Interpersonal Communication A Mindful Approach to Relationships Interpersonal Communication in Mediated Contexts

Explore the Interpersonal Communication A Mindful Approach to Relationships Interpersonal Communication in Mediated Contexts study material pdf and utilize it for learning all the covered concepts as it always helps in improving the conceptual knowledge.

Subjects

Social Studies

Grade Levels

K12

Resource Type

PDF

Interpersonal Communication A Mindful Approach to Relationships Interpersonal Communication in Mediated Contexts PDF Download

Image A ra rom Chapter 12 Interpersonal Communication in Mediated In today World , We all spend a lot of time on various devices designed to make our lives easier . From smartphones to social media , we are all in constant contact with family , friends , coworkers , etc . Since the earliest days of communication technologies , we have always used these technologies to interact with one another . This chapter will examine how technology our interpersonal relationships . 406

and Communication . Explain the history of communication . Recognize some of the important figures in the creation of the Internet , the World Wide Web , and communication . ma 22 ( DEC LU ' Since net creation in 1969 , public access to the Internet and the creation of the World ( in 1991 , and the proliferation of Internet Service Providers ( through the late , the technology that shapes your life today and will shape your life tomorrow is still relatively new . Here are some relatively recent landmarks in social media sites , and apps ( 2003 ) iTunes ( 2003 ) Facebook ( YouTube ( 2005 ) Twitter ( 2006 ) iPhone ( 2007 ) Drop Box ( 2008 ) Docs ( 2009 ) 2010 ) 2011 ) Google Glass ( 2012 ) Oculus Rift ( 2013 ) and ( 2014 ) As you can imagine , just limiting this list is hard . Some of these products you re probably familiar with while others may be altogether new to you . From Math to Punch Cards Before we get started , it essential to understand the evolution of what we call ( communication or . Although in recent years some scholars have adopted the broader term communication and technology , we don think this is necessary , because a computer of some kind is always at the center of these communicative interactions . Figure 12 . a A Chinese by . This is licensed under the Creative Commons Attribution . So our question should be hat is , computer . In its earliest use , computers referred to people who performed massive numbers of calculations by hand 01 ' using a tool like an abacus ( Figure ) or slide rule ( Figure ) Figure Slide Rule As you can imagine , this process wasn exactly Vintage Compass Slide by Joe . This efficient and took a lot of human resources . The iS under 1116 2016 movie Hidden Figures relates the true story LIL ' I

of a group of African American computers who created the calculations to land the first Astronaut on the The first mechanical ancestor of the ' computer we have to ( lav was created in , 1801 by a Frenchman named Joseph Marie , who created a loom that used punched wooden cards to Weave fabric ( Figure ) The idea of punch cards would be the basis of many generations of computers up to the . Of course , the punch car ( went from being wood cards to cardboard or cardstock over the course of their . Some of the earliest statistical research in the field of communication was conducted using . As you can imagine , between 1801 an ( the , many people worked to advance early computer technology . Many wonderful books can introduce you to the full of how we came to the modern personal computer ?

The saw the start of the explosion of the personal computer ( the release of the Apple II line in 1977 ) In 1981 , IBM released the IBM , also known as the Acorn , which ran on DOS , which was followed up by Apple Lisa in 1983 , which had a graphic user interface . From that point until now , an ( Apple ( Macintosh ) have cornered the market on personal computers . Figure Loom loom by Ad . This is licensed under the Creative Commons Attribution license . Getting Computers to Interact One thing that we have seen is that with each new computer development is new technologies emerging that have helped us communicate and interact . One significant development in 1969 changed the direction of human communication forever . Starting in 1965 , researchers at the Massachusetts Institute of Technology were able to get two computers to talk to each other . Of course , it one thing to get two computers to talk to each other , but could they get computers at a distance to talk to each other ( in a manner similar to how people use telephones to communicate at a distance ) Researchers at both UCLA and Stanford , with grant funding from the Department of Defense Advanced Research Projects Agency ( set out to get computers at a distance to talk to each other . In 1969 , UCLA student Charley attempted the first ( communication over a distance from his terminal in Los Angeles to a at Stanford using a computer network . Although it had been possible for remote computers to interact with one another , scientists had to have separate computers for each remote computer they were connecting with . The 1969 breakthrough , was the 408

creation of a system could allow all computers to use a single network to first message to be sent was to be a simple one , The letter I was sent , the letter , and then the system crashed . So , the first message ever sent over what would become the Internet was An hour later , got the system up and running again , and the full word login was sent . In the earliest years of Internet , people didn know it existed . The Internet was primarily a tool for the Department of Def ense to allow archers at multiple sites across the country to work on defense projects . It was called the Advanced Research Projects Agency Network ( In 1973 , the College of London ( England ) and the Royal Radar Establishment ( Norway ) connected to , and the term Internet was born . A year later , in 1974 , a commercialized version of called became the first Internet service provider ( Allowing People to Communicate The early Internet was not exactly designed for your average user , so it took quite a bit of skill and know how to use the Internet and find . Of course , while the Internet was developing , so was its ( allowing people to communicate and interact with one another . In 1971 , Ray was working on two programs that could be used over and . From his lab at MIT , sent a message from one computer to another computer sitting right next to it , sending the message through and creating the first electronic email . also forever changed our lives by introducing the symbol as the separator the Internet uses when sending and receiving messages . In addition to email , another breakthrough in ( was the development of Internet forums or boards , which are online discussion sites where people can hold conversations in the form of posted messages . Steve created an early message board for . The primary message list for was . The number one message board I propose that the following character sequence markers that was not business related was , a science fiction list . As you can see , from the earliest days of the Internet , people were using Read it it is the Internet as a tool to communicate and prob more , to mark interact with people who had similar interests . things that are , given One early realization about email and Current trends . For this , USe message boards was that people relied solely on text to interpret messages , which lacked nonverbal cues to aid in interpretation . On September 19 , 1982 , Scott , a research professor of computer science at Carnegie Mellon , came up with an idea . You see , at Carnegie Mellon in the early ( like most research universities at the time ) they had their own bulletin board system ( which discussed ' from campus politics to science fiction . As noted ,

Given the nature of the , a good of the posts were humorous , or at least attempted humor . But The problem was that if someone made a sarcastic remark , a few readers would fail to get the joke and each of them would post a lengthy diatribe in After giving some thought to the problem , he posted the seen in Figure , the emoticon ( emotion icon ) was born . An emoticon is a series of characters which is designed to help readers interpret a iter intended tone or the feelings the writer intended to convey . Over the years , many different were created like the smiley and sad faces , lol ( laughing out loud ) rolling on the floor laughing ) surprise ) kiss ) sticking your tongue out ) quizzical ) sealed lips ) angel ) cheerleader ) and so many others . As we ve discussed previously in this text , so of how we understand each other is based on our nonverbal behaviors , so these were an attempt to bring a lost part of the human communicative experience to a communicative experience . Asynchronous Communication Some technologies are what we call asynchronous , a mediated form of communication in which the sender and receiver are not concurrently engaged in communication . Person A sends a message , Person does not need to be on the computer at the time to receive the message . There could be a delay of hours or even ( lays before that message is received and Person responds . In this case , a . mes ages are akin to letter writing . still engage in a wide range of asynchronous . Some common forms of asynchronous communication today include email , texting , social media posts , and classroom discussion boards . Think about your own IC behavior . VVhat asynchronous methods for do you engage in daily ?

Synchronous Communication Let switch gears for a bit and talk about the history of synchronous ) on the Internet . As the Internet grew and speed and became more established , synchronous was developed , a mediated form of communication in which the sender and receiver are concurrently engaged in ) hen Person A sends a message , Person is that message in real time , like they would in a ( interaction . The first synchronous mode of Chat Client communication was the . In 1988 , wrote the code for the first Internet Relay Chat ( client and server at the University of , Finland . was initially started as a system to replace an existing , but realized that he had something Chat Client completely different . individuals from around the world could login using an . Chat Client ( software on their computer ) which would allow them to access a server elsewhere Relay Chat in the world to interact with people in real time 410

( Figure ) The invention of led to proliferation of throughout and . New technology was also developed through the European organization Mobile ( The goal of the was to create protocols for global cellphone networks . One of the protocols that was created was the Short Messaging Service ( The concept was developed in 1985 and Bernard , but the first message be sent until originated from the radio in radio memo pagers using standardized phone protocols , and was later as part of the Global System for Mobile Communications series of standards in 1985 . The short part of refers to the maximum length of the messages that could be sent at the time 160 characters ( letters , numbers , or symbols in the Latin alphabet ) If you haven it out yet , the system created by and is the tem most of you use every day to send text messages . Although texting can be either asynchronous or synchronous , historically it was one of the earliest technologies to facilitate ( synchronous ) online communication . The World Wide Web Our last major invention that indeed was groundbreaking came about in 1990 . Tim , a scientist working for pour la Recherche ( CERN ) had an idea to help capture information from the people worked at CERN . The typical length of time someone spent conducting research at CERN was only two years , so that meant a lot of new people coming and going without a way to capture what was being done . As noted , The actual observed working structure of the organisation is a multiply connected whose evolve with ' The technical details of past projects are sometimes lost forever , or only recovered after a detective investigation in an emergency . Often , the information has been recorded , it just can not be You see , realized that so much information is learned on the job and then leaves the people as they leave the job . proposed a new system for keeping electronic information . After getting some initial positive feedback , and Robert wrote a management report explaining is a way to link and access information of various kinds as a Web of nodes in which the user can browse at will . It provides a single user interface to large classes of information ( reports , notes , computer documentation and on line help ) We propose a simple scheme incorporating servers already available at CERN A program which provides access to the world we call a browser CERN was not really concerned with the Internet as its primary scope and emphasis , so CERN and agreed to release the source code for the Web ( to the world in April 1993 . In 1994 , left CERN and took ajob at MIT where he created the International Consortium ( to develop common standards for communication on the . still exists today , and the celebrated its 30 birthday on March 10 , 2019 . The variation of the markup language ( created by the is currently in use . You re probably using daily and don even realize it . As the notes , contains powerful capabilities for applications with more powerful interaction , video support , graphics , more styling effects , and a full set of . adapts to any device , whether desktop , mobile , tablet , or Keg Takeaways Starting with the invention of the Internet in 1969 , 41 I ' I

communication has evolved over the as has advanced . Many important figures helped create ( as we know it . Some of key include Ray ( inventor of email ) Scott ( creator of ( WiZ ( inventor of ) and Bernard ( creators of text messaging ) and Tim ( inventor of the World ) are just a handful of the many women and men who had a part in the development of ) communication . um hen you look back at your life , which ( do you remember interacting Think back to your earliest experiences . How as your behavior and use of technology evolved over time . Check out the Consortium ( website ( and see what projects they re Working on today . Why is the still relevant today ?

The Process . Differentiate between synchronous and asynchronous communication . Explain the role of nonverbal cues in communication . Describe the various rules and norms associated with mediated communication and their importance to . ma 22 ( DEC LU ' Examine the human communication factors related to communication . Discuss the process and importance of forming impressions online . As interpersonal communication scholars , our interest in is less about the technologies that people are using and more about how people are using technology to interact with one another . So instead of focusing on how one goes about coding new software , interpersonal communication scholars focus on how new technologies and software help facilitate interpersonal communication . For example , Pat and Sam are playing the latest Massive Multiplayer Online Game ( of , In Figure We two people playing a video game over the together but from different locations . Through a technology called , Sam and Pat can play video games at the same time while talking to each other through the use of headsets . 412

Synchronous and Asynchronous Communication In this section , we re going to delve more deeply into the areas of synchronous and asynchronous communication . In Figure , Sam and Pat are in some kind of ( lem ' fiery landscape . Pat is playing a witch character , and Sam is a vampire character . two can coordinate their movements to accomplish tasks because can talk freely to one another while playing the game in Figure Video Game Play real time . As discussed , this type of is communication , or communication that happens in real time . Conversely , asynchronous communication is the exchange of messages with a time lag . In other words , in asynchronous communication , people can communicate on their ( schedules as time permits instead of in real time . For example , Figure shows a conversation between two college students . In this case , two college students are using , commonly called texting ) to interact with each other . The conversation starts at . The first person initiates the conversation , but doesn get a response until . The third turn in the interaction then doesn happen until ) In this exchange , the two people interacting can send responses at their convenience , which is one of the main reasons people often rely on asynchronous communication . Other common forms of asynchronous communication include emails , instant messaging , online discussions , etc Now , is it possible for people to use the same technology to interact synchronously ?

Of course . One of our remembers two students on a trip who were sitting next to each other and texting because they didnt want their conversation to be overheard by others in the van . Their interaction was clearly mediated , and in real time , so it would be considered synchronous communication . Nonverbal Cues One issue related to is nonverbal communication . Historically , most of the media people have used to interact with one another have been asynchronous and , making it difficult to fully ascertain the 413 Carrier ?

Back ( Name Text Message Today 100 Contact Heading into class . Dinner Tonight ?

Today Just got of class not go we ner sounds grea Today That Sucks ! Meet at my room around . How does Mexican sound ?

OK space return Figure Asynchronous Communication Vi ! Text Messaging ) I meaning behind a string of words . Mary . and Markus believe that the functions nonverbal behaviors meet in interactions simply go unmet in . If so , interpersonal communication must always be inherently impersonal when it conducted using ) technologies . This perspective has three assumptions . Communication mediated by filters out communicative cues found in interaction , Different media filter out or transmit different cues , and . Substituting ) for communication Will result in predictable changes in and interpersonal Let these assumptions . First , interactions filter out communicative cues found in interactions . For example , if you re on the telephone with someone , you can make eye contact or see their gestures , facial expressions , etc If you re reading an email , you have no nonverbal information to help you interpret the message because there is none . In these examples , the nonverbal cues have been filtered out by the media being used . will revisit this information later in this chapter when we look at a rang of theories related to . Unfortunately , even if we don have the to help us interpret a message , we interpret the message using our perception of how the sender intended us to understand this message , which is often wrong . How many times have you seen an read text or email start a conflict ?

Of course , one of the first attempts to recover some sense of nonverbal meaning was the emoticon that we discussed earlier in this chapter . Rules and Norms As with any type of communication , some rules and norms govern how people communicate With one another . For example , Twitter has an extensive Terms of Service policy that covers a wide rang of communication rules . For our purposes here , let examine their rules related to hate speech Hateful conduct You may not promote violence against or attack or threaten other people on the has of race , ethnicity , national origin , sexual orientation , gender , gender , religious age , or serious ( VVe also do not allow accounts whose purpose is inciting harm towards others on the basis of these categories . affiliation , Hateful aii ( display names You may not use hateful images or ) in your profile image or profile header . You also may not use your username , display name , or profile bio to engage in abusive behavior , such as targeted harassment or expressing hate towards a person , group , or protected This statement is an obvious example of a rule that exists on the Twitter platform . Of course , some have argued that these rules are pretty flexible at times , given the type of hateful political speech that is often Tweeted by different political figures . In addition to clearly spelled out rules that govern how people communicate via different technologies , there are also norms . A norm , in this context , is an accepted standard for how one communicates and interacts with others in the environment . For example , one norm by TYPING IN ALL CAPITAL LETTERS , which is considered yelling , people can get frustrated . There actually not a consensus on when the use of all caps as a form of yelling first came to be . do know that 414

newspapers in often used all capital letters to emphasize headlines ( basically jump off the page ) At some point in the early , using all caps as a form of yelling became quite the norm , which was noted in a message post ) Dave in 1981 ( Figure 12 . In example , you see attempts to create possible systems for emphasizing Words . The first is the use of all capital letters for making words seem louder , as already mentioned , became known as . there seemto be some conventions developing inthe use . There kinds in use , in order of popularity ) using CAPITAL make words look louder , using to around emphasized words , and ) Figure The Creation Over the years , numerous norms have developed to help individuals communicate in the context . re so common that we have a term for them , is the set and social rules and norms that are considered ) le and polite when interacting with another person ( through mediating . Let this definition . Research Spotlight In a ) study ( the researchers set out to examine how related to problematic Internet use ( Internet a ( This study was Conducted in , Turkey , and examined 165 ' ish early adolescents ( mean age was 13 ) To measure mindfulness , the researchers revised the Attention online . Scale create ( Kirk Brown and ( The revised scale was used to measure the degree to which ' i ( engaged in mindful behaviors while Overall , the researchers found that people who were mindful online were less likely to report engaging in problematic Internet use . Ata , A . 2019 ) Coping an ( mindfulness Mediators between need satisfaction and generalized problematic Internet use . journal of Media Psychology , 37 ( 23 ( 415 ' CI (

, how one communicates professionally and how one socially are often quite different . For example , you it entirely appropriate to , up ) at the beginning of an email to a friend , but you would not it appropriate to start an email to your boss in this same fashion . st , our of emphasizes that different can create different needs . it may be entirely appropriate to downplay or disregard spelling errors or problems in a text you send to a friend , but it is completely inappropriate to have errors and problems in a text sent to a ) or coworker . One of the biggest challenges many employers have with young employees who are fresh out of college is that they don know how to differentiate between appropriate and inappropriate behavior in differing . lack of professionalism is also a problem commonly discussed by college and university faculty and staff . Think about the last email you sent to one of your this email Did you remember to sign your name You be amazed at the lack of professionalism many college and university faculty and staff see in the emails sent by your peers . Here are some general guidelines for sending professional emails Include a concise , direct subject line . Do not mark something as urgent unless it really is . Begin with a proper greeting ( Dear , Professor , etc . your grammar . Correct any spelling mistakes . Include only essential information . Be concise . State your intention clearly and directly . Make sure your message is organized . Be polite and ensure your tone is appropriate . Avoid all CAPS or all lowercase letters . void ( lol ) If you want the recipient to do something , make the desired action very clear . End with a polite closing ( using please and thank you ) Do not send an email if you re or upset . Edit and proofread before hitting ' Use Reply All selectively ( very selectively ) Rules and Norms Second , our of combines both rules and norms . Part of being a competent communicator in a environment is knowing what the rules are and respecting them . For example , if you know that Twitter rules ban hate speech , then engaging in hate speech using the Twitter platform shows a disregard for the rules and would not be considered appropriate behavior . In essence , hate speech is . We also do not want to ignore the fact that in different , different often develop . For example , you re taking an online course and you re required to engage in weekly discussions . One common norm in an online class is to check the previously replies to a post before posting your reply . If you don , then you are jumping into a conversation that already occurred and throwing your in without knowing what happening . Acceptable and Polite Behavior 416

Third , attempts to govern what is both acceptable and polite . Yelling via a text message may be acceptable to some of your friends , but is it polite given typing in all caps is generally seen as yelling ?

Being polite shows others respect and demonstrates socially appropriate behaviors . MINDFULNESS ACTIVITY If you ve spent any time online recently , you may have noticed that it can feel like a cesspool . There are trolls , making the Internet a place Where civil interactions are hard to come by . Mitch came up with five specific guidelines for interacting with others online . Be kind and courteous with all posts and comments . No hate speech , bullying , derogatory or biased comments regarding self , others in the community , or others in general . No Promotions or Spam . Do not give mental health advice . Respect privacy and be thoughtful in the nature and depth of your Think about your interactions with others in the online world . ve you ever communicated with others without considering whether your om intentions and attitude are appropriate ?

Online Interaction Fourth , our definition involves interacting with others . interaction can be , or this interaction can be . The first category , is more in the Wheelhouse of interpersonal communication . Examples include sending a text to one person , sending an email to one person , talking to one person via Skype or Zoom , etc . The second category , requires its own set of rules and norms . Some examples of common could include engaging in a group chat via texting , replying all to an email received , being interviewed by a committee via Skype , etc . Notice that our examples for involve the same technologies used for communication . Range of Mediating Technologies Lastly , can vary based on the different types of mediating technologies . For example , it may be considered entirely appropriate for you to scream , yell , and curse when your playing with your best friend on , but it wouldn be appropriate to use the same communicative behaviors when engaging in a video conference over Skype . Both technologies use , but the platforms and the are different , so they call for different types of communicative behaviors . Some differences will exist in based on whether you re in an entirely medium ( email , texting ) or one where people can see you ( Skype , Zoom ) Ultimately , engaging in requires you to learn what is considered acceptable and polite behavior across a range of different technologies . Communication Factors Communication factors are an essential part of understanding how ( communication 417 ' I

impacts relationships . In this section , we re going to examine two specific communication factors that have been researched in a variety of communication apprehension and impression formation . Communication Apprehension Most of the research examining CA and started at the beginning of the 21 . Until 1996 when America Online ( provided unlimited access to the Internet for a low fee , most people did not have access to the Internet because of the cost . It wasn until the public became more actively involved in interacting through technology that communication scholars became interested in communication traits related to . One early study conducted by Scott Campbell and Michael eer investigated whether an individual level of communication apprehension ( CA ) could predict how they felt about In the study , the authors predicted that an individual level of CA could predict whether the individuals believed that was an effective medium for interpersonal communication however , the researchers did not find a significant relationship . Furthermore , the researchers found that there Wasn a significant between CA and people satisfaction with their experiences . Here how the researchers attempted to make sense of these findings One plausible is that high do not view positively or negatively . Yet , they recognize that it reduces the threat posed to them in settings . An equally plausible explanation is that high do not regard as an interpersonal obstacle to overcome because it is not , but a substitute that fails to challenge or override their apprehension level . Jason Wrench and furthered the inquiry into CA and by exploring how people reacted to different types of . Specifically , Wrench and were interested in examining email CA , online chatting CA , and instant messaging CA . You can see the measures that and created for this study in Table . It important to emphasize that the technologies listed in Table here were the technologies most used by the public when this study was conducted in the ( In addition to , and were also interested in an individual skill levels with . skill was defined as three distinct concepts computer efficacy ( individuals confidence in using a computer ) Internet efficacy ( individuals confidence in using the Internet ) and competence . Brian believed that competence consisted of three important factors ) people must be motivated to interact with others competently , people must possess specialized knowledge and technical , and ) people must learn the rules and norms for communicating in the and found that was negatively related to computer efficacy , Internet efficacy , and competence . In a subsequent study by Daniel Hunt , David , and , the researchers set out to examine and Facebook interactions , using a revised version of the and Carter scales to measure Facebook The study showed that decreased one motivation to use Facebook as a tool for interpersonal communication . These findings were similar to those of , De La Cruz , and Jason , who examined on the social media app In this study , the researchers examined with regards to satisfying a combination of both functional and entertainment needs . Functional needs were defined as needs that drive an individual to accomplish something ( feel less lonely , solve a problem , meet new people , decision making ) Entertainment needs were defined as needs that allow an individual to keep 418

Instructions This set of questions asks about how you feel while using email . If you have never used email , please leave this section blank . quickly and indicate your first impression . Please indicate the degree to which each statement applies to you marking whether you Strongly Disagree Neutral Strongly Agree Disagree . When communicating using email , I feel tense . When communicating using email , I feel calm . When communicating using email , I feel jittery . When communicating using email , I feel nervous . When communicating using email , I feel relaxed . Instructions This set of questions asks you about how you feel while in online chat rooms , or MU . If you have never used ( hat rooms , or , please leave this section blank . quickly and indicate your first impression . Please indicate the ( to which each statement applies to you by marking whether you Strongly Disagree Neutral Strongly Agree Disagree . When communicating in a chat room , or MUDD , I feel tense . When communicating in a chat room , or MUDD , I feel calm . When communicating in a chat room , or MUDD , I feel jittery . When communicating in a chat room , or MUDD , I feel nervous . When communicating in a chat room , or MUDD , I feel relaxed . Instructions This set of questions asks you about how you feel while using Internet Messaging Programs like Instant Messenger , Yahoo Messenger , or Messenger . If you have never used Internet Messaging Programs , please leave this section blank . quickly and indicate your first impression . Please indicate the degree to which each statement applies to you marking whether Strongly Disagree Neutral Strongly Agree Disagree . When communicating using an Internet messaging program , I feel tense . When communicating using an Internet messaging program , I feel calm . When communicating using an Internet messaging program , I feel jittery . When communicating using an Internet messaging program , I feel nervous . When communicating using an Internet messaging program , I feel relaxed . Scoring II '

Email Apprehension A Add ( res for items , and and place total on line . Add scores for items and and place tom on line . Take total from A and add 12 to ( re . Place new number on the line . Final Score ( subtract from Place your final score on the line . Chatting Apprehension A Add scores for items , 10 and place total on line . Add scores for items and 10 and place tom on line . Take total from A and add 12 to the ( re . Place the new number on the line . Final Score ( subtract from Place your final score on the line . Instant Messaging Apprehension A Add scores for items 11 , 13 , and 14 and place tom on line . Add scores for items 12 and 15 and place tom on line . Take the total from A and add 12 to the ( re . Place the new number on the line . Final Score ( subtract from Place your final score on the line . Interpretation Scores on all three measures should be between and 25 . For email apprehension , scores under are considered low and scores over are considered high . For chatting apprehension , scores under are considered low and scores over are considered high . For instant messaging apprehension , scores under are considered low and scores over are considered high . Reference Wrench , 2007 ) The relationship between communication competence , apprehension , perceived , and social presence . Southern Journal , 72 ( Table Communication Apprehension ( Reprinted with permission of the authors here . 420

occupied ( because it fun , because it convenient , communicate easily ) In this study , De La Cruz , and found that individuals with high levels of Snapchat CA were more likely to use Snapchat for functional purposes than for entertainment purposes . In a second study conducted by , De La Cruz , and , the to examine social media CA in relation to , social media use , and social media In this study , the researchers found that social media CA was positively related to introversion , which is in line with previous research examining CA and . Furthermore , introversion was negatively related to social media use , but social media CA was not related to social media use . Lastly , both social media CA and introversion were negatively related to social media addiction . Overall , this shows that individuals With social media CA are just not as likely to use social media , so re less likely to become addicted to it . So , what does all of this tell us ?

From our analysis of CA and , we ve come to understand that people with high levels of CA tend to function better in a environment than in a one , they re still less likely to engage in as compared to those people with low levels of . People With low levels of just see as another platform for communication . set out Online Impression Formation In the Century , so much of what we do involves interacting With people online . How we present ourselves to others through our online persona ( impression formation ) is very important . How we communicate via social media and how professional our online persona is can be a determining factor in getting a job . It important to understand that in today world , anything you put online can be found by someone else . According to the 2018 social recruiting survey , a survey of more than hiring managers , 70 admit to screening potential employees using social media , and ( 56 use search engines to look up potential In fact , having an online persona can be very beneficial . seven percent of hiring managers admit to not calling a potential employee when the employee does not have an online presence . You may be wondering what employers are looking for when they check out potential online . The main things employers look for are information to support someone qualifications ( 58 ) Whether or not an individual has a professional online persona ( 50 ) to see What others about the potential candidate ( and information that could lead a hiring manager to decide not to hire someone ( 22 ) According to , here are the common reasons someone doesn get ajob because of online presence Job candidate posted provocative or inappropriate photographs , videos or information 40 percent Job candidate posted information about their alcohol of drug use 36 percent Job candidate made discriminatory comments related to race , gender , religion , etc . 31 percent Job candidate was linked to criminal behavior 30 percent Job candidate lied about qualifications 27 percent Job candidate had poor communication skills 27 percent Job candidate their previous or fellow employee 25 percent Job candidate screen name was unprofessional 22 percent Job candidate shared confidential information from previous employers 20 percent Job candidate lied about an absence 16 percent Job candidate posted too frequently 12 percent 42 I ' I

As you can see , many organizations believe that what you put online sa a lot about as a person , so they are checking the Internet for information . If what you have online is inappropriate , it prevent you from getting hired , but fortunately , what you have online can also help get you hired . The study found that 57 of hiring managers have found information about a candidate online that has solidified their decision to hire that person . Here is a list of what hiring managers found that them want to hire someone Job candidate background information supported their professional qualifications for the job 37 percent Job candidate was creative 34 percent Job candidate site conveyed a professional image 33 percent Job candidate was , showed a wide range of interests 31 percent Got a good feel for the job candidate personality , could see a good fit within the culture 31 percent Job candidate had great skills 28 percent Job candidate received awards and accolades 26 percent Other people posted great references about the job candidate 23 percent Job candidate had interacted with company social media accounts 22 percent Job candidate posted compelling video or other content 21 percent Job candidate had a large number of followers or subscribers 18 percent As you can see , having an online presence is important in the 21 Century . people make the mistake of having no social media presence , which can backfire . In today social media society , having no online presence can look very strange to hiring managers . You should consider your social media presence as an extension of your resume . At the very least , you should have a profile on , the social networking site commonly used by corporate recruiters . 25 Research Spotlight , Alice , and Boyd set out to explore how young people of low status handled issues of and presentation in social ( lia . The researchers interviewed 28 young adults who considered to ) ile . The researchers found two general through their interviews tactics and judgments of female sexuality . First , the researchers found that the participants in a manner they ( le il ) ed as presenting a neutral or vanilla face , catering to the A norms of the powerful potential potential employers or status community than The participants realized that having a social media presence was important , but they also knew that others could judge their social media use , so they were cognitively aware of what they posted . Furthermore , the participants were cognizant that their social media use today could be read ) others in the future , so they had to consider a perspective when it came to appropriateness online . Second , there was a pattern of judging females use of social media in sexually explicit . it to ) ly presenting one self online , women were judged harshly for their inclusion of sexually 422

posts . Boyd , 2018 ) Performing a vanilla self politics , social class , and the digital world . journal of , 23 ( Interactions and Mediated Communication For this discussion , we need to focus on the idea of interactions , in which people are occupying the same space while interacting with one another . Historically , most communication has involved interactions , but With the advent of a range of communication technologies , people no longer have to be to interact . On the side , there are many people who are but use technology as a way of avoiding interactions with those around them . One of our professor friends recently remarked , when I started my career , I always had to tell students to quiet down at the beginning of class . Now , they re already quiet because they re all looking at their cellphones ignoring those around Now we often have to encourage social interactions , and we wonder how we can get people sitting next to each other to talk to one another . Thomas , and Andres argue that there are two basic communication problems facing people today , the use of current technology disrupting ongoing social situations , and ( lack of social interaction in situations where it would be 27 people don interact with one another , they tend to become more socially isolated and lonely , which can lead to a feeling of disengagement with those around them . How many times have you seen people eating out together yet spending the entire time on their Many people believe that this type of multitasking actually enhances productivity , but research tends to disagree with this notion . One study actually demonstrated that when people are confronted with constant distractions like phones ringing or email alerts chiming on a smartphone , people lose an average of 10 IQ points due to these This drop in IQ is equivalent to missing an entire night of sleep . Furthermore , those generations that have grown up with technology are more likely to engage in multitasking In a study conducted by Jonathan Bowman and Roger Pace , the researchers tested the impact of cell phone usage conversations while performing a complex cognitive Not , individuals who interacted via cell phones were less adept at performing the task than those engaged in interactions . Furthermore , individuals involved in the interactions were more satisfied with their interactions than their peers using a cellphone . The authors of the article also found that , People think they are effectively communicating their message while tasking even though they are So how can benefit social interactions ?

In the et al . study , the researchers examined several different studies that were designed to help foster social interactions . Table from the et al . illustrates the basic findings from their study . Role of technology Social design objectives Design approaches Enable ( work beyond which the rev literature explores ) I

Facilitate Facilitating ongoing social situations Enriching means of social interaction Supporting sense of Breaking ice in new encounters ?

Revealing common ground A voiding in social silos Engaging people in collective activity Encouraging , or Shared digital workspace Open space for shared activity Topic suggestions Disclosing information about others Open space for shared activity Matchmaking Topic suggestions Open space for shared activity Introducing constraints Encourage , A triggering people to interact is ( i ( 934 ( Table Mapping the social design objectives and design approaches interpreted from the papers to abstract enhancement categories ( Roles of Technology ) In Table you are introduced to four different Ways that technology can help facilitate social interaction . You are also presented With the design objectives for each of these different ways to social interaction along With design approaches that technology creators can use to help foster social interaction . Let look at each of these in turn . enabling to the role of a artifact making it possible or for social interaction to take The goal of enabling is to set up situations where social interaction is possible . As such , there less information about specific design objectives and approaches even though most of the research in the area of helping people interact has historically focused on enabling . Second , facilitating interaction refers to making it easier to converse , collaborate or socially interact , or to support desirable feelings , equality or suitable interaction ( While doing The goal of facilitating social interactions is to help ease tension and encourage people to interact While minimizing possible negative experiences people may face . One of the ways to achieve facilitating is to have an open space for a shared activity . For example , an online college or university may have coffee shop nights or alumni events in various cities . The alumni events don necessarily have specific agendas , 424

but the goal is to a space Where people can meet and interact . Inviting , inviting interaction is about the role of informing people of the available proximal social possibilities , which can motivate to spontaneously engage in new 35 In this case , the focus is on providing people the ability to invite social interaction or respond to invitations to engage in social interaction . One of the best examples of this type of use of to help facilitate social interaction is . provides a range of different activities and groups people can join that then meet up in the . For example , in the next 24 hours , there is a Swing Dance Cruise , Group , and Meditation I could go in my local area . Encouraging Lastly , encouraging interaction is about or persuading people to start interacting or maintaining ongoing In the case of encouraging , it not just about providing opportunities , but also using technology to help nudge people into social interaction . For example , an application could require students in an online class who live near each other to get together to study or work on a course project together . You may notice that the common design approach here is introducing constraints . means that people are required to meet up and engage in social interaction to accomplish a task because neither can do it on their own . Video games have been using a version of this for years . In many social video games , a single player will not have all of the abilities , skills , weapons , etc . to accomplish a specific goal on their own . must work With other players to accomplish a task . The only difference here is that the tasks are being completed in a context instead of a mediated context . Keg Takeaways Synchronous communication is communication that happens in real time , whereas asynchronous communication a time lag between the exchange of messages . Nonverbal behaviors are not inherent in many forms of communication . messages ( email , texts , etc . there are no nonverbal cues to attend to at all . In other mediated forms ( Skype , Zoom ) We can see the other person , but its still not the same as an interaction in a context . is the set of professional and social rules and norms for acceptable and polite behaviors when interacting with another person ( through mediating technologies . A number of human communication variables been examined within the context communication apprehension , communication competence , etc . Think about the asynchronous and synchronous ) communication technologies you use regularly . Are nonverbal behaviors filtered ' I

in or out ?

How does this impact your ability to understand the other person ?

Have you ever violated While interacting with other people ?

What happened ?

How ( lid other people react ?

Take a few minutes to Google yourself and see is easily available about you on the Internet . You may need to a couple of variations of your name and even add your if name is very common . If you find information about yourself , how could a potential employer react to that information ?

Do you need to clean up your Internet profile ?

Why ?

Taking Self Online . Explain Erik conceptualization of identity . Describe how theory can help us explain online identities . ma 32 LU ' Discuss the three types of online identities described by Andrew Wood and Matthew . Smith . In Chapter , we discussed the world of communication . At the beginning of Chapter chapter , we had you describe yourself by answering the question , Who am I ?

20 different times . Look back at that list . Now , think about yourself in the context . Are you the same person in a interaction as you are in a interaction ?

Maybe , but maybe not . For example , maybe you re a very shy person in interactions , and likewise you have problems talking with complete strangers online . However , maybe you re a very quiet person in interactions , but when you re playing of , you suddenly become loud and boisterous . One of the beautiful things about for many people is that they can be almost anyone or anything they want to be online . In this section , we re going to examine some specific factors related to one online self , personality traits , communication traits , privacy , anonymity , and trust . Erik Many social psychologists over the years have attempted to define and conceptualize what is meant ) erm i ( en i One of the more ) contributors to this endeavor was Erik . believed that an individual identity was developed through a series of stages of psychosocial development that occur from infancy to adulthood . At each of the different stages , an individual faces various crises that will influence positively or negatively . Each crisis pits the psychological needs of the individual against the larger needs of society , which is why these crises are psychosocial in nature . You can see these stages , the crises that occur , the basic virtues associated with the crises , and the central question that is asked at each stage in Figure . 37 Our question then , is how does technology impact an individual identity development ?

To answer this question , we need to understand concept of , or the tendency of humans to try to differentiate themselves from other Basically , We create ( groups to which we belong ) and ( groups to which we do not belong ) As explained , humans 426 Psychosocial Trust . Autonomy Initiative Industry . Identity . Intimacy Ego Integrity Crisis Mistrust Shame . Guilt inferiority Role Confusion Isolation Stagnation . Despair Basic , Virtue Hope Will Purpose Competency Fidelity Love Care Wisdom Age I Am I Safe ?

Can I do it on my Am I good or How can I be Who am , and Am I loved and Will I provide Have I lived a ) own , ordo I need had ?

good ?

where am I wanted ?

something of full life ?

Question help ?

going ?

real value ?

Figure Stages of Identity Development have a need to feel that they are of some special kind ( tribe or nation , class or caste , family , occupation , or type ) whose insignia they will wear with vanity and conviction , and defend ( along with the economic claims they have staked out for their kind ) against the foreign , the inimical , the This need to differentiate ourselves from others is prominent in those individuals who are under 18 years of Millennials came of age ( hiring the influx of new technologies associated with Web . Subsequent generations have grown up with technology from birth . Ever seen a baby using an iPad ?

It happens . died the same year as the first browser , came on the market . Obviously , he did not have anything to say about the of technology and identity formation specifically . However , he had seen the invention of other technologies and how they had impacted identity formation , specifically movies with of violence and sexual poss . sion and all this without making the slightest demand on intelligence , or effort . I am pointing here to a ' id imbalance in adolescent experience because I think it explains new kinds of adolescent outbursts and points to new necessities of ' Avi Kay believes that today social media and other technologies are even more impactful than movies were in day An argument can certainly be made that the immediacy , and intensity of the ideas and images afforded by the advent of movies pale compared to those of the Internet and social media . As such , reactions to those ideas and images via the Internet can only be expected to provoke even greater passions than those observed among the youth of his generation . Kay specifically discusses how the Internet is being used as a tool to radicalize young people in Islamic ' I

countries , and the same is also true of many young people in the United States who are radicalized through the Internet into hate groups here . The Internet is a fantastic tool , but the types of information that it can expose an adolescent to during their formative years can send them on a or social path . Thankfully , there is hope . As said , There is no reason to insist that a technological world , as such , need weaken inner resources of adaptation , which may , in fact , be replenished by the goodwill and ingenuity of a communicating Although many forces try to sway adolescents towards behavior and ideologies , isn bad for identity formation . can also be used to help forge positive identities . Your Online Identity just discussed how an individual identity could be shaped by interaction with technology , but What about the identity we display when were online . In the earliest of the Internet , it was common for people to be completely anonymous on the Internet ( more on this shortly ) For our , it important to realize that people often present themselves differently in . For example , someone chatting with a complete stranger on Tinder but completely differently when with mother . and Identity , in his book he Presentation of Self in Eve ?

Life , was the first to note that when interacting with others , people tend to guide or control the presentation of themselves to the other person . As people , we can alter how we look ( to a degree ) how we behave , and how communicate , and all of these will impact the perception that someone builds of us during an interaction . And while were attempting to create an impression of ourselves , the other person is also attempting to create a perception of who you are as a person . In an ideal , we hope how were presenting ourselves will be how the other person interprets this , but it doesn always work out that Way . coined the term dramaturgical anal to describe this type of interactive because he saw the faces people put on when interacting with others as similar to the roles actors play onstage . In this respect , used the term front stage to the types of behavior we exhibit when we know others are Watching us ( an interpersonal interaction ) Backstage then is the behavior we engage in when we have no audience present , so we are free from the rules and norms of interaction that govern our interactions with others . Basically , when we are alone , we can let our hair ( and relax by getting out of the character we on stage . At the same time , we also prepare for future interactions on stage While we re backstage . For example , maybe a Woman will practice a pick up line she plans on using in a bar after work , or a man will rehearse What he going to say when he meets his boyfriend parents at dinner that night . lied in 1982 well before the birth of the and the Internet as most of us know it today , so he didn write about the issue of online identities . Syed Hussain applied dramaturgical approach to . Hussain argues that can be seen as part of the front stage for interaction where we perform our identities . As such , Facebook provides the opportunity for individuals to use props such as user profile information , photo ( status updates , Like and Unlike others posts , comments or Wall posts , profile page image , online befriending , community membership , and security and privacy If you re like us , maybe you sat in front of your smartphone , tablet computer , laptop , or desktop computer 428

and wanted to share a , but realized that people you friends with on find humorous , so you didn share the . you do , are negotiating your on stage . You are determining and influencing how others will view you types of posts you make , the shares you make , and even the likes you give to others posts . In a study examining identity in blogging and the online multiverse Se ( Liam and Ana found that people who blog and those who participated on Se ( in their study ) were keen to their offline . was achieved by a blogging voice is true to the offline one , and by publishing personal details about the offline , or designing the avatar to resemble the offline self in , and in disclosing offline identity in In , people online attempt to mimic their onstage performances across different . Now clearly , not everyone who blogs and hangs out in Se ( ill do this , but the majority of individuals in and study did . The authors noted differences between bloggers and users . users have more obvious options to ( the offline self and adopt in terms of the appearance of the 31 ) avatar . In blogging , it is perhaps expected that persona a ( does not ( unless a detachment the offline self is obvious , such as in the case of ( blogging . Also , the nature of interaction is different , with ) logging resembling more closely plat performances ( the offering more opportunities for contacts and en ( Types of Online Identities Unlike traditional interactions , online interactions can blur identities as people act in ways impossible in interaction . Andrew and Matthew . Smith discussed three different ways that people express their identities online Anonymous Real Life Identity Figure Types of Online Identities anonymous , pseudonymous , and real life ( Figure ) First , people in a context ean behave in a way that is anonymous . In this case , people in interactions ean ( in a that conceals their actual . it be possible for some people to figure out who an person is ( the NSA , the CIA ) but if someone wants to maintain her or his anonymity , it usually possible to do so . Think about how many fake , Twitter , Tinder , and exist . Some exist to to persuade you to go to a website ( often for illicit purposes like hacking your computer ) while others may be ( for the fun of it .

is a deceptive perpetrated by Internet predators when they fabricate online identities on social networking sites to lure unsuspecting into an ) mantic relationship . In the 2010 documentary , we are introduced to Nev , a New photographer , who starts an online relationship with an prodigy named Abby via Facebook . Over the course of nine , the two exchange more than , messages , and Abby ( mother , father , and sister ) also become friends with Nev on Facebook . Throughout the documentary , Nev and his brother Ariel ( who is also the documentarian ) start noticing inconsistencies in various stories that are being told . Music that was created by Abby is found to be taken from YouTube . Ariel Nev to continue the relationship knowing that there are inconsistencies and lies just to see how it will all play out . The success of spawned a television show the same name on . From this one story , we can easily see the problems that can arise from anonymity on the Internet . Often behavior that would be deemed completely inappropriate in a encounter suddenly becomes appropriate because it deemed less real by some . One of the major problems with online anonymity has been . Teenagers today can post horrible things about one another online without any Worry that the messages will be linked back to them directly . Unlike bullying victims who leave the bullying behind when they leave school , teens facing cyberbullying can not even find peace at home because the Internet follows them everywhere . In 2013 Rebecca Ann committed suicide after being the perpetual victim of cyberbullying through social media apps on her phone . Some of the messages found on her phone after her suicide included , Why are you still alive ?

and You haven killed yourself yeti off a Rebecca suffered this of bullying for over a year and by around 15 different girls in her school . Sadly , Rebecca tale is one that is all too familiar in today world . Nine percent of students reported being victims of cyberbullying , and there is a relationship between victimization and suicidal It also important to understand that cyberbullying isn a that happens with children . A 2009 of Australian Manufacturing Union members , found that of respondents faced bullying , and faced cyberbullying . All of the individuals who were targets of were also bullied Many people prefer when interacting with others online , and there can be legitimate reasons to engage in online interactions with others . For example , when one of our authors was coming out as , our coauthor regularly talked with people online as they melded the new identity with their Southern and Christian identities . Having the ability to talk with others allowed our coauthor to gradually come out by forming relationships with others dealing with the same issues . The second category of interaction is . and Smith used the term because of the prefix pseudonym Pseudonym comes from the Latin words for false and name , and it provides an audience with the ability to attribute statements and actions to a common source emphasis in oi . an allows someone to be completely anonymous , a allows one to contribute to the fashioning of one Using pseudonyms is hardly something new . Famed mystery author Agatha Christi over 66 detective novels , but still published six romance novels using the Mary . Bestselling science fiction author Michael Crichton ( of . ic Park ) wrote under three different ( ohn Lange , Hudson , and Michael Douglas ) when he was in school . 430

Even . of Harry Potter fame ) used pseudonym Robert to novel to series , he Calling ( 2013 ) didn want media hype or reader expectations writing her novel . Unfortunately for , the secret didn stay long . There are many famous people who use pseudonyms in their social media ( comedy miter and Daily Show producer , David ) online personality and producer Felix Ulf ) Octogenarian fashionista and online personality Helen Van Winkle ) family practitioner and internet celebrity Mike ) and more . Some of these people used parts of their real names , and others used fully names . All of them enormous Internet and used their pseudonyms to build brands . So , do people use a pseudonym ?

The veneer of the Internet allows us to determine how much of an i ( we wish to front in online presentations . These images can range from a vague silhouette to a detailed snapshot . the degree of i ( presented , however , it appears that control and empowerment are for users of these communication Some people even adopt a pseudonym because their online actions may not be for their or because they don want to be fully exposed online . Real Life Identity Lastly , some people have their identities displayed online . You can on , Instagram , Snapchat , Twitter , etc Our coauthor made the decision to his social networking site behavior very public from the beginning . Part of the reason was that when he joined in 2007 , he was required to use his professional school email address that ended with . In the early days , only people email addresses could join Facebook . Jason also realizes that this behavior is a part of his professional persona , so he doesn put anything on one of these sites he wouldn want other professionals ( or even you ) to see and read . it comes to people in the public eye , most of them use some variation of their real names to enhance their brands . That not to that many of these same people don have multiple online accounts , some of which may be completely anonymous or even pseudonymous . Keg Takeaways believed that an individual is developed a series of stages of psychosocial development that occur from infancy to adulthood . At each stag , we face a different set of crises that pits an individual psychological needs versus the larger societal needs . Part of this development is impacted by the introduction of new technologies , which can be both good for society and problematic . in his book The Presentation of Self in , uses the term front stage to describe the types of behavior we exhibit when we know others are watching us ( an interpersonal interaction ) and he uses the term to refer to behavior we engage in when we have no audience present , so we are free from the rules and norms of interaction that govern our interactions ' I

with others . Andrew Wood and Matthew . Smith discussed three specific types of online identities that people can formulate anonymous ( the person behind a message is ) someone uses a pseudonym , but people often know who the real person behind the message is ) and real life ( when our online and identities are the same ) um Of the two theoretical approaches to identity ( and ) which do you think is the better tool for explaining how your online identity and identity Were formed ?

it comes to your online behavior , do you have an anonymous , and identity ?

How are these similar ?

How are they different ?

Theories of Communication . Describe uses and theory and how it helps us understand behavior . Describe social presence theory and how it helps us understand behavior . Describe media richness theory and how it helps us understand behavior . 32 LU ' Describe social information processing theory and how it helps us understand behavior . Most of the early work in ( communication from a theoretical perspective was conducted using ) theories that have been developed to discuss the differences between print , radio , and television , and applying them to the Internet . As such , we don see the proliferation of theories . In this section , we are going to explore four theories and their implications for . Uses and Theory The first major theory used to explain is the uses and . Uses and theory was originally devised in the to explain why people use the types of mass media they The basic premise of the is that people choose various media because they get something out of that media , or it makes them happy in some Way . From this perspective , people choose various media because they have specific goals that they Want to fulfill . and Alan Rubin were the first scholars to apply the uses and theory to how people use the 432

found five basic reasons people were using Internet interpersonal utility ( allows people to interact with others ) pass time ( helps people kill time ) information seeking ( people look for specific information they want or need ) convenience ( it faster than or even a phone call ) and entertainment ( people enjoy using the Internet ) In this first study , the researchers found that people who used the Internet for interpersonal utility were less satisfied with life and more anxious in communication interactions when compared to those did not . Please remember that this study was conducted in 2000 , so times are quite different now , so the finding from the and Rubin may be different if conducted In a 2008 study , the picture of Internet socializing was quite different , so it not surprising that the results were indicative of changes in public The researchers found when people try to substitute interpersonal interactions for interactions , they do not find their interactions as rewarding . Conversely , when people supplement their interpersonal interactions with interactions , they are fulfilled by those interactions . Social Presence Theory second major theory that been used to help explain is social presence theory . Social presence theory was created Short , Williams , and Bruce Presence is a psychological state of mind and how we relate to technology . we are truly present , we forget that we are actually using technology . Presence is at the heart of humans desire to use media to move beyond the limits of body and the sensory Often the term presence when used in this contact refers to the physical world and how technology mimics the physical world . For example , when you put on a virtual reality helmet , does your mind and body react ?

People who experience high levels of presence in a virtual reality simulation will experience real physiological effects . In one study , Dino , Barbara , and Philip Corr examined whether a virtual environment could stimulate fear responses in individuals who have a fear of In this study , individuals wore a virtual helmet and walked the plank To measure fear response , participants wore a ring which measures activity , which is a physiological indication of stress responses . Can be used to create physiological stress responses ?

Yes . We should also mention that the study also examined whether mindfulness practices could help decrease stress responses in settings , it did . Social presence then is the degree to which we as individuals perceive another as a real person and any interaction between the two of us as a Our perceptions of social presence are largely based on the degree to which we the ability to interpret nonverbal cues from the people we are interacting with . it comes to , various technologies will elicit varying degrees of perceptions of presence from people . For example , reading information on a website probably is not going to make you forget that you are reading text on a screen . On the other hand , if you re engaging in a conversation with your best friend via text messaging , you may forget about the technology and just view the interaction as a common one you with your friend . In essence , people can vary in how they perceive social presence . One of our regularly students in a course spend time in a couple of virtual worlds like and of Warcraft . is a virtual world people can create avatar and interact in a simulated environment . However , it not a game it a virtual world . There is no point system and there is no winning or beating the system . Instead , it a place for people to socialize and interact . On the other hand , of ( is first and foremost a game . I

Although there are highly interactive involved in and people long friends in , is a virtual world that has a specific end result focused on winning . These different worlds have different purposes , but people can feel highly present in either or both . hen students who are not familiar with these virtual worlds enter them , they often have a hard understanding how people can spend hours upon hours interacting with others within these virtual worlds . The students view this as a strange experience and experience no social presence at all . Conversely , people who live in these virtual worlds experience high levels of social presence . do know that those individuals who report higher levels of social presence tend to have rewarding online interpersonal interactions and are likely to perceive themselves as communicators within these environments . Media Richness Theory The third major theory that has been applied to is media richness theory . Media richness theory was first proposed by Richard Daft and Robert Richness is defined as the potential information carrying of data . In doctoral dissertation , he proposed that media varied For example , in print media , all we have is text . As such , we don have nonverbal behaviors of the author to help us in richness depending on how much information is provided through the interpret the words we are reading . VVith communication , on the other hand , we have the full realm of nonverbal behaviors that we can attend to in an effort to understand the sender message . As such , argued that media escalates in richness in the following order computer output , formal memos , personal memos , telephone conversations , and interactions . You notice that this analysis of media was originally designed to help individuals understand the media choices organizational members have in the workplace . So , where does this leave us with ?

ell , from the basic premise of media richness theory , we can ascertain that the richer the media , the less ambiguous a message is for a Social Information Processing Theory Up to this point , the first three theories we examined that have been used to explain why people use have all been theories originally designed to examine media before the proliferation of . The first truly unique theory designed to look at from a perspective came from Joseph social processing theory , in As with a background in communication , realized that our impressions of those we interact with and our interpersonal interactions with them change over time , yet the previous three theories applied to didn take into account how interpersonal relationships evolve as the spend time getting to know one another . For example , both media richness theory and social presence theory focus on the nonverbal aspects of and assume that because of the lack of nonverbal cues in , people will inherently find it inherently less rich less present when to interactions . argues that the filtering out of nonverbal cues doesn hinder an individual ability to form an of over in a context . asserts that over , relationships formed in a context can develop like those that are . He does admit that these relationships will take more time to develop , but the relationships can reach the end states as relationships . later expanded his ideas of social information processing to include a new concept he dubbed hyperpersonal interactions . interactions are those that go above and beyond 434

those possible in traditional interactions . For example , many people who belong to online help groups discuss feelings and ideas would never dream of discussing with people in an interaction unless that person was their therapist . Furthermore , hiring interactions an individual can their message in a manner that is impossible to do during an interaction , which help them present a specific face to an . I sure we ve all mitten a text , Facebook post , or email and then decided to delete what We just written rather than post or send it because it was not in our best interest to put it out in the world . In interactions , we this ability to our messages before transmitting , whereas in messages , we don the ability to sit and ponder our responses and them until we re ready to orally communicate ( hiring a interaction . Furthermore , in interactions , there is an expectation that the interaction keeps moving at a steady pace without the ability to edit one ideas whereas , with we can take time to our messages in a way that is impossible during an interaction . All of this helps an individual create the public face that they Want to be known by . Key Takeaways Uses and theory helps explain why people use the types of mass media they do . and Rubin found that there were five reasons people use the Internet interpersonal utility ( allows people to interact with others ) pass time ( helps people kill time ) information seeking ( enables people to locate specific information they want or need ) convenience ( it faster than or even a phone call ) and entertainment ( people enjoy using the Internet ) Social presence theory helps us understand Whether or not individuals using technologies perceive the people they are interacting with as Our perceptions of social presence are largely based on the degree to which we can interpret nonverbal cues from the people we are interacting with . Media richness theory helps us understand behavior by examining the capacity that a type of media for transmitting data . As media becomes richer and has more nonverbal content , the easier it is for a receiver to interpret the message accurately , which can , in turn , lead to more successful social interactions online . Social information processing ( theory helps researchers understand the development of interpersonal relationships in . SIP argues that overtime relationships formed in a context can develop like those relationships that develop . Uses and theory is one of the oldest theories in media , and continues to be one of the most commonly studied . For this exercise , find a research study conducted in the previous five years that examines theory as related to . Look for the outcomes from that specific study and report them back to your class . Compare and contrast social presence theory , media richness theory , and ' I

social information processing and their explanation of the importance of nonverbal communication in relationships . If you ve experienced a relationship , think about that relationship as you answer the following questions . If have not had a relationship online , then talk with someone who has and answer the following questions . How did this ( relationship develop ?

was different about this relationship when compared to relationships ?

Do you still have this relationship today ?

or why not ?

This chapter explored many of the ways that modern communication technologies help us interact with each other . Whether we re talking over a headset to someone through our gaming console or texting our roommate , we use these technologies to communicate with people all the time . The first part of this chapter explored the history of ( communication , which was followed by a discussion of the process of ( communication . then discussed identity formation in virtual environments . ended the chapter by looking at four of the most commonly discussed theories related to ( communication . Hopefully , you realize that this chapter barely scratches the surface when it comes to how people are using technology to create and enhance their interpersonal End of Chapter Anonymous Identities Boards Asynchronous Communication Pseudonymity Identity Identity Interactions Richness Social Presence Hyperpersonal Synchronous Communication Impression Formation Uses and Theory relationships . Jenny wasn meeting any potential ( living in Denver . As a woman , she found meeting people more and more difficult . She not really into the bar scene , so meeting people in that environment is pretty much out . One a friend of hers at work tells her about a new app called . The app allows people to see how many people are also looking for dates within a geographic location . 436

She decides to download the an ( see what all of the is about . She creates a , 21 picture , and decides to take 21 chance . Immediately , she sees 21 screen with all looking for relationships . There is Chad . whi is miles . There is Andrew , who is 678 feet from her . Then there was ) who was less than 100 feet from her . very creepy , Jenny thinks to herself . She looks at Bobby , which shows a picture of a torso . God , he She looks at another photo shows his ) flexed . That when she notices his eagle tattoo the ) center of his back . Oh my Husband ! I . If were Jenny , how would you respond to someone ) a ( lia site for people looking for relationships ?

Do think Jenny should husband through ?

Do think has made in the 21 Century easier ?

END OF CHAPTER . hat is the term for principles for behavior and effective in workplace settings called ?

professionalism competence intelligence ( etiquette . just received an email from one of his employees . email is all in lowercase with zero punctuation . Rob only knows when a new sentence is when a capital letter rises out of nowhere . Rob employee violated what ?

norms rules ( nonverbal cues presence . Max writes fan he publishes on under the . Patterson . He has a pretty large following of readers . He recently realized of his readers assume that he a female based the use of his instead of his . hat type of i ( does presence most represent ?

anonymous pseudonymous real life ( ae is a computer designer in Korea . He works in the department of a automobile company . He been tasked with creating a new virtual program for salespeople around the world . One of his biggest concerns is ensuring that the game he designs for this is able to immerse people in as 21 as possible . really learners to feel like they interacting with 21 real customer . theory of mediated communication best ' I

describes what is with ?

media richness social presence ( is the message ( social ) processing uses and in Alima is out with her best friend at 21 local ( liner . She With her best friend , but both of them are also ) texting other people . type of does this example most clearly . effective ( 438

References Holland , 2018 , August 22 ) Human computers The women of NASA . The History Channel . Yost , 2014 ) Computer A history ofthe information machine ( Press . 2013 ) The computer an illustrated history from its origins to the present day . Carlton . 2018 ) The computer book From the abacus to intelligence , 250 stones in the history of computer science . Sterling . Raz , 2019 , October 29 ) Lo and behold A communication revolution . National Public Radio . Happy , Emoticon . 2007 , Summer ) Carnegie Mellon University . Retrieved from . para . 1990 , May ) Information management A proposal . Retrieved from . Ibid . 1990 , November 12 ) A proposal for a . Retrieved from Proposal What is ?

2013 , December 12 ) Retrieved from , Markus , 1987 ) Information technologies . In , Roberts , and Porter ( Handbook communication An perspective ( 420443 ) Sage . 10 , Markus , 1987 ) Information technologies . In , Roberts , and Porter ( Handbook communication An perspective ( 420443 ) Sage . 423 . 11 Twitter . Hateful conduct policy . Retrieved from 12 , 1984 , March 13 ) Retrieved from 13 Brown , Ryan , 2003 ) The of being present Mindfulness and its role in logical . and Social Psychology , 84 ( 14 , 2019 , September ) rules for sharing genuinely and safely online No matter what kind of social community you yourself in , it is important to abide by a few guidelines for safe sharing . ful . 15 Campbell , Neer , 2001 ) The relationship of communication apprehension and interaction involvement to perceptions of communication . Communication Research Reports , 18 ( 16 Ibid . 396397 . 17 , 2006 ) Preliminary development of a model and measure of computer mediated ( competence . Communication , 11 ( 18 Hunt , A . 2012 ) The of communication on motives for Facebook use . eh Electronic Media , 56 ( 19 , De La Cruz , Wrench , 2017 ) Investigating the relationships among college students satisfaction , addiction , needs , communication apprehension , motives , and uses with Snapchat . Computers in Human Behavior , 75 , 20 , Cruz , Wrench , 2018 ) Analyzing college students social ' 11

dia communication apprehension . Behavior Social Networking , 21 ( 21 . 2018 , August ) More than content on social media that caused them NOT to hire a candidate , according to recent survey Press Release . Retrieved from 22 Ibid . 23 Ibid . para . 24 Ibid . para . 25 ( 2013 ) 2013 social recruiting survey results . San Mateo , CA Author . 26 , Boyd , 2018 ) Performing a vanilla self Respectability politics , class , and the digital world . Communication , 23 ( 170 . 27 , A . 2019 , February 14 ) Technologies for enhancing social interaction Review of design solutions and approaches . Supported Cooperative Work . 28 ( 2005 ) Abuse of technology can reduce UK workers intelligence . Small Medium Business press release , April 22 . Retrieved 11 , 2014 , from 29 Carrier , Chang , I . 2009 ) Multitasking across Multitasking choices and ratings in three generations of Americans . Computers in Human , 25 ( 30 Bowman , Pace , 2014 ) effects on outcomes of mobile communication . Communication Research Reports , 31 ( 31 Ibid . 228 . 32 , A . 2019 , February 14 ) Technologies for enhancing social interaction Review of design solutions and approaches . Supported Cooperative Work . 33 Ibid . 39 34 Ibid . 39 35 Ibid . 40 36 Ibid . 40 37 , 1968 ) Identity Youth and crisis . Norton Company . 38 , 1985 ) in the nuclear age . Political Psychology , 39 , 1962 ) Reality and actuality an address . of The American Psychoanalytic tion , 10 ( 40 , 1988 ) Youth Fidelity and diversity . Daedalus , 117 ( 41 Ibid . 11 . 42 Kay , A . 2018 ) Online Identity and in the Internet age . Identity An of Theory and Research , 18 ( 269 . 43 , 1964 ) Insight and responsibility . Norton . 44 , 1959 ) The presentation of self in everyday life . Anchor Books . 45 Hussain , 2015 ) Presentation of self among social media users in Appropriating to Facebook users engagement with online communities . Global Media Indian Edition , 46 Hussain , 2015 ) Presentation of self among social media users in Appropriating to Facebook users engagement with online communities . Global Media Indian Edition , 440

47 , 2013 ) The presentation of self in the online world man and the study of online identities . Science , 39 ( 110 . 48 Ibid . 110 . 49 Wood , Smith , I . 2005 ) Online communication Linking technology , identity , culture ( 50 , 2010 ) Bullying , cyberbullying , and suicide . Archives of Suicide Research , 14 , 206221 . 51 , 2009 ) Cyberbullying The new face of workplace bullying ?

Behavior , 12 ( 52 Wood , Smith , I . 2005 ) Online communication Linking technology , identity , culture ( 64 . 53 Ibid . 66 . 54 Ibid . 55 , 1974 ) Utilization of mass communication by the individual . In , The uses of mass communications Current perspectives on research ( 1932 ) Sage . 56 , Rubin , 2000 ) of Internet use . of Broadcasting Electronic Media , 44 ( 57 , Rubin , 2008 ) The of dispositions and Internet on online communication satisfaction and relationship closeness . Computers in Human Behavior , 24 ( 58 Short , I . Williams , Christie , 1976 ) The social psychology of telecommunications . Wiley . 59 Lee , 2005 ) origins of feelings of presence Creating social presence with voices . Media Psychology , 60 , Corr , I . in press ) Anxiety and threat in subjective and logical responses of fear of heights induced by virtual reality . Personality and Individual . 109720 61 Wood , Smith , I . 2005 ) Online communication Linking technology , identity , culture ( 72 . 62 Wrench , 2007 ) The relationship between competence , apprehension , perceived , and social presence . Southern of Communication , 72 ( 63 Daft , 1983 , May ) Information richness A new approach to managerial behavior and organization design ( Report no . of Naval Research . 64 Ibid . 65 , 1983 ) Managerial information process and source selection behavior Unpublished Doctoral Dissertation . Texas University . 66 , Rice , Conner , 1998 ) communication and media An investigation of the dimensionality of perceived task equivocality and media richness . Behaviour and Information Technology , 17 ( 67 Walther , I . 1992 ) Interpersonal effects in interaction A relational perspective . Communication Research , 19 ( 68 Walther , I . 1996 ) communication Impersonal , interpersonal , and hyperpersonal interaction . Communication Research , 23 ( 11

END OF CHAPTER ANSWER KEY ) A ) A ) A 442 I