The Influence of Prototypical Communication in Dark Online Organizations: How to Speak Like a Monger

2017 ◽  
Vol 37 (2) ◽  
pp. 249-261
Author(s):  
Andrew Pilny ◽  
Jeffrey Proulx

A key obstacle for dark organizations is negotiating who is and is not a member. Following the social identity approach, this study explores the impact of prototypical communication, through code word use, on the structure of two dark online organizations. We use two-mode exponential random graph modeling to demonstrate the interdependence between code word use and network structure. Findings are discussed in light of social identity approaches and online groups.

2019 ◽  
Vol 8 (4) ◽  
pp. 3106-3110

Structural equivalence has been a fascinating topic for industry and academia due to its connection with network embeddedness. This study investigates the network assumption that structural equivalence is a major determinant of influence derives largely from the frequent finding that organizations that are embedded with influential connections are at an increased likelihood of becoming influential themselves. It is suggested that the strong and consistent structural equivalence position is at least partially responsible for factors of reputational influence among directors of government agencies. The contribution of this study continues to enrich the literature of the network and provide the solution for the industry since earlier research is neglecting the impact of relations upon the level of influence. Using exploratory social network methodology and statistical evaluation of Exponential Random Graph Modeling, this research found that, directors of government agencies may gain greater influence via its structural equivalence position in an informal network. It is also, argued that social network methodology is an appropriate method for researching influence development use in the context of networked organizations. The contribution of this study to industry and theory are discussed.


Author(s):  
S. Alexander Haslam ◽  
Inmaculada Adarves-Yorno ◽  
Niklas K. Steffens ◽  
Tom Postmes

The processes of creative production and creativity recognition are both understood to be central to the dynamics of creativity. Nevertheless, they are generally seen by creativity researchers as theoretically unrelated. In contrast, social identity theorizing suggests a model of creativity in which groups play a role both in inspiring creative acts and in determining the reception they receive. More specifically, this approach argues that shared social identity (or lack of it) motivates individuals to rise to particular creative challenges and provides a basis for certain forms of creativity to be recognized (or disregarded). This chapter explicates the logic underlying the social identity approach and summarizes some of the key evidence that supports it.


2017 ◽  
Vol 47 (7) ◽  
pp. 789-802 ◽  
Author(s):  
Jolanda Jetten ◽  
S. Alexander Haslam ◽  
Tegan Cruwys ◽  
Katharine H. Greenaway ◽  
Catherine Haslam ◽  
...  

2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Cheng Lu ◽  
Zhencong Sang ◽  
Kun Song ◽  
Kazuo Kikuchi ◽  
Ippei Machida

PurposeBased on the theory of social identity mechanism, this study aimed to investigate the associations with millennial consumers' need for uniqueness (NFU), susceptibility to peer influence (SPI) and attitudes towards luxury brands (ALB) under the cross-cultural context. The mediating effect of fashion innovativeness (FI) and the moderating effect of culture were examined.Design/methodology/approachThe data for this study were collected through a survey from 217 millennials in Shanghai and 268 millennials in Tokyo. Moderation analysis and mediation analysis using Hayes PROCESS macro were applied to test proposed hypotheses.FindingsResults show that NFU and SPI have a significantly positive effect on millennials' ALB, and fashion innovativeness plays a mediating role in this process. Furthermore, the positive impact of NFU on millennials' ALB for relatively individualistic cities (Shanghai) is stronger than for relatively collectivist cities (Tokyo). The positive impact of susceptibility to informative influence (SII) on millennials' ALB for Tokyo is stronger than for Shanghai.Practical implicationsThe research results suggest how different cultures can support marketers in effectively carrying out their business strategy.Originality/valueUnder the cross-cultural background, the social identity mechanism behind the attitudes of millennials towards luxury brands has been widely recognised. However, little is known about how culture could moderate the social identity mechanism behind millennials' ALB. By analysing these mechanisms, this study compares the cultures of Shanghai and Tokyo and expands the previous research achievements.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Cher-Min Fong ◽  
Hsing-Hua Stella Chang ◽  
Pei-Chun Hsieh ◽  
Hui-Wen Wang

Purpose The present research responds to researchers’ calls for more research of consumer animosity on potential boundary conditions (e.g. product categories) and marketing strategies that may mitigate such negative impacts on marketers’ product and/or brand performance, with a special focus on the soft service sector. This paper aims to address the unique characteristics of service internationalization, i.e. cultural embeddedness, hybridized country origins and high consumption visibility, by proposing a social identity signaling model to explain consumer animosity effects in the soft service sector. Design/methodology/approach Two surveys (Pretest with 240 participants and Study 1 with 351 participants) and one experiment (Study 2 with 731 participants) were conducted to empirically test our hypotheses in the Japanese-Chinese relationship context. Findings The stronger the national/cultural symbolism and social expressiveness, the stronger the consumer avoidance for the service category. Then the consumer culture positioning strategy that can mitigate an offending country’s cultural symbolism can reduce consumer avoidance. Originality/value This research introduces two factors that could affect the negative social identity signaling capacity of service categories in the animosity context: the national/cultural symbolism reflecting an offending country and the social expressiveness communicating social identity. In line with the social identity signaling perspective, the present research specifically uses consumer avoidance as the dependent variable to capture the notion that consumers avoid consuming services because they wish to avoid being associated with an offending country that may threaten their in-group social identities.


2021 ◽  
pp. 0142064X2110647
Author(s):  
Katja Kujanpää

When Paul and the author of 1 Clement write letters to Corinth to address crises of leadership, both discuss Moses’ παρρησία (frankness and openness), yet they evaluate it rather differently. In this article, I view both authors as entrepreneurs of identity and explore the ways in which they try to shape their audience’s social identity and influence their behaviour in the crisis by selectively retelling scriptural narratives related to Moses. The article shows that social psychological theories under the umbrella term of the social identity approach help to illuminate the active role of leaders in identity construction as well as the processes of retelling the past in order to mobilize one’s audience.


Author(s):  
Duy Dang-Pham ◽  
Mathews Nkhoma

Active sharing of information security advice among the employees has undeniable implications for developing a sustainable security environment. This research examines this topic from the network perspective, and focuses on the work relationships that promote sharing security advice. Exponential random graph modeling technique was employed to evaluate the relationship between team collaborative activities and sharing security advice. The findings revealed that those who share security advice also tend to give work- and IT-related knowledge. Moreover, employees who have similar tenure tend to exchange security advice with each other more. Furthermore, the network of sharing security advice is transitive and has a tendency to form separate clusters. Security managers are suggested to take into account the research findings to identify key employees who frequently share security advice in the workplace and devise appropriate strategies to manage them.


Sign in / Sign up

Export Citation Format

Share Document