Christian - The Bomb Dot Com

advertisement
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
Online Presentation of Self vs. Face-to-Face Presentation of Self
Christian Sterling
University of Kentucky
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
Abstract
This literary review will discuss the presentation of oneself online vs. the presentation of oneself
face-to-face. The discussion will explore the advantageous and disadvantageous sides of
presenting oneself online. In order to assess the benefits and disadvantages of online presentation
of self, this paper will explore three major topics. The first topic will be the construction of an
identity facade through selective images and posts. The second topic will explore the negative of
one’s self perception while online. The third topic will explore the positives of developing ones
identity through online communities. This discussion is a gathering of commentaries on previous
research articles. Limitations to research will be discussed as well as possibilities for future
research endeavors.
Keywords: identity; self-advertising; hyper-personal model; feedback; face
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
Online Presentation of Self vs. Face-to-Face Presentation of Self
Managing ones face has traditionally always been a priority for any individual when it comes to
communicating. People generally want to be thought of as an attractive, well educated, witty and
all around perfect person. Before the age of the internet, people managed their identity in face-toface settings. They could speak a certain way, behave a certain way, manipulate their body
language and if you were good, plan out everything you were going to say before you said it.
These traditional ways of managing ones identity were once sufficient, but as the internet
evolves and individuals are able to communicate interpersonally via social media networks,
individuals have found ways to manage the identities at a higher level. “Communicating through
mediated channels generally gives us more control over managing impressions than we have in
face-to-face communication.” (Adler & Proctor, 2011) Though managing ones identity online
may likely be more effective compared to managing ones identity in person, should we conclude
that online identity management is the best way for individuals to be identified in their
communities? After all if we can edit and censor everything we post, and everything other social
networkers see, doesn’t that say enough about who we are or at least who we would like to be?
My concern with online presentation of self is that we construct an identity of who we would like
to be not who we actually are. People will then perceive us as something we are not and as
embellished, exaggerated versions of our true selves. Once we have created this picture perfect
image of ourselves online, we are expected to live up to that image, both online and offline. This
creates a problem when you over exaggerated online self escapes you in an interpersonal face-toface setting and whomever you’re speaking with expects a sense greatness from you in which
you faked previously online. Being revealed as a liar or putting on a façade can be even more
detrimental to your face than you had ever imagined.
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
I realize that here are advantageous as well as disadvantageous sides to online identity
management; which will be explored in the remainder of this literary discussion; however it is
hypothesized that there is a significant discrepancy between one’s online identity and one’s faceto-face identity.
The internet was first created by the military in order to easily share information between
researchers and since then has become an information aid to virtually everyone in the world. But
how did the purpose of the internet evolve and when and how was this discussion of online
identity management even appropriately birthed, given the origin of the internet’s function?
However when you think abstractly, information about oneself is still information. For example,
“Today I walked my dog to the park.” “That vacation to the Bahamas was the best time of my
life.” “I just got promoted to Partner of my law firm.” All of these examples are data being
shared regardless if it is used for the purposes of scientific research or not. People also feel the
need to be a significant figure in their society so they naturally want to build a persona online ,
especially if that information can be shared with 100 times as many people and in a more time
effective way. With the need to share personal information, there is inevitably the tendency to
only share positive and self-praising information that reflects oneself in a positive light. This
information can be disguised as images, posts, videos so on. An example of these images can be
pictures of vacations, hanging out with friends, at an award ceremony being praised. These all
give positive image to the individual who post the pictures. Having only pictures in which the
individual is smiling or laughing conveys that they are happy all the time. And not to mention
when people only post about the good things that are happening in their lives, they create a false
perceived environment in which everything going on in their life is perfect. (Salimkhan, Manago,
& Greenfield, 2010)
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
Another way the internet provides ease in managing ones identity is with selective selfpresentation; one of the four components of the hyper personal model which will be discussed
later. With selective self-presentation online, users are afforded the opportunity to omit sound of
voice, familiarity with other social networkers, and intimidation of face-to face encounters. This
allows computer mediated communicators to present themselves is a self-advertising and self
serving way and omit any unwanted characteristics. Maintaining face is maintaining an image
that your life is great and you have no worries. Users online can create this in such a more
effective way than anybody could in a face-to-face setting. The construction of one’s identity
online depends on the four components of the hyper-personal model. The first component is
selective self-presentation, which involves taking selective images and posts and sharing them;
idealization, which involves creating an idealized self rather than the true self; channel
management, which involves using email, a social media website, etc. and feedback, which
involves how people react to that presentation of self. All components contribute greatly to how
one constructs their identity online however Feedback is the most influential of all components.
Users will use selective presentation through a series of channels to create what they think is an
ideal them. Once this perception is created, they await the feedback of their social network. Do a
certain amount of people “Like” their picture, or do people positively comment on their posts or
“Retweet” what the user’s original post because they liked what they had to say? All of these are
examples of feedback via internet and users will have the tendency to mold themselves and
conform to the likes of others. Literally. This process of conforming can be defined as an identity
shift. According to the research article, The Effect of Feedback on Identity Shift in Computer
Mediated Communication, “Identity shift online is greater when computer mediated
communication users are provided with feedback about their public online identity performances
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
compared to when they simply post their messages.” (Walther, Liang, DeAndrea, Tong, Carr,
Sppottswood, & Amichai-Hamburger, 2011). It is found that those who disclose characteristics
publicly on a social media network, and after having positive feedback, tend to describe
themselves more like that characteristic, whether it is a true trait of theirs or not. This presents an
obvious problem because users are not being truthful to themselves nor to their social networking
peers.
A term that has come to describe the virtual world is an “identity workshop.”
(Salimkhan, Manago, & Greenfield, 2010) One may find humor at the idea of people
strategically working at perfecting their identity but the term does not exaggerate any the realities
of today’s social networking. Computer mediated communication (CMC) users literally work at
the identities by creating a product, which is themselves, selling it to the public, through channel
management, and assessing the demand for the product , through feedback and tweak the product
based on previous reviews.. Users have become strategist in creating their identities since the
evolution of the internet. My question is how far this identity management will go.
Now that we have answered why and how CMC users manage their identities online, we
can explore the self threatening realities of such discrepancies between online self and face-to
face self. CMC users do not mind providing false information about themselves because they
either do not know their social networking peers outside of the internet or trust that their peers
will never know the truth because of the physically impersonal boundary which is the internet.
However false presentation of self online is more threatening to oneself than it is to their social
network. Like stated before, the fourth component of the hyper personal model, feedback allows
CMC users to alter their characteristics online based on the feedback of others. Another term for
this feedback is reflected appraisal. Reflected appraisal is “ The theory that a person’s self-
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
concept mirrors the way the person believes others regard him or her.” (Adler & Proctor, 2011)
If a user’s online identity is based on the reviews of others, will this user ever have a unique true
identity or will their identity be a product of their online environment. And to what extent can the
cycle of the hyper personal model effect one’s shift in identity. Studies from Media Psychology
show that Feedback can promote, intensify, exploit and shape communicators characteristics and
even shape their attitudes and perceptions. (Walther, Liang, DeAndrea, Tong, Carr,
Sppottswood, & Amichai-Hamburger, 2011) Such tendencies can threaten one’s principles,
behaviors and characteristics.
Those CMC users who abuse their online identity management also fall victim to the
perception fallacies. These are fallacies because they are unobtainable but one fails to recognize
it and thinks he or she should obtain them. One fallacy they may fall victim to is the fallacy of
approval, which is the need to seek everyone’s approval even if it means sacrificing your own
happiness and principles. CMC users shift their identities in order to receive positive feedback
from their social network. They may say things that they usually would not or post images that
create a false presentation of themselves because they believe it will help them achieve ultimate
approval. The fallacy of perfection is the belief that you should behave perfectly. This causes
you put on a façade that usually turns out to be mentally trying or face threatening if you get
caught. Those who possess these fallacies find themselves spiraling down the ladder of happiness
trying to achieve perfection and approval. The capabilities of the internet often make use think
we can achieve such perfection however as humans, we cannot.
Research by a professor at Stanford University in California discusses the use of avatars
when creating an online image of one’s self. Nick Yee questions if we use real representations of
ourselves or do create alter egos through our avatars. His research found that introverts, those
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
who are biologically more reserved, create avatars that hold alike characteristics to themselves.
On the other hand, it was found that extroverts, those who are biologically more open, tend to
create avatars that are incongruous with their real identities. (New Scientist, 2007) This research
suggests that introverts have a more stable sense of self and that extroverts are willing to explore
new selves and new identities that may clash with previous ideas of self. It was stated in this
article that fantasy-like avatars are created to “escape the mundane realities of their daily lives”
(New Scientist, 2007).
After commenting on the risks of online identity management, I should address the
benefits that it provides CMC users with. Much research has been conducted on how online
identity management can be beneficial to cultural communities and to self- development of a
CMC user within that community. We will explore the Arabic community and there use of
computer mediated communication. After the accumulation of terror incidents such as 911, the
Arabic community has use the internet to protect themselves from ridicule. The internet has
served as a “voice-giving medium” allowing the rest of the world to hear their perspective. After
911, nearly everyone in the Arabic community took on personal, racial, religious and political
attacks. Their community slowly gathered online to become a part of what was called the
Restorative Stage; In which they spoke out about terrorism, defended their beliefs and principles
and formed a strong defensive community. (Al Zidjaly, 2012).
The once non-existent voice of the Arab community had now birthed and become a
strong voice. The evolution of the internet has afforded parties the opportunity to be heard when
the otherwise would not have been, especially no aggressive communities. I will not be surprised
when more eastern Asian countries begin to form a strong national identity and voice online.
Another benefit of online identity management caters to the youth of society. As a generation
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
grows, different opinions form but those opinions without power are often silenced, such as the
youth. The internet provides the younger generation with a form of expression that allows them
to separate themselves from the overbearing mind of their nation.
Throughout this discourse, we have explored the tendencies of online identity
management, as well and its risks and benefits. Identity management is a natural occurrence in
everyday life and it has and always will exist. The evolution of social networking has made it
easier for computer mediated communicators to manage their identities in more effective ways,
however when I refer to effective I mean precise and not necessarily accurate. CMC lets users to
pinpoint exactly who they want to be perceived as and allows them to do so. The downside to
online identity management is that users may abuse their power online and become someone far
from who they are in efforts to people please. Identity shifts are a common reoccurrence in CMC
users and lead to perception fallacies such as the Fallacy of Approval and the Fallacy of
Perfection. User may even experience disillusionment in the process of shifting identities. Online
identity management can however be beneficial to communities of people whose voice would
otherwise be suppressed if there were not social networking facilities. It was hypothesized that
there is a significant discrepancy between online presentation of self and face-to-face
presentation of self and this literary review has revealed benefits of online networking but also a
concern for those who abuse social networking and the need for preventative precautions in the
social networking world.
Limitations to the research include the fact that there was never any specific study that
analyzed a specific age group. This leaves uncertainty when discussing how online identity
management affects different generations. Also, only the Arabic community was explored when
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
discussing benefits of online identify management. Should another community have been
explored, the reader may have been more convinced of the benefits to a community voice.
Running head: ONLINE PRESENTATION OF SELF VS. FACE –TO-FACE
PRESENTATION OF SELF
References
Adler, R.B., & Proctor, R.F. (2011). Looking Out/Looking In, Thirteenth Edition. Boston:
Wadsworth, Cengage Learning.
Al Zidjaly, N. (2012). What has Happened to Arabs? Identity and face management online.
Multingua, 31(4), 413-439.
Create the perfect virtual you. (2007). New Scientist, 194. 2603, 52.
Salimkhan, G., Manago, A.M., & Greenfield, P.M. (2010). The Construction of the Virtual Self
on Myspace. Cyberpsychology, 4(1), 1-18.
Walther, J.B., Liang, Y., DeAndrea, D. C., Tong, S., Carr, C.T., Sppottswood, E.L., & AmichaiHamburger, Y. (2011) The Effect of Feedback on Identity Shift in Computer Mediated
Communication. Media Psychology, 14(1), 1-26.
Wood, A.F., & Smith, M.J. (2005) Online Communication :Linking Technology, Identity, and
Culture. Mahwah, N.J.:Lawrence Erlbaum Associates.
Download