Professional Documents
Culture Documents
Koh Phei Sze - Example of Quantitative Research Methods
Koh Phei Sze - Example of Quantitative Research Methods
ABSTRACT
This study investigates relationships between privacy concerns, uncertainty reduction
behaviour and self-disclosure among computer-mediated communication (CMC) users who
are unacquainted individuals to each other in social networking sites, drawing on uncertainty
reduction theory. A conceptual model integrating privacy concerns and Internet experience
with uncertainty reduction strategies and amount of self-disclosure had proposed and then
test this model in USM with randomly choose who have ever involved in knowing stranger
online through social networking sites (N = 377). The study findings confirm that the
frequency of use of uncertainty reduction strategies is predicted by three sets of privacy
concernspersonal security, misrepresentation, and recognition as well as internet
experience. The theoretical implications of these findings had explored for our understanding
of uncertainty reduction and self-disclosure processes in CMC contexts.
KEYWORDS: Uncertainty reduction, Computer-mediated communication, Privacy Concerns
1.0 INTRODUCTION
The popularity of social network sites had incresed impressively. There are 17 million Internet
users in Malaysia (Dehsi, 2011), 80% of the users browse social networking sites. According
to statistics, Malaysia Internet users spents 20 hours per week to online. Most of them will
spent some times to browse social networking sites. Social network sites (e.g., Facebook
and Blogger) specifically aim at building and maintaining social networks. These sites are
usually open or semi-open systems. Everyone is welcome to join but new members have to
register. The sites typically allow members to create an online profile containing self1
descriptions, react to the profiles of other members, and become "friends" with other
members (Ellison, Steinfield, & Lampe, 2006; Lampe, Ellison, & Steinfield, 2007). Initial
interactions between unacquainted individuals increasingly take place online when they
become friends. In initial interactions, partners are driven by a need to reduce uncertainty
and form impressions of each other (Antheunis, Schouten, Valkenburg & Peter, 2011).
Because of many nonverbal cues may not be available online, interaction partners have to
rely on different strategies to reduce uncertainty and to form impressions of each other
(Ramirez, Walther, Burgoon, & Sunnafrank, 2002).
Berger and Calabrese (cited in Gibbs, Ellison & Lai, 2011) argue that, when strangers meet,
their primary concern is one of uncertainty reduction or increasing predictability about the
behaviour of both themselves and others in the interaction" (p. 100). These authors
hypothesize that, in order to reduce their acute uncertainty, initial interactants engage in high
levels of information-seeking. To the extent that such attempts are unsuccessful,
conversation is presumed to remain effortful and, in extreme instances, only marginally
coherent (Berger, 1986). Moreover, if persons are unable to "get to know" each other, the
likelihood they will develop a more enduring relationship is reduced, since high levels of
uncertainty are posited to induce low levels of liking (Berger & Calabrese, 1975).
Social network sites belong to the latest generation of Computer-Mediated Communication
(CMC) environments. Tidwell and Walther (2002) found that CMC conversations exhibited a
greater proportion of self-disclosure and question asking, resulting in greater attributional
confidence and perceived conversation effectiveness. Moreover, they found that CMC
conversations were characterized by more intimate self-disclosure than face-to-face
conversations.
In initial text-based CMC conversations, interaction partners are able to adapt to the
reduction in nonverbal cues by using other cues to convey social information and thus form
impressions of each other (Pena & Hancock, 2006; Walther, 1992). More specifically, the
reduced nonverbal cues of CMC lead conversation partners to use uncertainty reduction
strategies, such as self-disclosure and question asking (cited in Gibbs, Ellison & Lai, 2011).
As online technologies, and the communicative affordances they offer, become central in
many individuals social practices and daily experiences, privacy concernswhat to disclose,
to whom, and how to ensure that others are disclosing honestly in returnare increasingly
salient (cited in Gibbs, Ellison & Lai, 2011). Based on the previous research statement, this
study will look on which concern lead to greater uncertainty reduction strategies.
2
The number of people interact using social media increase day by day. This study will mainly
explore how USM students began their initial interaction with unacquainted opposite sex
communication partners. When we have no idea about a person, we will feel unsecure and
therefore, we will try to know more about the particular person. The way to know more is
related with uncertainty reduction strategies. The study starts with the motivation they want to
explore about one person: privacy concern (personal security, misrepresentation,
recognition) and internet experience. This study will also test which concern will motivate
them to increase the use of uncertainty reduction strategies. Lastly, this study will examine
the relationship between uncertainty reduction and amount of self-disclosure.
This investigation attempted to measure uncertainty and amount of self-disclosure for each
other during initial interaction. The goal of this study is to investigate relationships between
privacy concerns, uncertainty reduction strategies and self-disclosure between unacquainted
computer-mediated communication (CMC) users. Specifically, this study focuses on the use
of uncertainty reduction strategies between cross-sex dyads when initial interaction
happened online. This study investigated the prevalence of two interactive uncertainty
reduction strategies (i.e., question asking and question/disclosure intimacy) in reduced-cue
settings.
This study draws on uncertainty reduction theory (Berger, 1979; Berger & Calabrese, 1975)
to investigate the uncertainty reduction strategies employed by unacquainted communication
partners in order to alleviate privacy concerns and look on how they develop initial interaction
in the condition which lack of nonverbal cues through CMC.
Wiseman, Cody & Wendt, 1999). Social networking sites related to CMC environments. CMC
is separated to two: text-based CMC and visual CMC. In this study, focal area will be in textbased CMC because it is important to look on how uncertainty reduction strategies use when
there is a condition lack of nonverbal cues with the presence of privacy concerns and internet
experience.
There are many studies did in western countries on the area of online dating and making
friend in cyberspace, since there is a huge number of Internet users in our country, a study to
look on how they perceive the presence of a stranger in their social network site and start the
initial interaction is needed. When people interact with another which they have no idea on
the background and anything else, they will seek to search and know more. Information
seeking process is help in reducing uncertainty towards a person. This study focuses on the
presence of privacy concerns and internet experience brings to uncertainty reduction
strategies use. Text-based CMC happened with the absence of nonverbal cues. The
unacquainted persons, cross-sex dyads who wish to know more about another will try to run
uncertainty reduction strategies. Here, the study will also look on which gender self-disclose
more when meet with stranger.
Previous qualitative research has found that people who engage in a dynamic process of
rewriting their profiles to better appeal to desired potential friends as well as developing rules
for assessing the credibility of others identity claims while recursively applying these rules to
their own self-presentation (Ellison et al., 2006; Heino; Whitty, 2008). Other research has
demonstrated that CMC users engage in information-seeking strategies to reduce
uncertainty and warrant identity claims in other contexts such as email communication, ecommerce, and SNSs (cited in Antheunis, Schouten, Valkenburg & Peter, 2011). This study
wishes to explore whether the same types of information-seeking strategies are employed by
the unacquainted person and test a set of factors that may predict the use of such strategies.
This study has limited its scope specifically in testing the use of uncertainty reduction
strategies and amount of self-disclosure with the prevalence of privacy concerns and internet
experience. The whole study will be only conducted in USM area and the target respondents
are USM students who ever involve in making friends with people opposite sex online. This
study aims to identify refined mechanisms that CMC users use to form impressions and to
reduce uncertainty in text-based communication.
about each other than those who met for only two minutes. This idea applies in the
study which the longer the unacquainted individuals chat online, the less uncertainy
among them. To the extent that strangers become more familiar with each other as
conversation progresses, uncertainty should decay in an approximately linear way
across initial interaction; that is, use some suitable strategies to know more about the
particular individual which the CMC user wants to make friend with.
Uncertainty reduction theory (Berger & Calabrese, 1975) is among the most heuristic
approaches to impression formation and initial relational development in online
settings. URT presumes that partners encounter each other physically when they
interact. This aspect is not the central focus of this theory (or others on impressions
and attraction) and might be dismissed as theoretically irrelevant (Lea & Spears, cited
in Ellison, Steinfield & Lampe, 2006). Even though URT explicitly includes nonverbal
affiliative behaviours in its calculus, these are substitutable with verbal behaviours.
However, tests of URT have been conducted using text-based CMC, necessarily
involving the conventionally obvious aspect of seeing ones partner with lack of
nonverbal cues and potentially gleaning data from physical appearances and other
nonverbal indicators (Douglas, 1990).
According to URT, uncertainty reduction is the exchange and collection of information
that allows one to predict anothers attitudes and behaviours (Berger & Calabrese,
cited in Byron & Baldridge, 2007). In reducing uncertainty, people create impressions
mental models that help them to make sense of people and situations (Srull &
Wyer, cited in Ellison, Steinfield & Lampe, 2006). The more information one gets
about ones partner, the less uncertainty he or she has. The mechanisms by which
they exchange information, however, may be limited in CMC settings. URT predicts
that individuals use passive, active, and interactive strategies as a means of reducing
uncertainty. Berger (1979) and Berger, Gardner, Parks, Schulman, & Miller (1976)
identified three passive strategies, two active strategies, and three interactive
strategies, that people utilize in order to acquire information about others. Which of
these strategies are employed, and when, depends in part on politeness and
situational appropriateness requirements.
Passive strategies are those in which the information seeker collects information
about the target without affecting the targets or other actors behaviour. Passive
strategies refer to how the CMC user observes and get more understanding about the
particular unacquainted individuals background and details without the persons
8
knowledge. The active, yet indirect strategies differ from the passive strategies in that
they involve proactive efforts to gain knowledge about another person (Berger, 1979).
Active strategies are strategies how the CMC user gets to know more about the
particular unacquainted individual by asking the people around the person which may
be his or her friends or family members. Interactive strategies for uncertainty
reduction require direct and obtrusive exchanges with targets. Interactive strategies
are strategies use by CMC users directly towards the particular unacquainted
individual such as question asking the particular person about their personal details
like their name and age. After a certain level of interactive action, the CMC users will
self-disclosure about themselves.
All of the strategies suggested by Berger and colleagues may be utilized in CMC.
Deception detection, however, tends to be considered unreliable in CMC (Donath,
1999; Van Gelder, 1985, cited in Antheunis, Schouten, Valkenburg & Peter, 2011). No
matter reliable or not, people used to detect deception through some strategies like
observation to detect nonverbal sign of deception. This is the matter of trust. Unless
target individuals contradict either themselves or known facts, deception detection is
less likely employed in a CMC environment because its nothing necessary to check
deeply about a person since the initial point is just to make friend with them. This
leaves verbal interrogation (i.e., question asking) and self-disclosure as the
uncertainty reduction strategies most available in CMC. Questions and disclosures
are both readily deployed in CMC. Personal questions can easily be posed in text.
Self-disclosures may also be effective in CMC settings. They not only provide
impression-bearing information, but the process of disclosing creates a demand, so
that the recipient feels obligated to respond in kind, typically generating return
disclosures from the target individual (Jourard, cited in Gibbs, Ellison & Lai, 2011).
In one exception, Joinson (2001) found greater self-disclosure in CMC, although
these findings were largely in response to experimental variations in public and
private self-awareness or videoconferencing; question-asking, as a means of
interpersonal knowledge acquisition, was not regarded. In a sense, the relative
unavailability of strategies in common CMC settings provides a scope condition to
URT: The of questioning and self-disclosure should be those most relied upon for
acquiring knowledge in CMC. The question remains whether CMC users will use
more interactive strategies as an accommodation to the lack of other means or
whether they will simply mirror the same proportion of interactive uncertainty
remaining cues available in CMC such as content and linguistic strategies, as well as
chronemic (Walther & Tidwell, 1995) and typographic cues (Walther & DAddario,
cited in Gibbs, Ellison & Lai, 2011). Few studies have examined by what specific
means users adapt to the medium in order to seek and to exhibit uncertaintyreducing, impression-bearing cues.
A related approach, the hyperpersonal perspective of CMC, argues that the absence
of nonverbal cues, as well as editing capabilities, identity cues, and temporal
10
CMC with face-to-face (FtF) groups. The researchers found that CMC participants
tended to evaluate each other less favorably than FtF participants did when making
subjective personal impressions about each other. They also found the computermediated setting was perceived by participants as more dispassionate and more
uninhibited than FtF settings.
CMC is often perceived as a lean communication medium, i.e., having less immediate
feedback, fewer sensory cues, less personalization, and restricted language variety
(Daft & Lengel, 1984,1986; El-Shinnawy & Markus, 1997; Schmitz & Fulk, 1991).
Walther (1995) has argued, however, that these early studies do not account for the
contradictory findings of some field research where "warm collegial relations" and
"growing friendships" have been displayed. To that end, Walther (1992) has produced
a systematic body of work dedicated to examining the performed an experimental
study that demonstrated how the relational qualities of a CMC group would eventually
approximate those exhibited by a FtF group, in spite of limited bandwidth; they just
occurred at a slower pace. This resulted in their observation that "the depersonalizing
effects of CMC may be limited exclusively to initial interactions, especially among
unacquainted partners" (1992, p. 55). Also, Walther (1995) noted that CMC groups
were found to be more task oriented due to the methodological limitation of premature
closure, where experiments were cut off before other more socio emotional phases
and messages occurred.
In a related commentary, Palmer (1995) contended that the perception of "distance"
in CMC may stem not only from restricted channel availability, but also from
distractions that keep users from processing relational information because they are
busy maintaining or controlling the medium itself. Once users achieve a level of
mastery with the technology, it becomes "transparent," thus allowing them to devote
more of their conscious awareness toward the interpretation of message meanings
and less of their conscious awareness toward issues such as the correct cursor
placement on the screen needed to transmit an e-mail message. Transparency is an
important competency for users to gain in order to reduce the effects of distance. As
larger numbers of users have acquired this sense of transparency, the overall
perception of distance has been minimized, and a growing consensus has recognized
that some types of CMC are potentially useful venues for the development of
interpersonal relationships (Palmer, 1995; Walther, 1992, 1995).
12
The relationships formed through CMC are influenced by, but not predicated on, the
medium chosen to communicate people's messages. According to Palmer (1995), it is
this social orientation that dominates human behaviour and actively seeks a
connection with others, despite whatever media restrictions apply. He wrote, " as long
as two humans are using a CMC medium, even if it is limited in channel capacity to
written forms, they will find ways to make the medium interpersonal" (p. 288).
In fact, Walther (1996) noted positive aspects of this asychronicity when he stated,
"asynchronous interaction may thus have the capacity to be more socially desirable
and effective as composers are able to concentrate on message construction to
satisfy multiple or single concerns at their own pace" (p. 26). In a research piece that
bolsters Walther's observations, Rintel and Pittam (1997) noted that one of the
particular effects of time on interaction management is the maximization of
impression management between partners due to pretransmission composition and
editing. Thus, while social networking site is asynchronous, it retains a variety of
essential interpersonal components. Individuals can actively manage their selfpresentation concerns while communicating through CMC (Rintel & Pittam, cited in
Ellison, Steinfield & Lampe, 2006), making it a useful and strategic tool for developing
and/or maintaining human relationships.
Gender:
13
Male
Female
Privacy Concerns:
- Personal Security
- Misrepresentation
- Recognition
Internet
Experience
Uncertainty
Reduction
Strategies
Amount of
Selfdisclosure
6.4 Hypotheses
Ramirez et al. (2002) identified several factors that may influence the use of
information- seeking strategies: communicator related, situationcontext related, goal
related, information related, and technology related (cited in Gibbs, Ellison & Lai,
2011). Of these factors, communicator-related features (such as personality
characteristics, skills, and preferences) are likely to provide the greatest source of
variance among unacquainted individuals who wish to make friend online (who are,
for the most part, using the same technology, communicating in the same context,
pursuing similar goals of forming relationships, and seeking similar types of
information). For this reason, the study focuses on a set of communicator-related
factors that are likely to influence uncertainty reduction strategies in CMC: privacy
concerns and Internet experience. I hypothesize that these factors are likely to
influence CMC users to make friend onlines motivation and ability to engage in
uncertainty reduction strategies.
14
Privacy concerns: CMC users face a variety of vulnerability risks related to several
types of concerns, which are likely to create uncertainty about potential friend online.
It follows that the more salient these risks are to participants, the more motivated they
will be to try to verify information about others before opening up to them, in order to
reduce uncertainty about others identity claims (and reduce their own vulnerability).
Firstly, disclosing personal information online can pose risks to ones physical and
emotional safety because it can result in threats such as identity theft or stalking
(Gross & Acquisti, cited in Gibbs, Ellison & Lai, 2011). Secondly, an online profile
created by CMC users with no private setting will expose their details to unintended
audiences
and will accidentally reveal all personal data to third parties such as
photograph and personal daily activities. Indeed, Rosen, Cheever, Cummings, and
Felt (2008, cited in Gibbs, Ellison & Lai, 2011) found that the majority of potential
unacquainted individuals to become friend were reluctant to tell their social networks
that they were using social networking sites to know more friends (though another
recent study found that 70% of CMC users had disclosed their involvement to friends
and family (Stephure, Boon, MacKinnon, & Deveau, 2009). Thirdly, disclosure will
cause risks to individuals due to the possibility of deception or misrepresentation of
others in their profiles or online communication. If one reveals more about
themselves, it is more easier for others to make similarity about their own. A recent
study found that the revelation of private information in ones Facebook profile
enabled others to obtain knowledge about the target person and use it to create a
sense of homophily in subsequent interaction (Hancock et al., cited in Ellison,
Steinfield & Lampe, 2006). Therefore, self-disclosure can consider as dangerous
because third parties may use the information or details they get as their own details.
They duplicate the information or details about others. As a conclusion, the people
who with more privacy concerns will experience in greater uncertainty due to the
suspicion about the veracity of others disclosures, which may inhibit their
reciprocation of disclosure. Privacy concerns may thus provide greater motivation for
users to engage in information-seeking activities to protect themselves from potential
risks (Metzger, cited in Gibbs, Ellison & Lai, 2011) because such activities give users
more information about their communication partners and may lower their uncertainty
about them. More specifically, users with greater privacy concerns are more likely to
seek information about potential friend, in order to verify that such individuals do not
pose a threat to their personal security, that they are representing themselves
honestly and accurately, and that they do not represent a risk to ones social or
professional standing (such as might be the case if one inadvertently pursued a work
15
colleague or social acquaintance). On the basis of this prediction, this study expects
that users who are more concerned about their privacy in online.
H1: CMC users with greater concerns about (a) personal security, (b)
misrepresentation, and (c) recognition will engage in increased levels of
uncertainty reduction strategies.
16
H2: CMC users with greater Internet experience will engage in increased levels
of uncertainty reduction strategies.
Self-disclosure has been defined as any message about the self that an individual
communicates to another (Wheeless, 1978; Wheeless & Grotz, 1976). The high
frequency of disclosing own personal details plays an important role in relationship
development. Self-disclosure helps individuals to collect data and information about
the potential friends. During initial interaction, people are less disclose because dont
know the unacquainted individual much. But after the process of uncertainty
reduction, people are more likely to self-disclose because they have an idea towards
the potential friend. CMC will cause to many uncertainty because users unable to
guess and know more about the potential friend due to lack of nonverbal cues.
Therefore, self-disclosure helps individuals collect information about prospective
partners and make forecasts about the viability of potential relationships (Derlega et
al., cited in Gibbs, Ellison & Lai, 2011). CMC users who engage in greater uncertainty
reduction behaviour will have less uncertainty about potential friend and will thus
open up more in their interactions with them, assuming they are confident in the
veracity of the information they have received. Reciprocity norms lead to increased
mutual self-disclosure in interpersonal relationships (Derlega, Winstead, Wong, &
Greenspan, 1987), but in the online context concerns about the veracity of the
disclosed information may hinder this process and inhibit reciprocal self-disclosure.
Uncertainty reduction is likely to provide an important middle step that helps alleviate
such concerns and provokes more self-disclosure, as individuals gain confidence in
the information provided by the other person through verification activities that do not
reveal misrepresentation by the target. Thus, this study proposes that CMC users
who engage in more uncertainty reduction strategies will report greater amounts of
self-disclosure with those they meet online.
H3: CMC users who engage in increased levels of uncertainty reduction
strategies will report greater amounts of self-disclosure in their interactions.
17
Gender was included given the wealth of research on the impact of sex differences on
self-disclosure (Dindia, 2000) and was assessed through one of the demographic
questions. Women were less likely to disclose than men ( = .17, p < .001)(Gibbs, et
al, 2011). It is because women will easily feel unsecure than men, they have no dare
to disclose all personal details when the first meet. Jourard (1975) concluded in his
research on sex differences in self-disclosure that women disclose more than men
because the male sex role inhibits men's self-disclosure. To test whether which is the
accurate and best to describe the situation in USM, researcher finalised and
hypothesid that:
18
Therefore, many people will hide their own personal details for safety. Initial
interaction with a stranger will make individual took the first step to ensure either
the particular person can be friend or just a stalker. Misrepresentation is referring
to image and identity of the particular person is represented the real person but
not a fake. Normally, profile picture or self-description can lead us to wrong
information. Recognition is some information which can let other people to
recognize the individual. For an example, the feature of the individuals face like
got a pair of big eyes can be the recognition point for others. All these
independent variables are affecting the relationship with uncertainty reduction
strategies.
2. Internet experience
Internet experience works as independent variable. Internet experience is not
referred to how great a person can use the tools in the internet. It is referring to
the past experiences they met while making friends online. For an example,
internet users who encounter inaccurate information from the websites they
visited may be aware of the need to verify the credibility of online information and
thus be prompted to construct a strategy of doubles checking information using
other alternatives.
3. Uncertainty reduction strategies
Ramirez et al. (2002) had described four strategies to measure uncertainty
reduction strategies that unacquainted individuals might use to verify the
credibility of others they meet online. The four categories are extractive, active,
passive and interactive. Uncertainty reduction in this study acts as dependent
variable and independent variable too. The first set tests on the relationship
between privacy concerns, internet experience and uncertainty reduction
strategies and here it works as dependent variable. The second set tests on the
relationship between uncertainty reduction strategies and amount of selfdisclosure and here it works as independent variable.
4. Amount of self-disclosure
Self-disclosure helps to collect information about others. Unacquainted individuals
who engage in greater uncertainty reduction behaviour will have less uncertainty
about potential friends and will thus open-up more in their interactions with the
particular person, assuming they are confident in the veracity of the information
they have received. Amount of self-disclosure is the dependent variable in this
study.
19
5. Gender
Gender placed in demographic question. It functioned as control variable in this
study. Gender is use to test and survey on which gender is more likely to disclose
online.
2. Misrepresentation
2 items will be issued under this session. 5-point Likert scale is using to answer
the questions where response options ranged from 1 = strongly disagree to 5 =
strongly agree. Items include:
a) Someone I meet through online will be very different from their profile.
b) Someone I meet through online will have exaggerated some of their qualities.
20
3. Recognition
3 items will be included on a 5-point Likert scale where response options ranged
from 1 = strongly disagree to 5 = strongly agree. Items include:
a) I am concerned that people I know professionally will see my profile in social
networking site and recognize me.
b) I am concerned that people I know can recognize me through my profile
picture.
c) I am concerned that people I know can recognize me through the status
update of mine.
The second conceptualisation, internet experience, is operationalised into index
values range from 0 to 10 and based on 10 activities. The ten activities are reading an
online news site, looking for health/medical information, updating a personal website
blog, shopping online, online dating activities, searching for movie, playing online
games, downloading new songs, fund transferring and weather checking.
The third conceptualisation, uncertainty reduction strategies, is operationalised
into 10 items, 5-point scale ranging from 1 = never to 5 =never miss it. To measure
uncertainty reduction strategies, an index of five information-seeking or informationappraisal strategies that unacquainted individual might use will be constructed to
verify the credibility of others they meet online for initial interaction. These strategies
mapped onto the categories described by Ramirez et al. (2002), as follows:
a) Extractive
- I often google the unacquainted individuals name online.
- I often google the unacquainted individual online activities such as whether their
own a blog or any personal space to know about them.
b) Active
- I often save the chat history to check for consistency.
- I often save emails to check for cinsistency.
c) Passive
- I often compare photos to written/demographic description in their profile.
- I often look on the comment they write in their status
d) Interactive
- I often ask follow-up questions in email or chat to see if they are who they say they
are.
- I often ask same questions in different way to look on the validity of answer they
gave
e) Interactive
- I often ask questions on the phone about what they said in a profile, email or IM.
21
The forth conceptualisation, amount of self-disclosure, is operationalised into 5point scale ranging from 1 = strongly disagree to 5 = strongly agree. There are 5
items under this session:
a) I usually communicate about myself for fairly long periods at a time with those I
b)
c)
d)
e)
meet online.
I often discuss my feelings about myself with those I meet online.
I often tell the new friend about my own background.
I always share my family problems with the friend who I never meet offline.
I like to write my personal detail in the info description column.
study draws
on
quantitative
research
methodology and
close-ended
questionnaire will be the tool to collect the data from the respondents in USM.
Respondents are who willing to take part in the survey and complete the
questionnaire. The initial screening questions asked whether they ever involved in
knowing unacquainted individuals in social networking sites through text-based CMC.
If they answer yes, then they will be given a questionnaire and answer the questions
obtained. Those who help in completing the survey will receive RM2 incentive.
The survey instrument was constructed using a combination of established scales
and original items informed by the literature on privacy, information seeking, and self
disclosure in interpersonal and online relationships. The survey was pilot tested (n =
52) to validate original scales and clarify question wording. All scales were validated
through factor analysis using Varimax rotation and retaining Eigenvalues of 1 or
greater (all identified a 1-factor solution), followed by reliability analysis. Responses to
all related questions and ranged from 1 = strongly disagree to 5 = strongly agree,
unless specified otherwise.
22
7.4 Sampling
Convenience sampling is chosen because researcher unable to get the real number
of people who involved in social networking sites activities, therefore researcher will
be in certain place and passes the questionnaire to whoever in that particular place
such as library. But there will be an initial screening question to ask the passer-by to
ensure if they have involved in any social networking sites and ever make friend with
stranger, they are qualified to fill in the questionnaire. The target population is USM
students which contains 20,000 people and the number of respondents is 377
(n=377). 500 questionnaires will be attributed to get the exact 377 respondents which
filled in according to what to survey. All respondents are social networking sites users.
Margin of error is 5% and confidence level is 95%. All the respondents will answer the
questionnaires attributed.
8.1 Coding
Due to the fact that this studys questionnaire consists of entirely closed-ended
questions, the coding, which is set of instructions that will be used in the process of
converting data into a format that PASW can understand (Pallant, 2005), will be quite
simple. Coding, for this study, mainly involves the coding of the various responses to
questions related to the independent and dependent variables of privacy concerns,
internet experience, uncertainty reduction strategies and amount of self-disclosure, as
well as for variables such as gender, year of using social networking sites and so
forth. The possible responses for these variables need to be converted to numbers
23
before they can be entered into SPSS. Pallant (2005) provides an example related to
the variable of gender: the two possible responses for this question, male and female,
are converted (coded) into numbers, so that 1=males, 2=females (p. 14), and so on.
The responses to the questions in this study will be coded in a similar manner. For
instance, the 5 Likert items for the scale measuring attitudes towards forensic science
will be coded as follows: 1=strongly disagree, 2=disagree, 3=undecided, 4=agree,
5=strongly agree. To provide another example, the five responses for uncertainty
reduction strategies will be coded as follows: 1=never, 2=rarely, 3=occasionally,
4=often, 5=never miss it. This coding of the responses and scale will allow for the
variables to be measured on the interval scale of measurement required for the
statistical analysis that will be conducted.
24
While the R value in multiple regression also indicates the direction and strength of
the correlation, comparisons between the correlations of two separate independent
variables are done based on the standardised beta weights instead of the R values
26
because these beta weights have been converted to the same scale, which allows for
direct comparison between variables (Pallant, 2005). The R values, on the other
hand, are not standardised and are often based on different units of measurement,
which precludes the possibility of direct comparison between two or more
correlations. Despite this, R values are still important in determining correlation and
strength of correlation, and are interpreted in a similar manner to the r values in
Pearsons r based on guidelines set out by Guilford (as cited in Keyton, 2006, p. 219):
R value
< 0.20
0.20 0.40
0.40 0 .70
0.70 0 .90
> 0.90
Strength of correlation
Slight, almost negligible relationship
Low correlation; definite but small relationship
Moderate correlation; substantial relationship
High correlation; marked relationship
Very high correlation; very dependable relationship
27
References
Altman, I., & Taylor, D. A. (1973). Social penetration: The development of interpersonal
relationships. New York, NY: Holt, Rinehart and Winston.
Afifi, W. A., & Metts, S. (1998). Characteristics and consequences of expectation violation in
close relationships. Journal of Social and Personal Relationships, 15, 365-392.
Antheunis, M.L., Schouten, A.P., Valkenburg, P.M. & Peter, J. (2011). Interactive uncertainty
reduction strategies and verbal affection in computer-mediated communication.
Communication Research, 1-24.
Antheunis, M. L., Valkenburg, P. M., & Peter, J. (2010). Getting acquainted through social
network sites: Testing a model of online uncertainty reduction and social attraction.
Computers in Human Behavior, 26, 100-109.
28
Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday,
11(9). Retrieved
September
8,
2007,
from
http://www.firstmonday.org/issues/issue11_9/barnes/index.html
Berger, C. R. (1986). Uncertain outcome values in predicted relationships: Uncertainty
reduction theory then and now. Human Communication Research, 13, 34-38.
Berger, C. R., & Bradac, J. J. (1982). Language and social knowledge: Uncertainty in
interpersonal relations. London: Edward Arnold.
Berger, C .R., & Calabrese, R. J. (1975). Some explorations in initial interaction and beyond:
Toward a developmental theory of interpersonal communication. Human
Communication Research, 1, 99-11.
Berger, C. R., & Douglas, W. (1981). Studies in interpersonal epistemology: HI. Anticipated
interaction, self-monitoring, and observational context selection. Communication
Monographs, 48, 183-196.
Berger, C. R., Gardner, R. R., Parks, M. R., Schulman, L., & Miller, G. R. (1976).
Interpersonal epistemology and interpersonal communication. In G. R. Miller (Ed.),
Explorations in interpersonal communication (pp. 149-171). Beverly Hills, CA: Sage.
Berger, C. R., & Kellermann, K. A. (1983). To ask or not to ask: Is that a question? In R. N.
Bostrom (Ed,), Communication yearbook 7 (pp. 342-368), Beverly Hills, CA:Sage.
Berger, C, R,, & Kellermann, K, A. (1985), Personal opacity and social information
acquisition: Seek, but yet may not find. Paper presented at the annual convention of
the International Communication Association, Honolulu, Hawaii.
Berger, C, R,, & Perkins, J, W, (1978), Studies in interpersonal epistemology: Situational
attributes in observational context selection. In B, D, Ruben (Ed,), Communication
yearbook 2 (pp, 171-184), New Brunswick, NJ: Transaction Books.
Berger, C, R,, & Perkins, J, W, (1979), Studies in interpersonal epistemology: IL Selfmonitoring, involvement, facial affect, similarity, and observational context selection.
Paper presented at the annual convention of the Speech Communication Association,
San Antonio, Texas.
Byron, K., & Baldridge, D. C. (2007). E-Mail recipients impressions of senders likability: The
interactive effect of nonverbal cues and recipients personality. Journal of Business
Communication, 44, 137-160.
29
30
Ellison, N. B., Steinfield, C., & Lampe, C. (2006). Spatially bounded online social networks
and social capital: The role of Facebook. Paper presented at the 56th Annual
Conference of the International Communication Association, Dresden, Germany.
Gibbs, J. L., Ellison, N. B., & Lai, C.-H. (2011). First comes love, then comes Google: An
investigation of uncertainty reduction strategies and self-disclosure in online dating.
Communication Research, 38, 70-100.
Greene, K., Derlega, V. J., & Mathews, A. (2006). Self-disclosure in personal relationships. In
A. Vangelisti & D. Perlman (Eds.), Cambridge handbook of personal relationships (pp.
409-427). Cambridge, UK: Cambridge University Press.
Griffiths, J. R. (2003). Evaluation of the JISC information environment: Student perceptions
of services. Information Research, 8(4). Retrieved June 20, 2007, from
http://informationr.net/ir/8-4/paper160.html
Griffiths, J. R., & Brophy, P. (2005). Student searching behaviour and the Web: Use of
academic resources and Google. Library Trends, 53, 539-554.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks.
Proceedings of WPES05 (pp. 71-80). Alexandria, VA.
Harvey, J. H., Wells, G. L., & Alvarez, M. D. (1978). Attribution in the context of conflict and
separation in close relationships. In J. H. Harvey, W. Ickes, & R. F. Kidd (Eds.), New
directions in attribution research 2 (pp. 235-260). Hillsdale, NJ: Erlbaum.
Hancock, J. T., & Dunham, P. J. (2001). Impression formation in computer-mediated
communication revisited. Communication Research, 28, 325-347.
Hancock, J. T., Toma, C. L., & Fenner, K. (2008). I know something you dont: The use of
asymmetric personal information for interpersonal advantage. Proceedings of the
ACM 2008 conference on computer supported cooperative work (pp. 413-416). San
Diego, CA.
Hargittai, E. (2005). Survey measures of web-oriented digital literacy. Social Science
Computer Review,23, 371-379.
Heisler, J., & Crabill, S. (2006). Who are stinkybug and packerfan4? Email pseudonyms
and participants perceptions of demography, productivity, and personality. Journal of
Computer-Mediated Communication, 12(1). Retrieved June 20, 2009, from
http://jcmc.indiana.edu/vol12/issue1/heisler.html
31
Joinson, A. N. (2001). Self-disclosure in computer-mediated communication: The role of selfawareness and visual anonymity. European Journal of Social Psychology, 31, 177
192.
Jourard, S. M. (1971). Self-disclosure: An experimental analysis of the transparent self. New
York, NY: John Wiley.
Kellermann, K. (1986). Anticipation of future interaction and information exchange in initial
interaction. Human Communication Research, 13, 41-75.
Kellermann, K., & Berger, C. R. (1984). Affect and social information acquisition: Sit back,
relax, and tell me about yourself. In R. N. Bostrom (Ed.), Communication yearbook 8
(pp. 412^145). Beverly Hills, CA: Sage.
Keyton, J. (2006). Communication Research: Asking Questions, Finding Answers. New York:
McGraw-Hill.
Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer
mediated communication. American Psychologist, 39, 1123-1134.
Kraut, R., Mukhopadhyay, T., Szczypula, J., Kiesler, S., & Scherlis, B. (1999). Information
and communication: Alternative uses of the Internet in households. Information
Systems Research, 10, 287303.
Lampe, C., Ellison, N. B., & Steinfield, C. (2007). A familiar Face(book): Profile elements as
signals in an online social network. Paper presented at the Conference on Human
Factors in Computing Systems, San Jose, CA, USA.
Lea, M., & Spears, R. (1992). Paralanguage and social perception in computer-mediated
communication. Journal of Organizational Computing, 2, 321341.
Lea, M., & Spears, R. (1995). Love at first byte? Building personal relationships over
computer networks. In J. T. Wood & S. Duck (Eds.), Understudied relationships: Off
the beaten track (pp. 197-233). Thousand Oaks, CA: Sage.
Ling, S. C., Chuan, L., Yian, T. B. C., Yani, S., & Huaping, C. (2007). Getting to know
websites through
uncertainty reduction strategies: Which strategies are used
more, and which are better? An empirical study of first-time visitors. Proceedings of
2007 International Conference on Wireless Communications, Networking and Mobile
Computing, WiCOM 2007 (Article No. 4340726, pp. 3840-3843).
32
McKenna, K. Y. A., Green, A. S., & Gleason, M. E. J. (2002). Relationship formation on the
Internet: Whats the big attraction? Journal of Social Issues, 58, 9-31.
Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal
of Computer-Mediated Communication, 12(2). Retrieved June 5, 2007, from
http://jcmc.indiana.edu/vol12/issue2/metzger.html
Pallant, J. (2005). SPSS Survival Manual. Crows Nest, NSW: Allen & Unwin.
Parks, M. R., & Adelman, M. B. (1983). Communication networks and the development of
romantic relationships: An expansion of uncertainty reduction theory. Human
Communication Research, 10, 55-79.
Parks, M. R., & Floyd, K. (1996). Making friends in cyberspace. Journal of Communication,
46, 80-97.
Pena, J., & Hancock, J. T. (2006). An analysis of instrumental and socio-emotional content in
online multi-player videogames. Communication Research, 33, 92-109.
Planalp, S., & Honeycutt, J. M. (1985). Events that increase uncertainty in personal
relationships. Human Communication Research, 11, 593-604.
Postmes, T., Spears, R., & Lea, M. (1998). Breaching or building social boundaries?
SIDEeffects of computer-mediated communication. Communication Research, 25,
689715.
Postmes, T., Spears, R., & Lea, M. (2000). The formation of group norms in computer
mediated communication. Human Communication Research, 26, 341371.
Pratt, L., Wiseman, R. L., Cody, M. J., & Wendt, P. F. (1999). Interrogative strategies and
information exchange in computer-mediated communication. Communication
Quarterly, 47, 4666.
Ramirez, A., Walther, J. B., Burgoon, J. K., & Sunnafrank, M. (2002). Information-seeking
strategies, uncertainty and computer-mediated communication: Toward a conceptual
model. Human Communication Research, 28, 213-228.
33
Siegel, J., Dubrovsky, V., Kiesler, S., & McGuire, T. W. (1986). Group processes in
computer-mediated communication. Organizational Behavior and Human Decision
Processes, 37, 157187.
Spears, R., & Lea, M. (1992). Social influence and the influence of the social in computermediated communication. In M. Lea (Ed.), Contexts of computer-mediated
communication (pp. 30-65). London: Harvester-Wheatsheaf.
Srull, T. K., & Wyer, R. S. (1989). Person Memory and Judgment. Psychological Review, 96,
58-83.
Stephure, R. J., Boon, S. D., MacKinnon, S. L., & Deveau, V. L. (2009). Internet initiated
relationships: Associations between age and involvement in online dating. Journal of
Computer-Mediated Communication, 14, 658-681.
Sunnafrank, M. (1986). Predicted outcome value during initial interactions: A reformulation of
uncertainty reduction theory. Human Communication Research, 13, 3-33.
Walther, J. B., Van Der Heide, B., Hamel, L., & Shulman, H. (2009). Self-generated versus
other-generated statements and impressions in computer-mediated communication:
A test of warranting theory using Facebook. Communication Research, 36, 229-253.
Wheeless, L. R. (1978). A follow-up study of the relationships among trust, disclosure, and
interpersonal solidarity. Human Communication Research, 4, 143-157.
Wheeless, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported selfdisclosure. Human Communication Research, 2, 338-346.
Whitty, M. (2008). Revealing the real me, searching for the actual you: Presentations of
self on an internet dating site. Computers in Human Behavior, 24, 1707-1723.
Zuckerman, M., DePaulo, B. M., & Rosenthal, R. (1981). Verbal and nonverbal
communication of deception. In L. Berkowitz (Ed.), Advances in experimental social
psychology (Vol. 14, pp. 159). New York: Academic Press.
35