Adam Joinson

Professor of Information Systems, University of Bath

Adam Joinson holds the post of ‘Professor of Information Systems’ at the University of Bath, School of Management. He was previously Professor of Behaviour Change and Director of the Centre of the Study of Behaviour Change and Influence at UWE, Bristol.

His research focuses on the interaction between psychology and technology, with a particular focus on how technology can shape behaviour, social relations and attitudes. Recently this work has taken in privacy attitudes and behaviours, the social impact of monitoring technology, computer-mediated communication and communication behaviours and the human aspects of cyber-security and security compliance.

The EPSRC, ESRC, EU, British Academy and UK Government have funded this work, and he has published over 60 articles in the field, as well as editing the Oxford Handbook of Internet Psychology (OUP, 2007), and authoring two books on psychology and technology.

Personal webpage

Project information

CREST’s work is structured by five Programmes of activity. You can find out more information about our core programmes, as well as our commissioned projects here.

Adam Joinson leads the Understanding And Countering Online Behaviour programme. Read more about this project here.

Recent publications

1. Piwek, L., Ellis, D., Andrews, S., and Joinson, A. (in press) The Rise of Consumer Health Wearables: Promises & Barriers. PLOS Medicine, In press.
2. Muir, K., Joinson, A., Cotterill, R., Dewdney, N. (in press). Characterising the Linguistic Chameleon: Personal and Social Correlates of Linguistic Style Accommodation. To appear in Human Communication Research.
3. Piwek, L., & Joinson, A. (2016). What do they Snapchat about? Patterns of use in time-limited instant messaging service. Computers in Human Behavior Volume 54, 358–367.
4. Joinson, A. N., and Piwek, L. (2016) Technology and the formation of socially positive behaviours. In ‘Beyond Behaviour Change: Perspectives from a diverse field’ (Ed. F. Spotswood), pp 157-176. Bristol, Policy Press.
5. Piwek, L., Joinson, A., Morvan, J. (2015) The use of self-monitoring solutions amongst cyclists: An online survey and empirical study, Transportation Research: Part A, 77, 126-136.
6. Vésteinsdóttir, V., Reips, U-D., Joinson, A., Thorsdottir, F. (2015) Psychometric properties of measurements obtained with the Marlowe–Crowne Social Desirability Scale in an Icelandic probability based Internet sample. Computers in Human Behavior, Volume 49, Pages 608-614,
7. Vasalou, A., Joinson, A.N. & Houghton, D. (2015). Privacy as a fuzzy concept: a new conceptualization of privacy for practitioners. Journal of the American Society of Information Science and Technology, 66, 5, 918-929.
8. Jones, S., Cotterill, R., Dewdney, N., Muir, K., Joinson, A.N. (2014). Finding Zelig in Text: A Measure for Normalising Linguistic Accommodation. Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers, Association of Computational Linguistics, 455-465.
9. Archer-Brown, C., Piercy, N., Joinson, A.N. (2013). Examining the information value of virtual communities: Factual versus opinion-based message content. Journal of Marketing Management, 29 (3-4), 421-438.
10. Whitty, M., Buchnan, T.B., Joinson, A.N. (2012). Not all lies are spontaneous: An examination of deception across different modes of communication. Journal of the American Society for Information Science and Technology (JASIST), 63, 208-216.
11. Houghton, D.M., and Joinson, A.N. (2012). Linguistic markers of secrets and sensitive self-disclosure on Twitter. Proceedings of 45th Hawaii International Conference on Systems Science (HICSS 12) (January). pp.10

More from Adam…


How is Extraversion related to Social Media Use? A Literature Review

With nearly 3.5 billion people now using some form of social media, understanding its relationship with personality has become a crucial focus of psychological...Read More »

Exploring Susceptibility to Phishing in the Workplace

Phishing emails provide a means to infiltrate the technical systems of organisations by encouraging employees to click on malicious links or attachments. Despite the...Read More »

What Demographic Attributes Do Our Digital Footprints Reveal?

To what extent does our online activity reveal who we are? Recent research has demonstrated that the digital traces left by individuals as they...Read More »

Human and Computer Personality Prediction From Digital Footprints

Is it possible to judge someone accurately from his or her online activity? The Internet provides vast opportunities for individuals to present themselves in...Read More »

Same Kind of Different: Affordances, Terrorism, and the Internet

The rapid development of the Internet as a cornerstone of private and social life has provoked a growing effort by law enforcement and security...Read More »

Individual Differences in Susceptibility to Online Influence: A Theoretical Review

Scams and other malicious attempts to influence people are continuing to proliferate across the globe, aided by the availability of technology that makes it...Read More »

Press Accept to Update Now: Individual Differences in Susceptibility to Malevolent Interruptions

Increasingly, connected communication technologies have resulted in people being exposed to fraudulent communications by scammers and hackers attempting to gain access to computer systems...Read More »

Technology and the Formation of Socially Positive Behaviours

‘Behaviour change’ has become a buzz phrase of growing importance to policymakers and researchers. There is an increasing focus on exploring the relationship between...Read More »

Social Role Evolution of an Ideological Online Community

Social Role Evolution of an Ideological Online Community by Brittany I. Davidson, Simon Jones, Professor Adam Joinson and Dr Joanne Hinds. What stimulates one user’s progression to...Read More »

How can Data Predict our Behaviour?

How can Data Predict our Behaviour? by CREST researchers Dr Joanne Hinds and Professor Adam Joinson. This poster presents Adam Johnson and Joanne Hinds’ research...Read More »

Understanding and Countering Online Behaviour

Understanding and Countering Online BehaviourUnderstanding and Countering Online Behaviour by CREST Researcher Adam Joinson. This poster gives an overview of the programme, centered around understanding and shaping online...Read More »

Mindmap: Networks

Mindmap Ideological TransmissionResearchers on networks, and especially social network analysis, use a variety of technical terms to describe the elements and structure of a network. But,...Read More »

The Bluffers Guide To Networks

Researchers on networks, and especially social network analysis, use a variety of technical terms to describe the elements and structure of a network. But,...Read More »

Why networks matter

Adam Joinson & Brittany Davidson outline why we should study networks, and how doing so can provide insights for security practitioners. What are networks?...Read More »

The future of wearable technology

Your watch will soon know you better than you know yourself… From mobile phones to smart watches and glasses, wearable technology isn’t just the...Read More »

Eliciting Information Online

…the internet often provides an ideal environment for those with malevolent intent to elicit information from victims. Emma Williams and Adam Joinson research scamming...Read More »

Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI

The idea that the internet may enable an individual to become radicalized has been of increasing concern over the last two decades. Indeed, the...Read More »

Introductory Guide: Phishing

Why do people click on phishing links? This guide introduces the main approaches to phishing and the reasons people fall for it. Phishing is...Read More »

Introductory Guide: Messaging Applications

A guide introducing the characteristics of messaging applications which may be useful for terrorist and criminal behaviour Messaging applications have become an increasingly popular...Read More »

Tags from the story