LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Maltby, Sarah; Thornham, Helen; Bennett, Daniel (2017)
Publisher: SAGE Publications
Languages: English
Types: Article
Subjects:
This article explores the tensions apparent in anonymous military online forums as sites of publicly visible yet discursively intimate performances of military identity and sites of distinct power relations. This article draws on data collected from British military forums and the organisations that own and manage them. We consider the discursive online practices within the forums and the extent to which the technological affordances of ‘anonymity’ (or what we define as pseudonymity) act as a critical interface between the military community who contribute to the content and non-military observers who read, access, mine and appropriate the content. In so doing, we raise critical questions about the nature of ‘anonymity’ and the complex tensions in and negotiations of private and public, visibility and invisibility that occur through it and the framing and monetising of particular online communities for economic and political purpose.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Barak, A., Boniel-Nissim, M. & Suler, J. (2008) Fostering empowerment in online support groups. Computers in Human Behaviour, Vol. 24 (5): 1867-1883.
    • Barrett, F. J. (1996) The organizational construction of hegemonic masculinity: The case of the U.S. Navy in Gender, Work and Organization 3 (3): 129-42.
    • Bartlett et al. (2014) Misogyny on Twitter. DEMOS accessed at http://www.demos.co.uk/publications/mysogyny
    • Bernstein, M. S., Monroy-Hernández, A., Harry, D., André, P., Panovich, K., & Vargas, G. G. (2011, July). 4chan and/b: An Analysis of Anonymity and Ephemerality in a Large Online Community. In ICWSM. Available at: http://www.aaai.org/ocs/index/ICWSM/ICWSM11/paper/viewFile/2873/4398
    • Coleman, G. and Golub, A. (2008) Hacker practice: Moral genres and the cultural articulation of liberalism . Anthropological Theory, 8: 255.
    • Coursaris, C. K. & Liu, M. (2009), An analysis of social support exchanges in online HIV/AIDS self-help groups. Computers in Human Behavior 25 (4): 911-918.
    • Gehl, R. (2011) The Archive and the Processor: The Internal Logic of Web 2.0 New Media & Society 13 (8): 1228-1244
    • Gehl, R (2014) Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism. Philadelphia. Temple University Press.
    • Gerlitz, C. & Helmond, A (2013) The Like Economy: Social buttons and the data-intensive Web in New Media and Society DOI: 10.1177/1461444812472322
    • Gillespie, T. (2010). The politics of platforms. New Media & Society, 12(3): 347-364.
    • Kennedy, H. (2006) Beyond anonymity, or future directions for internet identity research. New Media & Society, Vol. 8 (6) :859-876.
    • Kennedy, J. (2013). Rhetorics of Sharing: Data, Imagination and Desire. Unlike Us Reader. Social Media Monopolies and their Alternatives. Institute of Network Cultures.
    • Kerfoot, D. & Knights, D. (1993) Management, masculinity and manipulation: From Paternalism to corporate strategy in financial services in Britain. Journal of Management Studies, Vol. 30 (4):659-677.
    • King. . The Afghan War and postmodern memory: Helmand. British Journal of Sociology 61(1), 1-25.
    • Silvestri, L. (2013) Surprise homecomings and vicarious sacrifices. Media, War & Conflict, Vol. 6 (2): 101 -115.
    • Stiegler, B (2009) Teleologics of the Snail: The Errant Self Wired to a WiMax Network, Theory, Culture & Society, 26 (2-3): 33-45.
    • Storr, V. H. (2008), The Market as a Social Space: On the Meaningful Extraeconomic Conversations that Can Occur in Markets. Review of Austrian Economics, Vol. 21, Nos. 2 & 3, pp. 135-150, 2008. Available at SSRN: http://ssrn.com/abstract=1708520
    • Suchman, L. (2007). Agencies in technology design: Feminist reconfigurations. Unpublished manuscript. Available in: http://goo.gl/tsTTyl
    • Suchman, L . Agencies in technology design: Femi paper http://www.informatik. unibremen.de/soteg/gict2009/proceedings/GICT2009_ Suchman.pdf.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article