skip to main content
10.1145/2998181.2998222acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article
Public Access

Impression Management in High Context Societies: 'Saving Face' with ICT

Published:25 February 2017Publication History

ABSTRACT

High context societies are defined by their strong interpersonal relationships, where upholding the shared values of the community, writ large, are of the utmost importance. That is, they prioritize collective identity over individual identity. Through a qualitative case study drawing from a set of 90 semi-structured interviews with Iraqi citizens who were living in Iraq during the 2nd Gulf War, we show how through ICT uses and appropriation, people shape, or influence, social complexities within high context societies. We found that people appropriated ICTs in a way such that they could "save face" and manage other people's impressions of themselves and, in turn, maintain a positive collective identity. We then explore the use and appropriation of ICTs for impression management in high context societies as a complex process-one that is both social and technical-introduce the notion of technological imperialism, and develop a model of face saving practices that takes collective identity into account.

References

  1. Norah Abokhodair, Sofiane Abbar, Sarah Vieweg, and Yelena Mejova. 2016. Privacy and Twitter in Qatar: Traditional values in the digital world. ArXiv e-prints.Google ScholarGoogle Scholar
  2. Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf. Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 672--683. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Nadje Al-Ali. 2005. Reconstructing gender: Iraqi women between dictatorship, war, sanctions and occupation. Third World Quarterly 26, 4-5: 739--758.Google ScholarGoogle ScholarCross RefCross Ref
  4. Tamara Alsheikh, Jennifer A Rode, and Siân E Lindley. 2011. (Whose) value-sensitive design: a study of long-distance relationships in an Arabic cultural context. Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, 75--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Shaowen Bardzell. 2010. Feminist HCI: Taking stock and outlining an agenda for design. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1301--1310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Eric P S Baumer, Jenna Burrell, Morgan G Ames, Jed R Brubaker, and Paul Dourish. 2015. On the importance and implications of studying technology non-use. Interactions 22, 2: 52--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Eric P S Baumer and M Silberman. 2011. When the implication is not to design (technology). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2271--2274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ruth Benedict. 1967. The chrysanthemum and the sword: Patterns of Japanese culture. Houghton Mifflin Harcourt.Google ScholarGoogle Scholar
  9. Patrick Biernacki and Dan Waldorf. 1981. Snowball sampling: Problems and techniques of chain referral sampling. Sociological Methods & Research 10, 2: 141--163.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jeremy Birnholtz. 2010. Adopt, adapt, abandon: Understanding why some young adults start, and then stop, using instant messaging. Computers in Human Behavior 26, 6: 1427--1433. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Danah Michele Boyd. 2008. Taken out of context: American teen sociality in networked publics. ProQuest.Google ScholarGoogle Scholar
  12. Manuel Castells. 2011. The rise of the network society: The information age: Economy, society, and culture. John Wiley & Sons.Google ScholarGoogle Scholar
  13. Karen Church and Rodrigo de Oliveira. 2013. What's up with WhatsApp?: Comparing mobile instant messaging behaviors with traditional SMS. Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 352--361. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jill P. Dimond, Erika Shehan Poole, and Sarita Yardi. 2010. The effects of life disruptions on home technology routines. Proceedings of the 16th ACM International Conference on Supporting group work, 85--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T Edward. 1976. Hall, Beyond Culture. New York: Anchor Books 222: 13.Google ScholarGoogle Scholar
  16. Nicole Ellison, Rebecca Heino, and Jennifer Gibbs. 2006. Managing impressions online: Self-presentation processes in the online dating environment. Journal of Computer-Mediated Communication 11, 2: 415--441.Google ScholarGoogle ScholarCross RefCross Ref
  17. Goffman Erving. 1963. Behavior in public places: notes on the social organization of gatherings. New York.Google ScholarGoogle Scholar
  18. Casey Fiesler, Shannon Morrison, and Amy S Bruckman. 2016. An archive of their own: A case study of feminist HCI and values in design. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2574--2585. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Anthony Giddens. 1984. The constitution of society: Outline of the theory of structuration. Univ of California Press.Google ScholarGoogle Scholar
  20. Erving Goffman. 1955. On face-work: An analysis of ritual elements in social interaction. Psychiatry 18, 3: 213--231.Google ScholarGoogle ScholarCross RefCross Ref
  21. Erving Goffman. 2005. Interaction ritual: Essays in face to face behavior. AldineTransaction.Google ScholarGoogle Scholar
  22. Erving Goffman. 2009. Relations in public. Transaction Publishers.Google ScholarGoogle Scholar
  23. Erving Goffman and others. 1959. The Presentation of Self in Everyday Life.Google ScholarGoogle Scholar
  24. Rebecca E Grinter, W Keith Edwards, Mark W Newman, and Nicolas Ducheneaut. 2005. The work to make a home network work. ECSCW 2005, 469--488. Google ScholarGoogle ScholarCross RefCross Ref
  25. Jeffrey T Hancock, Catalina Toma, and Nicole Ellison. 2007. The truth about lying in online dating profiles. Proceedings of the SIGCHI conference on Human factors in computing systems, 449--452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2010. Postcolonial computing: A lens on design and development. Proceedings of the SIGCHI conference on human factors in computing systems, 1311--1320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sanjay Kairam, Mike Brzozowski, David Huffaker, and Ed Chi. 2012. Talking in circles: Selective sharing in Google+. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1065--1074. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it together: Interpersonal management of disclosure in social network services. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3217--3226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Rich Ling and Heather A Horst. 2011. Mobile communication in the global south. New Media & Society: 1461444810393899.Google ScholarGoogle Scholar
  30. Gilad Lotan, Erhardt Graeff, Mike Ananny, Devin Gaffney, Ian Pearce, and Danah Boyd. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication 5: 31. Retrieved from http://ijoc.org/index.php/ijoc/article/view/1246Google ScholarGoogle Scholar
  31. Gloria J Mark, Ban Al-Ani, and Bryan Semaan. 2009. Resilience through technology adoption: Merging the old and the new in Iraq. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 689--698. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Gloria Mark and Bryan Semaan. 2008. Resilience in collaboration: Technology as a resource for new patterns of action. Proceedings of the 2008 ACM Conference on Computer supported Cooperative Work, 137--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Gloria Mark and Bryan Semaan. 2008. Resilience in collaboration: technology as a resource for new patterns of action. Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work: 137--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Wanda J Orlikowski. 1992. The duality of technology: Rethinking the concept of technology in organizations. Organization Science 3, 3: 398--427. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Alison Pickard. 2012. Research methods in information. Facet publishing.Google ScholarGoogle Scholar
  36. Antonius C G M Robben. 2010. Iraq at a Distance: What Anthropologists Can Teach Us About the War. University of Pennsylvania Press.Google ScholarGoogle Scholar
  37. Jennifer A Rode. 2011. A theoretical agenda for feminist HCI. Interacting with Computers 23, 5: 393--400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Christine Satchell and Paul Dourish. 2009. Beyond the user: Use and non-use in HCI. Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7: 9--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Bryan Semaan and Gloria Mark. 2011. Technologymediated social arrangements to resolve breakdowns in infrastructure during ongoing disruption. ACM Transactions on Computer-Human Interaction 18, 4: 1--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Bryan Semaan and Gloria Mark. 2011. Technologymediated social arrangements to resolve breakdowns in infrastructure during ongoing disruption. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 4: 21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Bryan Semaan and Gloria Mark. 2012. "Facebooking" towards crisis recovery and beyond: Disruption as an opportunity. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, 27--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Clay Shirky. 2011. The political power of social media: Technology, the public sphere, and political change. Foreign affairs: 28--41.Google ScholarGoogle Scholar
  43. Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn't: Exploring selfcensorship on facebook. Proceedings of the 2013 Conference on Computer Supported Cooperative Work, 793--802. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Kate Starbird and Leysia Palen. 2012. (How) will the revolution be retweeted?: Information diffusion and the 2011 Egyptian uprising. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, 7--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Anselm Strauss and Juliet M. Corbin. 1990. Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc.Google ScholarGoogle Scholar
  46. Cameron Teoh, Holger Regenbrecht, and David O'Hare. 2011. The transmission of self: body language availability and gender in videoconferencing. Proceedings of the 23rd Australian Computer-Human Interaction Conference, 273--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. United States Securities and Exchange Commission. 2012. Registration Statement on Form S-1. 67. Retrieved May 25, 2016 from http://www.sec.gov/Archives/edgar/data/1326801/000119312512034517/d287954ds1.htm#toc287954_10Google ScholarGoogle Scholar
  48. Sarah Vieweg and Adam Hodges. 2016. Surveillance & modesty on social media: How Qataris navigate modernity and maintain tradition. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 527--538. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Barry Wellman and Lee Rainie. 2012. Networked: The new social operating system. Publisher: The MITPress. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. S. M. E. Wyatt. 2003. Non-users also matter: The construction of users and non-users of the internet.Google ScholarGoogle Scholar
  51. Sarita Yardi and Amy Bruckman. 2012. Income, race, and class: Exploring socioeconomic differences in family technology use. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3041--3050. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Svetlana Yarosh and Gregory D Abowd. 2011. Mediated parent-child contact in work-separated families. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1185--1194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Norhayati Zakaria, Jeffrey M Stanton, and Shreya T M Sarkar-Barney. 2003. Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East. Information Technology & People 16, 1: 49--75.Google ScholarGoogle ScholarCross RefCross Ref
  54. Syria Regional Refugee Response. Retrieved September 20, 2015 from http://data.unhcr.org/syrianrefugees/regional.phpGoogle ScholarGoogle Scholar

Index Terms

  1. Impression Management in High Context Societies: 'Saving Face' with ICT

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
      February 2017
      2556 pages
      ISBN:9781450343350
      DOI:10.1145/2998181

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 February 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CSCW '17 Paper Acceptance Rate183of530submissions,35%Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader