Learn More
This paper investigates the uses of social networking site Facebook, and the gratifications users derive from those uses. In the first study, 137 users generated words or phrases to describe how they used Facebook, and what they enjoyed about their use. These phrases were coded into 46 items which were completed by 241 Facebook users in Study 2. Factor(More)
Candid self-disclosure is desirable for many behavioral science studies. Although there is ample evidence that self-disclosure is increased when people communicate or participate in research over the Internet, few studies have looked at ways of increasing this effect. In the present pilot study, participants were randomly allocated to either a condition in(More)
Formed on an analysis of design practices, the behaviour chain model stipulates that social network designer's ultimate aim is to encourage users to adopt the social network site by entering a phase of true commitment. During this phase, social network users are driven to connect to known or unknown others by engaging in instrumental uses that create value(More)
Two studies are presented that examine disclosure of sensitive information and personali-zation in Internet-based surveys. In the first study, the impact of a personalized salutation on two forms of non-disclosure to a sensitive personal question (salary level) is tested. The results revealed that a personalized salutation tends to increase levels of active(More)
Three studies investigated whether users' strategies for customising online avatars increase their self-focused attention, also known as private self-awareness. Study 1 showed that a high number of users adapt their avatars toreflect their own appearance. Study 2 demonstrated that users who perceive their avatars to be similar to their own appearance(More)
A growing body of research has been exploring the use of control mechanisms to address the privacy concerns raised by location-tracking technology. We report on a qualitative study of two family groups who used a custom-built tracking application for an extended period of time. Akin to sociological breaching experiments, the study focuses on the(More)