Explaining virtual community participation: Accounting for the it Artifacts through identification and identity confirmation

Kathy Ning Shen, Mohamed Khalifa

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This study draws upon self-verification theory, social identity theory and self-categorization theory to investigate the dual effects of system design, i.e., identity confirmation (the self) and identification (the community), on virtual community (VC) participation. An important theoretical development is the conceptualization of VC identity and the elucidation of its system design determinants. Community presentation, i.e., system design features for presenting a virtual community identity, is hypothesized to facilitate identification by setting the boundaries for inter-group comparison and highlighting the in-group homogeneity. Furthermore, system design features that prior research identified as determinants for identity confirmation, i.e., self-presentation, deep profiling, and co-presence, are argued to have impacts on identification directly by influencing social comparison and indirectly by making the VC identity attractive. The research model accounts for the dual roles of system design features, i.e., effects on identification and identity confirmation, in explaining VC participation. The implications of these results for both theory and practice are discussed.

Original languageEnglish
Title of host publicationLecture Notes in Information Systems and Organisation
PublisherSpringer Heidelberg
Pages87-101
Number of pages15
DOIs
Publication statusPublished - Jan 1 2015
Externally publishedYes

Publication series

NameLecture Notes in Information Systems and Organisation
Volume5
ISSN (Print)2195-4968
ISSN (Electronic)2195-4976

ASJC Scopus subject areas

  • Management Information Systems
  • Information Systems
  • Computer Science Applications
  • Information Systems and Management
  • Management of Technology and Innovation

Fingerprint

Dive into the research topics of 'Explaining virtual community participation: Accounting for the it Artifacts through identification and identity confirmation'. Together they form a unique fingerprint.

Cite this