Gamification of Love: a Case Study of Tinder in Oslo

Total Page:16

File Type:pdf, Size:1020Kb

Gamification of Love: a Case Study of Tinder in Oslo Gamification of love: a case study of Tinder in Oslo Polyanna Rocha Det Humanistiske Fakultet IMK – Institutt for Medier og Kommunikasjon University of Oslo Spring 2018 Gamification of love: a case study of Tinder in Oslo Polyanna C Rocha Santos Nordic Media Program Det Humanistiske Fakultet IMK – Institutt for Medier og Kommunikasjon University of Oslo Spring 2018 © Polyanna C Rocha Santos 2018 Gamification of love: a case study of Tinder in Norway http://www.duo.uio.no/ Print: Reprosentralen, Universitetet i Oslo PREFACE This master’s thesis has been conducted at the Institute of Media and Communications - IMK, at the University of Oslo - UiO, SPRING semester 2018. It is the outcome of the MSc in Nordic Media. I thank my supervisor Anders Fagerjord for his careful supervision and patience during these semesters. I thank all participants for the insightful conversations and discussions. I also thank Maria Tårland, Student Consultant at IMK, who offered me a lot of help and support during my personal battle. I thank my classmates, in special Tina, Thanh and Angèlique, who I now happily call my friends, for their company over the last two and a half years. I also thank Bruninha, pelas palavras de apoio; Marcela, mesmo longe, se mantendo presente na minha vida e Pedro, pelos forninhos segurados nessa jornada. Tomas for all the support and encouragement at all times. Finally, I am happy and proud to be able to present what I feel is a strong and relevant thesis. I have worked hard to produce this original work, despite the difficulties. To my family in Brazil, agradeço por todo amor e carinho, mesmo que não façam ideia do que eu estudo. ABSTRACT Mobile dating applications have increased in popularity over recent years, with Tinder the first to break into the conventional online marketplace, bringing dating to the mobile sphere. This study examines how the Mechanics, Dynamics and Aesthetics (MDA framework) on Tinder’s design impacts the user perception of this mobile application and how the application is gamified. It is also discusses how online environments offer individuals an increased ability to control their self-presentation, and, therefore, greater opportunities to engage in misrepresentation. This case study of Tinder paves the way for future investigation into its use as a game. Keywords: Tinder, Mobile dating application, Gamification, Play, Games, Computer- mediated-communication, Self-presentation, Mechanics, Dynamics, Aesthetics. TABLE OF CONTENTS I INTRODUCTION ................................................................................................................. 1 1.1 Purpose of the study ....................................................................................................... 2 1.2 Objectives of the research and motivations ................................................................. 3 1.2.1 Relevance and contribution ..................................................................................... 4 1.2.2 Structure of the study............................................................................................... 4 1.2.3 Study Object ............................................................................................................. 5 II LITERATURE AND THEORY ......................................................................................... 8 2.1 History of dating on Internet ......................................................................................... 8 2.2 Mobile technology and mobile social media............................................................... 13 2.3 Brief history of gaming and mobile gaming ............................................................... 17 2.4 Gamification and play .................................................................................................. 19 2.5 Self-presentation and cues ........................................................................................... 25 2.6 MDA- Mechanics, Dynamics and Aesthetics ............................................................. 28 III METHODOLOGY ........................................................................................................... 32 3.1 Method Development ................................................................................................... 32 3.2 Sampling ........................................................................................................................ 35 3.3 Document Analysis ....................................................................................................... 35 3.4 Data Collection ............................................................................................................. 36 3.4.1 Semi-structured interviews .................................................................................... 36 3.4.2 Structured interviews ............................................................................................. 37 3.5 My own experiences: Participatory observation ....................................................... 38 3.6 Focus Group .................................................................................................................. 41 3.7 Ethical concerns ............................................................................................................ 41 3.8 Data Analysis ................................................................................................................ 44 IV ANALYSIS ........................................................................................................................ 46 4.1 The MDA- Mechanics, Dynamics and Aesthetics of Tinder .................................... 46 4.1.1 Mechanics ................................................................................................................ 46 4.1.2 Dynamics ................................................................................................................. 49 4.1.3 Aesthetics ................................................................................................................. 51 4.2 Social interactions on Tinder....................................................................................... 54 4.3 Interactions on Tinder as perceived by Tinder ......................................................... 57 4.4 Self-presentation and cues on Tinder ......................................................................... 62 4.5 Gamification on Tinder................................................................................................ 64 VI FINDINGS ......................................................................................................................... 67 5.1 Summary of Interviews ................................................................................................ 67 5.2 Summary of Focus Group ........................................................................................... 68 5.3 Themes ........................................................................................................................... 69 5.3.1 Thematic Analysis .................................................................................................. 71 5.3.1.1 Theme: Tinder .................................................................................................. 71 5.3.1.2 Theme: Self-presentation ................................................................................. 72 5.3.1.3 Theme: Gamification and playing .................................................................. 74 5.4 Summary of Interviews and Focus Group ................................................................. 76 5.5 Findings ......................................................................................................................... 77 5.5.1 Gamification of Love .............................................................................................. 77 VII CONCLUSION ................................................................................................................ 80 VIII REFERENCES............................................................................................................... 83 APPENDIX I ........................................................................................................................... 95 APPENDIX II ......................................................................................................................... 97 APPENDIX III ........................................................................................................................ 99 I INTRODUCTION There have never been more ways to communicate with one another than there are right now. Baym (2010: 1) The Internet has opened a new path for romantic interaction. Baym (2010) and Whitty (2013) have explained that social media has transformed the way people meet, interact and even live. New personal forms of communicating and connecting with others are often received with scepticism, until people start to see it as a new opportunity to interact with others. People were used to meeting their partners through proximity - through family and friends - but now meeting people through the Internet is surpassing every other form. Baym (2010) explains that in the middle of the 20th century, the telephone improved social interactions, helping people to feel closer more quickly, as a new form of personal connection. Through the introduction of the Internet, computers and mobile applications evolved this further. Baym (2010) points
Recommended publications
  • CS229 Project Report: Automated Photo Tagging in Facebook
    CS229 Project Report: Automated photo tagging in Facebook Sebastian Schuon, Harry Robertson, Hao Zou schuon, harry.robertson, haozou @stanford.edu Abstract We examine the problem of automatically identifying and tagging users in photos on a social networking environment known as Facebook. The presented au- tomatic facial tagging system is split into three subsys- tems: obtaining image data from Facebook, detecting faces in the images and recognizing the faces to match faces to individuals. Firstly, image data is extracted from Facebook by interfacing with the Facebook API. Secondly, the Viola-Jones’ algorithm is used for locat- ing and detecting faces in the obtained images. Fur- thermore an attempt to filter false positives within the Figure 1: Schematic of the Facebook crawler face set is made using LLE and Isomap. Finally, facial recognition (using Fisherfaces and SVM) is performed on the resulting face set. This allows us to match faces 2 Collecting data from Facebook to people, and therefore tag users on images in Face- book. The proposed system accomplishes a recogni- To implement an automatic image tagging system, one tion accuracy of close to 40%, hence rendering such first has to acquire the image data. For the platform we systems feasible for real world usage. have chosen to work on, namely Facebook, this task used to be very sophisticated, if not impossible. But with the recent publication of an API to their platform, this has been greatly simplified. The API allows third party applications to integrate into their platform and 1 Introduction most importantly to access their databases (for details see figure 1 and [3]).
    [Show full text]
  • Common Sites and Apps Used by Teens
    Common Sites and Apps Used by Teens SOCIAL NETWORKING: Facebook is the top social network on the web as it is used by more than 1 billion people each month. You can access this service using an app on a mobile device or internet service for a computer. People set up a profile and accept “friend requests.” There is a timeline to post events and share “status updates.” Certain groups can be set up as private or public. Users can be referenced in someone else’s text or picture (tagged). Teens are moving away from fb because many parents and grandparents are on the site. Officially, individuals should be 13 years of age to create an account but students in elementary schools report using this social networking site. Like Facebook, Twitter is a social network centered on microblogging with a 140-character text limit. An uploaded picture or text message is called a “Tweet.” The public can “follow” friends, celebrities, causes, businesses or tv shows. You can “tweet” live during a show by using # (hashtag). Students report concerning “subtweets,” which are comments intended for someone to see without mentioning their username, usually with a derogatory tone. Ask.fm is another popular pre-teen social networking website where users can ask other users questions. Users have to create an account to leave or receive comments. Ask.Fm is different than Facebook and Twitter because users can ask questions or leave comments anonymously. However, there is the option for users to not receive comments unless a sender identifies himself. This has been a popular venue for cyber-bullying.
    [Show full text]
  • Naval Reserve Command
    NAVAL RESERVE OFFICER TRAINING CORPS Military Science –1 (MS-1) COURSE ORIENTATION Training Regulation A. Introduction: The conduct of this training program is embodied under the provisions of RA 9163 and RA 7077 and the following regulations shall be implemented to all students enrolled in the Military Science Training to produce quality enlisted and officer reservists for the AFP Reserve Force. B. Attendance: 1. A minimum attendance of nine (9) training days or eighty percent (80%) of the total number of ROTC training days per semester shall be required to pass the course. 2. Absence from instructions maybe excuse for sickness, injury or other exceptional circumstances. 3. A cadet/ cadette (basic/advance) who incurs an unexcused absence of more than three (3) training days or twenty percent (20%) of the total number of training during the semester shall no longer be made to continue the course during the school year. 4. Three (3) consecutive absences will automatically drop the student from the course. C. Grading: 1. The school year which is divided into two (2) semesters must conform to the school calendar as practicable. 2. Cadets/ cadettes shall be given a final grade for every semester, such grade to be computed based on the following weights: a. Attendance - - - - - - - - - - 30 points b. Military Aptitude - - - - - 30 points c. Subject Proficiency - - - - 40 points 3. Subject proficiency is forty percent (40%) apportioned to the different subjects of a course depending on the relative importance of the subject and the number of hours devoted to it. It is the sum of the weighted grades of all subjects.
    [Show full text]
  • A Close Look at Tinder Bots
    A Close Look at Tinder Bots Tahora H. Nazer∗ Fred Morstatter∗ Gareth Tysony Huan Liu∗ Abstract Tinder is a popular dating app that allows users to discover potential dating partners with close geographical proximity. Tinder is the first dating app in several countries and has more than 50 million users. However, many of these users are bots with malicious intent. The first step in dealing with this issue is understanding the characteristics of Tinder bots. Toward this aim, we have proposed a ground truth collection method to acquire bots to study. Our method combines honeypot methods and manual annotation. We find that probing messages is a reliable method to distinguish bots from humans as bots promote malicious URLs and direct users to phishing sites. Our observations on the collected bots show that they are more complex than bots that are studied in other social media sites. Tinder bots have profiles that are very hard to differentiate from normal users. We explore activity and profiles of these bots and report the characteristics that can be used in building a supervised learning approach for bot detection. 1 Introduction Tinder1 is one of the most popular dating applications for Android and iOS mobile phones. Tinder is recognized as the most downloaded app in 18 countries with the biggest app Figure 1: User life-cycle on Tinder. After a user joins Tinder, markets. In several countries including USA, UK, Canada, majority of the time is spent for matching and messaging. and Australia, Tinder is the most popular dating app2. Tinder has more than 50 million users [1] and they spend around 77 is no way to access user profiles unless they are shown by an minutes on it [5] every day.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Suspect Social Web Sites Tinder – a Photo/ Messaging Dating App For
    May 12, 2017 PO Box 190242 ● Boise ID 83719 Suspect Social Web Sites Tinder – A Photo/ Messaging dating app for browsing pictures within a certain-mile radius of user’s location. It can be dangerous for teens to meet up with strangers within their geographic location. Instagram – Lets users snap, edit and share photos as well as 15 second videos publicly or with network of followers. Public Photos is the default setting unless privacy settings are used. Private messaging is also an option through Instagram Direct. Teens can be on lookout for “Likes” or “Comments” as a measure of “success”, self-worth and popularity. Snapchat – Lets users put time limit on photos/ videos sent before disappearing. Teens use to send embarrassing images believing they won’t go public. Persons receiving can take screen shot before image disappears and has also been hacked for recovery purposes. Makes “sexting” seem safe encouraging users to send sexual images; some of which have been used for extortion of sender commonly known as “Sextortion”. Tumblr – Streaming scrapbook of texts, photos, and/or video/audio clip postings. Porn easy to find via raunchy, pornographic images & videos which often also depict violence, self-harm, drug use and offensive language. First profiles are public and viewable by any internet user with subsequent privacy settings only available via awkward workarounds. Posts are often copied and shared. Kik-Messenger – A texting app that allows communication with strangers using their Kikusernames to find people to chat with. Also has a Kikcommunity blog where users can submit photos of themselves and screenshot messages; sometimes displaying user’s full name.
    [Show full text]
  • Introduction to Online Dating
    INTRODUCTION TO ONLINE DATING Whatever you’re looking for…it’s out there What is Online Dating Searching for a romantic partner on the Internet via a dedicated website usually with the goal of creating a real-world relationship Other People via their Online Profile You Your Online Profile What is Online Dating 35, doctor, likes outdoors 42, accountant, divorced, plays in a band You 37, fireman, loves to cook Some Numbers Online Dating is a good place to meet people* 2005: 44% 2015: 59% Online dating is the 2nd most common way to meet people** 66% of online dating users have gone on a date with someone they met online* 50% of couples expected to meet online by 2031** *PEW Research **eHarmony Study Pros & Cons Low pressure, not Behind a screen face to face at start May cost money, Time and cost-effective does take time Big pool of users Big pool of users Customize to your taste 3 Types of Dating Sites All-Purpose Phone App (Swipers) Niche Age Match Tinder Race OKCupid Bumble Religion eHarmony Interests Choosing Your Site(s) Cost Depth of profiles User Base Reputation Match.com Well-known, respectable. Largest paid user base in the U.S. In-depth questionnaire takes about 30 minutes to complete Free to join (email) and browse – must subscribe to communicate Match.Com Match.Com Sends you daily “matches” based on profiles Reverse Matching: Search profiles of people who say they are looking for the things in your profile Date Spark: Propose a date idea and see who responds or respond to a proposed idea OKCupid Well-known, large user base Profile is quick to set-up, with additional questions to answer as you see fit.
    [Show full text]
  • Murphy V. Twitter, Inc
    -1 F I LED 2 San FrancIsco County Superior Court JUN 1 2 2019 3 CLERK iO,R ~HE COURT 4 BY: J,\f,!lt(r).'J.W"--- . }t.I\ _ I, Deputy Clerk ·5 6 7 8 9 SUPERIOR COURT OF THE STATE OF CALIFORNIA 10 COUNTY OF SAN FRANCISCO 11 MEGHAN MURPHY, Case No. CGC-19-573712 12 Plaintiff, ORDER DENYING SPECIAL MOTION 13 TO STRIKE THE COMPLAINTi v. UNDER CALIFORNIA CODE OF 14 CIVIL PROCEDURE SECTIONI425.16 TWITTER, INC., a California corporation; AND SUSTAINING DEMURRER TO 15 TWITTER INTERNATIONAL COMPANY COMPLAINT WITHOUT LEAVE TO an Irish registered company, ' AMEND 16 Defendants. 17 18 19 20 21 22 23 24 25 26 27 28 I I Case No. CGG-19-S73712 ORDER 1 On May 7,2019, the Court heard Defendants Twitter, Inc. and Twitter International " I 2 Company's (together, "Twitter") special motion to strike the complaint under California Gode of 3 Civil Procedure section 425.16 and Defendants' demurrer to the complaint The parties a~eared 4 by their respective counsel of record. This "constitutes the Court's orders on both motions! 5 Factual Allegations of the Complaint 6 Twitter is a private internet communications platform that users can join and use f0r free by I " 7 posting content, limited to a certain number of characters, referred to as "Tweets." Plaintifff : 8 Meghan Murphy is a self-described "feminist writer and journalist" who resides in Vancouver, I I 9 British Columbia, Canada. (Compi. ~~ 5, 20,"70.) She joined the Twitter platform in Apq12011, 10 and used it to "disCuss news.~orth~ events and public ~ssues, ~hare ~c~es, podcasts and 1ideos,.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • The Meet Group Teams with Digital Identity Company Yoti to Help Create Safer Communities Online
    The Meet Group teams with digital identity company Yoti to help create safer communities online NEW HOPE, Pa., July 24, 2019 - The Meet Group,Inc. (NASDAQ: MEET), a leading provider of ​ ​ ​ interactive live streaming solutions, and Yoti, a digital identity company, today announced that The ​ ​ Meet Group plans to trial Yoti’s innovative age verification and age estimation technologies designed to create safer communities online. The Meet Group, with more than 15 million monthly active users, helps people to find connection and community through its social networking and dating apps. As a company committed to the protection of its users, The Meet Group devotes approximately half of its workforce to safety and moderation, ​ and continuously reviews its safety procedures with the goal of meeting the highest standards of ​ online safety and security. The relationship allows Yoti to enhance The Meet Group’s strong existing safety measures, letting ​ ​ users verify their age with Yoti’s age estimation technology Yoti Age Scan, or the free Yoti app where ​ ​ a date of birth is verified to a government issued photo ID. Yoti’s technology can help moderators at The Meet Group ensure that minors do not create accounts. Geoff Cook CEO at The Meet Group commented, “A key part of helping people to create ​ ​ meaningful connections is to keep them safe online. We have already committed ourselves to one-tap report abuse capability, clear and frequent safety education, and proactive and transparent moderation, and now with Yoti’s age verification and estimation technologies, we look forward to being one of the few app operators in social or dating who can respond to reports of underage users quickly and accurately.
    [Show full text]
  • Some Mobile Apps Add Anonymity to Social Networking
    Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks.
    [Show full text]
  • Privacy Perceptions of Photo Sharing in Facebook
    Privacy Perceptions of Photo Sharing in Facebook Andrew Besmer, Heather Richter Lipford Department of Software and Information Systems University of North Carolina at Charlotte 9201 University City Blvd. Charlotte, NC 28223 {arbesmer, Heather.Lipford}@uncc.edu 1. INTRODUCTION Online photo sharing applications are increasingly popular, offering users new and innovative ways to share photos with a variety of people. Many social networking sites are also incorporating photo sharing features, allowing users to very easily upload and post photos for their friends and families. For example, Facebook is the largest photo sharing site on the Internet with 14 million photos uploaded daily [2]. Integrating photo Figure 1. Example of Facebook and Prototype sharing within social networking communities has also provided the opportunity for user-tagging, annotating and linking images to the identities of the people in them. This feature further increases 3. RESULTS the opportunities to share photos among people with established As with other photo sharing sites, users expressed the social value offline relationships and has been largely successful. However, of being able to upload and view photos within their social this increased access to an individual’s photos has led to these networks. No doubt this social value is the reason 14 million new images being used for purposes that were not intended. For photos are added on Facebook each day. However, not example, photos on Facebook profiles have been used by surprisingly, users do have privacy concerns that are difficult to employers [5] and law enforcement [6] to investigate the behavior deal with due the wide reach of their images and the lack of of individuals.
    [Show full text]