An Exploration of Satirical Internet Memes Effect on Brand Image

Total Page:16

File Type:pdf, Size:1020Kb

An Exploration of Satirical Internet Memes Effect on Brand Image An Exploration of Satirical Internet Memes Effect on Brand Image Course: 2FE21E Semester: VT-20 Examinator: Åsa Devine Tutor: Viktor Magnusson Group: C3 Christopher Kontio Klara Gradin Melker Pripp Acknowledgments We would like to thank our tutor Viktor Magnusson for his guidance, time, and support throughout the writing process of this thesis. As well as Dan Halvarsson for assisting us with the methodological aspects of this thesis. We would also like to thank our examiner, Åsa Devine for conducting seminars that provided us with critical but fair feedback. Finally, we would like to express our gratitude towards all of the interview participants that volunteered and took time out of their days to be a part of this study, Thank you. Abstract The owner(s) of a brand decide the attributes of the brand, such as name, color, shape, logotype and values. They have the power and control on what they are communicating to the consumers. However, consumers can freely interpret any information that is being communicated towards them and shape their own perception of the brand. Internet memes can be categorised as a type of satirical communication method that can be used by consumers. The purpose is to explore how satire through the medium of internet memes affect brand image. This research used a qualitative research approach with a cross sectional research design, in the form of semi-structured interviews. The sample consisted of people from the age 20-30 that had knowledge about memes to some degree. A total of 15 interviews were implemented and took approximately 30 minutes each to execute. The conducted research gave insight to how satirical memes can potentially affect consumers perception of brand image. What was discovered was that satirical memes had the potential to possibly affect certain aspects of both the cognitive and emotional components of brand image. When the participants had a neutral or negative pre-determined brand image it was possible to see a negative shift in their perception of this brand image through negative reinforcement. While on the other side, when participants had a strong and positive pre- determined brand image, the satirical memes affected them differently, as they did not make them negative towards the brand but became critical instead. These alterations showed that there was the potential to affect the participants purchase & usage situations and through the satirical memes effect on the different cognitive and emotional components, could possibly change the perception of a brand image as a whole. TABLE OF CONTENTS 1.Introduction 1 1.1 Background 1 1.2 Problem Discussion 3 1.3 Purpose 7 1.4 Research Question(s) 6 2. Theoretical Framework 7 2.1 Brand Image 7 2.1.1 Brand trust 8 2.1.2 Emotional 9 2.1.3 Cognitive 10 2.2 Memes as images 11 2.2.1 Components of Imagery Memes 12 2.2.1.1 Hyper-signification 12 2.2.1.2 Prospective Photography 12 2.2.1.3 Operative signs 13 2.3 Proposed Conceptual Model 13 3. Method 14 3.1 Research Approach 14 3.1.1 Research Strategy 15 3.2 Research Design 16 3.2.1 Conduction of satirical memes 17 3.3 Data collection method 18 3.3.1 Interview Guide General Fel! Bokmärket är inte definierat.0 3.3.2 Pre-test 19 3.3.2.1 Pilot Guide 21 3.3.2.2 Our Pre Test 21 3.3.3 Interview Conduction Guideline 21 3.3.3.1 Our Interview Guide 21 3.3.3.2 Conduction of Interview 21 3.4 Operationalization 22 3.5 Sampling 25 3.5.1 Sample Frame 26 3.5.2 Sample selection 26 3.5.3 Saturation 27 3.6 Data Analysis Method 27 3.7 Research quality 28 3.7.1 Credibility 28 3.7.2 TransFerability 29 3.7.3 Dependability 29 3.7.4 Confirmability 29 3.7.5 Authenticity 29 3.8 Ethical Implications of the Study 30 3.9 Societal implications of the study 31 4. Empirical 32 4.1 Pre Meme Exposure 32 4.1.1 Sony 32 4.1.2 Nike 34 4.1.3 KFC 35 4.1.4 Memes 37 4.2 Post Meme Exposure 38 4.2.1 Style & Design 38 4.2.2 Quality 39 4.2.3 Personality & Values 40 4.2.4 Purchase & Usage Situation 41 4.2.5 History & Experiences 42 4.2.6 Thought Process 42 5. Analysis 447 5.1 Analysis of Cognitive components 447 5.1.1 Quality 44 5.1.2 Style & Design 46 5.1.3 Price 47 5.2 Analysis of Emotional components 471 5.2.1 History & Experiences 48 5.2.2 Negative Reinforcement 49 5.2.3 Critical 50 6. Conclusion Fel! Bokmärket är inte definierat.6 7. Limitations & Implications for Future Research Fel! Bokmärket är inte definierat.2 Reference list: Fel! Bokmärket är inte definierat.3 AppendiX 1 Fel! Bokmärket är inte definierat.3 AppendiX 2 683 AppendiX 3 705 AppendiX 4 749 AppendiX 5 80 1.Introduction 1.1 Background Brands are a core element of building a successful business and can also be defined as the major communication tool that the company has with the consumers (Kotler and Keller, 2012). The owner(s) of a brand decide the attributes of the brand such as name, color, shape, logotype and values. They have the power and control on what they are communicating to the consumers (Kapferer, 2008). However, consumers can freely interpret any information that is being communicated towards them and shape their own perception of the brand. Thus, brand image is created. Brand image can be described as how a brand is being perceived by consumers and other stakeholders. Further explained, It is the overall picture including all attributes and therefore the personality of the brand (Balmer and Greyser, 2003). Consumers now control and conclude their own imagery in terms of sets of beliefs, ideas, and impressions regarding the brand (Kotler and Keller, 2012). Reynolds (1965) defines brand image as “The mental construct developed by the consumer on the basis of a few selected impressions among the flood of the total impressions; it comes into being through a creative process in which these selected impressions are elaborated, embellished, and ordered” (Reynolds, 1965, p. 69). In later years, Keller (1993) regarded brand image as perceptions that consumers associate with a particular brand.While the definition of brand image has been slightly simplified over time. Brand image as a concept has been further developed and advanced. Today, the components of brand image can be categorised into emotional components and cognitive components. These two dimension are distinctive yet interrelated and explain the basis of how brand image is formed and shaped. Emotional associations involve subjective feelings, such as excitement, happiness and joy. Cognitive associations reflect a consumer’s personal beliefs, thoughts and evaluations of a brand related to its product attributes (Cho and Fiore, 2015). Utilizing these dimensions in a positive manner creates trust and engagement among consumers. When using emotional branding, marketers are attempting to establish brands that are 1 directly connected to consumers emotions. By doing this, a lifetime bond can be created between the brand and the consumers. This is when a consumer feels that the brand is a part of his/her identity (Solomon, 2018). In today’s society, social media plays a big role and both applications and websites are constantly increasing, and consumers have the possibility to interact directly with brands on social media platforms (Tuten and Solomon, 2018). One example of a communication tool that can be used both by the brand and the consumers of the brand is internet memes. Internet memes are something that have become more popular in marketing, especially when it comes to reaching out to a younger audience, such as millenials (Carr, 2019). Internet memes are typically funny and one type of internet meme is the satirical internet meme. Satirical comedy can be viewed as a classical form of comedy and it is still apparent in everyday communication (Simpson, 2003). Satire in itself is a very old form of criticism, the word stems from the Latin word “Satur” and originally meant “Well Fed”. The origins of literary Satire is accredited to the Greek Poet Aristophane, as far back as 411 BC. Since that time, it has evolved and can be seen in a variety of mediums. There are satirical books, tv shows, movies, and has been used many times in political cartoons to bring different topics to light (Masterclass, 2019). Satire can be delivered in the form of puns, jokes, or whimsical stories etc. It is often described as a social lubricant, much like many forms of comedy, and allows critical statements to come off as non-threatening. Satire is composed of three parties, the satirist, the satiree, and the satirized. The satirist is the creator of the text, image, video, song etc. The satiree is the audience, be it the reader, listener, viewer etc. Lastly, the satirized is the target who is being criticized (Simpson, 2003). It is important to understand how the satiree’s perceive the satirised. When successfully implemented, the satirist should establish a closer bond to the satiree, while unsuccessful attempts cause the reverse desired effect and strengthen the bond between the satiree and the satirised (Simpson, 2003). The word meme is from the beginning known from the book “The Selfish Gene” written by Richard Dawkins, a British ethologist, evolutionary biologist, and science writer. In addition to 2 that Richard Dawkins describes the meme as a cultural imitation process between people (Shifman, L., 2013).
Recommended publications
  • The Influence of Anonymity on Participation in Online Communities
    Thèse de doctorat de l’UTT Malte PASKUDA The Influence of Anonymity on Participation in Online Communities Spécialité : Ingénierie Sociotechnique des Connaissances, des Réseaux et du Développement Durable 2016TROY0033 Année 2016 THESE pour l’obtention du grade de DOCTEUR de l’UNIVERSITE DE TECHNOLOGIE DE TROYES Spécialité : INGENIERIE SOCIOTECHNIQUE DES CONNAISSANCES, DES RESEAUX ET DU DEVELOPPEMENT DURABLE présentée et soutenue par Malte PASKUDA le 24 octobre 2016 The Influence of Anonymity on Participation in Online Communities JURY M. M. BAKER DIRECTEUR DE RECHERCHE CNRS Président (Rapporteur) Mme N. GAUDUCHEAU MAITRE DE CONFERENCES Examinateur Mme M. LEWKOWICZ PROFESSEUR DES UNIVERSITES Directeur de thèse M. M. PRILLA PROFESSOR Rapporteur M. M. ROHDE DOKTOR Examinateur Acknowledgements Myriam Lewkowicz Michael Baker Michael Prilla Nadia Gauducheau Markus Rohde Michel Marcoccia Valentin Berthou Matthieu Tixier Hassan Atifi Ines Di Loreto Karine Lan Lorraine Tosi Aurlien Bruel Khuloud Abou Amsha Josslyn Beltran Madrigal Les membres de lquipe Tech-CICO et les membres du projet TOPIC trouvent ici mes remerciements les plus sincres. Abstract This work presents my PhD thesis about the influence of anonymity on par- ticipation in online environments. The starting point of this research was the observation of the design process of an online platform for informal caregivers. I realized that there is no knowledge about the practical effects that an anony- mous identity system would have. This thesis contains the subsequent literature review, which has been synthesized into a model that shows which participation factors might be influenced by anonymity. Three studies on existing online en- vironments have been conducted: One on Youtube, where there was a change in the comment system forbidding anonymous comments; one on Quora, where users can choose to answer questions anonymously; and one on Hacker News, where users choose how many identity factors they want to present and which name they use.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • The Rhetorics of the Voltron: Legendary Defender Fandom
    "FANS ARE GOING TO SEE IT ANY WAY THEY WANT": THE RHETORICS OF THE VOLTRON: LEGENDARY DEFENDER FANDOM Renee Ann Drouin A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2021 Committee: Lee Nickoson, Advisor Salim A Elwazani Graduate Faculty Representative Neil Baird Montana Miller © 2021 Renee Ann Drouin All Rights Reserved iii ABSTRACT Lee Nickoson, Advisor The following dissertation explores the rhetorics of a contentious online fan community, the Voltron: Legendary Defender fandom. The fandom is known for its diversity, as most in the fandom were either queer and/or female. Primarily, however, the fandom was infamous for a subsection of fans, antis, who performed online harassment, including blackmailing, stalking, sending death threats and child porn to other fans, and abusing the cast and crew. Their motivation was primarily shipping, the act of wanting two characters to enter a romantic relationship. Those who opposed their chosen ship were targets of harassment, despite their shared identity markers of female and/or queer. Inspired by ethnographically and autoethnography informed methods, I performed a survey of the Voltron: Legendary Defender fandom about their experiences with harassment and their feelings over the show’s universally panned conclusion. In implementing my research, I prioritized only using data given to me, a form of ethical consideration on how to best represent the trauma of others. Unfortunately, in performing this research, I became a target of harassment and altered my research trajectory. In response, I collected the various threats against me and used them to analyze online fandom harassment and the motivations of antis.
    [Show full text]
  • I Give Permission for Public Access to My Thesis and for Any Copying to Be Done at the Discretion of the Archives Librarian And/Or the College Librarian
    1 I give permission for public access to my thesis and for any copying to be done at the discretion of the archives librarian and/or the College librarian. Emily Merritt 06/22/12 An Analysis of the Discourse of Internet Trolling: A Case Study of Reddit.com Student presenter: Emily Rose Merritt Project advisor: Esther Castro-Cuenca With the proliferation of social media and community discussion and forum websites, interest in understanding and explaining communication on the Internet (with an emphasis on language-based communication) is on the rise. Over time, new genres of interaction have developed that take place primarily or exclusively in online communication, and with them has developed the need to investigate the structure of these interactions, what their function is within conversations and communities, what their place is within certain Internet discourses, and over time what effects they have on communication on and offline. Thus far many of these genres have been deemed at best disruptive and at worst anti-social, but when studied from a judgment-free point of view show high levels of complexity and offer us excellent opportunities to understand how the Internet is shaping and being shaped by new kinds and contexts of communication. One of these genres of interaction that has gained significant fame on some very popular forums and discussion sites is called trolling. Trolling occurs on discussion sites or message boards when a user intentionally posts erroneous or inflammatory information with the intention of provoking a strong reaction out of other users. The objective of this study is to understand the complexities of trolling, as well as some of its functions and outcomes in anonymous online communication.
    [Show full text]
  • A Study of Internet Based Community Interactions
    Virtual Online Communities: A Study of Internet Based Community Interactions A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Adrian M. Budiman August 2008 This dissertation titled Virtual Communities Online: A Study of Internet Based Community Interactions by ADRIAN M. BUDIMAN has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Drew McDaniel Professor of Telecommunications Gregory J. Shepherd Dean, Scripps College of Communication ii Abstract BUDIMAN, ADRIAN M., Ph.D., August 2008, Mass Communication Virtual Online Communities: A Study of Internet Based Community Interactions (167 pp.) Director of Dissertation: Drew McDaniel The aim of this research was to better understand virtual online communities (VOCs), that is, communities that are formed and maintained through the Internet. This research was guided by four research questions: What do participants in VOCs actually seek? How does a participant critically evaluate information produced in VOCs? What differences do VOC members perceive between their online community experiences compared to their experiences in real-life face-to-face communities? In what ways might a VOC shape its members’ views toward political and social change? The methodology employed was participant observation of 20 informants within their online and offline realms plus in-depth interviews with each informant. Interviews and observations were conducted from 2005 – 2007. This research identified two different types of VOCs: dependent and self- contained VOCs. Dependent VOCs act as extensions to already existent face-to-face communities while self-sustained VOCs are communities where relationships between members are formed, developed, and nurtured purely through virtual encounters on the Internet based on shared interests.
    [Show full text]
  • Leetocracy. Networked Political Activism and the Continuation of Elitism in Competitive Democracy Gustafsson, Nils
    Leetocracy. Networked Political Activism and the Continuation of Elitism in Competitive Democracy Gustafsson, Nils; Breindl, Yana Published in: Nexus. New Intersections in Internet Research 2010 Link to publication Citation for published version (APA): Gustafsson, N., & Breindl, Y. (2010). Leetocracy. Networked Political Activism and the Continuation of Elitism in Competitive Democracy. In D. Araya, Y. Breindl, & T. J. Houghton (Eds.), Nexus. New Intersections in Internet Research Peter Lang Publishing Group. Total number of authors: 2 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 Araya_Araya 9/28/2010 11:01 PM Page 193 C H A P T E R N I NE Leetocracy 1 Networked Political Activism or the Continuation of Elitism in Competitive Democracy YANA BREINDL & NILS GUSTAFSSON INTRODUCTION On May 6, 2009, the European Parliament (EP) gathered for its monthly plenary in Strasbourg.
    [Show full text]
  • The Psychology of Trolling and Lurking: the Role of Defriending and Gamification for Increasing Participation in Online Communities Using Seductive Narratives
    The Psychology of Trolling and Lurking: The Role of Defriending and Gamification for Increasing Participation in Online Communities Using Seductive Narratives Jonathan Bishop Centre for Research into Online Communities and E-Learning Systems, UK ABSTRACT The rise of social networking services have furthered the proliferation of online communities, transferring the power of controlling access to content from often one person who operates a system (sysop), which they would normally rely on, to them personally. With increased participation in social networking and services come new problems and issues, such as trolling, where unconstructive messages are posted to incite a reaction, and lurking, where persons refuse to participate. Methods of dealing with these abuses included defriending, which can include blocking strangers. The Gamified Flow of Persuasion model is proposed, building on work in ecological cognition and the participation continuum, the chapter shows how all of these models can collectively be used with gamification principles to increase participation in online communities through effective management of lurking, trolling, and defriending. INTRODUCTION of-friends’ (COF) for managing friends lists in online communities (Romm & Setzekom, 2008), The study of online communities has led to such the use of the Internet to build online communities, colourful expressions as trolling, flaming, spam- especially using social networking services has ming, and flooding being developed in order to grown – but so has the amount of Internet abuse on describe behaviours that benefit some people while these platforms. Facebook is currently one of the disrupting others (Lampe & Resnick, 2004). Since more popular COF-based websites (Davis, 2008). the proliferation of technologies like the ‘circle- In addition to this, microblogging, such as Twitter, have ‘status updates’, which are as important a DOI: 10.4018/978-1-4666-0312-7.ch010 The Psychology of Trolling and Lurking part of social networks Facebook and Google+, and functioning (Maxwell & Miller, 2008).
    [Show full text]
  • Exploring Tactics of Public Intimacy on Instagram
    . Volume 14, Issue 1 May 2017 Exploring tactics of public intimacy on Instagram Eliisa Vainikka, Elina Noppari & Janne Seppänen, University of Tampere, Finland Abstract: Issues relating to public intimacy characterise current online photo-sharing and visual self- performance practices. People increasingly post personal photos onto public or semi-public online spaces and have the need to negotiate the boundaries of disclosure and privacy. This article explores some of the tactics that ordinary ‘Instagrammers’ adopt when using the mobile photo-sharing app. Michel de Certeau’s theoretical distinction between tactics and strategies is used as a frame to analyse the empirical material. User tactics relating to privacy and authenticity, choices and actions that Instagram users make while operating in the virtual space, are reflected against Instagram’s public statements of their company strategy. The study presents that in their public self-performances, users constantly negotiate between their ideal me, their true me, the surrounding social norms and forming of an authenticity contract. The tactical choices are usually individual and users justify their choices first and foremost to themselves. Although users make individual tactical choices when using the app, they do not downright challenge the strategic goals of Instagram, but rather adapt to them. Keywords: Instagram, social media, self-performance, intimacy, authenticity, privacy, user, tactic, photography Introduction As social media platforms have become increasingly pictorial, the popular photo-sharing app, Instagram, has also become a focus of research interest. Instagram has reached over 400 million users globally and is the most popular mobile application for photo-sharing and visual self-presentation (Duggan et al.
    [Show full text]
  • Cyber Attack Campaigns in Political Conflicts
    CYBER ATTACK CAMPAIGNS IN POLITI- CAL CONFLICTS A case study of Anonymous hacktivists’ campaign against ISIS Master´s Thesis in Information Systems Science Author: Otto Sulin Supervisor: Jonna Järveläinen 16.02.2018 Turku Turun kauppakorkeakoulu • Turku School of Economics Turun yliopiston laatujärjestelmän mukaisesti tämän julkaisun alkuperäisyys on tar- kastettu Turnitin OriginalityCheck -järjestelmällä. The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. Table of Contents 1 INTRODUCTION ................................................................................................... 9 1.1 Internet, the new frontier of conflicts ............................................................. 9 1.2 Scientific motivation for this study .............................................................. 10 1.3 General overview of the study ..................................................................... 11 2 POLITICAL CONFLICTS AND WARFARE IN THE CYBERSPACE ............. 13 2.1 Conflicts in the Cyberspace.......................................................................... 13 2.1.1 Perspectives on different types of conflicts ..................................... 13 2.1.2 Analyzing conflicts .......................................................................... 14 2.2 Evaluation of existing cyber conflict models ............................................... 16 2.2.1 Cyber Early Warning Model ...........................................................
    [Show full text]
  • The Impact of Social Types Within Information Communities: Findings from Technical Newsgroups
    The Impact of Social Types within Information Communities: Findings from Technical Newsgroups Tammara Combs Turner Karen E. Fisher Microsoft Research The Information School One Microsoft Way University of Washington Redmond, Washington 98052 Seattle, Washington 98195 [email protected] [email protected] Abstract communities or newsgroups—Usenet discussion forums for publicly exchanging threaded messages. Lee, Vogel We explored whether Fisher and Durrance’s [11] and Limayem [24] define an online community as, “a framework of information communities applies to online technology-supported cyberspace, centered upon technical newsgroups and the impact of particular social communication and interaction of participants, resulting in types on information flow within digital economy. Data a relationship being built up.” While “community” has collection methods included content analysis of discussion been defined in many different ways [8, 19, 20, 27, 28], threads from six technical newsgroups over an eighteen the study of online communities—and specifically the month period, along with focus groups, participant flow of information within them are relatively new. observation and interviews with key informants, and Broadly encompassing newsgroups, forums, analysis of quantitative data obtained from Microsoft conferences, and bulletin boards, [33] online communities Research’s Netscan project. Findings support and expand occur “when users are given tools to use their voice in a the information communities framework. Four social public and
    [Show full text]
  • Hackers Gonna Hack: Investigating the Effect of Group Processes and Social Identities Within Online Hacking Communities
    Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Thesis submitted for the degree of Doctor of Philosophy Bournemouth University October 2018 This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made of the use of any material contained in, or derived from, this thesis. 1 2 Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Abstract Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, the positive influence on individual security approaches after the hacker social identity adoption, and the subsequent in-group or out-group behaviours, could be adapted to improve security in the work place context. For individuals involved in the communities, an increase in the awareness of the potential influences from their adopted social identities and from other members could help those otherwise vulnerable to manipulation, such as new or younger members.
    [Show full text]