How technology makes consumers into collaborators.
New York, NY: Penguin Books.
Sillence, E., Briggs, P., Harris, P. R., & Fishwick, L. (2007). How do patients evaluate and
make use of online health information? Social Science & Medicine, 64(9), 1853–1862. doi:
10.1016/j.socscimed.2007.01.012
Sunstein, C. (2006). Infotopia: How many minds produce knowledge. New York, NY: Ox
ford University Press.
Surowiecki, J. (2004). The wisdom of crowds. New York, NY: Anchor Books.
Page 30 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Tajfel, H., & Turner, J. C. (1986). The social identity theory of intergroup behavior. In S.
Worchel & W. G. Austin (Eds.), Psychology of intergroup relations (pp. 2–24). Chicago, IL:
Nelson-Hall.
Taraborelli, D. (2008). How the web is changing the way we trust. In K. Waelbers, A. Brig
gle, & P. Brey (Eds.), Current issues in computing and philosophy (pp. 194–204). Amster
dam: IOS Press.
Thibaut, J. W. & Kelley, H. H. (1965). The social psychology of groups. New York, NY: John
Wiley & Sons, Inc.
Tsai, M. T., Chang, H. C., Cheng, N. C., & Lien, C. C. (2013). Understanding IT profession
als’ knowledge sharing intention through KMS: A social exchange perspective. Quality &
Quantity, 47(5), 2739–2753. doi: 10.1007/s11135-012-9685-4
Turner, J. C. (1975). Social comparison and social identity: Some prospects for intergroup
behavior. European Journal of Social Psychology, 5, 5–34. https://doi.org/10.1002/ejsp.
2420050102
Turner, J. C. (1991). Social influence. Milton Keynes, UK: Open University Press.
Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., & Wetherell, M. S. (1987). Rediscov
ering the social group: A self-categorization theory. Cambridge, MA: Basil Blackwell.
Usoro, A., Sharratt, M. W., Tsui, E., & Shekhar, S. (2007). Trust as an antecedent
(p. 601)
van Doorn, G. S. & Taborsky, M. (2012). The evolution of generalized reciprocity on social
interaction networks. Evolution, 66(3), 651–664. https://doi.org/10.1111/j.1558–
5646.2011.01479.x
Wang, Y., & Fesenmaier, D.R. (2003). Assessing motivation of contribution in online com
munities: An empirical investigation of an online travel community. Electronic Markets,
13, 33–45. doi:10.1111/j.1558–56462011.01479.x
Wang, S., & Noe, R. A. (2010). Knowledge sharing: A review and directions for future re
search. Human Resource Management Review, 20(2), 115–131. https://doi.org/10.1016/
j.hrmr.2009.10.001
Wasko, M. M., & Faraj, S. (2000). “It is what one does”: Why people participate and help
others in electronic communities of practice. Journal of Strategic Information Systems, 9,
155–173. https://doi.org/10.1016/s0963-8687(00)00045-7
Wasko, M. M., & Faraj, S. (2005). Why should I share? Examining social capital and
knowledge contribution in electronic networks of practice. MIS Quarterly, 29(1), 35–57.
Retrieved from http://www.jstor.org/stable/25148667
Page 31 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Wasko, M. M., & Teigland, R. (2004). Public goods or virtual commons? Applying theories
of public goods, social dilemmas, and collective action to electronic networks of practice.
Journal of Information Technology Theory and Application, 6, 25–41.
Wasko, M. M., Teigland, R., & Faraj, S. (2009). The provision of online public goods: Ex
amining social structure in an electronic network of practice. Decision Support Systems,
47(3), 254–265. doi:10.1016/j.dss.2009.02.012
Williams, K., Harkins, S. G., & Latané, B. (1981). Identifiability as a deterrant to social
loafing: Two cheering experiments. Journal of Personality and Social Psychology, 40(2),
303–311. https://doi.org/10.1037/0022-3514.40.2.303
Yang, H. L., & Lai, C. Y. (2010). Motivations of Wikipedia content contributors. Computers
in Human Behavior, 26(6), 1377–1383. doi:10.1016/j.chb.2010.04.011
Yang, X., Li, Y., Tan, C.H., & Teo, H. H. (2007). Students’ participation intention in an on
line discussion forum: Why is computer-mediated interaction attractive? Information &
Management, 44, 456–466. doi:10.1016/j./im.2007.04.003
Yates, D., Wagner, C., & Majchrzak, A. (2010). Factors affecting shapers of organizational
wikis. Journal of the Association for Information Science and Technology, 61(3), 543–554.
doi:10.1002/asi.21266
Yu, J., Jiang, Z., & Chan, H.C. (2007). Knowledge contribution in problem solving virtual
communities: The mediating role of individual motivations. Proceedings of SIGMIS-CPR
conference on Computer personnel research: The global information technology work
force (pp. 142–152). St. Louis, MO: Association for Computing Machinery. https://
doi.org/10.1145/1235000.1235034
Yu, T. K., Lu, L. C., & Liu, T. F. (2010). Exploring factors that influence knowledge sharing
behavior via weblogs. Computers in Human Behavior, 26(1), 32–41. doi:10.1016/j.chb.
2009.08.002
Yuan, Y. C., Rickard, L. N., Xia, L., & Scherer, C. (2011). The interplay between interper
sonal and electronic resources in knowledge seeking among co-located and distributed
employees. Journal of the Association for Information Science and Technology, 62(3),
535–549. doi:10.1002/asi.21472
Zhang, X., de Pablos, P. O., & Zhou, Z. (2013). Effect of knowledge sharing visibili
(p. 602)
Page 32 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
Zhu, H., Zhang, A., He, J., Kraut, R. E., & Kittur, A. (2013). Effects of peer feedback on
contribution: A field experiment in Wikipedia. In Proceedings CHI 2013 (pp. 2253–2262).
New York, NY: ACM Press. https://doi.org/10.1145/2470654.2481311
Audrey N. Abeyta
Ronald E. Rice
Ronald E. Rice (PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the
Social Effects of Mass Communication in the Department of Communication at Uni
versity of California, Santa Barbara. Dr. Rice has been awarded an Honorary Doctor
ate from University of Montreal (2010), an International Communication Association
(ICA) Fellow, selected President of the ICA (2006–2007), awarded a Fulbright Award
to Finland (2006), and appointed as the Wee Kim Wee Professor at the School of
Communication and Information and the Visiting University Professor, both at
Nanyang Technological University in Singapore (Augusts 2007–2009 and June 2010).
His co-authored or co-edited books include Organizations and unusual routines: A
systems analysis of dysfunctional feedback processes (2010); Media ownership: Re
search and regulation (2008); The Internet and health care: Theory, research and
practice (2006); Social consequences of internet use: Access, involvement and inter
action (2002); The Internet and health communication (2001); Accessing and brows
ing information and communication (2001); Public communication campaigns (1981,
1989, 2001, 2012); Research methods and the new media (1988); Managing organi
zational innovation (1987); And The new media: Communication, research and tech
nology (1984). He has published over 150 refereed journal articles and 70 book chap
ters. Dr. Rice has conducted research and published widely in communication sci
ence, public communication campaigns, computer-mediated communication systems,
methodology, organizational and management theory, information systems, informa
Page 33 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Motivations for Online Knowledge Sharing
tion science and bibliometrics, social uses and effects of the Internet, and social net
works. http://www.comm.ucsb.edu/people/ronald-e-rice
Page 34 of 34
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.21
This chapter describes the analyses and results for the ESRC Domain of Governance and
Security, guided by two questions: What are the challenges of ethics, trust, and consent in
the digital age? How do we define responsibility and accountability in the digital age? It
first provides an overview of the major insights from the literature review and analysis,
the Delphi surveys, and workshop discussions about pertinent concepts of governance
and security in a digital age. The most frequent concepts emerging from topic modelling
included social movements and protest communication, Internet governance, measure
ment, automation, EU commission and privacy, urban migration mobile, social media, law
enforcement, and Marxist analysis. Comparing these results with the most common
words in the literature review, five major topics emerged: state use of digital media, espe
cially surveillance of social movements and protest; Internet regulation and governance,
both national and international; children’s use of digital media, both protection and regu
lation; regulation and governance of automated systems; and deception in digital media.
Gradually, emphases shifted from regulation of general technology use to concerns with
privacy, data protection, and children’s use of digital technologies. The analyses also
identified the kinds of theory, methods, and approaches in the literature. The review pro
vides examples of literature in the project’s time period that illustrate these topics. It
ends with a discussion of future research directions (e.g., accountability for digital sys
tems and their impacts, algorithms and the law, human factors in cyber security, and
ethics) and research challenges (e.g., cybersecurity, governance, and transnational gover
nance).
Keywords: ESCR Review, governance, security, digital media, social movements and protest, Internet regulation
and governance, regulation, deception, privacy, data protection
Introduction
THIS chapter provides an overview of the analyses of the literature, Delphi process and
any relevant workshops for the Governance and Security domain. The chapter first ex
plores the results of the various digital humanities analyses of the literature and the re
Page 1 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
view of methods and theory. In the case of this domain the Delphi process did not provide
as clear a set of ideas by the close of the second round. Not only did the responses move
away from the initial scoping questions, there was also a lot overlap with the Citizenship
and Politics domain (chapter 16). We have therefore focused on those topics that are dis
tinct from the other domains. The recommendations for areas of future study are present
ed in the last section. As a reminder, the initial ESRC scoping questions for this area of
work were
• What are the challenges of ethics, trust and consent in the digital age?
• How do we define responsibility and accountability in the digital age?
Initial Comments
The naming of this domain as “Governance and Security” broadened the potential re
sponses to a wider range of topics than these initial scoping questions, as became clear in
the Delphi review, including elements from other domains. Separating out the distinctive
elements, we identified an emphasis on issues of privacy, law, and governance. However,
issues of trust, accountability, and responsibility and their governance remain (p. 606) im
portant. A key issue was brought up by team members and by stakeholders in Digital
Leader salon events—namely the relative success of some, but more often the well docu
mented failure of other, government projects to successfully deploy digital technologies
for governance. There is little literature from this review that empirically documents the
failure, over the last quarter century, of successive governments to exploit the particular
communicative and networking affordances of digital technology in the interests of more
equitable, inclusive, and cost-effective government. As will be discussed later, the ab
sence from the Delphi review and the literature of detailed work on success and failure
factors may indicate a key area for future work.
Literature Analysis
Topics
The literature analysis is designed to identify two sets of data. First, key topics within the
existing literature, which also allow comparison with areas of importance identified by
the Delphi review. Second, a content analysis of the literature to explore the predomi
nance of specific theory, methods, and approaches. Table 22.1 lists the 10 most common
(at least 2% of the cases) concepts identified in the Round 1 literature. Table 22.2 lists the
concept pairs.
Page 2 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Topic Percent
Child 11.1
Datum 7.3
Privacy 6.8
Law 5.0
Internet 4.7
Information 4.4
Parent 4.0
Governance 3.9
Protection 3.0
Innovation 2.9
Health 2.8
Government 2.2
Inspectorate 2.1
Code 2.0
Page 3 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 4 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
government 3.83
probability .98
regulation 1.67
Note: bolded term is the main concept; the unbolded terms below that and above the line are the related sub-con
cepts.
Page 5 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 6 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 7 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 8 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 9 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 10 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
All the literature collected from both rounds was analysed using WordStat. WordStat
identified 15 topics, shown in Table 22.3. There is a much stronger correlation between
(p. 607) the topic and concept mapping for this domain (see Table 22.4). There appear to
Page 11 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Co So In Me Au EU Ur So La Ma Ed Chi Vot Em De Sur
nce cia ter asu to co ba cia w rx uca ldr ing plo cep veil
pt/ l net re ma m n l en ist tio en’ ym tio lan
Top mo gov me tio mis mi me for an n s ent n ce
ic ve er nt n sio gra dia ce al in
me na n tio me ysi ter
nts nce an n nt s net
an d mo use
d pri bil
pro va e
tes cy
t
co
m
mu
nic
ati
on
Chi X
ld
Da X
tu
m
Page 12 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Pri X X
va
cy
La X
w
In X X
ter
net
In
for
ma
tio
n
Par X
ent
Go
ver
na
nce
Page 13 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Pro X
tec
tio
n
In X
no
va
tio
n
He X
al
th
Go X
ver
nm
ent
In X X
spe
cto
rat
e
Page 14 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Co X
de
Page 15 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Looking at the variation in key concepts from 2000 to the present, there is a shift from
general issues around the regulation of technology use, to a much stronger contemporary
focus on privacy and data protection. One consistent conceptual focus is on the use of
digital technologies by children.
In terms of the most frequently occurring topic pairs, early on (2000–2004; Figure 22.1),
the primary concerns were about Internet use or access, information and (p. 608) technol
ogy, cable companies and cable policies concerning access and broadband, technical poli
cy issues such as information and privacy or government and statistics or domain names,
computers and education (schools, teachers, students), technology and women, and chil
dren and media.1 By 2012–2016 (Figure 22.2) emphases had shifted to greater coverage
of parents and school or education, data and information (p. 609) (p. 610) privacy and pro
tection, and concerns with children and risk or various media (Internet, medium, social
networking sites), as well as more explicit treatment of relationships among data, infor
mation, education, and school.
Page 16 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
State use of digital systems. In contrast to the Citizenship and Politics domain (chapter
16) where engagement with politics and political action via digital media is a focus, here
the question is about the extent to which governments monitor, control, or utilize digital
media. Within this are debates around the rights of citizens, the use and sharing of
citizen’s data, and broader concerns about “surveillance societies.” For example, Elahi
(2009) sets out five dilemmas about the way data is used, how it is stored, for what pur
poses, and who has access to it. The first dilemma is about tensions and shifts among cul
tures, values, and identities, and attempts to find a shared practice and set of regulatory
practices for them all. The second is about individual rights versus society’s well-being.
The third is conflicting attitudes about data ownership. The fourth is about tensions
around scale in terms of temporal, geographical, and political environments. And finally,
fifth is about trust and control. As Elahi notes:
(p. 611)
The institutions tasked with regulation of the physical world are not equipped with
the necessary speed and flexibility to undertake a similar role in the virtual world;
the scale and scope of the task are materially different. The challenge for the fu
ture of privacy and consent in the cyberspace domain is one of adaptation.
One of the key tensions in the literature, and potentially between the work presented in
this domain with that of the Citizenship and Politics domain, is this one between individ
ual and state needs, and thus rights and the balance of power in political systems. Again,
as Elahi notes:
Page 17 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
While digital technology has increased the power of the individual, it has also
challenged the human rights of the individual with regard to privacy and consent.
The same technologies that have forced governments and institutions to become
more transparent and driven down costs for the consumer have also enabled
(p. 612) governments and businesses to collect personal information on the public
to an unprecedented degree.
The use of digital and media technologies to monitor citizens has been widely debated.
Lyon has written on this at length, noting how digital surveillance has become an in
escapable part of everyday life in the global north. Lyon suggests thinking about surveil
lance as “social sorting” in order to divert the singular focus on privacy. Lyon argues that
we have seen “the rise of the safety state” which enables social sorting and other discrim
inatory judgment through the processing of personal data for the purpose of care or con
trol. These automated surveillance systems enable the state to gain have power over citi
zens through influencing or managing people’s behaviors. he shows how digital surveil
lance has become everyday practice in a wide variety of organizations such as schools,
day care for children, or in the protection of homes. Importantly, Lyon notes that this is
not necessarily in all cases an attempt to create a centralized surveillance state. Surveil
lance is often fragmented among organizations and between state and private organiza
tions. As Lyon notes:
As has become very apparent with the rise of “Big Data,” everyday interactions become
points of surveillance:
… the mundane activities of shopping using credit and loyalty cards may also con
tribute to profoundly significant processes of automated social sorting into newer
spatially based social class categories that modify older formations of class and
status.
One of the major social concerns that is reflected in the research is the use of data by the
state to directly monitor citizens. Brown and Korff (2009) argue that the disproportionate
power of surveillance enabled by the Internet and conducted by police, intelligent agen
cies, and government is problematic for democracy and rule of law. They raise concerns
that grounds for suspicion that agencies such as the police need to justify monitoring and
Page 18 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
… the collection of data on ‘contacts and associates’ (i.e., on persons not suspect
ed of involvement in a specific crime or of posing a threat), the collection of infor
mation through intrusive, secret means (telephone tapping and email intercep
tion) and the use of ‘profiling’ techniques, and indeed ‘preventive’ policing gener
ally, must be subject to a particularly strict ‘necessity’ and ‘proportionality’ test,
and surrounded with particularly strong safeguards.
Such concerns overlap with the next topic, namely the regulation—by both government
and commercial platform providers—of digital media and technology use.
Internet regulation and governance. An obvious area of research work is on the gov
ernance of digital media themselves. This covers a range of issues including attempts by
national government and international agencies to regulate digital media, its use, for
mats, and access. It also covers the governance and regulation of technical standards and
data protection, through to the legal underpinnings of our use of specific platforms. A key
area is the manner in which commercial providers of digital technologies, platforms, and
media regulate their use, and the use they make of citizens’ data. This ranges from copy
right issues through to “acceptable” use as well as commercial use of collected data. For
example, Pollach (2005) examines commercial websites’ privacy policies and checks
whether they adequately communicate data handling practices so that people can have
informed decisions when using the web. Her analyses show that most of the policies are
written in complicated and vague ways, justify placing cookies on people’s computers,
and set the default to sending unsolicited marketing communication. Only some of the
websites openly and clearly admit to sharing and selling people’s data with third party
companies. Pollach argues that these companies use several communicative strategies
such as mitigation and enhancement, obfuscation, relationship building, and persuasive
appeals, noting:
Page 19 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Web merchants do not seem to abide by these common ethical principles when
they communicate their privacy standards. It seems that they still need to learn
how to use the power the Internet has bestowed on them in an ethical and re
spectful way, for example by posting clearly and unequivocally worded privacy
policies.
At a national and transnational government level there has been a sustained poli
(p. 614)
cy drive to support the development of digital technologies, digital service, and more
broadly a “digital society.” Mansell (2014) examines the history of policy initiatives de
signed to push the “Digital Agenda” from the mid-1980s to the present. The goal of the
work is to provide a critical assessment of the values and priorities these policy agendas
portray. Mansell focuses on the flagship European initiative “A Digital Agenda for Eu
rope,” arguing that economic growth is one of the top priorities endorsed by the Euro
pean Commission and that the program privileges the commercial interests of industry
stakeholders:
She further argues that the social and citizen (demand side) aspects of digital technology
policies have been underplayed in these policies:
Social and demand-side issues made appearances but the principal goals re
mained consistent with supply-oriented strategies, commercial market priorities
and competitiveness. These tensions reflect the contradictory values embedded in
the scaffolding of information society policies. They are particularly visible in
three areas: (i) trust and security; (ii) open information and copyright; and (iii)
public service media.
These two areas come together in the actual use of systems by citizens and in their un
derstandings of how they and their data are regulated. For example, Fogel and Nehmad
(2009) provide an early example of the examination of risk taking, trust, and privacy con
cerns in relation to social media—focusing on the use of Facebook and Myspace by col
lege students. Young people who had a social media profile were significantly more risk-
Page 20 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
taking in data they shared than ones that did not, and men tended to take more risks and
to have less privacy concerns than women:
As the Internet is not a private club, clearly those who are posting information
about themselves on their social networking profiles are more comfortable with
the possible risks of their information being seen by others.
Such work points out that many aspects of regulation are relative to the social and cultur
al expectations of citizens. Data that contemporary users may be happy to share may
have been considered too private or too risky to share by a prior generation. It may also
be the case that users look to play off potential risks of data sharing with the benefits and
services offered by platforms. Or alternatively, repeated data breeches and their implica
tions may make people more wary of what data they share. Even in this early work of so
cial media Fogel and Nehmad note:
(p. 615)
As our data were collected in 2007 … it is possible that more people are aware to
day of the possible privacy concerns of disclosing a home address on a social net
working profile.
When it comes to sharing and privacy risks of data, most of the concerns arise around
children’s use of digital technologies, as the next section discusses.
Children’s use of digital media. Regulating children’s use of any new medium (from ra
dio to TV to computer games) has always generated a strong research program. This is
very much the case for the full variety of digital media and technologies. Such work often
focuses on aspects of media regulation, but more in-depth work explores how govern
ment, schools, and parents look to manage and regulate digital media use by children.
One of the key researchers in this area, Sonia Livingstone, early on examined the emerg
ing research agenda in relation to children’s Internet use (2003). Some of the problems in
this initial research were: seeing children as a homogenous category, while rendering
them marginal to “general” Internet use. As Livingstone argues, there is not enough con
sideration taken of what children and youth actually do and want from the Internet,
which leads to a lack of proper understanding of how they use it. Primarily, she argues
that children’s main interest in the Internet is new opportunities to communicate with
their social networks; hence, most of the contacts are mostly local. In terms of education,
there is little evidence on whether or how the Internet benefits children’s education.
Livingstone notes that differences in digital media use between adults and children can
also lead to challenges in regard to digital media use in the home:
Page 21 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Parents are developing strategies to manage and regulate the internet within the
home, framed by educational aspirations for their children; meanwhile children
prefer online entertainment centred on fandom transferred from already estab
lished media—music, celebrities, sports, television programmes.
She also points out that much of the early debate around digital technology use by chil
dren focuses on its educational value:
Parents themselves seem conflicted about the value of computers, and in some
ways they are also in conflict with their children. This conflict centers on the po
tential educational value of computers, on the use of so-called ‘educational’ appli
cations, and on the grey area of ‘edutainment.’
Livingstone and Bober (2006) explore the negotiations that parents conduct with their
children in regard to the opportunities and risks that Internet use entails, as they seek for
meaningful engagement with it in their daily lives. Parents’ strategies are often con
cerned with practicalities (such as affordability), use (through discussion, sharing media
time with children, and control), and cultural and cognitive issues relating to (p. 616) the
Internet. Children’s tactics, however, are often about resisting these strategies, especially
since they sometimes have more expertise with new media than their parents. The au
thors take a child-centered approach, which includes in the research design an examina
tion of adult-child divergence and taking into account the child’s concerns:
In the conclusion of their substantive work Kids Online, Livingstone and Haddon (2009)
argue that research about children needs to be conducted with them, not on them. In ad
dition, usage varies, influenced by socio-economic differences which correlate with edu
cation and regional and other sources of inequality. In terms of gender, they note that
there has been a substantive increase in girls’ use of the Internet to the point of parity, al
though there are still some key differences in types of use linked to gender preferences
and confidence in skills.
As the Internet and digital media have developed, so has the assessment of the risks
faced by children using the Internet. The authors identify more contemporary risks as be
ing commercial exploitation, hate online, seeing violence and harmful content, seeing
Page 22 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
pornography, and self-harm. Yet the benefits from digital media use are also complex and
not solely derived from educational uses:
Two implications follow. First, the simple fact of using the internet may not mean
that a child achieves their potential or gets the most from it, and further support
and encouragement to progress or expand their activities may be required. Se
cond, the fact that a child plays games online may not be, as worried adults are
tempted to judge, a ‘waste of time,’ for this may represent a step towards further
activities, one that is fun, gives confidence and develops skills.
With the rise of social media and the linkage between social media use, popular media,
and interpersonal interaction, concerns have shifted to issues of young adults and rela
tionships. This work clearly overlaps with the Communication and Relationships (chapter
8) domain. Within this, feminist scholars have pointed out the extent to which existing in
equities and sexual double standards remain, and may be reinforced by, the use of digital
media. As an example, Ringrose et al. (2013) examine teens’ (12–15) digital image ex
change, commonly called “sexting,” mainly focused on the UK context. The researchers
have conducted interviews, focus groups, and analyzed Facebook and Blackberry online
posts. They argue that teen girls receive contradictory messages about the way to per
form their gender; on the one hand they are supposed to perform and (p. 617) produce
forms of “sexy” self-display, and on the other hand they face legal, moral, and “slut sham
ing” consequences. The authors argue that
we have to understand the underlying gendered discourses and power that enable
a context where girls’ mediated body parts (e.g., images of breasts) are highly val
ued as commodities, where it is possible for such images to be traded like curren
cy, which then constructs a situation where girls stand to ‘lose’ something (namely
their sexual reputation) when images are shared, in ways similar to debates on fe
male virginity.
Thus identities and social roles are shaped and changed, in part through their articula
tion via digital media and technologies. As Ringrose et al. note, since girls must negotiate
moral discourses regarding their sexual reputation, and being attractive and wanted,
when deciding whether to send images, this suggests a new norm of feminine desirability
as mediated (though not determined) by the affordances of digital technology. (Ringrose
et al., 2013, p. 312).
Page 23 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
agents have several properties: they are reactive, autonomous, goal-oriented, temporally
continuous, communicative, adaptive, mobile, flexible and demonstrate “character.” They
help users by performing tasks autonomously, training or teaching users, helping users
collaborate, or monitoring procedures. Importantly, Quesenbery points out that despite
their benefits, agents have several drawbacks, particularly around trust, privacy, control,
and personalization:
Users must trust that the software will work properly, and help them do their jobs
well and provide adequate support for those tasks, but they do not typically need
to worry about whether it will work in ways that are contrary to their own inter
ests. They may, however, not feel trusted by their employer if they are not suffi
ciently empowered to do their work by overly restrictive software or inadequate
performance support.
This concern about trust runs through much of the literature on the social and organiza
tional impacts of automation and was a major theme of our workshops that explored the
impacts of automation and augmentation (see chapter 24). A key issue in the discussion of
trust in AI and automated systems is the visibility of their underlying processes—the ex
tent to which they are a “black box.”
A critical factor in establishing trust is how transparent the agent’s action is—that
is, how easily the user can see inside the transaction or independently validate the
results. This transparency is just as important in establishing trust with a software
agent as with a human vendor.
Ethics stand out as a key concern in this literature. Sharkey and Sharkey (2012)
(p. 618)
outline the development of robot applications for helping the elderly and their carers,
monitoring their health and providing them companionship.
As well as giving the elderly an increased sense of control and autonomy, robotic
assistive technology could increase the social contact the elderly person experi
ences, by making it possible for them to get to and from social meeting places;
again with likely improvements in their psychological welfare.
However, the authors raise six ethical concerns around this topic based on human rights
and shared human values:
Page 24 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Importantly, Sharkey and Sharkey do not use these ethical concerns as an argument
against the use of robots, but rather they emphasize that with a proper balance between
benefits and ethical issues, robots could improve the quality of life of elderly people.
They also point out that there is a need for governance and regulation, as technologies
are moving beyond current legislation. This issue of digital media and technologies mov
ing beyond current governance provision and the need to balance innovation and regula
tion permeates many of the domains covered in this book: for example, social media plat
forms in the context of both interpersonal and political communication, data use by major
platforms, or technologies in health care. In relation to health care based robotics,
Sharkey and Sharkey note:
Since the effect of robots on the lives of the elderly depends on the ways in which
they are deployed, the development of guidelines about their use in care homes,
and in their own homes, could help to guard against their misuse. At present,
apart from fundamental human rights legislation, there is little protection for el
derly people against the potential downsides of robot care.
One area where ethics, regulation, and trust of autonomous systems is most acute is
around their use for military and policing activities (related to the first topic of state use
of digital systems). For example, Noorman and Johnson (2014) seeks to uncover the
“black box” discourse around the autonomy of military robots to show how the question
of responsibility changes once this framing is peeled back. Noorman and Johnson argue
that more analysis into what is inside robots is needed in order to understand responsibil
ity (p. 619) issues surrounding military autonomous robots. They uncover the negotiations
about the meaning of autonomy of robots, and the desires and goals of various social
groups with an interest in the development of these technologies. Their argument is that
humans still have influence and hence responsibility in autonomous robots:
1. Designers and developers outline the problem that these autonomous systems are
supposed to solve and create their behavior.
2. Norms and rules still govern the behavior of autonomous systems.
3. These systems depend on people who develop verification and validation methods
of ensuring trust and confidence of such systems.
Technologies do not merely replace human beings; rather they complement and
change human activity. They allow human actors to do things they could not do be
fore, and as a result they shift roles and responsibilities and create new ones. So it
is with robots. Tracing the distinctive ways in which robotic systems perform tasks
is essential to understanding how tasks and responsibilities are created and dis
tributed across the broader sociotechnical system.
Page 25 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
In this sense they are repeating the key argument of Actor Network Theory (see Latour, &
Woolgar, 1986, for example) in which human agency is key at all stages, but that elements
of systems with agency are no longer just humans. Many aspects of the social system—be
that a robot or a workplace device—become “black boxes” where the social and technical
systems and infrastructures behind them are hidden from the user or citizen. Thus,
The important question is not whether human actors can be held responsible (they
can), but how tasks are distributed among human and non-human components of
the system, whether the machine parts have been adequately tested, whether the
human actors involved have been adequately trained for their tasks, what risks
are involved, and how those risks are being managed and minimized.
As with the other review chapters, the following analysis builds on Borah (2017). It ex
plores the extent to which theory and methods were employed in the reviewed papers.
Most of the analysed papers (60%) were inductive, either describing findings or building
theory, with 40% being deductive (testing existing theory). Only 24% of the papers under
took primary data collection, with 63% being discursive reviews of or reflective on exist
ing research (Table 22.5). The main disciplines from which theory was used or for which
theory was developed were sociology (52%), psychology (17%), communication and me
dia (12%), politics (9%), economics (5%), and philosophy (3%). Only actual use of (p. 620)
theory for the purposes of design or analysis were coded; general reference to prior work
and theory were not coded. There was considerable variety in the specific theories ap
plied from these disciplines. Theories of the information or networked society prevailed in
the sociology discipline (12% of total) and theories of identity within psychology (3%). Of
the theories explored, either empirically or discursively, it was those pertaining to the in
formational or network society that proved most popular. This was followed by those that
examined privacy, the public/private sphere, or political economy. Surprisingly little atten
tion appears to have been paid to exploring issues of trust between government and the
governed, public participation in the government decision-making process or, indeed uses
of technology to improve the governance of our communities.
For those studies that undertook empirical research, the main research methods were lit
erature reviews (38%), surveys (26%), and interviews (16%), with 61% qualitative and
39% quantitative (Tables 22.6 and 22.7), with none of the work using a “big data” ap
proach. The majority of the empirical work focused on specific groups, with a limited
number of general population studies (Table 22.8).
Page 26 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Percent
Percent
Survey 26.7
Interview(s) 16.0
Ethnography 4.0
Experiment 1.3
Other 1.3
Percent
Discourse (textual-linguistic-discourse) .7
Page 27 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Percent
Unfortunately, there is little account (as of yet) of how government, at either the national
or local level, has managed and responded to the social media and big data revolutions. It
is a surprising omission given the recent emphasis on the centrality of government, par
ticularly local government, to implementing aspects of “digital society” from the “smart
city agenda,” through “digital by default government services” to industrial strategies fo
cused on AI and automation. This may be a feature of the selected literature, as we have
focused primarily on social research, and much of the recent work on the technologies of
digital government has been undertaken within the Information and Computer Science
disciplines. That literature reports on designing and building technical systems, with
some social science input rather than with much examination of their actual social im
pacts.
There was limited discussion of how technology might be used to “foster a civic well-be
ing.” This would fit with arguments made in the ESRC project’s Digital Leaders Salons
and review events with stakeholders, where a “public value” orientation for the adminis
tration of public services in place of the current was put forward. This was contrasted
with current digital government approaches that are formulated much more around sys
tems efficiency and cost savings—referred to by some as the New Public Management
paradigm, as in the United Kingdom. It was argued that a public value governance ap
proach to service delivery and regulation is more congruent with the information and
communication affordances of digital technology, particularly those associated with the
(p. 621) advent of social media. As such it may be more likely to usher in a smart gover
nance process that can integrate and take advantage of the local democratic and econom
ic opportunities long associated with digital media, but which local government has hith
erto failed to grasp. However, these emergent ideas do rest upon a number of assump
tions, not least of which that there is a favorable local governance environment capable of
sustaining this approach, that have themselves received little empirical investigation.
Delphi Review
The following sections detail the results of the Delphi process for the Governance and Se
curity domain, covering suggested scoping or research questions, key topics to address
within these questions, and key challenges to researching these questions.
Page 28 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
The Delphi review identified a set of scoping questions for the domain; these were coded
into the eight categories detailed in Table 22.9, while Table 22.10 presents their ranked
importance from the confirmatory survey. As will be discussed later (chapter 25), there
are a number of areas identified in the scoping question and challenges analysis that
cross-cut all the domains, a key one being ethics.
Page 29 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Human fac On security, it’s been said that the weakest link in
tors in cyber security is the human element. Yet, a lot of the work
security seems to be in the technical/technological area.
What can be done to improve the human element in
security?
Page 30 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Ethics 16.7
The consultation workshop identified a set of scoping areas that added to those
(p. 623)
Page 31 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
We note that these issues are far more focused on aspects of governance than on the
more personal issues of trust and accountability in the original scoping questions. The
topics identified in the Delphi review were coded into 10 categories shown in Table 22.11,
with their ranked importance from the confirmatory survey in Table 22.12.
Topic Percent
Cyber security 37
Government digitization 11
Privacy 11
Education 5
Ethics 5
Legal issues 5
Methods 5
Political communication 5
Transnational governance 5
Page 32 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 33 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
tions to topics:
• Access to data (who owns it?) And how “re-combining data” needs to be included in
privacy issues
• Legislation governing the digital economy
• Citizens’ attitudes toward digital technology governance and links with actual behav
ior
• Cyber-security needing to be broadened out to be more relevant to people and soci
ety (what exactly are the dangers?)
Research Challenges
The challenges in undertaking research in this area identified by the Delphi panel were
grouped into 8 categories. Table 22.13 lists these, ranked by the number of coded items,
with those deemed by the consultation workshop to be domain specific marked in bold.
Table 22.14 shows their ranking by the confirmation survey.
Challenge Percent
Ethics 31
Cross-cultural engagement 8
Cybersecurity 8
Digital divide 8
Disruptive change 8
Governance 8
Transnational governance 8
Page 34 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 35 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Page 36 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
The consultation workshop highlighted a set of challenges not covered in the Delphi re
turns, including
Given the considerable breadth of ideas and responses in the Delphi responses
(p. 625)
and the consultation workshop, we looked to combine this broad range of ideas with the
material from the literature section to provide a clearer picture of future research chal
lenges. The next section undertakes this reflection.
Conclusion
As with the Organizations and Digital Technologies domain (chapter 11) the lower re
sponse rates from the Delphi phase limit some of the confidence in the results. Also, it is
clear from the Delphi responses that the identified key literature presents a broader brief
than that in the initial ESRC scoping questions.
Finally, there are two areas identified by the research that are important, but which may
already have substantive ongoing activity, namely cybersecurity and children’s use of dig
ital media. Both of these are clearly mature research areas with substantive empirical re
search behind them. We would argue that future work in these areas should target specif
ic issues, potentially where they intersect with cross-cutting themes (see chapter 25),
such as inequalities and divides in children’s digital lives, or digital literacies and cyber
security.
The following four potentially overlapping areas need further work, especially as there
appears to be less empirical work in these areas:
Having said that, these topics and the majority of questions and topics identified in the
Delphi and workshop discussions crossover with the other domains. We would note that
that they in particular cut across the Citizenship and Politics (chapter 16) and Data and
Representation (chapter 18) domains. It is also the case that the challenges identified
within this domain all fall within the cross-cutting issues to be discussed in chapter 25.
Page 37 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Governance and security of ourselves as citizens, of our data, and of the systems we use
is clearly not just a technical issue. It is core to how we govern, manage, and regulate our
digital society. It therefore needs to be underpinned by our assessment of and debates
around ethics and rights. Social research on the impacts of digital media and technolo
gies needs to provide a strong empirical basis for these debates.
References
Borah, P. (2017). Emerging communication technology research: Theoretical and method
ological variables in the last 16 years and future directions. New Media & Society, 19(4),
616–636.
Brown, I., & Korff, D. (2009). Terrorism and the proportionality of internet surveillance.
European Journal of Criminology, 6(2), 119–134.
Elahi, S. (2009). Privacy and consent in the digital era. Information Security Technical Re
port, 14(3), 113–118.
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust,
and privacy concerns. Computers in Human Behavior, 25(1), 153–160.
Latour, B. & Woolgar, S. (1986). Laboratory life: The construction of scientific facts.
Princeton, NJ: Princeton University Press.
Livingstone, S. (2003). Children’s use of the internet: Reflections on the emerging re
search agenda. New Media & Society, 5(2), 147–166.
Livingstone, S., & Bober, M. (2006). Regulating the internet at home: Contrasting the per
spectives of children and parents. In D. Buckingham & R. Willett (Eds.), Digital genera
tions: Children, young people, and new media (pp. 93–113). Mahwah, NJ: Lawrence Erl
baum.
Livingstone, S., & Haddon, L. (Eds.). (2009). Kids online: Opportunities and risks for chil
dren. Bristol, UK: Policy Press.
Lyon, D. (2010). Surveillance, power and everyday life. In P. Kalantzis-Cope & K. Gherab-
Martin (Eds.), Emerging digital spaces in contemporary society (pp. 107–120). London,
UK: Palgrave Macmillan.
Mansell, R. (2014). Here comes the revolution—the European digital agenda. In K. Don
ders & C. Pauwels (Eds.), The Palgrave handbook of European media policy (pp. 202–
217). London, UK: Palgrave Macmillan.
Noorman, M., & Johnson, D. G. (2014). Negotiating autonomy and responsibility in mili
tary robots. Ethics and Information Technology, 16(1), 51–62.
Page 38 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
Quesenbery, W. (2002). Who is in control? The logic underlying the intelligent technolo
gies used in performance support. Technical Communication, 49(4), 449–457.
Ringrose, J., Harvey, L., Gill, R., & Livingstone, S. (2013). Teen girls, sexual double stan
dards and “sexting”: Gendered value in digital image exchange. Feminist Theory, 14(3),
305–323.
Sharkey, A., & Sharkey, N. (2012). Granny and the robots: Ethical issues in robot care for
the elderly. Ethics and Information Technology, 14(1), 27–40.
Vallor, S. (2016). Technology and the virtues. Oxford, UK: Oxford University Press.
Notes:
(1.) As part of the review, The Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/provides
access to the top 50 most frequently occurring pairs and trios through a series of data vi
sualizations. Click on View Data Visualisations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
ticles at the top. Also, see https://waysofbeingdigital.com/literature-analysis-interactive-
results/for interactive visualizations with mouse-overs of the main clusters of concepts
within each Domain, and the relative frequency of concepts associated with each cluster.
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
Page 39 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESCR Review: Governance and Security
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Gerwyn Jones
William H. Dutton
Elinor Carmi
Page 40 of 40
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.22
Societies and their underlying infrastructure are in the process of being transformed by
digital technology, a change that requires updated legislation and governance structures
to respond to new information contexts. One particular area of rapid growth is that of
connected devices that are increasingly being deployed in the physical environment as
part of the so-called Internet of Things (IoT). There has been significant attention by poli
cymakers at both national and international levels as to the economic and social benefits
these technologies can bring and how they can be effectively implemented, leading to a
range of different governance models. Many of these models relate to larger scale deploy
ments as part of “smart city” urban infrastructure programs. Unlike private sector Inter
net of Things devices, which require buy-in from individuals who voluntarily purchase
technology and choose to use it, public space deployments can affect entire communities.
They must therefore particularly include mechanisms by which citizens can be empow
ered. We present a thematic review of literature and policy pertaining to IoT governance
models, and construct a framework of principles for IoT governance, highlighting emerg
ing and remaining questions. Four emergent themes (Levels of Governance, Legitimacy
and Representation, Accountability, and Transparency) are illustrated using case studies
at two levels; national and supranational top-down governance models, and city-based
context-specific implementation models.
Keywords: Internet of Things, IoT, IoT governance models, IoT governance, accountability, urban infrastructure
programs
Introduction
AS digital technology becomes smaller, and processing power greater, there are opportu
nities to integrate it more fully into our environment and society. We are coming closer to
achieving Mark Weiser’s (1991) concept of ubiquitous computing, where objects in our
environments are able to collect, store and transmit data they integrate to the point that
they “disappear” and are no longer noticed as distinct from the general surroundings.
Page 1 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
While this brings potential societal benefits, it also introduces novel challenges in terms
of governance.
In the late 1990s, Kevin Ashton coined the term “Internet of Things” (IoT) to describe
supply chain technology that could collect and share data without direct human interven
tion (Ashton, 2009). This term is now used more extensively, and covers a wide range of
spatially distributed sensors and devices that collect and share data. This concept is now
driving a major technological shift and is affecting numerous aspects of society. Projec
tions suggest there may be 20 billion connected devices by 2020 (Gartner, 2017), and this
level of deployment has profound economic implications. The Organization for Economic
Co-operation and Development mentions “industrial and commercial processes, consumer
and home services, energy, transport systems, health care, infotainment and public ser
vices” as key areas that are likely to be affected (OECD, 2015, p. 240), with estimates for
added global economic value by 2020 ranging from US$1.9 to $14.4 (p. 629) trillion (Wal
port, 2014). Such broad-scale implementation and impact raises questions of governance,
defined in the next section. As these connected technologies become critical parts of soci
ety and infrastructure, significant attention has been focused by policymakers at the in
ternational, national, and city level on how they should be regulated and managed. The
Internet of Things introduces new complexities of governance which are distinct from
general digital governance, given levels of information sharing involved, multiple actors
and stakeholders, questions of accountability when issues arise, and distribution in physi
cal space.
Media attention has frequently focused on the IoT at the level of objects and technologies
available commercially for private use, often in the household setting; for example, smart
fridges that know when you need more milk and purchase it for you (Hammersley, 2013;
Walker, 2018; Molloy, 2018). Existing regulations and policy often focus on new consumer
products delivered by technology innovation (with products such as “wearables,” “smart
homes” and other consumer applications acting as a driver for industry).1 However, such
regulations also cover large public-sector infrastructure projects using widely deployed
IoT sensor networks, which are becoming more common in civic settings. Projects such
as these are often framed as part of the notion of the “smart city.” “Smart city” is used ex
tensively when discussing the use of technology to strategically enhance civic infrastruc
ture (such as traffic and energy management); however, many have expressed concern
that it is not a useful term. Angelidou (2014) extends this criticism by noting that there
remains no agreed definition of smart (or intelligent) cities. While not all so-called smart
city solutions involve IoT technology, and not all IoT technologies at the city level are nec
essarily part of smart city initiatives, there is a significant crossover between public im
plementations of IoT and the smart city rhetoric (e.g., Future Cities Catapult, 2017; Hill
et al., 2016). This may be shaping discussion of IoT at the national and international level
as a significant amount of funding focusses narrowly on smart city programming rather
than on the more general concept of the IoT and the potential it has for system-wide
change (Gunashekar et al., 2016, p. 40). This lack of differentiation could be an issue if
other areas are neglected, and critical reflection is side-lined in the rush to be included in
those gaining from the widely lauded benefits of IoT. Governance for diverse utilizations
Page 2 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
will be increasingly challenging, as already seen in live projects such as the Chicago Ar
ray of Things (discussed later in this chapter). Gaps in governance will remain without a
consideration of responsibility, accountability, and what technology can actually achieve.
Questions of accountability and governance in relation to the IoT are central to the work
of the “TrustLens” project: Trusted Things & Communities: Understanding & Enabling a
Trusted IoT Ecosystem. This project, funded by the United Kingdom’s Engineering and
Physical Sciences Research Council (EPSRC), asks questions such as: What are the appro
priate governance arrangements covering IoT deployments? How do we deliver meaning
ful accountability? How can we develop an understanding of the interplay between indi
viduals and devices, and the wider relationship to social/cultural norms? Work carried out
as part of this project to understand the existing literature on governance in IoT deploy
ments has informed this review, which is not a comprehensive (p. 630) systematic review
but instead a deep foray into governance in this context that we hope may spark addition
al research and further work. This is, ultimately, a societal issue—not just one for technol
ogists and sociologists to debate.
To this end, this chapter will explore the literature on and current examples of gover
nance structures in IoT systems. We will focus on public deployments rather than individ
ual consumer purchases, as this is a potentially more complex and understudied land
scape. While private (household) and public (shared) deployments may entail different da
ta storage and privacy implications, and thus require different or complementary gover
nance models, this review will have applicability for all IoT systems. A focus on public de
ployments includes the potential impact for a wide range of citizens above and beyond
those who choose to purchase IoT technologies for household or individual use. This is
particularly the case because in these circumstances many public or community users
have limited agency and choice over their interaction with these technologies, as we shall
see.
The review builds on existing literature and case studies to construct a framework of
principles for IoT governance, highlighting emerging and remaining questions about gov
ernance. The case studies are not chosen to be representative examples, but, instead,
represent diverse scenarios, deployments, and policies that can be aligned with the
framework, drawing commonalities between theory and practice. Because the prolifera
tion of devices outpaces the literature, by including these we aim to encourage scholars
to include an analysis of active deployments in order to narrow this distance.
Governance is a complex topic with a variety of definitions. UNESCO, for example, de
fines it as “the exercise of political, economic and administrative authority in the manage
ment of a country’s affairs, including citizens’ articulation of their interests and exercise
Page 3 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
of their legal rights and obligations” (Furness, 2012, p. 204). Weber, one of the relatively
few to have written about governance specifically in the context of the IoT, describes it as
“the design of institutions and the structure of authority to allocate resources and coordi
nate or control activities in the society” (Weber, 2013, p. 341).
As discussed previously, realization of IoT projects has far reaching economic and social
implications. These can be complex and involve many actors; for example, individuals,
communities, service providers, and others. In this multi-actor context, governance re
quires careful consideration. Different governance regimes may be applicable for differ
ent circumstances, and change accordingly, requiring flexible IoT governance. Mah
eswaran and Misra (2015) suggest the following four orientations to considering (p. 631)
flexible IoT governance challenges: space-, time-, device-, and data-oriented governance,
which provide a framework for this variation.
IoT technologies can be used to promote social good, foster learning, and promote jus
tice, but may also be used to exert control and exacerbate inequality, therefore we have a
duty to not only consider “what is possible, but what is responsible” (Surman & Thorne,
2016, p. 3). This question of exerting control speaks to the balance or imbalance of power
that technology can foster.
Levels of Governance
There already exist many national and international bodies devoted to the governance of
the internet, and there has been some discussion as to whether IoT governance at the
highest level is encompassed by that, or needs separate regulatory and policy oversight
(Smith, 2012). High level top-down governance, at an international level, would depend
on the agreement of consensus rules and policies. Weber (2016) suggests that based on
the failure of the International Telecommunications Union (ITU) to reach consensus on
such rules for the internet, it is unlikely that such implementation of a top-down approach
would be possible for the IoT. This is especially the case given the broad proliferation of
Page 4 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
devices and implementations. Top-down governance does not, however, have to be global
ly applied, and can exist at several different levels using different tools, as illustrated by
Smith (2012), see Figure 23.1.
Weber (2013) also emphasizes that tools for governance must encompass requirements at
different levels including grass-roots, national, and city governance. Reviewing the scope
of IoT projects, we also find it important to consider governance at different geographic
and socio-cultural scales. There may be governance implications for IoT initiatives even
below the city level. There may be small-scale local projects, tailored to particular com
munities. An example of this is the “damp buster” frog-shaped humidity sensors deployed
by the REPLICATE project in Bristol (The Bristol Approach, 2018). (p. 632) Projects may
be initiated via bottom-up rather than top-down development, outside of the control or
knowledge of city officials (Jiang et al., 2016). Citizen developed grass-roots initiatives
nevertheless have governance requirements. Earlier, we distinguished between individual
IoT enabled objects that function in private spaces, and larger linked deployments which
may be in public spaces. These latter IoT deployments may consist of individual citizen
action, but gain their power from data collected from a large number of distributed de
vices such as air quality sensors (Chen et al., 2016). This collective data gathering is of
common interest, thus models of equitable sharing and collaboration are necessary for
wider impact.
Grass-roots governance models can vary. For example, deployments might be examples of
“citizen science,” where members of the public actively engage in scientific projects ad
dressing real-world problems (Angelidou & Psaltoglou, 2017). These may be initiated by
research groups and cultural institutions, arise from concerns of local groups, or be a
consequence of publically shared data generated as an integral feature of crowdsourced
sensing devices. Balestrini, Diez, Marshall, Gluhak, and Rogers (2015) make a distinction
between citizen science and participatory sensing, noting that in the latter case users can
appropriate IoT devices for their own situated purposes, not necessarily responding to
the specific needs of a community or scientific endeavor. They suggest that crowdfunded
participatory sensing initiatives can be less effective for successful use of IoT technolo
gies as community tools unless other support features are implemented, such as local
Page 5 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
There may also be interactions between different governance strategies both at different
levels, and when multiple authorities within an IoT ecosystem each have their own mod
els. The existence of multiple platforms may impact citizens’ rights in ways that may
(p. 633) not be evident at the level of the individual deployment; for example, numerous
studies have revealed the potential to re-identify “anonymous” individuals via the use of
linked data sets (Douriez et al., 2016; Narayanan & Shmatikov, 2008; Sweeney, 2002).
Given distributed data collection and ownership rights in the IoT, the potential for such
re-identification of individuals due to inconsistent or conflicting data policies is likely to
grow.
How much control citizens have in various governance models is also critical. A tradition
al top-down high level governance model in which a designated authority implements a
governance plan may appear to have limited scope for direct citizen engagement, such as
the development of Songdo, South Korea (see the case study under that subheading). Citi
zen governance may be introduced later, such as through the invitation of representatives
to sit within a consultation group (as with the Chicago Array of Things in the United
States: see under the Chicago, United States subheading); however, there may still be
limited control. Similarly, the level of authority available to citizens is variable within bot
tom-up participatory governance models even if citizen involvement appears to be more
direct. Balestrini, Diez, Marshall, Gluhak, and Rogers (2015), in discussing crowdfunded
IoT initiatives, note that the ability for individuals to perceive they are making a meaning
ful contribution is important.
Grass-roots, bottom-up efforts may find it difficult to effect change because of resource,
infrastructural, or technological limitations. This does not mean that effective participato
ry governance is not possible, just that it is not always a consequence of increasing par
ticipation. Current projects underway to examine such systems of governance include the
Jam & Justice project, which is mapping instances of participatory urban governance. By
crowdsourcing examples of initiatives including active citizen participation, they are
building a collection which aims to offer insights to understand the range of practical ef
Page 6 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
forts to achieve more inclusive governance, not only listing examples but “exploring what
makes them exciting, what they are aiming to achieve, what makes them effective, and
how they might contribute to more just outcomes.”2
Open systems which allow control by people directly affected by the implementation of
technology may provide flexibility, but this openness may depend on factors of account
ability and transparency.
Weber and Weber (2010) suggest that placing IoT systems wholly within the power of a
specific private or public authority risks decreasing legitimacy and democratic participa
tion. In order to mitigate these risks, they suggest systems should be designed to pro
mote accountability by ensuring that formal requirements about how rules are made, in
terpreted, and applied are inherent to the framework of the system. The legitimacy of or
ganizations is also heightened when all stakeholders concerned with the IoT are included,
generally by some form or reasonable representation, and thus Weber and Weber suggest
multipolar and decentralized policy within an institutional setting.
Almeida, Doneda, and Moneiro (2015) point out that boundaries between IoT and surveil
lance may blur or vanish if initiatives to protect privacy are not put in place. They include
accountability as one of the four principles on which rules and norms must be built to en
sure this (the others being: notice and choice, data minimization, and access to personal
data). Weber (2011, p. 134) identifies key elements of accountability serving as a basic
guideline for what must be included when establishing a legal framework for accountabil
ity measures for governing bodies: standards that hold governing bodies accountable at
the organizational level; readily available information, including consultation procedures
enabling active rather than passive information flow to concerned recipients; and the
ability for beneficiaries of accountability to impose sanctions if standards are not met,
which requires adequate participation schemes through direct voting channels and indi
rect representation schemes.
Page 7 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Transparency
Much of the literature related to IoT governance highlights transparency as a critical as
pect. For stakeholders to be able to follow-up on governance actions, they need to know
what actions exist or are possible, and understand the details. If procedures are transpar
ent, citizens have the capacity for active involvement and a certain level of control over
the decision-making process, allowing for “a certain level of ‘democratic’ legitimization
and predictability” (Weber & Weber, 2010, p. 75). This may be of particular (p. 635) impor
tance given that in the IoT there may be private actors involved in deployments, and pri
vate entities responsible for governance of some aspects.
Regulation to enforce transparency must therefore also extend to rules governing manu
facturers, which, given the global marketplace, may require a global view being applied
to the governance process (Almeida, Doneda, & Moneiro, 2015). This includes trans
parency in the data collection process, so that data owners can understand what data is
being collected (or has already been collected), where it goes, and who has access. This is
related to accountability and protection of rights.
In the case of the IoT, Weber and Weber (2010) identify several different categories of
transparency. Transparency in this context must include both the functioning of the gov
ernance system and consequences of actions within it. For this reason, they include the
category of procedural transparency, which covers the disclosure to the public of rules
and procedures in the operation of organizations, and the necessity of governance and
law-making being made both accessible and comprehensible. Other categories of trans
parency identified are decision-making transparency, which allows scrutiny of the deci
sion-making purpose and the reasons decisions were made, and substantive transparency
in which rules are established to avoid arbitrary or discriminative decisions, and may in
clude requirements of rationality and fairness. Weber and Weber also note that trans
parency can operate in different “directions”—superiors might have insight into the ac
tions of subordinates (transparency upwards), and vice versa (transparency downwards),
as well as transparency between those inside and outside organizations in both direc
tions.
Maheswaran and Misra (2015) suggest that transparency is important so that users can
understand and have input into policies and their selection, and can understand which
policies are operating in different spaces (to allow navigation between them). To enable
this, they propose a novel management framework for the IoT called Social Governance.
The literature indicates that transparency should be in place throughout the lifetime of
projects, and be adaptive, allowing consultation by users during both the preparation and
launch of projects through feedback mechanisms. In addition, final decisions of governing
bodies should be published alongside the decision-making process and considerations
that led to them (Weber & Weber, 2010). This, it is suggested, will “allow the participants
in the process to understand how their insights and expertise have influenced the policy
outcomes” (p. 85).
Page 8 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Use of Themes
The literature overview we have outlined has identified four themes, which provide an ini
tial exploratory framework that might be used when considering the principles of gover
nance models in place for public IoT deployments. Ideally, governance models should ex
hibit legitimacy and representation, accountability, and transparency, and operate at a
suitable level or levels for the deployment in question, which may span several layers of
governance.
With these principles of governance in mind, the following section of this review
(p. 636)
will explore in further detail some case studies of operational governance models with the
aim of understanding the current landscape and how these themes are or are not met. Al
though the themes have relevance to all case studies, first the importance of considering
the level of governance is uncovered by examining different national and regional exam
ples, and then each theme is illuminated through three city case studies. Table 23.1
summarizes the key theme for each case study.
Table 23.1 Key Emergent Themes and the Case Studies to Which They
Particularly Relate
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
than a comprehensive list. Each emergent governance theme highlighted previously with
in the literature review will be presented alongside a relevant case study.
The European Commission was the first supranational body to attempt to create an IoT
governance framework (Weber, 2013). The European Union has actively included IoT poli
cies in strategies such as the Digital Agenda for Europe 2020, and has promoted IoT re
search and innovation (OECD, 2015).
In 2013, the European Commission released a report containing the results of a public
consultation on the governance of the IoT which had been carried out in 2012, consisting
(p. 637) of more than 600 responses to an online questionnaire including stakeholders
from academia and industry, and members of the public (European Commission, 2013). In
this report, there appears to have been a contrast between the views of those represent
ing industry, and citizens and consumer organizations, particularly with regard to privacy.
The former suggested that the current Data Protection framework was sufficient, while
the latter desired greater focus on privacy and data protection, with emphasis on control
of data remaining with data subjects. Industry representatives were cautious of the sti
fling effect which inappropriate governance might have on a fledgling industry, in con
trast to non-industry respondents who stressed the importance of ensuring fundamental
rights are maintained. In several points of the survey it was emphasized that governance
models should preserve these rights, giving people the ability to choose whether to be
part of an IoT system, the right to “disconnect” at any time and the ability to ensure that
their data is not used without explicit consent, so that they would have control of their da
ta at all times.
Despite the fact that a bottom-up multi-stakeholder approach is suggested for defining
the ethical framework, governance was considered by many respondents to be necessary
beyond self-regulation, with calls for independent public-sector organizations to provide
regulatory oversight and governance including regular audits (European Commission,
2013, p. 9).
In April 2016 the European Commission released a Staff Working Document entitled Ad
vancing the Internet of Things in Europe (European Commission, 2016a). It highlights da
ta ownership as a critical issue currently without consistent practice in standards across
the Union, and that a lack of common technical standards for IoT platforms, including ar
Page 10 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
chitecture and data models, may cause obstacles for the proper operation of systems
across EU member states. The report recommended action under three pillars of IoT ad
vancement (European Commission, 2016a, p. 4):
1. A single market for the IoT: IoT devices and services should be able to connect
seamlessly and on a plug-and-play basis anywhere in the European Union and scale
up across borders.
2. A thriving IoT ecosystem: open platforms used across vertical silos will help devel
oper communities innovate. As a kick-start, IoT deployments in selected lead markets
will be supported.
(p. 638) 3. A human-centered IoT: the IoT in Europe is to respect European values,
empowering people along with machines and businesses, thanks to high standards
for the protection of personal data and security, visible notably through a ‘Trusted
IoT’ label.
The report also identified a list of challenges that must be addressed for users’ trust in
the IoT to be obtained, including “trustworthy identification both of users and devices in a
distributed environment, where governance structures are not always clear” (European
Commission, 2016a, p. 29). This highlights that lack of transparency in governance may
be (at least partially) overcome by transparency of actors and systems. The General Data
Protection Regulation (GDPR), which came into force in May 2018, is highlighted as a
means by which privacy protection and thus trust can be increased, as it requires “data
protection by design and by default” (GDPR Art. 25).3 The proposition of a “Trusted IoT
Label,” as mentioned in the third of the three pillars (see preceding list), is expanded as
being similar to the EU energy labelling scheme (EU Directive 92/75/EC) which rates en
ergy efficiency of appliances on a scale from A to G. Such an IoT trust label might func
tion as a demonstration of compliance with measures taken to effectively meet these chal
lenges. Similar initiatives to develop such a labelling scheme are underway by other bod
ies, such as the IoT Trustmark initiative (Bihr, 2017).
In November 2016, Working Group 4 of the Alliance for Internet of Things Innovation (the
working group focused on European IoT policy) followed this up with a recommendations
report related to the digitization of industry. The report points out that IoT security is not
easily measured and thus implementation of such a labelling system may be difficult. The
working group, instead, suggests the development of a Trust Charter, which is proposed
as being led by industry. Such a charter would outline best practice, identify security is
sues for consideration and support compliance. Table 23.2 summarizes how the themes
relate to the case study.
Page 11 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
The United States has also recognized the potential economic and social impacts of IoT
technologies. Several organizations within or supporting the government have examined
issues surrounding the IoT and provided advisory information. One of these is the Techno
logical Advisory Council, which was formed in 2010 to provide technical advice to the
Federal Communications Commission (FCC) and is comprised of academic and industry
experts appointed by the FCC Chairman. In December 2014 this body provided a recom
mendations report to the FCC that focused on maintaining security and privacy, and in
cluded the following: monitoring network traffic, ensuring availability of network capacity
and spectrum space for IoT growth, defining the role of FCC in this context, participating
in IoT security activities with other government stakeholders, and conducting consumer
awareness campaigns and internal scenario exercises to be able to respond to “wide
spread consumer events related to IoT” (OECD, 2015).
In 2016, the United States passed a bill which required “the establishment of a working
group tasked with identifying proposals meant to facilitate IoT growth.” The bi-partisan
Page 12 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Developing Innovation and Growing the Internet of Things (DIGIT) Act requires the fol
lowing:
The working group must: (1) identify federal laws and regulations, grant prac
tices, budgetary or jurisdictional challenges, and other sector-specific policies that
inhibit IoT development; (2) consider policies or programs that encourage and im
prove coordination among federal agencies with IoT jurisdiction; (3) implement
recommendations from the steering committee; (4) examine how federal agencies
can benefit from, use, and prepare for the IoT; and (5) consult with nongovern
mental stakeholders.4
In January 2017 the US Department of Commerce released a “green paper” which identi
fied four areas of engagement related to IoT on which to focus: enabling infrastructure
availability and access, crafting balanced policy and building coalitions, promoting stan
dards and technology advancement, and encouraging markets. This report was based on
analysis of comments gathered during a consultation process that included a wide variety
of stakeholders (from private sector, academia, government, and civil society). The execu
tive summary suggests four key principles to define US IoT policy: ensuring an IoT envi
ronment that is inclusive and widely accessible to consumers, workers and businesses;
recommending policy and taking action to support a stable, secure and trustworthy IoT
environment; advocacy for an open and globally interoperable IoT environment built on
industry-driven, consensus-based standards; and encouraging growth and innovation by
reducing barriers to entry for expanding markets and by convening stakeholders to ad
dress public policy challenges (US Department of Commerce, 2017, p. 2).
Initiatives described cover a range of methods to optimize IoT availability, digital inclu
sion and utility across the United States, including “empowering communities to become
smart cities” (p. 21). Such programs support the development of smart municipal infra
Page 13 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
structure, including broadband provision. Questions of privacy, security, and data owner
ship, as well as standards development, are also addressed by the proposed initiatives;
however, while comments from stakeholders who took part in the consultation are noted
as highlighting transparency in both the decision-making process and in data handling, it
is not clear exactly how some of these will be implemented. Table 23.3 summarizes how
the themes relate to the case study.
The UK government has invested significantly in IoT, with funding allocated under Inno
vateUK, the Catapult schemes, and through the Department for Digital, Culture, Media,
Page 14 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
and Sport.5 Many cities around the United Kingdom are implementing IoT technology so
lutions and aiming to become “smart cities.” This has included the identification of 22
“superconnected cities” and a specific program of investment to these between 2010 and
2015, with up to £150 million to develop cities’ digital infrastructure, focusing primarily
on broadband capacity and provision of public WiFi.
In December 2014, the UK Government’s Chief Scientific Advisor Sir Mark Walport re
leased a report, the Blackett Review on the Internet of Things, discussing potential im
pacts and risks of IoT technology. In this report, the Internet of Things was highlighted as
critical to the United Kingdom’s economic growth, with discussion of the importance of
developing national or international standards to enable a consistent infrastructure,
cross-connectivity and interoperability, as well as to “ensure the system is trustworthy
and trusted” (Walport, 2014, p. 8). Security is a key concern raised in maintaining trust
worthy devices and data systems, with standards recommended to provide “security by
default.” For this to be implemented, there is a need to consider both the devices and the
system(s) in which they are embedded.
In May 2015, a briefing paper highlighted the Internet of Things as one of the key issues
for Parliament.6 IoTUK, a collaboration between the Digital Catapult and Future Cities
Catapult, was set up to manage and coordinate UK IoT investment and growth, support
ing government funded projects.7 Additionally, an all-parliamentary group on smart cities
was set up. The British Standards institute has also published several guidance docu
ments and standards, including in 2015 an overview of the smart cities landscape,8 and
Publicly Available Specification (PAS) documents in 2017 giving practical guidance for de
veloping smart city strategies.9 This is in addition to a policy paper on UK digital strategy
published in March 2017, which includes a short section on the Internet of Things (De
partment for Digital, Culture, Media and Sport, 2017).
By 2016, IoTUK was reporting large amounts of UK IoT investment, including £42m pri
vately invested into IoT companies since mid-2015 (IoTUK, 2016). The fast growing scope
of the industry indicates the criticality and urgency of introducing appropriate policy and
regulation. The same year, a study designed to support policy feedback for IoT develop
ment in the United Kingdom was commissioned by IoTUK and BCS, The Chartered Insti
tute for IT, and carried out by policy research organization RAND Europe. The nature of
IoT governance, and specifically data governance, was a question raised in the report,
with indication from case studies that there has been a lack of consistency in this area,
with businesses creating their own data governance structures in an ad hoc manner to
suit their needs. Some of those organizations that contributed to the report saw data gov
ernance as an ethical rather than a technical question, relating to who should have ac
cess to personal data. The report also highlighted that because there (p. 642) has not yet
been much experience of privacy breaches, technology providers “rarely considered po
tential wider privacy implications when developing and implementing their
solutions” (Gunashekar et al., 2016, p. 30). The report also considered the importance of
citizen representation and involvement, stating that “the significance of involving con
sumers of technology in informing IoT policy and in decision making cannot be
Page 15 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
overestimated” (p. ix). It did, however, conclude that clearly defined data governance pro
cedures were, in general, seen as “the key to joining up systems, facilitating seamless in
teroperability, and, consequently, enabling successful IoT implementations” (p. 23).
The UK Digital Strategy published in 2017 highlights three examples of funding for re
search and innovation in IoT: NHS test beds for health-related IoT innovations,10 the PE
TRAS IoT research hub,11 and the Manchester Cityverve smart city demonstrator.12
Manchester was well-placed to obtain the large Cityverve project, as a pioneer of new de
volved government structures in the United Kingdom, giving greater local power and ac
countability through an elected mayor via the 2014 Devolution Agreement (GMCA, 2018).
This project has enabled the region to join up public services and centralize data systems,
facilitating “open data” access to regional datasets, coordinated by the Greater Manches
ter Data Synchronization program (GMDSP).13 Speaking at the All-Parliamentary Group
on Smart Cities, Minister for International Trade Greg Hands stated a commitment to
supporting the Internet of Things and being a world-leader in smart cities by co-operating
to present a single UK smart city offer (Say, 2017). It is not clear, however, what support
is being offered at the individual city level beyond the larger projects mentioned earlier.
Table 23.4 summarizes how the themes relate to the case study.
Page 16 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
One approach in comparing smart city implementation is that taken by digital market re
search organization Juniper Research, which defines a smart city as “an urban ecosystem
that places emphasis on the use of digital technology, shared knowledge and cohesive
processes to underpin citizen benefits in vectors such as mobility, public safety, health
and productivity” (Sorrell, 2017, p. 2). Based on metrics including technology, transport,
energy, open data, apps and the economy, Juniper Research14 releases an annual report
with a ranking of “top smart cities.” The top ranked cities in 2017 were Singapore, Lon
don, New York, San Francisco, and Chicago. Previous years’ lists also included high rank
ings for Barcelona and Oslo, but there are numerous other examples of smart city initia
tives worldwide.
Popular deployments that different cities are implementing include smart lighting, waste
management, traffic management, air quality sensors, and services associated with free
WiFi. Long range, low power wireless technologies such as HaLow and LoRaWan15
promise capacity for a wide deployment of sensors and other devices, expanding the ca
pabilities and versatility. In the last few years, many applications and services have been
implemented at the local level by councils or other city governance bodies. Some of these
may be deployed individually through smaller initiatives, while others are part of concert
ed efforts to create connected smart city environments. IoT deployments are generally
implemented with the aim of providing benefit to the people, often under programs with
broadly defined goals such as “reducing harm” (Aberdeen City Council, UK).
Three short case studies of IoT deployments in Chicago (US), Songdo (South Korea), and
New York (US) will now be presented. While relatively similar in their profile as large
cities, they demonstrate differences that provide an indication of the wide variance in
terms of governance models in urban spaces, and each provides a focus on one of the
three principles of governance identified previously.
The city of Chicago has a long history of data collection for public use. Set up in 2010, a
data portal16 requires by executive order the provision of data from every city agency, and
provides public access to wide ranging data sets, from metrics of sanitation and (p. 644)
graffiti removal, to building permits issued, and individual taxi trips taken in the city. The
Open Data Executive Order (No. 2012-2) specifies unprecedented transparency, honesty
and accountability as objectives for the city.
Page 17 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
The Chicago Array of Things project began in 2014, and received funding as part of the
United States’ national Smart Cities Initiative. It grew out of a smaller project initiated in
2013 by Charlie Catlett and the Computation Institute’s Urban Center for Computation
and Data, to teach high school students about data collection in cities (Mendelson, 2015).
The project describes itself as a “fitness tracker” for the city, with the goal of measuring
detail of the city “to provide data to help engineers, scientists, policymakers and resi
dents work together to make Chicago and other cities healthier, more livable and more ef
ficient.”17 The intention was that devices would be deployed at a variety of locations in
the city, placed on municipal lampposts, housing a variety of sensors chosen based on in
formation from local citizens and stakeholders about what would be of use (Moser, 2014).
For example, Catlett was contacted by residents and local services who wanted air quali
ty data, therefore involving sensors to measure nitrogen dioxide, ozone, carbon monox
ide, hydrogen sulfide and sulfur dioxide levels.
The original deployment was managed by the University of Chicago and Argonne Nation
al Laboratory, in collaboration with the City of Chicago. This work encountered issues
finding appropriate locations, power sources, and data connectivity to deploy air quality
sensors, despite support from government officials. However, it laid the groundwork for a
much larger initiative. The subsequent collaboration to develop the Array of Things aimed
to deploy a wide range of sensors across the city. Initially proposing a roll-out in 2014, the
project experienced some controversy and push back from the public, who proved to be
wary about potentially intrusive technological installations and the privacy implications
that might result (Mosendz, 2014; Moser, 2014).
Concerns raised in press coverage included the fact that the devices would collect infor
mation on WiFi and Bluetooth devices in order to gather data on pedestrian numbers.
There were also questions about the decision-making and governance process. For exam
ple, Alderman Robert Fioretti said that the project team should have obtained permission
from the City Council before going ahead with the project (Byrne, 2014). This was not on
ly due to the potential privacy issues raised by the installation, but also by questions of
ownership of data, and accusations of potential lost income by not charging a private da
ta collection service for using public utility poles, rather than permit free use to a public-
academic collaboration.
There was significant media interest in the project and the implications for the public,
which led to a delay while the privacy policies and technical infrastructure were redevel
oped to address some of the concerns raised. Deployment recommenced in 2016 with
more attention to the governance of the project in part as a response to the public push
back noted previously.
Initial privacy policy and oversight arrangements were made public on June 13, 2016, fol
lowed by a three-week “listening period” during which residents were invited to provide
feedback. This included two public listening sessions at libraries, managed by the non-
profit organization Smart Chicago Collaborative (Elahi, 2016a). Additionally, input
(p. 645) was sought via public forums and a digital tool called MyMadison.io, created by
Page 18 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
the OpenGov Foundation and described as “a government policy co-creation platform that
opens up laws and legislation previously off-limits to individuals and the Internet commu
nity.”18 Responses to these policy events and questions asked by the public are available
online19 and consider several key aspects of privacy, governance, and accountability.
It was agreed that the first nodes in the system would not be installed until finalization of
the policies, two or three weeks after the completion of the public consultation. The final
policy would also be approved by employees from the city’s Department of Innovation and
Technology, as well as the law department, and communities would be able to make sug
gestions on the placement of sensor nodes using the project website. The governance and
privacy policies were released in their final form on August 15, 2016 and are available on
the project’s website.20 These include details of an Executive Oversight Council responsi
ble for oversight of the program, co-chaired by the Commissioner of the City’s Depart
ment of Innovation and Technology and Charlie Catlett (Director of the Urban Center for
Computation and Data, and the original founder of the project). This committee is made
up of representatives from academia, industry, non-profits and the community, and sup
ported by additional specialist groups such as the Technical Security and Privacy Group
and Scientific Review Group, who will evaluate operations and give recommendations, as
appropriate.
The project now presents itself as “community technology” (Mendelson, 2015) and high
lights its focus on transparency and openness. The devices do not collect data on individ
uals, and have been modified to process and analyze the data directly, reducing security
and privacy concerns by removing the necessity to store or transmit data. The devices
themselves have been designed to be large and mounted at eye level “to be more visible
and less mysterious” (Mendelson, 2015).
Some people, however, were still concerned about issues of privacy even in this second it
eration of the project. For example, Stella (2016) questions the implementation of the
new privacy policy, commenting that the algorithms do still retain some photographic da
ta for later access despite the privacy policy stating that images will only be used for a
short time for analysis. The data itself is owned and thus controlled by the University of
Chicago. Some also criticized the privacy policy as initially written for being too brief in
its descriptions of how data will be collected and used, with Ray Everett, a founding
board member of the non-profit International Association of Privacy Professionals, noting
that unlike a consumer purchased device that individuals place in their own home (such
as an Amazon Echo) it is not possible to opt-out when you are walking in a public space.
Due to the nature of the deployment, it would affect many citizens in Chicago, even those
who might be unaware of it, and a greater level of scrutiny is needed (Elahi, 2016b).
Chicago Array of Things is unusual in its direct academic origins and the nature of its im
plementation, delay due to public pushback, and incorporation of consultation. The con
troversy that the project experienced led to changes in implementation, both in terms of
governance and the functioning of the devices themselves.
Page 19 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
since the initial iteration of the project raised concerns due to deficits in these key areas;
however, it is particularly useful for examining issues of citizen representation and
agency. When the project began, citizens’ views were incorporated in terms of where sen
sors may be most usefully placed, and what data might benefit the city and its residents.
However, a lack of public consultation and transparency meant that concerns were raised
about the purpose and nature of the deployment. By incorporating new governance struc
tures that more heavily incorporated public consultation, the project aimed to more fully
provide representation and agency. Despite this, there are still concerns with deploy
ments of this nature where citizens have limited control over whether or not their data is
collected, since “opting out” is difficult when IoT devices are deployed in public spaces.
South Korea has a reputation as an extremely technologically advanced nation. The capi
tal, Seoul, initiated the Smart Seoul 2015 project to capitalize on existing developments
and bring together many different initiatives to boost the city’s smart infrastructure
(Hwang & Choe, 2013). Much of this smart city development work is government-facilitat
ed. However, there have also been initiatives that are public-private collaborations, such
as an NFC-based mobile payment system, and citizen developed initiatives such as the
School Newsletter Application, which sends alerts to parents (Hwang & Choe, 2013).
Page 20 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
dard governance structures in Korea, which it suggests “will make the daily lives of citi
zens more convenient and simplify decision making procedures when problems arise thus
making swift actions possible” (p. 31). However, there are no details provided about how
these simplified decision-making structures will operate and how they will incorporate
citizens’ views and needs, or what other risks may arise from reduced governance struc
tures. Some have noted similarities between the governance exemptions here and in oth
er spatially limited, highly controllable regions such as Singapore, which, although por
trayed technically as a democracy, is dominated by a single party with a high level of con
trol of systems (Maxwell, Watts, & Purnell, 2016). Carvalho includes a little more detail
on this flexible governance structure, including the fact that exemptions were granted
from national and local policy frameworks such as procurement and building height regu
lations. They argue that this provided opportunities to test new services and business
models which would not fit with existing regulations and practices, such as foreign and
privately supplied IT solutions which may be partly monopolistic (Carvalho, 2015).
The private party in question is largely Cisco, who gained the contract to implement the
city structures, and aims to offer “cities as a service” whereby a single, Internet-enabled
utility will charge residents to provide bundled urban necessities such as water, power,
traffic and telephony (Lindsay, 2010). Carvalho also criticizes aspects of the implementa
tion, suggesting that technology was “largely pushed from corporations to residents, in a
rather inflexible fashion” (Carvalho, 2015, p. 50). Carvalho is concerned that Cisco’s solu
tions have been developed outside of the country and brought in, leaving limited possibili
ties for input from local expertise of users and stakeholders. In fact, as Shwayri (2013)
points out, the city was planned in large part with foreign investors and immigrants in
mind. There is also a suggestion that solutions being offered are at the level of individual
consumption and not structural, providing ease of use but not infrastructural benefits to
improve wider city efficiencies.
This case study raises questions around transparency and citizen representation and
agency, but primarily highlights accountability as an issue. While facilitated by govern
ment, implementation is led by private companies. This may have a significant impact on
accountability, particularly if their involvement has been facilitated by suspending normal
standards and regulatory processes.
Page 21 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
In January 2016, New York City began to install free WiFi across the city (Lufkin, 2016),
through the installation of “links”—hub kiosks that deliver high-speed gigabit WiFi as well
as phone calls, device charging, and city services via a touchscreen interface. These
LinkNYC devices were developed and provided by a company called CityBridge, a consor
tium of companies which ultimately is part of Google’s umbrella corporation, Alphabet
(Pinto, 2016); their aim is to roll out 7,500 units over 12 years.21 The units are not only
free to users but provided to the city free of charge, funded by “advertising, sponsorships
and partnerships” (as described on the project website).
The provision of the technology by a private company means that CityBridge is responsi
ble for its management and implementation. Sottek (2014) points out that the commercial
motivations of the system makes it likely that that its roll out will be influenced by profit
rather than public service, and that poor neighborhoods may be unfairly discriminated
against when choices are made as to where to install the devices, as they will be placed
preferentially based on predicted advertising revenues. This is an issue given that the
system was promoted to the city in part based on solving the digital divide by the provi
sion of free municipal WiFi. The level of service provided is also affected by this, as re
ported by Smith (2014), who found that while kiosks were being deployed throughout the
city, WiFi speeds were up to 10 times slower for those kiosks without advertising. These
slower kiosks make up a much larger proportion of those in poorer areas of the city, po
tentially increasing rather than reducing the digital divide, and demonstrating segmented
service in a similar manner to that enabled by the decision of the FCC to no longer en
shrine Net Neutrality (Fung, 2018).
There have also been issues in the deployment with regards to governing the usage of the
devices. When initially deployed, the LinkNYC kiosks included the facility to operate as a
web browser, allowing users to view internet content. In September 2016, however, the
web browser functions were removed after complaints from residents, businesses, and
elected officials that they were being abused by users spending excessive time at them,
or using them to view pornography (McGeehan, 2016). LinkNYC released a statement de
scribing changes made in response to this and other community concerns such as limiting
maximum volume at night, suggesting that the system was designed to be flexible “so we
can learn how people use LinkNYC, how they want to see it improved, and make adjust
ments over time” (Citybridge, 2017).
Another issue which has arisen concerns the potential of the devices to infringe upon pri
vacy. They require a log in, and collect MAC and IP addresses which, since they are asso
ciated with personal mobile devices, can be used to identify and track individuals and
connect this with their web browsing. Pinto (2016) raises this concern but also questions
the right of the city to surrender personal data on behalf of citizens by agreeing to the
private contract for the service, in effect selling citizens’ privacy to a for-profit company.
They also are not reassured by the company’s response that they are reviewing their pri
vacy policies to reflect actual practices, since the privacy policy was “written (p. 649) be
Page 22 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
fore we knew exactly how the network would operate.” In Pinto’s view this indicates City
Bridge is “making this up as they go along.”
Other companies are now competing with LinkNYC. For example, LQD WiFi, bought by
telecommunications company Verizon in November 2016, has developed a similar kiosk
system called Palo. It appears that LQD Wifi is planning to pilot these in at least one area
of New York, New Rochelle (Lunden, 2016). This may introduce competition or it may
mean that the city must introduce further governance and regulations regarding the de
ployment.
This case study provides a contrast to those discussed so far as it is a wholly private ser
vice deployed in the city at no point of use cost to the city or citizens, providing technolo
gy infrastructural services but supported by commercial concerns of advertising and data
sales. This leads to particular issues with regards to transparency, as the private compa
ny does not make clear the details of their governance, nor underlying motivations which
may impact upon the service and its function, such as the discriminatory impact of adver
tising-led service. As a privately led deployment that is authorized by the city, this also
places limits on accountability, and citizen agency or representation.
Conclusion
The case studies presented each show elements of how different IoT governance princi
ples can affect or interact with the nature and outcomes of IoT deployments. They also
represent different levels of governance in operation, particularly between the top-down
national governance and more bottom-up city-level deployments that may include differ
ent stakeholders. Currently there are many different governance strategies for IoT de
ployments, as the number of these interventions steadily grows. Without proper gover
nance, there are risks that these deployments can have consequences for the public, af
fecting privacy and security, especially given the extreme rate at which the use of these
devices and systems is growing (Umeh, 2014). This applies at the national and suprana
tional level in terms of top-down legislation, regulation and national policy, and also at the
local deployment level where currently there seems to be a wide range of governance
models and strategies that do not necessarily appear to be guided by specific national
policy. This is understandable given that said national policies are often limited in terms
of guidelines for local implementation.
Looking at the top-down governance models we examined of the European Union, the
United States, and the United Kingdom, we can see that they share several common fea
tures. Economic growth and innovation are often priority areas of national interest, and
funding packages and incentives for private sector leadership are encouraged. All three
also highlight the importance of trust, privacy, and security, and include the need for reg
ulation and ethical standards to prevent exploitation of the public. But despite this strong
support from central government for IoT investment, implementation at the (p. 650) city
level is often less structured and inconsistent. There appears to be a gap between the
type of top-level recommendations and regulations that are communicated by governing
Page 23 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
bodies, and the day to day governance structures that are required locally for a success
ful implementation.
The three examples of local (city-level) deployments indicate a small fraction of the range
of different models that might allow deployments, including public-academic partnerships
(in Chicago), public-private partnerships (in Songdo), and fully private initiatives support
ed by local government (in New York). We must also consider the critical role played by
fully grass-roots, citizen-led deployments, which can improve democratization. These are
becoming more common with the availability of cheap, off-the-shelf IoT devices and com
ponents (Surman & Thorne, 2016), and open-source code bases that allow “tinkering” by
citizen groups and individual hobbyists to contribute to IoT infrastructure and address
shared concerns (Kortuem & Kawsar, 2010).
The examples given also show that pushing out a deployment rapidly without full consid
eration of governance, privacy implications for the public, and the long-term implications
of such technologies can have negative impacts such as increasing public mistrust (as in
the case of Chicago) or introducing discriminatory practices in provision of “public” ser
vices (in New York). While it is not uncommon that such systems encounter challenges
and need revising after their deployments occur, this may be exacerbated by the urgency
with which these projects are being implemented. The perceived benefits of being able to
implement smart cities technology, and the numerous organizations offering “solutions,”
mean that there has to date been a rush to be included and seen as successful in doing
so.22 Thus, we have seen around the world a large number of pilot projects, demonstrator
indicatives, and rapid deployments,23 which are generally discussed in terms of their posi
tive outcomes, yet undertake limited information sharing about the issues that are en
countered, the barriers to scaling, and other limitations that prevent such pilots being
rolled out more widely in a sustainable manner. In the United Kingdom, for example,
while there are many such initiatives, several of which are world-leading, there is not a
self-sustaining private sector market that can function effectively without public sector in
volvement, and, as Altabev (2017) notes, “we’re still very experimental, we have a situa
tion where we seem to be forever stuck in pilot phases and loving grant funded projects.”
Page 24 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
for their needs, and evaluation of risk. This is a critical area for ongoing research. Fur
ther, reviewing the literature leads us to recommend that governance of these systems
should be an evolving process rather than a static decision, adaptable to the changing
technologies involved, and to the needs of stakeholders including industry, citizens and lo
calities.
References
Almeida, V. A., Doneda, D., & Monteiro, M. (2015). Governance challenges for the Inter
net of Things. IEEE Internet Computing, 19(4), 56–59.
(p. 652) Angelidou, M. (2014). Smart city policies: A spatial approach. Cities, 41, S3–S11.
Angelidou, M., & Psaltoglou, A. (2017). Enhancing urban sustainability through social in
novation: Citizen environmental sensing for air quality monitoring. Sixth international
conference on environmental management, engineering, planning and economics, (CE
MEPE) and SECOTOX, Thessaloniki, Greece. https://www.researchgate.net/publica
tion/318014463
Ashton, K. (2009). That “internet of things” thing. RFID Journal, 22(7), 97–114.
Balestrini, M., Diez, T., Marshall, P., Gluhak, A., & Rogers, Y. (2015). IoT community tech
nologies: Leaving users to their own devices or orchestration of engagement. EAI En
dorsed Transactions on Internet of Things, 1(1). http://dx.doi.org/10.4108/eai.
26-10-2015.150601
Borowiec, S. (2016). Skyscrapers? Check. Parks? Check. People? Still needed. Los Ange
les Times (May, 31st). Retrieved from http://www.latimes.com/world/asia/la-fg-korea-
songdo-snap-story.html
The Bristol Approach. (2018). Project: Damp Homes. Bristol, UK: The Bristol Approach.
http://www.bristolapproach.org/wp-content/uploads/2018/05/Portrait-Resource-
DAMP-HOMES.pdf
Byrne, J. (2014). Alderman wants hearing on Emanuel deal to install light pole sensors.
Chicago Tribune (June, 23). Retrieved from http://www.chicagotribune.com/news/lo
cal/politics/chi-alderman-wants-hearing-on-emanuel-deal-to-install-light-pole-
sensors-20140623-story.html
Page 25 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Chen, L. J., Hsu, W., Cheng, M., & Lee, H. C. (2016). LASS: A location-aware sensing sys
tem for participatory PM2. 5 monitoring. In Proceedings of the 14th annual international
conference on mobile systems, applications, and services companion (p. 98). ACM. http://
dx.doi.org/10.1145/2938559.2938560
Citybridge. (2017). Update about our services. Citybridge. Retrieved from https://
www.link.nyc/service-update.html
Department for Digital, Culture, Media and Sport. (2017). Policy paper: UK Digital Strate
gy. https://www.gov.uk/government/publications/uk-digital-strategy
Douriez, M., Doraiswamy, H., Freire, J., & Silva, C. T. (2016, October). Anonymizing NYC
taxi data: Does it matter? In IEEE international conference on data science and advanced
analytics (DSAA), 2016 (pp. 140–148). IEEE.
Elahi, A. (2016a). City seeks input on privacy policy for Array of Things sensor network.
Chicago Tribune (June, 10th). Retrieved from http://www.chicagotribune.com/bluesky/
originals/ct-array-of-things-privacy-policy-bsi-20,160,610-story.html
Elahi, A. (2016b). City needs more detail in Array of Things privacy policy, experts say.
Chicago Tribune (June, 20th). Retrieved from http://www.chicagotribune.com/bluesky/
originals/ct-expert-array-of-things-privacy-policy-bsi-20,160,621-story.html
European Commission. (2013). Report on the Public Consultation on IoT Governance. Eu
ropean Commission. Retrieved from https://ec.europa.eu/digital-single-market/en/
news/conclusions-internet-things-public-consultation
European Commission. (2016a). Commission staff working document: Advancing the In
ternet of Things in Europe. European Commission. Retrieved from https://ec.europa.eu/
digital-single-market/en/news/staff-working-document-advancing-internet-
things-europe
European Commission. (2016b). The Alliance for Internet of Things Innovation (AIOTI).
European Commission. Retrieved from https://ec.europa.eu/digital-single-market/en/
alliance-internet-things-innovation-aioti
Fung, B. (2018). The FCC’s net neutrality rules are officially repealed today.
(p. 653)
Here’s what that really means. Washington Post (June, 11). Retrieved from https://
www.washingtonpost.com/news/the-switch/wp/2018/06/11/the-fccs-net-neutrality-
rules-are-officially-repealed-today-heres-what-that-really-means/?utm:term=.
7af6cb96fdc4
Furness, A. (2012). Foundations for IoT Governance. In I. G. Smith (Ed.), The Internet of
Things 2012: New Horizons. CASAGRAS2. http://www.internet-of-things-research.eu/
pdf/IERC_Cluster_Book_2012_WEB.pdf
Page 26 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Future Cities Catapult. (2017). Smart City Strategies: A Global Review 2017. Future
Cities Catapult. https://futurecities.catapult.org.uk/wp-content/uploads/2017/11/
GRSCS-Final-Report.pdf
Gartner. (2017). Leading the IoT: Gartner insights on how to lead in a connected world.
Gartner. https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf
Gunashekar, S., Spisak, A., Dean, K., Ryan, N., Lepetit, L., & Cornish, P. (2016). Accelerat
ing the Internet of Things in the UK. Santa Monica, CA, and Cambridge, UK: Rand Corpo
ration.
Hammersley, B. (2013). When the world becomes the Web. Wired. (July 4). Retrieved from
http://www.wired.co.uk/article/when-the-world-becomes-the-web
Hill, N., Gibson, G., Guidorzi, E., Amaral, S., Parlikad, A. K., & Jin, Y. (2016). Scoping
study into deriving transport benefits from big data and the Internet of Things in smart
cities: Final report for Department of Transport. Didcot, UK: Ricardo Energy & Environ
ment.
Hwang, J. S., & Choe, Y. H. (2013, February). Smart cities Seoul: A case study. ITU-T Tech
nology Watch Report. Seoul. https://www.itu.int/dms_pub/itu-t/oth/23/01/
T23010000190001PDFE.pdf
IoTUK. (2016). IoTUK Industry Insights: UK IoT Investment by VCs, Angels and the
Crowd. IoTUK. https://iotuk.org.uk/wp-content/uploads/2016/10/
UKIoTInvestment.pdf
James, I. (2016). Songdo: No Man’s City. Korea Expose (October, 14). Retrieved from
https://koreaexpose.com/songdo-no-mans-city/
Jiang, Q., Kresin, F., Bregt, A. K., Kooistra, L., Pareschi, E., Van Putten, E., Volten, H., &
Wesseling, J. (2016). Citizen sensing for improved urban environmental monitoring. Jour
nal of Sensors, 2016, Article ID 5656245. http://dx.doi.org/10.1155/2016/5656245
Kortuem, G. & Kawsar, F. (2010). User innovation for the internet of things. Proceedings
of the Workshop: What can the Internet of Things do for the citizen (CIoT), Eighth Inter
national Conference on Pervasive Computing (Pervasive 2010), Helsinki, Finland.
Lindsay, G. (2010). Cisco’s big bet on new Songdo: Creating cities from scratch. Fast
Company (February, 1st). Retrieved from https://www.fastcompany.com/1514547/cis
cos-big-bet-new-songdo-creating-cities-scratch
Lee, S. K., Kwon, H. R., Cho, H., Kim, J., & Lee, D. (2016). International case studies of
smart cities: Songdo, Republic of Korea. Washington, US: Inter-American Development
Bank.
Page 27 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Lufkin, B. (2016). NYC’s new public wi-fi is obscenely fast. Gizmodo. Retrieved from
http://gizmodo.com/nycs-new-public-wifi-is-obscenely-fast-1753825735
Lunden, I. (2016). Verizon buys LQD WiFi to expand its IoT strategy into “smart cities.”
Techcrunch. Retrieved from https://techcrunch.com/2016/11/14/verizon-buys-lqd-
wifi-to-expand-its-iot-strategy-into-smart-cities/
McGeehan, P. (2016). Free Wi-Fi kiosks were to aid New Yorkers. An unsavory side has
spurred a retreat. New York Times (September 15). Retrieved from https://
www.nytimes.com/2016/09/15/nyregion/internet-browsers-to-be-disabled-on-new-
yorks-free-wi-fi-kiosks.html
Maxwell Watts, J. & Purnell, N. (2016). Singapore is taking the “Smart City” to a whole
new level. The Wall Street Journal (April, 24). Retrieved from https://www.wsj.com/arti
cles/singapore-is-taking-the-smart-city-to-a-whole-new-level-1461550026
framework for Internet of Things. In IEEE 2nd world forum on Internet of Things (WF-
IoT), 2015 (pp. 801–806). IEEE.
Mendelson, Z. (2015). Chicago’s array of things may give big data boost to urban plan
ning. Next City (October 15). Retrieved from https://nextcity.org/daily/entry/array-of-
things-chicago-smart-cities-data-sensors
Molloy, F. (2018). Fridges that order milk? How the IoT will ease everyday drudgery. The
Lighthouse. (February 13th). Retrieved from https://lighthouse.mq.edu.au/article/
fridges-that-order-milk-how-the-internet-of-things-will-change-everyday-life
Moser, W. (2014). What Chicago’s “Array of Things” will actually do. Chicago Magazine
(June 27). Retrieved from http://www.chicagomag.com/city-life/June-2014/What-
Chicagos-Array-of-Things-Will-Actually-Do/
Mosendz, P. (2014). Chicago gets a new surveillance system straight out of a video game.
The Atlantic (June 24th). Retrieved from https://www.theatlantic.com/technology/
archive/2014/06/chicago-gets-a-new-surveillance-system-straight-out-of-a-video-
game/373339/
OECD. (2015). OECD Digital economy outlook 2015. Paris: OECD Publishing. doi:http://
dx.doi.org/10.1787/9789264232440-en
Page 28 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Say, M. (2017). Minister calls for “single UK smart city offer.” UK Authority. Retrieved
from http://www.ukauthority.com/smart-places/entry/6861/minister-calls-for-sin
gle-uk-smart-city-offer
Shwayri, S. T. (2013). A model Korean ubiquitous eco-city? The politics of making Songdo.
Journal of Urban Technology, 20(1), 39–55.
Smith, I. G. (Ed.) (2012). The Internet of Things 2012: New horizons. CASAGRAS2 http://
www.internet-of-things-research.eu/pdf/IERC_Cluster_Book_2012_WEB.pdf
Smith, G. (2014). Exclusive: De Blasio’s Wi-Fi plan gives slower service to poorer neigh
borhoods. New York Daily News (November 24). Retrieved from http://
www.nydailynews.com/new-york/exclusive-de-blasio-wi-fi-plan-slower-poor-nabes-
article-1.2021146
Stella, R. (2016). Chicago’s innovative new streetlights will monitor the city’s every move.
Digital Trends. Retrieved from http://www.digitaltrends.com/home/city-of-chicago-
adding-sensors-to-its-streetlights/
Sorrell, S. (2017). Smart cities: Strategies, energy, emissions & cost savings 2017–2022.
Juniper Research. https://www.juniperresearch.com/researchstore/iot-m2m/smart-
cities/strategies-forecasts-in-energy-transport-lighting
Sottek, T. C. (2014). New York City’s ambitious free Wi-Fi plan sounds great, unless you
live in a poor neighborhood. The Verge (November 24). Retrieved from http://
www.theverge.com/2014/11/24/7275567/nyc-public-wifi-is-rich
Surman, M. & Thorne, M. (2016). We all live in the computer now: A Netgain paper on so
ciety, philanthropy and the Internet of Things. Netgain Partnership. Retrieved from
https://netgainpartnership.org/internet-of-things/
Umeh, J. (2014). Internet of Things: Exciting yet scary. BCS (September 19). Retrieved
from http://www.bcs.org/content/conBlogPost/2357
the Internet of Things. The Department of Commerce Internet Policy Taskforce & Digital
Economy Leadership Team, National Telecommunications and Information Administra
tion. Retrieved from https://www.ntia.doc.gov/other-publication/2017/green-paper-
fostering-advancement-internet-things
Walker, T. (2018). Smart refrigerators that let you know when the milk is on the turn,
toothbrushes that keep track of dental hygiene and tennis rackets that help you play bet
ter: Welcome to ‘the internet of things’. The Independent. (January, 12th). Retrieved from
https://www.independent.co.uk/life-style/gadgets-and-tech/news/smart-refrigera
Page 29 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
tors-that-let-you-know-when-the-milk-is-on-the-turn-toothbrushes-that-keep-
track-of-9053681.html
Walport, M. (2014). The Internet of Things: Making the most of the second digital revolu
tion. A report by the UK Government Chief Scientific Adviser. The Government Office for
Science. https://assets.publishing.service.gov.uk/government/uploads/system/up
loads/attachment_data/file/409774/14-1230-internet-of-things-review.pdf
Weber, R. H. (2011). Accountability in the Internet of Things. Computer Law and Security
Review, 27(2), 133–138.
Weber, R. H. (2013). Internet of things: Governance quo vadis? Computer Law and Securi
ty Review, 29(4), 341–347. https://doi.org/10.1016/j.clsr.2013.05.010
Weber, R. H. (2016). Governance of the Internet of Things: From infancy to first attempts
of implementation? Laws, 5(3), 28. https://doi.org/10.3390/laws5030028
Weber, R. H. & Weber, R. (2010). Internet of Things. Berlin: Springer Berlin Heidelberg.
Weiser, M. (1991). The Computer for the 21st Century. Scientific American, 265(3), 94–
105.
Notes:
(1.) http://www.urbantransformations.ox.ac.uk/project/jam-and-justice-co-producing-ur
ban-governance-for-social-innovation/
(2.) http://ontheplatform.org.uk/article/mapping-participatory-urban-governance.
(3.) Though a number of the articles do not yet have corresponding laws, making it a doc
ument in development.
(4.) https://www.congress.gov/bill/114th-congress/senate-bill/2607
(6.) https://www.parliament.uk/business/publications/research/key-issues-parliament-2015/
technology/internet-of-things/
(7.) https://iotuk.org.uk/
(8.) PD 8100, Smart cities overview—Guide, summarized in the document Making cities
smarter: Guide for city leaders.
(10.) https://www.england.nhs.uk/ourwork/innovation/test-beds/
(11.) https://www.petrashub.org/
Page 30 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
(12.) https://cityverve.org.uk/
(13.) http://gmdsp.org.uk/
(14.) https://www.juniperresearch.com/home
(15.) https://www.lora-alliance.org/what-is-lora/technology
(16.) https://data.cityofchicago.org/
(17.) https://arrayofthings.github.io/index.html
(18.) http://opengovfoundation.org/the-madison-project/
(19.) https://arrayofthings.github.io/policy-responses.html
(20.) https://arrayofthings.github.io/final-policies.html
(21.) https://www.link.nyc/faq.html#when
(22.) This may be due to pressure from national bodies and funders, but also is likely to be
exacerbated by the tone of numerous workshops, symposiums and conferences aimed at
officials around smart cities, which use language that consistently seems to imply that
public service has to be offering these technologies or they are not modern.
Naomi Jacobs
Peter Edwards
Page 31 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Governance and Accountability in Internet of Things (IoT) Networks
Caitlin D. Cottrill
Karen Salt
Karen Salt is Director of the Centre for Research in Race and Rights (C3R) and Assis
tant Professor at the University of Nottingham. She is an interdisciplinary scholar
with strong interests in transnational American studies and Afrodiasporic studies. A
significant portion of her work investigates how black nation-states have fought for
their continued existence within a highly racialized world. As this work has devel
oped, Dr. Salt has considered the relationship of sovereignty and race to environmen
tal consumption and protection, enabling her to craft new research on racial ecolo
gies. In addition to this work, she currently leads or co-leads projects on reparative
trust, collective activism, racial equity, and transformative justice politics.
Page 32 of 32
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.23
Two workshops were part of the final steps in the Economic and Social Research Council
(ESRC) commissioned Ways of Being in a Digital Age project that is the basis for this
Handbook. The ESRC project team coordinated one with the UK Defence Science and
Technology Laboratory (ESRC-DSTL) Workshop, “The automation of future roles”; and
one with the US National Science Foundation (ESRC-NSF) Workshop, “Changing work,
changing lives in the new technological world.” Both workshops sought to explore the key
future social science research questions arising for ever greater levels of automation, use
of artificial intelligence, and the augmentation of human activity. Participants represented
a wide range of disciplinary, professional, government, and nonprofit expertise. This
chapter summarizes the separate and then integrated results. First, it summarizes the
central social and economic context, the method and project context, and some basic defi
nitional issues. It then identifies 11 priority areas needing further research work that
emerged from the intense interactions, discussions, debates, clustering analyses, and in
tegration activities during and after the two workshops. Throughout, it summarizes how
subcategories of issues within each cluster relate to central issues (e.g., from users to
global to methods) and levels of impacts (from wider social to community and organiza
tional to individual experiences and understandings). Subsections briefly describe each of
these 11 areas and their cross-cutting issues and levels. Finally, it provides a detailed Ap
pendix of all the areas, subareas, and their specific questions.
Keywords: ESRC review, ESRC-DSTL, automation, ESRC-NSF, social science, artificial intelligence, augmentation
Introduction
THIS chapter, like the final chapter (chapter 25), is concerned with future research chal
lenges. Whereas the final chapter is based on all elements of the ESRC project and the
Page 1 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
non-ESRC chapters, this draws on the two workshops undertaken during the projects that
specifically focused on the social impacts of artificial intelligence (AI) and automation:
• UK Economic and Social Research Council and UK Defence Science and Technology
Laboratory (ESRC-DSTL) Workshop: “The automation of future roles”
• UK Economic and Social Research Council and US National Science Foundation
(ESRC-NSF) Workshop: “Changing work, changing lives in the new technological
world”
Both workshops sought to explore the key future social science research questions aris
ing from ever-greater levels of automation, use of artificial intelligence, and the augmen
tation of human activity. Both workshops consisted of a set of domain experts brought to
gether to review these issues in a structured setting. The chapter provides an overview of
the issues identified by the two workshops. Though both workshops followed a similar
format and were supported by the same facilitation team, the approaches (p. 660) taken
and outcomes, though highly complementary, were slightly different. Both workshops de
veloped a broad structure within which to explore questions or issues ranging from global
or societal issues through to personal or individual foci. The ESRC-DSTL workshop pro
duced less of a focus on individual and behavioral aspects compared to the ESRC-NSF
workshop. The ESRC-DSTL workshop developed very specific questions for each level,
whereas the ESRC-NSF workshop generated a set of questions potentially addressed at
one or more levels. Unlike the other ESRC chapters in this book, there is no extensive lit
erature review underpinning the results.
The chapter begins with an overview of the context in which the workshops were devel
oped, followed by an outline of the methods used to facilitate the workshops. Then it con
siders how the workshops defined their scope—this proved broader than the initial start
ing points. Next is an overview of the identified research areas integrating the outcomes
from both workshops. This is followed by more detailed descriptions of the issues and
questions identified in the workshops. The chapter concludes with some reflections on
the key issues and overlaps with the rest of the ESRC review, and provides a detailed Ap
pendix of all the issues, themes, and questions arising from the two workshops.
The impact of digital technologies on work and work experience has been extensively dis
cussed, across multiple academic disciplines, for much of the last half-century: from the
more utopian visions of an “end to work” (Gorz, 1985), to detailed critical studies of the
impact on organizations (Zuboff, 1988), and of course more contemporary accounts and
predictions (Anderson & Rainie, 2010; see also chapters 1, 12, and 23). The issue also at
tracts considerable policy attention in the United Kingdom and the United States where it
is likewise both a major concern for industry (Chui et al., 2015; Manyika, 2017) and a re
curring topic of discussion in the media and popular writing (e.g., Ford, 2015).
Page 2 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
For academic researchers, however, it is an area fraught with challenges, with many of
the key unanswered questions seeming to require interdisciplinary and multidisciplinary
approaches. With these issues in mind, the aims and objectives of the workshops were to
• Assess the social and behavioral research challenges of understanding the impacts of
automation, AI, and augmentation
• Assess major knowledge gaps and discuss how research could help in addressing
these gaps
• Identify priority areas for research and potential research collaborations
• Identify and assess prior academic and stakeholder predictions of the impact of new
technologies on human tasks, roles, and jobs
• Identify and assess methodologies by which impacts and effects can be assessed, in
particular:
These issues were organized into thematic questions as starting points for the workshops:
Page 3 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
reliable slave labor or the higher reliability of water power. Over time, automation of pre
viously manual work and the augmentation of human performance with machines has
been at the heart of the “industrial revolution” from the Spinning Jenny through to
present day digital technologies. This automation and augmentation underpins the con
stant increase in human productivity (see Figure 24.1).
Why then the current concerns over automation and augmentation? A quick review of re
cent media coverage would point to issues of
• Robotics
• Artificial intelligence
• Data analytics
In each case the concern is for human roles being replaced by computing and technology
solutions, from the military (drones), through manufacturing (robots) to office work (AI
and algorithms). Notably the issue of human augmentation with technology is not exten
sively addressed—unless the use of (or claimed excess use) of digital media by children
and young people may be considered an example of media panic over an (p. 662) augment
ing technology (see, for example, chapters 4 and 9). These discussions reflect and are re
flected in popular science and technology books and articles that have often focused on
the negative consequences for work and employment (e.g., Ford, 2015; see also chapter
1) The debate in public media reflects the ongoing debate in academic work around au
tomation, with very different conclusions being drawn over the likely impact of automa
tion and augmentation on work and society. Arguments about the more negative aspects
are often balanced with the more positive or “business as usual” models. The common
thread in much of this debate is the question of the impacts upon levels of employment
that automation and augmentation may engender.
Page 4 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
turies, the more positive argument was that in the long term “compensation effects” in
the economy would generate new jobs that would match or outweigh short term “techno
logical unemployment.” Compensation effects include: manufacture of new machines, in
vestments in new products, wage changes either increases and spending or reductions
leading to increased reemployment, and lower prices and higher demand. As a result, lev
els of wage growth, employment, and productivity have grown together over the long
term—though short-term technological unemployment and de-skilling have happened (see
Figure 24.1). More recently, economists have argued that compensation effects are no
longer keeping pace with the impacts of high-performance computing; thus, technological
unemployment has become a structural feature of the economy (Brynjolfsson & McAfee,
2014; Ford, 2015). This has been popularized as (p. 663) the “hollowed out middle” where
higher-skilled “blue collar” and lower-skilled “white collar” work has become automated,
such as through robots in the factory and algorithms in the office (Ford, 2015; Madland,
2015).
Page 5 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
ESRC-DSTL ESRC-NSF
Page 6 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Page 7 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
of consensus positions though documenting interactions and debates. In this sense the
workshops functioned as a condensed Delphi consultation (see Linstone & Turoff, 1975;
chapter 2). In both cases the workshops involved participants engaging in a range of ac
tivities designed to break down potential issues and questions, gain consensus on the key
issues, and then restructure these into themes. This also included work on likely time
lines and challenges. Much of the work involved applying visual sorting and clustering
methods to topics generated through the interactions and debates. The methods used
were designed (p. 665) by the facilitators and built on prior work designed to generate
ideas for and develop the details of interdisciplinary research projects. Figures 24.2 to
24.4 provide examples of the clustering work undertaken at the workshops (providing two
examples of the Post-it Notes prepared and initially organized by the teams, and re-orga
nized through general discussion; and an example of how those were re-analyzed to de
rive a more condensed and clear structure).
Page 8 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
The primary outcomes from the workshop are a set of future research areas broadly de
fined, as well as specific research questions, to which the attendees thought that social
and behavioral sciences could or should make a significant contribution. Within these, a
large number of specific research questions and topics were identified and are detailed in
the Appendix. The “Ways of Being” team built on the clustering and linking work under
taken in the workshop to collate these questions and topics into coherent themes. The
themes from both workshops show considerable overlap, and the following sections
present overviews of these themes.
Page 9 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Definitions
In both of the workshops the definition of key terms and scope was an important initial
discussion point. Though the declared foci of the workshops were on workplace (p. 666)
technologies, especially automation and AI, separating automation, AI, augmentation, al
gorithms, and digital technologies in general proved problematic, as did the distinction
between workplace and broader socio-economic issues. As a result, at its broadest the
discussion addressed the social and global impacts of digitization, but also addressed nar
rower questions of human-machine interaction. The discussions especially reflected on
It was noted that “Automation” and “Augmentation” marked points on a spectrum of tech
nological interventions in human action. Some systems remove all human intervention
and are fully “automated”; others “augment” human abilities through the automation or
enhancement of aspects of a task or activity. It was strongly argued that separating these
in an arbitrary manner was unhelpful. Further, it was noted in the workshops that ideas
of “digitization” and “automation” appeared to both overlap and sometimes be synony
mous. Importantly, it was recognized that digitization provides (p. 667) (p. 668) the oppor
tunity for considerable automation of tasks or augmentation of human actors, as it opens
the data or activity to computational processing. For the purposes of this chapter, the fo
cus is therefore on systems that automate tasks or augment human action—where digiti
zation or artificial intelligence is in many cases a necessary but not sufficient condition
for the automation or augmentation.
Page 10 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Reviewing these areas, the team noted that each included, to a greater or less extent, the
following issues:
Not all topics were seen to intersect with all issues, although taken together the two lists
produced 29 intersecting topic–issue pairs (see Table 24.2).
Page 11 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal Impacts of Automation: Findings from
Two Expert Panels
Topics User Issues Citizen Issues Social Issues Global Issues Methods Is
sues
Technology X X X X
development
and adoption
Trust X X X
Complexity X X X
and the scale
of the topic
Evidence and X
methods
Global envi X X X
ronments
Education, X X
skills, and em
ployment
Inequalities X X X
Page 12 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal Impacts of Automation: Findings from
Two Expert Panels
Embodiment X X
and cognitive
demands
Ethics X X X
Impactful so X X X X X
cial science
Page 13 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
These topics and issues are very similar to the outcomes of the ESRC-DSTL workshop.
The eight main topics identified by the workshop were
As with the ESRC-NSF workshop, questions about impacts were grouped into three lev
els:
All topics were deemed to intersect with these, creating 24 potential starting points for
research. Finally, the workshop noted some specific concerns that were relevant for some
topic-level intersections. Table 24.3 provided the topics, levels, intersections, and those
specific concerns.
Page 14 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Community X X X
and social is
sues
Meaningful life X X X
roles
Page 15 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Research meth X X X
ods
Looking at the content and discussion underlying these lists from the two work
(p. 670)
shops we find very similar issues. We have combined these into 11 core topic areas that
are examined in the next section:
This issue probably underpins the whole debate. Although it shows up in a variety of is
sues in the all the following discussion, it was only separately identified in the ESRC-
DSTL workshop. Table 24.4 highlights the potential research questions that the workshop
identified for each level. These clearly overlap with issues around trust and also around
technology development. These are clearly research questions that can be addressed by a
variety of disciplines, from the humanities (especially the historical, media, and cultural
aspects) as well as social sciences, political sciences, and economics. It reflects the large
question of how societies understand, discuss, and evaluate AI and automation technolo
gies.
Page 16 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
All the workshop discussions included very high level and broad questions about the so
cial, personal, and psychological impacts of automation. Much of this discussion focused
around issues of technology adoption. Technology adoption (see chapter 13) is a well-re
searched area (Davis et al., 1989; Venkatesh, 2000; Venkatesh & Davis, 2000; Venkatesh
et al., 2003) with many case study-based studies of specific technology implementations.
Within the analysis, this category functioned as a catch-all for general questions about
the impacts of automation. These often reflected broader general questions proposed in
media coverage and popular accounts. Examples included
(p. 672)
• How do we prepare for a world of intelligent computational aspects (beyond work is
sues)?
• What are the risks and benefits of emerging technologies?
• Will we be blindsided by some new technology, such as a brain-computer interface?
Page 17 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
• How do you conduct research concerning citizens who do not want to adopt technol
ogy?
• People working longer with technology. Will new technology allow people to work
more efficiently or have more leisure time? Is there an absence of utopian thinking
about the future of work?
The ESRC-DSTL workshop identified “system design” as a key topic area, though the un
derlying questions clearly overlap with topics from the ESRC-NSF workshop that focused
on embodiment, cognitive demands, and ethics. Table 24.5 details the questions identified
in the ESR-DSTL workshop.
This was a key discussion point throughout the workshop. There appeared to be three
themes to this cluster in the ESRC-NSF workshop:
The first theme focuses on the knowledge and skills of citizens and their ability to assess
(or not) technology; i.e., to what extent is trust of technology based on substantial under
Page 18 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
standing. Do citizens have the digital knowledge and skills to evaluate automated, algo
rithmic, and augmented systems at work and in everyday life? Do they understand
(p. 673) what data they are sharing? How can research help them to understands this?
What research is needed to highlight the understandings and assumptions citizens have
about automated systems?
This second theme focused more on the relationship between citizens and automated sys
tems. In particular, there was a focus on how to manage and develop a trusting relation
ship and to mitigate conflict with automated systems. Questions included:
The third theme concerned the social and political impacts of automation and trust in au
tomated systems. This included both issues of challenging these new technologies as well
as the consequences of not challenging these. Overall, there was a focus on the social
consequences (positive or negative) of ever-increasing automation of systems and ser
vices (whether well-designed or not). Key questions were
The ESRC-DSTL workshop issues of trust clearly overlap with the topics from the ESRC-
NSF workshop, though presented differently (see Table 24.6). One of the key (p. 674) con
cerns at the ESRC-DSTL workshop was that of governance and oversight of AI and aug
mentation. At all three levels of impacts the following question was asked:
• What are the appropriate oversight and governance models for an automated world?
Page 19 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
A recurring theme in the discussions was the “complexity and scale of the topic.” Many of
the points made were not “research questions” but rather “meta” questions or proposals
on how to manage and deliver research in a complex and quickly changing technical and
social landscape. As already noted, the workshop found it difficult to focus simply on au
tomation, or workplace technology interaction. The implications of greater automation
across work domains and non-work contexts could not be easily unpacked. Digital tech
nologies were seen to be pervasive and have multiple interlinked consequences. This led
to concerns and questions about how research topics could be managed, interdisciplinari
ty, speed of change, slow processes of research funding and execution, need to obtain and
provide data for policy “quickly,” and relevance of academic work to a fast-moving indus
try. These were grouped into four clusters:
Page 20 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Interdisciplinarity was a consistent theme in the discussions. This was of course the con
sequence of a strongly multi-disciplinary meeting and event. The need to utilize multiple
disciplines in addressing the complexity of the issues was noted—especially across the
arts-social science-engineering spectrum. A number of consequences of this were also
noted, especially the need to recognize that topics new to one discipline may have al
ready been examined (though potentially in different ways) by other disciplines. This pri
or work might have already generated data sets available for re-analysis. This pointed to
a need for disciplines to support each other, including the sharing of tools, methods, and
knowledge, as well as re-analysis of data.
As noted earlier, the workshop participants emphasized the scale of the impacts of au
tomation and digital technologies. This awareness raised a set of practical questions
about how to manage research in such a dynamic context. A key one was undertaking re
sponsive and timely research. This arises form practical concerns of dealing with a dy
namic and changing evidence base, the timeliness of research, the need to develop re
sponses to support policy and action quickly, and the contrast of these timelines with
those for academic publishing.
This cluster included a mix of thoughts and comments by participants with regard to both
the practical and the more theoretical challenges for research on automation that is
(p. 675) relevant to policy or that itself has broader social implications. In particular, ethi
cal questions were raised about what should or should not be researched or developed.
Practical questions focused on short- to medium-term policy questions about appropriate
research and development. More theoretical questions considered the utopian and
dystopian implications of research and development around AI and automation.
Cross-cutting all discussions were questions around what types of evidence we need in
order to understand the social impacts of automation and what methods are needed to
gather and assess this data. A recurrent issue in these discussions was the pace of
change. The perennial question in the study of the social impacts of technology of “Do we
need new methods for studying technologies?” was repeated throughout the discussion in
both workshops. This is of course a double-edged question, as new technologies also pro
vide both new methods and new data sets. Both workshops highlighted the importance of
valuing different disciplinary positions. This was especially the case in the ESRC-NSF
workshop, where participants were from a broad range of disciplines covering all the so
cial and behavioral sciences from anthropology and psychology, through economics and
sociology, to human–computer interaction (HCI) and information studies (see Table 24.1).
The issues of interdisciplinarity and multidisciplinary research were therefore prevalent
throughout the discussion, with a key theme being the need to respect different disci
plines approaches to the same topic. This includes both quantitative and qualitative work,
especially in the context of studying technologies. Both the tension between and comple
mentarity of these approaches and their underlying disciplines arose because studies sup
porting the development of these technologies were predominantly quantitative, while re
Page 21 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
search on the impacts of these technologies was sometimes examined through more qual
itative case studies.
• Which are the most appropriate methods to address questions at the societal, com
munity, organizational, and individual levels?
Both workshops pointed out that this may also reflect disciplinary foci (see Tables 24.2
and 24.3). Psychological methods, for example experimental analysis of person-machine
interaction, may be more appropriate at the individual or organizational level. Potentially,
however, psychological tools to measure attitudes may be used to address wider social
concerns. Sociological survey and ethnographic work might be more likely to be used for
social and community studies. Economics is appropriate for modelling wider impacts in
such areas as jobs and productivity. Cross-disciplinary work was also thought to be key to
a full understanding of issues; for example, psychological studies or purchasing behavior
online, or ethnographic studies of workers in highly automated workplaces (or even of
workplaces undergoing automation).
The need to support methods that deliver for policy or for commercial research
(p. 676)
and development was also noted by participants in both workshops. Given the important
practical and policy implications of potential research in this area, the participants point
ed out that research needs to reach out beyond academia. These questions are not just
about how knowledge can be transferred, but how academic social science can and
should play an integrated role in shaping the consequences of new research and develop
ment in the areas of AI and automation.
Concerns were raised about both methods that use AI or big data but also about the use
of such analytic methods in society without proper thought and review. Many cases of
bias, discrimination, and misinformation as a result of the poor use of AI and data analyt
ics technology across society were highlighted (see chapters 7, 18, 19, and 23). The uses
and abuses of personal and social media data were particularly noted. This pointed to a
broader social and ethical concern for digital research methods: the need to be highly
vigilant for bias in data sets, or bias developed from the use of specific data sets (see
chapter 20). It was noted that society can no longer follow the cultural assumption that
technology is neutral; rather, all digital systems, including AI, are a product of human ac
tion and social processes. Therefore, as researchers we need to be highly aware of the po
tential bias in data gained from, around uses of, or provided about, AI and automated sys
tems. We also need to help educate the public about such potential bias.
Global Environments
Workshop participants did not feel that the impact of automation was confined to either
human-machine interaction or to individuals, groups, or organizations. The ESRC-NSF
Page 22 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
workshop particularly and repeatedly highlighted the impact of automation across a
range of global issues, including
• Environment
• Policy
• Culture
• Economics
In terms of the environment, the focus was on long-term impacts, whether beneficial or
detrimental on the global environment of the generation of ever more automated systems
—either for use by citizens or as tools for cheaper, faster mass production (see chapters 7,
15, 16, and 17). The team considered the extent to which some of the research questions
around automation may be cultural, both as topics and in terms of the topics selected. Im
portantly, might the focus of current research be driven by Western, Global North, US-
UK-EU concerns? At the same time, technologies might alter aspects of global culture
around intercultural communication or the nature of relationships (see chapters 8 and
10). The likely global economic impact of automation was stressed at a number of points
in the discussion. Automation technology as a sector is (p. 677) itself already global and
may not be mainly focused in the United States–United Kingdom–European Union. As
economies around the globe are impacted by productivity changes due to automation, we
are also likely to see changes in the flows of capital, people, goods, and services. Social
research needs to document and understand these changes so as to support policymak
ers, organizations, and citizens. Following on from the concerns noted earlier were ques
tions about how social science research can support and evaluate global policy to address
these environmental, cultural, and economic concerns.
The ESRC-NSF workshop highlighted six areas where social research could contribute to
debates over education, employment, and skills:
• Education
• Training and skills
• Careers and employment
• Nature of digital work
• Workers’ rights, rewards, and trust
• Disruption and change
Page 23 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
In relation to education there are questions about its role an increasingly automated soci
ety. What it will mean to be a student, and how our understanding of learning in a digital
environment, may need to change. Following on from broader education questions are
concerns around the skills citizens will need. Two questions were posed:
• How can social research support and help understand what and how skills are need
ed?
• What are the social and economic challenges of ensuring skilled workers in an ever-
changing work setting?
A key role for the social study of work and employment at all scales—global, national, or
ganizational, and individual—has to be that of understanding new work and career path
ways (see chapters 10, 11, 12, and 13). The workshop proposed this key question:
• How will work identities, relations between workers and employers, and career pro
gression function in ever more automated workplaces?
A key area for social science to study, and where there has already been research, is in
the changing nature of the “work” as an activity. This includes
(p. 678)
These concerns lead to questions about workers’ rights, especially in regard to trust in
both the technologies and organizations. It was argued that this relationship appears to
be potentially threatened by AI and automation. This may be heightened where technolo
gies are involved in the monitoring and assessment of performance. Of course, the most
difficult task is that of predicting where and how AI and automation will make significant
disruptive impacts. Social research can in part help to understand how disruptions have
affected and may affect markets and employment (see chapters 12 and 13). Research may
also help examine how organizations can react to and manage disruptive technological
change. The ESRC-DSTL workshop covered very similar ground (see Table 24.7), focusing
mainly on wider social and on organizational issues.
Page 24 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
The pressing social research question posed multiple times in both workshops was
• Who are the winners and the losers in an increasingly automated world?
In unpacking this question, the ESRC-NSF workshop highlighted further issues such as
the unequal distribution of cost, risks, and benefits. Other areas of concern included
growing disparities in the uses of technology, in access to digital opportunities and in the
distribution of wealth. The questions were grouped into three categories:
• Growth in inequalities
• Using digital technologies to address inequalities
• How to support all citizens post automation
tomation may be further growth in social inequalities in access to work, wealth, educa
tion, and wellbeing. These socio-economic processes and outcomes therefore need to be
extensively studied. At the same time, a role was seen for social science in providing data,
analyses, and insight that might help ensure digital technologies alleviate or address is
sues of inequality. A final concern was around how societies might look to support a grow
ing population of under-employed citizens, or citizens being more productive to support
the wider population. These concerns are reflected in the outcomes of the ESRC-DSTL
workshop (see Table 24.8).
Page 25 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Much of the prior comments have focused on inequalities and automation. A parallel is
sue is that of augmentation—the adaptive use of technologies by human beings (as we
noted earlier, there is a gradient from augmentation through to full automation). The fo
cus here for social and behavioral sciences is on the physical and cognitive capacities of
people, their ability to utilize augmentations, and the impacts on them. This discussion
had two clear themes:
• The impact and assessment of cognitive demands from high levels of digital technolo
gy use
• The understanding of human behavior to enhance the capabilities and usability of
digital technologies
Page 26 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
There is a clear role for the social and behavioral sciences in helping to under
(p. 680)
stand the impact of digital technology use on (and by) human cognition—both beneficial
and detrimental. Understanding of these issues could help address the everyday and spe
cific demands that citizens face in using such technologies, especially in the workplace,
but also in everyday life. While research on our use of technologies may provide insight
into human behavior and capabilities, at the same time, understanding human behavior
and cognitive abilities may also help us to better develop relevant technologies.
Ethics
These questions extensively overlap with issues of inequalities, rights, and values noted
earlier. However, they were framed in the workshops in terms of the ethical implications
of these factors. A deeper set of questions in both workshops addressed how we develop
relevant ethical frameworks through research, debate, and social engagement.
As a matter of course, the participants were concerned about how to understand and im
prove social, economic, political, community, and citizen impacts associated with automa
tion. This includes questions about how best to engage policymakers and organizations.
The ESRC-DSTL workshop formulated this as a set of research questions detailed in Table
24.9. Again, different questions arose at the three levels of impact: wider social, commu
nity and organizational, and individual experiences and understandings.
Page 27 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Conclusion
Given the nature of the work reported here, there is no single clear conclusion to draw.
Both workshops highlighted the need for both breadth and depth of research on the im
pacts of automation, AI, and augmentation. In both cases the experts could not separate
out these issues fully from the broader question of the social impacts of digital media and
technologies—especially as in nearly all cases this involves some form of automation or
augmentation of human practices. Though these issues are clearly in the public eye—es
pecially given the media focus on issues of AI and automation—the workshop participants
argued strongly that many research gaps remain to assess.
Page 28 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
1.1.1.1 What Evidence will this Generate? What could this be Used for?
• Computer science
• Design
(p. 682) • Economics
• HCI
• Law
• Media and communications
• Social history
• Sociology
• How do attitudes towards technology and automation shape the development and im
plementation of technology (acceptance versus rejection)
Page 29 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
1.1.2.1 What Evidence will Generate this? What could it be Used for?
• Business
• Design
• Economics
• Information systems/computer science
• Media and communications
• Sociology
1.2.1.1 What Evidence will this Generate? What could this be Used for?
• Economics
• IMF/CS
• Social policy
• Sociology
• Urban regeneration
Page 30 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
1.2.2.1 What Evidence will this Generate? What could this be Used for?
• Social policy
• Resilient communities
• Ideas for social action
1.2.3.1 What Evidence will this Generate? What could it be Used for?
• Help design
• Policy
• Consequences
• P/R
• Job design
• Workplace conduct
• Information studies/CS
• Management
• Occupational psychology
• Sociology
• Studies
Page 31 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
(p. 684) • What are the effects on “being” in digital spaces?
• What are the theoretical and practical contingencies in the move from operator to
operated?
1.3.1.1 What Evidence will this Generate? What could this be Used for?
• Design rules and approaches, and the consequences of such design with socio-techni
cal systems
• Inform industry practice by highlighting visible as well as invisible automations of
roles
• Insight into the effects of automation in/between tasks and roles
• Artificial intelligence
• Data science
• Designers
• Human geography
• Information systems
• Legal
• Management and business
• Marketing and consumer science
• Philosophy of technology
• Psychology
1.4.1.1 What Evidence will this Generate? What could this be Used for?
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
• Anthropologist
• Data/computer science
(p. 685) • Economy
• Industrial relations
• Informational systems
• Organization science
• Organizational psychology
• Philosophy
• Sociology
1.5.1.1 What Evidence will this Generate? What could this be Used for?
• Cluster
• Computer scientists
• Educationalists
• Law
• Manufactures (including software engineers)
• Policymakers
Page 33 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
• Psychology
• Regulators
• Safety engineering
• Science providers
• Sociology
• How are different groups of people affected by automation? For example, those
whose jobs are replaced versus those interacting with the automated system
• What does it mean to have meaningful, fulfilling life in an automated world?
• To what extent and what elements of work do we want to be automated?
• How will the value of human labor change in an automated economy?
• To what extent is it desirable and/or acceptable to have automated systems
(p. 686)
1.6.1.1 What Evidence will this Generate? What could this be Used for?
• Anthropology
• Economics
• Management and business studies
• Medicine
• Philosophy
• Political science
• Psychology
• Sociology
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
1.7.1.1 What Evidence will this Provide? What could this be Used for?
• Data that can help understand how fair/good outcomes are. Feedback loops checks
and balancing
• Informs engineers on how systems can improve
• Computer/data scientists
• Educationalists
• Law
• Manufacturers
• Policymakers
• Psychology
• Regulators
(p. 687) • Safety engineering
• Service providers
• Sociology
1.8 “Refuse-nicks”
• What can we learn from those who resist the imposition, deployment, or use of auto
mated systems?
• Everything
• Everyone
Page 35 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
This was a key discussion point throughout the workshop. There appeared to be three
themes to this cluster:
Original Questions
• How can we get citizens to understand the data they give to companies and the con
sequences of handling the data?
• How can people be trained to interpret algorithms?
• Intelligibility, how do people navigate the world? Understand and use and correct the
systems around them?
• How can people understand what underlies technological decision making?
• How do we expose the fact that tech is not value-neutral?
• How do we expose tech presuppositions?
• What is the level of public’s understanding of new technologies?
(p. 688) • Digital empowerment?
• What shape people’s misconceptions about personal data?
Page 36 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
2.1.3 Social Impacts and Consequences of Trust in Algorithms
Original Questions
• Trust in outcomes?
• When do we challenge the digital?
• How do people resist change? Why and when, versus accepting?
• Is there a connection between automation, migration, and regressive politics?
• Have we been misled by social media?
• Trust in the use of personal data?
• Relationship between trust and risk: culture, social norms.
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
2.2.5 Policy or Managing the Social Impacts and Asking Relevant Questions
Original Questions or Comments
2.3.1 Methods
the perennial question in the study of the social impacts of technology is
• Research methods: Are current methods appropriate for understanding data or AI?
• Social science: Building new technology to undertake research
Page 38 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
(p. 690) • How do we develop new approaches to evaluate the impacts of new technolo
gy?
• How do we encourage robust evidence around what is happening and what is going
to happen?
• How are we able to be creative with technology?
• Data etc. inherently with bias—how do we make progress and avoid reinforcing these
biases?
• How might we ensure we avoid polarization and spend research time on more strate
gies to collect representative data?
Page 39 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
The impact of automation was not felt to be confined to either human-machine interac
tion, nor to the individuals, groups or organizations. Rather the meeting repeatedly high
lighted the impact of automation across a range of global issues including:
• Environment
• Culture
(p. 691) • Economics
• Policy
2.4.1 Environment
Original Questions or Comments
2.4.2 Culture
Original Questions or Comments
2.4.3 Economics
Original Questions or Comments
Page 40 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
2.4.4 Policy
Original Questions or Comments
Although the discussion was set to be on new employment pathways, the discussion
quickly highlighted six areas where social research could contribute:
• Education
• Training and skills
• Careers and employment
• Nature of digital work
• Workers’ rights, rewards, and trust
• Disruption and change
Page 41 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
2.5.1 Education
Original Questions or Comments
• What will be the role of education and training in the responses to new digital tech
nologies?
• How do we create students? (to value and recognize others)
• We used to understand how learning happens in human-machine interaction
• How to transform education to address social tensions created by automation?
• How do we ensure that there are sufficient resources for people to learn new skills?
• How do we help people do research with the focus on how we train people to learn
(help) new technologies?
• How do we educate and train future workforce, learners, and students?
• How do we make sure people are not in knowledge and skills silos?
• How do we help people understand their skill level; and how do we help them learn
new skills?
• How do we study and cope with skill degradation related to increasing use of AI, au
tomation, and robotics?
• Employability—adaptability resilience
• Career paths and work
• Work identities
• Matching employers and new recruits. How can we use technology for this
(p. 693)
matching?
• What people are enabled to pursue their career paths in the new world of work?
• What will the future of new technological “occupational résumés” be? Records of
what we’ve done in work?
• The digital career coach: How can we enable people to understand their own skills
and contributions?
• What is the role of organizations in helping workers adapt to new technologies?
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
• Work and reward systems and how they’re evolving; how is the need to be rewarded
more over time clouded by financial considerations?
• What are the challenges to worker motivations of new digital technologies?
• How might we keep focus on how labor, equality, justice, and technology interact?
• Are new technologies of AI undermining or improving historical values and trust
within different sectors and professions?
• How can self-monitoring help people, e.g., in the gig economy?
• How might we tie into the (fast-growing) service industry to make those jobs?
• How might we help people work in a rapid, dynamic gig economy, and work
(p. 694)
with or around the systems that will mediate that? For example, overcome or work
around discrimination, algorithmic bias, and unfair power structures, embedded or
mediated by technology.
• How do organizations learn about how new technologies are different and how they
are implemented? (unintended consequences)
• Emerging technologies and changing work practices: How are emerging technolo
gies introduced, adapted, or rejected in professions and sectors, e.g., eagel, health
care and medicine, service sector, business, agriculture?
• How can we describe the innovation in these domains? What explains the factors that
underpin the dynamics of innovation?
Page 43 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
• How are emerging technologies introduced, adopted, or rejected into work practice?
2.6 Inequalities
The pressing social research question, posed multiple times in the workshop, was
• Who are the winners and the losers in an increasingly automated world?
• Growth in inequalities
• Using digital technologies to address inequalities
• How to support all citizens post-automation
• How are all benefits, costs, and risks of digital not evenly distributed?
• How does inequality of resources play out as inequalities of meaningful work?
• Are there growing disparities in the use of digital technology?
• How is distribution of wealth affected by growth of digital-technology investments ?
Is only little investment needed to disrupt or capture markets?
• How does individualization of work (of ratings) of a gig economy (e.g., Uber) affect
subsequent work? How to avoid exclusion that could result from this?
• How might we consider race, class, gender, and sexuality in access to, use of, and
outcomes of technology?
• Will technology reinforce inequality and polarization?
• How can we create a social and technical world to provide opportunity, income, and
personal fulfilment?
• How can technologies enable fewer people to work? Help us work less? Help more
people work more and longer?
• How do we help people make a living?
• Disabled communities have the most to win from inclusive design. How can
(p. 695)
we get for profit-companies to design them and not just for masses?
Page 44 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Original Questions or Comments
• How do we get people to work longer versus raise productivity of others to support
the whole?
• How paid work of 50% supports 100% of population. How numbers change.
• The impact and assessment of cognitive demands from high levels of digital technolo
gy use
• The understanding of human behavior to enhance the capabilities and usability of
digital technologies
• Should we demand unlimited cognitive resources? And how we might study the ef
fects on social resources too?
• Competition from many sources of information gets your attention. How does that af
fect demands for cognitive resources and organization of information?
• How might we design and manage this overwhelming demand on cognitive re
sources?
• How might we understand shifting demands from a variety of devices?
• What impact does high screen use have on the developing brain?
2.7.2 Capabilities
Original Questions or Comments
• What neuroscience research do we need to design/mimic the human brain? Will this
matter?
• How will technology (and at what point) remove the need to co-present?
• What does technology tell us about ourselves, and how do we use it?
• Computers recognizing and manipulating emotions.
• How can we design and control machines that read or respond to human emotions to
enhance our strengths and minimize our weakness?
Page 45 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Ethical issues appeared throughout the discussions, and we have classified these into two
groups:
• How to have value set that is not an economic driver of what jobs to automate?
• Do we assume technologies are all advancing the same way everywhere?
• Role of politicians and ethics
• Concentration of wealth: Is it inevitable?
• What’s going to happen to the workers (including “think- up” entities ASPCA for in
telligent machines)?
• AI and use of algorithms in decision making
Page 46 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
• Creating technologies with universal accessibility built in from the beginning, not as
an old one. Potential for accessibility is barriers?
• Understand better what algorithms are really doing (and how they work): Big data/
Big nets
• How do we prepare for a world of intelligent computational aspects? (beyond work
issues)
• How to make system more intelligent by better adding expects in these domains?
• What are the risks and benefits of emerging technologies?
• Will we be blindsided by some new technology? Human brain technology. Brain com
puter interface.
(p. 697) • Are these new technologies that will completely change core thinking?
• How do you research citizens that don’t want to adopt technology?
• How technology influences sociality.
• What is the process through which innovations were implemented?
• Important to understand diffusion of digital technologies.
• What drives diffusion of technologies; What makes them available?
• Digital and biotechnology: Are we undergoing normalization through ubiquity? How
does this affect diversity?
• How can technology incorporate and facilitate diverse perspectives?
• People working longer with technology: Will new technology allow people to work
more efficiently or have more leisure time? Is there an absence of utopian thinking
about work?
References
Anderson, J., & Rainie, L. (2010). Future of the Internet IV: Experts and stakeholders dis
cuss predictions about the future of the internet. Pew Internet & American Life Project.
http://www.pewinternet.org/wp-content/uploads/sites/9/media/Files/Reports/2010/
Future-of-internet-2010-AAAS-paper.pdf
Broekens, J., Heerink, M., & Rosendal, H. (2009). Assistive social robots in elderly care: A
review. Gerontechnology, 8(2), 94–103.
Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and pros
perity in a time of brilliant technologies. New York, NY: W.W. Norton & Company.
Page 47 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Chui, M., Manyika, J., & Miremadi, M. (2015). Four fundamentals of workplace automa
tion. McKinsey Quarterly, 29(3), 1–9. https://roubler.com/au/wp-content/uploads/
sites/9/2016/11/Four-fundamentals-of-workplace-automation.pdf
Davidson, P. (2013). Income inequality and hollowing out the middle class. Journal of Post
Keynesian Economics, 36(2), 381–384.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technol
ogy: A comparison of two theoretical models. Management Science, 35(8), 982–1003.
Ford, M. (2015). The rise of the robots: Technology and the threat of mass unemployment.
London, UK: Oneworld publications.
Gorz, A. (1985). Paths to paradise: On the liberation from work. London, UK: Pluto Press.
Linstone, H. A., & Turoff, M. (Eds.). (1975). The Delphi method. Reading, MA: Addison-
Wesley.
Madland, D. (2015). Hollowed out: Why the economy doesn’t work without a strong mid
dle class. Oakland, CA: University of California Press.
Manyika, J. (2017). A future that works: AI, automation, employment, and productivity.
McKinsey Global Institute Research, Technology Report. https://www.jbs.cam.ac.uk/
fileadmin/user_upload/research/centres/risk/downloads/170622-slides-
manyika.pdf
McIntosh, S. (2013). Hollowing out and the future of the labour market. BIS Research Pa
per, (134). http://www.niesr.ac.uk/sites/default/files/files/PDF/Presentations/Hol
lowing-out%20and%20the%20future%20of%20the%20labour%20market.pdf
ceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of infor
mation technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Zuboff, S. (1988). In the age of the smart machine: The future of work and power. New
York: Basic Books.
Simeon J. Yates
Page 48 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
ESRC Review: Future Research on the Social, Organizational, and Personal
Impacts of Automation: Findings from Two Expert Panels
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Jordana Blejmar
Page 49 of 49
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Print Publication Date: Aug 2020 Subject: Sociology, Social and Cultural Anthropology
Online Publication Date: Aug 2020 DOI: 10.1093/oxfordhb/9780190932596.013.24
We conclude the Handbook of Digital Technology and Society by identifying topics that
appear in multiple chapters, are more unique to some chapters, and that represent gener
al themes across the material. Each of these is considered separately for the ESRC theme
chapters and the non-ESRC chapters. In the ESRC theme chapters, cross-cutting re
search topics include digital divides and inequalities; data and digital literacy; gover
nance, regulation, and legislation; and the roles and impacts of major platforms. Cross-
cutting challenges include methods; theory development, testing, and evaluation; ethics;
big data; and multi-platform/holistic studies. Gaps include policy implications, and digital
culture. In the non-ESRC chapters, more cross-cutting themes include future research
and methods; technology venues; relationships; content and creation; culture and every
day life; theory; and societal effects. More unique, these were digitization of self; manag
ing digital experience; names for the digital/social era; ethics; user groups; civic issues;
health, and positive effects. The chapter also shows how the non-ESRC chapters may be
clustered together based on their shared themes and subthemes, identifying two general
themes of more micro and more macro topics. The identification of both more and less
common topics and themes can provide the basis for understanding the landscape of pri
or research, what areas need to be included in ongoing research, and what research ar
eas might benefit from more attention. The chapter ends with some recommendations for
such ongoing and future research in the rich, important, and challenging area of digital
technology and society.
Keywords: cross-cutting challenges, cross-cutting themes, cross-cutting research, digital technology and society,
Economic and Social Research Council (ESRC)
Page 1 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Introduction
THE range of issues raised by the study of digital technology and society are both broad
and deep: moving from research and theory, to design and constant technological devel
opments, through policy and economics, to management, use, adaptation, and effects.
Further, these issues are inherently interrelated, as all play a part in shaping, and being
shaped by, information and communication technologies. So it should be no surprise that
many topics and themes appear in multiple chapters in this Handbook. As a conclusion
and review of the themes in the Handbook, we summarize both the common and unique,
and the general and specific, topics and challenges presented. We look first to the ESRC
Domain chapters, and then to the non-ESRC chapters. Drawing on the chapters and the
overarching analysis from the ESRC project, we make some suggestions for areas of
medium-term future digital media and society research.
Throughout the chapter we will talk about the “social impact of digital”—however, this in
no way implies that we are taking a technological determinist stance. As the chapters in
the volume clearly demonstrate, the key issues are understanding and unpacking where
possible the complex web of interactions between digital media systems, the processes of
their design and implementation, the different forms of appropriation by users, and the
multiple consequences of their use—intended and unintended. It is this complexity we
seek to encompass via the shorthand of “social impacts of digital.” We are very aware of
the challenge of not falling into the trap of what Grint and Woolgar (1997) (p. 700) called
“technism” whereby technological determinism implicitly creeps into social analysis; on
the other hand, of course Grint and Woolgar’s Actor Network Theory approach (also see
Latour, 2005) is not used by the majority of the writers in this volume. We are also aware
that in the analysis of actual use and practice, the limiting and determining features of
technologies (what are often called “affordances”) are key to the analysis—whatever their
socio-technical antecedents and the social processes behind their original design.
To get a sense of the changing prevalence of major concept interconnections, Figure 25.1
shows the most frequent concept pairs from 2000-2004, and Figure 25.2 shows those for
2012–2016.1 Early on, the most frequent concept pairs emphasized the new communica
tion technologies, their users, and their uses. Table 25.1 summarizes those most frequent
concept pairs from Figure 25.1 comprising these three foci. By 2012–2016, the most fre
quent concept pairs had shifted emphasis somewhat. First, technology as a communica
Page 2 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
tion medium is the most frequent pair, but communication as a use does not appear much
thereafter (compared to the prior period). While combinations among technology, users,
and uses still dominate, we now see an increased focus on data, access, and privacy is
sues (including data collection for research), and interventions and research (studies or
projects applying technology to effect changes, typically in health contexts, analysis, stu
dent or group participation). Table 25.2 summarizes those most frequent concept pairs
from Figure 25.2 comprising these five foci.
Page 3 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Internet/use X X
Internet/user X X
Site/web X
Access/Internet X
Communication/medium X
Group/support X X
Man/woman X
Group/member X
Community/member X
Communication/interaction X
Community/network X
Group/participant X
Health/support X
Child/computer X X
Communication/relationship X
Care/health X
Network/support X X
Information/source X X
Interaction/relationship X
Other/people X
Page 4 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Network/tie X
Home/internet X X
Culture/medium X X
Life/people X
Citizen/government X X
Group/interaction X X
Page 5 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
Communication/ X
medium
Internet/use X X
Care/health X
Analysis/datum X X
Internet/user X X
Access/datum X
Datum/privacy X
Access/internet X X
Participant/stu X X
dent
Intervention/ X
study
Page 6 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
Health/interven X X
tion
Group/partici X X
pant
Care/patient X X
Medium/news X X
Datum/project X X
Health/support X
Datum/source X
Intervention/ X
participant
Information/pri X
vacy
Group/support X X
Network/sup X X
port
Page 7 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
Intervention/tri X
al
College/student X
Model/variable X
Datum/research X X
Collection/da X X
tum
Page 8 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
However, looking at the main topics identified in each domain provides a deeper analysis
of shared concerns across the domains. The cross-cutting topics can be dealt with in two
ways: either as research areas to be addressed, or as key methods and challenges for fu
ture research projects within the domains examined in this book. Several topics and chal
lenges appear across the ESRC Review chapters. Table 25.3 details the most common top
ics and Table 25.4 the most common challenges. To create these lists the topics and chal
lenges were recoded into a standard format for all domains. Those topics that cross more
than three domains are in bold. The highest ranked cross-cutting challenges are common
to all the domains.
Topics Percent
Privacy 6.8
Citizenship 4.5
Participation 3.2
Methods 3.2
Governance 2.9
Education 2.6
Mobilization 2.6
Talk 2.3
Note: Topics in bold cross-cut more than three of the seven ESRC do
mains.
Page 9 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Topics Percent
Methods 38.0
Theory 12.0
Ethics 9.5
Co-design 5.0
Education 2.1
Interdisciplinarity 2.1
In regard to research questions, we would argue that there are two research topics that
are strongly cross-domain but that also warrant separate consideration. Nearly all the
questions you can ask about the social impacts of digital media start with who has access
(digital divides) and what uses they can make of or what can they do with the media (data
and digital literacy):
All the work we have covered raises questions of digital inequality. Chapter 15 (Yates &
Lockley) examines this question in more detail. The key argument is that such inequali
ties are not just about access. The issue is how variations in access, skills, knowledge,
Page 10 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
and practice are in correspondence with other aspects of social inequality—such
(p. 702)
as access to education or health care, wealth, employment, housing, or cultural and com
munity life. Digital technologies have the possibility to reduce but also to further exacer
bate these issues. Within this research topic there are then two broad sets of questions:
• How digital media are incorporated into existing systems and processes that gener
ate inequity, the specifics of how they correspond and interact with systems of inequity
and distinction, and how they themselves include levels and forms of inequity and dis
tinction. For example, how does access to digital media affect employment opportuni
ties and outcomes?
• How are digital media used and deployed by citizens, institutions, organizations and
governments to seek to address either digital inequities, or broader social inequities?
For example, how can digital media be used to improve educational outcomes?
These are not necessarily new questions, but each iteration of technological
(p. 703)
We would also argue that two other topics cross cut, but they also need to be considered
in and of themselves. These are
These scenarios are more likely to be dependent on social, national, or technology con
texts. Governance issues vary from such things as debates in the United States over
net-neutrality to issues of Internet censorship of different kinds in various na
(p. 704)
tions. These are also driven by the new circumstances of technology use. Some examples
include how to legislate for and address hate speech on-line across jurisdictions, defining
liability for automated and AI systems, or national and international market regulation of
digital products and services. Global digital platforms for services have become a norm in
the current digital environment. Though the dominant digital platforms may change over
time (Myspace to Facebook) or vary between regions (Facebook/Twitter/WhatsApp vs.
Weibo/WeChat) it can be argued that we are currently in period where “platforms” are
key to social, cultural, and economic behaviors and outcomes. These platforms have both
numbers of members and financial turnover greater than a large proportion of countries
in the world. We would strongly argue that understanding the role of platforms is key to
understanding our current digital world in all the domains addressed in this volume. The
dynamics of a platform economy, of identity management via the limiting constraints of a
few platforms, or of the political implications of platform-based social networks, are ques
tions where the role of platforms is key to three of the domains discussed in this volume.
Page 11 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
We acknowledge that disruptive technological, political, or economic changes might over
turn the importance of platforms as currently understood.
In the ESRC project we asked what the key challenges researchers are facing in each of
our domains. Looking across the chapters in this volume it is clear that many of these are
cross-cutting and pertinent to any work on the social impacts of digital media. We would
therefore argue that all near-term projects on digital technology and society should seek
to examine or address each of the following:
Methods innovation. This should include reflection on and evaluation of: digital tools,
analytic approaches, and the digital representation of results. This could and should
(p. 706) include taking risks based on the efficacy of new tools and methods as they are
Theory testing and evaluation, with theory development where needed. In all the
domains, we found a great variety of theory, but much of that was used as a general back
drop without operationalization or evaluation. For example, many of the sociology-based
items reference “Network Society” theory without operationalizing this in any clear man
ner. In contrast, much of the psychology work directly applies theory, but with extensive
variety. We would caution about the need to develop new theory for its own sake. As was
noted by participants in the consultation workshops, just because digital technologies are
new, they may not need new social science theories to understand their uses and implica
tions. There may be a need for greater clarity on “most relevant” theory and on incremen
tal theory development as opposed to a need for “digital specific” theory development.
This makes theory testing, new and old, essential.
Ethics. Ethics, especially around the use of publicly visible social media data, remain a
challenge for researchers, though clearer guidance is being provided by academic organi
zations (e.g., the Association of Internet Researchers, and the British Psychological Asso
ciation). There are also considerable ethical questions around what researchers, govern
ment, businesses, and organizations do with the data of respondents, citizens, and con
sumers data. Further, the increasing integration of digital technologies into medical, so
cial, work, and biological contexts raises a wide variety of general as well as novel ethical
issues. We would argue that projects should have a component that assesses the ethical
challenges faced, in order to help build a knowledge base of best practices and key con
cerns. In the United Kingdom, the Nuffield Foundation (http://
www.nuffieldfoundation.org/), which supports innovative social research, has established
the Ada Lovelace Institute to address these research questions and promote ethical prac
tices, importantly by convening “diverse voices to build a shared understanding of the
ethical questions raised by the application of data, algorithms, and artificial intelligence.”
Similarly, the UK government has established a Centre for Data Ethics and Innovation to
advise on data ethics policy. Social research can make considerable impact here through
Page 12 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
addressing these issues both through research about the ethical challenges and by devel
oping ethical research practices.
Big data. Many research funding agencies are currently supporting initiatives that ad
dress big data (however that is understood in their disciplines; e.g., chapter 18 (Yates,
Robson, Rice, & Carmi), chapter 19 (Hintz), and chapter 20 (Nugent-Floan & Edmond)).
We would caution against focusing specifically on this as a methodological issue separate
from the context of the discipline (or set of disciplines) within which research is taking
place. The key challenge is that many disciplines now face the possibility of documenting,
archiving, and analyzing what would have previously been impossibly large amounts of
data to assess in analogue format. Separate from methods innovation, we would argue
that projects which seek to use “big data” should include a robust element of reflection
and evaluation on the usefulness, limitations, tools used to analyze, and representative
ness of the examined big data sets.
has often focused solely on one technology or platform, though with much good work al
ready been done exploring specific technologies—Twitter, Facebook, Google, Uber, mo
biles, smart phones, blogs, specific government systems, etc. However, the reviews also
note an increasing trend in which research is undertaken in a comparative way between
existing and new technologies or platforms. In general people do not use digital media
platforms or technologies in isolation from each other nor separate from other social ac
tion (e.g., as covered in most of the Handbook chapters, but especially chapter 4 (Meier
et al.), chapter 8 (Yates et al.), chapter 9 (Rice et al.), chapter 10 (Cecchinato & Cox),
chapter 15 (Yates & Lockley), chapter 19 (Hintz), chapter 20 (Nugent-Folan & Edmond),
chapter 23 (Jacobs et al.), and chapter 24 (Yates & Blejmar)). Such work is necessary to
understand the specifics of technologies or socio-technical contexts. The Delphi respons
es have strongly argued for the need to look at digital technology use overall, and in com
bination, to ask broad social science questions and then explore which technologies are
relevant to citizens’ actual practice and in what ways. From this we can develop a more
holistic picture of the integration of digital into everyday lives (or not, in the case of digi
tal inequalities). This does not preclude single technology studies where this has rele
vance, but such decisions should have a strong social science basis—not simply one of the
accessibility of data or the novelty of a new device or app. For example, there appear to
be class differences in the uses of different social media platforms. If this is valid, a case
could be made for a project to focus on a specific platform as used by a specific communi
ty (i.e., mobile phones in low-income areas). One area where this may be more acceptable
would be in the economic domain, as the study of the impact of a platform on a sector
might be limited to one technology (e.g., Uber). However, overall, the Delphi and work
shop results highlight a contemporary need to “reverse the telescope” and focus on the
breadth and depth of citizens’ digital worlds, as they navigate among multiple technolo
gies and platforms. This puts social science questions to the fore within which a mix of
digital technologies may play a part.
Page 13 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Missing Areas and Gaps
One of the separate policy workshops brought together scholars from across the disci
plines covered by this review, as well as from the UK’s media regulator Ofcom, the ICT
sector, the UK’s Department for Digital, Culture, Media and Sport, and the UK’s Depart
ment of Work and Pensions. Resonating with the gaps identified in the ESRC Domain
chapters as summarized above, the workshop identified two other areas where digital fac
ing research may inform policy: impact and policy implications, and digital culture.
What are the broader policy implications of the results of our social science work on digi
tal media? Research outputs should not remain isolated and can contribute to evidence-
based policymaking. This is clearly crucial in all our domains, but especially (p. 708) areas
such as politics, governance, health, economics, and social inclusion. The ESRC project
did not look to explore the links between research and policy, though we feel that work
documenting the policy relevance and impact of research on digital media is needed, im
portantly to identify where high-quality research may not be reaching policymakers. Key
areas for policy identified in the workshop were: digital inclusion and exclusion; creative
and digital industry sector policy/regulation, digital skills, digital and social policy, and
arts and culture policy. A related issue was further research needed on the general use of,
and also evaluating the effectiveness of, digital tools that support policymaking, as well as
how digital tools and media may impact the methods of policymaking—such as the rise of
“agile” policymaking. Finally, more work should be done on how digital media are used,
with what implications, in the policy delivery.
The other gap is the role of digital media in culture. There is of course a whole body of
work on Digital Humanities and a vast body of practice around digital arts. But processes
of digital consumption and digital cultural practices clearly cut across social science
questions. This includes questions such as how digital consumption corresponds with so
cial inequalities; how digital cultural production (from YouTube to more conventional art
forms) intersects with questions of community or the role of platforms; how cultural insti
tutions are addressing the impacts of digital systems; or how arts and cultural gover
nance and funding might intersect with new(ish) digital media formats such as games,
virtual reality, and augmented reality. There is a need to ensure such questions are con
sidered from both social science and arts perspectives—that they are not solely about the
aesthetics or the value of the practices—especially as variations in taste, consumption,
and practice may be key to how people utilize digital media, with positive and negative
implications.
Page 14 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
ships among the themes and the chapters provide some basis for identifying larger, more
general themes associated with digital technology and society.
We began with the coding typology developed in chapter 1, based on 89 recent books on
digital technology and society. However, we added relevant emergent codes in NVIVO
(p. 709) as we re-read and coded each of the 14 non-ESRC chapters, consolidated “partici
Page 15 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
A1 Theory 10 45
Actor-network theory 1 1
Boundary theory 1 2
Citizenship theories 2 2
Diffusion of innovations 2 2
Domestication theory 1 1
Economic rationalism 1 1
Media mastery 1 1
Mediation theories 2 2
Network theory 3 3
Practice theory 2 2
Public good 1 2
Page 16 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Self-determination theory 1 1
Social capital 1 2
Social loafing 1 1
Socio-technical 1 2
Space vs Place 1 1
Structuration 2 2
Datafication 1 1
Digital citizenship 1 2
Liberation technology 1 1
B1 Technology venues 13 58
Algorithms 2 5
Page 17 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Artificial Intelligence 1 3
Computer-mediated communication 2 2
GPS, locational 1 1
Infrastructure 1 2
Intelligent machines 1 1
Internet of things 3 4
Other 2 2
Sustainable HCI 1 2
Ubiquitous computing 1 1
Visualization 1 1
B2 Technology characteristics 9 17
Affordances 4 5
Page 18 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Materiality 1 1
C1 Content, creation 9 25
Crowdfunding 1 1
Design 2 4
Knowledge sharing 1 1
Online expression 1 3
Storytelling 1 1
C3 Civic issues 5 33
Page 19 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Political, politics 2 2
Power 4 6
Discrimination 1 1
Gender 1 3
Participation, engagement 1 1
D2 Health 6 28
Digital health 5 8
Page 20 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
D3 Relationships 12 59
Families 2 5
Friendship, friends 3 4
Intimacy 1 1
D4 User groups 4 6
College students 1 1
Elderly 1 3
User types 1 1
Women 1 1
Consumption 3 5
Page 21 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Literacy 5 11
Business models 1 1
E1 Effects Negative 9 47
Cyberbullying, harassment 3 5
Multitasking 2 3
Page 22 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Work-Life conflict 1 1
E2 Effects Positive 7 12
Connectivity, connectedness 3 3
Safety 1 2
Social capital 1 1
Work-family enrichment 1 1
E3 Effects Societal 8 17
Crime 1 1
Economy, economics 1 2
Institutions 1 1
Societal impacts 8 8
Page 23 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Methods 5 9
Research 11 30
The most unique theme, appearing in only one chapter, was Digitization of self & others.
Other infrequent and thus unique themes were C4 Ethics, ethical issues; C6 Manage digi
tal experience; and D4 User groups (4 each); and A2 Names for new social era; and C3
Civic issues (5 each).
The themes that appear more frequently across the chapters can be interpreted as more
pervasive or central themes, while those appearing less frequently can be seen as more
unique and less central themes, associated with digital technology and society. This distri
bution does not necessarily imply that the less frequent themes represent “gaps” or un
der-researched areas; some themes and subthemes may be just more specialized or more
narrowly focused (e.g., digitization of self, ways of managing one’s digital experience,
particular user groups), or more relevant to books about the macro issues of digital tech
nology and society (such as particular names or terms for the era), or of particular inter
est to only a few of the authors.
However, the overall distribution of more or less frequent themes can be useful in identi
fying more common themes as a guide for literature reviews, or less frequent and more
unique themes as opportunities for more in-depth and novel research. For example, we
should expect that F1 Future research and methods reasonably appears in all chapters,
and B1 Technology venues in all but one. Particularly interesting is that all but two chap
ters also discuss D3 Relationships. This frequent and common focus highlights that the in
herent nature of information and communication technologies and systems involves rela
tionships within individuals (e.g., well-being, identity and self-presentation), among users
(e.g., caregivers and the elderly, or online communities), among users and technologies/
devices (e.g., between individuals and their smartphones or smarthomes), among users,
their media, and third parties (e.g., big data and the attention economy), among different
social and cultural groups (e.g., power, digital divides, inclusion/exclusion, literacy lev
els), and among systems and devices (such as the Internet of Things). Also, instances of
negative, positive, societal, and contradictory effects were all discussed by about the
same number of chapters (from 7 to 9), indicating again that neither a fully utopian nor a
Page 24 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
fully dystopian perspective towards relationships between digital technology and society
seem justified (for example, see Katz & Rice, 2002, for an explication of the synthesizing
Syntopian perspective, which rejects both utopian and dystopian approaches).
ESRC Domains resulted from a comprehensive analysis of the literature designed to iden
tify possible new research areas for funding, and these 14 non-ESRC chapters were sub
mitted to the follow-up conference, and selected, largely as complements to those seven
themes. Thus, some topics appearing in recent books simply were not included in the
overall project’s domain. Certainly, the literature associated with digital technology and
society is vast and would include a much wider array of topics than are included in this
Handbook. These would include more technological, computer, software, and engineering
aspects; more contexts related to arts and humanities; more legal and policy issues; more
business and economic dimensions; more context from other countries and cultures; oth
er use contexts such as gaming, virtual reality, wearable and embedded media; more fo
cus on the needs and uses of groups such as low income, rural, differentially abled, eth
nic, feminist, activist, and LBGTQ, among many others; more consideration of cultural dif
ferences in access, meaning, use, and implications; and more focus on qualitative and
case studies (for just a few examples, see Borah, 2017; Lee, Ho, & Lwin, 2017; Rice &
Fuller, 2013; Rice & Leonardi, 2013; Röhle, 2005).
In addition to assessing common and unique themes, we can also identify how the non-
ESRC chapters relate to each other, reflecting a more general view of shared foci in this
Handbook. Table 25.6 indicates which themes appeared in which chapters.
Page 25 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
Table 25.6 Non-ESRC Chapters Including at Least One Instance of Each Theme
Chapters
Th 04 05 06 07 09 10 12 13 15 17 19 20 21 23 To
em tal
e
A1 X X X X X X X X X X 10
The
ory
A2 X X X X X 5
Na
me
s
for
ne
w
so
cial
era
Page 26 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
B1 X X X X X X X X X X X X X 13
Tec
hno
lo
gy
ven
ues
B2 X X X X X X X X X 9
Tec
hno
lo
gy
cha
rac
ter
is
tics
C1 X X X X X X X X X 9
Con
ten
t,
cre
atio
n
Page 27 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
C2 X X X X X X X 7
Big
da
ta,
da
ta
min
ing,
da
ta
stor
age
,
an
alyt
ics,
use
r
da
ta
C3 X X X X X 5
Civi
c
is
sue
s
Page 28 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
C4 X X X X 4
Eth
ics,
eth
ical
is
sue
s
C5 X X X X X X X X 8
In
clu
sio
n,
ex
clu
sio
n,
dis
cri
mi
na
tion
Page 29 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
C6 X X X X 4
Ma
nag
e
dig
ital
ex
pe
ri
enc
e
D1 X 1
Dig
iti
za
tion
of
self
&
oth
ers
D2 X X X X X X 6
He
alth
Page 30 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
D3 X X X X X X X X X X X X 12
Re
la
tion
shi
ps
D4 X X X X 4
Use
r
gro
ups
Page 31 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
D5 X X X X X X X X X X 10
Cul
tur
e,
eve
ry
day
life,
ed
uca
tion
,
lear
nin
g
D6 X X X X X X X X 8
Wo
rk
and
or
ga
niz
atio
ns
Page 32 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
D7 X X X X X X X 7
La
w,
pol
icy,
reg
ula
tion
E1 X X X X X X X X X 9
Ef
fect
s
Ne
gati
ve
E2 X X X X X X X 7
Ef
fect
s
Pos
itiv
e
Page 33 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
E3 X X X X X X X X 8
Ef
fect
s
So
ci
etal
E4 X X X X X X X 7
Ef
fect
s
con
tra
dic
tion
s,
par
ado
xes,
ten
sio
ns,
un
in
ten
ded
Page 34 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
F1 X X X X X X X X X X X X 12
Fu
tur
e
re
sea
rch,
met
hod
s
To 10 13 16 14 15 10 13 9 12 12 12 5 10 13 —
tal
the
me
s
for
eac
h
cha
pte
r
Page 35 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford Handbook of Digital Technology and Society
Page 36 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individ
ual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
All but one chapter included from 10 to 16 (out of 22) themes. Thus, most chapters por
tray over half of the themes, with chapters 6 (Petrie & Darzentas: Digital Technology for
Older People), 9 (Rice, Zamanzadeh, & Hagen: Media Mastery for College Students), 7
(Green, Comber, & Kuznesof: A Digital Nexus), 5 (Wagg Cooke, & Simeonova: Digital In
clusion and Women’s Health … ), and 12 (Coombs, Hislop, Taneva, & Barnard: Changing
Nature of Work with Intelligent Machines) involving the most. Clearly, we would not ex
pect chapters by different authors to engage the same themes, much less all of them.
However, partially as a byproduct of the bounded number of themes (22) across the chap
ters (14), partially because of the interrelatedness of these themes within most any treat
ment of digital technology and society, and partially because of the focused nature of the
ESRC project and the conference call for papers, there should be considerable commonal
ity.
Figure 25.1 displays a hierarchical clustering of the 14 chapters, based on the Jaccard
similarity coefficients derived from the co-occurrence of the 22 theme codes among all
the themes (and their aggregated subthemes) across the chapters (provided through NVI
VO 11). We can see two large clusters. The top cluster represents more macro and con
ceptual or definitional issues, emphasizing knowledge, citizenship and free speech, data,
and digital technology venues (sustainable HCI, intelligent machines, and Internet
(p. 715) (p. 716) of Things). The bottom cluster emphasizes more contexts and implications
of digital technology uses, at both social (class, inclusion, digital divides) and psychologi
cal levels (work-home boundaries, older uses, mental health, and media mastery).
At least two implications for readers and researchers follow from the clustering. First,
based on the extent to which the chapters shared codes from the more general coding
framework derived in chapter 1, the chapters in this Handbook could be regrouped and
resequenced from the current table of contents and sections. Possible sections could be
concepts, venues, social issues class and inclusion, and psychological issues of health,
well-being, and media mastery. Second, researchers focusing on any of these general ar
eas may wish to use the relevant chapters as initial literature reviews and foundations for
further research.
Page 37 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Conclusion
The ESRC project was defined as a scoping review to identify key areas for future re
search. One potential outcome from such a project would have been to identify one or two
pressing research concerns. The reality of digital media use is that they pervade nearly
all aspects of contemporary society and have touched nearly all aspects of everyday life,
and conversely are shaped and adapted by a wide range of actors and contexts. Even
those who do not use digital media are directly and indirectly affected, as lack of access
or skills creates substantive disadvantage in societies where services and even everyday
interaction are predominantly undertaken via digital devices. In each of the main do
mains we have sought to identify key future research questions and challenges—those is
sues that we need to better understand in order to get a clearer and more (p. 717) com
prehensive picture of the contexts and implications of digital media use. Focusing on just
one area within a domain, or claiming that just one domain has priority, would be both
limiting and a false assertion. Having said this, we can see some key commonalities in the
overall results, and we would argue that bringing these together provides a broad set of
themes that might serve as a medium-term framework for exploring digital media and so
ciety. We believe that combing the overlaps between the following areas creates two sub
stantive and relatively integrated domains of study in regard to digital media:
Based on discussions in the workshops, we would argue that a third major medium-term
area of study has to be
• Social, economic and cultural impacts of automation, augmentation, and virtual reali
ty
We would then suggest four smaller focused areas that could stand alone or cross cut
these three main areas:
We would also strongly emphasize the need for projects that address the following:
• Multi-platform/holistic studies: To ask broad social science questions and then ex
plore which technologies are relevant to citizens’ actual practice and in what ways. To
develop a more holistic picture of the integration of digital into their lives (or not, in
the case of digital inequalities).
Page 38 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
The work we have undertaken here has highlighted the very large amount of re
(p. 718)
search and scholarship dedicated to understanding the impacts and roles of digital media
in contemporary society. At the same time, it is clear that much work remains to be done.
It is a concern that funding (from government and industry) remains focused on technolo
gy development and implementation—with the clear policy goal being economic growth.
For example, the recent UK Industrial Strategy Challenge Fund, the UK Digital Economy
program, and the EU Framework and H2020 programs have all funded high-quality work
focused on the creation of new technologies and their commercialization. This has includ
ed funding for creative and digital industries. Yet funding to support the evaluation of the
social impacts of these innovations, their ethics and governance, the process of their
adoption, and the social process of their creation remains far more limited. We also have
some concern that some social science colleagues continue to view digital issues as sec
ondary to, or as “add-ons” to formal social research questions—rather than seeing these
as fundamentally integrative to contemporary social research. Understanding contempo
rary interpersonal interaction or understanding UK benefits policy is not separate from
the digital technologies being used to create and maintain these relationships or manage
these services.
Finally, and most importantly, the key point we draw from the chapters in this Handbook
is both exciting and challenging—namely the vast range of research opportunities that
the study of digital media still provides and will continue to generate. This includes not
only the range of questions that still need answering, nor simply the new innovative meth
ods and data sets being developed and becoming more accessible, but importantly the
chance to be part of understanding and influencing some of the most historically impor
tant social, political, economic, and cultural changes taking place in contemporary society
References
Borah, P. (2017). Emerging communication technology research: Theoretical and method
ological variables in the last 16 years and future directions. New Media & Society, 19(4),
616–636.
Page 39 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Grint, K., & Woolgar, S. (1997). The machine at work: Technology, work and organization.
Cambridge, UK: Polity Press.
Katz, J. E. & Rice, R. E. (2002). Social consequences of Internet use: Access, involvement
and interaction. Cambridge, MA: The MIT Press.
Lee, E. W., Ho, S. S., & Lwin, M. O. (2017). Explicating problematic social network sites
use: A review of concepts, theoretical frameworks, and future directions for communica
tion theorizing. New Media & Society, 19(2), 308–326.
Röhle, T. (2005). Power, reason, closure: Critical perspectives on new media theory. New
Media & Society, 7(3), 403–422.
Notes:
(1.) As part of the review, the Digital Humanities Institute at the University of Sheffield
applied concept modelling techniques to a curated corpus of 1,900 journal articles from
the period 1968 to 2017. Concept modelling is a computational linguistic process that in
volves identifying the emergence of concepts, or key ideas, via lexical relationships. For
the purposes of the review, lexical relationships were limited to high frequency co-occur
rences of terms as pairs and trios. The process is entirely data driven and resulted in 2
million rows of data. The website https://www.dhi.ac.uk/waysofbeingdigital/provides
access to the top 50 most frequently occurring pairs and trios through a series of data vi
sualizations. Click on View Data Visualisations at the top. Then check/submit which of the
seven ESRC domains you are interested in (including all). Then choose the visualization.
These show configurations across selected time frames. Choose bubble chart, tree map,
zoomable pack layout, or network diagram, by individual subject or by all seven subjects
combined, by document or concept frequency. You can similarly search the analyzed doc
uments (all, by subject, author, concept, concept trio, and year) by clicking on Browse Ar
ticles at the top. Also, see https://waysofbeingdigital.com/literature-analysis-interactive-
results/for interactive visualizations with mouse-overs of the main clusters of concepts
within each domain, and the relative frequency of concepts associated with each cluster.
Ronald E. Rice
Page 40 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
Ronald E. Rice (PhD, Stanford University, 1982) is the Arthur N. Rupe Chair in the
Social Effects of Mass Communication in the Department of Communication at Uni
versity of California, Santa Barbara. Dr. Rice has been awarded an Honorary Doctor
ate from University of Montreal (2010), an International Communication Association
(ICA) Fellow, selected President of the ICA (2006–2007), awarded a Fulbright Award
to Finland (2006), and appointed as the Wee Kim Wee Professor at the School of
Communication and Information and the Visiting University Professor, both at
Nanyang Technological University in Singapore (Augusts 2007–2009 and June 2010).
His co-authored or co-edited books include Organizations and unusual routines: A
systems analysis of dysfunctional feedback processes (2010); Media ownership: Re
search and regulation (2008); The Internet and health care: Theory, research and
practice (2006); Social consequences of internet use: Access, involvement and inter
action (2002); The Internet and health communication (2001); Accessing and brows
ing information and communication (2001); Public communication campaigns (1981,
1989, 2001, 2012); Research methods and the new media (1988); Managing organi
zational innovation (1987); And The new media: Communication, research and tech
nology (1984). He has published over 150 refereed journal articles and 70 book chap
ters. Dr. Rice has conducted research and published widely in communication sci
ence, public communication campaigns, computer-mediated communication systems,
methodology, organizational and management theory, information systems, informa
tion science and bibliometrics, social uses and effects of the Internet, and social net
works. http://www.comm.ucsb.edu/people/ronald-e-rice
Simeon J. Yates
Simeon J. Yates (PhD, Open University UK, 1993) is Professor of Digital Culture and
Associate Pro-Vice-Chancellor Research Environment and Postgraduate Research at
University of Liverpool. His research on the social, political, and cultural impacts of
digital media includes a long-standing focus on digital media and interpersonal inter
action. More recently, he has worked on projects that address issues of digital inclu
sion and exclusion. He was seconded to the UK Government’s Department of Digital,
Culture, Media, and Sport (DCMS) in 2017 to act as research lead for the Digital Cul
ture team. He remains the joint-chair of the DCMS Research Working Group on Digi
tal Skills and Inclusion. His prior work covered topics such as the use of digital tech
nologies in the workplace, digital media use during crises, and ICT use by the securi
ty services. The majority of his research has been funded by the Economic and Social
Research Council (ESRC), the Arts and Humanities Research Council (AHRC), EU,
and industry. Simeon’s work has often been interdisciplinary and has predominantly
involved creative and digital industry partners. He led on a major Engineering and
Physical Sciences Research Council (EPSRC) funded interdisciplinary program (Engi
neering for Life) while at Sheffield Hallam. Simeon has been researching the impacts
of the internet and digital media on language and culture since 1990. His PhD thesis
(1993) is a large-scale linguistic comparison of speech, writing, and online interac
tion. Subsequent published work has covered analyses of gender differences in com
puter-mediated communication (CMC), gender and computer gaming, email and let
Page 41 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Conclusion: Cross-Cutting, Unique, and General Themes in the Oxford
Handbook of Digital Technology and Society
ter writing, and science in the mass media. Simeon has written text books on social
research methods—in particular, linguistic and discourse analytic methods. https://
www.liverpool.ac.uk/communication-and-media/staff/simeon-yates/
Jordana Blejmar
Page 42 of 42
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Index
The Oxford Handbook of Digital Technology and Society
Edited by Simeon J. Yates and Ronald E. Rice
Print Publication Date: Aug 2020 Subject: Sociology Online Publication Date: Aug 2020
absenteeism 303
abstracts 100
acceptance. See technology acceptance
access 428, 701
AI and 431
broadband 128
cognition and 274–75
content 266
to databases 100
digital divide and 370
at home 370, 381t
ICTs 118
Internet 116
lack of 432
media mastery and 266
patterns of 426
problematic Internet usage and 267
accountability 480, 605, 646, 647
for algorithms 518
automation and 685
for data 518
definition of 634
governance and security and 622
for intelligent machines 355–56
IoT governance and 628–30, 633–34
limits 649
action 454
active citizenship 533, 539
activism 17, 459, 530, 540
Activity Theory 116, 117t
Page 1 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 2 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 3 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
defining 346–47
disruption of 678
emotional support from 358–59
ethics of 346, 353
evidence and research methods 675–76
human intelligence and 347
implications of 675
jobs and 352, 353
legislation 359
policy 359
pseudo 481
social attitudes toward 671, 671t
systems 704
trust in 352–53
weak 346
artificial intelligence care providers (AICPs) 354, 355
arts attendance 441t
ASD. See autism spectrum disorder
Ashton, Kevin 628
Asimov, Isaac 477
assisted care, of older people 149–50
assistive technology 138
association 330
ATMs. See automated teller machines
attachment theory 91
attention
fragmented 24
inattention management 311
(p. 723) meta 253
motivated 253
span 2
splitting 273
attention deficit hyperactivity disorder (ADHD) 275
attitudes 198–200. See also cultural attitudes; social attitudes
toward digital solutions 383–84
about problematic Internet usage 276
UK workforce 387–88
at work 398
audiences x
augmentation 358, 666
authentication 66
authenticity 406, 413
authoritarianism 24
autism spectrum disorder (ASD) 350, 351
automated teller machines (ATMs) 137
automation 429, 431, 620
accountability and 685
adoption and 696–97
Page 4 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 5 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
cues 310
features 310–11
self-awareness 585
usage 275–78
of work 310–11
balance 251–52, 301
banks 137
Barlow, John Perry 531
behavior
boundary management 314
change 194–98, 207, 208n3
datafication of 537
intention and 198
modification 197–98
online group 413
sexual 276
shared behavioral 200
SIDE model of online group 223
social 98, 222
trolling 92
(p. 724) Bell, Daniel 345
Page 6 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 7 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
change as vii–viii
citizenship and 465, 466t, 528–30
communities and identities 420–21, 420t
data and representation 518–23, 522t
Delphi process 75–76, 75t, 242–43, 243t, 245t, 339–41, 340t
interdisciplinary views and vi
volume of literature and digital tools vii
change 273
Changing Work, Changing Lives in the New Technological World 30
Charlie Hebdo 484
chatrooms 234–35
chatting 92
Chicago, IoT governance in 643–46
Chicago Array of Things 629
child development 354, 414
childhood 20
child mortality rates 126
children. See also adolescents
communities and 414
digital image exchange of 616–17
digital media use by 615–17
identities and 414
Internet and 615–17
privacy of 616
risks of 616
China, digital divide in 331
citizenship v, 29, 113, 118, 235, 246, 406, 434
active 533, 539
acts of 532
agency and 527, 533, 539, 541, 649
challenges 465, 466t, 528–30
classic forms of 529
communication and 535
communities and 413
concept of 455t, 531
Page 8 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 9 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 10 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 11 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
imagined 231
(p. 727) Internet and 116
knowledge 409
KSS and 580
leadership 409
literature on 407–15
membership to 406, 413, 418t, 422
network 409
online 406, 410–11, 414
participation 409
politics and 529
power relations in 533
of practice 575–76
reciprocity in 583–84
reputation of 588
scoping review for 406
sense of 231
smart cities and 640
smart phones and 414
social capital and 441
social media and 64
topics 407, 407t, 409–10, 409f, 411t, 413–15
Twitter and 231–32
virtual 583, 590
women’s health and well-being in rural 113, 121–22, 125–26, 129
WordStat analysis of 411t
communities and identities
challenges 420–21, 420t
collective action and 422
communications and media theories and 416
Delphi process and 417
future research and scoping review for 417–19, 418t
psychological theories and 416
sociological theories and 416
theory, method, and approach to 415–17, 416t
computer-mediated communication (CMC) 223, 227, 246–47
definition of 80, 86
growth of 299
identities and 422
platforms 307
social support and 234
temporal patterns of responses in asynchronous 309
computer-mediated communication, mental health and 79
addiction and 82, 89
analytical approach 87–88, 101
articles per discipline 95f
changes over time 93
chatting 92
Page 12 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
computers 4, 6
games and mental health 65–66
literacy 125
older people and 141, 143, 144, 153
women and 123
computer science vi, 522
computing 5, 186
cloud 15
cognitive 348
Page 13 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 14 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 15 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 16 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
unprocessed 564
use of 513–14
variants 562–65
visualizations 77n1, 247n1, 341n1, 423n1, 467n1, 509, 510, 524n1, 626n1, 718n1
data and representation
big data and 507–8
challenges 518–23, 522t
communities and 514–15
concept pairs 503t, 506f
continuous time 509
data methods of 507–8
data sources 511
data visualizations 509, 510
Delphi process and 518–21, 519t, 523t
ethics and 512, 521
expertise and 509
future research and 518
Page 17 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 18 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
development 14
Development and access to information 122–23
devices 22. See also smart phones/mobile phones
interconnected 508
IoT governances and 645–46
multi-device ecology, work-home spaces and 305–7
privacy and 645, 648
specialization 305
Devolution Agreement 642
DHI. See Digital Humanities Institute
dictatorship 471
diet 70, 205
diffusion of innovation 330
Diffusion of Innovation (DOI) Theory 116, 117t
DIGIT. See Developing Innovation and Growing the Internet of Things Act
digital acts, citizenship and 530–33
digital age 6, 25
childhood in 20
first substantive entry 10t
in Nexis Uni (News) 8t
in NGram 10t, 11f
in Proquest Periodicals Index Online 9t
in ScienceDirect 7t
in Web of Science 7t
digital agenda 614
digital by default 429
digital capital 427, 432–33, 438, 445
Digital Catapult and Future Cities Catapult 641
digital citizenship. See citizenship
digital communication. See communication
digital consumption. See consumption
Page 19 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 20 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
elements of 112
frameworks, measurement, and evaluations 123–24
(p. 732) gender and 121–22
Page 21 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
of women 121
digitally mediated interactions 479
digital media
children use of 615–17
education and 443
employment and 702
health and well-being and 71
health care and 65
implementation 699
interpersonal interaction and 45
production 16
role of 718
social class and 428
social interaction and 232
social life and 430
society and vi, 718
socio-economic impact of 334
use 61, 427, 460, 716–17
weight loss and 69–70
digital networking 5–6
Digital Object Identifiers. See DOIs
digital objects 566
digital only 429
digital ownership 334
digital prayer chapels 20
digital products 329
digital resources, digital literacy and 433
digital restrictions, citizenship 535–36
digital rights 539, 540
digital roll-outs
experience of 383–88
jobs and 385–87, 385f
knowledge labor and 383, 384f
negative impacts of 386, 387f
organizational challenges and 388–93, 389f
organizational size and sector and 374, 375f, 376, 376t, 377f, 388, 389f, 390
positive impact of 386f
regression model 397f
success of 384f, 391, 392f, 393, 397f, 397t
technology acceptance and 384
digital skills 112, 329, 380–83, 380t, 382t, 428, 512
acquisition of 331
age and 382
(p. 733) digital divide and 332
Page 22 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 23 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 24 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 25 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
emotions 69
empirical approach 71t, 238t, 335t, 416t, 461t, 516t, 620t
empirical methods 52
empirical research, on intelligent machines 357
empirical work, theories of 52
employees, productivity of 313
employment
automation and 662, 677–78, 692–94
digital media and 702
discrimination 514
opportunity, social networks and 444
empowerment
citizenship 68–69, 533–35, 540–41
communities 64
disempowerment 540
of women 121
encounter of knowing 311
encryption 66, 483, 539
energy 202, 327
Energy Saving Trust 195
engagement 17, 458, 709
Engineering and Physical Sciences Research Council (EPSRC) 629
enjoyment and entertainment, KSS 578
environment
digital development and 187–88
human desires and impact on 196
environmental agency 200
envy 79
(p. 735) EOS DIS. See Earth Observing System Data Information System
Page 26 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
participants 36–39
review chapters 44
scoping review 39–40, 39t, 42, 222t, 323
stakeholder engagement 38–39, 43–44
Steering Group 37t, 41
systematic literature reviews 44–52
team 36–37
theory 40
theory, method, and approach 238–39, 238t
topics 223–37
Wordstat analysis of topics 225t, 325
workshops 43–44
ethics 18, 244, 247, 711t, 717
of AI 346, 353
automation and 680, 695–96
computing and 567
data and representation and 512, 521
of digitalization 513, 521
governance and 637
intelligent machines and 353–56, 358–59
Internet and 613
of LAWS 355
older people and 150
social media and 706
workplace 514
EU Framework 718
European Commission 614
European Commission’s Digital Competence Framework for Citizens 124
European Union, top-down IoT governance in 636–38, 638t
evaluation, of theories 706, 717
everyday life 20, 434–35, 612, 711t
everyday life health information literacy (EHIL) 118
exclusion 17–18, 421, 532, 709, 711t
expertise
data and representation and 509
KSS 579–80
self-presentation and 276–77
traits and 277
extrinsic motivation 574–75, 577, 590
Facebook 232, 235–37, 246, 267, 270, 308, 333, 334
algorithms 481
API 482
bias 91
college students and 614
community and 481
Community Standards of 481
data collected by 226–28
depression and 90–91, 276
Page 27 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 28 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 29 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
geotag 512
geoweb 512
Germany 313
gig economy 21
(p. 737) GII. See Global Information Infrastructures
Page 30 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Haddon, L. 616
HaLow 643
Handbook of children and the media 26
Page 31 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 32 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 33 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
credibility of 413
cultural 565
Delphi process for 405, 406
digital 413
education and 415
experimentation 252
faceted 307
gender and 414–15, 564–65
group 271, 587–88
online 252, 418t, 422
self and 307
self-expression and 483
smart phones and 414
theft 22
verification of 413
virtual 413
IEBT. See Internet and e-business technologies
IHDs. See In-Home Displays
illiteracy, digital inclusion and 121
illness 65
IM. See instant messaging
imagined communities 231
Impact Factor 138
impacts
of automation 43, 323–24, 328, 674
data and representation and 512
social 678–79, 699, 718
implementation 703
digital media 699
of digital solutions 389f
IoT governance 649–50
perceived stress of 396–98, 397t
smart cities 643
inattention management 311
incentives, KSS 581
Incheon Free Economic Zone 646
inclusion. See digital inclusion
independence, of adolescents 233
indeterminate data 568
India, smart phones in 117
individual benefits and costs 582
individualism 459, 534, 590
industrialization 192, 194
industrial revolution 3–4, 14–15, 661
Indymedia 531
inequalities 29–30, 421–22, 512–13, 701–2
automation and 678–79, 679t, 694–95
culture and 445
Page 34 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
resources 3
science 118
search 582
seeking 268, 557
sharing 576, 629
societies 3
studies 236, 522
technology 208
warfare, of Russia 485–86
information and communication technologies (ICTs) 80, 83, 85, 92–93, 99, 331, 699
access 118
big data and 547
digital inclusion and 112
divide 428
gender and 115, 122
information literacy and 118
infrastructure 124
positive aspects of 250–51
work-home boundaries and 300
Page 35 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 36 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 37 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 38 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 39 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 40 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 41 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Mansell, R. 26
manual topic selection and merger 88
manufacturing, robots and 15
marketing 613
mass media 472
materiality 201, 202–3, 206, 569
Matilda 350
measures and measurement 64–66
media
buzzwords 473
comparison, social influence and 277
consumption and 232
dual nature of 252
effects 591
hybrid systems 460
ideologies 254
IoT in 629
liberal 485
literacy 253, 485
manifold 254
mass 472
moral panic and 232
polymedia 254
studies 452
medialife 254
media mastery 250
access and 266
adolescents and 252
balance and 251–52
boundaries and 268–71
complexity of 278
concept 252–56
constraints 271–72
content management 272–74
context of 252–53, 257
definition of 251–52
(p. 744) factors 257
literature 256
materials and coding 256–66, 257t, 260t
obstacles to 274–75
paradoxes, tensions, and contradictions in 252, 712t
sample description 259, 260t, 266
structurational theory and 251–52
typology 257, 257t
usage awareness 275–78
Media Mastery Project 255
mediapolis 254
Media Richness theory 117
Page 42 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
mediatization 254–55
medical data 553
medical information systems 60
memes 479
mental health 275. See also computer-mediated communication, mental health and
AICPs and 354
CMC, mental health and 96–98, 96f, 97t, 101
CMC and 79–80
computer game and 65–66
definition of 84
impairment of 84–85
Internet and 82
of older people 153
SNS and 91
mental illness 80–81, 85
mental thriving 81
meta-attention 253
metadata 100, 557, 565–68
methods innovation 717
microboundaries 314–15
microprocessors via integrated circuits 5
millennials 399, 400, 472
mindfulness 253
misinformation 4, 476, 477
missing areas 707–8
mobile phones. See smart phones
mobile technology
data and representation and 509
digital inclusion and 122–23
mobility
communication technology and 304–5
work-home boundaries and 304–5
Mohammed, Shaheed Nick 477
monetization 536
monitoring technology 149–50, 151
mood management 85
moral panic, media and 232
mothers 122
motivated attention 253
motivational theories 577
motivations 198
extrinsic 574–75, 577, 590
intrinsic 574–75, 577, 581, 590
for KSS 592f
other-oriented motivations KSS 582–88
rewards 581
self-oriented KSS 576–82
MUDs (multi-use dimensions) 414
Page 43 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Netflix 333
Net Inclusion Summit 127
net neutrality 515, 704
networked individualism 534
networked machines 344
networked privacy 229
networking 15
networks 200–203, 452, 454
communities 409
dynamics 459
friendship 273, 414
of practice 576
sociability 407
society 416, 458, 460, 706
theory 14, 330
New Public Management 620
new social era 709t
New York, United States, IoT governance in 648–49
Page 44 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 45 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 46 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
radicalization 476
research 64–65
security issues, older people and 145
self 233
social interaction 69
third spaces 472
Open Data 540
Open Data Executive Order 644
OpenGov Foundation 645
open source software 581
opportunity structures, of digital technology 431
optical character recognition 550
orality 222
organizational challenges
digital roll-outs and 388–93, 389f
of SMEs 389
technology acceptance and 372
organizational culture
digital solutions and 400
measures of 394, 394t, 396
positive 398
strategy and 399–400
technology acceptance and 372
transformation of 401
organizational factors 396
organizational knowledge management system 586
organizational rewards 586
organizational size, digital solutions and 389f
organizational size and sector
digital roll-outs and 374, 375f, 376, 376t, 377f, 388, 389f, 390
digital solutions increase 377, 378f
Organization for Economic Co-operation Development (OECD) 124
organizations 20–21, 712t
original data 566
origins 27–28
othering 472
others, digitization of 18–19
outdated data 552
overjustification hypothesis 581
overuse 267
Oxford handbook of Internet psychology 26
The Oxford handbook of Internet studies 26
Oxford Internet Institute 473
Palmer 195
Palo 649
paradoxes 23
parallelism 305
parental monitoring 20
Page 47 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
parents 615–16
Parkland school shooting 478
Paro 354, 356
participation 14, 17, 23–24, 458, 709
citizenship 531, 533, 633
civic 118
communities 409
in democracy 532
political 459, 533
participatory governance 633
partisan interaction 459
PAS. See Publicly Available Specification
(p. 747) patient safety 64
Page 48 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 49 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 50 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 51 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 52 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
rights
citizenship 528
civil 530
to disconnect 637
feminist 528
human 473, 530
LGBTQ 528
privacy 541, 616
risks
of children 616
of intelligent machines, safety and 354–55
privacy 615
Robotic Process Automation (RPA) 347, 352
Robotized Stereotactic Assistant (ROSA) 350
robots 143, 149, 344
autonomy of 351, 619
child development and 354
defining 347–48
food preparation by 153
goals of 355
health care and 354
human relations with 352
humans and 359
manufacturing and 15
mobile 345
nannies 354
older people and 350
physical 348
privacy and 18
slave labor and 661
social 347–48, 354
trust in 352–53
roles
boundaries and 302
of citizenship 530, 532
conflict 309, 312
of digital media 718
of government vii
of humans 685–86
IM 230–31
work-home conflict and 303
(p. 750) ROSA. See Robotized Stereotactic Assistant
Page 53 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 54 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
self-control 278
self-diagnosis apps 67
self-disclosure 91, 266, 270
self-efficacy 144–45, 330, 587, 588–89
self-esteem 267, 577
self-expression 276–77
identity and 483
Internet and 531
memes and 479
self-injury 271
self-monitoring 70
self-oriented motivations 576–82
self-presentation 268, 269–70, 585
expertise and 276–77
personal information and 274
on SNS 82
self-preservation, choices and 276
self-regulation 277–78, 637
Seoul 646
service delivery 429
service sector 345
service work, automation of 348
sexting 276, 616–17
sex trafficking 22
sexual behavior 276
sexual intercourse 271
sexual reputation 617
shared behavioral routines 200
shared space 305
sharing platforms 536
Short Warwick-Edinburgh Mental Well-Being Scale (SWEMWBS) 124
SIDE model of online group behavior 223
Silicon Valley 480
simulations 354
Singapore 647
(p. 751) singularity 19
Page 55 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 56 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
formation of 426
groupings 444
Internet and 438f
social media and 437f, 442, 443f, 444f
social comparison 79, 584–85
social compensation 91
social competence, of adolescents 233
social construction
of algorithms 518
of data 518
of digital technology 517–18
of technology 255
work and 302–3
social construction of technology (SCOT) 300, 315
social context 93, 229, 661–63
Social Credit System 482
social cues 222–23
social displacement 82
social distinctions, digital inequalities and 426, 431–32, 434
social dynamics 513
social environment 445
social era, names for new 14–15
social exchange theory 577–78
social exclusion 331, 426–27, 434
social expectations 269, 309
social facilitation 585
social governance 635
(p. 752) social identity theory 583, 588
Page 57 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 58 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
gratifying 272–73
loss and 273
usage and 276
social resources, Internet and 82
social robots 347–48, 354
social science v, 45, 196, 200, 208n2, 510
automation and 680, 696
theories 706
Social Sciences Citation Index 256
social shaping, of technology 255
social sorting 538, 541, 612
social space, smart phones and 509
social support 82, 91, 268, 271
adolescents and 233–34
CMC and 234
health care and 68–69
literature 68–69
social theory, viii
social welfare system 430
social wellbeing 270
societal effects 22, 712t
society. See also digital society
citizenship and 541
digital media and vi, 718
(p. 753) digital technology and 31, 714
Page 59 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 60 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
technology 138
adoption of 330
appropriate use of 438
automation 676–77
change of 703
characteristics 16, 710t
co-designing 244
culture and 676
dependence on 150
development, automation and 696–97
education and 59–60
governance and 629
home and 399
human and 357
infrastructures 647
(p. 754) leveraging on 314
machines 350
older people and mainstream 139–50
older people interaction with mainstream 139–42, 151
privacy and 644
rules for 314
social behavior and 98
social construction of 255
social shaping of 255
standards 333
sustainability and 325
types, older people and 143
value, older people and 144
venues 15–16, 710t
work and 399
technology acceptance 370
digital efficacy 380–83, 380t, 382t
digital roll-outs and 384
ESRC-DSTL 672t
factors of 371–72
of intelligent machines 358
key elements of 382
models 371, 387, 398
older people and 143–44
organizational challenges and 372
organizational culture and 372
survey and analysis methods 372–74
in UK workforce 369, 372
Technology and engagement (Rowan-Kenyon and Alemán) 267
techno-resistance 271–72
technostress 93
teenagers. See adolescents
telecare 143, 145
Page 61 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
telecommunications vi
telephone 4, 232
telepressure 93
television 85, 142, 146, 148, 153
teleworkers 304–5
temporal boundaries 301
temporal properties, of communication 311
tensions 23
terrorism 24, 459, 487
Terry, N. 195
Tesler, Larry 347
texting 92, 277, 539
theories viii, 70–72, 416, 709t
books, conceptualization and 12t, 14–15
conspiracy 478
Delphi process 335–36, 335t
development of 52, 706, 717
of empirical work 52
evaluation of 706, 717
motivational 577
social science 706
testing 706, 717
thought, language and 46
thoughtfulness 24
3D printer 5–6
3G wireless connections 120
Todo Chile Comunicado (All Chile Connected) 120
top-down strategies for management of boundaries 312–13
touchscreens 141
trade 333
training 711t
traits, expertise and 277
transactional interactions 508–9
transactive memory theory 577
transgender 564
transitions, social media and 270
transnationalization 528–29
transparency 646, 647, 649
about algorithms 67, 480
data 562
IoT governance and 634–35, 638, 651
tree map, of concept pairs 49f
troll farms 480
trolling behavior 92
Trump, Donald 452, 482
trust 605
in AI 352–53
algorithms and 501
Page 62 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 63 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
well-being vi, 29
WhatsApp 308, 310
whistleblowing 530–31
white nationalism 479
whole populations, data and representation and 509
WiFi 641, 648–94
Page 64 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
Page 65 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).
Index
policy 313
productivity and 313
segmentation of 312–13
spaces, multi-device ecology and 305–7
terminology about 300–301
violations of 314
work expectations and personal availability in 309–10, 314
working age, older people and 136
workplace
digital culture 394
ethics 514
workshops 43–44
WRAP. See Waste and Resources Action Program
writing 223
young people 228, 232–35
YouTube 478, 481
Zuckerberg, Mark 483
Page 66 of 66
PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights
Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in
Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).