485
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An Exploration of Motivations for Online Identity Reconstruction from the Perspective of Social Learning Theory

&
Received 11 Aug 2022, Accepted 03 May 2023, Published online: 22 May 2023

References

  • Akers, R. L. (1973). Deviant behavior: A social learning approach. Bureau of Justice Statistics. http://www.researchgate.net/publication/245914932_Deviant_Behavior_A_Social_Learning_Approach
  • Akers, R. L. (2011). Social learning and social structure: A general theory of crime and deviance. Piscataway.
  • Akers, R. L., & Gang, L. (1996). A longitudinal test of social learning theory: Adolescent smoking. Journal of Drug Issues, 26(2), 317–343. https://doi.org/10.1177/002204269602600203
  • Akers, R. L., & Jennings, W. G. (2019). The social learning theory of crime and deviance. In M. D. Krohn, N. Hendrix, G. Penly Hall, & A. J. Lizotte (Eds.), Handbook on crime and deviance (pp. 113–129). Springer International Publishing. https://doi.org/10.1007/978-3-030-20779-3_6
  • Akers, R. L., Krohn, M. D., Lanza-Kaduce, L., & Radosevich, M. (1995). Social learning and deviant behavior: A specific test of a general theory. In J. McCord & J. H. Laub (Eds.), Contemporary masters in criminology (pp. 187–214). Springer US. https://doi.org/10.1007/978-1-4757-9829-6_12
  • Alalwan, A. A. (2020). Mobile food ordering apps: An empirical study of the factors affecting customer e-satisfaction and continued intention to reuse. International Journal of Information Management, 50(1), 28–44. https://doi.org/10.1016/j.ijinfomgt.2019.04.008
  • Alsaggaf, R. M. (2019). Saudi women’s identities on Facebook: Context collapse, judgement, and the imagined audience. The Electronic Journal of Information Systems in Developing Countries, 85(2), e12070. https://doi.org/10.1002/isd2.12070
  • Aresta, M., Pedro, L., Santos, C., & Moreira, A. (2015). Portraying the self in online contexts: Context-driven and user-driven online identity profiles. Contemporary Social Science, 10(1), 70–85. https://doi.org/10.1080/21582041.2014.980840
  • Bandura, A. (1977). Social learning theory (Vol. 1). Prentice-Hall. https://doi.org/10.1007/978-1-4020-5614-7_3246
  • Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice Hall.
  • Bandura, A. (1978). Social learning theory of aggression. The Journal of Communication, 28(3), 12–29. https://doi.org/10.1111/j.1460-2466.1978.tb01621.x
  • Bareket-Bojmel, L., Moran, S., & Shahar, G. (2016). Strategic self-presentation on Facebook: Personal motives and audience response to online behavior. Computers in Human Behavior, 55(Part B), 788–795. https://doi.org/10.1016/j.chb.2015.10.033
  • Bearden, W. O., Hardesty, D. M., & Rose, R. L. (2001). Consumer self-confidence: Refinements in conceptualization and measurement. Journal of Consumer Research, 28(1), 121–134. https://doi.org/10.1086/321951
  • Brauer, J., & Tittle, C. (2012). Social learning theory and human reinforcement. Sociological Spectrum, 32(2), 157–177. https://doi.org/10.1080/02732173.2012.646160
  • Burgess, R. L., & Akers, R. L. (1966). A differential association-reinforcement theory of criminal behavior. Social Problems, 14(2), 128–147. https://doi.org/10.2307/798612
  • Chan, M. (2015). Mobile phones and the good life: Examining the relationships among mobile use, social capital and subjective well-being. New Media & Society, 17(1), 96–113. https://doi.org/10.1177/1461444813516836
  • Chang, Y. P., & Zhu, D. H. (2012). The role of perceived social capital and flow experience in building users’ continuance intention to social networking sites in China. Computers in Human Behavior, 28(3), 995–1001. https://doi.org/10.1016/j.chb.2012.01.001
  • Chen, H.-T., & Li, X. (2017). The contribution of mobile social media to social capital and psychological well-being: Examining the role of communicative use, friending and self-disclosure. Computers in Human Behavior, 75, 958–965. https://doi.org/10.1016/j.chb.2017.06.011
  • Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55(1), 591–621. https://doi.org/10.1146/annurev.psych.55.090902.142015
  • Correa, T., Hinsley, A. W., & de Zúñiga, H. G. (2010). Who interacts on the Web? The intersection of users’ personality and social media use. Computers in Human Behavior, 26(2), 247–253. https://doi.org/10.1016/j.chb.2009.09.003
  • Costello, M., Restifo, S. J., & Hawdon, J. (2021). Viewing anti-immigrant hate online: An application of routine activity and Social Structure-Social Learning Theory. Computers in Human Behavior, 124(7), 106927. https://doi.org/10.1016/j.chb.2021.106927
  • Dean, B. (2021, April 26). Social network usage & growth statistics: How many people use social media in 2021? https://backlinko.com/social-media-users
  • Deci, E. L., & Ryan, R. M. (2000). The “what” and “why” of goal pursuits: Human needs and the self-determination of behavior. Psychological Inquiry, 11(4), 227–268. https://doi.org/10.1207/S15327965PLI1104_01
  • Dengah, H. J. F., & Snodgrass, J. G. (2020). Avatar creation in videogaming: Between compensation and constraint. Games for Health Journal, 9(4), 265–272. https://doi.org/10.1089/g4h.2019.0118
  • Douglas, A. C., Mills, J. E., Niang, M., Stepchenkova, S., Byun, S., Ruffini, C., Lee, S. K., Loutfi, J., Lee, J.-K., Atallah, M., & Blanton, M. (2008). Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006. Computers in Human Behavior, 24(6), 3027–3044. https://doi.org/10.1016/j.chb.2008.05.009
  • Ellison, N. B., Heino, R., & Gibbs, J. (2006). Managing impressions online: Self-presentation processes in the online dating environment. Journal of Computer-Mediated Communication, 11(2), 415–441. https://doi.org/10.1111/j.1083-6101.2006.00020.x
  • Fox, J., & Rooney, M. C. (2015). The Dark Triad and trait self-objectification as predictors of men’s use and self-presentation behaviors on social networking sites. Personality and Individual Differences, 76, 161–165. https://doi.org/10.1016/j.paid.2014.12.017
  • Gill, P., Stewart, K., Treasure, E., & Chadwick, B. (2008). Methods of data collection in qualitative research: Interviews and focus groups. British Dental Journal, 204(6), 291–295. https://doi.org/10.1038/bdj.2008.192
  • Gil-Or, O., Levi-Belz, Y., & Turel, O. (2015). The “Facebook-self”: Characteristics and psychological predictors of false self-presentation on Facebook. Frontiers in Psychology, 6, 99. https://doi.org/10.3389/fpsyg.2015.00099
  • Goffman, E. (1959). The presentation of self in everyday life (1st ed.). Doubleday anchor books.
  • Green, T., Wilhelmsen, T., Wilmots, E., Dodd, B., & Quinn, S. (2016). Social anxiety, attributes of online communication and self-disclosure across private and public Facebook communication. Computers in Human Behavior, 58, 206–213. https://doi.org/10.1016/j.chb.2015.12.066
  • Guo, Y., Lu, Z., Kuang, H., & Wang, C. (2020). Information avoidance behavior on social network sites: Information irrelevance, overload, and the moderating role of time pressure. International Journal of Information Management, 52, 102067. https://doi.org/10.1016/j.ijinfomgt.2020.102067
  • Higgins, E. T. (1997). Beyond pleasure and pain. The American Psychologist, 52(12), 1280–1300. https://doi.org/10.1037/0003-066X.52.12.1280
  • Hongladarom, S. (2011). Personal identity and the self in the online and offline world. Minds and Machines, 21(4), 533–548. https://doi.org/10.1007/s11023-011-9255-x
  • Hu, C., Kumar, S., Huang, J., & Ratnavelu, K. (2017). Disinhibition of negative true self for identity reconstructions in cyberspace: Advancing self-discrepancy theory for virtual setting. PloS One, 12(4), e0175623. https://doi.org/10.1371/journal.pone.0175623
  • Hu, C., Kumar, S., Huang, J., & Ratnavelu, K. (2020). The predictors of users’ satisfaction in an anonymous environment: The role of the negative true self. Behaviour & Information Technology, 39(2), 213–225. https://doi.org/10.1080/0144929X.2019.1597165
  • Hu, C., Zhao, L., & Huang, J. (2015). Achieving self-congruency? Examining why individuals reconstruct their virtual identity in communities of interest established within social network platforms. Computers in Human Behavior, 50, 465–475. https://doi.org/10.1016/j.chb.2015.04.027
  • Huang, J., Zhao, L., & Hu, C. (2019). The mechanism through which members with reconstructed identities become satisfied with a social network community: A contingency model. Information & Management, 56(7), 103144. https://doi.org/10.1016/j.im.2019.01.006
  • Jackson, C. A., & Luchner, A. F. (2018). Self-presentation mediates the relationship between Self-criticism and emotional response to Instagram feedback. Personality and Individual Differences, 133, 1–6. https://doi.org/10.1016/j.paid.2017.04.052
  • Jang, W., Bucy, E. P., & Cho, J. (2018). Self-esteem moderates the influence of self-presentation style on Facebook users’ sense of subjective well-being. Computers in Human Behavior, 85, 190–199. https://doi.org/10.1016/j.chb.2018.03.044
  • Jeffrey, B., Bagala, M., Creighton, A., Leavey, T., Nicholls, S., Wood, C., Longman, J., Barker, J., & Pit, S. (2019). Mobile phone applications and their use in the self-management of Type 2 Diabetes Mellitus: A qualitative study among app users and non-app users. Diabetology & Metabolic Syndrome, 11(1), 84. https://doi.org/10.1186/s13098-019-0480-4
  • Kim, J., & Tussyadiah, I. P. (2013). Social networking and social support in tourism experience: The moderating role of online self-presentation strategies. Journal of Travel & Tourism Marketing, 30(1–2), 78–92. https://doi.org/10.1080/10548408.2013.751220
  • Kim, J., & Lee, J.-E R. (2011). The Facebook paths to happiness: Effects of the number of facebook friends and self-presentation on subjective well-being. Cyberpsychology, Behavior and Social Networking, 14(6), 359–364. https://doi.org/10.1089/cyber.2010.0374
  • Kim, Y., & Baek, Y. M. (2014). When is selective self-presentation effective? An investigation of the moderation effects of “self-esteem” and “social trust. Cyberpsychology, Behavior and Social Networking, 17(11), 697–701. https://doi.org/10.1089/cyber.2014.0321
  • Li, Y., Yang, S., Chen, Y., & Yao, J. (2018). Effects of perceived online–offline integration and internet censorship on mobile government microblogging service continuance: A gratification perspective. Government Information Quarterly, 35(4), 588–598. https://doi.org/10.1016/j.giq.2018.07.004
  • Lin, K.-Y., & Lu, H.-P. (2015). Predicting mobile social network acceptance based on mobile value and social influence. Internet Research, 25(1), 107–130. https://doi.org/10.1108/IntR-01-2014-0018
  • Malaquias, R. F., & Hwang, Y. (2019). Mobile banking use: A comparative study with Brazilian and U.S. participants. International Journal of Information Management, 44, 132–140. https://doi.org/10.1016/j.ijinfomgt.2018.10.004
  • Manago, A. M., Graham, M. B., Greenfield, P. M., & Salimkhan, G. (2008). Self-presentation and gender on MySpace. Journal of Applied Developmental Psychology, 29(6), 446–458. https://doi.org/10.1016/j.appdev.2008.07.001
  • Mason, J. (2002). Qualitative researching. SAGE Publications.
  • Middleton, L., Hall, H., & Raeside, R. (2019). Applications and applicability of Social Cognitive Theory in information science research. Journal of Librarianship and Information Science, 51(4), 927–937. https://doi.org/10.1177/0961000618769985
  • Mittal, A., Aggarwal, A., & Mittal, R. (2020). Predicting university students’ adoption of mobile news applications: The role of perceived hedonic value and news motivation. International Journal of E-Services and Mobile Applications, 12(4), 42–59. https://doi.org/10.4018/IJESMA.2020100103
  • Natarajan, T., Balasubramanian, S. A., & Kasilingam, D. L. (2017). Understanding the intention to use mobile shopping applications and its influence on price sensitivity. Journal of Retailing and Consumer Services, 37, 8–22. https://doi.org/10.1016/j.jretconser.2017.02.010
  • Netemeyer, R. G., Burton, S., & Lichtenstein, D. R. (1995). Trait aspects of vanity: Measurement and relevance to consumer behavior. Journal of Consumer Research, 21(4), 612–626. https://doi.org/10.1086/209422
  • Peng, A. Y. (2021). A techno-feminist analysis of beauty app development in China’s high-tech industry. Journal of Gender Studies, 30(5), 596–608. https://doi.org/10.1080/09589236.2021.1929091
  • Pitcan, M., Marwick, A. E., & Boyd, D. (2018). Performing a vanilla self: Respectability politics, social class, and the digital world. Journal of Computer-Mediated Communication, 23(3), 163–179. https://doi.org/10.1093/jcmc/zmy008
  • Pratt, T. C., Cullen, F. T., Sellers, C. S., Thomas Winfree, L., Madensen, T. D., Daigle, L. E., Fearn, N. E., & Gau, J. M. (2010). The empirical status of social learning theory: A meta‐analysis. Justice Quarterly, 27(6), 765–802. https://doi.org/10.1080/07418820903379610
  • Putnam, R. D. (2000). Bowling alone: The collapse and revival of American community. Simon & Schuster.
  • Ranzini, G., & Lutz, C. (2017). Love at first swipe? Explaining Tinder self-presentation and motives. Mobile Media & Communication, 5(1), 80–101. https://doi.org/10.1177/2050157916664559
  • Roger, D., Jarvis, G., & Najarian, B. (1993). Detachment and coping: The construction and validation of a new scale for measuring coping strategies. Personality and Individual Differences, 15(6), 619–626. https://doi.org/10.1016/0191-8869(93)90003-L
  • Rotter, J. (1982). The development and applications of social learning theory: Selected papers. Vt.:Praeger.
  • Runeson, P., & Höst, M. (2009). Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering, 14(2), 131–164. https://doi.org/10.1007/s10664-008-9102-8
  • Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. The American Psychologist, 55(1), 68–78. https://doi.org/10.1037//0003-066x.55.1.68
  • Standlee, A. (2019). Friendship and online filtering: The use of social media to construct offline social networks. New Media & Society, 21(3), 770–785. https://doi.org/10.1177/1461444818806844
  • Statista (2021). Distribution of Facebook users worldwide as of July 2021, by age and gender. Statista. Retrieved September 15, 2021, from https://www.statista.com/statistics/376128/facebook-global-user-age-distribution/
  • Strauss, A. L., & Corbin, J. M. (1990). Basics of qualitative research (Vol. 15). SAGE Publications.
  • Su, C. C., & Chan, N. K. (2017). Predicting social capital on Facebook: The implications of use intensity, perceived content desirability, and Facebook-enabled communication practices. Computers in Human Behavior, 72, 259–268. https://doi.org/10.1016/j.chb.2017.02.058
  • Suler, J. (2002). Identity management in cyberspace. Journal of Applied Psychoanalytic Studies, 4(4), 455–459. https://doi.org/10.1023/A:1020392231924
  • Sutherland, E. H. (1960). Principles of criminology. Lippincott.
  • Telzer, E. H., van Hoorn, J., Rogers, C. R., & Do, K. T. (2018). Chapter seven - social influence on positive youth development: A developmental neuroscience perspective. In J. B. Benson (Ed.), Advances in child development and behavior (Vol. 54, pp. 215–258). JAI. https://doi.org/10.1016/bs.acdb.2017.10.003
  • Tittle, C. (1995). Control balance: Toward a general theory of deviance. In Control balance: Toward a general theory of deviance (1st ed., p. 321). Westview. https://doi.org/10.4324/9780429501326
  • Toma, C. L. (2013). Feeling better but doing worse: Effects of Facebook self-presentation on implicit self-esteem and cognitive task performance. Media Psychology, 16(2), 199–220. https://doi.org/10.1080/15213269.2012.762189
  • Toma, C. L., Hancock, J. T., & Ellison, N. B. (2008). Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles. Personality & Social Psychology Bulletin, 34(8), 1023–1036. https://doi.org/10.1177/0146167208318067
  • Valkenburg, P. M., & Peter, J. (2008). Adolescents’ identity experiments on the internet: Consequences for social competence and self-concept unity. Communication Research, 35(2), 208–231. https://doi.org/10.1177/0093650207313164
  • Warr, M. (2002). Companions in crime: The social aspects of criminal conduct. Cambridge University Press. https://xs.paodekuaiweixinqun.com/books/about/Companions_in_Crime.html?hl=zh-CN&id=fRoxckjt3ZkC
  • WeAreSocial (2023, January 26). Digital 2023: Global overview report. Retrieved May 22, 2023, from https://datareportal.com/reports/digital-2023-global-overview-report
  • Wright, E. J., White, K. M., & Obst, P. L. (2018). Facebook false self-presentation behaviors and negative mental health. Cyberpsychology, Behavior and Social Networking, 21(1), 40–49. Retrieved from a9h. https://doi.org/10.1089/cyber.2016.0647
  • Xie, J.-Q., Rost, D. H., Wang, F.-X., Wang, J.-L., & Monk, R. L. (2021). The association between excessive social media use and distraction: An eye movement tracking study. Information & Management, 58(2), 103415. https://doi.org/10.1016/j.im.2020.103415
  • Yang, S., Liu, Y., & Wei, J. (2016). Social capital on mobile SNS addiction: A perspective from online and offline channel integrations. Internet Research, 26(4), 982–1000. https://doi.org/10.1108/IntR-01-2015-0010
  • Yuan, S., Liu, L., Su, B., & Zhang, H. (2020). Determining the antecedents of mobile payment loyalty: Cognitive and affective perspectives. Electronic Commerce Research and Applications, 41, 100971. https://doi.org/10.1016/j.elerap.2020.100971
  • Yurchisin, J., Watchravesringkan, K., & Mccabe, D. B. (2005). An exploration of identity re-creation in the context of internet dating. Social Behavior and Personality: An International Journal, 33(8), 735–750. https://doi.org/10.2224/sbp.2005.33.8.735

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.