Pragmatics of Computer-Mediated Communication

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 763

Pragmatics of Computer-Mediated Communication

HoPs 9
Handbooks of Pragmatics

Editors
Wolfram Bublitz
Andreas H. Jucker
Klaus P. Schneider

Volume 9

De Gruyter Mouton
Pragmatics of
Computer-Mediated
Communication
Edited by
Susan C. Herring
Dieter Stein
Tuija Virtanen

De Gruyter Mouton
ISBN 978-3-11-021445-1
e-ISBN 978-3-11-021446-8

Library of Congress Cataloging-in-Publication Data


A CIP catalog record for this book has been applied for at the Library of Congress.

Bibliographic information published by the Deutsche Nationalbibliothek


The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie;
detailed bibliographic data are available in the Internet at http://dnb.dnb.de.

” 2013 Walter de Gruyter GmbH, Berlin/Boston


Cover image: ooyoo/iStockphoto
Typesetting: Dörlemann Satz GmbH & Co. KG, Lemförde
Printing: Hubert & Co. GmbH & Co. KG, Göttingen

앝 Printed on acid-free paper
Printed in Germany
www.degruyter.com
Preface to the handbook series
Wolfram Bublitz, Andreas H. Jucker and Klaus P. Schneider

The series Handbooks of Pragmatics, which comprises nine self-contained vol-


umes, provides a comprehensive overview of the entire field of pragmatics. It is
meant to reflect the substantial and wide-ranging significance of pragmatics as a
genuinely multi- and transdisciplinary field for nearly all areas of language de-
scription, and also to account for its remarkable and continuously rising popularity
in linguistics and adjoining disciplines.
All nine handbooks share the same wide understanding of pragmatics as the
scientific study of all aspects of linguistic behaviour. Its purview includes patterns
of linguistic actions, language functions, types of inferences, principles of com-
munication, frames of knowledge, attitude and belief, as well as organisational
principles of text and discourse. Pragmatics deals with meaning-in-context, which
for analytical purposes can be viewed from different perspectives (that of the
speaker, the recipient, the analyst, etc.). It bridges the gap between the system side
of language and the use side, and relates both of them at the same time. Unlike syn-
tax, semantics, sociolinguistics and other linguistic disciplines, pragmatics is de-
fined by its point of view more than by its objects of investigation. The former pre-
cedes (actually creates) the latter. Researchers in pragmatics work in all areas of
linguistics (and beyond), but from a distinctive perspective that makes their work
pragmatic and leads to new findings and to reinterpretations of old findings. The
focal point of pragmatics (from the Greek prãgma ‘act’) is linguistic action (and
inter-action): it is the hub around which all accounts in these handbooks revolve.
Despite its roots in philosophy, classical rhetorical tradition and stylistics, prag-
matics is a relatively recent discipline within linguistics. C.S. Peirce and C. Morris
introduced pragmatics into semiotics early in the twentieth century. But it was not
until the late 1960s and early 1970s that linguists took note of the term and began
referring to performance phenomena and, subsequently, to ideas developed and ad-
vanced by Wittgenstein, Ryle, Austin and other ordinary language philosophers.
Since the ensuing pragmatic turn, pragmatics has developed more rapidly and di-
versely than any other linguistic discipline.
The series is characterised by two general objectives. Firstly, it sets out to re-
flect the field by presenting in-depth articles covering the central and multifarious
theories and methodological approaches as well as core concepts and topics char-
acteristic of pragmatics as the analysis of language use in social contexts. All ar-
ticles are both state of the art reviews and critical evaluations of their topic in the
light of recent developments. Secondly, while we accept its extraordinary com-
plexity and diversity (which we consider a decided asset), we suggest a definite
structure, which gives coherence to the entire field of pragmatics and provides

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:11 AM
vi Wolfram Bublitz, Andreas H. Jucker and Klaus P. Schneider

orientation to the user of these handbooks. The series specifically pursues the fol-
lowing aims:

– it operates with a wide conception of pragmatics, dealing with approaches that


are traditional and contemporary, linguistic and philosophical, social and cul-
tural, text- and context-based, as well as diachronic and synchronic;
– it views pragmatics from both theoretical and applied perspectives;
– it reflects the state of the art in a comprehensive and coherent way, providing a
systematic overview of past, present and possible future developments;
– it describes theoretical paradigms, methodological accounts and a large
number and variety of topical areas comprehensively yet concisely;
– it is organised in a principled fashion reflecting our understanding of the struc-
ture of the field, with entries appearing in conceptually related groups;
– it serves as a comprehensive, reliable, authoritative guide to the central issues
in pragmatics;
– it is internationally oriented, meeting the needs of the international pragmatic
community;
– it is interdisciplinary, including pragmatically relevant entries from adjacent
fields such as philosophy, anthropology and sociology, neuroscience and psy-
chology, semantics, grammar and discourse analysis;
– it provides reliable orientational overviews useful both to students and more
advanced scholars and teachers.

The nine volumes are arranged according to the following principles. The first
three volumes are dedicated to the foundations of pragmatics with a focus on micro
and macro units: Foundations must be at the beginning (volume 1), followed by
the core concepts in pragmatics, speech actions (micro level in volume 2) and dis-
course (macro level in volume 3). The following three volumes provide cognitive
(volume 4), societal (volume 5) and interactional (volume 6) perspectives. The
remaining three volumes discuss variability from a cultural and contrastive (vol-
ume 7), a diachronic (volume 8) and a medial perspective (volume 9):

1. Foundations of pragmatics
Wolfram Bublitz and Neal R. Norrick
2. Pragmatics of speech actions
Marina Sbisà and Ken Turner
3. Pragmatics of discourse
Klaus P. Schneider and Anne Barron
4. Cognitive pragmatics
Hans-Jörg Schmid
5. Pragmatics of society
Gisle Andersen and Karin Aijmer

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:11 AM
Preface to the handbook series vii

6. Interpersonal pragmatics
Miriam A. Locher and Sage L. Graham
7. Pragmatics across languages and cultures
Anna Trosborg
8. Historical pragmatics
Andreas H. Jucker and Irma Taavitsainen
9. Pragmatics of computer-mediated communication
Susan C. Herring, Dieter Stein and Tuija Virtanen

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:11 AM
Brought to you by | New York University Bobst Library Technical Services
Authenticated
Download Date | 6/15/15 3:11 AM
Preface to this handbook

The creation of this volume represents a convergence of circumstances on several


fronts. In 2000, Tuija Virtanen organized a symposium at the 7th International
Pragmatics Conference in Budapest, Hungary, at which six papers were presented,
including by Susan Herring, Brenda Danet, and Tuija herself, with Alexandra
Georgakopoulou as the discussant. The event having been well received, Tuija had
the idea to organize a second symposium on the pragmatics of CMC at the 2005 In-
ternational Pragmatics Association Conference in Riva, Italy, and she approached
Susan with a proposal to co-organize it. Susan agreed; however, shortly thereafter
Dieter Stein approached her with a similar proposal, so she suggested that the three
of them join forces, although Tuija and Dieter were not previously acquainted.
That was the first convergence. The Riva symposium featured eight presenta-
tions, including by volume contributors Jannis Androutsopoulos, Loukia (Prasi-
nou) Lindholm, and Dieter himself. Alexandra Georgakopoulou was again the dis-
cussant.
Another convergence involved the publisher and the format for the volume. We
were first invited to edit a volume on the theme of the symposia for the John
Benjamins Pragmatics & Beyond series, for which Andreas Jucker was a series
editor at the time. We agreed and put out a call for papers for a peer reviewed vol-
ume of original research studies. After we had accepted submissions, but before we
had signed a contract with Benjamins, Susan was contacted by Andreas Jucker,
now an editor for Mouton de Gruyter’s Handbooks of Pragmatics series, about
editing a handbook volume on CMC. Concerned that research on the pragmatics
of CMC was not sufficiently advanced to support two high-quality volumes that
would come out at approximately the same time, Susan persuaded Andreas that we
should convert our volume of research studies into a handbook, with the three of us
as co-editors. With the new target of a handbook in mind, we put out a second call
for papers, as well as inviting recognized experts to contribute chapters, and under-
took a second cycle of peer reviews and revision. This introduced a necessary
delay in the publication of the volume. The change in the genre of the volume is
also crucial to note, as many of the chapters preserve the trace of the earlier project
in that they include original empirical research. Ultimately, with the blessing of our
new series editor, Andreas Jucker, we encouraged all the authors to include a case
study in their chapter, along with a substantial review of the issues and literature on
their topic. This was both to promote a consistent format across the chapters and to
illustrate, with examples, core principles of the chapters that the authors them-
selves were often responsible for introducing into the literature. In this respect the
present handbook differs from handbooks on pragmatic topics with a long tradition
of research: Here the literature reviewers are in many cases the original knowledge
creators.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/21/15 9:09 AM
x Preface to this handbook

We wish to thank the Handbook of Pragmatics Series Editors, especially


Andreas Jucker, for helpful guidance at every stage of the preparation of this hand-
book, and Barbara Karlson and Wolfgang Konwitschny at Mouton for their profes-
sionalism, patience, and good humor throughout the long process of bringing this
volume to press. Thanks are also due to the external reviewers for their insightful
comments on the chapter submissions, and to our student assistants – Malia Willey,
Susanne Erhardt, Nini Behrendt, Marcel Kowalewski, Wiebke Ostermann, Bastian
Heynen, and Sebastian Groth – for their help in copyediting the chapters. We hope
that the final product will not disappoint any of them.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/21/15 9:09 AM
Table of contents

Preface to the handbook series . . . . . . . . . . . . . . . . . . . . . . . . v


Preface to this handbook . . . . . . . . . . . . . . . . . . . . . . . . . . . ix

1. Introduction to the pragmatics of computer-mediated communication


Susan C. Herring, Dieter Stein, and Tuija Virtanen . . . . . . . . . . 3

I. Pragmatics of computer-mediated modes

2. Email communication
Christa Dürscheid and Carmen Frehner . . . . . . . . . . . . . . . 35

3. Mailing list communication


Helmut Gruber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

4. Blogging
Cornelius Puschmann . . . . . . . . . . . . . . . . . . . . . . . . . 83

5. Real-time chat
John C. Paolillo and Asta Zelenkauskaite . . . . . . . . . . . . . . . 109

6. Instant messaging
Naomi S. Baron . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

7. Text messaging
Crispin Thurlow and Michele Poff . . . . . . . . . . . . . . . . . . . 163

8. Mobile phone communication


Rich Ling and Naomi S. Baron . . . . . . . . . . . . . . . . . . . . . 191

9. Synchronous voice-based computer-mediated


communication
Christopher Jenks and Alan Firth . . . . . . . . . . . . . . . . . . . 217
xii Table of contents

II. Classic pragmatic phenomena in computer-mediated


communication

10. Relevance in computer-mediated conversation


Susan C. Herring . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

11. Performativity in computer-mediated communication


Tuija Virtanen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

12. Address in computer-mediated communication


Sandi Michele de Oliveira . . . . . . . . . . . . . . . . . . . . . . . 291

13. Apologies in email discussions


Sandra Harrison and Diane Allton . . . . . . . . . . . . . . . . . . 315

14. Internet advice


Miriam A. Locher . . . . . . . . . . . . . . . . . . . . . . . . . . . 339

15. Deception in computer-mediated communication


Jeffrey Hancock and Amy Gonzalez . . . . . . . . . . . . . . . . . . 363

III. Pragmatics of computer-mediated communication phenomena

16. Email hoaxes


Theresa Heyd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

17. Authentication and Nigerian Letters


Martin Gill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411

18. The maxims of online nicknames


Loukia Lindholm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437

19. Micro-linguistic structural features of computer-mediated


communication
Markus Bieswanger . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Table of contents xiii

IV. Discourse pragmatics of computer-mediated interaction

20. Rhythm and timing in chat room interaction


Rodney Jones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489

21. Conversational floor in computer-mediated discourse


James Simpson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

22. Conversational coherence in small group chat


Kris M. Markman . . . . . . . . . . . . . . . . . . . . . . . . . . . 539

23. Repair in chat room interaction


Jennifer Baker Jacobs and Angela Cora Garcia . . . . . . . . . . . 565

24. Responses and non-responses in workplace emails


Karianne Skovholt and Jan Svennevig . . . . . . . . . . . . . . . . . 589

25. Small talk, politeness, and email communication in the workplace


Amelie Hössjer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613

26. Flaming and linguistic impoliteness on a listserv


Brenda Danet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639

V. Broader perspectives

27. Code-switching in computer-mediated communication


Jannis Androutsopoulos . . . . . . . . . . . . . . . . . . . . . . . . 667

28. Narrative analysis and computer-mediated communication


Alexandra Georgakopoulou . . . . . . . . . . . . . . . . . . . . . . 695

29. Genre and computer-mediated communication


Janet Giltrow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717

About the authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739


Subject index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
xiv Table of contents
For Brenda Danet (1937–2008),
a groundbreaking scholar and enthusiastic
connoisseur of computer-mediated language.
1. Introduction to the pragmatics of computer-
mediated communication
Susan C. Herring, Dieter Stein, and Tuija Virtanen

1. The state of the field

Computer-mediated language research represents a new and dynamically evolving


field. Although a few pioneering studies were published in the 1980s,1 linguistic
study of computer-mediated communication (CMC) began attracting serious atten-
tion only about 20 years ago, with a classification question that is now regarded as
overly simplistic: Is CMC more like speech or writing? (e.g., Ferrara, Brunner, and
Whittemore 1991; Maynor 1994). Those early days were also characterized by a
fascination with superficial structural features, such as acronyms, abbreviations,
and emoticons, that purportedly characterized CMC (e.g., Murray 1990; Reid
1991). Since then, however, the field – if an area of study that is still so new can be
described as such – has grown dramatically.
The early research mentioned above was followed in the 1990s by contextual-
ized discourse studies of language use in online textual environments such as mail-
ing lists, newsgroups, and chat rooms. Politeness (or the lack thereof) in the former
was one of the first topics to attract attention, along with gender differences in po-
liteness behaviors (e.g, Herring 1994, 1996; Kim and Raja 1991). Chat rooms
raised issues about how interaction (turn-taking, topical coherence, etc.) was man-
aged in computer-mediated environments (e.g., Garcia and Jacobs 1999; Herring
1999; Rintel and Pittam 1997). In the latter connection, it was observed that the
textual record left by CMC allows communicators to engage in multiple simulta-
neous threads of conversation, as well as giving rise to a meta-awareness that
fosters language play (Danet 2001; Danet, Ruedenberg-Wright, and Rosenbaum-
Tamari 1997; Herring 1999).
Research addressing sociolinguistic concerns started to appear in the mid-
1990s. Some of the earliest studies examined language choice and code switching
(e.g., Androutsopoulos and Hinnenkamp 2001; Georgakopoulou 1997; Paolillo
1996); this was later followed by studies of variation in usage – especially of ty-
pography and orthography – according to participants’ status, regional dialect,
gender, and CMC mode (e.g., Androutsopoulos and Ziegler 2003; Herring and
Zelenkauskaite 2009; Ling and Baron 2007; Paolillo 1999; Siebenhaar 2003; Tag-
liamonte and Denis 2008).2 Meanwhile, interest in classifying CMC as a whole
was, for the most part, abandoned in favor of classification of modes or genres of
CMC, on one hand (Herring 2002),3 and classification approaches that cross-cut
modes based on scalar dimensions or facets, on the other – the latter often inspired

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
4 Susan C. Herring, Dieter Stein, and Tuija Virtanen

by earlier work on speech and writing (e.g., Collot and Belmore 1996, with refer-
ence to Biber 1988).4
Until recently, the vast majority of language-oriented CMC research had as its
subject matter English-language CMC – a reflection, in part, of the origins of the
Internet in the United States. This, too, has been changing, especially as regards
discourse analysis and sociolinguistic research (see, e.g., the papers in Danet and
Herring 2007), in accordance with the rapid diffusion of the Internet to other coun-
tries starting in the mid-1990s. Native-language traditions of research into com-
puter-mediated language have now become established in Germany, France, and
the Nordic countries, and are starting to emerge in Japan, China, Spain, Italy, and
Greece.5 Cross-linguistic research has identified both similarities and cultural spe-
cificities as regards language use online.
While most of the topics mentioned above can be subsumed under the broad
heading of pragmatics, studies focusing explicitly on pragmatic issues are a more
recent phenomenon. When the first author, Susan Herring, was putting together a
keynote lecture for the 2007 International Pragmatics Conference on “The Prag-
matics of Computer-Mediated Communication: Prospectus for an Emerging Re-
search Agenda”, she found few high quality published works to review – or rather,
few that could be classified as pragmatic first and foremost,6 as opposed to the
many studies that could also be classified as discourse analysis, conversation
analysis, sociolinguistics, and the like. In that lecture, she argued that it is nonethe-
less useful to distinguish a “pragmatics of CMC” from other language-focused
approaches to CMC, inasmuch as it can benefit from drawing on pragmatic theory,
as well as methods of analysis developed within the tradition of linguistic prag-
matics, to provide potentially unique perspectives. Specifically, she recommended
that such an approach focus on three kinds of phenomena: 1) classical core prag-
matic phenomena (e.g., implicature, presupposition, relevance, speech acts, polite-
ness) in CMC, 2) CMC-specific phenomena (e.g., emoticons, nicknames, “Net-
speak”), and 3) CMC genres or modes (blogs, SMS, wikis, chat, etc.). That
proposal informs the broad organization of the present volume. However, in the
end it proved difficult to separate out discourse-pragmatic from “core” phenomena,
with the result that the volume includes a section on the discourse pragmatics of
CMC as well.
In short, the “pragmatics of CMC” is still in flux. Yet a handbook traditionally
brings together comprehensive and canonized knowledge, blessed by the passage
of time. Strictly speaking, given the speed of knowledge creation in the field of
CMC pragmatics and its relative youth, this handbook should not be possible.
There are gaps in its coverage, and the research presented in some chapters is new.
For these reasons, the collection might perhaps better be viewed as presenting the
“state of the art” in an emergent field rather than as a distillation of time-honored
knowledge. One notable gap is in the coverage of Web 2.0 phenomena such as
wikis, microblogging, and social network sites, about which significant bodies of

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 5

language-focused research have yet to accumulate. Section 4 of this chapter dis-


cusses emerging directions that research on language use in Web 2.0 is taking thus
far.
In the face of so many apparently new developments, one might question
whether the term “computer-mediated communication” is still appropriate to char-
acterize the overall scope of the phenomenon. Communication technologies are in-
creasingly moving beyond computers. Although mobile phones can be considered
honorary computers where text messaging is concerned, voice calls challenge that
characterization, as does television-mediated conversation via text messages (Ze-
lenkauskaite and Herring 2008). Some recent language-focused publications use
alternatives such as “digital media” and “new media” language. However, the term
“new media” is lacking in historical perspective, and “digital media” is too broad,
referring as it does to video games as well as communication devices, although
“digital discourse” (e.g., Thurlow and Mroczek 2011) makes clear that language
use is in focus. Conversely, the term “keyboard-to-screen communication” pro-
posed by Jucker and Dürscheid (in press) is too narrow, in that it excludes com-
munication input via audio and video technologies. It well may be that in the
coming years, the dust will settle and a descriptive term that is neither too narrow
nor too broad will emerge as the obvious candidate. For now, CMC still seems a
useful term, in that it is based on established tradition and remains the term pre-
ferred among communication scholars, so it will continue to be used in this vol-
ume.

2. Perspectives on pragmatics

A volume title such as the “Pragmatics of Computer-Mediated Communication”


begs the question of what our notion of pragmatics is. Given the tricky issue of the
limits of the discipline and the interdisciplinary nature of CMC itself, some re-
marks are in order about the rationale for the selection of contributions to the vol-
ume.
Generally speaking, the perspectives on pragmatics represented by the authors
of this handbook are broad, yet not so broad that they include all of linguistics (cf.
Verschueren 1999). At the same time, they are wider than the more narrow view
represented by a classical textbook like Levinson (1983), which focuses on a
limited set of phenomena that includes deixis, implicature, presupposition, and
speech acts. For example, in the view adopted here, there is no clear boundary be-
tween pragmatics and sociolinguistics. Such a boundary, dictated by academic la-
bels, would in any case be more heuristic than real. The decision to take a middle
road between a wide and a narrow view of pragmatics seemed to us the best trade-
off between a reasonable coherence and relative representativeness. A further rea-
son for avoiding too narrow a view is that language use on the Internet can only be

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
6 Susan C. Herring, Dieter Stein, and Tuija Virtanen

characterized by a broader perspective that takes into account the complex inter-
weaving between language use and its technologically-mediated forms.
Another way to situate the approach represented here is suggested by Ariel’s
(2010) overview of how the field of pragmatics might be internally structured.
Ariel makes a useful distinction between two approaches to pragmatics. “Border-
seekers” focus on the distinction between semantics and pragmatics, restricting
the list of topics that belong to each. For border-seekers, pragmatics is predomi-
nantly the domain of a particular set of topics that are defined as pragmatic, rather
than syntactic or semantic. This orientation facilitates the description of grammar
along relatively simple lines, as the “messy” stuff is moved out to a domain of its
own. The theoretical approach adopted, however, imposes severe restrictions as to
what can be included in pragmatics, resulting in core topics that can be accounted
for using particular linguistic tools, such as Gricean pragmatics, neo-Gricean
pragmatics, and Relevance Theory. Border-seekers are an Anglo-American tradi-
tion.
In contrast, “problem-solvers” start out from linguistic puzzles that cannot be
solved in terms of grammar, or “the grammar” in a Chomskyan sense. For prob-
lem-solvers the focus is on the identification of a problem for empirical study, and
pragmatics is a matter of adopting a particular perspective on the object of study.
The number or nature of topics to be explored in pragmatic terms is not limited.
Problem-solvers are particularly popular in the European Continental tradition.
The classical areas in the sense of Levinson (1983), the more narrow-scope ap-
proach to pragmatics, illustrate the “code” approach to pragmatics. They tend to
concern aspects of language that have structure-external context “encoded” in
them, or are closely related or “signaled” in relatively systematic or even gram-
maticalized ways by language. The point of departure for these approaches is
basically the individual expression, whereas in problem-solving pragmatics the
point of departure tends to be a certain mode or genre or phenomenon of externally
defined language use, such as code-switching, in which language is embedded and
receives its conversational, social, and interactional meanings.
While narrow-scope, code-based approaches are covered in this handbook, a
majority of the contributions, following contemporaneous interest in the field of
pragmatics, adopt problem-solving approaches. Among these are discourse- and
conversation-analytical approaches, approaches that consider various facets of the
notion of “context” in language use. Some contributions address narrative and
genre analysis, and more purely descriptive approaches to CMC-specific language
phenomena are also represented. Excluded, in contrast, are approaches that have
some connection to pragmatics but primarily belong to another domain, such as
applied linguistics, corpus/computational linguistics, logic/formal semantics, cog-
nitive linguistics/psycholinguistics, and variationist sociolinguistics. Including
them, or trying to do justice to all subfields represented by such a wide approach,
would have meant producing several volumes.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 7

Arguably the problem-solving class of approaches to the pragmatics of CMC


includes the socio-technical constellations of the uses of language in CMC – the
communication-pragmatic constraints as captured in concepts such as “mode” and
“affordances”. The effects of the medium on, for example, the management of
grounding, on uptake, and on the notion of context are important in identifying dif-
ferences between the traditional media and CMC, and it is an empirical question to
what extent – and in what ways – medium effects shape online language use. Thus
we assume that medium effects are a priori an eligible subject of study within the
pragmatics of CMC.

3. Recurrent theoretical issues

3.1. Technological determinism


The chapters in this handbook attempt to various degrees, implicitly or explicitly,
to explain language in CMC: why the linguistic properties of CMC are the way
they are, as well as how and why they are different from those of spoken and (tradi-
tional) written language. These questions are closely linked to the much-debated
question of technical determinism: What is the role of the technological medium in
shaping the behavior of users of that medium? The discussion (briefly summarized
in Herring 2001: 614; extensively discussed in Döring 2003) in the context of
CMC goes back to an article by Daft and Lengel (1984), who characterize spoken
language as a “rich” medium and communication via computer as “lean”, with in-
formation only available through one channel, typed text. Although Daft and Len-
gel did not refer explicitly to CMC, this characterization soon attached itself to
CMC and became the basis for claims that CMC was impoverished and ill-suited
for certain purposes of communication (e.g., Kiesler, Siegel, and McGuire 1984).
Two topical lines of discussion can be distinguished here. The first is the deter-
ministic perspective: User behavior is a result of the physical conditions of produc-
tion and reception of the medium. In this view, language and language usage are
shaped by the constraints and affordances of the medium. This claim, while intu-
itively true to some extent, has been made with various degrees of strength and ex-
clusivity. A corollary of this view is that the stronger the claim of pure technical
determinism, the stronger the implication of universality and convergence of dif-
ferent languages used on the Internet.
The issue of media richness or media leanness is important theoretically for
characterizing the medium fully, as well as for applied purposes. As Clark and
Brennan (1991) point out, for a given communication purpose, the choice of
medium is important: One channel may be too rich, another may be too lean.
Döring (2003: 134) cites the example of face-to-face talk, which may necessitate
deflection of attention and the need for relational small talk, as compared to a more

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
8 Susan C. Herring, Dieter Stein, and Tuija Virtanen

impersonal and efficient short email message. Parts of Hössjer’s (this volume)
findings in a study of professional communication that includes media switches
can be explained by reference to this type of strategic medium choice.
The second line of discussion, not unconnected to the first, is the notion that
CMC is deficient compared to spoken and written language. This view dominated
early research and application in CMC (e.g., Daft and Lengal 1984; Kiesler et al.
1984); it emphasizes the absence of a number of signal types, such as non-verbal,
auditory, olfactory, gustatory, and tactile. “The problem”, Brennan (1998: 1) wrote,
“is that electronic contexts are often impoverished ones”. CMC scholars who
subscribe to this view often focus on “compensational” features such as emoticons,
graphical devices, repetitions, and deletions, as discussed in the contribution by
Bieswanger (this volume), and performative action words such as *waves* (as dis-
cussed by Virtanen in this volume). These can be interpreted as replacing paralin-
guistic and non-verbal cues that are absent from the written repertoire.
An alternative explanation for these common features of CMC – so-called
“Netspeak” features, as described by Crystal (2001) – is that they are playful and
represent the inherently ludic character of language use on the Internet (e.g., Danet
2001; Danet et al. 1997). The written, persistent nature of CMC makes language
more available for metalinguistic reflection than in the case of speech, and this, to-
gether with a tendency towards loose cross-turn relatedness in multiparticipant
CMC, encourages language play (Herring 1999, this volume). According to this
view, CMC is not so much impoverished relative to speech and writing as different
in nature from them.
Medium effects are addressed in most chapters in this collection in one way or
another. For example, Simpson, citing Cherny (1999), notes the easier construction
of multiple floors in synchronous CMC. Harrison and Allton (this volume) note
that email is more economical in that the interaction is accelerated by combining
several conversational moves into a single message (see also Condon and Čech
2010). At the same time, the rapid exchange of messages in multiparty chat inter-
faces that display messages in the order received can result in disrupted turn adja-
cency, loosened norms of relevance, and decreased conversational coherence, as
discussed in the chapter by Herring.
Finally, several of the chapters shed yet another light on the impoverishment
question. A recent development in research on Internet language, manifested in
several contributions in this volume, involves identifying emergent pragmatic
functions of phenomena that were hitherto predominantly considered socio-
linguistic, such as address terms (de Oliveira this volume) and code-switching (An-
droutsopoulos this volume), as well as the analysis of emoticons as “illocutionary
force indicating devices” analogous to punctuation (Dresner and Herring 2010).
These are examples of how existing forms can become endowed with new prag-
matic meanings, a process of sign genesis that countervails ideas of “impoverish-
ment” of Internet language. This approach holds that new expressive needs and

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 9

forms arise from and adapt to specific conditions of the new medium. Such new
functions result from the specific “faceting” structure (Herring 2007) – the affor-
dances and the communicative situation – of the medium, together with an en-
hanced metapragmatic awareness arising from the textual nature of most CMC
(Herring 1999; Thurlow and Poff this volume). However, unlike in technological
determinism, these effects are variable rather than categorical, manifesting differ-
ently in different languages and cultures.

3.2. Internet genres


Another pervasive, pragmatic-based theme in the CMC literature is Internet
genres. The Internet enables new kinds of participation, new kinds of fragmen-
tation, and new ways of co-constructing meaning that transcend traditional notions
of conversation, narrative, exposition, and so forth. The issue of classifying Inter-
net language into types has been a focus of linguistic CMC research since the
1990s, initially in relation to speech and writing (e.g., Baron 1998; Maynard 1994;
Yates 1996) and later in terms of technological modes such as email, chat, and
MUDs and MOOs (e.g., Cherny 1999; Herring 2002). A section of this volume is
devoted to the mode-based approach. Given the proliferation and convergence of
CMC technologies, however, such an approach cannot capture the full range of
constellations that form around digital communication. A first explicit approach to
a typology based on the medial features and external communicative setting is
Herring’s (2007) faceted approach to classifying computer-mediated discourse
(CMD). As she is careful to caution, however, “the scheme is not in itself a con-
tribution to a theory of genre, but is rather a preliminary aggregation of factors that
will have to find a place in a theory of CMD genres” (n.p).
The chapter by Giltrow in this volume represents the current state of the art of
discussion of the notion of genre in CMC from a point of view that is informed by
both the new rhetoric and modern pragmatics. Giltrow (this volume) and Giltrow
and Stein (2009) see the focus of genre studies – which traditionally has been the
search for discourse invariants, how to identify the “type” – as moving away from
statistical averages or privileging of form occurrences and becoming more com-
plex, with linguistic forms seen more as manifestations and instructions to con-
struct meanings in ad hoc processes. This drift in the theoretical orientation of the
definition of genre recapitulates the drift in the study of language on the Internet
from a surface, form-based approach to a more broadly pragmatic approach to an
emphasis on users as social identity carriers in dynamic, ad hoc, cognitive states. A
“constructionist” approach to social meanings is also discussed by Andoutsopou-
los (this volume).
A common theme of recent work on the subject is that genre definition is more
fluid on the Internet than in spoken and written media. If genres are primarily de-
fined by external function, Internet genres seem to be more multi-functional and

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
10 Susan C. Herring, Dieter Stein, and Tuija Virtanen

open to changes and adaptations of societal and interpersonal functions, and it is


harder to define invariants on the functional level. This applies to even seemingly
technically constrained CMC modes such as text messaging. Thurlow and Poff
(this volume) observe that the differences between texting, instant messaging, and
emailing, modes that are quite distinct in terms of Herring’s faceted parameters,
tend to blur when compared with respect to the range of functions they fulfill. To
take another example, whatever the definition is of the blog (Puschmann, this vol-
ume), there are so many sub-types that it is harder to define the prototype than with
most written and oral-based genres, as Herring, Scheidt, Bonus, and Wright (2005)
conclude in their analysis of “weblogs as a bridging genre”. This receptivity to in-
novation and the in-principle openness of the set of genres are consequences of the
rapidly-changing technical conditions of digital communication. Generally, as Gil-
trow points out, this openness and fluidity of the ecology of genres on the Internet
has made for genres being named at a low level of generality, allowing genre the-
ory “to assume an open set” in principle. Thus, rather than speaking of blogs as a
single genre, one tends to refer today to “diary blogs”, “organizational blogs”,
“travelblogs”, and the like.
A related finding of several studies in the volume is that traditional, static
categories of analysis have to be abandoned in favor of more fluid and flexible con-
cepts that allow for local and ad hoc negotiation. The narrative is a case in point.
Georgakopoulou discusses a class of narrative discourses, “small stories”, that
challenge the traditional criteria of storyhood, such as “time told” and “telling
time”, long posited as defining features of narratives. There are online genres – if
the designation is appropriate – such as Internet sports narratives in which the dif-
ference between these two times is either absent or minimized, such that its exist-
ence is questionable (Jucker 2010). Traditional notions of story-telling also break
down when tellers transition between different technical modes and share author-
ship through processes of interactional writing.
In addition to having to modify genre concepts developed on the basis of ideas
about spoken and written language, it appears that even basic pragmatic notions
undergo modification and ad hoc innovation in CMC. Two examples of this are the
notions of performativity (Virtanen, this volume) and relevance (Herring, this vol-
ume). These new types of meanings and functions, and their characteristic of being
negotiated in a more ad hoc manner, are arguably a consequence of the higher de-
gree of mediatedness of the communication situation, which diminishes the di-
rectly mutually observable and ascertainable information about the communicants,
leaving more space open and available to be negotiated ad hoc.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 11

3.3. Pragmatic norms, variability, and language change

The fact that there is an emphasis on local negotiation of norms raises the very
question of the rise and the status of norms in Internet communications. Even at the
level of individual linguistic structures, creativity and ludic deviations from tradi-
tional norms of standard writing in CMC led early on to negative comments about
the (further) decay of language (Thurlow 2006). Norms at the interactional level,
as well, are different from those for traditional genres – less rigid and more open to
development and local definition, at least in the early phases of their formation.
This may change as CMC genres become more entrenched, but rapid technological
development of modes and affordances, a hallmark of the Internet as against other
language media, could militate against solidification of norms.
A corollary of the discussions around technical determinism is the expectation
that technological forces will result in a convergence of practices in interactional
norms, as predicted several decades ago for email by Baron (1984). This point is
taken up in several chapters, including by Thurlow and Poff in their chapter on text
messaging, a mode with a much higher degree of technical constraints on the for-
mal shape of messages than email. Even there, a comparison of research into sev-
eral cultural contexts shows surprising divergence in usage, or at least much less
convergence than one might have expected. There is even a tendency to establish
regiolects (“regiolectal spellings”) in text messaging within a cultural area, such as
the United States, an observation that is supported by recent work by Eisenstein,
O’Connor, Smith, and Xing (2010).
The issue of convergence versus divergence taps into another general theme
that figures prominently among a number of contributions: innovation and devel-
opment. Notions of linguistic change, at least in more traditional versions, have
tended to focus on the development of individual linguistic expressions, a topic of
speculation especially in earlier CMC research (see Herring 2001 for a brief sur-
vey). Linguistic innovation at the micro level is discussed in the chapters in this
collection by Bieswanger (for textual CMC as a whole) and by Dürscheid and
Frehner (for email). Several chapters also consider the emergence of larger units of
discourse such as genres, as discussed above. There is evidence that CMC genre
characteristics are not directly generated by external communicative conditions so
much as by communicants re-articulating pre-existing forms in new media. Gil-
trow (this volume) cites evidence that points to the manifold ancestries of blogs,
and Georgakopoulou notes that some of the features she identifies as characteristic
of Internet stories have been previously described for conversational narratives. At
the same time, pre-existing qualities are differently combined, emphasized, and
articulated, resulting in an end product that is qualitatively different, with the
potential to express new meanings and functions (Herring in press).
A related theme is the extent to which communicants carry over strategies and
practices from oral communication to the new medium, such as described by

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
12 Susan C. Herring, Dieter Stein, and Tuija Virtanen

Markman (this volume) for topical coherence. Just as oral residue was a feature of
early written language, so oral conversation management strategies appear to per-
sist in coherence management techniques in electronic team meetings via syn-
chronous computer chat.
Finally, chat is another example of variation and change in affordances: A
range of modes all go by the name of chat. Paolillo and Zelenkauskaite (this
volume) note that multiparticipant text chat is increasingly migrating into other
modes, such as online games. In such cases of media convergence, an interesting
point raised by the authors is: Where does game chat get its pragmatic features
from – traditional chat, such as Internet Relay Chat, or its new host context? This
suggests a line of future research that can be carried out as an in vitro study of
change in process: an opportunity afforded to a previously unprecedented extent by
communication on the Internet.

4. Web 2.0

From controversial beginnings, the term Web 2.0 has become associated with a
fairly well-defined set of popular web-based platforms characterized by social in-
teraction and user-generated content. The World Wide Web was pitched as a con-
cept by physicist Tim Berners-Lee to his employers at CERN in 1990, imple-
mented by 1991, and attracted widespread attention after the first graphical
browser, Mosaic, was launched in 1993.7 The early websites of the mid-1990s
tended to be single-authored, fairly static documents, and included personal home-
pages, lists of frequently-asked questions (FAQs), and e-commerce sites. The late
1990s saw a shift towards more dynamic, interactive websites, however, including,
notably, blogs (Herring et al. 2005) and online newssites (Kutz and Herring 2005),
the content of which could be – and often was – updated frequently and which
allowed users to leave comments on the site. These sites foreshadowed what later
came to be called Web 2.0.
The term itself was first used in 2004 when Tim O’Reilly, a web entrepreneur in
California, decided to call a conference he was organizing for “leaders of the In-
ternet Economy [to] gather to debate and determine business strategy” the
“Web 2.0 Conference” (Battelle and O’Reilly 2010; O’Reilly 2005). At the time,
the meaning of the term was vague, more aspirational and inspirational than de-
scriptive. As a business strategy, “Web 2.0” was supposed to involve viral market-
ing rather than advertising and a focus on services over products. One of O’Reilly’s
mantras is “Applications get better the more people use them” (Linden 2006).
Today the term refers, according to Wikipedia (2011b) and other online sources, to
changing trends in, and new uses of, web technology and web design, especially
involving participatory information sharing; user-generated content; an ethic of
collaboration; and use of the web as a social platform. The term may also refer to

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 13

the types of sites that manifest such uses, e.g., blogs, wikis, social network sites,
and media-sharing sites.
From the outset, the notion of “Web 2.0” was controversial. Critics claimed
that it was just a marketing buzzword, or perhaps a meme – an idea that was passed
electronically from one Internet user to another –, rather than a true revolution in
web content and use as its proponents claimed. They questioned whether the web
was qualitatively different in recent years than it had been before, and whether the
applications grouped under the label Web 2.0 – including such diverse phenomena
as online auction sites, photo-sharing sites, collaboratively-authored encyclo-
pedias, social bookmarking sites, news aggregators, and microblogs – formed a co-
herent set. Tim Berners-Lee’s answers to these questions was “no” – for the inven-
tor of the web, the term suffered from excessive hype and lack of definition
(Anderson 2006).
In response to such criticisms, O’Reilly (2005) provided a chart to illustrate the
differences between Web 2.0 and what he retroactively labeled “Web 1.0”. This is
shown in modified and simplified form in Figure 1. The phenomena in the second
column are intended to be the Web 2.0 analogs of the phenomena in the first col-
umn.
Web 1.0 Web 2.0
Personal websites Blogging
Publishing Participation
Britannica online Wikipedia
Content management systems Wikis
Stickiness Syndication
Directories (taxonomies) Tagging (folksonomies)

Figure 1. Web 1.0 vs. Web 2.0 phenomena (adapted from O’Reilly 2005)

Language use in Web 2.0 environments raises many issues for pragmatic analy-
sis. There are new types of content to be analyzed: status updates, text annotations
on video, tags on social bookmarking sites, edits on wikis, etc. New contexts must
also be considered – for example, social network sites based on geographic lo-
cation – as well as new (mass media) audiences, including in other languages and
cultures. (Facebook, for example, now exists in “localized” versions in well over
100 languages [Lenihan, 2011].) Web 2.0 manifests new usage patterns, as well,
such as media co-activity, or near-simultaneous multiple activities on a single plat-
form (e.g., Herring, Kutz, Paolillo, and Zelenkauskaite 2009) and multi-author-
ship, or joint discourse production (e.g., Androutsopoulos 2011; Nishimura 2011).
The above reflect, in part, new affordances made available by new communication
technologies: text chat in multiplayer online games (MOGs); collaboratively edi-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
14 Susan C. Herring, Dieter Stein, and Tuija Virtanen

table environments such as wikis; friending and the “walled gardens” of Facebook;
social tagging/recommending; and so forth. Last but not least, Web 2.0 discourse
includes user adaptations to circumvent the constraints of Web 2.0 environments:
for example, interactive uses of @ and #, as well as retweeting, on Twitter (e.g.,
boyd, Golder, and Lotan 2010; Honeycutt and Herring 2009) and performed inter-
activity on what are, in essence, monologic blogs (e.g., Peterson, 2011; Pusch-
mann, this volume). Each of these issues deserves attention, and some are starting
to be addressed, but on a case-by-case, rather than a systemic, basis.
Herring (in press) recently proposed a three-part classification of Web 2.0 dis-
course phenomena: phenomena familiar from older computer-mediated modes
such as email, chat, and discussion forums that appear to carry over into Web 2.0
environments with minimal differences; discourse phenomena that adapt to and are
reconfigured by Web 2.0 environments; and new or emergent phenomena that did
not exist – or if they did exist, did not rise to the level of public awareness – prior to
the era of Web 2.0. She argues that this three-way classification can provide insight
into why particular language phenomena persist, adapt, or arise anew in techno-
logically-mediated environments over time. In so doing, she invokes technological
factors such as multimodality and media convergence, social factors at both the
situational and cultural levels, and inherent differences among linguistic phenom-
ena that make them variably sensitive to technological and social effects.
Web 2.0 phenomena in the first category are well represented in this volume.
Examples of familiar Web 2.0 discourse phenomena include non-standard ty-
pography and orthography (Bieswanger), code switching (Androutsopoulos), ad-
dressivity (de Oliveira), flaming (Danet), and email hoaxes/scams (Gill; Heyd), as
well as the continued predominance of text as a channel of communication among
web users, whether it be in blogs, microblogs, wikis, comments on news sites, or
web discussion forums. The latter, in particular, remain very popular, and illustrate
many of the same kinds of phenomena as did asynchronous online forums in the
1990s. Examples of reconfigured Web 2.0 discourse phenomena include personal
status updates (Lee 2011; cf. Cherny 1999), quoting/retweeting (boyd et al. 2010;
cf. Severinson Eklundh and Macdonald 1994), “small stories” (Georgakopoulou,
this volume; cf. Lindholm 2010), and blogging (Myers 2010; Puschmann, this vol-
ume; cf. Herring et al. 2005), which might on the surface appear new but have
traceable online antecedents, as well as reconfigurations of such familiar phenom-
ena as topical coherence, threading, turn-taking, and repair (cf. the chapters in this
volume by Simpson, Markman, Herring, and Jacobs and Garcia).
Less studied (as yet) are what Herring (in press) calls “emergent” Web 2.0 dis-
course phenomena – although since much of what has been claimed to be unprece-
dented on the web has been found, upon deeper examination, to have online and/or
offline antecedents, caution must be exercised in asserting that any phenomenon is
entirely new. Phenomena that can tentatively be identified as emergent and un-
precedented, at least as common practices, include the dynamic collaborative dis-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 15

course that takes place on wikis (e.g., Emigh and Herring 2005; Myers 2010), as
well as conversational video exchanges (Pihlaja 2011), conversational exchanges
via “image texts” (MacDonald 2007), and multimodal conversation more generally.
Aside from the works cited above, however, little language-focused analysis of
these new phenomena has yet been published. A general challenge for emergent
media environments is that they need to be analyzed descriptively first before more
sophisticated, theoretically-informed analyses can be carried out; this often results
in a lag between the emergence of new environments and scholarly understanding
of them.

5. Overview of the handbook

The coverage of this volume reflects the inherent interdisciplinarity of the prag-
matics of CMC. Contributors approach the topic from the perspectives of classic
pragmatics, discourse pragmatics, interactional linguistics, sociolinguistics, com-
munication, rhetoric, and other (sub)disciplines in the academic study of language.
Methods vary hand-in-hand with approaches, as is expedient in a new field of
study.
In what follows, the individual chapters of this handbook are encapsulated in
terms of the five themes around which they cluster: (1) pragmatic characteristics of
technologically-based CMC modes; (2) classic pragmatic phenomena in CMC en-
vironments; (3) pragmatic innovations emerging from the affordances and prac-
tices of CMC; (4) interactional phenomena in CMC; and (5) broader metaprag-
matic issues, including code choice, narrativity, and genre dynamics.

PART 1: Pragmatics of computer-mediated communication modes


In the first section of the handbook the focus is on a selection of established CMC
modes, ranging from asynchronous to synchronous, from text-based to voice-
based CMC and multimodality, and involving both traditional computers and mo-
bile phones. The presentation of CMC modes in the eight chapters in this section
roughly conforms to their chronology.
The section begins with the oldest mode of CMC, email. Christa Dürscheid
and Carmen Frehner note that email threads may manifest high concentrations of
familiar features such as lexical and grammatical reduction, non-standard punctu-
ation, and emulated prosody. Moreover, the heterogeneity of the discourses me-
diated through email reveals new communication practices. The chapter presents
two models of analysis, one focusing on the conceptual distinction between the
language of immediacy and the language of distance, the other on the contexts of
email discourse. While the once-so-popular CMC mode has been largely replaced
by other modes in private communication, email persists in text-based discussion
forums and workplace communication.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
16 Susan C. Herring, Dieter Stein, and Tuija Virtanen

Another early mode of CMC is the discussion list. Adopting a broad, functional
perspective on pragmatics, Helmut Gruber discusses listserv communication as a
special kind of email communication, contrasting it with other forms of many-to-
many asynchronous computer-mediated discourse. The research reviewed covers
technological affordances, register and language choice, discourse coherence,
genres, and interactive norms and practices, as well as community formation. Ana-
lyses of mailing list communication benefit from models that succeed in captur-
ing and differentiating technical and socio-situational factors and showing causal
relationships between them and the discourse pragmatics of listserv communi-
cation.
Cornelius Puschmann’s concern is with blogging. Blogs differ from other
modes of CMC in terms of the control that the blogger exerts on possible interac-
tion. While a blogging option is made available by various public and semi-public
hosts for professional purposes, blogs are mainly used for personal purposes, in
particular for self-expression in view of a conceptually restricted, familiar audi-
ence. The purposes of blogging, as indicated by the discourse, appear to influence
audience design, style, and content; studies also indicate relations between these
aspects and age and gender. The chapter reviews research on deixis, givenness, ad-
dressivity, and politeness in blog language and presents two prototypical blogging
styles: topic-centric and author-centric.
John Paolillo and Asta Zelenkauskaite survey research on real-time chat.
They discuss the social nature of technologically-differentiated chat modes such as
MUDs/MOOs, AOL, IRC, and web-based chat, and identify four major domains of
applications: recreational, educational, institutional, and business. The chapter
describes great variation across the affordances of various chat modes and appli-
cations of chat, as well as across users and their communicative and social moti-
vations, all of which are likely to be reflected in the linguistic landscapes of chat.
The pragmatic phenomena in focus include interaction management, international
and intercultural contexts, orthography, and participant gender.
Naomi Baron surveys the history and evolution of Instant Messaging (IM).
She points out that “the questions of language, context, and interpretation that IM
initially generated are no less relevant today to students of CMC” (155). Such
questions include user profile creation, as well as investigations of contexts and
ways of use. Particular attention is paid to IM “away” messages, which reveal prag-
matic information; the structuring of IM conversations; and gendered patterns of
use. The chapter also reports user attitudes to IM as compared to Facebook and tex-
ting, and concludes by singling out a number of central pragmatic phenomena in
need of further investigation.
Crispin Thurlow and Michele Poff approach text messaging (texting, SMS)
from the perspectives of cross-cultural, interactional, pragmalinguistic, and meta-
linguistic contexts. Texting “presents itself in the broadest terms as a social tech-
nology par excellence” (174), predominantly mediating “phatic communion”

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 17

(Malinowski 1923). It provides users with recognized anonymity, mobility, discre-


tion, intimacy, and play. The pragmatics of texting lies in the uses to which people
put it, in various contexts mediated by the technology and a repertoire of genres in-
volving brief messages. A research agenda is outlined for situated analyses of the
discourse of text messages.
Rich Ling and Naomi Baron focus on mobile phone communication, both
voice-based and text-based. People use mobile voice telephony to coordinate ac-
tivities, increase feelings of personal safety, and contribute to social integration
through “connected presence”. The chapter discusses the influence of cost on the
macro-pragmatics of mobile phone communication, its contributions to the eman-
cipation of adolescents, and interlocutors’ attitudes toward voice-based and text-
based communication. Texting allows multitasking and near-synchronous inter-
action through rapid-paced chained messages. Findings from Norwegian and U.S.-
based data indicate great variation in message content and the language of texting.
The chapter by Chris Jenks and Alan Firth is concerned with synchronous
voice-based CMC, analyzing interactional aspects of Internet telephony accom-
plished through the use of Voice-over-Internet protocol (VoIP). Adopting Conver-
sation Analysis (CA) as their theoretical framework, Jenks and Firth investigate
identification-recognition strategies, turn-taking mechanisms, and repair in VoIP
data, drawing parallels to research findings concerning landline telephony and mo-
bile phone communication where appropriate. An important finding is the differ-
ence in communicative strategies between audio chat rooms and text-based chat
rooms. Users adapt their communicative behaviors to the affordances of the
medium.

PART 2: Classic pragmatic phenomena in computer-mediated-communication


The focus in Part 2 of the handbook is on several classic pragmatic phenomena as
they manifest in CMC environments. In Ariel’s (2010) terms, these include the
border-seekers’ relevance and speech acts (performatives, apologies) and the prob-
lem-solvers’ addressivity, advice-giving, and deception. While the classic prag-
matic phenomena originate in essentially monologic theories and models, they are
examined here in dialogical terms, to do justice to the dynamic, interactional char-
acter of CMC. In each chapter the phenomenon in focus is approached from the
point of view of CMC data of a particular kind.
Susan Herring investigates relevance in synchronous CMC: multiparty chat
using IRC and MUDs, and dyadic human-computer (bot) interaction. Relevance
(or cross-turn coherence) is often problematic in such environments, and remedial
strategies include use of explicit addressivity. The outcome of users’ adaptation to
the problems posed by fast-paced multiparty chat is what Herring terms “loosened
relevance”, which, she suggest, is becoming a norm in recreational, playful uses of
chat. This communicational development challenges traditional pragmatic models
(Grice 1975; Sperber and Wilson 1986), in that user-independent technological

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
18 Susan C. Herring, Dieter Stein, and Tuija Virtanen

constraints lead to highly cooperative and socially gratifying conversations that


raise the question of whether users are aiming at relevance at all.
Tuija Virtanen approaches performativity in CMC from the perspectives of (i)
“emoting”, the construction of third-person action, and (ii) “mock-performatives”,
mediated institutional first-person performative utterances, as they are put to play-
ful use on informal discussion boards. The form of a pre-programmed command
“emote” in game environments has been adopted in a number of text-based CMC
modes to refer to users’ online personae in typographically marked third-person
predications. Mock-performatives, incorporating the performative marker hereby,
readily trigger joint play sequences. It is argued that the two kinds of virtual per-
formatives call for a rethinking of performative theory.
The chapter on address terms, by Sandi Michele de Oliveira, reviews litera-
ture from contextually-oriented branches of linguistics but finds that very little has
been written on address in CMC environments. In pragmatics the focus has been on
politeness, where address is only part of the package. Three objects of study in
CMC are identified: address forms in greetings, conversational norms emerging
from the (cross-cultural) study of address forms across CMC modes and communi-
cative situations, and address in educational online settings. The chapter warns
against static views of address forms as conveyors of identity and (im)politeness
per se, critiquing popular ideas regarding the homogeneous informality of CMC.
Sandra Harrison and Diane Allton discuss distinctive patterns of apology in
email discussion lists with academic or professional themes. Four kinds of
apologies appear: (i) email-specific apologies, routinely used for cross-postings
before committing the trivial offence in the same message; (ii) retrospective
apologies for minor offences such as giving incorrect information or sending blank
messages, which include some sign of genuineness in their formulations; (iii)
retrospective apologies for serious offences such as word choice or sending private
messages to the list; and (iv) subverted apologies. The more serious the offence,
the more varied the forms of the apology.
Miriam Locher’s concern is with advice-seeking and advice-giving on the In-
ternet, with a focus on response patterns in professional health websites. The
chapter explores a particular online advice column, Lucy Answers, in some detail.
Response letters are investigated in the light of their content structure, syntactic
characteristics, and pragmatic aspects related to politeness and self-presentation.
The author then examines the role of computer mediation in health advice, using
Herring’s (2007) classification scheme of medium and situational factors. It is as-
sumed that people employ language differently in different advisory settings on-
line, both in expert/non-expert interaction and in contexts of peer advice.
Jeffrey Hancock and Amy Gonzales explore digital deception, “the inten-
tional control of information in a technologically-mediated message to create a
false belief in the receiver of the message” (364). The mode of communication is
likely to have an effect on people’s decisions to lie or not, both in interactions with

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 19

persons familiar to them and in anonymous online spaces. The chapter also deals
with sets of linguistic features that are expected to reveal deception, in keeping
with a shift in the study of deception from non-verbal cues to verbal elements. It is
crucial to consider degrees of recordability, synchronicity, and co-presence of in-
terlocutors in the naturalistic settings offered by CMC for the study of the prag-
matic aspects of deceptive discourse.

PART 3: Pragmatics of computer-mediated communication phenomena


Part 3 is devoted to the pragmatics of linguistic phenomena that have emerged as
new in CMC. Such phenomena are relatively scarce, which may seem surprising in
view of the emphasis in the media on the novelties of CMC. Yet it is primarily the
combinations of linguistic features, their clustering in some CMC modes rather
than others, and the innovative uses of language for pragmatic purposes that char-
acterize CMC. Part 3 focuses on several pragmatic phenomena that may be labeled
CMC-specific.
Theresa Heyd discusses the advantages of using classic pragmatics tools such
as speech act theory and the cooperative principle to analyze deception in CMC.
Studies of online discourse can indeed greatly benefit the development of prag-
matic theory, as demonstrated in concrete terms by Heyd’s investigation of “email
hoaxes”. After a discussion of their genre history, definitional criteria, and reper-
toire of types, email hoaxes are approached from the perspectives of their charac-
teristic pragmatic mechanisms: They manifest dual patterns of (non)cooperation,
felicity, and uptake. It is predicted that the model of analysis will also serve well in
the study of future CMC genres that have a deceptive orientation.
On a related topic, Martin Gill analyzes a corpus of Nigerian (scam) email
letters for their “authenticity”. Gill identifies a set of basic conditions that authen-
tication effects need to meet: consistency, quantity, spontaneity, plausibility or
appropriateness, and engagement. All of these are crucially missing from Ni-
gerian scam emails. Instead, their authentication cues give off disauthenticating
information, while the authenticating work undertaken is sender and medium
oriented, occurring in a communicational vacuum. Further, the authentication
strategies employed have scope over local stretches of discourse, rather than the
message as a whole. The five conditions identified in the chapter are offered as
guidelines for future research on authentication in CMC.
Loukia Lindholm adapts Grice’s (1975) cooperative principle for the analysis
of online nicknames (“nicks”), arguing that these consist of mini-propositions that
contribute to the discourse by serving central communicative goals in CMC such
as self-presentation, negotiation of group identity, and triggering interaction. At
times nicknames simply have the referential function of naming, but most in-
stances in the two discussion forums investigated serve pragmatic functions in
ways that offline nicknames do not, such as co-construction of online personae and
establishing credentials for (verbal) actions. Participants readily discuss their and

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
20 Susan C. Herring, Dieter Stein, and Tuija Virtanen

others’ nickname practices, suggesting conformity to or noticeable deviation from


the four maxims of online nicknames identified for these communities.
Markus Bieswanger discusses the micro-linguistic features that are often
identified as characteristic of CMC, such as emoticons, non-standard spelling and
creative use of writing systems, abbreviations, and non-standard punctuation.
These features are an essential part of many online discourses. Yet the great vari-
ation in their frequencies of occurrences makes generalizations of a relatively
homogeneous Internet language (cf. “Netspeak”, Crystal 2001) difficult to sustain.
Moreover, some instances of each category are very common and others scarce,
and variability in their (non-)use may be manifest in particular languages and
scripts, CMC modes, communicative situations, and individual users.

PART 4: Discourse pragmatics of computer-mediated interaction


The chapters included in the fourth section revolve around issues central in inter-
action, testing and adapting concepts from the offline study of conversational dis-
course for the study of online discourse in various situational and institutional con-
texts. The final chapter in this section is concerned with the notion of “flaming”,
one of the earliest discourse-pragmatic phenomena to be ascribed to CMC (Kim
and Raja 1991).
The chapter by Rodney Jones analyzes pragmatic uses of rhythm and timing in
text-based chat by investigating gay chat room interaction. Rhythm and timing are
exploited to produce shared “attention structures”, and a lack of “interactional syn-
chrony” tends to terminate the exchange. Users make their turns short, break up
messages across several turns, and type in filler terms such as ic (‘I see’). However,
longer breaks may successfully indicate conversation management when topics
and activity stages are shifted. The chapter also discusses “polychronicity”, i.e.,
multiple, simultaneous interactions not proceeding at the same pace, the effects of
interactional roles and social power on the interaction, and the phenomenon of
CMC users entering a state of “flow” and losing their sense of time.
James Simpson focuses on conversational floors in text-based multiparty syn-
chronous CMC, investigating the factors that account for the emergence of distinc-
tive patterns in human interaction mediated by computers. The notion of conver-
sational floor is first related to inter-turn cohesion and coherence and then defined
in relation to the topic, communicative action, and participants’ sense of what is
going on in the interaction. Different participant structures yield basic floor types:
speaker-and-supporter floor, collaborative floor, and multiple conversational floor.
The last of these is common in CMC environments, due to the occurrence of sim-
ultaneous conversations and multitasking. These floor types are illustrated through
a case study of a virtual group dedicated to exploring ways of language learning
online.
Informed by the CA tradition, Kris Markman approaches small-group chat
from the perspective of conversational coherence and turn organization. The chapter

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 21

presents a case study of virtual student team meetings that reveals an orien-
tation towards discourse topics as a means of designing and structuring turns on-
line. Interactional coherence is examined in the light of conversational threads as
well as speakership roles and turn allocation, while also paying attention to the
size of the group, the technical features of the chat environment, and the purpose
of the talk. The chapter argues for the difference between turns and chat mess-
ages, and presents a useful transcription method designed for the analysis of chat
interaction.
Jennifer Jacobs and Angela Garcia examine another central concept in CA,
repair. Their study of educational chat in an intranet context of composition classes
in the U.S. makes use of an innovative transcription system based on videotapes of
participants’ computer screens to allow the analyst to keep track of what is visible
to each student at a given point in the interaction and what keystroke actions they
make in their postings. The case study focuses on avoidance and self/other repair
of troubles in “quasi-synchronous” chat, as well as the technological solutions
adopted by users for these purposes, such as short or split messages, delays in post-
ing, addressivity, and format tying.
Karianne Skovholt and Jan Svennevig investigate norms related to responses
and non-responses in workplace email in Norwegian contexts. Informed by CA
and classic speech act theory, the study relies on participant display of communi-
cative actions. While a response is found to be conditionally relevant after ques-
tions and requests, non-response to requests for comments and corrections to a pro-
posal signals acceptance of the proposal. However, users may volunteer responses
that have an interpersonal function. The emerging norms of responding or not in
workplace email are compared to earlier studies of other kinds of CMC dialogue
and to the literature on offline conversations.
Focusing on email use in Swedish workplace communication, Amelie
Hössjer addresses the relationship between small talk and politeness in two edi-
torial contexts: a physically-based and a digitally-based community of practice. In
the former, email is one of several communication options, and its use is character-
ized by simple, routine matters. Small talk primarily appears in face-to-face con-
tacts, reserved for complex or delicate issues. While not a “lean medium” in itself,
email is used as such. In contrast, the digitally-based community of practice
makes use of email as its primary form of communication. For these users it is a
“rich medium”, allowing them to construct and maintain social relationships
through the discourse strategies of “framing” and “chaining” in work-related inter-
action.
The late Brenda Danet’s concern, in contrast, is with linguistic impoliteness
and rudeness. The CMC phenomenon of “flaming” is provided with a historical
context and related to (im)politeness theories, as well as issues of multilingualism,
gender, and culture. The chapter shows that flaming can sometimes be used to ex-
press solidarity, perhaps jointly with hostility. A contextualized case study is pres-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
22 Susan C. Herring, Dieter Stein, and Tuija Virtanen

ented of “flame events” in listserv communication among English-speaking Israe-


lis in the U.S., relating some of the findings to the traditional Jewish culture of
argument and disputing. Such flame events, Danet suggests, can be fostered by
technological, organizational, gender-related, personality-oriented, sociocultural,
and linguistic factors.

PART 5: Broader perspectives


The last section of the volume takes the dialogical approach to CMC further to in-
vestigate code-switching, narrative, and genre dynamics. These phenomena, while
somewhat loosely related, can all be considered metapragmatic, in that they in-
volve constructs beyond the level of contexts of use, i.e., language systems and
CMC types.
Jannis Androutsopoulos opens the section with an overview of research on
code-switching and code-mixing in CMC. Code-switching in digital discourse
functions as a code-centred contextualization cue that constitutes unscripted, dy-
namically unfolding communication in its own right. The chapter discusses a
number of ways in which code-switching and code-mixing are used as multilingual
resources in CMC, focusing on the specific conditions of communication offered
by digital media for (non)conversational discourse. Digital writing is dialogical,
often vernacular, and simultaneously used with other semiotic resources, and code-
switching is affected by the affordances concerning planning and the mode-
specific resources of writing.
The chapter by Alexandra Georgakopoulou provides a programmatic dis-
cussion of narrative in CMC. It is argued that the focus of narrative analysis in
CMC should be on social practices, rather than textual and genre-related issues. In
particular, it would seem expedient to adopt an approach that includes “small
stories”, marginal in terms of the traditional Labovian narrative, given that the new
media are teeming with distributed multi-authored stories and story fragments
emerging in interactive and multimodal environments. Several of the basic charac-
teristics of narrative need rethinking as analysis of online narratives, fictional or
personal, reveal new practices and ways of telling.
Finally, Janet Giltrow explores the elusive notion of “genre” in pragmatics,
applied linguistics, corpus linguistics, and her own field, rhetoric, in relation to
CMC. Two possible common denominators are identified among myriad defini-
tions: Genre is a typifying concept, and genre is located at the interface between
language and sociality. The chapter singles out two constitutive phenomena in rhe-
torical genre theory: “exigence” and “motive”. Genre studies of CMC informed by
various theoretical frameworks ideally contribute to the understanding of both “the
extent and quality of newness of CMC” and “users’ experience of exigence, in-
cluding the social motive for taking up new technologies and their mutual recog-
nition of these motives” (733).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 23

The contents of the volume can be summarized concisely as follows. Part 1 shows
important variation across CMC modes, Part 2 forcefully demonstrates how
analyses of classic pragmatic phenomena in CMC data suggest developments to
pragmatic theory, and Part 3 identifies a small number of unevenly distributed
pragmatic phenomena that may be labeled CMC-specific, even though they, too,
can be shown to have roots in offline communication. Part 4 raises the issue of the
applicability to CMC data of models devised for the analysis of spontaneous face-
to-face communication, and Part 5 addresses the broader metapragmatic issues of
code alternation and genre in CMC.

6. Directions for future research

The diversity of topics addressed in this handbook notwithstanding, gaps remain in


the pragmatic phenomena covered for various reasons. For instance, there are no
chapters on deixis, presupposition, inferencing and implicature, grounding, or
ideology, mostly because not enough language-focused research yet exists on these
phenomena in CMC to provide the substance for separate chapters. Linguists have
tended to focus on more “exotic” phenomena in CMC (such as “Netspeak” and
emoticons) first, areas where computer-mediated language appears self-evidently
different from traditional written and spoken language. This could explain, for
example, why there has been so little research on presupposition, inferencing, and
implicature – no one has yet observed these to work differently in CMC, that we
are aware of (although it is an empirical question whether they work differently or
not). As research on the pragmatics of CMC expands and becomes more nuanced,
we expect and hope that these gaps will be filled in the future. This explanation
does not account for the gaps in coverage on deixis and grounding, however, in that
CMC-specific issues associated with these are readily observable, especially in
videoconferencing systems and 3-D graphical worlds where reference to shared
objects must be negotiated.8 Most computer-mediated language research to date
has not dealt with such modes, however, but rather has focused on conversational,
textual modes of CMC. Finally, the volume contains no chapters devoted exclus-
ively to speech acts or politeness; these are accidental gaps, in that the authors we
invited unfortunately were not able to contribute. These topics have attracted re-
search attention, however, as indicated by their inclusion in a number of chapters in
the handbook as described in the previous section.
The pragmatics of CMC being a new field of study, it is a truism that more re-
search on almost all topics is needed. Further research is needed especially on
pragmatic phenomena in languages other than English, as well as in multimodal
CMC (voice, video, graphics), including in game environments (Esslin 2011), do-
mains where research has as yet only scratched the surface of understanding.
Newer domains, such as social network sites and microblogs, have emerged and

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
24 Susan C. Herring, Dieter Stein, and Tuija Virtanen

evolved as this volume was in preparation. Clearly, “canonized knowledge” is not


yet available on the linguistic pragmatics of these, although we can envision that a
separate volume on the pragmatics of Web 2.0 will become feasible in the not-so-
distant future. Nor is the evolution of CMC technologies likely to slow any time
soon, underscoring one of the main challenges for researchers studying language
usage in digital media environments: Such usage – and the environments them-
selves – are dynamically moving targets.
Despite the likelihood that the coverage in this volume will soon become out-
dated, we nonetheless offer it as a multifaceted portfolio covering the first 25 years
of computer-mediated language research, in the hope that it will weather the sands
of time and remain as a sturdy foundation upon which future research can build.

Notes

1. Noteworthy among these are Baron (1984), Murray (1985), and Severinson Eklundh
(1986).
2. For a useful (albeit now somewhat dated) overview of sociolinguistic research on CMC,
see Androutsopoulos (2006).
3. See, e.g., Reid (1991) and Werry (1996) for IRC; Reid (1994) and Cherny (1999) for
MUDs; Baron (1998) and Gains (1999) for email; Döring (2002) for German SMS; Thur-
low and Brown (2003) for English SMS; Stein (2006) for business websites; and Herring
et al. (2005) for blogs.
4. See also Weininger and Shield (2004) and Stein (2005) with reference to Koch and Ös-
terreicher (1994); Herring (2007) with reference to Hymes (1974).
5. In keeping with the rise in English as the lingua franca of scholarship, CMC scholarship
from other countries published in English is also on the rise, especially on the web (Cal-
lahan and Herring 2012).
6. A notable, and early, exception is Yus (2001). An English version of this work became
available in 2010.
7. On the creation of the World Wide Web, see Wikipedia (2011a).
8. In the literature on computer-supported cooperative work, however, deixis has been ad-
dressed in just such environments, e.g., by Hindmarsh and Heath (2000) and Suthers, Gir-
ardeau, and Hundhausen (2003), and grounding has been addressed, e.g., by Clark and
Brennan (1991) and Brennan (1998).

References

Anderson, Nate
2006 Tim Berners-Lee on Web 2.0: “[N]obody even knows what it means”. Ars
Technica website. http://arstechnica.com/business/news/2006/09/7650.ars [ac-
cessed December 3, 2011]

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 25

Androutsopoulos, Jannis K.
2006 Introduction: Sociolinguistics and computer-mediated communication. Jour-
nal of Sociolinguistics 10(4): 419–438.
Androutsopoulos, Jannis K.
2011 From variation to heteroglossia in the study of computer-mediated discourse.
In: Crispin Thurlow and Kristine Mroczek (eds.), Digital Discourse: Lan-
guage in the New Media, 277–298. New York: Oxford University Press.
Androutsopoulos, Jannis K. and Volker Hinnenkamp
2001 Code-switching in der bilingualen Chat-Kommunikation: ein explorativer
Blick auf #hellas und #turks. In: Michael Beißwenger (ed.), Chat-Kommuni-
kation. Sprache, Interaktion, Sozialität & Identität in synchroner computerver-
mittelter Kommunikation: Perspektiven auf ein interdisziplinäres Forschungs-
feld, 367–401. Stuttgart: Ibidem.
Androutsopoulos, Jannis K. and Evelyn Ziegler
2003 Sprachvariation und Internet: Regionalismen in einer Chat-Gemeinschaft.
In: Jannis K. Androutsopoulos and Evelyn Ziegler (eds.), ‘Standardfragen’:
Soziolinguistische Perspektiven auf Sprachgeschichte, Sprachkontakt und
Sprachvariation, 251–280. Frankfurt am Main: Peter Lang.
Ariel, Mira
2010 Defining Pragmatics. Cambridge, UK: Cambridge University Press.
Baron, Naomi S.
1984 Computer mediated communication as a force in language change. Visible
Language 18(2): 118–141.
Baron, Naomi S.
1998 Letters by phone or speech by other means: The linguistics of email. Language
and Communication 18: 133–170.
Battelle, John and Tim O’Reilly
2010 Web 2.0 Summit is a wrap. Web 2.0 Summit website.
http://www.web2summit.com/web2010 [accessed December 3, 2011]
Biber, Douglas
1988 Variation across Speech and Writing. Cambridge, UK: Cambridge University
Press.
boyd, danah, Scott Golder, and Gilad Lotan
2010 Tweet tweet retweet: Conversational aspects of retweeting on Twitter. In: Pro-
ceedings of the Forty-Third Hawai’i International Conference on System
Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2010/3869/00/03-06-04.pdf
Brennan, Susan
1998 The grounding problem in conversation with and through computers. In: Susan
R. Fussell and Roger J. Kreuz (eds.), Social and Cognitive Psychological Ap-
proaches to Interpersonal Communication, 201–225. Hillsdale, NJ: Lawrence
Erlbaum.
Callahan, Ewa and Susan C. Herring
2012 Language choice on university websites: Longitudinal trends. International
Journal of Communication 6: 322–355.
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford: CSLI.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
26 Susan C. Herring, Dieter Stein, and Tuija Virtanen

Clark, Herbert H. and Susan E. Brennan


1991 Grounding in communication. In: Lauren B. Resnick, John Levine, and Steph-
anie D. Teasley (eds.), Perspectives on Socially Shared Cognition, 127–149.
Washington, DC: APA.
Collot, Milena and Nancy Belmore
1996 Electronic language: A new variety of English. In: Susan C. Herring (ed.),
Computer-Mediated Communication: Linguistic, Social and Cross-Cultural
Perspectives, 13–28. Amsterdam/Philadelphia: John Benjamins.
Condon, Sherri and Claude Čech
2010 Discourse management in three modalities. Language@Internet 7, article 6.
http://www.languageatinternet.org/articles/2010/2770
Crystal, David
2001 Language and the Internet. Cambridge, UK: Cambridge University Press.
Daft, Richard and Robert Lengel
1984 Information richness: A new approach to managerial behavior and organiz-
ational design. In: Barry M. Staw and L. L. Cummings (eds.), Research in Or-
ganizational Behavior, 191–233. Greenwich, CT: JAI Press.
Danet, Brenda
2001 Cyberpl@y: Communicating Online. Oxford, UK: Berg Publishers.
Danet, Brenda and Susan C. Herring (eds.)
2007 The Multilingual Internet: Language, Culture, and Communication Online.
New York: Oxford University Press.
Danet, Brenda, Lucia Ruedenberg-Wright, and Yehudit Rosenbaum-Tamari
1997 Smoking dope at a virtual party: Writing, play and performance on Internet
Relay Chat. Journal of Computer-Mediated Communication 2(4).
http://jcmc.indiana.edu/vol2/issue4/danet.html
Döring, Nicola
2002 “Kurzm. wird gesendet” – Abkürzungen und Akronyme in der SMS-Kom-
munikation. Muttersprache. Vierteljahresschrift für deustsche Sprache 112(2):
97–115.
Döring, Nicola
2003 Sozialpsychologie des Internet. Die Bedeutung des Internet für Kommunika-
tionsprozesse, Identitäten, soziale Beziehungen und Gruppen, 2nd Ed. Göt-
tingen: Hogrefe.
Dresner, Eli and Susan C. Herring
2010 Functions of the non-verbal in CMC: Emoticons and illocutionary force. Com-
munication Theory 20: 249–268.
Eisenstein, Jacon, Brendan O’Connor, Noah A. Smith, and Eric P. Xing
2010 A latent variable model for geographical lexical variation. In: Proceedings of
the 2010 Conference on Empirical Methods in Natural Language Processing,
1277–1287.
Emigh, William and Susan C. Herring
2005 Collaborative authoring on the Web: A genre analysis of online encyclopedias.
In: Proceedings of the Thirty-Eighth Hawai’i International Conference on Sys-
tem Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2005/2268/04/22680099a.pdf
Ensslin, Astrid
2011 The Language of Gaming. Basingstoke, UK: Palgrave MacMillan.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 27

Ferrara, Kathleen, Hans Brunner, and Greg Whittemore


1991 Interactive written discourse as an emergent register. Written Communication
8(1): 8–84.
Gains, Jonathan
1999 Electronic mail – a new style of communication or just a new medium? An in-
vestigation into the text features of e-mail. English for Specific Purposes 18(1):
81–101.
Garcia, Angela and Jennifer Jacobs
1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer mediated communication. Research on Language and So-
cial Interaction 32(4): 337–367.
Georgakopoulou, Alexandra
1997 Self-presentation and interactional alliances in e-mail discourse: The style-
and code-switches of Greek messages. International Journal of Applied Lin-
guistics 7: 141–164.
Giltrow, Janet and Dieter Stein (eds.)
2009 Genres in the Internet. Amsterdam/Philadelphia: John Benjamins.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry Morgan (eds.), Syntax and Se-
mantics 3: Speech Acts, 41–58. New York: Academic Press.
Herring, Susan C.
1994 Politeness in computer culture: Why women thank and men flame. In: Mary
Bucholtz, A. C. Liang, Laurel A. Sutton, and Caitlin Hines (eds.), Cultural
Performances: Proceedings of the Third Berkeley Women and Language Con-
ference, 278–294. Berkeley, CA: Berkeley Women and Language Group.
Herring, Susan C.
1996 Two variants of an electronic message schema. In: Susan C. Herring (ed.),
Computer-Mediated Communication: Linguistic, Social and Cross-Cultural
Perspectives, 81–108. Amsterdam/Philadelphia: John Benjamins.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi E. Hamilton (eds.), The Handbook of Discourse Analysis, 612–634. Ox-
ford, UK: Blackwell Publishers.
Herring, Susan C.
2002 Computer-mediated communication on the Internet. Annual Review of In-
formation Science and Technology 36: 109–168.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Lan-
guage@Internet 4, article 1.
http://www.languageatinternet.org/articles/2007/761
Herring, Susan C.
in press Discourse in Web 2.0: Familiar, reconfigured, and emergent. In: Deborah
Tannen and Anna M. Tester (eds.), Georgetown University Round Table on
Languages and Linguistics 2011: Discourse 2.0: Language and New Media.
Washington, DC: Georgetown University Press.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
28 Susan C. Herring, Dieter Stein, and Tuija Virtanen

Herring, Susan C., Daniel O. Kutz, John C. Paolillo, and Asta Zelenkauskaite
2009 Fast talking, fast shooting: Text chat in an online first-person game. In: Pro-
ceedings of the Forty-Second Hawai’i International Conference on System
Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2009/3450/00/03-05-04.pdf
Herring, Susan C., Lois Ann Scheidt, Sabrina Bonus, and Elijah Wright
2005 Weblogs as a bridging genre. Information, Technology & People 18(2):
142–171.
Herring, Susan C. and Asta Zelenkauskaite
2009 Symbolic capital in a virtual heterosexual market: Abbreviation and insertion
in Italian iTV SMS. Written Communication 26(1): 5–31.
Hindmarsh, Jon and Christian Heath
2000 Embodied reference: A study of deixis in workplace interaction. Journal of
Pragmatics 32(12): 1855–1878.
Honeycutt, Courtenay and Susan C. Herring
2009 Beyond microblogging: Conversation and collaboration via Twitter. In: Pro-
ceedings of the Forty-Second Hawai’i International Conference on System
Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2009/3450/00/03-05-05.pdf
Hymes, Dell
1974 Foundations in Sociolinguistics: An Ethnographic Approach. Philadelphia:
University of Pennsylvania Press.
Jucker, Andreas H.
2010 “Audacious, brilliant!! What a strike!” Live text commentaries on the Internet
as real-time narratives. In: Christian Hoffmann (ed.), Narrative Revisited: Tell-
ing a Story in the Age of New Media, 57–77. Amsterdam/ Philadelphia: John
Benjamins.
Jucker, Andreas H. and Christa Dürscheid
in press The linguistics of keyboard-to-screen communication: A new terminological
framework. Linguistik Online.
Kiesler, Sara, Jane Siegel, and Timothy McGuire
1984 Social psychological aspects of computer-mediated communication. American
Psychologist 39: 1123–1134.
Kim, M-S. and Narayanan Raja
1991 Verbal aggression and self-disclosure on computer bulletin boards. Paper pres-
ented at the Annual Meeting of the International Communication Association,
Chicago, IL, May. ED334620
Koch, Peter and Wulf Österreicher
1994 Schriftlichkeit und Sprache. In: Hartmut Günther and Otto Ludwig (eds.),
Schrift und Schriftlichkeit. Ein interdisziplinäres Handbuch internationaler
Forschung, HSK 10.1, 587–604. Berlin/New York: Walter de Gruyter.
Kutz, Daniel O. and Susan C. Herring
2005 Micro-longitudinal analysis of Web news updates. In: Proceedings of the Thir-
ty-Eighth Hawai’i International Conference on System Sciences. Los Alami-
tos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2005/2268/04/22680102a.pdf

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 29

Lee, Carmen
2011 Texts and practices of micro-blogging: Status updates on Facebook. In: Cris-
pin Thurlow and Kristine Mroczek (eds.), Digital Discourse: Language in the
New Media, 110–128. New York: Oxford University Press.
Lenihan, Aoife
2011 “Join our community of translators”: Language ideologies and Facebook. In:
Crispin Thurlow and Kristine Mroczek (eds.), Digital Discourse: Language in
the New Media, 48–64. New York: Oxford University Press.
Levinson, Stephen
1983 Pragmatics. Cambridge, UK: Cambridge University Press.
Linden, Greg
2006 Tim O’Reilly and defining Web 2.0. Geeking with Greg [blog], May 14.
http://glinden.blogspot.com/2006/05/tim-oreilly-and-defining-web-20.html
Lindholm, Loukia
2010 “A little story, for food for thought …”: Narratives in advice discourse. In
Sanna-Kaisa Tanskanen, Marja-Liisa Helasvuo, Marjut Johansson, and Mia
Raitaniemi (eds.), Discourses in Interaction, 223–236. Amsterdam/Philadel-
phia: John Benjamins.
Ling, Richard and Naomi S. Baron
2007 Text messaging and IM: Linguistic comparison of American college data.
Journal of Language and Social Psychology 26: 291–98.
Malinowski, Bronisław
1923 The problem of meaning in primitive languages. In: C. K. Ogden and I. A. Ri-
chards (eds.), The Meaning of Meaning, 296–336. London: Routledge &
Kegan Paul.
Maynor, Natalie
1994 The language of electronic mail: Written speech? In: Greta D. Little and Mi-
chael Montgomery (eds.), Centennial Usage Studies, 48–54. Tuscaloosa, Uni-
versity of Alabama.
McDonald, David
2007 Visual conversation styles in web communities. In: Proceedings of the Fortieth
Hawaii International Conference on System Sciences. Los Alamitos, CA:
IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2007/2755/00/27550076a.pdf
Murray, Denise E.
1985 Composition as conversation: The computer terminal as medium of communi-
cation. In: Lee Odell and Dixie Goswami (eds.), Writing in Nonacademic Set-
tings, 205–229. New York: Guilford.
Murray, Denise E.
1990 CmC. English Today 6: 42–26.
Myers, Greg
2010 The Discourse of Blogs and Wikis. London: Continuum.
Nishimura, Yukiko
2011 Japanese keitai novels and ideologies of literacy. In: Crispin Thurlow and Kris-
tine Mroczek (eds.), Digital Discourse: Language in the New Media, 86–109.
New York: Oxford University Press.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
30 Susan C. Herring, Dieter Stein, and Tuija Virtanen

O’Reilly, Tim
2005 What is Web 2.0? Design patterns and business models for the next generation
of software. O’Reilly Network website, September 30.
http://oreilly.com/web2/archive/what-is-web-20.html
Paolillo, John C.
1996 Language choice on soc.culture.punjab. Electronic Journal of Communication
6(3). http://www.cios.org/EJCPUBLIC/006/3/006312.HTML
Paolillo, John C.
1999 The virtual speech community: Social network and language variation on IRC.
Journal of Computer-Mediated Communication 4(4).
http://jcmc.indiana.edu/vol4/issue4/paolillo.html
Peterson, Eric
2011 How conversational are weblogs? Language@Internet 8, article 8.
http://www.languageatinternet.org/articles/2011/Peterson
Pihlaja, Stephen
2011 Cops, popes, and garbage collectors: Metaphor and antagonism in an atheist/
Christian YouTube video thread. Language@Internet 8, article 1.
http://www.languageatinternet.org/articles/2011/Pihlaja
Reid, Elizabeth M.
1991 Electropolis: Communication and community on Internet Relay Chat. Senior
Honours thesis, University of Melbourne, Australia.
http://www.ee.mu.oz.au/papers/emr/index.html
Reid, Elizabeth M.
1994 Cultural formations in text-based virtual realities. Master’s thesis, University
of Melbourne, Australia. http://www.ee.mu.oz.au/papers/emr/index.html
Rintel, Sean and Jeffery Pittam
1997 Strangers in a strange land: Interaction management on Internet Relay Chat.
Human Communication Research 23(4): 507–534.
Severinson Eklundh, Kerstin
1986 Dialogue Processes in Computer-Mediated Communication: A Study of
Letters in the COM System. Linköping: Linköping University, Sweden.
Severinson Eklundh, Kerstin and Clare Macdonald
1994 The use of quoting to preserve context in electronic mail dialogues. IEEE
Transactions on Professional Communication 37(4): 97–202.
Siebenhaar, Beat
2003 Sprachgeographische Aspekte der Morphologie und Verschriftung in schwei-
zerdeutschen Chats. Linguistik Online 15: 125–139.
Sperber, Dan and Deirdre Wilson
1986 Relevance: Communication and Cognition. Oxford: Blackwell.
Stein, Dieter
2005 Distanz und Nähe in Internetkommunikation. In: Angelika Storrer and Michael
Beißwenger (eds.), Chat-Kommunikation in Beruf, Bildung und Medien: Kon-
zepte-Werkzeuge-Anwendungsfelder, 339–348. Stuttgart: Ibidem.
Stein, Dieter
2006 The website as a domain-specific genre. Language@Internet 3, article 6.
http://www.languageatinternet.org/articles/2006/374

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
Introduction to the pragmatics of computer-mediated communication 31

Suthers, Daniel D., Laura E. Girardeau, and Christopher D. Hundhausen


2003 Deictic roles of external representations in face-to-face and online collabor-
ation. In: Barbara B. Wasson, Sten Ludvigsen, and Ulrich Hoppe (eds.), Pro-
ceedings of the International Conference on Computer Support for Collabor-
ative Learning 2003, 173–182. Dordrecht: Kluwer Academic Publishers.
Tagliamonte, Sali and David Denis
2008 Linguistic ruin? LOL! Instant messaging and teen language. American Speech
83: 3–34.
Thurlow, Crispin
2006 From statistical panic to moral panic: The metadiscursive construction and
popular exaggeration of new media language in the print media. Journal of
Computer-Mediated Communication 11(3), article 1. http://jcmc.indiana.edu/
vol11/issue3/thurlow.html
Thurlow, Crispin with Andrew Brown
2003 Generation Txt? Exposing the sociolinguistics of young people’s text messag-
ing. Discourse Analysis Online 1, article 1. http://www.shu.ac.uk/daol/articles/
open/2002/003/thurlow200200301.html
Thurlow, Crispin and Kristine Mroczek (eds.)
2011 Digital Discourse: Language in the New Media. New York: Oxford University
Press.
Verschueren, Jef
1999 Understanding Pragmatics. London: Edward Arnold.
Weininger, Markus J. and Lesley Shield
2004 Proximity and distance: A theoretical model for the description and analysis of
online discourse. In: 11th CALL Conference: CALL & Research Methodol-
ogies, Addendum to the Proceedings of the CALL 2004 Conference. University
of Anwerp. http://webh01.ua.ac.be/didascalia/call_2004.htm
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
Wikipedia
2011a History of the World Wide Web. http://en.wikipedia.org/wiki/History_of_the_
World_Wide_Web [accessed 4:05 pm EST, December 3, 2011]
Wikipedia
2011b Web 2.0. http://en.wikipedia.org/wiki/Web_2.0 [accessed 4:07 pm EST, De-
cember 3, 2011]
Yates, Simeon
1996 Oral and written linguistic aspects of computer conferencing. In Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 29–46. Amsterdam/Philadelphia: John Benjamins.
Yus, Francisco
2001 Ciberpragmática. El uso del lenguaje en Internet. Barcelona: Ariel.
Yus, Francisco
2010 Cyberpragmatics: Internet-Mediated Communication in Context. Amsterdam/
Philadelphia: John Benjamins.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
32 Susan C. Herring, Dieter Stein, and Tuija Virtanen

Zelenkauskaite, Asta and Susan C. Herring


2008 Television-mediated conversation: Coherence in Italian iTV SMS chat. In:
Proceedings of the Forty-First Hawai’i International Conference on System
Sciences. Los Alamitos, CA: IEEE Press. http://ella.slis.indiana.edu/~herring/
hicss08.pdf

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:20 PM
2. Email communication
Christa Dürscheid and Carmen Frehner

1. Introduction

With millions of emails sent every day, email has become a common mode of com-
munication that is used by young and old. To have an email address – or even sev-
eral – is something that is taken for granted; email has become as natural a com-
munication channel as the telephone. Thus, one may assume that most readers are
familiar with sending emails and with their structural elements, which include the
header, the body, and an optional signature. Compared to other modes of computer-
mediated communication (henceforth CMC), email is considered an old mode that
is gradually losing popularity as new, competing modes have sprung up. Neverthe-
less, email is still the most important CMC application because it is the only one
with which the average Internet user is familiar. Thus, when filling in forms, for in-
stance, it is the person’s email address that is asked for and not their Skype user ID
or Twitter account – a practice that is likely to persist for a while. Emails are used
for various purposes, e.g., to exchange information, to submit greetings and invi-
tations, or to send an Internet link or some digital data (ranging from simple word
documents to photos and videos). Being less personal than a letter, it is a relatively
unobtrusive form of communication and also encourages people who would not
send letters otherwise to communicate in writing. What is more, its swift trans-
mission makes it a preferred medium to communicate with people who are far
away. While a letter would take much longer to be delivered, an email reaches its
recipients in no time, no matter where they are located.
The history of email dates back to the 1970s (see Baron 2000: 223–226). Until
the late 1980s, email was used primarily in governmental, business, and computer
science circles; subsequently, it gained widespread popularity with the rise of In-
ternet Service Providers such as CompuServe and AOL. It has replaced telephone
calls and letter mails to a certain extent and has further created new communication
niches: People send each other emails in situations in which they would not have
addressed each other earlier on, and so it has become much easier to approach an-
other person when needing assistance. Teachers, for instance, frequently receive
emails from their students who ask questions about homework assignments, up-
coming exams, or personal matters, inquiring about problems for which they
would have found a solution without the teacher’s help in earlier times. In this con-
text, Baron (2003: 86 and 2008: 165) reports on a student who asked for further in-
formation on his research project while he was preparing his master’s thesis: “Ap-
parently his library did not have many useful sources. After presenting me a long

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
36 Christa Dürscheid and Carmen Frehner

list of questions, he closed with ‘OK NAOMI … I really need your information as
soon as possible’”. This example clearly illustrates that the inhibition threshold to
write somebody has been lowered, but it also points to another phenomenon that
seems to be typical of email, namely the tendency to use a rather informal style (see
section 3).
Whereas previous studies have often discussed issues dealing with the question
of why people use email, this very question must be modified to inquire about the
reasons behind the fact that some people still send letters, while in other situations
they prefer email to letters. Indeed, there are some advantages of a letter over
email: A letter can transport an object; the receiver might pay more attention to a
letter than to an email; a letter can also be received by people who do not use the In-
ternet. How, then, is it that people often choose email to make an appointment or
discuss problems? Why would they not phone in such situations? An email does
not disturb the recipients at work and permits the senders to think over their words
and modify their sentences. Thus, it is not astonishing that people who work in the
same office, for instance, frequently communicate via email. Another advantage is
that “[email] enables people to communicate speedily the same information to
many others”, as Waldvogel (2007: n.p.) points out. The interactants even get a rec-
ord of the communication, which is not the case when discussing a topic over the
phone.1 In fact, email has become so popular within the business sector that people
often spend hours reading and answering emails, with the result that some em-
ployers have started to reduce the time their employees are allowed to spend with
email in order to save working time.
In section 2, we briefly sketch the history of email research from the 1980s until
the present. In section 3, the features generally claimed to be typical of email are
listed and critically discussed. We argue that there is no reason to assume a lan-
guage that is unique to email and show that it is rather inaccurate to use terms such
as “Netspeak”. Nevertheless, there are new communication practices when it
comes to emailing – practices that influence people’s social and communicative
behaviour. This particularly applies to email dialogues, which can be regarded as a
typical characteristic of CMC. In this context, we also refer to the numerous style
guides on the composition of emails. Section 4 focuses on theoretical approaches
to CMC in general and email communication in particular: On the one hand, we
describe a model which is well known in the work of German and Romance
scholars, namely the orality-literacy model of Peter Koch and Wulf Oesterreicher
(1994). On the other hand, we refer to Susan Herring’s (2001, 2007) discourse
analysis approach to CMC. The last section provides an outlook on the future of
email; we advance the thesis that email will persist in certain areas only, while it
will be replaced by more synchronous means of (online) communication in many
others.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 37

2. History of email research

As Stein (2003) points out, many linguistic and communication studies of Internet
language in German are available these days. Accordingly, it is important to focus
not merely on linguistic studies that have been carried out in the Anglophone area
but also on available German research material. The following overview therefore
provides both an overview of English studies and a description of the major Ger-
man works.2
Even though linguistic research on CMC in the Anglophone area dates back
to the beginning of the 1980s, it was only around 10 years later that it received
serious attention by linguists and scholars, and so “CMC was still a novelty topic
of research in the early 1990s” (Herring 2008: xxxv). The same is true for the
German-speaking research community. The earliest CMC studies that came to be
known by a broader public were published in the late 1990s; among these are
Weingarten’s volume Sprachwandel durch Computer (‘Computer-Driven Lan-
guage Change’) (1997) and Runkehl, Schlobinski, and Siever’s frequently cited
book Sprache und Kommunikation im Internet (‘Language and Communication on
the Internet’) (1998). To start with the Anglophone linguistic email research, three
major names must be mentioned in this context, these being Naomi Baron, Susan
Herring, and David Crystal.
a) Naomi Baron published an essay on “Computer mediated communication
as a force in language change” as early as 1984, and she studied the linguistics of
email more closely in her article “Letters by phone or speech by other means: The
linguistics of email”, which appeared in 1998. In the latter article, she also dis-
cussed the difference between writing and speech and considered email against the
background of this difference, concluding that while some features “distribute
themselves neatly on the dichotomous writing/speech spectrum”, others “have
mixed profiles” (Baron 1998: 155). Two years later, Baron came out with a rather
comprehensive study on the history of writing technologies, a book called Alpha-
bet to Email: How Written English Evolved and Where It’s Heading (2000). Always
On (2008) is another important study worth noting in this context. The question
Baron approaches in both books is how technology is changing the way we write.
She claims that “[i]n the fast-moving world of email, content is far more important
than spelling and punctuation” and finds that “the line between the spoken and
written language continues to fade” (Baron 2000: 259). Similarly, in her article
“Why email looks like speech. Proofreading, pedagogy and public face”, which
was published three years later, Baron (2003: 92) argues that “[e]mail resembles
speech”, thereby, however, ignoring the fact that there is actually a wide array of
text types, ranging from informal to formal, as well as a great variety of situational
factors that have to be considered, both of which have a significant influence on
email style. Baron (2003: 92) then points out that “writing in general has become
more speech-like, thanks in part to conscious pedagogical decisions and in part to

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
38 Christa Dürscheid and Carmen Frehner

changing social attitudes about how we present ourselves to others”. To support


this strong thesis, she provides a few intuitive examples concerning the United
States’ (henceforth U.S.) education system and social attitudes. It goes without
saying that more substantiated studies are necessary to ascertain whether these
supposed modifications in language use are in fact a reflex of a more general de-
velopment, that is, whether it is justifiable to speak generally of a “growing Ameri-
can tendency for all writing to become more informal, less edited, and more per-
sonal” (Baron 2003: 88).
b) With the numerous books and articles she has edited and written on com-
puter-mediated communication, Susan C. Herring has made a large contribution to
linguistic research on email communication. She began studying CMC in 1991
(per her biographical note in Herring 2008) and continues publishing valuable re-
search on the topic. One of her major works is the volume Computer-Mediated
Communication: Linguistic, Social, and Cross-Cultural Perspectives (1996a), which
she edited. Herring’s theoretical frame in CMC is discourse analysis, an approach
that was originally developed for oral communication and that has been applied to
written interaction in computer-mediated discourses as well. A short overview of
research on CMD (computer-mediated discourse) is given by Herring (2001). Here,
she points out that social practices, communication purposes, and situational and
demographic factors (e.g., social class, race, and ethnicity) have to be taken into
account when analysing CMC, and she presents the main properties of CMD fol-
lowing these factors. In a contribution to Language@Internet, a journal of which
she later became the editor-in-chief, she presents a CMC classification scheme that
brings together relevant aspects of the technical and social context that influences
discourse usages within CMC (Herring 2007). The scheme does not rely on com-
munication modes such as email, chat, blogs, etc., but is organised in terms of
clusters of features that are independent of each other but tend to combine in pre-
dictable ways. This makes the scheme highly versatile, so that it can even be ap-
plied to new communication modes that have yet to arise. Following Cherny
(1999), Herring (2001, 2007) mentions an interesting difference between one-way
transmission communication modes (e.g., chat) and two-way transmission com-
munication modes (e.g., Unix talk systems): Whereas the recipients can see how
the messages are typed by the senders in two-way systems, this is not the case in
one-way systems. Messages are displayed on the recipients’ screens only after
being dispatched, which also prevents the recipients from interrupting or taking
over the turn.3 According to Herring’s typology, email is an example of asynchron-
ous communication with one-way message transmission: Neither must the com-
munication partners be logged in simultaneously, nor can they see how the other
person is typing the message.
c) A frequently-cited volume on CMC is David Crystal’s Language and the In-
ternet, which first appeared in 2001. In this book, Crystal devotes one chapter to
the language of email, in which he describes its structural elements and various lin-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 39

guistic features and also defines the uniqueness of email. Crystal has become well
known for coining the term “Netspeak” – a term which appears in many of his
works, such as in the second edition of his volume The English Language: A
Guided Tour of the Language (1988, 2002). This term is critically discussed in
Dürscheid (2004), who finds that “Netspeak” as such does not exist. She argues
that the different kinds of text types written online make it impossible to draw any
generalising conclusions by subsuming the various linguistic features under a
single terminus technicus. Another book which deals with the topic is entitled The
Language Revolution, in which Crystal (2004: 64) points out that “[t]he public ac-
quisition of the Internet was [besides the emergence of a global language and the
phenomenon of language endangerment] the third element contributing to the rev-
olutionary linguistic character of the 1990s, and the one where the epithet ‘revol-
utionary’ is easiest to justify”. It is worth mentioning that Crystal (2001: 52–59)
was one of the first authors to analyse CMC in terms of Grice’s conversational
maxims (see also the chapters by Herring, Heyd, and Lindholm in this volume). He
argues, for instance, that Grice’s maxim of manner (“avoid obscurity of ex-
pression”) may be violated in CMC: “[t]yping, not a natural behaviour, imposes a
strong pressure on the sender to be selective in what is said […]. And selectivity
in expression must lead to all kinds of inclarity” (Crystal 2001: 57–58). Indeed,
it is interesting to apply the maxims to CMC in the way Crystal has done. Accord-
ing to Stein (2003: 160), this part is “one of the strongest and […] most innovative
facets of the book”.
There have been a number of other research articles, among which “Writing in
cyberspace: A study of the uses, style and content of email” by Helen Petrie (1999)
must particularly be mentioned. This study is one of the most extensive email
studies quantitatively, comprising analysis of 38,000 emails. Further important
works on the linguistics of email are Natalie Maynor’s article “The language of
electronic mail: Written speech?” (1994), Judith Yaross Lee’s article “Charting the
codes of cyberspace: A rhetoric of electronic mail” (2003), and Carmen Frehner’s
volume Email – SMS – MMS. The Linguistic Creativity of Asynchronous Discourse
in the New Media Age (2008). Frehner, like Crystal (2001), refers to Grice’s con-
versation maxims in her chapter about “netiquette” (2008: 41–43).
German research on email was launched by two major works, namely Janich’s
(1994) “Electronic Mail – eine betriebsinterne Kommunikationsform” (‘Electronic
mail – a company internal communication form’) and Günther and Wyss’s (1996)
“E-Mail-Briefe – eine neue Textsorte zwischen Mündlichkeit und Schriftlichkeit”
(‘Email letters – a new text type between orality and literacy’). Janich analysed
emails from within the business sector and focused on the characteristic features of
email correspondence in offices, while Günther and Wyss also paid attention to pri-
vate email communication. As the title of the latter work suggests, the authors as-
sume that email corresponds to one single text type. This might have been true at
the time the article was drafted; however, email has long since become multifunc-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
40 Christa Dürscheid and Carmen Frehner

tional with regard to its communication purposes. This is clearly demonstrated in


another study by Schmitz (2002), who shows that the email corpus of just one per-
son, consisting of 20,500 emails gathered over six years, covers almost every text
type, ranging from felicitations to orders, condolences, applications, making ap-
pointments, and many others. Another important study is Pansegrau’s “Dialogizi-
tät und Degrammatikalisierung in E-mails” (‘Dialogism and degrammaticalisation
in emails’), which was published in 1997. As one of the first articles, it discusses
CMC in the light of Koch and Oesterreicher’s (1994) model, which deals with the
difference between orality and literacy and considers the relationship between the
characteristics of written and spoken language as a continuum rather than a dichot-
omy (see section 4). Koch and Oesterreicher’s terminology has become pivotal in
German research on CMC (Dürscheid 2004); however, it is largely unknown
within the Anglophone research community, having been closely discussed in this
context only by Frehner (2008: 170–179), Jucker (2006: 118–120), and Landert
and Jucker (2011: 1425–1428).
While most works on email have pointed out the new features that have
evolved from computer-mediated communication, Elspaß (2002) has provoked
with a publication bearing the title “Alter Wein und neue Schläuche?” (‘Old wine
and new skins?’), in which he argues that what has been considered new in CMC
has, in fact, always existed in private written correspondence (Elspaß 2002: 7).
This article contradicts all those studies which claim that some form of language
change has accompanied the use of the new media (e.g., Weingarten 1997), stating
that the only thing that has changed is the users’ attitude towards the norms of lan-
guage usage, not the language use itself. Elspaß (2002) explains that at the end of
the 19th century, German emigrants to the U.S. used a similar speech-like style in
letters they sent to the “old world”, with the difference that these people, farmers
and craftsmen alike, were often not able to do any better because they were ignor-
ant of the norms of writing, whereas most of the writers nowadays are aware of the
rules and regulations, but do not follow them. Elspaß further notes that while oral
features in written language have been broadly treated in linguistic research of re-
cent years, they were largely ignored in scholarly work 150 years ago. This may also
be a reason for the general assumption that language use has profoundly changed.
There have been a number of other German research studies of email worth
mentioning, among them Ziegler and Dürscheid’s volume Kommunikationsform
E-Mail (‘The Communication Form Email’) (2002), which consists of 13 articles
concerning different aspects of email communication; Beutner’s (2002) disser-
tation, E-Mail Kommunikation; essays by Christa Dürscheid on the topic (Dür-
scheid 2005, 2008); and finally Höflich and Gebhardt’s edited volume Ver-
mittlungskulturen im Wandel: Brief, E-mail, SMS (‘Communication Culture in
Change: Letters, Email, SMS’) (2003). The research on email seems to have
reached a certain saturation point now – it appears that further studies will focus
rather on new CMC services such as Twitter and social network sites.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 41

3. Features of email communication

Identifying language use that is typical for email communication proves to be dif-
ficult “simply because the vast diversity of settings and purposes of [its] use out-
weigh any common linguistic features” (Androutsopoulos 2006: 420). Nonethe-
less, the following sections attempt to outline the nature of email and its
characteristics. Section 3.1 discusses the terms “emailism” and “Netspeak”. With
structural features at its core, section 3.2 focuses on the graphical, lexical, and
grammatical levels of emails, while the pragmatic features in terms of email dia-
logues and the relation between interactants is addressed in section 3.3.

3.1. “Emailism” and “Netspeak”


Two new terms have been coined in the context of email and computer-mediated
communication respectively, these being “emailism” and “Netspeak”. The term
“emailism” was coined by Petrie (1999: 26), who lists nine types of emailisms,
namely trailing dots, capitalisation, quoting back the previous email, excessive use
of exclamation marks or question marks, email abbreviations, lack of conventional
punctuation, non-standard spelling, use of non-alphanumeric characters, and the use
of smileys. Some of these features are graphostylistic strategies (e.g., excessive use
of exclamation and question marks), others are a matter of the dialogical nature of
emails (e.g., quoting back the previous email, see section 3.3). The term “emailism”
has not actually caught on, but it is still worth mentioning because it shows the urge
of researchers to conceptualise the nature of email in a general term in order to il-
luminate the concept more clearly. Similarly, Crystal (2001) has come up with the
term “Netspeak”, by which he refers to CMC in general terms, including email.
Typical Netspeak features in the context of email are various types of abbreviation,
the tendency to use all lower case, new spelling conventions including all sorts of
non-standard spellings, the rather minimalistic use of punctuation, which might
even be completely absent in email exchanges, or else unusual combinations of
punctuation marks (Crystal 2001: 134–138). Meanwhile, the term “Netspeak” has
become a popular term in discourse about CMC; it has already made its way into the
Urban Dictionary and has been referred to in various articles and essays.
The terms “emailism” and “Netspeak” are both attempts to define email and,
more precisely, its linguistic features. They suggest that the language of email is a
new, previously unknown language with unique features, thus deserving its own
term. It is questionable, however, whether email is indeed as new a phenomenon as
is commonly claimed. If we consider what Petrie and Crystal subsume under their
terms, we realise that most of these characteristics are not actually new – a fact
which, as mentioned above, was clearly shown by Elspaß’s (2002) corpus of pri-
vate letters dating back to the late 19th century. Undisputedly, the possibility for an
addressee to read a message received immediately after its composition can be re-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
42 Christa Dürscheid and Carmen Frehner

garded as a historical quantum leap in communication, and in this respect, the


email setting is a new phenomenon: It enables near-real-time written communi-
cation. Yet apart from the technical aspect, it is doubtful whether one can consider
email as something completely new, i.e., as a form of communication that is wholly
different from any other communication form.

3.2. Structural features


Various features are claimed to be typical of email; these include forms of lexical
abbreviation (e.g., cu ‘see you’) and syntactic reduction (e.g., Exams over?), non-
standard punctuation, and emulated prosody. As mentioned in Crystal (2001: 136),
for instance, there is a significant tendency to use lower-case spelling where capital
letters would be the rule. Similarly, Thurlow (2001: 288) finds that people make
“minimal to no use of capitalisation” in CMC, and so even though the whole mess-
age is not necessarily in lower-case letters, there is a considerable tendency to em-
ploy lower case. The reason why people neglect capital letters is that they can re-
duce typing effort and do not have to think about the correct upper-case and
lower-case spelling. It is easier and more efficient to go with the lower-case default
mentality. Another economic feature is lexical reduction. Crystal (2001: 134) ex-
plains that “[a]cronyms are so common that they regularly receive critical com-
ments” and points out that they “are no longer restricted to words or short phrases,
but can be sentence-length: AYSOS [‘Are you stupid or something?’], CID [‘Con-
sider it done’], GTG [‘Got to go’], WDYS [‘What did you say?’]”. Yet these multi-
word sentences are not as widespread as other lexical reductions such as homo-
phones, consonant spellings, the omission of apostrophes, and ad hoc abbrevi-
ations. Letter and number homophones are comparably frequent. Rather frequent
is the letter homophone u for the pronoun ‘you’. Other homophones are c for ‘see’,
r for ‘are’, 2 for ‘to/too/two’, and 4 for ‘four/for’. Another common way to shorten
words is consonant spelling (Frehner 2008): Words are spelled without their vo-
wels, so that from becomes frm, can becomes cn, and would becomes wld. Apos-
trophes have also largely become the victim of efficiency in email correspondence
and may be omitted. (For further discussion of the micro-linguistic structural fea-
tures of CMC, see the chapter by Bieswanger in this volume.)
Frehner (2008: 63–69) shows that shortenings not only take place on the lexical
level, but also on the syntactic level. Subject deletions are among the most frequent
syntactic omissions; they may co-occur with auxiliary verb deletions or simply on
their own. In German, it is usually the first person singular pronoun which is
omitted (e.g., Bin spät dran, ‘am late’). Copula deletion and omitted articles and
conjunctions (e.g., Exams over?) are further means of economy, and the same
applies to omitted punctuation marks. Despite this recognisable tendency to econ-
omise the language of emails, one feature does not serve economy at all, this being
emulated prosody: To add extra emphasis or to emulate prosody, letters of a word

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 43

can be repeated or capitalised, and whole words can be reduplicated or else be put
between asterisks or underlined spaces. The creative use of punctuation may also
add emphasis or indicate loudness, silence, rising intonation, or even emotion.
Another typical email feature is the so-called thread. In email, a thread is a
technical feature, being automatically generated by the mailing programme once
the user replies to a received message by pressing the reply button.4 Nevertheless,
such a thread still has a certain influence on the pragmatic level of emailing (see
section 3.3). It consists of all the sent and received messages on a topic that was
named and inserted into the subject line by the sender of the initial message. It is
thus the subject line which creates a tie among these messages and establishes
some text-external coherence. Having older messages included in one’s answer
allows the respondent to refer to some previously mentioned issue by, for instance,
some anaphoric pronoun only (e.g., Oooh D, that’s not on our agenda for a while
you know, worth trying though […]). In this way, a quasi-dialogue is performed (cf.
Severinson Eklundh 2010), and for this reason, it is also justified to consider email
as a target of discourse analysis.
Apart from this, there are qualitatively no new features that were not familiar to
us before the advent of email. What seems to have changed is their quantity. While
each of the linguistic characteristics described above had been present before email
became popular, there are now more of these elements at once. Smiling faces, for
instance, have been around since 1963 when Harvey Ball, a graphic artist, invented
the yellow smiley face upon being given the task by the State Mutual Life Assur-
ance Company “to design a logo that would uplift its employees after a company
merger had hurt company morale […]. Thinking about what would inspire em-
ployees to smile, Harvey decided the most simple and direct symbol would be a
smile itself and that is what he drew” (Cates 2003: n.p.). Abbreviations have also
been around for many decades, and emulated prosody is very similar to what can
be found in comics, where the same or similar features exist. As for the lack of con-
ventional punctuation marks, even this feature is not new: Telegrams, for instance,
used to have an unusual typeface, often lacking any punctuation marks. What com-
puter language has certainly encouraged is the great variety of abbreviations – just
as it has led to a huge variety of smileys – but in the end, the way in which words
are abbreviated is not new from a qualitive perspective; quite on the contrary, it is a
quantitative change.

3.3. Pragmatic features


Regarding the history of CMC research, Androutsopoulos (2006: 421) states that
“a shift of focus from medium-related to user-related patterns of language use” has
taken place. Similarly, the medium-centred email perspective has given way to a
user-centred one focusing on the pragmatic level of email communication. One of
the major pragmatic effects caused by email is evident in email dialogues. Thanks

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
44 Christa Dürscheid and Carmen Frehner

to the Internet, it is possible to exchange messages in the written mode in an almost


synchronous way if two people are at the computer at the same time. This has led to
some new behaviour in written communication, mainly concerning greeting and
farewell formulas (Waldvogel 2007), as well as the way in which people quote
back a previous message: The faster a reply follows a message, the more similar-
ities it bears to a turn in an oral dialogue. If a person responds to an email quickly,
they will often just add their new information to what has been communicated be-
fore without explicitly naming the reference object or addressing the recipient
anew.
Whereas it is a typical characteristic of a non-electronic letter to contain a
greeting and some form of farewell formula, these features are not always present
in emails.5 Emails may or may not have a greeting and may begin in an elliptical
way, not necessarily mentioning the reference object, but simply adding to what has
been communicated before. As the reference object is usually present in the subject
line, the receiver knows what the message is about so that no information concern-
ing the subject matter is needed. In paper-based letters, subject lines are only com-
mon in formal letters, i.e., business letters, and in memoranda (cf. Cho 2010; Or-
likowski and Yates 1993), while there is usually no subject line in informal letters.
This is different in emails: A blank line invites the sender to mention a subject re-
gardless of the degree of formality. In fact, should the senders not fill in this line,
they will usually be asked by the email system if a subject should be added. The
reason why there is not always a greeting can be explained when we consider the
to-and-fro of email dialogues that are similar to oral dialogues. The more quickly
the emails are exchanged, the more they can be compared to oral dialogues and the
less probable it is that there will be greeting formulas. They are not needed, just as
they are not necessary in turns of an oral dialogue. The tendency is that the greater
the time span between two messages, the more information is required; the shorter
the time span, the more information can be assumed to be available from the con-
text of the interaction. The absence of greeting formulas is not something that is
new to email; memoranda do not usually include greeting formulas either. They
were also often omitted in telegram messages: In order to save costs, people tried
to cut out words when composing telegrams, and greeting formulas happened to be
omitted – as well as farewell formulas, at times.
Emoticons are another of the features associated with email. Focusing merely
on the term, which is a blend of “emotion” and “icon”, one may assume that emo-
ticons add emotion to what has been written. Yet they also indicate the illocution-
ary force of the utterance with which they are associated, as Dresner and Herring
(2010) point out. Accordingly, an emoticon may be used to downgrade a complaint
to a simple assertion or to indicate humour or irony. There exists a great variety of
emoticons, ranging from the original happy smiley :-) and sad smiley :-( to more
complex ones such as the smiley with its tongue sticking out :-P or the chef smiley
C=:-). Popular as they might be, emoticons do not appear as often in emails as is

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 45

commonly believed. Frehner’s empirical study (2008) reveals that in a corpus con-
sisting of 342 emails, there were only 3.16 occurrences of smileys per 1,000 words,
whereas in a corpus of 983 single (fewer than 160 signs) and linked (more than 160
signs) text messages (SMS), emoticons appear 4.88 and 3.98 times per 1,000
words, respectively. No studies so far have explained why emoticons are not so fre-
quent in emails, especially since they are undoubtedly native to CMC. Androutso-
poulos (2006: 425) reports on “emoticons being more often used by females in
Witmer and Katzman (1997), and by teenage males in Huffaker and Calvert (2005)”.
Beutner (2002: 78), in contrast, assumes that it is mainly newbies (i.e., inexperienced
users) who make use of emoticons. This would imply that newbies (i.e., inexperi-
enced users) first overuse emoticons and then, the more accustomed they get to the
communication mode, the less they use them to modify their statements.
At this point, it is worthwhile to take a closer look at the “etiquette” of email, be-
cause it reveals characteristic pragmatic features compared to the etiquette of other
CMC modes, on the one hand, and to that of offline (written) communication, on the
other hand. We do not imagine that people are actually aware of these guidelines, but
their regulations nevertheless allow for conclusions about everyday email use. If
email etiquette tells us, for instance, to avoid certain elements (e.g., the use of words
spelled in all capitals), we can deduce that these have already become a feature of
emails. Another common piece of advice is to not send an email when feeling emo-
tional. As emails are easily composed and dispatched, email writers are likely to
send messages written in the heat of the moment – messages that would never have
been written or sent if they had to be taken to the post office.6 The first set of guide-
lines, titled “Towards an ethics and etiquette for electronic mail”, dates from 1985
and is still available. The authors, Norman Shapiro and Robert Anderson, based
their recommendations on personal observations of inappropriate and counterpro-
ductive uses of email. Since then, numerous guidelines have been composed dealing
with email use. They can be found on the Internet, codified in FAQ documents or
Netiquette guidelines, but also in print newspaper articles and in print books on
Netiquette. Indirectly, these guidelines postulate the cooperative principle and
Grice’s (1975) four conversational maxims: the maxims of quantity, quality, rel-
evance, and manner. Some guidelines recommend, for instance, not sending emails
with large attachments – a rule that concerns the maxim of quantity (“Do not make
your information more informative than is required”). However, there is a differ-
ence between the theoretical status of Grice’s conversational maxims and the status
of the Netiquette guidelines: The maxims describe presumptions about utterances,
i.e., they express the ideal ways in which cooperative interactants should communi-
cate. The guidelines, in contrast, have a strong prescriptive character.
The following instruction concerning the feature of quoting in emails is based
on the maxims of relevance and quantity (e.g., say things related to the current
topic of the conversation; do not say more than is needed): “Only quote the needed
parts (deleting the remainder) and reply directly after the item you wish to respond

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
46 Christa Dürscheid and Carmen Frehner

to” (Johns 1996: n.p.). The maxim of manner is reflected in the following advice:
“Please remember that you are sending a text-based communication to possible
strangers. They may not know your sarcasm or witty sense of humor like your
family and close friends do” (Johns 1996: n.p.). Other recommendations concern
non-verbal behaviour in CMC. For example, people are advised not to forward an
email without the agreement of the sender, send a carbon copy to several recipients
in which everybody’s address is indicated, or send a large attachment file without
announcing it beforehand.7 These rules clearly demonstrate that there are socio-
cultural factors associated with interaction in CMC that have to be taken into con-
sideration.

4. Theoretical approaches

This section focuses on two approaches that have already been mentioned, these
being Koch and Oesterreicher’s (1994) orality-literacy model,8 which was devel-
oped in the 1980s before the rise of email communication, and Herring’s (2001,
2007) discourse approach to CMC. Koch and Oesterreicher distinguish between
medium and conception, explaining that while a piece of writing can be written
from a medial perspective, the same piece of writing can be oral from a conceptual
perspective and vice versa. While there is a dichotomy within the medial dimen-
sion (language is either phonic or graphic), there is a continuum within the concep-
tual dimension (see also Biber 1988). The two poles of the continuum are called
“language of immediacy” (which is conceptually oral) and “language of distance”
(which is conceptually written). The language of immediacy is typically associated
with private settings (see Landert and Jucker 2011) in which there is a high degree
of familiarity as well as a lack of emotional distance between the interactants; it is
further set in a dialogic situation and characterised by unplanned discourse, while
the opposite is true of the language of distance. Note that labelling these poles as
“oral” and “written” may be misleading even if they are qualified by the attribute
“conceptually”. One must always keep in mind that this dimension is logically in-
dependent of the medial dimension, although there might be a prototypical corre-
spondence between the two. Figure 1 illustrates the model.
In the prototypical case, there is a correspondence between the choice of lin-
guistic features and the medial dimension. This means that written language is
more typically used in situations of distance and when a formal style is required. A
legal text, for instance, is classified as written both from a conceptual and a medial
perspective (position A), while private talk within one’s family or among friends is
spoken and tends to use an informal style (position B). At the same time, some cor-
respondences do not follow this regularity and must be located somewhere be-
tween the conceptual and the medial dimension. Accordingly, a church sermon is
spoken, but tends to be stylistically formal, whereas a greeting postcard is written,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 47

Figure 1. Koch and Oesterreicher’s model; A= legal text, B = private talk, C= private
email

but is of a more colloquial style. For this reason, the model is highly interesting for
CMC research: In CMC, we are often faced with texts that do not meet our expec-
tations concerning the relationship between medium and conception. Private
emails, for instance, are written from the medial point of view, but may be situated
next to the immediacy pole from the conceptual point of view (position C).
It is impossible to generalise about where email communication is located
along the conceptual continuum due to the fact that a wide range of text types is
realised in emails, each of them being associated with its own characteristic lin-
guistic features. A business email, for instance, is usually less conceptually oral
than a private email to a friend. This means that the model is suitable for the clas-
sification of email (or other) text types, but not for the classification of communi-
cation modes as a whole. However, the approach provides a precise terminology
for CMC research, enabling researchers to describe a message’s closeness to
spoken or written language. When Baron (2000: 258) states that “[t]he line be-
tween spoken and written language continues to fade in America”, she is referring
to the conceptual dimension only. Within the medial dimension, the line cannot
fade – despite the fact that on a screen, for instance, phonic and graphic signs may
be combined. Email is not speech; email is exclusively text-based. There may be
oral features, but these features are situated on the conceptual level and not on the
medial one.
All in all, Koch and Oesterreicher’s model is a suitable approach to situate
written interactions such as business and private email messages along the con-
tinuum of communicative immediacy and communicative distance. However, it

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
48 Christa Dürscheid and Carmen Frehner

does not offer a tool to analyse the context in which the interactions are embedded.
To analyse dialogical situations, it is useful to consider the computer-mediated dis-
course analysis approach (CMDA) presented by Herring (2001). Research studies
that are situated within this frame focus on communication purposes, situational
factors (such as one-to-one, one-to-many, or many-to-many communication), and
the role of demographics (e.g., social class, race, and ethnicity). Indeed, it does
make a difference whether an email is sent in a one-to-many-communication sys-
tem (e.g., within a newsgroup) or in a one-to-one-communication system, within a
business (formal) or private (informal) context. All these factors must be taken into
consideration. Herring (2007) presented a classification scheme that brings to-
gether the relevant aspects of the technical and the social contexts that influence
discourse usage in CMC (see section 2). In this article, she clearly points out that
two main dimensions, medium and situation, jointly influence language use.
Among the medium dimensions, one factor that conditions CMC is one-way or
two-way message transmission, and another is synchronicity of participation (Her-
ring 2007). Concerning the latter, it is useful to check the degree of (a-)synchro-
nicity of a communication mode because this may influence language use. In fact,
there is a continuum between asynchronous computer-mediated discourse (CMD),
which occupies a position closer to writing (i.e., conceptually written in Koch and
Oesterreicher’s terms), and synchronous CMD, which occupies a position closer to
speaking (i.e., conceptually oral). However, this factor does not only depend on the
medium, it also depends on the situation, i.e., the interactants’ use of the medium
(Androutsopoulos 2007). The more synchronous the communication is (i.e., the
shorter the delay between messages), the more likely it is to be conceptually oral.

5. Outlook: Email in competition with newer CMC services

The future of email research is closely linked to the future of email communication
itself. Although the first email message was sent as early as 1971 (Bryant 2011),
email did not become a widely used means of communication by the public until
towards the end of the 20th century, at which time it quickly advanced to become
the most frequently used Internet application. Until recently, figures for email
usage have risen consistently ever since email became available to the general pub-
lic in the early 1990s. Yet it seems that the quick rise in email usage might be fol-
lowed by an equally quick fall: Newer and more synchronous services such as the
various forms of Instant Messaging,9 as well as the numerous social network sites
among which Facebook and Twitter are the most popular, have started to compete
with email. According to a study in the U.S. by compete.com, Facebook is cur-
rently the most visited social network site, with 700,000,000 estimated unique
monthly visitors in November 2011.10 Compared to email, social network sites are
more personal because one can read the profiles of the addressees, check their status

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 49

updates (see Lee 2011), flip through their photo albums, and learn about their per-
sonal lives. In other words, they provide many features other than just email ad-
dresses and messages through which users can represent themselves.
Social network sites have another advantage in comparison to email: As is gen-
erally known, one of the major problems with email is the amount of spam (or un-
solicited messages) that is sent to email accounts. According to Pingdom, a service
provider that checks the availability of online services for major companies, spam
accounted for 89.1 % of all email traffic in 2010.11 Similar problems do not (yet)
exist with Instant Messaging services or with social network sites, which makes
these services even more popular. Accordingly, a telephone survey conducted by
the Pew Internet & American Life Project as early as 2005 stated that “email may
be at the beginning of a slow decline as online teens begin to express a preference
for instant messaging” (Lenhart, Hitlin, and Madden 2005: 5). In a newer Pew
Internet Project study, a 9th grade boy is quoted as saying: “[You go to MySpace12]
when all of your friends have gone to MySpace and they aren’t emailing anymore”
(Lenhart, Arafeh, Smith, and Macgill 2008: 61). The figures presented in the report
show a clear tendency: “Email remains the least popular choice for daily communi-
cation: [J]ust 16 % of teens send emails to their friends on a daily basis” (Lenhart et
al. 2008: 53). It may be assumed that at the time of this writing, the shift is even
more pronounced: Email is no longer the privileged mode of online communi-
cation among young people.
However, another point must be taken into consideration that partly speaks in
favour of the future of emailing: While email has been linked to stationary com-
puters for a long time, technology trends are towards increasing mobility. Es-
pecially with the diffusion of Apple’s iPhone and its high-speed data connection,
emails can be received almost as easily as text messages, which may lead to a new
boost in email figures. Be that as it may, information technology experts regard
email as an “old-fashioned” way of communication, and some people predict that
email use will die off. Lorenz (2007), for instance, published an article on “The
death of e-mail” in which he summarised the decline of email as follows: “Those of
us older than 25 can’t imagine a life without e-mail. For the Facebook generation,
it’s hard to imagine a life of only e-mail […]. As mobile phones and sites like
Twitter and Facebook have become more popular, those old Yahoo! and Hotmail
accounts increasingly lie dormant” (n.p.).
These reports seem to predict doom for email communication. Yet they mainly
concern private email communication. It is possible that the situation is different in
the business sector, where traditional email communication serves important func-
tions and may persist. There are also email-based systems such as web forums and
discussion lists that are active at present and might continue to be used. It can be
concluded that email research will have a future as long as email as a communi-
cation mode finds its niches.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
50 Christa Dürscheid and Carmen Frehner

Notes

1. For further details about this kind of “multi-party interaction” see Skovholt and Sven-
nevig (2006).
2. Due to limitations of space, this chapter focuses on these two languages only.
3. In contrast to one-way systems, there exist only a few two-way systems in the written
mode (Google Wave, for instance, offered real time communication, but Google discon-
tinued its development in 2010, only one year after it was released). Yet it is important to
mention this distinction, as – in contrast to Anglophone studies – there is a general
agreement among the German research community that online chat is not synchronous.
Some consider it “quasi-synchronous” (e.g., Dürscheid 2004: 154), while others (e.g.,
Beißwenger 2007: 37) distinguish between simultaneity (i.e., the participants are able to
see the message as it is produced) and synchronicity (i.e., sender and addressee are
logged in at the same time).
4. This is not the case for online chat, however. On cross-turn coherence in chat, see the
chapters in this volume by Herring and Markman.
5. For an empirical study on this issue (although only public emails are analysed), see Her-
ring (1996b).
6. It would be interesting to investigate whether the sociocultural factors that underlie
these rules are universal or whether they vary across cultures.
7. As the speed of data transfer has increasingly become faster in recent years and people
often have high speed Internet connections, this rule may no longer be relevant. Even
large data files can be downloaded quickly and easily these days.
8. This is our translation from the German “Mündlichkeits-/Schriftlichkeitsmodell”.
9. In contrast to email, Instant Messaging is a more synchronous communication mode:
The interlocutors have to be online at the same time to receive each other’s messages.
10. http://www.ebizmba.com/articles/social-networking-websites [accessed 4/30/2012]
11. http://royal.pingdom.com/2011/01/12/internet-2010-in-numbers/
[accessed 11/14/2011]
12. Until Facebook took over in popularity several years ago, MySpace had been the most
popular social network site.

References

Androutsopoulos, Jannis K.
2006 Introduction: Sociolinguistics and computer-mediated communication. Jour-
nal of Sociolinguistics 10(4): 419–438.
Androutsopoulos, Jannis K.
2007 Neue Medien – neue Schriftlichkeit? Mitteilungen des Germanistenverbandes
54(1): 72–97.
Baron, Naomi S.
1984 Computer mediated communication as a force in language change. Visible
Language 18(2): 118–141.
Baron, Naomi S.
1998 Letters by phone or speech by other means: The linguistics of email. Language
and Communication 18: 133–170.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 51

Baron, Naomi S.
2000 Alphabet to Email: How Written English Evolved and Where It’s Heading.
New York/London: Routledge.
Baron, Naomi S.
2003 Why email looks like speech. Proofreading, pedagogy, and public face. In:
Jean Aitchison and Diana M. Lewis (eds.), New Media Language, 85–94. New
York/London: Routledge.
Baron, Naomi S.
2008 Always On: Language in an Online and Mobile World. Oxford, UK: Oxford
University Press.
Beißwenger, Michael
2007 Sprachhandlungskoordination in der Chat-Kommunikation. Berlin/New York:
Mouton de Gruyter.
Beutner, Yvonne
2002 E-Mail Kommunikation. Eine Analyse. Stuttgart: ibidem Verlag.
Biber, Douglas
1988 Variation across Speech and Writing. Cambridge, UK: Cambridge University
Press.
Bryant, Martin
2011 The first email message was sent 40 years ago this month. The Next Web,
October 8. http://thenextweb.com/insider/2011/10/08/the-first-email-was-sent-
40-years-ago-this-month
Cates, Ken
The Harvey Ball smiley face: A short history on the 40th anniversary – 2003.
The Smiley Store. http://www.smileystore.com/smiley-face-history
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford, CA: CSLI
Publications.
Cho, Thomas
2010 Linguistic features of electronic mail in the workplace: A comparison with
memoranda. Language@Internet 7, article 4. http://www.languageatinternet.
org/articles/2010/2728
Crystal, David
2001 Language and the Internet. Cambridge, UK: Cambridge University Press.
Crystal, David
2002 The English Language: A Guided Tour of the Language, 2nd Edition. London:
Penguin Books Ltd.
Crystal, David
2004 The Language Revolution. Cambridge, UK: Polity Press.
Dresner, Eli and Susan C. Herring
2010 Functions of the non-verbal in CMC: Emoticons and illocutionary force. Com-
munication Theory 20: 249–268.
Dürscheid, Christa and Arne Ziegler (eds.)
2002 Kommunikationsform E-Mail. Tübingen: Stauffenburg.
Dürscheid, Christa
2004 Netzsprache – ein neuer Mythos. In: Michael Beißwenger, Ludger Hoffmann,
and Angelika Storrer (eds.), Internetbasierte Kommunikation. Osnabrücker
Beiträge zur Sprachtheorie 68, 141–157. Duisburg: Gilles & Francke.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
52 Christa Dürscheid and Carmen Frehner

Dürscheid, Christa
2005 E-Mail – verändert sie das Schreiben? In: Torsten Siever, Peter Schlobinski,
and Jens Runkehl (eds.), Websprache.net. Sprache und Kommunikation im In-
ternet, 85–97. Berlin/New York: Mouton de Gruyter.
Dürscheid, Christa
2009 E-Mail: eine neue Kommunikationsform? In: Sandro Moraldo (ed.), Inter-
net.kom. Neue Sprach- und Kommunikationsformen im World Wide Web,
39–71. Rome: Aracne Edititrice.
Elspaß, Stephan
2002 Alter Wein und neue Schläuche? Briefe der Wende zum 20. Jahrhundert und
Texte der neuen Medien – ein Vergleich. In: Ulrich Schmitz and Eva Lia Wyss
(eds.), Briefkultur im 20. Jahrhundert. Osnabrücker Beiträge zur Sprachthe-
orie 64, 7–31. Duisburg: Gilles & Francke.
Frehner, Carmen
2008 Email – SMS – MMS. The Linguistic Creativity of Asynchronous Discourse in
the New Media Age. Bern: Peter Lang.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 41–48. New York: Academic Press.
Günther, Ulla and Eva Lia Wyss
1996 E-mail-Briefe – eine neue Textsorte zwischen Mündlichkeit und Schriftlich-
keit. In: Ernest W. B. Hess-Lüttich, Werner Holly, and Ulrich Püschel (eds.),
Textstrukturen im Medienwandel, 61–86. Frankfurt am Main: Peter Lang.
Herring, Susan C. (ed.)
1996a Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural
Perspectives. Amsterdam/Philadelphia: John Benjamins.
Herring, Susan C.
1996b Two variants of an electronic message schema. In: Susan C. Herring (ed.),
81–108.
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Tannen, Deborah Schiffrin, and
Heidi Hamilton (eds.), Handbook of Discourse Analysis, 612–634. Oxford,
UK: Blackwell.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse.
Language@Internet 4, article 1.
http://www.languageatinternet.org/articles/2007/761
Herring, Susan C.
2008 Foreword. In: Sigrid Kelsey and Kirk St. Amant (eds.), Handbook of Research
on Computer-Mediated Communication, Volume 1, xxxv–xxxvi. Hershey, PA:
Information Science Reference.
Höflich, Joachim and Julian Gebhard (eds.)
2003 Vermittlungskulturen im Wandel: Brief, Email, SMS. Frankfurt am Main: Peter
Lang.
Huffaker, David A. and Sandra L. Calvert
2005 Gender, identity, and language use in teenage blogs. Journal of Computer-
Mediated Communication 10(2), article 1.
http://jcmc.indiana.edu/vol10/issue2/huffaker.html

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
Email communication 53

Janich, Nina
1994 Electronic Mail – eine betriebsinterne Kommunikationsform. Muttersprache
3: 248–259.
Johns, Kass
1996 Basic electronic mail netiquette (Network etiquette). http://www.kassj.com/
netiquette/netiquette.html
Jucker, Andreas
2006 Live text commentaries: Read about it while it happens. In: Jannis K. Androut-
sopoulos, Jens Runkehl, Peter Schlobinski, and Torsten Siever (eds.), Neuere
Entwicklungen in der linguistischen Internetforschung, 113–131. Hildesheim/
Zürich/New York: Georg Olms Verlag.
Koch, Peter and Wulf Oesterreicher
1994 Schriftlichkeit und Sprache. In: Hartmut Günther and Otto Ludwig (eds.),
Schrift und Schriftlichkeit/Writing and its Use. Ein interdisziplinäres Hand-
buch internationaler Forschung/An Interdisciplinary Handbook of Inter-
national Research, 587–604. Berlin/New York: Mouton de Gruyter.
Landert, Daniela and Andreas H. Jucker
2011 Private and public in mass media communication. From letters to the editor to
online commentaries. Journal of Pragmatics 43: 1422–1434.
Lee, Judith Yaross
2003 Charting the codes of cyberspace: A rhetoric of electronic mail. In: Lance
Strate, Ron L. Jacobson, and Stephanie B. Gibson (eds.), Communication and
Cyberspace, 2nd Edition, 307–328. Cresskill, NJ: Hampton Press.
Lee, Carmen K. M.
2011 Micro-blogging and status updates on Facebook: Texts and practices. In:
Crispin Thurlow and Kristine Mroczek (eds.), Digital Discourse: Lan-
guage in the New Media, 110–128. Oxford/New York: Oxford University
Press.
Lenhart, Amanda, Paul Hitlin, and Mary Madden
2005 Teens and technology. Pew Internet & American Life Project.
http://www.pewinternet.org/Reports/2005/Teens-and-Technology.asp x?r=1
Lenhart, Amanda, Sousan Arafeh, Aaron Smith, and Alexandra Macgill
2008 Writing, technology and teens. Pew Internet & American Life Project.
http://pewinternet.org/Reports/2008/Writing-Technology-and-Teens.aspx
Lorenz, Chad
2007 The death of e-mail. Teenagers are abandoning their Yahoo! and Hotmail ac-
counts. Do the rest of us have to? Slate Magazine, November 14.
http://www.slate.com/id/2177969
Maynor, Natalie
1994 The language of electronic mail: Written speech? In: Greta D. Little and
Michael Montgomery (eds.), Centennial Usage Studies, 48–54. Tuscaloosa,
AL: University of Alabama.
Orlikowski, Wanda and Joanne Yates
1993 From memo to dialogue: Enacting genres of communication in electronic
media. Technical Report TR 139–3525, MIT Sloan School.
http://dspace.mit.edu/bitstream/handle/1721.1/2451/SWP-3525-27731982.pdf

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
54 Christa Dürscheid and Carmen Frehner

Pansegrau, Petra
1997 Dialogizität und Degrammatikalisierung in E-mails. In: Rüdiger Weingarten
(ed.), Sprachwandel durch Computer, 86–104. Opladen/Wiesbaden: Westdeut-
scher Verlag.
Petrie, Helen
1999 Writing in cyberspace: A study of the uses, style and content of email.
Unpublished paper. University of Hertfordshire/Hatfield.
Runkehl, Jens, Peter Schlobinski, and Torsten Siever
1998 Sprache und Kommunikation im Internet. Opladen/Wiesbaden: Westdeutscher
Verlag.
Schmitz, Ulrich
2002 E-Mails kommen in die Jahre. Telefonbriefe auf dem Weg zu sprachlicher Nor-
malität. In: Christa Dürscheid and Arne Ziegler (eds.), Kommunikationsform
E-Mail, 33–56. Tübingen: Stauffenburg.
Severinson Eklundh, Kerstin
2010 To quote or not to quote: Setting the context for computer-mediated dialogues.
Language@Internet 7, article 5.
http://www.languageatinternet.org/articles/2010/2665
Shapiro, Norman Z. and Robert H. Anderson
1985 Towards an ethics and etiquette for electronic mail. http://www.rand.org/pubs/
reports/R3283.html
Skovholt, Karianne and Jan Svennevig
2006 Email copies in workplace interaction. Journal of Computer-Mediated Com-
munication 12(1), article 3.
http://jcmc.indiana.edu/vol12/issue1/skovholt.html
Stein, Dieter
2003 Book review of David Crystal: Language and the Internet. Linguistics 41(1):
158–163.
Thurlow, Crispin
2001 Language and the Internet. In: Rajend Mesthrie and Ronald E. Asher (eds.),
The Concise Encyclopedia of Sociolinguistics, 287–289. Oxford, UK: Elsevier
Science Ltd.
Urban Dictionary
n.d. http://www.urbandictionary.com [Retrieved 4/30/2012]
Waldvogel, Joan
2007 Greetings and closings in workplace email. Journal of Computer-Mediated
Communication 12(2), article 6.
http://jcmc.indiana.edu/vol12/issue2/waldvogel.html
Weingarten, Rüdiger (ed.)
1997 Sprachwandel durch Computer. Opladen/Wiesbaden: Westdeutscher Verlag.
Witmer, Diane F. and Sandra Lee Katzman
1997 On-line smiles: Does gender make a difference in the use of graphic accents?
Journal of Computer-Mediated Communication 2(4).
http://jcmc.indiana.edu/vol2/issue4/witmer1.html

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 1:30 PM
3. Mailing list communication
Helmut Gruber

1. Preliminary remarks

Linguistic pragmatic investigations of email communication have a long research


tradition in the investigation of computer-mediated discourse (CMD, Herring
2001), because email was the first available means for message exchange between
computer users. Unlike traditional mail, which is predominantly used in person-to-
person communication, emails could be sent easily to more than one recipient from
the very beginning. With the advent of mailing list programs and the establishment
of Usenet newsgroups, this many-to-many (n:n) mode of communication1 soon
gained popularity among computer users. Furthermore, the n:n communicative
mode and the automatic storage possibilities of email programs made – and still
make – email communication easily accessible data for linguists interested in new
communicative practices. This chapter reviews research on email communication
that took its data from electronic mailing lists (also known as “discussion lists”) in
order to investigate communicative practices in the “new media” in general, as
well as studies that explicitly investigate communicative features of mailing list
communication. Investigations of person-to-person email communications or their
cognitive and socio-organizational effects are not the focus of this chapter (see the
chapter by Dürscheid in this volume and the overview in Ducheneaut and Watts
2005), nor are the (numerous) investigations of discussion lists in educational set-
tings as a tool for achieving certain educational outcomes rather than on the com-
municative practices used to achieve those outcomes (for an overview of this
strand of research, see Lamy and Hampel 2007).
The chapter first characterizes mailing list communication with regard to sev-
eral technical and communicative parameters, then provides a working definition
of “pragmatics”, and then proceeds to review several research areas related to the
pragmatics of mailing list communication.

2. Defining mailing list communication

In this section, following a short historical overview of email discussion groups,


mailing list communication is contrasted with other forms of n:n asynchronous
CMD, such as Usenet communication. On the basis of its most relevant communi-
cative features, listserv communication is then characterised as a specific kind of
email communication.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
56 Helmut Gruber

The first mailing list was established in the mid-1970s on the precursor of the
Internet, the ARPANET. The ARPANET was set up as a computer network for
advanced collaborative space research by the United States military (Hauben
1998–1999, 2000) in 1969. It connected governmental and non-governmental
sites of research and grew rapidly. Soon a new format for communicative ex-
changes among users of this network was developed that was called “electronic
mail” or “e-mail” (Hauben 1998–1999). In 1975, the first mailing list on the AR-
PANET was established, the “MsgGroup”. Net Manager Steve Walker’s message
from June 7, 1975 to this group in which he proposed a discussion that would be
based solely on the MsgGroup distribution list facility rather than on regular com-
mittee meetings is viewed as the starting point for email discussion lists (Hauben
1998–1999).
In 1986, L-soft International, Inc. launched the first version of LISTSERV, its
software for managing email distribution lists. It has since become the most widely
used software for maintaining various kinds of automatized email distribution. Be-
cause of this widespread use, the term “listserv” is sometimes used as a cover term
for all kinds of software-supported, public mailing lists, although other products
for managing mailing lists like Majordomo, Procmail, and LISTPROC are also
available. A listserv automatically distributes emails that are sent by one sub-
scriber to all other subscribers of a list. The software also archives postings in an
online searchable database. In order to become a member of a mailing list, pros-
pective subscribers must send an email containing a subscription command to the
server running the listserv software. Their email address is then either automati-
cally included in the distribution list (in the case of public lists) or is manually
added to the list by the list owner (in the case of private lists). Mailing lists are set
up for communication among geographically dispersed persons who are interested
in specialized topics. For this reason, mailing lists have been widely used in vari-
ous academic disciplines, in professional contexts, and in distance education.
Communication on mailing lists may be either moderated or unmoderated. In
the case of moderated lists, a moderator – often the list owner – monitors all in-
coming emails (often supported by specific software which is set up to detect cer-
tain keywords in the mails) and selects those which do not conform to certain stan-
dards of the list (in terms of theme, tone, etc.) and suppresses their further
distribution. All other incoming mails are then distributed to the subscribers of the
list. In the case of unmoderated lists, all incoming mails are automatically dis-
tributed to all subscribers. Messages are distributed in ASCII2 text format by older
versions of the program; newer versions also allow the distribution of messages in
HTML3 format.
Mailing lists differ from newsgroups in several respects. Newsgroups were
originally set up for n:n email message distribution on Usenet, which was created
in 1979 by graduate students at Duke University and the University of North Ca-
rolina and went online in 1980. Originally, it provided a network for users who had

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 57

access to Unix systems and who could not connect to the ARPANET for technical
reasons (Hauben 2000). Unlike mailing list software, which runs on a single server,
newsgroups are maintained on clusters of servers which exchange incoming mess-
ages and which are hosted by Internet service providers (ISPs). Until 1995, users
who wanted to become newsgroup members needed an ISP to access Usenet
groups or other newsgroups,4 along with newsreader software. In 1995, Dejanews
(which in 2001 was bought by Google) bought Usenet; since then Usenet groups
are available on the web and can be accessed via standard web browsers (and re-
semble web forums; see section 8 below).
In most newsreaders, newsgroup messages appear organized by “threads”,
which are tree-like structures connecting an initiating message and all follow-up
messages (answers). Threads thus provide a visual representation of the thematic
and interactional relations between messages. In contrast, mailing list messages
appear in the inboxes of subscribers’ email programs, and although their topical
coherence is organized by subject headers, the relation between messages on a cer-
tain topic is not visually represented.
Furthermore, in most cases newsgroups do not have administrators (and are
therefore unmoderated). Newsgroups exist on a vast variety of themes/interests,
and users often participate for recreational purposes; hence the social contexts of
use differ between mailing lists and newsgroups, although there are also news-
groups on academic/scientific topics. Since newsgroups do not have any threshold
of access (see below), they tend not to be considered serious discussion forums by
most professionals in the disciplines.
Mailing list communication is an asynchronous “many-to-many” mode of
communication which is email based. Email communication, however, cannot be
viewed as a single “genre” (or communicative mode); rather, it is a form of com-
munication, and mailing list communication is one of its sub-forms (or a media
class, in the terms of December 1996). Forms of communication (as opposed to
communicative modes, channels, or genres) are defined by characteristic combi-
nations of communicative possibilities in three general dimensions: (a) the specific
sign types (e.g., spoken vs. written) they can process; (b) the direction of com-
munication they permit; (c) the possibilities of transmission or storage of data they
allow (for details of the concept of communicative forms, see Holly 1997; for a
detailed characterization of various forms of communication in the new media, see
Gruber 2008). The characteristic combinations of the relevant variables for mail-
ing list communication are shown in Table 1:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
58 Helmut Gruber

Table 1. Relevant communicative features of mailing list communication

Communicative dimensions: Characteristic features of mailing list


communication:
conceptual mode of communication conceptual literacy + conceptual orality
(cf. Koch and Oesterreicher 1994)5
communicative modality available primarily textual (HTML format possible
under certain conditions)
primary communicative function polylogue
n of communication partners n:n
threshold of access medium (public lists); high (private lists)
explicit hierarchy between low (unmoderated lists); medium/high
communication partners (moderated lists)
topical limitations discussion topics limited to overall list topic
degree of persistence high
mode of interaction asynchronous

Many of the above features are determined by technological affordances of the dis-
tribution software and other hardware and software components that are involved
in the production and dissemination of email messages on distribution lists. These
features, however, also have wider consequences regarding the social contexts in
which mailing list communication is used and with regard to which groups of users
mainly use this communicative form. Thus technology, communicative features,
contexts of use, and characteristics of user groups are intertwined, and investi-
gations of mailing list communication are therefore always investigations of com-
municative practices under a pragmatic perspective. For this reason, before pro-
ceeding to an overview of the relevant literature on mailing list communication, a
short definition of how “pragmatics” is understood for the purposes of this chapter
is provided.

3. Defining pragmatics

This section provides a working definition of pragmatics as it is understood in this


chapter. I adopt a view of pragmatics “as a functional perspective on (any aspect
of) language” (Verschueren, Östman, and Blommaert 1995: 13, emphasis re-
moved). This view entails that language is studied under the perspective of its use
for generating meaning, i.e., that all levels of language and all linguistic phenom-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 59

ena under consideration are investigated by taking into account relevant features of
the contexts in which they occur and how these factors contribute to meaning-mak-
ing practices of interlocutors. This conception of pragmatics views language users
as making continuous communicative choices among available options. Language
users are thus flexible in both constructing and interpreting utterances, but the
probability of making certain choices is systematically skewed according to con-
textual features. This view entails that communicative choices are neither fixed op-
tions nor are they irrevocably tied to certain contexts: As contexts change, com-
municative choices also change and adapt. Patterns of language use, of course, also
contribute to the creation of contexts, thus the relations between language use and
the contexts of its use are dynamic and dialectical (for a more detailed outline of
this conception of pragmatics, see Verschueren 1999; Verschueren, Östman, and
Blommaert 1995).
For the present chapter, this conception of pragmatics has the advantage that all
linguistic features of mailing list communication which have been investigated so
far can be systematically related to technological and social characteristics of the
contexts of their use for meaning-making practices (provided that the relevant de-
tails are given in the respective studies). Levels of linguistic description and fea-
tures of context provide a conceptual grid for the organization of the rest of this
chapter: I start with investigations of the word/morpheme level and the question of
language use in mailing list communication (register and language choices), and
then proceed to investigations of features of discourse organisation (interactional
coherence). Subsequently, I turn to the level of generic structures, and finally I ad-
dress interactive norms and practices of mailing list communication.

4. Register features and language choice in mailing list communication

In the early days of CMD research, the term “email communication” often served
as a cover term for all kinds of messages transmitted via computer connections that
receivers found in the inbox of their email programs. In most cases, however, these
early investigations of “email communication” were based on corpora of listserv or
bulletin board communications,6 as this kind of data was easily accessible for com-
munication, and language scholars were most often university based and therefore
themselves taking part in these early forms of CMD.
The first discourse feature that attracted the interest of language scholars was
the obvious “sloppiness” of many emails. In one of the first empirical investigations
of a corpus of email and chat messages, Maynor (1994) showed that her data dis-
played features of spoken as well as of written language. They frequently lacked
subject pronouns, copula verbs, and articles, and showed a high frequency of ab-
breviations, contractions, and lexical peculiarities. Maynor dubbed these features
“e-style”, implicating that they would characterise all kinds of CMD. In a study of

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
60 Helmut Gruber

postings to two scholarly discussion lists, however, Herring (1996b) found that
message characteristics varied with gender of discussion participants, i.e., that
male and female list subscribers used different message forms.
The hybrid mode characteristic of email language seems to be one of the most ro-
bust findings in CMD research. Linguistic features associated with the character-
istics of spoken language include the use of 1st and 3rd person pronouns, discourse
particles, modal elements, hedges (Du Bartell 1995; Gruber 1997a, 2000a; Uhlirova
1994; Yates 1996), and the number of prepositional phrases that are used (Gruber
1997a). The written language characteristics of email communication include a high
type/token ratio and high lexical density, a high proportion of subordinate clauses,
and a lower number of coordinated clauses (Gruber 1997a; Yates 1996).
In a study of messages from an international BBS, Collot and Belmore (1996)
also found that their text corpus combined features of written and spoken language
in terms of Biber’s (1988) register model. Danet (1997) discussed the “orality”
of different communicative genres in written CMD and the wider cultural impli-
cations of the change from printing to digital culture.
Although almost all of these early studies investigated formal, grammatical
features of public email communications and focused neither on the interactional
dimension of CMD nor on the specific interactional practices that asynchronous
public email communication facilitates, all of the authors interpreted their results
within a functional and hence pragmatic perspective: The hybrid mixture of spoken
and written language features in public email messages was seen as a result of the
special contextual and situational frame of CMD. These pragmatically relevant
situational features include the absence of paralinguistic and prosodic features of
language; a lack of direct contact among discussants; the informality of the ex-
change situation, as well as the participants’ shared background knowledge; their
common interest in discussing certain topics; and their awareness of the public na-
ture of the communication situation.
A second formal feature of public email communication that was investigated
results from the above-mentioned limitations of the ASCII character set used for
composing messages. Email users overcame these shortcomings very quickly in a
rather creative way. In an email message posted on 19 September 1982 (11:44) to
Carnegie Mellon Universities’ computer science general board, Scott Fahlman
proposed to use two “emoticons” – combinations of ASCII characters, namely :-)
and :-( – to convey meta-communicative meanings (“joking” and “non-joking”
speaker intentions, respectively) in email messages (Fahlman n.d.-a, n.d.-b). Soon,
the use of these emoticons spread to the ARPANET and Usenet, and many new
emoticons have been invented since then (Argyle and Shields 1996; Baym 1995).
Although most modern email programs allow users to produce emails in HTML
format (and thus offer much richer design opportunities), ASCII emoticons are still
used for conveying meta-communicative meanings (Dresner and Herring 2010),
even in non-email texts.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 61

Another method of conveying non-verbal meanings in this relatively cue-less


medium is the use of abbreviations (which are often written in uppercase or be-
tween brackets – e.g., LOL (or lol) for ‘laughing out loud’; Argyle and Shields
1996: 195). Emoticons and abbreviations serve to compensate for those communi-
cation channels that are lacking in asynchronous email communication: gaze,
pitch, tone of voice, etc. Interestingly, English interpersonal meta-communicative
abbreviations seem to be used more often than German ones, at least in public Ger-
man email (Günter and Wyss 1996).
The use of both emoticons and abbreviations has been interpreted in pragmatic
terms as a way of communicating interpersonal meanings that are difficult to con-
vey otherwise in this form of communication. Furthermore, they serve to create
and maintain a sense of community among email discussants, who often do not
know each other personally (Baym 1995). The use of English abbreviations in Ger-
man email communication has also been viewed as a form of “in-group communi-
cation”, indicating that its users intend to create the impression of being seasoned
computer (and Internet) users (Haase, Huber, Krumeich, and Rehm 1997).
Another identity-related use of ASCII graphics is found in the so-called “sig-
nature files” that many users create for the automatic generation of the last part of
their email messages, i.e., the signature. Signature files are stored and automati-
cally added to outgoing mails by email programs. They can contain greeting for-
mulas, the sender’s name and address, and any other information he/she wants to
convey with every message. In the newsgroup and bulletin board communication
of the 1990s, signature files were often used for impression management and self-
presentation purposes. To fulfil this interpersonal function, many users added slog-
ans and elaborate ASCII graphics to their signature files (Wilkins 1991). Many
netiquette guides (see below), however, proscribed the use of voluminous (and
thus bandwidth wasting) signature files. Additionally, the increased use of HTML-
capable mail clients allows users to integrate “business cards” into their emails,
which make the use of signature files superfluous. The rise and fall of the popular-
ity of signature files thus illustrates an instance of a small scale diachronic change
in a discursive practice that is influenced by various pragmatic factors: on the one
hand, the need of users to convey (within the limited range of possibilities of the
ASCII code) an expression of their personal identity with each of their messages
and, on the other hand, the technical impact that the widespread use of elaborate
signature files had (at least at a certain stage of the development of access technol-
ogy for Internet users). The improved functionality of email clients, which allowed
signature files to be replaced by other kinds of identity markers, as well as the les-
sened bandwidth constraints brought about by the widespread use of broadband In-
ternet access, both contributed to solve this tension between users’ interpersonal
needs and technical limitations of the medium.
Although the investigation of register features of public email communication
was conducted from a sociolinguistic perspective from the beginning, investi-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
62 Helmut Gruber

gations of language choice in public email discussion started much later. One of the
reasons for this might be that in the 1980s through the mid-1990s, the Internet was
perceived as an English-speaking medium. This was especially notable in listserv
discussion groups that were set up in academic contexts for international groups of
scholars who shared an interest in certain topics and who also shared one language,
in most cases English.
One of the first investigations of language choice in public email discussions
was Paolillo’s (1996) study of the use of English and Punjabi in a Usenet news-
group for expatriate Punjabis. Paolillo’s results showed that although the news-
group was set up for communication among Punjabis, the Punjabi language was
used only rarely, while the use of English prevailed. Paolillo discussed four factors
which in his view might be responsible for this: 1) Intergenerational language shift
is responsible for a limited language competence in second generation Punjabis
who live in English speaking countries and who might be (or at least feel) excluded
if Punjabi were to be predominantly used in the newsgroup; 2) cultural ambiva-
lence partly results from this first factor, as many expatriates feel that they can only
preserve their culture in an English-speaking world if their cultural values are
transmitted in English to second- and third-generation group members (i.e., the
language that these persons speak in most situations of their lives); 3) the prestige
status of English in South Asia as a macro-sociological influencing factor is prob-
ably relevant in many post-colonial multilingual countries and/or communities in
which English is the lingua franca of an educated elite (see below). While the in-
fluence of Usenet language norms (Paolillo’s fourth influencing factor) has prob-
ably changed since Paolillo conducted his study, it surely holds true that a domi-
nating language (and culture) will influence language choice in discussion groups
that are established for minority members.
In a study of language choice of young professional Egyptian Internet users,
Warschauer, Said, and Zohry (2002) reported results that resemble Paolillo’s in
some respects. Among the subjects of their study, English was also the predomi-
nantly used language in asynchronous and synchronous CMD, although all sub-
jects were native speakers of Egyptian Arabic (and also fluent in Classical
Arabic). On the one hand, the authors explain this result with reference to the
business environment of the young professionals, who almost exclusively worked
in software- or hardware-related businesses in which English was the established
language of communication. On the other hand, the authors also mention that (at
least at the time when the study was conducted) Arabic script was not available
for the programs the subjects used for Internet communication. Thus, when they
wanted to communicate in Egyptian Arabic, they had to write Arabic in Roman
script, which is rarely done in other contexts. A third influencing factor which –
according to the authors – was responsible for language choice in this context is
the prestige of English as the language of an educated, non-Islamist elite in
Egypt. This factor is reminiscent of Paolillo’s argument that the prestige status

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 63

of English in South Asia was an influencing factor for language choice in his
study.
In the context of multilingual Switzerland, Durham (2003) investigated lan-
guage choice on a mailing list for Swiss medical students over a period of three
years. Subscribers to the list came from three linguistic backgrounds (which also
represent three of the four Swiss national languages): Swiss-German, French, and
Italian. Durham’s results show a shift towards the dominant use of English during
the research period. Although French was used mostly at the beginning (as most of
the initial subscribers came from the Geneva area where French is the dominant
language), list communication switched mainly to English after about six months,
even though English was not the mother tongue of any group of list subscribers.
Durham attributes this shift to two main reasons. (1) Sometime after the list had
been established, it was joined by a group of Italian speakers who had difficulties
communicating in both German and French. Using English put everybody in the
group at an equal disadvantage, but it also ensured that everybody would under-
stand messages without requiring additional translations (as was the case with all
three other languages). (2) English is a high prestige language in Switzerland, es-
pecially in educational and business settings, where many international Swiss busi-
nesses have switched to English as their company language.
The studies reviewed in this section show that a variety of pragmatic factors in-
fluences language characteristics of mailing list communication, as well as the
choice of language in mixed language groups. While features of the communication
technology (the lack of visual, paralinguistic, and non-verbal cues) and of the com-
municative setting (shared background knowledge, theme-centred discussions) are
responsible for register characteristics of mailing list communication, language
choice is influenced by local factors such as the availability of certain scripts in
email software, as well as by factors such as social identities, mutual intelligibility,
and language prestige. While these latter factors often result in the choice of Eng-
lish as the lingua franca in multilingual discussion groups, this does not necessarily
imply that linguistic imperialism is at work in all these cases. Empirical evidence
from other multilingual settings (such as the states of the former Soviet Union,
where Russian was the lingua franca for almost 50 years) would be needed in order
to arrive at a closer understanding of the pragmatics of language choice in such set-
tings. Furthermore, both register features and language choice contribute to the
pragmatics of interpersonal meaning making in mailing list communication.

5. Creating and maintaining discourse coherence

Having reviewed studies of pragmatic factors influencing the choice of linguistic


features in monolingual exchanges and language choice in multilingual discussion
groups, I turn now to the pragmatics of discourse organisation in public multiparty

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
64 Helmut Gruber

CMD. As Herring (1999) notes, there are two basic problems of interactional co-
herence in asynchronous (as well as in synchronous) CMD: (1) the lack of back-
channel signals, which is caused by the reduced audio-visual cues and the impossi-
bility of message overlap, and (2) disrupted turn adjacency, which is caused by the
fact that messages appear in the order in which they are received and distributed by
the listserv. One of the only ways of establishing topical coherence is thus the use
of the same topic words in the message headers of a discussion.
Two problems (on a more theoretical level) with the organisational features of
CMD have less often been discussed, namely (1) whether we are justified in using
the metaphor of “discussion” for mailing list exchanges and (2) whether theoretical
frameworks that were developed for modelling face-to-face interaction are ad-
equate for the analysis of mailing list “discussions”, or if we need an alternative
(or at least modified) framework. In the following, I review studies that deal with
several aspects of the interactional organisation of mailing list exchanges from a
pragmatic perspective. In closing, I deal briefly with the latter-mentioned theoreti-
cal problems and ask whether the conceptual frameworks of conversation analysis
and discourse analysis that have been used to analyse mailing list communication
so far in fact provide appropriate conceptual and analytical tools for analysing
these interactions.
A first and basic problem of discourse organisation in mailing list interactions
is the question of what constitutes a turn (in conversation analytic terms) or a move
(in Sinclair and Coulthard’s discourse analytic terms) in a multiparty email ex-
change (Severinson-Eklundh 2010). As some authors (Gruber 1998; Harrison
1998; Herring 1999) have noticed, reactive contributions to email discussions
often refer to more than one previous message, and discussion-initiating postings
also often pose more than one question to stimulate further discussion (Gruber
1998). Thus, many mailing list contributions consist of several moves or speech
acts, because in asynchronous CMD the right to “speak” is not contested, i.e., any
participant can post as many messages as he/she wants (a similar point is made by
Condon and Čech 2001 with regard to synchronous CMD). Mailing list contri-
butions therefore often show characteristics of speech-act-chains (“Sprechhand-
lungsverkettungen”, Ehlich and Rehbein 1986), which in traditional interactions
characterise written monologue texts. Under a conversation analytic perspective,
these multi-move contributions – although they often contain explicit next-speaker
selections (Gousseva 1998; Gruber 1998) – may be viewed as offering several tran-
sition relevance places, since every question in a multi-question contribution can
be (and often is) interpreted as an invitation for an answer to this single question
only, as the following extract from a lengthy posting to the LINGUIST list shows
(author details omitted):

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 65

Example 1.
Date: Thu, 10 Aug 1995 10:21:41–0500
Reply-To: The Linguist List <[log in to unmask]>
Sender: The LINGUIST Discussion List <[log in to unmask]>
From: The Linguist List <[log in to unmask]>
Subject: 6.1070, Disc: Sex/Lang, Re: 1023
[…]
I have three questions, each of which I provide some of my own
views about.
1) What are some of the parameters of and who (authors) do you
look to for your idea that all history has been male dominated?
[…]
2) Where does your concept of linguistic markedness come from,
and on what basis do you establish a cause-effect relationship
between patriarchy and markedness in pronouns? […]
3) Finally, you propose that in all past history they’ve had
“no concept of sex equality”. […] If we take into account
considerations of class, age, history, geography, etc., I
would argue that on a DE FACTO level, women have had, and
continue to have, COLLECTIVELY, an advantage over men. I know
that saying so will upset a few of us, even give some of us a
little gas and heartburn, my being the direct precipitation of
which I apologize for in advance.
[…]

Each of these questions could (but, in fact, did not) receive an answer, and thus
three adjacency pairs could have been established, each of which would have con-
tributed to the interactional coherence in the LINGUIST list discussion on “Sex/
Lang”. Thus, the excerpt in example 1 above consists of three possible (or virtual)
turns which could be turned into actual turns by subsequent answers. This example
also shows that the conversation analytic concept of conditional relevance seems
to be operative only in a very limited sense in asynchronous multiparty ex-
changes, in which many “dead-end” contributions occur (see Gruber 1997b; Her-
ring 2010; Joyce and Kraut 2006).
So far, I have discussed the properties of first pair parts of (virtual) adjacency
pairs in mailing list discussion; in the following, I discuss the properties of second
pair parts or reactive contributions. Like first pair parts (or initiating moves), reac-
tive contributions in mailing list discussions may (and often do) consist of reac-
tions to a variety of previous contributions (Gruber 1998; Wilkins 1991), as the
extract in example 2 (again from the LINGUIST list discussion on “Sex/Lang”)
shows (author references removed):

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
66 Helmut Gruber

Example 2.
Date: Sat, 12 Aug 1995 12:59:37 EDT
From: [log in to unmask]
Subject: Disc: Sex/Lang, Re: 1079
Subject: Re: Disc: Sex/Lang
A writes:
<<<
In our focus on the epicene pronoun that doubles as the
masculine pronoun, and the generic noun (e.g. Man) that doubles
as the masculine form, we sometimes let logic, and the theory
of markedness, overwhelm psychology. The evidence, I believe,
strongly supports the claim that even in clearly non-specific
contexts these items trigger masculine prototypes in
receivers.
>>>
I agree with this generally for the present state of standard
English. […]
B writes
<<<
Question raised in answer to C who writes:
>SO what it all boils down to, again, is that I maintain that
>it makes no sense whatever to discuss the origin of the
>epicene he phenomenon in the context of the story of
>English prescriptive grammar, but only in the context of
>the way in which perceptions of sex roles have informed
>the structure of language (as of any other institution).
Have perceptions of sex roles informed us on the structure of
language, or does the structure of language enlighten us on
socially acquired yet still subconscious sexist behavior of
today’s Homo Sapiens? B/
[Affiliation details of B]
>>>
The “contructivist” view of sexuality is widely held in
academia, but the view has the hauteur of an “in” religious
tenet, and has no well-reasoned position, and only endures
because its opposite can’t “really” be “proved”. […]

In example 2, the author of the actual contribution refers to two previous postings
(contributed by A and B) by providing the exact quotations on which he comments
in his own posting. In terms of interactional coherence, this example shows that
mailing list discussions do not progress in a linear way (neither in time nor in any

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 67

kind of “space”) but rather establish multi-dimensional networks in which single


contributions function as nodes that can be connected to several other messages.
The conversation analytic concept of adjacency pair may nonetheless be useful in
capturing properties of interactional coherence in these discussions, but it may be
necessary to separate the dimension of “adjacency” from the dimension of “linear-
ity” of interactional progression that is inherent in the concept of “adjacency”
when applied to face-to-face interaction (see also Condon and Čech 2001). A
single contribution in a mailing list discussion may thus be part of several adja-
cency pairs, and every reactive contribution shows the (pragmatic) principles of
co-construction of interactional meanings and of the next-turn-proof-procedures at
work, albeit in a “multi-dimensional” way. Viewed from a pragmatic perspective,
these phenomena show that participants in mailing list discussions transfer inter-
actional practices from face-to-face situations to the new interactional settings of
CMD and creatively adapt to these new conditions.
The multi-dimensional adjacency of mailing list contributions also requires
contributors to make connections between messages rather explicit. Example 2
shows the most common way of explicit inter-message linking, namely the inser-
tion of a verbatim quote from a previous message into the actual message, which is
called “quoting” (Severinson-Eklundh 2010). Quoting as a means of establishing
interactional coherence has been observed in several investigations of mailing list
discussions (Gousseva 1998; Gruber 1997b, 1998; Harrison 1998; Herring 1996b).
Quoting is facilitated by email programs that offer to automatically include and
edit the messages that the user refers to in his or her actual posting. Automatically
generated quotes most often have the form of “author name + metapragmatic verb
+ quote”.
Instances of multiple back reference (as in example 2), however, require users
to manually copy and paste those portions of the previous messages to which they
refer into their current contribution. In example 2, the author encloses each quote
he is commenting on in a series of three opening and closing angle brackets. This is
not the automatic, software facilitated way of marking quotes; it was obviously in-
serted manually by the author (just like the quotations he is referring to).
The second quote in example 2, in contrast, shows the usual way of marking
quotes with a closing angle bracket at the beginning of each quoted line. This sec-
ond quote also shows an instance of an embedded quotation – the quoted portion of
the previous message partly consists of a quote itself. Mailing list discussion con-
tributions, thus, often show instances of multiple embedding (quoting), in the
sense that quotes again contain quotes, enabling contributors to create subtle webs
of multiply voiced back-references (Severinson-Eklundh 2010).
Quoting is not the only means of establishing interactional coherence in mail-
ing list discussions. Indirect quotations, paraphrasing of previous messages, recyc-
ling of words and/or phrases from previous messages, mentioning of the discussion
topic, or simply mentioning a previous posting are also used as coherence estab-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
68 Helmut Gruber

lishing devices by contributors (Gousseva 1998; Gruber 1997b; Wilkins 1991).


These devices, however, are weaker in signaling connections to previous messages
and therefore are often accompanied by the mentioning of the name of the author
of the previous posting.
The studies reviewed in this section have shown that specific features of the
communication technology in mailing list discussions pose some pragmatic
problems for establishing interactional coherence (and thus textual meaning
making) in the traditional sense of face-to-face interaction. The review has also
shown that email programs facilitate different ways of establishing coherence
across messages, as well as enabling users to create forms of coherence that
differ from face-to-face interactions. At the same time, the reviewed studies also
show that email users creatively cope with the technical limitations and that they
exploit the resources provided by software programs and the interactive practices
they are familiar with from their everyday face-to-face interactions. Thus, two
kinds of pragmatic factors (software affordances and users’ communicative cre-
ativity) influence the creation of coherence among contributions to mailing lists.
On a theoretical level, the discussion suggests that concepts developed for the
analysis of face-to-face interactions are not fully capable of accounting for the spe-
cific communication characteristics of CMD. Comprehensive theoretical accounts
of, and theoretical concepts for, the analysis of the interactional dynamics of CMD
are still lacking.

6. Genre(s) of listserv CMD

As discussed in section 4, in the early days of CMD research, language features of


mailing list communication were investigated and described as if email discussion
contributions realised a single genre and belonged to a single register or style. This
view of a “language of the Internet” that could be characterised by a common set of
linguistic features is still present in some current accounts of CMD (e.g., Crystal
2001), but it has been criticised as superficial and too generalising (e.g., Androut-
sopoulos 2006; Herring 2007). Later approaches to analysing and classifying types
of CMD relied mainly on features of the communication technology used to gen-
erate, transmit, and store messages. Correspondingly, they differentiated among
chat, email, and MUDs and MOOs, and tried to describe their linguistic common-
alities and differences (e.g., Cherny 1999; Schmidt 2000; Werry 1996). From a
pragmatic perspective, these studies could be said to apply a “techno-pragmatic”
perspective, as the only pragmatic factor they take into account is technology-re-
lated, whereas other pragmatic factors like the communicative purpose of mess-
ages or writers’ intentions are not considered.
One of the first investigations of asynchronous CMD in which the concept of
“genre” was used is an article by Günter and Wyss (1996) in which email texts

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 69

were characterised as a “letter-genre”. The authors base their argument on the


overall textual structure (“addressing of receiver – body of text – saying good
bye”) of emails. That this generic characterisation is too general becomes immedi-
ately clear, however, when Günter and Wyss continue their article by sub-classify-
ing their data into various (traditional) subgenres like “letters of information”,
“New Year’s greetings”, “wedding announcements”, etc. Additionally, Günter and
Wyss’s generic classification does not mention the specific textual and interac-
tional properties of email communication such as quoting (see section 5).
A global generic description of listserv email texts is proposed by Herring
(1996b), who describes three consecutive phases in such texts:
1. link to previous discourse
2. contentful message
3. link to following discourse (Herring 1996b: 84)
Compared to Günter and Wyss’s description, Herring’s account captures the “dia-
logical” properties of mailing list contributions more aptly. But “genres” are not
only configurations of discourse features – a comprehensive approach to “genre”
has to account for their available semiotic resources and the interactional and con-
textual dimensions that contribute to their emergence, temporal stabilisation, and
dynamic adaptation to new contexts (for a detailed account of current genre the-
ories, see Muntigl and Gruber 2005).
In an attempt to provide a generic description of postings to two academic dis-
cussion lists, Gruber (2000b) compared a corpus of discussion list contributions to
a small corpus of contributions to the “discussion” section of a scholarly journal
and to academic book reviews. He investigated pragmatic features such as com-
municative purposes, mode, and threshold of participation in the discussions, as
well as textual features, especially the choice of “theme” and “process types” in the
sense of Systemic Functional Linguistics (cf. Halliday 1994; Martin 1992). His re-
sults reveal an “interdiscursive network” of genres in which linguistic, contextual,
and technological features contribute to characterise individual genres. His results
also show the interrelations among genres through the partial overlap of generic
features in “traditional” and email genres. Discussion list contributions can thus be
viewed as an emergent genre which combines genre conventions of existing aca-
demic genres with new, technologically facilitated modes of text production and
with conventions of different semiotic modes. Furthermore, discussion listcon-
tributions do not represent a single, stable genre, but can be divided into sub-genres
according to the discussion list to which they were posted (i.e., the postings reflect
specific features of the respective “list cultures”, see section 7). In order to provide
a fuller picture of the various genres used on discussion lists, their connections to
existing genres, and their developmental dynamics, additional comprehensive
studies would be needed (an example of an investigation along this line in the area
of hypertext document genres is provided by Bateman 2008).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
70 Helmut Gruber

Herring (2007) argues for using flexible classification grids (“faceted classifi-
cation schemes”) which combine feature sets that capture different technological
and social aspects of CMD together with “mode”-based classifications in order to
arrive at a flexible categorization of different kinds of CMD. From a linguistic
pragmatic perspective, this classification scheme can be viewed as a complement
to studies of generic features of CMD and mailing list communication respectively,
as the features Herring proposes provide a valuable conceptual matrix for classify-
ing relevant pragmatic factors that could in turn be accompanied by an investi-
gation of the discursive features of certain message types. The obvious hybridity of
mailing list genres, as well as their connection to certain groups of users (“online
communities”; see below), seems to indicate that the pragmatics of mailing list
genres contributes to interpersonal as well as to textual meaning-making processes.
In general, although existing research seems to indicate that different mailing
list communities develop group-specific variants of the discussion-list-posting
genre, which vary in accordance with pragmatic factors such as familiarity with
communication technology and narrow vs. wide scope of legitimate discussion
topics, there is a need for further linguistic pragmatic studies in this area.

7. Interactive norms and practices of mailing list CMD – the question of


“online community formation”

Discussion groups have often been established in professional and educational


contexts to enable geographically-dispersed groups of users to interact in order to
solve common tasks or to provide each other with professional support. In this
pragmatically-relevant aspect, mailing lists differ markedly from newsgroups,
which are often used for recreational purposes (Baym 1995). One question that
arises in this context, however, is whether the members of these groups develop a
sense of community during their interaction history, or whether they simply remain
a group of people who use a certain communication tool for interaction (Herring
2004).
From the early days of Internet communication research, many authors have
used the term “virtual community” to refer to these groups. But as Herring (2004)
points out, in many publications the term has been overused to the point where it
has become meaningless, as it may denote any group of persons who communicate
via the Internet for a certain time. Herring (2004) therefore proposes using the term
“online community” in a stricter way and also suggests using pragmatically-
informed discourse analysis as a methodological tool to investigate online commu-
nities, because one of the main features of these communities is that communi-
cation is their major (in many cases the only) means of community formation.
According to Herring (2004: 356), the following six criteria characterise a virtual
community:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 71

1. Steady participation over a defined time interval and the possibility to identify
core participants;
2. A shared history of the group, which leads to a group culture that can be ident-
ified through the investigation of group jargon, abbreviations, etc., and through
the emergence of group norms;
3. The display of group solidarity among community members through various
communicative practices;
4. Group-specific patterns of conflict and communicative conflict resolution;
5. A group’s display of self-awareness;
6. Evidence of roles and hierarchies in a group, which also relates to participation
patterns and norms.

In an illustrative analysis, Herring (2004) shows the degrees to which two online
discussion groups display characteristics of virtual communities in the above sense
and how pragmatic computer-mediated discourse analysis (CMDA) can be used to
identify these relevant characteristics.
Various other studies have investigated some of the above features in order to
address the question of community formation in discussion groups. Gruber (1998)
developed a “reciprocity” measure that allows for computing the perceived rel-
evance of list postings in order to differentiate between subscribers who post many
contributions but receive only a few reactions and those whose postings have a
high relevance for a discussion. This quantitative measure provides a differentiated
view of group roles, hierarchies, and participation patterns.
The importance of a moderator and of core members of a discussion group for
establishing and continuing interaction and becoming a community is pointed out
by Fayard and DeSanctis (2005). Cubbison (1999) discusses how list owners can
influence various aspects of group structure and community formation by choosing
specific configurations of listserv software settings. Although Cubbison’s article is
not linguistically oriented, her paper is interesting in the current context, as it
shows how software settings which, in most cases, are invisible to subscribers, set
a technological – yet pragmatically relevant – frame for communicative practices
and thus for the possibilities of community formation.
The emergence of group norms was investigated as early as the mid-1990s
when McLaughlin, Osborne, and Smith (1995) inductively arrived at a “taxonomy
of reproachable conduct on Usenet”. The taxonomy was based on the analysis of a
corpus of messages from various Usenet groups in which other users of the respect-
ive groups were criticised. McLaughlin, Osborne, and Smith grouped their data
into seven categories that, in many respects, resemble the norms for CMC com-
munication later formulated in many “netiquette” guides. In a qualitative study,
Johnson-Eiola and Selber (1996) investigated one discussion group’s emerging
definitions of an appropriate discussion topic. They concluded that a topic’s appro-
priateness on this list was defined in a framework that combined personal/profes-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
72 Helmut Gruber

sional interests of users and power relations in the workplace settings in which the
contributors were located. Topics that were collectively considered as inappro-
priate for the list were taken to other discussion forums. This marginalisation of
(potentially threatening) topics represented – according to the authors – a techno-
logically facilitated way of fragmenting a community into a majority who – by
means of a “democratic majority vote” – forced “dissidents” to leave the commu-
nity instead of dealing with potentially explosive topics. These studies of the
emergence of groups norms (and of exclusion practices) in discussion groups are
interesting insofar as they challenge the widely-held view of Internet communities
as “egalitarian” groups in which each member has equal rights.
Conflict communication in discussion groups has often been investigated in
terms of “flaming”. “Flaming” was one of the first communicative practices to be
observed and described in newsgroup (but also in discussion list) interaction (Kim
and Raja 1991). The term “flaming” covers all forms of communicative behaviour
in CMC through which discussants confront others in rude and hostile ways (Lea et
al. 1992). For some scholars, the cause of flaming is the “reduced cues” character-
istic of CMC (Kiesler, Siegel, and McGuire 1984). They claim that it is easier to be
rude to one’s interlocutor if one cannot see or hear him/her or, as in most cases, if
one does not even personally know him/her. Herring (1996a, 1996b), however,
claims that flaming is a typical male discussion list behaviour; she found women in
general to be more supportive of others. Depending on the gender majority of list
subscribers, discussion lists “exhibit an overall aligned or opposed orientation”
(Herring 1996a: 104). This finding also shows that discussion groups are commu-
nities whose values are established/influenced by the majority of group members.
Furthermore, Herring’s results caution against a “techno-pragmatic” view of CMD
that would claim that technological affordances of computer-mediated communi-
cation have more influence on communicative practices than users’ characteristics.
Several discursive features of a group’s self awareness were studied by Cassell
and Tversky (2005) in their investigation of the online community formation of
an intercultural, international youth forum that was set up to prepare an inter-
national youth summit in 1998. Their results show that the choice of English as a
common language, the use of personal pronouns (“I” vs. “we”), and the develop-
ment of conversation patterns (from providing information to giving feedback and
responses to each other and planning future activities) reflect the emergence of a
sense of community among the young adolescents. However, as the studied group
was spread over four continents and several cultural areas, there also remained
some characteristics of diversity. Cassell and Tversky’s study and the studies on
language choice in discussion groups (see section 4) show that in multilingual
groups language choice is also an indicator of community formation. As in the
studies reviewed in section 4, Cassell and Tversky found that the young adoles-
cents ultimately communicated exclusively in English in order to speed up com-
munication.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 73

All of the studies reported here show how technical and social pragmatic fea-
tures of mailing list communication can foster community formation among per-
sons who in many cases do not know each other personally and whose only means
of inter-communication is email. It would be interesting, however, to see how per-
sistent these communities are, since mailing list communication is mainly used for
professional and educational purposes, and the resulting communities are only
relevant for their members as long as they belong to their respective professional or
educational fields. This aspect differentiates most mailing list communities from
newsgroups, which are joined by members who share an interest in certain rec-
reational topics. Therefore, newsgroup communities may exist over longer periods
of time (Baym 1995). Additionally, as Lamy and Hampel (2007) in their review of
possible uses of CMC in the language learning classroom point out, there are also
features of (the educational use of) asynchronous CMC that may hamper commu-
nity formation, like the solitariness of users, pressure (exerted by instructors) to
respond, or unnoticed silence (“lurking”7). These factors may lead to the formation
of online communities that exclude certain potential members without this being
noticed by others. Investigations of community formation on discussion lists
should thus take into account a wide range of pragmatic factors such as voluntary
vs. involuntary participation in community activities, intrinsic vs. extrinsic moti-
vations of participants, and other relevant contextual aspects.

8. Closing remarks

In closing, I attempt to connect the several strands of CMD research on pragmatic


aspects of mailing list communication and give an overall interpretation, as well as
sketch some possible directions for future research. As was shown above, mailing
list communication can be viewed as “polylogue” email communication. This has
consequences for two kinds of pragmatic factors that influence its linguistic char-
acteristics: technical factors, on the one hand, and socio-situational factors, on the
other hand.
Additionally, I will focus on the kinds of meanings (ideational, interpersonal,
and textual in the sense of Halliday 1994) that are generated by pragmatic factors.
The specific “polylogic” properties of mailing list communication and the emer-
gence of new communicative purposes and thus also new genres result in the emer-
gence of particular kinds of textual meanings that are established by single mes-
sages as well as by message networks. In this concluding section, I therefore also
discuss which kinds of pragmatic factors contribute to what kind of meaning mak-
ing processes.
In terms of medium characteristics (i.e., various technical features of message
composition, transmission, and storage; see Herring 2007), mailing list communi-
cation practices reflect the limitations and affordances of email programs: In the

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
74 Helmut Gruber

beginning providing only a limited character set for composing messages and in-
itially a purely textual communication channel, email programs now support the
Unicode character set (which allows the use of 90 different scripts) as well as
HTML text, which allows the integration of visual and other non-textual elements
into email messages. Furthermore, listserv technology has increasingly been re-
placed by Internet forums that are integrated into websites and that support full
HTML standards for messaging. Some of the studies reviewed above revealed how
users dealt with the limitations of certain “techno-pragmatic” factors. For example,
the invention and frequent use of “emoticons” in email communication shows
clearly how users overcame the early limitations of email programs by inventing a
set of new symbols (based on the available ASCII character set) that compensated
for the narrowness of the communication channel and allowed users to add a layer
of interpersonal meaning to their messages.
Another relevant techno-pragmatic feature of email (and hence mailing list)
communication is quoting. In contrast to the limiting effects of email communi-
cation, quoting is an “enabling” characteristic that allows users to establish refer-
ences between messages easily. Especially in mailing list communication, quoting
provides a straightforward way of establishing thematic connections between fol-
low-up postings in multiparty discussions and thus contributes to establishing
“textual meanings” that help interlocutors make sense of the foregrounding and
backgrounding of information, as well as of the relevant connections between parts
of a communicative exchange.
In terms of social and situational pragmatic factors (Herring 2007) that are rel-
evant in mailing list communication, the review of studies has shown that mailing
lists are used for many-to-many, public interactions, hence their characterisation
as “polylogue”. Although not all groups that communicate via mailing lists be-
come virtual communities, many of the linguistic characteristics of mailing list
communication can be viewed as corollaries of the group situation. The hybrid
“written-like-spoken” register characteristics as well as the frequent use of acro-
nyms in email communication can be viewed as users’ display of in-group identity
markers. Language use in group discussions also plays a relevant role. As studies
of language choice in multilingual discussion groups have indicated, group
members may choose a common language that puts all discussants on an equal
level of disadvantage (i.e., which is nobody’s mother tongue) or simply because
they want to practise a certain language. Both results can also be viewed as con-
tributing to interpersonal meaning making in mailing list discussions.
Gender of discussion participants has been shown to be a relevant pragmatic
factor that impacts group discussion styles (and hence implicit group norms). Dif-
ferent age groups of participants and their communicative practices in discussions
have so far barely been investigated since, until the late 1990s, Internet communi-
cation was mainly the “playground” for a white middle-class population of edu-
cated males between 20 and 40+ years of age. With CMD now becoming an almost

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 75

ubiquitously available means of communication (at least in developed countries),


both older and less educated persons increasingly participate in CMD, and their
communicative practices constitute an interesting topic for further investigation.
The emergence of genres of mailing list communication is an area of research
where socio-pragmatic factors (e.g., communicative purposes of a group, dis-
cussion topics, group norms) and techno-pragmatic factors (e.g., quoting, channel
of communication, asychronicity; Herring 2007) are of equal relevance. Mailing
list genres combine characteristics of “traditional” genres with features enabled
by the technological affordances of the communicative medium and properties
that reflect communicative norms and purposes of user communities. Message se-
quences of mailing list discussions have been shown to exhibit very specific char-
acteristics in terms of interactional coherence that are also related to technological
characteristics (i.e., the email software used for communication). However, the
available research still lacks conceptions of such basic entities as “turn/move”,
“adjacency”, and “sequence” in a way that accounts theoretically for the prag-
matics of CMD. Both genre characteristics and message sequence properties con-
tribute to the textual and interpersonal meanings of mailing list discussions, insofar
as they provide interlocutors with a sense of what constitutes an appropriate post-
ing on a list, what is accomplished with certain messages, and how they are under-
stood by others.
All in all, this discussion shows that the view of pragmatics as a functional per-
spective on language use that investigates interactants’ meaning making practices
is useful, as long as it incorporates a differentiated classification of relevant tech-
nological and social-situational factors of the form of communication under inves-
tigation. The discussion also revealed that technological aspects of message com-
position and transmission and socio-situational factors of users’ communicative
needs provide pragmatic resources from which the discursive characteristics of
mailing list postings derive, i.e., technological factors pose limitations and oppor-
tunities for message production that users creatively appropriate in order to fulfil
their communicative purposes. Further research on mailing list communication
might proceed along this line and inquire, for example, which new discursive fea-
tures result from the possibility of composing messages in HTML format in newer
email programs and in web discussion forums. It will be interesting to see whether
and how the new technological affordances will be used, and especially if aspects
of “design” and “arrangement” become as relevant for mailing list communication
as they are for other forms of multimodal communication (Kress 2010).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
76 Helmut Gruber

Notes

1. There are two possible perspectives on the communication mode of mailing list and Use-
net groups: From the perspective of the single user it is a 1:n mode, as one user sends his/
her message to a group of recipients. Viewed from the group’s perspective, however, the
communicative mode is n:n, as any users can interact with any others.
2. ASCII stands for “American Standard Code for Information Interchange”, a character en-
coding scheme which has been used for coding computer characters since 1960 and
which includes 94 printable and 33 non-printable characters (plus the “invisible” space
character).
3. HTML stands for “Hyper Text Markup Language”, the predominant markup language for
web pages, which allows a structural description of headings, font types, etc. as well as
the integration of images, sounds, etc. in texts.
4. An example of this is fidonet, which still is in use in areas where most computer users ac-
cess the Internet via telephone modems, such as in Russia and other countries of the
former Soviet Union.
5. This dimension draws upon a distinction introduced by Koch and Österreicher (1994),
who assume that the conception of a communicative product as “spoken” or “written” is
independent of its realisation in the oral or written mode. Thus a speech delivered orally
in front of an audience may have been composed in written mode very carefully by the
speaker, having in mind the face-to-face communicative situation of the speech, resulting
in a conceptually oral, i.e., a “written to be spoken” (Gregory and Carroll 1978: 47), text.
The oral delivery of a pronouncement in court, in contrast, is a typical instance of the oral
presentation of a conceptually written text. The conceptually literate pole of communi-
cation is associated with (and establishes) interpersonal distance, whereas the concep-
tually oral pole is associated with (and establishes) closeness between communication
partners.
6. Bulletin boards (BBSs) became popular in the late 1970s and early 1980s. They consisted
of a central server which was connected to several home computers of registered users. In
the early days of computer communication, users connected to the server by telephone
modems and then could upload and download files to and from the server. BBSs were
used for communication among users, exchange of files, and for online gaming. Since the
mid-1990s web forums have largely replaced BBSs.
7. Viewed from the standpoint of those members of an online community who actively par-
ticipate in online discussions, lurking is often seen as undesirable behavior, as lurkers do
not contribute to the ongoing discussions. Form the lurkers’ perspective, however, lurk-
ing is often viewed as a kind of participation, and lurkers may experience a sense of com-
munity with those persons who contribute to online discussions, even if they do not par-
ticipate in the discussions for various reasons (Nonnecke and Preece 2000).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 77

References

Androutsopoulos, Jannis
2006 Introduction: Sociolinguistics and computer-mediated communication. Jour-
nal of Sociolinguistics 10(4): 419–438.
Argyle, Katie and Rob Shields
1996 Is there a body in the net? In: Rob Shields (ed.), Cultures of Internet: Virtual
Spaces, Real Histories, Living Bodies, 58–69. London: Sage.
Bateman, John A.
2008 Multimodality and Genre: A Foundation for the Systematic Analysis of Multi-
modal Documents. Basingstoke, UK: Palgrave.
Baym, Nancy
1995 The emergence of community in computer-mediated communication. In:
Steven G. Jones (ed.), Cybersociety: Computer-Mediated Communication and
Community, 138–164). London: Sage.
Berners-Lee, Tim and Daniel Connolly
1993 Hypertext Markup Language (HTML). Internet Draft.
http://www.w3.org/MarkUp/draft-ietf-iiir-html-01.txt
Biber, Douglas
1988 Variation Across Speech and Writing. Cambridge, UK: Cambridge University
Press.
Cassell, Justine and Dona Tversky
2005 The language of online internet community formation. Journal of Computer-
Mediated Communication 10(2), article 2.
http://jcmc.indiana.edu/vol10/issue2/cassell.html
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford, CA: CSLI
Publications.
Collot, Milena and Nancy Belmore
1996 Electronic Language: A new variety of English. In: Susan C. Herring (ed.),
Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural
Perspectives, 13–29. Amsterdam/Philadelphia: John Benjamins.
Condon, Sherri L. and Claude G. Čech
2001 Profiling turns in interaction: Discourse structure and function. In: Proceed-
ings of the 34th Hawai International Conference on System Science, Vol. 4,
4034–4044. Los Alamitos, CA: IEEE Press.
Crystal, David
2001 Language and the Internet. Cambridge, UK: Cambridge University Press.
Cubbison, Laurie
1999 Configuring LISTSERV, configuring discourse. Computers and Composition:
An International Journal for Teachers of Writing 16: 371–381.
Danet, Brenda
1997 Books, letters, documents. The changing aesthetics of texts in late print cul-
ture. Journal of Material Culture 2: 5–39.
December, John
1996 Units of analysis for internet communication. Journal of Computer-Mediated
Communication 1(4). http://jcmc.indiana.edu/vol1/issue4/december.html

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
78 Helmut Gruber

Dresner, Eli and Herring, Susan C.


2010 Functions of the non-verbal in CMC: Emoticons and illocutionary force. Com-
munication Theory 20: 249–268.
Du Bartell, Deborah
1995 Discourse features of computer-mediated communication: “Spoken-like” and
“written-like”. In: Brita Wårvik, Sanna-Kaisa Tanskanen, and Risto Hiltunen
(eds.), Organization in Discourse: Proceedings from the Turku Conference,
231–239. Turku: University of Turku.
Duchenault, Nicolas and Leon A. Watts
2005 In search of coherence: A review of e-mail research. Human-Computer Inter-
action 20: 11-48.
Durham, Mercedes
2003 Language choice on a Swiss mailing list. Journal of Computer-Mediated Com-
munication 9(1). http://jcmc.indiana.edu/vol9/issue1/durham.html
Ehlich, Konrad and Jochen Rehbein
1986 Vom Problemlösen zum Aufgaben – Stellen – Wie ein Handlungsmuster schul-
tauglich wird. In: Konrad Ehlich and Jochen Rehbein (eds.), Muster und Insti-
tution: Untersuchungen zur schulischen Kommunikation, 8–30. Tübingen:
Narr.
Fahlman, Scott
n.d.-a Original Bboard thread in which :-) was proposed.
http://www.cs.cmu.edu/~sef/Orig-Smiley.htm [accessed September 16, 2012]
Fahlman, Scott
n.d.-b Smiley lore :-). http://www.cs.cmu.edu/~sef/sefSmiley.htm [accessed Septem-
ber 16, 2012]
Fayard, Anne-Laure and Gerardine DeSanctis
2005 Evolution of an online forum for knowledge management professionals: A lan-
guage game analysis. Journal of Computer-Mediated Communication 10(4),
article 2. http://jcmc.indiana.edu/vol10/issue4/fayard.html
Gousseva, Julia
1998 An experience in cyberspace communication: Listserv interaction in a fresh-
man composition class. Linguistik Online 1(1).
http://www.linguistik-online.de/gousseva.htm
Gregory, Michael and Susanne Carroll
1978 Language and Situation: Language Varieties and their Social Contexts. Lon-
don: Routledge & Keegan Paul.
Gruber, Helmut
1997a E-mail discussion lists: A new genre of scholarly communication? Wiener Lin-
guistische Gazette 60–61: 24–43.
Gruber, Helmut
1997b Themenentwicklung in wissenschaftlichen E-mail Diskussionslisten. Ein
Vergleich zwischen einer moderierten und einer nichtmoderierten Liste. In:
Rüdiger Weingarten (ed.), Sprachwandel durch Computer, 105–131. Opladen:
Westdeutscher Verlag.
Gruber, Helmut
1998 Computer-mediated communication and scholarly discourse: Forms of topic-
initiation and thematic development. Pragmatics 8(1): 21–47.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 79

Gruber, Helmut
2000a Scholarly email discussion list postings: A single new genre of academic
communication? In: Lyn Pemberton and Simon Shurville (eds.), Words on
the Web: Computer-Mediated Communication, 36–44. Exeter, UK: Intellect
Books.
Gruber, Helmut
2000b Theme and intertextuality in scholarly e-mail messages. Functions of Lan-
guage 7(1): 79–115.
Gruber, Helmut
2008 Specific genre features of new mass media. In: Ruth Wodak and Veronika
Koller (eds.), Handbook of Communication in the Public Sphere, 363–383.
Berlin: de Gruyter.
Günter, Ulrike and Elisabeth L. Wyss
1996 E-mail Briefe – eine neue Textsorte zwischen Mündlichkeit und Schriftlich-
keit. In: Ernest W. B. Hess-Luttich, Werner Holly, and Ulrich Püschel (eds.),
Textstrukturen im Medienwandel, 61–87. Frankfurt am Main: Lang.
Haase, Martin, Michael Huber, Alexander Krumeich, and Georg Rehm
1997 Internetkommunikation und Sprachwandel. In: Rüdiger Weingarten (ed.),
Sprachwandel durch Computer, 51–86. Opladen: Westdeutscher Verlag.
Halliday, M.A.K.
1994 An Introduction to Functional Grammar, 2nd Ed. London: Edward Arnold.
Harrison, Sandra
1998 E-mail discussions as conversation: Moves and acts in a sample from a listserv
discussion. Linguistik Online 1(1).
http://www.linguistik-online.de/harrison.htm
Hauben, Ronda
1998– ARPANET mailing lists and Usent newsgroups: Creating an open and scien-
1999 tific process for technology development and diffusion. Part I. The Amateur
Computerist 9(1). http://www.ais.org/~jrh/acn/Back_Issues/Back_Issues%
5b1998-2002%5d/ACN9-1.txt
Hauben, Ronda
2000 ARPANET mailing lists and Usenet newsgroups: Creating an open and scien-
tific process for technology development and diffusion. Part III. The Amateur
Computerist 10(1). http://www.ais.org/~jrh/acn/Back_Issues/Back_Issues%
5b1998-2002%5d/ACn10-1.txt
Herring, Susan C.
1996a Posting in a different voice: Gender and ethics in CMC. In: Charles Ess (ed.),
Philosophical Perspectives on Computer-Mediated Communication, 115–147.
Albany, NY: State University of New York Press.
Herring, Susan C.
1996b Two variants of an electronic message schema. In: Susan C. Herring (ed.),
Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural
Perspectives, 91–109. Amsterdam/Philadelphia: John Benjamins.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
80 Helmut Gruber

Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi E. Hamilton (eds.), The Handbook of Discourse Analysis, 612–634. Ox-
ford, UK: Blackwell Publishers.
Herring, Susan C.
2004 Computer-mediated discourse analysis: An approach to researching online be-
havior. In: Sasha A. Barab, Rob Kling, and James H. Gray (eds.), Designing for
Virtual Communities in the Service of Learning, 338–377. Cambridge, UK:
Cambridge University Press.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Lan-
guage@Internet 4, article 1.
http://www.languageatinternet.org/articles/2007/761/
Herring, Susan C.
2010 Who’s got the floor in computer-mediated conversation? Edelsky’s gender pat-
terns revisited. Language@Internet 7, article 8.
http://www.languageatinternet.org/articles/2010/2857/
Holly, Werner
1997 Zur Rolle von Sprache in Medien. Semiotische und kommunikationsstruk-
turelle Grundlagen. Muttersprache 107: 64–75.
Johnson-Eilola, Johndan and Stuart A. Selber
1996 Policing ourselves: Defining the boundaries of appropriate discussion in online
forums. Computers and Composition: An International Journal for Teachers
of Writing 13: 269–291.
Joyce, Elisabeth and Robert E. Kraut
2006 Predicting continued participation in newsgroups. Journal of Computer-Me-
diated Communication 11(3), article 3.
http://jcmc.indiana.edu/vol11/issue3/joyce.html
Kiesler, Sara, Jane Siegel, and Timothy McGuire
1984 Social psychological aspects of computer-mediated communication. American
Psychologist 39: 1123–1134.
Kim, Min-Sun and Narayan S. Raja
1991 Verbal aggression and self-disclosure in computer bulletin boards. Paper pres-
ented at the annual meeting of the International Communication Association,
Chicago, IL. Washington, D.C.: ERIC Clearinghouse on Languages and Lin-
guistics. Document no. ED334620.
Koch, Peter and Wulf Oesterreicher
1994 Schriftlichkeit und Sprache. In: Hartmut Günther and Otto Ludwig (eds.),
Schrift und Schriftlichkeit: ein interdisziplinäres Handbuch internationaler
Forschung, 587–604. Berlin: de Gruyter.
Kress, Gunther
2010 Multimodality: A Social Semiotic Approach to Contemporary Communication.
London: Routledge.
Lamy, Marie-Noelle and Regine Hampel
2007 Online Communication in Language Learning and Teaching. Houndsmill,
Basingstoke: Palgrave.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
Mailing list communication 81

Lea, Martin, Tim O’Shea, Pat Fung, and Russell Spears


1992 “Flaming” in computer-mediated communication. In: Martin Lea (ed.), Con-
texts of Computer-Mediated Communication, 89–113. Hemel-Hempstead, UK:
Harvester Wheatsheaf.
Martin, James R.
1992 English Text: System and Structure. Amsterdam/Philadelphia: John Benjamins.
Maynor, Natalie
1994 The language of electronic mail: Written speech? In: Greta D. Little and
Michael Montgomery (eds.), Centennial Usage Studies. Publication of the
American Dialect Society Nr. 78, 48–55. Tuscaloosa, AL: University of Ala-
bama Press.
Mclaughlin, Margaret L., Kerry K. Osborne, and Christine B. Smith
1995 Standards of conduct in Usenet. In: Steven G. Jones (ed.), Cybersociety: Com-
puter-Mediated Communication and Community, 90–112. London: Sage.
Muntigl, Peter and Helmut Gruber
2005 Introduction: Approaches to genre. Folia Linguistica XXXIX(1–2): 1–19.
Nonnecke, Blair and Jennifer Preece
2000 Persistence and lurkers in discussion lists: A pilot study. In: Proceedings of the
Thirty-Third Hawai International Conference on System Sciences. Los Alami-
tos, CA: IEEE Press.
http://www.cis.uoguelph.ca/~nonnecke/research/persistence.pdf
Paolillo, John C.
1996 Language choice on soc.culture.punjab. Electronic Journal of Communication
6(3). http://www.cios.org/EJCPUBLIC/006/3/006312.HTML
Schmidt, Gurly
2000 Chat Kommunikation im Internet – eine kommunikative Gattung? In: Caja
Thimm (ed.), Soziales im Netz. Sprache, Beziehungen und Kommunikations-
kulturen im Internet, 109–131. Wiesbaden: Westdeutscher Verlag.
Severinson Eklundh, Kerstin
2010 To quote or not to quote: Setting the context for computer-mediated dialogues.
Language@Internet 7, article 5.
http://www.languageatinternet.ord/articles/2010/2665/
Uhlirova, Ludmila
1994 E-mail as a new subvariety of medium and its effects upon the message. In:
Svetla Cmejrkova (ed.), The Syntax of Sentence and Text. Festschrift for
Frantisek Danes, 273–282. Amsterdam/Philadelphia: John Benjamins.
Verschueren, Jef, Jan-Ola Östman, and Jan Blommaert (eds.)
1995 Handbook of Pragmatics. Amsterdam/Philadelphia: John Benjamins.
Verschueren, Jef
1999 Understanding Pragmatics. London: Arnold.
Warschauer, Mark, Ghada R. El Said, and Ayman Zohry
2002 Language choice online: Globalization and identity in Egypt. Journal of Com-
puter-Mediated Communication 7(4).
http://jcmc.indiana.edu/vol7/issue4/warschauer.html
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication; Linguistic, Social, and Cross-
Cultural Perspectives, 47–65. Amsterdam/Philadelphia: John Benjamins.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
82 Helmut Gruber

Wilkins, Harriet
1991 Computer talk: Long-distance conversations by computer. Written Communi-
cation 8(1): 56–79.
Yates, Simeon J.
1996 Oral and written linguistic aspects of computer conferencing: A corpus based
study. In: Susan C. Herring (ed.), Computer-Mediated Communication: Lin-
guistic, Social, and Cross-Cultural Perspectives, 29–47. Amsterdam/Phila-
delphia: John Benjamins.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:49 PM
4. Blogging
Cornelius Puschmann

1. Origins and definitions

The blog (a contraction of web log/weblog) is a form of online publishing, com-


munication, and expression that has gained significant popularity since its emerg-
ence in the late 1990s (Blood 2002; Rosenberg 2009; Winer 2001). The terms blog
(n.) and blogging (v.) were first included in the Oxford English Dictionary in 2003,
and blog (n.) was chosen as Merriam-Webster’s word of the year in 2004 (Mer-
riam-Webster 2004). Princeton’s WordNet database defines a blog as “a shared on-
line journal where people can post diary entries about their personal experiences
and hobbies(; …) postings on a blog are usually in chronological order”, and de-
scribes blogging as “reading, writing, or editing a shared on-line journal”. Blogs
are used to publish a wide array of content: In addition to textual blogs (the focus of
this chapter), blogs are also used to share photos, audio clips, and video clips
(Scheidt 2009). Although some degree of openness and sharing is usually associ-
ated with blogging, blogs with access restrictions exist in corporate and organiz-
ational spaces and where individuals wish for their blog to remain private. Associ-
ated terms such as blogosphere (n.) and bloggy (adj.) have also entered the
vernacular in the course of the last decade, denoting blogs in their (implied) totality
and the (implied) characteristics they share, respectively. Blogging is a global phe-
nomenon, reaching across languages, communities, and organizational contexts
(Bruns and Jacobs 2006; Russell and Echchaibi 2009; Schlobinski and Siever
2005).
Definitions of what constitutes a blog from scholars in different disciplines
highlight different aspects of blogs, such as genre antecedence (Karlsson 2006;
McNeill 2003, 2005), structure and content (Herring, Scheidt, Bonus, and Wright
2004), communicative function (Brake 2007), rhetorical practice (Miller and
Shepherd 2004), and practitioner perspective (boyd 2006), or they attempt to es-
tablish theoretical frameworks which integrate several of these facets (Schmidt
2007). The divergent and at the same time overlapping scholarly approaches to
blogs as text, discourse, social action, and cultural practice reflect both the per-
spectives of a range of academic disciplines and the shifting interpretation of the
blog format by practitioners and non-practitioners. Simultaneously, there appears
to be a gradual move away from definitions that tie blogs exclusively to a specific
style or content closely resembling antecedent practices, such as diary-writing and
journalism, to definitions that are more open and recognize what boyd refers to as
“the efficacy of the practice” (2006: para 2). As blogs come of age and merge with

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
84 Cornelius Puschmann

even newer forms of CMC such as status updates on social networking sites like
Facebook (boyd 2006; Joinson 2008) and microblogging services such as Twitter
(boyd, Golder, and Lotan 2010; Honeycutt and Herring 2009; Java et al. 2007),
they are increasingly defined in terms of themselves and without reference to pre-
cursors.
Blood (2000) traces the origins of blogs to the practice of link sharing on the
early World Wide Web. She emphasizes that the earliest practitioner definitions of
what constituted a blog were based on the presence of dated entries containing
links, commentary, and thoughts on a personal website:
The original weblogs were link-driven sites. Each was a mixture in unique proportions
of links, commentary, and personal thoughts and essays. Weblogs could only be created
by people who already knew how to make a website. A weblog editor had either taught
herself to code HTML for fun, or, after working all day creating commercial websites,
spent several off-work hours every day surfing the web and posting to her site. These
were web enthusiasts. (para 5)
The function of sharing links and publishing information in a web feed, then-
unique features likely to have spurred the popularity of blogs, are today integrated
into virtually any component of the so-called social web. A variety of media con-
tents (photos, music, video clips, etc.) can easily be embedded in blog entries or
other hypertext-based services, while at the same time portals and multimedia ap-
plications integrate blog-like functions. What remains unchanged is that blogs
structure digital content sequentially and that they are more frequently maintained
by individuals than institutions or companies (McLean 2009).
Definitions based on the structural characteristics of blogs are popular among
researchers; for example, blogs are described as “frequently updated webpages
with a series of archived posts, typically in reverse-chronological order” (Nardi,
Schiano, and Gumbrecht 2004: 222) and “modified web pages in which dated en-
tries are listed in reverse chronological sequence” (Herring, Scheidt, et al. 2004:
1). This approach to definition can be interpreted in light of the extreme topical,
functional, and participatory variance of blogs, i.e., the fact that subject matter,
purpose, and community are highly variable from one blog to another and, inter-
nally, from a single post to the next.
Researchers from linguistics, rhetoric, and literary studies, but also from a var-
iety of other disciplines, frequently apply the term genre to blogs, relating it to
forms, such as the personal diary, which they propose as plausible ancestors (e.g.,
Karlsson 2006: 1, who calls the paper diary the blog’s “evident offline antecedent”).
This approach is not without its conceptual difficulties, because while technical con-
straints and certain stylistic patterns can be considered somewhat stable (Pusch-
mann 2010a: 109–114), the purpose and community of a blog are not, a problem that
poses a challenge to contemporary genre theory (see Askehave and Nielsen [2005]
and Giltrow [this volume] for a discussion of the complex relationship of medium
and genre, and Lomborg [2009], Scheidt [2009], and Miller and Shepherd [2009]

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 85

for analyses of blogs from the perspective of genre theory). Blogs share character-
istics with genres that are author-centric in terms of mode and sequential in terms of
text organization, such as the diary and the personal letter, and these common char-
acteristics are sometimes suggested to have been inherited by the blog in a genea-
logical sense. However, this assertion seems questionable in light of the historical
development of blogs. In those instances where they share traits with pre-digital
antecedents, this may partly be a result of conscious imitation or genre migration
and partly the symptom of a psychological desire for mediated self-expression that
predates the implied antecedents (see Gurak and Antonijevic [2008] and Nowson,
Oberlander, and Gill [2005] for psychological approaches to blogging).

2. Interdisciplinary research and intersections with pragmatics

Blogs and blogging have attracted a growing body of scholarship since the popu-
larization of the form in the late 1990s and early 2000s. While the use of blogs has
spread to a variety of contexts, such as academic research (Ewins 2005; Suzuki
2004), business (Puschmann 2010b; Sprague 2007), and education (Armstrong,
Berry and Lamshed 2004), studies suggest that the prototypical use of blogs as a
medium for personal publishing by private non-professionals still dominates over
other scenarios (McLean 2009; White and Winn 2009). Blogging has been studied
with a range of methodologies and from a variety of disciplinary perspectives,
among them ethnography (boyd 2006; Brake 2007; Gumbrecht 2004; Nardi,
Schiano, and Gumbrecht 2004; Schiano, Nardi, Gumbrecht, and Swartz 2004),
mass communication (Kelleher and Miller 2006; Schmidt 2007; Stefanone and
Jang 2007), political science (Adamic and Glance 2005; Drezner and Farrell 2004;
Trammell 2006), sociology (Ali-Hasan and Adamic 2007; Efimova, Hendrick, and
Anjewierden 2005), geography (Gopal 2007), computational linguistics (Arga-
mon, Koppel, Pennebaker, and Schler 2007; Mishne 2005; Schler, Koppel, Arga-
mon, and Pennebaker 2006), linguistics (Herring, Scheidt, Bonus, and Wright
2005; Puschmann 2009), rhetoric (McNeill 2005; Miller and Shepherd 2004;
Myers 2010), psychology (Gurak and Antonijevic 2008; Nowson, Oberlander and
Gill 2005), and organizational studies (Efimova and Fiedler, 2004; Efimova and
Grudin, 2007; Jackson, Yates, and Orlikowski 2007). Figure 1 shows an array of
methodologies used by scholars from a variety of fields. Dependent on the field,
different questions are formulated and different data are used to answer them.
Studies from disciplines such as communication, sociology, and ethnography
regard blogging as a practice and process; accordingly, they tend to focus on the
relations and motivations of bloggers, how they characterize their activity, and on
their interaction with others in sociocommunicative networks, investigating these
aspects by either quantitative or qualitative means. In contrast, studies from con-
tent-centric and technical fields tend to focus on the analysis and classification of

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
86 Cornelius Puschmann

Figure 1. Approaches to blog research

user-produced data (language or metadata such as links, tags, post frequency,


lengths of posts), sometimes in relative isolation from the social dynamics of blog-
ging that produce the content. An increasing number of studies seek to integrate
both approaches, but building a bridge between “deep” sociocultural practice and
“shallow” textual product presents a challenge. The following quote from Schmidt
points to the usefulness of careful language analysis when approaching blogs:
(…) speaking in one’s own personal voice and being open for dialogue rather than en-
gaging in one-way-communication are core elements readers have come to expect from
blog communication, be it in private online journals, corporate blogs, or political blogs.
(2007: para 14)

What defines a “personal voice”, and how is “being open for dialogue” stylis-
tically signaled? Is it even legitimate to associate the use of certain linguistic fea-
tures with being conversational? (See Peterson 2011 for a critical discussion of this
question in relation to blogs.) Linguistic research can contribute to the study of In-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 87

ternet communication by examining those characteristics that Schmidt notes are


important for how blogging is interpreted, but that he describes only in very general
terms. To date, it has primarily been the ease of obtaining language data from blogs
for the purpose of corpus-based studies in traditional linguistic research areas that
has attracted language scholars to them, but approaches beyond this limited scope
are potentially even more rewarding and could contribute crucially to a broader in-
terdisciplinary research agenda. Linguistic research can provide insight into impli-
cit conceptualizations shaping the discourse that is produced and contribute to new
techniques of analysis based on language data. What Schmidt refers to as “core el-
ements” (how blogs are written) is a decidedly linguistic phenomenon and there-
fore relevant to linguistic analysis and pragmatics. Beyond putting to use lan-
guage-based research in concert with sociological approaches, pragmatically
relevant areas of study related to blogs include deixis, adressivity, politeness, and
different stylistic approaches of bloggers (author-centric vs. topic-centric blog-
ging). These are covered in the remainder of this chapter.
At the same time, it is important to recognize that the understandings gained
through careful language analysis do not extend to the intentions of practitioners,
to why they consciously communicate in the way they do, or to what the activity of
blogging means to them. Linguists studying blogs should understand the inherent
limitations of content-based approaches. The motivation to blog, the role blogging
plays for a community, and the reflection of practitioners on their practice are all
outside the scope of an exclusively linguistic description and call for the addition
of ethnographic, sociological, and psychological research approaches.

3. Usage, style, and classification

In the course of the last decade, blogging has changed from a new practice into
something mainstream, in many regards becoming the first mass instantiation of
user-generated content (UGC) on the web (Schiano et al. 2004; White and Winn
2009). A variety of blogging services such as Blogger, Wordpress, and LiveJournal
make it possible for anyone to run a blog without the need for a personal website. In
addition, companies, schools, universities, and other organizations increasingly
offer blog hosting to their constituents, while the mainstream news media also make
extensive use of blogs integrated into conventional websites. Precise statistics on
the number of blogs worldwide are difficult to assemble, and their relevance should
not be overstated, given that many blogs are abandoned after a short time. Services
such as Technorati tracked more than 70 million individual sources in Spring 2007,
and as of 2009, estimates for the number of blogs in the United States and globally
varied between 100 and 180 million (Kutchera 2008). The number of Internet users
reporting having read a blog at least once or doing so on a regular basis also appears
to be on the rise (Project for Excellence in Journalism 2008).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
88 Cornelius Puschmann

Technorati’s 2009 State of the Blogosphere report (McLean 2009) found that
the majority of the 2,828 U.S. bloggers surveyed were male, between 18 and 44
years old, and had a relatively high level of income and educational qualifications.
However, user demographics vary considerably by country, region, language, and
individual usage community, making it essential to investigate blogging practices
within their respective cultural contexts (see Schlobinski and Siever [2005], as
well as Russell and Echchaibi [2009], for publications on blogging from an inter-
national perspective). While blogging can be a source of revenue, and bloggers
may be hired as ghostwriters, the most commonly cited reason for blogging given
by those surveyed by Technorati was “personal satisfaction” (76 % of the respon-
dents), and the most popular self-description of the blog’s content was “personal
musings” (53 %). An even higher percentage (83 %) described the content of their
blog as “personal musings” in a smaller study by Viégas (2005). Self-expression
thus historically appears to be a core motivation for the majority of bloggers, not
withstanding phenomena such as “A-list” blogging and professional journalism
via blogs (see also Lenhart and Fox 2006). A possible shift in user demographics
that may also impact how blogs are written was observed in a recent Pew Internet &
American Life study: Fewer teenagers and an increasing number of adults are read-
ings and writing blogs (Lenhart et al. 2010).
The discourse on blogging and bloggers in the mass media is ambivalent. It
highlights both the perceived value and potential of blogs as sources of free ex-
pression and public discussion and their dependence on secondary sources and lack
of accountability (Baltatzis 2006; Niles 2007). Personal blogging is also often mis-
characterized as vain or egocentric when critics apply expectations from perceived
antecedents such as print journalism to blogs in an undifferentiated fashion. Fur-
thermore, the public discourse often implicitly takes highly visible topical blogs
and casts them as typical or model instantiations, effectively imposing prescriptive
norms for how to write a “good” blog and creating a skewed perception of the
mainstream, a problem emphasized by Herring, Kouper, Scheidt, and Wright
(2004).
Stylistically, blogs are a highly variable form of self-expression. Depending on
a blogger’s conceptualization of the format, a blog entry can be speech-like or
written-like, colloquial or formal, and can relate private or public (in the sense of
addressing established topical areas of the mainstream media, such as politics,
sports, entertainment, or technology) issues. It can target a wide audience or a
small, select readership and be written for personal or professional reasons. The
virtual context in which posts are presented and the metadata that is associated
with them (title, author, time of writing, tags, categories) allow for a situatedness
that makes blogs compelling to a wide range of users. This is in part because the
metadata facilitates the use of first-person perspective and deictic expressions,
making writing a blog relatively easy even for an inexperienced author. A range of
stylistic and topical options are at the blogger’s disposal, whereas established and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 89

Figure 2. Form and function-based classification, reproduced from Krishnamurthy (2002)

institutionalized forms of publishing are often more restrictive in terms of style and
content. The flexible communicative situation of blogs (Who is assumed to be
among the readers? Who, if anyone, is addressed? Who might be eavesdropping?)
also shapes their style and influences their authors’ rhetorical choices.
Content-based approaches to blogs have often focused on the question of how
to categorize them on the basis of language and the use of specific features such as
linking, quoting, frequency of comments, or other structural criteria of analysis. In
an attempt to combine the facets of form and function, Krishnamurthy (2002) sug-
gests such a categorization along the scales personal – topical and individual –
community for his analysis of blog discourse (Figure 2). His approach implicitly
uses basic categories from genre analysis (communicative purpose and discourse
community; cf. Swales [1990]), which are descriptively inclusive but also difficult
to operationalize.
Herring et al. (2005) extend the categories suggested by Blood (2002), who
refers to the types filters, personal journals, and notebooks, and propose a catego-
rization of blogs into the following types:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
90 Cornelius Puschmann

1. diaries/personal journals, which record the personal experiences and thoughts


of the blogger from a subjective viewpoint;
2. filters, which filter, quote, link, and/or comment on information from other
sources;
3. k-logs, which store, tag, and/or classify information from other sources on a
single topic;
4. mixed, which combine at least two of the primary three types; or
5. other, which cannot be associated with any of the primary types.

This classification is based on purpose inferred from content (Herring et al. 2005:
147) via manual coding. The categories are defined a priori, and then the studied
blogs are classified according to which category they are seen as fitting in best.
This approach to categorization can be criticized on the grounds that the array of
purposes is limited and based on Blood’s somewhat prescriptive categories, which
take her personal view of blogging as a starting point.
Another language-based approach is taken by Argamon et al. (2007), who in-
vestigate the relationship of style and content to age and gender of bloggers based
on stylometric analysis. Via a process they label meaning extraction (Chung and
Pennebaker 2007), the authors isolate 20 thematic lexical factors that are then re-
lated to the dimensions of age and gender (see Argamon et al. Table 3 for details).
They summarize the findings of their large-scale textual analysis of 140 million
words of running text by remarking:
We find that older bloggers tend to write about externally-focused topics, while younger
bloggers tend to write about more personally-focused topics; changes in writing style
with age are closely related. Perhaps surprisingly, similar patterns also characterize
gender-linked differences in language style. In fact, the linguistic factors that increase in
use with age are just those used more by males of any age, and conversely, those that de-
crease in use with age are those used more by females of any age. (Argamon et al. 2007:
para 4)

Argamon et al. approach blogs inductively and based on automation, while the ap-
proaches used by Herring et al. (2004, 2005) classify the content according to func-
tionally-derived categories and manual classification. Both approaches are based
on the style and content of blog entries and make inferences regarding the purposes
associated with blogging on the basis of the data.
However, Aragmon et al.’s strong claims regarding the influence of age and
gender on style are problematic in several ways. First, they fail to take blog type
into account. In an automated analysis of a corpus of blog entries balanced by
gender (male and female bloggers) and blog type (filter and personal journal), Her-
ring and Paolillo (2006: 453–455) found that blog type trumps gender as an in-
fluencing factor. Their analysis suggests that the gender differences observed by
Argamon et al. are a result of failing to differentiate between different types of blogs
based on purpose and audience design. Herring, Kouper, et al. (2004)’s finding that

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 91

teen bloggers are more likely to write personal journals and adults are more likely to
write filter blogs similarly problematizes Argomon et al.’s age results. There ap-
pears to be a broad consensus that in blogs there is a dynamic relationship between
style, genre, age, and gender of the blogger, and behaviors such as linking and quot-
ing, but clear and unambiguous causal relations between these dimensions have not
been established. Males, females, and bloggers of different age groups may all be
motivated by different perceived benefits of blogging. It seems likely that the pur-
pose a blogger associates with his or her blog will have a strong impact on how it is
written, and that at the same time purpose depends partly on age and gender, rather
than there being an immediate relationship between these criteria and language use.

4. Deixis and givenness

Despite the overall variability of blog style and content, some linguistic properties
of blogs are highly stable. The core cohesive element of a blog is time. In contrast
to the syntagmatic structure of wikis (elements are linked by relation), blog entries
are paradigmatically linked by chronology. This chronology can be omitted, for
example when looking at entries on the basis of categories or tags, or when an in-
dividual post is found via a web search, but it acts as the governing organizational
principle for information in blogs.
According to Winer (2001), blog posts canonically encode the following in-
formation:
1. Title
2. Text
3. Tags/Categories
4. Author
5. Time of publication
6. URL
Author, time of publication, and the URL of the post differ from the other fields by
constituting extra-textual information that is automatically associated with the
situation and not manually assigned by the blogger. This information makes deictic
language possible, i.e., use of the first person pronoun (always referring to the
blogger-publisher credited with the post) and use of temporal adverbs (relating to
post publication date as the point of reference) and spatial adverbs (either relating
to the blogger’s location at the time of publishing or conceptualizing the blog or the
Internet as a whole as a space). Furthermore, older blog entries function as co-text
for newer ones, allowing certain information to be presented as given to the (hy-
pothetical) consistent reader.
Example 1, taken from the blog of Robert Scoble (http://scobleizer.com), a
technology expert and former Microsoft employee, illustrates the rhetorical poten-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
92 Cornelius Puschmann

tial of blogs. Despite being relatively informal in style, it is also clearly well
planned and informative. It employs standard spelling, proper capitalization, and
no use of emoticons or abbreviations typically found in synchronous CMC, al-
though technical acronyms abound (e.g., HDTV, PVR, OPML).1
Example 1.
Trial of Origin (band first linked here) beats 600 others
This is cool, (hyperlink)Trial of Origin(/hyperlink) just won a BBC contest where they
beat 600 other bands. I was one of the first blogs to link to this band and hope they go all
the way!
Speaking of music, last night Maryam and I watched American Idol on our new soo-
peerr-doopeer 60-inch Sony HDTV screen.
Damn.
That’s all I can think while watching that screen. We have to rip ourselves away from the
TV to go to sleep.
Blogging? Forget it. HDTV wins. It is just so stunning.
Oh, funny aside. Remember my post about visiting Yellowstone National Park? So,
what was on my PVR when I got home? That’s right. Sunrise show of Yellowstone’s
Geysers. They look better on HDTV than they do in real life! They don’t smell, though.
Question: I wanna watch the World Cup. Turns out most of the games are on ESPN2.
That’s not in HD on Comcast. So, what’s the best way to get ESPN2?
Since we’re talking about media, I like (hyperlink)the Podcast Readout of Share Your
OPML site(/hyperlink). Is your favorite Podcast there?
Example 1 can be characterized as a relatively typical blog post as regards the use
of short paragraphs, sentence fragments, interjections, deictic expressions, and
first person point of view. The reader is addressed multiple times, a strategy regu-
larly used by Scoble for involvement.
Two items referred to in example 1 are set off by the use of hyperlinks (Trial of
Origin, the Podcast Readout of Share Your OPML site). A referenced point in time
(last night) is retrievable via the contextual (temporal) information automatically
added by the blogging software, while some information (for example, Maryam,
the name of the blogger’s wife) is treated as given based on an assumed familiarity
of the reader with either the co-text (older blog entries in which she is introduced)
or situational context (for those readers personally acquainted with the Scobles).
The availability of deixis, hyperlinks, and a retrievable co-text partly combines the
situatedness of speech with the permanence and stability of writing. The encoding
of author and time of publication as metadata with each blog entry is the basis for
the frequent analogy of blogging with interactive discourse (Puschmann 2010a –
but cf. Peterson 2011 for a different characterization). The meta-information fixes
a deictic center that allows reference to time and speaker/addressee relative to the
point specified by the blog post.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 93

5. Audience design and adressivity

The previous section argued for the importance of metadata in relation to the com-
position and reception of blogs. While the blogger’s identity and the reference of
spatial and temporal expressions are retrievable by the reader through this meta-
data, the identity of the intended recipients of a blog post is frequently much less
clear. Bloggers are likely to conceptualize blog entries on a continuum between
monologue and dialogue, as they can project their writing onto a variable audience.
This fuzzy communicative setting is discussed in an ethnographic study by Brake
(2007), who observes:
To refer to ‘a-communicative’ practices built around a communications medium seems
counter-intuitive, but the interviews clearly revealed a wide variety of motivations to
start and to continue weblogging that had only a tenuous connection to communication.
(15)

The term “audience” in this context does not, as Brake’s remark underlines,
imply a specific, large, or external readership; functions such as using a blog to
store information for personal use (personal knowledge management or PKM) or
to record personal thoughts in the style of a diary are two uses where the blogger
may have a generic, sympathetic listener, or even herself in mind. Qian and Scott
(2007) and Viégas (2005) studied how bloggers conceptualize their readership and
resolve potential conflicts related to the Internet’s opaque participative setting via
surveys. Qian and Scott argue:
The target audience is related to how much anonymity bloggers perceive themselves to
have. Specifically, the bloggers in our study feel more identifiable if the audience in-
cludes people they know offline. At the same time, target audience also influences the
way posts are written and what information is made available (Schiano et al 2004:
1144). When a blog is for people one knows offline (e.g., family/friends), the goal may
be to identify oneself for them and to gain recognition for one’s ideas from others whose
opinions matter to the blogger. (2007: para 37)

In discussing the results of her survey of practitioners, Viégas observes:


Respondents’ open-ended essay answers reveal that a significant portion of the people
who replied that they felt they knew their audience “fairly well” actually meant they
knew their “core” audience well, that is, they knew those few people who are frequent
readers and who, in many cases, leave comments on their blogs. They also noted that,
for the most part, they did not know who the rest (i.e., most) of their audiences were. Al-
though respondents were well aware that their “core” audience comprised a minor seg-
ment of their entire readership, they tended to think about their entire audience in terms
of this small group of people. (2005: para 65)

Both studies agree that bloggers plan their writing with a specific (if potentially
very small) audience in mind and that they consider the impact of their writing. In
addition to this conceptualized audience (what Viégas calls the the “core”), a

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
94 Cornelius Puschmann

broader actual audience exists, which includes overhearers not anticipated by the
blogger. As the conceptualized audience is what the blogger relies on when writ-
ing, problems can occur when a conflict of interest exists between conceptualized
and intended audience (see Puschmann 2010a: 74 for an example). An alternative
approach is to rely on the topic in order to get an idea of the audience, since knowl-
edge of and interest in certain topics constrains a blog’s potential readership. This
approach is used in example 1. A filter-style, topical focus makes sense because it
acts as a domain-specific anchoring point for the reader, whereas an author-centric
approach assumes that readers are at least somewhat familiar with the blogger.
Nonetheless, bloggers’ expectations towards their audience frequently go
beyond a mutual interest in similar topics. In her study of adolescent bloggers,
Scheidt (2006) maps the style of blog entries onto projected readers in different
roles:
1. A witness testifying to the experience
2. A therapist unconditionally supporting emotions
3. A cultural theorist assessing the contestation of meanings, values, and iden-
tities in the performance
4. A narrative analyst examining genre, truth, or strategy
5. A critic appraising the display of performance knowledge and skill
Scheidt claims that there are gender differences in the extent to which each type of
audience is addressed by teen writers, noting that the female adolescent bloggers
she studied showed “a tendency toward seeking support for their individual
struggles with appeals to the envisioned audience” (2006: 18), whereas boys show
a tendency toward asking the audience to witness the event and notice their skill in
performance.
From these studies, it can be observed that audience design plays an important
role in blogging and that bloggers integrate their conceptualization of the reader-
ship into their style. It is a widely held assumption that most bloggers address mass
audiences, yet the findings of Brake, Qian and Scott, Viégas, and Scheidt all appear
to suggest otherwise. Brake’s description of blogs as “a-communicative” and Qian
and Scott’s characterization of diary blogs as secret or “near-secret” writings,
aimed at very small audiences or even the self, particularly serve to emphasize this
discrepancy between popular perception and everyday use.
In less personal and more goal-oriented blogs, audience design and addressiv-
ity may be part of an elaborate rhetorical strategy. The use of explicit second-per-
son address, for example, allows bloggers to negotiate complex relationships by
shifting pronominal focus, in extreme cases from one clause to the next. Jonathan
Schwartz, former CEO of Sun Microsystems, addresses both employees and exter-
nal stakeholders in his blog in Example 2, illustrating this potential (personal pro-
nouns and references to the company Sun are in bold print to highlight their preva-
lence).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 95

Example 2.
We Think We Can
Paraphrasing Henry Ford, “You think you can, or you think you can’t – either way,
you’re right.” That quote struck me as the perfect summary of our fiscal year 2007 per-
formance. We did what we said we’d do a year ago.
As you may have seen, we’ve announced our fourth quarter and full fiscal year results
(our fiscal year ends with the school year, in June). We exceeded the commitments
made a year ago, to restore Sun to 4 % operating profitability in Q4, and did so by de-
livering our single best operational quarter since 2001. On an annual basis, we im-
proved Sun’s profitability by over a billion dollars. A billion. We grew revenue, ex-
panded gross margins, streamlined our operating expenses – and closed the year with an
8 % operating profit in Q4, more than double what some thought to be an aggressive tar-
get a year ago.
We did this while driving significant product transitions, going after new markets and
product areas, and best of all, while aggressively moving the whole company to open
source software (leading me to hope we can officially put to rest the question, “how will
you make money?”).
And we’re not done – not by any stretch of the imagination. We have more streamlining
to do, more commitments to meet, more customers to serve and developers to attract. But
it’s evident we’ve got the right foundation for growing Sun – with real innovation the
market values, as shown by Q4’s 47 % gross margins, the highest on record in five years.
I’ll be with a variety of external audiences most of this week – and I’ll summarize their
questions and comments in a few days. In the interim … to our customers, partners, and
most of all, our amazing global employee base – thank you for thinking we could.
You were right.
Keep thinking that way. You ain’t seen nothin’ yet.
Example 2 is clearly “more written” in style than example 1. Sentences and para-
graphs are longer and more complex, and there are fewer interjections, less ellipsis,
and limited, strategic use of orality markers (You ain’t seen nothin’ yet). As in
example 1, first person point of view and deictic expressions (a year ago, next
week) are used, but in contrast to Scoble, Schwartz addresses his readers more di-
rectly via second person pronouns.
Schwartz uses we with rhetorical extension to refer to all employees of the
company, including himself. But use of we in this function does not prevent him
from using I to present himself as distinct from everyone at Sun or to use the full
noun Sun as denoting something other than we. Instead, an intricate interplay of
discourse roles is developed (see also Puschmann 2010b):
– We, used as subject with a range of dynamic verbs of action and movement and
semantically as agent, denotes the employees of Sun Microsystems (or, in a
more restrictive interpretation, the management team).
– I is used in contexts where agency of the institutional we would not result in a

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
96 Cornelius Puschmann

semantically well-formed proposition. For example, Jonathan Schwartz will


summarize what external audiences have to say, since this is something that the
collective company is not literally capable of doing.
– You can denote the single blog reader (and all readers collectively), any single
employee of Sun (and all employees collectively), and customers and partners
in those contexts where Schwartz is the speaker, while it reflects back to him
and the company where he paraphrases the speech of others (how will you make
money?)
– Sun, the company name, is used only three times and always in object position
(restore Sun/grow Sun) or as part of a noun phrase in object position (Sun’s
profitability), while we dominates in subject position.
– The indefinite pronoun some is used once to refer explicitly to a third party, as
is the expression external audiences to describe people who are not employees
of the company.

The rhetorical significance of institutional we becomes clear when one exam-


ines its verbal collocates, for example say, do, announce, grow, improve, and ex-
ceed, all of which are used transitively. The company’s annual earnings have not
been announced by an indefinite collective of employees, but by the management
team, and what we said we’d do a year ago refers to a controversial plan to refocus
Sun that was formulated by Schwartz. But it is obviously of strategic value for the
CEO to downplay his role and instead present the company’s success as the result
of a team effort (using we instead of I). At the same time, the use of we is preferable
to any other conceivable reference (you, Sun, the company, etc.) because it includes
Schwartz himself, asserting an interactive discourse between bloggers and blog
readers, and because it allows him to position the collective we as distinct from
some outsiders who have been skeptical about the restructuring plans.
While the rhetorical approach in Example 2 is not unique to blogs, the com-
municative setting of the blog allows almost any reader to feel addressed and adds
personal credibility to Schwartz as the blog author. Although this is superficially
true of many forms of mainstream media, blogs allow faster and more immediate
feedback than newspapers or brochures, resulting in their frequent characterization
as more democratic and direct (e.g., Trammel 2006), qualities that are of obvious
benefit in organizational communication.

6. Politeness

The observations made above about how bloggers conceptualize their audience
and negotiate their relationship with it gain additional traction in relation to the
concepts of face (Goffman 1955) and politeness (Brown and Levinson 1987), i.e.,
the desire to construct, uphold, and reinforce a positive image of the self, while at

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 97

the same time being aware that our positive and negative face work brings us into
conflict with the face work of others, leading to face-threatening acts (FTAs).
Politeness is a central strategy for minimizing FTAs (Mills 2003: 6) and thus for
demonstrating awareness and understanding of the need of others to construct
themselves socially. The role of politeness in blogs has been investigated by
Garcia-Gomez (2009), who studied the conceptualization of gender roles as ex-
pressed in the blogs of British and Spanish teenage girls, and by Kouper (2010),
who explored the pragmatics of advice-giving, which she characterizes as an FTA,
in a LiveJournal community.
While a blog can serve as an effective tool for active face work from the per-
spective of the blogger, the capacity for FTAs is somewhat constrained by the fact
that blogger and audience are relatively removed from each other. Inside the space
of her own post, the blogger is in charge – she cannot be interrupted, pressured,
threatened, or interrogated except via comments, over which she has a high degree
of control. Likewise, no one person can be assumed with absolute certainty to be
among the readers, therefore no reader can plausibly be interrupted, pressured,
threatened, or interrogated by the blogger (but see example 4 for a case where as-
sumed readers are addressed directly). Thus face threat understood in a way that
presumes parties who are aware of each other’s presence does not really apply to
blog posts, which may serve to explain their popularity as a personal space that is
both visible to others and at the same time protected from undesired intervention.
While bloggers quote and link to each other and engage in other activities that
make FTAs possible, one’s own blog offers a certain degree of safety compared to
forms of CMC that mandate interaction.
As a result of what Brake (2007) refers to as the “a-communicative” approach
to blogging, authors have the opportunity to express what could otherwise be in-
terpreted as face threatening. Accounts of how blogs are conceptualized in an in-
teractional context support this notion, as a 2004 study of bloggers’ expectations
by Gumbrecht suggests:
In face-to-face conversation or IM, responses are expected immediately or close to it.
As a result, conversational partners may feel ill at ease when trying to broach a sensitive
issue in these media. Lara said she would never tell people, “I’m really sad” in IM, yet
she would have no qualms about stating it in her blog. Why? In blogs, people can choose
to respond to a post or not – it is up to the reader. Over IM, conversational partners might
feel obligated to respond – especially when the subject matter is as heavy as a depressed
emotional state. In this way, the lack of both cotemporality and simultaneity factor into a
blogger’s choice of communicative medium. (2004: 3)

The risk of a social penalty still looms when reacting in a way that can be inter-
preted as face-threatening, but the relative temporal and spatial distance between
blogger and reader (in the virtual sense of not perceiving who else is “present”)
makes certain types of FTAs implausible. In Gumbrecht’s study, this is anticipated
by Lara, who prefers to articulate personal feelings in her blog rather than in chat.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
98 Cornelius Puschmann

Those of her friends who do not want to articulate a reaction to Lara’s feelings can
refrain from doing so without seeming insensitive. Blog readers can lurk without
indicating that they have even received a message, and the blogger can likewise
claim not to have addressed anyone in particular with her thoughts. Consequently,
the kind of conversational offering that happens in blogs effectively removes the
social pressure from the communicative partners that accumulates in a push-type
mode of CMC such as email, where sending a message places pressure on the re-
cipient to respond.

7. Topic-centric vs. author-centric blogging styles

As has been argued in the previous sections, blogs combine a number of medial
characteristics previously associated with distinct forms of public and private dis-
course. Findings such as those of Argamon et al. (2007) regarding the stylistic
properties of blogs are suggestive of changes over the lifespan, as bloggers’ needs
for different forms of expression change and expectations towards readers shift.
With relatively few exceptions, a blog is a controlled discourse environment be-
longing to an individual and shaped largely by his or her personal tastes and needs;
therefore, the needs a blog fulfills are more individually shaped that in most other
genres of public expression. While readers can participate via comments and track-
backs, this occurs only if the blogger allows it. What is recorded in a blog is per-
manent and (again, with few exceptions) public, while at the same time being di-
rected entirely by the blogger. These situational characteristics can be considered
in concert with stylistic properties to make an argument for two distinct approaches
to blogging: a topic-centric style and an author-centric style. These styles follow
the basic distinction between diary-style and filter-style content proposed by Her-
ring et al. (2005), but they attempt to capture purpose via the relationship between
blogger and reader that is implicit in the text, rather than directly via content. A dis-
cussion of two examples illustrates this.
Example 3. (topic-centric blogging style)
“Cuil it?” I Don’t Think So.
When I teach trademark law classes, I always advise that students select strong protect-
able marks, and the class invariably balks because they want to select marks that suggest
or connote something about the goods or services at issue. That, I tell them, is the touch-
stone of a weak mark, and for examples I look to the Internet space: Google, Yahoo!,
Zillow, and so on are perfect trademarks because they say nothing about the goods or
services with which they are associated.
And now along comes cuil.com (pronounced “cool”), the much-ballyhooed Google-
killer. Great mark, right? “Cuil” says nothing about “Internet search engine,” and is in
fact apparently an old Irish or Gaelic word for “knowledge.” But here’s the rub:
“Google” is becoming a verb in the lexicon very quickly, which is typically anathema to

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 99

a trademark, but there’s not much Google can do to stop everyone from saying, e.g., “Go
Google that.” But can you say, e.g., “I am going to ‘cuil’ it?” You could, but people
would hear you say, “I am going to cool it,” and the meaning is lost.
Moral – a great trademark has to be both non-descriptive AND sound cool (pun in-
tended) and distinctive. Now let’s just see if Google goes the way of “escalator” and be-
comes generic for Internet search services …

Example 4. (author-centric blogging style)

My birthday
Well, it was my first birthday away from the family. It was interesting … teasin! it wasnt
as bad as i thought and i practiced for my mission. I woke up and texted sis because she
was born on my b-day, for those of you who forogt. Teasin sis! Umm i talked to mom
and dad and the rest of the family throughout the day. Thanks for the calls everyone.
Uhh … i went to breakfast (the good ol Galley) with Jane and Mike and afterwards ran
home to find a package sent from Mom and the famoly in cali. I went to a basketball
game and we won. Then i went out to dinner with a bunch of friends and ate hecka food.
Afterwards we came back to Jane’s and opened presents from Jane and Paul. Paul gave
me a journal his mom gave him … that was special and i needed one so im thankful for
it. Jane gave me the Spanish Book of Mormon. I was pretty excited cause now im gonna
be fluent in Espanol! She also gave me an awesome CTR ring because I have been wear-
ing Paul’s old one for the last year. Umm it also spins so it is way tight.
Then I came back to my dorm and Paul and I opened the rest of my presents. The
Johnsons gave me some nice notes and hecka food which is gettin me fat. haha thanks!
O and thanks Sue for the Head and Shoulder bottle. You’ll be gettin it back sometime
haha! And then I opened the fam in Cali’s package. I got a sweet shirt that had my
Mission on the back. Linda gave me the hymn book in Spanish, its pocket sized. And
then a CD and hecka more food. Grandma also sent a letter. Shes awesome! And that
was my b-day! This might be boring sorry!
Examples 3 and 4, both taken from personal blogs with small audiences (rather
than “pro” blogs), share certain properties: first-person voice and deictic ex-
pressions are used in both posts, in combination with particles and connectives (dis-
course markers) typically used in spoken language or in writing that consciously
imitates speech. Both involve the reader directly via use of direct address (example
3: let’s, you; example 4: you, everyone) and indirectly by using oral style markers.
Example 3 is more conservative and follows stylistic norms for written language
more closely, while example 4 is more progressive in its use of expressions typi-
cally found in online speech production, such as fillers, reductions, and phatic ex-
clamatives (uhh, umm, hecka, teasin, gettin, b-day, haha). The use of fillers in
example 4 runs counter to the claim that blog entries are spontaneous and un-
planned (Crystal 2006: 15), as there is no cognitive need in a blog entry to buy time
while formulating an utterance. Rather, the fillers in this example make the text ap-
pear more speechlike and authentic, which can be assumed to conform with the
blogger’s intentions and allows inferences regarding his conceptualized audience.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
100 Cornelius Puschmann

The examples differ from one another in that example 3 is written in the style of
an exposition: It presents an argument from the point of view of the blogger and
offers his informed opinion on an aspect of trademark law. Example 4, by contrast,
is written in the style of a personal oral narrative, relating a series of events to the
reader. Crucially, the names and events in example 4 are not readily interpretable to
a random reader, but only to those who are at least somewhat familiar with the
author. The author of example 3 consciously provides contextual information in
order to make his writing more accessible to a non-familiar audience – for
example, by beginning his post with the relative clause When I teach trademark
law classes instead of the main clause I always advise that students select strong
protectable marks. His intended audience is therefore likely to extend beyond his
students (to whom he refers in the third person) to a general readership interested in
trademark law, while the conceptualized readership in example 4 seems more spe-
cific, including the blogger’s sister (Teasin sis!) and those people who called to
congratulate him for his birthday (Thanks for the calls everyone). While the
opinions articulated in example 3 are personally associated with the blogger, they
are relatively independent of any single event, making them useful to a generic
reader (assuming the reader is interested in the subject matter) regardless of when
exactly the post is read or whether blogger and reader are personally acquainted. In
contrast, the event related in example 4 is more specified not only in terms of audi-
ence, but also in terms of the time of its anticipated reception. It is important to
note that the relevance of both examples depends entirely on the identity of the
reader – example 4 is without doubt important to the intended audience of family
and friends, which could well be larger than the readership of the trademark blog.
Examples 3 and 4 represent two individual styles among countless possible ap-
proaches to blogging. Not only do the styles vary considerably across authors, but
the style of a single blogger can vary over longer periods of time, from one post to
the next, and even within a single entry. An author-centric blog post might conform
to standard orthography and be stylistically in line with writing prescriptions,
while a topic-centric blog one might not. The choice of topic and degree of cooper-
ation with the reader (in terms of propositional explicitness; cf. Grice 1989) indi-
cate the tendencies of topic-centric and author-centric blogging, but this is far from
a black and white distinction. Table 1 summarizes the prototypical characteristics
of the two styles.
Fluidity of purpose (and, resulting from this, fluidity of style and content) is en-
demic to blogs, and therefore a wide area of intermediate forms of use lies between
the two extremes. The distinction between topic-centric and author-centric styles is
not intended as a clear-cut system of categorization, but rather as a way of system-
atizing the different audiences and intentions that bloggers associate with their
activity. The distinction can be seen as an extension of the categories proposed
by Blood (2002) and Herring et al. (2005), but with emphasis on the relationship
of blogger, assumed reader, and purpose, rather than on developing a system of

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 101

Table 1. Topic-centric vs. author-centric blogging styles

Dimension Topic-centric style Author-centric style


Style more formal and concep- less formal and concep-
tually written tually closer to speech
Favored topics focus on the external world, focus on the internal
e.g., politics, entertainment, world, i.e., the blogger’s
business, religion, work experiences, daily life,
thoughts, emotions
Self-editing information is first information is presented
presented to the reader in close relation to the
and then evaluated and blogger’s own thought
commented on; planned process; spontaneous
Conceptualized more distant, unfamiliar, closer, more familiar, and
audience and generic (liberals, specific (self, family,
republicans, lawyers, movie friends)
buffs, students)
Functions inform others, indicate a make sense of and reflect
stance or opinion to others, on one’s life, stabilize self,
gain recognition, acquire control and record own
expert status thought process or other
information, establish
structure, causality, and
order
Anonymity generally attributable may be anonymous or
pseudonymous
Analogy publishing recording
Mode exposition/argumentation narration/stream of
consciousness
Linguistic encoding/ hard to encode, easy to easy to encode, hard to
decoding decode decode
Frequent linguistic articles, demonstratives, personal pronouns
features (cf. Herring complex noun phrases
and Paolillo 2006)
Hyperlinks, quotes, more frequent hyperlinks, fewer hyperlinks, quotes,
comments, and tagging quotes, comments, and use comments, and use of
of tagging tagging

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
102 Cornelius Puschmann

content classification. Findings on gender and age (Herring, Kouper, et al. 2004;
Huffaker and Calvert 2005) can be associated with the distinction: older males tend
to blog more topic-centricly, while females and teenagers of both genders more fre-
quently choose an author-centric style. Rather than concluding that age and gender
simplistically impact language use, it instead seems sensible to argue that users of
different genders and age groups pick styles appropriate to their envisioned target
audience (ranging from the self to a broad public) and their communicative goals
(ranging from self-expression to the accumulation of social capital) and then write
accordingly.

8. Outlook

Weblogs have moved from a niche format to a well-known and thoroughly inter-
national genre of computer-mediated communication in less than a decade. They
continue to thrive as personal publishing platforms, while newer, even more rapid
forms of “lifelogging” such as Facebook status messages and microblogging ser-
vices such as Twitter may be overtaking them as tools for self-documentation.
Multimedia blogging on platforms such as YouTube continues to thrive, showing
that a need for mediated self-expression extends well beyond writing. Blogs are
written in an ever-increasing number of languages, calling for more research on
blogs in languages other than English (cf. Russell and Echchaibi 2009; Schlobinski
and Siever 2005). Linguistic analysis of blogs reveals a wide variety of uses and
contexts, with potential for research that, while using language as the diagnostic, is
able to address questions that go beyond structural linguistics. A challenge for re-
searchers investigating blogs continues to be striking the right balance between
text and practice, especially since large-scale analyses based on content are ever
easier to conduct in the age of cheap and ubiquitous computational resources. Such
imbalances can be avoided by incorporating findings from neighboring disciplines
such as communication, ethnography, sociology, and social psychology, using
them to contextualize language-based approaches.
This chapter has sought to characterize blogs as a form of mediated language
use that affords its users a range of communicative options. Blogs dynamically
combine characteristics of speech and writing due to their format, mode of produc-
tion, and the communicative situation they create via the encoding of metadata.
This makes them a versatile tool for expression and communication that is likely to
continue to interest scholars from a variety of disciplines in the future.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 103

Note

1. HD = High Definition, HDTV = High Definition Television, PVR = Personal Video Re-
corder, OPML = Outline Processor Markup Language. BBC and ESPN2 are British and
American TV stations.

References

Adamic, Lada A. and Natalie Glance


2005 The political blogosphere and the 2004 U.S. election: Divided they blog. In:
Proceedings of the 3rd International Workshop on Link Discovery, 36–43. Chi-
cago, IL: ACM.
Ali-Hasan, Noor F. and Lada A. Adamic
2007 Expressing social relationships on the blog through links and comments. In:
Proceedings of the International Conference on Weblogs and Social Media
(ICWSM). Boulder, CO. http://www.icwsm.org/papers/paper19.html
Argamon, Shlomo, Moshe Koppel, James W. Pennebaker, and Jonathan Schler
2007 Mining the blogosphere: Age, gender and the varieties of self-expression. First
Monday 12(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/
article/view/2003/1878
Armstrong, Laurie, Marsha Berry, and Reece Lamshed
2004 Blogs as electronic learning journals. e-Journal of Instructional Science
and Technology 7(1). http://www.usq.edu.au/electpub/e-jist/docs/Vol7_No1/
CurrentPractice/Blogs.htm
Askehave, Inger and Anne E. Nielsen
2005 Digital genres: A challenge to traditional genre theory. Information Technol-
ogy & People 18(2): 120–141.
Baltatzis, Patrick
2006 Is blogging innovating journalism? Innovation Journalism 3(4): 85–95.
Blood, Rebecca
2000 Weblogs: A history and perspective. Rebecca’s Pocket.
http://www.rebeccablood.net/essays/weblog_history.html
Blood, Rebecca
2002 The Weblog Handbook: Practical Advice on Creating and Maintaining your
Blog. Cambridge, MA: Perseus Publishing.
boyd, danah
2006 A blogger’s blog: Exploring the definition of a medium. Reconstruction 6(4).
http://reconstruction.eserver.org/064/boyd.shtml
boyd, danah, Scott Golder, and Gilad Lotan
2010 Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In: Pro-
ceedings of the 43rd Annual Hawaii International Conference on System
Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2010/3869/00/03–06–04.pdf
Brake, David
2007 Personal webloggers and their audiences: Who do they think they are talking
to? In: Marika Luders, Lin Prøitz, and Terja Rasmussen (eds.), Personlige

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
104 Cornelius Puschmann

Medier. Livet mellom skjermene (Personal Media. Life Between the Screens),
141–163. Oslo: Gyldendal.
Brown, Penelope and Stephen C. Levinson
1987 Politeness: Some Universals in Language Usage. Studies in Interactional So-
ciolinguistics 4. Cambridge/New York: Cambridge University Press.
Bruns, Axel and Joanne Jacobs
2006 Uses of Blogs. New York: Peter Lang.
Chung, Cindy and James W. Pennebaker
2007 The psychological function of function words. In: Klaus Fiedler (ed.), Social
Communication, 343–359. New York: Psychology Press.
Crystal, David
2006 Language and the Internet. London: Cambridge University Press.
Drezner, Daniel and Henry Farrell
2004 The power and politics of blogs. Paper presented at the American Political
Science Association, Chicago, IL, September 2–5.
http://www.utsc.utoronto.ca/~farrell/blogpaperfinal.pdf
Efimova, Lilia and Sebastian Fiedler
2004 Learning webs: Learning in weblog networks. In: Proceedings of the IADIS In-
ternational Conference Web Based Communities, 490–494. Vienna: INSO
Publications.
Efimova, Lilia and Jonathan Grudin
2007 Crossing boundaries: A case study of employee blogging. In: Proceedings of
the 40th Annual Hawaii International Conference on System Sciences, 86–99.
Los Alamitos, CA: IEEE Press.
Efimova, Lilia, Stephanie Hendrick, and Anjo Anjewierden
2005 Finding “the life between buildings”: An approach for defining a weblog com-
munity. In: Proceedings of Internet Research 6.0: Internet Generations.
https://doc.novay.nl/dsweb/Get/File-55092/AOIR_blog_communities.pdf
Ewins, Rory
2005 Who are you? Weblogs and academic identity. E-Learning 2(4): 368–377.
Garcia-Gomez, Antonio
2009 Teenage girls’ personal weblog writing: Truly a new gender discourse? In-
formation, Communication & Society 12(5): 611–638.
Goffman, Erving
1955 On face-work; an analysis of ritual elements in social interaction. Psychiatry
18(3): 213–231.
Gopal, Sucharita
2007 The evolving social geography of blogs. In: Harvey J. Miller (ed.), Societies
and Cities in the Age of Instant Access, 275–293. Berlin: Springer.
Grice, H. Paul
1989 Studies in the Way of Words. Cambridge, MA: Harvard University Press.
Gumbrecht, Michelle
2004 Blogs as “protected space”. In: Proceedings of the WWW 2004 Workshop on
the Weblogging Ecosystem: Aggregation, Analysis and Dynamics. New York.
http://www.blogpulse.com/papers/www2004gumbrecht.pdf
Gurak, Laura J. and Smiljana Antonijevic
2008 The psychology of blogging: You, me, and everyone in between. American Be-
havioral Scientist 52(1): 60–68.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 105

Herring, Susan C., Inna Kouper, Lois A. Scheidt, and Elijah L. Wright
2004 Women and children last: The discursive construction of weblogs. In: Laura J.
Gurak, Smiljana Antonijevic, Laurie Johnson, Clancy Ratliff, and Jessica Rey-
man (eds.), Into the Blogosphere: Rhetoric, Community, and Culture of Web-
logs [Internet volume].
http://blog.lib.umn.edu/blogosphere/women_and_children.html
Herring, Susan C. and John C. Paolillo
2006 Gender and genre variation in weblogs. Journal of Sociolinguistics 10(4):
439–459.
Herring, Susan C., Lois A. Scheidt, Sabrina Bonus, and Elijah L. Wright
2004 Bridging the gap: A genre analysis of weblogs. In: Proceedings of the 37th An-
nual Hawaii International Conference on System Sciences, 101–111. Los
Alamitos, CA: IEEE Press.
Herring, Susan C., Lois A. Scheidt, Sabrina Bonus, and Elijah L. Wright
2005 Weblogs as a bridging genre. Information Technology & People 18(2):
142–171.
Honeycutt, Courtenay and Susan C. Herring
2009 Beyond microblogging: Conversation and collaboration via Twitter. In: Pro-
ceedings of the 42nd Hawaii International Conference on System Sciences,
1–10. Los Alamitos, CA: IEEE Press.
Huffaker, David. A. and Sandra L. Calvert
2005 Gender, identity, and language use in teenage blogs. Journal of Computer-Me-
diated Communication 10(2), article 1.
http://jcmc.indiana.edu/vol10/issue2/huffaker.html
Jackson, Anne, JoAnne Yates, and Wanda Orlikowski
2007 Corporate blogging: Building community through persistent digital talk. In:
Proceedings of the 40th Annual Hawaii International Conference on System
Sciences, 80–97. Los Alamitos, CA: IEEE Press.
Java, Akshay, Xiodan Song, Tim Finin, and Belle Tseng
2007 Why we twitter: Understanding microblogging usage and communities. In:
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web
Mining and Social Network Analysis, 56–65. San Jose, CA: ACM.
Joinson, Adam N.
2008 Looking at, looking up or keeping up with people?: Motives and use of face-
book. In: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on
Human Factors in Computing Systems, 1027–1036. Florence, Italy: ACM.
Karlsson, Lena
2006 Acts of reading diary weblogs. Human IT 8(2): 1–59.
Kelleher, Tom and Barbara M. Miller
2006 Organizational blogs and the human voice: Relational strategies and relational
outcomes. Journal of Computer-Mediated Communication 11(2), article 1.
http://jcmc.indiana.edu/vol11/issue2/kelleher.html
Kouper, Inna
2010 The pragmatics of peer advice in a LiveJournal community. Language@Inter-
net 7, article 1.
http://www.languageatinternet.org/articles/2010/2464/index_html/

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
106 Cornelius Puschmann

Krishnamurthy, Sandeep
2002 The multidimensionality of blog conversations: The virtual enactment of Sep-
tember 11. Paper presented at Internet Research 3.0, Maastricht, The Nether-
lands, October.
Kutchera, Joe
2008 Navigate the blogosphere’s biggest ad networks. iMediaConnection.com. Sep-
tember 12. http://www.imediaconnection.com/content/20486.asp
Lenhart, Amanda and Susannah Fox
2006 Bloggers: A portrait of the Internet’s new storytellers. Pew Internet & American
Life Project, July 19. http://www.pewinternet.org/Reports/2006/Bloggers.aspx
Lenhart, Amanda, Kirsten Purcell, Aaron Smith, and Kathryn Zickuhr
2010 Social media and young adults. Pew Internet & American Life
Project, February 3. http://www.pewinternet.org/Reports/2010/Social-Media-
and-Young-Adults.aspx
Lomborg, Stine
2009 Navigating the blogosphere: Towards a genre-based typology of weblogs.
First Monday 14(5). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/
fm/article/viewArticle/2329/2178
McLean, Jennifer
2009 State of the blogosphere 2009. Technorati.com, October 19.
http://technorati.com/blogging/feature/state-of-the-blogosphere-2009/
McNeill, Laurie
2003 Teaching an old genre new tricks: The diary on the Internet. Biography 26(1):
24–47.
McNeill, Laurie
2005 Genre under construction: The diary on the Internet. Language@Internet 2, ar-
ticle 1. http://www.languageatinternet.org/articles/2005/120
Merriam-Webster
2004 Merriam-Webster announces 2004 words of the year. Merriam-Webster On-
line, November.
http://www.merriam-webster.com/info/pr/2004-words-of-year.htm
Miller, Carolyn R. and Dawn Shepherd
2004 Blogging as social action: A genre analysis of the weblog. In: Laura J. Gurak,
Smiljana Antonijevic, Laurie Johnson, Clancy Ratliff, and Jessica Reyman
(eds.), Into the Blogosphere: Rhetoric, Community, and Culture of Weblogs
[Internet volume]. http://blog.lib.umn.edu/blogosphere/blogging_as_social_
action_a_genre_analysis_of_the_weblog.html
Miller, Carolyn R. and Dawn Shepherd
2009 Questions for genre theory from the blogosphere. In: Janet Giltrow and Dieter
Stein (eds.), Genres in the Internet: Issues in the Theory of Genre, 263–290.
Amsterdam/Philadelphia: John Benjamins.
Mills, Sara
2003 Gender and Politeness. Studies in Interactional Sociolinguistics 17. Cam-
bridge/New York: Cambridge University Press.
Mishne, Gilad
2005 Experiments with mood classification in blog posts. In: Proceedings of ACM
SIGIR 2005 Workshop on Stylistic Analysis of Text for Information Access.
http://staff.science.uva.nl/~gilad/pubs/style2005-blogmoods.pdf

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
Blogging 107

Myers, Greg
2010 The Discourse of Blogs and Wikis. London: Continuum.
Nardi, Bonnie, Diane J. Schiano, and Michelle Gumbrecht
2004 Blogging as social activity, or, would you let 900 million people read your
diary? In: Proceedings of the 2004 ACM Conference on Computer Supported
Cooperative Work, 222–231. Chicago, IL: ACM.
Niles, Robert
2007 Are blogs a ‘parasitic’ medium? OJR: Online Journalism Review, March 2.
http://www.ojr.org/ojr/stories/070301niles/
Nilsson, Stephanie
2003 The function of language to facilitate and maintain social networks in research
weblogs. Unpublished manuscript, Umeå Universitet, Engelska lingvistik.
http://www.eng.umu.se/Stephanie/web/LanguageBlogs.pdf
Nowson, Scott, Jon Oberlander, and Alastair J. Gill
2005 Weblogs, genres and individual differences. In: Proceedings of the 27th An-
nual Conference of the Cognitive Science Society, 1666–1671.
Project for Excellence in Journalism
2008 The state of the news media 2008: An annual report on American journalism.
http://stateofthemedia.org/2008/
Peterson, Eric E.
2011 How conversational are weblogs? Language@Internet 8, article 8.
http://www.languageatinternet.org/articles/2011/Peterson
Puschmann, Cornelius
2009 Lies at Wal-Mart: Style and the subversion of genre in the Life at Wal-Mart
blog. In: Janet Giltrow and Dieter Stein (eds.), Genres in the Internet: Issues in
the Theory of Genre, 49–84. Amsterdam/Philadelphia: John Benjamins.
Puschmann, Cornelius
2010a The Corporate Blog as an Emerging Genre of Computer-Mediated Communi-
cation: Features, Constraints, Discourse Situation. Göttinger Schriften zur In-
ternetforschung. Göttingen: Universitätsverlag Göttingen.
Puschmann, Cornelius
2010b “Thank you for thinking we could”? – use and function of interpersonal pro-
nouns in corporate web logs. In: Heidrun Dorgeloh and Anja Wanner (eds.),
Approaches to Syntactic Variation and Genre,167–194. Berlin/New York: De
Gruyter Mouton.
Qian, Hua and Craig R. Scott
2007 Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated
Communication 12(4), article 14. http://jcmc.indiana.edu/vol12/issue4/qian.html
Rosenberg, Scott
2009 Say Everything: How Blogging Began, What It’s Becoming, and Why It
Matters. New York: Crown.
Russell, Adrienne and Nabil Echchaibi
2009 International Blogging: Identity, Politics and Networked Publics. New York:
Peter Lang.
Scheidt, Lois A.
2006 Adolescent diary weblogs and the unseen audience. In: David Buckingham
and Rebekah Willett (eds.), Digital Generations: Children, Young People and
New Media, 193–210. London: Lawrence Erlbaum.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
108 Cornelius Puschmann

Scheidt, Lois A.
2009 Diary weblogs as genre. Indiana University School of Library & Information
Science doctoral qualifying paper.
http://professional-lurker.com/linked/2008/quals/diary_weblog_genre.pdf
Schiano, Diane J., Bonnie Nardi, Michelle Gumbrecht, and Luke Swartz
2004 Blogging by the rest of us. In: Conference on Human Factors in Computing
Systems, 1143–1146.
http://home.comcast.net/~diane.schiano/CHI04.Blog.pdf
Schler, Jonathan, Moshe Koppel, Shlomo Argamon, and James W. Pennebaker
2006 Effects of age and gender on blogging. In: AAAI 2006 Spring Symposium on
Computational Approaches to Analysing Weblogs (AAAI–CAAW), 199–205.
Schlobinski, Peter and Torsten Siever
2005 Sprachliche und textuelle Aspekte in Weblogs. Ein internationales Projekt.
Networx, 46. http://www.mediensprache.net/de/networx/docs/networx-46.asp
Schmidt, Jan
2007 Blogging practices: An analytical framework. Journal of Computer-Mediated
Communication 12(4), article 13.
http://jcmc.indiana.edu/vol12/issue4/schmidt.html
Sprague, Robert
2007 Business blogs and commercial speech: A new analytical framework for the
21st Century. American Business Law Journal 44(1): 127–159.
Stefanone, Michael A. and Chyn-Yang Jang
2007 Writing for friends and family: The interpersonal nature of blogs. Journal of
Computer-Mediated Communication 13(1), article 7.
http://jcmc.indiana.edu/vol13/issue1/stefanone.html
Suzuki, Renata
2004 Diaries as introspective research tools: From Ashton-Warner to blogs.
TESL-EJ 8(1). http://www-writing.berkeley.edu:16080/TESl-EJ/ej29/int.html
Swales, John
1990 Genre Analysis: English in Academic and Research Settings. London: Cam-
bridge University Press.
Trammell, Kaye D.
2006 Blog offensive: An exploratory analysis of attacks published on campaign blog
posts from a political public relations perspective. Public Relations Review
32(4): 402–406.
Viégas, Fernanda B.
2005 Bloggers’ expectations of privacy and accountability: An initial survey. Jour-
nal of Computer-Mediated Communication 10(3), article 12.
http://jcmc.indiana.edu/vol10/issue3/viegas.html
White, David and Phillip Winn
2009 State of the blogosphere 2008. Technorati.com, August 21.
http://technorati.com/blogging/feature/state-of-the-blogosphere-2008/
Winer, David
2001 The history of weblogs. UserLand Software, September 9.
http://www.userland.com/theHistoryOfWeblogs

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 1:57 PM
5. Real-time chat
John C. Paolillo and Asta Zelenkauskaite

1. Introduction

Chat is a computer-mediated communication (CMC) mode in which users who are


simultaneously sharing a computer system exchange text messages. Messages tend
to be short, and they appear for users as soon as they are available. The immediate
display and consequent interchange of chat messages has an immediacy that has
been called “conversational” (hence “chat”), “interactive”, and “synchronous”, al-
though these terms have acquired distinct technical meanings. Chat may involve
two or more participants, with large chats sometimes having hundreds of partici-
pants. Technical protocols supporting chat are varied, so chat occurs in a broad
range of contexts, especially on the Internet, where it can be found in dedicated chat
networks such as Internet Relay Chat (IRC), associated with specific websites
via special chat “applets” or server scripts, integrated into general connection soft-
ware such as that provided by the United States Internet Service Provider AOL, as
part of multiplayer online games and virtual worlds such as World of Warcraft and
Second Life, or built into online courseware tools, among other places. The appli-
cations of chat are similarly varied, and its presence on the Internet is nearly ubi-
quitous. In this chapter, we primarily address multiparticipant text-based chat,
leaving dyadic forms of interactive CMC (e.g., instant messaging, ICQ) to be ad-
dressed elsewhere.
The interactive or conversational nature of chat, alongside its long-standing as-
sociation with recreational uses, makes chat interesting from a pragmatic perspec-
tive. As an interactive text-based form of discourse (Cherny 1999; Ferrara,
Brunner, and Whittemore 1991; Werry 1996), it invites linguists to speculate on
and test their assumptions about the relationship between linguistic form and com-
munication mode. The demands of real-time interaction constrain opportunities to
edit, and hence one might rely on more automatic processes than in writing (Reid
1991), although non-automatic processes might still be dominant (Zitzen and Stein
2004). Interaction in chat invokes the possibility of control or transfer of control of
the discourse via claiming and yielding the floor, turn-taking, repair, and other
mechanisms (Herring 1999; Herring and Nix 1997; Markman 2005; Rintel and Pit-
tam 1997; Schonfeldt and Golato 2003). In addition, multiparticipant chat, with
potentially larger numbers of participants than other modes of conversation, chal-
lenges theories of conversation management (cf. Dresner and Barak 2006). Finally,
chat users, their broad-ranging demographic backgrounds, and the numerous con-
texts and purposes of chat offer a range of linguistically relevant contextual vari-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
110 John C. Paolillo and Asta Zelenkauskaite

ation ripe for investigation (e.g., Androutsopoulos and Hinnenkamp 2001; Paolillo
2001; Siebenhaar 2006; Zelenkauskaite 2004). Codeswitching commands con-
siderable attention in chat research, as the research contexts are often international,
multilingual, and multicultural.
The linguistics and pragmatics literature often exhibits a somewhat coarse-
grained approach to chat. It is common to find general statements about chat lan-
guage, as if it were one monolithic entity (e.g., Crystal 2001; Ferrara et al. 1991).
However, as we explain in this chapter, chat has many different forms, with differ-
ent technical and social characteristics, which may be distinguished as different
modes of chat (Murray 1988; Herring 2001, 2002), i.e., conventional clusters of
social and technical features around which people orient. Different chat modes have
different pragmatic properties in a way that depends on the technical features of the
mode. The linguistic and other social science literature related to chat revolves
around the technical contributions to the types of interaction observed; indeed, it is
impossible to ignore the issues raised by technical features of chat. Hence, the ex-
position in this chapter foregrounds technical features of different chat modes as a
starting point for the framing of pragmatic research questions about chat.
In this chapter, we survey the current and past literature on chat, aiming to
highlight its pragmatics, to consolidate the evidence explaining the nature of chat,
and to indicate gaps in scholarly understanding needing to be addressed by future
research. We focus exclusively on multiparticipant text-based chat, as opposed to
instant messaging (discussed by Baron in this volume) or multimedia chat, and em-
phasize the central role of IRC as a historical reference point for different chat
modes.
This chapter is organized as follows. In the next section, we consider what chat
CMC modes have in common, following which we discuss specific modes of chat
in historical, social, and technical contexts to illustrate how its pragmatics varies
according to mode. In section three, we describe several pragmatic phenomena
associated with chat. Finally, we synthesize these findings to generalize about the
pragmatics of chat and identify a range of research questions that remain open for
investigation.

2. The technical and social nature of chat

On a technical level, chat is a synchronous form of CMC, meaning that participants


must be online at the same time to communicate. Chat communication is “one-
way” (Herring 2007) or “half duplex” (Cherny 1999), in that messages are only
transmitted when identified as complete by the user (by hitting return or enter),
instead of character-by-character as they are composed (“two-way” or “full du-
plex”). Chat is displayed with each user’s messages on separate lines, in the order
in which the messages were received by the system, each prefixed with the name of

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 111

the sending user. A chat display thus superficially reads like a dramatic script, a
format that easily represents multiparticipant as well as dyadic exchanges.
Chat is typically organized according to “chat rooms” or “chat channels”,
which delineate the bounds of participation. Users present in the room can partici-
pate; those not present or excluded from the room cannot. Chat rooms can be either
moderated, in which case moderators with special privileges control participation
in the chat room, or unmoderated. Chat rooms typically have an identifying title or
name, possibly indicating a specific geographic region, ethnicity, sub-cultural
group, hobby, fan group, or other affiliation. The name advertises a chat room to
potential participants with appropriate interests. A room may also have a “topic of
the day”, but the existence of a topic does not necessarily imply that users spend
time discussing it, and topics are sometimes used for other purposes, such as teas-
ing (e.g., Erickson 2000).
Chat participants have various options in representing their identities. Because
chat systems seldom require authentication, and users can choose any name for
themselves, users can easily conceal their off-line identities. Often users have
multiple nicknames, thus further obscuring identity. Anonymity may make users
more willing to reveal personal information; other times, play with identity permits
experimentation for personal or merely ludic reasons (Danet 1998, 2001; Danet,
Ruedenberg-Wright, and Rosenbaum-Tamari 1995).
The textual nature of chat means that information otherwise conveyed non-
verbally, such as intonation, facial expressions, and proxemics, must also be repre-
sented as text. Hence, chat uses textual paralinguistic cues, including repetition of
characters for emphasis (e.g., “nooooo!”), emoticons or smileys (e.g., “:-)” or “:)”
representing a rotated smiling face; “O.O” representing a wide-eyed stare), ASCII
art (e.g., “@>--,-’- ->--” and similar “rose” variants, often “given” to others; these
are generally assigned to hotkeys or pasted in from files), as well as specialized ab-
breviations (e.g., “lol” for “laugh out loud”). At times, these strategies are com-
bined: “lolololololololol”, for example, represents a sustained burst of laughter.
These features of chat language were among the earliest to receive scholarly atten-
tion (Danet et al. 1995; Werry 1996).
Chat communication thus encourages informal, spontaneous communication,
while the presence of multiple participants makes it more public than private.
Hence, chat interaction has much in common with casual social interaction at par-
ties or public settings. At the same time, its unusual structure and requirements for
interaction management, and the wide variation in its contexts and content, make
chat pragmatically complex.
Chat’s historical roots go back to the early 1970s, when timesharing computing
systems first became widespread. Such systems generally provided programs for
simultaneously connected users to communicate with one another. Early examples
of these facilities are programs like the Unix command write, which, as its name
suggests, writes a message directly to another user’s screen, and Unix talk and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
112 John C. Paolillo and Asta Zelenkauskaite

VAX phone, which provided a split-screen interface with full-duplex transmission


for two users to communicate. The system described in Ferrara et al. (1991) is es-
sentially a modified version of VAX phone. Most later versions of software for
synchronous communication, which become collectively known as “chat”, elimi-
nated both the split screen and character-by-character transmission in favor of a
scrolling script and one-way transmission.

2.1. MUDs and MOOs


Beginning in the late 1970s, the technical and social evolution of chat was in-
fluenced by designers of interactive fiction or “Adventure” games,1 through the de-
velopment of multiparticipant variants. These became known as “MUDs” (“multi-
user dimensions” or “multiuser dungeons”, after the Dungeons and Dragons game
they often emulated) or “MOOs” (“MUD object-oriented”,2 after the programming
language embedded in them). As multiuser computer environments, they permit
simultaneously connected users to interact via the system. This makes chat a cen-
tral feature of the environment. At the same time, they regulate who can interact
via chat according to the players’ state within the environment, such as their lo-
cations within the fantasy world (Cherny 1999).
While MUDs and MOOs were originally developed as games, users generally
observe a sharp distinction between MUDs/MOOs intended for gaming and those
intended for social interaction (“social MUDs/MOOs”), a use which came nearly a
full decade after the first MUDs. Users tend to have a strong preference for one or
the other type of interaction, but it is unclear to what extent the distinction plays a
role in the nature of MUD/MOO communication, e.g., linguistic pragmatics. Lin-
guistic distinctions are observed across different social MOOs (Cherny 1999) but
have yet to be demonstrated for the social/gaming distinction.3 Regardless, all
MUDs and MOOs have a set of features that reflect their origin in games. A user is
represented by a “character”, with a complex set of attributes (clothing, artifacts,
skills, magic, etc.) conveyed via textual descriptions displayed by appropriate
commands. The environment constrains what commands are available, and some
commands advance the narrative or game; e.g., “west” is a command to move one’s
character to the west, causing that room’s description to be displayed and the en-
vironment’s state to be altered. Unlike in other chat modes, communication is not a
default action; it requires an explicit command (e.g., “say”). A transcript showing
the results of some typical command types is given in (1), from Cherny (1999: 42).

(1) An example transcript from ElseMOO, a social MOO


Command type Displayed
(system message) 1 Karen arrives from the eastern end of the patio
emote 2 lynn waves
emote 3 Shelly waves

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 113

directed speech 4 ls [to Karen]: Hi. I just walked you here at your request,
since you’re in the car and nowhere near a computer on
the net.
emote 5 Penfold whuggles Karen.
emote 6 Tom eyes Karen warily.
emote 7 lynn eyes Karen and ls warily.
say 8 Tom says, “WHY”
say 9 ls says, “she, uh, thought it would be cool to hang out
with you guys.”

Example (1) illustrates the three most important messages types in chat. Line 1
represents a system message, triggered in response to events beyond any user’s im-
mediate control, as when someone enters of leaves a room. Lines 8 and 9 represent
the “say” command, used for normal communications among users, and lines 2, 3,
5, 6, and 7 represent “emotes”, also called “actions”. Emotes permit users to de-
scribe imagined activities in a third-person perspective, as in written fiction, and
the user’s text is displayed in a form distinct from that of “say”. Says and emotes
have different saliencies, and emotes are involved in many linguistic innovations,
e.g., those affecting the semantics of present tense inflection (Cherny 1999: 199ff).
Most chat systems support these three types of messages, though they may convey
them differently. Line 4 represents a directed speech command found in ElseMOO,
but not supported by all chat systems.
Many commands simplify typing commonly-used text through substitution
of ritualized elements. For example, in an emote, the user types “emote waves” (or
its shorthand equivalent “:waves”); the system substitutes the user’s name for the
command, so that it comes out “lynn waves”, as in line 2. (On the performative na-
ture of this usage, see Virtanen, this volume.) Since all commands produce text
after some suitable computation, MUDs and MOOs can permit extending the com-
mand set via “scripts” written in a computer programming language. Objects are
programmed in much the same way, as repositories of textual descriptions dis-
played using common commands (such as “get” and “drop”) or commands specific
to that object. Consequently, in MUDs and MOOs, but also in other chat environ-
ments, programming skill can be an important social resource, as it is necessary for
customizing the environment. The programmed nature of the text can also have
effects of its own on the nature of the language used in the chat environment
(Cherny 1999).
MUD and MOO culture is highly diverse, and the community has some sharp
social boundaries, even where they are regularly traversed (Cherny 1999: 33–38).
ElseMOO even has an abbreviation “tinflm” (“this is not fucking LambdaMOO”)
that is used to identify such boundaries of acceptable activity (LambdaMOO is a
large MOO originally established as a research project at Xerox PARC; ElseMOO
was formed by participants from LambdaMOO who tired of certain interactions

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
114 John C. Paolillo and Asta Zelenkauskaite

there, resulting in much sensitivity to boundaries as well as effort for their main-
tenance). In addition to the distinction between gaming and social interaction,
community divisions are found around other issues, such as the kind of fantasy per-
mitted. For example, in ElseMOO, characters with non-human descriptions were
prohibited, but these were common on LambdaMOO (Cherny 1999: 61). Lin-
guistic practices also vary within the community, and strong sanctions may be im-
posed for modes of expression marked as “outside” of whatever local group is con-
cerned (Cherny 1999: 93–95); on ElseMOO these include the abbreviated “r” and
“u” variants of “are” and “you” that are common elsewhere in chat.
While MUDs and MOOs no longer command the popularity that they once did,
most online games (as well as virtual worlds for social and educational purposes)
now support some form of chat as a standard feature, and the nature of that chat, its
relationship to programming, and its various practices draw heavily from chat in
MUDs and MOOs. Use of chat in online games such as World of Warcraft, for in-
stance, is a core gaming competence and an integral part of the gaming experience.

2.2. AOL chat


In the mid-1980s, online services for video gaming and personal computing began
to offer chat services to their customers.4 One such company was Control Video
Corporation, which later evolved into America OnLine (AOL), for which chat re-
mains a mainstay. As in MUDs and MOOs, AOL chat was part of a system of ser-
vices originally offered to video game aficionados. Consequently, AOL chat can be
considered to have been designed for recreational, rather than serious, uses. In the
1990s, many members of the general public were exposed to chat via AOL, whose
chat service was expanded to audiences beyond its original focus on video gaming.
AOL’s implementation of chat came with very tight top-down controls. Chat
rooms were created (and removed) by AOL, and a system of paid and volunteer
moderators was employed to regulate chat interaction. Almost all chat contexts
have explicit or implicit policies on what constitutes acceptable speech (neti-
quette); where AOL chat differs from normal practice elsewhere is that the policies
are set at a company-wide level, without direct user involvement. Enforcement of
AOL policies is sometimes controversial, as when an English-only policy was en-
forced on chat rooms discussing International Football (FIFA) in 1996.5 At the
time, AOL claimed they lacked moderators for the chat rooms fluent enough in
Spanish to filter out obscene comments.
AOL also promoted “celebrity chat”, in which an entertainment celebrity
“hosts” one or more chat sessions at scheduled times; additional moderators are
generally employed to filter the chat between ordinary subscribers and the celeb-
rity. These circumstances further highlight the asymmetric social roles in AOL
chat and have consequences for turn-taking and interaction management (cf. Beiß-
wenger 2007; Beißwenger and Storrer 2008).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 115

Figure 1. A screen shot of the IRC client mIRC connecting to the #beginner channel on
the Italian server irc2.tin.it (Zelenkauskaite 2004)

2.3. Internet Relay Chat (IRC)


In 1988, Jarkko Oikarinen released Internet Relay Chat (IRC) as an open source
program. Free distribution rapidly raised the visibility of multiparticipant chat:
Chat was freed from proprietary pay-per-use online services, and large, unbounded
networks of chat users (and associated computers) could be created. IRC thus be-
came a de facto standard against which other chat implementations are compared.
Figure 1 shows a screenshot of the IRC client mIRC connected to a channel on an
IRC server based in Italy.
IRC interaction is organized into “channels”, usually according to topic. Chan-
nels may be created by any user; the founding user is granted special privileges for
that channel by the system (known as “operator privileges” or “ops”), which allows
him or her to control participation in the channel by excluding (“kicking”, “ban-
ning”, or “muting”) users from the channel. Operators can in turn grant ops to
others as proxies. Channels may be created as private or public, as a further control
of visibility and participation. IRC servers are often connected into networks.
Channels and user identities are shared across servers in a network, and the pool of
participants and channels grows with network size to thousands of channels and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
116 John C. Paolillo and Asta Zelenkauskaite

participants. IRC networks thus function as enormous social markets. IRC also
permits direct client-to-client connections (DCC) where communications are
handled directly by participants’ computers, without involving the network. DCC
is used for private chat between two participants or for transfers of binary files such
as documents, images, and software. Other features, such as “actions”, resemble
the emote feature of MUDs and MOOs but are less sophisticated.
Unlike in MUDs and MOOs, user identities in IRC were not originally intended
to persist beyond a single user session. When a user connects to a server, s/he is
required to select a globally unique nickname (“nick”). However, nothing requires
a user to have the same nick in a subsequent session or prevents someone else
from using the same nick in a different episode. Users may also change their nicks
in mid-session, and users are even permitted to exchange nicks, sometimes leading
to playful exploitation of identity (Danet 1998). In general, however, users prefer
to maintain only a small number of nicks, in which they tend to become invested,
and impersonation often leads to the offender being banned.
While spatial metaphors and formal games are not a characteristic of IRC, pro-
grammed text and programming skills are common among users, especially since
clients are generally “scriptable” (i.e., programmed using a programming language
interpreter embedded in the client). Scripts can be unsophisticated, e.g., spitting
out random song lyrics or jokes from a file, or highly sophisticated, e.g., respond-
ing to specific events or typed text on a channel. The most sophisticated scripts are
known as “bots”, short for “robots”. Bots usually serve as a proxy for an operator
or a group of operators in their absence, permitting a clique of operators to assert
their presence on a channel round-the-clock (Paolillo 2001). This is often done on
large channels, where constantly-changing membership may lead to confusion
about who deserves to enforce speaking rights. Lack of a negotiated hierarchy of
operators can lead to “op wars”, where multiple contesting groups of operators dis-
rupt a channel’s participation and vie for its control. Hackers are frequent partici-
pants in op wars, sometimes instigating them as an anti-social form of amusement
(Paolillo 2001).
The social environment of IRC is thus hierarchically structured, but governed
by many layers of ad hoc technical and social arrangements. Channels have oper-
ators but exist on servers run by server owners, who have agreements with other
server owners, and who may be responsible to local computer administrators.
While hierarchical, these relations are informal and highly dynamic, sometimes
changing moment-to-moment according to the availability and/or status of partici-
pants. Power thus plays a major role in structuring chat interaction, although it may
arise in different ways. Among operators on IRC channels, mutual support cliques
exercise local power on a channel (Paolillo 2001). In educational settings, the in-
structor, who is institutionally empowered, functions also as moderator (Herring
and Nix 1997; Osman and Herring 2007). Network-wide, other administrators
using various forms of delegation may determine the roles that individual people

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 117

play in a chat environment and in what specific ways they are empowered. Some-
times these roles are negotiated within the chat context itself.
When private chat takes place on IRC, it occurs most commonly alongside pub-
lic chat. Each chat room has its own window, and chatters may participate in
multiple channels by switching windows. Consequently, IRC users often experi-
ence multiple levels of interaction while using chat, making “conversational multi-
tasking” a core pragmatic competence of chat (Dresner and Barak 2006). This fea-
ture is commonly carried over into other environments such as online games,
where distinct public, team, administrator and private chat channels are often pro-
vided (e.g., Herring, Kutz, Paolillo, and Zelenkauskaite 2009).

2.4. Other forms of chat


Closely related to chat are the instant messaging (IM) family of applications, such
as AOL Instant Messenger, Microsoft Live Messenger, Jabber, Yahoo Instant
Messenger, and ICQ (“I seek you”; see Baron, this volume). Clients and supported
features vary across these services, but common to them is the use of contact or
buddy lists and a lack of formal channel structure. Contact lists tend to indicate the
online status of potential participants via changes in the typography or icons along-
side each contact, thus replacing an important function of IRC system messages
with a less intrusive alternative. Lack of channel structure favors dyadic interac-
tion (although some systems allow multiple participants to be invited on a per-
session basis). A consequence of this is that IM conversations have a more private
nature, as opposed to IRC and MUD/MOO interaction, where others can almost al-
ways elect to enter the space in which someone else’s conversation occurs.
Multimedia chat is another important variety, especially with video. Video chat
originated with CU-SeeMe, which was an open-source application originally de-
veloped at Cornell University in 1993 (hence “CU”; Herring 2002). CU-SeeMe
functions like IRC in having central servers whose purpose is to facilitate connec-
tion between different individuals. The chief difference is the availability of a sim-
ultaneous video channel. Often, however, users would substitute a still picture for
the video and communicate only via the text chat, due to bandwidth limitations.
The principal uses of CU-SeeMe were social and phatic (Yates and Graddol 1996).
Today, video has been added to Instant Messaging and Internet telephony appli-
cations (such as Apple’s iChat and Skype), where text chat nonetheless remains an
important part of the CMC experience.
Web chat originated as an attempt to build interactive communication features
into web servers. Web chat can be easier for naive users, because it does not require
separate client software to run (all chat interaction takes place within a web
browser window). Web chat is technically heterogeneous and tends to offer fewer
features than IRC. Some services go so far as to connect the web chat interfaces to
specific IRC channels on selected networks. As a consequence it is harder to know

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
118 John C. Paolillo and Asta Zelenkauskaite

in any given instance of chat use what sort of interface experience a user might
have. The visual presentation of the chat, and what sorts of typographic enhance-
ment or multilingual script support are available, can vary from user to user in un-
known ways. This presents challenges to the analyst in understanding a user’s
chosen mode of expression on a given occasion.

2.5. Applications of chat


Chat has many different applications; these affect the nature of the language and in-
teraction that are observed when it is used. Although entertainment and “hanging
out” are the earliest and most ubiquitous uses of chat, and the norms developed in
these uses often color the nature of interaction experienced in other applications, chat
is not confined to recreational uses alone. Educational chat is one of the earliest “seri-
ous” applications of chat and also one of the most widely-studied (e.g., Herring
1999; Herring, Börner, and Swan 2003; Herring and Nix 1997; Jepson 2005; Kern
2006; Lam 2004; Murray 2000; Osman and Herring 2007). Educational chats em-
ploy MUD/MOO environments (Haynes and Holmevik 1998), IRC, online games,
and special-purpose applications (Barab et al. 2005; Stoerger, Herring, and Kouper
2007). The environments may be controlled and restricted to the members of the edu-
cational context, or in many cases, public, making use of widely-available servers.
Business applications of chat center on “virtual teams” (Pauleen and Yoong
2001). When tasks within an organization are assigned to groups whose members
are geographically distributed, chat is often an important mode of communication.
In corporate environments, issues such as task-orientation, reward structures, and
managerial monitoring of communications have a profound bearing on the com-
munication, in addition to issues of intercultural communication and cross-cultural
pragmatics (Jarvenpaa and Leidner 1999). Less formally-structured variants of the
virtual team also exist. For example, open-source software developer communities
often make extensive use of chat for providing instant technical help, for planning
and coordinating work, and for promoting esprit de corps among members of the
development team; the Freenode.net IRC network specializes in this kind of appli-
cation. Many of the issues involving hierarchical structure crop up in research on
open source and virtual teams, just as they do for recreational chat.
Chat is also used as a public face for institutions; online help, customer support
and library reference services are three major applications in this vein. Of these, on-
line library reference services have been studied most (Foley 2002; Shachaf 2008;
Shachaf, Oltmann, and Horowitz 2008). Institutional chat is sometimes treated as
property, access to which is only granted under license (e.g., for data mining). This
imposes a variety of pragmatically relevant conditions on the chat environment,
alongside an ideological regime of intellectual property ownership. Hence, prag-
matic research needs to consider carefully the larger context in which an appli-
cation of chat resides when seeking explanations for its linguistic characteristics.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 119

3. Pragmatic phenomena associated with chat

Chat is subject to tremendous technical and social variation, and the pragmatics of
chat interaction vary accordingly. This leads to the question: What determines the
pragmatic features of any instance of chat? Are they based on face-to-face conver-
sation, as suggested by Werry (1996), Reid (1991), and Zhang (2005)? Are they
based primarily on written modes, as suggested by Zitzen and Stein (2004)? Or do
they arise from the social and technical characteristics of the chat mode in some
way (Herring 2007)? While pragmatic phenomena vary in chat, certain ones are
commonly encountered. In this section, we describe some of these phenomena and
attempt to indicate which sorts of technical and social characteristics of the mode
bear on them.

3.1. Interaction management


The mechanics of conducting a conversation in chat are different from those in
other synchronous modes of communication such as telephony or face-to-face con-
versation. Hence, a substantial body of research examines interaction management
in chat in relation to greetings, turn-taking, interruption, and other conversational
mechanics (e.g., Beißwenger 2007).
Werry (1996) observed that there is a common practice on IRC of greeting
channel participants. However, Rintel, Mulholland, and Pittam (2001) concluded
that the meaning of opening greetings in a public channel can lead to several con-
trasting outcomes, which can either help to establish new relations or ruin them
even before the conversation begins.
Turn-taking in chat occurs without the benefit of users knowing what other
users are doing at a particular moment, e.g., whether an interlocutor is presently
reading or typing. Because reading and typing occur simultaneously and messages
are posted immediately as they are sent, an interlocutor may introduce new threads
before a previous one is finished. In multiparticipant chat, turn-taking becomes
even more complex, since everyone can react at the same time. Herring (1999) ob-
served this in the following exchange (2) from interleaved conversations on #pun-
jab, cited from Paolillo (2011).

(2) [1] <ashna> hi jatt


[2] *** Signoff: puja (EOF From client)
[3] <Dave-G> kally i was only joking around
[4] <Jatt> ashna: hello?
[5] <kally> dave-g it was funny
[6] <ashna> how are u jatt
[7] <LUCKMAN> ssa all
[8] <Dave-G> kally you da woman!
[9] <Jatt> ashna: do we know eachother?. I’m ok how are you

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
120 John C. Paolillo and Asta Zelenkauskaite

[10] *** LUCKMAN has left channel #PUNJAB


[11] *** LUCKMAN has joined channel #punjab
[12] <kally> dave-g good stuff:)
[13] <Jatt> kally: so hows school life, life in geneal, love
life, family life?
[14] <ashna> jatt no we don’t know each other, i fine
[15] <Jatt> ashna: where r ya from?
While potentially confusing on the surface, Herring (1999) analyzes this se-
quence as two relatively independent dyadic exchanges – one with ashna and Jatt,
the other with kally and Dave-G – whose turns happen to be interleaved with one
another. This situation can be schematized graphically, as in Figure 2.

Figure 2. Schematic representation of turn-taking in an IRC sample (from Herring, 1999)

Markman (2005) also observed that disrupted adjacency (what she calls “false
adjacency pairs”, 118) is a common consequence of chat interaction, especially
when multiple participants are involved, and several disjoint conversations can be
interleaved, sometimes with overlapping participation from common participants.
Messages in chat are ordered sequentially, depending on who hit the “send” button
in what order; users do not necessarily intend to interrupt one another when mes-
sages appear out of sequence. Users also must employ context to determine if a
turn was actually completed.
Despite such complexities, it appears that users are not actually confused but
manage to be engaged in several interactions simultaneously. Herring (1999) ex-
plained this contradictory tendency in terms of adaptation to the technological con-
straints or engagement in playful language exchanges. Dresner and Barak (2006)
describe this same tendency as a pragmatic competence for “conversational multi-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 121

tasking”. Various interface modifications, such as “threaded” displays of chat


(Smith, Cadiz, and Burkhalter 2000), have been proposed to facilitate such com-
petence, but they are not widely deployed, and their effect on chat interaction man-
agement is unknown. Since chat interaction unfolds in real time and participants
vary in number and skill, the pace of chat interactions can also vary greatly. Pacing
has consequences for what interactional strategies participants can use and how
they can orient to changes in the interaction.

3.2. International and intercultural contexts


During the rapid diffusion of the Internet in the 1990s, IRC emerged as a way for
people from different places in the world to gather and chat. The architecture of
IRC rapidly made it the largest chat network, embracing participants from more
than 70 countries (Werry 1996), with participants using many different languages
and coming from diverse cultural and geographic backgrounds.
Chat channels on IRC servers can draw participants either from a specific locale
or from an international network of participants; the linguistic backgrounds of par-
ticipants in local or international chat channels also vary accordingly. Channels re-
siding on local servers are primarily dedicated to local users who share a particular
language and/or culture, whereas channels residing on servers or networks hosting a
mixed user community make linguistic choice particularly important. Such channels
may be monolingual or multilingual, each one setting its own language policy, inde-
pendent of whatever server or network it resides on. On multilingual channels, users
must also manage interaction in multiple languages appropriately. Topics of chat
channels are similarly governed by the local or international context of the server:
Discussion topics on local chat servers are entirely nested within the choice of
server. On international and intercultural chat servers and networks, available chat
topics are typically not circumscribed as much by locale (Zelenkauskaite 2004).
Another phenomenon common in intercultural and international contexts is
codeswitching, i.e., the use of two or more languages side-by-side in communi-
cation. Codeswitching has many variant forms, from lexical borrowing to intra-
sentential mixing of two or more languages (Gumperz 1982). It is traditionally re-
garded as being limited to face-to-face communication; since its expression is stig-
matized among the bilinguals who engage in it, written forms of communication
induce metalinguistic reflections that amplify such stigmas and hence mitigate
codeswitching (Myers-Scotton 1993; Poplack 1993; Poplack and Meechan 1995).
Yet codeswitching of all types has been observed in a broad range of chat com-
munication, including German dialect-standard codeswitching in IRC (Androutso-
poulos and Ziegler 2003; Franke 2005; Siebenhaar 2006), Hindi-English and Pun-
jabi-English codeswitching in IRC (Paolillo 2001, 2011), codeswitching among
diasporic communities in Germany (Androutsopoulos 2003, 2006; Androutsopou-
los and Hinnenkamp 2001), Cantonese-English in ICQ (Carter and Fung 2007;

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
122 John C. Paolillo and Asta Zelenkauskaite

Fung and Carter 2007), Mandarin-English chat (Lotherington and Xu 2004; Su


2003), Swedish IRC and web chat (Sveningsson 2001), and Finnish-English chat
(Kotilainen 2002; Leppänen and Nikula 2007), among others. Where multiple
writing systems are potentially involved, technical issues again arise. When sup-
ported, chatting in multiple scripts can resemble the written practices of, e.g., use
of English loanwords in Mandarin, as in the following example from Su (2003).
(3) suggestion
‘From what I can recall, no one seemed to respond to Lily’s last suggestion~~~~’
Many chat codeswitching studies apply taxonomic categories, e.g., from Gum-
perz (1982), both for functions and forms of codeswitching. Codeswitching in
chat strongly resembles that in face-to-face communication. Observation of code-
switching has an important diagnostic role in chat, as its rate of occurrence is
highly sensitive to contextual variation, whether from the regional topic of a chat,
the age composition of its participants (Siebenhaar 2006), or the centrality of par-
ticipants in a social network (Paolillo 1999, 2001). Such contextual variation in
codeswitching is predicted by theories of face-to-face interaction, but it is rela-
tively easier to observe in chat, because of the variety of readily-accessible contex-
tually distinct chat channels on IRC, for example.

3.3. Orthography
Non-standard orthography was one of the earlier features to be recognized as char-
acteristic of chat language; it has been noted in various language contexts: English
(Werry 1996), French (Anis 1999), Spanish (Llisterri 2002), Swedish (Hård af Se-
gerstad 2000), Russian (Lamprecht 2000), Finnish (Kotilainen 2002), and Lithua-
nian, Croatian, and Italian (Zelenkauskaite 2004; Zelenkauskaite and Herring
2006). Three major types of orthographic variation have been found in IRC chat:
deletions or reductions, insertions, and substitutions. Deletion or reduction of char-
acters is often related to economy. Insertions may have an expressive motivation
(such as emphasis), as may substitutions.
Typographic errors are common in chat. These are distinct from other forms of
orthographic modification, in that they are recognized by the users who produce
them as errors, not reflecting their communicative intent. Users sometimes self-
correct by posting a new message, as in the following Lithuanian example (4) from
Zelenkauskaite (2004), in which a metathesis is repaired.6
(4) #alus: 712. <Mefisto> o jau galvoju kad mano meile be tasako …
#alus: 713. <Mefisto> atsako
[#alus: 712. <Mefisto> that my love will be without the ersponse]
[#alus: 713. <Mefisto> response]

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 123

Reduction is a common strategy that optimizes writing efficiency by eliminat-


ing characters from written forms that are not essential to the meaning, or whose
identity can be deciphered from the context. Different types of reduction are found,
with different linguistic characteristics, depending partly on language and partly
on other aspects of the context. The Croatian (5) and Italian (6) examples below,
from Zelenkauskaite (2004), illustrate reduction.
(5) #woodoo: 157. <pukla_> ajde macic mali budi dobar
#woodoo: 157. <pukla_> hajde macic mali budi dobar
[#woodoo: 157. <pukla_> come on, little kitty, be good]
(6) #warp9 177. <iEiazeL> si bhe nn importa
#warp9 177. <iEiazeL> si bhe non importa
[#warp9 177. <iEiazeL> yes, well, it does not matter]
Abbreviations are also common in chat, partly to conserve keystrokes as in re-
duction. A number of expressions have emerged that are widespread in, and some-
times specific to, chat. Typical English examples are lol (‘laugh out loud’), ttyl
(‘talk to you later’), and brb (‘be right back’). Others arise in specific contexts,
such as MUD chat (Cherny 1999) or online game chat (Herring et al. 2009). Pho-
netic writing is another common form of non-standard orthography in chat. This is
illustrated in example (7), from Cyrillic-based Russian IRC (Lamprecht 2000).
(7) Kab«zdoh: Klon, a pamoemu t« s lebedinskim gavaril
Kab«zdoh: Klon, po moemu t« s lebedinskim govoril
[Kab«zdoh: Klon, according to me, you talked with Lebedinski]
Finally, non-alphabetic symbols are often used in a variety of ways, whether as
variants of alphabetic symbols (e.g., zero substituting for “o”), as complements to
the roman alphabet for languages normally written in another, such as Arabic script
(Palfreyman and al Khalil 2003), or as logographs, as in the following Lithuanian
(8), Croatian (9), and Italian (10) examples from Zelenkauskaite (2004).
(8) #lithuania: 39. <sawlyte_N’> cew =]~ ir iki 6-ienio :*
#lithuania: 39. <sawlyte_N’> ciao =]~ ir iki šeštadienio :*
[#lithuania: 39. <sawlyte_N’> ciao, until Saturday :*]
(9) #banda: 209. <|Ch405|> ya0 jesam gl00p
#banda: 209. <|Ch405|> jao jesam glup
[#banda: 209. <|Ch405|> oh I am such a fool]
(10) #help: 348. <dok> ciao penelope 6 sparita eh
#help: 348. <dok> ciao penelope sei sparita eh
[#help: 348. <dok> Hi Penelope, you are gone, hey]

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
124 John C. Paolillo and Asta Zelenkauskaite

Substitutions are common across all languages observed. The following


example (11) from Italian, as reported by Zelenkauskaite (2004), exhibits another
common pattern, namely the repetition of a letter for expressive purposes.
(11) #ragepunk:258. <|Miss|> KE PALLE PORKO
DDIOOOOOOOOOOOOOOOOO …
#ragepunk:258. <|Miss|> CHE PALLE PORCO DIO
[#ragepunk:258. <|Miss|> it is so annoying, damn it]
All of the orthographic features mentioned above (and others) are variable, and
users adopt different attitudes to them, based in part of the usage of the features by
specific chat sub-cultures. Users draw inferences about the nature of their inter-
locutors from these linguistic manifestations (e.g., “child” versus “adult”, “hip” vs.
“square”, “insider” vs. “outsider”), and thus their use is pragmatically conditioned
as well. Orthographic variants are not always conventional, thus contextual inter-
pretation is necessary.

3.4. Gender
Gender differences in language are well established in speech (Coates 1993), but
because of the idea that CMC causes a leveling in context cues, potentially making
social distinctions like gender unimportant (e.g., Danet 1998), the case for gender
differences has had to be re-established for CMC (Herring 1992, 1993, 2003). In
MOO chat, Cherny (1994) uncovered a range of gender differences in the use of
emotes and specific actions. Notably, male participants tended to use fewer affec-
tionate actions than females and expressed them more frequently to inanimate and
abstract objects. Males also employed more physically violent imagery. Herring
(2003) observed similar gender differences in IRC, with males being more aggres-
sive and participating more actively, whereas women used more smilies and had
more instances of laughter. Despite some cases of gender-switching that have been
reported in chat environments (e.g., Danet 1998), the assumption in most gender
and CMC research is that online gender usually matches the writer’s offline gender,
on the grounds that it is difficult to fake subtle linguistic cues characteristic of fe-
male or male discourse for any sustained period of time (Herring 2003).
Gender differences in chat are not restricted to English-based chat. In a Thai
cultural setting, it was found that women participate more actively in public chat
and that women more often addressed turns to a specific next speaker and received
more responses by both females and males (Panyametheekul and Herring 2003). It
was also found that females would ask for and offer more email addresses to main-
tain further contacts, while men asked more direct questions and employed flirta-
tious communicative strategies more often.
In a study comparing Lithuanian and Croatian chat, gender differences in
orthography were found for specific diacritic symbols. There is a phonemic differ-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 125

ence between s/z/c and š/ž/č in both Lithuanian and Croatian; however, the IRC
protocol does not provide for the relevant symbols, hence users are forced to adapt.
Zelenkauskaite and Herring (2006) found that users adopted a strategy of using
either digraphs [sh]/[zh]/[ch] or monographs [s]/[z]/[c]; when analyzed by gender,
males used more digraphs than females.

4. Discussion and conclusions

We have illustrated in the above sections that chat is a highly diverse phenomenon,
both in its technical and social contexts, which shape the linguistic manifestations
of its expression. We have illustrated some of the more important linguistic mani-
festations of pragmatic phenomena in chat. Both the contextual aspect of chat and
its linguistic manifestations are rich and substantial areas of research, and valid ap-
proaches can be formulated that focus primarily on one aspect or the other. At the
same time, understanding the pragmatics of chat must go beyond taxonomy. His-
torical, human-computer interface, and linguistic principles all bear on the nature
and use of chat, and the respective roles of these principles need to be explicated in
relation to other modes of discourse. A clear understanding of these principles and
their relation can also help indicate areas in need of development for future re-
search.
An important concept throughout this chapter has been that of chat mode: a
conventional clustering of technical and social characteristics, whose status is
comparable to that of a genre in other forms of discourse (Glitrow and Stein 2009;
Herring 2001, 2002). As chat is multifaceted, there are many such clusters, and dis-
tinct chat modes need to be recognized. At the same time, these modes do not vary
arbitrarily from one another, and the mode is a strong predictor of the kinds of
pragmatic phenomena one may find in any particular instance of chat, as well as
their likely linguistic manifestations.
Chat modes can be divided into two main types, largely on technical grounds:
those which are bounded by a single server, such as MUDs/MOOs, many online
games, and web chat, and those which reside on networks, such as IRC, commer-
cial services such as AOL chat, and the instant messaging family of modes. The so-
cial consequence of this choice concerns the number of potential participants: Net-
worked servers tend to have a much larger pool of participants than isolated
servers. Conversely, isolated servers tend to permit more focalized interaction and
the development or reinforcement of local communities and norms. Thus, among
Internet-based chat modes, we have an analog of the weak-tie/strong-tie distinction
widely recognized in social network analysis (Granovetter 1973), where contacts
on isolated servers resemble strong ties, and those on networks resemble weak ties.
Other technical variables of a mode might also correlate with this distinction. For
example, multimedia modes such as video chat tend to favor connection to spe-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
126 John C. Paolillo and Asta Zelenkauskaite

cific individuals or small groups for specific intervals of time, rather than to large,
unbounded and ongoing interactions. The technical reason for this is the extreme
demands of sharing multimedia data in real time, which become increasingly se-
vere when participants are added. Text communication has the same complexity
problems, but because the amount of data associated with text is small, the system
can handle much larger numbers of people before problems of transmission vol-
ume are encountered. Hence, media type can also shape opportunities for social in-
teraction.
Linguistically, there are many consequences of this distinction. On one hand, a
larger pool of potential participants may draw from a broader range of national,
cultural, and linguistic backgrounds; hence the opportunities for linguistic and cul-
tural conflict, and the necessity to negotiate norms of interaction, are greater.
Weak-tie networks form effective mechanisms for the transmission of linguistic
and interactional patterns (Milroy 1992), and so observations of a phenomenon in
one part of the network are not likely to be independent of related events occurring
in other parts. Focalized communities, on the other hand, such as Cherny’s Else-
MOO (1999), are effective structures for the cultivation of distinctive identities, as
expressed through characteristic routines and/or modes of expression that do not
necessarily spread to other locations on the net. Hence, the situation of a chat mode
in the context of a broader network is the first dimension along which chat modes
appear to differ significantly.
Another distinction with similarly large pragmatic consequences is the degree
of choice users can exercise in customizing their chat environment. While custom-
izability in terms of computer programming is relevant and has a variety of effects,
the most important pragmatic aspect of this concerns the selection of potential par-
ticipants by users. Commercial services such as AOL offer the least user control
over participation by fixing in advance the number and type of available chat
rooms and placing power in the hands of corporately-appointed moderators to en-
force policies on appropriate speech. IRC goes largely in the other direction, by
allowing any user to create channels and vesting moderation power in the founding
user, to be delegated as s/he sees fit. At the other extreme is the IM cluster of
modes, where a user is required to select participants from a list of contacts. The
IM cluster acquires from this the characteristics of private interaction, which is not
invaded easily by arbitrary third parties, an opportunity that exists in the more pub-
lic IRC and AOL chat modes.
These two dimensions of variation in chat modes make predictions about what
might be observed in chat contexts that have not yet received extensive study. For
example, online games vary in the degree of user versus corporate control, and
hence, chat in those environments is predicted to be shaped accordingly. World of
Warcraft, a swords-and-sorcery game produced by Blizzard Entertainment, has a
game environment with strict corporate control; its game spaces are structured in
advance, and it employs its own moderators to enforce acceptable speech policies

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 127

in the same way as AOL. BZFlag, an open source tank-battle game supported by a
loose federation of independent developers and fans (Herring et al. 2009), is more
like IRC in its delegation of policies and enforcement to individual server owners
and administrators. A prediction from this is that the pragmatics of chat in these
two games, e.g., in the exercise of power in turn-taking and interaction manage-
ment, will differ in ways similar to that found between AOL chat and IRC. This is
one area in which further study of chat modes would be potentially instructive.
Another area for future investigation concerns the ongoing convergence across
media types, represented by the incorporation of chat into various technologies
such as websites, interactive television programming, online games, multimedia
platforms, and telephony applications, among others. Wherever media are chang-
ing, text chat, or something very much like it, seems to appear. To what extent are
the pragmatic characteristics of chat (as found in dedicated applications such as
IRC) carried over into these convergent media? When chat spreads to a convergent
media context, where does it get its pragmatic features from? The studies cited in
this chapter provide some indicators, along with the dimensions of variation
among chat modes described above, but additional research is still needed.
Further research remains to be done in other areas of the pragmatics of chat as
well. More yet needs to be said about medium effects with respect to chat lan-
guage. Existing work, both in design of systems and in cognitive psychological
studies of their effects, are informative, but additional research is needed into the
social effects of the technological medium features, especially beyond local issues
of turn-taking and interaction management. Analyses addressing the global organ-
ization and coherence of conversations in chat, such as those using Dynamic Topic
Analysis (Herring 1999; Herring and Nix 1997; Herring et al. 2009), could do
much to illuminate the ways in which chat functions for actual communication.
The international and intercultural dimensions of chat also deserve more atten-
tion. Today, with the widespread use of IRC and online games, chat is a vehicle of
continuous, large-scale intercultural and cross-linguistic contact, and issues of lan-
guage status, dominance, and conflict have already surfaced in many studies. The
understanding of language contact dynamics stands to gain much from close atten-
tion to chat and its role in the evolving online world. The nature of the social net-
works established in chat and their relationship to off-line and other social net-
works is a major area of potential study that is also related to the foregoing issues.
Its importance to linguistic pragmatics is that the social network offers a different
way of representing and investigating the social context from the approaches of the
past, and so more thorough incorporation of this into research can have an in-
fluence not only on understandings of the pragmatics of chat and CMC, but also on
understandings of social context in linguistic pragmatics more generally.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
128 John C. Paolillo and Asta Zelenkauskaite

Notes
1. The game program Adventure (or ADVENT) written for PDP-10 by William Crowther at
BBN in 1975 is generally recognized as the first in the genre of interactive fiction. The
first MUD was written in 1978 by Roy Trubshaw at Essex University, UK.
2. The acronym MOO is recursive, like many other acronyms in the field of computing.
3. MUDs/MOOs are also used for education, and educational MUDs/MOOs are typically
recognized as a third type, distinct from social and gaming MUDs/MOOs.
4. Instant messaging and ICQ are both later developments that were not part of this offering.
5. The language regulation was dropped after one week.
6. In the examples that follow, the first line shows the text as it was originally typed; the
second line shows the same text with standard spelling; and the third line is a free English
translation. In each line, the expressions in focus are in boldface.

References
Androutsopoulos, Jannis K.
2003 Online-Gemeinschaften und Sprachvariation. Soziolinguistische Perspektiven
auf Sprache im Internet. [Online communities and language variation. Socio-
linguistic perspectives on language in the Internet.] Zeitschrift für germanisti-
sche Linguistik 31(2): 173–197.
Androutsopoulos, Jannis K.
2006 Multilingualism, diaspora, and the Internet: Codes and identities on German-
based diaspora websites. Journal of Sociolinguistics 10: 520–547.
Androutsopoulos, Jannis K. and Volker Hinnenkamp
2001 Code-Switching in der bilingualen Chat-Kommunikation: ein explorativer
Blick auf #hellas und #turks. In: Michael Beißwenger (ed.), Chat-Kommuni-
kation: Sprache, Interaktion, Sozialität & Identität in synchroner computer-
vermittelter Kommunikation, 367–402. Stuttgart: Ibidem.
Androutsopoulos, Jannis K. and Evelyn Ziegler
2003 Sprachvariation und Internet: Regionalismen in einer Chat-Gemeinschaft. In:
Jannis Androutsopoulos and Evelyn Ziegler (eds.), Standardfragen: Soziolin-
guistische Perspektiven auf Sprachgeschichte, Sprachkontakt und Sprach-
variation, 251–279. Frankfurt am Main: Peter Lang.
Anis, Jacques
1999 Chats et usages graphiques. In: Jacques Anis (ed.), Internet, communication et
langue française, 74–90. Paris: Hermes.
Barab, Sasha, Michael Thomas, Tyler Dodge, Robert Carteaux, and Hakan Tuzun
2005 Making learning fun: Quest Atlantis, a game without guns. Educational Tech-
nology Research and Development 53(1): 86–107.
Beißwenger, Michael
2007 Sprachhandlungskoordination in der Chat-Kommunikation. Berlin: de Gruyter.
Beißwenger, Michael and Angelika Storrer
2008 Corpora of computer-mediated communication. In: Anke Lüdeling and Merja
Kytö (eds.), Corpus Linguistics: An International Handbook, 292–309. Berlin:
Mouton de Gruyter.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 129

Carter, Ronald and Loretta Fung


2007 New varieties, new creativities: ICQ and English-Cantonese e-discourse. Lan-
guage and Literature 16: 345–366.
Cherny, Lynn
1994 Gender differences in a text-based virtual reality. In: Mary Bucholtz, Anita
Liang, Laurel Sutton, and Christine Hines (eds.), Communicating In, Through
and Across Cultures: Proceedings of the Third Berkeley Women and Lan-
guage Conference, 102–115. Berkeley, CA: Berkeley Women and Language
Group.
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford, CA: CSLI
Publications.
Coates, Jennifer
1993 Women, Men and Language. London: Longman.
Crystal, David
2001 Language and the Internet. Cambridge, UK: Cambridge University Press.
Danet, Brenda
1998 Text as mask: Gender, play and performance on the Internet. In: Steven G.
Jones (ed.), Cybersociety 2.0, 129–158. Thousand Oaks, CA: Sage.
Danet, Brenda
2001 Cyberpl@y: Communicating Online. London: Berg.
Danet, Brenda, Lucia Ruedenberg-Wright, and Yehudit Rosenbaum-Tamari
1995 “Hmmm … where’s that smoke coming from?” Writing, play and performance
on Internet Relay Chat. Journal of Computer-Mediated Communication 2(4).
http://jcmc.indiana.edu/vol2/issue4/danet.html
Dresner, Eli and Segev Barak
2006 Conversational multitasking in interactive written discourse as a communi-
cation competence. Communication Reports 19: 70–78.
Erickson, Thomas
2000 Making sense of computer-mediated communication (CMC): Conversations
as genres, CMC systems as genre ecologies. In: Proceedings of the Thirty-
Third Hawaii International Conference on Systems Science. Los Alamitos,
CA: IEEE Computer Society Press. http://csdl.computer.org/dl/proceedings/
hicss/2000/0493/03/04933011.pdf
Ferrara, Kathleen, Hans Brunner, and Greg Whittemore
1991 Interactive written discourse as an emergent register. Written Communication
8: 8–33.
Foley, Marianne
2002 Instant Messaging reference in an academic library: A case study. College and
Research Libraries 63: 36–45.
Franke, Katharina
2005 Language variation in #berlin. Networx 48. http://www.mediensprache.net/de/
networx/docs/networx-48.asp
Fung, Loretta and Ronald Carter
2007 Cantonese e-discourse: A new hybrid variety of English. Multilingua 26:
35–66.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
130 John C. Paolillo and Asta Zelenkauskaite

Giltrow, Janet and Dieter Stein (eds.)


2009 Genres in the Internet: Issues in the Theory of Genre. Amsterdam/Philadelp-
hia: John Benjamins.
Granovetter, Mark
1973 The strength of weak ties. American Journal of Sociology 78: 1360–1380.
Gumperz, John J.
1982 Discourse Strategies. Cambridge, UK: Cambridge University Press.
Hård af Segerstad, Ylva
2000 Swedish chat rooms. M/C: A Journal of Media and Culture 3(4).
http://journal.media-culture.org.au/0008/swedish.php
Haynes, Cynthia and Jan Rune Holmevik (eds).
1998 High Wired: On the Design, Use and Theory of Educational MOOs. Ann
Arbor, MI: The University of Michigan Press.
Herring, Susan C.
1992 Gender and participation in computer-mediated linguistic discourse. Wash-
ington, D.C.: ERIC Clearinghouse on Languages and Linguistics, document
ED345552. http://ella.slis.indiana.edu/~herring/participation.1992.pdf
Herring, Susan C.
1993 Gender and democracy in computer-mediated communication. Electronic
Journal of Communication 3(2). http://www.cios.org/EJCPUBLIC/003/2/
00328.HTML
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi Hamilton (eds.), The Handbook of Discourse Analysis, 612–634. Ox-
ford, UK: Blackwell.
Herring, Susan C.
2002 Computer-mediated communication on the Internet. Annual Review of In-
formation Science and Technology 36: 109–168.
Herring, Susan C.
2003 Gender and power in online communication. In: Janet Holmes and Miriam
Meyerhoff (eds.), The Handbook of Language and Gender, 202–228. Oxford,
UK: Blackwell.
Herring, Susan C.
2007 A faceted classification scheme for of computer-mediated discourse.
Language@Internet 4, article 1.
http://www.languageatinternet.org/articles/2007/761/index_html/
Herring, Susan C., Katy Börner, and Margaret Swan
2003 When rich media are opaque: Spatial reference in a 3-D virtual world. Unpub-
lished manuscript, Indiana University.
Herring, Susan C., Daniel Kutz, John C. Paolillo, and Asta Zelenkauskaite
2009 Fast talking, fast shooting: Text chat in an online first-person game. In: Pro-
ceedings of the 42nd Hawaii International Conference on System Sciences. Los
Alamitos, CA: IEEE Computer Society Press.
http://csdl.computer.org/dl/proceedings/hicss/2009/3450/00/03-05-04.pdf

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 131

Herring, Susan C. and Carole G. Nix


1997 Is “serious chat” an oxymoron? Academic vs. social uses of Internet Relay
Chat. Paper presented at the American Association of Applied Linguistics, Or-
lando, FL, March 11. http://ella.slis.indiana.edu/~herring/aaal.1997.pdf
Jarvenpaa, Sirkka L. and Dorothy E. Leidner
1999 Communication and trust in global virtual teams. Organization Science 10(6):
791–815.
Jepson, Kevin
2005 Conversations – and negotiated interaction – in text and voice chat rooms. Lan-
guage Learning and Technology 9(3): 79–98.
Kern, Richard
2006 Perspectives on technology in learning and teaching languages. TESOL
Quarterly 40: 183–210.
Kotilainen, Lari
2002 “Moi taas, ai äm päk: Lauseet, tilanteet ja englanti suomenkielisessä chat-kes-
kustelussa” [Hello again, I’m back: Sentences, situations and English in Finn-
ish chat.] In: Ilona Herlin, Jyrki Kalliokoski, Lari Kotilainen, and Tiina Onik-
ki-Rantajääskö (eds.), Äidinkielen Merkitykset [The Meanings of the Mother
Tongue], 191–209. Helsinki: Suomalaisen Kirjallisuuden Seura.
Lam, Wan Shun Eva
2004 Second language socialization in a bilingual chat room: Global and local con-
siderations. Language Learning and Technology 8(3): 44–65.
Lamprecht, Rolf-Rainer
2000 Kommunikationspraxen im Internet und ihre textuellen Realisierungen. In:
Wolf-Dieter Krause (ed.), Textsorten im Russischen, 144–171. Frankfurt am
Main: Peter Lang.
Leppänen, Sirpa and Tarja Nikula
2007 Diverse uses of English in Finnish society: Discourse-pragmatic insights into
media, educational and business contexts. Multilingua 26(4): 333–380.
Llisterri, Joaquim
2002 Marcas fonéticas de la oralidad en la lengua de los chats: Elisiones y epéntesis
consonánticas. Revista de investigatión Lingüística 2(5): 61–100.
Lotherington, Heather and Yejun Xu
2004 How to chat in English and Chinese: Emerging digital language conventions.
ReCALL 16: 308–329.
Markman, Kris M.
2005 To send or not to send: Turn construction in computer-mediated chat. Texas
Linguistic Forum 48: 115–124.
Milroy, James
1992 Linguistic Variation and Change. Oxford, UK: Blackwell.
Murray, Denise
1988 The context of oral and written language: A framework for mode and medium
switching. Language in Society 17: 351–373.
Murray, Denise
2000 Protean communication: The language of computer-mediated communication.
TESOL Quarterly 34: 397–421.
Myers-Scotton, Carol
1993 Social Motivations for Codeswitching. Oxford, UK: Oxford University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
132 John C. Paolillo and Asta Zelenkauskaite

Osman, Gihan and Susan C. Herring


2007 Interaction, facilitation, and deep learning in cross-cultural chat: A case study.
The Internet and Higher Education 10: 125–141.
Palfreyman, David and Muhamed al Khalil
2003 “A funky language for teenzz to use”: Representing Gulf Arabic in Instant
Messaging. Journal of Computer-Mediated Communication 9(3).
http://jcmc.indiana.edu/vol9/issue1/palfreyman.html
Panyametheekul, Siriporn and Susan C. Herring
2003 Gender and turn allocation in a Thai chat room. Journal of Computer-Mediated
Communication 9(1). http://jcmc.indiana.edu/vol9/issue1/panya_herring.html
Paolillo, John C.
1999 The virtual speech community: Social network and language variation on IRC.
Journal of Computer-Mediated Communication 4(4). http://jcmc.indiana.edu/
vol4/issue4/paolillo.html
Paolillo, John C.
2001 Language variation in the virtual speech community: A social network ap-
proach to Internet Relay Chat. Journal of Sociolinguistics 5(2): 180–213.
Paolillo, John C.
2011 “Conversational” codeswitching on Usenet and Internet Relay Chat. Lan-
guage@Internet 8, article 3.
http://www.languageatinternet.org/articles/2011/Paolillo
Pauleen, David J. and Pak Yoong
2001 Facilitating virtual team relationships via Internet and conventional communi-
cation channels. Internet Research 11(3): 190–202.
Poplack, Shana
1993 Variation theory and language contact: Concept, methods and data. In: Dennis
Preston (ed.), American Dialect Research, 251–286. Amsterdam/Philadelphia:
John Benjamins.
Poplack, Shana and Marjory Meechan
1995 Patterns of language mixture: Nominal structure in Wolof-French and Fongbe-
French bilingual discourse. In: Leslie Milroy and Pieter Muysken (eds.), One
Speaker, Two Languages, 199–232. Cambridge, UK: Cambridge University Press.
Reid, Elizabeth
1991 Electropolis: Communication and community on Internet relay Chat. Senior
honours thesis, University of Melbourne, Australia.
Rintel, E. Sean and Jeffery Pittam
1997 Strangers in a strange land: Interaction management on Internet Relay Chat.
Human Communication Research 23: 507–534.
Rintel, E. Sean, Joan Mulholland, and Jeffery Pittam
2001 First things first: Internet Relay Chat Openings. Journal of Computer-Mediated
Communication 6(3). http://jcmc.indiana.edu/vol6/issue3/rintel.html
Schonfeldt, Juliane and Andrea Golato
2003 Repair in chats: A conversation analytic approach. Research on Language and
Social Interaction 36(3): 241–284.
Shachaf, Pnina
2008 Cultural diversity and information and communication technology impacts on
global virtual teams: An exploratory study. Information and Management
45(2): 131–142.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
Real-time chat 133

Shachaf, Pnina, Shannon M. Oltmann, and Sarah Horowitz


2008 Service equality in virtual reference. Journal of the American Society for In-
formation Science and Technology 59(4): 535–550.
Siebenhaar, Beat
2006 Code choice and code-switching in Swiss-German Internet Relay Chat rooms.
Journal of Sociolinguistics 10(4): 481–506.
Smith, Marc A., JJ Cadiz, and Byron Burkhalter
2000 Conversation trees and threaded chats. In: Proceedings of the 2000 ACM Con-
ference on Computer Supported Cooperative Work, 97–105. New York, NY:
ACM.
Stoerger, Sharon, Susan C. Herring, and Inna Kouper
2007 “Great job, Quester!” Assessing language skills on Quest Atlantis. Texas
Linguistics Forum 50. http://studentorgs.utexas.edu/salsa/proceedings/2006/
Stoerger.pdf
Su, Hsi-Yao
2003 The multilingual and multi-orthographic Taiwan-based Internet: Creative uses
of writing systems on college-affiliated BBSs. Journal of Computer-Mediated
Communication 9(1). http://jcmc.indiana.edu/vol9/issue1/su.html
Sveningsson, Malin
2001 Creating a Sense of Community: Experiences from a Swedish Web chat. [Ph.D.
dissertation.] Linköping: Linköping Studies in Art and Science.
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
Yates, Simeon J. and David Graddol
1996 “I read this chat is heavy:” The discursive construction of identity in CMC.
Paper presented at the 5th International Pragmatics Conference, Mexico City,
July.
Zelenkauskaite, Asta
2004 Lietuviškuu˛, itališku˛ ir kroatišku˛ internetiniu˛ pokalbiu˛ rašyba. [Lithuanian,
Italian, and Croatian written chat on the Internet.] Unpublished M.A. thesis,
Vilnius University.
Zelenkauskaite, Asta and Susan C. Herring
2006 Gender encoding of typographical elements in Lithuanian and Croatian IRC.
In: Fay Sudweeks and Charles Ess (eds.), Proceedings of Cultural Attitudes
Towards Technology and Culture 2006 (CATaC’06), 474–489. Murdoch, Aus-
tralia: Murdoch University Press.
Zhang, Yongfang
2005 Pragmatic analysis of Internet Relay Chat. China Science and Technology In-
formation 15: 229–230, 232.
Zitzen, Michaela and Dieter Stein
2004 Chat conversation: A case of transmedial stability? Linguistics 42(5):
983–1021.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
134 John C. Paolillo and Asta Zelenkauskaite

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:05 PM
6. Instant messaging
Naomi S. Baron

1. Introduction

The phrase “instant messaging” (IM) typically refers to a form of computer-


mediated communication (CMC) created on a computer, involving two parties, and
in real time (synchronously). By contrast, other forms of electronically-mediated
communication (e.g., email, text messaging) were designed for asynchronous ex-
change, meaning senders cannot assume an immediate response.

1.1. Historical roots of IM


IM, as we know it today, emerged in two stages. First, synchronous one-to-one
messaging systems running on mainframe or minicomputers began to appear by
the1980s on a number of American university campuses and research sites, with
the development of UNIX applications such as “talk”, “ytalk”, and “ntalk” and the
Zephyr notification system created through Project Athena at the Massachusetts
Institute of Technology.1 The term “instant messaging” was not yet in use. Initially,
messages could only be sent between people on the same computer system, and
communication was only between two people. Over time, multi-person messaging
became available, as did communication with individuals on other computer net-
works. Unlike modern IM clients, early versions such as UNIX “talk” transmitted
one keystroke at a time (visible to the recipient), rather than sending the completed
message all at once. Using split screens, the programs placed the sender’s output in
one screen and the recipient’s in another (Herring 2007).
In the second stage, in the late 1990s, one-to-one messaging become wide-
spread, thanks largely to Mirabilis Ltd’s ICQ (“I Seek You”)2 and to America On-
line (especially AIM, i.e., AOL Instant Messenger). ICQ, launched in 1996, was
purchased by AOL in 1998. ICQ gained popularity in Europe and Asia, while AIM
dominated much of the United States. Over the next decade, other players in the IM
market included Yahoo! Messenger, MSN Messenger, and Google Talk. Wide-
spread adoption of IM in North America was fanned by the ubiquity of personal
computers in homes and offices, increased access to broadband, and, until recently,
minimal use of text messaging on mobile phones. With Microsoft’s release of
Windows XP, Microsoft’s IM client (now known as “Windows Messenger” or
“Windows Live Messenger”) supplanted ICQ in parts of the world.3

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
136 Naomi S. Baron

1.2. Evolution of IM functions and platforms


Since the late 1990s, modern PC-based IM clients such as AIM and Windows
Messenger have continued to add new features. For examples, multi-person chats
are now commonly available, as are options for voice communication (using
Voice-over-Internet protocols [VoIP]) and video. Users can now be logged on to
IM but “lurk”, rendering them invisible to members of their buddy list. IM has also
been incorporated into other computer platforms, especially commercial web sites,
offering clients opportunities for live “chat” with customer representatives.
Another type of evolution has been in the conditions under which IM is used,
which sometimes compromise the notion of “instant” (i.e., synchronous) com-
munication. Young people commonly conduct several IM conversations simulta-
neously or do IM while engaged in another task, such as talking on the telephone or
searching the web (see section 3.3). Consequently, interlocutors do not always re-
spond to messages immediately, rendering the medium more like asynchronous
email or text messaging.
Other online and mobile technologies have been encroaching on the communi-
cation space IM dominated (at least in the United States) up through the mid-2000s.
Increased connection speeds have made some email nearly “instant”. VoIP pro-
grams such as Skype now include “chat” (i.e., IM) functions, rendering separate
IM clients such as AIM unnecessary. Similarly, as Facebook functions multiplied,
early communication tools such as Facebook messages (essentially, email) were
augmented by status updates (in 2006) and then synchronous chat (in 2008).4
Equally-importantly for the status of IM in the U.S. has been the rapid growth
of text messaging on mobile phones during the second half of the 2000s. Between
2005 and 2008, the average number of text messages sent monthly soared from
7.25 billion to 75 billion.5 During the same period, in Europe, where text messag-
ing had been firmly entrenched for over than a decade, IM grew.6

1.3. Overview of the chapter


This chapter continues (section 2) by outlining the parameters of IM as a communi-
cation medium, considering features that users can manipulate. Section 3 presents
an overview of IM research. Section 4 looks at the construction of IM away mess-
ages and IM conversations. Central themes include conversational composition,
lexical issues, utterance breaks, and gender issues. Section 5 explores user choice
between IM and other mediated communication technologies, while section 6 con-
siders the future of IM.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 137

2. Defining the medium

2.1. Operational features of IM clients


Most IM clients offer suites of features that users can manipulate, beyond creating
written “conversations”. For example, users can customize graphic presentation,
including choosing colors, font style and size, and sometime a visual “theme” for
their messages (e.g., soccer, a popular band). Users are also invited to represent
themselves in a variety of ways. One is to create a personal profile containing such
items as contact information, birth date and hometown, and favorite quotations,
books, or movies. A second is to design a visual self-representation through
photographs or avatars. Third, users can create away messages, a feature originally
designed to indicate temporary absence from the computer (see section 4.1).
IM facilitates interaction through brief written exchanges. IM clients signal
one’s availability to communicate once a person logs on to the system. While some
businesses using IM for employee communication announce this availability to
everyone in the organization, personal IM systems invite users to create buddy lists
defining a circle of friends with whom to share information about one’s availability
and (optionally) whereabouts. Originally, users could only send messages when
they and their desired interlocutor were both online, although other options have
since been introduced. While buddies have access to one’s away messages, users
may temporarily block individuals on their buddy list, making it appear that the
user is offline (and therefore away messages are not viewable).

2.2. Pragmatic issues in IM


If, following Levinson (1983: 9), we define pragmatics as “the study of those rela-
tionships between language and context that are … encoded in the structure of a
language”, then a pragmatic analysis of IM leads us to examine not just the lin-
guistic make-up of messages but the meaning they have for actual senders and re-
cipients. With a few exceptions (e.g., Nastri, Peña, and Hancock 2006), IM re-
search has focused on the interpersonal dynamics or the linguistic nuts-and-bolts
of IM, rather than viewing data through the lens of pragmatics. Nonetheless, lin-
guistic pragmatics offers useful tools for conceptualizing – and for understanding –
context that lends meaning to IM as mediated communication. Concepts that prove
particularly relevant include:
– Speech act theory
– Grice’s conversational maxims (including issues of deception)
– Notions of implicature
– Aspects of conversational analysis, including turn-taking, interruptions, con-
versational repair, conversational closings, and politeness
In the course of this chapter, pragmatic issues relevant to IM will be noted.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
138 Naomi S. Baron

3. Overview of IM research

Many studies have focused on IM as a medium for social interaction. In this sec-
tion, research is reviewed involving use of IM between peers (especially young
people) and as a tool in the workplace. I also consider the social implications of
using IM while multitasking. Discussion of how IM away messages and conver-
sations are constructed appears in section 4.
As IM tools (and alternative communication media) evolve, it can be antici-
pated that future studies may generate different empirical results. However, vari-
ables identified in existing research (e.g., age, gender, linguistic creativity, speech
acts performed, strategies for controlling conversational flow) are likely to remain
important.

3.1. Tool for communication among adolescents and young adults


Within the U.S., young people have been heavy users of IM. American teenage
usage patterns have been tracked by the Pew Internet & American Life Project
(Lenhart, Madden, and Hitlin 2005; Lenhart, Rainie, and Lewis 2001; Shiu and
Lenhart 2004). Other American-based research on adolescents and young adults
includes Boneva et al. (2006), Bryant, Sanders-Jackson, and Smallwood (2006),
Grinter and Paylen (2002), and Schiano et al. (2002). In Canada, Quan-Haase has
examined IM usage by university students, including analysis of how they employ
IM to manage interpersonal communication (2007a), comparisons with other
forms of mediated communication (2007b), and a general review of the IM litera-
ture (2009). In Hong Kong, Leung (2001) analyzed motivations of university stu-
dents for using ICQ (e.g., relaxation, social inclusion, escape), while Cheuk and
Chan (2007) studied ICQ usage patterns among high school students.
IM technology can facilitate communication in educational settings and be-
tween people lacking voice options. With online distance education expanding, IM
enables students who are geographically separated to collaborate on projects (e.g.,
Eisenstadt, Komzak, and Dzbor 2003). Additionally, IM can function in teacher-
student advising (de Siqueira and Herring 2009). IM is also a valuable communi-
cation platform for the hearing-impaired, replacing more cumbersome TTY or
telecommunication relay services (Bowe 2002).7

3.2. Tool in the workplace


Considerable research has been done on use of IM in the workplace, beginning
with early studies by Issacs et al. (2002) and Nardi, Whittaker, and Bradner (2000).
A dominant theme has been how IM can facilitate collaborative work. Represen-
tative studies include Cho, Trier, and Kim (2005), Fussell et al. (2004), and Quan-
Haase, Cothrel, and Wellman (2005). A related theme has been the role of IM in

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 139

providing a “presence indicator”, signaling the intended interlocutor’s availability


(e.g., Debbabi and Rahman 2004). Yet other research has explored how to negoti-
ate conversational turn-taking in CMC (e.g., Shankar, VanKleek, Vicente, and
Smith 2000) and differences between IM use for work and for social relationships
(e.g., Avrahami and Hudson 2006). A derivative research genre focuses on cross-
cultural issues in workplace IM communication (e.g., Kayan, Fussell, and Setlock
2006; Massey, Hung, Montoya-Weiss, and Ramesh 2001; Setlock, Fussell, and
Neuwirth 2004; Stewart, Setlock, and Fussell 2004).
Finally, a growing body of research explores the effects of IM interruptions on
work productivity. The findings are mixed: Garrett and Danziger (2007) suggest
that workers they studied learned to integrate IM communication with the tasks at
hand, while Iqbal and Horvitz (2007) report that Microsoft employees in their
study averaged 10–15 minutes following an IM or email alert before returning to
the original task. In pragmatics terms, these interruptions are in the “conversation”
between the employee and his or her work, due to initiation of a more traditional
conversation between the employee and a human interlocutor.

3.3. IM and multitasking


IM users commonly engage in multiple activities at the same time. Multitasking
behavior may involve other social interaction (e.g., conducting multiple simulta-
neous IM conversations) or individually-based pursuits (e.g., eating, doing web
searches).8 Researchers (Baym, Zhang, and Lin 2004; Lenhart et al. 2005; Shiu
and Lenhart 2004) have gathered self-reports on general levels of multitasking ac-
tivities while using CMC. Unfortunately, post hoc self-reports are often inaccu-
rate.
To obtain more accurate data, my students and I used an online questionnaire to
track multitasking of American undergraduates in fall 2004 and spring 2005.9 We
knew subjects were participating in at least one IM conversation just before access-
ing the questionnaire, since we distributed the questionnaire’s URL through IM.
Results revealed a high level of multitasking. In our first study, 98 % of the 158
subjects (half male, half female) engaged in at least one other computer-based or
offline behavior while IMing. Table 1 indicates the percent of students engaged in
each additional type of activity.
On average, subjects were simultaneously doing three computer-based activ-
ities and two offline activities (i.e., besides the IM containing the study’s URL).
Subjects averaged 2.7 simultaneous IM conversations, ranging from 1 to 12.
Subsequent informal discussion with some of the subjects revealed both syn-
chronous and asynchronous use of IM. Students generally responded immediately
to an IM message (i.e., synchronically) when there was “good gossip” or when the
conversation was serious. Only one student (out of 20) found it rude to hold sim-
ultaneous IM conversations. When asked whether they ever held a single IM con-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
140 Naomi S. Baron

Table 1. Study 1: Multitasking while using IM

Computer-Based Activities
Web-based activities: 70 %
Computer-based media player: 48 %
Word processing: 39 %

Offline Activities
Face-to-face conversation: 41 %
Eating or drinking: 37 %
Watching television: 29 %
Talking on the telephone: 22 %

versation without engaging in other online or offline activities, students overwhel-


mingly responded “no”. Such behavior, said one student, would be “too weird”,
because in her eyes, IM conversations are conducted as background activity to
other endeavors.
Using a revised online questionnaire administered to 51 subjects, we probed
why students multitask while doing IM. Most respondents mentioned time press-
ures: Multitasking enabled them to accomplish several activities at once. Students
commented that IM is not, by nature, a stand-alone endeavor. Twenty percent of
students in the second study multitasked because they were bored. Boredom some-
times resulted from waiting for a conversational partner to respond (either because
the interlocutor was slow to reply or because in modern IM systems, entire mess-
ages must be sent before recipients see them, rather than appearing as each char-
acter is typed). Other students spoke of “get[ing] bored with just one activity” or
“having too short an attention span to only do one thing at a time”.
The second study probed which multitasking behaviors students felt were suit-
able. Eighty-six percent (i.e., of the 51 subjects) either specifically mentioned IM
or email – both forms of interpersonal communication – or indicated that any type
of multitasking behavior is acceptable. Nearly 60 % of respondents singled out
face-to-face or telephone conversations as inappropriate for multitasking. Students
offered various explanations. The most prevalent was that such behavior was
simply wrong, because, for example, “the person on the other phone line usually
feels left out or unattended to”. Others disapproved of the behavior only if the con-
versation was particularly serious or important. Despite these sentiments, of the
158 students in our initial study, 41 % reported engaging in at least one computer
activity while talking face-to-face, and 22 % were simultaneously on the computer
and on the phone.
Seen in pragmatics terms, multitasking by doing IM while speaking with an-
other person (face-to-face or on the phone) violates the simple politeness principle
of paying attention to one’s interlocutor. Whatever the reality of multitaskers’

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 141

claims about successfully accomplishing several tasks simultaneously, their inter-


locutors may be disturbed. In the words of one student, “people [on the phone with
you] get pissy about hearing a keyboard clicking”.

4. Construction of IM away messages and IM conversations

Social interaction through IM is accomplished via written language. Therefore, it


is necessary to examine how these written messages are constructed. The research
summarized in this section includes discussion of the functions of away messages,
analysis of specific linguistic features of IM conversations, and consideration of
gender issues.

4.1. Away messages


Away messages were designed for users logged on to their IM clients (but not
physically at their machines) to alert interlocutors not to expect immediate
replies to messages. In practice, away messages serve richer functions than
simply noting one’s absence. From the perspective of pragmatics, these messages
may perform a variety of speech acts, often entailing meaning that is not ex-
pressed overtly.
Nastri et al. (2006) used speech act theory to categorize a corpus of university-
student away messages. The authors found that 68 % of messages were assertives
(e.g., At the library), while smaller numbers were expressives (e.g., What a lousy
day), commissives (e.g., I’ll meet you at 7), or directives (e.g., Call me).
Several years earlier (fall 2002), my students and I undertook a more general
study of away messages. We collected 190 messages from 38 people (half male,
half female) that had been posted by students’ friends from their AIM buddy lists.
Informal interviews were subsequently conducted with some of the subjects.10
Message length varied considerably across individuals, ranging from one word to
more than 50, averaging 13 words for both males and females. Compared with IM
transmissions, away messages are fairly long – partly because away messages are
posted all of a piece, while IMs are commonly chunked and sent seriatim (see sec-
tion 4.2). However, the more interesting aspect of the answer lies in the role away
messages play in students’ social lives.
Often there is a gap between the overt meaning of an away message and the in-
tended tone or ulterior motive. Consider the message In the bowels of hell … or
what some would call the library. The overt message indicates that the person post-
ing is unavailable. However, by conversational implicature, the message renders a
strong value judgment.
We analyzed messages according to the overt text, and then considered implied
communication functions. Overt texts were divided between messages conveying

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
142 Naomi S. Baron

information or initiating a conversation, and those providing entertainment. Some


messages overlapped categories (especially where humor was involved). Our
coding scheme did not incorporate conventional terms from speech act theory
(e.g., expressives, commissives), although our scheme spans similar conceptual
territory.
Informational/conversational messages were subdivided into three clusters:11
– “I’m away”
– initiate discussion or social encounter
– convey personal information about oneself, one’s opinions, one’s sense of
humor
Using these clusters, Figure 1 illustrates away messages whose overt function was
to convey information or initiate conversation.
In the “I’m Away” messages, both the categories Lurking (Maybe I’m doing
work) and Intentional misrepresentation (dinner with Mark) involve deception, vi-
olating Grice’s conversational maxim of quality – to tell the truth. There is, how-
ever, a fine line between deception and privacy, and between deception and idio-
syncrasy. As for privacy, some of the students interviewed felt that specifying their
precise location was an invasion of privacy. (Others felt obligated to be specific so
friends could locate them.) One interviewee only posted away messages when in
her dorm room, working at her computer. (Her messages included the likes of Eat-
ing the souls of my fellow man and *sigh*.) For her, away messages expressed per-
sonal information (sometimes humorously) about her current situation, perhaps to
generate conversation with people viewing her messages.
Conversely, people sometimes craft messages to camouflage their state of
mind. One subject posted quotations when she did not feel like talking or, in her
words, “giving away too much information”. The same individual reported using
self-deprecation (I could easily be replaced with a dancing chimp) when it [had]
been a long day and she didn’t want to explain why.
In addition to the informational/conversational postings, other messages fo-
cused on entertainment. For example,
work rhymes with beserk and jerk. i lurk in the murk and do my work, ya big
jerk. ok, I gotta go do some work now.
Use of quotations from well-known people was also common, along with stanzas
from songs or URLs for interesting websites. Why post away messages primarily
to entertain? The answer is grounded both in the technology and in the social goals
and expectations of American college students. Experienced users of email are
familiar with signature files, enabling senders automatically to post at the end of
their emails not only professional contact information but also pithy sayings or
quotations. While IMs have no signature files, “entertainment” away messages
serve comparable functions.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 143

“I’m Away” Away Messages

Overt Text Example Comments


I’m really away out overt message matches
communicative intent
Itinerary voter registration, peace corps enumerated sequence of activities
meeting, class, choir, dinner, to inform friends how one is
dorm council spending one’s day
Lurking/filtering Maybe I’m doing work … monitoring incoming IM traffic
maybe I’m not … the so one can decide which
question of the night. messages to respond to and
which to ignore
Intentional dinner with Mark and dancing construct a self-image (here,
misrepresentation all night (when actually alone of a successful social life)
in dorm room watching TV)

Away Messages that Initiate Discussion or Social Encounter

Overt Text Example Comments


Reach me through a since I am never around attempting to stay in the social
different medium try TEXT MESSAGING me! loop
Send it to [phone number].
I wanna feel the love!
Let’s chat online Please distract me, I’m not soliciting social contact
accomplishing anything

Away Messages that Convey Personal Information

Overt Text Example Comments


Current activity Reading for once … the joy commentary about feeling
of being an English major overburdened
is sooo overwhelming right
now … (the sarcasm is very
much intended)
Sense of humor I could easily be replaced use of humorous style
with a dancing chimp … and to soften description
at times I believe people of how one is feeling
would prefer the chimp
(but so would I)

Figure 1. Away messages that convey information or initiate conversation

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
144 Naomi S. Baron

Many subjects perceived entertainment to be an essential component of away


messages. One subject said that since she enjoyed friends’ away messages that
made her laugh, she tried to make her own words funny. Others felt they had to jus-
tify themselves when their away messages were not funny or creative, typically
pleading lack of time or energy to craft amusing postings. Seen in terms of prag-
matics, entertainment messages reflect users’ sense of social obligation to make
their away messages worth reading.

4.2. IM conversations
We turn now from IM away messages to IM conversations. Popular discussion of
IM conversations has typically focused on lexical issues (IM “lingo”) such as ab-
breviations, acronyms, emoticons,12 and odd spellings (see Thurlow 2006; Bies-
wanger, this volume). As the ultimate building blocks of conversation, lexical is-
sues are important to study, especially through quantitative corpus analysis.
However, equally relevant are the conversations themselves, including such prag-
matics issues as conversational repair and conversational closings.
Jacobs (2009) reports on a two-year ethnographic study she conducted of IM
usage by an adolescent girl. By videotaping both on-screen IM behavior and other
activity in the physical environment, Jacobs illustrated how young people incor-
porate IM conversations within their larger social worlds (see also Hu, Wood,
Smith, and Westbrook 2004). Focusing on lexical issues, Tagliamonte and Denis
(2008), building on protocols I had earlier developed (see below), collected over a
million words of IM conversations from Canadian teenagers. Comparing the IM
data with speech from some of the same subjects, the authors found that while IM
manifests some distinctive traits, it shows considerable stylistic variation, and it re-
mains rooted in the model of offline language.
In spring 2003, my students and I undertook a small-scale study of the struc-
tural properties of American college student IM conversations.13 Student experi-
menters initiated IM conversations with peers on their AIM buddy lists. After an-
onymizing user screen names, the student experimenters forwarded the IM
conversation files to a project web site. We collected 23 IM conversations, contain-
ing 2,185 distinct transmissions composed of 11,718 words. Nine were conver-
sations between females, 10 between males, and 5 involved male-female pairs.
Our IM analysis explored conversational composition, lexical issues, utterance
breaks, and gender issues.
Figure 2 summarizes our coding system. Names here and in subsequent
examples from the corpus have been anonymized.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 145

Transmission Unit: any IM that is transmitted


e.g., Max: hey man
Utterance: a sentence or sentence fragment in IM
e.g., Susan: Somebody shoot me! [sentence]
e.g., Zach: if the walls could talk [sentence fragment]
Sequence: one or more IM transmissions sent seriatim by the same person
e.g., Max: hey man
Max: whassup
Closing:14 a series of transmissions at the end of an IM conversation, beginning
with one party initiating closure and ending with termination of the IM
connection
Utterance Chunking: the process of breaking a single IM utterance
(“sentence”) into multiple transmissions (“chunks”)
e.g., Joan: that must feel nice
Joan: to be in love
Joan: in the spring
Utterance Break Pair: two sequential transmissions that are grammatically
part of the same utterance and result from utterance chunking
e.g., Allyson: Kathleen is back in town
Allyson: for a month or so

Figure 2. Coding system for structural analysis of IM conversations

4.2.1. Conversational composition


The average IM transmission was 5.4 words long, with transmissions ranging be-
tween 1 and 44 words. In a contrastive analysis of spoken and written language,
Chafe and Danielewicz (1987: 96) found that informal spoken “conversational in-
tonation units” (chunks of spoken language typically demarcated by rising or falling
intonation, or by a pause) averaged 6.2 words. For written prose, the “punctuation
unit” (strings of writing set off by punctuation marks) for traditional letters averaged
8.4 words. By these measures, IM more closely resembled informal speech.
One reason IM transmissions were generally short is that many IMs were
written seriatim. Nearly half the sample consisted of sequences of two or more
transmissions. While some sequential transmissions constituted distinct utter-
ances, e.g.,
transmission 1: i’m sorry [utterance 1]
transmission 2: if it makes you feel any better, i’m being held captive by
two of Julie’s papers [utterance 2]

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
146 Naomi S. Baron

others were pieces of larger sentences, as in


transmission 1: in the past
transmission 2: people have found stuff under the cushions [together, a
single utterance]
Eliminating the one-word transmissions (almost never found in sequences of two
or more transmissions sent by the same person seriatim), one-sixth of the remain-
ing transmissions were part of an utterance break pair.
The IM conversations averaged 93 transmissions and 24 minutes long. Conver-
sational length varied widely, from quick three- or four-transmission volleys to
sessions of more than 200 transmissions lasting over an hour.
We also examined conversational closings. As in spoken discourse, saying
goodbye on IM is sometimes a protracted process (in number of exchanges and
time on the clock). For example:
Gale: hey, I gotta run
Sally: Okay.
Sally: I’ll ttyl? [talk to you later]
Gale: gotta do errands.
Gale: yep!
Sally: Okay.
Sally: :)
Gale: talk to you soon
Sally: Alrighty.
From the first indication that one partner intended to sign off up until actual clo-
sure, subjects averaged 7 transmissions and 40 seconds.

4.2.2. Lexical issues


We analyzed abbreviations, acronyms, contractions, and emoticons, along with
spelling mistakes and self-corrections. We only tallied IM abbreviations and acro-
nyms distinctive to online (or mobile) language (e.g., excluding hrs for hours or
US for United States). Abbreviations were sparse: 31 out of 11,718 words. These
included 16 instances of k for OK, 7 of cya for see you, and 5 of bc (or b/c) for be-
cause. Only 90 acronyms occurred, the majority of which (76) were lol for laugh-
ing out loud.
Contractions are another form of lexical shortening (e.g., I’m instead of I am).
Among young adults, contractions are prolific in informal speech, probably ap-
pearing more than 90 % of the time they are possible.15 However, in the IM data,
contractions were only used in 65 % of the possible 763 cases. Emoticons were also
infrequent. Of the 49 instances, 31 were smiley faces and 5 a frowny. Just three
subjects accounted for 33 of the emoticons.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 147

Spelling was surprisingly good. Only 171 words were misspelled or lacked
necessary punctuation – averaging one error every 12.8 transmissions. More than
one-third of the errors involved omitting an apostrophe in a contraction (such as
thats) or a possessive (Sams).16 Another third were common spelling mistakes –
adding or omitting letters (e.g., assue for assume), or using the wrong letter (e.g.,
coliege for college). Some of these mistakes probably reflect typing errors, as do
the 21 % of misspellings involving metathesis (e.g., somethign for something). In
9 % of the cases, writers noticed the problem and fixed it (or tried to) in the next
transmission. That is, these writers repaired conversational infelicities, perhaps out
of habit, as a face-saving move or to increase intelligibility.

4.2.3. Utterance breaks


The utterance break analysis used the nine conversations between females (FF) and
the nine between males (MM).17 The 189 break pairs were coded for the grammati-
cal relationship between the first and second transmissions. For example, in the
break pair sequence
transmission 1: Kathleen is back in town
transmission 2: for a month or so
the second transmission (for a month or so) is an adverbial prepositional phrase,
modifying the sentence in the first transmission. Table 2 summarizes the results of
the grammatical coding.

Table 2. Grammatical coding of second member of utterance break pairs

Grammatical Type FF (N=84) MM (N=105) Total (N=189)


Conjunctions and sentences or 47.6 % (40) 68.6 % (72) 59.3 % (112)
phrases introduced by conjunctions
Independent clauses 22.6 % (19) 9.5 % (10) 15.3 % (29)
Adjectives and adjectival phrases 7.1 % (6) 8.6 % (9) 7.9 % (15)
Adverbs and adjectival phrases 11.9 % (10) 5.7 % (6) 8.5 % (16)
Noun phrases 9.5 % (8) 5.7 % (6) 7.4 % (14)
Verb phrases 1.2 % (1) 1.9 % (2) 1.6 % (3)

Conjunctions were the primary device for chunking utterances into multiple
transmissions. Out of 189 break pairs, 112 began the second transmission with a
conjunction. Of these, 89 used conjunctions to introduce sentences (e.g., coordi-
nating conjunction: and she never talks about him; subordinating conjunction: if I
paid my own airfare). The remaining 23 were conjunctions introducing a noun
phrase (or circleville) or verb phrase (and had to pay back the bank). More than

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
148 Naomi S. Baron

four-fifths of all conjunctions appearing in the beginning of the second member of


an utterance break pair were coordinating conjunctions.
Fifteen percent of the 189 break pairs contained an independent clause in the
second transmission. Grammatically, independent clauses in the corpus were also
sentences (e.g., that’s all I’m saying) or sentence fragments (e.g., monitor demo-
cratic processes). Conjunctions introducing sentences, plus the independent clause
category, account for 62 % of all utterance break pairs.
The remaining cases of second transmissions in break pairs were largely adjec-
tives (completely harmless), adverbs (on Saturday), or nouns (radio station).
Among verb phrases, there was one lone example in which the utterance break was
between the subject and the verb-phrase predicate:
transmission unit 1: and then Pat McGee Band
transmission unit 2: perform like 7
The next section considers the implications of these findings for assessing the ex-
tent to which IM is a spoken or written modality.

4.2.4. Gender, speech, and writing in IM conversations


Gender makes a difference in various aspects of IM use. Female-female conver-
sations averaged 122 transmissions per conversation, lasting an average of 31 min-
utes. Male-male conversations averaged 85 transmissions, lasting 19 minutes. Fe-
males took longer to say goodbye, averaging 9.8 turns and 41 seconds, while males
averaged 4.3 turns and 16 seconds.
Gender was irrelevant for all lexical categories except contractions and emoti-
cons. While males used contracted forms 77 % of the time contractions were poss-
ible, females did so in only 57 % of possible cases. By contrast, females were the
prime users of emoticons.
Gender also differentiated use of multi-transmission sequences. Males were al-
most twice as likely as females to chunk sentences into sequential transmissions
(males: 23 % of all their IM transmissions; females: 13 %). Males were also more
likely than females (69 % versus 48 %) to begin the second transmission in a break
pair with a conjunction. (Females were more likely than males – 23 % versus 10 % –
to chain together related sentences.) Many of these gender differences bear on the
question of whether IM approximates spoken or written discourse.
Researchers (e.g., Baron 1998; Crystal 2001; Quan-Haase 2009) have con-
sidered the extent to which CMC (including email, IM, and text messaging) is
structurally more like speech or writing. While popular discussion assumes a
spoken model (to wit: the phrase “IM conversation”), formal linguistic analysis re-
veals a mixed profile.
Considering our IM corpus as a whole, the medium seems more similar to
speech than writing.18 IM and speech have comparable average turn lengths; both

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 149

use many one-word utterances; and both can have protracted conversational clos-
ings. As for lexicon, while informal speech uses more contractions than IM, there
are more contractions in IM than in formal writing (where, traditionally, there are
none). Similarly, while not numerous, IM emoticons essentially substitute for
(spoken) prosody. A comparison of the utterance break data with Chafe’s descrip-
tion of utterance breaks in speech (1980) reveals that the two are largely parallel.19
However, when gender considerations are introduced, the profile changes.
Granted, several aspects of female IM usage are congruent with a “spoken” char-
acter, including more protracted conversational closings and more use of emoti-
cons than males. Yet in other important dimensions of IM, females seem to be
adopting a more written model. Females used fewer contractions than males.
Males were more likely to chunk sentences into multiple IM transmissions and to
begin the second member of an utterance break pair with a conjunction, while fe-
males tended to begin the second member with an independent clause. The con-
junction pattern is more common in speech, whereas the independent clause pat-
tern is more characteristic of writing (Chafe and Danielewicz 1987).
Overall, male IM conversations have much in common with face-to-face
speech, while female IMs more closely approximate conventional writing patterns.
Obviously, these generalizations are tempered by individual variation, along with
message function. Moreover, despite the more written quality of female IMs, the
messages remain largely informal.
Why does IM assume some dimensions of more formal, written language? One
explanation is what John Dewey (1922) called habit strength. By the time they
reach college, undergraduates have been typing on computers for years – often for
school work, where acronyms, abbreviations, and contractions are generally un-
welcome. These school-appropriate writing habits may be carrying over into IM,
which is produced on the same keyboard as school compositions – and sometimes
at the same time. According to “The Nation’s Report Card” (National Center for
Educational Statistics 2002), in the K-12 years, girls produce better writing than
boys (measured by assessment of narrative, information, and persuasive writing
tasks). It is therefore not surprising that female IM conversations include fewer
contractions, fewer sentences chunked into multiple transmissions, and fewer sen-
tence breaks involving a conjunction. These findings are consonant with socioling-
uistic research reporting that women’s language generally adheres more closely to
linguistic norms than does men’s (James 1996; Labov 1991).
Is IM speech or writing? It is some of both, but not as much speech as popularly
assumed. What is more, gender matters.
Gender also matters with respect to other IM issues, such as content, word
choice for initiating or closing IM conversations, and tone. Lee (2003) found that
male college students spoke more in their IMs about technology-related topics,
while female conversations involved more emotional subjects; that males tended
to avoid opening greetings or goodbyes, while females used both; and that males

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
150 Naomi S. Baron

addressed one another with derogatory names and used harsh teasing, while
females displayed a more sympathetic tone and used more emoticons. These find-
ings confirm gender distinctions observed in other forms of CMC (e.g., Herring
2003).

5. Choosing between IM and other communication options

IM is only one tool available for mediated communication. On computers, alter-


natives include email and social networking sites such as Facebook. An additional
possibility is sending text messages on mobile phones. Selection of medium may
reflect such factors as whether users wish to communicate synchronously or asyn-
chronously, and whether users actually have a choice. (Some businesses, for
example, have shifted office communication from email to IM.) In this section, re-
search on choosing between IM and Facebook (5.1) and between IM and texting
(5.2) is summarized.

5.1. IM versus Facebook


5.1.1. Brief introduction to Facebook
Facebook was founded in 2004 by Mark Zuckerberg, then an undergraduate at Har-
vard University. Building on the success of first-generation social networking sites
such as Friendster, TheFaceBook (as it was originally called) was essentially an
electronic version of the printed freshman “facebooks” common on American
campuses, which included such information as name, photo, date of birth, home-
town, and perhaps college dormitory address, potential major, and hobbies. Zuck-
erberg designed the program for use at Harvard, but soon it spread to other Ameri-
can campuses, then to high schools, and eventually to anyone, anywhere desiring
an account.20
The homepage of Facebook (as of February 2010) asserts that “Facebook helps
you connect and share with the people in your life”. By early 2010, there were
more than 350 million active users of the site worldwide, about 70 % of whom were
outside the U.S. During its brief history, Facebook has added ever-more functions
to assist users in making those connections, from a chat function and status reports
(mentioned above) to posting of photo albums – with more than 2.5 billion photo-
graphs being uploaded each month as of early 2010.21
Initially, Facebook had rather sparse tools for one-to-one communication. A
message function (essentially an email) enabled one to contact others using Face-
book, but recipients had to be logged on to their Facebook accounts to know they
had received a message. (Later, recipients received a traditional email, alerting
them to log on to Facebook.) In a study of all Facebook usage between February

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 151

2004 and March 2006, Golder, Wilkinson, and Huberman (2006: 3) found that on
average, users sent less than one message per week. This was the Facebook en-
vironment in which my students and I explored how American university students
juggled IM versus Facebook usage.

5.1.2. Choosing between IM and Facebook


In spring 2006, we administered a paper-based questionnaire to 60 university
undergraduates (half male, half female).22 At that time, Facebook and IM had sev-
eral overlapping functions: profiles; away messages (IM) or the wall (Facebook)
for posting information available to groups of people; and a one-to-one messaging
system.
We first compared time spent on IM and Facebook. Respondents averaged 2.2
hours a day on IM, compared with .7 hours on Facebook. Another comparison con-
cerned profiles: whether users looked first at someone’s IM or Facebook profile,
and how often users changed their own profiles. Four-fifths of the students turned
first to Facebook profiles to garner information, and two-thirds updated their Face-
book profile more frequently.
Despite the swift rise of Facebook, IM remained an important communication
tool in 2005–2006. Interview data collected in fall 200523 suggested that Facebook
had largely become the network on which one presents oneself to others, while IM
retained its role as the basic form of online communication between individuals.
One interviewee commented that she and her friends “tended to send a Facebook
message when they wanted to communicate something private, but not immediate”
(akin to email, in that both were asynchronous). In the words of another student,
“an IM conversation with someone you’d rather not speak with, or whom you do
not know, is seen as more of an invasion of privacy than a message via the more re-
laxed [i.e., asynchronous] Facebook system”.
The Facebook wall provided an alternative to an IM or a Facebook message.
Several interviewees admitted using the wall “when they wish to avoid talking to
the person in question”. An example was a Facebook birthday message:
She posted a happy birthday message on the wall of a casual friend rather than call or
send an instant message because she did not want to start a conversation … The wall is
often used as a means of social avoidance; users try to keep up social ties without having
to actually maintain them.

Commenting more generally on IM versus Facebook, another student explained,


Facebook … allows the person to maintain a presence in an online community from a
distance. Being someone’s friend or joining a group carries no obligation or responsi-
bility … [IM] takes on a more personal role, similar to that of a phone number or physi-
cal address … [IM] is a direct line to the user and their state of mind[.]

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
152 Naomi S. Baron

By early 2010, the relationship between IM and Facebook had shifted. Anecdotal
evidence from informal observation suggests that at least on American campuses,
traditional IM clients such as AIM have been largely eclipsed by Facebook or the
chat function of Skype (see section 6).

5.2. IM versus texting


The popular press commonly conflates language used in IM and text messaging
(e.g., Thurlow 2006). However, the two media differ in important respects. IM
conversations are traditionally constructed on full computer keyboards, are syn-
chronous, and involve stationary interlocutors. Text messages have traditionally
been constructed on small phone keypads, are asynchronous, and are potentially
composed while on the move. It is reasonable to expect that these parameters will
affect both messages and perhaps choice between platforms.
Until recently, text messaging on mobile phones was a relative novelty in the
U.S., compared with many other countries.24 In a study of teens and technology, Len-
hart et al. (2005) reported that in communicating with friends, 24 % chose IM, while
51 % preferred landline phones, 12 % opted for voice calls on mobile phones, 5 % se-
lected email, and only 3 % used text messaging. However, the U.S. profile then
shifted: By 2008, Americans were doing more texting on mobile phones than talking
(Steinhauer and Holson 2008). In other parts of the world, relative usage of IM ver-
sus texting varies, reflecting such factors as relative cost and computer access.
Structurally, messages constructed via IM (on computers) and via texting (on
mobile phones) show both similarities and differences. Ling and Baron (2007)
compared 191 IM messages from the data set described in section 4.2 with 191
messages from another American university population, gathered in fall 2005.
Among the similarities were very low use of emoticons and acronyms, and com-
parable use of periods and question marks. However, the text messages were
longer, reflecting both cost factors (since texts are charged by the transmission) and
users’ tendencies to chunk IM utterances into sequences of short transmissions.
IMs had three times as many apostrophes in contractions, likely an artifact of input
complexity on mobile phones. And text messages had more abbreviations, al-
though the number was still small (only 3 % of total words in the texting corpus).
Given this background, what is known about user choice between IM and tex-
ting?

5.2.1. Choosing between IM and texting


In 2007–2008, as part of a cross-cultural study of mobile phone practices by 2001
university students, I compared use of IM on computers versus texting on mobile
phones in Sweden, the U.S., Italy, Japan, and Korea.25 Table 3 reports the years of
experience subjects had with each platform.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 153

Table 3. Mean years of experience with IM and text messaging

Doing IM on Computer Doing Texting on Mobile Phone


Sweden (N=171) 5.9 6.8
U.S. (N=523) 7.4 3.5
Italy (N=616) 2.7 7.0
Japan (N=529) 3.7 5.5
Korea (N=162) 6.9 6.4

However, not everyone in the study used IM or texting. Thirty percent of Italians
and 47 % of Japanese did no IM, and 12 % of Americans did no texting.
These data were largely consonant with results from another survey question:
Did people spend more time communicating through IM on a computer or through
texting on a mobile phone?

Table 4. More time doing IM on computer or texting on mobile phone

More IM More Texting


Sweden (N=171) 55.0 % (94) 45.0 % (77)
U.S. (N=523) 42.1 % (220) 57.9 % (303)
Italy (N=616) 28.1 % (173) 71.9 % (443)
Japan (N=529) 6.2 % (33) 93.8 % (496)
Korea (N=162) 8.6 % (14) 91.4 % (148)

As Table 4 shows, Swedes spent slightly more time on IM, and Americans
spent, slightly more on texting. Since in both Italy and Japan, many subjects did
not use IM, it is not surprising to find the preponderance of both groups using more
texting. In the case of Koreans, although they had been using IM nearly as long as
Americans, their main form of one-to-one communication had become mobile
phones. The same survey revealed that Koreans used both voice functions and tex-
ting on their mobiles more than subjects from the other four countries (Baron
2009a).
Gender was a relevant variable in Sweden, the U.S., Italy, and Korea, where
more females favored texting over IM. One explanation is that females are often
more aware than males of how to manipulate communication media (Baron
2009b). Texting (unlike synchronous IM) enables users to select when to send and
receive messages. Another component of the cross-cultural study lends support to
this notion of control. When asked how important it was to send a text message to a
friend rather than make a voice call because “I want to make my message short, and
talking takes too long”, more females than males in each country responded that
this was a “very important” or “somewhat important” reason. As members of sub-
sequent focus groups explained, with texting, people can convey their own mess-
age without having to listen to other people’s problems.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
154 Naomi S. Baron

6. IM in the future

Since its emergence two decades ago, IM has undergone continuing evolution. The
proliferation of personal networked computers in the 1990s made the medium
available to millions of users. New features emerged, allowing individuals to cus-
tomize their self-presentation as well as take advantage of affordances familiar
from email (e.g., messaging people not logged on to the system) and chat rooms
(e.g., conducting multi-person conversations).
The biggest challenges to IM came with the availability of multi-featured so-
cial networking sites (such as Facebook), the popularity of VoIP Systems (such as
Skype) that include typed messaging, and the profusion (most recently in the U.S.)
of inexpensive text messaging on mobile phones. From the perspective of young
users, price is often no longer a consideration: IM, Facebook, and Skype are “free”
(once one has an Internet connection), and texting plans increasingly offer un-
limited messaging, typically after paying a small monthly fee.
In the case of text messaging on mobile phones, portability is a clear advantage
over carrying a computer. IM, Facebook, and Skype can all be done on mobiles, al-
though input tends to be cumbersome. However, input is simplified somewhat by
T9 programs and by full QWERTY keypads, which are especially popular in the
U.S. and may be helping fuel the explosion in American texting.
Social networking and VoIP communication, at least in the U.S., are still pre-
dominantly done on computers. But such sites as Facebook have the advantage
(over traditional IM) of offering multiple additional functions (from photo albums
to event coordination). Applications such as Skype enable users to conduct an audio
(or video) session and simultaneously engage in written chat and/or transmit files.
Whatever name it travels under, IM as a typed synchronous communication
tool linking two (or more) interlocutors will almost certainly persist. Less clear is
whether the distinctive characteristics described in section 4 will survive as well.
As overall use of the Internet continues to grow, and as input devices become in-
creasingly simpler, Dewey’s (1992) notion of habit strength could lead users of
both genders to a single writing style for all compositions produced on computers.
Moreover, now that young people have enjoyed more than a decade of linguistic
creativity in their online (and mobile) communication, they might move on to
novelty in other pursuits, leaving the majority of IM “lingo” to fade.
With regard to pragmatics issues, there are larger questions: How will we man-
age personal interruptions (when an IM arrives), and how will we learn to coordi-
nate turn-taking in multiparty conversations (be they exchanges between friends
or classroom discussions in online education)? We will need to better understand
differences between online and face-to-face issues regarding politeness, deception,
conversational repairs, and conversational closings. We will also need to study
whether meanings are necessarily less clear in mediated communication than in
traditional face-to-face exchange or traditional writing. The latter concern moti-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 155

vated the creation of emoticons in 1982, although it is unclear whether these sym-
bols are themselves semantically unambiguous – or necessary (Baron 2009c).
Since the mid 2000s, IM has increasingly evolved into a function incorporated
into – or replaced by – other mediated communication tools. However, the ques-
tions of language, context, and interpretation that IM initially generated are no less
relevant today to students of CMC.

Notes

1. See http://web.mit.edu/zephyr/doc/usenix/zslides.PS.
2. ICQ, like its predecessors, originally had a split-screen and keystroke-by-keystroke
transmission option, allowing what Herring (2007) calls two-way message transmission.
3. In much of Europe, “chat” refers to what Americans call “instant messaging”.
4. http://blog.facebook.com/blog.php?post=12811122130. See section 5.1 for discussion
of Facebook messaging versus AIM.
5. http://www.cellsigns.com/industry.shtml (accessed July 2, 2012).
6. http://www.multilingual-search.com/forrester-research-inc-data-on-mobile-instant-
messaging-im-in-europ e/25/01/2008 (accessed July 2, 2012).
7. Text messaging is also productively used by hearing-impaired populations (Bakken
2005).
8. See Baron 2008a (Chapter 3) for broader discussion of multitasking issues.
9. Tim Clem and Brian Rabinowitz assisted in this project.
10. For details on the away message study, see Baron, Squires, Tench, and Thompson
(2005).
11. There were also two messages conveying information intended for specific interlocu-
tors, although the messages were viewable by everyone on the sender’s buddy list (e.g.,
“Back in D.C. missing Houston very much … Kate, Erin, and Phil [names anonymized],
thank you for an amazing weekend”). At the time the data were collected, AIM users
could not send messages to people not logged on to the system. The only way to have a
message waiting for them upon their return was through a broadcast away message.
12. Emoticons typically function as commentaries on the preceding utterance. However,
since abbreviations, acronyms, and emoticons are commonly viewed as hallmarks of IM
communication, all are included in this chapter’s discussion of lexical issues.
13. See Baron 2004 for details of the study. While the corpus was small, results are conson-
ant with findings from Tagliamonte and Denis’s larger corpus.
14. This is an operational definition of the term, adopted for purposes of the present analysis.
15. This statistic is from a class project done in 2004 at my university analyzing traits of stu-
dents’ informal speech.
16. There is no evidence whether omission of apostrophes was an unconscious or conscious
act.
17. For details on the analysis, see Baron (2010).
18. For discussion of distinctions between spoken and written language, see Baron (2000),
Biber (1988), Chafe and Danielewicz (1987), Chafe and Tannen (1987), and Crystal
(2001).
19. See Baron (2010) for more detailed analysis.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
156 Naomi S. Baron

20. For discussions of the development of Facebook, see Cassidy (2006) and Petersen
(2010). For an early analysis of the social impact of Facebook in college settings, see
Vanden Boogart (2006).
21. Statistics in this paragraph are from http://newsroom.fb.com/ (accessed July 2, 2012).
22. For more information on the Facebook study, see Baron 2008a (Chapter 5). Clare Park
assisted in gathering data.
23. Interviews were conducted by Tamara Brown, Dan Hart, Kathy Rizzo, and Kat Waller.
24. For example, in January 2005, Americans sent 7.25 billion text messages. People in the
UK sent approximately 2.7 billion texts in the same month. However, since the UK had
only one-fifth the population of the U.S. (roughly 60 million versus 296 million), the
UK sent nearly twice as many messages per capita. Three years later, the situation had
changed dramatically: In mid-2008, the UK sent roughly 6 billion texts per month,
while the U.S. sent 75 billion. Adjusting for population, by mid-2008 the U.S. was send-
ing more than twice as many texts as the UK (UK source: http://www.text.it/mediacentre;
U.S. source: http://www.cellsigns.com/industry.shtml (accessed July 2, 2012).
25. For discussion of the larger survey, see Baron (2008b, 2009a).

References

Avrahami, Daniel and Scott Hudson


2006 Communication characteristics of instant messaging: Effects and predictions
of interpersonal relationships. In: Proceedings of the 2006 ACM Conference on
Computer-Supported Cooperative Work, 505–514. New York: ACM Press.
Bakken, Frøydis
2005 SMS use among deaf teens and young adults in Norway. In: Richard Harper,
Leysia Palen, and Alex Taylor (eds.), The Inside Text: Social, Cultural, and
Design Perspectives on SMS, 161–174. Dordrecht: Springer.
Baron, Naomi S.
1998 Letters by phone or speech by other means: The linguistics of email. Language
and Communication 18: 133–170.
Baron, Naomi S.
2000 Alphabet to Email: How Written English Evolved and Where It’s Heading.
London: Routledge.
Baron, Naomi S.
2004 “See you online”: Gender issues in college student use of instant messaging.
Journal of Language and Social Psychology 23(4): 397–423.
Baron, Naomi S.
2008a Always On: Language in an Online and Mobile World. New York: Oxford Uni-
versity Press.
Baron, Naomi S.
2008b Mobile phone use by university students: Swedish, American, and Japanese
perspectives. Paper presented at the Association of Internet Researchers 9.0,
Copenhagen, Denmark, October 16–18.
Baron, Naomi S.
2009a Three words about mobile phones: Findings from Sweden, the U.S., Italy,
Japan, and Korea. In: Bartolomeo Sapio, Leslie Haddon, Enid Mante-Meijer,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 157

Leopoldina Fortunati, Tomaz Turk, and Eugene Loos (eds.), The Good, the
Bad, and the Challenging: The User and the Future of Information and Com-
munication Technologies, vol. 1, 273–282. COST Action 298 Participation in
the Broadband Society.
Baron, Naomi S.
2009b Control freaks: How online and mobile communication is reshaping social
contact. Keynote address, Language in New Media: Technologies and Ideo-
logies Conference, Seattle, WA, September 6.
Baron, Naomi S.
2009c The myth of impoverished signal: Dispelling the spoken language fallacy for
emoticons in online communication. In: Jane Vincent and Leopoldina Fortu-
nati (eds.), Electronic Emotion: The Mediation of Emotion via Information and
Communication Technologies, 107–135. Oxford, UK: Peter Lang.
Baron, Naomi S.
2010 Discourse structures in instant messaging: The case of utterance breaks. Lan-
guage@Internet 7, article 3.
http://www.languageatinternet.org/articles/2010/2651/index_html/
Baron, Naomi S., Lauren Squires, Sara Tench, and Marshall Thompson
2005 Tethered or mobile? Use of away messages in instant messaging by American
college students. In: Rich Ling and Per E. Pedersen (eds.), Mobile Communi-
cations: Re-Negotiation of the Social Sphere, 293–311. London: Springer.
Baym, Nancy, Yan Bing Zhang, and Mei-Chen Lin
2004 Social interactions across media: Interpersonal communication on the internet,
face-to-face, and the telephone. New Media & Society 6: 299–318.
Biber, Douglas
1988 Variation Across Speech and Writing. Cambridge, UK: Cambridge University
Press.
Bowe, Frank
2002 Deaf and hard of hearing Americans’ instant messaging and e-mail use: A
national survey. American Annals of the Deaf 147(4): 6–10.
Boneva, Bonka, Amy Quinn, Robert Kraut, Sara Kiesler, and Irina Shklovski
2006 Teenage communication in the instant messaging era. In: Robert Kraut, Mal-
colm Brynin, and Sara Kiesler (eds.), Computers, Phones, and the Internet,
201–218. Oxford, UK: Oxford University Press.
Bryant, J. Alison, Ashley Sanders-Jackson, and Amber Smallwood
2006 IMing, text messaging, and adolescent social networks. Journal of Computer-
Mediated Communication 11(2), article 10.
http://jcmc.indiana.edu/vol11/issue2/bryant.html
Cassidy, John
2006 Me media. New Yorker, May 15, 50–59.
Chafe, Wallace L.
1980 The deployment of consciousness in the production of a narrative. In: Wallace
L. Chafe (ed.), The Pear Stories: Cognitive, Cultural, and Linguistic Aspects
of Narrative Production, 9–50. Norwood, NJ: Ablex.
Chafe, Wallace L. and Jane Danielewicz
1987 Properties of spoken and written language. In: Rosalind Horowitz and S. Jay
Samuels (eds.), Comprehending Oral and Written Language, 83–113. San
Diego, CA: Academic Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
158 Naomi S. Baron

Chafe, Wallace L. and Deborah Tannen


1987 The relation between written and spoken language. Annual Review of Anthro-
pology 16: 383–407.
Cheuk, W. S. and Zenobia C. Y. Chan
2007 ICQ (I seek you) and adolescents: A quantitative study in Hong Kong. Cyber-
Psychology & Behavior 10(1): 108–114.
Cho, Hee-Kyung, Matthias Trier, and Eunhee Kim
2005 The use of instant messaging in working relationship development: A case
study. Journal of Computer-Mediated Communication 10(4), article 17.
http://jcmc.indiana.edu/vol10/issue4/cho.html
Crystal, David
2001 Language and the Internet. Cambridge, UK: Cambridge University Press.
Debbabi, Mourad and Mahfuzur Rahman
2004 The war of presence and instant messaging: Right protocols and APIs. In: Pro-
ceedings of the 2004 Consumer Communications and Networking Conference,
341–346. Los Alamitos, CA: IEEE Press.
de Siqueira, Amaury and Susan C. Herring
2009 Temporal patterns in student-advisor instant messaging exchanges: Individual
variation and accommodation. In: Proceedings of the Forty-Second Hawai’i
International Conference on System Sciences. Los Alamitos, CA: IEEE Press.
http://ella.slis.indiana.edu/~herring/desiqueira.herring.2009.pdf
Dewey, John
1922 Human Nature and Conduct. New York: Holt.
Eisenstadt, Marc, Jiri Komzak, and Martin Dzbor
2003 Instant messaging + maps = powerful tools for distance learning. In: Proceed-
ings of TelEduc03, Havana, Cuba, May 19–21.
Fussell, Susan, Sara Kiesler, Leslie Setlock, Peter Scupelli, and Suzanne Weisband
2004 Effects of instant messaging on the management of multiple project trajec-
tories. In: Proceedings of the 2004 ACM SIGCHI Conference on Human Fac-
tors in Computing Systems, 191–198. New York: ACM Press.
Garrett, R. Kelly and James Danziger
2007 IM=Interruption management? Instant messaging and disruption in the work-
place. Journal of Computer-Mediated Communication 13(1), article 2.
http://jcmc.indiana.edu/vol13/issue1/garrett.html
Golder, Scott, Dennis Wilkinson, and Bernardo Huberman
2006 Rhythms of social interaction: Messaging within a massive online network. In-
formation Dynamics Laboratory, HP Labs.
http://www.hpl.hp.com/research/idl/papers/facebook/facebook.pdf
Grinter, Rebecca and Leysia Palen
2002 Instant messaging in teen life. In: Proceedings of the 2002 ACM Confer-
ence on Computer Supported Cooperative Work, 21–30. New York: ACM
Press.
Herring, Susan C.
2003 Gender and power in online communication. In: Janet Holmes and Miriam
Meyerhoff (eds.), The Handbook of Language and Gender, 202–228. Oxford,
UK: Blackwell.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 159

Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Lan-
guage@Internet 4, article 1.
http://www.languageatinternet.org/articles/2007/761
Hu, Yifeng, Jacqueline Fowler Wood, Vivian Smith, and Nalova Westbrook
2004 Friendship through IM: Examining the relationship between instant messaging
and intimacy. Journal of Computer-Mediated Communication 10(1).
http://jcmc.indiana.edu/vol10/issue1/hu.html
Isaacs, Ellen, Alan Walendowski, Steve Whittaker, Diane Schiano, and Candace Kamm
2002 The character, functions, and styles of instant messaging in the workplace. In:
Proceedings of the 2002 ACM Conference on Computer Supported Cooper-
ative Work, 11–20. New York: ACM Press.
Iqbal, Shamsi, and Eric Horvitz
2007 Disruption and recovery of computing tasks: Field study, analysis, and direc-
tions. In: Proceedings of the 2007 ACM SIGCHI Conference on Human Fac-
tors in Computing Systems, 677–686. New York: ACM Press.
Jacobs, Gloria
2009 Adolescents and Instant Messaging: Literacy, Language, and Identity Devel-
opment in the 21st Century. Saarbrücken: VDM Verlag.
James, Deborah
1996 Women, men, and prestige speech forms: A critical review. In: Victoria L.
Bergvall, Janet M. Bing, and Alice F. Freed (eds.), Rethinking Language and
Gender Research, 95–125. London: Longman.
Kayan, Shipra, Susan Fussell, and Leslie Setlock
2006 Cultural differences in the use of instant messaging in Asia and North
America. In: Proceedings of the 2006 ACM Conference on Computer Sup-
ported Cooperative Work, 525–528. New York: ACM Press.
Labov, William
1991 The intersection of sex and social class in the course of linguistic change. Lan-
guage Variation and Change 2: 205–254.
Lee, Christine
2003 How does instant messaging affect interaction between the genders? The Mer-
cury Project of Instant Messaging Studies, Stanford University.
http://www.stanford.edu/class/pwr3–25/group2/pdfs/IM_Genders.pdf
Lenhart, Amanda, Mary Madden, and Paul Hitlin
2005 Teens and technology: Youth are leading the transition to a fully wired and mo-
bile nation. Pew Internet & American Life Project, July 27.
Lenhart, Amanda, Lee Rainie, and Oliver Lewis
2001 Teenage life online: The rise of the instant-message generation and the inter-
net’s impact on friendships and family relationships. Pew Internet & American
Life Project, June 20.
Leung, Louis
2001 College student motives for chatting on ICQ. New Media & Society 3: 483–500.
Levinson, Stephen
1983 Pragmatics. Cambridge, UK: Cambridge University Press.
Ling, Rich and Naomi S. Baron
2007 Text messaging and IM: A linguistic comparison of American college data.
Journal of Language and Social Psychology 26(3): 291–298.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
160 Naomi S. Baron

Massey, Anne, Yu-Ting Caisy Hung, Mitzi Montoya-Weiss, and V. Ramesh


2001 When culture and style aren’t about clothes: Perceptions of task-technology
“fit” in global virtual teams. In: Proceedings of the 2001 ACM SIGGROUP
Conference on Supporting Group Work, 207–213. New York: ACM Press.
Nardi, Bonnie, Steve Whittaker, and Erin Bradner
2000 Interaction and outeraction: Instant messaging in action. In: Proceedings of the
2000 ACM Conference on Computer Supported Cooperative Work, 79–88.
New York: ACM Press.
Nastri, Jacqueline, Jorge Peña, and Jeffrey Hancock
2006 The construction of away messages: A speech act analysis. Journal of Com-
puter-Mediated Communication 11(4), article 7.
http://jcmc.indiana.edu/vol11/issue4/nastri.html
National Center for Educational Statistics
2002 The nation’s report card: Writing 2002. Washington, DC: U.S. Department of
Education, Institute of Education Sciences.
Petersen, Charles
2010 In the world of Facebook. New York Review of Books 57(3), February 25, 8–11.
Quan-Haase, Anabel
2007a Instant messaging on campus: Use and integration in university students’
everyday communication. The Information Society 24: 1–11.
Quan-Haase, Anabel
2007b University students’ local and distant social ties. Information, Communication
& Society 10: 671–693.
Quan-Haase, Anabel
2009 Text-based conversations over instant messaging: Linguistic change and
young people’s sociability. In: Charley Rowe and Eva L. Wyss (eds.), Lan-
guage and New Media: Linguistic, Cultural, and Technical Evolutions, 33–54.
Cresskill, NJ: Hampton Press.
Quan-Haase, Anabel, Joseph Cothrel, and Barry Wellman
2005 Instant messaging for collaboration: A case study of a high-tech firm. Journal
of Computer-Mediated Communication 10(4), article 13. http://jcmc.india-
na.edu/vol10/issue4/quan-haase.html
Schiano, Diane, Coreena Chen, Jeremy Ginsberg, Unnur Gretarsdottir, Megan Huddleston,
and Ellen Isaacs
2002 Teen use of messaging media. In: Proceedings of the 2002 ACM Conference on
Human Factors in Computing Systems, 594–595. New York: ACM Press.
Setlock, Leslie, Susan Fussell, and Christine Neuwirth
2004 Taking it out of context: Collaborating within and across cultures in face-to-
face settings and via instant messaging. In: Proceedings of the 2004 ACM Con-
ference on Computer Supported Cooperative Work, 604–613. New York: ACM
Press.
Shankar, Tara, Max VanKleek, Antonio Vicente, and Brian Smith
2000 A computer mediated conversational system that supports turn negotiation. In:
Proceedings of the Thirty-Third Hawai’i International Conference on System
Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2000/0493/03/04933035.pdf

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
Instant messaging 161

Shiu, Eulynn and Amanda Lenhart


2004 How Americans use instant messaging. Pew Internet & American Life Project,
September 1.
Steinhauer, Jennifer and Laura M. Holson
2008 As text messages fly, danger lurks. New York Times, A1, September 20.
Stewart, Craig, Leslie Setlock, and Susan Fussell
2004 Conversational argument in decision making: Chinese and U.S. participants in
face-to-face and instant messaging interactions. Discourse Processes 44(2):
113–139.
Tagliamonte, Sali and Derek Denis
2008 Linguistic ruin? LOL! Instant messaging and teen language. American Speech
83(1): 3–34.
Thurlow, Crispin
2006 From statistical panic to moral panic: The metadiscursive construction and
popular exaggeration of new media language in the print media. Journal of
Computer-Mediated Communication 11(3), article 1.
http://jcmc.indiana.edu/vol11/issue3/thurlow.html
Vanden Boogart, Matthew
2006 Discovering the social impacts of Facebook on a college campus. Master’s
thesis, Department of Counseling and Educational Psychology, College of
Education, Kansas State University, Manhattan, Kansas.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
162 Naomi S. Baron

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:15 PM
7. Text messaging
Crispin Thurlow and Michele Poff

1. Introduction

On the day we first started putting this chapter together, then-soon-to-be-President-


of-the-United-States Barack Obama announced his choice of vice-presidential run-
ning mate by sending a text message to journalists and Democratic Party senators
and supporters. In one not-so-restrained New York Times journalist’s characteriz-
ation of the event: “Mr. Obama’s use of the newfound medium is the widest use of
texting by a presidential candidate in history”. The following morning, again in the
U.S., a National Public Radio journalist talked about “the most highly anticipated
text message in human history”. This already newsworthy event was given an
added mediatized spin thanks to texting. While we are not convinced of the historic
proportions of the Obama campaign’s text message, it was certainly a communi-
cative event loaded with pragmatic – and metapragmatic – force. Why choose to
use texting to deliver this public message? (After all, supporters could just as easily
have been notified via the ancient technology of email.) What did the choice of text
message mean to voters? Why should it warrant such media interest? Why make so
much fuss about a text message that bore little resemblance to the millions of text
messages sent every day by ordinary people around the world?
In this chapter, we consider these matters by stepping back from the hyperbolic
commentary on text messaging by journalists and the entertaining observations of
popular writers. To this end, we start with a comprehensive review of the scholarly,
research-driven literature on text messaging; this work highlights the range of ap-
plications to which texting has been put, as well as the ways in which socioling-
uists, discourse analysts, and other communication scholars have been attending to
language in text messaging. Shifting next to a more specifically pragmatic and
metapragmatic focus, we present some of our own early research as a way to illus-
trate general phenomena covered in the wider scholarly literature and to ground
text messaging as a pragmatic phenomenon. The chapter closes with brief thoughts
about gaps in the academic literature and possible directions for future research on
the language of text messaging. Before proceeding further, however, we offer the
following account of text messaging as a digital technology.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
164 Crispin Thurlow and Michele Poff

2. The mechanics of texting

The terms “text messaging” and “texting” refer to the brief typed messages sent
using the SMS (‘short message service’) of mobile/cell phones, PDAs (‘personal
digital assistants’), smartphones, or web browsers. Although messages nowadays
often include images, videos, and music (hence the newer term MMS ‘multimedia
message service’), the basic text-based messaging service continues to be enor-
mously popular. Texting was initially developed and released commercially in the
early to mid-1990s and has since seen a huge rise in popularity around the world,
following the rapid spread of mobile telephony in general. (In 2009, the United
Nations reported that more than 60 % of the world’s population – about 4.1 billion
people – had access to a mobile phone.1) Most often used for person-to-person
communication, text messages are also increasingly being used to interact with
automated systems (e.g., buying products, participating in television contests, re-
cruiting voters). One interesting “convergence” phenomenon is the use of short
messaging services with interactive television, which confuses the boundary be-
tween interpersonal and broadcast messaging (Zelenkauskaite and Herring 2008).
As is usually the case, the technology is being transformed continually.
In situating text messaging with reference to computer-mediated communi-
cation (CMC) more generally, it is important to recognize the interplay between
what a technology itself allows (or affords) and what the communicator herself/
himself brings to the technology. Most obviously, in the case of text messaging, the
equipment is small and, eponymously, mobile; it therefore affords most texters an
unobtrusive and relatively inexpensive means of communication. At the same
time, text messaging is also technically and practically restricted, allowing only a
certain number of characters per message. (Set by a worldwide industry standard,
the limit is almost always 160 characters per message.2) Moreover, like text-based
CMC, it is primarily QWERTY-driven – which is to say, reliant on the standard
typewriter keyboard (Anis 2007). Whether or not any mechanical feature of any
technology presents as a communicative constraint or opportunity, however, dep-
ends on the user and on the context of use.

3. Locating the linguistic: An overview of the literature

For a technology that only really went “live” in the mid-1990s, it took scholars a
while to attend to texting. Since the early 2000s, however, research from a range of
disciplines and a number of countries has been growing. While much of this work
falls outside the immediate interests of language scholars, it does reveal the in-
creasing importance and application of texting in both scholarly and public con-
texts. This research also demonstrates how much scholarly writing focuses on the
transactional and often commercial uses of texting rather than the relational func-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 165

tion which, as we will suggest, is at the heart of most everyday texting. Texting re-
search spans a wide range of disciplines and topics. From medicine, studies include
the use of texting for patient reminders (e.g., Downer, Meara, Da Costa, and Se-
thuraman 2006; Leong et al. 2006) and for aftercare treatment (e.g., Robinson et al.
2006; Weitzel et al. 2007). In academia, studies include texting as library support
(Herman 2007; Hill, Hill, and Sherman 2007), as a research methodology (Bosnjak
et al. 2008; Cheung 2008; Steeh, Buskirk, and Callegaro 2007), as a pedagogical
tool (Dürscheid 2002a; Naismith 2007), as a recruitment strategy (Maher 2007),
and as a means for reducing school truancy (Allison 2004). Research in environ-
mental development has examined how texting assists Bangladeshi villagers to lo-
cate clean water sources (Opar 2006). Texting research extends to business and
commercial uses (e.g., Bamba and Barnes 2007; Hsu, Wang, and Wen 2006; Ma-
hatanankoon 2007), political campaigning (Prete 2007), and media broadcasting
(Enli 2007). Closer to human communication research, psychologists have looked
at compulsive texting (Rutland, Sheets, and Young 2007) and so-called cyberbul-
lying (e.g., Raskauskas and Stoltz 2007; Smith et al. 2008). What is apparent from
this research is how often the purely informational uses of texting are privileged.
Much other research does address the role of texting as a social-communicative
resource in people’s daily lives. Consider these findings, for example: Thirty-two
percent of adult texters in Malaysia cannot use their mobile phones without texting
(Tanakinjal, Amin, Lajuni, and Bolongkikit 2007); texting is a status symbol with
Hong Kong college students, with texters being predominantly male and having a
high household income (Leung 2007); young adults with lower social skills in
Hong Kong (Leung 2007) and Japan (Ishii 2006) prefer texting to voice communi-
cation; Filipino mothers in the U.S. with children overseas use texting to maintain
real-time relationships with their children (Uy-Tioco 2007); and subtle gender re-
lations are negotiated via texting in Taiwan (Lin and Tong 2007). Lists like this il-
lustrate nicely the ways in which texting is typically embedded in people’s daily
lives.
In terms of language and communication in particular, scholarly interest has
been somewhat slower still to establish itself, and texting continues to be a
relatively under-examined area of research (compared, for example, with other
modes of CMC). This too has been changing, however, and a growing body of
properly sociolinguistic and discourse analytic research attends to texting in Eng-
lish and other national languages. Our brief overview of the literature here, for
example, covers work done in Finland, Sweden, Norway, Denmark, France, Ger-
many, Greece, Italy, South Africa, Nigeria, New Zealand, Kuwait, Malaysia,
Japan, Korea, China, Taiwan, and Hong Kong, as well as the UK and the U.S. Prag-
matically-oriented studies meanwhile have begun to address, among other things,
turn-taking, code-switching, openings and closings, and general communicative
intent. They have also considered, explicitly or not, the pragmatic implications of
message length, textual complexity, grammar and punctuation, orthography, and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
166 Crispin Thurlow and Michele Poff

the use of emoticons. In every case, studies typically situate pragmalinguistic phe-
nomena with a view to broad cultural and interactional variations, which has im-
portant implications for any gross generalizations about the uniform nature of tex-
ting – a point we return to below.

3.1. Cross-cultural contexts


Cross-cultural research on texting typically focuses on “linguacultural” (Agar
1994) and gender differences. A small handful of studies consider age differences.
Perhaps not surprisingly, young people and older people have been found to use
texting in different ways (Kim, Kim, Park, and Rice 2007). Teenagers and young
adults are typically the most avid texters in a range of cross-cultural settings (Ka-
sesniemi 2003; Ling 2005; Spagnolli and Gamberini 2007), which is not to say that
texting is exclusive to, or has relevance only for, young people. In reviewing the
literature briefly, we find very little research that focuses on adult texters; the vast
majority attends to children and young people. As with popular media coverage,
therefore, the broader demographics of texters is largely overlooked.
In terms of gender differences in texting, research has been done in a number of
countries. In Norway, for example, female teenagers and young adults text most
frequently, with more than 40 % of young women texting daily (Ling 2005). Com-
pared with young Norwegian men, these young women also send a greater number
of longer and more syntactically complex messages, 52 % of which contain com-
plex sentence structures compared with 15 % of boys’ messages. The women also
use capitalization and punctuation more prescriptively, are more adroit at innovat-
ing new forms, prefer to coordinate events in the immediate future (as opposed to
the middle future, as do boys), and are more likely to use texting for managing
emotionally “loaded” communication (Ling 2005). These broad differences be-
tween girls/women and boys/men are commonly reported; see also Höflich and
Gebhardt (2005) and Schmidt and Androutsopoulos (2004) in Germany; Herring
and Zelenkauslaite (2009) in Italy; and Deumert and Masinyana (2008) in South
Africa. In Finland, meanwhile, Kasesniemi (2003) also found that teenage girls are
heavy texters, often placing greater emphasis on providing emotional exchanges,
contemplating reasons behind interpersonal incidents, and discussing how inci-
dents have affected them. Finnish boys, however, typically place greater emphasis
on speed; their messages tend to be brief, informative, practical, often single-word
or question-answer texts in a single sentence, and are about the facts of events.
That gender differences emerge in young people’s preferred communication styles
is hardly surprising (Thurlow 2001); these findings do, however, reiterate the
variability that exists between texters and the messages they send.
Other cross-cultural research has shown variable patterns across social/demo-
graphic groups within countries. For example, texters in Germany (Dürscheid
2002b), Italy (Spagnolli and Gamberini 2007), France (Rivière and Licoppe 2005),

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 167

Korea (Kim et al. 2007), and young people in Japan (Ishii 2006) communicate pre-
dominantly with family or those in their innermost social circles. A study of older
Japanese texters, meanwhile, found texting used more with those in extended social
and even professional circles, in order to preserve respect for the receiver by not
risking interrupting their affairs (Rivière and Licoppe 2005). In a study of Kuwaiti
texters, Haggan (2007) notes the transcription of Arabic texts into English and a ten-
dency towards formality and eloquence, which, she argues, may arise from the value
of the texts more generally. Spagnolli and Gamberini (2007) meanwhile comment
on the way that some Italians send lengthy, elaborate refusals to invitations, which,
the authors argue, reflects particular local norms. Of course, in all these cases, it is
not clear how generalizable the findings are to the rest of the country. Related to this
point, we were unable to find anyone pulling together a large multinational com-
parative study that might offer a more systematic perspective on these types of lin-
guacultural differences, although some steps have been taken in this direction (e.g.,
Dürscheid and Stark 2011; Nickerson, Isaac, and Mak 2008; also see below: Bies-
wanger 2007; Plester, Litteton, et al. 2009; Spilioti 2009, 2011).

3.2. Interactional contexts


The use of texting in building and maintaining relationships has been a key aspect
of research, which goes a long way towards confirming the essentially social func-
tion of the technology. For example, texting can assist in establishing new relation-
ships (Ling, Julsrud, and Yttri 2008; see also Thompson and Cupples’ 2008 study
of young New Zealanders) or, as in Japan, in maintaining and reinforcing existing
ones (Ishii 2006). Young Japanese people also rated their relationships as more
intimate when texting was an aspect of the relationship (Igarashi, Takai, and Yos-
hida 2005). Scholars have also remarked on the ritualistic role of texting in defin-
ing social boundaries through shared linguistic codes (e.g., Androutsopoulos and
Schmidt 2002; Ling et al. 2008; Spilioti 2009) and have demonstrated how speech
styles constitute different types of social relationships, with style shifting provid-
ing a contextual cue for relationship maintenance and conflict management
(Schmidt and Androutsopoulos 2004). The role of texting in maintaining an “ab-
sent presence” in Japanese relationships is highlighted by Ito and Okabe (2005) as
a key interactional function of texting – what they call ambient virtual co-presence.
French texters, too, have been found to use texting for maintaining an absent pres-
ence among close friends (Rivière and Licoppe 2005). This research demonstrates
the deeply embedded nature of texting in people’s lives and its key role in re-
lational escalation and maintenance.
Privacy considerations in texting have also been explored; for example, Wei-
lenmann and Larsson (2002) found that texting may be a collective, public prac-
tice, with young Swedes sometimes reading and composing aloud with co-present
friends. French texters, however, have been found to appreciate the ability to en-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
168 Crispin Thurlow and Michele Poff

gage in private communications in public places, as texting permits senders to


freely express emotion absent inhibitions and modesties (Anis 2007; Rivière and
Licoppe 2005). The privacy afforded by texting also enables young people to com-
municate more freely (e.g., without adults’ surveillance), which shores up young
people’s communities (Thompson and Cupples 2008). Conversely, in China, the
traditional social order as governed by the State is perceived to be under threat,
where texting facilitates a more or less Habermasian “public sphere” (Latham
2007). Whether approved of or not, texting is clearly aiding sociality in interesting
and, to some extent, novel ways.
Another area of research that speaks to the interactional contexts of texting –
and that has received considerable scholarly attention – is the thematic content or
functional orientation of people’s text messages. Chiluwa (2008), for example,
classified Nigerian texters’ messages into three categories: economic (business and
commerce), social (religion, politics, education, and other social concerns), and
personal (greetings, feelings, prayers, etc.), and found that 60 % of text messages
fell into this last category. Other researchers have similarly found the overall pur-
pose of texting to be primarily affective, phatic, and socio-coordinative (Androut-
sopoulos and Schmidt 2002; Kasesniemi 2003; Ling 2005; Rivière and Licoppe
2005). The socio-coordinative function might entail, for example, the sending of
“gifts” (akin to greeting cards) or a good-night message (Harper 2002; Laursen
2005; Ling 2005), managing a romantic relationship (Harper 2002), or the ex-
change of jokes and other word-play games (Rivière and Licoppe 2005). Content is
also sometimes created together with co-present friends (Harper 2002; Weilen-
mann and Larsson 2002), and because texting is most often used to fill gaps in the
day when texters are without direct, face-to-face interpersonal contact, it invari-
ably takes on a chatty tone (Ito and Okabe 2005). This body of research further il-
luminates the range of different social functions texting fulfills in people’s lives.

3.3. Pragmalinguistic contexts


A favourite topic of interest in writing about texting, both lay and scholarly, has
been its lexical and stylistic features. Thankfully, an increasing amount of empiri-
cal research has begun to provide more measured, discursively situated perspec-
tives on popular stereotypes about the features most popularly attributed to texting,
including use of abbreviations (e.g., txt), letter-number homophones (e.g., gr8),
and non-standard spelling (e.g., luv) – some of the most popularly cited examples
of texting.
A brief review of the texting literature such as the one in this chapter immedi-
ately reveals how the “linguistics” of texting is again marked by a number of cross-
cultural similarities and differences. For example, research on Swedish texters
finds that they alter their spelling from the standard by spelling phonetically, split-
ting compounds, omitting vowels, using conventional and unconventional abbrevi-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 169

ations, writing in either all caps or all lower case, and exchanging longer words for
shorter ones (Hård af Segerstad 2002). In Norway, meanwhile, teenagers do not
use as many spelling alterations as do Swedish texters, with only 6 % of partici-
pants in one study using abbreviations, acronyms or emoticons, and girls largely
responsible for abbreviations and innovative spellings (Ling 2005). German
texters commonly use reduction techniques (Androutsopoulos and Schmidt 2002),
while French texters use phonetic reductions, syllabograms, rebus writing (e.g., as
with the English b4 for ‘before’), logograms which are symbols, acronyms, and
unilateral abbreviations (Anis 2007), and represent spoken forms in writing (Ri-
vière and Licoppe 2005). In the U.S., unambiguous abbreviations (e.g., u for ‘you’;
r for ‘are’), vowel deletions, and lexical shortenings (e.g., Sun for ‘Sunday’) are
common (Ling and Baron 2007). Nigerian English texters employ spelling ma-
nipulations, abbreviations, and phonetic spellings (Chiluwa 2008), and British
texters are also linguistically creative (Tagg 2010). In one of only two African
studies on texting that we are aware of, South Africa provides an interesting case
where texters are found to use abbreviations, paralinguistic restitutions, and non-
standard spellings when texting in English, but not at all when texting in isiXhosa
(Deumert and Masinyana 2008). Capitalization, punctuation, and blank spaces are
often omitted in Swedish text messages (Hård af Segerstad 2002); apostrophes and
sentence-final punctuation are omitted about two-thirds of the time in the U.S.
(Ling and Baron 2007). Emoticons, e.g., smiley faces, are rare but are used in the
U.S. (Ling and Baron 2007) and in Sweden (Hård af Segerstad 2002). Once again,
what is striking about this international research is how much variation it shows.
In addition to examining the lexical and orthographic features of texting, re-
search has also attended to a range of syntactic and textual features (i.e., looking at
the composition, organization, and coherence of messages). In this regard, mess-
age length has received considerable attention; for example, Hård af Segerstad
(2002, 2005a, b) found that, at 14.77 words per message, Swedish text messages
are typically longer than German messages, at 13 words per message (Döring
2002a, b). It is possible that cross-language comparisons are complicated by vari-
able morphemic structures (see Plester et al. 2009). Ling and Baron (2007), mean-
while, found that text messages in the U.S. averaged only 7.7 words each, making
them closer in length to those in Norway, which average 6.95 words per message
for girls and even fewer for boys, 5.54 words per message (Ling 2005). In an ex-
tensive comparison of English and German syntax in texts, Bieswanger (2007)
found that English texts contain on average 91 characters per message, while Ger-
man texts contain 95. The pragmatic significance of message length will become
apparent when we turn to our own case study in a moment.
Research on syntactic features has also investigated message complexity, i.e.,
messages containing multiple clauses. According to this measure, Norwegian teen-
age girls’ messages contain far greater complexity (52 %) than their male counter-
parts (15 %) (Ling 2005). Similar results were found in Finland, where boys prefer

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
170 Crispin Thurlow and Michele Poff

to send one-sentence text messages, while girls prefer longer and more complex
messages (Kasesniemi 2003). These findings are consistent with Ling and Baron’s
(2007) finding that 60 % of their female U.S. university students’ text messages
contained more than one sentence. Along these lines, the omission of auxiliary
verbs, personal pronouns, and function words is common in Germany (Dürscheid
2002a) and Sweden (Hård af Segerstad 2002), where omission of the subject pro-
noun is also the most common syntactic reduction (Hård af Segerstad 2002). In the
UK, analyses of article use and texting language usage more generally are foci of
Tagg’s (2007a, b) work. A common thread across these studies is the syntactic vari-
ation in both gendered and other cross-cultural contexts.
In more specifically pragmatic research, studies show that, for example, open-
ings and closings are frequently dropped by Italian (Spagnolli and Gamberini
2007), Japanese (Ito and Okabe 2005), and German (Dürscheid 2002a, b) text
messagers. Dürscheid views this as a function of the conversational frame of tex-
ting, as texting is often used as a conversation channel – and indeed adheres more
to conversational norms – rather than as a form of communication that adheres to
prescriptions for writing (see also Anis 2007, Ito and Okabe 2005). Kasesniemi
(2003) too has remarked on the increasingly dialogical nature of texting among
young Finns. Other research suggests that turn-taking conventions may be even
stricter in texting than in speech, although this varies by cultural context and topic
content (or communicative intent), and adheres to some highly standardized ex-
change patterns (Androutsopoulos and Schmidt 2002; Spagnolli and Gamberini
2007). Texters in Italy (Spagnolli and Gamberini 2007) and Japan expect reciproc-
ity, and Japanese texters are highly sensitive to the amount of time that passes be-
tween turns, sending a text message prompt for recipients who take too long to
reply (Ito and Okabe 2005). Working with Danish data, Laursen (2005) found ex-
pectations of reciprocity and immediacy, while Harper (2002) argued that in the
U.S., text messages did not necessitate a reply and certainly not immediately.
Some research on code switching has also been done in multilingual settings,
predominantly, although not exclusively, investigating the use of English in com-
bination with another national language. In Kuwait, Haggan (2007) found that
texters use a mixture of Arabic and English in their text messages, while Finnish
teenagers mix Finnish with a medley of foreign language words and expressions,
drawing suitable expressions from any language known by the writer (Kasesniemi
2003), and South African texters blend English with isiXhosa by writing English
nouns with isiXhosa prefixes (Deumert and Masinyana 2008). In contrast, Ni-
gerian texters completely avoid any “Nigerianness” in their succinct messages,
preferring standard (British) English and, even in their personal texts, avoiding Ni-
gerian English and other indigenous languages (Chiluwa 2008). In her study,
Spilioti (2009) provides an account of graphemic representations in Greek texters’
alphabet choices and code-switches. While these and other studies certainly attest
to some important cultural variability, it is telling that so much research still covers

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 171

English and other dominant/national European languages and, to some extent, lan-
guages like Japanese and Arabic, to the detriment of the rest of the languages of the
world. This imbalance mirrors patterns of global wealth distribution, as well as the
symbolic marketplace of academia.

3.4. Metalinguistic contexts


Despite the growing body of scholarly research on texting, public and policy-level
discourse about texting continues to fixate on its deleterious impact on literacy and
standard language use – especially that of young people (Thurlow 2006, 2007). No
review of the literature on texting would be complete without briefly considering
this broader metalinguistic framework. In this regard, research has addressed two
closely related types of public commentary: first, the general influence of texting
on standard languages and on popular notions of “good communication”; second,
concerns about the specific influence of text messaging style on conventional lit-
eracy. Invariably, these metalinguistic – or language ideological – debates priorit-
ize the belief that text messaging style has a negative impact. These issues have
been addressed by researchers writing/working in various languages (e.g., in Ger-
man: Androutsopoulos and Schmidt 2002; Dürscheid 2002a, b; in French: Anis
2007; in Nigerian English: Chiluwa 2008). While a few scholars claim that texting
has a negative influence on standard writing, spelling, and grammar (e.g., Siraj and
Ullah 2007), most empirical studies focused on this issue maintain that texting
does not pose a threat to standard language teaching and learning. These scholars
usually argue that, although there may be some diffusion of texting style into “for-
mal” writing (e.g., school work), texters almost always recognize that language use
is context specific (Chiluwa 2008; Dürscheid 2002a), although they do not necess-
arily view CMC as “writing” (Lenhart, Arafeh, Smith, and Macgill 2008). Other
scholars challenge the idea that the influence of texting on standard language prac-
tices is necessarily negative. Androutsopoulos and Schmidt (2002: 95), for
example, note the following features of texting and their implications: “ortho-
graphic negligence reflects the reduction of cognitive resources allocated to spell-
ing; transgression of orthography implies deliberate discrepancies; and neography
is an alternative orthography”. Other research (Shortis 2007) suggests that the lin-
guistic creativity of texting poses little threat to standard spelling. Some of the
most explicit (and conclusive) research on the issue of standard literacies comes
from Plester and her colleagues, who find a positive relation between texting and
literacy (Plester et al. 2009; Plester, Wood, and Bell 2008; Plester, Wood, and Joshi
2009). (One instant messaging study also suggests that new media language does
not interfere with standard literacy: Tagliamonte and Denis 2008). Plester’s re-
search confirms, not surprisingly, that young people (like older texters, no doubt)
are inherently aware of key pragmatic considerations such as context, relationship,
and communicative intent (see also Lenhart et al. 2008; Tagg 2009).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
172 Crispin Thurlow and Michele Poff

4. The pragmatics of texting: A case study

One early example of empirical research published on texting was our own study
(Thurlow 2003).3 Based on a corpus of actual text messages, this study presented a
direct challenge to the kinds of largely unfounded claims being made in the media
at the time; it also offered a more properly discourse analytic perspective on tex-
ting (for an overview of discourse analysis and its relation to pragmatics, see Ja-
worski and N. Coupland 2006). A number of the studies reviewed above – es-
pecially those with a specifically (socio)linguistic focus – have used this original
study as a stimulus for extending scholarly understanding of the “language” of tex-
ting. We review the study here in order to demonstrate – and reiterate – the quin-
tessentially pragmatic nature of texting.

4.1. Linguistic form and language play


While much is made in the media and elsewhere about the technologically imposed
need for brevity in texting, texters seldom seem to use all the space available. The
average word length of text messages in our own study was approximately 14 and
the average character length of messages was only 65, although with quite a lot of
variation (SD = 45). (Recall that the standardized limit on text messages is 160
characters.) Others have reported similar results. The length and abbreviated lin-
guistic forms of texts would seem to be more a function of the need for speed, ease
of typing and, perhaps, other symbolic and pragmatic concerns, such as gender
identity performance or a preference for more dialogic exchanges (see also Döring
2002a; Hård af Segerstad 2005a; Herring and Zelenkauskaite 2009; Kasesniemi
2003; Ling 2005; Ling and Baron 2007; Zelenkauskaite and Herring 2008). In this
sense, texting immediately takes on the character of interactive written discourse,
as in other new media genres like instant messaging. Texters are able from the out-
set to infuse an ostensibly asynchronous technology with a certain degree of syn-
chronicity – or dialogicality. The technology is thereby co-opted and exploited to
serve people’s underlying needs for intimacy and sociability. Elsewhere, we have
called this the “communication imperative” (Thurlow, Lengel, and Tomic 2004), a
fundamental human drive which usually prevails over the mechanical limitations
of technologies.
There are other technological constraints in texting that are similarly leveraged
by users for interpersonal gain; this is especially evident in the linguistic and typo-
graphic form of text messages. Just as message length may easily be accounted for
in pragmatic terms, so too may most of the supposedly distinctive, novel, and/or
unorthodox linguistic forms, such as shortenings (i.e., missing end letters), con-
tractions (i.e., missing middle letters), g-clippings and other clippings that drop the
final letter, acronyms and initialisms, letter/number homophones, “misspellings”
and typos, non-conventional spellings, and accent stylizations.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 173

What was most noticeable about the non-standard items in our own study was
how so few of them were especially new or especially incomprehensible. (The
media and other commentators often like to play up the “hieroglyphic” unintelligi-
bility of young people’s texting – see Thurlow 2007). In practice, very few of the
text messages we looked at were semantically unrecoverable, even in isolation
from their original, discursive context and even to outsiders such as ourselves.
Much of what texters type in their messages would not be out of place on a
scribbled note left on the fridge door, the dining-room table, or next to the tele-
phone – sites where the same brevity-speed imperative would apply. In this sense,
both academic and lay claims for the impenetrability and exclusivity of texting lan-
guage appear greatly exaggerated and belie the discursive significance of situated
language use. Like the fridge-door note-maker, texters surely recognize the ob-
vious need also for intelligibility – in Gricean terms, for adherence to the maxims
of quantity and manner (Grice 1975; cf. also Lenhart et al. 2008; Plester et al. 2009;
Tagg 2007b). One of the best examples of this, in terms of abbreviation, is the use
of consonant clusters (e.g., THX), which rely on the premise (and metapragmatic
awareness) that consonants in English (as with many other languages) usually con-
vey more semantic detail/value than vowels. Many of the non-conventional spell-
ings found in texting are widespread and pre-date the mobile phone, in any case
(Crystal 2008; Shortis 2007). Examples include the use of z as in girlz and the k in
skool, as well as phonological approximations such as the Americanized forms
gonna, bin, and coz and g-clippings like jumpin, havin.
Our own corpus did require one important caveat regarding the issue of non-
standard orthography. The text messages we looked at revealed only about three
abbreviations per message, which meant that this supposedly defining feature of
texting style accounted for less than 20 % of the overall message content analyzed
(see also Bieswanger 2007). This initial finding certainly appears to run counter to
popular ideas about the unintelligible, highly abbreviated “code” of texting. In the
same vein, relatively few typographic (as opposed to alphabetic) symbols were
found throughout the entire corpus, almost all of which were simply kisses or ex-
clamation marks, usually in multiple sets (e.g., xxxxxx and !!!!!). Emoticons (e.g.,
J), too, were noticeable by their absence. Moreover, in spite of their notoriety in
media reports and despite the title of Crystal’s (2008) book about texting, relatively
few examples of letter-number homophones (e.g., Gr8) were found. Like many of
the paralinguistic and prosodic cues found in older CMC technologies such as IRC
(see Werry 1996), a more frequent type of language play was “accent stylizations”
and “phonological approximations”, such as the regiolectal spelling novern for
‘northern’ (for parallels in languages other than English, see Ling 2005; Hård af
Segerstad 2005b). In addition, we found a range of onomatopoeic, exclamatory
spellings (e.g., haha!, arrrgh!, WOOHOO!, rahh, ahhh) and a handful of other
typographic-cum-linguistic devices for adding prosodic impact (e.g., quick quick,
wakey wakey and yawn) and, therefore, communicative immediacy. Indeed, as re-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
174 Crispin Thurlow and Michele Poff

searchers like Shortis (e.g., 2007) have shown, the non-standard orthography of
texting almost always expresses the generally creative, playful, and friendly tone
intended by texters (see also Hård af Segerstad 2005a). Herein lies the crux of tex-
ting.

4.2. Communicative intent: Maximizing sociality


Relationship building and social intercourse are both central to, and strongly facili-
tated by, technologies for communication, even though popular opinion still feeds
on the once-popular scholarly idea that CMC is inherently asocial and/or antisocial
(see Thurlow, Lengel, and Tomic 2004 for more on this). Perhaps even more so
than the landline telephone, the mobile phone and texting are clearly “technologies
of sociability” (Fischer 1988).
For anything other than analytical convenience, it is practically impossible to
separate relational intent neatly from transactional intent – or, to put it another way,
to separate “doing sociability” from information exchange (Jaworski 2000: 113).
However, the text messages we collected were overwhelmingly and, for the most
part, quite apparently relational in their orientation, ranging from sending friendly
salutations, to making social arrangements, to substantial friendship maintenance.
Explicitly transactional messaging accounted for only 15 % of all the messages
analyzed. Even these ostensible information exchanges (e.g., hyper-coordinated,
practical arrangements) invariably served more social concerns, such as finding a
friend during a night out or courteously letting someone know that the texter was
running late. The predominantly solidary, often phatic function of texting was ex-
pressed also in the persistent use of humour and the “gifting” of chain messages
(e.g., stock sentiments or saucy jokes).
In this sense, it is clear that much texting epitomizes small talk – which is not to
say that it is peripheral or unimportant. On the contrary; as J. Coupland (2000) re-
minds us, small talk is, interactionally speaking, big talk regardless of its brevity,
informality, or apparent topical superficiality. For example, as Androutsopoulos
(2000) has demonstrated in the case of fanzines, non-standard orthography can be a
powerful but also playful means for texters (and young texters, especially) to af-
firm their social identities by deviating from conventional forms; in doing so, they
differentiate themselves (from adults, for example) and align themselves with each
other. To this, we would add the opportunity to personalize and informalize their
messages. Accordingly, most of what happens in/with everyday texting can and
should be explained in the context of texters’ self-evident drive to connect with one
another and to maximize sociality (see also Androutsopoulos and Schmidt 2002;
Igarashi, Takai, and Yoshida 2005; Ito and Okabe 2005; Kasesniemi 2003; Ling
2005; Rivière and Licoppe 2005; Schmidt and Androutsopoulos 2004; Spilioti
2009). In these terms, texting presents itself in the broadest terms as a social tech-
nology par excellence.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 175

One technologically afforded pragmatic phenomenon in our 2003 data was the
openly sexual tone of many messages. Texting facilitates an interesting mix of inti-
macy and social distance, not unlike various other genres of CMC (e.g., instant
messaging and, to some extent, email); this also complicates traditional boundaries
between private and public (cf. H. Lee 2005; Zelenkauskaite and Herring 2008).
The technical rapidity and ephemerality (it is seldom stored or recorded) of texting
seem to lend them a relative anonymity, even though the sender and receiver are in-
variably known to each other and/or revealed to each other through caller/number
display. This kind of “recognized anonymity” might explain the relative licentious-
ness or “flame” tendencies of some texters (for more on anonymity, see Joinson
2001; Thurlow, Lengel, Tomic 2004).4 The face-saving capacity of this type of
anonymity likewise accounts for texters who send messages to say something they
would ordinarily avoid having to say face-to-face, such as breaking up with a ro-
mantic partner or, in the case of our own study, discussing an unexpected preg-
nancy.
Related to this sense of recognized anonymity, and as another example of
how text messagers capitalize on technological affordances, our corpus revealed
instances where the sender and receiver were apparently within viewing distance
of each other. Texting facilitates this kind of co-present exchange, allowing texters
to interact covertly in an immediate and potentially very intimate form of com-
munication – what some have referred to as the “culture of concealed use” (Ling
and Yttri 2002:164). Texting evidently enhances communication in ways that
allow for multiple or even parallel communicative exchanges (including face-to-
face interaction), offering an attractive combination of mobility, discretion, inti-
macy, and play. This combination of immediacy and intimacy drives the underly-
ing need for sociality and, for the most part, explains the linguistic form, or style,
of texting.

4.3. The “maxims” of text message style


Assumptions – especially in the media – about the ubiquity, consistency, and ho-
mogeneity of texting style are, in practice, always confronted with a great deal of
linguacultural, social, and personal variation. This is apparent from the variable
findings of the studies we reviewed above, which show noticeable national, gender,
and, to some extent, age differences (see, in particular, Bieswanger 2007; Deumert
and Masinyana 2008; Dürscheid 2002a; Herring and Zelenkauskaite 2009; Kim et
al. 2007; Ling, Julsrud, and Yttri 2005; Spilioti 2009). The fact is that no two
texters necessarily text in the same way, although friends and peer groups no doubt
establish their own local stylistic norms. Nor, of course, does the same texter
necessarily make the same stylistic choices for all messages (cf. Androutsopoulos
and Schmidt 2002; Spagnolli and Gamberini 2007). This is not to imply, however,
that texting is without its stylistic curiosities and normativities; indeed, the “lan-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
176 Crispin Thurlow and Michele Poff

guage of text messaging” is simultaneously remarkable and unremarkable in its


relative unconventionality.
Based on our own corpus of real text messages and some of the research find-
ings reviewed above, it is possible to think of the typographic/orthographic prac-
tices of texting being underpinned by three key pragmatic “maxims” (cf. Grice
1975), all serving a general “principle” of sociality.5 The maxims, which account
for almost all of the language play we see in texting, are:
(1) brevity and speed
(2) paralinguistic restitution, and
(3) phonological approximation.
The first of these, the two-fold maxim of brevity and speed, is manifested most
commonly in (a) the abbreviation of lexical items (including letter-number homo-
phones) and (b) the relatively minimal use of capitalization and standard, gram-
matical punctuation (e.g., commas and spaces between words). Importantly, and
as we have already suggested, the need for both brevity and speed appears to be
motivated less by technological constraints than by pragmatic demands such as
ease of turn-taking (i.e., back-and-forth exchanges) and overall fluidity of social
interaction. (From the research reviewed above – e.g., Ito and Okabe 2005;
Laursen 2005 – it appears that there is some variation in texters’ expectations
of reciprocity and response time.) In terms of the second and third maxims, para-
linguistic restitution understandably seeks to redress the apparent loss of socio-
emotional or prosodic features such as stress and intonation, while phonological
approximation (e.g., accent stylization) adds to paralinguistic restitution and en-
genders the kind of playful, informal register appropriate to the relational orien-
tation of texting. On occasion, the second and third maxims appear to override the
brevity-speed maxim (see also Spilioti 2009), but in most cases all principles are
served simultaneously and equally. Thus, capitalization (e.g., FUCK) and multiple
punctuation (what???!!!) may be more desirable for texters for the sake of para-
linguistic restitution. Lexical items such as ello (‘hello’), goin (‘going’), and bin
(‘been’), meanwhile, serve both the need for abbreviation and phonological ap-
proximation.
Even though many “linguistic puritans” (Thurlow 2006) nowadays like to
exaggerate the “death” of punctuation, the use of question marks (? ) and full-stops
(.) can be surprisingly persistent – especially given the additional effort and time it
takes to punctuate (cf. Spilioti 2009 again). In fact, with the loss of typographic
contrastivity (e.g., italics, bolding, underlining), the use of capitalization and punc-
tuation can become more useful, with ostensibly grammatical marks being co-
opted for other less standardized effects (e.g., LATE, wow!!!! or No wait …). An-
other example of paralinguistic restitution in graphical form is the famous emoti-
con – a direct borrowing from older digital genres such as IRC, and a feature that
appears to be similarly unpopular and, therefore, relatively infrequent, in spite of

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 177

its exaggerated depiction in the media. (In a follow-up to our study, Ling and Baron
2007 found a similar result; see also Hård af Segerstad 2002.)
The notion of standardness in written language is itself a sociocultural conven-
tion and always an abstraction from spoken language (see Cameron 1995; and on
texting in particular, Shortis 2007). In this sense, like the fridge-door note and the
phonetic transcriptions of expert linguists, many of the typographic practices of
texting offer more “correct”, more “authentic” representations of speech to begin
with. As Jaffe (2000: 498) puts it:
The use of non-standard orthography is a powerful expressive resource. … [which] can
graphically capture some of the immediacy, the ‘authenticity’ and ‘flavor’ of the spoken
word in all its diversity. … [and] has the potential to challenge linguistic hierarchies.

In their messages, texters “write it as if saying it” to establish a more informal reg-
ister, which in turn helps to do the kind of small talk and solidary bonding they de-
sire for maximizing sociality. The language texters use is, therefore, invariably ap-
propriate to the context of interaction (see Lenhart et al. 2008; Plester et al. 2009;
Tagg 2007a). Sometimes there is also evidence of texters’ reflexive (often playful)
use of language and their inherent metapragmatic awareness (Verschueren 2004),
as in the following example with its stylized performance of drunkenness and its
tongue-in-cheek misanthropy:
hey babe.T.Drunk.Hate all luv.Have all men.Fuck
them.how r u?We’re ou utery drunk.im changing.
Now.Ruth.xxx. Hate every1

This same metapragmatic awareness may also account for texters’ (admittedly
variable) use of such apparently clichéd forms as letter-number homophones and
emoticons, which can be used with ironic effect and/or self-consciously to enact or
playfully perform “text messaging”. In other words, in a Hallidayan sense (Halli-
day 1969/1997), texting always fulfills both an interpersonal and textual function,
as people send messages not only for relational bonding and social coordination,
but also to be seen to be texting. Texting (and mobile phones) carries cultural capi-
tal in and of itself – as a lifestyle accessory and a ludic resource. Irrespective of
message content, the act of texting has cachet (to follow the cliché, the medium is
also a message) and necessarily communicates something about the sender/user.
And part of buying into the cachet of texting means drawing on – or rejecting al-
together – symbolic resources such as ringtones, keypad covers, and popularized
linguistic markers like initialisms, clippings, and letter-number homophones. It is
precisely this kind of metapragmatic awareness and (life-)stylistic variation that is
typically overlooked in the print media’s own metapragmatic commentary – or
rather complaint – about texting (see Shortis 2007; Thurlow 2006, 2007).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
178 Crispin Thurlow and Michele Poff

4.4. Texting as a distinctive genre?


In her well-known article on the language of email, Baron (1998) grappled with the
idea that email might herald a new linguistic genre; her conclusion was ultimately
that email language instead represented a creolizing blend of written and spoken
discourse. Like email, and indeed most new media discourse, text messages have
much the same hybrid quality about them – both in terms of the speech-writing
blend and in terms of their mixing of old and new linguistic varieties. As Rössler
and Höflich (2002) put it, texting is “email on the move”. In its transience and im-
mediacy, however, texting is as much like instant messaging as it is like email –
and, for that matter, speech. In keeping with Herring’s (2001) proposals, therefore,
we are more inclined to view texting in its own terms; whatever formal similarities
it may bear to other CMC genres or modes, the linguistic and communicative prac-
tices of text messages emerge from a particular combination of technological af-
fordances, contextual variables, and interactional priorities. The kinds of ortho-
graphic (or typographic) choices that texters make in their messages are motivated
primarily by pragmatic and communicative concerns.
Once again, this is not to say that text messages are without character or dis-
tinction. Consider the following example:
Safe Hi babe!Angie + Lucy had words last nite-stood
there arguing 4 ages,loads of people outside cobarna.Bit
obvious they … werent gonna fight tho cos they were
there 4 so long!I was a bit pissed (woh!) Good nite tho!Spk
2u lata xxBeckyxx
Removed from its original technical context (i.e., transferring it from the small
screen of the mobile phone), the extract above is somehow clearly a text message.
How is this? Does this not imply a particular “language of texting”? Yes and no.
While much research focuses on the linguistic (and orthographic) form of texting
(see our review above), the defining feature of text messages is ultimately their so-
ciable function. Text messages are thus communicative events (i.e., genres) only
superficially recognizable from their look; their real significance (in both semantic
and social terms) lies primarily in their discursive content and communicative in-
tent. So, for example, while a text message may well appear informational or con-
tent-focused, it will more often than not be serving a relational purpose. This soli-
darity function is a more useful genre-defining feature of texting than, say, its
length or the use of abbreviations, letter-number homophones, etc.
The golden rule of pragmatics is, of course, that form and function are mutually
dependent. If the distinctive (albeit not necessarily unique) nature of texting is to
be pinpointed in any way, it must hinge on a combination of the following broadly
defined but typical discursive features:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 179

(a) the comparatively short length of text messages,


(b) the relative concentration of non-standard typographic markers, and
(c) their predominantly small-talk content and solidary orientation.

Key qualifications here are “combination”, “comparatively”, “relative”, and “pre-


dominantly”; none of these generic and stylistic features is sufficient individually
to characterize texting. Compared with a formal letter or an academic essay, they
are most likely shorter (constrained in part by the mechanical affordance of a 160
character limit), contain more language play, and are more chatty. This obvious
distinction starts to fall away, however, when compared with greeting card mess-
ages, fridge-door notes, and so on. Increasingly, with the convergence of new (and
old) media, the technological boundaries and generic distinctiveness of instant
messaging, texting, and emailing are becoming blurred. Notable examples of this
are to be found in microblogging (e.g., Twitter and status updates on Facebook –
see C. Lee 2011), as well as the multi-functionality of smart-phones (e.g., Black-
Berry) and, to some extent, Apple’s iPhone. These changes serve to remind us that,
like language in general, the language of text messaging is constantly changing. No
sooner have scholars had the chance to pinpoint (and publish about) the character
of new media language than the media change again (see Thurlow and Mroczek
2011). What remains unchanged, however, is people’s determination and capacity
to rework technologies (both mechanical and linguistic) for maximizing sociality –
in other words, for communication.

5. Conclusion: New directions

We started this chapter by referring to the decision by U.S. President Barack


Obama and his campaign organizers to announce his vice-presidential running
mate via text messaging. According to an Associated Press report at the time, his
campaign aides wanted to attract additional supporters by soliciting their cell
phone numbers and email addresses. Undoubtedly, the choice was a strategic and
practical one. However, whether intended or not, the medium was also a powerful
message in itself. This was a presidential candidate promising to be a man of
change and of participatory democracy. Like any successful presidential candidate
of recent times, Obama had to impress upon the country that he was also a man of
the people. “I’m asking you to believe. Not just in my ability to bring about real
change in Washington … I’m asking you to believe in yours”. Attainable or not,
true or not, what better way to implicate his vice-presidential announcement with a
message of novelty, interactivity, and, especially, sociability than to text it. As an
act of synthetic personalization (Fairclough 1989), a text message like this offers
only the appearance of sociability, however, and is far removed from the em-
bedded, interpersonal exchanges that normally characterize texting.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
180 Crispin Thurlow and Michele Poff

Umberto Eco (2002) notes that we are living in an age where the diminutive,
the brief, and the simple are highly prized in communication. Clearly, texting (and
tweeting) embodies this zeitgeist. And like many earlier communication technol-
ogies, it evokes and/or materializes a range of projected fears and hopes. Indeed,
the history of the development of so-called new communication technologies has
been marked by periods of excessive hype and hysteria about the kinds of cultural,
social, and psychological impacts each new technology is likely to have. This is
not to deny that few people – professional, academic, or lay – could have predicted
the extraordinary rise in popularity of the cell phone and its sister technology tex-
ting. Not surprisingly, public discourse about texting (e.g., in the media) encodes
any number of metapragmatic comments about the nature of both texting and lan-
guage, which are interesting in themselves. If, as Mey (2001: 5) suggests, the field
of pragmatics “is interested in the process of using language and its producers, not
just its end-product, language”, then the kind of everyday, metapragmatic com-
mentary about texting is decidedly a-pragmatic since, for the most part, it fixates
on the structures, forms, and grammars of language – or the perceived lack thereof.
For example, both media discourse and other popular commentary prioritize and
exaggerate the look of text messaging language – its supposedly distinctive lexical
and typographic style. Notwithstanding this, everyday talk about texting does offer
important insights into people’s beliefs (and concerns) about language (and tech-
nology) which, as Pennycook (2004) notes, perfomatively establishes the mean-
ings of language itself.
It is for this reason that the study of texting warrants continued research inter-
est, especially from discourse analysts and other language and communication
scholars. Briefly, this research would do well to focus on situated (or ethnographic)
analyses (i.e., the real, everyday contexts of texting; cf. Thurlow 2009; Thurlow
and Mroczek 2011): to address the use of texting across the lifespan; to pay even
more attention to non-European linguacultures; to explore different practices of
transcultural style- and code-switching;6 to link with other “short messaging” tech-
nologies such as microblogging (e.g., Twitter), which are sustained by text- and in-
stant-messaging as well as by emailing; and, in the same vein, to undertake prop-
erly multimodal discourse analysis (e.g., use of “pxting” in New Zealand, ring
tones, wallpaper). As the technologies of texting are constantly changing, so too
are the practices and meanings of texting; any research on texting needs to be con-
stantly updated. As we have argued before (Thurlow and Bell 2009; cf. also Buck-
ingham 2007: 3), it is also important that scholars lead the way in resisting a super-
ficial fascination with technology – and, in the case of texting, with fleeting
linguistic curiosities – in favour of a deeper engagement with the cultural contexts
and communicative practices that give both technology and language their real
meaning.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 181

Acknowledgements

We are grateful to Susan Herring, Tuija Virtanen, and an anonymous reviewer for
their careful and constructive feedback on an earlier draft of this chapter. Any er-
rors or oversights are of our own doing.

Notes

1. Source: International Technology Union’s ICT Development Index. Retrieved 10 April


2010 from http://www.itu.int/newsroom/press_releases/2009/07.html
2. For an interesting account of the reason behind the 160-character limit on text messages,
see the Los Angeles Times article (2009, May 03) Why Text Messages are Limited to 160
Characters. Retrieved 07 April 2010 from http://latimesblogs.latimes.com/technology/
2009/05/invented-text-messaging.html
3. To save space, we do not repeat background information about the size and nature of our
corpus other than to say that it comprised 541 text messages sent or received by a random
sample of British university students. With the exception of a few instances of Welsh, all
the messages were in English.
4. “Flames” and “flaming” are terms sometimes used to describe openly hostile or deroga-
tory messaging in CMC (see Thurlow, Lengel, and Tomic 2004).
5. In their recent study, Deumert and Masinyana (2008) found that these maxims were
violated by isiXhosa texters who, it seems, prefer to text without any forms of paralin-
guistic restitution and/or phonological approximation. By the same token, in her analysis
of Greek texting, Spilioti (2009) found that texters were not always beholden to brevity,
sometimes preferring to use more time-consuming foreign-language borrowings for the
sake of expressivity (i.e., paralinguistic restitution).
6. In his chapter “How do other languages do it?”, Crystal (2008) makes some attempt to ad-
dress the practices of texting in languages other than English. His lists of “text abbrevi-
ations in other languages” do little, however, to move understanding beyond the stereo-
typical exaggeration of linguistic forms preferred by journalists. Better examples of
first-hand empirical studies are, for example, Bieswanger (2008), Hård af Segerstad
(2005a), Herring and Zelenkauskaite (2009), Ling (2005), and Spilioti (2009).

References

Agar, Michael H.
1994 Language Shock: Understanding the Culture of Conversation. New York: Wil-
liam Morrow and Company.
Allison, Sheila
2004 Text messaging to parents cuts truancy. Youth Studies Australia 23(3): 7.
Androutsopoulous, Jannis K.
2000 Non-standard spellings in media texts: The case of German fanzines. Journal
of Sociolinguistics 4(4): 514–533.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
182 Crispin Thurlow and Michele Poff

Androutsopoulos, Jannis K. and Gurly Schmidt


2002 SMS-Kommunikation: Etnografische Gattungsanalyse am Beispiel einer
Kleingruppe. Zeitschrift für Angewandte Linguistik 36: 49–80.
Anis, Jacques
2007 Neography: Unconventional spelling in French SMS text messages. In: Brenda
Danet and Susan C. Herring (eds.), The Multilingual Internet: Language, Cul-
ture, and Communication Online, 87–115. New York: Oxford University Press.
Bamba, Fatim and Stuart J. Barnes
2007 SMS advertising, permission and the consumer: A study. Business Process
Management Journal 13(6): 815–829.
Baron, Naomi S.
1998 Letters by phone or speech by other means: The linguistics of email. Language
and Communication 18: 133–170.
Bieswanger, Markus
2007 2 abbrevi8 or not 2 abbrevi8: A contrastive analysis of different shortening
strategies in English and German text messages. Texas Linguistics Forum 50.
http://studentorgs.utexas.edu/salsa/proceedings/2006/Bieswanger.pdf
Bosnjak, Michael, Wolfgang Neubarth, Mick P. Couper, Wolfgang Bandilla, and Lars
Kaczmirek
2008 Prenotification in web-based access panel surveys: The influence of mobile
text messaging versus e-mail on response rates and sample composition. Social
Science Computer Review 26(2): 213–223.
Buckingham, David
2007 Beyond Technology: Children’s Learning in the Age of Digital Culture. Cam-
bridge, UK: Polity.
Cameron, Deborah
1995 Verbal Hygiene. London: Routledge.
Cheung, Stephen L.
2008 Using mobile phone messaging as a response medium in classroom experi-
ments. Journal of Economic Education 39(1): 51–67.
Chiluwa, Innocent
2008 Assessing the Nigerianness of SMS text-messages in English. English Today
24(01): 51–56.
Coupland, Justine (ed.)
2000 Small Talk. London: Longman.
Crystal, David
2008 Txting: the Gr8 Db8. New York: Oxford University Press.
Deumert, Ana and Sibabalwe Oscar Masinyana
2008 Mobile language choices. The use of English and isiXhosa in text messages
(SMS): Evidence from a bilingual South African sample. English World-Wide
29(2): 117–147.
Döring, Nicola
2002a “1x Brot, Wurst, 5 sack Apfel I.L.D” – Kommunikative Funktionen von
Kurzmitteilungen (SMS). Zeitschrift für Medienpsychologie 14(3): 118–128.
Döring, Nicola
2002b “Kurzm. wird gesendet” – Abkürzungen und Akronyme in der SMS-Kommuni-
kation. Muttersprache Vierteljahresschrift für deutsche Sprache 112(2): 97–115.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 183

Downer, Sean R., John G. Meara, Annette C. Da Costa, and Kannan Sethuraman
2006 SMS text messaging improves outpatient attendance. Australian Health Re-
view 30(3): 389–396.
Dürscheid, Christa
2002a E-Mail und SMS: ein Vergleich. In: Arne Ziegler and Christa Dürscheid (eds.),
Kommunikationsform E-Mail, 1–22. Tübingen: Stauffenburg.
Dürscheid, Christa
2002b SMS-Schreiben als Gegenstand der Sprachreflexion. Networx 28.
http://www.mediaculture-online.de/fileadmin/bibliothek/duerscheid_sms/
duerscheid_sms.html
Dürscheid, Christa and Elisabeth Stark
2011 sms4science: An international corpus-based texting project and the specific
challenges for multilingual Switzerland. In: Crispin Thurlow and Kristine
Mroczek (eds.), Digital Discourse: Language in the New Media, 299–320.
New York: Oxford University Press.
Eco, Umberto
2002 Diminutive, but perfectly formed. Guardian Newspaper, April 20.
Enli, Gunn Sara
2007 Gate-keeping in the new media age. Javnost-The Public 2: 47–61.
Fairclough, Norman
1989 Language and Power. London: Longman.
Fischer, Claude S.
1988 “Touch someone” – The telephone industry discovers sociability. Technology
and Culture 29: 32–61.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry Morgan (eds.), Syntax and Se-
mantics 3: Speech Acts, 41–58. New York: Academic Press.
Haggan, Madeline
2007 Text messaging in Kuwait. Is the medium the message? Multilingua 26(4):
427–449.
Halliday, M. A. K.
1969/1997 Language in a social perspective. In: Nikolas Coupland and Adam Jaworski
(eds.), Sociolinguistics: A Reader and Coursebook, 31–38. Basingstoke, UK:
Macmillan.
Hård af Segerstad, Ylva
2002 Use and adaptation of written language to the conditions of computer-mediated
communication. Ph.D. dissertation, Department of Linguistics, Göteborg Uni-
versity, Sweden. http://www.ling.gu.se/%7eylvah/dokument/ylva_diss.pdf
Hård af Segerstad, Ylva
2005a Language in SMS – a socio-linguistic view. In: Richard Harper, Leysia Palen,
and Alex Taylor (eds.), The Inside Text: Social, Cultual and Design Perspec-
tives on SMS, 33–52. Dordrecht: Springer.
Hård af Segerstad, Ylva
2005b Language use in Swedish mobile text messaging. In: Rich Ling and Per E. Ped-
ersen (eds.), Mobile Communications: Re-negotiation of the Social Sphere,
313–334. London: Springer.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
184 Crispin Thurlow and Michele Poff

Harper, Richard
2002 The mobile interface: Old technologies and new arguments. In: Barry Brown,
Nicola Green, and Richard Harper (eds.), Wireless World: Social and Interat-
cional Aspects of the Mobile Age, 207–226. London: Springer.
Herman, Sonia
2007 SMS reference: Keeping up with your clients. The Electronic Library 25(4):
401–408.
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi E. Hamilton (eds.), The Handbook of Discourse Analysis, 612–634. Ox-
ford, UK: Blackwell Publishers.
Herring, Susan C. and Asta Zelenkauskaite
2009 Symbolic capital in a virtual heterosexual market: Abbreviation and insertion
in Italian iTV SMS. Written Communication 26(1): 5–31.
Hill, J. B., Cherie Madarash Hill, and Dayne Sherman
2007 Text messaging in an academic library: Integrating SMS into digital reference.
Reference Librarian 47(97): 17–29.
Höflich, Joachim R. and Julian Gebhardt
2005 Changing cultures of written communication: Letter – e-mail – SMS. In: Ri-
chard Harper, Leysia Palen, and Alex Taylor (eds.), The Inside Text: Social,
Cultural and Design Perspectives on SMS, 9–32. Dordrecht: Springer.
Hsu, Tsuen-ho, Yi-sheng Wang and Su-chan Wen
2006 Using the decomposed theory of planned behaviour to analyse consumer be-
havioural intention towards mobile text message coupons. Journal of Target-
ing, Measurement and Analysis for Marketing 14(4): 309–324.
Igarashi, Tasuku, Jiro Takai, and Toshikazu Yoshida
2005 Gender differences in social network development via mobile phone text mes-
sages: A longitudinal study. Journal of Social and Personal Relationships
22(5): 691–713.
Ishii, Kenichi
2006 Implications of mobility: The uses of personal communication media in every-
day life. Journal of Communication 56(2): 346–365.
Ito, Mizuko and Daisuke Okabe
2005 Technosocial situations: Emergent structuring of mobile e-mail use. In: Mi-
zuko Ito, Daisuke Okabe, and Misa Matsuda (eds.), Personal, Portable,
Pedestrian: Mobile Phones in Japanese Life, 257–276. Cambridge, MA:
MIT Press.
Jaffe, Alexandra
2000 Introduction: Non-standard orthography and non-standard speech. Journal of
Sociolinguistics 4(4): 497–513.
Jaworski, Adam
2000 Silence and small talk. In: Justine Coupland (ed.), Small Talk, 110–132. Lon-
don: Longman.
Jaworski, Adam and Nikolas Coupland
2006 Introduction: Perspectives on discourse analysis. In: The Discourse Reader,
2nd Ed., 1–37. London: Routledge.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 185

Joinson, Adam
2001 Self-disclosure in computer-mediated communication: The role of self-aware-
ness and visual anonymity. European Journal of Social Psychology 31(2):
177–192.
Kasesniemi, Eija-Liisa
2003 Mobile Messages: Young People and a New Communication Culture. Tam-
pere: Tampere University Press.
Kim, Hyo, Gwang Jae Kim, Han Woo Park, and Ronald E. Rice
2007 Configurations of relationships in different media: FtF, email, Instant Mess-
enger, mobile phone, and SMS. Journal of Computer-Mediated Communi-
cation 12(4), article 3. http://jcmc.indiana.edu/vol12/issue4/kim.html
Latham, Kevin
2007 Sms, communication, and citizenship in China’s information society. Critical
Asian Studies 39(2): 295–314.
Laursen, Ditte
2005 Please reply! The replying norm in adolescent SMS communication. In: Ri-
chard Harper, Leysia Palen, and Alex Taylor (eds.), The Inside Text: Social,
Cultual and Design Perspectives on SMS, 53–74. Dordrecht: Springer.
Lee, Carmen
2011 Texts and practices of micro-blogging: Status updates on Facebook. In: Crispin
Thurlow and Kristine Mroczek (eds), Digital Discourse: Language in the New
Media, 110–128. New York: Oxford University Press.
Lee, Hangwoo
2005 Implosion, virtuality, and interaction in an internet discussion group. In-
formation, Communication and Society 81(1): 47–63.
Lenhart, Amanda, Sousan Arafeh, Aaron Smith, and Alexandra Macgill
2008 Writing, technology and teenagers. Pew Internet & American Life Project.
http://www.pewinternet.org/Reports/2008/Writing-Technology-and-Teens/
01-Summary-of-Findings.aspx
Leong, Kwok Chi, Wei Seng Chen, Kok Weng Leong, Ismail Mastura, Omar Mimi, Mohd
Amin Sheikh, Abu Hassan Zailinawati, Chirk Jenn Ng, Kai Lit Phua, and
Cheong Lieng Teng
2006 The use of text messaging to improve attendance in primary care: A random-
ized controlled trial. Family Practice 23(6): 699–705.
Leung, Louis
2007 Unwillingness-to-communicate and college students’ motives in SMS mobile
messaging. Telematics & Informatics 24(2): 115–129.
Lin, Angel M. Y. and Avin H. M. Tong
2007 Text-messaging cultures of college girls in Hong Kong: SMS as resources for
achieving intimacy and gift-exchange with multiple functions. Continuum:
Journal of Media & Cultural Studies 21(2): 303–315.
Ling, Richard
2005 The sociolinguistics of SMS: An analysis of SMS use by a random sample of
Norwegians. In: Richard S. Ling and Per E. Pedersen (eds.), Mobile Communi-
cations: Re-negotiation of the Social Sphere, 335–349. London: Springer.
Ling, Richard and Naomi S. Baron
2007 Text messaging and IM: Linguistic comparison of American college data.
Journal of Language and Social Psychology 26(3): 291–298.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
186 Crispin Thurlow and Michele Poff

Ling, Richard, Tom Julsrud, and Birgitte Yttri


2005 Nascent communication genres within SMS and MMS. In: Richard Harper,
Leysia Palen, and Alex Taylor (eds.), The Inside Text: Social, Cultual and De-
sign Perspectives on SMS, 75–102. Dordrecht: Springer.
Ling, Richard, Tom Julsrud, and Birgitte Yttri
2008 New Tech, New Ties: How Mobile Communication is Reshaping Social Cohe-
sion. Cambridge, MA: The MIT Press.
Ling, Richard and Birgitte Yttri
2002 Hyper-coordination via mobile phones in Norway. In: James E. Katz and Mark
Aakhus (eds.), Perpetual Contact: Mobile Communication, Private Talk, Pub-
lic Performance, 139–169. Cambridge, UK: Cambridge University Press.
Mahatanankoon, Pruthikrai
2007 The effects of personality traits and optimum stimulation level on text-mess-
aging activities and M-Commerce intention. International Journal of Elec-
tronic Commerce 12(1): 7–30.
Maher, Matt
2007 You’ve got messages: Modern technology recruiting through text-messaging
and the intrusiveness of Facebook. Texas Review of Entertainment & Sports
Law 8(1): 125–151.
Mey, Jacob L.
2001 Pragmatics: An Introduction. Oxford, UK: Blackwell.
Naismith, Laura
2007 Using text messaging to support administrative communication in higher edu-
cation. Active Learning in Higher Education 8(2): 155–171.
Nickerson, Robert C., Henri Isaac, and Brenda Mak
2008 A multi-national study of attitudes about mobile phone use in social settings.
International Journal of Mobile Communication 6(5): 541–563.
Opar, Alisa
2006 Text messages dig up pure water for Bangladesh’s poor. Nature Medicine
12(9): 983.
Pennycook, Alastair
2004 Performativity and language studies. Critical Inquiry in Language Studies
1(1): 1–19.
Plester, Beverly, Karen Littleton, Marja-Kristiina Lerkkonen, Helena Rasku-Puttonen, and
Lauri J. Linjama
2009 A comparative study of Finnish and UK English pre-teen children’s text mess-
age language and its relationship with their traditional literacy skills. Paper
presented at the Language in the (New) Media Conference, Seattle, WA, Sep-
tember 3–6.
Plester, Beverly, Clare Wood, and Victoria Bell
2008 Text msg n school literacy: Does texting and knowledge of text abbreviations
adversely affect children’s literacy attainment? Literacy 42(3): 137–144.
Plester, Beverly, Clare Wood, and Puja Joshi
2009 Exploring the relationship between children’s knowledge of text message ab-
breviations and school literacy outcomes. British Journal of Developmental
Psychology 27(1): 145–161.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 187

Prete, Maria Irene


2007 M-politics: Credibility and effectiveness of mobile political communications.
Journal of Targeting, Measurement and Analysis for Marketing 16(1): 48–56.
Raskauskas, Juliana and Ann D. Stoltz
2007 Involvement in traditional and electronic bullying among adolescents. Devel-
opmental Psychology 43(3): 564–575.
Rivière, Carole A. and Christian Licoppe
2005 From voice to text: Continuity and change in the use of mobile phones in
France and Japan. In: Richard Harper, Leysia Palen, and Alex Taylor (eds.),
The Inside Text: Social, Cultural and Design Perspectives on SMS, 103–126.
Dordrecht: Springer.
Robinson, Sarah, Sarah Perkins, Stephanie Bauer, Neil Hammond, Janet Treasure, and Ul-
rike Schmidt
2006 Aftercare intervention through text messaging in the treatment of bulimia
nervosa – Feasibility pilot. International Journal of Eating Disorders 39(8):
633–638.
Rössler, Patrick and Joachim R. Höflich
2002 Mobile written communication or email on your cellular phone: Uses of short
messaging service SMS by German adolescents: A pilot study. Paper presented
at the 52nd Annual Conference of the International Communication Associ-
ation Conference, Seoul, Korea, July 15–19.
Rutland, J. Brian, Tilman Sheets, and Tony Young
2007 Development of a scale to measure problem use of Short Message Service: The
SMS problem use diagnostic questionnaire. CyberPsychology & Behavior
10(6): 841–844.
Schmidt, Gurly and Jannis Androutsopoulos
2004 löbbe döch. Beziehungskommunikation mit SMS. Gesprächsforschung 5:
51–71.
Shortis, Tim
2007 Gr8 txtpectations: The creativity of text spelling. English Drama Media
(June): 21–26.
Siraj, Syed Abdul and Farish Ullah
2007 Postmodernism and its insinuations on media and society. Journal of Develop-
ment Communication 18(2): 1–10.
Smith, Peter K., Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil
Tippett
2008 Cyberbullying: Its nature and impact in secondary school pupils. Journal of
Child Psychology and Psychiatry 49(4): 376–385.
Spagnolli, Anna and Luciano Gamberini
2007 Interacting via SMS: Practices of social closeness and reciprocation. British
Journal of Social Psychology 46: 343–364.
Spilioti, Tereza
2009 Graphemic representation of text-messaging: Alphabet-choice and code-
switches in Greek SMS. Pragmatics 19(3): 393–412.
Spilioti, Tereza
2011 Beyond genre: Closings and relational work in text messaging. In: Crispin
Thurlow and Kristine Mroczek (eds.), Digital Discourse: Language in the New
Media, 67–85. New York: Oxford University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
188 Crispin Thurlow and Michele Poff

Steeh, Charlotte, Trent D. Buskirk, and Mario Callegaro


2007 Using text messages in U.S. mobile phone surveys. Field Methods 19(1): 59–75.
Tagg, Caroline
2007a All a bit mind boggling really: Some observations regarding the frequencies of
a and the in text messaging. In: Corpus Linguistics Conference Proceedings,
University of Birmingham, 27–30 July.
Tagg, Caroline
2007b Corpus-based analysis of SMS text messaging. In: Peter Teo and Caroline M.
L. Ho (eds.), Discourse in the Modern World: Perspectives and Challenges,
267–284. Singapore: McGraw Hill.
Tagg, Caroline
2009 A corpus linguistics study of SMS text messaging. Ph.D. thesis, University of
Birmingham, UK. http://etheses.bham.ac.uk/253/
Tagg, Caroline
2010 “wot did he say or could u not c him 4 dust?”: Written and spoken creativity in
text messaging. In: Caroline M. L. Ho, Kate T. Anderson, and Ping Alvin
Leong (eds.), Transforming Literacies and Language: Innovative Technol-
ogies, Integrated Experiences, 223–236. London: Continuum.
Tagliamonte, Sali A. and Derek Denis
2008 Linguistic ruin? LOL! Instant messaging and teen language. American Speech
83(1): 3–34.
Tanakinjal, Geoffrey H., Hanudin Amin, Nelson Lajuni, and Jetol Bolongkikit
2007 Mobile devices and communication: An analysis. Journal of Internet Banking
and Commerce 12(3): 1–12.
Thompson, Lee and Julie Cupples
2008 Seen and not heard? Text messaging and digital sociality. Social & Cultural
Geography 9(1): 95–108.
Thurlow, Crispin
2001 Talkin’ ’bout my communication: Communication awareness in early adoles-
cence. Language Awareness 10(2&3): 213–231.
Thurlow, Crispin (with Alex Brown)
2003 Generation Txt? The sociolinguistics of young people’s text-messaging. Dis-
course Analysis Online 1(1).
http://extra.shu.ac.uk/daol/articles/v1/n1/a3/thurlow2002003-paper.html
Thurlow, Crispin
2006 From statistical panic to moral panic: The metadiscursive construction and
popular exaggeration of new media language in the print media. Journal of
Computer-Mediated Communication 11(3): 667–701.
Thurlow, Crispin
2007 Fabricating youth: New-media discourse and the technologization of young
people. In: Sally Johnson and Astrid Ensslin (eds.), Language in the Media:
Representations, Identities, Ideologies, 213–233. London: Continuum.
Thurlow, Crispin (ed.)
2009 Young People, Mediated Discourse and Communication Technologies. Special
issue, Journal of Computer-Mediated Communication 14(4).
http://www3.interscience.wiley.com/journal/122530868/issue

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
Text messaging 189

Thurlow, Crispin and Katherine Bell


2009 Against technologization: Young people’s new media discourse as creative
cultural practice. Journal of Computer-Mediated Communication 14(4):
1038–1049.
Thurlow, Crispin, Laura Lengel, and Alice Tomic
2004 Computer Mediated Communication: Social Interaction and the Internet. Lon-
don: Sage.
Thurlow, Crispin and Kristine Mroczek
2011 Introduction: Fresh perspectives on new media sociolinguistics. In: Digital
Discourse: Language in the New Media, xix-xliv. New York: Oxford Univer-
sity Press.
Uy-Tioco, Cecilia
2007 Overseas Filipino workers and text messaging: Reinventing transnational
mothering. Continuum: Journal of Media & Cultural Studies 21(2): 253–265.
Verschueren, Jef
2004 Notes on the role of metapragmatic awareness in language use. In: Adam Ja-
worski, Nikolas Coupland, and Dariusz Galasinìski (eds.), Metalanguage: So-
cial and Ideological Perspectives, 53–73. New York: Mouton de Gruyter.
Weilenmann, Alexandra and Catrine Larsson
2002 Local use and sharing of mobile phones. In: Barry Brown, Nicola Green, and
Richard Harper (eds.), Wireless World: Social and Interactional Aspects of the
Mobile Age, 92–107. London: Springer Verlag.
Weitzel, Jessica Aungst, Jay M. Bernhardt, Stuart Usdan, Darren Mays, and Karen Glanz
2007 Using wireless handheld computers and tailored text messaging to reduce
negative consequences of drinking alcohol. Journal of Studies on Alcohol and
Drugs 68(4): 534–537.
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
Zelenkauskaite, Asta and Susan C. Herring
2008 Television-mediated conversation: Coherence in Italian iTV SMS chat. In:
Proceedings of the Forty-first Hawai’i International Conference on System
Sciences Proceedings. Los Alamitos, CA: IEEE Press.
http://ella.slis.indiana.edu/~herring/hicss08.pdf

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
190 Crispin Thurlow and Michele Poff

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:35 PM
8. Mobile phone communication
Rich Ling and Naomi S. Baron

1. Introduction

Mobile phones are the world’s most widespread electronic communication tech-
nology. However, unlike landlines, mobiles are multimodal, allowing users to talk,
engage in written communication, and access online information. In addition, the
mobile phone is often a multi-functional device. One can use it to listen to recorded
music, take and send photographs, and keep track of appointments and contact
numbers, along with employing an array of other features, including a radio,
games, a calculator, and sometimes a global positioning system (GPS). There are
phones that can tell people when their house alarm has gone off, remind Muslims
when to pray (Bell 2005), and enable passengers to pay bus fares.
These devices render people continually available to friends, family, and the
world at large (Ling 2008a; Ling and Stald 2010). They help us gather important
information or just chat, arrange a dinner menu with a spouse, or ask children when
they will be coming home. Mobile phones let us coordinate activities, provide a
safety link, connect people to their jobs, and even serve as high-tech fashion acces-
sories.
The technology adds a new set of pragmatic considerations to how people com-
municate. While the issues differ somewhat across cultures, users everywhere must:
– understand differences between the ways in which landlines and mobile phones
work (for instance, mobiles must be turned on to operate; after inputting a
phone number, the user must push “send” for the call to transmit; batteries on
mobile phones must be charged for phones to function)
– learn how to input and retrieve text messages (if they wish to use this modality)
– learn the myriad of additional functions available on many mobile phones (for
example, setting the alarm clock, creating an address book, taking and sending
photographs, downloading information from the Internet – again, if they wish
to use these tools)
– manage the costs (such as keeping track of charges for talking, texting, or using
the Internet; devising strategies to minimize charges)
– set personal usage style and usage boundaries (for instance, choosing to use
abbreviations in text messaging or to write words out in full; deciding if there
are conditions for declining to use the mobile phone – such as at a family dinner
or in a class lecture)
– negotiate new relationships within families and across generations (for example,
adolescents using mobile phones to manage direct parental control)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
192 Rich Ling and Naomi S. Baron

This chapter surveys mobile communication, seen in a global perspective. Section 2


begins with an introduction to mobile phone usage. Section 3 explores how these
phones present new communication solutions in daily life. Section 4 examines some
of the pragmatic issues shaping mobile phone use. Section 5 looks at text messag-
ing, considering theoretical issues and summarizing empirical studies conducted by
the authors in Norway and the United States. Section 6 offers concluding remarks.

2. Describing the mobile phone

This section addresses some basic technological considerations, the diffusion of


the mobile phone, the impact of texting, and the role of personal addressability.
These elements help set the stage for subsequent discussion.

2.1. Technological considerations


Various practical conditions need to be satisfied before a mobile phone can play
an active role in communication. There must be a signal; the battery needs to be
charged; and the user must have access to a subscription. Sometimes, access to a
signal or even to facilities for charging a battery is difficult, especially in develop-
ing countries (Chipchase 2008; Singhal, Svenkerud and Flydal 2002; TDG 2002).

2.2. Diffusion of the mobile phone


The adoption rate of mobile phones is high. As of 2009, there were more than 68
subscriptions for every 100 people in the world (ITU 2009). Indeed, mobile phones
are one of the fastest-spreading technologies. They are easy to use and relatively
inexpensive to own and operate. Per capita, there are far more mobile phones used
around the world than people with computer-based Internet access or landline tele-
phone subscriptions.1
However, mobile phones have had different adoption rates and varied effects
on people in the developed and the developing world. By 2006, there were 90 sub-
scriptions per 100 people in the developed world (Ling and Donner 2009). In the
developed world, mobiles have generally provided communication access when
away from a landline system.
Growth in the developing world has been even more dramatic. In 1994, there
was roughly one mobile subscription for about every 500 people. Within a decade,
this proportion rose to one mobile phone subscription for every five people in the
developing world (ITU 2009). In the developing world, mobile phones have often
meant access to telecommunications for the first time. In 1982, more than half
of the world’s population had less than one (landline) phone per 100 people (Mait-
land 1984). By 2007, in South Asia, over 90 % of the population had used a mobile

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 193

phone in the previous three months (Zainudeen et al. 2007). This transition has
brought about more access to information and services, greater ability to coordi-
nate everyday activities, and even increased prospects for participating in social
unrest (Paragas 2003; Rafael 2003).

2.3. From talking to text messaging


Mobile phones were initially designed as an extension of landline telephones. Text
messaging was introduced as an afterthought, in some ways (Hillebrand, Trosby,
Holley, and Harris 2010; Trosby 2004). In 1982, a European consortium known as
GSM (originally meaning Groupe Spécial Mobile, but now known as the Global
System for Mobile Communication) was constituted to create a single mobile tele-
phone system to function across Europe. By 1992, eight European countries began
using the GSM network, and most of Europe had signed on by 1995. The network
was designed for transmitting voice calls. However, a small amount of leftover
bandwidth was made available for creating text messages on the small phone key-
pad. This feature, known as Short Message Service (or SMS – now commonly
called text messages or texting) was initially offered for free in 1993. Over time,
GSM began charging for text messages, but at a lower price than for voice calls
(Baron 2008).
Texting has grown to be a major form of interaction on mobile phones. In the
United States (U.S.), by mid-2008, the monthly average number of text messages
per user exceeded the average number of voice calls (Nielsenwire 2008). However,
mobile voice interaction remains a major function of mobile communication. Con-
sidering all types of use for a normal Norwegian, about half of the events generated
on a mobile phone are calls, approximately 43 % are text messages, and the re-
mainder are Internet sessions (Ling and Sundsøy, in press).

2.4. Personal addressability


It is perhaps obvious that landlines connect callers to places (the location of the
landline phone) and that mobile phones link callers to specific people, wherever
they may be. Such functionality, however, makes all the difference. This new link-
age redefines phone communication from “person-in-a-place” to “person-without-
reference to locale”. In fact, if individuals are not at a particular location, they can
inform potential interlocutors how to reach them – as happens in Ghana, where
people sometimes write their mobile phone number outside the door of their resi-
dence, in lieu of a street address, so visitors can reach them if they are not home
(Sey 2007). The mobile phone has become an essential part of the “kit” that is
carried about in everyday life (Traugott, Joos, Ling, and Quan 2008). By progres-
sively becoming smaller, less expensive, and more portable, the mobile phone has
become more personalized. This transformation has, in turn, made individuals on

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
194 Rich Ling and Naomi S. Baron

the move more available for telephonic interaction. Because of these issues, mo-
bile phones are increasingly seen as personal devices. They are repositories of in-
dividual lists of friends – and their telephone numbers. Phones store endearing text
messages from significant others and provide a general communication log. To
look at the call register or at the “address book” on other people’s telephones is to
pry into their private lives.

3. New communication solutions in daily life

Mobile communication devices affect people’s daily lives. This section explores
three everyday domains: micro-coordination of activities, security and safety, and
integration with the closest sphere of friends and family.

3.1. Micro-coordination
Mobiles are used to orchestrate interactions in nuanced ways. For example, people
use them to coordinate when and where to meet for a beer after work, to keep tabs
on the comings and going of their children, and to manage activities with col-
leagues working on common projects (Ling and Yttri 2002). Norwegian teenagers
in a 2003 focus group describe this process.2
Inger: If you have a mobile phone, you can change plans along the way.
You don’t need to agree on a meeting. You don’t have to agree to
meet either, you can just call whenever actually.
Interviewer: But how do you do agreements then?
Inger: I don’t know, you agree when and where you are going to meet
and if there is some change, then you can say that you will meet
another place, for example, if it is easier.
Arne: I usually make agreements by just calling, “What are you doing
tonight? Ok, then I will just call you.”
Interviewer: Is it like that that you call and ask if you will do something?
Arne: Yeah, like, for example, today when I am here, then I can just
make an agreement with my friends that I will call when I am
done. That is ok instead of planning what you are going to do.
Such micro-coordination is possible because with mobile phones, users are person-
ally addressable and can be reached even when there is no access to a computer or
landline phone. Coordination may take place iteratively, as individuals shift plans
regarding when and where to meet.3 When using landlines, interpersonal coordi-
nation is more rigid. The parties must agree to meet at a specific time and place.
Once they set out for the rendezvous, they cannot conveniently adjust the arrange-
ments. By contrast, mobile phones make this process more dynamic.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 195

3.2. Security and safety


A second important social consequence of mobile phones is the sense of security
and safety they provide. As a latent safety channel, mobile phones are used by stu-
dents (Lenhart, Ling, Campbell, and Purcell 2010), the elderly (Ling and Yttri
2002), people in automobiles (hopefully not when they are driving) or engaging in
outdoor activities (Ling, Julsrud, and Krogh, 1998), and individuals caught up in
extraordinary events such as those of September 11, 2001 (Dutton 2003; Katz and
Rice 2002). When people from a variety of cultures are asked what words first come
to mind when they think of mobile phones, safety issues are commonly mentioned.4
For many, especially the elderly, personal safety and security is the prime reason for
buying a mobile phone (Ling 1999). In the words of one elderly Norwegian man:
Before I retired I thought that [when I retire] I can take a walk exactly when I want to,
especially in the mountains … but … my wife says that she doesn’t dare let me go up
there: “You can be lying there someplace and freeze to death” … [S]everal people I
know … have taken a mobile phone [up to the mountains] … If I go cross-country skiing
and I am lying there, then I can call Norwegian Air Ambulance … for help.5
Adventurers finding themselves in dire straits are increasingly turning to the mobile
phone to call for assistance (Ling 2004). Some rescue actions involve improbably
long chains of communication, as in the case of the people in London who received
a call from friends stranded on an inoperative boat off the coast of Indonesia. The
Londoners phoned local British authorities, who in turn alerted emergency person-
nel in Indonesia – who then carried out the rescue. Mobile phones are also a con-
venient medium for broadcasting messages regarding tsunamis or conveying
emergency instructions after events such as the April 2007 shootings on the Vir-
ginia Tech campus in the U.S. (Yuan, Dade, and Prada 2007). At the same time,
individuals sometimes resort to mobile phones to seek help when they might have
sorted out the situation on their own. News reports suggest that people are increas-
ingly calling emergency services when they have temporarily lost their way or
suffer from small injuries that previously they would have handled themselves
(BBC 2006).

3.3. Social integration through connected presence


Another social consequence of mobile phones is the possibility of creating what
Christian Licoppe (2004) calls “connected presence”. On the one hand, mobile
phones disturb copresent interaction (Monk, Carroll, Parker, and Blythe 2004).
Their ringing can draw attention away from a conversation taking place here and
now (Ling 1998). On the other hand, the fact that one is perpetually accessible has
led to a new mode of interaction among friends. According to Licoppe, in the era of
landline telephony, close friends commonly had long telephone conversations,
done in one sitting. Such landline conversations may have started with a particular

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
196 Rich Ling and Naomi S. Baron

instrumental purpose (for instance, arranging a meeting date) but then meandered
off to talk about family, sports, vacation plans, or the like. With the coming of mo-
bile phones, people are keeping in touch through a series of shorter but more fre-
quent interactions. These short communiqués might be voice conversations or text
messages. Such communications might explore a theme of common interest, con-
stitute a sequence of micro-coordinations, or simply be phatic interactions. With
mobile phones, communication among individuals is less a specific event than an
ongoing process, interleaved with other daily activities. Much as one has a continu-
ing thread of interaction with office colleagues that is taken up, dropped, and re-
sumed in the course of the day, the mobile phone facilitates comparable interaction
with physically remote individuals.

4. Pragmatic issues shaping mobile phone use

In section 1, it was suggested that mobile phones add a new set of pragmatic con-
siderations in how people communicate. In this section, some of the factors at play
are illustrated by looking at cost issues, the emancipation of adolescents through
mobile phones, and the pragmatics of everyday use.

4.1. Cost issues


The cost of operating a mobile phone, along with the type of subscription one has,
can affect usage patterns. The two basic models of subscriptions are “pre-paid” and
“post-paid”. Pre-paid subscriptions initially dominated most of the developed
world outside the U.S. The pre-paid system allows users to “load” an account with
money and then use this credit to make calls, send text messages, transmit photo-
graphs, access the Internet, and so on. Post-paid subscriptions are similar to ar-
rangements for most landline telephones. Users receive a bill at regular intervals
from the telecommunications carrier, generally including a base fee plus charges
for service exceeding the plan’s limits (for example, making more than a set
number of calls a month or placing international calls).
The effects of cost and billing practices on communication are seen in the
adoption of texting among teenagers in the U.S. (Lenhart et al. 2010). In the U.S.,
people pay to both send and receive calls. This is not generally the case in the
rest of the world. In addition, American subscribers need a special subscription for
texting. Without such a texting plan, they must pay a premium price to send and to
receive text messages. Initially, the price per message was low (five to 10 cents).
Starting in 2009, the price for sending and receiving non-subscription texts was
increased to 20 or 30 cents per text. However, operators had already begun offering
unlimited texting subscriptions for a set fee per month. Thus, if teenager A got an
unlimited subscription, he or she could send a profusion of texts at no additional

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 197

cost per text. Yet for all of A’s friends, receiving so many texts was suddenly an ex-
pensive problem. This situation motivated A’s friends to also get unlimited texting
subscriptions. In recent years, there has been a dramatic increase in texting among
U.S. teens – and in unlimited texting plans. Between 2006 and 2009, the percent of
teens who texted their friends on a daily basis went from 27 % to 54 % (Lenhart et
al. 2010). Hence, payment and subscription structures affect the flow and the form
of communication.
In the developing world, widespread use of pre-paid subscriptions is pushing
increased adoption of mobile phones (Kalba 2008). Employing the system of SIM
cards,6 users can shift cards from one phone to another. Alternatively, a single
individual might have several different subscriptions (i.e., SIM cards) and use only
a single handset. One subscription might have less expensive voice minutes and
another, less expensive texting. Alternatively, it might be cheapest to use one sub-
scription early in the morning, another during the day, and a third in the evening, as
the rates change. In countries such as Ghana, people might have one subscription
for use in larger cities and another that has better coverage when away from core
population areas (Chipchase 2008).
People in the developed world also contrive cost-saving strategies through use
of multiple SIM cards. In Italy, for example, it is common for university students to
have two handsets (each carrying a different SIM card) so they can take advantage
of differential pricing for voice calls and texting from alternative carriers.7 Both
nationally and globally, cost-savings strategies make it difficult to determine
the number of mobile phone users accurately, since single users do not necessarily
have a single subscription.8
Those in the developing world who are too poor to own a phone handset – but
own a SIM card – are exceptions to the model of individual reachability described
earlier as distinguishing mobile phones from landlines. There are, for examples,
places in southern Asia and sub-Saharan Africa where people who own only a SIM
card will borrow the handset of a neighbor and insert their own SIM card to place a
call (Ling and Donner 2009). While this system is somewhat awkward, poorer
populations now have a viable way to check on prices for their crops, arrange
money transfers from children or relatives living in the cities, or maintain social
contact with family members working far away from home (Law and Peng 2006;
Paragas 2008).
Individuals without their own handset or their own SIM card sometimes “rent”
mobile access. This communal function is illustrated by the telephone kiosks op-
erated in Bangladesh by Grameen “telephone ladies” (Singhal, Svenkerud, and
Flydal 2002). Grameen Telephone has lent money to women in rural villages to
purchase simple handsets and solar recharging systems, thereby providing tele-
phone service to local villagers.
Another cost-management strategy involves “beeping” (also known as “flash-
ing” or “missed calls”). The system takes advantage of the caller ID function on

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
198 Rich Ling and Naomi S. Baron

mobile phones. Beeping is an inexpensive technique for micro-coordination: The


user calls a potential interlocutor but hangs up before the person answers. Since the
caller’s phone number is displayed on the recipient’s device, the recipient knows
who called. If, for example, two individuals have a pre-existing arrangement such
as “Beep me when you are ready to be picked up”, the message is conveyed with no
cost to either party (Donner 2007). In countries such as Ghana or Bangladesh,
missed calls can account for as much as 80 % of all calls initiated in the mobile
phone system (Geirbo, Helmersen, and Engø-Monsen 2007).
In Bangladesh, beeping is sometimes used to construct expressive messages
(such as a long series of beeps between lovers to inexpensively convey affection).
Beeping can also serve as a form of social control. Geirbo et al. (2007) note that
some Bangladeshi parents ask their children to send a beep to indicate they have
arrived safely at an activity. Similarly, husbands sometimes request beeps at fixed
time-points from wives to signal the household is running smoothly, and girl-
friends and boyfriends use beeps to make sure the phone line of their significant
other is free, thus convincing themselves there is no competing paramour (Lasén
2011).

4.2. Emancipation of adolescents through mobile phones


Mobile phones were originally conceived of as a communication tool for business
and industry. Very quickly, however, adolescents became a leading cohort using
the technology. Many elements associated with mobile communication are seen –
sometimes in exaggerated form – among adolescents. The ability to contact one an-
other individually, to coordinate interactions, to reduce costs through creative
strategies, and to define mobile phones as fashion items are all obvious among
teens.
Teenagers are also often masters at managing personal availability. Many teens
have a well-developed notion of when to accept and to make voice calls, and when
to use the mobile phone as a type of background communication, interlacing mo-
bile communication with face-to-face activities in a nearly seamless way (Ling and
Donner 2009). They also understand how to use a mobile phone to give the impres-
sion of being in contact with another person – when indeed they are not – by pre-
tending to be talking when there is no actual connection. This posture is used –
most often by women – when walking alone after dark to warn potential predators
that they are “in contact” with someone who could summon help (Baron and Ling
2007). However, males and females alike pretend to be talking to avoid having a
stranger (or even an acquaintance) approach them for conversation. Such avoid-
ance is particularly common in the U.S. (Baron and Campbell, 2012).
Mobile phones give teenagers a communication channel that they control. This
control facilitates adolescents’ transition from being largely defined within the
confines of their family home to being freestanding individuals. By having their

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 199

own mobile phones, teenagers can avoid conducting personal social interactions
with friends in the quasi-public space surrounding the family landline phone.
Instead, they can determine when and where the calls (and text messages) are initi-
ated and received. Such personal freedom not only fosters communication with
individuals but also, for many teenagers, facilitates opportunities for strengthening
peer group relationships (Ling and Haddon 2008). At the same time, when adoles-
cents travel outside of the home (as when meeting friends in the evening), parents
gain some peace of mind, knowing that their progeny can call home to report their
whereabouts or in case of emergency.
Another area in which mobile phones allow young people some latitude con-
cerns linguistic usage conventions. In the 1990s, very soon after teenagers began
using text messaging on mobile phones, they started playing with lexicon, syntax,
and punctuation (Thurlow and Poff, this volume). Creation – and sharing – of mo-
bile-based lingo became a badge of group membership, much the way that verbal
slang, clothing, and hair style have traditionally served as markers of social close-
ness for this age cohort (Baron 2008; Ling 2008a). Moreover, such creative usage
signaled a level of security with their language: Adolescents knew the rules but
were able to bend them, while retaining the ability to communicate (Lenhart, Ara-
feh, Smith, and Macgill 2008).

4.3. Pragmatics of everyday use


Three broader issues affecting the pragmatics of everyday use are fashion, cultural
expectations regarding availability, and choice of mode of communication. First
consider fashion. Mobile phone handsets range from inexpensive second-hand
models to posh “fashion” telephones, encrusted with gems and costing as much
as an expensive automobile. An inexpensive “little smart” device might only offer
limited voice-based access within a short geographic range (Castells, Fernández-
Ardèvol, Qiu, and Sey 2007), while a high-end 3G9 phone might provide voice,
texting, Internet access, video telephony, email, IM, and social networking. Choice
of device (coupled with service plan) has implications for the types of communi-
cation that can take place.
Second, there is the question of social obligation (along with personal choice)
regarding whether one is always available to respond to voice calls or text mes-
sages. In Hong Kong, for instance, there is a strong expectation that mobile phone
users (which, in Hong Kong, includes almost everyone) will answer their phones
when they ring and respond quickly to text messages. By contrast, in the U.S.,
many users regularly screen calls through caller ID, deciding which calls to take
and which to ignore (Baron 2008). Others only turn their phones on to make out-
going calls, essentially rendering the phone a one-way device. Even in societies
such as Sweden or Japan that are typically perceived as “always on”, university
students report that they almost always have the ringer on their phone turned off,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
200 Rich Ling and Naomi S. Baron

Table 1. Students for whom using voice functions on mobile phones is “always” or
“usually” acceptable

Venue Sweden Japan


N=171 N=529
sitting with people you know in an informal café 42.7 % 13.8 %
paying at the cash register at a convenience store 57.3 % 31.6 %
walking in public 97.7 % 73.7 %
riding a local bus, tram, or subway 89.5 % 4.0 %

and that they sometimes turn their phones off entirely when they do not want to be
disturbed (for instance, while studying or while watching television at home).10 Yet
despite individual and cultural differences, there is a growing expectation in many
countries that people be available to receive mobile phone calls and text messages.
In the words of James Katz, “You’re a problem for other people if you don’t have a
mobile phone” (Weiner 2007).
A third pragmatic dimension of everyday mobile phone use involves modality
of communication: Does the mobile phone user choose to make a voice call or send
a text message? Sometimes the basis for decision-making is cultural, and some-
times it is individual. In Japan, for example, it is considered rude to be disruptive
of public space. As a result, people tend to modulate their voices when in public –
and, at least until recently, to constrain public mobile phone conversations. By
comparison, in Sweden, while mobile phone users are also relatively quiet in pub-
lic space, they are less hesitant than the Japanese to speak on their phones in public.
Table 1 contrasts Swedish and Japanese findings from a survey conducted in
2007–2008 (Baron and Hård af Segerstad 2010) in which university students aged
18–24 were asked about public situations in which they felt it was “always” or
“usually” acceptable to talk on their mobile phone.
Data analyzed earlier by Misa Matsuda suggest how much Japanese conven-
tions have been liberalized in recent years.11 In her 2001 data, only 49 % of 187
subjects between the ages of 18 and 24 (although not necessarily university stu-
dents) approved of mobile phone voice communication while on the street, com-
pared with Baron and Hård af Segerstad’s recent finding of 74 %.12 The Japanese
sociologist Hidetoshi Kato (2009) suggests that contemporary Japan is experienc-
ing fundamental – and troubling – social change: “We seem to be moving toward
non-edited, non-censored, non-self-restricted society”.
Beyond cultural conditioning factors, users make individual decisions regard-
ing when to talk and when to text. Sometimes the choice is obvious: The person
you want to reach is in a meeting, so you text in order not to disturb him or her. Al-
ternatively, if one’s interlocutor does not use text messaging, the person initiating
the communication calls.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 201

As part of her cross-cultural study of mobile phone use, Baron compared rea-
sons that Swedish, American, Italian, and Japanese university-aged students gave
for choosing to send a text message rather than to make a call.13 Among the vari-
ables explored were: convenience for the message-initiator, convenience for the re-
cipient, desire to keep the message short, and cost. In Sweden, the U.S., and Italy,
personal convenience was judged a “very important” factor in deciding to send a
text message rather than make a voice call. Convenience of the interlocutor was
also deemed “very important”, though slightly less so. In Japan, convenience – of
either the subject or the interlocutor – was seen as somewhat less important. An-
other element in this mix is the age of the person receiving the text. According to
research done by Ling, Norwegians are less willing to send texts to elderly people
than they are to teens. There is the sense that if you want to communicate with an
elderly person, voice is generally the best choice (Ling 2008b).
Keeping a message short was seen as a “very important” reason for Swedes,
Americans, and Italians to text rather than to have a phone conversation. (With a
phone call, one risks needing to spend time engaging in social pleasantries or hav-
ing the interlocutor launch into a new topic.) By contrast, Japanese were only one-
third as likely as their counterparts in other countries to choose texting over talking
to keep the message brief.
Cost considerations proved to be an important deciding factor in choice of mo-
dality. While there are some exceptions (depending upon the type of subscription
plan one has), texting is generally less expensive than talking in Sweden, Italy, and
Japan. In the U.S., the reverse has been true, since most American subscription
plans include a large number of voice minutes but charge additionally for text
messaging, although this picture is changing with the advent of unlimited texting
subscriptions. In the study, Italians were the most cost-conscious, followed by Jap-
anese and then Swedes. That is, Italians were most likely to judge cost to be a very
important reason to choose texting over talking.14

5. The linguistic nature of text messages

With the introduction of texting on mobile phones in the early 1990s, users ac-
quired a new modality for mobile discourse. While adults have adopted texting to
varying degrees, it is among teenagers and young adults that the distinctive culture
of text messaging lives (Goggin and Crawford 2011; Ling, Bertil, and Sundsøy
2010). To wit: In a 2003 study of teenage mobile communication in Norway,
18-year-old girls sent a mean of more than 20 text messages per day, while their
45-year-old mothers sent only 5.15 Texting has proven especially important to the
younger age demographic both because it is inexpensive and because it provides a
discreet platform for social interaction with peers (Castells et al. 2007; Haddon
2004; Ito and Okabe 2006). In this section a number of these issues are exam-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
202 Rich Ling and Naomi S. Baron

ined. In addition, the section summarizes findings from empirical studies of text
messaging in Norway and in the U.S.

5.1. Synchronicity, texting “conversations”, and discretion


Like email, texting is technically an asynchronous form of mediated communi-
cation and thus generally less intrusive than synchronous mediated interaction
such as voice conversation (on mobile phones) or instant messaging. Often text
messages are “one off” communiqués, intended to provide another person some
stand-alone piece of information. However, users also sometimes construct rapid-
fire sequences of messages, essentially rendering the medium almost synchronous.
These sequences take on some of the dynamics of a conversation. Such text-based
“conversations” might, for example, include written interjections (such as “hmm”
or “umm”) that mimic oral conventions for establishing turn-taking or holding the
floor.
In a 2005 survey of Norwegians, 41 % of respondents indicated that they
“sometimes” or “very often” engaged in series of chained text messages.16 There
were no gender differences in the reported length of these interactions, but age was
a statistically significant factor. Subjects aged 13–18 reported a mean of five total
turns (i.e., including messages from both parties) in the “conversation”, while those
over age 25 reported a mean of only three turns in a typical texting interaction.
Another characteristic of texting is that it is discreet in comparison with voice
calls. This means that text messaging can be done in the background while the user
is engaged in other activities. People can, for instance, read a text message from
their children while attending a meeting without disrupting the meeting. Similarly,
students sometimes arrange their social lives while ostensibly paying attention to a
class lecture (Ling 2008a). Focus groups with university students in the U.S. and
Italy indicate that students engaging in this behavior generally believe that profes-
sors are unaware that such texting is being done,17 although subsequent informal
discussions with American and Italian faculty members indicate otherwise.

5.2. Production of text on mobile phones


It has been estimated that in 2009 more than 4.5 trillion text messages were sent
worldwide (Marlatt 2010). Such a profusion of text production on mobile phones is
surprising in light of the relative complexity involved in producing text messages
on standard mobile phones. These challenges are particularly pronounced when
phone keypads use alphabets that do not correspond to the letters used for encoding
the speaker’s native language18 or when the native language is written with a non-
alphabetic script.19
Contemporary standard mobiles, excluding those with either a physical or
screen-based QWERTY keyboard, offer two primary input options: multi-tap

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 203

(the most common) and predictive texting. The multi-tap system utilizes the 12
keys on the mobile phone keypad for inputting each alphanumeric character (or
punctuation mark) in the text. On many mobile phones there is also a predictive
texting function that automatically anticipates later letters in a word, based upon
the initial letters entered through the multi-tap system.
Mobile phone keypads – like the landline dial plates on whose design they were
based – display clusters of three or four letters of the alphabet next to (or below)
each of the numbers “2” through “9”. With the transition from manual to mech-
anized telephone exchanges, letters were added to the (landline) telephone dial
purely to create a mnemonic device to help users in remembering phone numbers
(Ling 2007). Customers were assigned telephone numbers such as “GR 4–2525”,
where the “GR” (for “Greenbelt”) was dialed using the numbers “4” and “7”. The
alphanumeric design made the transition to landline touchtone phones in the
1970s, despite the fact that telephone numbers (at least in the U.S.) had already
eliminated letters in favor of strictly digits. Only with the introduction of mobile
phones were the residual letters once again put into active service, this time for en-
tering text.
Use of the mobile phone keypad for text entry necessitates mastering a new –
and for some cumbersome – writing technique. These keypads are far less efficient
than full computer keyboards, where each letter appears on a separate key. For
example, to write “hello” with the multi-tap system, the mobile phone user presses
the “4” key twice to get an “h”, the “3” key twice to get an “e”, the “5” key three
times to get an “l”, repeats the last sequence to get the second “l”, and finally
presses the “6” key three times to get the “o”. This process often results in jettison-
ing some traditional formalities. In a 2005 analysis of text messages, only about
3.5 % of all the text messages had a salutation (Ling 2005).
According to Silfverberg, MacKenzie, and Korhonen (2000), a proficient and
trained texter using the multi-tap system can attain speeds of 25–27 words per min-
ute.20 By contrast, using predictive texting, proficient texters can attain 46 words
per minute.21 However, in studies of everyday users creating text messages using
both the multi-tap and the predictive texting systems, input speeds were between 5
and 10 words per minute (Curran, Woods, and Riordan 2006; Hård af Segerstad
2003). Since text messages tend to be rather short (usually fewer than 10 words),
the inefficiency of producing the text is somewhat mitigated (Ling 2005).

5.3. Norwegian text-messaging study


What do users talk about in their text messages? If data from Norway are any
indication, the broad answer is, “anything and everything”. Messages may be
personal (for example, private exchanges between spouses), professional (such as
between two employees collaborating on a project), or of a broadcast nature (for
instance, traffic alerts from the municipal government – now common in the U.S.).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
204 Rich Ling and Naomi S. Baron

Table 2. Content distribution of text messages in a 2002 Norwegian study

Content Area Percent of Examples23


Total Messages
Coordination 32.6 % When are you coming to get me?
(male, aged 17)
Questions and answers 24.0 % When is practice (male, aged 26)
Grooming or phatic 18.3 % I love you sweetie. =) (female, aged 14)
expressions
Commands and requests 5.0 % remember to take dads bike home
(female aged 48)
Call me (female, aged 49)
Location issues 3.5 % Where are you? What is happening this
evening? (male, aged 17)
Other 16.6 % Happy birthday. (female, aged 26)

There is not one prototypical content domain, any more than there is one prototypi-
cal writing style. Nonetheless, to get a flavor of the variety of messages that users
compose, it is instructive to consider the contents of a representative body of text
messages.
Our example here comes from Norwegian data gathered in 2002 (Ling 2005).22
Table 2 summarizes the content distribution (and, in some instances, sentential
form) for all 882 messages produced in the study. One-third of all text messages
in the sample involved coordination. These data confirm the importance of the
coordination function of mobile phones discussed in section 3.1. The next most
frequent category, questions and answers (one-quarter of all messages), illustrates
the use of texting for short bits of information that can appropriately be exchanged
asynchronously. So-called “grooming” or phatic messages were the third most-
frequent content area (18.3 %). With these messages, the actual semantic content
may be less important than the social connection established between two people
by sending a text message.
While the total number of commands and requests (5.0 %) was not high,
requests to “Call me” constituted 1.5 % of all 882 messages. “Call me” requests
demonstrate how users exploit multiple functions on their mobile phones: texting
to get someone’s attention (without interrupting a person at an inopportune mo-
ment), but then having the interlocutor follow up with a voice call, which generally
permits freer give-and-take between interlocutors.
The Norwegian data were also analyzed for demographic distribution, message
length, and punctuation. Women generally wrote longer and often more complex
text messages than men. The mean length of messages generated by males was

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 205

5.5 words, compared with 7.0 for women. On the whole, females’ messages in-
volved a larger variety of themes than texts composed by males. Moreover, women
were more likely to use capitalization and punctuation correctly,24 and women used
the letter-like conventions of openings and closings more often than males. At the
same time, women were more likely to use abbreviations than were their male
counterparts.25 As a group, younger users (teenagers and young adults) were the
heaviest users of abbreviations, although the overall frequency of such shortened
forms was relatively low.

5.4. American text-messaging study


Our second empirical study of text messaging was done in the United States, using
data collected in 2005 from female undergraduate students at a large midwestern
university (Ling and Baron 2007). A convenience sample was gathered from
22 subjects, all female, each of whom kept a 24-hour diary of all text messages she
had sent. The resulting sample was 191 text messages, composed of 1473 words.
The focus of this study was structural: message length, sentential composition, and
use of lexical shortenings of various sorts (contractions, abbreviations, acronyms,
and emoticons).26
Table 3 summarizes the findings.

Table 3. Key findings from an American text-messaging study

Length
mean words per message 7.7 words
mean characters per message 35.0 characters
one-word messages 3.7 % of messages
multi-sentence messages 60.0 % of messages
mean sentences per message 1.8 per message
Emoticons and lexical shortenings
contractions 84.7 % of potential contractions
apostrophes 31.9 % of actual contractions
abbreviations 3.2 % of words in corpus
acronyms <.1 % of words in corpus
emoticons <.1 % of words in corpus

The average text message in the American female college-student corpus was
7.7 words, which closely approximates the 7.0 word average of Norwegian fe-
males. Very few messages were composed of a single word – at least in part be-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
206 Rich Ling and Naomi S. Baron

cause every text message (at the time) had a price attached to it.27 Rather, 60 % of
all messages contained two or more sentences (although the sentences themselves
were generally brief).
Regarding lexical shortenings, there were a large number of contractions (such
as writing “can’t” instead of “cannot”). Most of the times that subjects could use a
contraction, they did. However, only one-third of the contractions contained apos-
trophes. (In our example, the contracted form was written “cant” more often than
not.) Omission of apostrophes is understandable, given the complexity of inputting
most punctuation marks through multi-taps on mobile phones.
Far less frequent were the kinds of lexical shortenings commonly associated
with text messaging in the popular press. Out of 1473 words, only 47 (that is,
3.2 %) were clear cases of abbreviations (for example, U for ‘you’; R for ‘are’).
Even fewer acronyms (for example, ttyl for ‘talk to you later’) were used – a total
of eight (less than 1 %). As for emoticons, only two were found – both smiley
faces – in the entire corpus.
The paucity of abbreviations, acronyms, and emoticons is consistent with
studies of texting by young people in Canada (Tagliamonte and Denis 2008) and
the UK (Thurlow and Brown 2003). While lexical shortenings appear to be more
common among younger teenagers (especially females), college students often re-
port that they have “outgrown” such contrivances, focusing more on the conversa-
tional substance of their messages than on using special texting language as a form
of social bonding.
It is important, however, not to over-generalize these results to all populations.
In the Norwegian corpus described in section 5.3, roughly 6 % of lexical items
involved abbreviations, acronyms, or emoticons. In the Philippines, where use of
texting has been more prolific than possibly any other place in the world, there is
more intense use of emoticons and abbreviations (Ellwood-Clayton 2003).28 How-
ever, just as it is not possible to generalize about the content of text messages, gen-
eralizations about levels of lexical shortenings cannot be made without specific
empirical data.
What is known is that there is considerable popular apprehension over the
potentially deleterious effects of “texting language” (meaning not just lexical
shortenings, but presumed disregard for grammar, spelling, and punctuation) on
traditional written language (Thurlow 2006). However, empirical research (for in-
stance, Hård af Segerstad and Hashemi 2006; Lenhart et al. 2008; Plester, Wood,
and Bell 2008) continues to indicate that school children are aware of differences
between language they might use in text messages with friends versus the kind of
language appropriate for classroom work.29

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 207

6. Concluding remarks

As of 2009, approximately half the people in the world had a mobile phone sub-
scription, rendering mobile telephony the world’s dominant form of telecom-
munication. In some instances, mobiles are augmenting – or replacing – land-
lines or use of the Internet on computers, while for many people (especially in the
developing world), mobiles provide their first access to distance communication.
Citizens of the developed and developing worlds alike encounter new pragmatic
opportunities and challenges with mobile phones. Users devise strategies to
both connect with and distance themselves from potential interlocutors, to mini-
mize cost, and to be creative with language. Mobile phones render us more
independent, while also raising expectations that others will always be able to
reach us.
Every technology evolves. It is difficult to predict the future of mobile phones –
either as technological devices or as linguistic tools for social interaction. Techno-
logically, current trends suggest that mobiles will be used to some degree for func-
tions presently associated with computers, television, or debit cards. Linguisti-
cally, it seems unlikely that texting on mobiles will seriously impact written
language. Much less predictable are the innovative strategies that users from dif-
ferent age groups and diverse cultures will concoct for making mobile phones fill
their communicative needs.

Notes

1. The International Telecommunications Union (ITU) estimated that in 2009 there were 4.7
billion mobile phone subscriptions, compared with 1.8 billion Internet users and 1.2 bil-
lion landlines (ITU 2009).
2. The data were collected in a series of focus groups held in Norway. The focus groups
were conducted in Norwegian, and the material reported here was translated from Nor-
wegian into English.
3. As the number of participants involved increases, so does the complexity of iterative
micro-coordination. Humphreys (2007), for example, discusses the possibilities for
location-based texting when using programs such as Dodgeball, and Shirkey (2008)
describes the quasi-broadcast functions of mobile communication associated with mobi-
lization of social groups in New York City.
4. See Baron (2009). Data are from a free-association task administered as part of a larger
online survey of 18–24 year old university students regarding their use of and attitudes
towards mobile phones. A convenience sample of 2001 subjects was drawn from
Sweden, the U.S., Italy, Japan, and Korea.
5. From interview data collected by Rich Ling.
6. The SIM card (Subscriber Identity Module) is a small chip that is the “subscription”. This
chip is inserted into a handset but is removable. By contrast, in the U.S., the handset and
the subscription are generally inseparable.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
208 Rich Ling and Naomi S. Baron

7. These reports are from one-hour focus groups that Naomi Baron conducted with univer-
sity students in Italy (March 2008; total participants: 29) as part of a larger cross-cul-
tural study of mobile phone use.
8. In addition, individuals may have multiple phones to use with different interlocutors
(for example, one for business, one for friends and family, and one just for a boyfriend
or girlfriend).
9. In mobile communication, there have been essentially three phases (generations) of de-
velopment. The first generation (1G) was small nationally-based systems that used
analog protocols. 2G refers to the second generation of mobile communication proto-
cols, most notably CDMA in the U.S. and GSM in large portions of the world. This gen-
eration saw the true popularization of mobile communication. 3G refers to third-gener-
ation protocols designed to support data transmission and services such as television.
10. These reports are from participants in one-hour focus groups (or interviews) that Naomi
Baron conducted with university students in Sweden (November – December 2007) and
in Japan (May 2008) as part of a larger cross-cultural study of mobile phone use. Total
participants in Sweden: 10; total participants in Japan: 13.
11. We are grateful to Misa Matsuda for providing these data (email communication to
Naomi Baron dated March 8, 2007), which derive from a larger study of Japanese mo-
bile phone use (Ito, Okabe, and Matsuda 2005).
12. Matsuda’s findings from 2001 regarding use of voice communication on a train or bus
were more similar to the present data – 5 % – due to the ubiquity of signage on Japanese
buses, subways, and commuter trains effectively banning use of voice functions on pub-
lic transport (Baron 2008: Chapter 7).
13. Some of the findings presented in this section are reported in Baron (2010), Baron and
Hård af Segerstad (2010), and Baron and Campbell (2012), while others are unpub-
lished.
14. An explanation offered by several Italian colleagues was that while Italian parents typi-
cally pay most living expenses for children at the university, it is common for parents to
insist that children pay their own mobile phone bill. Hence, their progeny may be es-
pecially keen to economize on phone costs.
15. Findings from data collected by Rich Ling. The text messages were gathered from a
random sample of 2003 Norwegians in May of 2002 by telephone. In addition to beha-
vioral and attitudinal questions associated with mobile and SMS use, respondents were
asked to read (and where necessary, to spell out) the content of the last three messages
they had sent. This procedure resulted in a body of 882 SMS messages. Several other
studies have shown gendered differences in telephone use (Fischer 1992; Moyal 1992;
Rakow1992). Regarding generational use, texting has been found to be a life phase
medium (Axelsson 2010; Helles 2009; Ling 2010).
16. Subjects were 1,000 randomly-selected Norwegians aged 13 and older. The survey was
carried out by Telenor Research and Development (currently unpublished).
17. Focus group data are from one-hour sessions with clusters of university students
(total American participants: 18; total Italian participants: 29) conducted in Spring
2008.
18. See Tseliga (2007) for an example of adaptive strategies for inputting Greek on a com-
puter keyboard built with the Roman alphabet.
19. Construction of text messages in character-based writing systems such as Japanese is
particularly cumbersome, requiring the user to shift back and forth among screens gen-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 209

erating syllabic graphemes representing syllables (hiragana and katakana), the ideo-
graphic characters (kanji), and letters in the Roman alphabet (romaji).
20. Although the paper does not specify, the study appears to have tested English input.
21. By way of comparison, an advanced typist using a keyboard can attain up to 120 words
a minute, while average typists who are composing at the same time they are typing
produce about 19 words per minute (C.-M. Karat, Halverson, Horn, and J. Karat
1999).
22. See note 15 for details of the study design.
23. The Norwegian text messages have been translated into English. Capitalization and
punctuation reflect the Norwegian original.
24. This finding is consonant with other research on gender and non-standard language use
(Chambers 1992; Labov 1991).
25. Herring and Zelenkauskaite (2009) report a similar finding in their study of Italian iTV
SMS.
26. See Baron (2011) for a comparison of the linguistic character of texting versus instant
messaging by American college students. By way of comparison, see Anis (2007) for
linguistic adaptations in French texting.
27. Most subjects in the study had post-paid texting plans that covered an allocated number
of text messages per month at a set fee. However, exceeding the monthly allotment
resulted in a high additional per-message charge.
28. In their study of Italian iTV SMS, Herring and Zelenkauskaite (2009) found many ab-
breviations but very few emoticons.
29. For more extensive discussion of the impact – or lack thereof – of online and mobile
communication on language, see Baron (2011).

References

Anis, Jacques
2007 Neography: Unconventional spelling in French SMS text messages. In: Brenda
Danet and Susan C. Herring (eds.), The Multilingual Internet: Language,
Culture, and Communication Online, 87–116. New York: Oxford University
Press.
Axelsson, Ann-Sofie
2010 Perpetual and personal: Swedish young adults and their use of mobile phones.
New Media & Society 12: 35–54.
Baron, Naomi S.
2008 Always On: Language in an Online and Mobile World. New York: Oxford Uni-
versity Press.
Baron, Naomi S.
2009 Three words about mobile phones: Findings from Sweden, the US, Japan and
Korea. In: Bartolomeo Sapio, Leslie Haddon, Enid Mante-Meijer, Leopoldina
Fortunati, Tomaz Turk, and Eugene Loos (eds.), The Good, the Bad, and the
Challenging: The User and the Future of Information and Communication
Technologies, vol. 1, 273–282. COST Action 298 Participation in the Broad-
band Society. Copenhagen, Denmark.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
210 Rich Ling and Naomi S. Baron

Baron, Naomi S.
2010 Control freaks: How online and mobile communication is reshaping social
contact. Language at Work 7. http://www.languageatwork.eu/articles.php
Baron, Naomi S.
2011 Assessing the internet’s impact on language. In: Mia Consalvo and Charles
Ess (eds.), The Handbook of Internet Studies, 117–136. Oxford, UK: Wiley-
Blackwell.
Baron, Naomi S. and Elise M. Campbell
2012 Gender and mobile phones in cross-national context. Language Sciences
34(1): 13–27.
Baron, Naomi S. and Ylva Hård af Segerstad
2010 Cross-cultural patterns in mobile phone use: Public space and reachability in
Sweden, the USA and Japan. New Media & Society 12: 13–34.
Baron, Naomi S. and Rich Ling
2007 Emerging patterns of American mobile phone use: Electronically-mediated
communication in transition. In: Gerard Goggin and Larissa Hjorth (eds.),
Mobile Media 2007: Proceedings of an International Conference on Social
and Cultural Aspects of Mobile Phones, Media and Wireless Technologies,
218–230. Sydney, Australia: University of Sydney.
BBC
2006 Mobile misuse causes rescue rise. April 28. http://news.bbc.co.uk/1/hi/wales/
4948182.stm
Bell, Genevieve
2005 The age of the thumb: A cultural reading of mobile technologies from Asia. In:
Peter Glotz, Stefan Bertschi, and Chris Locke (eds.), Thumb Culture: The
Meaning of Mobile Phones for Society, 67–87. New Brunswick, NJ: Transac-
tion Publishers.
Castells, Manuel, Mireia Fernández-Ardèvol, Jack L. Qiu, and Araba Sey
2007 Mobile Communication and Society: A Global Perspective. Cambridge, MA:
MIT Press.
Chambers, J. K.
1992 Linguistic correlates of gender and sex. English World-Wide 13: 173–218.
Chipchase, Jan
2008 Power up: Street charging services, Kampala: How to stay charged without
access to mains power. http://www.janchipchase.org/fp/wp-content/uploads/
presentations/JanChipchase_StreetChargingServices_Kampala_vFinal.pdf
Curran, Kevin, Derek Woods, and Barry O. Riordan
2006 Investigating text input methods for mobile phones. Telematics and In-
formatics 23: 1–21.
Donner, Jonathan
2007 The rules of beeping: Exchanging messages via intentional “missed calls” on
mobile phones. Journal of Computer-Mediated Communication 13(1), article 1.
http://jcmc.indiana.edu/vol13/issue1/donner.html
Dutton, William
2003 The social dynamics of wireless on September 11: Reconfiguring access. In:
A. Michael Noll (ed.), Crisis Communication, 69–82. Lanham, MD: Rowan
and Littlefield.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 211

Ellwood-Clayton, Bella
2003 Virtual strangers: Young love and texting in the Filipino archipelago of cyber-
space. In: Kristóf Nyíri (ed.), Mobile Democracy: Essays on Society, Self and
Politics, 35–45. Vienna: Passagen Verlag.
Fischer, Carl
1992 America Calling: A Social History of the Telephone to 1940. Berkeley, CA:
University of California.
Geirbo, Hanne Cecilia, Per Helmersen, and Kenth Engø-Monsen
2007 Missed call: Messaging for the masses. A study of missed call signaling behavior
in Dhaka. Internal Telenor R&I publication. Fornebu, Norway: Telenor R&I.
Goggin, Gerard and Kate Crawford
2011 Generation disconnections: Youth culture and mobile communication. In: Rich
Ling and Scott Campbell (eds.), Mobile Communication: Bringing Us To-
gether or Tearing Us Apart? The Mobile Communication Research Series,
Volume 2. New Brunswick, Canada: Transaction.
Haddon, Leslie
2004 Information and Communication Technologies in Everyday Life. Oxford, UK:
Berg.
Hård af Segerstad, Ylva
2003 Towards a better system for text prediction in mobile phones. In: John S. Pet-
tersson (ed.), HumanIT, Karlstad University Studies. Karlstad, Sweden: Karl-
stad University Centrum för HumanIT.
Hård af Segerstad, Ylva and Sylvana S. Hashemi
2006 Learning to write in the information age: A case study of schoolchildren’s writ-
ing in Sweden. In: Luuk van Waes, Mariëlle Leijten, and Christine M. Neu-
wirth (eds.), Writing and Digital Media, 49–64. Amsterdam: Elsevier.
Helles, Rasmus
2009 Personlige medier i hverdagslivet. København: Københavns Universitet.
Herring, Susan C. and Asta Zelenkauskaite
2009 Symbolic capital in a virtual heterosexual market: Abbreviation and insertion
in Italian iTV SMS. Written Communication 26: 5–31.
Hillebrand, Friedhelm, Finn Trosby, Kevin Holley, and Ian Harris
2010 Short Message Service: The Creation of Personal Global Text Messaging. Chi-
chester: Wiley.
Humphreys, Lee
2007 Mobile sociality and spatial practice: A qualitative field study of new social
networking technologies. Ph.D. dissertation, Annenberg School for Communi-
cation, University of Pennsylvania.
Ito, Mizuko and Daisuke Okabe
2006 Intimate connections: Contextualizing Japanese youth and mobile messaging
In: Richard Harper, Alex Taylor, and Leysia Palen (eds.), The Inside Text: So-
cial Perspectives on SMS in the Mobile Age, 127–145. London: Klewer.
Ito, Mizuko, Daisuke Okabe, and Misa Matsuda
2005 Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. Cambridge,
MA: MIT Press.
ITU
2009 Market Information and Statistics. http://www.itu.int/ITUD/ict/statistics/

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
212 Rich Ling and Naomi S. Baron

Kalba, Kas
2008 The adoption and diffusion of mobile phones: Nearing the halfway mark. In-
ternational Journal of Communication 2: 631–661.
Karat, Clare-Marie, Christine Halverson, Daniel Horn, and John Karat
1999 Patterns of entry and correction in large vocabulary continuous speech recog-
nition systems. In: Proceedings of the 1999 SIGCHI Conference on Human
Factors in Computing Systems, 568–575. New York: ACM Press.
Kato, Hidetoshi
2009 Personal communication (letter to Naomi S. Baron, August 30).
Katz, James E. and Ron E. Rice
2002 The telephone as an instrument of faith, hope, terror and redemption: America,
9–11. Promethius 20: 247–253.
Labov, William
1991 The intersection of sex and social class in the course of linguistic change. Lan-
guage Variation and Change 2: 205–254.
Lasén, Amparo
2011 “Mobiles are not that personal”: The unexpected consequences of the account-
ability, accessibility and transparency afforded by mobile telephony. In: Rich
Ling and Scott Campbell (eds.), Mobile Communication: Bringing Us Together
or Tearing Us Apart, 83–106. The Mobile Communication Research Series,
Volume 2. New Brunswick: Transaction.
Law, Pui-Lam and Yinni Peng
2006 The use of mobile phones among migrant workers in southern China. In: Pui-
Lam Law, Leopoldina Fortunati, and Shanhua Yang (eds.), New Technologies
in Global Societies, 221–244. London: World Scientific.
Lenhart, Amanda, Sousan Arafeh, Aaron Smith, and Alexandria R. Macgill
2008 Writing, technology and teens. Pew Internet & American Life Project, April 24.
http://www.pewinternet.org/Reports/2008/Writing-Technology-and-Teens.aspx
Lenhart, Amanda, Rich Ling, Scott Campbell, and Kristen Purcell
2010 Teens and mobile phones. Pew Internet & American Life Project, April 20.
http://www.pewinternet.org/~/media//Files/Reports/2010/PIP-Teens-and-
Mobile-2010.pdf
Licoppe, Christian
2004 Connected presence: The emergence of a new repertoire for managing social
relationships in a changing communications technoscape. Environment and
Planning: Society and Space 22: 135–156.
Ling, Rich
1998 “One can talk about common manners!”: The use of mobile telephones in in-
appropriate situations. In: Leslie Haddon (ed.), Communications on the Move:
The Experience of Mobile Telephony in the 1990s. (COST 248 Report). Farsta,
Sweden: Telia. http://richardling.com/papers/1997_One_can_talk_about_
common_manners.pdf
Ling, Rich
1999 “I am happiest by having the best”: The adoption and rejection of mobile tel-
ephony. Telenor R&D report, Kjeller, Norway.
Ling, Rich
2004 The Mobile Connection: The Cell Phone’s Impact on Society. San Francisco,
CA: Morgan Kaufmann.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 213

Ling, Rich
2005 The socio-linguistics of SMS: An analysis of SMS use by a random sample of
Norwegians. In: Rich Ling and Per Pedersen (eds.), Mobile Communications:
Renegotiation of the Social Sphere, 335–349. London: Springer.
Ling, Rich
2007 The length of text messages and use of predictive texting: Who uses it and how
much do they have to say? In: Naomi S. Baron (ed.), American University
TESOL Working Papers Number 4. Washington, DC: American University.
http://www.american.edu/tesol/WorkingPapers04.html
Ling, Rich
2008a New Tech, New Ties: How Mobile Communication is Reshaping Social Cohe-
sion. Cambridge, MA: MIT Press.
Ling, Rich
2008b Exclusion or self-isolation?: Texting and the elderly users. The Information
Society 24: 334–341.
Ling, Rich
2010 Texting as a life phase medium. Journal of Computer-Mediated Communi-
cation 15(2): 277–292. http://www3.interscience.wiley.com/cgi-bin/fulltext/
123248040/PDFS TART
Ling, Rich and Naomi S. Baron
2007 The mechanics of text messaging and instant messaging among American col-
lege students. Journal of Language and Social Psychology 26: 291–298.
Ling, Rich and Jonathan Donner
2009 Mobile Communications. London: Polity Press.
Ling, Rich and Leslie Haddon
2008 Children, youth and the mobile telephone. In: Kristen Dortner and Sonia
Livingstone (eds.), International Handbook of Children, Media and Culture,
137–151. London: Sage.
Ling, Rich, Troels Bertil, and Pål Roe Sundsøy
2010 Texting among same-aged individuals: An analysis of traffic data. Paper pres-
ented at the International Communication Association Pre-Conference Work-
shop: “Mobile Communication”, Singapore, June 20.
Ling, Rich, Tom Julsrud, and Erling Krogh
1998 The goretex principle: The hytte and mobile telephones in Norway. In: Leslie
Haddon (ed.), Communications on the Move: The Experience of Mobile Tel-
ephony in the 1990s (COST 248 Report). Farsta, Sweden: Telia.
Ling, Rich and Gitte Stald
2010 Mobile communities: Are we talking about a village, a clan or a small group?
American Behavioral Scientist 53: 1133–1147.
Ling, Rich and Pål Roe Sundsøy
In press Mobile communication as a mundane medium. In: Kristóf Nyíri (ed.), Mobile
Communication Policy. Vienna: Passagen Verlag.
Ling, Rich and Birgitte Yttri
2002 Hyper-coordination via mobile phones in Norway. In: James E. Katz and
Mark Aakhus (eds.), Perpetual Contact: Mobile Communication, Private
Talk, Public Performance, 139–169. Cambridge, UK: Cambridge University
Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
214 Rich Ling and Naomi S. Baron

Maitland, Donald
1984 The missing link. Report of the Independent Commission for Worldwide Tele-
communications Development. http://www.itu.int/osg/spu/sfo/missinglink/
index.html
Marlatt, Michael
2010 Mobile, at a glance. http://www.ere.net/webinars/mobile-recruitment.asp
Monk, Andrew, Jenni Carroll, Sarah Parker, and Mark Blythe
2004 Why are mobile phones annoying? Behavior and Information Technology 23:
33–41.
Moyal, Ann
1992 The gendered use of the telephone: An Australian case study. Media Culture
and Society 14: 51–72.
Nielsenwire
2008 In US, SMS text messaging tops mobile phone calling. September 22.
http://blog.nielsen.com/nielsenwire/online_mobile/in-us-text-messaging-tops-
mobile-phone-calling/
Paragas, Fernando
2003 Dramatextism: Mobile telephony and people power in the Philippines. In:
Kristóf Nyíri (ed.), Essays on Society, Self and Politics, 259–284. Vienna: Pas-
sagen Verlag.
Paragas, Fernando
2008 Migrant workers and mobile phones: Technological, temporal and spatial sim-
ultaneity. In: Rich Ling and Scott W. Campbell (eds.), The Reconstruction
of Space and Time: Mobile Communication Practices, 39–66. New Brunswick,
NJ: Transaction Press.
Plester, Beverly, Clare Wood, and Victoria Bell
2008 Txt msg n school literacy: Does texting and knowledge of text abbreviations
adversely affect children’s literacy attainment? Literacy 42: 137–144.
Rafael, Vicente L.
2003 The cell phone and the crowd: Messianic politics in the contemporary Philip-
pines. Public Culture 15: 399–425.
Rakow, Lana F.
1992 Gender on the Line. Urbana, IL: University of Illinois.
Sey, Araba
2007 Mobile phones and the pursuit of sustainable livelihoods: Why connectivity
matters. Paper presented at the International Communication Association
Pre-Conference Workshop: “Mobile Communication: Bringing Us Together or
Tearing Us Apart?” San Francisco, CA, May 23–24.
Shirky, Clay
2008 Here Comes Everybody: The Power of Organizing without Organizations.
New York: Penguin Press.
Silfverberg, Miika, Scott MacKenzie, and Panu Korhonen
2000 Predicting text entry speed on mobile phones. In: Proceedings of the 2000
SIGCHI Conference on Human Factors in Computing Systems, 9–16. New
York: ACM Press.
Singhal, Arvind, Peer J. Svenkerud, and Einar Flydal
2002 Multiple bottom lines? Telenor’s mobile telephony operations in Bangladesh.
Telektronikk 2002: 153–160.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
Mobile phone communication 215

Tagliamonte, Sali and Derek Denis


2008 Linguistic ruin? LOL! Instant messaging and teen language. American Speech
83: 3–34.
TDG
2002 Grameen Telecom’s Village Phone Programme: A multi-media case study.
Telecommons Development Group. Canadian International Development
Agency. http://www.telecommons.com/villagephone/section1.html
Thurlow, Crispin (with Alex Brown)
2003 Generation txt? The sociolinguistics of young people’s text-messaging. Dis-
course Analysis Online 1(1).
http://extra.shu.ac.uk/daol/articles/v1/n1/a3/thurlow2002003-paper.html
Thurlow, Crispin
2006 From statistical panic to moral panic: The metadiscursive construction and
popular exaggeration of new media language in the print media. Journal of
Computer-Mediated Communication 11(3), article 1. http://jcmc.indiana.edu/
vol11/issue3/thurlow.html
Traugott, Michael, Sung-Hee Joos, Rich Ling, and Ying Quan
2008 The mobile phone: An essential item for the US public. In: Maren Hartmann,
Patrick Rössler, and Joachim Höflich (eds.), After the Mobile Phone? Social
Changes and the Development of Mobile Communication, 165–176. Berlin:
Frank & Timme.
Trosby, Finn
2004 SMS, the strange duckling of GSM. Telektronikk 3: 187–194.
Tseliga, Theodora
2007 “It’s all Greeklish to me!”: Linguistic and sociocultural perspectives on
Roman-alphabeted Greek in asynchronous computer-mediated communi-
cation. In: Brenda Danet and Susan C. Herring (eds.), The Multilingual Inter-
net: Language, Culture, and Communication Online, 116–142. New York: Ox-
ford University Press.
Weiner, Eric
2007 Our cell phones, ourselves. National Public Radio, December 24.
http://www.npr.org/templates/story/story.php?storyId=17486953
Yuan, Li, Corey Dade, and Paulo Prada
2007 Texting when there’s trouble. Wall Street Journal, April 18. http://online.wsj.com/
public/article/SB117685626072073360-3ZC9EfLBi5VfMY0OFYrZtn34WwY_
20070518.html?mod=tff_main_tff_top
Zainudeen, Ayesha, Nirmali Sivapragasam, Harsha de Silva, Tahani Iqbal, and Dimuthu
Ratnadiwakara
2007 Teleuse at the bottom of the pyramid: Findings from a five-country study.
Colombo, Sri Lanka: LIRNEasia.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
216 Rich Ling and Naomi S. Baron

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:36 PM
9. Synchronous voice-based
computer-mediated communication
Christopher Jenks and Alan Firth

1. Introduction

As communication is becoming increasingly dependent on instant and globalized


connectivity, computers have become a common way of conducting conference
calls, supplementing teaching lessons, carrying out business, providing customer
support, and chatting with friends. Despite the impact computers have on the
way people manage their personal and professional lives, much of what we know
with regard to the mediation between computers and communication comes from
studies of text-based media such as email (e.g., Tanskanen and Karhukorpi
2008; Waldvogel 2007) and text chat rooms (e.g., Herring 1999; Lotherington
and Xu 2004). While studies of text-based media have contributed much to an
understanding of computer-mediated communication (CMC), new and emerging
media have not been subjected to the same level of empirical scrutiny (Lamy
2004). For example, technological advancements have led to improvements in
audio and video capabilities, yet research has failed to keep up with these devel-
opments.
This chapter narrows this empirical gap by providing an overview of the inter-
actional character of synchronous voice-based CMC (SvCMC). SvCMC includes
the contiguous communication of two or more people, typically accomplished
through the use of Voice-over-Internet protocol (VoIP). VoIP, or Internet telephony,
is a technology that allows the human voice to be transmitted through a network
system (e.g., the Internet). Devices that commonly employ VoIP include computers
(e.g., Cziko and Park 2003) and mobile phones (e.g., Arminen 2005). Although
VoIP technology is not new, recent software developments have led to increased
awareness and use (e.g., Skype). For instance, for years SvCMC media have been
used by businesses to conduct conference calls, although their use did not become
widespread until after the advent of Web 2.0 applications.
While over the years some SvCMC investigations have been carried out, the
literature is disjointed, and studies are scattered across many different disciplines.
The aim of the present chapter is to make sense of this literature by focusing on the
interactional norms and practices, and the technological affordances and con-
straints, of SvCMC. In addition to reviewing existing SvCMC findings, we draw
on our own corpus of voice-based chat data to supplement previous observations,
identify key issues, make conceptual and empirical connections, and identify areas
for future research. Our analysis of chat data is informed by conversation analysis

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
218 Chris Jenks and Alan Firth

(CA; see Schegloff 1988, 2007), although the studies that are reviewed below use
various theoretical frameworks and methodological approaches, including CA.
The common thread that binds our literature review and analysis of chat data is a
concern to uncover the interactional character of SvCMC. The interactional fea-
tures discussed below include identification-recognition strategies, turn-taking,
floor management, and repair. These features are subsumed under the larger disci-
pline of pragmatics (see Editors’ introduction, this volume).

2. Voice-enabled technologies

Numerous SvCMC technologies exist; some are used for one-to-one communi-
cation, while others accommodate multiple interlocutors. The literature and data
discussed below deal primarily with the latter, although when relevant and necess-
ary, one-to-one communication is discussed, examined, and compared with multi-
party CMC. The reason for doing so is two-fold. First, the interaction-oriented
literature on SvCMC is still in its infancy, and therefore previous observations
and findings that are relevant to this chapter are scarce. Second, the observa-
tions and findings for one-to-one communication, including those for telephones,
are important to a comprehensive understanding of the interactional character of
SvCMC. This section presents an overview of the technologies that are equipped
with voice capabilities that are particularly relevant to our review of the literature
and presentation of data.
Telephone conversations have provided the bulk of existing observations and
findings about voice-only communication. Although telephone technology sup-
ports three-way calling, the more common two-way medium has received the most
attention (see Hutchby 2001). Themes that have been investigated are wide rang-
ing, although most studies have examined issues related to the interactional organ-
ization of talk: sequence organization (e.g., for telephone openings; see Houtkoop-
Steenstra 1991; Schegloff 1972, 1986), turn-taking (e.g., for overlapping talk; see
Jefferson 1984; Schegloff 2000a), and repair (e.g., Schegloff 2000b; Wong 2000).
While some research has investigated telephone communication in the workplace
(e.g., Baker, Emmison, and Firth 2005), the preponderance of research has exam-
ined casual conversations between friends and family. Despite this extensive body
of literature, studies that examine telephone conversations do not typically discuss
the mediating factors involved in voice-only communication (see, however,
Hutchby and Barnett [2005] for a discussion of how telephones mediate conver-
sation openings). Rather, telephone conversations are examined in order to under-
stand dyadic communication in its own right (Schegloff 1979: 24). However, the
telephoning task of communicating in the absence of non-verbal cues is similar in
some ways to SvCMC. These similarities will be identified and discussed in our
presentation of the interactional character of SvCMC.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 219

Mobile phones are similar in many ways to telephones. A main feature of both
devices is the ability to synchronously communicate verbally with people in geo-
graphically different locations. Both devices also support VoIP communication
and possess other communicative modalities (e.g., voice messaging and video
communication). Mobile phones play a central role in the way people communi-
cate in today’s technologically-driven world. This is especially true as more and
more people access online content with their mobile phones. However, very little
work has been done on the interactional character of mobile phone communi-
cation, with the exception of a few conversation analytic studies. Being a relatively
new technology in comparison to the telephone, the interaction-related literature
on mobile phone communication is still very much in its infancy. Existing research
has focussed on how interlocutors open their conversations (e.g., Arminen 2005;
Hutchby and Barnett 2005) and how opening sequences are influenced by caller
identification technology (see section 4). In contrast, extensive research has been
carried out on the interactional character of push-to-talk radios. Push-to-talk
radios are similar to mobile phones in that both devices transmit and receive talk
synchronously (i.e., both devices are two-way radios). However, push-to-talk
radios are different from mobile phones in that communication with the former de-
vice typically involves sending and receiving talk in single intervals (see Woodruff
and Aoki 2004 for an overview). Two-way radios are commonly used in the emerg-
ency and police services, as well as for communication between pilots and air traf-
fic controllers (see Neville 2004 for a book-length study of airline cockpit com-
munication).
Audioconferencing entails two or more interlocutors communicating with tele-
conferencing phones, traditional telephones, and/or computers with headsets. In
some situations, face-to-face communication occurs in conjunction with audiocon-
ferencing. For example, it is not uncommon to have workers in two geographically
displaced locations teleconferencing with each other, as well as communicating
with their colleagues in a physical space (e.g., Wainfan and Davis 2004). Most
studies that have investigated audioconferencing systems are concerned with ex-
ploring business-related topics and/or design issues. Example topics for the former
focus include group decision-making processes (e.g., Hiltz, Johnson, and Turoff
1986) and institutional status in the workplace (e.g., France, Anderson, and
Gardner 2001), while the latter focus is concerned with designing better technol-
ogies for SvCMC (e.g., Rodenstein and Donath 2000). Audioconferencing has also
been investigated somewhat extensively in distance language education settings
(see Lamy and Hampel 2007 for an overview of CMC and language learning).
Much of this research examines the pedagogical benefits of in-house audioconfer-
encing programs (e.g., Lyceum at Open University; see Hampel and Hauck 2004),
although few studies rely on detailed transcripts to investigate interactional issues
(cf. Negretti 1999). However, some interaction-related studies of audioconferenc-
ing exist. For example, Hindus, Ackerman, Mainwaring, and Starr (1996) exam-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
220 Chris Jenks and Alan Firth

ined the workplace usability of a voice-only system called Thunderwire. Conver-


sations mediated by Thunderwire were characterized by rapid turn-taking, few
pauses between utterances, and a high-degree of spontaneity. Although the inter-
locutors were said to have enjoyed using the voice-only system, some users experi-
enced difficulty in identifying who was in the voice-only space with them (see sec-
tion 4).
Videoconferencing is an increasingly common way of communicating through
computers in workplace settings, as more and more businesses and institutions
require fast and cost-effective global communication. The main argument for using
video over audio (voice-only) is that non-verbal cues are necessary for “effective”
communication. In other words, voice-only and text-only communication do not
offer the necessary interactional cues to provide a sense of community and social
presence (but see Singer, Hindus, Stifelman, and White 1999 for a discussion of the
advantages of using voice-only systems). The assumption is that CMC must rep-
licate face-to-face interaction through the use of gesture, gaze, and other forms of
non-verbal language. However, research has shown that despite the perceived
benefits of video-based CMC (e.g., Yamada and Akahori 2007), videoconferencing
systems are sometimes used on networks that do not provide the necessary band-
width to display continuous and fluid non-verbal movements (e.g., Nolan and
Exner 2009). Videoconferencing systems have also been investigated extensively
in business (see O’Conaill, Whittaker, and Wilbur 1993, for an investigation of
LIVE-NET), design studies (see Dourish, Adler, Bellotti, and Henderson [1996] for
a review of issues related to using audio and video systems for work), and edu-
cation (see Wang [2004] for a discussion of how NetMeeting was used for distance
language education). As with audioconferencing systems, the bulk of existing work
has focused on investigating the suitability of videoconferencing for various insti-
tutional purposes (e.g., conducting meetings, collaborating on projects, delivering
lessons). For example, Schullo, Hilbelink, Venable, and Barron (2007) discussed
the advantages and limitations of using Elluminate Live and Macromedia Breeze
(now known as Adobe Connect) for pedagogical purposes. Most videoconferencing
systems provide synchronous audio chat and other multimedia tools (e.g., texting,
whiteboard, emoticons). However, perhaps because of these multiple options for
communication, studies have reported that the management and selection of com-
munication tools in videoconferencing systems can lead to confusion and frus-
tration (e.g., Guichon 2010). Because most research in the management and selec-
tion of multimedia tools has focused on user experience and design features (e.g.,
Joisten 2007; Nolan and Exner 2009), little is known about how CMC sequentially
unfolds and changes as interlocutors switch from one medium or tool to another.
This is an important area of CMC research that must be further examined.
Audio chat rooms involve two or more interlocutors communicating with com-
puters equipped with VoIP-enabled programs. In some cases, interlocutors can
connect to audio chat rooms with mobile phones equipped with VoIP. Commer-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 221

cially available programs include, but are not limited to, PalTalk, iVisit, Adobe
Connect, Elluminate Live, and Skype. A common feature in most programs is the
ability to choose from several media (e.g., text, audio, and video). Programs vary
greatly in terms of subscription fees, available features, and intended audience (see
Cziko and Park 2003 for an overview). On the one hand, audio chat programs are
used for meetings at prearranged times and with participants with prior knowledge
of each other. For example, Nolan and Exner (2009) investigated the benefits of
using Adobe Connect for teacher-student meetings (see also Jepson 2005 for an in-
vestigation of student-student interaction). Audio chat rooms used for pre-planned
meetings with acquainted participants in institutional settings are sometimes re-
ferred to as audioconferencing systems (e.g., Thunderwire; see Ackerman, Hindus,
Mainwaring, and Starr 1997). On the other hand, audio chat programs are used for
impromptu conversations with unacquainted interlocutors (e.g., Skypecasts; see
section 3). Interlocutors freely enter and leave these latter types of audio chat
“rooms” in the same way as in text-based chat rooms. Few studies of unacquainted
interlocutors participating in audio chat rooms have been conducted (see, however,
Jenks 2009); this chapter reviews existing observations and findings. Yet another
type of audio chat room investigated in the literature has been used for system de-
sign purposes, where interlocutors communicate in experimental/laboratory en-
vironments. For instance, Aoki et al. (2003) examined an experimental audio chat
room program that allows for multiple, simultaneous conversational floors. One of
the empirical objectives in Aoki et al.’s (2003) study was to design a program that
replicates the conversational schisms that occur in multiparty face-to-face interac-
tion (cf. Egbert 1997). The various audio chat rooms investigated in the literature
are discussed in greater detail when the interactional features of SvCMC are pres-
ented below.

3. Skypecasts

The data that we present to supplement extant observations and findings come
from our recordings of Skypecasts, an audio chat room feature of Skype. Skypecasts
are conducted primarily in the voice medium, although interlocutors can send each
other private text messages. While Skype users can participate in video interac-
tions, Skypecasts do not support videoconferencing. Furthermore, Skypecasts are
used primarily for chatting among unacquainted interlocutors, whereas pre-
planned meetings for institutional purposes are often conducted in Skype. Anyone
with an Internet connection, headset or USB telephone, and a Skype account can
create and host a Skypecast. Public Skypecasts are listed online, with chat room
titles and descriptions.
Skypecasts comprise three aspects of participation: listening, waiting, and talk-
ing. Interlocutors are placed in a “listening area” when they first enter a Skypecast.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
222 Chris Jenks and Alan Firth

In the listening area, they can only listen to the ongoing conversation or upgrade
their status to “waiting”. Moving into the “waiting area” signals to the host that the
interlocutor is ready to take part in the conversation. The host has control over who
moves from the waiting to the “talking area” and when. Once interlocutors are
moved into the talking area, they are free to communicate as they would on the
telephone. Screen names are visible for all interlocutors to see on the user inter-
face. There are no buttons to push to bid for the conversational floor or to ask for
permission to talk.
The Skypecasts that are discussed below were all advertised as English-speak-
ing chat rooms. Many of the interactants have never met before. Consequently, a
large portion of Skypecast talk deals with getting acquainted. The nationalities and
linguistic backgrounds of the interactants are too numerous to list here; most come
from countries where English is not spoken as a first or second language. Data were
recorded using a software program called Pamela. This program recorded all ver-
bal communication, but it was unable to capture text communication. Using voice
and text messages, Pamela notified all Skypecast participants that they were being
recorded. Participants were also told that the recording would stop if they did not
wish to be recorded. Several research assistants collected the data for the purpose
of understanding how Skypecasts work. Over 50 hours of Skypecast interaction
have been analyzed.

4. Identification-recognition strategies

In face-to-face communication, interlocutors have myriad ways in which they can


manage speakership and listenership. Gaze and gesture allow interlocutors to
monitor who is speaking and who is attempting to speak next (Goodwin 1999),
while what is being uttered by the speaker allows listeners to project when the cur-
rent turn may end (Sacks, Schegloff, and Jefferson 1974). In other words, inter-
locutors design their turns-at-talk according to available verbal and non-verbal
cues. For example, the physical presence and proximity of two ably seeing col-
leagues crossing paths in a corridor would preclude any need to self-identify or re-
quest identification. If one or both decide to stop and chat, the interlocutors have
several choices of how this can be done. Hand gestures, head nods, or eye contact
can be used to summon, while calling the other’s name could serve the same func-
tion. In SvCMC, however, interlocutors must manage speakership and listenership
in a medium with minimal visual cues. This section examines how the affordances
and constraints of SvCMC influence how interlocutors identify and recognize each
other.
In some telephone and mobile phone conversation openings, the physical do-
main does not provide cues that would allow the call receiver to identify the caller
(see Extract 3 for an example of how caller identification technology mediates mo-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 223

bile phone conversation openings). Extract 1 below illustrates how callers and call
receivers deal with this situation (the punctuation markers used in the examples
below represent intonation and stress; for the transcription conventions, see the
Appendix).
(1)
1 ((summons: i.e. telephone ring))
2 Nancy: H’llo?
3 Hyla: Hi:,
4 Nancy: FHi::.
(Hutchby and Barnett 2005: 153)
In line 1, the ringing of the telephone summons an answer, which Nancy pro-
vides in line 2. Although Nancy’s response is packaged as a greeting token, it also
performs other social actions. The greeting token serves to recognize the sum-
mons, but it also serves indirectly to self-identify Nancy through voice recognition
(Levinson 1983; Schegloff 1979). That is, when the callee answers the phone and
provides a greeting token, the caller is provided with verbal cues that will assist in
identification. Furthermore, unless Nancy was expecting a call from Hyla, Nancy
is not in a position to identify who the caller is. At this point, the only cue Nancy
has is the ringing of the phone. Nancy’s use of rising intonation demonstrates an
orientation to not knowing who is on the other end of the line (as opposed to say-
ing, “Hyla is that you?”). In line 3, Hyla provides her own greeting token. This ut-
terance signals that someone is in fact on the other end of the line, as well as pro-
viding an indirect self-identification cue. In addition, if Nancy is able to use this
cue to identify the caller, Hyla’s acknowledgement and indirect self-identification
in line 3 can function as a first-part greeting. In line 4, Nancy provides a second-
part greeting, demonstrating that she has in fact been able to identify Hyla in the
absence of non-verbal cues. Consequently, Hyla and Nancy open their conver-
sation according to the technological affordances and constraints of the telephone.
Although Hyla and Nancy are able to get on with the business of greeting with
ostensibly little difficulty, greeting tokens that are used to self-identify indirectly
may provide insufficient cues for identification. For example, in Extract 2, the call
receiver (C) is not able to identify the caller (G) with the response given in line 3.
(Numbers in parentheses indicate pause length in seconds.)

(2)
1 ((summons))
2 C: Hello?
3 G: Hello.
4 (1.5)
5 C: Who’s this.
(Schegloff 1979: 39)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
224 Chris Jenks and Alan Firth

As with Extract 1, a telephone rings, summoning the call receiver to answer the
call. In line 2, C provides an answer, and in line 3, G responds with a first-part
greeting. However, C is not able to use the verbal and paraverbal cues provided by
G’s greeting token to identify the caller. Instead of responding with a greeting of
his own, C explicitly requests the caller’s identity. This explicit request for identi-
fication is designed to overcome the fact that C is answering a summons in the ab-
sence of physical cues, and in this particular instance, cannot rely solely on the ver-
bal information provided in a greeting to identify the caller/summoner.
However, troubles in identification can be subverted when additional contex-
tualization cues are available to call receivers. With caller identification technol-
ogy, for example, call receivers can design their turns in a way that creates different
interactional possibilities (Arminen 2005). In Extract 3, SB is using her mobile
phone to call Kisha, who is also on her mobile phone.
(3)
1 ((summons))
2 Kisha: Simone
3 SB: Kisha
(Hutchby and Barnett 2005: 159
Here Kisha is able to answer the call by identifying SB, the caller. In so doing,
Kisha makes use of the caller identification feature on her mobile phone to shape
they way she opens the conversation. By bypassing the need to request identifica-
tion, Kisha demonstrates an ability to exploit what Hutchby (2005) calls “circum-
stantial contingencies”. That is, Kisha designs her turn-at-talk according to the
technology available.
Interlocutors in Skypecasts can also pre-identify with screen names. However,
unlike the one-to-one participatory structure of mobile phone openings, in Skype-
casts there are multiple interlocutors continuously entering and leaving chat
rooms. This “revolving door” feature, coupled with the fact that screen names do
not provide visual cues that signal speakership (cf. Lamy 2004), creates a set of
practices similar to telephone openings that lack caller identification technology.
In Extract 4, three interlocutors are in a Skypecast. No previous talk has oc-
curred before S1 makes his first contribution.
(4)
1 S1: hello?
2 (0.3)
3 S2: hello?=
4 S3: =helloo?
In line 1, S1 provides a greeting token. As with telephone openings, this utterance
does more than the business of greeting. S1’s greeting token also serves to make his
presence known. Much like answering a call after a summons, the rising intonation

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 225

in S1’s greeting token also seeks a response that would confirm the presence of any
co-interlocutors. In line 3, S2 provides a similar greeting token with rising inton-
ation. S2’s greeting also serves several functions (i.e., responding to S1’s turn,
allowing S2 to make his presence known, and seeking a response from co-inter-
locutors). In line 4, S3 follows with his own greeting token, this time with greater
stress and more animated intonation. The sequential importance of these greeting
tokens, all of which are delivered with rising intonation, is that they appear to be
necessary first steps in engaging in greetings and further topical talk in a setting
where interlocutors do not know and cannot see each other. The interlocutors are
not only acknowledging their presence with greeting tokens but also creating an in-
teractional space where the next speaker (co-interlocutor), if willing and able to
participate, must provide a receipt token of some sort. In the physical domain, this
type of greeting exchange would be similar to communicating in a cocktail party in
total darkness – as opposed to, say, two friends crossing paths in a corridor.
Although screen names are visible to all Skypecast participants, interlocutors
often seek verbal confirmation from a co-interlocutor, as they may not know who is
actively participating, busy texting another person, or has left the computer unat-
tended. In other words, seeking verbal confirmation from a co-interlocutor is
sometimes necessary in Skypecasts even if everyone in the room knows who is
“logged in”. Extract 5 provides an example of an interlocutor (S6) seeking verbal
confirmation even after two interlocutors have already established their presence
in the room. The extract begins with S5 answering a question posed by S4 (not
shown).
(5)
1 S5: oh you mean where are we from? (0.4) I am from India
2 (1.0)
3 S6: hello?=
4 S7: =y- y- a[-
5 S6: [let’s talk about something
6 (.)
7 S6: eh? (0.5) hello?=
For several lines of interaction before this extract, S5 and S4 have exchanged
greetings and biographical information, and in so doing, they indirectly signal to
the other interactants that they are logged in and communicating. Despite this, S6
enters into the conversation with a greeting token (line 3). This greeting token sig-
nals to the other interlocutors that S6 is in the room and ready to communicate. The
greeting token also serves to seek verbal confirmation from the other interlocutors
that S6’s has been heard, as demonstrated in the use of rising intonation (“hello?”).
After receiving no uptake for his proposal to “talk about something”, S6 uses a tag
question (“eh?”) and second greeting token (“hello?”) to confirm whether the other
interlocutors have heard him.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
226 Chris Jenks and Alan Firth

In SvCMC, moments of silence can lead to doubt about whether other people
are still online. In Extract 6, for example, two co-workers are connected to Thun-
derwire.
(6)
1 John: Is Judy here today?
2 Patty: Judy’s here, … and she was on … earlier. She is either
3 listening or … is not … here with us.
(Ackerman et al. 1997: 52)
In the absence of physical cues, screen names are sometimes used as a resource
to elicit verbal participation. In Extract 7, for instance, a Skypecast participant uses
a screen name to determine whether a co-interlocutor is in fact ready to communi-
cate.
(7)
1 S8: uh huh (0.8) oh we have Jan Lynn Lee eh- ohF (0.6) ((inaudible))
2 (0.6) uh- eh- okay uh- (1.2) Jan Lynn Lee hello?
3 (0.4)
4 S9: hello?
5 (1.2)
6 S8: yes=
7 S10: =hi
The extract begins with S8 realizing that S9 is logged in (“uh huh … oh we have
Jan Lynn Lee”). In line 2, S8 then seeks verbal confirmation (“Jan Lynn Lee
hello?”), which he receives in line 4 (“hello?”).
Yet another way of establishing who is on the other end of the line is to self-
identify. Some interlocutors find self-identification useful, as hearing multiple
voices without any physical cues can make other-identification difficult (e.g.,
matching voices with screen names in a chat room with four or more interlocutors).
In Extract 8, two interlocutors are conversing in a Skypecast with three other par-
ticipants.
(8)
1 S11: hello my name is Jim so (0.9) hello?
2 S12: I know [your
3 S11: [yeah=
4 S12: =name’s Jim we know (0.2) [you
5 S11: [okay
6 S12: said i[t
7 S11: [okay
8 S12: like I don’t know how many times (.) maybe fifteen times (0.4)
9 your names Jim ((begins laughing))

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 227

Two interactionally significant events precede this extract. First, S11 has told his co-
interlocutors that he believes it is necessary to self-identify, given the number of par-
ticipants in the chat room. Second, S11 has, on a number of occasions, followed his
own advice. In line 1, S11 designs his turn with a greeting token and self-identification
(“hello my name is Jim …”). After receiving no verbal uptake, S11 seeks confirmation
from his co-interlocutors (“hello?”). Although self-identification is a strategy that is
sometimes used and accepted in text-based chat rooms (Negretti 1999), S12 makes
it clear that he is well aware of S11’s name and does not require him to self identify.
In so doing, S12 demonstrates that he does not accept S11’s turn design strategy.
Similarly, in their study of Thunderwire, Ackerman et al. (1997) show how in-
terlocutors use turn-design strategies to manage speakership and listenership (see
also Hindus et al. 1996). In Ackerman et al.’s study, interlocutors used backchan-
nels to provide recipient uptake while managing tasks in a physical space. The use
of backchannels in Thunderwire showed how interlocutors exploit the technologi-
cal affordances of communicating in a voice-only medium.
(9)
1 Patty: John, are you there?
2 John: Uh-hm.
3 Patty: Thanks for this New York thing.
4 John: Uh-hm.
5 ((Typing, mouse clicks, male clears throat))
(Ackerman et al. 1997: 54)
In line 1 in Extract 9, Patty directly requests a receipt confirmation from John
(“John, are you there?”). Patty’s question is different from the confirmation-seek-
ing moves discussed in Extracts 4 and 5, where the use of “hello” did not specifi-
cally identify a co-interlocutor. According to Ackerman et al. (1997), John re-
sponds with an acknowledgement token that signals disinterest. While the extract
does not provide any information regarding whether Patty has understood John as
disinterested, it is clear from Patty’s response in line 3 that she has interpreted this
acknowledgement token as an indication to continue with her turn-at-talk. In line 4,
John provides the same acknowledgement token, and ostensibly continues with his
“offline” task (line 5). Consequently, John is able to exploit the absence of physical
cues by simultaneously doing disinterest and providing recipient uptake. This situ-
ation can occur in telephone and mobile phone conversations, where interlocutors
can signal “active” listening while engaging in other activities.
This section has identified the strategies interlocutors use to identify and rec-
ognize each other, and how interlocutors make their presence known verbally. The
extracts show how caller identification, screen names, and communicating in a
voice-only medium influence the ways in which interlocutors manage speakership
and listenership in telephone and mobile phone communication, Skypecasts, and
Thunderwire.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
228 Chris Jenks and Alan Firth

5. Turn-taking

In this section, we examine how turns are managed in SvCMC. The importance of
turn-taking in communication has been discussed extensively in the CA literature
(e.g., Sacks et al. 1974). Turns-at-talk serve as an interactional bedrock from which
interlocutors can do a range of social activities, from making their presence known,
as we have seen in the previous section, to reporting on the speech of a fellow in-
terlocutor (e.g., Clift 2006). With regard to voice-only communication, most of the
turn-taking observations that have been made come from telephone conversations
(e.g., Schegloff 1979). In these settings, there is typically one interlocutor speaking
at a time, and any occurrence of overlapping talk is initiated and dealt with in sys-
tematic ways (Schegloff 2000a). Furthermore, topics are proposed, discussed, and
abandoned singly. That is, interlocutors in one-to-one settings generally do not
propose, discuss, and abandon two or more topics simultaneously. We explore
whether these observations are applicable to SvCMC. Our discussion focuses on
topic management and overlapping talk.
Several studies of multiparty communication in face-to-face settings have
observed that one topic often transforms into two or more (e.g., Schegloff 1995).
For example, Speakers A, B, C, and D are discussing Topic 1. Speakers A and C
then turn to each other and begin discussing Topic 2, while Speakers B and D
continue with Topic 1. As a result, two conversational floors are formed in one
group in order to deal with Topics 1 and 2. In face-to-face settings, interlocutors
can use gaze and gesture to determine speakership and listenership (Goodwin
1999, 2003). Often these non-verbal cues are used to initiate and deal with situ-
ations when one topic transforms into two or more (Egbert 1997). In Extract 10,
for example, a group of friends are together having a casual face-to-face conver-
sation.
(10)
Floor A
1 Hans: he does somethi:ng,
2 (1.0) ((Bea shifts torso and gaze to Inge))
3 Bea: tastes goo:d inge. ((Inge shifts gaze to Bea))
Floor B
4 (0.2) (0.2)
5 (0.5) Inge: ye:s?
6 Hans: somehow pro= Inge: [really?
7 Bea: [uh hm
=duct examination (0.5)
8 Stef: wha:t? Bea: tastes yu:mmy.
(Egbert 1997: 9)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 229

The extract begins at some point during Hans’ story-telling. In line 2, Bea shifts her
body and gaze to Inge, and then in line 3 comments on some food or drink. As Bea
nears her turn, Inge shifts her gaze to Bea, and provides a recipient uptake token in
line 5. Bea and Inge then continue communicating with each other, forming a sep-
arate conversational floor. Thus, the meeting of gaze between Bea and Inge repre-
sents the point or turn when one conversational floor transforms into two.
Despite the absence of gaze and gesture, multiple conversational floors have
been reported in some SvCMC environments. In Extract 11, for example, several
interlocutors are participating in Mad Hatter, an experimental audioconferencing
system that monitors communication and adjusts voice amplitude in order to facili-
tate multiple conversational floors. The arrows next to each line number indicate
Topic 1, whereas the line numbers without arrows correspond to Topic 2.
(11)
1f Y: would you rather: (.) have to wear big clown shoes
2 K: four
3 ounces isn’t that-
4 isn’t [that much, I wo]uld say liquid detergent
5f B: [big what shoes?]
6f Y: big clown
7f shoes (.) you know the
8f big [clumsy shoes ] that a clown wears,
9 A: [what was that?]
10 K: I don’t know, I’ll
11 let you choose that one,[since I chose the first] one,
12f B: [okay, I would rather:]
(Aoki et al. 2003: Excerpt I)
In line 1, Y asks a question regarding big clown shoes. Almost in overlap, K in
lines 2–4 follows with another question, this time regarding the weight of liquid
detergent. At this point there are two topics. In line 5, B aligns to Y’s topic by seek-
ing clarification of the clown shoes. After Y clarifies (lines 6–8), A aligns to K’s
topic by seeking clarification of the liquid detergent. In lines 10–11, K provides a
clarification for A, maintaining the liquid detergent topic. The transcript ends in
line 12 when B responds to Y’s initial question.
Although this exchange demonstrates the ability of interlocutors in multiparty
SvCMC to manage two topics simultaneously, each turn is designed according to
one conversational floor. This is most visible in B’s orientation to K’s turns in lines
10–12. Here B positions her overlapping turn after it is transitionally relevant to do
so (Sacks et al. 1974). That is, B waits until K appears to finish clarifying the liquid
detergent topic before responding to the clown shoes topic. It is difficult to say
from the transcript why these interlocutors manage two topics by orienting to the
turn-taking rules of one conversational floor. The ability to adjust body torque,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
230 Chris Jenks and Alan Firth

move spatial positions, and manage gaze are clearly important to communicating
in group talk (Isaacs and Tang 1994), although further investigations are needed to
explore whether an orientation to one conversational floor during the discussion of
two or more topics is the norm in multiparty SvCMC. One explanation is that there
is an implicit expectation in multiparty SvCMC that only one interlocutor should
speak at a time.
Below we examine two extracts that demonstrate orientations to a one-speak-
er-at-a-time rule. In Extract 12, several interlocutors are participating in a Skypecast.
(12)
1 S13: over twenty
2 S14: ah- ah- ah- are you- are you student are you working
3 S13: yeah (0.7) I’m work[ing ((inaudible))]
4 S15: [James ] what are you talking about? I’m
5 still here (.) and I’ll be here too
6 (1.7)
7 S16: excuse me can you hear my voice?
8 (0.5)
9 S14: hello? hello? hello? (0.7) please please wait ’til, we we complete our
10 chat okay?
11 (0.7)
12 S15: I’m sorry yeah go’head
13 (1.0)
14 S14: okay okay
S14 and S13 have for some time been discussing where they are from and exchang-
ing other biographical information. Thus, in the minutes preceding this extract
there has only been one conversational floor. The conversational floor continues in
line 1, where S13 states his age. After receiving this information, S14 in line 2 asks
whether S13 is a student or worker. In line 3, as S13 states that he is a worker, S15
enters the audio space with a series of utterances directed at S16. It is important to
note that while S14 and S13 were exchanging biographical information, S15 and
S16 had been sending each other private text messages. However, for some reason,
in this instance, S15 responds to S16 in the voice-only medium. Consequently, the
text conversation between S15 and S16 spills over into the conversational floor
shared by S14 and S13. In line 7, S16 orients to S15’s audio spill over by asking her
whether she has heard his voice (“excuse me can you hear my voice?”). In so
doing, S16 also enters the ongoing conversational floor. In lines 9–10, S14 re-
quests that the second conversational floor be put on hold until the first one is com-
plete (“please please wait ’til, we we complete our chat okay?”). In line 12, S15
also orients to her audio spill over as a pragmatic error, as she later apologizes to
S14. In this extract, therefore, a second conversational floor is treated as a dis-
ruption.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 231

S14’s explicit reference to the turn-taking practices of the room is just one way
in which interlocutors can orient to a one-floor format. In Extract 13, a group of
different interlocutors are participating in a Skypecast.
(13)
1 S17: •hhh I:: want to::: (.) improve my Engleash and uh:: (.) study, (.) and
2 work (0.6) yes
3 S16: yes (.) how old are you?
4 (1.1)
5 S17: uh:: twenty four (.) no twenty five (.) hh.hh
6 (0.5)
7 S16: and uh: where are you from
8 (0.8)
9 S17: I am from Poland you know (0.3) do you know::=
10 S16: =Poland-
11 (1.7)
12 S17: Pol[and
13 S16: [go on
14 (0.4)
15 S17: do you kn[ow where it is
16 S18: [are you from Poland
17 (0.7)
18 S17: yes
19 S16: Poland of course I know u- e- (.) I am from Romania (0.4) I’m not an
20 American (.) •hh
This extract begins with S17 telling S16 the reason why he wants to visit Australia.
S16 then asks two questions (lines 3 and 7), which S17 answers in lines 5 and 9. As
S17 nears the end his turn in line 9, S16 latches on to the utterance by providing a
confirmation of the country in question (line 10). Although S17 and S16 in lines
9–10 do not necessarily engage in overlapping talk, the onset of contiguous talk
audibly signals that overlapping talk may occur. This signal is oriented to by S17
and S16 in line 11, where both interlocutors pause momentarily. This pause acts as
a yielding device, as the floor is now reset to allow one speaker to regain the floor.
Yet the pause can also act as a source of further overlapping talk, as the interlocu-
tors cannot use physical cues to determine who will regain the floor. This constraint
is evidenced in lines 12–13, where S17 and S16 talk in overlap. In line 12, S17 at-
tempts to regain the conversational floor as he repeats his country of origin,
whereas in line 13, S16 appears to be yielding the floor verbally (“go on”). How-
ever, both utterances occur in overlap. As with the first floor yielding move in line
11, a pause in line 14 follows an instance of overlapping talk. In line 15, S17 con-
tinues with the topic of country origin. However, S18’s attempt to participate in the
discussion results in further overlapping talk, causing yet another pause in line 17.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
232 Chris Jenks and Alan Firth

Extract 13 shows how interlocutors in multiparty SvCMC design their turns to


deal with overlapping talk (see Jenks 2009). The onset of contiguous and overlap-
ping talk led to pauses that provided opportunities to yield the conversational floor.
In so doing, a one-speaker-at-a-time format was maintained. Despite this interac-
tional orientation, interlocutors must time and project whether, and if so, when, to
bid for the conversational floor (see Isaacs and Tang 1994 for a discussion of how
non-verbal cues facilitate the management of pauses). Sometimes bids are timed
and projected without contiguous and/or overlapping talk (line 18), while in other
instances, bids are less successful (e.g., lines 12–13). The sequential position of
pauses, and interlocutors’ responses to them as floor yielding or bidding opportun-
ities, demonstrate an awareness of, and disorientation to, multiple topics and con-
versational floors.
It was noted previously that the ability to adjust body torque, move spatial posi-
tions, and manage gaze are mechanisms that allow interlocutors to deal with multiple
conversational floors. In face-to-face group conversations, interlocutors can make
important interactional adjustments to aid in the business of doing multiple conver-
sational floors simultaneously. Despite the possibility of managing two topics in a
multiparty SvCMC (Extract 11), the interlocutors here oriented to the turn-taking
practices common in one-floor settings. This was further demonstrated in Extracts 12
and 13, where overlapping talk was treated as a disruption (Extract 12) and turn-tak-
ing practices were used as a resource to maintain one conversational floor (Extract
13). Although these observations are empirical issues that require further investi-
gation, in Skypecasts, evidence suggests that there is an expectation to follow a one-
speaker-at-a-time format. This observation is particularly interesting, as no such rule
exists in text-based chat rooms (cf. Herring 1999, 2010; see also section 7).

6. Repair

In this section we discuss how interlocutors do repair work, and examine whether
the repair strategies used in SvCMC are the result of communicating in a voice-
only medium. In their seminal work on repair, Schegloff, Jefferson, and Sacks
(1977) showed that there is an organizational structure to how interlocutors repair
and sometimes correct troubles in communication. Troubles can include anything
from problems in hearing to factually incorrect information. The interactional and
sequential organization of dealing with instances of communicative troubles con-
sists of who has highlighted the trouble source (i.e., the speaker or recipient) and in
what position the repair has occurred (e.g., in the turn following the trouble source
or two turns later). Many studies have revealed – through the process of uncover-
ing the interactional and sequential organization of repair – important insights into
setting-specific communicative norms and expectations (see Drew and Heritage
1992). In language classrooms, for example, teachers adjust their repair strategies

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 233

according to pedagogical objectives (e.g., Seedhouse 2004). As a result, teachers


orient to the institutional asymmetries that exist between those who are taught and
those who teach. The observation that repair work changes according to contextual
factors has been made in other settings, including doctor-patient encounters (e.g.,
Maynard 1991) and CMC (see Jacobs and Garcia, this volume).
For example, in comparing repair moves in text-based and audio chat rooms,
Jepson (2005) shows how self-repetition is more likely to be used as a repair strat-
egy in voice communication. In Extracts 14 and 15, the interlocutors are communi-
cating in HearMe, an audio chat room that supports VoIP communication.

(14)
1 M.M.: uh, Helena, Helena, if I go to Taiwan, which (place) /pli:s/,
2 which /pli:siz/ can I visit Taiwan, Helena?
3 Helena: I beg your pardon me, I didn’t catch you …
4 M.M.: I go to Taiwan, uh, wha uh what /pli:s/ can I visit?
5 Helena: Oh, you mean, sightseeing?
6 M.M.: Uh, what landmarks what landmarks … can I visit in Taiwan?
(Jepson 2005: 89)

(15)
1 Moo-soon: I’m sorry, you are what? You are /wIk/?
2 Junko: Not /wIk/, but weak.
(Jepson 2005: 90)
In both Extracts 14 and 15, the speaker of the trouble source self-repeats. In line 1
of Extract 14, M.M. asks Helena what place she should visit in Taiwan. In line 3,
Helena initiates a repair sequence but does not specifically indicate where the
trouble is (see Drew 1997). M.M. responds to Helena’s other-initiation for repair
by repeating her question (line 4). In line 1 of Extract 15, Moo-soon – the recipient
of Junko’s utterance – other-initiates a repair sequence by specifically identifying
the trouble source. In line 2, Junko self-repeats the pronunciation issue.
While Jepson (2005) reports high instances of self-repetition in audio chat
rooms, it is difficult to say whether these repair examples are a result of the voice-
only medium. It is possible that the repair examples reported occurred because the
interlocutors were language learners, rather than, or in addition to, the medium of
communication. Despite the need for further research to confirm these observa-
tions, Jepson’s (2005) comparison study reveals important CMC differences. For
example, in text-based chat rooms, because interlocutors must sometimes deal
with sudden fluxes of text messages, interlocutors are less likely to scroll back and
highlight troubles in communication. Conversely, Jepson (2005) argues that be-
cause interlocutors in audio chat rooms cannot scroll back to what has been said
previously, troubles in communication are more consequential for ongoing talk.
Furthermore, troubles in communication in audio chat rooms are more likely to be

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
234 Chris Jenks and Alan Firth

repaired, as interlocutors generally speak one at a time and follow one conversa-
tional floor.
Similar observations of repair strategies in voice-only media have been made
elsewhere. Aoki et al. (2003) compared two audioconferencing systems: one ex-
perimental, one non-experimental. In their observations of the non-experimental
audioconferencing system, interlocutors had difficulties managing multiple con-
versational floors. This difficulty led to an increased use of other-initiated repair, as
demonstrated in Extract 16.
(16)
1 B: sorry, slow down
2 I- I can’t hear you eh- too well,
3 would you rather: go around carrying the what?
4 CPR dummy?
(Aoki et al. 2003)
In their observations of the experimental audioconferencing system (Mad Hatter),
however, Aoki et al. (2003) noted that there were few problems in hearing. Inter-
locutors seamlessly managed multiple topics, as the experimental audioconferenc-
ing system adjusted the speech volume in each floor to its respective contributors.
Therefore, other-initiated repairs of hearing did not often occur in Mad Hatter.
In Skypecasts, repairs often occur for a different reason. The interlocutors in
Skypecasts are not fully acquainted work colleagues or classmates, as interactants
are in many audioconferencing system settings. Therefore, speaking to an inter-
locutor without referring to his or her screen name can sometimes lead to trouble in
communication. For example, in Extract 17, several interlocutors are getting ac-
quainted in a Skypecast. S18 asks S19 to introduce herself, but he does so without
identifying for whom the question is intended.
(17)
1 S18: so, can you introduce yourself
2 (1.6)
3 S19: eh? (0.4) meF
4 (0.9)
5 S18: yeGahF
6 (0.8)
The extract begins with S18 asking S19 to introduce herself (line 1). The long
pause that follows signals that there may be trouble in communication. In line 3,
S19 other-initiates a repair sequence (“eh?”). The “eh?” reveals that S18’s question
is the source of trouble. After a short pause in line 3, S19 ends her turn by seeking
confirmation whether the question is intended for her (“me?”). Later in line 5, S18
confirms that he was asking S19 to introduce herself. This example of repair shows
how trouble in communication can manifest in an audio chat room with multiple

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 235

interlocutors who are not fully acquainted. Although troubles in hearing occur in
Skypecasts, they are less likely a result of the voice-only medium. Rather, troubles
of the type examined in Extract 17 are characteristic of communicating in a multi-
party medium where the interlocutors cannot see each other. Similar observations
have been made for text-based chat rooms (see, for example, Negretti, 1999).
Four types of SvCMC have been discussed in relation to repair: HearMe, Aoki
et al.’s (2003) two audioconferencing systems, and Skypecast. Findings show how
interlocutors adjust or calibrate their speech behavior in order to accommodate the
affordances and constraints of communicating in a voice-only medium. All of the
extracts examined in this section point to the influence visual (or lack thereof) and
auditory cues have on how interlocutors deal with troubles in communication. For
example, interlocutors in Aoki et al.’s (2003) non-experimental audioconferencing
system were unable to manage multiple topics, although this was less of a problem
in the experimental system that attempted to mirror the audio environment of
multiparty face-to-face conversations. Similarly, in face-to-face interaction, gaze
and gesture can be used to identify the recipient of an utterance, but in Skypecasts,
repair may be necessary if explicit identification is not given.

7. Discussion and conclusion

This chapter has examined the interactional character of SvCMC. Our examples of
identification-recognition strategies, turn-taking, and repair have shown that inter-
locutors adapt their behavior according to the affordances and constraints of com-
municating in voice-only media. For example, in the absence of physical cues, in-
terlocutors use greeting tokens to seek the recognition of interlocutors present in
audio chat rooms, while in other situations the turn design strategy of self-identi-
fication is used to help recipients recognize and identify the speaker, although this
strategy can fail if interlocutors do not need this extra cue (see Extract 8). With
regard to turn-taking, interlocutors orient to the turn-taking practices of one con-
versational floor (Extracts 12–13), even when discussing two or more topics
(Extract 11). The preliminary findings of Jepson’s (2005) study revealed that inter-
locutors are more likely to repair troubles when they are communicating in the
voice medium. While Jepson’s (2005) study dealt with language learners, the com-
parison he made between text and voice media highlighted the influence technol-
ogy has on communication. The ephemeral features of audio chat, coupled with the
absence of visual cues, limit what interlocutors can comprehend while communi-
cating with multiple interlocutors (see Extract 16). These observations are similar
to the ones presented in our turn-taking section, where interlocutors demonstrably
avoided overlapping talk in Skypecasts (Extract 13).
Future research will need to examine whether these phenomena exist in other
SvCMC media. In particular, future research will need to continue investigating

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
236 Chris Jenks and Alan Firth

the similarities and differences of text and audio chat room communication, es-
pecially as voice and video media are more widely used in today’s highly global-
ized world. As technologies advance and more media options are available, CMC
research must examine why and how interlocutors choose among different media,
and analyze how those choices affect communicative patterns, norms, and expec-
tations. For example, how does simultaneous text and voice communication differ
from voice-only communication? How do interlocutors make the interactional
transition from one medium to another? As Extract 12 shows, interlocutors do not
only communicate in the voice medium in SvCMC environments. In order to de-
velop a more comprehensive understanding of the interactional character of
SvCMC, studies must capture all media that are being used in a system and exam-
ine how each communicative tool is managed (cf. Sindoni, forthcoming). Fur-
thermore, researchers should consider video recording the physical space in which
SvCMC takes place (cf. Beißwenger 2008) in order to understand what happens
“behind the scenes”. For instance, how does the physical space affect voice-only
communication? How do interlocutors use the keyboard and mouse to engage in
the various media available in one system?
Despite many unanswered questions, our review of the literature and analysis
of Skypecast data provide some insight into SvCMC. For example, this chapter has
revealed interactional similarities across SvCMC media, despite each medium pos-
sessing different technological affordances and constraints. Whether one-to-one,
on the telephone, or in a multiparty audio chat room, interlocutors compensate for
the absence of visual cues by designing their turns-at-talk in order to manage
speakership and listenership. This is most visible during those first instances when
two or more interlocutors begin a conversation and/or take part in an ongoing con-
versation. For example, during telephone openings, interlocutors take part in a
series of identification-recognition exchanges before pursuing topical talk in very
much the same way interlocutors in audio chat rooms seek to establish whether co-
interlocutors are ready to communicate. This would suggest that substantial differ-
ences do not exist between one-to-one voice-only media and multiparty SvCMC
with regard to the way interlocutors manage their interaction. Our observations and
findings of turn-taking and repair shed some light on this similarity. Despite the
availability and possibility of communicating with three or more people, interlocu-
tors in multiparty SvCMC orient to the turn-taking practices of one-to-one com-
munication. This is particularly interesting, as chat room communication in text-
based media does not always follow the turn-taking practices of one-to-one com-
munication (Herring 1999). Furthermore, audio chat rooms and audioconferencing
programs are designed to deliver simultaneous communication. Once a topic trans-
forms into two or more, however, the voice-only medium is incapable of providing
the audio-visual requirements for managing multiple conversational floors (Aoki
et al. 2003). While future research must examine these issues in more detail, this
chapter shows how interactional practices such as identification-recognition strat-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 237

egies, turn-taking, and repair are mediated by the affordances and constraints of
communicating in voice-only media.

Appendix

Transcription Conventions (Atkinson and Heritage 1984):


[[ ]] Simultaneous utterances – (beginning [[ ) and (end ]] )
[ ] Overlapping utterances – (beginning [ ) and (end ] )
= Contiguous utterances
(0.4) Represent the tenths of a second between utterances
(.) Represents a micro-pause (1 tenth of a second or less)
: Sound extension of a word (more colons demonstrate longer stretches)
. Fall in tone (not necessarily the end of a sentence)
, Continuing intonation (not necessarily between clauses)
- An abrupt stop in articulation
? Rising inflection (not necessarily a question)
_ Underline words indicate emphasis
FG Rising or falling intonation (after an utterance)
°° Surrounds talk that is quieter
hhh Audible aspirations
•hhh Inhalations
.hh. Laughter within a word
>> Surrounds talk that is faster
<< Surrounds talk that is slower
(( )) Analyst’s notes

References

Ackerman, Mark, Debby Hindus, Scott Mainwaring, and Brian Starr


1997 Hanging on the ’Wire: A field study of an audio-only media space. ACM Trans-
actions on Computer-Human Interaction 4(1): 39–66.
Aoki, Paul, Matthew Romaine, Margaret Szymanski, James Thornton, Daniel Wilson, and
Allison Woodruff
2003 The Mad Hatter’s cocktail party: A social mobile audio space supporting
multiple simultaneous conversations. In: CHI’03: Proceedings of the 2003
Conference on Computer Human Interaction, 425–432. New York: ACM.
Arminen, Ilkka
2005 Sequential order and sequential structure – the case of incommensurable
studies of mobile phone calls. Discourse Studies 7(6): 649–662.
Atkinson, J. Maxwell and John Heritage (eds.)
1984 Structures of Social Action. Cambridge, UK: Cambridge University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
238 Chris Jenks and Alan Firth

Baker, Carolyn, Michael Emmison, and Alan Firth (eds.)


2005 Calling for Help: Language and Social Interaction in Telephone Helplines.
Amsterdam/Philadelphia: John Benjamins.
Beißwenger, Michael
2008 Situated chat analysis as a window to the user’s perspective: Aspects of tem-
poral and sequential organization. Language@Internet 5, article 6.
http://www.languageatinternet.org/articles/2008/1532/index_html/
Clift, Rebecca
2006 Indexing stance: Reported speech as interactional evidential. Journal of So-
ciolinguistics 10(5): 569–595.
Cziko, Gary and Sujung Park
2003 Internet audio communication for second language learning: A comparative
review of six programs. Language Learning & Technology 7(1): 15–17.
Dourish, Paul, Annette Adler, Victoria Bellotti, and Austin Henderson
1996 Your place or mine? Learning from long-term use of audio-video communi-
cation. Computer Supported Cooperative Work 5(1): 33–62.
Drew, Paul
1997 “Open” class repair initiators in response to sequential sources of troubles in
conversation. Journal of Pragmatics 28: 69–101.
Drew, Paul and John Heritage (eds.)
1992 Talk at Work: Social Interaction in Institutional Settings. Cambridge, UK:
Cambridge University Press.
Egbert, Maria
1997 Schisming: The collaborative transformation from single conversation to multiple
conversations. Research on Language and Social Interaction 30(1): 1–51.
France, Emma, Anne Anderson, and Michael Gardner
2001 The impact of status and audio conferencing technology on business meetings.
International Journal of Human-Computer Studies 54(6): 857–876.
Goodwin, Charles
1999 Action and embodiment within situated human interaction. Journal of Prag-
matics 32: 1489–1522.
Goodwin, Charles
2003 The body in action. In: Justine Coupland and Richard Gwyn (eds.), Discourse,
the Body and Identity, 19–42. New York: Palgrave/Macmillan.
Guichon, Nicolas
2010 Preparatory study for the design of a desktop videoconferencing platform for
synchronous language teaching. Computer Assisted Language Learning 23(2):
169–182.
Hampel, Regine and Mirjam Hauck
2004 Towards an effective use of audio conferencing in distance language courses.
Language Learning & Technology 8(1): 66–82.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2010 Who’s got the floor in computer-mediated conversation? Edelsky’s gender pat-
terns revisited. Language@Internet 7, article 8.
http://www.languageatinternet.org/articles/2010/2857/

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 239

Hiltz, Starr, Kenneth Johnson, and Murray Turoff


1986 Experiments in group decision-making: Communication process and outcome
in face-to-face versus computerized conferences. Human Communication Re-
search 13: 225–252.
Hindus, Debby, Mark Ackerman, Scott Mainwaring, and Brian Star
1996 Thunderwire: A field study of an audio-only media space. In: Proceedings of
the 1996 ACM Conference on Computer-Supported Cooperative Work, 238–
247. New York: ACM.
Houtkoop-Steenstra, Hanneke
1991 Opening sequences in Dutch telephone conversations. In: Deirdre Boden and
Don Zimmerman (eds.), Talk and Social Structure. Studies in Ethnomethodol-
ogy and Conversation Analysis, 232–250. Cambridge, UK: Polity Press.
Hutchby, Ian
2001 Conversation and Technology: From the Telephone to the Internet. Cambridge,
UK: Polity Press.
Hutchby, Ian
2005 “Incommensurable” studies of mobile phone conversations: A reply to Ilkka
Arminen. Discourse Studies 7(6): 663–670.
Hutchby, Ian and Simone Barnett
2005 Aspects of the sequential organization of mobile phone conversation. Dis-
course Studies 7(2): 147–171.
Isaacs, Ellen and John Tang
1994 What video can and can’t do for collaboration: A case study. Multimedia Sys-
tems 2: 63–73.
Jefferson, Gail
1984 Notes on some orderlinesses of overlap onset. In: Valentina D’Urso and Paolo
Leonardi (eds.), Discourse Analysis and Natural Rhetoric, 11–38. Padua, Italy:
Cleup Editore.
Jenks, Christopher
2009 When is it appropriate to talk? Managing overlapping talk in multi-participant
voice-based chat rooms. Computer Assisted Language Learning 22(1): 19–30.
Jepson, Kevin
2005 Conversations – and negotiated interaction – in text and voice chat rooms. Lan-
guage Learning & Technology 9(3): 79–98.
Joisten, Martina
2007 Renegotiating interaction routines: Adoption of Skype in the workplace. In:
Tom Gross (ed.), Mensch & Computer 2007: Konferenz für interaktive und co-
operative Medien, 303–306. München: Oldenbourg Verlag.
Lamy, Marie-Noelle
2004 Oral conversations online: Redefining oral competence in synchronous en-
vironments. ReCALL 16(2): 520–538.
Lamy, Marie-Noelle and Regine Hampel
2007 Online Communication in Language Learning And Teaching. Basingstoke,
UK: Palgrave Macmillan.
Levinson, Stephen
1983 Pragmatics. Cambridge, UK: Cambridge University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
240 Chris Jenks and Alan Firth

Lotherington, Heather and Yejun Xu


2004 How to chat in English and Chinese: Emerging digital language conventions.
ReCALL 16(2): 308–329.
Maynard, Douglas
1991 Interaction and asymmetry in clinical discourse. American Journal of Sociol-
ogy 97(2): 448–495.
Negretti, Raffaella
1999 Web-based activities and SLA: A conversation analysis research approach.
Language Learning & Technology 3(1): 75–87.
Neville, Maurice
2004 Beyond the Black Box: Talk-in-Interaction in the Airline Cockpit. Burlington,
VT: Ashgate Publishing.
Nolan, Kathleen and Art Exner
2009 Exploring the real possibilities for virtual conferencing during student teacher
field experiences. Research, Reflections and Innovations in Integrating ICT in
Education 1: 611–615.
O’Conaill, Brid, Steve Whittaker, and Sylvia Wilbur
1993 Conversation over video conference: An evaluation of the spoken aspects of
video-mediated communication. Human-Computer Interaction 8: 389–428.
Rodenstein, Roy and Judith Donath
2000 Talking in circles: Designing a spatially-grounded audioconferencing environ-
ment. In: CHI ’00: Proceedings of the 2000 SIGCHI Conference on Human
Factors in Computing Systems, 81–88. New York: ACM.
Sacks Harvey, Emanuel Schegloff, and Gail Jefferson
1974 A simplest systematics for the organization of turn-taking for conversation.
Language 50(4): 696–735.
Schegloff, Emanuel
1972 Sequencing in conversational openings. In: John J. Gumperz and Dell Hymes
(eds.), Directions in Sociolinguistics: The Ethnography of Communication,
346–380. New York: Holt, Rinehart and Winston, Inc.
Schegloff, Emanuel
1979 Identification and recognition in telephone conversation openings. In: George
Psathas (ed.), Everyday Language: Studies in Ethnomethodology, 23–78. New
York: Irvington Publishers.
Schegloff, Emanuel
1986 The routine as achievement. Human Studies 9: 111–151.
Schegloff, Emanuel
1988 Presequences and indirection: Applying speech act theory to ordinary conver-
sation. Journal of Pragmatics 12: 55–62.
Schegloff, Emanuel
1995 Discourse as an interactional achievement III: The omnirelevance of action.
Research on Language and Social Interaction 28(3): 185–211.
Schegloff, Emanuel
2000a Overlapping talk and the organization of turn-taking for conversation. Lan-
guage in Society 29: 1–63.
Schegloff, Emanuel
2000b When “others” initiate repair. Applied Linguistics 21(2): 205–243.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
Synchronous voice-based computer-mediated communication 241

Schegloff, Emanuel
2007 Sequence Organization in Interaction: A Primer in Conversation Analysis.
Cambridge, UK: Cambridge University Press.
Schegloff, Emanuel, Gail Jefferson, and Harvey Sacks
1977 The preference for self-correction in the organization of repair in conversation.
Language 53(2): 361–382.
Schullo, Shauna, Amy Hilbelink, Melissa Venable, and Ann Barron
2007 Selecting a virtual classroom system: Elluminate Live vs. Macromedia Breeze
(Adobe Acrobat Connect Professional). Journal of Online Learning and
Teaching 3(4). http://jolt.merlot.org/vol3no4/hilbelink.htm
Seedhouse, Paul
2004 The Interactional Architecture of the Language Classroom: A Conversation
Analysis Perspective. Malden, MA: Blackwell.
Sindoni, Maria Grazia
Forthcoming Through the looking glass: A social semiotic introduction to the study of
video chats. Text & Talk.
Singer, Andrew, Debby Hindus, Lisa Stifelman, and Sean White
1999 Tangible progress: Less is more in Somewire audio spaces. In: Proceedings of
CHI ’99, 104–112. New York: ACM Press.
Tanskanen, Sanna-Kaisa and Johanna Karhukorpi
2008 Concessive repair and negotiation of affiliation in e-mail discourse. Journal of
Pragmatics 40: 1587–1600.
Wainfan, Lynne and Paul Davis
2004 Challenges in Virtual Collaboration: Videoconferencing, Audioconferencing,
and Computer-Mediated Communications. Arlington, VA: RAND Corporation.
Waldvogel, Joan
2007 Greetings and closings in workplace email. Journal of Computer-Mediated
Communication 12(2), article 6.
http://jcmc.indiana.edu/vol12/issue2/waldvogel.html
Wang, Yuping
2004 Supporting synchronous distance language learning with desktop videoconfer-
encing. Language Learning & Technology 8(3): 90–121.
Wong, Jean
2000 Delayed next turn repair initiation in native/non-native speaker English con-
versation. Applied Linguistics 21(1): 244–267.
Woodruff, Allison and Paul Aoki
2004 Push-to-talk social talk. Computer Supported Cooperative Work 13: 409–441.
Yamada, Masanor and Kanji Akahori
2007 Social presence in synchronous CMC-based language learning: How does it
affect the productive performance and consciousness of learning objectives?
Computer Assisted Language Learning 20(1): 37–65.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
242 Chris Jenks and Alan Firth

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:37 PM
10. Relevance in computer-mediated conversation
Susan C. Herring

1. Introduction

Relevance or relatedness across speaker utterances is a basic normative ideal of


conversation, upon which inter-subjective coherence is said to depend (Grice
1975; Sperber and Wilson 1986). Floutings of relevance are the exceptions that
prove the rule, in that they typically signal an underlying coherence that can be de-
rived through cognitive inferencing. Most research on relevance assumes a model
of conversation based on spoken communication, in which logically-related utter-
ances tend to occur adjacent to one another in temporal sequence. In text-based
computer-mediated communication (CMC), in contrast, related utterances are not
reliably adjacent, as in the following Internet Relay Chat exchange (example from
Paolillo, 2011):
(1) <ashna> hi jatt
<Dave-G> kally i was only joking around
<Jatt> ashna: hello?
<kally> dave-g it was funny
<ashna> how are u jatt
<LUCKMAN> ssa all
<Dave-G> kally you da woman!
In this example, for no two adjacent turns is the second turn relevant to the first, nor
can relevance reasonably be inferred between them. This chapter reviews literature
related to relevance and CMC and investigates the normative status of relevance
in computer-mediated conversations of the above type through discussion of
examples drawn from multi-participant synchronous chat, in which disrupted ad-
jacency (Herring 1999) of logically-related turns is especially common. In such en-
vironments, as well as in other CMC environments to a greater or lesser extent, it is
suggested that a new norm of loosened relevance has emerged. Originally moti-
vated by cognitive constraints, this norm may also be exploited for strategic, es-
pecially playful, ends. In concluding, the implications of this development for both
computer-mediated and offline exchanges are considered, and directions are ident-
ified for future research on relevance in CMC.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
246 Susan C. Herring

2. Background

2.1. Relevance in spoken conversation


The notion of sequentially-related utterances as a sine qua non of rational conver-
sation can be attributed to Grice (1975: 307), who states:
Our talk exchanges do not normally consist of a succession of disconnected remarks,
and would not be rational if they did. They are characteristically, and to some degree at
least, cooperative efforts (…). We might then formulate a rough general principle which
participants will be expected (ceteris paribus) to observe, namely: Make your conver-
sational contribution such as is required, at the stage at which it occurs, by the accepted
purpose or direction of the talk exchange in which you are engaged.
Grice terms this general principle the Cooperative Principle, and he posits four cat-
egories of Maxims – Quantity, Quality, Relation and Manner – which when fol-
lowed, yield results in accordance with the Cooperative Principle. The Relation
category consists of the maxim: “Be relevant”. True violations of the relevance
maxim are rare; most are apparent violations, or “floutings”, of the maxim, with the
intent to communicate a relevant message indirectly via the pragmatic mechanisms
of implicature and inferencing (Grice 1975). Grice gives the following exchange as
an example of a true relevance violation, which nonetheless generates a meaning-
ful implicature (=A’s remark should not be discussed, e.g., because it constitutes a
social gaffe):
(2) (At a genteel tea party)
A: Mrs. X is an old bag.
B: The weather has been quite delightful this summer, hasn’t it?
(Grice 1975: 312)
The importance of relevance in conversation is further underscored by Sperber
and Wilson (1986), who privilege relevance over Grice’s other maxims in their
cognitively-based general theory of communication. According to Sperber and
Wilson, communicative behavior overtly claims the audience’s attention and hence
demands some expenditure of effort. To make it worth the audience’s effort, beha-
vior that makes manifest an intention to communicate something, or “ostensive”
behavior, “comes with a tacit guarantee of relevance” (1986: 33), where relevance
is defined as “newly presented information being processed in the context of in-
formation that has itself been previously processed” (118–119). Relevance is a
matter of degree, and a speaker’s presumption of relevance may turn out to be un-
founded, in which case her attempt to be relevant would be only weakly in-
formative or fail altogether. However, communicators generally try to be optimally
relevant:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 247

When addressees are disappointed in their expectations of relevance, they rarely con-
sider as a possible explanation that the communicator is not really trying to be optimally
relevant. It would be tantamount to assuming that the apparent communicator is not
really addressing them, and perhaps not communicating at all. (Sperber and Wilson
1986: 159)
Being relevant also requires effort on the part of the speaker, including main-
taining awareness of the discourse context and the audience’s current knowledge
state, both of which shift as the conversation proceeds. McCann and Higgins
(1992) make explicit the effort being relevant entails in their characterization of
communication as a “game” with “rules”. In addition to being relevant, coherent
and comprehensible, giving neither too much nor too little information, and con-
veying the truth as they see it (Grice’s maxims), communicators should take the
recipient’s characteristics into account and produce a message that is appropriate
to their communicative intent and to the context and the circumstances. Recipi-
ents, in turn, should take the communicator’s characteristics into account, deter-
mine the communicator’s communicative intent or purpose, take the context and
circumstances into account, try to understand the message, and provide feedback,
when possible, to the communicator concerning their understanding of the mess-
age.
The maxims or “rules” of cooperative communication apply especially in task-
focused situations where the goal of communication is to be informative. They
may not be observed in antagonistic or playful situations where cooperation is not
expected (Schwarz 1996). Sperber and Wilson (1986) also note several social situ-
ations in which addressees may relax their expectations that speakers will try hard
to be relevant: informal conversation among friends in a pub after work, teachers
encouraging students to communicate freely or creatively, a master talking to his
servant (although the servant should always make his or her communication to the
master relevant) (160–161). These situations grant a special dispensation to speak-
ers not to be optimally relevant. However, a person who routinely fails to be rel-
evant without such dispensation is generally considered a bore, and others may
avoid his company.
The ideal of relevance in spoken conversation can be represented schemati-
cally as in Figure 1. (A = initiator, B = responder; the solid arrow indicates a mess-
age intended to be optimally relevant.)

Figure 1. The spoken ideal of relevance

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
248 Susan C. Herring

The models described above assign to relevance a key role – indeed, a partially-
definitional role – in human communication. Yet none considers modality of com-
munication; rather their claims are presented as universal generalizations, assumed
to be valid regardless of the medium through which the communication takes
place. At the same time, it is clear from the examples given to support both models
that the default “conversation” is produced by means of spoken language. This is
not surprising, given that until the advent of the Internet, there was no readily
available means of exchanging written messages with sufficient speed and reliabil-
ity to earn them the designation “conversations”.1 Now, however, CMC in the form
of email, chat, instant messaging, newsgroups, blogs, microblogs, and the like pro-
vides an opportunity to address “universal” claims about how conversation works,
taking modality into consideration. Yus (2010) suggests that the technological
properties of “cyber-media” affect what counts as relevance, and that “a number of
‘alterations’ of relevance may be produced by the different qualities of these
media” (16). For example, in textual modes of CMC, which lack the contextual
cues present in face-to-face communication, more information gaps have to be fil-
led in inferentially. This chapter is concerned with the norms of relevance in com-
puter-mediated exchanges. It explores how relevance in CMC differs from that in
spoken conversation, explains what might plausibly account for the differences,
and concludes by considering the implications of modality-specific norms of rel-
evance for pragmatic theories of communication.

2.2. Inter-turn coherence in CMC


Conversational relevance is a type of coherence across turns of talk. Nunan (1993:
116) defines coherence as the extent to which discourse is perceived to “hang to-
gether” rather than being a set of unrelated sentences or utterances. In their classic
work, Halliday and Hasan (1976) define coherence as texture, created by the gram-
matical and lexical links in a text known as cohesion. However, as Brown and Yule
(1993) point out, a cohesive text is not necessarily coherent, nor does a coherent
text necessarily make use of cohesive devices; rather, coherence resides at the level
of the pragmatic intentions of the speaker or writer, as example (2) illustrates.
Inter-turn coherence in CMC has been addressed extensively in the CMC lit-
erature. Markman’s chapter in this volume on topical coherence reviews this litera-
ture in detail; see also Jacob and Garcia’s chapter on conversational repair. Es-
pecially pertinent to the present chapter is the fact that most CMC servers
distribute messages in the linear order in which they are received, without regard
for what they are responding to. This often results in disrupted adjacency of other-
wise logically-related turns (Herring 1999), especially when two or more people
are communicating at the same time. The situation is compounded by the fact that
most CMC systems transmit messages in their entirety, rather than keystroke by
keystroke – that is, the transmission process is 1-way rather than 2-way (Cherny

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 249

1999; Herring 1999) – such that simultaneous feedback is lacking as senders type
their messages. Garcia and Jacobs (1999), who make similar observations, charac-
terize real-time chat as “quasi-synchronous” for this reason. It is difficult for con-
tributors to make their contributions relevant to what has gone before when they do
not know what messages will appear before theirs. As a consequence, adjacency
pairs are not infrequently disrupted in 1-way CMC systems by messages from
other conversations taking place in the same system, and threads of conversation
can become intertwined, as shown in example (1).
Disrupted adjacency results in unintended relevance violations, which can
cause online conversations to appear incoherent. For example, it can generate am-
biguity and confusion about which message is being responded to, especially if
multiple threads of discussion are intertwined. A number of compensatory strat-
egies for dealing with the “incoherent” nature of computer-mediated text have
been reported in the literature. McCarthy, Wright, and Monk (1992) observed that
during text-based exchanges participants tended to address the intended listener
more explicitly in an effort to maintain coherence (see also Werry 1996). Lam and
Mackiewicz (2007) identified three strategies that their IM participants in a work-
place setting used in order to maintain cross-turn coherence: short, multiple, and
sequential transmissions; topicalization; and the use of performative verbs (on per-
formatives in CMC, see Virtanen, this volume). Örnberg Berglund (2009) found
that international students using instant messaging in a design course maintained
coherence in cases of disrupted adjacency through lexical repetition and other
forms of cohesion (such as lexical substitutions, anaphora, and explicit linking ex-
pressions). However, even in the absence of cohesive devices, it was clear which
message was being referred to most of the time, either because of the timing or be-
cause, in the case of second-pair parts of adjacency pairs, “the sequential structure
of interaction [wa]s in itself an important clue in coherence creation” (12).2 These
adaptations notwithstanding, coherence remains desirable in task-oriented CMC.
In an experimental study, Ho and Swan (2007) found that student postings to an
asynchronous discussion forum that were low in relevance in relation to immedi-
ately preceding postings received fewer responses, whereas “postings that were
new, personal and relevant received the most responses” (7).
In recreational contexts, in contrast, the incoherence caused by disrupted adja-
cency may have advantages, including fostering playful communication. Much
humor exploits violations of Gricean maxims, especially the maxim of relation
(Attardo 1994; Chiaro 1992; but cf. Yus 20033). Disrupted adjacency creates
maxim violations when adjacent messages are considered side by side; these unin-
tended juxtapositions can suggest humorous interpretations (Herring 1997, 1999).
More generally, there is a tendency in recreational CMC environments for partici-
pants to free associate, sometimes giving rise to chains of associations that digress
rapidly away from the original topic of conversation. Herring (1999) gives an
example from a chat channel in which the conversation topic shifts in rapid se-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
250 Susan C. Herring

quence from blow-up dolls to a bald female singer to pool balls to pool tables to
being under the table (in a drunken stupor). The playful nature of online chat has
also been remarked upon extensively by Danet (2001; Danet, Ruedenberg-Wright,
and Rosenbaum-Tamari 1997), albeit not in connection with the notions of coher-
ence or relevance. The analysis presented in the following sections connects rel-
evance violations to playful behavior even in contexts where disrupted adjacency
does not occur, via what I suggest is an emergent norm of loosened relevance in
recreational CMC.

3. Case study: Relevance in IRC and MUDS

3.1. Data
Synchronous CMC resembles spoken conversation in many respects, despite the
fact that it is typed on a keyboard and displayed as text on a computer screen: Ex-
changes take place in (near-)real time, messages are typically short, and it is often
used for phatic communion, features which have earned it the label “chat” (Herring
2010). In the case study presented below, relevance is analyzed in extended
samples of interaction from two popular modes of synchronous CMC: IRC (Inter-
net Relay Chat) and MUDs (multi-user dungeons, domains, or dimensions).
IRC was the first CMC protocol that enabled real-time textual exchanges
among large numbers of people at different physical locations.4 Introduced in
1988, the basic protocol has been borrowed by commercial Internet service pro-
viders such as AmericaOnline, web chat forums, and for communication in multi-
participant online games, among other Internet environments (see Paolillo and Ze-
lenkauskaite, this volume). IRC chat spaces are metaphorically partitioned into
channels according (loosely) to the topic of discussion or the kind of people who
are there (#Christians, #thirtysomething, #gaysex, etc.), and users can join more
than one channel simultaneously. The majority of chat users at the time these data
were collected appeared to be teenagers and young adults who used IRC mainly for
informal social interaction and to meet people online.
MUDs originally developed in the late 1970s as networked, multi-participant
role-playing adventure games. The original game MUDs included a real-time chat
feature, which eventually became so popular that purely social MUDs – the best-
known of which is LambdaMOO – started to appear in the late 1980s, and edu-
cational MUDs developed from them in the early 1990s. MUDs are the textual pre-
cursors of graphical social chat environments such as Second Life. The MUD on-
line environment is typically based on a geographic theme – e.g., a fantasy
landscape, a house, a university – textual descriptions of which participants can
view by typing “look”, and through which they can navigate using text-based com-
mands (e.g., “go east”); these features have earned MUDs the designation “text-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 251

based virtual realities”. At the time these data were collected, regular participants
in MUDs tended to have some programming skills, be a little older, and feel more
commitment to the community of users on the MUD than participants in IRC;
moreover, individual MUDs had distinct cultural practices.5
IRC and MUDs share a number of system features that are potentially relevant
to the study of inter-turn coherence. Both are multi-participant, synchronous, text-
only modes of CMC that transmit messages in their entirety, rather than keystroke
by keystroke. This means that interlocutors do not know that a message is being
written to them until it is completed and sent, precluding the possibility for simul-
taneous feedback. Moreover, both IRC and MUD servers distribute messages in
the linear order in which they are received without regard for what they are re-
sponding to, which often results in disrupted adjacency of otherwise logically-re-
lated turns. In both systems, the arrival and departure of each participant is an-
nounced automatically by system messages (which resemble ordinary messages on
the channel or MUD), further interrupting users’ conversations. Finally, conver-
sation in IRC and MUDs is semi-persistent, remaining on users’ screens until new
messages cause it to scroll upward, and accessible for review (by scrolling back)
for as long as the user is logged on. This feature makes it possible for participants
to follow multiple threads of conversation, supplementing their memory with a
textual record of what has been said (Herring 1999). At the same time, depending
on the number of active participants, synchronous CMC can scroll by quickly and
require participants’ full attention to follow along; if one chooses to review the
previous conversation, one does so at the risk of losing track of the current con-
versational thread. It was not uncommon at the time these data were collected for
new users to complain that multi-participant computer chat was “confusing” or
“chaotic”; all of the above-mentioned features contribute to this effect.
The study presented below is based on qualitative, interpretive analysis of two
corpora. The IRC corpus consists of approximately 60 half-hour samples of public
group interaction that I logged at irregular intervals between 1995 and 1998, dur-
ing the peak of IRC’s popularity, as part of a larger ethnographic study of IRC. The
examples discussed below are drawn from four social chat channels: #bayarea,
#chatzone, #france, and #punjab.6 #Chatzone is an open-topic social chat environ-
ments, and the other three are geography/culture based. The MUD corpus includes
both social and educational chat: Two social samples are drawn from logs archived
on the web (not by the author) of interactions from TinyMUD (1991) and from
LambdaMOO (1995), and two educational samples are from online rhetoric
classes taught by instructors in different parts of the U.S. (circa 1995–1996) on
LinguaMOO. Only conversation logs from the MUDs are considered; program-
ming activity, descriptions of the virtual geography, etc. are excluded from this
analysis. In addition, two examples of human interaction with artificial intelligence
agents on MUDs are drawn from published sources (Isbell, Lee, Kearns, Kormann,
Singh, and Stone 2000; Turkle 1995).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
252 Susan C. Herring

3.2. Analysis
The basic claim of this section is that the requirement of optimal relevance is re-
laxed in recreational synchronous CMC in response to constraints imposed by the
medium, resulting in loosened norms of cross-turn relatedness, or loosened rel-
evance. Three kinds of evidence are presented to support this claim. First, dis-
rupted adjacency of logically-related turns is shown to be pervasive in both cor-
pora, due to interpolated system messages and overlapping conversational threads.
Second, evidence is presented that relevance is frequently violated even in non-ad-
jacent logically-related turns, including as a recurrent strategy of some partici-
pants, and that such violations are socially acceptable. Last, it is shown that par-
ticipants interpret contributions as intentionally relevant even when their content is
tenuously related (e.g., because they were produced by a preprogrammed robot in-
capable of intentionality), a further indication that loosened relevance has attained
normative status in these environments.

3.2.1. Disrupted adjacency: Noise in the system


Group chat systems are noisy communication environments. System messages and
utterances from other people’s conversations regularly interrupt ongoing ex-
changes. This is illustrated in the full transcript of IRC example (1), presented,
with individual messages numbered for convenience, as (3) below:
(3) [1] <ashna> hi jatt
[2] *** Signoff: puja (EOF From client)
[3] <Dave-G> kally i was only joking around
[4] <Jatt> ashna: hello?
[5] <kally> dave-g it was funny
[6] <ashna> how are u jatt
[7] <LUCKMAN> ssa all7
[8] <Dave-G> kally you da woman!
[9] <Jatt> ashna: do we know eachother?. I’m ok how are you
[10] *** LUCKMAN has left channel #PUNJAB
[11] *** LUCKMAN has joined channel #punjab
[12] <kally> dave-g good stuff:)
[13] <Jatt> kally: so hows school life, life in geneal, love life, family life?
[14] <ashna> jatt no we don’t know each other, i fine
[15] <Jatt> ashna: where r ya from?
Lines [1], [10], and [11] are automatically generated system messages that indicate
that a user has joined or left the IRC channel. In active channels with constantly
changing membership, system messages can be more frequent than intentional
communication among users, as illustrated in the following sequence from the
popular channel #chatzone.8

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 253

(4) [61] *** python has left channel #chatzone


[62] *** jazmaster (jazziz@ont-ca14–22.ix.netcom.com) has joined
channel #chatzone
[63] <Kayleigh> wulf you never told me you were a man, im shocked
[64] *** Signoff: d{0_o}b (Off to Hell!)
[65] <hippygirl> hi all
[66] <aOK-88> I demand Fax SEX NOW!!!!!!!
[67] *** csyen has left channel #chatzone
[68] *** |PseudO| (pseudo@eos88.eosinc.com) has joined channel #chatzone
[69] *** D-SaW (dsaw90@t5o206p44.telia.com) has joined channel
#chatzone
[70] <wulferina> lol
[71] <^ducky> you wouldnt know what sex is would you aOK
[72] *** snacks has left channel #chatzone
[73] *** PhoneSex- (PhoneSex-2@cayman.choice.net) has joined channel
#chatzone
[74] *** DelilA has left channel #chatzone
[75] *** Signoff: TIFFANY17 (Leaving)
[76] <MARY-J> Hello frod.
[77] *** fartmunch (TazMD@194.honolulu-01.hi.dial-access.att.net) has
joined channel #chatzone
[78] <smoothman> hello hippygirl
System messages make up 11 out of the 18 messages in this sequence, such that
smoothman’s response to hippygirl’s greeting in line [65] does not appear until line
[78]. This is an example of disrupted adjacency.
It is not only system messages that intervene between logically-related pairs of
turns. Messages from users engaged in other conversations may also intervene, if
they happen to reach the server in the interim between the previous initiation and
its response. Thus in example (4), wulferina’s laughter (lol ‘laughing out loud’) in
line [70] in response to Kayleigh’s message in [63] interrupts hippygirl and
smoothman’s greeting exchange, as does aOK-88’s message in [66] and ^ducky’s
response in [71], and MARY-J’s greeting addressed to frod in [76].
In example (3), two ongoing conversations are interleaved. This becomes ea-
sier to see when the irrelevant messages are omitted from each conversation, re-
sulting in two separate exchanges, as shown in (3’) and (3’’):
(3’) [1] <ashna> hi jatt
[4] <Jatt> ashna: hello?
[6] <ashna> how are u jatt
[9] <Jatt> ashna: do we know eachother?. I’m ok how are you
[14] <ashna> jatt no we don’t know each other, i fine
[15] <Jatt> ashna: where r ya from?

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
254 Susan C. Herring

(3’’) [3] <Dave-G> kally i was only joking around


[5] <kally> dave-g it was funny
[8] <Dave-G> kally you da woman!
[12] <kally> dave-g good stuff:)
Determining which turns relate to which is facilitated by the fact that chat users
often identify the intended addressee by name (in this case, their IRC “nick”),
a practice termed “addressivity” by Werry (1996). Examples similar to (3) and
(4) above could also be cited from the MUD corpus.
Of course, participants in the heat of synchronous CMC do not have the same
leisure to study the transcripts, weed out the irrelevant messages, and consciously
reconstruct the intended relations between messages that CMC analysts do. Re-
marks made by inexperienced users in the course of IRC and MUD exchanges at-
test to the level of confusion (and sometimes frustration) that they feel in active
chat environments. Thus a participant in a fragmented exchange on the IRC chan-
nel #france asked plaintively:

(5) <Youp> bon, alors, qu’est-ce qu’on disait de bien deja en ce moment?
[<Youp> right, then, what was it we were talking about again here?]

and 22 messages later:


(6) <Youp> bon, on va faire un concours: le premier qui dit qqchose
d’intelligent! ca va etre dur! :)
[<Youp> ok, we’re going to have a contest: the first one who says sthg
intelligent (wins)! that’s going to be hard! :) ]

Similarly, American students on LinguaMOO, in response to their teacher’s ques-


tion: “Can two or more conversations take place effectively [in a MUD]?”, gave
the following responses:

(7) 298 Seinfeld says, “No”


300 Marsha’s–Guest exclaims, “multiply threads BADD!”
306 Ninja says, “Multiple threads. I can’t even keep up with this one.”
312 limbo asks, “can you really have a productive conversation with this
many people?”
313 Spitfire says, “This isn’t a thread – this is a free-for-all.”
314 Stubs says, “CAN ANYONE READ ALL THAT IS BEING SAID … I
THINK THAT THAT IS IMPORTANT”
321 Eric–Richard says, “I think my c-cortex is in overload.”
325 Marsha’s–Guest says, “I think its juusst chaos”
347 Spitfire says, “perhaps a good idea would be to direct specific
conversations to different rooms so that you don’t get interrupted by
other conversations.”

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 255

370 Spitfire says, “I feel that my attention is divided into so many different
places that I can’t make any really good points because they will be
lost in the shuffle.”
The lack of coherence caused by disrupted adjacency leads some users to evaluate
computer-mediated conversation in negative terms: as “bad”, a “free-for-all”,
“chaos”, and “not intelligent”.
At first blush, this reaction would seem to support Grice’s and Sperber and Wil-
son’s assertions that conversation without sequential relevance is irrational and/or
non-communicative. Clearly, exchanges that are constantly interrupted by irrel-
evant messages do not obey the principle of sequential relevance; responses in-
tended to be relevant lose their relevant status by appearing too late or with too
many irrelevant turns in between. However, the comments cited above were made
by inexperienced users, who still were operating with expectations of relevance
carried over from spoken conversation, and who found themselves struggling with
the computer medium in an effort to uphold the spoken norm. This situation – what
we might consider the initial stage in the process of “loosening relevance” – is rep-
resented schematically in Figure 2. (Vertical dots indicate that other messages in-
tervene between A and B; jagged lines represent system “noise”.)

Figure 2. The spoken norm of relevance struggling against noise in the CMC medium

The outcome of this struggle is described in the next section.

3.2.2. Loosened relevance: Towards a new norm


Not all synchronous CMC users experience frustration with online conversations.
Most, if they continue to use chat systems, adapt quickly to the kinds of interaction
possible in the medium; such adaptation is sometimes evident in the space of a
single session. This is the case in the LinguaMOO class session described in the
previous section. At the beginning of the session, many students expressed frus-
tration with the class because of the high incidence of irrelevant and “goofy” mess-
ages. Comments such as the following are typical:
(8) 31 Huffman exclaims, “at the rate we are going we will be here until
tomorrow!”
109 Spitfire shakes her head in disgust. This place is crazy.
144 Zaphod Is really confused and would like to get on with class (…)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
256 Susan C. Herring

However, after about an hour into the class, Spitfire types, “I am sort of starting to
understand this craziness”. Subsequently, she and several other students who had
complained previously start to produce non-serious, off-topic messages them-
selves (the text is presented as typed by the participants, preserving typing errors):
(9) (As the teacher is taking roll call online)
146 Delphi tosses a piece of popcorn high into the air over Pheadrus’s
head.
150 mick sings, “Delphi, Delphi Bo, Belphi, Banana, Fana, Fo, Felphi,
Me, My, Mo, Melphi, Delphi …!”
151 Seinfeld catches the popcorn inhis mouth
152 Kristen asks, “Ryan, I’m at Rensselaer Polytechnic Institute in New
York. Where are you?”
154 Dennis disembowels mick with a demonic GRIN.
155 Zaphod tackles Pheadrus to get teh popcorn
159 Effluvia slices Dennis REAL THIN and tiles the floor with the result.
160 Spitfire asks, “Hey, can I get some popcorn too?”
In line [146], Delphi whimsically tosses a piece of virtual popcorn in the air, and
other students play along with this script in lines [151], [155], and [160]. Mick’s
“singing” in line [150] is a nonsensical non sequitur triggered, presumably, by the
appearance of Delphi’s name, and Kristen’s message directed to Ryan is part of a
personal exchange they are carrying out while the teacher is taking roll.
Far from disapproving of such irrelevant behavior, the teacher participates in it
(see Effluvia’s message in line 159), including producing non sequiturs such as line
[68] below in response to criticism of her roll-taking method:
(10) 63 Vixen wonders when roll call will be finished

67 Dennis holds up a BIG sign: Why doesn’t everybody just type:


Dennis holds up a BIG sign: (real name)

68 Effluvia, standing a bit taller and a bit straighter, announces, “I’m


good enough, and I’m smart enough, and, doggone it, people like me.”
Given that this exchange occurs early in the class session, the teacher can be said to
be modeling less-than-optimally relevant responses as appropriate behavior in the
MUD environment.
Messages – such as those in lines [146], [150], [154], [159], and [68] – that re-
late weakly, if at all, to the messages to which they are ostensibly responding illus-
trate what I characterize as “loosened relevance”. Examples of loosened relevance
are found in all of the samples in the two corpora. Consider the following sequence
from the IRC channel #bayarea.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 257

(11) 9 *** Arch- (ademon@netcom10.netcom.com) has joined channel


#bayarea
10 * Arch- yawns … hey folx
(…)
23 <Arch-> I need a nap
24 <Auxilary> mike: will u dress up like toxedo mask for ya?
25 <Arch-> I need to fill my fridge with food
26 <Arch-> I need to get laid
27 <Auxilary> err for me
28 <WendyCA> the way to a woman’s heart is through your credit card
29 <Auxilary> wendy: i got a VISA platinum
30 <Arch-> sorry no tuxedo … nor black cape … although I might be
tempted to dress up as the Moonlight Night
31 <Arch-> Knight
32 <Auxilary> wendy: it has a 25k limit on the card :)
33 <WendyCA> sorry, I require the guys I date to have a personality :)
34 <Arch-> If you get a promotion over a woman it’s favoritism, if a
woman gets a promotion over you it’s equal opertunity.
35 <Auxilary> wendy: u can date my right hand

Arch’s assertion that he needs a nap in line [23] is presumably related to his yawn-
ing in line [10], although there has been no mention of tiredness in the intervening
exchange (which was on the theme of Auxilary’s response to seeing Arch join the
channel). Lines [25] and [26] are much less plausibly related to what came before,
except inasmuch as they are constructed according to the template “I need X” in-
troduced in [23]. Nor does Auxilary’s question about “tuxedo mask” in line [24] re-
late to anything that has been said in the previous discourse, although since Arch
and Auxilary appear to know one another offline, it may refer to knowledge that
they share. In these messages, Arch and Auxilary appear to be searching for a mu-
tually agreeable topic of conversation, a scenario supported by Arch’s cooperative
response to the “tuxedo mask” question in line [30].
At this point, WendyCA intervenes in line [28] with an apparent relevance vi-
olation that can be considered a flouting, since it can be related to the idea of “need-
ing to get laid” via a sequence of logical inferences. (Assuming that Arch is male
and heterosexual, getting laid involves finding a woman and seducing her; women
are seduced through their emotions (their “heart”); women like to have money
spent on them; people spend money using credit cards.) Auxilary’s response in
[30] is relevant: He has a credit card, therefore he can hope to seduce a woman (im-
plied: WendyCA, who is female). The credit limit on the card is also relevant; the
more money he can spend, the more likely the woman is to have sex with him, ac-
cording to the logic established by WendyCA’s assertion. Her response in [33]
stretches the limits of relevance, however, in that she rejects Auxilary as a potential

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
258 Susan C. Herring

sexual partner, despite the fact that he satisfies her previously stated criterion. The
intended implicature appears to be that Auxilary is so sexually undesirable that
even his credit card will not help him. Auxilary’s retort in [35] is also difficult to in-
terpret logically, although it can generally be understood as degrading, to the effect
that WendyCA is not worthy of dating his whole person, and possibly implying that
his right hand is itself degraded, e.g., because it performs acts of masturbation. Fin-
ally, Arch’s remark in line [34] is a non sequitur, related to the previous context
only through the repetition of the word “woman”.
Several points are illustrated by this example. First, all three participants re-
peatedly produce turns that are loosely relevant as a general strategy of interaction.
Loosened relevance is the norm rather than the exception in this sample, which is
typical of the IRC corpus in this respect. Second, loosened relevance can operate
through the mechanism of word association: “the way to a woman’s heart” in [28]
provides the context for “women” getting promotions in the workplace in [34]; “I
need a nap” leads by association to other things that the speaker “needs”. This lexi-
cal repetition is a very simple and superficial form of inter-turn relation, in that it
takes no account of the original speaker’s pragmatic intention. However, it has the
advantage of being easy to achieve under time pressure – one need only scan the
previous messages as they scroll past and respond to whatever word catches one’s
attention. Finally, despite the fact that the conversation jumps around and is some-
what difficult to interpret, no participant complains or expresses frustration with
the interaction. On the contrary, the participants appear to be enjoying themselves,
as evidenced by the use of smiling emoticons at the ends of lines [32] and [33].
This supports the view that loosened relevance is acceptable, and even enjoyable,
in IRC.9
The situation illustrated in example (10) represents the second stage of the
weakening of relevance in synchronous CMC, as represented schematically in Fig-
ure 3. The dotted line indicates weakened relevance.

Figure 3. Loosened relevance as a consequence of system noise in synchronous CMC

Figure 4 takes this process even further. Example (11) shows that loosened rel-
evance is preferentially used even when no system messages intervene, in ex-
changes among a small number of participants (hence with fewer overlapping ex-
changes). That is, loosened relevance is found even in the absence of system noise.
The situation in which loosened relevance has become the default for synchronous
CMC interaction is represented in Figure 4.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 259

Figure 4. Loosened relevance as the norm in synchronous CMC

The next section presents evidence of loosened relevance as a communicative


norm in CMC involving human-machine interaction.

3.2.3. Interaction with non-intentional agents


The weakly relevant and irrelevant responses presented thus far have all been
examples of intentional communication, produced by human beings in interaction
with other human beings. Despite the messages’ apparent lack of relevance, the re-
ceivers can always plausibly maintain that the message senders are intending to
communicate something, even if in some cases it appears to be little more than
that they are present and socially engaged. At first blush, situations of this type
would appear to be unrelated to situations in which humans interact with artificial
intelligence agents. Yet AI programs known as “bots” (short for “robots”) were a
common feature of recreational synchronous CMC environments at the time the
data for this study were collected, performing tasks such as reciting the time and
statistics about the environment to users who query them, and in some cases, par-
ticipating in text-based “conversational” exchanges with users (Foner 1997; Isbell
et al. 2000; Paolillo 2011). In at least one case, that of Julia Bot, a bot’s conver-
sation was realistic enough to fool a human male into thinking the bot was a human
female for a period of several weeks (Turkle 1995).
Relevance figures prominently among the challenges that programmers of AI
agents must face in attempting to create bots with human-like conversational
ability. Given a sufficient word list and/or a repertoire of grammatically well-
formed sentences, a bot must in addition “know” when to use the words and sen-
tences appropriately, a skill that requires natural language (include pragmatic)
understanding. Various solutions have been implemented to make it appear that
the computer program understands the human interlocutor. These range from
simple word association and pattern matching in the ELIZA program (Weizen-
baum 1966), which imitates a psychotherapist (e.g., User: You remind me of my
father. Eliza: Tell me more about your father.), to randomly-matched lists of input
sentences and possible appropriate responses, and even to inputting entire texts
(such as the transcript of the film “The Planet of the Apes”) into the bot’s knowl-
edge base, from which it quotes thematically-coherent sequences on the basis of
keyword matching (Isbell et al. 2000).10 A bot is judged to be human-like in its
conversational abilities to the extent that its responses display appropriate world

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
260 Susan C. Herring

knowledge, creativity, and “make sense” – that is to say, are contextually rel-
evant.
Remarkably, despite the fact that most AI agents are only capable of very shal-
low (if any) true “understanding”, human CMC users often find them convincing
as interlocutors. This is true even when the agents produce irrelevant or margin-
ally-relevant responses. Consider the following exchange that took place on Tiny-
MUD between Julia Bot and Barry, a human male intent on seducing “her”
(example from Turkle 1995: 92):
(12) [1] Barry says, “Are you still holding out on me?”
[2] Julia says, “I mean, have I convinced you I’m a computer, yet?”
[3] Barry says, “I guess you’re real … but I’d still like to get you in my
DEN to run tests on you.”
[4] Julia says, “I live for your approval, Barry.”
[5] Barry says, “I’m so glad to hear that. Why don’t you come over to my
home.”
[6] Julia, “I want to have a child someday.”
[7] Barry says, “What a coincidence. I too wish to make a baby …
someday.”
[8] Julia says, “The date is Tue Jul 21 23:57:31, Barry.”
Julia’s first two messages work as appropriate responses, despite the fact that
line [2] does not make logical sense (it should be “you mean” instead of “I mean”,
and Julia is programmed to attempt to persuade people that she is NOT a com-
puter, not that she is one). Nonetheless, it successfully generates an appropriate
implicature, namely that Julia is not a “computer”. Line [4] is an example of one of
a number of snappy rejoinders Julia has been programmed to produce in response
to “come-on” lines.11 Presumably, in this case, Julia recognizes the input as a
come-on by virtue of its adherence to a pattern of the type “I’d like to (verb) (prep-
osition) you”. The implicature generated is ironic: Julia does not care whether
Barry approves of her.
In contrast, lines [6] and [8] are much less plausibly relevant. They appear to
have been produced as a result of associative keyword matching, one of the sim-
plest means of creating connection between two utterances. Barry’s use of the word
“home” in line [5] triggers a script for Julia that includes “having a child”; Barry’s
“(some)day” in line [7] triggers Julia’s “time” script. Neither of these meanings are
what Barry appears to have intended, and thus Julia’s responses are non sequiturs.
However, Barry takes them to be meaningfully communicative, drawing from
them contextually appropriate implicatures: in the case of [6], that Julia is flirting
with him by talking about having a child, an activity that involves sexual inter-
course; and in the case of [8], that she is joking again on the theme of being a com-
puter. The conversation continued from this point, with Barry never suspecting that
he was interacting with a bot (Turkle 1995).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 261

This example is revealing for what it suggests about norms of relevance in con-
versational interaction on TinyMUD. All of Julia’s responses, strictly speaking, are
relevance violations (although [2] and [4] can be interpreted as floutings), yet her
interaction strategy passes as normal in the context of the MUD. In this respect,
Julia’s conversation resembles that of Arch, Auxilary, and WendyCA in the #bay-
area example.
The parallels between human and bot conversation in MUDs are even more
evident in the following example. The bot in this case, Cobot, resides in the living
room, or central public area, of LambdaMOO, where visitors to the MUD often in-
teract with “him” (example from Isbell et al. 2000: 5).
(13) [1] Guest [to cobot]: Do you know anyone I should send this home
vasectomy kit to?
[2] Sparklebug peers at Guest suspiciously.
[3] cobot [to Guest]: This is a joke in very poor taste.
[4] Guest [to Hfh]: He’s good.
[5] Guest [to Hfh]: Have you been tinkering with him?
[6] Hfh says, “I wish I could take credit, but I think he’s evolving.”
[7] Guest [to cobot]: You’re evolving?
[8] cobot nods to Guest.
[9] cobot says, “CITIZENS: ACIDHORSE DOES NOT EXIST.”
[10] Guest [to cobot]: he does so, I’m sure I’ve seen him
[11] cobot [to Guest]: What does this prove?
[12] Guest [to cobot]: my hovercraft is full of eels
[13] Guest [to Hfh]: He just made perfect sense. damn him.
[14] cobot [to Guest]: Heavens!
This exchange is notable in several respects. First, it gives the impression of being
an extended, coherent interaction in which the robot never fails to respond in a
plausibly human-like manner. Second, although Cobot produces a non sequitur in
line [9] (“Acidhorse does not exist”), Guest responds to it as if it were perfectly ap-
propriate (although he disagrees with the truth of Cobot’s statement) and produces
a non sequitur of his own in line [12] (“my hovercraft is full of eels”12). Indeed,
Guest’s utterances are arguably of more questionable relevance than Cobot’s – had
the bot produced lines [1] and [12], they would no doubt have been considered
pragmatically strange. What, exactly, is Guest implicating by responding “my
hovercraft is full of eels”? Third, and most tellingly, despite the strangeness and
blatant non sequiturs in the sample, Guest evaluates it as making “perfect sense”.
I submit that it makes sense especially in the context of a social MUD, where loo-
sened relevance is the norm, and where similar human-human conversations take
place on a regular basis.
How does Cobot produce relevant responses, surpassing even some human par-
ticipants in its apparent ability to do so? The bot appears to make use of more soph-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
262 Susan C. Herring

isticated mechanisms than syntactic pattern matching (in order, for example, to de-
termine that the second part of Guest’s utterance in line [10] is intended as “proof”
of the assertion in the first part). However, simple word mapping could account for
how it “knows” that any utterance containing the word “vasectomy” is a joke, and
for why it responds “Heavens!” to the profane expression “damn him”. In this re-
spect, Cobot shares similarities with Julia and with human CMC users who make
use of word association to create the appearance of relevance. Both bots and hu-
mans do so for reasons of simplicity: Word association is easy to program, and it is
easy for human users to manage even when they are cognitively overloaded with
confusing message displays, in that no deeper pragmatic understanding is required
of the intended meaning of the utterance being responded to. Thus bots’ “success”
is relative to humans’ “failure” – bots appear to be relevant, at least in part, because
humans fail to be optimally relevant (cf. Foner 1997). Synchronous, text-based
CMC environments, it would seem, lower the standards for relevance, effectively
narrowing the gap in performance between humans and machines.

4. Discussion

In the previous sections, I argued that a causal link exists between two phenomena
in synchronous CMC that have previously been considered unrelated: (a) a ten-
dency for disrupted adjacency of logically-related messages (Garcia and Jacobs
1999; Herring 1999) and (b) a tendency for users to produce fanciful (and digress-
ive) utterances (e.g., Danet et al. 1997; Herring and Nix 1997). I propose that a lack
of sequential relevance characterizes both phenomena, and that the system con-
straints that cause (a) lead to (b), which is then adopted by synchronous CMC users
in some environments as a communicative norm, as evidenced especially by users’
evaluation of bot conversation as human-like and coherent. Recreational CMC is
especially prone to exploiting loosened relevance for humorous and playful effect,
but as the examples from the LinguaMOO class show, relevance breakdowns occur
and may be exploited for play even in pedagogical chat contexts (see also Colomb
and Simutis 1996). Moreover, while the examples analyzed in this chapter are of
synchronous multiparty chat, disrupted adjacency occurs in other CMC modes that
share the properties of sequential posting and 1-way message transmission, includ-
ing dyadic chat (such as instant messaging) and asynchronous discussion forums
(Herring 1999). However, in contexts where the goals are information focused and
the communicative dynamics are serious, loosened relevance may not be tolerated
or exploited; rather, compensatory strategies may be employed to neutralize its po-
tentially disruptive effects, as the research surveyed in section 2.2 suggests.
Those effects can be attributed directly to properties of the medium. Multi-par-
ticipant, 1-way CMC systems place demands on users’ attention and understand-
ing. In synchronous CMC, in addition, there are time and typing pressures that ad-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 263

versely affect the complexity of message production (Ko 1996). These factors tend
to result in superficial connections across messages, e.g., involving use of simple
cohesive strategies such as question-and-answer adjacency pairs and lexical repeti-
tion. Deep coherence that involves complex inferencing is difficult to sustain,
especially when multiple interactions are going on simultaneously and equally
“loudly” from the perspective of the user. It follows from this that synchronous
text-based CMC is not ideally suited for purposes that involve sustained cross-turn
coherence. Conversely, it appears to be well-suited for creative idea generation, re-
laxation and fun, and for stimulating interaction among people who might not in-
teract otherwise.
If this analysis is correct, it challenges prior characterizations of conversa-
tionalists as, by default, aiming to be “optimally relevant” (Sperber and Wilson
1986). CMC users who produce strings of non sequiturs do not appear to be aiming
to be optimally relevant or even necessarily relevant at all, so much as aiming to
participate in phatic social exchange with (and possibly to be considered pro-
vocative, clever, entertaining, and so forth by) other users. That is, in contrast to
Yus’s (2003) analysis of joking as relevant but not necessarily cooperative, play
with loosened relevance in recreational chat rooms appears to be socially cooper-
ative but not necessarily relevant.
Of course, similar behavior sometimes takes place off the Internet, as for
example in informal, playful social interaction among friends (Chiaro 1992), in
which the requirement to be optimally relevant is relaxed. Dispensations of opti-
mal relevance as mentioned by Sperber and Wilson (1986) – in the pub with
friends, talking to a servant – reflect alternative, context-specific norms of com-
munication. Loosened relevance in recreational CMC can be considered a context-
specific norm that grants a similar dispensation, allowing relevance violations even
when turn adjacency is not disrupted. The difference is that in multi-participant
chat, technological pressures limit interlocutors’ choices. The creative play that
arises from loosened relevance online can be viewed as users’ “making the best” of
what is in essence a limited communication medium – making it, in Walther’s
(1996) word, “hyperpersonal” – or more socially desirable even than face-to-face
communication – by optimizing the behaviors it affords.

5. Conclusion and future outlook

Modality of communication makes a difference insofar as relevance is concerned.


Whereas optimal relevance may be the ideal for spoken conversation, it is difficult
to achieve in computer chat, to the point where experienced users may no longer
aim for it. Rather, the computer medium makes available different possibilities
which can be exploited for different pragmatic effects, and which give rise to
different values about what constitutes “ideal conversation” (e.g., “creativity”,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
264 Susan C. Herring

“multiplicity”, “simultaneity”). The analysis presented in this chapter suggests that


if the future of human communication were to depend on computer chat, relevance
could continue to decline in importance.
For theorists such as Grice and Sperber and Wilson, this is tantamount to say-
ing that meaningful communication itself would be threatened. Indeed, the age is
already upon us when humans communicate with computer programs and believe
they are talking to other humans, and when bot-to-bot conversations can take place
without the presence of humans. Conversation involving non-intentional agents
raises even more troubling prospects for the notion of relevance than does syn-
chronous CMC and deserves to be the subject of future investigation. Meanwhile,
multiparty chat is only one mode of CMC among many, and it is declining in use
(Madden 2005), while instant messaging, text messaging, and social network
sites – all environments that support dyadic interaction – have become more popu-
lar, especially among young people (Pew Internet & American Life Project 2010).
At the same time, new communication tools are being developed (e.g., Fono and
Baeker 2006) that give users more feedback and control over turn-taking, thread-
ing (formally indicating that a message is a response to a particular prior message),
and participant tracking, affordances that should reduce the incidence of disrupted
adjacency and thus of unintended relevance violations. It is a question for future
research whether CMC that incorporates these affordances will be as playful or
humorous.

Notes

1. On textual CMC as conversation, see Herring (2010).


2. It should be noted that Lam and Mackiewicz (2007) and Örnberg Berglund (2009) do not
equate disrupted adjacency with incoherence. For these researchers, incoherence only
exists if the communication gives rise to misunderstanding among participants.
3. Yus (2003) invokes Sperber and Wilson’s (1986) Relevance Theory as an alternative ex-
planation for how joking works. Specifically, he argues that “a mental search for an op-
timally relevant interpretation also covers the processing of humorous discourses and the
derivation of humorous effects” (1298) and that joking thus observes Sperber and Wil-
son’s “relevance principle” even if it is not “cooperative” in Grice’s (1975) sense.
4. For further information about IRC culture and language, see Danet et al. (1997), Reid
(1991), Werry (1996), and Paolillo and Zelenkauskaite (this volume).
5. For more detailed information about MUD culture and communication, see Cherny
(1999), Reid (1994), Turkle (1995), and Paolillo and Zelenkauskaite (this volume).
6. All of the IRC data were obtained from the EFNet network.
7. The abbreviated Punjabi greeting ssa, or sat siri akal (lit. ‘God is truth’), means ‘hello’.
8. At the time this sample was logged, over 200 users were present in the #chatzone channel.
9. Additional evidence in support of this view includes the use of playful non sequiturs by
the owners of TinyMUD at an otherwise formal, serious meeting about the MUD’s future
direction.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 265

10. In more recent AI research, machine learning algorithms have also been employed to
enable agents to adapt their behavior (“learn”) in response to positive or negative rein-
forcement (e.g., Isbell, Shelton, Kearns, Singh, and Stone 2001).
11. Newer AI agents, such as Apple’s Siri, are similarly programmed with various snappy
retorts to sexual come-ons, which are received often by agents with female personae.
A particularly clever example is the following (retrieved November 4, 2011 from
http://shitthatsirisays.tumblr.com/page/10):
User: Talk dirty to me.
Siri: The carpet needs vacuuming.
Siri’s response is ironically self-referential: It appears to be a non sequitur produced as a
result of an error in lexical mapping of the sort that AI agents often make. In fact it is
pragmatically relevant (via the inference of “rejection” that is generated by flouting the
relevance maxim). This is an example of what Foner (1997: 125) calls “clever but brute-
force programming”, in which an utterance is pre-programmed as a whole in response to
a specific, recurring prompt (e.g., “talk dirty”).
12. This line is from a Monty Python television sketch circa 1970 in which a Hungarian
tourist attempts to use a maliciously-written English phrasebook to make a purchase
from a tobacconist (Wikipedia 2011).

References

Attardo, Salvatore
1994 Linguistic Theories of Humor. Berlin: Mouton de Gruyter.
Brown, Gillian and George Yule
1983 Discourse Analysis. Cambridge, UK: Cambridge University Press.
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford: CSLI.
Chiaro, Delia
1992 The Language of Jokes: Analysing Verbal Play. London: Routledge.
Colomb, Gregory and Joyce Simutis
1996 Visible conversation and academic inquiry: CMC in a culturally diverse class-
room. In: Susan C. Herring (ed.), Computer-Mediated Communication: Lin-
guistic, Social, and Cross-Cultural Perspectives, 203–222. Amsterdam/Phil-
adelphia: John Benjamins.
Danet, Brenda
2001 Cyberpl@y: Communicating Online. London: Berg.
Danet, Brenda, Lucia Ruedenberg-Wright, and Yehudit Rosenbaum-Tamari
1997 Smoking dope at a virtual party: Writing, play and performance on Internet
Relay Chat. Journal of Computer-Mediated Communication 2(4).
http://onlinelibrary.wiley.com.ezproxy.lib.indiana.edu/doi/10.11 11/j.1083–
6101.1997.tb00195.x/full
Foner, Leonard N.
1997 Entertaining agents: A sociological case study. In: Proceedings of the First In-
ternational Conference on Autonomous Agents.
http://dl.acm.org.ezproxy.lib.indiana.edu/citation.cfm?id=267658.267684

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
266 Susan C. Herring

Fono, David and Ron Baecker


2006 Structuring and supporting persistent chat conversations. In: Proceedings of
the 2006 ACM Conference on Computer Supported Cooperative Work. New
York: ACM.
Garcia, Angela and Jennifer Jacobs
1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer mediated communication. Research on Language and So-
cial Interaction 32(4): 337–367.
Grice, H. Paul
1975 Logic and conversation. Syntax and Semantics 3: Speech Acts, in: Peter Cole
and Jerry L. Morgan (eds.), 41–58. New York: Academic Press.
Halliday, M. A. K. and Ruqaya Hassan
1976 Cohesion in English. London: Longman.
Herring, Susan C.
1997 Humor that binds: Joking and coherence in Internet Relay Chat. Paper pres-
ented at the International Society for Humor Studies conference, University of
Oklahoma, July 13.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2010 Computer-mediated conversation: Introduction and overview. Language@In-
ternet 7, article 2. http://www.languageatinternet.org/articles/2010/2801
Herring, Susan C. and Carole Nix
1997 Is “serious chat” an oxymoron? Academic vs. social uses of Internet Relay
Chat. Paper presented at the American Association of Applied Linguistics an-
nual conference, Orlando, Florida, March 11.
Ho, Chia-Hua and Karen Swan
2007 Evaluating online conversation in an asynchronous learning environment: An
application of Grice’s Cooperative Principle. Internet and Higher Education
10: 3–14.
Isbell, Charles Lee, Michael Kearns, Dave Kormann, Satinder Singh, and Peter Stone
2000 Cobot in LambdaMOO: A social statistics agent. In: Proceedings of the Ameri-
can Association for Artificial Intelligence 2000.
http://www.aaai.org/Papers/AAAI/2000/AAAI00–006.pdf
Isbell, Charles, Christian R. Shelton, Michael Kearns, Satinder Singh, and Peter Stone
2001 A social reinforcement learning agent. In: AGENTS’01: Proceedings of the
Fifth International Conference on Autonomous Agents. New York: ACM.
Ko, Kwang-Kyu
1996 Structural characteristics of computer-mediated language: A comparative
analysis of InterChange discourse. Electronic Journal of Communication 6(3).
http://www.cios.org/EJCPUBLIC/006/3/006315.HTML
Lam, Chris and Jo Mackiewicz
2007 A case study of coherence in workplace instant messaging. In: Proceedings of
the International Professional Communication Conference (IPCC) 2007.
http://www.iit.edu/~lamchri/documents/IPCC_2007-jm-7–24–07.pdf

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
Relevance in computer-mediated conversation 267

Madden, Mary
2005 New demographic info and activities data. Pew Internet & American Life Pro-
ject. http://www.pewinternet.org/Commentary/2005/May/
New-Demographic-Info-and-Activities-Data.aspx
McCann, C. Douglas and Tory E. Higgins
1992 Personal and contextual factors in communication: A review of the “communi-
cation game”. In: Gün R. Semin and Klaus Fiedler (eds.), Language, Interac-
tion, and Social Cognition, 144–172. Newbury Park, CA: Sage.
McCarthy, John C., Peter C. Wright, and Andrew F. Monk
1992 Coherence in text-based electronic conferencing: Coupling text and content.
Journal of Language and Social Psychology 11: 267–277.
Nunan, David
1993 Introducing Discourse Analysis. Harmondsworth, UK: Penguin.
Örnberg Berglund, Therese
2009 Disrupted turn adjacency and coherence maintenance in Instant Messaging
conversations. Language@Internet 6, article 2.
http://www.languageatinternet.org/articles/2009/2106/Berglund.pdf
Paolillo, John C.
2011 Conversational codeswitching on Usenet and Internet Relay Chat. Lan-
guage@Internet 8, article 3.
http://www.languageatinternet.org/articles/2011/Paolillo
Pew Internet & American Life Project
2010 Trend data for teens. Pew Internet & American Life Project.
http://pewinternet.org/Trend-Data-for-Teens/Usage-Over-Time.aspx
Reid, Elizabeth M.
1991 Electropolis: Communication and community on Internet Relay Chat. Senior
Honours thesis, University of Melbourne, Australia.
http://www.ee.mu.oz.au/papers/emr/index.html
Reid, Elizabeth M.
1994 Cultural formations in text-based virtual realities. Master’s thesis, University
of Melbourne, Australia. http://www.ee.mu.oz.au/papers/emr/index.html
Schwarz, Norbert
1996 Cognition and Communication: Judgmental Biases, Research Methods and the
Logic of Conversation. Hillsdale, NJ: Erlbaum.
Sperber, Dan and Dierdre Wilson
1986 Relevance: Communication and Cognition. Cambridge, MA: Harvard Univer-
sity Press.
Turkle, Sherry
1995 Life on the Screen. New York: Simon & Schuster.
Walther, Joseph B.
1996 Computer-mediated communication: Impersonal, interpersonal, and hyperper-
sonal interaction. Communication Research 23(1): 3–43.
Weizenbaum, Joshua
1966 ELIZA – A computer program for the study of natural language commu-
nication between man and machine. Communications of the ACM 9(1):
36–45.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
268 Susan C. Herring

Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social and Cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
Wikipedia
2011 Dirty Hungarian Phrasebook. http://en.wikipedia.org/wiki/Dirty_Hungarian_
Phrasebook [accessed 7:15 pm EDT, November 3, 2011]
Yus, Francisco
2003 Humor and the search for relevance. Journal of Pragmatics 35: 1295–1331.
Yus, Francisco
2010 Cyberpragmatics: Internet-Mediated Communication in Context. Amsterdam/
Philadelphia: John Benjamins.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:40 PM
11. Performativity in computer-mediated
communication
Tuija Virtanen

1. Introduction

At the heart of pragmatics lies the phenomenon of performativity, manifest in


interlocutors performing acts just by uttering them, or “doing things with words”
(Austin 1962). In text-based computer-mediated communication (CMC), the utter-
ing is a matter of typing in the act, which is thus executed in the “real” world or in
a virtual world under construction. Performatives, i.e., utterances that succeed
in bringing about the intended change in a particular communication situation
through the act that is performed just by uttering/typing it (such as the act of thank-
ing performed by uttering/typing “Thanks!”), have received little attention in on-
line environments, however. An exception is Harrison and Allton’s (this volume)
investigation of apologies in email. Another exception is Cherny (1995), who ex-
plored semi-performative, third-person emotes in a social MUD (multi-user dun-
geon, dimension, or domain); see also Werry (1996) on emotes in IRC (Internet
Relay Chat) and Schlobinski (2001) on a particular verb form used for emoting in
German chat.
The adverb hereby functions as a performative marker, an explicit signal of
performativity. Despite its formal character, hereby also appears on personal web-
sites, discussion boards, and to some extent, in blogs. All of these are informal con-
texts that are very different from hereby’s expected loci in institutional discourse,
such as the language of law, transferred online, and various rituals and ceremonies
taking place in offline circumstances.
CMC provides ample evidence of the much wider notion of performance,
i.e., users performing social action through discourse. This has been dealt with, for
instance, in terms of genre (Giltrow, this volume), narrativity (Georgakopoulou,
this volume), play (see, e.g., Danet 2001; Goddard 2003; Ruedenberg, Danet, and
Rosenbaum-Tamari 1995), and the enactment of scripts of various kinds (Herring
2000, 2001). Rather than performance at large, however, the present chapter
focuses on the phenomenon of performativity in CMC by briefly reviewing
pragmatic literature in this light (sections 2 and 3), discussing previous studies of
CMC-specific performativity (section 4), and presenting a case study of the use of
explicit performatives, including hereby, on informal discussion boards (section
5). The pragmatic functions of performative constructions in computer-mediated
discourse strongly suggest a need to develop performative theory to incorporate
dimensions of ontological pluralism (Sbisà 2007) fully, in order to come to grips

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
270 Tuija Virtanen

with the existence of several different (virtual) realities to which users adapt and
which they help construct, alter, and/or maintain through CMC.

2. Performatives

Austin (1962) initially distinguished between saying and doing in terms of con-
statives and performatives. While constative utterances, such as The Pepys Library
is in Magdalene College, can be defined simply in terms of their logical properties
as being either true or false, a separate distinction altogether is needed for per-
formative utterances, that of their relative felicity in the communication situation
in which they are put to use. When the chair of a meeting utters the words the meet-
ing is (hereby) adjourned, the adjournment is thereby executed. But if a catering
person bringing coffee, tea, and delicious cakes were to enter the meeting room
uttering these same words, there might indeed be a (happy) silence, but the felicity
conditions would not be right for the utterance to function as a “happy” per-
formative and thus to succeed in (officially) adjourning the meeting. Performatives
thus consist of two simultaneous and interrelated acts: the locutionary act, or the
words being spoken, and the illocutionary act, or the conventional force of those
words in the communicative situation. Austin’s theoretical distinction between
constatives and performatives served its purpose of demonstrating that “every
genuine speech act is both [the locutionary and the illocutionary act]”, and that, as
in the first example above, “stating is only one among very numerous speech acts
of the illocutionary class” (1962: 146).
Austin (1962: 115–116) bound up the illocutionary act with three different
kinds of effects: (i) securing its uptake; (ii) producing conventional effect; and (iii)
inviting a response. Uptake is a precondition for the conventional effect of the illo-
cutionary act to occur. Hence, for a successful warning to have the intended effect,
the audience must hear it and take it to be a warning. In text-based CMC, uptake
may be relatively stable as long as users do not ignore or delete messages without
reading. Second, Austin distinguished the conventional illocutionary act from the
very different perlocutionary act, which is achieved by the producer of the per-
formative additionally or entirely by non-conventional means, perhaps uninten-
tionally. Examples include convincing, persuading, and getting someone to obey
or believe (Austin 1962: 117–118; see also the discussion in Sbisà 2009). Students
of pragmatics have since worried about the status of the indeterminate perlocution,
which may be (un)intentional and essentially resides in the domain of situated dis-
course interpretation; hence, discussions in the literature of perlocutionary acts and
effects may involve two different concepts (for an overview, see, e.g., Sbisà 2007,
2009). Third, Austin stated that performatives may invite responses in the form of
another particular (speech) act, e.g., offering – acceptance. While user intentions
are beyond access, responses to performatives in text-based CMC constitute evi-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 271

dence of their conventional and non-conventional interpretations in a particular


communicative situation.
Sbisà (2009) singles out two different foci in the history of speech act theory:
the Austinian tradition of viewing speech acts as socially conditioned conventional
action which affects context, and Searle’s framework based on (individual and col-
lective) intentionality in language producers’ minds.
Searle (1969) focused on the illocutionary force and propositional content of
the illocutionary act, extending the analysis to utterances simultaneously perform-
ing several different speech acts, all of which may be intended. This work antici-
pated his later (1975) distinction between direct and indirect speech acts. It is a
matter of discussion to what extent performatives can be implicit while still retain-
ing an exclusive raison d’être as a theoretical concept. Searle (2001: 86–87) pins
down his use of the term performative as follows:
[S]ome illocutionary acts can be performed by uttering a sentence containing an ex-
pression that names the type of speech act, as in for example, “I order you to leave the
room”. These utterances, and only these, are correctly described as performative utter-
ances. On my usage, the only performatives are what Austin called “explicit per-
formatives”. Thus, though every utterance is indeed a performance, only a very restricted
class are performatives.
Conventional use of performatives can include the explicit performative marker
hereby. Providing the paraphrase ‘by-this-here-very-utterance’, Searle (2001: 102)
emphasizes the marker’s two parts: (i) here as the self-referential part, and (ii) by
as the executive part. The verb naming the act in a performative utterance is in the
dramatic present, indicating time that is simultaneous with the utterance (Searle
2001: 106). However, it is important to note that there is no particular semantic
class of performative verbs, even though some verbs such as lie or hint are not
used performatively (just saying I hereby lie will not make the act of lying happen).
The same is true of some of the verbs associated with Austin’s examples of perlo-
cutionary acts, such as convince or persuade. The communicative success of a per-
formative arises from an agreement based on “human conventions, rules, and in-
stitutions that enable certain utterances to function to create the state of affairs
represented in the propositional content of the utterance” (Searle 2001: 104–105).
Performative acts, Searle states, create linguistic and extra-linguistic “facts”;
compare, in this light, (i) promising, which creates its promise, a linguistic fact,
with (ii) adjourning a meeting, which creates an adjournment, an extra-linguistic
fact. The source of authority is institutionalized – yet, “[l]anguage itself is an
institution, and it is sufficient to empower people to perform such [linguistic] dec-
larations as promising to come and see someone or ordering someone to leave
the room” (Searle 2001: 100). Thus, by filling in, signing, dating, and handing in to
the appropriate administrative body the form ending as in (1), below, one simulta-
neously submits an application (an extra-linguistic fact) and makes a promise
(a linguistic fact), both of which will be legally binding.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
272 Tuija Virtanen

(1) I hereby apply for the privilege of admission to Cambridge University Library.
I hereby solemnly promise not to use this privilege to the injury either of the
Library or the University of Cambridge.
Signed: __________________________ Date: __________________________
In this example, as elsewhere, performatives contribute to changing things as a
result of the speech act. Having performed the actions of applying and promising,
the applicant’s reality will no longer be quite the same. The receiving body of these
performatives, the library, will be in for a contextual change, too, through the
uptake of the two speech acts, and a response acknowledging their conventional
effects can be expected.
Despite its early interest in the (imagined) speech situation, speech act theory
has often had to give way to other kinds of approaches to discourse which place
greater weight on dialogicality and the dynamism of text and context. However, the
creation of social and institutional facts through performatives has been the con-
cern of scholars working, for instance, on cross-cultural communication (e.g.,
Blum-Kulka, House, and Kasper 1989), professional discourse (e.g., Kurzon 1986
on legal performatives), and the language of (semi-)public ritual and various cer-
emonies (e.g., Lakoff 2000 on public apology). We can, as Sbisà (2009: 242) ad-
vocates, “force the theory to evolve by confronting it with unforeseen phenom-
ena”. Section 4 is devoted to the truly unforeseen phenomenon of standardized
third-person social action found in CMC of many kinds, raising the issue of the li-
mits of performative theory. And unforeseen or not, the appearance of explicit first-
person performatives including hereby in informal computer-mediated discourse,
in turn, strongly suggests the need for full incorporation of more dimensions into
the theory, as will be argued in section 5. Performativity in CMC is predominantly
a matter of virtual realities, even though performatives may also change things in
users’ “real” world. Section 3 introduces some of the concepts related to the human
ability to create and cope with worlds of different kinds.

3. Etiolated performatives

Analysis of text and discourse takes into account evidence of the construction of
various text worlds and universes of discourse (see, e.g., Enkvist 1989). Interpre-
ting online performativity necessitates investigating interrelated ongoing discur-
sive activities, projection of user identities, and the creation, maintenance, and/or
alteration of virtual realities and communities. An application of performative the-
ory will thus have to grapple with what Austin (1962: 22) called the “doctrine of
the etiolations of language”, that is, language being “in special ways – intelligibly –
used not seriously, but in ways parasitic upon its normal use”. Etiolation, for Aus-
tin, might affect several features of the speech act, such as authority in quotation,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 273

address in soliloquy, authority and address in acting, sense in joking, and reference
in fiction; yet, none of these etiolations would turn the speech act into a non-act.
Sbisà (2007: 471) points out that “an analysis of aetiolation as shifting or weaken-
ing features of the whole speech act might suggest to admit of fictional or virtual
entities, which exist but, so to say, in weakened ways”.
Austin’s discussion of etiolations of language has served as an impetus to the-
ory construction, not only in linguistics and philosophy, but also in the study of lit-
erature, performing arts, and culture. As Parker and Kosofsky Sedwick (2007: 202)
observe in their overview of performance studies, “[m]uch … has long since been
made of Austin’s parasite, which has gone on to enjoy a distinguished career in lit-
erary theory and criticism”. Austin’s own focus was explicitly on “performative ut-
terances, felicitous or not, … issued in ordinary circumstances” (Austin 1962: 22),
and his decision to exclude etiolations of language from the analysis does not mean
that investigations of such matters cannot contribute to theory construction beyond
that work. Quite on the contrary, the CMC evidence presented below warrants an
expansion of performative theory to incorporate other ways of using language, in
addition to what Austin regarded as the default, ordinary one.
At this point, a note on the “parasitic” nature of etiolations of language in CMC
is in order. CMC does not constitute etiolation of language in itself; to users it may
be as “normal”, “ordinary”, and “serious” as much of their use of language offline,
and as such it is in no way parasitic upon an offline host of speech or writing. How-
ever, CMC is a rich source of pragmatic phenomena that can be analysed in terms
of performativity, related to virtual realities under construction. It is these phenom-
ena that may involve situated etiolations of particular aspects of conventional per-
formatives, resulting in “special” use of speech acts.
Students of humour have discussed switches and blends between modes of
“bona fide” and “non-bona fide” communication (Attardo 1994; Raskin 1985).
Bona fide communication refers to “serious” discourse that conforms to Grice’s
(1975) cooperative principle. Non-bona fide modes of communication include, for
instance, lying, play acting, and joke telling, which vary in terms of social accept-
ance and expectations relating to particular situational and socio-cultural contexts.
Danet (2001) characterizes CMC as an inherently playful medium. The CMC
modes explored below manifest playfulness, generally involving mixing of bona
fide and non-bona fide communication, and users also engage in online play.
Applying the notion of etiolations of language helps to account for the conven-
tionalized use of CMC-specific third-person action and the repertoire of verbs that
can be put to performative use in virtual worlds, discussed in section 4, as well as
the highly “parasitic” explicit performatives, incorporating the formal marker
hereby, that occur in informal computer-mediated discourse, which are the concern
of section 5. In the examples presented below, performativity relates to the con-
struction of virtual worlds, even though users’ “real” world may also be affected
occasionally. The predominance of virtual reality is exhibited in the need, in these

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
274 Tuija Virtanen

CMC environments, for the initialism (i.e., consisting of the initial letters of the ex-
pression) irl ‘in real life’, which constitutes the marked alternative against the un-
marked virtual life. Cherny (1995) shows examples of this abbreviation in contexts
of confusion about the frame of reference, and she discusses the intertwined rela-
tionship of virtual realities and the real world, as constructed and mediated through
online discourse.

4. Performativity in computer-mediated communication:


Third-person action

Text-based CMC, by its nature, is inherently performative, in that all actions come
into being because they are typed in, and social action is constituted almost entirely
by discourse. Herring (2004: 339) notes that it is quite possible to lose sight of this
fundamental fact; yet, “language is doing, in the truest performative sense, on the
Internet, where physical bodies (and their actions) are technically lacking”. This
section deals with what Herring (in press) calls a “syntactic innovation”: third-per-
son singular present tense utterances through which users perform social action in
text-based CMC environments.
Herring (in press) makes a distinction between two kinds of performative ut-
terances in CMC: “emotes” and “performative predications”. The first of these take
place through a pre-programmed command in online game environments that
allows users to “emote” in the third person, “to perform a social action by logging a
description of that action into a chat window” (Herring, in press). Hence, in (2)
below, from Cherny (1995), lynn waves appears on the screen when the user “lynn”
types /waves. In contrast to such virtual action, action in the real world is rather dif-
ferent: lynn waving in front of the screen is not (necessarily) what is understood to
be the case with emotes such as the one in (2). Herring observes that emotes are
still in use in game environments, and a default prompt inviting similar third-per-
son utterances was, until recently, available for status updates in Facebook. Simp-
son (this volume) presents examples of third-person action and “thinks” bubbles in
synchronous text-based chats.
The popularity of emoting has subsequently given rise in social chat environ-
ments to another type of performative utterance, i.e., performative predications,
which have spread across a number of CMC modes. Unlike emotes, these are typed
out in their entirety by users and often set off by asterisks and other typographic
cues. Herring includes in the category of performative predications a wide reper-
toire of stand-alone utterances: They can be inflected or uninflected, e.g.,
<grin(s)>; represent change not only through virtual actions but also virtual states,
e.g., *confused*; and include vocalizations, such as *sigh(s)* or *lol(s)*, as in-
flected nouns or verbs. In view of the conventionalization process it is of interest to
note the development of the acronym (i.e., a pronounceable initialism) lol ‘laugh-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 275

ing (or: laughs) out loud’, into a noun or verb yielding new spellings (lawl, lulz)
and playful representations of laughter (lololol).
An early study by Cherny (1995) focuses on the use of emotes, third-person
simulated action through the standardized activity type function available to users
in a social MUD. Participants engage in social action in the virtual reality or in the
real world by referring to themselves and others in the third person. In MUDs, the
“emote” mode is distinct from the “say” mode, each of which has a separate com-
mand, as in the following example from Cherny (1995).
(2) lynn says [to Tom], “hi there”
lynn waves.
As evidence of the multifaceted use of the command, Cherny (1995) distin-
guishes five types of emotes in her data: (i) conventional action (lynn waves), (ii)
back-channeling (lynn nods), (iii) joking by-play (lynn hands some prepositions to
Tom), (iv) narration (lynn packs for her trip), and (v) exposition (lynn hated the
film). The first three bring about action in the virtual reality, while the last two con-
vey background information concerning the real world and the users’ mental
states. Apart from the last type of emotes, which manifests tense variation, the
tense is always the simple present. As stated in section 2, classic performative
speech acts employ what Searle (2001: 106) calls the dramatic present, this special
tense marking events that are “to be construed as instantaneous with the utterance”.
The simple present of third-person emotes is no different: The time of the action is
understood to be simultaneous with its appearance on the screen. In contrast, dy-
namic situations viewed as being in progress at the moment of speaking or writing
would be expected to manifest the present progressive, e.g., lynn is waving.
Type (i)-(iii) emotes indicate action in the virtual world that takes place by typ-
ing an utterance in which the verb, in the dramatic present, is both self-referential
and executive (cf. lynn hereby waves/nods/hands some prepositions to Tom) and, it
is assumed, non-cancellable. Kolko (1995) also addresses the issue of non-denia-
bility in her analysis of a harassing performative utterance that the victim tries to
cancel. Herring (2001: 623) argues that online discussions of what particular act
was enacted in a given virtual reality show that such actions can be performative,
as they count as acts solely by virtue of having been typed in.
Unlike in speech, where a warning shouted out to others in a gale may not be
heard, uptake is relatively regular in CMC due to the written record. It is not possible
to access intentionality (unless explicitly displayed by an interlocutor, for instance,
through self-repair), but responses provide analysts with an important source of
information concerning users’ interpretations of the (conventional) illocutionary
force and the situated perlocutionary effects of performatives. Responses – preferred
or dispreferred – are usual in interactional modes of CMC. Yet, they are not neces-
sary for uptake to have occurred; textual silence, too, can be revelatory of the effects
of a particular performative on the virtual world under construction.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
276 Tuija Virtanen

Cherny concludes that type (i)-(iii) emotes appear to be similar to per-


formatives, even though a simple performative analysis for all emotes is not, in her
interpretation, sufficient. She argues that some emotes function at least as “semi-
performatives” if a “perspectival distance” is allowed between the virtual action
executed by typing it and the third-person utterance in the simple present referring
to the users’ characters in the virtual reality, e.g., Tom and lynn reenact the event.
This distance between the description of the action and the action that the utterance
performs is not present in the first person performatives found in traditional offline
communication. An analysis allowing for such a perspectival distance would,
Cherny points out, also profitably account for the felicity of the instances of emotes
in the virtual context that include verbs such as lie or boast, e.g., (in the emote
mode) Ray lies, “I’m awake!” These verbs cannot function performatively in the
first person in speech, nor can they in the say mode of Cherny’s MUD data; users
can emote lying but not lie by saying that they are lying.
Herring (2000) presents examples of scripts (cf. Schank and Abelson 1977) en-
acted through computer-mediated communication in Internet Relay Chat, where
the performance partly relies on the emote function, indicated by an asterisk in the
IRC exchange below. Herring (2001, 2003) identifies factors that reveal partici-
pants’ demographic characteristics online, even in otherwise anonymous contexts.
She shows that performing stereotypes related to gender, for instance, is a funda-
mental aspect of participants “doing social life” online.
(3) <Whitelily> Are they getting married for sure now?
<mentat> he wrote her parents a letter asking for her hand in marriage, and they
wrote back, saying they were pleased to welcome him to the family
<Whitelily> That is soooo sweet
*Whitelily gets teary
*Chellie hands Whitelily a tissue
<mentat> you don’t even know them
<Whitelily> So
*Whitelily still thinks it’s sweet
<mentat> k
*Chellie thinks it’s sweet too
*Chellie dabs eyes with tissue
This exchange illustrates the activation and partial enactment of a stereotyped
offline script, according to which American women cry at weddings. Like the mar-
riage, the sequence of events and actions of Whitelily getting teary, Chellie
handing her a tissue, and Chellie dabbing eyes with tissue takes place only in the
virtual world, and are all of them non-cancellable. The performative emote Chellie
hands Whitelily a tissue serves as an acknowledgement of the event of Whitelily
getting teary while also contributing to continued activation of the wedding script.
The second performative emote, Chellie dabs eyes with tissue, constitutes an

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 277

affirming intersubjective act that reinforces the preceding exposition of Chellie’s


thoughts. I would label it an “emote of alignment”: Chellie’s act of dabbing eyes is
iconic with the inferred act of Whitelily dabbing eyes with the tissue that Chellie
just handed her. This is not the only parallelism: Chellie’s intersubjective emote
Chellie thinks it’s sweet too echoes Whitelily’s emote Whitelity still thinks it’s
sweet, placing end-weight on the aligning adverbial too (for stance alignment in
impromptu speech, see, e.g., Du Bois 2007).
Cherny (1995) excluded background emotes of type (iv) and (v) from her dis-
cussion of (semi-)performativity because they were narrations, descriptions, and
expositions of real-world phenomena. She was familiar with the state of the in-
formation in her MUD data as referring to either the real world or some virtual real-
ity. Other users might, however, interpret narrative emotes of type (iv), e.g., lynn
packs for her trip, in performative terms, along the lines of the third-person virtual
action of type (i), e.g., lynn waves, even though actions such as packing are not
“conventionalized” or “ritual” in the way waving is. Type (v) emotes, expositions
of participants’ real world thoughts and feelings, such as lynn hated the film, are
rather different, as this is the only category manifesting tense variation. Arguably,
categorizing third-person expositions of mental states as non-performative back-
ground information profitably applies irrespective of whether they are to be under-
stood as pertaining to the “real” world or to the virtual world at hand. It may not be
expedient to maintain an absolute boundary between what is understood as the
“real” world and the virtual world, as users may be prepared for virtual realities
being or becoming part of their or another interlocutor’s “real” worlds. Yet, they
can also adopt an external perspective on their own character’s emotions and atti-
tudes. Let us consider type (v) emotes in greater detail.
In example (3), above, the emotes Whitelily still thinks it’s sweet and Chellie
thinks it’s sweet too may be assumed to manifest a gap between the users’ perspec-
tives and that of their IRC characters, the users becoming omniscient narrators. This
is different from the perspectival distance present in performative emotes such as
Chellie dabs eyes with tissue, where the user may adopt an external or internal point
of view on the action thus performed in virtual reality. It is particularly noteworthy
that non-performative background emotes tend to include linguistic devices that
serve to separate them from the act of uttering, such as the deictic shift to past time
in Cherny’s example, as well as the metadiscursive concessive connector still in (3),
signaling a development of the argument (Whitelily still thinks it’s sweet), and the
intersubjective aligning adverbial too (Chellie thinks it’s sweet too). Further, Cherny
presents examples of background emotes adopting characteristics of the say mode
in her MUD data, such as second person reference to interlocutors, e.g., Damon
hasn’t, well, met you, lynn (note also the presence of the discourse marker well).
Emotes indicating background information such as a user’s character getting
teary are not performative in any straightforward manner, as they describe an event
rather than set out to perform a volitional act in a traditional sense (unless the fact

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
278 Tuija Virtanen

of getting teary is understood as controllable, willful behaviour). But the virtual


realities constructed through CMC are not necessarily the way the world is
(cf. Searle 2001: 104), and their intersubjective agreements need thus not be on a
par with those offline. In support of this view, as Cherny (1995) observes, emoting
invokes performative interpretations of verbs that cannot function performatively
in the say mode, or offline, such as lie. Herring (in press) adopts an extensive view
of performativity, interpreting emotes as performative regardless of whether they
correspond to actions, events, or states. Similarly, the heterogeneous, highly pro-
ductive category of performative predications, which have evolved from the use of
the emote command into stand-alone, complete utterances that interlocutors type
in and set off by typographic cues from the rest of their messages, may involve
both virtual actions and states. Interpreting thus practically all text-based CMC as
performative, Herring regards Whitelily getting teary in example (3) as a per-
formative act, in the sense of a consciously, willfully created performance in the
script that is being enacted in the virtual reality, and the same is true of the other
emotes in the example (Herring, personal communication).
This view of performativity, essentially pertaining to interlocutors doing
all things in text-based CMC by typing them on a keyboard, is reminiscent of the
distinction in performance studies between two intertwined concepts: performance
and performativity. In (3), performance would concern the interlocutors “making”
a narrative of experience and/or imagination, i.e., one possible script-based nar-
rative rather than others. In contrast, performativity would concern the “doing” of
the narrative, its enactment or execution online, the act of constituting what is re-
ferred to by typing in the words (for discussions of performance and performativity
in relation to offline personal narrative, see Langellier 2003; Peterson and Langel-
lier 2006; for narrativity in CMC, see Georgakopoulou, this volume). Langellier
(2003: 457) argues that “performance needs performativity to comprehend the
constitutive effects of personal narrative”, and “performativity relies upon per-
formance to show itself”. The two separate but highly interdependent phenomena
thus both seem to enter into the picture when all text-based CMC is regarded as
performative.1
Cherny (1994) is devoted to the discussion of gendered emotes in her social
MUD data. Similarly, Herring (2003: 211) draws attention to the presence of
“affectionate actions”, such as *hug(s)*, in IRC exchanges among females, which
also involve expressions of support and appreciation, as well as smiling and
laughter; see example (4) below. (To anticipate, this is also true of the discussion
board interaction among female participants examined in section 5.)
(4) <KikiDoe *huggers* beff to her death hahaah
<Beth_> :)
<Beth_> you guys are so great! *happy sobs*
<KikiDoe> beth dats cause we have you

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 279

The third-person reference is a CMC convention that was embraced early on.
Werry (1996) presents examples of emotes in IRC in which an arrow points back to
the userID. This convention is mimicked in the following performative predi-
cation, from the data to be discussed in section 5.
(5) <----------------- runs to bathroom to look at my stunning new self!!!!
It is of interest to note that utterances may start in the third person and subse-
quently switch to the first person, as in example (5). Herring (in press) relates these
inconsistencies to the systems that prompt third-person emoting, observing that
such utterances are generally “assumed to be unintentional and (at least mildly) in-
felicitous”. The syntactic distance of mentions may be argued to cause inconsist-
ency between the third-person verb and the first-person genitive determiner at the
end of an embedded clause in (5), as well as the clause-final adverbial in *makes
suggestive gestures with my hands and my jackhammer* (from the same source of
data). Such instances seem to point to a fuzzy, or at least flexible, boundary be-
tween the mental configurations of users and user characters.
The phenomenon of third-person action, pre-programmed or typed in by users
as part of their messages, is a fundamental aspect of text-based CMC. Unlike off-
line stage directions in the third person, they are executed upon typing. Users dem-
onstrate a need for emoting by continuing to type in their messages typographically
marked, third-person, present-tense, stand-alone performative predications, across
modes of social CMC, including texting (SMS). Typographic marking can be
conventionalized or elaborate. While what is emoted can also be conventional, it
is, in fact, sometimes quite creative. But popular emotes tend to be used repeatedly,
some abbreviated (e.g., lol), others adapted to the theme of a particular community.
Incidentally, in Baron’s (this volume) Instant Messaging data lol accounds for 90 %
of the abbreviations present. To come to grips with the contributions of emoting to
the construction of virtual realities, performative theory will have to allow for the
third-person reference to a particular user character found in emotes and per-
formative predications.
Furthermore, in addition to acts and activities, broader views of performativity
in CMC include events and states conveyed by emotes and typographically marked
stand-alone predications. These, as well as emoticons (smileys), “supply in-
formation about non-verbal aspects of communication which would have been dis-
cernible if the words had been uttered aloud in a face-to-face encounter” (Danet
2001: 18). However, contextualization cues (Gumperz 1982) such as emoticons,
emotes, and performative predications are generally interpreted as relating to the
states of affairs in a virtual reality under construction, rather than in the physical
world. Studies of emoticons show discrepancies between the indicated thoughts
and feelings and users’ actual facial expressions (Dresner and Herring 2010). Simi-
larly, Cherny (1995) cites evidence that one of the users in her study is not at all
laughing while typing in lol. The need for performative theory to incorporate sev-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
280 Tuija Virtanen

eral different dimensions of language use is also apparent in the next section,
where we turn our attention to playful uses of predominantly first-person explicit
performatives in the “say” mode in informal online discussions.

5. Explicit hereby-performatives in informal online discussions

Explicit performatives incorporating the marker hereby are associated with insti-
tutional discourse and public rituals of various kinds. But such constructions may
also be found in informal text-based CMC, warranting investigations of the moti-
vations behind their use. This section summarizes findings from a study of dis-
cussion board materials disclosing playful, etiolated uses of explicit hereby-per-
formatives, which have a multifaceted impact on the pragmatics of the interaction
at hand (Virtanen, in press). They are labelled “mock performatives” because they
deliberately set out to mimic playfully (parts of) established institutional per-
formatives, usually ones involving a high degree of authority. In such usage, the
formal marker hereby is employed to set off the official flavour of the mediated
institutional performative from the otherwise informal discussion. Unlike the play-
ful emotes and performative predications discussed in the previous section, these
mock performatives do not involve a particular “emote mode” or appear as typo-
graphically marked stand-alone units within messages. Instead, they are simply
(part of) the message.
The mock performatives under investigation were detected in September 2006
by searching for the keyword hereby in all messages across the publicly available
English-language discussion boards on a U.S-based website, where (according to
user profiles) predominantly female participants, of all ages, and mostly of Ameri-
can, Canadian, British, and Australian origin, review beauty products and discuss
makeup, fashion, and the like.2 Instances of the performative marker hereby were
found in 29 threads, originating in five different asynchronous discussion boards
on one and the same website. The data were not collected for purposes of quantifi-
cation; instead, the threads were studied using qualitative discourse-analytic
methods. It should be noted that the pace of interaction on the forums is at times
very rapid, a matter of seconds, rather than minutes, and users typically start typing
their messages directly on the subject line (allowing 100 characters, excluding
spaces), to be continued in the message box if necessary.
Example (6) illustrates a mock performative from the forums. User1 (substitute
for a nickname) expresses unhappiness with the unfortunate consequences of a poll
concerning different nail polishes on the discussion board on makeup, to which
User2 responds by typing an explicit performative construction: I hereby recruit
you to the nail board. User1 immediately posts a reply, vigorously protesting
against the recruitment.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 281

(6) why do i feel the need to get every single nail polish mentioned in that poll? bad
bad poll User1 10:14 PM
– I hereby recruit you to the nail board :P User2 10:15 PM
• noooo! lol, more places to spend my $. I’ll never do my fingernails
though, i hate the feeling User1 10:16 PM
The explicit performative construction appearing in User2’s message is
grounded in authority playfully assumed regarding User1. As it is risky for inter-
locutors to assume authority over others, the performative is followed by a miti-
gating element signaling the onset of play: a smiley with a tongue sticking out. It is
important to note that even in playful use the conventional effect of the per-
formative is there. User2’s act of recruiting User1 to the nail board brings about
non-cancellable change in the virtual reality. This is recognized by User1 in her
emphatic reply, protesting against what has already taken place in the virtual
world. The virtual recruitment is a fait accompli that cannot be denied, only pro-
tested against (see Kolko 1995). User1 expresses the undesirability of its conse-
quences in a playful manner by the lengthening of the vowel in noooo, followed by
an exclamation mark, and the acronym lol. Thus the main effect of User2’s playful
performative is one of bonding.
Interlocutors readily respond to mock performatives by producing same-script
or other-script oriented discourse, as in example (7) below. The abbreviation
SO stands for ‘significant other’, and r/o ‘read on’ indicates that the text typed in
the subject box continues in the message box.
(7) On a break with SO – I deserve a mini-haul … right?? ;-) User3 9:43 PM
– [a series of short responses expressing empathy between 9:43–9:49 PM]
– The very best medicine there is! Who needs men when there’s makeup? :P
User4 9:47 PM
• Ok. I, User5, hereby do declare that any and all problems, breakups,
breaks, r/o arguments, or any other ‘situations’ with any SO be it man or
woman, totally warrant, deserve, and indeed require splurges, hauls and
indulgences of any kind. User5 9:51 PM
y
I second the motion! User6 9:52 PM
y thirded. Motion passes. User7 9:55 PM
y here, here! :D User8 9:53 PM
y SO HELP ME GOD. User9 10:07 PM
y You are CORRECT! :) User10 10:21 PM

The explicit performative construction I, User5, hereby do declare that … con-


tains the declaration promised in its formal beginning: The performance involves the
making of a declaration and the declaration itself. The responses assign User5 roles
originating in several different scripts. The declaration is interpreted as a motion,
which is duly and “loudly” (exclamation mark) seconded and, three minutes later,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
282 Tuija Virtanen

thirded and declared passed. Meanwhile, the exclamation hear, hear! calls atten-
tion to the declaration, the textual cheering here being accompanied by laughter (a
smiley) to convey approval. Much later, 16 minutes after the declaration, User9
“shouts out” (capital letters) the ritual formula so help me God, customary in sol-
emn oaths and familiar to users from U.S. television series and films cast in cour-
troom settings, where witnesses are expected to take an oath to tell the truth ending
in these words. After another 14 minutes, User10 contributes with a simple ac-
knowledgement of the correctness of the declaration, emphatically and with a
smile.
Mock performatives predominantly function as “discourse transformers”, shift-
ing the discourse into a play mode. This allows users to take time off from their
main concerns, the discussion of beauty and fashion, without abandoning them al-
together. The discourse-transforming potential of mock performatives to instigate
or support a play mode in the discussion helps users produce a different frame in
the interaction, in Goffman’s (1974) terms. The play mode (play frame) thus
opened is distinct from the ongoing blend of bona fide and non-bona fide com-
munication that is characteristic of the inherently playful interaction (see Danet
2001).
One instance of the performative marker hereby seems to suffice per play se-
quence. The rest of the explicit performatives appearing in such contexts rely on
the recognizability of the activated institutional script or constitute short prefabri-
cated phrases that originate in other scripts of (semi-)public rituals and ceremonies
that are assumed to be familiar to users. It can be inferred from users’ engagement
in the play mode that when successful, mock performatives enhance the socially
gratifying nature of the interaction. The activated scripts are not brand new, but
they are jointly and playfully put to novel use in the particular computer-mediated
discourse. Because mock performatives function as discourse transformers, the
dispreferred response to them is textual silence.
The mock performatives under investigation mostly involve authority extend-
ing over (an)other interlocutor(s) in the virtual community, e.g., I hereby sentence
you to …; arrest you for …; appoint you to … In fact, they constitute one of the
principal ways for participants in these forums to assume authority over others,
mitigated by the playfulness of the exercise. Mock performatives are overwhel-
mingly enacted in response to other interlocutors’ contributions. However, owing
to their playful character, they are also sometimes used as a mitigating tool for
attemps to close the discussion. The discourse marker ok preceding the emphatic
explicit performative (I, User5, hereby do declare) in example (7) activates antici-
pations of a conclusive solution to the problems voiced by User3, and the closing
play sequence culminates the discussion.
Users also occasionally assume authority over themselves, as in: I hereby an-
nounce that I’m giving up on cream eyeshadows for good!! =p r/o. Such instances
involve playful vows, bans, declarations, announcements, and promises, and they

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 283

appear to relate to real world phenomena. Some refer to the common activities of
the discussion board, such as reviewing products; e.g., ah – yes, I hereby promise
that I will review any and all flavors I try, in response to other users demanding
“flavor recs” of toothpastes. Performatives exercising authority over oneself serve
topic management also by appearing as initiators of new exchanges, as is the case
in the above announcement. They invite endorsement or rejection but not se-
quences of joint play.
Performatives used frequently in replies also appear in abbreviated forms: ita
(‘I totally agree’); 2nd (‘I second the motion’). Such conventionalization takes
place within and across communities, and discussion boards may provide (novice)
users with lists of abbreviations. Agreeing and seconding something are common
discourse activities in CMC (see, e.g., I second this comment in example (8) in
Danet, this volume) and as such are prone to undergo abbreviation through in-
itialism, letter-number combining, and other shorthand techniques. These per-
formatives are an integral part of the informal interaction; they do not trigger play
sequences or incorporate the conspicuous formal marker hereby.
Mock performatives are sometimes accompanied by stand-alone third-person
performative predications, mimicking emotes. These may help users create appro-
priate felicity conditions in a virtual world, as in I hereby banish you from this king-
dom!!!!!!!!!!! *waves septer*, a disagreeing response typed in by an apparently fe-
male user adopting the role of a king waving his sceptre. They may also signal the
empathetic nature of the performative act, as in **hug** you are hereby given a
pass to do nothing today. Further, stand-alone performative predications immedi-
ately following another user’s mock performative may make explicit its virtual ef-
fect through a display of action that conveys a particular mental state; e.g., <– runs
to bathroom to look at my stunning new self!!! in response to the mock per-
formative i hereby delcare you an honorary indian [sic]; *laughs like a hyena* in
response to a controversial declaration; and *places hand on heart* after a pledge
to honour a metaphorical flag. Other performative predications appear as part of a
reply, before or after something that the user is saying, to signal the sincerity and/or
intensity of the virtual emotion or attitude expressed, e.g., *wipes away a tear*;
*rubs hands together*.
Both the CMC-specific third-person actions discussed in section 4 and the pre-
dominantly first-person mock performatives under consideration here contribute to
the construction of virtual realities. Unlike the third-person actions, however,
mock performatives may also appear in informal offline discourse, playfully con-
tributing to the construction of interlocutors’ textual worlds by evoking scripts of a
different kind, even though the activated scripts might not be sustained in quite the
same way. Mock performatives are thus not part of the “garden-variety virtual per-
formatives”3 grown in the emote-mode garden and subsequently spread into the
(message) field while still retaining their garden variety shape (i.e., the third-per-
son orientation and typographic cues of performative predications). Instead, mock

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
284 Tuija Virtanen

performatives are rather like exotic flowers planted in the natural habitat of infor-
mal discussion, conspicuous because of their origins in the knotted gardens of the
discourse of institutions, yet fully etiolated in comparison to these.
Overall, the mock performatives in the forums contribute to bonding within the
virtual community, mitigation of face threats, identity projection, and the construc-
tion of virtual realities, all of which constitute central aspects of the pragmatics of
CMC. Users readily engage in play when participating in an activated performative
script, contributing to the construction of its virtual felicity conditions, happily
shifting scripts, and/or responding in various other ways to mock performatives.
Like the rest of the interaction included in the threads (which also appears to be so-
cially gratifying), playful episodes display feelings and attitudes of users’ online
personae. Unlike the rest, however, the mediated mock performatives allow for a
shared sense of unpredictability concerning the effects of play on the virtual reality
at hand. The negotiation of this reality through interlocutors’ responses, same-
script or other-script oriented, serves to join them in what Beeman (2010: 121)
calls the performance loop, joint participation in “reinforced feedback”, whereby
“the actions of the performer are … affected and changed”. Beeman argues that
there are neuroscientific grounds for the enhancement of intersubjective emotion
and connectedness through performance.
Users are creative, in a restricted sense of the term, in their choice of, and re-
sponses to, explicit mock performatives, while limiting the innovation so that the
institutionalized contexts of the activated performative scripts remain evident. In
so doing they manifest and assume of their interlocutors a high degree of meta-
pragmatic awareness. Bauman and Briggs (1990), in their discussion of the central
elements of reflexivity involved in discourse as performance, focus on the pro-
cesses of recontextualization which serve to detach discourse from context and an-
chor it to another context of use. Mock performatives succeed in their function as
transformers into play mode largely because “discourse may be fashioned for ease
of detachment from situational context” (Bauman and Briggs 1990: 74). As soon as
the intertextuality of the stereotyped script is considered apparent, users proceed to
a stage of de-authentication of the performative through style-shifting (from for-
mal style back to the default informal style of the interactions), smiley faces,
laughter, and other signals of playfulness.
Mock performatives thus demand authentication work that allows interlocutors
to recognize the mediated institutionalized stereotype, while also signaling detach-
ment from such a context and hence freeing the users from the full implications of
the official or institutionalized discourse. This, in turn, constitutes another avenue
to authenticity in discourse, that of creating computer-mediated discourse that is
situated, unique, personal, and in some sense “genuine” for the interlocutors (Gill
2008, this volume, personal communication). De-authentication can thus be a type
of authentication of the discourse. The outcome of the (de)authentication of mock
performatives in the forums is reminiscent of Coupland’s (2001) analysis of the

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 285

performance of Welshness in radio talk. He argues that “stylized performance …


can potentially deliver forms of personal and cultural authenticity that transcend
local playfulness, so that the identificational effect is neither mere play nor outright
parody” (Coupland 2001: 347).4 It follows that a balance between the stereotype
and its de-authentication is critical for a successful recontextualization.

6. Conclusion

Unlike performance, in its wide sense of social action performed through dis-
course, performativity in CMC has attracted few studies. Yet, investigations into
the use of performatives in online discourse can help performative theory develop
into a more full-fledged account of human interaction involving an interplay of tex-
tual worlds of different kinds, virtual realities, and real life. CMC provides com-
pelling evidence that performativity is present in the online discourse of many
people. In addition to traditional performatives that have real-world force, such as
the apologies studied by Harrison and Allton (this volume) in email, CMC is teem-
ing with performatives that are routinely used in playful, etiolated ways.
In this chapter performativity in CMC was approached from the perspectives
of two different phenomena that manifest etiolation: (i) the garden-variety vir-
tual performatives of third-person emoting, now established and highly popular in
several modes of CMC; and (ii) mock performatives in discussion-board interac-
tion, de-authenticated from (offline) institutional contexts, to function as conspicu-
ous discourse transformers to a play mode. Emoting has developed from pre-pro-
grammed commands into stand-alone performative predications that users type
directly into their messages, keeping intact the third-person orientation and taking
care to separate them typographically from the rest. On the discussion boards in-
vestigated here, mock performatives manifesting the formal marker hereby were
found to trigger sequences of responses, keeping to the activated script or switch-
ing to other scripts deemed appropriate in the context. Replies and comments in-
vited by virtual performatives testify to their conventional illocutionary force, as
well as the creation of a range of situated, non-conventional effects that can be la-
belled perlocutionary.
CMC of many different kinds manifests virtual performatives, which await
close study that would ideally have as a goal to contribute to an understanding of
the fundamental role of etiolated performatives in social interaction and the con-
struction of virtual realities. In particular, the established nature of virtual third-
person action through emoting warrants further study, focusing on its pragmatic
functions within and across CMC modes. Future investigations of virtual per-
formatives might also focus on the packages of stereotyped ideas tacitly forwarded
through emoting and the use of mock performatives. Despite users’ efforts to de-
authenticate institutional mock performatives for the purposes of particular com-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
286 Tuija Virtanen

puter-mediated interactions by adding emoticons and other mitigating devices,


play is never just play. Virtual performatives invoke what is assumed to be widely
shared among participants. Furthermore, the occasional conventionalization of fre-
quent third-person emotes and explicit first-person performatives, possibly turning
them into abbreviations, is an inherent part of CMC that invites studies of their
histories within and across virtual communities. Focusing on the development of
popular emotes and mock performatives over time could shed light on their con-
tribution to the construction of authenticity in particular virtual communities.
Further studies might also investigate the characteristics shared by textual con-
texts that manifest clusters of virtual performatives. The CMC modes discussed in
this chapter are highly interactional. As compared to discussion boards, chat, and
social game environments, other modes might be expected to exhibit different
pragmatic uses of explicit or implicit performatives, in line with their relative de-
gree of “conversationalisation” (cf. Peterson 2011 on blog posts and comments)
and their more individualistic, control-oriented character (cf. Herring, Scheidt,
Bonus, and Wright 2005).
Still other aspects well worth investigating would be the possible use of virtual
performatives in comparable CMC modes across cultures and languages. The data
examined above were in English only (for emotes in French IRC, see Werry 1996;
for German performative predications, see Schlobinski 2001). Similarly, the
examples presented in this chapter predominantly originate in CMC among
women. The use of virtual performatives can be expected to manifest conspicuous
sociolinguistic variation, not least in terms of gender and perhaps in terms of age,
as well. Finally, performativity can be a window into individual users’ metaprag-
matic awareness of cultural repertoires of scripts, genres, and rituals, as well as
users’ propensity to engage in online play, their responses to playfulness, the prag-
matic dimensions of play, and its occurrences across communities and cultures.
Textual CMC relies on verbal cues and printed visuals, which are used to keep
the flow of conversation active, monitor its rhythm, manage topics, and negotiate
the necessary pragmatic aspects of successful communication. Irrespective of the
presence of an occasional photo or video, the main burden of communication lies
on typed conversation. Studies of performativity in CMC suggest that being able
to enact virtual actions by just typing them constitutes an inherent part of the at-
traction of many CMC discussions.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 287

Notes

1. Performance and performativity are terms with many uses, which have roots in very dif-
ferent research traditions; witness, for instance, the discussions of (one of) these notions
in Bauman and Briggs (1990), Pennycook (2004), and Robinson (2006). For performance
studies, see, e.g., Bial (2007).
2. I am grateful to Loukia Lindholm for collecting the data for this study.
3. Susan Herring (personal communication) has characterized emotes and performative
predications as the “garden-variety virtual performatives”.
4. I am grateful to Martin Gill for discussions of authenticity and the reference to Coup-
land’s work.

References

Attardo, Salvatore
1994 Linguistic Theories of Humor. Berlin/New York: Walter de Gruyter.
Austin, John L.
1962 How to Do Things with Words. Cambridge, MA: Harvard University Press.
Bauman, Richard and Charles L. Briggs
1990 Poetics and performance as critical perspectives on language and social life.
Annual Review of Anthropology 19: 59–88.
Beeman, William O.
2010 Performance pragmatics, neuroscience and evolution. Pragmatics and Society
1(1): 118–137.
Bial, Henry (ed.)
2007 The Performance Studies Reader, 2nd Edition (first published 2004). London:
Routledge.
Blum-Kulka, Shoshana, Juliane House, and Gabriele Kasper (eds.)
1989 Cross-Cultural Pragmatics: Requests and Apologies. Norwood, NJ: Ablex.
Cherny, Lynn
1994 Gender differences in text-based virtual reality. In: Mary Bucholtz, Anita C.
Liang, Laurel Sutton, and Caitlin Hines (eds.), Cultural Performances: Pro-
ceedings of the Third Berkeley Women and Language Conference, 102–115.
Berkeley, CA: Berkeley Women and Language Group.
Cherny, Lynn
1995 The modal complexity of speech events in a social MUD. Electronic Journal of
Communication 5. http://www.cios.org/EJCPUBLIC/005/4/00546.HTML
Coupland, Nikolas
2001 Dialect stylization in radio talk. Language in Society 30(3): 345–375.
Danet, Brenda
2001 Cyberpl@y: Communicating Online. Oxford, UK: Berg.
Dresner, Eli and Susan C. Herring
2010 Functions of the non-verbal in CMC: Emoticons and illocutionary force. Com-
munication Theory 20: 249–268.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
288 Tuija Virtanen

Du Bois, John W.
2007 The stance triangle. In: Robert Englebretson (ed.), Stancetaking in Discourse:
Subjectivity, Evaluation, Interaction, 139–182. Amsterdam/Philadelphia: John
Benjamins.
Enkvist, Nils Erik
1989 Connexity, interpretability, universes of discourse, and text worlds. In: Sture
Allén (ed.), Possible Worlds in Humanities, Arts and Sciences, 162–186. Ber-
lin: de Gruyter.
Gill, Martin
2008 Authenticity. In: Jef Verschueren and Jan-Ola Östman (eds.), Handbook of
Pragmatics Online. Amsterdam/Philadelphia: John Benjamins.
http://www.benjamins.com/online/hop [requires subscription]
Goddard, Angela
2003 “Is there anybody out there?” Creative language play and “literariness” in
Internet Relay Chat (IRC). In: Angela Schorr, William Campbell, and Michael
Schenk (eds.), Communication Research and Media Science in Europe,
325–343. Berlin: de Gruyter.
Goffman, Erving
1974 Frame Analysis: An Essay on the Organization of Experience. New York:
Harper & Row.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 41–58. New York: Academic Press.
Gumperz, John J.
1982 Discourse Strategies. Cambridge, UK: Cambridge University Press.
Herring, Susan C.
2000 “Doing gender” on the Internet. Guest lecture at Växjö University, Sweden,
10 April, 2000.
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi Hamilton (eds.), The Handbook of Discourse Analysis, 612–634. Ox-
ford, UK: Blackwell.
Herring, Susan C.
2003 Gender and power in on-line communication. In: Janet Holmes and Miriam
Meyerhoff (eds.), The Handbook of Language and Gender, 222–228. Oxford,
UK: Blackwell.
Herring, Susan C.
2004 Computer-mediated discourse analysis: An approach to researching online be-
havior. In: Sasha A. Barab, Rob Kling, and James H. Gray (eds.), Designing for
Virtual Communities in the Service of Learning, 338–376. Cambridge, MA:
Cambridge University Press.
Herring, Susan C.
In press Grammar and electronic communication. In: Carol A. Chapelle (ed.), The
Encyclopedia of Applied Linguistics. Malden, MA/Oxford/Chichester: Wiley-
Blackwell.
Herring, Susan C., Lois Ann Scheidt, Sabrina Bonus, and Elijah Wright
2005 Weblogs as a bridging genre. Information Technology & People 18(2): 142–171.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
Performativity in computer-mediated communication 289

Kolko, Beth
1995 Building a world with words: The narrative reality of virtual communities.
Works and Days 25/26, 13(1/2).
http://bethkolko.com/includes/pdfs/buildingaworldwithwords.pdf
Kurzon, Dennis
1986 It Is Hereby Performed … Explorations in Legal Speech Acts. Amsterdam/
Philadephia: John Benjamins.
Lakoff, Robin Tolmach
2000 The Language War. Berkeley, CA: University of California Press.
Langellier, Kristin M.
2003 Personal narrative, performance, performativity: Two or three things I know
for sure. In: Yvonna S. Lincoln and Norman K. Denzin (eds.), Turning Points
in Qualitative Research, 441–468. Walnut Creek, CA: AltaMira. Reprinted
from Text and Performance Quarterly 19 (1999): 125–144.
Parker, Andrew and Eve Kosofsky Sedgwick
2007 Introduction to Performativity and Performance. In: Henry Bial (ed.), 200–207.
Pennycook, Alastair
2004 Performativity and language studies. Critical Inquiry in Language Studies 1:
1–19.
Peterson, Eric E.
2011 How conversational are weblogs? Language@Internet 8, article 8.
http://www.languageatinternet.org/articles/2011/Peterson
Peterson, Eric E. and Kristin M. Langellier
2006 The performance turn in narrative studies. Narrative Inquiry 16(1): 173–
180.
Raskin, Victor
1985 Semantic Mechanisms of Humor. Dordrecht: Kluwer.
Robinson, Douglas
2006 Introducing Performative Pragmatics. London: Routledge.
Ruedenberg, Lucia, Brenda Danet, and Yehudit Rosenbaum-Tamari
1995 Virtual virtuosos: Play and performance at the computer keyboard. Electronic
Journal of Communication 5.
http://www.cios.org/EJCPUBLIC/005/4/00542.HTML
Sbisà, Marina
2009 Speech act theory. In: Jef Verschueren and Jan-Ola Östman (eds.), Key Notions
for Pragmatics, 229–244. Amsterdam/Philadelphia: John Benjamins.
Sbisà, Marina
2007 How to read Austin. Pragmatics 17: 461–473.
Schank, Roger C. and Robert P. Abelson
1977 Scripts, Plans, Goals and Understanding: An Inquiry into Human Knowledge
Structures. Hillsdale, NJ: Lawrence Erlbaum.
Schlobinski, Peter
2001 *knuddel zurueckknuddel dich ganzdollknuddel*: Inflektive und Inflektiv-
konstruktionen im Deutschen. Zeitschrift für Germanistische Linguistik 29(2):
192–218.
Searle, John R.
1969 Speech Acts: An Essay in the Philosophy of Language. Cambridge, UK: Cam-
bridge University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
290 Tuija Virtanen

Searle, John R.
1975 Indirect speech acts. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 50–82. New York: Academic Press.
Searle, John R.
2001 How performatives work. In: Daniel Vanderveken and Susumu Kubo (eds.),
Essays in Speech Act Theory, 85–107. Amsterdam/Philadelphia: John Benja-
mins. Reprinted from Linguistics and Philosophy 12 (1989): 535–558.
Virtanen, Tuija
In press Mock-performatives in online discussion boards: Toward a discourse-prag-
matic model of computer-mediated communication. In: Deborah Tannen and
Anna Marie Trester (eds.), Discourse 2.0: Language and New Media. Selected
Papers from GURT 2011. Washington, DC: Georgetown University Press.
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:41 PM
12. Address in computer-mediated communication
Sandi Michele de Oliveira

1. Introduction

Address forms are an indispensable part of the communicative process. They can
serve as indexicals of personal or social identity, highlighting the differences be-
tween interlocutors or stressing their common status or personal qualities. Address
forms can also index features of an unfolding communicative situation, for example
by supporting an interlocutor’s conversational goals through face-threatening
or face-enhancing acts, expressing changes in mood, or addressing an interlocutor
by a different form in the presence of third parties to disguise the closeness of the
relationship or maintain the addressee’s public face. The ability to choose appro-
priate forms of address in a wide variety of communicative contexts and with dif-
ferent interlocutors is part of an individual’s pragmatic competence, whether in
face-to-face or computer-mediated interactions.
The analysis of address form use has not been exclusively, or even primarily,
carried out within the field of pragmatics, however. Address forms shed light on
so many aspects of the communicative process that they have attracted the interest
of researchers from various disciplines within the social and cognitive sciences
(e.g., linguistic pragmatics, sociolinguistics, conversation analysis, sociology of
language, linguistic anthropology, social psychology, cognition). Early on, Roger
Brown and Albert Gilman, who are credited with initiating the systematic study of
address in 1960, noted that “[s]emantic and stylistic analysis of these forms takes
us well into psychology and sociology as well as into linguistics and the study of
literature” (1960: 253).
While every language has pronouns as well as noun phrases (nominal forms)
that an interlocutor may use to identify an intended addressee, great variation exists
among world languages in both the pronominal system and the ways in which nom-
inal forms can be used as forms of address. Standard English has a single pronomi-
nal form you, which may be used in the singular or plural, while French, Danish,
and German have two pronouns in the singular: tu/vous, du/De, and du/Sie, respect-
ively, the second pronoun in each case being a grammatical plural form. Spanish
is more complicated, as there is no single national standard among the countries in
which Spanish is the official language. Portuguese has three forms (tu/você/vós),
the grammatical second-person singular, third-person singular, and second-person
plural pronouns, although the use of vós with a single addressee is becoming
increasingly rare and regionally restricted. At the other end of the spectrum are lan-
guages with honorifics, such as Japanese and Malay, in which the address form sys-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
292 Sandi Michele de Oliveira

tem is one aspect of a speech “level”, with degree of politeness or formality built
into the grammatical system in a variety of ways.
The syntactic rules governing the use of nominal forms in direct address also
vary from language to language. While in English it is possible to use nominal
forms in direct address as if they were bound pronouns, as in Would Madam [you]
like some tea?, use of such constructions tends to be stylized and limited. In
Portuguese, as in languages with honorifics systems, the equivalent question,
A senhora aceita um chá?, is very common, as are more elaborate forms of nominal
address, such as O senhor professor já deliberou sobre o assunto? (‘Has Mr. Pro-
fessor [have you] thought about the issue?’). In recognition of the fact that in many
languages nominal forms can be grammatically bound, as if they were pronouns of
address, the focus of this chapter and its operational definition of “address forms”
includes both pronominal and nominal forms used in direct address.
Computer-mediated communication (CMC) offers a different investigative mi-
lieu in which to study interaction than does face-to-face communication, as both
the researcher and the interaction itself are place-independent and, in asynchron-
ous CMC, time-independent, as well. A researcher can gain access to enormous
quantities of data that are neither “contaminated” by her presence (cf. the Observ-
er’s Paradox, Labov 1970: 32) nor dependent on it. There is a natural linearity to
the data, and while it may be impossible to know with complete certainly the type
and amount of interaction that occurs between specific interlocutors offline or in
another CMC channel, it is possible to capture the entirety of the interaction in the
channel being studied. Despite these factors and the amount of data that is avail-
able for analysis, the study of address in CMC is still in its infancy.
This chapter provides a historical and theoretical overview of the study of
address, with a focus on contributions from the pragmatics and sociolinguistics
research traditions, which account for the majority of studies. A discussion follows
of existing studies of address usage in CMC. The studies presented fall into three
main categories: greetings, considerations of conversational norms, and studies of
address in educational settings. This discussion is followed by a section that raises
some theoretical and methodological issues associated with CMC-based studies of
address. In recognition of the incipient nature of such research, the chapter con-
cludes with suggestions for future research.

2. Historical and theoretical background

Brown and Gilman’s (1960) model of address opened a new domain of investi-
gation. Their model was founded on the premise that social relationships are redu-
cible to two dimensions, broadly defined: the degree to which one person has
“power over another” in age, socioeconomic status, rank in an organization, edu-
cational level, etc. (1960: 253); and solidarity, as “a set of relations that are sym-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 293

metrical” (1960: 258). Each person was presumed to occupy a particular place on a
hierarchical scale, and an assumption was made that all would be addressed “ap-
propriately” for their status. Brown and Gilman focused on languages with a bi-
nary pronominal system for addressing an individual addressee (e.g., French,
Spanish, German), referring to T and V, so labeled after French tu/vous. T, the pro-
noun used with the second-person singular form of the verb, indexed, according to
their model, not only solidarity per se but intimacy, trust, informality, equal or
lesser rank, similar interests, and so forth. V, indexing power, authority, respect, de-
ference, and higher rank, was so labeled after the second-person plural form in
French, with the recognition that in some other languages the V pronoun is conju-
gated with another form of the verb (e.g., third-person singular, as in Spanish).
Although the study of address is now often considered a sub-field of prag-
matics, and Brown and Gilman’s work was contemporaneous with Austin’s pion-
eering publication on speech acts (1962), most address studies following the pub-
lication of Brown and Gilman (1960) were conceived within the then-emerging
field of sociolinguistics. In fact, studies of address were instrumental in demon-
strating a crucial point of sociolinguistics: that the social context and the social
roles of the speakers can influence language use. Despite the interest in early prag-
matics research in examining how speaker intentions are realized in conversation,
such studies were based on “model” rather than actual speakers (e.g., Lakoff 1973;
Leech 1983). A partial convergence of the two fields occurred with the presenta-
tion of Penelope Brown and Stephen C. Levinson’s work on politeness (1978,
1987), in which power and solidarity, along with social distance, were integrated
into a strategic model of politeness (see Duthler [2006] for a brief description of
Brown and Levinson’s model and its usefulness for CMC studies of politeness; see
Vinagre [2008] for its application to CMC in Spanish). Later, noting the insuffi-
cient treatment of impoliteness in Brown and Levinson’s model, Culpeper (e.g.,
1996) adapted their approach to analyze impoliteness. Perhaps in part a reaction to
Brown and Levinson’s assertion that their strategies of politeness were universal,
studies based on real, as opposed to imagined, language use began to be conducted
around the globe (see, e.g., Arnaiz [2006] for an overview of the application of dif-
ferent theories of politeness to the study of Spanish address forms). Still, despite
some shared concerns (respect and deference, among others), politeness and ad-
dress remain independent systems at the theoretical level.
The central focus of Brown and Levinson’s model is politeness, rather than ad-
dress; the authors only acknowledge the importance of address as an indicator of
in-group status or to show deference (1978: 57, 107). Accordingly, address re-
searchers accustomed to examining natural, as opposed to idealized, conversation
have noted that the role address plays in (im)politeness is underanalyzed in this
model. While more recent studies (e.g., Terkourafi 2004) have recognized that the
choice of address form contributes more to communication than the pioneers in
politeness research envisioned, other scholars continue to view address forms as

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
294 Sandi Michele de Oliveira

markers of rather static identity, ignoring individual speakers’ ability to use the
forms creatively, thereby expanding the forms’ semantic range. In either case, for
politeness theorists, address forms are but a single element in a whole array of fea-
tures (e.g., hedging, degree of imposition, degree of directness) that can define an
interaction as (im)polite.
More recently, the focus on identity as a construction emerging from discourse
has brought pragmatics and sociolinguistic endeavors to another junction (see
Bucholtz and Hall 2005 for an introduction to theoretical perspectives on identity).
Until the 1950s, the view of social scientists was that social identity was stable
and essential in nature. Constructivist views of social class and identity began to
take hold in sociology in the 1950s and 1960s, although in the study of language
variation (sociolinguistics and pragmatics), the transition has been of more recent
vintage. In the mid-1980s, Myers-Scotton (1983) and Medeiros (1985) discussed
the “negotiation” of identity through strategies of address, the former within a
pragmatics framework, the latter within sociolinguistics. However, only after Eck-
ert and McConnell-Ginet’s (1992) application of the communities of practice
(CoP) approach to the study of gender identity did constructivism become main-
stream in those fields (see Wenger 1998 for a general discussion of the CoP ap-
proach). In constructivism identity is not innate; rather, it is constructed “through
social, economic, cultural, historical and political factors”, and thus its interpre-
tation is fluid (D. Smith 2001: 34). In this view, address forms are not merely iden-
tity “tags” or “tokens” whose interpretation is fixed; interlocutors can use them in
ways that do not follow societal norms. Smith (2001) also asserts that essentialists
reduce social behavior to one or two dimensions, while constructivists see a
“multiplicity” of social dimensions. Both the Brown and Gilman and Brown and
Levinson models belong in the essentialist paradigm. In these models, address
forms are viewed as markers of stable identity features (e.g., age, social class,
gender). Many elements are subsumed into the dimensions of power and solidarity
under the premise that the aspects, or factors, associated with power form a natural
group, as do those associated with solidarity. However, while in each case the fac-
tors grouped in each dimension share commonalities, they are not homogeneous.
The paradigm shift to constructivism triggered a major change in the field of
pragmatics. There has been a shift in focus from speaker-focused strategies, a hall-
mark of the Brown and Levinson model, towards “relational work” (e.g., Locher
and Watts 2005), with an emphasis on the collaborative and unfolding process
of communication. For example, Watts’ (2003) discursive model of politeness, de-
scribed below, does not predict specific use, but purports to illustrate where utter-
ances may be open to interpretation.
The need to be able to assess appropriateness in address form use has been
acknowledged in the address form literature for more than three decades. Hymes
(1974), operating within the essentialist paradigm, saw a relationship between the
form and function of each address form:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 295

When the values of the mode of address and the social context match – when both, say,
are formal – then that meaning is of course accomplished, together with the meeting
of expectations. When the values do not match … then a special, or ‘marked’, meaning
is conveyed. (1974: 111)
In my earlier discussions of the negotiation of address form relationships (Medei-
ros 1985; Oliveira 2005), I defined two interactional “planes” – one for conven-
tionalized usage (usage matching societal expectations) and one on which the
speakers determine the address forms appropriate for their relationship, indepen-
dent of outside opinion (negotiated usage), with (non)conformity possible on
either plane. In pragmatics there has been a similar recognition that the interpre-
tation of usage must be differentiated. Watts (e.g., 2003) makes a distinction
between “first-order” and “second-order” politeness. Silverstein (e.g., 2003) refers
to levels of indexicality; Blum-Kulka (1992) and Gal (2008) make a distinction be-
tween public and private use; and Mills (2009) distinguishes between cultural and
individual levels. The latter closely parallels the distinction between conventional-
ized and negotiated in Medeiros (1985) and Oliveira (2005).
More recently, I have been refining a model of address that integrates cogni-
tive, interactional, discursive, socio-psychological, and negotiative/constructivist
elements into a single framework (Oliveira 2006, 2010). The model is “discur-
sive” in that it focuses on the changing address form relationship as it unfolds
through discourse over time. In Stage 1 of the model, S (speaker) and H (hearer)
meet as strangers; their goal is to assess what is a socially-appropriate address
form and use it. In Stage 2, S (or S and H) wishes to signal a change in the rela-
tionship; a new form is negotiated that may or may not conform to societal expec-
tations. It is the interlocutors’ own assessment that governs the choice and the de-
termination of appropriateness; societal expectations are moot. Temporary
changes in use of address form may also occur, brought about by a number of fac-
tors (humor, desire to joke, the presence of certain other people, a situation invol-
ving protocol, etc.). If the temporary change is provoked by the presence of others
(e.g., to disguise a close relationship), then the likely choice of address is a form
that intentionally conforms to societal expectations and can be interpreted accord-
ingly. If the change is due to another reason, then the relevant interpretation is
that of S and H, rather than third parties. A Stage 3 is possible, if S (or S and H)
wishes to signal a further change in the relationship. In that case, the address form
is renegotiated as in Stage 2; this stage may be repeated any number of times. (See
Oliveira 2006, 2010 for sample strategies and a graphical representation of parts
of the model.)
In this discursive model of address, the examination of negotiated use requires
the analysis of messages sent over a period of time so that patterns can be ident-
ified, making possible the identification of usage that is anomalous (marked) for
the interlocutors. At the heart of the model is the notion that there are two spheres
of interaction, one whose notions of markedness are tied to socially conventional-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
296 Sandi Michele de Oliveira

ized norms of politeness, the other determined by the relationship that speakers
build for and between themselves over time. This negotiated relationship may, but
need not, conform to societal expectations, and the evaluation of outsiders may be
deemed irrelevant by the pair.
Similarly, Watts (2003) envisions two types of politeness analysis: First-order
politeness (politeness1) involves the evaluation of politeness by laypersons, while
second-order politeness (politeness2) refers to the theoretical notion of politeness
used by researchers that “preserve[s] mutually shared consideration for others”
(2003: 277). For Watts, politeness1 behavior can be considered to be “polite” or
“politic”. “Politeness” emerges through practices that “draw on members’ past ex-
periences of previous interaction and the institutionalised, objectified structures of
social reality that have been internalised in the process” (2003: 201), roughly
equivalent to my use of “conventionalized usage”. Politic behavior is defined as
that which “the participants construct as being appropriate to the ongoing social
interaction”, a clear parallel to my concept of “negotiated usage”. Watts’ model
seeks to explain how speakers come to develop behavior “appropriate to the social
interaction type in which [they] are involved” (2003: 143), reflecting a process of
socialization. However, Watts is more concerned with evaluation by others, and
my focus is on how individuals come to find forms that are mutually “satisfying” (a
term my informants have used, Medeiros 1985).
CMC interactions, by their linear nature, lend themselves well to the study of
how social relations are negotiated over time, and the distinction between conven-
tionalized and negotiated usage is relevant online. More CMC-based studies of ad-
dress focus on the former than the latter, however, as is evident from the review of
literature in the following section.

3. CMC-based studies of address

Most studies of address in CMC seem to fall into one of three categories: the role
address plays in greeting behavior and relationship development; considerations of
conversational norms, including the reactions of Internet users to address form
usage that they find objectionable (i.e., that violates conventionalized norms); and
address in collaborative learning projects or in educational institutions generally,
including comparisons between online and offline behavior. Each of these cat-
egories is discussed below.

3.1. Address forms in greetings


Greetings are expressions that speakers use to acknowledge one another (e.g.,
Hello; good morning, how’re you doing?). While greetings often serve as the first
exchange of a conversation, at other times they are formulaic expressions in which

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 297

the speakers simply acknowledge the other’s presence (see Medeiros 1994 for
further discussion). As both greetings and address forms serve to set the conversa-
tional stage (e.g., degree of formality with intended addressee, mood) for the com-
munication, address forms are often included in greetings. Ervin-Tripp (1972)
introduced the term “co-occurrence” to account for linguistic elements of different
types that work in tandem to produce stylistic coherence; one example she pro-
vides joins a greeting and a nominal address form. By her definition, Good morn-
ing, Your Eminence? would be a case of stylistic coherence, while How’s it going,
Your Eminence? violates the rules of co-occurrence (1972: 233). Although address
forms and greetings often co-occur, at least in some languages, both need not be
explicitly present. The degree to which address forms are expected to be spread
throughout a written or oral communication is culturally determined, with honor-
ific languages placing greater importance on the use of explicit nominal forms than
English or the Scandinavian languages. Thus, the omission of an explicit form in a
series of messages in English may escape notice, while in another language a
single message omitting “appropriate” nominal forms of address may be cause for
comment (e.g., Oliveira 2003).
One of the difficulties in analyzing co-occurrences of greetings and address
online is that while the inclusion of an address form in a greeting may signal the
identity of the addressee, the mood of the “speaker”, or something about the situ-
ation (e.g., Waldvogel 2007: 458), the omission of a nominal form (or an explicit
pronoun, in pro-drop languages) may not be significant. The relationship may have
been negotiated offline or in a previous message, with the users finding no further
need to call attention to it; or continual usage of the form may appear to overem-
phasize its significance, actually serving to distort the communication. Finally, it
may simply be that because the CMC format itself provides the name or nick of the
other, the user feels no further need for identification of the parties involved. Her-
ring (1996) invokes the latter explanation to account for why only 13 % of the
messages posted to two asynchronous academic discussion lists she analyzed
started with salutations, most of which took the form “To: [Name]”. She writes:
The relative lack of epistolary conventions can be explained in part by the fact that
a header is added automatically to each message by the electronic mailer, including a
separate line for who the message is “from”, who it is addressed “to” (in these data, the
entire mailing list), and the date and time of posting (87).

Murray (2000) also reports that greetings tend to be lacking in computer-


mediated messages; moreover, she suggests that they are more likely to be omitted
in business CMC (both email and instant messaging) than in academic CMC. She
cites a study by Gains (1999) that compared emailers in an insurance company
with emailers within and across universities in the UK; the latter’s messages were
found to include more “conversational” features, including “an opening greeting”
(2000: 400–401). Only 8 % of commercial emails included a greeting, and 5 %

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
298 Sandi Michele de Oliveira

made explicit use of the addressee’s name, whereas the 63 % of university emails
with a greeting included 37 % that used the addressee’s name (Gains 1999: 85, 91).
Cho’s (2010) analysis of 197 private email messages exchanged among staff at
an Australian university provides further data from a university setting. Cho found
that names (first, surnames, or nicknames) were sometimes omitted from both greet-
ings and leave-takings, although they were present in approximately two-thirds of
the emails. Thus there is institutional variability even within a single language in the
(non-)use of address forms in (or as) greetings. More generally, these findings pro-
vide evidence that nominal address forms serve functions beyond the simple identi-
fication of speakers, as that task is handled through the email program itself.
Hatipoğlu (2007) compared British and Turkish online calls for academic
papers and found evidence of culturally differentiated usage. While British confer-
ence organizers omitted salutations in 95.4 % of their messages, nearly half
(43.6 %) of the Turkish calls for papers included salutations with address forms
(2007: 766). Hatipoğlu further analyzed the data according to destination – mes-
sages sent to the Linguist List vs. those sent to potential conference attendees.
Little difference was found in the use of postings of international calls for papers
made to the Linguist List, but a significant contrast was found in the second group:
61.3 % of the Turkish messages contained salutations with address forms, as com-
pared to only 8.1 % of the British messages, leading Hatipoğlu to suggest that the
intended receiver of the message is a determining factor in the decision to include
or omit salutations by Turkish speakers (2007: 767).
Waldvogel (2007) also points out differences in the extent to which people in
different countries explicitly acknowledge differences in status. She considered
a group of studies contrasting emails sent to superiors and subordinates vis-à-vis
the inclusion or omission of closings which may, optionally, include an address
form, and noted differences between New Zealand and Malaysia, the latter being
a country where status differences are more often acknowledged. Waldvogel con-
cluded from her data that interpersonal dynamics and cultures are sufficiently dif-
ferent to warrant the design of studies clearly focused on a particular situation
(Waldvogel 2007: 457).
Most of the studies surveyed above focused on asynchronous CMC, especially
email. Rintel, Mulholland, and Pittam (2001) examined greetings and salutations in
(synchronous) Internet Relay Chat (IRC) in English; part of their analysis focused
on “nicks” (the screen names that the users choose to identify themselves, which
can be altered mid-conversation), which were found to be used often as address
forms. Their qualitative study analyzed the different forms nicks could take (plays
on words, altered syllable order, use of punctuation marks, capital letters, etc.).
However, the data presented only included the greetings themselves; as the sur-
rounding context was eliminated, the way these variations played out in interaction
over time was difficult to discern. (For a discussion of nicknames, see also Lind-
holm, this volume.)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 299

Hastrdlová’s (2009) doctoral dissertation on English-language IRC exemp-


lifies a more integrated approach. She placed address forms at the center of her
study, applying concepts and methods from the fields of (im)politeness (including
notions of scalar politeness), pragmatics (speech act analysis), conversational
analysis, sociolinguistics, and previous CMC-based studies of a general nature.
Hastrdlová differentiated among types of activities, including greetings when
coming online, address used in the course of chat, and address forms in closing se-
quences. She categorized the address forms (e.g., general nouns, nicknames, terms
of endearment, personal pronouns, and impolite forms) and included in her ana-
lyses relationship-building exchanges, so as to obtain a nuanced picture of usage
patterns. She found, for example, that while more than half (56.3 %) of the ex-
changes were initiated with no overt greeting or form of address, users left the chat
without any closing 86 % of the time. In fact, there were only six occurrences of
closings with an address form in the 793-message corpus.

3.2. Conversational norms


Noting that much CMC research takes an essentialist approach to identity, Postmes,
Spears and Lea (2000) asked whether social norms emerged through email inter-
action. They examined data from a Dutch email program that was built into a com-
puter teaching program for learning statistics called “Dr. Stat”. They analyzed more
than 2,000 messages in terms of form (e.g., punctuation, spelling, use of foreign ex-
pressions) and content (e.g., degree of immediacy in reading intended, information
provided vs. action requested). The second-person pronouns je and u were also
considered, as was the absence of a pronoun; however, rather than consider the
context in which each appeared to determine its communicative value, they coded
each instance of je as “informal” and u as “formal” (2000: 350), an apparent contra-
diction to the constructivist, discursive approach the authors advocate. Their con-
clusion that the relationships established were probably “fairly stable” (2000: 361)
may in part be a reflection of their not having coded nominal forms of address,
which would have added nuance to the analysis. So few examples of the “formal”
pronoun were found, in fact, that its usage is not reported (2000: 355).
Studies of address in CMC have thus far rarely considered that address form
relationships can be negotiated that do not conform to conventionalized norms.
An exception is Nishimura (2003), who provided a fine-grained systemic analysis,
taking a discursive approach to the consideration of casual online communication
in Japanese. Rather than focusing exclusively on the presence or absence of honor-
ifics, she included other features (e.g., verb endings, signaling the degree of for-
mality; punctuation, creative spelling, smileys). More importantly, she considered
the co-occurrence of two elements, in this case honorifics and verb endings. The
data showed Japanese BBS (bulletin board system) users mixing formal honorifics
with informal verb endings. The users not only made precise distinctions that sim-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
300 Sandi Michele de Oliveira

ultaneously conveyed subtle gradations of respect and closeness, but they could
alter the mix at any moment. Nishimura further found that the degree of involve-
ment (number of messages authored) as well as length of time of participation on
the BBS affected the mix of the various formality signals.
Evidence of conversational norms as regards address form usage can be in-
ferred from violations of those norms. Kretzenbacher (2005), Oliveira (2003), and
Graham (2007) found that Internet users sometimes react strongly to violations of
address norms, generally the use of T where V is expected, or if several V-forms
exist, use of one denoting greater familiarity than expected. Kretzenbacher (2005:
7) noted that German netiquette often proposes reciprocal address, rather than
stipulating a particular form of address, and recommended that users not be “as-
tonished” by the use of one form or another. Kretzenbacher took as his starting
point the popular notion that “everyone” (i.e., speakers of German) used du on the
Internet. However, in comparing the German-language websites of the IKEA com-
pany in Germany, Switzerland, and Austria, he found significant differences in the
use of the second-person pronouns, thus refuting that notion.
Oliveira (2003) found that on a Portuguese university’s users network, men
posted more messages denouncing a lack of adherence to politeness and grammati-
cal norms than women did. In a conversational thread that was particularly acerbic,
the initial message was a statement by a male professor (Male 1) decrying the uni-
versity newspaper’s disparaging coverage of one of the university’s departments.
An exchange ensued in which address forms played a key role. A woman (Female
1) responded to his message, addressing him as Sr. FN + LN [Mr. First Name +
Last Name]. In Portugal, bachelor’s degree-holders are addressed as Dr., master-
level graduates as Mestre, and Ph.D. graduates as Doutor, preceded by Professor
when they teach at a university. This woman’s omission of academic titles con-
veyed the notion that Male 1 had no university degree at all.
Male 1 responded, referring to her as Colleague (I presume you are one), indi-
cating that he had not bothered to find out her status, and then made an oblique ref-
erence to her not having used the appropriate form: Without any attempt
to diminish you by the address form you chose to address me by …. The female col-
league did not respond, but a “bystander” to the conversation, Male 2, made ex-
plicit what Male 1 conveyed implicitly:
No. ‘Sr. + FN’ [Mr. + First Name] is impossible. It won’t do. The Academic world is
vast, diverse, open and has its fragility: the respect of a certain elegance is not imposed
by law. It’s just as well, but it imposes greater moral duty.

This was followed by a message from a second bystander, Male 3, who joined
Female 1 in denigrating Male 1, whose academic title was Professor Doutor
[Doctor], by referring to him as a certain Dr. + FN + LN [Last Name]. In this ad-
dress, Male 1 was belittled on two fronts, first with the wording “a certain,” a sug-
gestion that Male 1 was an undesirable of some sort, and then by being verbally

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 301

stripped of his graduate degrees and status as professor. The finding that men were
serving as the arbiters of politeness ran counter to that of CMC studies in English,
which typically find women exhibiting greater concern with the observance of pol-
iteness norms (cf. Herring 1994; C. Smith, McLaughlin, and Osborne 1997).
Graham (2007) similarly found evidence of a “collaborative” social conscience
in her study of deviations from the politeness norm in a community of practice, an
online church support group. The message that sparked the controversy was a plea
for support from a church member who was having emotional problems with his
male partner. The politeness transgressor was a woman who answered his plea for
help by sending a message that was clearly unsupportive in tone as well as disobey-
ing the list’s instructions for providing informative headers in messages of re-
sponse. After other members wrote to note both her attitude and non-conformance,
she responded in an additional three messages, never once mentioning the name of
the original poster, referring to him as “that gentleman”, as if he had no access to
her messages and/or was of no consequence (2007: 750). In this case, the issue was
the omission of address, as opposed to a form that was poorly chosen.

3.3. Address in educational online settings


Within the area of CMC research on address, studies focusing on education are
plentiful, both for collaborative learning generally and for the development of prag-
matic competence in a foreign language (e.g., Belz and Kinginger 2002; Chung,
Graves, Wesche, and Barfurth 2005; Eisenchlas 2011; Kinginger 2000; LeMond
2004; Nguyen and Kellogg 2005; Postmes et al. 2000).
Nguyen and Kellogg (2005) analyzed electronic message board postings of in-
ternational students in a community college in Hawaii; 19 students from Japan,
Korea, and Hong Kong, aged 18 to 35, were in a content-based ESL (English as
a Second Language) course examining issues of gender discrimination and homo-
sexuality. Online discussions with classmates provided possibilities for the students
to develop opinions and practice expressing them prior to wider classroom dis-
cussions. The researchers found that when the students expressed agreement with
their interlocutor in the class’s online forum, they were more likely to address the
other by name than when they were not (in 39 % of messages, as opposed to 24 %).
The authors concluded that the students found the forum to be a “place to build and
maintain relationships” (2005: 125); the explicit exchange of names suggests that
the speakers had created a community, as opposed to simply sharing space.
In another study, Chung et al. (2005) examined a tandem learning experience in
which recent Korean immigrants were paired with second-generation Canadians of
Korean descent wishing to learn Korean to work collaboratively on homework as-
signments through a chat program. Although the focus of the study was neither the
acquisition of address forms nor the honorifics system of Korean, the researchers
noted the initial exchange between one pair of students in which the Korean asked

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
302 Sandi Michele de Oliveira

the age of the Canadian in order to select an appropriate first address form (2005:
62 ff.). The Korean student needed the information in order to be able to determine
their relative status levels. According to the English gloss, the question was asked
three times (age, age in Korean, and year of birth). The Canadian was confused,
both because it was the first utterance from the Korean, but also because of the
multiple formulations of the “same” question. Because of this exchange, the re-
searchers decided to consider the acquisition of the honorifics system generally
and the interactional differences between the two groups at different stages in the
acquisition process. Korean students initially found the English-speakers “rude
and disrespectful”, which hampered communication generally, but the quality and
frequency of cross-cultural interaction increased as the Canadians became profi-
cient in using honorifics (2005: 63).
Belz and Kinginger (2002) set up a collaborative learning project pairing stu-
dents of French and German at an American university with counterparts learning
English in France and Germany. The French sample comprised 300 emails and the
German sample transcriptions of 25 half-hour synchronous chat sessions. Stating
that their goal was to analyze the development of use of T and V in these cross-
national conversations, the researchers inexplicably contaminated the data by tell-
ing the students to use T in their communication. Not all students obeyed, so they
proceeded to analyze use of T and V without considering that the variation they
found might have been a function of how well the students remembered their
instructions, as opposed to previous knowledge regarding the addressing of ac-
quaintances.
While CMC researchers often make references to online versus offline beha-
vior, rarely do studies examine the same population. Do people interact with the
same other people in different ways offline and online? Aarsand’s (2008) study of
Swedish students interacting both through MSN Messenger and face-to-face found
that they did. The students were divided into groups involved in different activities.
Each was connected to Messenger and was able to interact online with anyone in
the room, making it possible to maintain private, in-group conversations concur-
rently with offline discussions. The study focused on collaborative work on school
assignments, so the results cannot be directly extrapolated to other types of dual-
channel communication. Nevertheless, multitasking has become so prevalent, both
online and online/offline, and users often move so quickly from one activity to an-
other, that there may be “slippage” – confusing the addressee and inadvertently
using a form that is marked (unusual for the addressee). Little mention is made of
address forms beyond an instance of pejorative name-calling (160) and an offline
comment from one girl to another that she has a nice name (156), but there is men-
tion of students appropriating the identity tags of others, which then requires them
to identify themselves when they wish to make their own identity clear. Despite the
paucity of information regarding address, the design of the study is interesting and
merits consideration by address researchers.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 303

4. Theoretical and methodological concerns


in studies of address in CMC

Some of the theoretical and/or methodological choices made in existing CMC-


based studies of address are problematic. This section takes up three issues. The
first concerns the problem mentioned above with viewing address forms as reflec-
tions of stable features of identity. Such a view leads to imprecise statements, such
as referring to the “polite” pronoun, as if there were an “impolite” one. The second
issue concerns a lack of precision in the interpretation of usage (e.g., T is presumed
to have the same value independent of the interlocutors and their relationship).
A third issue concerns the underutilization of discursive approaches in CMC-based
studies of address. Each of these points is discussed briefly below.
Despite the sheer volume of research conducted on address since 1960, as well
as a recognized shift from essentialist views of identity to the notion that identities,
more than one to an individual, are constructed over time, even recent studies have
fallen prey to the notion that address forms are stable identity markers, with each
instance of use, or token, presumed to be the semantic equivalent of every other
token. Thus, simple frequencies of use of each form are assumed to be meaningful.
For example, Belz and Kinginger (2002) state that “[l]earners need to understand,
in the first instance, that choice of pronoun does in fact index social identity”
(2002: 209), suggesting that they considered address forms as simple identity tags.
Postmes et al. (2000) took a similar position by treating je and u as stable markers
of formality. By using predetermined values, pronoun use itself is underanalyzed.
Rather, the pronouns are used to anchor the analyses of the other elements (com-
plaints, flames, slang, and shouting) to a particular degree of formality (2002: 363).
The second point concerns interpretative precision, which is admittedly com-
plicated. In a situation in which reciprocal T is expected (given the age of the
speakers, for instance), use of T is not, by itself, an indication of intimacy, shared
views, solidarity, or even familiarity. It may simply be the socially expected form.
Likewise, use of a V-form with a title may conventionally denote the giving of re-
spect, although the interlocutor’s intention may be to appear to be giving respect.
Oliveira (2009) provides a more extensive discussion of variability in the interpre-
tation of address forms and the mechanisms through which insincere address per-
formances may be achieved.
A second type of interpretative imprecision can occur when researchers credit
the CMC medium for usage that would be considered unremarkable in offline com-
munication by the same interlocutors. An example of interpretive imprecision was
commented on by Schulze (1999: 80 f.), who noted that in Hess-Lüttich’s study of
German IRC (1997: 234), the widespread use of du (T) and FN (first name) was at-
tributed to the informality of CMC, yet this was unmarked usage in FTF communi-
cation for the same age group (18–25), representing more than two-thirds of the
sample. Thus, interactional norms, rather than the medium of communication,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
304 Sandi Michele de Oliveira

were responsible for address choice. Related to this are unreflective assertions that
“everyone” uses “informal” address forms on the Internet, as participants them-
selves may claim (e.g., hier im großen internetz, wo sich alle dududuzen ‘here on
the big internets where everyone is on dududu [reciprocal du] terms’, Kretzen-
bacher 2005: 3). Such assertions are easily disproven, as Kretzenbacher himself
went on to do.
A third issue is the underutilization of discursive approaches. Within prag-
matics, discursive models have been shown to be useful to highlight the unfolding
aspect of communication (Haugh 2007; Locher 2006; Watts 2003). In CMC there
is a natural linear aspect to text-based communication, which should favor the use
of analytical techniques that focus on the unfolding nature of the communication.
While these have been employed to some extent (e.g., Garcia and Jacobs 1999;
Graham 2007), the negotiation of address terms over time is rarely the focus of
such studies. An apparent exception is Hongladarom and Hongladarom’s (2005)
analysis of exchanges within a Thai online community. Although they do not indi-
cate the overall scope of the data collected, the authors make reference to conver-
sational threads analyzed, one of which comprised 42 exchanges over four con-
secutive days (2005: 151). By examining entire conversational units, they were
able to identify marked, anomalous usage designed to defuse an argument, noting
various discursive remedies, or “face-balancing acts”, designed to “restore the
state of equilibrium in the course of heated discussions on this online forum” (155).
Types of face-balancing acts included use of joking references, irrelevant material,
and encouraging words. One example they cite of defusing a situation involves
making a joke using the addressee’s user name, “Prostate Gland”:
You know how to play thâanlûukmàak [(‘Mr. Prostate Gland’)]
If we don’t read [your discussion point] carefully, perhaps we’ll feel pain in our prostate
glands.
Hongladarom and Hongladarom (2005: 155)

In this example, joking and off-topic remarks serve as diversionary tactics to redi-
rect the attention not only of “Mr. Prostate Gland”, the principal addressee, but
of the other users as well. In addition to suggesting the value of sequential dis-
course analysis in the study of address online, this example clearly illustrates
a case where conventional notions of conversational politeness must give way to
localized interpretation.

5. Conclusions and perspectives for future research

This chapter has shown how the study of address has been shaped over the past five
decades, principally within two research traditions, sociolinguistics and prag-
matics, the latter with a particular focus on politeness research. The past few years

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 305

have brought greater convergence in perspectives, as researchers in each tradition


see theoretical and methodological advantages in viewing relationship manage-
ment from a discourse perspective. Politeness theoreticians advocating a discourse
perspective include Eelen (2001), Kerbrat-Orecchioni (1992), Koike (1992),
Locher (2006), Schiffrin (1994), and Watts (2003). Within the field of address
studies, Oliveira (2006, 2010) examines how relationships develop through dis-
course over time, specifying the interpretative boundaries for the communication
insiders and by outsiders. A discursive approach is also the direction Herring
(2003: 13) advocates with regard to CMC research in her study of “the discursive
negotiation and expression of social relations in cyberspace, including asymmetri-
cal relations”.
One of the challenges of reviewing address form studies in CMC is that the
number of studies that provide a superficial, and often very brief, look at address
is large, while the number of studies focusing on address in online environments
is still quite limited. Address is often on the periphery of research that focuses
on other phenomena, such as politeness. In discussing research on relational work,
Locher and Watts expressed a similar concern, noting that there is much more to
relational work than simply politeness and affirming that “other types of interper-
sonal meaning” are also important (2005: 10). In other words, they argue that re-
lational work should be centered, with politeness viewed as one component, rather
than the inverse. The same is true for address: For the study of address to advance,
it needs to be the central focus of research. To situate it otherwise is to obscure im-
portant relational work that address strategies perform. When researchers view ad-
dress forms as static identity markers, for instance, they employ a conventionalized
interpretative frame; as a result, usage that does not conform to social convention,
because the interlocutors have negotiated a form that happens not to conform, may
be misconstrued by outsiders who are unaware that the interlocutors are, in es-
sence, playing by their own rules.
Very few studies, offline or online, take a comprehensive approach to the study
of how address forms contribute to the establishment of new relationships (Stages
1 and 2 in the discursive model of address presented in section 2). Such an
approach could be built on the foundation Hastrdlová (2009) laid in her thorough
study of address in Internet Relay Chat. The work of Nishimura (2003) and
Aarsand (2008) also brings to the fore issues that merit further exploration. Nis-
himura adopted a systemic approach to the study of address in Japanese, seeking to
determine which non-address features (e.g., verb endings) accompanied the use (or
absence) of honorific forms. Researchers might look for features that co-occur with
address forms to determine whether there are non-address features playing a simi-
lar role in other languages. Aarsand contrasted online and offline communication
between the same participants. Researchers of languages with complex address
form systems might examine evidence to discover whether, while multitasking,
interlocutors mistakenly use the “wrong” form because they have forgotten whom

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
306 Sandi Michele de Oliveira

they are addressing. If such slippage occurs, how does it occur, and what is the
reaction of the other interlocutors? Are there any differences in the ways people ne-
gotiate the use of new forms in one channel as opposed to another? In what ways
does the CMC channel itself affect the development of address form relationships,
if it does?
In the section on greetings above, it was noted that either the greeting or the
address form might be omitted. Issues requiring further investigation include the
co-occurrence of greetings and address, the determination as to whether greetings
change over time in tandem with address, and the circumstances under which only
one of the two elements is included. For example, the absence of a nominal form in
a greeting is rarely considered a breach of polite behavior in English; a parallel
study to Cho’s (2010), analyzing data from a language in which the absence
or presence of a nominal form is a marker of politeness level, would be of interest,
as it would indicate the degree to which the “delegation” of status markers can be
left to the CMC system or must be overtly and directly handled by the individual
message sender.
The degree to which “economy of effort” (e.g., Herring 2003: 5) has an impact
on the selection or the presentation (writing, punctuation, etc.) of address forms, as
well as their interpretation by addressees, may be another fruitful area of research.
In European Portuguese, the V-pronoun você is conventionally considered impolite
by many speakers, who generally avoid its use in both oral and written communi-
cation. However, it is frequently used in SMS messages, usually in abbreviated
form (v or vc), among those one does not address by tu, because these forms are
much shorter than the other options normally used (e.g., FN, LN, TITLE + name).
Studies are needed to discover whether these and other abbreviations are used with
anyone to whom one sends a message, or whether social or professional differ-
ences generally impede the use of such economies of effort. Further study
is needed, in a variety of languages, to determine whether there is a tendency to
abbreviate or even omit address forms which are composed of title(s) plus name(s)
in fast-paced synchronous CMC, while still conforming to offline norms in asyn-
chronous CMC. Gottschalk (2010) considers whether abbreviated address forms in
German, such as SgDH for Sehr geehrte Damen und Herren (‘Dear Ladies and
Gentlemen’), are perceived as equally polite as non-abbreviated forms. As ab-
breviated forms are continuously being created in CMC channels, questions such
as these take on increasing importance.
One avenue of research gaining favor in CMC is the communities of practice
(CoP) approach (e.g., Abdelnour Nocera 2002; Murchú and Sorensen 2004; Zhang
and Watts 2008). Lave and Wenger (1991: 98), in their articulation of CoP, empha-
sized the development of relationships over time while engaging in shared activ-
ities and exchanging knowledge. Wenger (2006: 1), however, provides a more nar-
row definition, setting three conditions to establish that a CoP exists: There is a
“shared domain of interest”, a “community” of shared activities, and all members

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 307

must be “practitioners” of the field, as well as stressing that the focus is on the
learning of material. In CMC, as in offline environments, the use of address forms,
particularly nominals, in the transformation of an individual’s status from outsider
to insider is particularly interesting, as the choice of forms can index the specific
identity features that are in play. CoP research is ethnographic, emphasizing rela-
tionship management over time; as such, it is well suited to examining this function
of address.
CMC-based research can contribute to the study of address and, more broadly,
to pragmatics. As interlocutors can communicate online without sharing geo-
graphic space, many people have more frequent conversations throughout the day,
even if each conversation is of short duration, than they do in face-to-face com-
munication. Each new conversation provides an opportunity for speakers to re-
negotiate their address form relationship, hence greater frequency of contact trans-
lates into the possibility for an accelerated relation-building process. This process
is transparent to researchers as never before, because of the availability of persist-
ent computer-mediated textual records. The ability to track a relationship means
not only that shifts in address can be traced, but that usage that demonstrates a re-
sistance to change can also be viewed in its proper contextual framework. Also of
interest is the question of whether wide use of certain address forms in CMC event-
ually leads to their greater usage in offline communication.
Conversely, fine-grained analyses of pronominal and nominal address as they
occur in CMC can advance CMC research generally. How people establish and
maintain relationships through CMC, or through a combination of CMC and off-
line communication, is of central interest to CMC researchers, and solid research
on address is an important component of that research goal. Discursive approaches
are particularly well-suited to the study of relationship development and manage-
ment, making it possible for researchers to distinguish between address form
selection designed to move the relationship forward, on the one hand, or to achieve
a specific and immediate purpose (e.g., display mood, achieve a conversational
goal), on the other. Moreover, by not predetermining the degree of formality,
respect, or politeness that the address forms are presumed to convey, research
grounded in discourse can identify usage that differs from offline norms, either
in the form used or in the amount of time elapsed between initial contact and the
development of a stable address form relationship. In short, address in computer-
mediated discourse is a promising area of research deserving closer examination in
the future.

Acknowledgments

The author wishes to thank the volume editors for their close reading and insightful
comments on earlier drafts of this chapter.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
308 Sandi Michele de Oliveira

References

Aarsand, Pål André


2008 Frame switches and identity performances: Alternating between online and
offline. Text & Talk 28(2): 147–165.
Abdelnour Nocera, José L.
2002 Ethnography and hermeneutics in cybercultural research: Accessing IRC
virtual communities. Journal of Computer-Mediated Communication 7(2).
http://jcmc.indiana.edu/vol7/issue2/nocera.html
Arnaiz, Carmen
2006 Politeness in the portrayal of workplace relationships: Second person address
forms in Peninsular Spanish and the translation of humour. Journal of Polite-
ness Research 2: 123–141.
Austin, John L.
1962 How to Do Things with Words. The William James lectures Delivered at Har-
vard University – 1955. Oxford, UK: Clarendon.
Belz, Julie A. and Celeste Kinginger
2002 The cross-linguistic development of address form use in telecollaborative lan-
guage learning: Two case studies. The Canadian Modern Language Review/
La Revue canadienne des langues vivantes 59(2): 189–214.
Blum-Kulka, Shoshana
1992 The metapragmatics of politeness in Israeli society. In: Richard Watts, Sachiko
Ide, and Konrad Ehlich (eds.), Politeness in Language: Studies in its History,
Theory and Practice, 255–280. Berlin: Mouton de Gruyter.
Brown, Roger W. and Albert Gilman
1960 The pronouns of power and solidarity. In: Thomas Sebeok (ed.), Style in Lan-
guage, 253–276. Cambridge, MA: Massachusetts Institute of Technology Press.
Brown, Penelope and Stephen C. Levinson
1978 Universals of language usage: Politeness phenomena. In: Esther N. Goody
(ed.), Questions and Politeness Strategies in Social Interaction, 56–311. Cam-
bridge, UK: Cambridge University Press.
Brown, Penelope and Stephen C. Levinson
1987 Politeness: Some Universals in Language Usage. Cambridge, UK: Cambridge
University Press.
Bucholtz, Mary and Kira Hall
2005 Identity and interaction: A sociocultural linguistic approach. Discourse
Studies 7(4–5): 585–614.
Cho, Thomas
2010 Linguistic features of electronic mail in the workplace: A comparison with
memoranda. Language@Internet 7, article 3.
http://www.languageatinternet.org/articles/2010/2728
Chung, Yang-Gyun, Barbara Graves, Mari Wesche, and Marion Barfurth
2005 Computer-mediated communication in Korean-English chat rooms: Tandem
learning in an international languages program. The Canadian Modern Lan-
guage Review/La Revue canadienne des langues vivantes 62(1): 49–86.
Culpeper, Jonathan
1996 Towards an anatomy of impoliteness. Journal of Pragmatics 25: 349–367.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 309

Duthler, Kirk W.
2006 The politeness of requests made via email and voicemail: Support for the
Hyperpersonal Model. Journal of Computer-Mediated Communication 11(2),
article 6. http://jcmc.indiana.edu/vol11/issue2/duthler.html
Eckert, Penelope and Sally McConnell-Ginet
1992 Think practically and look locally: Language and gender as community-based
practice. Annual Review of Anthropology 21: 461–490.
Eelen, Gino
2001 A Critique of Politeness Theories. Manchester, UK: St. Jerome’s Press.
Eisenchlas, Susana A.
2011 On-line interactions as a resource to raise pragmatic awareness. Journal of
Pragmatics 43(1): 51–61.
Ervin-Tripp, Susan M.
1972 On sociolinguistic rules; alternation and co-occurrence. In: John J. Gumperz
and Dell Hymes (eds.), Directions in Sociolinguistics, 213–250. New York:
Holt, Rinehart, and Winston.
Gains, Jonathan
1999 Electronic mail – a new style of communication or just a new medium? An in-
vestigation into the text features of email. English for Specific Purposes 18(1):
81–101.
Gal, Susan
2008 Language ideologies compared. Journal of Linguistic Anthropology 15(1):
23–37.
García, Angela C. and Jennifer B. Jacobs
1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer-mediated communication. Research on Language and
Social Interaction 32(4): 337–367.
Gottschalk, Enrico
2010 Sprachliche Höflichkeit im E-Mail-Verkehr. Munich: GRIN Verlag.
Graham, Sage Lambert
2007 Disagreeing to agree: Conflict, (im)politeness and identity in a computer-
mediated community. Journal of Pragmatics 39: 742–759.
Hastrdlová, Šárka
2009 Language of Internet Relay Chat (reconsidering (im)politeness in the context of
IRC). Ph.D. dissertation, University of Masarykova at Brno (Czech Republic).
http://is.muni.cz/th/56286/ff_d_b2/Dizertacni_prace_09_final_version.doc
Hatipoğlu, Çiler
2007 (Im)politeness, national and professional identities and context: Some evi-
dence from emailed ‘Call for Papers’. Journal of Pragmatics 39: 760–773.
Haugh, Michael
2007 The discursive challenge to politeness research: An interactional approach.
Journal of Politeness Research 3: 295–317.
Herring, Susan C.
1994 Politeness in computer culture: Why women thank and men flame. In: Mary
Bucholtz, Anita Liang, Laurel Sutton, and Caitlin Hines (eds.), Cultural Per-
formances: Proceedings of the Third Berkeley Women and Language Confer-
ence, 278–294. Berkeley, CA: Berkeley Women and Language Group.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
310 Sandi Michele de Oliveira

Herring, Susan C.
1996 Two variants of an electronic message schema. In: Susan C. Herring (ed.),
Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural
Perspectives, 81–108. Amsterdam/Philadelphia: John Benjamins.
Herring, Susan C.
2003 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi E. Hamilton (eds.), Handbook of Discourse Analysis, 612–634. Oxford,
UK: Blackwell.
Hess-Lüttich, Ernest W. B.
1997 E-Epistolographie: Briefkultur im Medienwandel. In: Andreas Hepp and
Rainer Winter (eds.), Kultur – Medien – Macht: Cultural Studies und Medien-
analyse, 225–246. Opladen: Westdeutscher Verlag.
Hongladarom, Krisadawan and Soraj Hongladarom
2005 Politeness in Thai computer-mediated communication. In: Robin T. Lakoff and
Sachiko Ide (eds.), Broadening the Horizon of Linguistic Politeness, 145–162.
Amsterdam/Philadelphia: John Benjamins.
Hymes, Dell H.
1974 Foundations of Sociolinguistics: An Ethnographic Approach. London: Routledge.
Kerbrat-Orecchioni, Cathérine
1992 Les interactions verbales. Volume 2. Paris: Armand Colin.
Kinginger, Celeste
2000 Learning the pragmatics of solidarity in the networked foreign language class-
room. In: Joan Kelly Hall and Lorrie Stoops Verplaetse (eds.), Second and
Foreign Language Learning through Classroom Interaction, 23–46. Mahwah,
NJ: Lawrence Erlbaum Associates.
Koike, Dale April
1992 Language and Social Relationship in Brazilian Portuguese: The Pragmatics of
Politeness. Austin, TX: University of Texas Press.
Kretzenbacher, H. Leo
2005 “Hier im großen internetz, wo sich alle dududuzen” [‘Here on the big internets,
where everyone is on dududu terms’]: Internet discourse politeness and Ger-
man address. Paper presented at the 3rd International Conference on Language
Variation in Europe (ICLaVE), Amsterdam.
http://www.rumaccc.unimelb.edu.au/address/Internetaddress.pdf
Labov, William
1970 The study of language in its social context. Studium Generale 23: 30–87.
Lakoff, Robin
1973 The logic of politeness: Or minding your p’s and q’s. Chicago Linguistics So-
ciety 8: 292–305.
Lave, Jean and Étienne Wenger
1991 Situated Learning: Legitimate Peripheral Participation. Cambridge, UK: Uni-
versity of Cambridge Press.
Leech, Geoffrey
1983. Principles of Pragmatics. London: Longman.
LeMond, Malia Michele
2004 Synchronous computer-mediated team-based learning in the Spanish foreign
language classroom. Ph.D. dissertation, University of Texas at Austin. http://
www.lib.utexas.edu/etd/d/2004/lemondm74875/lemondm74875.pdf#page=3

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 311

Locher, Miriam A.
2006 Polite behavior within relational work: The discursive approach to politeness.
Multilingua 25: 249–267.
Locher, Miriam A. and Richard J. Watts
2005 Politeness theory and relational work. Journal of Politeness Research 1: 9–33.
Medeiros, Sandi Michele de Oliveira
1985 A model of address form negotiation: A sociolinguistic study of continental
Portuguese. Ph.D. dissertation, University of Texas at Austin.
Medeiros, Sandi Michele de Oliveira
1994 Winning friends and influencing people abroad: Using native speakers’ com-
municative strategies. Intercultural Communication Studies IV(1): 23–44.
Mills, Sara
2009 Impoliteness in a cultural context. Journal of Pragmatics 41: 1047–1060.
Murchú, Daithí Óand Elsebeth Korsgaard Sorensen
2004 Online master communities of practice: Collaborative learning in an intercul-
tural perspective. European Journal of Open and Distance Learning, 2004/I.
http://www.eurodl.org/materials/contrib/2004/Identifying_COPs.html
Murray, Dennis E.
2000 Protean communication: The language of computer-mediated communication.
TESOL Quarterly 34(3): 397–421.
Myers-Scotton, Carol
1983 The negotiation of identities in conversation: A theory of markedness and code
choice. International Journal of the Society of Language 44: 115–136.
Nishimura, Yukiko
2003 Linguistic innovations and interactional features of casual online communi-
cation in Japanese. Journal of Computer-Mediated Communication 9(1).
http://jcmc.indiana.edu/vol9/issue1/nishimura.html
Nyugen, Hanh Thi and Guy Kellogg
2005 Emergent identities in on-line discussions for second language learning. The
Canadian Modern Language Review/La Revue canadienne des langues viv-
antes 62(1): 111–136.
Oliveira, Sandi Michele de
2003 Breaking conversational norms on a Portuguese users network: Men as adjudi-
cators of politeness? Journal of Computer-Mediated Communication 9(1).
http://jcmc.indiana.edu/vol9/issue1/oliveira.html
Oliveira, Sandi Michele de
2005 A retrospective on address in Portugal (1982–2002): Rethinking power and
solidarity. Journal of Historical Pragmatics 6(2): 307–323.
Oliveira, Sandi Michele de
2006 A strategic model of address. In: Irma Taavitsainen, Juhani Härmä, and Jarmo
Korhonen (eds.), Dialogic Language Use, 147–158. Mémoires de la Société
Néophilologique de Helsinki, LXVI. Helsinki: Société Néophilologique.
Oliveira, Sandi Michele de
2009 Negotiating identity, conflict, and cooperation within a strategic model of ad-
dress. In: Ann Denis and Devorah Kalekin-Fishman (eds.), The ISA Handbook
in Contemporary Sociology, 416–432. London: Sage Publication.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
312 Sandi Michele de Oliveira

Oliveira, Sandi Michele de


2010 La integración de la teoría y la metodología como desencadenante de un nuevo
modelo de formas y fórmulas de tratamiento. In: Martin Hummel, Bettina
Kluge, and María Eugenia Vázquez Laslop (eds.), Formas y fórmulas de tra-
tamiento en el mundo hispánico, 57–77. Mexico City: El Colegio de México &
Vervuert/Iberoamericana.
Postmes, Tom, Russell Spears, and Martin Lea
2000 The formation of group norms in computer-mediated communication. Human
Communication Research 26(3): 341–371.
Rintel, E. Sean, Joan Mulholland, and Jeffery Pittam
2001 First things first: Internet Relay Chat openings. Journal of Computer-Mediated
Communication 6(3). http://jcmc.indiana.edu/vol6/issue3/rintel.html
Schiffrin, Deborah
1994 Approaches to Discourse. Oxford, UK: Blackwell.
Schulze, Markus
1999 Substitution of paraverbal and nonverbal cues in the written medium of IRC.
In: Bernd Naumann (ed.), Dialogue Analysis and the Mass Media. Proceed-
ings of the International Conference in Erlangen, April 2–3, 1998, 65–82.
Beiträge zur Dialogforschung 20. Tübingen: Niemeyer.
Silverstein, Michael
2003 Indexical order and the dialectics of sociolinguistic life. Language & Com-
munication 23: 193–229.
Smith, Christine B., Margaret L. McLaughlin, and Kerry K. Osborne
1997 Conduct control on Usenet. Journal of Computer-Mediated Communication
2(4). http://jcmc.indiana.edu/vol2/issue4/smith.html
Smith, Dan
2001 The problem of essentialism. In: Inger Skjelsboek and Dan Smith (eds.),
Gender, Peace and Conflict (International Peace Research Institute, Oslo),
32–46. London: Sage.
Terkourafi, Marina
2004 Testing Brown and Levinson’s theory in a corpus of spontaneous conversa-
tional data from Cypriot Greek. International Journal of the Sociology of Lan-
guage 168: 119–134.
Vinagre, Margarita
2008 Politeness strategies in collaborative e-mail exchanges. Computers & Edu-
cation 50: 1022–1036.
Waldvogel, Joan
2007 Greetings and closings in workplace email. Journal of Computer-Mediated Com-
munication 12(2), article 6. http://jcmc.indiana.edu/vol12/issue2/waldvogel.html
Watts, Richard J.
2003 Politeness. Cambridge, UK: Cambridge University Press.
Wenger, Etienne
1998 Communities of Practice: Learning, Meaning, and Identity, Cambridge, UK:
Cambridge University Press.
Wenger, Etienne
2006 Communities of practice: A brief introduction.
http://www.ewenger.com/theory/communities_of_practice_intro.htm

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
Address in computer-mediated communication 313

Zhang, Wei and Stephanie Watts


2008 Online communities as communities of practice: A case study. Journal of
Knowledge Management 12(4), 55–71.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
314 Sandi Michele de Oliveira

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:42 PM
13. Apologies in email discussions
Sandra Harrison and Diane Allton

1. Introduction

The apology is of central interest in the field of politeness, involving participants in


resolving interactional problems: “[I]t is perhaps the example par excellence of
politeness at work” and has been a focus of pragmatics research in recent years
(Grainger and Harris 2007: 1). However, most of this research has focused on the
apology in spoken language: Very little is known about apology use in interactive
electronic media. This chapter seeks to extend understanding of apologies through
analysis of a corpus of apologies found in naturally-occurring email discussions. It
explores these apologies in the light of what is known about apologies in spoken
discourse, to discover whether there are any distinctive patterns of apology use in
email discussions. Specifically, the following questions are addressed: (1) How do
participants apologise in email discussions? (2) What kinds of offences are apolo-
gised for? and (3) Are there any differences in the apology behaviour of male and
female participants?1

2. Literature review

Two related themes in the literature are of particular relevance to this chapter:
What counts as an apology, and to what extent is sincerity important? This section
explores these themes.
Making comparisons with the legal system, Goffman’s seminal work on
apologies (1967, 1971) considered how speakers deal with lesser offences that
nevertheless need to be addressed in order to maintain social order. Goffman’s
focus was on how offences are remedied, apologies being part of a “Remedial In-
terchange” in which the essential components are the offender, the offended, and
the offence. Important in Goffman’s concept of the apology are evidence of regret
on the part of the offender, as well as evidence of acknowledgement or acceptance
on the part of the offended (1971: 90). Indeed, the “Remedial Interchange” can be a
four-part exchange, with the offended drawing attention to the offence, the of-
fender apologising, the offended accepting the apology, and the offender express-
ing thanks for forgiveness received (1967: 20–22). Goffman (1971: 143) identified
a variety of strategies that can be found in an apology:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
316 Sandra Harrison and Diane Allton

expression of embarrassment and chagrin; clarification that one knows what conduct
had been expected and sympathizes with the application of negative sanction; verbal re-
jection, repudiation, and disavowal of the wrong way of behaving along with vilification
of the self that so behaved; espousal of the right way and an avowal henceforth to pursue
that course; performance of penance and volunteering of restitution.

Thus Goffman offers insights into what happens when an apology occurs between
two people in a face-to-face situation to address a significant offence, although he
does acknowledge that there is a ritual aspect to an apology which allows partici-
pants “to act as if they feel that matters are closed and that ritual equilibrium has
been restored” (1971: 173).
Subsequent researchers have grappled with the problem of sincerity and of
apologies made for trivial offences. Owen (1983: 119,121) considers that it is not
essential for the speaker to regret the offence. She suggests distinguishing between
“heartfelt” and “routine” apologies, and discusses one solution, to replace sincerity
with consistency: The apologiser would be expected to refrain from re-offending.
Holmes (1995: 164–5) introduces the concept of “appropriate apology behaviour”
which varies according to “power, social distance, and the seriousness of the of-
fence”. More recently, Deutschmann (2003) attempted to devise categories that
would accommodate all of the apologies in his British National Corpus data, al-
though this necessitated forming judgments about their sincerity, which he ac-
knowledged as problematic. In attempting this he tackles the problem of utterances
that look like apologies but have a different illocutionary force, categorising
apologies as genuine, formulaic, and face attack apologies.
Brown and Levinson discuss apologies as negative politeness strategies used to
mitigate face threatening acts (1987). However, Mills problematises Brown and Le-
vinson’s approach, seeing apologies as “complex negotiations between interactants
over status and over who is seen to be ‘in the right’” (2003: 61). Important factors are
“the right amount of effort and work” and the expression of “sufficient commitment
and sincerity” (112). Lakoff (2001) considers that making an apology is more im-
portant than sincerity, pointing out that there are circumstances where a token
apology is more acceptable than one with all the features of a genuine apology, and
Locher and Watts discuss the concept of facework that is “merely appropriate”
(2005: 9). These recent studies offer approaches to what participants would un-
doubtedly recognise as apologies, but where the offence is trivial, the regret by the
offender is not very great, and the apology receives no acknowledgement.
Although Goffman (1971) claimed that acknowledgement of the apology is es-
sential, later work has questioned this. Owen (1983) found that apologies for very
trivial offences often go without acknowledgement or acceptance, but that for
more significant offences absence of response is equivalent to withholding accept-
ance and confirms the offence. This is in keeping with Holmes’ finding (1995) that
people usually respond by accepting the apology. In contrast, Tannen (1992a)
shows that accepting an apology where the apology is intended to be ritual and ex-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 317

pressive of sympathy is tantamount to agreeing that the apologiser was at fault.


“From the point of view of connection, an apology should be matched. And from
the perspective of status, an apology should be deflected” (Tannen 1992b: 234).
Holmes was working with New Zealand data and Tannen with data from the
United States, but it is possible to reconcile their conflicting findings. For a genu-
ine apology relating to a significant offence, acknowledgement or acceptance of
the apology is important, and withholding such response is equivalent to leaving
the matter unclosed. However, where the offence is trivial, or where the apology is
used to express sympathy or concern, accepting the apology confirms that an of-
fence has taken place.
Much of the above work assumes that the apology follows the offence, but for
minor offences this is not necessarily the case. Indeed, Brown and Levinson (1987:
189) give examples of apologies, “Excuse me, but …”, “I’m sorry to bother you …”,
which precede the offence. Goffman (1971: 144) also notes that apologies can occur
prior to the offence, and Deutschmann (2003: 60–61) classifies apologies as either
“Anticipatory” or “Retrospective”. Davies, Merrison, and Goddard (2007: 48)
examine the timing of apologies in their student email data and conclude that “if
the apologiser can demonstrate that the act is truly not avoidable (even though it
has not yet happened), then the apology can be made with due sincerity”.
Published reports on apology behaviour of males and females are not consist-
ent, although most suggest that women apologise more than men. Holmes (1995:
157) found that women gave 75 % of the apologies in her data and received 73 % of
them. Deutschmann found that in his study “females tended to apologise more in
formal than in informal situations, whereas the opposite pattern was observed
among males” (2003: 140). Similarly, Herring (1993, 1994, 2003) has found that
women generally engage in more acts of politeness online than do men; specifi-
cally, in an early study of two academic email discussion lists, Herring (1993)
found that apologies occurred more often in women’s messages than in men’s.
Little has been published on apologies in email, although two recent papers have
begun to explore this phenomenon: Hatipoğlu (2005) and Davies et al. (2007). Hati-
poğlu examines the form and relative frequency of explicit apologies in a corpus of
126 naturally-occurring email apologies collected at an academic institution. Fol-
lowing Baron (1998), she divides these into one-to-one and one-to-many, and
further divides the one-to-many into two sub-groups according to whether writers
were apologising for their own mistakes or apologising in a professional capacity.
Davies et al. (2007) discuss a corpus of 100 naturally-occurring email apologies
sent by undergraduate students to lecturers. They classify the students’ apologies
according to whether they refer to an event which was internal or external to email,
and whether the apologies refer to a past, present, or future event. However, Davies
et al.’s data differ from our own email discussion data in important respects: In par-
ticular, their apologies were made to one individual who was known to the sender,
and the recipient was in a high power position with respect to the apologiser.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
318 Sandra Harrison and Diane Allton

3. Data and method

The data used in this study are from email discussion lists with academic or pro-
fessional themes (in contrast to discussion lists with recreational or social network-
ing purposes); participants include academics, practitioners, students, and other in-
terested parties. The advantages of such data are that they are naturally occurring,
and they are not influenced by the presence of the researcher. Although some par-
ticipants may have met each other outside the group or have knowledge about the
work of other participants, the only knowledge readily available to all of the par-
ticipants on a list is that which is found in the message text. Thus the entire dis-
cussion takes place through the medium of email, and the researcher has the same
access to the text as did the participants. Most participants give their first names,
and most of these are gender specific, although in emails it is possible to try to dis-
guise one’s gender by using a gender-neutral name, nickname, or initial, or even
adopting a name of the opposite gender (Baldwin 1996). However, many participants
give their affiliations, and several reference their own publications, so it is clear in
most cases that participants are using their own names. The gender of the sender
was identified in 99 % of the messages and in 99 % of the apologies (see Table 2).
A corpus of problematic incidents was collected by “specimen sampling” (ten
Have 1999: 50–51) from discussion list archives publicly available on the Jiscmail
website (participants are informed on joining a list that their discussions will be
made available in this way). Episodes were selected that contained problematic
incidents such as hostility, miscommunication, or deliberate offences, as well as
non-hostile disagreements. The data used for the apology study are 24 samples
taken from each of eight listserv lists covering a range of topics, including
Geography, Management, and Humour Research. Each sample covers a period of
one month and contains all of the messages sent to that list during the month. Be-
cause of our interest in problematic incidents, each sample includes an episode
such as hostility, miscommunication, a deliberate offence, or non-hostile disagree-
ment, although by including all of the messages for each selected month there is
much that is unrelated to these incidents, including announcements and requests
for information. By using this particular set of data for our study, we hoped to find a
wide range of apology strategies, including apologies related to the problematic
incidents and apologies that occurred during the normal business of the discussion
groups. In the examples below, names have been replaced by FN (first name) and
LN (last name), and any contact details have been removed. The examples retain
the spelling and grammar of the originals.
The total number of messages in the 24 samples is 2,420, and the total word
count, including headers and quotations, is 1,849,397. Because of the size of this
corpus, it was decided to adopt the practice followed by earlier researchers (Blum-
Kulka, House, and Kasper 1989; Deutschmann 2003; Owen 1983) of searching for
apologies using selected word forms, although the authors recognised that this

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 319

would exclude any apologies which used other forms or which were expressed in-
directly. The selection of word forms for our study is based on the apology IFIDs
(Illocutionary Force Indicating Devices) listed in the Cross-Cultural Speech Act
Realization Project (CCSARP) coding manual (Blum-Kulka, House, and Kasper
1989: 290): sorry, excuse, apologise, forgive, pardon, regret, and afraid. Prelimi-
nary observations of the data suggested that it would be important to distinguish
the use of “apologies” from “apology”: “Apologies” is used in a distinctive way
and will be discussed in detail below. Thus the search terms used for this study are:
apology, apologise, apologize, apologies, sorry, forgive, forgiveness, excuse,
afraid, regret, pardon. All occurrences of these forms in our data were checked
manually to exclude quotations, reported speech, and words used in a sense other
than the expression of an apology, e.g., “I don’t have to excuse my actions”.
This procedure generated a corpus of 260 apologies. A small number of these
apologies contained more than one apology lexeme, as in “I ask pardon and for-
giveness”. Thus the total number of apology expressions, 278, is slightly higher
than the total of the apologies. In the tables below, the 24 samples are numbered
1–24. Samples from the same list are shown consecutively, and the eight lists are
labelled A-H.

4. Apology forms

The frequency of apology lexemes in our data is shown in Table 1. In the email dis-
cussion data, “apologies” is the most frequently-used form, with 117 occurrences
out of a total of 278 (42.1 %). If we sum all the forms of this lexeme, i.e.,
“apology”, “apologies”, “apologise”, and “apologize”, this total rises to 137 out of
278 (49.3 %). This is in contrast to earlier studies which found that “sorry” was the
most frequently-used form: Owen (1983: 65), who collected data from telephone
calls and recordings in shops, notes that “sorry” is “[b]y far the commonest” form;
Holmes (1995: 161) includes “I’m sorry” in her category “expression of regret”,
which accounts for 53.3 % of female and 42 % of male apologies in her New Zeal-
and workplace corpus; and Deutschmann (2003) finds that “sorry” is used in
59.2 % of cases in his BNC data. Thus “sorry” was found to be the most com-
monly-used form in all three of these widely different spoken corpora. However,
Hatipoğlu (2005) found that whereas in personal (one-to-one) emails, an ex-
pression of regret such as “sorry” was the most frequently-used form (85.7 %), in
professional (one-to-many) emails where the apologiser was apologising in role,
the most common form was an “offer of apology (e.g., I apologise)” (97 %). In our
own data, “sorry” was the second most-frequently used form in the data, account-
ing for 92 instances out of 278 (33.1 %). A variety of other forms were used, albeit
much less frequently.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
320 Sandra Harrison and Diane Allton

Table 1. Frequency of apology terms in the data

Search term Number of occurrences Percentage of total


apologies 117 42.1 %
sorry 92 33.1 %
forgive 17 6.1 %
afraid 14 5.0 %
apologise 13 4.7 %
apologize 6 2.2 %
excuse 6 2.2 %
pardon 6 2.2 %
regret 4 1.4 %
forgiveness 2 0.7 %
apology 1 0.4 %
Total 278

Owen (1983: 63–65) found that “The use of type (i) [apology, apologies, or
apologise] is rare in spoken English; it is used when either formality or absolute
unambiguity is required”. She had only two occurrences in spoken language, one
very formal and one found in a lecture. The other occurrences in her data were
found in written form. The prevalence of “apologies” in the email discussion data
could therefore be related to the fact that the data are written. However, another
possibility is that use of the noun form enables the writer to avoid the personal pro-
noun, creating a distance between the writer and the responsibility for the offence
(Hatipoğlu 2005).
Considerable variation characterises the lexeme use of different lists. Thus
while “apologies” is the most frequently-found form overall, it does not occur at all
in the samples from list D; and while “forgive” is uncommon, it occurs in all of the
samples from lists E and G.

5. Male and female apology behaviour2

Because our data samples were selected to contain problematic incidents, which
have been found to be associated with males in online communication (Herring
1993, 1994), we predicted that we would find greater participation (more mess-
ages) by males, and this was indeed the case. As shown in Table 2, males con-
tributed 1719 (71 %) of our messages (total 2420), while females contributed 674
(28 %) (note that totals are less than 100 % because the gender of a very small
number of writers could not be identified). In contrast to the findings on male and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 321

Table 2. Male and female apologies and messages

Sample List Total apologies Total messages


M M F F ?* ?* Over- M M F F ?* ?* Over-
% % % all % % % all
total total
1 A 11 61 7 39 18 64 72 23 26 2 2 89
2 A 8 73 3 27 11 83 79 20 19 2 2 105
3 A 12 75 4 25 16 53 70 22 29 1 1 76
4 B 17 94 1 6 18 75 92 5 6 2 2 82
5 B 4 57 3 43 7 35 80 8 18 1 2 44
6 B 2 50 2 50 4 18 90 2 10 20
7 C 16 94 1 6 17 152 61 95 38 3 1 250
8 C 12 80 3 20 15 73 66 36 33 1 1 110
9 C 1 20 2 40 2 40 5 46 44 50 48 9 9 105
10 D 2 67 1 33 3 36 92 3 8 39
11 D 1 100 0 0 1 23 89 3 12 26
12 D 2 100 0 0 2 25 100 0 0 25
13 E 2 40 3 60 5 43 75 13 23 1 2 57
14 E 5 100 0 0 5 48 86 8 14 56
15 E 23 85 4 15 27 120 80 30 20 150
16 F 2 50 2 50 4 41 54 34 45 1 1 76
17 F 14 70 6 30 20 222 62 136 38 358
18 F 1 100 0 0 1 7 37 11 58 1 5 19
19 G 12 71 5 29 17 115 84 20 15 2 2 137
20 G 24 67 12 33 36 160 78 46 22 206
21 G 13 77 3 18 1 6 17 148 89 17 10 1 1 166
22 H 0 3 100 3 40 58 29 42 69
23 H 1 50 1 50 2 10 44 13 57 23
24 H 6 100 0 0 6 82 62 50 38 132
TOTAL 191 73 66 25 3 1 260 1719 71 674 28 27 1 2420

Percentages rounded
*? Signifies gender not identified

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
322 Sandra Harrison and Diane Allton

female apology behaviour discussed above, the majority of apologies in our data
are made by males, although the overall percentage of apologies by gender is very
similar to the overall percentage of messages sent: males 191 apologies (73 %),
females 66 (25 %). However, the overall pattern masks variation in individual
samples: Looking at samples where the difference is at least 5 %, we see that men
are overrepresented in apologies relative to number of messages in samples 3, 7, 8,
11, 14, 15, 17, 18, 23, 24 (10 samples in total), while women are overrepresented in
apologies in samples 1, 2, 5, 6, 10, 13, 16, 19, 20, 21, 22 (11 samples in total).

6. Apologies and turns

The ratio of apologies to turns (i.e., messages) varies widely from one data sample
to another, ranging from one apology in 26 turns (sample 11, ratio of 1:26) to 16
apologies in 76 turns (sample 3, ratio of 1:4.6). Across all samples, the average
ratio of apologies to turns is 1:9.3. For men, the overall ratio is 1:9, and for women,
1:10.2. Thus men make overall slightly more apologies in relation to turns than
women, but the variation across different data logs is so great that this difference is
not significant. Our overall ratio of apologies to turns seems remarkably high;
compare Deutschmann’s finding of 1 apology to 165.6 turns (2003: 51). However,
we would expect to find a higher incidence in data that have been selected to in-
clude problematic incidents. Moreover, messages in email often carry the interac-
tion further than is usual for turns in conversation (Harrison 2007), and each mess-
age can include an accumulation of moves that in spoken conversation would
normally require several turns.
In contrast to spoken conversation, apologies in email discussions are often
made to all of the participants. In our data, 66.5 % (n=173) of apologies were made
to the whole group (e.g., examples 2, 5), 29.6 % (n=77) to individuals (e.g.,
examples 4, 20), and 3.8 % (n=10) to a sub-group as defined by the writer, such as
the following, where the writer is apologising to those for whom the message
would be irrelevant:
(1) Apologies to those of you not going to New Orleans

7. Strategies and offences

Many of the offences found in face-to-face conversation, such as interrupting or


coughing, are not relevant to email discussions (for a categorisation of offences,
see Holmes 1995: 167). Indeed, almost all of the apologies in our corpus relate to
the content or language of email discussions, or to the technology that supports
email discussions.3 The email discussion apologies can be grouped into four broad
categories: (1) apologies accompanying trivial offences deliberately committed,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 323

such as a cross-posting or a long message; (2) retrospective apologies for minor of-
fences, such as sending a blank message or giving an incorrect website address; (3)
retrospective apologies for more serious offences where the tone or the content has
caused offence; and (4) instances in which the form of the apology is subverted and
used for challenges, sarcasm, or joking (see Table 3).

Table 3. Apology categories

Sample List 1. Apologies 2. Retrospective 3. Retrospective 4. Challenges, Total


accompany- apologies apologies sarcasm
ing trivial for minor for serious and joking
offences offences offences apologies
1 A 16 2 18
2 A 7 2 2 11
3 A 14 1 1 16
4 B 8* 3 1 7* 18*
5 B 6 1 7
6 B 4 4
7 C 3 7 5 2 17
8 C 7 6 1 1 15
9 C 2 3 5
10 D 2 1 3
11 D 1 1
12 D 1 1 2
13 E 4 1 5
14 E 4 1 5
15 E 13 14 27
16 F 3 1 4
17 F 3 11 3 3 20
18 F 1 1
19 G 6 11 17
20 G 8 17 9 2 36
21 G 7 9 1 17
22 H 1 2 3
23 H 2 2
24 H 1 4 1 6
TOTAL 95* 107 37 22* 260*

*Sample 4 has one apology, for “length and simplicity”, which realises both categories 1 and
4. This is entered in both columns but is added into the total column once only. See dis-
cussion of example 27.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
324 Sandra Harrison and Diane Allton

It should be noted that while it is straightforward to identify prototypical examples


of the four categories of apology, there are borderline instances where it is not clear
how serious the offence was considered to be, nor how genuine the apology was.
The authors used contextual information from the apology message itself and from
the surrounding messages to assist in determining classification.

7.1. Category (1): Apologies accompanying trivial offences


This category includes apologies for offences that are very minor and where the
apology occurs in the same message as the offence, suggesting that the offender
does not regret the offence and does not intend to abstain from committing the
same offence in future. Indeed, these offences typically will be committed again:
The writers could have abstained from cross-posting or shortened their long posts,
but instead they have chosen to send the offending message accompanied by an
apology. Although these apologies are realised by various forms, they are typically
short, not personalised, and not accompanied by additional strategies such as ex-
planations or intensifiers. In total, 95 apologies were classified as category (1) of-
fences (37 % of the total).
A prototypical example of this category is the common and highly conven-
tionalised cross-posting apology, which frequently takes the form “apologies for
the cross-posting”. A cross-posting occurs when the sender sends the same mess-
age to more than one list, for example to announce a conference or job vacancy.
This is a minor inconvenience for those who receive the message more than once.
The apology is made in the same message, to the whole group, and typically posi-
tioned before the offence. In our corpus, the occurrence of cross-posting apologies
varied greatly across samples: 42 % of the samples (n=10) had no cross-posting
apologies; indeed, none of the samples from lists D, E, and H (samples 10–12,
13–15, and 22–24) had any cross-postings at all. In contrast, 17 % (n=2) of the
samples had only cross-posting apologies (samples 6 and 18). Overall, apologies
for cross-postings accounted for 28 % of apologies in the data (n=73).
Although this offence is entirely avoidable, the cross-posting apology serves
two useful functions: It serves as a warning that the writer is carrying out a cross-
posting, the absence of which might result in complaints about messages received
more than once, and it recognises that the writer is potentially causing a minor in-
convenience, thereby doing appropriate face work – a public acknowledgement
that the reader has needs and that the writer respects them. It is worth noting here
that participants in email discussions are very ready to engage in metadiscussion
(Connery 1997; Kolb 1996) and are very willing to complain about inappropriate
tone and content (Harrison 2004; Smith, McLaughlin, and Osborne 1997), but on
no occasion in the data does a participant suggest that an apology was unnecessary.
We can therefore conclude that participants consider these apologies to be appro-
priate and relevant, even though they are never acknowledged.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 325

Table 4. Cross-posting apologies

Sample List No. of apologies for cross-posting Total apologies in sample


1 A 12 18
2 A 5 11
3 A 13 16
4 B 6 18
5 B 6 7
6 B 4 4
7 C 2 17
8 C 5 15
9 C 2 5
10 D 0 3
11 D 0 1
12 D 0 2
13 E 0 5
14 E 0 5
15 E 0 27
16 F 0 4
17 F 2 20
18 F 1 1
19 G 6 17
20 G 5 36
21 G 4 17
22 H 0 3
23 H 0 2
24 H 0 6
73 260

Cross-posting apologies are “formulaic” (Deutschmann 2003 passim), but their


forms contrast with the formulaic apologies in Deutschmann’s data, which typi-
cally consist of a single word and where there is “rarely” any reference to the of-
fence (71). It is necessary in email to specify what one is apologising for, as this
cannot be deduced from the physical context – hence the explicit reference to the
“cross-posting” offence.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
326 Sandra Harrison and Diane Allton

The widespread use of the noun form “apologies” is noteworthy: It enables


writers to distance themselves and minimise their responsibility for the offence.
Hatipoğlu (2005: 6) suggests that writers use “apologies” when they are apologis-
ing in a role (e.g., as the representative of an organisation). When they are speaking
personally, they use other forms, typically “sorry”. However, in our data the use of
“apologies” alone (without a possessive pronoun or accompanying strategy) seems
to be associated with offences that are minor, whether or not these are made “in
role”. Of course, those who make cross-postings are usually acting for an organi-
sation of some kind, but other apologies from category (1), e.g., for a long mess-
age, also frequently take the form “apologies”, even though the writer may not be
apologising in role. When writers use this form, they may simply be following con-
vention without consciously seeking to minimise their responsibility; nonetheless,
the established convention incorporates a distancing from the offence.
Category (1) apologies for offences other than cross-postings are typically real-
ised by a greater variety of forms, although they are similarly brief. Many
apologies in email discussions are related to violations of netiquette (conventions
for online behaviour). Netiquette rules are summarised in various locations online,
and include, for example, “Messages and articles should be brief and to the point”
(RFC1855 2006). Thus we find apologies for posts that stray from the designated
purpose of the list:
(2) Sorry I know this is a bit off topic.
and apologies for long messages:
(3) Excuse the length of this post.
Example (3) is found at the start of a long post (1,328 words, excluding quotation
and elements generated by the software): Readers will encounter the apology at the
start of the message, where it serves not only as a formulaic apology, but also as a
warning about the length of the message, allowing readers to opt out before reading
the rest, if they wish. Elsewhere, apologies for long posts can be found positioned
after the offence, albeit in the same message as the offence.
In category (1) the apologiser shows little sign of regret. This is appropriate to
the nature of the offences, which are trivial inconveniences. There is similarly no
indication that the offender plans to refrain from re-offending; indeed the opposite
is likely to be the case, but the offender is demonstrating an appropriate appreci-
ation of the readers’ concerns. Moreover, none of these apologies is ever accepted
or acknowledged: This could be both because the offences are trivial and because
the apologies are made to the whole group. There is no opportunity to prompt for
apology (the apology is in the same message as the offence), and there are seldom
any accompanying strategies such as explanations.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 327

7.2. Category (2): Retrospective apologies for minor offences


This category consists of apologies sent in subsequent messages for minor offences
such as sending blank messages, giving incorrect website addresses, accidentally
sending messages to the wrong recipients, and spelling mistakes. Category (2) ac-
counts for 41 % of the apologies in our corpus (n=107).
Some of the strategies identified by Goffman (1971) as discussed in the litera-
ture review above accompany category (2) apologies.
Category (2) apologies may be addressed to the whole group, but where appro-
priate they may instead be addressed to individuals, as in example (4). Here the
writer has previously sent his message to an individual instead of to the whole
group, and he now forwards it to the group:
(4) Ooops! It went to FN. Once more to the list (sorry FN) …
He apologises to the individual concerned with the brief “sorry” but prefaces this
with an explanation of what has happened and uses “Ooops” to signal informally
that this is an accident.
On occasions, apologetic messages provide evidence that the offence has been
pointed out by another participant, either privately or in a message to the whole
list, as in the following:
(5) My apologies. FN LN has pointed out that my link to the working draft is in-
complete. The correct version is [website address]
The above is followed by quotation of a previous message pointing out the problem
with the link.
In example (6), the offender has offended against the “rules” of the discussion
list and receives an email from the list owner referring to “The introduction file
sent to all new members”. The list owner explains the reason for this rule – to pro-
tect against infected emails. The list owner’s email acts as a prompt that elicits an
apology from the offender:
(6) Sorry about posting against the rules.
Category (2) apologies are retrospective. The offence occurs in an earlier mess-
age, and the offender refers to or quotes this previous message. As with category
(1) apologies, it is necessary to specify what is being apologised for, but where the
offence has occurred in a previous message this is even more important: In contrast
with spoken conversation, many topics may be under discussion simultaneously,
and many messages may intervene between the apology and the message to which
it refers (Herring 1999).
These offences generate a wider range of forms. Some, as in example (6), are
very brief, but frequently a personalised form is used (“I’m sorry”, “I apologise”).
Where the noun “apologies” is found, it may be accompanied by a possessive pro-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
328 Sandra Harrison and Diane Allton

noun, such as “my apologies”, or an intensifier, such as “many apologies”. How-


ever, there are other ways available to the writer for indicating that such an apology
is different from formulaic Category (1) apologies. One method is to signal the
apology in the subject line of the message. The writer may use different lexemes,
or may repeat the same lexeme, as in example (7), where the writer has sent mess-
ages intended for his students to the list by mistake. The subject line of the message
is “Apologies”, and the message text begins by repeating this:
(7) Apologies.
In sending out messages to my classes for the week, I inadvertently posted to
[list name].
Here the offence is that of sending information to the wrong recipients; the writer
accepts responsibility for the offence, although he indicates that he did this by mis-
take.
The writer may additionally promise to reform. In the next example, the writer
uses “Sorry” in the subject line and repeats this in the body text, following it with a
clarification:
(8) Sorry, may I just clarify that the comments in my previous e-mail (below) were
addressed to ‘FN1 LN1’, not to FN2. Must change the headers.
Here the reference to “headers” is an indication that the writer has used the reply
function and has therefore generated a subject line which has given the impression
that the remarks were addressed to FN2. By expressing his intention to “change the
headers”, he is indicating his intention to avoid this offence in the future.
The apologies discussed in this section typically relate to the content of a pre-
vious email message or to the writer’s handling of the technology. The offenders
use a variety of strategies, including personal pronouns, intensifiers, signaling the
apology in the subject line, excuses, explanations, and expressions of responsibil-
ity. The offences are not serious, and these strategies are used in moderation, but it
is usually considered necessary to include some signal of genuineness.

7.3. Category (3): Retrospective apologies for serious offences

Our data were selected to include problematic incidents, and we therefore pre-
dicted that there would be some apologies relating to offences that are more serious
than those discussed above. This is indeed the case, although such apologies are in
the minority (14 %, n=37). Apologies for serious offences occur mainly in lists C,
E, F, and G (see Table 3), especially in Samples 6, 14, and 19. There is no typical
offence or form of apology for serious offences – each is unique, and some are
quite complex. These apologies relate to offences such as using words that cause
offence, deliberately sending a private email to other recipients, or posting poten-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 329

tially misleading information. They may form part of a “Remedial Interchange”


(Goffman 1967, 1971) that may include a prompt for apology or an acceptance of
the apology.
Example (9) refers explicitly to the writer’s previous turn:
(9) I want to apologize I am not a racist and the comments I made in my last post
sound like I am a real Klansman.
The writer condemns her own comments and apologises to the group. No one spe-
cifically accepts this apology, but it does generate a response that deflects the
apology:
(10) If the thrust of what you are saying is that overseas students who have insuf-
ficient command of the English language shouldn’t be admitted to a course,
then I agree with you.
Where apologies for serious offences are addressed to an individual, they may
be accepted, as in example (11) and its response (12):
(11) btw, My sincere apologies for my last remark. I should not have said that.
(12) Apologies accepted. :-)
In (11) the writer accompanies “apologies” with a personal pronoun and intensifier,
and acknowledges that he has committed an offence. In (12) the recipient of the
apology quotes the previous message and accepts the apology. As discussed above,
accepting an apology confirms that the apologiser was in the wrong. Here the ac-
ceptance is mitigated by an emoticon, which seems to indicate “no hard feelings”.
In examples (13) and (14), two participants exchange apologies to end a leng-
thy hostile sequence. The first apology occurs in the middle of a long post:
(13) What bothered me is […] I regret using needlessly sharp and provocative lan-
guage at some points. I should not have used your words to tweak you. I
apologize for my intemperate tone […] You raise interesting issues in your re-
cent post. I like to believe that I raise interesting issues. I hope that we can ad-
dress issues rather than persons.
Here, the writer begins by giving an explanation of his own feelings, then offers an
apology and finally moves towards conciliation. This apology generates a recipro-
cal apology. If the second participant had merely accepted the apology, he would
have implied that the first participant was (solely) to blame. By making a reciprocal
apology, the second participant is able to share the responsibility for the hostilities
and also their resolution. He begins by signaling the apology in the subject line:
“Sorry and clarification”. He then begins the body of his message with an apology
and an explanation:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
330 Sandra Harrison and Diane Allton

(14) My apologies too. … I intended some light-hearted gentle prodding, nothing


more, and my apologies, if I have offended.
In addition to the “Sorry” in the subject line, the writer uses “my apologies” twice
in the body text, although the second occurrence retreats a little from full respon-
sibility by questioning the offence, and he minimises his offence as “light-hearted
gentle prodding”. After this extract, the message continues, and the writer returns
to the topic of the discussion but includes a self-denigrating reference to “my
somewhat irritable way” and a compliment to the first participant’s “impressive”
scholarship.
Example (15) is from an offending message, and the three turns that follow
(16–18) correspond to three of the four steps identified by Goffman (1967: 20–22)
as the structure of a “Remedial Interchange”. The offence occurs when N1 posts a
private message from N2 to the whole list. N1 makes it clear that he has done this
deliberately:
(15) this is not an accident (as happens sometimes on this list …) but a fearless and
deliberate decision. I run the risk and put this issue to public notice and de-
bate.
N2 responds by complaining about N1’s behaviour in serious terms:
(16) I wrote you privately in response to a personal note you wrote to me …
IMHO, it is inappropriate to launch a public debate by posting a private ex-
change. In most circles, this is considered a serious violation of trust.
N1 responds to this prompt in (17), offering an explanation and accepting respon-
sibility. However he does not apologise for “a serious violation of trust” but rather
describes the transgression as “bad style” and apologises for an “unacceptable
faux-pas”. He opens with “apologies” in the subject line, and the message text be-
gins:
(17) Dear all,
I just sent the following note to FN2:
“Yes, I realize, that it was extremely bad style to publish your private letter. I
was really upset by your tone, but, of course, this is no excuse. And also the
weather is not to blame. It is my own responsibility.
So please accept my apologies for this unacceptable faux-pas“.
This apology receives a rather formal acceptance:
(18) Thank you for your private note, and thanks for your post to the list. I appreci-
ate your comments and accept your apology.
The above sequence is not straightforward. N1 committed a deliberate transgress-
ion, and N2’s justifiable objection functions as a prompt for an apology. N1 down-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 331

grades the seriousness of his transgression by apologising for a comparatively


minor offence, and N2 accepts. Thus N1 is able to save face by apologising for a
lesser offence; this has the effect of “restoring the equilibrium” (Goffman, 1971:
173). However, the apology is hardly genuine: N1 shows no sign of regretting what
he has done, and he has achieved his aim, because the message from N2 is now in
the public arena and is discussed by the other list members. Moreover, N1 is subtly
echoing his original offence by sending a private message of apology to N2 and
sending a copy of this to the whole group.
List E stands out from our other samples, having several instances of apologies
for serious offences which the participants seem to feel very deeply. Here we find
prompts to apologise, requests for forgiveness, accounts of the circumstances sur-
rounding the offences, and acceptance of responsibility. Example (19) was made
by N1 in response to a long post from N2 in which N2 states: “you thought me
mad!” The apology below occurs in N1’s long response:
(19) If I have given you that impression I do so humble ask your forgiveness, as
nothing could be further from the truth.
N1 uses an if clause to indicate his lack of intention to offend. He makes a very for-
mal apology and intensifies this with “so humble”. He then firmly rejects the
opinion that has been imputed to him.
The following apology is addressed to a named individual, and the writer dem-
onstrates his seriousness by using two separate lexemes for his apology and ac-
companying these with “Please”. He supplies an account for his behaviour by
blaming his circumstances. He also signals his responsibility for the offence by
using the personal pronoun “my”:
(20) Please pardon, perhaps forgive me, for my words during this time incredible
time of chaos for me, FN
A recurring theme in relation to apologies is whether the offender takes respon-
sibility for the offence. We can see the offender accepting responsibility in some of
the examples above (e.g., example 11), but Goffman (1971: 144) goes further, stat-
ing that “there is usually an admission that the offence was a serious or real act”.
Owen (1983: 20), referring to this, comments that “such admissions are not found
in any overt form” in her own naturally-occurring spoken data. In our own data
such admissions are rare, although they do occur in the data from list E. In example
(21), the writer of the prompt frames the offence as a serious one:
(21) FN1, my friend, I share with FN2 a deep concern with what you wrote. I am in
no way trying to censure or judge you. I am however trying to do as you asked
and engage with you about the process I experienced by reading what you
wrote.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
332 Sandra Harrison and Diane Allton

Here the vocative and apposition “FN1, my friend”, indicate that it is the behav-
iour, not the person, that is condemned. This prompt is treated seriously by the re-
cipient and generates an acceptance of responsibility, “I see what you mean”, fol-
lowed by an apology. The apology uses the personalised verb form, reinforcing the
acceptance of responsibility, and the apology is intensified with “sincerely”:
(22) Yes, I am going over my posting and I see what you mean. I apologise sin-
cerely for it.

7.4. Category (4): Challenges, sarcasm, and joking apologies


In the email discussion data, as in spoken language, it is possible to subvert the
form of the apology for other purposes. Deutschmann (2003: 67) proposes the use-
ful concept of “face attack” apologies, in which he includes challenges and sar-
castic apologies.

7.4.1. Challenge “apologies”


Deutschmann (2003) notes that challenge apologies were common in multiparty
interaction in his spoken BNC data, but in our email discussion data they are not
common. The primary use of these is to preface a disagreement. In the email dis-
cussion data, they can be addressed to the whole group, as in:
(23) Sorry I just don’t believe the spin
They can also reference the opinion of a named individual, or they can be ad-
dressed directly to an individual. Such challenge apologies usually take the form of
“sorry”, “I’m sorry”, or “I’m afraid” and are not accompanied by other strategies
such as intensifiers, excuses, or accounts.

7.4.2. Sarcastic “apologies”


Deutschmann (2003: 19) discusses the problem of identifying sarcastic apologies
in his transcripts of spoken language, because in spoken conversation sarcasm is
often conveyed by tone and other non-verbal cues that are absent in the transcripts.
In email discussions the situation is different. These discussions take place in writ-
ing, and the apologiser has to be explicit or risk being widely misinterpreted. Some
sarcastic apologies are found in the email discussion data, for example the follow-
ing, sent by N1 to N2 on receiving a message from N2:
(24) Sorry, I thought you had left this list as it lacked objectivity.
The email discussion data also contain sarcastic apologies that do not attack a
message recipient but instead have an external target:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 333

(25) Oh, sorry, forgot to mention, that’s the price the supermarkets pay the farmers.
Here the writer constructs community identity among the email discussion partici-
pants by aiming sarcasm at supermarkets, which are positioned as a common
enemy.

7.4.3. Joking “apologies”


The form of the apology may even be used for the purposes of joking. This is rare
in our data, but examples can be found. In example (26), the writer coins a word
and then apologises:
(26) apologies for the neologism
Coining a neologism is not normally considered to be an offence. However, by
adopting an over-the-top strategy and apologising for this, the writer shows that he
has not used an incorrect word inadvertently but is making a conscious choice.
Most jokes embody positive politeness (Brown and Levinson 1987), as do the
following pair of apologies. Example (27) is unusual in that it realises both cat-
egory (1) and category (4), being an apology for a minor netiquette offence, a “long
post”, and simultaneously for something that would be considered a virtue, “sim-
plicity”:
(27) My apologies for the simultaneous length and simplicity of this post
The above receives an apology in response:
(28) Sorry to be so blunt, but I think your post has framed the issue very well
This is also a joke – one does not normally apologise for being blunt when com-
plimenting someone.

8. Apologies accompanied by if clauses

In her recordings of telephone conversations and encounters in shops, Owen


(1983) found only one example of an apology followed by an if clause, and
Deutschmann (2003: 56) states that in his BNC data this form was “extremely
rare”. However, several examples occur in the email discussion corpus. Example
(29) accompanies a minor offence:
(29) Sorry if this rambled a bit – I’m deep in the throughs of ’flu! and not especially
coherent I suspect!

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
334 Sandra Harrison and Diane Allton

This writer clearly suspects that he has “rambled”. Rather than make an effort to
check and perhaps revise his text, he uses the if clause to question and also to dis-
tance himself from the offence.
Our data also contain examples of if clauses accompanying serious offences
(e.g., examples 14, 19). By questioning whether an offence has occurred, writers
can apologise without fully accepting responsibility and so save face, even though
in each of these examples, the writer would have known from the previous posts
that an offence certainly had occurred. In a face-to-face situation, other partici-
pants might respond, saying whether an offence occurred, but in asynchronous
email discussions the moment passes and the apology is allowed to stand without
comment.

9. Conclusion

The research reported in this chapter has shown that email discussions have dis-
tinctive patterns of apology use that have implications for pragmatics. In particu-
lar, we observe writers adapting their strategies and level of effort in apologising to
match the seriousness of their offences, and we find that minimal unacknowledged
apologies for trivial offences are an established norm.
Although considerable variation was evident among our samples, some overall
patterns emerge. Apologies in our email discussions explicitly refer to the offence:
This is necessary because the communication takes place asynchronously and in
writing. Apologies are frequently addressed to the whole group but may be ad-
dressed to a defined sub-group or to an individual, and they relate to offences that
are internal to the email discussion itself, either to the use of the hardware or soft-
ware or to the content or tone of an email message.
Category (1) apologies differed the most from apologies in spoken language.
They accompanied the offence in the same message, usually at the start of the
message. They were brief and often took the noun form “apologies”, enabling the
apologiser to distance her/himself from the offence. Our findings confirm and ex-
tend the findings of Locher and Watts (2005): The evidence suggests that although
many of the apologies in our data were not genuine expressions of regret for real
offences, the apologies were not out of place. The writers clearly felt that they were
necessary, or desirable, and no objections were made (at least publicly on the mail-
ing lists) to the apologies or to the way in which they were expressed; clearly, these
writers are paying appropriate and relevant attention to their recipients. These find-
ings convince us that even apologies that are “merely appropriate” (Locher and
Watts 2005: 9) and that relate to trivial offences show adherence to group norms
and are important for the smooth running of email discussions.
Apologies in categories (2) and (3) have parallels in spoken language, although
in email discussions they need to refer explicitly to the offence. They occur after

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 335

the offence and use a variety of forms to indicate that the apology is genuine: per-
sonal pronouns, verb forms, intensifiers, explanations, and excuses. Acceptance of
apologies is not common and is found only for serious offences. Acceptance seems
to confirm that an offence has taken place, and we have the interesting albeit rare
example in (14) of reciprocal apologies being used to defuse a hostile situation.
Category (4), subverted apologies, also have parallels in spoken language and have
been largely ignored by researchers, except for Deutschmann (2003). This is an
underexplored area that merits future research.
The use of if clauses is much more common in our data than in the spoken
data of Owen (1983) or Deutschmann (2003). It allows apologisers to distance
themselves from the offence, especially in a context where multiple recipients and
lack of immediate feedback can create genuine uncertainty as to whether an of-
fence has taken place. This interesting finding also offers scope for further inves-
tigation.
However, there were marked differences among samples across all the areas of
our investigation, so that although we can make overall statements about the data,
these may not be true for a specific sample. Cross-postings are the most common
offence in these data, but some samples have no apologies for cross-postings.
While the gender of apology senders is approximately in proportion to the gender
of the message senders as a whole, some samples have no apologies from women,
while in others women contribute the majority. Some samples have no apologies
addressed to individuals, whereas others have many. Some samples have only cat-
egory (1) apologies, while others contain a variety of apology forms for a range of
offences. Some samples have no apologies for serious offences, while in others
serious offences abound. These findings suggest that local practices have devel-
oped in different email lists, and it is not only the transfer of strategies from spoken
language modified to some extent by the affordances of the medium, but also these
local practices, that influence apology behaviour.

Notes

1. This work was carried out as part of a project funded by the Arts and Humanities Re-
search Council (UK) entitled “Dealing with Trouble in Email Discussions”.
2. Most participants give first names which are gender specific, and in many cases these are
corroborated by institutional affiliations, but in any case where a male has used a female
first name, this would be counted as female in our statistics.
3. Contrast the data of Davies et al. (2007), where, in corresponding with their tutors, stu-
dents generated email apologies for external offences such as missing a lecture.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
336 Sandra Harrison and Diane Allton

References

Baldwin, Beth
1996 Conversations: Computer-mediated dialogue, multilogue, and learning. Ph.D.
Dissertation, University of North Carolina at Greensboro.
Baron, Naomi
1998 Letters by phone or speech by other means: The linguistics of email. Language
and Communication 18: 133–170.
Blum-Kulka, Shoshana, Juliane House, and Gabriele Kasper
1989 Appendix: The CCSARP coding manual. In: Shoshana Blum-Kulka, Juliane
House, and Gabriele Kasper (eds.), Cross-Cultural Pragmatics: Requests and
Apologies, 273–294. Norwood, NJ: Ablex.
Brown, Penelope and Stephen Levinson
1987 Politeness: Some Universals in Language Usage. Cambridge, UK: Cambridge
University Press.
Connery, Brian
1997 IMHO: Authority and egalitarian rhetoric in the virtual coffeehouse. In: David
Porter (ed.), Internet Culture, 161–179. New York: Routledge.
Davies, Bethan, Andrew Merrison, and Angela Goddard
2007 Institutional apologies in UK higher education: Getting back into the black be-
fore going into the red. Journal of Politeness Research 3(1): 39–63.
Deutschmann, Mats
2003 Apologising in British English. (Skrifter från moderna språk 10.) Umeå: Insti-
tutionen för moderna språk, Umeå University.
Goffman, Erving
1967 Interaction Ritual: Essays on Face-to-Face Behaviour. New York: Doubleday
Anchor Books.
Goffman, Erving
1971 Relations in Public. Microstudies of the Public Order. London: Penguin.
Grainger, Karen and Sandra Harris
2007 Apologies: Introduction. Journal of Politeness Research 3(1): 1–9.
Harrison, Sandra
2004 “Reasoned argument” or “gossip”? Metadiscussion in an email discussion
group. In: Linda Allal and Joaquim Dolz (eds.), Proceedings Writing 2004,
CD. Adcom Production.
Harrison, Sandra
2007 Transgressions, miscommunication and flames: Problematic incidents in email
discussions. In: Mia Consalvo and Caroline Haythornthwaite (eds.), AoIR In-
ternet Annual Volume 4, 105–117. New York: Peter Lang.
Hatipoğlu, Çiler
2005 Do apologies in e-mails follow spoken or written norms? Some examples from
British English. Studies about Languages 5: 21–29.
ten Have, Paul
1999 Doing Conversation Analysis: A Practical Guide. London: Sage.
Herring, Susan C.
1993 Gender and democracy in computer-mediated communication. Electronic
Journal of Communication 3(2).
http://www.cios.org/EJCPUBLIC/003/2/00328.HTML

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
Apologies in email discussions 337

Herring, Susan C.
1994 Politeness in computer culture: Why women thank and men flame. In: Mary
Bucholtz, Anita Liang, Laurel Sutton, and Caitlin Hines (eds.), Cultural Per-
formances: Proceedings of the Third Berkeley Women and Language Confer-
ence, 278–294. Berkeley, CA: Berkeley Women and Language Group.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2003 Gender and power in online communication. In: Janet Holmes and Miriam
Meyerhoff (eds.), The Handbook of Language and Gender, 202–228. Oxford,
UK: Blackwell.
Holmes, Janet
1995 Women, Men and Politeness. London: Longman.
Kolb, David
1996 Discourse across links. In: Charles Ess (ed.), Philosophical Perspectives on
Computer-Mediated Communication, 15–26. Albany, NY: State University of
New York Press.
Lakoff, Robin
2001 The Language War. Berkeley, CA: University of California Press.
Locher, Miriam and Richard Watts
2005 Politeness theory and relational work. Journal of Politeness Research 1(1):
9–33.
Mills, Sara
2003 Gender and Politeness. Cambridge, UK: Cambridge University Press.
Owen, Marion
1983 Apologies and Remedial Exchanges. Berlin: Mouton.
RFC 1855
2006 Netiquette guidelines. http://www.dtcc.edu/cs/rfc1855.html#3 [accessed No-
vember 5, 2011]
Smith Christine B., Margaret L. McLaughlin, and Kerry K. Osborne
1997 Conduct control on Usenet. Journal of Computer-Mediated Communication
2(4). http://jcmc.indiana.edu/vol2/issue4/index.html
Tannen, Deborah
1992a That’s Not What I Meant! How Conversational Style Makes or Breaks Your Re-
lations with Others. London: Virago.
Tannen, Deborah
1992b You Just Don’t Understand: Women and Men in Conversation. London: Vir-
ago.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
338 Sandra Harrison and Diane Allton

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/14/15 2:44 PM
14. Internet advice
Miriam A. Locher

1. Introduction

Advice-giving and advice-seeking are common everyday activities. In recent dec-


ades, the Internet has been adopted by professionals and non-professionals alike
for imparting knowledge, support, and advice-giving. Advice can be studied on the
level of speech acts (it is by no means restricted to the performative verb advise)
and on the level of activity (i.e., text type; see Locher and Limberg 2012: 3–7). In
this chapter, the focus is primarily on the text type advice column.
Advice has been studied in many different research fields. The main thrusts
of research so far have focused either on face-to-face interaction or on print data;
in particular, the printed text type of advice columns has received quite some
attention in the literature (see section 4 below). With the exception of speech act
studies (e.g., Searle 1969), the literature on face-to-face advice has mainly focused
on institutional contexts rather than on peer-to-peer advice (but see DeCapua and
Huber 1995; Jefferson and Lee 1992). Examples include visits by health care
nurses to first-time mothers (Heritage and Sefi 1992), HIV counseling sessions
(e.g., Silverman 1997), and medical encounters more generally (e.g., Leppänen
1998; Pilnick 1999, 2001; Sarangi and Clarke 2002). Counseling and advising
have also been researched in academic contexts (e.g., Bresnahan 1992; Erickson
and Shultz 1982; He 1994; Limberg 2011; Waring 2007) and on call-in radio (e.g.,
Gaik 1992; Hudson 1990; Hutchby 1995). The fields of cognitive linguistics, psy-
chology, and communication studies have tackled the topic of advising as well
(e.g., Goldsmith and MacGeorge 2000; Miller and Gergen 1998; Wood and Grif-
fiths 2007). (For a review of the literature on advice-giving more generally, see
Locher, 2006a; Limberg and Locher 2012.) Taken together, these studies show that
individual types of advice-giving vary, and each deserves to be examined in its
own right; as Leppänen (1998: 210) puts it: “The study of advice should both care-
fully explicate the details of the production of advice and show how these details
are systematic products of the interactants’ orientations to specific features of the
institutions”. Leppänen’s recommendation places the study of advice firmly within
the field of pragmatics, in that the focus is on language in use as employed by in-
dividuals who are part of groups that form practices.
After a brief discussion of terminology pertaining to advice-giving (section 2),
this chapter focuses on computer-mediated advice (section 3) and in particular, on
the topic of health issues and the text type of expert advice columns. This allows
for a comparison of online advice columns with their printed relatives and a dis-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
340 Miriam A. Locher

cussion of the extent to which technological mediation influences advice-giving


online (sections 4 and 5). The latter discussion is especially inspired by Herring’s
(2007) faceted classification scheme for computer-mediated discourse. However,
while recognizing the importance of technical mediation in shaping interaction, the
chapter aims to avoid a computer-deterministic stance. Finally, areas in need of
further research are identified in section 6.

2. Background on advice-giving

The study of advice-giving is firmly situated in pragmatics. Searle (1969: 67),


for example, contrasts advising with the speech act of requesting and argues that
advising “is not a species of requesting. … Advising you is not trying to get you to
do something in the sense that requesting is. Advising is more like telling you what
is best for you”. This comparison shows that advice is weaker in its directive force
than requests. The speech acts of assessment and judgment are also closely linked
to advice, since advice-giving recommends a future action. Thus advice-giving
is characterized by a combination of assessing, judging, and directing. This is
reflected in dictionary definitions of advice as an “[o]pinion given or offered as to
action; counsel” (Oxford English Dictionary, sense 5), a “recommendation as to
appropriate choice of action” (Collins Concise Dictionary 1989: 17), or an
“[o]pinion about what could or should be done about a situation or problem; coun-
sel” (American Heritage Dictionary 2000, online).
Hinkel (1994, 1997) observes that in some cultures (e.g., in Japan, Korea,
China, Indonesia, and Arabic countries) advice-giving can be a rapport-building
strategy and a sign of solidarity or interest. At the same time, advice is considered
challenging for interactants by many researchers working on English data. The
latter studies point out that advice-giving is a delicate act that involves asymmetry
with respect to authority and expertise (e.g., Feng and MacGeorge 2006; Hutchby
1995). For example, DeCapua and Dunham (1993: 519) claim that advice consists
of “opinions or counsel given by people who perceive themselves as knowledge-
able, and/or who the advice seeker may think are credible, trustworthy and
reliable”. According to Goldsmith and MacGeorge (2000: 235), this asymmetry is
the explanation for the delicate nature of advising in English, because it challenges
“the hearer’s identity as a competent and autonomous social actor”.
There is thus a link between advising and politeness and considerations of
face (cf. Brown and Levinson 1987; Goffman 1967). The metaphor face refers to
the self-image that an interactant wishes to construct during a particular interaction
(Goffman 1967). Face is not static, but rather emerges in interaction and is con-
stantly negotiated. Considerations of face have been termed facework or relational
work, i.e., the work people invest in negotiating relationships with others
(e.g., Locher 2006b; Locher and Watts 2005, 2008). The ways in which interactants

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 341

impart the content of advice are influenced by how face-threatening people per-
ceive the act to be. In contexts where advice-seeking and advice-giving are per-
ceived as threatening because of asymmetry between the interactants (Goldsmith
and MacGeorge 2000: 235), mitigation of advice is likely to occur. This can take the
form, for example, of indirectness, hedging, or embedding the advice in further dis-
course (cf. DeCapua and Dunham 2007; Locher 2006a; Morrow 2006). The actual
piece of advice can be realized in many different linguistic forms, from the classic
conditional clauses accompanied by should-instructions, I would do X statements,
and indirect statements realizing suggestions, to imperatives and questions inviting
introspection and action (e.g., DeCapua and Dunham 2007; Hudson 1990; Locher
2006a). Examples of these categories are given in section 4.
Finally, the difference between information-giving and advice-giving needs to
be addressed. Silverman (1997: 154) maintains that non-personalized information
can be interpreted as advice in the appropriate context. In the HIV counseling
sessions that he studies, there are so-called “Advice-as-Information” sequences,
in which the counselor gives general information on HIV and AIDS prevention
without fine-tuning it to the counselee’s particular needs. Because this allows
the advisee to interpret the text as not relevant, or as relevant for others than him-
or herself, this kind of advice is claimed to be less face-threatening to the advisee.
At the same time, the context in which this information is imparted makes an in-
terpretation as advice possible. The context1 of the interaction, or what Waring
(2007: 373) calls its “inferential framework”, thus serves as a backdrop for inter-
actants to work out the pragmatic meaning of the information given as advice.

3. Advice on the Internet

Given that advice is neither linguistically pre-determined nor contextually tied


to only one type of interaction, we can expect advice on the Internet to occur in nu-
merous formats and to be shaped by different cultures. In terms of technological
format, it appears that any type of Internet technology can be employed to impart
advice, via asynchronous (e.g., email exchanges or forum posts) or synchronous
(e.g., chat support groups) computer-mediated communication (CMC). As regards
advice functions, Griffiths’s (2005: 556) findings on Internet sites that offer psy-
chological help to gamblers are valid more generally. He claims that there are three
primary functions of information and advice sites: “(1) information dissemination,
(2) peer-delivered therapeutic/support/advice (such as self-help support group),
and (3) professionally delivered treatment”. Offers of advice on the Internet are
wide ranging, from psychological counseling, advice about relationships, dieting,
improvement of one’s sexual life, and gardening, to technical computer support
and help on how to buy cars. Professionals use the Internet to reach their target
audiences, be this to support customers, to sell products (e.g., http://support.micro-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
342 Miriam A. Locher

soft.com/), or to improve public knowledge, such as in the area of health in-


formation (an example is the Canadian site “Health Canada” at http://www.hc-
sc.gc.ca/index-eng.php; see section 4 for more examples). Professional syndicated
writers make Internet appearances (e.g., the “Dear Abby” column long popular in
the United States is available at http://www.uexpress.com/dearabby/). The World
Wide Web is also used by non-professionals who reach out to their peers in order to
offer advice and support; an example of this is a forum on breast cancer by an
American national nonprofit organization (http://forums.networkofstrength.org/).
A cursory search for “advice” using the Google Directory at the time this
chapter was prepared yielded 176,000 hits2 and displayed a broad range of topics,
and this constitutes only a small number of the actual sites that impart advice.
To mention but a few of the topics found, Google Directory lists 29,300 hits for
love advice, 15,600 hits for relationships advice, and 2,400 advice columns that
cover multiple topics.3 Often, the advice-seeker is invited to contact an advisor/
expert through an email link or text submission mask on the site, and the advisor
writes back. At times this exchange remains private, the site merely functioning as
a public entry to advice-giving; in other instances, the exchange is made public on-
line. The advisors are professional and lay people alike, who either give advice for
free or charge a fee.
The types of offers of advice on the web differ in their degree of interactivity.
While some sites hinge on the exchange of texts by an advice-seeker and an ad-
vice-giver (such as in the case of agony aunt sites), there are also sites that offer ad-
vice and information in a less interactive way. Such sites take the advice-seeker’s
request/question for granted and compile information according to the experience
that the advice-giver (team) has gained over time. A good example is the site of the
U.S. National Cancer Institute, which offers general informative summaries about
cancer, as well as advice sections (e.g., on “What you need to know about brain
tumors”4). Frequently Asked Questions sections (FAQs) often mimic interactivity,
in the sense that the reader is invited to regard the questions as coming from the
readership and the answers as given by experts. The questions themselves are
likely to be phrased by the advice-giving team, but they can be assumed to reflect
the concerns of the target audience, since it is the experts’ aim to cater to them. It is
quite common for sites to combine interactive possibilities. Good examples of this
type are institutional helpdesk sites such as the IT support site of the University
of Basel (http://urz.unibas.ch/), which gives advice-seekers the possibility to find
solutions by clicking on prepared topic links and FAQs, writing to a member of a
support team, or calling for a phone session. Similarly, the psychological help site
GamAid, which Wood and Griffiths (2007) investigated, is described as
an online advisory, guidance and signposting service whereby the client can either
browse the available links and information provided, or talk to an online advisor (during
the available hours of service), or request information to be sent via email, mobile phone
(SMS/texting), or post. (Wood and Griffiths 2007: 375)

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 343

In addition to sites that are clearly identified as imparting advice, there are
many others in which advice is less explicitly propagated. Many peer support sites,
for example, thrive on the benefits of sharing experience, which can sometimes be
construed as advice for action or non-action (see, e.g., McSeveny et al. 2006 on
posts to an online weight watchers message board; Kouper 2010 on message ex-
changes in a motherhood blog community; Morrow 2012 on divorce advice in a
Japanese online forum; Placencia 2012 on advice in Spanish Yahoo!Respuestas).
Similarly, in the context of the above-mentioned American forum on breast cancer,
the interpretation of an informative sequence or a narrative as advice depends on
the overall frame of the forum, which is meant to be helpful for its readership. That
narratives of personal experience can be interpreted as advice was confirmed in a
study by Harrison and Barlow (2009) of an online arthritis self-management pro-
gram. The participants in this program posted their action plans for self-manage-
ment online and received comments from their group members, in many cases, in
the form of narratives of personal experience. Harrison and Barlow highlight that
their study “demonstrates the importance of communication context for interpre-
tation. In the context of the arthritis workshops, participants are expecting feed-
back on their action plans, and are therefore able to interpret the narratives as ad-
vice” (2009: 108). If readers turn to a site with the aim of finding advice, they are
likely to interpret text as advice even if it is not obviously flagged as such (Waring
2007: 373); this is discussed further in section 2.
Having established that advice can be given online on different interactive plat-
forms and that advice-giving itself is not tied to any single linguistic realization,
the question remains to what extent computer mediation influences advice-giving
and to what extent advice-giving on the Internet differs from advice-giving in face-
to-face interaction or print media. In other words, what are the effects of techno-
logical mediation on advice-giving? A tentative answer concerning Internet advice
columns is advanced below.

4. Health advice and advice columns on the Internet

Richardson (2005: 1) reports that, in our “medialized world”, “[o]nce Americans


have Internet access, it turns out that finding health information is one of the most
common ways in which they use it”.5 It is therefore no surprise that health organ-
izations, health institutes, and public health educators have long been aware of the
potential of the Internet to reach a large readership and their need to have a strong
Internet presence in order to inform the population of research efforts, spread
knowledge of medical conditions, and contribute to the prevention of the spread of
illnesses (e.g., Harvey et al. 2007).6 Some professional and lay sites use the well-
known format of an advice column; one of these, “Lucy Answers”, is the focus in
what follows.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
344 Miriam A. Locher

In this chapter advice columns are defined as a particular “text type”, i.e., as a
type of written text that is conventionally recognized by people who are familiar
with the print media (Hendley 1977). This recognizable format of advice columns
consists in the exchange of a “problem letter” sent by an advice-seeker and a
“response letter” published by an agony aunt. The term “letter” is used throughout
this chapter, since both the advice-seekers and the advice-givers typically adhere to
the convention of writing a simple letter consisting of an address form (“Dear
Agony Aunt”; “Dear Reader”), followed by the body of the letter and a sign off.
It is important to stress that advice columns are public, while simulating a per-
sonal exchange. The advice-givers gear their responses towards the needs of the
target readership and use the advice-seeker’s problem as an example. To choose
a(n at times fictional) dialogue form to present advice as in advice columns
can provide an incentive for the reader to identify with the acting subject and offer
the reader the opportunity to take on the role of advisee (Franke 1997: 226). The
tension between the public and personal aspect of such texts has garnered research
attention (e.g., Fleischhacker 1987; Locher 2006a, Chapter 7; Mininni 1991).
It manifests itself, for example, in the choice of which “letter” to answer in public
in the first place (usually those questions that are likely to be of relevance to
the larger readership rather than just to the individual advice-seeker) and/or in
the broadening of the scope of the answer in order to best address the needs of the
wider readership. Hutchby (1995), who studied a call-in radio program, found this
latter strategy to be important in his data: The radio host prompted the expert pres-
ent in the studio to answer in more detail than the caller originally asked for, in
order to satisfy what was assumed to be the needs of the wider audience.
In addition, many advice-seekers value the possibility of reading and asking
questions anonymously. This is especially important when the topic of advice is
delicate, such as issues relating to sexuality. Alexander (2003: 548) makes the point
that fears and embarrassment about health issues are the reason men write anony-
mously to the magazine Men’s Health. van Roosmalen (2000: 205) observes that
problem pages are “forums for the unspeakable” for the adolescent women who
convey their experience in letters to an advice column in Teen Magazine. The appeal
of anonymity is certainly an important factor for many online advice sites, as well.
Advice columns have been in use ever since the advent of newspaper print cul-
ture (Hendley 1977), and they are well known in the literate world today (DeCapua
and Dunham 2007: 322). They are a popular feature of many print magazines, and
for this reason it is not surprising that advice columns are also found on the Internet.
According to Hendley (1977: 345, 351), advice columns are “naturally appealing”
because people need advice and are curious and nosy by nature. In other words,
people read advice columns not just to gain knowledge on action alternatives, but
also because they can identify with the advice-seekers and/or are looking for enter-
tainment. Every advice column has a particular flavor that may influence the popu-
larity of the column and that may be in line with its institutional aims and/or the

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 345

norms and values of the advice-giver (e.g., Currie 2001; Gough and Talbot 1996;
Locher and Hoffmann 2006; McRobbie 1978, 1991; Mutongi 2000; Talbot 1992,
1995; Thibault 1988, 2002). This flavor, or “voice”, is conveyed by the linguistic
strategies that contribute to the identity7 construction of the advisor persona.

5. Illustration of online advice-giving from the advice column


“Lucy Answers”

5.1. Background
Professional organizations that deal with health issues are confronted with the
challenge of how best to impart knowledge and how to learn about their “client’s”
needs. One strategy is to use the format of advice columns and the medium of the
Internet to appeal to and reach a large readership. An example of one such column
is “Lucy Answers” (the name has been changed at the specific request of the web-
site), which is run by the health education program of a large university in the
United States. According to information on the website, this advice column is
meant to complement other services offered by the health education program, such
as face-to-face counseling opportunities and printed information material (Lucy
Answers 2004). Topics covered pertain to the fields of “alcohol and other drugs”,
“fitness and nutrition”, “emotional health”, “general health”, “sexuality”, “sexual
health”, and “relationships”. The official aim of the site is to
increase access to, and use of, health information by providing factual, in-depth,
straight-forward, and nonjudgmental information to assist readers’ decision-making
about their physical, sexual, emotional, and spiritual health. (Lucy Answers 2004)
The mission of the site is thus to enable advice-seekers to make up their own
minds about the issues covered without being directive (cf. the discussion of the
ideal of non-directiveness for professional counselors in Sarangi and Clarke 2002 or
Vehviläinen 2003). The site is aimed at college students, while being openly access-
ible to everybody interested. The questioners are entirely anonymous, and no
information is available about their background (Lucy Answers 2004). In 2004,
“Lucy Answers” received nearly 2,000 inquiries per week, although only five were
answered each week (Lucy Answers 2004) – the choice of which question to publish
is determined by the importance of the topic for the public readership. However, this
means that the site is not geared to cater for emergencies, a fact that is stressed by
disclaimers on the site. The “response letters” are written by a team of professional
health educators under the pseudonym “Lucy”. The team thus creates an advisor
persona, an agony aunt, with her own particular voice (Locher and Hoffmann 2006).
In section 5.2, I report on the results of a study of the linguistic realization
of advice in 280 question and response letters (a detailed report can be found in
Locher 2006a). The letters were collected from the online archive in 2002 and 2004.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
346 Miriam A. Locher

This brief overview of findings serves as a backdrop for section 5.3, which focuses
on the extent to which the advice column is influenced by being published online.

5.2. The linguistic realization of advice in the response letters


In order to illustrate how advice is given in the response letters of the “Lucy
Answers” corpus, I first discuss the composition of the response letters, followed by
the syntactic realization of advice, illustrations of the preference for non-directive-
ness and mitigation, and, finally, the self-presentation of the advice-giver persona.
In a content analysis of the letters, the texts were segmented into “discursive
moves”, defined as the “kind of contribution that the entry made to the ongoing
interchange” (Miller and Gergen 1998: 192). This analysis showed that in addition
to advice, the letters also contained passages of assessment of the situation of the
writer of the problem letter, general information giving, explanations of points
made, metacomments about the structure of the letter, and farewells (see Locher
2006a for details).8 An individual letter might contain one or more discursive
moves from this list. An analysis of the advisory discursive moves in the response
letters showed that there was both direct and indirect syntactic advice-giving; that
advice was embedded within the entire composition of the letters; and that the
readers were encouraged to make their own decisions by being given options. In
what follows, I exemplify some of these findings.
In general, three syntactic types of advice-giving were identified in “Lucy
Answers”: declaratives (1), interrogatives inviting introspection (2a) and action
(2b), and imperatives inviting introspection (3a) and action (3b):

(1) In the meantime, you can learn ways to be his friend without enabling his
drinking. (alcohol and drugs, “Cocaine versus tequila”)9
(2a) What makes your particular attraction a problem? Is it due to the fact that
we almost always see men romantically involved with women who are
shorter than they are? Or, is it because it can seem strange to come upon the
opposite? (relationships, “Troubled by attraction to tall women”)
(2b) Since this fine financier isn’t your boss or teacher, why not take the letters
A-T-M to stand for Approach That Man. (relationships, “Should I cash in on
hot banker?”)
(3a) Imagine how lonely and frustrating it might feel to always be excluded.
(relationships, “How to tell a nosy roommate to step off”)
(3b) Discuss with him/her whether you might see someone else in Health Services
or whether s/he would be willing to refer you to someone off campus with
whom you could do longer term work. (emotional health, “Disappointed with
therapist?”)

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 347

While imperatives can be argued to be the most direct form of advice-giving,


they only accounted for 36 % of the advice-giving moves. Questions, both inviting
introspection and inviting action, accounted for 11 %, while declaratives made up
the largest part, with 52 %.10 Furthermore, within the declarative category, less
directive advice-giving is evidenced in the use of conditional clauses that restrict
the number of people to whom the advice is relevant (4), thus stressing optionality,
and in the preference for declarative sentences in which the acting subject is not
linguistically identified as agent (5):
(4) If you haven’t already, perhaps you and your girlfriend could talk about your
concerns and try to reach a mutual decision on what form(s) of contraception
you both want to use. (sexual health, “Is pulling out safe?”)
(5) Douching is no longer recommended for a number of reasons. (sexual health,
“Douching”)
This preference for non-directiveness is also evident in the use of lexical
hedges (perhaps, could, try in (4)), which tone down the advice-giving further, as
well as in the overall composition of the response letters: Rather than plunging di-
rectly into the advice-giving sequences, “Lucy” embeds the sequences in the com-
position of the letter (see Morrow 2006: 541, for similar results about advice-giv-
ing in a discussion forum). For example, the discursive moves of assessments and
general information in (6) and (7) are positioned at the beginning of the letter and
thus precede advice-giving:
(6) Dear Reader,11
assessment One of the challenges of college life is learning to share your living
space with other people who may have different habits than you. Lucy under-
stands, however, how frustrating it can be when these habits are bothersome.
advice One thing you can do is speak with other students in your residence hall
who just might have similar concerns. […] (relationships, “No one cares about
drunken, messy hallmates, or do they?”)
(7) Dear Reader,12
general information Nausea is the sensation that accompanies the urge to
vomit, though it doesn’t necessarily have to lead to that in every case. advice
If your nausea is combined with vomiting, it’s important to consume as much
fluid as possible without further aggravating your stomach. […] (general
health, “Nausea: Causes and treatments”)
Lucy is a fictional advisor persona, and readers may interpret and construct her
“identity” in different ways. At the same time, the linguistic practices described
in this section are argued to play a role in the construction of this persona. With
respect to the potentially face-threatening character of advice-giving, we have seen
that the “Lucy Answers” team prefers non-directiveness. Moreover, the “voice”

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
348 Miriam A. Locher

that is created for the advisor persona, i.e., the linguistic strategies that contribute
to the identity construction of “Lucy”, not only displays awareness of potential
face-threats, but also displays a sense of humor (8), as well as empathy and sup-
port (9):
(8) Since this fine financier isn’t your boss or teacher, why not take the letters
A-T-M to stand for Approach That Man. (relationships, “Should I cash in on
hot banker?”)
(9) Lucy understands, however, how frustrating it can be when these habits are
bothersome. (relationships, “No one cares about drunken, messy hallmates, or
do they?”)
Balanced against these strategies that make her appear approachable and infor-
mal, the advisor persona uses a number of linguistic strategies to highlight her
status as a professional expert: “Lucy” gives detailed background information,
quotes facts in numbers and percentages, broadens the scope of the answer, refers
the reader to other sources of information, and refers to herself as a health educator
(Locher 2006a, section 8.2.2). Richardson (2003: 172) points out that credibility
and trust are often at the core of whether an individual’s posting will be accepted or
not: In the Internet newsgroups Richardson studied, users employed what she calls
“warranting strategies”, which are “designed to give fellow participants reasons to
take the information seriously”, for example by referring to (presumably repu-
table) sources (2003: 172). The strategies mentioned above that highlight profes-
sionalism can be claimed to have a similar function in “Lucy Answers”. In addi-
tion, the visual appearance of the column – the placement of the university logo,
the hyperlinks to the health program, and a description of the history and aims of
the service as well as the advisor team behind “Lucy” – situate this practice in a
professional context. In this sense, the site is visually different from those of lay
people who adopt the format of an advice column. Many such people genuinely
wish to help, but they have no further qualifications or training in advising than
their own personal experience and common sense – a fact that many admit quite
frankly in general disclaimers on their sites.13
The strategies of imparting advice discussed in this section on how advice
linguistically manifests itself in “Lucy Answers” can be explained in terms of the
relational work called for by this text type in this particular context. It seems that
advice-giving, which involves the negotiation of asymmetries between interactants
(see section 2), is perceived as face-threatening in “Lucy Answers”, despite the
anonymity of the site. The health advisor team orients itself to the mission state-
ment of the institution and follows a non-directive path in advising. In this way, the
team takes the relational and cultural implications of this text type in this particular
context into account (cf. Leppänen 1998).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 349

5.3. Influence of computer mediation on “Lucy Answers” practices


We now turn to the question: To what extent is “Lucy Answers” influenced by the
fact that it is computer-mediated text? Herring’s (2007) faceted classification
scheme for computer-mediated discourse is a useful means of avoiding the fallacy
of simply assuming that technological mediation explains the patterns observed for
text on the Internet (cf. Androutsopoulos 2006 and Baym 1995 on computer/tech-
nical determinism). Herring (2007: 10) distinguishes two types of influence:
medium (technological) (Table 1) and situation (social) (Table 2) variables, each of
which contains several subsets of open-ended facets and terms. Herring proposes
that a description of a data set along these lines allows researchers to describe the
factors that influence a practice and enables the drawing of comparisons to similar
or different data sets. The first column in Tables 1 and 2 lists the medium and situ-
ation factors taken from Herring (2007), while the second column defines and de-
scribes them as they apply to “Lucy Answers”.

Table 1. Medium factors (content of column 1 from Herring 2007)

Medium factors “Lucy Answers”


M1: Synchronicity Asynchronous: The problem letter and the response
letter writers do not have to be online at the same time.
M2: Message transmission While the problem submissions are sent to the institu-
(1-way vs. 2-way) tion, which decides whether or not to publish and
answer them, the asynchronous site presents both the
initiating and the responding message at the same time.
M3: Persistence of transcript All exchanges are archived.
M4: Size of message buffer Effectively unlimited.
M5: Channels of communication Only text (i.e., no video, audio, photos, or graphics).
M6: Anonymous messaging Guaranteed for the advice-seekers, whose email
addresses are scrambled upon submission, and who
may give themselves pseudonyms; the advisor team
writes under the name “Lucy”.
M7: Private messaging Not available.
M8: Filtering Not available.
M9: Quoting There is no technical means that allows or facilitates
quoting.
M10: Message format Simulation of letter exchange posted on site that draws
on the well-known print text type of advice columns;
there is no interaction between the advice-seeker and
advice-giver beyond this exchange of letters.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
350 Miriam A. Locher

Table 2. Situation factors (content of column 1 from Herring 2007)

Situation factors, and Herring’s examples Observations for “Lucy Answers”

S1: Participation structure Institution-to-many, via “personal” letters


– One-to-one, one-to-many, many-to- intended to reach the general public; the ad-
many vice-seekers remain anonymous; more than
– Public/private 2,000 submission per week, but only five are
– Degree of anonymity/pseudonymity chosen for publication; the interaction is
– Group size; number of active partici- structured and dominated by the institution,
pants but the advice-seekers play along by adher-
– Amount, rate, and balance of partici- ing to a letter format; there is no interaction
pation between the “partners” beyond this ex-
change of letters.

S2: Participant characteristics No demographic details of the advice-


– Demographics: gender, age, seekers are available, but the target reader-
occupation, etc. ship is college students/young adults, who
– Proficiency: with language/computers/ can be assumed to be computer literate; the
CMC advisor persona “Lucy” is created by profes-
– Experience: with addressee/group/topic sional health educators, who are orienting
– Role/status: in “real life”; themselves to the text type of an “advice col-
of online personae umn” and the ideology of non-directiveness
– Pre-existing sociocultural knowledge in counseling as specified in the mission
and interactional norms statement of “Lucy Answers” (see section
– Attitudes, beliefs, ideologies, and 5.1.). The choice of a female advisor places
motivations the agony aunt in a longstanding American
tradition (cf. Dear Abby, Anne Landers, Dr.
Ruth).

S3: Purpose The imparting of information and advice


– Of group, e.g., professional, social, about health issues to as many individuals of
fantasy/role-playing, aesthetic, experi- the target group as possible (see “Lucy
mental Answers” mission statement).
– Goal of interaction, e.g., get in-
formation, negotiate consensus, de-
velop professional/social relationships,
impress/entertain others, have fun

S4: Topic or theme “Alcohol and other drugs”, “fitness and nu-
– Of group, e.g., politics, linguistics, trition”, “emotional health”, “general
feminism, soap operas, sex, science health”, “sexuality”, “sexual health”, and
fiction, South Asian culture, medieval “relationships”.
times, pub

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 351

– Of exchanges, e.g., the war in Iraq, pro-


drop languages, the project budget, gay
sex, vacation plans, personal in-
formation about participants, meta-dis-
course about CMC
S5: Tone Professional, yet approachable and not
– Serious/playful too scientific; display of humor, support, and
– Formal/casual empathy, as well as criticism.
– Contentious/friendly
– Cooperative/sarcastic, etc.
S6: Activity Advisory exchange: problem letter –
– E.g., debate, job announcement, in- response letter.
formation exchange, phatic exchange,
problem solving, exchange of insults, jok-
ing exchange, game, theatrical perform-
ance, flirtation, virtual sex
S7: Norms Norms of organization: No restriction on
– Of organization access or submitting; what is answered and
– Of social appropriateness displayed is up to the institution, as the more
– Of language powerful partner in the exchange.
Norms of social appropriateness: The re-
sponse letters are influenced by the text type
of advice columns, the ideal of non-direc-
tiveness in counseling, and the mission
statement; the advice-seekers also orient to
the text type of an advice column.
Norms of language: See section 5.2.
S8: Code Standard English, lacking computer
– Language, language variety language features identified elsewhere,
– Font/writing system such as abbreviations or emoticons; Roman
alphabet.

In what follows, I comment on those factors that most influence the “Lucy
Answers” discourse. These are the medium factors M3: Persistence of transcript,
M6: Anonymous messaging, and M10: Message format, and the situation factors
S1: Participation structure, S2: Participant characteristics, S3: Purpose, S5: Tone,
and S7: Norms. Since these factors influence each other, the sequence of discussion
will not follow the ordering of factors given in the table, which is for ease of refer-
ence only and does not reflect degree of importance, as Herring (2007) points out.
With respect to S7: Norms of language, the syntactic strategies illustrated in
section 5.2. are not unique to online interaction. They are in fact all-pervasive and
gain their specific meaning through their combination in a particular social prac-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
352 Miriam A. Locher

tice. Pragmatic meaning in this case is created by the orientation of the interactants
to the text type of an advice column and to the mission statement of the health
institution. The level of non-directiveness can be explained by the orientation
of the health educators to empowering their readers with knowledge rather than de-
ciding for them. DeCapua and Dunham (2007) found very similar linguistic results
in a study carried out with native speakers of English who had to compose response
letters in the format of an advice column in a discourse completion task, despite the
fact that these native speakers were not professionals in the fields of advice. The
non-native speakers of diverse cultural backgrounds in the same study, however,
generally formulated more direct and less mitigated and embedded responses,
indicating a lack of knowledge of and/or orientation to the socio-pragmatic norms
of the text type (see Bardovi-Harlig and Hartford 1990 for similar findings with
respect to the lack of pragmatic competence in non-native speakers in academic
advising sessions).
DeCapua and Dunham’s (2007) native speakers were all adults or young adults.
The age and experience/expertise factor (S2: Participant characteristics) may ex-
plain the different picture that emerges for peer-to-peer Internet sites covering
similar topics, such as the Studentcenter’s TeenAdvice section (Studentcenter
2004). Here there is a lack of mitigation or seeming awareness of the delicate
nature of advice-giving, as evidenced in the blunt and often face-threatening
manner in which advice is given, often not in the typical letter format. The fact that
the native speakers in DeCapua and Dunham’s (2007) study employed similar
linguistic strategies as the advice-giving team of “Lucy Answers” might indicate
that both groups orient themselves to the face-threatening character of advice-giv-
ing and to the conventions of the text type “advice column” because they are more
experienced in reading and engaging in this particular text type.14
With respect to S3: Purpose, S5: Tone, and S7: Norms of language, I suggest
that the purpose of the advice column has a stronger impact on the choice of lan-
guage (S5 and S7) than the fact that the site belongs to computer-mediated dis-
course. Advice columns are not written in a social vacuum; the ideals and aims
of the institution responsible for a site or of a private individual who runs an advice
column will have an impact on the language used. In the case of “Lucy Answers”,
the clear mission statement leads the team of health educators to use Standard Eng-
lish, lacking computer-mediated language features identified elsewhere (e.g., ab-
breviations or emoticons; see Bieswanger, this volume), to impart knowledge in a
“factual, in-depth, straight-forward, and nonjudgmental” way. At the same time,
the vocabulary employed is not too scientific or formal (i.e., it is straightforward),
and there are displays of humor, support, and empathy, as well as criticism (cf.
Locher 2006a, Chapter 8). In addition, the goal of “Lucy Answers” is to reach and
educate as many individuals of the target group as possible. This public dimension
(S1) also influences the composition of the response letters, as shown in the dual
strategies of choosing a problem to answer that is of relevance to the general public

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 353

and within the scope of “Lucy Answers”, and of broadening the scope of the
answer in order to best cover the needs of the wider readership.
The composition of the texts is also influenced by the fact that both the problem
letter writers and the advisor team orient themselves to the text type of established
print “advice columns” that make use of the format of “letters” (address terms,
body of text, in some cases farewell sections, signatures), and by the fact that one
problem letter is followed by one response letter (M10: Message format and S1:
Participation structure). No further possibility for interaction between the advisor
team and the individual advice-seeker is envisaged by the technological set-up of
the site. The advice-seekers cannot be contacted for clarifications of their problem,
as their email addresses are scrambled upon submission, nor can the advice-
seekers reach “Lucy Answers” publicly for a follow up. In this way the technologi-
cal set-up of the site differs, for example, from threads in an advice forum or blog,
where advice-seekers post problems and receive (multiple) answers to which they
can react if they wish. The advice-seekers on “Lucy Answers” can try their luck
and submit a further request to the site, or they can respond in the “reader response
section”, a possibility they rarely take advantage of (see below).15 Because the
problem letters are quite sparing in the amount of information they provide (on
average only 78 words) and the advisor team has no way to ask for clarifications as
in a face-to-face counseling situation, the team often makes transparent the fact
that the advice given is based on insufficient background knowledge – a practice
that mostly occurs in the assessment moves or in advice sentences realized by if
clauses. The latter restrict the advice to a certain group of people, i.e., to those for
whom the condition holds. While the restriction of the participation structure (S1)
to one turn only also holds for print advice columns, “Lucy Answers” readers have
the option of clicking on further links to related questions and answers and reader
responses, so that they are involved in a much wider communication process (see
also the comments below on the archive).
Several researchers have pointed out that anonymity (M6: Anonymous mess-
aging and S1: Participant structure) is a major advantage for online interaction, in
that it allows advice-seekers to enquire about their sometimes delicate problems
without revealing their identity (e.g., Alexander 2003; van Roosmalen 2000;
Wood and Griffiths 2007: 385). Comparing problem-seekers’ formulations with
face-to-face counseling on sexual issues, Harvey et al. (2007: 771) noted that the
teenagers who wrote to the email advice service www.teenagehealthfreak.org “de-
scribed themselves, their anatomy and their identities in meticulous detail, (…)
whereas previous research on sexual health has discovered the use of vague terms
and euphemisms”. Anonymity might be a factor allowing for this detail – or, in the
case of “Lucy Answers”, it might be a reason for turning to the site in the first
place, as opposed to making use of the face-to-face counseling option available on
campus. In “Lucy Answers”, anonymity is guaranteed, in that any submission in-
formation that might lead back to the advice-seeker is destroyed. In the case of

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
354 Miriam A. Locher

print advice columns, however, advice-seekers often do not identify themselves


either, so there is no fundamental difference between online and print practices in
this respect.
There are nevertheless a number of factors related to computer mediation that
influence advice-giving in “Lucy Answers” and that characterize the site in com-
parison to its print relatives. The first has to do with the medium factor M3: Per-
sistence of transcript. The site offers an archive of problem and response letters,
which provides information at a mouse-click by allowing information searches. In
fact, the advice seekers are encouraged to first search the archive, which is organ-
ized into the seven major topics and their subclasses, before submitting a problem
letter themselves. This is because they are more likely to find an answer to a related
problem in the archive than to be among the five people whose letters are answered
every week. Since the site wishes to provide accurate and current information, this
means that the stored exchanges have to be updated on a regular basis to ensure
quality advice. This accessibility and updatedness is clearly not available to users
of print versions of advice columns. In addition, the archive of letter exchanges
influences the construction of new response letters and revisions of the old in sev-
eral ways: Hyperlinks to previous related letters are added at the bottom of the text
(example 10), previous letters are mentioned in the text (example 11), or, more
generally, texts are shortened, since aspects of a problem have already been
answered more comprehensively elsewhere (example 11):

(10) Related Q&As


Breathing patterns while working out
Dizzy after exercise
(fitness, “Is it okay to feel lightheaded and dizzy after running?”)
(11) Dear Too big,16
Lucy has answered this question any number of times already, in a variety of
ways. Please see the answers to “First sex for two virigins?” and “Painful in-
tercourse” in Lucy’s Sexuality archives. The basic gist is that […].
Lucy

The growing body of letter exchanges – the history of the site – thus influences
the creation of new texts, as well as the process of updating old texts. It is also
possible to argue that the archive influences the creation of the problem letters, on
the assumption that advice-seekers first “lurk” – in the case of “Lucy Answers”,
browse the archive and read numerous exchanges – before they actively submit a
question themselves. In this way, they may be influenced by the way in which the
problem letters are structured, both with respect to the adherence to the general no-
tions of letter writing (address terms, body, signature) and with respect to particu-
lar styles of writing (e.g., problem statements and narratives to describe prob-
lems).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 355

The Participation structure (S1) of the platform also allows readers of the col-
umn to comment on the exchange of problem and response letter. While the “Lucy
Answers” team does not take any responsibility for the content accuracy of these
comments, the reader response texts form a corpus of their own in which support
and advice, as well as criticism, are given. The reader response comments are vis-
ible as hyperlinks directly below the problem-answer exchange. This is the result
of a general layout change to the site that took place in the early 2000s. Before that,
it was difficult to find the comments, and by 2004 the corpus contained only 446
contributions, while the archive of problem and response letters already contained
2,286 exchanges. It is not possible to search the reader response corpus as such.
The comments are thus accessible solely via the original “problem letter” –
“response letter” sequence to which they are linked. That is, the site wishes to give
its readers a more active outlet than before, but does not want the reader responses
to be included in the search for information, since the advisor team cannot guaran-
tee the quality and accuracy of the information contained in the reader responses.
Nevertheless, these texts complement the professional site in an informal way, and
may add to the appeal of the site more generally in that a sense of online commu-
nity is created (cf. Baym 1998). The advice-seeker who turns to the “Lucy
Answers” column thus has more interactive opportunities and more access to ad-
vice than the reader of a print advice column.

6. Conclusions and future research

Giving and receiving advice has been discussed in studies of language in use from
the perspectives of many different fields (pragmatics, applied linguistics, psychol-
ogy, health related disciplines, etc.). The Internet offers a platform for advice-seek-
ing and advice-giving to both professionally-trained advisors and lay people,
for profit or free of charge. This chapter focused on advice in the context of online
health issues. Advice in this realm has important potential real-world conse-
quences, and professionals need to ask themselves how to impart information
and advice to their target group in such a way as to augment the likelihood that
the advice is heeded (cf. Feng and MacGeorge 2006), at the same time adhering to
institutional constraints, such as for example an ideal of non-directiveness.
DeCapua and Dunham (2007: 319) point out that “the socio-pragmatic rules or
norms governing the appropriate enactment of any given speech act vary greatly
among cultures and languages”. In the case of the advice column “Lucy Answers”,
the texts are composed in such ways that the face-threatening character of advice is
toned down. The mission of the health program to which the site belongs is of ut-
most importance in this context, since it propagates an ideal of non-directiveness.
The practice observed is characterized by the mitigation of advice, the use of
humor, empathy, and support. Using Standard English, “Lucy” engages in strat-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
356 Miriam A. Locher

egies that stress her expertise (e.g., presenting well-researched, in-depth in-
formation, quoting, and referring to information sources), while still remaining ap-
proachable.
Outside the context of professional health counseling, however, many advice
columns are not primarily intended to impart quality advice alone, but are there for
entertainment reasons, as well. In those cases, implicit norms of delicacy may be
suspended. Some columnists certainly have made a name for themselves through
their blunt and non-mitigated commentaries, as evidenced in the popular column
“Savage Love”, run by Dan Savage on http://www.thestranger.com/seattle/savage-
love. The tone of his column is very different from that of the institutionally run
“Lucy Answers”. While also quoting relevant literature, Dan Savage uses less
mitigation than “Lucy Answers”, uses profanity frequently, and can at times be
face threatening towards his advice seekers. More research is needed to investigate
how professional and lay people construct their expert identities in order to project
themselves as trustworthy persons to turn to and/or as entertaining advisors: As
noted above, the age of the target readership and the experience of the advisors as
lay persons or professionals, the topic, and the overall aim and ideology of the col-
umn are likely to cause variation in these strategies.
Further research should also tease out what impact different computer-me-
diated forms have on advice-giving. For example, it would be interesting to com-
pare the set-up of advice contexts with advice threads in forums (e.g., Morrow
2006) and blogs (e.g., Kouper 2010), which allow for more follow-up interaction
on the part of advice-seekers and advice-givers. Such studies could contribute to an
understanding of how people employ language differently in different advisory
settings and how they orient to the particular parameters of the context in which
they find themselves (Leppänen 1998: 120). In this way, the pragmatic study of ad-
vice-giving online can add to an understanding of language use in the “complexity
of its cognitive, social, and cultural (i.e., meaningful) functioning in the lives of
human beings” (Verschueren 2009: 19).

Acknowledgements

The author wishes to thank the three editors of this volume, in particular Susan
Herring, and Andreas Jucker as the responsible general editor for their constructive
criticisms, and Brook Bolander for her perceptive comments.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 357

Notes

1. In this chapter, context is defined as “the degree to which the participants share a com-
mon set of cultural expectations with respect to the social activity and the speech events
making up part of that activity” (Watts 1992: 33); this includes “the degree to which the
participants share a common set of assumptions with respect to the information state …
within which the strip of interaction is developed” (Watts 1992: 51). Interactants thus
take prior knowledge of activity types (which form discourses on a larger level) and the
immediate context of interaction into account when interpreting language.
2. http://www.google.com/search?hl=en&q=advice&btnG=Search&cat=gwd%2FT op
[accessed 09/04/2010]
3. http://www.google.com/ [accessed 09/04/2010]
4. http://www.cancer.gov/cancertopics/wyntk/brain/ [accessed 09/04/2010]
5. This statement is based on the pewinternet.org reports (Madden 2003).
6. Site providers in the professional health domain range from international organizations,
such as the World Health Organization (http://www.who.int/en/), national institutions,
such as the Federal Office of Public Health in Switzerland (http://www.bag.admin.ch/
index.html?lang=en) or the National Institutes of Health in the United States (http://www.
nih.gov/), to many institutional organizations in the field of public health more generally.
Examples of the latter are the many official sites of the States/cantons on public health
issues, or organizations dedicated to particular conditions (e.g., http://www.aids.ch/,
www.multiplesklerose.ch/). In addition to these professional sites, many lay sites are dedi-
cated to sharing information and experience about medical conditions as well as support
(e.g., Hamilton 1998, who studied online bone marrow transplantation narratives and
Harrison and Barlow 2009, who analyzed an online arthritis self-management program).
7. In this chapter, the concept of identity is not seen as a fixed given but as “intersubjec-
tively rather than individually produced and interactionally emergent rather than
assigned in an a priori fashion” (Bucholtz and Hall 2005: 587).
8. In rare cases, “Lucy” also offered her own experiences as illustration.
9. The information in parentheses indicates the topic category and the header of the exchange.
10. These numbers add up to 99 % instead of 100 % due to the effect of rounding.
11. The question prompting the response was: “Lucy, If no one in my dorm seems to care if
students come in drunk, creating noise and messes, what can I do?”
12. The question prompting this response was: “Hi Lucy, I wanted to know what I can take
for nausea and what causes it?”
13. An example of a lay advice column is http://ms.liss.tripod.com/UnconventionalWis-
dom/index.html, which also contains a disclaimer.
14. An alternative reading, suggested by Susan Herring, is that the teenagers sought
to index solidarity in their interactions, with the bluntness in the TeenAdvice section
reflecting an absence of social distance.
15. The advice-seekers can, however, make a face-to-face appointment with a health coun-
selor if they belong to the primary target group of the site, i.e., students at the university
that hosts the “Lucy Answers” site.
16. The question prompting this response was: “Dear Lucy, This is sort of embarrassing,
and you touched on it in a previous message, but … how do you decrease penis size? I’m
serious. Is there some sort of surgery? I ask because my girlfriend says mine is too large,
and it sometimes hurts her. Please answer. Signed, Too big”

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
358 Miriam A. Locher

References

Alexander, Susan M.
2003 Stylish hard bodies: Branded masculinity in Men’s Health magazine. Socio-
logical Perspectives 46(4): 535–554.
Androutsopoulos, Jannis
2006 Introduction: Sociolinguistics and computer-mediated communication. Jour-
nal of Sociolinguistics 10(4): 419–438.
Baym, Nancy K.
1995 The emergence of community in computer-mediated communication. In:
Steven G. Jones (ed.), Cybersociety: Computer-Mediated Communication and
Community, 138–163. Thousand Oaks, CA: Sage.
Baym, Nancy K.
1998 The emergence of on-line community. In: Steven G. Jones (ed.), Cybersociety
2.0: Revisiting Computer-Mediated Communication and Community, 35–68.
Thousand Oaks, CA: Sage.
Bardovi-Harlig, Kathleen and Beverly S. Hartford
1990 Congruence in native and nonnative conversations: Status balance in the aca-
demic advising session. Language Learning 40(4): 467–501.
Bresnahan, Mary
1992 The effects of advisor style on overcoming client resistance in the advising
interview. Discourse Processes 15(2): 229–247.
Brown, Penelope and Stephen C. Levinson
1987 Politeness: Some Universals in Language Usage. Cambridge, UK: Cambridge
University Press.
Bucholtz, Mary and Kira Hall
2005 Identity and interaction: A sociocultural linguistic approach. Discourse
Studies 7(4–5): 584–614.
Collins Concise Dictionary Plus
1989 London/Glasgow: Bath Press.
Currie, Dawn
2001 Dear Abby: Advice pages as a site for the operation of power. Feminist Theory
2(3): 259–281.
DeCapua, Andrea and Joan Findlay Dunham
1993 Strategies in the discourse of advice. Journal of Pragmatics 20(6): 519–
531.
DeCapua, Andrea and Joan Findlay Dunham
2007 The pragmatics of advice giving: Cross-cultural perspectives. Intercultural
Pragmatics 4(3): 319–342.
DeCapua, Andrea and Lisa Huber
1995 “If I were you …”: Advice in American English. Multilingua 14: 117–132.
Erickson, Frederick and Jeffrey Shultz
1982 The Counselor as Gatekeeper: Social Interaction in Interviews. New York:
Academic Press.
Feng, Bo and Erina L. MacGeorge
2006 Predicting receptiveness to advice: Characteristics of the problem, the advice-
giver, and the recipient. Southern Communication Journal 71(1): 67–85.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 359

Fleischhacker, Andrea M.
1987 Zeitschriftenberatung in “Lebensfragen”. Textanalyse unter pragmatischen
Gesichtspunkten. Unpublished Magisterarbeit, Universität Münster.
Franke, Wilhelm
1997 Massenmediale Aufklärung eine sprachwissenschaftliche Untersuchung zu
ratgebenden Beiträgen von elektronischen und Printmedien. Bern: Lang.
Gaik, Frank
1992 Radio talk-show therapy and the pragmatics of possible worlds. In: Alessandro
Duranti and Charles Goodwin (eds.), Rethinking Context: Language as an In-
teractive Phenomenon, 271–290. Cambridge, UK: Cambridge University Press.
Goffman, Erving (ed.)
1967 Interactional Ritual: Essays on Face-to-face Behavior. Garden City, NY: An-
chor Books.
Goldsmith, Daena J. and Erina L. MacGeorge
2000 The impact of politeness and relationship on perceived quality of advice about
a problem. Human Communication Research 26(2): 234–263.
Gough, Val and Mary Talbot
1996 “Guilt over games boys play”: Coherence as a focus for examining the consti-
tution of heterosexual subjectivity on a problem page. In: Carmen Rosa Cal-
das-Coulthard and Malcolm Coulthard (eds.), Texts and Practices: Readings
in Critical Discourse Analysis, 214–230. London: Routledge.
Griffiths, Mark D.
2005 Online therapy for addictive behaviors: Review. Cyberpsychology & Behavior
8(6): 555–561.
Hamilton, Heidi
1998 Reported speech and survivor identity in on-line bone marrow transplantation
narratives. Journal of Sociolinguistics 2: 53–67.
Harvey, Kevin James, Brian Brown, Paul Crawford, Aidan Macfarlane, and Ann McPherson
2007 “Am I normal?” Teenagers, sexual health and the internet. Social Science &
Medicine 65: 771–781.
Harrison, Sandra and Julie Barlow
2009 Politeness strategies and advice-giving in an online arthiritis workshop. Jour-
nal of Politeness Research 5: 93–111.
He, Agnes Weiyun
1994 Withholding academic advice: Institutional context and academic practice.
Discourse Processes 18(3): 297–316.
Hendley, W. Clark
1977 Dear Abby, Miss Lonelyhearts, and the eighteenth century: The origins of the
newspaper advice column. Journal of Popular Culture 11(2): 345–352.
Heritage, John and Sue Sefi
1992 Dilemmas of advice: Aspects of the delivery and reception of advice in inter-
actions between health visitors and first-time mothers. In: Paul Drew and John
Heritage (eds.), Talk at Work: Interaction in Institutional Settings, 359–417.
Cambridge, UK: Cambridge University Press.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Language@
Internet 4, article 1. http://www.languageatinternet.org/articles/2007/761

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
360 Miriam A. Locher

Hinkel, Eli
1994 Appropriateness of advice as L2 solidarity strategy. RELC Journal 25(2): 71–93.
Hinkel, Eli
1997 Appropriateness of advice: DCT and multiple choice data. Applied Linguistics
18(1): 1–26.
Hudson, Thom
1990 The discourse of advice giving in English – “I wouldn’t feed until spring no
matter what you do”. Language and Communication 10(4): 285–297.
Hutchby, Ian
1995 Aspects of recipient design in expert advice-giving on call-in radio. Discourse
Processes 19(2): 219–238.
Jefferson, Gail and John R. E. Lee
1992 The rejection of advice: Managing the problematic convergence of a “troubles-
telling” and a “service encounter”. In: Paul Drew and John Heritage (eds.),
Talk at Work: Interaction in Institutional Settings, 521–548. Cambridge, UK:
Cambridge University Press.
Kouper, Inna
2010 The pragmatics of peer advice in a LiveJournal community. Language@Inter-
net 7, article 1. http://www.languageatinternet.org/articles/2010/2464
Leppänen, Vesa
1998 The straightforwardness of advice: Advice-giving in interactions between
Swedish district nurses and patients. Research on Language and Social Inter-
action 31(2): 209–239.
Limberg Holger
2011 The Interactional Organization of Academic Talk: Office Hour Consultations.
Amsterdam/Philadelphia: John Benjamins.
Limberg, Holger and Miriam A. Locher (eds.)
2012 Advice in Discourse. Amsterdam/Philadelphia: John Benjamins.
Locher, Miriam A.
2006a Advice Online. Advice-giving in an American Internet Health Column. Am-
sterdam/Philadelphia: John Benjamins.
Locher, Miriam A.
2006b Polite behavior within relational work: The discursive approach to politeness.
Multilingua 25(3): 249–267.
Locher, Miriam A. and Holger Limberg
2012 Introduction to advice in discourse. In: Holger Limberg and Miriam A. Locher
(eds.), Advice in Discourse, 1–27. Amsterdam/Philadelphia: John Benjamins.
Locher, Miriam A. and Sebastian Hoffmann
2006 The emergence of the identity of a fictional expert advice-giver in an American
Internet advice column. Text and Talk 26(1): 67–104.
Locher, Miriam A. and Richard J. Watts
2005 Politeness theory and relational work. Journal of Politeness Research 1(1): 9–33.
Locher, Miriam A. and Richard J. Watts
2008 Relational work and impoliteness: Negotiating norms of linguistic behaviour.
In: Derek Bousfield and Miriam A. Locher (eds.), Impoliteness in Language.
Studies on its Interplay with Power in Theory and Practice, 77–99. Berlin:
Mouton de Gruyter.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
Internet advice 361

Lucy Answers
2004 [for legal reasons, the source cannot be indicated]
Madden, Mary
2003 America’s online pursuits. The changing picture of who’s online and what they
do. Pew Internet & American Life Project. http://www.pewinternet.org/
Reports/2003/Americas-Online-Pursuits.aspx
McRobbie, Angela
1978 Jackie: An Ideology of Adolescent Femininity. Birmingham, UK: The Centre
for Contemporary Cultural Studies.
McRobbie, Angela
1991 Feminism and Youth Culture: From “Jackie” to “Just Seventeen”. Boston,
MA: Unwin Hyman.
McSeveny, Kathy, Karen Grainger, and Kerry Doherty
2006 I Love Weight Watchers: Face management strategies in reports of success on
an online message board. Paper presented at the Appearance Matters 2 confer-
ence, Bath, UK, June.
Miller, John and Kenneth J. Gergen
1998 Life on the line: The therapeutic potentials of computer-mediated conver-
sation. Journal of Marital and Family Therapy 24(2): 189–202.
Mininni, Giuseppe
1991 Diatextual analysis of the advice column. Rassegna Italiana di Linguistica
Applicata 23: 73–81.
Morrow, Phillip R.
2006 Telling about problems and giving advice in an Internet discussion forum:
Some discourse features. Discourse Studies 8(4): 531–548.
Morrow, Phillip R.
2012 Online advice in Japanese: Giving advice in an Internet discussion forum. In:
Holger Limberg and Miriam A. Locher (eds.), Advice in Discourse, 253–279.
Amsterdam/Philadelphia: John Benjamins.
Mutongi, Kenda
2000 “Dear Dolly’s” advice: Representations of youth, courtship, and sexualities in
Africa, 1960–1980. International Journal of African Historical Studies 33(1):
1–24.
Pilnick, Alison
1999 “Patient counseling” by pharmacists: Advice, information, or instruction? So-
ciological Quarterly 40(4): 613–622.
Pilnick, Alison
2001 The interactional organization of pharmacist consultations in a hospital set-
ting: A putative structure. Journal of Pragmatics 33(12): 1927–1945.
Placencia, María Elena
2012 Online peer-to-peer advice in Spanish Yahoo! Respuestas. In: Holger Limberg
and Miriam A. Locher (eds.), Advice in Discourse, 281–305. Amsterdam/Phil-
adelphia: John Benjamins.
Richardson, Kay P.
2003 Health risks on the internet: Establishing credibility on line. Health, Risk and
Society 5(2): 171–184.
Richardson, Kay P.
2005 Internet Discourse and Health Debates. New York: Palgrave, Macmillan.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
362 Miriam A. Locher

Sarangi, Srikant and Angus Clarke


2002 Zones of expertise and the management of uncertainty in genetics risk com-
munication. Research on Language and Social Interaction 35(2): 139–171.
Searle, John R.
1969 Speech Acts: An Essay in the Philosophy of Language. Cambridge, UK: Cam-
bridge University Press.
Silverman, David
1997 Discourses of Counselling: HIV Counselling as Social Interaction. London:
Sage.
Studentcenter
2004 http://teenadvice.studentcenter.org/
Talbot, Mary
1992 The construction of gender in a teenage magazine. In: Norman Fairclough
(ed.), Critical Language Awareness, 174–199. London: Longman.
Talbot, Mary
1995 A synthetic sisterhood: False friends in a teenage magazine. In: Kira Hall and
Mary Bucholtz (eds.), Gender Articulated, 144–165. New York: Routledge.
The American Heritage Dictionary of the English Language
2000 4th Ed. Oxford, UK: Houghton Mifflin.
The Oxford English Dictionary
1989 2nd Ed. Oxford, UK: Oxford University Press.
Thibault, Paul
1988 Knowing what you’re told by the agony aunts: Language function, gender dif-
ference and the structure of knowledge and belief in personal columns. In:
David Birch and Michael O’Toole (eds.), Functions of Style, 205–233. Lon-
don: Pinter.
Thibault, Paul
2002 Interpersonal meaning and the discursive construction of action, attitudes
and values: The global modal program of one text. In: Peter H. Fries, Michael
Cummings, and David G. Lockwood (eds.), Relations and Functions within
and around Language, 56–116. London: Continuum.
van Roosmalen, Erica
2000 Forces of patriarchy: Adolescent experiences of sexuality and conceptions of
relationships. Youth & Society 32(2): 202–227.
Verschueren, Jef
2009 Introduction. The pragmatic perspective. In: Jef Verschueren and Jan Ola Öst-
man (eds.), Key Notions for Pragmatics. Handbook of Pragmatics Highlights,
1–27. Amsterdam/Philadelphia: John Benjamins.
Vehviläinen, Sanna
2003 Avoiding providing solutions: Orienting to the ideal of students’ self-directed-
ness in counseling interaction. Discourse Studies 5: 389–414.
Waring, Hansun Zhang
2007 The multi-functionality of accounts in advice giving. Journal of Socioling-
uistics 11(3): 367–391.
Wood, Richard T. A. and Mark D. Griffiths
2007 Online guidance, advice, and support for problem gamblers and concerned
relatives and friends: An evaluation of the GamAid pilot service. British Jour-
nal of Guidance & Counselling 35(4): 373–389.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:00 PM
15. Deception in computer-mediated
communication
Jeffrey T. Hancock and Amy Gonzales

1. Introduction

Why do people lie? The reasons are as varied as human life itself, but there is al-
most always a reason, and these reasons can be categorized in a variety of ways. St.
Augustine, for example, classified lies into eight types of varying severity. Modern
psychology has produced smaller taxonomies. In the influential self-presentational
framework of deception (DePaulo, Lindsay, et al. 2003; Vrij 2008a), people lie to
enhance or protect their own self-image (self-oriented), their partner’s (partner-
oriented), or some third party (altruistic). According to this view, most everyday
conversational lies are part of an effort to manage interactions with others and
achieve self-presentational goals (Goffman 1959). Other lies, like those associated
with scandals or crime, may be less about self-presentation goals and more about
seeking material rewards or avoiding prosecution, but lies are still a means to ac-
complishing something in the world.
Since lies are useful for accomplishing goals in the world, why not simply lie
all the time? A whole host of factors constrain the use of deception. Some of these
constraints are external, such as the social stigma associated with being caught
lying. Because humans are social animals, it is important to have the trust of other
humans. Getting caught lying can damage that trust (Möllering 2006) and even ul-
timately destroy the ability to communicate with one another (Grice 1989). Other
constraints against lying are internal. Most people view themselves as honest, and
this self-concept of an honest person can shackle how much one is prepared to lie.
In a series of experiments, Ariely and colleagues (Mazar and Ariely 2006) demon-
strated that even when there was no possibility of being caught, participants in
their experiments only lied by a fraction of the full amount they could have lied,
suggesting that the self-concept of honesty prevents people from lying too much.
In this view, the act of lying is a sort of calculus. Lying can be a tool for accom-
plishing things in the world, but it is restricted by internal and external constraints.
The question addressed here is whether communication technologies, like tele-
phones, email, and text messaging, enter into this calculus. And, once the decision
to lie has been made, what are the implications for language?
The present chapter has two primary interests. The first is a concern with how
communication and information technology affect the pragmatic calculus of de-
ception, and what features of these new communication spaces may enter into this
calculus. The focus is on everyday social interactions, which in the present era are

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
364 Jeffrey T. Hancock and Amy Gonzales

supported primarily by the telephone, email, and various forms of messaging (e.g.,
instant messaging, text messaging via mobile phones), although the chapter also
briefly reviews research examining deception in more anonymous Internet spaces,
including chat rooms and newsgroups. The central argument is that these com-
munication spaces shape the pragmatics of deception by varying communication
features and motivations for deception (Carlson et al. 2004).
The second interest is in the language people use once the decision to lie with
technology has been made. Traditional deception research has examined the verbal
cues of deception (Vrij 2008b), with mixed and sometimes contradictory results.
However, because digital technologies leave traces of language that previously
were evanescent (e.g., the contents of an email or a text message are automatically
recorded), deception research has seen a resurgence of interest in verbal cues. In
combination with the advances in text analysis tools from computer science that
make analyzing and processing textual data extremely fast and efficient, these con-
versational records are providing material for researchers to make new discoveries
about how deception is manifested in language. The second part of this chapter re-
views this research.
In this chapter, digital deception is defined as the intentional control of in-
formation in a technologically-mediated message to create a false belief in the re-
ceiver of the message (Hancock 2007). While this definition is but one of many for
defining deception, it contains two key attributes that are necessary to highlight.
The first is the idea of a false belief, which means that deception leads a conversa-
tional partner to believe something that the speaker does not believe to be true. The
second is the notion of intentionality. False statements must be intentional to be de-
ceptive; otherwise they are simply mistakes.
There are, of course, many ways to deceive, and almost any kind of speech act
can be used deceptively. Indeed, a number of theories and taxonomies lay out how
different speech acts can lead to different types of deception. For example, In-
formation Manipulation Theory (McCornack 1992; McCornack, Levine, Torres, and
Campbell 1992) notes that violations of Grice’s four maxims lead to different types
of deception. The literature on deception and CMC unfortunately has not advanced
to this point, with few exceptions (e.g., Twitchell, Nunamaker, and Burgoon 2004).
Consequently, the chapter limits the analysis and review to the choice of using de-
ception in mediated interactions and the linguistic implications of this decision.

2. To lie or not to lie

2.1. Everyday technology and everyday lies


The question of how people choose to use different media to accomplish different
goals has been of interest to researchers since the earliest days of computer-me-
diated communication (CMC) research. One of the first theories in the area, Media

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 365

Richness Theory (MRT; Daft and Lengel 1984, 1986), was concerned with how
managers might use different media to accomplish different tasks. The theory
holds that people match the medium to the equivocality of the task they wish to
accomplish. Low equivocality tasks are straightforward and simple, such as ar-
ranging a place and time to meet for lunch. High equivocality tasks are ambiguous
and complex, such as doing a performance review or hiring or firing someone. Ac-
cording to the theory, managers should match low equivocal tasks to lean media
and equivocal tasks to rich media.
Lying is relatively ambiguous and complex given that it is an attempt to mis-
lead, making it an equivocal task (but see Bavelas, Black, Chovil, and Mullett’s
1990 work on equivocality for a more nuanced description of equivocation in com-
munication). Thus, people who have decided to engage in deception should choose
a rich medium over a lean medium, preferring face-to-face to the telephone, and
the telephone to email, for example. This makes sense when one considers that
having a richer medium would allow the liar to track the partner’s responses more
carefully (Buller and Burgoon 1996).
The question of whether people lie more in one medium or another was first di-
rectly tested by psychologist Bella DePaulo and colleagues (DePaulo, Kashy, et al.
1996) in a large diary-based study that had people record all of their lies and social
interactions for seven days. With this method, the researchers counted the number
of times participants reported lying in a conversation and divided that by the total
number of social interactions participants reported. Although the diary method has
a number of limitations, especially the potential for self-report biases, this study
provided the first data that allowed for comparisons of lying rates by the same in-
dividuals across media. Because the study was conducted in the early 1990s, be-
fore email and the web had reached critical mass, the media of interest were limited
to face-to-face, the telephone, and letters (unfortunately there were too few letters
reported to allow for cross-media comparisons).
Of these media, MRT would predict the most lying face-to-face, followed by
the telephone, and lastly letters. However, DePaulo and colleagues had a different
prediction than MRT. They noted that people report feeling temporary discomfort
when telling a lie, presumably because lying is a negative social act and a breech of
trust. They argued that communication technologies that allow for social distance
between the liar and the partner should provide some relief for the discomfort they
experienced when lying.
In fact, this is exactly what DePaulo et al. found when they examined their par-
ticipants’ diaries: People reported lying in a greater proportion of telephone calls
than in face-to-face interactions. While this supported the idea that people lie more
frequently in more socially-distant media, the results were the opposite of the MRT
prediction.
Note that a common assumption of both of these arguments is that media vary
along a single dimension, richness or social distance, which is assumed to affect

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
366 Jeffrey T. Hancock and Amy Gonzales

decisions about deception uniformly. A number of scholars with backgrounds in


linguistics (Herring 2001, 2007) and cognitive psychology (Clark and Brennan
1991), however, have noted that communication technologies, like email, have
many features that affect language processes; they do not just differ along a single
dimension. Clark and Brennan’s (1991) influential chapter on grounding in CMC
provides one example of the complexity of the relationship between deception and
choice of technology. This approach, in which specific features of a technology are
expected to have specific effects on language use, has influenced thinking about
how features of media shape the pragmatics of deception. In the next section, a
model of deception describes three such features and makes predictions about how
the degree of recordability, synchronicity, and co-presence influence the likelihood
of deception in technology.

2.2. Feature-based approaches to deception and technology


The first and most obvious feature that might affect deception is the recordability
of some forms of communication. Relative to face-to-face communication, in
which words disappear as they are spoken, most textually-based communications
leave some record. Email leaves perhaps the most durable record, with copies not
only on servers but on the target’s computer. Even instant messaging and text
messages, which are impermanent, leave a trail. Indeed, a recent New York Times
article noted that over half of divorce cases in New York state involved email or
text messaging as the primary form of evidence. People’s perceptions of the recor-
dability of a medium should factor into the pragmatics of deception and media. The
more recordable, the less likely one should use that medium to lie.
A less obvious feature is synchronicity. Research from psychology (e.g., De-
Paulo et al. 2003) suggests that many everyday lies are the small “white” lies told
in conversation when an honest answer would be awkward, such as telling a
friend that, in fact, his new hair cut is awful. Lying in conversation can be an im-
portant pragmatic choice when trying to protect one’s own image (self-centered
lies) or to avoid harming the conversation partner (other-centered lies) or some
third party (altruistic lies) (Vrij 2008a). Media that allow for real-time synchron-
ous communication should increase the times when these kinds of awkward situ-
ations may arise. In contrast, asynchronous media, like email, allow time to craft
a response that need not rely on deception to avoid violating one’s own or an-
other’s self-image.
The third feature initially considered in the Feature-Based Model was whether
the communication was co-present. Being in the same physical space as a conver-
sation partner is important for evidentiary reasons. When people are in the same
physical space, options for deception are reduced, because lies about where one is,
who one is with, and what one is doing are all impossible. In contrast, as soon as
communication becomes distal, all of these deceptions are possible.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 367

Taken together, the components of the Feature-Based Model predict that the
telephone should involve more lies than face-to-face, which in turn should have
more lies than email. Phone conversations are typically not recorded, they are syn-
chronous, and they involve conversation at a distance. Face-to-face conversations
are synchronous and not recorded, but they involve, by definition, communication
in the same physical space. Email is recordable and asynchronous, although not
(necessarily) co-present.
To examine these predictions, we (Hancock, Thom-Santelli, and Ritchie
2004a) replicated the DePaulo et al. (1996) diary study by asking students to record
all of the social interactions and lies over seven days. In almost all respects the pro-
cedure in our study followed that of the DePaulo et al. study, with one important
exception: We had our participants record not only face-to-face interactions and
phone calls, but also emails, instant messaging, chat rooms, multi-user domains
(MUDs) and newsgroups (too few participants recorded any chat room, MUD, or
newsgroup conversations for analysis, so we exclude them here).
Following DePaulo et al., we calculated the lying rate for each medium as the
proportion of lies per number of conversations in that medium for each participant.
Our data replicated the DePaulo et al. finding that phone conversations involved
significantly more lies than face-to-face conversation. The more interesting result,
however, was the lying rate in email. Emails involved fewer lies than any other
medium. This finding contrasted with the idea that social distance should increase
deception. However, the pattern of data fit with the features expected to shape the
pragmatics of deception: recordability, synchronicity, and co-presence.
Obviously, not all lies are the same. In addition to the three orientations of lies
described above (self-oriented, partner-oriented, and altruistic), people can also lie
about different things, and to different people. For instance, in DePaulo et al.’s
(1996) influential deception taxonomy, lies can be about facts, feelings, opinions
and explanations. Also, relationships based on genuine trust should involve fewer
lies than more superficial relationships. Kashy and DePaulo (1998) found this to be
the case: People reported lying less often in conversations with close friends and
romantic partners than with strangers and acquaintances (see also Ennis, Vrij, and
Chance 2008; Whitty and Carville 2008).
In a follow-up study that used the same diary procedure but asked more in-
formation about what and to whom people lie, we (Hancock et al. 2004b) reached
three conclusions. First, the pattern of deception across media, with the most lies
reported on the telephone and the fewest in email, was repeated. Second, tech-
nology affected the content of the lie. Phone conversations involved more action
lies than any other medium, presumably because the phone (at the time of the
study) was the most mobile technology and would allow lies about what people
were doing. Face-to-face conversations had the most lies about one’s feelings,
presumably because synchronous face-to-face conversations are more likely to
involve questions related to one’s opinions (e.g., “What do you think of my new

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
368 Jeffrey T. Hancock and Amy Gonzales

shirt?”). Finally, email had the most explanation lies. The asynchronous nature of
email allows more time for constructing a sound explanation than synchronous
formats, and this extra time presumably allows the writer to construct a lie that
can withstand the potential of later scrutiny associated with a highly recordable
medium.
Third, the way technology interacted with deception and relationships was
relatively straightforward. Lies to family and friends tended to take place most fre-
quently via a mediated channel, while lies to strangers and acquaintances occurred
primarily face-to-face. The data are consistent with previous research conducted
only in face-to-face settings, suggesting that lies are more likely to be told to
strangers and acquaintances (Ennis, Vrij, and Chance 2008; Kashy and DePaulo
1998). These data add the observation that when people lie to people close to them
they tend to use technology to communicate the deception. Finally, one last inter-
esting effect was that although students did not tell email lies often, the most com-
mon email lie was an explanation lie (e.g., “I couldn’t finish my paper because my
printer died”) to their professors.

2.3. Scenario-based approaches to deception and technology


More recent studies have used scenario methods to examine how people might
make decisions about using deception across different communication technol-
ogies. For example, in a recent study that directly examined the question of how
technology enters the calculus of deception, Whitty and Carville (2008) provided
participants with scenarios that presented a situation, in a variety of media, in
which a lie could be a potential pragmatic choice (e.g., “You receive an email
from a person you do not know well. Within the email they ask you if you think
they look attractive. You do not think that they are attractive but you do not want
to hurt their feelings so you email them back and tell them that they are attract-
ive”). Participants indicated how likely it was that they would use that medium to
tell that lie to either someone close (e.g., a friend) or distant to them (e.g., a
stranger).
There were a number of interesting findings, with mixed results for the Feature-
Based Model described above. First, consistent with the diary-based results, the
phone tended to have more lies than face-to-face. This provides converging evi-
dence across methods that the phone is the most lied-in medium. Also consistent
with the results above, when lying to close friends and family people tended to use
mediated channels (email, telephone) more than face-to-face. Whitty and Carville
highlight an interesting connection with the flaming sometimes observed in CMC
(Sproull and Kiesler 1986; Whitty and Carr 2006), in which interactants use ex-
cessively insulting and aggressive forms of talk, with this apparent willingness to
tell the truth to strangers. It may be that whatever compels flaming with strangers
also leads to an increased willingness to be frank and honest online.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 369

There was, however, an important difference between the Feature-Based


Model and the results reported above: Participants reported that they would lie in
email more than face-to-face. Differences in methodology may underlie this effect.
Diary-based studies require participants to record their actual behaviors, rather
than what they believe they will do in a hypothetical situation, as required by a
scenario-based method. Indeed, when we (Hancock et al. 2004a, b) ask our partici-
pants in diary studies where they think they lied the most, many report saying
email, despite the fact that their diary shows they lied the least there. These results
suggest that people do not have accurate insight into how they use different media
for lying.
A second scenario-based study to address the question of media and technol-
ogy examined the choices that managers would make when needing to communi-
cate a lie (George and Carlson 2005). In this study, managers reacted to a scenario
that involved either a severe or less severe deception to either a familiar or unfam-
iliar recipient by choosing which medium they would use to communicate the lie.
Here the Feature-Based Model was directly compared with Media Richness The-
ory, with the same predictions described above. The data revealed that, regardless
of severity of the lie or familiarity of the target, face-to-face was the manager’s first
choice in lying, followed by the telephone and email. These data are supportive of
Media Richness Theory’s prediction that participants will choose richer media for
deception.
Although email was the least chosen medium for lying, consistent with our
diary-based studies, this study was the only one in which the telephone was not the
most lied-in medium. There are at least three possible explanations that stem from
differences in methods and analytic approach. Perhaps the most important is that
this procedure asked participants to choose explicitly a priori their medium for
communicating the lie, which differs from both the diary method (DePaulo et al.
1996; Hancock et al. 2004a, b) and from the scenario procedure employed by
Whitty and Carville. In Whitty and Carville’s (2006) procedure, participants rated
how likely they would be to lie in the medium in that scenario. In this case, the lie
was specified for a specific medium in the scenario, and no media choices were of-
fered. In diary studies, it is impossible to know whether lies in a given medium
occur because the diarists explicitly and a priori chose that medium to conduct the
lie, or whether the lie simply emerged post hoc while interacting in that medium.
Thus, of all the methods presented, the method used by George and Carlson is the
only one that assessed the a priori choice of media for lying. Under these circum-
stances, people report that they would hypothetically lie most often face-to-face.
A second difference is that unlike the previous studies, these participants were
managers and not students. As such, the differences observed here could relate to
how college students and professionals choose to lie differently. Indeed, DePaulo
et al. (1996) found that students and non-students tended to lie somewhat differ-
ently: Students lied almost twice as often per day as non-students.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
370 Jeffrey T. Hancock and Amy Gonzales

The third difference is a statistical one. In the diary studies, lying frequency is
reported as a proportion of the total social interactions, rather than the absolute fre-
quency of lies that take place in a medium, to control for differences in how often
people use different media. To account for these differences across media, as well
as across speakers (some people have many interactions, while others have very
few), the rate of deception is calculated as a function of total social interactions. In
the George and Carlson procedure, only the absolute frequency is available.

2.4. Anonymous communication spaces


Most everyday interactions involve communications between already acquainted
people. With the exception of spam (mass emails by senders attempting to sell
products, services, or a scam), emails usually are signed and come from people
whose identities are known or easily discerned. Instant messaging primarily takes
place between people who are in each other’s contact lists, and even the phone now
typically provides some identity information in the form of caller ID. In these in-
teractions, forms of identity-based deception are much less likely (Hancock 2007).
There is a tremendous amount of concern that deception is rife in anonymous
online spaces. One study (Caspi and Gorsky 2006) queried newsgroup users about
how much deception they believed was in their online space. Of all the respon-
dents, 73 % believed that deception was very widespread, although only a minority
(29 %) reported that they themselves had lied. In an earlier study that examined
people’s self-reported practices in chat rooms, Whitty (2002) found that lying
about oneself was quite common, especially for men. Over half of the respondents
reported lying about age and occupation, with over a quarter lying about education
and income.
These data, however, do not tell us whether people were choosing to lie more
often in anonymous online spaces than in less-anonymous spaces such as face-to-
face communication. One study by Cornwell and Lundgren (2001) did exactly that.
In this study, the researchers compared how people misrepresented themselves in
romantic relationships that formed on the Internet or face-to-face. Their findings
revealed that in a few categories, such as age and physical appearance, participants
reported lying marginally more online than in their offline relationships. Surpris-
ingly, the overall lying rates were relatively consistent across the two types of com-
munication spaces.
Cornwell and Lundgren took the analysis a step further by examining whether
interpersonal factors, such as involvement in the relationship, played a role in de-
ception rates across online and physical relationships. In fact, when involvement
was included in their regression analysis, the communication space (online vs.
physical) was not significant. Instead, the degree to which participants felt in-
volved in the relationship significantly predicted lying. The more involved they
felt in a relationship, the less participants reported lying in that relationship. The

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 371

results suggested that relationships in online spaces tended to be less involved than
those in physical space.
Taken together, these data suggest that anonymous spaces can reduce involve-
ment in romantic relationships, and that this can increase lying. A good deal of re-
search, however, has indicated that interpersonal relationships can be as intimate
and involved as face-to-face relationships (see Parks and Floyd 1996; Whitty and
Carr 2006). If this is the case, then at least in romantic relationships, the nature of
the relationship may be more important than the anonymous nature of the com-
munication space. This would be similar to face-to-face research that suggests
people are less likely to lie to closer intimates (Kashy and DePaulo 1998).
However, there are many other types of deception in anonymous spaces than
misrepresenting oneself to a romantic partner. In one of the first treatments of de-
ception online, Donath (1999) described several different types of deception, in-
cluding identity concealment, category deception, trolls, and impersonation. Here
we focus on gender switching, when people present a gender online that is different
from their offline gender (Herring 2003).
Gender switching is of particular importance for this chapter because of its lin-
guistic implications. For instance, several studies (reviewed in the next section)
have examined whether people retain characteristics of their gendered language
when acting as the other gender (Herring and Martinson 2004). Here, the question
is whether (and to what extent) men and women take advantage of the lack of vis-
ual and vocal cues in text-based CMC to perform gender deception (Danet 1998).
In self-reports, this type of deception appears to be quite common. For example,
Whitty (2002) found that about one-quarter of her male respondents reported pre-
tending to be a female at some point in public chat rooms. However, as with the
everyday lies described in the previous section, the self-report data and observa-
tional data do not necessarily line up. In her review, Herring (2003) reports on her
examination of Internet Relay Chat (IRC) channels and her observation that gender
deception was not common in this anonymous space. Others have also observed
that gender switching online is relatively rare, perhaps because pretending to be
someone one is not is difficult to maintain over time (Roberts and Parks 1999).

2.5. Implications for deception in anonymous space


Clearly, because technology allows people to interact anonymously, it also enables
deception. However, comparisons to date of how often deception is used as a prag-
matic choice in anonymous versus acquainted conversation reveal that simply be-
cause deception is easier does not mean that deception is more likely to occur. In
fact, in a recent survey on misbehaving online, Selwyn (2008) found that partici-
pants reported approximately the same level of lying in online and offline interac-
tions. The best predictor of whether a participant lied in online communication was
whether they reported lying in face-to-face communication.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
372 Jeffrey T. Hancock and Amy Gonzales

As with everyday, identifiable interactions, deception in anonymous spaces ap-


pears to be strategic and motivated, although some of these motivations may be
different from those in traditional face-to-face deception. In particular, misrepre-
senting one’s attractiveness and concealing aspects of one’s identity appear to be
common in anonymous spaces, and although gender switching is more easily per-
formed in anonymous CMC spaces than face-to-face, it occurs infrequently. De-
ception appears to be an important pragmatic resource for crafting a representation
of the self or for experimenting with aspects of the self, such as gender. Although
this is not unique to anonymous online spaces, they certainly appear to provide
more opportunities to use deception to accomplish self-presentational goals.

3. Linguistic implications of deception in CMC

Once the pragmatic decision is made to lie with communication technology, in par-
ticular in text-based CMC (e.g., email, instant messaging, chat rooms, newsgroups,
text messaging, etc.), communicators must make linguistic choices about how to
express their deception. The following section focuses on this issue, laying out re-
cent trends in the research on verbal cues of deception.

3.1. Theoretical and empirical shift towards language in deception


Most previous deception research has been grounded in theories that focus pri-
marily on the non-verbal cues associated with deception (Ekman 1985). For
example, non-verbal “leakage” cues are assumed to reveal hidden emotions that
are manifest in unconscious and uncontrolled movements of the face or body. This
approach emphasized non-verbal cues because non-verbal behavior was assumed
to be less controllable than speech (Vrij 2008b).
Since the early 1990s, however, theories of deception have begun to consider
the linguistic aspects of deception. For example, Information Manipulation Theory
(McCornack 1992) draws on Grice’s Cooperative Principle and assumes that when
people lie they violate one of the Cooperative Principle’s four maxims of quality
(veridicality of an utterance), quantity (amount of information in an utterance), rel-
evance (relatedness to prior utterances), and manner (clarity of an utterance).
These violations are assumed to have detectable linguistic manifestations.
Other theories have begun to emphasize the cognitive, emotional, and moti-
vational consequences of deception on language use, such as Criteria-Based Con-
tent Analysis (CBCA; Köhnken 1996) and Reality Monitoring theory (Johnson
and Raye 1981). CBCA provides 18 verbal cues that are associated with the cog-
nitive and motivational aspects of truthful accounts, which are assumed to include
more detail, be more logically coherent, contain more spontaneous corrections,
and include more quoted speech. Similarly, Reality Monitoring theory assumes

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 373

that descriptions of real memories of an event differ from imagined or fabricated


memories, such that descriptions of real memories will contain more perceptual
and contextual information than false memories (Vrij 2008b).
Taken together, these theories suggest that deception should be reflected in lan-
guage, and recent empirical evidence provides some support for this assumption
(see Vrij 2008b for reviews of CBCA research and Masip, Sporer, Garrido, and
Herrero 2005 for reviews of Reality Monitoring research). A recent meta-review of
studies examining verbal features of deception revealed that the majority of studies
examined found support for verbal differences between deceptive and truthful lan-
guage, prompting a leading deception scholar to conclude that attending to lan-
guage features can lead to more reliable deception detection than non-verbal cues
(Vrij 2008b).
In addition to this theoretical turn towards verbal features, a second trend bol-
stering verbal research on deception is the recent advance in the computerized
analysis of language. Sophisticated computer programs can now parse language
into syntactic components and assign words to various semantic and psychological
categories rapidly and automatically. Previous research on deception has relied on
human coders in assessing language patterns. While human judgment is critical for
assessment of features such as plausibility, humans tend to be unreliable judges of
more fine-grained aspects of language, such as identifying and counting preposi-
tions, pronouns, articles, etc. Furthermore, given the vast amounts of text now
available through CMC, computerized text analysis allows for much larger corpora
of language to be examined and compared.

3.2. Linguistic aspects of deception in CMC


Building on the theoretical and empirical advances on language and deception de-
scribed above, a number of studies have used computerized text analysis programs
to identify linguistic features of deception in CMC (Hancock, Curry, Goorha, and
Woodworth 2008; Keila and Skillicorn 2005; Zhou, Twitchell, Burgoon, and Nu-
namaker 2003). These studies use programs that rely on word counting ap-
proaches, in which each word is assigned to linguistic (e.g., pronouns) or psycho-
logical categories (e.g., positive or negative affect). For a review of these kinds of
programs, see Tauszick and Pennebaker (2010).
The first study to examine the linguistic features of CMC was a careful and
sophisticated analysis of asynchronous communication conducted by Zhou et al.
(2003). In this study, participants logged into a system on which they could leave
messages for, and receive messages from, a partner. Their task was to complete the
desert survival task, in which they needed to choose a set of items to take with them
when hypothetically crashed in the desert. One of the partners was instructed to lie
about their preferences for the items. Using a collection of textual analysis tools,
Zhou and colleagues found that messages from deceptive partners were character-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
374 Jeffrey T. Hancock and Amy Gonzales

ized by more sentences with more words (including verbs and noun phrases). This
finding was contrary to face-to-face studies that show that liars use fewer words
when lying. One reason for this may be the asynchronous nature of the interaction:
Online liars can take their time to craft the lies. Liars also produced less lexical and
content diversity (e.g., a lower type-token ratio), suggesting that their messages
were less semantically complex and less detailed than those of truth tellers. These
findings were consistent with theories that suggest lies tend to be impoverished
relative to truthful accounts. The liars also used more emotional language than truth
tellers, including more positive and negative affect words (e.g., sad, delighted).
Finally, with respect to pronoun usage, liars used more third-person references
than truth tellers, but no differences were found for self-reference.
More recently, Hancock et al. (2008) examined the linguistic patterns of decep-
tion in synchronous CMC. Participants interacted over instant messaging and dis-
cussed four topics. On two of the topics, one of the participants was asked to lie to
his or her partner but to tell the truth on the other topics. Their partners were asked
to simply engage in the conversation and were unaware of the deception manipu-
lation.
The hypotheses in this study were derived from those laid out by Zhou et al.
(2003) described above and from the Newman-Pennebaker (NP) model (Newman,
Pennebaker, Berry, and Richards 2003), an empirically-derived model of deception
that predicts several language features that change relative to truthful language.
According to the NP model, lies should involve fewer first person singular pro-
nouns (“I”), as liars try to distance themselves psychologically from their lie. Sec-
ond, lies should involve fewer exclusive words (“except”, “but”), as lies tend to be
less complex than truthful statements. Third, lies should include more negative
emotion terms (e.g., “sad”, “anxious”, “afraid”), which reflect the guilt and anxiety
related to being deceptive. Last, lies should contain more motion verbs (e.g., “go”,
“fly”), which help move the story along and distract the listener.
In general, the data were supportive of the NP model’s main predictions. The
results revealed that liars, like those in Zhou et al.’s study, produced more words
when lying then when telling the truth, suggesting that CMC liars may use more
words than face-to-face liars to accomplish their deception. Unlike the Zhou et al.
study, liars used fewer self-referencing pronouns and more other-oriented pro-
nouns, consistent with the idea of psychological distancing. Finally, liars tended to
use more causal terms (e.g., “because”, “therefore”, etc.) when lying compared to
telling the truth, suggesting that they were potentially constructing more coherent
and plausible stories.
Unlike most deception studies, Hancock and colleagues also examined the lan-
guage of the partner. Even though the partner was blind to the deception manipu-
lation, the partner’s language differed across deceptive and truthful topics. The dif-
ferences often followed the senders. For instance, both the liar and the partner
increased their use of first person pronouns during deception. This kind of lin-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 375

guistic style matching occurred more frequently during deceptive parts of the con-
versation than during the truthful parts. A number of theories describe why and
how interlocutors in face-to-face communication tend to synchronize their lan-
guage, from syntactic usage (Pickering and Garrod 2004) to coordinating referents
(Brennan and Clark 1995) (for a review, see Burgoon, Stern, and Dillman 1995).
The partners, however, were unable to use this information to improve their decep-
tion detection accuracy: Partners performed at chance when trying to detect the
lies. These data suggest that, while these changes in language patterns did not help
the partner in detecting a lie, the partner’s language patterns may provide some
clues as to whether they are being lied to or not.
While the above-mentioned studies took place in the laboratory, Keila and Skil-
licorn (2005) conducted an analysis of deception in the real world, namely the
Enron email corpus provided by the Enron trial (the corpus contains approximately
500,000 emails relating to a scandal at a large corporation), in which executives
were sued for deliberately misleading investors. The Enron corpus consists of ap-
proximately 500,000 emails, and the researchers applied a subset of the NP model
to the data in an attempt to classify deceptive emails. The dimensions employed
were first person singular, negations, and exclusive words. Using these three di-
mensions, along with statistical techniques for classifying messages along the di-
mensions, Keila and Skillicorn successfully identified the most problematic (i.e.,
deceptive) emails with respect to the court case.
Taken together, a few trends emerge across these three studies. The first is that
when people lie in CMC, they tend to use more words than when they are telling
the truth, a finding that is the opposite of research on face-to-face deception. As
noted, this may be due to the written nature of CMC, which provides more time and
allows for editing. A second trend is changes in pronoun usage. Relative to telling
the truth, lies include fewer self-references but more other-references. Emotional
terms also seem to be different across lies and truths, with more emotional terms,
especially negative ones, observed during deception. Exclusive words (e.g., “ex-
cept”, “however”), which may indicate the complexity of the grammatical struc-
ture, tend to decrease during CMC deception. Last, the linguistic style-matching
data from Hancock et al. (2008) suggest that the partner’s language should also be
considered.

3.2.1. Gender deception and language in CMC


A number of studies have examined the language of gender in the context of CMC
(Hall 1996; Herring 1993, 2003; Thomson, Murachver, and Green 2001). In gen-
eral, these studies suggest that men and women use language in different ways
along some dimensions. Females tend to use more hedges, justifications, personal
pronouns, and expressions of emotion, while males tend to use assertions, rhetori-
cal questions, sarcasm, profanity, and challenges. An important question, however,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
376 Jeffrey T. Hancock and Amy Gonzales

is whether these differences persist when speakers are being deceptive about their
gender. Since gender cues are presumably given off unconsciously (Goffman
1959), they should be difficult for speakers to control.
Several studies have looked at the detection of gendered language (Savicki,
Kelley, and Oesterreich 1999; Thomson, Murachver, and Green 2001). When
Thomson and Murachver presented students with emails and asked them to ident-
ify the gender of the authors, the students were relatively successful in distinguish-
ing female emails from male ones. The authors concluded that a combination of
linguistic features led to the decisions, rather than any one feature alone.
A more recent study examined how people performed gender online when
being deceptive about their actual (offline) gender (Herring and Martinson 2004).
In this study, the authors examined the transcripts from a gender-switching game,
in which some participants were deceptive about their gender and others were not.
The game took place in a synchronous chat space. The researchers found that
participants produced stereotypical content when performing the opposite gender,
but they also gave off stylistic cues to their actual gender. That is, when females
played males they talked about overtly stereotypically male topics or content (e.g.,
cars), while males playing females talked about stereotypically female content
(e.g., shopping). Nonetheless, there were some stylistic cues associated with their
gender that participants were unable to control, such as gendered differences in
pronoun usage, hedges, and rhetorical questions. Judges in the game only guessed
participants’ gender correctly approximately half the time, in part, perhaps, because
they based their judgments primarily on the stereotypical content rather than on
language use.

3.3. Style versus content in the language of CMC deception

A comparison of the language of deception in CMC interaction and the language of


gender deception highlights an important distinction about the kind of language
that is most likely to reflect deception. As noted in the gender research, participants
were unable to hide the stylistic features of their language, such as pronoun usage.
A review of the deception in CMC results suggests that stylistic features such as
pronoun usage are also what liars find most difficult to control. This is no coinci-
dence, as stylistic words tend be less consciously accessible. Words can be divided
roughly into two broad categories: content words and function words (Chung and
Pennebaker 2007). Content words refer to terms that have semantic value and in-
clude word categories such as nouns, adjectives, and lexical verbs. In contrast,
function words convey primarily grammatical information and include pronouns,
prepositions, articles, conjunctions, and auxiliary verbs.
Whereas the average native English speaker has a vocabulary of well over
100,000 words, fewer than 400 are common function words (Baayen, Piepenbrock,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 377

and Gulikers 1995). This seemingly trivial percentage (less than 0.04 %) of vo-
cabulary accounts for over half of the words in daily speech. Despite the frequency
of their use, function words are the hardest to master when learning a new lan-
guage. Indeed, they are virtually invisible in daily reading and speech (Chung and
Pennebaker 2007).
Recent research shows that the analysis of function words, such as articles,
auxiliary verbs, prepositions, and pronouns, provides important clues about the so-
cial relationship between a speaker and the audience, the psychological state of the
speaker, and information about the speaker’s social role and status in the commu-
nity (Chung and Pennebaker 2007; Herring and Paolillo 2006). Function words
may also be important in the language of deception in CMC, whether it be lies
about gender or some other topic.

3.4. Future directions


The growing body of research described above suggests that linguistic and dis-
course patterns can be extracted from deceptive language in CMC (Hancock et al.
2008; Herring and Martinson 2004; Zhou et al. 2003). This program of research,
however, is at its nascence, and there are at least two important directions in which
this research needs to move. First, the vast majority of research on deception in
CMC has focused only on English from Western cultures. The scant research that
has examined deception patterns across cultures suggests that there are some cul-
ture-specific differences in how deception is perceived, but that there are also some
principles of deception that may be universal across cultures. For example, Zhou
and Lutterbie (2005) find that the collectivism-individualism dynamic should af-
fect whether pro-social lying designed to maintain harmonious relationships is per-
ceived as acceptable or not, with people from collectivist cultures viewing these
pro-social lies as more acceptable than people from individualistic cultures.
An important question is whether the linguistic markers identified in English
hold or change across cultures. There are important linguistic differences, such as
differences in obligatory evidentiality between English and Arabic or differences
in pronoun use between English and Chinese, that may affect how deception is sig-
naled in language. Zhou and Lutterbie (2005) advocate a top-down and bottom-up
approach, in which bottom-up language patterns are identified statistically without
reference to psychological expectations, while top-down approaches guide specific
analyses (e.g., speakers psychologically distance themselves from their lies, which
theoretically should be the case across cultures).
The second direction is concerned with improved ecological validity. Most de-
ception research takes place within fairly static and highly controlled laboratory
studies, which may or may not generalize to the real world. This is especially the
case for CMC research. Most studies involve participants telling true or false
stories to each other in a chat room (Hancock et al. 2008; Zhou et al. 2003). Criti-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
378 Jeffrey T. Hancock and Amy Gonzales

cally, the lies generated in most lab studies are mocked up, and liars have little
motivation to succeed in their lies.
Some non-CMC research has begun to examine deception in naturalistic set-
tings. For example, in a project examining deception in political speech, Marko-
witz, Hancock, and Bazarova (2011), compared false statements (e.g., claims that
Iraq had weapons of mass destruction or direct links to al Qaeda) and non-false
statements (e.g., that Saddam Hussein had used gas on his own people) produced
by officials in the Bush administration in the run-up to the 2003 Iraq war. Consist-
ent with the NP model of deception’s predictions, false statements contained sub-
stantially reduced rates of first-person singular (“I”) and exclusive terms (“ex-
cept”, “but”) but more negative emotion terms and action verbs. Using this simple
model, we were able to classify approximately 76 % of the Bush administration’s
statements correctly as either false or not false.
CMC deception seems to be a good fit for naturalistic studies. Like the Enron
analysis by Keila and Skillicorn (2005), future research needs to identify archival
cases in which the ground truth of deception has been established, and the language
records have been preserved. More of this kind of research should lead to major ad-
vances in understanding the pragmatic and linguistic implications of deception in
CMC.

4. Conclusion

The first of this chapter’s central questions was concerned with whether, and if so,
how, technology enters into the calculus of deception. The studies reviewed sug-
gest that the communication spaces created by various technologies can shape
speakers’ decisions to use deception as a pragmatic tool in accomplishing their ob-
jectives. This seems to be the case in both everyday interpersonal interactions, with
technologies such as email, instant messaging, and the telephone, and in more
anonymous online spaces, such as chat rooms and news groups.
The relationship between deception and technology is clearly not simple, but in
our view, it is systematic. Equally importantly, many more questions remain to be
answered as technologies evolve. For example, new technologies, such as the avat-
ars in graphically-based virtual environments, may make deceptions more sophis-
ticated. As Donath (2007: 53) asks, “as behavioral software becomes more soph-
isticated, are we creating avatars that will be increasingly attractive and seemingly
friendly but are in fact the ideal mask behind which a dishonest or manipulative
person can operate?” Indeed, a recent study suggests that people feel more com-
fortable lying when using an avatar than when lying in text-based communication
(Galanxhi and Fui-Hoon Nah 2007).
Our second question was concerned with the linguistic traces of deception in
CMC. Although this line of research has just begun, it suggests some potential in

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 379

being able to identify patterns of deception in language, with liars online using
more words, less self-referencing and more other-referencing language, and pro-
ducing less grammatically complex messages. Whether these patterns stand up to
more ecologically valid and diverse tests remains to be answered. Nonetheless, the
fact that stylistic features (such as function words) tend to be critical in both inter-
personal deception and gender-based deception suggests that this class of words
may be especially important.
This final point has relevance for the question of whether to lie online or not.
Currently, there are no reliable methods for identifying deception in CMC, so this
kind of issue does not enter into the question of whether one should lie online.
However, given the potential to identify deceptive patterns, and the fact that much
of what people say now on the Internet will be around for many years, in the future
it may be necessary to consider even more carefully the question of whether or not
to lie.

References

Baayen, R. Harald, Richard Piepenbrock, and Léon Gulickers


1995 The CELEX Lexical Database [CD ROM]. Philadelphia, PA: Linguistic Data
Consortium, University of Pennsylvania.
Bavelas, Janet B., Alex Black, Nicole Chovil, and Jennifer Mullett
1990 Truths, lies, and equivocations: The effects of conflicting goals on discourse.
Journal of Language and Social Psychology 9(1–2): 129–155.
Brennan, Susan E. and Herbert H. Clark
1995 Conceptual pacts and lexical choice in conversation. Journal of Experimental
Psychology: Learning, Memory, and Cognition 22(6): 1482–1493.
Buller, David B. and Judee K. Burgoon
1996 Interpersonal deception theory. Communication Theory 6(3): 203–242.
Burgoon, Judee K., Lesa A. Stern, and Leesa Dillman
1995 Interpersonal Adaptation: Dyadic Interaction Patterns. New York: Cambridge
University Press.
Carlson, John R., Joey F. George, Judee K. Burgoon, Mark Adkins, and Cindy White
2004 Deception in computer-mediated communication. Group Decision and Nego-
tiation 13(1): 5–28.
Caspi, Avner and Paul Gorsky
2006 Online deception: Prevalence, motivation, and emotion. Cyberpsychology and
Behavior 9(1): 54–59.
Chung, Cindy K. and James W. Pennebaker
2007 The psychological functions of function words. In: Klaus Fiedler (ed.), Social
Communication, 343–359. New York: Psychology Press.
Clark, Herbert H. and Susan E. Brennan
1991 Grounding in communication. In: Lauren B. Resnick, John Levine, and Stepha-
nie D. Teasley (eds.), Perspectives on Socially Shared Cognition, 127–149.
Washington, DC: APA.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
380 Jeffrey T. Hancock and Amy Gonzales

Cornwell, Benjamin and David C. Lundgren


2001 Love on the Internet: Involvement and misrepresentation in romantic relation-
ships in cyberspace vs. realspace. Computers in Human Behavior 17(2):
197–211.
Daft, Richard L. and Robert H. Lengel
1984 Information richness: A new approach to managerial behavior and organiz-
ation design. In: Barry M. Staw and Larry L. Cummings (eds.), Research in
Organizational Behavior 6, 191–233. Greenwich, CT: JAI Press.
Daft, Richard L. and Robert H. Lengel
1986 Organizational information requirements, media richness and structural de-
sign. Management Science 32(5): 554–571.
Danet, Brenda
1998 Text as mask: Gender, play and performance on the Internet. In Steven G.
Jones (ed.), Cybersociety 2.0: Revisiting CMC and Community, 129–158.
Thousand Oaks, CA: Sage.
DePaulo, Bella M., Deborah A. Kashy, Susan E. Kirkendol, Melissa M. Wyer, and Jennifer
A. Epstein
1996 Lying in everyday life. Journal of Personality and Social Psychology 70(5):
979–995.
DePaulo, Bella M., James J. Lindsay, Brian E. Malone, Laura Muhlenbruck, Kelly Charlton,
and Harris Cooper
2003 Cues to deception. Psychological Bulletin 129(1): 74–118.
Donath, Judith S.
1999 Identity and deception in the virtual community. In: Marc A. Smith and Peter
Kollock (eds.), Communities in Cyberspace, 25–59: London: Routledge.
Donath, Judith S.
2007 Virtually trustworthy. Science 317: 53–54.
Ekman, Paul
1985 Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage. New
York: W. W. Norton.
Ennis, Edel, Aldert Vrij, and Claire Chance
2008 Individual differences and lying in everyday life. Journal of Social and Per-
sonal Relationships 25(1): 105–118.
Galanxhi, Holtjona and Fiona Fui-Hoon Nah
2007 Deception in cyberspace: A comparison of text-only vs. avatar-supported
medium. International Journal of Human-Computer Studies 65(9): 770–783.
George, Joey F. and John R. Carlson
2005 Media selection for deceptive communication. In: Proceedings of the Thirty-
Eighth Hawaii International Conference on System Sciences. Los Alamitos,
CA: IEEE Press.
Goffman, Erving
1959 The Presentation of Self in Everyday Life. New York: Doubleday.
Grice, H. Paul
1989 Studies in the Way of Words. Cambridge, MA: Harvard University Press.
Hall, Kira
1996 Cyberfeminism. In Susan C. Herring (ed.), Computer-Mediated Communi-
cation: Linguistic, Social, and Cross-Cultural Perspectives, 147–170. Amster-
dam/Philadelphia: John Benjamins.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 381

Hancock, Jeffrey T.
2007 Digital deception: When, where and how people lie online. In: Katelyn
McKenna, Tom Postmes, Ulf-Dietrich Reips, and Adam N. Joinson (eds.), Ox-
ford Handbook of Internet Psychology, 287–301. Oxford, UK: Oxford Univer-
sity Press.
Hancock, Jeffrey T., Lauren E. Curry, Saurabh Goorha, and Michael T. Woodworth
2008 On lying and being lied to: A linguistic analysis of deception. Discourse Pro-
cesses 45(1): 1–23.
Hancock, Jeffrey T., Jennifer Thom-Santelli, and Thompson Ritchie
2004a Deception and design: The impact of communication technologies on lying be-
havior. In: Proceedings of the 2004 ACM Conference on Human Factors in
Computing Systems 6, 130–136. New York: ACM.
Hancock, Jeffrey T., Jennifer Thom-Santelli, and Thompson Ritchie
2004b What lies beneath: The effect of communication medium on deception produc-
tion. Paper presented at the Annual Meeting of the Society for Text and Dis-
course, Chicago, IL.
Herring, Susan C.
1993 Gender and democracy in computer-mediated communication. Electronic
Journal of Communication 3(2).
http://www.cios.org/EJCPUBLIC/003/2/00328.HTML
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi Hamilton (eds.), The Handbook of Discourse Analysis, 612–634. Ox-
ford, UK: Blackwell Publishers.
Herring, Susan C.
2003 Gender and power in online communication. In: Janet Holmes and Miriam
Meyerhoff (eds.), The Handbook of Language and Gender, 202–228. Oxford,
UK: Blackwell.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Lan-
guage@Internet 4, article 1.
http://www.languageatinternet.org/articles/2007/761
Herring, Susan C. and Anna Martinson
2004 Assessing gender authenticity in computer mediated language use: Evidence
from an identity game. Journal of Language and Social Psychology 23(4):
424–446.
Herring, Susan C. and John C. Paolillo
2006 Gender and genre variation in weblogs. Journal of Sociolinguistics 10(4):
439–459.
Johnson, Marcia K. and Carol L. Raye
1981 Reality monitoring. Psychological Review 88(1): 67–85.
Kashy, Deborah A. and Bella M. DePaulo
1998 Who lies? Journal of Personality and Social Psychology 70: 1037–1051.
Keila, Parambir S. and David B. Skillicorn
2005 Detecting unusual and deceptive communication in email. IBM Centers for
Advanced Studies Conference, Richmond Hill, Ontario, Canada, October
17–20.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
382 Jeffrey T. Hancock and Amy Gonzales

Köhnken, Giinter
1996 Social psychology and the law. In: Gün R. Semin and Klaus Fiedler (eds.), Ap-
plied Social Psychology, 257–282: London: Sage.
Markowitz, David, Hancock, Jeffrey T., and Bazarova, Natalya N.
2011 The language of presidential lies: How words reflect lies about war, personal
scandal and state secrets. Paper presented at the 97th Annual Meeting of the
National Communication Association, New Orleans.
Masip, Jaume, Siegfried L. Sporer, Eugenio Garrido, and Carmen Herrero
2005 The detection of deception with the Reality Monitoring approach: A review of
the empirical evidence. Psychology, Crime, and Law 11: 99–122.
Mazar, Nina and Dan Ariely
2006 Dishonesty in everyday life and its policy implications. Journal of Public Pol-
icy and Marketing 25(1): 1–21.
McCornack, Steven A.
1992 Information Manipulation Theory. Communication Monographs 59(1): 1–16.
McCornack, Steven A., Timothy R. Levine, H. I. Torres, and D. M. Campbell
1992 When the alteration of information is viewed as deception: An empirical test of
information manipulation theory. Communication Monographs 59(1): 17–29.
Möllering, Guido
2006 Trust: Reason, Routine, Reflexivity. Oxford, UK: Elsevier.
Newman, Matthew L., James W. Pennebaker, Diane S. Berry, and Jane M. Richards
2003 Lying words: Predicting deception from linguistic style. Personality and So-
cial Psychology Bulletin 29(5): 665–675.
Parks, Malcolm R. and Kory Floyd
1996 Making friends in cyberspace. Journal of Communication 1(4): 80–96.
Pickering, Martin J. and Simon Garrod
2004 Toward a mechanistic psychology of dialogue. Behavioral and Brain Sciences
27(2): 169–225.
Roberts, Lynne D. and Malcolm R. Parks
1999 The social geography of gender-switching in virtual environments on the In-
ternet. Information, Communication, and Society 2(4): 521–540.
Savicki, Victor, Merle Kelley, and E. Oesterreich
1999 Judgments of gender in computer mediated communication. Computers in
Human Behavior 15(2): 185–194.
Selwyn, Neil
2008 A safe haven for misbehaving? An investigation of online misbehavior among
university students. Social Science Computer Review 26(4): 446–465.
Sproull, Lee and Sara Kiesler
1986 Reducing social context cues: Electronic mail in organizational communi-
cation. Management Science 32(11): 1492–1512.
Tausczik, Yla and James W. Pennebaker
2010 The psychological meaning of words: LIWC and computerized text analysis
methods. Journal of Language and Social Psychology 29(1): 24–54.
Thomson, Rob, Tamar Murachver, and James Green
2001 Where is the gender in gendered language? Psychological Science 12(2):
171–175.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
Deception in computer-mediated communication 383

Twitchwell, Douglas P., Jay F. Nunamaker, and Judee K. Burgoon


2004 Using speech act profiling for deception detection. In: Hsinchun Chen (ed.),
Intelligence and Security Informatics, 403–410. Berlin: Springer Berlin.
Vrij, Aldert
2008a Detecting Lies and Deceit: The Psychology of Lying and the Implications for
Professional Practice. Chichester, UK: Wiley.
Vrij, Aldert
2008b Nonverbal dominance versus verbal accuracy in lie detection: A plea to change
police practice. Criminal Justice and Behavior 35(10):1323–1336.
Whitty, Monica T.
2002 Liar, liar! An examination of how open, supportive and honest people are in
chat rooms. Computers in Human Behavior 18(4): 343–352.
Whitty, Monica T. and Adrian N. Carr
2006 Cyberspace Romance: The Psychology of Online Relationships. Basingstoke,
UK: Palgrave Macmillan.
Whitty, Monica T. and Siobhan E. Carville
2008 Would I lie to you? Self-serving lies and other oriented lies told across differ-
ent media. Computers in Human Behavior 24(3): 1021–1031.
Zhou, Lina and Simon Lutterbie
2005 Deception across cultures: Bottom-up and top down approaches. In: Paul Kan-
tor, Gheorghe Muresan, Fred Roberts, and Daniel Zeng (eds.), Intelligence and
Security Informatics, 465–470. Springer-Verlag: Berlin.
Zhou, Lina, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, and Jay F. Nunamaker
2003 An exploratory study into deception detection in text-based computer-me-
diated communication. In: Proceedings of the Thirty-Sixth Hawaii Inter-
national Conference on System Sciences. Los Alamitos, CA: IEEE Press.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
384 Jeffrey T. Hancock and Amy Gonzales

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:01 PM
16. Email hoaxes
Theresa Heyd

1. Introduction

The Internet, it sometimes seems, is a natural environment for all kinds of decep-
tion. It can be a daunting task even for skilled, experienced users to differentiate
between the sincere and the countless incarnations of trickery, pranks, scams, and
frauds in online communication. Whether the fears about lowered sincerity stan-
dards on the Internet are justified or just a modern form of cultural pessimism, at
times it appears as though Harry Frankfurt’s concept of “bullshit” (Frankfurt 2005)
has come into its own in the digital domain.
Indeed, deceptive behavior is present in virtually all areas and socio-technical
modes of the Internet. Online communities afford the “pseudonymity” of faked
user identities (Heisler and Crabill 2006); online journalism struggles with relia-
bility and quality standards (Borden and Harvey 1998; Hayes, Singer, and Ceppos
2007); teachers and scientific editors lament “mouse-click plagiarism” (e.g., Auer
and Krupar 2001); and even Web 2.0, hailed as a more participatory and open com-
municative environment, has generated its own deceptive phenomena in the form
of “splogs” and “flogs” (spam and fake weblogs; see Kolari, Java, and Finin 2006).
Perhaps most centrally, since the first spamming incident – usually attributed to
Gary Thuerk and his promotional email to 600 ARPANet members in 1978 (see
Hedley 2006 for an overview) – Internet users have become acquainted with spam,
viruses, phishing, and Nigerian scam emails, along with many other genres of de-
ceptive communication that appear in their inboxes.
While digital deception can be visual, as the popular pastime of “photoshop-
ping” pictures strikingly demonstrates (Frank 2004), deceptive behavior online is
first and foremost discourse-based; it is thus a valid and central issue in the study of
computer-mediated communication (CMC). Specifically, deception lends itself
well to description within the framework of pragmatic theory. This chapter thus
has a two-part structure. First, it provides an overview of deceptive behavior in
CMC, describing its most typical instantiations, identifying previous case studies,
and outlining the theoretical pillars of the analysis of non-sincere messages that
will be presented in what follows. The second part of the chapter illustrates how
such approaches can be implemented in actual analysis, through a case study of
a particularly striking deceptive genre of CMC, namely email hoaxing. Email
hoaxes (henceforth EHs), a subgenre of digital folklore, are deceptive messages
that are spread by well-meaning users in digital social networks through the for-
warding function of email programs; examples and a more detailed description are

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
388 Theresa Heyd

given below. The analysis, based on a corpus of 150 texts, is grounded in the
Gricean cooperative framework and speech act theory; it highlights the pragmatic
duality of EHs between a cooperative and a non-cooperative status and their de-
pendence for success on uptake patterns in their receivers.

2. Deception and pragmatics, deception in CMC genres:


A brief overview

Lying is a form of verbal behavior. Accordingly, there are many language-focused


approaches to deception, ranging from evolutionary anthropology and psychology,
where an agent’s capability for understanding and enacting deception is dependent
on its possession of Theory of Mind (e.g., Leslie 1987; Winner et al. 1998), to the
detection of deception in applied contexts, such as legal and forensic linguistics
(e.g., Granhag and Strömwall 2004; Shuy 1998). The existing literature on decep-
tion in CMC was for a long time confined to popular science and guidebooks such
as Mintz (2002) and Barrett (1996). More recently, overview articles such as Carl-
son et al. (2004), Hancock (2007), and Zhou, Burgoon, Nunamaker, and Twitchell
(2004) have become available. The general topic of deception in CMC is covered
extensively by Hancock and Gonzalez in this volume. The overview provided here
focuses on pragmatic theories, in particular speech act theory and Gricean ap-
proaches to cooperation. Deception is one of the more complex ways of doing
things with words; in this sense, these fundamental pragmatic theories are particu-
larly apt for describing deceptive behavior. It is argued here that through modeling
the communicative processes of trickery and lying and determining their func-
tionality and interpersonal effects, deception can be understood as an essentially
pragmatic phenomenon.
The first methodological pillar in the pragmatic analysis of deception is the
Gricean principle of cooperation (see especially Grice 1975, 1989), a central para-
digm in the analysis of language in use. Grice describes human communication as
a cooperative effort: In the default case, speakers strive to behave in a rational and
purposeful way, and listeners expect the same. While analyses in Grice’s frame-
work are most typically concerned with cooperation – in particular, how speakers
achieve effects such as irony, metaphor, etc. through seemingly non-cooperative
implicature – it can also be used to model deviation from this communicative stan-
dard. In this way, deceptive discourse basically can be described as a form of prag-
matic non-cooperation. Grice envisaged several strategies for violating the Coop-
erative Principle (CP) – opting out, a clash of conversation maxims, etc. – but
deception can perhaps most aptly be captured in the strategy of “quietly and unos-
tentatiously violat[ing]” (Grice 1975: 49) the quantitative and qualitative maxims
of the CP. Treatments of deceptive behavior from a Gricean perspective can be
found in Meibauer (2005) and Rudanko (2007). Many “post-Gricean” approaches –

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 389

the most established being Relevance Theory (Sperber and Wilson 1986) and clas-
sic politeness theory (Brown and Levinson 1987) – are also strongly influenced by
the cooperative paradigm. A major axis for distinguishing different qualities of CP
violations is the degree to which the speaker is aware of his or her deviant beha-
vior: A spectrum exists from blatant lying to semi-conscious self-deception and the
naïve utterances of irrational speakers (see Heyd 2006). The Gricean model has
also been applied successfully to neighboring phenomena such as humor (e.g., At-
tardo 1993).
Speech act theory is the second major pillar in the pragmatic analysis of decep-
tion. Based on Austin’s classic essay How to Do Things with Words (Austin 1962)
and Searle’s first major study (Searle 1969), speech act theory can be described
very broadly as the analysis of discourse in performance. The main focus has tra-
ditionally been on “illocutionary acts” with relatively well-defined speaker inten-
tions, such as promises, threats, and oaths, and taxonomies of speech act types
have been put forward, such as Bach and Harnish’s (1979) classification into con-
statives, commissives, directives, and acknowledgments. Many analyses focus on
indirect speech acts as they are used to achieve more complex communicative
goals (in particular conveying nonliteral meaning). Deception as a type of speech-
acting has been studied both in applied contexts (e.g., Lee 2000 on the develop-
ment of lying in children) and in more theoretical frameworks (in particular Reboul
1994). Reboul (1994) has emphasized the limitations of speech act theory in ana-
lyzing deception by identifying a clash between illocution (assertion) and perlocu-
tion (lying) that cannot easily be resolved. This critical perspective points to a
more general problem: No comprehensive pragmatic theory of non-cooperation (in
all its instantiations) exists to date. A pragmatic model of deception, possibly
based on evolutionary approaches to communicative behavior such as that pro-
posed by Dunbar (1996), would be an important goal for future studies in prag-
matic theory. For the time being, the conceptual frameworks outlined above can
yield valuable insights both for traditional and digital genres.
Several instantiations of digital deception have already been touched upon in the
introduction. Of course, lying can occur in any form of CMC at any given moment,
just as in non-digital forms of discourse. However, a number of genres can be
loosely grouped together whose central distinctive feature arguably is a certain in-
built insincerity. Some of the better-known genres of deceptive CMC, most of them
forms of email and other modes of asynchronous CMC, are discussed briefly below.
As an initial categorization, deceptive CMC genres can be differentiated along
the axis of “profit” vs. “fun”. Two important phenomena in the first category are
spam (unsolicited bulk email) and phishing (a term derived from hacker jargon for
password theft). The deceptive element in spam is usually based on false product
information, and in phishing, sensitive data such as passwords or credit card details
are elicited through the simulation of a trustworthy identity (e.g., the appropriation
of bank names or popular online services such as Ebay or PayPal). Since both phe-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
390 Theresa Heyd

nomena can have serious financial effects and are a threat to online security, it is
not surprising that many studies focus on means for the automatic detection and fil-
tering of such messages (see, for just two examples among many, Dhamija, Tygar,
and Hearst 2006 for phishing, and Oda and White 2005 for spam). From a more
theoretical perspective, Barron (2006) and Schmückle and Chi (2004) have pub-
lished genre studies of spam.
Another widespread form of fraudulent for-profit communication is the “Ni-
gerian” or “419” email (advance fee fraud). In this form of deceptive email, users
are targeted with false stories – typically elaborated narratives involving deceased
millionaires, usurped dictators, and other sensational elements – promising finan-
cial gain in exchange for a small advance payment. Nigerian emails have been ana-
lyzed in terms of their narrative scope (Cukier, Nesselroth, and Cody 2007), as well
as their writers’ grassroots literacy (Blommaert and Omoniyi 2006); for a dis-
cussion of the concept of “authenticity” in Nigerian emails, see the chapter by Gill
in this volume.
At the other end of the scale, genres exist which cause no financial harm to the
receiver (or gain for the sender) but which may have more complex psychosocial
motivations, such as to demonstrate digital literacy; one of these is email hoaxing.
EHs are particularly interesting from a pragmatic perspective because the com-
municants who forward them usually treat them as trustworthy, non-deceptive
messages. Apart from the framework outlined in this chapter (see Heyd 2008 for
more details), EHs have been studied as digital counterparts of oral traditions such
as urban legends (Fernback 2003) and from a social science perspective in terms of
users’ attitudes toward such messages (Kibby 2005).
Trolling is another socio-technical phenomenon frequently found in online
communities. Trolling is the strategy of provoking other users through blatantly
false, exaggerated, or misleading utterances. It closely resembles email hoaxing
in its psychosocial design, as it strives to elicit responses particularly from inex-
perienced users who engage with the message as if it were bona fide. Discussions
of trolling have been put forward by Donath (1999) and Herring, Job-Sluder,
Scheckler, and Barab (2002).
Finally, websites constitute a more static socio-technical mode that has been
appropriated for deceptive uses. Many fake websites exploit the semiotic power of
URLs by using an evocative lexical item (such as a brand, a proper name, or an-
other well-known cultural artifact) to simulate credibility and sincerity, a tactic
known as “cybersquatting” (see Heyd 2008: 15). Fake websites cover the entire
spectrum of fraud vs. fun: While they are increasingly used as a platform for phish-
ing, they have also been a vehicle for more jocular hoaxes whose primary goal is to
fool the user. As noted in the introduction, Web 2.0 successors of traditional web-
sites such as blogs and social network sites have already seen the rise of mode-spe-
cific deception. These more recent developments indicate that deception is a con-
stant of CMC.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 391

3. This is not a joke: Introducing email hoaxes

3.1. A brief history of hoaxing


To: friends
Sent: Thursday, December 13, 2001 9:11 PM
Subject: Troubles with Virus WTC Survivor
HOPE THIS GETS TO YOU IN TIME
BIG TROUBLE!!!! DO NOT OPEN “WTC Survivor”
It is a virus that will erase your whole “C” drive. It will come
to you in the form of an E-Mail from a familiar person. I repeat
a friend sent it to me, but called and warned me before I opened
it. He was not so lucky and now he can’t even start his com-
puter! Forward this to everyone in your address book. I would
rather receive this 25 times than not at all. If you receive an
email called “WTC Survivor” do not open it. Delete it right
away! This virus removes all dynamic link libraries (.dll
files) from your computer.
This is a serious one.

Example 1. A typical instance of email hoaxing

The text above is a typical instance of an email hoax – a deceptive CMC genre
that has been the daily fare of inboxes around the world ever since the early 1990s
(see Boese 2003 and Heyd 2008 for overviews). The specimen from example 1 ap-
peared within days of the September 11, 2001 attacks in the United States and has
been circulating ever since with translations into Spanish and Hungarian, among
other languages. In general, EHs follow a somewhat paradoxical pattern: They
have a high proliferation and spread with remarkable speed, yet they are communi-
cated exclusively from private user to private user; they all contain warnings,
promises, threats, and supposedly relevant information, yet every EH is based on
information that is, at its core, deceptive or at least problematic. It should be clear
from this initial description that EHs constitute complex and intricate speech acts.
To be sure, hoaxing did not originate in the digital medium; a variety of offline
phenomena preceded it, some of which has attracted research activity. There have
been literary hoaxes, such as MacPherson’s Ossian; scientific hoaxes, such as the
fakes by Mark Twain and others; and, more recently, the Sokal hoax that shook the
foundations of poststructuralist academia (Sokal 1996).1 Definitions of hoaxing
have included a “deliberately concocted untruth to masquerade as truth” (Mac-
Dougall 1958: vi) and “a deliberately deceptive act that has succeeded in capturing
the attention (and, ideally, the imagination) of the public” (Boese 2003: 2). It is no-
table that both these descriptions, while not based in a linguistic tradition, hinge on
concepts of pragmatics and discourse analysis. Yet, research on the hoax as a lin-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
392 Theresa Heyd

guistic and pragmatic entity is only just beginning to emerge, both in its pre-digital
(Walsh 2007) and digital (Heyd 2008) instantiations. The following overview out-
lines the distinctive features of email hoaxing as a CMC genre and presents textual
evidence.

3.2. Defining the object of analysis – what counts as an EH?


The distinctive features of email hoaxing can be described in terms of three do-
mains: communication channel, communicant identity, and message scope and
make-up. These criteria define EHs and help to distinguish them from the neigh-
boring deceptive phenomena mentioned above.

3.2.1. Communication channel


The first criterion is quite straightforward: EHs spread from mailbox to mailbox
via email. This distinguishes them from phenomena such as trolling, fake websites,
and splogs.

3.2.2. Communicant identity


The second criterion concerns the communication roles of sender(s) and receiv-
er(s). Communicant identity plays a central role in the makeup of the genre, in that
hoaxes circulate within social networks, which makes for highly specific patterns
of senders and addressees.
Sender identity: The sender must be an individuated and well-established per-
sona: Their name and identity must be clearly identifiable from the email header;
they may not remain anonymous; and they usually are a personal and private ac-
quaintance of the receiver. Thus the primary candidates for engaging in hoax email
exchanges are the members of an individual’s digital social network: family and
relatives; friends and acquaintances; and colleagues. Crucially, such senders for-
ward EHs in good faith, believing in the reliability of the message. This does not
entail that the communicants in question entertain a very close relationship or even
that they be offline acquaintances. On the contrary, it can be hypothesized that the
sending of EHs is a preferred tool for maintaining and fostering looser email rela-
tionships.
Addressee identity: It follows logically from the above that the addressees of an
EH must be personally acquainted with the sender. Mailings to as-yet-unknown re-
ceivers, or even random mailings, do not occur with EHs, whereas they are stan-
dard in spam, phishing, and 419 scam mails. EHs are sent in order to maintain, not
establish, email contacts. However, the most pertinent aspect of hoax email targets
is not their degree of intimacy with the sender, but rather their number: Hoax
emails have multiple receivers and tend to openly display it. The most obvious sign

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 393

of multiple addressing is the header information, where multiple receivers are evi-
dent from long address lists in the “to” and/or “cc” fields. Beyond this purely for-
mal aspect, hoax emails often display an openly encoded conceptual multiplicity
that is most noticeable in openings and closings (example 2).
Dear ALL
Hello Disney fans,
All mobile users pay attention.

Example 2. Some typical openings of EHs

This clear commitment to the non-exclusivity of the communicative act is a


striking departure from other mass mailings discussed above, such as spam, phish-
ing, and Nigerian emails, which try to simulate confidential 1-to-1 communication.
The only type of email reminiscent in this respect is the “private mass email”,
where email users address a number of receivers with one message. This resem-
blance is not so surprising, since EHs can be a tool for maintaining social relations
via online communication.

3.2.3. Message scope and make-up


Finally, EHs can be distinguished from related phenomena in what they do and
how their content works. The contents of different EH types will be disambiguated
into a brief typology in the next section. However, the communicative scope of
EHs is stable across all types of EHs and can be channeled into three concepts: pro-
liferation, textuality, and deception.
Proliferation: This aspect is closely connected to the sender and addressee
structure described above. Quite simply, hoaxing is a case of serial communi-
cation, and its success can be measured according to its dissemination rate. In this
respect, EHs are strongly reminiscent of chain letters, as well as rumor and gossip
(see, e.g., Rosnow and Fine 1976: 31). It is not surprising, then, that virtually every
EH contains a very distinctive speech act urging the reader to disseminate the
message. Such statements of the “forward this to everyone you know” type have
become the telltale sign of EHs.
While the technicality of email programs affords the forwarding of messages,
this strong penchant towards dissemination appears to be a particularity of EHs. Re-
lated phenomena such as spam and phishing do not encourage forwarding; the suc-
cess of 419 scam mails actually depends on the confidential treatment of the mess-
age (which is routinely requested in such mailings). Even in everyday email traffic,
the forwarding of messages may be perceived as problematic; accordingly, mess-
ages occasionally contain an explicit ratification, or prohibition, of dissemination.
Textuality: An EH is a purely textual artifact, in that it exclusively draws on,
and is limited to, the textual sphere.2 Engaging with an EH has no physical or ma-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
394 Theresa Heyd

terial consequences for a communicant – whatever a user’s reaction to an EH (ig-


noring it, forwarding it, replying to its sender), it will be a purely communicative
exchange. This is not the case with related phenomena, as engaging with Nigerian
emails or phishing scams can have distinct “real life” consequences. Behind the
scam is a material person with material financial interests, and some people who
have engaged with such scammers have lost great amounts of money. An EH, in
contrast, “does” a range of things (in the speech act sense), but its doings are of a
textual nature. The strongest drive of an EH is, as described above, its urge for pro-
liferation; this is a textual function par excellence – a communicative system of
self-replication.
Deception: This final criterion is closely linked to the textual nature of the
genre. EHs contain a piece of false, or at least problematic, information. This is the
sine qua non condition for an EH; an EH hinges on its deception, and it is usually
its central claim, its scope, which bears the deceptive element. Thus, if an EH
warns of a virus, the danger will be nonexistent; if it promises goods or riches, the
supposed mechanism will be technically impossible; if it summons sympathy for
someone sick or missing, the person will be purely fictitious. The cases where an
EH’s claim is originally grounded in facts are so rare as to constitute highly marked
exceptions. An element of deception, then, is the conceptual backbone in the
makeup of EHs.

3.3 The data: A brief typology of EHs


It is not difficult, in theory, to acquire EHs for the purpose of corpus-building and
analysis: In personal email exchanges, the phenomenon is surprisingly persistent
and will yield a number of cases over a certain time period. For a more organized
and large-scale approach, other sources lend themselves. Most prominently, sev-
eral long-term databases exist on the World Wide Web that have been archiving the
occurrence of EHs for years and provide publicly accessible archives. Examples
include http://hoaxbusters.ciac.org, maintained by the U.S. Department of Energy,
and http://www.snopes.com, a private folklore archive. By drawing on such
sources, a corpus of approximately 150 individual EHs was compiled based on the
distinctive features outlined above. All texts are in English and were sent from
1988 to 2006. EHs can be classified according to their content. The following ty-
pology distinguishes four major types of EH content.

3.3.1. Virus EHs


This subtype is illustrated in example 1 above. Fake virus warnings are the proto-
typical form of EHs – in some descriptions, the two concepts are treated as close to
synonymous. Virus EHs usually warn of (nonexistent) security threats that will ar-
rive via email or the web. Their descriptions of the viruses’ effects on the computer

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 395

range from the plausible (deletion of files, reproduction through the mail pro-
gram’s address book) to the fantastic (destruction of hardware, installation of mal-
ware through plaintext messages). Very often, they contain references to software
or Internet security companies, which are intended to act as credibility markers
(“this information was announced yesterday morning from Microsoft”). Ferbrache
(1992: 17–18) describes the “2400 baud modem virus” EH, which dates as far back
as October 1988. The virus EH, then, is not only the oldest form of email hoaxing;
it is also firmly anchored in the medium it comments upon – it is a meta-medial
statement.

3.3.2. Giveaway EHs

Hi. I am, Michele Cordova, the founder of Bath & Body Works and
I want your business. We are trying a new advertising campaign
through the power of YOU, the consumer. In order for this to
work, you need to send this e-mail to 13 people and I know that
is not a lucky number but that is the number we need in order
for this to work.
Our computer tracking system will keep count of how many
people you send it to so don’t feel like you have to send it to
thirteen people all at once. You may not send it to the same
person more than once unless you internet pals accidently de-
lete the message, we wouldn’t want them to miss out on this
great offer. To compensate you for your hard work, we are going
to send you a $50 dollar gift certificate redeemable in any
store nationwide. This is not a joke, it will be your loss if
you don’t send this to 13 PEOPLE. Thanks again!
Michele Cordova
Founder of Bath & Body Works

Example 3. A typical giveaway EH

So-called giveaway EHs are probably the most homogeneous subgroup, in that
there is very little variance in structure and scope among the different items. The
storyline typically runs like this: A major company (ranging from software and
mobile phone producers to brands of beverage) has started an email initiative
(sometimes for marketing, sometimes for market research reasons). If the user for-
wards the email a certain number of times, or if the message reaches a certain dis-
semination, the participants will be rewarded with money or free goods. The users’
communicative behavior, and the success of the initiative, are monitored by a so-
called “email tracking” system. Needless to say, such claims have no factual basis
for several reasons, the most important being that such a monitoring system was,
and remains, pure fiction. The earliest case of a giveaway EH is probably the 1999

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
396 Theresa Heyd

“Outlook Beta Test” which claims to be written by Bill Gates himself. A later vari-
ant, dating from 2003, contains the most exclusive offer: a free case of Veuve Clic-
quot. Giveaway EHs are the most easily analyzable subgroup in terms of com-
municant motivation and behavior: If the deception is believed, the communicant
will perceive a material interest for both himself and the other participants in the
communication chain.

3.3.3. Charity EHs


LITTLE JESSICA MYDEK IS SEVEN YEARS OLD AND IS SUFFERING FROM
AN ACUTE AND VERY RARE CASE OF CEREBRAL CARCINOMA. THIS CON-
DITION CAUSES SEVERE MALIGNANT BRAIN TUMORS AND IS A TERMINAL
ILLNESS. THE DOCTORS HAVE GIVEN HER SIX MONTHS TO LIVE. AS PART
OF HER DYING WISH, SHE WANTED TO START A CHAIN LETTER TO INFORM
PEOPLE OF THIS CONDITION AND TO SEND PEOPLE THE MESSAGE TO LIVE
LIFE TO THE FULLEST AND ENJOY EVERY MOMENT, A CHANCE THAT SHE
WILL NEVER HAVE. FURTHERMORE, THE AMERICAN CANCER SOCIETY AND
SEVERAL CORPORATE SPONSORS HAVE AGREED TO DONATE THREE CENTS
TOWARD CONTINUING CANCER RESEARCH FOR EVERY NEW PERSON THAT
GETS FORWARDED THIS MESSAGE. PLEASE GIVE JESSICA AND ALL CANCER
VICTIMS A CHANCE.
IF THERE ARE ANY QUESTIONS, SEND THEM TO THE AMERICAN CANCER
SOCIETY AT ACS@AOL.COM

Example 4. A typical charity EH

This type is the most precarious ethically, as it plays a prank based on human
suffering that is all too real in many other cases. Such emails usually tell the tale of
a terminally ill or missing child. While most charity EHs are purely fictitious, some
texts do have a factual basis, since real search alerts or charitable projects are oc-
casionally posted on the Internet. However, most of these factual cases could be
subsumed as “problematic” information: Since precise search alerts require a deic-
tic anchoring which is simply not given in the digital medium (statements such as
“went missing last week” are frequent), such messages continue to circulate long
after they have become outdated. Perhaps the most famous case, whose origins
reach back to the pre-digital era, is that of Craig Shergold, a 7-year old American
boy with a brain tumor – while the person in question is real, the boy’s appeal for
breaking the Guinness book record in receiving postcards dates from 1989. What is
fascinating about this case from a genre perspective is that the tale easily made the
transition into the digital medium – a true case of transmedial stability (Zitzen and
Stein 2004).
These emails again put message proliferation above all else and almost never
confront the receiver with material or physical demands (such as donations): All

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 397

they ask for is that the message be disseminated, either as the victim’s last will or as
a fundraising system (via the famous “email tracker”) – or, in the case of missing
persons, as an alert for the public. This motivational construct illustrates poign-
antly why Döring (2003: 281) classifies EHs as prosocial behavior: They allow the
communicant to engage in (what the communicant believes is) an altruistic act
without the danger of face loss or physical or material commitment.

3.3.4. “Classic” urban legends


Hi, My name is Lauren Archer, my son Kevin and I lived in Sug-
arland, TX.
On October 2cd, 1994 I took my only son to McDonald’s for his
3rd birthday. After he finished lunch, I allowed him to play in
the ball pit. When he started whining later on, I asked him
what was wrong, he pointed to the back of his pull-up and
simply said “Mommy, it hurts.”
But I couldn’t find anything wrong with him at that time. I
bathed him when we got home, and it was at that point when I
found a welt on his left buttock. Upon investigating, it seemed
as if there was something like a splinter under the welt. I
made an appointment to have it taken out the next day, but soon
he started vomiting and shaking, then his eyes rolled back into
his head. From there, we went to the emergency room.
He died later that night. It turned out that the welt on his
buttock was the tip of a hypodermic needle that had broken off
inside.
The autopsy revealed that Kevin had died from heroine over-
dose. The next week, the police removed the balls from the ball
pit and lo and behold. There was rotten food, several hypoder-
mic needles: some full; some used; knives, half-eaten candy,
diapers, feces, and the stench of urine. If a child is not safe
in a child’s play area then where?
You can find the article on Kevin Archer in the October 10,
1994 issue of the Houston Chronicle. Please forward this to all
loving mothers!

Example 5. A typical classic urban legend

Urban legends are tales about spectacular and often sensationalist incidents.
Crucially, the events in question always take place in an everyday setting and
happen to everyday people – a narrative strategy which makes identification easy
for the tale’s addressees. A considerable number of urban legends are true classics,
in that they have been circulating for years or decades (see Brunvand 1981 for a
classic collection of such items, Boese 2003 for a more recent perspective). This in-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
398 Theresa Heyd

cludes tales such as the kidney theft or needles in cinema seats; the ease with which
these items made the transition across media may be an indicator of their import-
ance as communicative and psychosocial tools. Other tales have made their ascent
in and through the digital medium. Two dates have been powerful generators of
myths and fears: The advent of the new millennium, with its apocalyptical associ-
ations, fed many fears, such as the W2K bug, and engendered a number of EHs.
Unsurprisingly, the 9/11 attacks are at the center of an entire maze of myths, alle-
gations, and conspiracy theories that have found their way into a number of EHs.
This typology shows only the core themes of email hoaxing. Other forms of
digital folklore, such as online petitions and “good luck” chain letters, share numer-
ous characteristics with EHs (in particular open plurality and the drive for prolif-
eration). However, the element of deception is less clear-cut in some forms of digi-
tal folklore and nonexistent in others; for this reason, the present analysis has been
restricted to EHs in the narrowest sense.

4. Pragmatic mechanisms of EHs

4.1. A dual pattern of cooperation


From a cooperation perspective, the phenomenon of email hoaxing confronts the
observer with a paradoxical situation: EHs can be conceived both as utterly coop-
erative utterances and as utterly non-cooperative utterances.
EHs are non-cooperative: As argued in the introduction, all EHs contain a ker-
nel of deceptive or at least highly problematic information. This usually concerns a
central statement of the utterance that can easily be isolated and refuted. To give
one example: The EH cited in example 1 contains at least one clearly false state-
ment, reprinted in example 6:
If you receive an email called “WTC Survivor” do not open it.
(…) This virus removes all dynamic link libraries (.dll files)
from your computer.

Example 6. A false claim from the WC Survivor EH

The claim was disproved within weeks by the major security software com-
panies and other reliable sources; relevant information on the utterance’s truth
status is therefore available online for every email user. Statements that are so bla-
tantly deceptive clearly violate Grice’s Cooperative Principle (CP), most notably
the maxims of quality (by making non-truthful assertions) and quantity (by omit-
ting relevant information) (Grice 1975) – or in a relevance theoretic framework,
the principle of relevance (Sperber and Wilson 1995: 158). Therefore, EHs are in-
herently non-cooperative.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 399

EHs are cooperative: Since EHs are forwarded by their senders with the best of
intentions, they are a prime example of cooperative behavior. The sheer act of for-
warding the message bears evidence of the communicants’ candor. Moreover,
many EH texts contain meta-communicative statements that comment on the mess-
age’s supposed truthfulness. For example, the WTC Survivor EH contains this
closing remark:
This is a serious one.

Example 7. The closing sentence of the WTC Survivor EH

Others speculate on the message’s truth status, thereby cooperating just the same:
I don’t know how true the following is, I am forwarding it just
in case!

Example 8. From the intifadah.cjb.net EH

Grice’s maxim of quality merely specifies two requirements: (1) Do not say
what you believe to be false, and (2) do not say that for which you lack adequate
evidence (Grice 1975: 45–46). The communicative behavior of EH forwarders is
not in conflict with these requirements, as the forwarders themselves have been
duped by the deceptive statements. Therefore, EHs are inherently cooperative.
How can this pragmatic paradox be resolved? It can be argued that EHs may in-
deed be ascribed a dual cooperative status. This surprising ascription can be ex-
plained in terms of the multiple sendership of EHs. As noted earlier, hoaxing can
be described as serial communication. EHs engender, if they are successful, a
chain, or network, of communication: The message is transmitted from one sender
s1 to n addressees; out of this set of addressees, a number of senders s2, 3, … n arises
in turn, and so on. Email hoaxing, then, is neither a typical case of one-to-one in-
terpersonal communication, nor can it properly be described as one-to-n mass
communication. Within this communicative network, however, two types of
sender have to be distinguished that are qualitatively quite distinct. The first is s1,
the originator of the message and starting point of the communication chain. Little
is known at present about the genesis of EHs or the motivations of their creators.
Yet it can be speculated that messages that evolve into deceptive utterances with-
out a communicant’s conscious effort, such as certain charity EHs described in the
content-based typology, are in the minority. Most EHs are probably created with
full deceptive intention by communicants whose motivations may be not that dif-
ferent from that of trollers (see above) or hackers (see, e.g., Hruska 1990: chapter
5).3 It is these communicative agents who are responsible for the creation of an EH
and, in a larger sense, for the non-cooperative potential of the message.
Once an EH leaves this initial stage and enters the chain of communication, the
floor is open to an altogether different type of communicant. The forwarders s2, 3, … n

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
400 Theresa Heyd

of EHs at this second stage presumably consider the EH a bona fide warning. In
other words, they do not recognize the deception, which is not so surprising. Irony
markers, if present at all, are often quite subtle, and communicants generally have
high expectations about the reliability and cooperativeness of utterances (Grice
1975). To forward an EH, then, is more than just in line with pragmatic rules gov-
erning linguistic behavior: It is usually intended, by its actors, as a downright al-
truistic act.
With the transition from s1 to sn, the initial implicature (violation of the quality
maxim) becomes less apparent. However, its potential remains present in the mess-
age through its iterations. In written contexts, implicatures are arguably more dif-
ficult to spot and process for communicants due to the lack of contextual and non-
verbal cues; at the same time, an implicature’s potential remains activated in a
written utterance even across time and space. This is why EHs may be perceived as
deceptive at any point in the communication chain by a communicant who is sen-
sitive to the EH’s larger context. This multiple sendership, then, is what enables the
dual, and seemingly paradoxical, pragmatic status of EHs as both uncooperative
and cooperative.
This dual cooperativity has an interesting consequence for the receiver of an
EH. Upon receiving an EH, there are a number of possible interaction scenarios for
the addressee, which will be briefly sketched here. Crucially, there is no way of not
cooperating with an EH that would be viable under normal communicative condi-
tions, as all scenarios that actually occur in email transactions are of a cooperative
nature. The central parameter for a communicant’s reaction to an EH is which
frame of reference is activated in terms of sender identity: Sender sn may either at-
tribute the message – with all its pragmatic entailments – to sender sn-1 or to sender
s1. Put more simply: A communicant may either believe or disbelieve the message –
fall for the EH or see through it. Depending on this communicative stance, various
types of interaction are possible:

– Believe the message and forward it: This is the “utterly cooperative” scenario
mentioned above. The communicant receives a message which they take to be
fully cooperative and truthful. Accordingly, they in turn cooperate with the
message, and this includes the demand for message dissemination (see 1.1.3).
This is the interaction pattern that allows EHs to spread. Judging from the over-
whelming success of many EHs, it must be a fairly common scenario.
– Believe the message and ignore it: This option is slightly weaker in terms of co-
operation, yet it still holds as cooperative behavior. While the urge for dissemi-
nation is an important part of the message, its central issue is nevertheless the
deceptive statement at its core. To take the message at face value, then, is the
minimum requirement for cooperativeness. Involvement certainly is a factor in
cooperative behavior, but it is a matter of degree. For example, it violates the
CP not to participate in ritualized verbal exchanges such as adjacency pairs, yet

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 401

it is fully within the scope of cooperativeness to be a quiet or unassuming


speaker. The same goes for EHs: Their full cooperative potential is only real-
ized through their forwarding, yet less engagement still counts as cooperative.
– Disbelieve the message and forward it: This would be the only “utterly non-
cooperative” interaction pattern for a communicant sn. It would be equivalent
to the non-cooperative stance of the originator s1. However, it is a safe bet that
this irrational, or blatantly deceptive, behavior occurs very rarely in actual email
exchanges, for reasons that may become clear in the discussion of the felici-
tousness of EHs.
– Disbelieve the message and ignore it: This is another highly cooperative inter-
action pattern, and one that presumably occurs fairly often. If the frame of ref-
erence “deceptive message” is activated, the demand for dissemination is can-
celled, along with the message’s demand for belief. This behavior, then, is in
full accord with the second aspect of the quality maxim, namely of not saying
what one believes to be false.
– Disbelieve the message and engage with sender sn-1: This pattern is also quite
typical of EH interactions, and it is the only scenario where the two different
frames of reference are actively negotiated. An addressee who disbelieves the
utterance will often get back to sender sn-1 in order to confront him with the de-
ceptive scope of the message (typically by providing evidence such as links to
debunking websites; see Heyd 2008: 150–153 for examples). This interaction
pattern carries a potential for sn-1’s face loss; still it could be termed the most
cooperative of all interaction scenarios, since it directly mirrors the prosocial
attitude of EH forwarding. The addressee who engages with the sender in order
to expose the deception does so for a good cause: Not only do they cooperate –
they act altruistically.

These strategies are summarized in Figure 1. In the figure, arrows represent the
exchange of messages between communicants. Arrows pointing to the right repre-
sent the forwarding of a message, and arrows pointing to the left represent attribu-
ting a message to a previous sender and/or engaging directly with that sender.
Dotted arrows indicate that a (potentially) longer chain of communication is not
shown in its entirety.

4.2. EHs and speech acts


Closely intertwined with the cooperative mechanisms of EHs is their affinity with
speech act theory. It is intuitively graspable that speech-acting is highly relevant to
EHs as a genre, as these texts make heavy use of persuasive and other interactional
features. The topic can be approached from two opposing directions: first, the role
of speech acts within EHs; and second, the EH as a superordinate speech act.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
402 Theresa Heyd

Figure 1. Possible responses to an EH

4.2.1. Speech acts in EHs


It is a pragmatics truism that every utterance is a speech act. Nevertheless, it seems
that some genres are more “speech-acty” than others. That is, they are more inter-
actionally complex, more geared toward speaker-hearer interaction, and tend to
use a higher variety of different speech acts than other genres. It can be claimed
that EHs are a prime example of such an interaction-driven genre that is particu-
larly rich in distinct speech acts. What follows is a brief discussion of the most cen-
tral patterns (based on the simplified taxonomy by Bach and Harnish 1979).
Constatives: This is the unmarked, degree zero type of speech act (and the one
that is responsible for the above truism). To be sure, EHs contain constative speech
acts, namely the claims and assertions brought forward as the message’s scope – be
it a supposed virus, a missing child, or the availability of a free case of champagne.
However, the constatives in EHs differ from others in one crucial aspect. Since
hoaxes are inherently deceptive, they necessarily contain constatives whose sin-
cerity condition is secretly violated, as is the case with lies. This, at least, is valid
for speaker s1; the case becomes more complex for the following communicants, as
discussed earlier.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 403

Directives: It is safe to say that every EH contains directives; these are often
portrayed as the tell-tale sign of EHs. The most pervasive type of directive is of a
meta-communicative nature: the exhortation to disseminate the EH. Thus every
EH contains a request for proliferation, very often prominently placed at the end of
the message and very often formulated as an imperative. Here are some examples:
“PLEASE PASS ON AS A LAST REQUEST”
So please start e-mailing and help us build our database.
PLEASE DISTRIBUTE TO AS MANY PEOPLE AS POSSIBLE … THANX

Example 9. Typical directives concerning message proliferation

In addition, many EHs contain directives concerning the actual scope of the
message: They give advice and warnings about the (nonexistent) threat established
in their representative part. This is most often the case with virus warnings and
“traditional” urban legends which report shocking incidents. The following is a
particularly elaborated example from a story about HIV-infected needles in ex-
posed places:
IT IS IMPERATIVE TO CAREFULLY CHECK THE HANDLE of the gas pump
each time you use one. LOOK AT EVERY SURFACE YOUR HAND MAY
TOUCH, INCLUDING UNDER THE HANDLE. If you do find a needle af-
fixed to one, immediately contact your local police department
so they can collect the evidence.

Example 10. A directive related to the content of the EH

Commissives in EHs are a less pervasive and more complex phenomenon. They
occur almost exclusively in one subtype of EH, namely giveaway EHs; for these,
however, they are the most distinctive feature. A giveaway EH promises some ma-
terial gain to its receiver, be it money, free goods, or other type of reward:
you will receive $1000 and a copy of Windows98 at my expense.
we will send a coupon for one six-pack of any of our Miller
Brand beverages
1,300 of the people on the list will receive $5,000, and the
rest will receive a free trip for two to Disney World for one
week during the summer of 1999 at our expense.

Example 11. Typical commissives from giveaway EHs

Crucially, these commissive speech acts are never to be attributed to sender sn-1,
even in a cooperative framework. They have an additional built-in layer of decep-
tion, usually a fictitious sender s1 (such as a CEO, sales manager, or other repre-
sentative of a well-established company). Thus, the face-threatening potential of

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
404 Theresa Heyd

obligation is minimized for the actual sender sn, as the speech act proper is perpetu-
ally relocated to a distant yet powerful source of authority. This is another demon-
stration of what Döring’s (2003) notion of the “prosocial” implies for EHs: a way
of acting altruistically without the need for face loss or commitment, financial or
otherwise. Commissives of this type occasionally migrate into other EH subtypes:
In particular, they appear in some sympathy EHs (most typically those which also
refer to an “email tracker”).
Acknowledgements: This expressive type of speech act occurs frequently
within the interactional discourse setting of email. While the actual distribution of
acknowledgements in EHs would warrant a study in its own right, acknowledge-
ments appear to be surprisingly rare in the message core; this is especially true for
virus warnings, which aim to present a purely informational appearance. When
they occur, acknowledgements tend to cluster around the openings and closings of
the message. This is where the various senders along the communication chain
tend to interact with the text and make their own changes and additions (see Heyd
2008: 56–67 for a structural analysis of such embedding techniques). Messages
may contain a succession of opening and closing formulas, as well as other emot-
ive utterances. The following accumulation is from the closing of a sympathy EH:
So, I know that we can send it to at least 5 or 6. Come on you
guys … and if you’re too selfish to waste 10–15 minutes and
scrolling this and forwarding it to EVERYONE, just think it
could be you one day … and it’s not even your $money$, just your
time. Please help this little girl out guys, I know you can do
it!! I love you guys!

Example 12. An “acknowledgement cluster” from a charity mail

Taken together, this striking diversity of speech acts works as a psychological


trigger that encourages the continued transmission of the message. As discussed
above, hoaxing as serial communication depends upon a high transmission rate.
Accordingly, EHs make use of a variety of persuasive tactics, among which the ac-
cumulation of non-constative speech acts is an important linguistic strategy.

4.2.2. The EH as speech act


When we move back from these microtextual issues, hoaxing as a communicative
action may itself be viewed as a single, complex speech act. With regard to the dual
cooperative status discussed above, the central question within this macrotextual
framework is: When is an EH felicitous? If the deception is believed and the mess-
age is passed on? Or if the non-cooperative stance is recognized? The discussion so
far has emphasized that in order to survive, an EH must seek proliferation; the ser-
ial communication mode is an inherent feature of the genre. From a purely evol-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 405

utionary stance, then, an EH would surely have to be considered felicitous if it is


taken at face value as frequently as possible. At the same time, from a user per-
spective, the uptake of false or problematic information is most certainly an unde-
sirable communicative move. Within this stance, an EH message is felicitous if it is
recognized as non-cooperative. Another argument for this latter view focuses on
the perspective of the deceptive sender s1 and has to do with EHs’ potential for play
and satirical performance. Quite simply, EHs seek an audience, and there is com-
municative prestige in devising an utterance so cunning that it has the potential to
fool more gullible recipients. Many items from the EH corpus display more or less
overt irony signals, such as blatantly false assertions or puns which convey sexual
innuendo.
As with the Gricean approach and the pattern of simultaneous cooperation/non-
cooperation, we appear to be faced here with the paradox of a dual felicity pattern.
In this case, we may actually go one step further: EHs have a dual uptake pattern,
and this is not merely a side effect but one of the driving forces of the phenomenon.
Through a large proportion of communicants who fall for the deception, the trans-
mission of the message is ensured; at the same time, a smaller group of recipients
will recognize (and appreciate) the non-cooperative intent. It is an irony of serial
communication that the originator of an EH does not benefit directly from the com-
municative prestige bestowed by the further receivers; there is no way to monitor
precisely the subsequent reactions to an EH. Nevertheless, the Internet offers more
indirect evidence, such as the occurrence of an EH in databases.
What hoaxing does, then, is to create an in-group/out-group distinction within
the audience – a mechanism also found in related genres such as trolling (Herring
et al. 2002). Alongside the majority who treat the text as bona fide and engage
with it in a cooperative way, there is a smaller in-group of those who recognize
the deception. This involves an indirect prestige gain for both the sender s1 and
the receiver, in that it highlights the participants’ shared digital literacy. It can be
noted in concluding that this aspect of hoaxing is by no means new: Walsh (2002:
105) describes the “splitting of the audience” in scientific hoaxes of the 19th cen-
tury.

5. Summary and outlook

This chapter gives an approximation of the deceptive scope of EHs and their under-
lying pragmatic mechanisms. Our analysis of the dual cooperation pattern charac-
teristic of the genre has shown that pragmatic analysis can yield new and meaning-
ful insights into such deceptive genres. Indeed, the analysis of CMC genres, with
their new socio-technical settings and the easy and ample availability of linguistic
data they provide, may actually stimulate pragmatic theory as a whole and encour-
age the development of new approaches to the study of pragmatics.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
406 Theresa Heyd

While email hoaxes may be a fossilizing genre that will eventually come to be
associated with typical online communication patterns of the 1990s and 2000s, the
broader topic of deception in CMC is persistent and likely to remain a central con-
cern of CMC studies for a long time (see Hancock, this volume). The pragmatic ap-
proach to analyzing deceptive patterns of online interaction described here may
therefore serve for the study of reminiscent CMC genres that coexist with EHs or
that may emerge in the future.

Notes

1. Historical overviews for these precursors are provided in Walsh (2007).


2. “Text” is understood here in a broad sense, so as to include artifacts such as pictures,
power point shows, and so on. However, it is not used in a poststructuralist sense that
might include social relations, actions, and the like.
3. There are many textual cues which, while impressionistic as of yet, support this thesis. To
mention but two: The text displayed in example 7 refers to a girl called “Jessica Mydek” –
a name which, as www.snopes.com points out, is “nearly homophonous with a rudely-
phrased request for oral sex”; and the supposed responsible for a Columbia House givea-
way is called “Richard Douche” – a highly suggestive surname.

References

Attardo, Salvatore
1993 Violation of conversational maxims and cooperation: The case of jokes. Jour-
nal of Pragmatics 19(6): 537–558.
Auer, Nicole J. and Ellen M. Krupar
2001 Mouse click plagiarism: The role of technology in plagiarism and the librar-
ian’s role in combating it. Library Trends 49(3): 415–432.
Austin, John
1962 How to Do Things with Words. The William James Lectures Delivered at Har-
vard University in 1955. Edited by J. Urmson. Oxford, UK: Clarendon.
Bach, Kent R. and Robert M. Harnish
1979 Linguistic Communication and Speech Acts. Cambridge, MA: MIT Press.
Barrett, Daniel
1996 Bandits on the Information Superhighway. Sebastopol, CA: O’Reilly Media.
Barron, Anne
2006 Understanding spam: A macro-textual analysis. Journal of Pragmatics 38(6):
880–904.
Blommaert, Jan and Tope Omoniyi
2006 Email fraud: Language, technology, and the indexicals of globalisation. Social
Semiotics 16(4): 573–605.
Boese, Alex
2003 The Museum of Hoaxes: A History of Outrageous Pranks and Deceptions.
New York: Plume.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 407

Borden, Diane K. and Kerry Harvey (eds.)


1998 The Electronic Grapevine: Rumor, Reputation, and Reporting in the New On-
Line Environment. Hillsdale, NJ: Erlbaum.
Brown, Penelope and Stephen C. Levinson
1987 Politeness: Some Universals in Language Use. Cambridge, UK: Cambridge
University Press.
Brunvand, Jan H.
1981 The Vanishing Hitchhiker: American Urban Legends and their Meanings. New
York: W.W. Norton.
Carlson, John R., Joey F. George, Judee K. Burgoon, Mark Adkins, and Cindy H. White
2004 Deception in computer-mediated communication. Group Decision and Negoti-
ation 13: 5–28.
Cukier, Wendy L., Eva J. Nesselroth, and Susan Cody
2007 Genre, narrative and the “Nigerian letter” in electronic mail. In: Proceedings of
the 40th Hawaii International Conference on System Sciences. Los Alamitos,
CA: IEEE Press.
Dhamija, Rachna, J. D. Tygar, and Marti Hearst
2006 Why phishing works. In: Rebecca Grinter, Thomas Rodden, Paul Aoki, Ed
Cutrell, Robin Jeffries, and Gary Olson (eds.), Proceedings of the 2006 SIG-
CHI Conference on Human Factors in Computing Systems, 581–590. New
York: ACM Press.
Donath, Judith
1999 Identity and deception in the virtual community. In: Marc A. Smith and Peter
Kollock (eds.), Communities in Cyberspace, 29–59. London: Routledge.
Döring, Nicola
2003 Sozialpsychologie des Internet, 2nd Ed. Göttingen: Hogrefe.
Dunbar, Robin
1996 Grooming, Gossip, and the Evolution of Language. Cambridge, MA: Harvard
University Press.
Ferbrache, David J.
1992 A Pathology of Computer Viruses. London: Springer.
Fernback, Jan
2003 Legends on the Net: An examination of computer-mediated communication as
a locus of oral culture. New Media & Society 5(1): 29–45.
Frank, Russell
2004 When the going gets tough, the tough go photoshopping: September 11 and the
newslore of vengeance and victimization. New Media & Society 6(5):
633–658.
Frankfurt, Harry G
2005 On Bullshit. Princeton, NJ: Princeton University Press.
Granhag, Pär A. and Leif A. Strömwall, eds.
2004 The Detection of Deception in Forensic Contexts. Cambridge, UK: Cambridge
University Press.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 41–58 [vol. 3: Speech acts]. New York: Academic
Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
408 Theresa Heyd

Grice, H. Paul
1989 Studies in the Way of Words. Cambridge, MA: Harvard University Press.
Hancock, Jeffrey
2007 Digital deception: When, where and how people lie online. In: Adam N. Join-
son, Katelyn McKenna, and Tom Postmes (eds.), Oxford Handbook of Internet
Psychology, 287–301. Oxford, UK: Oxford University Press.
Hayes, Arthur S., Jane B. Singer, and Jerry Ceppos
2007 Shifting roles, enduring values: The credible journalist in a digital age. Journal
of Mass Media Ethics 22(4): 262–279.
Hedley, Steve
2006 A brief history of spam. Information & Communications Technology Law
15(3): 223–238.
Heisler, Jennifer M. and Scott F. Crabill
2006 Who are “stinkybug” and “Packerfan4”? Email pseudonyms and participants’
perceptions of demography, productivity, and personality. Journal of Com-
puter-Mediated Communication 12(1): 114–135.
Herring, Susan C., Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab
2002 Searching for safety: Managing “trolling” in a feminist discussion forum. The
Information Society 18(5): 371–384.
Heyd, Theresa
2006 Understanding and handling unreliable narratives: A pragmatic model and
method. Semiotica 162: 217–234.
Heyd, Theresa
2008 Email Hoaxes: Form, Function, Genre Ecology. Pragmatics & Beyond New
Series 174. Amsterdam/Philadelphia: John Benjamins.
Hruska, Jan
1990 Computer Viruses and Anti-Virus Warfare. New York: Ellis Horwood.
Kibby, Marjorie
2005 Email forwardables: Folklore in the age of the Internet. New Media & Society
7(6): 770–790.
Kolari, Pranam, Akshay Java, and Tim Finin
2006 Characterizing the splogsophere. In: Proceedings of the 3rd Annual Workshop
on Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 15th World
Wide Web Conference, May 23, Edinburgh.
Lee, Kang
2000 Lying as doing deceptive things with words: A speech act theoretical perspec-
tive. In: Janet Wilde Astington (ed.), Minds in the Making: Essays in Honor of
David R. Olson, 177–196. Oxford, UK: Blackwell.
Leslie, Alan M.
1987 Pretense and representation: The origins of “Theory of Mind”. Psychological
Review 94(4): 412–426.
MacDougall, Curtis D.
1958 Hoaxes. New York: Dover.
Meibauer, Jörg
2005 Lying and falsely implicating. Journal of Pragmatics 37(9): 1373–1399.
Mintz, Anne (ed.)
2002 Web of Deception: Misinformation on the Internet. Medford, NJ: CyberAge
Books.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
Email hoaxes 409

Oda, Terri and Tony White


2005 Immunity from spam: An analysis of an artificial immune system for junk
email detection. In: Christian Jacob, Marcin L. Pilat, Peter J. Bentley, and Jon-
athan Timmis (eds.), Proceedings of the 4th International Conference on Ar-
tificial Immune Systems, 276–289. Berlin: Springer.
Reboul, Anne
1994 The description of lies in speech acts theory. In: Herman Parret (ed.), Pretend-
ing to Communicate, 292–298. Berlin: De Gruyter
Rosnow, Ralph L. and Gary A. Fine
1976 Rumor and Gossip: The Social Psychology of Hearsay. New York: Elsevier.
Rudanko, Juhani
2007 Concepts for analyzing deception in discourse intended to be persuasive: Two
case studies from Shakespearean drama. Journal of Historical Pragmatics
8(1): 109–126.
Schmückle, Beat and Tobias Chi
2004 Spam: Linguistische Analyse einer neuen Werbeform. Networx 39: 4–58.
Searle, John
1969 Speech Acts: An Essay in the Philosophy of Language. Cambridge, UK: Cam-
bridge University Press.
Shuy, Roger W
1998 The Language of Confession, Interrogation, and Deception. Thousand Oaks,
CA: Sage.
Sokal, Alan D.
1996 Transgressing the boundaries: Toward a transformative hermeneutics of quan-
tum gravity. Social Text 46/47: 217–252.
Sperber, Dan and Deirdre Wilson
1995 Relevance: Communication and Cognition. Oxford, UK: Blackwell.
Walsh, Lynda
2002 What is a hoax? Redefining Poe’s Jeux d’Esprit and his relation to his reader-
ship. Text, Practice, Performance 4: 103–120.
Walsh, Lynda
2007 “Sins Against Science”: The Scientific Hoaxes of Poe, Twain, and Others.
SUNY Series in Science and Technical Communication. Albany, NY: SUNY
Press.
Winner, Ellen, Hiram Brownell, Francesca Happé, Ari Blum, and Donna Pincus
1998 Distinguishing lies from jokes: Theory of mind deficits and discourse interpre-
tation in right hemisphere brain-damaged patients. Brain and Language 62(1):
89–106.
Zhou, Lina, Judee K. Burgoon, Jay F. Nunamaker, Jr., and Doug Twitchell
2004 Automating linguistics-based cues for detecting deception in text-based asyn-
chronous computer-mediated communications. Group Decision and Negoti-
ation 13(1): 81–106.
Zitzen, Michaela and Dieter Stein
2004 Chat and conversation: A case of transmedial stability? Linguistics 42(5):
983–1002.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
410 Theresa Heyd

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:07 AM
17. Authentication and Nigerian Letters
Martin Gill

1. Authentication

1.1. Introduction
Trust is a key issue in computer-mediated communication (CMC). While the diffi-
culty of knowing who and what to believe arises in relation to communication of
all kinds, in CMC these questions are foregrounded. To a greater degree than in
other media, CMC is characterized by relatively high levels of uncertainty about
the identity of interactants, the origin and intentions of messages received, the
presence of lurkers and official surveillance, the likelihood of criminal activity, and
the threat of attack by malicious software. As a result, communication over the In-
ternet is often felt to involve some risk and, in the case of unsolicited email mess-
ages (spam), is likely to raise considerable suspicion.
This suspicion seems justified: Spam now accounts for at least two-thirds of
email communication, and two-thirds of spam messages are estimated to involve de-
ception (Cukier, Cody, and Nesselroth 2006; online deception is also discussed in
the chapter by Hancock and Gonzales in this volume). Much of this material is pro-
motional and, as such, shares generic features with legitimate forms of advertising,
except that its purpose is to lure recipients into buying products which are either
worthless or non-existent (Barron 2006). In the case of another ubiquitous form, the
so-called Nigerian Letter (also known as “419” or “advance fee” fraud; cf. Edelson
2003; Holt and Graves 2007; Smith, Holmes, and Kauffman 1999), the limits of
legality are more or less openly crossed: The ostensible aim is both more personal
and more questionable, usually involving the recipient’s complicity for personal
gain in some tempting but irregular financial arrangement. The real aim is inevitably
to defraud the recipient.
In pragmatics, work has been done on the nature of unsolicited promotional
emails, Nigerian Letters, and other types of online scam (e.g., Barron 2006; Blom-
maert and Omoniyi 2006; Cukier et al. 2006; Heyd 2008, this volume; Tseng 2007,
2010). The focus has been on spam as a genre, its typical moves and move struc-
ture, and the nature of the deceptions perpetrated. This work has pointed to ways in
which these forms differ from conventional text-based genres and exploit com-
puter-specific opportunities for composition and interaction.
Equally important, but as yet less widely studied, are the pragmatic strategies
by which the senders of these messages seek to pass them off as trustworthy, bona
fide communications (for tone discussion, see Tseng 2007). In this respect, Ni-
gerian Letters furnish interesting material. Given the level of suspicion likely to be

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
412 Martin Gill

encountered, the scale of the task, and the fact that the communication generally
has only one chance of success, it could be expected that senders would go to con-
siderable lengths to allay suspicion and establish recipients’ trust. As we shall see,
this is indeed the case: Writers create a range of apparently trustworthy identities
and attempt sometimes elaborate authenticating work. Yet, despite this, it is their
shortcomings that are likely to strike their First World recipients (albeit clearly not
all of them, to judge from the reports of those successfully conned; see below). It is
then relevant to ask why these efforts should prove futile and, by extension, what
conditions are necessary for authenticating strategies to succeed.
This chapter is concerned with how authenticity is achieved in CMC, and in
particular with the forms and distribution of this authenticating work, which, it will
be argued, amounts to a default requirement in online interaction.1 Drawing on a
corpus of 560 Nigerian Letter emails received by the author between December
2004 and March 2007, it examines the means by which senders negotiate the com-
municative challenges involved in initiating personal contact and establishing
plausible grounds for interaction with their unknown recipients, interaction de-
signed to turn the recipient from detached outsider into would-be accomplice in
serious fraud, and its unwitting victim. The aim is to shed light both on the con-
struction of authenticity in online interaction and on the nature of a genre in which
many normal pragmatic assumptions do not seem to hold.

1.2. Authenticating work


In recent years, the concept of authenticity has been subjected to critical analysis
from a variety of perspectives (for a review of the issues it raises and its relation to
linguistics and pragmatics, see Gill 2011). In general, authenticity can be viewed as
a discursive construction relative to the interests and beliefs of speakers in particu-
lar contexts. At the same time, being authentic matters to most people and, among
other things, involves the expression of a coherent, self-consistent – even if con-
sciously “styled” – identity (see, for example, Coupland 2001).
In relation to CMC, what is at issue is the means by which participants establish
their sense of the authenticity of the communication sufficient for their purposes at a
given moment. The “authenticity” of a message is not necessarily a matter of its
being “correct” according to the norms of a particular genre (although generic expec-
tations will influence how appropriate a message is taken to be), but rather of its hav-
ing credibility as a sincere expression of the individual speaker or writer. This will
depend on a variety of communicative practices that fall under the heading of “auth-
enticating work”. To date, studies in this area have been scarce, although there is an
extensive literature on the communication of affinity and the development of rela-
tionships both offline and online (for a review, see Walther, Loh, and Granka 2005).
Interactants engage in many forms of behaviour that serve to authenticate the
selves they present and the messages (etc.) they communicate. In face-to-face con-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 413

texts, authenticating work is realised through a range of physically embodied ver-


bal and non-verbal cues, normally well below the level of conscious attention. The
ability to evaluate these cues plays a central part in the smooth functioning of
everyday interaction. They intersect with social expectations about the proper
kinds of interactional behaviour in relation to participants’ roles and status, their
emotional and physical states, the genre of the interaction, and the medium chosen,
among other things. These expectations are themselves subject to historical change
and show considerable cross-cultural variability.
Interactions among these factors produce subtle “authenticity effects”, es-
pecially in real-time face-to-face contexts where different channels are integrated
and norms are relatively fluid. These effects constitute the unmarked form of com-
munication, largely unnoticed unless they break down.

1.3. Conditions for authenticity


In the light of the present study, it is proposed that, to succeed, authenticity effects
need to meet the following basic conditions:
(a) consistency
(b) quantity
(c) spontaneity
(d) plausibility/appropriateness
(e) engagement
If met, these five conditions may be sufficient to maintain a sense of authenticity in
ongoing communication; if not, the interaction is likely to be experienced as in
some way anomalous. Given the combined force of Grice’s (1975) Co-operative
Principle, the taboo against deliberate falsehood in interaction, and the no-less-
powerful “truth bias” or disposition to accept the truth of what is said (Carlson et
al. 2004: 7), recipients of such messages may not expect to be deceived. However,
they will look for explanations and possibly doubt their interlocutors’ sincerity.

(a) Consistency
Linguistic and non-linguistic cues are normally expected to reinforce one another
or at least not to conflict. Consistency is unlikely to be noticed when it occurs, but
participants in interaction tend to be sensitive to signs of deviation. Inconsistencies
may be interpreted as deception or duplicity: Suspicion will be aroused, for
example, when a speaker’s words say one thing and body language another; or
when a text lacks coherence or contains marked and unmotivated stylistic contrasts
(Mabry 2001: 249). The Nigerian Letters often fail spectacularly in this respect.
All authenticating work is instantly undone when a sender purporting to be Mr Paul
Smith, a senior official in a London-based bank, begins his message “Hello my
dear” and goes on to commit a string of elementary language and writing errors; or

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
414 Martin Gill

when a message with the subject line “I AM CRYING FOR HELP” opens with the
greeting “Hi Sweetheart” (see also Blommaert and Omoniyi 2006: 600). Consist-
ency therefore seems to be an overriding requirement.

(b) Quantity
For most purposes we require only the minimum of authenticating work; more than
this will stand out as marked, hence contrived (as in overly fulsome thanks or re-
peated assurances of honesty). If repeated so often that they become formulaic,
cues tend to lose their authenticating effect (cf. Fairclough’s [1989:62] “synthetic
personalization”), although we should distinguish this case from that of such genu-
inely formulaic authenticating expressions as oaths, vows, and other performatives
that have legal force. The cumulative nature of CMC means that this condition
applies not only to a single message but across a collection of messages. In the Ni-
gerian Letter corpus, the potentially authenticating anticipation of the recipient’s
surprise at being approached out of the blue by a stranger is cancelled by its reiter-
ation across a large number of messages, in nearly identical terms (see below).

(c) Spontaneity
As this suggests, behaviour appears to be most authentic when it is most instinc-
tive, in the unguarded moments when our “real” underlying selves are openly on
display. In Goffman’s (1959) terms, such cues are “given off” rather than “given”,
not subject to conscious control. By contrast, evidence of a role being played or of
special effort being made will tend to be disauthenticating, as will overuse of
stereotyped cues (cf. Herring and Martinson 2004: 428). In general, as Goffman
notes, the authenticity of the given – the public face – tends to be measured in re-
lation to the given off – those unconscious traces of behaviour that may leak
around the edges of the impression a speaker wishes to create, with some degree of
self-consistency expected. Ultimately, however much care a speaker takes, total
control will be impossible to achieve, especially over features not normally at-
tended to, and if achieved, would – for that very reason – be likely to appear in-
authentic.
At the same time, certain genres can seem to be naturally self-authenticating:
Confessions and admissions, prayers, expressions of helplessness and victimhood,
impassioned outbursts, private, off-the-record comments, and backstage chat are
all forms in which the naked self may seem to be tellingly revealed. Anonymous
CMC seems conducive to self-revelation of this kind, and many of these genres are
represented in the Nigerian Letter corpus.

(d) Plausibility and appropriateness


It is a general condition of authentic communication that a message can plausibly
be attributed to the speaker who produces it in that situation, at that moment and in
the form chosen, and have some measure of relevance to its audience. This is in-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 415

dependent of the credibility or otherwise of the message per se: A speaker may
quite plausibly utter implausible things. Appropriateness refers to aspects such as
the choice of a given medium or register. Thus, whatever its plausibility, it hardly
seems appropriate that a UK-based firm of solicitors acting for the estate of the late
Sir Denis Thatcher should choose to use a German freemail service to notify me of
a bequest from him amounting to almost a million pounds.

(e) Engagement
Communication necessarily involves interaction between interlocutors, who there-
fore need to manifest in their messages some awareness of one another, however
minimal. A message sent to a specific recipient can normally be expected to show
signs of being tailored to suit that recipient and to engage in constructing the inter-
action as a joint enterprise. The engagement condition suggests that authenticity
effects should not only be sender-orientated (i.e., concerned with projecting the
sender’s identity) but also relational (i.e., concerned with establishing and further-
ing the interaction as a whole). It is on the basis of this relational work that inter-
locutors form inferences about one another and develop mutual understanding
(Mabry 2001: 6). Engagement may be harder to establish in CMC, with its greater
dependence on text-based cues, and harder still in anonymous interaction, where
there is no accumulation of personal history (Donath 1999). Few of the Nigerian
Letters meet this condition adequately; as will be seen below, ignorance of the re-
cipient is often total, and pragmatic features relevant to sustaining reciprocal in-
volvement are either lacking or purely formulaic.

1.4. Strategic authentication


Knowledge of these conditions can of course be deployed strategically to create
authenticating effects – not only by actors (although the points outlined here are
reminiscent of Hamlet’s instructions to the players in Hamlet 3 ii) but, for example,
in film-making, where the use of a hand-held camera or clumsy editing can pro-
duce the impression of raw, spontaneous reality; or in the journalistic use for
heightened immediacy of unscripted on-the-spot coverage of news events as com-
pared to more authoritative scripted items (Montgomery 2001). As such examples
suggest, the most humanly “authentic” forms of communication tend to draw least
on mainstream sources of authority.
Individuals use such knowledge to manipulate both the given and the given off
aspects of their self-presentation, face-to-face and online. Knowing this, in turn,
forms part of the pragmatic competence of skilled participants in any interaction;
interlocutors frequently adopt playful stances and voices, improvised identities,
and so forth. In some cases, of which the Nigerian Letters form a conspicuous
example, the purpose is deceptive. Levels of skill vary, although overall the writers
in the corpus are adept at framing their messages to reflect Western values and pre-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
416 Martin Gill

occupations and play on recipients’ assumptions about conditions in Africa (Blom-


maert and Omoniyi 2006; Smith 2008).
However, some aspects of behaviour are easier to manipulate than others.
While it may be simple enough to adopt a false name or nickname (although not al-
ways, to judge from some of the names chosen), it will be much harder to keep up
the full range of behavioural cues associated with a particular role, gender, stance,
etc. across a prolonged interaction, especially those, such as discourse features,
that are not generally objects of conscious reflection (Herring and Martinson
2004). This being the case, as Herring and Martinson note, those attempting to pro-
ject a false identity will tend to focus on its more stereotyped, consciously-avail-
able traits. In other cases, too, manipulation of cues may produce disauthenticating
results if, for example, it leads to an unnatural distribution of features across the
communication (Zhou, Burgoon, and Twitchell 2003).

1.5. Authentication cues


All forms of technological mediation, from writing onwards, have both con-
strained the nature of the communication they make possible and offered potential
for new developments, the latter usually emerging more clearly as the technology
matures. The constraints, in their turn, have given rise to novel ways to circumvent
them. At this stage in its history much CMC remains text-based, subject to many of
the same constraints as written text more generally. Moreover, technical advances
have enabled text on screen to look increasingly like familiar offline forms. Thus,
despite the evolution of stylistic and generic features of its own, email still has the
same relative paucity of non-linguistic cues to meaning and identity as offline
written communication, and much has been written about the extent to which users
are able to adapt their social and communicative skills to respond to purely textual
manifestations of interactants’ attitudes, emotional states, stances, and so forth
(e.g., Walther et al. 2005). It remains that communicating by email calls for some
skill in controlling the linguistic and textual norms of asynchronous interaction,
self-presentation, and authentication, lack of which may account at least partly for
the higher incidence of misunderstandings and flaming behaviour in CMC (Carl-
son et al. 2004: 12).
The addition of visual and audio channels could be expected to enhance the
authenticity of the interaction by making available vocal and paralinguistic cues,
together with other aspects of interactants’ physical presence that enable them to
form a richer impression of one another. However, for just this reason it also raises
the threshold of acceptability: As authenticity effects become more multimodal
and synchronous, they become harder to control. From the perspective of the
would-be fraudster, this will present a greater challenge than a more restricted,
asynchronous medium, especially over time (cf. Carlson et al. 2004: 20). For many
ordinary purposes, too – in particular those that involve interaction with unfamiliar

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 417

recipients or where there is a clear difference in relative status – the limitation of


email can also be one of its special advantages, as it allows senders freedom to
shape the particular form of message and self-presentation they choose (Walther
1996). As Ellison, Heino, and Gibbs (2006) note, this has made email the preferred
medium for online dating, in which impression management and self-enhancement
play a central role. In the absence of face-to-face interactional cues, details such as
the email address or the time when a message was sent and minor nuances of ex-
pression become charged with significance. Recipients are likely to expect mess-
ages, no less than physical appearance, to show evidence of conscious attention to
detail; spelling errors or stylistic lapses can come to be viewed as an indication of
undesirable social or personal traits, and senders of messages may take pains to
avoid them in their own messages on that account (Ellison et al. 2006: 424). Simi-
lar considerations affect the use of email in more formal registers for non-familiar
or official purposes, where errors are likely to index lack of expertise and/or lack of
professionalism. In such cases, the consistency condition would seem to be para-
mount. There are obvious problems in this respect in the Nigerian Letter corpus,
where formal registers and identities predominate, not least as a result of the mess-
ages’ error-strewn English and apparent lack of concern for the norms of style and
composition.
Nonetheless, in so far as email is used to fulfil vernacular “spoken” functions, it
could be expected to bear traces of spontaneous composition – speech-like forms,
loose textual structure, typos, and the like; in informal settings these may serve
to authenticate the message, where production of a polished text might suggest
too great a concern with the calculation of an effect. Given the trend towards
greater informality in contexts such as business communication, it is likely that
these different expectations will sometimes appear to conflict (Danet 2002; Gime-
nez 2000).
Unconventional or “incorrect” features can also be authenticating in the case of
an inexperienced writer writing in a second language, under emotional strain, or in
otherwise difficult circumstances, where imperfect control of the medium is only
to be expected. For this reason, some of the very obvious errors in the Nigerian
Letters may help to authenticate the “plight narratives” that many of them tell. Al-
though for other reasons it is probable that, when they are read by First World re-
cipients, “the demasqué will be quick and merciless” (Blommaert and Omoniyi
2006: 604), the presence of non-standard elements may, in certain cases, help to
heighten the recipient’s sense that this is in fact the real thing. More sophisticated
senders may consciously exploit this possibility.
Authentication cues in email nonetheless differ in significant ways from those
used in offline written communication. Potentially authenticating physical prop-
erties of written text, such as the feel of the paper or the possibility of adding a
handwritten signature or other personal marks, are unavailable, as are most of the
trappings of formal correspondence – layout conventions, printed letterheads and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
418 Martin Gill

envelopes, recorded delivery services, etc. Many of the messages in the Nigerian
Letter corpus attempt to reproduce aspects of offline formal letter layout, in par-
ticular by including mailing address and header, but the limited resources of
plain text formatting tend to undermine their effect. Cues such as these, it seems,
cannot simply be transposed from offline to online contexts. Some of the writers
use the hypertext markup language (HTML), giving them greater control over the
appearance of the text on screen, including the use of colour, varied fonts, etc.
However, since such conventions are not standard features of email, they may
tend to foreground the home-made quality of the messages rather than authenti-
cate them.
In certain forms of chat and email, emoticons have developed as a surrogate for
some of the authenticating functions of the physical states and non-verbal behav-
iour of face-to-face interaction, particularly facial expressions, although it is
doubtful to what extent they reproduce physically-embodied authenticity effects
(cf. Dresner and Herring 2010). For one thing, as merely a notation for (rather than
an expression of) intended emotional (etc.) states, emoticons have no necessary
connection with any particular feeling on the part of the sender. Secondly, unlike
much non-verbal behaviour, their use is under conscious control and, as such, not
part of those maximally authenticating aspects of behaviour that are involuntary
(see above). By appearing constructed and strategic, they may even detract from
the sense of authenticity (Walther and d’Addario 2001). Nonetheless, it appears
that in some contexts, such as gaming, by indexing affect, emoticons can also help
promote engagement, in the sense discussed earlier, and the development of rela-
tionships between interlocutors (Utz 2000).
At the same time, in contrast to offline correspondence, email also contains as-
pects that cannot easily be controlled by the sender (the technical “given off”) – for
example, the addition of advertising in freemail services, inclusion of the originat-
ing ISP address, and trace of the path along which the message has been sent –
which in certain cases, including that of Nigerian Letters, are likely to affect the re-
cipient’s perception of its authenticity. Claims as to the physical whereabouts and
identity of the sender are likely to be assessed against the evidence of these fea-
tures.
The same goes for the way in which emails are stored on the recipient’s com-
puter or mail server, making whole archives of messages potentially available for
comparison (cf. the quantity condition, above). It is highly disauthenticating to find
many almost identically worded messages in one’s own inbox. Their sheer volume
undermines the claim that they are one-off approaches to the recipient alone that
will “come as a surprise”, and makes the formulaic routines of their structure and
content all too obvious. This points to the greatest challenge facing online
scammers – one which, in the case of the producers of Nigerian Letters, at least,
they rarely seem to appreciate. That this should be so is perhaps a consequence of
the lack of reciprocity between sender and recipient that characterizes these mess-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 419

ages. In the absence of genuine responses, the senders are unlikely to gain much
understanding of the circumstances in which their messages will be received, read,
or stored.

1.6. Self-presentation online


The relative absence of embodied authenticating cues in CMC means that the
scope for concealment, falsification, and deception is much greater than in face-to-
face interaction; as a consequence, online identities are less reliable, and senders of
messages are less accountable. Freed from the constraints of physical interaction,
users are at liberty to construct fictitious, semi-fictitious, or idealized identities, al-
though the motives for doing so can vary widely, and by no means all cases involve
deception. The readiness to do so may be influenced, among other things, by the
likelihood of face-to-face contact with recipients. In contexts such as dating, where
the presumed goal is the establishment of a real-world relationship, enhancements
may be natural, but deliberate falsification is uncommon (Ellison et al. 2006).
Where only virtual interaction is expected, users may be more willing to conceal or
falsify aspects of their “real selves”, and in some cases offline identities may be-
come irrelevant, especially when the virtual world is treated as a social space on its
own terms, rather than as an extension of offline existence (cf. Slater 2002). The
“real self” is itself a problematic notion, however. Identities are never stable or es-
sential, and clear lines are hard to draw between normal subjective, perhaps
flawed, self-presentation, modifications or enhancements, ludic elaborations, per-
formances, crossings, etc., and intentional fabrication. In any case, authenticating
work is needed to sustain identities of all kinds.
At the same time, as has frequently been observed, anonymity – especially vis-
ual anonymity – in CMC tends to be disinhibiting, making it easier for some people
to express themselves more candidly or intensely than they otherwise would (Elli-
son et al. 2006; Henderson and Gilding 2004; Joinson 2001; Suler 2004). It may be
that self-disclosure helps to create conditions of mutual trust, and because it satis-
fies the spontaneity condition, it seems to be naturally authenticating. In the case of
Nigerian Letters, the issues of trust and disclosure are closely connected to the
need for secrecy: Many of the writers claim to be the only one in possession of em-
powering, sensitive information and to be searching for a trustworthy partner to
whom they can reveal it, one who can keep a secret. In this way, trust shades into
complicity.
The following sections present a more detailed analysis of Nigerian Letters.
The focus is on the authenticity effects these letters attempt assessed in relation to
the five conditions for authentication set out earlier.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
420 Martin Gill

2. Case study: Nigerian Letters

2.1. Characteristics of Nigerian Letters


The Nigerian Letter, so called because the majority can be traced to origins in
Nigeria or neighbouring west African states, is a modern version of a much older
scam known as the “Spanish Prisoner” dating back to the 16th century (Smith
2008). In its Nigerian forms it began before CMC, using conventional mail and fax
directed to recipients in First World locations, and in the United States it had al-
ready come to be seen as a serious economic threat, resulting in attempts by Con-
gress to introduce sanctions against the Nigerian government for its failure to con-
trol the fraudsters (by 1999, when still largely conducted offline, Nigerian advance
fee fraud was estimated to have netted $5 billion globally and led to 17 deaths;
Smith, Holmes, and Kauffman 1999). The bait is the promise of an unexpected for-
tune to be paid to the recipient – in the most common versions in the present cor-
pus, as lottery winnings or as a share in an unclaimed bank deposit. The fraud is
constructed as a scam within a scam – a dubious deal requiring the collusion of the
recipient forming the cover for the real scam, of which the recipient is the target.
Once hooked and enjoined to secrecy, the victim’s money is siphoned off in the
form of demands for special payments, transfer charges, “processing fees”, etc. to
be paid for the release of the sum in question, while embarrassment or fear that
they have acted illegally may prevent recipients from contacting relevant author-
ities. Almost all of the features of these messages should arouse suspicion, and re-
sources have been deployed by government agencies across the world to combat
them, yet the scam continues to be lucrative; by 2004 it was estimated to be costing
the UK £200 million a year (Walsh 2004). An extensive archive of Nigerian Letter
emails, with commentary, can be found at http://www.419scam.org.

2.2. The corpus


The corpus discussed here consists of 560 emails received by the author between
December 2004 and March 2007, of which 100, received between 24th November
and 2nd December 2005, have been analysed in greater detail (referred to in what
follows as the main study). The messages in the main study have an average length
of 403 words but show considerable variation (shortest 143, longest 885). The
longest message in the whole corpus is of 2,060 words and is unusual in various
other respects. Eighty senders in the main study claim to be male, 20 female.
Nigerian Letters belong to a variety of types. Those found in the main study are
shown in Table 1 (for comparable typologies, see Blommaert and Omoniyi 2006;
Edelson 2003; Holt and Graves 2007).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 421

Table 1. Types of Nigerian Letter

Type Frequency
Unclaimed deposit 36
Rescue transfer 27
Collusive transfer 16
Charity 8
Transfer 7
Business proposal 5
Bequest 1
Total 100

One other genre – the Lottery win – is in fact the most frequent (236 arrived in my
inbox over the period of this study), but it is excluded from the present discussion
on the grounds that its textual functions are somewhat different from the others. All
of the messages considered here seek to persuade the recipient to act as intermedi-
ary in shifting a huge sum of money abroad by providing a “safe” foreign bank ac-
count and offer a substantial share of it in return.
The types call for a brief comment. In the “unclaimed deposit”, the usual story
is that a businessman has perished, along with all his family, in a road accident or
air crash (the latter usually corroborated by a link to a relevant news report), leav-
ing a huge fortune in a bank account unknown to anyone but the sender and without
traceable next of kin. The “rescue transfer” generally involves a close relative of a
government minister or other senior figure now deceased, who needs help in trans-
ferring the family fortune abroad, out of potential danger. “Collusive transfer”
requires the recipient to assist in blatantly fraudulent activity, often the result of
corrupt management of government contracts, in which the sender has been in-
volved in “over-invoicing”. The “charity” messages come from senders with incur-
able diseases, who now wish to make some (extremely generous) donations to
charitable organizations in other countries. “Transfers” and “business proposals”
are more straightforward. The former concern unclaimed funds, in some cases
written as if the recipient is already involved with the Nigerian government; the
latter propose various lucrative business partnerships. The single example of a “be-
quest” message takes the form of a solicitor’s letter, and again its opening implies
ongoing communication: “Sequel to your non response to our earlier Mail …”.
Senders claim many different origins and identities; they also make use of a
range of freemail addresses in third countries, sometimes unexpected ones (e.g., in
one case, the fan site for a German television actress). The majority expect replies
to be sent to an alternative address. Claimed locations range across Africa, the
Middle East, and Europe, among others, with 10 in London and 34 in Nigeria. (For
further discussion of the email addresses used in Nigerian Letters, see Edelson
2003: 395–396.)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
422 Martin Gill

2.3. Authenticating work in Nigerian Letters


Deceptive messages provide valuable material for the study of authentication on-
line, since one can assume that they are produced with the aim of appearing genu-
ine. They should actively deploy authenticating cues that in other contexts form the
unnoticed precondition for interaction, and they should attempt to control the
“given off” no less than the “given” aspects of their performances.
If this is the case, however, most Nigerian Letters are a failure, largely because
their writers seem oblivious to the ways in which unmistakable cues to their real
identities continue to leak out. In some cases, the mask slips almost before any at-
tempt has been made to fix it in place. Not that this would be likely to trouble these
writers: With the opportunities it offers for hiding identities and for generating,
copying, and forwarding messages around the globe in enormous numbers at al-
most no cost, CMC is an ideal medium for fraudsters. Untraceable senders can del-
uge unknown recipients with fake proposals, offers, appeals, etc. (over seven per
day arrived in this recipient’s inbox over the period of the main study), without
concern for any one of them as a genuine communication: Somewhere in this flood
one or another may evoke a response, and from the fraudster’s perspective, nothing
else matters. As such, the computer-mediated relation between sender and recipi-
ent is effectively no relation at all, and the pragmatic strategies employed to per-
sonalize and authenticate the messages are empty gestures.
In such circumstances, the notion of authentication would hardly seem to
apply: En masse these messages are so manifestly fraudulent that the only surprise
is that anyone is taken in. Remarkably few of them try to exploit this: In a context
where countless messages are fake, an obvious authenticating strategy would be to
acknowledge the fact and claim the distinction of being, instead, the (rare) genuine
article. Among the 100 emails in the main study, only four attempted a move of this
kind (although comparable messages received since 2007 indicate that it is becom-
ing more common). Its absence suggests that the writers of Nigerian Letters spare
little thought for the recipient’s end of the interaction; indeed, as the following
analysis highlights, senders’ perceptions of what is required by way of authenticat-
ing work seldom correspond to recipients’ expectations.
Despite this, a wide repertoire of authenticating strategies is employed, both in
relation to the sender’s assumed identity and the validity of the transaction. Those
found in the main study are summarized in Table 2.

2.4. Projected identities


The most common of the assumed identities is powerful: a senior bank employee,
government minister, or ex-head of state. Titles are important – in the full corpus
there are 32 doctors (including Hon. Dr.) and 78 barristers, all of whom adopt
“Barrister” as their title. These are people who are in a position to make the necess-
ary legal and financial arrangements and cause them to happen. Most of the lawyers’

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 423

Table 2. Authenticating strategies

Stylistic features:
Legal/business register
Transactional language (e.g., business arrangements), technical details
“Powerful” language features

Formatting conventions:
Formal layout
Headings
HTML – use of colour and formatting

Personal attributes:
Powerful identity
Status markers; titles
Competence with legal procedures, financial arrangements, etc.
Victimhood – of conflict, personal misfortune, corruption, etc.
Wife/widow/son of powerful person – combining power and victimhood
Concern with moral probity of recipient
Honesty in the face of endemic corruption
Evidence of personal work, effort, risk
Religious sentiments, wishes, blessings; verses from Bible/Qur’an
Brazen dishonesty

Emotional states:
Plight narrative – political crisis, danger, death
Importance/urgency
Need for secrecy
Use of emotive, evaluative language
Helplessness
Decision not lightly taken

Protestations and avowals:


Avowals of sincerity; not a hoax
Appeals to recipient’s better nature, charity
Statements of earnest intention

Material proof/evidence/corroboration:
Reference to news stories; hyperlinks to online news items, web pages
Familiar stereotypes/images of Africa

Certification/documentation:
Official ID to follow
Contact details (address/fax/phone numbers)
Email address

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
424 Martin Gill

Interactional behaviour/awareness of audience:


Negative politeness: apologies
Positive politeness: greetings, esteem
Entreaties; “please”
Reason for contact
Anticipation of surprise
Anticipation of misgivings
Assurances:
Absence of risk
Legality
Ease of transaction
Freedom to withdraw
Person deixis/reference to recipient/use of names
Place deixis (sender)
Place deixis (recipient)
Collaboration

Problematic/“given off” features:


Inappropriate subject line
Exotic email addresses
Different From and Reply-to addresses
Deletion or concealment of “to” line
Inclusion of advertisements, etc. in mail
Use of capitals for special emphasis
All capitals

messages belong to the category of “unclaimed bequests”, in which they are shown
to have acted correctly – making fruitless efforts to contact next of kin, carrying
out research through the bank’s files, etc. In many cases, as noted, they are also
possessors of confidential knowledge: They alone know of the secret account, and
they express repeated concern about the trustworthiness of the recipient. Fur-
thermore, they are individuals of great probity, who are at pains to stress the legal-
ity and risk-free nature of what they are proposing. The following are typical:
I guarantee that this will be executed under legitimate ar-
rangement that will protect you from any breach of the law
as I will use my position as a Bank’s member of group risk to
secure approvals and guarantee the successful execution of
this transaction.
Chris Wreh, Member of the Risk Management Group
I will not fail to bring to your notice that this business is
100 % risk and trouble free and that you should not entertain
any fear as all modalities for fund transfer can be final-
ized within 7 to 9 banking days.
Mr Gipsin Ben, Consulting Auditor

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 425

A token of their authority is command of an appropriate-sounding legal register.


They are also able to stipulate conditions and requirements of a dauntingly official
kind.
An alternative identity, especially in the context of the “rescue transfer”, is that
of victim. From a western recipient’s point of view, this may be more effective,
since it draws on the spontaneity condition (see above) and usually involves a self-
revelatory “plight narrative” as its central authenticating element, a genre made
only too credible by western coverage of African affairs. In some cases, plight nar-
ratives can become extended accounts of disaster, flight, and hardship, drawing ex-
plicitly on events familiar to anyone who follows the news. For example:
Due to the land and political problems in Zimbabwe, as a re-
sult of President Robert Mugabe’s introduction of new Land
Act Reform wholly affecting the rich white farmers and the
few rich black farmers. Actually all white farmers were
asked to surrender their farms to the government for re-dis-
tribution and infact to his political party members and my
father though black was the treasury of the farmers associ-
ation and a strong member of an opposition party that did
not support the president’s idea.
Thereafter he then ordered his party members and the police
under his pay role to invade my father’s farm and burn down
everything in the farm.They killed my father and took away a
lot of items from his farm.
Evans Tobi, son of Mr. A.E Tobi, a farmer from Zimbabwe

Such accounts exploit their recipients’ humanitarian response to injustice. More-


over, in contrast to the previous examples, the texts’ linguistic shortcomings may
seem to enhance the authenticity of the predicaments they describe. Senders often
claim to be family members of deceased or disgraced government officials, mili-
tary leaders, or heads of state, who are thus able to combine victimhood with ac-
cess to relevant authority and credible sources of wealth.
A further common identity is that of the corrupt or aggrieved state functionary,
such as the “Head of Clinical Pharmacology and Director of Research” at the Uni-
versity of Lagos, who wants to pocket, on behalf of his research team, the unspent
$8.3 million of a research grant left over at the end of a project to investigate sickle
cell disease: “We have put in over 25 years of our lives into working for the gov-
ernment and as academics we do NOT have anything to show for it, hence this op-
portunity we see as a God-Sent one”. Here, the very candid nature of the disclosure
may be authenticating, even as it is morally off-putting.
Nonetheless, in all these cases, something seems to be amiss. The work these
writers do to authenticate their identities mostly consists of combining discrete
cues rather than displaying a more global concern with behaving in character. For
all their pathos, the plight narratives violate the consistency and plausibility con-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
426 Martin Gill

ditions by turning hastily – at just the point where an appeal for help might be ex-
pected – to the “transactional” details, the inevitably huge sums deposited with se-
curity companies (references to which are found in 59 messages in the main study),
the necessary documentation, and the deal for the recipient. Cross-cultural prag-
matic issues also arise. The powerful professional identity that many writers seek
to project, positioning the recipient as a lowly, if favoured, petitioner, may be auth-
enticating in more hierarchically-ordered contexts (cf. Gumperz 1982: 182); for a
European recipient, however, it is likely to be alienating. Similarly, to many recipi-
ents the use of capital letters to mark points of special importance will suggest
shouting. No traces of a “real self” are given off in the form of a distinctive voice;
in fact, the mass of these messages seem to be without any spontaneous features
other than those that point towards their real origins. As this shows, identities are
not collections of cues, and neither the deployment of authenticating strategies nor
the work that goes with them in themselves create the experience of authentic com-
munication.

2.5. Structural features


Aspects of the structure of Nigerian Letters are illustrated by the two typical “un-
claimed deposit” messages in example 1 (below). The similarities between these
messages, received almost six months apart, are close enough to suggest a single
author or at least a single template. The rows in the table indicate the paragraphs of
the messages; within these, the texts have been arranged where possible to keep
parallel elements side by side in order to highlight the changes introduced, en-
abling us to see how the message has been developed over that period.

Example 1.

1 Date: Fri, 26 Aug 2005 04:45:09 From – Fri Feb 17 14:22:43 2006
+0100 (GMT+01:00) Date: Wed, 15 Feb 2006 06:26:15
From: Dr Phil Hodkinson +0100 (GMT+01:00)
<phil_hodkinson@virgilio.it> From: james pual
Reply-To: phil_hodkinson@excite.com <james_pual1@virgilio.it>
Subject: FROM PHIL’S OFFICE Reply-To: ja_pu12@Yahoo.com
Subject: FROM DIRECTOR PETERS
OFFICE
2 FROM PHIL’S OFFICE FROM DIRECTOR PETERS OFFICE
HEAD OF DEPARTMENT BANK OF SCOTLAND
BANK OF SCOTLAND 3RD FLOOR MOUND
UNITED KINGDOM EDINBURGH
EH1 1YZ
UNITED KINDOM,
EMAIL: ja_pu11@yahoo.com
Tel/Fax:+44–7031842574
3 DEAR PARTNER, GREETINGS,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 427

4 IN ORDER TO TRANSFER OUT (THIRTY- WE WANT TO TRANSFER THE SUM


MILLION POUNDS STERLINGS) FROM OUR (20,000.000) Twenty million
BANK HERE IN LONDON. POUNDS STERLINGS)FROM OUR BANK
HERE IN UNITED KINGDOM to
A SAFE FOREIGNERS ACCOUNT IF I
CAN ONLY CAN TRUST YOU AS THE
BENECFICIARY OF THE FUND.
I KNOW THAT THIS MESSAGE WILL COME
TO YOU AS A SURPRISE AS WE DON’T
KNOW OUR SELF BEFORE, BUT BE SURE
THAT IT IS REAL AND 100 % RISK
FREE,
I HAVE THE COURAGE TO LOOK FOR A You can serve to receive this
RELIABLE AND HONEST PERSON WHO WILL money, as long as you will remain
BE CAPABLE FOR THIS IMPORTANT honest to me till the end OF this
BUSINESS TRANSACTION,BELIEVING THAT important business trusted in you
YOU WILL NEVER LET ME DOWN EITHER NOW and believing in God that you will
OR IN FUTURE. never let me down either now or in
future.
5 THE OWNER OF THIS ACCOUNT IS MR JOHN THE OWNER OF THIS ACCOUNT IS
HUGHES FOREIGNER AND THE MANAGER OF MR JOHN HUGHES A FOREIGNER AND
PETROL CHEMICAL SERVICE HERE IN THE MANAGER OF PETROL CHEMICAL
LONDON, A CHEMICAL ENGINEER BY SERVICE HERE IN LONDON,A CHEMICAL
PROFFESSION AND HE DIED SINCE 1995. ENGINEER BY PROFFESSION AND HE
DIED SINCE 1995.
THE ACCOUNT HAS NO OTHER BENEFICIARY
AND MY INVESTIGATION PROVED TO ME AS SINCE THEN THE ACCOUNT HAS NO
WELL THAT HIS COMPANY DOES NOT KNOW OTHER BENEFICIARY TO CLAIM THE
ANYTHING ABOUT THIS ACCOUNT AND THE MONEY AND MY INVESTIGATION
AMOUNT INVOLVED IS THROUGH SOME OLD FILES PROVED TO
(50,000,000.00)POUNDS STERLINGS. ME AS WELL THAT HIS COMPANY DOES
NOT KNOW ANYTHING ABOUT THE SAID
ACCOUNT AND THE AMOUNT INVOLVED IS
(20,000.000)POUNDS STERLINGS.
6 We will start the first transfer
with fifiteen MIL-
LION[$15,000.000] upon success-
ful transaction without any
disappoint from your side, we
shall re-apply for the payment of
the remaining rest amount to your
account.
7 I WANT TO TRANSFER THIS MONEY INTO A
SAFE FOREIGN ACCOUNT ABROAD BUT I
DON’T KNOW ANY FOREIGNER,
I KNOW THAT THIS MESSAGE WILL COME
I KNOW THAT THIS MESSAGE WILL COME TO TO YOU AS A SURPRISE AS WE DON’T
YOU AS A SURPRISE AS WE DON’T KNOW KNOW OUR SELF BEFORE, BUT BE SURE
OUR SELF BEFORE,BUT BE SURE THAT IT THAT IT IS REAL AND 100 % RISK
IS REAL AND A GENUINE BUSINESS. FREE.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
428 Martin Gill

IF YOU COPERATE WELL WITH ME


AND FOLLOW MY INSTRUCTIONS
APPROPIATELY YOU WILL BE GIVEN
35 % OF THE SAID AMOUNT AND 5 % FOR
EXPENCES MADE WHILE 60 % FOR ME.
I BELIEVE IN GOD THAT YOU WILL I BELIEVE IN GOD THAT YOU
NEVER LET ME DOWN IN THIS INVEST- WILL NEVER LET ME DOWN IN THIS
MENT.YOUR FULL CONTACT INFORMATION INVESTMENT.YOUR FULL CONTACT
PHONE AND FAX NUMBER,NAME WILL BE PHONE AND FAX NUMBER AND NAME WILL
NECESSARY FOR THIS EFFECT. BE NECESSARY FOR THIS EFFECT.
8 HOPE TO HEAR FROM YOU HOPE TO HEAR FROM YOU IMMEDIATELY.
IMMEDIATELY.THANKS
9 DR PHIL HODKINSON. MR JAMES PUAL
EXECUTIVE DIRECTOR OF FINANCE
BANK OF SCOTLAND

It is immediately striking that the passage of time has not helped to refine the
letter’s authenticity effects. The second message is longer (306 words compared
with 188), but the content and sequence of moves is largely unchanged, and while
the punctuation has been corrected in paragraph 4, many language errors remain
untouched. The major difference in the later message is the addition of a “stan-
dard” move outlining the financial details of the deal and the recipient’s cut of the
proceeds. In paragraph 6 the sum to be transferred has turned from pounds into dol-
lars. Neither message follows the usual pattern by opening with a personal intro-
duction of the sender and anticipation of the recipient’s surprise; instead, both
adopt a brisk, direct tone more appropriate to an already established business rela-
tionship. If anything, the second message seems somewhat less coherent than the
first, since the “surprise” element has been included twice, worded identically, ap-
parently without concern for the most suitable ordering of elements in the text.
Moreover, the unusual surname Pual looks suspiciously like a misspelling of Paul
and is at odds with the heading: “FROM DIRECTOR PETERS OFFICE”.
In a third version (example 2, below), received shortly afterwards, the text has
been adjusted further towards the Nigerian Letter norm, with the inclusion of a first
person introduction (“I am MR. ROBERT PAYNE”) at the beginning (there are 26
occurrences of “I am + title + full name” in the main study, 175 in the full corpus).
Greater emphasis is also placed on gathering details from the recipient. Nonethe-
less, apart from a shift into lower case, the main elements of the message remain
unchanged, new errors have appeared, particularly in the added elements, and the
sum in question is stated as two different amounts, as in the first version. There is
little evidence that potential recipients’ norms and expectations have been used in
any consistent way to guide the changes introduced over this sequence or to en-
hance the authenticity effects created. While the use of lower case removes one
stylistic flaw, capitalization and other written conventions remain highly non-stan-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 429

dard. The writer of example 2 has dropped disauthenticating features such as the
inappropriate heading “FROM DR PHIL’S/DIRECTOR PETERS OFFICE” but
has inserted the equally inappropriate personal introduction, and the text used to
explain the unclaimed deposit has reverted to that of the first message. Overall,
example 2 has a more professional appearance, with the addition of an official-
looking heading: “HOW THE MONEY CAME ABOUT:” and a numbered list of
personal details required at the end; but with respect to its authenticity effects, the
text itself has hardly progressed at all.
Remarkably, despite the higher threshold of acceptability required to pass as an
English-speaking official in the UK communicating with an educated European
audience, these messages show no more sign of serious effort than any of the
others. In the examples above, the sender presents himself as a senior manager of
the Bank of Scotland, based in the UK, yet the text is so manifestly non-standard
that the claim is laughable. In addition, he hardly seems aware of his location: The
identity of John Hughes, a “Foreigner … here in London”, is unconvincing, as is
the urgent need to transfer his money to “a safe Foriegn Account Abroad”. Both
would make much better sense in relation to Nigeria, and, needless to say, this is
the usual case.

Example 2.
Date: Tue, 28 Feb 2006 15:11:35 +0100 (GMT+01:00)
From: “Mr.Robert Payne” <robert_payne@virgilio.it>
Reply-To: payne_robert2006@yahoo.com.au
Subject: CONTACT ME!!!
FROM:MR.ROBERT PAYNE
BANK OF SCOTLAND
UNITED KINGDOM
DATE:
SIR/MADAM,
I am MR. ROBERT PAYNE a British citizen and I am 53years of age.
I am married with three kids, I am the Auditor and computing
Manager of Bank Of Scotland. In Order to Transfer out (FIFTY-
MILLION POUNDS STERLINGS) From our Bank Here in London I Hvae
the courage to look for a reliable person that will be capable
for this important business transaction believing that you
will not let me down Either now or in the Future.
HOW THE MONEY CAME ABOUT:
The owner of this account/money is MR.JOHN HUGHES a Foriegner
and The Manager of PETROL CHEMICAL SERVICE here in London, A
chemeical Engineer by Proffession and He Died since 1995 and
this money has remained unclaimed because the account has no
other Beneficiary and my investigation proved to me as well

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
430 Martin Gill

that his company does not know anything about this acoount and
the amount involvedis (15,000,000.00)Pounds Sterlings.
I want to Transfer this money into a safe Foriegn Account
Abroad but i don’t know any Foriegner.I know that this Message
will come to you as a Surprise as we don’t know ourselves
before,But be sure that it is Real and a Genuine Business and
as well is 100 % RISK FREE.I Believe in GOD That you will never
let me down in This Investment Opportunity.If you are
Interested in this Business Please the form below and return
back to me to enable me start up with the Necessary Procedures
as to a free and safe transfer of this Fund into the Account
Informations that will be Provided by you as i will be Using my
Position in The Office to influence other Staff.Please treat
this Proposal with Utmost Confidentiality.
YOUR PERSONAL DETAILS AS REQIURED BELOW:
1) FULL NAME
2) AGE
3) NATIONALITY
4) COUNTRY OF RESIDENCE
5) OCCUPATION
6) CONTACT ADDRESS
7) TEL/FAX NUMBER
8) ACCOUNT NO/DETAILS
Yours Sincerely
MR.ROBERT PAYNE.

The impression of haphazard modification is reinforced by the 24 other mess-


ages in the full corpus that contain essentially the identical text, with minor vari-
ations of details, names, amounts of money, and locations, the shortest just 113
words. They are crudely executed, with little attention to acceptability or coherence,
even as they attempt to project powerful identities. Unsatisfactory as it is, closer and
more distant versions of this message have been in circulation on the Internet for sev-
eral years and are still appearing; it is one of many such models. As we see, the text is
not static, but the changes that occur carry it no closer to “authentic” communication.
A possible reason for what can seem obtuse persistence with the same tired for-
mulae, however disauthenticating, is the lack of reciprocity between sender and re-
cipient already mentioned. As attested by many of their features, as well as by the
competence necessary to send them from constantly changing email accounts,
these are technically sophisticated products, yet the conditions of their production
are such that their writers have little contact with the context of their reception.
Lacking regular feedback, these messages are never shaped by commentary about
how successful they are or how they are understood.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 431

This, in turn, reflects the fact, to which Blommaert and Omoniyi (2006) draw
attention, that these emails are sent across a great divide of culture, wealth, and ac-
cess to resources, including computer technology. They are sent against the domi-
nant North – South flow of influence, holding out to the already affluent recipient a
vision of an instant fortune to be made from the poorest corner of the world. They
are sent by individuals who may be educated producers of a high status variety of
English in their own locality, “streetwise in the culture of the Internet” (Blommaert
and Omoniyi 2006: 585), alert to the ironies of their post-colonial situation: Some
of them, it appears, are celebrated in Nigeria for striking a blow against the old im-
perialists, and they perhaps knowingly reproduce in their messages a stereotyped
image of Africa as corrupt, violent, poor, and religious, yet rich in resources for
foreigners to exploit (cf. Smith 2008). Yet they show little awareness of how their
English differs, both in form and status, from that of the First World to which their
messages are directed or of how their messages are read in consequence.

2.6. Messages to no one


In the circumstances, it is unsurprising that there is little tailoring of the messages
to recipients (cf. Carlson et al. 2004: 13); no message in this corpus includes a per-
sonal reference to the recipient (that is, to me) by name or to my location (Fin-
land), even though 41 of the 100 messages in the main study contain references to
“your country” and 19 to “your name” (sometimes in the context of asking what it
is). Several attempts to tailor messages misfire. Senders claiming to be lawyers
acting for Mr Andrew Fonseca, Mr Winston Baxter, and Mr George Nathan justify
contacting me on the grounds that I have the same last name as their client, mak-
ing it natural that I should pose as their next of kin. According to the first, this
“makes the claim most credible”. Other messages refer to the client, for example,
as “Mr Robert” (“hereinafter refer as ‘my deceased client’” – avoidance of the
name adroitly turned into an opportunity for a display of legal language), before
claiming that we share the same last name; one omits the name altogether. Ac-
cording to Hon. Dr. Adeniji Olu, Minister in the Foreign Affairs Ministry: “Your
name was among the people expecting the funds to be transferred into their ac-
count” on a list now in front of him, although he does not mention my name any-
where in his email. The handling of personal deixis is both a central authenticating
cue in interaction and complex when sending bulk messages to unknown recipi-
ents. Among all the Nigerian Letters only one – in the Lottery category – almost
brings it off, with a reference to GILL MARTINS (MR) (for apparently more suc-
cessful attempts, see Blommaert and Omoniyi 2006). By contrast, deictic refer-
ence to the sender’s location occurs with formulaic regularity, in a way that is
clearly intended to be authenticating: There are 34 occurrences of “here in + lo-
cation” in the main study and 255 in the whole corpus. Likewise, despite the em-
phasis on mutual benefits, senders rarely attempt to construct a collaborative

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
432 Martin Gill

frame of reference: Inclusive we accounts for only 30 out of 193 occurrences of


the pronoun (16 %) in the main study (10 of them in the context of saying that we
haven’t met each other); inclusive our accounts for 16 out of 107 occurrences
(15 %), four of which are duplicates.

2.7. Discussion
Senders of unsolicited email messages face a daunting task. Before they can begin
to persuade potential victims to respond, they must create the conditions in which
their messages will be read as genuine, in a context of high levels of distrust. As
this discussion has illustrated, writers of Nigerian Letters are well aware of the
challenge and able to draw on a repertoire of authenticating strategies, often with
great resourcefulness. Despite their many oddities and linguistic shortcomings, the
messages rarely seem naïve; indeed, viewed as a whole, they give evidence of cal-
culated management of the “given” aspects of self-presentation and technical con-
trol over the medium. They show themselves to be adept CMC users, immersed in
their local context, aware of how Africa is read from the outside and able to exploit
nuances of voice and style to create particular authenticity effects. Their most fa-
voured strategies are those of the managerial/legal/transactional discourse of
power and the “plight” narrative, instantly recognizable to First World news audi-
ences, or a combination of the two. Some of these are strikingly told, some – with
their chests of treasure and secret arrangements – play with familiar folk motifs of
magic wealth.
As any collection of these messages will quickly reveal, however, they are
modular constructions, created according to a variety of templates, in which moves
are combined with no more than minimal concern for their ordering, and whole
texts, textual elements, turns of phrase, names, etc. are constantly (often incoher-
ently) recycled and repeated with variations. As such, it may be wrong to approach
them as fully intentional, human forms of communication at all: Many could
equally be computer generated. Indeed, Holt and Graves (2007: 150) suggest that
standard scripts could be loaded into malicious software to enable the automatic
creation and propagation of these emails, with little intervention by the original
sender.
Moreover, with few exceptions, the overt authenticating work is not relational
or recipient-focused, except in the most formulaic sense (the “will come as a sur-
prise” move, assurances of safety, legality, etc.), and involves no understanding of
the recipient’s circumstances or background. Instead, the effort is sender-focused,
with constant reference to the sender’s attributes, experience, and competences.
There is rarely any evidence that the writers have tried to think themselves into
their role – to imagine the range of competing emotions such a person might feel,
acting clandestinely and at considerable risk to himself – or to project themselves
into the recipient’s position, or even to imagine a likely audience and attempt to

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 433

initiate serious interaction. When one sender does so, it stands out; the fact that his
is by far the longest message in the corpus is hardly coincidental.
Thus, the great majority of these writers are adept yet inept. They seem to at-
tend to the need for authenticity within the scope of a given move – for example,
when greeting, introducing themselves, establishing the details of their case, etc. –
but not across whole texts. Despite the care they so obviously take, they frame their
messages carelessly, even when errors will be disauthenticating, and while taking
pains to conceal aspects of the email such as the list of recipients, they rarely show
more than perfunctory concern for its specifically authenticating features such as
the subject line or for the many cues unintentionally given off. Above all, they ne-
glect the aspects of the message that are critical to authentication from the recipi-
ent’s perspective, summarized above as the five conditions of consistency, quan-
tity, spontaneity, plausibility/appropriateness, and engagement.

3. Conclusion

In everyday contexts, authenticating work forms part of the unproblematic texture


of interaction both offline and online. The study of Nigerian Letters highlights
some of the difficulties faced by writers writing in a communicational vacuum,
whose interest in controlling the nuances of discourse styles is less than their
eagerness to hook another victim. Their dilemma is that the one crucially depends
upon the other, and it is no surprise that, overall, their attempted authenticating ef-
fects fail. Authenticity is not achieved simply by the accumulation of micro-level
effects, however creative, but by macro-level management of structure, tone, pur-
pose, and language. Moreover, the absence of engaged, recipient-focused cues –
indeed, of any clearly imagined audience – leaves these messages in some ways
gesturing to thin air.
This work is no more than indicative of the issues that the study of authenti-
cation in CMC might address. Since most authenticating work continues to be done
discursively, further research is needed to refine its main dimensions and the ways
in which they interact with one another and with particular contexts and communi-
cative purposes. It would naturally be interesting to examine synchronous forms of
online interaction and to extend the discussion to include virtual worlds, where cer-
tain kinds of non-verbal “embodied” authenticating effects become available once
again. It would also be relevant to develop the comparison between types of auth-
enticity effects online and offline and to look more closely at such aspects as the
knowing, stylized character of much ordinary identity work of this kind – the con-
scious manipulation of authenticating resources that, for all their technical skill, is
apparently beyond the senders of Nigerian Letters.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
434 Martin Gill

Notes

1. Given the increasing use of email for official purposes and the growth of private transac-
tions online, much of the literature on authentication has been concerned with issues of
“certification”, for example of those accessing virtual communities, online forums, ser-
vices, etc. (e.g., Etzioni and Etzioni 1999) or with the development of technical solutions
to provide secure channels for money, electronic signatures, encryption and the like (see,
e.g., Sasse 2004). Although relevant to authentication in its widest sense, these issues will
not be discussed further here.

References

Barron, Anne
2006 Understanding spam: A macro-textual analysis. Journal of Pragmatics 38:
880–904.
Blommaert, Jan and Tope Omoniyi
2006 Email fraud: Language, technology and the indexicals of globalisation. Social
Semiotics 16(4): 573–605.
Carlson, John, Joey F. George, Judee Burgoon, Mark Adkins, and Cindy White
2004 Deception in computer-mediated communication. Group Decision and Negoti-
ation 13: 5–26.
Coupland, Nikolas
2001 Dialect stylization in radio talk. Language in Society 30: 345–375.
Cukier, Wendy, Susan Cody, and Eva Nesselroth
2006 Genres of spam: Expectations and deceptions. In: Proceedings of the Thirty-
Ninth Hawaii International Conference on System Sciences,
http://csdl.computer.org/comp/proceedings/hicss/2006/2507/03/250730051a.pdf
Danet, Brenda
2002 The language of e-mail. European Union Summer School, University of Rome.
http://www.europhd.psi.uniroma1.it/html/_onda02/04/ss8/pdf_files/lectures/
Danet_email.pdf
Donath, Judith
1999 Identity and deception in the virtual community. In: Marc A. Smith and Peter
Kollock (eds.), Communities in Cyberspace, 29–59. London: Routledge.
Dresner, Eli and Susan C. Herring
2010 Functions of the non-verbal in CMC: Emoticons and illocutionary force. Com-
munication Theory 20: 249–268.
Edelson, Eve
2003 The 419 scam: Information warfare on the spam front and a proposal for local
filtering. Computers and Security 22(5): 392–401.
Ellison, Nicole, Rebecca Heino, and Jennifer Gibbs
2006 Managing impressions online: Self-presentation processes in the online dating
environment. Journal of Computer-Mediated Communication 11: 415–441.
Etzioni, Amitai and Oren Etzioni
1999 Face-to-face and computer-mediated communities, a comparative analysis.
The Information Society 15(4): 241–248.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
Authentication and Nigerian Letters 435

Fairclough, Norman
1989 Language and Power. London: Longman.
Gill, Martin
2011 Authenticity. In: Jan-Ola Östman and Jef Verschueren (eds.), Pragmatics in
Practice: Handbook of Pragmatics Highlights, Vol. 9, 46-65. Amsterdam/Phil-
adelphia: John Benjamins.
Gimenez, Julio
2000 Business email communication: Some emerging tendencies in register. English
for Specific Purposes 19(3): 237–251.
Goffman, Erving
1959 The Presentation of Self in Everyday Life. Garden City, NY: Doubleday.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 41–58. New York: Academic Press.
Gumperz, John
1982 Discourse Strategies. Cambridge, UK: Cambridge University Press.
Henderson, Samantha and Michael Gilding
2004 “I’ve never clicked this much with anyone in my life”: Trust and hyperpersonal
communication in on-line friendships. New Media and Society 6: 487–506.
Herring, Susan C. and Anna Martinson
2004 Assessing gender authenticity in computer-mediated language use: Evidence
from an identity game. Journal of Language and Social Psychology 23(4):
424–446.
Heyd, Theresa
2008 Email Hoaxes: Form, Function, Genre Ecology. Amsterdam/Philadelphia:
John Benjamins.
Holt, Thomas and Danielle Graves
2007 A qualitative analysis of advance fee fraud email schemes. International Jour-
nal of Cyber Criminology 1(1): 137–154.
Joinson, Adam
2001 Self-disclosure in computer-mediated communication: The role of self-aware-
ness and visual anonymity. European Journal of Social Psychology 31:
177–192.
Mabry, Edward
2001 Ambiguous self-identification and sincere communication in CMC. In: Luigi
Anolli, Rita Ciceri, and Giuseppe Riva (eds.), Say Not to Say: New Perspec-
tives on Miscommunication, 247–264. Amsterdam: IOS Press.
Montgomery, Martin
2001 Defining “authentic talk”. Discourse Studies 3(4): 397–405.
Sasse, M. Angela
2004 Usability and trust in information systems.
http://www.dti.gov.uk/files/file15320.pdf
Slater, Don
2002 Social relationships and identity online and offline. In: Leah A. Lievrouw and
Sonia Livingstone (eds.), The Handbook of New Media: Social Shaping and
Consequences of ICTs, 533–546. London: Sage.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
436 Martin Gill

Smith, Andrew
2008 Nigerian scam e-mails and the charms of capital. Cultural Studies 2008: 1–21.
http://dx.doi.org/10.1080/09502380802016162
Smith, Russell, Michael Holmes, and Philip Kaufmann
1999 Nigerian advance fee fraud. Trends and Issues in Crime and Criminal Justice.
(No. 121). Canberra: Australian Institute of Criminology.
http://caballonm.com/ti121.pdf
Suler, John
2004 The online disinhibition effect. CyberPsychology & Behavior 7(3): 321–326.
Tseng, Ming-Yu
2007 Telling it as if it were true: Analyzing the language of scams. In: Ming-Yu
Tseng (ed.), Exploring Language at the Interface, 93–125. Taipei: Crane.
Tseng, Ming-Yu
2010 The pragmatic act of fishing for personal details: From choice to performance.
Journal of Pragmatics 42: 1982–1996.
Utz, Sonia
2000. Social information processing in MUDs: The development of friendships in
virtual worlds. Journal of Online Behavior 1(1).
http://www.behavior.net/JOB/v1n1/utz.html
Walsh, Conal
2004 Police swoop on email fraud ringleaders. The Guardian (online edition).
http://www.guardian.co.uk/business/2004/jul/11/crime.uknews
Walther, Joseph B.
1996 Computer-mediated communication: Impersonal, interpersonal, and hyperper-
sonal interaction. Communication Research 23(1): 3–43.
Walther, Joseph B. and Kyle P. d’Addario
2001 The impacts of emoticons on message interpretation in computer-mediated
communication. Social Science Computer Review 19(3): 324–347.
Walther, Joseph B., Tracy Loh, and Laura Granka
2005 Let me count the ways: The interchange of verbal and nonverbal cues in com-
puter-mediated and face-to-face affinity. Journal of Language and Social Psy-
chology 24(1): 35–65.
Zhou, Lina, Judee K. Burgoon, and Douglas P. Twitchell
2003 A longitudinal analysis of language deception behavior in email. In: Hsinchun
Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, and Therani Madhu-
sudan (eds.), Intelligence and Security Informatics. Lecture Notes in Computer
Science, Vol. 2665, 102–110. Berlin: Springer.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:11 AM
18. The maxims of online nicknames
Loukia Lindholm

1. Introduction

Online nicknames, or nicks,1 are identity markers that are employed for self-pres-
entation purposes in online interactions. The selection of an online nickname has
been labeled a ritual act, since it is practically impossible to participate in online
interactions without first submitting an online name (Crystal 2001; Tingstad 2003).
Apart from their instrumental nature, online nicknames convey intentionally-
provided information based on how online users wish to present themselves in
cyberspace (cf. Goffman 1959). This is in contrast to real life nicknames, which are
typically out of the bearer’s control in terms of selection (Morgan, O’Neill, and
Harré 1979).
In the absence of physical cues in text-based online interactions, nicknames
can be a rich source of information on how the online self is constructed in both
synchronous and asynchronous computer-mediated communication (CMC) en-
vironments. This chapter focuses on online nicknames as meaning contributions
that fall within the scope of pragmatic analysis. It is argued that applying Grice’s
Cooperative Principle to nicknames helps to account for the communicative efforts
made through the mini-propositions included in them. The findings of an analysis
of two online nickname corpora and online participants’ postings on the construc-
tion, use, and meaning of nicknames show that online nicknames can reflect truth-
ful information, can be made relevant and informative in respect to the topic of dis-
cussions, and can challenge matters of perspicuity, depending on participants’ per-
spectives.

2. Background

2.1. Literature review


Research has found that participants use online nicknames to present aspects of
their identity such as gender, race, ethnicity, physical attributes, interests, and af-
filiations in a variety of online settings, such as chat (Bays 1998; Bechar-Israeli
1995; Byrne 1994; Campbell 2004; Rodino 1997; Subrahmanyam, Greenfield, and
Tynes 2004; Tingstad 2003; Tynes, Reynolds, and Greenfield 2004), discussion
forums (Pagnucci and Mauriello 1999; Stommel 2007), and multi-user object-
oriented environments, or MOOs (Jacobson 1996, 1999; Sundén 2002). Studies

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
438 Loukia Lindholm

have also shown that individuals form impressions of others in cyberspace based
on what nicknames convey (Byrne 1994; Chester and Gwynne 1998; Jacobson
1999).
While private CMC is usually not anonymous, most multiparticipant, public
CMC allows users the possibility to play with their identity by using online nick-
names as textual “carnival masks” (Bechar-Israeli 1995; Danet, Ruedenberg-
Wright, and Rosenbaum-Tamari 1997; Danet 2001; Ruedenberg, Danet and Rosen-
baum-Tamari 1995). In a study of Internet Relay Chat (IRC) nicknames, Bechar-
Israeli (1995) developed a nickname typology that includes seven categories under
which nicknames may be classified: a) real names; b) self-related names; c) names
related to flora, fauna, and objects; d) medium, technologies, and their nature; e)
plays on words or sounds; f) famous people, figures in literature, films, fairytales;
and g) sex and provocation. That study showed that 45 % of participants used self-
related online nicknames, while only 7 % used their real (full or partial) name. Be-
char-Israeli (1995) notes that online communicators may use nicknames not only
to hide their real identity, but also to mask an already established online persona for
the purposes of playful interaction.2
Online users can also draw attention to or divert attention away from their on-
line selves by highlighting or concealing specific aspects of their identity. Subrah-
manyam, Greenfield, and Tynes (2004: 663) found that gender-transparent online
names with sexual connotations were often used in teen chatrooms as “a means of
intimate pairing off with a peer”. In a similar vein, Deul (1996: 133) argues that
participants in text-based virtual worlds use sexually suggestive online names to
encourage potential partners. Conversely, female participants may change their
nicknames and even construct a male persona to avoid receiving unwanted male at-
tention in online interactions (Bruckman 1993; Herring 1999; Kelly, Pomerantz,
and Currie 2006). From this perspective, the role of online nicknames has been ex-
tensively discussed regarding a specific aspect of online identity, gender construc-
tion and performance. Jaffe et al. (1995) found that women are more likely than
men to select nicknames that mask their gender; the authors argued that this is due
to the “implicit social pressure that women feel when interacting in mixed-gender
situations”. This claim is further supported by Pagnucci and Mauriello’s (1999) re-
search in a peer-response discussion forum on student papers, which showed that
female participants selected male nicknames to generate positive responses and
gain credibility in their statements.
In certain online communities, however, participants are expected or even
required to make gender salient through their nicknames. For instance, Hall (1996)
discusses the case of a women-only online discussion group where the use of fe-
male nicknames is demanded as part of a “female-gendered netiquette”. Camp-
bell’s (2004) observations and interviews with participants in gay male IRC chan-
nels revealed a preference for online names that explicitly or implicitly denote a
(gay) male identity. Campbell suggests that this preference reflects the presump-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 439

tion of a gay identity on these channels. Also, it has been shown that women may
use online nicknames that challenge hegemonic perceptions of femininity as vul-
nerable and passive. Kennedy’s (2006) study of female online gamers and their
play practices in a multi-player combat game showed that, in this context, women
select online names that convey empowerment.
Gender references in nicknames are not the only kind of information about the
self that can affect online interaction. Tingstad (2003) found that, apart from
gender, technology-related and popular culture nicknames were most likely to
spark interaction among participants in a children’s chat room. Tynes, Reynolds,
and Greenfield (2004) reported that racial references in online nicknames in a teen
chat room influenced how participants were treated and gave rise to conflict. In
other cases, nicknames may affect interaction in more subtle ways. In a study of
nicknames on an Internet site for people with eating disorders, Stommel (2007)
found that nicknames reflected personal attributes related to femininity and eating
disorders. Stommel’s study suggests that nicknames that allude to the theme of the
forum may influence how participants interact.
Nickname instability is another issue that has been addressed, particularly in
connection with the problem of virtual community presence (Kendall 2002; Liu
1999). The potential malleability of online identities, the argument goes, makes it
difficult for users to keep track of online participation. However, most users do not
change their online nicknames readily, but rather tend to maintain them to ensure
consistency in their online self-presentation (Bechar-Israeli 1995; Mann and Stew-
art 2000; Reid 1991; Rheingold 2000). Unlike offline nicknames, which may be
shared by more than one person, an online nickname must be unique for each user
within a given environment at any given time. Maintaining an online nickname is
so important in a virtual environment that users can become quite possessive over
their nicknames in order to protect their online persona and reputation (Campbell
2004; Curtis 1992).
Moreover, participants in online interactions do not always exploit the possi-
bility of remaining anonymous by changing or selecting nicknames that are differ-
ent from their true identity (Bechar-Israeli 1995; Bruckman 2006). On the contrary,
studies have shown that online self-disclosure is common in CMC environments
such as blogs (Herring et al. 2006; Huffaker and Calvert 2005), newsgroups
(McKenna, Green, and Gleason 2002; Parks 1996), and MOOs (Jacobson 1996). A
plausible explanation for this practice is that online self-presentation is an exten-
sion of the real self in a different social environment (Giese 1998). Wallace (1999:
150–151) points out that self-disclosure is important in establishing rapport and
developing close relationships within online communities.
Online nicknames have also been examined as a strategy for interaction man-
agement in computer-mediated discourse (CMD). Nicknames function as address-
ivity markers that facilitate continuity (Rintel, Mulholland, and Pittam 2001;
Werry 1996) and cross-turn coherence in online interactions (Panyametheekul and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
440 Loukia Lindholm

Herring 2003; Simpson 2005). Jacobson (1996: 469) also found that nicknames in
a MOO environment were used as contextualization cues to distinguish between
online and offline contexts; participants used MOO names to evoke the world of
virtual make-believe but switched to real names when they wished to signal a shift
to the “real”, offline world.

2.2. The Cooperative Principle and the maxims of conversation


Communication is a process in which participants negotiate meaning in a given
situation or context. Grice (1975) proposed that participants follow a general prin-
ciple of cooperation in the negotiation of meaning in order to achieve a common
communicative goal. Grice labeled this principle the Cooperative Principle (CP)
and formulated it as follows: “Make your conversational contribution such as is
required, at the stage at which it occurs, by the accepted direction or purpose of the
talk exchange in which you are in engaged” (1975: 45). Grice distinguished four
sub-principles or maxims that participants are expected to follow when communi-
cating:
1. Maxim of Quality: participants’ contributions should be truthful
2. Maxim of Quantity: participants should not give more or less information than
is required
3. Maxim of Relation: contributions should be relevant
4. Maxim of Manner: contributions should be clear, brief, and orderly
Adherence to the maxims of conversation allows for successful communi-
cation. However, participants in talk exchanges do not always follow the maxims;
they may violate, flout, or opt out of a maxim (Grice 1975: 47–49). When a speaker
flouts a maxim, the speaker’s utterance conveys an implied meaning or conver-
sational implicature in addition to its literal meaning. A hearer works out a con-
versational implicature by taking into account the literal meaning of an utterance,
the contextual factors of the communicative event, and the Cooperative Prin-
ciple along with its maxims (Brown and Yule 1988: 33). Grice (1975: 48) sug-
gested that the maxims are potentially applicable to other social actions than just
talk exchanges and acknowledged the existence of other maxims such as polite-
ness. Grice’s principle has been criticized on several points, including its claim to
universality (Wierzbicka 2003), its vagueness, and its prescriptive nature (Horn
2004; Thomas 1995), as well as the potentially infinite number of maxims that it
generates (Sperber and Wilson 1995). For a relevance-based view of pragmatic in-
ference, see Sperber and Wilson (1995, 2004).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 441

2.3. Nicknames and the maxims of conversation


Grice developed the Cooperative Principle in view of interactional exchanges.
Names and naming practices have therefore not been explored in terms of the Co-
operative Principle, due to their particular referential function (cf. Lyons 1977:
215–223). Much of the study of online nicknames can be characterized as onom-
astic, i.e., belonging to the study of names. Yet, as mentioned above, online nick-
names contribute to the efficient cooperative use of language, for instance, through
identity construction, addressivity, and co-construction of coherence. Upon enter-
ing the online world, users need a nickname to present themselves and to be able to
interact with others. In addition to this default situation, participants’ comments
and reactions show that nicknames are used to construct online personae individ-
ually and jointly. In this sense, nickname practices (i.e., composing, using, and dis-
cussing them) can be regarded as cooperative efforts that assign nicknames more
than a mere referential function. The communicative contributions of online nick-
names include self-presentation, negotiation of in-group identity, and triggering in-
teraction – all central communicative goals in the online world. This suggests that
the maxims of conversation can be applied to the study of online nicknames in
order to account for their pragmatic functions. Online nicknames can be viewed as
propositional in content, or as mini-propositions, for example, “I am [nick]”, “I
have [nick]”, or “I like [nick]”.

3. Illustrative case

3.1. Data
For illustration purposes, two online forums were analyzed: Parent.com and
Photo.com, both featuring publicly-available asynchronous message board discus-
sions.3 The data consist of a corpus of 550 nicknames from each forum, as well as
a collection of discussions in which users explicate and comment on their own
and other users’ online nicknames. Specifically, 24 discussions comprising 392
posted messages were collected from Parent.com, and two discussions comprising
641 messages were collected from Photo.com. The posted messages, or posts, were
retrieved by using the search tool provided in the message boards to find discussion
threads that contained the keywords nickname, screen name, username, or member
name in their titles. The data from Parent.com and Photo.com were collected in
2004 to 2005 and in 2007, respectively, with the researcher acting as a non-partici-
pant observer.
Parent.com is an American-based parenting support forum that is addressed
primarily to mothers and expecting mothers. The forum is profiled as a mom-to-
mom community where members can offer support and advice to each other on
parenting matters. Clusters of message boards generating thousands of messages

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
442 Loukia Lindholm

focus on parenting topics such as large families, working and stay-at-home


mothers, expecting parents, home schooling, and discipline issues. Photo.com is a
non-affiliated international discussion forum devoted to amateur and professional
photographers who wish to share their interests and experiences in photography.
This online environment features numerous message boards with thousands of
messages on topics such as equipment, techniques, lighting, composition, and
product reviews.
In both forums, online nicknames are part of a rich ensemble of identity
markers that include pictures, customized banners, elaborate signatures, and user
profiles. These identity markers, the participants’ discourse about the nicknames,
and the author’s observation of the communities helped to disambiguate and inter-
pret the online nicknames in the corpus, as well as shedding explanatory light on
the online naming practices within the two communities.

3.2. Methodology
This study combines a quantitative analysis of the online nicknames in terms of
their information content with a qualitative analysis of users’ comments on nick-
name meaning and construction.
The nicknames from the two forums were first analyzed quantitatively in terms
of their information content. Adapting Bechar-Israeli’s (1995) typology of IRC
nicknames,4 the nicknames were systematically classified based on their in-
formation content as follows:
1. Real names as nicknames
2. Self-related nicknames
3. Nicknames related to flora, fauna, objects, abstract entities
4. Nicknames related to medium, technology, and lack of identity
5. Nicknames related to figures in literature, films, fairytales, and famous people
6. Unclassifiable nicknames
The four Gricean maxims of conversation were adapted in terms of the nick-
names’ a) usage of apparent real name and/or personal information (quality); b) in-
formative content (quantity); c) relevance to the central, overarching theme of the
forum’s discussions (relevance); and d) clarity of content (manner). The online
nicknames were then coded according to the adapted maxims.
Subsequently, qualitative analysis was conducted of users’ comments on nick-
name meaning and construction. I considered how users discuss the meanings,
uses, and effects of the online nicknames in the two communities in order to gain
insight into what they think the norms of nickname construction in these commu-
nities should be.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 443

4. Online nicknames and the Gricean maxims

4.1. Quality
Following the maxim of quality, a nickname contribution should be one that is true
and not false, as otherwise the maxim is violated. The users in the forum data make
different claims about their identity through their nicknames, which reveal per-
sonal names, gender, affiliation, profession, physical attributes and other self-
related information, e.g., “imahockeymom”, “bikerchic”, “badgewife”, “Cool-
ToolGuy”, “brown_eyes”, “JackieS”, “photo_luver”. In fact, 77 % of the online
nicknames from the parenting forum and 64 % from the photography forum are
self-referential, that is, they pertain directly to the self, with the two most promi-
nent categories being self-related names (44 %, 28 %) and apparent real names
(33 %, 36 %), as Table 1 indicates. The latter category includes first names, (e.g.,
“kevin”), last names (e.g., “mills”), full names (e.g., “maggie_brown”), first names
and initials (e.g., “Mike_R”), and initials and last names (e.g., “j_minard”).

Table 1. Self-referential and non-self-referential nicknames in the two corpora

Parent.com Photo.com
Self-referential 423 (77 %) 352 (64 %)
Self-related 242 (44 %) 153 (28 %)
Real names 242 (44 %) 199 (36 %)
Non-self-referential 127 (23 %) 198 (36 %)

The predominance of self-related nicknames in the parenting corpus is consist-


ent with Bechar-Israeli’s (1995) findings. However, the use of real names as nick-
names – which is the largest subcategory in the photography forum and the second
largest in the parenting forum – is greater than in Bechar-Israeli’s (1995) study,
where the category of real names was only fifth. The prevalence of real names is
consistent with the findings of more recent research by Calvert et al. (2003), Her-
ring et al. (2006), and Stommel (2007) that shows a tendency towards the use of
real names in MUDs, blogs, and an online discussion forum, respectively.
Given the possibility of masking identity online, the question arises as to how
one can ascertain the truthfulness of users’ online nicknames. The observed com-
munities do not favor anonymity, and the members are often keen to provide as
much information as possible through online nicknames, profiles, elaborate signa-
tures, and, of course, posts.
Jacobson (1996: 469) observes that the use of real names in an online context
can show closeness and distinguish the real from the imaginary. Interestingly, how-
ever, users in the two forums seem to feel that they are uncreative and boring in
using their real names, as the examples5 below show:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
444 Loukia Lindholm

(1) From atober:


I guess I should’ve been more creative in the interest of anonymity??? My first
initial and last name.
(Parent5:25)
(2) From lauren1063:
Mine shows absolutely no imagination. My first name is Lauren and I was born
in October, 1963. Yawwwwwnnnn … Borrrrrrrrring.
(Parent5:3)
(3) From neil_r:
Mine is a true testament to lack of imagination, first name plus last name initial,
the underscore is just for style … :D
(Photo2:43)
(4) From AndyT:
I have to admit that I belong to the boring ‘it’s just my name’ fraction.
(Photo1:34)
Some other online participants choose to violate the quality maxim, as illustrated
below:
(5) From lostdoggy:
It is the opposite of who I am. Never lost and not a dog.
(Photo2:246)
The quality maxim is often exploited in nicknames for communicative pur-
poses. This includes online nicknames that use metaphors rather than literal de-
scriptions to present the user:
(6) From sild:
Sild is a fish, a herring to be exact. Herrings are sleek-looking fish, so some-
where along the line “sild” also became slang in Danish for a tall, slender leggy
“babe”. Since the net is *the* place for dissembling, I thought I would allow
myself this private joke and imagine that I was tall, and still slender, although
the legs are still OK. ;)
(Parent5:4)
(7) From Dirty Shirt:
Well my nickname with my buddies is dirty shirt. Usually, I spill a beverage or
some food on my shirt so hence the name.
(Photo2:103)
(8) From Jackal:
I’m sneaky with a camera.
(Photo2:62)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 445

(9) From wombat777:


Wombats are short, fat, bad-tempered and stuborn. Strong as oxes and smart as
rocks. They spend most of the day in bed only coming out of their warrens to
eat or mate. Their personal hygine leaves a lot to be desired and they are forever
stealing food. My wife thought it appropriate.
(Photo2:385)
In the parenting forum, certain users opt for metaphors in their nicknames that
refer to their children:
(10) From mom2dollnwreckinball:
I literally am a mom to a “doll” and a “wreckin’ ball” – so it was easy to choose.
Hannah has always been called doll baby and Kyle has always been the WB.
(Parent5:2)
(11) From sharis_emeralds:
Both my children were born in May (though neither was due in May LOL) and
May’s birthstone is emerald. My first name is Shari, so Shari’s_emeralds.
(Parent2:23)
Similar nicknames found in the parenting forum are “pumpkinangel”, “lilbutter-
bean”, “my6angels”, “mommato3cannolis”, “twopeasinapod”, and “buttons_n_
bows”. This kind of linguistic creativity, which is manifested in the use of meta-
phors and language play, foregrounds the poetic function of the nicknames. This
function is not unique to the online context, as Bertills (2003) shows in her study of
names in children’s literature. The metaphors that arise from the flouting of the
maxim of quality can be interpreted by reference to the maxim of relation, which is
discussed further below.

4.2. Quantity
The maxim of quantity as applied to nicknames states that they should be as in-
formative as is required for the purposes of the exchange. Apart from self-related
nicknames and real names as nicknames, the analysis of the two nickname corpora
shows that the remaining nicknames can be classified into four additional cat-
egories according to their information content (see Table 2).
Unclassifiable nicknames are those that were impossible to decipher. Such
nicknames are constructed from strings of letters and/or numbers that are obscure
in meaning, sometimes on purpose:
(12) From kwerksly:
I know we did this a while ago on the Expecting Board, but since that time lots
of new people have joined us, and I thought it mihgt be fun to do again. What
is the meaning behind your screen name? Or is there one? Mine has to remain
a bit cryptic, unfortunately, because it comes out of a password …
(Parent7:1)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
446 Loukia Lindholm

Table 2. Non-self-referential nicknames in the two corpora (percentages)

Nickname categories Parenting forum Photography forum


Nicknames related to flora, fauna, 54 (9.8 %) 88 (16.0 %)
objects, abstract entities
(e.g., “papayabanana”, “twocats”,
“nation”)
Nicknames related to figures in 36 (6.5 %) 87 (15.8 %)
literature, films, fairytales, and
famous people6 (e.g., “ukifune”,
“Agent99”, “snowwhite”)
Nicknames related to medium, 13 (2.4 %) 12 (2.2 %)
technology, and lack of identity
(e.g., “pc249”, “idaknow”)
Unclassifiable nicknames 24 (4.3 %) 11 (2.0 %)
(e.g., “6.58”, “lbmlbm”, “l9572”)
Total 127 198

Such nicknames can be informative to their bearers but uninformative to other


users. These nicknames thus violate the quantity maxim, and their function is re-
duced to a purely referential one. Obscure nicknames are discussed further in the
section on the manner maxim.
More generally, the question of what users convey through their nicknames is
probably better phrased as how informative an online nickname is to different on-
line participants. Information contained in an online nickname that is not com-
pletely obscure might still not be readily decipherable by some users, due to the
presence of abbreviations that they might not be familiar with. In this case, the
maxim of quantity is violated or observed depending on the users’ familiarity with
abbreviation practices within the community. Examples of such online nicknames
in the parenting forum are “newsahmama” and “bf-cd-cs-mom”. A user might miss
given information if the abbreviation sahm, which stands for ‘stay-at-home mom’,
is not understood. In the case of “bf-cd-cs-mom”, bf stands for ‘breastfeeding’, cd
for ‘cloth diapering’, and cs for ‘co-sleeping’. Similarly, photography novices and
curious newcomers to the photography forum might have difficulty interpreting
nicknames such as “kennys350d”, “Pete-eos”, and “35mm” that refer to camera
and lens models. These nicknames are as informative as required to those familiar
with the abbreviations, but not to others.
Users convey different kinds of information through their nicknames, such as
gender, religious beliefs, parenthood, and affiliations, placing themselves in differ-
ent categories. The information provided in the nicknames also reflects user
opinions and attitudes, underlining the nicknames’ expressive function. This is es-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 447

pecially the case in debate boards in the parenting community, where various is-
sues are intensely discussed. Many debate boards in this community operate on the
basis of dichotomies7 such as for vs. against vaccination parents, stay-at-home vs.
working mothers, and breast-feeding vs. formula-feeding mothers. In the context
of such debates, online nicknames that include some reference to any of these cat-
egories signal right away which group users belong to. Statements about the self in
online names can also cause negative reactions, as shown in example (13):
(13) From Radtech:
(…) there are some sig lines and even usernames I find offensive on a relig-
ious basis.
(Photo1:12)
This raises the question of whether, and if so, how, nicknames can be overin-
formative. Grice (1975: 46) comments that the notion of overinformativeness is
disputable, the only way to define it being with the help of the maxim of relation.
That is, it is only in a certain context that nicknames can be regarded as overin-
formative. In the case of online nicknames, that could be the overall multimodal
context if, for instance, nicknames, signature files, and avatars communicate the
same or overlapping information about a user. Apart from irrelevant information
included in the mini-proposition, users may also consider very long nicknames
overinformative (cf. manner).
Moreover, online nicknames that were sufficiently informative at one time may
not be considered so at a later time. This applies to nicknames that are changed be-
cause they no longer convey accurate (quality) and/or sufficient (quantity) in-
formation about the users and thus are regarded as underinformative and untruth-
ful. In the parenting forum, such changes of information content may occur in
nicknames that indicate parental identity:
(14) From milniks7:
Just wanted to let everyone know that I changed my name from sixfornow to
milniks7 … we obviously are no longer six for now.
(Parent14:1)
(15) From fivekdz4me:
Since I haven’t posted here in awhile first of all I changed my member name
from dragonand3pixies to the present one. I am SAHM to five wonderful kids.
(Parent15:1)
This practice is encouraged by other members of the parenting community, as il-
lustrated in a reply post to a user who has just found out she is pregnant:
(16) From rainbow:
Congratulations! You may have to consider changing your username. ;)
(Parent24:8)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
448 Loukia Lindholm

Yet, nickname contributions which are as informative as is required may


trigger negative responses. In the context of parenting discussions, the information
included in an online nickname can have an impact8 on community members, es-
pecially in discussions of sensitive matters, as shown in example (17).

(17) From i_vivian01:


Yet it’s also a little emotionally tough to read posts [by] someone with a
“mama” in her nickname and a beautiful child in her icon picture, saying that
IVF [‘in vitro fertilization’, LL] shouldn’t be covered, by people who haven’t
had the opportunity to have a child or the luxury to have that viewpoint (“Ivf
is for other people” is what I mean here).
(Parent6:36)

Participants in the parenting forum are well aware of the sensitivity of certain dis-
cussions and often show caution, for example, by selecting online nicknames that
do not express parental identity overtly or at all. This also appears to be a legit-
imate reason within the parenting community for having more than one nickname,
as is exemplified in the message below from a discussion where the issue of having
multiple nicknames was addressed:

(18) From mom2dollnwreckingball:


I was intending to use one [nickname] that did not have mom in the title for
the miscarriage support board.
(Parent5:1)

Thus, the decision about how much and what kind of information is appropriate to
include in an online nickname may depend not only on what users wish to com-
municate about themselves, but also on online social constraints.
While most forum participants are informative about their personal identity, es-
pecially their parental identity, in their nicknames, others choose to be informative
about other aspects of themselves:

(19) From blessed_tonia:


It’s a statement of who I am in Christ. I’m blessed. :)
(Parent3:5)

(20) From runninmann:


25 years running, over 300 races, 26 marathons, 18 states, 7 countries, 4 conti-
nents.
(Photo2:401)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 449

Another way in which nicknames can be informative is by indexing gender.


Following Stommel (2007), the purpose of analyzing gender in online nicknames
in this chapter is not to determine the participants’ real gender, but rather how they
construct gender identity through their online names. In the present analysis, nick-
names are categorized as male or female depending on a) the information given in
the nicknames in terms of personal names and self-description and b) gender-re-
lated information found in participants’ signatures and personal profiles. For
example, “Claire”, “virgogirl”, “queenbee”, and “evansmom” were classified as
female; “BradTO517”, “BIGGTUFFGUY”, “VegasGeorge”, and “daaaveman”
were classified as male. As shown in Table 3, in the corpus from the parenting
forum the overwhelming majority of nicknames were classified as female (99.8 %).
Only one nickname, “newman65”, was classified as male. In the photography
forum, in contrast, the majority of the nicknames were classified as male.

Table 3. Female, male, and gender indeterminate nicknames in the two corpora

Gender Parenting forum Photography forum


Female 549 (99.8 %) 55 (10 %)
Male 1 (0.2 %) 465 (84.5 %)
Indeterminate 0 (0 %) 30 (5.5 %)
Total 550 (100 %) 550 (100 %)

Online nicknames index gender through attributes that emphasize femininity


and masculinity. Women in these forums tend to opt for nicknames that emphasize
motherhood, femininity, sexuality, and even frailty, such as “snowwhite”, “Tundra-
Bunny”, “hotmommaria”, and “littlebird”. In the photography forum, many men
select nicknames that index masculinity, such as “muscleflex”, “BIGTUFFGUY”,
“NordieBoy”, and “Tiger1”.

4.3. Relation
Grice (1975: 46) observed that it can be difficult to apply the maxim of relation or
relevance due to the different foci of relevance that occur in the course of an inter-
action. In view of the shifting topics of online exchanges, the maxim of relation is
also the least straightforward to apply to nicknames, which remain static after their
first appearance in the interaction. In this section, the relevance of an online nick-
name is considered in relation to the topic of the group as a whole: It is assumed
that the nicknames in the data should relate to parenting or photography.
Since the central theme of the discussions in the mother support forum is par-
enting, the users who align their online nicknames to this overarching topic
broadly observe the maxim of relation. In the corpus, 34 % of the nicknames are
explicitly related to the parenting theme of the site. These nicknames are found

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
450 Loukia Lindholm

mostly in the first three categories of the nickname typology (Table 2) and make
reference to the parental role through self-description and/or reference to children,
e.g., “momof2petite_filles”, “handymom”, and “my3girls”. In the photography
forum, 9 % of the nicknames are photography related. These nicknames, which are
found in the second, third, and fourth categories of the typology, are self-descrip-
tive or refer to objects and concepts related to photography, e.g., “EoSD30fReAk”,
“KO_300D”, and “35mm”.
Apart from the global adherence to relevance, certain online nicknames in
the two forums seem to reflect local topics: For example, nicknames that were
collected from discussion boards addressing topics about large families emphasize
the number of children, e.g., “mommyoftwinstwice”, “peanutmomof4”, “thekid-
farmx6”, “geminimamato4”, and “momto6qts”. Similarly, some nicknames col-
lected from discussion boards on macro photography reflect this particular interest,
e.g., “macroshooter”, “macrojunkie”, and “snapmacro”. This raises the question of
whether users change their nicknames depending on the topic they contribute to.
No evidence was found to suggest change of nicknames to make them locally rel-
evant. This may be attributed to nickname stability, which is highly valued in the
observed communities in order to ensure continuity and promote trust. As illus-
trated in the previous section, however, participants in the mother support forum
may change their nicknames locally to participate in discussion boards that deal
with sensitive issues or globally to indicate a new addition to the family.
As Levinson (1983: 111) observes, it is difficult to interpret something as irrel-
evant. Interactants always try to find relations between what is stated and what is
implied or might be implied (but cf. Herring, this volume). The central theme of
the two communities prompts users to interpret each other’s online nicknames as
group-relevant. If an online nickname is not explicitly related to parenting or
photography, users do not assume it is irrelevant, but rather attempt to infer its
meaningful relation to the topic of the forum:
(21) From susannahk:
To snifflesally:
After all, I’m going to leap to the conclusion that your family is prone to colds
and that’s how you chose your username.
(Parent8:55)
Indeed, unless users specify the irrelevance of their online nicknames to par-
enting or photography, all nicknames are subject to be interpreted as relevant to the
forum topic. There are users within the two communities who do not opt for par-
enthood or photography-related nicknames and state it clearly in their posts on dis-
cussions about nicknames:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 451

(22) From CordyRoy:


CordyRoY= Corduroy = My Fave Pearl Jam song. Absolutely nothing to do
with babies, just a screename I’ve been using for years!
(Parent8:12)
(23) From taking-baby-steps:
My user name has nothing to do with my baby walking. I am very much a
planner, and analyze everything before I actually go ahead with my plan; thus,
“taking baby steps”.
(Parent11:14)
(24) From bluelens:
While mine sounds like it came from photography it didn’t. Several years ago
(I guess about 8 now) I wanted a pair of perscription sunglasses. Not congtent
with the regular shaded sunglasses I asked for them to coat the lenses so that
they were blue (…)
(Photo1:4)

Moreover, some users explicitly react against group-relevance in naming conven-


tions:
(25) From amd14:
I like that it’s me and not anything about who’s wife or mommy I am. I do find
it interesting how many women on these boards identify themselves by their
relationships. When coming up with a member name it just never crossed my
mind to use a mom2 or j’swife name. I think it comes from the same place that
ahs led to al our household bills being in my name alone.
(Parent11:40)
As can be seen in the example above and previously in (17), the practice of re-
lating an online nickname to the parenting theme of the discussions can generate
criticism. Similarly, members of the photography forum express conflicting views
regarding the selection of photography-related nicknames. Certain members seem
to perceive adherence to the theme of the forum as pretentiousness or an indication
that one is a forum junkie, while others find it appropriate:
(26) From CoolToolGuy:
I have a side thing selling automotive tools, mostly for Porsche and Volk-
swagen. Not ratchets and screwdrivers, but the ‘cool’ tools that do a specific
job. I’m not much of a forum junkie, so I didn’t think of coming up with a
photo name when I got on here (…)
(Photo2:21)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
452 Loukia Lindholm

(27) From Photosguy:


No biggie with mine. I’d used it in another forum years ago & it was easy to re-
member. It seems pretentious here, but I only have so many brain cells left (…)
(Photo2:71)
(28) 35mm:
Couldn’t think of anything that was ‘non descript’ so I just picked this:)
(Photo2:359)
In addition, some nicknames are not readily interpretable as photography-
related unless the users explicate their meaning, thereby explicitly claiming
relevance, as shown in (29):
(29) From Musictomyeyes:
I wanted to join a really good photography forum, and finally found one …
and was wanting something photo related in the name. All the obvious ones I
could think of were gone … lack of imagination perhaps??
So took a different tack – what does a photo do for me? Well, it’s like music to
my … eyes (…)
(Photo2:158)
The users of unclassifiable nicknames opt out from the maxim of relation. The
opacity of their meaning does not allow any assumptions regarding their relevance
or irrelevance to the central theme of the forums.

4.4. Manner
Questions of brevity, clarity, and (lack of) ambiguity are particularly important in
the case of online nicknames, because they affect nickname interpretation. The
maxim of manner bears on how an online nickname is made up to convey what it
says. In the data, the nicknames range from simple one-word constructions such as
“sild”, “dana0”, and “duder” to longer and more complex nicknames, such as “BIG-
TUFFGUY”, “CorruptedPhotographer”, “momsurroundedbyboys”, “happyand-
joyfulmom”, and “chase_is_my_sonshine”. Users who opt for phrasal and clausal
constructions in their online nicknames presumably do so for a reason, such as to
provide more information, which discloses a connection between the manner and
the quantity maxims. The following post shows a user providing reasons for
breaching the submaxim of brevity:
(30) From montessorimommysoon:
montessorimommysoon
Long, I know. I teach at a Montessori school (middle school) and I love the
family sensibility that it fosters. So “montessori” … and I can’t wait to be a
“mommy soon”!!
(Parent1:28)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 453

Play with non-standard spelling in nicknames, which has its origins in the prac-
tices of hackers (Bechar-Israeli 1995; Danet 2001: 27), is related to the submaxim of
clarity. Some users in the two discussion forums manipulate spelling in their nick-
names, as in “Grampaw”, “photo_luver”, “whyzzerd”, “cutemom4u”, “mom2kay-
lantristan”, “luvmyboys”, “m_a_r_i_n_a”, and “cambriagurl”. However, non-
standard spelling is found in only 7 % of the nicknames in each forum. The major-
ity of the users do not resort to any language play in constructing their nickname, a
result that resonates with the findings of Bechar-Israeli’s study of IRC nicknames.
Users sometimes provide explanations for non-standard spellings, as shown in the
examples below:
(31) From pumptin:
When dd [‘dear daughter’, LL] was little she couldn’t say pumpkin, she said
pumptin, and we thought it was the cutest thing ever!
(Parent11:9)
(32) From baldylox:
well im fairly bald, have been so for over 10yrs. one of my female friends
thought my chrome dome was sexy as hell and a buddy said since i couldnt
possible have nice locks of hair might as well call me “baldy locks of no hair”
Well it got shortened and changed the spelly for style :D
(Photo2:362)
(33) From karfeef:
Car+Theif. a common misconception about those, who like myself, reside in
Liverpool UK =)
(Photo1:57)

As a metaphor, “pumptin” itself could be argued to flout the maxim of manner


(in addition to quality). Clarity is valued in one’s own and others’ nicknames as
well, as the following comments from discussions about community member
names indicate:
(34) From wyomama:
Mine is pretty easy … I live in Wyoming and am a mom to two girls. I wanted
something short and simple.
(Parent2:10)
(35) From momolots:
Hi there, my nic is simple … it’s momolots, and I am a mom of lots … simple,
and the best part is that no matter how many kids we have, I’ll never have to
change it.
(Parent8:4)

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
454 Loukia Lindholm

(36) From cl-trainsarus:


To mothertoboys3:
Yours was nice and easy to figure out too, maybe I should have gone with an
easy one like yours. ;)
(Parent10:15)
However, what users regard as obvious and straightforward information in
their own nicknames might not be so clear for others who are unfamiliar with the
naming practices of the respective communities:
(37) From Gr8outdrsmn:
Mine is pretty simple, but for some reason some people have a hard time fi-
guring out the meaning. Gr8outdrsmn = Great Out Doorsman
(Photo2:455)
(38) From savcal:
Mine is pretty obvious … my kids are Savannah and Callahan.
(Parent10:3)
(39) From mom2jejb:
Mine is pretty straight forward …
MOM2JEJB mom 2 (instead of the word to) and jej stands for my kids names
(Jared, Ethan, Justin) and the b originally stood for “baby” (I’m due with 4th
May 1st) but now I also am probably naming the baby with the first letter “B”
in memory of my father who just passed away.
(Parent1:21)
Some nicknames, such as “abc 123”, “i24601”, “DOF”, and “wahm32”, appear
to violate the submaxim of obscurity. It was noted above that a nickname’s viol-
ation or observance of a maxim depends upon the perspective of the users. New
users may find the interpretation of some nicknames that use abbreviations in their
construction a daunting task. To them, such nicknames appear obscure and cryptic.
However, regular users who are familiar with the abbreviation norms of the two
communities and inside-group practices may find such nicknames clear and mean-
ingful: For example, DOF stands for ‘depth of field’, the distance range in which
the objects appear to be in focus in a photograph; wahm stands for a ‘work-at-home
mom’. Other nicknames, such as “boxbrownie”, may flout the submaxim of ambi-
guity. This nickname can have many different meanings: a box with chocolate
cake, a camera type, an elf, or a girl scout.
Abbreviations are presumably used for reasons of efficiency; some nicknames
would be considerably longer if not for the use of abbreviated terms. At the same
time, parenting-specific and photography-specific abbreviations such as sahm
‘stay-at-home mom’, bf-mom ‘breastfeeding mom’, sooc ‘straight out of camera’,
or bif 9 ‘bird-in-flight’ are the result of long-term socialization in discussions about

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 455

parenting or photography that gave rise to the use of a distinctive vocabulary. Users
transfer elements from this vocabulary to the construction of their nicknames as a
convenient way to say something about who they are. The use of these abbrevi-
ations also demonstrates knowledge of the abbreviation norms of the community,
which can indicate in-group identity.

5. Discussion

The point of departure of this chapter is that online nicknames constitute communi-
cative efforts that can be analyzed in the light of Grice’s Cooperative Principle.
Users treat them as mini-propositions and disclose the existence of shared maxims
of online nicknames. The online nicknames observed in the communities in the
case study were found to orient to all four Gricean maxims to some extent. In terms
of the quality maxim, participants appeared to find truthfulness and nickname sta-
bility important. A possible interpretation of this observation is that a stable and
truthful identity helps to maintain social relationships online. However, as shown
above, nickname changes in the mother-support forum seem to be acceptable under
certain circumstances, e.g., participation in discussions on sensitive topics or a new
addition to the family. In view of the maxim of quantity, participants seem to pro-
vide the amount of information about themselves they think is necessary, which
may include gender, interests, number of children, or photography equipment.
Gender referencing is a crucial component of many online nicknames, manifested
through stereotypical self-descriptions associated with masculinity and femininity.
The informativeness of a nickname may be subject to change if participants feel the
need to adjust the mini-proposition to the particular context.
Regarding the maxim of relation, participants in the mother-support forum
often observed relevance in their selection of topic-related nicknames to showcase
their parental identity. The fact that parenthood is such a central locus of identity
can account for this tendency. In the photography forum, however, photography-
related nicknames are not the preferred choice. With respect to the maxim of
manner, whether or not users succeed in interpreting each other’s nicknames dep-
ends on several factors, including familiarity with abbreviation norms and prac-
tices within the particular community.
The application of the maxims to the propositional content of online nicknames
is not unproblematic, however. Despite the high value placed on sincerity among
members in the two forums, there is always the possibility of users manipulating
their identity. Thus, one cannot be sure whether or not participants observe the
maxim of quality in their nicknames. The maxim of quantity raises the issue of
what is as informative as required and by whom, since participants in different for-
ums may value informativeness differently. Further, the maxim of relation is hard
to apply because nicknames can be regarded as static in interaction. Nonetheless,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
456 Loukia Lindholm

nicknames have been shown to vary according to context when users are con-
fronted with sensitive topics. Moreover, participants readily interpret nicknames as
relevant, even when the nicknames themselves do not support such an interpre-
tation. As for the manner maxim, some nicknames remain cryptic unless their bear-
ers explicate them, and what is clear depends on the individual participants’ back-
ground knowledge.
The main insight provided by this case study is that online nicknames have
more than a mere referential function for self-presentation purposes. They can also
have an expressive function, conveying attitudes, feelings, and values; and a poetic
function, revealing a world of imagination and playfulness in the use of metaphors
and language play. Previous studies have singled out the discursive function of
nicknames, identifying ways in which they create coherence in the context in
which they are used. Online nicknames can also be a means of persuasion and a
claim to in-group membership, for example, when users reference a shared inter-
est, such as parenting, or a hobby, such as photography. The mini-propositions in-
cluded in nicknames spark interaction and serve to establish credentials for what
their bearers are saying.

6. Concluding remarks

This chapter investigated the extent to which conversational maxims can be ap-
plied to online nicknames, proposing that nicknames can be seen as mini-proposi-
tions that constitute cooperative efforts. An analysis of online nicknames and par-
ticipants’ comments on two online forums was carried out, concentrating on how
users negotiate meaning through online nicknames and orient to the maxims
through the mini-propositions included in them. The findings show that partici-
pants in the two forums opt for the use of apparently real names, broadly observe
relevance, provide information that they think is necessary to communicate about
themselves, and value clarity in their online names.
The limitations of this study include the fact that only two online forums were
examined. Earlier studies have found that communities can be idiosyncratic as re-
gards their nicknaming conventions. The two forums examined here manifest dif-
ferent conventions related to their topics and populations of users. Comparisons
with the nicknaming practices of other online communities are needed to account
for nickname construction and use. Future work might usefully explore nicknames
in conjunction with signature files and avatars. In a broader context, the study of
online nicknames is an important part of online ethnography. Users value nick-
names as interactional contributions far beyond the ritual act of selecting one. For,
to paraphrase the Roman proverb, sine nomine persona virtualis non est.10

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 457

Acknowledgements

I wish to thank the editors and the reviewers for their comments and suggestions. I
am also grateful to Urpo Nikanne and Brita Wårvik for discussion and comments
on an earlier version.

Notes

1. Other terms for online nicknames include pseudonyms, screen names, handles, user-
names, and member names. In this chapter, the term online nickname is used and is de-
fined as a name that a user selects for purposes of online interaction.
2. Bechar-Israeli (1995) gives an example of a nickname game in an IRC discussion on
horses. During the discussion, users changed their nicknames to animal names and
simulated animal noises before switching back to their original nicknames.
3. The names of the two forums have been changed to protect the privacy of the users
whose online names are analyzed. Any similarities to other online forums are uninten-
tional.
4. Language play is not included as a category in the adaptation of the typology but is dis-
cussed separately in the section on manner.
5. The posted messages are reproduced as they appear in the message board discussions.
For the purposes of the present study, only the relevant parts of the posting contributions
are cited in the examples. Each post is coded according to forum of origin, number of
discussion thread in the corpus, and number of post within the thread, e.g., Parent5:20.
6. “Ukifune” is a figure in the novel The Tale of Genji, “Snow White” is a female character
in the fairy tale “Snow White and the Seven Dwarfs”, and “Agent99” is a female char-
acter from the American TV series “Get Smart”.
7. Some boards make this explicit in the wording of the boards’ topics. In other cases, such
dichotomies emerge in the course of a discussion.
8. No similar cases were found in the photography group.
9. Although bif is used primarily to refer to bird-in-flight photography, some participants
use it to indicate photographs of bees in flight.
10. The original Roman legal proverb goes: Sine nomine persona non est (‘no name, no per-
son’). The author’s paraphrase is as follows: ‘No name, no virtual person’.

References

Bays, Hillary
1998 Framing and face in Internet exchanges: A socio-cognitive approach. Linguis-
tik Online 1(1). http://www.linguistik-online.de/bays.htm
Bechar-Israeli, Haya
1995 From <Bonehead> to <cLoNehEAd>: Nicknames, play, and identity on Inter-
net Relay Chat. Journal of Computer-Mediated Communication 1(2).
http://jcmc.indiana.edu/vol1/issue2/bechar.html

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
458 Loukia Lindholm

Bertills, Yvonne
2003 Beyond identification: Proper names in children’s literature. Ph.D. disser-
tation, Department of Finnish Language, Åbo Akademi University, Finland.
Brown, Gillian and George Yule
1988 Discourse Analysis. Cambridge, UK: Cambridge University Press.
Bruckman, Amy S.
1993 Gender swapping on the Internet. In: Proceedings of INET93.
http://www.cc.gatech.edu/elc/papers/bruckman/gender-swap ping-bruckman.pdf
Bruckman, Amy S.
2006 Teaching students to study online communities ethically. Journal of In-
formation Ethics 15(2): 82–98.
Byrne, Elizabeth
1994 Cyberfusion: The formation of Internet relationships on Internet Relay Chat.
Ph.D. dissertation, Faculty of Humanities and Social Sciences, University of
Western Sydney. http://irchelp.org/irchelp/communication-research/academ ic/
byrne-e-cyberfusion-1993/thesis1.html
Calvert, Sandra L., Brian A. Mahler, Sean M. Zehnder, Abby Jenkins, and Mickey S. Lee
2003 Gender differences in preadolescent children’s online interactions: Symbolic
modes of self-presentation and self-expression. Journal of Applied Develop-
mental Psychology 24(6): 627–644.
Campbell, John E.
2004 Getting it on Online: Cyberspace, Gay Male Sexuality, and Embodied Identity.
New York: Haworth.
Chester, Andrea and Gwynne Gillian
1998 Online teaching: Encouraging collaboration through anonymity. Journal of
Computer-Mediated Communication 4(2).
http://jcmc.indiana.edu/vol4/issue2/chester.html
Crystal, David
2001 Language and the Internet. Cambridge, UK: Cambridge University Press.
Curtis, Pavel
1992 MUDding: Social phenomena in text-based virtual realities. In: Proceedings of
the 1992 Conference on Directions and Implications of Advanced Computing.
ftp://ftp.lambda.moo.mud.org/pub/MOO/papers//DIAC92.txt
Danet, Brenda, Lucia Ruedenberg-Wright, and Yehudit Rosenbaum-Tamari
1997 “Hmmm … Where’s that smoke coming from?” Writing, play and perform-
ance on Internet Relay Chat. Journal of Computer-Mediated Communication
2(4). http://jcmc.indiana.edu/vol2/issue4/danet.html
Danet, Brenda
2001 Cyberpl@y: Communicating Online. Oxford: Berg.
Deul, Nancy
1996 Our passionate response to virtual reality. In: Susan C. Herring (ed.), Com-
puter-Mediated Communication: Linguistic, Social, and Cross-Cultural Per-
spectives, 127–146. Amsterdam/Philadelphia: John Benjamins.
Giese, Mark
1998 Self without body: Textual self-presentation in an electronic community. First
Monday 3(4). http://www.firstmonday.org/issues/issue3_4/giese/

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 459

Goffman, Erving
1959 The Presentation of Self in Everyday Life. New York: Doubleday.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 41–58. New York: Academic Press.
Hall, Kira
1996 Cyberfeminism. In: Susan C. Herring (ed.), Computer-Mediated Communi-
cation: Linguistic, Social, and Cross-Cultural Perspectives, 147–170. Amster-
dam/Philadelphia: John Benjamins.
Herring, Susan C.
1999 The rhetorical dynamics of gender harassment on-line. The Information So-
ciety 15(3): 151–167.
Herring, Susan C., Lois A. Scheidt, Inna Kouper, and Elijah Wright
2006 A longitudinal content analysis of weblogs: 2003–2004. In: Mark Tremayne
(ed.), Blogging, Citizenship, and the Future of Media, 3–20. London: Rout-
ledge.
Horn, Lawrence R.
2004 Implicature. In: Lawrence R. Horn and Gregory L. Ward (eds.), The Handbook
of Pragmatics, 3–28. Oxford, UK: Blackwell.
Huffaker, David A. and Sandra L. Calvert
2005 Gender, identity, and language use in teenage blogs. Journal of Computer-
Mediated Communication 10(2), article 1.
http://jcmc.indiana.edu/vol10/issue2/huffaker.html
Jacobson, David
1996 Contexts and cues in cyberspace: The pragmatics of naming in text-based vir-
tual realities. Journal of Anthropological Research 52(4): 461–479.
Jacobson, David
1999 Impression formation in cyberspace: Online expectations and offline ex-
periences in text-based virtual communities. Journal of Computer-Mediated
Communication 5(1). http://jcmc.indiana.edu/vol5/issue1/jacobson.html
Jaffe, Michael J., Young-Eum Lee, Li-Ning Huang, and Hayg Oshagan
1995 Gender, pseudonyms, and CMC: Masking identities and baring souls. Paper
presented to the annual conference of the International Communication As-
sociation, Albuquerque, New Mexico.
http://research.haifa.ac.il/~jmjaffe/genderpseudocmc/
Kelly, Deirdre M., Shauna Pomerantz, and Dawn H. Currie
2006 “No boundaries”? Girls’ interactive, online learning about femininities. Youth
& Society 38(1): 3–28.
Kendall, Lori
2002 Hanging Out in the Virtual Pub: Masculinities and Relationships Online. Ber-
keley, CA: University of California Press.
Kennedy, Helen
2006 Illegitimate, monstrous and out there: Female Quake players and inappropriate
pleasures. In: Joanne Harlows and Rachel Moseley (eds.), Feminism in Popu-
lar Culture, 183–201. London: Berg.
Levinson, Stephen C.
1983 Pragmatics. Cambridge, UK: Cambridge University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
460 Loukia Lindholm

Liu Geoffrey Z.
1999 Virtual community presence in Internet Relay Chatting. Journal of Computer-
Mediated Communication 5(1). http://jcmc.indiana.edu/vol5/issue1/liu.html
Lyons, John
1977 Semantics, Vol. I. Cambridge, UK: Cambridge University Press.
McKenna, Katelyn Y.A., Amie S. Green, and Marci E. J. Gleason
2002 Relationship formation on the Internet: What’s the big attraction? Journal of
Social Issues 58(1): 9–31.
Mann, Chris and Fiona Stewart
2000 Internet Communication and Qualitative Research: A Handbook for Research-
ing Online. London: Sage.
Morgan, Jane, Christopher O’Neill, and Rom Harré
1979 Nicknames, their Origins and Social Consequences. London: Routledge and
Kegan Paul.
Pagnucci, Gian S. and Nicholas Mauriello
1999 The masquerade: Gender, identity, and writing for the web. Computers and
Composition 16(1): 141–151.
Panyametheekul, Siriporn and Susan C. Herring
2003 Gender and turn allocation in a Thai chat room. Journal of Computer-Mediated
Communication 9(1). http://jcmc.indiana.edu/vol9/issue1/panya_herring.html
Parks, Malcolm R.
1996 Making friends in cyberspace. Journal of Computer-Mediated Communication
1(4). http://jcmc.indiana.edu/vol1/issue4/parks.html
Reid, Elizabeth M.
1991 Electropolis: Communication and community on Internet Relay Chat. Honours
thesis, Department of History, University of Mebourne.
http://www.irchelp.org/irchelp/misc/electropolis.html
Rheingold, Howard
2000 The Virtual Community: Homesteading on the Electronic Frontier. Cambridge,
MA: Massachusetts Institute of Technology Press.
Rintel, Sean E., Joan Mulholland, and Jeffery Pittam
2001 First things first: Internet Relay Chat openings. Journal of Computer-Mediated
Communication 6(3). http://jcmc.indiana.edu/vol6/issue3/rintel.html
Rodino, Michelle
1997 Breaking out of binaries: Reconceptualizing gender and its relationship to lan-
guage in computer-mediated communication. Journal of Computer-Mediated
Communication 3(3). http://jcmc.indiana.edu/vol3/issue3/rodino.html
Ruedenberg, Lucia, Brenda Danet, and Yehudit Rosenbaum-Tamari
1995 Virtual virtuosos: Play and performance at the computer keyboard. Electronic
Journal of Communication 5(4).
http://www.cios.org/EJCPUBLIC/005/4/00542.HTML
Simpson, James
2005 Conversational floors in synchronous text-based CMC discourse. Discourse
Studies 7(3): 337–361.
Sperber, Dan and Deirdre Wilson
1995 Relevance: Communication and Cognition. Oxford, UK: Blackwell.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
The maxims of online nicknames 461

Sperber, Dan and Deirdre Wilson


2004 Relevance theory. In: Gregory R. Ward and Lawrence R. Horn (eds.), Hand-
book of Pragmatics, 607–632. Oxford, UK: Blackwell.
Stommel, Wyke
2007 Mein Nick bin ich! [My nick is me!] Nicknames in a German forum on eating
disorders. Journal of Computer-Mediated Communication 13(1), article 8.
http://jcmc.indiana.edu/vol13/issue1/stommel.html
Subrahmanyam, Kaveri, Patricia M. Greenfield, and Brendesha Tynes
2004 Constructing sexuality and identity in an online teen chat room. Journal of Ap-
plied Developmental Psychology 25(6): 651–666.
Sundén, Jenny
2002 Material virtualities: Approaching online textual embodiment. Ph.D. disser-
tation, Department of Communication Studies, University of Linköping,
Sweden.
Tingstad, Vebjørg
2003 Children’s chat on the Net: A study of social encounters in two Norwegian chat
rooms. Ph.D. dissertation, Norwegian University of Science and Technology,
Trondheim, Norway.
Thomas, Jenny
1995 Meaning in Interaction: An Introduction to Pragmatics. London: Longman.
Tynes, Brendesha, Lindsay Reynolds, and Patricia M. Greenfield
2004 Adolescence, race, and ethnicity on the Internet: A comparison of discourse in
monitored vs. unmonitored chat rooms. Journal of Applied Developmental
Psychology 25(6): 667–684.
Wallace, Patricia
1999 The Psychology of the Internet. Cambridge, UK: Cambridge University Press.
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
Wierzbicka, Anna
2003 Cross-Cultural Pragmatics: The Semantics of Human Interaction. Berlin:
Mouton de Gruyter.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
462 Loukia Lindholm

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:13 AM
19. Micro-linguistic structural features of
computer-mediated communication
Markus Bieswanger

1. Introduction

Ever since linguists started attending to computer-mediated communication


(CMC) in the mid-1980s, they have been interested in its linguistic characteristics.
A number of micro-linguistic structural features have been identified in the media
as well as in scholarly linguistic literature as especially “characteristic” of lan-
guage use in CMC. In the sense of this chapter, CMC includes all modes1 of “text-
based human-human interaction mediated by networked computers or mobile tel-
ephony” (Herring 2007: 1), such as email, Internet Relay Chat, online discussion
forums, instant messaging, text messaging, and weblogs. This chapter focuses on
micro-linguistic structural features below the syntactic level, often involving or-
thography and typography, which have been suggested to exist for CMC as a
whole, for individual technologically and socially determined modes of CMC, and
for CMC – or CMC modes – in different languages.
The influence of medium variables, or “the deterministic influence of the com-
puter medium on language use” (Herring 2001: 614), was often overstated in the
early days of CMC research and sometimes still is. However, there is no doubt
that the absence of several communication channels, such as the auditory and the
gestural, in text-based CMC is a force that has shaped certain of its linguistic fea-
tures. As early as 1984, Kiesler, Siegel, and McGuire claimed that the lack of con-
text cues in text-only CMC was responsible for differences between CMC and
non-mediated communication (see also Baron 1984; Crystal 2001; Danet 2001;
Ferrara, Brunner, and Whittemore 1991; Werry 1996). Technological factors such
as the limited screen size of computers and mobile phones, the awkwardness of in-
putting text messages via a mobile phone keypad, and the distinction between syn-
chronous and asynchronous CMC have also been identified as influencing the
structural properties of language use in CMC (Crystal 2001; Herring 2001; Werry
1996).
Murray (1988: 11) was among the first to list characteristic features of com-
puter-mediated language, which she calls “conventions”, attributing them to the re-
duced number of channels in CMC:
Since CmC can not make use of all the channels of communication, conventions are de-
veloping to represent paralinguistic cues. These include expressives such as used in
comic strips (e.g., “humpf”), multiple vowels to represent intonation contours (e.g.,
“sooooo”), multiple punctuation marks (e.g., “well how did things go yesterday????”),

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
464 Markus Bieswanger

use of asterisks for stress (e.g., “please call – we’ve *got* to discuss”), and, more re-
cently, icons (e.g., “>:(”, which shows a sad face when rotated ninety degrees).

Since then, collections of characteristic or distinctive micro-linguistic CMC fea-


tures have been influential in shaping research on computer-mediated language
use. Danet (2001: 17) proposed a list of nine “common features of digital writing” –
multiple punctuation, eccentric spelling, capital letters, asterisks for emphasis,
written out laughter, descriptions of action, “smiley” icons, abbreviations, and the
use of all lower case – that has been the basis for other studies (e.g., Nishimura
2007). Werry (1996: 53) provides a comparable list of “characteristic properties”
of Internet Relay Chat; Crystal (2001: 17, 24–93) presents a similar set of features
that he claims are characteristic of “Netspeak” (for a discussion of this term, see
section 2.1), and Baron (2008: 151) identifies “emoticons, abbreviations, and ac-
ronyms” as “the standard landmarks” in CMC studies. Moreover, Danet and Her-
ring (2007b: 27) report that “[c]onsiderable evidence has accumulated that distinc-
tive CMC features recur in languages besides English, for example, abbreviations,
emoticons, and conversational usage”.
This chapter discusses the characteristics and the pragmatics of use of four cat-
egories of common micro-linguistic features that have been identified in the
scholarly CMC literature, keeping in mind that the occurrence of these phenomena
varies according to the language and script used, the mode of CMC employed, the
context of the interaction, and other use- and user-related factors:

1) Emoticons
2) Non-standard spelling and creative use of writing systems
3) Abbreviation
4) Non-standard punctuation

The chapter is organized as follows: Section 2 provides a review of recent and


seminal literature on micro-linguistic structural features of CMC. Section 3 ad-
dresses individual features, including a discussion of the role of technological
mediation for each feature. Section 4 concludes the chapter with an outlook on fu-
ture linguistic and pragmatic research concerning micro-linguistic structural fea-
tures of CMC.

2. Relevant literature

The linguistic and pragmatic literature devoted to micro-linguistic features of


CMC and their use can be categorized according to different approaches and foci,
which appear in various combinations. A number of works focus on linguistic fea-
tures of individual CMC modes or genres, whereas some universalizing attempts
aim to provide a comprehensive overview of the characteristic features of some

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 465

kind of “Internet language”. A further distinction can be made between works fo-
cusing on CMC in one language and studies or edited volumes that deal with CMC
in more than one language.

2.1. Universalizing versus mode-focused approaches

2.1.1. “Internet language” and “Netspeak”


For the past two decades, the mass media have tended to stereotype, overgeneral-
ize, and exaggerate characteristics of computer-mediated language use (Androut-
sopoulos 2006; Thurlow 2006). The resulting stereotypes and overgeneralizations
have to a certain extent been reinforced by the early academic work of what An-
droutsopoulos (2006: 420) calls the “‘first wave’ of linguistic CMC studies” in the
1990s (see also Herring 2007). Some CMC-focused work of this period postulated
something like an “Internet language” or “electronic language” (Collot and Bel-
more 1996; Crystal 2001; Haase, Huber, Krumeich, and Rehm 1997). Crystal
(2001,2 2004a) called this variety “Netspeak” – later supplemented by the term
“Textspeak” to refer to the language of texting (Crystal 2004b) – based on the
Orwellian terms “Newspeak” and “Oldspeak” introduced in the novel 1984, and
used in analogy to the terms “Seaspeak” and “Airspeak”. According to Crystal
(2001: 18), “[t]here is a widely held intuition that some sort of Netspeak exists – a
type of language displaying features that are unique to the Internet […]”. He sub-
divides Netspeak into mode-bound varieties such as the “language of e-mail” (94)
and the “language of chatgroups” (129). Crystal further claims that Netspeak is
not limited to English, as opposed to terms such as “Netlish”, which “is plainly
derived from ‘English’” (2001: 17).
A number of linguists have since challenged the existence of Netspeak and
Textspeak. Dürscheid (2004) calls Netspeak a myth and argues that it is impossible
to make universal claims about language use in CMC (see also Schlobinski 2001;
Stein 2003; Thurlow 2006). Similarly, Herring (2007: 3) asserts that CMC re-
searchers should not lump “all CMC into a single type” and criticizes Crystal’s
concept of Netspeak “as an emergent, global variety of online language” as being
an overgeneralization. Dürscheid’s and Herring’s views are in line with observa-
tions by Runkehl, Schlobinski, and Siever (1998), who argue that statements con-
cerning the language of CMC or the language of the Internet do not reflect the lin-
guistic reality. Such overgeneralization ignores quantitative and qualitative
variation across different modes of CMC and CMC in different languages, as well
as user and use-related variation within individual CMC modes (Androutsopoulos
2003; Bieswanger and Intemann 2011; Hård af Segerstad 2002; Herring and Ze-
lenkauskaite 2008, 2009).
The extent of linguistic variation within CMC modes and in CMC in different
languages has also cast doubt on whether there really are mode-bound varieties,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
466 Markus Bieswanger

such as a language of texting, a language of email, and a language of chatgroups


(Crystal 2001, 2004b). Androutsopoulos (2006: 420) considers it “empirically
questionable whether in fact anything like a ‘language of e-mails’ exists”, and
Bieswanger and Intemann (2011) assert that there is no such thing as a language of
online discussion forums. Several studies addressing the differences among texting
practices in different languages, for different purposes, and/or by different sociol-
inguistic groups – for example, the work of Anis (2007) on neography in French
texting, a contrastive study of private texting in English and German conducted
by Bieswanger (2007), and a study of Italian iTV SMS by Herring and Zelenkaus-
kaite (2008, 2009) – have shown that there is no universal language of texting
or “Textspeak”. Rather, the findings reveal considerable variation in language use
in texting related to the language the SMS are written in, the purpose of the mess-
ages, the intention of the writers, and sociolinguistic factors such as user gender
and age.

2.1.2. Mode-focused approaches


Studies focusing on language use in individual modes of CMC have also had a long
tradition within the relatively young field of CMC research, reflecting the fact that
“CMC is not homogeneous” (Herring 1996: 3). Following the use of the term
“mode” for different types of CMC by Murray (1988), and reflecting Herring’s
(2007: 3) definition of mode as a “CMC system [together with] the social and cul-
tural practices that have arisen around [its] use”, many linguistic CMC studies
have since concentrated on the identification of the micro-linguistic features of in-
dividual modes of CMC. The studies mentioned in this subsection focus fully or
partly on the description of micro-linguistic structural properties of either one
CMC mode or a limited number of CMC modes, as well as addressing the prag-
matic motivation for the use of certain features. They represent a selection of semi-
nal and recent mode-focused linguistic CMC research, exemplified by literature on
Internet Relay Chat, text messaging, and online discussion forums.
Internet Relay Chat (IRC) is one of the most-researched modes of CMC. Werry
(1996) characterized linguistic properties of French and English IRC, and Danet
(2001) dedicated an entire chapter of her book Cyberpl@y to the playfulness of
writing in IRC. Moreover, Danet, Ruedenberg-Wright, and Rosenbaum-Tamari
(1997) included a section on the use of emoticons in chat, and del-Teso-Craviotto
(2006) addressed, among other things, features such as emoticons and acronyms in
Spanish and English dating chats. Works completely or partly devoted to micro-
linguistic features of chat communication in languages other than English include
Anis (1999b) for French, Aschwanden (2001), Beißwenger (2001, 2007), and
Bader (2002) for German, Hård af Segerstad (2002) for Swedish, Kotilainen3
(2002) for Finnish, and Shirai (2006) and Katsuno and Yano (2007) for Japanese.
(On language use in chat, see also Paolillo and Zelenkauskaite, this volume).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 467

The structural characteristics of text messages in different languages have also


received considerable attention from linguists in recent years. Schlobinski et al.
(2001) present the results of a pilot study on texting in German, Androutsopoulos
and Schmidt (2002) analyze linguistic features of German text messages, Döring
(2002) concentrates on shortenings in texting in German, and Bieswanger (2010,
2011) addresses aspects of gendered typography in German SMS. Schlobinski and
Watanabe (2003) contrastively analyze the use of emoticons in text messages
written in German and Japanese, and Bieswanger (2007) compares the overall
frequency of abbreviations and the frequency of certain types of shortenings in
German and English texting in a corpus-based study. Thurlow and Brown (2003)
analyze text messages in English for features such as non-standard orthography,
and Anis (2007) addresses a range of micro-linguistic features of texting in French,
which he subsumes under the term “neography”. Hård af Segerstad (2002) is con-
cerned with language use in Swedish SMS, Kasesniemi (2003) with text messag-
ing in Finnish, and Ling (2005) with Norwegian texting. Pietrini (2001) focuses on
non-standard spelling in Italian text messaging, and Herring and Zelenkauskaite
(2008, 2009) investigate gender-related typographic variability in SMS posted to
Italian interactive television programs. Deumert and Masinyana (2008) compare
the linguistic properties of text messages in English and isiXhosa in South Africa,
including shortening and non-standard spelling. (On the linguistics of SMS, see
also Thurlow and Poff, this volume.)
Until recently, online discussion forums and related modes such as discussion
groups and bulletin board systems (BBS) attracted less discussion of micro-lin-
guistic features than did IRC or SMS (Bieswanger and Intemann 2011). However,
Waseleski (2006) analyses gender variation in the use of exclamation points in
postings to two English-language electronic discussion groups, and Bieswanger
and Intemann (2011) study use- and user-related variation in 10 linguistic and
interactional features commonly associated with language use in online dis-
cussion forums. In the volume edited by Danet and Herring (2007a), Su (2007: 64)
“examines creative uses of writing systems in college affiliated Electronic Bulletin
Board Systems” in Taiwan, and Tseliga (2007: 116) dedicates one section of her
chapter to a “corpus-based analysis of Greek vs. Greeklish postings to public dis-
cussion lists”, including features such as emoticons, non-standard punctuation, and
non-standard capitalization. In the same volume, Nishimura (2007) investigates
the use of micro-linguistic features, for example shortenings, emoticons, and non-
standard and creative spelling, in contributions to Japanese BBS and compares
“features of messages written by Japanese CMC users with their English counter-
parts” (167). (On language use in online discussion forums, see also Gruber, this
volume.)

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
468 Markus Bieswanger

2.2. Works addressing CMC in one language vs. more than one language
2.2.1. Works addressing CMC in one language
Much of the available scholarly literature on language use in CMC is based on
studies that address CMC in one language only. Particularly in the early days of
linguistic CMC research, scholarly works on CMC written in English often meant
research on CMC in English, often without stating explicitly that English-based
CMC was the focus of attention. For example, Danet et al.’s (1997) study of writ-
ing, play, and performance on IRC does not state in the title, the abstract, or the in-
troductory section that the study is only about English. Danet and Herring (2007b:
5) remark that “[m]ost researchers publishing in English venues have generalized
about the language of computer-mediated communication, whereas in fact they
were describing computer-mediated English, sometimes in a single CMC mode”.
They rightfully complain that much of the CMC research published in English
does not do justice to the fact that the majority of Internet users are not native
speakers of English and that “hundreds of millions of people are already partici-
pating online today in languages other than English, in some form of nonnative
English, or in a mixture of languages, and this trend is projected for the years to
come” (Danet and Herring 2007b: 4).
Although Su (2007) claimed that there is a “relative lack of research on com-
puter-mediated communication (CMC) in non-English-based Internet environ-
ments”, in fact there is a substantial and growing body of research on language use
in non-English-based CMC, much of it published in languages other than English
(see Schlobinski 2001; Stein 2003). For example, the collection of articles in
French edited by Anis (1999a) focuses on language use in French CMC, Swedish
CMC is addressed in Josephson (1997) and Hård af Segerstad (2002), and German
CMC is featured in several volumes: Weingarten (1997), Kallmeyer (2000), Beiß-
wenger (2001), Siever, Schlobinski, and Runkehl (2005), Schlobinski (2006), and
Androutsopoulos, Runkehl, Schlobinski, and Siever 2006).
Unlike many of the studies investigating language use in English-based CMC,
most works on non-English-based CMC published in English explicitly indicate
the language they focus on in the title, such as Anis’ (2007) article “Neography:
Unconventional spelling in French SMS text messages” and Hård af Segerstad’s
(2005) study “Language use in Swedish mobile text messaging” (see also Herring
and Zelenkauskaite 2008; Ling 2005; Nishimura 2007, Siebenhaar 2006; Su 2007;
Tseliga 2007; Yang 2007). However, CMC research has reached a point where par-
ticularly authors publishing in English need to indicate clearly whether they are
“describing computer-mediated English” (Danet and Herring 2007b: 5), whether
they are investigating language use in CMC or modes of CMC in a language or par-
ticular languages other than English, or whether they are attempting to make more
universal claims as to patterns of language use in CMC in all languages.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 469

2.2.2. Works addressing CMC in more than one language


While the majority of linguistic and pragmatic CMC research focuses on language
use in one language, there are also volumes and individual studies that deal with
CMC in more than one language. Danet and Herring (2007a) include chapters on
language use in several modes of CMC in a range of languages and language var-
ieties, and the German-language volume edited by Schlobinski and Siever (2005)
concentrates on language use in weblogs in nine different languages. While many
studies focusing on a language other than English take the available literature on
language use in English CMC as a point of reference (e.g., Anis 2007; Nishimura
2007), relatively few individual studies explicitly compare language use in CMC
in more than one language. Recent studies of this kind include, for example, Bies-
wanger (2007), del-Teso-Craviotto (2006), Schlobinski and Watanabe (2003), and
Zelenkauskaite and Herring (2006).

3. Micro-linguistic features of CMC

Researchers have come to appreciate that the occurrence of “characteristic” micro-


linguistic CMC features depends on a number of factors. On the one hand, techno-
logical mediation significantly influences language use in CMC and has led CMC
researchers to distinguish technologically-defined modes, which have in common
that they are all text-based. On the other hand, scholarly research on CMC has
shown that language use in CMC is also shaped by use- and user-related factors –
such as the purpose of the communication, the intention of the writers, and the so-
ciolinguistic backgrounds of the users – and by the language and script used. Both
sets of factors have been considered in research on individual micro-linguistic
features, four major types of which are discussed in this section: emoticons, non-
standard spelling and creative use of writing systems, abbreviation, and non-stan-
dard punctuation.

3.1. Emoticons
The text-based nature of CMC and the resulting paucity of paralinguistic and non-
linguistic cues are generally considered to be the main reasons for the development
of so-called emoticons (Crystal 2001; Danet 2001; Danet et al. 1997; Döring 2003;
Murray 1988; Raymond 1994; Runkehl et al. 1998; Schmitz 2004; Siever 2006;
Witmer and Katzman 1997). As all textual modes of CMC share the lack of certain
channels of communication, it does not come as a surprise that emoticons are a fea-
ture that is “shared across modes” (Danet and Herring 2007b: 12; see also Hård af
Segerstad 2002: 261) and that “recur[s] in languages besides English” (Danet and
Herring 2007b: 27). Emoticons are thus among the micro-level phenomena which

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
470 Markus Bieswanger

are most “characteristic” of language use in CMC, although their actual shape and
frequency of use differ according to a number of factors. As smiley face icons pre-
date the Internet, and emoticons can now also be found in “snail-mail” letters and
postcards (Östman 2004; Runkehl et al. 1998), it seems more appropriate to clas-
sify them as “characteristic” than to call them “a unique feature of the electronic
language register” (Tseliga 2007: 121; see also Herring 1996) or an “exclusively
digital phenomenon” (Tseliga 2007: 126).
The term “emoticon” is most likely a blend of the nouns “emotion” and “icon”
(Oxford English Dictionary Online 2008), and it is defined as “[a] representation of
a facial expression formed by a short sequence of keyboard characters (usually to
be viewed sideways) […] to convey the sender’s feelings or intended tone” (Ox-
ford English Dictionary Online 2008). Emoticons are also known as “smileys”,
“smiley icons”, or “smiley faces” (Crystal 2001; Danet 2001; Danet and Herring
2007b; Haase et al. 1997; Runkehl et al. 1998; Wolf 2000). Godin (1993) and San-
derson (1993) present early collections of emoticons. Today, some of the clusters
of typographic symbols referred to as emoticons do not represent facial ex-
pressions (Dresner and Hering 2010); for example, many contemporary online dis-
cussion forums offer a selection of symbols, such as or (Bieswanger and
Intemann 2011). It should also be noted that much of the current CMC software
automatically transforms typed sequences such as :) ‘smile’ and :( ‘frown’ into
graphical icons, in this case into the icons K and M respectively, so that emoticons
no longer necessarily have to be read sideways.
In contrast to traditional “Western-style ‘smileys’” (Danet and Herring 2007b:
13), defined as in the quote from the Oxford English Dictionary Online above, “kao-
moji” or “Japanese-style emoticons” (Katsuno and Yano 2007; see also Nishimura
2007; Shirai 2006; Siever 2006), which are also called “Asian style” emoticons
(Lee 2007: 203) or “[v]ertical emoticons” (Lee 2007: 205), have never had to be
read sideways (Nishimura 2007; Shirai 2006). For example, (^_^), (^ ^), (^^), and
(^o^) are among the many different vertical emoticons representing a smile (Kat-
suno and Yano 2007; Schlobinski and Watanabe 2003). Lee (2007: 205) reports that
both Western-style and Asian-style emoticons occur in instant messaging and email
communication in Hong Kong, noting that “[v]ertical emoticons are more common
in Hong Kong CMC than are horizontal ones”. Palfreyman and Al Khalil (2007)
give an example of the use of vertical emoticons in instant messaging in Arabic.
From the point of view of pragmatics and speech act theory, it has recently
been argued that emoticons do not only convey emotions but in fact have multiple
functions, including to “indicate the illocutionary force of the text to which they
are attached” (Dresner and Herring 2010: 250). Dresner and Herring identify
“three ways in which emoticons function: 1) as emotion indicators, mapped di-
rectly onto facial expression; 2) as indicators of non-emotional meanings, mapped
conventionally onto facial expressions, and 3) as illocutionary force indicators that
do not map conventionally onto a facial expression” (250).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 471

Linguistic studies have repeatedly addressed the relationship between the use
of emoticons and sociolinguistic factors, particularly gender, as well as CMC
mode. Witmer and Katzman (1997) found in their study of language use in public
newsgroups and special interest groups that females used more graphic accents
than males. Additionally, they reported that the overall use of graphic accents in
their data was fairly low. Baron (2008: 67) investigated instant messaging com-
munication of American college students and found that “females were far more
likely to use emoticons than males”. In a study of gender-related differences in
emoticon use in online newsgroups, Wolf (2000) also found that females used more
emoticons overall and additionally discovered that males’ use of emoticons was
notably higher in mixed-gender newsgroups than in predominantly male news-
groups. This finding is consistent with the results of Bieswanger and Intemann
(2011), who found that the frequency of emoticons was considerably higher in a
predominantly female forum than in a predominantly male English-language dis-
cussion forum.
Regarding the connection between the use of emoticons and the CMC mode
and/or language employed, studies point to considerable mode-related and lan-
guage-related variation, but more research is necessary before any general con-
clusions can be drawn. There “is a pressing need for systematic cross-linguistic
studies that make use of similar methods in similar contexts involving different
languages” (Danet and Herring 2007b: 28). As regards mode, Lee (2007: 203)
reports that emoticons are “very popular” in Hong Kong CMC, but that in her data
emoticons are much more frequent in instant messaging than in email. In a study of
language use in instant messaging and texting among female American college
students, Baron (2008) found that emoticons were very infrequent in both modes,
making up less than 1 % of all words in each mode. Bieswanger and Intemann
(2011) report that for a corpus of over 82,000 words from three English-based on-
line discussion forums, on average approximately 2 % of the words were emoti-
cons. There are, however, considerable differences across individual discussion
forums in the Bieswanger and Intemann study, with an average of about 0.3 % of
all words being emoticons in one forum and 3.1 % of all words in another. Tseliga’s
(2007: 126) study of four Greek discussion lists and one newsgroup discovered
that “Greeklish users were somewhat more likely to use emoticons” than users of
Greek. Hård af Segerstad (2002: 261) investigated the use of “features character-
istic of CMC” in four different modes, namely email, chat, instant messaging, and
texting, and found that emoticons occurred in each of the modes.
Based on the above review of the available literature on the functions and use
of emoticons in CMC, it seems safe to conclude that emoticons are a characteristic
feature of language use in CMC. However, considerable variation exists related to
the language and script used, the CMC mode employed, the purpose of the inter-
action, and the sociolinguistic backgrounds of the users.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
472 Markus Bieswanger

3.2. Non-standard spelling and creative use of writing systems

The occurrence of non-standard orthographic and typographic forms of various


kinds, or the intentional and unintentional “flouting of orthographic and typo-
graphic norms” (Danet and Herring 2007b: 12), have been frequently claimed to be
characteristic of language use in CMC and in individual CMC modes (Anis 2007;
Crystal 2001; Danet 2001; Hård af Segerstad 2002, Herring 2001; Murray 1988;
Nastri, Peña, and Hancock 2006; Thurlow and Brown 2003; Werry 1996). Non-
standard spellings are easiest to identify, of course, for languages that have “well-
established standard orthographies with undisputed official, institutional status”
(Jaffe 2000: 499) and most difficult for languages that are not traditionally written
down, such as the colloquial variety of Arabic studied by Palfreyman and Al Khalil
(2007). Six of the nine common features of digital writing proposed by Danet
(2001: 17) can be considered non-standard spelling and creative use of writing: ec-
centric spelling, capital letters, asterisks for emphasis, written out laughter, de-
scriptions of action, and the use of all lower case. Some authors have also included
the various spellings that fall into the category “abbreviation” (Danet 2001) as
non-standard CMC orthographic forms (e.g., Murray 1990; Nastri et al. 2006;
Shortis 2001). However, since some kinds of shortenings are also considered char-
acteristic of computer-mediated language, “all lexical forms that are made up by
fewer characters than the full form of a word or a combination of words” (Bies-
wanger 2007: n.p.) will be discussed in a separate subsection (3.3.).
Many potential reasons exists for the occurrence of non-standard spelling and
creative use of writing in CMC, and it is risky to generalize. Although it is not al-
ways easy to decide whether an occurrence of non-standard spelling is intentional
or not, many scholars make a distinction between misspellings, or typos, and other
types of non-standard spelling (Baron 2008; Kessler 2008; Runkehl et al. 1998;
Thurlow and Brown 2003). Herring (2001: 617) is among those CMC researchers
who consider most non-standard forms in CMC to be intentional; she claims that
“although computer-mediated language often contains nonstandard features, only
a relatively small percentage of such features appears to be errors caused by inat-
tention or lack of knowledge of the standard forms […]. The majority are deliber-
ate choices made by users to economize on typing effort, mimic spoken language,
or express themselves creatively”. Werry (1996: 56–57) claims that “the creative
use of capitalization, spelling and punctuation” in English and French IRC is “the
result of a complex set of strategies designed to compensate for the lack of inton-
ation and paralinguistic cues”. Similarly, Nishimura (2007: 174) investigated lan-
guage use in Japanese and English-language BBS communication and concludes
that “CMC users in both languages devise various innovative and unconventional
ways of writing in order to supply prosodic, paralinguistic, phonological, and audi-
tory information through language-specific means”. Herring and Zelenkauskaite
(2009) go beyond the notion that non-standard typography compensates for a lack

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 473

of prosodic cues in their investigation of the functions of the use of non-standard


typography by female and male writers of Italian SMS posted to interactive televi-
sion programs. They find that female writers use more non-standard spellings, and
the authors propose that the underlying motivation is to “symbolize feminine
qualities of emotionality, sociability, and playfulness (childishness)” (26).
In their study of English-language discussion forums, Bieswanger and Inte-
mann (2011) find that most of the micro-linguistic features that have been con-
sidered non-standard spellings in CMC, and that are not a form of abbreviation,
can be grouped into three categories: errors (orthographic or typographic), capital-
ization, and the representation of spoken language. These categories are illustrated
below with examples from their corpus (relevant words are highlighted in boldface
type). First, some of the non-standard spellings found in the corpus appear to be
misspellings of individual words:
(1) I was planing to put it into my photobucket […]
Second, several subcategories related to capitalization were identified, loosely
corresponding to Danet’s (2001) categories “capital letters” and “all lower case”,
but more precisely defined. Capitalization was identified as missing if it was not
used at the beginning of sentences or initially in generally capitalized words
(examples 2 and 3). Additionally, words that are usually not capitalized were
sometimes capitalized sentence-internally (examples 4 and 5); there were some
cases of “camel case”, i.e., word-internal capitalization (example 6); and in some
words all letters were capitalized (example 7), a strategy used for emphasis in
CMC but often considered undesirable “shouting”:
(2) she could also look into some new footwear, something other than boots boots
boooooots!
(3) Flights will operate on wednesdays and sundays using the Primaris 757.
(4) I wonder, Are the JM pilots, flight attendants and maintenance people already
trained to work with B757.
(5) Absolutely Hllarious!
(6) I’ve practically flown on 1/2 the MadDog fleet […]
(7) There is no room (NONE) for error.
Third, a number of examples can be subsumed under the umbrella term “repre-
sentation of spoken language”. This category includes, for example, reduplicated
letters that are plausibly used to “represent drawn-out or expressive intonation”
(Werry 1996: 57; example 2 above and example 8), the representation of non-
speech sounds, such as laughter (example 9), and spoken contractions (example
10):

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
474 Markus Bieswanger

(8) That was sooo funny.


(9) Hahahahahahahaha. Amusing.
(10) I dunno the accuracy of this […]

Other recent studies addressing the issue of non-standard spelling and the cre-
ative use of writing in CMC in different languages include Nastri et al. (2006),
Kessler (2008), Anis (2007), and Su (2007). Nastri et al. (2006) found in their
speech act analysis of “away” messages in English instant messaging that “CMC-
based orthography” is very frequently used, with “39 % of away messages contain-
ing some type of CMC orthography”. In her study of instant messaging in Swiss
German and Standard German, Kessler (2008) found that non-standard spelling
and writing were frequently used to imitate spoken language, including via ono-
matopoeic forms, reduplication of letters, and the representation of dialect features
(see also Siebenhaar 2006). The analysis of the data also showed that the com-
munication took place to a large extent in lower case letters only, and that capital
letters were mostly used for emphasis (Kessler 2008). Anis (2007: 97) studied
French texting and developed “a typology of neographic transformations observed
in the French SMS corpus”. In a comparison across modes, Anis (2007: 90) found
that neographic spellings were frequent in synchronous French chat, text messag-
ing, and instant messaging, whereas neography in asynchronous email, newsgroup
postings, and discussion list postings was marginal. Finally, Su (2007: 83–84) in-
vestigated “creative uses of writing” on Taiwanese Bulletin Board Systems (BBS)
and identified “processes of transforming spoken English, Taiwanese, and Taiwan-
ese-accented Mandarin into forms of online language play” that involved, among
other strategies, non-standard mixing of writing systems from different languages.
In short, research has found that various forms of non-standard orthography
and typography as well as creative uses of writing are common in CMC. As with
emoticons, however, there is considerable variation in the use of these forms ac-
cording to the mode of CMC – including (a)synchronicity – the language used, the
writing system(s) available, the purpose and formality of the interactions, the in-
tention of the writers, and the sociolinguistic backgrounds of the users.

3.3. Abbreviation
Abbreviated forms of language have been identified as characteristic of communi-
cation in many modes of CMC and as among the “distinctive CMC features
[which] recur in languages besides English” (Danet and Herring 2007b: 27; see
also Anis 2007; Crystal 2001; Danet 2001; Deumert and Masinyana 2008; Thur-
low and Brown 2003). “Abbreviation” and “shortening” are neutral terms here used
synonymously to refer to all strategies that result in “lexical forms that are made
up by fewer characters than the full form of a word or a combination of words”
(Bieswanger 2007: n.p.). Hård af Segerstad (2002: 71) calls these forms “lexical

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 475

reductions”, and Herring and Zelenkauskaite (2008: 82–84) refer to them as “dele-
tions”. Many types of shortenings occur in CMC, for example, initialisms4 such as
lol for ‘laughing out loud’, vowel deletion as in ovr for English ‘over’ or tjrs for
French ‘toujours’ (‘always’), contractions as in don’t for English ‘do not’, and
letter/number homophones such as b for English ‘be’ or 2 for English ‘to’ or ‘too’,
also known as rebus writing (Anis 2007; Baron 2000; Bieswanger 2007; Crystal
2001; Hård af Segerstad 2002; Herring, in press; Kessler 2008; Schlobinski et al.
2001; Werry 1996).
Crystal (2001: 84) writes that “[t]he various types of abbreviation found in Net-
speak have been one of its most remarked features”; for texting, he claims that
“[t]he challenge of the small screen size and its limited character space (about 160
characters), as well as the small keypad, has motivated the evolution of an even
more abbreviated language than emerged in chatgroups and virtual worlds” (229).
Thurlow and Brown (2003, n.p.) expected such a result in their study of English
texting, as “[h]eavily abbreviated language is of course also a generic feature of in-
teractive CMC niches like IRC’s online chat and ICQ’s instant messaging”. They
were surprised, however, to find that shortenings made up less than 20 % of the
content of the messages in their data, casting some doubt on Crystal’s broad claim.
Deumert and Masinyana (2008: 125) give a similar figure of approximately 20 % in
their study of text messaging in South Africa in English and mixed English-isi-
Xhosa messages for “abbreviations, phonological approximations, and non-stan-
dard spellings”.
In a contrastive study of English and German private texting, Bieswanger
(2007) found that the overall number of shortenings used in the German data was
even lower than in the English corpus. His quantitative analysis found an average
of 5.57 shortenings per text message in the English data, as compared to only 0.86
shortenings per message in the German corpus. The frequency of shortenings in the
German data is so low that it calls into question whether shortenings are in fact a
“characteristic” feature of German texting. Kessler’s (2008) study of German in-
stant messaging yielded a similar result: Only 742 of the 45,729 words in her data
were abbreviated forms, i.e., less than 2 % (Kessler 2008). Herring and Zelenkaus-
kaite (2008) adopted the shortening types from Bieswanger (2007) in their study of
Italian iTV SMS – except for the type “contractions”, “because the Italian language
does not have contractions” (84) – and found that the overall frequency of short-
enings was 1.79 per message for female senders and 1.18 for male senders, i.e., the
average number for both genders is markedly lower than the average of 5.57 short-
enings per text message in the English data in Bieswanger (2007). Finally, Deu-
mert and Masinyana (2008: 140) note that “[t]he isiXhosa [text] messages in our
corpus differ markedly from the writers’ English-language messages in that they
contain almost no abbreviated material”. The above findings demonstrate that fea-
tures of language use characteristic of English-language CMC are not always char-
acteristic of CMC in general when viewed from a cross-linguistic perspective.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
476 Markus Bieswanger

When we examine the breakdown of different types of shortenings in texting in


different languages, a similar picture emerges. For example, Crystal (2001: 84)
claims that “[a]cronyms are so common [in Netspeak] that they regularly receive
critical comment”. He provides a list of over 100 shortenings used in Netspeak
conversations, which consists almost exclusively of initialisms. However, quanti-
tative analyses such as thoseof Bieswanger (2007), Herring and Zelenkauskaite
(2008), and Baron (2008) show that initialisms are rare in the data from all the lan-
guages investigated. Surprisingly, they are particularly rare in Baron’s (2008) Eng-
lish data: She found only eight initialisms in 191 text messages written by under-
graduates at the University of Michigan, or 0.04 initialisms per message. Similarly,
the English corpus in Bieswanger (2007) contains only 0.03 initialisms per mess-
age (as compared to 0.13 initialisms per message in his German corpus, which is
closer to the rates reported for female and male users in Herring and Zelenkaus-
kaite’s [2008] Italian iTV SMS corpus: 0.10 and 0.11 initialisms per text message,
respectively). The frequency of the other types of shortenings investigated in these
studies – clippings, letter/number homophones, and phonetic spellings – also
varies considerably across the English, the German, and the Italian data. For
example, the English data show the highest and the German data the lowest number
of shortenings per message for each of the types.
In summary, studies have found considerable language-related variation con-
cerning the overall frequency of shortenings and the types of shortenings used in
CMC. English seems to be among the languages that invite the most extensive use
of shortenings in CMC, but even there, empirical studies find that shortenings are
less frequent than has often been suggested. It also must be kept in mind that many
of the abbreviations used are not unique to CMC and “were already in use before
the advent of computers” (Danet 2001: 18). Nonetheless, abbreviations are used
deliberately in CMC, for example, to “economize on typing effort” (Herring 2001:
617; see also Nastri et al. 2006); to speed up typing, particularly in synchronous
CMC (Nishimura 2007; Werry 1996); and to play with language, show creativity,
and “indicate familiarity and intimacy between users” (Lee 2007: 201). The use of
abbreviations in CMC thus reflects technological and social motivations, as well as
the Gricean (1975) maxims of manner – particularly the demand for brevity – and
of quantity.

3.4. Non-standard punctuation


Many studies have identified non-standard punctuation as another “characteristic”
feature of language use in CMC. Various types of non-standard punctuation, along
a continuum from complete absence of punctuation all the way to multiple and
exaggerated use of punctuation, have been reported (Baron 2008; Crystal 2001;
Danet 2001; Hård af Segerstad 2002; Murray 1988). Crystal (2001: 89) suggests
that some emailers maintain traditional punctuation while others do not use punc-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 477

tuation at all, “either as a consequence of typing speed, or through not realizing


that ambiguity can be one of the consequences”, and suggests that “[e]mphasis and
attitude can result in exaggerated or random use of punctuation, such as !!!!!!! or
£$£$%!”. In addition to emphasis, multiple punctuation marks as in Type back
soon!!!!!! have also been “associated with playfulness and informality in the CMC
context” (Tseliga 2007: 121). Luginbühl (2003) claims that multiple punctuation
marks are used in arguments in Internet Relay Chat rooms to express emotion,
while Danet (2001: 17) argues that multiple punctuation is used to “enhance the
readers” and writers’ ability to experience the words as if they were spoken” (see
also Lakoff 1982; Werry 1996). Other reported non-standard uses of punctuation in
CMC include ellipses – also known as “trailing dots” (Baron 2000: 193) or simply
“repeated dots” (Herring and Zelenkauskaite 2008: 85) – and the omission of punc-
tuation at the ends of sentences (Baron 2008; Runkehl et al. 1998).
Recent studies have identified patterns concerning the use of non-standard
punctuation in CMC in various languages. In her comparison of BBS communi-
cation in Japanese and English, Nishimura (2007) found multiple punctuation in
both languages, but only the Japanese data contained examples of wavy lines at
the end of sentences “to emphasize visually the length of time” (Nishimura 2007:
169). Tseliga (2007) reports for Greek and Greeklish contributions to discussion
lists that multiple exclamation marks are more frequent than multiple question
marks of either the English or the Greek type. In Herring and Zelenkauskaite’s
(2008) analysis of insertions in Italian iTV SMS, various types of repeated punc-
tuation were the most common form of insertion. Females employed more re-
peated punctuation than males, which is identified by Herring and Zelenkaus-
kaite (2008: 88) as among the non-standard features used to “communicate
feminine qualities of expressiveness, friendliness, and playfulness”. As in Tseli-
ga’s (2007) study, multiple exclamation marks were also found to be more fre-
quent than multiple question marks, but both types were less frequent than re-
peated dots.
As far as the omission of punctuation is concerned, Herring and Zelenkauskaite
(2008) consider the omission of final punctuation to be the norm in iTV SMS, but
found that males omitted punctuation in other positions more frequently than did
females, although neither gender omitted punctuation very frequently overall.
Baron’s (2008) analysis of English-language texting and instant messaging by fe-
male students showed that they used significantly more question marks to end
questions than periods or exclamation marks to end declaratives, exclamations, or
imperatives. When she compared the use in the two modes of communication,
Baron (2008) found that punctuation marks were omitted more frequently in tex-
ting than in instant messaging.
In sum, similar to the occurrence of the other “characteristic” micro-linguistic
features of CMC, the use of non-standard punctuation shows variation. In contrast
to the use of shortenings, however, the occurrence of non-standard punctuation

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
478 Markus Bieswanger

seems to depend more on the social background of the user and the mode used than
on the language of the interaction.

4. Outlook

This chapter has discussed a number of micro-linguistic structural features that are
frequently considered characteristic of CMC, pointing out variation that occurs ac-
cording to the language and script used, the mode of CMC employed, and other
use- and user-related factors. So far, research on the use of micro-linguistic fea-
tures in CMC has mainly focused on issues such as which features are used, in
which language, in which modes, and by whom. Many of the studies mentioned in
this chapter, however, do not focus solely on the linguistic description of the lan-
guage used in CMC, but also implicitly or explicitly discuss pragmatic aspects
concerning “the process of producing language” (Mey 2001: 5), including address-
ing the various motivations for and functions of the use of the micro-linguistic fea-
tures investigated. Unfortunately, studies of micro-linguistic phenomena with a
specifically pragmatic focus – such as Dresner and Herring’s (2010) investigation
of the association between emoticons and illocutionary force – have so far been
rare. From the point of view of pragmatics, future studies of micro-linguistic fea-
tures of CMC should concentrate on the actual use of these features in different
contexts, including the reasons for their use and the pragmatic meanings their use
conveys.
Finally, although many studies have addressed micro-linguistic structural fea-
tures of CMC, these studies vary in focus and scope as well as in the methodology
used. Danet’s and Herring’s (2007b: 28) observation that “[t]here is a pressing
need for systematic cross-linguistic studies that make use of similar methods in
similar contexts involving different languages” certainly holds true for the lin-
guistic and pragmatic investigation of micro-level features of CMC. Moreover, it is
necessary to broaden the perspective of this exhortation and apply it to other fac-
tors influencing computer-mediated language use, such as mode, purpose, and the
sociolinguistic background of users, as systematic and comparable studies are also
lacking for these factors.

Acknowledgements

I am grateful to Susan C. Herring, Tuija Virtanen, and an anonymous reviewer for


their detailed feedback on an earlier draft of this chapter. Any errors or oversights
remaining are my own.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 479

Notes

1. See Herring (2007) for a discussion of the terms “CMC mode” and “CMC genre”.
2. Crystal (2006) still uses the term “Netspeak” in the second edition of his much-discussed
book Language and the Internet.
3. I would like to thank Tuija Virtanen for suggesting a number of works in Finnish and
Swedish to be included in this chapter.
4. The term “initialism” is used as a cover term for all shortenings that “consist of the first
letter (or letters) of a combination of more than one word” (Bieswanger 2007: n.p.).

References

Androutsopoulos, Jannis K.
2003 Online-Gemeinschaften und Sprachvariation. Soziolinguistische Perspektiven
auf Sprache im Internet. Zeitschrift für germanistische Linguistik 31: 173–197.
Androutsopoulos, Jannis K.
2006 Introduction: Sociolinguistics and computer-mediated communication. Jour-
nal of Sociolinguistics 10(4): 419–438.
Androutsopoulos, Jannis K., Jens Runkehl, Peter Schlobinski, and Torsten Siever (eds.)
2006 Neuere Entwicklungen in der linguistischen Internetforschung. Hildesheim:
Olms.
Androutsopoulos, Jannis and Gurly Schmidt
2002 SMS-Kommunikation: Ethnografische Gattungsanalyse am Beispiel einer
Kleingruppe. Zeitschrift für Angewandte Linguistik 36: 49–79.
Anis, Jacques (ed.)
1999a Internet communication et langage français. Paris: Hermès.
Anis, Jacques
1999b Chats et usages graphiques du français. In: Jacques Anis (ed.), Internet com-
munication et langage français, 71–90. Paris: Hermès.
Anis, Jacques
2007 Neography: Unconventional spelling in French SMS text messages. In: Brenda
Danet and Susan C. Herring (eds.), The Multilingual Internet: Language, Cul-
ture, and Communication Online, 87–115. New York: Oxford University Press.
Aschwanden, Brigitte
2001 wär wot chätä? Zum Sprachverhalten deutschschweizerischer Chatter. Net-
worx 24. http://www.mediensprache.net/networx/networx-24.pdf
Bader, Jennifer
2002 Schriftlichkeit und Mündlichkeit in der Chat-Kommunkation. Networx 29.
http://www.mediensprache.net/networx/networx-29.pdf
Baron, Naomi S.
1984 Computer-mediated communication as a force in language change. Visible
Language 18(2): 118–141.
Baron, Naomi S.
2000 Alphabet to Email: How Written English Evolved and Where It’s Heading.
London/New York: Routledge.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
480 Markus Bieswanger

Baron, Naomi S.
2008 Always On: Language in an Online and Mobile World. New York: Oxford Uni-
versity Press.
Beißwenger, Michael (ed.)
2001 Chat-Kommunikation. Sprache, Interaktion, Sozialität & Identität in syn-
chroner computervermittelter Kommunikation: Perspektiven auf ein interdis-
ziplinäres Forschungsfeld. Stuttgart: ibidem.
Beißwenger, Michael
2007 Sprachhandlungskoordination in der Chat-Kommunikation. Berlin/New York:
de Gruyter.
Bieswanger, Markus
2007 2 abbrevi8 or not 2 abbrevi8: A contrastive analysis of different space- and
time-saving strategies in English and German text messages. In: Simeon
Floyd, Taryne Hallet, Sae Oshima, and Aaron Shield (eds.), Texas Linguistic
Forum 50.
http://studentorgs.utexas.edu/salsa/proceedings/2006/Bieswanger.pdf
Bieswanger, Markus
2010 Gendered language use in computer-mediated communication: Typography in
text messaging. In: Markus Bieswanger, Heiko Motschenbacher, and Susanne
Mühleisen (eds.), Language in Its Socio-Cultural Context: New Explorations
in Gendered, Global and Media Uses, 157–172. Frankfurt: Lang.
Bieswanger, Markus
2011 The sociolinguistics of texting: Methodological considerations and empirical
results. Sprache und Datenverarbeitung: International Journal for Language
data Processing 35(1): 7–24.
Bieswanger, Markus and Frauke Intemann
2011 Patterns and variation in the language use in English-based discussion forums.
In: Martin Luginbühl and Daniel Perrin (eds.), Muster und Variation: Medien-
linguistische Perspektiven auf Textproduktion und Text, 157–187. Bern: Lang.
Crystal, David
2001 [2006] Language and the Internet [2nd Ed.] Cambridge, UK: Cambridge Univer-
sity Press.
Crystal, David
2004a The Language Revolution. Cambridge, UK: Polity.
Crystal, David
2004b A Glossary of Netspeak and Textspeak. Edinburgh, UK: Edinburgh University
Press.
Collot, Milena and Nancy Belmore
1996 Electronic language: A new variety of English. In: Susan C. Herring (ed.),
Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural
Perspectives, 13–28. Amsterdam/Philadelphia: John Benjamins.
Danet, Brenda
2001 Cyberpl@y: Communicating Online. London: Berg.
Danet, Brenda and Susan C. Herring (eds.)
2007a The Multilingual Internet: Language, Culture, and Communication Online.
New York: Oxford University Press.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 481

Danet, Brenda and Susan C. Herring


2007b Introduction. In: Brenda Danet and Susan C. Herring (eds.), The Multilingual
Internet: Language, Culture, and Communication Online, 1–39. New York:
Oxford University Press.
Danet, Brenda, Lucia Ruedenberg-Wright, and Yehudit Rosenbaum-Tamari
1997 “HMMM … WHERE’S THAT SMOKE COMING FROM?” Writing, play
and performance on Internet Relay Chat. Journal of Computer-Mediated Com-
munication 2(4). http://jcmc.indiana.edu/vol2/issue4/danet.html
del-Teso-Craviotto, Marisol
2006 Language and sexuality in Spanish and English dating chats. Journal of Socio-
linguistics 10(4): 460–480.
Deumert, Ana and Sibabalwe Oscar Masinyana
2008 Mobile language choices – The use of English and isiXhosa in text messages
(SMS). English World-Wide 29(2): 117–147.
Döring, Nicola
2002 “Kurzm. wird gesendet” – Abkürzungen und Akronyme in der SMS-Kom-
munikation. Muttersprache 112(2): 97–114.
Döring, Nicola
2003 Sozialpsychologie des Internet. Die Bedeutung des Internet für Kommunika-
tionsprozesse, Identitäten, soziale Beziehungen und Gruppen, 2nd Ed. Göt-
tingen: Hogrefe.
Dresner, Eli and Susan C. Herring
2010 Functions of the non-verbal in CMC: Emoticons and illocutionary force. Com-
munication Theory 20: 249–268.
Dürscheid, Christa
2004 Netzsprache – ein neuer Mythos. In: Michael Beißwenger, Ludger Hoffmann, and
Angelika Storrer (eds.), Internetbasierte Kommunikation, 141–157. Osnabrücker
Beiträge zur Sprachtheorie 68. Osnabrück: Gilles & Francke.
Ferrara, Kathleen, Hans Brunner, and Greg Whittemore
1991 Interactive written discourse as an emergent register. Written Communication
8(1): 8–34.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 41–58. New York: Academic Press.
Godin, Seth
1993 The Smiley Dictionary: Cool Things to Do with Your Keyboard. Berkeley, CA:
Peachpit Press.
Haase, Martin, Michael Huber, Alexander Krumeich, and Georg Rehm
1997 Internetkommunikation und Sprachwandel. In: Rüdiger Weingarten (ed.),
Sprachwandel durch Computer, 51–85. Opladen: Westdeutscher Verlag.
Hård af Segerstad, Ylva
2002 Use and Adaptation of Written Language to the Conditions of Computer-Me-
diated Communication. Gothenburg Monographs in Linguistics. Gothenburg:
Gothenburg University Press.
Hård af Segerstad, Ylva
2005 Language use in Swedish mobile text messaging. In: Rich Ling and Per E. Ped-
ersen (eds.), Mobile Communications: Renegotiation of the Social Sphere,
313–343. London: Springer.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
482 Markus Bieswanger

Herring, Susan C.
1996 Introduction. In: Susan C. Herring (ed.), Computer-Mediated Communication:
Linguistic, Social, and Cross-Cultural Perspectives, 1–10. Amsterdam/Phila-
delphia: John Benjamins.
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Deborah Tannen, and
Heidi Hamilton (eds.), The Handbook of Discourse Analysis, 613–634. Ox-
ford, UK: Blackwell.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Lan-
guage@Internet 4, article 1.
http://www.languageatinternet.org/articles/2007/761/
Herring, Susan C.
in press Grammar and electronic communication. In: Carol Chapelle (ed.), Encyclo-
pedia of Applied Linguistics. Hoboken, NJ: Wiley-Blackwell. Preprint:
http://ella.slis.indiana.edu/~herring/e-grammar.2011.pdf
Herring, Susan C. and Asta Zelenkauskaite
2008 Gendered typography: Abbreviation and insertion in Italian iTV SMS. In:
Jason F. Siegel, Traci C. Nagle, Amandine Lorente-Lapole, and Julie Auger
(eds.), IUWPL7: Gender in Language, Classic Questions, New Contexts,
73–92. Bloomington, IN: IULC Publications.
Herring, Susan C. and Asta Zelenkauskaite
2009 Symbolic capital in a virtual heterosexual market: Abbreviation and insertion
in Italian iTV SMS. Written Communication 26(1): 5–31.
Jaffe, Alexandra
2000 Introduction: Non-standard orthography and non-standard speech. Journal of
Sociolinguistics 4(4): 497–513.
Josephson, Olle (ed.)
1997 Svenskan i IT-samhället. [Swedish in IT Society.] Uppsala: Hallgren & Fall-
gren.
Kallmeyer, Werner (ed.)
2000 Sprache und neue Medien. Jahrbuch des Instituts für deutsche Sprache. Ber-
lin/New York: de Gruyter.
Kasesniemi, Eija-Liisa
2003 Mobile Messages: Young People and a New Communication Culture. Tam-
pere: Tampere University Press.
Katsuno, Hirofumi and Christine Yano
2007 Kaomoji and expressivity in a Japanese housewives’s chat room. In: Brenda
Danet and Susan C. Herring (eds.), The Multilingual Internet: Language, Cul-
ture, and Communication Online, 278–300. New York: Oxford University
Press.
Kessler, Florence
2008 Instant Messaging: Eine neue interpersonale Kommunikationsform. Networx
52. http://www.mediensprache.net/networx/networx-52.pdf
Kiesler, Sara, Jane Siegel, and Timothy W. McGuire
1984 Social psychological aspects of computer-mediated communication. American
Psychologist 39(10): 1123–1134.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 483

Kotilainen, Lari
2002 Moi taas, ai äm päk: lauseet, tilanteet ja englanti suomenkielisessä chat-kes-
kustelussa. [Hello again, I’m back: sentences, situations and English in Finnish
chat.] In: Ilona Herlin, Jyrki Kalliokoski, Lari Kotilainen, and Tiina Onikki-
Rantajääsko (eds.), Äidinkielen merkitykset [The Meanings of the Mother
Tongue], 191–209. Helsinki: SKS.
Lakoff, Robin Tolmach
1982 Some of my favorite writers are literate: The mingling of oral and literate strat-
egies in written communication. In: Deborah Tannen (ed.), Spoken and Written
Language: Exploring Orality and Literacy, 239–260. Norwood, NJ: Ablex.
Lee, Carmen K. M.
2007 Linguistic features of email and ICQ instant messaging in Hong Kong. In:
Brenda Danet and Susan C. Herring (eds.), The Multilingual Internet: Lan-
guage, Culture, and Communication Online, 184–208. New York: Oxford Uni-
versity Press.
Ling, Rich
2005 The socio-linguistics of SMS: An analysis of SMS use by a random sample of
Norwegians. In: Rich Ling and Per E. Pedersen (eds.), Mobile Communi-
cations: Renegotiation of the Social Sphere, 335–349. London: Springer.
Luginbühl, Martin
2003 Streiten im Chat. Linguistik Online 15: 70–87.
http://www.linguistik-online.de/15_03/luginbuehl.pdf
Mey, Jacob
2001 Pragmatics: An Introduction, 2nd Ed. Malden, MA: Blackwell.
Murray, Denise E.
1988 Computer-mediated communication: Implications for ESP. English for Spe-
cific Purposes 7: 3–18.
Murray, Denise E.
1990 CmC. English Today 23: 42–46.
Nastri, Jacqueline, Jorge Peña, and Jeffrey T. Hancock
2006 The construction of away messages: A speech act analysis. Journal of Com-
puter-Mediated Communication 10(2).
http://jcmc.indiana.edu/vol11/issue4/nastri.html
Nishimura, Yukiko
2007 Linguistic innovations and interactional features in Japanese BBS communi-
cation. In: Brenda Danet and Susan C. Herring (eds.), The Multilingual Inter-
net: Language, Culture, and Communication Online, 163–183. New York: Ox-
ford University Press.
Östman, Jan-Ola
2004 The postcard as media. Text 24(3): 423–442.
Oxford English Dictionary Online
2008 Emoticon. http://www.oed.com/
Palfreyman, David and Muhamed al Khalil
2007 “A funky language for teenzz to use;” Representing Gulf Arabic in instant
messaging. In: Brenda Danet and Susan C. Herring (eds.), The Multilingual In-
ternet: Language, Culture, and Communication Online, 43–63. New York:
Oxford University Press.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
484 Markus Bieswanger

Pietrini, Daniela
2001 <<X’ 6 :-( ?>>: Gli sms e il trionfo dell’informalità e della scrittura ludica. Ita-
lienisch 46: 92–101.
Raymond, Eric S.
1994 The New Hacker’s Dictionary, 2nd Ed. Cambridge, MA: MIT Press.
Runkehl, Jens, Peter Schlobinski, and Torsten Siever
1998 Sprache und Kommunikation im Internet: Überblick und Analysen. Opladen:
Westdeutscher Verlag.
Sanderson, David W.
1993 Smileys. Sebastopol, CA: O’Reilly.
Schlobinski, Peter
2001 Book review: David Crystal, Language and the Internet.
http://www.mediensprache.net/en/literatur/rezensionen/docs/1452. pdf
Schlobinski, Peter (ed.)
2006 Von “hdl” bis “cul8r”: Sprache und Kommunikation in den neuen Medien.
Mannheim: Dudenverlag.
Schlobinski, Peter, Nadine Fortmann, Olivia Gross, Florian Hogg, Frauke Horstmann, and
Rena Theel
2001 Simsen. Eine Pilotstudie zu sprachlichen und kommunikativen Aspekten in der
SMS-Kommunikation. Networx 22.
http://www.mediensprache.net/networx/networx-22.pdf
Schlobinski, Peter and Thorsten Siever (eds.)
2005 Sprachliche und textuelle Merkmale in Weblogs. Ein internationales Projekt.
Networx 46. http://www.mediensprache.net/networx/networx-46.pdf
Schlobinski, Peter and Manabu Watanabe
2003 SMS-Kommunikation – Deutsch/Japanisch kontrastiv. Eine explorative Stu-
die. Networx 31. http://www.mediensprache.net/networx/networx-31.pdf
Schmitz, Ulrich
2004 Sprache in modernen Medien. Einführung in Tatsachen und Theorien, Themen
und Thesen. Berlin: Erich Schmidt Verlag.
Shirai, Hiromi
2006 Kawaicons: Emoticons im japanischen Chat (?_?). Websprache.
http://www.mediensprache.net/de/websprache/chat/emoticons/kawaic ons.asp
Shortis, Tim
2001 The Language of ICT: Information and Communication Technology. London/
New York: Routledge.
Siebenhaar, Beat
2006 Code choice and code switching in Swiss-German Internet Relay Chat rooms.
Journal of Sociolinguistics 10(4): 481–506.
Siever, Thorsten
2006 Emoticons: Gefühle mit Zeichen. Websprache.
http://www.mediensprache.net/de/websprache/chat/emoticons/
Siever, Torsten, Peter Schlobinski, and Jens Runkehl (eds.)
2005 Websprache.net. Sprache und Kommunikation im Internet. Berlin/New York:
de Gruyter.
Stein, Dieter
2003 Book review: David Crystal, Language and the Internet. Linguistics 41:
158–163.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
Micro-linguistic structural features of computer-mediated communication 485

Su, Hsi-Yao
2007 The multilingual and multiorthographic Taiwan-based Internet: Creative uses
of writing systems on college-affiliated BBSs. In: Brenda Danet and Susan C.
Herring (eds.), The Multilingual Internet: Language, Culture, and Communi-
cation Online, 64–86. New York: Oxford University Press.
Thurlow, Crispin
2006 From statistical panic to moral panic: The metadiscursive construction and
popular exaggeration of new media language in the print media. Journal of
Computer-Mediated Communication 11(3), article 1.
http://jcmc.indiana.edu/vol11/issue3/thurlow.html
Thurlow, Crispin, with Alex Brown
2003 Generation Txt? The sociolinguistics of young people’s text-messaging. Dis-
course Analysis Online 1(1).
http://extra.shu.ac.uk/daol/articles/v1/n1/a3/thurlow2002003-paper.html
Tseliga, Theodora
2007 “It’s all Greeklish to me!” Linguistic and sociocultural perspectives on
Roman-alphabet Greek in asynchronous computer-mediated communication.
In: Brenda Danet and Susan C. Herring (eds.), The Multilingual Internet: Lan-
guage, Culture, and Communication Online, 116–141. New York: Oxford Uni-
versity Press.
Waseleski, Carol
2006 Gender and the use of exclamation points in computer-mediated communi-
cation: An analysis of exclamations posted to two electronic discussion lists.
Journal of Computer-Mediated Communication 11(4), article 6.
http://jcmc.indiana.edu/vol11/issue4/waseleski.html
Weingarten, Rüdiger (ed.)
1997 Sprachwandel durch Computer. Opladen: Westdeutscher Verlag.
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
Witmer, Diane F. and Sandra Lee Katzman
1997 On-line smileys. Does gender make a difference in the use of graphic accents?
Journal of Computer-Mediated Communication 2(4).
http://jcmc.indiana.edu/vol2/issue4/witmer1.html
Wolf, Alecia
2000 Emotional expression online: Gender differences in emoticon use. CyberPsy-
chology and Behavior 3(5): 827–833.
Yang, Chunsheng
2007 Chinese Internet language: A sociolinguistic analysis of adaptations of the
Chinese writing system. Language@Internet 4, article 1. http://www.language
atinternet.org/articles/2007/1142/Yang_Chinese_Internet.pdf
Zelenkauskaite, Asta and Susan C. Herring
2006 Gender encoding of typographical elements in Lithuanian and Croatian IRC.
In: Fay Sudweek and Charles Ess (eds.), Proceedings of Cultural Attitudes To-
wards Technology and Culture 2006, 474–489. Murdoch, Australia: Murdoch
University Press.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
486 Markus Bieswanger

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:16 AM
20. Rhythm and timing in chat room interaction
Rodney H. Jones

1. Introduction

Considerable attention has been paid in pragmatics and related approaches to dis-
course, such as interactional sociolinguistics, conversation analysis, and mediated
discourse analysis, to the role of rhythm and timing in voice-based communi-
cation. In face-to-face interactions and telephone conversation, for example,
people have been found to respond rhythmically to one another in a continuous
manner and are able to perform conversational transactions synchronously through
a shared understanding of timing and transitional signals. Rhythm and timing are
realized paralinguistically through pausing, pacing, and the use of stress and inton-
ation (Couper-Kuhlen and Selting 1996; Erickson 1980) and in face-to-face com-
munication, kinestically, for example through head movement, gesture, and gaze
(Goodwin 2002; Kendon 1974).
Rhythm and timing have been seen to have especially important functions in
the management of turns in conversation. Couper-Kuhlen (1993), for example,
found in a large corpus of British and American data that speech rhythm serves as a
metric for the timing of turn transitions. Goodwin (2002) has shown how prosodic
aspects of speech are used in concert with gesture and posture to create multiple
concurrently relevant temporalities within which participants interactively organ-
ize their interaction. Tannen (1984a, 1989) has observed how rhythmicity and rep-
etition in talk aid in creating coherence in conversations and “involvement” be-
tween participants. Pragmatic studies in cross-cultural communication have shown
that differences among speakers in behaviors such as speech speed, customary tim-
ing of turn-transitional pauses, and timing between periods of talk and periods of
silence can lead to disfluencies and misunderstandings (Hall 1959; Lehtonen and
Sajavaara 1985; Tannen 1984b).
Rhythm and timing are essential elements, not just in the organization and co-
herence of communication that occurs over time (van Leeuwen 2005), but also in
the realization of speech functions and the negotiation of social identities and so-
cial relationships. Studies in interactional sociolinguistics have shown how timing
and rhythm act as contextualization cues, framing utterances in particular ways
(Gumperz 1982), and how they function in meta and phatic communication, pro-
viding information about speakers’ attitudes towards their topics and their inter-
locutors (Tannen 1984a). Timing, rhythm, speed of speech, pausing, stress, and in-
tonation are central ingredients in what Tannen (1984a) has called “conversational
style”.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
490 Rodney H. Jones

The role of rhythm and timing in computer-mediated communication (CMC) –


in particular, in text-based chat – has received less attention. The main reasons for
this have chiefly to do with constraints of the medium. First, because of the re-
duced cues that characterize text based CMC, especially the muting of embodied
modes like gaze and gesture, many ways of managing rhythm and timing used in
“real-life” conversations are simply not available. These visual cues are respon-
sible for most of the direct and immediate feedback about rhythm people get in
face-to-face conversation. With it they regulate their interaction and synchronize
with each other, making constant mutual adjustments based on timing (Mantovani
2001).
Second, even many of the verbal cues we use to organize pacing and turn-tak-
ing in our face-to-face conversations cannot be exploited in computer chat. In most
popular chat programs, including the one I will discuss in this chapter, information
about real-time turn development is not revealed – turns are only transmitted when
users press the enter key. Garcia and Jacobs (1998, 1999) call chat “quasi-syn-
chronous communication”, for while there is a semblance of synchronicity be-
cause turns are constructed in isolation from other participants and only become
accessible once posted, there is not the same immediate and mutual access to ut-
terances-in-production that is characteristic of face-to-face interaction. With the
process of message production separated as it is from message transmission,
choices in turn negotiation are severely limited. Interruptions in the conventional
sense, for example, are impossible (Herring 1999). The meaning of pauses is also
problematic, because a sender has no access to the recipient’s actions until a reply
is posted (Rintel, Pittam, and Mulholland 2003). Extraneous contextual factors
such as typing speed, the speed of the connection, possible technical problems, and
the fact that most chats are part of multiple concurrent activities (Jones 2003) also
make the analysis of the communicative uses of rhythm and timing in chat more
difficult and less reliable.
A particularly important reason for the lack of research on timing in chat is the
fact that most of the data collected in studies of CMC are not really suitable for
analyzing the complex temporal features of multiparty chat (Bays 1998). Most data
consist of text based “histories” or logs of chats which do not take into account the
additional chatting, email, instant messaging, and other communicative activity
that may have been occurring co-terminus with the messages under analysis. Al-
though these transcripts are sometimes marked with the time messages appeared
on the server, this is often not a reliable indicator of the timing actually experi-
enced by users at their screens.
Because of these limitations, less attention has been paid to the strategies users
have developed around rhythm and timing within these constraints, and more has
been paid to designing systems to make the rhythm and timing of computer chat
more like that of face-to-face interaction. Many chat and instant messaging clients
(like MSN Messenger) now have awareness indicators that show when another

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 491

person is typing, and other innovations are being experimented with. Shankar and
her colleagues (2000), for example, propose a way of representing multiparty chat
that is inspired by musical scores. However, such attempts have not become widely
available, and it is questionable how popular they would be if they were.
This chapter argues that users of computer chat have developed ways to exploit
timing and rhythm for a multitude of communicative purposes within even the
most minimalist framework for mutual monitoring. Text-based CMC, as Ben-
Ze’ev (2004) points out, is both lean and rich: lean in the reduced cues it makes
available and rich in the ways participants use these cues to create the strong sense
of intimacy and solidarity associated with what Walther (1996) calls “hyperper-
sonal communication”. Numerous examinations of computer chat have noted the
importance of timing and rhythm in turn-taking and turn construction (see for
example, Bays 1998; de Siqueira and Herring 2009; Markman 2004; Rintel and
Pittman 1997), as well as in the establishment of particular levels of formality in
interaction and the development of feelings of closeness or “presence” between in-
terlocutors (Ben Ze’ev 2004; Donath 2004). Bays (1998), for example, argues that
the desire to maintain a particular rhythm in relation to their interlocutors is a fac-
tor affecting the linguistic construction of turns by users of IRC (Internet Relay
Chat), and de Siqueira and Herring (2009) found that participants in IM (Instant
Messaging) sessions tend to vary the timing of their responses to harmonize with
their interlocutors.
Timing has been found to be important even in asynchronous forms of CMC
such as email. Walther and Tidwell (1995), for example, argue that email com-
munication often depends on “chronemics” or “time-related messages” to convey
non-verbal cues, and they claim that time is an “intrinsic part” of this type of social
interaction conveying meaning and defining the nature and quality of relationships
with others “across multiple levels” (361). Similarly, Kalman et al. (2006), in their
examination of response latencies in asynchronous CMC, noted that response time
occurred with mathematical regularity, with most responses created quickly and
delays in responding resulting in fewer subsequent responses.
In fact, it can be argued that time is even more important in CMC: Precisely be-
cause of some of the reasons mentioned above – the “narrow bandwidth” and re-
duced cues of computer chat – signals such as language, style, timing, and speed of
writing become particularly salient. According to Lea and Spears (1995: 217),
“even first-time users form impressions of other communicants’ dispositions and
personalities based on their communication style”, which, in part, involves re-
sponse time, rhythm, typing speed, and other temporal factors.
This chapter illustrates these issues with a study of the pragmatic uses of
rhythm and timing in interaction among participants in a Hong Kong based gay
chat room. It seeks to show how timing is used as a semiotic resource in the ac-
complishment of particular concrete social actions within the larger social practice
of “fishing” (searching for sexual partners). The data were collected as part of a

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
492 Rodney H. Jones

six-month long ethnographic study of this chat room which involved hiring 20
regular users as “participant-researchers” to help in setting goals and plans for the
research, interviewing, and securing consent from their chat partners and monitor-
ing their own computer use. Participant-researchers also took “screen movies” of
their interactions in the chat room, capturing the temporal aspects of their multiple
concurrent interactions with other users.
The chat room itself uses a Java-based chat client, which allows users to enter a
room with a username and profile that can be changed every time one logs in. Upon
entering, one’s username appears on the list of other current users of the room.
Clicking on a particular name opens a private chat window with that user. Users
can also take part in public chat though the main console, but they rarely do so, pre-
ferring to go directly to private conversations with other occupants of the room.
This particular chat client gives no indication of turns in progress. Participants’
contributions are sent only after the user presses “enter” and are received complete
on their interlocutor’s computer screen within seconds, depending on the speed of
the connection. Users frequently carry on chats with multiple users or attend to
other tasks like checking email or looking at pornography while engaged in chat-
ting.
The data were collected using a software program called Spector, which par-
ticipant-researchers installed on their computers. The program took screen shots of
their computers at fixed intervals of three seconds. The advantages of this kind of
data are, first, that it allows the analyst to experience rhythm and timing in a way
similar to that experienced by the user, and second, that it gives the analyst access
to all of the different activities that might be occupying the user’s time, rather than
relying on individual chat logs isolated from their context. Although taking screen-
shots at three-second intervals (the setting determined to interfere least with the
speed of the users’ computers) limits the precision of our analysis when it comes
to timing, because the time between turns tends to be much longer in chat than
in face-to-face communication (see below), this range of data can at least reveal
general patterns of timing and rhythm that exist in this chat room and suggest areas
where later work can focus.
Different media amplify and constrain users’ orientations towards time and
space in different ways, making some ways of interacting and making meaning
more possible and others less possible (van Leeuwen 2005). At the same time, dif-
ferent activities also presuppose particular orientations towards time and space,
what I have previously referred to as “attention structures” (Jones 2005); different
practices have different rhythms. My concern in this chapter is to show, given the
constraints of this medium, how participants cooperate to produce “shared times”
and “shared rhythms” within which this particular social practice is framed, how
they develop conventions about the meaning of different time-related aspects of
their interaction, and how timing is used to create synchrony and feelings of inti-
macy.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 493

In the particular environment I examined, used primarily for meeting people


for quick sex, rhythm and timing play a crucial role in whether or not one is suc-
cessful in this social practice. Timing is important in the creation of interactional
involvement and the discursive construction of desire. It plays a role in the power
users exercise over each other and in the kinds of mutual pleasure that they share.
The “literate” practice of searching for sexual partners in this chat room requires
understanding not just what individual messages mean but also the proper pro-
cedures with which they are to be delivered within the chronological framework of
the activity.

2. Timing and attention

One of the most important features of the interaction investigated here is that it is
extremely instrumental, i.e., directed towards the goal of sexual contact. Interac-
tants are sometimes quite efficient in their pursuit of this goal: When asked how
long the interval between making online contact with a potential partner and final-
izing plans for actually meeting up for sex might be, one participant said, “very
short … perhaps as short as a few minutes”. The second important feature of this
kind of interaction is that it is intensely competitive. In the “marketplace” (ten
Have 2000) of the chat room, users constantly compete for “interactional time”
with other users who might want to engage the same target, and, at the same time,
they distribute their own time and attentional resources among a number of differ-
ent targets.
This marketplace, then, operates according to a strict “attention economy”
(Lankshear and Knobel 2002), where the most valuable asset is the attention of
others, and the investment one makes to gain it is paying attention back to them.
The issue of attention goes much deeper here than sexual attraction. Back in 1951,
Reusch and Bateson wrote that the foundation of all social situations is some form
of mutual perception. The form this mutual perception takes determines how we
enact social presence, display our attentional state, and frame the kinds of activities
we are involved in. In face-to-face conversation, both speaker and hearer must ac-
tively respond to what transpires by signalling involvement, either directly through
words or indirectly through gestures or similar non-verbal signals like gaze, pos-
ture, and bodily alignment (Tannen 1989). However, in CMC, in which non-verbal
bodily cues are not available, the “state of talk” becomes more tenuous; only when
one’s message is visible in the scrolling text window does one truly “exist” in the
conversation. Therefore, the only way users have to be present to their interlocu-
tors and communicate attention or involvement is by replying to them within a par-
ticular period of time. Similarly, through interpreting their timing (in particular
the time between turns), users make judgements about their interlocutors’ social
presence, social activity, and attentional state.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
494 Rodney H. Jones

Timing therefore has an important interpersonal function in this type of inter-


action, the length of pauses between turns usually showing involvement and inter-
est or “seriousness” about continuing the interaction. Shorter pauses often show a
higher degree of interest and attention, while longer pauses usually communicate a
lack of interest or even a lack of “presence” in the conversation, and often result in
interactions being terminated. Of course, as I will show later, what counts as
“short” and “long” can vary considerably across contexts and even across different
stages of a single conversation, with pause length taking on different pragmatic
functions.
The importance of the length of pauses between turns is testified to by how sen-
sitive users themselves are to it. One participant stated: “long delays without re-
sponse are generally interpreted as ‘he is ignoring me …’.” Another said:
I basically cannot tolerate any silence for more than 2–3 minutes. Those who fail to re-
spond within 3 minutes, I will assume that they are not interested in carrying on the con-
versation. Those who respond promptly I will see that as a sign of their interest and good
integrity. I also tend to use their response time to see how serious they are in making a
conversation.
Here, the interpersonal function of timing extends to making judgements not just
about one’s interlocutor’s attitude but also about his character (“integrity”). Time,
however, is relative; how long “too long” is depends on a number of factors, in-
cluding the personality and psychological state of the user and the desirability of
his target. As one participant put it:
If I am really horny at that moment, I would say reply within 10 seconds is acceptable. if
more than that, I would guess the guy is no longer interested in me, unless he told me to
wait. If I am not truly horny, just want to fool around in the chat room, replying within
15 to 20 secs is acceptable.
Another stated:
It depends on my mood … but I also try to imagine what might be happening at the other
end, like multiple chat, organizing the desktop, might be away from the computer. Also
try to factor in how long it would take me to respond etc. To put a time on it … maybe a
minimum of 5 seconds through to [sic] minutes but no longer than 3 minutes.
As can be seen in these statements, what is considered an acceptable length of a
pause between turns is highly variable, ranging from 10 seconds to three minutes.
This relativity in time can lead to misunderstandings when two users do not share
the same sets of expectations, or when delays that result from typing difficulty or
the other user momentarily leaving his computer are misinterpreted as rejection.
Garcia and Jacobs (1998), in their analysis of timing and sequencing distortions in
chat, found that a significant portion of chat turns were used to clear up confusion
caused by prior turns (see also Smith and Burkhalter 2000). In the activity type I am
considering, however, such repairs are not as common, since misunderstandings
almost always end with interactions being terminated. This means that the devel-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 495

opment of interactional synchrony (see below) fairly early on in these encounters


is particularly important.
One thing that must be remembered when thinking about how timing is used to
maintain conversational involvement is the lag time in CMC between when utter-
ances are initiated and when they are actually received. According to Walther
(1996), it takes four to five times longer to exchange CMC messages than to ex-
change messages in face-to-face conversation. Users adapt to the peculiarities of
turn taking that the media imposes by being sensitive to the “lag time”, understand-
ing, for instance, that, if two turns appear within one second of each other, it is
probably clear that the second turn was not intended to be a reply to the first (Her-
ring 1999).
Faced with the demands of “being present” for one’s interlocutor (or perhaps
several interlocutors) and sustaining the interaction, participants tended to employ
the strategy of making their turns short, allowing for more rapid exchanges. Most
turns in my data are from one to four words long. When participants have some-
thing longer to say, they usually break it up across several consecutive turns. The
rapid back and forth that characterizes (successful) chats often also involves the use
of filler terms like “o” and “ic” to mark users’ rhythmic place in the conversation at
times when they cannot think of anything to say or they wish to shift the onus to the
other user to introduce the next topic. These short turns are a common characteristic
of “multitasking” in which people manage diverse demands on their time and at-
tention with brief and irregular responses (Jacobson 1999). The length of contribu-
tions in such situations is restricted by what Millard (1997: 159) calls “chrono-
economic stress”, defined in terms of the user’s awareness of the limits to the com-
municative resources (time, attention, bandwidth) that can be devoted to any given
exchange.
A typical conversation can be seen in example 1, in which each line signifies
the passing of three seconds, the intervals at which the software was set to take
screenshots, and in which the unnamed user (indicated with >) is the user from
whose computer the screenshots were taken.

(1)
20:02:46 >hey ma n how r u
20:02:50
20:02:53 <muscular bi>fine
20:02:56 <muscular bi>stat?
>r u gam?
20:03:00 <muscular bi>yup
20:03:03
20:03:06
20:03:10 >gwm 38 5’8 80kg stocky fit tanned smooth cut thick vers1
20:03:13 >married?

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
496 Rodney H. Jones

20:03:16 <muscular bi>yes


20:03:20 >nice
20:03:23 >yr stats
<muscular bi>top/btm?
20:03:27
20:03:30 >vers more top
>u
20:03:33
20:03:37
20:03:40
20:03:43 <muscular bi>31/5’10/149
20:03:47 (move window)
20:03:50 <muscular bi>vers
>mmm nice
20:03:53
20:03:57 <muscular bi>more btm
>do u work out

As can be seen, participants take short, rapid turns with pauses between turns
usually no longer than six seconds. Longer pauses do occur, notably after partici-
pants are asked for their “stats” (self description involving age, weight and height,
and sometimes other relevant information about physical appearance), primarily
because these responses tend to take a bit longer to type, especially if they are elab-
orated upon (as in: “gwm 38 5’8 stocky fit tanned smooth cut thick vers”1). Most
turns consist of one to four words. The string of descriptors: “gwm 38 5’8 stocky fit
tanned smooth cut thick vers” is unusually long, not only creating a slight inter-
ruption in the rhythm of the conversation but also creating implicature, communi-
cating particular involvement, cooperation, and interest.
As the interaction progresses, however, this rhythmic pattern begins to break
down. At 20:30:23, a slight disfluency occurs when both parties ask a question of
each other at the same time. Such an occurrence in itself is not particularly prob-
lematic – users are used to them, and the initiator of the chat immediately com-
pensates by changing his discourse position (from questioner to answerer) and
answering muscular bi’s question before muscular bi finally answers his. What is
notable, though, is that while the first response comes within six seconds of the
question, the response from muscular bi comes more than fifteen seconds after the
question.
Finally, muscular bi does not respond to the question “do u work out” (example
2). After waiting around 20 seconds, his interlocutor makes another attempt to eli-
cit a response by asking a different question, “any pic?”, after which he waits an-
other 33 seconds or so before issuing a more explicit prompt, “hello”, and then
after approximately 30 more seconds finally gives up.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 497

(2)
20:04:00
20:04:04
20:04:07
20:04:10
20:04:14
20:04:17
20:04:20 >any pic?
20:04:24
20:04:27
20:04:31
20:04:34
20:04:37
20:04:41
20:04:44
20:04:47
20:04:51
20:04:54
20:04:58 >hello
20:05:01
20:05:04
20:05:08
20:05:11
20:05:14
20:05:18
20:05:21
20:05:24
20:05:28
20:05:31 (close window)

One might ask why muscular bi does not terminate the conversation himself
if he is not interested. One can never be sure, however, if such pauses indicate a
lack of interest or are due to other extraneous circumstances (the user may be
answering a phone call or attending to chats with other – perhaps more desir-
able – partners). At the same time, this strategy of showing lack of interest is a
particularly prevalent means of rejection. The preference for this means of ter-
mination, rather than the less popular “sorry”, “gotta go”, or “not my type”,
comes from the fundamental difficulty involved in “ending” characteristic of
all communication (Schegloff and Sacks 1973), magnified by the even more
“face threatening” nature of termination of this particular kind of interaction.
In the entire corpus of chats collected, 86% are terminated without any closing
ritual.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
498 Rodney H. Jones

At the same time, very short pauses can communicate intense interest. Just as in
face-to-face conversation, people have different “conversational styles” (Tannen
1984a), and one aspect of style has to do with how much (and how) one shows in-
volvement. Showing involvement in computer chat, as in face-to-face conver-
sation, often includes talking a lot and taking shorter pauses between turns. Tannen
(1984a) calls this “high involvement style”, and, aside from shorter pauses, it also
includes features such as more frequent questions and, in face-to-face conver-
sation, paralinguistic, proxemic, and gestural characteristics.
As I have already mentioned, most conversations in this chat room seem to be
characterized by “high involvement”, when they are progressing successfully, that
is; interactions not showing such involvement usually do not last. There are in-
stances, however, in which this involvement is even more pronounced. The main
feature of this “hyper-involvement” style is when a user issues a rapid series of
consecutive turns without waiting for a reply, as in example 3.

(3)
09:20:26 <LeanFit>nice stats
09:20:30 <LeanFit>i like
09:20:34 <LeanFit>i am lean fit here
09:20:38 >ic
<LeanFit>looking for?
09:20:42 >any
09:20:46 <LeanFit>I look for
09:20:50
09:20:55 <LeanFit>regular gay sex buddy
09:20:59 <LeanFit>ok to u?
09:21:03
09:21:07 <LeanFit>but
>sure
>but what
09:21:11 <LeanFit>we can swim together
09:21:15 >haha
<LeamFit>and have sex
09:21:19 <LeanFit>ok to u?
09:21:23 <LeanFit>hei
09:21:27 >why not
09:21:31 <LeanFit>wanna try swim at night in beach with me?
09:21:36
09:21:40 >i wanna to go this afternoon
09:21:44 <LeanFit>sure
09:21:48
09:21:52 <LeanFit>where shall we go?

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 499

09:21:56 <LeanFit>pool?
09:22:00 <LeanFit>where u live?
In this example, LeanFit’s contributions come at the rate of one every 5.7 seconds,
and most intervals are three seconds or less. In the space of the one minute 26 sec-
onds of this excerpt, LeanFit takes 15 turns, while his interlocutor takes six. This
strategy not only gives the user a way to highlight his attention towards his inter-
locutor, but also a way of keeping the interlocutor’s attention by continually “re-
freshing” his presence on his interlocutor’s screen. One’s use of such a rhythmic
strategy, as in face-to-face conversation, can affect others’ perception of one’s
character; users who have different conversational styles might interpret such
strategies as “friendly”, or as “pushy” or “desperate” (Tannen 1984a).
This use of rapid, consecutive turns also has the function of maintaining pres-
ence by avoiding the longer pauses that might ensue when longer stretches of in-
formation need to be given, such as “stats”. In example 4, for instance, hot fun
divides his “stats” into five turns.
(4)
20:26:11 > ur stats
20:26:15
20:26:18 <hot fun> 21
20:26:25 <hot fun> 180 cm
20:26:28 <hot fun> 150lbs
20:26:31 <hot fun> 30 w
20:26:35 <hot fun> 41 c
This rhythmic incremental release of information, however, can also serve another
function, that of introducing “suspense” into the process of seduction. Here,
rhythm plays a crucial role in the game of revealing and withholding information
to maximize involvement from one’s interlocutor (van Leewuen 2005). Hot fun’s
incremental release of his statistics becomes a kind of “textual striptease” (Barthes
1975) that heightens desire by heightening anticipation of the next, partial revel-
ation. A similar strategy is used by Naked Sleeper when he describes what he likes
to do in bed (example 5).
(5)
20:38:37 >what do u like to do in sex?
20:38:42
20:38:47
20:38:52 <Naked Sleeper> kissing
20:38:57 <Naked Sleeper> oral
20:39:02 <Naked Sleeper> fucking

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
500 Rodney H. Jones

3. Conversational management

I do not mean to suggest that long pauses always show lack of interest or result in
interactions being terminated. It depends very much on where these pauses occur
in the conversation. Conversations are not mono rhythmic – they develop through
many changes in rhythm and, as in face-to-face conversations, these changes of
rhythm and shifts in tempo are often meaningful.
In fact, the average time between turns in my data is 30–39 seconds, which
does not seem consistent with the rapid turn-taking in the examples above. This is
because these interactions tend to follow a pattern of “bursts” and “breaks”, in
which chunks of rapid interaction are interspersed with sometimes quite lengthy
breaks. Within these “bursts” of interaction the average time between turns is 3–9
seconds.
This segmentation of the conversation is by no means random. These bursts
and breaks take place in the context of an interactional format which progresses
through a fairly predictable set of stages made up primarily of question/answer ad-
jacency pairs (the exchange of information about physical appearance, sharing of
other information such as location and availability, the exchange of pictures, or the
making of arrangements to meet). Each stage tends to take place in one burst, with
breaks tending to occur between stages. The initial burst usually involves the ex-
change of information about physical appearance, the second stage usually in-
volves further sharing of information (such as location and availability), the third
involves the exchange of pictures, and the next involves arrangements to meet and
often the exchange of telephone numbers. Breaks often serve to mark the transition
to a new topic or new stage in the interaction. When they occur in between two
halves of an adjacency pair or an offer of information and a reaction to it, they can
create implicature that is interpreted sometimes as deliberation, sometimes as lack
of interest, and sometimes as rudeness. Example 6 illustrates a typical pattern. In
the first burst participants share information about what they are seeking and
physical appearance.

(6)
20:20:23 <nice gam> hihi
20:20:27 > hi
20:20:30 <nice gam> u lk for?
20:20:33
20:20:37 >friends or fun
20:20:40 >u?
20:20:43 <nice gam> anything
20:20:47 > great
20:20:50 <nice gam> stats?
20:20:53

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 501

20:20:57
20:21:00 > 36/6’/160
20:21:03 <nice gam> nice stats
20:21:07 <nice gam> u gwm
20:21:10 > yup
20:21:13 > ur stats?
20:21:17
20:21:20 <nice gam> 21/5/11/130
20:21:24 > nice
Then after a break of about 20 seconds they talk about where they live (example 7).
This exchange is followed by another break, also around 20 seconds long.
(7)
20:21:27
20:21:34
20:21:37
20:21:40
20:21:44
20:21:47
20:21:50
20:21:54 <nice gam> live alone
20:21:57 > yes
20:22:00 <nice gam> where
20:22:04 > Tai Po
20:22:07 <nice gam> ic
20:22:11 <nice gam> quite close
20:22:14
20:22:17
20:22:21
20:22:24
20:22:27
After this the exchange of pictures is negotiated. The final break occurs after users
exchange picture links, to give participants a chance to visit the respective sites and
evaluate the pictures (example 8).
(8)
20:23:31 <nice gam> pic
20:22:34 > for trade
20:22:37 <nice gam> email or link
20:22:41 > link
20:22:44 >urs?
20:22:47 <nice gam> my link is piclink.com/xxxxx/

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
502 Rodney H. Jones

20:22:51
20:22:54 > picturetrail.com/YYYYY
20:22:57
20:23:01
20:23:04
20:23:07
20:23:11
20:23:14
20:23:18 <nice gam> nice pic
20:23:21 > thanks
This patterning gives users a way to manage and signal the accomplishment of
these different stages of the interaction. It also helps them to manage multiple in-
teractions strategically, the breaks giving users time to engage with other interlocu-
tors, as well as to prioritize different interactions based on the stages they have
reached and the likelihood of them progressing to subsequent stages.

4. Polychronicity and conversational synchrony

As noted before, one thing that characterizes this activity is a high degree of poly-
chronicity. Users often engage in conversations with multiple interlocutors in order
to maximize their chances of success. These multiple, simultaneous interactions do
not proceed at the same pace. Some are slower, and some are faster. Each thread
of conversation follows its own rhythm, “yet [they] are perfectly coordinated with
each other as they weave in and out without ever colliding” (van Leeuwen 2005:
194).
Several factors serve to facilitate these multiple concurrent interactions. First,
the alternation between bursts and breaks makes it easier for users to toggle from
one interaction to another. Second, interlocutors tend to synchronize their rhythm
with the person they are talking to. Such “conversational synchrony” has been
widely noted in face-to-face conversation (Hall 1959; Kendon 1974; Scollon 1982).
Erickson (1980) has shown, for example, that in ordinary talk people speak to each
other in a regular meter of regular beats and time their entrances and exits to the
rhythm of these beats. As Capra (1982: 300, 302) notes, “Human communication
[…] takes place to a significant extent through the synchronization and interlocking
of individual rhythms[, … and] opposition, antipathy, and disharmony will arise
when the rhythms of two individuals are out of synchrony”. This also seems to be
the case in computer-mediated interaction; de Siqueira and Herring (2009), for
example, in their study of dyadic IM (Instant Messaging) conversations, found that
some users attempt to achieve conversational synchrony by adjusting the rhythm
and timing of their contributions to fit the temporal styles of their interlocutors.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 503

Example 9 shows a user engaging in four different conversations at once (one


conversation per column), each conversation proceeding at a different rhythm. In
this short segment, for example, the conversation with Lean Fit proceeds more
quickly than that with Sporty Stylish, which proceeds more quickly than those
with Gymfit built btm and tanguy. Each conversation, however, seems to have its
own fairly consistent pace.

(9)
LeanFit SportStylish Gymfit built btm tanguy
09:26:20 >with family <tanguy>alone?
>clerial
09:26:24 >u
09:26:28 <LeanFit>icic >what time u <Gymfit built
go today btm>have icq
number?
09:26:32 <LeanFit>bank >no
clerk here
09:26:36 >ic
09:26:41 <LeanFit>hei
09:26:45 <LeanFit>u fit <SportStylish> >yes, but not open
too? what col of now
your speedo?
09:26:49 <SportStylish>
maybe 1100
09:26:53 >medium
09:26:57 <LeanFit>icic
09:27:01 >arrive??
09:27:05 >mind? <SportStylish>
around
09:27:10 >where u live
09:27:14 <LeanFit>u do <tanguy>me no
exercises? 2
09:27:18 >no now
09:27:22 >no money
09:27:26 <SportStylish> >ic
hung hom. u?

It is also important to remember that these interactions are not just coterminous
but also competitive, and not all participants are equally successful in maintaining
the attention of their interlocutor. The relative pace of the interactions, therefore,
can be an indication of how successfully they are progressing and can also tell us
something about which party is more in control of the interaction.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
504 Rodney H. Jones

In example 10, the user begins an engagement with an interlocutor called chris-
boi. While he is waiting for chrisboi to respond, he answers the invitation of AC
Reloaded, returns to chrisboi with a reaction to his information, and then answers
AC reloaded’s question before initiating another sequence with chrisboi.
(10)
20:19:06
20:19:09 >8” here
20:19:13
20:19:16
20:19:19 <AC Reloaded>hello
20:19:23 <chrisboi in central>cool
20:19:26 <chrisboi in central>6.5 here >yo
maybe <AC Reloaded>care for a chat?
20:19:29 >sure
>r u gam?
20:19:33 <AC Reloaded>how’s going man?
20:19:36 >lol
20:19:39 >sounds nice
20:19:43
20:19:46 <AC Reloaded>yeah I am
20:19:50 >horny n u
20:19:53
20:19:56 >r u top or btm
20:20:00 <AC Reloaded>so am I
20:20:03 <chrisboi in central>am vers top
20:20:06 <chrisboi in central>u?
As chrisboi begins to be more forthcoming in his responses, the user pays more at-
tention to that conversation and less attention to AC reloaded (example 11).
(11)
20:20:10 >nice i am vers
20:20:13 <chrisboi in central>ur stats btw?
20:20:16
20:20:20
20:20:23
20:20:27 >gwm 28 6’ 78kg 44c 32w 8 cut
thick vers
20:20:30
20:20:33 <AC Reloaded>care to intro?
20:20:37 >mmm
20:20:40

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 505

20:20:43
20:20:47 <chrisboi in central>cool … >gwm 28 6’ 78kg 44c 32w 8 cut
sounds hot thick vers
20:20:50 >do u work out
20:20:53 <chrisboi in central>where are u <AC Reloaded>wow
from?
20:20:57
20:21:00
20:21:03 <AC Reloaded>8” that’s a very
nice size
20:21:07 >Melbourne
20:21:10 >u
20:21:13
20:21:17
20:21:20
20:21:24 <chrisboi in central>not really …
so am not mascular or anything …
but what u see in the pics is what u
get
20:21:27 <chrisboi in central>from Tokyo
20:21:34 >ok nice
20:21:37
20:21:40
20:21:44
Later, as the interaction with chrisboy heats up even more, AC reloaded gets
only a minimal response (“tks” means thanks), before being completely ignored.
At the end AC reloaded says, “Anyway I think you must be pretty occupied
at the moment, sorry for the intrusion” and terminates the interaction (example
12).
(12)
20:21:47 >well I dont see al that I will get
20:21:50 >lol
20:21:54 >tks
20:21:57 <chrisboi in central>lol
20:22:00
20:22:04 <AC Reloaded>no prob
20:22:07 >do ulive here or r u visiting
20:22:11
20:22:14
20:22:17 <chrisboi in central>i live here
20:22:21 >same

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
506 Rodney H. Jones

20:22:24 <chrisboi in central>have lived


here over 2 years now
20:22:27 >k
20:22:31
20:22:34 >I just moved in 3 months ago
20:22:37
20:22:41
20:22:44 >wot u into? <AC Reloaded>anyway I think u
must be pretty occupied at the mo-
ment, sorry for the intrusion
An important difference between these two conversations is not just timing, but the
interactional roles the participants are playing. With chrisboi, the user is the one
who initiates most of the sequences, asking questions and taking rapid consecutive
turns to show interest. In the other conversation, AC reloaded initiates the se-
quences, which are answered mostly with minimal responses.

5. Timing, social identity, and power

As can be seen from the examples above, timing and rhythm are not just a matter of
conversational synchrony, but also a matter of interactional roles and social power.
The way timing is managed affects and is affected by the degree of “desirability”
the user is able to project through the relative “market value” of different personal
and physical attributes within this community and how “desirable” he perceives
his interlocutor to be. Some people, as a consequence of their perceived market
value, are less willing to wait, while others who are not so desirable are forced to
wait longer for responses. In fact, it is sometimes by taking longer pauses that users
signal their desirability and power.
In example 13, after try has given his “stats”, the user replies with his own
“stats”, breaking them up into three consecutive turns, not, as in the above
examples, to create suspense and desirability, but rather, because the last bit of in-
formation, the user’s weight, marks him as having less “market value” than his in-
terlocutor.
(13)
20:20:06 <try> I am aged 23, 130 lbs, 5;11“ how about u?
20:20:10
20:20:13 > I am 23 also
20:20:16 >178 cm
20:20:20 >190 lbs
20:20:23
20:20:27

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 507

20:20:30
20:20:33
20:20:37
20:20:40
20:20:43
20:20:47
20:20:50
20:20:53
20:20:57
20:21:00
20:21:03 <try> ic

After revealing this potentially discrediting information, he waits around 25 sec-


onds before try finally replies with “ic”, an ambiguous response, which sometimes
signals a coming rejection. The user replies to this with the question, “do I scare
you?” (example 14).

(14)
20:21:07
20:21:10 > do I scare you?
20:21:13
(Three minutes and nine seconds elapse.)

He then waits more than three minutes for try finally to respond again (example
15).

(15)
20:24:04
20:24:08 <try> honestly, yes but I hope you don’t mind
20:24:11 > it’s ok
20:24:14 > at least you are willing to tell me
20:24:18 <try> I think you should join a weight loss program
20:24:21

The way this particular user described in a subsequent interview his expectations
about timing contrasts sharply with the participants quoted above, who considered
10 to 15 seconds between turns reasonable. He explained:
I think I am a patient guy, I am always willing to wait. There is no time limit for me to
wait. I have tried before, there is guy in the chat room talking to me, after knowing my
size, he doesn’t reply, and I just wait for him till I turn off the computer, but still no re-
sponse. But I think it’s ok, as no matter he replies or not, it won’t disturb me. In fact, I
have so much experience of having delays, no matter long or short. Every time, if no re-
plying for a long time, I will type “are you here?”, “busy?”, “do I scare you?”, but most
of the time, they won’t reply.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
508 Rodney H. Jones

This example reminds us that conversational style is not simply a matter of per-
sonal psychological disposition or group norms, it is also often a matter of power
and ideology. Different sets of rhythmic expectations either consciously or uncon-
sciously become submerged into the “historical bodies” (Jones 2005) of users
through sustained interaction in a particular kind of social environment and in re-
sponse to the values the environment reflects and the possibilities it makes avail-
able to different kinds of people.

6. Timing and pleasure

Finally, I would like to suggest that rhythm and timing serve not just to help users
manage their conversations and judge the relative interest of their interlocutors, but
that they also play a fundamental role in the pleasure participants take in this ac-
tivity.
When chatting, users not only synchronize their rhythms to the multiple
rhythms of their interlocutors, but they also build up their own personal rhythms
(see also de Siquera and Herring 2009), characterized by almost constant rhythmic
activity. Even when they are engaged in just one or two interactions, users are
rarely idle: While waiting for responses from others, they fill in the time, either
chatting with someone else, scrolling though the list of names in the chat room for
new possibilities, surfing the web, answering their email, or playing games. Thus,
while the pace of each individual conversation might be much slower than most
face-to-face encounters, this multitasking gives to this activity a constant, rapid,
rhythmic character.
According to Chapple (1982), in face-to-face conversation, people associate
feelings of pleasure and well-being with the rhythmicity of the interaction. Eve
(2004) suggests that computer chat, with its rapid alternation of sending and re-
ceiving messages, also creates similar feelings in users. In interviews, several par-
ticipants noted how “absorbing” and even “addictive” this activity of chatting with
multiple prospective sexual partners could be. “Once you get into it”, one said, “it
can be hard to stop”. Another noted, “I tend to lose [sic] track of time. Two or three
hours can pass, and I don’t even realize it”.
Csikszentmihalyi (1982) refers to this phenomenon of becoming “lost” in an
activity as “flow”, a state in which a person loses “self-consciousness” and a sense
of time, focusing on “the present, blocking out the past and the future” (38). Others
(Trevino and Webster 1992; Webster, Trevino, and Ryan 1993) have evoked Csiks-
zentmihalyi’s theory not just to explain the pleasure people associate with CMC
but also the heightened sense of presence the medium creates, despite the reduced
cues it makes available.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 509

7. Conclusion

The main point of this chapter is that, despite the many extraneous factors that
might affect rhythm in computer-mediated interaction, timing and rhythm can have
important pragmatic functions in this medium, especially for certain communities
of users engaged in focused activities, for functions such as showing involvement
and interest, and for creating conversational implicature, managing and signaling
different stages in the interaction, and negotiating power relations. It may also play
a role in the enjoyment users experience in the activity of chatting.
I do not wish to suggest that timing is equally important or used in the same
way in all CMC or even in all chat-based environments; indeed, because of its im-
portant role in communicating desire, attractiveness, and seduction, timing may
take on a heightened importance in the kinds of interactions I have been describ-
ing – just as in face-to-face interaction, timing is used differently and takes on dif-
ferent meanings in different communicative contexts.
It is both the “bodily” nature of this communicative context, which makes tim-
ing so important, and rhythm and timing that make the experience of the context
more of an “embodied” one for users. Rhythm, van Leewuen (2005) points out,
provides an important link between semiotic articulation and the body; it con-
tributes not just to organizing communicative events, but also to vitalizing them,
allowing, in the case of these conversations, users to reach very high levels of em-
pathy and intimacy in a shorter time as compared to face-to-face communication.
In many ways, social identities online are very much “identities of rhythm” (Capra
1982).
Future work in this area should include more studies of the timing of turn-tak-
ing in computer chat, integrating quantitative and statistical methods (see, e.g., de
Siqueira and Herring 2009; Kalman et al. 2006), as well as pragmatic and conver-
sation analytic studies of the effects of timing on the conduct of conversation and
the negotiation of meaning. It should also focus more on the specific rhythmic pat-
terns that develop in particular genres of CMC and in particular activity types
(comparing, for example, task-oriented interaction with casual interaction). Fin-
ally, more work needs to be done on the psychological and relational effects of
rhythmicity in computer-mediated interaction, not just in chat, but also in other
types of online interaction such as multiplayer games.
Timing is an analytical site where issues of involvement, attention, pleasure,
and power converge. As Prior and Shipka (2003: 230–231) argue, timing is central
in all interactions for “the production of embodied chronotropes, the production of
a lifeworld with a certain tone and feel, populated by a certain people and their
ideas, calibrated to a certain rhythm”. Different media, with the different “attention
structures” (Jones 2003, 2005) they make available to users, affect the kinds of re-
lationships and “lifeworlds” users are able to enter into and the kinds of meanings
that can be made.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
510 Rodney H. Jones

Note

1. Versatile (abbreviated vers) means able to participate as an active or passive partner in


anal sex.

References

Barthes, Roland
1975 The Pleasure of the Text, trans. Richard Howard. New York: Hill and Wang.
Bays, Hillary
1998 Framing and face in Internet exchanges: A socio-cognitive approach. Linguis-
tik Online 1. http://www.linguistik-online.de/bays.htm
Ben-Ze’ev, Aaron
2004 Love Online: Emotions on the Internet. Cambridge, UK: Cambridge Univer-
sity Press.
Capra, Fritjof
1982 The Turning Point. New York: Simon and Schuster.
Chapple, Eliot D.
1982 Movement and sound: The musical language of body rhythms in interaction.
In: Martha Davis (ed.), Interaction Rhythms, 28–50. New York: Human
Sciences Press.
Clore, Gerald C. and Karen Gasper
2000 Feeling is believing: Some affective influences on belief. In: Nico H. Frijda,
Antony S. R. Manstead, and Sacha Bem (eds.), Emotions and Beliefs: How
Feelings Influence Thoughts, 10–44. Paris/Cambridge: Editions de la Maison
des Sciences de l’Homme and Cambridge University Press.
Couper-Kuhlen, Elizabeth
1993 English Speech Rhythm: Form and Function in Everyday Verbal Interaction.
Amsterdam/Philadelphia: John Benjamins.
Couper-Kuhlen, Elizabeth and Margaret Selting (eds.)
1996 Prosody in Conversation: Interactional Studies. New York: Cambridge Uni-
versity Press.
Csikszentmihalyi, Mihaly
1982 Beyond Boredom and Anxiety. San Francisco, CA: Jossey and Bass.
de Siqueira, Amaury and Susan C. Herring
2009 Temporal patterns in student-advisor Instant Messaging exchanges: Individual
variation and accommodation. In: Proceedings of the Forty-Second Hawai’i
International Conference on System Sciences. Los Alamitos, CA: IEEE Press.
Donath, Judith
2004 Sociable media. In: William Sims Bainbridge (ed.), The Berkshire Encyclo-
paedia of Human-Computer Interaction, 631–32. Great Barrington, MA:
Berkshire Publishing Group.
Erickson, Frederick
1980 Timing and context in everyday discourse: Implications for the study of refer-
ential and social meaning. Sociolinguistic Working Paper Number 67. Austin,
TX: Southwest Educational Development Laboratory.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 511

Eve, Robin
2004 Rhythm in interaction. Research Journal of the School of Environmental
Studies, Himeji Institute of Technology 6: 191–200.
Garcia, Angela C. and Jennifer B. Jacobs
1998 The interactional organization of computer mediated communication in the
college classroom. Qualitative Sociology 21(3): 299–317.
Garcia, Angela C. and Jennifer B. Jacobs
1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer-mediated communication. Research on Language and So-
cial Interaction 32: 337–367.
Goodwin, Charles
2002 Time in action. Current Anthropology 43: S19–S35. (Supplement August–Oc-
tober 2002, Special issue on Repertoires of Timekeeping in Anthropology,
Andre Gingrich, Elinor Ochs, and Alan Swedlund, eds.
Gumperz, John
1982 Discourse Strategies. Cambridge, UK: Cambridge University Press.
Hall, Edward T.
1959 The Silent Language. New York: Doubleday.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Jacobson, David
1999 Impression formation in cyberspace: Online expectations and offline experi-
ences in text-based virtual communities. Journal of Computer-Mediated Com-
munication 5(1). http://jcmc.indiana.edu/vol5/issue1/jacobson.html
Jones, Rodney
2003 Inter-activity: How new media can help us understand old media. Paper pres-
ented at the International Conference of Historical Linguistics, Copenhagen,
August 11–15.
Jones, Rodney
2005 Sites of engagement as sites of attention: Time, space and culture in electronic
discourse. In: Sigrid Norris and Rodney Jones (eds.), Discourse in Action: In-
troducing Mediated Discourse Analysis, 144–154. London: Routledge.
Kalman, Yoram M., Gilad Ravid, Daphne. R. Raban, and Sheizaf Rafaeli
2006 Pauses and response latencies: A chronemic analysis of asynchronous CMC.
Journal of Computer-Mediated Communication 12(1). http://jcmc.indiana.
edu/vol12/issue1/kalman.html
Kendon, Adam
1974 Movement coordination in social interaction. In: Shirley Weitz (ed.), Nonver-
bal Communication, 150–68. New York: Oxford University Press.
Lankshear, Colin and Michele Knobel
2002 Do we have your attention? New literacies, digital technologies and the edu-
cation of adolescents. In: Donna E. Alverman (ed.), Adolescents and Literacies
in a Digital World, 19–39. New York: Peter Lang.
Lea, Martin and Russell Spears
1995 Love at first byte? Building personal relationships over computer networks. In:
Julia T. Wood and Steve Duck (eds.), Under-studied Relationships: Off the
Beaten Track, 197–233. Thousand Oaks, CA: Sage.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
512 Rodney H. Jones

Lehtonen, Jaakko and Kari Sajavaara


1985 The silent Finn. In Deborah Tannen and Muriel Saville-Troike (eds.), Perspec-
tives on Silence, 193–201. Norwood, NJ: Ablex.
Mantovani, Fabrizia
2001 Cyber-attraction: The emergence of computer-mediated communication in the
development of interpersonal relationships. In: Luigi Anolli, Rita Ciceri, and
Giuseppe Riva (eds.), Say Not to Say: New Perspectives on Miscommuni-
cation, 229–245. Amsterdam: IOS Press.
Markman, Kris
2004 To send or not to send: Turn construction in computer-mediated chat. Texas
Linguistics Forum 48: 115–124.
Millard, William B.
1997 I flamed Freud: A case study in teletextual incendiarism. In: David Porter (ed.),
Internet Culture, 145–159. New York: Routledge.
Prior, Paul and Jody Shipka
2003 Chronotopic lamination: Tracing the contours of literate activities. In: Charles
Bazerman and David Russell (eds.), Writing Selves/Writing Societies: Re-
search from Activity Perspectives, 182–238. Fort Collins, CO: The WAC
Clearinghouse and Mind, Culture, and Activity.
Rintel, Sean E. and Jeffery Pittam
1997 Strangers in a strange land: Interaction management on Internet Relay Chat.
Human Communication Research 23(4): 507–534.
Rintel, Sean E., Jeffery Pittam, and Joan Mulholland
2003 Time will tell: Ambiguous non-responses on Internet Relay Chat. Electronic
Journal of Communication 13(1). http://www.cios.org/EJCPUBLIC/013/1/
01312.HTML
Ruesch, Jurgen and Gregory Bateson
1951 Communication: The Social Matrix of Psychiatry. New York: Norton.
Schegloff, Emmanuel A. and Harvey Sacks
1973 Opening up closings. Semiotica 8: 289–327.
Shankar, Tara R., Max VanKleek, Antonio Vicente, and Brian K Smith
2000 Fugue: A computer mediated conversational system that supports turn negoti-
ation. In: Proceedings of the Thirty-Third Hawaii International Conference on
System Sciences. Los Alamitos, CA: IEEE Press.
Scollon, Ron
1982 The rhythmic integration of ordinary talk. In: Deborah Tannen (ed.), Analyzing
Discourse: Text and Talk. Georgetown University Roundtable on Language
and Linguistics, 335–49. Washington, DC: Georgetown University Press.
Smith, Mark, J. J. Cadiz, and Byron Burkhalter
2000 Conversation trees and threaded chats. Computer-Supported Collaborative
Work 9(3): 97–105.
Tannen, Deborah
1984a Conversational Style: Analyzing Talk among Friends. Norwood, NJ: Ablex.
Tannen, Deborah
1984b The pragmatics of cross-cultural communication. Applied Linguistics 5:
189–195.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
Rhythm and timing in chat room interaction 513

Tannen, Deborah
1989 Talking Voices: Repetition, Dialogue, and Imagery in Conversational Dis-
course. Cambridge, UK: Cambridge University Press.
ten Have, Paul
2000 Computer-mediated chat: Ways of finding chat partners. M/C: A Journal of
Media and Culture 3(4). http://www.api-network.com/mc/0008/partners.php
Trevino, Linda K. and Jane Webster
1992 Flow in computer-mediated communication. Communication Research 19(5):
539–573.
van Leeuwen, Theo
2005 Introducing Social Semiotics. London: Routledge.
Walther, John B.
1996 Computer mediated communication: Impersonal, interpersonal and hyperper-
sonal interaction. Communication Research 23(1): 3–43.
Walther, John B. and Lisa C. Tidwell
1995 Nonverbal cues in computer-mediated communication, and the effects of chro-
nemics on relational communication. Journal of Organizational Computing
5(4): 355–378.
Webster, Jane, Linda K. Trevino, and Lisa Ryan
1993 The dimensionality and correlates of flow in human-computer interactions.
Computers in Human Behavior 9: 411–426.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
514 Rodney H. Jones

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:23 AM
21. Conversational floor in computer-mediated
discourse
James Simpson

1. Introduction

This chapter is concerned with the patterns of interaction known as conversa-


tional floors in synchronous, text-based computer-mediated communication
(commonly known as text chat; henceforth in this chapter SCMC).1 This type of
discourse is familiar to participants in many online environments, and it is central
to Internet Relay Chat (IRC), text-based and text-supported multi-user domains
(MUDs and MOOs), and instant messenger services such as MSN and Yahoo
Messenger. This chapter outlines the significance of conversational floors in the
ascription of coherence in SCMC and, through a case study, illustrates how they
develop.
In the traditions of conversation and discourse analysis, the definitional scope
of the floor in this chapter extends beyond the turn or the exchange: It is the in-
teractionally-produced “what’s going on” in discourse (Edelsky 1981). It brings
together the topic of discourse (what is being talked about), the way things are
being said (the communicative action, e.g., “chatting”), and – crucially – the par-
ticipants and their sense of what is happening in the interaction. Hence partici-
pants might describe a floor thus: “Jack’s telling us about his holidays” (in which
case Jack holds the floor); or “We’re chatting about the film we’ve just watched”
(in which case the floor is jointly produced). There is a tendency in multi-partici-
pant SCMC for distinctive patterns of conversational floor to emerge. In this
chapter, I ask: What factors account for the development of these particular pat-
terns? As with much CMC research, the underlying aim is to contribute to an
understanding of the extent to which human interaction is affected by mediation
via computers.
There is increasing variation across computer-mediated environments, as well
as a growing range of purposes for interaction within such online spaces (for chat,
see Paolillo and Zelenkauskaite, this volume). Nonetheless, the SCMC used in on-
line spaces shares certain characteristics: It happens in real time; it can be multi-
party; turns cannot be seen by other participants until after they have been sent –
i.e., message transmission is one way; communication is therefore quasi-synchron-
ous rather than truly synchronous; and participants can scroll up and down the
screen to re-read previously sent stretches of text – i.e., it has a quality of persis-
tence (Herring 1999, 2007). Given the properties of text-based SCMC and their de-
parture from the dyadic spoken prototype used in much analysis of conversation,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
516 James Simpson

the two modes (text-based and spoken) should not be seen as possessing the same
properties. For example, cohesion will be manifest in different ways, and partici-
pants will ascribe coherence in different ways, in SCMC (see the chapters by Her-
ring and Markman, this volume). There are, however, striking similarities between
SCMC and multiparty spoken discourse in particular, and a consideration of floor
in multiparty spoken discourse provides something of a “way in” for analysis of its
computer-mediated equivalent.
The chapter begins with a review of the literature on floor in spoken and written
(i.e., SCMC) conversation, which I relate to the concepts of inter-turn cohesion and
coherence in CMC. I then introduce a case study from which I draw my subsequent
examples. The case study is in two parts. The first part exemplifies the elements
and some types of conversational floor; in the second part, I turn to three key di-
mensions of interaction which influence the development of floors: the role re-
lations of the participants; the communicative action and topic of the discourse
(i.e., the verbal activity); and certain medium-related factors. Their influence is
discussed with reference to an extended sample of SCMC text from the case study,
in which I trace the development of conversational floors.

2. Literature review: Coherence and floor in SCMC

This review first addresses the question of cohesion in SCMC, its relationship with
coherence, and how it operates in different ways from cohesion in spoken dis-
course. I then draw on the CMC literature to explain why conversational threads as
they relate to certain types of conversational floor are relevant to an SCMC account
of cohesion and coherence in discourse.

2.1. Coherence and cohesion


Coherence relations are central to the study of pragmatics. Cook’s (1989: 4) defi-
nition of coherence in discourse is “the property of being unified and meaningful”.
The search for coherence, in whatever discourse type, and whether by the partici-
pants or by analysts, is an interpretive process. It is said that coherence is “in the
eye of the beholder” (Bublitz and Lenk 1999; cf. Garcia and Jacobs 1999). Partici-
pants in SCMC certainly appeal to linguistic form at clause level (lexis and syntax)
to aid them in the process of ascertaining what gives language in use coherence. On
a broader inter-turn level, as with spoken discourse, the formal surface connective
linkage of text – lexical and referential cohesion (Halliday and Hasan 1976) – goes
some way toward explaining how a text is coherent. In one-way SCMC discourse,
inter-turn cohesion such as it exists in spoken discourse is often not readily appar-
ent. However, participants ultimately accord meaning and unity to the text in the
discourse process. The discourse of SCMC is coherent for its participants, despite

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 517

its frequent lack of cohesion (Örnberg Berglund 2009); if it were not, it would not
be so popular, as noted by Herring (1999).
In SCMC discourse, coherence is not fundamentally dependent on the coordi-
nation of transfer in turn-taking, as it would be in spoken discourse. Rather,
broader and looser constructs such as the conversational floor, as described below,
are the cohesive “glue” that contribute towards participants’ ascribing coherence
(unity, meaning) to the discourse. One result of the lack of cohesion in turn-taking –
what Herring (1999) calls the lack of sequential coherence – is, as Herring also
notes, disrupted turn adjacency. Example 1 is a typical instance of disrupted turn
adjacency in SCMC, as it occurred in a two-dimensional graphics-enhanced chat
room called The Palace. The extract is from a saved log of the interaction and ap-
pears as it was typed. It shows how, in comparison with spoken conversation,
SCMC displays a reduced sensitivity to coordination of transfer in turn-taking,
which can be viewed as a lack of fine tuning. Here and in subsequent examples,
turns have been numbered for ease of reference.

Example 1. (The Palace)


1 MichaelC: Good evening Ying. How are things?
2 Ying-Lan: Not so good.
3 Ying-Lan: I took a test this morning.
4 MichaelC: What’s wrong?

A number of commentators on linguistic features of SCMC note the dissimi-


larity of turn-taking patterns in SCMC and in spoken discourse (Cherny 1999; Gar-
cia and Jacobs 1998, 1999; Herring 1999; Panyametheekul and Herring 2007). The
following remark by Chun (1994: 26) illustrates the view that turn-taking in SCMC
is entirely unlike that in spoken discourse: “In terms of discourse management dur-
ing a discussion, turn-taking as done in spoken conversation is not a factor in
CACD [computer-assisted class discussion]”. Relatedly, Kitade notes that there is
“no turn-taking competition” in SCMC (2000: 149).
The lack of fine tuning in SCMC turn-taking is the result of two fundamental
facts about one-way SCMC: (1) turns cannot be seen until they are sent; and (2) the
visual and auditory (paralinguistic and prosodic) cues which in spoken discourse
underpin the turn-taking system are missing. The consequence is disrupted turn ad-
jacency. Herring describes disrupted turn adjacency in SCMC (1999: 3): “[A] mes-
sage may be separated in linear order from a previous message it is responding to, if
another message or messages happen to have been sent in the meantime”. Likewise,
in an early study of SCMC, Murray (1988) noted that “the sender may make a second
move before receiving a response to the first and a message may interrupt a turn”.
In example 1 above, turns 1 and 2 follow the pattern of an adjacency pair
(Schegloff and Sacks 1973). In an adjacency pair the relationship between the first
and second pair parts is one of conditional relevance (Schegloff [1968] 1972). Put

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
518 James Simpson

simply, the presence of the first pair part opens a slot in conversation for an ex-
pected, or conditionally relevant, second pair part. MichaelC’s first pair part
(turn 1) is followed by the second pair part (2) from Ying-Lan. This response, “not
so good”, is a dispreferred response (Heritage 1984: 265–269; Nofsinger 1991:
71–2). That is to say, although the response is expected, or conditionally relevant,
it is not as expected (or preferred) as a response such as “I’m fine, thanks”. Follow-
ing a tendency noted in dispreferred second pair parts, the response is followed by
an elaboration in turn 3. But MichaelC’s next turn (4) seems to be in response to
Ying-Lan’s turn 2, rather than to turn 3. This is a case of disrupted turn adjacency.
The disrupted turn adjacency in example 1 may well be a result of reduced co-
ordination of transfer, in that MichaelC was typing turn 4 at the same time as Ying-
Lan was typing her elaboration following her dispreferred response (turn 3). It hap-
pened that they sent their turns at about the same time, but Ying-Lan sent her turn
fractionally before MichaelC sent his. Thus it appears in the log of the chat, and ap-
peared at the time on the screen, that Ying-Lan answers MichaelC’s question be-
fore he asks it.
On a broader level, these observations on disrupted turn adjacency tend to sup-
port the view that applying models of turn-taking in spoken conversation directly
to SCMC discourse is not profitable (Beißwenger 2008). The chapter now turns to
an alternative approach to cohesion: the conversational floor.

2.2. Floors in SCMC


2.2.1. Defining the floor
A detailed treatment of the notion of floor in SCMC is found in Cherny (1999). She
states (1999: 174):
Given that there is no competition for the [MOO] channel per se, but rather competition
for attention or control of the discourse, notions of shared or collaborative floor seem to
be more helpful than the standard turn-taking literature. These notions also appear more
useful for theorising multi-threaded topic discourse.
Cherny found that previous research on floors of conversation in multiparty spoken
discourse was helpful in developing her categorisation of floor types in a social
MOO. And on the face of it, multiparty SCMC discourse bears more similarity to
the fluid threads of dinner party conversation or discussion groups than to the two-
party conversation which is the foundation of much spoken conversation analysis
(e.g., Sacks 1995).
Floor is a notoriously slippery concept; as Jones and Thornborrow (2004: 400)
note, “floor” is “problematic and has not been employed in one single sense”. In
her review of early conversation analysis work on turn-taking and floor in conver-
sation, Edelsky (1981) observes that frequently no distinction was made between
floor and turn, although in any multiparty discourse such a distinction is vital. Sten-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 519

ström’s (1994: 34) definition of the turn as “everything A says before B takes over,
and vice versa” is basic but entirely workable in SCMC, a discourse environment
where turns cannot be co-constructed and where there is no overlap. It is a techni-
cal definition with little ambiguity. Definition of the floor is less clear-cut, depend-
ent as it is upon inferring how participants themselves view the unfolding dis-
course. The definition as provided by Edelsky (1981: 405) in her influential work is
as follows:
The floor is defined as the acknowledged what’s-going-on within a psychological time/
space. What’s going on can be the development of a topic or a function (teasing, solicit-
ing a response, etc.) or an interaction of the two. It can be developed or controlled by
one person at a time or by several simultaneously or in quick succession. It is official or
acknowledged in that, if questioned, participants could describe what’s going on as
“he’s talking about grades” or “she’s making a suggestion” or “we’re all answering her”.
A reading of Edelsky suggests that there are three definable elements to the floor:
(1) the topic, or the “aboutness” of the discourse; (2) the communicative action: how
things are being said in the discourse; and (3) the participants’ sense of what is hap-
pening in the conversation. From the analyst’s point of view, these are each evident
only to the extent to which they can be inferred from the text, a constraint which
should be acknowledged as a caveat in a discussion of floor. Nonetheless, the text of
SCMC allows an analyst to gain a closer participant’s sense of what was going on
than, for example, a transcription of spoken discourse. This is because the chat par-
ticipants themselves are denied the range of visual and aural feedback cues avail-
able in spoken discourse; any ratification must ipso facto appear in the text itself.
“Simply talking, in itself, does not constitute having the floor”, note Shultz,
Florio, and Erikson (1982: 95). “The ‘floor’ is interactionally produced, in that
speakers and hearers must work together at maintaining it”. Thus one can be the
speaker but not hold the floor. In her study of floor and gender patterns in asyn-
chronous CMC, Herring (2010) supports Edelsky’s assertion that to be a floor-
holding turn, a message must be ratified by other participants. In spoken discourse,
such ratification can be done verbally or through non-verbal nods and backchan-
nels. In SCMC, floor ratification can also be done verbally or through responses
that represent non-verbal behaviour.

2.2.2. Participant structure and floor types


Research into conversational floors in computer-mediated discourse has quite nat-
urally concentrated on applying and testing findings from analysis of multiparty
spoken conversation. Edelsky’s (1981) research into floors and gender in spoken
conversation identified two types of floor: a singly-developed floor (F1) and a floor
which is a “collaborative venture” (F2). F1’s are “characterised by monologues,
single-party control and hierarchical interaction where turn takers stand out from
non-turn takers and floors are won or lost”, while F2’s are “inherently more infor-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
520 James Simpson

mal, cooperative ventures” (Edelsky 1981: 416). Herring (2010) found that these
two floor types were evident in her study of asynchronous discourse in two aca-
demic discussion lists.
Missing from Edelsky’s bipartite distinction are cases where two or more floors
of conversation are continuing in parallel. A broader classification deriving from
research into dinner table conversation and classroom discourse by Shultz, Florio,
and Erikson (1982) (also in Erikson and Shultz 1977) posits categories of partici-
pation structure where floors are single or multiple. Although there are further sub-
divisions in this classification, single floors, broadly speaking, correspond to
Edelsky’s F1 and F2: a single speaker with a number of attenders, or a floor which
is more collective or collaborative. Multiple floors, “type IV participation struc-
tures” in the typology of Shultz et al., are described by these authors (1982: 102) as
having “subgroups of the persons present participating in topically distinct simul-
taneous conversations”.
Hayashi’s (1991) summary grouping of floor types draws on the findings of
Shultz et al. and Edelsky. Hayashi also divides floor types into single conversa-
tional floors and multiple conversational floors, and also subdivides the single floor
type into the single person floor and the collaborative floor. Further sub-categori-
sations are described, based on relative levels of interaction. Hayashi’s taxonomy
was adapted by Cherny (1999: 176ff) to describe floor types in SCMC discourse in
a social MOO.

2.3. Accounting for floor development


Many factors may influence the development of particular floor types. In this section
I outline three contextual aspects of the discourse that shape floor development: par-
ticipants and their roles within the group; verbal activity (topic and communicative
action); and a selection of medium-related features (see Herring 2007). In section
five (below) the effects of these factors are investigated with reference to examples
of specific floor types as they occur within a single stretch of SCMC discourse.

2.3.1. Participant roles


Both Edelsky (1981) and Herring (2010) focus on gender as a key contextual vari-
able in floor development. Edelsky is careful to assert that the F1 and F2 floor types
are gender independent, although participation by men in F1 floors was far greater
than participation by women in her data from face-to-face meetings at an American
university (1981: 415). Herring considers that her findings are of two gender styles
rather than two different floor types: a male style associated with individual power
and a female style associated with accommodation to others. In addition to gender
styles, the influence on computer-mediated interaction of the flexible and dynamic
role relations among participants has from the outset received attention in the lit-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 521

erature on CMC; see Turkle (1995) on the elasticity of roles and identity on-screen,
Cherny (1999) on the rich online life of a MOO community, as well as Smith and
Kollock’s (1999) collection of articles on online communities. Taxonomies of
roles in online groups orient around the type and level of interaction at which par-
ticipants engage, and include such roles as: core participants, newbies, flamers, and
lurkers (Marcoccia 2004; Turner, Smith, Fisher, and Welser 2005; White 2001).
The examples in this chapter come from an online language learning community,
where teacher/learner roles are more flexible than they are in archetypal face-to-
face classrooms. On the subject of the roles of teachers and students face-to-face
and online, see Warschauer (1996, 1999), Kern (1995), Salmon (2004), Godwin-
Jones (2005), and Garrison and Cleveland-Innes (2005).

2.3.2. Verbal activity and topic


The research of Shultz et al. (1982) showed that floor patterns were associated with
the speech activity and that changes in floor patterns occurred when the speech ac-
tivity changed. “Speech activities”, write Shultz et al. (1982: 96), are “units of dis-
course in conversation that are longer than a sentence and may consist of one dis-
course topic, or may consist of a set of connected topics and subtopics”. The term
speech activity is from Gumperz (1977) and is a synthesis of the current communi-
cative action and the broad topic of the conversation, for example, “discussing
politics” or “chatting about the weather” (Gumperz 1977: 206). The communi-
cative action is the name given to the type of conversation that might be happening
at a given time, for example, chatting, explaining, discussing, or arguing. In a par-
ticipant-oriented view of CMC interaction (see Androutsopoulos 2006), the activ-
ity might be considered the fundamental component of the floor. Jones and Thorn-
borrow (2004: 421), in their critique of the notion of floor, “argue for the primacy
of the activity: It is this that social actors come together to do, and the floor, as a
method of organizing talk, is part of how they do it”.
Shultz et al., when making the important link between conversational floor pat-
terns and speech activity, found that certain types of speech activity often corre-
sponded with certain types of floor. That is to say, when the speech activity was
“chatting about how much everything costs in the stores nowadays”, the appropri-
ate floor was a multiple conversational floor with overlapping speech. And when
the speech activity was “explaining why and where the father … is going out of
town”, there is only one floor, where the parents are the primary speakers (Shultz et
al. 1982: 97). Because SCMC is written rather than spoken, the term verbal activity
is used here in preference to speech activity.
The floor, then, is not defined by topic, or aboutness, alone. This is partly, but
not entirely, because topics and their boundaries themselves are so difficult to
identify. Following Brown and Yule (1983: 71), topic can be considered “what is
being talked about”. In addition, Brown and Yule explain that within a broad topic

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
522 James Simpson

framework there are elements of personal “speaker’s topics”. By considering


speaker’s topic, they recognise that within a particular framework where the over-
all topic may be generally or loosely agreed, the individual participants sometimes
have differing views on what the topic is or where the focus should be. When in-
vestigating speaker’s topic, discourse is analysed “not in terms of how we would
characterise the participants’ shared information, but in terms of a process in which
each participant expresses a personal topic within the general topic framework as a
whole” (1983: 88).
Topics frequently drift; that is, they move gradually from one area into others,
without an easily discernible topic boundary. Topic drift, or shading, as a feature of
spoken conversation has been commented on by Hobbs (1990), Schegloff and
Sacks (1973), and Jefferson (1984), among others. In SCMC topic drift – or topic
development – over time is the subject of a line of research by Herring and col-
leagues that they refer to as Dynamic Topic Analysis (Herring 2003; Herring and
Nix 1997; Zelenkauskaite and Herring 2008).

2.3.3. Medium-related factors


There are also medium-related reasons for particular floors to develop in SCMC. In
particular, the emergence of the multiple conversational floor may be associated
with the way in which a computer-mediated conversation occurs. Cherny (1999:
180) maintains that “[m]ultiple participant floors are in fact easier to achieve [in
SCMC discourse] than they are in face-to-face conversations”. She claims this is
due to the lack of overlap (i.e., the inability to co-construct turns) in the medium.
Moreover, the ability to scroll up and re-read previous turns, coupled with the
slower speed of the unfolding discourse compared to spoken conversation, facili-
tates the emergence of multiple floors and enables an individual to participate in a
number of floors simultaneously (Herring 1999).
Topics in SCMC are prone to recur, leading to the re-emergence of particular
floor types. This is the case when participants are carrying out more than one on-
screen activity – that is to say, when they are multitasking. At certain points in the
discourse something happens in another space on the Internet that is relevant to a
previous topic, which then over-rides the current topics. The floor type may con-
sequently revert to a previous one.

3. The case study: Synchronous chats with Webheads

The illustrative data in this chapter are from a virtual group dedicated to exploring
ways of language learning online, Webheads. This long-standing and expanding
online community of English language learners and teachers was instigated by
Vance Stevens and colleagues in 1998 and has been meeting on the Internet ever

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 523

since. The Webheads (more recently, Webheads in Action) community engages


with a complex intertwining of CMC modes: websites, email, voice and video con-
ferencing, and experiment with blogs, wikis, and other Web 2.0 technologies. The
Webheads synchronous text-based CMC chats are held weekly at the MOO2
Tapped In;3 previously, participants met in the two-dimensional graphics-enhanced
chat room The Palace.4 The data presented in this chapter are from interaction in
these two environments. The case study is in two parts: Part 1 exemplifies floor
types in SCMC with reference to data from the Webheads interaction, and part 2
discusses the emergence of different floors in one particular log of SCMC from the
Webheads group.

4. Part 1: Floor types in SCMC

4.1. Floor ratification


For a floor to be a floor, it needs to be ratified as such in the text by the participants
(see 2.2.1 above). In example 2, Vance (turns 1, 2 and 4) is holding the floor; this is
ratified by BJB (turn 3) and SusanneN (turn 5) through their verbal responses.

Example 2. (Tapped In)


1 VanceS says, “I go to Guangchow and get Maggie (she needs a
travel partner to travel in the summer)”
2 VanceS says, “Then we go visit Moral in Kunming”
3 BJB exclaims, “sounds like fun, Vance!”
4 VanceS says, “Then to Wuhan ot visit Lian (2000 km)”
5 SusanneN says, “Oh really, sounds exciting.”

In example 3, BJB ratifies Susanne’s turn with a ‘nod’. This is an action, a turn
sent in the third person to represent non-verbal behaviour (on performative actions
in text-based CMC, see Virtanen, this volume):

Example 3. (Tapped In)


1 SusanneN asks, “Really, Minsk is closer to us in Europe than
Pennsylvania, I guess?”
2 BJB [HelpDesk] nods

Floor ratification by members of the Webheads group has the dual purpose of
signalling both that the participants are paying attention to the floor holder and that
they comprehend what has been written. In her investigation into backchannel re-
sponses in a MOO, Cherny (1999: 194) similarly maintains that “it is difficult if not
impossible to separate affect out from the back channel function in this medium,
since an appropriate emotional response to a turn (e.g., a laugh) indicates both at-
tention and understanding just as well as a nod does”.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
524 James Simpson

In multiparty SCMC discourse, problems can arise with floor ratification


being misdirected or mistaken. In example 4 below, Maggi’s response (turn 4) to
Gold10’s turn (1) is misinterpreted by Ying in turn 5 as a ratification of her own
turns 2 and 3:

Example 4. (The Palace)


1 gold10: Is here a lession about reading or writing?
2 Ying-Lan: They were worry about the world … we will be worry
about the computer.
3 Ying-Lan: ^not will be … we are worry about the computer.
4 Maggi: which do you prefer?
5 Ying-Lan: prefer what?
6 Maggi: no, we are worrying about the computer
7 gold10: what will be taught at section 7?
8 Maggi: I meant Gold Ying …

Turns are often directed in SCMC by naming the participant to whom they are
addressed. This cohesive device characteristic of SCMC, cross-turn reference (Her-
ring 1999) or addressivity (Werry 1996), is used by Maggi in turn 8 of example 4 to
repair the misunderstanding. In other cases, as with example 5 below, addressivity
is included in the original floor-holding and floor-ratifying turns (turns 1 and 4).
This can be considered a navigation technique in response to the fact that there are
a number of participants and potentially simultaneous multiple threads of conver-
sation in the interaction. Note that turns 2 and 3 belong to a different thread from
turns 1 and 4.

Example 5. (Tapped In)


1 SusanneN [to Maggie]: “A webhead, has a lot of furry hair,
and a fuzzy old jacket, thick glasses and is all pale be-
cause of the lack of daylight, plus pimlpes due to unhealthy
snacks and black coffeee?”
2 PhilB says, “Margaret – that’s right! Jacket & tie become
mandatory pedagogical accessories.”
3 JohnSte says, “Back when I was a Department chair, my dress
code was shorts and a tee-shirt.”
4 MargaretD exclaims, “ROTFL at Susanne description!”

Again, ratification is carried out by a representation of non-verbal behaviour:


ROTFL is sometimes used as SCMC shorthand for “rolling on the floor laughing”.

4.2. Habitually-occurring floor types


Within the context of the interaction in the Webheads community described here,
identification of floors is straightforward enough, suggesting a similarity of floor

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 525

structure across contexts of SCMC use. Three habitually-occurring floor types that
also occur in MOOs are described and illustrated below: the speaker-and-supporter
floor, the collaborative floor, and the multiple conversational floor.

4.2.1. Speaker-and-supporter floor


The speaker-and-supporter floor is a single conversational floor. One participant
can be regarded as the floor holder, and others are supporting through the use of
back-channel devices and other short interjections. In example 6, Vance is holding
the floor; his short turns are followed with the occasional supporting comment,
question, and back-channel from Maggi and Ying-Lan:

Example 6. (The Palace)


1 Vance: Go to this url: http://www.geocities.com/members/
tools/file_manager.html
2 Vance: You might want to bookmark that url.
3 Vance: You can’t use it just yet.
4 Vance: But you’ll want to come here later:
http://www.geocities.com/members/tools/file_manager.html
5 Ying-Lan: ^why?
6 Vance: Geocities will now email you a password.
7 Maggi: Hey, I’m getting the hang of this.
[11 turns omitted]
19 Vance: Here’s what you have to do next:
20 Vance: When you visit your new url, you will see the file
index.html by default.
21 Maggi: ok
22 Vance: Geocities created an index.html file for you. If you
put in your url you’ll see it.
23 Maggi: ok
24 Vance: What you want to do now is replace that file with your
own, which has to be called index.html
25 Maggi: ok
26 Vance: So you create a little web site. The introductory
page to your site is called index.html. And you just upload
the files to your server space using the file manager.
27 Maggi: neat!!!1111t
28 Vance: I make my web sites in ms Word. I just start a docu-
ment, save it as html, and link it to other documents.
29 Maggi: a whole lot easier than I thought!!!!!!!!!!

Note that the verbal activity is “instructing” here: Vance is instructing Maggi
and Ying-Lan how to create a web page, step-by-step, and their attention is di-
rected towards him. It is no surprise, therefore, for the floor pattern most associated
with the activity “instructing” is a speaker-and-supporter floor.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
526 James Simpson

4.2.2. Collaborative floor


In SCMC, a single floor can be constructed by a number of participants; i.e., it is
collaborative. In example 7, Ying-Lan, Vance, and Maggi co-construct the collab-
orative floor: All the participants are engaged in one single verbal activity.
Example 7. (The Palace)
1 Ying-Lan: How long will you take your vacation?
2 Ying-Lan: Sounds nice.
3 Vance: I will take 6 days for my vacation.
4 Vance: But it’s not a vacation, really.
5 Ying-Lan: You will go alone?
6 Vance: I will be in Europe alone but my son will fly to New
York and camp out
7 in my hotel room.
8 Ying-Lan: You son who lives in California?
9 Vance: Yes, he’s never been to New York City before.
10 Maggi: Be sure the mini bar is stocked with snacks …
11 Vance: No way, I’ll stock up at the deli.
12 Vance: He’s been trained to stay out of mini bars in upscale
hotels.
13 Maggi: That’s a good place to start …
14 Vance: The mini bar?
15 Maggi: no … the deli’s
16 Ying-Lan: ^New York is a big city … why do you call her as
“Big Apple”?
17 Maggi: … best in the world
18 Vance: Good question!
19 Maggi: Has to do with jazz Ying …
20 Maggi: or at least one story does …
21 Vance: Does it?
22 Ying-Lan: Has to do with Jazz?
23 Ying-Lan: one story?
24 Maggi: Yes … remember I was born in New York …

4.2.3. Multiple conversational floor


When two or more floors exist in parallel, a multiple conversational floor is evident.
In the following stretch of 12 turns (example 8), the floors have been identified and
labelled by the feature of topic. Five turns are associated with the topic of thanks-
giving (floor A), while seven relate to discussion of the TOEFL5 exam (floor B):
Example 8. (Tapped In)
1 A Ying [guest] says, “Hi … everyone … it is a little late
to say ”Happy Thankgiving!“”
2 A sara [guest] says, “hi ying”

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 527

3 B SusanneN [to Sara [guest]]: “the TOEFL Exam tomorrow,


how can we help you prepare for that?”
4 A Ying [guest] asks, “How was your turkey at the table?”
5 B sara [guest] says, “i have one practice i will do it
later”
6 B Ying [guest] asks, “Toefl Exam?”
7 B sara [guest] says, “yes”
8 A SusanneN asks, “And vance, how was the turkey outing
with your Spanish friends?”
9 B SusanneN says, “it is the Test Of Englsih as a Foreign
Language”
10 B Ying [guest] says, “I knew that.”
11 A BJB [to Ying [guest]]: “it is never to late to say happy
Thanksgiving … we all have so much to be thankful for!”
12 B SusanneN [helpdesk] smiles to Ying I just learnt a new
acronym.

Within a multiple conversational floor, as Cherny (1999: 176) notes, there can
be a main floor and side floors, or there can be two or more main floors running in
parallel. In SCMC discourse it is possible for an individual participant to be in-
volved in more than one floor of conversation. In the above example of a multiple
conversational floor, three of the four participants contribute to both floors. This
tendency of the proficient SCMC participant to switch between floors is an echo of
other traits of CMC use. For example, multitasking – attending to a number of dif-
ferent on-screen activities at once – is commonplace (Jones 2002). And in some
SCMC contexts, participants cycle among on-screen identities that they have cre-
ated (Donath 1999; Turkle 1995).
In example 6 above (the speaker-and-supporter floor), one participant was ex-
plaining to others how to do something – in this case, how to build a website. This
is in contrast to the pattern in example 7 (the collaborative floor), where the par-
ticipants could be said to be “chatting”, which is, after all, the prototypical activity
in a chat room. Again it is notable but not surprising that a certain type of com-
municative action (e.g., “chatting”) is associated with certain floor types: collab-
orative or multiple. In the following section, I expand on this point, relating floor
development to the topic and purpose of the conversation (the verbal activity), the
role relationships of the participants, and the computer-mediated nature of the dis-
course.

5. Part 2: Floor development observed

In the discourse of the virtual community under consideration here, Webheads, the
status of the participants and their various role relations are influential in shaping

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
528 James Simpson

floor structure. A primary, albeit troublesome, distinction is that between expert


user teachers of English, on one hand, and learners of English, on the other.6 Al-
though there are students and tutors in the Webheads group, care is taken by tutors
to minimise any perceived divide. Nonetheless, the role of participant as learner, as
tutor, or as other interested party (e.g., help-desk volunteer; researcher) can often
be discerned, although not always. Another distinction may be made between the
more and the less technologically able, or electronically literate, members of the
group, regardless of their level of English. Proficiency in English does not auto-
matically confer proficiency in the use of the technologies of CMC, as any first-
time visitor to an online or virtual environment can testify. Thus a proficient tech-
nophile may find her- or himself cast in the role of tutor, not of language, but in the
use of the technologies of electronic literacy.
This is by way of introducing some details about the individual participants in
the extract in this section: VanceS is the founder tutor of the Webheads group;
LianA and Sue are English language learners with Webheads; BJB works as a vol-
unteer on the helpdesk at Tapped In, the online environment which hosts the Web-
heads chats; and PhilB is an English teacher who coordinates another group of
students that meets at Tapped In.
Here follows a worked example of floor development in a sample of SCMC
text of 36 turns in length, presented below as example 9:

Example 9. (Tapped In)


1 VanceS says, “I never knew what chili was exactly before”
2 BJB. o O (that will open a web window to go with your text
client)
3 LianA says, “come to china, then you will know what it is,
vance.”
4 BJB. o O (I hope)
5 LianA oO
6 PhilB says, “Vance, there’s a lot of confusion between the
words ”chili“ and ”chile“ (borrowed from Spanish.”
7 Sue [guest] asks, “Lian, how much did you take on GRE?”
8 LianA asks, “what does burn the scandle from the two ends
mean? who can help?”
9 LianA says, “not very high, only 2160”
10 BJB [to Lian]: “how long do you think a candle will last if
you burn both ends?”
11 LianA says, “nol not candle but scandle”
12 LianA says, “no – typo”
13 Sue [guest] says, “so hight? i am wondering i can only take
1500”
14 PhilB says, “Lian, it’s a play on words.”
15 VanceS says, “I’ve been to China several times, but never to
Wuhan”

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 529

16 LianA says, “it said if you burn the scandle from 2 ends, you
will be a busy man.”
17 BJB thinks there are several threads to this conversation
18 VanceS says, “Also you will burn yourself out”
19 LianA says, “welcome vance to wuhan next time to china.”
20 PhilB says, “Normally to ”burn the candle on both ends“
means to work so much you tire yourself out. With ”scandal“
instead of ”candle“ it sounds like Bill Clinton with his hot
interns. <g>”
21 BJB chuckles. Same result, though.
22 VanceS. o O (this is a normal consequence of multitasking)
23 VanceS says, “he must have had too many hot interns in the
fire”
24 LianA giggles
25 PhilB asks, “Hey, I found a new free resource called ”stuf-
fincommon virtual communities“. Anyone heard of it?”
26 VanceS says, “never”
27 Sue [guest] says, “no”
28 LianA says, “no”
29 PhilB asks, “Wanna see?”
30 VanceS says, “sure”
31 Sue [guest] says, “sure”
32 PhilB says, “It has chat, tools, and a neat whiteboard.”
33 LianA says, “yes.”
34 PhilB asks, “I’m going to project. Sue, Lian, do you know
about projections?”
35 LianA says, “yes”
36 Sue [guest] says, “not sure”

There are three distinct phases to this stretch of SCMC text:


Turns 1–22: a period where a number of conversations continue simulta-
neously (a multiple conversational floor);
Turns 8–24: a period where there is one main conversation where many partici-
pants hold the floor (a collaborative floor);
Turns 25–36: a period where one participant is the floor holder, supported by
others (a speaker-and-supporter floor).
It will be noted immediately that the first and second phases overlap con-
siderably, whereas there is a clear boundary between the second and third
phases. Floor boundaries in SCMC are not necessarily distinct. On this occasion,
a collaborative floor is the main floor in a multiple conversational floor; when
the other conversations in the multiple floor are completed, it becomes briefly
the only floor in a single collaborative floor. Here the multiple floor continues
from turn 1 to turn 22. The floor which emerges at turn 8 becomes the main floor,
and at turn 23 it becomes the only floor, as previous conversations are com-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
530 James Simpson

pleted. At turn 25 the pattern shifts decisively to a single speaker-and-supporter


floor.
A technique for analysing floors in SCMC is to isolate individual conversations
from the text. Naturally, an objection to this might be: How can we know post hoc
and without being informed by the participants which turns belong to which con-
versation? The answer must be that we cannot be certain. Nonetheless, despite the
possibility of there being other interpretations, it seems quite clear that all but one
turn (turn 5) can be accounted for in the way described below.
In examples 9a to 9f below, the individual floors and elements of floors in the
stretch of SCMC discourse presented above as example 9 are discussed with refer-
ence to the features that influence floor development. Before I turn to these isolated
sections, three points should be noted. Firstly, this stretch of discourse is not a com-
plete textual record of the interaction. The log was originally recorded by VanceS
and begins 40 turns after his arrival at Tapped In. However, the other participants
had already commenced the interaction. Thus some of the conversations in the
example are incomplete, either because they had started before the extract begins
or because they continue after it ends. The example contains no instances of a par-
ticipant entering or leaving the conversation. (See Rintel, Mulholland, and Pittam
[2001] for an illuminating study of openings in IRC, a type of SCMC.) Secondly, it
should be recalled that the disrupted turn adjacency inherent in the medium lends a
certain arbitrariness to the position of the individual turns in the text in relation to
the other turns.
In example 9a, the turns of Vance, LianA, and PhilB belong to the end of the
same conversation, a collaborative floor within a multiple conversational floor
which has the verbal activity chatting about chili and China. The discussion about
chili had been continuing for a number of turns before the beginning of this
extract.

Example 9a.
1 VanceS says, “I never knew what chili was exactly before”
3 LianA says, “come to china, then you will know what it is,
vance.”
6 PhilB says, “Vance, there’s a lot of confusion between the
words ”chili“ and ”chile“ (borrowed from Spanish.”
15 VanceS says, “I’ve been to China several times, but never to
Wuhan”

Contextual and temporal aspects of the discourse would suggest that much at-
tention is paid to individual participant’s topic in SCMC. In example 9a above,
within a broad topic framework that could be said to be about chili, LianA’s topic is
China. This also becomes Vance’s topic in turn 15; a topic drift has taken place

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 531

within a floor of conversation. Neither the topic of chili nor of China is developed
further in the interaction.
Example 9b is the end of another conversation. BJB has been explaining to Sue
how to open the graphical interface of Tapped In:

Example 9b.
2 BJB. o O (that will open a web window to go with your text
client)
4 BJB. o O (I hope)

BJB is using a device whereby her turn is displayed inside an ASCII “thinks”
bubble. This is done in Tapped In by prefacing the turn with the command /thinks.
One might infer that she uses this technique because the turns are directed towards
only one among many participants. However, it is possible in Tapped In to send a
turn privately to another participant using the /whisper command. That BJB does
not do this suggests, in line with her role at Tapped In, that she feels the in-
formation might be of use to more than one participant.
Example 9c is an exchange of three turns spread over seven turns of the extract.

Example 9c.
7 Sue [guest] asks, “Lian, how much did you take on GRE?”
9 LianA says, “not very high, only 2160”
13 Sue [guest] says, “so hight? i am wondering i can only take
1500”

The two language learners here are discussing an English language test. Although
perhaps not highly proficient in English, they are both adept at SCMC discourse.
Both Sue and LianA participate in more than one conversation in this extract; turns
by LianA appear in four of the six isolated examples highlighted here.
Example 9d is an aside:

Example 9d.
17 BJB thinks there are several threads to this conversation
22 VanceS. o O (this is a normal consequence of multitasking)

The topic here is the conversation itself. In spoken discourse the turns would be
expected to appear together, as an adjacency pair or as the initiation and response
of an exchange. However, in this sample of SCMC they are separated by four
unrelated turns. Also of note is the fact that BJB’s turn is posted in the third per-
son as a metacomment; that is, a comment on the unfolding conversation. Vance’s
turn is also a representation of something other than speech, using, as BJB did ear-
lier, the cartoon “thinks” bubble (see Cherny 1995 on the modal complexity of

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
532 James Simpson

speech events in a social MOO and Virtanen, this volume, on performativity in


CMC).
Example 9e is the main floor of the multiple floor. The previous examples (9a
to 9d) can be considered side floors, or even mere asides, of the multiple floor.
Example 9e.
8 LianA asks, “what does burn the scandle from the two ends
mean? who can help?”
10 BJB [to Lian]: “how long do you think a candle will last if
you burn both ends?”
11 LianA says, “nol not candle but scandle”
12 LianA says, “no – typo”
14 PhilB says, “Lian, it’s a play on words.”
16 LianA says, “it said if you burn the scandle from 2 ends, you
will be a busy man.”
18 VanceS says, “Also you will burn yourself out”
20 PhilB says, “Normally to ”burn the candle on both ends“
means to work so much you tire yourself out. With ”scandal“
instead of ”candle“ it sounds like Bill Clinton with his hot
interns. <g>”
21 BJB chuckles. Same result, though.
23 VanceS says, “he must have had too many hot interns in the
fire”
24 LianA giggles

This is a collaborative floor, in as much as four participants are involved in its de-
velopment. My contention is that it dominates because the verbal activity is “ex-
plaining about a phrase LianA has read”, which involves the communicative action
“explaining”. The topic, raised quite explicitly by LianA in turn 8, is a phrase that
LianA has presumably read or heard and that she wants help in understanding. As
noted above, LianA is an English language learner, and Webheads is a virtual com-
munity dedicated to language learning. In other words, when a language learner
raises a language learning point, much of the focus redirects towards that particular
floor, the floor becomes collaborative, and the communicative action of the verbal
activity orients towards “explaining”.
In example 9f the floor type can also be attributed directly to the participant and
the verbal activity:
Example 9 f.
25 PhilB asks, “Hey, I found a new free resource called ”stuf-
fincommon virtual communities“. Anyone heard of it?”
26 VanceS says, “never”

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 533

27 Sue [guest] says, “no”


28 LianA says, “no”
29 PhilB asks, “Wanna see?”
30 VanceS says, “sure”
31 Sue [guest] says, “sure”
32 PhilB says, “It has chat, tools, and a neat whiteboard.”
33 LianA says, “yes.”
34 PhilB asks, “I’m going to project. Sue, Lian, do you know
about projections?”
35 LianA says, “yes”
36 Sue [guest] says, “not sure”

This is a single floor with one floor holder being supported by other participants.
In the terminology adopted here from Hayashi (1991) and Cherny (1999), it is a
speaker-and-supporter floor. The communicative action of the verbal activity is
primarily didactic: PhilB is “demonstrating an Internet resource called stuffincom-
mon”. There is a sub-topic in turns 34 to 36: using the “project” command in
Tapped In. The communicative activity remains explanatory.
In analysing this extended example, the concern has been with a limited set of
patterns of participation and floor types. There are undoubtedly many other pat-
terns that relate to the development of other floor types. This notwithstanding, the
conclusion can be drawn from this analysis that floor development – in these data
at least – is related to verbal activity. When the topic of the verbal activity is a lan-
guage point raised by a learner, the floor becomes collaborative. It either develops
as the single collaboratively constructed floor or as the main floor of a multiple
conversational floor. When the topic is related to the technologies of electronic lit-
eracy (for example, how to build a website, or where a particular resource can be
found) the floor develops into a speaker-and-supporter floor. The participant role
is also important. In each case the communicative action (explaining/demonstrat-
ing) is pedagogic. However, when the verbal activity is directly related to the ac-
quisition of the second or foreign language (English), a number of participants
contribute substantive turns. When the verbal activity is related to the development
of the skills of electronic literacy, other participants focus their attention on the
single floor holder.

6. Conclusion

Conversation in SCMC is quite different in many ways from spoken conversation. It


follows that established approaches to spoken discourse analysis do not necessarily
map directly onto a text-based computer-mediated form of discourse. For example,
as shown in this chapter, patterns of turn-taking in SCMC are affected by disrupted
turn adjacency, itself a characteristic of the discourse setting: the virtual environ-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
534 James Simpson

ment. Hence certain axioms concerning turn-taking in spoken discourse do not


apply to computer-mediated written conversation. In this chapter it has been main-
tained that the notion of the conversational floor is a useful one in the study of dis-
course where sequential cohesion is looser than in the spoken mode. Furthermore, a
claim has been made that the development of certain floor types is associated with
(a) the roles of the participants in the discourse; and (b) the current communicative
action and topic, or, generally speaking, the purpose of the discourse.
Developments in CMC have implications for the study of floor development.
The variety and sophistication of CMC systems (visual-based virtual worlds, text-
supported voice and video chat, the increased blending of modes – see Jenks 2009a,
2009b; Jenks and Firth, this volume) present interesting challenges for the future.
The conclusions of this chapter can thus be broadened by engaging with the notion
of communicative competence (Canale and Swain 1980; Hymes 1972). Effective
participation in a particular SCMC environment requires a measure of electronic
communicative competence, which now encompasses an ability to navigate within
and between the multimodal environments of contemporary online communication
(Kenning 2003; Rassool 1999; Royce 2002; Royce and Bowcher 2007).

Notes

1. This chapter contains data and analysis first discussed in Simpson, James 2005 Conver-
sational floors in synchronous text-based CMC discourse. Discourse Studies 7(3):
337–361.
2. A MOO is a type of MUD (multi-user domain), a user-extensible text-based virtual
reality environment (see Cherny, 1999).
3. Tapped In: http://www.tappedin.org
4. The Palace: http://www.thepalace.com
5. The TOEFL, or Test of English as a Foreign Language, is an admission requirement for
non-native English speakers at many English-medium universities.
6. The term “expert user” is used in preference to the term “native speaker” because expert
users of a language are not necessarily native speakers. For discussion of this and other
issues surrounding the notion of the “native speaker”, see Rampton (1990).

References

Androutsopoulos, Jannis K.
2006 Introduction: Sociolinguistics and computer-mediated communication. Jour-
nal of Sociolinguistics 10(4): 419–438.
Beißwenger, Michael
2008 Situated chat analysis as a window to the user’s perspective: Aspects of tem-
poral and sequential organization. Language@Internet 5, article 6.
http://www.languageatinternet.org/articles/2008/1532/index_html/

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 535

Brown, Gillian and George Yule


1983 Discourse Analysis. Cambridge, UK: Cambridge University Press.
Bublitz, Wolfram and Uta Lenk
1999 Disturbed coherence: “Fill me in”. In: Wolfram Bublitz, Uta Lenk, and Eija
Ventola (eds.), Coherence in Spoken and Written Discourse. Selected Papers
from the International Workshop on Coherence, Augsburg, 24–27 April 1997,
153–174. Amsterdam/Philadelphia: John Benjamins.
Canale, Michael and Merrill Swain
1980 Theoretical bases of communicative approaches to second language teaching
and testing. Applied Linguistics 1(1): 1–47.
Cherny, Lynn
1995 The modal complexity of speech events in a social MUD. Electronic Journal of
Communication 5(4). http://www.cios.org/EJCPUBLIC/005/4/00546.HTML
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford, CA: CSLI
Publications.
Chun, Dorothy M.
1994 Using computer networking to facilitate the acquisition of interactive compet-
ence. System 22(1): 17–31.
Cook, Guy
1989 Discourse. Oxford, UK: Oxford University Press.
Donath, Judith
1999 Identity and deception in the virtual community. In: Marc A. Smith and Peter
Kollock (eds.), Communities in Cyberspace, 3–24. London: Routledge.
Edelsky, Carole
1981 Who’s got the floor? Language in Society 10(3): 383–421.
Erikson, Frederick and Jeffrey Shultz
1977 When is a context? Some issues and methods in the analysis of social compet-
ence. Quarterly Newsletter of the Institute for Comparative Human Develop-
ment 1(2): 5–10.
Garcia, Angela and Jennifer Baker Jacobs
1998 The interactional organization of computer mediated communication in the
college classroom. Qualitative Sociology 21(3): 299–317.
Garcia, Angela and Jennifer Baker Jacobs
1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer-mediated communication. Research on Language and So-
cial Interaction 32(4): 337–367.
Garrison, D. Randy and Martha Cleveland-Innes
2005 Facilitating cognitive presence in online learning: Interaction is not enough.
American Journal of Distance Education 19(3): 133–148.
Godwin-Jones, Robert
2005 Emerging technologies: Messaging, gaming, peer-to-peer sharing language
learning strategies and tools for the millennial generation. Language Learning
and Technology 9(1): 17–22.
Gumperz, John J.
1977 Sociocultural knowledge in conversational inference. In: Muriel Saville-
Troike (ed.), Linguistics and Anthropology: Georgetown University Round

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
536 James Simpson

Table on Languages and Linguistics 1977. Washington, DC: Georgetown Uni-


versity Press.
Halliday, M. A. K. and Ruqaiya Hasan
1976 Cohesion in English. Cambridge, UK: Cambridge University Press.
Hayashi, Reiko
1991 Floor structure of English and Japanese conversation. Journal of Pragmatics
16: 1–30.
Heritage, John
1984 Garfinkel and Ethnomethodology. Cambridge, UK: Polity.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2003 Dynamic topic analysis of synchronous chat. In: New Research for New
Media: Innovative Research Methodologies Symposium Working Papers and
Readings. Minneapolis, MN: University of Minnesota School of Journalism
and Mass Communication. http://ella.slis.indiana.edu/~herring/dta.2003.pdf
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Language@
Internet 4, article 1. http://www.languageatinternet.org/articles/2007/761/
Herring, Susan C.
2010 Who’s got the floor in computer-mediated conversation? Edelsky’s gender pat-
terns revisited. Language@Internet 7, article 8. Special issue on Computer-
Mediated Conversation, Part I, Susan C. Herring (ed.).
http://www.languageatinternet.org/articles/2010/2857
Herring, Susan C. and Carole Nix
1997 Is serious chat an oxymoron? Academic vs. social uses of Internet Relay Chat.
Paper presented at the American Association of Applied Linguistics, Orlando,
FL, March 11. http://ella.slis.indiana.edu/~herring/aaal.1997.pdf
Hobbs, Jerry R.
1990 Topic drift. In Bruce Dorval (ed.), Conversational Organization and its Devel-
opment, 3–22. Norwood, NJ: Ablex.
Hymes, Dell
1972 On communicative competence. In: John B. Pride and Janet Holmes (eds.), So-
ciolinguistics. Harmondsworth, UK: Penguin.
Jefferson, Gail
1984 On stepwise transition from talk about a trouble to inappropriately next-posi-
tioned matters. In: J. Maxwell Atkinson and John Heritage (eds.), Structures of
Social Action: Studies in Conversation Analysis, 191–222. Cambridge, UK:
Cambridge University Press.
Jenks, Christopher J.
2009a Getting acquainted in Skypecasts: Aspects of social organization in online chat
rooms. International Journal of Applied Linguistics 19(1): 26–46.
Jenks, Christopher J.
2009b When is it appropriate to talk? Managing overlapping talk in multi-partici-
pant voice-based chat rooms. Computer Assisted Language Learning 22(1):
19–30.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
Conversational floor in computer-mediated discourse 537

Jones, Rod and Joanna Thornborrow


2004 Floors, talk and the organization of classroom activities. Language in Society
33: 399–423.
Jones, Rodney H.
2002 The problem of context in computer mediated communication. Paper pres-
ented at the Georgetown University Roundtable on Language and Linguistics,
Washington, D.C., March 7–9.
Kenning, Marie-Madeleine
2006 Evolving concepts and moving targets: Communicative competence and the
mediation of communication. International Journal of Applied Linguistics
16(3): 363–368.
Kern, Richard
1995 Restructuring classroom interaction with networked computers: Effects on
quantity and characteristics of language production. The Modern Language
Journal 79: 457–476.
Kitade, Keiko
2000 L2 learners’ discourse and SLA theories in CMC: Collaborative interaction in
Internet chat. Computer Assisted Language Learning 13(2): 143–166.
Marcoccia, Michel
2004 On-line polylogues: Conversation structure and participation framework in In-
ternet newsgroups. Journal of Pragmatics 36(1): 115–145.
Murray, Denise E.
1988 Computer-mediated communication: Implications for ESP. English for Spe-
cific Purposes 7: 3–18.
Nofsinger, Robert E.
1991 Everyday Conversation. Newbury Park, CA: Sage.
Örnberg Berglund, Therese
2009 Disrupted turn adjacency and coherence maintenance in instant messaging
conversations. Language@Internet 6, article 2. http://www.languageatinter-
net.org/articles/2009
Panyametheekul, Siriporn and Susan C. Herring
2007 Gender and turn allocation in a Thai chat room. In: Brenda Danet and Susan C.
Herring (eds.), The Multilingual Internet, 233–255. Oxford, UK: Oxford Uni-
versity Press.
Rampton, Ben
1990 Displacing the “native speaker”: Expertise, affiliation, and inheritance. ELT
Journal 44(2): 97–101.
Rassool, Naz
1999 Literacy for Sustainable Development in the Age of Information. Clevedon,
UK: Multilingual Matters.
Rintel, E. Sean, Joan Mulholland, and Jeffery Pittam
2001 First things first: Internet Relay Chat openings. Journal of Computer-Mediated
Communication 6(3). http://jcmc.indiana.edu/vol6/issue3/rintel.html
Royce, Terry D.
2002 Multimodality in the TESOL Classroom: Exploring visual verbal synergy.
TESOL Quarterly 36(2): 191–205.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
538 James Simpson

Royce, Terry D. and Wendy L Bowcher (eds.)


2007 New Directions in the Analysis of Multimodal Discourse. Mahwah, NJ: Law-
rence Erlbaum.
Sacks, Harvey
1995 Lectures on Conversation. Oxford, UK: Blackwell.
Salmon, Gilly
2004 E-Moderating, 2nd Ed. London: Routledge Falmer.
Schegloff, Emanuel A.
[1968] 1972 Sequencing in conversational openings. American Anthropologist 10(6):
1075–1095. Reprinted in John J. Gumperz and Dell Hymes (eds.), Directions
in Sociolinguistics: The Ethnography of Communication, 346–380. New York:
Holt, Rinehart and Winston.
Schegloff, Emanuel A., and Harvey Sacks
1973 Opening up closings. Semiotica 8(4): 289–327.
Shultz, Jeffrey J., Susan Florio, and Frederick Erikson
1982 Where’s the floor? Aspects of the cultural organisation of social relationships
in communication at home and in school. In: Perry Gilmore and Allan A. Glat-
thorn (eds.), Children In and Out of School: Ethnography and Education,
88–123. Washington, DC: Center for Applied Linguistics.
Smith, Marc A. and Peter Kollock (eds.)
1999 Communities in Cyberspace. London: Routledge.
Stenström, Anna-Brita
1994 An Introduction to Spoken Interaction. Harlow, UK: Longman.
Turner, Tammara C., Marc A. Smith, Danyel Fisher, and Howard T. Welser
2005 Picturing Usenet: Mapping computer-mediated collective action. Journal of
Computer-Mediated Communication 10(4), article 7. http://jcmc.indiana.edu/
vol10/issue4/turner.html
Turkle, Sherry
1995 Life on the Screen: Identity in the Age of the Internet. London: Wiedenfeld and
Nicolson.
Warschauer, Mark
1996 Comparing face-to-face and electronic discussion in the second language
classroom. CALICO Journal 13(2): 7–26.
Warschauer, Mark
1999 Electronic Literacies: Language, Culture and Power in Online Education.
Mahwah, NJ: Lawrence Erlbaum.
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer Mediated Communication: Linguistic, Social, and Cross-
cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
White, Nancy
2001 Community Member Roles and Types. Seattle, WA: Full Circle Associates.
http://fullcirc.com/community/memberroles.htm
Zelenkauskaite, Asta and Susan C. Herring
2008 Television-mediated conversation: Coherence in Italian iTV SMS chat. In:
Proceedings of the Forty-First Hawai’i International Conference on System
Sciences. Los Alamitos, CA: IEEE Press. http://ella.slis.indiana.edu/~herring/
hicss08.pdf

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:30 AM
22. Conversational coherence in small group chat
Kris M. Markman

1. Introduction

Early analyses of the language of computer-mediated communication (CMC), not-


ing the informality often found in online communication, attempted to determine if
it was more like speech or more like writing (Ferrara, Whittemore, and Brunner
1991; Maynor 1994). However, modes of CMC differ in many ways, most notably
in the degree of synchronicity they afford. Email and electronic bulletin boards are
generally considered to be more asynchronous, because the process of message
production, reception, and response can take place over minutes, hours, days,
weeks, or even months. Channels such as instant messaging and text-based multi-
party chat are more synchronous, as the parties to the interaction must be logged in
at the same time in order to interact. This degree of synchronicity has led a number
of scholars to observe that interaction in computer chat, despite its textual nature, is
in fact a type of conversation and can be studied as such (e.g., Colomb and Simutis
1996; Garcia and Jacobs 1999; Herring 1999, 2010; Simpson 2005; Werry 1996;
Zitzen and Stein 2004).
Levinson (1983: 284) claims that “conversation is clearly the prototypical kind
of language use” and as such can provide insight into most pragmatic phenomena.
However, in text-based conversation, the properties of the medium may alter the
way pragmatic phenomena are manifested. Some indexical terms may lose their
referents in the absence of visual cues (e.g., there is no pointing in a chat room).
Herring (1999, this volume) has noted that the properties of chat can result in fre-
quent violations of Grice’s (1975) maxim of relevance, such that loosened rel-
evance may even become the norm in some chat rooms. There is considerable evi-
dence, in fact, that despite the channel’s apparent synchronicity, chat conversations
can be difficult to follow (Davidson-Shivers, Muilenburg, and Tanner 2001;
O’Neill and Martin 2003; Repman, Zinskie, and Carlson 2005), particularly for
users new to the chat environment. Following the flow of conversation in chat is
not an intuitive process, but rather one that must be learned and internalized (Werry
1996). Nevertheless, people continue to use chat for a variety of recreational and
institutional purposes, and participants in chat interaction learn how to make these
conversations coherent. The question of interest for pragmatics, then, is how
exactly do chat participants accomplish conversational coherence?
This chapter takes up this question by examining one specific context of com-
puter-mediated conversation: small group chat. The primary goal is to shed light on
how chat conversations are made to be coherent by the parties to the interaction.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
540 Kris M. Markman

Following Levinson’s (1983) argument for an empirical approach to the study of


pragmatics, the chapter is grounded in the tradition of Conversation Analysis
(CA), treating chat as a type of text-based talk-in-interaction. Specifically, it is
shown how the character and context of chat interactions can play a role in conver-
sational coherence, using data drawn from a series of computer-mediated team
meetings. The next section presents a brief review of literature on chat conver-
sation, with a focus on studies that describe the properties of chat interaction from
a conversation analytic perspective. This is followed by an analysis of chat meet-
ing data that demonstrates how coherence in these interactions is established pri-
marily by a topical orientation. I conclude with a discussion of the similarities and
differences between the findings for small group chat in an institutional setting and
previous published studies of chat conversation.

2. Observations about chat interaction

2.1. Interaction management in chat


One strand of existing research on chat conversation focuses broadly on strategies
for managing interaction, often in the opening stages of conversation. In ten Have’s
(2000) examination of chat openings, for example, he concluded that by and large
chat participants used pre-existing communicative practices (based on oral com-
munication), with only minimal changes, to engage partners in chat conversations.
In an examination of Internet Relay Chat (IRC), Rintel and Pittam (1997) de-
scribed a four-stage process whereby chat participants attempt to secure partners
with whom to chat. After the server announced the presence of a new chat partici-
pant, the newly joined member sent either a blind/mass greeting (e.g., “hi every-
one”) or a generic statement or question to the chat channel. This was often, albeit
not always, followed by an exchange of non-verbal cues such as emoticons. If par-
ticipants were successful at gaining attention, they followed with transition signals
in an attempt to move into the next phase of interaction. In a related study, Rintel,
Mulholland, and Pittam (2001) found that the automated joining message sent by
the chat server functioned similarly to a telephone ring, allowing new users to initi-
ate interactions. However, unlike receivers of telephone rings, participants in IRC
chat did not orient to joining messages as requiring attention, and therefore these
messages did not guarantee that an initiation move would be ratified. Thus Rintel et
al. (2001) concluded that successfully securing a chat partner in IRC required a
complex series of steps, and many attempts at openings were unsuccessful. Simi-
larly, Markman (2009) found that participants in chat-based team meetings adapted
a two-stage process for both opening and closing their chat sessions.
In addition to managing the openings of conversations, chat participants must
negotiate the ongoing flow of interaction; one strategy for doing so is repair (see

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 541

Jacobs and Garcia, this volume). Schönfeldt and Golato (2003) found that partici-
pants in German IRC channels adapted the same basic repair mechanisms used in
oral conversation to the chat medium. Trouble sources, once identified, caused the
ongoing sequence to be stopped while the trouble was addressed. Schönfeldt and
Golato noted that the preference for self-repair in oral interaction holds for chat, as
well. The most frequent type of repair they found was other-initiated self-repair,
followed by self-initiated self-repair, despite the fact that the sequential locations
normally associated with repair in oral conversation (transition space, third turn)
were not available in the chat medium. Schönfeldt and Golato also identified a
trouble source unique to the chat environment, the non-response (Rintel, Pittam,
and Mulholland 2003): Participants frequently initiated repair when a first-pair
part was felt to have been ignored.
Indeed, frequent silences or gaps between posts are a prominent feature of chat
interaction. In examining such gaps in IRC, Rintel et al. (2003) found that partici-
pants employed specific strategies to help them differentiate among types of am-
biguous non-responses. One of the most common strategies was to clarify that
a non-response was due to user action and not to a technical system problem. To
do this, the IRC users engaged in activities such as re-greeting, reconnecting, or
checking connections with the system. Rintel et al. (2003) also noted that many of
the problems associated with ambiguous non-responses could be eliminated if IRC
or other chat systems adopted monitoring systems. These are now common fea-
tures of various instant messaging systems, whereby the system tells users when an
interactional partner has begun typing a message.
It is clear from the research discussed thus far that although obvious points of
difference between oral conversation and chat exist, chat participants often make
use of (and adapt) strategies for the management of oral conversation to chat en-
vironments. The next section looks at research that specifically examines how chat
conversations are organized with respect to turn management and coherence.

2.2. Coherence and turn organization


Schegloff (1990) notes that although conversational coherence is often thought to
be largely related to the topic of conversation, the sequential organization of
spoken interaction also provides a source of coherence. Moreover, he argues that
sequential structure “provides the basis for finding some topical linkages across
what are, at the surface, topically unrelated and noncohering utterances” (1990:
64). A common feature of chat, however, is disrupted turn adjacency (Herring
1999). Most chat systems are designed such that participants are not able to moni-
tor the ongoing construction of their interlocutors’ turns, thereby rendering the sys-
tems only quasi-synchronous (Garcia and Jacobs 1999) when compared to oral
interaction. In addition, participants in chat have no control over when their mess-
ages are posted in the chat window, and therefore they are unable to control pre-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
542 Kris M. Markman

cisely the sequential organization of turns as they are displayed. The result is dis-
rupted turn adjacency; turns that are designed to be adjacent are “interrupted” by
other turns. This problem is especially common when there are large numbers of
participants in a chat room (Herring 1999).
The inevitability of disrupted turn adjacency means that sequential organiz-
ation cannot be relied upon to provide coherence in chat interaction (see also
Jacobs and Garcia, this volume; Simpson, this volume), and in fact, Herring (1999)
points out that violations of sequential coherence are the rule in most forms of
CMC. As a result, participants have adapted other strategies to cope with the dis-
jointed nature of chat conversations, for example, using punctuation or other means
to indicate that a turn is incomplete (Herring 1999). Werry (1996) identified four
conventions typically used in IRC to manage conversations: addressivity, abbrevi-
ation (of turn length and words and phrases), paralinguistic and prosodic cues, and
actions and gestures. Of these, addressivity, or the practice of routinely naming the
intended recipient within each post, has been shown to be important for conversa-
tional coherence in large group chat interactions (Herring 1999; Panyametheekul
and Herring 2003; Simpson 2005). A common convention for addressivity in chat
is to type the recipient’s name followed by a colon before beginning a turn, as in:
<Shaquille> ariadnne: what the hell does that mean?
<ariadnne> shaq: what are you yapping your lips about? (Werry 1996: 52)
In most chat systems, the speaker’s name, here enclosed in angle brackets, is
automatically appended at the beginning of the message, and the message sender
optionally designates the intended recipient of the turn. This is not the only format
for addressivity, as any use of the recipient’s name in a post will suffice; it should
also be noted that turns may be addressed to all participants or to no one in particu-
lar (Werry 1996: 53).
Addressivity also plays a role in turn allocation. In oral interaction, the sequen-
tial organization of talk is provided for by the turn-taking system (Sacks, Scheg-
loff, and Jefferson 1974: 704). Part of the turn-taking system includes provisions
for managing speaker exchange (i.e., allocating turns). Generally, a current speaker
may select the next speaker, who in turn selects the next, and so forth. If the current
speaker does not select a next speaker, then a next speaker may self-select, with the
rights to the turn going to the first starter. If a new speaker does not self-select, then
the current speaker may continue. This process recurs so as to provide for minimal
gap and overlap between speakers.
Turn-taking in chat is a disjointed process, resembling less of an exchange sys-
tem than a system of adding to an evolving conversation. In fact, it is necessary to
distinguish between turns and posts in chat. A post is one complete unit of text sent
to the chat window, after which another post may appear. It is the arrangement of
posts in the chat window that provides a semblance of a turn exchange system. In
contrast, a turn may be defined as a complete idea or thought unit. Participants may
include multiple turns in a single post or spread one turn across multiple posts, al-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 543

though the default rule in chat is one turn per post (Condon and Čech 2001). There-
fore, in such data a turn construction unit (TCU), or a chunk of text that is analy-
zable as a possibly complete turn (Sacks, Schegloff, and Jefferson 1974), may
encompass part of a post, a complete post, or multiple posts. Accordingly, the tran-
sition-relevance place (TRP), which in oral interaction is the first place where a
next speaker can start a turn so as to provide for minimal gap and overlap (Sacks,
Schegloff, and Jefferson: 703–704), is more nebulous in chat.
However, to establish coherence in chat conversations, participants must still
orient to some form of turn allocation. Panyametheekul and Herring (2003) found
that, although the technical design of chat systems favors speaker self-selection,
the turns that were most successful in garnering responses in a Thai web chat room
were those that followed a current-speaker-selects-next strategy, which was gen-
erally achieved through addressivity. In their data, self-selected turns were the least
successful, and turns that were constructed as current speaker continues were only
moderately successful, because they represented the continuation of initially un-
successful turns. Panyametheekul and Herring conclude that current-speaker-se-
lects-next is the preferred turn allocation strategy for promoting coherence in Thai
web chat interactions.
Using data from small group, classroom-based chat interactions, Garcia and
Jacobs (1999) described a turn-taking system for the medium. In contrast to other
research on chat, Garcia and Jacobs did not rely on chat logs for data analysis, but
instead used video recordings of each participant’s computer screen as the primary
data. They described the participant roles in chat as those of message constructor,
message poster, waiter, reader, and worker (when participants were engaged in non-
screen activities). Garcia and Jacobs noted that in chat, participants could play
multiple roles at one time. They also described the differences between the roles of
current and next speaker in face-to-face and chat interaction. They found that the
current-speaker-selects-next technique was not always successful and argued that
in chat, a “current” poster can really only select a “future” poster, as opposed to a se-
quentially next poster. Garcia and Jacobs also argued that the strategy of next poster
self-selects is best understood as future poster self-selects, again because partici-
pants cannot guarantee that their posts will be placed next to the intended referent.
Overall, the findings reviewed here underscore that problems can occur when
participants attempt to rely solely on sequential placement of turns to provide co-
herence (see also Jacobs and Garcia, this volume). Different strategies have been
adapted to cope with temporal displacement and provide coherence. In particular,
previous research has shown that discourse topics can be a source of coherence in
chat (Herring 2003), instant messaging (Herring and Kurtz 2006; Örnberg Ber-
glund 2009), and in text messages sent via interactive television (Zelenkauskaite
and Herring 2008). In the next section, I demonstrate how an orientation towards
discourse topics helps to establish conversational coherence in the context of vir-
tual team meetings.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
544 Kris M. Markman

3. Case study

The data for this illustration are drawn from a larger case study (Markman 2006) of
conversational structures in virtual team meetings. The team members were five
undergraduate students from a large university in the southwestern United States who
were enrolled in a five-and-a-half week summer semester independent study course
designed to teach them how to work in a virtual (i.e., physically dispersed) team. The
students held four virtual meetings using the chat function in the Blackboard course
management system. (They did not receive any specific training on the Blackboard
system or chat interface.) The author also participated in the team meetings.
Because CA demands that analysts study the unfolding of interaction, moment
by moment, it is necessary to study computer chat as it happens, rather than after
the fact, in order to describe precisely how participants manage conversation in
these spaces. To do this, software was installed on each participant’s computer in
order to record the activities visible on each member’s screen during the team
meetings. Unfortunately, due to technical difficulties, screen recordings are not
available for all team members for the first two meetings. The chat conversations
were also logged automatically by the Blackboard system. Both the video record-
ings and the chat logs were used as data for the analysis.
The video recordings from each team member’s computer screen were tran-
scribed using a system of the author’s design based on the principles of conver-
sation analysis. Text was transcribed exactly as entered, timed in one-second inter-
vals and aligned with the time stamps given to each turn in the chat by the server.
Pauses were counted when 10 or more frames of the video recordings indicated no
activity. Symbols were used to indicate cursor movement, deleted text, and the ac-
tion of pressing the “enter” key or clicking “send”. Other screen actions were de-
scribed verbally and enclosed in double parentheses. Each team member’s individ-
ual transcript was then integrated into a single transcript to allow for side-by-side
comparison of the entire team’s interaction. In the transcription examples in this
chapter, the Chat Window column indicates turns posted to the chat, accessible to
all, and the Chat Time column indicates the clock time (in hh:mm:ss) of actions in
the chat window and on the participants’ computer screens. The remaining col-
umns show the individual team members’ screen actions. Abbreviated versions of
the full team transcripts are presented here due to space considerations. A descrip-
tion of the transcription conventions is provided in the appendix.

3.1. Conversational threads: Resources for interactional coherence


A feature of many types of CMC that is not present in spoken interaction is “thread-
ing”. In many asynchronous CMC systems, such as email, threading is an automatic
technical process that links messages with their replies in a visual format. Most syn-
chronous CMC systems, including chat, do not feature formal threading (cf. Smith,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 545

Cadiz, and Burkhalter 2000 for an example of true threaded chat). However, a
number of scholars have identified conversational threads as a recurring feature of
chat (Greenfield and Subrahmanyam 2003; Holmer 2008; O’Neill and Martin 2003;
Shi et al. 2006; Simpson 2005; Zitzen and Stein 2004), where threads are defined as
a series of related messages (Holmer 2008; Shi et al. 2006) or parallel conversations
(Greenfield and Subrahmanyam 2003; O’Neill and Martin 2003; Simpson 2005,
this volume). What makes a “thread” in chat is not a visual tie between related posts,
but rather the observable contextual relations (O’Neill and Martin 2003: 44) be-
tween messages, most notably the discourse topic. Thus conversational threads,
understood as a series of topically-related messages, serve as a primary source for
coherence in synchronous chat, although in chat rooms with large numbers of par-
ticipants and multiple topics of conversation, topics tend to decay rapidly, making
conversational threads inadequate as a sole source of coherence (Herring 1999).
A detailed examination of the conversation in the chat meetings presented here
shows that participants organize their conversations and maintain coherence pri-
marily through an orientation towards discourse topics in their patterns of turn con-
struction. Specifically, I demonstrate how adjacency sequences, lexical cohesion,
and addressivity are used in turn design to contribute to a coherent discussion. In
all examples, the names of the team members have been changed and other iden-
tifying information has been omitted to protect confidentiality.
(1)
Chat Time Chat Window THADINE REBECA
5:21:17 REBECA: what do you think? is it ((pause))
doable?
5:21:18
(omitted) [omitted]
5:21:49 REBECA: what areas are we all inter-
ested in reearching?
5:21:50
((pause))
5:21:51
5:21:52
5:21:53
5:21:54 ((returns to chat))
5:21:55 ok
5:21:56 I-f
5:21:57 ang,
5:21:58 it’s
5:21:59 ((pause))
5:22:00 on Bl
5:22:01 ackboar
5:22:02 d ((pause))
5:22:03 ((pause)) now

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
546 Kris M. Markman

5:22:04 THADINE: ok I-fang, it’s on Black- ((pause))


board now
(omitted)
5:22:14 I“ d
5:22:15 d”
5:22:16 do think
5:22:17 its do
5:22:18 able
5:22:19 ((pause))
5:22:20 , and
5:22:21 Ia
5:22:22 m ine
5:22:23 etereste
5:22:24 d
5:22:25 ((pause))
5:22:26
(omitted)
5:22:41
5:22:42
5:22:43 detseretni
5:22:44 EVAN: I like wireless as you all know ma I
5:22:45 dna,
5:22:46 ee
5:22:47 THADINE: I do think its doable I am I do
5:22:48 intere too
5:22:49 sted in ((pause))
5:22:50 ((pause)) , but
5:22:51 ni i wo
5:22:52 in et uld
5:22:53 tither r rathe
5:22:54 eally r lo
5:22:55 ok int
5:22:56 o the
5:22:57 THADINE: I am interested in either ((pause)) game
really
5:22:58 ing
5:22:59 in cl
5:23:00 ass r
5:23:01 ooms
5:23:02 ((pause))
5:23:03
5:23:04 stuff
5:23:05 REBECA: I do too, but i would rather
look into the gaming in class rooms stuff.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 547

Prior to this excerpt, team member Rebeca had ascertained that the other
members present at the meeting had received some documents she had emailed to
them earlier in the day. She then posted two questions in a single turn at 5:21:17,
designed to elicit an assessment of those documents from her teammates. After a
17-second pause, during which no new turns were posted to the chat, Rebeca began
typing a new turn that was posted at 5:21:49. This turn is also phrased as a ques-
tion, this time introducing a new topic (what the team planned to study for their
project). The next contribution to the chat was provided by Thadine, who had been
complying with a request made by another team member. Thadine began typing as
soon as she returned to the chat window, and her turn at 5:22:04 indicated that the
request had been fulfilled.
After a pause, Thadine turned her attention to Rebeca’s two sets of questions at
5:22:14. As transcript 1 shows, Thadine began by addressing Rebeca’s two turns in
one post, addressing the first question (“is it doable?”) first, then linking this
answer with the conjunction “and” at 5:22:20 to her answer to the second question
(“what areas are we all interested in re[s]earching?”). However, Thadine only gets
as far as the word “interested” before pausing and then, at 5:22:43, deleting the sec-
ond half of her turn. She then immediately sends the first response at 5:22:47 and
without pausing, re-types her second response, which she completes at 5:22:56. By
deciding to split her response into two consecutive turns, Thadine mimics the
structure of Rebeca’s original posts and aligns her responses to their respective
topics.
Rebeca’s turns at 5:21:17 and 5:21:49 and Thadine’s turns at 5:22:47 and
5:22:57 display some of the elements commonly used in these data to construct
turns that are sensitive to topical coherence. Adjacency sequences, such as ques-
tions/answers and greetings, are frequently used. By phrasing her two posts as
questions, Rebeca makes it more likely not only that her turns will receive re-
sponses, but that the responses will be in a form, namely answers, that will be more
easily matched to the appropriate prior turns. However, it is often the case that
other elements are necessary to make the topical connection clear. Thadine pro-
vided an answer to Rebeca’s first post with her turn at 5:22:47 by providing an as-
sessment. Thadine could have simply answered “yes” and achieved the same
meaning. Instead she repeats specific lexical items from Rebeca’s turn, namely “do
think” and “doable”, to make her second pair part cohesive with Rebeca’s first pair
part. “Cohesion is a semantic relation between an element in the text and some
other element that is crucial to the interpretation of it” (Halliday and Hasan 1976:
8). One type of cohesive tie that is found recurrently in these data is that of reiter-
ation (Hasan and Halliday 1976: 288); see also Greenfield and Subrahmanyam
2003). Lexical cohesion is also illustrated by Thadine’s repetition of the word “in-
terested” in her turn at 5:22:57, which links her turn to Rebeca’s post at 5:21:49.
Reiteration can also be accomplished with a synonym, as in Evan’s turn at 5:22:44.
By starting his turn with “I”, Evan indicates his inclusion in “we all” of Rebeca’s

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
548 Kris M. Markman

question. Additionally, in Evan’s turn “like” provides a semantic match with “in-
terested”, and “wireless” has a cohesive tie with “areas” through collocation (Hal-
liday and Hasan 1976: 285), as it had been discussed earlier in the meetings.
The analysis of example 1 has thus far demonstrated how the use of lexical
cohesion and adjacency sequences can contribute to a topically-coherent interac-
tion. Before moving on, it is worth noting another element present in this extract.
Previously, the practice of addressivity was identified as a coherence-maintaining
device commonly used in public chat rooms. Interestingly, the use of address terms
is relatively uncommon in the virtual team data. In fact, these data do not contain
any instances of the name+colon convention described by Werry (1996). When ad-
dress terms are used in these meetings, it is usually in greetings (e.g., “hi evan” or
“hi guys”), to express agreement, support for an idea, or thanks (e.g., “yeah I-fang”,
“rebeca that sounds pretty cool …”, and “thanks evan”), or less frequently, as re-
pair initiators (e.g., “what do you mean sid?” and “sorry, that was for Rebeca”). In
example 1 above, Thadine’s post at 5:22:04 (“ok I-fang, it’s on Blackboard now”)
is an example of another use for address terms. Thadine’s turn is specifically ad-
dressed to the team member I-Fang, who approximately five minutes earlier had
made the following request:
5:17:03 I-FANG: can someone post what rebeca sent … coz i cant access my email …
5:17:13 THADINE: it’s kinda long
5:17:22 I-FANG: on blackboard i mean

Thadine’s use of an address term (I-Fang) at 5:22:04 serves to help link her turn to
the correct conversational thread by indicating the intended recipient.

3.2. Speakership roles and turn allocation in the virtual team meeting
Further evidence of the role of discourse topics in interactional coherence becomes
apparent when considering the speakership roles oriented to by the team members.
I use terms such as “speaker” and “conversation” here deliberately to reinforce my
assertion that chat interactions are a type of text-based talk-in-interaction. This
section shows how these speakership roles are related to conversational threads
and provides examples that demonstrate that participants are orienting to two basic
units in the chat conversation system: the post and the turn, as discussed earlier. Al-
though Garcia and Jacobs (1999) identify the transition-relevance point in chat as
following a complete, posted message, there is evidence in these data that the par-
ticipants orient to multiple possible points for beginning a new turn.
In contrast to large public chat rooms such as those studied by Panyametheekul
and Herring (2003), Rintel and Pittam (1997), and Werry (1996), the number and
frequency of posts in these small group meetings are such that participants did not
find it necessary to designate a turn recipient for most turns. Moreover, because
chat does not allow participants to control the sequential order of posts in the chat

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 549

window, they are not able to designate a specific, sequentially next speaker; the
next possible speaker is anyone/everyone, and thus there is no need to do much in
the way of formally allocating turns. However, it is sometimes useful to design
turns in such a way that they make particular team members relevant future speak-
ers. Because there is a conceptual difference between a post and a turn in CMC, it
is also possible for chat participants to adopt the role of a continuing current
speaker. Thus, participants in the virtual team meetings may adopt three possible
speakership roles: self-selected new speaker, continuing current speaker, and rel-
evant future speaker. The next sections examine how these roles work in conjunc-
tion with conversational threads.

3.2.1. Self-selection: Starting a new thread


By far the most prominent role in this team’s chat is that of the self-selected
new speaker. The structural characteristics of the medium favor self-selection
(Panyametheekul and Herring 2003), and it appears that the context of a team
meeting, where the number of participants is small and the general goal is to gen-
erate ideas, also favors self-selection. One of the most important functions of self-
selected turns in these data is to begin new topics of conversation.
This team conducted very informal meetings, with no pre-ordained format,
agenda, or official leader. Thus one of the participants’ most pressing needs upon
entering the chat was to organize their discussion, and they did this by self-select-
ing to start new topics of discussion, as in example 2 below.
(2)
Chat Time Chat Window SIDNEY
10:14:27 THADINE: Yeah, we probably should start without
him.
10:14:28
10:14:29
10:14:30
10:14:31 wo
10:14:32 owso wh
10:14:33 at ((pause))
10:14:34 shall
10:14:35 e we ((pause)) e
10:14:36 we
10:14:37 we t
10:14:38 alk abou
10:14:39 SIDNEY: so what shall we talk about t ((pause))
(omitted)

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
550 Kris M. Markman

In example 2, after an extended period of pre-meeting talk, including specu-


lation about an absent team member, Sidney uses a self-selected new turn at
speaking to attempt to open the meeting. Given their lack of formal meeting
agenda, Sidney uses this turn as an opportunity to start a discussion about that
agenda. He does this by prefacing his turn with the discourse marker so. One of
the possible functions of so is to mark incipient action that has been delayed in
the conversation (Bolden 2006: 668). In this case, the action that has been pend-
ing is the official start of the meeting discussion. Additionally, as a marker of in-
cipient action, so can be used to launch new conversational topics (Bolden: 668),
and in fact the strategy of using a self-selected new topic turn constructed with a
so-preface as a way of attempting to open the meeting was recurrent in these
data.

3.2.2. Self-selection: Adding to threads in progress


Whereas self-selection to start new topics is the process that forms the basis for
these chat conversations, the body of the chat is maintained by posts that con-
tinue topics already in progress. These turns are considered self-selected because
no provisions have been made in previous turns that specifically call for a re-
sponse or address a turn to a particular individual. Three types of self-selected
topic continuer turns can be identified in these meetings. The first type is general
turns that show agreement or support for ideas, add opinions or information, or
elaborate on topics currently under discussion. These make up the bulk of con-
tinuer turns and much of the overall meeting discourse. The other two types of
self-selected topic continuer turns are repair initiators and repair efforts made by
someone other than the speaker of the trouble source turn. However, because of
space considerations, I discuss here only examples of self-selected topic continu-
ers of the first type.
As with example 1, asking a question is one strategy for generating responses
that continue a topic. Topic continuer turns may also be used to show agreement or
disagreement and add new information or elaborate on a thread.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 551

(3)
Chat Time Chat Window EVAN THADINE
5:11:48 THADINE: the only thing about the
articles Rebeca found (and I didn’t read
them all yet) is that I believe we’re
supposed to be focusing on what’s
going on in [city name]
5:11:49
5:11:50
5:11:51
5:11:52
5:11:53 and ev
5:11:54 en more
5:11:55 specifica
5:11:56 Ye lly
5:11:57 ah, ((pause))
5:11:58 ((pause)) a ((pause))
5:11:59 the r
5:12:00 genera ound camp
5:12:01 THADINE: and even more specifically l idea pus
around campus
5:12:02 is t ((pause))
5:12:03 oSget
5:12:04 oSt
5:12:05 I-FANG: are we? ude
5:12:06 nts per
5:12:07 spective
5:12:08 s…
5:12:09 thou
5:12:10 gh
5:12:11 rweaa
5:12:12 re able
5:12:13 rto exp that’s th
5:12:14 and ou e imp
5:12:15 tside of th res
5:12:15 [KRIS joined the session] ((pause)) sion
5:12:16 at I
5:12:17 ((pause)) got
5:12:17 THADINE: that’s the impression I got
5:12:18 EVAN: Yeah, the general idea is to get
Students perspectives … though we are
able to expand outside of that

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
552 Kris M. Markman

Example 3 shows how topics can be continued by the use of assessments. At


5:11:48, Thadine posted a self-selected topic continuer post that referred to materi-
als sent by another team member prior to the meeting, framed as an assessment of
Rebeca’s articles. As it turns out, Thadine’s post at 5:11:48 did not constitute a
complete turn, but it was analyzable as complete by Evan, and at 5:11:56 he re-
sponded with a second assessment (Pomerantz 1977) by displaying agreement
with Thadine’s assessment and by elaborating on his interpretation of the project’s
goals. Evan was still typing when Thadine’s turn-completing post arrived at
5:12:01, so it is likely that his mention of student perspectives was produced inde-
pendently of Thadine’s similar reference to “around campus” and therefore may
more closely resemble a weak agreement prefacing a qualification. Pomerantz
notes that first assessments make relevant a response; however, the person whose
information was being assessed in Thadine’s self-selected post (Rebeca) was not
yet present in the chat and therefore was unavailable to respond. That left the other
two team members, Evan and I-Fang, as possible relevant future speakers, al-
though it was up to them to self-select to step into this role. A detailed discussion of
relevant future speakers is presented in section 3.2.4.

3.2.3. Continuing turns: Maintaining the role of current speaker


There are clear indications in these data that in some instances, team members are
oriented toward their roles as current speakers, metaphorically holding the floor
over multiple posts. These instances of current-speaker-continues occur when the
participant immediately continues typing upon sending the first post and when the
subsequent post is analyzable as a continuation of the first post.

(4)
Chat Time Chat Window SIDNEY THADINE
5:28:23 so
5:28:24 li thought
5:28:25 lthe who maybe
5:28:26 le pr ((pause))r , bu
5:28:27 urp ((pause)) t it
5:28:28 ose of all has
5:28:29 othis ((pause)) to
5:28:30 proje ((pause)) be out
5:28:31 ct of class
5:28:32 cwas to f stuff,
5:28:33 ind ((pause)) the in and
5:28:34 ((pause)) nov grad
5:28:35 ators reserrarch
5:28:36 not to isn’t exacy

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 553

5:28:37 SIDNEY: so i thought the whole pur- come wit ((pause))


5:28:38 pose of this project was to find the in-
5:28:39 novators tth yt
5:28:40 a list ly out
5:28:41 of th of cl
em ((pause)) ass
5:28:42 THADINE: maybe, but it all has to be
5:28:43 out of class stuff, and grad research
isn’t exactly out of class ((pause))
5:28:44 SIDNEY: not to come with a list of
them

Example 4 demonstrates how current speakers can continue their turns


over multiple posts. In this extract, we see the screen activity of team member
Sidney. The first unit of his turn is a self-selected, new speaker contribution to
an ongoing topic about what and whom the team should study for their project.
He begins typing during a lull in the conversation; the immediately prior post
arrived 23 seconds earlier and marked the end of a short side-sequence about
being late to the meetings. At 5:28:35, Sidney completes the first TCU of
his two-post turn with the word “innovators”; he hits enter and continues typing
with no break in action at 5:28:36. Although the first TCU could possibly be
complete at “innovators”, Sidney’s use of the conjunction “not” to begin his
second TCU clearly links the two units together and therefore serves as a cue to
the other team members that both posts are meant to be read together as a single
turn.
There are some instances in these data where breaking up a turn over multiple
posts appeared to be motivated by the limited size of the message entry box in the
chat application. However, in example 4 Sidney had his chat window maximized,
and the first TCU does not come close to filling the entire message entry box on his
screen; thus a different explanation is needed for his choice. Further examination
of the two TCUs in this turn shows that Sidney is drawing a distinction in his turn
between what he sees as two forms of action the team members can undertake:
They can find innovators, and they can list them. While he could have typed all of
this turn together as one post, by splitting his idea into two posts he can highlight
more effectively for the rest of the team the distinction he is trying to make. This is,
however, a somewhat risky strategy, as there is no guarantee that two units of the
same turn will be posted adjacently. In this case, Thadine began typing an unre-
lated turn two seconds after Sidney began his first TCU, and she hit enter one sec-
ond before Sidney, resulting in her turn “interrupting” Sidney’s turn. The effect is
that the other team members must work to re-align Thadine’s turn with the turn it is
responding to (an earlier post by another team member) in order to link the two
units of Sidney’s turn.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
554 Kris M. Markman

Whereas one strategy for maintaining the role of current speaker is to continue
a single turn over multiple posts, these data also show that participants may act as
current speakers over multiple turns. In these instances, TCUs may be typed con-
tinuously or near continuously, as seen in the previous examples, or they may be
separated by a brief pause. What marks these posts as continuations, as opposed to
self-selected new turns, is that they are analyzably complete turns that relate to the
same topic. Extract 5 shows a typical example of this phenomenon.
(5)
Chat Time Chat Window EVAN I-FANG
(omitted)
5:32:44
5:32:45 ble ((pause))
i
5:32:46 EVAN: I noticed that we are all bringing ((pause)) d ((pause))
5:32:47 our own definitions of technology to the
5:32:48 table W out
5:32:49 e all of or
5:32:50 assume it dinary
5:32:51 has to do way?
((pause))
5:32:52 I-FANG: cool … but did he do it in a out with com
5:32:53 of ordinary way?
5:32:54 puters
5:32:55 and elec
tronic
5:32:56 EVAN: We all assume it has to do with s
computers and electronics
5:32:57 ((pause))
(omitted)
5:33:01 it
5:33:02 MOOM does
5:33:03 Comp nt have
5:33:04 uters to be
5:33:05 speci … but
5:33:06 fically those
5:33:07 EVAN: Computers specifically are the
5:33:08 But most p
5:33:09 I was opula
5:33:10 in the show r ((pause))
5:33:11 er an
5:33:12 d realiz ones
5:33:13 ed that

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 555

5:33:14 I-FANG: it doesnt have to be … but those it sor ((pause))


5:33:15 are the most popular ones
5:33:16 eaaer
ppopr
5:33:17 THADINE: true eads
5:33:18 bey
5:33:19 ind thatt
5:33:20 aht dni
5:33:21 onee
5:33:22 d that a new
5:33:23 s I though cool s
5:33:24 t about tu
5:33:25 it ff o
5:33:26 EVAN: But I was in the shower and real- ((pause)) u
ized that it spreads beyond that as I
thought about it

At 5:32:45, Evan has completed a self-selected turn that introduces a new topic
into the conversation. After a very brief pause, he begins typing a new turn. Evan’s
new turn is cohesively linked to his first turn specifically by repeating the pronoun
“we” and using the superordinate “computers and electronics” for “technology”
(Halliday and Hasan 1976: 288). The transcript also shows that, although an unre-
lated turn by I-Fang (at 5:32:52) gets posted to the chat before Evan’s second turn,
he began typing his turn before any responses had been received. It is possible that
the silence had motivated him to expand on his original idea, but given the length
of his pause (just under three seconds), it is unlikely that anyone else in the meeting
would have had a chance to respond before he began typing again, thus reinforcing
this as an example of a current speaker attempting to hold the floor. After Evan sent
his post at 5:32:56, he followed a similar pattern, pausing for approximately four
seconds before beginning another turn that further refined his previous post. Evan
posted “Computers specifically” at 5:33:07, then immediately continued typing a
new turn at 5:33:08, which displays a link to the previous set of turns through the
use of the conjunction “but”. What Evan was able to accomplish in extract 5 was a
set of four individual yet related turns that, taken together, expressed and elabor-
ated on a single idea. In doing so, he was also able to establish a new topic and was
successful in moving the conversation in that direction.
Thus far it has been demonstrated how participants in these virtual meetings
adopted speakership roles as a self-selecting new speaker or as a continuing current
speaker. The final segment of data analysis examines the third speakership role
present in these data, that of the relevant future speaker.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
556 Kris M. Markman

3.2.4. Selection by others: Relevant future speakers


Earlier it was noted that some small group chat interactions show a much lower use
of addressivity as a turn allocation device as compared to interactions in large chat
rooms. There are still times, however, when participants make it relevant for others
to respond to a specific thread. As noted previously, participants cannot control
who will be sequentially next in the chat, so this orientation is to a future, rather
than a next, speaker.
One very effective way to start a new topic is to ask a question. Generally, topic-
initiator questions in these data are designed for the whole group and thus make all
team members relevant future speakers. When questions or other turn types desig-
nate a specific recipient, that recipient then becomes a specific relevant future
speaker for the purposes of that topic. Thus there are two types of future speakers:
those who are made generally relevant (i.e., someone/anyone should respond) and
those who are made specifically relevant (i.e., a specific person or persons should re-
spond). In example 3 above, I pointed out an instance of a general relevant future
speaker; I turn now to an example explicitly naming a future speaker.
(6)
Chat Time Chat Window THADINE
5:12:26 EVAN: You still planning on turnign that in by
10:00 Thadine
5:12:27
5:12:28
5:12:29
5:12:30
5:12:31 I-FANG: ugh … the hotmail one?
5:12:32
5:12:33
5:12:34 ((returns to chat win))
5:12:35
5:12:36
5:12:37
5:12:38 no,
5:12:39 I
5:12:40 EVAN: yep already
5:12:41 turned
5:12:42 it
5:12:43 i
5:12:44 ((pause))
5:12:45
5:12:46 n, I
did that
ls

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 557

5:12:47 I-FANG: 2mg is just not enough … oh well … sast


send it to my [school] email
5:12:48 night
5:12:49 THADINE: no, I already turned it in, I did that last
night

Just as questions are commonly used to make general future speakers rel-
evant, as seen in example 1, they are also employed when a response from a
specific person is sought. Example 6 shows a typical instance. Here, Evan re-
quested information about the status of part of the team’s project. Thadine was
the team member responsible, and thus Evan addressed his turn specifically to
her at 5:12:26. Thadine did not have the chat window visible on her computer
screen at the time Evan’s turn posted, but five seconds after she returned to the
chat window she replied to his question, displaying her orientation as a specific
relevant future speaker. Thadine does not use an address turn in her response,
but by recycling the phrase “turni[ng] that in” from Evan’s turn in her post,
Thadine makes a cohesive tie to Evan’s question (Halliday and Hasan 1976).
In general, these data show that questions are the most common way that spe-
cific future speakers are made relevant, but other first pair parts are sometimes
used.
As noted above, general questions and other first pair parts make all partici-
pants generally relevant as future speakers. However, there are a small number of
instances where a specific future speaker is made relevant, but a second individual
treats the first pair part as an opportunity to respond as a general future speaker (see
also Panyametheekul and Herring 2003).
(7)
Chat Time Chat Window SIDNEY
10:12:43 KRIS: if you set your display to 256 colors it will
reduce the file size
(omitted)
10:13:43 I-FANG: how do we set it to 256 colors?
(omitted)
10:13:50
10:13:51
10:13:52 right
10:13:53 click
10:13:54 THADINE: ok, blue bars gone now. sorry about on
that

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
558 Kris M. Markman

10:13:54 REBECA: Well, I think evan must be runing late. your


10:13:55 desk
10:13:56 top ((pause))
10:13:57
10:13:58 ((pause)) –
10:13:59 – por
10:14:00 roropte
10:14:01 eterti
10:14:02 es –
10:14:03 -s e
10:14:04 e ettin
10:14:05 SIDNEY: right click on your desktop – properties – gs de
10:14:06 settings
10:14:07 pendin
10:14:08 g ((pause)) g
10:14:09 ((pause)) n
idnepedfor
windows
10:14:10 SIDNEY: for windows ((pause))

Example 7 is part of a longer discussion about technical issues related to the


chat room. As part of this discussion, Kris offered a suggestion at 10:12:43 about
adjusting the computer’s screen settings. One minute later, after some intervening
discussion (omitted from the transcript), I-Fang requested instructions for adjust-
ing her computer’s display. I-Fang’s turn did not explicitly name Kris as a recipi-
ent, but because she offered the initial suggestion, Kris is a specific relevant future
speaker for this turn. However, Sidney also possessed the required knowledge for
adjusting the screen settings, and he began typing a response to I-Fang’s question
at 10:13:52. In one sense, Sidney’s turn at 10:14:05 could be understood as simply
a self-selected topic continuer. However, because the turn he was responding to
was a question, and he is providing an answer, he is also acting as a relevant future
speaker. This is made more plausible by the fact that I-Fang’s first pair part did not
contain a specific recipient.

4. Discussion

The findings described above illustrate that several factors play important roles in
how people organize and maintain coherence in chat conversations. These factors
include the size of the group, the specific technical features of the chat environ-
ment, and the purpose and context of the talk (institutional versus recreational,
etc.).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 559

The size of the chat group is important in a number of respects. With a smaller
number of people in a chat room, there is less competition for the floor. More par-
ticipants generally equals more turns, and therefore potentially increases not only
the instances of disrupted turn adjacency but also the distance between adjacent
turns. To compensate for the increased competition, participants in large public
chat rooms tend to construct relatively short turns (Cherny 1999; Werry 1996).
Posting shorter turns more frequently increases the likelihood that a given turn will
be posted close to its antecedent turn, thereby potentially securing the floor for a
given participant. By contrast, the turns in the data discussed here varied in size,
but they were generally longer than turns observable in data drawn from large pub-
lic chat rooms. It was not uncommon for turns in these data to consist of multiple
clauses or sentences, a characteristic also observable in the small chat groups
studied by Garcia and Jacobs (1999).
In addition, the size of the group appeared to influence participants’ use of
addressivity, which was much less frequent than what has been observed in large
chat rooms (e.g., Werry 1996). Finally, the size of the group, coupled with team
members’ tendency to post long turns, meant that there were fewer turns overall
posted during these meetings, compared to what might be expected in a large, pub-
lic chat room. Features of the chat environment also crucially affect the overall or-
ganization of conversation in this medium. The persistence of talk is an advantage
that text-based conversational systems have over oral interaction. Many chat sys-
tems used in education, such as the one used here and those examined by Simpson
(2005, this volume) and Colomb and Simutis (1996), offer users access to an on-
going log of the interaction, allowing them to scroll back to previous parts of the
conversation. This feature was used recurrently by the team members in this study,
and on some occasions it contributed directly to the formulation of new turns. Al-
though not all chat environments offer a logging feature, Herring (1999) notes that
even in such cases, chat environments are more persistent than in oral interaction,
because the most recent posts are typically available for viewing in the chat
window for some period of time before they scroll up and off the screen. The abil-
ity to read and re-read prior turns gives chat participants additional resources for
turn construction, and by extension, for conversational coherence.
In chat interactions with numerous participants, it could be decidedly disad-
vantageous to act as a continuing current speaker by spreading turns over multiple
posts or by posting multiple, related turns. However, in small group meetings, this
orientation can be an effective strategy for securing attention and increasing the
chances of holding the floor. Multiple, related posts have a visual presence that can
compensate for the egalitarian nature of the technology. Thus while the chat sys-
tem’s self-select feature means that no one is prevented from taking a turn at any
time, the current speaker continuous role gives participants the opportunity to
make their textual “voices” somewhat more prominent, which may encourage
others to yield the floor.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
560 Kris M. Markman

These findings highlight the overall importance of conversational context to


coherence. Although their work was based on dyads and not groups, Condon and
Čech’s (1996a, b) studies of decision-making in chat demonstrated that turn-taking
and turn design were influenced by the decision-making frame. It is likely that the
structure of the conversations in the meetings presented here was also influenced
by the specific context of “team meeting”. This group was meeting for a purpose,
and although the members did not organize their meetings with formal agendas,
they still had an overall goal of getting work done during the course of the interac-
tion. Institutional talk (Drew and Heritage 1992), and meeting talk specifically, has
been shown to influence the turn-taking system in oral interaction (Boden 1994).
Evidence for the differences between other forms of institutional talk (pedagogical
chat) and recreational chat has been shown by Herring and Nix (1997). Similarly,
it is clear that the meeting frame affected the organization of interaction in these
chat conversations (cf. Skovholt and Svennevig, this volume). It is telling that the
published accounts of other small group chat based in institutional settings (e.g.,
Garcia and Jacobs 1999; O’Neill and Martin 2003) display findings on conversa-
tional coherence similar to those presented in this chapter.

5. Conclusion

In this chapter, I have examined how conversational coherence operates in one


context of computer chat: a student team meeting. I have shown that the partici-
pants were primarily oriented to discourse topics as a means for designing and
structuring turns. In particular, lexical cohesion, adjacency sequences, addressiv-
ity, and speakership roles were shown to be important resources for establishing
coherence. I also discussed some of the differences between these small group data
and other published studies of chat conversation.
Although many researchers have taken an interest in the structural organization
of chat interaction, many unanswered questions remain. Future research could
make use of the data collection and transcription methods presented here to explore
chat interactions of different sizes and types, thereby further refining pragmatic
understandings of this type of CMC.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 561

Appendix. Transcription conventions

Convention/symbol Explanation
Double olleh bob Deleted characters/spaces
strikethrough
Deleted characters are shown in reverse
order, unless the entire word and/or phrase
was selected and deleted in one action, in
which case the deleted information is shown
in normal order, e.g., hello bob
Double ((mouses to chat Transcriber description/comments
parentheses window))
Enter/Send

Terms used in transcript description:


Mouses: Movement of mouse pointer on screen, shown with direction and/or target
BBoard: Blackboard, the propriety course management software being used by this team
IE: Internet Explorer
Win: Window
Min: Minimizes
Msg Entry: The box where participants type messages to be posted to the chat
Disc bd/Disc forum: Discussion board/forum, a section of Blackboard where team members can
post asynchronous messages and attach documents

References

Boden, Deirdre
1994 The Business of Talk: Organizations in Action. Cambridge, MA: Polity Press.
Bolden, Galina B.
2006 Little words that matter: Discourse markers “so” and “oh” and the doing of other-
attentiveness in social interaction. Journal of Communication 56: 661–688.
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford, CA: CSLI
Publications.
Colomb, Gregory G. and Joyce A. Simutis
1996 Visible conversation and academic inquiry: CMC in a culturally diverse class-
room. In: Susan C. Herring (ed.), Computer-Mediated Communication: Lin-
guistic, Social, and Cross-Cultural Perspectives, 203–222. Amsterdam/Phil-
adelphia: John Benjamins.
Condon, Sherri L. and Claude G. Čech
1996a Functional comparisons of face-to-face and computer-mediated decision mak-
ing interactions. In: Susan C. Herring (ed.), Computer-Mediated Communi-
cation: Linguistic, Social, and Cross-Cultural Perspectives, 65–80. Amster-
dam/Philadelphia: John Benjamins.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
562 Kris M. Markman

Condon, Sherri L. and Claude G. Čech


1996b Discourse management strategies in face-to-face and computer-mediated deci-
sion making interactions. Electronic Journal of Communication 6(3).
http://www.cios.org/EJCPUBLIC/006/3/006314.HTML
Condon, Sherri L. and Claude G. Čech
2001 Profiling turns in interaction. In: Proceedings of the 34th Hawaii International
Conference on System Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2004/2056/04/205640107b.pdf
Davidson-Shivers, Gayle V., Lin Y. Muilenburg, and Erica J. Tanner
2001 How do students participate in synchronous and asynchronous online dis-
cussions? Journal of Educational Computing Research 25: 351–366.
Drew, Paul and John Heritage (eds.)
1992 Talk at Work: Interaction in Institutional Settings. Cambridge, UK: Cambridge
University Press.
Ferrara, Kathleen, Hans Brunner, and Greg Whittemore
1991 Interactive written discourse as an emergent register. Written Communication
8: 8–34.
Garcia, Angela C. and Jennifer B. Jacobs
1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer-mediated communication. Research on Language & So-
cial Interaction 32: 337–367.
Greenfield, Patricia Marks and Kaveri Subrahmanyam
2003 Online discourse in a teen chatroom: New codes and new modes of coherence
in a visual medium. Journal of Applied Developmental Psychology 24: 713–738.
Grice, H. Paul
1975 Logic and conversation. In: Donald Davidson and Gilbert Harman (eds.), The
Logic of Grammar, 64–75. Encino, CA: Dickenson.
Halliday, M. A. K. and Ruqaiya Hasan
1976 Cohesion in English. London: Longman.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2003 Dynamic topic analysis of synchronous chat. In: New Research for New
Media: Innovative Research Methodologies Symposium Working Papers and
Readings. Minneapolis, MN: University of Minneapolis School of Journalism
and Mass Communication. http://ella.slis.indiana.edu/~herring/dta.2003.pdf
Herring, Susan C.
2010 Computer-mediated conversation: Introduction and overview. Language@In-
ternet 7, article 2. Special issue on Computer-Mediated Conversation, Part I,
Susan C. Herring (ed.). http://www.languageatinternet.org/articles/2010/2801/
index_html/
Herring, Susan C. and Andrew J. Kurtz
2006 Visualizing Dynamic Topic Analysis. In: Proceedings of CHI’06. New York:
ACM Press.
Herring, Susan C. and Carol G. Nix
1997 Is “serious chat” an oxymoron? Pedagogical vs. social uses of Internet Relay

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
Conversational coherence in small group chat 563

Chat. Paper presented at the American Association of Applied Linguistics An-


nual Conference, Orlando, FL, March 11.
Holmer, Torsten
2008 Discourse structure analysis of chat communication. Language@Internet 5,
article 9. http://www.languageatinternet.org/articles/2008/1633
Levinson, Stephen C.
1983 Pragmatics. Cambridge, UK: Cambridge University Press.
Markman, Kristine M.
2006 Computer-mediated conversation: The organization of talk in chat-based
virtual team meetings. Ph.D. dissertation, Department of Communication
Studies, The University of Texas at Austin.
Markman, Kris M.
2009 “So what shall we talk about”: Openings and closings in chat-based virtual
meetings. Journal of Business Communication 46: 150–170.
Maynor, Natalie
1994 The language of electronic mail: Written speech? In: Michael Montgomery and
Greta D. Little (eds.), Centennial Usage Studies, 48–54. Publications of the
American Dialect Society Series. Tuscaloosa, AL: University of Alabama
Press.
O’Neill, Jacki and David Martin
2003 Text chat in action. In: Proceedings of the 2003 International ACM SIG-
GROUP Conference on Supporting Group Work, 40–49. New York: ACM
Press.
Örnberg Berglund, Therese
2009 Disrupted turn adjacency and coherence maintenance in Instant Messaging
conversations. Language@Internet 6, article 2.
http://www.languageatinternet.org/articles/2009/2106/Berglund.pdf
Panyametheekul, Siriporn and Susan C. Herring
2003 Gender and turn allocation in a Thai chat room. Journal of Computer-Mediated
Communication 9(1).
http://www.ascusc.org/jcmc/vol9/issue1/panya_herring.html
Pomerantz, Anita
1977 Agreeing and disagreeing with assessments: Some features of preferred/dis-
preferred turn shapes. In: J. Maxwell Atkinson and John Heritage (eds.), Struc-
tures of Social Action: Studies in Conversation Analysis, 57–101. Cambridge,
UK: Cambridge University Press.
Repman, Judi, Cordella Zinskie, and Randal D. Carlson
2005 Effective use of CMC tools in interactive online learning. Computers in the
Schools 22: 57–69.
Rintel, E. Sean, Joan Mulholland, and Jeffery Pittam
2001 First things first: Internet Relay Chat openings. Journal of Computer-Mediated
Communication 6(3). http://jcmc.indiana.edu/vol6/issue3/rintel.html
Rintel, E. Sean, Jeffery Pittam, and Joan Mulholland
2003 Time will tell: Ambiguous non-responses on Internet relay Chat. Electronic
Journal of Communication 13(1).
http://www.cios.org/EJCPUBLIC/013/1/01312.HTML

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
564 Kris M. Markman

Rintel, E. Sean and Jeffery Pittam


1997 Strangers in a strange land – Interaction management on Internet Relay Chat.
Human Communication Research 23: 507–534.
Sacks, Harvey, Emanuel A. Schegloff, and Gail Jefferson
1974 A simplest systematics for the organization of turn-taking for conversation.
Language 50: 696–735.
Schegloff, Emanuel A.
1990 On the organization of sequences as a source of “coherence” in talk-in-inter-
action. In: Bruce Dorval (ed.), Conversational organization and its develop-
ment, 51–77. Norwood, NJ: Ablex Publishing.
Schönfeldt, Juliane and Andrea Golato
2003 Repair in chats: A conversation analytic approach. Research on Language &
Social Interaction 36: 241–284.
Shi, Shufang, Punya Mishra, Curtis J. Bonk, Sophia Tan, and Yong Zhao
2006 Thread theory: A framework applied to content analysis of synchronous com-
puter mediated communication data. International Journal of Instructional
Technology and Distance Learning 3: 19–38.
Simpson, James
2005 Conversational floors in synchronous text-based CMC discourse. Discourse
Studies 7(3): 337–361.
Smith, Marc, J.J. Cadiz, and Byron Burkhalter
2000 Conversation trees and threaded chats. In: CSCW’00, 97–105. Philadelphia,
PA: ACM.
ten Have, Paul
2000 Computer-mediated chat: Ways of finding chat partners. M/C: A Journal of
Media and Culture 3(4). http://journal.media-culture.org.au/0008/partners.php
Werry, Christopher, C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and cross-
Cultural Perspectives, 47–63. Amsterdam/Philadelphia: John Benjamins.
Zelenkauskaite, Asta and Susan C. Herring
2008 Television-mediated conversation: Coherence in Italian iTV SMS chat. In:
Proceedings of the Forty-First Hawai’i International Conference on System
Sciences. Los Alamitos, CA: IEEE Press.
http://csdl.computer.org/dl/proceedings/hicss/2008/3075/00/30750145.pdf
Zitzen, Michaela and Dieter Stein
2004 Chat and conversation: A case of transmedial stability? Linguistics 42:
983–1021.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:43 AM
23. Repair in chat room interaction
Jennifer Baker Jacobs and Angela Cora Garcia

1. Introduction

The social use of technology has become an increasingly important area of study as
different forms of technology transform ever more arenas of social life. By chang-
ing the medium through which humans act and construct meaning, computer-
mediated communication (CMC) creates a new interactional environment, which
requires participants to alter the techniques and procedures they use to organize
their actions and interpret the actions of others.
Textual Chat is used in informal interactions as well as in a variety of institu-
tional contexts (Garcia and Jacobs 1998, 1999; Gergle, Millen, Kraut, and Fussell
2004; Golato and Taleghani-Nikazm 2006; Jepson 2005; Ligorio 2001; Markman
2009; Rintel and Pittam 1997; Rohfeld and Hiemstra 1995; Veerman, Andriessen,
and Kanselaar 2000). When the pragmatic features of oral conversation (such as
appropriateness of contribution, speed of response, maintenance of flow, feedback,
and repair; Todman and Alm 2003) are compared to the features of chat room in-
teraction, it is clear that many of these features are not used consistently. This can
be a main source of interactional troubles and a major cause of failures of intersub-
jective understanding in chat.
Research on the pragmatics of repair in interaction generally involves the ap-
plication of conversation analytic techniques and/or linguistic approaches to the
analysis of spoken data. The phenomenon of repair has been explored in a wide
variety of languages, including English (McKellin et al. 2007; Schegloff 1987b),
German (Egbert 2004; Rieger 2003; Schönfeldt and Golato 2003), Italian (Bosco,
Bucciarelli, and Bara 2006), Norwegian (Svennevig 2008), Japanese (Fox,
Hayashi, and Jasperson 1996), Spanish (Mason 2004), Thai (Moerman 1977), and
the Caribbean language of Bequian (Sidnell 2007). Most of the research on repair
in oral communication has been on informal conversation, either face-to-face or
over the telephone.
In oral conversation, error repair procedures enable participants to present their
understanding of the interaction to others and to identify and correct misunder-
standings or mistakes as they arise (Jefferson 1974; Kurhila 2001; Sacks, Scheg-
loff, and Jefferson 1974; Schegloff 1987a; Schegloff, Jefferson, and Sacks 1977).
Kötter (2002) addresses the role of repair in achieving intersubjectivity, which he
discusses in terms of the negotiation of meaning. For example, a question creates a
space for an answer and an expectation that it will be the next thing that happens in
the conversation (Heritage 1984). This structure helps participants interpret the

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
566 Jennifer Baker Jacobs and Angela Cora Garcia

next utterance as an answer to the question. Intersubjectivity can be achieved be-


cause the answer can be placed reliably after the question; if it is not so placed,
there are mechanisms for repairing its absence (Sacks et al. 1974; Schegloff 1968;
Schegloff and Sacks 1973).
In this chapter, we examine the production and repair of errors in intranet chat
discussions among students in a college classroom. We show how students import
procedures used in oral conversation to avoid and repair interactional troubles
within the constraints and affordances of chat. We show that the types of errors in
chat may differ from those typically found in face-to-face interaction and that the
resources available to participants for repairing them may also differ. In particular,
the occurrence of placement problems (displaced messages) is not only a frequent
source of error and misunderstanding in chat, but it is also a missing resource for
the repair of errors (because, as we show, procedures interactants use to repair er-
rors rely on context – in particular, the prior messages). We examine how partici-
pants manage to achieve intersubjectivity, or manage the interaction even when
they cannot achieve intersubjectivity, in the more loosely organized structure that
chat creates. We also look at the differences between the organization of repair in
chat and in oral conversation.

2. Previous research on chat: Turn-taking and repair

Garcia and Jacobs (1999), using videotapes of chat participants’ computer screens,
showed that chat turn-taking systems provide for the selection of future, rather than
next, “speakers” (message posters). Because chat software does not allow partici-
pants to determine exactly where in the conversation their message will be posted,
a message may not always be adjacent to its referent, and the practicality of struc-
tures such as adjacency pairs (e.g., question-answer pairs) for achieving intersub-
jectivity is diminished. If the answer to the question is not placed adjacent to the
question, it may not be interpretable as an answer to that question. While these
types of placement problems can sometimes be identified and resolved by partici-
pants, situations often cause each participant to have a different understanding of
what is happening in the conversation.
The message display window and printout, therefore, often do not accurately
represent the actual sequence of turns at talk intended by participants (Garcia and
Jacobs 1998, 1999; Herring 1999; Negretti 1999; Panyametheekul and Herring
2003). However, much of the previous research on turn-taking in chat does not
analyze the message construction process necessary to discern how turn exchange
is managed in chat and thus does not explain the significance of the inability of the
turn-taking system in chat to manage distribution of next turns.
Several studies have noted the interactional confusion that can result in chat
when messages are not posted where participants intended them to be placed. Her-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 567

ring refers to this displacement as “disrupted adjacency” (1999); Garcia and Jacobs
(1998) refer to the misinterpretation of adjacency caused by “phantom responsive-
ness” and “phantom adjacency pairs” in their study of university classroom parti-
cipants. Negretti (1999) analyzed printouts of web chat conversations among
36 graduate students, including both native and ESL learners, and found that over-
lapping turns prevented participants from being able to negotiate starting, finish-
ing, and giving turns as they would in face-to-face interactions. Nonetheless, par-
ticipants “competently managed” (79) the complexity of an interaction in which
“the expectation of a relevant reply to each turn is often unfulfilled or delayed”
(81). Tan and Tan (2006) compared turn-taking patterns in two instructional dis-
cussions between teachers and their classes, one conducted face-to-face and the
other via an online chat discussion program. They found the pattern of turn-taking
to be markedly different in the two conditions, with many more students producing
responses and less topical continuity in the chat condition. Kitade (2000) analyzed
second-language learners, using qualitative observations including discourse
analysis and conversation analysis to study IRC conversations among students and
native speakers in college Japanese classes. She found that the prevalence of
multiple topics overlapping and disrupted adjacency caused frustration among
some participants. One way that participants compensated for the confusion was to
use address terms. Simpson (2005) also analyzed participants practicing second-
language skills using an online website and found that disrupted adjacency was not
a problem for participants, who expected the conversation to be disjointed and
were able to discuss multiple threads in patterned yet intersecting interactions.
However, Nilsen and Mäkitalo’s (2010) study of professionals in an online, in-ser-
vice training course found that participants not only noted that their interaction was
disjointed but also interrupted their activity in order to address the discontinuity
before continuing their conversation. (See also Herring, this volume, on partici-
pants’ reactions to “loosened relevance” in multiparty chat.)
Some studies have specifically addressed repair in chat communication. Many
of these studies address, directly or indirectly, the role of turn organization in the
need for and/or accomplishment of repair. Schönfeldt and Golato’s (2003) study of
German-language web chats noted that, while many messages seemed to be unre-
lated, participants could read the different threads and reconstruct the adjacency of
each topic. They found that initiation and completion of repair followed a pattern
similar to that in oral conversation, with most incidences of repair being self-initi-
ated and self-repaired within the same turn. Also, like Kitade (2000), they found
that participants used address terms to distinguish which prior speaker was being
addressed. Jepson (2005) compared the frequency of repair in text and voice chats
of ESL students and found that more error repair occurred in the voice chat, which
he attributed primarily to pronunciation-related corrections. However, these
studies have all relied on logs or printouts of the conversations.
Zemel and Cakir (2009) analyzed math problem-solving sessions in chat by

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
568 Jennifer Baker Jacobs and Angela Cora Garcia

using a software tool that allowed them to replay the sessions in real time based on
time-stamped records of participants’ actions. They found that – unlike in oral con-
versation, in which overlapping turns compromise speakers’ comprehensibility –
displaced turns in chat did not affect the “readability” of the text (270). None-
theless, participants oriented to the problem of intelligibility by constructing repair
messages to indicate both that it was a repair and what it was repairing.
More recently, some researchers have also begun to examine video screens,
as well as participants themselves. Beißwenger’s (2008) study of 18 chats using
32 participants analyzed video recordings not only of their computer monitors but
also of the participants themselves in order to record data on “facial expression,
gesturing, posture, and verbal uttering” (7); he found that deletions of text were
often a result of a participant’s having read a new onscreen message. Marcoccia,
Atifi, and Gauducheau (2008) analyzed recordings of four instant messaging dis-
cussions and discovered that the lack of interactivity in instant messaging did not
prevent participants from producing “interactional gestures or facial expressions”
(8), making instant messaging comparable to telephone conversation. Markman
(2010) studied four virtual meetings via the chat function of “Blackboard” that
took place among five undergraduate students and their instructor in a university
course. Computer software was used to record participants’ computer screens, and
both video recordings and chat logs were used for analysis. She found that partici-
pants often engaged in “self-initiated self-repair” by correcting mistakes or typo-
graphical errors in their immediate next turns and commonly used asterisks to in-
dicate when their posts were repairs of prior turns.
In this chapter we show that the turn-taking system of chat is critically conse-
quential for the organization of repair and the avoidance of troubles in talk. With
videotapes of each participant’s computer screen, we have access to what was
typed in the message input boxes as well as the posting box; thus we can determine
where participants intended to place their messages by analyzing when they started
typing in relationship to when others’ messages were posted (see Garcia and Jac-
obs 1998, 1999; Jacobs and Garcia 2002). These data enable us to determine pre-
cisely how participants produce, avoid, and repair troubles in chat.

3. Methodological approach

We use a conversation-analytic approach (e.g., Heritage 1984; Levinson 1983;


Sacks et al. 1974) to analyze chat, because its utility for studying the process of in-
teraction has been well demonstrated. The theoretical underpinnings of conver-
sation analysis lie in the ethnomethodological approach to social action and social
order developed by Garfinkel (1967). The pragmatics perspective developed by
Habermas (e.g., Cooke 1998; Habermas 1998) also focuses on the analysis of ut-
terances rather than sentences, the treatment of communication as a form of human

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 569

action, and a search for the ways in which intersubjectivity is achieved. Levinson
(1983) integrates the analytical tools of ethnomethodological conversation analy-
sis (e.g., Sacks et al. 1974) with linguistic approaches.
The study of the basic organizing principles of oral conversation, such as turn-
taking (Sacks et al. 1974), repair (Jefferson 1974), and preference organization
(Schegloff et al. 1977), has proved essential to understanding participants’ actions
in a wide variety of settings. As the research reviewed above has shown, conver-
sation analysis is increasingly being used to understand interaction in chat in both
informal and institutional contexts. In this chapter we use conversation analysis to
extend understanding of repair in chat conversations in a college classroom.

4. Data

As is typical in conversation analytic research, we used naturally-occurring data


for the current study. Participants were college students in computer-assisted Eng-
lish composition classes in 1995 and 1996 who routinely spent 20–30 minutes per
class in small group chat discussions to critique each other’s written work. Because
the classes were small, the participants in the discussions all knew each other, al-
though they used self-chosen pseudonyms in chat. At the time the data were col-
lected, the students had been using chat for two to five months. In this chapter we
analyze the videotapes of each participant’s computer screen from four three-per-
son class discussions.1
The transcription system used (Jacobs 1996) reproduces what is visually avail-
able to each student on the screen while preserving the sequential order in which
actions were accomplished on a keystroke-by-keystroke basis. Our transcripts re-
veal each participant’s actions (e.g., typing, erasing, editing, pausing, scrolling up
or down) in coordination with message postings, thereby recovering the interac-
tional process through which the posted messages were produced. The transcript
records messages exactly as students typed them, including typographical errors.
In addition, text formatting elements unavailable to participants (e.g., boldface,
underlining, italics, superscript, and subscript) were used to notate students’ ac-
tions (e.g., typing, erasing, posting messages, or pausing).
Figure 1 shows two sample pages of transcript. The box at the top of each page
represents the posting box at the top of each student’s screen. The three smaller
boxes beneath that represent participants’ message entry boxes, each displaying
the last two lines of text typed; previous lines scroll up out of view a full line at a
time. Each time a participant sends or “posts” a message, it appears as the last
line(s) in the posting box, and her message entry box becomes blank. Each partici-
pant sees only her own message composition box; the transcript collapses this in-
formation onto one page of transcript.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
570 Jennifer Baker Jacobs and Angela Cora Garcia

Transcript, page 3
1 Lizard: WHASSUP!
2 Frank Sinatra: HELLO.
3 Lizard: HELLO, BLUE EYES … P=0:30

*******
Lizard

Frank Sinatra
B=0:31 W=0:39–0:46, ECUTEP=0:52
WHAT D YOU THINK THE “MASK”
Purple

Transcript, page 4
1 Lizard: WHASSUP!
2 Frank Sinatra: HELLO.
3 Lizard: HELLO, BLUE EYES …
4 Frank Sinatra: CUTEP=0:52

*******
Lizard
B=0.56HE

Frank Sinatra

Purple
B=0.53HELLOP=0.57

Figure 1. Sample transcript from Tape 2

The posting box on page 3 of the transcript shows that three lines have al-
ready been posted at this point in the conversation. The most recent posting,
Lizard’s “HELLO, BLUE EYES …”, was posted (P) at 30 seconds into the con-
versation, as indicated by the superscript italics P=0:30. Frank Sinatra began
typing (B) his next message 31 seconds into the conversation (superscript
B=0:31), waited (W) for seven seconds after typing “WHAT D YOU THINK
THE ‘MASK’” (superscript W=0:39–0:46), and then erased (E) his in-progress
message (superscript E and the subscripted text of his message). He then typed
and posted “CUTE” 52 seconds into the conversation (P=0:52). The other par-
ticipants would see only Frank Sinatra’s edited message “CUTE” when it ap-
peared as line 4 in the posting box; they did not know that he had begun to
compose a different message. Page 4 of the transcript then shows the partici-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 571

pants’ actions between the time Frank Sinatra posted line 4 and PURPLE posted
the next message.2

5. The avoidance and repair of troubles in chat

Since chat is a written mode of communication, the types of errors that can be
avoided and the interactional context of their avoidance differ in some respects from
those of oral conversation. While some errors in chat are analogous to errors made
in oral conversation (i.e., typographical errors and slips of the tongue), other types
of errors are either unique to chat or more common in chat than in oral conversation.
For example, in oral conversation, participants generally respond to the most recent
utterance, using misplacement markers such as “by the way” (Schegloff 1987b) to
refer to earlier utterances. In our data, chat participants do not typically mark a
message as out of place even if it does not refer to an immediately prior message.
One reason is that, as they are typing a message, participants do not always know
whether their message will be placed adjacent to its intended referent, because the
textual nature of chat requires a more active role on the part of participants to see,
literally, that others are participating. Unless a participant is actually looking at the
posting box, she may not be aware of whether – or when – others are participating.
Participants in these data respond to postings in two ways: 1) by reading the
posting box as a document and 2) by reading it as a conversation. When reading the
posting box as a document, the reader starts with the first message posted since the
last time she read the posting box and read (and responded) to messages in the
order in which they were posted. When reading the posting box as a conversation,
the reader first reads the last message posted, responds to that, and then works her
way back to respond to previous postings, if necessary. Participants may use the
document reading mode habitually, or the conversational mode habitually, or
switch from one to the other as convenient. These two ways of reading the posting
box make for different types of errors. For example, if one participant is using a
conversational mode and responding to the most recent posting, a reader using the
document reading mode may interpret that message as a response to an earlier
message. Whichever mode participants use, if they read just far enough to find a
message they want to respond to and then type a response before reading other
messages, they run the risk of missing something or confusing another participant.

5.1. Self-repair of errors in chat


Chat participants edit or correct their own messages in private while composing
them, but they do not typically use the error correction format Jefferson (1974)
identifies (“uh” or cutoffs to locate errors). Since the message composition box is
private, they do not have to signal to others that a correction is being made.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
572 Jennifer Baker Jacobs and Angela Cora Garcia

The locations for error repair in chat differ greatly from those in oral conver-
sation, given that there is no opportunity for self-repair of a posted message until a
future turn or for other-repair until a message is posted. Because chat participants
may be typing messages at the same time, it is common for one participant to post a
message while other participants are typing. Writers sometimes take advantage of
this feature to edit their utterances-in-progress in response to messages that are
posted while they are composing, which may enable the writers to avoid a place-
ment problem or simply provide another choice about what to respond to in the
conversation. For example, in Excerpt 1 the students are discussing a poem they
have read; the most recent posting is Lizard’s line 65 (“I SEE THE AFRICAN
THING AS A VALID INTERPRETATION, BUT I DON’T SEE IT MYSELF”),
which contradicts something PURPLE had posted earlier. PURPLE was engaged
in typing when line 65 was posted (no wait time is indicated in her message entry
box). The underlining of “DOE” in PURPLE’s message entry box shows that
PURPLE had composed that part of her message before line 65 was posted.
PURPLE types as far as “DOES HE WANT US TO HEA”, but apparently she
reads Lizard’s message while typing because she erases her message-in-progress
and immediately types “WHAT DO YOU MEAN YOU DON’T SEE IT YOUR-
SELF”, which she posts in response to Lizard’s line 65.

EXCERPT 1
44 PURPLE: THE AUTHOR IS SARCASTIC BECAUSE HE KNOWS HOW HE MUST HIDE
45 HIS TRUE EMOTIONS
46 PURPLE: DO YOU GUYS AGREE THAT HE IS WRITING FROM AN AFRICAN
47 AMERICAN STANDPOINT
48 Lizard: I WAS HOPING HE WAS SARCASTIC, BECAUSE ENJOYING THIS MASK IS
49 A BAD WAY TO LIVE
50 Lizard: I DONT SEE THE AFRICAN PART
51 PURPLE: YES BUT LOOK AT THE REASONS SURROUONDING WHY “WE” MUST
52 WEAR THE MASK
53 Frank Sinatra: IN LINE THREE, “THIS DEBT WE PAY TO HUMAN GUILE”, HE SEEMS TO
54 MEAN THAT THE MASK IS HARMFUL IN SOME WAY; PERHAPS CAUSING
55 THE “BLEEDING HEARTS OF LINE 4
56 Lizard: IT HURTS TO WEAR IT
57 PURPLE: HIS BACKGROUND, AND THE TIME FRAME IS FROM THE LATE 1800’S
58 AND THE AFFRICAN AMERICAN COULD NOT SPEAK HIS MIND BECAUSE
59 HE RISKED LOSING HIS LIFE, BECAUSE “WE” WERE NOT ALLOWED TO
60 SPEAK HOW WE REALLY FELT
61 Frank Sinatra: WHAT DOES THAT MEAN THOUGH
62 Frank Sinatra: DOES HE WANT US TO WEAR IT OR NOT?
63 PURPLE: OF COURSE IT HURTS TO WEAR IT BECAUSE HOW WOULD YOU LIKE TO
64 BE SHUT OUT FROM YOUR OWN WAY OF EXPRESSION.
65 Lizard: I SEE THE AFRICAN THING AS A VALID INTERPRETATION, BUT I DON’T
66 SEE IT MYSELFP=11:14

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 573

**************
Lizard:

Frank Sinatra:
B=11:30LI

NOTE: From 11:14 TO 11:27 Frank Sinatra uses his cursor to scroll through the chat box. He dis-
plays lines 17–25 (only the first two lines of line 25 are displayed)

PURPLE

DOES HE WANT US TO HEAEWHAT DO YOU MEAN YOU DON’T SEE IT YOURSELFP=11:31

This excerpt shows a chat participant editing her message in response to an-
other participant’s message, posted during the composition of her own message.
This type of self-repair is private in that other participants do not know that a mess-
age has been edited, but it is interactive because PURPLE clearly changed her
message in response to Lizard’s posting. Goodwin (1995: 117) has noted that
“speakers [in oral conversation] change the emerging structure of sentences even
as they are speaking them in order to maintain the appropriateness of their talk for
the dynamic situation which the sentence both emerges from, and helps to further
constitute”. Clearly, the same is true of participants in chat, who, despite not hav-
ing listener responses to the messages they are currently constructing, can nonethe-
less be responsive to others’ postings (Beißwenger 2008; Garcia and Jacobs 1998,
1999).
While the location for self-repair in chat is still within the writer’s turn, there is
no opportunity for intervention by others, given that the message entry box is pri-
vate. Therefore, chat participants need not worry about whether another can make
sense of their message-in-progress; others will only evaluate the final product.
Within-turn self-repair (editing of the message-in-progress) is, interactionally
speaking, more analogous to what Jefferson (1974) calls error avoidance in oral
conversation than to error repair.
Chat participants can perform self-repair of errors in a future turn position. If
they act quickly and are lucky, the repair may indeed be posted after the message
they are attempting to self-repair; however, other participants’ posts may inter-
vene. Hence, although sequences may be found in chat that superficially resemble
repair sequences in oral conversation, they are only coincidentally similar because
chat participants do not have the same control over placement that participants in
oral conversation do.
Excerpt 2 shows that PURPLE began typing “PLEASE EXPLAIN” in her
message composition box at 11:37 as a self-repair of her post in line 67, which was
posted at 11:31 and seemed like a challenge (“WHAT DO YOU MEAN …”).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
574 Jennifer Baker Jacobs and Angela Cora Garcia

PURPLE did not mitigate or delay this disagreement with Lizard (Pomerantz
1984) and used format tying (“ … YOU DON’T SEE IT YOURSELF”), which
Goodwin and Goodwin (1987) identified as an argumentative move. Format tying
is when participants in a dispute tie their oppositional utterances to prior talk by
creating their turn out of components of the prior turn. Her use of “please” (a pol-
iteness marker) in her repair message suggests that she is trying to mitigate or re-
pair the argumentative tone of line 67. PURPLE succeeds in having her “PLEASE
EXPLAIN” message placed adjacent to her complaint by typing and posting it
quickly. However, given that the turn-taking system in chat posts messages in the
order in which they are received and not in the order in which participants begin
typing them, this placement was partly due to luck. Another participant could have
posted a message before PURPLE’s, thus displacing “PLEASE EXPLAIN” and
rendering it impotent as a repair.
EXCERPT 2
46 PURPLE: DO YOU GUYS AGREE THAT HE IS WRITING FROM AN AFRICAN
47 AMERICAN STANDPOINT
48 Lizard: I WAS HOPING HE WAS SARCASTIC, BECAUSE ENJOYING THIS MASK IS
49 A BAD WAY TO LIVE
50 Lizard: I DONT SEE THE AFRICAN PART
51 PURPLE: YES BUT LOOK AT THE REASONS SURROUONDING WHY “WE” MUST
52 WEAR THE MASK
53 Frank Sinatra: IN LINE THREE, “THIS DEBT WE PAY TO HUMAN GUILE”, HE SEEMS TO
54 MEAN THAT THE MASK IS HARMFUL IN SOME WAY; PERHAPS CAUSING
55 THE “BLEEDING HEARTS OF LINE 4
56 Lizard: IT HURTS TO WEAR IT
57 PURPLE: HIS BACKGROUND, AND THE TIME FRAME IS FROM THE LATE 1800’S
58 AND THE AFFRICAN AMERICAN COULD NOT SPEAK HIS MIND BECAUSE
59 HE RISKED LOSING HIS LIFE, BECAUSE “WE” WERE NOT ALLOWED TO
60 SPEAK HOW WE REALLY FELT
61 Frank Sinatra: WHAT DOES THAT MEAN THOUGH
62 Frank Sinatra: DOES HE WANT US TO WEAR IT OR NOT?
63 PURPLE: OF COURSE IT HURTS TO WEAR IT BECAUSE HOW WOULD YOU LIKE TO
64 BE SHUT OUT FROM YOUR OWN WAY OF EXPRESSION.
65 Lizard: I SEE THE AFRICAN THING AS A VALID INTERPRETATION, BUT I DON’T
66 SEE IT MYSELF
67 PURPLE: WHAT DO YOU MEAN YOU DON’T SEE IT YOURSELFP=11:31

**************

Lizard:

B=11:36I DIDN’T

Frank Sinatra:

LIW=11:31–36ZARD, YOU SA

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 575

PURPLE:

B=11:37PLEASE EXPLAINP=11:42

5.2. Other-repair in chat

Like self-repair, the organization of other-repair in chat can appear superficially


similar to that in oral conversation, but it has structural differences. Excerpt 3
shows an unsuccessful attempt to initiate other-repair. PURPLE posts the message
“WHAT DO YOU GUYS THINK THE SECOND STANZA MEANS” at 3:32
minutes into the conversation (line 18). Five seconds later, Frank Sinatra begins
typing “ANY PARTICULAR LINE?”, which he posts at 3:46. While participants
in oral conversation may use lexical items like “Huh?”, “What?”, “Who?”,
“Where?”, or “When?” (Schegloff et al. 1977: 367) to initiate other-repair, chat
participants cannot count on repair initiations being placed adjacent to messages
they are attempting to repair. Frank Sinatra’s question in line 19, “Any particular
line?”, specifies what needs to be repaired to avoid confusion if the message ends
up being misplaced, and it is a nice chat alternative to “Where?” in oral conver-
sation.
PURPLE directed Lizard and Frank Sinatra to the second stanza of the poem
they were discussing, but not to a specific line in that stanza. In line 19, Frank Sin-
atra treats PURPLE’s line 18 as a trouble source. He initiates an other-repair with
his question, attempting to get PURPLE to repair her message by specifying a par-
ticular line in stanza two of the poem they are analyzing. However, PURPLE had
already begun typing a new message (“I B”) before Frank Sinatra posted this mess-
age.

EXCERPT 3
10 Lizard: THE WAY WE REACT AND COEXIST WITH THE EXTERNAL WORLD
11 PURPLE: FOR EXAMPLE WHEN AS PERSON IS UPSET AND MAD, HE MAY HIDE
12 IHIS FEELINGS AND SHOW HAPPINESS FOR EVERYONE (P 2:42)
13 Lizard: RIGHT ON (P 2:56)
14 Frank Sinatra: I THINK THAT IT REFERS TO THE WAYS THAT PEOPLE USE TO HIDE
15 THIER FEELINGS, EPECIALLY IN THE INCREASINGLY HOSTILE WORLD
16 IN WHICH WE LIVE. (P 3:01A)
17 PURPLE: I AGREE LIZARD, (P 3:01B)
18 PURPLE: WHAT DO YOU GUYS THINK THE SECOND STANZA MEANS (P 3:32)
19 Frank Sinatra: ANY PARTICULAR LINE? (P 3:46)
20 Lizard: THIS “MASK” KINDA KEEPS A COHESION BETWEEN PEOPLE THROUGH
21 THE UGLINESS OF DAY-TO-DAY (P 3:53)
22 Lizard: SORRY, WE’VE MOVED ON (P 4:08)
23 Lizard: PEOPLE SHOULDN’T GET TO CLOSE (P 5:01)
24 Lizard: KNOW TOO MUCH (P 5:07)
25 Frank Sinatra: THE SECOND STANZA SEEMS TO BE TALKING FROM A DIFFERENT

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
576 Jennifer Baker Jacobs and Angela Cora Garcia

26 POINT OF VIEW THAN THE OTHER TWO. IT TALKS ABOUT THE MASK AS
27 A GOOD THING WHEREAS THE OTHERS SEEM TO POINT OUT THE BAD
28 PARTS OF IT. (P 5:40A)
29 PURPLE: I BELIEVE IT MEANS THAT WHY SHOULD EVERYONE KNOW EXACTLY
30 HOW A PERSON IS FEELING OR WHAT A PERSON IS THINKING ABOUT.
31 SO THE WRITER IS STATING THAT HID YOU R FEELINGS AND KEEP
THIEM TO YOURSELFP=5:40B

Subsequent pages of the transcript show that PURPLE continues typing without
waiting while Lizard posts two messages, lines 20 and 22, the last one at 4:08 (see
Excerpt 3). Frank Sinatra waits 14 more seconds for a reply from PURPLE to his
repair initiation attempt and then begins to type an analysis of stanza two. Lizard
posts two more short messages (lines 23 and 24) while Frank Sinatra is composing
his message, which he then posts at 5:40 (line 25). At the same time, PURPLE fin-
ally completes her long message (line 29), which is posted virtually simultaneously
at 5:40 and appears in the posting box just after Frank Sinatra’s message.
PURPLE’s message in line 29 provides a retrospective warrant for her failure to
answer Frank Sinatra’s question in line 19: She was engaged in typing a lengthy
message and may not have seen his question prior to posting it. In this way, the in-
teractional organization of chat provides a rationale for PURPLE’s failure to re-
spond to Frank Sinatra’s question.
Although Frank Sinatra’s line 19 was an adjacency pair first pair part (a ques-
tion) and no second pair part was produced, the absence of an answer is not treated
as problematic by the participants. The participants appear to be viewing this “ab-
sence” through a chat lens, in which delayed responses are not unusual. In chat,
participants know that a “silent” participant may be engaged in typing a message,
scrolling up in the posting box, or reading hard documents rather than new post-
ings. Chat participants, therefore, may choose not to repair silence. Frank Sinatra
lets his repair initiation attempt go unanswered and ultimately answers PURPLE’s
line 18 without aid from her as to which line to focus on. PURPLE’s missing re-
sponse to Frank Sinatra’s question is a type of “placement error” in the interac-
tional environment of chat; it is a silence only from the point of view of Frank Sin-
atra and Lizard. From PURPLE’s point of view, there was no silence because she
was engaged in typing and did not become aware of the question Frank Sinatra
asked until later. In sum, this excerpt shows a repair initiation attempt that was un-
successful because of the interactional organization of chat but which was not
problematic for the interaction, in as much as Frank Sinatra displayed an orien-
tation to how chat works and went on with the conversation.
Excerpt 1 (above) shows an instance in which an other-initiation of repair was
successful in eliciting a repair from the person producing the “error”. However, it
took three attempts at other-initiation of repair before the requested repair was
produced. In Excerpt 1 Frank Sinatra initiates an other-repair of Lizard’s line 56
(“IT HURTS TO WEAR IT”). Ten seconds later, Frank Sinatra begins his re-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 577

sponse (“WHAT DOES THAT MEAN THOUGH”), which is posted (line 61)
after an intervening post from PURPLE (see Excerpt 1). Frank Sinatra does not
use completion punctuation at the end of line 61 and quickly types a follow-up
message (“DOES HE WANT US TO WEAR IT OR NOT?”), which he posts at
10:48 (Excerpt 1, line 62). This follow-up message in line 62 could be an attempt
to clarify the referent of his line 61; by using the words “to wear it”, Frank Sinatra
uses format tying (Goodwin and Goodwin 1987) to link his message with Lizard’s
line 56 rather than PURPLE’s line 57, and then he waits for a response to his
messages. Instead of a response from Lizard, a posting from PURPLE appears,
and then another posting from Lizard (line 65) in response to an earlier message
from PURPLE.
Frank Sinatra then begins another message (see Excerpt 4), explicitly ad-
dressed to Lizard (“LIZARD, YOU SAID EARLIER THAT THE AUTHOR
WANTED US TO HIDE OUR FEELINGS, HAS YOUR OPINION
CHANGED?”), in which he revises and reissues his previous repair initiation.
While Lizard was “silent”, Frank Sinatra waited because he could assume that Liz-
ard was composing a response to his (Sinatra’s) repair initiation; but after Lizard
posted line 65, it was clear that he was not. At that point Frank Sinatra begins typ-
ing the elaboration/repair of his repair initiation to make a third attempt to get Liz-
ard to respond. This third attempt at repair initiation is not immediately successful
because the next message Lizard posts is a response to one of PURPLE’s earlier
messages. However, Lizard then types “NO”, which he posts as line 73. This “NO”
is an answer to Frank Sinatra’s repair initiations.

EXCERPT 4
65 Lizard: I SEE THE AFRICAN THING AS A VALID INTERPRETATION, BUT I DON’T
66 SEE IT MYSELF
67 PURPLE: WHAT DO YOU MEAN YOU DON’T SEE IT YOURSELF
68 PURPLE: PLEASE EXPLAIN
69 Frank Sinatra: LIZARD, YOU SAID EARLIER THAT THE AUTHOR WANTED US TO HIDE
70 OUR FEELINGS, HAS YOUR OPINION CHANGED?
71 LIZARD: I DIDN’T READ IT FROM THE STANDPOINT OF AN AFRICAN AMERICAN. I
72 AM WHITE, AND I CAN SEE THIS APPLYING TO MYSELF
73 LIZARD: NOP=12:34

The sequence in Excerpt 4 differs in several ways from repair sequences in oral
conversation. First, the original other-repair initiation was not placed in the turn
after the trouble source, because chat software allows other participants to post
messages at will and does not guarantee placement of a message at a specific point.
The delayed placement of Frank Sinatra’s first other-repair initiation attempt could
have made it difficult for Lizard to interpret (hence, Frank Sinatra’s repair of his re-
pair message in line 62). Also, because Lizard was engaged in responding to
PURPLE’s postings, he was not yet at leisure to respond to Frank Sinatra. Finally,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
578 Jennifer Baker Jacobs and Angela Cora Garcia

when he does respond to Frank Sinatra’s third attempt at error repair, his “NO” is
not placed adjacent to the repair initiation and hence may be difficult to interpret.
However, in this case, Frank Sinatra seems able to interpret Lizard’s “NO” as a re-
sponse to his query; he responds to him in his next message (not shown). This re-
pair sequence was eventually completed successfully; however, because of the in-
teractional organization of chat, it took three attempts and was not sequential.
In sum, these examples of error avoidance and self- and other-repair in chat
show that the interactional organization of chat, in particular its turn-taking sys-
tem, leads to a different configuration of error and error repair than exists in oral
conversation. The placement of messages in slots other than those in which the
poster intended or desired them to be placed, or in slots other than those adjacent to
the message they refer to, is a common event in chat, with deep implications for the
organization of repair.

6. Techniques for avoiding and repairing placement problems in chat

We found that two types of placement problems occur in chat. The first is an actual
displacement of a post, in which a participant’s message is posted after one or more
other messages intervene between it and its referent. The second occurs when a
participant fails to take steps to avoid misunderstandings that can result from dis-
placed posts. This could be thought of as a failure to anticipate potential displace-
ment of a message.

6.1. Posting a short or split message


Chat participants can attempt to avoid placement problems by posting short mess-
ages which take less time to type, lessening the chance that other posts will inter-
vene between the message and its intended referent. In Excerpt 3, Lizard’s re-
sponse (lines 20 and 21) to a previous topic was not posted until after PURPLE had
introduced a new topic; as a result, Lizard’s post was erroneously placed. Lizard
apologizes for having gotten behind and misplaced a post and then splits his next
contribution (an answer to the “next” question in line 18) into two short posts in
order to increase the chances that at least one of them will be placed appropriately
in the conversation (lines 23 and 24); he began typing line 24 immediately after
posting line 23.

6.2. Delaying posting to check the posting board


In both oral conversation and chat, participants may have something they want to
say and may be waiting for a place in the conversation to say or post it. Chat par-
ticipants can write a message and then hold the completed message indefinitely for

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 579

a convenient time to post it in order to minimize the chance that it is placed awk-
wardly in the conversation. If his or her post would inappropriately appear to be a
response to an immediately prior post, the writer can edit the message before post-
ing to avoid comprehension problems.
Even when participants wait to post, however, placement problems can occur,
simply because it is not possible to know what other participants are writing in
their message entry boxes. An example of pausing to avoid a placement problem
can be seen in Excerpt 5.

EXCERPT 5
1 Mr White: Hello, is anybody there? (0:01)
2 Silver: hello everybody (0:08)
3 Mr White: Hi ho, silver (0:24)
4 Silver: hey what’s up (0:40)
5 FRED: YABBA DABBA DO! (1:01)
6 Mr White: hey Fred (1:12)
7 Silver: So who want to go first? (1:17)
8 Mr White: I will (1:23)
9 FRED: HI MR WHITE AND SILVER (1:25)
10 Silver: Okay which paper are you going to revise (1:40)

Although Silver’s post in line 7 appears to follow the opening sequence seam-
lessly, she actually waited approximately 12 seconds after having typed this mess-
age before she posted it. Silver waited to begin the substantive part of their con-
versation until it appeared that all participants had logged on and posted a greeting.
Mr White accepts Silver’s invitation to discuss his paper (“I will” – line 8), but
FRED’s continuation of the greeting sequence (line 9) interrupts the conversation.
While a participant can increase the chance that his or her message will not be
displaced by waiting to post it, other participants’ posts can still intervene. Check-
ing the posting box before posting may help a participant to avoid some placement
problems; however, the longer a poster waits, the more likely it is that other par-
ticipants will post messages, increasing the likelihood that his or her post will be-
come “out of date”.

6.3. Using address terms


Previous research has noted that participants in chat may use address terms to
identify the intended recipient of their message (Herring 1999; Werry 1996). Her-
ring (1999) also reports that in some chat settings participants routinely begin their
postings with address terms. In Garcia and Jacobs (1999) we noted that while ad-
dress terms can be used as a technique to select a specific person to respond, they
do not have the effect of constraining who will be the next poster. The nature of the
turn-taking system in chat is such that while “future” posters can be designated,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
580 Jennifer Baker Jacobs and Angela Cora Garcia

there is no mechanism for reserving a next slot for a specific poster. Subsequent re-
search has noted that participants in chat can use address terms to minimize the
likelihood of confusion if a chat message ends up not being posted adjacent to its
intended referent (e.g., Herring 1999; Kitade 2000; Kötter 2002). In our data, chat
participants also use address terms to ensure that a post can be understood even if a
placement problem occurs. Address terms can be used to select a specific future
poster (Garcia and Jacobs 1999) and also retrospectively to indicate to which prior
message they are referring, as in Excerpt 6.

EXCERPT 6
9 Purple: I THINK THE MASK IS A TYPE OF FRONT FOR EMOTIONS (1:50)
10 Lizard: THE WAY WE REACT AND COEXIST WITH THE EXTERNAL WORLD (2:39)
11 Purple: FOR EXAMPLE WHEN AS PERSON IS UPSET AND MAD, HE MAY HIDE
12 IHIS FEELINGS AND SHOW HAPPINESS FOR EVERYONE (2:42)
13 Lizard: RIGHT ON (2:56)
14 Frank Sinatra: I THINK THAT IT REFERS TO THE WAYS THAT PEOPLE USE TO HIDE
15 THIER FEELINGS, ESPECIALLY IN THE INCREASINGLY HOSTILE WORLD
16 IN WHICH WE LIVE. (3:01A)
17 PURPLE: I AGREE LIZARD, (3:01B)
18 PURPLE: WHAT DO YOU GUYS THINK THE SECOND STANZA MEANS (3:32)

When Lizard posts line 10, PURPLE is engaged in typing a long message (line 11)
and therefore cannot respond immediately to Lizard’s post. However, after
PURPLE posts line 11, she begins to type a response to Lizard (“I AGREE”).
While she is working on this message, Lizard posts line 13 (“RIGHT ON”) as a re-
sponse to line 11. PURPLE then completes and posts her message (“I AGREE LIZ-
ARD”) virtually simultaneously with Frank Sinatra’s post in line 14; his is posted
first, so hers appears as line 17. Because PURPLE knows that she has posted a
lengthy message (line 11) and that others’ posts might intervene between Lizard’s
line 10 and her agreement with it, she cannot be sure that her “I AGREE” statement
will be understood as agreement with Lizard’s line 10 unless she addresses Lizard
by name. PURPLE’s precaution pays off: Frank Sinatra’s post intervenes, yet
PURPLE’s use of an address term ensures that the participants know with whom
she agrees. However, address terms are not a surefire way of counteracting place-
ment problems. Note that because Lizard says “RIGHT ON” in line 13 (responding
to PURPLE’s line 11), participants could mistake PURPLE’s line 17 as a response
to line 13 instead of to line 10.

6.4. Using format tying


In these data participants used format tying (Goodwin and Goodwin 1987) to pre-
empt confusion from possible displacement of messages. Like address terms,
format tying does not prevent a placement problem from occurring, but it does re-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 581

duce the possibility of misunderstandings resulting from potential misplacement


(see Excerpt 7).

EXCERPT 7
77 Frank Sinatra: BUT IF IT HURTS SO MUCH TO DO SO, WHY WOULD HE PUSH US TO DO
78 SO. (13:29)
79 Lizard: IS HE PUSHING US? (13:43A)
80 PURPLE: TRUE, SO YOU THINK HE IS MEANING THIS POEM TO
81 INCLUDE EVERYONE (13:43B)
82 Lizard: YES (13:51)

Lizard has posted several displaced messages throughout the conversation and has
tried several methods to prevent displacement of his posts (including composing
short or split messages, as seen above). In line 79 he repeats the phrase “PUSHING
US” from Frank Sinatra’s line 77. Because Lizard used format tying, his question
will be understood as a response to Frank Sinatra’s question, even if it is displaced.
Had he written simply “IS HE?”, his post would have been vague enough to cause
confusion if another message had intervened. In fact, line 80 is a question to which
“IS HE?” would be a reasonable response (and to which Lizard actually responds
“YES”). If misplaced, Lizard’s line 79 could have created confusion were it not for
format tying.

7. Discussion and conclusions

Differences in how chat and oral conversation are organized have profound impli-
cations for the organization of repair. A fundamental problem for chat participants
is, given that messages may be displaced, how do participants locate a message’s
referent? If the context is unclear, how can the conversation proceed?
The interactional problems regarding repair in chat differ from those in oral
conversation because the resources available to participants for avoiding and re-
pairing errors in timing, production, and comprehension of messages differ in the
two contexts. The frequency and location of errors in chat occur in part because the
chat software does not allow participants to view each other’s message composi-
tion boxes and because it controls placement of the messages, such that simulta-
neous turns are impossible. Therefore, participants have no routine way of know-
ing where a participant intended to place a displaced message; however, messages
may intervene unproblematically between a message and its referent if they will
not appear to be possible antecedents to that message.
Our analysis has shown that chat participants may have difficulty understand-
ing the meaning of a message and may need to re-read several lines or posts
preceding the message in question, and not just the immediately preceding line or
post, in order to understand it. Even in conversations in which all participants are

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
582 Jennifer Baker Jacobs and Angela Cora Garcia

fluent and skillful in chat, failures of interpretation will occur because the actual
sequence of messages (the order in which they are noticed and read) may differ for
each participant.
Learning to avoid and repair errors in chat involves not only learning to change
one’s lens from an oral to a chat perspective, but also learning to negotiate between
oral and chat approaches within a single conversation. Hence, our participants’
“errors” or misunderstandings are the products sometimes simply of the nature of
chat and its probability of producing displaced messages, sometimes of over-re-
liance on conventions of oral talk in a non-oral medium, and sometimes of incom-
patibility of varying approaches across different participants in the conversation.
Researchers must therefore keep both interactional frames in mind when analyzing
chat conversations.
Skilled chat participants understand that lack of complete comprehensibility of
the conversation resulting from placement errors is the norm, and they do not seek
to understand every message that is displaced. They at times agree to misunder-
stand each other, not to respond to each other’s questions or repair initiations, not
to edit their messages in response to priors, etc., in the interests of keeping up with
the flow of the conversation. Accordingly, placement problems in chat are not
necessarily errors; they are part of the territory, and participants do not always treat
them as troubles in the talk or orient to them as errors. The result is that participants
do not always understand one another, but they understand that they will not
always understand, and this is intersubjectivity of a sort. They learn to negotiate
between oral and chat structures and conventions; they construct and interpret
messages as if they refer to priors and search out possible referents if the message
is not understandable as referring to a prior.
Understanding how the interactional work is done is critical to understanding
who says what to whom and what each is reading/understanding. Understanding
how repair works is an important part of this process. If one goal in using computer
technologies in the classroom is to facilitate collaborative learning (e.g., Kötter
2002), we must begin by understanding how effective those technologies are and
how they might be made more effective. Teachers should be aware of the types of
communication problems that can occur in chat so that they can help students avoid
errors and misunderstandings and help to make chat a more valuable learning tool.
Discovering how participants understand chat as it is happening and how errors
and misunderstandings can arise may help eliminate some of the problems inherent
in those interactions in the classroom, in the workplace, and in personal use by giv-
ing participants a more comprehensive understanding of the interactional impli-
cations of the technology.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 583

Notes

1. A large body of research in workplace studies addresses what participants are doing
bodily with regard to paper documents, gaze, and movements, and how these are coordi-
nated with communication technology (e.g., Crabtree et al. 2000; Heath et al. 2001; Luff
and Heath 2002; Suchman 1987). In this chapter our data are limited to what is on the par-
ticipants’ computer screens. Since students were aware that they were being studied, the
study itself may have affected the types of interactions they had. However, the students
were used to having their chat room interactions observed, because the instructors rou-
tinely “listened in” on their chat room conversations to make sure that students were on
task. If these data were being collected today, screen save programs would have been
used instead of video recorders.
2. The data collection process required students to use television monitors instead of com-
puter monitors so that the videotaping equipment could be connected to the computers.
Because visual clarity was not as sharp as it is on a computer screen, we asked the re-
search participants to type in capital letters to improve visibility.

References

Beißwenger, Michael
2008 Situated chat analysis as a window to the user’s perspective: Aspects of tem-
poral and sequential organization. Language@Internet 5, article 6.
http://www.languageatinternet.org/articles/2008/1532
Bosco, Francesca M., Monica Bucciarelli, and Bruno G. Bara
2006 Recognition and repair of communicative failures: A developmental perspec-
tive. Journal of Pragmatics 38: 1398–1429.
Cooke, Maeve
1998 Introduction. In: Jürgen Habermas, On the Pragmatics of Communication,
1–20. Cambridge, MA: MIT Press.
Crabtree, Andy, David M. Nichols, Jon O’Brien, Mark Rouncefield, and Michael B. Twi-
dale
2000 Ethnomethodologically informed ethnography and information system de-
sign. Journal of the American Society for Information Science 51(7): 666–
682.
Egbert, Maria
2004 Other-initiated repair and membership categorization – Some conversational
events that trigger linguistic and regional membership categorization. Journal
of Pragmatics 36: 1467–1498.
Fox, Barbara, Makoto Hayashi, and Robert Jasperson
1996 Resources and repair: A cross-linguistic study of syntax and repair. In: Elinor
Ochs, Emanuel A. Schegloff, and Sandra A. Thompson (eds.), Interaction and
Grammar, 185–237. Cambridge, UK: Cambridge University Press.
Garcia, Angela Cora and Jennifer Baker Jacobs
1998 The interactional organization of computer mediated communication in the
college classroom. Qualitative Sociology 21(3): 299–317.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
584 Jennifer Baker Jacobs and Angela Cora Garcia

Garcia, Angela Cora and Jennifer Baker Jacobs


1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer-mediated communication. Research on Language and So-
cial Interaction 32(4): 337–367.
Garfinkel, Harold
1967 Studies in Ethnomethodology. Cambridge, UK: Polity Press.
Gergle, Darren, David R. Millen, Robert E. Kraut, and Susan R. Fussell
2004 Persistence matters: Making the most of chat in tightly-coupled work. CHI
2004 6(1): 431–438.
Golato, Andrea and Carmen Taleghani-Nikazm
2006 Negotiation of face in web chats. Multilingua 25: 293–321.
Goodwin, Charles
1995 The negotiation of coherence within conversation. In: Morton Ann Gerns-
bacher and Talmy Givón (eds.), Coherence in Spontaneous Text, 117–137.
Amsterdam/Philadelphia: John Benjamins.
Goodwin, Marjorie Harness and Charles Goodwin
1987 Children’s arguing. In: Susan U. Philips, Susan Steele, and Christine Tanz
(eds.), Language, Gender and Sex in Comparative Perspective, 200–248.
Cambridge, UK: Cambridge University Press.
Habermas, Jürgen
1998 What is universal pragmatics? In: On the Pragmatics of Communication,
21–103. Cambridge, MA: MIT Press.
Heath, Christian, Paul Luff, Hideaki Kuzuoka, Keiichi Yamazaki, and Shinya Oyama
2001 Creating coherent environments for collaboration. In: Proceedings of the
Seventh European Conference on Computer-Supported Cooperative Work,
119–138. Bonn: Kluwer Academic Publications.
Heritage, John
1984 Garfinkel and Ethnomethodology. Cambridge, UK: Polity Press.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Jacobs, Jennifer Baker
1996 All the words that are fit to print: Transcribing computer-mediated communi-
cation. Paper presented at the Fifth International Conference on Narrative: Self
and Other, Lexington, KY, October 18–20.
Jacobs, Jennifer Baker and Angela Cora Garcia
2002 The organization of repair in computer-mediated conversation. Paper pres-
ented at the American Sociological Association meetings, Chicago, IL, August
16–19.
Jefferson, Gail
1974 Error correction as an interactional resource. Language in Society 2: 181–199.
Jepson, Kevin
2005 Conversations – and negotiated interaction – in text and voice chat rooms. Lan-
guage Learning & Technology 19(3): 79–98.
Kitade, Keiko
2000 L2 learners’ discourse and SLA theories in CMC: Collaborative interaction in
Internet chat. Computer Assisted Language Learning 13(2): 143–166.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 585

Kötter, Markus
2002 Tandem Learning on the Internet: Learner Interactions in Virtual Online En-
vironments (MOOs). Frankfurt: Peter Lang.
Kurhila, Salla
2001 Correction in talk between native and non-native speakers. Journal of Prag-
matics 33: 1083–1110.
Levinson, Stephen C.
1983 Pragmatics. Cambridge, UK: Cambridge University Press.
Ligorio, M. Beatrice
2001 Integrating communication formats: Synchronous versus asynchronous and
text-based versus visual. Computers & Education 37: 103–125.
Luff, Paul and Christian Heath
2002 Broadcast talk: Initiating calls through a computer-mediated technology. Re-
search on Language and Social Interaction 35(3): 337–366.
Marcoccia, Michel, Hassan Atifi, and Nadia Gauducheau
2008 Text-centered versus multimodal analysis of instant messaging conversation.
Language@Internet 5, article 7. http://www.languageatinternet.org/articles/
2008/1621
Markman, Kris M.
2009 So what shall we talk about: Openings and closings in chat-based virtual meet-
ings. Journal of Business Communication 46(1): 150–170.
Markman, Kris M.
2010 Learning to work virtually: Conversational repair as a resource for norm de-
velopment in computer-mediated team meetings. In: J. Park and E. Abels
(eds.), Interpersonal Relations and Social Patterns in Communication Tech-
nologies: Discourse Norms, Language Structures and Cultural Variables,
220–236. Hershey, PA: IGI Global.
Mason, Marianne
2004 Referential choices and the need for repairs in covertly-taped conversations.
Journal of Pragmatics 36: 1139–1156.
McKellin, William H., Kimary Shahin, Murray Hodgson, Janet Jamieson, and Kathleen Pi-
chora-Fuller
2007 Pragmatics of conversation and communication in noisy settings. Journal of
Pragmatics 39: 2159–2184.
Moerman, Michael
1977 The preference for self-correction in a Tai conversational corpus. Language
53(4): 872–882.
Negretti, Raffaella
1999 Web-based activities and SLA: A conversation analysis research approach.
Language Learning & Technology 3(1): 75–87.
Nilsen, Mona and Åsa Mäkitalo
2010 Towards a conversational culture? How participants establish strategies for co-
ordinating chat postings in the context of in-service training. Discourse Studies
12(1): 90–105.
Panyametheekul, Siriporn and Susan C. Herring
2003 Gender and turn allocation in a Thai chat room. Journal of Computer Mediated
Communication 9(1). http://jcmc.indiana.edu/vol9/issue1/panya_herring.html

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
586 Jennifer Baker Jacobs and Angela Cora Garcia

Pomerantz, Anita
1984 Agreeing and disagreeing with assessments: Some features of preferred/dis-
preferred turn shapes. In: J. Maxwell Atkinson and John Heritage (eds.), Struc-
tures of Social Action: Studies in Conversation Analysis, 57–101. Cambridge,
UK: Cambridge University Press.
Rieger, Caroline L.
2003 Repetitions as self-repair strategies in English and German conversations.
Journal of Pragmatics 35: 47–69.
Rintel, E. Sean and Jeffery Pittam
1997 Strangers in a strange land: Interaction management on Internet Relay Chat.
Human Communication Research 23: 507–534.
Rohfeld, Rae Wahl and Roger Hiemstra
1995 Moderating discussions in the electronic classroom. In: Zane L. Berge and
Mauri P. Collins (eds.), Computer-Mediated Communication and the Online
Classroom: Volume III: Distance Learning, 91–104. Cresskill, NJ: Hampton
Press.
Sacks, Harvey, Emanuel A. Schegloff, and Gail Jefferson
1974 A simplest systematics for the organization of turn-taking in conversation.
Language 50: 696–735.
Schegloff, Emanuel. A.
1968 Sequencing in conversational openings. American Anthropologist 70:
1075–1095.
Schegloff, Emanuel A.
1987a Between micro and macro: Contexts and other connections. In: Jeffrey C.
Alexander, Bernhard Giesen, Richard Münch, and Neil J. Smelser (eds.), The
Micro-Macro Link, 207–234. Berkeley, CA: University of California Press.
Schegloff, Emanuel A.
1987b Recycled turn beginnings: A precise repair mechanism in conversation’s turn-
taking organisation. In: Graham Button and John R. E. Lee (eds.), Talk and So-
cial Organisation, 70–85. Clevedon, UK: Multilingual Matters.
Schegloff, Emanuel A. and Harvey Sacks
1973 Opening up closings. Semiotica 7: 289–327.
Schegloff, Emanuel A., Gail Jefferson, and Harvey Sacks
1977 The preference for self-correction in the organization of repair in conversation.
Language 53: 361–382.
Schönfeldt, Juliane and Andrea Golato
2003 Repair in chats: A conversation analytic approach. Research on Language and
Social Interaction 36(3): 241–284.
Sidnell, Jack
2007 Repairing person reference in a small Caribbean community. In: Nick J. En-
field and Tanya Stivers (eds.), Person Reference in Interaction: Linguistic,
Cultural and Social Perspectives, 281–309. Cambridge, UK: Cambridge Uni-
versity Press.
Simpson, James
2005 Conversational floors in synchronous text-based CMC discourse. Discourse
Studies 7(3): 337–361.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
Repair in chat room interaction 587

Suchman, Lucy A.
1987 Plans and Situated Actions: The Problem of Human Machine Communication.
Cambridge, UK and New York: Cambridge University Press.
Svennevig, Jan
2008 Trying the easiest solution first in other-initiation of repair. Journal of Prag-
matics 40: 333–348.
Tan, Seng-Chee and Aik-Ling Tan
2006 Conversational analysis as an analytical tool for face-to-face and online con-
versations. Educational Media International 43(4): 347–361.
Todman, John and Norman Alm
2003 Modeling conversational pragmatics in communication aids. Journal of Prag-
matics 35: 523–538.
Veerman, Arja L., Jerry E. B. Andriessen, and Gellof Kanselaar
2000 Learning through synchronous electronic discussion. Computers & Education
34(3–4): 269–290.
Werry, Christopher C.
1996 Linguistic and interactional features of Internet Relay Chat. In: Susan C. Her-
ring (ed.), Computer-Mediated Communication: Linguistic, Social, and Cross-
Cultural Perspectives, 47–64. Amsterdam/Philadelphia: John Benjamins.
Zemel, Alan and Murat Cakir
2009 Reading’s work in VMT. In: Gerry Stahl (ed.), Studying Virtual Math Teams,
261–276. New York: Springer Publishing.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
588 Jennifer Baker Jacobs and Angela Cora Garcia

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:47 AM
24. Responses and non-responses in workplace emails
Karianne Skovholt and Jan Svennevig

1. Introduction

Email has become the central communication tool for most office workers. It is the
medium in which people carry out their daily professional activities and in which
workers and business partners build and maintain professional and interpersonal
relations. In this chapter, we examine the implicit norms of responding in work-
place emails. More specifically, we investigate how employees in a distributed
work group produce email responses, with reference to what is known about giving
response in oral conversations. We investigate to which communicative acts par-
ticipants respond, to which communicative acts they may omit to respond, and to
what extent they produce acknowledging receipts.
The research reported here was inspired by several pragmatic theories. We
draw on speech act theory in order to identify the communicative acts that are re-
sponded to vs. those acts that are not responded to. Furthermore, the research was
conducted within the framework of Conversation Analysis (CA), one of the main
objectives of which is to identify how participants in face-to-face conversation ac-
complish social order by orienting to norms. This research is based on the assump-
tion that users of email, as in oral conversation, orient to some basic interactional
norms.
It has previously been shown that participants trade on mundane expectancies
when communicating via new technologies (Garcia and Jacobs 1998, 1999; Orli-
kowski and Yates 1994). Likewise, in the present study, it is expected that conver-
sational norms constitute a major source for the establishment of new norms in
computer-mediated communication (CMC), a medium that is still in the process of
being shaped.

2. Email responses vs. face-to-face responses

Although email is a written medium, it has certain features that make it comparable
to oral conversation.1 First, email is interactive. Its speed and ease of delivery en-
able the exchange of messages with minimal time lapse. Second, email messages
may involve extended interchanges, or threads of messages, organized in turns and
sequences. However, an important difference between email and face-to-face con-
versation is that the interlocutors do not share a common temporal and physical
context; that is, while face-to-face conversation is synchronous by nature, email in-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
590 Karianne Skovholt and Jan Svennevig

teraction is asynchronous. Furthermore, the technology of email facilitates multi-


party interaction at a distance by enabling copying and forwarding of messages and
the distribution of attachments to multiple recipients. Because of its interactive
character, email may usefully be characterized with reference to the principles of
oral conversation, as described in Conversation Analysis (CA). The notion of tex-
tual CMC as conversation has been supported by many CMC scholars (see Herring
2010).
Some basic rules for turn-taking in conversation have been observed within the
tradition of CA. First, conversational turns transfer between speakers in such a way
as to minimize gaps and overlaps (Sacks, Schegloff and Jefferson 1974). Second,
non-responses and silence in conversation may signal a forthcoming disagreement
or some sort of problem (Pomerantz 1984; Sacks 1987). Non-response is con-
sidered an accountable action (Sacks 1992: 4) and an event that may lead co-par-
ticipants to form a set of inferences about the problem source (Schegloff 1972: 76).
The temporal aspect constitutes a fundamental difference between email inter-
action and oral conversation, and it changes the meaning of many phenomena in
oral turn-taking sequences, such as delayed or absent response. In contrast to face-
to-face conversation, the meaning of non-occurring or delayed responses in email
interaction, and the inferences that can be drawn, are more ambiguous. This
chapter is concerned with the circumstances under which participants in email in-
teractions hold each other accountable for non-occurring responses and to what
extent meanings of specific conversational features in conversation can be trans-
ferred to features in email interaction. Can one, following Sacks (1987) and Pome-
rantz (1984), assume that a delayed email response in a workplace setting marks a
dispreferred response? Or are there other established norms of responding in dis-
tributed email groups, depending on the institutional roles of the participants in-
volved and the technological constraints and affordances of the medium?

3. Previous research on responsiveness in computer-mediated


interaction

3.1. Response latencies


Response patterns in various forms of CMC have been studied in diverse contexts,
for instance between customers and organizations (Mattila and Mount 2003;
Strauss and Hill 2001), between business partners (Pitkin and Burmeister 2002;
Tyler and Tang 2003), in discussion groups on Usenet (Jones, Ravid, and Rafaeli
2004), and in questions and answers on the “Google Answers” website (Rafaeli,
Raban, and Ravid 2005). Most of these studies seem to agree that online responses
are typically generated within a short period of time. This observation was sup-
ported empirically by Kalman, Ravid, Raban, and Rafaeli (2006), who measured

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 591

time latencies in three asynchronous datasets (Enron emails, a university forum,


and “Google Answers”). The researchers found that the three user groups showed a
similar mathematical distribution of response latencies: At least 80 % of the re-
sponses were sent within the average response latency of the group. However, the
average response latency varied according to the context: In the Enron dataset it
was 28.76 hours, in the university forum 23.52 hours, and in Google Answers only
1.58 hours (Kalman et al. 2006).

3.2. Turn-taking rules and coherence


Past research on CMC grounded in the tradition of CA includes a number of
studies of turn-taking procedures and interactional coherence in text-based conver-
sation (Herring 1999, this volume; Garcia and Jacobs 1999; Rintel, Pittam, and
Mulholland 2003; Markman, this volume; Panyametheekul and Herring 2003). By
comparing chat interaction with the turn-taking rules of traditional conversation
(e.g., Sacks et al. 1974), these scholars have shown that common features of chat
include disrupted turn adjacency (Herring 1999), preference for selecting next
speaker by addressing him/her explicitly rather than next speaker self-selecting
(Panayametheekul and Herring 2003), and the organization of actions through a
particular threading strategy (Markman, this volume). Markman’s study also ar-
gues that the transition relevance place (TRP), the first place where a speaker can
start a new turn, is more nebulous in chat conversation than in traditional conver-
sation. Of special interest for the present study is Markman’s observation that chat
posts formulated as questions are more likely to receive responses. Correspond-
ingly, one of the main goals of this study is to examine if messages containing
speech acts such as questions and requests receive more responses than purely in-
formative messages.

3.3. Response norms


The norms of responding in computer-mediated interaction were first examined by
Severinson Eklundh (1986), who investigated the communicative potentials of the
computer-based COM message system, which was developed by the National De-
fense Research Institute in Sweden in 1978. It enabled users both to send and re-
ceive electronic letters, as well as to participate in “real-time dialogues”. An under-
lying assumption of Severinson Eklundh’s study was that a great variety of
responses in an exchange “is a sign of the potential interactivity of a medium and a
high degree of channel presence” (Severinson Eklundh 1986: 48). As a result of
her efforts to identify the basic structural differences between computer-mediated
dialogue and face-to-face dialogue, she found that electronic dialogue consists of
an overall two-part structure and lacks a terminating and evaluating third move
(Severinson Eklundh 1986). Thus it is relevant to ask whether the same pattern oc-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
592 Karianne Skovholt and Jan Svennevig

curs in the current data, or whether there might be technological, contextual, or


even historical differences between the two data sets.
A recurring question in previous research is the significance of delayed or ab-
sent replies to messages. One study that explicitly addresses this issue, albeit in
SMS interaction, is Laursen (2005), who identified a strong obligation to reply
quickly to text messages among Danish adolescents. Drawing on CA, her study
found that both requesting and non-requesting text messages received a response,
and unanswered messages were treated as deviant cases. Specifically, an un-
answered message was interpreted as rudeness, and the recipients were held ac-
countable by being sent reminders (Laursen 2005: 1). Despite the different inter-
actional setting in the present study, a comparison with Laursen’s result is highly
relevant, since we wish to know to what extent employees are obliged to reply to
emails and whether they hold each other accountable for missing replies. However,
it must be taken into account that the institutional context in the present study
makes relevant other norms of interaction than those in Laursen’s study. The main
function of young people’s SMS interaction is to maintain interpersonal relations,
whereas in a workplace setting, the organization’s needs and the participants’ in-
stitutional roles are more important. Interactional norms operate according to cer-
tain rights and obligations in relation to these roles (Drew and Heritage 1992).
Another study that explicitly applies CA concepts to the issue of delayed or ab-
sent response is Baym (1996). Drawing on Pomerantz’s (1984) study of agree-
ments and disagreements in conversation, Baym identifies structural features of
agreeing and disagreeing messages in the Usenet newsgroup rec.arts.tv.soaps
(r.a.t.s.). She emphasizes that verbal behaviors are shaped by media possibilities
and constraints and, moreover, that the ways in which language activities are con-
structed reflect the contexts in which the discourse is embedded. Therefore, delays
in the newsgroup’s interaction are merely “responses to the asynchronous written
medium” rather than signals of a dispreferred response (343). Baym (1996) impli-
citly suggests that electronic interaction establishes other expectations and conse-
quently requires different norms from oral interaction. It follows that one cannot
assume that the meaning of specific conversational practices will be transferred di-
rectly to CMC (Baym 1996: 319).

3.4. Response norms in workplace emails


Only a few studies have addressed the norms of responding to organizational
emails: Kankaanranta (2005a, b), Murray (1991), Condon and Čech (1996), and
Tyler and Tang (2003). Kankaanranta (2005a, b) collected 282 email messages
from eight employees of the Finnish and Swedish Stora Enso Company, a global
paper, packaging, and wood products company. She identified three overall email
genres in her corpus of company-internal email, namely the noticeboard, postman,
and dialogue genres: “The Dialogue genre is used to exchange information about

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 593

corporate activities, the Postman genre to deliver other documents (attachments)


for information and/or comment, and the Noticeboard genre to inform employees
about workplace issues” (Kankaanranta 2005a: 45 f., 2005b: 207). Most interesting
for the present study is the fact that the different genres were identified on the basis
of the type of responses they received – that is, whether or not the message trig-
gered a response. The Noticeboard messages did not typically trigger a verbal re-
sponse, but they could trigger a non-verbal one, such as changing arrangements be-
cause of a delayed flight. The Postman messages either did not request a specific
response, or they invited comments and therefore displayed an expectation of a
verbal response. The Dialogue messages typically requested a verbal response and
consisted of two subtypes: opening and response messages (Kankaanranta 2005b:
209).
While Kankaanranta relates the issue of absent response to a specific email
genre (the Noticeboard genre), Condon and Čech (1996) implicitly relate the issue
of missing responses to a prototypical decision-routine that provides a basic struc-
ture for the interaction in both oral and computer-mediated modalities. The general
decision routine provides a structure of shared understanding and expectations that
allows participants to reach consensus without providing a responding move. Ac-
cording to Condon and Čech:
(…) routines are useful because they make it possible to communicate effectively by re-
ducing the amount of linguistic encoding necessary to express discourse functions (…)
This reduction is accomplished by relying on a shared understanding such as discourse
routines and, especially, the understanding that functions anticipated in routines do not
need to be made explicit in the language. Since agreement is expected following a sug-
gestion, it is often reduced to a minimal encoding, such as ‘OK’, ‘yeah’ or ‘cool’. In
contrast, a disagreement would require some additional linguistic form to signal the dis-
preferred function. Consequently, an absence of any linguistic form at all should signal
agreement. (1996: 19)

In the quote above, Condon and Čech suggest that an absent response signals
agreement. A similar point is made by Murray (1991), who interprets a delayed re-
sponse in a decision routine as an implicit promise. A promise to comply with a re-
quest is often “unmarked” (Murray 1991: 110), i.e., it occurs without linguistic sig-
nals. “Often the time delay between the original request and the response is hours
or even days. The requestor does not consider this rude or unusual, but interprets
the silence as a promise to try to fulfill the request” (Murray 1991: 110). Interesting
observations have also been made by Tyler and Tang (2003), who interviewed em-
ployees about their perceptions of how they responded to emails and how they
formed expectations of their co-participants’ responses to them. The researchers
found that email rhythms were based much more on relationships than isolated
messages. Furthermore, participants accommodated to the email behaviors of
others and mostly favored quick responses, for instance by sending short messages
which stated when they intended to provide a full reply.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
594 Karianne Skovholt and Jan Svennevig

With regard to how participants in CMC deal with non-responses, Rintel et al.
(2003) investigated ambiguous non-responses on Internet Relay Chat (IRC). The
researchers found that when dealing with non-responses, participants tried the ea-
sier solution first. That is, they reconnected and re-greeted before assuming that
there was an interpersonal problem.
Condon and Čech (1996), Baym (1996), Murray (1991), Tyler and Tang (2003)
and Rintel et al. (2003) seem to agree that absent or delayed responses can have
different meanings in CMC than in oral conversation. Inspired by their research, in
this study we ask whether a missing response to a request in an institutional setting
corresponds to an implicit response norm. If so, does the absent response signal
agreement? Do participants’ tacit expectations about institutional routines allow
them not to respond or give acknowledging receipts in certain cases?
There seems to be agreement in some of the previous CMC studies that delayed
or absent responses to emails are in some circumstances in accordance with par-
ticipants’ norms of behavior. Some authors relate this to genre, others to routines.
In interaction studies it has been shown that different types of activities and set-
tings make relevant different norms and speech exchange systems (Arminen 2005;
Drew and Heritage 1992). We expected this to be the case in CMC as well. It is not
necessarily the mediating channel that actualizes the norms of talk. Rather, it is the
different activities and speaker roles involved.
However, none of the studies reviewed above examined how participants ac-
tually respond to email messages or show how missing responses are treated in a
distributed work group. There is a need for systematic analysis of email interac-
tions with the aim of explicitly accounting for their interactional norms. In the
study described below we attempt to do this, and in order to take account of the in-
teractional context we distinguish between responses that occur after questions and
requests, on the one hand, and responses that occur after communicative acts that
do not explicitly request a response, on the other. Our research questions can be
stated as follows:
1. What are the implicit norms of responding to email questions and requests?
a) How and when do participants respond to email requests?
b) How do participants attend to absent or delayed responses?
2. What are the implicit norms of responding to non-requesting emails?
a) What kinds of non-requesting messages are responded to?
b) What kinds of non-requesting messages are not responded to?

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 595

4. Data and method

4.1. Data
The data analyzed in this study are emails from members of a distributed project
group called “Agenda” in a Norwegian telecommunications company, “Telecom”
(henceforth, TCM).2 The email exchanges were gathered from August 2004 to De-
cember 2004 and total 491 emails. The messages were collected with assistance
from the Agenda members, who during the period continuously forwarded their
exchanges to the first author.3
Agenda’s main task was to edit all confirmation letters that were distributed to
their customers. The members formulated, revised, and standardized letters and
templates, with the purpose of giving all letters a uniform style that communicated
in a clear and polite manner to the customers. The group was frequently contacted
by various divisions in the company with requests to reformulate their letters. In
order to give the letters a unified tone of voice, group members followed a set of
guidelines concerning orthography, sentence structure, and style.
The project group consisted of 12 members, each representing a team from the
different divisions of the company: Telephony: Birgitte Hansen, ADSL: Siri Vogt,
Dial-up: Elisabeth Eide, Mobile: Jon Olavsen, Customer Service: Per Olsen,
Credit: Lise Larsen, and Invoice: Janne Eia. In addition, Agenda includes text de-
signer Maria Monsen, system operator Geir Johnsen, and an observer and system
operator from another division, Tore Strand. The manager of the project group was
Line Myhre, who in turn reported to Arvid Lervik, the Information Director of
TCM.
The senders and recipients of the messages were primarily Agenda members,
most of whom were physically located in different departments and even different
parts of Norway. They had occasional meetings at the main office, but most of their
communication was carried out by email or telephone. The members usually inter-
acted in dyads, sometimes with selected co-members copied in, and seldom ad-
dressed the group as a whole. Some members were more active than others – for in-
stance, text designer Maria Monsen, manager Line Myhre, and the system
operators Geir Johnsen and Tore Strand – yet all of the members are represented in
the data. The members also interacted with external collaborators within and out-
side TCM, such as employees at the print center “Strålfors” and members of
Agenda Business. In addition to the email collection, extensive ethnographic and
interview data were collected in order to contextualize group members’ communi-
cative practices. The emails were written originally in Norwegian and were trans-
lated into English by the authors. The translations are idiomatic, rather than word-
by-word, in order to keep the style as close to the Norwegian original as possible.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
596 Karianne Skovholt and Jan Svennevig

4.2. Method
The study applies the methodology of Conversation Analysis (CA), which entails
that the object of study is the participants’ own procedures and norms for interac-
tion and that the approach used to grasp them is sequential analysis, with claims
about individual utterances based on the interpretations made by the co-partici-
pants as displayed in their subsequent responses. In order to identify communi-
cative acts performed in the email messages, the study also applies terms from
speech act analysis (Searle 1969).4
Studying response-giving involves distinguishing between turns (messages)
that make a response conditionally relevant and those that do not. Certain types of
utterances create the expectation of a specific type of response and thus constitute a
first pair part of an adjacency pair. Sacks and Schegloff’s notions of “conditional
relevance” and “accountability” provide a useful resource in order to understand
this phenomenon:
When one utterance (A) is conditionally relevant on another (S), then the occurrence of
S provides for the relevance of the occurrence of A. If A occurs, it occurs (i.e. is pro-
duced and heard) as a “responsive to” S, i.e. in a serial or sequenced relation to it; and if
it does not occur, its occurrence is an event, i.e. it is not only non-occurring (…), it is ab-
sent, or “officially” or “notably” absent. That it is an event can be seen not only from its
“noticeability”, but from its use as legitimate and recognizable grounds for a set of in-
ferences (e.g. about the participant who failed to produce it). (Schegloff 1972: 76)
In CA, a conversational norm may become visible in two ways: first, when a con-
versational feature appears as a structural regularity and second, when a norm is
breached in so-called “deviant cases”:
Only in cases of breach or anticipated breach may the reflexive features of conduct
come to be fleetingly entertained, for on the whole it is in cases of breach that actors may
anticipate being held to account for their actions and, as part of this anticipation, con-
template its being held that they could have known and done differently and therefore
should have done so. (Heritage 1984: 118)
In the following sections, we aim to uncover what sort of email messages provide
for the relevance of a responding message and what sort of response are expected.
To do this, we follow the method of searching for structural regularities as well as
deviant cases, mainly in the form of accounts and prompts oriented to “noticeably
absent” responses.
In the data, messages that elicit a response are primarily directives such as
questions and requests (Searle 1969). Requests for information (e.g., questions)
explicitly ask for a verbal response. Requests for action (such as task assignments)
primarily elicit a non-verbal response, but they also create the expectation of a ver-
bal display of acceptance or rejection (Lindström 1999). Requests for information
and action may take several forms, such as the following:

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 597

1. Imperatives: “Please send me some old letters”.


2. Interrogatives: “Do you have his signature?” (Conveying “send it to me!”)
3. Declaratives (with a question mark): “You’re coming on Thursday?”

As Schegloff (1984) and Clayman and Heritage (2002) have pointed out, there is
no one-to-one correspondence between an utterance’s grammatical form and the
speech act it accomplishes. Declaratives can function as questions, and inter-
rogatives can accomplish non-questioning actions. Whether an utterance consti-
tutes a question or not depends on the sequential context.
An additional feature of the context that is of special relevance here is the in-
stitutional activities and identities involved. Certain routinized patterns of action
can influence the interpretation of individual utterances (Condon and Čech 1996,
cited above). The fact that the manager routinely assigns tasks to the project group
members will make her messages more prone to being understood as requests than
messages from other members. For instance, a task may be assigned by the mere
mentioning of the type of work involved, as in the following email message: “Text-
work. Deadline is 17 sept”. This implicit formulation of a request presupposes a
common understanding of the institutional context, including different communi-
cative rights and obligations related to the group members’ respective professional
roles. This implies that we need to look beyond the linguistic form and the sequen-
tial context to see whether there are organizational structures and procedures that
contribute to determining the function of a certain type of utterance.
In this study, every email in the data corpus was transferred into an Excel docu-
ment, given an identifying number, and categorized as a requesting or a non-re-
questing message. The requesting messages were divided into requests for action
and requests for information. Further, each email was coded with respect to the oc-
currence vs. non-occurrence of responses, response latencies, reminders, accounts,
and receipts. Then, a qualitative analysis of the response messages sought to ident-
ify a response pattern with respect to the normative expectations of the interac-
tants, depending on the form of the message, its sequential position, the institu-
tional activity involved, and the participants’ institutional roles.

5. Responses in workplace emails

The quantitative analysis resulted in two major findings. First, almost half – 47 %
(230) – of the total number of messages did not receive a response. Even more sur-
prisingly, 34 % (101) of the requesting messages did not receive a response, as
compared to 65 % (129) of the non-requesting messages that did not receive re-
sponse. Second, the average response latency was found to be 28.01 hours. The
quantitative response patterns are presented in Table 1.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
598 Karianne Skovholt and Jan Svennevig

Table 1. Response patterns in the corpus

All response types Response No response


All messages 491 261 (53 %) 230 (47 %)
Requesting messages 294 193 (66 %) 101 (34 %)
Request for action 202 118 (58 %) 84 (42 %)
Request for information 92 75 (82 %) 17 (18 %)
Non-requesting messages 197 68 (35 %) 129 (65 %)

The qualitative analysis produced two general findings. First, the most common
types of exchanges were question/answer sequences and requests-for-action/com-
pliance sequences, or even request-for-action followed by no response or a place-
holder. Second, absent responses to questions and requests were followed by re-
minders from the senders or accounts by the recipients, suggesting that absent
responses are treated as noticeably absent. In what follows, we present the norms we
have identified in more detail and illustrate our findings with examples from our data.

5.1. A response is conditionally relevant after questions and requests


The data indicate that questions and requests provide for the relevance of a re-
sponse in email interaction, just as they do in conversation. Two types of evidence
for this norm were found. First (and not surprisingly), the exchange of questions/
requests and responses establishes a regular pattern of interaction in the data. The
second type of evidence occurs in deviant cases, i.e., when absent responses are
treated as noticeably absent.
Email recipients seem to orient to two different practices. First, they may
choose to reply with what we consider a placeholder, i.e., an email produced
within a short time lapse that acknowledges that a message has been received and
estimates when the sender intends to produce a full response. Alternatively, recipi-
ents may postpone their response until the requested task is carried out. In what fol-
lows, MM’s response is an example of a placeholder message:
The system operator (GJ) posted a request for information to the text designer
(MM): “I was informed by Arvid that the Director CS is Eirik Heiberg. Have you
got his signature? Or shall we still give the case to Per? Regards Geir Johnsen”.
GJ’s request (Have you got his signature?) realizes both a question (Have you got
his signature?) and a request (Send me the signature, please). Eight hours later,
MM replied: “I have got it! I’ll send it Monday morning (Sent it to John while I
sent the two others to Line). Maria”. In her message, MM orients first to the ques-
tion (I have got it) and second to the request (I’ll send it Monday morning). Three
days later, Maria finally sent the signature to GJ, linking her message to GJ’s orig-
inal message: “Here’s Heiberg’s signature. :) Maria”.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 599

By linking the second reply to GJ’s initiating message, MM establishes sequen-


tial coherence and an adjacency relationship between GJ’s request and her accom-
plishment of it. This reply does not produce a second pair part; rather, it functions
as a placeholder that estimates a projected answer. By producing the placeholder,
MM displays orientation to two aspects: the need to respond and the obligation to
comply with the request. It seems as if she reads GJ’s initial message ([…] “or shall
we still give the case to Per?”) as implying doubt or even criticism and produces a
quick response to show her willingness to comply with the request, at the same
time accounting for a projected delay in this action.
The alternative to producing placeholders is to postpone one’s response until
the requested task is carried out. A group leader from another department (HF) sent
text designer MM the following request: “Hi! Textwork. Deadline is 17. sept”. The
text to be improved was attached to the message. HF’s utterance “Textwork” is a
request addressed to MM; it refers to a forwarded and appended message from SV
which explicitly requests MM to revise a letter. Two weeks later, MM gave her re-
sponse directly to SV, copying in HF, accomplishing the task by attaching the im-
proved letter: “Here it is. :) Maria”.
The interaction between HF and MM has a minimal transactional character.
The elliptical form of the request (“Textwork”) lacks a verb indicating what action
MM is supposed to take. In addition, no politeness strategies are employed to
modulate the strength of the request. Implicit in MM’s role as a text designer is the
obligation to improve the company’s letters and an obligation to comply with re-
quests to do so; MM’s response and compliance shows acceptance. This minimal
transaction is highly routinized in nature. Additionally, SV does not hold MM ac-
countable for her delayed response, for instance by producing a reminder. In this
case, the mentioning of a deadline may provide for the legitimacy of not respond-
ing until the date indicated.
The second type of evidence for the response norm occurs in deviant cases.
When questions and requests are not followed by any response, the Agenda members
treat the missing response as noticeably absent. As we will see, the senders post a
reminder to the recipients, while the recipients on their side produce an account in
their delayed reply. In one email BH requests MM to edit some texts: “Enclosed
you’ll find a link to the letters for differentiated subscription. The release date for
the new subscriptions is Nov. 8th. You should edit them in order to improve the lan-
guage”. This directive is formulated with deontic modality, strongly committing
MM to the requested action (“You should edit them in order to improve the lan-
guage”/“Du må gå igjennom for språklig forbedring”). One week later, not having
received any response from MM, BH appends her original message to the follow-
ing reminder: “Hi Maria! What’s the status here? If you want I can sit down with
you and we can look at it together. Regards Birgitte:-)”
By referring to the appended message, BH indirectly re-actualizes her request,
reminding MM that she has not yet complied with the request. The question

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
600 Karianne Skovholt and Jan Svennevig

(“What’s the status here?”) seems to make relevant an account for not accomplish-
ing the task. Additionally, the offer of sitting down with MM can be interpreted as a
way of dealing with a problem. It implies that the task has not been completed and
that the recipient may be having trouble with it. In short, by sending MM a rem-
inder, BH treats MM’s absent response as reportable. BH holds MM accountable
for the missing reply, and the appended mail functions as evidence for the missing
response. Twenty minutes later, MM responds with the following message: “I have
moved my Tuesday-Agenda-day to tomorrow […] so I am going to look at this to-
morrow. […]. I hope that’s all right – because I’m soooo stressed this week, […]. I
had a sick child Thursday last week, and when he recovered Friday I discovered
that he had got lice – and then I spent the day eradicating them. That’s why I
haven’t looked at this yet. Best regards, Maria”.
In her reply, MM produces a narrative account that explains why she has not
complied with BH’s request. This lengthy account displays an orientation to the
normative expectation of complying with requests without delay or alternatively,
of sending a placeholder response.
To sum up, email resembles conversation in that requests provide for the con-
ditional relevance of a response in the form of a granting or rejection. In the case of
questions, there seems to be a tolerance for delay ranging up to some days. In re-
quests for action, the tolerance for delay seems greater, especially if the requested
action is extensive. Support for this is suggested by the quantitative results, which
show that 18 % (17) of the requests for information lacked response, compared
with 42 % (84) of the requests for action. However, a practice is available for pre-
empting negative inferences from missing responses, namely placeholder mess-
ages signaling compliance and committing to a future granting of the request. This
seems to be a practice that has developed to deal with expectations based on the
meaning of silence that are transferred from oral conversation to the email
medium. More important, the strong orientation to a norm of complying with re-
quests in a workplace setting, as in this study, must be seen in light of the partici-
pants’ institutional roles. MM’s role as text designer allows her colleagues to make
requests of her, on the one hand, and on the other hand it obliges her to comply with
their requests.

5.2. Invitations for comments and corrections


Invitations to correct or comment on what is proposed in a message constitute one
class of systematic exceptions to the norm of conditional relevance of answers. In
these cases, the original message performs two actions simultaneously: It presents
information or makes a proposal, and furthermore it asks the recipients to comment
on it. In these cases, the norm seems to be that addressees should respond if they
have suggestions to make, and if not, they need not respond. In such cases, silence
means acceptance.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 601

In one message, the system administrator (TS) informs the Agenda group that a
photo of group members (which was taken during the previous meeting) has been
published on their homepage: “Hi everybody, now the picture is published on the
Agenda page. I hope I chose the right picture out of the 3 I received from Line.
Should I make any changes? Tore”.
In this example, TS performs three separate speech acts. First, he informs the
group that the photo has been published; furthermore, he indirectly requests LM to
confirm that he has published the right photo. Finally, he interrogatively requests
the Agenda members to report if he should make changes. Interestingly, no one re-
sponds to this request. The fact that the message includes multiple speech acts
makes it possible for the recipients to ignore the request and to merely attend to the
informing part. The request invites suggestions for changes and provides a possi-
bility of not responding if one does not have a suggestion to make. In such cases,
then, non-response seems to be acceptable after a request and carries the meaning
that one has nothing to report.
In the next example, TS responds to a message from MM in which she sent him
an attached file and (indirectly) requested him to publish it on the Agenda home-
page: “For our pages on the intranet. :) Maria”. One hour later, TS responds to MM,
adding the Agenda leader LM to the address field: “Is this okay on [reference to
website]? Best regards, Tore”.
TS’s message above primarily informs MM and LM that the new letter tem-
plate has been published. However, his utterance is interrogatively designed as a
request for approval by MM and LM. As in his previous message, he gets no re-
sponse, and he seems to treat the silence as approval. The participants appear to ad-
here to a norm which allows them to remain silent if they approve a proposal and to
respond only if they disapprove or have corrections to make.
Our main explanation for this pattern of non-response is the multifunctionality
of the initiating message – the fact that it informs and invites comments simulta-
neously. However, this also seems to be a pattern that is more common in emails
sent to multiple recipients than in messages to individuals. Addressing a larger
group seems to contribute to making it less relevant for the recipients to reply, un-
less one has a substantial contribution to make.

5.3. Responses to non-requesting emails


Non-requesting email messages do not require a response, but they are nonetheless
frequently responded to. As indicated in Table 1 above, 35 % (68) of the non-re-
questing messages received a response. In our data, non-requesting messages in-
volve actions such as sending attachments (primarily edited letters) or informing
about institutional activities. The analysis shows that responses to informing mess-
ages are not normatively expectable but rather volunteered. In the following mess-
age, the Agenda leader (LM) informs her group of an article in Telecom’s news

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
602 Karianne Skovholt and Jan Svennevig

bulletin in which the Information Director BK underscores the importance of


Agenda’s work. In addition, she congratulates her group on their good work: “Hi
all participants in Agenda! Read the info from Bente this month and read it thor-
oughly because we in Agenda are mentioned!!! Congratulations on the good work
and keep it up, we have attention from the top. rgds Line”.
In traditional face-to-face conversation, compliments are followed by receipts
of various sorts (Pomerantz 1978). However, no one responds to LM’s email
above. Contextual factors such as multiple addressees may explain the missing re-
sponse. In the data, other instances of informing messages sent to multiple recipi-
ents show a similar pattern of absent response. On October 28th 2004 at 09:40, LM
informs the Information Director AL of the progress of an issue by writing an FYI
(For Your Information) and appending an email thread: “FYI, Geir will follow this
up further! rgds Line”. FYI messages constitute one of the main categories of in-
forming messages; another category is messages that are sent to in-copied recipi-
ents (Skovholt and Svennevig 2006).
Purely informing messages thus seldom receive responses, and the lack of re-
sponse is not treated as problematic or deviant, i.e., followed by reminders or ac-
counts. From this observation we conclude that informing messages do not require
a response.
However, our data show that in certain circumstances non-requesting messages
do receive responses. The responses to such messages include such types of actions
as reminders, accounts, receipts, and placeholder messages (see Table 2). The
practice of sending reminders and accounts has been commented on above, but
here we examine a bit more closely the use of receipts. Interestingly, 20 non-re-
questing messages receive acknowledging receipts. In the responses that occur, the
time lapses are short and the messages typically show other signs of social pres-
ence associated with oral interaction (cf. Grønning 2006).

Table 2. Responses to non-requesting emails

Response Type Frequency


Reminders 16 (24 %)
Accounts 8(12 %)
Receipts 20 (29 %)
Placeholders 4 (6 %)
Other 20 (29 %)
Total 68 (100 %)

Responses to non-requesting emails occur, for instance, when recipients link a


new message to a previous email (as a means of inserting the recipient’s address in
the address field) or when they produce acknowledging receipts and repairs. A

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 603

reply message is not always only a response to a previous message; rather, the
sender may use the reply function to initiate a new and unrelated message. TS
posted a purely informative message to his leader LM: “Copy to you Line”. Four
days later, LM replied with a copy to the Information Manager: “Thanks for your
info, Tore. Nice to know how AGB is organized. The pictures of AGP are coming,
I’m going to send them over this evening. rgds Line”.
Here LM performs two actions. She thanks TS for the information he provided,
and she informs (or promises) him that she is going to send over some pictures of
Agenda, which he, as system administrator, is responsible for publishing on Agen-
da’s homepage. These actions are not internally coherent but correspond rather to
two unrelated institutional activities. The message was sent four days after the in-
itial message, using the reply function in the mail program. As a result, the “sub-
ject” heading was inherited from the previous exchange and was not relevant to the
issue of informing about the status of the picture. The thanking may thus be a way
of linking back to the heading and to the participants’ previous history of interac-
tion rather than being a relevant action in itself. Although informing messages do
not require a response, they may be treated as actions that make a specific type of
response relevant. By thanking TS, LM treats the prior message as an offer of a ser-
vice and thus makes it response-worthy.
Non-requesting messages are also responded to by appraisals and supportive
statements. Typical instances are supportive responses from leaders. In the next
example, TS replies to a message from one of the employees in Customer Services
concerning a customer complaint. The request for help was originally addressed to
LM, but since she was not available on the day in question, it was forwarded to
Agenda’s mailbox and handled by TS. TS copied in LM in his reply: “Hi! We in
Telecom have no control over how another sales department has treated this trans-
action! Unfortunately it will most likely be difficult to have full control of how
other sales departments treat transactions. We in Telecom have clear routines for
how the letters from the customer shall be treated. See presentation”. Three days
later, LM responded to TS: “Great support, Tore, you are very organized and a
great reply to Erik! rgds Line”. In contrast to her previous message to TS above
(“thanks for the info”), LM does not elaborate on TS’s message or introduce a new
activity. Rather, it is a purely responsive message providing positive evaluation
and acknowledgement. This is also a volunteered response, occasioned but not
made conditionally relevant by the previous message.
In the data it is typically superiors who give acknowledging and supportive re-
ceipts to non-requesting messages. In one message, LM informs AL of the halt in
progression in Agenda: “Hi Arvid! Refer to mail below concerning new participant
from Dial-up. In addition I want to inform you that I was a little bit strict on the prior
Agenda meeting in cases where I don’t think the work has made any progress. The
templates were not finished – I’ll contact you for a chat. rgds Line”. Twenty-one
minutes later, AL responds: “Ok. Progress is especially important here! Arvid”.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
604 Karianne Skovholt and Jan Svennevig

AL first acknowledges receipt of LM’s message (“Ok”) and then goes on to sig-
nal support of LM’s line of action. The use of an intensifier (“especially”) and an
exclamation mark reinforces his display of agreement. The primary role of this re-
sponse is to acknowledge the information and align with LM’s position. This type
of evaluating response from managers enacts the institutional role of a person with
the right and obligation to evaluate the performance of his or her employees.
Participants also respond to non-requesting messages to check their under-
standing of or make corrections to the previous mail. Text designer MM receives a
copy of LM’s mail to EE: “Welcome to AgendaPrivate, Elisabeth. I’ll invite you to
a new meeting with only the two of us, to brief you about your work :-) rgds Lise”.
Fifteen minutes later MM responds: “Since you’re sending me a copy – is Elisa-
beth going to work with text? I have heard that she works with Internet today. Hope
you have had a nice week-end! :) Maria”. In the original message, MM is a secon-
dary recipient (Skovholt and Svennevig 2006) and is not addressed explicitly in the
address heading. In her response to LM, MM shows that the very fact that she has
been copied in gives rise to inferences about relevance, in this case the hypothesis
that EE will be working with text, like herself. MM’s question serves to initiate re-
pair, i.e., to check her understanding of LM’s message. (On the topic of repair, see
also the chapter by Jacobs and Garcia, this volume.)
In sum, we found that participants hold each other accountable for non-re-
sponses to questions and requests. However, for a certain class of messages that are
primarily informative and only secondarily requestive, a response is only condi-
tionally relevant if the recipients have corrections or comments to make. Also, we
found that responses to non-requesting messages are not conditionally relevant but
are occasionally volunteered as more interpersonally oriented responses, e.g., to
provide positive evaluations, appraisal, and support.

6. The function of non-responses in email interaction

In email interaction, a missing response can potentially be due to several types of


trouble sources. It can be caused by a technical problem or by a content problem,
for instance if the recipients have problems understanding the message. Alter-
natively, the trouble source can sometimes be traced to the time and space restric-
tions of email. As Tyler and Tang (2003) observed, senders often perceive an
absent response as an indication that the recipient is overwhelmed by email.
The trouble source could also be considered a relational problem, for instance
that the receiver does not consider the sender important enough to deserve an
answer.
The inferences that senders actually draw from absent responses can not be
analyzed empirically by text analysis. However, we may describe the ways partici-
pants display their perceptions of missing response through their subsequent ac-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 605

tions – for example, how sender and receiver collaboratively construe and identify
the trouble source in reminders and accounts. Which trouble sources do they ad-
dress and what kinds of accounts are provided?
The reminders sometimes provide a potential explanation for the problem and
present it as something beyond the recipient’s control (MM to LH: “I hope you
enjoy the summer, and – if you are not on holiday – that you as quickly as possible
can conjure up a reply to the mail below. I guess that it has drowned in your holiday
mail”). The senders produce reminders with hedges that make the request appear
indirect and unobtrusive (GJ to AL: “I wonder if you could find the signatures”).
The reminders may be based on the assumption that the recipient has already pro-
vided the requested information or carried out the work (JE to BS: “Was there a
solution to this?”). Interestingly, the reminders may also construe the problem as
rooted in the sender’s own insufficiency (AF to GO: “Now I’m really nagging, but
[…]”; LM to KB: “Did you get assistance from Tor on this case? Greetings from
she who collects old mails”).
Accounts from the recipients generally present the problem as time manage-
ment (MM to LM: “Sorry for this late answer – it is rather hectic nowadays”. GO to
AF: “I will do the check Friday this week, other issues have turned up which made
me put this on ice for a while […]”. KB to LM: “No, I had forgotten that […]”).
The accounts may also be presented as simple apologies (LH to MM: “Sorry, I will
come back to you by next Monday”). There are eight instances of accounts in total
in the corpus.
By treating the trouble sources as systemically occasioned (such as by vacation
or a hectic work situation), the participants display that an absent or delayed re-
sponse is not the result of a relational problem. This observation may suggest that
missing responses have other functions in email interaction than they do in face-
to-face interaction. It also supports Pomerantz’s (1984) and Rintel et al.’s (2003)
finding: Participants try the easier solution first, for example by looking for insti-
tutional or technical reasons before they assume that there is an interpersonal prob-
lem.

7. Conclusion

The study presented in this chapter shows that email resembles conversation as
regards response and non-response, in that there is a norm that requests and ques-
tions should in general be followed by responses. However, there are situations in
email where a response to a question or request is not necessarily conditionally rel-
evant, in contrast to conversational norms. This indicates that the participants have
developed alternative norms for email interaction. Our analysis identified three
general interactional norms:

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
606 Karianne Skovholt and Jan Svennevig

1) A response is conditionally relevant after questions and requests.


2) Requests for comments and corrections to a proposal make conditionally rel-
evant only the requested types of responses. Non-response signals acceptance
of the proposal.
3) A response to non-requesting messages is not conditionally relevant but may
be volunteered as an acknowledging receipt or repair.

The first norm is that questions and requests should normatively receive a re-
sponse. Absent responses are likely to be followed by reminders from the re-
questers or by accounts and excuses from the recipients. In the case of questions,
there seems to be a tolerance for delay ranging up to several days. In requests for
action, the tolerance for delay appears to be greater, especially if the requested ac-
tion is elaborate. In cases where a request cannot be granted immediately, the par-
ticipants either wait until the task can be carried out to respond, or they send a
“placeholder message”, i.e., a message that signals compliance and commits to a
future granting of the request. The practice of sending placeholder messages is
oriented towards preempting negative inferences from absent responses. This prac-
tice seems to have developed to deal with the potential negative implications of si-
lence derived from conversational interaction. These findings are consistent with
Tyler and Tang’s (2003) interviews, which revealed that participants often sent
short responses to state when they intended to provide a fuller response.
The second norm comprises a class of exceptions to the norm of responding to
requests. When email messages contain invitations to correct or comment on pro-
posals, they perform two actions simultaneously: They present information to the
addressee, and they simultaneously request comments or corrections to the propo-
sal. In these cases, a response is conditionally relevant only if the recipients disap-
prove, disagree, or have corrections to make. This norm may explain why a sur-
prising 34 % of the requesting messages did not receive a response. Not responding
to requests violates traditional norms of adjacency pairs: A first-pair part generally
should be responded to by a second-pair part. However, in workplace meetings or
classroom interaction, silence means that one has nothing to report, and it is not
treated as problematic. Rather, silence conventionally may be understood as con-
veying acceptance and agreement, consistent with the findings of Murray (1991)
and Condon and Čech (1996).
The third norm we identified shows that non-requesting email messages, e.g.,
attachments, FYI messages, and in-copied messages, do not require a response.
Neither do first-pair parts that do not request information or action beyond a
simple acknowledgement, e.g., congratulations and compliments. The lack of re-
sponse in these instances was not treated as problematic or deviant by participants
in this study. This pattern is inconsistent with traditional adjacency pair norms
in oral conversation, where congratulations and compliments typically receive
thanks.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 607

A category of email messages that is typically not followed by a response is in-


forming messages sent to multiple recipients. This category corresponds to Kan-
kaanranta’s (2005a, b) “Notice board” genre, which represents messages that do
not trigger a response. Even if purely informing messages do not require a re-
sponse, the technology makes response possible, so that an informing message
may turn into a conversational thread.
Non-requesting messages do not make a response conditionally relevant, but
they are occasionally responded to nonetheless by minimal acknowledgments and
receipts. However, these minimal responses occur far less often than in conver-
sation. The main class of minimal responses involves assessments and other forms
of “positive evaluations” from superiors. Typically, these messages occur when in-
teraction takes place with just a small time lapse or when other signs of social pres-
ence are evident.
The observations above contrast with the findings of Severinson Eklundh
(1986). Whereas the COM dialogues revealed a two-part structure and lacked a ter-
minating and evaluating third move, participants in the current study to a certain
extent produced minimal responses in third position. One possible explanation
could be that dialogue has developed significantly and become more common
since email was first introduced as a working tool.
Participants draw on various contextual cues to interpret an absent or delayed
response in email interaction. In addition to the three response norms summarized
above, our analysis of reminders and accounts shows that participants oriented to
the institutional context and the asynchronicity of the medium when they followed
up on absent responses. Their reminders and accounts construed the problem
source as systemic (e.g., the recipient was on vacation or overloaded with email)
rather than as interpersonally occasioned (as a sign of disagreement or a potential
conflict). The practice of sending reminders and accounts indicates that missing re-
sponses are treated differently from and have other functions in email interaction
than silence does in face-to-face conversation.
Email messages are complex utterances that often include multiple speech acts.
In contrast to face-to-face conversation, the asynchronicity of email interaction in-
fluences participants’ expectations of responses and imposes other premises for
how participants coordinate their actions. In email interaction, traditional adja-
cency pairs are modified and adapted to fit the asynchronous context. There is great
variation in patterns of response that are not normatively regulated, such as
whether or not to respond to a non-requesting message and when to respond to a re-
questing message. The contextual factors that seem to be most relevant for explain-
ing such variation in organizational settings are the number of addressees and their
relative institutional roles. In addition, there is great idiosyncratic variation, symp-
tomatic of a system of interaction that is not (yet) strongly codified. This variation
may be exploited pragmatically to signal interpersonal relations, and high respon-
siveness may be used to display involvement and intimacy.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
608 Karianne Skovholt and Jan Svennevig

Acknowledgements

We would like to thank Susan Herring and Arja Piirainen-Marsh for their helpful
comments.

Notes

1. For more on the hybrid nature of CMC language, see Skovholt and Svennevig (2006) and
Skovholt (2009).
2. All names of companies and employees have been replaced by pseudonyms.
3. Depending on the employees to forward their emails is a possible error source for a study
of responses, in that certain short acknowledging messages may have been deemed un-
important and thus not forwarded, or they may have been forgotten. In cases where we
had doubts whether all messages in a thread had been forwarded, we contacted certain
members with a request to check their inboxes.
4. For more on the application of CA and speech act analysis, see Skovholt (2009).

References

Arminen, Ilkka
2005 Institutional Interaction: Studies of Talk at Work. Aldershot, UK: Ashgate.
Baym, Nancy K.
1996 Agreement and disagreement in a computer-mediated discussion. Research on
Language and Social Interaction 29(4): 325–345.
Clayman, Stephen and John Heritage
2002 The News Interview: Journalists and Public Figures on the Air. Cambridge,
UK: Cambridge University Press.
Condon, Sherri L. and Claude G. Čech
1996 Discourse management strategies in face-to-face and computer-mediated deci-
sion making interactions. Electronic Journal of Communication/La Revue
électronique de communication 6(3).
http://www.cios.org/EJCPUBLIC/006/3/006314.HTML
Drew, Paul and John Heritage (eds.)
1992 Talk at Work: Interaction in Institutional Settings. Cambridge, UK: Cambridge
University Press.
Garcia, Angela C. and Jennifer B. Jacobs
1998 The interactional organization of computer mediated communication in the
college classroom. Qualitative Sociology 21: 299–317.
Garcia, Angela C. and Jennifer B. Jacobs
1999 The eyes of the beholder: Understanding the turn-taking system in quasi-syn-
chronous computer-mediated communication. Research on Language & So-
cial Interaction 32: 337–367.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 609

Grønning, Annette
2006 Personen bag. Tilstedevær i email som interaktionsform mellem kunde og
medarbejder i dansk forsikringskontekst. [The person behind. Social presence
in email interaction between customer and employee in a Danish insurance
context.] Ph.D. dissertation, Copenhagen Business School.
Heritage, John
1984 Garfinkel and Ethnomethodology. Oxford, UK: Polity Press.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2010 Computer-mediated conversation: Introduction and overview. Language@
Internet 7, article 2. http://www.languageatinternet.org/articles/2010/2801/
index_html/
Jones, Quentin, Gilad Ravid, and Sheizaf Rafaeli
2004 Information overload and the message dynamics of online interaction spaces:
A theoretical model and empirical exploration. Information Systems Research
15(2): 194–210.
Kalman, Yorman M., Gilad Ravid, Daphne R. Raban, and Sheizaf Rafaeli
2006 Pauses and response latencies: A chronemic analysis of asynchronous CMC.
Journal of Computer-Mediated Communication 12(1), article 1. http://jcmc.
indiana.edu/vol12/issue1/kalman.html
Kankaanranta, Anne
2005a English as a corporate language: Company-internal e-mail messages written
by Finns and Swedes. In: Britt L. Gunnarsson (ed.), Communication in the
Workplace, 42–59. Uppsala: University of Uppsala.
Kankaanranta, Anne
2005b “Hej Seppo, could you pls comment on this!” Internal email communication in
lingua franca English in a multinational company. Ph.D. dissertation, Centre
for Applied Language Studies, University of Jyväskylä.
Laursen, Ditte
2005 Please reply! The replying norm in adolescent SMS communication. In: Ri-
chard Harper, Leysia Ann Palen, and Alex S. Taylor (eds.), The Inside Text:
Social, Cultural and Design Perspectives on SMS, 53–73. Dordrecht, The
Netherlands: Springer.
Lindström, Anna
1999 Language as Social Action. Grammar, Prosody, and Interaction in Swedish
Conversation. Uppsala University: Department of Nordic Languages.
Mattila, Anna S. and Danliel J. Mount
2003 The impact of selected customer characteristics and response time on e-com-
plaint satisfaction and return intent. International Journal of Hospitality Man-
agement 22(2): 135–145.
Murray, Denise E.
1991 Conversation for Action: The Computer Terminal as Medium of Communi-
cation. Amsterdam/Philadelphia: John Benjamins.
Orlikowski, Wanda J. and JoAnne Yates
1994 Genre repertoire: Examining the structuring of communicative practices in or-
ganizations. Administrative Science Quarterly 39(4): 541–574.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
610 Karianne Skovholt and Jan Svennevig

Panyametheekul, Siriporn and Susan C. Herring


2003 Gender and turn allocation in a Thai chat room. Journal of Computer-Mediated
Communication 9(1). http://jcmc.indiana.edu/vol9/issue1/panya_herring.html
Pitkin, Roy M. and Leon F. Burmeister
2002 Prodding tardy reviewers. A randomized comparison of telephone, fax, and
e-mail. JAMA 287(21): 2794–2795.
Pomerantz, Anita
1978 Compliment responses: Notes on the co-operation of multiple constraints. In:
Jim Schenkein (ed.), Studies in the Organization of Conversational Interac-
tion, 79–112. New York: Academic Press.
Pomerantz, Anita
1984 Agreeing and disagreeing with assessments: Some features of preferred/dis-
preferred turn-shapes. In: J. Maxwell Atkinson and John Heritage (eds.),
Structures of Social Action: Studies in Conversation Analysis, 57–102. Cam-
bridge, UK: Cambridge University Press.
Rafaeli, Sheizaf, Daphne R. Raban, and Gilad Ravid
2005 Social and economic incentives in Google answers. Paper presented at the ACM
Group 2005 conference, Sanibel Island, Florida. http://jellis.org/research/
group2005/papers/RafaeliRabanRavidGoogleAnswersGroup05.pdf
Rintel, Sean E., Jeffery Pittam, and Joan Mulholland
2003 Time will tell: Ambiguous non-responses on Internet Relay Chat. Electronic
Journal of Communication/La Revue électronique de communication 13(1).
http://www.cios.org/EJCPUBLIC/013/1/01312.HTML
Sacks, Harvey
1987 On the preference for agreement and contiguity in sequences in conversation.
In: Graham Button and John R. E. Lee (eds.), Talk and Social Organization,
54–69. Clevedon, OH: Multilingual Matters.
Sacks, Harvey
1992 Lectures on Conversation. Oxford, UK: Blackwell.
Sacks, Harvey, Emmanuel A. Schegloff, and Gail Jefferson
1974 A simplest systematics for the organization of turn-taking in conversation.
Language 50: 696–735.
Schegloff, Emmanuel A.
1972 Notes on a conversational practice: Formulating place. In: David N. Sudnow
(ed.), Studies in Social Interaction, 75–119. New York: MacMillan, The Free
Press.
Schegloff, Emmanuel A.
1984 On some questions and ambiguities in conversation. In: J. Maxwell Atkinson
and John Heritage (eds.), Structures of Social Action, 266–298. Cambridge,
UK: Cambridge University Press.
Searle, John R.
1996 Speech Acts. New York and London: Cambridge University Press.
Severinson Eklundh, Kerstin
1986 Dialogue Processes in Computer-Mediated Communication. A Study of Letters
in the COM System. Linköping Studies in Arts and Sciences 6. Linköping,
Sweden: Linköping University.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
Responses and non-responses in workplace email 611

Skovholt, Karianne
2009 Email literacy in the workplace. A study of interaction norms, leadership com-
munication, and social networks in a Norwegian distributed work group. Ph.D.
dissertation, Faculty of Education, University of Oslo.
Skovholt, Karianne and Jan Svennevig
2006 E-mail copies in workplace interaction. Journal of Computer-Mediated Com-
munication 12(1), article 3. http://jcmc.indiana.edu/vol12/issue1/skovholt.html
Strauss, Judy and Donna J. Hill
2001 Consumer complaints by e-mail: An exploratory investigation of corporate re-
sponses and customers reactions. Journal of Interactive Marketing 15(1):
63–73.
Tyler, Joshua R. and John C. Tang
2003 When can I expect an e-mail response? A study of rhythms in e-mail usage. In:
Proceedings of the ECSCW 2003 European Conference on Computer Sup-
ported Cooperative Work, 239–258. New York: Springer-Verlag.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
612 Karianne Skovholt and Jan Svennevig

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 2:50 AM
25. Small talk, politeness, and email communication
in the workplace
Amelie Hössjer

1. Introduction

Social small talk or relational-oriented interaction, otherwise known as “phatic com-


munion” (Malinowski 1923), has been found to play an important role in work con-
texts. Research has shown that this kind of interaction in corridors, close to copy ma-
chines, etc., where individuals take time to talk about themes that are extrinsic to
work helps to encourage a social sense of togetherness (Eelen 2001; Holmes and
Schnurr 2005; Mills 2003; Watts 1992, 2003; Wierzbicka 1999). However, the ex-
ternal conditions for professional communication in modern society may vary con-
siderably as a result of technical developments. On the one hand, colleagues who are
co-located may choose among different communication alternatives. They may com-
municate face-to-face or interact in mediated form: via stationary or mobile phones,
via internal post, paper notes, or digitally via home pages, email, etc. On the other
hand, professionals at a distance may communicate mainly using one medium for
their interaction. A discussion of small talk in work settings thus needs to take into
consideration what the external situation means for how interaction is carried out and
how a sense of togetherness is created under various external work conditions.
This chapter discusses how work-related email messages are constructed in re-
lation to an external context, with linguistic politeness theory as an interpretative
lens. The main focus is on how small talk, in connection with politeness, is used to
create a work climate that encourages cooperation under various external condi-
tions. From this perspective I will advocate the need for further elaborated con-
cepts within politeness theory in relation to media use and the context in which the
interaction takes place.
The discussion is based on a case study of work-related email messages from
two editorial contexts. The main focus is on email messages in a Swedish print
journal where email represents the primary form of communication and is part of a
digitally-based work community. Discussions about marketing, planning of issues,
following up contacts with advertisers, and decisions and questions regarding
manuscripts are all dealt with through email. This type of digital communication is
juxtaposed with the kind of email communication that takes place at a traditional
Swedish news office. At the news office, email communication is part of a physi-
cally-based community and is realized in interaction with other communication al-
ternatives whose mutual relations I examined in an earlier study (Hössjer 2002,
2006; Hössjer and Severinson Eklundh 2005, 2009).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
614 Amelie Hössjer

It will be shown that dedicated behaviors developed among the correspondents


in both settings, and that the external context plays a central role as regards the so-
cial and pragmatic dimensions of email communication. To be sure, the different
sets of data that underlie the discussion were not gathered under fully comparable
circumstances, but there are important parallels regarding the work processes that
make the character of the messages in the two settings interesting to compare in
terms of the face work that they do. Small talk as a type of politeness has primarily
been investigated in face-to-face situations, yet it can be seen as highly relevant as
well to the elucidation of communicative structures that develop in digital con-
texts – not least in light of the problems and conflicts that sometimes arise among
email writers.

2. Background: Email and politeness

Email has been characterized as a lean medium (Daft and Lengel 1984), meaning
that it does not allow immediate feedback or the use of subtle signals for interpre-
tation normally conveyed non-verbally in spoken communication via tone of voice
and facial expression. The lack of such interpretive cues has been seen as restrict-
ing the kinds of communication that can take place via email (for overviews, see
Abdullah 2006; Bunz and Campbell 2004; Panteli and Seely 2006; Waldvogel
2007). Important information, it is claimed, is lost regarding what is said and how
it should be perceived, which in turn increases the risk of misunderstanding and
conflict. The use of so-called “flaming” – passages where people become enraged
for little apparent reason and exchange incensed comments – has been observed in
various studies (for an overview, see Turnage 2007; for a case study of flaming, see
Danet, this volume) and taken as evidence that the medium is not especially well-
suited to sensitive subjects of conversation.
This view has been questioned to an increasing extent, however. A number of
studies have attempted to explain how a “lean” medium such as email can nonethe-
less produce rich information (Panteli 2002; Waldvogel 2001). Researchers have
demonstrated how people in using computer-mediated communication (CMC)
tend to develop informal codes, referred to as “emotext” by Persichitte, Young, and
Tharp (1997: 280), in order to compensate for the lack of non-verbal cues and
make typed CMC more expressive and/or speech-like (Baldauf and Stair 2008).
These informal codes include grammatical markers, strategic capitalization, lexi-
cal surrogates, and intentional misspelling (e.g., thaaaaaank youuuuuu), as well as
emoticons, which are claimed to substitute for facial expression (Bieswanger, this
volume; Derks, Bos, and Grumbkow 2008; Derks, Fisher, and Bos 2008; but cf.
Dresner and Herring 2010).
Email can also be socially rich, including the use of politeness. Several studies
have shown how individuals in email use apologies, indirectness, inclusive forms

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 615

(“we”, “you”), and greetings and closings in order to create a good work climate
(Job-Sluder and Barab 2004; Kankaanranta 2005; Kaul and Kulkarni 2005; Mor-
and and Ocker 2003; Waldvogel 2007). It has also been discussed how this kind of
behavior in email relates to spoken interaction (Boneva, Kraut, and Frohlich 2001;
Zack 1993) and other forms of mediated communication (Watts 2007); how the in-
teraction is affected by various pragmatic parameters: content of the message (Bie-
senbach-Lucas 2005), the stylistic level used by the writers (Bunz and Campbell
2004), and the relative status of the interlocutors (Biesenbach-Lucas 2007, 2005;
Chen 2006, 2001; Rogers and Lee-Wong 2003; Sherblom 1988; Skovholt and
Svennevig 2006); and how politeness work differs between individuals communi-
cating in their native language and in a second language (Biesenbach-Lucas 2005,
2007; Chen 2001, 2006). Studies of politeness in email have also drawn attention
to different first language/cultural backgrounds of the interlocutors (Biesenbach-
Lucas and Weasenforth 2000; Murphy and Levy 2006). Other studies have targeted
reactions to messages that are perceived as more polite or less polite (Duthler
2006; Jessmer and Anderson 2001). Still others discuss gender differences in how
politeness is performed (Boneva, Kraut, and Frohlich 2001; Herring 1994; Oliveira
2007), with “email” broadly defined to include postings to asynchronous message
forums as well as one-to-one communication. While impressive, this body of re-
search on politeness in email communication has tended to leave the actual situ-
ation out of substantial consideration by not examining email interaction in close
relation to the external contexts in which it occurs.
Studies based on more situationally grounded analysis do exist, however. For
example, Skovholt (2009) examined how leadership was linguistically accom-
plished in a Norwegian distributed work group in the leader’s day-to-day email in-
teraction. The study showed how the leader invited group identification by giving
the group positively loaded nicknames, using different kind of narrating devices,
and providing receipts and supportive acknowledgments. Waldvogel (2007)
studied a manufacturing plant and found that use of greetings and closings in email
messages reflected and constructed open and positive relationships between staff
and management and a direct, friendly, and familial workplace culture. In these
studies, rhetorical and politeness strategies were found to play an important role in
constructing workplace familarity. These strategies were not explicitly related to
the concept of small talk, however. Moreover, although relational content in CMC
has been studied in relation to issues of media choice (e.g, Johnson et al. 2008; Utz
2007) and self-disclosure (e.g, Joinson 2001; McKenna, Green, and Gleason 2002)
in the context of maintaining and creating friendships, such research has not made
an explicit link to small talk. Such a link is needed, in that small talk can facilitate
understanding of how a positive climate is created under varying contextual con-
ditions. Small talk is used here with linguistic politeness theory as an interpretative
platform, with the aim to deepen such an understanding.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
616 Amelie Hössjer

3. Politeness theory and some basic conditions for the analysis

3.1. Politeness theory

Linguistic politeness theory emerged as part of the growing field of pragmatics in


the 1970s. The theory achieved its definitive breakthrough with the publication of
Penelope Brown and Stephen Levinson’s Politeness: Some Universals in Lan-
guage Use ([1978] 1987). The extensive research now available on politeness
comprises divergent perspectives on the concept and its empirical applications (for
overviews, see Bargiela-Chiappini 2003; Eelen 2001; Goldsmith 2006; Watts
2003; Watts, Ide, and Ehlich 2005, cf. also Fraser 1990). Central to Brown and
Levinson’s (1987) model is the notion of social face, an emotional investment that
can be sustained, lost, or strengthened and that requires continuous maintenance
in ongoing interaction. Social face has two aspects: the wish of the individual to
assert his or her own territory (negative face) and the wish to be approved in certain
respects (positive face).
According to Brown and Levinson, rational actors seek to avoid whatever
might threaten the social face of their interlocutor, or so-called face-threatening
acts (FTAs). FTAs include acts of criticizing, interrupting, asking a favor, and re-
questing information. These potentially face-threatening utterances can be miti-
gated in various ways through the use of two types of so-called politeness strat-
egies. Individuals may actively draw attention to their interlocutor, using forms of
address, pleas, compliments, and such types of acts, or they may pull back, thus
granting their interlocutor scope and freedom. The former strategy is positive pol-
iteness, the latter negative politeness.
While Brown and Levinson’s model has been highly influential, it has also
been criticized. The chief objections are that the model is constructed around iso-
lated speech acts and that the authors ignore the wider linguistic context. Politeness
strategies in which speakers use various means to manage the social conversational
climate tend to be interpreted in universal terms regarding what the intention was
behind one utterance or another, with the focus on the speaker (Eelen 2001). It has
been claimed that it is difficult for an outside observer to know what lies behind
what is said or written on the basis of the acts that various utterances represent in
isolated conversations (Schegloff 1988) or, as here, in email discourse (cf. Murphy
and Levy 2006). It has been alleged that it is difficult even for the individuals in-
volved to specify their exact motives for what was said (Mills 2003: 45).
Various researchers have pointed to the crucial importance of context for the
interpretation of pragmatic meaning (Fukushima 2004; Matsumoto 1988; Terkour-
afi 2001). Several scholars have also advocated a more sophisticated conceptual-
ization of face in cultural settings (Gu 1990; Hatipoğlu 2007; Hernández-Flores
2004; Hongladarom and Hongladarom 2005; de Kadt 1998) that takes into account
contextual parameters such as gender, genre, position of the interlocutors, profes-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 617

sional identities, and the purpose and type of medium in which the interaction is
carried out (Danet and Herring 2003; Herring 2007). Politeness is described as “re-
lational work” (Holmes and Schnurr 2005) – a relational practice (Fletcher 1999)
that creates a special logical, interactive, context-bound efficiency that finds its
meaning in the social commonality in which the interaction takes place (for over-
views, see Bargiela-Chiappini and Harris 2006; Eelen 2001; Holmes and Schnurr
2005). What needs to be further specified, though, is how such commonalities are
related to the use of various media – an important reality in everyday work life in
modern societies – and how this usage is connected to the flow of interaction of
which email messages form a part. This is addressed in this chapter. First, however,
the following section explains the relationship between small talk and the concept
of politeness.

3.2. Basic assumptions underlying the analysis: Small talk, politeness,


and communities of practice
The account developed in this chapter is based on an approach that situates polite-
ness across a broad spectrum of social behaviors. These behaviors include small
talk as a form of linguistic politeness (Hermández-Flores 2004). Small talk is con-
sidered to be an example of positively polite talk that is not necessarily tied to
FTAs (Hernández-Flores 2004; Holmes 2000; Koutlaki 2002; Mullany 2006).
Rather, small talk involves more generally face-boosting acts through which indi-
viduals build solidarity and establish a positive attitude by commenting on social
content, sharing anecdotes, etc.
Applying a view based on behaviors observed in a group’s interaction rather
than on the intentions of the interlocutors, Bayraktaroğlu (1991: 15) writes of two
types of acts affecting face value. The first type is FTAs, whose definition Bayrak-
taroğlu borrows from Brown and Levinson (1987). The second is face-boosting
acts, or FBAs, by which is meant acts that satisfy rather than threaten the face
wants of the addressee and that are related to negative and positive politeness, as
described above.
In connection with the concepts of small talk and FBAs, I distinguish two types
of small talk. First there is small talk functioning as general FBAs that are not tied
to FTAs. People make self-references and describe the little annoyances of the day,
telling jokes, etc., thereby establishing a generally positive attitude in a situation.
Second, there is small talk in which such descriptions have a closer connection
with FTAs, for example, functioning as excuses that mitigate FTAs. In explaining
why something has not been done, for example, such stories act as justifications
that boost the addressee’s face in a situation tied to an FTA. The analysis presented
in this chapter is based on these two forms of politeness.
A basic concern in the study is the relationship of politeness to the communal-
ity in which email communication is realized. The interaction is seen as a joint con-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
618 Amelie Hössjer

struction formed by the turns the correspondents produce in the ongoing exchange
of messages, where the meaning of various language acts (including general FBAs
and mitigating FBAs) is interpreted based on the definitions that the involved par-
ties ascribe to them through their behavior. This behavior is seen as something so-
cially shared in relation to the context the group represents and the norms devel-
oped there for what is acceptable communicative behavior, rather than simply as
the product of individual interlocutors (Mills 2002: 69). On this basis I use the con-
cept of “community of practice”, defined as “an aggregate of people who come to-
gether around mutual engagement in an endeavour” (Eckert and McConell-Ginet
1992: 464). Politeness is seen “as a set of practices or strategies which commu-
nities of practice develop, affirm, and contest” (Mills 2003: 9), and such commu-
nities have their own norms for what constitutes politeness (Mullany 2006).
I distinguish two basic conditions for how interaction within communities of
practice is connected to the external context. On the one hand, there are physically-
based communities of practice, where the interlocutors share an external physical
setting. The members may be co-located in the same building and may actively
choose among various communication alternatives, such as face-to-face interac-
tion, email, and SMS. Norms (including politeness norms) will potentially be elab-
orated for use of a certain communication alternative as opposed to another, based
on the socially-shared meanings ascribed to the two alternatives (cf. Kim, Kim,
Park, and Rice 2007; Murray 1988). On the other hand, there are digitally-based
communities of practice, where the interlocutors are geographically remote. That
which in a physically-based community of practice may be communicated through
various media will in a digitally-based community of practice typically (although
not necessarily) be realized through one medium: email, a chat room, etc. Norms
(including politeness norms) will develop through dealing with various content
within that single medium, and certain strategies will be used in order to further
common undertakings.
Using these concepts (physically-based community of practice and digitally-
based community of practice) entails two consequences for the analysis. First, the
focus is on understanding the use of politeness in each analyzed setting in relation
to the external conditions surrounding the use of email. In providing contextual in-
formation, I distinguish not only what kinds of content, genres, and exchange pat-
terns are used in messages from different interlocutors but, more fundamentally,
how these patterns relate to the occurrence of communication face-to-face and via
other media during the ongoing email interaction. Second, the study concentrates
on broad structures in the groups studied, rather than on individual differences be-
tween particular correspondents. The overarching issues of interest are to what ex-
tent small talk is employed, where this kind of discourse appears in the messages,
and how it relates to complications that risk threatening the addressee’s face – in
other words, how small talk is used independent of and in connection with FTAs, as
general FBAs and mitigating FBAs.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 619

From this perspective I compare email messages from a physically-based com-


munity of practice and a digitally-based community of practice, even though there
are certain differences between them in the study design and conditions tied to edi-
torial production. Nevertheless, the orientation of the email messages in the differ-
ent communities of practice toward work, including discussions about the same
kinds of subjects, the messages’ connection with similar activities (editorial work,
production of news texts), similar time frames (time pressure, albeit for different
reasons), and the actors’ similar types of relationships (co-workers) means that im-
portant parallels obtain regarding work processes, making the character of the
messages concerning social face work in the two settings interesting to compare.
Studies that have been done on the significance of the work environment for edi-
torial work also support the view that differences in time frames count more than
those tied to newspaper products per se (newspaper content, degree of specializ-
ation, distribution across larger or smaller regions) as regards the types of collab-
oration and interaction that arise in editorial office settings (Löfgren Nilsson 1999;
Oestreicher 2000).

4. Data and method

The case study is based on two corpora. The primary focus is on a corpus from the
digitally-based community of practice: a Swedish print journal where most of the
work is carried out via email. The second corpus is from the physically-based com-
munity of practice, a larger Swedish print newspaper office. Each of these is de-
scribed further below.

4.1. Digitally-based corpus


The digitally-based community of practice is a Swedish print journal that publishes
about 35 issues per year. Its basic content deals with matters related to the cultural
and ethical sector, containing essays, reviews, debates, and news articles in this do-
main. It is distributed all over Sweden, with a circulation of approximately 2,000.1
The editors, board, and various associates are researchers and journalists situ-
ated in different parts of Sweden. They form a digital network that is maintained
alongside regular day jobs in the members’ respective professions, which creates
palpable time pressure in this work. The editorial core consists of two editors and
an editorial secretary, all of whom are situated in central Sweden. Besides this nu-
cleus, there is a more widespread editorial group of seven people who contribute
ideas and material. Further, there is a board consisting of another 10 members (also
widespread), who normally do not actively contribute manuscripts for publication,
as well as a staff of associates (20 members) who submit copy fairly regularly. In
addition, various writers (40) are temporarily commissioned to produce texts. In-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
620 Amelie Hössjer

dividual editors and the board occasionally arrange face-to-face meetings, and they
make phone calls with some regularity, alongside their email communication.
However, most contacts are by email. Not part of the network are external senders
(companies, etc.) that sometimes circulate information for the journal to the edi-
tor-in-chief.
For this journal, a corpus of 3,200 messages from the editor-in-chief’s email-
box was selected in order to obtain a rich picture of the communication within the
digitally-based community of practice. According to the editor-in-chief, her role
involved the most differentiated communication in the community of practice, in-
cluding both a wide range (in genres and in content) of emails and interaction with
different writers. The email messages were written over a three-year period
(2002–2005) by individuals in the community of practice, where the writers repre-
sent the work categories mentioned above and where the data comprise all mess-
ages that were sent and received during the period through the chief’s email pro-
gram (Eudora). Table 1 gives a breakdown of the correspondence between the
editor-in-chief and different groups of writers. Most of these messages were sent
from one individual to another (n=2176), but a significant portion were also sent as
group messages or were sent to a reciever and cc’ed simultaneously to the editor-
in-chief for her information (n=1024).

Table 1. Communication in the editor-in-chief’s emailbox

Category of writers, Numbers of Messages Messages Total


other than the writers in the received by sent by messages
chief category, other the chief the chief
than the chief
Editorial core 2 598 368 966
Editorial group 7 299 269 568
Board members 10 256 164 420
Staff members 20 195 379 574
Various writers 40 273 303 576
External senders not 51 73 23 96
associated w/ the
digitally-based com-
munity of practice
Total 130 1694 1506 3200

Information about the messages was classified by genre, content, exchange pat-
terns (one-to-many vs. “interactive” messages), when in a sequence a certain email
appears, and between which actors (in terms of their role in the office hierarchy)
the email was exchanged. Every email was also reviewed for the occurrence and

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 621

type of small talk in relation to general FBAs and mitigating FBAs. These data
were supplemented by four interviews with the editor-in-chief about the settings
for various types of messages and the network’s work routines. The focus in the
analysis is not on quantifying instances in these data but on demonstrating what
some of the frequent types of politeness strategies in the data look like that occur
throughout the period studied.

4.2. Physically-based corpus


The second corpus is based on data from the physically-based community of prac-
tice, a considerably larger newspaper office that publishes six editions per week,
meaning that it is a time-critical Swedish news environment with short throughput
times for various kinds of information. The newspaper has a circulation of about
170,000 and employs a total of 300 individuals (journalists, administrators), count-
ing both full-time and part-time staffers. Of these, 130 journalists are connected to
the news offices (the main office and eight local offices). From this context a cor-
pus of email messages (n=400) was analyzed. To get an overall picture of the flow
of different types of messages at the news office, all incoming and outgoing mess-
ages were collected during one week in 2002 from the mailbox of one of the news
office’s two chief news editors (n=284), who had a central role in the organization,
involving diversified communication (both different types of messages and differ-
ent kind of contacts); this editor is hereafter referred to as the CNE (or by the fic-
titious name assigned to him in this research, Anders). To get a more varied picture
of the communication, selected messages from the CNE’s mailbox were also ga-
thered from 2001 to 2004 (n=116). All the messages were collected as part of a
larger ethnographic study (Hössjer 2002, 2006; Hössjer and Severinson Eklundh
2005, 2009) that also included data from observations and interviews with various
office employees (a total of 19 individuals) over a three-year period (2001–2004).
Thus the email corpus was one of several components of data collected that also in-
cluded interaction by phone and face-to-face. This meant that the content and in-
teraction in the messages could be juxtaposed with interaction in other modalities.
The messages were analyzed using the same categories as for the digitally-based
community of practice. Interviews about the messages were carried out with the
CNE to gather information about the situations surrounding particular email ex-
changes.

5. Email usage in the two work contexts

The following data presentation starts with a characterization of the email interac-
tion in the physically-based community of practice, a context in which alternatives
to email are available. This is followed by a discussion of what happens to elec-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
622 Amelie Hössjer

tronic exchanges in the digitally-based community of practice, where email inter-


action is the primary mode of communication. All names occurring in quoted text
from both contexts are pseudonyms assigned by the researcher. The translation of
the examples from Swedish into English is idiomatic, rather than literal.

5.1. Email use and the physically-based community of practice


In the large newspaper office, delicate subjects, negative criticism, and compre-
hensive discussions are saved for phone and direct communication between those
involved, as are various forms of small talk – chitchat designed to lubricate social
relationships (Hössjer 2002, 2006). Email is used only to send information and to
ask and answer simple questions. This pattern seems to accord relatively well with
what was predicted by Daft and Lengel’s (1984) model regarding email as a lean
medium (but see section 5.2). The great majority of messages involve one-to-many
dissemination of information; that is, messages are sent to multiple recipients sim-
ultaneously in one direction, with no replies expected. The emails deal with pros-
pective news stories, planning and documentation of ongoing activities, and at-
tachments of documents. These are strictly formalized text types and genres with
parallels to what Kankaanranta (2005: 349) subsumes under comprehensive head-
ings like “noticeboard” and “postman” genres: The messages typically have little
or no text, and they attach documents and messages with a strict format, such as an
agenda or a press release.
Only a small number of messages are interactive, in the sense that they ex-
pressly request a reaction from the recipient or themselves constitute a reaction to
something previously written. Questions and answers occur, as do suggestions, re-
quests, work directives, and comments, but always in short email exchanges with
terse formulations and messages in which the main pattern is a simple question that
gets a simple reply. This pattern is in line with what Zack (1993) observed at a
news office, where the majority of email conversations analyzed represented what
he called “alternating dialogs”: dialogs in the prototypical form of a simple ques-
tion that is followed by a short answer, in contrast to the more elaborated, interac-
tive conversations that are typically maintained face-to-face. Similar to the struc-
tures observed by Zack, the messages in my data (not counting greetings and
concluding signatures) are virtually free of small talk containing references to the
email-writer’s personal relationships at work or in private life.
In the email sequence reproduced in example 1, the exchange between a re-
porter (Håkan in message 1) and the CNE (chief news editor Anders in message 2)
is about planning where and when an article can be published. The reporter
sketches two possibilities for dealing with the issue and makes it fairly easy for the
CNE to respond in writing without having to craft a detailed answer. The dialogue
is generated with passages showing that the interlocutors have a tacit knowledge of
the subject through the use of phrases (such as “The pregnant fish”) and abbrevi-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 623

ations without explanations. The phrase “The pregnant fish” in the message is the
title of the article in question in the messages.

(1) Exchange between reporter and chief news editor (CNE)


Message 1
Hi,
[…]
The pregnant fish, which has been lying her [sic: error in original message] so
long, has to be printed tomorrow if we want to keep the phrase “the latest issue
of the medical journal BMJ” in the intro – but maybe it would be better to put
the whole thing on Monday’s research page? If you think so, I can negotiate it
with sune b.
[…]
Håkan
Message 2
Yes,
The research page is a good idea. I’ve had a hard time putting together a medi-
cal or research page this week.
Anders

In example 2 below, a sequence of four messages, the exchange is between the


two chief news editors. Anders is sitting at the news desk – the central place for
leading the news work in the open office – and his colleague is in a room for more
long-term planning in an adjacent corridor for reporters. The initial contact from
the colleague (Ella in message 1) is an idea about how the newspaper should cover
International Women’s Day, which is just over a week away. The heading “Hello”
in the message refers to a particular feature with short interview questions that
recurs with some regularity in the newspaper.

(2) Exchange between chief news editors


Message 1
What do we say to giving somewhat more scope for special copy on Inter-
national Women’s Day in the Friday, March 8 edition? Vera is working with
matriarchy research, gender equality in society as an idea and that sort of thing,
plus we could add some other odds and ends. I have a Hello for instance. And
maybe a column.
Ella

A suggestion is sketched in the message and is backed up by the description of


an assignment for a reporter who has been working on the subject. According to
Anders in the interviews carried out in the study, the proposal deals with how the

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
624 Amelie Hössjer

reporter’s work can be combined with other journalistic efforts. It is followed by a


message from Anders (message 2) in which he launches another alternative. At this
point the dialog is at a stage equivalent to that in message 1 in example 1 – that is,
with two possible ways of dealing with the problem at hand. Unlike example 1,
however, example 2 has two complex alternatives, which are difficult to continue
to deal with via email.
Message 2
We could either do that or we could have the day pervade different sections.
One interesting idea would be to point out in many contexts whether men or
women are in focus. In some cases you would have to use footnotes.
Anders

Message 2 is followed by a confirmation (OK) from Ella (message 3) that the


issue is undecided and that there are two alternatives that need to be weighed
against each other in an oral discussion.
Message 3
OK, let’s talk about it. /E

Ella’s suggestion in message 3 is followed up by Anders in a further message


(message 4). Anders indicates that his idea may be hard to carry out and presents
the opportunities they will have to discuss the matter orally during the day. The ex-
change starts in email, but switches to an oral dialog when it starts to become too
complex to be decided in the email mode.
Message 4
My idea is probably hard to carry out. Maybe we could do it on a smaller scale,
some news page or something.
Vera is emailing her text to the chief news editors and the chief photo editor.
She is working from home – monthly meeting at 11 and Cupola meeting are
pumping up the pressure for me today.

This example illustrates an evident reality in this physical workplace. Email is re-
served for circulating information and for simple, tersely formulated exchanges in
which small talk is not included.
A functional divide exists at the office among various communication options
according to how the individuals involved view the communication at hand and the
ways in which the external setting socially frames various work issues. Oral face-
to-face conversation is a site for small talk in corridors; at coffee-makers, desks,
and faxing machines; for discussing more complex issues; and for airing sensitive
issues – matters about which an addressee can be expected to have a different
opinion or be angered or saddened (Hössjer 2002, 2006). Telephone is the pre-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 625

ferred medium for questions requiring a quick response or guaranteed feedback,


whereas email is preferred for circulating information and for simple, tersely for-
mulated exchanges in which small talk is not included. The employment of email
in this sense has a well-established external frame of reference that contributes to
common ground, making it possible to exclude small talk. The choice of communi-
cation channel in this respect also provides information on how the subject matter
in question is perceived by the workers (Hössjer 2002: 53).
How each communication option is used in the physically-based community of
practice is summarized below:
a) email: non-problematic issue and/or routine issue
b) telephone: questions requiring quick response and guaranteed feedback
c) oral interaction: social framing, delicate subject, or complex issue

5.2. Email use and the digitally-based community of practice


The flow of messages in the digitally-based community of practice editor-in-
chief’s emailbox (Table 1) partly accords with the uses of email in the physical
news office environment. The messages contain information, attach documents,
and take up routine matters and uncomplicated issues. They also include questions,
answers, requests, work directives, and comments. Such issues are dealt with in
1,088 messages, 34 % of the total of 3,200. Beyond this kind of usage, there are
spheres of practice that are exclusive to the digitally-based community of practice.
Writers offer criticism, discuss complex issues, and carry on full-scale discussions,
actions which in the physically-based community of practice are carried out face-
to-face. A total of 2,016 messages – 63 % – are of this latter type. The remaining
3 % come from senders outside the network: publishers, computer companies, or
private contacts that fall outside the activities of the journal. A prominent pattern
apart from these data (and in contrast to the physically-based community of prac-
tice) is that most of the messages (82 %) are part of interactive exchanges; that is,
they expressly request a reaction from the recipient or themselves constitute a reac-
tion to something previously written.
As noted above, explicit small talk is uncommon in email messages sent in the
physically-based community of practice. Such strategies tend to be reserved for
face-to-face interaction (Hössjer 2002, 2006). The situation is different in the di-
gitally-based community of practice. Several emails contain small talk (general
FBAs and mitigating FBAs), not counting phrases of greeting. There are self-ref-
erences and descriptions of the little annoyances of the day. Such passages most
commonly occur in interactive message exchanges.
In example 3, the editor-in-chief (Carin) sends the lines below – a moderately
elaborated story about an injured foot and its consequences – as a reply to an earlier
message (Christmas greeting) from the chairman of the board of the journal.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
626 Amelie Hössjer

(3) Exchange between editor-in-chief and chairman of the board of the journal
Hi!
Thanks for the greetings. Yes, Christmas always keeps you running in circles.
What’s more, I fell and hurt my foot and I’m having a hard time walking.
There’s hope I’ll survive, but it sure complicates life. Hard to walk down the
church aisle with any dignity on Christmas morning, for instance!
Best wishes
Carin

It would be possible to see this type of everyday anecdote as evidence that the pub-
lishing frequency of this office is lower than at the news office, and thus that there
is more scope for social digression. It should be borne in mind, however, that this
exchange takes place alongside day jobs and that the overall work situation for
everyone concerned is packed to the breaking point, as is commented on in various
messages. Given this, a more reasonable interpretation might be that chatting about
health functions as a way of maintaining social continuity. This type of social fram-
ing creates a common ground that the associates can share. There are sometimes
long time intervals (days, weeks) between certain messages. After these long in-
tervals, small talk could be seen as a way of re-establishing a context that might be
somewhat remote in the participants’ memories, when inserted quotations are not
sufficient to maintain the flow. However, this situation is not the case for the vast
majority of messages, which are sent in the course of one or two days.
What is provided in the vast majority of messages with small talk is an invoked
social space of external events and impressions that can be “seen” and referred to: a
shared external social context that helps frame the ongoing work. There are clear
similarities here with the type of small talk that occurs at the news office in face-
to-face conversations (Hössjer 2006) and that various studies have shown to play a
key role in the sense of community that emerges in a workgroup when individuals
take time to listen and react empathically to non-work-related information (cf. Eelen
2001; Fletcher 1999; Holmes and Schnurr 2005; Mills 2003; Watts 1992, 2003;
Wierzbicka 1999). In this sense, the digitally-based community of practice can be
described as a group created over time by the sustained pursuit of a shared enterprise
and a shared repertoire of ways of doing things (cf. Eckert and McConell-Ginet
1992; Wenger 1999). A sense of community is created within the framework of
shared work and routines. However, a key difference from a work community that
has the form of a physically-based community of practice (e.g., the news office) is
that the creation of commonality in the digitally-based community of practice oc-
curs through more varied kinds of email content that includes small talk. In this di-
gitally-based community, small talk in messages makes the job tolerable by creating
an atmosphere in which monotonous job practices are woven together with stories,
events, dramas, and the rhythms of common life (Wenger 1999: 46).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 627

The occurrence of this kind of social reference in the messages varies de-
pending to some extent on the nature of the matter at hand, who is writing, and
who is receiving. However, two basic situations emerge in how such references
are made that relate to two different conditions for the editorial work. This can be
seen across various genres of communication (e.g., work directives, requests, dis-
cussions of manuscripts, planning of new journal issues) and with interlocutors in
different positions.
The first condition is that messages are produced with the expectation that
duties are being carried out as prescribed by routines. This condition tends to in-
volve messages aiming to provide information, come up with a suggestion, and/or
plan simple things. In such messages, the referencing of a social context takes the
character of “framing” – linking the work context to another, non-work frame
(Goffman 1974, 1981; Tannen 1993, 2007), in more-or-less independent passages.
Small talk introduces or concludes messages, and it does not tie in directly with the
information provided or requested, beyond contextualizing it in a general social
exchange (i.e., it is a general FBA). Such comments might take the form of an
initial/concluding remark, a postscript occurring as a relatively freestanding inser-
tion at the end of a message, or as a single off-topic message within a larger
sequence of mails devoted to work. The latter is the case in example 3, in which
Carin replies to a greeting from the chairman. His greeting was a freestanding
insertion at the end of a message (“Hope you’ll have a healthy and peaceful Christ-
mas”), the rest of the text being devoted to routine economic planning. Carin’s
reply to his greeting (“Hi!”) is followed by the narrative in example 3. In subse-
quent messages, after a short reaction from the chairman in the beginning of the
following message, the interaction returns to the work topic (economic planning)
given in the subject heading of the thread.
The second condition under which a social frame is built up around the edi-
torial work involves complications or uncertainty in the work situation that may
risk threatening the addressee’s social face, and it constitutes a noticeable depar-
ture from the regular rhythm of work. In messages sent under this condition there is
a closer connection between the framed contexts than in example 3. Small talk
serves as explanation or excuse for why certain outcomes cannot be realized or
have not been done so far (this being an FTA). Face in the situation is boosted by
writers giving reasonable justification for this shortcoming (i.e., such acts are miti-
gating FBAs).
In example 4, the social framing functions in this way. The message is about
coordinating calendars ahead of a meeting, and the writer (chairman of the board)
starts by saying that he will be busy during a certain week (work-related context),
thereby hinting that an arrangement for meeting this special week (as earlier pro-
posed by Carin) will not be possible (this statement from the chairman is an FTA).
This is followed by the reason that will be keeping him busy (social context, a
mitigating FBA), which then leads to further discussion about coordinating work

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
628 Amelie Hössjer

(work-related content, other mitigating FBAs). The overall effect of this framing
of work passages in a social context is to help explain why the writer cannot make
it to a meeting next week. The writer treats the addressee’s request for meeting as
important and thus mitigates the FTA, while boosting the addressee’s face by
using small talk as a mitigating FBA.
(4) Exchange between editor-in-chief and chairman of the board of the journal
During the week Aug. 11–17 I’ll be busy. We’re going to be looking after our
oldest grandchildren that week. The family is moving into their new house in
Helsingborg.
I can make it during the week starting Aug. 18 though. How does that week
look for you?
I’d be grateful for a reply.
Yours
Bo

A similar – albeit more pronounced – alternation between different contexts is


seen in example 5. This email was preceded by a reminder from the editor-in-chief
(Carin) of a deadline that was approaching. The reply proceeds in a sequence of
different acts: apology, explanation, information about attached text material, re-
quest, wishing the best, praise, and joke – each of these (after the initial work-
oriented ones) relating to various social contexts: the social well-being of the ad-
dressee, the writer’s reading habits, and the life of a legendary mayor. After touch-
ing on the reason for the delay and commenting on the attached manuscript, the
writer moves from one social act to another. New acts are introduced – chained –
with the effect that the initial problem (the delay) is counterbalanced inter alia with
social acts (relating to different social contexts). No previous delay in work is evi-
dent from this writer in the data, and the alternation between contexts in combi-
nation with the approaching deadline therefore can be interpreted as more articu-
lated face work than in example 4. The delay for this individual writer (as opposed
to others in the email corpus) thus here represents a noticeable departure from the
regular rhythm of work.
(5) Exchange between editor-in-chief and article author
I’m sorry about the long delay in sending my article, but there are reasons. At
any rate, here it comes – we’ll see if there are any reactions. The last word
should be “impertinences”, and it was saved in WORD. Could you let me know
whether the transfer was successful?
Hope all is otherwise well with you and you others on the editorial staff. It’s al-
ways a delight to read the journal every week. It’s maintaining its quality des-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 629

pite its advanced age. When the legendary mayor of Sigtuna Gustav ( ? ) Dahl
was interviewed ahead of his 100th birthday and asked how was doing, he
answered: “At my age you feel fine, otherwise you wouldn’t be there to talk
about it.”
Yours
Jörgen

In example 5, the FTA entailed by the delay of the article is followed by six pas-
sages that can all more or less be regarded as mitigating FBAs. These FBAs in-
clude an apology for the delay (“I’m sorry …”), an explanation of a general but
non-specified reason for it (“but there are reasons”) in connection with the delivery
of the delayed material (“The last word should be …”), and a request for confirma-
tion that the message has reached the addressee (“Could you let me know …”).
This request can be interpreted both as an FTA, because of the extra work the con-
firmation might cause the addressee, and as an FBA, because of the importance that
the writer is giving the matter in asking for the confirmation. The request is fol-
lowed by a wish for well-being (“Hope all is otherwise well …”, invoking a social
context) and an instance of praise (“It is always a pleasure …”, another social con-
text) in connection with a joke (“At my age you feel fine …”, yet another social
context). All of these FBAs are in different ways directed toward the addressee
(editor Carin and her work with the journal). The first FBAs relate to work,
whereas the latter ones relate to various social contexts. Social harmony is thus re-
established (as confirmed by a subsequent message containing another joke from
Carin), following the initial FTA (the delay), in progressive steps through chaining
of mitigating FBAs by the writer (Jörgen).
The three latter passages in this message can be seen as indirectly enhancing
the writer’s (Jörgen’s) face, as well. Praising and showing an interest in other
people – their deeds and expressions – as Jörgen is doing here is often perceived as
a positive trait in social contacts. This evidence of the co-existence of more and
less direct levels provides a glimpse of the complexity of face management carried
out through the messages.
The framing and chaining evident in these messages is not unique to this com-
munity of practice, nor is the implicitness in the face work that can be seen here.
Substantial research describes how such politeness strategies are used in various
types of (oral) institutional conversations: university tutorials, nurse/doctor-patient
dialogs, midwife dialogs, and operator calls (Benwell and Stokoe 2002; Bergmann
1992; Linell and Bredmar 1996; McEnery, Baker, and Cheepen 2002; Spiers
1998). This previous body of research points out, in addition to indirectness, the
use of strategies such as avoidance and the invoking of routines and external cir-
cumstances in averting interpersonal conflicts. The strategies also evince a similar
orientation in the social interaction that occurs among colleagues at various work-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
630 Amelie Hössjer

places – toward favoring a constructive climate for cooperation and the successful
execution of work (e.g., Eelen 2001; Mills 2003; Watts 1992, 2003; Wierzbicka
1999).
In the digitally-based community of practice, as compared to the physically-
based community of practice, the interaction in email messages can be seen as an
adaptation to an external situation in which the writers have no physical contact
and no clear channel for immediate feedback. Special strategies (framing and
chaining) are mustered in the community to protect social face through linguistic
expressions the email writers jointly contribute that do not occur in messages
within the physically-based community of practice. These strategies dynamically
interact with how sensitive the situation is, whether or not it involves compli-
cations that may risk threatening the recipient’s face. The lack of physical periph-
eral information seems to invoke a kind of chronic cautiousness, which interacts
with attempts to establish a shared social frame to compensate for the lack of in-
terpretive cues in the communicative situation. In the physically-based community
of practice, where such a frame exists, these strategies can be excluded from email
messages without threatening the exchange. The use of small talk as a politeness
strategy is thus highly context-bound and related to practices within the commu-
nities of practice. As highlighted in previous research on politeness, it is clear that
the characterization of email as a lean medium is over-simplified; email is ex-
ploited in different ways in different situations within the communities studied
here. Moreover, individuals in the digitally-based community of practice use small
talk as a more dynamic adapted strategy in relation to the external context (small
talk as general FBAs or mitigating FBAs) than has been discussed in the previous
email politeness literature.

6. Conclusion

This chapter discussed the professional use of email at a Swedish print journal
where most of the work is carried out via email. This represents a work situation of
broad relevance in modern life, where it is common for professionals to make use
of CMC as a virtual meeting place. This situation was compared with email com-
munication taking place at a Swedish news office where the workers share a physi-
cal context.
This comparison showed that politeness is a situationally-adapted strategy that
is influenced by the external conditions that hold for email communication within a
community of practice. Interlocutors seem to adapt their politeness behavior to the
external situation. Small talk plays an important role in these professional contexts.
In the physically-based community of practice, small talk is left out of email mess-
ages and carried out face-to-face. In the digitally-based community of practice,
small talk tends to take the form of independent passages when the workflow fol-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 631

lows prescribed routines (general FBAs). In cases of a departure from the regular
rhythm in the work – complications or uncertainty in the situation that may risk
threatening the recipient’s social face – small talk more often takes the form of
mitigating FBAs to mitigate the face threat.
These findings point to a need for a situated view of politeness in email com-
munication in relation to various external conditions, e.g., in workplace environ-
ments. They also suggest a need for more elaborated concepts in politeness theory
in line with those demonstrated here using the concept of community of practice.
Such elaborated concepts ought to take into account the dynamics of individuals’
politeness strategies in different work formations (e.g., according to size and his-
tory, including short term groups), in relation to changing working conditions in
actual situations (e.g., more-or-less routine work in connection with more-or-less
time-critical work conditions), and in connection with individuals’ use of various
modes of CMC. The findings of the study presented in this chapter indicate that
different expectations are in place regarding what constitutes polite behavior in
connection with the use of email within the different communities of practice.
These expectations include, on the one hand, the role the medium as such plays in
relation to other media vis-à-vis what type of communication it is used for. On the
other hand, they include the type of politeness (normatively) associated with the
medium in actual situations, which functions to accomplish this communication in
an efficient manner.
From this perspective, research in different contexts might be extended to ad-
dress how the flow of work issues and small talk are woven into the dynamics of
turn-taking mechanisms in the process of encouraging a sense of togetherness and
successful execution of work. In physically-based communities of practice, this
may include questions about how interaction is forwarded when starting in one
medium and moving into another when dealing with more or less problematic and
time-critical matters. In digitally-based communities of practice, such questions
may be connected with the use of synchronous and asynchronous media: Strategies
such as framing and chaining may undergo media adaptation in relation to ongoing
work.

Acknowledgements

I am grateful to Jonas Carlquist, Else Nygren, and Kerstin Severinson Eklundh for
valuable comments on previous versions of the manuscript, and to Donald Mac-
Queen for help with translating and improving the language.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
632 Amelie Hössjer

Note

1. For the sake of anonymity, the operational sphere of this journal is not revealed in this
chapter. In cases where the content of individual emails describes phenomena that would
make it possible to identify the journal, this content has been replaced by a more general
equivalent. The use of fictitious pseudonyms to preserve anonymity also applies to the
news office material.

References

Abdullah, Nor Azni


2006 Constructing business email messages: A model of writers’s choice. ESP Ma-
laysia 12: 53–63.
Baldauf, Ken and Ralph M. Stair
2008 Succeeding with Technology: Computer System Concepts for Real Life, 3rd Ed.
Boston, MA: Thomson Course Technology.
Bargiela-Chiappini, Francesca
2003 Face and politeness: New (insights) for (old concepts). Journal of Pragmatics
35(10–11): 1453–1469.
Bargiela-Chiappini, Francesca and Sandra Harris
2006 Politeness at work: Issues and challenges. Journal of Politeness Research:
Language, Behaviour, Culture 2(1): 7–33.
Bayraktaroğlu, Arin
1991 Politeness and interactional balance. Interactional Journal of the Sociology of
Language 92: 5–34.
Benwell, Bethan and Elizabeth H. Stokoe
2002 Constructing discussion tasks in university tutorials: Shifting dynamics and
identities. Discourse Studies 4(4): 429–453.
Bergmann, Jörg R.
1992 Veiled morality: Notes on discretion in psychiatry. In: Paul Drew and John
Heritage (eds.), Talk at Work, 137–162. Cambridge, UK: Cambridge Univer-
sity Press.
Biesenbach-Lucas, Sigrun
2005 Communication topics and strategies in email consultation: Comparison be-
tween American and international university students. Language Learning &
Technology 9(2): 24–46.
Biesenbach-Lucas, Sigrun
2007 Students writing emails to faculty: An explanation of e-politeness among
native and non-native speakers of English. Language Learning & Technology:
59–81. http://llt.msu.edu/vol11num2/biesenbachlucas/default.html
Biesenbach-Lucas, Sigrun and Donald Weasenforth
2000 “Please help me”: L1/L2 variations in solicitations in electronic conferences.
Paper presented at the 20th Annual Second Language Research Forum
(SLRF), Madison, WI, September 7-10..

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 633

Boneva, Bonka, Robert Kraut, and David Frohlich


2001 Using e-mail for personal relationships: The difference gender makes. Ameri-
can Behavioral Scientist 45(3): 530–549. Special issue on The Internet and
Everyday Life, Caroline Haythornthwaite, ed.
Brown, Penelope and Stephen Levinson
[1978] Politeness: Some Universals in Language Usage. Cambridge, UK: Cambridge
1987 University Press.
Bunz, Ulla and Scott W. Campbell
2004 Politeness accommodation in electronic mail. Communication Research Re-
ports 21(1): 11–25.
Chen, Chi-Fen E.
2001 Making e-mail requests to professors: Taiwanese vs. American students. Paper
presented at the Annual Meeting of the American Association for Applied Lin-
guistics, St-Louis, MO, February 27-27. (ERIC Document Reproduction Ser-
vice No. ED 461 299.)
Chen, Chi-Fen E.
2006 The development of email literacy: From writing to peers to writing to author-
ity figures. Language Learning & Technology 10(2): 35–55.
Daft, Richard and Robert H. Lengel
1984 Information richness: A new approach to managerial behavior and organiz-
ational design. In: Barry M. Staw and L. L. Cummings (eds.), Research in Or-
ganizational Behavior, 191–233. Greenwich, CT: JAI Press.
Danet, Brenda and Susan C. Herring
2003 Introduction: The multilingual Internet. Journal of Computer-Mediated Com-
munication 9(1). http://jcmc.indiana.edu/vol9/issue1/intro.html
Derks, Daantje, Arjan E. R. Bos, and Jasper Grumbkow
2008 Emoticons in computer-mediated communication: Social motives and social
context. Cyberpsychology 11(1): 99–101.
Derks, Daantje, Agneta H. Fisher, and Arjan E. R. Bos
2008 The role of emotion in computer-mediated communication: A review. Com-
puters in Human Behavior 24(3): 766–785.
Dresner, Eli and Susan C. Herring
2010 Functions of the non-verbal in CMC: Emoticons and illocutionary force. Com-
munication Theory 20: 249–268.
Duthler, Kirk W.
2006. The politeness of requests made via email and voicemail: Support for the hyper-
personal model. Journal of Computer-Mediated Communication 11(2): 500–521.
Eckert, Penelope and Sally McConnell-Ginet
1992 Think practically and look locally: Language and gender as community-based
practice. Annual Review of Anthropology 21: 461–490.
Eelen, Gino
2001 A Critique of Politeness Theories. Manchester, UK: St. Jerome.
Fletcher, Joyce K.
1999 Disappearing Acts: Gender, Power, and Relational Practice at Work. Cam-
bridge, MA: MIT Press.
Fraser, Bruce
1990 Perspectives on politeness. Journal of Pragmatics 14: 219–236.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
634 Amelie Hössjer

Fukushima, Saeko
2004 Evaluation of politeness: The case of attentiveness. Multilingua 23: 365–387.
Goffman, Erving
1974 Frame Analysis. New York: Harper & Row.
Goffman, Erving
1981 Forms of Talk. Philadelphia, PA: University of Pennsylvania Press.
Goldsmith, Daena J.
2006 Brown and Levinson’s politeness theory. In: Bryan B. Whaley and Wendy
Samitel (eds.), Explaining Communication: Contemporary Theories and
Exemplars, 2919–236. Mahwah, NJ: Lawrence Erlbaum.
Gu, Yueguo
1990 Politeness phenomena in modern Chinese. Journal of Pragmatics 14:
237–257.
Hatipoğlu, Çiler
2007 (Im)politeness, national and professional identities and context: Some evi-
dence from e-mailed ‘Call for Papers’. Journal of Pragmatics 39(4): 760–773.
Hernández-Flores, Nieves
2004 Politeness as face enhancement: An analysis of Spanish conversations between
friends and family. In: Rosina Márquez-Reiter and María E. Placencia (eds.),
Current Trends in Pragmatics of Spanish, 265–286. Amsterdam/Philadelphia:
John Benjamins.
Herring, Susan C.
1994 Politeness in computer culture: Why women thank and men flame. In: Cultural
performances: Proceedings of the Third Berkeley Women and Language Con-
ference, 278–294. Berkeley, CA: Berkeley Women and Language Group.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Language@
Internet 4, article 1. http://www.languageatinternet.org/articles/2007/761
Holmes, Janet
2000 Doing collegiality and keeping control at work: Small talk in government de-
partments: In: Justine Coupland (ed.), Small Talk, 32–61. Harlow, UK Pearson.
Holmes, Janet and Stephanie Schnurr
2005 Politeness, humour and gender in the workplace: Negotiating norms and iden-
tifying contestation. Journal of Politeness Research 1: 121–149.
Hongladarom, Krisadawan and Soraj Hongladarom
2005 Politeness in Thai computer-mediated communication. In: Robin T. Lakoff and
Sachiko Ide (eds.), Broadening the Horizon of Linguistic Politeness, 145–162.
Amsterdam/Philadelphia: John Benjamins Publishing Company.
Hössjer, Amelie
2002 Former för dialog och beslut. Om växling mellan kommunikationsformer och
bruk av media i redaktionellt tidningsarbete. [Forms of dialogues and deci-
sions. On the alternation between forms of communication in news editorial
work.] IPLAb 206. Stockholm: Department of Numerical Analysis and Com-
puter Science TRITA_NA_P0301.
Hössjer, Amelie
2006 Externa brev och intern vardagskommunikation. Om bruket av e-post på en
tidningsredaktion. [External mails and internal everyday communication. The

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 635

use of email at a news office.] IPLab 265. Stockholm: Department of Numeri-


cal Analysis and Computer Science.
Hössjer, Amelie and Kerstin Severinson Eklundh
2005 Distance and nearness: The interplay between e-mail, telephone and face-to-
face interaction at a newspaper office. In: Ingegerd Bäcklund, Ulla Börestam,
Ulla Melander Marttala, and Harry Näslund (eds.), Text i arbete/Text at work
Festskrift till Britt-Louise Gunnarsson den 12 januari 2005/Essays in Honour
of Britt-Louise Gunnarsson 12 January 2005, 68–77. Uppsala: Department of
Scandinavian Languages, Uppsala University.
Hössjer, Amelie and Kerstin Severinson Eklundh
2009 Making space for a new medium: On the use of electronic mail in a newspaper
newsroom. Computer Supported Cooperative Work 18: 1–46.
Jessmer, Sherry L. and David Anderson
2001 The effect of politeness and grammar on user perceptions of electronic mail.
North American Journal of Psychology 3(2): 331–45.
Job-Sluder, Kirk and Sasha A. Barab
2004 Shared “we” and shared “they” indicators of group identity in online teacher
professional development. In: Sasha A. Barab, Rob Kling, and James H. Gray
(eds.), Designing for Virtual Communities in the Service of Learning, 377–403.
Cambridge, UK: Cambridge University Press.
Johnson, Aman Janan, Michael M. Haigh, Jennifer A. H. Becker, Elizabeth A. Craig, and
Sheiley Wigley
2008 College students’ use of relational management strategies in email in long-dis-
tance and geographically close relationships. Journal of Computer-Mediated
Communication 13(2): 381–404.
Joinson, Adam N.
2001 Self-disclosure in computer-mediated communication: The role of self-aware-
ness and visual anonymity. European Journal of Social Psychology 31(2):
177–192.
de Kadt, Elizabeth
1998 The concept of face and its applicability to the Zulu language. Journal of Prag-
matics 29(2): 173–191.
Kankaanranta, Anne
2005 “Hej Seppo, Could you pls comment on this!” Internal email communication in
lingua franca English in a multinational company. Ph.D. disseration, Univer-
sity of Jyväskylä Centre for Applied Language Studies.
Kaul, Asha and Vaibhavi Kulkarni
2005 Coffee, tea or …?: Gender and politeness in computer mediated communi-
cation (CMC). Indian Institute of Management Ahmedabad Working Papers
2005–04–02. Vastapur, Ahmedabad: IIMA Research and Publication Depart-
ment. http://www.iimahd.ernet.in/publications/data/2005–04–02ashakaul.pdf
Kim, Hyo, Gwang J. Kim, Han W. Park, and Ronald E. Rice
2007 Configurations of relationships in different media: FtF, email, instant mess-
enger, mobile phone, and SMS. Journal of Computer-Mediated Communi-
cation 12(4), article 3. http://jcmc.indiana.edu/vol12/issue4/kim.html
Koutlaki, Sofia A.
2002 Offers and expressions of thanks as face enhancing acts: tæ’arof in Persian.
Journal of Pragmatics 34: 1733–1756.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
636 Amelie Hössjer

Lee, Cynthia F. K.
2004 Written requests in emails sent by adult Chinese learners of English. Lan-
guage, Culture and Curriculum 17(1): 58–72.
Linell, Per and Margareta Bredmar
1996 Reconstructing topical sensitivity: Aspects of face-work in talks between mid-
wifes and expectant mothers. Research on Language & Social Interaction 29:
347–379.
Löfgren Nilsson, Monica
1999 On ideals and organizational principles in everyday editorial work. Ph.D. dis-
sertation, Göteborg University Department of Journalism and Mass Communi-
cation.
Malinowski, Bronislav
1923 The problem of meaning in primitive languages. In: C. K. Ogden and I. A. Ri-
chards (eds), The Meaning of Meaning: A Study of Influence of Language Upon
Thought and of the Science of Symbolism, 296–336. New York: Harcourt,
Brace and World.
Matsumoto, Yoshiko
1988 Reexamination of the universality of face: Politeness phenomena in Japanese.
Journal of Pragmatics 12(4): 403–426.
McEnery, Tony, Paul Baker, and Christine Cheepen
2002 Lexis, indirectness and politeness in operator calls. In: Pam Peters, Peter Col-
lins, and Adam Smith (eds.), New frontiers of Corpus Research: Papers from
the Twenty First International Conference on English Language on Computer-
ized Corpora Sydney, 53–70. Amsterdam/New York: Rodopi.
McKenna, Katelyn Y. A., Amie S. Green, and Marci E. J. Gleason
2002 Relationship formation on the Internet: What’s the big attraction? Journal of
Social Issues 58(1): 9–31.
Mills, Sara
2002 Rethinking politeness, impoliteness, and gender identity. In: Lia Litosseliti and
Jane Sunderland (eds.), Gender, Identity and Discourse Analysis, 69–89. Am-
sterdam/Philadelphia: John Benjamins.
Mills, Sara
2003 Gender and Politeness. Cambridge, UK: Cambridge University Press.
Morand, David A. and Rosalie J. Ocker
2003 Politeness theory and computer-mediated communication: A sociolinguistic
approach to analyzing relational messages. In: Proceedings of the Thirty-Sixth
Hawaii International Conference on System Sciences. Los Alamitos, CA:
IEEE Press. http://csdl.computer.org/comp/proceedings/hicss/2003/1874/01/
1874toc.htm
Mullany, Louise
2006 “Girls on tour”: Politeness, small talk, and gender in managerial business
meetings. Journal of Politeness Research 2(1): 55–77.
Murphy, Margaret and Mike Levy
2006 Politeness in intercultural email communication: Australian and Korean Per-
spectives. Journal of Intercultural Communication 12. http://www.immi.se/
intercultural/nr12/murphy.htm

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
Small talk, politeness, and email communication in the workplace 637

Murray, Denise E.
1988 The context of oral and written language: A framework for mode and medium
switching. Language in Society 17: 351–373.
Oestreicher, Amelie
2000 Editing news texts. A study of how texts are processed at six Swedish dailies.
[Bearbetning av nyhetstext. En studie av texthantering vid sex svenska dag-
stidningar.] Ph.D. disseration, Uppsala University. Publications of the Depart-
ment of Scandinavian Languages, Uppsala University 52.
Oliveira, Sandi M. de
2007 Breaking conversational norms on Portuguese users network: Men as adjudi-
cators of politeness? In: Brenda Danet and Susan C. Herring (eds.), The Multi-
lingual Internet: Language, Culture, and Communication Online, 256–278.
New York: Oxford University Press.
Panteli, Niki,
2002 Richness, power cues and email text. Information & Management 40(2):
75–86.
Panteli, Niki and Monica Seely
2006 The email gender gap. In: Mary Barrett and Marilyn J. Davidson (eds.),
Gender and Communication at Work, 250–259. Hampshire and Burlington:
Ashgate.
Persichitte, Kay A., Suzanne Young, and Donald Tharp
1997 Conducting research on the Internet: Strategies for electronic interviewing. In:
Proceedings of Selected Research and Development Presentations at the 1997
National Convention of the Association for Educational Communications and
Technology, 279–283.
Rogers, Priscilla and Song Mel Lee-Wong
2003 Reconceptualizing politeness to accommodate dynamic tensions in subordi-
nate-to-superior reporting. Journal of Business and Technical Communication
17: 379–412.
Schegloff, Emanuel A.
1988 Goffman and the analysis of conversation. In: Paul Drew and Anthony Woot-
ton (eds.), Erving Goffman: Exploring the Interaction Order, 9–135. Cam-
bridge, UK: Polity Press.
Sherblom, John
1988 Direction, function and signature in electronic mail. Journal of Business Com-
munication 25(4): 39–54.
Skovholt, Karianne
2009 Email literacy in the workplace. A study of interaction norms, leadership com-
munication and social networks in a norwegian distributed work group. Ph.D.
dissertation, University of Oslo.
Skovholt, Karianne and Jan Svennevig
2006 Email copies in workplace interaction. Journal of Computer-Mediated Com-
munication 12(1), article 3.
http://jcmc.indiana.edu/vol12/issue1/skovholt.html
Spiers, Judith A.
1998 The use of face work and politeness theory. Quaitativel Health Research 8(1):
25–47.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
638 Amelie Hössjer

Tannen, Deborah
1993 What’s in a frame? Surface evidence for underlying expectations. In: Deborah
Tannen (ed.), Framing in Discourse, 14–50. Oxford, UK: Oxford University
Press.
Tannen, Deborah
2007 Talking Voices: Repetition, Dialogue, and Imagery in Conversational Dis-
course. Cambridge, UK: Cambridge University Press.
Terkourafi, Marina
2001 Politeness in Cypriot Greek: A frame-based approach. Ph.D. disseration, Uni-
versiy of Cambridge.
Turnage, Anna K.
2007 Email flaming behaviors and organizational conflict. Journal of Computer-Me-
diated Communication 13(1), article 3.
http://jcmc.indiana.edu/vol13/issue1/turnage.html
Utz, Sonja
2007 Media use in long-distance friendships. Information, Communication & So-
ciety 10(5): 694–713.
Waldvogel, Joan
2001 Email and workplace communication: A literature review. Language in the
Workplace Occasional Papers 3. http://www.victoria.ac.nz/lals/publications/
lwp.aspx
Waldvogel, Joan
2007 Greetings and closings in workplace email. Journal of Computer-Mediated
Communication 12(2), article 6.
http://jcmc.indiana.edu/vol12/issue2/waldvogel.html
Watts, Richard J.
1992 Relevance and relational work: Linguistic politeness and politic behaviour.
Multilingua 8(2/3): 131–166.
Watts, Richad J.
2003 Politeness. Cambridge, UK: Cambridge University Press.
Watts, Richard J., Sachiko Ide, and Konrad Ehlich (eds.)
2005 Politeness in Language: Studies in Its History, Theory and Practice, 2nd Ed.
Berlin: Mouton de Gruyter.
Watts, Stephanie
2007 Evaluative feedback: Perspectives on media effects. Journal of Computer-
Mediated Communication 12(2): 384–211.
Wenger, Etienne
1999 Communities of Practice: Learning, Meaning, and Identity. Cambridge, UK:
Cambridge University Press
Wierzbicka, Anna
1999 Emotions Across Languages and Cultures. Cambridge, UK: Cambridge Uni-
versity Press.
Zack, Michael H.
1993 Interactivity and communication mode choice in ongoing management groups.
Information Systems Research 4(3): 207–239.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/14/15 3:03 PM
26. Flaming and linguistic impoliteness on a listserv
Brenda Danet

1. Introduction

A flame event is a sequence of typed, synchronous or asynchronous, online ex-


changes involving sudden, intense conflict. This chapter develops a pragmatic ap-
proach to flaming and applies it to a sequence from an English-based listserv for Is-
raelis living in the San Francisco Bay area in fall 2005.1
This case study is of theoretical interest, first because it links the study of flam-
ing with that of linguistic impoliteness (Harrison 2004, 2007; Maricic 2005), a
topic that has attracted the attention of linguists in the last 20 years (Culpeper 1996,
2005; Culpeper, Bousfield, and Wichmann 2003; Eelen 2001; Huddersfield 2006;
Kasper 1990; Kienpointner 1997). Second, by focusing on native Hebrew speakers
communicating in English, I extend attention to an increasingly multilingual Inter-
net (Danet and Herring 2003, 2007a, b; Wright 2004). Third, the mix of serious and
playful frames of interaction (Goffman 1974; Handelman 1976; Kochman 1983;
Tannen 1993) in this sequence challenges the researcher to unpack how it can in-
volve the expression of intense mutual hostility yet stimulate linguistic and typo-
graphic creativity. Fourth, in the past most researchers attributed flaming primarily
to technological factors, especially anonymity and its disinhibiting effects, and a
lack of social norms.2 I will argue that linguistic, sociocultural, organizational,
gender, and personality factors should also be taken into account.
Recent studies show that linguistic/sociocultural factors can be important
online (Danet and Herring 2003, 2007b). In a study of four Usenet newsgroups,
soc.culture.japan, soc.culture.canada, soc.culture.indian, and soc.culture.arab, fla-
ming messages were found to be most common in soc.culture.arab and least com-
mon in soc.culture.japan, the latter reflecting a culture emphasizing harmony
(Kayany 1998). Similarly, in discussions by Hong Kong and American business
students, individualistic Americans made more frequent critical comments than
collectivistic Hong Kongers (Reinig and Mejias 2004).
Linguistic/sociocultural context is pertinent for Jewish Israelis online. Coming
from a country of only 7,000,000 (Statistics 2004) and sharing a common native
language, history, and identity promotes low social distance and a tendency to speak
freely. Some have the illusion that “everyone knows everyone”. A history of perse-
cution, the Holocaust, and the Palestinian-Israeli conflict have further promoted
solidarity, which is challenged today, however, by deep social cleavages: between
religious and secular Jews, between European and North African/Middle Eastern
Jews, between natives and immigrant sub-groups, and between proponents of op-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
640 Brenda Danet

posing ideologies regarding the Palestinian-Israeli conflict (Horowitz and Lissak


1990; Kimmerling 2001). These cleavages foster severe conflict and verbal viol-
ence in public discourse (Kohn and Neiger 2007; Salzberger and Oz-Salzberger
2006).

2. Theoretical background

Flaming is a complex, elusive phenomenon. Most past research has viewed it


negatively, as “verbal aggression”, “insult”, or “hostile behavior”.3 “Hostility, ag-
gression, intimidation, insults, offensive language or tone, uninhibited behavior,
sarcasm, and unfriendly tone (…) are the most consistently used attributes to de-
scribe flaming” (Turnage 2007). Kayany (1998: 1135) focuses on “expression of
hostile emotions directed at another person, as opposed to criticism (…) directed at
ideas and opinions”. However, like profane or hostile language in other contexts,
flaming can sometimes express solidarity, not hostility, or even both simulta-
neously (Blum-Kulka, Blondheim, and Hacohen 2002; De Klerk 1997; O’Sullivan
and Flanagin 2003; Schiffrin 1984). Thus, we should conceive of it in a neutral,
contextualized manner.

2.1. Flaming in historical perspective


Flaming may have expressive, playful, sporting aspects, not only aspects relating to
“the facts” (Danet 1998; Vrooman 2002). In this, it partially resembles many oral
genres: Homeric narrative (Edwards and Sienkewicz 1990; Parks 1990), medieval
“flyting” (Halama 1996; Jucker and Taavitsainen 2000; Parks 1990), rants (Black
and Parfrey 1989; Russell 1997), “sounding” or “playing the dozens” (Abrahams
1973; Labov 1972; Parks 1986), and rapping (Edwards and Sienkewicz 1990;
Halama 1996). As in earlier genres, performance is central; the audience is invited
to attend to message form (Bauman 1992).

2.2. Flaming and linguistic impoliteness


Recent interest in linguistic impoliteness is a byproduct of the critique of the pol-
iteness theories of Brown and Levinson (1987), Leech (1983), and Lakoff (1973).
Drawing on this literature, I posit the following four points. (1) Only speakers or
writers are polite or impolite, not speech acts or linguistic forms, whose interpre-
tation may vary widely from one situation to another (Kienpointner 1997: 255). (2)
Rudeness is “constituted by deviation from whatever counts as polite in a given so-
cial context, is inherently confrontational and disruptive to social equilibrium”
(Kasper 1990: 208). Context includes the background sociocultural/linguistic con-
text of posters, norms of the institutional host, and emergent listserv norms. “It is

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 641

only individuals interacting within Communities of Practice who will be able to as-
sess whether a particular act is polite or impolite” (Mills 2002: 76; cf. O’Sullivan
and Flanagin 2003). (3) One should focus not only on the impoliteness of individ-
ual contributions but on negotiation regarding impolite behavior over time; and
primarily, (4) on seriously intended, strategic rudeness.

2.3. Language choice and code-switching


Recently, computer-mediated communication (CMC) researchers have investi-
gated language choice and code-switching among ethnic and national diasporas
(e.g., Alonso and Arzoz 2006; Androutsopoulos 2007; Fialkova 2005; Hinrichs
2006; McClure 2001; Paolillo 1996). Here I ask: In what ways might it matter that
Israelis abroad are communicating in a second language? Do code-switching and
code-mixing occur?

2.4. Flaming, gender, and culture


Gender interacts with culture online in ways that shape language and communi-
cation, including patterns of flaming. Men and women use different discourse
styles online, as they do offline, and patterns of women’s subordination tend to be
reproduced online (Herring 2003). Among first-time users in a business context,
only males engaged in flames in a study by Aiken and Waller (2000). Herring
(1994) elaborates:
In asynchronous CMC (…) males are more likely to post longer messages, begin and
close discussions in mixed-sex groups, assert opinions strongly as “facts”, use crude
language (including insults and profanity), and (…) manifest an adversarial orientation
towards their interlocutors (…) females tend to post relatively short messages, and are
more likely to qualify and justify their assertions, apologize, express support of others,
and (…) manifest an “aligned” orientation towards their interlocutors. (292)
In keeping with these observations, Oliveira (2003) found that male academics on
a Portuguese university list chastised transgressions by women, asserting interac-
tional dominance. In work-related English emails in India, women were more pol-
ite than men (Kaul and Kulkarni 2005), as in previous studies in English CMC.
However, in a Thai chatroom women were quite assertive as regards turn allo-
cation (Panyametheekul and Herring 2003).
Despite early aspiration for equality and certain gains since the 1970s, Israeli
women remain relatively subordinate – in politics and public life (Herzog 2004;
Yishai 1997), the military (Golan 1997), institutional arrangements for home and
child care (Izraeli 1992), and religion and law (Halperin-Kaddari 2004). Subordi-
nation is reinforced by stereotypes of macho masculinity and discriminatory por-
trayals of women in the media (Lemish and Tidhar 1999; Weimann 2000).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
642 Brenda Danet

2.5. The culture of disputing among Jews and Jewish Israelis


Jews have a millennia-long history of expressive and instrumental forms of argu-
ment and disputing. Traditional forms include: Talmudic text as a form of conver-
sational argument and oral, religious learning through dialogue (Blondheim and
Blum-Kulka 2001; Blum-Kulka, Blondheim, and Hacohen 2002; Helmreich 1982);
pithy Yiddish curses (Matisoff 1979; Wex 2005); invective in posters condemning
deviance among ultra-orthodox Jews (Baroz 2005); argumentativeness among
secular American Jews of Eastern European origin (Myerhoff 1994; Schiffrin
1984; Tannen 1981, 1984); and confrontational political debate in Israel’s Parlia-
ment, broadcast media, and online talkbacks (Blum-Kulka, Blondheim, and Ha-
cohen 2002; Kohn and Neiger 2007; Salzberger and Oz-Salzberger 2006). A prov-
erbial saying is: “Where there are two Jews, there are three opinions!” Jewish
communication patterns show a cultural preference for disagreement (Blondheim
and Blum-Kulka 2001; Blum-Kulka, Blondheim, and Hacohen 2002; Schiffrin
1984), including unmitigated disagreement (Hacohen 2001).
In the formative years preceding statehood, Jewish Israelis developed a dugri –
‘straight’4 – style of communication. In Hebrew, to speak dugri is to speak directly,
sincerely, assertively, naturally, and spontaneously, in an unadorned, unmitigated
manner that speaker and hearer experience as enhancing communitas (Katriel
1986). Dugri style connoted rejection of the image of the weak ghetto Jew (Katriel
1986). Unmitigated directness often characterizes requests and complaints (Blum-
Kulka, Danet, and Gherson 1985; Blum-Kulka, House, and Kasper 1989).
A more recent development is kasax style, a brutally confrontational, unmiti-
gated style privileging the imposition of power in interpersonal relations. L’kaseax
means ‘to cut down’, as in to mow grass. The slang expression kasax refers to “ver-
bal violence that harms the fabric of social relations and is unrestrained by a shared
web of meanings and common values” (Katriel 1999: 214; my translation). Kasax
communication has moved online, in talkbacks and chat (Blais 2001; Kohn and
Neiger 2007).

3. Corpus and research goals

The sequence analyzed here occurred over four days in October–November 2005,
on an electronic mailing list for Israelis in the San Francisco Bay Area in the
United States. Of 800 subscribers, 100 were students at the host university. The list
mandate states that posters may announce events, seek people with common inter-
ests, ask questions, or get recommendations. Posting messages that are defaming,
threatening, or that contain obscene language is prohibited.
Presumably, most subscribers are native-born, highly educated professionals or
their spouses/partners, part of an Israeli diaspora of 40,000 in the San Francisco/

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 643

Silicon Valley area (Shakhar 2005). Most use their real names in email addresses
and when signing postings. Subscribers may know one another offline profession-
ally or socially, participate in the same local activities, or have children in the same
schools. Typically, postings are short exchanges about goods and services.

3.1. Sociolinguistic background: Hebrew-English bilingualism


It is not obvious that the posters are non-native speakers of English; postings are
usually in good English. Because of the left-to-right directionality of the English
interface and the dominance of the Roman alphabet online, it is difficult to post in
Hebrew, a right-to-left language with its own script. However, there is evidence of
posters’ Hebrew background in HTML-encoded Hebrew announcements from the
local Israeli Consulate, Hebrew Word attachments, and romanized Hebrew ex-
pressions and linguistic transfers from Hebrew in some postings.
The subscribers’ command of English reflects the fact that English is one of the
three main languages of Israel (along with Hebrew and Arabic; Spolsky 1997;
Spolsky and Shohamy 1999). Hebrew is the main language of instruction in
schools and in most higher education, the primary public language of the state, and
the native language of the majority of Jewish citizens. English is the lingua franca
for business, science, education, and travel (Spolsky 1997: 145), and the language
of much-admired American culture. Taught beginning in the third grade, it is
prominent in street and shop signs in cities, the printed press,5 and the mass media.

3.2. Participants
Nine males and five females participated in the analyzed sequence. Most had con-
temporary Hebrew first names; three, with Russian first names, may have immi-
grated to the United States directly, or via Israel. To protect participants’ identity,
all names have been changed. Comparable names were assigned: A male with a
typical name for a 20-40-year-old Israeli Jew was assigned a similar name; a fe-
male with a Russian or French name was given another of similar connotation.

3.3. Approach and research questions


Whereas many previous studies of flaming focused on individual messages, the
evolution of the entire event is analyzed here. Flaming is “a co-constructed com-
municative event emerging between interactants” (Avgerinakou 2003: 276). Read-
ing the postings rapidly, with other intervening threads removed, creates the illu-
sion of a heated real-time argument. Twenty-eight postings on other matters were
interleaved with 24 flame-related ones; I do not attend to these other postings. This
case study discusses the following questions:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
644 Brenda Danet

– How and why does this flame sequence begin, escalate, and end? What key
speech acts are involved?
– What evidence is there that conflict is occurring?
– What forms of linguistic impoliteness occur?
– What remedial activity, if any, takes place?
– In what ways might Jewish and Israeli communication styles find expression in
this sequence?
– Does gender play a role, and if so, how?

4. How do we know that conflict is occurring?

4.1. Metatalk
We know that a conflict is occurring in these data, first of all, because participants
engage in metatalk about it (Table 1), although they never use the term “flaming”
or any Hebrew equivalent.

Table 1. Metatalk about conflict

“this wonderful do-krav [‘duel’] we are having” (Gad)


“the efroach [‘chick’] was hatched and became a man-eating pre-historic monster” (Gad)
“this whole exchange” (Gad)
“a private brawl” (Igor)
“The last verbal Tsunami” (Gad)
“the whole thing” (Gad)
“the whole event” (Gad)
“The storm” (Gad)
“this topic” (Tal)
“putting an end to this” (Tal)

While “this whole exchange”, “the whole thing”, “the whole event”, and “this
topic” neutralize the trouble, “monster”, “brawl”, “tsunami”, and “storm” connote
extreme conflict. The provocateur who was central in the entire sequence, called
here Gad, produces seven of the 10 labels and is the most verbally creative. Among
other expressions, he represents the conflict as a “wonderful do-krav”6 (‘a wonder-
ful duel’). Romanizing the Hebrew term for ‘duel’, he indicates that he is enjoying
the fight, even if his complaint was initially serious. He also characterizes the tor-
rents of words as “a storm” and a series of “verbal tsunamis”.
Gad’s contrast of efroach (efroax in my transliteration system)7 and man-eating
pre-historic monster resembles the English “to make a mountain out of a molehill”.
The Hebrew equivalent is la’asot pil mizvuv (‘to make an elephant out of a fly’;
Doniach and Kahane 1998; Rosenthal 2005; Zilkha 2002). In another posting Gad
speaks of typing words metaphorically – “everyone put down their guns and key-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 645

boards” – characterizing the list as “a battle field” and “a ship that sailed again in
safe waters”.

4.2. Linguistic impoliteness


There are many forms of linguistic impoliteness in this sequence, starting with an
insulting challenge by Gad to Yossi, followed by an exchange of spiraling, inten-
tionally hurtful insults. Another indication of impoliteness is obscene language,
which does not ordinarily occur on the list. Natasha congratulates Gad for having
“the balls” to criticize Yossi, and Gad calls another male, Ohad, “you shit-stirrer”.

4.3. Citations
Citation of previous messages is a common feature of asynchronous CMC modes.
It helps recipients keep track of topics and correspondents, but it also serves other
functions (Marcoccia 2004; Severinson Eklundh 2010; Tanskanen 2001;
Thompsen and Foulger 1996). Analyzing two asynchronous modes, Tanskanen
(2001) suggested that “overt reference by the writers to the viewpoint they are dis-
agreeing with could (…) be a collaborative strategy, motivated by the wish to
avoid conflict or even by a fear of flaming” (238–239; italics added). This interpre-
tation is not applicable, however. The 24 postings, including all citations, fill 25
pages of single-spaced text in Word, over 7,000 words!8 Twelve posters include the
initial incendiary posting as well as up to five others, suggesting that they were re-
sponding emotionally and rapidly.

4.4. Reprimands
Reprimands also indicate trouble. There were brief reprimands by two females and
one male, and lengthier ones by the organization’s president and listowner. Dina,
the president, wrote:
(1) I am ashamed that I cannot be away from my email for even a weekend without
coming back to find my … mailbox littered with irrelevant emails. Tal [list
owner] and I do not need to be your kindergarten teachers.
The latter is a patronizing transfer from Hebrew, Tal v’ani lo tsrixim l’hiot hagan-
anot shelaxem. While this is a perfectly acceptable English sentence, it is much
more probable in the Israeli context. Tal concluded the event as follows:
(2) Enough! Do not send any more replies to this topic. No more clarifications. No
more last words. I sincerely appologize to the list members for missing the 1st
wave of emails and not putting an end to this sooner. I guess the list cannot be
left unattended for a weekend.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
646 Brenda Danet

4.5. Remedial activity


Still other evidence of conflict is the presence of remedial interchanges (Goffman
1967, 1971; Harrison 2004, 2007; Harrison and Allton, this volume; Owen 1983).
Gad makes two attempts to neutralize what proves to have been an unjustified attack.

5. The initial provocation

Minimally, any situation of conflict has three components, an initial statement or


other speech act by Speaker A; a challenge by Speaker B expressing disagreement
with Speaker A; and a response by Speaker A expressing disagreement with
Speaker B (Avgerinakou 2003: 279; Schiffrin 1984: 316). Disruption of peaceful
interaction began when Yossi asked:
(3) Does anyone know the area codes of the “Bahamas phone scheme”??
Later that day, Gad sent an insulting complaint/challenge to Yossi and to the group.
The subject line of his posting was “TO ALL ___ LISTS SUBSCRIBERS”.
(4) 1/ PICK UP YOUR PHONE,DIAL OPERATOR AND ASK!!!!!!!!!!!!!
2/ OPEN YOUR PHONE BOOK AND LOOK UNDER NUMERICAL LIST-
INGS OF AREA CODES.!!!!!!!!!!!!
3/ GO ON LINE AND USE YOUR IMAGINATION WHERE YOU MIGHT
BE TO FIND IT, LIKE GOOGLE,OR PHONE DIRECTORIES,
DAHHHH!!!!!!!!!!!!!!
4/ WOULD YOU LIKE US ALL TO COME OVER AND SHOW YOU HOW
TO USE YOUR BROOM?
IS THIS THE JOB OF ALL OF US? TO BE THERE AT THE BECK AND
CALL, TO ANSWER THE SIMPLEST QUESTIONS FOR ANYONE WHO
IS TOO LAZY TO TAKE A MOMENT, USE THEIR IMAGINATION, AND
MAKE THE SLIGHTEST EFFORT TO FIND THE ANSWER TO THEIR
OWN QUESTION. PLEASE, LETS ALL OF US STOP LOADING THE ___
LISTS WITH THIS TYPE OF QUESTIONS WHICH WE ALL HAVE
TO CONSTANTLY DELETE. AND … ANYONE WHO ANSWERS ONE,
BUYS ICE CREAM FOR THE REST OF US AT “STONE COLD”.
doesanyoneknowwherethereisastnecoldicecreamplace?9

Complaining about ostensibly unnecessary postings, Gad claims that Yossi could
find the information by asking a telephone operator or looking in the phone book or
online. The complaint is formulated as a series of directives to avoid the offending
act in the future, followed by two rhetorical questions.
The bald on-record imperative form, in itself, is not necessarily offensive, since
Israelis tend to be direct even when polite (Blum-Kulka 1987; Blum-Kulka, Danet,

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 647

and Gherson 1985; Blum-Kulka, House, and Kasper 1989). However, it is not the
job of a subscriber to issue orders to others; contextually, these imperatives are im-
polite. Issuing this challenge in view of all is more insulting than if the challenge
were private.
In its excessive length the posting violates Grice’s (1975) Maxim of Quantity.
Its commanding tone is aggravated by writing-specific means that mimic emotion-
ally heightened speech: dramatic play with typography – the use of all caps,
multiple exclamation points, and the comics-like “DAHHHH!!!!!!!!!!!!!!”. Devi-
ating from brief, unmarked list style, these features are known to occur in other in-
cendiary communication online (McKee 2002). In most online contexts, all caps
are understood as the textual equivalent of shouting (Crystal 2006: 37; Danet 2001:
17–19), and here they simulate shouting during an oral argument (Schiffrin 1984).
That Gad’s text and play with typography were carefully planned and edited is in-
dicated by the numbered listing of items, the three imperatives, and the sudden
switch from all caps to all lower-case writing.
The structure of this challenge contains parallelism and repetition, which “in-
creases the imposition upon the target and/or emphasizes the negative attitude of
the speaker toward the target” (Culpeper, Bousfield, and Wichmann 2003: 1561),
thereby boosting impoliteness. Switching to all lower case changes the footing to
the play frame (Goffman 1979): Gad effectively downgrades the aggressiveness of
his posting. The call for future offenders to buy ice cream for all is absurd, since the
communication is virtual, and nobody knows who “all” are.
Gad has so far directed five ad hominem insults to Yossi:
1) You are lazy.
2) You waste our time, fill our screens with garbage, and may even cost us modem
time and money.
3) You have no imagination.
4) You are stupid.
5) You are so incompetent that you don’t know even how to use a broom.
The last item is particularly insulting, since everybody knows how to use a broom,
as is implied by the rhetorical form of the utterance, and it is a gross violation of
Grice’s (1975) Maxim of Relevance.

6. Escalation

Insults can manifest three possible combinations of illocutionary force and perlo-
cutionary effect (Austin 1975; Searle 1976; Vrooman 2002): (1) an utterance is in-
tended to hurt, and is experienced as such; (2) an utterance is not intended to hurt,
but is experienced as hurtful; or (3) an utterance is intended to hurt, but is not ex-
perienced as hurtful.10 The sequence under analysis is full of type 1 personal insults.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
648 Brenda Danet

Table 2 lists all the insulters and insultees. The same five individuals are both
insulters and insultees. Of seven insult pairs, three are reciprocal. Gad insults two
other individuals besides Yossi.

Table 2. Insulters and insultees in the flame event

Gad f Yossi
Yossi f Natasha
Natasha f Yossi
Irena f Gad
Yoav f Gad
Gad f Yoav
Gad f Irena

Natasha agrees with Gad’s complaint. Typing a portion of her posting in all
caps, she signals her identification with him:
(5) I totally agree and I’m glad someone had the balls to say something. (I didn’t
even see the ice cream question cause I rarely look at the list anymore – BE-
CAUSE THERE ARE TOO MANY STUPID QUESTIONS ON IT) but I DID
notice your post because it was addressed to all, so I paid attention.
Thanks!
Instead of responding directly to Gad, Yossi posts without comment a
630-word explanation from the web about an 809 Area Code scam, in which un-
witting dialers incur exorbitant international charges for ostensibly American
calls. Seemingly helpful, he shares this information with the others. However,
“blasting” the list with this explanation without comment is an indirect, subtly im-
polite way of counter-attacking Gad, communicating not only “You were wrong to
attack me”, but also “You (Gad) flooded me with words; now I am flooding you
with even more words, and in view of all the others – so there”!
Direct evidence for how Yossi feels about Gad’s attack is revealed when Nat-
asha copies into a posting a private email Yossi had sent her:
(6) Thanks for the compliment Yossi. Were you too cowardly to send to the list?
Afraid they might see what kind of a person you are? Well, I’ll send it for you …
maybe you will get booted off now.
-----Original Message-----
From: Yossi
To: Natasha
That’s because you are a stupid cow …

Yossi has called her a “stupid cow” because of her agreement with Gad, revealing
that he was very hurt and angry at Gad. Natasha insults Yossi by violating a general

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 649

online norm – not to forward private email to others without the writer’s per-
mission, especially if the content is sensitive. She sends her ironic response to the
list, “thanking” him for the sarcastic “compliment”, calling him a “coward”. Doing
so before an audience compounds the insult.
Another female poster, Irena, lashes out at Gad:
(7) Gad, you are a very sad, pathetic and defective human being. Thank you for
sharing your insignificant opinions and spamming the list with that spew of
filth you pass for as a reply.
I am sure everyone on the list is anxiously waiting for your next idiotic mono-
log.
In attacking Gad in a partially ironic manner (“thank you for sharing”), Irena re-
sponds not only to his attack on Yossi, but to a previous posting before this event,
in which he had attacked her for twice asking the list to recommend a hairdresser.
Yoav, another male, agrees, adding new insults:
(8) I second this comment. Gad seems to always complain about the way the com-
munity chooses to use the list. Gad, why don’t you stop using it and save us
your negative comments and energy. In the same amount of time you took to
criticize the person asking the question, you could have just given the answer
and been a kind human being instead of a rotten one.
I have a solution for you and Natasha … Create a separate folder where all the
[list] emails go into automatically. That way it won’t “load up your inbox” as
you put it …
Do you think you know how to do this, or “do you want us to all come over and
show you how” to use your computer?
Pathetic!
Yoav finds Gad’s comments “negative”; he is “a rotten human being”. Like Irena,
he thinks Gad is “pathetic”. Especially hurtful is the suggestion that Gad is com-
puter illiterate, a violation of Grice’s (1975) Maxims of Relevance and Quality.
This ironic rhetorical question parallels Gad’s question about the broom, as indi-
cated by the quotation marks around these words. Thus Irena and Yoav ally them-
selves against Gad and Natasha.
In the next posting, another male, Avishai, posts new information:
(9) I believe that it is the North American 242 area code. like 1–242-XXX–XXXX
from the US and Canada. But I am not absolutely sure.
Gad playfully rejects this, seemingly abandoning “the facts” and his challenge to
Yossi. He pretends to chastise Avishai for putting a stop to “this wonderful ‘do-
krav’” [‘duel’; quotation marks in original]:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
650 Brenda Danet

(10) Avishai, are you trying to put a stop to this wonderful “do-krav” [‘duel’] we
are having. Shame on you. Shana Tova Umetuka like your wife’s wonderful
cakes. Gadi
Playfully, he code-mixes again, wishing Avishai Shana Tova Umetuka – ‘A happy
and sweet New Year’. Because the fall Jewish holidays are over, use of this ex-
pression is incongruous and humorous. Picking up on metuka (‘sweet’), he refers
to Avishai’s wife’s cakes as also sweet, another violation of the Maxim of Rel-
evance (Grice 1975). In a final ingratiating move, he signs the posting with his
nickname, “Gadi”, a diminutive of Gad (Blum-Kulka and Katriel 1991). Turning
playful compounds Gad’s original impoliteness: By transforming communication
into a mere game he trivializes the hurt he has caused.
Gad’s posting to Avishai was preceded chronologically by his insulting re-
sponse to Irena:
(12) Irena, I am sad for you that humor is not part of your makeup.
“People who live in glass houses shouldn’t throw stones” as the old proverb
says.
Irena, read my words like mild paprika … feel yours like cayenne pepper. Ex-
cuse me Irena, I have to get a tissue to clean your saliva out of my eyes, I hope
it’s not venom.
Gad’s words were intended as “mild paprika”, not as the strong insult she appar-
ently felt, whereas he feels hers as if they are much stronger “cayenne pepper”, as
well as “saliva in his eyes” from a spitting snake. Ostensibly mitigating his pre-
vious words to her, he newly insults her, insinuating that she is a snake (“I hope
[your words are] not venom”). Verbal inventiveness, a form of fun for him, is in-
separable from expression of hostility.

7. First remedial attempt

Eventually, Gad realizes that his attack on Yossi was unjustified. Twice he engages
in remedial activity. Goffman (1967: 20–22) identified four components of a full
remedial interchange: (1) offended person draws attention to the offense; (2) of-
fender apologizes; (3) offended accepts the apology; and (4) offender thanks the
other for forgiveness received. As in previous research on remedial activity online
for serious offenses (see Harrison and Allton, this volume), remedial activity here
is extremely truncated.
Olshtain and Cohen (1983) identified five types of strategies employed in
apologies (Table 3):

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 651

Table 3. Five strategies for the performance of an apology (Olshtain and Cohen 1983)

Strategy Type
(1) IFID (illocutionary force indicating device)
(2) Expression of speaker’s responsibility; relates to speaker’s willingness to
admit to fault
(3) Explanation
(4) Offer of repair
(5) Promise of forbearance in the future

The first category includes formulaic, routinized forms of apolog, such as the per-
formative verb “I apologize” and the expression “I’m sorry”. The others are self-
explanatory. An apology may combine two or more of these strategies.
Gad’s initial remedial attempt is primarily category (3), focusing on confusion
between “scheme” and “scam”:
(13) In the message below, which I reacted to, and responded to, you used the word
“scheme”, which does not necessarily have a negative connotation, such as a
color scheme,or any system of correlated things. I took it in a positive sense
such as a layout or a list of phone numbers for the Bahamas …
If you had used the word scam – if that is what you meant – or “would any-
one like to know the area codes of the Bahamas phone scam”? there would
have been no [doubt] in my mind as to your intention and I would not have
responded as I did. And from there the “efroach” [‘chick’] was hatched and
became a man-eating-pre-historic-dinosaur. So lets choose and use our words
correctly. This whole exchange didn’t bring the nicest things out of some
people, you for one, in the eyes of some, me, and of course the cobra who spat
at me, what was her name? I hope she has somewhere to channel her anger.
Shana Tova
Gadi
Even native speakers of English might have confused the two expressions. The
Oxford English Dictionary defines “scheme” as “a plan, design; a programme of
action; the designed scope and method of an undertaking (…); often with unfavor-
able notion, a self-seeking or an underhand project, a plot” [emphasis mine].
“Scam” is “a trick, a ruse; a swindle, a racket”. In Hebrew, too, there are both neu-
tral and negative terms for the equivalent of “scheme”, but only negative terms,
tarmit and hona’a, for “scam” (Levy 1995). Yossi’s confusion between two simi-
lar-sounding lexical items in English and Gad’s misunderstanding were the initial
cause for the conflict. Gad blames Yossi almost entirely for it, conceding only that:
(14) This whole exchange didn’t bring the nicest things out of some people, you
for one, in the eyes of some, me, and of course the cobra who spat at me.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
652 Brenda Danet

Putting Yossi first in the list of those behaving badly is unfair. Yossi’s only postings
were the initial question and its answer. In fact, Gad dominated the entire sequence,
with four postings before this one and seven in all. In the expression “In the eyes of
some, me” Gad concedes only that others thought his behavior “not nice”, thus
avoiding the first person pronoun “I”, the agent of responsibility for action. He
only uses it in “If you had used the word scam (…) I would not have responded as I
did”, thereby evading having to admit exactly how he responded.
Gad’s contrast between efroax (‘chick’) and “man-eating monster” grossly
minimizes his responsibility. Efroax connotes something small, harmless, cuddly,
adorable, bright yellow like the sun; “man-eating pre-historic dinosaur” connotes a
huge, frightening killer. While “chick-monster” is animate, “storm” and “tsunami”
refer to forces of nature, as if the trouble were a product of forces beyond the con-
trol of humans, that is to say, of these posters, especially himself.
Gad also deploys affiliative, conciliatory strategies to mitigate responsibility.
Again, he signs with his nickname, “Gadi”. Switching strategically to the Hebrew
“Shana Tova”, he wishes Yossi and the others a belated Happy New Year. Here,
overtly agonistic elements are absent, except for Gad’s reference to Irena as a
“cobra”.

8. Second remedial attempt

Later, Gad offers a more extended account of his behavior:


(15) At the end of the last verbal Tsunami I sent an email trying to clarify to all how
and why the whole thing began. I was sincere in my effort to calm down the
whole event. I was happy it worked, and everyone put down their guns and
keyboards. The storm died and the ship “[listname]” sailed again in safe
waters.
… As for the future, I do not intend to load the lists again with my private
“stuff” unless I think it would be of interest or benefit to the community. I
hope that all of us will evaluate the content, quality, frequency and quantity of
our emails. Gad
By “last verbal tsunami” he means the exchange of postings before Dina’s repri-
mand. He promises not to load the list with “his private stuff” in the future. Usur-
ping the role of listowner, nearly formulating Grice’s Maxims, he urges, “I hope
that all of us will evaluate the content, quality, frequency and quantity of our
emails”. Signing “Gad” rather than “Gadi” signals that this posting is again seri-
ous.
There was no formal ending to this sequence. We never learn whether Yossi or
anyone else considered Gad’s remedial postings an adequate apology. The repri-
mand by Tal brought matters to a close, and interaction returned to normal.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 653

9. Summing up

Six sets of factors fostered impoliteness in this sequence, some familiar, others per-
haps newly identified here.

9.1. Technological factors


Compared with the ephemerality of oral utterances, the written, asynchronous na-
ture of postings could promote editing one’s posting before sending it. In practice,
here, as in earlier studies of flaming – even though total anonymity did not prevail –
the textual nature of the list, the ease of hitting the reply button, and the lack of eye
contact and instant feedback all probably contributed to the escalation.

9.2. Organizational factors


Organizational factors also contributed to this flame sequence. Earlier, I noted the
role of emergent list norms and institutional norms. Other important organizational
factors were the leaders’ behavior and attitudes. This is not a moderated list – the
listowner does not screen messages before posting them. However, he and the
president do usually monitor postings closely. The fact that they did not see what
was happening until it was nearly over allowed it to escalate.
Their reprimands suggest a rather repressive leadership style, confirmed by de-
velopments 10 days later. Four posters began debating the role of fathers in parent-
ing, and a new “flame war” began to develop. Dina responded sternly, suppressing
disagreement, probably partly because of the previous conflict but also, I suggest,
because the leaders are wary of the disputatiousness of Israelis and fear being un-
able to control it.

9.3. Gender
Nine males but only five females participated. The primary flamers were both
male – Gad, the challenger, and Yossi, the victim. Three of the five insulters were
male, and a male, Gad, addressed the most insults to others and posted the most
(seven postings). Eighteen of the 24 postings were by males. This pattern is con-
sistent with aggressive, assertive masculinity and female subordination in Israeli
society (Lemish and Lahav 2004) and with findings that men participate more in
CMC and flame more than women (Aiken and Waller 2000; Herring 1994, 2003).
Agonistic/jocular elements of playfulness in Gad’s behavior were consistent with
Israeli macho masculinity. Herring’s assessment of why men flame more than
women and why some women participate fits here, too:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
654 Brenda Danet

(…) men flame, at least in part, to regulate the social order, as self-appointed vigilantes
on the “virtual frontier”. Such behavior is rationalized within a male system of values
that assigns greater importance to freedom of expression and firmness of verbal action
than to possible consequences to the addressee’s face needs (…) All act under the in-
fluence of a larger culture in which confrontation and aggression are valorized in males
(…) flaming is “contagious” – normally polite participants, including women, can be
pushed to flame back when sufficiently provoked by another’s flames. (Herring 1994:
292)

9.4. Personality
Gad’s personality was a contributing factor. His practice of combining a serious
message with superfluous playful, provocative additions suggests a stronger than
usual tendency to provoke, even for a male.

9.5. Sociocultural and linguistic factors


One contribution of this case study is its discussion of flaming in a bilingual/bicul-
tural context. The trouble began because of non-native speakers’ misunderstanding
about “scam” versus “scheme”. Moreover, the extreme impoliteness may not have
seemed so offensive because the posters were communicating in English. Learning
a second language may lead individuals to experience a severing or weakening of
signifier and signified (Hoffman 1989: 106; Pavlenko 2005, chapter 6). Swearing
in a language other than L1 carries different emotional connotations. Dewaele
(2004a, b) found that among multilinguals, the earlier a language was learned, the
stronger the emotive charge of swear words in that language. Bilingual speakers
code-switch to L2 to distance themselves from what they say (Bond and Lai 1986;
Javier and Marcos 1989). Thus, the obscene language, insults, and other forms of
impoliteness may have been more extreme than if the posters had communicated in
Hebrew.
However, there is another possibility: Because the posters come from a more
disputatious culture than mainstream American culture, the influence of Hebrew
language and culture may have predominated over that of typing in L2. While
I cannot establish which of these possibilities prevailed, the analysis points to ob-
jectively identifiable influences of Hebrew, including strategic use of nicknames
and code-mixing (although not code-switching) and linguistic transfers.
This exploratory analysis suggests that flaming is influenced by a greater var-
iety of factors than has generally been discussed until now, notably, linguistic and
cultural ones. Further studies of flaming and impoliteness in bilingual and multi-
lingual online settings are needed to extend our understanding of this complex phe-
nomenon.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 655

Notes

1. I thank Shoshana Blum-Kulka, Tamar Katriel, Ayelet Kohn, Motti Neiger, Esther
Schely-Newman, Eli Salzberger, Fania Oz-Salzberger, Carmel Vaisman, the anonymous
reviewers, and the editors for their comments.
2. See Alonzo and Aiken (2004); Culman and Markus (1987); Joinson (1998); Kiesler,
Siegel, and McGuire (1984); Siegel, Dubrovsky, Kiesler, and McGuire (1986); Suler
(2004); Thompsen (1996); Thompsen and Foulger (1996); Turnage (2007).
3. See Baron (1998); Dery (1994); Dubrovsky, Kiesler, and Sethna (1991); Herring
(1994); Kiesler, Siegel, and McGuire (1984); Korenman and Wyatt (1996); Lea, O’Shea,
Fung, and Spears (1992); Parks and Floyd (1995); Thompsen (1996); Thompsen and
Foulger (1996).
4. In colloquial Arabic, dugri means ‘straight’, as in “straight road” (Katriel 1986: 11).
5. There is an English-language daily as well as English editions of some Hebrew papers.
6. The Hebrew term should be du-krav.
7. I follow the transliteration system of Berman and Armon-Lotem (1990) and Blum-
Kulka (1997).
8. Subscribers do not necessarily see all citations; one would have to scroll down to see all
cited material.
9. Gad is referring here to the American “Cold Stone Creamery” ice cream chain.
10. In ritual insults (Labov 1972), the utterance is not intended to hurt and is not experi-
enced as such; the recipient does not contest its truth value, retorting instead with an-
other stylized insult.

References

Abrahams, Roger
1973 Playing the dozens. In: Alan Dundes (ed.), Mother Wit from the Laughing Bar-
rel: Readings in the Interpretation of Afro-American Folklore, 295–309.
Englewood Cliffs, NJ: Prentice-Hall.
Aiken, Milam and Bennie Waller
2000 Flaming among first-time group support system users. Information and Man-
agement 37(2): 95–100.
Alonso, Andoni and Iñaki Arzoz
2006 Basque Cyberculture: From Digital Euskadi to Cybereuskalherria. Reno, NV:
Center for Basque Studies, University of Nevada.
Alonzo, Mei and Milam Aiken
2004 Flaming in electronic communication. Decision Support Systems 36(3):
205–213.
Androutsopoulos, Jannis K.
2007 Language choice and code-switching in German-based diasporic web forums.
In: Brenda Danet and Susan C. Herring (eds.), The Multilingual Internet: Lan-
guage, Culture, and Communication Online, 340–361. New York: Oxford Uni-
versity Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
656 Brenda Danet

Austin, John L.
1975 How To Do Things with Words. Revised, edited by Marina Sbisà and J. O. Urm-
son. Oxford, UK: Clarendon Press.
Avgerinakou, Anthi
2003 Flaming in computer-mediated interaction. In: Colin B. Grant (ed.), Rethinking
Communicative Interaction: New Interdisciplinary Horizons, 273–293. Am-
sterdam/Philadelphia: John Benjamins.
Baron, Naomi S.
1998 Letters by phone or speech by other means: The linguistics of email. Language
and Communication 18: 133–170.
Baroz, Nitza Baharuzi (ed.)
2005 Pashkevilim: Modaot Kir uKrazot Pulmus baRexov haXaredi. [Pashkevilim:
Contentious Wall Posters on the Ultra-orthodox Street.] Tel Aviv/Jerusalem:
Ha’aretz Museum and Yad Ben Zvi.
Bauman, Richard
1992 Performance. In: Richard Bauman (ed.), Folklore, Cultural Performances, and
Popular Entertainments: A Communications-Centered Handbook, 41–49.
New York: Oxford University Press.
Berman, Ruth Aronson and Sharon Armon-Lotem
1990 Transcription and Coding Conventions: Language Acquisition Project. Work-
ing Paper no. 6. Tel Aviv: Tel Aviv University.
Black, Bob and Adam Parfrey (eds.)
1989 Rants and Incendiary Tracts: Voices of Desperate Illumination, 1558 – Pres-
ent. New York: Amok Press.
Blais, Dotan
2001 “Walla chat” – xevra, kehila, zehut: Mabat etnografi al tchat yisraeli. [“Walla
chat” – society, community, identity: An ethnographic view of Israeli chat.]
Kesher 30: 77–92.
Blondheim, Menahem and Shoshana Blum-Kulka
2001 Literacy, orality, television: Mediation and authenticity in Jewish conversa-
tional arguing 1–2000 C.E. The Communication Review 4: 511–540.
Blum-Kulka, Shoshana
1987 Indirectness and politeness in requests: Same or different? Journal of Prag-
matics 11(2): 131–146.
Blum-Kulka, Shoshana
1997 Dinner Talk: Cultural Patterns of Sociability and Socialization in Family Dis-
course. Mahwah, NJ: Lawrence Erlbaum.
Blum-Kulka, Shoshana, Menahem Blondheim, and Gonen Hacohen
2002 Traditions of dispute: From negotiations of Talmudic texts to the arena of
political discourse in the media. Journal of Pragmatics 34: 1569–1594.
Blum-Kulka, Shoshana, Brenda Danet, and Rimona Gherson
1985 The language of requesting in Israeli society. In: Joseph P. Forgas (ed.),
Language and Social Situations, 113–139. New York/Berlin: Springer-
Verlag.
Blum-Kulka, Shoshana, Juliane House, and Gabriele Kasper (eds.)
1989 Cross-cultural Pragmatics: Requests and Apologies. Norwood, NJ: Ablex.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 657

Blum-Kulka, Shoshana and Tamar Katriel


1991 Nicknaming practices in families: A cross cultural perspective. In: Stella Ting
Toony and Felipe Korzenny (eds.), Cross Cultural Interpersonal Communi-
cation, 58–78. Newbury Park, CA: Sage.
Bond, Michael H. and Tat-Ming Lai
1986 Embarrassment and codeswitching into a second language. The Journal of So-
cial Psychology 126: 179–186.
Brown, Penelope and Stephen C. Levinson
1987 Politeness: Some Universals in Language Usage. Cambridge, UK: Cambridge
University Press.
Crystal, David
2006 Language and the Internet, 2nd Ed. Cambridge, UK: Cambridge University Press.
Culman, Mary I. and M. Lynne Markus
1987 Information technologies. In: Fredric M. Jablin (ed.), Handbook of Organiz-
ational Communication: An Interdisciplinary Perspective, 420–442. Newbury
Park, CA: Sage.
Culpeper, Jonathan
1996 Towards an anatomy of impoliteness. Journal of Pragmatics 25: 349–367.
Culpeper, Jonathan
2005 Impoliteness and entertainment in the television quiz show: The Weakest Link.
Journal of Politeness Research 1(1): 35–72.
Culpeper, Jonathan, Derek Bousfield, and Anne Wichmann
2003 Impoliteness revisited: With special reference to dynamic and prosodic as-
pects. Journal of Pragmatics 35: 1545–1579.
Danet, Brenda
1998 Flaming. In: Paul Bouissac (ed.), Encyclopedia of Semiotics, 246–247. New
York: Oxford University Press.
Danet, Brenda
2001 Cyberpl@y: Communicating Online. Oxford: Berg.
Danet, Brenda and Susan C. Herring (eds.)
2003 The Multilingual Internet: Language, Culture, and Communication in Instant
Messaging, Email, and Chat. Special issue, Journal of Computer-Mediated
Communication 9(1). http://onlinelibrary.wiley.com/doi/10.1111/jcmc.
2003.9.issue-1/issuetoc
Danet, Brenda and Susan C. Herring
2007a Multilingualism on the Internet. In: Marlis Hellinger and Anne Pauwels (eds.),
Language and Communication: Diversity and Change, 555–594. Handbook of
Applied Linguistics 9. Berlin: Mouton de Gruyter.
Danet, Brenda and Susan C. Herring (eds.)
2007b The Multilingual Internet: Language, Culture, and Communication Online.
New York: Oxford University Press.
De Klerk, Vivian
1997 The role of expletives in the construction of masculinity. In: Sally Johnson and
Ulrike Hanna Meinhof (eds.), Language and Masculinity, 144–158. Cam-
bridge, MA: Blackwell.
Dery, Mark (ed.)
1994 Flame Wars: The Discourse of Cyberculture. Durham, NC: Duke University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
658 Brenda Danet

Dewaele, Jean-Marc
2004a Blistering barnacles! What language do multilinguals swear in?! Estudios de
Sociolinguistica 5(1): 83–105.
Dewaele, Jean-Marc
2004b The emotional force of swearwords and taboo words in the speech of multi-
linguals. Journal of Multilingual and Multicultural Development 25(2–3):
204–222.
Doniach, Nakdimon S. and Ahuvia Kahane
1998 The Oxford English-Hebrew Dictionary. New York: Oxford University Press.
Dubrovsky, Vitaly J., Sara Kiesler, and Beheruz N. Sethna
1991 The equalization phenomenon: Status effects in computer-mediated and
face-to-face decision-making groups. Human-Computer Interaction 6(2):
119–146.
Edwards, Viv and Thomas J. Sienkewicz
1990 Oral Cultures Past and Present: Rappin’ and Homer. Oxford, UK: Basil
Blackwell.
Eelen, Gino
2001 A Critique of Politeness Theories. Manchester/Northampton: St. Jerome.
Fialkova, Larisa
2005 Emigrants from the FSU and the Russian-language Internet. Toronto Slavic
Quarterly 12. http://www.utoronto.ca/tsq/12/fialkova12.shtml
Goffman, Erving
1967 Interaction Ritual: Essays on Face-to-face Behavior. Garden City, NY: Anchor
Books.
Goffman, Erving
1971 Relations in Public. Harmondsworth: Penguin.
Goffman, Erving
1974 Frame Analysis: An Essay on the Organization of Experience. New York:
Harper and Row.
Goffman, Erving
1979 Footing. Semiotica 25: 1–29.
Golan, Galia
1997 Militarization and gender: The Israeli experience. Women’s Studies Inter-
national Forum 20(5): 581–586.
Grice, H. Paul
1975 Logic and conversation. In: Peter Cole and Jerry L. Morgan (eds.), Syntax and
Semantics 3: Speech Acts, 41–58. New York: Academic Press.
Hacohen, Gonen
2001 Jewish argumentation: Conversational features of two forms of arguments in
Israel. Unpublished M.A. thesis, The Hebrew University of Jerusalem. [In
Hebrew]
Halama, Alta Cools
1996 Flytes of fancy: Boasting and boasters from Beowulf to gangsta rap. Essays in
Medieval Studies 13: 81–93.
Halperin-Kaddari, Ruth
2004 Women in Israel: A State of Their Own. Philadelphia, PA: University of Penn-
sylvania Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 659

Handelman, Don
1976 Play and ritual: Complementary frames of meta-communication. In: Antony J.
Chapman and Hugh C. Foot (eds.), It’s a Funny Thing, Humour, 185–192. Lon-
don: Pergamon.
Harrison, Sandra
2004 Subverting conversational repair in computer-mediated communication:
Pseudo repair and refusal to repair in a hostile email discussion. In: Mike Bay-
nam, Alice Deignan, and Goodith White (eds.), Applied Linguistics at the In-
terface, 63–77. British Studies in Applied Linguistics 19. London: BAAL
Equinox.
Harrison, Sandra
2007 Transgressions, miscommunication, and flames: Problematic incidents in
email discussions. In: Mia Consalvo and Caroline Haythornthwaite (eds.),
AOIR Internet Annual 4: 105–117. New York: Peter Lang.
Helmreich, William B.
1982 The World of the Yeshiva: An Intimate Portrait of Orthodox Jewry. New York/
London: Free Press and Collier Macmillan.
Herring, Susan C.
1994 Politeness in computer culture: Why women thank and men flame. In: Mary
Bucholtz, Anita C. Liang, Laurel Sutton, and Caitlin Hines (eds.), Cultural
Performances: Proceedings of the Third Berkeley Women and Language Con-
ference, 278–294. Berkeley, CA: Berkeley Women and Language Group.
Herring, Susan C.
2003 Gender and power in online communication. In: Janet Holmes and Miriam
Meyerhoff (eds.), The Handbook of Language and Gender, 202–228. Oxford,
UK: Blackwell.
Herzog, Hanna
2004 Women in Israeli society. In: Uzi Rebhun and Chaim I. Waxman (eds.), Jews in
Israel: Contemporary Social and Cultural Patterns, 195–220. Hanover, NH:
Brandeis University Press and University Press of New England.
Hinrichs, Lars
2006 Codeswitching on the Web: English and Jamaican Creole in E-Mail Communi-
cation. Amsterdam/Philadelphia: John Benjamins.
Hoffman, Eva
1989 Lost in Translation: A Life in a New Language. New York: Penguin.
Horowitz, Dan and Moshe Lissak
1990 Metsukot be-Utopiah: Yisrael – Xevrah beOmes-yeter. [Trouble in Utopia: Is-
rael, an Overburdened Society.] Tel Aviv: Am Oved.
Huddersfield University and Lancaster University
2006 Linguistic Impoliteness and Rudeness: Confrontation and Conflict in Dis-
course. Conference abstracts: http://www2.hud.ac.uk/mhm/english/research/
conferences/mhm-eng-conference-downloads/LIAR-2006-Abstracts.pdf
Izraeli, Dafna N.
1992 Culture, policy, and women in dual-earner families in Israel. In: Suzan Lewis,
Dafna N. Izraeli, and Helen M. Hootsmans (eds.), Dual-earner Families: In-
ternational Perspectives, 19–45. Thousand Oaks, CA: Sage.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
660 Brenda Danet

Javier, Rafael A. and Luis R. Marcos


1989 The role of stress on the language-independence and codeswitching phenom-
ena. Journal of Psycholinguistic Research 18: 449–472.
Joinson, Adam N.
1998 Causes and implication of disinhibited behavior on the Internet. In: Jayne
Gackenbach (ed.), Psychology and the Internet: Intrapersonal, Interpersonal,
and Transpersonal Implications, 43–60. San Diego, CA: Academic Press.
Jucker, Andreas H. and Irma Taavitsainen
2000 Diachronic speech act analysis: Insults from flyting to flaming. Journal of His-
torical Pragmatics 1(1): 67–95.
Kasper, Gabriele
1990 Linguistic politeness: Current research issues. Journal of Pragmatics 14:
193–218.
Katriel, Tamar
1986 Talking Straight: Dugri Speech in Israeli Sabra Culture. Cambridge, UK:
Cambridge University Press.
Katriel, Tamar
1999 Milot mafteah: Defuse tarbut ve-tikshoret b’Ysrael. [Keywords: Patterns of
Culture and Communication in Israel.] Haifa/Tel-Aviv: University of Haifa
and Zemorah-Bitan.
Kaul, Asha and Vaibhavi Kulkarni
2005 Coffee, tea, or …? Gender and politeness in computer-mediated communi-
cation (CMC). Indian Institute of Management Ahmedabad Working Papers
2005–04–02. Vastapur, Ahmedabad: IIMA Research and Publication Depart-
ment. http://www.iimahd.ernet.in/publications/data/2005–04–02ashakaul.pdf
Kayany, Joseph M.
1998 Contexts of uninhibited online behavior: Flaming in social newsgroups on
Usenet. Journal of the American Society for Information Science 49(12):
1135–1141.
Kienpointner, Manfred
1997 Varieties of rudeness: Types and functions of impolite utterances. Functions of
Language 4(2): 251–287.
Kiesler, Sara, Jane Siegel, and Timothy McGuire
1984 Social psychological aspects of computer-mediated communication. American
Psychologist 39(10): 1123–1134.
Kimmerling, Baruch
2001 The Invention and Decline of Israeliness: State, Society, and the Military. Ber-
keley, CA: University of California Press.
Kochman, Thomas
1983 The boundary between play and nonplay black verbal dueling. Language in
Society 12: 239–238.
Kohn, Ayelet and Motti Neiger
2007 To talk and to talkback: Nituax haretorika shel hasiax-t’guva (talkback) baito-
nut ham’kuvenet. [To talk and to talkback: A rhetorical analysis of talkback
discourse in online journalism.] In: Tehilla Schwartz-Altschuler (ed.), Itonut
dot.com: Itonut m’kuvenet b’yisrael [Dot.com Journalism: Online Journalism
in Israel], 321–350. Jerusalem/Beersheba: Israel Democracy Institute and
Burda Center for Innovative Communications, Ben Gurion University.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 661

Korenman, Joan and Nancy Wyatt


1996 Group dynamics in an e-mail forum. In: Susan C. Herring (ed.), Computer-
Mediated Communication: Linguistic, Social, and Cross-Cultural Perspectives,
225–242. Amsterdam/Philadelphia: John Benjamins.
Labov, William
1972 Rules for ritual insults. In: David Sudnow (ed.), Studies in Social Interaction,
120–169. New York: Macmillan.
Lakoff, Robin
1973 The logic of politeness: Or minding your p’s and q’s. Chicago Linguistics So-
ciety 8: 292–305.
Lea, Martin, Tim O’Shea, Pat Fung, and Russell Spears
1992 “Flaming” in computer-mediated communication. In: Martin Lea (ed.), Con-
texts of Computer-mediated Communication, 91–112. Hemel Hempstead, UK:
Harvester Wheatsheaf.
Leech, Geoffrey
1983 Principles of Pragmatics. London: Longman.
Lemish, Dafna and Irit Lahav
2004 Much ado about nothing? Masculinities in Israeli advertising. Feminist Media
Studies 4(2): 147–163.
Lemish, Dafna and Chava E. Tidhar
1999 Still marginal: Women in Israel’s 1996 television election campaign. Sex Roles
41(5–6): 389–412.
Levy, Yaacov (ed.)
1995 Oxford English-Hebrew/Hebrew-English Dictionary. Tel Aviv: Kernerman
and Lonnie Kahn.
Marcoccia, Michel
2004 La citation automatique dans les messageries électroniques. In: Juan Manuel
López-Muñoz, Sophie Marnette, and Laurence Rosier (eds.), Le discours rap-
porté dans tous ses états, 467–478. Paris: L’Harmattan.
Maricic, Ibolya
2005 Face in Cyberspace: Facework, (Im)politeness, and Conflict in English Dis-
cussion Groups. [Ph.D. dissertation.] Växjö: Växjö University Press.
Matisoff, James A.
1979 Blessings and Curses, Hopes and Fears: Psycho-Ostensive Expressions in Yid-
dish. Philadelphia: Institute for the Study of Human Issues.
McClure, Erica
2001 The role of language in the construction of ethnic identity on the Internet: The
case of Assyrian activists in diaspora. In: Christoper Moseley, Nicholas Ostler,
and Hassan Ouzzate (eds.), Endangered Languages and the Media: Proceed-
ings of the Fifth FEL Conference, Agadir, Morocco, 20–23 September, 2001,
68–75. Bath, UK: Foundation for Endangered Languages.
McKee, Heidi
2002 “YOUR VIEWS SHOWED TRUE IGNORANCE!!!”: (Mis)communication
in an online interracial discussion forum. Computers and Composition 19(4):
411–434.
Mills, Sara
2002 Rethinking politeness, impoliteness and gender identity. In: Evangelia Litos-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
662 Brenda Danet

seliti and Jane Sutherland (eds.), Discourse Analysis and Gender Identity,
69–89. Amsterdam/Philadelphia: John Benjamins.
Myerhoff, Barbara G.
1994 Number Our Days: Culture and Community among Elderly Jews in an Ameri-
can Ghetto. New York: Meridian.
Oliveira, Sandi Michele de
2003 Breaking conversational norms on a Portuguese users network: Men as adjudi-
cators of politeness? Journal of Computer-Mediated Communication 9(1).
http://jcmc.indiana.edu/vol9/issue1/
Olshtain, Elite and Andrew D. Cohen
1983 Apology: A speech act set. In: Nessa Wolfson and Elliot Judd (eds.), Sociol-
inguistics and Language Acquisition,18–35. Rowley, MA: Newbury House.
O’Sullivan, Patrick B. and Andrew J. Flanagin
2003 Reconceptualizing “flaming” and other problematic messages. New Media &
Society 5(1): 69–94.
Owen, Marion
1983 Apologies and Remedial Interchanges: A Study of Language Use in Social In-
teraction. Berlin/New York: Mouton.
Panyametheekul, Siriporn and Susan C. Herring
2003 Gender and turn allocation in a Thai chat room. Journal of Computer-Mediated
Communication 9(1). http://jcmc.indiana.edu/vol9/issue1/panya_herring.html
Paolillo, John C.
1996 Language choice on soc.culture.punjab. Electronic Journal of Communication
6(3). http://www.cios.org/EJCPUBLIC/006/3/006312.HTML
Parks, Malcolm R. and Keri Floyd
1995 Making friends in cyberspace. Journal of Computer-Mediated Communication
1(4). http://jcmc.indiana.edu/vol1/issue4/
Parks, Ward
1986 Flyting, sounding, debate: Three verbal contest genres. Poetics Today 7:
439–458.
Parks, Ward
1990 Verbal Dueling in Heroic Narrative: The Homeric and Old English Traditions.
Princeton, NJ: Princeton University Press.
Pavlenko, Anna
2005 Emotions and Multilingualism. Cambridge/New York: Cambridge University
Press.
Reinig, Bruce A. and Roberto J. Mejias
2004 The effects of national culture and anonymity on flaming and criticalness in
GSS-supported discussions. Small Group Research 35(6): 698–723.
Rosenthal, Ruvik
2005 Milon hasleng hamekif. [The Comprehensive Slang Dictionary.] Tel Aviv:
Keter.
Russell, Mark (ed.)
1997 Out of Character: Rants, Raves, and Monologues from Today’s Top Perform-
ance Artists. New York: Bantam Books.
Salzberger, Eli and Fania Oz-Salzberger
2006 Masoret xofesh habitui b’yisrael. [The tradition of freedom of speech in Israel.]

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
Flaming and linguistic impoliteness on a listserv 663

In: Michael Birnhack (ed.), Sheket, hem medabrim: Hatarbut hamishpatit shel
xofesh habitui b’yisrael [Quiet, Someone is Speaking! The Legal Culture of
Free Speech in Israel], 27–69. Tel Aviv: Ramot Publishers.
Schiffrin, Deborah
1984 Jewish argument as sociability. Language in Society 13: 311–335.
Searle, John
1976 A classification of illocutionary acts. Language in Society 5(1): 1–23.
Severinson Eklundh, Kerstin
2010 To quote or not to quote: Setting the context for computer-mediated dialogues.
Language@Internet 7, article 5.
http://www.languageatinternet.org/articles/2010/2665
Shakhar, Il-Il
2005 Emek haSilicon b’yadenu. [Silicon valley is in our hands.] Maariv, September
22. http://www.nrg.co.il/online/16/ART/987/062.html
Siegel, Jane, V. Dubrovsky, Sara Kiesler, and Timothy W. McGuire
1986 Group processes in computer-mediated communication. Organizational Beha-
vior and Human Decision Processes 37(2): 157–187.
Spolsky, Bernard
1997 Multilingualism in Israel. Annual Review of Applied Linguistics 17: 138–150.
Spolsky, Bernard and Elana G. Shohamy
1999 The Languages of Israel: Policy, Ideology, and Practice. Clevedon/Buffalo:
Multilingual Matters.
Statistics, Central Bureau of
2004 On the 56th anniversary of Israel’s independence the population of Israel
numbers 6.8 million. April 25. http://www.cbs.gov.il/hodaot2004/01_04_98e.htm
Suler, John
2004 The disinhibition effect. CyberPsychology & Behavior 7: 321–326.
Tannen, Deborah
1981 New York Jewish conversational style. International Journal of the Sociology
of Language 30: 133–149.
Tannen, Deborah
1984 Conversational Style: Analyzing Talk among Friends. Norwood, NJ: Ablex.
Tannen, Deborah (ed.)
1993 Framing in Discourse. New York: Oxford University Press.
Tanskanen, Sanna-Kaisa
2001 Avoiding conflict in computer-mediated discussions, or, fear of flaming. In:
Risto Hiltunen, Keith Battarbee, Matti Peikola, and Sanna-Kaisa Tanskanen
(eds.), English in Zigs and Zags, 227–242. Anglicana Turkuensia 23. Turku:
University of Turku.
Thompsen, Philip A.
1996 What’s fueling the flames in cyberspace? A social influence model. In: Lance
Strate, Ron Jacobson, and Stephanie B. Gibson (eds.), Communication and
Cyberspace: Social Interaction in an Electronic Environment, 297–315. Cress-
kill, NJ: Hampton Press.
Thompsen, Philip A. and Davis A. Foulger
1996 Effects of pictographs and quoting on flaming in electronic mail. Computers in
Human Behavior 12(2): 225–243.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
664 Brenda Danet

Turnage, Anna K.
2007 Email flaming behaviors and organizational conflict. Journal of Computer-
Mediated Communication 13(1), article 3. http://www.blackwell-synergy.com/
doi/full/10.1111/j.1083–6101.2007.00385.x
Vrooman, Steven S.
2002 The art of invective: Performing identity in cyberspace. New Media & Society
4(1): 51–70.
Weimann, Gabriel
2000 Gender differences in Israeli television commercials. Megamot 40(3):
466–485. [In Hebrew]
Wex, Michael
2005 Born to Kvetch: Yiddish Language and Culture in All its Moods. New York:
St. Martin’s Press.
Wright, Sue (ed.)
2004 Multilingualism on the Internet. International Journal on Multicultural So-
cieties 6. http://www.unesco.org/new/en/social-and-human-sciences/resources/
periodicals/diversities/past-issues/vol-6-no-1-2004/
Yishai, Yael
1997 Between the Flag and the Banner: Women in Israeli Politics. Albany, NY:
State University of New York Press.
Zilkha, Avraham
2002 Modern English-Hebrew Dictionary. New Haven, CT: Yale University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:54 AM
27. Code-switching in computer-mediated
communication
Jannis Androutsopoulos

1. Introduction

This chapter discusses how processes known as code-switching and code-mixing


manifest in computer-mediated communication (CMC). Code-switching is gen-
erally defined as “juxtaposition within the same speech exchange of passages of
speech belonging to two different grammatical systems or subsystems” (Gumperz
1982: 59) or as “the use of more than one linguistic variety, by a single speaker in
the course of a single conversation” (Heller and Pfaff 1996: 594). Depending on
approach, code-mixing is defined as the juxtaposition of linguistic codes within a
single sentence or as an alternation of codes that lacks a specific pragmatic func-
tion. Code-switching and code-mixing are common linguistic practices among bi-
lingual and multilingual people and therefore easily find their way into communi-
cation via digital media. The research literature discussed in this chapter offers
examples of code-switching in a wide range of CMC modes and social settings, in-
cluding texting among South African young people, chatting among second-gen-
eration Indians, emails among Egyptian professionals, forum discussions among
Persian expatriates, and fan fiction by Finnish bloggers.
Even though code-switching (CS) online attracted the attention of linguists as
early as the mid-1990s (Georgakopoulou 1997; Paolillo 1996), it remains less well
researched in comparison to other linguistic processes in CMC.1 The topic is
equally under-researched in contact linguistics and multilingualism studies (see
Dorlein and Nortier 2009). In a study of written CS, Callahan (2004: 92) claims
that “[t]he majority of code-switching in nonfiction […] is found in advertising and
journalistic writing”. This marginalisation of CS bears no relation to the spread of
the practice itself. Given the importance of multilingualism and the pervasiveness
of digital media worldwide, it seems safe to assume that digitally-mediated com-
munication (via both networked computers and mobile networked devices) offers
opportunities for written CS on an unprecedented scale.
CS in CMC is relevant not only because it is there (and not yet well understood)
but also for the insights it can offer to pragmatics, sociolinguistics, and discourse
studies. By its very nature, CS calls into question a number of assumptions that
have dominated linguistic scholarship, such as the discreteness of linguistic sys-
tems and the primacy of monolingualism as the default condition of language in so-
ciety (Heller and Pfaff 1996). Likewise, the study of CS challenges fundamental
assumptions in CMC studies. Early linguistic research on CMC focused on lan-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
668 Jannis Androutsopoulos

guage/technology relations, and some of its key categories are conceived and best
operate within a monolingual frame, such as the position of computer-mediated
discourse between spoken and written language. However, CS defies easy classifi-
cations based on media factors alone, and it requires an emphasis on the interre-
lation of medium and social/situation factors (Herring 2007). Moreover, CMC as a
discourse field challenges the assumption that spoken face-to-face interaction is
the essential site of code-switching.
Based on research literature on several languages,2 the aim of this chapter is to
organise the available research evidence, identify commonly asked and still un-
tapped questions, and pinpoint limitations of present scholarship. The chapter does
not claim to offer a comprehensive overview of forms and functions of CS on the
Internet; rather, it can only outline how CS has been studied in the languages and
sociolinguistic settings I have been able to identify in the literature (section 4).
Still, the available literature offers ample evidence that CMC is a site for the mean-
ingful use of language alternation, and a critical synthesis of available research can
offer insights into what are promising perspectives for further research, as well as
what methods have been mainly used.
The organisation of this chapter is as follows: After a brief outline of code-
switching research frameworks (section 2), I distinguish between conversational
and non-conversational CS in CMC and delimit both from other patterns of multi-
lingualism online (section 3). The subsequent two sections provide an overview of
research (section 4) and discuss the different types of settings in which CS in CMC
has been studied (section 5). The next section turns to forms and functions of CS
online (sections 6). The chapter concludes with a discussion of CMC as a new do-
main for CS (section 7) and an outlook for future research (section 8).

2. Code-switching frameworks

The question of what patterns of CS are attested in CMC environments cannot be


answered independently of the frameworks within which CS is studied. In general,
four points characterize the state of the art:
– Researchers do not use one single framework of CS analysis but rather a
number of different approaches.
– A generally accepted methodology that takes the specifics of CMC into ac-
count has not yet been developed. Researchers draw on frameworks originally
developed for the analysis of spoken discourse, despite criticisms of the ad-
equacy of such frameworks (Hinrichs 2006: 28–30; Leppänen and Peuronen
2012).
– The predominant perspective is pragmatic and sociolinguistic rather than
grammatical and linguistic (see also Dorleijn and Nortier 2009: 133). While

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 669

structural descriptions are not entirely absent from the extant literature, its
main aim has been to understand the pragmatic functions, social purposes, and
interactional dynamics of CS online.
– The correspondence of online written CS to its offline spoken counterpart is a
common concern, but it is also a contested issue, as will become obvious in this
chapter.

In terms of frameworks, the literature contains elements of the “three most in-
fluential contributions to theory in the sociolinguistic branch of CS studies” (Hin-
richs 2006: 28): The first is the markedness model of Carol Myers-Scotton (1993),
in particular her concepts of code-switching as a marked (i.e., unexpected, uncon-
ventional) or unmarked (expected) choice. Second are concepts introduced by John
J. Gumperz (1982), such as the distinction between situational and metaphorical
CS, the distinction between “we-code” and “they-code”, his classification of dis-
course functions of conversational CS, and the notion of CS as a contextualization
cue. Thirdly, researchers also draw on the conversation-analytic framework for the
study of bilingual interaction by Peter Auer (1995, 1998b, 1999, 2000), which
builds on and develops some of Gumperz’ ideas.3 Other repeatedly used concepts
include the syntactic distinction between inter- and intra-sentential CS; concepts
from pragmatics such as politeness, face, and interpersonal alignment (e.g., Geor-
gakopoulou 1997); Myers-Scotton’s notion of matrix language; and Auer’s notion
of base language, which refers to the backdrop against which switches to another
language or dialect become meaningful.
In terms of discourse functions of CS, the classifications by Gumperz (1982)
and Auer are widely used in the literature, e.g., by Androutsopoulos (2006a,
2007a), Sebba (2003), Androutsopoulos and Hinnenkamp (2001), and Paolillo
(1996, 2011). Both conceive of CS as a contextualization cue, i.e., a resource used
by participants to frame their interpretations of what is being said. In a nutshell,
Gumperz’ categories include: switching for reported speech; addressee specifi-
cation; clarification, emphasis, expressivity; message qualification (e.g., separat-
ing facts from comment); and contrasting personal with objective viewpoints.
Auer distinguishes between preference- (or participant-)related and discourse-re-
lated CS. The first comprises switches that suit the speaker’s or addressee’s pref-
erence, as well as instances of language negotiation between the interlocutors.4
Discourse-related switching in a conversational episode “contributes to the organ-
ization of discourse in that particular episode” (Auer 1995: 125). Its subtypes par-
tially overlap with those by Gumperz, one important addition being the focus on
CS as a device for the internal organization of conversational turns. How these cat-
egories have been applied to CS in CMC is discussed in the overview of research
findings below (section 6).
The limitations of a conversation-analytic approach with respect to CMC data
are well discussed in the CMC literature (e.g., Beißwenger 2008; Herring 1999).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
670 Jannis Androutsopoulos

CMC technologies rule out one key mechanism of conversational organisation, the
turn-taking system; more generally, the lack of visual channels – and, in asyn-
chronous CMC, the temporal gap between contributions – means that important di-
mensions of the interactional co-construction of meaning are altered or restricted.
However, these restrictions do not rule out the sequential organization of com-
puter-mediated discourse,5 which can be studied with conversation analytic cat-
egories (see, e.g., the chapters in this volume by Jacobs and Garcia, Markman, and
Skovholt and Svennevig). Furthermore, CMC research has established that users
develop creative procedures to cope with these limitations, including the usage
of specific turn-taking signals and linguistic innovations such as emoticons and
laughter acronyms. Related to this, and specifically relevant to CS, is Georgako-
poulou’s (1997) suggestion that the lack of ordinary contextualization cues due to
the absence of the visual channel “results in an increased reliance on code-centered
contextualization cuing, which would be otherwise delegated to different signals”
(158). In other words, CMC interlocutors use code-switching, style shifting, and
other manipulations of written signs in order to accomplish pragmatic work that
would be accomplished by phonological variation, prosody, gaze, posture, and other
cues in ordinary spoken conversation. This establishes a productive theoretical link
between linguistic choices, communicative practices, and media affordances.
These are elements of a basic theoretical vocabulary which CMC researchers
appropriate, articulate, and apply in different ways. For example, Hinrichs (2006)
combines ideas from all three frameworks with categories from Creole linguistics.
Leppänen (2007) draws on the four types of language alternation in Auer’s frame-
work (i.e., insertional switching, insertional mixing, alternational switching, and
alternational mixing) to examine alternation between Finnish and English in a
range of digital genres. Androutsopoulos (2006a, 2007a) defines the discussion
thread of web forums as the equivalent of a conversational episode and therefore as
the level at which to determine the base language of discussion (cf. Auer 2000),
against which the directionality of switches is examined.

3. Distinguishing code-switching from multilingualism


in computer-mediated discourse

As illustrated by the introductory definitions, CS is typically thought of as a pro-


cess of (informal or institutional) spoken interaction. This raises the question of
how to transfer defining conditions such as “speech exchange” or “conversational
episode” to computer-mediated discourse (CMD), where language is typed and the
very notion of conversation is contested, as discussed earlier. A rather restrictive
reading would be to limit the scope to what has been identified as “interactive
written discourse” (Ferrara, Brunner, and Whittemore 1991), i.e., dyadic or multi-
party verbal exchanges via technologies of synchronous CMC such as Internet

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 671

Relay Chat, web-based chat systems, or Instant Messaging, which some re-
searchers identify as the closest approximations of spoken conversation. However,
a considerable part of the literature examines CS in asynchronous (dyadic or multi-
party) CMD, in particular email, newsgroups, web forums, and texting. Still other
researchers have located bilingual discourse in edited genres aimed at a reading
audience, such as weblogs and fan fiction. These, in turn, are reminiscent of more
traditional written CS, which is a practice known at least since medieval poetry and
ranges from fictional representations of conversational dialogue (as in novels or
stageplay) to diary writing and newspaper discourse (Androutsopoulos 2007b;
Callahan 2004). The approach advocated here is an inclusive one. I suggest that
there is no a priori reason not to consider blogs or social networking profile pages
as sites of bilingual discourse. Nevertheless, a terminological and analytical dis-
tinction is required between two main types of CS in CMC: For convenience, I
shall call them “conversational” (dyadic or multiparty, synchronous or asynchron-
ous) and “non-conversational” (edited and published by a single author), bearing in
mind the caveats mentioned earlier.
With these distinctions in mind, CS will now be distinguished from other as-
pects of multilingual CMD. The aim in doing so is to determine when the coexist-
ence of more than one language in CMD constitutes CS and to identify the dis-
course units, or equivalents of a “speech exchange”, in which CS can be located.6 I
distinguish CS from four other patterns of multilingualism in CMC:
a) The “multilingual Internet” as a whole
b) The coexistence of different languages on a web page or thread
c) Language choices for emblems
d) Sequential language choices lacking a dialogical interrelation
The first pattern refers to the multilingualism that emerges from the coexist-
ence of different websites, channels, forums, etc. on the web. For instance, Internet
Relay Chat (IRC) as an entire system is massively multilingual, and so are plat-
forms like flickr and blogger.com in their entirety. While this level is sometimes re-
ferred to in discussions of the multilingual Internet (see, e.g., some chapters in
Danet and Herring 2007a), CS must be located on the more concrete level of indi-
vidual web pages, discussion threads, or chat channel sessions. At this level, it is
necessary to single out the multilingualism that emerges from the coexistence of
different discourse units on a single web page. Contemporary websites are
composed from textual units of diverse kinds and origins – editorial content, user-
generated content, advertisements, graphic-designed banners, user comments –
which are adjacent in screen space. Multilingual surfaces emerge when such adjac-
ent units “speak”, or are cast in, different languages or dialects as a result of dif-
ferent purposes, audiences, or production processes. Consider flickr pages, for
example, where headlines, banners tags, and comments are not necessarily in the
same language (Lee and Barton 2011). Consider media-sharing sites, where the

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
672 Jannis Androutsopoulos

language of posted items is often different from that of comments, and social net-
work profile pages, where different “friends” may contribute wall posts in different
languages. These are multilingual or indeed heteroglossic discourse spaces (An-
droutsopoulos 2011), but they do not automatically constitute instances of CS. To
the extent that their constituents differ in terms of authorship and production pro-
cess, they often cannot be conceived of as part of one “episode”; what holds them
together is their spatial coexistence in product and reception and not their dialogic
orientation to each other. Indeed, the units that make up multilingual web surfaces
are often monolingual in themselves. However, nothing prevents some of these
units from containing CS. Think of an online newspaper where comments to news
items come in different varieties (e.g., standard and dialect) or languages (e.g., the
national and a minority language), thus constituting candidates for CS.
Still at the level of single web pages or threads, the third distinction is between
CS and language choices for emblems, i.e., textual units that identify and represent
individual or institutional actors in CMC. Emblems include website names and
screen names, slogans, user signatures, and navigation bars: They are usually
graphically designed and placed on website layout. There is evidence that emblem-
atic language choices can extend the multilingual make-up of a website or dis-
cussion forum by introducing linguistic resources that are not regularly used in on-
going user discussions or editorial copy (Androutsopoulos 2006a, 2007b). This
strategic allocation of languages leads to a sort of emblematic bilingualism, which
does not challenge the dominant language in terms of informational load but selects
another code as relevant to the identity of an institution or individual. Important as
these processes may be to multilingual discourse on the web, they are not instances
of CS (to the extent that these textual units do not include CS in themselves), even
though they may coexist with instances of CS: Think of a blog that uses emblems in
order to make a minority language visible, while its entries and their comments in-
clude CS between that minority and the respective majority language.
Finally, conversational CMD modes need to be scrutinised in order to assess if
the linguistic diversity they host constitutes CS. Consider IRC, a model case of in-
teractive written discourse. Even if IRC is carried out in a language other than Eng-
lish, the system-generated messages that announce users who are entering or leav-
ing a channel are automatically cast in English (Siebenhaar 2005, 2006). While
they contribute to the multilingual make-up of channels, these automated messages
are not part of participants’ code choices and therefore need to be excluded from
CS analysis (as Siebenhaar explicitly does). In a similar vein, we may ask whether
the lists of comments that respond to a “spectacle” or “prompt” in Web 2.0 environ-
ments (a blog post, photo, video, song, etc.) qualify as instances of CS. Comments
may in principle be posted in any language, and even though the language of the
“prompt” will often make a particular language relevant, it is not uncommon to find
comments in different languages. However, whether these individual code choices
by different commenters are sequentially related to each other needs to be demon-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 673

strated rather than assumed a priori. My observations suggest that comments often
respond to the “prompt” rather than to other posts, and while they all contribute to
the multilingual character of a chain of comments, they are not forcibly instances of
CS (although they can draw on CS, of course, in their own internal organisation).
In conclusion, even though all CS entails a juxtaposition of linguistic codes, as
Gumperz’ seminal definition puts it (see section 1), there is good reason to adapt a
restrictive view of what juxtapositions will constitute CS in CMD. Multilingual
CMD environments are shaped at different levels by contrastive language choices
which are motivated and meaningful, but for these contrasts to qualify as CS, evi-
dence is required that they are in some way dialogically interrelated by responding
to previous, and contextualizing subsequent, contributions.

4. Code-switching across CMC modes

While limited in number, studies of CS in CMC have examined a range of media


modes and sociolinguistic settings, using a range of different methods in the pro-
cess. Table 1 provides an overview of the research summarized in this chapter. Its
main categories – mode, participation framework, languages involved, social set-
tings, and methods – orient both to the distinction between medium and situation
factors in Herring’s (2007) CMD classification scheme and to respective distinc-
tions in studies of code-switching in writing (Callahan 2004). The dimension of
synchronicity (synchronous and asynchronous modes) is not listed separately, as it
is a stable feature of each mode, but it is discussed in detail in the next section.
As regards CMC modes, most literature considers traditional, pre-web modes
of interpersonal CMC (IRC, email, mailing lists, Usenet groups) and only a few
web-based modes (discussion forums). This results in a focus on more language-
heavy modes, whereas multimodally-intensive modes such as media sharing sites
and profile pages are hardly examined. As a consequence, the tantalising question
of how to deal with CS when modes other than written text are heavily involved in
the production of meaning has not been dealt with systematically.7 Nonetheless,
this coverage still allows us to conclude that code-switching may in principle occur
in any CMD mode, be it unidirectional or interactive, synchronous or asynchron-
ous, dyadic or public, private or professional.
The category of participation framework asks what roles of participation are
made possible by and conventionalised in the usage of a given CMD mode. Par-
ticipation structure is a situation factor in Herring’s (2007) classification scheme.
However, it is in part a medium factor as well, since different CMC modes facili-
tate different participation frameworks. Instead of the usual labeling in terms of
number of participants – one-to-one, one-to-many, many-to-many – I prefer the
terms “private” and “public”, the former corresponding to dyadic exchanges or
those among a limited number of known participants, while the latter refers to

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
674 Jannis Androutsopoulos

communication in a public CMD environment such as a channel or forum, which


by definition includes unknown participants. I address the consequences of this
distinction for bilingual discourse below (section 5.2).

Table 1. Classification of selected research publications on code-switching in CMC


(Publications listed by mode and chronologically within each mode. Modes:
s=synchronous, a=asynchronous. Methods: QN=quantitative, QL=qualitative.)
Authors CMC Modes Partici- Languages Participants, Social Methods
pation setting
Paolillo 1996, 2001, IRC (s) Public English/Hindi Ethnic minority QN, QL
2011 Usenet (a) English/Punjabi
Androutsopoulos and IRC (s) Public German/Greek Ethnic minority QL
Hinnenkamp 2001 Turkish/German
Tsaliki 2003 IRC (s) Public Greek/English Ethnic minority QL
Androutsopoulos IRC (s) Public standard German/ Citychat QN, QL
and Ziegler 2004 dialect
Siebenhaar 2005, IRC, Public Swiss German Youth culture, QN, QL
2006, 2008 Web chats (s) dialects/standard Flirt communities
German
Hinnenkamp 2008 IRC (s) Public Turkish/German Ethnic minority QL
Georgakopoulou Email (a) Private Greek (L1)/ Friends group QL
1997, 2004 English
Hinrichs 2006 Email, Private Jamaican Creole Univ students QN, QL
Forums (a) Public (L1)/English Jam. diaspora
Warschauer et al. Email (a) Private English/Egyptian Young QN
2007 Arabic (L1) professionals
Lee 2007 Email (a), Private Cantonese (L1)/ Cantonese QN
ICQ (s) English university students
Goldbarg 2009 Email (a) Private Spanish (L1)/ Graduate students QN
English
Tsiplakou 2009 Email (a) Private Greek (L1)/English/ Fellow academics QN, QL
French/Greek Cypriot
dialect
Deumert and SMS (a) Private isiXhosa (L1)/ Young adults QN, QL
Masinyana 2008 English
McClure 2001 Mailing lists (a) Public English/Assyrian Ethnic minority QL
Sebba 2003 Bulletin Public English (L1)/stylized Pop culture, QL
board (a) Creole Comedy fans
Androutsopoulos Forums, Guest- Public German (L1)/ Music youth QL
2004 books (a) English culture
Sperlich 2005 Forums (a) Public Niuean (L1)/ Local community, QN, QL
English Diaspora
Androutsopoulos Forums (a) Public German/Greek, Per- Ethnic minority QN, QL
2006a, 2006b, 2007b sian, Hindi, Arabic
Leppänen 2007; Forums, Public Finnish (L1)/ Youth cultures, QL
Leppänen et al. Blogs (a) English music, fan fiction,
2009 sports

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 675

The third column lists the languages that are (most) relevant to each study.8 A
number of sociolinguistic constellations are evident here, between majority and
minority (heritage, immigrant, community) language, between national language
and English, between a Creole and its lexifier (Hinrichs 2006), standard and dia-
lect, and standard and stylized vernacular speech (e.g., “Ali G language”, Sebba
2003). Code-switching between varieties of one language is reported from the
Greek- and German-speaking areas and studied along the same functional lines as
bilingual CS. For the sake of overview, this table downplays the few documented
instances of “polylingual languaging” (Hinnenkamp 2008; Jørgensen 2008; Tsi-
plakou 2009), which involves the (playful) use of bits and pieces from different
languages, language varieties, or styles (see sections 6, 7).
The user groups and social settings that are examined in each study are catego-
rised in the fourth column. The label “ethnic minority” brings together situations in
which an immigrant or diasporic group uses a minority and a majority language.
Other labels foreground online practices by young people, youth culture groups, or
local communities, in which relations between national language and English, or
standard and dialect, have been examined. Other documented cases involve multi-
lingual academics or professionals, small language communities (Sperlich 2005),
and a message board devoted to a Creole-speaking comedian (Sebba 2003). The
overview does not mean to suggest rigid constraints between language pairs and
social settings. Some language pairs (especially those involving English) are in-
stantiated in different social settings, with distinct CS patterns in each case. For
example, English/Creole CS shows different patterns in emails among Jamaican
students and on forums by diasporic Jamaicans (Hinrichs 2006). Likewise, CS be-
tween national language and English CS is markedly different in youth-culture
contexts and among elite bilingual expatriates (see section 5).
The rightmost column features a broad distinction between qualitative and
quantitative methods of analysis. The “qualitative” label comprises methods from
conversation, discourse, narrative, or style analysis, which have been used for the
study of both conversational and non-conversational CMD. Such research often
involves elements of online ethnography, whereby researchers work with data
from social networks they themselves belong to (as with Georgakopoulou 1997
and Tsiplakou 2009), and focuses on functions rather than structures of CS.
“Quantitative” encompasses quantifications based on questionnaire data (Gold-
barg 2009; Tsiplakou 2009) or coding of textual data (as with Paolillo 2001; Sie-
benhaar 2008). What is remarkable is the frequency of mixed method approaches,
which combine a “bird’s eye view” of the distribution of languages over a large
data set with a detailed view of local processes of switching and mixing. Sieben-
haar (2008) adds an intermediate level, “windowed or moving average analysis”,
in which quantification zooms in to slices of time or channel activity as opposed
to whole channel comparisons. Leppänen and Peuronen (2012) argue that the
transfer of frameworks developed for the study of spoken language and interac-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
676 Jannis Androutsopoulos

tion to the study of written multilingual CMC is not adequately problematised.


They also point out that when studying edited genres such as blog posts and fan
fiction, methods other than conversation-analytic ones, such as narrative analysis
or stylistics, are required.

5. Code-switching in technological and social context

5.1. Effects of synchronicity


We may now ask which of the categories reviewed in the previous section have
been developed into testable hypotheses. In principle, CS is subject to the entire
range of interrelations between medium and situation factors that “have been ob-
served to condition variation in computer-mediated discourse” (Herring 2007:
n.p.). In the literature, however, there is only one robust hypothesis that is specifi-
cally formulated with a view on CS. It was formulated by John Paolillo (2011),
who, in a study of English/Punjabi in IRC and Usenet, found that IRC data contain
creative conversational CS, whereas Usenet data are limited to formulaic code-
switching (such as quoting poetry and using routine phrases). Paolillo’s generali-
sation is that synchronous modes of CMD will contain more conversational CS
than asynchronous ones, other things being equal. Besides its quantitative sense,
“more” can be understood in a qualitative sense, meaning a broader range of usage
patterns or a richer repertoire of pragmatic functions of CS. Paolillo’s prediction is
independently confirmed by Lee (2007: 203–204), who finds code mixing to be
much more common in ICQ data than in emails by the same users. She attributes
this to both synchronicity and formality, because the emails she studied include in-
stitutional exchanges, whereas her ICQ data are predominantly social interaction.
The synchronicity hypothesis is no doubt a strong one with respect to medium-
specific differences across CMC modes. Synchronous CMC enables exchanges
that unfold over several turns, with rapid transitions and relatively short turns,
thereby resembling social interaction. In asynchronous modes, individual con-
tributions and transition gaps between each contribution tend to be longer, creating
more distance to prototypical interaction. This rationale ties in well with the as-
sumption that synchronous CMC modes are “closer” to spoken language than syn-
chronous ones (e.g., Dorleijn and Nortier 2009: 130). However, it may be difficult
to isolate medium factors from social and situational ones empirically. Lee’s
(2007) case study, in which synchronous and asynchronous data from the same in-
dividuals are compared, is a particularly fortunate one, but in public CMC environ-
ments such as chat channels and newsgroups, discourse is shaped by the techno-
logical properties of CMC synchronicity as much as by social and pragmatic
factors such as individual linguistic repertoires, specific interpersonal relation-
ships, interactional activities, and so on.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 677

Moreover, Paolillo’s hypothesis does not rule out CS in non-conversational


CMC modes. The articulation of CS and mode described by Paolillo for U.S.-based
Hindi and Punjabi communities, such that creative CS holds true for the synchron-
ous mode and fixed CS for the asynchronous mode, does not necessarily hold true
for other sociolinguistic settings. Some of the best examples of the creativity and
playfulness of code-switching online come from asynchronous (but private), rather
than synchronous, public modes (see Georgakopoulou 1997; Sebba 2003; Tsipla-
kou 2009). Hinrichs (2006) argues that the planned character of (asynchronous)
CMC invites rhetorical uses of CS such as double-voicing and stylization. In that
sense, asynchronous (public or dyadic) modes are interesting sites of CS online,
precisely because they differ from the conditions of interpersonal interaction.
Therefore, the synchronicity hypothesis should not lead us to assume that asyn-
chronous modes lag behind synchronous ones in all aspects of CS. It seems more
productive to theorise each mode as affording different opportunities for bilingual
discourse. While synchronous modes enable mediated interaction to unfold in
sequentially-related turns which can be sustained for considerable time, thereby re-
plicating conversational CS to the largest extent possible, asynchronous modes
offer options of planning and quoting, by which distinct patterns of CS are made
possible. I return to these issues in the concluding sections of this chapter (see sec-
tions 6 and 7).

5.2. Effects of public and private CMD


Some of the best examples of bilingual online creativity come from asynchron-
ous, private exchanges, such as emails among friends and colleagues. By contrast,
most available research is on public CMC modes such as forums and chat chan-
nels, whose participation framework is at odds with the typical situational condi-
tions of private, conversational CS. Public discourse by definition entails an audi-
ence that is, at least in part, unknown to the speaker. In media discourse studies,
this is captured in the notion of overhearers (Hutchby 2006), which corresponds
to the category of “lurkers” in Internet culture. Overhearers are legitimate, ratified
participants who are neither known to the speaker nor actively involved in an ex-
change, but whose presence may nonetheless have an effect on a speaker’s audi-
ence design (Bell 1984) – that is, the way language choices are tailored to parts of
the audience. All public conversational CMD includes overhearers by definition,
and even though contributions in public CMC environments are typically directed
to specific addressees who have a primary impact on language style, they are al-
ways co-directed to overhearers. At the same time, CS presupposes a bi- or multi-
lingual audience that is able to understand the codes at hand and to draw infer-
ences from the way speakers juxtapose and alternate between these codes. This
inferential capacity of participants is precisely a base condition of much conver-
sational CS.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
678 Jannis Androutsopoulos

However, such a bottom line cannot be taken for granted in public CMD. There
is evidence to suggest that public CMD spaces create favourable conditions for the
“functional marginalization” (Paolillo 1996) of minority and heritage languages on
the Internet. Digital networks that explicitly focus on a shared ethnolinguistic iden-
tity may in fact be used by ethnolinguistically heterogeneous individuals, leading
to an orientation to the majority language as a common denominator. The reasons
for such heterogeneity may be diverse: The ethnic communities that use CMD
spaces are often undergoing intergenerational language shift, some of their
members may not be fluent in the heritage language anymore, or users may be eth-
nically mixed, including members of the ethnic majority group. In such cases, the
communicative aim of reaching as many audience members as possible may over-
ride the preference for the heritage language, and at the same time the wish to index
ethnolinguistic identity may lead to patterns of formulaic and emblematic code-
switching from the dominant, majority language into the heritage language, as de-
scribed by Paolillo and Androutsopoulos, among others. However, it seems im-
portant not to generalise this finding, as chat channels with a predominant use of
migrant/ethnic languages have been studied as well (e.g., Androutsopoulos and
Hinnenkamp 2001; Hinnenkamp 2008; Tsaliki 2003).
By contrast, private CMD provides different conditions for recipient design (to
use a term from conversation analysis), as participants can rely on a much greater
inferential potential; i.e., they can count on their code-choices and switches being
understood by virtue of common background knowledge and common practices.
Speakers have more leeway to explore playfully the associative potential of lan-
guage, dialects, and styles in their shared repertoire (Tsiplakou 2009).

5.3. Research on different social settings


Common sites for CS online are public CMD spaces by and for immigrant, dias-
pora, and ethnic minority groups, in which CS between the minority (migrant,
community) and the respective majority language has been identified as the main
pattern of bilingual discourse. Studies of this type of CS are often linked to an in-
terest in language maintenance, and CMC has been associated with hopes and ex-
pectations of maintenance as much as with anxieties of loss and acceleration of on-
going processes of linguistic and cultural shift (Sperlich 2005).
Another user population that has attracted research attention is young people
and their local or “glocal” language practices associated with music and media cul-
ture. In the literature reviewed here, such groups are located in Egypt, Finland,
Germany, and South Africa, and one of their conspicuous language practices in
various CMC modes is CS between the respective national language and English.
Diverse as they may be, these studies suggest patterns of “minimal bilingualism”
(Androutsopoulos 2007b), in which sets of English chunks and formulaic routines
(including greetings and farewells, interjections and discourse organisers, re-

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 679

quests, slogans, etc.) are inserted into the base national or majority language. Their
choice is often indexical to the groups’ lifestyle orientations, including stylized
representations of vernacular “Englishes” (Androutsopoulos 2004, 2007b).
Research from Finland offers evidence for an even broader range of online bi-
lingual practices involving English in Finnish youth cultures (Leppänen 2007;
Leppänen et al. 2009). One such practice is alternational CS in fan fiction (i.e.,
stories written by fans about popular fiction characters or settings), whereby Finn-
ish and English are used for narrative and reported speech, respectively, so that
neither constitutes the predominant language of discourse. In another digital genre,
diary weblogs, English is the matrix language into which Finnish cultural key-
words and expressions are inserted. In all these cases, there is no evidence that this
usage mirrors corresponding bilingual styles in face-to-face communication.
Rather, it is CMD that enables these bilingual practices in the first place. In addi-
tion to these Finnish cases, there is some evidence of CMD from what one might
call elite bilinguals (i.e., academics, white-collar professionals) with an L1 other
than English, whose private email communication shows complex patterns of
switching and mixing (Georgakopoulou 1997; Tsiplakou 2009, both on L1 speak-
ers of Greek).
The social conditions of CS online may of course be more complex that that.
For instance, the members of fan communities within one nation-state are often of
ethnically diverse origins, and the cultural practices they orient to may originate
beyond the English-speaking world. One anecdotal example is the web forum of a
local network of salsa fans in northern Germany (based on unpublished material),
which includes native speakers of German, Spanish, and various other migrant lan-
guages. Regardless of their origin, forum members orient to Spanish as a symbol of
their common cultural practice, and the usage of Spanish in this forum is often for-
mulaic, resembling the patterns of minimal bilingualism that are often identified
with English. Spanish is also used among Spanish-speaking participants, and so
are migrant languages (Turkish, Polish) among their respective speakers. The out-
come is a complex polylingual space, in which the majority language, the language
linked to the particular cultural practice, and immigrant languages all find their
place.

5.4. Effect of social variables


The qualitative orientation of much research reviewed here means that the situated
expression of social identities through CS (see section 6) has attracted more atten-
tion than the testing of hypotheses based on large corpora. It is therefore not sur-
prising that the effect of different social variables on CS online has not been sys-
tematically examined. However, a few sources of evidence are available. In his
work on Swiss-German chats, Siebenhaar (2005, 2006) identifies the combined ef-
fect of age group and channel range on dialect/standard switching. Swiss teenagers

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
680 Jannis Androutsopoulos

prefer local IRC rooms and use their dialect as the default code, whereas middle-
aged users prefer a cross-regional flirt chat, in which they use a considerable
amount of standard German as well. Paolillo (2001) and Ziegler (2005) provide
evidence for the impact of institutional roles within Internet culture on CS. Paolillo
finds that operators of the IRC channel #india switch less into Hindi than periph-
eral users. As Paolillo points out, an identity-based hypothesis would predict the
opposite, i.e., that core members of the IRC network use the heritage language to a
higher degree. Ziegler (2005) finds that in the local IRC channel of a German city,
#mannheim, channel operators use higher amounts of the local city dialect, thus CS
from and to standard German, than ordinary chatters. Paolillo offers a pragmatic
explanation of his finding based on an attention-based hypothesis: U.S.-born IRC
users of Indian descent display ethnic affiliation by other means than heritage lan-
guage, and it is peripheral (rather than core) members of the chat community who
code-switch in order to attract attention. Tsiplakou (2009) presents findings from a
questionnaire study that aimed at identifying variables predicting the degree of CS
in email (between Greek and English, among native Greeks), one such variable
being the use of English at home.

6. Code-switching patterns

CS in CMC is not confined to just a few typical patterns of usage. In terms of struc-
ture, reported patterns of usage range from a few formulaic switches to dense,
multilingual code-mixing and “polylingual languaging” (sections 6, 7). A restric-
tion to formulaic CS has been reported for public CMD in some ethnic commu-
nities (see work by Paolillo and Androutsopoulos), for English/Jamaican Creole in
personal emails (Hinrichs 2006), and for national language/English in youth-cul-
tural contexts (see section 5.3). Bilingual code-mixing has been reported for a
number of languages and modes, including personal emails among fellow aca-
demics in Cyprus (Tsiplakou 2009), chatting among youth of Turkish descent in
Germany (Hinnenkamp 2008), and “mixed messages characterized by English-
isiXhosa code-mixing and code-switching” in texting among South African youths
(Deumert and Masinyana 2008: 137). Deumert and Masinyana (2008) claim that
these linguistically mixed messages mirror code-mixing as the unmarked choice in
the spoken vernacular usage of these youths. The percentage of mixed text mess-
ages in their data is 23 % (in a corpus of 312 messages), and they are further dif-
ferentiated by communicative purpose. Code-mixing occurs in text messages on
social arrangements and information exchange, but less so in romantic messages.
In terms of discourse functions, the literature drawing on widely accepted clas-
sifications of conversational CS (see section 2) has produced evidence for a
number of discourse functions of CS in CMC.9 These include:

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 681

a) switching for formulaic discourse purposes, including greetings, farewells, and


good wishes;
b) switching in order to perform culturally-specific genres such as poetry or joke-
telling;
c) switching to convey reported speech (as opposed to the writer’s own speech);
d) switching with repetition of an utterance for emphatic purposes;
e) switching to index one particular addressee, to respond to language choices by
preceding contributions, or to challenge other participants’ language choices;
f) switching to contextualize a shift of topic or perspective, to distinguish be-
tween facts and opinion, information and affect, and so on;
g) switching to mark what is being said as jocular or serious, and to mitigate
potential face-threatening acts, for example through humorous CS in a dispre-
ferred response or a request;
h) switching to or from the interlocutor’s code to index consent or dissent, agree-
ment and conflict, alignment and distancing, and so on.

Some of these functions – especially (a) and (b) – have been found to favor a sus-
tained use of minority or migrant languages, while for others, the pragmatic effect
is created through the situated contrast between the codes involved (Hinrichs 2006
provides an extensive discussion of this distinction).
While the comparability of CS in CMC with general discourse functions of
conversational CS is thus in principle firmly established across languages, modes,
and social settings, individual manifestations of CS in CMD data may be difficult
to categorize, and switching and mixing may co-occur in the discourse of one user
or community. A few examples from my own research on predominantly German-
speaking diasporic forums are presented below to illustrate these points (Androut-
sopoulos 2006a, b, 2007a). The following three examples come from an Indian,
Persian, and Greek web discussion forum, respectively, and exemplify three vari-
ants of CS within a post:10
(1) Excerpt from the Indian forum, theinder.net (base language is German,
English italicized)
im westen ist es auch tradition jungfräulich in die ehe zu treten!!! das tun auch
einige (bsp. spanierinnen, italienerinnen, etc.)! wieso wird immer der westen
für alles verantwortlich gemacht??? is there no gravity in indian brains?
[‘in the west, no sex before marriage is also a tradition!!! And some stick to it
as well (e.g., Spaniards, Italians etc.)! Why is the West always being blamed for
everything??? is there no gravity in indian brains?’]
(2) Excerpt from the Iranian forum, iran-now.de (base language is Persian,
German italicized)
Bare B. juuuuuuuuun, kamelan hagh dari. in marda ham khasisan, ham bima-
zan wa ham gedan!!! Genau das dachte ich mir auch, chon iran-klick waghat

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
682 Jannis Androutsopoulos

klick mikhado sonst nix, aber neeeeeeeeeeeee A. agha kann uns ja net ghalbesh
az ma beporseh. ghorbuuuuuuuuuuuune harfat khanumi. P. e immer noch
ghamginiani
[‘That’s true, dear B, you’re absolutely right. These men are stingy, boring, and
quite the poor creatures!!! That’s exactly what I thought, because on iran-klick
you just need to click, nothing else, but nooo Mister A. just can’t ask in ad-
vance. I love you for your words, my dear. P is still sad’]

(3) Excerpt from the Greek forum, greex.net (base language is Greek, German
italicized)
edo iparxi pollous ellines apo tin makedonia epidis i wirtschaftliche lage tous
den einai kali … palia i makedoni itane plousioi … eftiaxnan gounes ktlp ala
tora pige i wirtschaft me tis gounes den bach runter
[‘there are many greeks from macedonia here but their financial situation is not
good … macedonians were rich in the past, they were trading with furs, but
now the fur business is going down the drain’]

In these and other forums examined in that study, ethnic minority languages
mainly occur in isolated, insertional switches. In Excerpt 1, taken from a dis-
cussion thread on premarital sex, the concluding switch into English serves to ac-
centuate the writer’s critical conclusion and sets it off from the preceding argumen-
tation. This type of bilingual discourse is quite common in these forums, and
several types of discourse functions listed above are instantiated in this insertional
manner. In Excerpt 2, the first instance of German can be analysed as a switch that
marks a change of perspective from the previous evaluation of “these men” to the
writer’s own views – “That’s exactly what I thought”. However, this line of inter-
pretation becomes increasingly difficult as the post unfolds, and no contextualizing
function can be identified for the penultimate adverbial phrase in German, which is
more typical for code-mixing. In Excerpt (3), whose base language is Greek, the
three German phrases (financial situation, business, down the drain) have neither
any obvious discourse function nor do they serve a referential necessity. In both
cases, a Greek equivalent would presumably have been readily available, and the
writer seems to select German lexical items and idioms for reasons of habit or con-
venience. The last instance of German in this excerpt is an idiom (den Bach run-
tergehen ‘go down the drain’), and the writer expresses the finite verb in Greek and
the idiomatic phrase in German. In Auer’s discourse-functional framework (see
section 2), such cases are also typically classified as code-mixing.
Working with classifications of discourse functions provides an initial over-
view of patterns of CS in a CMC environment and a useful point of entry for
exploratory research. Cumulatively, analyses along these lines offer valuable evi-
dence for the regularity and conventionality of CS online, as well as for its func-
tional similarity to CS in other discourse environments, and thereby contribute to

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 683

its normalization. However, too heavy a reliance on classifications also entails the
risk of reducing analysis to a simple “category check”, which disconnects CS from
the conversational activity in which it is embedded and may result in a decontex-
tualized listing of CS instances. That danger can be reduced by ethnographic
knowledge of the population and digital platform under study and by detailed se-
quential analyses that take into account “the place within the interactional episode
in which languages alternate” (Auer 1998b: 3), the way switches align to previous
code choices of other speakers, and the way they index participants’ background
knowledge.
More specifically, the functional analysis of CS in CMC needs to transcend the
level of single turns or posts and examine the sequential organisation of code-
switching within threads of dialogically related posts or messages. CS is embedded
in the “polylogues” (Marcoccia 2004) that unfold on spaces of public, asynchron-
ous, thematically focused discourse, and makes use of the specific affordances pro-
vided by these spaces (see also discussion in Georgakopoulou 1997; Siebenhaar
2006). In the case of the Germany-based diaspora forums, switches within a post
are a resource for responding to different addressees and engaging with different
strands of a discussion thread. Users sometimes start in one language, quote from
previous posts which are cast in a different language, respond to that quote in its
language choice, and then return to their original code choice (Androutsopoulos
2006a, b, 2007a).
In addition, a pragmatically informed micro-analysis of CS in CMC will aim to
examine “how, within frameworks of generic assumptions and expectations, speech
communities draw upon their linguistic resources in order to maximize the effec-
tiveness and functionality of their communication” (Georgakopoulou (1997: 160).
In such an analysis it is possible to identify how different codes in a group’s usage
take on pragmatic functions and identity values, which cannot be assumed a priori
based on the wider cultural associations of these languages. The use of linguistic
heterogeneity to index social identities is a key issue in much of the work reviewed
here. Some researchers draw on Gumperz’ distinction between “we-code” and
“they-code”, which was originally equated with minority and mainstream language,
respectively. This works well when a few salient instances of a code are used as a
means to signal the ethnic identity associated with that code, and such “we-code”
signals reported repeatedly include greetings, openings, closing, slogans, and the
like (Androutsopoulos 2006a; Hinrichs 2006; Paolillo 1996). This approach is com-
plemented by a more fluid and dynamic understanding of language/identity re-
lations, in which “we”/“they” contrasts are locally constructed in discourse. In dias-
pora forum discussions, for example, the “we-code” is not always the minority
language, and the “they-code” is not always the mainstream language. Writers may
switch into their heritage language to index traditionalist views they distance them-
selves from, or, in another case, switch into the majority language to emphasize
their own multicultural outlook (see Androutsopoulos 2006a; Hinrichs 2006).

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
684 Jannis Androutsopoulos

Working within a constructivist language and identities framework, Tsiplakou


(2009) examines how email writers draw on Greek, English, and further linguistic
resources (French, Cypriot Greek dialect, stylized sociolects of Greek) in order to
act out “localized performativities”, i.e., contextually constructed social identities,
which participants playfully claim for themselves, stylize, or parody. Hinrichs
(2006) identifies three types of identity-related alternation between Standard Eng-
lish and Creole in private emails among Jamaican students: use of Creole for self-
identification and message framing (e.g., greetings, farewells, terms of address-
ing); use of CS to organize different narrative activities and to set apart “we” and
“they” perspectives; and double-voicing, with Creole being employed in the cre-
ation of stereotypical local speech styles. In the last pattern, writers exploit the
“potential of Patois to make salient certain cultural values and personae” (2006:
134) such as the “country bumpkin” persona, which writers playfully or ironically
associate themselves with in specific thematic contexts and speech acts, for in-
stance to mitigate boasting. As Hinrichs (2006: 134) suggests, these latter ex-
pressions of identity-related CS are “especially at home with the written medium”
because they “involve the highest degree of planned, rhetorical use” of Creole.

7. Computer-mediated discourse as a new domain of multilingual


code-switching

Based on the preceding discussion, we are now in a position to assess the relation
of CS in CMC to spoken conversational CS and written CS. The reviewed litera-
ture does not offer a generally agreed-upon position on this, and its suggestions
mirror to some extent the wider discussion on spoken and written aspects of lan-
guage on the Internet. While CS in CMC obviously qualifies as written in terms of
the written representation of linguistic signs, it also bears resemblance to spoken
conversational CS, most obviously in terms of its dialogic context and its discourse
functions (see section 6). From the perspective of contemporary language-focused
CMC scholarship, however, both a dichotomy of that sort and the homogenisation
of various CMD genres and practices as “language on the Internet” seem rather
crude. CMC is generally viewed as a heterogeneous domain of discourse, in which
traditional dichotomies between written and spoken, private and public, immediate
and mediated discourse, are blurred.
Theorizing CS in CMC needs to take the specific pragmatic and social condi-
tions of written language use in digital media more systematically into account.
Writing in networked digital media is different from other types of written dis-
course in a number of ways: It is dialogical, i.e., oriented to particular addressees,
and often embedded in multiparty conversational sequences; it also is often ver-
nacular, i.e., located outside of educational, professional, and other institutions;
and it is often simultaneously used together with other semiotic resources. Taking

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 685

these properties of digital writing into account when studying CS in CMC will con-
tribute to a deconstruction of spoken/written dichotomies and to a move beyond
the assumption that only spoken conversational CS constitutes “authentic” CS and
therefore sets the benchmark against which CS in CMC ought to be assessed. Such
expectations are familiar from other domains of written CS, notably in fiction,
where CS “authenticity” is assessed in terms of fictional settings, characters, and
the thematic content of a novel (Callahan 2004: 99–111). These criteria no doubt
operate, albeit implicitly, when researchers assess the ethnic or diasporic “authen-
ticity” of a web forum or chat channel. Notions of authenticity are also reproduced
within CMC, for example in the assumption that only synchronous CMC modes
will host “real” CS (see sections 3, 5). An alternative and, I would suggest, more
productive approach would be to ask how CS is used as a pragmatic resource under
the specific conditions of CMD, and how specific conditions of written online dis-
course can give rise to distinct CS practices. Two relevant points are touched upon
here: planning and the semiotics of writing itself.
Planning focuses on the difference between the immediate production of
speech in a spoken conversational setting and the gaps between production and re-
ception that are inherent in CMC, especially its asynchronous modes. The avail-
ability of planning time and the lack of visual cues are at the core of the assumption
that CMC is characterised by code-centered contextualization cues (Georgakopou-
lou 1997, 2003). However, the assumption that a “higher level of consciousness
[…] seems inevitable in producing written CS” (Dorleijn and Nortier 2009: 131)
should not be generalised prematurely. It is well known that CMD is sometimes
produced quickly and spontaneously, while in other cases it may involve extensive
drafting and rewording. It is therefore more useful to expect different levels or de-
grees of conscious organisation of bilingual discourse, depending on mode and cir-
cumstances.
Moreover, it seems necessary to distinguish between various potential conse-
quences of planning for CS. One of these, as already noted (section 6), relates to
the composition of contributions within multiparty conversational exchanges.
Asynchronous modes, especially, enable writers to deploy strategies of partici-
pation in which a single post may compile responses to a number of previous posts;
in multilingual contexts, writers may thereby use post-internal CS as a resource for
distinguishing between addressees or perspectives. What is particular to CS in this
regard is its strategic deployment in a context of discourse organisation that is
uniquely digital.
A second and less well understood impact of planning is on the potential avoid-
ance of or preference for certain types of switching or mixing. While examples like
(3) may reflect the mixed language style that has been reported as typical for the
speech of immigrant background youth (e.g., Hinnenkamp 2008), language mixing
is relatively rare across the forums of that study. I suggested (Androutsopoulos
2007a: 347–348) that this may be due to the combined impact of the conditions of

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
686 Jannis Androutsopoulos

publicness and asynchronicity: The metalinguistic awareness involved in planning


and editing posts may inhibit the spontaneous, unconscious process of code-mix-
ing, and the public character (and ethnolinguistic heterogeneity) of these forums is
at odds with the situational conditions that favour the occurrence of code-mixing.
In this case, the conscious production of discourse seems to result to a higher de-
gree of formality, in that language contact patterns that are at home in vernacular,
intimate settings are avoided.
However, the opposite tendency is also documented. That is, the planning op-
portunities afforded by asynchronous CMC may enable participants to use lan-
guage mixing in creative and sometimes masterful ways that might not have oc-
curred in speech. A few case studies offer evidence for this tendency, in part
drawing on the notion of “polylingual languaging” (a playful use of all linguistic
resources available to speakers/writers in a given context, regardless of degrees of
linguistic competence or ethnolinguistic affiliation; Jørgensen 2008).
One example comes from a discussion thread on language and ethnicity from a
German-based Greek forum (Androutsopoulos 2006b), where a poster argues that
Germany-born Greeks would permanently mix languages in both countries. A
short response to this – Korrekt. richtisch stin teleia gebracht (‘Correct. Got right
to the point’) – starts in German, switches intrasententially to Greek for one phrase
(‘to the point’) and concludes in German. The phrase switched into Greek is idio-
matic in German, although not in Greek, and the resulting mix sounds pragmati-
cally odd when taken literally. However, this mix encapsulates the “essence” of the
preceding discussion, i.e., the group’s mixture of identities and languages, and
even though the phrase itself would be a rather odd and unexpected instance of
mixing in speech, its symbolic meaning can readily be understood by its audience
and ties in well with everyday and academic interpretations of mixed talk as a sym-
bol of hybrid identities (Hinnenkamp 2008).
This and other research (notably Hinnenkamp 2008; Tsiplakou 2009) suggests
that even though their pragmatic force depends on shared knowledge and prag-
matic conventions, some instances of code-mixing in CMD go beyond a simple re-
flection of spoken conversational patterns (Tsiplakou offers evidence from spoken
conversation to support this point). What the language mixing instances reported
in these studies share are their implicitly or explicitly metalinguistic character and
their occurrence in discourse that focuses on key identity issues of a group or com-
munity. Viewed this way, some code-mixing in CMC is pragmatically effective
precisely because it diverges from colloquial bilingual usage to “iconise” beliefs or
values shared by the participants. However, it is very difficult to say whether the
distinctive feel of these mixing instances is due to their particular syntactic struc-
ture or rather to their rhetorical tailoring of code-mixing to the gist of a given dis-
course episode.
A second point that merits more attention in future research is the relevance of
the mode-specific resources of writing (i.e., orthography, spelling variation, and

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 687

even script choice) in the production of CS in CMC. Again, different aspects need
to be distinguished preliminarily. One is the impact of standardised orthographies
on the selection of base language in CMD. Hinrichs (2006) reports that unlike
everyday communication in Jamaica, where Creole is the default medium of com-
munication, its lack of a standardised orthography makes it less suitable to that
purpose in CMD, so that the Jamaican students and expatriates in his study subjects
basically draw on English, occasionally switching to Creole. However, in other
settings, writers may stick to their vernacular in CMD despite its lack of a stan-
dardised orthography, for example in German-speaking Switzerland (Siebenhaar
2005, 2006), where the online spelling of local dialects tends to reflect vernacular
pronunciation more accurately than traditional dialect spelling does.
A further issue, again following up on the notion of code-centered contextual-
isation cues, is the role of spelling in signalling CS. It is obvious that CS in CMD is
produced by representing in writing another language (or dialect), but what is less
obvious is that this can be done based on different orthographic conventions. The
switch from one language to another usually co-occurs with, and is indexed by, a
switch between the respective orthographies, albeit not necessarily so. Represent-
ing one language in the orthography of another may sometimes be a matter of
necessity, but it may also be a more or less conscious choice and thereby a source
of pragmatic meaning in its own right. There is also evidence that spelling may
be exploited in its own right, with CMD writers drawing on the contrast with
normative orthography to create pragmatic meaning. A striking example is the de-
liberate “mixing of alphabetic conventions” reported for German-Turkish chatters
who create mixed-language conversations as “German words and even phrases get
a kind of Turkish wrapping”, which consists of Turkish orthography (Hinnenkamp
2008: 262, 266). Spelling Deutsch (in correct German orthography) as Doyc (based
on Turkish orthography) is, as the context makes clear, not a typo or spelling mis-
take but a conscious blend of language and orthography designed to elicit prag-
matic meaning, which ties in with the debate on language and ethnic boundaries
that dominates that chat session. Likewise, although at a different level of written
structure, there is evidence of purposeful “script switching” between native and
Roman script in the Romanised transliteration of different languages on the Inter-
net (see chapters in Danet and Herring 2007a).
Such evidence, I argue, suggests that the study of CS in CMC primarily in
terms of its apparent “authenticity” or correspondence to spoken conversational
CS may be limiting, and that important insights will be gained by theorising the
written digital mode not as a limitation but as a new set of conditions for the de-
ployment of multilingual resources in discourse.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
688 Jannis Androutsopoulos

8. Outlook and directions for future research

Research has only just started tackling the massive bilingualism and multilingual-
ism that occurs as global multilingual populations increasingly gain access to digi-
tal communications media. Much remains to be done in documenting different
sites and types of CS online, and systematic comparisons among modes, language,
and settings are needed. Most lacking are, first, studies of private, dyadic data; sec-
ond, cross-media and cross-mode comparisons of CS usage based on the same
writer(s); third, multimodal data from social networking and media-sharing web-
sites; and fourth, case studies of multilingual CMD in transnational work teams. In
terms of method, research is moving away from static classifications and towards
ethnographically and pragmatically informed analyses of the local interactional
purposes that CS serves in its generic and sequential context. However, mixed-
methods combinations of qualitative and quantitative techniques, e.g., by means of
questionnaires or language choice analyses, are bound to remain productive and in-
sightful. One limitation of current research is the restriction to single modes, which
are analytically examined in isolation. Motivated by practical necessities as that
may be, it creates an isolationism that runs counter to actual computer-mediated
practices, which are spread across modes and platforms in combinations and rou-
tines that are not yet well understood. There is reason to assume that CS patterns
will often cut across modes, and understanding such code/mode repertoires will
deepen the understanding of the specific properties of CS online.
Two issues that cut across the sections of this chapter are how to theorise the re-
lationship between medium and social/situation factors, on the one hand, and be-
tween online written and offline spoken CS, on the other. Even though it might
seem customary to think of CS on the Internet in terms of its “authenticity” or cor-
respondence to an assumed spoken conversational blueprint in the usage of an in-
dividual or community, I have argued that CMD is unscripted, dynamically unfold-
ing communication in its own right. Taking this into account would cast doubt on
both the necessity and the means of establishing such authenticity. This chapter has
presented a number of cases where bilingual practices are not verbatim reproduc-
tions of face-to-face interaction patterns but, judging from ethnographic and lin-
guistic evidence, specific to CMD. I therefore suggest that rather than examining
CS online in terms of its authenticity or equivalence to offline speech, a more pro-
ductive question to pursue is how CS is used as a resource, under the specific con-
ditions of communication offered by digital media.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 689

Notes

1. Only two volumes to date include more than one contribution dealing, at least in part,
with CS (Danet and Herring 2007a and a 2006 special issue of the Journal of Socioling-
uistics 10[4]), while in other recent books the topic is either entirely absent or marginal
(e.g., Baron 2008; Crystal 2006; Rowe and Wyss 2009).
2. The languages of publication covered are English and German. Literature in other lan-
guages can be traced through the reference list. Literature coverage is through June
2010.
3. The latter is used by Androutsopoulos and Hinnenkamp (2001), Androutsopoulos and
Ziegler (2004), Androutsopoulos (2006a, 2007a), Hinnenkamp (2008), Hinrichs (2006),
Leppänen (2007), Siebenhaar (2005, 2006), and Tsiplakou (2009).
4. Auer points out that “a speaker may simply want to avoid the language in which he or
she feels insecure and speak the one in which he or she has greater competence. Yet
preference-related switching may also be due to a deliberate decision based on political
considerations” (1995: 125).
5. Following Herring (2004), I use computer-mediated discourse (CMD) to indicate a nar-
rower focus on the use of semiotic resources, whereas CMC denotes a broader view on
communication processes facilitated by digital technologies.
6. In earlier work (Androutsopoulos 2006a), I located CS within a quadripartite matrix of
multilingualism on ethnic portals. Its main site is regular user-contributed discourse, es-
pecially in forums and occasionally in journalists’ edited content as well. This is distin-
guished from user and site-specific emblems, such as names, mottos, and slogans. These
distinctions are taken up and recontextualised in the present discussion.
7. This mirrors the limitations of research on multilingualism in CMC in general (see
Danet and Herring 2007b: 24).
8. The label “L1” (first language) was only added if clearly stated in the research, usually
based on controlled socio-demographic data. Other studies either do not control for
this factor or they study public CMD settings where assigning an L1 is not straightfor-
ward.
9. All of the following studies include discussions of these: Androutsopoulos (2006a,
2007a), Androutsopoulos and Hinnenkamp (2001), Dorleijn and Nortier (2009), Geor-
gakopoulou (1997), Hinrichs (2006), Kadende-Kaiser (2000), McClure (2001), Paolillo
(1996, 2011), Sebba (2003), Sperlich (2005), and Tsiplakou (2009).
10. The examples are anonymised, and presentation follows Androutsopoulos (2006a, b).

References

Androutsopoulos, Jannis K.
2004 Non-native English and sub-cultural identities in media discourse. In: Helge
Sandøy (ed.), Den fleirspråklege utfordringa/The Multilingual Challenge,
83–98. Oslo: Novus.
Androutsopoulos, Jannis K.
2006a Multilingualism, diaspora, and the Internet: Codes and identities on German-
based diaspora websites. Journal of Sociolinguistics 10(4): 524–551.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
690 Jannis Androutsopoulos

Androutsopoulos, Jannis K.
2006b Mehrsprachigkeit im deutschen Internet: Sprachwahl und Sprachwechsel in
Ethno-Portalen. [Multilingualism on the German Internet: Language choice
and code-switching on ethnic portals.] In: Peter Schlobinski (ed.), Von *hdl*
bis *cul8r*. Sprache und Kommunikation in den Neuen Medien [From *hdl*
to *cul8r*. Language and communication in New Media], 172–196. Thema
Deutsch, Band 7. Mannheim: Dudenverlag.
Androutsopoulos, Jannis K.
2007a Language choice and code-switching in German-based diasporic web forums.
In: Brenda Danet and Susan C. Herring (eds.), 340–361.
Androutsopoulos, Jannis K.
2007b Bilingualism in the mass media and on the Internet. In: Monica Heller (ed.),
Bilingualism: A Social Approach, 207–230. New York: Palgrave Macmillan.
Androutsopoulos, Jannis K.
2011 From variation to heteroglossia in the study of computer-mediated discourse.
In: Crispin Thurlow and Kristine Mroczek (eds.), Digital Discourse: Lan-
guage in the New Media, 277–298. New York: Oxford University Press.
Androutsopoulos, Jannis and Volker Hinnenkamp
2001 Code-Switching in der bilingualen Chat-Kommunikation: ein explorativer
Blick auf #hellas und #turks. [Code-switching in bilingual chat communi-
cation: an exploratory analysis of #hellas and #turks.] In: Michael Beißwenger
(ed.), Chat-Kommunikation, 367–402. Stuttgart: Ibidem.
Androutsopoulos, Jannis and Evelyn Ziegler
2004 Exploring language variation on the Internet: Regional speech in a chat com-
munity. In: Britt-Louise Gunnarsson, Lena Bergström, Gerd Eklund, Staffan
Fridell, Lise H. Hansen, Angela Karstadt, Bengt Nordberg, Eva Sundgren, and
Mats Thelander (eds.), Language Variation in Europe, 99–111. Uppsala:
Uppsala University Press.
Auer, Peter
1995 The pragmatics of code-switching: A sequential approach. In: Lesley Milroy
and Pieter Muysken (eds.), One Speaker, Two Languages, 115–135. Cam-
bridge, UK: Cambridge University Press.
Auer, Peter (ed.)
1998a Code-Switching in Conversation. London: Routledge.
Auer, Peter
1998b Introduction: Bilingual conversation revisited. In: Peter Auer (ed.), 1–24.
Auer, Peter
1999 From codeswitching via language mixing to fused lects: Toward a dynamic
typology of bilingual speech. International Journal of Bilingualism 3(4):
309–332.
Auer, Peter
2000 Why should we and how can we determine the “base language” of a bilingual
conversation? Estudios de Sociolingüística 1(1): 129–144.
Baron, Naomi S.
2008 Always On: Language in an Online and Mobile World. New York: Oxford Uni-
versity Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 691

Beißwenger, Michael
2008 Situated chat analysis as a window to the user’s perspective: Aspects of tem-
poral and sequential organization. Language@Internet 5, article 6.
http://www.languageatinternet.org/articles/2008/1532/
Bell, Allan
1984 Language style as audience design. Language in Society 13: 145–204.
Callahan, Laura
2004 Spanish/English Codeswitching in a Written Corpus. Amsterdam/Philadelp-
hia: John Benjamins.
Crystal, David
2006 Language and the Internet, 2nd Ed. Cambridge, UK: Cambridge University
Press
Danet, Brenda and Susan C. Herring (eds.)
2007a The Multilingual Internet: Language, Culture, and Communication Online.
New York: Oxford University Press.
Danet, Brenda and Susan C. Herring
2007b Introduction: Welcome to the multilingual Internet. In: Brenda Danet and
Susan C. Herring (eds.), 3–38.
Deumert, Ana and Oscar Masinyana Sibabalwe
2008 Mobile language choices – The use of English and isiXhosa in text messages
(SMS): Evidence from a bilingual South African sample. English World-Wide
29(2): 117–147.
Dorleijn, Margreet and Jacomine Nortier
2009 Code-switching and the internet. In: Barbara E. Bullock and Almeida J. Tori-
bio (eds.), The Cambridge Handbook of Linguistic Code-Switching, 127–141.
Cambridge, UK: Cambridge University Press.
Ferrara, Kathleen, Hans Brunner, and Greg Whittemore
1991 Interactive written discourse as an emergent register. Written Communication
8(1): 8–34.
Georgakopoulou, Alexandra
1997 Self-presentation and interactional alignments in e-mail discourse: The style-
and code switches of Greek messages. International Journal of Applied Lin-
guistics 7(2): 141–164.
Georgakopoulou, Alexandra
2003 Computer-mediated communication. In: Jef Verschueren, Jan-Ola Östman, Jan
Blommaert, and Chris Bulcaen (eds.), Handbook of Pragmatics (2001 Install-
ment), 1–20. Amsterdam/Philadelphia: John Benjamins.
Georgakopoulou, Alexandra
2004 To tell or not to tell? Email stories between on- and off-line interactions.
Language@Internet 1, article 1.
http://www.languageatinternet.org/articles/2004/36
Goldbarg, Rosalyn Negrón
2009 Spanish-English codeswitching in email communication. Language@Internet 6,
article 3. http://www.languageatinternet.org/articles/2009/2139
Gumperz, John J.
1982 Discourse Strategies. Cambridge, UK: Cambridge University Press.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
692 Jannis Androutsopoulos

Heller, Monica and Carol W. Pfaff


1996 Code-switching. In: Hans Goebl, Peter H. Nelde, Zdenek Stary, Wolfgang
Wölck (eds.), Kontaktlinguistik/Contact linguistics, Vol. 1, 594–609. (HSK 12.1.)
Berlin/New York: de Gruyter.
Herring, Susan C. (ed.)
1996 Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural
Perspectives. Amsterdam/Philadelphia: John Benjamins.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2001 Computer-mediated discourse. In: Deborah Schiffrin, Heidi Hamilton, and De-
borah Tannen (eds.), The Handbook of Discourse Analysis, 612–634. Malden,
MA: Blackwell.
Herring, Susan C.
2004 Computer-mediated discourse analysis: An approach to researching online
behavior. In: Sasha A. Barab, Rob Kling, and James H. Gray (eds.), Designing
for Virtual Communities in the Service of Learning, 338–376. Cambridge/New
York: Cambridge University Press.
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Language@
Internet 4, article 1. http://www.languageatinternet.org/articles/2007/761/
Hinnenkamp, Volker
2008 Deutsch, Doyc or Doitsch? Chatters as languagers – The case of a Ger-
man–Turkish chat room. International Journal of Multilingualism 5(3): 253–
275.
Hinrichs, Lars
2006 Codeswitching on the Web. Amsterdam/Philadelphia: John Benjamins.
Hutchby, Ian
2006 Media Talk: Conversation Analysis and the Study of Broadcasting. Maiden-
head, UK: Open University Press.
Jørgensen, Normann J.
2008 Polylingual languaging around and among children and adolescents. Inter-
national Journal of Multilingualism 5(3): 161–176.
Kadende-Kaiser, Rose M.
2000 Interpreting language and cultural discourse: Internet communication among
Burundians in the diaspora. Africa Today 47(2): 121–148.
Lee, Carmen K. M.
2007 Linguistic features of email and ICQ instant messaging in Hong Kong. In:
Brenda Danet and Susan C. Herring (eds.), 184–208.
Lee, Carmen and David Barton
2011 Constructing glocal identities through multilingual writing practices on
flickr.com. International Multilingualism Research Journal 5(1): 39–59.
Leppänen Sirpa
2007 Youth language in media contexts: Insights into the functions of English in
Finland. World Englishes 26(2): 149–169.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
Code-switching in computer-mediated communication 693

Leppänen, Sirpa and Saija Peuronen


2012 Multilingualism on the Internet. In: Marilyn Martin-Jones, Adrian Blackledge,
and Angela Creese (eds.), The Routledge Handbook of Multilingualism,
384–402. London: Routledge.
Leppänen, Sirpa, Anne Pitkänen-Huhta, Arja Piirainen-Marsh, Tarja Nikula, and Saija Peu-
ronen
2009 Young people’s translocal new media uses: A multiperspective analysis of lan-
guage choice and heteroglossia. Journal of Computer-Mediated Communi-
cation 14(4): 1080–1107.
Marcoccia, Michel
2004 On-line polylogue: Conversation structure and participation framework in In-
ternet newsgroups. Journal of Pragmatics 36: 115–145.
McClure, Erica
2001 Oral and written Assyrian-English codeswitching. In: Rodolfo Jacobson (ed.),
Codeswitching Worldwide II, 157–191. Berlin: Mouton de Gruyter.
Myers-Scotton, Carol
1993 Social Motivation for Code-Switching: Evidence from Africa. Oxford, UK:
Clarendon Press.
Myers-Scotton, Carol
1998 A theoretical introduction to the markedness model. In: Carol Myers-Scotton
(ed.), Codes and Consequences: Choosing Linguistic Varieties, 18–38. New
York: Oxford University Press.
Paolillo, John C.
1996 Language choice on soc.culture.punjab. Electronic Journal of Communication
6(3). http://www.cios.org/EJCPUBLIC/006/3/006312.HTML
Paolillo, John C.
2001 Language variation on Internet Relay Chat: A social network approach. Jour-
nal of Sociolinguistics 5(2): 180–213.
Paolillo, John C.
2007 How much multilingualism? Language diversity on the Internet. In: Brenda
Danet and Susan C. Herring (eds.), 408–430.
Paolillo, John C.
2011 “Conversational” codeswitching on Usenet and Internet Relay Chat. Language@
Internet 8, article 3. http//www.languageatinternet.org/articles/2011/Paolillo
Rowe, Charley and Eva L. Wyss (eds.)
2009 Language and New Media: Linguistic, Cultural, and Technological Evol-
utions. Cresskill/NJ: Hampton Press.
Sebba, Mark
2003 “Will the real impersonator please stand up?” Language and identity in the Ali
G websites. Arbeiten aus Anglistik and Amerikanistik 28(2): 279–304.
Sebba, Mark and Tony Wootton
1998 We, they and identity: Sequential vs. identity-related explanation in code-
switching. In: Peter Auer (ed.), Code-Switching in Conversation, 262–289.
London: Routledge.
Siebenhaar, Beat
2005 Varietätenwahl und Code Switching in Deutschschweizer Chatkanälen. [Var-
iety choice and code-switching in Swiss German chat channels.] Networx 43.
http://www.mediensprache.net/de/websprache/networx/docs/index.asp?id=43

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
694 Jannis Androutsopoulos

Siebenhaar, Beat
2006 Code choice and code-switching in Swiss-German Internet Relay Chat rooms.
Journal of Sociolinguistics 10(4): 481–509.
Siebenhaar, Beat
2008 Quantitative approaches to linguistic variation in IRC: Implications for quali-
tative research. Language@Internet 5, article 4.
http://www.languageatinternet.org/articles/2008/1615/index_html/
Sperlich, Wolfgang B.
2005 Will cyberforums save endangered languages? A Niuean case study. Inter-
national Journal of the Sociology of Language 172: 51–77.
Tsaliki, Liza
2003 Globalization and hybridity: The construction of Greekness on the Internet. In:
Karim H. Karim (ed.), The Media of Diaspora: Mapping the Globe, 162–176.
London: Routledge.
Tsiplakou, Stavroula
2009 Doing (bi)lingualism: Language alternation as performative construction of
online identities. Pragmatics 19(3): 361–391.
Warschauer, Mark, Ghada R. El Said, and Ayman Zohry
2007 Language choice online: Globalization and identity in Egypt. In: Brenda Danet
and Susan C. Herring (eds.), 303–318.
Wright, Sue (ed.)
2004 Multilingualism on the Internet. Special issue, International Journal on Multi-
cultural Societies 6(1). UNESCO Social and Human Sciences. http://www.un-
esco.org/shs/ijms
Ziegler, Evelyn
2005 Die Bedeutung von Interaktionsstatus und Interaktionsmodus für die Dialekt-
Standard-Variation in der Chatkommunikation. [Relevance of interactional
status and interactional mode for dialect/standard variation in chat communi-
cation.] In: Eckhardt Eggers, Jürgen Erich Schmidt, and Dieter Stellmacher
(eds.), Neue Dialekte – moderne Dialektologie [New dialects – modern dialec-
tology], 719–745. Stuttgart: Steiner.

Brought to you by | Nanyang Technological University


Authenticated
Download Date | 6/15/15 2:59 AM
28. Narrative analysis and computer-mediated
communication
Alexandra Georgakopoulou

1. Introduction

Studies concerned with the classification of computer-mediated communication


(henceforth CMC) have to date tended to concentrate on the identification and
specification of genres, thus following developments in the available technologies
and the emergence or popularity of CMC discourse activities: For instance, an ear-
lier focus on email and newsgroups was succeeded by attention to e-chat and, more
recently, weblogs (Herring 2004). This line of inquiry has shown that the types of
discourse engaged in through CMC are by no means homogeneous or singularly
definable entities. Instead, they present considerable textual and contextual varia-
bility, as well as hybridity, creatively adapting and re-casting elements of genres
from old media or face-to-face environments (Androutsopoulos 2006). This has
partly to do with the ways in which CMC users in their communication both cir-
cumvent medium constraints and maximize affordances (see, e.g., Danet 2001).
Furthermore, the plurality of genres and styles in CMC is by now well recognized,
and various studies have explored their interrelations with their local (mediated,
situational) and broader (sociocultural) contexts of occurrence (e.g., Baym 2000;
Cherny 1999; Danet 2001; Georgakopoulou 1997; articles in Danet and Herring
2003).
Although this line of inquiry has come a long way in documenting how CMC
genres are associated with different possibilities and affordances for the support of
a wide range of discourse activities, an emphasis is missing on what for many
scholars is a special or archetypal genre (e.g., Swales 1990), namely narrative. At a
time, with the advent of Web 2.0 technologies, when personal stories abound in
CMC, from status updates on Facebook to re-tweets (i.e., sharing interesting
tweets) on Twitter, there is much need and scope for taking a narrative-analytic ap-
proach to CMC. Such an approach should scrutinize the different types of stories
engendered or prohibited in different environments and online communities and
the ways in which they are “told” (produced) and received or engaged with, as well
as how they are shaped by properties of the medium.
In sociolinguistic, pragmatic, and discourse analytic research on face-to-face
communication, conversational stories have been studied and analysed extensively
in the last four decades, particularly since the publication of Labov’s influential
model of narrative structure (1972; also Labov and Waletzky 1967), which is dis-
cussed below. Alongside this line of inquiry, the study of what kinds of stories in-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
696 Alexandra Georgakopoulou

dividuals relate about their past and how they relate them, when prompted to do so
in research interviews, has been a favoured preoccupation and focus of identity
analysis in the social sciences (e.g., Riessman 2008). Clearly, there is a discrep-
ancy between narrative being of focal concern outside CMC research and being
under-represented within it. In light of this, the discussion in this chapter will in
part be programmatic, since this is an area with obvious gaps and avenues for
further research. At the same time, my survey of existing studies of narrative in
CMC will show that various connections are either made by the studies themselves
or can be made with some of the latest tendencies of pragmatic and sociolinguistic
research on narrative that adopt a social-interactional perspective. In this respect, I
will discuss the recent move in narrative analysis towards an opening up of textual
definitions of narrative to include stories that depart in varying degrees from the
narrative canon (i.e., life stories or personal experience past events stories). I will
show how studies of narrative in CMC are providing further evidence in favour of
such a move. Moreover, I will argue that the storytelling forms and functions that
are emerging through such studies as distinctive and characteristic of numerous
CMC environments can and should inform a dialogue with studies of face-to-face
storytelling.

2. Narrative analysis within (socio)linguistics:


Main approaches and current trends

Fascination with oral (vernacular, non-literary) narrative spans a wide range of so-
cial science disciplines – sociology, psychology, social anthropology, etc. – and is
frequently referred to as the “narrative turn” (see articles in Bamberg 2006; Brock-
meier and Carbaugh 2001; Daiute and Lightfoot 2004; De Fina, Schiffrin, and
Bamberg 2006). In these disciplines, narrative is seen as an archetypal, fundamen-
tal mode for making sense of the world and, as such, as a privileged structure, sys-
tem, or mode for tapping into the teller’s social identities and sense of self. To talk
about well-defined and delimited schools of narrative analysis necessitates a crude
process of abstraction that does not do justice to the many different strands of
existing work. Bearing this in mind, it is possible to identify two distinct ways of
doing narrative analysis: one inspired by a conventional and largely canonical
paradigm, the other based on a social-interactional view of narrative. The former
is traceable to Labov’s foundational model of narrative analysis (Labov 1972;
Labov and Waletzky 1967), but it is also informed by the narrative turn in the so-
cial sciences within which narrative is seen as a prime site for the exploration of
people’s identities. The latter encompasses a view of narrative as talk-in-interac-
tion and as social practice, identifying the analysis of interaction as a fundamental
aspect of any study of narrative and the investigation of the intimate links of nar-
rative-interactional processes with larger socio-cultural processes as a prerequisite

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 697

for the study of narrative (for a detailed discussion, see De Fina and Georgakopou-
lou 2008a).
In Labov and Waletzky’s model (1967), a narrative text was characterized in
structural terms through the presence of temporal ordering between event clauses
and through its organization into structural components (such as complicating
action, evaluation, and resolution). The model was based on stories told in oral
interviews and, in principle, was meant as a description of narratives of personal
experience, rather than all types of narratives. That said, it has had a profound in-
fluence on narrative research and has paved the way for seeing narrative as a privi-
leged site for the study of a wide range of aspects relevant to the study of language
in society (see contributions in Bamberg 1997). As I have argued elsewhere (Geor-
gakopoulou 2006a: 129–131), Labov’s structural definition of narrative resulted in
a tendency to recognize as narratives only texts that appear to be well organized,
with a beginning, a middle, and an end, that are teller-led and largely monologic,
and that occur as responses to (an interviewer’s) questions. In addition, his focus
on a story’s point and evaluation as the means by which a teller expresses the
story’s tellability has inadvertently privileged the teller as the main producer of
meaning. Despite the critique that Labov’s model has received over the years (see,
e.g., the articles in Bamberg 1997), its long-lasting influence in the study of every-
day, conversational narrative is undeniable. It is commonly the case that the initial
exploration of a narrative data set will rest upon identifying the extent to which the
data conform to or depart from the narrative structure identified by Labov.
As will be discussed below, this has also been the case in existing studies of
narrative genres in CMC. Yet it is also noteworthy that both recent studies of con-
versational storytelling and studies of narrative in CMC have provided ample evi-
dence of an abundance of stories that do not actually conform to Labov’s model, in
as much as they depart from the format of “an active teller, highly tellable account,
relatively detached from surrounding talk and activity, linear temporal and causal
organization, and certain, constant moral stance” (Ochs and Capps 2001: 20). Put
differently, the stories that have been documented as typical of a variety of every-
day conversational and – more recently – CMC contexts include “a gamut of
under-represented and ‘a-typical’ narrative activities, such as tellings of ongoing
events, future or hypothetical events, shared (known) events, but also allusions to
tellings, deferrals of tellings, and refusals to tell” (Georgakopoulou 2006a: 130).
An organized move to put such “non-canonical” or “a-typical” stories on the
map and make them a focal part of narrative analysis is exemplified by recent work
on “small stories” (Bamberg 2004; Bamberg and Georgakopoulou 2008; Georga-
kopoulou 2006a, b, 2007, 2008). Small stories research is in tune with other recent
approaches to narrative both within sociolinguistics (e.g., Ochs and Capps 2001)
and in narratology (e.g., Herman 2009). In these approaches, the widely-held-as-
prototypical definitional criteria of narrative, such as the sequencing of events, are
seen as necessary but not as sufficient. Instead, what counts as a story is connected

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
698 Alexandra Georgakopoulou

with what gets done on particular occasions and in particular settings and what the
local understandings are regarding what a story is. Furthermore, there is room for
flexibility and versatility within each definitional criterion of a story: For instance,
the criterion of event sequencing has tended to privilege the temporal ordering of
past rather than future or hypothetical events. Similarly, the idea that stories build
worlds and that through their tellings the narrators communicate to their audience
“what’s it like” to be part of those worlds (Herman 2009) has routinely prioritized
the “world-disruption” qualities of stories. The assumption has been that, for
stories to be worth telling, they need to relate extra-ordinary events that create
some kind of trouble or complication in the initial state of affairs. This applies to
Labov’s model, too.
What small stories research has argued in relation to such definitional criteria is
that they should be seen as context specific, and that the full continuum that each
allows for should be explored in each case. For instance, world-making rather than
world-disruption may be more important for some stories in certain contexts. In the
same vein, there may be a distinct preference for the sequenced events of a story to
be about the future and not about the past in certain contexts (Georgakopoulou
2007: ch. 2). This should not preclude the identification of such data as stories or
their inclusion in a narrative analysis. A comparable case has been made by Ochs
and Capps (2001), who, rather than identifying a set of distinctive features that al-
ways characterize narrative, stipulate dimensions (tellability, tellership, linearity,
moral stance, etc.) that are relevant to a narrative, even if not elaborately manifest.
Each dimension establishes a range of possibilities that may or may not be realized
in a particular narrative. For example, tellership allows for one main teller but also
for multiple co-tellers. Similarly, a story’s tellability may be high or low.
Overall, social-interactional approaches to narrative, including small stories
research, have shown the importance of attending to the context-specific aspects of
narrative tellings so as to understand how narrative genres shape, as well as are
being shaped by, the norms and social relations of the situational and socio-cultural
contexts in which they occur.1 The last decade or so has also seen social-interac-
tional approaches connect with social science research on narrative as a point of
entry into the teller’s social identities (gender, ethnicity, age, etc.). This study of
identities through emphasis on the communicative how of narrative tellings (e.g.,
De Fina 2003; De Fina, Schiffrin, and Bamberg 2006; Georgakopoulou 2007) has
variously problematized, de-essentialized, or added nuance to the widely-held
view that narrative is a privileged communication mode for making sense of the
self. In section 3, I suggest that there is still much scope for a comparable shift in
studies of narrative in CMC from narratives as texts/genres to narratives as social
practices.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 699

3. Doing narrative analysis in CMC: An overview

3.1. Fictional – digital – personal online stories: A gradual move

The focus so far in studies of narrative in CMC has been on what types of stories
are told, how, and in which CMC environments. This has brought to the fore recur-
rent findings that allow us to identify certain narrative genres and certain com-
municative choices in them as being prototypically associated with CMC. There
are links that can be made between such “ways of storytelling” (Georgakopoulou
2007) and certain possibilities that communication in the new media affords, as
well as certain social practices with which they are characteristically associated, as
I show below.
The exploration of ways of storytelling in CMC contexts has prioritized “fic-
tional”2 stories3 or “representations”; the turn to personal stories has only recently
been made. This is more or less a reflection of the historical precedence of fictional
storytelling (as in, e.g., computer games) in CMC, which has nonetheless been rad-
ically redefined with the recent explosion of personal storytelling, particularly in
Web 2.0 environments. However, it is instructive to note a convergence of findings
between work on fictional storytelling and work on personal storytelling in CMC.
Literary or fictional storytelling has traditionally been the main object of inquiry of
narratology, and it is thus no accident that the study of fictional, at times artistic,
online stories created by experts and professionals (e.g., experimental electronic
literature, video games) makes use of narratological approaches4 and, to a lesser
extent, sociological ones (e.g., Bell 2010; Ciccorico 2007; Douglas 2000; Hayles
2008; Morris and Swiss 2009; Walker Rettberg 2008). One of the aims of this line
of inquiry has been to examine narrative through a comparative lens across media,
spurred by the recognition that “the comparative study of media as means of ex-
pression lags behind the study of media as channels of communication” (Ryan
2004a: 24).
A central project within this “transmedial” narratology is to study how nar-
rative gets transposed from one medium to another, what kinds of features are
adapted or altered in this process, and how each medium encourages or prohibits
specific ways of narration (Ryan 2004a: 35). Transmedial narratology also seeks to
test the applicability of concepts and analytical modes that have been developed
with regard to the study of narrative in one medium across media. Ryan rightly
stresses that the examination of such questions should “avoid the temptation to at-
tribute features and findings to the medium solely” (34). This danger of technologi-
cal determinism has been widely discussed in studies of CMC in general (see, e.g.,
articles in Androutsopoulos 2006). Ryan also warns against the other extreme, that
is, “media blindness”, which involves an indiscriminate transfer of concepts de-
signed, for example, for the study of narrative in one medium to narratives of
another medium. This concern, too, has been voiced in CMC, particularly with re-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
700 Alexandra Georgakopoulou

spect to the transfer of concepts from face-to-face interaction to online environ-


ments (see, e.g., Androutsopoulos, this volume; Georgakopoulou 2006c).
Exactly what counts as a story, what the role of narrative in an online environ-
ment is, and what types of user involvement can be found in relation to narratives
are main preoccupations within narratological approaches to narrative in CMC.
The concept of “narrativity” as comprising everything that makes a text narrative
(Fludernik 2009) is frequently used as a yardstick for classifying different texts as
having low or high degrees of narrativity. The definitional criteria mentioned in
section 2 above tend to be taken as the vital constituents of “narrativity”, in par-
ticular the temporal sequencing of events and the “experientiality” (idem) which
involves a narrator communicating and in the process making sense of his or her
point of view, emotions, thoughts, actions, and (re)actions vis-à-vis the reported
events. These properties of narrativity were also attended to by Ryan (2004b) in a
comparative study of interactive drama, hypertext, computer games, web cams,
and text-based virtual realities (multi-user role-playing or adventure games). The
role of narrative in these cases was found to range from central, to intermittent
(e.g., in multi-user role-playing games where dramatic action and storytelling al-
ternate with small talk), to instrumental (e.g., in other computer games). The role
of the user also varied in terms of how much interactivity was allowed: In com-
puter games, for instance, the users became an integral part of the fictional world as
main characters.
The role of enhanced interactivity in online storytelling is a consistent finding,
going back to earlier studies of hypertext fiction (e.g., Landow 1997; Mitra 1999)
and of multi-user domains (e.g., Kolko 1995); interactivity is seen as a medium af-
fordance that has redefined the relationship between writers and readers by em-
powering the latter. This relationship, though, has mainly been looked at through
the lens of literary theory, and there has been a tendency for abstract theorizing at
the expense of empirical work on actual readers and how they relate to online
stories (see Ensslin 2007 for a critique). Furthermore, the concept of narrative em-
ployed has been based on definitions of literary narrative and on rather strict, tex-
tual criteria that conform to those described in section 2 as canonical narrative. In
contrast, in sociolinguistic research on storytelling in CMC, the definitions of nar-
rative are much looser and more fluid, and in that sense they are in tune with the la-
test advances in social-interactional approaches to narrative, at times by explicitly
drawing on them. Nonetheless, narratological and sociolinguistic approaches share
the insight regarding the potential of online storytelling for enhanced interactivity
and for multiple modes of user involvement that can decisively shape a story.
Within the strand of research surveyed above, online personal stories by lay
writers have been under-represented. A step towards this direction has been taken,
however, by the study of the uses of digital tools to teach ordinary people to tell
their stories (e.g., Lambert 2006; Lundby 2008), as well as of the uses of the stories
themselves as, for example, teaching resources in online learning environments

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 701

(e.g., Beck 2004; Ritchie and Peters 2001). The term that is mostly employed for
such digitally produced stories is, not unexpectedly, “digital”. Studies of digital
storytelling draw more or less explicitly on insights about the role of narrative
emanating from social science research that is often called narrative inquiry. The
main proponents of narrative inquiry have celebrated narrative as a mode of com-
munication capable of empowering social actors (e.g., Polkinghorne 1988; Sarbin
1986). Lay people telling their stories to an attentive interviewer in interview con-
texts has been seen as a therapeutic exercise that emancipates ordinary people by
letting their voices be heard. This line of inquiry has recently been criticized for
overstating the significance of narrative and for stressing the representational as-
pects of narrative, taking what people tell about themselves at face value, as op-
posed to exploring how such aspects are shaped by contextual and interactional
factors at work (see Atkinson and Delamont 2006). Nonetheless, narrative inquiry
has been a very important qualitative research approach. Many of its epistemologi-
cal assumptions can be seen as regards digital storytelling, too, particularly the be-
lief in the emancipatory power of storytelling, which in the case of digital stories is
argued to be taken to new heights with the possibilities that the media offer for the
co-production and the wide distribution of stories (e.g., Bratteteig 2008). This
latter point resonates across studies of narrative in CMC.
Digital storytelling has figured in debates about media-led uses and new media
participation (Hartley and MacWilliam 2009), the assumption being that it funda-
mentally collapses the distinction between professional and amateur forms of self-
expression of production, at the same time encouraging creativity through the
blending of different semiotic systems. An important initiative on digital storytell-
ing originated in the Center for Digital Storytelling in California, which in the last
15 years or so has digitized 12,000 stories (Lundby 2008). The volume by Harltey
and MacWilliam (2009) documents many similar initiatives in various parts of the
world, where researchers have encouraged and enabled lay people to produce their
stories, however short or amateurishly done (e.g., with off-the-shelf equipment),
and to make them available online.
Studies of digital storytelling have by and large concentrated on stories that
have been produced under the rubrics of cultural institutions rather than on spon-
taneous teller-initiated and -led storytelling, which has recently exploded in Web
2.0 environments such as YouTube. The inclusion of the whole range of self-rep-
resentational media practices in the remit of studies of digital storytelling would
shed further light on the democratization and empowerment potential of digital
stories. More generally, studies of digital storytelling have hardly focused on how
digital stories are actually told, what narrative genres they represent, how they
differ from other narrative genres in other media, and what their main textual and
interactional aspects are. By contrast, an emphasis on narratives in online environ-
ments as genres is emerging as the focus of sociolinguistic research.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
702 Alexandra Georgakopoulou

3.1.2. Narratives in CMC as ways of telling

Pragmatic and sociolinguistic studies of narrative in CMC have mainly been inter-
ested in exploring what kinds of stories are told and how. This identification of
types of stories tends to be premised on the extent to which they exhibit certain
structural components and the ways in which they realize them. For instance, the
degree and types of evaluation in a story would be important in these approaches.
According to this point of view, both the conventional paradigm of narrative analy-
sis and the latest social-interactional approaches are relevant, inasmuch as the
noted occurrence of non-canonical stories (as described by the conventional para-
digm) in various CMC environments is in tune with the findings of the social-
interactional approaches.
The focus has mainly been on personal stories by lay writers, which are becom-
ing increasingly important in CMC as resources for self-styling and sustaining on-
line communities.5 Although the existing studies present considerable variation in
terms of their methodological and analytical frameworks, there are striking simi-
larities in their findings. In particular, the examined narratives, rather than being
single-authored, offer a distinctive potential for multiple authorship. This is facili-
tated by the possibilities for the wide circulation of a story across CMC sites and
over time, what has been labelled a “distributed story” (Walker 2004). This shap-
ing of a story by different tellers in different environments tends to militate against
a conventional structuring with a beginning, middle, and an end, as for instance
described by Labov. Instead, it frequently results in “fragmented” stories (e.g.,
Walker Rettberg 2008). At the same time, in many CMC environments it makes
little sense to talk about the structure of a story in purely linguistic (verbal) terms
without taking into account the multi-semioticity or multimodality that the
medium offers for its role in the creation of story plots. A case in point is Hoff-
mann’s (2008) and Hoffmann’s and Eisenlauer’s (2010) studies of travel weblog
entries, which show a preponderance of multi-linear, multimodal, collaboratively
produced and distributed narratives. Their analysis stresses the point that CMC en-
ables new forms of narrative interaction and authorship, ranging from the users as
authors who select the telling and design of telling online and (re)shape it, to the
users as “audience” who contribute to online evaluations, selecting the reading
order and serializing their reading engagement with weblog narratives. As noted in
section 3.1 above, this point has also been made in relation to fictional stories.
As a result of medium-enabled features, Hoffmann and Eisenlauer also ob-
served a certain fragmentation of themes and perspectives, a versatile access to the
narration, a lack of closure, and a semiotic flexibility. At the same time, weblog
narratives were not found to form a homogeneous entity but instead to vary in size,
theme, authorship, and forms of interactivity. The idea that narrative tellings on the
web can be transposed (e.g., posted) in new contexts, and that in that process new
meanings can be produced, is emerging as a common theme (see also Walker

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 703

2004). For these reasons, the unprecedented potential for co-construction, versatil-
ity, and intertextuality of narratives in online environments is frequently stated as
one of the main findings of studies of narrative in CMC (see also earlier studies of
the web and hypertext in general, e.g., Mitra 1999).
The four features of multi-linearity, fragmentation, multimodality, and interac-
tivity that Hoffmann and Eisenlauer identify as key in their data resonate with
other studies of online storytelling. It is also noteworthy that Hoffmann and Eisen-
lauer’s starting point is Labov’s model of narrative analysis. Their analysis subse-
quently shows that Labov’s model, with its emphasis on a single teller, a begin-
ning, middle, and end, and a linear development of the plot, cannot capture the
multifarious ways in which stories are told, evolve, and are transported across sites
in CMC. To take Labov as the starting point, without connecting with studies of
conversational storytelling that have criticized Labov, is not uncommon in socio-
linguistically-informed studies of narratives in CMC (e.g., Arendholz 2010; Heyd
2009; Jucker 2010).6 However, like the studies that have criticized Labov, the
CMC studies also report the occurrence of stories that depart from Labov’s full-
fledged narratives.7
An example of this is Heyd’s (2009) study of narratives in email hoaxes, defined
as “a typical case of deceptive computer-mediated communication” (1) which con-
sists of messages with false information that are disseminated electronically via the
forwarding function of email programs. Heyd (163–184) argues that the degree of
narrativity and the type of story are a function of the type of email hoax, with urban
legends and charity email hoaxes displaying the strongest tendency towards full-
fledged narratives. Heyd connects her findings with small story research as a frame
of analytical reference.
The context-specificity of the ways of storytelling in CMC is being increas-
ingly documented and, as has been the case in offline environments, there is at-
tested heterogeneity and versatility in what stories are told and how they are told,
not only across CMC environments but also within the same environment. For in-
stance, in the discussion forum of a body-building community, Page (2009) reports
that different types of stories are intimately linked with their placement, i.e., where
exactly in relation to a post they occurred, and their function, i.e., what purpose or
social action they fulfilled. Specifically, stories told in response to a post were often
stories of projected events, offering the original writer advice on how he or she
should act in the future. In another study by the same author (2008) of narratives
in weblogs of bloggers who had been diagnosed and were being treated for cancer,
the different types of stories told were linked to the blogger’s gender.
Similarly, in a study of email messages exchanged between diasporic Greek
friends based in London (Georgakopoulou 2004), it was found that the types of
stories told were connected with the participants’ intimate relationships and actual
geographical proximity, which allowed for numerous offline interactions as well.
Specifically, the stories established links between the current tellings on email and

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
704 Alexandra Georgakopoulou

previous and future face-to-face interactions of the senders and receivers: For in-
stance, certain stories that I called “stories-to-be-told” started out being narrated on
email, but their full telling was deferred and promised for an occasion of face-to-
face interaction. What I called “breaking news” stories (see discussion below) re-
ported events with immediacy, i.e., very recent events (e.g., “this morning”, “just
now”), or as still unfolding, as the story was being constructed. Overall, the study
proposed an account of these types of stories that hinged on the intersection
between aspects of the mediated context at hand and the participants’ intimate re-
lationships. In terms of the former, the tellers’ media-afforded ability to share
events with their friends as they were happening to them, their addressees’ media-
afforded ability to provide feedback on those events very quickly, and the require-
ment (at least in the given group) to keep messages very brief were all relevant fac-
tors. In general, this line of inquiry into how ways of (story)telling in CMC con-
texts are shaped by the medium, on the one hand, and the storytellers’ social roles
and relations, on the other, is still in its early stages.
What existing studies have shown quite definitively is that the canonical nar-
rative of (more or less distant) past events from the teller’s life is far from being the
norm in CMC environments: See, for example, Baym (2000) in relation to the
stories in a soap-opera newsgroup; Georgakopoulou (2004) in relation to the stories
in private email messages; and Page (2009) in relation to status updates on Face-
book. (A detailed discussion of Page’s studies of personal stories in blogs and
Facebook updates can be found in her 2012 book, which was not published and
thus not available to me when writing this chapter.) This shortening of the distance
between the two worlds, that is, the narrating and the narrated world, is emerging
as a distinctive feature not just in personal storytelling in CMC but also in personal
stories facilitated by the new media. This is a finding worth assessing further in the
context of new media affordances for storytelling. In much of the narrative theory
developed so far, the deictic separation between the two worlds of telling and told,
or the so-called double chronology (Chatman 1990), has been a feature of major
importance for the creation of the tellers’ perspective or point of view, as well as
for their ability to reflect on the narrated events (see Freeman 2010). It is therefore
worth scrutinizing the implications of the frequency and salience of the “breaking
news” type of story in online environments for these key features of the narrative
canon.
In particular, the following features of breaking news stories relate to media af-
fordances: the speed with which a story can be shared with others; the potential for
the “audiences” of the story to shape the continuation of the telling with their en-
gagements; and, finally, the potential for distribution of the story. Let us consider
these features in the following examples. The first example comes from a sequence
of two Facebook status updates (SUs) and the comments they received. (Note that
on Facebook, SUs and comments are followed by timestamps appended automati-
cally by the system.)

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 705

(1)
Gertie Brown8 is feeling much better with a hole in her leg!
August 27 at 12.19pm
David Martin Got to ask … What! How big??!
August 27 at 3.15pm
Gertie Brown it was about 3 inches! looks like a bullet wound, now about 1 inch.
August 27 at 3:18pm
David Martin how? Why? Is JB shooting at you now?·
August 27 at 3.22pm
Gertie Brown Got in the way of a pigeon …
August 27 at 3.26pm

Gertie Brown is recovering from an unexpected operation as a result of a trip to


A&E9 on monday night M
August 25 at 7.45pm
Charlotte Harris Oh my God! Are you ok? Not the ideal end to what I hope was
otherwise a fabulous weekend and a lovely christening … Thank you again, xxx
August 25 at 8.01pm
((Another 14 comments))
Gertie Brown Thanks everyone. Not much to worry about. It was a painful ab-
scess which I thought would go away with some basic home treatment but by
Monday it was unbearable and huge so had to go to A&E to have it removed –
cross & painful but on the mend! Apparently they are quite normal?!
August 26 at 9.03am
((Another 12 comments))

SUs are presented in reverse chronological order on Facebook, and as can be


seen in the example above, this has implications for how breaking news stories
evolve. The first breaking news posting from Gertie Brown on August 25 at
7.24 pm (“is recovering from an unexpected operation as a result of a trip to
A&E on monday night M”) leads to more developed narrative making in her
response to comments, posted the following day: “It was a painful abscess which
I thought would go away with some basic home treatment but by Monday it was
unbearable and huge so had to go to A&E to have it removed – cross & painful
but on the mend! Apparently they are quite normal?!” This comment follows
and is closely related to the 15 comments Gertie received from anxious friends
who wanted to find out “what happened”, as illustrated by the comment from
Charlotte Harris. Gertie acknowledges this interest in her comment and provides
more story details in the way of sequenced events and her evaluation of them:
“Thank you everybody. Not much to worry about.” A day later, on August 27,
Gertie provides a further SU: “Gertie Brown is feeling much better with a hole in
her leg!”

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
706 Alexandra Georgakopoulou

Breaking news stories, as I found in my study of email messages (Georgako-


poulou 2004), are routinely followed by further narrative making which takes the
form of more elaborate and detailed tellings of the events and/or updates, such as
the ones in the example above. In the email messages, more detailed tellings
tended to be reserved for the participants’ face-to-face interactions; this had to do
with the participants’ geographical proximity and frequency of offline interaction.
More generally, the development of breaking news stories either in different en-
vironments of the same medium or in different media is a common occurrence. I re-
turn to this point below.
To return to the example from Facebook above, what is interesting in the com-
ment exchanges between Gertie and David is that a different storyline is opened from
the one established thus far, a storyline that reconstructs the events, even if jokingly,
in a different way, i.e., as the result of Gertie’s husband (JB), whose hobby is hunt-
ing, having accidentally shot her. One can hypothesize that when David read Gertie’s
SU, he missed the previous storytelling “thread” about what had happened to her.
Even if this were the case, it does not cancel out the fact that Gertie as the original
teller made a choice to co-construct with David a new scenario of events. As differ-
ent audiences tune in to a developing story at different times and points of develop-
ment, their modes of engagement can be much more effective in shaping the telling
than has been reported about stories involving past events in offline environments.
In addition, the media facilitate the recontextualization of a story in different
environments, as can be seen in example (2) below from the newspaper Mail On-
line, which like many newspapers nowadays features Twitter communication of
celebrities:
(2)
He has three young daughters, so it’s no wonder Jamie Oliver10 couldn’t contain his
joy when wife Jools had a baby boy last night. The 35-year-old chef tweeted about
his joy following the birth and revealed they had decided to call their son Buddy
Bear Maurice Oliver. He wrote: “It’s a baby boy guys!!! I’m shocked, we’re all
very happy, mum was amazing and both are well and happy x4 kids!! what?!”
Jamie then tweeted another picture of the tot, writing: “Mr Buddy Oliver … full
name to come from mum … big love joxx”
Comments Add to my stories
Congrats!
You will need all the help you can find for a lad! LOL
I have 3 wonderful girls and one lad who is a handful!
Good luck!
– ws, north america and uk, 16/9/2010 15:41 Rating 1311
A son at last, congratulations. Now can Jools stop producing babies?
She looks absolutely shattered poor thing.
– Carol, Co.Durham, 16/9/2010 14:49 Rating 2

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 707

Currently, celebrity tweets posted to Twitter are commonly recontextualized


(e.g., re-tweeted) in both printed (e.g., newspaper columns, magazines) and online
media. According to Bauman and Briggs (1990), any act of recontextualization in-
evitably produces new meanings. In the above example, Jamie Oliver’s breaking
news story on Twitter about the birth of his son is both being introduced to poten-
tially new audiences (who may have not followed Jamie Oliver’s tweets) and being
provided an evaluation by the author of the online article that was absent from the
original tweet: “He has three young daughters, so it’s no wonder Jamie Oliver
couldn’t contain his joy when wife Jools had a baby boy last night”.
The recontextualization does not end there. The comments-posting facility that
online publications such as the Mail Online offer to readers can result in a wide
range of audience responses, which add yet more evaluative perspectives on the re-
contextualized breaking news story. The two comments I have singled out above
from a total of 316 posted comments bring in interpretative viewpoints that are no-
where to be found either in the original story or in the recontextualized one. The
first indirectly undermines the evaluation of the article by suggesting that having a
boy after three daughters may not be such unadulterated joy: “I have three wonder-
ful girls and a lad who is a handful”. The second brings in the perspective of the
“shattered mother” of four by making reference to Jools (Jamie Oliver’s wife).
What is also notable about those modes of evaluation is that they are themselves
rated by other readers: The comment, for instance, that switches the perspective to
Jools, which in the context is introducing a new point for the story, gets a very low
rating, suggesting that this point is not appreciated by other readers.
The example above constitutes only one of the trajectories of the breaking news
story in question: One can assume with relative certainty that both this article and
the comments were transposed and distributed elsewhere (the “add to my stories”
feature facilitates this), but also that the original tweet was recontextualized in
other ways and elsewhere. In all such cases, the media serve as vehicles for dis-
tribution and recontextualization by regulating and enhancing the ongoing-ness of
a story and by shaping the terms of telling and the possibilities for interactivity. It
can be further assumed that readers ceasing to post comments on a story is instru-
mental in the story ceasing to be told and evaluated; also, that stories that attract in-
terest, that are in traditional narrative analysis terms seen as “tellable”, get to be
circulated more than less tellable ones. In addition, the fact that stories on Twitter
are very brief, in keeping with the 140-character limit on tweets, both generates the
need for further, more detailed storying in other environments and facilitates the
transposition of tweets as quotable items in other contexts. In all cases, the story-
telling that develops through different recontextualizations is one containing
multiple voices and points of view.
The above examples suggest the need for online narrative activities to be
studied for the ways in which they relate to – e.g., become consequential for, im-
pinge on, facilitate, enable or constrain, recontextualize and are recontextualized

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
708 Alexandra Georgakopoulou

by – other ongoing, past, or anticipated, online or offline stories. An illustration of


such an orientation comes from a sociolinguistic study of the classroom interac-
tions of the 14-year-old students of a London comprehensive school (Georgako-
poulou 2008).12 In this study I documented some of the interrelations between on-
line and offline stories by exploring how media engagements provide the “stuff for
stories”, that is, how they are locally reported and emplotted in everyday, face-to-
face environments. Specifically, I conducted a case study of the two female stu-
dents who were found in a quantitative survey of nine focal participants (five male,
four female) to be the most prolific in terms of new media engagements. Such
engagements included actual uses of technologies (e.g., texting, talking on a mo-
bile phone), performances of media events (e.g., singing), and reports of engage-
ment (e.g., talk about a TV series that they had watched). I found that about 30 % of
such engagements were in the form of stories. These stories were mostly reports of
recent mediated interactions (e.g., on MSN, on Skype) of the participants with
boys they were interested in, and they fitted the definition of breaking news (see
above). The study in general and the focus on stories in particular showed the im-
portant role that the new media play in the ongoing narration of everyday life
among young people in the UK. The stories of new media engagements were found
to be an integral part of the participants’ joint construction of norms of conduct and
of ongoing negotiations of the participants’ identities and peer-group relations.
New media figured in their plot and tellings in any of the following ways:
i) as social settings (sites) where moral transgression takes place, as for in-
stance in cases of boys flouting the proscriptions and norms of conduct associated
with MSN;
ii) as resources for the collaborative development of a projective narrative, as
when, for example, girls rehearsed together what to say to a boy on the phone or
next time they went on webcam with him;
iii) as clearly marked stages in the plot development of “stories-in-the-mak-
ing”, as, for instance, in the case of text messages being read by the recipient to her
friends as they were received and forming the basis of subsequent storytelling;
iv) as evidentiary resources (with, e.g., text messages or forwarded messages
used to corroborate narrative claims).

4. Conclusion

This chapter has surveyed recently emerging research on narrative in pragmatic,


discourse, and sociolinguistic studies of CMC. The aim has been to show how
these studies have connected (or in some cases not) with narrative analysis that has
concentrated on spoken conversational data. It was argued that both lines of in-
quiry share an increasing recognition of the frequency and significance of stories
that are fragmented, distributed, co-constructed, and intertextually linked, and

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 709

which in these respects depart from the canonical narratives that until recently
monopolized scholarly attention. Both narratological studies of fictional stories
and sociolinguistic studies of personal stories support this finding in a wide range
of CMC environments.
The extent to which such forms of narrative constitute new and/or exclusively
media-shaped genres is, nonetheless, less well understood and agreed upon.
Studies with an emphasis on processes of re-mediation tend to stress the import-
ance of the hypertextual organisation and multimodality of the Internet for the
ways in which narratives are shaped online,13 therefore suggesting more or less ex-
plicitly medium-shaped changes. Studies that draw on research in conversational
(face-to-face) storytelling seem to be more attuned to narrative features such as in-
teractivity, intertextuality, and fragmentation that have recently been attested in
conversational storytelling, as well. The co-construction of stories and their ability
to be transposed across time and place and recontextualized in the process, while at
the same time acquiring new meanings in their new environments, is something
that has been stressed by many a study in relation to conversational storytelling
(e.g., Bauman and Briggs 1990). Yet, as the discussion of breaking news stories at-
tempted to show, there seems to be a difference in the scale of distribution and re-
contextualization enabled by CMC. Also on a different scale is the potential for the
involvement of diverse and in many cases “invisible” to the teller audiences in the
shaping and (re)shaping of a story.
On the basis of this, it can be argued that both the potential for a story’s re-
contextualization and the various modes of audience interaction with it are inti-
mately linked with the new media-enabled potential and speed for telling the story
in the first place, for continuing to develop it in the same or other environments,
and for distributing it widely. To engage more fully with work on conversational
storytelling – for instance, small stories research, which has attested to similar
ways of storytelling – may be one way to push forward the agenda of articulating as
fully as possible what is distinctive about online stories and how that draws on, de-
parts from, or indeed remediates other forms and practices of storytelling in offline
or other media environments.
Further analyses should also connect with the proliferating work on CMC and
identities (see, e.g., chapters in Danet and Herring 2007), as well as with the direc-
tion that the linguistically-informed study of contemporary digital textual practices
is increasingly taking: This direction involves going beyond the exploration of lin-
guistic features of different types of CMC and instead engaging systematically
with their multi-authorship, translocality, and multimodality (e.g., Androutsopou-
los 2010). Finally, unanswered questions still remain about the interrelationships
between online and offline narrative activities, particularly with regard to how new
media as historically and socioculturally shaped resources and tools enable and be-
come oriented to in narrative activities offline.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
710 Alexandra Georgakopoulou

Acknowledgements

This chapter has benefited greatly from the detailed comments and editorial care of
Susan Herring, Tuija Virtanen, and Dieter Stein, to whom I express my gratitude.

Notes

1. For examples of early and defining work in this respect see Bauman (1986), M. H.
Goodwin (1990), Hymes (1981), and Shuman (1986).
2. The term “virtual” narratives has also been used (Ryan 2004).
3. The terms “narrative” and “story” (storytelling) are used interchangeably in this
chapter. This is not always the case in the literature on narrative, particularly in the nar-
ratological tradition.
4. This discussion cannot possibly do justice to the different schools of narratology as they
have developed over the years nor to the decisive shift in the area from so-called clas-
sical to post-classical narratology (for an overview of the area, see Fludernik 2009).
Suffice it to say that narratological studies of narrative in CMC are mostly situated in the
post-classical narratology, which has increasingly attended to issues of context as well
as opening up the definitions of narrative to include cases beyond literature (e.g., rang-
ing from everyday storytelling to comics and “virtual” stories).
5. For instance, Sack (2003), although interested in story understanding rather than pro-
duction, states that “many online social networks have their basis in the sharing of nar-
ratives”, “a non-trivial portion of social networks are based on discussions of widely
circulated stories”, and “virtual, on-line communities are a result of net-mediated, story-
based relations” (305).
6. Elsewhere (Georgakopoulou 2006b), I have noted a similar trend in studies that have
sought to document the relationships of CMC with spoken and written discourse. I have
specifically suggested that many of them failed to draw on and be informed by previous
sociolinguistic studies of spoken and written discourse that had problematized the rela-
tionship between spoken and written language.
7. Although not related to personal storytelling, Jucker’s (2010) study of online live sports
commentaries stressed the media-afforded (online television) possibility for synchron-
izing the telling time with the event time and for continuously updating the account re-
sults in distinct forms of storytelling that are based on enhanced interactivity.
8. All usernames and person and place names employed in the examples are pseudonyms.
9. A&E is an abbreviation for Accident & Emergency.
10. Jamie Oliver is an English celebrity chef.
11. The readers’ comments on Mail Online articles are rated by other readers positively or
negatively, with the arrows F and G respectively. The number next to the category Rating
refers to the total score of the ratings received. In this particular example, best-rated
comments received overall ratings of approximately 1500.
12. The study was part of an ESRC Identities and Social Action funded project entitled
“Urban Classroom Culture and Interaction” (www. identities.org.uk). The project team
consisted of Ben Rampton (Director), Roxy Harris, Alexandra Georgakopoulou, Con-
stant Leung, Caroline Dover, and Lauren Small.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 711

13. For instance, Fetzer (2010) suggests that political websites fulfill the same persuasive
function as that of comparable material in printed form (e.g., newspapers), but through
the use of embedded and multimodal narratives in hypertextual links.

References

Androutsopoulos, Jannis K.
2006 Introduction: Sociolinguistics and computer-mediated communication. Jour-
nal of Sociolinguistics 10(4): 419–438.
Androutsopoulos, Jannis K.
2010 The study of language and space in media discourse. In: Peter Auer and Jürgen
E. Schmidt (eds.), Language and Space: An International Handbook of Lin-
guistic Variation. Volume I: Theories and Methods, 740–758. Handbooks of
Linguistics and Communication Science 30.1. Berlin/New York: de Gruyter.
Arendholz, Jenny
2010 “Need to put this out there (My Story)” – Narratives in message boards. In:
Christian Hoffmann (ed.), Narrative Revisited, 109–142. Amsterdam/Philad-
elphia: John Benjamins.
Atkinson, Paul and Sarah Delamont
2006 Rescuing narrative from qualitative research. Narrative Inquiry 16: 173–181.
Bamberg, Michael (ed.)
1997 Oral Versions of Personal Experience: Three Decades of Narrative Analysis.
Special issue, Journal of Narrative and Life History 7(1–4).
Bamberg, Michael
2004 Talk, small stories, and adolescent identities. Human Development 47:
331–353.
Bamberg, Michael (ed.)
2006 Narrative – State of the Art. Special issue, Narrative Inquiry 16(1).
Bamberg, Michael and Alexandra Georgakopoulou
2008 Small stories as a new perspective in narrative and identity analysis. Text &
Talk 28: 377–396.
Bauman, Richard and Charles L. Briggs
1990 Poetics and performance as critical perspectives on language and social life.
Annual Review of Anthropology 19: 59–88.
Baym, Nancy K.
2000 Tune in, Log on: Soaps, Fandom, and Online Community. Thousand Oaks, CA:
Sage.
Beck, Dennis
2004 The use of narrative in online education. In: Richard Ferdig et al. (eds.), Pro-
ceedings of Society for Information Technology & Teacher Education Inter-
national Conference 2004, 352–355. Chesapeake, VA: AACE.
Bell, Alice
2010 The Possible Worlds of Hypertext Fiction. Basingstoke, UK: Palgrave Mac-
millan.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
712 Alexandra Georgakopoulou

Bratteteig, Tone
2008 Does it matter that it is digital? In: Knut Lundby (ed.), Digital Storytelling,
Mediatized Stories: Self-representation in New Media, 271–284. New York:
Peter Lang.
Brockmeier, Jens and Donald Carbaugh (eds.)
2001 Narrative and Identity Studies: Autobiography, Self and Culture. Amsterdam/
Philadelphia: John Benjamins.
Chatman, Seymour
1990 Coming to Terms: The Rhetoric of Narrative in Fiction and Film. Ithaca, NY:
Cornell University Press.
Cherny, Lynn
1999 Conversation and Community: Chat in a Virtual World. Stanford, CA: CSLI.
Ciccoricco, David
2007 Reading Network Fiction. Tuscaloosa, AL: University of Alabama Press.
Daiute, Colette and Cynthia Lightfoot (eds.)
2004 Narrative Analysis: Studying the Development of Individuals in Society. Lon-
don: Sage.
Danet, Brenda
2001 Cyberpl@y: Communicating Online. Oxford, UK: Berg.
Danet, Brenda and Susan C. Herring (eds.)
2003 The Multilingual Internet: Language, Culture, and Communication in Instant
Messaging, Email, and Chat. Special issue, Journal of Computer Mediated
Communication 9(1). http://jcmc.indiana.edu/vol9/issue1/
Danet, Brenda and Susan C. Herring (eds.)
2007 The Multilingual Internet: Language, Culture, and Communication Online.
New York: Oxford University Press.
De Fina, Anna
2003 Identity in Narrative: A Study of Immigrant Discourse. Amsterdam/Philadelp-
hia: John Benjamins.
De Fina, Anna and Alexandra Georgakopoulou
2008 Analysing narratives as practices. Journal of Qualitative Research 8: 379–387.
De Fina, Anna, Deborah Schiffrin, and Michael Bamberg (eds.)
2006 Discourse and Identity. Cambridge, UK: Cambridge University Press.
Douglas, J. Yellowlees
2000 The End of Books – or Books without End? Ann Arbor, MI: University of Mi-
chigan Press.
Ensslin, Astrid
2007 Canonizing Hypertext: Explorations and Constructions. London: Continuum.
Fludernik, Monika
2009 Introduction to Narratology. Abingdon/New York: Routledge.
Freeman, Mark
2010 Hindsight: The Promise and Peril of Looking Backward. New York: Oxford
University Press.
Georgakopoulou, Alexandra
1997 Self-presentation and interactional alignments in e-mail discourse: The style-
and code switches of Greek messages. International Journal of Applied Lin-
guistics 7: 141–164.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 713

Georgakopoulou, Alexandra
2003 Computer-mediated communication. In: Jef Verschueren, Jan-Ola Östman, Jan
Blommaert, and Chris Bulcaen (eds.), Handbook of Pragmatics, 1–20. Am-
sterdam/Philadelphia: Benjamins.
Georgakopoulou, Alexandra
2004 To tell or not to tell?: Email stories between on- and off-line interactions. Lan-
guage@Internet 1, article 1. http://www.languageatinternet.org/articles/2004/36
Georgakopoulou, Alexandra
2006a Small and large identities in narrative (inter)-action. In: Anna De Fina, Debo-
rah Schiffrin, and Michael Bamberg (eds.), Discourse and Identity, 83–102.
Cambridge, UK: Cambridge University Press.
Georgakopoulou, Alexandra
2006b Thinking big with small stories in narrative and identity analysis. Narrative In-
quiry 16: 129–137.
Georgakopoulou, Alexandra
2006c Postscript. Computer-mediated communication in sociolinguistics. Journal of
Sociolinguistics 10(4): 548–557.
Georgakopoulou, Alexandra
2007 Small Stories, Interaction, and Identities. Amsterdam/Philadelphia: John Ben-
jamins.
Georgakopoulou, Alexandra
2008 “On MSN with buff boys”. Self- and other-identity claims in the context of
small stories. Journal of Sociolinguistics 12(5): 597–626.
Goodwin, Marjorie H.
1990 He-said-she-said: Talk as Social Organization among Black Children. Bloom-
ington, IN: Indiana University Press.
Hartley, John and Kelly McWilliam
2009 Story Circle: Digital Storytelling around the World. Malden, MA: Wiley-
Blackwell.
Hayles, Katherine
2008 Electronic Literature: New Horizons for the Literary. Notre Dame, IN: Univer-
sity of Notre Dame Press.
Herman, David
2009 Basic Elements of Narrative. Oxford, UK: Wiley-Blackwell.
Herring, Susan C.
2004 Slouching toward the ordinary: Current trends in computer-mediated com-
munication. New Media & Society 6(1): 26–36.
Heyd, Teresa
2009 Email Hoaxes. Form, Function, Genre Relations. Amsterdam/Philadelphia:
John Benjamins.
Hoffmann, Christian
2008 “Once upon a blog”. Paradigms of narrative interaction. Paper presented to the
Stylistic Workshop – The State of the Art, ISLE 2008, Freiburg, 8–11 October.
Eisenlauer, Volker J. and Christian Hoffmann
2010 Once upon a blog … storytelling in weblogs. In: Christian Hoffmann (ed.),
Narrative Revisited, 79–108. Amsterdam/Philadelphia: John Benjamins.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
714 Alexandra Georgakopoulou

Hymes, Dell
1981 “In Vain I Tried to Tell You”: Essays in Native American Ethnopoetics. Phil-
adelphia: University of Pennsylvania Press.
Jucker, Andreas
2010 “Audacious, brilliant!! What a strike!” Live text commentaries on the Internet
as real-time narratives. In: Christian Hoffmann (ed.), Narrative Revisited,
57–78. Amsterdam/Philadelphia: John Benjamins.
Kolko, Beth E.
1995 Building a world with words: The narrative reality of virtual communities.
Works and Days 13(1–2): 105–126.
Labov, William
1972 Language in the Inner City. Philadelphia: University of Pennsylvania Press.
Labov, William and Joshua Waletzky
1967 Narrative analysis: Oral versions of personal experience. In: June Helm (ed.),
Essays on the Verbal and Visual Arts, 12–44. Seattle: University of Washington
Press.
Lambert, Joe
2006 Digital Storytelling: Capturing Lives, Creating Community. Berkeley, CA:
Digital Diner Press.
Landow, George
1997 Hypertext 2.0: The Convergence of Contemporary Critical Theory and Tech-
nology. Baltimore, MD: Johns Hopkins University Press.
Lundby, Knut (ed.)
2008 Digital Storytelling, Mediatised Stories: Self-representations in New Media.
New York: Peter Lang.
Mitra, Sanjit
1999 Minimally invasive education for mass computer literacy. CSI Communi-
cations (June): 12–16.
Morris, Adelaide and Thomas Swiss
2009 New Media Poetics – Contexts, Technotexts, and Theories. Cambridge, MA:
MIT Press.
Ochs, Elinor and Lisa Capps
2001 Living Narrative. Cambridge, MA: Harvard University Press.
Page, Ruth E.
2008 Gender and genre revisited: Storyworlds in personal blogs. Genre: Forms of
Discourse and Culture XLI: 151–177.
Page, Ruth E.
2009 Trivia and tellability: Storytelling in status updates. Paper presented at the
Centre for Language, Discourse & Communication Research Seminars, King’s
College London, 14 October.
Page, Ruth E.
2012 Stories and Social Media. New York/London: Routledge.
Polkinghorne, Dan
1988 Narrative Knowing and the Human Sciences. Albany, NY: State University of
New York Press.
Riessman, Cathy
2008 Narrative Research Methods in the Social Sciences. London: Sage.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
Narrative analysis and computer-mediated communication 715

Ritchie, Garth and Sally Ann Peters


2001 Using narratives in conferences to improve CMC learning environments. Jour-
nal of Computer Assisted Learning 17: 376–385.
Ryan, Marie-Laure
2004a Introduction. In: Narrative Across Media: The Languages of Storytelling,
1–40. Lincoln/London: University of Nebraska Press.
Ryan, Marie-Laure
2004b Will new media produce new narratives? In: Narrative Across Media: The
Languages of Storytelling, 337–360. Lincoln/London: University of Nebraska
Press.
Sack, Warren
2003 Stories and social networks. http://www.cs.cmu.edu/~michaelm/nidocs/Sack.
pdf
Sarbin, Theodore
1986 Narrative Psychology: The Storied Nature of Human Conduct. New York:
Praeger.
Shuman, Amy
1986 Storytelling Rights: The Uses of Oral and Written Texts by Urban Adolescents.
Cambridge, UK: Cambridge University Press.
Swales, John
1990 Genre Analysis: English in Academic and Research Settings. Cambridge, UK:
Cambridge University Press.
Walker, Jill
2004 Distributed narrative: Telling stories across networks. Paper presented at Inter-
net Research 5.0, Sussex, UK, 19–22 September. http://huminf.uib.no/~jill/
talks/DistributedNarr.html
Walker Rettberg, Jill
2008 Blogging. Cambridge, UK: Polity Press.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
716 Alexandra Georgakopoulou

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:03 AM
29. Genre and computer-mediated communication
Janet Giltrow

1. Concepts of genre

Genre is an active term in several areas of language study: not only in pragmatics
but also in corpus studies, in Critical Discourse Analysis, and in areas more peda-
gogically oriented, such as English for Special/Academic Purposes and Sydney
School Systemic-Functional Linguistics. The term also figures importantly in lit-
erary studies, rhetoric, and information and organisational studies. The different
methodologies and research objectives of these fields result in different concep-
tualisations of genre itself. Yet one might say that two principles are shared across
notions of genre. First, genre is a typifying concept: Instances of utterance re-
semble one another and can be classified or recognised thereby. In literary studies,
Cohen (1986) has said that genre is principally a classifying activity and socio-
historically contingent. Second, genre is a phenomenon at the interface of language
and sociality. Even general classifications, such as “academic” or “literary”, point
to speakers’ involvement in a social activity.
Because the emphasis on and application of these principles are uneven in
research practice, genre can have different profiles in different disciplines. Es-
pecially, the level at which genre is named can fluctuate. In some fields, such
as Sydney School Systemic-Functional Linguistics, “narrative” or “recount” can
be designated as a genre, whereas in others, such as recent literary theory, “village
stories, 1820s-1850s” is presented as a genre (Moretti 2005). As this chapter will
show, genre research in the pragmatics of computer-mediated communication
(CMC) has tended to the lower levels. Fluctuations from higher to lower, and even
very low, are still an issue for genre study, however, as Herring (2007) notes, mak-
ing genre classification “imprecise”.
Virtanen (2010) offers relief from this stubborn condition by proposing that
discourse types and text types, on the one hand, and genres, on the other hand, are
categories that address different language phenomena and should be distinguished.
Discourse types (with focus on function) and text types (with focus on form) are
cognitively heuristic: They are “templates” for production and cues for reception.
The same has been said about genres. But text types and discourse types, while
“dynamic” in their interplay, are relatively “abstract” and “prototypical”, accord-
ing to Virtanen, whereas genres are concretely situated. The temptation might be to
say that genre is simply lower on the scale of generality than type (discourse or
text), but Virtanen is asking for a more fundamental re-thinking of this fluctuation –
different dynamics and different cognitive manifestations, not simply more general

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
718 Janet Giltrow

vs. more specific. (See Heyd 2009 as discussed below for an application of com-
parable, albeit not identical, principles for managing levels of generality.)
Inseparable from the level at which genre is named is the question of the closed
or open set: Where genre has been named at a very high level, the set is closed, li-
mited to a few timeless universals. When the level of naming is lower, the set opens
to history – as the appearance, and then the disappearance, of the literary genre
“village story” shows as a response to social, economic, and technological change.
Change being a widely perceived feature of CMC, genre research in the pragmatics
of the Internet has tended, in practice, to assume the open set.
Harder to characterise is researchers’ attitude towards genre itself. Tradition-
ally, and perhaps currently, genre has been regarded as what is conventional –
even, as Puschmann states, referring to Swales (1990), what is “fixed” (Puschmann
2009: 81). In literary study, especially, there has been a tradition of imagining
genre as what is to be defied or transcended, when aesthetic aspirations challenge
convention. It is possible, however, to regard genre as what is ceaselessly differ-
entiating, producing not sameness but the variety of “spheres of activity” (Bakhtin
1986): genre, that is, as “difference” (Giltrow 2010). Popular claims for CMC have
often assumed its potential to break away from what is fixed and standard, to over-
turn even regularity itself, and to entertain the unheard-of. The research reported in
this chapter, however, shows that CMC hosts the transfer, emergence, and trans-
formation of genres – not their elimination.
As most recent research in the pragmatics of the Internet has settled to low le-
vels of generality in naming genre, and has both anticipated and recorded an open
set, pragmatics research is most in keeping with rhetorical theorisations of genre,
and these provide a background to this chapter’s review of research. Arguably, rhe-
torical study is the field that has in our time paid the most sustained attention to
genre, developing from U.S. proposals for “situational rhetoric” in the 1970s
(Bitzer 1968, 1980) and elaborated on many fronts since then. Rhetorical theories
of genre bring strong claims for the priority of action over form: Genre is known
principally not by regularities of form but by recurrence of action in response to
socio-cultural situation. People speak in relatively similar ways not to replicate
formal patterns but to participate in the spheres of activity observed by Bakhtin,
these being local to people’s immediate experience. Accordingly, rhetorical con-
ceptions of genre include the notions of exigence (first in Bitzer 1968, 1980) –
people’s mutual recognition of a need or a reason for speaking in a certain way,
here and now – and motive: Amongst those who recognise the exigence, some will
be motivated to speak up. So, for example, many in a certain time and place may
recognise the reasonableness of composing a political blog, while fewer will be
motivated actually to do so. At another time and place, the exigence may be indis-
cernible to all: The utterance may seem a freakish outburst or a quaint archaism. Or
it may simply have no counterpart. Rhetorical genre theory insists thereby on the
phenomenological volatility of the open set, as well as its relative stability.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 719

Rhetorical theorists of genre have argued that genre is a fusion of form and situ-
ation (Campbell and Jamieson 1978; Miller 1984), language features being func-
tionally responsive to features of situation. A strong version of this claim is that
genre is not a linguistic import to a social situation, or a handy instrument for the
accomplishment of goals, but a blend of language and situation: Genre is at once
typical speech1 and recognised situation. For example, an emailed thank you for
dinner-table hospitality is not an instance of the genre thank-you note unless there
has been a dinner party, an accompanying degree of relationship between host and
guest, and so on, all these conditions activating sensations of exigence and motive,
mutually recognised by sender and recipient of the thank-you message.
Close (but not identical) to rhetorical genre theory are Swales’ (1990) propos-
als for “genre analysis”. Whereas rhetorical theory has identified “social action”
(Miller 1984) as the basis for genre status, Swales names communicative purpose
as the principal criterion for “a collection of communicative events” to “[turn] into
a genre” (47). But communicative purpose is not easy to isolate: It can be multiple;
it can disappear altogether (46–47). Swales himself, with Askehave, has revisited
the notion of communicative purpose (Askehave and Swales 2001), urging scepti-
cism of the terms in which both analysts and genre-users identify it. To be sure, so-
cial action is like communicative purpose in being hard – or even harder – to pin
down. But whereas communicative purpose might ask, of a political blogger, for
example, “what is your purpose in saying this?” and hear “to inform”, “to debate”,
“to express an opinion”, social action would ask, “what makes you want to inform,
debate, express?” The answer would be less accessible, more tacitly embedded in
situational exigence, less isolable than communicative purpose as an aspect of
genre.
In his earlier proposals in which he finds it possible to isolate purpose, Swales
also finds it possible to separate form from motive. He defends this formalism on
the basis of the success of international education: Students can practise “discourse
conventions” without experiencing the motives which culturally sanction those
conventions (or, in Swales’ terms, without being “assimilated”); discourse conven-
tions can be employed purely in “an instrumental manner”, that is, without com-
mitment to the sphere of activity in which the exigence is recognised (30–31).
While these are both possibilities, as are deception and pretending, as discussed
below, they may be peripheral rather than core to genre. Nevertheless, as we will
see, Swales’ genre analysis offers important formal measures.
Similarly, Herring’s (2007) proposal for classifying CMC genres offers means
of analysing regularities of occurrence, means lacking in rhetorical theory. In Her-
ring’s proposal, communicative purpose, rather than being genre-definitive, is one
of a range of “situation factors”, joining, for example, participant characteristics,
activity, and norms. Herring’s proposals advance analysis of CMC by methodically
recognising technological features of situation (e.g., synchronicity, persistence of
transcript, anonymity) as pragmatic conditions, thereby recognising technology

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
720 Janet Giltrow

itself as a social circumstance and identifying medial parameters which the re-
search reported in this chapter shows to be constitutive of genres. At the same time,
as Herring notes, the results of analysis still need to be reconciled with speakers’
consciousness of the categories discovered by analysis. The research reported
below will show many ways in which speakers’ experience of genres – their sen-
sation of exigence and motive – can be extrapolated from their observable lan-
guage behaviours.
Genre study of CMC may be particularly opportune. At this point in e-history,
citizens of the Internet are still constructing the pragmatic dimensions of genres;
adapting and instituting the conditions of proximity and distance, synchronicity
and sequence, community solidarities and estrangements. Possibly these still-
exposed efforts will retire as newness consolidates into custom. Or they may
persist, owing to CMC’s technological profile. To a degree greater than other
media, including broadcast media, computer media are open to technological
design and re-design in response to techniques of use, and they call for the kind of
faceted analysis Herring proposes.
Genre study of CMC has also exposed an undefeatable sociality. Even as par-
ticipants in CMC experience technical lags and accelerants, they call on rich social
contexts both enduring and evolving, as the research reported below shows. Draw-
ing on these dense contexts, communicative behaviours are typifiable and recog-
nisable to the naked eye. Classification of these types shows not simply that people
develop functional ways of speaking under newly enabled conditions, but that they
construct mutual knowledge of these ways: They not only know and recognise a
way of speaking but also know that others know this speechway. While classifi-
cation – the professional follow-up on folk recognition – is not an end in itself, not
the reason for genre, it is an instrument for tracing the sociality of linguistic con-
sciousness.
Section 2 selects research which, by investigating pragmatic features, dis-
covers digital genres, indicating areas for future inquiry into the pragmatics of
genre in CMC. Section 3 reports research for which CMC genre is itself the object
of inquiry.

2. Genre-related pragmatics

Clark and Brennan’s important article on “grounding” (1991) is an example of how


concerns central to pragmatics point the way to future research in CMC genres.
Email is one of several technologically definable contexts which compromise co-
presence (others being, for example, telephone, fax, voicemail, teleconferencing,
and writing and print themselves) and which people have become used to. To
ground an utterance in mutual knowledge, a speaker estimates the attention and
consciousness of the addressee, who, in turn, “gives evidence” of the success (or

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 721

failure) of those attempts. Whereas in face-to-face and telephonic conversation an


immediate response from the addressee gives evidence of “listenership”, in email
timing is not available as evidence of grounding (141). But people adopt “alter-
native techniques” (142). For example, in the absence of expectations of immedi-
ate feedback, emailers put more effort into each turn. We can expect that techno-
logically-adaptive grounding techniques will be situation-sensitive – that is,
genre-geared – in CMC. And, as Clark and Brennan observe, people do not just
“send” a message: Anticipating its reception, they estimate recipients’ conscious-
ness (147). Even dispatched into the putatively borderless expanses of the Internet,
a message will be attended by such estimates.
Still, the apparent borderlessness of the Internet arena attracts research atten-
tion. In an early study of email, Sproull and Kiesler (1986) were concerned with the
technology’s “reducing [of] social context cues” (1492), a concern that abides to
the present day. Researching the emailing of an organisation where the technology
had been in use for 10 years at the time of the study, Sproull and Kiesler also take
face-to-face communication as the baseline from which email departs. Yet, the ab-
sence of face-to-face cues is not a straight road to de-regulation. Sproull and
Kiesler’s record of the many types of message sent via email (“documents, com-
puter programs, personal notes, and official announcements”, 1494; a range of
types from “cafeteria menu to corporate strategy documents to love notes”, 1497)
shows that cues and regularities survive. Even in such early days, this thorough
study turns up signs of the life of genre itself. In the eager exchange of messages, a
door opens to an enhanced function for already recognisable message types: op-
portunity for “affable communication” (1511) in the workplace (cf. Heyd 2009,
discussed below, for analysis of developments in this opportunity 20 years later).
In exploiting opportunities for affability, people are developing extant genres, the
prompts already seated in the genres now enhanced by technological changes.
Sproull and Kiesler (1986) also find thoroughly new communicative behav-
iours: the construction of what they call “new information” – not a new fact, but a
new activity and exigence that motivate people to dispatch ideas which otherwise
would not have been realised or transmitted. We can see genre potential appearing
above the horizon when, in one example, “suggestions for new ways to use a par-
ticular piece of software” (1509) are offered, or, in another example, “suggestions
about how to add a new product feature” (1510) are requested. Responses to the re-
quest are plentiful, and in this responsiveness are early signs of the technology’s
capacity to extend the sociability of the group – in this case, to 3,000 participants.
Thus even while Sproull and Kiesler claim that social cues disappear from e-con-
texts, leaving “the message itself” as “one of the few available sources” of in-
formation about “social context” (1505), their own findings demonstrate that this is
enough.
Similarly, in “Interactional coherence in CMC” (1999), Herring finds that
where technological features disappoint interactional expectations, they can

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
722 Janet Giltrow

trigger social ingenuity. Analysing the permutations of conversational dynamics in


e-settings, Herring looks specifically at the relevance problems which arise due to
the nature of message transmission. Responses to comments are delayed or inter-
rupted; topics “decay” (10–11). But people adapt (14), not only to restore an offline
standard, or merely to compensate. With the persistent textual record afforded by
the otherwise problematic technology, the deep conversational norm of turn-taking
is not simply compromised: It is displaced to new effect. For example, quoting can
replicate the earlier turn (15); lists can maintain a “global topic” by means of
threads and moderators’ interventions (16); people can take a “[playful]” approach
to embedding (17). Quoting, threading, moderating, and play may each figure in
the development of genres online, and figure differently in different genres. As will
be seen below, embedding can be an efficiency in some online genres (Orlikowski
and Yates 1994) and a disturbance in others (Graham 2007). And relevance prob-
lems can convert to useful vagueness in the “flirt letter” (Wyss 2008), technologi-
cal features having different pragmatics in different genres.

3. Pragmatic study of CMC genres

Early amongst researchers to look for genre in a technologically-mediated scene,


Orlikowski and Yates published two studies (Orlikowski and Yates 1994; Yates
and Orlikowski 1992) which remain touchstones for research in CMC. Their 1992
study observes that research in organisational communications tends to isolate
media choice from context and to attribute to media “fixed” effects. They correct
these tendencies by introducing rhetorical genre theory and thereby capturing
socio-historical context. Yates and Orlikowski trace the business memorandum
from the late 19th century to the present: They find it emerging from genres of ex-
ternal business correspondence in response to changes in business structure and
management, and developing in response to technological change: telephone,
typewriter, email. As the memo evolves, it sheds formal characteristics of external
correspondence (e.g., elaborate politeness; salutation and complimentary close)
and develops new ones (e.g., conciseness; subject line). This valuable study is par-
ticularly notable for exposing the error in considering email a genre: The long his-
torical view shows clearly that new media are best seen as changes to socio-his-
torical context, and that existing genres shape the uses of new media, even as new
media bring about genre change. The long historical view also enables Yates and
Orlikowski to outline levels of genre change in response to historical context, in-
cluding its technological conditions: Genres emerge, or are maintained and/or
modified, or decay.
Turning from the long historical view to a shorter-term diachronic perspective,
Orlikowski and Yates (1994) studied communication amongst computer-language
designers developing a common programming language in the early 1980s. In

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 723

achieving this end, the designers communicated by email over a two-and-a-half-


year period. To analyse their communication, Orlikowski and Yates classify mess-
age types (memo, dialogue, proposal, and ballot set) comprising a “genre reper-
toire” for this activity group and identify features (e.g., embedded messages, salu-
tation or “sign-off”, subheadings [552]) of these types. Genre classification
exposes the cycles of the group’s activities and organisational behaviour: Members
take up different genres as the group engages in different stages of the project. Es-
pecially important for genre study is the view Orlikowski and Yates offer of the
group as resourceful and self-regulating. The efficiency of the group’s use of new
technology can be attributed to members’ professional solidarity: their deep, mu-
tual experience of this sphere of activity; their shared sensations of exigence and
motive. Technological affordances – such as the archiving capacity of the medium
and the capacity to embed passages of prior messages in new messages – are
readily absorbed and exploited, and result in a mix of established genres and
adapted ones.
That range of newness is the object of Crowston and Williams’ (2000) study of
web pages, a study that continues to provide benchmarks for reckoning novelty to
study of Internet communication. Following indications in Yates and Orlikowski
(1992), Crowston and Williams analyse findings from their study of web pages as
revealing a cline of newness from (1) extant genres reproduced on the web, a cat-
egory which includes the use of web technologies to replicate non-digital forms
(e.g., linking to produce multi-page documents); (2) adaptation of extant genres,
where the technology changes the form of a genre or develops a new purpose for an
existing form (e.g., a film review links to an order form); and (3) novel genres
unique to the web environment, such as the home page or the “under-construction”
web page. This category includes emergent genres which are “potentially new”,
that is, eligible to become “accepted” by users of CMC. Crowston and Williams
note that a new form is not a new genre – it awaits acceptance – and, further, that
truly novel genres were rare in their study. Like Yates and Orlikowski, they locate
technology as a modification of situation.
Whereas Crowston and Williams look at genres at their online destination,
Strobbe and Jacobs’ (2005:1) study of “the use of press releases on the Internet
(also called e-releases)” follows one genre from print to the Internet. Their naming
of the object of inquiry captures central questions about newness in the study of
CMC genre: How do non-digital genres transfer to a digital environment? Are they
“press releases on the Internet”, that is, the same genre except for being in the digi-
tal medium, and in Crowston and Williams’ terms “reproduced”? Or are they a new
genre – “e-releases” – with new forms and/or functions, and in Crowston and Wil-
liams’ terms “adapted”? First, Strobbe and Jacobs are able to show in press re-
leases a strong form/function profile – use of third-person forms and (pseudo-)quo-
tation – engaging institutional purposes: the delivery of a “preformulation” to print
and broadcast news producers, that is, a package tailored for sending in the jour-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
724 Janet Giltrow

nalistic scene. They are then able to trace the mutation and also the persistence of
the form/function profile as being in step with the mutation or persistence of what
rhetorical genre theory would call the social action of the press release: the filtering
of corporate or organisational messages through the news genres.
In the press releases of two different distributors they find contrasting out-
comes of the migration of the genre to an online environment. One agency issues
press releases whose pragmatic profile keeps some preformulation features but
also adds direct address to the reader, including imperatives, and emphasis by
means of features such as all caps (2). More “selling” than “telling”, these releases
also include links to corporate sites. In addition, they are archived and available to
searches. In other words, they eliminate the “middleman” – the journalist – in their
address to the public and function beyond being today’s or tomorrow’s news. The
other agency, however, honouring its service to news institutions, issues releases in
traditional preformulation packages. Strobbe and Jacobs interpret their findings as
showing that one route for the migrating genre by-passes “the gate-keeping role
traditionally played by journalists in handling paper press releases” (1), while an-
other migration route conveys established practices to a “new location”: “[I]t
seems as if for the time being online news remains – to some extent at least – tied in
with traditional media” (2). As well as showing these different migration paths,
their research also reveals what news genres do, whether online or offline: They
mediate utterances of interested parties (companies, organisations) through the
positions of other institutions (news producers). This is a social action of the news
genres, one that comes to light by means of research in the pragmatics of CMC.
With its historical perspective on a migrating genre, Wyss’s “From the bridal
letter to online flirting: Changes in text type from the nineteenth century to the In-
ternet” (2008) offers much to the study of CMC genres. Wyss notes that study of
the pragmatics of historical text types requires the “reconstruction of the norms
and rules of a sociohistorical context that is different from one’s own contemporary
milieu” (226): in other words, the reconstitution of the exigence and motive which
manifest in a genre. Wyss’s account of the 19th-century Brautbriefe (bridal letter) is
exemplary for revealing the layered complexity of such motives, a complexity far
beyond a compact communicative purpose. Composing the Brautbriefe, engaged
couples “[performed] the bourgeois self” (230), stylistically demonstrating to one
another their eligibility for matrimony. These demonstrations in turn were mean-
ingful through their articulation with contemporary class-indexed concepts of
gender and of language itself. Evidently concentrating many social energies, this
high-performance genre also generated its own “meta-genre” (Giltrow 2002): ad-
visories and rule-giving which coincided imperfectly with actual practice (a mis-
match that could be compared with that which Herring 1996 finds in gender-stereo-
typical commentary and advisories on CMC).
CMC is one amongst several technological amplifications of lovers’ commu-
niqués. The postcard, the telephone, and the telegraph were others, and Wyss notes

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 725

that the love letter was and is combined in its use with “other oral and written com-
munication” (233). Whatever the combination, Wyss observes that writers of both
the Brautbriefe and today’s electronic love letters get to know each other through
their correspondence. Crucially, however, the two eras’ correspondents start out
lacking knowledge of each other in different ways, the difference playing out along
both social and technological dimensions. Whereas bridal-letter exchanges ratified
the bourgeois identities of the correspondents, corroborating estimates by a circle
of family and friends, the Internet confronts lovers with (once again) an “enormous
and bewildering lack of context” (244): Who is out there? Accordingly, the “flirt
email” develops, pragmatically “[vague]” to maintain a “non-committal” stance
(244–245) while the correspondents conduct a reconnaissance of the “enormous”
(de)context. Inheriting some forms from “the traditional Western discourse of
love”, the flirt letter is in addition “cryptic”, suggesting that the relevance-weak
patterns other researchers have found in CMC may have many functions and may
be a resource for the development of Internet genres (see Herring’s chapter on rel-
evance in this volume). As well, Wyss asks “whether a flirt letter can be called a
love letter”: Is it a new genre or a variation on, or adaptation of, the old? Her own
analysis of rhetorical situation sets a standard for thoroughness in developing
measures for newness: Has the rhetorical situation changed? To what extent, along
which dimension?
Taking a cross-cultural (Turkish/British) perspective, Hatipoğlu’s (2007) study
of Calls for Papers shows that even seemingly modest differences in socio-techni-
cal aspects of the rhetorical situation can have measurable pragmatic effects in the
politeness features he analyses. Graham (2007) also focuses on (im)politeness, but
in a list situation where possible face threats are more severe than the risk of bur-
dening recipients with uninteresting Calls for Papers. Graham’s research site is
“ChurchList, an unmoderated, tightly-knit email discussion list which provides a
forum for the discussion of issues affecting the Anglican Church” (745) – a context
that is dense enough to engage participants not only in deep affinities but also in
serious disagreements. Graham’s study takes us farther into the socio-communi-
cative environment of lists than any other research discussed in this review, show-
ing that at the heart of ChurchList’s engagement are genres and, in this case, one
genre in particular: the request-for-prayer. List participants experience exigence,
the feeling that a certain kind of utterance is called for, here and now. And they ex-
perience equally the exigence of the up-take (Freadman 2002): fitting, conscien-
tious response. Extending the experience of exigence are politeness constraints,
some of which are technologically conditioned (747): the requirement that the sub-
ject line should specify both the initiating genre and its up-take (this message is for
those ready to respond to a prayer request sympathetically), thereby managing the
audience fluidity of the e-list; and the sanction against “blatting” (copying a private
message into a public arena), thereby mitigating the politeness hazards of Reported
Speech in an online setting. Other politeness constraints are such as would be pres-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
726 Janet Giltrow

ent in offline settings – the conscientiousness of, for example, expression of sup-
port rather than criticism in responding to a troubled co-religionist – and indicate
the transfer of attitudes and interests to the online world. One might speculate as
well that the online prayer request articulates with offline scenes of activity, such as
prayer meetings and Bible-study sessions.
Graham examines a ChurchList episode in which a speaker flouts these norms
by criticising a supplicant, directing her response away from the supplicant by
means of third-person pronouns and, in addition, copying private messages into
her responses. Appearing under the original subject line, the norm-offending up-
take shocks discussants whom the subject line has led to expect a sympathetic
message. Graham speculates that the offending participant may be e-incompetent.
A genre-theoretical explanation would suggest in addition that she does not experi-
ence the same exigence as the other participants. Moreover, Graham’s analysis of
the flurry of meta-generic activity which follows the offending message – rebukes
and attempts to restore the site’s cordiality – shows the capacity of a community to
regard a genre as a pivot of its affinity. The meta-generic discussions implicitly re-
store the request/support pair and explicitly specify rules for subject lines.
In her study of medical spam (offers of products promising, for example,
weight loss, allergy relief, or improved sexual performance), Barron (2006) con-
sults genre theory as practised in English for Special Purposes (citing, e.g., Swales
1990 and Bhatia 1993) and analyses “moves”: discursive sub-goals of a communi-
cative purpose. Barron’s study is a major contribution in, first, comparing the prag-
matic parameters of pre- or non-digital genres – direct mail, promotion letters –
with those of their digital version, spam. While direct mail goes to a wide audience,
spam recipients, owing to techniques for harvesting e-addresses, comprise an even
wider audience, and one relatively less known to the senders. Barron’s analysis
then exposes the feedback sequence of technological innovation and social/legal
responses that has resulted in the spam genre. The audience extension enabled by
address-harvesting has led to recipients’ dislike of these messages (evidently
greater than their dislike of direct mail) and resentment of the cost of receiving
them: in other words, to technologically-induced social responses. As the message
type gets a bad reputation, worthy products desert it. Spam filters (a technological
response) are developed, as are legal constraints (a social response). In turn, the
genre adapts on both technological and social fronts: Anonymity devices are de-
signed to evade prosecution; discursive features develop to camouflage the mess-
age type. The rapidity of this feedback/adaptation cycle may appear to be peculiar
to CMC, but one might point to comparable episodes in pre-digital history, such as
the swift legal-social responses to the spread of pornographic images on postcards
in the early 20th century (Sigel 2000).
While study of spam exposes the shady side of online life, Puschmann’s (2009)
study of Wal-Mart’s corporate blogging investigates another subterfuge: the appro-
priation of the “positive associations” of personal blogging for corporate ends. As

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 727

Puschmann points out, the “abusability” of blogging is evidence for the conver-
gence of form and function (51): in other words, the existence of a genre. Formal
features aggregate functionally in a scene of activity and become indications of that
activity – in the case of personal blogging, conversational invitations to interaction
and contact. The site “Life at Wal-Mart” replicates the technologically-formatted
indications of blogging, but then “abuses” them in the service of a corporate social
action: narrowly, dissemination of the message that Wal-Mart is a good employer;
broadly, a response to a complex political, socio-rhetorical situation.
While the technical (or “hard” [58]) forms signal “blog”, Puschmann’s inves-
tigation shows that other (or “soft”) forms are not in keeping with the patterns he
establishes through corpus analysis of pragmatic features of blogs. Use of ‘you’,
for example, is ambiguous in the 52 “Life at Wal-Mart” postings in ways in which
it is not in the larger corpus of blogs Puschmann has studied; Wal-Mart postings
also deviate from those in the larger corpus in favouring past tense forms of verbs.
In addition, they neither quote other blogs nor provide links – but neither do the
personal blogs in Herring, Scheidt, Bonus, and Wright’s sample (2005, discussed
below) match the stereotype of the blog as a genre characterised by links. More
telling for both the Wal-Mart case and for genre study, is the “astounding” (66)
similarity of the Wal-Mart blogs. For Puschmann, the key point is that this simi-
larity shows evidence of editorial oversight, which spoils what he takes to be char-
acteristic about blogs, that is, that they are owned by their authors. For genre study,
the bigger news may be that pronounced similarity actually makes instances sus-
pect and suggests tampering rather than authenticity. Traditional views of genre
emphasise sameness, and Puschmann himself regards genres as “fixed and un-
changing” (81). But the false air of the “astounding” sameness of Wal-Mart blogs
suggests instead that genres, in their real rather than Wal-Mart lives, are characte-
rised by variability rather than uniformity (cf. Devitt 2009 for the view that genres
are, above all, formally variable).
Heyd’s (2009) study extends our vantage on genre’s masquerading capabilities
by adding to faux blogs and evasive spam the “email hoax”. (See also Heyd’s
chapter in this volume.) Neither her findings nor her theoretical proposals aim to
expose deception or mimicry, however. Instead, Heyd is tackling the problem of
newness in genres: If genres are what is accustomed and what activates language-
users’ expectations, how can brand-new genres be explained? (See Miller and
Shepherd 2009 for a rhetorical approach to this question.) As Heyd points out,
while people report experiencing newness in the Internet world, research on the
whole has failed to turn up much that is thoroughly novel, finding instead anteced-
ents for what is felt to be new, or finding that what is new is hybrid or “adapted” in
Crowston and Williams’ (2000) term, rather than entirely new. To account for this
mixed scene of continuity and break-away, at the same time theorising issues in
function-vs.-form debates, Heyd proposes a model that places at a high level of
generality “communicative functions”, which, she says, will be “few and funda-

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
728 Janet Giltrow

mental” and thus highly stable (240). Research which focuses on genre-as-func-
tion will therefore not be likely to find wholly new manifestations, and will tend to
uncover likenesses. Difference will appear as the level of generality drops from
these function-defined “super-genres” to their rhetorical instantiation, “branching”
into situations where it is form which differentiates “sub-genres” from one another
(240–241).
Applying this model to the email hoax, Heyd demonstrates that email hoaxes
are not, in fact, direct descendants of pre-digital con games and swindles. Their
genealogy is instead traceable from the super-genre “officelore” through “digital
folklore”: message types which keep open friendly lines of communication
amongst workmates by circulating, for example, ludicrous photos, amusing lists,
or political petitions. Providing a “ready-made” source of “tellable” material and
“[reinforcing] digital social networks” (251–252), digital folklore shares com-
municative function with officelore, but in its execution of this function is distin-
guished by its use of technological affordances, such as address-storing, multiple-
addressing capacities, and the forwarding function. It is also distinguished from of-
ficelore in being more meta-discursive (253). The generic distinction of digital
folklore types is popularly attested, as Heyd notes, by websites devoted to collect-
ing them (254).
Heyd’s proposals are a notable contribution to genre theory and offer an oppor-
tunity to reconcile social action and communicative purpose: Social action may be
the lower level of generality – structured, rhetorical, and open to the immediate ex-
perience of language users – whereas communicative function, at a higher but still
socio-historical level of generality, may be more accessible to analysts than to lan-
guage users.
In Locher’s (2006) book-length study of online advice-giving by health ser-
vices at a U.S. university (see also Locher’s chapter in this volume), antecedence is
a less vexing issue than it is for the study of email hoaxes. The letters issued by
“Lucy”, the persona of health educators who answer questions submitted electroni-
cally to a website, participate in “the well-established tradition of an advice col-
umn” (17) and other non-digital genres: The radio call-in show is a close relative;
more distant is the nurse’s visit to the new mother. All these genres engage the
pragmatic issues involved in mitigating or boosting the force of an expert’s inter-
vention in the advisee’s affairs. Internet advice-giving also shares with radio
call-in shows and print advice columns the border between private and public. Ad-
vice-requesters refer to intimate matters yet are addressed in a wide public arena,
and responses are in each of these genres pragmatically geared not only to the ad-
vice seekers (and their face wants) but also to overhearers. Locher analyses prag-
matic arrangements for overhearers as being aimed at providing them with useful
information.
On the whole, transfer of public advice-giving to the Internet seems to have
been, in the case of the “Lucy” site, a stable one. The audience is digitally extended

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 729

beyond the querying/advising pair, but it is not evident that the extension has a rhe-
torical effect different from that of print media, although comparative study based
on Locher’s findings may reveal differences. In genres giving personal advice pub-
licly, the crucial medial distinction is, once again, in the durability of the record.
Lucy’s answers are archived, and information-seekers can search the archive in-
stead of submitting a question or can be directed by Lucy, in the presence of over-
hearers, to search. In turn, while the record persists, it is also revisable. Lucy up-
dates the archive to make the consultation process more efficient: pragmatically
accessible and also refreshed with new medical research.
Emigh and Herring (2005) also analyse a traditional print genre – the encyclo-
paedia entry – on its arrival at online destinations. They want to know what
happens to the genre under different technologically-enabled conditions of produc-
tion: on the one hand, longstanding practices of reference publishing – expert con-
tributions solicited and standardised by editors – continued in the online version of
the Columbia Encyclopedia; on the other hand, the two distinct collaborative on-
line systems of Wikipedia and Everything2. While both Wikipedia and Every-
thing2 are “democratic” in inviting anyone rather than only experts to contribute,
the systems rely on different “quality” mechanisms: All Wikipedia users are poten-
tially authors and can revise others’ entries, whereas Everything2 entries cannot be
revised and depend instead on ratings to monitor quality. Following Biber (1988),
Emigh and Herring analyse entries for formality (noun-formation suffixes) and
informality (personal pronouns and contractions), these features having been
“validated as [indicators] of genres”: Factor analysis has revealed “frequencies of
linguistic features to empirically identify different genres – what [Biber] calls ‘reg-
isters’ – of discourse” (5). Revised and monitored by “good users” (2), the Wiki-
pedia entries self-standardise towards the formality norms of the print encyclo-
paedia entry. In contrast, the Everything2 entries remain variable and less formal,
while most informal are the “discussion” entries on Wikipedia. Emigh and Herring
identify Everything2 as an example of what Crowston and Williams (2000) call an
emergent genre: It is a “hybrid product of the Web” (9), a blend of the online genres
“discussion” and “repository of knowledge”.
Most compelling, however, for students of genre may be the standardisation ef-
fect on Wikipedia, an effect coincident with Wikipedia’s growing credibility. Ask-
ing why the Wikipedia entries end up being so like traditional encyclopaedia en-
tries, despite the democracy of the authoring systems, Emigh and Herring write
that users “appropriate norms and resources” from print traditions, and a small
group of “good users” then enforces those norms (9). Rhetorical research would be
interested in the motivations of the “good users” and also in the exigence experi-
enced by all contributors to either Wikipedia or Everything2. The motives of Wiki-
pedia and Everything2 contributors may differ, as may those of their readers, even
as entries from both sites could be captured under the higher-level category “re-
pository of knowledge”.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
730 Janet Giltrow

If citizens of Internet domains were to seek material on a particular topic – let


us say, Karl Marx (one of Emigh and Herring’s sample entries) – they would face a
genre problem addressed by information-retrieval specialists: What kinds of ma-
terial is the search going to turn up? Rants? Jokes? Public-affairs opinion? Ency-
clopaedia articles – and, if so, Wikipedia-type or Everything2-type? Like other in-
formation-retrieval specialists (e.g., Crowston and Williams 2000; Ferizis and
Bailey 2006; Kwasnik, Crowston, Nilan, and Roussinov 2001; B. Stein 2010),
Karlgren and Cutting (2005) aim to develop means of “[discriminating]” amongst
genres, eventually providing users with a “cascade of filters” (5) which will ident-
ify the genre of Internet documents. The filters separate form from content or topic
(from Karl Marx, in our example), and isolate the most computable features in
Biber’s (1988) cluster analyses. Having disavowed form as prime indicator of
genre, rhetorical theorists of genre would be suspicious of a project reverting to
formal markers, and Karlgren and Cutting concede that they are “not trying to de-
termine how genres differ but which parameters” – amongst the 20 they test – “are
reliable in identifying genre” (4). Their mixed results may await improvement in
computability of more nuanced features (1), or genre’s phenomenology as social
action rather than formal features may defeat all but the broadest identifications.
In the meantime, other research besides Emigh and Herring’s suggests that cor-
pus analysis of formal features can coax out nuanced portraits of genres’ social ac-
tion. Puschmann’s (2010) study of corporate blogs (as distinct from the false blog
of “Life at Wal-Mart” discussed above) produces such portraits by concentrating
on interpersonal pronouns: first- and second-person singular and plural. Recognis-
ing that there are many types of blogs, Puschmann also identifies interactional fea-
tures he believes to be typical of blogging. Radiating from a stable deictic centre
which hosts the “egocentric” prominence of bloggers themselves (20), these fea-
tures include opportunity for feedback and “individuality”, and contrast with
genres more removed from the paradigm of conversation. Traceable in the relative
frequency of interpersonal pronouns, this interactional nexus is appropriated by
corporate interests in order to “personalize” their communications to clients, share-
holders, recruits, or broader publics. Puschmann’s study goes farther, however,
than simply exposing corporations’ exploiting of interactional resources by show-
ing the frequency of interpersonal pronouns. In analysis and examples of the scope
of the pronouns’ speaker-representation and audience address, Puschmann demon-
strates not only the characteristic persuasive stance of the corporate blog but also
the range of variability in that stance: Each interpersonal pronoun combination of
dimensions of self, addressee, and other shapes a different kind of interactional
scene, attitude, identification. Such a range suggests once again that the context of
CMC is, rather than impoverished, rich in its access to complex rhetorical situ-
ations.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 731

4. Prospects for study of genre in CMC

The research reviewed in this chapter suggests that pragmatic methodology has
much to offer the study of genre. Once data sets are defined sufficiently to recover a
scene of social action – flirtatious overtures, for example, or offers of medical
products or medical advice, or announcements of conferences, to name just a few
of the actions studied – the analysis of features illuminates not only linguistic
manifestations but the social situations themselves. We have seen that systematic
study of, for example, pronouns or (im)politeness or relevance warrants can ex-
pose local characteristics of the socio-rhetorical situation. In addition, results of
pragmatic study challenge the notion that genre is what is the same, what is for-
mally fixed or even rigid, and what is rule-governed, at best instrumental, at worst
imposing and exacting of conformity. With its capacity to expose the coordinates
of language-users’ social positions and inclinations, pragmatic study can establish
genre as what is versatile and variable, functional because flexible, and subjective
rather than instrumental.
In addition to being productive for genre theory generally, pragmatic study of
CMC genres also uncovers conditions unique to episodes of technological change.
At first, these were characterised as depleting context: jarring departures from co-
presence. But research soon showed users rapidly adapting to technological condi-
tions and reconstituting social context. Technological design, however, still oc-
cupies research attention (for a range of genre-theoretically informed comments on
design issues see, for example, Agre 1998; Beghtol 2000; Hendry and Carlyle
2006; D. Stein 2006; Toms 2001; Watters and Shepherd 1997) and complicates
CMC genre study. To what extent can software designers be considered co-partici-
pants in the life of a genre – ghost-writers or silent partners? What is the signifi-
cance for genre of a pragmatic regularity that is technologically formatted rather
than locally originating? How do these formatted regularities play into partici-
pants’ experience of exigence and motive? By providing a clearer view of the so-
ciality of the technology itself, Herring’s (2007) scheme for classification can help
to address such questions and to further the work of Askehave and Nielsen (2005)
and others who disentangle “hard” from “soft” dimensions of CMC. Drawing on
rhetorical theory and also proposing an “ecology” for CMC, Erickson (2000), for
example, finds that on the experimental “Babble” chat system, conversation
reaches genre status, thanks to users’ learning the system’s capacity. Long separ-
ated in research practice, conversation (“proto-genre”, in Swales’ [1990] term,
“primary” genre in Bakhtin’s [1986]) and genre may draw closer in CMC owing to
the mutual shaping of technologies and their uses.
Genre is a means by which language users know one another, finding familiar-
ity even amongst strangers but also sensing tremors to common ground when
facing the unexpected or unrecognisable. As new technologies have expanded
audiences incalculably and unpredictably, they have introduced unknown speakers

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
732 Janet Giltrow

and listeners with unknown motives, bringing about a subduction of rhetorical situ-
ation and sharp sensations of newness. At the same time, designers’ assumptions
about motives for communication may not align immediately with language users’
experience – incurring, again, a feeling that something has changed, some foreign
element has intruded. Both conditions – the inscrutable audience and the misalign-
ment of design and motive – appear to be transitional, however, as the case of
relatively early (2003) weblogs, studied by Herring et al. (2005), suggests. De-
scribing blogging technology as having “bridged” a gap between the multimedia
arena of relatively static HTML (hypertext markup language) websites and the in-
teractivity of other CMC, Herring et al. also find (a) that the type to which most
blogs belong is a descendant of a very old genre, the hand-written diary, now pub-
licised by new technology; and (b) that the uses of the “socio-technical format” of
the blog are so diverse as to make it “no longer meaningful to speak of weblogs as a
single genre” (164).
This is a complex picture. While language users introduce old forms to new
ground, their diverse uses of the new technology also sub-divide the new ground
into socio-rhetorical localities from which arise the differentiations that are genres
themselves. The technology can still name broad domains of use, as when Myers
(2010) writes on The Discourse of Blogs and Wikis while finding manifold differ-
entiations in the discourse. Alongside this broad naming, however, the process of
technical innovation and adoption is evident in a typical series of classifications:
First, communicative activity is named for the technology itself (e.g., email), then
as a sub-type (e.g., political email message), then as a full-fledged genre (e.g.,
e-petition). While the cline of newness proposed by Crowston and Williams (2000)
is confirmed by research, it also needs to be reconciled with the process revealed in
the classification series. At what stage in the process of technological adoption has
the analyst taken the snapshot that exposes a reproduced genre, or an adapted or
emergent one?
Pragmatics research pursuing newness and isolating the criteria for emergent
status may not only shed light on computer-mediated life but also revive early de-
bates in rhetorical genre study about antecedence. For example, when Herring et
al. show that blogs, “rather than deriving from a single source” (2005: 160), de-
rive from many, we can anticipate that the outcome of the multiple input will also
be multiple: local differentiations processed through one technological junction.
Are such congregations and dispersals peculiar to digital genres? Equally, we
could ask of Herring et al.’s finding regarding the blog as occupying a “bridging”
position whether such genre-productive positions can be found in the non-digital
world, or whether the sedimentations of traditional speechways have closed all
the gaps.
So far, the reckoning of newness has tended to be one-way: Do CMC genres
differ from or replicate offline genres? Awaiting pragmatic study is the possibility
that there is transfer in the other direction, a flow-back from online to offline

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 733

genres. Equally compelling would be study which thoroughly tests claims for rad-
ical newness against historical episodes. I have mentioned the advent of the post-
card – a technological, social, and legal breakthrough in its time – as a comparison.
There will be others, and Wyss’s study of love letters across two centuries should
be inspiration to look for them (see also Burgess 2009 comparing the commen-
taries surrounding late-18th-century print technologies with those accompanying
late-20th-century CMC).
Where genre is regarded not as protocol-conforming fixities but as versatile
bundles of interactive attitude and orientation, genre study is an effective way of
investigating the newness of CMC. Classification measures the extent and quality
of newness, while analysis of social action reveals users’ experience of exigence,
including their social motives for taking up new technologies and their mutual rec-
ognition of these motives.

Note

1. I use “speech” in this chapter to refer to any verbal communication.

References

Agre, Philip
1998 Designing genres for new media: Social, economic, and political contexts. In:
Steven G. Jones (ed.), Cybersociety 2.0: Revisiting Computer-Mediated Com-
munication and Community, 69–90. Thousand Oaks, CA: Sage.
Askehave, Inger and Anne Ellerup Nielsen
2005 Digital genres: A challenge to traditional genre theory. Information Technol-
ogy & People 18(2): 120–141.
Askehave, Inger and John Swales
2001 Genre identification and communicative purpose: A problem and a possible
solution. Applied Linguistics 22(2): 195–212.
Bakhtin, Mikhail M.
1986 The problem of speech genres. In: Michael Holquist and Caryl Emerson (eds.),
Vern McGee (trans.), Speech Genres and Other Late Essays, 62–102. Austin:
University of Texas Press.
Barron, Anne
2006 Understanding spam: A macro-textual analysis. Journal of Pragmatics 38(6):
880–904.
Beghtol, Clare
2000 The concept of genre and its characteristics. Bulletin of the American Society
for Information Science 27(2): 17–20.
Bhatia, Vijay
1993 Analysing Genre: Language Use in Professional Settings. London: Longman.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
734 Janet Giltrow

Biber, Douglas
1988 Variation Across Speech and Writing. Cambridge, UK: Cambridge University
Press.
Bitzer, Lloyd
1968 The rhetorical situation. Philosophy and Rhetoric 1(13): 1–14.
Bitzer, Lloyd
1980 Functional communication: A situational perspective. In: Eugene Edmund
White (ed.), Rhetoric in Transition: Studies in the Nature and Uses of Rhetoric,
21–38. University Park, PA: Pennsylvania State University Press.
Burgess, Miranda
2009 Nation, book, medium: New technologies and their genres. In: Janet Giltrow
and Dieter Stein (eds.), Genres in the Internet: Issues in the Theory of Genre,
193–220. Amsterdam/Philadelphia: John Benjamins.
Campbell, Karlyn Kohrs and Kathleen Hall Jamieson
1978 Form and genre in rhetorical criticism: An introduction. In: Karlyn Kohrs
Campbell and Kathleen Hall Jamieson (eds.), Form and Genre: Shaping Rhe-
torical Action, 9–32. Falls Church, VA: Speech Communication Association.
Clark, Herbert H. and Susan E. Brennan
1991 Grounding in communication. In: Lauren B. Resnick, John M. Levine, and
Stephanie D. Teasley (eds.), Perspectives on Socially Shared Cognition,
127–149. Washington, DC: American Psychological Association.
Cohen, Ralph
1986 History and genre. New Literary History 17(2): 203–219.
Crowston, Kevin and Marie Williams
2000 Reproduced and emergent genres of communication on the World-Wide Web.
The Information Society 16(3): 201–216.
Devitt, Amy J.
2009 Re-fusing form in genre study. In: Janet Giltrow and Dieter Stein (eds.),
Genres in the Internet: Issues in the Theory of Genre, 27–48. Amsterdam/Phil-
adelphia: John Benjamins.
Emigh, William and Susan C. Herring
2005 Collaborative authoring on the Web: A genre analysis of online encyclopedias.
In: Proceedings of the Thirty-Eighth Hawaii International Conference on Sys-
tem Sciences. Los Alamitos, CA: IEEE Computer Society Press.
http://ella.slis.indiana.edu/~herring/wiki.pdf
Erickson, Thomas
2000 Making sense of computer-mediated communication: Conversations as genres,
CMC systems as genre ecologies. In: Proceedings of the Thirty-Third Hawaii In-
ternational Conference on System Sciences. Los Alamitos, CA: IEEE Computer
Society Press. http://www.pliant.org/personal/Tom_Erickson/genreEcologies.
html
Ferizis, George and Peter Bailey
2006 Towards practical genre classification of web documents. In: WWW 2006: Pro-
ceedings of the 15th International Conference on World Wide Web. New York:
Association for Computing Machinery. http://www2006.org/programme/files/
xhtml/p18/xhtml/pp018-ferizis.html

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 735

Freadman, Anne
2002 Uptake. In: Richard M. Coe, Lorelei Lingard, and Tatiana Teslenko (eds.), The
Rhetoric and Ideology of Genre: Strategies for Stability and Change, 39–53.
Cresskill, NJ: Hampton Press.
Giltrow, Janet
2002 Meta-genre. In: Richard M. Coe, Lorelei Lingard, and Tatiana Teslenko (eds.),
The Rhetoric and Ideology of Genre: Strategies for Stability and Change,
187–205. Cresskill, NJ: Hampton Press.
Giltrow, Janet
2010 Genre as difference: The sociality of linguistic variation. In: Heidrun Dorgeloh
and Anja Wanner (eds.), Syntactic Variation and Genre, 29–51. Berlin: Mou-
ton de Gruyter.
Graham, Sage Lambert
2007 Disagreeing to agree: Conflict, (im)politeness and identity in a computer-me-
diated community. Journal of Pragmatics 39(4): 742–759.
Hatipoğlu, Çiler
2007 (Im)politeness, national and professional identities and context: Some evi-
dence from e-mailed ‘Call for Papers’. Journal of Pragmatics 39(4): 760–773.
Hendry, David G. and Allyson Carlyle
2006 Hotlist or bibliography? A case of genre on the web. In: Proceedings of the
Thirty-Ninth Annual Hawaii International Conference on System Sciences.
Los Alamitos, CA: IEEE Computer Society Press. http://faculty.washington.
edu/dhendry/docs/hicss_final.pdf
Herring, Susan C.
1996 Posting in a different voice: Gender and ethics in computer-mediated com-
munication. In: Charles Ess (ed.), Philosophical Perspectives on Computer-
Mediated Communication, 115–145. Albany, NY: SUNY Press.
Herring, Susan C.
1999 Interactional coherence in CMC. Journal of Computer-Mediated Communi-
cation 4(4). http://jcmc.indiana.edu/vol4/issue4/herring.html
Herring, Susan C.
2007 A faceted classification scheme for computer-mediated discourse. Language@
Internet 4, article 1. http://www.languageatinternet.org/articles/2007/761/
Herring, Susan C., Lois Ann Scheidt, Sabrina Bonus, and Elijah Wright
2005 Weblogs as a bridging genre. Information Technology & People 18(2):
142–171.
Heyd, Theresa
2009 A model for describing ‘new’ and ‘old’ properties of CMC genres: The case of
Digital Folklore. In: Janet Giltrow and Dieter Stein (eds.), Genres in the Inter-
net: Issues in the Theory of Genre, 239–262. Amsterdam/Philadelphia: John
Benjamins.
Karlgren, Jussi and Douglas Cutting
2005 Recognizing text genres with simple metrics using discriminant analysis. In:
COLING ’94: Proceedings of the 15th International Conference on Computa-
tional Linguistics, Vol. 2. http://dl.acm.org.ezproxy.lib.indiana.edu/citation.
cfm?id=991324

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
736 Janet Giltrow

Kwasnik, Barbara H., Kevin Crowston, Michael Nilan, and Dmitri Roussinov
2001 Identifying document genre to improve Web search effectiveness. Bulletin of
the American Society for Information Science 27(2): 23–27.
Locher, Miriam A.
2006 Advice Online: Advice-Giving in an American Internet Health Column. Am-
sterdam/Philadelphia: John Benjamins.
Miller, Carolyn R.
1984 Genre as social action. Quarterly Journal of Speech 70: 151–176.
Miller, Carolyn R. and Dawn Shepherd
2009 Questions for genre theory from the blogosphere. In: Janet Giltrow and Dieter
Stein (eds.), Genres in the Internet: Issues in the Theory of Genre, 263–290.
Amsterdam/Philadelphia: John Benjamins.
Moretti, Franco
2005 Graphs, Maps, Trees: Abstract Models for a Literary History. New York:
Verso.
Myers, Greg
2010 The Discourse of Blogs and Wikis. London: Continuum.
Orlikowski, Wanda J. and JoAnne Yates
1994 Genre repertoire: The structuring of communicative practices in organizations.
Administrative Science Quarterly 39(4): 541–574.
Puschmann, Cornelius
2009 Lies at Wal-Mart: Style and the subversion of genre in the Life at Wal-Mart
blog. In: Janet Giltrow and Dieter Stein (eds.), Genres in the Internet: Issues in
the Theory of Genre, 49–84. Amsterdam/Philadelphia: John Benjamins.
Puschmann, Cornelius
2010 “Thank you for thinking we could”: Use and function of interpersonal pro-
nouns in corporate web logs. In: Heidrun Dorgeloh and Anja Wanner (eds.),
Syntactic Variation and Genre, 167–191. Berlin: Mouton de Gruyter.
Sigel, Lisa Z.
2000 Filth in the wrong people’s hands: Postcards and the expansion of pornography
in Britain and the Atlantic world, 1880–1914. Journal of Social History 33(4):
859–885.
Sperber, Dan and Deirdre Wilson
1986 Relevance: Communication and Cognition. Oxford, UK: Blackwell.
Sproull, Lee and Sara Kiesler
1986 Reducing social context cues: Electronic mail in organizational communi-
cation. Management Science 32(11): 1492–1512.
Stein, Benno
2010 WEGA: Web genre analysis. http://www.uni-weimar.de/cms/index.php?id=
8793
Stein, Dieter
2006 The website as a domain-specific genre. Language@Internet 3, article 4.
http://www.languageatinternet.org/articles/2006/374
Strobbe, Ilse and Geert Jacobs
2005 E-releases: A view from linguistic pragmatics. Public Relations Review 31(2):
289–291.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
Genre and computer-mediated communication 737

Swales, John
1990 Genre Analysis: English in Academic and Research Settings. Cambridge, UK:
Cambridge University Press.
Toms, Elaine G.
2001 Recognizing digital genre. American Society for Information Science 27(2):
20–23.
Virtanen, Tuija
2010 Variation across texts and discourses: Theoretical and methodological perspec-
tives on text type and genre. In: Heidrun Dorgeloh and Anja Wanner (eds.),
Syntactic Variation and Genre, 53–84. Berlin: Mouton de Gruyter.
Watters, Carolyn R. and Michael A. Shepherd
1997 The digital broadsheet: An evolving genre. In: Proceedings of the Thirtieth
Hawaii International Conference on System Sciences. Los Alamitos, CA:
IEEE Computer Society Press.
Wyss, Eva L.
2008 From the bridal letter to online flirting: Changes in text type from the nine-
teenth century to the internet era. Journal of Historical Pragmatics 9(2):
225–254.
Yates, JoAnne and Wanda J. Orlikowski
1992 Genres of organizational communication: A structurational approach to study-
ing communication and media. Academy of Management Review 17: 299–326.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
738 Janet Giltrow

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:05 AM
About the authors

Diane Allton lectured in communications and cultural theory at Coventry Univer-


sity, UK, where she developed an interest in online communications. With Sandra
Harrison, she has published on transgressions, miscommunication, and politeness
in email discussions. She has also researched online health support groups for the
International Regulatory Cooperation for Herbal Medicines (IRCH), in collabor-
ation with Stanford University. She currently works as a learning and development
consultant for an international lifesaving charity.

Jannis Androutsopoulos is Professor of German and Media Linguistics at the


University of Hamburg, Germany. His research interests are in sociolinguistics and
media discourse studies. He has written extensively on linguistic variability and
style, multilingualism and code-switching, and media discourse and diversity. He
is co-editor of Orthography as Social Action: Scripts, Spelling, Identity and Power
(de Gruyter 2012) and editor of Language and Society in Cinematic Discourse
(special issue of Multilingua 31:2, 2012). He serves on the editorial boards of the
journals Language@Internet, Pragmatics, Discourse Context & Media, and the
International Journal of Computer-Assisted Language Learning and Teaching.

Naomi S. Baron is Professor of Linguistics and Executive Director of the Center


for Teaching, Research, and Learning at American University in Washington, DC.
She is the author of seven books; Always On: Language in an Online and Mobile
World (Oxford University Press) won the English-Speaking Union’s Duke of Edin-
burgh English Language Book Award for 2008. Baron’s research interests include
the effects of technology on spoken and written language, the impact of electroni-
cally-mediated communication on individuals and on social interaction, and impli-
cations of digital media for education. She is presently studying differences be-
tween the ways people read onscreen versus in hard copy and the resulting changes
in what it means to read.

Markus Bieswanger is Professor of English Linguistics at the University of Bay-


reuth, Germany. In addition to computer-mediated communication, his research
interests include sociolinguistics and varieties of English, pragmatics, contact
linguistics, and applied linguistics. His recent articles on computer-mediated
communication include “Gendered language use in computer-mediated commu-
nication: Typography in text messaging” (2010), “Patterns and variation in the
language use in English-based online discussion forums” (2011, with Frauke

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
740 About the authors

Intemann) and “The sociolinguistics of texting: Methodological considerations


and empirical results” (2011) (for full bibliographical information, see the refer-
ence section of chapter 19 of this volume). He serves as a member of the editorial
board of the journal Language@Internet.

Brenda Danet (deceased) did her Ph.D. in Sociology at the University of Chicago,
USA, but spent most of her professional life in Israel. She was a professor at
Hebrew University, where she was appointed Danny Arnold Chair of Communi-
cations in 1998. Following her retirement in 2000, she migrated back to the United
States, where she became a Research Affiliate in Anthropology at Yale. Her most
recent scholarship focused on language, culture, and communication on the Inter-
net. Her publications on CMC include CyberPlay: Communicating Online (Berg
2001) and an edited volume (with Susan Herring) on The Multilingual Internet:
Language, Communication, and Culture Online (Oxford 2007).

Christa Dürscheid is Professor of German Linguistics at the University of Zü-


rich, Switzerland. Her main research interests are theories of grammar, computer-
mediated communication, sociolinguistics, and didactics of language. She is the
author (with Franc Wagner and Sarah Brommer) of Wie Jugendliche schreiben:
Schreibkompetenz und neue Medien (de Gruyter 2010) and numerous articles on
language use in the new media. From 2006 to 2010 she conducted the research
project “The influence of the new media on the competence of writing”, funded by
the Swiss National Science Foundation (SNF). From 2008 to 2012 she led (to-
gether with Andreas Jucker) the research project “Private and public communi-
cation in the new media” (funded by the SNF). Since 2011, she has been a member
of the SNF project “Morphological and syntactic variation in SMS communi-
cation”.

Alan Firth is Senior Lecturer and Post-Graduate Degree Programme Director at


the School of Education, Communication, and Language Sciences at Newcastle
University, UK, and Adjunct Professor of Applied Linguistics at the School of
European Languages, King Abdulaziz University, Kingdom of Saudi Arabia. He
carries out research on human interaction, more specifically interaction transacted
through talk. He has a particular interest in second language learning, multilingual-
ism, English as a lingua franca, and the notion of “competence,” and he has pub-
lished extensively in these areas. He is currently working with Johannes Wagner on
a monograph on Second Languages in the Wild, to be published by Routledge in
2013.

Carmen Frehner is a secondary school teacher in Zürich, Switzerland. She


studied English and German in Zürich and Aberdeen, Scotland and received her
Ph.D. in Linguistics from the University of Zürich. Her research interests lie in the

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
About the authors 741

field of computer-mediated communication, and she is the author of Email – SMS –


MMS. The Linguistic Creativity of Asynchronous Discourse in the New Media Age
(Peter Lang 2008).

Angela Cora Garcia is Associate Professor of Sociology with a secondary ap-


pointment in the Department of Global Studies at Bentley University in Waltham,
Massachusetts, USA. Her research interests include conversation analytic studies
of mediation, emergency telephone calls, and computer-mediated communication,
as well as ethnographic research on the sociology of leisure and on animals in so-
ciety. Her recent publications include papers on the application of conversation
analysis to medical issues involving communication problems, how gender is in-
volved in negotiations in mediation sessions, how mediators give advice to dispu-
tants, and how disputants construct strong opening statements in mediation
sessions.

Alexandra Georgakopoulou is Professor of Discourse Analysis and Socioling-


uistics at King’s College London, UK. She has published extensively on everyday
life storytelling (both face-to-face and in new/social media) and the construction of
identities, with a focus on youth and gender identities. Her latest book (co-auth-
ored with Anna De Fina) is Analyzing Narrative: Discourse and Sociolinguistic
Perspectives (Cambridge University Press 2011).

Martin Gill is Associate Professor in the department of English Language and Lit-
erature at Åbo Akademi University, Finland, where he teaches sociolinguistics,
applied linguistics, and cultural studies. His current research is concerned with
questions of authenticity/authentication, language, and nativeness. His recent pub-
lications include “Authenticity” in Jef Verschueren and Jan-Ola Östman (eds.),
Pragmatics in Practice (John Benjamins 2011), and “Nativeness, authority, auth-
enticity: The construction of belonging and exclusion in debates about English lan-
guage proficiency and immigration in Britain” in Carol Percy and Mary Ann Da-
vidson (eds.), The Languages of Nation: Attitudes and Norms (Multilingual
Matters 2012).

Janet Giltrow is Professor in the Department of English and, since 2007, Associ-
ate Dean of Arts at the University of British Columbia, Canada. Taking rhetorical
and linguistic approaches to discourse studies, she has published extensively on
literary and non-literary stylistics; genre theory; ideologies of language; and aca-
demic writing, including two textbooks: Academic Writing: Writing and Reading
in the Disciplines, 3rd ed. (Broadview Press 2001) and Academic Writing: An In-
troduction, 2nd ed. (Broadview Press 2010). She co-edited (with Dieter Stein)
Genres in the Internet (John Benjamins 2009).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
742 About the authors

Amy Gonzales is Assistant Professor in the Department of Telecommunications at


Indiana University, Bloomington, USA. She received her Ph.D. in Communication
from Cornell in 2010. She was a Robert Wood Johnson Health and Society Scholar
at the University of Pennsylvania before joining the faculty at Indiana University.
Her research examines the effects that digital communication technologies have on
individual identity, social support, health, and well-being, especially for people
from disadvantaged communities.

Helmut Gruber is Associate Professor of Applied Linguistics at the University of


Vienna, Austria. He has published in various fields of Applied Linguistics such as
Critical Discourse Analysis, media studies, political discourse analysis, conflict
communication, and computer-mediated communication, with a focus on investi-
gating the impact and use of electronic communication in scholarly activities. He
is co-editor of Pragmatics, the quarterly journal of the International Pragmatics
Association (IPrA), and a member of IPrA’s advisory board.

Jeff Hancock is Associate Professor in the Departments of Communication and


Information Science, where he is co-Chair, and the co-Director of Cognitive
Science at Cornell University, USA. His research is concerned with the psycho-
logical and interpersonal dynamics of social media, with a particular emphasis on
language use and deception. His research on lying online has been funded by the
National Science Foundation and the U.S. Department of Defense, and it has been
featured frequently in the media, including the New York Times, CNN, NPR, and
BBC. He is the Associate Editor of the journal Discourse Processes.

Sandra Harrison worked at Coventry University, UK, until her retirement in


2012. Most of her research has focused on online interaction. Her Ph.D. examined
interactions in email discussion forums, using discourse analysis and conversation
analysis to investigate the suitability of these methods for the analysis of online
discussion data. Her subsequent research has analyzed communication problems
online, turn-taking, repair strategies and apologies in online forums, and showing
empathy and advice-giving in online arthritis workshops.

Susan C. Herring is Professor of Information Science and Linguistics at Indiana


University, Bloomington, USA. Her research applies linguistic methods of analy-
sis to computer-mediated communication, with a focus on structural, pragmatic,
interactional, and social phenomena, especially as regards gender issues and multi-
lingual and multimodal communication. Her publications include Computer-
Mediated Communication: Linguistic, Social, and Cross-Cultural Perspectives
(John Benjamins 1996) and The Multilingual Internet: Language, Culture, and
Communication Online (Oxford 2007, co-edited with Brenda Danet). She is a past
editor of the Journal of Computer-Mediated Communication and the current editor

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
About the authors 743

of Language@Internet. She is presently preparing a multi-volume edited col-


lection on Internet Linguistics, to be published by Routledge.

Theresa Heyd is Researcher in English Linguistics at Albert-Ludwigs-Universität


Freiburg, Germany. She studied literary translation and received her Ph.D. in Eng-
lish Linguistics (2007) from Heinrich-Heine-Universität Düsseldorf. She was a
postdoctoral lecturer at the University of Texas and a German Research Foun-
dation (DFG) scholar at the University of Pennsylvania in the USA. Her research
focuses on mediated discourse of all kinds, with an emphasis on the pragmatics and
sociolinguistics of computer-mediated communication; she is currently conduct-
ing a corpus study on the emergence of digital vernaculars. She has published in
the fields of CMC (Email Hoaxes, John Benjamins 2008), sociolinguistics, narra-
tivity, and literary pragmatics.

Amelie Hössjer is Associate Professor of media and communication studies at


Uppsala University, Sweden. She received her Ph.D. in Scandinavian languages
from the Department of Scandinavian languages at Uppsala University. Her major
research interests are interactional questions in relation to computer-mediated
communication.

Jennifer Baker Jacobs became interested in computer-mediated communication


while pursuing graduate studies at the University of Cincinnati, USA. Her research
interests include sociolinguistics and conversation analytic studies of chat room in-
teraction in the college classroom. Her work has been published in Research on
Language and Social Interaction and Qualitative Sociology.

Christopher Jenks is Associate Professor in the Department of English at City


University of Hong Kong. His current work is concerned with institutional dis-
course, computer-mediated communication, intercultural communication, and
English as a lingua franca. He has published widely in international journals and is
co-editor of an eight-book series on social interaction for Edinburgh University
Press. His co-edited book Conceptualising Learning in Applied Linguistics (Pal-
grave Macmillan 2010) was a runner-up for the 2011 BAAL book prize.

Rodney H. Jones is Associate Head of the Department of English at City Univer-


sity of Hong Kong. His research interests include computer-mediated discourse,
health communication, and language and sexuality. He is co-author (with Chris-
toph Hafner) of Understanding Digital Literacies: A Practical Introduction (Rout-
ledge 2012) and author of Health and Risk Communication: An Applied Linguistic
Perspective (Routledge 2013).

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
744 About the authors

Loukia Lindholm is a Ph.D. candidate in English Linguistics in the Department of


English Language and Literature at Åbo Akademi University, Finland. She is com-
pleting a doctoral dissertation on the form and function of narratives in online ad-
vice. Her research interests include narrative analysis, advice discourse, and online
identity construction.

Rich Ling is a professor at the IT University of Copenhagen, Denmark. He is the


author of Taken for Grantedness (MIT Press 2012), New Tech, New Ties (MIT
Press 2008), and The Mobile Connection (Morgan Kaufmann 2004). In addition,
he is a founding editor of the journal Mobile Media & Communication and an as-
sociate editor of the Journal of Computer-Mediated Communication. His work has
focused on the social consequences of mobile communication.

Miriam A. Locher is Professor of English Linguistics at the University of Basel,


Switzerland. She researches interpersonal pragmatics, linguistic politeness, re-
lational work, the exercise of power, disagreements, advice-giving (in health con-
texts), and computer-mediated communication. Her book publications include
Power and Politeness in Action (Mouton 2004); Advice Online (John Benjamins
2006), which addresses advice-giving in an American Internet advice column; and
Advice in Discourse (with Holger Limberg, 2012 John Benjamins). In addition, she
co-edited the collections Impoliteness in Language (with Derek Bousfield, Mouton
2008), Standards and Norms of the English Language (with Jürg Strässler, Mouton
2008), and the Handbook of Interpersonal Pragmatics (with Sage L. Graham,
Mouton 2010).

Kris M. Markman is Assistant Professor of Communication at the University of


Memphis, USA. Her research interests center on people’s everyday communicative
and creative practices with and through new media. Her research on computer-
mediated discourse focuses primarily on structural issues such as turn-taking,
repair, and openings and closings. She has published in the Journal of Language &
Social Psychology, New Media & Society, and the Journal of Business Communi-
cation.

Sandi Michele de Oliveira is Associate Professor at the University of Copen-


hagen, Denmark, where she heads the program in Portuguese and Brazilian
Studies. She has published widely in the area of address: theoretical perspectives,
intercultural communication, politeness, sociolinguistic and socio-cognitive per-
spectives, processes of negotiation and renegotiation, and address use in CMC. She
has conducted both real-time and apparent-time studies of address in Portuguese
communities, spanning three decades. Other areas of research attention have in-
cluded post-Brown and Levinson politeness theory, political discourse, and the
(socio)linguistic construction of personal and social identity.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
About the authors 745

John C. Paolillo is Associate Professor of Informatics and Computing and Ad-


junct Associate Professor of Linguistics at Indiana University, Bloomington, USA.
His research focuses on social aspects of computer technology and its use, es-
pecially where quantitative and computational methods can help illuminate social
processes. He is the author of Analyzing Linguistic Variation: Statistical Models
and Methods (CSLI Publications 2002), and he has published articles and book
chapters on Internet Relay Chat, social network analysis of computer-mediated
communication, and quantitative analysis of linguistic variation.

Michelle Poff completed her Ph.D. in Communication at the University of Wash-


ington, USA, in 2010. Her specialty areas are environmental communication,
political communication, and media studies, with a focus on language use. She is
currently a lecturer in the English Language Program at University of Washington,
but will soon be vacating that position to enter private practice as a communication
consultant and writing coach.

Cornelius Puschmann is a postdoctoral researcher at Humboldt University of


Berlin’s School of Library and Information Science and a research associate at the
Alexander von Humboldt Institute for Internet and Society in Germany. He holds a
Ph.D. in English Linguistics from the University of Düsseldorf, where he wrote a
dissertation on corporate blogging. He studies computer-mediated communication
and the Internet’s impact on society, especially on science and scholarship. His cur-
rent project, funded by the German Research Foundation (DFG), investigates the
use of (micro)blogs in academia, combining qualitative social research with lan-
guage analysis. His other interests include language-based approaches to CMC
(stylistic analysis, pragmatics) and digital methods.

James Simpson is Senior Lecturer in the School of Education, University of


Leeds, UK, where he teaches on undergraduate and postgraduate TESOL pro-
grammes. In addition to the linguistic analysis of computer-mediated discourse, his
research interests include language learning with new technology in the develop-
ing world and the teaching and learning of English in migration contexts. He is co-
author (with Melanie Cooke) of ESOL: A Critical Guide (Oxford University Press
2008) and editor of The Routledge Handbook of Applied Linguistics (2011).

Karianne Skovholt is Associate Professor of Linguistics at Vestfold University


College in Horten, Norway. She teaches Norwegian language and edits books for
teacher training education. Her research interests include written and spoken inter-
action, literacy and computer-mediated communication, conversation analysis,
and discourse analysis. Her Ph.D. research was on email literacy in the workplace.
Her current research focuses on the communicative functions of emoticons in
workplace emails.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
746 About the authors

Dieter Stein is Professor Emeritus of English Linguistics at Heinrich Heine Uni-


versity, Düsseldorf, Germany. He has taught at the universities of Heidelberg,
Gießen, and Düsseldorf. His main research interests and publications are in the
fields of language change, interpretation and translation, language and law, and
communication in the Internet. He founded several open access e-journals, includ-
ing Language@Internet, and has served as editor-in-chief of the Linguistic Society
of America’s eLanguage digital publication portal.

Jan Svennevig is Professor of Linguistics at the University of Oslo, Norway. His


research deals with bilingual interaction (“Reformulation of questions with candi-
date answers”, Journal of Bilingualism, to appear), conversational repair (“Pre-
empting reference problems in conversation”, Language in Society 39, 2010) and
meeting interaction (“The agenda as resource for topic introduction in workplace
meetings”, Discourse Studies 14(1), 2012).

Crispin Thurlow is Associate Professor in the School of Interdisciplinary Arts


and Sciences at the University of Washington, USA, where he also holds adjunct
appointments in Linguistics and Anthropology. His recent books include: Digital
Discourse: Language in the New Media (Oxford 2011, co-edited with Kristine
Mroczek) and Tourism Discourse: Language and Global Mobility (Palgrave Mac-
millan 2010, with Adam Jaworski). He also co-authored (with Laura Lengel and
Alive Tomic) the textbook Computer-Mediated Communication: Social Inter-
action and the Internet (Sage 2004).

Tuija Virtanen is Professor of English Linguistics at Åbo Akademi University,


Finland. Her research interests focus on text and discourse linguistics, pragmatics,
and English grammar. Her publications include investigations of the discourse
functions of clause-initial adverbials in written English, studies of text types and
genres, persuasion, and textual aspects of advanced learner English. She is pres-
ently working on grammatical, discursive, and pragmatic aspects of computer-
mediated discourse. She serves as a member of the editorial board of Language@In-
ternet and of the International Pragmatics Association (IPrA) Consultation Board.

Asta Zelenkauskaite is Assistant Professor of Communication in the Department


of Culture and Communication at Drexel University, USA. She received her Ph.D.
in Telecommunications from Indiana University, Bloomington in 2012. Her re-
search foci include the impact of social media on interpersonal communicative
practices, the role of social media in public discourse in technology-mediated
environments, and its function as a backchannel in multimedia contexts. She has
co-authored articles in the areas of computer-mediated communication and inter-
active multimedia participation.

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:07 AM
Subject index 747

Subject index

A ARPANET 56 f., 60, 387


abbreviation 3, 20, 41–43, 61, 71, 92, artificial intelligence (AI) 251, 259 f.,
113 f., 123, 146, 149, 152, 155, 168 f., 265
172 f., 176, 178 f., 181, 191, 205 f., 264, ASCII (American Standard Code for In-
274, 279, 281, 283, 286, 306, 351, 446, formation Interchange) 56, 60 f., 74, 76,
454 f., 464, 467, 469, 472–477, 479, 542, 111, 531
622–623 Assyrian 674
address forms 8, 18, 291–307, 344, 548, asynchronous communication 14–16, 47 f.,
553–554, 567, 579–580, 616 55 ff., 135 f., 151 f., 202, 204, 262,
addressee 49, 92, 247, 291, 293, 297–298, 334, 341, 349, 366–368, 373 f., 389, 416,
302, 304, 306, 350, 392–393, 397, 474, 491, 539, 545, 590–592, 645, 653,
399, 400–401, 600, 602, 606–607, 618, 676 f.
624, 627–629, 654, 669, 677, 681, attachments, email 45 f., 590, 593, 599,
683–685, 704, 720–721, 724, 730 601 f., 606, 622, 625, 628
addressivity 14, 17, 21, 94, 96, 254, 291, attention 7, 20, 36, 140, 195, 204, 246,
293, 300, 302, 305 f., 392 f., 441, 524, 251, 255, 258, 262, 297, 315, 334, 413,
542 f., 545, 548, 556 f., 559 417, 438, 492–495, 499, 503 f., 509,
adjacency pair 65, 67, 75, 120, 263, 400, 523, 525, 533, 540, 559, 616, 680, 701,
500, 517 f., 526, 531, 545, 547, 560, 566, 720 f.
575 f., 596, 599, 606 audience design 16, 90, 93–102, 342, 405,
adolescents see teenagers 424, 433, 677 f., 686
advice 17 f., 46, 97, 339 ff., 403, 728 f., authentication 19, 284 f., 411 ff.
731 authenticity 19, 284–287, 390, 412 ff., 685,
– peer 18, 339, 341–343, 352 687 f., 727
– professional 339, 342, 345, 348 automated language analysis 90
advice column 18, 339, 342–346, 348 f., away messages see IM away messages
351–357, 729
affordances, technological 7, 11–17, 58, B
67 f., 72–75, 84, 175, 179, 217, 222 f., Bequian 565
226 f., 232, 235–237, 245, 264, 590, 723, blogs / blogging 4–14, 16, 24, 83 ff., 248,
728, 732 269, 286, 667, 671 f., 674, 676, 679,
age differences 74 f., 90–91, 102, 166, 175, 702–704, 718 f., 726 f., 730, 732
201, 207, 679, 680 – topic-centric 16, 87, 98, 100–102
AOL chat 16, 109, 114, 117, 125–127, – author-centric 16, 87, 94, 98–102
135 – classification 14, 84 f., 87–91, 94–96,
anonymity 17, 93, 101, 111, 175, 276, 344, 98 f., 101 f., 695, 732
353, 370–372, 414, 419, 439, 443, 639, – typology 10, 89–91, 94, 730, 732
653, 719, 726 bots 116, 252, 259–252, 264
apologies 18, 269, 272, 285, 315 ff., 424, breaking news 704–709
605, 614–615, 628–629, 641, 650–652 brevity 17, 137, 164, 172–174, 176, 181,
Arabic 62, 123, 167, 170 f., 340, 377, 470, 201, 206, 326, 334, 440, 452, 476, 495,
472, 643, 655, 674 647, 704, 707

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
748 Subject index

bridal letter 724 f. coherence 3, 8, 12, 14, 16 f., 43, 50, 57,
Bulletin Board System (BBS) 59–61, 76, 59, 63–68, 75, 127, 169, 245, 247–249,
299 f., 467, 472, 474, 477 251, 255, 259, 261–264, 297, 372,
business communication 35 f., 44–49, 413, 430, 439, 441, 456, 489, 515–517,
61–63, 85, 118, 137, 150, 165, 198, 220, 539 ff., 591, 599, 721
417, 589 f., 722 cohesion 20, 248 f., 263, 516–518, 524,
534, 545, 547 f., 550, 555, 557
C collaboration 12–15, 20, 138, 301 f., 424,
chaining 21, 148, 628–631 431 f., 520, 525–527, 529 f., 532 f., 605,
change over time 98, 295 f., 306 645, 702, 708
chat 3 f., 8, 12 f., 16–17, 20 f., 50, 68, college class setting 301, 566 f., 569
109 ff., 117, 127, 136, 217, 220–222, communication mode see also mode 18,
232 f., 235, 245 ff., 250, 269, 274, 47 f., 50, 55–58, 76, 118, 199, 404, 571,
276, 286, 298 f., 305, 438 f., 465 f., 622, 698
472, 475, 489 ff., 515, 517–519, communicative form 57 f.
521–523, 527–530, 539ff., 559, 565ff., communicative function 58, 83, 89, 174,
591, 594, 641 f., 670 f., 674, 676–680, 270, 441, 509, 519, 727 f.
685 communicative purpose 7, 35, 38, 40 f.,
– history see history: chat 48, 57, 61, 68 f., 73, 75, 84, 89, 98,
– modes 12 f., 16 f., 25, 119, 121, 125 f., 111, 124, 247, 411, 444, 469, 491,
134 ff. 500, 534, 680 f., 688, 703, 719, 723 f.,
– rooms 3, 17, 20, 111–114, 117, 154, 728
217, 220–222, 224, 226 f., 232–236, community, online 70–76, 84, 97, 114,
263 f., 367, 370–372, 377 f., 438 f., 125 f., 151, 272, 282–284, 286, 304, 387,
477, 489 ff., 517, 523, 527, 539, 542 f., 390, 442, 434, 438 f., 450, 455 f., 509,
545, 548, 556, 558 f., 565 ff., 641, 521 f., 527, 695, 702, 710
679 f. community of practice 21, 294, 301, 306 f.,
– technical features 21, 109–118, 617–626, 630 f., 640 f.
125–127, 490, 541, 543 computer-mediated discourse (CMD) 9,
Chinese 4, 121 f., 138, 165, 168, 199, 301, 38, 48, 55, 59 f., 62, 64, 67 f., 70–75, 439,
340, 377, 467, 470 f., 474, 674 670–689
chronemics 489, 491 f., 530, 590, 697 f. computer-mediated discourse analysis
citations see quoting (CMDA) 48, 71
classification of CMC 3 f., 9 f., 14, 47 f., conditional relevance 21, 65, 517 f., 596,
68–70, 75, 85–91, 101 f., 168, 190, 598, 600, 603–607
235, 349, 425, 466 f., 544 f., 623, conflict 22, 71 f., 93 f., 96 f., 167, 439, 574,
648–650, 652 ff., 662 f., 673, 695, 719 f., 607, 614, 629, 639 f., 642, 644–653,
731–733 681
code-mixing 22, 641, 650, 654, 667, 670, connection / connected presence 17, 139,
675 f., 679–682, 685 f. 151, 167, 194–196, 207, 499, 508
code-switching 3, 8, 14, 22, 110, 121 f., consonant spelling 42, 173, 475
165, 170, 180, 641, 650, 654, 667 ff. contextualization cues 22, 279, 440, 489,
– conversational 668 f., 680 f., 684 f., 498, 669 f., 685
687 convergence 7, 9, 11 f., 127, 136, 164, 179,
– non-conversational 668, 671, 677 727
cognition 9, 99, 245 ff., 295, 366, 372, conversation analysis (CA) 4, 6, 17, 64,
717 217 f., 291, 489, 515, 518, 540, 544, 565,
– constraints on 171, 245 567–569, 589 f., 596, 675, 678

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
Subject index 749

conversational floor 8, 20, 109, 202, 218, discursive features 59, 70, 72, 75, 178 f.,
221 f., 228–232, 254–256, 399, 515 ff., 726 f.
552, 555, 559 – of blogs 10, 84–86, 89, 101, 702–704,
conversational maxims see maxims 726 f., 730
conversational norms 18, 170, 292, 296, – of chat 112 f., 119–121, 222 ff.,
299–301, 589, 596, 605, 722 250–255, 299 f., 487 ff., 517 ff., 539 ff.,
conversational style 489, 498 f., 508 591
Cooperative Principle 19, 45, 246, – of discussion lists 59 f., 64–70, 75,
273, 372, 388, 398, 413, 437, 440 f., 297, 322 f., 520
455 – of email 35 ff., 69 f., 297 f., 401–405,
cost 17, 44, 152, 191, 196 ff., 208, 220, 589 ff., 675, 721, 723
420, 422, 647, 726 – of instant messaging 141–150, 152,
creativity 11, 60, 67 f., 75, 138, 144, 154, 171, 178 f., 474
169, 171, 174, 199, 207, 260, 263, 279, – of texting 152, 165 f., 168–174,
284, 445, 464, 467, 472–476, 639, 644, 176–179, 203 f., 467, 474
670, 676 f., 686, 695, 701 discussion, online 71, 76, 111, 275, 280,
Creole 674–675, 680, 684–687 301, 438, 443, 463, 466 f., 470 f.
Croatian 122–123, 125 discussion forum, online 14, 72, 75, 249,
cross-cultural 16, 18, 118, 139, 152 f., 262, 280, 282, 301, 304, 341–343, 347,
166–170, 201, 208, 272, 302, 319, 413, 356, 437–439, 441–443, 456, 463, 466 f.,
426, 489, 725 470 f., 473, 561, 667, 670–675, 679,
cues see reduced cues 681–683, 703
culture 9, 13, 21 f., 50, 60, 62, 69, 71, 113, dispute see conflict
121, 124, 175, 180, 191, 195, 201, 207, disrupted adjacency 8, 64, 120, 245,
251, 264, 273, 286, 298, 340 f., 344, 350, 248–255, 262–264, 517 f., 530–533,
355, 377, 431, 615, 639, 641–643, 654, 541 f., 559, 567, 591
674 f., 677–680 distance 15, 46, 48, 56, 76, 97, 207, 590,
CUSeeMe 117 613
Dutch 299
D
Danish 165, 170, 291, 297, 444, 592 E
deception 17–19, 137, 142, 154, 363 ff., economy 42, 122, 306, 472, 476, 493,
387 ff., 393 f., 396, 398, 400 f., 403 ff., 495
411, 413, 419, 719, 727 ellipsis (syntactic) 42, 95
deixis 5, 16, 23 f., 87 f., 91 f., 95, 99, 277, ellipses (repeated dots) 41, 477
424, 431, 704, 730 email 9–11, 14–16, 18 f., 21, 24, 35 ff.,
deletion, syntactic see ellipsis 55 ff., 98, 124, 135 f., 139 f., 142, 148,
demographics, participant 38, 48, 88, 109, 150–154, 163, 175, 178–180, 202, 217,
166, 201, 204, 276, 350, 289, 466, 471, 248, 269, 285, 297–299, 302, 315 ff.,
643 341 f., 349, 353, 363–370, 372, 375 f.,
digital folklore 387, 394, 398, 728 378, 387 ff., 411 ff., 463, 466, 470 f., 474,
digital genres see genre 490–492, 523, 539, 544, 589 ff., 613 ff.,
digital literacy 390, 405, 528, 533 641, 643, 645, 648 f., 652, 667, 671,
discourse analysis 4, 38, 43, 64, 70, 165, 673–677, 679 f., 684, 695, 703–706,
172, 180, 391, 489, 515, 533, 567, 695, 720–723, 725, 727 f., 732
717 email hoaxes 14, 19, 387 ff., 423, 703,
discourse coherence see coherence 727 f.
discourse transformer 282, 284 f. emblems 671 f., 678, 689

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
750 Subject index

emotes 18, 112 f., 116, 124, 269, 274–280, flaming 14, 21, 72, 181, 303, 368, 416, 614,
283, 286 f. 639 ff.
emoticons 3 f., 8, 20, 23, 41, 43–45, 60 f., floor see conversational floor
74, 92, 111, 124, 144, 146, 148–150, 152, flow 20, 138, 197, 286, 508, 539 f., 565,
155, 166, 169, 173, 177, 205 f., 209, 220, 582, 617, 621, 625 f.
258, 279, 281 f., 284, 286, 299, 329, folklore see digital folklore
351 f., 418, 464, 466 f., 469–471, 474, framing/frames of interaction 21, 415, 489,
478, 540, 614, 670 582, 625, 627–631, 639, 684
emphasis 43, 111, 122, 282, 424, 449 f., free association 207, 249
464, 472–474, 477, 647, 669, 681, 683, French 4, 63, 122, 165–167, 169, 171, 209,
724 251, 254, 286, 291, 293, 302, 466–468,
English, use of 4, 24, 37, 39, 61–63, 472, 474 f., 674, 684
72, 114, 121–124, 165, 167, 169–171, future predictions
173, 181, 209, 222, 280, 286, 291 f., – for blogging 102
297–299, 301 f., 306, 320, 340, 351 f., – for chat 127, 236, 263 f.
355, 377, 394, 417, 429, 431, 465–468, – for discussion lists 73
471–477, 522, 528, 531–533, 565, – for email 36, 48 f.
569, 639, 641, 643–645, 651, 654, 670, – for instant messaging 154 f.
672, 674–676, 678–682, 684, 687, – for text messaging 207
689
e-style see also style 59 G
etiolation 272 f., 280, 284 f. games, online 12 f., 76, 109, 112, 114,
expressive function 122, 124, 141–142, 117 f., 123, 125–128, 250, 274, 418
177, 198, 404, 446, 456, 463, 473, 477, gay 20, 438 f., 491
614, 640, 642 gender 3, 16, 21 f., 60, 72, 74, 90 f., 94, 97,
102, 124 f., 136, 138, 141, 144, 148–150,
F 153 f., 165 f., 170, 172, 175, 198, 202,
face 96 f., 175, 284, 291, 304, 316, 324, 204 f., 208 f., 276, 278, 286, 294, 300 f.,
331 f., 334, 340 f., 347 f., 352, 355 f., 397, 317, 322, 335, 350, 371 f., 375–377, 379,
401, 403 f., 497, 614, 616–619, 627–629, 416, 437–439, 443, 446, 449, 455, 466 f.,
654, 669, 681, 725, 728 f. 471, 475, 477, 519 f., 615 f., 623, 639,
Facebook 13 f., 16, 48–50, 84, 102, 136, 641, 644, 653 f., 698, 703, 724
150–152, 154–156, 179, 274, 695 genre 3 f., 6, 9–11, 15–17, 19, 22 f., 57, 60,
Facebook status updates see status updates 68–70, 73, 75, 83–85, 89, 91, 94, 98, 102,
face-boosting act (FBA) 291, 304, 617 f., 125, 128, 172, 175 f., 178, 269, 286,
621, 625, 627–631 387–392, 394, 396, 401 f., 404–406,
faceted classification 9, 48, 70, 340, 411–414, 421, 425, 464, 479, 509,
349–351, 720 592–594, 607, 616, 618, 620, 622, 627,
face-threatening act (FTA) 97, 284, 291, 640, 670 f., 676, 679, 681, 684, 695,
316, 347 f., 352, 355 f., 403, 497, 616, 697–699, 701, 709, 717 ff.
618, 627–629, 630 f., 681, 725 genre change 10 f., 718, 722 f.
farewell formulas see leave-taking formulas German 24, 37, 39 f., 42, 61, 63, 121, 165 f.,
feature-based deception theory 366–370 169–171, 269, 286, 291, 293, 300, 302 f.,
Finnish 122, 165 f., 170, 466 f., 592, 667, 306, 466–469, 474–476, 541, 565, 567,
670, 674, 678 f. 674 f., 678–683, 686 f., 689
first-pair part 541, 606 Google Wave 50
flirting 124, 260, 351, 674, 680, 722, 724 f., Greek 170, 181, 208, 467, 471, 477, 674 f.,
731 679–682, 684, 686, 703

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
Subject index 751

greetings / greeting formulas 18, 35, 44, 47, I


61, 69, 119, 149, 168, 223–225, 227, 235, identity 9, 18 f., 61, 63, 74, 93, 111, 115 f.,
253, 264, 292, 296–299, 306, 414, 424, 126, 172, 174, 224, 272, 284, 291, 294,
433, 540 f., 547–549, 579, 605, 614 f., 297, 299, 302 f., 305, 307, 333, 340, 345,
622, 625–627, 678, 681, 683 f. 347 f., 353, 356 f., 370–372, 387, 389,
Gricean maxims see also maxims 39, 45, 392, 400, 411 f., 415–419, 421–423,
137, 173, 249, 388, 440 f., 456, 476 425 f., 429 f., 433, 437–439, 441–443,
grounding 7, 23 f., 74, 366, 720 f. 446–449, 455, 489, 506, 521, 527, 597,
groups 20 f., 55–58, 62 f., 70–76, 91, 102, 617, 639, 643, 672, 678 f., 680, 683 f.,
111, 114, 116, 118, 126, 151, 153, 166, 686, 696, 698, 708 f.
175, 202, 205, 207 f., 219, 228, 230–232, ideology 23, 350, 356, 508
251 f., 293 f., 298, 301–303, 317 f., 322, illocutionary force 8, 44, 270 f., 275, 285,
324, 326 f., 334, 339, 341, 343, 348, 350, 316, 319, 470, 478, 647, 651
352 f., 405, 438, 449–451, 454, 466 f., IM see instant messaging
471, 475, 508, 518, 520–523, 528, 556, image text 15
558–560, 590 f., 617 f., 620, 626, 631, IM away messages 16, 136–138, 141–144,
639, 641, 673, 675, 678 f., 683, 686, 704, 151, 155, 474
708, 721, 723, 729 implicature 4 f., 23, 137, 141, 246, 258,
GSM 193, 208 260, 388, 400, 440, 496, 500, 509
impoliteness 21, 72, 139, 200, 293, 299,
H 302 f., 500, 592 f., 639 ff.
half-duplex / one-way message trans- incoherence see coherence
mission 38, 48, 50, 110, 112, 199, indexicals 291, 295, 539
515–517, 732 inexperienced users 45, 254 f., 390, 521
health websites 18, 342 f., 345, 348, 353, inferencing 23, 124, 245 ff., 263, 265, 300,
355, 357 341, 415, 440, 450, 590, 600, 604, 606,
Hebrew 639–664 677–678
hierarchy, social 58, 71, 116, 118, 293, 426, innovation 10 f., 15, 113, 169, 207, 274,
620 284, 491, 670, 726, 732
Hindi 121, 674, 677, 680 instant messaging 10, 16, 48–50, 97, 109 f.,
history 117, 125 f., 128, 135 ff., 171 f., 175,
– of blogging 83 f., 87 178 f., 199, 202, 209, 248 f., 262, 264,
– of chat 110–112, 114 f. 279, 297, 364, 366 f., 372, 374, 378, 463,
– of CMC research 3 f., 8, 37, 43 f., 59, 470 f., 474 f., 477, 490 f., 502, 539, 541,
667 f. 543, 568, 671
– of email 35 f. interaction 3, 6, 8, 10–12, 15–21, 38, 44,
– of instant messaging 16, 135 f. 46–48, 50, 57–60, 64–72, 74 f., 85, 97,
– of mailing lists 56 109–122, 125–127, 137–139, 141,
– of text messaging 152, 156, 163 166–168, 174–178, 193–196, 198 f.,
hoaxes see email hoaxes 201 f., 207, 217–222, 224 f., 227 f., 232,
HTML (Hypertext Markup Language) 56, 235 f., 249–251, 255, 258 f., 261, 263 f.,
58, 60–61, 64, 75, 76, 84, 418, 423, 643, 275, 278, 280, 282–286, 291 f., 294–296,
732 298, 302 f., 315, 322, 332, 339–341, 343,
humor 44, 46, 142 f., 174, 249, 262, 264, 349, 350 f., 353, 356 f., 363–365, 367,
273, 295, 348, 351 f., 355, 389, 650, 681 370–372, 374, 376, 378, 400–402, 404,
Hungarian 391 406, 411–413, 415–419, 422, 431, 433,
hybridity 60, 70, 74, 178, 608, 686, 695, 437–439, 441, 449, 455–457, 463 f., 467,
727, 729 474, 478, 489, 490–498, 500, 502 f.,

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
752 Subject index

505 f., 508 f., 515–517, 519–521, 523 f., language play 3, 8, 18, 120, 172 f., 176 f.,
530 f., 539–544, 548, 556, 559 f., 179, 245, 247, 249 f., 256, 280–286, 445,
565–569, 571, 573, 576, 578, 581–583, 453, 456 f., 473 f., 476 f., 639 f., 650, 677,
589, 590–594, 596, 598, 599, 602–607, 722
613, 615–622, 625, 627, 629–631, 639, language shift 62, 678
641, 646, 652, 668–670, 676 f., 683, 688, language use 3–8, 13, 38, 40 f., 43, 48, 59,
696, 698, 700–704, 706, 708 f., 721, 727, 74 f., 91, 102, 113, 171, 173, 177, 209,
730 273, 280, 293, 352, 366, 372, 376, 441,
interactional sociolinguistics 489 463–472, 474–476, 478, 539, 668, 684
interaction management 16, 111, 114, languaging 675, 680, 686
119–121, 127, 439, 500–502, 540 f. leave-taking formulas 44, 298, 353, 678,
interactive written discourse 172, 670, 672 681
interactivity 12, 14, 22, 59, 68, 92, 109, lexical repetition 249, 258, 263, 547
112, 117, 127, 164, 179, 315, 342 f., 355, lexical shortening see abbreviation
467, 473, 543, 589, 590 f., 620, 622, 625, lingua franca 24, 62 f., 643
700, 702 f., 707, 709 f., 732 linearity 66 f., 248, 251, 292, 296, 304, 517,
international contexts 16, 110, 121 f. 697 f., 702 f.
Internet Relay Chat (IRC) 12, 16 f., 24, list culture 69–63
109 f., 115–127, 173, 245, 250–252, Listserv 16, 22, 55 f., 59, 62, 64, 68 f., 71,
254–258, 264, 269, 276–279, 286, 298 f., 74, 318, 639 ff.
303, 305, 371, 438, 442, 453, 457, 463 f., Listserv list see also mailing list 16, 56,
466–468, 472, 477, 491, 515, 530, 68 f., 74, 318, 639 ff.
540–542, 567, 594, 671–674, 676, 680 literacy see digital literacy
intertextuality 284, 703, 708 f. Lithuanian 122 f., 125
isiXhosa 161–170, 181, 467, 475, 674, 680 LIWC (Linguistic Inquiry and Word Count)
Italian 4, 63, 115, 122–124, 152 f., 165 f., see text analysis software
170, 201 f., 207–209, 466 f., 473, loosened relevance 8, 17, 245, 250, 252,
475–477, 565 255 f., 258 f., 261–263, 539, 567
love letter 725, 733
J lurking 73, 76, 98, 136, 142 f., 354, 441,
Japanese 4, 13, 152 f., 165, 167, 170 f., 521, 677
199–201, 207 f., 291, 299, 301, 305, 340, lying see also deception 271, 273, 276,
343, 466 f., 470, 472, 477, 565, 567, 639 363, 365–371, 374, 377 f., 388 f.

K M
Korean 152 f., 165, 167, 207, 301 f., 340 mailing list 16, 55 ff., 297, 673 f.
Malay 165, 291, 298
L markedness / marked usage 65 f., 280, 295,
language alternation see code-switching 301, 304, 331, 669
language change see also change over time maxim of manner 39, 45 f., 173, 246, 372,
11, 37, 40 440, 442, 446 f., 452 f., 455–457, 476
language choice / code choice 3, 15 f., 59, maxim of quality 45, 142, 246, 372,
62 f., 72, 74, 641, 671–673, 677 f., 681, 398–401, 440, 442–445, 447, 455, 649,
683, 688 653
language ideology see ideology maxim of quantity 45, 440, 445 f., 455, 647
language of distance see also distance 15, maxim of relation 4, 8, 10, 17 f., 45,
46, 48, 56, 76, 97, 207, 590, 613 245–250, 252, 255 f., 258–265, 398,
language of immediacy 15, 46–48 449–452, 455, 539, 647

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
Subject index 753

media co-activity see also multitasking 13 389 f., 404, 463–469, 471 f., 474,
media richness 7, 364 f., 369 477–479, 490, 516, 523, 534, 539, 571,
medical advice online 18, 339, 342 f., 345, 622, 624, 631, 645, 667, 672–674,
348, 355, 729, 731 676–678, 680 f., 685–688, 698–701,
medium effects see techological determin- 706 f., 709
ism mode-focused approach 465 f.
medium factors 9, 18, 48, 61, 73, 75, 218, moderator / administrator 56–58, 71, 111,
262 f., 349, 351, 354, 463, 490, 516, 520, 114, 116 f., 126 f., 601, 603, 621, 653,
522, 668, 673, 676, 688 722, 725
meetings 12, 21, 220 f., 540, 543–545, motivation 85, 87 f., 91, 93, 122, 138, 350,
548–550, 553, 555, 559 f., 568, 606, 620, 364, 372, 378, 396 f., 399, 466, 473, 476,
726 478, 645, 673, 688, 718, 721, 729
memoranda 44, 722–723 MUDs and MOOs 9, 16 f., 24, 68, 112–114,
message length 141, 165, 169, 172, 178 f., 116–118, 123, 125, 128, 250 f., 254, 256,
204 f., 323, 326, 420, 495, 576, 580 260 f., 264, 269, 275–278, 367, 443, 515,
meta-communication 60 f., 324, 346, 399, 534
403, 489 multilingual Internet 62 f., 72, 74, 118, 121,
metadata 86, 88, 92 f., 102 639, 671–673, 676, 680, 684 f., 688
meta-genre 724, 726 multilingualism 21, 62, 667, 670 f., 689
metalinguistic awareness 3, 8, 16, 121, multimodality 14 f., 22 f., 75, 180, 191,
171, 686 416, 447, 534, 673, 688, 702–703, 709,
metaphor 64, 116, 250, 283, 388, 444 f., 711
453, 456, 552, 645, 669 multiparticipant / multiparty 8, 12, 17, 20,
metapragmatic awareness 9, 15, 163, 173, 50, 63–65, 74, 109–112, 115, 119 f., 154,
177, 180, 284, 286, 686 218, 221, 228–230, 232, 235 f., 245,
metatalk / metadiscourse 277, 324, 351, 250 f., 262, 263 f., 332, 438, 490 f., 515 f.,
531, 644 f., 728 518 f., 524, 567, 590, 670 f., 684 f.
metathesis 122, 147 multiple authorship 13, 22, 702, 709
microblogging 4, 13 f., 23, 84, 102, multitasking see also media co-activity 20,
179–180, 248 117, 120–121, 138–140, 155, 302, 305,
micro-coordination 194, 196, 198, 207 495, 508, 522, 527, 579, 531
minimal bilingualism 678 f. mutual monitoring 491 f., 729
mini-proposition 19, 437, 441, 447, 455 f. MySpace 49 f.
miscommunication 264, 318, 416, 489,
494, 524, 566, 578, 581 f., 614, 651, N
654 n:n communication 16, 48, 55–58, 74, 76,
MMS (multimedia message service) 164 350, 673
mobile phone 5, 15, 17, 49, 135 f., 146, narrative 6, 9–11, 22, 94, 100, 112, 149,
150, 152–155, 164 f., 173 f., 177–179, 277 f., 343, 354, 390, 397, 417, 423, 425,
191 ff., 217, 219 f., 222, 224, 227, 342, 432, 600, 627, 640, 675 f., 679, 684,
364, 367, 395, 463, 468, 613, 708 695 ff.
mobility 17, 49, 175 national language 63, 165, 170 f., 672, 675,
mock performative 18, 280–286 678–680
mode 3 f., 6 f., 9–12, 14–20, 22 f., 33, 35, negotiation 10 f., 19, 23, 94, 96, 116 f., 126,
38, 44 f., 47–50, 55, 57 f., 60, 69, 70, 76, 165, 191, 284, 286, 294–297, 299, 304 f.,
85, 98, 101 f., 109 f., 112, 114, 118 f., 307, 316, 340, 348, 350, 401, 412, 440 f.,
125–127, 149, 165, 178, 195, 199, 248, 456, 489, 490, 509, 540, 565, 567, 582,
250 f., 262, 264, 273–280, 282–286, 641, 669, 708

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
754 Subject index

netiquette 39, 45, 61, 71, 300, 326, 333, openings and closings 165, 205, 393, 404,
438 683
Netspeak 8, 20, 23, 36, 39, 41, 464 f., 476, orality-literacy model 37, 40, 46, 58
479 orthography see also non-standard spelling
newbie see inexperienced user 3, 11, 14, 16, 20, 37, 41 f., 92, 100,
Newman-Pennebaker model 374 f., 378 122 f., 144, 146 f., 165, 168 f., 171–174,
new media 5, 11, 22, 40, 55, 57, 171 f., 177, 206, 275, 299, 318, 327, 417,
178 f., 699, 701, 704, 708 f., 722 428, 453, 464, 467–469, 472–476, 595,
newsgroup 3, 48, 55–57, 61 f., 70, 72 f., 614, 686 f.
248, 348, 364, 367, 370, 372, 439, 471,
474, 592, 639, 671, 676, 695, 704 P
news office 613, 621 f., 625 f., 630, 632 paralinguistic restitution 8, 111, 169, 173,
nicknames, online 4, 19–20, 111, 116, 254, 176, 181, 470, 472
280, 298–299, 318, 416, 437 ff., 492, pauses / pausing 145, 220, 223, 231 f., 234,
650, 652, 654, 672 237, 489–490, 494, 496–500, 506,
Nigerian letters/email/scam 19, 387, 390, 544–547, 549, 551–556, 558, 569, 579
393 f., 411–415, 417–422, 426, 428, performative predications 274, 278–280,
431–433 283, 285–287
Niuean 674 performatives 8, 17 f., 113, 249, 269–287,
noise see system noise 339, 414
non-responses 21, 541, 589 f., 593 f., 598, performativity 10, 18, 269 ff., 532
600–602, 604–606 perlocutionary force 270–271, 275, 285,
non-standard punctuation 14 f., 20, 41–43, 389, 647
179, 199, 464, 467, 469, 472–474, 476 f. Persian 667, 674, 681
non-standard spelling 14, 20, 41, 122 f., persistence of textual CMC 8, 58, 251, 307,
144, 168 f., 171, 173 f., 177, 199, 453, 349, 351, 354, 559, 719, 722
464, 467–469, 472–474 personae, online 18 f., 284, 350, 438 f.,
non-verbal behavior / non-verbal cues 8, 441
19, 46, 61, 63, 111, 218, 220 f., 222–223, personal addressability 192 f.
228, 232, 279, 332, 372 f., 400, 413, 418, personality 22, 491, 494, 639, 654
433, 491, 493, 519, 523 f., 540, 593, 596, person deixis 89, 91 f., 95, 99, 291, 424,
614 431, 730
norms see also conversational norms 8, 11, phatic communion see also small talk 16,
16, 21, 40, 59, 62, 70–72, 74 f., 88, 99, 99, 117, 168, 174, 196, 204, 250, 263,
118, 125 f., 149, 167, 175, 217, 232, 236, 351, 489, 613 ff.
248, 252, 261, 263, 294, 296, 301, 303, phonological approximation 168 f., 173,
306 f., 334, 345, 350–352, 355 f., 412 f., 176 f., 181, 472, 475 f.
416 f., 428, 442, 454 f., 472, 508, 589, planning 22, 46, 72, 92, 99, 101, 118, 613,
590–592, 594, 596, 598, 605–607, 618, 622, 627, 647, 677, 684–686
640, 653, 698, 708, 719, 724, 726, 729 play see language play
Norwegian 17, 21, 165 f., 169, 193–195, Polish 679
201, 203–207, 209, 297, 467, 565, 589, politeness 3, 16, 18, 21, 23, 87, 96 f., 137,
611, 615 140, 154, 292–296, 299–301, 303–307,
315–317, 333, 340, 389, 424, 440, 595,
O 599, 613–618, 621, 629–631, 640 f., 648,
offences 18, 315, 318, 322–324, 326–329, 654, 669, 722, 725
331, 334 f. polychronicity 3, 20, 120, 229, 232, 263,
offensive language see profanity 502–506, 522, 524

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
Subject index 755

polylingual languaging see languaging R


polylogue 58, 73 f., 683 recontextualization 284 f., 689, 702, 706 f.,
Portuguese 291 f., 300, 306, 641 709
power 20, 72, 116, 126 f., 292–294, 312, reduced cues 8, 64, 72, 111, 218, 220,
316 f., 404, 423, 432, 493, 506, 508 f., 222–224, 226–228, 231 f., 235 f., 248,
520, 597, 642, 701 286, 332, 371, 400, 412 f., 417, 419,
pragmatic theory 4, 248, 387–389, 405, 437, 463, 469, 472 f., 490 f., 493, 508,
589 517, 519, 539, 542, 614, 630, 670,
pragmatics, core phenomena 4, 17 685, 721
pragmatics, definition of 5 f., 55, 58 f. register 16, 59–61, 63, 68, 74, 176, 415,
prescriptive / prescription 45, 88, 90, 100, 417, 423, 425, 470
166, 170, 176, 440, 627 relational work 21, 164 f., 174, 176–178,
presence 17, 19, 97, 111, 116, 139, 151, 294, 305, 340, 348, 393, 415, 432, 439,
167, 175, 195, 220, 222, 224 f., 227 f., 455, 613, 617, 626
235, 259, 291 f., 295, 297, 343, 366 f., relevance 4, 6, 8, 10, 17 f., 45, 245 ff.,
411, 416, 439, 491, 493–495, 499, 508, 295 f., 322, 324, 334, 341, 347, 389, 398,
540, 720, 729, 731 437, 440, 442, 449–452, 455 f., 539, 567,
press release 622, 723 f. 603, 647, 649, 722, 725, 731
prestige 62–63, 405 remediation / remedial activity see also
presupposition 4 f., 23, 597 apologies 17, 315, 329 f., 644, 646,
print journal 613, 619, 630 650–652
privacy 83, 115–117, 142, 151, 167 f., 302, repair 14, 17, 21, 109, 122, 137, 144,
342, 438 147, 154, 218, 232–237, 248, 275, 494,
profanity 114, 262, 356, 375, 640–642, 524, 540 f., 550, 565 ff., 602, 604, 606,
645, 654 651
pronouns 42 f., 59 f., 65 f., 72, 91, 95 f., 101, repetition see also lexical repetition 8, 111,
170, 291–293, 297, 299 f., 303, 306, 326, 124, 231, 233, 328, 417, 432, 555, 581,
328 f., 331, 335, 373–377, 432, 555, 652, 647, 681
726, 729–731 reprimands 645, 653
prosody, emulated 15, 42 f., 111, 149, 173, response norms 21, 589 ff.
176, 463, 472 f., 542 responses 21, 97, 232, 255 f., 259 f., 270,
public 16, 50, 56, 58, 60–63, 74, 88, 275, 281, 284–286, 344, 352 f., 355, 390,
98, 111, 115, 117–119, 124, 163 f., 402, 448, 491, 495 f., 506, 519, 523, 543,
167 f., 171, 175, 180, 199 f., 221, 251, 547, 550, 555, 567, 573, 576, 589 ff., 685,
272, 280, 282, 295, 318, 331, 334, 721 f., 726, 728
342, 344, 350, 352, 371, 394, 438, 441, rhetorical genre theory 718 f., 722, 724,
467, 471, 492, 548, 559, 673 f., 731
676–678, 680, 683 f., 686, 689, 725, rhythm 20, 287, 489 ff., 593
728 role-playing 250, 350, 414, 700
Punjabi 62, 121, 264, 674, 676 f. roles see speaker roles
rudeness see impoliteness
Q Russian 63, 122 f., 643
quasi-synchronous 17, 21, 44, 50, 202,
249, 490, 515, 541 S
quoting 14, 41, 44 f., 66 f., 69, 74 f., 89 f., scholarly communication 56, 60, 62
97, 101, 327, 329, 349, 356, 626, 645, script (computer program) 109, 113, 116
655, 677, 683, 722, 727 script (dramatic) 111, 256, 260, 269,
276–278, 281–286, 415, 432

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
756 Subject index

script (writing system) 20, 62 f., 74, 118, Spanish 4, 97, 114, 122, 291, 293, 343,
122, 202, 208, 351, 464, 467, 469, 391, 466, 565, 674, 679
472–474, 643, 687 speaker roles 20–21, 71, 94–96, 114,
script-switching 687 116–117, 281, 283, 293, 326, 344,
second-pair part 249, 606 350, 377, 392, 413, 416, 432, 506, 516,
seduction, online see also flirting 260, 499, 520 f., 527 f., 533–534, 542 f., 548 f.,
509 552, 554 f., 559 f., 590, 592, 594, 597,
self-description 449–450, 455 599–600, 604, 620, 652, 673, 680, 700,
self-presentation 18 f., 61, 137, 151, 154, 704
346, 363, 372, 415–417, 419, 432, 439, speech acts 4 f., 17, 19, 21, 23, 64, 137 f.,
441, 456 141 f., 270–275, 293, 299, 339 f., 355,
sequential relatedness 246, 249, 262, 596, 364, 388 f., 391, 393 f., 401–404, 470,
672 474, 589, 591, 596 f., 601, 607 f., 616,
sex 175, 253, 257 f., 260, 265, 341, 344 f., 640, 644, 646, 684
347, 350 f., 353 f., 405 f., 438, 491, 493, speech versus writing 3, 8 f., 37, 99, 102,
498 f., 508, 510, 682 145 f., 148 f., 178, 539
shortening see abbreviation spelling see orthography
signature file 61, 142, 447, 456 spoken interaction 217–237, 541, 544, 615,
sincerity 283, 315–317, 387, 389–390, 668, 670
412 f., 423, 455 standardness 11, 92, 100, 170–171,
Skype 35, 117, 136, 152, 154, 217, 221, 708 176–177, 209, 351–352, 355, 418, 472,
Skypecast 221 f., 224–227, 230–232, 718, 729
234–236 standards 56, 74, 76, 164, 172, 262, 291,
small stories 10, 14, 22, 697 f., 703, 709 387, 687
small talk 7, 21, 174, 177, 613 ff., 700 status, social 101, 165, 292–293, 298,
smiley faces see emoticons 300–302, 306–307, 316–317, 348, 350,
SMS see text messaging 377, 413, 417, 423, 431, 527, 615
social factors 14, 16, 22, 38, 48, 50, 74 f., status updates 13 f., 49, 84, 136, 179, 274,
294, 349–350, 466, 639, 654, 668, 676 695, 704–706
social-interactional approaches 696, 698, stories / storytelling 695 ff.
700, 702 – digital 25, 679, 699–701, 704, 708 f.
sociality 22, 168, 174–179, 717, 720 – fictional 22, 699, 702, 709
social networks 85, 122, 125–127, 154, – life 696, 704
199, 318, 387, 392, 619, 675, 710, 728 – personal experience 22, 695–700,
social network sites 4, 13 f., 16, 23, 40, 702, 704, 709
48–50, 83 f., 102, 136, 150–152, 154, strategic self-presentation 372, 415
156, 179 f., 264, 274, 390, 671, 688, 695, structural features of CMC 3, 8, 15, 20,
704–707 41–45, 58–61, 74, 84, 111–113, 116,
sociocultural factors 22, 46, 50, 273, 639 f., 122–124, 146–148, 152, 165 f., 168–170,
654, 695, 698 173, 176, 205 f., 299, 463 ff.
sociolinguistics 3–6, 8, 15, 24, 61, 149, style 16, 36 f., 39, 40 f., 46 f., 59, 68, 74,
165, 286, 291–294, 299, 304, 466, 471, 83–89, 90–95, 98–102, 143 f., 154,
489, 667–668, 675, 695–697, 700–703, 166–168, 171, 173, 175, 177, 179 f., 191,
708–710 204, 284, 291, 297, 330, 354, 375–377,
solidarity 21, 71, 174, 177, 179, 292–294, 379, 412 f., 416 f., 423, 428, 432 f., 470,
303, 340, 357, 491, 617, 639 f., 720 489, 491, 498 f., 502, 508, 520, 595, 615,
spam 49, 370, 387, 389 f., 392 f., 411, 649, 641–644, 647, 670, 675–679, 684 f., 695,
726 f. 724

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
Subject index 757

Swedish 21, 122, 152 f., 165, 168–170, threading 14, 264, 544, 722
199–201, 207 f., 297, 302, 466–468, 592, timing see also chronemics 20, 249, 317,
613–638 489 ff., 581, 721
synchronous communication 8, 36, 48, 50, topic 3, 6, 16, 20 f., 36, 43, 45, 56–58, 60,
109, 112, 119, 135 f., 154, 217 ff., 245, 62, 64, 67, 70–75, 84, 87–90, 94, 98–102,
250, 252, 259, 263, 274, 341, 433, 437, 111, 115, 121 f., 149, 165, 168, 170, 174,
515, 539, 673 f., 685 201, 219, 225, 228–232, 234–236, 248,
syntax 18, 42, 48, 166, 169 f., 199, 262, 250 f., 256 f., 283, 286, 304, 318, 326,
274, 279, 346, 351, 375, 463, 516, 669, 327, 330, 339, 342, 344 f., 350, 352,
686 354–357, 374, 376 f., 388, 401, 406,
system noise 252, 255, 258, 263 437, 442, 449–450, 455–457, 489, 495,
500, 515–522, 526, 527, 530–534,
T 540–560, 567, 578, 627, 644, 645, 681,
technological determinism see technolo- 722, 730
gical factors T pronoun 291–293, 299–300, 302–304,
technological factors 7–9, 11, 14, 22, 306
59–61, 63 f., 68, 71 f., 74 f., 113, 126 f., transaction, communication as 164, 174,
262 f., 340, 343, 349, 356, 366, 463, 469, 422, 423 ff., 489, 599
475, 520, 534, 539, 553, 639, 653, 676 f., transcription 21, 112, 177, 237, 264, 349,
719 490, 519, 544 f., 560–561, 569 f.
teenagers 17, 49, 72, 88, 94, 102, 138, 144, transmedial narratology 699
152, 166, 169, 170, 191, 194, 196–199, trolling 371, 390, 392, 399, 405
201, 205–207, 344, 357, 592, 675, 679 f., trust 293, 330, 340, 348, 356, 363, 365,
685 367, 389 f., 411 f., 419, 424, 432, 450
teen emancipation 196, 198 f. Turkish 298, 674, 679 f., 687, 725
telegrams 43 f. turn organization 20, 541–543, 560, 567,
telephony 17, 117, 119, 127, 164, 195, 199, 669
207, 217 turn-taking 3, 14, 17, 109, 114, 119 f., 127,
temporal aspects see chronemics 137, 139, 154, 165, 170, 176, 202, 218,
text analysis software 364, 373 220, 228 f., 231 f., 235–237, 264, 517 f.,
text chat see chat 533 f., 542 f., 560, 566–568, 574, 578,
texting see text messaging 580, 590 f., 631, 670, 722
text messaging 4 f., 10 f., 16 f., 24, 39 f., 45, tweeting / retweeting 14, 180, 695, 706 f.
135 f., 143, 148, 150, 152–155, 163 ff., Twitter see also microblogging 14, 35, 40,
191–193, 196 f., 199–209, 220, 225, 264, 48 f., 84, 102, 179–180, 695, 706 f.
279, 306, 342, 363 f., 366, 372, 463, typing effort see economy
465–468, 471, 473–477, 592, 618, 667, typography 18, 117, 172, 280, 463, 467,
671, 674, 680, 708 472–474, 568, 639, 647
text type 37, 39 f., 47, 339, 344, 348–353,
622, 717, 724 U
Thai 124, 304, 543, 565, 641 universalizing approach 465–466
third move 591, 607 UNIX write / talk 38, 57, 111, 135
thread 3, 15, 21, 43, 57, 119, 121, 170, 196, urban legends 390, 397, 403, 703
218, 249, 251 f., 254, 280, 284, 300, 304, Usenet 55–57, 60, 62, 71, 590, 592, 639,
353, 356, 441, 457, 502, 516, 518, 524, 673 f., 676
544 f., 548–551, 556, 567, 589, 602, user adaptations 14, 17, 67, 120, 270, 495
607 f., 627, 643, 670–672, 682 f., 686, user-generated content (UGC) 12, 87, 671
706, 722 utterance breaks 136, 144–149

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM
758 Subject index

V W
variation 3, 12, 17, 23, 111, 119, Web 2.0 4 f., 12 f., 14, 24, 217, 387, 390,
122, 126 f., 144, 149, 166, 169, 172, 523, 672, 695, 699, 701
175–177, 275, 277, 286, 291, web chat see also chat 117, 122, 125, 567
294, 298, 302, 320, 322, 334, 356, web forums 49, 57, 76, 670 f.
420, 432, 465–467, 471, 474, Welsh 181
476–478, 515, 607, 670, 676, 686, Wikipedia 12 f., 24, 729 f.
725 wikis 4, 13–15, 91, 523, 732
VAX phone 112 workplace 15, 21, 72, 138 f., 218–220, 258,
video exchanges 15, 117, 126, 219 f. 582 f., 589 f., 592 f., 597, 600, 606, 613,
virtual community see community, online 615, 624, 631, 721
virtual teams 118, 543 ff. World Wide Web, history of 12
voice calls 5, 152 f., 193, 197–201, writing system see script
204
V pronoun 291–293, 299, 300, 302–303, Y
306 YouTube 102, 701

Brought to you by | New York University Bobst Library Technical Services


Authenticated
Download Date | 6/15/15 3:09 AM

You might also like