Griffiths, M, Light, BA and Mcgarrie, RE 2008, Antisocial behaviour orders: Unanticipated directions in social network site development , in: 16th European Conference in Information Systems,, 09-11 June 2008, University of Galway, Ireland,.
- Accepted Version
Download (359kB) | Preview
Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we shed light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis, we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments, are subject to interpretation via their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.
|Item Type:||Conference or Workshop Item (Paper)|
|Uncontrolled Keywords:||Social Network, Antisocial Behaviour, Online Networks, Online Communities, young people|
|Themes:||Subjects / Themes > H Social Sciences
Subjects / Themes > T Technology > T Technology (General)
Subjects outside of the University Themes
|Schools:||Schools > Salford Business School > Salford Business School Research Centre|
|Depositing User:||Dr Marie Griffiths|
|Date Deposited:||02 Dec 2010 11:39|
|Last Modified:||03 Nov 2016 13:27|
|References:||Adam, A. (2005). Gender, Ethics and Information Technology. Basingstoke, Palgrave Macmillan. Bahney, A. (2006). "Don't Talk to Invisible Strangers." New York Times http://www.nytimes.com/2006/03/09/fashion/thursdaystyles/09parents.html, Accessed: 26 November 2007. Bigge, R. (2006). "The Cost of (Anti-)Social Networks: Identity, Agency and Neo-luddites." First Monday 11(12)www.firstmonday.org, Accessed:22 November 2007. boyd, d. m. and N. Ellison, B. (2007). "Social Network Sites: Definition, History and Scholarship." Journal of Computer-Mediated Communication 13(1)http://jcmc.indiana.edu/, boyd, d. m., D. Finkelhor, et al. (2007). "Just The Facts About Online Youth Victimization: Researchers Present the Facts and Debunk Myths, Internet Caucus Advisory Committee, 5 March." http://www.netcaucus.org/events/2007/youth/20070503transcript.pdf, Accessed: 22 November 2007. Byron, T. (2008). Safer Children in a Digital World: The Report of the Bryon Review, Children and New Technology, accessed 27/04/08, available at www.dcsf.gov.uk/byronreview Carter, D. (2005). "Living in Virtual Communities: An Ethnography of Human Relationships in Cyberspace." Information Communication and Society 8(2): 148-167. Ellison, N., B., B. Steinfield, et al. (2007). The Benefits of Facebook "Friends": Exploring the Relationship Between College Students' Use of Online Social Networks and Social Capital. Journal of Computer-Mediated Communication. 12: Sic. Fleck, J. (1994). "Learning by Trying: The Implementation of Configurational Technology." Research Policy 23(6): 637-652. Fletcher, G. and B. Light (2007). Gaydar on the Radar: Sexualities, Technologies and Cultures. Paper Presented at The Society for Social Studies of Science (4S) Annual Conference Montreal, Canada. Franz, C. R. and D. Robey (1984). "An Investigation of User-Led System Design: Rational and Political Perspectives." Communications of the Association for Computing Machinery 27(12): 1202-1209. Gennaro, C. D. and W. H. Dutton (2007). "Reconfiguring Friendships: Social relationships and the Internet." Information Communication and Society 10(5): 591 - 618. Glasner, J. (2006). "Antisocial Networking Gets Hip." Wiredwww.wired.com/print/science/discoveries/news/2006/04/70557, Accessed:22 November 2007. Haddon, L. (2006). "The Contribution of Domestication Research to In-Home Computing and Media Consumption." The Information Society 22(4): 195 - 203. Haddon, L. (2007). "Roger Silverstone's legacies: domestication." New Media and Society 9(1): 25- 33. Hampton, K. (2004). Networked Sociability Online, Off-line. The Networked Society: A Cross Cultural Perspective. M. Castells. Cheltenham, Edward Elgar Publishing Limited: 217-232. Haughey, M. (2003). "Second Life Residents To Own Digital Creations." http://creativecommons.org/press-releases/entry/3906, Accessed: 21 October 2007. Hine, C. (2000). Virtual Ethnography. London, Sage. Home Office (2007). "Anti-Social Behaviour." http://www.homeoffice.gov.uk/anti-socialbehaviour/ what-is-asb/?version=4, Accessed: 22 November 2007. Johnson, D. (1997). "Ethics Online." Communications of the ACM 40(1): 60-65. Larsen, M. C. (2007). Understanding Social Networking: On Young People's Construction and Coconstruction of Identity Online. Paper Presented at The Society for Social Studies of Science (4S) Annual Conference Montreal, Canada. Light, B. (2007). "Introducing Masculinity Studies to Information Systems Research: the Case of Gaydar." European Journal of Information Systems 16(5): 658-665. Livia, A. (2002). "Public and Clandestine: Gay Men's Pseudonyms on the French Minitel." Sexualities 5(2): 201-217. Markus, M. L. (1983). "Power, Politics, and MIS Implementation." Communications of the Association for Computing Machinery 26(6): 430-444. Markus, M. L. and N. BjØrn-Andersen (1987). "Power Over Users: Its Exercise By System Professionals." Communications of the Association for Computing Machinery 30(6): 498-504. Mesch, G. S. and I. Talmud (2007). "Editorial Comment: e-Relationships – the blurring and reconfiguration of offline and online social boundaries." Information Communication and Society 10(5): 585 - 589. Mlcakova, A. and E. A. Whitley (2004). "Configuring peer–to–peer software: An empirical study of how users react to the regulatory features of software." European Journal of Information Systems 13(2): 95-102. Nakamura, L. (2002). Cybertypes: Race Ethnicity and Identity on the Internet. London, Routledge. Oates, B. (2006). "New Frontiers for Information Systems Research: Computer Art as an Information System." European Journal of Information Systems 15(6): 617-626. Raleigh, N. C. (2007). Officials: 29,000 Registered Sex Offenders on MySpace. Fox News.com. Romm, C. and N. Pliskin (1999). "The Office Tyrant - Social Control Through E-mail." Information Technology and People 12(1): 27-43. Rymaszewski, M., W. J. Au, et al. (2007). Second Life: The Official Guide. Hoboken, New Jersey, John Wiley & Sons, Inc. Spitz, D. and S. D. Hunter (2005). "Contested Codes: The Social Construction of Napster." The Information Society 21(4): 169-180. Stewart, J. and R. Williams (2005). The Wrong Trousers? Beyond the Design Fallacy: Social Learning and the User. User Involvement in Innovation Processes: Strategies and Limitations from a Socio-Technical Perspective. H. Rohracher. Wien, Profil: 39-71. Sulake "Habbo Where Else?," http://www.sulake.com/habbo/?navi=2, 2008b, Accessed: 19 February:2008. Turnage, A. K. (2007). "Email Flaming Behaviors and Organizational Conflict." Journal of Computer- Mediated Communication 13(1)http://jcmc.indiana.edu, Vox, D. (2007). "Homophobic Hackers Attack Gay Gaming Site." www.gaywired.com, Accessed: 24 August 2007.|
Actions (login required)
|Edit record (repository staff only)|