Abstract
How do individuals in twelve-step fellowships like Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) interpret and enact "anonymity?" In this paper, we answer this question through a mixed-methods investigation. Through secondary analysis of interview data from 26 participants and an online questionnaire (N=285) we found three major interpretations of anonymity among AA and NA members: "unidentifiability," "social contract," and "program over individual." While unidentifiability has been the focus of computing investigations, the other interpretations provide a significant and novel lens on anonymity. To understand how and when the unidentifiability interpretation was most likely to be enacted, we conducted a quantitative analysis of traces of activity in a large online recovery community. We observed that members were less likely to enact "unidentifiability" if they were more connected to the particular community and had more time in recovery. We provide implications for future research on context-specific anonymity and implications for design in online recovery spaces and similar sensitive contexts.
- Yair Amichai-Hamburger. 2013. The Social Net: Understanding our online behavior. OUP Oxford. Google ScholarDigital Library
- Nazanin Andalibi. 2016. Social Media for Sensitive Disclosures and Social Support: The Case of Miscarriage. In Proceedings of the 19th International Conference on Supporting Group Work (GROUP '16), 461--465. Google ScholarDigital Library
- Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3906--3918. Google ScholarDigital Library
- Anonymous. 1998. To Reveal or Not to Reveal: A Theoretical Model of Anonymous Communication. Commun. Theory 8, 4 (November 1998), 381--407.Google Scholar
- Monica J. Barratt. 2011. Discussing Illicit Drugs in Public Internet Forums: Visibility, Stigma, and Pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (C&T '11), 159--168. Google ScholarDigital Library
- Shlomo Berkovsky, Mac Coombe, Jill Freyne, Dipak Bhandari, and Nilufar Baghaei. 2010. Physical Activity Motivating Games: Virtual Rewards for Real Activity. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10), 243--252. Google ScholarDigital Library
- Shlomo Berkovsky, Jill Freyne, and Mac Coombe. 2012. Physical Activity Motivating Games: Be Active and Get Your Own Reward. ACM Trans Comput-Hum Interact 19, 4 (December 2012), 32:1--32:41. Google ScholarDigital Library
- Bill Wilson. 1953. Twelve steps and twelve traditions. The AA Grapevine, Inc. and Alcoholics Anonymous.Google Scholar
- Jeremy Birnholtz, Nicholas Aaron Ross Merola, and Arindam Paul. 2015. "Is It Weird to Still Be a Virgin": Anonymous, Locally Targeted Questions on Facebook Confession Boards. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 2613--2622. Google ScholarDigital Library
- Erik W. Black, Kelsey Mezzina, and Lindsay A. Thompson. 2016. Anonymous social media -- Understanding the content and context of Yik Yak. Comput. Hum. Behav. 57, (April 2016), 17--22. Google ScholarDigital Library
- A. Blanchard and M. Markus. 2002. Sense of Virtual Community-Maintaining the Experience of Belonging. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 -- Volume 8 (HICSS '02), 270.2--. Retrieved April 21, 2017 from http://dl.acm.org/citation.cfm?id=820746.821187 Google ScholarDigital Library
- Catherine F. Brooks. 2010. Toward "hybridised" faculty development for the twenty-first century: blending online communities of practice and face-to-face meetings in instructional and professional support programmes. Innov. Educ. Teach. Int. 47, 3 (August 2010), 261--270.Google ScholarCross Ref
- Jenna Chang. 2008. The role of anonymity in deindividuated behavior: A comparison of deindividuation theory and the social identity model of deindividuation effects (SIDE). The Pulse 6, 1 (2008), 2--8.Google Scholar
- Gary Charness and Uri Gneezy. 2008. What's in a name? Anonymity and social distance in dictator and ultimatum games. J. Econ. Behav. Organ. 68, 1 (October 2008), 29--35.Google ScholarCross Ref
- D. Cho, S. Kim, and A. Acquisti. 2012. Empirical analysis of online anonymity and user behaviors: the impact of real name policy. In 2012 45th Hawaii International Conference on System Sciences, 3041--3050. Google ScholarDigital Library
- Kimberly M. Christopherson. 2007. The Positive and Negative Implications of Anonymity in Internet Social Interactions: "On the Internet, Nobody Knows You'Re a Dog." Comput Hum Behav 23, 6 (November 2007), 3038--3056. Google ScholarDigital Library
- Angela M. Cirucci. 2015. Facebook's Affordances, Visible Culture, and Anti-anonymity. In Proceedings of the 2015 International Conference on Social Media & Society (SMSociety '15), 11:1--11:5. Google ScholarDigital Library
- Denzil Correa, Leandro Araújo Silva, Mainack Mondal, Fabricio Benevenuto, and Krishna Gummadi. 2015. The Many Shades of Anonymity: Characterizing Anonymous Social Media Content. In Proceedings of the 9th International AAAI Conference on Web and Social Media.Google Scholar
- K. P. Davison, J. W. Pennebaker, and S. S. Dickerson. 2000. Who talks? The social psychology of illness support groups. Am. Psychol. 55, 2 (February 2000), 205--217.Google ScholarCross Ref
- Munmun De Choudhury and Sushovan De. 2014. Mental Health Discourse on reddit: Self-Disclosure, Social Support, and Anonymity. In ICWSM. Retrieved July 5, 2017 from http://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/download/8075/8107Google Scholar
- Ed Diener. 1979. Deindividuation, self-awareness, and disinhibition. J. Pers. Soc. Psychol. 37, 7 (1979), 1160--1171.Google ScholarCross Ref
- Edward Diener, Scott C. Fraser, Arthur L. Beaman, and Roger T. Kelem. 1976. Effects of deindividuation variables on stealing among Halloween trick-or-treaters. J. Pers. Soc. Psychol. 33, 2 (1976), 178--183.Google ScholarCross Ref
- Vitaly J. Dubrovsky, Sara Kiesler, and Beheruz N. Sethna. 1991. The Equalization Phenomenon: Status Effects in Computer-Mediated and Face-to-Face Decision-Making Groups. Human-Computer Interact. 6, 2 (June 1991), 119--146. Google ScholarDigital Library
- Nicole B. Ellison, Lindsay Blackwell, Cliff Lampe, and Penny Trieu. 2016. "The Question Exists, but You Don't Exist With It": Strategic Anonymity in the Social Lives of Adolescents. Soc. Media Soc. 2, 4 (November 2016), 2056305116670673.Google Scholar
- Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt. 2017. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 1800--1811. Google ScholarDigital Library
- Jeana Frost, Ivar E Vermeulen, and Nienke Beekers. 2014. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities. J. Med. Internet Res. 16, 5 (May 2014).Google ScholarCross Ref
- Bernhard Hoisl, Wolfgang Aigner, and Silvia Miksch. 2007. Social Rewarding in Wiki Systems -- Motivating the Community. In Online Communities and Social Computing (Lecture Notes in Computer Science), 362--371. Google ScholarDigital Library
- Hsiu-Fang Hsieh and Sarah E. Shannon. 2005. Three Approaches to Qualitative Content Analysis. Qual. Health Res. 15, 9 (November 2005), 1277--1288.Google ScholarCross Ref
- Deborah G. Johnson and Keith Miller. 1998. Anonymity, Pseudonymity, or Inescapable Identity on the Net (Abstract). In Proceedings of the Ethics and Social Impact Component on Shaping Policy in the Information Age (ACM POLICY '98), 37--38. Google ScholarDigital Library
- Ruogu Kang, Stephanie Brown, and Sara Kiesler. 2013. Why Do People Seek Anonymity on the Internet?: Informing Policy and Design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 2657--2666. Google ScholarDigital Library
- Ruogu Kang, Laura Dabbish, and Katherine Sutton. 2016. Strangers on Your Phone: Why People Use Anonymous Communication Applications. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 359--370. Google ScholarDigital Library
- Peter G. Kilner and Christopher M. Hoadley. 2005. Anonymity Options and Professional Participation in an Online Community of Practice. In Proceedings of th 2005 Conference on Computer Support for Collaborative Learning: Learning 2005: The Next 10 Years! (CSCL '05), 272--280. Retrieved March 29, 2017 from http://dl.acm.org/citation.cfm?id=1149293.1149328 Google ScholarDigital Library
- Per E. Kummervold, Deede Gammon, Svein Bergvik, Jan-Are K. Johnsen, Toralf Hasvold, and Jan H. Rosenvinge. 2002. Social support in a wired world: use of online mental health forums in Norway. Nord. J. Psychiatry 56, 1 (2002), 59--65.Google ScholarCross Ref
- J. Richard Landis and Gary G. Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (1977), 159--174.Google ScholarCross Ref
- Noam Lapidot-Lefler and Azy Barak. 2012. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Comput. Hum. Behav. 28, 2 (March 2012), 434--443. Google ScholarDigital Library
- Martin Lea, Russell Spears, and Daphne de Groot. 2001. Knowing Me, Knowing You: Anonymity Effects on Social Identity Processes within Groups. Pers. Soc. Psychol. Bull. 27, 5 (May 2001), 526--537.Google ScholarCross Ref
- Alex Leavitt. 2015. "This is a Throwaway Account": Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 317--327. Google ScholarDigital Library
- Bingdong Li, Esra Erdin, Mehmet Hadi Gunes, George Bebis, and Todd Shipley. 2013. An overview of anonymity technology usage. Comput. Commun. 36, 12 (July 2013), 1269--1283. Google ScholarDigital Library
- Xiao Ma, Jeff Hancock, and Mor Naaman. 2016. Anonymity, Intimacy and Self-Disclosure in Social Media. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3857--3869. Google ScholarDigital Library
- Gary T. Marx. 1999. What's in a Name? Some Reflections on the Sociology of Anonymity. Inf. Soc. 15, 2 (May 1999), 99--112.Google ScholarCross Ref
- Christiane Moser, Michaela Peterhansl, Thomas Kargl, and Manfred Tscheligi. 2015. The Potentials of Gamification to Motivate Older Adults to Participate in a P2P Support Exchange Platform. In Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (CHI PLAY '15), 655--660. Google ScholarDigital Library
- Michael Muller. 2014. Curiosity, Creativity, and Surprise as Analytic Tools: Grounded Theory Method. In Ways of Knowing in HCI, Judith S. Olson and Wendy A. Kellogg (eds.). Springer New York, 25--48.Google Scholar
- Mark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, and Margaret E. Morris. 2011. It's Not That I Don'T Have Problems, I'M Just Not Putting Them on Facebook: Challenges and Opportunities in Using Online Social Networks for Health. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (CSCW '11), 341--350. Google ScholarDigital Library
- Helen Nissenbaum. 1999. The Meaning of Anonymity in an Information Age. Inf. Soc. 15, 2 (May 1999), 141--144.Google ScholarCross Ref
- Stina Nylander. 2012. Changing My Life One Step at a Time: Using the Twelve Step Program As Design Inspiration for Long Term Lifestyle Change. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (NordiCHI '12), 711--720. Google ScholarDigital Library
- E. Omernick and S. O. Sood. 2013. The Impact of Anonymity in Online Communities. In 2013 International Conference on Social Computing, 526--535. Google ScholarDigital Library
- Akiko Orita and Hisakazu Hada. 2009. Is That Really You?: An Approach to Assure Identity Without Revealing Real-name Online. In Proceedings of the 5th ACM Workshop on Digital Identity Management (DIM '09), 17--20. Google ScholarDigital Library
- Carina Paine, Adam N. Joinson, Tom Buchanan, and Ulf-Dietrich Reips. 2006. Privacy and Self-disclosure Online. In CHI '06 Extended Abstracts on Human Factors in Computing Systems (CHI EA '06), 1187--1192. Google ScholarDigital Library
- Malte Paskuda and Myriam Lewkowicz. 2015. Anonymous Quorans Are Still Quorans, Just Anonymous. In Proceedings of the 7th International Conference on Communities and Technologies (C&T '15), 9--18. Google ScholarDigital Library
- Umashanthi Pavalanathan and Munmun De Choudhury. 2015. Identity Management and Mental Health Discourse in Social Media. In Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion), 315--321. Google ScholarDigital Library
- Sandra Petronio. 2015. Communication Privacy Management Theory. In The International Encyclopedia of Interpersonal Communication. John Wiley & Sons, Inc.Google Scholar
- Jared Piazza and Jesse M. Bering. 2008. The Effects of Perceived Anonymity on Altruistic Punishment. Evol. Psychol. 6, 3 (July 2008), 147470490800600320.Google Scholar
- John Powell, Nadia Inglis, Jennifer Ronnie, and Shirley Large. 2011. The Characteristics and Motivations of Online Health Information Seekers: Cross-Sectional Survey and Qualitative Interview Study. J. Med. Internet Res. 13, 1 (2011), e20.Google ScholarCross Ref
- Hua Qian and Craig R. Scott. 2007. Anonymity and Self-Disclosure on Weblogs. J. Comput.-Mediat. Commun. 12, 4 (July 2007), 1428--1451.Google ScholarCross Ref
- S. D. Reicher, R. Spears, and T. Postmes. 1995. A Social Identity Model of Deindividuation Phenomena. Eur. Rev. Soc. Psychol. 6, 1 (January 1995), 161--198.Google ScholarCross Ref
- Stephen P. Robbins and Timothy A. Judge. 2010. Organizational Behavior. Prentice Hall.Google Scholar
- Sabirat Rubya and Svetlana Yarosh. 2017. Video-Mediated Peer Support in an Online Community for Recovery from Substance Use Disorders. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 1454--1469. Google ScholarDigital Library
- Ari Schlesinger, Eshwar Chandrasekharan, Christina A. Masden, Amy S. Bruckman, W. Keith Edwards, and Rebecca E. Grinter. 2017. Situated Anonymity: Impacts of Anonymity, Ephemerality, and Hyper-Locality on Social Media. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 6912--6924. Google ScholarDigital Library
- William C. Schmidt. 1997. World-Wide Web survey research: Benefits, potential problems, and solutions. Behav. Res. Methods Instrum. Comput. 29, 2 (June 1997), 274--279.Google ScholarCross Ref
- Sarita Yardi Schoenebeck. 2013. The Secret Life of Online Moms: Anonymity and Disinhibition on YouBeMom. com. In Proceedings of the International AAAI Conference on Weblogs and Social Media. Retrieved March 30, 2017 from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.592.7868&rep=rep1&type=pdfGoogle Scholar
- John Suler. 2004. The online disinhibition effect. Cyberpsychology Behav. Impact Internet Multimed. Virtual Real. Behav. Soc. 7, 3 (June 2004), 321--326.Google ScholarCross Ref
- Max Van Kleek, Daniel Smith, Nigel R. Shadbolt, Dave Murray-Rust, and Amy Guy. 2015. Self Curation, Social Partitioning, Escaping from Prejudice and Harassment: The Many Dimensions of Lying Online. In Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion), 371--372. Google ScholarDigital Library
- Alex B. Van Zant and Laura J. Kray. 2014. "I can't lie to your face": Minimal face-to-face interaction promotes honesty. J. Exp. Soc. Psychol. 55, (November 2014), 234--238.Google ScholarCross Ref
- Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2014. Whispers in the Dark: Analysis of an Anonymous Social Network. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14), 137--150. Google ScholarDigital Library
- Kevin Wright. 2000. Perceptions of on-line support providers: An examination of perceived homophily, source credibility, communication and social support within on-line support groups. Commun. Q. 48, 1 (January 2000), 44--59.Google ScholarCross Ref
- Kevin B. Wright, Sally B. Bell, Kevin B. Wright, and Sally B. Bell. 2003. Health-related Support Groups on the Internet: Linking Empirical Findings to Social Support and Computer-mediated Communication Theory. J. Health Psychol. 8, 1 (January 2003), 39--54.Google ScholarCross Ref
- Svetlana Yarosh. 2013. Shifting Dynamics or Breaking Sacred Traditions?: The Role of Technology in Twelve-step Fellowships. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3413--3422. Google ScholarDigital Library
- Haejin Yun. 2006. The creation and validation of a perceived anonymity scale based on the social information processing model and its nomological network test in an online social support community.Google Scholar
- Philip G. Zimbardo. 1969. The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. Nebr. Symp. Motiv. 17, (1969), 237--307.Google Scholar
- Gregory D. Zimet, Nancy W. Dahlem, Sara G. Zimet, and Gordon K. Farley. 1988. The Multidimensional Scale of Perceived Social Support. J. Pers. Assess. 52, 1 (March 1988), 30--41.Google ScholarCross Ref
- Adam G. Zimmerman and Gabriel J. Ybarra. 2016. Online aggression: The influences of anonymity and social modeling. Psychol. Pop. Media Cult. 5, 2 (April 2016), 181.Google Scholar
- 2017. Wikipedia:Awards. Wikipedia. Retrieved April 23, 2017 from https://en.wikipedia.org/w/index.php?title=Wikipedia:Awards&oldid=762810081Google Scholar
- Alcoholics Anonymous: Twelve Steps and Twelve Traditions. Retrieved July 7, 2017 from http://www.aa.org/pages/en_US/twelve-steps-and-twelve-traditionsGoogle Scholar
- Understanding Anonymity. Retrieved from http://www.aa.org/assets/en_US/p-47_understandinganonymity.pdfGoogle Scholar
- AA MEETING STRUCTURE. Retrieved April 21, 2017 from http://www.darvsmith.com/dox/aa.htmlGoogle Scholar
- Microsoft Cognitive Services - Face API. Retrieved April 27, 2017 from https://www.microsoft.com/cognitive-services/en-us/face-apiGoogle Scholar
Index Terms
- Interpretations of Online Anonymity in Alcoholics Anonymous and Narcotics Anonymous
Recommendations
Video-Mediated Peer Support in an Online Community for Recovery from Substance Use Disorders
CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social ComputingPeople in recovery from substance use disorders seek peer support through online health communities like InTheRooms.com (ITR). This community provides the unique opportunity to study video-mediated health peer support online, as it hosts over 100 weekly ...
Anonymous Online Support: Investigations of Identity and Heterogeneous Groups in Online Recovery Support
CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing SystemsHow does anonymity impact perceptions of the effectiveness of support in online recovery communities? Prior work has shown how the multifaceted concept of identity plays an important role in support seeking, but its effects with respect to support ...
(α, k)-anonymous data publishing
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the ...
Comments