{"title":"Digital parenting divides: the role of parental capital and digital parenting readiness in parental digital mediation","authors":"Pengfei Zhao, Natalie N. Bazarova, Natercia Valle","doi":"10.1093/jcmc/zmad032","DOIUrl":"https://doi.org/10.1093/jcmc/zmad032","url":null,"abstract":"","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73444601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jcm.18.3.164-171
Muhammad Wajid Khan, U. S. Khan, Mohammad Saleem, N. Rashid
Wireless networks have been through many transformations to provide Quality of Service (QoS) and seamless mobility. Handoff management plays a vital role in maintaining quality of service while roaming. The focus of the paper is to develop a handoff technique for optimized handoff decision making. Multi-Criteria Decision Making (MCDM) techniques are utilized for making decision where more than one contradicting parameter are involved. Fuzzy Analytic Hierarchy Process (FAHP) is used for weight calculation and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) decides the rank of available networks. The proposed technique utilizes six network parameters i.e., received signal strength, bandwidth, signal to interference & noise ratio, delay, packet loss, and bit error rate for weights calculation under different traffic classes and three decision makers i.e., network, mobile node, and user preference for optimized handoff. The results show that the proposed technique effectively classify the best available network in terms of their rank and reduces the number of unnecessary handoffs.
{"title":"Multi-criteria Handoff Decision making Algorithm for Seamless Mobility in Heterogenous Wireless Networks","authors":"Muhammad Wajid Khan, U. S. Khan, Mohammad Saleem, N. Rashid","doi":"10.12720/jcm.18.3.164-171","DOIUrl":"https://doi.org/10.12720/jcm.18.3.164-171","url":null,"abstract":"Wireless networks have been through many transformations to provide Quality of Service (QoS) and seamless mobility. Handoff management plays a vital role in maintaining quality of service while roaming. The focus of the paper is to develop a handoff technique for optimized handoff decision making. Multi-Criteria Decision Making (MCDM) techniques are utilized for making decision where more than one contradicting parameter are involved. Fuzzy Analytic Hierarchy Process (FAHP) is used for weight calculation and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) decides the rank of available networks. The proposed technique utilizes six network parameters i.e., received signal strength, bandwidth, signal to interference & noise ratio, delay, packet loss, and bit error rate for weights calculation under different traffic classes and three decision makers i.e., network, mobile node, and user preference for optimized handoff. The results show that the proposed technique effectively classify the best available network in terms of their rank and reduces the number of unnecessary handoffs.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"96 1","pages":"164-171"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81651158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study focuses on users’ practices involved in creating and maintaining Facebook memorial Pages by adapting the theoretical perspective of the social capital approach. It examines 18 Pages in Israel, which are dedicated to ordinary people who died in nonordinary circumstances. We employ qualitative analysis based on a digital ethnography conducted between 2018 and 2021. Our findings show how memorial Pages serve as social capital resources for admin users. Admins negotiate Facebook affordances when creating, designing, and maintaining such Pages. They discursively position the deceased as a respectable public figure worth remembering and their followers, who are otherwise strangers, as vital partners in this process. The resources followers provide range from economic capital and practical support to solidarity and emotional support. Finally, we point at the perceived connection users make between visible/measurable online engagement (Like, Share, Follow), and cognitive or emotive implications—public memory, recognition, and esteem.
本研究采用社会资本的理论视角,关注用户在创建和维护Facebook纪念页面时的行为。它考察了以色列的18页,这些页是献给在不寻常的情况下死去的普通人的。我们采用了基于2018年至2021年间进行的数字民族志的定性分析。我们的研究结果显示了纪念页面如何作为管理用户的社会资本资源。管理员在创建、设计和维护这些页面时协商Facebook的支持。他们在话语中将死者定位为值得纪念的受人尊敬的公众人物,并将他们的追随者(在其他情况下是陌生人)定位为这一过程中的重要伙伴。追随者提供的资源范围从经济资本和实际支持到团结和情感支持。最后,我们指出用户在可见/可测量的在线参与(Like, Share, Follow)和认知或情感暗示(public memory, recognition, and esteem)之间的感知联系。
{"title":"Like, share, and remember: Facebook memorial Pages as social capital resources","authors":"Sarit Navon, Chaim Noy","doi":"10.1093/jcmc/zmac021","DOIUrl":"https://doi.org/10.1093/jcmc/zmac021","url":null,"abstract":"\u0000 This study focuses on users’ practices involved in creating and maintaining Facebook memorial Pages by adapting the theoretical perspective of the social capital approach. It examines 18 Pages in Israel, which are dedicated to ordinary people who died in nonordinary circumstances. We employ qualitative analysis based on a digital ethnography conducted between 2018 and 2021. Our findings show how memorial Pages serve as social capital resources for admin users. Admins negotiate Facebook affordances when creating, designing, and maintaining such Pages. They discursively position the deceased as a respectable public figure worth remembering and their followers, who are otherwise strangers, as vital partners in this process. The resources followers provide range from economic capital and practical support to solidarity and emotional support. Finally, we point at the perceived connection users make between visible/measurable online engagement (Like, Share, Follow), and cognitive or emotive implications—public memory, recognition, and esteem.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"144 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89031230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article examines how people understand technology-mediated abuse (TMA) between adult romantic partners. Because knowledge and attitudes regarding sensitive issues are created and shaped via technology, users’ interpretations are crucial to understanding life-threatening relational situations such as TMA. In this study, 551 individuals were recruited via community-based chain-referral sampling and asked to describe TMA (e.g., online stalking, hacking, verbal attack, etc.). To varying degrees, age, sex, and technological proficiency each and also, interactively predicted TMA perceptions. Findings showed that older (vs. younger) and male (vs. female) individuals understood different technology-mediated behaviors as harmful when used by adult romantic partners.
{"title":"Understanding darkness: age, sex, and tech-proficiency in knowledge and perceptions of technology-mediated abuse","authors":"J. Eckstein","doi":"10.1093/jcmc/zmac013","DOIUrl":"https://doi.org/10.1093/jcmc/zmac013","url":null,"abstract":"\u0000 This article examines how people understand technology-mediated abuse (TMA) between adult romantic partners. Because knowledge and attitudes regarding sensitive issues are created and shaped via technology, users’ interpretations are crucial to understanding life-threatening relational situations such as TMA. In this study, 551 individuals were recruited via community-based chain-referral sampling and asked to describe TMA (e.g., online stalking, hacking, verbal attack, etc.). To varying degrees, age, sex, and technological proficiency each and also, interactively predicted TMA perceptions. Findings showed that older (vs. younger) and male (vs. female) individuals understood different technology-mediated behaviors as harmful when used by adult romantic partners.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80158754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Children start using smartphones increasingly from early ages. This makes it more difficult for them to develop an understanding of online privacy and managing their personal data. Many parents monitor and regulate children’s online media use. However, they also encourage using smartphones to ensure the safety and security of their children. This study explores how children use smartphones in relation to their understanding of privacy of communication, content, data, and location. It examines data from 7 focus groups with arts-based methods conducted with 37 children in UK. The findings suggest that children think of their smartphones as a private communication technology and a private place, and they manage their locational privacy based on the necessity of using a mobile app and through adjusting the location settings on their phones. The findings also suggest that privacy of mobile data and user content are dependent on where mobile communication takes place.
{"title":"Children's mobile communicative practices and locational privacy","authors":"Didem Özkul","doi":"10.1093/jcmc/zmac015","DOIUrl":"https://doi.org/10.1093/jcmc/zmac015","url":null,"abstract":"\u0000 Children start using smartphones increasingly from early ages. This makes it more difficult for them to develop an understanding of online privacy and managing their personal data. Many parents monitor and regulate children’s online media use. However, they also encourage using smartphones to ensure the safety and security of their children. This study explores how children use smartphones in relation to their understanding of privacy of communication, content, data, and location. It examines data from 7 focus groups with arts-based methods conducted with 37 children in UK. The findings suggest that children think of their smartphones as a private communication technology and a private place, and they manage their locational privacy based on the necessity of using a mobile app and through adjusting the location settings on their phones. The findings also suggest that privacy of mobile data and user content are dependent on where mobile communication takes place.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90319220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artificial intelligence (AI) technology has vastly reshaped user experiences on social media. AI-powered social media use and its outcomes largely depend on how users collaborate with AI that exercises agency. Through in-depth interviews with TikTok users, this study investigates how users collaborate with AI when using AI-powered social media and how such dynamics shape user engagement. We found that TikTok users are receptive to personalized experiences enabled by machine agency. However, by influencing each other, user agency and machine agency also led to user–AI synergy. Users deliberately influence content curation algorithms to make them cater more precisely to their needs; AI also facilitates users’ content creation and networking. Such AI–user collaboration on TikTok significantly influences medium engagement and social-interactive engagement. These findings advance our understanding of the dynamics between human agency and machine agency and, thus, how AI transforms user experiences on social media.
{"title":"AI agency vs. human agency: understanding human-AI interactions on TikTok and their implications for user engagement","authors":"Hyunjin Kang, Chen Lou","doi":"10.1093/jcmc/zmac014","DOIUrl":"https://doi.org/10.1093/jcmc/zmac014","url":null,"abstract":"\u0000 Artificial intelligence (AI) technology has vastly reshaped user experiences on social media. AI-powered social media use and its outcomes largely depend on how users collaborate with AI that exercises agency. Through in-depth interviews with TikTok users, this study investigates how users collaborate with AI when using AI-powered social media and how such dynamics shape user engagement. We found that TikTok users are receptive to personalized experiences enabled by machine agency. However, by influencing each other, user agency and machine agency also led to user–AI synergy. Users deliberately influence content curation algorithms to make them cater more precisely to their needs; AI also facilitates users’ content creation and networking. Such AI–user collaboration on TikTok significantly influences medium engagement and social-interactive engagement. These findings advance our understanding of the dynamics between human agency and machine agency and, thus, how AI transforms user experiences on social media.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73074405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given the scale of user-generated content online, the use of artificial intelligence (AI) to flag problematic posts is inevitable, but users do not trust such automated moderation of content. We explore if (a) involving human moderators in the curation process and (b) affording “interactive transparency,” wherein users participate in curation, can promote appropriate reliance on AI. We test this through a 3 (Source: AI, Human, Both) × 3 (Transparency: No Transparency, Transparency-Only, Interactive Transparency) × 2 (Classification Decision: Flagged, Not Flagged) between-subjects online experiment (N = 676) involving classification of hate speech and suicidal ideation. We discovered that users trust AI for the moderation of content just as much as humans, but it depends on the heuristic that is triggered when they are told AI is the source of moderation. We also found that allowing users to provide feedback to the algorithm enhances trust by increasing user agency.
{"title":"When AI moderates online content: effects of human collaboration and interactive transparency on user trust","authors":"Maria D. Molina, S. Sundar","doi":"10.1093/jcmc/zmac010","DOIUrl":"https://doi.org/10.1093/jcmc/zmac010","url":null,"abstract":"\u0000 Given the scale of user-generated content online, the use of artificial intelligence (AI) to flag problematic posts is inevitable, but users do not trust such automated moderation of content. We explore if (a) involving human moderators in the curation process and (b) affording “interactive transparency,” wherein users participate in curation, can promote appropriate reliance on AI. We test this through a 3 (Source: AI, Human, Both) × 3 (Transparency: No Transparency, Transparency-Only, Interactive Transparency) × 2 (Classification Decision: Flagged, Not Flagged) between-subjects online experiment (N = 676) involving classification of hate speech and suicidal ideation. We discovered that users trust AI for the moderation of content just as much as humans, but it depends on the heuristic that is triggered when they are told AI is the source of moderation. We also found that allowing users to provide feedback to the algorithm enhances trust by increasing user agency.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90587936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given its massive volume and rapid development of new trends, the universe of user-generated content may seem utterly chaotic. Yet the flow of content is underlined by deep-rooted patterns of communication. In this article, we present the first systematic attempt to identify these patterns using the concept of social media rituals. Understood as typified communicative practices that formalize and express shared values, rituals offer a productive path to categorize popular genres of content and trace the values they convey. Integrating theoretical literature on rituals with empirical studies of social media genres, we develop a typology of 16 rituals that express diverse values, ranging from respect and responsibility to materialism and pleasure. Furthermore, we show that rituals embed different notions of good communication, as reflected in the values of authenticity, persuasion, affiliation, and demonstration. Finally, we discuss how our framework can facilitate comparative investigations of user-generated content and platform values.
{"title":"A typology of social media rituals","authors":"T. Trillò, Blake Hallinan, L. Shifman","doi":"10.1093/jcmc/zmac011","DOIUrl":"https://doi.org/10.1093/jcmc/zmac011","url":null,"abstract":"\u0000 Given its massive volume and rapid development of new trends, the universe of user-generated content may seem utterly chaotic. Yet the flow of content is underlined by deep-rooted patterns of communication. In this article, we present the first systematic attempt to identify these patterns using the concept of social media rituals. Understood as typified communicative practices that formalize and express shared values, rituals offer a productive path to categorize popular genres of content and trace the values they convey. Integrating theoretical literature on rituals with empirical studies of social media genres, we develop a typology of 16 rituals that express diverse values, ranging from respect and responsibility to materialism and pleasure. Furthermore, we show that rituals embed different notions of good communication, as reflected in the values of authenticity, persuasion, affiliation, and demonstration. Finally, we discuss how our framework can facilitate comparative investigations of user-generated content and platform values.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88739488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A significant number of adolescents and young adults are targeted by online hate speech. The effect of such hateful utterances can involve severe psychological harm, especially for youths who have to master developmental tasks. Therefore, drawing on criminology’s routine activity theory, this study investigates the factors that help explain why youths become victimized through online hate speech. We conducted a national quota-based quantitative online survey that was representative of adolescent and young adult online users (N = 1,180). In the results, we identified six latent profiles of young targets with overall high or low online hate speech victimization, victimization due to gender, migration background, religion, or political engagement on behalf of the queer community. While relative subjective deprivation, political participation, and lower digital media literacy positively predicted overall victimization through online hate speech, being targeted was more likely for members of the aforementioned social groups and those showing political engagement.
{"title":"Youths as targets: factors of online hate speech victimization among adolescents and young adults","authors":"Magdalena Obermaier, D. Schmuck","doi":"10.1093/jcmc/zmac012","DOIUrl":"https://doi.org/10.1093/jcmc/zmac012","url":null,"abstract":"A significant number of adolescents and young adults are targeted by online hate speech. The effect of such hateful utterances can involve severe psychological harm, especially for youths who have to master developmental tasks. Therefore, drawing on criminology’s routine activity theory, this study investigates the factors that help explain why youths become victimized through online hate speech. We conducted a national quota-based quantitative online survey that was representative of adolescent and young adult online users (N = 1,180). In the results, we identified six latent profiles of young targets with overall high or low online hate speech victimization, victimization due to gender, migration background, religion, or political engagement on behalf of the queer community. While relative subjective deprivation, political participation, and lower digital media literacy positively predicted overall victimization through online hate speech, being targeted was more likely for members of the aforementioned social groups and those showing political engagement.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87282467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a new way of imagining and measuring opinions emerging from social media. As people tend to connect with like-minded others and express opinions in response to current events on social media, social media public opinion is naturally occurring, temporally sensitive, and inherently social. Our framework for measuring social media public opinion first samples targeted nodes from a large social graph and identifies homogeneous, interactive, and stable networks of actors, which we call “flocks,” based on social network structure, and then measures and presents opinions of flocks. We apply this framework to Twitter and provide empirical evidence for flocks being meaningful units of analysis and flock membership predicting opinion expression. Through contextualizing social media public opinion by foregrounding the various homogeneous networks it is embedded in, we highlight the need to go beyond the aggregate-level measurement of social media public opinion and study the social dynamics of opinion expression using social media.
{"title":"Correction to: Social Media Public Opinion as Flocks in a Murmuration: Conceptualizing and Measuring Opinion Expression on Social Media","authors":"Yini Zhang, Fan Chen, Karl Rohe","doi":"10.1093/jcmc/zmac002","DOIUrl":"https://doi.org/10.1093/jcmc/zmac002","url":null,"abstract":"We propose a new way of imagining and measuring opinions emerging from social media. As people tend to connect with like-minded others and express opinions in response to current events on social media, social media public opinion is naturally occurring, temporally sensitive, and inherently social. Our framework for measuring social media public opinion first samples targeted nodes from a large social graph and identifies homogeneous, interactive, and stable networks of actors, which we call “flocks,” based on social network structure, and then measures and presents opinions of flocks. We apply this framework to Twitter and provide empirical evidence for flocks being meaningful units of analysis and flock membership predicting opinion expression. Through contextualizing social media public opinion by foregrounding the various homogeneous networks it is embedded in, we highlight the need to go beyond the aggregate-level measurement of social media public opinion and study the social dynamics of opinion expression using social media.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80102755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}