Motives and Reasons for Photo-tagging and untagging
نویسنده
چکیده
Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Amandeep Dhir Name of the doctoral dissertation Exploring Online Self-presentation in Computer-mediated environments: Motives and Reasons for Photo-tagging and untagging Publisher School of Science Unit Department of Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 79/2016 Field of research Usability research Manuscript submitted 15 December 2015 Date of the defence 13 May 2016 Permission to publish granted (date) 11 February 2016 Language English Monograph Article dissertation Essay dissertation Abstract The purpose of this dissertation is to understand the online self-presentation behavior by investigating different reasons for the tagging and untagging of photos on different computermediated platforms. Particular emphases were given to the psychometrics, quantitative research methodology, and literature governing computer-mediated communication in order to deepen the existing understanding of its various aspects of this dissertation. Accordingly, five empirical studies have been conducted. Study I examined various Uses and Gratifications (U&G) of the photo-tagging activity among adolescent photo-taggers by developing a valid and reliable 35-item photo-tagging U&G instrument using three cross-sectional studies (N = 780, 313, 186); Study II examined the cross-cultural validity of the 35-item photo-tagging U&G instrument with Namibian adolescent and young-adult photo-taggers using two crosssectional surveys (N = 358, 393); Study III investigates age and gender differences in the sought photo-tagging U&G by adolescent and young-adult photo-taggers (N = 780, 313, 178); Study IV examines the differences between those adolescents who do and do not untag photos (N = 380); and Study V investigates the different reasons due to which young people avoid photo-tagging by developing a valid and reliable 25-item Avoidance Photo-Tagging Use (APTU) instrument (N = 780, 313, 106). This dissertation reveals the following findings. First, a valid and reliable photo-tagging U&G instrument (35-item) addresses nine U&G of photo-tagging, namely likes and comments, social influence, peer pressure, gains popularity, entertainment, feels good, social sharing, affection, and convenience (Study I). Second, cross-cultural validation ensured that a 23-item phototagging U&G instrument possessed sufficient validity and reliability (Study II). Third, male adolescents sought higher "likes and comments" and "gain popularity" U&G compared to females; age differences among adolescents were absent; and adolescents sought higher U&G than did the young adults (Study III). Fourth, older males, extroverts, those who perceive online information as public, and adolescents with more experience of taking and sharing photos, who spend more time taking photos, who demonstrate strict protection of digital photos, those who are negative towards cloud storage, and those who rarely keep backups, are more likely to untag photos. (Study IV). Fifth, a valid and reliable instrument on avoiding photo-tagging use (25 items) addresses six reasons for avoiding photo-tagging, namely destroy capital, dislike, worry, parental control, embarrassment and personal appearance.The purpose of this dissertation is to understand the online self-presentation behavior by investigating different reasons for the tagging and untagging of photos on different computermediated platforms. Particular emphases were given to the psychometrics, quantitative research methodology, and literature governing computer-mediated communication in order to deepen the existing understanding of its various aspects of this dissertation. Accordingly, five empirical studies have been conducted. Study I examined various Uses and Gratifications (U&G) of the photo-tagging activity among adolescent photo-taggers by developing a valid and reliable 35-item photo-tagging U&G instrument using three cross-sectional studies (N = 780, 313, 186); Study II examined the cross-cultural validity of the 35-item photo-tagging U&G instrument with Namibian adolescent and young-adult photo-taggers using two crosssectional surveys (N = 358, 393); Study III investigates age and gender differences in the sought photo-tagging U&G by adolescent and young-adult photo-taggers (N = 780, 313, 178); Study IV examines the differences between those adolescents who do and do not untag photos (N = 380); and Study V investigates the different reasons due to which young people avoid photo-tagging by developing a valid and reliable 25-item Avoidance Photo-Tagging Use (APTU) instrument (N = 780, 313, 106). This dissertation reveals the following findings. First, a valid and reliable photo-tagging U&G instrument (35-item) addresses nine U&G of photo-tagging, namely likes and comments, social influence, peer pressure, gains popularity, entertainment, feels good, social sharing, affection, and convenience (Study I). Second, cross-cultural validation ensured that a 23-item phototagging U&G instrument possessed sufficient validity and reliability (Study II). Third, male adolescents sought higher "likes and comments" and "gain popularity" U&G compared to females; age differences among adolescents were absent; and adolescents sought higher U&G than did the young adults (Study III). Fourth, older males, extroverts, those who perceive online information as public, and adolescents with more experience of taking and sharing photos, who spend more time taking photos, who demonstrate strict protection of digital photos, those who are negative towards cloud storage, and those who rarely keep backups, are more likely to untag photos. (Study IV). Fifth, a valid and reliable instrument on avoiding photo-tagging use (25 items) addresses six reasons for avoiding photo-tagging, namely destroy capital, dislike, worry, parental control, embarrassment and personal appearance.
منابع مشابه
Grammar Checker Features in Modern Tamil Natural Language Processing
Generally, The NLP (Tamil) applications are programming with different kinds of input data. Inputs classified into Text, Image, sound waves etc., Tamil Text based applications are creating under the word formation techniques. These words analysis and generation are activating in these ways, i) Untagging & Tagging and ii) Word-level and Character-level accuracies. This method is processing based...
متن کاملPhoto-messaging: Adopter attributes, technology factors and use motives
The purpose of this study was to develop a model of technology diffusion and impression management variables on photo-messaging behavior. Diffusion variables, such as innovativeness and technology clusters, were demonstrated to be predictors of sending photo messages and online sharing. Impression management motives – self-expression and self-presentation – were also indicators of photo-messagi...
متن کاملUser Motives for Tagging Video Content
User tagging of video content provides many possibilities for indexing and personalization. To exploit these possibilities, users must be willing to tag the video content they watch. In this paper we present the first results of our ongoing research, by constructing an overview of user motives to tag video content. We present the results of a study in which we elicited possible user motives to ...
متن کاملUnderpinnings of Digital-photo interaction in Computer-mediated platforms
Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Aqdas Amin Malik Name of the doctoral dissertation Underpinnings of Digital-photo interaction in Computer-mediated platforms Publisher School of Science Unit Deaprtment of Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 106/2016 Field of research Human–Computer Interaction (HCI) Manuscript su...
متن کاملUntagging Tor: A Formal Treatment of Onion Encryption
Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of obscuring exactly who is talking to whom, even to adversaries controlling part of the network. Tor relies heavily on cryptographic techniques, yet its onion encryption scheme is susceptible to taggi...
متن کامل