Professional Documents
Culture Documents
Birchmeier - 2011 - Strategic Uses of Social Technology An Interactive Perspective of Social Psychology
Birchmeier - 2011 - Strategic Uses of Social Technology An Interactive Perspective of Social Psychology
Edited by
Zachary Birchmeier, Beth Dietz-Uhler, and
Garold Stasser
c a m b r i d g e u n i ve r s i t y p r e s s
Cambridge, New York, Melbourne, Madrid, Cape Town,
Singapore, São Paulo, Delhi, Tokyo, Mexico City
Cambridge University Press
The Edinburgh Building, Cambridge CB2 8RU, UK
Published in the United States of America by Cambridge University Press,
New York
www.cambridge.org
Information on this title: www.cambridge.org/9780521899260
C Cambridge University Press 2011
A catalogue record for this publication is available from the British Library
v
vi Contents
Index 211
Figures
vii
Tables
viii
Notes on the contributors
susanne abele
Department of Psychology
Miami University
zachar y birchmeier
Graduate & Continuing Studies
Stephens College
jordan m. carpenter
Department of Psychology
University of North Carolina at Chapel Hill
caleb t. carr
Department of Communication
University of Oklahoma
d av i d c . d e a n d r e a
Department of Communication and Department of Epidemiology
Michigan State University
beth dietz-uhler
Department of Psychology
Miami University
karen m. douglas
School of Psychology
University of Kent
melanie c. g reen
Department of Psychology
University of North Carolina at Chapel Hill
a n d r e a b. h o l l i n g s h e a d
Annenberg School for Communication and Journalism
Marshall School of Business
ix
x Notes on the contributors
Department of Psychology
University of Southern California
girish lala
Department of Psychology
The Australian National University
mar tin lea
The School of Psychological Sciences
The University of Manchester
craig mcgar ty
School of Psychology
Murdoch University
tom postmes
Department of Social and Organizational Psychology
University of Groningen
kai sassenberg
Knowledge Media Research Center
Tübingen, Germany
russell spears
School of Psychology
Cardiff University/University of Groningen
garold stasser
Department of Psychology
Miami University
stephanie tom tong
Department of Communication Studies
University of Puget Sound
b r a n d o n va n d e r h e i d e
School of Communication
The Ohio State University
j o s e p h b. w a l t h e r
Department of Communication and Department of
Telecommunication,
Information Studies & Media
Michigan State University
Notes on the contributors xi
e r i c d . we s s e l m a n n
Department of Psychological Sciences
Purdue University
kipling d. williams
Department of Psychological Sciences
Purdue University
a n k a wo l b e r t
Department of Social Psychology
University of Amsterdam
Acknowledgments
xii
1 Introduction
1
2 Zachary Birchmeier, Beth Dietz-Uhler, and Garold Stasser
In this sense, the most effective way of clarifying the meaning of messages is to
relate them to a shared context of meaning. (p. 14)
Bottom-up approaches
Each treatise has summarized the existing theory and research on the
implications of the internet for social contexts. Each has organized the
available theories by categories of group dynamics, online relationships,
and social influence, among others. Each has also drawn general conclu-
sions about computer-mediated communication in a bottom-up fashion
by noting general effects of technology on social communication and
relationships.
Interactionist response
Spears et al. (2002) conclude that an interactionist model of social and
technological influence may better explain variability in both the use
of technology for social purposes and the tendency for technology to
enhance social interaction. In sum, observations of social behavior in
computer-mediated settings often parallel those in face-to-face contexts,
but the social qualities of communication and cognition are also com-
monly enhanced by specific communication modes. Personal influences
on online cognitions and behaviors are noted where the authors dis-
cuss individuals’ strategic uses of social technologies (i.e., connecting to
anonymous, online forums populated with like-minded others) as hav-
ing cognitive effects on those users (i.e., enhanced social influence and
attitude polarization).
Similarly, Joinson (2003) presented the Strategic and Motivated user
model that includes Expected and Emergent effects (SMEE). This model
accounts for users’ selections of communication media and forums as a
determinant of the effects of those media (i.e., cognitive changes in self-
awareness and social identity salience; behavioral changes in language use
and self-disclosure, etc.). These changes in users’ cognitive and behav-
ioral states are then construed to influence future choices of communica-
tion media. Elements of these ideas were also addressed in Mantovani’s
(2001) chapter in discussing the uses of and reactions to the computer-
mediated social context. Attending to the ability for individuals to choose
communication media for various purposes, Mantovani denotes that
user goals of “information seeking” and “social gathering” both involve
social interdependence, but with differing amounts of synchronicity and
interactivity between communicators. These ideas are congruent with
the intended uses for the world-wide web from its creators: to share
Introduction 5
Top-down theories
Some of the available reviews and books on computer-mediated commu-
nication have sought to structure the available theories and research in
a top-down fashion. For example, Galimberti and Riva’s (2001) chapter
applied theories of psycholinguistics and communication, in ephemeral
terms, to characterize online social contexts. Sherman’s (2001) chap-
ter in the same text also applied social cognition theories of bias in
social information processing to characterize impression formation and
categorization processes among online interactants (see also Rafaeli
et al., 2004). Authors in Amichai-Hamburger’s (2004a) text applied
topic-specific social psychological principles and theories to specific
domains of online communication, including persuasion (Guadagno and
Cialdini, 2004), prosocial behavior (Sproull et al., 2004), and prejudice
(Glaser and Kahn, 2004).
Similarly, Spears et al. (2002) provided a notable theoretical framework
for conceptualizing online group dynamics in light of a Social Identity
model of Deindividuation Effects. Their SIDE model characterized the
effects of subjective group norms on spontaneous social identity salience
that had been inferred and tested previously from observations of offline
groups (Hogg and Abrams, 1988; Reichert et al., 1995; Tajfel and Turner,
1986). The existing social identity framework of group dynamics was then
applied against the potential for the internet to involve distanced users in
meaningful social categorizations and to provide enhanced group identity
salience via anonymous meeting forums. Thus, the online context was
illustrated as a ripe field for potent social influence.
Amichai-Hamburger’s (2004b) chapter discusses the existing research
that involves strategic choices of social internet technologies as a function
of personality traits, and calls for more research on the interaction of
technologies and individuals. The author notes Kraut et al.’s (2002)
observations that more extraverted individuals are more likely to use
internet technologies in order to interact directly with others. Amichai-
Hamburger’s research has also shown that, when more introverted or
neurotic individuals seek direct interaction with others online, they are
more likely to express aspects of their self-concept that are not expressed
during typical face-to-face interactions (i.e., “Real-Me” characteristics;
Bargh et al., 2002; see also Maldonado et al., 2001). The author also
speculates on how an individual’s levels of need for closure, need for
6 Zachary Birchmeier, Beth Dietz-Uhler, and Garold Stasser
cognition, attachment style, and locus of control may affect their goals,
intentions, and strategies when spending time connected to the internet.
Interactionist framework
To date, a handful of chapters in separate texts have posited an inter-
actionist framework in analyzing computer-mediated communication.
These inferences have been drawn from topic-specific research find-
ings that personality characteristics, identity content, and personal biases
can moderate the choice and impact of communication media. What is
needed at this point is to apply the rubric of social psychology more sys-
tematically onto the fundamental processes of impression, relationship,
and group processes online with the goal of identifying new directions of
research in the growing modes of social connectivity.
This text systematically applies the person-by-situation rubric of social
psychology onto computer-mediated communication by including the
technological source of influence. By beginning with a broad, domain-
level framework and then imposing this structure onto the existing works,
the potential for more comprehensive analyses and applications of those
works is increased. The social psychological orientation is unique in that it
provides comprehensive, pluralistic explanations for socio-behavioral and
socio-affective levels of analysis in addition to the socio-cognitive level.
Thus, online behaviors such as questioning or disclosing information
can also be explained, and programs can be proposed for improving the
efficacy of online social support networks as well as electronic group
decision making.
In this text, prominent psychologists summarize the existing research
in their respective areas of expertise. They then organize these findings
within the established rubric of social psychology. Each author also spec-
ulates as to how other sources of influence that have not yet been tested
may affect individuals who communicate online. By identifying the influ-
ences that shape individuals’ thoughts, feelings, and behaviors online,
and evaluating the relative strength and interactive properties of those
sources of influence, other scientists may make use of this broad theo-
retical framework to make recommendations for improving social and
collaborative relations that are supported by computers. In addition, the
potential sources of influence that have not yet been explored are out-
lined in more detail, thus identifying future directions for research and
intervention.
Many who study computer-mediated communication are social
psychologists. In general, social psychologists have been concerned
historically with evaluating how strong the power of the situation can
Introduction 7
be in influencing how people relate to, think, and feel about others.
The preference of a situational explanation of social phenomena is often
portrayed to be at odds with longstanding, classic psychological explana-
tions of individual behavior that have focused on the validation of stable
traits that characterize individuals (e.g., self-monitoring) and correspond
to behaviors (e.g., conformity). Kurt Lewin’s seminal propositions, that
those inner, personal, and external social factors would be shown to com-
bine in meaningful ways to influence people’s behaviors, have been tested
and elaborated upon by social psychologists in the last seventy years.
other factor (as when the extreme factor is near zero) or increase the
weight of the other factor geometrically. Snyder and Ickes (1985) differ-
entiated cases when personal variables moderate the impact of the situ-
ation, as well as the converse. They illustrated their points with observa-
tions that individuals who express relatively low levels of self-monitoring
are more likely to resist social pressures to express particular attitudes,
or otherwise behave differently from situation to situation. Conversely,
social situations with particularly weak or unclear expectations for behav-
ior (e.g., a Yahoo! American Idol chat room) can allow for individuals
to express aspects of their self-concepts that are central to their iden-
tities but that also possess some risk in being a target of prejudice by
others. The multiplicative interaction of personal and social influences
has been shown to account for significant amounts of variability in peo-
ple’s behaviors, thoughts, and feelings, above and beyond the effects
of each influence alone, in research on many social issues (Snyder and
Ickes, 1985), including the effects of prejudice (Steele, 1997), aggression
(Baumeister et al., 2000), and persuasion (Haugtvedt et al., 1992).
In contemporary social contexts involving internet connectivity, the
additional factors of media richness and social presence must also be
considered. In a technological x social interaction perspective, the con-
straints imposed by less rich distanced technologies can either increase or
decrease the impact of the social influence when trading emails or posting
messages on a blog. For example, research by Wesselmann and Williams
(this volume) has shown that reactions to social ostracism are character-
ized by quiet withdrawal in a typical offline setting, but that ostracized
participants display a virtual bravado in chatroom settings by continuing
to send messages to the group. The interaction of technological and social
influences is also illustrated in scientific evidence reported by Green and
Carpenter (this volume). They find that the willingness to trust another
person when online depends on the perceived similarity between parties,
as well as the ability to verify their identity through social ties.
The features of the communication media that are chosen for group
interactions can also make or break the quality of any decisions or judg-
ments that are reached. For example, important research on electronic
teamwork has found that the perception of anonymity that social tools
create may help those teams make better decisions by increasing the likeli-
hood of participation from minority factions (McLeod et al., 1997). Den-
nis et al. (1999) also found that, in group tasks requiring greater interde-
pendence (e.g., decision-making contexts), only groups composed of all
women were able to benefit from using richer media for communication.
We can also observe triple interactions among the technological, social,
and personal sources of influence: when online, which individuals are
Introduction 9
Dynamic interactionism
Using Snyder and Ickes’ theoretical framework, explanations of social
processes can better fit reality by accounting for the tendency in indi-
viduals to respond to situations differently depending on our unique
attributes as individuals. The influences of social and personal factors
can also be correlated. Snyder and Ickes (1985) elaborated on how tech-
nology mode, social context, and personal characteristics can be dynamic
in their influences:
In each case individuals appear to gravitate actively toward social situations that
will foster and encourage the behavioral expression of their own characteristic
dispositions and interpersonal orientations. To the extent that they succeed in
regularly and consistently spending time in these situations, and to the extent
that these situations promote the regular and consistent display of behavioral
10 Zachary Birchmeier, Beth Dietz-Uhler, and Garold Stasser
Conclusion
Interpersonal relationships and group dynamics that use internet tools
to exert power and achieve personal and group goals can be effectively
explained using the rubric of social psychology. The interaction of per-
sonal and social influences has been shown to account for significant vari-
ability in people’s behaviors, thoughts, and feelings, above and beyond
the effects of each influence alone. Using this theoretical framework,
explanations of social processes can better fit reality by accounting for
the tendency in individuals to:
r choose situations to experience, or groups to belong to, that are con-
gruent with their values and capabilities
r respond to situations differently depending on their unique attributes
as individuals
r be active participants in social contexts by influencing other group
members and negotiating norms.
Including the impact of individual predispositions, choices, and
motivations on social uses of internet tools allows for more effective
management of those processes by identifying the factors that can be
manipulated to facilitate the expression of power for minority inter-
ests, prevent ostracism, or facilitate healthy, productive interdependence
among people using networked computers. The potential for social tech-
nologies to connect remote minds, to communicate emergent ideas, and
to empower individuals should establish the relevancy of the CSI per-
spective for interested readers in all communities and cultures. Theo-
retical analyses of online communication and collaboration have yet to
apply systematically the perspective of social psychology that Snyder and
Ickes summarized. The most important contributions of this volume are
the authors’ plots of trajectories for future research. Continued research
will enhance the prosocial, instrumental, and therapeutic uses of social
technologies.
References
Amichai-Hamburger, Y. (2004a). The social net: Human behavior in cyberspace.
New York: Oxford University Press.
12 Zachary Birchmeier, Beth Dietz-Uhler, and Garold Stasser
Glaser, J., and Kahn, K. (2004). Prejudice, discrimination, and the internet. In
Y. Amichai-Hamburger (Ed.), The social net: Human behavior in cyberspace
(pp. 247–274). New York: Oxford University Press.
Guadagno, R., and Cialdini, R. (2004). Online persuasion and compliance:
Social influence on the internet and beyond. In Y. Amichai-Hamburger
(Ed.), The social net: Human behavior in cyberspace (pp. 91–114). New York:
Oxford University Press.
Haugtvedt, C. P., Petty, R. E., and Cacioppo, J. T. (1992). Need for cognition
and advertising: Understanding the role of personality variables in consumer
behavior. Journal of Consumer Psychology, 1(3), 239–260.
Haythornthwaite, C., Wellman, B., and Garton, L. (1998). Work and community
via computer-mediated communication. In J. Gackenbach (Ed.), Psychology
and the internet (pp. 199–226). San Diego, CA: Academic Press.
Hertel, G., Geister, S., and Konradt, U. (2005). Managing virtual teams: A
review of current empirical research. Human Resource Management Review,
15, 69–95.
Hinds, P., and Kiesler, S. (Eds.) (2002). Distributed work. Cambridge, MA: MIT
Press.
Hogg, M. A., and Abrams, D. (1988). Social identifications: A social psychology of
intergroup relations and group processes. London: Routledge.
Ickes, W., Snyder, M., and Garcia, S. (1997). Personality influences on the choice
of situations. In R. Hogan, J. Johnson, and S. Briggs (Eds.), Handbook of
personality and social psychology. San Diego, CA: Academic Press.
Joinson, A. N. (Ed.) (2003). Understanding the psychology of internet behaviour:
Virtual worlds, real lives. New York: Palgrave Macmillan.
Kiesler, S., and Sproull, L. (1992). Group decision making and communication
technology. Organizational Behavior and Human Decision Processes, 52(1),
96–123.
King, J. L., Grinter, R. E., and Pickering, J. M. (1997). The rise and fall of
netville: The saga of a cyberspace construction boomtown in the great divide.
In S. Kiesler (Ed.), Culture of the internet (pp. 3–33). Mahwah, NJ: Lawrence
Erlbaum Associates.
Kraut, R., Kiesler, S., Boneva, B., Cummings, J., Helgeson, V., and Crawford,
A. (2002). The internet paradox revisited. Journal of Social Issues, 58, 49–74.
Kreijns, K., Kirschner, P. A., and Jochems, W. (2003). Identifying the pitfalls
for social interaction in computer-supported collaborative learning environ-
ments: A review of the research. Computers in Human Behavior, 19, 335–353.
Lefcourt, H. M. (1982). Locus of control: Current trends in theory and research (2nd
edn.). Hillsdale, NJ: Erlbaum.
Lewin, K. (1935). A dynamic theory of personality. New York: McGraw-Hill.
Maldonado, G. J., Mora, M., Garcia, S., and Edipo, P. (2001). Personality, sex
and computer communication through the internet. Anuario de Psicologia,
32, 51–62.
Mantovani, G. (2001). Beyond the “impact” metaphor: The mutual shaping
of psychological theory and internet development. In G. Riva and C. Gal-
imberti (Eds.), Towards cyberpsychology: Mind, cognition, and society in the
internet age (pp. 39–51). Washington, DC: IOS Press.
14 Zachary Birchmeier, Beth Dietz-Uhler, and Garold Stasser
McKenna, K. Y. A., and Bargh, J. A. (1998). Coming out in the age of the inter-
net: Identity demarginalization through virtual group participation. Journal
of Personality and Social Psychology, 75, 681–694.
(2000). Plan 9 from cyberspace: The implications of the internet for personality
and social psychology. Personality and Social Psychology Review, 4, 57–75.
McLeod, P. L., Baron, R. S., Marti, M. W., and Yoon, K. (1997). The eyes
have it: Minority influence in face-to-face and computer-mediated group
discussion. Journal of Applied Psychology, 82(5), 706–718.
Mischel, W. (1968). Personality and assessment (pp. 136, 235). New York: Wiley.
Myers, D. (2005). Social psychology (8th edn.). New York: McGraw-Hill.
Rafaeli, S., Raban, D., and Kalman, Y. (2004). Social cognition online. In Y.
Amichai-Hamburger (Ed.), The social net: Human behavior in cyberspace (pp.
57–90). New York: Oxford University Press.
Reichert, S. D., Spears, R., and Postmes, T. (1995). A social identity model of
deindividuation. European Review of Social Psychology, 6, 161–198.
Riva, G. (2002). The sociocognitive psychology of computer-mediated commu-
nication: The present and future of technology-based interactions. CyberPsy-
chology & Behavior, 5, 581–598.
Riva, G., and Galimberti, C. (Eds.) (2001). Towards cyberpsychology: Mind, cog-
nition, and society in the internet age. Washington, DC: IOS Press.
Rotter, J. B. (1966). Generalized expectancies for internal versus external control
of reinforcement. Psychological Monographs, 80, 1–28.
Secord, P. F., and Backman, C. W. (1965). An interpersonal approach to per-
sonality. In B. Maher (Ed.), Progress in experimental personality research, Vol.
2 (pp. 91–125). New York: Academic Press.
Sherman, R. C. (2001). The mind’s eye in cyberspace: Online perceptions of self
and others. In G. Riva and C. Galimberti (Eds.), Towards cyberpsychology:
Mind, cognition, and society in the internet age (pp. 53–72). Washington, DC:
IOS Press.
Short, J., Williams, E., and Christie, B. (1976). The social psychology of telecom-
munications. London: Wiley.
Snyder, M. (1983). The influence of individuals on situations: Implications for
understanding the links between personality and social behavior. Journal of
Personality, 51, 497–516.
Snyder, M., and Ickes, W. (1985). Personality and social behavior. In G. Lindzey
and E. Aronson (Eds.), Handbook of social psychology (3rd edn.). New York:
Random House.
Spears, R., Postmes, T., Lea, M., and Wolbert, A. (2002). When are net
effects gross products? The power of influence and the influence of power
in computer-mediated communication. Journal of Social Issues, 58, 91–
107.
Sproull, L., Conley, C., and Moon, J. Y. (2004). Prosocial behavior on the net.
In Y. Amichai-Hamburger (Ed.), The social net: Human behavior in cyberspace
(pp. 139–162). New York: Oxford University Press.
Stasser, G. (1992). Pooling of unshared information during group discussion.
In S. Worschel, W. Wood, and J. A. Simpson (Eds.), Group processes and
productivity (pp. 48–67). Newbury Park, CA: Sage.
Introduction 15
Steele, C. (1997). A threat in the air: How stereotypes shape intellectual identity
and performance. American Psychologist, 52(6), 613–629.
Tajfel, H., and Turner, J. C. (1986). The social identity theory of intergroup
behavior. In S. Worschel and W. G. Austin (Eds.), Psychology of intergroup
relations (pp. 7–24). Chicago, IL: Nelson-Hall.
Thurlow, C., Lengel, L., and Tomic, A. (2004). Computer-mediated communica-
tion. Thousand Oaks, CA: Sage Publications.
Tidwell, L. C., and Walther, J. B. (2002). Computer-mediated communication
effects on disclosure, impressions, and interpersonal evaluations: Getting to
know one another a bit at a time. Human Communication Research, 28(3),
317–348.
Walther, J. B. (1996). Computer-mediated communication: Impersonal, inter-
personal, and hyperpersonal interaction. Communication Research, 23, 3–43.
2 A SIDE look at computer-mediated
interaction
Introduction
The new communications technologies are developing at such a fast pace
that it is difficult for research and theorizing to keep up. Although explor-
ing the range of applications and instantiations of the latest forms of
computer-mediated communication (CMC), texting, and video-based
phone systems provides many useful insights, research and theorizing
that lag behind the technological developments will run the risk of being
phenomenon- and even technology-driven, making it difficult to antici-
pate new uses and consequences. In this chapter we therefore adopt a
theory-focused approach to make some sense of the effects of the new
technologies (as Kurt Lewin said, there is nothing so practical as a good
theory), and a primarily experimental methodology to test this. We focus
on a theoretical framework that we have developed over a number of years
to gain insights into the effects of CMC in social and organizational set-
tings: the SIDE model. We have found this model useful in helping to
correct a tendency, in the literature on CMC in particular, to underesti-
mate the role of social influences on and within these technologies, and
an equal (and perhaps opposite) tendency to overestimate their capacity
to counteract the impact of status and power.
In particular, we think this theoretical model has been useful in helping
us to understand (and predict) some of the more counterintuitive find-
ings of behavior found using computer-mediated communication. The
idea that people actually conform when isolated from and anonymous to
their group is a good example of such an effect explained by the SIDE
model. Gender, which is a key focus in the present chapter, also forms
an interesting case study in this respect. Much theorizing and research
has proposed that women might become more assertive and less submis-
sive when liberated by the anonymity of CMC. Our research suggests
that this is not necessarily the case. The SIDE model helps to explicate
16
A SIDE look at computer-mediated interaction 17
Before getting into this we provide some brief background on the theo-
retical roots of SIDE. The social identity approach provided the basis for
a critique of classical deindividuation theory that was the launch-pad for
the SIDE model (Reicher et al., 1995; Spears and Lea, 1992, 1994).
Deindividuation theory had been used to explain the antisocial and
aggressive products of crowd behavior (Diener, 1980; Festinger et al.,
1952; Prentice-Dunn and Rogers, 1989; Zimbardo, 1969). More rel-
evant here, deindividuation principles have also been invoked by the
first researchers trying to understand negative aspects of behavior in
computer-mediated communication such as “flaming” (Kiesler et al.,
1984). The basic argument of deindividuation theory is that immersion in
the group, and anonymity associated with this, can produce a “deindivid-
uated” state of reduced self-awareness (or even a “loss of self ”), resulting
in deregulated and disinhibited behavior (Diener, 1980; Prentice-Dunn
and Rogers, 1989; Zimbardo, 1969).
Glossing over the fact that the stereotypically cool and rational context
of CMC (Lea, 1991) seems very different to the chaos of the crowd,
the (visual) anonymity in CMC does provide one starting point for the
analyses of its effect compared with face-to-face (FtF) interaction. How-
ever, we have questioned the applicability of deindividuation theory to
the context of CMC and developed a social identity critique of deindi-
viduation as applied to the explanation of collective behavior in crowds
(e.g., Reicher, 1987). Because we have described this critique in detail
elsewhere (e.g., Spears et al., 2001, 2007), we reproduce this only briefly
here. Basically, our argument is that there is very little evidence for the
operation of a deindividuated state, and a meta-analysis of the deindi-
viduation literature suggests that, far from producing antinormative or
antisocial behavior, the classical deindividuation conditions of anonymity
in the group actually enhance conformity to (more specific) group norms
(Postmes and Spears, 1998). Whether such group norms are antisocial
or prosocial is highly contingent on the nature of the groups. The theo-
retical point is that the evidence that supposedly deindividuating settings
prompt individuals to search for the meaning and guidance provided by
norms suggests a much more socially regulated and less mindless process
than implied in deindividuation theory.
Such findings, however, are quite consistent with the predictions of the
self-categorization theory, and more specifically the SIDE model. The
SIDE model does not dispute that there are real psychological effects of
group immersion and anonymity that need to be explained. Instead of
seeing these as a product of reduced self-awareness or loss of self associ-
ated with a deindividuated state, it proposes that anonymity can enhance
the salience of group identities and further “depersonalize” social
A SIDE look at computer-mediated interaction 19
Moreover, differences in identity content (for men and women) also help
to explain different behavioral outcomes for these groups, once identity
is made salient, consistent with this PxS metaphor.
Before we get on to these effects, however, it is important to draw a
theoretical distinction between the effects that anonymity vs. visibility
might have on the salience of group identity, and a different class of
effects influenced by such features. Another effect of anonymity already
documented within the deindividuation tradition is the idea that this
reduces our accountability to others compared with the case where we
are visible and identifiable. Deindividuation theorists had long noted
that one effect of being anonymous or disguised is that it gives people
license to indulge in antisocial behavior by escaping identification and
punishment (Festinger et al., 1952; Zimbardo, 1969). However, such a
process clearly reflects a conscious strategy rather than the deregulation
of behavior implied by the unconscious deindividuated state (Diener,
1980; Prentice-Dunn and Rogers, 1989).
The SIDE model also incorporates the role for strategic effects, and
examines how anonymity can help to release behavior that might other-
wise be punished by powerful others or out-groups, and therefore con-
strained. By strategic we simply mean behavior that is designed to address
identity-consistent needs or goals and that takes into account the ability
of other agents (e.g., powerful out-group audiences) to block or punish
such behavior when it conflicts with their own identity and interests.
Identity-consistent behavior that is suppressed or delayed under such
conditions could therefore be said to be “strategic.” There are some
important differences here with the early deindividuation formulations
of accountability, however. In the SIDE model, strategic self-presentation
is not just about protecting and promoting personal self and self-interest
but may flow from group-level self-definition. Moreover, although strate-
gic behavior here may take into account the potential disapproval of the
audience, it does not have to be negative or antisocial from the perspec-
tive of the in-group. This will depend on group norms and agendas; the
behavior expressed might be quite prosocial and in line with the interests
of the one group but happen to conflict with the interests of a powerful
out-group.
Framed in these terms, anonymity can provide a vehicle for resistance.
However, in CMC the situation is complicated by the fact that, as well as
providing a degree of anonymity, the text-based and recorded nature of
CMC, and ICTs generally, can also introduce other sources of account-
ability and even the possibility of surveillance and control (Gandy,
1993). Second, an important feature of CMC, compared with classic
in vivo group immersion, is that people are typically (but not always)
22 Russell Spears, Martin Lea, Tom Postmes, and Anka Wolbert
both support for other views (which we call opinion support) and the
willingness to act on these views (which we call action support), which
can foster resistance to the power of dominant groups. As such, email and
the internet clearly are also powerful mechanisms for coordinating and
mobilizing collective action for groups that are geographically isolated
(e.g., Brunsting and Postmes, 2002; Postmes and Brunsting, 2002). So
despite being isolated at the terminal, access to the network as a source
of power should not be underestimated.
Clearly these factors (the vulnerability of isolation and surveillance,
the power of communication and connectedness) can work in opposite
directions. Within the context of the SIDE model the picture is further
complicated by the fact that cognitive and strategic effects of CMC need
to be taken into account, and will work in different ways, having different
effects. This is illustrated in two studies by Spears, Lea et al. (2002),
which were aimed at investigating the strategic aspect of SIDE, but were
also designed to disentangle the strategic and cognitive effects associated
with CMC. In this research we adapted a paradigm developed by Reicher
and colleagues designed to investigate the effects of empowerment in
the staff–student intergroup relationship (Reicher and Levine, 1994a,
1994b).
Reicher and Levine (1994a) established different classes of behavior
relevant to testing for the effects of empowerment of a low-power group
(students) in relation to a powerful out-group (staff). Specifically, they
distinguished behaviors that were normative for the in-group and toler-
ated by the out-group (e.g., partying in one’s free time) from behavior
that was normative for the in-group but proscribed by the out-group
(e.g., missing lectures and tutorials). The crucial point is that the disem-
powered group is more likely to constrain behavior that could be seen
as punishable by the out-group when the in-group feels vulnerable to
that group’s power of sanction (e.g., when they are accountable, and
isolated). This prediction was confirmed: students were more likely to
endorse behaviors proscribed by the out-group when they were anony-
mous and therefore not accountable (Reicher and Levine, 1994a), and
when they had the implied social support of other in-group members
present, rather than being isolated (Reicher and Levine, 1994b).
We adapted this paradigm and applied it to the context of CMC in
order to assess the effect of this technology as a channel to communicate
opinion and action support that could foster resistance against a powerful
out-group. In the first study we manipulated the availability of CMC
while keeping constant co-presence of other members of the in-group
(the group of students were all located in the same room). At the same
time we manipulated the visual anonymity associated with the cognitive
26 Russell Spears, Martin Lea, Tom Postmes, and Anka Wolbert
with high salience. The order in which these topics were discussed was
counterbalanced.
For the discussion topic where nationality was salient we found
the classic cognitive SIDE effect whereby group cohesiveness (of own
nationality) was enhanced by anonymity, mediated by prototypical-
ity and self-categorization (the depersonalization process) and social
attraction within the nationality subgroup. However, in the case where
the discussion topics made gender salient, the visible condition led to
increased group cohesiveness within the gender subgroup mediated by
self-categorization and social attraction to their subgroup. In short, the
social attractiveness and cohesion with the group followed a different
route depending on whether the social category was strongly visibly cued
(as in the case of gender) or not (nationality). Although we did not
measure dominance and power in this study, the implication is that mak-
ing gender visible may also strengthen stereotypical group differences in
power relations. So, in the case of gender, removing visual anonymity
does not seem to represent the best solution to breaking down the gen-
der divide any more than anonymity does. In sum, the evidence from the
cognitive side of SIDE is that, whether visible or visually anonymous,
CMC does not seem to eliminate the power and stereotypical differ-
ences that could work against women in gender-based communication
contexts.
the workplace and in the organization. This was the aim of the final study
we describe here.
In this study we conducted a large survey of a multi-national company
as part of a European-funded project investigating email use in organiza-
tions (COMMORG). As well as providing insights into the role of how
men and women manage their gender identity using email in the orga-
nization, this study allowed for interesting cross-cultural comparisons,
given that the survey was conducted within the same company across
different European countries (specifically the UK, the Netherlands, Italy,
and Greece, although we dropped the Greek comparison from the fol-
lowing analyses as the sample was too small). One of the questions we
were interested in here was whether women were more likely than men
to conceal their gender identity when using email, for many of the rea-
sons we have already addressed above (Spears et al., unpublished data).
Given their vulnerable power and status position, especially within the
typically male-dominated setting of the company, we thought women
would have more to lose by revealing their gender identity in email com-
munication with others to whom they were not known, and more to gain
by concealing this where possible.
We also thought this strategy might be particularly likely in cultures
that score higher on gender differentiation and status/power differences.
Research shows that this gender divide (as evidenced by employment
rates and the gender wage gap, for example) is stronger in southern Euro-
pean countries (e.g., Italy) than in northern European countries (e.g., the
UK, the Netherlands; see, e.g., Olivetti and Petrongolo, 2008). In short,
we expected that gender concealment for women might be more impor-
tant in Italy than our northern European comparison countries. As well
as this cross-cultural moderator variable we reasoned that gender con-
cealment is particularly likely to be an issue for company employees, and
especially women, if they are more conscious of status differences while
using email. We therefore used an item measuring this status awareness
as an additional moderator variable.
The results revealed interesting and interpretable cultural differences
as a function of gender. In the Netherlands, the pattern was fairly flat
in that both men and women employees reported being very unlikely to
conceal their gender with an unknown (male or female) other, irrespective
of status consciousness. However, Italian women who were aware of
status differences were more than twice as likely to conceal their gender
identity from unknown others compared with the Dutch case, with the
UK in between. Moreover, men in these two countries were less likely
to conceal their gender compared with women when aware of status
34 Russell Spears, Martin Lea, Tom Postmes, and Anka Wolbert
References
Brunsting, S., and Postmes, T. (2002). Social movement participation in the
digital age – Predicting offline and online collective action. Small Group
Research, 33, 525–554.
De Wolf, M. (2002). Dissimulatie, zelfselectie en sekse (Dissimulation, self-
selection, and sex). Unpublished Masters thesis, University of Amsterdam.
Diener, E. (1980). Deindividuation: The absence of self-awareness and self-
regulation in group members. In P. Paulus (Ed.), The psychology of group
influence (pp. 209–242). Hillsdale, NJ: Erlbaum.
Dubrovsky, V. J., Kiesler, S., and Sethna, B. N. (1991). The equalization phe-
nomenon: Status effects in computer-mediated and face-to-face decision-
making groups. Human Computer Interaction, 6, 119–146.
Fallows, D. (2005). How women and men use the internet (Pew Internet
and American Life Project Rep.). www.pewinternet.org/Reports/2005/
How-Women-and-Men-Use-the-Internet/05-Patterns-of-Internet-Use.
aspx?view=all
Festinger, L., Pepitone, A., and Newcomb, T. (1952). Some consequences of
de-individuation in a group. Journal of Abnormal and Social Psychology, 47,
382–389.
Gandy, O. H., Jr. (1993). The panoptic sort: A political economy of personal infor-
mation. Oxford: Westview.
Haraway, D. (1990). A manifesto for cyborgs: Science technology, and social-
ist feminism in the 1980s. In L. Nicholson (Ed.), Feminism/postmodernism
(pp. 190–233). New York: Routledge.
Joinson, A. N. (2005). Who’s watching you? Power, personalization and on-
line compliance. Paper presented at Conference on Group Processes in
Computer Supported Interaction: Technological and Social Determinism.
Miami University, Oxford, OH.
A SIDE look at computer-mediated interaction 37
Kiesler, S., Siegel, J., and McGuire, T. (1984). Social psychological aspects
of computer-mediated communications. American Psychologist, 39, 1123–
1134.
Lea, M. (1991). Rationalist assumptions in cross-media comparisons of
computer-mediated communication. Behaviour & Information Technology,
10, 153–172.
Lea, M., and Spears, R. (1991). Computer mediated communication, de-
individuation, and group decision-making. International Journal of Man–
Machine Studies, 34, 283–301.
Lea, M., Spears, R., and De Groot, D. (2001). Knowing me, knowing you: Effects
of visual anonymity on self-categorization, stereotyping and attraction in
computer-mediated groups. Personality and Social Psychology Bulletin, 27,
526–537.
Lea, M., Spears, R., and Watt, S. E. (2007). Visibility and anonymity effects on
attraction and group cohesiveness. European Journal of Social Psychology, 37,
761–773.
Le Bon, G. (1995). The crowd: A study of the popular mind. London: Transaction
Publishers. (Original work published in 1895.)
Oakes, P. J. (1987). The salience of social categories. In J. C. Turner, M. A.
Hogg, P. J. Oakes, S. D. Reicher, and M. S. Wetherell (Eds.), Rediscover-
ing the social group: A self-categorization theory (pp. 117–141). Oxford: Basil
Blackwell.
Olivetti, C., and Petrongolo, B. (2008). Unequal pay or unequal employment?
A cross-country analysis of gender gaps. Journal of Labor Economics, 26,
621–654.
Postmes, T., and Brunsting, S. (2002). Collective action in the age of inter-
net: Mass communication and online mobilization. Social Science Computer
Review, 20, 290–301.
Postmes, T., and Spears, R. (1998). Deindividuation and anti-normative behav-
ior: A meta-analysis. Psychological Bulletin, 123, 238–259.
(2002). Behavior online: Does anonymous computer communication reduce
gender inequality? Personality and Social Psychology Bulletin, 28, 1073–1083.
Postmes, T., Spears, R., and Lea, M. (1998). Breaching or building social bound-
aries? SIDE-effects of computer mediated communication. Communication
Research, 25, 689–715.
(2002). Intergroup differentiation in computer-mediated communication:
Effects of depersonalization. Group Dynamics: Theory, Research and Practice,
6, 3–16.
Postmes, T., Spears, R., Lee, A. T., and Novak, R. J. (2005). Individuality and
social influence in groups: Inductive and deductive routes to group identity.
Journal of Personality and Social Psychology, 89, 747–763.
Postmes, T., Spears, R., Sakhel, K., and De Groot, D. (2001). Social influence
in computer-mediated groups: The effects of anonymity on social behavior.
Personality and Social Psychology Bulletin, 27, 1243–1254.
Prentice-Dunn, S., and Rogers, R. W. (1989). Deindividuation and the self-
regulation of behavior. In P. B. Paulus (Ed.), The Psychology of Group Influence
(2nd ed., pp. 86–109). Hillsdale, NJ: Lawrence Erlbaum.
38 Russell Spears, Martin Lea, Tom Postmes, and Anka Wolbert
Spears, R., Postmes, T., Lea, M., and Wolbert, A. (2002). When are net effects
gross products? The power of influence and the influence of power in
computer-mediated communication. The Journal of Social Issues, 58, 91–
107.
Spears, R., Wolbert, A., and De Wolf, M. (in prep). Girls will be boys? Gender
dissimulation and the Internet. Unpublished ms, Cardiff University.
Srull, T. K., and Wyer, R. S., Jr. (1979). The role of category accessibility in
the interpretation of information about persons: Some determinants and
implications. Journal of Personality and Social Psychology, 37, 1660–1672.
Tajfel, H., and Turner, J. C. (1986). The social identity theory of intergroup
behavior. In S. Worchel and W. G. Austin (Eds.), Psychology of intergroup
relations (pp. 7–24). Chicago, IL: Nelson Hall.
Tanis, M., and Postmes, T. (2008). Cues to identity in online dyads: Effects of
interpersonal versus intragroup perceptions on performance. Group Dynam-
ics: Theory, Research, and Practice, 12, 96–111.
Thomson, R., and Murachver, T. (2001). Predicting gender from electronic
discourse. British Journal of Social Psychology, 40, 193–208.
Turkle, S. (1995). Life on the screen: Identity in the age of the internet. New York:
Simon and Schuster.
Turner, J. C. (1982). Towards a cognitive redefinition of the group. In
H. Tajfel (Ed.), Social identity and intergroup relations (pp. 15–40).
Cambridge: Cambridge University Press.
(1991). Social influence. Milton Keynes: Open University Press.
Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., and Wetherell, M.
S. (1987). Rediscovering the social group: A self-categorization theory. Oxford:
Basil Blackwell.
Turner, J. C., and Oakes, P. J. (1986). The significance of the social identity
concept for social psychology with reference to individualism, interactionism
and social influence. British Journal of Social Psychology, 25, 237–252.
Wolbert, A. (2000). Gender in CMC: Anonymity, power and dissimulation.
Unpublished Masters thesis, University of Amsterdam.
Zimbardo, P. G. (1969). The human choice: Individuation, reason, and order
vs. deindividuation, impulse, and chaos. In W. J. Arnold and D. Levine
(Eds.), Nebraska symposium on motivation (Vol. 17, pp. 237–307). Lincoln,
NE: University of Nebraska Press.
3 Trust, deception, and identity on the internet
Definition of trust
The concept of trust has been explored across disciplines (including phi-
losophy, economics, marketing, and psychology), and researchers have
not always shared a common understanding of the term. From a psy-
chological perspective, trust can be broadly defined as “confident expec-
tations of positive outcomes from an intimate partner” (Holmes and
Rempel, 1989, p. 188). Trusting individuals expect that a relationship
partner will act with their best interests at heart. More specifically, trust
can be conceptualized as a three-part relation, involving two individuals
and an action: a person trusts another person to do (or not do) a specific
action (Hardin, 2001). This concept inherently captures a person by sit-
uation interaction; a person’s trust in another may derive in part from
a general optimism about the intentions of others, but is also strongly
determined by the situation (characteristics of the partner, degree of risk
involved in trusting the other, and so on).
Development of trust
Although trust in continuing relationships may be a relatively global ori-
entation toward another person (the judgment that the person will act
with one’s best interests at heart), trust is not an all-or-nothing deci-
sion. Rather, trust develops in stages as relationships progress (Holmes
and Rempel, 1989). Although trust may grow over time in both online
and offline relationships, the unique aspects of internet communica-
tion change some aspects of this process. For example, revealing per-
sonal appearance and other identity details typically takes place in stages
in relationships that begin on the internet. Those stages can include
adding modes of communication, such as the telephone (e.g., McKenna
et al., 2002). As relationships progress, individuals are willing to take
greater levels of risk, such as revealing more intimate information,
with the idea that the benefits gained, such as relationship closeness
or social support, will also be greater (e.g., Altman and Taylor, 1973,
Chapter 2).
There is evidence that the online context can either diminish or accel-
erate the progression of trust. For example, one study found that in-
person friendships are more trusting and generally higher in quality than
Trust, deception, and identity on the internet 43
online friendships in the early stages, but that this disparity is reduced
in more extended relationships (one year or more; Chan and Cheng,
2004). However, other work, such as Walther’s “hyperpersonal” per-
spective, suggests that internet relationships can progress to intimate
levels more rapidly than in-person relationships (McKenna et al., 2002;
Walther, 1996). Because online partners can be separate from an indi-
vidual’s in-person social circle, there is less potential cost to sharing
intimate or sensitive information with online partners. This information
is less likely to be passed on to one’s offline friends or family members
(cf. Derlega and Chaikin, 1977). (For example, if an individual dis-
closes being homosexual to conservative friends, they may risk rejection
and exclusion from their social groups; if individuals complain about an
annoying relative to other family members, that relative might find out
about the insult.) Therefore, the person may be less concerned about
and expect less impact from consequences of disclosure, such as embar-
rassment, ostracism, or other social costs. The reduced social presence
created by the online context (e.g., Short et al., 1976) may also reduce
the emotional impact of any negative interactions. Of course, recent
work on ostracism suggests that even cyberostracism can be quite painful
(e.g., Williams et al., 2000), though not always as damaging as in-person
ostracism (Williams et al., 2002). Disclosure is associated with trust, so
conditions that foster high disclosure, such as low levels of shyness, high
levels of perceived security, and interacting with others who are them-
selves self-disclosing (e.g., Joinson, 2001), may also be those that evoke
greater trust.
However, this previously identified progression from relatively impov-
erished forms of information (pseudonyms, text) to richer and more per-
sonal forms of contact is likely to change with new technological devel-
opments and usage patterns, at least in some online contexts. Dating and
social networking sites, for example, typically include photographs along
with personal profiles, and provide information about hobbies, musical
tastes, and even (for some matchmaking sites) income range. Of course,
with dating sites in particular, the expectation is that compatible partners
will quickly move to in-person meetings.
Personal websites also often include a wealth of detail. For example,
people may reveal intimate details on their blogs or online journals, with-
out developing a personal or trusting relationship with each individual
reader. Indeed, bloggers may not be able to identify who or even how
many people read the intimate details that are posted. Some individ-
uals may hope to create trust through their disclosures as a means of
building relationships with others, whereas others may be seeking vali-
dation, attention, or other goals that do not require trust. The role of
44 Melanie C. Green and Jordan M. Carpenter
Effects of anonymity
Many researchers have commented on the “paradox” of computer-
mediated communication: that its relative anonymity allows easy decep-
tion and lowered moral standards, and yet in practice, that same
anonymity allows users to express themselves more honestly (Caspi and
Gorsky, 2006). The invisibility and anonymity characterizing much inter-
net communication creates a sense of privacy and autonomy which results
in higher levels of self-disclosure, an important factor in trust formation
(Christopherson, 2007).
For example, McKenna and Bargh (1998) discovered that many mem-
bers in an online gay and lesbian community joined the group long before
coming out to families and friends, and that membership of such groups
often resulted in higher levels of acceptance regarding their homosexual
identities, implying that the internet allows people to “practice” being
open about certain aspects of themselves before they feel comfortable
doing so in other contexts. However, this anonymity still makes many
users uneasy: as personal, one-on-one relationships develop out of online
interaction, users still appreciate that their partners gradually strip away
their anonymity by providing more and more information about them-
selves and eventually provide other means of contact, such as a telephone
number or address, as a sign of trust (Whitty and Gavin, 2001).
The relationship between anonymity and self-disclosure can be some-
what complicated, however. For one thing, not only is the potential dis-
closer of personal information anonymous, the social partner may be as
well. While being anonymous oneself reduces social anxiety, having an
interaction with an anonymous partner hampers the intimacy of personal
disclosures and reduces relationship closeness (Sato and Yoshida, 2008).
However, interacting with anonymous others does not always carry a
pall of distrust and anxiety: for example, one study found that on health
websites, anonymous sources were as trusted as cited ones (Rains, 2007).
Dispositional tendencies
All else equal, individuals may be relatively more or less trusting due to
differing dispositional levels of trust (chronic optimistic or pessimistic
outlooks established by temperament or early experience). Dispositional
trust may make individuals more open to interpersonal risks online just as
they would be in traditional social settings, but there is no evidence thus
far that dispositional trust interacts in a particular way with the internet
context. However, other individual differences such as self-efficacy with
computers or knowledge about the internet may also influence whether
individuals are willing to extend trust to online interaction partners.
Individuals who do not feel confident in their ability to manage issues
such as maintaining appropriate levels of privacy or resisting the appeals
of con artists may be more likely to adopt a blanket attitude of distrust
as a means of self-protection.
46 Melanie C. Green and Jordan M. Carpenter
Deception
One reason why individuals may be suspicious of online others is because
of well-publicized examples of dangerous internet deception. News out-
lets feature stories about the capture of pedophiles who solicit young
potential victims on chat sites, for example. At the time of writing,
headlines were trumpeting the case of a teenager who was driven to
suicide after the mother of an acquaintance allegedly pretended to be a
teenage boy online, and cruelly rejected the girl after gaining her affection
(Taylor, 2007). The salience of these reports may make the internet seem
like a hotbed of deception, even though such dramatic cases are relatively
rare.
Deception is traditionally considered a shameful or at least unseemly
activity, and the mere word calls up images of sinister and Machiavellian
manipulators. Indeed, Satan himself is referred to as “the prince of lies.”
However, the truth is that people generally have a nuanced and sophisti-
cated view of lying. Fabrications can emerge from a variety of motivations,
and the perception of these motivations can often determine the accept-
ability of the deceptive behavior. Lying to benefit the self at the expense
of others carries a high stigma, whereas lying to help others is more
acceptable. Lies can even be self-serving and still socially acceptable as
long as they do not directly harm others, since such behavior is often seen
as a fact of everyday life (Goffman, 1974). The new technology of the
internet provides fresh challenges to the study of deception, since it may
Trust, deception, and identity on the internet 47
Deception online
Attempts to apply deception research to online interactions suggest that
there are important differences between online and in-person decep-
tion. One important situational factor is that cyberspace communication
allows for deception that would be easily caught in face-to-face interac-
tions, both due to the lack of nonverbal cues and the fact that attributes
such as gender, location, and appearance are not readily apparent. Not
only does the online situation affect the potential for detecting decep-
tion, it also affects the motives people have for lying to others. Like
face-to-face deception, the perceived reasons for lying determine the
lie’s acceptability, but the reasons for online deception differ from those
offline (Utz, 2005). Similarly, certain individual traits may take on dif-
ferent importance in predicting online versus face-to-face deception. For
instance, Lu (2008) found that individuals high in attention-seeking and
48 Melanie C. Green and Jordan M. Carpenter
Lie detection
Part of the anxiety about internet communication involves the limited
amount of information present in many online interactions, which exac-
erbates people’s already poor ability to spot lies. Obviously, successful
deception depends on the listener having a limited amount of informa-
tion about both the liar and the subject of the lie. Hearing a battered car
described as pristine is perfectly reasonable, unless the car is visible or the
listener knows the speaker is, for instance, a used car salesman. Beyond
that, most people, even trained investigators, have difficulty spotting liars
(DePaulo, 1994). There are some cues that often appear when any given
individual lies, such as dilated pupils, an increased rate of blinking, a
higher pitched voice, and a shorter, more hesitant way of speaking and
phrasing sentences. However, these cues become much more difficult
to notice when the liar is highly motivated to deceive, and they are not
present in many lies. These cues often vary drastically from person to
person: even after being trained to spot lies in one person, individuals are
poor at generalizing that skill in response to others. Still, liars’ uncon-
scious behavioral cues can inspire reactions of doubt and discomfort in
listeners, even if it does not make them good at determining, in a vacuum,
who is lying and who is not (DePaulo, 1994). Without these cues, and
without the clues that come from context, most people would truly be
blind at noticing deception. This has important implications for online
communication, which frequently eliminates non-verbal cues such as rate
of blinking. The lowered generalized trust in “people on the internet”
(as described above) may be a reaction to this absence of deception cues;
people may feel that they are less able to assess truth-telling accuracy
online, and so develop a self-protective suspicion of others.
Despite this handicap, some researchers have found promising pat-
terns which may start to uncover clues to typical online deception. Zhou
et al. (2004) discovered that there may be predictable patterns in the use
of language dominance, which is a state of attempting to overtly influ-
ence the behavior of others through communication, in online deception.
Trust, deception, and identity on the internet 51
contact when telling self-serving lies, but when telling other-oriented lies
(for instance, sparing another’s feelings) to a friend, they do not prefer
any medium to another.
Deception summary
Online deception is a complex phenomenon emerging not only from
people’s motivation to tell untruths but also from the particular oppor-
tunities in computer-mediated communication and specific personality
traits that may lead to deception. Among the situational factors, the invis-
ibility of the internet gives people the chance to lie about a wider variety
of things than would be possible otherwise, while the distance of text-
based communication allows for more types of self-expression, which
may involve untruths. Among the person factors, lower levels of trust,
a motivation to deceive, and attention-seeking may all lead to online
dishonesty. Together, these factors could help to explain why people
lie online. The difficulty in reading people’s intentions online may
decrease users’ inclinations to trust others, perhaps leading to more self-
protective lies. Similarly, a specific desire to engage identity play may be
especially easy to sate given the relative anonymity of the internet, and
likewise that anonymity may inspire people to play with their identities.
Levels of information
Early research on internet interaction began with the premise that online
communication inherently involves less information than face-to-face
or telephone interactions, since cues such as body language and tone
of voice are invisible or absent (e.g., Kiesler et al., 1984; Sproull and
Kiesler, 1986). This assumption is largely correct, but it glosses over one
of the most basic and alluring features of the internet: its protean nature
as technology changes. Whereas in the past communication largely took
the form of purely text-based exchanges such as email and chatrooms,
the internet now offers many means of communication, each of which
carries its own limits on and opportunities for the sharing of information.
Forms of self-presentation
As technology improves, there are more and more ways for internet
users to present information about themselves, some more subtle than
others. Even in highly anonymous settings, such as chatrooms, users
can choose a personal nickname, font, and profile. Some media allow
users to provide visual information such as an icon, and many allow
Trust, deception, and identity on the internet 53
for the creation of full-fledged avatars, which are some of the most stable
means of online self-disclosure, since they are present in every interaction.
Interestingly, the features of these avatars differ according to the type of
communication. IRC, a form of real-time chatting, is characterized by
high levels of anonymity and freedom, and it inspires users to create
fantastic, highly imaginative avatars. Instant Messenger, which is usually
used between real-life friends and family, inspires more concrete and
realistic avatars. Since the construction of an avatar is an expression
of identity, their features carry clues to self-expression and self-image.
Thus, avatars, and other forms of self-disclosure, are closely tied to an
individual’s objectives, which are in turn tied to the medium they use to
communicate (Kang and Yang, 2006).
Furthermore, even in the absence of avatars, individuals often use
many of the features of online communication, such as editing, sentence
structure, and response time, to deliberately manage the impressions
they make on people and attempt to form specific relationships with
desired partners (Walther, 2007). By matching their behavior with the
expectations tied to the particular method of communication, and by
utilizing self-presentation that corresponds with these expectations (e.g.,
the use of a realistic versus imaginative avatar; responding quickly rather
than slowly to a message), users can appear more trustworthy to their
online partners and acquaintances.
In sum, individuals may have particular impression-management goals
(e.g., appearing competent, appearing attractive), but the way they pur-
sue those goals is influenced by the norms and capabilities of a given
online environment. Thus, the person factors (goals to create a particu-
lar impression) interact with situational affordances to create behavior.
Understanding the role of avatars in creating interpersonal trust is
becoming increasingly important with the growing popularity of virtual
worlds such as Second Life – 3D virtual worlds in which avatars can be
highly customized. Research suggests that, with the growing realism of
these representations, individuals come to expect the nonverbal signals
conveyed by the avatars to mirror face-to-face social signals (Donath,
2007). For example, individuals consciously or unconsciously pay atten-
tion to the gaze of an avatar (Yee et al., 2007). Furthermore, avatars have
an effect on the behavior of the user, not just on how others relate to
him or her socially. Taller avatars can inspire more confident behavior,
while attractive avatars can result in more open self-disclosure than less
attractive avatars (Yee and Bailenson, 2007). This behavior potentially
sets the stage for self-fulfilling prophecies (behavioral confirmation), as
others may act differently toward users with more versus less attractive
avatars, or who engage in more versus less self-disclosure. Understanding
54 Melanie C. Green and Jordan M. Carpenter
Word-of-mouth marketing
Although this chapter has focused primarily on interpersonal relation-
ships, one area for future attention is the rise of viral or word-of-mouth
marketing online. These practices may blur the lines between interper-
sonal sharing and a business pitch. That is, when a fellow website user
recommends a product or service, that person may be doing so sim-
ply because of their own satisfaction with the product, or they may be
receiving some compensation from the company for doing so. Or, in
a more extreme case, the entire online persona may be the creation of
a marketing department. As these practices become more widespread,
policies may need to be developed to regulate them. From a research
perspective, it is an open question how individuals’ knowledge of these
marketing practices affects their willingness to trust others in the realm
of consumer products specifically, but also their general trust in online
others.
References
Altman, I., and Taylor, D. A. (1973). Social penetration: The development of inter-
personal relationships. New York: Holt, Reinhart and Winston.
Bargh, J. A., and McKenna, K. Y. A. (2004). The internet and social life. Annual
Review of Psychology, 55, 573–590.
Bargh, J. A., McKenna, K. Y. A., and Fitzsimons, G. M. (2002). Can you see the
real me? Activation and expression of the “true self” on the internet. Journal
of Social Issues, 58, 33–48.
Birchmeier, Z., Joinson, A. N., and Dietz-Uhler, B. (2005). Storming and form-
ing a normative response to a deception revealed online. Social Science Com-
puter Review, 23(1), 108–121.
Brunet, P. M., and Schmidt, L. A. (2010). Sex differences in the expression and
use of computer-mediated affective language: Does context matter? Social
Science Computer Review, 28(2), 194–205.
Carpenter, J. M., Green, M. C., and LaFlam, J. (2011). People or profiles: Indi-
vidual differences in online social networking use. Personality and Individual
Differences, 50, 538–541.
Caspi, A., and Gorsky, P. (2006). Online deception: Prevalence, motivation, and
emotion. CyberPsychology & Behavior, 9, 54–59.
Chan, D. K. S., and Cheng, G. H. L. (2004). A comparison of offline and online
friendship qualities at different stages of relationship development. Journal
of Social and Personal Relationships, 21(3), 305–320.
Christopherson, K. M. (2007). The positive and negative implications of
anonymity in internet social interactions: “On the internet, nobody knows
you’re a dog.” Computers in Human Behavior, 23(6), 3038–3056.
Crittenden, S., and Green, M. C. (2007). It’s not just what you say: Prefer-
ences for interpersonal communication medium depend on topic. Society
for Personality and Social Psychology meeting, Memphis, January.
DePaulo, B. M. (1994). Spotting lies: Can humans learn to do better? Current
Directions in Psychological Science, 3(3), 83–86.
Trust, deception, and identity on the internet 59
DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M., and Epstein, J.
A. (1996). Lying in everyday life. Journal of Personality and Social Psychology,
70, 979–995.
Derlega, V. J., and Chaikin, A. L. (1977). Privacy and self-disclosure in social
relationships. Journal of Social Issues, 33(3), 102–115.
Donath, J. (2007). Virtually trustworthy. Science, 317(5834), 53–54.
Fraley, R. C., and Shaver, P. R. (2000). Adult romantic attachment: Theoretical
developments, emerging controversies, and unanswered questions. Review
of General Psychology, 4, 132–154.
Gill, H., Boies, K., Finegan, J., and McNally, J. (2005). Antecedents of trust:
Establishing a boundary condition for the relation between propensity to
trust and intention to trust. Journal of Business and Psychology, 19, 287–
302.
Goffman, E. (1974). Frame analysis: An essay on the organization of experience.
Cambridge, MA: Harvard University Press.
Green, M. C. (2005). Trust in internet relationships. Unpublished manuscript.
(2007). Trust and on-line social interaction. In A. Joinson, K. Y. A. McKenna,
T. Postmes, and U. Reips (Eds.), Oxford handbook of internet psychology
(pp. 43–52). Oxford: Oxford University Press.
Green, M. C., and Brock, T. C. (2008). Antecedents and civic consequences of
choosing real versus ersatz social activities. Media Psychology, 11(4), 566–
592.
Green, M. C., Hilken, J., Friedman, H., Grossman, K., Gasiewski, J., Adler, R.,
and Sabini, J. P. (2005). Communication via Instant Messenger: Short and
long-term effects. Journal of Applied Social Psychology, 35(3), 445–462.
Gross, E. F., Juvonen, J., and Gable, S. L. (2002). Internet use and well-being
in adolescence. Journal of Social Issues, 58, 75–90.
Hardin, R. (2001). Conceptions and explanations of trust. In K. S. Cook (Ed.),
Trust in society (pp. 3–39). New York: Russell Sage Foundation.
Holmes, J. G., and Rempel, J. K. (1989). Trust in close relationships. In C.
Hendrick (Ed.), Close relationships (pp. 187–220). Thousand Oaks, CA:
Sage.
Joinson, A. N. (2001). Knowing me, knowing you: Reciprocal self-disclosure in
internet-based surveys. CyberPsychology & Behavior, 4(5), 587–591.
Joinson, A. N., and Dietz-Uhler, B. (2002). Explanations for the perpetration of
and reactions to deception in a virtual community. Social Science Computer
Review, 20(3), 275–289.
Kang, H., and Yang, H. (2006). The visual characteristics of avatars in computer-
mediated communication: Comparison of Internet Relay Chat and Instant
Messenger as of 2003. International Journal of Human–Computer Studies,
64(12), 1173–1183.
Kiesler, S., Siegel, J., and McGuire, T. W. (1984). Social psychological aspects
of computer-mediated communication. American Psychologist, 39(10), 1123–
1134.
Lu, H. (2008). Sensation-seeking, internet dependency, and online interpersonal
deception. CyberPsychology & Behavior, 11, 227–231.
60 Melanie C. Green and Jordan M. Carpenter
McKenna, K. Y. A., and Bargh, J. A. (1998). Coming out in the age of the
internet: Identity “de-marginalization” through virtual group participation.
Journal of Personality and Social Psychology, 75, 681–694.
McKenna, K. Y. A., Green, A. S., and Gleason, M. J. (2002). Relationship
formation on the internet: What’s the big attraction? Journal of Social Issues,
58(1), 9–31.
Naquin, C. E., and Paulson, G. D. (2003). Online bargaining and interpersonal
trust. Journal of Applied Psychology, 88(1), 113–120.
Rains, S. (2007). The anonymity effect: The influence of anonymity on per-
ceptions of sources and information on health websites. Journal of Applied
Communication Research, 35(2), 197–214.
Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. American
Psychologist, 35(1), 1–7.
Sagarin, B. J., Rhoads, K., and Cialdini, R. B. (1998). Deceiver’s distrust: Den-
igration as a consequence of undiscovered deception. Personality and Social
Psychology Bulletin, 24, 1167–1176.
Sato, H., and Yoshida, F. (2008). Self-disclosure on the internet: The effects of
anonymity on the self and the user. Japanese Journal of Psychology, 78(6),
559–566.
Shah, D. V., Kwak, N., and Holbert, R. L. (2001). “Connecting” and “discon-
necting” with civic life: Patterns of internet use and the production of social
capital. Political Communication, 18(2), 141–162.
Shah, D. V., McLeod, J. M., and Yoon, S. (2001). Communication, context,
and community: An exploration of print, broadcast, and internet influences.
Communication Research, 28(4), 464–506.
Shah, D. V., Schmierbach, M., Hawkins, J., Espino, R., and Donavan, J. (2002).
Nonrecursive models of internet use and community engagement: Ques-
tioning whether time spent online erodes social capital. Journalism & Mass
Communication Quarterly, 79(4), 964–987.
Sheeks, M. S., and Birchmeier, Z. P. (2007). Shyness, sociability, and the use of
computer-mediated communication in relationship development. CyberPsy-
chology & Behavior, 10(1), 64–70.
Shklovski, I., Kraut, R., and Rainie, L. (2004). The internet and social par-
ticipation: Contrasting cross-sectional and longitudinal analyses. Journal of
Computer-Mediated Communication, 10(1).
Short, J., Williams, E., and Christie, B. (1976). The social psychology of telecom-
munications. London: John Wiley.
Sproull, L., and Kiesler, S. (1986). Reducing social context cues: Electronic
mail in organizational communication. Management Science, 32, 1492–
1512.
Taylor, B. (2007). Authorities investigate internet postings posing as
the woman linked to an online hoax as teen. Associated Press.
www.breitbart.com/article.php?id=D8T1D73G0&show_article=1
Turkle, S. (1995). Life on the screen: Identity in the age of the internet. New York:
Touchstone.
Utz, S. (2005). Types of deception and underlying motivation: What people
think. Social Science Computer Review, 23, 49–56.
Trust, deception, and identity on the internet 61
Kai Sassenberg
The author would like to thank Ulrike Cress, Joachim Kimmerle, and Katrin Wodzicki for
their extraordinarily fruitful comments on this chapter.
63
64 Kai Sassenberg
Characteristics of CMC
CMC and face-to-face (FTF) communication differ in three situational
features that are relevant for social influence (Spears and Lea, 1994):
anonymity of others, anonymity of the self, and physical isolation.
Anonymity of others
In CMC, senders can be more anonymous to a target than they are in
FTF communication, depending on the degree that the communication
medium transmits names, e-mail addresses, nicknames, avatars, paralin-
guistic cues, physical appearance, non-verbal communication (language
use, facial expressions, posture, gesture, etc.), information about identity,
etc.
The social identity model of deindividuation effects (SIDE; Postmes
et al., 1998; Spears and Lea, 1992, 1994; see also Spears et al., this vol-
ume) suggests that the scarce accessibility of information under condi-
tions of anonymity has a strong impact on norm-based and interpersonal
influence (see also Walther, 1996). According to the SIDE model, the
social categorization of the self and other group members as different
individuals (salient personal identity) or as members of the same groups
(salient social identity) is more pronounced in anonymous communica-
tion settings. When social identity is initially salient, group norms will
become even more important because anonymity increases the salience
of this social identity even further. As a result, a person’s attitudes tend to
shift towards group norms. However, when personal identity is initially
salient, communicators’ personal attitudes are more important and resis-
tant to influence in CMC than in FTF communication. Taken together,
SIDE assumes that when social identity is salient, anonymity of oth-
ers increases social influence (i.e., norm-based influence), and that when
66 Kai Sassenberg
Physical isolation
A joint feature of CMC and other media is the physical isolation from
interaction partners (if not from any other individual). Physical isolation
often co-occurs with both types of anonymity, but it has an impact on
the psychological state that goes beyond the impact of both types of
anonymity. In physical isolation, others who could distract attention from
the self are not present. Therefore, physical isolation in CMC leads to
heightened private self-awareness (i.e., the increased tendency to monitor
one’s behavior in the light of one’s own standards; Franke, 1997; Joinson,
2001; Matheson and Zanna, 1988, 1989; Sassenberg et al., 2005). This
suggests that physical isolation could be relevant for interpersonal and
norm-based influence because both the personal and the social self can
be affected by private self-awareness.
below. (For a more extensive summary, see Sassenberg and Jonas, 2007,
as well as Spears and Lea, 1992, for the historical development of these
arguments.)
Compliance
Anonymity of the self in CMC should reduce compliance. Early studies
on CMC demonstrated that the use of the media indeed reduced com-
pliance to others (e.g., Smilowitz et al., 1988). Recently, research found
evidence for the impact of anonymity of self to different targets. Partici-
pants working on choice dilemmas more often followed the unanimous
vote given by others when they responded in public compared with a
private response format (Lee and Nass, 2002, Study 1). In intergroup
contexts, group members use more stereotype-consistent language while
describing an outgroup (i.e., abstract words for stereotype-consistent
content and concrete words for stereotype-inconsistent content) when
they are identifiable to their own group than when they are not (Douglas
and McGarty, 2001, 2002, Study 1). Identifiability of the self to an
outgroup manipulated via contact information that had to be provided
elicits object evaluations in line with the expectations of this group
(Sassenberg and Kreutz, 2002), although this compliance to an out-
group is reduced if support from the own group is available (Spears et al.,
2002). The identifiably based media difference between FTF and CMC
is even stronger in collectivist cultures, because compliance resulting
from FTF communication is stronger in collectivist cultures, whereas
this culture difference disappears in CMC (Cinnirella and Green,
2007).
Norm-based influence
Norm-based influence is the type of influence for which CMC research
has yielded the most detailed insights. Spears et al. (1990) conducted
a study in which groups of psychology students discussed four topics
via CMC and were informed about the norms of psychology students
concerning these topics beforehand. Half of the groups were located in
one room but not allowed to speak (identifiable) and the other half were
located in separate rooms (anonymous). Social identity was made salient
by approaching participants as psychology students. The study demon-
strated that anonymity of others in CMC leads to more norm-based
influence when a social identity is salient and a topic that is relevant to
this group is discussed. This finding has been replicated several times (for
a summary, see Spears et al., 2001). Anonymity of others also increases
68 Kai Sassenberg
Interpersonal influence
When personal identity is salient to communicators, anonymity of others
in CMC will result in less social influence between interaction part-
ners for two reasons. First, group norms are less relevant when personal
identity is salient. Second, anonymity of others during CMC increases
awareness of one’s personal identity in the absence of any salient social
Social influence in computer-mediated communication 69
1 One might object that the SIDE model looks at person x situation interactions, when
predicting that the salient self-category and anonymity interact in their impact on norm-
based as well as on interpersonal influence. However, the salient self-category is rather a
situationally varying state than an individual difference variable. Therefore, it has been
manipulated rather than assessed in the relevant research (see Spears et al., this volume).
The chronic social identification might moderate the predicted pattern. However, this
prediction to the best of my knowledge still awaits empirical testing.
72 Kai Sassenberg
Media use
A domain in which individual difference variables have been taken into
account is media choice and media usage (for an overview, see Amichai-
Hamburger, 2005; Renner et al., 2005). McKenna and Bargh (2000)
report, for example, that individuals high in social anxiety are more likely
to form relationships online (see also Amichai-Hamburger et al., 2002).
Hertel et al. (2008) demonstrated a person x situation interaction con-
cerning media choice: introverted as well as emotionally unstable indi-
viduals prefer e-mail for conflict resolutions, whereas extraverted and
emotionally stable individuals prefer face-to-face interactions (compared
with individuals with the respective other personality characteristics).
(For an approach to person x situation interaction research concerning
media use and beyond, see Joinson, 2003.)
Information exchange
Cress (2005) demonstrated that the impact of anonymity on informa-
tion exchange differs depending on individuals’ social value orientations
(i.e., she classified individuals in prosocials maximizing joint outcomes or
equality and proselfs maximizing absolute or personal outcomes or per-
sonal outcomes in comparison with others’ outcomes; van Lange, 1999).
Anonymity of others reduces the amount of information exchanged
by proselfs and increases the information exchanged among prosocials.
These results can be explained based on the relation between social value
orientations and social identification: prosocials identify higher with the
interacting group than proselfs. Therefore, it seems likely that the former
experience norm-based influence (which is stronger) when anonymity of
others is high and the latter experience interpersonal influence (which is
weaker) when anonymity of others is high.
Kimmerle et al. (2007) studied the interaction between individual
differences in trait-based trust in others, sensation seeking, and self-
monitoring with the situational variable of group awareness. Group
awareness was manipulated by giving or not giving information about
the highly cooperative behavior of the fellow group members. Hence,
it can also be seen as a manipulation of the presence of a cooperative
group norm. Group awareness increased cooperation among individuals
Social influence in computer-mediated communication 73
Summary
On the one hand, the evidence summarized in this section clearly demon-
strates that individual differences matter in the context of media effects
on social influence. There is evidence concerning a wide range of phe-
nomena (media choice, online behavior, and communication outcomes)
as well as a wide range of personality characteristics. On the other hand,
there is no overarching framework predicting person x media interaction
effects on social influence (but see Joinson, 2003, for a framework model
not addressing social influence). The following section will introduce
such a framework (based on the synergistic person x situation interaction
approach; e.g., Endler and Magnusson, 1976) and apply it to media-
based social influence.
Anonymity of others
Anonymity of others has an impact on two social influence processes:
interpersonal influence and norm-based influence. Hence, individual
76 Kai Sassenberg
difference variables that are relevant for both types of social influence
will lead to a disordinal interaction, whereas moderators that are relevant
to only one type of social influence will lead to an ordinal interaction.
Cress (2005) provided an example for a moderator relevant for interper-
sonal as well as for norm-based influence: social value orientations. In
line with the assumption given above, she found a disordinal interaction.
Proselfs perceived the individuals they were interacting with as a collec-
tion of individuals whereas prosocials perceived them as their ingroup.
Therefore, proselfs were more likely to experience interpersonal influ-
ence, and consistent with this assumption they showed less social influ-
ence (i.e., cooperation) when anonymity of others was high (compared
with when anonymity was low). Contrarily, prosocials perceived their
interaction partners as ingroup and showed more social influence when
anonymity of others was high (i.e., norm-based influence). Both inter-
actions underlying the disordinal interaction found by Cress (2005) are
based on cognitive processes, because the impact of social value orien-
tation on the salience of the personal or social identity depends on the
different perceptions of social situations resulting from the social value
orientations.
To the best of my knowledge, there are limited examples in the lit-
erature of individual difference variables leading to ordinal interactions
with anonymity on social influence. However, a potential example would
be trait-based trust in others (as studied by Kimmerle et al., 2007, in
the context of group awareness). Norm-based influence should not be
affected by trait-based trust, because the salience of a social identity
which is required for norm-based influence leads to high levels of trust
independent of the level of trait-based trust (i.e., a strong situation over-
rules the effects of a trait). The salience of the personal identity, however,
does not induce trust situationally. Thus, interpersonal influence, which
requires strong interpersonal bonds, will profit from chronic trust. This is
especially the case when anonymity of others is high and chronic trust can
affect behavior because the situational information about the trustwor-
thiness is low. When anonymity is low, information about trustworthiness
is available and will most likely reduce the trust of individuals high in trait
trust, because they start to consider the visible features of the interaction
partners. Taken together, interpersonal influence is high when trait trust
and anonymity co-occur. This is because in this situation individuals are
especially likely to expect that they can trust the communication part-
ners and therefore evaluate the incoming information more. Hence, the
expected trust x anonymity of others interaction would be driven by a
motivational process.
Social influence in computer-mediated communication 77
Physical isolation
For physical isolation, ordinal rather than disordinal interactions with
interpersonal difference variables in the impact on social influence are to
be expected, because isolation is related to only one type of social influ-
ence: interpersonal influence. The interaction between physical isolation
and private self-awareness reported above (Sassenberg et al., 2005) sug-
gests a cognitive effect. The tendency to resist interpersonal influence
78 Kai Sassenberg
among those high in private self-awareness when they are physically iso-
lated results from higher levels of accessibility of personal values rather
than from different evaluations of these values (Froming and Carver,
1981). A similar effect might result for individuals with high levels of
social comparison orientation (Gibbons and Buunk, 1999), as social
comparisons occur automatically when others are present (Huguet et al.,
1999). Hence, individuals high in social comparison orientation should
be more prone to interpersonal influence only if others are present. Inter-
actions of effects based on a motivational process are somewhat less likely
for physical isolation, because the effects of physical isolation are mostly
based on the distraction caused by the presence of others and the acces-
sibility of self and other related information, rather than by changes in
expectations or values.
actual self and standards related to the self or brought up by others might
increase the resistance to interpersonal influence and compliance as well
as increase norm-based influence in interaction with the media charac-
teristic relevant for the specific type of social influence. In addition, all
person characteristics increasing or reducing the value of information,
behavior, or attitude change might also moderate the impact of media
characteristics on all three forms of social influence. Finally, all person
characteristics related to the relations between interaction partners might
impact in different ways on the three types of influence.
Taken together, research on social influence in CMC has rarely taken
into account interpersonal differences. The few existing studies summa-
rized here and the numerous potential effects discussed demonstrate the
importance of this understudied domain. Further research should not
only test the predictions derived here but also strive for a more integra-
tive theory of person x media interaction effects on social influence.
References
Allen, V. L. (1965). Situational factors in conformity. In L. Berkowitz (Ed.),
Advances in experimental social psychology (Vol. 2, pp. 133–175). New York:
Academic Press.
Amichai-Hamburger, Y. (2005). Personality and the internet. In Y. Amichai-
Hamburger (Ed.), The social net: The social psychology of the internet
(pp. 27–56). Oxford: Oxford University Press.
Amichai-Hamburger, Y., Wainapel, G., and Fox, S. (2002). “On the internet
no one knows I’m an introvert”: Extraversion, neuroticism, and internet
interaction. CyberPsychology & Behavior, 2, 125–128.
Bushman, B. J. (1995). Moderating role of trait aggressiveness in the effects of
violent media on aggression. Journal of Personality and Social Psychology, 69,
950–960.
Cinnirella, M., and Green, B. (2007). Does “cyber-conformity” vary cross-
culturally? Exploring the effect of culture and communication medium on
social conformity. Computers in Human Behavior, 23, 2011–2025.
Cress, U. (2005). Ambivalent effect of member portraits in virtual groups. Journal
of Computer-Assisted Learning, 21, 281–291.
Cronbach, L. J. (1957). The two disciplines of scientific psychology. American
Psychologist, 12, 671–684.
Deutsch, M., and Gerard, H. B. (1955). A study of normative and informational
social influences upon individual judgement. Journal of Personality and Social
Psychology, 51, 629–636.
Douglas, K. M., and McGarty, C. (2001). Identifiability and self-presentation:
Computer-mediated communication and intergroup interaction. British
Journal of Social Psychology, 40, 399–416.
(2002). Internet identifiability and beyond: A model of the effects of identifia-
bility on communicative behavior. Group Dynamics, 6, 17–26.
80 Kai Sassenberg
Dubrovsky, V. J., Kiesler, S., and Sethna, B. N. (1991). The equalization phe-
nomenon: Status effects in computer-mediated and face-to-face decision-
making groups. Human Computer Interaction, 6, 119–146.
Egloff, B., and Hock, M. (2001). Interactive effects of state anxiety on emotional
Stroop interference. Personality and Individual Differences, 31, 875–882.
Endler, N. S., and Magnusson, D. (1976). Toward an interactional psychology
of personality. Psychological Bulletin, 83, 956–974.
Epley, N., and Kruger, J. (2005). When what you type isn’t what they read:
The perseverance of stereotypes and expectancies over e-mail. Journal of
Experimental Social Psychology, 41, 414–422.
Fenigstein, A., Scheier, M. R., and Buss, A. H. (1975). Public and private self-
consciousness: Assessment and theory. Journal of Consulting and Clinical
Psychology, 43, 522–527.
Franke, G. H. (1997). Über die Möglichkeiten der computerunterstützten
Darbietung beim revidierten Freiburger Persönlichkeitsinventar: Zwei
experimentelle Studien [Computer-based administration of the Freiburg
Personality Inventory: Two experimental studies]. Zeitschrift für Experi-
mentelle Psychologie, 44, 332–356.
Froming, W. J., and Carver, C. S. (1981). Divergent influences of private and
public self-consciousness in a compliance paradigm. Journal of Research in
Personality, 15, 159–171.
Gibbons, F. X., and Buunk, B. P. (1999). Individual differences in social com-
parison: Development of a scale of social comparison orientation. Journal of
Personality and Social Psychology, 76, 129–142.
Guadagno, R. E., and Cialdini, R. B. (2002). Online persuasion: An examination
of gender differences in computer-mediated interpersonal influence. Group
Dynamics, 6, 38–51.
Guéguen, N. (2002). Foot-in-the-door technique and computer-mediated com-
munication. Computers in Human Behavior, 18, 11–15.
Hertel, G., Schroer, J., Batinic, B., and Naumann, S. (2008). Do shy people
prefer to send e-mail? Personality effects on communication media prefer-
ence in threatening and non-threatening situations. Social Psychology, 39,
231–243.
Hiltz, S. R., Johnson, K., and Turoff, M. (1986). Experiments in group deci-
sion making: Communication process and outcome in face-to-face versus
computerized conferences. Human Communication Research, 13, 225–252.
Huguet, P., Galvaing, M. P., Monteil, J. M., and Dumas, F. (1999). Social
presence effects in the Stroop task: Further evidence for an attentional view
of social facilitation. Journal of Personality and Social Psychology, 77, 1011–
1025.
Joinson, A. N. (2001). Self-disclosure in computer-mediated communication:
The role of self-awareness and visual anonymity. European Journal of Social
Psychology, 31, 177–192.
(2003). Understanding the psychology of internet behaviour: Virtual worlds, real
lives. Basingstoke: Palgrave Macmillan.
Kimmerle, J., and Cress, U. (2008). Group awareness and self-presentation in
computer-supported information exchange. International Journal of Com-
puter Supported Collaborative Learning, 3, 85–97.
Social influence in computer-mediated communication 81
important difference, which has been neglected so far, namely the oppor-
tunity for deliberative action. Second, once we identify important dis-
tinctions between computer-mediated and face-to-face interactions, we
should think about what these distinctions mean conceptually. Third, we
glean as much as possible from existing theory and empirical knowledge
to give us insight into how behavior is affected by these differences. As
pointed out before, the research on the SIDE model has pursued this
avenue.
In this chapter, I will propose that one of the most important and so
far neglected differences between computer-mediated and face-to-face
interactions is that computer-mediated interactions have many more pos-
sibilities to be deliberative. Whereas in a lot of face-to-face interactions
our behavior and responses to others need to be immediate, and con-
sequently automatic processes play a big role (see, e.g., Bargh, 2007;
Dijksterhuis and Bargh, 2001), computer-supported interactions give
much more opportunity for delayed responses, and hence a deliberative
planning of how to achieve our goals in the interaction (see also Walther,
2007). When one is writing an email, responding to an email, and com-
municating in a chat room, people have time to think about whether their
message has the intended effect on the receiver. That means that people
have more room to think strategically about their actions, which in turn
means that people think more about how they want the interaction part-
ner to interpret and react to their messages. In other words, what might
contribute to a major part of the differences between face-to-face and
computer-supported interactions are the perceptions of the interaction
partner, the degree to which anticipated reactions are considered, and
how these anticipated reactions shape one’s message. From that angle,
anonymity of others is as important as one’s own anonymity. Put differ-
ently, what one knows or imagines about the others is equally relevant as
what others know about oneself.
Note that the proposition is not that face-to-face interactions never
give room for deliberation. If we are teaching or giving a presentation
to our colleagues, we plan carefully what we want to say, thereby taking
into account the knowledge and standpoint of the interaction partner or
audience. The idea is that overall opportunities for deliberation are much
more plentiful in a computer-mediated than in a face-to-face interaction,
and that is one aspect that differentiates computer-mediated and face-
to-face interactions.
Let us take the example of dating. You can meet people at a variety of
venues, including at a bar, a party, a speed-dating event, a singles’ club,
or a friend’s house. You could also meet people on the internet either
via one of the more “serious” dating sites such as matchmaker.com or
86 Susanne Abele
what they will do. Since every player is assumed to be rational – and
assumes the other players are as well – predicting and projecting what
others do is equivalent, from the perspective of classical game theory.
Second, if people want to focus on their interaction partners but have
limited information about them, they can use the information about
the situation to make inferences about their interaction partners’ needs,
goals, and strategies. In order to look more closely at what inferences
people can and do make about the information they have about the situ-
ation, we need to be able to classify situations by the feature that defines
them. This feature is the nature of the interdependencies. Describing and
classifying interdependencies is the stuff of games.
C D
10 20
C
10 0
A
0 5
D
20 5
PDG
F O
16 0
F
10 0
W
6 10
O
6 16
BOS
costly for either player to switch to cooperate if the other player continues
to defect. However, it is Pareto efficient if both players cooperate. When
both cooperate, the only way for either player to improve her outcome
(i.e., switch to defect) harms the other player.
As pointed out earlier, being in a state of Nash equilibrium does not
necessarily mean that the involved parties get the best outcome possible.
When there is a conflict, the involved parties would be better off not to end
up in a Nash equilibrium. Imagine, for example, competing companies:
they would be better off forming a cartel, instead of each pursuing their
individual profit maximization. The fact that this often does not happen
(even without government interventions preventing it) demonstrates that
there is some validity to the Nash concept, even though nobody claims
that people are invariably rational.
Conversely, social situations are inherently cooperative when Nash
equilibria are Pareto efficient. Consider another classic game from behav-
ioral economics, the Battle of the Sexes (BOS), as depicted in Figure 5.2.
The story of the game is one where players are a husband and wife who
are going on a date and need to choose an activity for the evening. There
are two options: A (preferred by the husband, e.g., demolition derby)
or B (preferred by the wife, e.g., opera). Although each player has an
individual preference, being together is valued even more. In this game,
92 Susanne Abele
there are two Nash equilibria – both players responding A or both play-
ers responding B. That is, if both players respond A, neither benefits
by switching to B as long as the other stays with A. Similarly, if both
respond B, neither can improve his/her situation by changing to A unless
the other player also changes. Importantly, in this game, AA and BB are
also Pareto efficient. Once in AA, there is no combination of choices
that improves one player’s outcome without reducing the other player’s
outcome. The same conclusion applies to BB.
In their classic treatise of interdependence theory, Kelley and Thibaut
(1978; Thibaut and Kelley, 1959) distinguished three components of
interdependency in social relationships: behavioral control, fate control,
and reflexive control. Behavioral control refers to the degree to which
one person’s choice affects the value or pay-off associated with others’
choices. The BOS depicted in Figure 5.2 illustrates behavioral control.
Player 1’s choice of A or B changes the values associated with A and B
for Player 2. Thus, Player 1 has behavioral control over Player 2. In this
case, Player 2 also has behavioral control over Player 1. Thus, the behav-
ioral control is mutual. Fate control refers to the degree to which one’s
decision directly affects the outcomes of others, meaning, by varying
her behavior, Player 1 can affect Player 2’s outcome regardless of what
Player 2 does.
There is a conflict inherent in a situation when two or more people have
mutual fate control or mutual behavioral control, and their outcomes are
non-correspondent, meaning they do not prefer the same outcome. The
Prisoner’s Dilemma Game depicted in Figure 5.1 has a large compo-
nent of fate control and the fate control is mutual. Regardless of whether
Player 1 chooses to defect or to cooperate, Player 2’s choice of defect-
ing reduces Player 1’s outcome dramatically. The fate control is mutual
because Player 1’s choice affects Player 2’s outcome in the same way.
The third component is reflexive control, which is, in essence, a per-
son’s preferred ordering of the possible choices or actions presented in
the situation. Indeed, reflexive control is the value reflected back to the
actor by the various actions or choices and, technically, is not derived
from the interdependency. Nonetheless, reflexive control is relevant to
classifying situations. For example, the BOS depicted in Figure 5.2 is not
a game of pure coordination because, underlying the mutual behavioral
control, the two parties prefer different actions. Thus, the BOS is pre-
dominantly a coordination problem with an undertow of conflict. As a
result, it can be experienced as a conflict because Player 1 prefers AA
over BB and Player 2 has the reverse preference. Even though AA and
BB are Nash equilibria and Pareto efficient, there is no solution that is
optimal for both parties, both individually and collectively.
Social interaction in cyberspace 93
Coordination
A situation embodies a coordination problem when both interaction
partners are interested in ending up in the same Nash equilibrium.
They might prefer different equilibria, but they still have an incentive
94 Susanne Abele
to end up in the same one. Imagine, for example, that your university
has an online vote for new members of the graduate council. From your
department, there are two faculty members as candidates for becoming
members of the council, and one is favored over the other by a nar-
row margin. However, membership in the university council requires
a two-thirds vote of approval from the candidate’s home department.
In other words, it could be that if all of your faculty members went
with their first choice of vote, your department would have no repre-
sentative in the graduate council. But if either side could convince a
certain proportion of the other side to vote for their favorite, your depart-
ment would be successful in having a representative in the council. That
is, if the faculty members of your department coordinated their votes
to be bundled on one candidate, your department would have a very
good chance of having a representative. Everybody prefers a successful
bundling of votes on one candidate over spread-out votes. There are
just different preferences on which of the two candidates to bundle the
votes.
If all interaction partners prefer the same equilibrium, then the equi-
libria that are presented by the situation differ in the risk they pose to
the interaction partners. In terms of interdependence theory, a situation
calls for coordination if the interaction partners have mutual behavioral
control and corresponding outcomes.
social interaction the person perceived is also a person perceiver, and vice
versa. People perceive one another in social interactions. While person
A forms an impression about the goals, wishes, strategies, and charac-
teristics of person B, person A is aware that person B is at the same
time forming an impression of her. Hence, the interaction partners are
making judgments about each other’s traits, similarity, smartness, and
likeability (Kenny, 1994, 2004). Therefore, what we need is a naı̈ve the-
ory of person-by-situation interactions. What sorts of people do persons
expect to interact with in which kind of situation? This would be one way
to investigate the impact of greater opportunities for deliberativeness in
computer-mediated interactions on people’s behavior.
was varied: in the case of the Ultimatum Bargaining Game, the responder
also had reciprocal fate control because she could reject the allocation
and, in doing so, reduce the allocator’s outcome to zero. In the case of the
Dictator Game, the recipient had no power. However, allocators seemed
to redefine the situation depending on whether or not the recipient had
power. In the face of a powerful partner, allocators acted as though the
situation was a strategic, economic exchange. In the face of a powerless
partner, they acted as though the situation was social exchange governed
by norms of fairness. The allocations that participants made imply that
they weigh the importance of distributive justice very differently as a
function of recipients’ veto power.
In a similar vein, Cooper et al. (1999) showed that labeling the other
player in a game as “manager” or “planner” evoked more strategic play
than when the players were labeled as player A and player B. Further-
more, Ben-Ner et al. (2004) showed that women, when designated as
allocator in a Dictator Game, give significantly less to other women than
they give to men or persons of unknown gender.
All of these studies demonstrate that what we know about our inter-
action partner affects how we define the situation, which in turn affects
our behavior. Moreover, it is consistent with the idea that the less social
information we have, the more the available information gets weighted
and has an influence. In a computer-mediated interaction we do have
less social information, and the currently outlined research gives another
insight into how exactly the little information that is left can have an
impact. Moreover, the games described above could often be an extract
of a longer computer-mediated interaction. The responder, or receiver,
will have different feelings and perceptions of her interaction partner as a
result of the first player’s behavior. As a consequence, she might behave
quite differently on one of her subsequent moves depending on her per-
ception of whether the allocator seemed to have deemed distributive
justice as important. The responder’s behavior again will affect subse-
quent reactions on the allocator’s side. In other words, the very subtle
difference in the role of just one interaction partner could set the tracks
for a cooperative or competitive tone of a non-face-to-face interaction.
I am going one step further and propose that, even before the behavior
has occurred, the observer can make inferences from the situation about
the characteristics of others in the situation. One mechanism that might
underlie the situation-to-person attribution is the association between
certain kinds of situations and certain kinds of people. This association
may be reinforced sufficiently in social interactions that people often do
not correct for the fact that any kind of person could end up in any
situation. In a world in which computer-supported interactions prevail
more and more, we encounter a lot of social interactions in which we
do not meet the other actor in person, and before the interaction all the
information we have is the information about the kind of situation we
will be in with another person.
Imagine you are expecting to meet someone on a blog. In trying to
predict how others will react, it is natural to want to know what type
of people they are. For these predictions and assessments, people use
the information available to them. Anticipating meeting a finance expert
on an investment blog will probably evoke different expectations about
what the person is like than if you were expecting to meet someone
on a site that matches “busy professionals” for lunch dates. In both
instances, you likely do not have much information about your interaction
partner(s). Nevertheless, people have a desire to form an impression
of the person they are dealing with and will use any information that
is available to them. In the foregoing example, you would likely form
a different impression of the person on the investment blog than the
person on the lunch date site. However, these persons could be one
and the same. Hence, people’s tacit assumptions about the other person
may vary, depending on the nature of the situation. For example, it
would matter whether there is a conflict of interests, how much conflict
is present, or whether it is more a matter of coordinating behavior to
achieve mutually beneficial outcomes. Moreover, people’s assumptions
about others, stemming from the specifics of the situation, could have an
impact on how people behave in the situation.
Empirical support
In order to test the idea that features of the situation can affect perceptions
of interaction partners even before any interaction has taken place, I put
participants in a social situation. The situation was identical in the two
conditions, but varied in only one aspect, which was the degree of conflict
involved in the interdependency. Participants played a public goods game
with a continuous pay-off function. Degree of conflict was manipulated
by the marginal rate of substitution. Participants played the game with
102 Susanne Abele
1 If a public goods game has a marginal rate of substitution of 4/5 (or 2/3 respectively) it
means that every unit of her endowment which the player puts into her private pool will
be multiplied by 4 (2 respectively). Every unit of endowment that the player allocates to
the public pool will be multiplied by 5 (3 respectively). The pay-off for each individual
player is calculated by taking the sum of her individual private pool and her share of the
public pool. The public pool is divided equally among all players. Given that the number
of players remained constant, which was always two, a game with a MRS of 4/5 is less
conflictual for the individual player than a game with a MRS of 2/3.
Social interaction in cyberspace 103
Conclusion
In this chapter I have argued that a major and thus far neglected difference
between computer-mediated and face-to-face communication lies in the
greater opportunities for deliberation when the interaction is technology-
supported. However, as others have noted, computer-mediated interac-
tions often contain fewer and different social cues than do face-to-face
interactions. Both of these characteristics of computer-mediated interac-
tions highlight the importance of two issues. First, how do we use cues
stemming from the specific situation in order to form impressions of the
other interaction partner and make predictions of their reactions to our
alternative course of actions? Second, how can deliberation about one’s
interaction partner’s strategies and goals affect the interaction?
I argued that experimental game theory addresses similar questions.
Consequently, I suggested incorporating game theory as a tool to clas-
sify situations, and research findings from behavioral game theory as a
guide to study effects of deliberation processes in computer-supported
interactions.
When there is opportunity and motivation to focus on the other inter-
action partner, there are two things we can do to compensate for the
scarcity of social cues. First, we can use projection and react to our
projected strategies and behavior. Second, we can also use and draw
inferences from the limited information the situation provides. To exam-
ine these limited situations, game theory and interdependence theory can
provide a useful classification of situations.
Behavior is a function of personalities and situations. Moreover, differ-
ent personality types perceive situations and also other actors differently.
Besides, a person perceiver is also a person perceived, and vice versa, in
any interaction. Along that line, I outlined three lessons to be gleaned
from behavioral game theory with implications for computer-mediated
interaction. First, cues such as the label of an interaction, mild sanc-
tioning systems, and even decision timing can affect the perception of a
situation. Second, limited information about the other person can affect
the perception of the situation, whether the interdependency is viewed as
Social interaction in cyberspace 105
References
Abele, S., Bless, H., and Ehrhart, K. M. (2004). Social information processing
in strategic decision making: Why timing matters. Organizational Behavior
and Human Decision Processes, 93, 28–46.
Bargh, J. A. (Ed.) (2007). Social psychology and the unconscious: The automaticity
of higher mental processes. Philadelphia, PA: Psychology Press.
Ben-Ner, A., Kong, F., and Putterman, L. (2004). Share and share alike? Gender-
pairing, personality, and cognitive ability as determinants of giving. Journal
of Economic Psychology, 25(5), 581–589.
Cooper, D. J., Kagel, J. H., Lo, W., and Gu, Q. L. (1999). Gaming against
managers in incentive systems: Experimental results with Chinese students
and Chinese managers. American Economics Review, 89, 781–804.
Diener, E. (1977). Deindividuation: Causes and consequences. Social Behavior
and Personality, 5, 143–155.
106 Susanne Abele
Spears, R., Lea, M., Corneliussen, R. A., Postmes, T., and ten Haar, W. (2002).
Computer-mediated communication as a channel for social resistance: The
strategic side of SIDE. Small Group Research, 33, 555–574.
Spears, R., Lea, M., and Lee, S. (1990). De-individuation and group polarization
in computer-mediated communications. British Journal of Social Psychology,
29, 121–134.
Spears, R., Postmes, T., Lea, M., and Watt, S. E. (2001). A SIDE view of social
influence. In J. P. Forgas and K. D. Williams (Eds.), Social influence: Direct
and indirect processes (pp. 331–350). New York: Psychology Press.
Tenbrunsel, A. E., and Messick, D. M. (1999). Sanctioning systems, decision
frames and cooperation. Administrative Science Quarterly, 44, 684–707.
Thibaut, J. W., and Kelley, H. H. (1959). The social psychology of groups. New
York: Wiley.
Thompson, L. L. (2005). The mind and heart of the negotiator. Upper Saddle
River, NJ: Pearson Prentice Hall.
van Dijk, E., and Vermunt, R. (2000). Strategy and fairness in social decision
making: Sometimes it pays to be powerless. Journal of Experimental Social
Psychology, 36, 1–25.
van Lange, P. A., and Liebrand, W. B. (1989). On perceiving morality and
potency: Social values and the effects of person perception in a give-some
dilemma. European Journal of Personality, 3(3), 209–225.
von Neumann, J., and Morgenstern, O. (1947). Theory of games and economic
behavior. Princeton, NJ: Princeton University Press.
Walther, J. B. (1992). Interpersonal effects in computer-mediated interaction: A
relational perspective. Communication Research, 19, 52–90.
(2007). Selective self-presentation in computer-mediated communication:
Hyperpersonal dimensions of technology, language, and cognition. Com-
puters in Human Behavior, 23, 2538–2557.
Walther, J. B., Loh, T., and Granka, L. (2005). Let me count the ways: The
interchange of verbal and nonverbal cues in computer-mediated and face-
to-face affinity. Journal of Language and Social Psychology, 24, 36–65.
6 Dynamics of leader emergence in
online groups
Andrea B. Hollingshead
1 Although in this chapter I have chosen the term “online groups” to describe groups
that interact using communication technologies, the array and types of online groups
have evolved much quicker than the terminology used to describe them (Brandon and
Hollingshead, 2007). Descriptors such as “computer-mediated,” “virtual,” “online,” or
“distributed” are technically imprecise. It is increasingly common to find groups that
interact using multiple media and increasingly rare to find groups that interact using
only one medium. In addition, many of the current technologies available to groups are
portable and wireless; they enable members to collaborate without having to be “online.”
110 Andrea B. Hollingshead
Group roles
The dictionary definition of a role is “the characteristic and expected
social behavior of an individual” (American Heritage of the English Lan-
guage Dictionary, 2009). This definition suggests that a role involves: 1)
a somewhat consistent patterning of an individual’s behavior over time,
and 2) some level of consensus from others in the social setting about the
role holder’s behavior.
Group and organizational researchers have long distinguished between
formal and informal roles. Formal roles are assigned to the individual,
and identify the individual’s position within the group or organization
(e.g., secretary, CEO). Attached to each position is a set of role-based
behaviors that members occupying those positions are expected to per-
form (Biddle and Thomas, 1969; Katz and Kahn, 1966).
Dynamics of leader emergence in online groups 111
Definition of leader
A leader is a person who directs, guides, or influences the thoughts, feel-
ings, actions, or direction of a group. Scholars who have studied leader
emergence have used a variety of measures for identifying group leaders.
Leaders can be identified through their assigned role in the group (for
formal leaders); through observing their behavior toward group mem-
bers (e.g., high participation, dominance, assertiveness); or through the
behavior of group members toward them (the person whom group mem-
bers address most). Leaders can also be identified by asking group mem-
bers, and examining the level of consensus among them. This chapter
reviews studies that use a range of measures to identify leaders. It is not
common to find studies that use multiple measures to identify group
leaders.
and McGrath, 1994). Wickham and Walther (2007) found that computer
groups often identified more than one member as the leader. Hiltz et al.
(1991) showed that providing computer-mediated groups with a tool to
designate a discussion leader helped groups reach consensus on deci-
sions. It is important to note, however, that several studies observed no
differences in participation patterns between face-to-face and computer-
supported groups (e.g., Poole et al., 1991; Walther and Burgoon, 1992).
More recently, research has examined characteristics of members iden-
tified by the majority of their peers as informal leaders of computer-
mediated groups. Wickram and Walther (2007) found that emergent
leadership in computer-mediated groups was associated with high levels
of participation, perceived intelligence, encouragement, and authoritari-
anism in a laboratory experiment with undergraduate students. Yoo and
Alavi (2002) found that emergent leaders sent out more emails to group
members in general, more task-relevant emails, and longer emails than
other members of project teams composed of students in an executive
development program. In addition, they found that demographic char-
acteristics such as age, job experience, and experience at their current
position were not associated with emergent leadership (gender was not
reported; there were many more men than women in the sample).
Over the last fifteen years, many scholars have moved away from the
technologically deterministic view embodied in the “cues-filtered-out”
approach, proposing instead that the uses and effects of communication
technologies are better studied from an “emergent perspective” (Con-
tractor and Eisenberg, 1990; Fulk et al., 1990; Poole and DeSanctis,
1990). The emergent perspective is based on the assumption that the
uses and effects of communication technologies depend more on the
interplay between social structures, relationships, and interactions among
users than on the technology’s capabilities and features. Groups adapt
communication technologies to fit their purposes and needs. An emer-
gent perspective leads to a greater focus on the process of role emergence
rather than its presence or absence.
The process of leader emergence and how it unfolds over time in
initially leaderless computer-mediated groups had not been addressed
in previous research. Many earlier studies about leader emergence in
computer-mediated groups were conducted in a single session, and, with
a few exceptions, there was more decentralization and lower levels of
consensus about leaders compared with face-to-face groups. Many dis-
tributed work teams, committees, and the like collaborate across many
points in time. Does leader emergence just take longer in computer-
mediated groups or is it unlikely to happen at all? Study 1 addresses this
issue.
Dynamics of leader emergence in online groups 117
Study 1
Hollingshead and Contractor (1994) compared the dynamics of leader
consensus in initially leaderless face-to-face and computer-mediated
work groups across multiple meetings. The study was part of a larger
longitudinal project with student project teams conducted in a large
course on the social psychology of organizations (see McGrath, 1993,
for a comprehensive description of the experimental design). The work
groups were told they were the “employees” of a large consulting orga-
nization and each week they would carry out assignments for differ-
ent “client” organizations. Group size ranged between three and five
members. The computer-mediated teams interacted through a com-
puter network, which enabled only text-based communication. After each
week’s assignments, group members completed a questionnaire individ-
ually that examined their reactions to the task, their group, and one
another.
Leader consensus was measured in ten face-to-face and ten computer-
mediated project groups across five points in time. At each time point, the
groups worked on and completed a different assignment. One question
on the weekly questionnaire completed by each member asked partic-
ipants to list the roles that each group member (including themselves)
had assumed during that week’s task.
The findings indicated that leader consensus was higher in face-
to-face work groups than in computer-mediated work groups initially
(see Figure 6.1). At Time 1 (the group’s first assignment), face-to-face
work groups had significantly higher levels of leader consensus than
computer-mediated work groups (0.55 vs. 0.21). However, leader con-
sensus declined significantly across the five sessions in face-to-face work
groups. Computer-mediated work groups showed fluctuations in leader
consensus over time, but these fluctuations were not statistically signif-
icant. Neither were the differences in leader consensus between face-
to-face and computer-mediated groups in weeks 2, 3, 4, or 5. Overall,
the mean leader consensus across the five sessions did not differ signifi-
cantly between the face-to-face and computer-mediated work groups (M
= 0.29; 0.29 respectively).
One possible explanation for the findings is consistent with expectation
states theory. Face-to-face groups may have initially inferred common
stereotyped expectations about each member’s likelihood to assume a
leader role. Those expectations may be based on salient member char-
acteristics (e.g., gender, ethnicity, wearing glasses, etc.) and as a result
groups showed high levels of role consensus among members. Group
members’ expectations may have changed as they learned more about
118 Andrea B. Hollingshead
0.6
0.5
0.4
FTF
0.3
CMC
0.2
0.1
0
Time 1 Time 2 Time 3 Time 4 Time 5
Figure 6.1 Mean leader consensus scores by media and time period in
ten face-to-face (FTF) and ten computer-mediated (CMC) groups
Source: Hollingshead and Contractor (1994).
90
80
70
60
Group size
50
40
30
20
10
0
0 2 4 6 8
Number of leaders
Study 2
Alexander (2003) investigated the relations between participation, group
size, leader emergence, and stability in twenty-four internet-based sup-
port groups. The support group topics included anxiety, attention deficit
disorder, breast cancer, depression, diabetes, eating disorders, fibromyal-
gia, and multiple sclerosis. Alexander observed the participation patterns
in three-month intervals in the first year in the history of each support
group (four time periods).
Figure 6.2 plots the relation between the mean group size and mean
number of high participators or “leaders” over the year for each of the
120 Andrea B. Hollingshead
2 Leaders in small face-to-face groups account for between 33.3 and 50 percent of
the total participation (Bonito and Hollingshead, 1997). The percentages of messages
accounted for by the highest participators were added together until the sum was between
33.3 percent and 50 percent. For example, if the most frequent participant accounted
for 42 percent of messages, only one member was identified as the group’s leader. If the
most active participant accounted for 30 percent of all messages and the second most
active participant accounted for 15 percent, then together they accounted for 45 percent
(which would fall into the 33.3–50 percent range). In that group, two members would
be identified as leaders.
Dynamics of leader emergence in online groups 121
0
0 1 2 3
Number of consecutive time periods
account for most of the participation in the group. However, this is likely
not to be the case for all internet-based groups. For example, Turner
et al. (2005) identified seven different patterns of participation in a social
network analysis of Usenet meta-data: Answer Person, Questioner, Troll,
Spammer, Binary Poster, Flame Warrior, and Conversationalist.
In the case of Usenet groups and other discussion forums where peo-
ple ask and answer technical questions and seek information, the con-
tributors’ qualifications and the quality of their responses are likely to
be more important in determining “leaders” than the quantity of their
participation. Members of internet groups have more control over self-
presentation and messages can be anonymous to some extent, so mem-
bers may have somewhat more freedom to decide on the roles they will
take within the group than their face-to-face counterparts. They can iden-
tify their messages with their given names, a pseudonym, or no name to
maintain a sense of anonymity. Members also express and develop identi-
ties through signature files, which appear at the end of messages and may
consist of quotes, pictures, professional titles, or other defining informa-
tion. Members can also provide information about their background and
relevant experiences in the body of the message itself. So group members
have control over the amount and content of personal information that
others receive from them.
122 Andrea B. Hollingshead
References
Alexander, S. C. (2003). Leadership and social support on the internet: A longi-
tudinal analysis of mental and physical illness groups. Dissertation Abstracts
International Section A: Humanities and Social Sciences, 63(11-A), p. 3788.
Alexander, S. C., Peterson, J., and Hollingshead, A. B. (2003). Support at your
keyboard: A study of on-line support groups. In L. Frey (Ed.), Group com-
munication in context, Vol. 2. Hillsdale, NJ: Lawrence Erlbaum Associates.
R
The American Heritage Dictionary of the English Language, Fourth Edition
(2009). Copyright C 2000 by Houghton Mifflin Company. Boston, MA:
Houghton Mifflin Company.
Bass, B. H. (1949). An analysis of leaderless group discussion. Journal of Applied
Psychology, 33, 527–533.
Benne, K., and Sheats, P. (1948). Functional roles of group members. Journal of
Social Issues, 4, 41–49.
Berger, J., Wagner, D. G., and Zelditch, M. (1985). Expectation states theory:
Review and assessment. In J. Berger and M. Zelditch (Eds.), Status, rewards,
and influence (pp. 1–72). San Francisco, CA: Jossey-Bass.
Biddle, B. J., and Thomas, E. J. (Eds.) (1969). Role theory: Concepts and research.
New York: Wiley.
Bonito, J. A., and Hollingshead, A. B. (1997). Participation in small groups.
Communication Yearbook, 20, 227–261.
Brandon, D. P., and Hollingshead, A. B. (2007). Categorizing on-line groups.
In A. Joinson, K. McKenna, T. Postmes, and U. Reips (Eds.), The Oxford
handbook of internet psychology (pp. 105–120). Oxford: Oxford University
Press.
Contractor, N. S., and Eisenberg, E. M. (1990). Communication networks and
new media in organizations. In J. Fulk and C. Steinfield (Eds.), Organizations
and communication technology (pp. 145–174). Newbury Park, CA: Sage.
Culnan, M. J., and Markus, M. L. (1987). Information technologies. In F. M.
Jablin, L. L. Putnam, K. H. Roberts, and L. W. Porter (Eds.), Handbook of
organizational communication: An interdisciplinary perspective (pp. 420–444).
Newbury Park, CA: Sage.
Eagly, A. H. (1987). Sex differences in social behavior: A social-role interpretation.
Hillsdale, NJ: Erlbaum.
Eagly, A. H., and Karau, S. J. (1991). Gender and the emergence of leaders:
A meta-analysis. Journal of Personality and Social Psychology, 60(5), 685–
710.
124 Andrea B. Hollingshead
Easton, A., Vogel, D. R., and Nunamaker, J. F. (1992). Interactive versus stand-
alone group decision support systems for stakeholder identification and
assumption surfacing in small groups. Decision Support Systems, 8, 159–168.
Eveland, J. D., and Bikson, T. K. (1989). Work group structures and computer
support: A field experiment. ACM Transactions on Office Information Systems,
6, 354–379.
Fisher, B., and Ellis, D. (1990). Small group decision making: Communication and
the group process. New York: McGraw-Hill.
Fulk, J., Schmitz, J., and Steinfield, C. (1990). A social influence model of
technology use. In J. Fulk and C. Steinfield (Eds.), Organizations and com-
munication technology (pp. 117–140). Newbury Park, CA: Sage.
Ginter, G., and Lindskold, S. (1975). Rate of participation and expertise as
factors influencing leader choice. Journal of Personality and Social Psychology,
32, 1085–1089.
Hiltz, S. R., Johnson, K., and Turoff, M. (1991). Group decision support: The
effects of designated human leaders and statistical feedback in computerized
conference. Journal of Management Information Systems, 8, 81–108.
Hollingshead, A. B., and Contractor, N. S. (1994). Dynamics of leader consen-
sus in continuing face-to-face and computer-mediated work groups. Paper
presented at the annual meeting of the Speech Communication Association,
Chicago, November.
(2002). New media and organizing at the group level. In L. A. Lievrouw and
S. Livingston (Eds.), Handbook of new media: Social shaping and consequences
of ICTs (pp. 221–235). London: Sage.
Katz, D., and Kahn, R. L. (1966). The social psychology of organizations. New
York: John Wiley.
Kiesler, S., and Sproull, L. (1992). Group decision making and technology.
Organizational Behavior and Human Decision Processes, 52, 96–123.
Leathers, D. (1986). Successful nonverbal communication: Principles and applica-
tions. New York: Macmillan.
Leavitt, H. (1951). Some effects of certain communication patterns on group
performance. Journal of Abnormal and Social Psychology, 51, 704–706.
McGrath, J. E. (1984). Groups: Interaction and performance. Englewood Cliffs,
NJ: Prentice Hall.
(1993). The JEMCO workshop – Description of a longitudinal study. Small
Group Research, 24, 285–306.
McGrath, J. E., and Hollingshead, A. B. (1994). Groups interacting with technology.
Newbury Park, CA: Sage.
Mitchell, E. (2006). Participation in unanimous decision-making: The New Eng-
land monthly meetings of Friends. Philica.com Article number 14.
Moreland, R. L., and Levine, J. M. (1992). The composition of small groups. In
E. J. Lawler, B. Markovsky, C. Ridgeway, and H. Walker (Eds.), Advances
in group processes, Vol. 9 (pp. 237–280). Greenwich, CT: JAI Press.
Morris, C. G., and Hackman, J. R. (1969). Behavioral correlates of perceived
leadership. Journal of Personality and Social Psychology, 13, 350–361.
Morrison, A., and Von Glinow, M. (1990). Women and minorities in manage-
ment. American Psychologist, 45(2), 200–208.
Dynamics of leader emergence in online groups 125
Yoo, Y., and Alavi, M. (2002). “Electronic mail usage pattern of emergent lead-
ers in distributed teams.” Sprouts: Working Papers on Information Environ-
ments. Systems and Organizations, Vol. 2, Summer. sprouts.aisnet.org/211/1/
020309.pdf
Zaccaro, S. J., Kemp, C., and Bader, P. (2004). Leader traits and attributes. In J.
Antnakis, A. T. Cianciolo, and R. J. Sternberg (Eds.), The nature of leadership
(pp. 101–124). Thousand Oaks, CA: Sage Publications, Inc.
7 Ostracism in cyberspace
Introduction
There are several needs that are essential to our lives as human beings,
and the desire to satisfy these needs influences our attitudes, behaviors,
and interactions. Four of the most fundamental human social needs are
The authors would like to thank Alvin T. Law, Amanda Wesselmann, and James H.
Wirth for substantive comments on earlier versions of this chapter.
127
128 Eric D. Wesselmann and Kipling D. Williams
part to the anonymity and lack of social cues inherent in electronic forms
of communication.
Studying cyber-ostracism
Several programs of research have examined the effects of cyber-
ostracism on individuals and their subsequent behavior. The majority
of these programs have focused on experimental methods, using a vari-
ety of electronic media, constructs, and manipulations of ostracism to
gain a more thorough understanding of the intricacies of these phenom-
ena (Campbell and Fiske, 1959). These methods have been as simple as
text messages and as complex as online interactions that give a variety of
social and contextual cues that may affect perceptions of ostracism.
Perhaps the most common paradigm for studying social ostracism is
Cyberball, a virtual online ball-tossing game (Williams et al., 2000).1
This game is an electronic version of the original face-to-face paradigm
developed by Williams and Sommer (1997) to experimentally manip-
ulate ostracism in a laboratory setting. Cyberball not only allowed for
a more practical and controlled examination of ostracism but also gave
researchers an opportunity to find out how powerful ostracism is and
what are the minimal conditions necessary for ostracism to elicit its neg-
ative effects. Participants were led to believe they were participating in
a real-time group exercise in mental visualization. They were placed in
a three-person game of ball toss (in reality, the other two players were
virtual confederates pre-programmed to either include or ostracize the
participant). They were assured the point of the game was not their
ball-tossing performance but how well they mentally visualized the game
setting (e.g., the characteristics of the other players, the weather con-
ditions). In the Inclusion condition, confederates tossed the ball to the
participant approximately 33 percent of the time (equal division of tosses
between each of the three players); in the Ostracism condition, partic-
ipants received the ball once or twice from each confederate and then
were subsequently ignored and excluded for the remainder of the game.
Afterwards, participants were asked a variety of questions about their
thoughts and feelings during the game. The goal of these questions was
to index the degree to which participants recognized they were being
ostracized, as well as to obtain a measure of mood and need satisfaction
for the four basic needs (Williams et al., 2000).
1 Cyberball (for either MAC or PC) is available for free download at www1.psych.purdue.
edu/∼willia55/Announce/cyberball.htm
Ostracism in cyberspace 131
Conclusion
Ostracism – being ignored and excluded – is a powerful experience
that has many negative physical, emotional, and interpersonal conse-
quences (Williams, 1997, 2001, 2009). Immediate reactions to ostracism
seem to be robust, regardless of person or situation factors (cf. Wirth
et al., 2010), but reflective and behavioral responses seem to allow for
more variability. Whether people choose to behave pro- or anti-socially,
Williams (2007) suggests their responses serve to fortify their thwarted
needs (i.e., needs for belonging, control, self-esteem, and meaningful
existence). There is debate as to when and why some people respond
differently to ostracism, and considering anonymity (whether due to
experimental parameters or to the mode of communication, such as
electronic-based communication) as a determinant factor would make a
helpful contribution to examining this debate. Considerable research sug-
gests anonymity can lead to myriad anti-social and uninhibited behaviors
(see especially Dubrovsky et al., 1991; Kiesler et al., 1984; Sproull and
Kiesler, 1986); aggressive behavior could certainly be considered an anti-
social and uninhibited behavior. Experimentally, paradigms that study
Ostracism in cyberspace 139
References
ABC News (2007). Parents: Cyber bullying led to teen’s suicide. Retrieved
27 November 2007, from http://abcnews.go.com/print?id=3882520
ABC Primetime (2006). Primetime: Cyberbullying – cruel intentions [television
broadcast]. American Broadcasting Company, 14 September.
Barak, A. (2005). Sexual harassment on the internet. Social Science Computer
Review, 23, 77–92.
Bargh, J. A., and McKenna, K. Y. A. (2004). The internet and social life. Annual
Review of Psychology, 55, 573–590.
Baumeister, R. F., and Leary, M. R. (1995). The need to belong: Desire for
interpersonal attachments as a fundamental human motivation. Psychological
Bulletin, 117, 497–529.
Buckley, K. E., Winkel, R. E., and Leary, M. R. (2004). Reactions to acceptance
and rejection: Effects of level and sequence of relational evaluation. Journal
of Experimental Social Psychology, 40, 14–28.
Campbell, D. T., and Fiske, D. W. (1959). Convergent and discriminant valida-
tion by the multitrait–multimethod matrix. Psychological Bulletin, 56, 81–105.
140 Eric D. Wesselmann and Kipling D. Williams
Chow, R. M., Tiedens, L. Z., and Govan, C. L. (2008). Excluded emotions: The
role of anger in antisocial responses to ostracism. Journal of Experimental
Social Psychology, 44, 896–903.
Christopherson, K. M. (2007). The positive and negative implications of
anonymity in internet social interactions: “On the internet, nobody knows
you’re a dog.” Computers in Human Behavior, 23, 3038–3056.
Coffey, B., and Woolworth, S. (2004). “Destroy the scum, and then neuter their
families”: The web forum as a vehicle for community discourse? The Social
Science Journal, 41, 1–14.
Diener, E. (1979). Deindividuation, self-awareness, and disinhibition. Journal of
Personality and Social Psychology, 37, 1160–1171.
Diener, E., Fraser, S. C., Beaman, A. L., and Kelem, R. T. (1976). Effects
of deindividuation variables on stealing among Halloween trick-or-treaters.
Journal of Personality and Social Psychology, 33, 178–183.
Dubrovsky, V. J., Kiesler, S., and Sethna, B. N. (1991). The equalization phe-
nomenon: Status effects in computer-mediated and face-to-face decision-
making groups. Human–Computer Interaction, 6, 119–146.
Eisenberger, N. I., Lieberman, M. D., and Williams, K. D. (2003). Does rejection
hurt? An fMRI study of social exclusion. Science, 302, 290–292.
Friedland, N., Keinan, G., and Regev, Y. (1992). Controlling the uncontrol-
lable: Effects of stress on illusory perceptions of controllability. Journal of
Personality and Social Psychology, 63, 923–931.
Gardner, W., Pickett, C. L., and Brewer, M. B. (2000). Social exclusion and
selective memory: How the need to belong influences memory for social
events. Personality and Social Psychology Bulletin, 26, 486–496.
Gonsalkorale, K., and Williams, K. D. (2007). The KKK won’t let me play:
Ostracism even by a despised outgroup hurts. European Journal of Social
Psychology, 37, 1176–1186.
Greenberg, J., Pyszczynski, T., and Solomon, S. (1986). The causes and con-
sequences of the need for self-esteem: A terror management theory. In R.
F. Baumeister (Ed.), Public self and private self (pp. 189–212). New York:
Springer-Verlag.
Heider, F., and Simmel, M. (1944). An experimental study of apparent behavior.
American Journal of Psychology, 57, 243–259.
Kassner, M. P., Wirth, J. H., Law, A. T., and Williams, K. D. (2010). Effects of
mental visualization and social cues on detection and influence of ostracism.
Manuscript in preparation.
Kiesler, S., Siegel, J., and McGuire, T. W. (1984). Social psychological aspects of
computer-mediated communication. American Psychologist, 39, 1123–1134.
Kowalski, R. M., Limber, S. P., and Agatston, P. W. (2008). Cyber bullying:
Bullying in the digital age. Malden, MA: Blackwell Publishing.
Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukopadhyay, T., and
Scherlis, W. (1998). Internet paradox: A social technology that reduces social
involvement and psychological well-being? American Psychologist, 53, 1017–
1031.
Lakin, J. L., and Chartrand, T. L. (2005). Exclusion and nonconscious behavioral
mimicry. In K. D. Williams, J. P. Forgas, and W. von Hippel (Eds.), The social
Ostracism in cyberspace 141
outcast: Ostracism, social exclusion, rejection, and bullying (pp. 279–295). New
York: Psychology Press.
Leary, M. R., Kowalski, R. M., Smith, L., and Phillips, S. (2003). Teasing, rejec-
tion, and violence: Case studies of the school shootings. Aggressive Behavior,
29, 202–214.
Leary, M. R., Tambor, E. S., Terdal, S. K., and Downs, D. L. (1995). Self-
esteem as an interpersonal monitor: The sociometer hypothesis. Journal of
Personality and Social Psychology, 68, 518–530.
Leary, M. R., Twegne, J. M., and Quinlivan, E. (2006). Interpersonal rejection
as a determinant of anger and aggression. Personality and Social Psychology
Review, 10, 111–132.
Lee, E., and Leets, L. (2002). Persuasive storytelling by hate groups online:
Examining its effects on adolescents. American Behavioral Scientist, 45, 927–
957.
Maner, J. K., DeWall, C. N., Baumeister, R. F., and Schaller, M. (2007).
Does social exclusion motivate interpersonal reconnection? Resolving the
“porcupine problem.” Journal of Personality and Social Psychology, 92, 42–
55.
McGuire, T. W., Kiesler, S., and Siegel, J. (1987). Group and computer-mediated
discussion effects in risk decision-making. Journal of Personality and Social
Psychology, 52, 917–930.
McKenna, K. Y. A., and Bargh, J. A. (1998). Coming out in the age of the
internet: Identity “demarginalization” through virtual group participation.
Journal of Personality and Social Psychology, 75, 681–694.
(1999). Causes and consequences of social interaction on the internet: A con-
ceptual framework. Media Psychology, 1, 249–269.
(2000). Plan 9 from cyberspace: The implications of the internet for person-
ality and social psychology. Personality and Social Psychology Review, 4, 57–
75.
McKenna, K. Y. A., Green, A. S., and Gleason, M. E. J. (2002). Relationship
formation on the internet: What’s the big attraction? Journal of Social Issues,
58, 9–31.
Molden, D. C., Lucas, G. M., Gardner, W. L., Dean, K., and Knowles, M.
L. (2009). Motivations for prevention or promotion following social exclu-
sion: Being rejected versus being ignored. Journal of Personality and Social
Psychology, 96, 415–431.
Ouwerkerk, J. W., Kerr, N. L., Gallucci, M., and Van Lange, P. A. M. (2005).
Avoiding the social death penalty: Ostracism and cooperation in social dilem-
mas. In K. D. Williams, J. P. Forgas, and W. von Hippel (Eds.), The social
outcast: Ostracism, social exclusion, rejection, and bullying (pp. 321–332). New
York: Psychology Press.
Peter, J., and Valkenburg, P. M. (2006). Research note: Individual differences in
perceptions of internet communication. European Journal of Communication,
21, 213–226.
Peter, J., Valkenburg, P. M., and Schouten, A. P. (2005). Developing a model of
adolescent friendship formation on the internet. CyberPsychology & Behavior,
8, 423–430.
142 Eric D. Wesselmann and Kipling D. Williams
Pickett, C. L., Gardner, W. L., and Knowles, M. (2004). Getting a cue: The
need to belong and enhanced sensitivity to social cues. Personality and Social
Psychology Bulletin, 30, 1095–1107.
Predmore, S. J., and Williams, K. D. (1983). The effects of social ostracism
on affiliation. Paper presented at the annual meeting of the Midwestern
Psychological Association, Chicago, May.
Reid, D. J., and Reid, F. J. M. (2007). Text or talk? Social anxiety, loneliness,
and divergent preferences for cell phone use. CyberPsychology & Behavior,
10, 424–435.
Rintel, E. S., and Pittam, J. (1997). Strangers in a strange land: Interaction
management on Internet Relay Chat. Human Communication Research, 23,
507–534.
Sheeks, M. S., and Birchmeier, Z. P. (2007). Shyness, sociability, and the use of
computer-mediated communication in relationship development. CyberPsy-
chology & Behavior, 10, 64–70.
Siegel, J., Dubrovsky, V., Kiesler, S., and McGuire, T. W. (1986). Group pro-
cesses in computer-mediated communication. Organizational Behavior and
Human Decision Processes, 37, 157–187.
Skitka, L. J., and Sargis, E. G. (2006). The internet as psychological laboratory.
Annual Review of Psychology, 57, 529–555.
Smith, A., and Williams, K. D. (2004). R U there? Effects of ostracism by cell
phone messages. Group Dynamics: Theory, Research, and Practice, 8, 291–301.
Snoek, J. D. (1962). Some effects of rejection upon attraction to a group. Journal
of Abnormal and Social Psychology, 64, 175–182.
Solomon, S., Greenberg, J., and Pyszczynski, T. (1991). A terror management
theory of self-esteem and its role in social behavior. In M. Zanna (Ed.),
Advances in Experimental Social Psychology (pp. 93–159). New York: Aca-
demic Press.
Sproull, L., and Kiesler, S. (1986). Reducing social context cues: Electronic mail
in organizational communication. Management Science, 32, 1492–1512.
Stritzke, W. G. K., Nguyen, A., and Durkin, K. (2004). Shyness and computer-
mediated communication: A self-presentational theory perspective. Media
Psychology, 6, 1–22.
Tesser, A. (1988). Toward a self-evaluation maintenance model of social behav-
ior. In L. Berkowitz (Ed.), Advances in Experimental Social Psychology,
Vol. 21 (pp. 181–227). San Diego, CA: Academic Press.
Thompson, L., and Nadler, J. (2002). Negotiating via information technology:
Theory and application. Journal of Social Issues, 58, 109–124.
Twenge, J. M., Baumeister, R. F., Tice, D. M., and Stucke, T. S. (2001). If you
can’t join them, beat them: Effects of social exclusion on aggressive behavior.
Journal of Personality and Social Psychology, 81, 1058–1069.
Twenge, J. M., and Campbell, W. K. (2003). “Isn’t it fun to get the respect
that we’re going to deserve?” Narcissism, social rejection, and aggression.
Personality and Social Psychology Bulletin, 29, 261–272.
van Beest, I., and Williams, K. D. (2006). When inclusion costs and ostracism
pays, ostracism still hurts. Journal of Personality and Social Psychology, 91,
918–928.
Ostracism in cyberspace 143
Zadro, L., Boland, C., and Richardson, R. (2006). How long does it last? The
persistence of the effects of ostracism in the socially anxious. Journal of
Experimental Social Psychology, 42, 692–697.
Zadro, L., Williams, K. D., and Richardson, R. (2004). How low can you go?
Ostracism by a computer is sufficient to lower self-reported levels of belong-
ing, control, self-esteem, and meaningful existence. Journal of Experimental
Social Psychology, 40, 560–567.
8 Opinion-based groups
145
146 Craig McGarty, Girish Lala, and Karen M. Douglas
The basic hypothesis regarding collective identity and protest is fairly straightfor-
ward: A strong identification with a group makes participation in political protest
on behalf of that group more likely. The available empirical evidence overwhelmingly
supports this assumption (de Weerd and Klandermans, 1999; Kelly and Breinlinger,
1995; Simon et al., 1998; Stürmer, 2000). [emphasis added]
(Klandermans et al., 2002, p. 239)
A key interest for this chapter is the way in which internet technologies
have expanded the boundaries of interaction for many of these groups
that form around a shared opinion. Increasingly, many of these groups
are interacting online, and are heavily instantiated as online communities
(e.g., see McCaughey and Ayers, 2003; van de Donk et al., 2004). In
other words, it is apparent that, given the capacity for communication
and interaction that the internet presents, opinion-based groups and the
internet are very well suited to each other.
Opinion-based groups are particularly relevant for understanding col-
lective action for a number of reasons. First, they often form around
controversial issues, and oppositionally defined opinion-based groups
tend to champion opposing perspectives on key issues. In other words,
there are opinion-based groups that aim to change the social world in
some way and also groups that aim to preserve the status quo.
Opinion-based groups can be readily distinguished from social cate-
gories and action groups. Opinion-based groups can often be formed
within a broader social category (or can be broader than a social cate-
gory). One important idea in relation to opinion-based groups is that they
are often formed about the relations between social categories or groups
in general. This is the case with feminist and anti-feminist opinion-
based groups, which are groups formed around ideologies about relations
between social categories based on gender. In this way opinion-based
groups can also help to restructure problematic intercategory bound-
aries. It is easier for women and men to work together to promote gender
equality, or for people of different races to work to promote tolerance and
acceptance, if members of both categories share a relevant opinion-based
group membership.
Opinion-based groups can also be distinguished from action groups.
Most action groups are based on shared opinions, and opinion-based
groups are an incipient stage of action groups. Specifically, activist groups
can be considered as emerging from opinion-based groups. The “single-
issue pressure groups” studied by Kelly and Breinlinger (1995) and the
activist groups such as Gray Panthers, the gay movement, AIDS vol-
unteer service organization, and the fat acceptance movement, investi-
gated by Simon et al. (1998, 2000) and Stürmer et al. (2003), can be
regarded as directly emerging from opinion-based groups. All members
of an opinion-based group may have the potential to take spontaneous
collective action in specific circumstances, but only a small fraction of
the membership may be involved in organizing it.
Research that we have undertaken in Australia and Romania (e.g., by
Bliuc et al., 2007) shows that identification with a political opinion-based
group is an excellent predictor of intention to take politically relevant
150 Craig McGarty, Girish Lala, and Karen M. Douglas
Following the SIDE logic, the expression of stereotypes about the target
was facilitated by the supportive “presence,” however virtual, of their
opinion-based group. Therefore, it is also possible that extremists who
perceive their audience to be made up of like-minded individuals would
most effectively express their views having chosen to do so identifiably.
We investigated some other strategies that online extremist groups
use to promote their cause and recruit new members. Douglas et al.
(2005) examined the strategies that forty-three online white-supremacist
groups used on their websites. Drawing on social identity theory (SIT;
Tajfel and Turner, 1986), this research started from the position that
white-power groups feel superior to other groups but also feel in an
insecure position due to the threat posed by other groups (Green et al.,
1999). As the self-defined high-status group, white-supremacists have a
number of strategies available to them that enable them to effectively
sell their products, disseminate their opinions, and recruit new white-
supremacists to continue their “work.” Douglas et al. (2005) drew on
Haslam’s (2001) interpretation of social identity theory, arguing that
groups can adopt different self-enhancement strategies depending on
their status, the extent to which people are able to move freely between
groups, and the security of relations among groups. For white-power
groups, the threat from outgroups is the primary motivation for their
existence. In this context, Haslam’s reading of SIT would predict overt
racism, and the advocacy of hostility and conflict.
However, surprisingly, Douglas et al. (2005) did not find strong evi-
dence of advocated conflict, and especially little advocacy of violence,
on white-supremacist websites. Instead, these groups used more socially
creative strategies that redefine the elements of the intergroup context
without being openly hostile. These included arguments in favor of
white-superiority, and supremacist arguments that attempt to justify the
position of whites over non-whites. Of course, it is not surprising that
white-supremacist websites advocated less violence than other forms of
conflict and social creativity. After all, the sites can be shut down if they
violate the law. However, the fact that very little violence was advocated
overall, in what we call “hate” sites, was surprising. It seems that legal,
economic, and social grounds for conflict, and socially creative argu-
ments, are white-supremacists’ main weapons of persuasion (see also
McDonald, 1999).
It is important to consider how useful social creativity strategies can
be for online opinion-based groups such as these. First, social creativ-
ity may serve the function of helping to create conflict by making the
ingroup (usually whites) feel that they have a reason to feel disadvan-
taged. Second, without seeming overtly hostile or violent, socially creative
154 Craig McGarty, Girish Lala, and Karen M. Douglas
but see below for a more detailed analysis of the S11 community’s online
interaction).
On a related issue, Haslam et al. (1998) also highlighted the role
of consensus in groups. Elaborating the process of consensus develop-
ment in terms of the idea of consensualization (Haslam, 2001; Haslam
et al., 1999), they argued that a salient social identity in concert with
social influence through group interaction enhanced consensus about
the group. Put another way, consensualization works upon group mem-
bers to homogenize individual beliefs into group beliefs that come to
represent reality as defined by the shared social identity of the group.
Following a similar theme, Reicher (2000) contended that group-based
“collective assertions” are not simply the product of socially determined
perceptions of existing reality but may also represent statements about
the ideal reality that a group hopes to achieve. Moreover, and with par-
ticular relevance to social movements, Reicher made plain the reciprocal
relationship between identity and social action, arguing that not only
does identity lead to action, but it influences and is affected by the social
constraints that determine the limits of acceptable action (Reicher, 2000;
Reicher et al., 1995; Sani and Reicher, 1998; Stott and Reicher, 1998).
We will now turn to the analyses of two prominent social movements,
describing how closely our theoretical description of their expected online
behavior corresponded with our actual observations of those groups. We
will argue that our empirical evidence provides a more complete picture
of the role that online interaction plays in social movements, and leads us
towards a more subtle understanding of how OLCs enable and facilitate
social action.
orientation; in other words, they form with the intention to act, and
their members join and participate because they want to bring about
change. We have argued that social movements in general are psycho-
logical groups, and that online social movements are as real for their
participants as for their face-to-face counterparts; it follows, then, that
online and face-to-face social movements should share similar character-
istics and behave in the same ways.
As a consequence of the infancy of the medium itself, literature about
online interaction in general, and online protest and social movements in
particular, has a relatively short history. Academic interest in the medium,
meanwhile, has developed rapidly, mirroring the explosion of the internet
into public awareness. In this short but intensive tradition, researchers
have viewed online communities as including both face-to-face groups
that have adopted an online instantiation and groups that have formed
and exist exclusively online. Thus, for example, Olesen (2004) noted how
the pre-existing community of Zapatistas (a political movement com-
prised of indigenous peoples from the Chiapas region in Mexico seeking
control and autonomy over local resources and affairs) used the internet
to establish “solidarity networks,” whereas Earl and Schussman (2003)
looked at activist groups that formed online to facilitate strategic voting
during the US presidential elections. Though their origins were different,
both groups were legitimate examples of online social movements.
Regardless of where they originate, there would appear to be significant
qualitative differences in the nature of interaction in online groups com-
pared with groups that meet face-to-face. Thus, even now, communica-
tion on the internet is still predominantly asynchronous and text-based,
and, as we have already discussed, the consequences of online anonymity
have proved popular targets for comment and research. Furthermore,
activists themselves hold mixed views about the utility of the internet,
as we can see from Yates’s (1996) argument that movement organizers
actually try to avoid internet-based groups because of those groups’ focus
on argument and debate. In many ways, then, the internet would seem
to be precisely the sort of diffuse context where opinion-based groups
(OBGs) are extremely useful because online forums provide ideal envi-
ronments for the exchange of opinions, and thus for the formation of
OBGs. Along these lines, we can point to some famous examples of the
development of opinion-based activism online, for example within the
online anti-globalization movement (Clark and Themundo, 2006; Wall,
2007; see also Fisher et al., 2005; Postmes and Brunsting, 2002).
Notwithstanding the utility of online interaction for OBG formation,
popular analysis has often noted the way that protest groups have used the
internet as an organizational tool while ignoring the other roles that the
Opinion-based groups 161
internet might play in these groups (e.g., Allard and O’Loughlin, 2000;
Lawrence, 2000; McDonald, 2000). At first blush, given the unmistak-
able action focus of social movements generally and the high online pro-
file of many anti-globalization movements in particular, this may seem a
reasonable focus. We should ask, though, how the formation of opinion-
based groups online reconciles with this action-centered model of online
social movements and, more broadly, with the disconnection between
commitment to groups and commitment to action that we discussed ear-
lier in this chapter. Put more bluntly, a nagging question remains: does
the internet help or hinder the active pursuit of goals in online social
movements? To investigate this question, we first looked at the actual traf-
fic within one online community pursuing an anti-globalization agenda,
namely the online movement that developed around protests against the
WEF meeting in Melbourne.
On 11 September 2000, members and associates of the WEF met in
the Crown Casino complex in Melbourne for a three-day Asia Pacific
Economic Summit. There to greet them were several thousand anti-
globalization protesters rallying under the S11 banner. One focus of the
lay analysis of the S11 protests, and, indeed, other protest actions taking
place around the world at similar times, was the role of the internet as
a medium for communication and organization. In fact, an important
mechanism through which interaction took place in the S11 movement
was an online community (for example, nearly 3,000 messages were
posted to S11 over the period leading up to the protest event). During
eleven months over which the S11 protest organized and unfolded, we
looked at the structure and content of the interaction in that online
community by analyzing a stratified random sample of 600 messages.
Following the pattern we expect from a social movement, S11’s stated
aim was to plan and conduct protest action to disrupt the Melbourne
meeting. We were especially interested in the degree to which the S11
online community (an open, unmoderated emailing list) grew into a
fully fledged group that developed principled positions and agreed on
norms of behavior. In particular, we reasoned that, as the WEF meeting
(the movement’s raison d’être) approached, there would be increasing
attempts to reach agreement on group behavior and action.
In fact, we found the opposite. As the date of the protest action loomed
closer there was proportionately less discussion that could be interpreted
as agreeing on action. Rather (adopting the parlance developed by Tuck-
man, 1965), as the online group approached the point where it should
be ready to perform, it continued to storm and storm (with such storm-
ing – and associated recriminations – continuing even after the actual
protest event had passed). Furthermore, contrary to our expectations
162 Craig McGarty, Girish Lala, and Karen M. Douglas
1 Using Cohen’s Kappa, for categories relevant to discussion, average inter-rater reliability
between four coders ranged from κ=0.55 to κ=0.70 (scores falling between 0.40 and
0.75 show fair to good agreement; Armitage and Berry, 1994).
Opinion-based groups 163
2 Inter-rater reliability between four coders ranged from κ=0.65 to κ=0.90 (scores between
0.40 and 0.75 show fair to good agreement, and scores greater than 0.75 demonstrate
excellent agreement; Armitage and Berry, 1994).
164 Craig McGarty, Girish Lala, and Karen M. Douglas
Conclusion
In this chapter we have considered and taken issue with two popular
propositions about the internet. We conclude that both propositions rep-
resent good places to start an analysis of the nature of online interac-
tion, but they represent poor places to finish. The true situation is both
more complex and more interesting than either the anonymous cyberhate
proposition or the global activist proposition would suggest.
We have presented an interpretation of online communities where,
in one sense, participants engage in a quite strategic use of interaction
and communication to shape and present their ideal conceptualization
of reality – both for their immediate community and for their wider
cause. Our work makes use of a number of recent advances in under-
standing of internet-based communication. For example, our ideas about
cyberhate and anonymity are based on the SIDE model (Reicher et al.,
1995; Spears and Lea, 1994), and our developing understanding of global
activism draws from ideas about the interaction between action and iden-
tity (Haslam, 2001; Reicher, 2000), and instrumental and identity-based
motivations (Simon et al., 1998; van Zomeren et al., 2004). Joinson’s
(2003) SMEE framework also emphasizes interactivity, describing the
“ongoing process whereby users’ on-line activities feed back to their on-
line and real-life characteristics” (p. 179), and some of our conclusions
clearly connect with his work.
A crucial theme that our work adds, however, is the concept of the
opinion-based group that we argue is useful for understanding action
and inaction on the internet. The internet is a supreme forum for the
exchange and formation of opinions. From that fertile ground on which
the seeds of so many opinions are sewn it seems inevitable that we will see
the explosive growth of opinion-based groups. The only historical prece-
dent we have for such an explosive growth of a tool for social organization
was the rise of the printing press and the use of political and religious
pamphlets in the Europe of the Reformation era. We sincerely hope that
twenty-first-century society is able to continue to apply these tools with-
out the chaos and hostility that accompanied the earlier developments
(e.g., the Thirty Years War). We believe that the continued development
of a social science of computer-supported interaction is one way that
such problems can be forestalled.
Opinion-based groups 167
References
Allard, T., and O’Loughlin, T. (2000). The storming of Melbourne. The Sydney
Morning Herald, 31 August.
Armitage, P., and Berry, G. (1994). Statistical methods in medical research (3rd
edn.). Oxford: Blackwell Scientific Publications.
Back, L. (2002). Aryans reading Adorno: Cyber-culture and twenty-first century
racism. Ethnic and Racial Studies, 25, 628–651.
Bargh, J. A., and Chartrand, T. L. (1999). The unbearable automaticity of being.
American Psychologist, 54, 462–479.
Bliuc, A.-M., McGarty, C., Reynolds, K. J., and Muntele, D. (2007). Opinion-
based group membership as a predictor to commitment to political action.
European Journal of Social Psychology, 37, 19–32.
Clark, J. D., and Themundo, N. S. (2006). Linking the web and the street:
Internet-based “Dotcauses” and the “Anti-Globalization” movement. World
Development, 34, 50–74.
Cohen, J. L. (1985). Strategy or identity: New theoretical paradigms and con-
temporary social movements. Social Research, 52, 663–716.
de Weerd, M., and Klandermans, B. (1999). Group identification and politi-
cal protest: Farmers’ protest in the Netherlands. European Journal of Social
Psychology, 29, 1073–1095.
Diener, E. (1980). Deindividuation: The absence of self-awareness and self-
regulation in group members. In P. Paulus (Ed.), The psychology of group
influence (pp. 209–242). Hillsdale, NJ: Erlbaum.
Douglas, K. M., and McGarty, C. (2001). Identifiability and self-presentation:
Computer-mediated communication and intergroup interaction. British
Journal of Social Psychology, 40, 399–416.
(2002). Internet identifiability and beyond: A model of the effects of identifia-
bility on communicative behavior. Group Dynamics, 6, 17–26.
Douglas, K. M., McGarty, C., Bliuc, A. M., and Lala, G. (2005). Under-
standing cyberhate: Social competition and social creativity in online white
supremacist groups. Social Science Computer Review, 23, 68–76.
Durkheim, E. (1933). The division of labor in society. Glencoe, IL: Free Press.
Earl, J., and Schussman, A. (2003). The new site of activism: On-line organiza-
tions, movement entrepreneurs, and the changing location of social move-
ment decision making. In P. G. Coy (Ed.), Research in social movements,
conflict and change (Vol. 24) (pp. 155–187). Amsterdam: JAI.
Fisher, D. R., Stanley, K., Berman, D., and Neff, G. (2005). How do organiza-
tions matter? Mobilization and support for participants at five globalization
protests. Social Problems, 52, 102–121.
Foot, K. A., and Schneider, S. M. (2002). Online action in Campaign 2000: An
exploratory analysis of the U.S. political web sphere. Journal of Broadcasting
and Electronic Media, 46, 222–244.
FSF (1998). Free Software Foundation. Retrieved 4 December 2007, from www.
fsf.org
Gaertner, S. L., Dovidio, J. F., Banker, B. S., Houlette, M., Johnson, K. M., and
McGlynn, E. A. (2000). Reducing intergroup conflict: From superordinate
168 Craig McGarty, Girish Lala, and Karen M. Douglas
Price, S. (2000). S11: “We made it work by all sticking together.” Green Left
Online, retrieved 15 May 2008, from www.greenleft.org.au/2000/421/22757
Reicher, S. D. (2000). Social identity definition and enactment: A broad SIDE
against irrationalism and relativism. In T. Postmes, R. Spears, M. Lea, and
S. D. Reicher (Eds.), SIDE issues centre stage: Recent developments in studies of
de-individuation in groups. Amsterdam: Royal Netherlands Academy of Arts
and Sciences.
Reicher, S. D., and Levine, M. (1994a). Deindividuation, power relations
between groups and the expression of social identity: The effects of visi-
bility to the out-group. British Journal of Social Psychology, 33, 145–163.
(1994b). On the consequences of deindividuation manipulations for the strate-
gic communication of self: Identifiability and the presentation of social iden-
tity. European Journal of Social Psychology, 24, 511–524.
Reicher, S. D., Levine, R. M., and Gordijn, E. (1998). More on deindividuation,
power relations between groups and the expression of social identity: Three
studies on the effects of visibility to the in-group. British Journal of Social
Psychology, 37, 15–40.
Reicher, S. D., Spears, R., and Postmes, T. (1995). A social identity model of
deindividuation phenomena. European Review of Social Psychology, 6, 161–
197.
Sani, F., and Reicher, S. D. (1998). When consensus fails: An analysis of the
schism within the Italian Communist Party (1991). European Journal of
Social Psychology, 28, 623–645.
Siegel, J., Dubrovsky, V., Kiesler, S., and McGuire, T. W. (1986). Group pro-
cesses in computer-mediated communication. Organizational Behaviour and
Human Decision Processes, 37, 157–187.
Simon, B., and Klandermans, B. (2001). Politicized collective identity. American
Psychologist, 56, 319–331.
Simon, B., Loewy, M., Stürmer, S., Weber, U., Freytag, P., Habig, C., et al.
(1998). Collective identification and social movement participation. Journal
of Personality & Social Psychology, 74, 646–658.
Simon, B., Stürmer, S., and Steffens, K. (2000). Helping individuals or group
members? The role of individual and collective identification in AIDS vol-
unteerism. Personality and Social Psychology Bulletin, 26, 497–506.
Snow, D. A., Soule, S. A., and Kriesi, H. (Eds.) (2004). The Blackwell companion
to social movements. Oxford: Blackwell Publishing.
Spears, R., and Lea, M. (1994). Panacea or panopticon? The hidden power
in computer-mediated communication. Communication Research, 21, 427–
459.
Spears, R., Postmes, T., Lea, M., and Wolbert, A. (2002). When are net effects
gross products? The power of influence and the influence of power in
computer-mediated communication. Journal of Social Issues, 58, 91–107.
Sproull, L., and Kiesler, S. (1986). Reducing social context cues: Electronic mail
in organizational communication. Communication Research, 32, 1492–1512.
Stallman, R. (2007). Why “Open Source” misses the point of Free Software.
Retrieved 4 December 2007, from www.gnu.org/philosophy/open-source-
misses-the-point.html
Opinion-based groups 171
Stott, C., and Reicher, S. D. (1998). Crowd action as intergroup process: Intro-
ducing the police perspective. European Journal of Social Psychology, 28, 509–
529.
Stürmer, S., Simon, B., Loewy, M., and Jörger, H. (2003). The dual-path model
of social movement participation: The case of the fat acceptance movement.
Social Psychology Quarterly, 66, 71–82.
Tajfel, H. (1981). Human groups and social categories: Studies in social psychology.
Cambridge: Cambridge University Press.
Tajfel, H., and Turner, J. C. (1979). An integrative theory of group conflict. In W.
G. Austin and S. Worchel (Eds.), The social psychology of intergroup relations
(pp. 33–47). Monterey, CA: Brooks/Cole Publishing Company.
(1986). The social identity theory of intergroup behavior. In S. Worchel and
W. G. Austin (Eds.), Psychology of intergroup relations (pp. 7–24). Chicago,
IL: Nelson-Hall.
Taylor, N., and McGarty, C. (2001). The role of subjective group memberships
and perceptions of power in industrial conflict. Journal of Community &
Applied Social Psychology, 11, 389–393.
Tuckman, B. W. (1965). Developmental sequence in small groups. Psychological
Bulletin, 63, 384–399.
Turner, J. C. (1982). Towards a cognitive redefinition of the group. In H. Tajfel
(Ed.), Social identity and intergroup relations (pp. 102–140). Cambridge:
Cambridge University Press.
Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., and Wetherell, M.
S. (1987). Rediscovering the social group: A self-categorization theory. Oxford:
Basil Blackwell.
Turner, J. C., Oakes, P. J., Haslam, S. A., and McGarty, C. (1994). Self and
collective: Cognition and social context. Personality and Social Psychology
Bulletin, 20, 454–462.
van de Donk, W., Loader, B. D., Nixon, P. G., and Rucht, D. (Eds.) (2004).
Cyberprotest: New media, citizens and social movements. London: Routledge.
van Gelder, L. (1985). The strange case of the electronic lover. In C. Dunlop
and R. Kling (Eds.), Computerization and controversy: Value conflicts and social
choices (pp. 364–375). San Diego, CA: Academic Press.
van Zomeren, M., Spears, R., Fischer, A. H., and Leach, C. W. (2004). Put
your money where your mouth is! Explaining collective action tendencies
through group-based anger and group efficacy. Journal of Personality & Social
Psychology, 87, 649–664.
Wall, M. A. (2007). Social movements and email: Expressions of online identity
in the globalization protests. New Media & Society, 9, 258–277.
Yates, L. L. (1996). The internet: What it can and can’t do for activists. The
Internet Society Sixth Annual Conference. Retrieved 1 December 2007, from
www.isoc.org/inet/96/proceedings/e6/e6 1.htm
Zimbardo, P. G. (1969). The human choice: Individuation, reason, and order
versus deindividuation, impulse, and chaos. In W. J. Arnold and D. Levine
(Eds.), Nebraska symposium on motivation (Vol. 17) (pp. 237–307). Lincoln,
NE: University of Nebraska Press.
9 A juxtaposition of social influences
Perspectives on mass/interpersonal
divisions and mergers
Traditionally, mass communication has been conceptualized as one-way
message transmissions from an institutional source to a large, relatively
174 Walther, Tong, DeAndrea, Carr, and Van Der Heide
• Self-presentation information
– interactional
• Third-party information
– your peers
– target’s peers
• System information
– computational
– sociometric
Your peers
In contrast to earlier internet systems, newer systems facilitate viewing
one source’s message while communicating with others about that mes-
sage simultaneously or at some later time. A most rudimentary form of
simultaneous sources is seen in a study in which users observed one of
several video-based public service announcements (PSAs) focusing on
the risks of marijuana use, and a real-time online chat among adoles-
cent peers. David et al. (2006) showed that online group interaction after
weak PSA exposure led to more pro-marijuana attitudes and beliefs than
those in the no-chat conditions. A sample of seventh and twelfth grade
students was assigned to four treatments crossing strong versus weak
PSAs with chat versus no-chat conditions, in groups of 10–20 at a time,
with participants using pseudonymous nicknames when they discussed
the PSAs. David et al. proposed that high sensation seekers were likely to
process the PSA messages in a biased manner. These individuals dom-
inated the online discussions, eclipsing others who might have favored
the PSA’s messages but who remained relatively silent. As a result, the
outspoken participants influenced others negatively with respect to the
PSA’s intended effect on marijuana attitudes. This study demonstrates
potent effects of online chat, but did not examine whether online discus-
sions offer dynamics which differ from those potentially garnered from
face-to-face discussions.
Other research on social discussion of PSAs has reached alternative
conclusions, but these studies employed face-to-face discussion rather
than online chat. Kelly and Edwards (1992) assigned female college stu-
dents to several groups, some who observed anti-drug PSAs without
discussion and others who observed the PSAs and engaged in discus-
sion afterwards. Results were mixed overall, but the discussion of PSAs
had a significant positive effect on some attitudinal outcomes. Warren
et al. (2006) also compared the utility of classroom videos on adoles-
cents’ substance use rates, alone versus with accompanying face-to-face
discussions. Only with discussion were videos effective in reducing drug
use in that sample. Comparing these results to those of David et al.
(2006), there appear to be differences in the effects of online versus
offline discussion of anti-drug PSAs.
A juxtaposition of social influences 181
Although David et al. (2006) did not consider online chats to provide
anything other than a methodological convenience for the capture of ado-
lescents’ discussions, there is reason to believe that CMC exerted some
effect. The research on social influence in online settings under the aegis
of the social identity and deindividuation effects (SIDE) model of CMC
(Reicher et al., 1995) sheds some light on the issue. Several studies offer
compelling evidence that short-term anonymous online chats bestow
extraordinary pressure on participants to conform to normative posi-
tions in group discussions (Sassenberg and Boos, 2003; see, for review,
Postmes et al., 1999), and that these dynamics are diluted in face-to-face
settings. Thus, effects of CMC in the discussion of PSAs or other media
messages should be expected to differ from offline discussions. David
et al. (2006) did note that the older and more influential teens were
generally considered to have higher social status than younger ones and
more likely to have had experience with marijuana. It is just such social
identification dynamics that should lead to more pronounced effects in
CMC than face-to-face interaction. Social identification and peer group
influence in CMC should be a useful element in explaining a variety of
influence effects in the new technological landscape, as we will illustrate
below.
A recent experiment examined the juxtaposition of anti-marijuana PSA
videos on a YouTube page and the comments ostensibly left by other
viewers appended to the page (Walther et al., 2010). Actual comments
that other viewers had posted to other YouTube PSA pages were tran-
scribed, and classified by researchers as being positive with respect to the
PSA (with regard to its features or in their anti-marijuana statements) or
negative with respect to the PSA (or pro-marijuana stance). A number of
stimulus YouTube pages were created as follows. Four existing PSAs were
uploaded to YouTube. A set of positive statements was appended under
each of the PSA videos, or a set of negative statements was appended
to each video as well. Subjects then viewed one of these eight stimulus
pages – the video and the comments – and completed assessments of the
PSA, measures of social identification with the anonymous authors of the
comments they had read, and scales assessing their perceptions of mar-
ijuana’s risk of harm. The results showed no differences on observers’
responses among the four videos themselves. The positive versus nega-
tive comments, however, significantly affected participants’ evaluations
of the PSAs: subjects who viewed the positive comments rated the PSA
more positively, whereas those who viewed the negative comments rated
the PSAs as poorer. The nature of the comments did not have any
direct effect on the subjects’ marijuana risk attitudes. However, the sub-
jects’ level of identification with the ostensible YouTube message posters
182 Walther, Tong, DeAndrea, Carr, and Van Der Heide
A target’s peers
The effect of third-party comments also extends to perceptions of indi-
viduals who created online profiles in social networking systems. For
example, Facebook, a social networking site, allows users to place com-
ments on their friend’s “wall,” thereby co-creating the friend’s home page
(Levy, 2007). To be permitted to post such comments, a prospective
commenter must be a “friend” of the profile owner. While the meaning
of friendship is less clear in social network sites than offline, one thing
is certain: to be accepted as a friend grants permission to that friend
to write comments on an individual’s site, which others may see, who
recognize that such permission has been extended.
Walther et al. (2008) found that the content of friends’ postings on pro-
file owners’ “walls” on Facebook affects perceptions of profile owners’
credibility and attractiveness. The physical appearance of one’s friends,
as shown in those wall postings, affects the perceived physical appearance
of the profile owner, as well. Additional research shows that when there is
a discrepancy between a Facebook profile owner’s self-disclosed extraver-
sion and perceived attractiveness, and the imputation of those character-
istics implied by one’s peers via their wall postings, others’ comments
override the profile owner’s claims (Walther et al., 2009).
184 Walther, Tong, DeAndrea, Carr, and Van Der Heide
System information
Online systems aggregate information about users’ online behaviors, and
some systems provide aggregation coefficients to users. Since these aggre-
gations are the byproduct of users’ natural online behaviors, they may
have great credence when others see them. They appear unmanipulated,
spontaneous, and therefore very genuine. They can reflect choices or
they can reflect sociometric patterns.
Aggregated choice data reflect what other people are doing, and can
be interpreted as what users prefer. On CNET’s download.com site, for
example, coefficients display how frequently various software programs
that have the same general niche and function have been downloaded.
One infers that these download counts constitute tacit endorsements by
the community of users at large. Likewise, the websites of many profes-
sional academic journals offer information about the most downloaded
articles in the journal. Like citation counts, download frequencies of one’s
publications have recently appeared as an indicator of the impact of those
publications in tenure and promotion cases. Unlike citation counts, how-
ever, no affirmative effort beyond the click of a mouse is truly signaled
by these data. On the web-based DVD-by-mail system, Netflix, one can
see what the most popular movies are (in terms of the number of DVD
requests or streamed viewings), generally or by one’s geographical locale.
Netflix offers users the opportunity to gather information automatically
about what movies chosen friends have rented.
Other systems reflect who knows whom and how many connections
there are, i.e., the sociometric information about users. An aggrega-
tion of such a nature as this has been found to affect perceptions about
participants. Although popularity seems to be linearly related to social
attractiveness offline, Tong et al. (2008) found this not to be the case
when it comes to the number of friends one appears to have on Face-
book. The definition of “friend” is stretched rather thin on Facebook,
where the 250–275 average number of friends an individual specifies and
links with (Vanden Boogart, 2006; Walther et al., 2008) exceeds by far
the 10–20 close relationships people tend to sustain in traditional rela-
tionships (Parks, 2007). Nevertheless, there are apparently upper limits
to the credulity of extremely large numbers. Tong et al. (2008) experi-
mentally varied a male and a female Facebook profile only with respect to
the number of friends that the profile owner appeared to have: 102, 302,
502, 702, or 902. Each subject rated one of the ten profiles only, and
their ratings demonstrated a curvilinear relationship between number
of friends the profile owner had and the profile owner’s social attrac-
tiveness (with the drop-off occurring above 302). It appears that “too
A juxtaposition of social influences 185
much of a good thing” can exist, when profile owners seem to gather
friends indiscriminately or appear to spend too much time grooming
their online friend list, although the study found that subjects who rated
these profiles were generally unaware of the aspect of the profile that
led to their attractiveness assessments. Neither were social attractiveness
ratings a function of deviation from subjects’ own number of Facebook
friends.
To summarize, one important avenue of research for the convergence
of sources that new technology promotes will be to understand the various
avenues and interactions of social influence agents who co-appear (or are
closely within clicking reach) in Web 2.0 interfaces. Another potentially
important line of research goes beyond the impact of the overwhelming
presence of what friends and peers think and do on passive social influ-
ence on receivers. The dynamics we have considered so far have focused
on how individuals passively use the social information made manifest
by participative social technologies, in terms of how such information
shapes receivers’ perceptions and decisions.
If individuals come to guide their own media information seeking and
information processing in order to attempt to satisfy other social goals
through subsequent or simultaneous interactions with social partners,
convergent social technologies make possible a separate set of dynamics.
For example, do friends and family members watch broadcasted political
debates for the express purpose of gathering talking points with which
to deride certain parties’ candidates in interpersonal conversations with
relational partners? If so, do these motivations affect attention to and
processing of candidates’ messages? Other research on traditional com-
munication sets the stage for a contemporary re-examination of just such
possibilities.
inclinations. It works through the manner in which people can seek infor-
mation online, and it ends up, hypothetically, altering the information
seeker’s perceptions and probably without the seeker’s awareness of what
happened. We begin this exploration by reviewing conventional views
of information seeking, and the alternative approach suggested by the
communicatory utility concept.
The predominant view of the use of mass media and interpersonal
encounters is the two-step flow: individuals garner information from the
media which they then elaborate in interpersonal encounters, to under-
stand the issues that the media discuss. The framework suggests that
people’s interest in issues drives their information seeking, and interper-
sonal discussions are subservient to the goal of information gathering
and decision making. In contrast, Atkin (1972) demonstrated how inter-
personal motivations drive mass media information seeking in order to
fulfill relationship goals. Atkin (1973) defined behavioral adaptation as
one of the primary motivations to seek information: because of an indi-
vidual’s “need [of] information that is useful for directing . . . anticipated
behavior” (p. 217), people garner information from mass media when
they anticipated future communication with others about some topic. As
such, while information garnered from mass media sources may provide
its consumers with matter related to the topic, it also provides communi-
catory utility – awareness about a topic about which the individual expects
to interact – with respect to further conversations.
In establishing these constructs, Atkin (1972) analyzed survey data
that revealed an association between the number of conversations people
had with others about the news and the number of news sources to which
one was exposed. Atkin also found a significant association between the
degree to which individuals discussed an ongoing presidential campaign
with their family and friends and the degree to which they sought infor-
mation about that campaign, even after controlling for individuals’ level
of interest in the campaign (as well as education level and socioeco-
nomic status of participants). In other words, even when people were not
interested in the presidential campaign, they sought information about
it because they knew they would be called upon to have interpersonal
discussions about it. To further establish the effect, Atkin conducted an
original experiment in which he led subjects to different levels of expected
future interaction on various news topics of a local or national relevance.
Expected future communication about a topic significantly predicted the
extent to which participants reported information seeking on that partic-
ular topic. Similar findings are reported by Wenner (1976), who found
that some people who watched television did so because it provided a
vehicle for conversation, and Lull (1980), who found that media were
A juxtaposition of social influences 187
References
Atkin, C. K. (1972). Anticipated communication and mass media information-
seeking. Public Opinion Quarterly, 36, 188–199.
(1973). Instrumental utilities and information-seeking. In P. Clarke (Ed.), New
models for communication research (pp. 205–242). Beverly Hills, CA: Sage.
Berger, C. R., and Chaffee, S. H. (1988). On bridging the communication gap.
Human Communication Research, 15, 311–318.
(1989). Levels of analysis: An introduction. In C. R. Berger and S. H. Chaffee
(Eds.), Handbook of communication science (pp. 143–145). Newbury Park,
CA: Sage.
Caplan, S. E. (2001). Challenging the mass-interpersonal communication
dichotomy: Are we witnessing the emergence of an entirely new com-
munication system? Electronic Journal of Communication, 11(1). Retrieved
26 October 2007 from www.cios.org/EJCPUBLIC/011/1/01114.HTML
Cappella, J. N. (1989). Interpersonal communication: Definitions and funda-
mental questions. In C. R. Berger and S. H. Chaffee (Eds.), Handbook of
communication science (pp. 184–239). Newbury Park, CA: Sage.
Chaffee, S. H. (1986). Mass media and interpersonal channels: Competitive,
convergent, or complementary? In G. Gumpert and R. Cathcart (Eds.),
Inter/media: Interpersonal communication in a media world (3rd edn., pp. 62–
80). New York: Oxford University Press.
Clark, R. A., and Delia, J. C. (1979). Topoi and rhetorical competence. Quarterly
Journal of Speech, 65, 187–206.
David, C., Cappella, J. N., and Fishbein, M. (2006). The social diffusion of
influence among adolescents: Group interaction in a chat room environment
about antidrug advertisements. Communication Theory, 16, 118–140.
Edwards, C., Edwards, A., Qing, Q., and Wahl, S. (2007). The influence of
computer-mediated word-of-mouth communication on student perceptions
of instructors and attitudes toward learning course content. Communication
Education, 53, 255–277.
Gibbs, J. L., Ellison, N. B., and Heino, R. D. (2006). Self-presentation in
online personals: The role of anticipated future interaction, self-disclosure,
and perceived success in internet dating. Communication Research, 33, 152–
177.
A juxtaposition of social influences 191
Glynn, C. J., and Park, E. (1997). Reference groups, opinion intensity, and
public opinion expression. International Journal of Public Opinion Research,
9, 213–232.
Graham, J., Argyle, M., and Furnham, A. (1980).The goal structure of situations.
European Journal of Social Psychology, 10, 345–366.
Gumpert, G., and Cathcart, R. (Eds.) (1986). Inter/media: Interpersonal commu-
nication in a media world (3rd edn.). New York: Oxford University Press.
Hargittai, E. (2002). Second-level digital divide: Differences in peo-
ple’s online skills. First Monday, 7(4). Retrieved 28 January 2010
from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/
viewArticle/942/864#h4
Heider, F. (1958). The psychology of interpersonal relations. New York: Wiley.
Herring, S. C., and Martinson, A. (2004). Assessing gender authenticity in
computer-mediated language use: Evidence from an identity game. Jour-
nal of Language and Social Psychology, 23, 424–446.
Katz, E. (1957). The two-step flow of communication: An up-to-date report on
an hypothesis. Public Opinion Quarterly, 21, 61–78.
Katz, E., and Lazarsfeld, P. (1955). Personal influence. New York: The Free Press.
Kelly, K., and Edwards, R. (1992). Observations: Does discussion of advertising
transform its effects? Yes . . . sometimes – A case among college students and
their response to anti-drug advertising. Journal of Advertising Research, 32(4),
79.
Lazarsfeld, P., Berelson, B. R., and Gaudet, H. (1944). The people’s choice. New
York/London: Columbia University Press.
Lee, E.-J., Jang, J.-W., and Kim, M.-J. (2009). Interpersonal interactivity in online
journalism: What do readers’ comments on internet news sites tell us? Paper pre-
sented at the annual meeting of the National Communication Association,
Chicago, November.
Levy, S. (2007). Facebook grows up. Newsweek, 27 August, pp. 40–46.
Lull, J. (1980). The social uses of television. Human Communication Research, 6,
197–209.
Metzger, M. J. (2006). Effects of site, vendor, and consumer characteris-
tics on web site trust and disclosure. Communication Research, 33, 155–
179.
Metzger, M. J., Flanagin, A. J., and Medders, R. B. (2010). Social and heuristic
approaches to credibility evaluation online. Journal of Communication, 60,
413–439.
Metzger, M. J., Flanagin, A. J., and Zwarun, L. (2003). College student web use,
perceptions of information credibility, and verification behavior. Computers
in Education, 41, 271–290.
Miller, H. (1995). The presentation of self in electronic life: Goffman on the internet.
Paper presented at Embodied Knowledge and Virtual Space conference,
Goldsmiths’ College, University of London, London, June.
Newhagen, J. E., and Rafaeli, S. (1996). Why communication researchers
should study the internet: A dialogue. Journal of Communication, 46, 4–
13.
Nielsen, J. (1999). Designing web usability: The practice of simplicity. Thousand
Oaks, CA: New Riders Publishing.
192 Walther, Tong, DeAndrea, Carr, and Van Der Heide
O’Reilly, T. (2005). What is Web 2.0: Design patterns and business models for the next
generation of software. Retrieved 25 September 2007 from www.oreillynet.
com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html
O’Sullivan, P. B. (1999). Bridging mass and interpersonal communication: Syn-
thesis scholarship in HCR. Human Communication Research, 25, 569–588.
(2005). Masspersonal communication: Rethinking the mass interpersonal divide.
Paper presented at the annual meeting of the International Communication
Association, New York, May.
Papacharissi, Z. (2002). The self online: The utility of personal home pages.
Journal of Broadcasting & Electronic Media, 46, 346–368.
Papacharissi, Z., and Rubin, A. M. (2000). Predictors of internet use. Journal of
Broadcasting & Electronic Media, 44, 175–196.
Parks, M. R. (2007). Personal networks and personal relationships. Mahwah, NJ:
Lawrence Erlbaum Associates.
Pingree, S., Wiemann, J. M., and Hawkins, R. P. (1988). Editor’s introduction:
Toward conceptual synthesis. In R. P. Hawkins, J. M. Wiemann, and S. Pin-
gree (Eds.), Advancing communication science: Merging mass and interpersonal
processes (pp. 7–17). Newbury Park, CA: Sage.
Postmes, T., Spears, R., and Lea, M. (1999). Social identity, normative content,
and “deindividuation” in computer-mediated groups. In N. Ellemers, R.
Spears, and B. Doosje (Eds.), Social identity: Context, commitment, content
(pp. 164–183). Oxford: Blackwell.
Reardon, K. K., and Rogers, E. M. (1988). Interpersonal versus mass media
communication: A false dichotomy. Human Communication Research, 15,
284–303.
Reicher, S., Spears, R., and Postmes, T. (1995). A social identity model of
deindividuation phenomena. European Review of Social Psychology, 6, 161–
198.
Resnick, P., Zeckhauser, R., Friedman, E., and Kuwabara, K. (2000). Reputation
systems. Communications of the ACM, 43(12), 45–48.
Rogers, E. M., and Shoemaker, F. F. (1971). Communication of innovations. New
York: Free Press.
Sassenberg, K., and Boos, M. (2003). Attitude change in computer-mediated
communication: Effects of anonymity and category norms. Group Processes
& Intergroup Relations, 6, 405–422.
Schutz, W. C. (1966). The interpersonal underworld. Palo Alto, CA: Science and
Behavior Books.
Southwell, B. G., and Torres, A. (2006). Connecting interpersonal and mass
communication: Science news exposure, perceived ability to understand
science, and conversation. Communication Monographs, 73, 334–350.
Sundar, S. S., and Nass, C. (2001). Conceptualizing sources in online news.
Journal of Communication, 51, 52–72.
Thompson, R., Murachver, T., and Green, J. (2001). Where is the gender in
gendered language? Psychological Science, 12, 171–175.
Tong, S. T., Van Der Heide, B., Langwell, L., and Walther, J. B. (2008). Too
much of a good thing? The relationship between number of friends and
A juxtaposition of social influences 193
When the lights go out in a kid’s room, a familiar place can become many
places – a strange land inhabited by frightening creatures or a playground
of warm and fuzzy animals as playmates. The loss of visual cues permits
the experience of a place to hinge on subtle cues – unfamiliar noises
or the lingering fantasies of a bedtime story. The experience of social
interaction is often shaped by place. When the sense of place is not
well defined by a physical context, we, like the kid when the lights go
out, can experience any one of many places, and our behaviors and
the interpretations of others’ actions change depending on the place we
construct. One of the emerging themes in this volume is that place is
not well defined in computer-mediated interactions. In fact, the physical
place is often irrelevant. The meaning of an e-mail exchange does not
depend on whether the communicators are in their offices or at the
local coffee shop when they send and receive the messages. Whether the
exchange is viewed as a business negotiation or idle chit-chat depends
less on where the communicators are located than on other cues, often
subtle, associated with the interaction. Hence, physical place is often
irrelevant to the definition of situation in the person x situation frame.
Another theme that threads its way through the chapters in this book
is that the identity of the person is malleable. Actors’ identities are often
partly or completely masked by the medium. Moreover, what one reveals
about one’s self is controllable and the opportunity for portraying a
fraudulent self is great. I can become whomever my desires, imagina-
tions, and ambitions dictate. Thus, anonymity has been and continues
to be a variable of interest in the study of computer-mediated interac-
tion. The emphasis in much of the early work was on the dark side of
anonymous interactions – the bad things that happen when one escapes
the constraints of norms and accountability. However, a sampling of
the chapters in this volume reveals that the dark side is only part of
195
196 Garold Stasser, Beth Dietz-Uhler, and Zachary Birchmeier
Second, we will briefly note that the emphasis on anonymity may obscure
another reality of the digital world – namely, electronic interactions often
leave traces of our identities and behavior that make anonymity more
illusory than real. Third, electronically mediated social interactions do
not occur in physical locations and the parties involved in an interaction
are often physically isolated. Fourth, for many types of electronic interac-
tions, time is elastic and social interactions can be more deliberative than
their face-to-face counterparts. Finally, we will explore two perspectives
on understanding computer-mediated social interaction. The first view
is that the virtual social world is an extension of the physical social world
and, as such, is a powerful and flexible tool for studying social behavior.
The second view is that the virtual social world is a new world presenting
unique varieties of social phenomena that are inadequately understood
if we do not carefully distinguish the difference between virtual and live
interactions.
Self anonymity
Anonymity has been prominent in the study of electronic interactions.
Anonymity denotes a state or feeling of being unidentifiable. However,
as several have noted (cf. Green and Carpenter, and Spears et al., this
volume), anonymity is not necessarily a feature of electronic communi-
cations, and personal information is often very accessible in computer-
mediated interactions (e.g., as on Facebook, personal websites, and the
like). Perhaps more important to understanding electronically mediated
social behavior is the degree of control people have over revealing per-
sonal information. One can send an e-mail from a professional or a Hot-
mail account. The professional account typically includes considerable
identifying information whereas the Hotmail account may carry none.
Moreover, one can compose very carefully the content of a personal
website to reveal little or much about oneself.
Heightened control over revealing personal information affords the
opportunity for deception but also permits active self-presentation. As
Green and Carpenter (this volume) note, the line between deception and
self-presentation is fuzzy. Depending on one’s goals, one can reveal some
information while strategically withholding other information without
being blatantly deceptive. For example, consider a person whose hob-
bies are collecting fine wine and hunting. Revealing one of these hobbies
but not the other evokes different impressions depending on which is
revealed. However, presenting only one would not be considered fraudu-
lent by most. Moreover, recent evidence suggests that people’s portrayals
of themselves on online networking sites are reasonably accurate. Back
198 Garold Stasser, Beth Dietz-Uhler, and Zachary Birchmeier
et al. (2010) assessed the Big Five personality traits of users of online
networking sites in the US and Germany. They asked the respondents
to repeat the Big Five measures, responding the second time in terms
of their ideal self (“describe yourself as you ideally would like to be”).
Independent judges viewed the networking sites and, based on the con-
tent, rated the profile owners on each dimension of the Big Five. Judges’
ratings were more highly correlated with reported actual personality than
idealized personality for all dimensions except neuroticism. Hence, cre-
ators of online networking self profiles were apparently not slanting the
content to convey what they would like to be but to communicate who
they are – at least, in regards to global personality traits such as extraver-
sion, agreeableness, conscientiousness, and openness.
Anonymity of others
There are two sides to anonymity. When self is anonymous, others are
also often anonymous in online interactions (Sassenberg, this volume).
More to the point, electronic media that permit control over disclosing
personal information typically afford the same control to everyone. Put
differently, opportunities to withhold or distort personal information are
often symmetrical. Thus, if others know little about me, it is likely that I
know little about them. If the information that I reveal is highly selected,
then the information that I receive about others is probably also highly
selected.
However, knowing little about each other does not necessarily make the
interaction less social. A key idea embodied in the SIDE model (Spears
et al., this volume) is that we actively construct impressions of others
based on little information, and people can be strongly identified with
others even when they know little about them. If all one knows about
others is that they share one’s interest in wine, their religious and political
views matter little in the moment. In fact, if Bob knows that he shares
one interest with Ann and Charlie, he is inclined to see himself as similar
to them in many other respects.
Abele and Stasser (2008) demonstrated that matching simple choices
in a coordination task leads to a sense of having a lot in common with
others. In their study, two participants choose between simple bets with
equivalent expected values (e.g., 50 percent chance to win $1 or 25 per-
cent chance to win $2). In one version of the task, the payoffs were dou-
bled if the partners chose the same bet (matching), whereas in another
version the payoffs were doubled if they chose different bets (mismatch-
ing). Successful coordination led to increases in perceived similarity and
liking in the matching task but not in the mismatching task. Whereas
The virtual social world 199
otherwise. Here we are raising the possibility that this tendency may not
be universal. Some people may start with an assumption that they are
distinctive and require more information to conclude that they are simi-
lar. These types of people would react quite differently to the scarcity of
social information that often characterizes online interactions.
Place
Tangible place is typically an important element of situation in face-to-
face interactions. The meaning of communications often depends on
where they occur (Abele, this volume). Similarly, our impressions of
others are informed by place. We expect to encounter different people in
church than in a bar (Cantor et al., 1982). Or, perhaps more to the point,
we expect people to be different in church than in a bar. In electronic
communications, place is not objectively defined. Without the embed-
ding information of physical place, the meaning of an interaction can
depend on something as simple as a label. Abele draws on lessons from
experimental economics where the nature of interdependencies is defined
by the objective rules of a game. Whereas place is not specified, some-
thing as simple as the name of the game can change the meaning of the
interaction and the behavior of the players. Thus, without the contextual
The virtual social world 201
are seemingly less likely to promote hate on the internet than to use the
internet to solidify their identity, justify their existence, and win converts.
The second proposition that they examine is the global activist view of the
internet – the idea that the internet provides a means of promoting and
instigating social activism in the world community. They compare online
and face-to-face social action groups, noting the similarities in their rea-
sons for existence and their purposes. Nonetheless, the action that they
found on the websites of social action groups was primarily talk. Rather
than a forum for consolidating opinions and planning action, these web-
sites were places for expressing and exchanging ideas. McGarty et al.
used the metaphor of an editorial page in a newspaper to character-
ize these sites. They are places to exchange opinions and ideas but not
to assess and consolidate consensus or to mobilize the participants for
action.
The internet gives groups, whether their goals are evil or good, an
unprecedented ability to broadcast their messages and expand the rolls
of group membership. In short, the internet is a communication tool
that permits groups to access a global audience immediately and con-
tinuously. Walther et al. (this volume) contend that computer-mediated
communication blurs the distinction between mass and interpersonal
communication. Mass communication refers to a message from one to
many whereas interpersonal communication is an exchange of messages
among a few. In mass communication, the recipients typically comprise a
large, often diverse, group, and the recipients are not expected to respond.
In interpersonal communication, the target is typically identified and the
message is tailored to the recipient. Moreover, the recipient is usually
expected to respond. Walther et al. show how these two modes of com-
munication converge on the internet. A dialogue on a blog is available
for the masses to read. An ostensibly personal message posted to a Face-
book site is sent with both the sender and the recipient knowing fully that
it will be read by many. Friends exchange reactions to YouTube videos
and discuss news events as they unfold. Certainly, such melding of mass
and interpersonal communications has occurred before the spread of the
internet, but today they have become commonplace. The confluence of
mass and interpersonal communication is not only permitted but also
encouraged by current technology.
Communicatory utility refers to the use of mass media to serve inter-
personal communication needs. A person may watch a sports event not
because she is interested in the event itself but because she anticipates
discussing it with friends the next day. In the convergence of mass and
interpersonal communications, communicatory utility has much more
immediacy. The transition between mass and interpersonal messages is
The virtual social world 207
immediate and seamless. One can surf the internet for information about
a current event while exchanging messages about it with friends. Or,
one can learn of a media event and immediately pass along the informa-
tion with commentary to a friend. Transitions between consuming mass
media and discussing with friends unfolded over days in the past but now
can occur in minutes – such is the flexing of time in computer-mediated
communication.
Walther et al. also discuss reputation systems in which people post
evaluations of products, events, and even other people (professors, ven-
dors on eBay) for mass consumption. They noted that we prefer optimal
similarity with a source in seeking others’ evaluations. We prefer that
they be like us in all respects but the critical one of experience with the
target of evaluation. When seeking information about products online,
people often seek ratings by other consumers over expert evaluations. If
Joe needs a new refrigerator, he wants to know about the experience of
others, ostensibly like him, with the array of brands and models under
consideration. Again, we see the melding of mass and interpersonal mes-
sages. The personal experience of others, which was often hard to gather
in the past, is now posted online for all to see.
References
Abele, S., and Stasser, G. (2008). Coordination success and interpersonal per-
ceptions: Matching versus mismatching. Journal of Personality and Social
Psychology, 95, 576–592.
Back, M. D., Stopfer, J. M., Vazire, S., Gaddis, S., Schmukle, S. C., Egloff,
B., and Gosling, S. D. (2010). Facebook reveal actual personality, not self-
idealization. Psychological Science, 20, 1–3.
Bonito, J. A., and Hollingshead, A. B. (1997). Participation in small groups.
Communication Yearbook, 20, 226–261.
Cantor, N., Mischel, W., and Schwartz, J. C. (1982). A prototype analysis of
psychological situations. Cognitive Psychology, 14, 45–77.
Chartrand, T. L., and Bargh, J. L. (1999). The chameleon effect: The perception–
behavior link and social interaction. Journal of Personality and Social Psychol-
ogy, 76, 893–910.
210 Garold Stasser, Beth Dietz-Uhler, and Zachary Birchmeier
Kelley, H. H., Holmes, J. G., Kerr, N. L., Reis, H. T., Rusbult, C. E., and
van Lange, P. A. M. (2003). An atlas of interpersonal situations. New York:
Cambridge University Press.
Kelley, H. H., and Stahelski, A. J. (1970). Social interaction basis of coopera-
tors’ and competitors’ beliefs about others. Journal of Personality and Social
Psychology, 16, 66–91.
McKenna, K. Y. A., and Bargh, J. A. (2000). Plan 9 from cyberspace: The
implications of the internet for personality and social psychology. Personality
and Social Psychology Review, 4, 57–75.
Mischel, W. (1977). The interaction of person and situation. In D. Magnus-
son and N. S. Endler (Eds.), Personality at the crossroads: Current issues in
interactional psychology (pp. 333–352). Hillsdale, NJ: Lawrence Erlbaum.
(2004). Toward an integrative science of the person. Annual Review of Psychol-
ogy, 55, 1–22.
Snyder, M., and Ickes, W. (1985). Personality and social behavior. In G. Lindzey
and E. Aronson (Eds.), The handbook of social psychology (pp. 883–947). New
York: Random House.
Stasser, G., and Vaughan, S. I. (1996). Models of participation during face-
to-face unstructured discussions. In E. H. Witte and J. H. Davis (Eds.),
Understanding group behavior: Consensual action by small groups (Vol. I, pp.
165–192). Hillsdale, NJ: Erlbaum.
van Lange, P. A. M. (1992). Confidence in expectations: A test of the triangle
hypothesis. European Journal of Personality, 6, 371–379.
Index
211
212 Index