CMN 172 Final Cumulative Exam - Dr. Brunner, UC Davis

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Study of Online Surveillance

- How common is online surveillance on SNS Study: - 65% of college-aged people who use SNS regularly engage in online surveillance - very common! - doesn't have to be creepy, may just be learning info

CMC Deception Mirrors Face-to-Face Deception

- Identity-based deception is common in CMCs Chat Room Study: - deception was common and people lied about identity characteristics - it was mostly identity concealment

Face-to-Face Disclosure in Different Cultures

- Individualist cultures use more face-to-face disclosure - Collectivist cultures use disclose less and use less depth and breadth

Deception and CMC Channels

- Receivers found liars more credible when the liars use semi-synchronous CMCs compared to asynchronous CMCs - we can detect deception easier when it happens over asynchronous channels - people often use text to lie cause it has less cues - but you're actually more likely to get away with lies over Zoom compared to lies over text - Social Distance Hypothesis

Why Do People Catfish?

- Revenge - Loneliness - Lower self-esteem - Attachment style - anxious = more likely to be victim and the perpetrator of catfishing - anxious people crave intimacy but fear rejection - avoidant people are independent and fear intimacy

History of SNS (part 2)

- SNS becomes mainstream MySpace: - first SNS that could edit themes, design - turned the online space into a multimedia platform Facebook: - first SNS that had a Feed/Stream, but people hated it - used to require a .edu email, that changed tho Twitter/X: - first SNS that was completely mobile, could send and receive tweets as texts on your phone Insta: - first SNS that was focused on sharing photos

CMCs Help Us Literally Communicate with Other Cultures

- Study: - students staying abroad in Turkey, communicated using SNS - found that SNS helped them become aware of Turkey's news and culture and connect with other people there

Social Media

- a form of CMC that is internet-based, disentrained, and persistent channels of masspersonal communication - has to produce asynchronous interactions - facilitates perceptions of interactions among users - derives value primarily from user-generated content - has "reach" - is interactive and social - provides special affordances

Culture

- a learned system of meanings that fosters a particular sense of shared identity-hood and community-hood among its group members - our frame of reference/ the way we view the world - ex: digital divide, new digital divide

Social Networking Sites

- a subclass of social media - SNS is always Social Media, but social media is not always sns

Problematic Online Habits

- a.k.a. internet addiction - online social activity predicts habit strength - people are drawn to interactive online spaces - More interactive social activity = More chance of developing an online habit

Cultural Competence

- ability to evaluate other cultures by first evaluating my own culture

Curvilinear Curve of Detecting Deception

- acquaintances are the best at lie detection - people close to us give in to the truth bias - people we don't know at all have no baseline for our behavior - acquaintances are the best cause they have a baseline of our behavior but they don't have truth bias

Intercultural Relationships

- any relationship involving people from 2 different cultures - almost all of our relationships are intercultural - these cultural differences impact the communication, which makes it intercultural communication - cultures could be anything, like sports, music, ethnicity, food, academics, anything

Data on Cyberbulling

- at least 48% of adolescents have reported being victims - but this number is too low cause it goes under reported - girls are more likely to be victims

Profile Element of SNS (#1)

- audience-faced digital portrait for each user - photos, bio, background images like a banner, status updates - involves self-presentation - capitalizes on affordances of asynchronicity and editability - "Challenge of Authenticity"

Challenge of Authenticity

- balancing act of self-presentation - ex: ideal self vs. actual self - can be mitigated by interacting online with people we met in-person

Brunner's Study on Fitspirations + Thinspirations (part 2)

- both hypotheses were supported RESULTS: - more fitspirations seen = more negative body talk - more social comparisons = more negative body talk - if low social comparison = frequency of body talk does not change based on seeing fitspirations - if high social comparison and see lots of fitspirations = tons of negative body talk - if see fitspirations frequently and have high social comparison = more negative body talk main idea: - careful of what you post, cause you gotta put that where people wanna see it

Interpersonal Deficits + Online Habits

- certain things make us more likely to develop problematic online habits Less social skill = More likely to develop - can capitalize on editability - will do most of comm online Less emotional intelligence = More likely - people are clearer about their emotions over CMCs (ex: "haha, so funny") - less cog effort and more explicitness More attachment insecurity = More Likely - Anxious = More Likely - Avoidant = More Likely More F.O.M.O. = More Likely - using online comm gives people the intimacy and belonging they crave

Super Apps

- closed ecosystem of many apps, contains tons of applications within the app, can do literally everything - one app can do it all - ex: WeChat - "Mini Programs": - all the applications within the super app - ex: healthcare, food delivery, payment, stocks, transportation, book hotels, pay bills, movie tickets, anything - ex: 'we-doctor' Benefits: - convenience Drawbacks: - hacking concerns, if crashes you literally can't do anything

Forming Intercultural Relationships Online

- culture comes with us into our CMCs, influences out interactions SIPT Theory and Hyperpersonal Theory: - the reduced cues of CMCs help intercultural relationships develop, or can hurt them: - help: cog reallocation, visual anonymity, less gating features - hurt: cultural things like sarcasm may be misunderstood

Interpersonal Deception Theory (Burgoon, 1996)

- deceivers will look for indications that a receiver is suspicious - receivers will look for indications that others are deceiving them - detecting suspicions is easier and less socially costly than detecting lies - calling someone out on their lies is socially costly and possibly inappropriate - receivers show suspicion and the deceivers then modify their behavior to be less suspicious - the deceivers and receivers each modify their behavior based on the other person's behavior

Deception

- deliberately inducing in another person a belief that you know to be false - requires intent to lie

Globalization

- expansion and intensification of social relations and consciousness across world-time and world-space - like creating a world market - global exchange of goods and info - if I want to do international business, I need to communicate effectively - CMC brings cultures together, not just for business

Stream Element of SNS (#3)

- feed/recent news display of followed accounts - associated with passive SNS use cause you don't have to post, can just look - relies on asynchronicity, can see their posts a while after they post them - creates social comparisons - "Social Comparison Theory" - Upward Social Comparison: - they're better - Downward Social Comparison: - i'm better

Duping Delight

- feeling happy when you get away with lying - can result in micro-expressions of happiness while talking about sad shit

Copresent Device Use

- having a FtF interaction but our cellphone is present too - ex: texting someone else while having a FtF conversation - ex: "Fubbing" - can have a negative impact on relationships

Mere Presence Hypothesis

- just having your phone out and visible can diminish the quality of the conversation and lower the impressions of the partner, even if you're not using the phone Study w/ Short Convo: - phone in view = lower quality of convo, less closeness Study w/ Casual or Important Convo: - more negative impact for phone presence during important conversations Study w/ If You Remember if the Phone was Out: - if can't remember = no effect on convo - if can remember = lowers convo quality

Cyberbullying

- most often with adolescents' - most victims and perpetrators are underage - deliberate and repeated aggressive activities inflicted over CMCs

Online Privacy

- most people are aware of the need for online privacy - ex: everyone knows someone who got in trouble for underage drinking photos or other stuff

Message Element of SNS (#4)

- mostly ignored by researchers cause we've had messaging for a while, but now it's on SNS - emphasis on 1-1 direct communication - Can Replace Texts: - more convenient on SNS - can message them w/o phone # - can share lightweight, builds rela - only need wifi, no cell service - Provides Social Connectedness: - anywhere, anytime - always on, always on us - increased feelings of social inclusion - Creates Opportunity for Distraction - static - takes longer for convos to happen compares to FtF - can turn into problematic online habits - ex: texting while driving

Data on How Difficult it is to Detect Deception

- on average, people are 54% accurate in detecting lies - most people have a ton of (misplaced) confidence in their lie-detecting abilities - when CMC + high stakes, we suck at detecting deception cause they will take more time to craft a believable lie - on average, over CMCs, people are 8-20% accurate in detecting deception

Problematic Internet Use

- online behavior that causes problems offline - maladaptive cognitions and behaviors involving internet use that result in negative academic, professional, and social consequences - ex: compulsive behaviors, stalking, etc

CMCs Help with Adaptation

- people adjust to new cultures better when they use CMCs Study: - asian students studying abroad in america - CMCs helped them get adjusted to american life Study: - reducing uncertainty (how do i get around, what do i eat?) - as use of CMCs increased, uncertainty decreased

3rd-Person Effect

- people are aware, but we suck at being knowledgeable about privacy - cause it'll never happen to me

Global Village

- people are becoming more connected throughout the world with CMCs - people are exposed to more cultures through CMCs - more opportunities for intercultural comm

Social Comparison Theory

- people evaluate their opinions and abilities by comparing them to the opinions and abilities of others

Third Culture

- people from 2 cultures come together and create something new - ex: new social media app: - no culture established yet - first users create the culture based on adding pieces from each other culture

Privacy Paradox

- people who are really concerned about privacy will STILL disclose tons of info Study: - used semi-structured interviews, found that the participants rated themselves a 4/5 for concernedness about privacy

Boundary Turbulence

- people who you did not grant access to now have access to your info

Warranting Principle

- pertains to the perceived legitimacy and validity of info seen about another person online - in virtual environments, info that is easily manipulated has much less warranting value - ex: bio info, altered photos, etc - higher likelihood that it is false info - we are more likely to trust info that is harder to falsify - ex: degrees, links to UC websites - higher warranting value - more likely to be true - Self-Generated content holds less warranting value than Other-Generated content - Self-Generated = bio info, posts, status updates - Other-Generated = comments, other people talking about your traits

Thinspirations

- photos/videos/post of people getting thin and losing weight, not really getting fit but more about losing fat

Fitspirations

- photos/videos/post of people working out, getting fit, being smart, being inspiring

Consequences of Problematic Online Habits

- problematic online habits hurt relationships More online habit strength: = less relational closeness = more distrust in romantic relationships (cause less time spent with them, might think you're cheating) = less passion towards partner = more feelings of exclusion = less maintenance behaviors

Recalibration

- re-establishing rules - may result in dissolving the relationship - happens as a consequence of boundary conditions

Communication Privacy Management Theory

- rooted in private interpersonal communication - main assumption = - we experience a dialectical tension between revealing and concealing

Catfishing

- scammer gets you to trust them by using a fake account and then asks for $$$ - 25% of women admit to being a catfish - 38% of men admit to being a catfish - Men are more likely to catfish - more than 50% of the US admit to catfishing - ex: Manti Te'o Catfishing Incident - affordances of editability (lying) and persistence (catching them in the lie) are important here

New Digital Divide

- some people can't afford expensive devices - ex: certain apps are only on apple watch, apple watches are expensive, need a lot of money to be part of this culture

Digital Divide

- some people can't afford tech - so, they are not part of the culture of people that have tech - ex: need a computer or device to access facebook

Catalyst Criteria

- sudden changes in our situation that changes our willingness to share info - ex: get a gf-->share info

Adaptation

- the process of, and time that it takes, for a person to integrate into a new culture - this is about me feeling comfy in the new culture, not about them accepting me - CMCs help here cause I can learn about the culture online and connect with people from that culture online without gating features

Network Element of SNS (#2)

- this is the friends/contact/followers list - catalogue of all out connections and networks, like an address book - ability to traverse your contacts list, also you can prevent others from seeing my contacts list - can involve friending/unfriending/muting - 1-way vs. 2-way connections - involves "Social Mobilization" - Loneliness: - because of collapsed context, cause even if I do post, they'll just give it a thumbs up and not care

Cyberstalking

- threatening behavior and unwanted advances directed towards others using CMCs - cyberstalkers can do everything through CMCs - there's a lack of consensus - anywhere between 6.5% and 41% of people report being victims of cyberstalking - could be because the stalking was covert, or it could have gone unreported

Obsessive Relational Intrusion

- type of stalking: still unwanted, still creates fear - want to increase intimacy with them - ORI is always stalking, but stalking isn't always ORI

Core Criteria

- typical ways of sharing/not sharing info

Online Surveillance

- using tech like SNS for uncertainty-reduction and ongoing awareness of someone's life Geospatial Activities: - looking for info about their physical location - ex: posts and SNS techs that tell me where you are Communication Activities: - look at photos and their info to learn more about who they are - helps reduce uncertainty for initial and ongoing interactions - ex: dating apps that are linked to SNS allow me to see who they hang out with and what they like

Social Mobilization

- we can connect with our friends very quickly and mobilize them if we need to - ex: status update requesting help from everyone

CMC Helps Create a New Culture

- we can create new communities - ex: inside jokes for Tiktok users, special jargon for League of Legends

Online Audience is "Socially Translucent"

- we don't have a good idea of who our audience is - posting on SNS is like talking to someone behind a curtain

CMCs Help with Intercultural Relationships

- what is the impact of using blogs? Study: - spanish class, some abroad - class had pen pals and used blogs to communicate - positive effects! Results: - more blog use = more ability to form intercultural relationships - more blog use = more cultural competence

Intercultural Communication

- when a person from one culture interacts with a person from another culture - culture can heavily impact the way we interact -it's only intercultural comm if the cultural differences actually affect the comm

Counter-Measures

- when liars match the posture and behaviors of the people they're lying to - helps build rapport and sell the lie

Social Distance Hypothesis

- when we lie, it makes us uncomfortable - we feel more comfortable when we're psychologically separated from the situation - if we lie over CMCs, we feel psychologically separated from the circumstances, so we prefer to use CMCs to lie - but actually, we can detect lies better over CMCs, so this is the opposite of what we want to do if we actually want to sell the lie - if we actually want to sell the lie we would lie FtF, but that makes us uncomfy so we don't want to do it

Astroturfing

- when you work for a business and give it a great online review - pretend to be a customer

Identity

- who you are as a person - rooted in our culture

4-Factor Model of Deception

1) Attempted Control - deceivers will try to control their verbal + nonverbal behavior - if comm looks to perfect/fluent, could be indicative of deception 2) Felt Emotion - people who lie may experience anxiety and fear of getting caught - truth-tellers also experience anxiety of not being believed - ex: Duping Delight - when the emotions don't fit the circumstances, could be deception 3) Physiological Arousal - changes in breathing, heartbeat, pupil dilation, skin conductance - if you have a baseline of their behavior you can catch this easier 4) Cognitive Processing - leakage may come from inability to remember all the details of a lie - longer and more detailed lies that are complete fabrication are easy to catch

4 Qualifications of Stalking

1) Can't occur over a single episode - has to be repeated behavior - this is similar to cyberbullying 2) Is unwanted - person being stalked has to make it clear that they don't like it 3) Cannot serve legitimate purposes - ex: the exterminator has to come over to spray multiple times, that's not stalking cause it's a legit reason 4) Accumulated behavior has to induce fear in the victim - a reasonable person could understand how it creates fear

Why We Suck At Lie-Detection

1) Competent Liars Alter Their Behavior - they modify their behavior when detecting suspicion to lower that suspicion and sell the lie - "Counter-Measures" 2) No Pinocchio Nose - there is no consistent, reliable behavior that we can look to to know that someone is lying 3) Truth Bias - we have an expectation that people close to us will be truthful to us - that lets them lie easier to us

3 Types of Online Surveillance

1) Covert - don't want them to know we're checking up on them - ex: modern family episode where the mom has a fake acct to learn about daughter's acct 2) Obsessive - ruminating feelings cause increasing monitoring of their behavior - can be covert or overt 3) Problematic - now we learn undesirable info that makes us upset (undesirable to the spy finding shit out) - often leads to direct confrontation or jeopardizing the relationship - ex: finding out my friends went out to dinner without me

4 Types of Cyberstalking

1) Cyberstalking-Only - only use online contexts/CMCs - only 4% of cyberstalkers 2) Cyberspace-to-Realspace - stalking begins online but then they start talking you in-person - only 5% of cyberstalkers 3) Cyberspace-and-Realspace - stalking me both online and in-person - 38% of cyberstalkers 4) Realspace-Only - only stalking me in-person - most! 50% of cyberstalkers

3 Types of False Online Information

1) Fake News - happens a lot now with AI 2) Rumors - tabloids, lies in media 3) Fake Reviewers - fake online reviews - Astro-Turfing

7 Types of Cyberbullying

1) Flaming - being aggressive, hostile 2) Harassment - constant hate messaging 3) Outing + Trickery - act nice to get you to self-disclose, then spread your secrets to everyone 4) Exclusion - excluding someone from a group 5) Impersonation - can happen through catfishing - can happen through pretending to be the victim and bullying others 6) Cyber-stalking 7) Sexting - ex: revenge porn - distributing someone's sexually explicit images to others w/o consent

8 Types of Stalking + ORI

1) Hyper-Intimacy Behaviors - creepy and cringe stuff - ex: sending them 12 dozen roses and spamming them with messages of love 2) Interactional Contact - "accidentally" running into them when I knew they would be there - ex: I see on snap that you're at in-n-out, I go there and just happen to see you 3) Surveillance - lurking, finding out their info 4) Invasion of Intrusion - trespassing, breaking into their home/SNS 5) Harassment + Intimidation - overly persistent attempts to contact them 6) Possibility of Harm - threatening to harm us or anyone 7) Aggression - literally harming us or anyone, also property damage 8) Proxy Pursuit - involving others to help stalk them

Types of Digital Deception

1) Identity-Based Deception (i) Identity Concealment - aspects of our identity are omitted or altered - ex: presenting false age, lie about height and $ status (ii) Identity Theft - take someone else's identity and present it as our own - ex: catfishing (iii) Identity Forgery - take lots of info from many sources to craft a brand new identity - ex: spam, phishing, robocalls 2) Message-Based Deception - lying about the content of our messages, also they know my real identity - ex: "I got a flat tire" when I don't

5 Principles of Communication Privacy Management Theory

1) Individuals equate private information with personal ownership. - even if it isn't tangible we still feel like we own it 2) Because we believe we own it, we believe that we have the right to control the flow of our info 3) We develop and use privacy rules to control the flow of info - ex: saying "don't tell anyone" - Core Criteria - Catalyst Criteria 4) Info moves from individual to collective ownership - share info--> they're a co-owner of that info now and can do whatever 5) If owners and co-owners do not coordinate the privacy rules to regulate info flow, disruption will occur and boundary turbulence will result. - Boundary Turbulence - Recalibration

Strategies for Privacy Management on SNS

1) Post Nothing 2) Scrubbing - deleting previous posts 3) Compartmentalizing - having different accounts for different audiences 4) Conversant Privacy Practices - telling them not to violate my privacy - ex: mom don't share my baby pics 5) Targeting the Lowest Common Denominator - only post things that I would share with the people I connect least with in my network 6) Assume the Vulnerabilities - be aware that nothing is fully private and accept it cause we want to use SNS

Reasons for Privacy Paradox (from study)

1) Privacy Calculus - consider the risks versus the rewards of sharing private info - ex: giving private info for $$$ discounts 2) Optimism Bias - pretty much the 3rd-person effect - it won't happen to me 3) Bandwagon Effect - everyone else is chill to share their info, so i will be too 4) Sunk-Cost Fallacy - ive already uploaded so much info, sharing more info or not won't change anything - ex: i already have snap and insta, might as well get FB and twitter 5) Trust - i trust this company/platform/SNS - in the study, everyone except for 1 person listed 'trust' as a reason

Elements of SNS

1) Profile - ex: FB, insta, let us post bio info 2) Friend's/Followers/Contact List - can traverse our network with this 3) Stream/Feed - personalized user-generated content stream 4) Direct Messages

4 Motivations for Cyberstalking

1) Rejection - i ask them out, they say no, i get upset, so i decide to stalk them - most common reason for cyberstalking - 75% of cyberstalkers 2) Resentment - feeling bitter towards them - rejection can lead to resentment 3) Intimacy-Seeking - i want a relationship with them, so i stalk them to find out more about what they like, so when i do talk to them i know the right things to say 4) Predatory - some people are literally just horrible people and want to hurt you

2 Motives for Deception

1) Self-Serving - telling a lie to protect ourselves - 20% of all lies are self-serving - tend to be for high-stakes situation College Student Study: - found that 85.9% of the serious high-stakes lies were self-serving 2) Other-Serving - telling a lie to help someone else - 80% of all lies are other-serving - are still received poorly if caught - ex: white lie, etc

3 Types of Private Info that People are Concerned About

1) Social Privacy - losing control of their personal info - personal info being age, height, etc 2) Institutional Privacy - organizations having access to their info - organizations may share your info among themselves 3) Security - unauthorized access to their personal information - like an account getting hacked

2 Types of Luring

1) Spamming - not really nefarious - ex: junk emails, spam emails 2) Phishing - very nefarious/dangerous - ex: trying to obtain sensitive info - ex: bank info, passwords, SSI#

Effects of Cyberbullying

Distressing Harassment: - not trivial, has potential to inflict serious harm - causes anxiety, depression, lower self-esteem - follows us everywhere cause online Risk + Demographic Factors: - peaks around 13-14 years old Likely victims: - females - adolescents who are questioning their sexuality - racial minorities - overweight/fat people - religious minorities

High Context vs. Low Context Cultures

High Context: - see more information in nonverbals, implied information, more reading between the lines, context is really important Low Context: - verbal info is key, explicit meanings, direct, to the point

Brunner's Study on Fitspirations + Thinspirations (part 1)

Hypotheses: - expected (more) fitspirations to be associated with (more) negative body talk/fat talk - expected (more) social comparisons and (more) seeing fitspirations to be associated with (more) negative body talk Study: - undergrads, mostly women - asked them how often they see: - fit people/health posts - controlled for body satisfaction, exercise and eating habits, and SNS use

Envy vs. Jealously

Jealousy: - fear of losing what/who you already have Envy: - want something/someone that you don't have

How Culture Impacts CMC Use

Motivations: - Low-Context cultures are motivated to use CMCs for entertainment - High-Context cultures are motivated to use CMCs for social support and relationship maintenance Gratifications: - US and Korea both have the gratifications of social support and entertainment for CMC use - Korea uses CMCs more for social support more than US - US uses CMCs more for entertainment more than Korea

Darkside Perspective of Problematic Internet Use

Online behaviors have a range: - Moral --> Immoral - Functional --> Dysfunctional - this is about accomplishing things - Mundane --> Severe ex: Cyberbulling = immoral + functional (for the bully, dysfunctional for the victim) ex: checking phone = moral + dysfunctional

Main Affordance that is Important for Deception

Persistence - if we suspect others of deception, we can go back and check and maybe find proof - it's harder to remember lies told in person

Self- vs. Other- Initiated Device Use

Self-Initiated: - nothing prompts you, you just pull out your phone and use it Other-Initiated: - my phone rings or vibrates, prompting me to check it

History of SNS (part 1)

SixDegrees: - first real SNS LiveJournal: - first SNS to have 1-way connections, don't have to follow them for them to follow me Ryze: - first SNS to try to connect businesspeople and entrepreneurs - precursor to LinkedIn FriendSter: - wanted to compete with match.com, thought that friends of friends were better for romance than strangers - first mainstream popular SNS - was not ready to handle millions of users, crashed a lot - could only see people's profiles if we are less than 4 connections away - deleted real profiles while trying to stop catfishing

Choosing the Most Effective CMC for Cultures

Study: - based on Media Richness Theory - if more Cultural Differences and less Language Commonality, then you need Richer channels - if less Cultural Differences and more Language Commonality, then you can still be effective with Less Rich channels

Study on Self-Initiated vs. Other-Initiated Device Use

Study: - self condition = were given a secret cue from the researcher to pull out their phone - other condition = researcher had their phone number and sent a text to them Results: - More copresent phone use = less perceived conversation quality, less good impression of conversation partner - More self = more negative than other - More other = still annoying but it isn't their fault

Study on Why People Cyberbully (Erdur-Baker, 2019)

Study: - U+G theory survey with college students - students were cyberbullies who had bullied 2x within the last 6 months - almost half the sample had been both a victim and a perpetrator Results: - more online disinhibition = more entertainment motive - more moral disengagement = more revenge, harm, dominance motives - more narcissism = more dominance motive - more aggression = more harm and revenge motives Main thing: - cyberbullies are aware of their motivations, and know that they are choosing to be bullies

Study on Online Audience Size

Study: - how many people will see my 1 post? - underestimated the audience size as being only 27% of the actual audience size - how many would see post from month? - underestimated the audience size as being only 33% of the actual audience size - replicability can increase the audience size - ex: if a news outlet gets ahold of my post, then the audience increases to millions - 3rd-party apps increase audience size - "Silent Listeners" cause they're collecting our data in the background - Facebook Iceberg Model - we are only aware of 1/8 of our audience/data collectors

Study on Trends of SNS

Study: - 64% of US says SNS has a negative effect - nationally represented survey - 7/10 Americans report using SNS since 2016 - out of any SNS, most people use Youtube (83% of people use it) - ***come back to this, conflicting notes***

Study on Copresent Device Use

Study: - hypothesis = more proportion of convo where copresent device use happens will result in a shittier conversation - college student friends were together for 5 min before study was supposed to "start" but it had already started - were examined for phone behaviors during those 5 min Results: - 76% of the dyads couldn't go the whole 5 min without using their phone - more phone use = less quality of interaction - no phone use = more empathy, way more emotional connection

Fubbing

a.k.a. phone snubbing - ignoring someone who's trying to talk to you by being on your phone

Online Audience

Audience is Invisible - we don't know who sees our posts - lurkers can exist, persistence - Social Translucence Imagining the Audience: - we underestimate the size of our audience

Collectivistic vs. Individualistic Cultures

Collectivistic: - focused on the goals and needs of the group Individualistic: - focused on the goals an needs of me!


Set pelajaran terkait

Chapter 14: Statute of Frauds and Equitable Exceptions

View Set

Planning Quality Management (PMBOK Guide Sixth Edition)

View Set

PHYS 221 Multiple Choice Questions

View Set

ENV Science - Chapter 5 - Species Interactions, Ecological Succession, & Population Control

View Set

Math - Formules et autres merdes

View Set

Principles of Visual Communication: 3

View Set

ATI Dosage Calculation 2.0 Desired over Have-Injectable

View Set

Prep U Mastery Ch.66- Management of Patients with Neurologic Dysfunction

View Set

10B: It's said that peacock feathers are bad luck

View Set

Chapter 4- The Tissue Level of Organization (chapter questions)

View Set