ABSTRACT
High context societies are defined by their strong interpersonal relationships, where upholding the shared values of the community, writ large, are of the utmost importance. That is, they prioritize collective identity over individual identity. Through a qualitative case study drawing from a set of 90 semi-structured interviews with Iraqi citizens who were living in Iraq during the 2nd Gulf War, we show how through ICT uses and appropriation, people shape, or influence, social complexities within high context societies. We found that people appropriated ICTs in a way such that they could "save face" and manage other people's impressions of themselves and, in turn, maintain a positive collective identity. We then explore the use and appropriation of ICTs for impression management in high context societies as a complex process-one that is both social and technical-introduce the notion of technological imperialism, and develop a model of face saving practices that takes collective identity into account.
- Norah Abokhodair, Sofiane Abbar, Sarah Vieweg, and Yelena Mejova. 2016. Privacy and Twitter in Qatar: Traditional values in the digital world. ArXiv e-prints.Google Scholar
- Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf. Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 672--683. Google ScholarDigital Library
- Nadje Al-Ali. 2005. Reconstructing gender: Iraqi women between dictatorship, war, sanctions and occupation. Third World Quarterly 26, 4-5: 739--758.Google ScholarCross Ref
- Tamara Alsheikh, Jennifer A Rode, and Siân E Lindley. 2011. (Whose) value-sensitive design: a study of long-distance relationships in an Arabic cultural context. Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, 75--84. Google ScholarDigital Library
- Shaowen Bardzell. 2010. Feminist HCI: Taking stock and outlining an agenda for design. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1301--1310. Google ScholarDigital Library
- Eric P S Baumer, Jenna Burrell, Morgan G Ames, Jed R Brubaker, and Paul Dourish. 2015. On the importance and implications of studying technology non-use. Interactions 22, 2: 52--56. Google ScholarDigital Library
- Eric P S Baumer and M Silberman. 2011. When the implication is not to design (technology). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2271--2274. Google ScholarDigital Library
- Ruth Benedict. 1967. The chrysanthemum and the sword: Patterns of Japanese culture. Houghton Mifflin Harcourt.Google Scholar
- Patrick Biernacki and Dan Waldorf. 1981. Snowball sampling: Problems and techniques of chain referral sampling. Sociological Methods & Research 10, 2: 141--163.Google ScholarCross Ref
- Jeremy Birnholtz. 2010. Adopt, adapt, abandon: Understanding why some young adults start, and then stop, using instant messaging. Computers in Human Behavior 26, 6: 1427--1433. Google ScholarDigital Library
- Danah Michele Boyd. 2008. Taken out of context: American teen sociality in networked publics. ProQuest.Google Scholar
- Manuel Castells. 2011. The rise of the network society: The information age: Economy, society, and culture. John Wiley & Sons.Google Scholar
- Karen Church and Rodrigo de Oliveira. 2013. What's up with WhatsApp?: Comparing mobile instant messaging behaviors with traditional SMS. Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 352--361. Google ScholarDigital Library
- Jill P. Dimond, Erika Shehan Poole, and Sarita Yardi. 2010. The effects of life disruptions on home technology routines. Proceedings of the 16th ACM International Conference on Supporting group work, 85--88. Google ScholarDigital Library
- T Edward. 1976. Hall, Beyond Culture. New York: Anchor Books 222: 13.Google Scholar
- Nicole Ellison, Rebecca Heino, and Jennifer Gibbs. 2006. Managing impressions online: Self-presentation processes in the online dating environment. Journal of Computer-Mediated Communication 11, 2: 415--441.Google ScholarCross Ref
- Goffman Erving. 1963. Behavior in public places: notes on the social organization of gatherings. New York.Google Scholar
- Casey Fiesler, Shannon Morrison, and Amy S Bruckman. 2016. An archive of their own: A case study of feminist HCI and values in design. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2574--2585. Google ScholarDigital Library
- Anthony Giddens. 1984. The constitution of society: Outline of the theory of structuration. Univ of California Press.Google Scholar
- Erving Goffman. 1955. On face-work: An analysis of ritual elements in social interaction. Psychiatry 18, 3: 213--231.Google ScholarCross Ref
- Erving Goffman. 2005. Interaction ritual: Essays in face to face behavior. AldineTransaction.Google Scholar
- Erving Goffman. 2009. Relations in public. Transaction Publishers.Google Scholar
- Erving Goffman and others. 1959. The Presentation of Self in Everyday Life.Google Scholar
- Rebecca E Grinter, W Keith Edwards, Mark W Newman, and Nicolas Ducheneaut. 2005. The work to make a home network work. ECSCW 2005, 469--488. Google ScholarCross Ref
- Jeffrey T Hancock, Catalina Toma, and Nicole Ellison. 2007. The truth about lying in online dating profiles. Proceedings of the SIGCHI conference on Human factors in computing systems, 449--452. Google ScholarDigital Library
- Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2010. Postcolonial computing: A lens on design and development. Proceedings of the SIGCHI conference on human factors in computing systems, 1311--1320. Google ScholarDigital Library
- Sanjay Kairam, Mike Brzozowski, David Huffaker, and Ed Chi. 2012. Talking in circles: Selective sharing in Google+. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1065--1074. Google ScholarDigital Library
- Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it together: Interpersonal management of disclosure in social network services. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3217--3226. Google ScholarDigital Library
- Rich Ling and Heather A Horst. 2011. Mobile communication in the global south. New Media & Society: 1461444810393899.Google Scholar
- Gilad Lotan, Erhardt Graeff, Mike Ananny, Devin Gaffney, Ian Pearce, and Danah Boyd. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication 5: 31. Retrieved from http://ijoc.org/index.php/ijoc/article/view/1246Google Scholar
- Gloria J Mark, Ban Al-Ani, and Bryan Semaan. 2009. Resilience through technology adoption: Merging the old and the new in Iraq. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 689--698. Google ScholarDigital Library
- Gloria Mark and Bryan Semaan. 2008. Resilience in collaboration: Technology as a resource for new patterns of action. Proceedings of the 2008 ACM Conference on Computer supported Cooperative Work, 137--146. Google ScholarDigital Library
- Gloria Mark and Bryan Semaan. 2008. Resilience in collaboration: technology as a resource for new patterns of action. Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work: 137--146. Google ScholarDigital Library
- Wanda J Orlikowski. 1992. The duality of technology: Rethinking the concept of technology in organizations. Organization Science 3, 3: 398--427. Google ScholarDigital Library
- Alison Pickard. 2012. Research methods in information. Facet publishing.Google Scholar
- Antonius C G M Robben. 2010. Iraq at a Distance: What Anthropologists Can Teach Us About the War. University of Pennsylvania Press.Google Scholar
- Jennifer A Rode. 2011. A theoretical agenda for feminist HCI. Interacting with Computers 23, 5: 393--400. Google ScholarDigital Library
- Christine Satchell and Paul Dourish. 2009. Beyond the user: Use and non-use in HCI. Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7: 9--16. Google ScholarDigital Library
- Bryan Semaan and Gloria Mark. 2011. Technologymediated social arrangements to resolve breakdowns in infrastructure during ongoing disruption. ACM Transactions on Computer-Human Interaction 18, 4: 1--21. Google ScholarDigital Library
- Bryan Semaan and Gloria Mark. 2011. Technologymediated social arrangements to resolve breakdowns in infrastructure during ongoing disruption. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 4: 21. Google ScholarDigital Library
- Bryan Semaan and Gloria Mark. 2012. "Facebooking" towards crisis recovery and beyond: Disruption as an opportunity. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, 27--36. Google ScholarDigital Library
- Clay Shirky. 2011. The political power of social media: Technology, the public sphere, and political change. Foreign affairs: 28--41.Google Scholar
- Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn't: Exploring selfcensorship on facebook. Proceedings of the 2013 Conference on Computer Supported Cooperative Work, 793--802. Google ScholarDigital Library
- Kate Starbird and Leysia Palen. 2012. (How) will the revolution be retweeted?: Information diffusion and the 2011 Egyptian uprising. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, 7--16. Google ScholarDigital Library
- Anselm Strauss and Juliet M. Corbin. 1990. Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc.Google Scholar
- Cameron Teoh, Holger Regenbrecht, and David O'Hare. 2011. The transmission of self: body language availability and gender in videoconferencing. Proceedings of the 23rd Australian Computer-Human Interaction Conference, 273--280. Google ScholarDigital Library
- United States Securities and Exchange Commission. 2012. Registration Statement on Form S-1. 67. Retrieved May 25, 2016 from http://www.sec.gov/Archives/edgar/data/1326801/000119312512034517/d287954ds1.htm#toc287954_10Google Scholar
- Sarah Vieweg and Adam Hodges. 2016. Surveillance & modesty on social media: How Qataris navigate modernity and maintain tradition. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 527--538. Google ScholarDigital Library
- Barry Wellman and Lee Rainie. 2012. Networked: The new social operating system. Publisher: The MITPress. Google ScholarDigital Library
- S. M. E. Wyatt. 2003. Non-users also matter: The construction of users and non-users of the internet.Google Scholar
- Sarita Yardi and Amy Bruckman. 2012. Income, race, and class: Exploring socioeconomic differences in family technology use. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3041--3050. Google ScholarDigital Library
- Svetlana Yarosh and Gregory D Abowd. 2011. Mediated parent-child contact in work-separated families. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1185--1194. Google ScholarDigital Library
- Norhayati Zakaria, Jeffrey M Stanton, and Shreya T M Sarkar-Barney. 2003. Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East. Information Technology & People 16, 1: 49--75.Google ScholarCross Ref
- Syria Regional Refugee Response. Retrieved September 20, 2015 from http://data.unhcr.org/syrianrefugees/regional.phpGoogle Scholar
Index Terms
- Impression Management in High Context Societies: 'Saving Face' with ICT
Recommendations
ViTu: a system to help the mexican people to preserve and celebrate their culture.
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsViTu is the entire development of a system focused on appreciating and highlighting the culture and traditions of native Mexican communities. It also contributes towards preserving and regaining the lost Mexican roots of the Mexican-Americans living in ...
Social media management strategies for organizational impression management and their effect on public perception
Social media management strategies are modeled to influence the public perception.Distinguish a tool- and a web-based strategy based on company-generated messages.The public perception is measured based on 15.5million user-generated messages.A mixed ...
Impression management strategies on enterprise social media platforms: An affordance perspective
AbstractEnterprise Social Media Platforms (ESMPs) are arenas for self-presentation where employees construct, co-create, and maintain an online image among their colleagues. This study systemically evaluated the current literature to ...
Comments