{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T08:06:33Z","timestamp":1773302793843,"version":"3.50.1"},"reference-count":53,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 Social media technologies are used by many organizations to project a positive image of their strategies and operations. At the same time, however, there are an increasing number of reports of slip-ups linked to poor situational awareness and flawed self-presentations on social media platforms. The purpose of this paper is to explore the triggers of inappropriate social media posts.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 Data were collected during a qualitative study of social media use in 31 organizations in the UK and interpreted using concepts from Erving Goffman\u2019s theory of impression management.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 The findings point to a series of demanding triggers, which increase the likelihood of insensitive and contextually inappropriate posts and also damage fostered impressions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 The authors identify four triggers linked to inappropriate social media posts, namely: speed and spontaneity; informality; blurred boundaries; and the missing audience. The authors also discuss how extending the notion of what Goffman refers to as \u201csituation-like\u201d encounters provides useful insights into impression management on social media.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-03-2015-0045","type":"journal-article","created":{"date-parts":[[2016,7,5]],"date-time":"2016-07-05T10:16:27Z","timestamp":1467713787000},"page":"597-617","source":"Crossref","is-referenced-by-count":23,"title":["Exploring situationally inappropriate social media posts"],"prefix":"10.1108","volume":"29","author":[{"given":"Michelle","family":"Richey","sequence":"first","affiliation":[]},{"given":"M.N.","family":"Ravishankar","sequence":"additional","affiliation":[]},{"given":"Christine","family":"Coupland","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020121323053026600_b1","unstructured":"Associated Press (2014), \u201cSingapore Airlines apologises for \u2018insensitive\u2019 social media posts following MH17 disaster after public backlash\u201d, 19 July, available at: www.dailymail.co.uk\/news\/article-2698269\/Singapore-Airlines-apologises-Ukraine-remarks.html (accessed 22 July 2014)."},{"key":"key2020121323053026600_b2","unstructured":"Auerbach, C.F. and Silverstein, L.B. (2003), Qualitative Data: Ann Introduction to Coding and Analysis , New York University Press, New York, NY."},{"key":"key2020121323053026600_b3","unstructured":"Barak, N. (2014), \u201cThe worst social media blunders of 2014\u201d, New York Post, 22 December, available at: https:\/\/linproxy.fan.workers.dev:443\/http\/nypost.com\/2014\/12\/22\/the-worst-social-media-blunders-of-2014\/ (accessed 28 December 2014)."},{"key":"key2020121323053026600_b4","doi-asserted-by":"crossref","unstructured":"Boyd, d.m. and Ellison, N.B. (2007), \u201cSocial network sites: definition, history and scholarship\u201d, Journal of Computer Mediated Communication , Vol. 13 No. 1, pp. 210-230.","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"key2020121323053026600_b5","doi-asserted-by":"crossref","unstructured":"Burton-Jones, A. and Gallivan, M.H. (2007), \u201cToward a deeper understanding of system usage in organizations: a multilevel perspective\u201d, MIS Quarterly , Vol. 31 No. 4, pp. 657-679.","DOI":"10.2307\/25148815"},{"key":"key2020121323053026600_b6","doi-asserted-by":"crossref","unstructured":"Cecez-Kecmanovic, D. , Galliers, R. , Henfridsson, O. , Newell, S. and Vidgen, R. (2014), \u201cThe sociomateriality of information systems: current status, future directions\u201d, MIS Quarterly , Vol. 38 No. 3, pp. 809-830.","DOI":"10.25300\/MISQ\/2014\/38:3.3"},{"key":"key2020121323053026600_b7","doi-asserted-by":"crossref","unstructured":"Farnham, S. and Churchill, E. (2011), \u201cFaceted identities, faceted lives: social and technical issues with being yourself online\u201d, paper presented at CSCW 2011, Hangzhou, 19-23 March.","DOI":"10.1145\/1958824.1958880"},{"key":"key2020121323053026600_b8","doi-asserted-by":"crossref","unstructured":"French, A.M. and Read, A. (2013), \u201cMy mom\u2019s on Facebook: an evaluation of information sharing depth in social networking\u201d, Behaviour and Information Technology , Vol. 32 No. 10, pp. 1049-1059.","DOI":"10.1080\/0144929X.2013.816775"},{"key":"key2020121323053026600_b9","unstructured":"Giacalone, R. and Rosenfeld, P. (1990), Impression Management in the Organization , Psychology Press, Routledge."},{"key":"key2020121323053026600_b10","unstructured":"Goffman, E. (1959), The Presentation of Self in Everyday Life , Anchor Books, New York, NY."},{"key":"key2020121323053026600_b11","unstructured":"Goffman, E. (1979), Gender Advertisements , Harper and Row, New York, NY."},{"key":"key2020121323053026600_b14","doi-asserted-by":"crossref","unstructured":"Hogan, B. (2010), \u201cThe presentation of self in the age of social media\u201d, Bulletin of Science Technology and Society , Vol. 30 No. 6, pp. 377-386.","DOI":"10.1177\/0270467610385893"},{"key":"key2020121323053026600_b12","doi-asserted-by":"crossref","unstructured":"Huang, J. , Baptista, J. and Galliers, R. (2013), \u201cReconceptualizing rhetorical practices in organizations: the impact of social media on internal communications\u201d, Information and Management , Vol. 50 No. 2, pp. 112-124.","DOI":"10.1016\/j.im.2012.11.003"},{"key":"key2020121323053026600_b13","doi-asserted-by":"crossref","unstructured":"Hunter-McDonnell, M. and King, B. (2013), \u201cKeeping up appearances; reputational threat and impression management after social movement boycotts\u201d, Administrative Science Quarterly , Vol. 58 No. 3, pp. 387-419.","DOI":"10.1177\/0001839213500032"},{"key":"key2020121323053026600_b16","doi-asserted-by":"crossref","unstructured":"Kane, G.C. , Alavi, M. , Labianca, G. and Borgatti, S.P. (2014), \u201cWhat\u2019s different about social networks? A framework and research agenda\u201d, MIS Quarterly , Vol. 38 No. 1, pp. 274-304.","DOI":"10.25300\/MISQ\/2014\/38.1.13"},{"key":"key2020121323053026600_b15","doi-asserted-by":"crossref","unstructured":"Kaplan, A. and Haenlein, M. (2010), \u201cUsers of the world unite! The challenges and opportunities of social media\u201d, Business Horizons , Vol. 53 No. 1, pp. 59-68.","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"key2020121323053026600_b17","doi-asserted-by":"crossref","unstructured":"Koch, H. , Gonzalez, E. and Leidner, D. (2012), \u201cBridging the work\/social divide: the emotional response to organizational social networking sites\u201d, European Journal of Information Systems , Vol. 21 No. 6, pp. 699-717.","DOI":"10.1057\/ejis.2012.18"},{"key":"key2020121323053026600_b18","unstructured":"KPMG International (2011), \u201cGoing social \u2013 how businesses are making the most of social media\u201d, available at: www.kpmg.com (accessed 15 June 2014)."},{"key":"key2020121323053026600_b19","doi-asserted-by":"crossref","unstructured":"Lapidot-Lefler, N. and Barak, A. (2012), \u201cEffects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition\u201d, Computers in Human Behavior , Vol. 28 No. 2, pp. 434-443.","DOI":"10.1016\/j.chb.2011.10.014"},{"key":"key2020121323053026600_b21","doi-asserted-by":"crossref","unstructured":"Leonardi, P.M. (2013), \u201cTheoretical foundations for the study of sociomateriality\u201d, Information and Organization , Vol. 23 No. 2, pp. 59-76.","DOI":"10.1016\/j.infoandorg.2013.02.002"},{"key":"key2020121323053026600_b22","doi-asserted-by":"crossref","unstructured":"Leonardi, P.M. and Barley, S.R. (2008), \u201cMateriality and change: challenges to building better theory about technology and organizing\u201d, Information and Organization , Vol. 18 No. 3, pp. 159-176.","DOI":"10.1016\/j.infoandorg.2008.03.001"},{"key":"key2020121323053026600_b23","doi-asserted-by":"crossref","unstructured":"Leonardi, P.M. and Barley, S.R. (2010), \u201cWhat\u2019s under construction here? Social action, materiality, and power in constructivist studies of technology and organizing\u201d, Academy of Management Annals , Vol. 4 No. 1, pp. 1-51.","DOI":"10.5465\/19416521003654160"},{"key":"key2020121323053026600_b25","doi-asserted-by":"crossref","unstructured":"Leonardi, P.M. and Treem, J.W. (2012), \u201cKnowledge management technology as a stage for strategic self-presentations: implications for knowledge sharing in organizations\u201d, Information and Organization , Vol. 22 No. 1, pp. 37-59.","DOI":"10.1016\/j.infoandorg.2011.10.003"},{"key":"key2020121323053026600_b24","doi-asserted-by":"crossref","unstructured":"Leonardi, P.M. , Huysman, M. and Steinfield, C. (2013), \u201cEnterprise social media: definition, history, and prospects for the study of social technologies in organizations\u201d, Journal of Computer-Mediated Communication , Vol. 19 No. 1, pp. 1-19.","DOI":"10.1111\/jcc4.12029"},{"key":"key2020121323053026600_b26","unstructured":"Mann, R. (2014), \u201cApple hires former nike exec to expand its social media: Musa Tariq goes to work for CEO Tim Cook\u201d, AdWeek, 5 August, available at: www.adweek.com\/news\/technology\/apple-hires-former-nike-exec-expand-its-social-media-159300 (accessed 21 December 2014)."},{"key":"key2020121323053026600_b27","doi-asserted-by":"crossref","unstructured":"Marwick, A. (2010), \u201cI tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience\u201d, New Media and Society , Vol. 13 No. 1, pp. 114-133.","DOI":"10.1177\/1461444810365313"},{"key":"key2020121323053026600_b28","unstructured":"New York Times (2012), \u201cGoldman looks to hire social media strategist\u201d, New York Times, 1 May, available at: https:\/\/linproxy.fan.workers.dev:443\/http\/dealbook.nytimes.com\/2012\/05\/01\/goldman-sachs-looks-to-hire-social-media-strategist\/?_r=0 (accessed 14 September 2014)."},{"key":"key2020121323053026600_b29","doi-asserted-by":"crossref","unstructured":"Peng, A.C. and Tjosvold, D. (2011), \u201cSocial face concerns and conflice avoidance of Chinese employees with their Western or Chinese managers\u201d, Human Relations , Vol. 64 No. 8, pp. 1031-1050.","DOI":"10.1177\/0018726711400927"},{"key":"key2020121323053026600_b30","unstructured":"Pilkington, E. (2013), \u201cJustine Sacco PR Executive fired over racist tweet ashamed\u201d, The Guardian, 22 December, available at: www.theguardian.com\/world\/2013\/dec\/22\/pr-exec-fired-racist-tweet-aids-africa-apology (accessed 15 November 2014)."},{"key":"key2020121323053026600_b31","doi-asserted-by":"crossref","unstructured":"Raghuram, S. (2013), \u201cIdentities on call: impact of impression management on Indian call centre agents\u201d, Human Relations , Vol. 66 No. 11, pp. 1471-1496.","DOI":"10.1177\/0018726713481069"},{"key":"key2020121323053026600_b32","doi-asserted-by":"crossref","unstructured":"Ravishankar, M.N. (2013), \u201cPublic ICT Innovations: a strategic ambiguity perspective\u201d, Journal of Information Technology , Vol. 28 No. 4, pp. 316-332.","DOI":"10.1057\/jit.2013.18"},{"key":"key2020121323053026600_b33","doi-asserted-by":"crossref","unstructured":"Rettie, R. (2009), \u201cMobile phone communication: extending Goffman to mediated interaction\u201d, Sociology , Vol. 43 No. 3, pp. 421-438.","DOI":"10.1177\/0038038509103197"},{"key":"key2020121323053026600_b34","doi-asserted-by":"crossref","unstructured":"Schlenker, B.R. and Wowra, S.A. (2003), \u201cCarryover effects of feeling socially transparent or impenetrable on strategic self-presentation\u201d, Journal of Personality and Social Psychology , Vol. 85 No. 5, pp. 871-880.","DOI":"10.1037\/0022-3514.85.5.871"},{"key":"key2020121323053026600_b35","doi-asserted-by":"crossref","unstructured":"Schniederjans, D. , Cao, E. and Schniederjans, M. (2013), \u201cEnhancing financial performance with social media: an impression management perspective\u201d, Decision Support Systems , Vol. 55 No. 4, pp. 911-918.","DOI":"10.1016\/j.dss.2012.12.027"},{"key":"key2020121323053026600_b36","doi-asserted-by":"crossref","unstructured":"Scott, S.V. and Orlikowski, W.J. (2014), \u201cEntanglements in practice: performing anonymity through social media\u201d, MIS Quarterly , Vol. 38 No. 3, pp. 873-893.","DOI":"10.25300\/MISQ\/2014\/38.3.11"},{"key":"key2020121323053026600_b37","doi-asserted-by":"crossref","unstructured":"Shelton, A.K. and Skalski, P. (2014), \u201cBlinded by the light: illuminating the dark side of social network use through content analysis\u201d, Computers in Human Behaviour , Vol. 33, April, pp. 339-348.","DOI":"10.1016\/j.chb.2013.08.017"},{"key":"key2020121323053026600_b38","doi-asserted-by":"crossref","unstructured":"Subramaniam, N. , Nandhakurmar, J. and Baptista, J. (2013), \u201cExploring social network interactions in enterprise systems; the role of virtual co-presence\u201d, Information Systems Journal , Vol. 23 No. 6, pp. 475-499.","DOI":"10.1111\/isj.12019"},{"key":"key2020121323053026600_b39","doi-asserted-by":"crossref","unstructured":"Suler, J. (2004), \u201cThe online disinhibition effect\u201d, CyberPsychology and Behaviour , Vol. 7 No. 3, pp. 321-326.","DOI":"10.1089\/1094931041291295"},{"key":"key2020121323053026600_b40","doi-asserted-by":"crossref","unstructured":"Tchokni, S. , S\u00e9aghdha, D.O. and Quercia, D. (2014), \u201cEmoticons and phrases: status symbols in social media\u201d, Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, 1-4 June, available at: www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM14\/paper\/view\/8103 (accessed 13 December 2014).","DOI":"10.1609\/icwsm.v8i1.14545"},{"key":"key2020121323053026600_b41","unstructured":"Treem, J.W. and Leonardi, P.M. (2012), \u201cSocial media use in organizations: exploring the affordances of visibility, editability, persistence, and association\u201d, Communication Yearbook , Vol. 36 No. 1, pp. 143-189."},{"key":"key2020121323053026600_b42","doi-asserted-by":"crossref","unstructured":"Turel, O. and Serenko, A. (2012), \u201cThe benefits and dangers of enjoyment with social networking websites\u201d, European Journal of Information Systems , Vol. 21 No. 5, pp. 512-528.","DOI":"10.1057\/ejis.2012.1"},{"key":"key2020121323053026600_b43","doi-asserted-by":"crossref","unstructured":"Turel, O. , Serenko, A. and Giles, P. (2011), \u201cIntegrating technology addiction and use: an empirical investigation of online auction users\u201d, MIS Quarterly , Vol. 35 No. 4, pp. 1043-1061.","DOI":"10.2307\/41409972"},{"key":"key2020121323053026600_b44","unstructured":"USA Today (2012), \u201cKitchenAid apologises for tweet about Obama grandmother\u201d, USA Today, 4 October, available at: www.usatoday.com\/story\/theoval\/2012\/10\/04\/company-apologizes-for-tweet-about-obamas-grandmother\/1612701\/ (accessed 25 February 2013)."},{"key":"key2020121323053026600_b45","doi-asserted-by":"crossref","unstructured":"Vaast, E. and Kaganer, E. (2013), \u201cSocial media affordances and governance in the workplace: an examination of organizational policies\u201d, Journal of Computer Mediated Communication , Vol. 19 No. 1, pp. 78-101.","DOI":"10.1111\/jcc4.12032"},{"key":"key2020121323053026600_b46","doi-asserted-by":"crossref","unstructured":"Van Maanen, J. (1979), \u201cThe fact of fiction in organizational ethnography\u201d, Administrative Science Quarterly , Vol. 24 No. 4, pp. 539-550.","DOI":"10.2307\/2392360"},{"key":"key2020121323053026600_b47","unstructured":"Vieira de Cuhna, J. (2013), \u201cA dramaturgical model of the production of performance data\u201d, MIS Quarterly , Vol. 37 No. 3, pp. 723."},{"key":"key2020121323053026600_b49","unstructured":"Walsham, G. (1993), Interpreting Information Systems in Organizations , Wiley, Chichester."},{"key":"key2020121323053026600_b48","doi-asserted-by":"crossref","unstructured":"Walther, J.B. (2007), \u201cSelective self-presentation in computer-mediated communication: hyperpersonal dimensions of technology, language, and cognition\u201d, Computers in Human Behavior , Vol. 23 No. 5, pp. 2538-2557.","DOI":"10.1016\/j.chb.2006.05.002"},{"key":"key2020121323053026600_b50","doi-asserted-by":"crossref","unstructured":"Wang, Y. , Komanduri, S. , Leon, P.G. , Norcie, G. , Acquisti, A. and Cranor, L.F. (2011), \u201c\u2018I regretted the minute I pressed share\u2019: a qualitative study of regrets on Facebook\u201d, Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, 20-22 July.","DOI":"10.1145\/2078827.2078841"},{"key":"key2020121323053026600_b51","unstructured":"Warren, C. (2011), \u201cTen people who lost jobs over social media mistakes\u201d, available at: www.mashable.com; https:\/\/linproxy.fan.workers.dev:443\/http\/mashable.com\/2011\/06\/16\/weinergate-social-media-job-loss\/ (accessed 15 March 2014)."},{"key":"key2020121323053026600_b52","doi-asserted-by":"crossref","unstructured":"Westphal, J.D. , Park, S.H. , McDonald, M.L. and Hayward, M.L.A. (2012), \u201cHelping other CEOs avoid bad press: social exchange and impression management support among CEOs in communications with journalists\u201d, Administrative Science Quarterly , Vol. 57 No. 2, pp. 217-268.","DOI":"10.1177\/0001839212453267"},{"key":"key2020121323053026600_b53","doi-asserted-by":"crossref","unstructured":"Yates, D. , Wagner, C. and Majchrzak, A. (2010), \u201cFactors affecting shapers of organizational wikis\u201d, Journal of the American Society for Information Science and Technology , Vol. 61 No. 3, pp. 543-554.","DOI":"10.1002\/asi.21266"},{"key":"key2020121323053026600_frd1","doi-asserted-by":"crossref","unstructured":"Leonardi, P.M. (2011), \u201cWhen flexible routines meet flexible technologies; affordance, constraint, and the imbrication of human and material agencies\u201d, MIS Quarterly , Vol. 35 No. 1, pp. 147-167.","DOI":"10.2307\/23043493"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ITP-03-2015-0045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-03-2015-0045\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-03-2015-0045\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:54:23Z","timestamp":1753394063000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.emerald.com\/itp\/article\/29\/3\/597-617\/175033"}},"subtitle":["An impression management perspective"],"short-title":[],"issued":{"date-parts":[[2016,8,1]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,8,1]]}},"alternative-id":["10.1108\/ITP-03-2015-0045"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1108\/itp-03-2015-0045","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2016,8,1]]}}}