Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

1 Introduction

Virtual communities (VCs), sometimes called online communities, describe the mediated social spaces in the digital environment that allow groups to form and be sustained primarily through ongoing virtual communication processes [1]. Much evidence has shown their potent influence in bringing together far-flung, like-minded individuals [2] and their commercial and/or social values [3]. Therefore, it is very important to understand the driving forces of VC participation.

Prior research suggests that two identity processes, i.e., identity confirmation and identification, may entail different practical implications for promoting participation. Research on identification usually emphasizes the collective influences and anonymity of individuals [4] in motivating VC participation, while research on verification proposes making personal identity salient and recognized [5]. While identity confirmation emphasizes the individual’s self-concept; most prior studies on identification assume antagonism of individuality in the formation of identification, and agree that the salient personal identity would undermine the identification with the collective [6]. In the context of VCs, social interaction is enabled and shaped by various IT artifacts, the effects of which may more than often be channeled through multiple competing mechanisms. It is therefore imperative to develop a more comprehensive understanding of the effects of system design by investigating parallel identity processes.

Furthermore, although identification has been demonstrated as a significant determinant of participation, very few studies have investigated its formation in VCs. To date, most research on this topic has been done in the context of formal organizations. Even though a few studies have explored the notion of identification with physical communities, the basis for identification arises from the geographical proximity, and/or members’ relational connection, which may not be applicable in the contexts of VCs where strangers communicate in a distributed environment. As most prior studies on VCs only incorporate identification or social identity as an antecedent or moderator to explain members’ behavior, we still lack the understanding about how identification with a VC develops in general, and the impacts of IT artifacts in particular.

Thus, in this paper, we aim to examine the dual identity processes in driving VC participation with an emphasis on the antecedents for identification formation. We argue that these two seemingly contradictory identity processes are reconcilable and both of them are influenced by the usage of various system design features. To fill the gap in existing literature on identification formation in VC contexts, we develop the conceptualization of VC identity and propose the system design determinants for identification. Community presentation, i.e., system design features for presenting a virtual community identity, is hypothesized to facilitate identification by setting the boundaries for intergroup comparison and highlighting the in-group homogeneity. Furthermore, system design features that prior research identified as determinants for identity confirmation, i.e., self-presentation, deep profiling, and virtual co-presence, are argued to also have impacts on identification directly by influencing social comparison, and indirectly by making the virtual community identity attractive. The resulting research model enriches the understanding of the complicate implications of system design features by accounting for two competing identity processes, i.e., identification and identity confirmation, providing valuable guidance for VC moderation and promotion. We also expect this model to guide future empirical endeavor.

This paper is organized as follows. First we set out with a brief review covering two theories, i.e., self-categorization theory and self-verification theory, and discuss their application in computer-mediated communication (CMC) contexts. Then we develop the research model to explain the relationship between IT artifacts and VC participation as mediated by dual identity processes. This is followed by a discussion of key implications and promising research directions.

2 Theoretical Background

2.1 Social Identity and Self-Categorization Theory

Social identity was first proposed by Tajfel [7] and refers to “the individual’s knowledge that he belongs to certain social groups together with some emotional and value significance to him of this group membership” (p. 292). Self-categorization theory is proposed by Turner [8] and his colleagues [9] as an extension of social identity theory. In this theory they specify in detail how social categorization produces prototype-based depersonalization of self and others, and thus generates social identity phenomena. Self-categorization or social categorization of self is a cognitive process whereby self is assimilated to the in-group prototype and depersonalizes self-conception, i.e., self is no longer represented as ‘unique individual’ but as embodiments of the relevant prototype. Once identified with a social category, the individual tends to define him- or herself in terms of the defining features of the social category which renders the self stereotypically “interchangeable” with other group members, and stereotypically distinct from outsiders [10]. Accordingly, Ashforth and Mael [11] define identification as the “perception of oneness with or belongingness” to the social category; Dutton et al. [12] consider identification as “a cognitive connection between the definition of an organization and the definition a person applies to him- or herself”. Once identified with an organizations or a group, either physical or virtual, the individual will exhibit a more autonomous motivation resulting not only in a higher quality of engagement (e.g., greater persistence, effort, etc.) but also in more positive experiences such as enjoyment, sense of purpose, and well-being [13]. Since VCs are usually sustained by voluntarily user-generated content, identification has also been used to explain VC participation [14].

However, most prior research takes identification for granted without considering formation of identification in CMC. One exceptional case is the Social Identity Model of Deindividuation Effect (SIDE) [15], where the authors try to explain the relationship between characteristics of CMC and identification. According to SIDE, the resulting effects of deindividuation in CMC are identical to disruptive effects suggested by theories of deindividuation in social psychology [16]: decreased awareness of the social environment and of the self leads to decreased adherence to social norms. Factors that have traditionally been identified as causing deindividuation, such as the combination of anonymity and group immersion [17] or interaction via a computer network [18], do not lead to the loss of identity but rather to enhance salience of social identity. This is because the relative lack of individuation in CMC smoothes the difference among the group members. Motivated to reduce the uncertainty in social interaction, members tend to be more sensitive to any salient social identity cues and over-attribute them to group members, leading to an extenuated similarity and unity of the group and causing people to be perceived as group members rather than idiosyncratic individuals [19]. In short, the deindividuation gives rise to a strong social identification in the context of CMC. Fiol and O’Connor [20], based on SIDE, even advocate the usage of lean media with high role clarity and team legitimacy in order to develop identification in virtual teams.

2.2 Individuality and Self-Verification Theory

In contrast with social identity approach where the group shapes individuals’ self-views, self-verification theory argues for the active role of individuals in shaping their actual and perceived experiences within groups. Self-verification theory [21] assumes that stable self-views provide people with a crucial source of coherence, an invaluable means of defining their existence, and guiding social interaction (cf. [22]). Thus, people are motivated to validate and confirm their self-concepts, even when those self-concepts are negative [23]. In doing so, people allow others or encourage others to see them as they see themselves, a process which helps to obtain coherence in mental and social life and ensures the social interaction unfolding smoothly. Identity confirmation, then, refers to a state that exists when an individual’s social environment is consistent with his or her “self-identities” and is conceptualized in terms of congruence between how a group member defines him- or herself and how other group members define that person [24].

CMC provides individuals another space for exploring new identities and/or extending existing identities [25]. Although direct application of self-verification theory is still rare, the notion of identity confirmation has been widely applied in prior research. For instance, Hars and Ou [26] demonstrated peer recognition for the focal person’s contribution as a form of extrinsic reward for participating in VCs, leading to a high dedication to open source programming. Chan et al. [27] further identified different forms of recognition, i.e., identity, expertise and tangible recognition, and reported the positive linkages between recognition and VC participation. Recently, Ma and Agarwal [5] relying on self-verification theory, proposed that consonance between the focal person’s self-concept and the others’ perception of the focal person would enhance the focal person’s knowledge contribution to, and satisfaction with VC. All such studies advocate rich media for individuality expression and self-identity communication.

3 Theoretical Development

Most prior research follows either social identity theories or self-verification theory, and implicitly treats personal identity and social identity as polar opposites [28]. Individuals and groups as representatives of antagonistic forces, that is, the expression of personal identity as being mutually exclusive with developing strong social identification, e.g., SIDE model. Furthermore, prior research has shown that these two perspectives have distinct implications for community design and management which may undermine each other. For instance, research from self-verification perspective favours the personal identity and encourages self-expression and individuality, which may undermine the process of depersonalization and lead to a low level of identification (e.g., SIDE). On the other hand, reducing identifiability to enhance identification, as suggested in social identity research, may prevent an individual’s self-view from getting recognized and confirmed. Are these two theories conflicting or reconcilable?

Examination of these two seemingly competing theories leads us to believe the latter for the following reasons. First, individuality and personal identity expression are an important component in many collective actions. For instance, the explicit expression of personal identities of employees is argued to counteract the negative consequences of super-ordinate identities [29]. Second, identification and self-verification reflect identity processes operated at two different levels. While identification emphasizes the comparison between self-views and the collective identity, the self-verification perspective focuses on the negotiation between an individual’s identities and the others’ perception of the focal person, operating at the relational level. Any individual in a group is inevitably subject to influences from both the collective and the others. Finally, they imply that there are two different motivations related to self-view: while identity confirmation emphasizes the demand for stability of self-view, identification suggests motivation for self-enhancement, self-esteem and uncertainty reduction. These motivations, although different, are not necessarily in conflict.

Hence, we argue that identification and self-verification are two complementary identity processes in explaining VC participation, and both of them are subject to the influences of IT artifacts (see Fig. 1 for the research model). Built upon the work by [12], we elucidate the antecedents of identification with VCs with a focus on IT artifacts. Community presentation, i.e., system design features for presenting a virtual community identity, is hypothesized to facilitate identification by setting the boundaries for intergroup comparison and highlighting the in-group homogeneity. Furthermore, system design features which prior research has identified as determinants for identity confirmation (i.e., self-presentation, deep profiling, and virtual co-presence) are argued to also have impacts on identification not only directly by influencing social comparison, but also indirectly by making the virtual community identity attractive.

Fig. 1
figure 1

Research model

3.1 Determinants of VC Participation

Identification has been demonstrated to be an important social influence exerted from the collective (in this case, VCs) [1]. This means that the individual defines him-/herself in terms of the membership in the group. Similar to organizational identification, this study defines VC identification as one’s conception of self in terms of the defining features of the VC that renders the self-depersonalized (cf. [1]). Numerous empirical evidence has shown that identification with an organizations or a group, either physical or virtual, enhances cooperative behavior [30], participation [31], and knowledge contribution [14]. Thus, we also propose that:

Proposition 1

The member with strong identification with a VC will be more likely to participate in VC discussion.

While influenced by the collective, individuals in a VC also bring their interaction experience within the group into harmony with their own self-concepts through seeking confirmation from peers [22]. According to self-verification theory [21], people are motivated to validate and confirm their self-concepts, even when those self-concepts are negative [23]. In VCs, Hars and Ou [26] identified peer recognition for the focal person as a form of extrinsic reward for participating in VCs dedicated to open source programming. Chan et al. [27] further identified different forms of recognition, i.e., identity, expertise and tangible recognition, and demonstrated the positive linkages between recognition and VC participation. Ma and Agarwal [5], relying on self-verification theory, proposes that consonance between the focal person’s self-concept and the others’ perception of the focal person would enhance the focal person’s knowledge contribution to and satisfaction with the VC. Thus, we also propose that:

Proposition 2

The member with high identity confirmation will be more likely to participate in VC discussions.

3.2 Identification Formation in VCs

According to Postmes et al. [32], identification can be either deduced from the collective identity or constructed from social interaction among members. In the prior section, the existence of VC identities was demonstrated from which individual members can derive identification. Meanwhile, in the context VC where people enjoy more freedom of speech and individuality is usually advocated as a part of VC culture, identification may also be developed and constructed through rich expression of personal identities or individuality. For both paths, IT artifacts play a central role in presenting and communicating identities, and supporting social spaces. Thus, built upon the prior research on identification and human–computer interaction, two categories of factors for VC identification are proposed with an emphasis on the effects of IT artifacts.

3.2.1 Deduced Identification

Deduced identification reflects social influences from the collective. How members evaluate a VC identity (e.g., [12]) and how the VC identity is presented to make it salient for the basis of self-categorization (e.g., [33]) are two important factors to make this process occur.

Organizational identification literature suggests that an ongoing identity comparison process influences member attitudes toward the organization [34], whereby members assess the degree to which their perceptions of the organizational identity are congruent with their self-identities [12]. Perceived organizational identity conceptualized as an individual-level construct refers to the beliefs of a particular individual organizational member and serves as a powerful influence on the degree to which the member identifies with the organization [30]. While perceived organizational identity may be highly correlated with organizational identity—an organizational-level construct—the two constructs are conceptually distinct. Moreover, due to the fact that it is always difficult to perfectly socialize members to a collective view, what are perceived by particular members as central, distinct and enduring attributes may not be consistent with what managers want to convey. A perceived organizational identity is viewed as attractive when it fulfills the needs for self-continuity, self-distinctiveness, and self-enhancement, and the attractiveness of this image leads to strong organizational identification [30].

In the context of VCs, the communication of VC identities is less controllable than that in an organization due to the informal organization and voluntary participation. Members have full flexibility in choosing topics, discussion boards, and partners for interaction. Consequently, imperfect socialization may be more salient and members may vary significantly in the evaluation of VC identities. Despite the differences, members join VCs to fulfill similar needs, e.g., understanding and deepening salient aspects of one’s self through social interaction [31], and seeking self-esteem [35]. As with perceived organizational identity, members assess the attractiveness of the perceived VC identity by how well this image helps maintain the continuity of self-concepts, provides distinctiveness, and enhances self-esteem. To the extent that the perception of VC identities is correspondent with the members’ goals and values, i.e., attractiveness of perceived VC identities increases, they are more likely to develop identification with the VC.

Proposition 3

The attractiveness of the member’s perceived VC identity is positively associated with the member’s strength of VC identification.

Individuals self-categorize on the basis of any of available social identities, which is rather a spontaneous and often unconscious process. According to social identity theories, identity salience, or the extent to which specific identity information dominates a person’s working memory, is a key determinant of identification [36]. It is argued that when features of social context serve to make a given social identity salient, the associated process of self-stereotyping has the capacity to consensualize beliefs within a given in-group by (1) enhancing the perceived homogeneity of that in-group; (2) generating associated expectations of agreement with other group members on issues relevant to the shared identity; and (3) producing pressure to actively reach consensus in dealing with those issues through mutual influence [28, 3739]. In particular, when a VC identity is salient, it is likely to increase members’ tendency to focus and elaborate on the VC identity over the other competing identities. Therefore, the likelihood of their identification with the VC is higher.

Identity salience is most often elicited by external factors [40]. Prior research has investigated various contextual factors, e.g., group symbols [41, 42], priming [42], visible differences in dress or physical arrangement of members [43], visual images and words [44] and direct intergroup contact [45]. In the context of VCs, however, these contextual factors are mainly integrated into the design of VC websites. VC designers and managers have to rely on IT artifacts to establish the VC as a viable and meaningful social category in members’ minds.

In this research, Community Presentation is proposed to denote VC design features that present constituents of VC identities, including logos and symbols, the statement of purposes, membership policies, community initiatives and promotion, presentation of management teams, interaction states of the VC, demographic features (e.g., size, active members, postings and etc.), unique interface design, and unique functionality design. All these features make VC boundaries visible and help members answer the question, “What does this VC stand for?” Community presentation, therefore, reflects the efforts of VC designers and managers to establish the VC identities as stable, significant and a salient target for identification. To the extent that more constituents of VC identities are conferred on the VC, the VC becomes a more salient target for identification, and this is especially relevant in VCs that are purely online where perceived legitimacy is often lowest [20]. Thus, it is hypothesized that:

Proposition 4

When community presentation includes more constituents of VC identities, members are more likely to identify with the VC.

3.2.2 Individuality Expression and Identification

Apart from community presentation highlighting intergroup differences and intra-group homogeneity, IT artifacts are also designed for individuation with emphasis on inter-personal difference and diversity. Ma and Agarwal [5] has identified four categories of VC features, i.e., virtual co-presence, persistent labeling, self-presentation, and deep profiling and demonstrated that usage of these features would enhance accountability and perspective taking and consequently facilitate identity confirmation. Although some theories (e.g., SIDE model) following the antagonistic view, that is, the expression of personal identity is mutually exclusive with developing strong social identification, might argue for negative effects of such features on identification. The deterministic nature of this relationship has been questioned recently (see [46] for an overview). It is suggested that group formation is facilitated to the extent that it is compatible with the expression of individuality [29, 32]. Thus, the same VC features usage initially identified as facilitating individual identity expression and confirmation may also have positive impacts on identification, an important indicator for group formation.

Virtual co-presence refers to artifacts that provide a sense of being together with other people in a shared virtual environment (e.g., the ‘who is online’ feature). By making individuality expression observed and perceived, virtual co-presence is considered as a prerequisite for identity communication [5]. However, there is not only one implication for such features. According to the social presence theory, the development of a sense of presence implies mutual awareness, psychological involvement, and mutual understanding and is correlated with the feelings of immediacy and intimacy [47]. High social presence makes it more likely to build social relationships among members due to its capability to reduce discomfort, as well as increasing predictability and raising the level of affection toward others (cf. [48]), and increasing the possibility to develop attachment to the online community members. In addition, it is a well-known fact that the observation of in-group member actions gives rise to spontaneous inference of norms or conventions [6]. Features supporting the sense of presence make it easier for members to imitate each other’s’ actions, to engage in peer pressure and to create, notice and conform to social conventions [49], thus reinforcing social identification. Accordingly, it is hypothesized that:

Proposition 5a

Usage of virtual co-presence features will be positively related to members’ identification with the VC.

Self-presentation includes features used to convey personal identities. Features in this category include visual presentations, unique IDs, personal profiles, avatars, signature files and weblogs. Using self-presentation features makes members feel independent as they have a great control over what to present and how to present it. It also enables members to differentiate themselves from others. With various self-presentation features for individuation expression, VCs provide an attractive venue to balance the need to belong with the need to be different. Individuals empowered to express their personal identities will be more likely to develop strong identification [29]. In addition, self-presentation features make otherwise anonymous participants more recognizable, enhancing the likelihood of developing attachment and mutual obligation [50], which are affective components of identification [31]. Finally, individuality-expression-enabled-self-presentation features may also facilitate inductive identification to occur [32]. Thus, it is hypothesized that:

Proposition 5b

Usage of self-presentation features will be positively related to members’ identification with the VC.

Deep Profiling designates features that help to infer profiles of specific members from historical records. Member profiles can be built through both referential and inferential techniques. Some online communities provide search functions for retrieving the historical activity records of a particular member or of a particular discussion subject. More sophisticated designs incorporate content hit counters, ratings of contributions and participants (usually done by administrators) and peer evaluations [51], as well as displaying the value of contribution [52], oversight or review of the contribution [53]. Self-presentation can be considered as referential profiling, while deep profiling constitutes inferential profiling. Similar to self-presentation, deep profiling is another arena for individuality expression. By making activities and interaction history visible and accessible to others, deep profiling individuates each member as a unique member. Moreover, recognition of members’ contribution has been demonstrated as a main factor for community commitment [56]. Accordingly, it is hypothesized that:

Proposition 5c

Other VC members’ usage of deep profiling features will be positively related to members’ identification with the VC.

According to social identity theorists, identification with a social group is mainly derived from the group’s ability to fulfil its members’ needs [10]. Individuality expression and facilitation of social interaction are actually advocated as value propositions for most VCs [31], suggesting the ability to individuate members, in itself, a marker of shared identity or common in-group membership [54]. Based on a field survey of websites, Eighmey and McCord [55] conclude that efficiently executed design features can facilitate participants to fulfill various needs. For example, features enabling virtual co-presence cater to the needs for social interaction. Self-presentation and deep profiling features fulfill the needs for self-disclosure. Some of the self-presentation features, e.g., emoticons and avatars, also make the virtual interaction more enjoyable. The consonance between individuality expression features and individual needs makes VC identities more attractive for members. Thus, it is also hypothesized that:

Proposition 6a

Usage of virtual co-presence features will be positively related to members’ perceived attractiveness of VC identity.

Proposition 6b

Usage of self-presentation features will be positively related to members’ perceived attractiveness of VC identity.

Proposition 6c

Other VC members’ usage of deep profiling features will be positively related to members’ perceived attractiveness of VC identity.

3.3 IT Artefacts and Identity Confirmation

Consistent with the prior study [5], the hypotheses of the impact of virtual co-presence, self-presentation and deep profiling on identity confirmation are also included. The original study by [5] shows that path coefficients and significance are different for the two sites studied, suggesting that more research with different VCs is necessary to validate and perhaps extend the understanding of the relationship between IT artifacts and identity confirmation. Moreover, as the same artifacts may affect identification and identity confirmation simultaneously, the knowledge of their relative importance for each mechanism will provide valuable guidance for VC design.

Proposition 7a

Usage of virtual co-presence features will be positively related to members’ identity confirmation.

Proposition 7b

Usage of self-presentation features will be positively related to members’ identity confirmation.

Proposition 7c

Other VC members’ usage of deep profiling features will be positively related to members’ identity confirmation.

4 Discussion and Implications

Prior research has suggested two competing identity processes in explaining VC participation with different focuses and design implications. Given the integral nature of VC contexts, it is therefore, imperative to address the dual effects of system design, i.e., identity confirmation (the self) and identification (the community) on VC participation. Moreover, this study represents the early attempt to address identification formation in VCs by conceptualizing VC identity and the elucidating its system design determinants. Community presentation, representing the effort of VC designers and managers, is hypothesized to facilitate identification. Furthermore, the relationships between system design features that prior research identified as determinants for identity confirmation and identification are also discussed.

The resulting research model entails several important theoretical implications. First, this study provides a more comprehensive view towards the mechanisms that translate system design into expected individual behaviors. Currently, we have witnessed an obvious trend of integration in many kinds of information system design, leading to two important implications. On the one hand, typologies of IT artifacts need to be developed to provide a complete understanding of system design; on the other hand, multiple psychological/social psychological mechanisms need to be examined simultaneously to gain the insight on the complexity induced by technological settings. In this study, the conceptualization of IT artifacts in VC contexts is extended from the perspective of identity communication. Using “personal vs. collective identities” as a framework, the new conceptualization articulates well the IT artifacts used for VC identities and personal identities communication. Moreover, rather than focusing on single mechanism, this study advances research by accounting for diversity of underlying mechanisms.

The new construct proposed in this study, community presentation, also has important theoretical implications. Most prior VC research takes an individual members’ perspective emphasizing the member-sustained aspect of VC sustaining, neglecting the management aspect. In practice, however, VC designers and managers are actively involved in launching, sustaining, promoting and even commercializing VCs. Their efforts, as reflected through the system design, should be considered as an important factor in understanding VC-related phenomenon. This study represents the initial effort to conceptualize the system design from the management perspective.

Another important theoretical contribution of this study is to explore the identification formation in VCs in general and the effects of IT artifacts in particular. Identification has been studied in many contexts, e.g., groups, organizations, communities, and more particularly VCs. In the context of communities, studies on identification have just started and many controversies still remain in several fundamental areas, such as the existence of community identities. In the IS field where VCs have received much interest, most prior studies take identification or theories developed in organizational contexts as given without exploring the specificity brought by IT artifacts. This study advances the theoretical work on identification by conceptualizing VC identities and developing a research model to explain identification formation in VCs; more particularly, the role of the system design for this process has been explored.

The propositions developed in this paper also provide valuable practical guidance for VC design and management. First our model suggests multiple IT artifacts that VC designers and managers can employ to enhance VC participation. In addition, by elaborating the theoretical underpinning of the effects of system design, the model can also guide the development of new features.

As a theoretical framework, the proposed model offers a clear guideline for future empirical validation and prospect research opportunities. All propositions are ready to be developed into hypotheses and tested in real VCs. Moreover, recognizing the diversity and dynamics inherent in VCs, we also expect the proposed model as a base model which can be used to investigate the diversity in VCs, e.g., gender composition, community stages and etc., which can be included as moderators. Finally, a longitudinal approach could be employed to investigate the dynamics in identity processes, system interaction and VC participation.