125
Views
5
CrossRef citations to date
0
Altmetric
Articles

Disclosure of Gender Identity in Internet Forums: A Case Study of Saudi Arabian Forum Communication

&
Pages 233-257 | Published online: 25 Oct 2017

References

  • Alebaikan, Reem, & Troudi, Salah. (2010). Online discussion in blended courses at Saudi universities. Procedia Social and Behavioral Sciences,2 (2), 507–514.
  • Al-Jarf, Reima. (2006). Teachers’ online discussion forums in Saudi Arabia. Paper presented at the 3rd International Symposium on Teacher Education, Canakkale, Turkey. ERIC Document Reproduction Service No. ED497499. Retrieved November 28, 2012, from http://faculty.ksu.edu.sa/aljarf/Publications/Forms/AllItems.aspx
  • Al-Lily, Abdulrahman. (2011). Online and under veil: Technology-facilitated communication and Saudi female experience within academia. Technology in Society, 33 (1-2), 119–127.
  • Al-Saggaf, Yeslam. (2004). The effect of online community on offline community in Saudi Arabia. Electronic Journal of Information Systems in Developing Countries (EJISDC),16 (2), 1–16.
  • Al-Saggaf, Yeslam. (2011). Saudi females on Facebook: An ethnographic study. InternationalJournal of Emerging Technologies and Society, 9 (1), 1–19.
  • Al-Saggaf, Yeslam. (2012). Online communities in Saudi Arabia: An ethnographic study. Saarbrücken: LAP Lambert Academic Publishing.
  • Al-Saggaf, Yeslam, & Begg, Mohamed M. (2004). Online communities versus offline communities in the Arab/Muslim world. Journal of Information, Communication and Ethics in Society, 2 (1), 41–54.
  • Al-Saggaf, Yeslam, & Weckert, John. (2004). The effects of participation in online communities on individuals in Saudi Arabia. Computers and Society ACM SIGCAS,34 (1), 1.
  • Armentor-Cota, Janet. (2010). Online gendered interactions: Exploring divergent perspectives. Global Journal of Human Social Science,10 (3), 2–12.
  • Armentor-Cota, Janet. (2011). Multiple perspectives on the influence of gender in onlineinteractions. Sociology Compass, 5 (1), 23–26.
  • Baki, Roula (2004). Gender-segregated education in Saudi Arabia: Its impact on social norms and the Saudi labor market. Education Policy Analysis Archives, 12 (28). Retrieved November 28, 2012, from http://epaa.asu.edu/epaa/v12n28/
  • Bechar-Israeli, Haya. (1995). From to: Nicknames, play, and identity on internet relay chat. Journal of Computer-mediated Communication, 1 (2). Retrieved November 28, 2012, from http://jcmc.indiana.edu/voll/issue2/bechar.html
  • Burkhalter, Byron. (1999). Reading race online: Discovering racial identity in Usenet discussions. In M.A. Smith & P. Kollock (Eds), Communities in cyberspace (pp. 60–75). London: Routledge.
  • Calvert, Sandra L., Mahler, Brian A., Zehnder, Sean M., Jenkins, Abby, & Lee, Mickey S. (2003). Gender differences in preadolescent children’s online interactions: Symbolic modes of self-presentation and self-expression. Journal of Applied Developmental Psychology,24 (6), 627–644.
  • Cornetto, Karen M., & Nowak, Kristine L. (2006). Utilizing usernames for sex categorization in computer-mediated communication: Examining perceptions and accuracy. CyberPsychology & Behavior, 9 (4), 377–387.
  • Curtis, Pavel. (1997). Mudding: Social phenomena in text-based virtual realities. In S.B. Kiesler (Ed.), Culture of the internet (pp. 121–142). Mahwah, NJ: Erlbaum.
  • Danet, Brenda, Ruedenberg-Wright, Lucia, & Rosenbaum-Tamari, Yehudit. (1997). Hmmm...where’s that smoke coming from?: Writing, play and performance on internet relay chat. Journal of Computer-mediated Communication, 2 (4). Retrieved November 28, 2012, from http://jcmc.indiana.edu/vol2/issue4/danet.htmb1imasking
  • Del-Teso-Craviotto, Marisol. (2008). Gender and sexual identity authentication in language use: The case of chat rooms. Discourse Studies,10, 251–227.
  • Dery, Mark. (1994). Flame wars: The discourse of cyberculture. Durham, NC: Duke University Press.
  • Donath, Judith. (1999). Identity and deception in the virtual community. In M.A. Smith & P. Kollock (Eds), Communities in cyberspace (pp. 29–59). London: Routledge.
  • Fogel, Joshua, & Nehmad, Elham. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25 (1), 153–160.
  • Gunawardena, Charlotte N., Alami, Ahmed Idrissi, Jayatilleke, Gayathri, & Bouachrine, Fadwa. (2009). Identity, gender, and language in synchronous cybercultures: A cross-cultural study. In R. Goodfellow & M.-N. Lamy (Eds), Learning cultures in online education (pp. 30-51). London: Continuum International Publishing Group.
  • Hanna, Barbara E., & de Nooy, Juliana. (2009). Learning language and culture via public internet discussion forums. Basingstoke and New York: Palgrave Macmillan.
  • Herring, Susan C. (1993). Gender and democracy in computer-mediated communication. Electronic Journal of Communication, 3 (2). Retrieved November 28,2012, from http://ella.slis.indiana.edu/—herring/ejc.txt
  • Herring, Susan C. (1994). Gender differences in computer-mediated communication:Bringing familiar baggage to the new frontier. Keynote talk presented at the American Library Association Annual Convention, Miami, FL. Retrieved November 28, 2012, from http://www.mith2.umd.edu/Womens5tudies/Computing/Articles%2BResearchPapers/gender-differences-communication?
  • Herring, Susan C. (1996). Posting in a different voice: Gender and ethics in computer-mediated communication. In C. Ess (Ed.), Philosophical perspectives on computer-mediated communication (pp. 115–145). Albany, NY: State University of New York Press.
  • Herring, Susan C., Scheidt, Lois Ann, Bonus, Sabrina, & Wright, Elijah. (2004). Bridging the gap: A genre analysis of weblogs. Paper presented at the 37th Hawaii International Conference on System Sciences (HICSS-37), Los Alamitos.
  • Jaffe, J. Michael, Lee, Young-Eum, Huang, Li-Ning, & Oshagan, Hayg (1999). Gender identification, interdependence and pseudonyms in CMC: Language patterns in an electronic conference. The Information Society,15 (4), 221-234.
  • Joinson, Adam (2007). Disinhibition and the internet. In J. Gackenbach (Ed.), Psychology and the internet (2nd edition, pp. 75–92). Boston: Academic Press.
  • Joinson, Adam N., & Paine, Carina B. (2007). Self-disclosure, privacy and the internet. In A. Joinson, K. McKenna, T. Postmes, & U.-D. Reips (Eds), Oxford handbook of Internet psychology (pp. 237–252). Oxford, UK: Oxford University Press.
  • Kendall, Lori. (1998). Are you male or female? Gender performances on Muds. In J. O’Brien & J. Howard (Eds), Everyday inequalities: Critical inquiries (pp. 157–187). Oxford: Blackwell.
  • Matheson, Kimberly, & Zanna, Mark P. (1992). Computer-mediated communi-cations: The focus is on me. Social Science Computer Review, 8 (1), 1–12.
  • McKenna, Katelyn Y.A., & Bargh, John. A. (2000). Plan 9 from cyberspace: The implications of the internet for personality and social psychology. Personality and Social Psychology Review, 4 (1), 57–75.
  • Miller, Jane, & Durndell, Alan. (2004). Gender, language and computer-mediated communication. In K. Morgan, C.A. Brebbia, J. Sanchez, & A. Voiskounsky (Eds), Human perspectives in the internet society: Culture, psychology and gender (pp. 235–244). Southampton: WIT Press.
  • O’Brien, Jodi. (1999). Writing in the body: Gender (re)production in online interaction. In M.A. Smith & P. Kollock (Eds), Communities in cyberspace (pp. 76–104). London: Routledge.
  • Pagnucci, Mauriello. (1999). The masquerade: Gender, identity, and writing for the web. Computers and Composition,16 (1), 141–151.
  • Park, S. Joon, Zhang, Qiping, & Ma, Shanshan. (2006). A comparative study on publicly hosted blog sites in the US, China, and Korea. Proceedings of the American Society for Information Science and Technology, 43 (1), 1–12.
  • Rheingold, Howard. (1993). The virtual community: Homesteading on the electronic frontier. Reading, MA: Addison-Wesley.
  • Saudi Students Club Brisbane Forum (2005-2008). Retrieved July 14, 2008, from http://www.sscbrisbane.com/vb1/
  • Savicki, Victor, Lingenfelter, Dawn, & Kelley, Merle. (1996). Gender language style and group composition in internet discussion groups. Journal of Computer-mediated Communication,2 (3). Retrieved November 28, 2012, from http://jcmc.indiana.edu/vol2/issue3/savicki.html
  • Scheidt, Lois A. (2001). Avatars and nicknames in adolescent chat spaces. Lois Ann Scheidt Academic Webpage. Retrieved November 28, 2012, from http://loisscheidt.com/working_papers_archive/Avatars_andNicknames.pdf
  • Sharif, Ahmad A., & Al-Kandari, Ali A. (2010). The use of online bulletin boards by females in the Gulf Cooperation Council Countries. Telematics and Informatics, 27 (1), 42–50.
  • Sproull, Lee, & Kiesler, Sara. (1986). Reducing social context cues: Electronic mail in organizational communication. Management Science, 32 (11), 1492–1512.
  • Sproull, Lee, & Kiesler, Sara. (1991). Connections: New ways of working in the networked organization. Cambridge, MA: MIT Press.
  • Stone, Allucquere Rosanne. (1995). The war of desire and technology at the close of the mechanical age. Cambridge, MA, and London: MIT Press.
  • Teitelbaum, Joshua. (2002). Dueling for da’wa: State vs society on the Saudi internet. Middle East Journal, 56 (2), 223–239.
  • Turlde, Sherry. (1995). Life on the screen: Identity in the age of the internet. New York: Simon & Schuster.
  • Yum, Young-ok, & Hara, Kazuya. (2005). Computer-mediated relationship development: A cross-cultural comparison. Journal of Computer-mediated Communication, 11 (1), Retrieved November 28, 2012, from http://jcmc.indiana.edu/voll1/issuel/yum.html

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.