{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T17:51:16Z","timestamp":1772819476291,"version":"3.50.1"},"reference-count":58,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2016,7,9]],"date-time":"2016-07-09T00:00:00Z","timestamp":1468022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2016,12]]},"abstract":"<jats:p> In recent years, research on online impression management has received considerable scholarly attention, with an increasing focus on how the affordances of new media shape the impression management process. However, scant attention has been paid to how individuals perform their identity online in places where surveillance is the norm\u2014and punishment for non-compliance to behavioral codes is severe. This qualitative study of Azerbaijan, an honor culture with a norm of surveillance and serious repercussions for deviating from behavioral codes, explores how young adults balance the tensions between wanting to connect, create, and interact in these spaces while still adhering to behavioral codes. Findings from interviews reveal a complex set of strategies young people employ to both adhere to and break free of the restrictions they experience in offline settings. In many ways, these strategies are similar to those identified in research on more open societies; however, the ramifications for behavioral violations are so severe that careful and controlled impression management becomes paramount for Azerbaijanis, and especially so for women, who face significantly more restrictions than men. <\/jats:p>","DOI":"10.1177\/1461444815600279","type":"journal-article","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T00:53:48Z","timestamp":1440118428000},"page":"2595-2612","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":48,"title":["Performing honor online: The affordances of social media for surveillance and impression management in an honor culture"],"prefix":"10.1177","volume":"18","author":[{"given":"Katy E","family":"Pearce","sequence":"first","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[{"name":"University of Maryland, USA"}]}],"member":"179","published-online":{"date-parts":[[2016,7,9]]},"reference":[{"key":"bibr1-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/1368430212462492"},{"key":"bibr2-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/160940691401300115"},{"key":"bibr3-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1080\/1364557032000081663"},{"key":"bibr4-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1080\/15456870.2015.972282"},{"key":"bibr5-1461444815600279","volume-title":"Constructing Grounded Theory: A Practical Guide through Qualitative Analysis","author":"Charmaz K","year":"2006"},{"key":"bibr6-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/1368430212463453"},{"key":"bibr7-1461444815600279","first-page":"151","volume-title":"The Oxford Handbook of Internet Studies","author":"Ellison NB","year":"2013"},{"key":"bibr8-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12078"},{"key":"bibr9-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-polisci-030810-110815"},{"key":"bibr10-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.083"},{"key":"bibr11-1461444815600279","volume-title":"Nations in Transit: Azerbaijan","author":"Frichova Grono M","year":"2011"},{"key":"bibr12-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1080\/13510340903083919"},{"key":"bibr13-1461444815600279","doi-asserted-by":"publisher","DOI":"10.3167\/ajec.2012.210204"},{"key":"bibr14-1461444815600279","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman E","year":"1959"},{"key":"bibr15-1461444815600279","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195310030.001.0001","volume-title":"Culture and Identity in a Muslim Society","author":"Gregg GS","year":"2007"},{"key":"bibr16-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2041"},{"key":"bibr17-1461444815600279","volume-title":"Azeri Women in Transition","author":"Heyat F","year":"2002"},{"key":"bibr18-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610385893"},{"key":"bibr19-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1086\/222355"},{"key":"bibr20-1461444815600279","first-page":"4","volume":"25","author":"Kazimova A","year":"2011","journal-title":"Caucasus Analytical Digest"},{"key":"bibr21-1461444815600279","volume-title":"Self-Presentation: Impression Management and Interpersonal Behavior","author":"Leary MR","year":"1996"},{"key":"bibr22-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1037\/a0022151"},{"key":"bibr23-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8567-3_1"},{"key":"bibr24-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.04.027"},{"key":"bibr25-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531646"},{"key":"bibr26-1461444815600279","volume-title":"Surveillance Society: Monitoring Everyday Life","author":"Lyon D","year":"2001"},{"key":"bibr27-1461444815600279","first-page":"1","author":"Madini AA","year":"2014","journal-title":"Convergence: The International Journal of Research into New Media Technologies"},{"key":"bibr28-1461444815600279","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v9i4.4342"},{"key":"bibr29-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/1354856510394539"},{"key":"bibr30-1461444815600279","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v1i1.3391"},{"key":"bibr31-1461444815600279","doi-asserted-by":"publisher","DOI":"10.5817\/CP2014-2-3"},{"key":"bibr32-1461444815600279","volume-title":"Culture of Honor: The Psychology of Violence in the South","author":"Nisbett RE","year":"1996"},{"key":"bibr33-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"bibr34-1461444815600279","volume-title":"Qualitative Research and Evaluation Methods","author":"Patton MQ","year":"2002"},{"key":"bibr35-1461444815600279","first-page":"1","author":"Pearce KE","year":"2015","journal-title":"Information, Communication & Society"},{"key":"bibr36-1461444815600279","unstructured":"Rainie L, Smith A, Duggan M (2013) Coming and going on Facebook. Washington, DC: Available at: http:\/\/www.pewinternet.org\/2013\/02\/05\/coming-and-going-on-facebook\/"},{"key":"bibr37-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814546481"},{"key":"bibr38-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.022"},{"key":"bibr39-1461444815600279","first-page":"542","volume-title":"Handbook of Self and Identity","author":"Schlenker BR","year":"2012"},{"key":"bibr40-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1111\/ncmr.12024"},{"key":"bibr41-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-685180-9.50006-3"},{"key":"bibr42-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1016\/0277-5395(95)00074-7"},{"key":"bibr43-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1080\/00905999708408494"},{"key":"bibr44-1461444815600279","first-page":"89","volume-title":"Hermeneutics and Honor","author":"Tohidi N","year":"1999"},{"key":"bibr45-1461444815600279","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2129853"},{"key":"bibr46-1461444815600279","volume-title":"Social Media as Surveillance: Rethinking Visibility in a Converging World","author":"Trottier D","year":"2012"},{"key":"bibr47-1461444815600279","first-page":"89","volume-title":"The Internet and Surveillance: The Challenge of Web 2.0 and Social Media","author":"Trottier D","year":"2012"},{"key":"bibr48-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"bibr49-1461444815600279","volume-title":"Purified by Blood: Honour Killings amongst Turks in the Netherlands","author":"Van Eck C","year":"2003"},{"key":"bibr50-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1177\/1368430212467475"},{"key":"bibr51-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.84.5.997"},{"key":"bibr52-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1037\/a0012453"},{"key":"bibr53-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"bibr54-1461444815600279","first-page":"529","volume-title":"Handbook of Interpersonal Communication","author":"Walther JB","year":"2002","edition":"3"},{"key":"bibr55-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2007.00312.x"},{"key":"bibr56-1461444815600279","doi-asserted-by":"publisher","DOI":"10.7146\/mediekultur.v31i58.19373"},{"key":"bibr57-1461444815600279","unstructured":"Wohn DY, Birnholtz J, Hancock JT, (2014) Impression curation: reacting to other-generated face threats on Facebook. In: International Communication Association. Seattle, WA. Available at: http:\/\/socialmedia.northwestern.edu\/files\/2014\/01\/ICA2014.pdf (accessed 29 January 2014)."},{"key":"bibr58-1461444815600279","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815600279","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444815600279","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815600279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T06:08:53Z","timestamp":1740895733000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444815600279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,9]]},"references-count":58,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1177\/1461444815600279"],"URL":"https:\/\/doi.org\/10.1177\/1461444815600279","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,9]]}}}