Abstract
As social media increasingly mediate our relationships and social lives, individuals are becoming more connected and gaining social benefits. However, many are now experiencing online harassment. Avoiding or abandoning social media is one common tactic to cope with harassment. This chapter investigates the harassment-related motivations and concerns driving social media non-use, as well as the benefits and consequences that result from not using social media. This research sheds light on a previously underexplored type of non-user who faces social barriers to using social media (as opposed to functional barriers). This chapter explains how such individuals encounter social consequences whether they are on or off social media, resulting in a lose-lose situation that we term social disenfranchisement. Building on Wyatt’s framework and the risk-benefits framework, we introduce this previously unidentified category of non-use as an extension to the commonly used taxonomy and provide a cohesive theoretical framework within which to understand various types of non-use. We then analyze the phenomenon of online harassment from the perspective of this non-use framework. Addressing the concerns of socially disenfranchised non-users is of utmost importance in the fight against online harassment. As others are increasingly connected, they are increasingly left behind and even ostracized. This chapter therefore concludes by providing design recommendations to alleviate the negative social consequences currently endured by socially disenfranchised non-users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baumer EPS, Adams P, Khovanskaya VD, Liao TC, Smith ME, Schwanda Sosik V, Williams K (2013) Limiting, leaving, and (Re)Lapsing: an exploration of Facebook non-use practices and experiences. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, New York, NY, USA, pp 3257–3266. https://doi.org/10.1145/2470654.2466446
Baumer EPS, Ames MG, Burrell J, Brubaker JR, Dourish P (2015) Why study technology non-use? First Monday 20(11). https://doi.org/10.5210/fm.v20i11.6310
Baumer EPS, Guha S, Quan E, Mimno D, Gay GK (2015) Missing photos, suffering withdrawal, or finding freedom? how experiences of social media non-use influence the likelihood of reversion. Soc Media Soc 1(2). https://doi.org/10.1177/2056305115614851
Beran T, Li Q (2005) Cyber-harassment: a study of a new method for an old behavior. J Educ Comput Res 32(3):265–277. https://doi.org/10.2190/8YQM-B04H-PG4D-BLLH
Brubaker JR, Ananny M, Crawford K (2016) Departing glances: a sociotechnical account of leaving Grindr. New Media Soc 18(3):373–390. https://doi.org/10.1177/1461444814542311
Duggan M, Smith A (2014) Social media update 2013. Pew Research Center. http://www.pewinternet.org/2013/12/30/social-media-update-2013/
Ellison NB, Steinfield C, Lampe C (2007) The benefits of Facebook Friends: social capital and college students’ use of online social network sites. J Comput Mediated Commun 12(4):1143–1168. https://doi.org/10.1111/j.1083-6101.2007.00367.x
Greenwood S, Perrin A, Duggan M (2016) Social Media Update 2016. Pew Research Center. http://www.pewinternet.org/2016/11/11/social-media-update-2016/
Hinduja S, Patchin JW (2010) Bullying, cyberbullying, and suicide. Arch Suicide Res 14(3):206–221. https://doi.org/10.1080/13811118.2010.494133
Kantor K (2015) People You May Know. https://www.youtube.com/watch?v=LoyfunmYIpU
Kowalski RM, Giumetti GW, Schroeder AN, Lattanner MR (2014) Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol Bull 140(4):1073–1137. https://doi.org/10.1037/a0035618
Lampe C, Vitak J, Ellison N (2013) Users and nonusers: interactions between levels of adoption and social capital. In: Proceedings of the 2013 conference on computer supported cooperative work. ACM, New York, NY, USA, pp 809–820. https://doi.org/10.1145/2441776.2441867
Laufer RS, Proshansky HM, Wolfe M (1973) Some analytic dimensions of privacy. In: Küller R (ed) Proceedings of the lund conference on architectural psychology. Hutchinson & Ross, Lund, Sweden, Dowden
Laufer RS, Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional developmental theory. J Soc Issues 33(3):22–42. https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
Marwick A, Boyd D (2011) To see and be seen: celebrity practice on Twitter. Convergence 17(2):139–158. https://doi.org/10.1177/1354856510394539
Mishna F, Saini M, Solomon S (2009) Ongoing and online: children and youth’s perceptions of cyber bullying. Child Youth Serv Rev 31(12):1222–1228. https://doi.org/10.1016/j.childyouth.2009.05.004
Page X, Knijnenburg BP, Kobsa A (2013) FYI: communication style preferences underlie differences in location-sharing adoption and usage. In: Proceedings of the 2013 ACM international joint conference on pervasive and ubiquitous computing. ACM, New York, NY, USA, pp. 153–162. https://doi.org/10.1145/2493432.2493487
Page X, Wisniewski P, Knijnenburg B, Namara M (2018) Social media’s have-nots: an era of social disenfranchisement. Internet Res
Park N, Kee KF, Valenzuela S (2009) Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes. CyberPsychology Behav 12(6):729–733. https://doi.org/10.1089/cpb.2009.0003
Portwood-Stacer L (2013) Media refusal and conspicuous non-consumption: the performative and political dimensions of Facebook abstention. New Media Soc 15(7):1041–1057
Rainie L, Smith A, Duggan M (2013) Coming and going on Facebook. http://www.pewinternet.org/2013/02/05/coming-and-going-on-facebook/. Accessed 12 Feb 2017
Satchell C, Dourish P (2009) Beyond the user: use and non-use in HCI. In: Proceedings of the 21st annual conference of the australian computer-human interaction special interest group: design: open 24/7, New York, NY, USA, ACM, pp 9–16. https://doi.org/10.1145/1738826.1738829
Schoenebeck SY (2014) Giving up Twitter for lent: how and why we take breaks from social media. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, New York, NY, USA, pp 773–782. https://doi.org/10.1145/2556288.2556983
Šléglová V, Cerna A (2011) Cyberbullying in adolescent victims: perception and coping. Cyberpsychology J Psychosoc Res Cyberspace 5(2). https://cyberpsychology.eu/article/view/4248
Smith A, Duggan M (2018) Crossing the line: what counts as online harassment? http://www.pewinternet.org/2018/01/04/crossing-the-line-what-counts-as-online-harassment/. Accessed 26 Jan 2016
Stieger S, Burger C, Bohn M, Voracek M (2013) Who commits virtual identity suicide? differences in privacy concerns, internet addiction, and personality between facebook users and quitters. Cyberpsychology Behav Soc Netw 16(9):629–634
Suler J (2004) The online disinhibition effect. CyberPsychology Behav 7(3):321–326. https://doi.org/10.1089/1094931041291295
Valenzuela S, Park N, Kee KF (2009) Is There social capital in a social network site?: Facebook use and college students’ life satisfaction, trust, and participation. J Comput Mediated Commun 14(4):875–901. https://doi.org/10.1111/j.1083-6101.2009.01474.x
Vitak J (2012) The impact of context collapse and privacy on social network site disclosures. J Broadcast Electron Media 56(4):451–470. https://doi.org/10.1080/08838151.2012.732140
Wang J, Iannotti RJ, Nansel TR (2009) School bullying among US adolescents: physical, verbal, relational and cyber. J Adolesc Health Off Publ Soc Adolesc Med 45(4):368–375. https://doi.org/10.1016/j.jadohealth.2009.03.021
Wyatt SME (2003) Non-users also matter: the construction of users and non-users of the Internet. Non-users also matter: the construction of users and non-users of the internet, pp 67–79. MIT Press. http://dare.uva.nl/search?metis.record.id=220721
Xu H, Teo H-H, Tan BCY, Agarwal R (2009) The role of push-pull technology in privacy calculus: the case of location-based services. J Manag Inf Syst 26(3):135–174. https://doi.org/10.2753/MIS0742-1222260305
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Page, X., Knijnenburg, B.P., Wisniewski, P., Namara, M. (2018). Avoiding Online Harassment: The Socially Disenfranchised. In: Golbeck, J. (eds) Online Harassment. Human–Computer Interaction Series. Springer, Cham. https://doi.org/10.1007/978-3-319-78583-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-78583-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78582-0
Online ISBN: 978-3-319-78583-7
eBook Packages: Computer ScienceComputer Science (R0)