Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Studying and Understanding Characteristics of Post-Syncing Practice and Goal in Social Network Sites

Published: 14 June 2021 Publication History

Abstract

Many popular social network sites (SNSs) provide the post-syncing functionality, which allows users to synchronize posts automatically among different SNSs. Nowadays there exists divergence on this functionality from the view of sink SNS. The key to solving this problem is to understand the characteristics of users’ post-syncing practice and goals and evaluate whether they are consistent with an SNS’s norms, cultures, and goals. However, studying and understanding the characteristics of post-syncing practice and goal are challenging tasks as a result of the difficulty of data sampling and the complexity of post-syncing behavior. In this article, we focus on investigating this question by quantitative analysis in combination with qualitative analysis. In the quantitative study, by utilizing 211,233 synced-posts sampled from Weibo, we aim to investigate characteristics of post-syncing from three perspectives: user, content, and goal. The results suggest that post-syncing plays an important role in exhibiting one’s current activities, creations, and skills as well as advertisements but involves a risk of exhibiting personal sensitive profiles. To understand the results, we present an interview-based qualitative study based on thematic analysis. It indicates that the publicity, urgency, and remarkableness of contents and differences of social affordances and social circles between sink SNS and source SNS as well as the one-time consent of post-syncing authentication jointly account for the major role of post-syncing. Based on these results, we propose insights for post-syncing functionality’s adoption, design, and promotion.

References

[1]
Smith Aaron and Anderson Monica. 2018. Social media use in 2018. Retrieved March 2018 from https://www.pewinternet.org/2018/03/01/social-media-use-in-2018/.
[2]
Ime Archibong. 2018. Platform update on publish permission. Retrieved August 2018 from https://developers.facebook.com/blog/post/v2/2018/07/31/platform-update-publish-permission/.
[3]
Joseph B. Bayer, Nicole B. Ellison, Sarita Y. Schoenebeck, and Emily B. Falk. 2016. Sharing the small moments: Ephemeral social interaction on Snapchat. Information, Communication & Society 19, 7 (2016), 956–977.
[4]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77–101.
[5]
Virginia Braun and Victoria Clarke. 2013. Successful Qualitative Research: A Practical Guide for Beginners. Sage.
[6]
Twitter Help Center. 2020. How to Tweet. https://help.twitter.com/en/using-twitter/how-to-tweet#source-labels.
[7]
Sachin Date. 2019. An illustrated guide to the Poisson regression model. https://towardsdatascience.com/an-illustrated-guide-to-the-poisson-regression-model-50cccba15958.
[8]
Chaffey Dave. 2019. Global social media research summary 2019. Retrieved February 2019 from https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/.
[9]
Michael A. DeVito, Jeremy Birnholtz, and Jeffery T. Hancock. 2017. Platforms, people, and perception: Using affordances to understand self-presentation on social media. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 740–754.
[10]
Nicole B. Ellison and Jessica Vitak. 2015. Social network site affordances and their relationship to social capital processes. Handbook of the Psychology of Communication Technology 32 (2015), 205–228.
[11]
Reza Farahbakhsh, Angel Cuevas, and Noël Crespi. 2016. Characterization of cross-posting activity for professional users across Facebook, Twitter and Google+. Social Network Analysis and Mining 6, 1 (2016), 33:1–33:14.
[12]
Casey Fiesler, Michaelanne Dye, Jessica L. Feuston, Chaya Hiruncharoenvate, Clayton J. Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S. Bruckman, Munmun De Choudhury, et al. 2017. What (or who) is public? Privacy settings and social media content sharing. In Proceedings of the 2017 ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, 567–580.
[13]
Teresa Gil-Lopez, Cuihua Shen, Grace A. Benefield, Nicholas A. Palomares, Michal Kosinski, and David Stillwell. 2018. One size fits all: Context collapse, self-presentation strategies and language styles on Facebook. Journal of Computer-Mediated Communication 23, 3 (2018), 127–145.
[14]
Nir Grinberg, P. Alex Dow, Lada A. Adamic, and Mor Naaman. 2016. Changes in engagement before and after posting to Facebook. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 564–574.
[15]
Tsahi Zack Hayat, Ofrit Lesser, and Tal Samuel-Azran. 2017. Gendered discourse patterns on online social networks: A social network analysis perspective. Computers in Human Behavior 77 (2017), 132–139.
[16]
Shiu-Li Huang and Chih-Yu Chang. 2020. Understanding how people select social networking services: Media trait, social influences and situational factors. Information & Management 57, 6 (2020), 103323.
[17]
Bernardo A. Huberman, Daniel M. Romero, and Fang Wu. 2008. Social networks that matter: Twitter under the microscope. arXiv preprint arXiv:0812.1045 (2008).
[18]
Kokil Jaidka, Sharath Chandra Guntuku, and Lyle H. Ungar. 2018. Facebook versus Twitter: Differences in self-disclosure and trait prediction. In Proceedings of the 12nd International Conference on Web and Social Media. AAAI, 141–150.
[19]
Yongick Jeong and Yeuseung Kim. 2017. Privacy concerns on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior 69 (2017), 302–310.
[20]
Sanjay Kairam, Mike Brzozowski, David Huffaker, and Ed Chi. 2012. Talking in circles: Selective sharing in Google+. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1065–1074.
[21]
Sanjay Kairam, Joseph ‘Jofish’ Kaye, John Alexis Guerra-Gomez, and David A. Shamma. 2016. Snap decisions?: How users, content, and aesthetics interact to shape photo sharing behaviors. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 113–124.
[22]
Mayur Karnik, Ian Oakley, Jayant Venkatanathan, Tasos Spiliotopoulos, and Valentina Nisi. 2013. Uses & gratifications of a Facebook media sharing group. In Proceedings of the 2013 ACM Conference on Computer-Supported Cooperative Work. ACM, 821–826.
[23]
Yoon Kim. 2014. Convolutional neural networks for sentence classification. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing. ACL, 1746–1751.
[24]
Jonna Koivisto and Juho Hamari. 2019. The rise of motivational information systems: A review of gamification research. International Journal of Information Management 45 (2019), 191–210.
[25]
Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven months with the devils: A long-term study of content polluters on Twitter. In In Proceedings of the AAAI International Conference on Weblogs and Social Media. Citeseer.
[26]
Kathy Lee, Diana Palsetia, Ramanathan Narayanan, Md Mostofa Ali Patwary, Ankit Agrawal, and Alok Choudhary. 2011. Twitter trending topic classification. In Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops. IEEE, 251–258.
[27]
Kai Li, Liangqi Cheng, and Ching-I Teng. 2020. Voluntary sharing and mandatory provision: Private information disclosure on social networking sites. Information Processing & Management 57, 1 (2020), 102128.
[28]
Bang Hui Lim, Dongyuan Lu, Tao Chen, and Min-Yen Kan. 2015. # mytweet via Instagram: Exploring user behaviour across multiple social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 113–120.
[29]
Han Lin and Lin Qiu. 2013. Two sites, two voices: Linguistic differences between Facebook status updates and tweets. In Proceedings of the 2013 International Conference on Cross-Cultural Design. Springer, 432–440.
[30]
Xiaolin Lin, Mauricio Featherman, and Saonee Sarker. 2017. Understanding factors affecting users’ social networking site continuance: A gender difference perspective. Information & Management 54, 3 (2017), 383–395.
[31]
Siân E. Lindley, Catherine C. Marshall, Richard Banks, Abigail Sellen, and Tim Regan. 2013. Rethinking the web as a personal archive. In Proceedings of the 22nd International Conference on World Wide Web. ACM, 749–760.
[32]
Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei, and Kuan-Ta Chen. 2013. Gender swapping and user behaviors in online social games. In Proceedings of the 22nd International Conference on World Wide Web. 827–836.
[33]
Yunshan Ma, Xun Yang, Lizi Liao, Yixin Cao, and Tat-Seng Chua. 2019. Who, where, and what to wear? Extracting fashion knowledge from social media. In Proceedings of the 27th ACM International Conference on Multimedia. 257–265.
[34]
Lydia Manikonda, Venkata Vamsikrishna Meduri, and Subbarao Kambhampati. 2016. Tweeting the mind and instagramming the heart: Exploring differentiated content sharing on social media. In Proceedings of the 10th International Conference on Web and Social Media. AAAI, 639–642.
[35]
Fred Morstatter, Liang Wu, Tahora H. Nazer, Kathleen M. Carley, and Huan Liu. 2016. A new approach to bot detection: Striking the balance between precision and recall. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’16). IEEE, 533–540.
[36]
Mor Naaman, Jeffrey Boase, and Chih-Hui Lai. 2010. Is it really about me? Message content in social awareness streams. In Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work. 189–192.
[37]
Raphael Ottoni, Diego Las Casas, Joao Paulo Pesce, Wagner Meira Jr, Christo Wilson, Alan Mislove, and Virgilio Almeida. 2014. Of pins and tweets: Investigating how users behave across image-and text-based social networks. In Proceedings of the 8th International Conference on Weblogs and Social Media. AAAI.
[38]
Lauren Scissors, Moira Burke, and Steven Wengrovitz. 2016. What’s in a like? Attitudes and behaviors around receiving likes on Facebook. In Proceedings of the 2016 ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1501–1510.
[39]
Lin Shi, Mingzhe Xing, Mingyang Li, Yawen Wang, Shoubin Li, and Qing Wang. 2020. Detection of hidden feature requests from massive chat messages via deep siamese network. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 641–653.
[40]
Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn’t: Exploring self-censorship on Facebook. In Proceedings of the 2013 ACM Conference on Computer-Supported Cooperative Work. ACM, 793–802.
[41]
Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, and Michelle L. Mazurek. 2016. Sharing personal content online: Exploring channel choice and multi-channel behaviors. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 101–112.
[42]
Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, and Bart Preneel. 2018. Collateral damage of Facebook third-party applications: A comprehensive study. Computers & Security 77 (2018), 179–208.
[43]
Sue Yeon Syn and Sanghee Oh. 2015. Why do social network site users share information on Facebook and Twitter? Journal of Information Science 41, 5 (2015), 553–569.
[44]
Samuel Hardman Taylor and Andrew M. Ledbetter. 2017. Extending media multiplexity theory to the extended family: Communication satisfaction and tie strength as moderators of violations of media use expectations. New Media & Society 19, 9 (2017), 1369–1387.
[45]
Jessica Vitak and Jinyoung Kim. 2014. “You can’t block people offline”: Examining how Facebook’s affordances shape the disclosure process. In Proceedings of the 17th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 461–474.
[46]
Na Wang, Pamela Wisniewski, Heng Xu, and Jens Grossklags. 2014. Designing the default privacy settings for Facebook applications. In Proceedings of the Companion Publication of the 2014 ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 249–252.
[47]
Yaqing Wang, Fenglong Ma, Zhiwei Jin, Ye Yuan, Guangxu Xun, Kishlay Jha, Lu Su, and Jing Gao. 2018. Eann: Event adversarial neural networks for multi-modal fake news detection. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 849–857.
[48]
Yichuan Wang and Chiahui Yu. 2017. Social interaction-based consumer decision-making model in social commerce: The role of word of mouth and observational learning. International Journal of Information Management 37, 3 (2017), 179–189.
[49]
Honghao Wei, Fuzheng Zhang, Nicholas Jing Yuan, Chuan Cao, Hao Fu, Xing Xie, Yong Rui, and Wei-Ying Ma. 2017. Beyond the words: Predicting user personality from heterogeneous information. In Proceedings of the 10th ACM International Conference on Web Search and Data Mining. 305–314.
[50]
Wikipedia. 2020. Chi-squared test. https://en.wikipedia.org/wiki/Chi-squared_test.
[51]
Bin Xu, Pamara Chang, Christopher L. Welker, Natalya N. Bazarova, and Dan Cosley. 2016. Automatic archiving versus default deletion: What Snapchat tells us about ephemerality in design. In Proceedings of the 2016 ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1662–1675.
[52]
Diyi Yang, Robert Kraut, and John M. Levine. 2017. Commitment of newcomers and old-timers to online health support communities. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 6363–6375.
[53]
Peng Zhang, Haiyi Zhu, Tun Lu, Hansu Gu, Wenjian Huang, and Ning Gu. 2017. Understanding relationship overlapping on social network sites: A case study of Weibo and Douban. PACMHCI 1, CSCW (2017), 120:1–120:18.
[54]
Xuan Zhao, Cliff Lampe, and Nicole B. Ellison. 2016. The social media ecology: User perceptions, strategies and challenges. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 89–100.
[55]
Xuan Zhao and Siân E. Lindley. 2014. Curation through use: Understanding the personal value of social media. In Proceedings of the 2014 CHI Conference on Human Factors in Computing Systems. ACM, 2431–2440.
[56]
Changtao Zhong, Hau-wen Chang, Dmytro Karamshuk, Dongwon Lee, and Nishanth Sastry. 2017. Wearing many (social) hats: How different are your different social network personae? In Proceedings of the 11st International Conference on Web and Social Media. AAAI, 397–407.

Cited By

View all
  • (2024)Exploring Cross-Site User Modeling without Cross-Site User Identity Linkage: A Case Study of Content Preference PredictionACM Transactions on Information Systems10.1145/369783243:1(1-28)Online publication date: 1-Oct-2024
  • (2024)VITR: Augmenting Vision Transformers with Relation-Focused Learning for Cross-modal Information RetrievalACM Transactions on Knowledge Discovery from Data10.1145/368680518:9(1-21)Online publication date: 18-Oct-2024
  • (2024)DeLink: An Adversarial Framework for Defending against Cross-site User Identity LinkageACM Transactions on the Web10.1145/364382818:2(1-34)Online publication date: 12-Mar-2024
  • Show More Cited By

Index Terms

  1. Studying and Understanding Characteristics of Post-Syncing Practice and Goal in Social Network Sites

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on the Web
    ACM Transactions on the Web  Volume 15, Issue 4
    November 2021
    152 pages
    ISSN:1559-1131
    EISSN:1559-114X
    DOI:10.1145/3465465
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 June 2021
    Accepted: 01 March 2021
    Revised: 01 March 2021
    Received: 01 July 2020
    Published in TWEB Volume 15, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Social network sites
    2. content sharing
    3. post-syncing
    4. Weibo

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Natural Science Foundation of China (NSFC)

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)18
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Exploring Cross-Site User Modeling without Cross-Site User Identity Linkage: A Case Study of Content Preference PredictionACM Transactions on Information Systems10.1145/369783243:1(1-28)Online publication date: 1-Oct-2024
    • (2024)VITR: Augmenting Vision Transformers with Relation-Focused Learning for Cross-modal Information RetrievalACM Transactions on Knowledge Discovery from Data10.1145/368680518:9(1-21)Online publication date: 18-Oct-2024
    • (2024)DeLink: An Adversarial Framework for Defending against Cross-site User Identity LinkageACM Transactions on the Web10.1145/364382818:2(1-34)Online publication date: 12-Mar-2024
    • (2024)Bayesian Graph Local Extrema Convolution with Long-tail Strategy for Misinformation DetectionACM Transactions on Knowledge Discovery from Data10.1145/363940818:4(1-21)Online publication date: 12-Feb-2024
    • (2024)Deep Neighborhood Structure-Preserving Hashing for Large-Scale Image RetrievalIEEE Transactions on Multimedia10.1109/TMM.2023.328976526(1881-1893)Online publication date: 1-Jan-2024
    • (2023)A Survey on Deep Hashing MethodsACM Transactions on Knowledge Discovery from Data10.1145/353262417:1(1-50)Online publication date: 20-Feb-2023
    • (2023)Spherical Centralized Quantization for Fast Image RetrievalIEEE Transactions on Image Processing10.1109/TIP.2023.326526232(6485-6499)Online publication date: 22-Nov-2023
    • (2023)Hierarchical Hashing Learning for Image Set ClassificationIEEE Transactions on Image Processing10.1109/TIP.2023.325102532(1732-1744)Online publication date: 1-Jan-2023
    • (2023)OSAP‐LossCAAI Transactions on Intelligence Technology10.1049/cit2.121518:4(1191-1212)Online publication date: 28-Mar-2023
    • (2022)Building a Personalized Model for Social Media Textual Content CensorshipProceedings of the ACM on Human-Computer Interaction10.1145/35556576:CSCW2(1-31)Online publication date: 11-Nov-2022
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media