Unfriending on Facebook: Friend Request and

Size: px
Start display at page:

Download "Unfriending on Facebook: Friend Request and"

Transcription

1 Unfriending on Facebook: Friend Request and Online/Offline Behavior Analysis Christopher Sibona Second Year Research Paper directed by Associate Professor Steven Walczak Comprehensive Exam Information Systems The Business School University of Colorado Denver

2 Contents 1 Introduction Literature Review and Background Social Networks Friendship Formation & Dissolution Computer-mediated communications Online Etiquette/Netiquette Initial Model Instrument Design Data Collection Methodology Results Friend Request Individual Factor Differences Factor Analysis Construct Creation Reliability Results A Comparison of Online and Offline Constructs and the Decision to Unfriend Final Model Generated Hypotheses Limitations Discussion and Conclusion Implications and Future Research Implications for Individual Users and Business Users Implications for Facebook Future Research

3 1 Introduction 1 Abstract Objectives: Determine the role of the friend request in unfriending decisions on the social network site Facebook.com. Find factors in unfriending decisions and find differences in the perception of online and offline behaviors that vary depending on the unfriending decision. Method: Survey research conducted online. 1,137 surveys about unfriending were analyzed using exploratory statistical techniques. Survey respondents were recruited from Twitter. Results: The research results show that the initiator of the friend request has more than their expected share of unfriends compared to those who receive the friend request. There are online and offline factors for unfriending decisions; the research identified six constructs to evaluate unfriending decisions. There are 4 constructs for online behaviors (unimportant/frequent posts, polarizing posts, inappropriate posts and everyday life posts) and 2 offline constructs (disliked behavior and changes in the relationship). Survey respondents who said they unfriended for online reasons were more likely to agree that the person posted too frequently about unimportant topics, polarizing topics, inappropriate topics and everyday life topics compared to those who unfriended for offline reasons. 1 Introduction Facebook has over 500 million active users worldwide 1 and is the most popular website in the U.S. Facebook recently overtook Google as the most visited website on March 15, 2010 according to webtracker Hitwise (Nuttal and Gelles, 2010). Research in social behavior indicates that the Internet is used to maintain existing relationships, form romantic connections, and create new online friendships (Wang et al., 2010). These online friendships are fluid; friendships are created and dissolved on social network sites. The word unfriend was named the word of the year by the New Oxford American Dictionary for 2009 (Goldsmith, 2009). The dictionary defined unfriend as follows: unfriend verb To remove someone as a friend on a social networking site such as Facebook. 2 Real-world friendship

4 2 Literature Review and Background 2 dissolution has been studied in a variety of contexts such as romantic relationships, marriage and divorce (Levinger, 195), interracial friendships (Hallinan and Williams, 1987), high school and college students (Owens, 2003). Unfriending on social networks is different in a number of ways than real-world friendships. Facebook has a definite marker when the friendship is dissolved by one member through the unfriend function. On a social network site one member can decide to end the relationship and will publicly remove support by unfriending that person. Friendship dissolution for online friendships (a.k.a. unfriending) is under-researched. There are two major research questions that this study addresses. 1. What is the role of the friend request in unfriending decisions. 2. Can factors in unfriending decisions be found and do differences in the perception of online and offline behaviors vary depending on the unfriending decision. 2 Literature Review and Background 2.1 Social Networks boyd and Ellison (2007) defined social network sites based on three system capabilities. The systems: allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system (boyd and Ellison, 2007, p. 1). After users join a site they are asked to identify others in the network with whom they have an existing relationship. The links that are generated between individuals become visible to others in the local subspace. There are general social network sites (Facebook) and others that are content focused. Social network site MySpace has a large musical component and links musicians and musical groups to their fans, LinkedIn is a network of professional contacts and YouTube connects people who are interested in video content (boyd and Ellison, 2007). Facebook, which is focused on real friends (Ellison et al., 2007), is now believed to be the largest social network site (Raphael,

5 2 Literature Review and Background ). Research on social network sites and on Facebook in particular cover a variety areas. Research interests include identity management (Hewitt and Forte, 2006), trust (Dwyer et al., 2007), self-presentation (Stutzman, 2006), surveillance and privacy concerns (Gross and Acquisti, 2005), social capital (Ellison et al., 2007). Much of the academic research on Facebook has focused on identity presentation and privacy concerns (Ellison et al., 2007). 2.2 Friendship Formation & Dissolution Friendships are formed and maintained because they are rewarding to individuals (Wright, 1984). Friendship models have been developed to describe how friendships are created (Hallinan, 1979). Friendships tend to be formed by people who share certain similarities (such as values) (Lea and Duck, 1982; McPherson et al., 2001). People tend to create friendships with those who share a similar race and ethnicity followed by age, religion, education, occupation and gender and roughly in that order (McPherson et al., 2001). The largest portion of friendships that are formed with those who are not family members are through organizational structures (McPherson et al., 2001). Schools, work, and geographic location are major factors in how relationships are formed. Hallinan describes the process of friendship formation as a sequential process having four elements. First, P must desire to have O as a friend (attraction). Second, P must initiate a move to establish a friendship with O. Third, O must recognize P s overture of friendship. Fourth, O must reciprocate P s offer of friendship (Hallinan, 1979, p. 194). The initiator of the friendship request tends to have lower status than the recipient (Hallinan, 1979). Friendship formation in the real world has more nuance than in the online world. The initiator of the friend request may communicate the desire to be friends with varying degrees of directness (Hallinan, 1979). Those who initiate the friendship in less direct ways can avoid embarrassment and rejection should the request not be accepted. The online world (on a site like Facebook) lacks this nuance and makes it very clear that one person requests the other s friendship through the

6 2 Literature Review and Background 4 visible friend request. On Facebook one person initiates a friend request and another person receives the request. The request for friendship is easily identified in the online world because there is a marker for that request. The receiver can choose to accept the friendship request or choose to ignore the request. If the receiver accepts the request then the two become friends on Facebook. Social network sites use different terms for the relationship; Facebook uses the term friends but others use the term contacts, fans, or follower (boyd and Ellison, 2007). Visible virtual links are generated between the dyad s online identities. The online friendship process mirrors friendship formation in the real world with the addition of markers like the visible request and visible link connecting the dyad. Friendship dissolution is not the same process of friendship formation in reverse and is distinctly different (Duck, 1982). Some friendships end in conflict but most simply fade away (Sprecher and Fehr, 1998). Friendships do not require the other person s permission to end the relationship in either the online or offline world (Baxter, 1979). You need permission to be someone s friend on Facebook; however, no permission is needed to end the relationship. One person can simply choose to unfriend the other person. In most cases the person who was unfriended does not receive notification that they have been unfriended. There are applications available on Facebook, such as unfriend finder, that notify users when they are unfriended. 3 There are both internal and external barriers to friendship dissolution (Bushman and Holt- Lundstad, 2009). External barriers are those that originate outside the individual and make the person feel as though the relationship must be maintained. External barriers include social (church, family), financial ties, and physical proximity (coworkers, neighbors, etc.). Internal barriers are endogenous and drive the person to maintain the relationship and include religious beliefs, selfidentity (sociability) or a personal sense of commitment. Online social networks, with their visible links between members, may make it difficult to end a relationship. Unlike real world relationships that may simply fade without either member 3

7 2 Literature Review and Background 5 making a conscious decision about the dissolution, online unfriending is a conscious and public decision. Researcher Steve Duck calls the public declaration of the end of a relationship in the real world grave dressing (Duck, 1982). In Facebook the unfriending can be a signal to others in the network that the particular relationship is over because the links between members are visible. Others in the network who share links with the dyad can notice that a link previously present has been removed. 2.3 Computer-mediated communications Computer-mediated communications have been researched to determine how reduced cues impact online interactions (Haythornwaite, 2002). Online posts provide different cues than face-to-face conversations. Walther (1996) examined seemingly contradictory views of online communication when he classified communication as impersonal, interpersonal or hyperpersonal. Computer operators, who were early users of online communication systems, initially sent simple messages to each other to coordinate tasks. When these messages were examined, researchers found that the messages reduced interpersonal affect and group solidarity and were more task oriented than face-to-face meetings (Walther, 1996). Researchers noticed that as users of computer-mediated communication systems used these systems over time and in different contexts that the communication grew more interpersonal. The messages contained less social information than face-to-face meetings, as they lacked nonverbal cues, but over time the users generated additional methods to help decipher the interpersonal cues. As users had increased expectations of future online interactions through computer messages they attempted to learn more about the person with whom they were communicating. These communications tended to be more interpersonal than the computer operator messages because they were expected to continue in the future vs. the single task-oriented messages. As computer usage has evolved to include more recreational interactions (games, chat, etc.) the level of affect can exceed levels found in face-to-face interactions and may be classified as

8 2 Literature Review and Background 6 hyperpersonal (Walther, 1996). Users of these systems can develop stereotypical impressions of their online partners because certain social information is not present. Receivers of online messages will fill in the missing details themselves by creating a more complete but distorted version of the sender. Online communications users can selectively present the information that they wish to reveal (Walther, 1992; Riva, 2001). User are allowed more time in which to generate a response to a message and thus may respond more deliberately. The receiver of these messages can create such complete and idealized images of the person with whom they communicate that when they meet in real life they can feel disappointment that the realized person did not meet their imagined expectations (Grimes, 1992). Haythornwaite (2002) ties these three communications mechanisms by examining the strength of the tie between the dyad. When the ties are weak, as in the computer operators sending messages about the systems, then the dyad tends to be more dependent on organizationally established means of communication. When the ties are strong communicators will influence each other and adapt the system for additional uses. Strong communicators can expand their use of the systems beyond the original context or work towards its dissolution if they feel it impedes their communication. When ties between the dyad are weak and new forms of communication are introduced then the dyad is susceptible to dissolution. Weakly tied communicators tend to be more passive in their use, less likely to resist, and more accepting of mandated technologies. People tend to have complex views about new communication technologies as they are adopted; some are skeptical of the technology while others embrace it (Baym, 2010). Some believe that the new technology devalues face-to-face communication and express concern that communication will grow increasingly shallow. Others will embrace the technology and tout its benefits to create stronger relationships and new opportunities to interact with new people. As the technology is adopted by greater numbers, people see the the pros and cons of new media and accept it for what it provides. Baym (2010) discusses how concerns about the adoption of new technologies have persisted through centuries; technologies such as the telegraph, telephone, , instant messaging, mobile phones and today s Internet have raised concern among users and have been accepted

9 2 Literature Review and Background 7 by society to a large degree. New communication technologies, such as online social networks, are expected to be influenced by existing communication mechanisms and be adapted to fit the specific context as users gain experience with the technology over time (Yates and Orlikowski, 1992). Most online interactions tend to be between people who have met face-to-face or talked on the telephone and not with random strangers who have met online (Baym et al., 2004). Relationships can be maintained through multiple media channels and generally do not require only one channel for communication. Baym et al. (2004) also argues that there is no inherent trade-off between more traditional high-quality communication mechanisms such as face-to-face conversation and interactions on the Internet that may be considered more superficial. The Internet is not a distinctly separate space from offline interactions where individuals in one space can not interact with those in the other space. The reality is that people no longer discuss how the telephone has negatively impacted real-life relationships and lessened the value of face-to-face communication. The telephone is embraced as a communication tool for which certain messages are appropriate. There are those who believe there is a danger that online communication will hurt real-life relationships (Bernstein, 2009). If Baym s communication channels are extended to include social network sites such as Facebook then it is likely that as adoption increases, becomes pervasive and routinized that social network site users will be able to appropriately determine which messages are best suited for these social networks. Social network sites will be valued as an appropriate channel for some messages while other channels will be valued for other messages. 2.4 Online Etiquette/Netiquette There are often rules that govern what can be posted in a given Internet-based forum. These rules can be both formal and informal. Formal rules are written and explicitly identify speech that is considered acceptable and unacceptable. Informal rules place normative barriers to certain behaviors; approximately 15% of all messages in Usenet forums are considered conduct-correcting (Smith et al., 1997). Forums can have specific rules about acceptable posting behavior and can control

10 2 Literature Review and Background 8 the content of the forum through the use of moderating practices (Chua, 2009). Designated forum moderators can screen, reject and remove messages that violate a forum s posting policy. There are trade-offs between the use of moderators to control the types of messages that can be posted to forums. Moderators can increase the percentage of on-topic posts compared to unmoderated forums by screening posts that are off-topic or otherwise problematic (Chua, 2009). Moderated forums can increase the sense of collective identity by keeping a community on-topic. Moderated forums can also reduce the free interchange of ideas and silence speech in forums where multiple groups with separate identities may wish to discuss a topic of overlapping interest (Chua, 2009). There can be trade-offs between a stronger community identity and the free exchange of ideas and forums will value these trade-offs differently. Moving a forum from an unmoderated policy to a moderated policy is considered a final step after normative measures fail to curtail unwanted behavior (Blanchard, 2004). Facebook has formal rules which govern posting behavior 4 and allows users to act as the moderator for their personal Wall. The rules include prohibitions against certain commercial speech (spam and multi-level marketing), content, illegal activity, and bullying behavior. Prohibited content includes that which is: hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence. The legal prohibitions include speech that is: unlawful, misleading, malicious, or discriminatory. Behavior that is directed toward an individual which is used to: bully, intimidate, or harass any user is prohibited. Facebook says that, The Wall is the center of your profile for adding new things, like photos, videos, notes and other application content. 5 Facebook users can can act as the moderator to the messages that others post on their personal wall. 6 Users can restrict whether others can post on their wall through privacy settings and remove offending posts. Facebook currently does not provide the ability to review posts before they are posted to the Wall. Facebook provides similar tools that are available to forum moderators; Facebook users can remove offensive posts from their wall and remove the individual completely

11 3 Initial Model 9 from the local subspace by choosing to unfriend the person. 3 Initial Model An initial model was developed to examine online and offline reasons for unfriending (Figure 1 on page 12). The questions were developed from a variety of sources. Literature review included a variety of communications based research articles about conversation, friendship and dissolution (Oliver, 1961; Owens, 2003; Bushman and Holt-Lundstad, 2009; Parks and Floyd, 1996; McPherson et al., 2001; Hartup and Stevens, 1999; Riva, 2001; Sternberg, 2000). The popular press has written numerous articles about unfriending e.g.: Boston Globe (2009) To Unfriend or Not To Unfriend, 7 Bloomington Pantagraph (2009): In the world of Facebook, it s OK to unfriend some people, 8 Cosmopolitan (undated) 10 Signs You Should Unfriend Someone on Facebook. 9 Blogs also offer advice on who to unfriend e.g.: From Mashable: 12 Great Tales of De-friending, 10 from Gawker: The Eight Types of People to unfollow on Twitter or Defriend on Facebook, 11 from The Frisky: 8 Signs You Should Unfriend Someone on Facebook, 12 from associatedcontent: When should you Unfriend Someone on Facebook 13, Timesunion.com (2010) 7 reasons to unfriend someone on Facebook. 14 The survey questions were designed through literature review and informal interviews with a variety of Facebook users to determine the types of friends who they unfriended and online posting behavior. Open ended questions were asked of 10 Facebook users to determine what kinds of 7 unfriend.html 8 html or-defriend-on-facebook facebook/ 13 someone_on.html 14

12 4 Instrument Design 10 people they have friended and unfriended, what kinds of posts they see on Facebook, how they were affected by an unfriending, have they unfriended someone on Facebook, and, if so, why. The researchers also asked what kinds of posts for which they may have unfriended. This stage of question development focused solely on online reasons for unfriending. A question was posted on an internet forum (beginner triathlete) that asked for reasons why forum users believed they were unfriended and forum users unfriended others. 56 responses were received from the forum to validate online and offline reasons for unfriending. After an initial survey was developed, five people were asked questions orally by the researchers to determine appropriateness and completeness. The online survey was pretested by six Facebook users to determine whether there would be difficulty completing the survey, survey length, completeness, etc. Twenty one questions were developed to examine online reasons for unfriending and twelve questions for offline reasons - see Table 1. and Table 2.. The questions are grouped into subgroups based on relational factors and interpretation. The online questions are grouped into three groups: posting frequency, inflammatory topics and banal topics. The offline questions are grouped into two subgroups: disliked behavior/personality and changes in the relationship to reflect offline reasons for unfriending. Exploratory factor analysis will be used in the study to determine appropriate constructs and a final model will be developed. 4 Instrument Design The survey was conducted solely on the Internet using a commercially available survey tool. The survey questions are a combination of established questions from previous studies and new questions to examine friendship dissolution in online settings plus demographic questions. The survey opens with a cover letter to introduce the survey using the Total Design Method by Dillman (1978).

13 4 Instrument Design 11 Table 1. : Online Questions and Sources Question Source Frequency Interview, Oliver, 1961, Boston Globe, Gawker Politics Interview, Oliver, 1961; McPherson et al., 2001; Chua, 2009; Gilbert and Karahalios, 2009, Mashable, The Frisky Religion Interview, Oliver (1961); McPherson et al. (2001); Chua (2009), Gawker, The Frisky Sex Mashable, Times Union, Gawker Money Owens (2003) Unflattering Interview, Oliver (1961); Chua (2009), Mashable, associated content Racist Interview, Chua (2009); Nielsen (2002), Facebook Policy on hate speech Sexist Nielsen (2002) Swearing Interview, Oliver, 1961; Riva, 2001 Inappropriately Interview, Oliver (1961); Riva (2001), associated content, Gawker, The Frisky Unimportant Interview, Oliver (1961); Chua (2009), Cosmopolitan, Gawker Eating Habits Interview, Randaza, 2009, Cosmopolitan, Times Union Exercise Habits Randaza, 2009, Cosmopolitan, Times Union Sports Scores Interview, Mashable Celebrities Randaza, 2009 Purchases Randaza, 2009 Promotion Interview, Riva (2001); Randaza (2009), Mashable, Times Union, The Frisky Job Oliver (1961), Times Union, Mashable Child Interview, Cosmopolitan Spouse Interview Pets Interview

14 4 Instrument Design 12 Fig. 1: Initial Model

15 4 Instrument Design 13 Table 2. : Offline Questions and Sources Question Source Did Misdeed Metts (1994) Dislike Owens (2003); Sprecher and Fehr (1998) Behavior Owens (2003); McPherson et al. (2001); Metts (1994) Betray Sprecher and Fehr (1998); Metts (1994) Broke Rule Metts (1994) Personality Owens (2003) Trust Owens (2003); Metts (1994), associated content New Information Sprecher and Fehr (1998); Metts (1994) Incompatible Owens (2003); Sprecher and Fehr (1998), associated content Friends Geography Owens (2003); Sprecher and Fehr (1998); McPherson et al. (2001) Divorce Sprecher and Fehr (1998); Metts (1994) Romantic End Sprecher and Fehr (1998); Metts (1994) The survey screens users to determine if the person is over 18 and a Facebook user. The survey was approved by the Colorado Multiple Institutional Review Board at the University of Colorado Denver (protocol # ). The survey is divided into four sections. Part one of the survey asks whether the survey respondent has unfriended someone on Facebook, and, if so, asks questions about that unfriending. Part two of the survey asks whether the survey respondent has ever been unfriended on Facebook, and, if so, asks questions about that unfriending. Part three of the survey asks questions about Facebook usage, and part four asks demographic questions. The behavioral sections used 7-point Likert-type questions and were presented in a randomized order. Demographic questions and categorical questions were multiple choice. The survey was designed to take approximately fifteen minutes to complete. The path through the survey depended on answers to the questions. For example, if the respondent said they have never unfriended a person the survey tool would advance to the next section. Part one of the survey asked questions about the type of person unfriended, whether it was for online or offline behavior, questions about the friendship and questions about online and offline behavior. Part two mirrors part one of the survey and asks questions about the type of person who

16 5 Data Collection 14 unfriended the survey respondent, their perception of whether it was for online or offline behavior, questions about the friendship and questions about their offline behavior. Part two adds additional questions to part one to determine how the survey respondent was affected by the unfriending. Part three asks questions about how many friends the survey respondent has, how many people they have unfriended, how many people they regularly interact with, and questions about their online posting behavior. Part three also asks questions about satisfaction, perceived usefulness and perceived ease of use of Facebook. Part four asks demographic questions: age, gender, education, the number of years of social network use and whether the person lives in the United States of America. The questions about online and offline behavior are largely exploratory. Components were not identified during the survey design and factor analysis would later partition the data into meaningful subgroups. 5 Data Collection Survey respondents were recruited from Twitter. Twitter respondents were gathered by screening tweets that had the term unfriend, defriend, or unfriending. Tweet messages, known as tweets, that met a screening criteria were sent replies inviting the person to take the survey about unfriending. Tweets that were not considered for the study include: non-english tweets, unfriending tweets that were not about people but about something else (TV shows, politicians, states, etc.), tweets about news articles about unfriending, tweets that appeared to be jokes (some that specifically included LOL), inflammatory tweets, and some short tweets that just included the word unfriend. Tweets were only sent to people who were writing about unfriending in English. That is, there are tweets that were written in a different language (e.g. German) with the English word unfriend in it and that person would not receive a reply asking them to take the survey. Occasionally the tweet reply was retweeted by those who received the initial tweet. The sample did not seek out expert opinions on social network sites because those responses might be biased.

17 6 Methodology 15 There is not a random sample in this research; a convenience sampling method was used to recruit participants. Surveys were collected between April 17th and July 17, A total of 2,084 surveys were started and 1,137 were completed. A total of 4,961 recruitment tweets were sent to Twitter users during the recruitment period. 54.6% of those who started the survey completed the survey and the mortality rate was 45.4%. The response rate for those who completed the survey is 22.9% (1,137/4,961). The overall response rate, that is people who came to the survey and started the survey, is 42.0% (2,084/4,961). The total number of tweets sent from the recruitment account is 6,935. The tweets that were sent beyond the 4,961 tweets were responses to questions about the survey, responses to thanks, questions about whether this account was a bot, etc. 71.5% of the the tweets were sent were the recruitment tweet. The Twitter account created, UnfriendStudy, was only used for the purpose of this study. The analysis uses all the data collected and is not limited to completed surveys only. 6 Methodology The raw data was collected from a commercially available survey tool (Survey Monkey) and analyzed with SPSS version 18. The survey is largely exploratory and used methods such as factor analysis to find commonalities among the questions asked. Factor analysis was used to partition questions into meaningful groups. Constructs were then generated based on the factor analysis and interpretation of the results and Cronbach s alpha measure of reliability was calculated. Crosstabulation techniques was used to determine the differences in actual frequencies vs. expected frequencies between different groups (for example those who unfriend for online vs. offline behavior) and determine the role of the friend request in unfriending decisions (the first research question). MANCOVA was used to determine whether survey takers had higher levels of agreement about posting topics or offline behavior based on their reason to unfriend (online vs. offline) which is the second research question.

18 6 Methodology 16 The constructs unimportant/frequent posts, polarizing posts, inappropriate posts, and everyday life were generated and used to examine online posting behavior. The constructs disliked behavior and change were generated and used to examine offline behavior. MANCOVA was used to determine the difference in the online and offline constructs based on the person s unfriending decision (online vs offline). Statistical tool selection is based on the appropriateness to the model and unit of analysis. MANOVA is used to analyze multiple dependent variables that are correlated with each other in a low to moderate level (Leech et al., 2008). Cross-tabulation techniques are used to calculate the expected frequency in a cell and compare the expected cell count to the actual cell count found in the data (Joseph F. Hair et al., 2006). MANCOVA is used to adjust for difference between the groups based on another typically interval-level variable called the covariate (Leech et al., 2008). The analysis uses unfriending decision (online vs. offline) as an independent variable in this analysis. The data in this analysis is about unfriendings that have occurred and does not try to generate a probability function for a future potential unfriending. That is, this research does not attempt to define a probability function to determine whether the dyad will remain friends in the future; this research only captures unfriendings that have already occurred. 84.0% of survey respondents could identify whether they unfriended a person for online or offline reasons with the rest unsure. The analysis presumes that the unfriending decision reflects why someone choose to unfriend the person. If differences are seen between the constructs for the online and offline behaviors (dependent variables) and the decision to unfriend (independent variable) then it is likely that those constructs are relevant in actual unfriending decisions and provide a basis of comparison. The results are most informative when the survey respondent said they unfriended someone for online reasons and differences are seen in the online posting behaviors compared to those who selected offline reasons or in factors where no differences are found. The decision to unfriend is an independent variable in the MANCOVA analysis. Exploratory methods and interpretation of the results can lead to subsequent hypothesis generation that can be confirmed or disproved by additional data collection (Joreskog, 1969). If con-

19 7 Results 17 firmatory methods are to be employed on a single data set then the dataset should be randomly divided into two sets: one set to generate the hypotheses and the other to confirm or disprove the hypotheses (Joreskog, 1969). Confirmatory research starts with a set of a priori hypotheses about a topic, develops a research design to test the hypotheses, data collection and analysis of the data (Jaeger and Halliday, 1998). Exploratory methods can be used to generate hypotheses which can be subsequently tested using confirmatory methods (Jaeger and Halliday, 1998). The goal of exploratory research is to gain new insights into a phenomenon and develop testable hypotheses. 7 Results 7.1 Friend Request Friend requests were analyzed to determine if there were differences in unfriending behavior based on who initiated the friend request. A total of 1553 friend requests were analyzed based on the survey respondent s decision to unfriend someone and the survey respondent s own unfriending. The survey respondent was asked to indicate who initiated the friend request in both their own decision to unfriend a person and an unfriending that happened to them. The survey included three choices, I asked this person to be my friend, This person asked me to be their friend, and I don t remember who asked. The results show that statistically significant differences in the expected and actual cell counts exist. The Chi-square test was 55.9 with 5 degrees of freedom; the two-tailed significance is.0001 which indicates that there are differences in unfriending behavior based on friend requests. The results are show in Table 3. There are three findings:

20 7 Results Survey respondents were more certain of who initiated the request when they did the unfriending compared to survey respondents who were being unfriended. The don t knows in the table are greater than expected when the survey respondent was unfriended by someone compared to when the survey respondent chose to unfriend someone. 2. Survey respondents who initiate the friend request are unfriended more often than expected. The number of unfriended by when the survey respondent initiates is greater than the expected count. 3. Survey respondents who receive the friend request make more than the expected number of unfriend decisions. The number of unfriend decisions when the other person initiated the friend request is greater than the expected count. Table 3. : Friend Request I initiated Other initiated DK Total Unfriend Decision Expected Unfriended By Expected Individual Factor Differences The individual factors were analyzed to determine how many people agreed with the statement about the person they unfriended and are shown in descending order by online or offline factors in Table 4. The individual factors for overall agree were analyzed using frequency statistics. The individual factors for online and offline factors were analyzed using cross-tabulations on the questions to determine if there are differences depending on whether an online or offline reason was

Unfriending on Facebook: Friend Request and Online/Offline Behavior Analysis

Unfriending on Facebook: Friend Request and Online/Offline Behavior Analysis Unfriending on Facebook: Friend Request and Online/Offline Behavior Analysis Christopher Sibona University of Colorado Denver, The Business School christopher.sibona@email.ucdenver.edu Steven Walczak University

More information

Social Media Guidance for Staff

Social Media Guidance for Staff Social Media Guidance for Staff May 2013 Social media guidance aims Establish practical and reasonable guidelines to help staff in their professional use of social media. Promote a safe environment to

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

TIPSHEET IMPROVING RESPONSE SCALES

TIPSHEET IMPROVING RESPONSE SCALES TIPSHEET IMPROVING RESPONSE SCALES As important as it is to have good question wording in a survey, it is equally important to have well constructed and reliable question response options. Researchers

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

Model Policy for a Law Enforcement Agency s use of Social Networking

Model Policy for a Law Enforcement Agency s use of Social Networking Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model

More information

2 nd Annual Social Media Study

2 nd Annual Social Media Study 2 nd Annual Social Media Study Contact: Aliza Freud CEO & Founder, SheSpeaks aliza@shespeaks.com October 20, 2009 Study Overview In 2008, we conducted a survey of our SheSpeaks members, to understand their

More information

Social Media Usage in Indian Information Technology Professionals

Social Media Usage in Indian Information Technology Professionals 11 Social Media Usage in Indian Information Technology Professionals Amol Kumar Gupta, Research Scholar, Department of Management, EIILM University, Sikkim Dr. Sangya Shrivastava, Director, Rai Business

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

Use of social media by college students: Relationship to communication and self-concept

Use of social media by college students: Relationship to communication and self-concept Use of social media by college students: Relationship to communication and self-concept Megan Sponcil Youngstown State University Priscilla Gitimu Youngstown State University ABSTRACT The purpose of this

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY

ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY The Dayton Public School District realizes that technology can greatly enhance the instructional program, as well as the

More information

(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).

(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). ELECTRONICALLY MEDIATED COMMUNICATION (EMC) Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). Examples of EMC Cell phones Computerconferencing Discussion boards

More information

Online Reputation in a Connected World

Online Reputation in a Connected World Online Reputation in a Connected World Abstract This research examines the expanding role of online reputation in both professional and personal lives. It studies how recruiters and HR professionals use

More information

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager 202.419.4372 RECOMMENDED CITATION: Duggan, M., Lenhart, A., Lampe,

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

POLICY. Responsible Use of Social Media

POLICY. Responsible Use of Social Media POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims

More information

mtvu / Associated Press Survey September 2010

mtvu / Associated Press Survey September 2010 Interviewing dates: Sept 20 - Sept 24, 2010 Interviews: 2,207 4-year college students age 18-24 Margin of error: +/- 3.0 Note: All results shown are percentages unless otherwise labeled. A "*" signifies

More information

SOCIAL NETWORKING. And Employment Considerations. Bonnie Curran, Human Resources Consultant University of Tennessee, MTAS.

SOCIAL NETWORKING. And Employment Considerations. Bonnie Curran, Human Resources Consultant University of Tennessee, MTAS. SOCIAL NETWORKING And Employment Considerations Bonnie Curran, Human Resources Consultant University of Tennessee, MTAS Page 1 of 20 SOCIAL NETWORKING Up to 300 million users (Sept. 2009) 100+ million

More information

Social Media Guidelines

Social Media Guidelines Northern Virginia Community College Social Media Guidelines social networks, social media, blogs, wikis and virtual worlds April 2013 (revised) 04.11.13 Page 1 Table of Contents Introduction 3 Connect

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Employees Viewpoint. Social Media inrecruitment. Part. Survey Report. Nov 2012. www.nuage-software.com

Employees Viewpoint. Social Media inrecruitment. Part. Survey Report. Nov 2012. www.nuage-software.com Social Media inrecruitment Part Survey Report Nov 2012 Nuage Software Pty Ltd 2012 Contents Executive Summary 1 The Question of Privacy 1 Recruiter perspective 2 Job seeker perspective 3 Survey Report

More information

Social Media Guidebook. by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca

Social Media Guidebook. by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca Social Media Guidebook by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca What is Social Media? Social media has become the catch-all term that we apply broadly to new computer-mediated communication

More information

University Schools Social Media Guidelines for Employees

University Schools Social Media Guidelines for Employees University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available

More information

The Effectiveness of Online Advertising: Consumer s Perceptions of Ads on Facebook, Twitter and YouTube

The Effectiveness of Online Advertising: Consumer s Perceptions of Ads on Facebook, Twitter and YouTube The Effectiveness of Online Advertising: Consumer s Perceptions of Ads on Facebook, Twitter and YouTube Bohdan Pikas Niagara University Gabi Sorrentino Niagara University The growth of Internet usage has

More information

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety

More information

How do members of the MSU community engage online? What it means to engage online is no different than what it means to engage offline.

How do members of the MSU community engage online? What it means to engage online is no different than what it means to engage offline. PAGE 1 OF 7 Introduction The Michigan State University (MSU) Guidelines for Social Media apply to Michigan State University faculty, staff, and student employees and interns who create or contribute to

More information

SOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES

SOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES SOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES The purpose of the Social Media and Digital Marketing Policy is to ensure the proper use of county social sites, web based marketing and technologies

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

The World Bank Group Policy on Eradicating Harassment Guidelines for Implementation

The World Bank Group Policy on Eradicating Harassment Guidelines for Implementation 1.0 Introduction The World Bank Group Policy on Eradicating Harassment Guidelines for Implementation The World Bank Group is committed to fostering a workplace free of harassment and intimidation, where

More information

BERKELEY COLLEGE Equal Opportunity Policy

BERKELEY COLLEGE Equal Opportunity Policy BERKELEY COLLEGE Equal Opportunity Policy Purpose Recognizing that its diversity greatly enhances the workplace and opportunities for learning, Berkeley is firmly committed to providing all associates,

More information

Fair Employment Practices

Fair Employment Practices In the GE Community Fair Employment Practices (Policy 20.2) Issued: October 2000 Supersedes: April 1993 GE is committed to fair employment practices, including the prohibition against all forms of illegal

More information

YouTube is a video-sharing website on which users can upload, share and view videos.

YouTube is a video-sharing website on which users can upload, share and view videos. The Township of Centre Wellington s Social Media Policy December, 2015 Thousands of elected officials in all orders of government are using social media tools such as Twitter, Facebook and YouTube, to

More information

Title of paper: ROLE OF SOCIAL MEDIA MARKETING IN AUTOMOBILE SECTOR

Title of paper: ROLE OF SOCIAL MEDIA MARKETING IN AUTOMOBILE SECTOR Title of paper: ROLE OF SOCIAL MEDIA MARKETING IN AUTOMOBILE SECTOR Authors: 1. Prof. Priyanka Shah Asst. Prof. Shri Chimanbhai Patel Institute of Management & Research 2. Prof. Anu Gupta Asst. Prof. Shri

More information

How to Get More Value from Your Survey Data

How to Get More Value from Your Survey Data Technical report How to Get More Value from Your Survey Data Discover four advanced analysis techniques that make survey research more effective Table of contents Introduction..............................................................2

More information

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS Nipul Patel, Purdue University North Central, npatel@pnc.edu Hetal Jasani, Northern Kentucky University, jasanih1@nku.edu ABSTRACT The introduction

More information

Chapter VIII Customers Perception Regarding Health Insurance

Chapter VIII Customers Perception Regarding Health Insurance Chapter VIII Customers Perception Regarding Health Insurance This chapter deals with the analysis of customers perception regarding health insurance and involves its examination at series of stages i.e.

More information

BRIGHAM AND WOMEN S HOSPITAL

BRIGHAM AND WOMEN S HOSPITAL BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy

More information

MARKET ANALYSIS OF STUDENT S ATTITUDES ABOUT CREDIT CARDS

MARKET ANALYSIS OF STUDENT S ATTITUDES ABOUT CREDIT CARDS 9 J.C. Arias, Robert Miller 23 MARKET ANALYSIS OF STUDENT S ATTITUDES ABOUT CREDIT CARDS J.C. Arias (PhD, DBA), Robert Miller Abstract The attitudes of students to the use of credit cards is a complex

More information

Teen Online Safety & Digital Reputation Survey

Teen Online Safety & Digital Reputation Survey Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

Pacific Northwest University of Health Sciences

Pacific Northwest University of Health Sciences Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,

More information

Hosting Motivation and Satisfaction Study:

Hosting Motivation and Satisfaction Study: Hosting Motivation and Satisfaction Study: Feedback from 2006-07 Long-Term Exchange Students, Host Families, and Host School Conducted by surveying a random selection of participants from exchange programs

More information

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Auburn University at Montgomery Policies and Procedures

Auburn University at Montgomery Policies and Procedures Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created

More information

Premium Advertising Sweden UK France Germany

Premium Advertising Sweden UK France Germany Premium Advertising Sweden UK France Germany On behalf of Widespace 05.11.2015 Content Study design Management Summary Sample Results Total Sweden UK France Germany Contact 2 Study design Study characteristics

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

Politics on Social Networking Sites

Politics on Social Networking Sites SEPTEMBER 4, 2012 Politics on Social Networking Sites Campaign and policy-related material on SNS plays a modest role in influencing most users views and political activities. Democrats and liberals are

More information

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students

More information

Social Journalism Study 2013 United Kingdom. Report by Cision & Canterbury Christ Church University (UK)

Social Journalism Study 2013 United Kingdom. Report by Cision & Canterbury Christ Church University (UK) Social Journalism Study 2013 United Kingdom Report by Cision & Canterbury Christ Church University (UK) 1. Executive Summary Social media is now an everyday professional tool with 96% of UK journalists

More information

ACSI Advertising Guidelines Advertising Philosophy

ACSI Advertising Guidelines Advertising Philosophy ACSI Advertising Guidelines Advertising Philosophy Thank you for helping fund the work of the Association of Christian Schools International (ACSI) by advertising with us. Please be aware that ACSI will

More information

MINNETONKA PUBLIC SCHOOLS

MINNETONKA PUBLIC SCHOOLS MINNETONKA PUBLIC SCHOOLS Policy #470: Employee Use of Social Media I. PURPOSE As a national leader in using technology as an accelerator of learning, the Minnetonka School District recognizes the value

More information

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics Best Practices for the Use of Social Media Summer 2011 Belmont University Athletics Overview The rapid growth of social media technologies combined with their ease of use and pervasiveness make them attractive

More information

Americans and their cell phones

Americans and their cell phones Americans and their cell phones Mobile devices help people solve problems and stave off boredom, but create some new challenges and annoyances Aaron Smith, Senior Research Specialist 8/15/2011 http://pewinternet.org/reports/2011/cell-phones.aspx

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions

More information

Incorporating Social Media into a Technical Content Strategy White Paper

Incorporating Social Media into a Technical Content Strategy White Paper Incorporating Social Media into a Technical Content Strategy White Paper Authored by Bill Gearhart, Comtech Services, Inc. USER-GENERATED CONTENT Table of Contents Table of Contents Introduction...2 Selected

More information

The Negative Effects of Social Media on Children and Young Adults

The Negative Effects of Social Media on Children and Young Adults The Negative Effects of Social Media on Children and Young Adults How can we reduce the negative effects of social media on children and young adults? Overview What is Social Media? Social media is defined

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Essential Communication Methods for Today s Public Social Media 101. Presented by Tom D. Trimble, CIO Tulsa County Government

Essential Communication Methods for Today s Public Social Media 101. Presented by Tom D. Trimble, CIO Tulsa County Government Essential Communication Methods for Today s Public Social Media 101 Presented by Tom D. Trimble, CIO Tulsa County Government What you will learn today Why Social Media is important to you Today s Social

More information

Profiles and Data Analysis. 5.1 Introduction

Profiles and Data Analysis. 5.1 Introduction Profiles and Data Analysis PROFILES AND DATA ANALYSIS 5.1 Introduction The survey of consumers numbering 617, spread across the three geographical areas, of the state of Kerala, who have given information

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy DISTRICT COUNCIL OF LOXTON WAIKERIE Social Media Policy Policy Identification: Adoption Date: 20 April 2012 Last Review: 17 April 2015 Next Review Date: April 2017 Every 2 years Responsible Officer(s):

More information

Effects of Social Networks on Social Life of Undergraduate Students

Effects of Social Networks on Social Life of Undergraduate Students 4 Effects of Social Networks on Social Life of Undergraduate Students Cenk AKBIYIK Erciyes University Faculty of Education, Kayseri Turkey cenkakbiyik@gmail.com Abstract The aim of the study is to determine

More information

Non-Discrimination and Anti-Harassment Policy OP 03.03

Non-Discrimination and Anti-Harassment Policy OP 03.03 Non-Discrimination and Anti-Harassment Policy OP 03.03 Policy Mississippi State University is committed to assuring that the University and its programs are free from discrimination and harassment based

More information

SEXUAL ORIENTATION. Summary of the law on

SEXUAL ORIENTATION. Summary of the law on Summary of the law on SEXUAL ORIENTATION DISCRIMINATION This booklet sets out the basic employment rights to which workers are entitled under the sexual orientation discrimination provisions of the Equality

More information

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD AUGUST 26, 2014

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD AUGUST 26, 2014 NUMBERS, FACTS AND TRENDS SHAPING THE WORLD AUGUST 26, 2014 Facebook, Twitter, and other platforms did not provide new outlets for the discussion of the Snowden-NSA revelations. In fact, people were less

More information

in Switzerland. 1 The total values reported in the tables and

in Switzerland. 1 The total values reported in the tables and 1 in Switzerland. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March

More information

Gwinnett United In Drug Education, Inc. Social Media Policy. Page 1 Updated 1-11-15

Gwinnett United In Drug Education, Inc. Social Media Policy. Page 1 Updated 1-11-15 Gwinnett United In Drug Education, Inc. Social Media Policy Page 1 Updated 1-11-15 Introduction Gwinnett United in Drug Education, Inc. (GUIDE) recognizes the importance of social media to interact with

More information

Agent Social Media Policy

Agent Social Media Policy Agent Social Media Policy Addendum to the Agent Advertising Guidelines November 2013 For agent use only. not to be used for consumer solicitation purposes. Addendum to Agent Advertising Guidelines Agent/Producer

More information

Making the Connection

Making the Connection Making the Connection How Facebook is changing the supervisory relationship Strategy Wins. Making the Connection How Facebook is changing the supervisory relationship Like the telephone, fax machine and

More information

PERCEPTION OF SENIOR CITIZEN RESPONDENTS AS TO REVERSE MORTGAGE SCHEME

PERCEPTION OF SENIOR CITIZEN RESPONDENTS AS TO REVERSE MORTGAGE SCHEME CHAPTER- V PERCEPTION OF SENIOR CITIZEN RESPONDENTS AS TO REVERSE MORTGAGE SCHEME 5.1 Introduction The present study intended to investigate the senior citizen s retirement planning and their perception

More information

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District Acceptable Use and Internet Safety Policy FOR THE COMPUTER NETWORK OF THE Bloom Vernon Local School District (Read and retain this document for future reference. Sign and return page 7 ONLY.) The Bloom

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Abstract. Introduction

Abstract. Introduction TURIZAM Volume 13 Issue 1, 51-56 (2009) Facebook as a Means of Promotion of Tourist Agencies Specialized for Youth Travel in Croatia and Serbia Iva Slivar* Received: May 2009 Accepted: August 2009 Abstract

More information

The Effects of Demographics on Consumer Perceptions of Identity Theft in Rural and Urban Settings

The Effects of Demographics on Consumer Perceptions of Identity Theft in Rural and Urban Settings The Effects of Demographics on Consumer Perceptions of Identity Theft in Rural and Urban Settings Axton Betz, Ph.D. Student, Iowa State University 1 Identity theft is a serious crime in which an individual

More information

Social Media Guidelines and Best Practices January 2016

Social Media Guidelines and Best Practices January 2016 Social Media Guidelines and Best Practices January 2016 Social media has changed the way the world communicates. As an institution of higher education, Youngstown State University embraces new technologies

More information

Division: Chapter: Policy:

Division: Chapter: Policy: State of North Carolina Department of Public Safety POLICY REQUIREMENTS & PROCEDURES Division: Chapter: Policy: ADMINISTRATION COMMUNICATIONS SOCIAL MEDIA ADMINISTRATION Issue Date: August 13, 2013 Revised:

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Anti Harassment and Bullying Policy

Anti Harassment and Bullying Policy Anti Harassment and Bullying Policy Document Control Title : Anti Harassment and Bullying Policy Applicable to : All Staff and Executive Officers Date last reviewed : February 2014 Procedure Owner : People

More information

IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING

IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING 1 JithiKrishna P P, 2 Suresh Kumar R, 3 Sreejesh V K 1 Mtech Computer Science and Security LBS College of Engineering Kasaragod, Kerala

More information

Prof,Sanjay Hanji Associate Professor Department of Management Studies Basaveshwar Engineering College, Bagalkot Karnataka, India

Prof,Sanjay Hanji Associate Professor Department of Management Studies Basaveshwar Engineering College, Bagalkot Karnataka, India Study On Recruitment through Social Media Networking Sites Prof,Brijmohan Vyas Assistant Professor Department of Management Studies brijmohanvays11@gmail.com Miss, Rohini Mirji Final year Student Department

More information

Rule 5 Relationship to Students, Employees, and Others

Rule 5 Relationship to Students, Employees, and Others 5.01 Supervision Rule 5 Rule 5 Relationship to Students, Employees, and Others 5.01 SUPERVISION Application 5.01 (1) In this rule, a non-lawyer does not include an articled student. Direct Supervision

More information

Implications of Social Networking Sites in Modern Environment

Implications of Social Networking Sites in Modern Environment International Journal of Education and Information Studies. ISSN 2277-3169 Volume 2, Number 1 (2012), pp. 9-14 Research India Publications http://www.ripublication.com/ijeis.htm Implications of Social

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes)

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes) Liverpool Hope University Equality and Diversity Policy Approved by: University Council Date approved: 14.04.2011 Revised (statutory 18.02.2012 changes) Consistent with its Mission, Liverpool Hope strives

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Social and Digital Media Policy

Social and Digital Media Policy Social and Digital Media Policy October 2012 Version 1.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to

More information

Mobile Apps: What Consumers Really Need and Want. A Global Study of Consumers Expectations and Experiences of Mobile Applications

Mobile Apps: What Consumers Really Need and Want. A Global Study of Consumers Expectations and Experiences of Mobile Applications Mobile Apps: What Consumers Really Need and Want A Global Study of Consumers Expectations and Experiences of Mobile Applications The Difference Between a Mobile App and a Mobile Website Before we evaluate

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Social Media. Policies & Handbook

Social Media. Policies & Handbook Social Media Policies & Handbook Centenary College supports the use of social media to connect with students, colleagues, and alumni. This handbook explains how to do so effectively and safely within the

More information

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to

More information

A STUDY ON THE INFLUENCE OF SOCIAL NETWORKING SITES ON THE INTERPERSONAL RELATIONSHIPS OF COLLEGE STUDENTS IN CHENNAI AND COIMBATORE CITIES OF INDIA

A STUDY ON THE INFLUENCE OF SOCIAL NETWORKING SITES ON THE INTERPERSONAL RELATIONSHIPS OF COLLEGE STUDENTS IN CHENNAI AND COIMBATORE CITIES OF INDIA A STUDY ON THE INFLUENCE OF SOCIAL NETWORKING SITES ON THE INTERPERSONAL RELATIONSHIPS OF COLLEGE STUDENTS IN CHENNAI AND COIMBATORE CITIES OF INDIA *PurinatYamakanith, Research scholar, School of Commerce,

More information

Catholic Diocese of Fort Worth Social Media Policy

Catholic Diocese of Fort Worth Social Media Policy Catholic Diocese of Fort Worth Social Media Policy General Policy Social media represents a broad group of digital technologies whose content is driven entirely by its members. Individuals are allowed

More information

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such

More information