skip to main content
research-article
Open Access
Honorable Mention

Adaptive Folk Theorization as a Path to Algorithmic Literacy on Changing Platforms

Published:18 October 2021Publication History
Skip Abstract Section

Abstract

The increased importance of opaque, algorithmically-driven social platforms (e.g., Facebook, YouTube) to everyday users as a medium for self-presentation effectively requires users to speculate on how platforms work in order to decide how to behave to achieve their self-presentation goals. This speculation takes the form of folk theorization. Because platforms constantly change, users must constantly re-evaluate their folk theories. Based on an Asynchronous Remote Community study of LGBTQ+ social platform users with heightened self-presentation concerns, I present an updated model of the folk theorization process to account for platform change. Moreover, I find that both the complexity of the user's folk theorization and their overall relationship with the platform impact this theorization process, and present new concepts for examining and classifying these elements: theorization complexity level and perceived platform spirit. I conclude by proposing a folk theorization-based path towards an extensible algorithmic literacy that would support users in ongoing theorization.

Skip Supplemental Material Section

Supplemental Material

References

  1. ACM US Public Policy Council. 2017. Statement on Algorithmic Transparency and Accountability. Retrieved from https://www.acm.org/binaries/content/assets/public-policy/2017_usacm_statement_algorithms.pdfGoogle ScholarGoogle Scholar
  2. Richard E Ahl and Frank C Keil. 2016. Diverse Effects, Complex Causes: Children Use Information About Machines' Functional Diversity to Infer Internal Complexity. Child Development, 88, 3: 828--845.Google ScholarGoogle ScholarCross RefCross Ref
  3. Robert M Arkin. 1981. Self-Presentation Styles. In Impression Management Theory and Social Psychological Research, James T Tedeschi (ed.). Academic Press, New York, NY, 311--334.Google ScholarGoogle Scholar
  4. Shaowen Bardzell and Jeffrey Bardzell. 2011. Towards a feminist HCI methodology: social science, feminism, and HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 675--684.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Eric PS Baumer and Jed R Brubaker. 2017. Post-userism. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 6291--6303.Google ScholarGoogle Scholar
  6. Anne Beaudry and Alain Pinsonneault. 2005. Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29, 3: 493--524.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. David Beer. 2009. Power through the algorithm? Participatory web cultures and the technological unconscious. New Media & Society, 11, 6: 985--1002.Google ScholarGoogle ScholarCross RefCross Ref
  8. Shirley J. Behrens. 1994. A conceptual analysis and historical overview of information literacy. College & Research Libraries, 55, 4: 309--322.Google ScholarGoogle ScholarCross RefCross Ref
  9. Michael S. Bernstein, Eytan Bakshy, Moira Burke, and Brian Karrer. 2013. Quantifying the invisible audience in social networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 21--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Courtney Blackwell, Jeremy Birnholtz, and Charles Abbott. 2015. Seeing and being seen: Co-situation and impression formation using Grindr, a location-aware gay dating app. New media & society, 17, 7: 1117--1136.Google ScholarGoogle Scholar
  11. Lisa Bowleg. 2013. "Once you've blended the cake, you can't take the parts back to the main ingredients": Black gay and bisexual men's descriptions and experiences of intersectionality. Sex Roles, 68, 11--12: 754--767.Google ScholarGoogle ScholarCross RefCross Ref
  12. Monica Bulger and Patrick Davison. 2018. The Promises, Challenges, and Futures of Media Literacy. Data & Society.Google ScholarGoogle Scholar
  13. John T Cacioppo and Richard E Petty. 1982. The need for cognition. Journal of personality and social psychology, 42, 1: 116.Google ScholarGoogle ScholarCross RefCross Ref
  14. John M Carrol. 1999. Five Reasons for Scenario-Based Design. In Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, 1--11.Google ScholarGoogle ScholarCross RefCross Ref
  15. Kathy Charmaz. 2006. Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. Sage, Thousand Oaks, CA.Google ScholarGoogle Scholar
  16. Mustapha Cheikh-Ammar. 2018. The IT artifact and its spirit: a nexus of human values, affordances, symbolic expressions, and IT features. European Journal of Information Systems, 27, 3: 278--294.Google ScholarGoogle ScholarCross RefCross Ref
  17. Kelley Cotter. 2018. Playing the visibility game: How digital influencers and algorithms negotiate influence on Instagram. New Media & Society, 21, 4: 895--913.Google ScholarGoogle ScholarCross RefCross Ref
  18. Kelley Cotter and Bianca C. Reisdorf. 2020. Algorithmic Knowledge Gaps: A New Dimension of (Digital) Inequality. International Journal of Communication, 14, 2020: 745--765.Google ScholarGoogle Scholar
  19. Andrea Daley, Judith A. MacDonnell, Shari Brotman, Melissa St Pierre, Jane Aronson, and Loralee Gillis. 2017. Providing health and social services to older LGBT adults. Annual Review of Gerontology & Geriatrics, 37, 143.Google ScholarGoogle ScholarCross RefCross Ref
  20. Cathy N. Davidson. 2012. A fourth "r" for 21st century literacy. The Washington Post, Washington, DC.Google ScholarGoogle Scholar
  21. Elizabeth Davidson. 2006. A technological frames perspective on information technology and organizational change. The Journal of Applied Behavioral Science, 42, 1: 23--39.Google ScholarGoogle ScholarCross RefCross Ref
  22. Fred D. Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 3: 319--340.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Gerardine DeSanctis and Marshall Scott Poole. 1994. Capturing the complexity in advanced technology use: Adaptive structuration theory. Organization Science, 5, 2: 121--147.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Michael Ann DeVito, Jeremy Birnholtz, and Jeffrey T. Hancock. 2017. Platforms, People, and Perception: Using Affordances to Understand Self-Presentation on Social Media. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 740--754.Google ScholarGoogle Scholar
  25. Michael Ann DeVito, Jeremy Birnholtz, Jeffrey T. Hancock, Megan French, and Sunny Liu. 2018. How People Form Folk Theories of Social Media Feeds and What It Means for How We Study Self-Presentation. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Paper 120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Michael Ann DeVito, Darren Gergle, and Jeremy Birnholtz. 2017. ?Algorithms ruin everything": #RIPTwitter, Folk Theories, and Resistance to Algorithmic Change in Social Media. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 3163--3174.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Michael Ann DeVito, Ashley M. Walker, and Jeremy Birnholtz. 2018. "Too Gay for Facebook:" Presenting LGBTQ+ Identity Throughout the Personal Social Media Ecosystem. Proceedings of the ACM on Human-Computer Interaction, 2, CSCW: 44.Google ScholarGoogle Scholar
  28. Berkeley J. Dietvorst, Joseph P. Simmons, and Cade Massey. 2015. Algorithm aversion: People erroneously avoid algorithms after seeing them err. Journal of Experimental Psychology: General, 144, 1: 114.Google ScholarGoogle ScholarCross RefCross Ref
  29. Andrea A. DiSessa. 2001. Changing minds: Computers, learning, and literacy. MIT Press, Cambridge, MA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Nicole B Ellison, Charles Steinfield, and Cliff Lampe. 2007. The benefits of Facebook "friends:" Social capital and college students' use of online social network sites. Journal of Computer?Mediated Communication, 12, 4: 1143--1168.Google ScholarGoogle Scholar
  31. Motahhare Eslami, Karrie Karahalios, Christian Sandvig, Kristen Vaccaro, Aimee Rickman, Kevin Hamilton, and Alex Kirlik. 2016. First I "like" it, then I hide it: Folk Theories of Social Feeds. In Proceedings of the 34rd Annual SIGCHI Conference on Human Factors in Computing Systems, 2371--2382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Motahhare Eslami, Aimee Rickman, Kristen Vaccaro, Amirhossein Aleyasen, Andy Vuong, Karrie Karahalios, Kevin Hamilton, and Christian Sandvig. 2015. "I always assumed that I wasn't really that close to [her]": Reasoning about invisible algorithms in the news feed. In Proceedings of the 33rd Annual SIGCHI Conference on Human Factors in Computing Systems, 153--162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Laura Boyd Farmer and Rebekah Byrd. 2015. Genderism in the LGBTQQIA community: An interpretative phenomenological analysis. Journal of LGBT Issues in Counseling, 9, 4: 288--310.Google ScholarGoogle ScholarCross RefCross Ref
  34. Megan French and Jeff T. Hancock. 2017. What's the Folk Theory? Reasoning About Cyber-Social Systems. Paper presented at the 67th Annual Confrence of the International Communication Association (San Diego, CA).Google ScholarGoogle Scholar
  35. Megan French, Jeff T. Hancock, Sunny Liu, Michael Ann DeVito, and Jeremy Birnholtz. 2018. Confronting the unexpected: The nature and effects of attributing responsibility to social media platforms for expectancy violations. Paper presented at the 68th Annual Conference of the International Communication Association (Prague, Czech Republic).Google ScholarGoogle Scholar
  36. Helene Gelderblom and Leanne Menge. 2018. The invisible gorilla revisited: using eye tracking to investigate inattentional blindness in interface design. In Proceedings of the 2018 International Conference on Advanced Visual Interfaces, 39.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Susan A. Gelman and Cristine H. Legare. 2011. Concepts and folk theories. Annual Review of Anthropology, 40379--398.Google ScholarGoogle Scholar
  38. Tarleton Gillespie. 2014. The Relevance of Algorithms. In Media Technologies: Essays on Communication, Materiality, and Society, Tarleton Gillespie, Pablo Boczkowski and Kirsten Foot (ed.). MIT Press, Cambridge, MA, 167--193.Google ScholarGoogle Scholar
  39. Tarleton Gillespie. 2016. Algorithm. In Digital Keywords: A Vocabulary of Information Society and Culture, Benjamin Peters (ed.). Princeton University Press, Princeton, NJ, 18--30.Google ScholarGoogle Scholar
  40. Tarleton Gillespie. 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press, New Haven, CT.Google ScholarGoogle Scholar
  41. Tarleton Gillespie. 2018. Platforms are not intermediaries. Georgetown Law Technology Review, 2, 2: 198--216.Google ScholarGoogle Scholar
  42. Erving Goffman. 1959. The presentation of self in everyday life. Anchor, New York, NY.Google ScholarGoogle Scholar
  43. Erving Goffman. 1963. Stigma: Notes on the management of spoiled identity. Simon and Schuster, New York, NY.Google ScholarGoogle Scholar
  44. Mary L Gray. 2009. Out in the country: Youth, media, and queer visibility in rural America. NYU Press, New York, NY.Google ScholarGoogle Scholar
  45. Egon G Guba and Yvonna S Lincoln. 1982. Epistemological and methodological bases of naturalistic inquiry. ECTJ, 30, 4: 233--252.Google ScholarGoogle ScholarCross RefCross Ref
  46. Michael Gurstein. 2003. Effective use: A community informatics strategy beyond the digital divide. First Monday, 8, 12.Google ScholarGoogle ScholarCross RefCross Ref
  47. Oliver L Haimson, Avery Dame-Griff, Elias Capello, and Zahari Richter. 2021. Tumblr was a trans technology: the meaning, importance, history, and future of trans technologies. Feminist Media Studies, 21, 3: 345--361.Google ScholarGoogle ScholarCross RefCross Ref
  48. Sandra G Harding. 2004. Introduction: Standpoint theory as a site of political, philosophic, and scientific debate. In The Feminist Standpoint Theory Reader: Intellectual and Political Controversies, Sandra G Harding (ed.). Routledge, 1--15.Google ScholarGoogle Scholar
  49. Jean Hardy and Silvia Lindtner. 2017. Constructing a desiring user: Discourse, rurality, and design in location-based social networks. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 13--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Eszter Hargittai. 2002. Second-Level Digital Divide: Differences in People's Online Skills. First Monday, 7, 4.Google ScholarGoogle ScholarCross RefCross Ref
  51. Eszter Hargittai, Jonathan Gruber, Teodora Djukaric, Jaelle Fuchs, and Lisa Brombach. 2020. Black box measures? How to study people's algorithm skills. Information, Communication & Society, 23, 5: 764--755.Google ScholarGoogle ScholarCross RefCross Ref
  52. Eszter Hargittai and Yuli Patrick Hsieh. 2012. Succinct survey measures of web-use skills. Social Science Computer Review, 30, 1: 95--107.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. David Herman. 2013. Storytelling and the Sciences of Mind. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  54. Henry Jenkins, Ravi Purushotma, Margaret Weigel, Katie Clinton, and Alice J Robison. 2009. Confronting the challenges of participatory culture: Media education for the 21st century. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  55. Shagun Jhaver, Yoni Karpfen, and Judd Antin. 2018. Algorithmic Anxiety and Coping Strategies of Airbnb Hosts. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 421.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Genevieve Marie Johnson. 2007. Functional Internet literacy: Required cognitive skills with implications for instruction. E-Learning and Digital Media, 4, 4: 433--441.Google ScholarGoogle ScholarCross RefCross Ref
  57. Jeffrey C Johnson and Susan C Weller. 2002. Elicitation techniques for interviewing. In Handbook of interview research: Context and method, Jaber F Gubrim and James A Holstein (ed.). Sage, Thousand Oaks, CA, 491--514.Google ScholarGoogle Scholar
  58. Frank C. Keil. 2003. Folkscience: Coarse interpretations of a complex reality. Trends in Cognitive Sciences, 7, 8: 368--373.Google ScholarGoogle ScholarCross RefCross Ref
  59. Frank C. Keil. 2010. The feasibility of folk science. Cognitive Science, 34, 5: 826--862.Google ScholarGoogle ScholarCross RefCross Ref
  60. Frank C. Keil. 2012. Does folk science develop? In The journey from child to scientist: Integrating cognitive development and the education sciences, Sharon M. Carver and Jeff Shrager (ed.). American Psychological Association, Washington, DC, 67--86.Google ScholarGoogle Scholar
  61. Frank C. Keil. 2012. Running on empty? How folk science gets by with less. Current Directions in Psychological Science, 21, 5: 329--334.Google ScholarGoogle ScholarCross RefCross Ref
  62. Douglas Kellner and Jeff Share. 2005. Toward critical media literacy: Core concepts, debates, organizations, and policy. Discourse: studies in the cultural politics of education, 26, 3: 369--386.Google ScholarGoogle Scholar
  63. Erin Klawitter and Eszter Hargittai. 2018. ?It's Like Learning a Whole Other Language:" The Role of Algorithmic Skills in the Curation of Creative Goods. International Journal of Communication, 12, 2018: 3490--3510.Google ScholarGoogle Scholar
  64. Michele Knobel and Colin Lankshear. 2014. Studying new literacies. Journal of adolescent & adult literacy, 58, 2: 97--101.Google ScholarGoogle ScholarCross RefCross Ref
  65. Liette Lapointe and Suzanne Rivard. 2005. A multilevel model of resistance to information technology implementation. MIS Quarterly, 29, 3: 461--491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Mark R. Leary and Robin M. Kowalski. 1990. Impression management: A literature review and two-component model. Psychological bulletin, 107, 1: 34.Google ScholarGoogle Scholar
  67. John D. Lee and Katrina A. See. 2004. Trust in automation: Designing for appropriate reliance. Human Factors, 46, 1: 50--80.Google ScholarGoogle ScholarCross RefCross Ref
  68. Min Kyung Lee. 2018. Understanding perception of algorithmic decisions: Fairness, trust, and emotion in response to algorithmic management. Big Data & Society, 5, 1.Google ScholarGoogle ScholarCross RefCross Ref
  69. Min Kyung Lee, Daniel Kusbit, Evan Metsky, and Laura Dabbish. 2015. Working with machines: The impact of algorithmic and data-driven management on human workers. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 1603--1612.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Richard D. Lennox and Raymond N. Wolfe. 1984. Revision of the self-monitoring scale. Journal of Personality and Social Psychology, 46, 6: 1349--1364.Google ScholarGoogle ScholarCross RefCross Ref
  71. Donald J. Leu, Charles K. Kinzer, Julie L. Coiro, and Dana W. Cammack. 2004. Toward a theory of new literacies emerging from the Internet and other information and communication technologies. Theoretical Models and Processes of Reading, 5, 1: 1570--1613.Google ScholarGoogle Scholar
  72. Eden Litt, Erin Spottswood, Jeremy Birnholtz, Jeff T Hancock, Madeline E Smith, and Lindsay Reynolds. 2014. Awkward encounters of an other kind: collective self-presentation and face threat on facebook. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, 449--460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Haley MacLeod, Ben Jelen, Annu Prabhakar, Lora Oehlberg, Katie Siek, and Kay Connelly. 2017. A Guide to Using Asynchronous Remote Communities (ARC) for Researching Distributed Populations. EAI Endorsed Transactions on Pervasive Health and Technology, 17, 11: 7.Google ScholarGoogle Scholar
  74. Juan F Maestre, Elizabeth V Eikey, Mark Warner, Svetlana Yarosh, Jessica Pater, Maia Jacobs, Gabriela Marcu, and Patrick C Shih. 2018. Conducting Research with Stigmatized Populations: Practices, Challenges, and Lessons Learned. In Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, 385--392.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Juan F Maestre, Haley MacLeod, Ciabhan L Connelly, Julia C Dunbar, Jordan Beck, Katie A Siek, and Patrick C Shih. 2018. Defining through expansion: conducting asynchronous remote communities (arc) research with stigmatized groups. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 557.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. M Lynne Markus and Mark S Silver. 2008. A foundation for the study of IT effects: A new look at DeSanctis and Poole's concepts of structural features and spirit. Journal of the Association for Information systems, 9, 10: 5.Google ScholarGoogle Scholar
  77. Jonathan Mohr and Ruth Fassinger. 2000. Measuring dimensions of lesbian and gay male experience. Measurement and Evaluation in Counseling and Development, 33, 2: 66--66.Google ScholarGoogle ScholarCross RefCross Ref
  78. Jonathan J Mohr and Matthew S Kendra. 2011. Revision and extension of a multidimensional measure of sexual minority identity: The Lesbian, Gay, and Bisexual Identity Scale. Journal of counseling psychology, 58, 2: 234.Google ScholarGoogle ScholarCross RefCross Ref
  79. Philip M Napoli. 2014. Automated media: An institutional theory perspective on algorithmic media production and consumption. Communication Theory, 24, 3: 340--360.Google ScholarGoogle ScholarCross RefCross Ref
  80. Wanda J Orlikowski and Debra C Gash. 1994. Technological frames: making sense of information technology in organizations. ACM Transactions on Information Systems (TOIS), 12, 2: 174--207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Wanda J Orlikowski and D. Hofman. 1997. An Improvisational Model of Change Management: The Case of Groupware Technologies. MIT Sloan Management Review, 38, 2.Google ScholarGoogle Scholar
  82. Frank Pasquale. 2015. The black box society: The secret algorithms that control money and information. Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  83. Frank A Pasquale. 2011. Restoring transparency to automated authority. Journal on Telecommunications and High Technology Law, 9, 2011: 235--254.Google ScholarGoogle Scholar
  84. Andrew Perrin and Monica Anderson. 2019. Share of U.S. adults using social media, including Facebook, is mostly unchanged since 2018. Pew Research Center, Washington, DC.Google ScholarGoogle Scholar
  85. Alina Pommeranz, Christian Detweiler, Pascal Wiggers, and Catholijn Jonker. 2012. Elicitation of situated values: need for tools to help stakeholders and designers to reflect and communicate. Ethics and Information Technology, 14, 4: 285--303.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Annu Sible Prabhakar, Lucia Guerra-Reyes, Vanessa M Kleinschmidt, Ben Jelen, Haley MacLeod, Kay Connelly, and Katie A Siek. 2017. Investigating the suitability of the asynchronous, remote, community-based method for pregnant and new mothers. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 4924--4934.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Emilee Rader, Kelley Cotter, and Janghee Cho. 2018. Explanations as Mechanisms for Supporting Algorithmic Transparency. In Proceedings of the 36th Annual SIGCHI Conference on Human Factors in Computing Systems, Paper 103.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Emilee Rader and Rebecca Gray. 2015. Understanding User Beliefs About Algorithmic Curation in the Facebook News Feed. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 173--182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Emilee Rader and Janine Slaker. 2017. The importance of visibility for folk theories of sensor data. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 257--270.Google ScholarGoogle Scholar
  90. Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security, 1--17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Lee Rainie and Janna Anderson. 2017. Code-Dependent: Pros and Cons of the Algorithm Age. Pew Research Center, Washington, DC.Google ScholarGoogle Scholar
  92. Nancy K. Ratner and Rose R. Olver. 1998. Reading a tale of deception, learning a theory of mind? Early Childhood Research Quarterly, 13, 2: 219--239.Google ScholarGoogle ScholarCross RefCross Ref
  93. Benjamin M. Rottman and Frank C. Keil. 2011. What matters in scientific explanations: Effects of elaboration and content. Cognition, 121, 3: 324--337.Google ScholarGoogle ScholarCross RefCross Ref
  94. Benjamin M. Rottman and Frank C. Keil. 2012. Causal structure learning over time: Observations and interventions. Cognitive Psychology, 64, 1--2: 93--125.Google ScholarGoogle ScholarCross RefCross Ref
  95. Leonid Rozenblit and Frank Keil. 2002. The misunderstood limits of folk science: An illusion of explanatory depth. Cognitive Science, 26, 5: 521--562.Google ScholarGoogle ScholarCross RefCross Ref
  96. Christian Sandvig, Kevin Hamilton, Karrie Karahalios, and Cedric Langbort. 2014. Auditing algorithms: Research methods for detecting discrimination on internet platforms. Paper presented at the 64th Annual Meeting of the International Communication Association (Seattle, WA).Google ScholarGoogle Scholar
  97. Morgan Klaus Scheuerman, Stacy M Branham, and Foad Hamidi. 2018. Safe spaces and safe places: Unpacking technology-mediated experiences of safety and harm with transgender people. Proceedings of the ACM on Human-Computer Interaction, 2, CSCW: 155.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Kurt Schmitz, James T.C. Teng, and Kimberly Webb. 2016. Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals. MIS Quarterly, 40, 3: 663--686.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Daniel J Simons and Daniel T Levin. 1998. Failure to detect changes to people during a real-world interaction. Psychonomic Bulletin & Review, 5, 4: 644--649.Google ScholarGoogle ScholarCross RefCross Ref
  100. Daniel J Simons and Ronald A Rensink. 2005. Change blindness: Past, present, and future. Trends in cognitive sciences, 9, 1: 16--20.Google ScholarGoogle Scholar
  101. Martina Mahnke Skrubbeltrang, Josefine Grunnet, and Nicolai Traasdahl Tarp. 2017. #RIPINSTAGRAM: Examining user's counter-narratives opposing the introduction of algorithmic personalization on Instagram. First Monday, 22, 4.Google ScholarGoogle Scholar
  102. Aaron Smith. 2018. Public Attitudes Toward Computer Algorithms. Pew Research Center, Washington, DC.Google ScholarGoogle Scholar
  103. Helen Spencer-Oatey. 2007. Theories of identity and the analysis of face. Journal of Pragmatics, 39, 4: 639--656.Google ScholarGoogle ScholarCross RefCross Ref
  104. Ted Striphas. 2015. Algorithmic culture. European Journal of Cultural Studies, 18, 4--5: 395--412.Google ScholarGoogle ScholarCross RefCross Ref
  105. Jan E Trost. 1986. Statistically nonrepresentative stratified sampling: A sampling technique for qualitative studies. Qualitative sociology, 9, 1: 54--57.Google ScholarGoogle Scholar
  106. Kami E. Vaniea, Emilee Rader, and Rick Wash. 2014. Betrayed by updates: how negative experiences affect future security. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2671--2674.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Viswanath Venkatesh, Michael G Morris, Gordon B Davis, and Fred D Davis. 2003. User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 3: 425--478.Google ScholarGoogle ScholarCross RefCross Ref
  108. Ashley Marie Walker and Michael Ann DeVito. 2020. "'More gay' fits in better": Intracommunity Power Dynamics and Harms in Online LGBTQ+ Spaces. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Sheila Webber and Bill Johnston. 2000. Conceptions of information literacy: new perspectives and implications. Journal of Information Science, 26, 6: 381--397.Google ScholarGoogle ScholarCross RefCross Ref
  110. Karl E Weick, Kathleen M Sutcliffe, and David Obstfeld. 2005. Organizing and the process of sensemaking. Organization Science, 16, 4: 409--421.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Jillian Weiss. 2011. Reflective paper: GL versus BT: The archaeology of biphobia and transphobia within the US gay and lesbian community. Journal of Bisexuality, 11, 4: 498--502.Google ScholarGoogle ScholarCross RefCross Ref
  112. Michele Willson. 2017. Algorithms (and the) everyday. Information, Communication & Society, 20, 1: 137--150.Google ScholarGoogle ScholarCross RefCross Ref
  113. Marianne Wiser and Carol L Smith. 2016. How Is Conceptual Change Possible? Insights from Science Education. In Core Knowledge and Conceptual Change, D. Barner and A.S. Baron (ed.). Oxford University Press, New York, NY, 29--51.Google ScholarGoogle Scholar
  114. Eva Yiwei Wu, Emily Pedersen, and Niloufar Salehi. 2019. Agent, Gatekeeper, Drug Dealer: How Content Creators Craft Algorithmic Personas. Proceedings of the ACM on Human-Computer Interaction, 3, CSCW: 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Kun Yu, Shlomo Berkovsky, Ronnie Taib, Dan Conway, Jianlong Zhou, and Fang Chen. 2017. User trust dynamics: An investigation driven by differences in system performance. In Proceedings of the 22nd International Conference on Intelligent User Interfaces, 307--317.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Adaptive Folk Theorization as a Path to Algorithmic Literacy on Changing Platforms

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Human-Computer Interaction
          Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
          CSCW2
          October 2021
          5376 pages
          EISSN:2573-0142
          DOI:10.1145/3493286
          Issue’s Table of Contents

          Copyright © 2021 Owner/Author

          This work is licensed under a Creative Commons Attribution International 4.0 License.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 October 2021
          Published in pacmhci Volume 5, Issue CSCW2

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader