Publications by authors named "Adam Joinson"

This study examined the influence of design "nudges" on bystanders' willingness to intervene in online harassment using a social media simulation. Utilizing a 2 × 2 experimental design, we tested the ability of key design features (community guidelines and pop-up messaging) to induce a sense of self-efficacy (low/high) and personal responsibility (low/high) and thence to influence intervention levels. Participants ( = 206) were invited to "beta test" a new social networking site (SNS) for 15 minutes.

View Article and Find Full Text PDF

Psychological theories of mobilization tend to focus on explaining people's motivations for action, rather than mobilization ("activation") processes. To investigate the online behaviors associated with mobilization, we compared the online communications data of 26 people who subsequently mobilized to right-wing extremist action and 48 people who held similar extremist views but did not mobilize ( = 119,473 social media posts). In a three-part analysis, involving content analysis (Part 1), topic modeling (Part 2), and machine learning (Part 3), we showed that communicating ideological or hateful content was not related to mobilization, but rather mobilization was positively related to talking about violent action, operational planning, and logistics.

View Article and Find Full Text PDF

In recent years, our increasing use of technology has resulted in the production of vast amounts of data. Consequently, many researchers have analyzed digital data in attempt to understand its relationship with individuals' personalities. Such endeavors have inspired efforts from divergent fields, resulting in widely dispersed findings that are seldom synthesized.

View Article and Find Full Text PDF

As Artificial Intelligence (AI) becomes more prevalent, protecting personal privacy is a critical ethical issue that must be addressed. This article explores the need for ethical AI systems that safeguard individual privacy while complying with ethical standards. By taking a multidisciplinary approach, the research examines innovative algorithmic techniques such as differential privacy, homomorphic encryption, federated learning, international regulatory frameworks, and ethical guidelines.

View Article and Find Full Text PDF

Since 2009, there has been an increase in global protests and related online activity. Yet, it is unclear how and why online activity is related to the mobilization of offline collective action. One proposition is that online polarization (or a relative change in intensity of posting mobilizing content around a salient grievance) can mobilize people offline.

View Article and Find Full Text PDF

Psychology's tendency to focus on confirmatory analyses before ensuring constructs are clearly defined and accurately measured is exacerbating the generalizability crisis. Our growing use of digital behaviors as predictors has revealed the fragility of subjective measures and the latent constructs they scaffold. However, new technologies can provide opportunities to improve conceptualizations, theories, and measurement practices.

View Article and Find Full Text PDF

This paper explores individuals' motives for using social media when living under 'social distancing' conditions imposed during the COVID-19 pandemic, where they were instructed to physically distance from other people. Adopting a 'uses and gratifications' approach, and using a previously established five-factor scale, we examine the relationship between individuals' motives for using social media and their personality traits. Hundred and eighty-nine social media users living in the United Kingdom completed surveys assessing their motives for using social media and their personality.

View Article and Find Full Text PDF

Given the increasingly young age that children are using technology and accessing the internet and its associated risks, it is important we understand how families manage and negotiate cyber-security within the home. We conducted an exploratory qualitative study with thirteen families (14 parents and 19 children) in the south-west of the United Kingdom about their main cyber-security concerns and management strategies. Thematic analysis of the results revealed that families were concerned about cyberbullying, online stranger danger, privacy, content, financial scams, and technical threats.

View Article and Find Full Text PDF

Online communities are virtual spaces for users to share interests, support others, and to exchange knowledge and information. Understanding user behavior is valuable to organizations and has applications from marketing to security, for instance, identifying leaders within a community or predicting future behavior. In the present research, we seek to understand the various roles that users adopt in online communities-for instance, who leads the conversation? Who are the supporters? We examine user role changes over time and the pathways that users follow.

View Article and Find Full Text PDF

This article presents a new method for reducing socially desirable responding in Internet self-reports of desirable and undesirable behavior. The method is based on moving the request for honest responding, often included in the introduction to surveys, to the questioning phase of the survey. Over a quarter of Internet survey participants do not read survey instructions, and therefore, instead of asking respondents to answer honestly, they were asked whether they responded honestly.

View Article and Find Full Text PDF

To what extent does our online activity reveal who we are? Recent research has demonstrated that the digital traces left by individuals as they browse and interact with others online may reveal who they are and what their interests may be. In the present paper we report a systematic review that synthesises current evidence on predicting demographic attributes from online digital traces. Studies were included if they met the following criteria: (i) they reported findings where at least one demographic attribute was predicted/inferred from at least one form of digital footprint, (ii) the method of prediction was automated, and (iii) the traces were either visible (e.

View Article and Find Full Text PDF

Whether or not socially desirable responding is a cause for concern in personality assessment has long been debated. For many researchers, McCrae and Costa laid the issue to rest when they showed that correcting for socially desirable responding in self-reports did not improve the agreement with spouse ratings on the Neuroticism, Extraversion, and Openness to Experience Personality Inventory. However, their findings rest on the assumption that observer ratings in general, and spouse ratings in particular, are an unbiased external criterion.

View Article and Find Full Text PDF

In relation to social network sites, prior research has evidenced behaviors (e.g., censoring) enacted by individuals used to avoid projecting an undesired image to their online audiences.

View Article and Find Full Text PDF

Lukasz Piwek and colleagues consider whether wearable technology can become a valuable asset for health care.

View Article and Find Full Text PDF

This article describes the use of evolutionary psychology to inform the design of a serious computer game aimed at improving 9-12-year-old children's conflict resolution skills. The design of the game will include dynamic narrative generation and emotional tagging, and there is a strong evolutionary rationale for the effect of both of these on conflict resolution. Gender differences will also be taken into consideration in designing the game.

View Article and Find Full Text PDF

The media choices made by high and low self-esteem Internet users were studied using web-based methodology (n = 265). Participants were asked to rank four media (face-to-face, e-mail, letter, and telephone) in order of preference across four different communication scenarios designed to pose an interpersonal risk. The level of interpersonal risk posed by two of the scenarios (asking for a pay rise and asking for a date) were also experimentally manipulated by randomly allocating participants to a 25%, 50%, or 75% chance of rejection.

View Article and Find Full Text PDF