Adam Joinson
YOU?
Author Swipe
View article: Social Influence across Conversational Contexts: A new taxonomy of social influence techniques and public understanding of the characteristics of persuasion, manipulation, and coercion in interpersonal dialogue.
Social Influence across Conversational Contexts: A new taxonomy of social influence techniques and public understanding of the characteristics of persuasion, manipulation, and coercion in interpersonal dialogue. Open
We propose a taxonomy of seven social influence strategies and 42 techniques for interpersonal dialogue across diverse settings. Perceptions of these techniques, gathered from 164 UK participants, show persuasive techniques as low-harm and…
View article: Threats & Trade-offs: A Start-up Simulation Game for Cybersecurity and Innovation Decision-Making
Threats & Trade-offs: A Start-up Simulation Game for Cybersecurity and Innovation Decision-Making Open
Cybersecurity is now critically important in an increasingly digitized and connected world. In addition to required digital security, individuals and organisations pursue multiple other objectives under binding resource constraints. Unders…
View article: Internet Memes as Stabilizers of Conspiracy Culture: A Cognitive Anthropological Analysis
Internet Memes as Stabilizers of Conspiracy Culture: A Cognitive Anthropological Analysis Open
Internet memes have emerged as the de facto language of the internet, where standardized memetic templates and characters distill and communicate narratives in simple, shareable formats. While prior research has highlighted their broad app…
View article: Making a deal with the devil and your neighbour: A structuration approach to privacy and security in practice
Making a deal with the devil and your neighbour: A structuration approach to privacy and security in practice Open
Video-enabled smart home security devices are increasingly being adopted with the intention to secure one’s home, but these devices present novel challenges in terms of security – not only for the owner but also for the rest of their house…
View article: The Association Between TikTok and Mental Health: What You See Is More Important Than What You Do
The Association Between TikTok and Mental Health: What You See Is More Important Than What You Do Open
Despite multiple reviews quantifying small associations between the time a person spends on social media and well-being, public and policy concern remains high, prompting calls for more nuanced approaches that incorporate both digital foot…
View article: Beyond TikTok Doomscrolling: Content Takes Precedence over Usage Metrics in Associations with Wellbeing
Beyond TikTok Doomscrolling: Content Takes Precedence over Usage Metrics in Associations with Wellbeing Open
Despite multiple reviews demonstrating minimal effects between time spent on social media and well-being, concern remains high, prompting calls for nuanced approaches using digital footprint data and content. This study utilises second-by-…
View article: Online Signals of Extremist Mobilization
Online Signals of Extremist Mobilization Open
Psychological theories of mobilization tend to focus on explaining people’s motivations for action, rather than mobilization (“activation”) processes. To investigate the online behaviors associated with mobilization, we compared the online…
View article: Digital data and personality: A systematic review and meta-analysis of human perception and computer prediction.
Digital data and personality: A systematic review and meta-analysis of human perception and computer prediction. Open
In recent years, our increasing use of technology has resulted in the production of vast amounts of data. Consequently, many researchers have analyzed digital data in attempt to understand its relationship with individuals' personalities. …
View article: “I just embodied you”: Psychological Ownership of Personalized Photorealistic Avatars
“I just embodied you”: Psychological Ownership of Personalized Photorealistic Avatars Open
Developing and using personalized photorealistic avatars in research settings poses novel challenges for research ethics procedures. These challenges stem from the highly identifiable nature of avatars, which are imbued with the users' ide…
View article: Internet Memes as Stabilizers of Conspiracy Culture: A Cognitive Anthropological Analysis
Internet Memes as Stabilizers of Conspiracy Culture: A Cognitive Anthropological Analysis Open
Internet memes have emerged as the de facto language of the Internet, where standardized memetic templates and characters distill and communicate narratives in simple, shareable formats. While prior research has highlighted their broad app…
View article: Internet Memes as Stabilizers of Conspiracy Culture: A Cognitive Anthropological Analysis
Internet Memes as Stabilizers of Conspiracy Culture: A Cognitive Anthropological Analysis Open
Internet memes have emerged as the de facto language of the Internet, where standardized memetic templates and characters distill and communicate narratives in simple, shareable formats. While prior research has highlighted their broad app…
View article: Online risk signals of offline terrorist offending
Online risk signals of offline terrorist offending Open
There has been a rise in the number of terrorist incidents in which social media use has been implicated in the planning and execution of the attack. Efforts to identify online risk signals of terrorist offending is challenging due to the …
View article: Qualitative analysis in online research
Qualitative analysis in online research Open
Qualitative research has long been concerned with sensitive research areas. Sensitive research online in particular and qualitative online research in general have many unknown challenges. Not least, protecting researcher vulnerabilities w…
View article: Social media, marketing, and five-factor personality: A review and synthesis of the literature
Social media, marketing, and five-factor personality: A review and synthesis of the literature Open
Purpose Whilst psychological literature has sought to understand the role of personality traits in determining social media behaviour, there is limited discussion on its importance to social media marketers. We signpost marketers to studie…
View article: Digital traces of offline mobilization.
Digital traces of offline mobilization. Open
Since 2009, there has been an increase in global protests and related online activity. Yet, it is unclear how and why online activity is related to the mobilization of offline collective action. One proposition is that online polarization …
View article: Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice
Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice Open
The idea that people should form positive security habits is gaining increasing attention amongst security practitioners. Habit is a well-studied concept in psychology, but the extent to which the richness of that literature has been fully…
View article: Personality and social media use: An investigation of different social media environments
Personality and social media use: An investigation of different social media environments Open
There is much evidence to suggest that personality traits underpin many aspects of a person’s behaviour as they experience a broad range of situations and environments. As new online environments have developed during the 21st Century, pre…
View article: The effectiveness of microtargeting using aesthetic cues: Studies based on personality traits
The effectiveness of microtargeting using aesthetic cues: Studies based on personality traits Open
Following the rise in audience data, and the potential to communicate with individuals through social media, ‘microtargeting’ on the basis of personality traits is an advertising technique that has attracted much recent discussion. Yet, th…
View article: To Like or Not to Like? An Experimental Study on Relational Closeness, Social Grooming, Reciprocity, and Emotions in Social Media Liking
To Like or Not to Like? An Experimental Study on Relational Closeness, Social Grooming, Reciprocity, and Emotions in Social Media Liking Open
We conducted a randomized-controlled experiment with 201 participants to investigate the effects of relationship closeness, emotions, and the receipt of Likes on reciprocal Liking behaviors. We found that individuals engaged in interchange…
View article: Development of a new ‘human cyber-resilience scale’
Development of a new ‘human cyber-resilience scale’ Open
While there has been an upsurge in interest in cyber resilience in organizations, we know little about the resilience of individuals to cyber attacks. Cyber resilience in a domestic or non-work setting is important because we know that the…
View article: Exploring Age and Gender Differences in ICT Cybersecurity Behaviour
Exploring Age and Gender Differences in ICT Cybersecurity Behaviour Open
Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, and literacy. Less is known about age differences in relation to cybersecurity risks and associated cybersecurity behaviours.…
View article: Rethinking Online Harm: A Psychological Model of Contextual Vulnerability
Rethinking Online Harm: A Psychological Model of Contextual Vulnerability Open
“Online harm” is an umbrella term used to refer to any online activities which may cause harm to individuals or society. Psychological research is integral to the study of individual harms, such as misinformation, cyberbullying or radicali…
View article: Integrating Insights About Human Movement Patterns From Digital Data Into Psychological Science
Integrating Insights About Human Movement Patterns From Digital Data Into Psychological Science Open
Understanding people’s movement patterns has many important applications, from analyzing habits and social behaviors, to predicting the spread of disease. Information regarding these movements and their locations is now deeply embedded in …
View article: Shape Shifting Across Social Media
Shape Shifting Across Social Media Open
Individuals change and adapt their behavior according to their social situation (e.g., transitioning from work to home). However, how does this shape shifting of self-presentations and identity translate into various online platforms? This…
View article: Imagined Audiences, Emotions, and Feedback Expectations in Social Media Photo Sharing
Imagined Audiences, Emotions, and Feedback Expectations in Social Media Photo Sharing Open
The present research explores the effects of imagined audiences, emotions, and feedback expectations on social media photo sharing. We focus on the audience-oriented approach to sharing and on how discrepancies between expected and receive…