Trying to understand social media users and usage
Abstract
Purpose
– The purpose of this paper from the series “Monitoring the Media: Spotlight on Social Media Research” is to look into different approaches to study uses of social media platforms – from user statistics to motivations for using specific features within a platform.
Design/methodology/approach
– Based on a literature review some general findings on social media usage are summarized alongside with examples of user activities that are rarely studied.
Findings
– The paper concludes that social media research has neglected to question the use of more recent features in social media platforms, such as Twitter favorites or Facebook hashtags, as well as the more “destructive” activities in social networking such as unfollowing.
Originality/value
– The paper draws attention to some features of popular social media platforms which are currently understudied. It raises awareness for these specific gaps in social media research and could inspire future studies to close the gap.
Subject
Library and Information Sciences,Computer Science Applications,Information Systems
Reference41 articles.
1. Abisheva, A.
,
Garimella, V.R.K.
,
Garcia, D.
and
Weber, I.
(2014), “Who watches (and shares) what on YouTube and when? Using twitter to understand YouTube viewership”, in
Carterette, B.
and
Diaz, F.
(Eds), Proceedings of the 7th ACM International Conference on Web Search and Data Mining, ACM Press, New York, NY, pp. 593-602, available at: http://dx.doi.org/10.1145/2556195.2566588 (accessed September 6, 2015). 2. Almuhimedi, H.
,
Wilson, S.
,
Liu, B.
,
Sadeh, N.
and
Acquisti, A.
(2013), “Tweets are forever: a large-scale quantitative analysis of deleted tweets”, in
Bruckman, A.
,
Counts, S.
,
Lampe, C.
and
Terveen, L.
(Eds),
Proceedings of the 2013 Conference on Computer Supported Cooperative Work, San Francisco, CA
, ACM Press, New York, NY, pp. 897-908. doi: 10.1145/2441776.2441878. 3. Bevan, J.L.
,
Ang, P.-C.
and
Fearns, J.B.
(2014), “Being unfriended on facebook: an application of expectancy violation theory”,
Computers in Human Behavior
, Vol. 33, pp. 171-178. doi: 10.1016/j.chb.2014.01.029. 4. Boyd, D.
,
Golder, S.
and
Lotan, G.
(2010), “Tweet, tweet, retweet: conversational aspects of retweeting on twitter”, in
Sprague, R.H.
(Ed.),
Proceedings of the Hawaii International Conference on System Sciences (HICSS), Koloa, Kauai, Hawaii
, IEEE, Los Alamitos, CA, pp. 1-10. doi: 10.1109/HICSS.2010.412. 5. Broxton, T.
,
Interian, Y.
,
Vaver, J.
and
Wattenhofer, M.
(2013), “Catching a viral video”,
Journal of Intelligent Information Systems
, Vol. 40 No. 2, pp. 241-259. doi: 10.1007/s10844-011-0191-2.
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|