{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:46:28Z","timestamp":1775789188255,"version":"3.50.1"},"reference-count":60,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T00:00:00Z","timestamp":1538438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["INTR"],"published-print":{"date-parts":[[2018,10,2]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to investigate the motivations, concerns, benefits and consequences associated with non-use of social media. In doing so, it extends Wyatt\u2019s commonly used taxonomy of non-use by identifying new dimensions in which to understand non-use of social media. This framework encompasses a previously unidentified category of non-use that is critical to understand in today\u2019s social media environment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This is an exploratory interview study with 17 self-identified social media non-users distributed across age groups and socioeconomic backgrounds. A thematic analysis is conducted based on a novel extension of Wyatt\u2019s framework and the risk-benefits framework. This is supplemented by open coding to allow for emerging themes.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>This paper provides empirical insights into a formerly uninvestigated population of non-users who are prevented from using social media because of social engagement (rather than functional) barriers. It identifies how these individuals face social consequences both on and off social media, resulting in social disenfranchisement.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>This is an initial exploration of the phenomenon using an interview study. For generalizability, future research should investigate non-use with a broader and random sample.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>This paper includes design recommendations and implications for social media platform designers to mitigate the consequences experienced by socially disenfranchised non-users.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title><jats:p>Addressing concerns of this newly identified class of non-users is of utmost importance. As others are increasingly connected, these non-users are left behind and even ostracized \u2013 showing the dark sides of social media use and non-use.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This work identifies types of non-use of social media previously unrecognized in the literature.<\/jats:p><\/jats:sec>","DOI":"10.1108\/intr-03-2017-0123","type":"journal-article","created":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T19:06:26Z","timestamp":1535137586000},"page":"1253-1274","source":"Crossref","is-referenced-by-count":28,"title":["Social media\u2019s have-nots: an era of social disenfranchisement"],"prefix":"10.1108","volume":"28","author":[{"given":"Xinru","family":"Page","sequence":"first","affiliation":[]},{"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[]},{"given":"Moses","family":"Namara","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"2","key":"key2020100208570585500_ref001","doi-asserted-by":"crossref","first-page":"501","DOI":"10.2466\/02.09.18.PR0.110.2.501-517","article-title":"Development of a Facebook addiction scale","volume":"110","year":"2012","journal-title":"Psychological Reports"},{"issue":"1","key":"key2020100208570585500_ref002","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2307\/25148715","article-title":"The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization","volume":"30","year":"2006","journal-title":"MIS Quarterly"},{"issue":"11","key":"key2020100208570585500_ref003","first-page":"1","article-title":"Why study technology non-use?","volume":"20","year":"2015","journal-title":"First Monday"},{"issue":"2","key":"key2020100208570585500_ref004","first-page":"1","article-title":"Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion","volume":"1","year":"2015","journal-title":"Social Media & Society"},{"key":"key2020100208570585500_ref005","first-page":"3257","article-title":"Limiting, leaving, and (Re)lapsing: an exploration of Facebook non-use practices and experiences","year":"2013"},{"issue":"3","key":"key2020100208570585500_ref006","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1086\/209535","article-title":"Constructive consumer choice processes","volume":"25","year":"1998","journal-title":"Journal of Consumer Research"},{"issue":"4","key":"key2020100208570585500_ref007","first-page":"69","article-title":"Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction","volume":"116","year":"2017","journal-title":"Personality and Individual Differences"},{"issue":"1","key":"key2020100208570585500_ref008","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","article-title":"Social network sites: definition, history, and scholarship","volume":"13","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"3","key":"key2020100208570585500_ref009","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1177\/1461444814542311","article-title":"Departing glances: a sociotechnical account of \u2018leaving\u2019 grindr","volume":"18","year":"2016","journal-title":"New Media & Society"},{"issue":"2","key":"key2020100208570585500_ref010","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1108\/IntR-11-2014-0299","article-title":"Exploring the influence of social media on employee work performance","volume":"26","year":"2016","journal-title":"Internet Research"},{"issue":"11","key":"key2020100208570585500_ref011","first-page":"474","article-title":"Inhibitors and enablers as dual factor concepts in technology usage","volume":"5","year":"2004","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"key2020100208570585500_ref012","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1108\/10662241211250999","article-title":"The functional and usable appeal of Facebook SNS games","volume":"22","year":"2012","journal-title":"Internet Research"},{"issue":"8","key":"key2020100208570585500_ref013","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: a comparison of two theoretical models","volume":"35","year":"1989","journal-title":"Management Science"},{"key":"key2020100208570585500_ref014","article-title":"Adoption of social media by business education students: application of technology acceptance model (TAM)","year":"2012"},{"issue":"2","key":"key2020100208570585500_ref015","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1108\/IntR-05-2017-0198","article-title":"Investigating the impact of mobile SNS addiction on individual\u2019s self-rated health","volume":"28","year":"2018","journal-title":"Internet Research"},{"key":"key2020100208570585500_ref016","unstructured":"Duggan, M. and Smith, A. (2014), \u201cSocial media update 2013, pew research center\u201d, available at: www.pewinternet.org\/2013\/12\/30\/social-media-update-2013\/ (accessed April 25, 2014)."},{"issue":"1-4","key":"key2020100208570585500_ref017","first-page":"1","article-title":"Identity and the life cycle: selected papers","volume":"1","year":"1959","journal-title":"Psychological Issues"},{"issue":"4","key":"key2020100208570585500_ref018","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","article-title":"Predicting e-services adoption: a perceived risk facets perspective","volume":"59","year":"2003","journal-title":"International Journal of Human-Computer Studies"},{"key":"key2020100208570585500_ref019","volume-title":"Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research","year":"1975"},{"key":"key2020100208570585500_ref020","unstructured":"Greenwood, S., Perrin, A. and Duggan, M. (2016), \u201cSocial media update 2016, pew research center\u201d, available at: www.pewinternet.org\/2016\/11\/11\/social-media-update-2016\/ (accessed March 8, 2017)."},{"issue":"1","key":"key2020100208570585500_ref021","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1111\/j.1083-6101.2007.00396.x","article-title":"Whose space? Differences among users and non-users of social network sites","volume":"13","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"key2020100208570585500_ref022","first-page":"809","article-title":"Users and nonusers: interactions between levels of adoption and social capital","year":"2013"},{"issue":"3","key":"key2020100208570585500_ref023","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","article-title":"Privacy as a concept and a social issue: a multidimensional developmental theory","volume":"33","year":"1977","journal-title":"Journal of Social Issues"},{"key":"key2020100208570585500_ref024","unstructured":"Laufer, R.S., Proshansky, H.M. and Wolfe, M. (1973), \u201cSome analytic dimensions of privacy\u201d, in K\u00fcller, R. (Ed.), Proceedings of the Lund Conference on Architectural Psychology, Dowden, Hutchinson & Ross, Lund, pp. 353-372."},{"issue":"3","key":"key2020100208570585500_ref025","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1016\/j.ijhm.2011.09.018","article-title":"The effect of Facebook users\u2019 arousal and valence on intention to go to the festival: applying an extension of the technology acceptance model","volume":"31","year":"2012","journal-title":"International Journal of Hospitality Management"},{"issue":"3","key":"key2020100208570585500_ref026","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.dss.2011.01.017","article-title":"The role of affect and cognition on online consumers\u2019 decision to disclose personal information to unfamiliar online vendors","volume":"51","year":"2011","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2020100208570585500_ref027","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","article-title":"Theories in online information privacy research: a critical review and an integrated framework","volume":"54","year":"2012","journal-title":"Decision Support Systems"},{"key":"key2020100208570585500_ref028","first-page":"720","article-title":"Explaining information systems adoption and post-adoption: toward an integrative model","year":"2003"},{"issue":"1","key":"key2020100208570585500_ref029","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1111\/j.1541-0072.1998.tb01931.x","article-title":"Bridging positivist and interpretivist approaches to qualitative methods","volume":"26","year":"1998","journal-title":"Policy Studies Journal"},{"key":"key2020100208570585500_ref030","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.chb.2016.02.078","article-title":"The Janus face of Facebook: positive and negative sides of social networking site use","volume":"61","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2020100208570585500_ref031","doi-asserted-by":"crossref","unstructured":"Marwick, A.E. and Boyd, D. (2014), \u201cNetworked privacy: how teenagers negotiate context in social media\u201d, New Media & Society, Thousand Oaks, CA, available at: https:\/\/doi.org\/10.1177\/1461444814543995 (accessed March 03, 2017).","DOI":"10.1177\/1461444814543995"},{"key":"key2020100208570585500_ref032","volume-title":"Development Through Life: A Psychosocial Approach","year":"2014"},{"issue":"1","key":"key2020100208570585500_ref033","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox: personal information disclosure intentions versus behaviors","volume":"41","year":"2007","journal-title":"Journal of Consumer Affairs"},{"key":"key2020100208570585500_ref034","first-page":"648","article-title":"Changes in social media behavior during life periods of uncertainty","year":"2017"},{"key":"key2020100208570585500_ref035","first-page":"153","article-title":"FYI: communication style preferences underlie differences in location-sharing adoption and usage","year":"2013"},{"issue":"4","key":"key2020100208570585500_ref036","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1287\/isre.9.4.362","article-title":"Understanding post-adoption behavior in the context of online services","volume":"9","year":"1998","journal-title":"Information Systems Research"},{"issue":"7","key":"key2020100208570585500_ref037","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1177\/1461444812465139","article-title":"Media refusal and conspicuous non-consumption: the performative and political dimensions of Facebook abstention","volume":"15","year":"2013","journal-title":"New Media & Society"},{"key":"key2020100208570585500_ref038","first-page":"2","article-title":"Coming and going on Facebook","year":"2013","journal-title":"Pew Research Center: Internet, Science & Tech"},{"issue":"1","key":"key2020100208570585500_ref039","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1108\/JEIM-04-2012-0011","article-title":"Technology acceptance model (TAM) and social media usage: an empirical study on Facebook","volume":"27","year":"2014","journal-title":"Journal of Enterprise Information Management"},{"issue":"4","key":"key2020100208570585500_ref040","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1177\/009207002236917","article-title":"The customer economics of internet privacy","volume":"30","year":"2002","journal-title":"Journal of the Academy of Marketing Science"},{"key":"key2020100208570585500_ref041","first-page":"9","article-title":"Beyond the user: use and non-use in HCI","year":"2009"},{"key":"key2020100208570585500_ref042","first-page":"773","article-title":"Giving up twitter for lent: how and why we take breaks from social media","year":"2014"},{"issue":"4","key":"key2020100208570585500_ref043","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1089\/cpb.2004.7.384","article-title":"Internet gratifications and internet addiction: on the uses and abuses of new media","volume":"7","year":"2004","journal-title":"Cyberpsychology & Behavior"},{"key":"key2020100208570585500_ref044","first-page":"38","article-title":"E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior","year":"2001"},{"issue":"9","key":"key2020100208570585500_ref045","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1089\/cyber.2012.0323","article-title":"Who commits virtual identity suicide? Differences in privacy concerns, internet addiction, and personality between Facebook users and quitters","volume":"16","year":"2013","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"key":"key2020100208570585500_ref046","unstructured":"Stone, D.L. (1981), \u201cThe effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs, and attitudes\u201d, PhD thesis, Purdue University, West Lafayette, IN."},{"key":"key2020100208570585500_ref047","first-page":"349","article-title":"Privacy in organizations: theoretical issues, research findings, and protection mechanisms","volume":"8","year":"1990","journal-title":"Research in Personnel and Human Resources Management"},{"issue":"2","key":"key2020100208570585500_ref048","first-page":"7","article-title":"Silent listeners: the evolution of privacy and disclosure on Facebook","volume":"4","year":"2013","journal-title":"Journal of Privacy and Confidentiality"},{"issue":"4","key":"key2020100208570585500_ref049","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1080\/13691180801999050","article-title":"Grooming, gossip, Facebook and MySpace","volume":"11","year":"2008","journal-title":"Information, Communication & Society"},{"issue":"4","key":"key2020100208570585500_ref050","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1057\/ejis.2014.19","article-title":"Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users","volume":"24","year":"2015","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"key2020100208570585500_ref051","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","year":"2003","journal-title":"MIS Quarterly"},{"key":"key2020100208570585500_ref052","first-page":"599","article-title":"Trust in online news: comparing social media and official media use by Chinese citizens","year":"2013"},{"key":"key2020100208570585500_ref053","first-page":"609","article-title":"Fighting for my space: coping mechanisms for SNS boundary regulation","year":"2012"},{"issue":"2","key":"key2020100208570585500_ref054","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1108\/IntR-11-2013-0232","article-title":"Understanding the relationships of critical factors to Facebook educational usage intention","volume":"25","year":"2015","journal-title":"Internet Research"},{"issue":"2","key":"key2020100208570585500_ref055","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1108\/IntR-11-2016-0347","article-title":"Demystifying continuous participation in game applications at social networking sites: a social playfulness design perspective","volume":"28","year":"2018","journal-title":"Internet Research"},{"key":"key2020100208570585500_ref056","doi-asserted-by":"crossref","unstructured":"Wyatt, S.M.E. (2003), \u201cNon-users also matter: the construction of users and non-users of the internet\u201d, in Oudshoorn, N. and Pinch, T. (Eds), Non-Users Also Matter: The Construction of Users and Non-Users of the Internet, MIT Press, Cambridge, MA, pp. 67-79.","DOI":"10.7551\/mitpress\/3592.003.0006"},{"issue":"3","key":"key2020100208570585500_ref057","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","article-title":"The role of push-pull technology in privacy calculus: the case of location-based services","volume":"26","year":"2009","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2020100208570585500_ref058","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1108\/IntR-01-2015-0010","article-title":"Social capital on mobile SNS addiction: a perspective from online and offline channel integrations","volume":"26","year":"2016","journal-title":"Internet Research"},{"key":"key2020100208570585500_ref059","volume-title":"Case Study Research: Design and Methods","year":"2013"},{"key":"key2020100208570585500_ref060","volume-title":"Qualitative Research from Start to Finish","year":"2015","edition":"2nd ed."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IntR-03-2017-0123\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IntR-03-2017-0123\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:35:27Z","timestamp":1753392927000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/28\/5\/1253-1274\/175852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,2]]},"references-count":60,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10,2]]}},"alternative-id":["10.1108\/IntR-03-2017-0123"],"URL":"https:\/\/doi.org\/10.1108\/intr-03-2017-0123","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2018,10,2]]}}}