Send a link to your students to track their progress
114 Terms
1
New cards
Definiton: Phishing
is when malicious websites entice users to reveal their personal information by masquerading as trustworthy websites (such as banks)
2
New cards
Definiton: Email spam
is unsolicited, commercial messages that sometimes host malware or phishing links
3
New cards
Definiton: Astroturfing
is the practice of using fake online accounts and identities to give the impression that an organization, individual, or idea is more popular than it actually is (e.g., by leaving favorable comments or bestowing likes)
4
New cards
Definiton: Butler lies
serve the function of managing one's availability for current or future interpersonal contact with one's interlocutor
Ex. "On my way" when you haven't left yet; "can't wait to see you" when you don't mean it
5
New cards
Definition: idealized virtual-identity hypothesis
users should take advantage of unlimited composition time and edit-ability in order to compose embellished versions of self that can impress audiences
6
New cards
Definition: extended real-life hypothesis
SNS profiles should accurately portray users' personalities, because users do not want to come across as deceptive in front of audiences who know them well.
7
New cards
Definition: Self-other symmetry
is a well-documented social bias suggesting that people view themselves more favorably than others, and they judge others more harshly than themselves
8
New cards
How does self-other symmetry apply to online deception?
is regarded as an undesirable behavior and the self-other asymmetry gap widens when people are asked about the prevalence of deception in mediated (rather than FtF) environments, which suggests that people have unique biases about the deceptive qualities inherent to online interactions
9
New cards
Definition: Cyberbullying
is an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself
10
New cards
Definition: Cyber aggression
refers to intentional harmful actions that are perpetrated via technology but that do not include an imbalance of power or repetition
11
New cards
Definition: Cyber inactivity
is rude/discourteous behaviors occurring through Information and Communication Technologies (ICTs) such as e-mail or text messages
\- Doesn't have a power imbalance, like cyberbullying does
12
New cards
Definition: Direct cyberbullying
refers to aggressive acts limited to just the perpetrator and victim
13
New cards
Definition: Indirect cyberbullying
on the other hand, occurs on multiple media platforms and has the potential to involve a much larger audience than just the victim and perpetrator
14
New cards
What negative consequences/outcomes do victims of cyberbullying often experience?
Higher levels of anxiety, depression, loneliness, greater suicidal ideation, lower levels of self-esteem, and poor academic performance
15
New cards
How does personality, beliefs, and behaviors predict being a cyberbully victim?
More technology use, gender, race, body dissatisfaction
16
New cards
According to researchers, what parental behaviors can be done to protect children from cyberbullying?
According to researchers, how do personality, beliefs, and behaviors predict being a cyberbully perpetrator?
Cyberbully perpetrators are likely to have low self-esteem, low cognitive or affective empathy, psychopathy, narcissism, Machiavellianism
18
New cards
What are the four types of social media, a classification based on the nature of connections among users and directedness of communications?
(1) broadcast self-media: twitter
(2) targeted relationship media: Facebook, WeChat
(3) collaboration media: Wikipedia, Quora
(4) creative outlets: YouTube
19
New cards
What are the major motivations for using social media?
\- Need for information
\- Need for entertainment
\- Need for social connection
\- Need for strengthening ego
\- Need for self-actualization
20
New cards
Definition: Flow
Users may be intensely engaged in social media with a distorted sense of time, loss of self-consciousness, and exclusion of all other thoughts
21
New cards
What are the different types of privacy management tactics?
\- Network-based
\- Platform-based
\- Content-based
\- Profile-based
22
New cards
Definition: Platform-based
Some users choose to use the social media sites' privacy settings to control who sees their posts. A common approach on Facebook is to change the setting to be "friends only," so that only a user's friends may see their posts.
23
New cards
Definition: Network-based
Social media users decide who to friend or follow, therefore filtering their network of people. Some Facebook users avoid friending people they do not know.
24
New cards
Definition: Profile-based
A less commonly used approach is to create multiple accounts (on a single platform, or across platforms). For example, a professional, personal, and fun account.
25
New cards
What are the distinct privacy boundaries relevant to social media?
1\. Relationship
2\. Network
3\. Territorial
4\. Disclosure
5\. Interactional
26
New cards
What are examples of ways Relationship boundaries can be regulated?
This involves regulating who is in one's social network as well as appropriate interactions for each relationship type
27
New cards
What are examples of ways Network boundaries can be regulated?
This consists of regulating access to one's social connections as well as interactions between those connections
28
New cards
What are examples of ways Territorial boundaries can be regulated?
This has to do with regulating what content comes in for personal consumption and what is available in interactional spaces
29
New cards
What are examples of ways Disclosure boundaries can be regulated?
The literature commonly focuses on this aspect which consists of regulating what personal and co-owned information is disclosed to one's social network
30
New cards
What are examples of ways Interactional boundaries can be regulated?
This applies to regulating potential interaction with those within and outside of one's social network.
31
New cards
What are the coping strategies for maintaining one's privacy on social media?
\- Filtering
\- Ignoring
\- Blocking
\- Withdrawal
\- Aggression
\- Compliance
\- Compromise
32
New cards
Definition: Deception
Deliberately inducing in another a belief that the deceiver knows is false
33
New cards
What are some factors about Deception?
\- The deceiver needs to convince the receiver that what they're saying is true
\- For this class, deception and lies are the same thing
\- Both verbal and nonverbal
34
New cards
what is verbal deception?
saying something false
35
New cards
what is nonverbal deception?
what the deceiver does to convince the receiver of the lie
\- Could take the form of controlling typical cues of lying (fidgeting, playing with hair, lack of eye contact)
36
New cards
What are the different deception theories?
\- Four-Factor model of deception
\- Interpersonal deception theory
37
New cards
Definition: Four-Factor model of deception
\- Attempted control
\- felt emotion
\- physiological arousal
\- cognitive processing
38
New cards
Definition: Interpersonal deception theory
As the deceiver becomes aware of the receiver's suspicions, they will change their behavior to re-convince the receiver
Definition: Attempted control (Four-Factor model of deception)
A deceiver's attempts to control what they're saying is a cue of deception. May appear bland, rehearsed, lacks spontaneity; It's difficult for a deceiver to control all aspects - facial expressions, words, body language, etc.
\- Lack of control causes leakage
40
New cards
Definition: Felt emotion (Four-Factor model of deception)
You can feel more positive emotions like joy if you feel you're getting away with deception but you can feel anxious if you're worried about getting away with deception
41
New cards
Definition: Physiological arousal (Four-Factor model of deception)
Types of responses that are detectable using a polygraph (heart rate, skin conductance)
Definition: Cognitive processing (Four-Factor model of deception)
Coming up with a lie is a lot of effort, More difficult than telling the truth - you have to remember more details to avoid inconsistencies
\- Pupil dilation also falls under cognitive processing
43
New cards
How difficult is to detect deception?
54% accuracy in detecting lies. Not much better than just guessing
44
New cards
Why are we poor lie detectors?
\- counter measures
\- No obvious indicators
\- Truth bias
45
New cards
Definition: counter measures
The moment a deceiver realizes someone will determine if they believe the lie or not, they will engage in counter measures to make it more convincing
Ex. you know you're taking a polygraph, you think of something that makes you anxious during the baseline measures so they get a warped perception of your results
46
New cards
Definition: Verbal counter measures
overcompensating with extra information based on lies
47
New cards
Definition: Nonverbal counter measures
limited measures that are associated with lying (touching face/ hair, fidgeting)
48
New cards
Definition: No obvious indicators
We won't actually turn into pinocchio/ have our noses grow
49
New cards
Definition: Truth bias
Tendency to assume other people are telling the truth. We're actually better at detecting truth than lies
50
New cards
What are the different types of online deception?
\- Identity-based deception
\- Message-based deception
\- False Information
\- Luring
51
New cards
What are the three different kinds of identity-based deception?
\- identity concealment
\- identity theft
\- identity forgery
52
New cards
What are the different kinds of false information?
\- fake news
\- rumors
\- fake reviews
\- misinformation vs disinformation
53
New cards
What are the two different kinds of luring?
\- spamming
\- phishing
54
New cards
Definition: Identity concealment
Occurs when an individual alters an aspect of their identity
Ex. using a dating app and leave out that they're currently in a relationship
55
New cards
Definition: Identity theft
More severe in that someone's identity was stolen
Ex. parody accounts for celebrities, pretending to be someone else on a dating app
56
New cards
Definition: Identity forgery
When an entirely new persona is created along with a unique history
57
New cards
Definition: Message-based deception
Deception that takes place in the communication between two people. Can be overlap between identity and messaged based deception
58
New cards
Definition: Fake news
News articles that are intentionally fake and verifiably false. Spreads faster than true news
59
New cards
Definition: Rumors
Information that isn't verified yet
60
New cards
Definition: Fake reviews
Made by people or bots, Aren't accurate reviews
61
New cards
Definition: Misinformation vs Disinformation
\- Misinformation is made without the intent to deceive common in situations where information is still developing
\- Disinformation is made with the intent to deceive
62
New cards
Definition: Problematic internet use (PIU)
"Use of the Internet that creates psychological, social, school, and/or work difficulties in a person's life"
\- Studied in the context of psychosocial well-being
63
New cards
Definition: Cognitive-behavioral theory of PIU
Distinct patterns of internet related cognitions and behaviors that result in negative outcomes
\- This study is trying to understand why people are online
\- Helps to explain why people are online instead of just how long they are online
64
New cards
Definition: Specific PIU
Overuse and abuse of content specific functions of the internet. Refers to how internet use can be the outcome of broader behavioral disorders. Things like addiction can manifest in internet use patterns (ex: online gambling, online pornography consumption)
65
New cards
Definition: Generalized PIU
How multidimensional overuse of the internet can result in negative outcomes
\- How our general use of internet can be negative, whereas specific is also based on preexisting behavioral disorders
\- Consequence of the internet, whereas specific PIU can be a predictor
66
New cards
Definition: Mere presence hypothesis
Argues that: Cell phones are going to act as an environmental distraction that's disruptive to our conversations
\- Lower conversation quality and satisfaction
67
New cards
What are the signs of a stalker?
\- Repeated, intrusive behavior
\- Unwanted by the victim
\- Threat (implicit or explicit)
\- Feeling of fear in victim
68
New cards
Implicit threat example:
perpetrator is demonstrating they're volatile in some way or can't control their behavior of wanting to communicate with or see the victim
69
New cards
Explicit threat example:
verbal threats
70
New cards
What are the behavior types of a stalker?
\- Surveillance
\- Communicating
\- Aggression or violence
71
New cards
Definition: ORI
Repeated unwanted pursuit and invasion of privacy by another person who desires and/or presumes an intimate relationship
72
New cards
Main distinction from stalking:
perpetrator desires or presumes an intimate relationship with the victim
\- Unwanted messages/gifts, covertly obtaining information, threaten to hurt self or others
73
New cards
Definition: SNSs
Web-based services that allow individuals to construct a public or semi-public profile
\- Articulate a list of users they share a connection with
\- View and traverse other's profiles
SNS is a form of social media
74
New cards
Definition: Social Media
"Internet-based channels that allow users to opportunistically interact and selectively self-present, either in real-time or asynchronously, with both broad and narrow audiences who derive value from user-generated content and the perception of interaction with others"
75
New cards
whats the key distinction of social media?
social media places a heavier emphasis on UGC and disseminating UGC, while SNS focuses on user-to-user interaction and relationship
76
New cards
What is SixDegrees.com?
One of the first SNS
● Users could create profiles, list friends, and surf friends' lists
● Before SixDegrees, there were sites with the ability to create a profile OR see friends, but never both
● Eventually was unsustainable, people were uninterested because there was so little to do
● Closed in 2000
77
New cards
What is LiveJournal?
Site with one-way connections
● You could post journal entries visible to your connections/friends list
78
New cards
What is Ryze.com?
Focused on business connections
79
New cards
What is Friendster?
Came out of Ryze.com, was the social component
● Implemented to compete with Match.com
● Help friends of friends meet each other; they thought people would have better romantic connections if they had mutual friends
● Complications: not built for how often and how many people used it, people were creating profiles in a way Friendster hadn't anticipated (parody accounts, bands, celebrity spoofs)
80
New cards
Which SNS became mainstream?
Myspace, Facebook, Twitter and Instagram
81
New cards
Definition: The profile element
Meant to show who the user is to the audience
82
New cards
What are the elements of a profile?
\- Self-presentation
\- Challenge of authenticity
\- Affordances
83
New cards
what are the affordances of SNS elements?
● Privacy
● Visibility
● Audience transparency
84
New cards
What are the elements of a network?
\- Social mobilization
\- Loneliness
\- There are benefits to growing our networks online
\- Maintaining weaker connections (ex. Rachel is still 'friends' with people from high school)
85
New cards
What are the elements of a stream?
Posts, text status, reactions to posts, comments, suggested content and ads
\- Active and passive use
\- social comparison
\- Envy
86
New cards
What are the active elements of stream?
interacting with posts, making your own posts
87
New cards
what are the passive elements of stream?
just scrolling through
88
New cards
What are the elements of message?
Allows us to form and maintain social connections
\- However, we feel pressure to constantly be connected
\- Social connectedness
\- Distraction
89
New cards
What are the different functions of SNSs?
\- Relationship maintenance
\- Relationship initiation
\- Relational reconnection
\- Identity experimentation
\- Information seeking
\- Metacommunication
90
New cards
Definition: Identity experimentation
Identity is complex and multifaceted. When we interact F2F, there are aspects of our identity that are more visible, but online you can control what aspects of your identity people can see or interact with
\- Online, we aren't limited by what we look like
91
New cards
Definition: Metacommunication
When we communicate with someone, there's a surface level idea of what we communicate about
\- Communication about communication
Ex. We reply to a post on Instagram, DMing someone about a party that you know you weren't invited to
92
New cards
Types of private information:
\- Social privacy
\- Institutional privacy
\- security privacy
93
New cards
Definition: Social privacy
How much info people know about you
\- Where you are, what you're doing
94
New cards
Definition: Institutional privacy
Organizations having information about you
- Not allowing search engines to see your history...
95
New cards
Definition: Security privacy
More malicious, identity theft, stealing
96
New cards
Why do people misperceive their online audience?
People underestimate their audience (someone can repost content, bots can steal or view information)
97
New cards
What is the third-person effect?
When you understand there's privacy concerns but don't do anything about it
\- More susceptible to media effects
\- "It's a concern for other people, but not for me"
98
New cards
What are elements of the Communication privacy management theory?
\- Private information -> personal ownership
\- ownership of information -> control over information flow
\- Privacy rules control information flow
\- Collective ownership
\- Privacy rules and boundary turbulence
99
New cards
Definition: Private information → personal ownership
Individuals equate private information with personal ownership (incorrect_
100
New cards
Definition: Ownership of information → control over information flow
Because they think they own the private information they think they can control the flow