SlideShare a Scribd company logo
1 of 18
Contents

Introduction               1

1. Presentation and critical evaluation of the research       3

1.1. Literature Review         3

1.2 Methodology issues and validity of the study          5

1.3 The ethical implications of the study     13

2. Conclusion




                                                                  1
A Critical review and theoretical framework of “Presentation on Self on the
Web: an ethnographic study of teenage girls’ weblogs” by Denise Sevick Bortree




Introduction

        The aim of this study is to examine the research “Presentation on Self on the

Web: an ethnographic study of teenage girls’ weblogs”. Denise Sevick Bortree reports

a three-month (October to December 2003) ethnographic study of teenage girls’

weblogs focused on the way they use weblogs for interpersonal and mass

communication and the dangers or challenges teenage girls being involved in their

communication with a broader audience. However, the research question remains

unclear as Bortree refers at the beginning “This study examines two aspects of teens

girls’ blog use: (1) challenges and hazards of conducting interpersonal

communication in a mass medium, and (2) self-presentation strategies used to

negotiate a dual audience (p.25)”, while later she specifies her interest only in how

teen girls use weblogs in relation to their friends and in a broader audience: “My

specific interest in conducting this study was discovering the ways teenage girls use

blogging as a tool for self-expression, both for interpersonal communication ( to

friends) and mass communication (to a broader audience of teenagers)” p.28

           This assignment will discuss the methodology followed by the researcher.

Bortree refers that she used the ethnographic method and founded her research on a

variety of surveys regarding the strategies individuals use in order to present

themselves in the real world and in the internet. Observing the content and the design

of teen’s weblogs, Bortree chooses the snowball sampling method and focuses her

research mainly on girls’ blogs. Then, she conducts a series of 13 in-depth interviews




                                                                                    2
with teen teens’ bloggers not participating in the study and continues into the final

step of the research, the analysis.

            During her study, Bortree sheds light on some interesting aspects of the

research problem, on the way teens girls use blogging as a means of dual

communication and the risks in which are involved. Teenagers use blogging by

showing a particular intimacy to their friends as a way of maintaining their

friendships; this also acts as a kind of diary where girls exchange their experiences

freely. However, in their interviews the girls maintained that when communicating

with a larger group of people they try to ‘look different’ because they want to be liked

by others. In the analysis of her research’s data, Bortree used the grounded theory and

tried to give explanations based on other’s findings. However, during her study,

issues concerning the validity of the methodology, as well as ethical issues are

derived.




                                                                                      3
1. Presentation and critical evaluation of the research



1.1. Literature Review

              Bortree attempts to examine the perils and difficulties in the use of a

contemporary mass medium such as internet when teen girls try to conduct

interpersonal communication. She also tries to examine the self-presentation strategies

employed by present-day teenage girls in their attempt to address what Bortree

describes as the ‘dual audience’ and, hence, the dual communicative goal of these

weblogs. Bortree specifies the dual communicative goal of blogging; from one side,

this is “to build and maintain relationships with friends” (the first part of the blog’s

audience), while at the same time “appealing to a larger group of teenage

acquaintances who may be reading the same blog” (Bortree 2005:25). She builds her

study on the findings of earlier researches related to the motivations and the self

strategies the individuals use in their social interaction, shedding in this way a light in

the insights of the research.

         Bortree in her study about the self presentation strategies teenage girls use in

blogs, relies upon a variety of previous surveys’ findings, old and new, relating to the

self- presentation strategies individuals use not only in the internet but also in their

daily life. The explicit reference to other surveys, some older and other new, which

are closely related to the Bortree’s study, gives the reader the theoretical ‘scaffold’,

necessary to negotiate with the whole study while, at the same time, gives the study a

sense of authority (Brown & Dowling 1998). In particular, Bortree draws upon

Goffman’s (1959) description of individuals’ performance in any communicative



                                                                                         4
event and their use of self-presentation strategies during their communication.

According to Gofmann, communication is a way of expressing the individual’s

identity. Bortree refers also to Baumeister and Jones who associated the self-

presentation with the pleasure of others.

         Bortree reinforces further her research by referring to previous investigations

on teenagers’ weblogs and the strategies they use when presenting themselves. The

500 websites assessed by Dominick (1999) confirmed some strategies individuals use

in their online communication. The Ingratiation (aiming at being liked by others), the

Competence (i.e. self-promotion as skilful), the Intimidation (i.e. anger as a

demonstration of power), the Exemplification (i.e. as a proof of morality) and the

Supplication (i.e. “appearing helpless so that others will come to your aid” (Dominick

1999) influence on the nature of individuals’ performance. Another research found

that the most common strategy the individuals use is the ingratiation (Jones 1990). In

addition, in their communication, users use a specific language in order to make close

friendships (McKenna 2002). In this vein, adolescents express themselves in a way

that would allow them to become acceptable by a group of people (Shilstein 2001).

Stern (1999) also discerned three kinds of characters: the ‘spirited’ (aiming at the self

glorification and self description), the ‘somber’ (the internet as a shelter of the social

convention) and the ‘self-conscious (with a sense of self- restrain)’.

               Based on the above findings of presentation strategies, Bortree also

distinguishes in her research three strategies teen girls use to present themselves.

These are the ingratiation, the competence and the supplication. Teen girls showed

ingratiation to some persons by listing their names on their blogs, by exposing their

experiences with them, or by calling them with their names. Some times girls in order

to draw the interest of others, reveal negative aspects of themselves (supplication).



                                                                                        5
Other times, they tried to show a social face to other people by adding in their webs

links of their friends or of people that met online; or just by allowing to receive a lot

of comments. In this communication with friends and a broader audience, teen girls

tried to keep a balance; from the one side, to be believable from their friends and from

the other side to impress the people who meet online.



1.2 Methodology issues and validity of the study

            The concepts of validity have been central to defining ‘objectivity’ and

‘rigorousness’ in social science research. As Punch writes (2005:45), validity may

refer to the accuracy of research data, the overall validity of the research, to whether

the research design reflects the reality, and finally the generalizability of the study’s

findings.

            Bortree conducted an online research and used the ethnographic method in

order to explain how teenage girls use blogging as a creative medium for interpersonal

and mass communication, and the risks hidden in the use of blogging, as well as the

self-presentation strategies the teenage girls use. “The development of this

understanding involves the immersion of the researcher in the practices in the

empirical setting and sustained interaction with participants. The predominant means

of collecting data is through highly detailed observation” (Brown & Dowling 1998:

43). In this respect, ethnographers select their data through observation, interviews

and conversations and examine the facts in the ‘environment’ in which they are taking

place, in turn helping them to deepen more into the research (Brown & Dowling

1998). However, Bortree conducts a three-month (October to December 2003) study

including only observation of the weblogs’ content and graphics that teenage girls




                                                                                       6
used. In addition, this time is too short for someone to be engaged in this ‘community

of teens’ and makes ‘valid’ assumptions about the way teen girls use blogging.

       Bortree used the non-probability sampling method and more specifically the

snowball sampling method since, because of the shifting character of the blogs, it was

difficult for her to select her sampling. So, in turn, she decided to select her

participants observing the links included in teens’ websites and which formed other

subgroups of friendships. She observed and selected 40 sites (29 females and 11

males, aged 16-18) that appeared to form a wide friendship group in which a variety

of smaller friendship subgroups was constructed. Then she concentrated on 6 sites.

Although the snowball sampling undermines the validity of the sample, it was the

appropriate method for Bortree’s research: “While this approach severely restricts the

generalizability of the findings, considering the qualitative nature of this study, the

goal is not to generalize but rather to explore more deeply the nature of this

phenomenon” (Rowan & Huston 1997, p.29).

          However, the criteria Bortree used for selecting and grouping the bloggers-

geographic area, social relations, and age - affect on the validity of the findings.

Bortree selects American teenagers who knew each other, lived in the same area and

attended the same school. However, the definition of groups of friends cannot be

considered a valid indicator given the shifting character of the weblogs. Bortree

explains that frequently, someone’s link who was appeared to be friend was dropped

and substituted by new link.

        Bortree, after finishing the ethnographic study, proceeded in the second stage

of her research by conducting email in-depth interviews.       According to Johnson

(2002) the in depth interviews are used for further investigation of individual’s

experiences and are usually used in conjunction with other methods such as



                                                                                      7
observation or interviews aiming at confirming their assumptions or as a method of

triangulation. In order to carry out the in-depth interviews, Bortree necessitated

finding other participants from the Internet as the teenage girls used for the

ethnographic study did not provide any personal e-mail address. So, she e-mailed

invitations asking 50 girls aged 18 years old whom select from others’ weblogs to

take part in the interview. These girls maintained a weblog at that time and were at the

same age with the girls who were participated in the ethnographic study. The fact that

Bortree did not interview the authors of the blogs she observed in the ethnographic

study, does not help her to ensure her first assumptions about the way teens girls use

blogging, and in turn, does not give validity to her assumptions. In addition, this may

also be the reason of why remained some unanswered questions about the real

motivations of teen’s communication: “More in-depth interviews with teenage

bloggers would give valuable insight into the world of teenage blogging (p38)”.

           However, from these 50 girls to which Bortree sent e mails invitations, the

16 accepted to participate in the interviews and the researcher sent an e-mail with 10

questions: “Of the 50, 16 responded and volunteered to participate in the online

interview process [
]. Of the 16, 13 responded to the e-mail questions”. (p.31).

Bryman (2004) sheds light to other two interesting aspects of the interviewing: the

difficulty for the researcher in internet interviews to establish relations of confidence

and trust with the participants. This is distinct when we read in Bortree’s study: “Of

the 50, 16 responded and volunteered to participate in the online interview process

[
]. Then, Bortree continues that “Of the 16, 13 responded to the e-mail questions.

(p.31)”, which shows the weakness of the internet research where the interviewee is

not in position to know if some questions bother the participants (Bryman 2004). The

above shows additionally the difficulty for the interviewee to establish relations of



                                                                                       8
confidence and trust with the participants. It also shows another one aspect of

‘weakness’ of the e- interviews according to which the interviewee is not in position

to know if some questions bother the participants (Bryman 2004). Finally, a serious

consideration should also be given in the responses of these interviews as email

interviews make less spontaneous the participants’ responses than the face-to-face

interviews, as they give time for consideration. However, using synchronous means of

communication, like face-to-face interviews or in telephone or online (and not by e

mail) which have many of the benefits of the face-to-face interviews as they are ‘real

time’, could help her more to investigate the real motivations of how teens use their

weblogs (Bryman 2004).

         Without doubt, one cannot ignore that interviews, in combination with data-

gathering approaches, may lead to identifying new topics, as well as to exploring,

explaining or clarifying data collected through other methods (Brawn & Dowling

1998). However, two issues here are raised, the issue of “observer bias” and

“observer effects” (Gay & Airasian 2000). In the first case, the researcher as

“participant observer” can be influenced negatively or positively by his/her intimacy

with the participants. On the other hand, acting as a participant, the researcher can

examine closely and comprehend better his/her research, and, additionally, the

participants knowing that they are observed it may influence their responses. Finally,

Bortree does not give us any information about the nature of the questions which does

not help us to assess the validity of this method.

              Silverman (1993: 20-29) highlights the importance of investigating the

language for understanding the meanings in various social contexts. Breaks and

pauses in the speech reflect the inner incentives and the potential fears or suspensions

of the speaker. In this case, the researcher is engaged in a meticulous investigation of



                                                                                      9
talk in order to determine the way the conversation is organized and performed in its

‘natural environment’, as well as the ‘strategies’ which the individuals use in their

social interaction (Ritchie 2000). After the conversation analysis, Bortree could

proceed in the discourse analysis of written texts, where the language is considered

not only as a means of communication, a tool of speech, but also as a means of social

interaction (Wood & Kronger 2000).

             Our attention is being drawn by Bortree’s saying: “I choose this group

because it reflected what appear to me to be a typical group of teenage bloggers-

primarily female (29 female, 11 males) [
] (p 29)”. Another one issue which is

derived here for the internet investigations is that the researcher does not know if the

participants are really what they are registered (Bryman 2004). Bortree refers that she

“[
] e mailed invitations to 50 girls who identified themselves in their blogs as 18

years-old.” (p.31). This in turn can undermine the validity of the research’s findings.

           After conducting some interviews, Bortree proceeds to the analysis of her

research data. This analysis argues the existence of an intrinsic tension in the design

of teenage weblogs between the need for interpersonal communication, i.e. the

sharing of intimate thoughts and the expression of personal conflicts among close

friends on the one hand, and the desire for mass communication with a wider blog

audience in ways that promote a well- accepted self-presentation on the other hand.

To that end, as the study maintains, a number of self-presentation strategies are

employed with various aims and varied results, typically including “ingratiation”,

competence, and supplication. According to Bortree, however, the significance of

weblogs as a communicative medium, lies not so much in that they facilitate

interactive dialogue, but in that they allow the freedom to indulge in a constructive

monologue or in Bortree’s words, “a commentary of sorts, that others may respond to



                                                                                      10
through other forms”(p. 37). Yet, as she reminds us, “the risk of exposure and loss of

privacy(p.38)” in the public domain of the internet remains a constant threat for

teenage bloggers and calls for a balanced use of weblogs as creative tools for teenage

self expression.

          Bortree in her analysis uses the grounded theory. According to Quinn Patton

(2002: 442), the analysis demands “creativity, intellectual discipline, analytical rigor,

and a great deal of work”. Walker et al (2006) coding is the method which is used in

the grounded theory for the analysis of the data. In this respect, the information given

for the analysis method used by Bortree is not sufficient enough to give validity in the

findings of her research. Bortree referred only that “taken together, these findings

from the ethnographic study and the interviews indicated that teens [
]” p.37

          One of the methods that researchers use in order to confirm the validity and

reliability of their research data is the method of triangulation. The method of

triangulation combines and examines the results of the qualitative and quantitave

methods of data collection. It also entails the comparison of different data sources

such as the results of observations with those deriving from interviews. Bortree

compares the results of the observations (some teens used blogging as a ‘diary’

although they knew that their writing could be read by anyone; others were more

‘reticent’), with the results of the email interviews from teen girls who did not take

part in the Bortree’s research but maintained their weblog during the ethnographic

study. Bortree could give validity in her study and may shed light to some obscure

aspects of teens that left her study if she conducted interviews with the same

participants of the ethnographic study; more specifically, online interviews, or by

phone interviews could support Bortree more than the face to face interviews, to

deepen the real motivations of teen girls (Quinn Patton 2002:559 & Bryman 2004). In



                                                                                      11
the e mail interviews individuals response less spontaneously as they have as much

time as they want to think and to hide potential fears or hesitations which they could

not do it easily in the face to face or telephone or even in online (in a chatroom)

interview.

             The credibility of the research depends on the issues reviewed above such

as the variety of sources and research methods used when gathering and interpreting

data, the analysis process the researcher uses, as well as the research experience and

the education that the researcher may have in relation with his/her research (Quinn

Patton 2002). In her study, Bortree attempts to investigate the way in which teenage

girls use blogging, by means of insufficient sources and inadequate variety of research

methods when gathering and interpreting data. Furthermore, analysis methods such as

a discourse analysis or a conversation analysis of the content of the weblogs could be

an alternative approach for Bortree to explain teenagers’ deeper motivations of using

blogging.




                                                                                    12
1.3 The ethical implications of the study



            Undoubtedly, the most significant issue in research ethics is to ensure the

participants’ consent to be involved therein; the researcher must confirm the consent

of the participants from the observation as “collecting information on participants or

observing them without their knowledge or without appropriate permission is not

ethical” (Gay & Airasian 2000:99). The informed consent has to do with the purpose

of the study, the questions which are going to be asked in the interviews, the

researcher’s confidentiality, the way in which the data will be used, the risks the

individuals may be involved (Quinn Patton 2002). However, in this study, Denise

Sevick Bortree begins her research by observing the content and the design of the

teenagers’ weblogs without confirming the consent of participants. The reason is that

she investigates the blogs which are publicly available. She does not reveal names and

other information which would put in danger the participants’ privacy. In the second

stage of her research, the email interviews, Bortree informs the participants about the

purpose of the study.

                Another significant ethical issue that derives from this study is the

anonymity in using the data collected about or from people (Gay & Airasian 2000).

Many strategies have been developed in recent years in order to protect

confidentiality, such as including codes instead of names or giving pseudonyms

(Brown & Dowling 1998). In this study, Bortree in the interviews she conducts and

the on line conversations she refers, does not reveal the real names of the research



                                                                                    13
participants. “To protect the girls’ privacy, direct quotes from their blogs will not be

used in this paper [
].The names are not included I this write-up to protect the girls’

identities.” (p39).




  2. Conclusion

               Firstly, a sort of surveys is mentioned about the behavioral strategies

individuals use in online communities and their real life giving in turn to the research

a sense of validity. Bortree proceeds in her ethnographic study by observing the

content and design of some teenager’s blogs and she distinguished groups of friends.

However, the short period of three months which Bortree used in order to conduct this

ethnographic study does not help her to incorporate into the teens’ world and give

validate explanations of the way they use blogging.

          Bortree in the second stage of her study conducted some in-depth interviews

with teenagers that did not take part in the ethnographic study. The above does not

support her fist assumptions about the dual communication of teen girls. She does not

give any information about the content of the questions so we can not make any

assumption about the validity of that study. However, she maintained the anonymity

of the participants.

       In her analysis, Bortree used the grounded theory but she did not refer to any

specific method (coding) she used to examine her data. Rather she merely concluded

that teenager girls admitted that blogs act as diaries in which they ‘entrust’ thoughts

that they cannot otherwise express under the fear of adults’ intervention. Although the



                                                                                     14
use of blogs as diaries leads to the creation of deeper relations, it is admitted that girls

often try to promote a different image of them when communicating with broader

audiences. Bortree finished the ethnographic study by maintaining that the focus on

the content and design of teenager’s blogs left unanswered some questions about the

real motivations of teenager girls’ blogging.




                                    References



Bortree, D. S. (2005) “Presentation of Self on the Web: an ethnographic study of

teenage girls’ weblogs”. Education, Communication & Information 5(1), pp. 25-39.



Brown, A. & Dowling, P. (1998) Doing Research/Reading Research A Mode of

Interrogation for Education. London: Falmer Press.



Bryman A. (2004) Social research methods. Oxford: Oxford UP



Charles, C. (1995) Introduction to Educational Research (2nd edition). New York:

Longman.



Denzin, N., & Norman, K. (2000) (eds) Handbook of Qualitative Research. London:

Sage Publications.



                                                                                         15
Dominick, J. R. (1999) “Who do you think you are? Personal home pages and self-

presentation on the World Wide Web”. Journalism and Mass Communication

Quarterly 76(4), pp. 646-658.



Gay, L. R. & Airasian, P. (2000) Educational Research: Competencies for Analysis

and Application (6th edition). New Jersey: Prentice-Hall.



Goffman, E. (1959) The Presentation of Self in Everyday Life. New York: Doubleday.



Golding, P. (2000) “Forthcoming features: Information and communications

technologies and the sociology of the future’. Sociology 34(1), pp. 165–184.



Jones, E. E. (1990) Interpersonal Perceptions, New York: Freeman.



Lewis, J. & Ritchie, J. (2003) “Generalizing from qualitative research” in Lewis, J. &

Ritchie, J. (eds) Qualitative Research Practice: A Guide for Social Science Students

and Researchers. London: Sage publications.



Lewis, J. (2003) “Design issues” in Lewis, J. & Ritchie, J. (eds) Qualitative Research

Practice: A Guide for Social Science Students and Researchers. London: Sage

publications.



Mckenna, K.Y.A., Green, A.S. & Gleason, M. E. J. (2002) “Relationship formation

on the Internet: what’s the big attraction?” Journal of Social Issues 58, pp. 9-31.




                                                                                      16
Punch, K. F. (2005) Introduction to Social Research. London: Sage publications.



Quinn, P. M. (2002) Qualitative Research & Evaluation Methods (3rd edition).

London: Sage Publications.



Ritchie, J. (2000) “The applications of qualitative methods to social research” in

Lewis, J. & Ritchie, J. (eds) Qualitative Research Practice: A Guide for Social

Science Students and Researchers. London: Sage publications.



Shilstein, E. S. (2001) “Characteristics of the presentation of self during adolescence”,

Russian Education and Society 43 (6), pp. 35-51.



Silverman D. (1993) Interpreting qualitative data: methods for analysing talk, text

and interaction, London: Sage publications.



Slevin, J. (2000) The Internet and Society, Cambridge: Blackwell.



Spencer, L., Ritchie, J., & O’ Connor, W. (2003) “Analysis: practices, principles and

processes” in Lewis, J. & Ritchie, J. (eds) Qualitative Research Practice: A Guide for

Social Science Students and Researchers. London: Sage publications.



Stern, S. R. (1999) “Adolescent girls’ expression on web home pages: spirited,

somber, and self-conscious sites”, Convergence 5, pp. 22-41.




                                                                                      17
Walker D & Myrick F. (2006) Grounded theory: An exploration of process and

procedure. Qualitative Health Research, 16(4): 547-559



Wood, L. A. & Kronger, R. O. (2000) Doing Discourse Analysis, Methods for

Studying Action in Talk and Text. London: Sage Publication.



Johnson M.J. (2002) In Depth Interviewing. In Gubrium F.J. & Holstein A.J. (eds)

Handbook    of   Interview   research   Context    &     Method.   London:   SAGE

PUBLICATIONS:




                                                                               18

More Related Content

What's hot

So.cl: An interest Network for Informal Learning
So.cl:  An interest Network for Informal LearningSo.cl:  An interest Network for Informal Learning
So.cl: An interest Network for Informal LearningShelly D. Farnham, Ph.D.
 
Polarization on Social Media
Polarization on Social MediaPolarization on Social Media
Polarization on Social MediaCecilie Larsen
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for LinkedinMatthew Darrington
 
Social media
Social mediaSocial media
Social mediaIrfan Cuj
 
Raina_comm151Ipdf
Raina_comm151IpdfRaina_comm151Ipdf
Raina_comm151IpdfAkshara Raina
 
Attachments 2010 11_10
Attachments 2010 11_10Attachments 2010 11_10
Attachments 2010 11_10JoĂŁo Grilo
 
Personality and Social Media Related Jealousy
Personality and Social Media Related JealousyPersonality and Social Media Related Jealousy
Personality and Social Media Related JealousyFelicia Goff
 
INST633_FinalProject
INST633_FinalProjectINST633_FinalProject
INST633_FinalProjectApoorva Ajmani
 
Internet Usage, Personality, Narcissism, and Motivations for Facebook Usage
Internet Usage, Personality, Narcissism, and Motivations for Facebook UsageInternet Usage, Personality, Narcissism, and Motivations for Facebook Usage
Internet Usage, Personality, Narcissism, and Motivations for Facebook UsageDr. Corbin J. Standley
 
Empathy and social media
Empathy and social mediaEmpathy and social media
Empathy and social mediaEstefanDinarte
 
Information gathering strategies in online social networks
Information gathering strategies in online social networksInformation gathering strategies in online social networks
Information gathering strategies in online social networksAlexander Decker
 
Relational Dissolution Poster
Relational Dissolution PosterRelational Dissolution Poster
Relational Dissolution PosterKarla Ponciano
 
SocialMediaandPoliticalExpressionRoderickandPryde
SocialMediaandPoliticalExpressionRoderickandPrydeSocialMediaandPoliticalExpressionRoderickandPryde
SocialMediaandPoliticalExpressionRoderickandPrydeEmma Roderick
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paperSpeight1103
 
Sjskkskskskkss
SjskkskskskkssSjskkskskskkss
SjskkskskskkssVerizeyh
 

What's hot (20)

So.cl: An interest Network for Informal Learning
So.cl:  An interest Network for Informal LearningSo.cl:  An interest Network for Informal Learning
So.cl: An interest Network for Informal Learning
 
Polarization on Social Media
Polarization on Social MediaPolarization on Social Media
Polarization on Social Media
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for Linkedin
 
Social media
Social mediaSocial media
Social media
 
Final Research Report
Final Research ReportFinal Research Report
Final Research Report
 
Raina_comm151Ipdf
Raina_comm151IpdfRaina_comm151Ipdf
Raina_comm151Ipdf
 
Attachments 2010 11_10
Attachments 2010 11_10Attachments 2010 11_10
Attachments 2010 11_10
 
Research & Teaching in the Social Media Age
Research & Teaching in the Social Media Age Research & Teaching in the Social Media Age
Research & Teaching in the Social Media Age
 
Personality and Social Media Related Jealousy
Personality and Social Media Related JealousyPersonality and Social Media Related Jealousy
Personality and Social Media Related Jealousy
 
Project_Report
Project_ReportProject_Report
Project_Report
 
INST633_FinalProject
INST633_FinalProjectINST633_FinalProject
INST633_FinalProject
 
Internet Usage, Personality, Narcissism, and Motivations for Facebook Usage
Internet Usage, Personality, Narcissism, and Motivations for Facebook UsageInternet Usage, Personality, Narcissism, and Motivations for Facebook Usage
Internet Usage, Personality, Narcissism, and Motivations for Facebook Usage
 
Brown_Research
Brown_ResearchBrown_Research
Brown_Research
 
Empathy and social media
Empathy and social mediaEmpathy and social media
Empathy and social media
 
Connecting and protecting
Connecting and protectingConnecting and protecting
Connecting and protecting
 
Information gathering strategies in online social networks
Information gathering strategies in online social networksInformation gathering strategies in online social networks
Information gathering strategies in online social networks
 
Relational Dissolution Poster
Relational Dissolution PosterRelational Dissolution Poster
Relational Dissolution Poster
 
SocialMediaandPoliticalExpressionRoderickandPryde
SocialMediaandPoliticalExpressionRoderickandPrydeSocialMediaandPoliticalExpressionRoderickandPryde
SocialMediaandPoliticalExpressionRoderickandPryde
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paper
 
Sjskkskskskkss
SjskkskskskkssSjskkskskskkss
Sjskkskskskkss
 

Viewers also liked

Creative Interactive Browser Visualizations with Bokeh by Bryan Van de ven
Creative Interactive Browser Visualizations with Bokeh by Bryan Van de venCreative Interactive Browser Visualizations with Bokeh by Bryan Van de ven
Creative Interactive Browser Visualizations with Bokeh by Bryan Van de venPyData
 
Life after Matplotlib: Harder, Better, Faster, Stronger by Kayla Lacovino
Life after Matplotlib: Harder, Better, Faster, Stronger by Kayla LacovinoLife after Matplotlib: Harder, Better, Faster, Stronger by Kayla Lacovino
Life after Matplotlib: Harder, Better, Faster, Stronger by Kayla LacovinoPyData
 
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...PyData
 
Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)
Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)
Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)Lynn Cherny
 
Mac sicherungskopie software
Mac sicherungskopie softwareMac sicherungskopie software
Mac sicherungskopie softwaresophialouis
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 

Viewers also liked (7)

Creative Interactive Browser Visualizations with Bokeh by Bryan Van de ven
Creative Interactive Browser Visualizations with Bokeh by Bryan Van de venCreative Interactive Browser Visualizations with Bokeh by Bryan Van de ven
Creative Interactive Browser Visualizations with Bokeh by Bryan Van de ven
 
Life after Matplotlib: Harder, Better, Faster, Stronger by Kayla Lacovino
Life after Matplotlib: Harder, Better, Faster, Stronger by Kayla LacovinoLife after Matplotlib: Harder, Better, Faster, Stronger by Kayla Lacovino
Life after Matplotlib: Harder, Better, Faster, Stronger by Kayla Lacovino
 
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
 
Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)
Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)
Bestseller Analysis: Visualization Fiction (for PyData Boston 2013)
 
Pozicka do 24 hodin
Pozicka do 24 hodinPozicka do 24 hodin
Pozicka do 24 hodin
 
Mac sicherungskopie software
Mac sicherungskopie softwareMac sicherungskopie software
Mac sicherungskopie software
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 

Similar to Attachments 2012 03_8

[Report] What`s up on Facebook
[Report] What`s up on Facebook[Report] What`s up on Facebook
[Report] What`s up on FacebookSocial Samosa
 
Bachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA VersionBachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA VersionN. Hayden Winther
 
A Study on Gender Differential Factors in Uses of Social Networking Sites
	A Study on Gender Differential Factors in Uses of Social Networking Sites	A Study on Gender Differential Factors in Uses of Social Networking Sites
A Study on Gender Differential Factors in Uses of Social Networking Sitesinventionjournals
 
Design for future technologies
Design for future technologiesDesign for future technologies
Design for future technologiesMelissa Tang
 
Social Presence, Identity and Online Learning
Social Presence, Identity and Online LearningSocial Presence, Identity and Online Learning
Social Presence, Identity and Online LearningPatrick Lowenthal
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullyingdelmount
 
Book Critique of Girl Wide Web
Book Critique of Girl Wide WebBook Critique of Girl Wide Web
Book Critique of Girl Wide Webguest3d8614
 
SMART WRITING SERVICES Get The Best And Affordable Writers
SMART WRITING SERVICES  Get The Best And Affordable WritersSMART WRITING SERVICES  Get The Best And Affordable Writers
SMART WRITING SERVICES Get The Best And Affordable WritersValerie Burroughs
 
How do adolescents perceive the participatory potential of the Internet?
How do adolescents perceive the participatory potential of the Internet?How do adolescents perceive the participatory potential of the Internet?
How do adolescents perceive the participatory potential of the Internet?Maria Ranieri
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingNeville Wiles
 
A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...
A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...
A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...ijtsrd
 
ConsumerBehaviorFinalProject
ConsumerBehaviorFinalProjectConsumerBehaviorFinalProject
ConsumerBehaviorFinalProjectDonna Moulton
 
The Impact Of Social Identity On Education
The Impact Of Social Identity On EducationThe Impact Of Social Identity On Education
The Impact Of Social Identity On EducationLindsey Campbell
 
Running head WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docx
Running head  WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docxRunning head  WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docx
Running head WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docxjoellemurphey
 
Scholars imagined audiences
Scholars imagined audiencesScholars imagined audiences
Scholars imagined audiencesGeorge Veletsianos
 
Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...NAAR Journal
 
Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...Leung Man Yin Daniel
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 

Similar to Attachments 2012 03_8 (20)

[Report] What`s up on Facebook
[Report] What`s up on Facebook[Report] What`s up on Facebook
[Report] What`s up on Facebook
 
Bachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA VersionBachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA Version
 
A Study on Gender Differential Factors in Uses of Social Networking Sites
	A Study on Gender Differential Factors in Uses of Social Networking Sites	A Study on Gender Differential Factors in Uses of Social Networking Sites
A Study on Gender Differential Factors in Uses of Social Networking Sites
 
RP2 PSY390
RP2 PSY390RP2 PSY390
RP2 PSY390
 
Design for future technologies
Design for future technologiesDesign for future technologies
Design for future technologies
 
Social Presence, Identity and Online Learning
Social Presence, Identity and Online LearningSocial Presence, Identity and Online Learning
Social Presence, Identity and Online Learning
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullying
 
Cyber 2009
Cyber 2009Cyber 2009
Cyber 2009
 
Book Critique of Girl Wide Web
Book Critique of Girl Wide WebBook Critique of Girl Wide Web
Book Critique of Girl Wide Web
 
SMART WRITING SERVICES Get The Best And Affordable Writers
SMART WRITING SERVICES  Get The Best And Affordable WritersSMART WRITING SERVICES  Get The Best And Affordable Writers
SMART WRITING SERVICES Get The Best And Affordable Writers
 
How do adolescents perceive the participatory potential of the Internet?
How do adolescents perceive the participatory potential of the Internet?How do adolescents perceive the participatory potential of the Internet?
How do adolescents perceive the participatory potential of the Internet?
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social Networking
 
A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...
A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...
A Study on Effects and Cultural Impacts of Social Networking Sites Among Stud...
 
ConsumerBehaviorFinalProject
ConsumerBehaviorFinalProjectConsumerBehaviorFinalProject
ConsumerBehaviorFinalProject
 
The Impact Of Social Identity On Education
The Impact Of Social Identity On EducationThe Impact Of Social Identity On Education
The Impact Of Social Identity On Education
 
Running head WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docx
Running head  WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docxRunning head  WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docx
Running head WHY FACEBOOK MIGHT NOT BE GOOD FOR YOU1WHY FACEB.docx
 
Scholars imagined audiences
Scholars imagined audiencesScholars imagined audiences
Scholars imagined audiences
 
Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...
 
Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂź Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 

Attachments 2012 03_8

  • 1. Contents Introduction 1 1. Presentation and critical evaluation of the research 3 1.1. Literature Review 3 1.2 Methodology issues and validity of the study 5 1.3 The ethical implications of the study 13 2. Conclusion 1
  • 2. A Critical review and theoretical framework of “Presentation on Self on the Web: an ethnographic study of teenage girls’ weblogs” by Denise Sevick Bortree Introduction The aim of this study is to examine the research “Presentation on Self on the Web: an ethnographic study of teenage girls’ weblogs”. Denise Sevick Bortree reports a three-month (October to December 2003) ethnographic study of teenage girls’ weblogs focused on the way they use weblogs for interpersonal and mass communication and the dangers or challenges teenage girls being involved in their communication with a broader audience. However, the research question remains unclear as Bortree refers at the beginning “This study examines two aspects of teens girls’ blog use: (1) challenges and hazards of conducting interpersonal communication in a mass medium, and (2) self-presentation strategies used to negotiate a dual audience (p.25)”, while later she specifies her interest only in how teen girls use weblogs in relation to their friends and in a broader audience: “My specific interest in conducting this study was discovering the ways teenage girls use blogging as a tool for self-expression, both for interpersonal communication ( to friends) and mass communication (to a broader audience of teenagers)” p.28 This assignment will discuss the methodology followed by the researcher. Bortree refers that she used the ethnographic method and founded her research on a variety of surveys regarding the strategies individuals use in order to present themselves in the real world and in the internet. Observing the content and the design of teen’s weblogs, Bortree chooses the snowball sampling method and focuses her research mainly on girls’ blogs. Then, she conducts a series of 13 in-depth interviews 2
  • 3. with teen teens’ bloggers not participating in the study and continues into the final step of the research, the analysis. During her study, Bortree sheds light on some interesting aspects of the research problem, on the way teens girls use blogging as a means of dual communication and the risks in which are involved. Teenagers use blogging by showing a particular intimacy to their friends as a way of maintaining their friendships; this also acts as a kind of diary where girls exchange their experiences freely. However, in their interviews the girls maintained that when communicating with a larger group of people they try to ‘look different’ because they want to be liked by others. In the analysis of her research’s data, Bortree used the grounded theory and tried to give explanations based on other’s findings. However, during her study, issues concerning the validity of the methodology, as well as ethical issues are derived. 3
  • 4. 1. Presentation and critical evaluation of the research 1.1. Literature Review Bortree attempts to examine the perils and difficulties in the use of a contemporary mass medium such as internet when teen girls try to conduct interpersonal communication. She also tries to examine the self-presentation strategies employed by present-day teenage girls in their attempt to address what Bortree describes as the ‘dual audience’ and, hence, the dual communicative goal of these weblogs. Bortree specifies the dual communicative goal of blogging; from one side, this is “to build and maintain relationships with friends” (the first part of the blog’s audience), while at the same time “appealing to a larger group of teenage acquaintances who may be reading the same blog” (Bortree 2005:25). She builds her study on the findings of earlier researches related to the motivations and the self strategies the individuals use in their social interaction, shedding in this way a light in the insights of the research. Bortree in her study about the self presentation strategies teenage girls use in blogs, relies upon a variety of previous surveys’ findings, old and new, relating to the self- presentation strategies individuals use not only in the internet but also in their daily life. The explicit reference to other surveys, some older and other new, which are closely related to the Bortree’s study, gives the reader the theoretical ‘scaffold’, necessary to negotiate with the whole study while, at the same time, gives the study a sense of authority (Brown & Dowling 1998). In particular, Bortree draws upon Goffman’s (1959) description of individuals’ performance in any communicative 4
  • 5. event and their use of self-presentation strategies during their communication. According to Gofmann, communication is a way of expressing the individual’s identity. Bortree refers also to Baumeister and Jones who associated the self- presentation with the pleasure of others. Bortree reinforces further her research by referring to previous investigations on teenagers’ weblogs and the strategies they use when presenting themselves. The 500 websites assessed by Dominick (1999) confirmed some strategies individuals use in their online communication. The Ingratiation (aiming at being liked by others), the Competence (i.e. self-promotion as skilful), the Intimidation (i.e. anger as a demonstration of power), the Exemplification (i.e. as a proof of morality) and the Supplication (i.e. “appearing helpless so that others will come to your aid” (Dominick 1999) influence on the nature of individuals’ performance. Another research found that the most common strategy the individuals use is the ingratiation (Jones 1990). In addition, in their communication, users use a specific language in order to make close friendships (McKenna 2002). In this vein, adolescents express themselves in a way that would allow them to become acceptable by a group of people (Shilstein 2001). Stern (1999) also discerned three kinds of characters: the ‘spirited’ (aiming at the self glorification and self description), the ‘somber’ (the internet as a shelter of the social convention) and the ‘self-conscious (with a sense of self- restrain)’. Based on the above findings of presentation strategies, Bortree also distinguishes in her research three strategies teen girls use to present themselves. These are the ingratiation, the competence and the supplication. Teen girls showed ingratiation to some persons by listing their names on their blogs, by exposing their experiences with them, or by calling them with their names. Some times girls in order to draw the interest of others, reveal negative aspects of themselves (supplication). 5
  • 6. Other times, they tried to show a social face to other people by adding in their webs links of their friends or of people that met online; or just by allowing to receive a lot of comments. In this communication with friends and a broader audience, teen girls tried to keep a balance; from the one side, to be believable from their friends and from the other side to impress the people who meet online. 1.2 Methodology issues and validity of the study The concepts of validity have been central to defining ‘objectivity’ and ‘rigorousness’ in social science research. As Punch writes (2005:45), validity may refer to the accuracy of research data, the overall validity of the research, to whether the research design reflects the reality, and finally the generalizability of the study’s findings. Bortree conducted an online research and used the ethnographic method in order to explain how teenage girls use blogging as a creative medium for interpersonal and mass communication, and the risks hidden in the use of blogging, as well as the self-presentation strategies the teenage girls use. “The development of this understanding involves the immersion of the researcher in the practices in the empirical setting and sustained interaction with participants. The predominant means of collecting data is through highly detailed observation” (Brown & Dowling 1998: 43). In this respect, ethnographers select their data through observation, interviews and conversations and examine the facts in the ‘environment’ in which they are taking place, in turn helping them to deepen more into the research (Brown & Dowling 1998). However, Bortree conducts a three-month (October to December 2003) study including only observation of the weblogs’ content and graphics that teenage girls 6
  • 7. used. In addition, this time is too short for someone to be engaged in this ‘community of teens’ and makes ‘valid’ assumptions about the way teen girls use blogging. Bortree used the non-probability sampling method and more specifically the snowball sampling method since, because of the shifting character of the blogs, it was difficult for her to select her sampling. So, in turn, she decided to select her participants observing the links included in teens’ websites and which formed other subgroups of friendships. She observed and selected 40 sites (29 females and 11 males, aged 16-18) that appeared to form a wide friendship group in which a variety of smaller friendship subgroups was constructed. Then she concentrated on 6 sites. Although the snowball sampling undermines the validity of the sample, it was the appropriate method for Bortree’s research: “While this approach severely restricts the generalizability of the findings, considering the qualitative nature of this study, the goal is not to generalize but rather to explore more deeply the nature of this phenomenon” (Rowan & Huston 1997, p.29). However, the criteria Bortree used for selecting and grouping the bloggers- geographic area, social relations, and age - affect on the validity of the findings. Bortree selects American teenagers who knew each other, lived in the same area and attended the same school. However, the definition of groups of friends cannot be considered a valid indicator given the shifting character of the weblogs. Bortree explains that frequently, someone’s link who was appeared to be friend was dropped and substituted by new link. Bortree, after finishing the ethnographic study, proceeded in the second stage of her research by conducting email in-depth interviews. According to Johnson (2002) the in depth interviews are used for further investigation of individual’s experiences and are usually used in conjunction with other methods such as 7
  • 8. observation or interviews aiming at confirming their assumptions or as a method of triangulation. In order to carry out the in-depth interviews, Bortree necessitated finding other participants from the Internet as the teenage girls used for the ethnographic study did not provide any personal e-mail address. So, she e-mailed invitations asking 50 girls aged 18 years old whom select from others’ weblogs to take part in the interview. These girls maintained a weblog at that time and were at the same age with the girls who were participated in the ethnographic study. The fact that Bortree did not interview the authors of the blogs she observed in the ethnographic study, does not help her to ensure her first assumptions about the way teens girls use blogging, and in turn, does not give validity to her assumptions. In addition, this may also be the reason of why remained some unanswered questions about the real motivations of teen’s communication: “More in-depth interviews with teenage bloggers would give valuable insight into the world of teenage blogging (p38)”. However, from these 50 girls to which Bortree sent e mails invitations, the 16 accepted to participate in the interviews and the researcher sent an e-mail with 10 questions: “Of the 50, 16 responded and volunteered to participate in the online interview process [
]. Of the 16, 13 responded to the e-mail questions”. (p.31). Bryman (2004) sheds light to other two interesting aspects of the interviewing: the difficulty for the researcher in internet interviews to establish relations of confidence and trust with the participants. This is distinct when we read in Bortree’s study: “Of the 50, 16 responded and volunteered to participate in the online interview process [
]. Then, Bortree continues that “Of the 16, 13 responded to the e-mail questions. (p.31)”, which shows the weakness of the internet research where the interviewee is not in position to know if some questions bother the participants (Bryman 2004). The above shows additionally the difficulty for the interviewee to establish relations of 8
  • 9. confidence and trust with the participants. It also shows another one aspect of ‘weakness’ of the e- interviews according to which the interviewee is not in position to know if some questions bother the participants (Bryman 2004). Finally, a serious consideration should also be given in the responses of these interviews as email interviews make less spontaneous the participants’ responses than the face-to-face interviews, as they give time for consideration. However, using synchronous means of communication, like face-to-face interviews or in telephone or online (and not by e mail) which have many of the benefits of the face-to-face interviews as they are ‘real time’, could help her more to investigate the real motivations of how teens use their weblogs (Bryman 2004). Without doubt, one cannot ignore that interviews, in combination with data- gathering approaches, may lead to identifying new topics, as well as to exploring, explaining or clarifying data collected through other methods (Brawn & Dowling 1998). However, two issues here are raised, the issue of “observer bias” and “observer effects” (Gay & Airasian 2000). In the first case, the researcher as “participant observer” can be influenced negatively or positively by his/her intimacy with the participants. On the other hand, acting as a participant, the researcher can examine closely and comprehend better his/her research, and, additionally, the participants knowing that they are observed it may influence their responses. Finally, Bortree does not give us any information about the nature of the questions which does not help us to assess the validity of this method. Silverman (1993: 20-29) highlights the importance of investigating the language for understanding the meanings in various social contexts. Breaks and pauses in the speech reflect the inner incentives and the potential fears or suspensions of the speaker. In this case, the researcher is engaged in a meticulous investigation of 9
  • 10. talk in order to determine the way the conversation is organized and performed in its ‘natural environment’, as well as the ‘strategies’ which the individuals use in their social interaction (Ritchie 2000). After the conversation analysis, Bortree could proceed in the discourse analysis of written texts, where the language is considered not only as a means of communication, a tool of speech, but also as a means of social interaction (Wood & Kronger 2000). Our attention is being drawn by Bortree’s saying: “I choose this group because it reflected what appear to me to be a typical group of teenage bloggers- primarily female (29 female, 11 males) [
] (p 29)”. Another one issue which is derived here for the internet investigations is that the researcher does not know if the participants are really what they are registered (Bryman 2004). Bortree refers that she “[
] e mailed invitations to 50 girls who identified themselves in their blogs as 18 years-old.” (p.31). This in turn can undermine the validity of the research’s findings. After conducting some interviews, Bortree proceeds to the analysis of her research data. This analysis argues the existence of an intrinsic tension in the design of teenage weblogs between the need for interpersonal communication, i.e. the sharing of intimate thoughts and the expression of personal conflicts among close friends on the one hand, and the desire for mass communication with a wider blog audience in ways that promote a well- accepted self-presentation on the other hand. To that end, as the study maintains, a number of self-presentation strategies are employed with various aims and varied results, typically including “ingratiation”, competence, and supplication. According to Bortree, however, the significance of weblogs as a communicative medium, lies not so much in that they facilitate interactive dialogue, but in that they allow the freedom to indulge in a constructive monologue or in Bortree’s words, “a commentary of sorts, that others may respond to 10
  • 11. through other forms”(p. 37). Yet, as she reminds us, “the risk of exposure and loss of privacy(p.38)” in the public domain of the internet remains a constant threat for teenage bloggers and calls for a balanced use of weblogs as creative tools for teenage self expression. Bortree in her analysis uses the grounded theory. According to Quinn Patton (2002: 442), the analysis demands “creativity, intellectual discipline, analytical rigor, and a great deal of work”. Walker et al (2006) coding is the method which is used in the grounded theory for the analysis of the data. In this respect, the information given for the analysis method used by Bortree is not sufficient enough to give validity in the findings of her research. Bortree referred only that “taken together, these findings from the ethnographic study and the interviews indicated that teens [
]” p.37 One of the methods that researchers use in order to confirm the validity and reliability of their research data is the method of triangulation. The method of triangulation combines and examines the results of the qualitative and quantitave methods of data collection. It also entails the comparison of different data sources such as the results of observations with those deriving from interviews. Bortree compares the results of the observations (some teens used blogging as a ‘diary’ although they knew that their writing could be read by anyone; others were more ‘reticent’), with the results of the email interviews from teen girls who did not take part in the Bortree’s research but maintained their weblog during the ethnographic study. Bortree could give validity in her study and may shed light to some obscure aspects of teens that left her study if she conducted interviews with the same participants of the ethnographic study; more specifically, online interviews, or by phone interviews could support Bortree more than the face to face interviews, to deepen the real motivations of teen girls (Quinn Patton 2002:559 & Bryman 2004). In 11
  • 12. the e mail interviews individuals response less spontaneously as they have as much time as they want to think and to hide potential fears or hesitations which they could not do it easily in the face to face or telephone or even in online (in a chatroom) interview. The credibility of the research depends on the issues reviewed above such as the variety of sources and research methods used when gathering and interpreting data, the analysis process the researcher uses, as well as the research experience and the education that the researcher may have in relation with his/her research (Quinn Patton 2002). In her study, Bortree attempts to investigate the way in which teenage girls use blogging, by means of insufficient sources and inadequate variety of research methods when gathering and interpreting data. Furthermore, analysis methods such as a discourse analysis or a conversation analysis of the content of the weblogs could be an alternative approach for Bortree to explain teenagers’ deeper motivations of using blogging. 12
  • 13. 1.3 The ethical implications of the study Undoubtedly, the most significant issue in research ethics is to ensure the participants’ consent to be involved therein; the researcher must confirm the consent of the participants from the observation as “collecting information on participants or observing them without their knowledge or without appropriate permission is not ethical” (Gay & Airasian 2000:99). The informed consent has to do with the purpose of the study, the questions which are going to be asked in the interviews, the researcher’s confidentiality, the way in which the data will be used, the risks the individuals may be involved (Quinn Patton 2002). However, in this study, Denise Sevick Bortree begins her research by observing the content and the design of the teenagers’ weblogs without confirming the consent of participants. The reason is that she investigates the blogs which are publicly available. She does not reveal names and other information which would put in danger the participants’ privacy. In the second stage of her research, the email interviews, Bortree informs the participants about the purpose of the study. Another significant ethical issue that derives from this study is the anonymity in using the data collected about or from people (Gay & Airasian 2000). Many strategies have been developed in recent years in order to protect confidentiality, such as including codes instead of names or giving pseudonyms (Brown & Dowling 1998). In this study, Bortree in the interviews she conducts and the on line conversations she refers, does not reveal the real names of the research 13
  • 14. participants. “To protect the girls’ privacy, direct quotes from their blogs will not be used in this paper [
].The names are not included I this write-up to protect the girls’ identities.” (p39). 2. Conclusion Firstly, a sort of surveys is mentioned about the behavioral strategies individuals use in online communities and their real life giving in turn to the research a sense of validity. Bortree proceeds in her ethnographic study by observing the content and design of some teenager’s blogs and she distinguished groups of friends. However, the short period of three months which Bortree used in order to conduct this ethnographic study does not help her to incorporate into the teens’ world and give validate explanations of the way they use blogging. Bortree in the second stage of her study conducted some in-depth interviews with teenagers that did not take part in the ethnographic study. The above does not support her fist assumptions about the dual communication of teen girls. She does not give any information about the content of the questions so we can not make any assumption about the validity of that study. However, she maintained the anonymity of the participants. In her analysis, Bortree used the grounded theory but she did not refer to any specific method (coding) she used to examine her data. Rather she merely concluded that teenager girls admitted that blogs act as diaries in which they ‘entrust’ thoughts that they cannot otherwise express under the fear of adults’ intervention. Although the 14
  • 15. use of blogs as diaries leads to the creation of deeper relations, it is admitted that girls often try to promote a different image of them when communicating with broader audiences. Bortree finished the ethnographic study by maintaining that the focus on the content and design of teenager’s blogs left unanswered some questions about the real motivations of teenager girls’ blogging. References Bortree, D. S. (2005) “Presentation of Self on the Web: an ethnographic study of teenage girls’ weblogs”. Education, Communication & Information 5(1), pp. 25-39. Brown, A. & Dowling, P. (1998) Doing Research/Reading Research A Mode of Interrogation for Education. London: Falmer Press. Bryman A. (2004) Social research methods. Oxford: Oxford UP Charles, C. (1995) Introduction to Educational Research (2nd edition). New York: Longman. Denzin, N., & Norman, K. (2000) (eds) Handbook of Qualitative Research. London: Sage Publications. 15
  • 16. Dominick, J. R. (1999) “Who do you think you are? Personal home pages and self- presentation on the World Wide Web”. Journalism and Mass Communication Quarterly 76(4), pp. 646-658. Gay, L. R. & Airasian, P. (2000) Educational Research: Competencies for Analysis and Application (6th edition). New Jersey: Prentice-Hall. Goffman, E. (1959) The Presentation of Self in Everyday Life. New York: Doubleday. Golding, P. (2000) “Forthcoming features: Information and communications technologies and the sociology of the future’. Sociology 34(1), pp. 165–184. Jones, E. E. (1990) Interpersonal Perceptions, New York: Freeman. Lewis, J. & Ritchie, J. (2003) “Generalizing from qualitative research” in Lewis, J. & Ritchie, J. (eds) Qualitative Research Practice: A Guide for Social Science Students and Researchers. London: Sage publications. Lewis, J. (2003) “Design issues” in Lewis, J. & Ritchie, J. (eds) Qualitative Research Practice: A Guide for Social Science Students and Researchers. London: Sage publications. Mckenna, K.Y.A., Green, A.S. & Gleason, M. E. J. (2002) “Relationship formation on the Internet: what’s the big attraction?” Journal of Social Issues 58, pp. 9-31. 16
  • 17. Punch, K. F. (2005) Introduction to Social Research. London: Sage publications. Quinn, P. M. (2002) Qualitative Research & Evaluation Methods (3rd edition). London: Sage Publications. Ritchie, J. (2000) “The applications of qualitative methods to social research” in Lewis, J. & Ritchie, J. (eds) Qualitative Research Practice: A Guide for Social Science Students and Researchers. London: Sage publications. Shilstein, E. S. (2001) “Characteristics of the presentation of self during adolescence”, Russian Education and Society 43 (6), pp. 35-51. Silverman D. (1993) Interpreting qualitative data: methods for analysing talk, text and interaction, London: Sage publications. Slevin, J. (2000) The Internet and Society, Cambridge: Blackwell. Spencer, L., Ritchie, J., & O’ Connor, W. (2003) “Analysis: practices, principles and processes” in Lewis, J. & Ritchie, J. (eds) Qualitative Research Practice: A Guide for Social Science Students and Researchers. London: Sage publications. Stern, S. R. (1999) “Adolescent girls’ expression on web home pages: spirited, somber, and self-conscious sites”, Convergence 5, pp. 22-41. 17
  • 18. Walker D & Myrick F. (2006) Grounded theory: An exploration of process and procedure. Qualitative Health Research, 16(4): 547-559 Wood, L. A. & Kronger, R. O. (2000) Doing Discourse Analysis, Methods for Studying Action in Talk and Text. London: Sage Publication. Johnson M.J. (2002) In Depth Interviewing. In Gubrium F.J. & Holstein A.J. (eds) Handbook of Interview research Context & Method. London: SAGE PUBLICATIONS: 18