(Re)Negotiating Homeless Identity through Technology-Mediated Social Interaction

Byron Keating, Dale MACKRELL, John CAMPBELL

    Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review


    Prior research has explored homelessness and barriers to accessing digital technology. Our study will build on this evidence base by moving beyond a discussion of what technology is used, to better understand how these technologies are used, and the content and nature of communicative practices within homeless communities. This will be done by drawing together two important streams of homelessness research. The first stream focuses on the importance of connectedness for homeless persons. The second stream concentrates on the importance of identity for homeless persons, recognizing the negative impact of homelessness on an individual’s self-concept. Through the lens of boundary objects theory, technology-mediated social interaction will be viewed as providing a safe environment where homeless persons and service providers can develop mutual respect. The insights gathered will inform future interventions that aim to facilitate better social interaction among homeless persons, non-homeless persons, and the formal institutions supporting the homeless.
    Original languageEnglish
    Title of host publicationThe 36th International Conference on Information Systems (ICIS 2015) : Proceedings
    EditorsDorothy Leidner, Jeanne Ross
    Place of PublicationOnline
    PublisherAssociation for Information Systems
    Number of pages8
    ISBN (Print)9780996683111
    Publication statusPublished - 2015
    EventInternational Conference on Information Systems (ICIS 2015) - Texas, Texas, United States
    Duration: 13 Dec 201516 Dec 2015


    ConferenceInternational Conference on Information Systems (ICIS 2015)
    Abbreviated titleICIS 2015
    CountryUnited States


    Dive into the research topics of '(Re)Negotiating Homeless Identity through Technology-Mediated Social Interaction'. Together they form a unique fingerprint.

    Cite this