512
Views
6
CrossRef citations to date
0
Altmetric
Communication Insight

The social dynamics of mobile group messaging

Pages 242-249 | Received 29 May 2017, Published online: 10 Sep 2017

References

  • Allen, D. (1988). New telecommunications services: Network externalities and critical mass. Telecommunications Policy, 12(3), 257–271. doi: 10.1016/0308-5961(88)90024-9
  • Barabási, A.-L. (2002). Linked: The new science of networks. Cambridge, MA: Persrus.
  • Baron, N. (2000). Alphabet to email: How written English evolved and where it’s heading. London: Routledge.
  • Berger, P., & Luckmann, T. (1967). The social construction of reality: A treatise in the sociology of knowledge. New York: Anchor.
  • Black, E. W., Mezzina, K., & Thompson, L. A. (2016). Anonymous social media – understanding the content and context of Yik Yak. Computers in Human Behavior, 57, 17–22. doi: 10.1016/j.chb.2015.11.043
  • Briscoe, B., Odlyzko, A., & Tilly, B. (2006). Metcalfe’s law is wrong-communications networks increase in value as they add members-but by how much? IEEE Spectrum, 43(7), 34–39. doi: 10.1109/MSPEC.2006.1653003
  • Burt, R. S. (2001). The social capital of structural holes. In M. F. Guillien, R. Collins, P. England, & M. Meyer (Eds.), New Directions in Economic Sociology. New York: Russell Sage.
  • Campbell, S. W. (2014). Mobile communication and network privatism: A literature review of the implications for diverse, weak, and new ties. Review of Communication Research, 3, 1–21.
  • Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996), 1194–1197. doi: 10.1126/science.1185231
  • Centola, D., & Macy, M. (2007). Complex contagions and the weakness of long ties. American Journal of Sociology, 113(3), 702–734. doi: 10.1086/521848
  • Fischer, C. (1992). America calling: A social history of the telephone to 1940. Berkeley: University of California.
  • Gladwell, M. (2006). The tipping point: How little things can make a big difference. New York: Little, Brown.
  • Greenwood, S., Perrin, rew, & Duggan, M. (2016). Social media update 2016. Washington, DC: Pew Research Center. Retrieved from http://www.pewinternet.org/2016/11/11/social-media-update-2016/
  • Herring, S. (1999). Interactional coherence in CMC. Journal of Computer-Mediated Communication, 4(4). doi: 10.1111/j.1083-6101.1999.tb00106.x
  • Lim, B.-L., Choi, M., & Park, M.-C. (2003). The late take-off phenomenon in the diffusion of telecommunication services: Network effect and the critical mass. Information Economics and Policy, 15(4), 537–557. doi: 10.1016/S0167-6245(03)00037-4
  • Ling, R. (2004). The mobile connection: The cell phone’s impact on society. San Francisco: Morgan Kaufmann.
  • Ling, R. (2012). Taken for grantedness: The embedding of mobile communication into society. Cambridge, MA: MIT Press.
  • Ling, R. (2016). Soft coercion: Reciprocal expectations of availability in the use of mobile communication. First Monday, 21(9). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/6814
  • Ling, R., & Canright, G. (2013). Perceived critical adoption transitions and technologies of social mediation. Ann Arbor, MI: Cell and Self Conference.
  • Ling, R., & Lai, C.-H. (2016). Microcoordination 2.0: Social coordination in the age of smartphones and messaging apps. Journal of Communication, 66(5), 834–856. doi: 10.1111/jcom.12251
  • Ling, R., & Yttri, B. (2002). Hyper-coordination via mobile phones in Norway. In James E. Katz, & M. Aakhus (Eds.), Perpetual Contact: Mobile Communication, Private Talk, Public Performance (pp. 139–169). Cambridge: Cambridge University Press.
  • Markus, L. M. (1987). Toward a ‘critical mass’ theory of interactive media: Universal access, interdependence and diffusion. Communication Research, 14(5), 491–511. doi: 10.1177/009365087014005003
  • Metcalfe, B. (1995). Metcalfe’s law: A network becomes more valuable as it reaches more users. Infoworld, 17(40), 53–54.
  • Prakash, B. A., Beutel, A., Rosenfeld, R., & Faloutsos, C. (2012). Winner takes all: Competing viruses or ideas on fair-play networks. In Proceedings of the 21st international conference on World Wide Web (pp. 1037–1046). New York, NY: ACM.
  • Rogers, E. M. (2003). Diffusion of innovations. New York, NY: Simon and Schuster.
  • Romero, D. M., Meeder, B., & Kleinberg, J. (2011). Differences in the mechanics of information diffusion across topics: Idioms, political hashtags, and complex contagion on twitter. In Proceedings of the 20th international conference on World Wide Web (pp. 695–704). Hyderabad, India: International World Wide Web Conference Committee.
  • Ross, C., Terras, M., Warwick, C., & Welsh, A. (2011). Enabled backchannel: Conference Twitter use by digital humanists. Journal of Documentation, 67(2), 214–237. doi: 10.1108/00220411111109449
  • Shen, X.-L., Cheung, C. M. K., & Lee, M. K. O. (2013). Perceived critical mass and collective intention in social media-supported small group communication. International Journal of Information Management, 33(5), 707–715. doi: 10.1016/j.ijinfomgt.2013.04.005
  • Sundsøy, P., Bjelland, J., Canright, G., Engø-Monsen, K., & Ling, R. (2010). Product adoption networks and their growth in a large mobile phone network. In 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Odense, Denmark: IEEE.
  • Travers, J., & Milgram, S. (1969). An experimental study of the small world problem. Sociometry, 32(4), 425–443. doi: 10.2307/2786545
  • Van Siyke, C., Ilie, V., Lou, H., & Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology. European Journal of Information Systems, 16(3), 270–283. doi: 10.1057/palgrave.ejis.3000680

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.