Pub Date : 2025-12-16DOI: 10.1177/14614448251400675
Rob Cover
With the increasing use of generative AI tools to enhance engagement on social media platforms, we are beginning to see AI-generated content contributing to digital harms, including particularly online abuse. Drawing on digital ethnography case studies, this article investigates the emergence of AI-generated ‘rage bait’ content, a severe form of trolling attempting to invoke users into adversity and outrage. AI-generated rage bait differs from other rage baiting because no human actor is involved in its creation or initial distribution. Case study examples of rage bait posts generated by AI tools are analysed. The article theorises the cultural causality of AI-generated rage bait and other digital harms, discussing how AI tools draw on extant datasets, practices and norms to further embed rage in the digital ecology. The article discusses some of the cultural and policy implications of digital harms originating from AI generators and provides a roadmap for further study.
{"title":"AI generation of rage bait: Implications for digital harms","authors":"Rob Cover","doi":"10.1177/14614448251400675","DOIUrl":"https://doi.org/10.1177/14614448251400675","url":null,"abstract":"With the increasing use of generative AI tools to enhance engagement on social media platforms, we are beginning to see AI-generated content contributing to digital harms, including particularly online abuse. Drawing on digital ethnography case studies, this article investigates the emergence of AI-generated ‘rage bait’ content, a severe form of trolling attempting to invoke users into adversity and outrage. AI-generated rage bait differs from other rage baiting because no human actor is involved in its creation or initial distribution. Case study examples of rage bait posts generated by AI tools are analysed. The article theorises the cultural causality of AI-generated rage bait and other digital harms, discussing how AI tools draw on extant datasets, practices and norms to further embed rage in the digital ecology. The article discusses some of the cultural and policy implications of digital harms originating from AI generators and provides a roadmap for further study.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"14 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145759723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1177/14614448251401865
Stephanie Bührer, Kevin Koban, Jörg Matthes
Online hostility has become increasingly common in digital public spaces, often to the detriment of marginalized groups. While prior research distinguishes between incivility and intolerance, little is known about whether users can recognize these forms as conceptually distinct. Moreover, the roles of prior digital hate perpetration and national context in shaping such perceptions remain unclear. This cross-national survey ( N = 4041; Austria, France, Hungary, and Sweden) addresses these gaps. Participants rated uncivil anti-immigration content not only as more uncivil but also as more intolerant than explicitly intolerant content, indicating an alarming misreading of exclusionary messages. Recent perpetration was associated with weaker recognition of incivility and intolerance, as well as reduced differentiation between content types, suggesting desensitization and blurred perceptual boundaries. The findings were consistent across countries, indicating that these mechanisms transcend national contexts. Strengthening users’ ability to recognize subtle exclusionary rhetoric is essential to counter its normalization in public spheres.
{"title":"Misreading uncivil and intolerant anti-immigration content in digital spheres: The role of recent online perpetration","authors":"Stephanie Bührer, Kevin Koban, Jörg Matthes","doi":"10.1177/14614448251401865","DOIUrl":"https://doi.org/10.1177/14614448251401865","url":null,"abstract":"Online hostility has become increasingly common in digital public spaces, often to the detriment of marginalized groups. While prior research distinguishes between incivility and intolerance, little is known about whether users can recognize these forms as conceptually distinct. Moreover, the roles of prior digital hate perpetration and national context in shaping such perceptions remain unclear. This cross-national survey ( <jats:italic toggle=\"yes\">N</jats:italic> = 4041; Austria, France, Hungary, and Sweden) addresses these gaps. Participants rated uncivil anti-immigration content not only as more uncivil but also as more intolerant than explicitly intolerant content, indicating an alarming misreading of exclusionary messages. Recent perpetration was associated with weaker recognition of incivility and intolerance, as well as reduced differentiation between content types, suggesting desensitization and blurred perceptual boundaries. The findings were consistent across countries, indicating that these mechanisms transcend national contexts. Strengthening users’ ability to recognize subtle exclusionary rhetoric is essential to counter its normalization in public spheres.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"31 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145717265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-10DOI: 10.1177/14614448251403196
Gwen Petro, Amy L Gonzales
Privacy scholars have posited that institutional privacy threats arouse more uncertainty than social privacy threats, though research examining different types of privacy threats side-by-side is limited. This research uses the repeal of federal protection for abortion in the United States as a case study to explore reactions to these different threats. Moreover, by separately considering corporations and the state, we inductively examine beliefs about the flows of information and resulting power dynamics between individuals (horizontal) and multiple institutions (vertical). Data from interviews with 45 young women in California and Indiana revealed that privacy threats from institutions—especially the state—were perceived as more uncertain, and that these various threats were seen as intertwined. We present the construct of cooperative privacy threats to highlight the lack of boundaries between privacy threats, which often amplifies the risks they pose. Our findings elaborate on online privacy theory and may inform future privacy-preserving policy and technology design.
{"title":"Young women’s perceptions of cooperative privacy threats through the lens of abortion in the United States","authors":"Gwen Petro, Amy L Gonzales","doi":"10.1177/14614448251403196","DOIUrl":"https://doi.org/10.1177/14614448251403196","url":null,"abstract":"Privacy scholars have posited that institutional privacy threats arouse more uncertainty than social privacy threats, though research examining different types of privacy threats side-by-side is limited. This research uses the repeal of federal protection for abortion in the United States as a case study to explore reactions to these different threats. Moreover, by separately considering corporations and the state, we inductively examine beliefs about the flows of information and resulting power dynamics between individuals (horizontal) and multiple institutions (vertical). Data from interviews with 45 young women in California and Indiana revealed that privacy threats from institutions—especially the state—were perceived as more uncertain, and that these various threats were seen as intertwined. We present the construct of <jats:italic toggle=\"yes\">cooperative privacy threats</jats:italic> to highlight the lack of boundaries between privacy threats, which often amplifies the risks they pose. Our findings elaborate on online privacy theory and may inform future privacy-preserving policy and technology design.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"48 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145711268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-09DOI: 10.1177/14614448251397518
Tom Divon, Christian Pentzold
Generative Artificial Intelligence (GenAI) is widely regarded as a transformative force, reshaping our understanding of both life and death. One experimental frontier is its ability to recreate deceased human beings. Our article explores this nascent GenAI application situated at the threshold of existence. We analyze 50 cases from the United States, Europe, the Near East, and East Asia and distill three principal modes of AI resurrections: (1) Spectacularization, the public re-staging of iconic deceased cultural figures via immersive recreations for entertainment spectacle; (2) Sociopoliticization, the re-invoking of victims of violence in political or commemorative contexts, often as posthumous testimonies; and (3) Mundanization, the everyday revival of loved ones, allowing users to interact with the deceased through chatbots or synthetic media. To engage with the underlying industry that capitalizes on digital remains, we introduce the notion of spectral labor, in which the dead become involuntary sources of data, likeness, and affect that are extracted, circulated, and monetized without their consent. We argue that the use of GenAI to animate the deceased raises urgent legal and ethical questions around posthumous appropriation, ownership, work, and control.
{"title":"Artificially alive: An exploration of AI resurrections and spectral labor modes in a postmortal society","authors":"Tom Divon, Christian Pentzold","doi":"10.1177/14614448251397518","DOIUrl":"https://doi.org/10.1177/14614448251397518","url":null,"abstract":"Generative Artificial Intelligence (GenAI) is widely regarded as a transformative force, reshaping our understanding of both life and death. One experimental frontier is its ability to recreate deceased human beings. Our article explores this nascent GenAI application situated at the threshold of existence. We analyze 50 cases from the United States, Europe, the Near East, and East Asia and distill three principal modes of AI resurrections: (1) Spectacularization, the public re-staging of iconic deceased cultural figures via immersive recreations for entertainment spectacle; (2) Sociopoliticization, the re-invoking of victims of violence in political or commemorative contexts, often as posthumous testimonies; and (3) Mundanization, the everyday revival of loved ones, allowing users to interact with the deceased through chatbots or synthetic media. To engage with the underlying industry that capitalizes on digital remains, we introduce the notion of spectral labor, in which the dead become involuntary sources of data, likeness, and affect that are extracted, circulated, and monetized without their consent. We argue that the use of GenAI to animate the deceased raises urgent legal and ethical questions around posthumous appropriation, ownership, work, and control.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"22 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145704144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-03DOI: 10.1177/14614448251401170
Audun Fladmoe, Marjan Nadim
Online harassment is shown to have democratic consequences by limiting freedom of expression, disrupting public discourse, reinforcing prejudice and hostility, and creating barriers for online participation. However, there has been less attention to how online harassment relates to trust, which is a key component of well-functioning democracies. This study investigates the relationship between experiences with online harassment and different forms of social and institutional (media and governmental) trust. The analyses utilize survey panel data from Denmark and Norway, two high-trust societies. Findings indicate that online harassment, especially group-based harassment, negatively correlates with all forms of trust, with the most significant panel effects observed on governmental trust and trust in social media (Facebook), which are both institutions that regulate speech. The study contributes to the research literature by shedding light on how various types of online harassment influence different aspects of trust.
{"title":"The impact of online harassment on trust: Survey evidence from Denmark and Norway","authors":"Audun Fladmoe, Marjan Nadim","doi":"10.1177/14614448251401170","DOIUrl":"https://doi.org/10.1177/14614448251401170","url":null,"abstract":"Online harassment is shown to have democratic consequences by limiting freedom of expression, disrupting public discourse, reinforcing prejudice and hostility, and creating barriers for online participation. However, there has been less attention to how online harassment relates to trust, which is a key component of well-functioning democracies. This study investigates the relationship between experiences with online harassment and different forms of social and institutional (media and governmental) trust. The analyses utilize survey panel data from Denmark and Norway, two high-trust societies. Findings indicate that online harassment, especially group-based harassment, negatively correlates with all forms of trust, with the most significant panel effects observed on governmental trust and trust in social media (Facebook), which are both institutions that regulate speech. The study contributes to the research literature by shedding light on how various types of online harassment influence different aspects of trust.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"9 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145664491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-02DOI: 10.1177/14614448251393913
Laurent H Wang, Dina Naji Arch, Miriam J Metzger
Drawing from protection motivation theory (PMT), this study explored subgroups of Internet users based on their patterns of privacy threat and coping appraisals (i.e. perceived severity, perceived vulnerability, perceived benefits, self-efficacy, response efficacy, and response cost) in the context of targeted advertising. A latent profile analysis using a nationally-representative sample of US adults revealed three meaningful subgroups: Privacy-Optimistic, Privacy-Cautious, and Privacy-Balanced. These profiles differed in privacy protection intention, with Privacy-Cautious individuals reporting the highest intention, followed by Privacy-Balanced and Privacy-Optimistic individuals. In addition, higher perceived surveillance was associated with higher odds of being in the Privacy-Cautious and Privacy-Balanced (vs Privacy-Optimistic) profiles. Higher privacy powerlessness was also associated with higher odds of being in the Privacy-Cautious (vs Privacy-Optimistic) profile. Findings theoretically extend PMT and previous privacy research by highlighting the heterogeneity in users’ online privacy appraisals, and practically inform more tailored intervention and message designs.
{"title":"Not the average user: A latent profile analysis of privacy protection appraisals in targeted advertising","authors":"Laurent H Wang, Dina Naji Arch, Miriam J Metzger","doi":"10.1177/14614448251393913","DOIUrl":"https://doi.org/10.1177/14614448251393913","url":null,"abstract":"Drawing from protection motivation theory (PMT), this study explored subgroups of Internet users based on their patterns of privacy threat and coping appraisals (i.e. perceived severity, perceived vulnerability, perceived benefits, self-efficacy, response efficacy, and response cost) in the context of targeted advertising. A latent profile analysis using a nationally-representative sample of US adults revealed three meaningful subgroups: Privacy-Optimistic, Privacy-Cautious, and Privacy-Balanced. These profiles differed in privacy protection intention, with Privacy-Cautious individuals reporting the highest intention, followed by Privacy-Balanced and Privacy-Optimistic individuals. In addition, higher perceived surveillance was associated with higher odds of being in the Privacy-Cautious and Privacy-Balanced (vs Privacy-Optimistic) profiles. Higher privacy powerlessness was also associated with higher odds of being in the Privacy-Cautious (vs Privacy-Optimistic) profile. Findings theoretically extend PMT and previous privacy research by highlighting the heterogeneity in users’ online privacy appraisals, and practically inform more tailored intervention and message designs.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"28 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145651535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-02DOI: 10.1177/14614448251399640
Lise Waldek, Brian Ballsun-Stanton, Muhammad Iqbal, David Kernot, Debra Smith
Ethical conduct in digital research is full of grey areas. Disciplinary, institutional and individual norms and conventions developed to support research are challenged, often leaving scholars with a sense of unease or lack of clarity. The growing availability of hacked data is one area. Discussions and debates around the use of these datasets in research are extremely limited. Reviews of the history, culture or morality of the act of hacking are topics that have attracted some scholarly attention. However, how to undertake research with this data is less examined and provides an opportunity for the generation of reflexive ethical practice. This article presents a case study outlining the ethical debates that arose when considering the use of hacked data to examine online far-right violent extremism. It argues that under certain circumstances, researchers can do ethical research with hacked data. However, to do so, we must proactively and continually engage deeply with ethical quandaries and dilemmas.
{"title":"Ethical conundrums: Hacked data in the study of far-right violent extremism","authors":"Lise Waldek, Brian Ballsun-Stanton, Muhammad Iqbal, David Kernot, Debra Smith","doi":"10.1177/14614448251399640","DOIUrl":"https://doi.org/10.1177/14614448251399640","url":null,"abstract":"Ethical conduct in digital research is full of grey areas. Disciplinary, institutional and individual norms and conventions developed to support research are challenged, often leaving scholars with a sense of unease or lack of clarity. The growing availability of hacked data is one area. Discussions and debates around the use of these datasets in research are extremely limited. Reviews of the history, culture or morality of the act of hacking are topics that have attracted some scholarly attention. However, how to undertake research with this data is less examined and provides an opportunity for the generation of reflexive ethical practice. This article presents a case study outlining the ethical debates that arose when considering the use of hacked data to examine online far-right violent extremism. It argues that under certain circumstances, researchers can do ethical research with hacked data. However, to do so, we must proactively and continually engage deeply with ethical quandaries and dilemmas.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"51 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145651536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-29DOI: 10.1177/14614448251392918
Emily Setty, Robyn Muir, Rosie Macpherson
This paper examines how girls aged 9–15 engage with online influencer culture, focusing on interplays between digital and non-digital normative ecologies. Drawing on school-based workshops, we explore tensions between authenticity, normative ideals and self-presentation in girls’ interactions with influencers. Participants expressed agency in content consumption alongside pressures to conform, shaped by social interactions online and offline. We argue that influencer culture perpetuates dominant femininity norms through reciprocal dynamics between influencers and audiences. Girls navigated this terrain ambivalently, often endorsing authenticity and diversity while feeling constrained by normative expectations. We propose a post-digital literacy framework to conceptualise girls’ critically engagements with influence as part of everyday life, highlighting implications for education and digital practice.
{"title":"‘Influence’ in the (post-)digital age: Girls’ experiences of online influencer culture","authors":"Emily Setty, Robyn Muir, Rosie Macpherson","doi":"10.1177/14614448251392918","DOIUrl":"https://doi.org/10.1177/14614448251392918","url":null,"abstract":"This paper examines how girls aged 9–15 engage with online influencer culture, focusing on interplays between digital and non-digital normative ecologies. Drawing on school-based workshops, we explore tensions between authenticity, normative ideals and self-presentation in girls’ interactions with influencers. Participants expressed agency in content consumption alongside pressures to conform, shaped by social interactions online and offline. We argue that influencer culture perpetuates dominant femininity norms through reciprocal dynamics between influencers and audiences. Girls navigated this terrain ambivalently, often endorsing authenticity and diversity while feeling constrained by normative expectations. We propose a post-digital literacy framework to conceptualise girls’ critically engagements with influence as part of everyday life, highlighting implications for education and digital practice.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"245 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145614146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-29DOI: 10.1177/14614448251395272
Elizabeth Dubois, Katharine Dommett
Recent interest in online political influencers has resulted in an array of competing definitions of who counts as a political influencer. Contending the value of a more porous and resilient definition able to recognise a spectrum of online political influence, we interrogate scholarship on opinion leadership, influentials, micro-celebrities, and social media influencer studies to reveal a range of identifying traits that can characterise different types of political influencers. Introducing a new approach to categorising these varied manifestations, we discuss six key attributes: personalised communication, compensation, audience size, political topical focus, control, and formal political role. Showing how this approach can be deployed to capture different manifestations of political influencers, we aim to build understanding that is resilient to change over time and that can support comparative empirical work.
{"title":"Reconceptualising political influencers: An alternative means of definition and analysis","authors":"Elizabeth Dubois, Katharine Dommett","doi":"10.1177/14614448251395272","DOIUrl":"https://doi.org/10.1177/14614448251395272","url":null,"abstract":"Recent interest in online political influencers has resulted in an array of competing definitions of who counts as a political influencer. Contending the value of a more porous and resilient definition able to recognise a spectrum of online political influence, we interrogate scholarship on opinion leadership, influentials, micro-celebrities, and social media influencer studies to reveal a range of identifying traits that can characterise different types of political influencers. Introducing a new approach to categorising these varied manifestations, we discuss six key attributes: personalised communication, compensation, audience size, political topical focus, control, and formal political role. Showing how this approach can be deployed to capture different manifestations of political influencers, we aim to build understanding that is resilient to change over time and that can support comparative empirical work.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"198200 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145614161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-28DOI: 10.1177/14614448251393375
Yossi David, Baruch Shomron
The ultra-Orthodox community is characterized by high levels of commitment to community and religion and insulation from the outside world. Leaving such a community resembles the process of migration, in which the individual encounters new cultures, norms, and behaviors. This presents challenges with integration and disaffiliated community members do indeed often lack the tools, skills, and knowledge to successfully integrate into their new societies. Through qualitative in-depth interviews, we examine the role of information communication technologies (ICTs) and media in the processes of disaffiliation from ultra-Orthodox communities. Findings reveal the enablers and constraints these individuals experience in their journey and shed light on the importance of media and ICTs in individuals’ attempts to build new lives outside the ultra-Orthodox community. This study contributes to a better understanding of the role of media and ICTs in the lives of people undergoing major life changes, such as disaffiliation from the ultra-Orthodox community.
{"title":"Utilizing information communication technologies (ICTs) during the process of disaffiliating from the ultra-Orthodox community","authors":"Yossi David, Baruch Shomron","doi":"10.1177/14614448251393375","DOIUrl":"https://doi.org/10.1177/14614448251393375","url":null,"abstract":"The ultra-Orthodox community is characterized by high levels of commitment to community and religion and insulation from the outside world. Leaving such a community resembles the process of migration, in which the individual encounters new cultures, norms, and behaviors. This presents challenges with integration and disaffiliated community members do indeed often lack the tools, skills, and knowledge to successfully integrate into their new societies. Through qualitative in-depth interviews, we examine the role of information communication technologies (ICTs) and media in the processes of disaffiliation from ultra-Orthodox communities. Findings reveal the enablers and constraints these individuals experience in their journey and shed light on the importance of media and ICTs in individuals’ attempts to build new lives outside the ultra-Orthodox community. This study contributes to a better understanding of the role of media and ICTs in the lives of people undergoing major life changes, such as disaffiliation from the ultra-Orthodox community.","PeriodicalId":19149,"journal":{"name":"New Media & Society","volume":"114 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2025-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145611079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}