PHENOMENOLOGY OF USERS' DYSFUNCTIONAL BEHAVIOR IN SOCIAL MEDIA

Main Article Content

AMIRHOSSEIN ZARANDOUZ, ZAHRA ALIPOUR DARVISHI, ZOHREH DEHDASHTI SHAHROKH, MOHAMMAD HAGHIGHI

Abstract

The increasing popularity of social media over the past decade has caused the population of these media users to be defined as the size of a large continent. Given the communicative nature of social media, these communications sometimes occur positively and correctly with favorable and desirable outcomes. However, these communications sometimes occur negatively and abnormally, referred to as online dysfunctional behavior. The present study explains the meaning of dysfunctional behavior in the context of social media and what and how these behaviors are.  Smith's interpretive phenomenological method was used to achieve this goal. The sample size was determined at 11 people based on theoretical sampling among social media celebrities who had public reputations. The data were collected using a semi-structured interview method.  The interview analysis resulted in the identification of 3 primary themes (actions and reactions without proactive and retrospective awareness, aggressive behavior with impersonation, and acting out of accumulated mental disorders) and 6 sub-themes (lack of media and technological literacy, cultural poverty, anonymity, online anger, intolerance of success of others, and inferiority complexes). Online dysfunctional behavior has a semantic affinity with activism without awareness, aggressive behavior with impersonation, and acting out of disorders.

Article Details

Section
Articles
Author Biography

AMIRHOSSEIN ZARANDOUZ, ZAHRA ALIPOUR DARVISHI, ZOHREH DEHDASHTI SHAHROKH, MOHAMMAD HAGHIGHI

Amirhossein Zarandouz1, Zahra Alipour Darvishi2* Zohreh Dehdashti Shahrokh3 Mohammad haghighi4

1 PhD candidate in marketing management, Tehran North branch, Islamic Azad University, Tehran, Iran.

2 Associate Professor, department of business management, Tehran North branch, Islamic Azad University, Tehran, Iran.

3 Full Professor, department of Business management, Allameh Tabatabei University, Tehran North branch, Islamic Azad University, Tehran, Iran.

4Associate Professor, department of business management, Tehran-North Branch Islamic Azad University, Tehran, Iran.

References

Benevenuto, F., Rodrigues, T., Cha, M., & Almeida, V. (2009, November). Characterizing user behavior in online social networks. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (pp. 49-62).

Brown, G., Howe, T., Ihbe, M., Prakash, A., & Borders, K. (2008, November). Social networks and context-aware spam. In Proceedings of the 2008 ACM conference on Computer supported cooperative work (pp. 403-412).

Cui, A., Zhang, M., Liu, Y., & Ma, S. (2011, September). Are the urls really popular in microblog messages? In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (pp. 1-5). IEEE.

David, M. E., & Roberts, J. A. (2021). Investigating the impact of partner phubbing on romantic jealousy and relationship satisfaction: The moderating role of attachment anxiety. Journal of Social and Personal Relationships, 38(12), 3590-3609.

Dobson, K., & Knezevic, I. (2017). ‘Liking and Sharing’the stigmatization of poverty and social welfare: Representations of poverty and welfare through Internet memes on social media. tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society, 15(2), 777-795.‏

Dusek, Val (2006). Philosophy of Technology: An Introduction. Malden & Oxford: Blackwell Publishing.

Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., & Ghosh, R. (2013). Exploiting burstiness in reviews for review spammer detection. In Proceedings of the international AAAI conference on web and social media (Vol. 7, No. 1, pp. 175-184).

Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96-104.

Friggeri, A., Adamic, L., Eckles, D., & Cheng, J. (2014, May). Rumor cascades. In proceedings of the international AAAI conference on web and social media (Vol. 8, No. 1, pp. 101-110).

Ghosh, S., Viswanath, B., Kooti, F., Sharma, N. K., Korlam, G., Benevenuto, F., & Gummadi, K. P. (2012, April). Understanding and combating link farming in the twitter social network. In Proceedings of the 21st international conference on World Wide Web (pp. 61-70).

Giorgi, A. & Giorgi, B. (2008). Phenomenology; In Qualitative Psychology: A Practical Guide to Research Methods; edited by Jonathan A. Smith, London & Los Angles: Sage

Guba, E. , & Lincoln, Y. (1989). Fourth generation evaluation. Newbury Park, CA: Sage.

Gupta, A., Lamba, H., Kumaraguru, P., & Joshi, A. (2013, May). Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In Proceedings of the 22nd international conference on World Wide Web (pp. 729-736).

Hu, X., Tang, J., Zhang, Y., & Liu, H. (2013, June). Social spammer detection in microblogging. In Twenty-third international joint conference on artificial intelligence.

Imran, M., Castillo, C., Diaz, F., & Vieweg, S. (2015). Processing social media messages in mass emergency: A survey. ACM Computing Surveys (CSUR), 47(4), 1-38.

Ismail, N. H., Du, M., & Hu, X. (2019). Social media and psychological disorder. Social Web and Health Research: Benefits, Limitations, and Best Practices, 171-192.

Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94-100.

karimian, K., Parsamehr, M., & Afshani, S. A. (2017). Investigate Sociological factors affecting trends of high school adolescent’s girl in Shahrekord toward social network. New Media Studies, 3(10), 172-211. doi: 10.22054/cs.2017.17353.131

L. Jin, Y. Chen, T. Wang, P. Hui and A. V. Vasilakos, "Understanding user behavior in online social networks: a survey," in IEEE Communications Magazine, vol. 51, no. 9, pp. 144-150, September 2013, doi: 10.1109/MCOM.2013.6588663.

Langdridge, Darren (2007). Phenomenological Psychology: Theory, Research and Method. Harlow: The Open University.

Lee, K., Caverlee, J., & Webb, S. (2010, July). Uncovering social spammers: social honeypots+ machine learning. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval (pp. 435-442).

Memar, S., Alipour, S., & Khaksar, F. (2012). Virtual social networking and identity crisis (with an emphasis on the iranian identity crisis). Journal of Social Studies and Research in Iran, 1(4), 155-176. (In Persian)

Moradi, h., S, s., (2014). Phenomenology; A philosophical, interpretive and methodological approach to entrepreneurship studies. . Methodology of religious studies, 2(1), 62-72(in Persian)

Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., & Ghosh, R. (2013, August). Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 632-640).

Pfattheicher, S., & Schindler, S. (2016). Misperceiving bullshit as profound is associated with favorable views of Cruz, Rubio, Trump and conservatism. PloS one, 11(4), e0153419.

Pietkiewicz, Igor & Smith, Jonathan A. (2012). A practical guide to using nterpretative

Phenomenological Analysis in qualitative research psychology. Psychological Journal,

18(2), 361-369.

Rasmussen, T. (2014) Internet and the Political Public Sphere, Sociology Compass, 8, pages 1315– 1329. doi: 10.1111/soc4.12228.

Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Flammini, A., & Menczer, F. (2011). Detecting and tracking political abuse in social media. In Proceedings of the International AAAI Conference on Web and social media (Vol. 5, No. 1, pp. 297-304).

Rodrigues, T., Benevenuto, F., Cha, M., Gummadi, K., & Almeida, V. (2011, November). On word-of-mouth based discovery of the web. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp. 381-396).

Seidman, G. (2013). Self-presentation and belonging on Facebook: How personality influences social media use and motivations. Personality and Individual Differences, 54(3), 402–407. https://doi.org/10.1016/j.paid.2012.10.009

Smith, Jonathan A. and Osborn, Mike (2007). Interpretative Phenomenological Analysis;

in Qualitative Psychology: A Practical Guide to Research Methods. London: Sage.

Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326.

Tandon, A., Dhir, A., & Mäntymäki, M. (2021). Jealousy due to social media? A systematic literature review and framework of social media-induced jealousy. Internet Research, 31(5), 1541-1582.

Van Manen, M. (1990). Reaserching lived experience: human science for an action

sensitive pedagogy. London, Ontario, Canada; the University of Western Ontario.

Wallace, M., & Sheldon, N. (2015). Business Research Ethics: Participant Observer Perspectives. Journal of Business Ethics, 128, 267-277. https://doi.org/10.1007/s10551-014-2102-2

Wojnar, d., & Swanson, K, M. (2007). Phenomenology: an exploration. Journal of holistic

nursing. 25 (3), P.p: 172-180.

Zhao, Z., Resnick, P., & Mei, Q. (2015, May). Enquiring minds: Early detection of rumors in social media from enquiry posts. In Proceedings of the 24th international conference on World Wide Web (pp. 1395-1405).

Yousaf, M., Khan, M. M., & Paracha, A. T. (2021). Leading Professionally Diverse Workgroups of Healthcare Professionals for Improving Quality of Care. Journal of Organizational Behavior Research, 6(1), 106-119.

Domatskiy, V. N., & Sivkova, E. I. (2022). Opisthorchiasis - Is an Urgent Medical and Social Problem in Russia. Journal of Biochemical Technology, 13(4), 20-29.

Almohammed, A., Altaymani, A., Alruwaili, Z., & Alnasser, R. (2023). Influence of Image Editing Practices and Social Media on Seeking Cosmetic Skin Care, Al-Jouf, Saudi Arabia. Journal of Pharmaceutical and Allied Sciences. 12, 13-22.