From Loving the Hero to Despising the Villain: Sports Fans, Facebook, and Social Identity Threats

2013 ◽  
Vol 16 (4) ◽  
pp. 487-509 ◽  
Author(s):  
Jimmy Sanderson
2013 ◽  
Vol 44 (6) ◽  
pp. 361-372 ◽  
Author(s):  
Natascha de Hoog

The underlying process of reactions to social identity threat was examined from a defense motivation perspective. Two studies measured respondents’ social identification, after which they read threatening group information. Study 1 compared positive and negative group information, attributed to an ingroup or outgroup source. Study 2 compared negative and neutral group information to general negative information. It was expected that negative group information would induce defense motivation, which reveals itself in biased information processing and in turn affects the evaluation of the information. High identifiers should pay more attention to, have higher threat perceptions of, more defensive thoughts of, and more negative evaluations of negative group information than positive or neutral group information. Findings generally supported these predictions.


Author(s):  
Samuel D. Hakim

The present study examined the Premier Lacrosse League (PLL) and fans’ identity and fanship. The PLL boasts a uniqueness many sports fans are unfamiliar with—non-geographically affiliated teams. Using socialization theory, social identity theory, and fan identity, the author sought to better understand the fan qualities of the PLL, especially surrounding athlete importance. A Qualtrics survey was distributed through reddit.com/r/lacrosse and major lacrosse forums with the goal to assess fanship toward favorite players, favorite teams, and PLL media consumption. Statistical analyses revealed that those who have a previously constructed lacrosse fan identity, consume more lacrosse media, and have been following a professional or college lacrosse athlete in the past are more likely to embrace the PLL. In a league where geographical affiliation is currently absent, research suggests that encouraging fan adoption of a favorite player is key to creating fans who begin to feel investment, loyalty, and increased team identity.


2016 ◽  
Vol 35 (3) ◽  
pp. 205-220 ◽  
Author(s):  
Oscar Holmes IV ◽  
Marilyn V. Whitman ◽  
Kim S. Campbell ◽  
Diane E. Johnson

Purpose – The purpose of this paper is to explore what individuals perceive as social identity threats, the sources of the threat, individuals’ responses, and the consequences of the threat. Design/methodology/approach – Narratives from 224 individuals were collected. A sample of 84 narratives were analyzed in depth using a qualitative content analysis approach. Findings – Initial support for identity threat response theory was found. Three new distinct threat responses – constructive action, ignore, and seek assistance – were uncovered. Additionally, harm/loss appraisals were found to be perceived and reacted to similarly to Petriglieri-defined identity threats. Originality/value – This study contributes to identity scholarship by shedding further light on the “theoretical black box” associated with identity threat. Such insight is necessary in further enhancing our understanding of the impact that identity threat has at the individual and organizational level.


2020 ◽  
pp. 136843021988827 ◽  
Author(s):  
Hilary B. Bergsieker ◽  
Matthew O. Wilmot ◽  
Emily N. Cyr ◽  
Charnel B. Grey

Integrating social identity threat and structural hole theories, this work examines how social network positions affect group-based identity threats. For individuals less well positioned to bridge (or “broker”) relations between unconnected friends, stigma-by-association concerns may constrain affiliation with stereotypic targets. Three experiments ( Ns = 280, 232, 553) test whether women (vs. men) in male-dominated STEM (vs. female-dominated) majors avoid befriending a female target with feminine-stereotypic (vs. STEM-stereotypic) interests. Only STEM women with less brokerage (i.e., less ability to manage introductions to unconnected friends) in their existing friendship networks avoided befriending (pilot experiment) and socially integrating (Experiments 1 and 2) feminine- (vs. STEM-) stereotypic targets, despite standardized target similarity and competence. STEM women in particular anticipated steeper reputational penalties for befriending stereotypically feminine peers (Experiment 2). Social identity threat may lead women in STEM—especially those lacking brokerage—to exclude stereotypically feminine women from social networks, reinforcing stereotypes of women and STEM fields.


2019 ◽  
Vol 37 ◽  
pp. 101171
Author(s):  
Tomoyuki Kobayashi ◽  
Kazuki Yoshida ◽  
Yoshitake Takebayashi ◽  
Aya Goto ◽  
Atsushi Kumagai ◽  
...  

Author(s):  
Nicholas Hirshon

Sports fans are known to engage in BIRGing, or basking in reflected glory after their team wins, and CORFing, cutting off reflected failure following a team loss. These phenomena are related to social identity theory, which examines how group memberships shape a person's self-image. This chapter explores how media-attentive sports fans internalize victory and externalize defeat by charting the simultaneous developments in the 1970s of social identity theory, advanced by European social psychologists, and BIRGing and CORFing, which are rooted in a landmark study on college students wearing school-identifying apparel after the university football team won. The chapter also examines how social identity has served and can continue to be utilized as the theoretical backbone for research on mass-mediated sports fandom.


2020 ◽  
Author(s):  
Ammar Almustafa

<p>This policy is advanced in a transformative proactive manner to address the needs of Uber Technologies to manage diversity in a male-dominated tech sector. The policy is proposed after a series of internal struggles and unflattering media attention to help delineate the procedure as well as the rationale for the achieving gender diversity. Social identity and Social identity threats are discussed in relation to gender and work as well as the business case for diversity in a tech company. Recommendations and advice are made to advance diversity and manage resistance on an individual level, an organizational culture level and a procedure level.</p>


Sign in / Sign up

Export Citation Format

Share Document