Strategic Uses of Social Technology: An Interactive Perspective of Social Psychology

The publication of Strategic Uses of Social Technology: An Interactive Perspective of Social Psychology (Cambridge University Press, 2011) has been of special interest to the authors of this review for two reasons. First, one of the reviewers (Guadagno) attended the Conference on Group Processes in Computer-Supported Interaction: Technological and Social Determinism at Miami University, Oxford, Ohio in April 2005 that has laid the foundation for this volume. Second, social psychological inquiry into behavior on the Internet is a primary area of research for both of the reviewers (see e.g., Guadagno & Cialdini 2002, 2005, 2007; Guadagno, Muscanell, Okdie, Burke, & Ward, 2011; Guadagno, Okdie, & Eno, 2008; Muscanell & Guadagno, 2012). Strategic Uses of Social Technology reflects and builds upon research presentations given at the conference, and expands them to offer a thorough and engaging social psychological perspective on how individuals interact with mediated environments in the context of computer-mediated communication (CMC) and related processes and outcomes. Even though the resulting book is quite broad in themes, it remains concise. Each of the ten chapters discusses concepts that are highly relevant to particular aspects of CMC, introduces original research questions, and highlights some of the most pertinent findings. Additionally, the authors provide necessary and interesting suggestions for future research. Most of the chapters integrate a comparison of face-to-face and CMC processes, which helps the reader to recognize those aspects in which the two modes of communication are similar or dissimilar. One surprising note for the students of technology-supported interactions is Strategic Uses of Social Technology: An Interactive Perspective of Social Psychology

[1]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[2]  R. Cialdini,et al.  Running head : ONLINE PERSUASION AND COMPLIANCE Online Persuasion and Compliance : Social Influence on the Internet and Beyond , 2004 .

[3]  Rosanna E. Guadagno,et al.  Persuade him by email, but see her in person: Online persuasion revisited , 2007, Comput. Hum. Behav..

[4]  Emily Christofides,et al.  More Information than You Ever Wanted: Does Facebook Bring Out the Green-Eyed Monster of Jealousy? , 2009, Cyberpsychology Behav. Soc. Netw..

[5]  E GuadagnoRosanna,et al.  Even in virtual environments women shop and men build , 2011 .

[6]  Rosanna E. Guadagno,et al.  Who blogs? Personality predictors of blogging , 2008, Comput. Hum. Behav..

[7]  Gadi Evron,et al.  Storming the Servers: A Social Psychological Analysis of the First Internet War , 2010, Cyberpsychology Behav. Soc. Netw..

[8]  S. Kiesler,et al.  A prisoner's dilemma experiment on cooperation with people and human-like computers. , 1996, Journal of personality and social psychology.

[9]  R. Cialdini,et al.  Online persuasion: An examination of gender differences in computer-mediated interpersonal influence. , 2002 .

[10]  Rosanna E. Guadagno,et al.  Even in virtual environments women shop and men build: A social role perspective on Second Life , 2011, Comput. Hum. Behav..

[11]  Brad J. Sagarin,et al.  Sex Differences in Jealousy: An Evolutionary Perspective on Online Infidelity , 2010 .

[12]  Katherine L. Milkman,et al.  Social Transmission, Emotion, and the Virality of Online Content , 2010 .

[13]  R. Baumeister A SELF-PRESENTATIONAL VIEW OF SOCIAL PHENOMENA , 1982 .