{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:17:27Z","timestamp":1777936647649,"version":"3.51.4"},"reference-count":45,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2011,9,26]],"date-time":"2011-09-26T00:00:00Z","timestamp":1316995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2012,3]]},"abstract":"<jats:p>This study explores how norms on social network sites evolve over time and how violations of these norms impact individuals\u2019 self-presentational and relationship goals. Employing Expectancy Violations Theory (Burgoon, 1978) as a guiding framework, results from a series of focus groups suggest that both the content of the violation and the users\u2019 relationship to the violator impact how individuals react to negative violations. Specifically, acquaintances who engage in minor negative violations are ignored or hidden, while larger infractions (that could negatively impact the individual) result in deletion of the offending content and \u2013 in extreme cases \u2013 termination of the Facebook friendship. Negative violations from close friends (that did not impact participants\u2019 goals) resulted in confrontations, while similar violations from acquaintances were often ignored by participants in an effort to \u2018keep the peace.\u2019 Furthermore, positive violations were more likely to arise from acquaintances than close friends.<\/jats:p>","DOI":"10.1177\/1461444811412712","type":"journal-article","created":{"date-parts":[[2011,9,26]],"date-time":"2011-09-26T23:43:54Z","timestamp":1317080634000},"page":"299-315","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":196,"title":["Norm evolution and violation on Facebook"],"prefix":"10.1177","volume":"14","author":[{"given":"Caitlin","family":"McLaughlin","sequence":"first","affiliation":[{"name":"Michigan State University, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[{"name":"Michigan State University, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2011,9,26]]},"reference":[{"key":"bibr1-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1177\/0265407506070476"},{"key":"bibr2-1461444811412712","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"bibr3-1461444811412712","doi-asserted-by":"publisher","DOI":"10.4135\/9781452243689.n2"},{"key":"bibr4-1461444811412712","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i12.1418"},{"key":"bibr5-1461444811412712","first-page":"119","volume-title":"Youth, Identity, and Digital Media","author":"boyd d","year":"2008"},{"key":"bibr6-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1978.tb00603.x"},{"key":"bibr7-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X93121003"},{"key":"bibr8-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1080\/03637758809376158"},{"key":"bibr9-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1993.tb00316.x"},{"key":"bibr10-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1992.tb00301.x"},{"key":"bibr11-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518847"},{"key":"bibr12-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1353\/lib.0.0057"},{"key":"bibr13-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1016\/S0740-8188(03)00033-1"},{"key":"bibr14-1461444811412712","volume-title":"Paper presented at National Communication Association Conference","author":"Cotter C","year":"2008"},{"key":"bibr15-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316682"},{"key":"bibr16-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc"},{"key":"bibr17-1461444811412712","volume-title":"Proceedings of the Thirteenth Americas Conference on Information Systems","author":"Dwyer C","year":"2007"},{"key":"bibr18-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1145\/985921.986073"},{"key":"bibr19-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1999.tb00449.x"},{"key":"bibr20-1461444811412712","unstructured":"Hechinger J (2008) College applicants, beware: Your Facebook page is showing. Wall Street Journal, 18 September. Available at: http:\/\/online.wsj.com\/article\/SB122170459104151023.html (accessed 3 December 2009)."},{"key":"bibr21-1461444811412712","volume-title":"The Human Group","author":"Homans GC","year":"1950"},{"key":"bibr22-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1080\/10417949109372828"},{"key":"bibr23-1461444811412712","doi-asserted-by":"publisher","DOI":"10.2307\/2092238"},{"key":"bibr24-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1080\/01463379109369810"},{"key":"bibr25-1461444811412712","volume-title":"Focus Groups: A Practical Guide for Applied Research","author":"Krueger RA","year":"2008","edition":"3"},{"key":"bibr26-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460675"},{"key":"bibr27-1461444811412712","unstructured":"Lang KJ (2009) Facebook friend turns into big brother. LaCrosse Tribune, 19 November. Available at: http:\/\/lacrossetribune.com\/news\/local\/article_0ff40f7a-d4d1-11de-afb3-001cc4c002e0.html (accessed 5 April 2010)."},{"key":"bibr28-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1080\/10417940601174686"},{"key":"bibr29-1461444811412712","volume-title":"Social Media & Mobile Internet Use Among Teens and Young Adults","author":"Lenhart A","year":"2010"},{"key":"bibr30-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1994.tb00335.x"},{"key":"bibr31-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1177\/1555412007309583"},{"key":"bibr32-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"bibr33-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.12.010"},{"key":"bibr34-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2000.tb00761.x"},{"key":"bibr35-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975845"},{"key":"bibr36-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2007.00372.x"},{"key":"bibr37-1461444811412712","unstructured":"Richardson K (2010) Face values. Times Higher Education, 14 September. Available at: http:\/\/www.timeshighereducation.co.uk\/story.asp?sectioncode=26&storycode=413796&c=1 (accessed 15 November 2010)."},{"key":"bibr38-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1080\/01973530802659851"},{"key":"bibr39-1461444811412712","unstructured":"Salam R (2007) The Facebook commandments: How to deal with unwanted friend requests, the ethics of de-friending, and other social networking etiquette predicaments. Slate, 25 September. Available at: http:\/\/www.slate.com\/id\/2174439\/ (consulted 1 December 2010)."},{"key":"bibr40-1461444811412712","volume-title":"The Psychology of Social Norms","author":"Sherif M","year":"1936"},{"key":"bibr41-1461444811412712","volume-title":"Reference Groups","author":"Sherif M","year":"1964"},{"issue":"2","key":"bibr42-1461444811412712","volume":"2","author":"Strano M","year":"2008","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"bibr43-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208318067"},{"key":"bibr44-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.00409.x"},{"key":"bibr45-1461444811412712","doi-asserted-by":"publisher","DOI":"10.1177\/009365001028001004"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444811412712","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444811412712","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444811412712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:39:23Z","timestamp":1777693163000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444811412712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,26]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["10.1177\/1461444811412712"],"URL":"https:\/\/doi.org\/10.1177\/1461444811412712","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9,26]]}}}