Social Psychology of Social Media

Post on 30-Nov-2014

23.416 views 3 download

Tags:

description

This interactive workshop introduces participants to several key theories from social psychology and sociology in order to demonstrate how science can be used to design engaging social media applications and campaigns. The content is presented in a simple format that makes key linkages between our daily social lives and the social world in social media. During the workshop, participants have a chance to learn a number of theories, see examples of how they play out online, and then join a group analysis on the social psychology employed by a number of social media sites and mobile apps. Questions Answered: 1. What are some of the most popular theories from social psychology that I can leverage to build more persuasive social applications or run more engaging social media campaigns? 2. What’s social influence and how can it help me? How about six-degrees of separation? And what about the strengths of weak ties? 3. Where did all this hype about “influencers” come from and what’s up with the obsession over social metrics? Are they real or just marketing hype? 4. Is it true that all the top websites in the world are driven by social algorithms? 5. What’s the difference between interpersonal persuasion and social influence? Based on this top paper from a world leading scientific journal: http://www.jmir.org/2011/1/e17/

Transcript of Social Psychology of Social Media

Social Psychology of Social Media

Brian Cugelman, PhDOnline strategy and research consultant@cugelman

25 Feb 2012

Ryerson UniversityToronto, Canada

AGENDA1. We're Social Animals, However We Connect2. Digital Persuasion Equation3. Eight Spheres of Digital Influence4. Social Contexts, Offline & Online, Private & Public5. In-depth Look at Sphere Eight: Social Context6. Leveraging Social Context Factors for Social

Design7. Crowdsourced Analysis

2

WE'RE SOCIAL ANIMALS, HOWEVER WE CONNECT

3

MASLOW'S HIERARCHY OF NEEDS

How many of these needs

can we satisfy without others?

4

SHIFTING VIEWS ON THE INTERNET & SOCIAL RELATIONSHIPSBefore 2006• Internet keeps people at

home, away from friends and family

• The Internet is destroying relationships

• Using the Internet is anti-social

Beyond 2006• Pew Study, The Strength of

Internet Ties shows the net enhances social relations

• Texting helps long-distance couples stay connected (sexting too)

• Mobile phones for teens are not phones anymore, they're a social lifeline

5

A QUICK POLL

• Have you ever donated to a cause, because the organization needed a bit more money to reach their funding goal?

• Have you ever purchased a product because of top star ratings? How about one star?

• Have you ever changed your views on an issue because of an online discussion?

6

ASCH SOCIAL CONFORMITY EXPERIMENT  (1958)

http://www.youtube.com/watch?v=TYIh4MkcfJA

7

THE SPREAD OF OBESITY IN A LARGE SOCIAL NETWORK OVER 32 YEARS

8http://www.nejm.org/doi/full/10.1056/NEJMsa066082

DIGITAL PERSUASION EQUATION

9

DIGITAL PERSUASION EQUATION

10

+ + =Click Here

Motivation Persuasive Experiences

(8 spheres of digital influence)

Trigger ChangeAbility & Efficacy

+

CHANGE

• Agreeing to something - Saying “yes”

• Buying more widgets

• Increasing support for a social cause

• Losing trust in a politician

• Deciding to quit smoking

11

+ + =Click Here

Motivation Persuasive Experiences

Trigger ChangeAbility & Efficacy

+

HOW CHANGE HAPPENS

Beliefs Attitudes Behaviours

12

Not necessarily in this order. Behaviour can shape attitudes, and attitudes can shape beliefs.

+ + =Click Here

Motivation Persuasive Experiences

Trigger ChangeAbility & Efficacy

+

MOTIVATION

Behaviour is more likely when motivators outweigh

demotivators13

(+) Motivator: Goals, carrots, benefit, drivers

(-) Demotivaror: Costs, disincentives, barriers, effort

Value proposition

+ + =Click Here

Motivation Persuasive Experiences

Trigger ChangeAbility & Efficacy

+

ABILITY & EFFICACY

Ability or self-efficacy dictate what you will and won't do

14

+ + =Click Here

Motivation Persuasive Experiences

Trigger ChangeAbility & Efficacy

+

AbilityWhat you can or

can't do

Self-efficacyWhat you believe

you can or can't doSkill Confidence

Learned helplessness

TRIGGER (COVERT)

Triggering chickens with recordings of

chicks chirping

15

+ + =Click Here

Motivation Persuasive Experiences

Trigger ChangeAbility & Efficacy

+

Triggering humans with recordings of

people laughing (canned laughter)

Trigger. Reaction.

Chicken acts friendly towards a

threat

People laugh longer and harder, even at

bad jokes

TRIGGER (OVERT)

Call to action (CTA)PromptRequest

OfferProposal

Sales pitch

Click Here

Act now while quantities last.

The first 100 callers get a free gold

plated pen valued at over $50.

CALL 1 800 STUPID GIFT.

You were poked by Bob. Poke Bob back!

Download your free report

Click on this link now!

"Wow! That shirt makes you look 20 years younger. Would you like

to pay by cash or credit?"

+ + =Click Here

Motivation Persuasive Experiences

Trigger ChangeAbility & Efficacy

+

EIGHT SPHERES OF DIGITAL INFLUENCE

17

PERSUASIVECOMMUNICATION MODEL

Cugelman, B., Thelwall, M., & Dawes, P. (2009). Communication-Based Influence Components Model. Paper presented at the Persuasive 2009, Claremont.

This system can integrate hundreds of influence components, but we'll just focus on the eight spheres.

+ + =Click Here

Motivation Persuasive Experiences

Trigger ChangeAbility & Efficacy

+

1. SOURCE

What it is: •The person, organization, or group behind a website, social media profile, ad, or message

Key principles: •Appealing to source credibility boosts persuasiveness

•Build on the three components of credibility:

1. Expertise2. Trustworthiness3. Visual appeal

19

WHICH PHOTO CAN INCREASE TEXT CREDIBILITY?

NGUYEN, H. & MASTHOFF, J. (2007) Is it me or what I say? Source image and persuasion. Persuasive 07. Springer.

No photo

CREDIBILITY AND IMAGERY

Readers perceptions of text credibility is influenced by photo credibility

Don't underestimate the contribution of visuals towards perceived credibility

Photo Goodwill Trust

High credibility Higher Higher

No photo Middle Middle

Low credibility Lower Lower

21

22

Featured by X, Y, Z.

Low credibility websites can borrow credibility from higher credibility sources.

2. MESSAGE ENCODING AND DECODING

What it is:•How you express an idea and how the person interprets it

•Expression can be spoken, written, symbolic

Key principles:•How you express something can strengthen or weaken what you say

•Encode messages so the audience can rapidly understand them

23

24

Place the CTA where most eyes land

3. MEDIA CHANNEL

What it is:•The various media used to express something

•Eg. Written words, spoken dialogue, photos, video, interactive websites, email

Key principles:•Select the media channels most suited to your target audience

•Make it easy for them engage with the media

26

27

4. AUDIENCE

What it is:•The person or organization you are trying to engage and influence

•It comprises their demographics, traits, and psychology

Key principles:•Understand your audiences' motivations and psychological hot buttons

•Frame interaction around motivations and leverage hot buttons

28

HOW THE PSYCHOLOGY OF 30 HEALTH CHANGING WEBSITES INFLUENCES USERS' BEHAVIOUR

CUGELMAN, B., THELWALL, M., & DAWES, P. (2011) Online interventions for social marketing health behavior change campaigns: A meta-analysis of psychological architectures and

adherence factors. Journal of Medical Internet Research, 13(1), e17. http://www.jmir.org/2011/1/e17/

29

5. FEEDBACK ENCODING AND DECODING

What it is:•How the audience expresses and transmits their feedback to you, and how you interpret it

•Some of this is contributed voluntarily, but most is encoded automatically

Key principles:•Automate data collection whenever possible

•Incentivize requests for user information

•Just get what you need initially, then incentive data collection over time

30

31

32

6. FEEDBACK MESSAGE

What it is:•The information an audience shares with the source that is used to tailor messages•In other words, any data collected about a user that is processed and acted upon•This is the foundation for relationship building

Key principles:•Leverage user data to tailor personalized and relevant messages

•Mine trends among populations to build processes that help individuals

33

34

35

7. INTERVENTION MESSAGE

What it is:•What you express or do

•In other words, the tangible communication or action you express to an audience

Key principles:•Build your messages around your audiences' motivation, make it easy, and leverage persuasion

•Research will help you identify the influence components that matter

36

8. SOCIAL CONTEXT

What it is:•The social environment in which a relationship occurs

•This includes society, whether virtual or "real"

Key principles:•Demonstrate group behaviour to leverage social norms and pressures

•Play on our competitive nature and scarcity

37

The rest of this presentation will only look at this sphere.

SOCIAL CONTEXTS, OFFLINE & ONLINE, PRIVATE & PUBLIC

38

SOCIAL CONTEXTS

39

Offline Online

Classroom E-learning platform

Shouting out to people on the street Twitter

Sharing thoughts with friends during a night out Sharing thoughts Facebook

Academic conference networking Email discussion group

PRIVATE AND PUBLIC SPACES

40

PrivatePublicControlled

Access

Twitter

Discussion group

Facebook

Email

SMS (txting) Lined in

PRIVATE VS. PUBLIC CONCERNS

41

Living alone on a desert island

With a group of close & trusted

friends

In a large complex social environment

(school or work)

Care about your looks? Probably not Possibly Probably

Worry about your social status?

Probably not Possibly Probably

Care what others think? Possibly Possibly Probably

Willingness to say whatever you

think?Probably Probably not

SURVEILLANCE: MAKING PRIVATE MOMENTS PUBLIC

42

Research biasSocially desirable

answers

Crime preventionDeterrence

EmployabilityNever posting

anything that could harm our reputation

Cameras | Internet usage tracking | Friends posting &

tagging your photo on Facebook.

70% of employers have rejected applicants due to online information.

Surveillance moves us from a private to a public social context.

Surfing the net at work

Cautious about the sites we visit

IN-DEPTH LOOK AT SPHERE EIGHT: SOCIAL CONTEXT

43

CHANGE AGENTS: INTERPERSONAL & SOCIAL INFLUENCE

44

Social proofThe principle that we determine what's correct by following what other people

show to be correct.

Interpersonal influenceThe persuasive experience resulting from

one-on-one interaction.

HAVE YOU EVER BEEN PERSUADED OF

SOMETHING BECAUSE OF SOCIAL PROOF?

45

SOCIAL PROOF EXAMPLES

• A 10 out of 10 star produce is rated 500 times. No doubt, it must be amazing.

• A nightclub forces people to line-up outside for hours. If they're enduring that to get in, it must be great.

• The "most popular" download software must be the "best".

46

SOCIAL PROOF AND DONATIONS

47

$1.50 $50 +

Opaque: people can't see the social norm

Empty: people don't see the social

norm in action

Primed: Starter tips show people

what to do

Donationswww.socialmediacafe.ca

Donationswww.socialmediacafe.ca

Donationswww.socialmediacafe.ca

MODELLING BEHAVIOUR

48

49

DIFFUSION OF INNOVATIONS: HOW THINGS SPREAD

50

Opinion Leaders

ROGERS, E. (2003) Diffusion of innovations. (5 ed.). New York: Free Press.

ONE-WAY COMMUNICATION

51

Media Channel

1

2

3

4

5

Older, eroded model

TWO-STEP COMMUNICATION FLOW

52

Media Channel

1

2

3

4

5

Opinion LeaderKats and Lazerfeld (1955)

MULTI-STEP COMMUNICATION FLOW

Media Channel

1

2

3

4

5

Opinion Leaders

Opponent Opinion Leader

SupporterOpinion Leader

-

+

Slightly updated model

VIRAL DIFFUSION

SOCIAL NETWORK ANALYSIS AND INFLUENCE

55

Common influence metrics• Degree Centrality• Closeness• Betweenness• Coreness

TOP WEBSITES ARE SOCIAL OR USE SOCIAL ALGORITHMS1. Google (Search)2. Facebook (Social media)3. YouTube (Social media)4. Yahoo! (Search)5. Windows Live (Search)6. Baidu.com (Search)7. Wikipedia (Social media)8. Blogger.com (Social

media)9. Twitter (Social media)10.QQ.COM (Search)

56

•5 Search•5 Social media

Based on Alexa ranking retrieved 12 Oct 2010

THE SAME RECOMMENDATION CAN SPREAD AS TRUSTED ADVICE OR SPAM

57

http://www.youtube.com/watch?v=anwy2MPT5RE

I don't like spam!

Trusted recommendation

Dishonestmarketing spam

or

CREDIBILITY ASSESSMENT AND ACTIVE TRUST

58

3. Advice from an unknown source

2. Advice from a trusted person, but

not an expert

1. Advice from a trusted expert

Credibility perception

High

Medium

Low

How recommendations are regarded

Valuable advice

Promising, but not fully

trustworthy

Marketing spam

A study on how source credibility and trust relate to user behaviour: Cugelman, B., Thelwall, M. & Dawes, P. (2009) The dimensions of website credibility and their relation to active trust and behavioural impact. Communications of the Association for Information Systems. http://wlv.openrepository.com/wlv/bitstream/2436/85974/4/Cugelman_2009_website_credibility.pdf

SPAMMING REDUCES DIFFUSION

59

Dishonest spamming techniques undermine viral diffusion

Differential Adaptive Diffusion: Understanding Diversity and Learning Whom to Trust in Viral Marketing

60

61http://db.tt/kbT8BYY

SCARCITY

People assign more value to things that are less

available.

62

Groucho Marx

“I don’t want to belong to any club that

will accept people like

me as a member.”

LEVERAGING SOCIAL CONTEXT FACTORS FOR SOCIAL DESIGN

63

FROM SUPPER TO SOCIAL INFLUENCE

64

Burger and fries Chicken Burger Chicken Salad

Bun

Beef patty

Chicken breast

Fries

Salad

FROM SUPPER TO SOCIAL INFLUENCE

65

Beliefs Attitudes Behaviours

Pay influencers to push your idea

Testimonials from trusted experts

Show how popular it is Incentivize personal affiliate marketing

Make it rare and time bound

PSYCHOLOGICAL ARCHITECTURE OF SOCIAL INFLUENCE

Above the surface• What you see and experience• The total effect

Below the surface• Social proof• Modelling behaviour• Influencer endorsement• Viral spread leveraging

social trust• Scarcity

 

66

BEWARE OF UNETHICAL ABUSES OF SOCIAL INFLUENCE

• Fake positive testimonials• Fake negative ratings of competitor

products• Tricking people into inviting their friends to

join social networks• Affiliate marketing portals that

masquerade as impartial and honest advisors

• An important email from a fried, which is really a virus exploiting your social trust

67

CROWDSOURCED ANALYSIS

68

69

70

71

72

73

THE SCIENCE BEHIND THIS PRESENTATION

This presentation is based on a multi-year study of online influence, that was published in the world's leading scientific

journal on eHealth, mHealth and medical informatics.

Get the study here:http://www.jmir.org/2011/1/e17/

74

Brian Cugelman, PhDOnline strategy and research consultant

75

www.alterspark.com

@AlterSpark alterspark alterspark alterspark

Want to leverage psychology to make your websites,

campaigns, or digital products more engaging and

persuasive? Get in touch.