Chapter 8: Mediated Communication and Interpersonal Relationships

8.4 Theories of Computer-Mediated Communication

Learning Objectives

  1. Describe uses and gratifications theory and how it helps us understand CMC behavior.
  2. Describe social presence theory and how it helps us understand CMC behavior.
  3. Describe media richness theory and how it helps us understand CMC behavior.
  4. Describe social information processing theory and how it helps us understand CMC behavior.

Most of the early work in computer-mediated communication from a theoretical perspective was conducted using old mediated theories created to discuss the differences between print, radio, and television and applying them to the Internet. As such, we don’t see the proliferation of theories. To help us understand the theories of computer-mediated communication, we are going to explore five theories and their implications for CMC.

Uses and Gratifications Theory

The first major theory used to explain CMC is the uses and gratifications theory. Uses and gratifications theory was originally devised back in the mid-1970s to explain why people use the types of mass media they do.53 The basic premise of the theory is that people choose various media because we get something out of that media, or it makes us happy in some way. From this perspective, people choose various media because we are have specific goals that we want to be fulfilled. Zizi Papacharissi and Alan Rubin were the first scholars to apply the uses and gratifications theory to how people use the Internet.54 Ultimately, they found five basic reasons people were using the Internet: interpersonal utility (allows people to interact with others), pass time (helps people kill time), information seeking (we look for specific information we want or need), convenience (it’s faster than FtF or even a phone call), and entertainment (people enjoy using the Internet). In this first study, the researchers found that people who used the Internet for interpersonal utility were less satisfied with life and more anxious in FtF communication interactions. Please remember that this study was conducted in 2000, so times are quite different now.

In a 2008 follow-up study, the picture of Internet socializing was pretty different, so it’s not surprising that the results were indicative of changes in public consumption.55 In this study, people found their interpersonal Internet relationships satisfying if used CMC for self-fulfillment purposes and when they intimately disclosed their personal feelings to others. In essence, if people are using the technology to make their lives better, and they are willing to self-disclose on the Internet, they are going to have more rewarding interpersonal interactions online. However, when people try to substitute FtF interpersonal interactions for CMC interactions, they do not find their CMC interactions as rewarding. On the flip side, when people supplement their FtF interpersonal interactions with CMC interactions, they are fulfilled by those interactions.

Social Presence Theory

The second major theory that has been used to help explain CMC is social presence theory. Social presence theory was originally created by John Short, Ederyn Williams, and Bruce Christie.56 Presence is a psychological state of mind and how we relate to technology. When we are truly present, we forget that we are actually using technology. Social presence then is “the degree to which we as individuals perceive another as a real person and any interaction between the two of us as a relationship.”57 Once again, our perceptions of presence are largely based on the degree to which we have the ability to interpret nonverbal cues from the people we are interacting with.

When it comes to CMC, various technologies are going to have varying degrees of presence. For example, reading information on a website probably is not going to make you forget that you are reading text on a screen. On the other hand, if you’re engaging in a conversation with your best friend via text messaging, you may forget about the technology and just view the interaction as a common one you have with your friend. In essence, people can vary in how they perceive presence. One of our coauthors regularly has students in a CMC course spend time in a couple of virtual worlds like SecondLife and World of Warcraft. SecondLife is a virtual world where people can create avatar and interact in a 3D simulated environment. However, it’s not a game – it’s a 3D virtual world. There is no point system and there is no winning or beating the system. Instead, it’s a place for people to socialize and interact. On the other hand, World of Warcraft (WOW) is first and foremost a game. Although there are definitely highly interactive components involved in WOW and people make life-long friends in WOW, WOW is a virtual world that has a specific end result focused on winning.

These different worlds have different purposes, but people can find both of them highly present. When students who are not familiar with these virtual worlds enter them, they often have a hard time understanding how people can spend hours upon hours interacting with others within these virtual worlds. To the students, they view this as a “strange” experience and experience no social presence at all. Conversely, to the people who “live” in these virtual worlds regularly, they experience high levels of social presence. We do know that those individuals who report higher levels of social presence tend to have more rewarding online interpersonal interactions and are more likely to perceive themselves as competent communicators within these mediated environments.58

Media Richness Theory

Our third major theory that has been applied to CMC is media richness theory. Media richness theory was first proposed by Richard L. Daft and Robert H. Lengel.59 Richness is defined as “the potential information carrying capacity of data.”60 In Lengel’s doctoral dissertation, he had proposed that media varied in richness depending on how much information is provided through the communication.61 For example, in print media, all you have is text. As such, you have no nonverbal behaviors of the author to help you interpret the words you are reading. With FtF communication, on the other hand, we have the full realm of nonverbal behaviors that we can attend to in an effort to understand the sender’s message. As such, Lengel argued that media escalates in richness in the following order: computer output, formal memos, personal memos, telephone, and FtF. You’ll notice that this perspective on media was originally designed to help individuals understand the media choices used in organizations.

So, where does this leave us with CMC? Well, from the basic ideas of media richness theory, we can ascertain that the richer the media, the less ambiguous a message is for a receiver. As such, the more rich an individual perceives a medium, the more likely they are to have successful social interactions online. From an organizational perspective, the richer the medium, the better individuals will be able to accomplish specific tasks when they are at a distance from one another. When it comes to the workplace, the more ambiguous a task is, the more people prefer highly rich media for their interactions.62

Social Information Processing Theory

Up to this point, the first three theories we examined that have been used to explain why people use CMC have all been theories originally designed to examine media before the proliferation of CMC. The first truly unique theory designed to look at CMC from a communication perspective came from Joseph Walther back in 1992 in his social information processing theory.63 As someone with a background in communication, Walther realized that interpersonal interactions change over time. As such, some of the other theories really didn’t take into account how interpersonal relationships evolve as the interpersonal interactants spend more time getting to know one another. The three previous theories applied to CMC do not take into account how our impressions of those we interact with can change over time. For example, both media richness and social presence theory focus on the nonverbal aspects and assume that because of the lack of nonverbal cues in CMC, people will inherently find CMC as either less rich or less present when compared to FtF interactions. Walther argued that the filtering out of nonverbal cues doesn’t hurt an individual’s ability to form an impression of someone over time in a CMC context. Ultimately, Walther argues that overtime relationships formed in a CMC context can develop like those that are FtF. He does admit that these relationships will take more time to develop, but that they can reach the same end states as those relationships formed FtF.

Walther later expanded his ideas of social information processing to include a new concept he dubbed hyperpersonal interactions.64 Hyperpersonal interactions are those that exceed those possible of traditional FtF interactions. For example, many people who belong to online self-help groups discuss feelings and ideas that they would never dream of discussing with people in an FtF interaction unless that person was their therapist. Furthermore, during CMC interactions an individual can refine her or his message in a manner that is impossible to do during an FtF interaction, which will help present a specific face to an interactant. I’m sure we’ve all written a text, Facebook post, or email and then decided to delete what you’d just written because it was in your best interest not to put it out to the world. In CMC interactions, we have this ability to fine-tune our messages before transmitting; whereas, in FtF messages, once something has been communicated, there is no ability to refine the message. Furthermore, in FtF interactions, there is an expectation that the interaction keeps moving at a steady pace without the ability to edit one’s ideas; whereas, with CMC we can take time to fine-tune our messages in a way that is impossible during an FtF interaction. All of this helps an individual create the public face that they want to be known by.

Key Takeaways

  • Uses and gratifications theory helps explain why people use the types of mass media they do. Papacharissi and Rubin found that there were five reasons why people use the Internet: interpersonal utility (allows people to interact with others), pass time (helps people kill time), information seeking (we look for specific information we want or need), convenience (it’s faster than FtF or even a phone call), and entertainment (people enjoy using the Internet).
  • Social presence theory helps us understand whether or not individuals using CMC technologies perceive the people they are interacting with as “real.” Our perceptions of presence are largely based on the degree to which we can interpret nonverbal cues from the people we are interacting with.
  • Media richness theory helps us understand CMC behavior by examining the capacity that people have for data. As media becomes richer and has more nonverbal content, the easier it is for a receiver to interpret the message accurately. As such, the more rich an individual perceives a medium the more likely they are to have successful social interactions online.
  • Social information processing (SIP_ theory helps researchers understand the development of interpersonal relationships in CMC contexts. SIP argues that overtime relationships formed in a CMC context can develop like those that are FtF.

Exercises

  • Uses and gratifications theory is one of the oldest and still most commonly studied theory in media. For this exercise, find a research study that examines uses and gratifications theory that has been conducted in the previous five years related to CMC. Look for the outcomes from that specific study and report them back to your class.
  • Compare and contrast social presence theory, media richness theory, and social information processing theory and its explanation of the importance of nonverbal communication in CMC relationships.
  • If you’ve experienced a hyperpersonal relationship online, think about that relationship as you answer the following questions. If you have not had a hyperpersonal relationship online, then talk with someone who has and answer the following questions.
    • How did this hyperpersonal relationship develop?
    • What was different about this relationship when compared to FtF relationships?
    • Do you still have this relationship today? Why?

Key Terms

anonymous CMC identities

ARPANET

asynchronous communication

catfishing

co-present interactions

emoticon

hyperpersonal

impression formation

message/bulletin boards

netiquette

pseudonymity CMC identity

real-life CMC identity

richness

short message service (SMS)

social presence

synchronous communication

uses and gratifications theory

Chapter Wrap-Up

This chapter explored many of the ways that modern communication technologies help us interact with each other. Whether we’re talking over a headset to someone through our gaming consul or texting our roommate, we use these technologies to communicate with people all the time. The first part of this chapter explored the history of computer-mediated communication, which was followed by a discussion of the process of computer-mediated communication. We then discussed identity formation in virtual environments. We ended the chapter look at four of the most commonly discussed theories related to computer-mediated communication. Hopefully, you realize that this chapter barely scratches the surface when it comes to how people are using technology to create and enhance their interpersonal relationships.

Real-World Case Study

Jenny decided that she wasn’t meeting any potential boyfriends living in Denver. As a 28-year-old woman, she’s found meeting people more and more difficult. She’s not really into the bar scene, so meeting people in that environment is pretty much out. One day a friend of hers at work tells her about a new smartphone app called Fndr. Basically, the app allows people to see how many people are also looking for dates within a geographic location.

She decides to download the app and see what all of the fuss was about. She created a profile and uploaded a professional picture and decided to take a chance. Immediately, she saw a screen filled with men all look for relationships. There was Chad that was 1.5 miles from here. There was Andrew, who was 678 feet from her. Then there was Bobby, who was less than 100 feet from her. That’s very creepy, Jenny thought to herself. She looked at Bobby’s profile, which showed a picture of a bare-chested male torso. God, he’s ripped! She looked at another photo that showed his back flexed. That’s when she noticed his eagle tattoo in the bottom center of his back. Oh my god! That’s Martha’s Husband!!!

  1. If you were Jenny, how would you respond to finding someone’s husband on a social media site for people looking for relationships?
  2. Do you think Jenny should confront Martha’s husband through Fndr?
  3. Do you think computer-mediated communication has made infidelity in the 21st Century easier?

Notes

1 Campbell-Kelly, Aspray, W., Ensbenger, N., & Yost, J. R. (2014). Computer: A history of the information machine (3rd ed.). Westview Press.Frauenfelder, M. (2013). The computer: an illustrated history from its origins to the present day. Carlton.Garfinkle, S. L., & Grunspan, R. H. (2018). The computer book: From the abacus to artificial intelligence, 250 milestones in the history of computer science. Sterling.
2 Happy 25th, Emoticon. (2007, Summer). Carnegie Mellon University. Retrieved from https://www.cmu.edu/homepage/beyond/2007/summer/happy-25th-emoticon.shtml; para. 5.
3 Berners-Lee, T. (1990, May). Information management: A proposal. Retrieved from http://cds.cern.ch/record/369245/files/dd-89-001.pdf; pg. 3.
4 Berners-Lee, T. (1990, May). Information management: A proposal. Retrieved from http://cds.cern.ch/record/369245/files/dd-89-001.pdf; pg. 3.
5 Berners-Lee, T., & Cailliau, R. (1990, November 12). WorldWideWeb: A proposal for a HyperText project. Retrieved from http://cds.cern.ch/record/2639699/files/Proposal_Nov-1990.pdf
6 What is HTML5? (2013, December 12). Retrieved from https://www.w3.org/html/wiki/FAQs
7 Culnan, M. J., & Markus, M. L. (1987). Information technologies. In F. M. Jablin, L. L. Putman, K. H. Roberts, and L. W. Porter (Eds.), Handbook of organizational communication: An interdisciplinary perspective (pp. 420-443). Sage.
8 Culnan, M. J., & Markus, M. L. (1987). Information technologies. In F. M. Jablin, L. L. Putman, K. H. Roberts, and L. W. Porter (Eds.), Handbook of organizational communication: An interdisciplinary perspective (pp. 420-443). Sage; pg. 423.
9 Twitter. (n.d.). Hateful conduct policy. Retrieved from: https://help.twitter.com/en/rules-and-policies/hateful-conduct-policy
10 Decot, D. (1984, March 13). ***Asterisks***. Retrieved from: https://groups.google.com/forum/#%21msg/net.flame/VbghoeOfwyI/E2mClWj2GV8J
11 Brown, K. W., & Ryan, R. M. (2003). The benefits of being present: Mindfulness and its role in psychological well-being. Journal of Personality and Social Psychology, 84(2), 822–848. https://doi.org/10.1037/0022-3514.84.4.822
12 Abblett, M. (2019, September 3). 5 rules for sharing genuinely and safely online: No matter what kind of social community you find yourself in, it is important to abide by a few specific guidelines for safe sharing. Mindful. https://www.mindful.org/5-rules-for-sharing-genuinely-and-safely-online/
13 Campbell, S. W., & Neer, M. R. (2001). The relationship of communication apprehension and interaction involvement to perceptions of computer-mediated communication. Communication Research Reports, 18(4), 391–398. https://doi.org/10.1080/08824090109384820
14 Campbell, S. W., & Neer, M. R. (2001). The relationship of communication apprehension and interaction involvement to perceptions of computer-mediated communication. Communication Research Reports, 18(4), 391–398. https://doi.org/10.1080/08824090109384820; pgs. 396-397.
15 Spitzberg, B. H. (2006). Preliminary development of a model and measure of computer mediated communication (CMC) competence. Journal of Computer–Mediated Communication, 11(2), 629–666. https://doi.org/10.1111/j.1083-6101.2006.00030.x
16 Hunt, D., Atkin, D., & Krishnan, A. (2012). The influence of computer-mediated communication apprehension on motives for Facebook use. Journal of Broadcasting & Electronic Media, 56(2), 187–202. https://doi.org/10.1080/08838151.2012.678717
17 Punyanunt-Carter, N. M., De La Cruz, J. J., & Wrench, J. S. (2017). Investigating the relationships among college students’ satisfaction, addiction, needs, communication apprehension, motives, and uses & gratifications with Snapchat. Computers in Human Behavior, 75, 870–875. https://doi.org/10.1016/j.chb.2017.06.034
18 Punyanunt-Carter, N. M., Cruz, J. J. D. L., & Wrench, J. S. (2018). Analyzing college students’ social media communication apprehension. CyberPsychology, Behavior & Social Networking, 21(8), 511–515. https://doi.org/10.1089/cyber.2018.0098
19 CareerBuilder.com. (2018, August 9). More than half of employers have found content on social media that caused them NOT to hire a candidate, according to recent CareerBuilder survey [Press Release]. Retrieved from: http://press.careerbuilder.com/2018-08-09-More-Than-Half-of-Employers-Have-Found-Content-on-Social-Media-That-Caused-Them-NOT-to-Hire-a-Candidate-According-to-Recent-CareerBuilder-Survey
20 CareerBuilder.com. (2018, August 9). More than half of employers have found content on social media that caused them NOT to hire a candidate, according to recent CareerBuilder survey [Press Release]. Retrieved from: http://press.careerbuilder.com/2018-08-09-More-Than-Half-of-Employers-Have-Found-Content-on-Social-Media-That-Caused-Them-NOT-to-Hire-a-Candidate-According-to-Recent-CareerBuilder-Survey
21 CareerBuilder.com. (2018, August 9). More than half of employers have found content on social media that caused them NOT to hire a candidate, according to recent CareerBuilder survey [Press Release]. Retrieved from: http://press.careerbuilder.com/2018-08-09-More-Than-Half-of-Employers-Have-Found-Content-on-Social-Media-That-Caused-Them-NOT-to-Hire-a-Candidate-According-to-Recent-CareerBuilder-Survey; para. 6.
22 CareerBuilder.com. (2018, August 9). More than half of employers have found content on social media that caused them NOT to hire a candidate, according to recent CareerBuilder survey [Press Release]. Retrieved from: http://press.careerbuilder.com/2018-08-09-More-Than-Half-of-Employers-Have-Found-Content-on-Social-Media-That-Caused-Them-NOT-to-Hire-a-Candidate-According-to-Recent-CareerBuilder-Survey; para. 7.
23 JobVite (2013). 2013 social recruiting survey results. San Mateo, CA: Author.
24 Pitcan, M., Marwick, A. E., & Boyd, d. (2018). Performing a vanilla self: Respectability politics, social class, and the digital world. Journal of Computer-Mediated Communication, 23(3), 163-179. https://doi.org/10.1093/jcmc/zmy008; pg. 170.
25 Olsson, T., Jarusriboonchai, P., Woźniak, P., Paasovaara, S., Väänänen, K., & Lucero, A. (2019, February 14). Technologies for enhancing collocated social interaction: Review of design solutions and approaches. Computer Supported Cooperative Work. https://doi.org/10.1007/s10606-019-09345-0; pg. 2
26 Hewlett-Packard (2005). Abuse of technology can reduce UK workers’ intelligence. Small & Medium Business press release, April 22. Retrieved July 11, 2014, from http://www.scribd.com/doc/6910385/Abuse-of-technology-can-reduce-UK-workers-intelligence
27 Carrier, L. M., Cheever, N. A., Rosena, L. D., Benitez, S., & Chang, J. (2009). Multitasking across generations: Multitasking choices and difficulty ratings in three generations of Americans. Computers in Human Behavior, 25(2), 483-489. https://doi.org/10.1016/j.chb.2008.10.012
28 Bowman, J. M., & Pace, R. C. (2014). Dual-tasking effects on outcomes of mobile communication technologies. Communication Research Reports, 31(2), 221-231. https://doi.org/10.1080/08824096.2014.907149
29 Bowman, J. M., & Pace, R. C. (2014). Dual-tasking effects on outcomes of mobile communication technologies. Communication Research Reports, 31(2), 221-231. https://doi.org/10.1080/08824096.2014.907149; pg. 228.
30 Olsson, T., Jarusriboonchai, P., Woźniak, P., Paasovaara, S., Väänänen, K., & Lucero, A. (2019, February 14). Technologies for enhancing collocated social interaction: Review of design solutions and approaches. Computer Supported Cooperative Work. https://doi.org/10.1007/s10606-019-09345-0
31 Olsson, T., Jarusriboonchai, P., Woźniak, P., Paasovaara, S., Väänänen, K., & Lucero, A. (2019, February 14). Technologies for enhancing collocated social interaction: Review of design solutions and approaches. Computer Supported Cooperative Work. https://doi.org/10.1007/s10606-019-09345-0; pg. 39
32 Olsson, T., Jarusriboonchai, P., Woźniak, P., Paasovaara, S., Väänänen, K., & Lucero, A. (2019, February 14). Technologies for enhancing collocated social interaction: Review of design solutions and approaches. Computer Supported Cooperative Work. https://doi.org/10.1007/s10606-019-09345-0; pg. 39
33 Olsson, T., Jarusriboonchai, P., Woźniak, P., Paasovaara, S., Väänänen, K., & Lucero, A. (2019, February 14). Technologies for enhancing collocated social interaction: Review of design solutions and approaches. Computer Supported Cooperative Work. https://doi.org/10.1007/s10606-019-09345-0; pg. 40
34 Olsson, T., Jarusriboonchai, P., Woźniak, P., Paasovaara, S., Väänänen, K., & Lucero, A. (2019, February 14). Technologies for enhancing collocated social interaction: Review of design solutions and approaches. Computer Supported Cooperative Work. https://doi.org/10.1007/s10606-019-09345-0; pg. 40
35 Erikson, E. H. (1968). Identity: Youth and crisis. W. W. Norton & Company.
36 Erikson, E. (1985). Pseudospeciation in the nuclear age. Political Psychology, 6(2), 213–217. https://doi.org/10.2307/3790901
37 Erikson, E. H. (1962). Reality and actuality an address. Journal of The American Psychoanalytic Association, 10(3), 451-474. https://doi.org/10.1177/000306516201000301
38 Erikson, E. H. (1988). Youth: Fidelity and diversity. Daedalus, 117(3), 1–24.
39 Erikson, E. H. (1988). Youth: Fidelity and diversity. Daedalus, 117(3), 1–24; pg. 11.
40 Kay, A. (2018). Erikson Online: Identity and pseudospeciation in the internet age. Identity: An International Journal of Theory and Research, 18(4), 264-273. https://doi.org/10.1080/15283488.2018.1523732; pg. 269.
41 Erikson, E. (1964). Insight and responsibility. Norton; pg. 103-104.
42 Goffman, E, (1959). The presentation of self in everyday life. Anchor Books.
43 Alfarid Hussain, S. M. (2015). Presentation of self among social media users in Assam: Appropriating Goffman to Facebook users’ engagement with online communities. Global Media Journal: Indian Edition, 6(1&2), 1–14. https://tinyurl.com/sbbll8a
44 Alfarid Hussain, S. M. (2015). Presentation of self among social media users in Assam: Appropriating Goffman to Facebook users’ engagement with online communities. Global Media Journal: Indian Edition, 6(1&2), 1–14. https://tinyurl.com/sbbll8a; pg. 3.
45 Bullingham, L., & Vasconcelos, A. C. (2013). “The presentation of self in the online world:” Goffman and the study of online identities. Journal of Information Science, 39(1), 101–112. https://doi.org/10.1177/0165551512470051; pg. 110.
46 Bullingham, L., & Vasconcelos, A. C. (2013). “The presentation of self in the online world:” Goffman and the study of online identities. Journal of Information Science, 39(1), 101–112. https://doi.org/10.1177/0165551512470051; pg. 110.
47 Wood, A. F., & Smith, M. J. (2005). Online communication: Linking technology, identity, & culture (2nd ed.). Routledge.
48 Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14, 206-221.
49 Privitera, C. (2009). Cyberbullying: The new face of workplace bullying? Cyberpsychology & Behavior, 12(4), 395-400. https://doi.org/10.1089/cpb.2009.0025
50 Wood, A. F., & Smith, M. J. (2005). Online communication: Linking technology, identity, & culture (2nd ed.). Routledge; pg. 64.
51 Wood, A. F., & Smith, M. J. (2005). Online communication: Linking technology, identity, & culture (2nd ed.). Routledge; pg. 66.
52 Wood, A. F., & Smith, M. J. (2005). Online communication: Linking technology, identity, & culture (2nd ed.). Routledge; pgs. 66-67.
53 Katz, E., Blumler, J. G., & Gurevitch, M. (1974). Utilization of mass communication by the individual. In J. G. Blumler, & E. Katz (Eds.), The uses of mass communications: Current perspectives on gratifications research (pp. 19-32).: Sage.
54 Papacharissi, Z. & Rubin, A. M. (2000). Predictors of Internet use. Journal of Broadcasting & Electronic Media, 44(2), 175–196. https://doi.org/10.1207/s15506878jobem4402_2
55 Pornsakulvanich, V., Haridakis, P., & Rubin, A. M. (2008). The influence of dispositions and internet motivation on online communication satisfaction and relationship closeness. Computers in Human Behavior, 24(5), 2292–2310. https://doi.org/10.1016/j.chb.2007.11.003
56 Short, J. A., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. Wiley.
57 Wood, A. F., & Smith, M. J. (2005). Online communication: Linking technology, identity, & culture (2nd ed.). Routledge; pg. 72.
58 Wrench, J. S., & Punyanunt-Carter, N. M. (2007). The relationship between computer-mediated-communication competence, apprehension, self-efficacy, perceived confidence, and social presence. Southern Journal of Communication, 72(4), 355-378. https://doi.org/10.1080/10417940701667696
59 Daft, R. L., & Lengel, R. H. (1983, May). Information richness: A new approach to managerial behavior and organization design (Report no. TR-ONR-DG-02). Office of Naval Research.
60 Daft, R. L., & Lengel, R. H. (1983, May). Information richness: A new approach to managerial behavior and organization design (Report no. TR-ONR-DG-02). Office of Naval Research; pg. 7.
61 Lengel, R. H. (1983). Managerial information process and communication-media source selection behavior [Unpublished Doctoral Dissertation]. Texas A&M University.
62 D’Ambra, J. D., Rice, R. E., & O’Conner, M. (1998). Computer-mediated communication and media preference: An investigation of the dimensionality of perceived task equivocality and media richness. Behaviour and Information Technology, 17(3), 164-174. https://doi.org/10.1080/014492998119535
63 Walther, J. B. (1992). Interpersonal effects in computer-mediated interaction: A relational perspective. Communication Research, 19(1), 52–90. https://doi.org/10.1177/009365092019001003
64 Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23(1), 3-43. https://doi.org/10.1177/009365096023001001

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Interpersonal Communication (Dutton) by [author removed at request of original publisher] is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book