100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Social Media @ Work $7.05   Add to cart

Summary

Summary Social Media @ Work

4 reviews
 368 views  25 purchases
  • Course
  • Institution

A summary of the course Social Media at Work (). The notes from the lectures as well as the main information of all articles are provided in this summary.

Preview 4 out of 81  pages

  • October 26, 2019
  • 81
  • 2019/2020
  • Summary

4  reviews

review-writer-avatar

By: tatyanagromova067 • 3 year ago

review-writer-avatar

By: Mathias • 3 year ago

review-writer-avatar

By: mell94 • 4 year ago

review-writer-avatar

By: avestamahani • 4 year ago

avatar-seller
Social Media at Work – Literature
Inhoud
Social Media at Work – Literature..........................................................................................................1
Week 1 – The Networked Organization..............................................................................................3
Article 1 – Social Construction of Communication Technology (Fulk, J., & Yuan, Y.C., 2017).........3
Article 2 – Little Boxes, Glocalization, and Networked Individualism (Wellman, B., 2002).............4
Article 3 – Capturing the Complexity in Advanced Technology Use: Adaptive Structuration
Theory (DeSanctis, G., & Poole, M.S., 1994)...................................................................................6
Week 1 – 2 (Workgroup)....................................................................................................................7
Article 1 - The Olson Group: 7 Reasons Social Media in the Workplace can help Employees.........7
Article 2 – Social Media Use in Organizations (Treem, J.W., & Leonardi, P.M., 2012)....................8
Article 3 – Social Media and the Workplace (Olmstead, K., Lampe, C., & Ellison, N., 2016).........10
Article 4 – Bringing Technological Frames to Work: How Previous Experience with Social Media
Shapes the Technology’s Meaning in an Organization (Treem et al., 2015).................................11
Week 2 – CMC theories....................................................................................................................12
Article 1 – Theories of computer-mediated communication and interpersonal relations (Walther,
J.B., 2011).....................................................................................................................................12
Article 2 – Group identity, social influence, and collective action online: Extensions and the
applications of the SIDE model (Spears, R., & Postmes, T., 2015).................................................18
Article 3 – The pursuit of trust in ad hoc virtual teams: how much electronic portrayal is too
much? (Altschuller, S., & Benbunan-Fich, R., 2013)......................................................................19
Article 4 – Interactivity in online chat: conversational contingency and response latency in
computer-mediated communication (Lew, Z., Walther, J.B., Pang, A., & Shin, W., 2018)............20
Other information from lecture....................................................................................................22
Week 3 – Social media and employee commitment (organizational identification).........................22
Article 1 – Communication patterns as determinants of organizational identification in a virtual
organization (Wiesenfeld, Raghuram & Garud, 1999)..................................................................23
Article 2 – My colleagues are my friends: the role of Facebook contacts in employee
identification (Bartels, Van Vuuren & Ouwerkerk, 2019)..............................................................25
Article 3 -Explaining online ambassadorship behaviours on Facebook and LinkedIn (Van Zoonen,
Bartels & Van Prooijen, 2018).......................................................................................................27
Week 4 – Virtual Teams....................................................................................................................29
Article 1 – The rules of virtual groups: Trust, liking, and performance in computer-mediated
communication (Walther & Bunz, 2005)......................................................................................31
Article 2 – Enhancing performance of geographically distributed teams through targeted use of
information and communication technologies (Malhotra & Majchrzak, 2014)............................33




1

, Article 3 – Beyond being there: The symbolic role of communication and identification in
perceptions of proximity to geographically dispersed colleagues (O’Leary, Wilson & Metiu, 2014)
......................................................................................................................................................36
Article 4 – Virtual team work: Group decision making in 3D virtual environments (Schouten, Van
den Hooff & Feldberg, 2016)........................................................................................................37
Article 5 – Does avatar appearance matter? How team visual similarity and member-avatar
similarity influence virtual team performance (Van der Land, Schouten, Feldberg, Huysman &
Van den Hooff, 2015)....................................................................................................................40
Other notes from lecture..............................................................................................................42
Week 5 – Social media and knowledge management......................................................................43
Article 1 – Use of online social networking services from a theoretical perspective of the
motivation-participation-performance framework (Salehan, Kim & Kim, 2017)..........................44
Article 2 – Why should I share? Examining social capital and knowledge contribution in
electronic networks of practice (Wasko & Faraj, 2005)................................................................46
Article 3 – Through a glass darkly: Information technology design, identity verification, and
knowledge contribution in online communities (Ma & Agerwal, 2007).......................................49
Article 4 – Building member attachment in online communities: Applying theories of group
identity and interpersonal bonds (Ren et al., 2012).....................................................................52
Article 5 – Increasing commitment to online communities by designing for social presence
(Farzan, Dabbish, Kraut & Postmes, 2011)....................................................................................56
Other notes from lecture..............................................................................................................57
Week 6 – Online boundary management.........................................................................................58
Article 1 – When worlds collide in cyberspace: How boundary work in online social networks
impacts professional relationships (Ollier-Malaterre, Rothbard & Berg, 2013)............................58
Article 2 – A Facebook ‘friend’ request from the boss: Too close for comfort? (Peluchette, Karl &
Fertig, 2013).................................................................................................................................65
Article 3 – Keeping up online appearances: How self-disclosure on Facebook affects perceived
respect and likeability in the professional context (Batenburg & Bartels, 2017)..........................67
Article 4 – Exposing one’s identity: Social judgments of colleagues’ traits can influence
employees’ Facebook boundary management (Van Prooijen, Ranzini & Bartels, 2018)..............70
Week 7 – Deviant behaviour @ Work..............................................................................................73
Article 1 – The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
(Lim, 2002)....................................................................................................................................73
Article 2 - Correlates of different forms of cyberloafing: The role of norms and external locus of
control (Blanchard & Henle, 2008)...............................................................................................74
Article 3 – A meta-analytic investigation of cyberloafing (Mercado, Giordano & Dilchert, 2017) 76
Article 4 – Cyberloafing as a coping mechanism: Dealing with workplace boredom (Pindek,
Krajcevska & Spector, 2018).........................................................................................................77
Article 5 - Workplace ostracism and cyberloafing: a moderated-mediation model (Koay, 2018).78
Three exam questions by Bartels:


2

, - Social Identity Theory
- Online boundary management model (OBMB)
- Metaphor of the Ledger (next week)
Alexander’s question = about Affordances

Exam will be 5-7 open ended questions, short answers (200-250 words), key issues of every lecture
(e.g. affordances and OBMB).



Week 1 – The Networked Organization

The network society & the networked organization
- A form of cooperation in which social processes in ALL domains of human activity are
increasingly organized in the form of networks, in which the nodes are increasingly
connected by means of ICTs
o Networking logic of systems/relationships using ICTs
o Network = any set of ‘interconnected nodes’
 Can be between individuals (e.g., personal social network), but also between
organization or institutions
o Flexibility & adaptability
o No middle man/gatekeeper
o But without ICTs difficult to mobilize resources and manage complexity in large
networks

Duality of technology (Orlikow, 1992)
- Technology structures (i.e., recognizes that technological features affect humans)
- And is structured (i.e., recognizes human agency)

Article 1 – Social Construction of Communication Technology (Fulk, J., &
Yuan, Y.C., 2017)

Theoretical context in technological determinism
Constructionism: focuses on how social relations influence the development of shared meanings
among interacting members of a collective.

Hardcore determinism: technology has direct and certain impact. Does not account for human
agency/context
 looking at technology as if it can only be used in one certain way (e.g. every WhatsApp group
is used in the same way, which is not (different between friends/colleagues)
- Technology has a direct and certain impact
o BUT: people develop, use and adapt technology

Constructivism (or cognitive constructivism): focuses more on the cognitive processes through which
people develop their understandings of the world.
 People and context determine technology’s meaning, uses and outcomes
- ‘written’ by inventors, investors, designers, etc.
- ‘interpreted’ by users (who lie in different contexts)
o  technology is structured by human thought and behaviour
o BUT: technological relativism  ignores the role of technological characteristics in
guiding behaviour

3

, Article 2 – Little Boxes, Glocalization, and Networked Individualism
(Wellman, B., 2002)

This paper traces how communities have changed from “Little Boxes” (densely-knit, linking people
door-to-door) to “Glocalized” networks (sparsely-knit but with clusters, linking households both
locally and globally) to “Networked Individualism” (sparsely-knit, linking individuals with little regard
to space). This affects design considerations for computer systems that would support digital cities.

From Little Boxes to Social Networks
The developed world has caused a shift from being bound up in homogenous “little boxes” to surfing
life through diffuse, variegated social networks.
- Little boxes: people are socially and cognitively encapsulated by homogeneous, broadly-
embracing groups (1900)
o A few groups with clear boundaries
o Hierarchically and structured
o Social activity bounded by place and time
o Dominant mode of communication: face-to-face (door-to-door)
- Networked societies:
o Boundaries are more permeable
o Interactions are with diverse others
o Linkages switch between multiple networks
o Hierarchies are both flatter and more complexly structured

Nowadays, each person has her own personal network rather than fitting into the same group as
those around them. This is a time for individuals and their networks, and not for groups.
- Network capital: how people contact, interact, and obtain resources from each other
o The proliferation of computer-supported social networks fosters changes in network
capital
- Computer-supported social networks: when computer-mediated communication networks
link people, institutions and knowledge

The technological development of computer-communications networks and the societal flourish of
social networks are now affording the rise of networked individualism in a positive feedback loop.




4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jcwvb. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.05. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.05  25x  sold
  • (4)
  Add to cart