IV128 Online Communication from a Social Science Perspective Teachers: prof. PhDr. David Šmahel, Ph.D. ( davs@mail.muni.cz ) Mgr. Lenka Knapová Extent and Intensity: 1/1/0, 4 credits Course objectives: The aim of the course is to introduce the basic theories of online communication and online communication research, which will enable students of computer science to become more aware of the specifics of this field. They can use this knowledge when creating their own systems and online communication tools. In practical terms, this knowledge will help students to understand some of the pitfalls of online communication, enabling them to communicate better and more efficiently, like in virtual teams and other work groups. After completing this course, they will be familiar with theories dealing with online communication, privacy on the internet, online addictions, experimenting with online identity, and the trustworthiness of online information. They will also be able to describe how context, perception, and personality characteristics affect the behavior of internet users in various contexts, such as the security domain. Credit Requirements: 1. 80% attendance (minimum of 8 lessons out of 10). 2. Presentation of a selected topic – Group assignment. The topics are to be determined by the teacher at the beginning of the course. Students will prepare a 20min presentation (+ time for discussion with other students) on a given topic based on academic literature. For further details on the presentation format, see Presentation Instructions below. 3. Written assignment - Individual assignment, minimum length: 4 standard pages (1 standard page = 1,800 characters, including spaces). Students will write a paper on a selected topic from the entire course, focusing primarily on comparing their own experience to the academic literature (at least 5 academic sources/articles must be used). Presentation instructions: - For each lesson, one topic related to the subject of the lecture is provided - see below. - Presentation of the selected topic is done by a group of 2-3 students. - The duration of the presentation is 20 minutes + 10 minutes for discussion. All group members must be actively involved in the presentation. - The presentation must be submitted to the IS Homework folder no later than 2 days before the presentation date. Failure to do so in time is a reason for not granting credit for the course (except for the first subject, where the presentation can be submitted one day before the presentation date). - The presentation date cannot be changed or moved, except for extraordinary reasons. - Find at least 4 high-quality foreign academic (not Czech or Slovak!) resources on the topic, based on which you will prepare a synthesis of the information for your presentation. - The presentation must fulfill all the requirements listed below. In the case of a substandard presentation, the group will prepare a new topic and present it during the last lesson. Academic sources are articles from academic peer-reviewed journals or academic book chapters. Use the available electronic resources to search: https://ezdroje.muni.cz/prehled . Suitable publications can be found primarily in the Web of Science database. Content of the presentation: 1. General introduction of the topic - what needs to be said to keep the listener in the picture, what are the basic definitions related to that topic. 2. What did you notice, what caught your attention, and what surprised you regarding the selected topic? 3. Examples for other students – aim to explain the topic to other students through practical examples, such as where to find it on the internet, what software is used, which sites, which blogs… 4. What do you think of when you think about your chosen topic from the IT point of view - how can the information be used in practice? Themes of seminars: 1) 21.2. Introduction and organization of lessons. Introduction of presented themes. Use of mHealth tools in the aging population. 2) 28.2. Communication theories and the specifics of online communication. Introduction of basic concepts in the context of online communication: anonymity, disinhibition, self-disclosure. 3) 6.3. Privacy on the internet and online risks. Motivations for sharing personal information on the internet in different environments, concerns about privacy, and misuse of personal data. 4) 13.3. Health and the Internet: eHealth and mHealth applications, introduction of eHealth, SW: eHealth and mHealth functions, results of experiments. Presentation theme: Trust in mHealth applications. Why do people trust mHealth applications? What are the factors of trust for mHealth applications? 5) 20.3. Online addictions: Origin and definition of online addiction, basic terminology, prevalence, how to identify online addiction, online addiction, and results of current research. Presentation theme: Online addictions and SW design: How can design impact the shape of online addictions? How to minimize online addictions by SW design? 6) 27.3. User and ICT security: User study - authentication methods. Results of the qualitative and quantitative research on authentication methods. Presentation theme: The role of the user in the context of ICT security 7) 3.4. Phishing. Psychological perspective of the principles used in phishing; prevention. Presentation theme: Fraud emails: Nigeria letters, scam 419 8) 10.4. National holiday 9) 17.4. Internet mediation and software: basic principles of family mediation, role of SW in this mediation, basic types of software, and possibilities for development. Presentation theme: Parental mediation and SW: What types of SW do we have? How do parents use this SW? What are the factors of usage or non-usage of parental SW? 10) 24.4. Experimental security research on internet usage: How to explore online security, the pitfalls and results of current research on online security. Presentation theme: User’s security perceptions. How do users perceive the security of ICT? What are user factors for online security perceptions? 11) 1.5. National holiday 12) 8.5. National holiday 13) 15.5. Online research methods: how to explore the online environment and ICT users, introducing the basic types of online methods. Conclusion and summary of the course. References: boyd, d.m., Ellison, N.B. (2008). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13, 210–230. Derks, D., Fischer, A. H., & Bos, A. E. (2008). The role of emotion in computer-mediated communication: A review. Computers in Human Behavior, 24, 766-785. Gilson L. L. et al (2014). Virtual teams research 10 years, 10 themes, and 10 opportunities. Journal of Management. Grawemeyer, B. & Johnson, H. (2011) Using and managing multiple passwords: A week to a view. Interacting with Computers. Volume 23, Issue 3, 256–267. Gundu, T. & Flowerday, S.V. (2012). Ignorance to awareness: Towards an information security awareness process. SAIEE Africa Research Journal. Volume 104, Issue 2, 69-79. McKenna, K. Y. A., & Bargh, J. A. (1999). Causes and Consequences of Social Interaction on the Internet: A Conceptual Framework. Media Psychology, 1(3), 249. Mesch, G. S. (2009). Social context and communication channels choice among adolescents. Computers in Human Behavior, 25, 244-251. Postmes, T., & Spears, R. (2002). Behavior online: Does anonymous computer communication reduce gender inequality? Personality and Social Psychology Bulletin, 28(8), 1073-1083. Subrahmanyam, K., & Greenfield, P. (2008). Online communication and adolescent relationships. The Future of Children, 18, 119-146. Subrahmanyam, K., & Šmahel, D. (2010). Digital Youth: The Role of Media in Development. New York : Springer. Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326. Suler, J. (2004). The Psychology of Cyberspace. Dostupné na: http://www.rider.edu/users/suler/psycyber/psycyber.html Tidwell, L. C., & Walther, J. B. (2002). Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human Communication Research, 28(3), 317-348. Tyler, J. M., & Feldman, R. S. (2004). Truth, lies, and self-presentation: How gender and anticipated future interaction relate to deceptive behavior. Journal of Applied Social Psychology, 34(12), 2602-2615. Turkle, S. (1997). Life on the Screen: Identity in the Age of the Internet, New York: Simon & Schuster. Valkenburg, P. M., & Peter, J. (2008). Adolescents' identity experiments on the Internet: Consequences for social competence and self-concept unity. Communication Research, 35, 208-231. Valkenburg, P. M., & Peter, J. (2011). Online communication among adolescents: An integrated model of its attraction, opportunities, and risks. The Journal of Adolescent Health, 48, 121–127. Valkenburg, P.M., Schouten, A.P., & Peter, J. (2005). Adolescents’ identity experiments on the internet. New Media & Society, 7, 383-402. Walther, J. B., & D’Addario, K. P. (2001). The impacts of emoticons on message interpretation in computer-mediated communication. Social Science Computer Review, 19(3), 324-347. Walther, J. B. (1996). Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction. Communication research, 23, 3-43. Whitty, T. M. (2002). Liar, liar! An examination of how open, supportive and honest people are in chat rooms. Computers in Human Behavior, 18, 343-352.