Preface |
|
xii | |
Acknowledgments |
|
xvii | |
|
Part I Introduction and Infrastructure |
|
|
1 | (2) |
|
1 What Is Computer-Mediated Communication? |
|
|
3 | (2) |
|
CMC: Beyond Desktop Computers |
|
|
5 | (1) |
|
Situating CMC within the Communication Discipline |
|
|
6 | (2) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (4) |
|
Technology and Humans: Who Controls Whom? |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
Technology and Others: Beyond Our Focus |
|
|
11 | (2) |
|
|
13 | (1) |
|
2 The Technologies and Users of Computer-Mediated Communication |
|
|
14 | (23) |
|
|
15 | (3) |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (4) |
|
The Internet and the World Wide Web |
|
|
18 | (1) |
|
History of the World Wide Web |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
Web 3.0: The Semantic Web |
|
|
21 | (1) |
|
|
22 | (5) |
|
Factors Leading to Differences in Access |
|
|
23 | (1) |
|
|
23 | (1) |
|
Technical and Geopolitical Challenges |
|
|
24 | (1) |
|
|
24 | (1) |
|
Implications of Differences in Access |
|
|
25 | (1) |
|
Reconceptualizing the Digital Divide |
|
|
26 | (1) |
|
Getting Online to Communicate |
|
|
27 | (1) |
|
Two Approaches to Media Use |
|
|
28 | (5) |
|
Personal Use: Media Multiplexity |
|
|
29 | (1) |
|
Professional Use: Social Information Processing Model |
|
|
30 | (3) |
|
Using and Adapting Communication Technologies |
|
|
33 | (1) |
|
Concluding Users and Uses of CMC |
|
|
34 | (3) |
|
|
37 | (2) |
|
3 Impersonal Communication Theories of Computer-Mediated Communication |
|
|
39 | (12) |
|
|
40 | (3) |
|
|
41 | (1) |
|
Lack of Social Context Cues Hypothesis |
|
|
41 | (1) |
|
|
41 | (2) |
|
Media Richness Theory (MRT) |
|
|
43 | (3) |
|
Uncertainty and Equivocality |
|
|
43 | (1) |
|
Applying Media Richness Theory |
|
|
43 | (3) |
|
Computers as Social Actors (CASA) |
|
|
46 | (4) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
Concluding Impersonal Communication |
|
|
50 | (1) |
|
4 Interpersonal Communication Theories of Computer-Mediated Communication |
|
|
51 | (16) |
|
|
53 | (4) |
|
Theory of Electronic Propinquity |
|
|
54 | (2) |
|
Tests of Electronic Propinquity |
|
|
56 | (1) |
|
Social Information Processing Theory |
|
|
57 | (3) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Equaling Face-to-Face Closeness Online |
|
|
60 | (1) |
|
|
60 | (4) |
|
|
61 | (1) |
|
Sender's Selective Self-Presentation |
|
|
61 | (1) |
|
Receiver's Idealization of Sender |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Hyper-positive and Hyper-negative Impressions |
|
|
64 | (1) |
|
Masspersonal Communication |
|
|
64 | (2) |
|
Concluding Interpersonal CMC |
|
|
66 | (1) |
|
5 Group Communication Theories of Computer-Mediated Communication |
|
|
67 | (14) |
|
Social Identity Model of Deindividuation Effects |
|
|
69 | (6) |
|
|
69 | (2) |
|
|
71 | (1) |
|
Common-Bond and Common-Identity Groups |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (4) |
|
|
79 | (1) |
|
|
79 | (2) |
|
|
81 | (2) |
|
6 Organizational Computer-Mediated Communication |
|
|
83 | (2) |
|
Organization and Structure |
|
|
85 | (2) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
94 | (3) |
|
Organizations' Use of CMC to Communicate |
|
|
97 | (7) |
|
Communicating with External Individuals (B2C) |
|
|
97 | (1) |
|
Communicating with Other Organizations (B2B) |
|
|
98 | (4) |
|
Communicating with Future Organizational Members |
|
|
102 | (2) |
|
Concluding Organizational CMC |
|
|
104 | (2) |
|
7 Group Computer-Mediated Communication |
|
|
106 | (25) |
|
|
107 | (4) |
|
Activating Group (Rather than Individual) Processes |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (6) |
|
What Binds Us: Common-Bond and Common-Identity Groups |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (2) |
|
Categorizing Groups as Common-Bond or Common-Identity |
|
|
114 | (1) |
|
Temporally Bounded Groups: Ad Hoc and Persistent Groups |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Physical and Geographic Configuration of Online Groups |
|
|
117 | (2) |
|
|
119 | (3) |
|
Task Groups in Organizational Contexts |
|
|
119 | (2) |
|
Task Groups in Video Games |
|
|
121 | (1) |
|
|
122 | (7) |
|
|
122 | (1) |
|
Communicating Social Support Online |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
Informational Support Online |
|
|
126 | (2) |
|
Instrumental Support Online |
|
|
128 | (1) |
|
|
129 | (2) |
|
8 Interpersonal Computer-Mediated Communication |
|
|
131 | (27) |
|
|
132 | (10) |
|
Online Interpersonal Communication |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (2) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Paralinguistic Digital Affordances (PDAs) |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
140 | (1) |
|
Summarizing Paralinguistics |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (13) |
|
|
143 | (1) |
|
|
144 | (1) |
|
Getting to Know Each Other |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (2) |
|
|
155 | (1) |
|
Concluding Interpersonal CMC |
|
|
156 | (2) |
|
9 Intrapersonal Computer-Mediated Communication |
|
|
158 | (25) |
|
|
159 | (1) |
|
|
160 | (7) |
|
|
160 | (1) |
|
Implications of Identifiability in CMC |
|
|
160 | (2) |
|
|
162 | (1) |
|
Implications of Pseudonymity in CMC |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Implication of Anonymity in CMC |
|
|
166 | (1) |
|
|
167 | (2) |
|
|
167 | (2) |
|
|
169 | (4) |
|
|
170 | (1) |
|
|
171 | (1) |
|
Limitations and Boundaries of Identity Shift |
|
|
172 | (1) |
|
Summarizing Identity Shift |
|
|
173 | (1) |
|
|
173 | (8) |
|
|
173 | (1) |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (4) |
|
|
181 | (1) |
|
Concluding Intrapersonal CMC |
|
|
181 | (2) |
|
|
183 | (2) |
|
|
185 | (1) |
|
|
186 | (7) |
|
Internet-Based, Persistent, and Disentrained |
|
|
187 | (1) |
|
Masspersonal Communication |
|
|
188 | (1) |
|
|
189 | (1) |
|
Value from User-Generated Content |
|
|
190 | (1) |
|
|
190 | (3) |
|
|
193 | (1) |
|
Network and Networking Sites |
|
|
193 | (1) |
|
Connecting with Social Media |
|
|
194 | (5) |
|
Finding and Keeping in Touch with Others |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (1) |
|
Social Support in Social Media |
|
|
197 | (2) |
|
|
199 | (6) |
|
|
199 | (1) |
|
Reasons for Disclosing Personal Information |
|
|
199 | (3) |
|
Risks of Disclosing Personal Information |
|
|
202 | (2) |
|
Balancing the Rewards and Risks of Disclosing Personal Information |
|
|
204 | (1) |
|
|
205 | (2) |
|
|
207 | (2) |
|
|
209 | (26) |
|
|
210 | (5) |
|
|
210 | (1) |
|
Defining and Developing Social Norms Online |
|
|
210 | (1) |
|
|
211 | (2) |
|
Social Norms and Self-Presentation |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (3) |
|
Memes in and as a Form of CMC |
|
|
216 | (1) |
|
Memes as Persuasive Communication |
|
|
216 | (2) |
|
Advertising and Public Relations Online |
|
|
218 | (6) |
|
One-Way Advertising Online |
|
|
218 | (3) |
|
Dialogic Communication and Public Relations |
|
|
221 | (1) |
|
Dialogue with the Organization: Company-Consumer Interaction |
|
|
222 | (2) |
|
Dialogue among Users: Brand Communities |
|
|
224 | (1) |
|
|
224 | (9) |
|
Frequency of Deception Online |
|
|
225 | (1) |
|
Catfishing and Astroturfing |
|
|
226 | (1) |
|
|
226 | (1) |
|
Astroturfing/Crowdturfing |
|
|
227 | (1) |
|
Detecting Deceptive Presentations |
|
|
228 | (1) |
|
|
229 | (1) |
|
Warranting Identities Online |
|
|
230 | (3) |
|
Concluding Persuasion via CMC |
|
|
233 | (2) |
|
12 Politics via Computer-Mediated Communication |
|
|
235 | (29) |
|
Communicating about Politics |
|
|
237 | (11) |
|
Disinhibition and Ingroups |
|
|
237 | (1) |
|
Disinhibition and Flaming |
|
|
237 | (2) |
|
|
239 | (1) |
|
Political Activity: Engagement or Atrophy? |
|
|
240 | (1) |
|
|
240 | (2) |
|
|
242 | (2) |
|
Social Media: Bubbles or Bridges? |
|
|
244 | (1) |
|
Polarizing Political Bubbles |
|
|
244 | (3) |
|
|
247 | (1) |
|
Does CMC Bubble or Bridge? |
|
|
247 | (1) |
|
Communicating with Politicians |
|
|
248 | (3) |
|
Upward Communication and Direct Interaction |
|
|
248 | (2) |
|
|
250 | (1) |
|
Communicating with Constituents |
|
|
251 | (11) |
|
Politicians Communicating with Constituents |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (5) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (2) |
|
The Globalization of Local Politics |
|
|
260 | (2) |
|
Concluding Politics via CMC |
|
|
262 | (2) |
|
13 The Future of Computer-Mediated Communication |
|
|
264 | (23) |
|
Changes Just Over the Horizon |
|
|
265 | (6) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (2) |
|
|
269 | (1) |
|
|
269 | (2) |
|
The Perils for Future CMC |
|
|
271 | (8) |
|
|
271 | (1) |
|
First-Level Digital Divide |
|
|
271 | (1) |
|
Second-Level Digital Divide |
|
|
272 | (2) |
|
Third-Level Digital Divide |
|
|
274 | (1) |
|
|
275 | (4) |
|
The Promises for Future CMC |
|
|
279 | (6) |
|
Increasing Access to Information and Education |
|
|
279 | (1) |
|
Collaborative Knowledge Generation |
|
|
280 | (1) |
|
Massive Open Online Courses (MOOCs) |
|
|
280 | (2) |
|
|
282 | (1) |
|
Time and Space Compression |
|
|
282 | (1) |
|
No Longer Constrained by Offline/Physical Traits |
|
|
283 | (1) |
|
|
283 | (2) |
|
Concluding the Future of CMC |
|
|
285 | (2) |
Glossary |
|
287 | (6) |
References |
|
293 | (30) |
Index |
|
323 | |