Documente Academic
Documente Profesional
Documente Cultură
While this comprises more than one theory, the idea central to them is that
human behavior is shaped by shared rules for social behavior. These norms can be
either descriptive or injunctive. The latter are moral obligations while the former are
indications of the behavior of others. So, for example, if many people indicate via Twitter
that they are going to engage in behaviors such as vaccination or taking medication,
this can create or consolidate a social norm. These norms are likely to be generated
within specific groups of users who share a social identity and are linked together in an
online network. Potentially then, whole groups of people can be identified who react
regarding issues such as health, disability and criminality. In regard to health, SRT
negotiated. Social media would be one area in which these are negotiated yet despite
its increasing prevalence, there appears to be little or no research looking at its role in
generating social representations. Yet social media may be used for example, to
perpetuate representations of health that focus on weight which may lead to harmful
dieting. While other research has fruitfully used SRT to explore how representations of
Given that all social media are dependent on users providing content, an
exchange theory was originated from sociology studies exploring exchange between
individuals or small groups (Emerson 1976). The theory mainly uses cost-benefit
with each other, how they form relationships and bonds, and how communities are
formed through communication exchanges (Homans 1958). The theory states that
individuals engage in behaviors they find rewarding and avoid behaviors that have too
high a cost. In other words, all social behavior is based on each actors subjective
or exchange with each other contingent on reciprocal actions from the other
through a microeconomic framework, though many times the rewards are not monetary
The theory was arguably best summarized by Homans (1958, p. 606) when he wrote:
Social behavior is an exchange of goods, material goods but also non-material ones,
such as the symbols of approval or prestige. Persons that give much to others try to get
much from them, and persons that get much from others are under pressure to give
much to them. This process of influence tends to work out at equilibrium to a balance in
the exchanges. For a person in an exchange, what he gives may be a cost to him, just
as what he gets may be a reward, and his behavior changes less as the difference of
reciprocity on the part of others; c) altruism; and d) direct reward. Given that
participation in the social media is not compensated, the first three reasons appear to
Travel blogs and social media sites have long recognized that there are far more people
have uploaded over 2 billion videos and audio tracks to the social media site since its
founding in 2005, the same site is accessed by more than 10 million unique daily
visitors indicating there are far more viewers than contributors. The Global Web Index
(2009) (TrendsStream Limited 2010; Li 2010), which tracks this phenomena, suggests
that users of social media can be segmented into four main groups. They are: (1)
watchers (79.8% of the US social media users), who consume content only to help with
their decision making; (2) sharers (61.2%), who upload and forward information to
others in order to help others and demonstrate knowledge; (3) commenters (36.2%),
who both review and rate products and comment on those who do in an effort to
participate and contribute; and (4) producers (24.2%), who create their own content in
an effort to express their identity and recognition. Framed in a social exchange theory,
watchers take but do not reciprocate from the exchange suggesting they consider the
cost of posting or commenting too high, or fear of offering their opinion or raising their
profile. Though obviously far more research is needed to test the validity of such
groupings, segmenting users as to their exchange behaviors has a certain level of face
validity. Given such a hierarchy of users based on their active exchanges, firms
attempting to leverage social media to their advantage should attempt to engage
consumers of all four segmentation levels. For watchers, the task is to first identify the
specific social media they use, what information they seek, and what makes it engaging,
in an effort to develop and position content that is relevant. The same strategy and
content should be useful as well for sharers. However, the tendency of sharers should
and Facebook forward links) as well as recognizing and rewarding the desired behavior.
Facebook's OpenGraph has allowed a user to "like" or "comment" on any content on the
web (Zukerberg 2010). Firms may find advantages in getting ahead of this trend by
proactively adding a commenting feature to each of their webpages. By doing so, they
can directly manage the content of such comments which in effect will discourage
spammers and trolls. Lastly, in regards to producers, attempts by firms to engage with
their customers who create unique platforms for their customers may produce dividends
at the brand or chain level. Publically recognizing such sites that are helpful to the firm
and increasing their visibility through search engine marketing are options.
Similar to social exchange theory, social penetration theory explains how human
exchange forms relationships (Altman and Taylor 1973). However, the latter focuses
more on the individual and dyadic levels while the former could explain behavior at
aggregated and organizational levels. Social exchange theory states that human beings
layers in an onion, one must disclose him or herself through the continuing process of
expose one's inner self and identity. It starts with public, visible, and superficial
relationship progresses, one starts to share his or her feelings; in the deepest level, one
will expose his or her goals, ambition, and beliefs (Altman et al. 1981).
In the social world online, we may be able to design social networks in a way to
disclosed to the public, while private and semi-private information could be confidential;
There might be ways to determine the levels of relationships from the mode and
frequencies of communication, which could be all tracked online easily through online
social media sites. A recent privacy lawsuit against Facebook highlighted the
importance following the layered rules of social penetration in order (Gaudin 2010).
quote "the media is the message" (McLuhan 1995). He argued that the media itself,
rather the actual content of the media, will transform people and society. The actual
messages people are communicating won't be any different on the new media; the
interactivity and frequency of new communication pattern will change our behavior
forever. Thus, the media's effects on society are much greater than the content of the
media. He separates media into "cool" media and "hot" media. The former one requires
a viewer to exert much effort and participation in understanding the content, such as
television, seminars, or cartoons; the latter refers to those media that enhance one
sense, so the viewers do not need to exert much effort, such as films, radio, and
If we use McLuhan's arguments, social media will transform the users not due to the
content it contains, but due to the mode of communication it entails. For example,
one can perform all the functions of Twitter through a blog service. However, it is exactly
its limiting factor which made Twitter more nimble and real-time. Many breaking news
stories were spread out on Twitter, such as China's Sichuan earthquake and Mumbai's
terrorist attack in 2008 (Parr 2009). As business managers and consumers, one needs
to realize the changing behavior due to the usage of new social media services and
use, which we call generalized Internet addiction (GIA), and a specific pathological
Internet use, for which we use the term specific Internet addiction (SIA). Davis argues
that GIA is frequently linked to communicative applications of the Internet and that a
lack of social support in real life and feelings of social isolation or loneliness are main
factors contributing to the development of GIA. Maladaptive cognitions about the world
in general and the own Internet use in particular may then intensify the overuse of the
Internet to distract from problems and negative mood (see also Caplan, 2002, 2005). In
contrast, for the overuse of certain Internet applications, for example, gambling sites or
Consequently, it is assumed that GIA is directly linked to the options the Internet itself
provides, while SIA can also be developed outside the Internet, but is aggravated by the
mediated by executive functions and prefrontal brain areas have not been addressed
individual to cognitively control the Internet use, even though negative consequences
related to the Internet overuse are experienced in the long run. These kinds of
conditioning processes are well-known for other forms of addiction and substance
dependency (e.g., Robinson and Berridge, 2000, 2001; Everitt and Robbins, 2006;
Robinson and Berridge, 2008; Loeber and Duka, 2009). We also argue that positive and
of GIA and SIA. Finally, we hypothesize that certain cognitions interact with control
expectancies about what the Internet can provide and what a person may expect from
using the Internet may be in a conflict with the individuals expectancies about potential
negative consequences in the short or the long run, which are associated with an
Internet overuse.
contribute to the development to either GIA or SIA (see Figure Figure1).1). For the
development and maintenance of GIA, we argue that the user has some needs and
goals and that these can be satisfied by using certain Internet applications. We also
(e.g., Whang et al., 2003; Yang et al., 2005) and dysfunctional personality facets, such
(Whang et al., 2003; Chak and Leung, 2004; Caplan, 2007; Ebeling-Witte et al., 2007;
Hardie and Tee, 2007; Thatcher et al., 2008; Kim and Davis, 2009) are predisposing
factors for developing a GIA. In addition, social cognitions, such as perceived social
isolation and a lack of social support offline are supposed to be related to GIA
(Morahan-Martin and Schumacher, 2003; Caplan, 2005). These associations have
we argue that Internet use expectancies play an important role. These expectancies
may involve anticipations of how the Internet can be helpful for distracting from
problems or escaping from reality, or more generally spoken for reducing negative
emotions. Those expectancies may also interact with the users general coping style
(e.g., to tend toward substance abuse to distract from problems) and self-regulation
capacities (Billieux and Van der Linden, 2012). When going online, the user receives
everyday-life. At the same time, the Internet use expectancies are positively reinforced,
because the Internet acted as anticipated (e.g., reducing feelings of emotional or social
loneliness). Given the strong reinforcing character of certain Internet applications, the
cognitive control about the Internet use becomes more effortful. This should be
particularly the case if Internet-related cues interfere with executive processes. We will
personal needs and goals in everyday-life. In (B), the proposed mechanisms ...
applications (SIA), we argue consistent with previous research and in accordance with
the model by Davis (2001) that psychopathological symptoms are particularly involved
(Brand et al., 2011; Kuss and Griffith, 2011; Pawlikowski and Brand, 2011; Laier et
al., 2013a; Pawlikowski et al., 2014). We also hypothesize that specific persons
predispositions increase the probability that an individual receives gratification from the
use of certain applications and overuses these applications again. One example for
Bancroft and Vukadinovic, 2004; Salisbury, 2008; Kafka, 2010), which makes it more
likely that an individual uses Internet pornography, because he/she anticipates sexual
arousal and gratification (Meerkerk et al., 2006; Young, 2008). We believe that the
expectancy that such Internet applications can satisfy certain desires increases the
likelihood that these Internet applications are used frequently, as assumed in addictive
behavior in general (Robinson and Berridge, 2000, 2003; Everitt and Robbins, 2006)
and that the individual can develop a loss of control over his/her use of such
applications and also the specific Internet use expectancies and the coping style are
reinforced positively. This has already been shown, for example for cybersex addiction
(Brand et al., 2011; Laier et al., 2013a) and is most likely also a mechanism for online
gaming (e.g., Tychsen et al., 2006; Yee, 2006). The more general psychopathological
Internet pornography) can be used to distract from problems in the real life or to avoid
negative feelings, such as loneliness or social isolation. The main arguments of our
In both conditions (GIA and SIA), the loss of control over the use of the Internet in
reinforcement. The question remains how these processes interact with higher-order
cognitive functions. For example, what are the mechanisms behind the behavior to use
the Internet again and again, although a person explicitly knows that he/she will
experience negative consequences in the long run? Do they have a myopia for the
future or is the reaction to the Internet-related stimuli so strong that they experience
et al., 1996; Anton, 1999; Childress et al., 1999; Tiffany and Conklin, 2000; Bonson et
al., 2002; Brody et al., 2002, 2007; Franken, 2003; Dom et al., 2005; Heinz et al., 2008;