School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 584, Information Ethics
Fall 2013

Effects of Computer-Mediated Communication on
Understandings of Identity and Relationships

Identity

Asai, R. (2010). NEKAMA men living different lives on the internet. INternational Review of Information Ethics, 13,12-19. http://www.i-r-i-e.net/issue13.htm.

Bollmer, G.D. (2013). Millions now living will never die: Cultural anxieties about the afterlife of information. The Information Society, 29(3), 142-151. [UNC libraries]

Brey, P. (1999). The ethics of representation and action in virtual reality. Ethics and Information Technology, 1(1), 5-14. [UNC libraries]

Cover, R. (2012). Performing and undoing identity online: Social networking, identity theories and the incompatibility of online profiles and friendship regimes. Convergence: The International Journal of Research into New Media Technologies, 18(2), 177-193. [UNC libraries]

Farquhar, L. (2013). Performing and interpreting identity through Facebook imagery. Convergence: The International Journal of Research into New Media Technologies, 19(4), 446-571. [UNC libraries]

Ford, P. J. (2001). A further analysis of the ethics of representation in virtual reality: Multi-user environments. Ethics and Information Technology, 3(2), 113-121. [UNC libraries]

Gilpin, D.R. (2011). Working the twittersphere: Microblogging as professional identity construction. In Papacharissi, Z. (ed.), A Networked Self: Identity, Community, and Culture on social Network Sites. New York: Routledge, 232-250. [Davis Library - HM742 .N49 2011]

Horner, D. S. (2001). Cyborgs and cyberspace: personal identity and moral agency. In Munt, S. R. (ed.), Technospaces: London: Continuum, 71-84. [SILS - T14 .T3955 2001]

Hyde, M. J., & Mitra, A. (2000). On the ethics of constructing a face in cyberspace: images of a university. In Berdayes, V., & Murphy, J. W. (eds.), Computers, Human Interaction, and Organizations: Critical Issues. Westport, CT: Praeger, 161-188 (particularly p.161-170). [SILS, Davis - QA76.9 .C66 C58 2000]

Kendall, L. (2002). Hanging Out in the Virtual Pub: Masculinities and Relationships Online. Berkeley: University of California Press. [Davis - HM851 .K46 2002]

Leung, L. (2003). Where am I and who are "we"? First Monday, 8(10). http://www.firstmonday.org/issues/issue8_10/leung/index.html.

Matthews, S. (2008). Identity and inforamtion technology. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 142-160. [Davis Library - T58.5 .I53745 2008]

McDonough, J. P. (1999). Designer selves: construction of technologically mediated identity within graphical, multiuser virtual environments. Journal of the American Society for Information Science, 50(10), 855-869. [UNC libraries]

McKenna, K.Y.A. (2007). Through the internet looking glass: Expressing and validating the true self. In Joinson, A.N., McKenna, K.Y.A., Postmes, T., & Reips, U.-D. (eds.), The Oxford Handbook of Internet Psychology. Oxford University Press, 205-222. [Davis Library - HM1017 .O94 2007]

Ostrow, A. (2011). After your final status update. TED talks. http://www.ted.com/talks/adam_ostrow_after_your_final_status_update.html.

Turkle, S. (1995). Introduction: Identity in the age of the Internet. In Life on the Screen: Identity in the Age of the Internet. 2nd ed. New York: Simon & Schuster, 9-26. [Davis - QA76.9 .C66 T87 1995]

Whitney, H. (2009). The counterfeit you. interactions, 16(2), 37-40. [ACM Digital Library]

Virtual Relationships and Community

Boden, D., & Molotch, H. (2004). Cyberspace meets the compulsion of proximity. In Graham, S. (ed.), Cybercities Reader. London: Routledge, 101-105. [SILS - T14.5 .C93 2004]

boyd, d. (2011). Social network sites as networked publics: Affordances, dynamics, and implications. In Papacharissi, Z. (ed.), A Networked Self: Identity, Community, and Culture on social Network Sites. New York: Routledge, 39-58. [Davis Library - HM742 .N49 2011]

Cocking, D. (2008). Plural selves and relational identity: Intimacy and privacy online. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 123-141. [Davis Library - T58.5 .I53745 2008]

Cocking, D., & Matthews, S. (2001). Unreal friends. Ethics and Information Technology, 2(4), 223-231. [UNC libraries]

Cummings, J. N., Butler, B., & Kraut, R. (2002). The quality of online social relationships. Communications of the ACM, 45(7), 103-108. [ACM Digital Library]

Di Gennaro, C., & Dutton, W.H. (2007). Reconfiguring friendships: Social relationships and the internet. Information, Communication, & Society, 10(5), 591-618. [UNC libraries]

Ellison, N.B., Hancock, J.T., & Toma, C.L. (2011). Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New Media & Society, 14(1), 45-62. [UNC libraries]

Ford, P. J. (2003). Virtually impacted: Designers, spheres of meaning, and virtual communities. In Wolf, M. J. P. (ed.), Virtual Morality: Morals, Ethics, & New Media. New York: Peter Lang, 79-93. [SILS - TK5105.875 .I57 V57 2003]

Galanxhi, H., & Nah, F.F.-H. (2007). Deception in cyberspace: A comparison of text-only vs. avatar-supported medium. International Journal of Human-Computer Studies, 65(9), 770-783. [UNC libraries]

Green, M.C. (2007). Trust and social interaction on the internet. In Joinson, A.N., et al. (eds.), The Oxford Handbook of Internet Psychology. Oxford University Press, 43-52. [Davis Library - HM1017.O94 2007]

Grodzinsky, F.S., & Tavani, H.T. (2007). The internet and community building at the local and global level: Some implications and challenges. In Capurro, R., Frühbauer, J., & Hausmanninger, T. (eds.), Localizing the Internet: Ethical Aspects in Intercultural Perspective. Munich: Wilhelm Fink, 135-149. [Davis - HM851 .L63 2007]

Hales, K. (2009). Ethical issues in relational maintenance via computer-mediated communication. Journal of Information, Communication & Ethics in Society, 7(1), 9-24. [Available via interlibrary loan or from instructor]

Hampton, K. (2004). Netville: Community on and offline in a wired suburb. In Graham, S. (ed.), Cybercities Reader. London: Routledge, 256-262. [SILS - T14.5 .C93 2004]

Hancock, J.T. (2007). Digital deception: Why, when and how people lie online. In Joinson, A.K., et al. (eds.), The Oxford Handbook of Internet Psychology. Oxford University Press, 289-302. [Davis Library - HM1017 .O94 2007]

Introna, L. D. (2002). The (im)possibility of ethics in the information age. Information and Organization, 12, 71-84. [SILS]

Introna, L.D. (2007). Virtual strangers: On the social and ethical conditions of virtual communities. In Capurro, R., Frühbauer, J., & Hausmanninger, T. (eds.), Localizing the Internet: Ethical Aspects in Intercultural Perspective. Munich: Wilhelm Fink, 95-108. [Davis - HM851 .L63 2007]

Pettit, P. (2008). Trust, reliance, and the internet. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 161-174. [Davis Library - T58.5 .I53745 2008]

Powers, T. M. (2003). Real wrongs in virtual communities. Ethics and Information Technology, 5(4), 191-198. [UNC libraries]

Räsänen, P., & Kouvo, A. (2007). Linked or divided by the Web? Internet use and sociability in four European countries. Information, Communication & Society, 10(2), 219-241. [UNC libraries]

Rogers, P., & Lea, M. (2005). Social presence in distributed group environments: The role of social identity. Behaviour & Information Technology, 24(2), 151-158. [UNC libraries]

Rooksby, E. (2003). Empathy in computer-mediated communication. In Wolf, M. J. P. (ed.), Virtual Morality: Morals, Ethics, & New Media. New York: Peter Lang, 39-62. [SILS - TK5105.875 .I57 V57 2003]

Rosen, D., Lafontaine, P.R., & Hendrickson, B. (2011). CouchSurfing: Belonging and trust in a globally cooperative online social network. New Media & Society, 13(6), 982-998. [UNC libraries]

Simpson, B. (2011). What happens online stays online? Virtual punishment in the real world. Information & Communications Technology Law, 20(1), 3-17. [UNC libraries]

Taylor, T. L. (2004). The social design of virtual worlds: Constructing the user and community through code. In Consalvo, M., et al. (eds.), Internet Research Annual: Selected Papers from the Association of Internet Researchers Conferences, 2000-2002, Volume 1. New York: Peter Lang, 260-268. [SILS - ZA4228 .I58 v.1 2000/02]

van Dijk, J. (2013). Facebook and the engineering of connectivity: A multi-layered approach to social media platforms. Convergence: The International Journal of Research into New Media Technologies, 19(2), 141-155. [UNC libraries]

Whitty, M.T., Buchanan, T., Joinson, A.N., & Meredith, A. (2012). Not all lies are spontaneous: An examination of deception across different modes of communication. Journal of the American Society for Information Science & Technology, 63(1), 208-216. [UNC libraries]

Yuan, E.J. (2013). A culturalist critique of 'online community' in new media studies. New Media & Society, 15(5), 665-679. [UNC libraries]

Power Relationships

Adam, A. (2002). Cyberstalking and Internet pornography: Gender and the gaze. Ethics and Information Technology, 4(2), 133-142. [UNC libraries]

Berlet, C. (2001). When hate went online. Adapted from a paper presented at the Northeast Sociological Association Spring Conference. http://simson.net/ref/leaderless/berlet_when_hate_went_online.pdf.

Doctor, R. (1998). Justice and social equity in cyberspace. In Stichler, R. N., & Hauptman, R. (Eds.), Ethics, Information, and Technology: Readings. Jefferson, NC: McFarland, 231-240. [Davis - P94 .E795 1998]

Richardson, C. (1996). Computers don't kill jobs, people do: Technology and power in the workplace. Annals of the American Academy of Political and Social Science, 544, 167-179. [UNC libraries]

Tavani, H. T., & Grodzinsky, F. S. (2002). Cyberstalking, personal privacy, and moral responsibility. Ethics and Information Technology, 4(2), 123-132. [UNC Libraries]

Thiesmeyer, L. (1999). Racism on the web: its rhetoric and marketing. Ethics and Information Technology, 1(2), 117-125. [UNC libraries]

Trust in Electronic Commerce

Camp, L. J. (2000). Trust and Risk in Internet Commerce. Cambridge, MA: MIT Press. [Davis - HF5548.32 .C355 2000; Electronic Book netLibrary]

Dinev, T. (2006). Why spoofing is serious internet fraud. Communications of the ACM, 49(10), 77-82. [ACM Digital Library]

Fogg, B. J., & Tseng, H. (1999). The elements of computer credibility. CHI 99: Human Factors in Computing Systems. Conference on Human Factors in Computing Systems (May 15-20, 1999, Pittsburgh). New York: ACM Press, 80-87. [ACM Digital Library]

Friedman, B., Kahn, P. H., Jr., & Howe, D. C. (2000). Trust online. Communications of the ACM, 43(12), 34-40. [ACM Digital Library]

Jones, S., Wilikens, M., Morris, P., & Masera, M. (2000). Trust requirements in e-business. Communications of the ACM, 43(12), 81-87. [ACM Digital Library]

Shneiderman, B. (2000). Designing trust into online experiences. Communications of the ACM, 43(12), 57-59. [ACM Digital Library]

Additional Readings

Baym, N. K. (1995). The emergence of community in computer-mediated communication. In Jones, S. G. (Ed.), CyberSociety: Computer-Mediated Communication and Community. London: Sage, 138-163. [Davis - TK5105.5 .C92 1995]

Castel, F. (2000). Exploring virtuality [Viewpoint]. Communications of the ACM, 43(2), 27-28. [ACM Digital Library]

Davies, W. (2003). You don't know me, but... Social capital and social software. London: iSociety & The Work Foundation. [http://www.theworkfoundation.com/research/isociety/social_capital_main.jsp]

Featherstone, M., & Burrows, R. (Eds.) (1995). Cyberspace/ Cyberbodies/ Cyberpunk: Cultures of Technological Embodiment. London: Sage. [Davis - GN298 .C934 1995]

Fortunati, L. (2005). Is body-to-body communication still the prototype? The Information Society, 21(1), 53-61. [UNC libraries]

Grodzinsky, F. S., & Tavani, H. T. (2002). Some ethical reflections on cyberstalking. Computers & Society, 32(1), 22-32. [ACM ]

Jones, S. G. (1995). Understanding community in the information age. In Jones, S. G. (Ed.), CyberSociety: Computer-Mediated Communication and Community. London: Sage, 10-35. (Pages 20-33 only.) [Davis - TK5105.5 .C92 1995]

Kavanaugh, A., & Schmitz, J. (2004). Talking in lists: The consequences of computer-mediated communication on communities. In Consalvo, M., et al. (eds.), Internet Research Annual: Selected Papers from teh Association of Internet Research Conferences, 2000-2002, Volume I. New York: Peter Lang, 250-259. [SILS Library - ZA4228 .I58 v.1 2000/02]

Kivimäki, K., Kauppinen, A., & Robinson, M. (1998). Identity in virtual communities. ACM SIGGROUP Bulletin, 19(3), 29-33. [ACM Digital Library]

Lewis, C., & Fabos, B. (2005). Instant messaging, literacies, and social identities. Reading Research Quarterly, 40(4), 470-501. [Online]

Miller, S. E. (1996). Community, diversity, and citizenship: Online ethics and the need for meaningful connections. In Civilizing Cyberspace: Policy, Power, and the Information Superhighway. New York: ACM Press; Reading, MA: Addison-Wesley, 319-340. [SILS, UL - HE7572 .U6 M55 1996]

Nardi, B. A., & O’Day, V. L. (1999). Wolf, Batgirl, and Starlight: Finding a real community in a virtual world. In Information Ecologies: Using Technology with Heart. Cambridge, MA: MIT Press, 105-138. [Davis – T14.5 .N344 1999]

Suh, K.-S., Kim, H., & Suh, E.K. (2011). What if your avatar looks like you? Dual-congruity perspectives for avatar use. MIS Quarterly, 35(3), 711-729. [UNC libraries]

Turkle, S. (1996). Who am we? Wired, 4(1), 148-152, 194-199. [http://www.wired.com/wired/archive/4.01/turkle.html]

Walker, R., & Bakopoulos, B. (2005). Conversations in the dark: How young people manage chatroom relationships. First Monday, 10(4). http://www.firstmonday.org/issues/issue10_4/walker/index.html.

Wellman, B. (1998). A computer network is a social network. SIGGROUP Bulletin, 19(3), 41-45. [ACM Digital Library]

Wynn, E. & Katz, J. E. (1997). Hyperbole over cyberspace: Self-presentation and social boundaries in Internet home pages and discourse. The Information Society, 13(4), 297-327. [UNC libraries]

Zurawski, N. (2004). Because it's important and out there: From real-life identity to virtual ethnicities. In Consalvo, M., et al. (eds.), Internet Research Annual: Selected Papers from the Association of Internet Researchers Conferences, 2000-2002, Volume 1. New York: Peter Lang, 205-215. [SILS - ZA4228 .I58 v.1 2000/02]


Return to INLS 584 Syllabus or INLS 584 Schedule


Creative Commons LicenseThe INLS 584 website, UNC-CH, 2013, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at wildemuth@unc.edu.
This page was last modified on October 9, 2013, by Barbara M. Wildemuth.