CINXE.COM

The affordances and constraints of information in crime prevention communities through social media

<meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><base href="https://mojc.um.edu.my/index.php/MJLIS/article/view/46828"><div style="background:#fff;border:1px solid #999;margin:-1px -1px 0;padding:0;"><div style="background:#ddd;border:1px solid #999;color:#000;font:13px arial,sans-serif;font-weight:normal;margin:12px;padding:8px;text-align:left">This is the html version of the file <a href="https://mojc.um.edu.my/index.php/MJLIS/article/view/46828"><font color=blue>https://mojc.um.edu.my/index.php/MJLIS/article/view/46828</font></a>.<br> Google automatically generates html versions of documents as we crawl the web.</div></div><div style="position:relative"><html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta name="Author" content="Ali Fauzi"> <meta name="CreationDate" content="D:20240510044739+20&#39;47&#39;"> <meta name="Creator" content="WPS Writer"> <meta name="ModDate" content="D:20240510044739+20&#39;47&#39;"> <meta name="SourceModified" content="D:20240510044739+20&#39;47&#39;"> <meta name="Title" content="TF_Template_Word_Windows_2016"> <title>The affordances and constraints of information in crime prevention communities through social media</title> </head><body bgcolor=#ffffff vlink="blue" link="blue"> <table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=1><b>Page 1</b></a></font></td></tr></table><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:238;left:214"><nobr><i><b>Malaysian Journal of Library &amp; Information Science, Vol. 29, no. 1, April, 2024: 107-121</b></i></nobr></div> <div style="position:absolute;top:1355;left:128"><nobr><b>https://doi.org/10.22452/mjlis.vol29no1.6</b></nobr></div> <div style="position:absolute;top:1355;left:696"><nobr>Page 107</nobr></div> </span></font> <font size=5 face="Times"><span style="font-size:37px;font-family:Times"> <div style="position:absolute;top:287;left:147"><nobr><b>The affordances and constraints</b></nobr></div> <div style="position:absolute;top:336;left:226"><nobr><b>of information in crime</b></nobr></div> <div style="position:absolute;top:384;left:136"><nobr><b>prevention communities through</b></nobr></div> <div style="position:absolute;top:432;left:325"><nobr><b>social media</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:495;left:324"><nobr><b>Ali Fauzi<font style="font-size:9px">1* </font>and Shamshul Bahri<font style="font-size:9px">2</font></b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:518;left:162"><nobr>Department of Library and Information Science, Faculty of Arts and Social Sciences,</nobr></div> <div style="position:absolute;top:538;left:293"><nobr>Universiti Malaya, Kuala Lumpur, MALAYSIA</nobr></div> <div style="position:absolute;top:558;left:216"><nobr>Department of Decision Science, Faculty of Business and Economy,</nobr></div> <div style="position:absolute;top:578;left:293"><nobr>Universiti Malaya, Kuala Lumpur, MALAYSIA</nobr></div> <div style="position:absolute;top:598;left:199"><nobr>e-mail: *alifauzi@um.edu.my (corresponding author); esbi@um.edu.my</nobr></div> <div style="position:absolute;top:618;left:303"><nobr>ORCID ID: A.Fauzi: 0000-0002-8093-0560</nobr></div> <div style="position:absolute;top:638;left:338"><nobr>S.Bahri: 0000-0002-1571-5768</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:683;left:128"><nobr><b>ABSTRACT</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:706;left:128"><nobr><i>Social media can provide important and useful information to communities in their fight to</i></nobr></div> <div style="position:absolute;top:724;left:128"><nobr><i>prevent crime. However, this capability has its downside. For every affordance social media</i></nobr></div> <div style="position:absolute;top:742;left:128"><nobr><i>provides, the platform presents an equally important constraint, which researchers and the</i></nobr></div> <div style="position:absolute;top:761;left:128"><nobr><i>public often ignore. Using an in-depth case study of social media crime prevention communities</i></nobr></div> <div style="position:absolute;top:779;left:128"><nobr><i>in Malaysia, this paper intends to provide a rich understanding of the information provided by</i></nobr></div> <div style="position:absolute;top:798;left:128"><nobr><i>social media in crime prevention. The study adopts the technology affordances and constraints</i></nobr></div> <div style="position:absolute;top:816;left:128"><nobr><i>theory to make sense of and explain how the information provided by social media affords and</i></nobr></div> <div style="position:absolute;top:834;left:128"><nobr><i>constrains the communities' efforts to fight crime.</i></nobr></div> <div style="position:absolute;top:871;left:128"><nobr><b>Keywords: </b>Social media; Information dynamics; Crime prevention; Affordances and constraints;</nobr></div> <div style="position:absolute;top:889;left:128"><nobr>Facebook.</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:944;left:128"><nobr><b>INTRODUCTION</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:986;left:128"><nobr>Information dynamics is a function of information extraction, summarization, and</nobr></div> <div style="position:absolute;top:1007;left:128"><nobr>visualization (Christel, 2002). In this respect, the source of information is one of the biggest</nobr></div> <div style="position:absolute;top:1027;left:128"><nobr>influencers of information dynamics. Sources of information can influence people's</nobr></div> <div style="position:absolute;top:1047;left:128"><nobr>engagement or avoidance of a particular action or movement. The technology that comes</nobr></div> <div style="position:absolute;top:1067;left:128"><nobr>with each source brings different dynamics to information (Warner, 2005). Today's</nobr></div> <div style="position:absolute;top:1087;left:128"><nobr>communication world provides various sources of information. They are conventional media</nobr></div> <div style="position:absolute;top:1107;left:128"><nobr>such as newspapers and magazines, personal networks such as mobile instant messaging</nobr></div> <div style="position:absolute;top:1127;left:128"><nobr>services, social media such as Facebook and X (formerly Twitter), and the Internet such as</nobr></div> <div style="position:absolute;top:1148;left:128"><nobr>online newspapers and blogs. Some sources of information create excitement that entices</nobr></div> <div style="position:absolute;top:1168;left:128"><nobr>people to its beliefs and ideology while others create anxiety and information overload,</nobr></div> <div style="position:absolute;top:1188;left:128"><nobr>leading to people avoiding them (Soroya &amp; Faiola, 2023).</nobr></div> <div style="position:absolute;top:1231;left:128"><nobr>Meanwhile, social media applications such as Facebook, X, and Instagram have been</nobr></div> <div style="position:absolute;top:1251;left:128"><nobr>adopted by Malaysians for various reasons, including crime prevention. Anecdotal evidence</nobr></div> <div style="position:absolute;top:1271;left:128"><nobr>suggests that the Malaysian public perceives crime has been increasing (Merdeka Centre,</nobr></div> <div style="position:absolute;top:1292;left:128"><nobr>2013). Statistics suggest that crime rates have risen steadily between 1 to 8 percent since the</nobr></div> </span></font> <div style="position:absolute;top:1438;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=2><b>Page 2</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:1501;left:128"><nobr><i><b>Fauzi, A. &amp; Bahri, S.</b></i></nobr></div> <div style="position:absolute;top:2620;left:128"><nobr>Page 108</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:1549;left:128"><nobr>1970s (Baharom &amp; Habibullah, 2009). For crime prevention, social media provides access to</nobr></div> <div style="position:absolute;top:1569;left:128"><nobr>relevant and timely information, such as the type and location of crime, and tips on</nobr></div> <div style="position:absolute;top:1589;left:128"><nobr>preventing such occurrences. The information comes in the form of videos, written texts,</nobr></div> <div style="position:absolute;top:1609;left:128"><nobr>and infographics (Ismail et al., 2022). Furthermore, social media communities and groups</nobr></div> <div style="position:absolute;top:1629;left:128"><nobr>have been formed to share information and knowledge about how to best prevent crime.</nobr></div> <div style="position:absolute;top:1669;left:128"><nobr>While social media has been used extensively for many social purposes, including crime</nobr></div> <div style="position:absolute;top:1689;left:128"><nobr>prevention, our understanding of the dynamics of information when this platform is utilized</nobr></div> <div style="position:absolute;top:1710;left:128"><nobr>is still scarce. Existing studies focus more on the mechanisms and implications of social</nobr></div> <div style="position:absolute;top:1730;left:128"><nobr>media applications to prevent crime (Junhee, 2020; Tim et al., 2017). Additionally, there is an</nobr></div> <div style="position:absolute;top:1750;left:128"><nobr>implicit assumption that the information dynamics on social media are equivalent to other</nobr></div> <div style="position:absolute;top:1770;left:128"><nobr>sources of information. This assumption may result in the misapplication of social media to</nobr></div> <div style="position:absolute;top:1790;left:128"><nobr>disseminate important information. Thus, understanding social media's information</nobr></div> <div style="position:absolute;top:1810;left:128"><nobr>dynamics is crucial to increase the effectiveness of information dissemination through that</nobr></div> <div style="position:absolute;top:1830;left:128"><nobr>platform.</nobr></div> <div style="position:absolute;top:1871;left:128"><nobr>This study attempts to answer an important research question: what are the affordances and</nobr></div> <div style="position:absolute;top:1891;left:128"><nobr>constraints of using social media to disseminate information on crime prevention? To answer</nobr></div> <div style="position:absolute;top:1911;left:128"><nobr>this, the study adopts the technology affordances and constraints theory (TACT) by</nobr></div> <div style="position:absolute;top:1931;left:128"><nobr>Majchrzak and Markus (2012). Using a case study research approach, this study collects data</nobr></div> <div style="position:absolute;top:1951;left:128"><nobr>by interviewing the various communities, celebrities, and authorities that have employed</nobr></div> <div style="position:absolute;top:1971;left:128"><nobr>social media to share and exchange information about crime and crime prevention. This</nobr></div> <div style="position:absolute;top:1992;left:128"><nobr>study concludes by demonstrating the affordances and constraints of using social media to</nobr></div> <div style="position:absolute;top:2012;left:128"><nobr>provide crime and crime-prevention information.</nobr></div> <div style="position:absolute;top:2052;left:128"><nobr>This paper is organized as follows. First, it reviews the relevant literature on social media,</nobr></div> <div style="position:absolute;top:2072;left:128"><nobr>exploring its relationship with information dynamics, and its role in providing crime</nobr></div> <div style="position:absolute;top:2092;left:128"><nobr>prevention information. Next, it examines the application of the TACT concept in previous</nobr></div> <div style="position:absolute;top:2112;left:128"><nobr>studies, utilizing it as a theoretical framework for this research. The article outlines the</nobr></div> <div style="position:absolute;top:2133;left:128"><nobr>research methodology used for data collection and data analysis before presenting the case</nobr></div> <div style="position:absolute;top:2153;left:128"><nobr>description. Further, it elucidates how social media can enable certain behaviors while</nobr></div> <div style="position:absolute;top:2173;left:128"><nobr>hindering others. By employing this theoretical lens, the article emphasizes that the impacts</nobr></div> <div style="position:absolute;top:2193;left:128"><nobr>of social media are not universally positive (or negative) but paradoxical - it may be affording</nobr></div> <div style="position:absolute;top:2213;left:128"><nobr>solutions but constraining solutions simultaneously. Finally, the theoretical contribution of</nobr></div> <div style="position:absolute;top:2233;left:128"><nobr>this study is presented.</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:2293;left:128"><nobr><b>LITERATURE REVIEW</b></nobr></div> <div style="position:absolute;top:2337;left:128"><nobr><b>Social Media</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:2360;left:128"><nobr>The term 'social media’ is often used interchangeably with social networks, social networking,</nobr></div> <div style="position:absolute;top:2380;left:128"><nobr>Enterprise 2.0, and Web 2.0 despite a range of distinctions in the literature <b>(</b>Kaplan &amp;</nobr></div> <div style="position:absolute;top:2400;left:128"><nobr>Haenlein<b>, </b>2010). The range of social media applications has grown since the introduction of</nobr></div> <div style="position:absolute;top:2420;left:128"><nobr>arguably the first social media site, sixdegrees.com, in 1997; however, by 2020, the number</nobr></div> <div style="position:absolute;top:2440;left:128"><nobr>of social media has stabilized, with only a few hugely popular platforms being used. Malaysia</nobr></div> <div style="position:absolute;top:2460;left:128"><nobr>has also been reported to have one of the highest Facebook users worldwide (Statista, 2019).</nobr></div> <div style="position:absolute;top:2480;left:128"><nobr>These applications offer users various features (such as sharing texts, videos, and pictures)</nobr></div> <div style="position:absolute;top:2501;left:128"><nobr>and facilitate their ability to 'socialize' with others. Social media allows relationships</nobr></div> <div style="position:absolute;top:2521;left:128"><nobr>between users from different backgrounds, resulting in abundant resources. Massive</nobr></div> <div style="position:absolute;top:2541;left:128"><nobr>information generation is a notable output of social media use. However, a disadvantage of</nobr></div> <div style="position:absolute;top:2561;left:128"><nobr>such overload of information is sometimes evident in the inability of users to find credible</nobr></div> </span></font> <div style="position:absolute;top:2701;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=3><b>Page 3</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:2764;left:246"><nobr><i><b>The Affordances and Constraints of Information in Crime Prevention Communities</b></i></nobr></div> <div style="position:absolute;top:3879;left:696"><nobr>Page 109</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:2812;left:128"><nobr>information for them at times of need. Social media sites are so deeply integrated into our</nobr></div> <div style="position:absolute;top:2832;left:128"><nobr>daily lives that people depend on them for almost everything from daily news and updates</nobr></div> <div style="position:absolute;top:2852;left:128"><nobr>on critical events to entertainment, connecting with family and friends, reviews and</nobr></div> <div style="position:absolute;top:2872;left:128"><nobr>product/service/place recommendations, meeting emotional needs, managing workplaces,</nobr></div> <div style="position:absolute;top:2892;left:128"><nobr>and keeping up with the latest fashion, among others (Kapoor et al., 2018).</nobr></div> <div style="position:absolute;top:2932;left:128"><nobr>Social media platforms like Facebook, WhatsApp, Twitter, YouTube, LinkedIn, Pinterest, and</nobr></div> <div style="position:absolute;top:2952;left:128"><nobr>Instagram come to mind when it comes to social media. Social media is powered by user-</nobr></div> <div style="position:absolute;top:2973;left:128"><nobr>generated content and is highly influential in various ways, from shopping/selling habits,</nobr></div> <div style="position:absolute;top:2993;left:128"><nobr>entrepreneurship, and political issues to venture capitalism (Greenwood &amp; Gopal, 2015). As</nobr></div> <div style="position:absolute;top:3013;left:128"><nobr>of January 2020, Facebook holds the coveted position of market leader in social media, with</nobr></div> <div style="position:absolute;top:3033;left:128"><nobr>more than 2 billion monthly users (Statista, 2019). In addition to tweets, social media sites</nobr></div> <div style="position:absolute;top:3053;left:128"><nobr>are inundated with photo and video uploads, and about 1.3 billion photos are shared on</nobr></div> <div style="position:absolute;top:3073;left:128"><nobr>Instagram every day (Omnicore, 2024), according to recent figures. Based on 2018 social</nobr></div> <div style="position:absolute;top:3093;left:128"><nobr>media statistics, while 50 million companies maintain active business pages on Facebook,</nobr></div> <div style="position:absolute;top:3114;left:128"><nobr>only two million utilize Facebook ads. Moreover, eighty-eight percent of businesses utilize</nobr></div> <div style="position:absolute;top:3134;left:128"><nobr>Facebook for marketing purposes (Lister, 2023).</nobr></div> <div style="position:absolute;top:3174;left:128"><nobr>In recent years, academics and experts have been discussing and analyzing the many aspects</nobr></div> <div style="position:absolute;top:3194;left:128"><nobr>of social media. Organizations mainly engage in social media with the goal of receiving</nobr></div> <div style="position:absolute;top:3214;left:128"><nobr>stakeholder input (Phang et al., 2015). User reviews are another significant part of social</nobr></div> <div style="position:absolute;top:3234;left:128"><nobr>media, bringing forward information content, reputation, and authenticity. Online</nobr></div> <div style="position:absolute;top:3255;left:128"><nobr>communities have succeeded in bringing together people with similar interests and goals.</nobr></div> <div style="position:absolute;top:3275;left:128"><nobr>While most messages shared on social media sites are personal statuses or updates on</nobr></div> <div style="position:absolute;top:3295;left:128"><nobr>current affairs, some posts seek support and assistance. Ironically, these were identified as</nobr></div> <div style="position:absolute;top:3315;left:128"><nobr>emotionally stressful posts that cause social stress, leading other participants to experience</nobr></div> <div style="position:absolute;top:3335;left:128"><nobr>negative psychological and behavioral effects as they feel compelled to respond (Maier et al.,</nobr></div> <div style="position:absolute;top:3355;left:128"><nobr>2015).</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:3395;left:128"><nobr><b>Social Media and Information Dynamics</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:3418;left:128"><nobr>Information dynamics transpire differently in an organizational setting. In one study, there is</nobr></div> <div style="position:absolute;top:3438;left:128"><nobr>a close relationship between information dynamics and communicational interactions (Pires</nobr></div> <div style="position:absolute;top:3458;left:128"><nobr>&amp; Albagli, 2012). Informational collaboration leads to blended value propositions in an</nobr></div> <div style="position:absolute;top:3478;left:128"><nobr>organization that intends to implement an information system (Feldman &amp; Horan, 2011).</nobr></div> <div style="position:absolute;top:3498;left:128"><nobr>Additionally, the relationship between organizational culture and employees' sensemaking</nobr></div> <div style="position:absolute;top:3518;left:128"><nobr>can affect information behavior (Li &amp; Luo, 2021). Thus, providing the right information to</nobr></div> <div style="position:absolute;top:3538;left:128"><nobr>workers in an organization is a challenging task as their needs change over time (Wu et al.,</nobr></div> <div style="position:absolute;top:3559;left:128"><nobr>2009).</nobr></div> <div style="position:absolute;top:3599;left:128"><nobr>Meanwhile, one study suggests the importance of relevance criteria while searching for</nobr></div> <div style="position:absolute;top:3619;left:128"><nobr>information. This study asserts that the user's background knowledge of a search topic will</nobr></div> <div style="position:absolute;top:3639;left:128"><nobr>differ according to the search phase: problem recognition, system interaction, and document</nobr></div> <div style="position:absolute;top:3659;left:128"><nobr>interaction (Kim et al., 2021). On a different note, the change in information environment</nobr></div> <div style="position:absolute;top:3679;left:128"><nobr>changes the definition of Web usability. Here, the interface design and effectiveness</nobr></div> <div style="position:absolute;top:3699;left:128"><nobr>attributes can alter the definition of Web usability (Chen et al., 2015).</nobr></div> <div style="position:absolute;top:3740;left:128"><nobr>Information dynamics work slightly differently in the social media realm (Xiang, 2011). In</nobr></div> <div style="position:absolute;top:3760;left:128"><nobr>many situations, the propagation of information across social media depends on the subject</nobr></div> <div style="position:absolute;top:3780;left:128"><nobr>importance, users' dynamics, and network structure. The information propagates fastest</nobr></div> <div style="position:absolute;top:3800;left:128"><nobr>when the subject attracts huge attention, the users are actively promoting the topic, and</nobr></div> <div style="position:absolute;top:3820;left:128"><nobr>there is a huge and highly interconnected network to enable the information to move fast</nobr></div> </span></font> <div style="position:absolute;top:3964;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=4><b>Page 4</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:4027;left:128"><nobr><i><b>Fauzi, A. &amp; Bahri, S.</b></i></nobr></div> <div style="position:absolute;top:5146;left:128"><nobr>Page 110</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:4075;left:128"><nobr>(Zhang et al., 2020). In other words, one piece of information that starts small can become</nobr></div> <div style="position:absolute;top:4095;left:128"><nobr>viral in minutes on a social media platform when those factors are in play (Feng et al., 2018).</nobr></div> <div style="position:absolute;top:4135;left:128"><nobr>Algorithms used in social media significantly affect the speed and spread of information. In</nobr></div> <div style="position:absolute;top:4155;left:128"><nobr>one study, the authors assert that large-scale algorithmic personalization has led to the</nobr></div> <div style="position:absolute;top:4175;left:128"><nobr>detriment of the democratic sphere and pushed extremist ideologies to the core of the</nobr></div> <div style="position:absolute;top:4195;left:128"><nobr>debate (Santos-d'Amorim &amp; dos Santos, 2022). In other words, social media algorithms are</nobr></div> <div style="position:absolute;top:4215;left:128"><nobr>powerful tools for uniting or dividing communities (Johnson et al., 2019).</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:4255;left:128"><nobr><b>Technology Affordance and Constraints Theory</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:4278;left:128"><nobr>This study adopts the technology affordances and constraints lens (Majchrzak &amp; Markus,</nobr></div> <div style="position:absolute;top:4298;left:128"><nobr>2012) to examine the roles of social media in providing information about crime and crime</nobr></div> <div style="position:absolute;top:4318;left:128"><nobr>prevention. This theoretical perspective highlights technologies' action potentials and</nobr></div> <div style="position:absolute;top:4338;left:128"><nobr>relational nature (Leonardi, 2011). Technology affordance refers to the opportunity for</nobr></div> <div style="position:absolute;top:4358;left:128"><nobr>action (Hutchby, 2001; Volkoff &amp; Strong, 2013), that is the potential uses and capabilities</nobr></div> <div style="position:absolute;top:4378;left:128"><nobr>that an individual or organization can exploit when using a technology to achieve a specific</nobr></div> <div style="position:absolute;top:4399;left:128"><nobr>purpose (Majchrzak &amp; Markus, 2012). On the other hand, technology constraint refers to the</nobr></div> <div style="position:absolute;top:4419;left:128"><nobr>limitations or obstacles that an individual or organization may encounter when using a</nobr></div> <div style="position:absolute;top:4439;left:128"><nobr>technology to accomplish a particular goal (Majchrzak &amp; Markus, 2012).</nobr></div> <div style="position:absolute;top:4479;left:128"><nobr>Affordances explore possibilities for democratic and self-organized digital platforms such as</nobr></div> <div style="position:absolute;top:4499;left:128"><nobr>social media (Federici et al., 2015) or opportunities for collective movements to achieve</nobr></div> <div style="position:absolute;top:4519;left:128"><nobr>organizational goals (Zheng &amp; Yu, 2016). The affordances and constraints of social media are</nobr></div> <div style="position:absolute;top:4540;left:128"><nobr>investigated in socialization, sharing of knowledge, power exercises, and change in the</nobr></div> <div style="position:absolute;top:4560;left:128"><nobr>context of organizational phenomena (Treem &amp; Leonardi, 2013) and produce conflicting</nobr></div> <div style="position:absolute;top:4580;left:128"><nobr>results which have the unintentional positive (affordances) and negative (constraints) effects</nobr></div> <div style="position:absolute;top:4600;left:128"><nobr>(Majchrzak, et al., 2013b). The literature revealed some already conceptualized social media</nobr></div> <div style="position:absolute;top:4620;left:128"><nobr>affordances. Some of them focus on social media communication opportunities. Social media</nobr></div> <div style="position:absolute;top:4640;left:128"><nobr>also allows users to share content targeted at other social media users (Karahanna et al.,</nobr></div> <div style="position:absolute;top:4660;left:128"><nobr>2018) and to broaden the reach of content produced by other users through a meta-voicing</nobr></div> <div style="position:absolute;top:4681;left:128"><nobr>opportunity (Majchrzak et al., 2013a). Content is shared directly by users and does not</nobr></div> <div style="position:absolute;top:4701;left:128"><nobr>employ intermediaries, so information is democratized (Tim et al., 2018), as the social media</nobr></div> <div style="position:absolute;top:4721;left:128"><nobr>information shared by other users is available. Users can view their content on social media</nobr></div> <div style="position:absolute;top:4741;left:128"><nobr>(Treem &amp; Leonardi, 2013) so that other users can access information about their content or</nobr></div> <div style="position:absolute;top:4761;left:128"><nobr>users via the networks (Majchrzak et al., 2013a; Tim et al., 2018). Social media platforms put</nobr></div> <div style="position:absolute;top:4781;left:128"><nobr>together people to develop relationships among two or more people (Mettler &amp; Winter,</nobr></div> <div style="position:absolute;top:4801;left:128"><nobr>2016; Treem &amp; Leonardi, 2013; Vaast &amp; Kaganer, 2013; Van Osch &amp; Steinfield, 2016), even</nobr></div> <div style="position:absolute;top:4822;left:128"><nobr>those established in an organizational hierarchy with peers or superiors (Leidner et al., 2018).</nobr></div> <div style="position:absolute;top:4842;left:128"><nobr>Defined as possibilities for collaboration include mass collaboration (Zammuto et al., 2007),</nobr></div> <div style="position:absolute;top:4862;left:128"><nobr>collaborative ability (Stamati et al., 2015), or interactions between different subjects which</nobr></div> <div style="position:absolute;top:4882;left:128"><nobr>work together in cooperation (Chen et al., 2016; Stamati et al., 2015). Association options</nobr></div> <div style="position:absolute;top:4902;left:128"><nobr>available through social media are available through content and meta-voicing - between</nobr></div> <div style="position:absolute;top:4922;left:128"><nobr>individuals and individuals and contents (Karahanna et al., 2018; Majchrzaket al., 2013a; Van</nobr></div> <div style="position:absolute;top:4942;left:128"><nobr>Osch &amp; Steinfield, 2016). Social media allows individuals to be informed about topics of</nobr></div> <div style="position:absolute;top:4962;left:128"><nobr>interest. Users may also benefit from triggered attendance in discussions online, affording</nobr></div> <div style="position:absolute;top:4983;left:128"><nobr>them to remain silent as long as the content shared is not of interest and only become active</nobr></div> <div style="position:absolute;top:5003;left:128"><nobr>when alerted when the content of interest is shared (Majchrzak et al., 2013a; Van Osch &amp;</nobr></div> <div style="position:absolute;top:5023;left:128"><nobr>Steinfield, 2016). Social media, on the other hand, also offers the possibility to encourage the</nobr></div> <div style="position:absolute;top:5043;left:128"><nobr>participation of other users by facilitating simple and effective processes in which</nobr></div> <div style="position:absolute;top:5063;left:128"><nobr>participants can be enrolled in online discussions (Zheng &amp; Yu, 2016). Social media enables</nobr></div> <div style="position:absolute;top:5083;left:128"><nobr>users to circumvent geographic limits and decouple individual actions from their</nobr></div> </span></font> <div style="position:absolute;top:5227;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=5><b>Page 5</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:5290;left:246"><nobr><i><b>The Affordances and Constraints of Information in Crime Prevention Communities</b></i></nobr></div> <div style="position:absolute;top:6405;left:696"><nobr>Page 111</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:5338;left:128"><nobr>geographical location. Such possibilities of action are described as mobility (Chatterjee et al.,</nobr></div> <div style="position:absolute;top:5358;left:128"><nobr>2017), internet ubiquity (Deng &amp; Joshi, 2016), and delocalization of work (Seidel et al., 2013).</nobr></div> <div style="position:absolute;top:5398;left:128"><nobr>Finally, social media provides opportunities to coordinate individual actions and to transfer</nobr></div> <div style="position:absolute;top:5418;left:128"><nobr>actions to individuals. Social media enable the grouping of individuals and managing groups</nobr></div> <div style="position:absolute;top:5438;left:128"><nobr>of individuals (Baccarella et al., 2018; Karahanna et al., 2018). Such action possibilities also</nobr></div> <div style="position:absolute;top:5458;left:128"><nobr>afford forms of emergent organizing (Tim et al., 2018), whereby users of social media take</nobr></div> <div style="position:absolute;top:5478;left:128"><nobr>roles voluntarily and leave roles to facilitate online discussions (Majchrzak et al., 2013a) or</nobr></div> <div style="position:absolute;top:5499;left:128"><nobr>shift roles of work if they realize that actions to be carried out should be taken by someone</nobr></div> <div style="position:absolute;top:5519;left:128"><nobr>else's role (Strong et al., 2014).</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:5579;left:128"><nobr><b>METHOD</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:5623;left:128"><nobr>The analysis is based on an interpretive case study of the efforts to prevent crime in Malaysia.</nobr></div> <div style="position:absolute;top:5643;left:128"><nobr>In answering the ‘how’ research questions, an exploratory qualitative research approach is</nobr></div> <div style="position:absolute;top:5663;left:128"><nobr>appropriate (Walsham, 1995). In this case, studying the use of social media in crime</nobr></div> <div style="position:absolute;top:5683;left:128"><nobr>prevention requires an investigation of the interactions between people and technology.</nobr></div> <div style="position:absolute;top:5704;left:128"><nobr>Interpretive case research offers deeper understanding, as it encourages openness to new</nobr></div> <div style="position:absolute;top:5724;left:128"><nobr>findings without being influenced by predetermined hypotheses (Hale, 2005). The case</nobr></div> <div style="position:absolute;top:5744;left:128"><nobr>selected was based on two criteria. First, the significant adoption of social media in battling</nobr></div> <div style="position:absolute;top:5764;left:128"><nobr>against crimes offers valuable insights into the practical use of social media and its impact on</nobr></div> <div style="position:absolute;top:5784;left:128"><nobr>citizen participation. Second, the crime prevention effort in Malaysia using social media</nobr></div> <div style="position:absolute;top:5804;left:128"><nobr>captures the entanglement between the new media and communities at all levels in realizing</nobr></div> <div style="position:absolute;top:5825;left:128"><nobr>a goal that serves as an excellent opportunity to unveil the affordances and constraints of</nobr></div> <div style="position:absolute;top:5845;left:128"><nobr>social media in this context.</nobr></div> <div style="position:absolute;top:5888;left:128"><nobr>Data collection comprised an initial background review, onsite fieldwork, social media data</nobr></div> <div style="position:absolute;top:5908;left:128"><nobr>gathering, and follow-up clarifications. In sum, 28 interviewees from several crime-fighting</nobr></div> <div style="position:absolute;top:5928;left:128"><nobr>communities using social media were interviewed. Interviews were open-ended and</nobr></div> <div style="position:absolute;top:5948;left:128"><nobr>exploratory in nature and occasionally guided by some rudimentary questions that were</nobr></div> <div style="position:absolute;top:5969;left:128"><nobr>structured around the interviewee's role, involvement, and experiences in social media-</nobr></div> <div style="position:absolute;top:5989;left:128"><nobr>enabled crime-fighting initiatives. Interviews were further customized along the way; new</nobr></div> <div style="position:absolute;top:6009;left:128"><nobr>interview questions were devised based on the findings arising from previous interviews</nobr></div> <div style="position:absolute;top:6029;left:128"><nobr>(Klein &amp; Myers, 1999). Each onsite interview was digitally recorded (with permission) and</nobr></div> <div style="position:absolute;top:6049;left:128"><nobr>transcribed for data analysis.</nobr></div> <div style="position:absolute;top:6089;left:128"><nobr>In summary, the interviews recorded around two hundred pages of textual data. After</nobr></div> <div style="position:absolute;top:6110;left:128"><nobr>obtaining permission from the interviewees, relevant postings on the social media platform</nobr></div> <div style="position:absolute;top:6130;left:128"><nobr>Facebook were reviewed. This rich set of data enabled the observation of affordances and</nobr></div> <div style="position:absolute;top:6150;left:128"><nobr>constraints in practice by allowing in-depth analysis of everyday activities of the social media</nobr></div> <div style="position:absolute;top:6170;left:128"><nobr>communities. Additionally, relevant documentation was requested from the communities,</nobr></div> <div style="position:absolute;top:6190;left:128"><nobr>and related data from online news reports, infographics, statistics, and crime-related</nobr></div> <div style="position:absolute;top:6210;left:128"><nobr>statements were published online as supporting evidence for triangulation. Table 1 outlines</nobr></div> <div style="position:absolute;top:6230;left:128"><nobr>the details of the data collection efforts.</nobr></div> <div style="position:absolute;top:6271;left:128"><nobr>Data collection and analysis go hand in hand in interpretive research, representing the</nobr></div> <div style="position:absolute;top:6291;left:128"><nobr>interplay of theoretical concepts and empirical data. Data were assessed and reassessed</nobr></div> <div style="position:absolute;top:6311;left:128"><nobr>several times, categorized into emerging themes, first guided by preliminary, potentially</nobr></div> <div style="position:absolute;top:6331;left:128"><nobr>relevant theoretical constructs that serve as the ‘sensitizing device’ (Klein &amp; Myers, 1999a).</nobr></div> <div style="position:absolute;top:6351;left:128"><nobr>More specific themes emerged in the research process as the researcher's understanding of</nobr></div> </span></font> <div style="position:absolute;top:6490;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=6><b>Page 6</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:6553;left:128"><nobr><i><b>Fauzi, A. &amp; Bahri, S.</b></i></nobr></div> <div style="position:absolute;top:7672;left:128"><nobr>Page 112</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:6601;left:128"><nobr>the phenomenon deepened. The unique interaction between social media and respondents</nobr></div> <div style="position:absolute;top:6621;left:128"><nobr>led to what is afforded and constrained by social media. The attention to TACT emerged</nobr></div> <div style="position:absolute;top:6641;left:128"><nobr>from observing the complex relationship in which communities residing at different levels of</nobr></div> <div style="position:absolute;top:6661;left:128"><nobr>engagement enacted social media differently. After identifying this particular set of themes,</nobr></div> <div style="position:absolute;top:6681;left:128"><nobr>the study moved back and forth between data and theories, interrogating the materials to</nobr></div> <div style="position:absolute;top:6701;left:128"><nobr>verify whether the data supported the emerging claims and whether the theories helped</nobr></div> <div style="position:absolute;top:6721;left:128"><nobr>deepen the study's understanding.</nobr></div> <div style="position:absolute;top:6759;left:199"><nobr>Table 1: Overview of Data Collection Methods and Sources in This Study</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:6785;left:128"><nobr>Online interviews</nobr></div> <div style="position:absolute;top:6786;left:275"><nobr>Six interviews were conducted on Facebook using <font color="#0d0d0d">Facebook's messaging or</font></nobr></div> </span></font> <font size=3 color="#0d0d0d" face="Times"><span style="font-size:12px;font-family:Times;color:#0d0d0d"> <div style="position:absolute;top:6802;left:275"><nobr>video call features. <font color="#000000">All interviewees were followers of the crime prevention</font></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:6824;left:275"><nobr>communities,</nobr></div> <div style="position:absolute;top:6824;left:377"><nobr>and</nobr></div> <div style="position:absolute;top:6824;left:420"><nobr>interviews</nobr></div> <div style="position:absolute;top:6824;left:502"><nobr>were</nobr></div> <div style="position:absolute;top:6824;left:552"><nobr>conducted</nobr></div> <div style="position:absolute;top:6824;left:636"><nobr>individually</nobr></div> <div style="position:absolute;top:6824;left:725"><nobr>and</nobr></div> <div style="position:absolute;top:6842;left:275"><nobr>asynchronously. Online interviews are particularly appropriate for</nobr></div> <div style="position:absolute;top:6860;left:275"><nobr>participants concerned with the researcher's physical presence and make it</nobr></div> <div style="position:absolute;top:6879;left:275"><nobr>easier for participants to discuss more sensitive topics (e.g., revealing their</nobr></div> <div style="position:absolute;top:6897;left:275"><nobr>encounter with crime) (Busher &amp; James, 2009). Moreover, given that the</nobr></div> <div style="position:absolute;top:6915;left:275"><nobr>targeted respondents of the study are online communities, interviews on</nobr></div> <div style="position:absolute;top:6934;left:275"><nobr>social media sites can easily be executed and allow closer reflection on the</nobr></div> <div style="position:absolute;top:6952;left:275"><nobr>issues. For example, interviewees could easily enrich their responses by</nobr></div> <div style="position:absolute;top:6970;left:275"><nobr>sharing the links of relevant posts they have just disclosed to the interviewer.</nobr></div> <div style="position:absolute;top:6991;left:128"><nobr>Semi-structured</nobr></div> <div style="position:absolute;top:7009;left:128"><nobr>interviews onsite</nobr></div> <div style="position:absolute;top:6991;left:275"><nobr>Average of 90 minutes, 28 onsite face-to-face interviews. The list of</nobr></div> <div style="position:absolute;top:7009;left:275"><nobr>interviewees involved was:</nobr></div> <div style="position:absolute;top:7029;left:275"><nobr>•</nobr></div> <div style="position:absolute;top:7028;left:302"><nobr>The Royal Malaysia Police social media team (comprising four members</nobr></div> <div style="position:absolute;top:7047;left:302"><nobr>from the national police force) who initiated a social media presence</nobr></div> <div style="position:absolute;top:7065;left:302"><nobr>aimed at promoting civic engagement and gauging public sentiment.</nobr></div> <div style="position:absolute;top:7084;left:275"><nobr>•</nobr></div> <div style="position:absolute;top:7084;left:302"><nobr>A journalist from the crime desk, the largest circulating newspaper</nobr></div> <div style="position:absolute;top:7102;left:302"><nobr>published in Malaysia, had a Facebook page that recorded more than</nobr></div> <div style="position:absolute;top:7121;left:302"><nobr>890,000 ‘likes’.</nobr></div> <div style="position:absolute;top:7140;left:275"><nobr>•</nobr></div> <div style="position:absolute;top:7140;left:302"><nobr>An influential community leader who founded a community policing</nobr></div> <div style="position:absolute;top:7158;left:302"><nobr>association and used social media actively to fight crime.</nobr></div> <div style="position:absolute;top:7177;left:275"><nobr>•</nobr></div> <div style="position:absolute;top:7177;left:302"><nobr>Nine founders or administrators of social media crime-fighting</nobr></div> <div style="position:absolute;top:7195;left:302"><nobr>communities, comprising social activists, active bloggers, and criminal</nobr></div> <div style="position:absolute;top:7214;left:302"><nobr>lawyers.</nobr></div> <div style="position:absolute;top:7233;left:275"><nobr>•</nobr></div> <div style="position:absolute;top:7233;left:302"><nobr>A well-known Malaysian crime analyst frequently featured in the media</nobr></div> <div style="position:absolute;top:7251;left:302"><nobr>and actively involved in various crime prevention committees.</nobr></div> <div style="position:absolute;top:7271;left:275"><nobr>•</nobr></div> <div style="position:absolute;top:7270;left:302"><nobr>Four developers of a mobile distress application.</nobr></div> <div style="position:absolute;top:7290;left:275"><nobr>•</nobr></div> <div style="position:absolute;top:7289;left:302"><nobr>Eight followers of crime-fighting communities, including specific users</nobr></div> <div style="position:absolute;top:7308;left:302"><nobr>involved in or benefited from some widely known cases (e.g., stolen car</nobr></div> <div style="position:absolute;top:7326;left:302"><nobr>owners who track down the car with the help of social media</nobr></div> <div style="position:absolute;top:7344;left:302"><nobr>communities).</nobr></div> <div style="position:absolute;top:7363;left:275"><nobr>Data was gathered from multiple levels to account for possible differences in</nobr></div> <div style="position:absolute;top:7381;left:275"><nobr>interpretation among the participants (Klein &amp; Myers, 1999) and to ensure a</nobr></div> <div style="position:absolute;top:7399;left:275"><nobr>comprehensive understanding of the context.</nobr></div> <div style="position:absolute;top:7420;left:128"><nobr>Facebook postings</nobr></div> <div style="position:absolute;top:7420;left:275"><nobr>Data were also collected from the Facebook postings of several crime</nobr></div> <div style="position:absolute;top:7438;left:275"><nobr>prevention pages. A page here could refer to a Facebook Page, a Facebook</nobr></div> <div style="position:absolute;top:7456;left:275"><nobr>Group, or a personal Facebook Profile founded, administrated, participated</nobr></div> <div style="position:absolute;top:7475;left:275"><nobr>in, or owned by the participants. The aim is to take advantage of the</nobr></div> <div style="position:absolute;top:7493;left:275"><nobr>significant amount of social media data to understand better the interactions</nobr></div> <div style="position:absolute;top:7511;left:275"><nobr>among the communities and the resulting actions. The data collection was</nobr></div> <div style="position:absolute;top:7530;left:275"><nobr>also guided by input gathered from interviewees, which allowed screening</nobr></div> <div style="position:absolute;top:7548;left:275"><nobr>and selection of influential postings such as stolen cars and murder cases</nobr></div> <div style="position:absolute;top:7566;left:275"><nobr>that have attracted a large number of digital attention or have been</nobr></div> <div style="position:absolute;top:7585;left:275"><nobr>successfully solved with the help of social media. Comments made by group</nobr></div> <div style="position:absolute;top:7603;left:275"><nobr>members were carefully analyzed to investigate how social media affords</nobr></div> <div style="position:absolute;top:7621;left:275"><nobr>and constraints.</nobr></div> </span></font> <div style="position:absolute;top:7753;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=7><b>Page 7</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:7816;left:246"><nobr><i><b>The Affordances and Constraints of Information in Crime Prevention Communities</b></i></nobr></div> <div style="position:absolute;top:8931;left:696"><nobr>Page 113</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:7864;left:128"><nobr>The initial analysis provided an overview of the phenomenon of interest (Pan &amp; Tan, 2011). It</nobr></div> <div style="position:absolute;top:7884;left:128"><nobr>allowed the breaking down of the affordances and constraints into two pairs, which are (a)</nobr></div> <div style="position:absolute;top:7904;left:128"><nobr>Instantaneity and Verifiability, and (b) Actionability and Miscoordination (detailed in the</nobr></div> <div style="position:absolute;top:7924;left:128"><nobr>Case Analysis section). Accordingly, the study re-visited the data to examine the use of social</nobr></div> <div style="position:absolute;top:7944;left:128"><nobr>media on each occasion and the implications of its use, giving particular attention to the</nobr></div> <div style="position:absolute;top:7964;left:128"><nobr>practice within which it was used and the functions it performed. In short, the data analysis</nobr></div> <div style="position:absolute;top:7984;left:128"><nobr>process involved an ongoing dialogue with existing literature, the data collected, and the</nobr></div> <div style="position:absolute;top:8004;left:128"><nobr>emerging interpretations while gradually shaping the theoretical conceptualization (Pan &amp;</nobr></div> <div style="position:absolute;top:8025;left:128"><nobr>Tan, 2011). The process continued until theoretical saturation was reached—that is, it was</nobr></div> <div style="position:absolute;top:8045;left:128"><nobr>possible to explain the case research findings comprehensively using the derived</nobr></div> <div style="position:absolute;top:8065;left:128"><nobr>conceptualization, and new data could neither dispute the conceptualization nor reveal new</nobr></div> <div style="position:absolute;top:8085;left:128"><nobr>themes. The following section presents an overview of the case study, focusing on the crime-</nobr></div> <div style="position:absolute;top:8105;left:128"><nobr>fighting communities and their use of social media in general. The findings of the analysis are</nobr></div> <div style="position:absolute;top:8125;left:128"><nobr>on how social media functions in affording and constraining, and how its role transforms in</nobr></div> <div style="position:absolute;top:8145;left:128"><nobr>various crime prevention practices.</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:8206;left:128"><nobr><b>FINDINGS</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:8249;left:128"><nobr>In dealing with the strong negative perception and fear of crime, igniting and sustaining</nobr></div> <div style="position:absolute;top:8269;left:128"><nobr>community-driven crime prevention became the focal concern among Malaysians. Given all</nobr></div> <div style="position:absolute;top:8289;left:128"><nobr>the limitations and restrictions in implementing these initiatives, communities resort to</nobr></div> <div style="position:absolute;top:8309;left:128"><nobr>social media, which could seemingly afford them several significant action potentials.</nobr></div> <div style="position:absolute;top:8329;left:128"><nobr>Interestingly, the analysis reveals that social media drives a paradoxical effect – its action</nobr></div> <div style="position:absolute;top:8349;left:128"><nobr>potentials were actualized into both affordances (intended consequences) and constraints</nobr></div> <div style="position:absolute;top:8369;left:128"><nobr>(unintended consequences). The study identified three pairs of affordances and constraints,</nobr></div> <div style="position:absolute;top:8389;left:128"><nobr>as discussed below.</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:8430;left:128"><nobr><b>Instantaneity and Verifiability</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:8452;left:128"><nobr>In the analysis, using social media to disseminate and accumulate crime-related information</nobr></div> <div style="position:absolute;top:8472;left:128"><nobr>brought about the affordance of instantaneity. This affordance enables social media users to</nobr></div> <div style="position:absolute;top:8493;left:128"><nobr>share and exchange information on crime and its prevention quickly. Meanwhile, social</nobr></div> <div style="position:absolute;top:8513;left:128"><nobr>media users are composed of direct and indirect users. Direct users include group creators</nobr></div> <div style="position:absolute;top:8533;left:128"><nobr>and administrators who manage Facebook groups, such as the creator of the closed crime</nobr></div> <div style="position:absolute;top:8553;left:128"><nobr>prevention group Malaysian Against Rape and Snatch Theft (MARAH). They may also include</nobr></div> <div style="position:absolute;top:8573;left:128"><nobr>group members who post crime incidents and comment on other users' posts and individual</nobr></div> <div style="position:absolute;top:8593;left:128"><nobr>social media users who are not necessarily members. On the other hand, non-users of social</nobr></div> <div style="position:absolute;top:8614;left:128"><nobr>media are considered indirect participants as they would be in contact with the user and are</nobr></div> <div style="position:absolute;top:8634;left:128"><nobr>made aware of the crime incidents. The quick dissemination of crime-related information</nobr></div> <div style="position:absolute;top:8654;left:128"><nobr>enables communities to organize and respond very quickly to crime prevention issues such</nobr></div> <div style="position:absolute;top:8674;left:128"><nobr>as theft and kidnappings.</nobr></div> <div style="position:absolute;top:8715;left:128"><nobr>One of the parties that benefitted tremendously from the instant dissemination of</nobr></div> <div style="position:absolute;top:8735;left:128"><nobr>information was the Royal Malaysian Police or <i>Polis Diraja Malaysia </i>(PDRM). The police force,</nobr></div> <div style="position:absolute;top:8755;left:128"><nobr>through its social media unit, had set up a Facebook page. A respondent noted:</nobr></div> <div style="position:absolute;top:8775;left:181"><nobr><i>&quot;We found out that we can do more than crime prevention. Like, let people know</i></nobr></div> <div style="position:absolute;top:8795;left:181"><nobr><i>what PRDM has done. To channel our efforts out. We use this platform to</i></nobr></div> <div style="position:absolute;top:8816;left:181"><nobr><i>communicate or create crime awareness and alerts to the people. At the same</i></nobr></div> <div style="position:absolute;top:8836;left:181"><nobr><i>time, we also, to a certain extent, strategize it. We want to create awareness,</i></nobr></div> <div style="position:absolute;top:8856;left:181"><nobr><i>and we have to think of creative ways or better ways to attract people's</i></nobr></div> <div style="position:absolute;top:8876;left:181"><nobr><i>attention. For example, if you want to talk about a rape case, we will say, look</i></nobr></div> </span></font> <div style="position:absolute;top:9016;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=8><b>Page 8</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:9079;left:128"><nobr><i><b>Fauzi, A. &amp; Bahri, S.</b></i></nobr></div> <div style="position:absolute;top:10198;left:128"><nobr>Page 114</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:9127;left:181"><nobr><i>we are the police (police will urge), and these are the precautionary steps people</i></nobr></div> <div style="position:absolute;top:9147;left:181"><nobr><i>can take then only people will read, and it will create impact.&quot; </i>- PDRM social</nobr></div> <div style="position:absolute;top:9167;left:181"><nobr>media unit head.</nobr></div> <div style="position:absolute;top:9207;left:128"><nobr>This positive sentiment was echoed by a social media page administrator who expressed</nobr></div> <div style="position:absolute;top:9227;left:128"><nobr>how these platforms afforded their organization the ability to effectively disseminate its</nobr></div> <div style="position:absolute;top:9247;left:128"><nobr>message and raise awareness.</nobr></div> <div style="position:absolute;top:9267;left:181"><nobr><i>&quot;For us to start out on social media is like breaking the glass ceiling. Our</i></nobr></div> <div style="position:absolute;top:9288;left:181"><nobr><i>Facebook was launched on 31 September 2011, during that time, it was a</i></nobr></div> <div style="position:absolute;top:9308;left:181"><nobr><i>proposal for us to have a &quot;fight crime online outlet&quot; </i>– Malaysian Crime</nobr></div> <div style="position:absolute;top:9328;left:181"><nobr>Awareness Campaign (MCAC) Facebook page admin.</nobr></div> <div style="position:absolute;top:9368;left:128"><nobr>Another party that has benefitted from this affordance is the Facebook of the Malaysian</nobr></div> <div style="position:absolute;top:9388;left:128"><nobr>Crime Awareness Campaign (MCAC). It also chose social media to achieve its goals of</nobr></div> <div style="position:absolute;top:9408;left:128"><nobr>disseminating information about crime in Malaysia to its 90,000 members and hopefully</nobr></div> <div style="position:absolute;top:9429;left:128"><nobr>quickly relay useful information from members' comments and interactions.</nobr></div> <div style="position:absolute;top:9449;left:181"><nobr><i>&quot;Our role is to change, not to play the police. Our role is to assist in spreading</i></nobr></div> <div style="position:absolute;top:9469;left:181"><nobr><i>information, and information by Facebook is one the fastest mode of</i></nobr></div> <div style="position:absolute;top:9489;left:181"><nobr><i>disseminating information in today's era, today's society. Maybe in 2 or 3 years,</i></nobr></div> <div style="position:absolute;top:9509;left:181"><nobr><i>there will be other better platforms people will hop on to. Because at present …</i></nobr></div> <div style="position:absolute;top:9529;left:181"><nobr><i>the platform is Twitter and Facebook. These are the most popular platforms</i></nobr></div> <div style="position:absolute;top:9549;left:181"><nobr><i>which we are using to disseminate information. So, it is clear how important our</i></nobr></div> <div style="position:absolute;top:9570;left:181"><nobr><i>role is to spread awareness, which is what we are doing. There is no better way</i></nobr></div> <div style="position:absolute;top:9590;left:181"><nobr><i>of getting the message across through social media platforms. That is the first</i></nobr></div> <div style="position:absolute;top:9610;left:181"><nobr><i>objective. The second objective is people's comments on our social media page.</i></nobr></div> <div style="position:absolute;top:9630;left:181"><nobr><i>When we started the page, we encouraged them to give constructive comments</i></nobr></div> <div style="position:absolute;top:9650;left:181"><nobr><i>and criticisms, so we are able to use or gather the information collectively, study</i></nobr></div> <div style="position:absolute;top:9670;left:181"><nobr><i>and compile them to be presented to the Bar Council.&quot; </i>- Admin and founder of</nobr></div> <div style="position:absolute;top:9690;left:181"><nobr>the MCAC Facebook group page.</nobr></div> <div style="position:absolute;top:9731;left:128"><nobr>Although instantaneity is a positive affordance, the quick spread of information raises</nobr></div> <div style="position:absolute;top:9751;left:128"><nobr>another crucial issue: the verifiability of the information. There are instances when social</nobr></div> <div style="position:absolute;top:9771;left:128"><nobr>media is used to distribute manipulative information, rumors, or irrelevant content. This</nobr></div> <div style="position:absolute;top:9791;left:128"><nobr>torrent of contaminated information is caused by the drive for the personal satisfaction of</nobr></div> <div style="position:absolute;top:9811;left:128"><nobr>keyboard warriors, massive forwarding of erroneous posts, and sometimes unintentional</nobr></div> <div style="position:absolute;top:9831;left:128"><nobr>errors. The drive to participate negates the need for fact-checking or being objective. These</nobr></div> <div style="position:absolute;top:9852;left:128"><nobr>actions can lead to an unintended loss of trust and inefficient use of time. Unfortunately, the</nobr></div> <div style="position:absolute;top:9872;left:128"><nobr>existing technologies cannot automate verifying information shared through social media.</nobr></div> <div style="position:absolute;top:9892;left:128"><nobr>Hence, overcoming the verifiability constraints requires the crime prevention communities,</nobr></div> <div style="position:absolute;top:9912;left:128"><nobr>especially the administrators, to make additional efforts to manage and monitor information</nobr></div> <div style="position:absolute;top:9932;left:128"><nobr>sharing on social media. According to one social media administrator:</nobr></div> <div style="position:absolute;top:9952;left:181"><nobr><i>&quot;Initially, we did not have experience in managing the Facebook group, and</i></nobr></div> <div style="position:absolute;top:9972;left:181"><nobr><i>when these unwanted participants and posts began coming in, people started to</i></nobr></div> <div style="position:absolute;top:9992;left:181"><nobr><i>leave the page. If we want the community to trust us, we have to do a better job</i></nobr></div> <div style="position:absolute;top:10013;left:181"><nobr><i>of filtering the non-relevant stuff on the Facebook page. I have to keep</i></nobr></div> <div style="position:absolute;top:10033;left:181"><nobr><i>delivering new content and keep an eye on the posts to delete whatever is not</i></nobr></div> <div style="position:absolute;top:10053;left:181"><nobr><i>relevant.&quot; </i>—The administrator of Crime Watch Malaysia (CWM).</nobr></div> <div style="position:absolute;top:10093;left:128"><nobr>In short, verifiability constraints the community from fully enacting the fluidity of</nobr></div> <div style="position:absolute;top:10113;left:128"><nobr>information instantaneity and necessitates a firm commitment to information verification.</nobr></div> </span></font> <div style="position:absolute;top:10279;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=9><b>Page 9</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:10342;left:246"><nobr><i><b>The Affordances and Constraints of Information in Crime Prevention Communities</b></i></nobr></div> <div style="position:absolute;top:11457;left:696"><nobr>Page 115</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:10389;left:128"><nobr><b>Actionability and Miscoordination</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:10411;left:128"><nobr>Second, the information provided through social media triggers individuals who are</nobr></div> <div style="position:absolute;top:10432;left:128"><nobr>concerned about crime to take necessary actions through the platform. They have</nobr></div> <div style="position:absolute;top:10452;left:128"><nobr>established a presence of an actively alert online community that published results and</nobr></div> <div style="position:absolute;top:10472;left:128"><nobr>information on crime prevention. As a result, other like-minded individuals were able to take</nobr></div> <div style="position:absolute;top:10492;left:128"><nobr>necessary actions to prevent crime from happening in their communities. This study</nobr></div> <div style="position:absolute;top:10512;left:128"><nobr>observed several examples where the information from social media leads to actions taken</nobr></div> <div style="position:absolute;top:10532;left:128"><nobr>to prevent crime. First, it saw how social media enabled calls to action around communities</nobr></div> <div style="position:absolute;top:10552;left:128"><nobr>with shared interests and promoted mobilization, , as exemplified by the following quote:</nobr></div> <div style="position:absolute;top:10573;left:181"><nobr><i>&quot;Once we the group was set up and people started connecting and began</i></nobr></div> <div style="position:absolute;top:10593;left:181"><nobr><i>organizing crime prevention activities, comments of positive feedback regarding</i></nobr></div> <div style="position:absolute;top:10613;left:181"><nobr><i>crime reduction on the targeted areas started coming in.&quot; </i>— MARAH Facebook</nobr></div> <div style="position:absolute;top:10633;left:181"><nobr>group founder.</nobr></div> <div style="position:absolute;top:10673;left:128"><nobr>Second, communities could strategically establish new connections by browsing and viewing</nobr></div> <div style="position:absolute;top:10693;left:128"><nobr>existing social networks. The actionable affordance enables communities to share</nobr></div> <div style="position:absolute;top:10714;left:128"><nobr>information and best practices. Through the new connections, communities can share</nobr></div> <div style="position:absolute;top:10734;left:128"><nobr>information and best practices, thus enhancing their efforts in combating and preventing</nobr></div> <div style="position:absolute;top:10754;left:128"><nobr>crime in their areas. Several existing clusters of connections could be united for an</nobr></div> <div style="position:absolute;top:10774;left:128"><nobr>immediate propagation of capabilities and capacities. This creates the possibility of rapidly</nobr></div> <div style="position:absolute;top:10794;left:128"><nobr>widening community-guarded areas via the connection and collaboration of nearby</nobr></div> <div style="position:absolute;top:10814;left:128"><nobr>neighborhoods/ communities. The credibility and effectiveness of these social media groups</nobr></div> <div style="position:absolute;top:10834;left:128"><nobr>in sharing relevant information are evident in the testimonies of their followers:</nobr></div> <div style="position:absolute;top:10855;left:181"><nobr><i>&quot;Our newspaper in Malaysia sometimes practice selective reporting. Social</i></nobr></div> <div style="position:absolute;top:10875;left:181"><nobr><i>media, however, exposes different angles of the same story. I started following it</i></nobr></div> <div style="position:absolute;top:10895;left:181"><nobr><i>[CWM] not because of him [the founder] but because I thought the group was</i></nobr></div> <div style="position:absolute;top:10915;left:181"><nobr><i>credible. We live in Bangsar, and it is quite a high crime area, one of the highest</i></nobr></div> <div style="position:absolute;top:10935;left:181"><nobr><i>and a lot of cases that happened in PJ and Bangsar are on Crime Watch</i></nobr></div> <div style="position:absolute;top:10955;left:181"><nobr><i>Malaysia&quot; </i>– Follower.</nobr></div> <div style="position:absolute;top:10996;left:128"><nobr>Third, enforcement agencies, communities, and users initiated real-life actions. One</nobr></div> <div style="position:absolute;top:11016;left:128"><nobr>impactful example was community policing initiatives run by the Community Oriented</nobr></div> <div style="position:absolute;top:11036;left:128"><nobr>Policing Strategies (COPS) initiated by a former Royal Malaysian Police constable in 2007.</nobr></div> <div style="position:absolute;top:11056;left:128"><nobr>The non-profit crime prevention movement is based on voluntary communities and</nobr></div> <div style="position:absolute;top:11076;left:128"><nobr>cooperation with local police. The former policeman acknowledges that while their activities</nobr></div> <div style="position:absolute;top:11096;left:128"><nobr>have provided an alternative avenue for the community to fight crime, criminal activities</nobr></div> <div style="position:absolute;top:11116;left:128"><nobr>have also managed to adapt their mode of operation to react based on information available</nobr></div> <div style="position:absolute;top:11137;left:128"><nobr>on the social media outlets run by COPS. An example would be if there were a community</nobr></div> <div style="position:absolute;top:11157;left:128"><nobr>patrolling call for a particular area, the criminals would avoid the said area and target other</nobr></div> <div style="position:absolute;top:11177;left:128"><nobr>areas.</nobr></div> <div style="position:absolute;top:11217;left:128"><nobr>The recovery of a stolen car from Mont Kiara, an affluent neighborhood of Kuala Lumpur, in</nobr></div> <div style="position:absolute;top:11237;left:128"><nobr>2014 illustrates the actionable affordance. From the first day, the victim and communities</nobr></div> <div style="position:absolute;top:11257;left:128"><nobr>used social media to spread awareness, disseminate information and targeted content (e.g.,</nobr></div> <div style="position:absolute;top:11277;left:128"><nobr>pictures and usable posts), and establish and maintain a strong online presence of the</nobr></div> <div style="position:absolute;top:11298;left:128"><nobr>incident. The scale of the effort multiplied rapidly every day, which led to the discovery of</nobr></div> <div style="position:absolute;top:11318;left:128"><nobr>the stolen car within days of the initial Facebook post. The repeated exposure to the</nobr></div> <div style="position:absolute;top:11338;left:128"><nobr>information on social media heightened the awareness and vigilance of the community</nobr></div> <div style="position:absolute;top:11358;left:128"><nobr>members, as evidenced by the following quotes:</nobr></div> </span></font> <div style="position:absolute;top:11542;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=10><b>Page 10</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:11605;left:128"><nobr><i><b>Fauzi, A. &amp; Bahri, S.</b></i></nobr></div> <div style="position:absolute;top:12724;left:128"><nobr>Page 116</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:11653;left:181"><nobr><i>&quot;Initially, I did not pay specific attention to the news about the stolen car, but it</i></nobr></div> <div style="position:absolute;top:11673;left:181"><nobr><i>kept appearing on my [Facebook] wall. After that, I was actively looking for a car</i></nobr></div> <div style="position:absolute;top:11693;left:181"><nobr><i>that met the description everywhere I went.&quot; </i>—Participant in the stolen car</nobr></div> <div style="position:absolute;top:11713;left:181"><nobr>recovery effort.</nobr></div> <div style="position:absolute;top:11753;left:185"><nobr><i>&quot;We did not know what to do, after exhausting all official channels we decided</i></nobr></div> <div style="position:absolute;top:11773;left:181"><nobr><i>to post the incident on Facebook and asked for help. We did not expect it to go</i></nobr></div> <div style="position:absolute;top:11793;left:181"><nobr><i>viral as it did&quot; </i>– Victim.</nobr></div> <div style="position:absolute;top:11834;left:128"><nobr>Also, given that every individual will have the ability to locate and share information, the</nobr></div> <div style="position:absolute;top:11854;left:128"><nobr>accumulation of responses further strengthened the online presence of the event. From the</nobr></div> <div style="position:absolute;top:11874;left:128"><nobr>initial post, the instantaneity affordance has brought about 20,000 likes and responses on</nobr></div> <div style="position:absolute;top:11894;left:128"><nobr>Facebook, which led to the recovery of the vehicle. Unfortunately, the carjacker was not</nobr></div> <div style="position:absolute;top:11914;left:128"><nobr>apprehended.</nobr></div> <div style="position:absolute;top:11955;left:128"><nobr>While social media affords actionable affordance, it produces an unfavorable consequence –</nobr></div> <div style="position:absolute;top:11975;left:128"><nobr>miscoordination. Although social media can provide actionable information to users, the</nobr></div> <div style="position:absolute;top:11995;left:128"><nobr>actions are rarely coordinated. Often, the crime prevention information on social media</nobr></div> <div style="position:absolute;top:12015;left:128"><nobr>lacks details on how actions should be taken. The users were expected to know by</nobr></div> <div style="position:absolute;top:12035;left:128"><nobr>themselves what actions need to be taken, where they must be taken, and how those</nobr></div> <div style="position:absolute;top:12055;left:128"><nobr>actions need to be deployed. Worse, the users have never received training or information</nobr></div> <div style="position:absolute;top:12075;left:128"><nobr>on how to act if a crime happens. Crime news and information can elicit a wide range of</nobr></div> <div style="position:absolute;top:12096;left:128"><nobr>reactions from different individuals, leading to a lack of direction in community response</nobr></div> <div style="position:absolute;top:12116;left:128"><nobr>efforts. This lack of coherence can ultimately undermine the effectiveness of the actions</nobr></div> <div style="position:absolute;top:12136;left:128"><nobr>taken.</nobr></div> <div style="position:absolute;top:12176;left:128"><nobr>Social media platforms have proven to be effective tools for providing real-time information</nobr></div> <div style="position:absolute;top:12196;left:128"><nobr>that can help prevent crime. However, to fully leverage this potential, it is essential to have</nobr></div> <div style="position:absolute;top:12216;left:128"><nobr>clear guidance on how to act on the information provided. Without this guidance, the</nobr></div> <div style="position:absolute;top:12237;left:128"><nobr>effectiveness of social media in crime prevention may be limited.</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:12297;left:128"><nobr><b>DISCUSSION AND CONCLUSIONS</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:12340;left:128"><nobr>Some social media such as Facebook and Instagram features enable users to navigate the</nobr></div> <div style="position:absolute;top:12360;left:128"><nobr>platforms easily and share information among them (Chen et al., 2015). This feature allows</nobr></div> <div style="position:absolute;top:12380;left:128"><nobr>users to search for information easily regardless of their technology's know-how (Kim et al.,</nobr></div> <div style="position:absolute;top:12400;left:128"><nobr>2021). Consequently, the number of users increases rapidly, as do the type of discussion and</nobr></div> <div style="position:absolute;top:12420;left:128"><nobr>the number of communities created. However, this presents an alternative problem to</nobr></div> <div style="position:absolute;top:12440;left:128"><nobr>administrators of the social media pages and their followers: verification of the information.</nobr></div> <div style="position:absolute;top:12461;left:128"><nobr>There is no standard culture to which the users belong that can enable common</nobr></div> <div style="position:absolute;top:12481;left:128"><nobr>sensemaking of an information to occur (Li &amp; Luo, 2021).</nobr></div> <div style="position:absolute;top:12522;left:128"><nobr>This case study undoubtedly demonstrates the speed in which information through social</nobr></div> <div style="position:absolute;top:12542;left:128"><nobr>media propagates when there is a huge attention to the subject, users actively promote the</nobr></div> <div style="position:absolute;top:12562;left:128"><nobr>topic and the size of the network is relatively large (Zhang et al., 2020). In this respect, crime</nobr></div> <div style="position:absolute;top:12582;left:128"><nobr>has become an important issue among social media users, and the topic is actively shared</nobr></div> <div style="position:absolute;top:12602;left:128"><nobr>and discussed among users. Moreover, the members who are passionate about this topic</nobr></div> <div style="position:absolute;top:12622;left:128"><nobr>happen to have large networks of &quot;friends&quot; on their social media pages (Feng et al., 2018). As</nobr></div> <div style="position:absolute;top:12642;left:128"><nobr>a result, information shared on their social media pages propagates quickly. For example, in</nobr></div> <div style="position:absolute;top:12662;left:128"><nobr>a matter of hours, a piece of information, such as a stolen car, became viral, enabling the</nobr></div> </span></font> <div style="position:absolute;top:12805;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=11><b>Page 11</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:12868;left:246"><nobr><i><b>The Affordances and Constraints of Information in Crime Prevention Communities</b></i></nobr></div> <div style="position:absolute;top:13983;left:696"><nobr>Page 117</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:12916;left:128"><nobr>eventual identification and recovery of the car.</nobr></div> <div style="position:absolute;top:12956;left:128"><nobr>Unfortunately, the most potent strength of social media can also become its worst enemy in</nobr></div> <div style="position:absolute;top:12977;left:128"><nobr>providing information on crime prevention. Translating actionable information into</nobr></div> <div style="position:absolute;top:12997;left:128"><nobr>coordinated action is still a huge challenge. True, social media can enable the management</nobr></div> <div style="position:absolute;top:13017;left:128"><nobr>of groups of individuals (Baccarella et al., 2018; Karahanna et al., 2018), thus opening the</nobr></div> <div style="position:absolute;top:13037;left:128"><nobr>possibility of ‘emergent organizing’ (Tim et al., 2018). However, it is still a messy affair in real</nobr></div> <div style="position:absolute;top:13057;left:128"><nobr>life. There is no clear framework for how the communities should organize themselves. As a</nobr></div> <div style="position:absolute;top:13077;left:128"><nobr>result, many of the efforts by these social media warriors eventually fizzled out.</nobr></div> <div style="position:absolute;top:13117;left:128"><nobr>Overall, TACT allowed the study to unveil two preliminary insights about the paradoxical</nobr></div> <div style="position:absolute;top:13138;left:128"><nobr>implications of social media. First, while the features of social media could potentially offer</nobr></div> <div style="position:absolute;top:13158;left:128"><nobr>certain functionalities (just as how a chair was designed for ‘sitting’), the affordances and</nobr></div> <div style="position:absolute;top:13178;left:128"><nobr>constraints that were eventually actualized from the use of social media might not always be</nobr></div> <div style="position:absolute;top:13198;left:128"><nobr>expected and desirable (just as a chair could be eventually used for ‘standing on’ or ‘as a</nobr></div> <div style="position:absolute;top:13218;left:128"><nobr>weapon’). It is thus a fruitful endeavor to explore the unintended consequences of</nobr></div> <div style="position:absolute;top:13238;left:128"><nobr>technology in different contexts. Second, the affordances and constraints of technology</nobr></div> <div style="position:absolute;top:13258;left:128"><nobr>might interrelate with each other. Constraints may force actors to embrace further actions,</nobr></div> <div style="position:absolute;top:13279;left:128"><nobr>eventually realizing a new affordance. For example, the constraint of crowding has prompted</nobr></div> <div style="position:absolute;top:13299;left:128"><nobr>the communities to set off some offline movements. New affordances, such as collaboration,</nobr></div> <div style="position:absolute;top:13319;left:128"><nobr>may emerge when social media facilitates real-time coordination among offline participants.</nobr></div> <div style="position:absolute;top:13339;left:128"><nobr>In other words, future research must consider the bundle of affordances and constraints and</nobr></div> <div style="position:absolute;top:13359;left:128"><nobr>account for how they interact.</nobr></div> <div style="position:absolute;top:13399;left:128"><nobr>This study provides several important and interesting insights. First, the study built on rich</nobr></div> <div style="position:absolute;top:13420;left:128"><nobr>empirical evidence to develop nuanced insights demonstrating social media's power in</nobr></div> <div style="position:absolute;top:13440;left:128"><nobr>advancing community-driven crime prevention. The study asserts that the active role of</nobr></div> <div style="position:absolute;top:13460;left:128"><nobr>social media as the change agent for societal improvement and innovation, as well as its</nobr></div> <div style="position:absolute;top:13480;left:128"><nobr>positive and negative impacts, should be studied concurrently. Second, it contributes an</nobr></div> <div style="position:absolute;top:13500;left:128"><nobr>important understanding of the paradoxical impacts of social media.</nobr></div> <div style="position:absolute;top:13540;left:128"><nobr>Overall, the study uncovered two pairs of actualized affordances and constraints of social</nobr></div> <div style="position:absolute;top:13561;left:128"><nobr>media in providing information on crime prevention. Although these preliminary findings are</nobr></div> <div style="position:absolute;top:13581;left:128"><nobr>not intended to be exhaustive, they unveil essential insights regarding both the intended and</nobr></div> <div style="position:absolute;top:13601;left:128"><nobr>unintended consequences of social media. Moving forward, future studies can continue to</nobr></div> <div style="position:absolute;top:13621;left:128"><nobr>develop an understanding of opportunities and pitfalls that emerge when leveraging social</nobr></div> <div style="position:absolute;top:13641;left:128"><nobr>media to complete social missions and facilitate social change in the bigger picture.</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:13701;left:128"><nobr><b>ACKNOWLEDGEMENT</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:13744;left:128"><nobr>This research did not receive any specific grant from funding agencies in the public,</nobr></div> <div style="position:absolute;top:13764;left:128"><nobr>commercial, or non-for-profit sectors.</nobr></div> <div style="position:absolute;top:13824;left:128"><nobr><b>AUTHORS DECLARATION</b></nobr></div> <div style="position:absolute;top:13864;left:128"><nobr>The authors declare no conflicts of interest regarding the publication of this paper.</nobr></div> </span></font> <div style="position:absolute;top:14068;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=12><b>Page 12</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:14131;left:128"><nobr><i><b>Fauzi, A. &amp; Bahri, S.</b></i></nobr></div> <div style="position:absolute;top:15250;left:128"><nobr>Page 118</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:14178;left:128"><nobr><b>AUTHORS CONTRIBUTION</b></nobr></div> <div style="position:absolute;top:14219;left:128"><nobr>Conceptualization: [both authors], Methodology: [both authors], Formal analysis and</nobr></div> <div style="position:absolute;top:14239;left:128"><nobr>investigation: [A.Fauzi], Writing - original draft preparation: [A.Fauzi]; Writing - review and</nobr></div> <div style="position:absolute;top:14259;left:128"><nobr>editing: [both authors]</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:16px;font-family:Times"> <div style="position:absolute;top:14323;left:128"><nobr><b>REFERENCES</b></nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:14365;left:128"><nobr>Baccarella, C. V., Wagner, T. F., Kietzmann, J. H., &amp; McCarthy, I. P. (2018). Social media? It's</nobr></div> <div style="position:absolute;top:14385;left:164"><nobr>serious! Understanding the dark side of social media. <i>European Management Journal</i>,</nobr></div> <div style="position:absolute;top:14405;left:164"><nobr><i>36</i>(4), 431–438. https://doi.org/10.1016/j.emj.2018.07.002.</nobr></div> <div style="position:absolute;top:14426;left:128"><nobr>Baharom, A. . H., &amp; Habibullah, M. . M. S. (2009). Crime and Income Inequality : The case of</nobr></div> <div style="position:absolute;top:14446;left:164"><nobr>Malaysia.</nobr></div> <div style="position:absolute;top:14446;left:267"><nobr><i>Journal</i></nobr></div> <div style="position:absolute;top:14446;left:356"><nobr><i>of</i></nobr></div> <div style="position:absolute;top:14446;left:410"><nobr><i>Politics</i></nobr></div> <div style="position:absolute;top:14446;left:498"><nobr><i>and</i></nobr></div> <div style="position:absolute;top:14446;left:564"><nobr><i>Law</i>,</nobr></div> <div style="position:absolute;top:14446;left:635"><nobr><i>2</i>(1),</nobr></div> <div style="position:absolute;top:14446;left:707"><nobr>55–70.</nobr></div> <div style="position:absolute;top:14466;left:164"><nobr>http://www.ccsenet.org/journal/index.php/jpl/article/view/387/346</nobr></div> <div style="position:absolute;top:14486;left:128"><nobr>Busher, H., &amp; James, N. (2009). Epistemological dimensions in qualitative research: the</nobr></div> <div style="position:absolute;top:14506;left:164"><nobr>construction</nobr></div> <div style="position:absolute;top:14506;left:282"><nobr>of</nobr></div> <div style="position:absolute;top:14506;left:329"><nobr>knowledge</nobr></div> <div style="position:absolute;top:14506;left:437"><nobr>online.</nobr></div> <div style="position:absolute;top:14506;left:516"><nobr><i>Online</i></nobr></div> <div style="position:absolute;top:14506;left:593"><nobr><i>Interviewing</i>,</nobr></div> <div style="position:absolute;top:14506;left:715"><nobr>5–18.</nobr></div> <div style="position:absolute;top:14526;left:164"><nobr>https://doi.org/10.4135/9780857024503.n2.</nobr></div> <div style="position:absolute;top:14546;left:128"><nobr>Chatterjee, S., Sarker, S., &amp; Siponen, M. (2017). How do mobile ICTs enable organizational</nobr></div> <div style="position:absolute;top:14567;left:164"><nobr>fluidity: toward a theoretical framework. <i>Information and Management</i>, <i>54</i>(1), 1–13.</nobr></div> <div style="position:absolute;top:14587;left:164"><nobr>https://doi.org/10.1016/j.im.2016.03.007.</nobr></div> <div style="position:absolute;top:14607;left:128"><nobr>Chen, Y. H., Rorissa, A., &amp; Germain, C. A. (2015). Usability definitions in a dynamically</nobr></div> <div style="position:absolute;top:14627;left:159"><nobr>changing information environment. <i>Portal-Libraries and the Academy, 15</i>(4), 601-621.</nobr></div> <div style="position:absolute;top:14647;left:128"><nobr>Chen, Q., Xu, X., Cao, B., &amp; Zhang, W. (2016). Social media policies as responses for social</nobr></div> <div style="position:absolute;top:14667;left:164"><nobr>media affordances: The case of China. <i>Government Information Quarterly</i>, <i>33</i>(2), 313–</nobr></div> <div style="position:absolute;top:14688;left:164"><nobr>324. https://doi.org/10.1016/j.giq.2016.04.008.</nobr></div> <div style="position:absolute;top:14708;left:128"><nobr>Christel, M. G. (2002). Accessing news video libraries through dynamic information</nobr></div> <div style="position:absolute;top:14728;left:159"><nobr>extraction, summarization, and visualization. In K. Borner &amp; C. Chen (Eds.), <i>Visual</i></nobr></div> <div style="position:absolute;top:14748;left:159"><nobr><i>interfaces to digital librarie</i>s (pp. 98-115). Lecture Notes in Computer Science.</nobr></div> <div style="position:absolute;top:14768;left:128"><nobr>Deng, X. N., &amp; Joshi, K. D. (2016). Why individuals participate in micro-task crowdsourcing</nobr></div> <div style="position:absolute;top:14788;left:164"><nobr>work environment: Revealing crowdworkers' perceptions. <i>Journal of the Association for</i></nobr></div> <div style="position:absolute;top:14808;left:164"><nobr><i>Information Systems</i>, <i>17</i>(10), 648–673.</nobr></div> <div style="position:absolute;top:14828;left:128"><nobr>Federici, T., Braccini, A. M., &amp; Sæbø, Ø. (2015). &quot;Gentlemen, all aboard!&quot; ICT and party</nobr></div> <div style="position:absolute;top:14849;left:164"><nobr>politics: Reflections from a Mass-eParticipation experience. <i>Government Information</i></nobr></div> <div style="position:absolute;top:14869;left:164"><nobr><i>Quarterly</i>, <i>32</i>(3), 287–298. https://doi.org/10.1016/j.giq.2015.04.009.</nobr></div> <div style="position:absolute;top:14889;left:128"><nobr>Feldman, S. S., &amp; Horan, T. A. (2011). The dynamics of information collaboration: a case</nobr></div> <div style="position:absolute;top:14909;left:159"><nobr>study of blended it value propositions for health information exchange in disability</nobr></div> <div style="position:absolute;top:14929;left:159"><nobr>determination. <i>Journal of the Association for Information Systems, 12</i>(2), 189-207.</nobr></div> <div style="position:absolute;top:14949;left:128"><nobr>Feng, S. H., Hossain, L., Crawford, J. W., &amp; Bossomaier, T. (2018). Quantifying network</nobr></div> <div style="position:absolute;top:14969;left:159"><nobr>dynamics and information flow across Chinese social media during the African Ebola</nobr></div> <div style="position:absolute;top:14990;left:159"><nobr>outbreak. <i>Disaster Medicine and Public Health Preparedness, 12</i>(1), 26-37.</nobr></div> <div style="position:absolute;top:15010;left:128"><nobr>Fuller, T. (2013, October 18). Wave of high-profile crimes has put Malaysians on the</nobr></div> <div style="position:absolute;top:15030;left:164"><nobr>Defensive. <i>New York Times</i>. http://www.nytimes.com/2013/10/20/world/asia/soaring-</nobr></div> <div style="position:absolute;top:15050;left:164"><nobr>crime-rate-takes-a-growing-malaysia-by-surprise.html?_r=0.</nobr></div> <div style="position:absolute;top:15070;left:128"><nobr>Greenwood, B. N., &amp; Gopal, A. (2015). Tigerblood: Newspapers, blogs, and the founding of</nobr></div> <div style="position:absolute;top:15090;left:164"><nobr>information technology firms. <i>Information Systems Research</i>, <i>26</i>(4), 812–828.</nobr></div> <div style="position:absolute;top:15110;left:164"><nobr>https://doi.org/10.1287/isre.2015.0603.</nobr></div> <div style="position:absolute;top:15131;left:128"><nobr>Hale, J. E. (2005). Crisis response communication challenges: Building theory from qualitative</nobr></div> <div style="position:absolute;top:15151;left:164"><nobr>data.</nobr></div> <div style="position:absolute;top:15151;left:235"><nobr><i>Journal</i></nobr></div> <div style="position:absolute;top:15151;left:321"><nobr><i>of</i></nobr></div> <div style="position:absolute;top:15151;left:372"><nobr><i>Business</i></nobr></div> <div style="position:absolute;top:15151;left:466"><nobr><i>Communication</i>,</nobr></div> <div style="position:absolute;top:15151;left:613"><nobr><i>42</i>(2),</nobr></div> <div style="position:absolute;top:15151;left:690"><nobr>112–134.</nobr></div> <div style="position:absolute;top:15171;left:164"><nobr>https://doi.org/10.1177/0021943605274751.</nobr></div> <div style="position:absolute;top:15191;left:128"><nobr>Hutchby, I. (2001). Technologies, texts and affordances. <i>Sociology</i>, <i>35</i>(2), 441–456.</nobr></div> </span></font> <div style="position:absolute;top:15331;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=13><b>Page 13</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:15394;left:246"><nobr><i><b>The Affordances and Constraints of Information in Crime Prevention Communities</b></i></nobr></div> <div style="position:absolute;top:16509;left:696"><nobr>Page 119</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:15442;left:164"><nobr>https://doi.org/10.1017/S0038038501000219.</nobr></div> </span></font> <font size=3 color="#1f1f1f" face="Times"><span style="font-size:14px;font-family:Times;color:#1f1f1f"> <div style="position:absolute;top:15462;left:128"><nobr>Ismail, N., Md Noor, S., Ahmad, J., &amp; Jamri, M. H. (2022). Understanding Factors Influencing</nobr></div> <div style="position:absolute;top:15482;left:164"><nobr>Crime Prevention Information on Social Media. <i>Intellectual Discourse, 30</i>(2).</nobr></div> <div style="position:absolute;top:15502;left:164"><nobr>https://doi.org/10.31436/id.v30i2.1849.</nobr></div> </span></font> <font size=3 color="#202020" face="Times"><span style="font-size:14px;font-family:Times;color:#202020"> <div style="position:absolute;top:15522;left:128"><nobr>Johnson, N. F., Manrique, P., Zheng, M., Cao, Z., Botero, J., Huang, S., Aden, N., Song, C.,</nobr></div> <div style="position:absolute;top:15542;left:159"><nobr>Leady, J., Velasquez, N., &amp; Restrepo, E. M. (2019). Emergent dynamics of extremes in a</nobr></div> <div style="position:absolute;top:15562;left:159"><nobr>population driven by common information sources and new social media</nobr></div> <div style="position:absolute;top:15582;left:159"><nobr>algorithms. <i>Scientific Reports</i>, <i>9</i>(1), 11895.</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:15603;left:128"><nobr>Junhee, Park. (2020). Privacy concern and personal information for crime prevention system</nobr></div> <div style="position:absolute;top:15623;left:159"><nobr>utilizing big data: Focusing on the effect of government trust. <i>The Korea Association for</i></nobr></div> <div style="position:absolute;top:15643;left:159"><nobr><i>Policy Studies, 29</i>(3), 221-248. doi: 10.33900/kaps.2020.29.3.8.</nobr></div> <div style="position:absolute;top:15663;left:128"><nobr>Kaplan, A. M., &amp; Haenlein, M. (2010). Users of the world, unite! The challenges and</nobr></div> <div style="position:absolute;top:15683;left:164"><nobr>opportunities</nobr></div> <div style="position:absolute;top:15683;left:282"><nobr>of</nobr></div> <div style="position:absolute;top:15683;left:324"><nobr>Social</nobr></div> <div style="position:absolute;top:15683;left:390"><nobr>Media.</nobr></div> <div style="position:absolute;top:15683;left:465"><nobr><i>Business</i></nobr></div> <div style="position:absolute;top:15683;left:550"><nobr><i>Horizons</i>,</nobr></div> <div style="position:absolute;top:15683;left:639"><nobr><i>53</i>(1),</nobr></div> <div style="position:absolute;top:15683;left:706"><nobr>59–68.</nobr></div> <div style="position:absolute;top:15703;left:164"><nobr>https://doi.org/10.1016/j.bushor.2009.09.003.</nobr></div> <div style="position:absolute;top:15723;left:128"><nobr>Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., &amp; Nerur, S. (2018). Advances</nobr></div> <div style="position:absolute;top:15744;left:164"><nobr>in social media research: Past, present and future. <i>Information Systems Frontiers</i>, <i>20</i>(3),</nobr></div> <div style="position:absolute;top:15764;left:164"><nobr>531–558. https://doi.org/10.1007/s10796-017-9810-y.</nobr></div> <div style="position:absolute;top:15784;left:128"><nobr>Karahanna, E., Xin Xu, S., Xu, Y., &amp; Zhang, N. (Andy). (2018). The needs–affordances–features</nobr></div> <div style="position:absolute;top:15804;left:164"><nobr>perspective for the use of social media. <i>MIS Quarterly</i>, <i>42</i>(3), 737–756.</nobr></div> <div style="position:absolute;top:15824;left:164"><nobr>https://doi.org/10.25300/MISQ/2018/11492.</nobr></div> <div style="position:absolute;top:15844;left:128"><nobr>Kim, S., Chung, E., &amp; Kwon, N. (2021). Dynamics of relevance judgment during physicians’</nobr></div> <div style="position:absolute;top:15864;left:159"><nobr>online information search process for patient treatment. <i>Malaysian Journal of Library</i></nobr></div> <div style="position:absolute;top:15885;left:159"><nobr><i>&amp; Information Science</i>, 26(1), 17-37.</nobr></div> <div style="position:absolute;top:15905;left:128"><nobr>Klein, H. K., &amp; Myers, M. D. (1999). A set of principles for conducting and evaluating</nobr></div> <div style="position:absolute;top:15925;left:164"><nobr>interpretive field studies in information systems. <i>MIS Quarterly</i>, <i>23</i>(1), 67.</nobr></div> <div style="position:absolute;top:15945;left:164"><nobr>https://doi.org/10.2307/249410.</nobr></div> <div style="position:absolute;top:15965;left:128"><nobr>Leidner, D. E., Gonzalez, E., &amp; Koch, H. (2018). An affordance perspective of enterprise social</nobr></div> <div style="position:absolute;top:15985;left:164"><nobr>media and organizational socialization. <i>Journal of Strategic Information Systems</i>, <i>27</i>(2),</nobr></div> <div style="position:absolute;top:16005;left:164"><nobr>117–138. https://doi.org/10.1016/j.jsis.2018.03.003.</nobr></div> <div style="position:absolute;top:16026;left:128"><nobr>Leonardi, P. M. (2011). When flexible routines meet flexible technologies: Affordance,</nobr></div> <div style="position:absolute;top:16046;left:164"><nobr>constraint, and the imbrication of human and material agencies. <i>MIS Quarterly</i>, <i>35</i>(1),</nobr></div> <div style="position:absolute;top:16066;left:164"><nobr>147–168. https://doi.org/1005.</nobr></div> <div style="position:absolute;top:16086;left:128"><nobr>Li, C. C., &amp; Luo, X. (2021). Toward a unified view of dynamic information security behaviors:</nobr></div> <div style="position:absolute;top:16106;left:159"><nobr>insights from organizational culture and sensemaking. <i>Data Base for Advances in</i></nobr></div> <div style="position:absolute;top:16126;left:159"><nobr><i>Information Systems, 52</i>(1), 65-90.</nobr></div> <div style="position:absolute;top:16146;left:128"><nobr>Lister, M. (2023). 40 essential social media marketing statistics in one cool infographic.</nobr></div> <div style="position:absolute;top:16167;left:164"><nobr>WordStream.</nobr></div> <div style="position:absolute;top:16167;left:304"><nobr>https://www.wordstream.com/blog/ws/2017/01/05/social-media-</nobr></div> <div style="position:absolute;top:16187;left:164"><nobr>marketing-statistics.</nobr></div> <div style="position:absolute;top:16207;left:128"><nobr>Maier, C., Laumer, S., Weinert, C., &amp; Weitzel, T. (2015). The effects of technostress and</nobr></div> <div style="position:absolute;top:16227;left:164"><nobr>switching stress on discontinued use of social networking services: A study of Facebook</nobr></div> <div style="position:absolute;top:16247;left:164"><nobr>use. <i>Information Systems Journal</i>. https://doi.org/10.1111/isj.12068.</nobr></div> <div style="position:absolute;top:16267;left:128"><nobr>Majchrzak, A., Faraj, S., Kane, G. C. G. C., &amp; Azad, B. (2013a). The contradictory influence of</nobr></div> <div style="position:absolute;top:16287;left:164"><nobr>social media affordances on online communal knowledge sharing. <i>Journal of Computer-</i></nobr></div> <div style="position:absolute;top:16307;left:164"><nobr><i>Mediated Communication</i>, <i>19</i>(1), 38–55. https://doi.org/10.1111/jcc4.12030.</nobr></div> <div style="position:absolute;top:16328;left:128"><nobr>Majchrzak, A., &amp; Markus, M. L. (2012). Technology affordances and constraints in</nobr></div> <div style="position:absolute;top:16348;left:164"><nobr>management information systems (MIS). In <i>Encyclopedia of Management Theory </i>(p. 5).</nobr></div> <div style="position:absolute;top:16368;left:164"><nobr>https://doi.org/http://dx.doi.org/10.4135/9781452276090.n256.</nobr></div> <div style="position:absolute;top:16388;left:128"><nobr>Majchrzak, A., Wagner, C., &amp; Yates, D. (2013b). The impact of shaping on knowledge reuse</nobr></div> <div style="position:absolute;top:16408;left:164"><nobr>for organizational Improvement with Wikis. <i>MIS Quarterly</i>, <i>37</i>(2), 455–469.</nobr></div> <div style="position:absolute;top:16428;left:164"><nobr>https://doi.org/10.25300/MISQ/2013/37.2.07.</nobr></div> <div style="position:absolute;top:16448;left:128"><nobr>Merdeka Centre. (2013). <i>Issues of voter concern</i>. http://www.merdeka.org/v4/</nobr></div> </span></font> <div style="position:absolute;top:16594;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=14><b>Page 14</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:16657;left:128"><nobr><i><b>Fauzi, A. &amp; Bahri, S.</b></i></nobr></div> <div style="position:absolute;top:17776;left:128"><nobr>Page 120</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:16705;left:164"><nobr>phocadownload/Researches/poll release Dec 2012 - voter issues.pdf.</nobr></div> <div style="position:absolute;top:16725;left:128"><nobr>Mettler, T., &amp; Winter, R. (2016). Are business users social? A design experiment exploring</nobr></div> <div style="position:absolute;top:16745;left:164"><nobr>information sharing in enterprise social systems. <i>Journal of Information Technology</i>,</nobr></div> <div style="position:absolute;top:16765;left:164"><nobr><i>31</i>(2), 101–114. https://doi.org/10.1057/jit.2015.28.</nobr></div> <div style="position:absolute;top:16785;left:128"><nobr>Omnicore (2024). Instagram by the numbers: stats, demographics &amp; fun facts. February 20,</nobr></div> <div style="position:absolute;top:16805;left:164"><nobr>2024. https://www.omnicoreagency.com/instagram-statistics/.</nobr></div> <div style="position:absolute;top:16825;left:128"><nobr>Pan, S. L., &amp; Tan, B. (2011). Demystifying case research : A structured – pragmatic –</nobr></div> <div style="position:absolute;top:16845;left:164"><nobr>situational ( SPS ) approach to conducting case studies. <i>Information and Organization,</i></nobr></div> <div style="position:absolute;top:16866;left:164"><nobr><i>21</i>(3), 161–176. https://doi.org/10.1016/j.infoandorg.2011.07.001.</nobr></div> <div style="position:absolute;top:16886;left:128"><nobr>Phang, C. W., Kankanhalli, A., &amp; Tan, B. C. Y. (2015). What motivates contributors vs. lurkers?</nobr></div> <div style="position:absolute;top:16906;left:164"><nobr>An investigation of online feedback forums. <i>Information Systems Research, 26</i>(4), 773-</nobr></div> <div style="position:absolute;top:16926;left:164"><nobr>792. https://doi.org/10.1287/isre.2015.0599.</nobr></div> <div style="position:absolute;top:16946;left:128"><nobr>Pires, V. S., &amp; Albagli, S. (2012). Company strategies, informational dynamics and brand</nobr></div> <div style="position:absolute;top:16966;left:159"><nobr>identity in the creative economy. <i>Perspectivas Em Ciencia Da Informacao, 17</i>(2), 109-</nobr></div> <div style="position:absolute;top:16986;left:159"><nobr>122.</nobr></div> <div style="position:absolute;top:17007;left:128"><nobr>Santos-d’Amorim, K., &amp; dos Santos, R. N. M. (2022). From algorithmic personalization to</nobr></div> <div style="position:absolute;top:17027;left:159"><nobr>informational wars: the dynamics of (dis)information bubbles around the September 7,</nobr></div> <div style="position:absolute;top:17047;left:159"><nobr>2021. <i>Encontros Bibli-Revista Eletronica De Biblioteconomia E Ciencia Da Informacao,</i></nobr></div> <div style="position:absolute;top:17067;left:159"><nobr><i>27</i>, 1-16.</nobr></div> <div style="position:absolute;top:17087;left:128"><nobr>Seidel, S., Recker, J., &amp; vom Brocke, J. (2013). Sensemaking and sustainable practicing:</nobr></div> <div style="position:absolute;top:17107;left:164"><nobr>Functional affordances of information systems in green transformations. <i>MIS Quarterly</i>,</nobr></div> <div style="position:absolute;top:17127;left:164"><nobr><i>37</i>(4), 1275–1299. https://doi.org/10.25300/MISQ/2013/37.4.13.</nobr></div> <div style="position:absolute;top:17148;left:128"><nobr>Soroya, S. H., &amp; Faiola, A. (2023). Why did people avoid information during the Covid-19</nobr></div> <div style="position:absolute;top:17168;left:159"><nobr>pandemic? Understanding information sources’ dynamics among Pakistani Z</nobr></div> <div style="position:absolute;top:17188;left:159"><nobr>generation. <i>Library Hi Tech, 41</i>(1), 229-247.</nobr></div> <div style="position:absolute;top:17208;left:128"><nobr>Stamati, T., Papadopoulos, T., &amp; Anagnostopoulos, D. (2015). Social media for openness and</nobr></div> <div style="position:absolute;top:17228;left:164"><nobr>accountability in the public sector : Cases in the Greek context. <i>Government</i></nobr></div> <div style="position:absolute;top:17248;left:164"><nobr><i>Information Quarterly</i>, <i>32</i>(1), 12–29. https://doi.org/10.1016/j.giq.2014.11.004.</nobr></div> <div style="position:absolute;top:17268;left:128"><nobr>Statista. (2019). Global social media ranking 2019. https://www.statista.com/</nobr></div> <div style="position:absolute;top:17289;left:164"><nobr>statistics/272014/global-social-networks-ranked-by-number-of-users/.</nobr></div> <div style="position:absolute;top:17309;left:128"><nobr>Strong, D. M., Volkoff, O., Johnson, S. A., Pelletier, L. R., Tulu, B., Bar-On, I., Trudel, J., &amp;</nobr></div> <div style="position:absolute;top:17329;left:164"><nobr>Garber, L. (2014). A theory of organization-EHR affordance actualization. <i>Journal of the</i></nobr></div> <div style="position:absolute;top:17349;left:164"><nobr><i>Association for Information Systems</i>, <i>15</i>(2), 53–85.</nobr></div> <div style="position:absolute;top:17369;left:128"><nobr>Tim, Y., Pan, S. L., Bahri, S., &amp; Fauzi, A. (2017). Digitally enabled affordances for community-</nobr></div> <div style="position:absolute;top:17389;left:164"><nobr>driven environmental movement in rural Malaysia. <i>Information Systems Journal</i>, <i>28</i>(1),</nobr></div> <div style="position:absolute;top:17409;left:164"><nobr>48–75. https://doi.org/10.1111/isj.12140.</nobr></div> <div style="position:absolute;top:17430;left:128"><nobr>Treem, J. W., &amp; Leonardi, P. M. (2013). Social media use in organizations: Exploring the</nobr></div> <div style="position:absolute;top:17450;left:164"><nobr>affordances of visibility, editability, persistence, and association. <i>Annals of the</i></nobr></div> <div style="position:absolute;top:17470;left:164"><nobr><i>International Communication Association, <font color="#333333">36</font></i><font color="#333333">(1), 143–189</font>. https://doi.org/10.1080/</nobr></div> <div style="position:absolute;top:17490;left:164"><nobr>23808985.2013.11679130.</nobr></div> <div style="position:absolute;top:17510;left:128"><nobr>Vaast, E., &amp; Kaganer, E. (2013). Social media affordances and governance in the workplace:</nobr></div> <div style="position:absolute;top:17530;left:164"><nobr>An examination of organizational policies. <i>Journal of Computer-Mediated</i></nobr></div> <div style="position:absolute;top:17550;left:164"><nobr><i>Communication</i>, <i>19</i>(1), 78–101. https://doi.org/10.1111/jcc4.12032.</nobr></div> <div style="position:absolute;top:17570;left:128"><nobr>Van Osch, W., &amp; Steinfield, C. W. (2016). Team boundary spanning: Strategic implications for</nobr></div> <div style="position:absolute;top:17591;left:164"><nobr>the implementation and use of enterprise social media. <i>Journal of Information</i></nobr></div> <div style="position:absolute;top:17611;left:164"><nobr><i>Technology</i>, <i>31</i>(2), 207–225. https://doi.org/10.1057/jit.2016.12.</nobr></div> <div style="position:absolute;top:17631;left:128"><nobr>Volkoff, O., &amp; Strong, D. M. (2013). Critical realism and affordances: Theorizing IT-associated</nobr></div> <div style="position:absolute;top:17651;left:164"><nobr>organizational</nobr></div> <div style="position:absolute;top:17651;left:289"><nobr>change</nobr></div> <div style="position:absolute;top:17651;left:367"><nobr>processes.</nobr></div> <div style="position:absolute;top:17651;left:467"><nobr><i>MIS</i></nobr></div> <div style="position:absolute;top:17651;left:523"><nobr><i>Quarterly</i>,</nobr></div> <div style="position:absolute;top:17651;left:620"><nobr><i>37</i>(3),</nobr></div> <div style="position:absolute;top:17651;left:690"><nobr>819–834.</nobr></div> <div style="position:absolute;top:17671;left:164"><nobr>https://doi.org/10.25300/MISQ/2013/37.3.07.</nobr></div> <div style="position:absolute;top:17691;left:128"><nobr>Walsham, G. (1995). Interpretive case studies in IS research: nature and method. <i>European</i></nobr></div> <div style="position:absolute;top:17711;left:164"><nobr><i>Journal of Information Systems</i>, <i>4</i>, 74–81. https://doi.org/10.1057/ejis.1995.9.</nobr></div> </span></font> <div style="position:absolute;top:17857;left:0"><hr><table border=0 width=100%><tr><td bgcolor=eeeeee align=right><font face=arial,sans-serif><a name=15><b>Page 15</b></a></font></td></tr></table></div><font size=3 face="Times"><span style="font-size:12px;font-family:Times"> <div style="position:absolute;top:17920;left:246"><nobr><i><b>The Affordances and Constraints of Information in Crime Prevention Communities</b></i></nobr></div> <div style="position:absolute;top:19035;left:696"><nobr>Page 121</nobr></div> </span></font> <font size=3 face="Times"><span style="font-size:14px;font-family:Times"> <div style="position:absolute;top:17968;left:128"><nobr>Warner, J. (2005). An information dynamic: technologies for the reproduction of written</nobr></div> <div style="position:absolute;top:17988;left:159"><nobr>utterances. <i>Aslib Proceedings, 57</i>(5), 412-423.</nobr></div> <div style="position:absolute;top:18008;left:128"><nobr>Wu, I. C., Liu, D. R., &amp; Chang, P. C. (2009). Learning dynamic information needs: a</nobr></div> <div style="position:absolute;top:18028;left:159"><nobr>collaborative topic variation inspection approach. <i>Journal of the American Society for</i></nobr></div> <div style="position:absolute;top:18048;left:159"><nobr><i>Information Science and Technology, 60</i>(12), 2430-2451.</nobr></div> <div style="position:absolute;top:18068;left:128"><nobr>Xiang, Z. (2011). Dynamic social media in online travel information search: a preliminary</nobr></div> <div style="position:absolute;top:18088;left:159"><nobr>analysis. Paper presented at the <i>International Conference on Information and</i></nobr></div> <div style="position:absolute;top:18108;left:159"><nobr><i>Communication Technologies in Tourism </i>2011, Innsbruck, Austria, Jan 26-28, 2011.</nobr></div> <div style="position:absolute;top:18129;left:128"><nobr>Zammuto, R. F., Griffith, T. L., Majchrzak, A., Dougherty, D. J., &amp; Faraj, S. (2007). Information</nobr></div> <div style="position:absolute;top:18149;left:164"><nobr>Technology and the changing fabric of organization. <i>Organization Science</i>, <i>18</i>(5), 749–</nobr></div> <div style="position:absolute;top:18169;left:164"><nobr>762. https://doi.org/10.1287/orsc.1070.0307.</nobr></div> <div style="position:absolute;top:18189;left:128"><nobr>Zhang, Y. M., Liu, F., Koura, Y. H., &amp; Wang, H. (2020). Dynamic of interactive model for</nobr></div> <div style="position:absolute;top:18209;left:159"><nobr>information propagation across social networks media. Advances in Difference</nobr></div> <div style="position:absolute;top:18229;left:159"><nobr>Equations, <i>2020(</i>318). <font color="#333333">https://doi.org/10.1186/s13662-020-02774-y.</font></nobr></div> <div style="position:absolute;top:18249;left:128"><nobr>Zheng, Y., &amp; Yu, A. (2016). Affordances of social media in collective action: The case of Free</nobr></div> <div style="position:absolute;top:18270;left:164"><nobr>Lunch for children in China. <i>Information Systems Journal</i>, <i>26</i>(3), 289–313.</nobr></div> <div style="position:absolute;top:18290;left:164"><nobr>https://doi.org/10.1111/isj.12096.</nobr></div> </span></font> <!-- t44904r7a7c31334e31325n2u7l0m0k0 --> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10