Intellectual Disability, Identity, and the Internet

2013 ◽  
pp. 198-223
Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.

Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.


Author(s):  
Helen Joanne Wall ◽  
Linda K. Kaye

The growth in computer-mediated communication has created real challenges for society; in particular, the internet has become an important resource for “convincing” or persuading a person to make a decision. From a cybersecurity perspective, online attempts to persuade someone to make a decision has implications for the radicalisation of individuals. This chapter reviews multiple definitions and theories relating to decision making to consider the applicability of these to online decision making in areas such as buying behaviour, social engineering, and radicalisation. Research investigating online decision making is outlined and the point is made that research examining online research has a different focus than research exploring online decision making. The chapter concludes with some key questions for scholars and practitioners. In particular, it is noted that online decision making cannot be explained by one single model, as none is sufficient in its own capacity to underpin all forms of online behaviour.


Author(s):  
Helen Joanne Wall ◽  
Linda K. Kaye

The growth in computer-mediated communication has created real challenges for society; in particular, the internet has become an important resource for “convincing” or persuading a person to make a decision. From a cybersecurity perspective, online attempts to persuade someone to make a decision has implications for the radicalisation of individuals. This chapter reviews multiple definitions and theories relating to decision making to consider the applicability of these to online decision making in areas such as buying behaviour, social engineering, and radicalisation. Research investigating online decision making is outlined and the point is made that research examining online research has a different focus than research exploring online decision making. The chapter concludes with some key questions for scholars and practitioners. In particular, it is noted that online decision making cannot be explained by one single model, as none is sufficient in its own capacity to underpin all forms of online behaviour.


Gamification ◽  
2015 ◽  
pp. 1734-1750
Author(s):  
Jonathan Bishop

The growth in Internet use is not only placing pressure on service providers to maintain adequate bandwidth but also the people who run the Websites that operate through them. Called systems operators, or sysops, these people face a number of different obligations arising out of the use of their computer-mediated communication platforms. Most notable are contracts, which nearly all Websites have, and in the case of e-commerce sites in the European Union, there are contractual terms they must have. This chapter sets out to investigate how the role contract law can both help and hinder sysops and their users. Sysop powers are limited by sysop prerogative, which is everything they can do which has not been taken away by statute or given away by contract. The chapter finds that there are a number of special considerations for sysops in how they use contracts in order that they are not open to obligations through disabled or vulnerable users being abused by others.


2012 ◽  
pp. 944-959 ◽  
Author(s):  
Stepan Konecny

Mass media often presents a warped image of the Internet as an unreliable environment in which nobody can be trusted. In this entry, the authors describe lying on the Internet both in the context of lying in the real world and with respect to the special properties of computer-mediated communication (CMC). They deal with the most frequent motives for lying online, such as increasing one’s attractiveness or experimenting with identities. They also take into account the various environments of the Internet and their individual effects on various properties of lying. The current methods for detecting lies and the potential for future computer-linguistic analysis of hints for lying in electronic communication are also considered.


Author(s):  
Robert Andrew Dunn

Modern identity has been shaped by technology, which has in turn shaped theories in understanding identity. How one communicates who they are to others is given limitless possibilities by the advent of the Internet and computer-mediated environments. Thus, identity theory today must take into account computer-mediated communication theory and research. Such research indicates four ways in which identity is affected by technology. First, researchers have discussed the differences between an individual’s true identity and the virtual identity he or she presents, via self-selected text and images, to an online world. Second, researchers have discussed how the Internet can provide both protective anonymity for those who seek it and cathartic disclosure for those who need it. Third, researchers have discussed ways in which users pursue both reflective virtual lives online and role-play with identities, often multiple identities. Fourth, researchers have conducted experiments that reflect the impact that virtual identity has on the practice of communication and the impact communication has on the presentation of the self.


2008 ◽  
pp. 1443-1450
Author(s):  
Lynne D. Roberts ◽  
Leigh M. Smith ◽  
Clare M. Pollock

The rapid growth of the Internet has been accompanied by a growth in the number and types of virtual environments supporting computer-mediated communication. This was soon followed by interest in using these virtual environments for research purposes: the recruitment of research participants, the conduct of research and the study of virtual environments. Early research using virtual environments raised a number of ethical issues and debates. As early as 1996, a forum in the The Information Society (vol. 12, no. 2) was devoted to ethical issues in conducting social science research online. The debate has continued with more recent collaborative attempts to develop guidelines for ethical research online (Ess & Association of Internet Researchers, 2002; Frankel & Siang, 1999).


2019 ◽  
pp. 58-79 ◽  
Author(s):  
Mark Graham ◽  
Sanna Ojanperä ◽  
Martin Dittus

From the earliest stages of computer-mediated communication, technical change was predicted to undermine the significance of geography and lead to the “death of distance.” This seemed a logical consequence of electronic media enabling people to communicate from anywhere, to anyone, and anytime. However, empirical research, such as that illustrated in this chapter, has challenged this view. The authors argue that the Internet augments everyday places. As such, much like material geographies, the Internet can be spatially mapped. In doing so, the authors uncover significant geographic inequalities that shape how we use, move through, and interact with the world.


Author(s):  
Lynne D. Roberts ◽  
Liegh M. Smith ◽  
Claie M. Pollock

The rapid growth of the Internet has been accompanied by a growth in the number and types of virtual environments supporting computer-mediated communication. This was soon followed by interest in using these virtual environments for research purposes: the recruitment of research participants, the conduct of research and the study of virtual environments. Early research using virtual environments raised a number of ethical issues and debates. As early as 1996, a forum in the The Information Society (vol. 12, no. 2) was devoted to ethical issues in conducting social science research online. The debate has continued with more recent collaborative attempts to develop guidelines for ethical research online (Ess & Association of Internet Researchers, 2002; Frankel & Siang, 1999).


Author(s):  
Grace Setyo Purwaningtyas ◽  
Pawito Pawito ◽  
Ismi Dwi Astuti Nurhaeni

Communication technology and the internet  have developed quite rapidly from time to time. The development of communication  technology and the internet has changed the way human’s communication. Human interaction is no longer limited to face-to-face meetings, but has now shifted to interaction or communication using computer and internet media which are not limited to space and time. This mediated communication is known as Computer Mediated Communication (CMC). Communication through the CMC was developed by various application  providers to facilitate internet users in communicating, one of which is through the Instagram application. Text, images and videos are included in the type of computer mediated communication (CMC) interaction. The CMC interaction is used by internet users from various circles, including millennial mothers. This research was conducted to find out how the role of CMC in developing self-potential among millennial mothers. This research is a qualitative research using semi-structured interviews as a data collection method. The findings in this study indicate that informants are selective in presenting themselves through the selection of images, videos and descriptions before uploading on the Instagram page so that they are able to display their potential.


Sign in / Sign up

Export Citation Format

Share Document