A key obstacle for dark organizations is negotiating who is and is not a member. Following the social identity approach, this study explores the impact of prototypical communication, through code word use, on the structure of two dark online organizations. We use two-mode exponential random graph modeling to demonstrate the interdependence between code word use and network structure. Findings are discussed in light of social identity approaches and online groups.
AshforthB. E.MaelF. (1989). Social identity theory and the organization. Academy of Management Review, 14, 20-39.
2.
DinoA.ReysenS.BranscombeN. R. (2008). Online interactions between group members who differ in status. Journal of Language and Social Psychology, 28, 85-93.
3.
DobuschL.SchoenebornD. (2015). Fluidity, identity, and organizationality: The communicative constitution of anonymous. Journal of Management Studies, 52, 1005-1035.
4.
GambettaD. (2009). Codes of the underworld: How criminals communicate. Princeton, NJ: Princeton University Press.
5.
GossettL. M.KilkerJ. (2006). My job sucks: Examining counterinstitutional web sites as locations for organizational member voice, dissent, and resistance. Management Communication Quarterly, 20, 63-90.
6.
HoggM. A. (2001). Social categorization, depersonalization, and group behavior. In HoggM. A.TindaleR. S. (Eds.), Blackwell handbook of social psychology: Group processes (pp. 56-85). Malden, MA: Blackwell.
7.
HoggM. A. (2005). The social identity perspective. In WheelanS. A. (Ed.), The handbook of group research and practice (pp. 133-159). Thousand Oaks, CA: Sage.
8.
HoggM. A.ReidS. A. (2006). Social identity, self-categorization, and the communication of group norms. Communication Theory, 25, 121-140.
9.
HoggM. A.TerryD. I. (2000). Social identity and self-categorization processes in organizational contexts. Academy of Management Review, 25, 121-140.
10.
HollingsheadA. B. (2001). Computer-mediated communication, the Internet, and group research. In HoggM.TindaleR. S. (Eds.), Blackwell handbook of social psychology: Group processes (Vol. 3, pp. 557-573). Oxford, England: Blackwell.
11.
HuffakerD. A.SwaabR.DiermeierD. (2010). The language of coalition formation in online multiparty negotiations. Journal of Language and Social Psychology, 30, 66-81.
12.
KienzleJ.SolizJ. (2017). Intergroup communication. In ChenL. (Ed.), Intercultural communication (Vol. 9, pp. 369-388). Leck, Germany: Walter de Gruyter.
13.
MikalJ. P.RiceR. E.KentR. G.UchinoB. N. (2015). 100 Million strong: A case study of group identification and deindividuation on Imgur.com. New Media & Society, 18, 2485-2506.
14.
PooleM. S.ZhangH. (2005). Virtual teams. In WheelanS. A. (Ed.), The handbook of group research and practice (pp. 363-385). Thousand Oaks, CA: Sage.
15.
PostmesT. O. M.SpearsR.LeaM. (1998). Breaching or building social boundaries? SIDE-effects of computer-mediated communication. Communication Research, 25, 689-715.
16.
ReidS. A.GilesH.HarwoodJ. (2005). A prospectus for the study of communication and intergroup relations. In HarwoodJ.GilesH. (Eds.), Intergroup communication: Multiple perspectives (pp. 241-263). New York, NY: Peter Lang.
17.
ReidS. A.NgS. H. (2000). Conversation as a resource for influence: Evidence for prototypical arguments and social identification processes. European Journal of Social Psychology, 30, 83-100.
18.
RobinsG.PattisonP.KalishY.LusherD. (2007). An introduction to exponential random graph (p*) models for social networks. Social Networks, 29, 173-191.
19.
SchoenebornD.SchererA. G. (2012). Clandestine organizations, al Qaeda, and the paradox of (in)visibility: A response to Stohl and Stohl. Organization Studies, 33, 963-971.
20.
ScottC. (2013). Anonymous agencies, backstreet businesses, and covert collectives: Rethinking organizations in the 21st century: Palo Alto, CA: Stanford University Press.
21.
ScottC. R. (2015). Bringing hidden organizations out of the shadows: Introduction to the special issue. Management Communication Quarterly, 29, 503-511.
22.
SpearsR.LeaM. (1994). Panacea or panopticon?Communication Research, 21, 427-459.
23.
StohlC.StohlM. (2011). Secret agencies: The communicative constitution of a clandestine organization. Organization Studies, 32, 1197-1215.
24.
TajfelH.TurnerJ. C. (1979). An integrative theory of intergroup conflict. In AustinW. G.WorchelS. (Eds.), The social psychology of intergroup relations (pp. 33-47). Monterey, CA: Brooks/Cole.
25.
TurnerJ. C.HoggM. A.OakesP. J.ReicherS. D.WetherellM. S. (1987). Rediscovering the social group: A self-categorization theory. Oxford, England: Blackwell.
26.
WangP. (2013). Exponential random graph models: Extensions for multiple networks and bipartite networks. In LusherD.KoskinenJ.RobinsG. (Eds.), Exponential random graph models for social networks (pp. 115-128). Cambridge, England: Cambridge University Press.