The Spiral of Silence and the Internet: Selection of Online Content and the Perception of the Public Opinion Climate in Computer-Mediated Communication Environments

2012 ◽  
Vol 24 (3) ◽  
pp. 346-367 ◽  
Author(s):  
A. Schulz ◽  
P. Roessler
Author(s):  
Sherice Gearhart

The spiral of silence theory provides insight into the ways in which perceptions of public opinion can lead to changes in opinion expression behavior. Conceptualized in a political communication context, the central claim of the theory is that individuals’ fear of social isolation motivates them to continuously evaluate the climate of opinion through both experiences with the media and interpersonal communication. Upon assessment, individuals either find themselves in a situation where their opinion aligns with the majority or minority. Accordingly, those who find their opinion does not align with the dominant opinion are likely to conceal their opinions while those who find their opinion aligns with the majority are more likely to express them. Empirical research testing the spiral of silence theory has predominately focused on measurement of focal variables and methods of empirical testing. Advances have been made in regard to micro-level factors, such as creating universally applicable measures of psychological attributes. However, limited work has explored macro-level factors, such as appropriateness of issues, application to computer-mediated communication environments, and tools used to identify circumstances vulnerable to spiral of silence effects. Nonetheless, the practical value of the spiral of silence theory for health and risk communicators can be utilized by modifying campaign efforts to anticipate and counteract fluxes in public opinion.


2020 ◽  
Vol 6 (4) ◽  
pp. 205630512098447
Author(s):  
Daphna Yeshua-Katz ◽  
Ylva Hård af Segerstad

This study highlights the challenges of computer-mediated communication for vulnerable individuals and groups, by studying boundary work in stigmatized communities online. Five stigmatized online communities with different affordances were studied: (1) “pro-ana” blogs; (2) an infertility discussion board; (3) a Facebook group for bereaved parents; and (4) two WhatsApp groups for Israeli veterans of war with post-traumatic stress disorder. In-depth interviews with members and administrators ( n = 66) revealed that social media affordances such as low anonymity and high visibility may marginalize those living with stigma. While research literature applauds social media for allowing the formation and maintenance of social capital, our study highlights the paradox caused by these very same affordances. To offer safe and functioning environments of support, the communities must guard against impostors whose presence threatens their safe havens. Simultaneously, this may make these groups inaccessible to those who truly need support and remove such groups from the public eye.


2014 ◽  
Vol 2 (1) ◽  
pp. 2-12 ◽  
Author(s):  
Sabina Misoch

This paper deals with the phenomenon of so-called (note) card stories on YouTube. Card stories can be described as self-disclosing videos or confessions, using a new frame for telling one’s own story audio-visually to the public by combining ‘old’ (hand-written messages) and ‘new’ media (video, computer mediated communication). In 2012/13, a qualitative and exploratory study with a sample of 25 card story videos on YouTube was conducted. The content and visual analysis revealed (1) that these videos are bound to a very specific frame of presentation, (2) that they deal with specific topics, and (3) that the presenter does not remain (visually) anonymous. These findings question previous research results that stressed a strong correlation between online self-disclosure and (visual) anonymity; further, the findings show that this special frame of textual confessions via video supports deep self-disclosures.


2021 ◽  
Author(s):  
Georgia Marie Metcalfe

Computer mediated communication (CMC) is becoming increasingly prevalent and relied upon as the Internet facilitates the rapid growth of global networks and expands communication boarders. Today, many individuals rely on CMC for professional purposes, such as connecting long distance with co-workers to collaborate and advance workplace tasks. These individuals often rely on professional online collaborative programs that allow them to connect with colleagues across cities, provinces, and around the world. Relying on CMC for the transmittal of important electronic messages places it at the forefront for understanding how technical communication devices and networks function. This also requires an understanding of how ambiguity with online conversations can be decreased through the use of the Internet. However, what professional collaborative programs currently lack is a singular professional software that integrates both collaborative on-screen practices and online chatting capabilities with visual icons; or professional emoticons. The following research aims to investigate the communicative value of emoticons within a structured sentence via a study involving professional communication graduate students from Ryerson University and senior marketing communication professionals from a marketing agency in Toronto, Canada. Using concepts from critical visual methodology and a theoretical framework of visual semiotics, emoticons will be examined to see whether or not these pictorial symbols act in a similar fashion to punctuation symbols within a given sentence structure. The goal of this research was to investigate the use and meaning derived from emoticons in relation to grammatical punctuation for sentence structures in online communication environments. Specific emoticons were selected and used to measure participants‘ interpretation of each symbol within the particular context of a given sentence.


2013 ◽  
pp. 198-223
Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.


Author(s):  
Helen Joanne Wall ◽  
Linda K. Kaye

The growth in computer-mediated communication has created real challenges for society; in particular, the internet has become an important resource for “convincing” or persuading a person to make a decision. From a cybersecurity perspective, online attempts to persuade someone to make a decision has implications for the radicalisation of individuals. This chapter reviews multiple definitions and theories relating to decision making to consider the applicability of these to online decision making in areas such as buying behaviour, social engineering, and radicalisation. Research investigating online decision making is outlined and the point is made that research examining online research has a different focus than research exploring online decision making. The chapter concludes with some key questions for scholars and practitioners. In particular, it is noted that online decision making cannot be explained by one single model, as none is sufficient in its own capacity to underpin all forms of online behaviour.


2012 ◽  
pp. 944-959 ◽  
Author(s):  
Stepan Konecny

Mass media often presents a warped image of the Internet as an unreliable environment in which nobody can be trusted. In this entry, the authors describe lying on the Internet both in the context of lying in the real world and with respect to the special properties of computer-mediated communication (CMC). They deal with the most frequent motives for lying online, such as increasing one’s attractiveness or experimenting with identities. They also take into account the various environments of the Internet and their individual effects on various properties of lying. The current methods for detecting lies and the potential for future computer-linguistic analysis of hints for lying in electronic communication are also considered.


Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.


Author(s):  
Robert Andrew Dunn

Modern identity has been shaped by technology, which has in turn shaped theories in understanding identity. How one communicates who they are to others is given limitless possibilities by the advent of the Internet and computer-mediated environments. Thus, identity theory today must take into account computer-mediated communication theory and research. Such research indicates four ways in which identity is affected by technology. First, researchers have discussed the differences between an individual’s true identity and the virtual identity he or she presents, via self-selected text and images, to an online world. Second, researchers have discussed how the Internet can provide both protective anonymity for those who seek it and cathartic disclosure for those who need it. Third, researchers have discussed ways in which users pursue both reflective virtual lives online and role-play with identities, often multiple identities. Fourth, researchers have conducted experiments that reflect the impact that virtual identity has on the practice of communication and the impact communication has on the presentation of the self.


2008 ◽  
pp. 1443-1450
Author(s):  
Lynne D. Roberts ◽  
Leigh M. Smith ◽  
Clare M. Pollock

The rapid growth of the Internet has been accompanied by a growth in the number and types of virtual environments supporting computer-mediated communication. This was soon followed by interest in using these virtual environments for research purposes: the recruitment of research participants, the conduct of research and the study of virtual environments. Early research using virtual environments raised a number of ethical issues and debates. As early as 1996, a forum in the The Information Society (vol. 12, no. 2) was devoted to ethical issues in conducting social science research online. The debate has continued with more recent collaborative attempts to develop guidelines for ethical research online (Ess & Association of Internet Researchers, 2002; Frankel & Siang, 1999).


Sign in / Sign up

Export Citation Format

Share Document