skip to main content
10.1145/3025453.3025956acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

"People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

Published: 02 May 2017 Publication History

Abstract

In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these "tie-based" anonymity services may be notably different than other social media services. We use semi-structured interviews to qualitatively examine motivations, practices and perceptions in two tie-based anonymity apps: Secret (now defunct, in the US) and Mimi (in China). Among the findings, we show that: (1) while users are more comfortable in self-disclosure, they still have specific practices and strategies to avoid or allow identification; (2) attempts for deidentification of others are prevalent and often elaborate; and (3) participants come to expect both negativity and support in response to posts. Our findings highlight unique opportunities and potential benefits for tie-based anonymity apps, including serving disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.

Supplementary Material

MP4 File (p1781-ma.mp4)

References

[1]
Nazanin Andalibi, Oliver L Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 3906--3918.
[2]
Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive self-disclosures, responses, and social support on Instagram: The case of #depression. In Proceedings of the 20th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '17). ACM, New York, NY, USA.
[3]
John A Bargh, Katelyn YA McKenna, and Grainne M Fitzsimons. 2002. Can you see the real me? Activation and expression of the "true self" on the Internet. Journal of Social Issues 58, 1 (2002), 33--48.
[4]
Louise Barkhuus and Juliana Tashiro. 2010. Student socialization in the age of facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 133--142.
[5]
Christopher P Barlett and Douglas A Gentile. 2012. Attacking others online: The formation of cyberbullying in late adolescence. Psychology of Popular Media Culture 1, 2 (2012), 123--135.
[6]
Christopher P Barlett, Douglas A Gentile, and Chelsea Chew. 2014. Predicting cyberbullying from anonymity. Psychology of Popular Media Culture 5, 2 (2014), 171--180.
[7]
Roy F Baumeister and Mark R Leary. 1995. The need to belong: desire for interpersonal attachments as a fundamental human motivation. Psychological Bulletin 117, 3 (1995), 497--529.
[8]
Roy F Baumeister, Liqing Zhang, and Kathleen D Vohs. 2004. Gossip as cultural learning. Review of General Psychology 8, 2 (2004), 111--121.
[9]
Natalya N Bazarova. 2012. Public intimacy: Disclosure interpretation and social judgments on Facebook. Journal of Communication 62, 5 (2012), 815--832.
[10]
Natalya N Bazarova and Yoon Hyung Choi. 2014. Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication 64, 4 (2014), 635--657.
[11]
Michael S Bernstein, Andrés Monroy-Hernández, Drew Harry, Paul André, Katrina Panovich, and Gregory G Vargas. 4chan and/b: An analysis of anonymity and ephemerality in a large online community. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM '11).
[12]
Jeremy Birnholtz, Nicholas Aaron Ross Merola, and Arindam Paul. 2015. "Is it weird to still be a virgin": Anonymous, locally targeted questions on Facebook confession boards. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 2613--2622.
[13]
danah boyd. 2014. It's complicated: The social lives of networked teens. Yale University Press.
[14]
Nancy L Collins and Lynn Carol Miller. 1994. Self-disclosure and liking: A meta-analytic review. Psychological Bulletin 116, 3 (1994), 457--475.
[15]
Denzil Correa, Leandro Araujo Silva, Mainack Mondal, Fabrício Benevenuto, and Krishna P Gummadi. The many shades of anonymity: Characterizing anonymous social media content. In Proceedings of the 9th International AAAI Conference on Weblogs and Social Media (ICWSM '15).
[16]
Valerian J Derlega, Barbara A Winstead, and Kathryn Greene. 1997. Self-disclosure and starting a close relationship. Handbook of Relationship (1997), 153--174.
[17]
Judith S Donath. 1999. Identity and deception in the virtual community. In Communities in Cyberspace. 29--59.
[18]
Nicole B Ellison, Lindsay Blackwell, Cliff Lampe, and Penny Trieu. 2016. "The question exists, but you don't exist with it": Strategic anonymity in the social lives of adolescents. Social Media + Society 2, 4 (2016).
[19]
Hugh C Foot and May McCreaddie. 1997. Humour and laughter. In The Handbook of Communication Skills. Routledge, 259--285.
[20]
Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt. 2017. Privacy, anonymity, and perceived risk in open collaboration: A study of Tor users and Wikipedians. In Proceedings of the 20th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '17). ACM, New York, NY, USA.
[21]
Max Gluckman. 1963. Papers in honor of Melville J. Herskovits: Gossip and scandal. Current Anthropology 4, 3 (1963), 307--316.
[22]
Erving Goffman. 1959. The presentation of self in everyday life. (1959).
[23]
Oliver L Haimson, Anne E Bowser, Edward F Melcer, and Elizabeth F Churchill. 2015. Online inspiration and exploration for identity reinvention. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 3809--3818.
[24]
Jeffrey T Hancock, Jennifer Thom-Santelli, and Thompson Ritchie. 2004. Deception and design: The impact of communication technology on lying behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '04). ACM, New York, NY, USA, 129--134.
[25]
Erin E Hollenbaugh and Marcia K Everett. 2013. The effects of anonymity on self-disclosure in blogs: An application of the online disinhibition effect. Journal of Computer-Mediated Communication 18, 3 (2013), 283--302.
[26]
Jina Huh. 2015. Clinical questions in online health communities: The case of "see your doctor" threads. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, New York, NY, USA, 1488--1499.
[27]
Jina Huh, Rupa Patel, and Wanda Pratt. 2012. Tackling dilemmas in supporting 'the whole person' in online patient communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, USA, 923--926.
[28]
Ruogu Kang, Stephanie Brown, and Sara Kiesler. 2013. Why do people seek anonymity on the Internet?: Informing policy and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, USA, 2657--2666.
[29]
Ruogu Kang, Laura Dabbish, and Katherine Sutton. 2016. Strangers on your phone: Why people use anonymous communication applications. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, USA, 359--370.
[30]
Lee Knuttila. 2011. User unknown: 4chan, anonymity and contingency. First Monday 16, 10 (2011).
[31]
Cliff Lampe and Erik Johnston. 2005. Follow the (slash) dot: Effects of feedback on new members in an online community. In Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work (GROUP '05). ACM, New York, NY, USA, 11--20.
[32]
Cliff Lampe and Paul Resnick. 2004. Slash(dot) and burn: Distributed moderation in a large online conversation space. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '04). ACM, New York, NY, USA, 543--550.
[33]
Noam Lapidot-Lefler and Azy Barak. 2012. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in Human Behavior 28, 2 (2012), 434--443. http://dx.doi.org/10.1016/j.chb.2011.10.014
[34]
Danielle M Law, Jennifer D Shapka, Shelley Hymel, Brent F Olson, and Terry Waterhouse. 2012. The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization. Computers in Human Behavior 28, 1 (2012), 226--232. http://dx.doi.org/10.1016/j.chb.2011.09.004
[35]
Alex Leavitt. 2015. "This is a throwaway account": Temporary technical identities and perceptions of anonymity in a massive online community. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, New York, NY, USA, 317--327.
[36]
Jessica Lingel, Aaron Trammell, Joe Sanchez, and Mor Naaman. 2012. Practices of information and secrecy in a punk rock subculture. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12). ACM, New York, NY, USA, 157--166.
[37]
Xiao Ma, Jeffery T Hancock, and Mor Naaman. 2016. Anonymity, intimacy and self-disclosure in social media. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 3857--3869.
[38]
M. Lynne Markus. 1987. Toward a "critical mass" theory of interactive media: Universal access, interdependence and diffusion. Communication Research 14, 5 (1987), 491--511.
[39]
Alice E. Marwick and danah boyd. 2011. The drama! Teen conflict, gossip, and bullying in networked publics. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society. Available from SSRN. (2011). http://ssrn.com/abstract=1926349
[40]
Mark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, and Margaret E. Morris. 2011. It's not that I don't have problems, I'm just not putting them on Facebook: Challenges and opportunities in using online social networks for health. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (CSCW '11). ACM, New York, NY, USA, 341--350.
[41]
Julia Omarzu. 2000. A disclosure decision model: Determining how and when individuals will self-disclose. Personality and Social Psychology Review 4, 2 (2000), 174--185.
[42]
Robert Paine. 1967. What is gossip about? An alternative hypothesis. Man 2, 2 (1967), 278--285.
[43]
W Babnett Pearce and Stewart M Sharp. 1973. Self-disclosing communication. Journal of Communication 23, 4 (1973), 409--425.
[44]
Sai Teja Peddinti, Keith W. Ross, and Justin Cappos. 2014. "On the Internet, nobody knows you're a dog": A Twitter case study of anonymity in social networks. In Proceedings of the Second ACM Conference on Online Social Networks (COSN '14). ACM, New York, NY, USA, 83--94.
[45]
James W Pennebaker. 2012. Opening up: The healing power of expressing emotions. Guilford Press.
[46]
T Postmes, R Spears, and M Lea. 2000. The formation of group norms in computer-mediated communication. Human Communication Research 26, 3 (2000), 341--371. //dx.doi.org/10.1111/j.1468--2958.2000.tb00761.x
[47]
Jenny Preece. 1999. Empathic communities: Balancing emotional and factual communication. Interacting with Computers 12, 1 (1999), 63--77.
[48]
Vahed Qazvinian, Emily Rosengren, Dragomir R Radev, and Qiaozhu Mei. 2011. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP '11). Association for Computational Linguistics, Stroudsburg, PA, USA, 1589--1599.
[49]
Ralph L Rosnow. 1988. Rumor as communication: A contextualist approach. Journal of Communication 38, 1 (1988), 12--28.
[50]
Ralph L Rosnow. 2001. Rumor and gossip in interpersonal interaction and beyond: A social exchange perspective. In Behaving badly: Aversive behaviors in interpersonal relationships., Robin M. Kowalski (Ed.). American Psychological Association, Chapter 8, 203--232.
[51]
Ralph L Rosnow and Eric K Foster. 2005. Rumor and gossip research. Psychological Science Agenda 19, 4 (2005).
[52]
William B Stiles. 1987. "I have to talk to somebody". In Self-Disclosure: Theory, Research, and Therapy. Springer US, 257--282.
[53]
Anselm Strauss and Juliet M Corbin. 1997. Grounded theory in practice. Sage.
[54]
John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior 7, 3 (2004), 321--326.
[55]
Matthew Trammell. 2014. User investment and behavior policing on 4chan. First Monday 19, 2 (2014).
[56]
Sherry Turkle. 1995. Life on the screen: Identity in the age of the Internet. Simon & Schuster Trade.
[57]
Joseph B. Walther. 1996. Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research 23, 1 (1996), 3--43.
[58]
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2014. Whispers in the dark: Analysis of an anonymous social network. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14). ACM, New York, NY, USA, 137--150.
[59]
Yi-Chia Wang, Robert Kraut, and John M. Levine. 2012. To stay or leave?: The relationship of emotional and informational support to commitment in online health support groups. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12). ACM, New York, NY, USA, 833--842.
[60]
Sally Yerkovich. 1977. Gossiping as a way of speaking. Journal of Communication 27, 1 (1977), 192--196.

Cited By

View all

Index Terms

  1. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
    May 2017
    7138 pages
    ISBN:9781450346559
    DOI:10.1145/3025453
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anonymity
    2. cmc
    3. mimi
    4. secret
    5. self-disclosure
    6. social media
    7. wumii

    Qualifiers

    • Research-article

    Funding Sources

    • AOL

    Conference

    CHI '17
    Sponsor:

    Acceptance Rates

    CHI '17 Paper Acceptance Rate 600 of 2,400 submissions, 25%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)119
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 23 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media