skip to main content
research-article
Public Access

Interpretations of Online Anonymity in Alcoholics Anonymous and Narcotics Anonymous

Published:06 December 2017Publication History
Skip Abstract Section

Abstract

How do individuals in twelve-step fellowships like Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) interpret and enact "anonymity?" In this paper, we answer this question through a mixed-methods investigation. Through secondary analysis of interview data from 26 participants and an online questionnaire (N=285) we found three major interpretations of anonymity among AA and NA members: "unidentifiability," "social contract," and "program over individual." While unidentifiability has been the focus of computing investigations, the other interpretations provide a significant and novel lens on anonymity. To understand how and when the unidentifiability interpretation was most likely to be enacted, we conducted a quantitative analysis of traces of activity in a large online recovery community. We observed that members were less likely to enact "unidentifiability" if they were more connected to the particular community and had more time in recovery. We provide implications for future research on context-specific anonymity and implications for design in online recovery spaces and similar sensitive contexts.

References

  1. Yair Amichai-Hamburger. 2013. The Social Net: Understanding our online behavior. OUP Oxford. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Nazanin Andalibi. 2016. Social Media for Sensitive Disclosures and Social Support: The Case of Miscarriage. In Proceedings of the 19th International Conference on Supporting Group Work (GROUP '16), 461--465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3906--3918. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Anonymous. 1998. To Reveal or Not to Reveal: A Theoretical Model of Anonymous Communication. Commun. Theory 8, 4 (November 1998), 381--407.Google ScholarGoogle Scholar
  5. Monica J. Barratt. 2011. Discussing Illicit Drugs in Public Internet Forums: Visibility, Stigma, and Pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (C&T '11), 159--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Shlomo Berkovsky, Mac Coombe, Jill Freyne, Dipak Bhandari, and Nilufar Baghaei. 2010. Physical Activity Motivating Games: Virtual Rewards for Real Activity. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10), 243--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shlomo Berkovsky, Jill Freyne, and Mac Coombe. 2012. Physical Activity Motivating Games: Be Active and Get Your Own Reward. ACM Trans Comput-Hum Interact 19, 4 (December 2012), 32:1--32:41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bill Wilson. 1953. Twelve steps and twelve traditions. The AA Grapevine, Inc. and Alcoholics Anonymous.Google ScholarGoogle Scholar
  9. Jeremy Birnholtz, Nicholas Aaron Ross Merola, and Arindam Paul. 2015. "Is It Weird to Still Be a Virgin": Anonymous, Locally Targeted Questions on Facebook Confession Boards. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 2613--2622. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Erik W. Black, Kelsey Mezzina, and Lindsay A. Thompson. 2016. Anonymous social media -- Understanding the content and context of Yik Yak. Comput. Hum. Behav. 57, (April 2016), 17--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Blanchard and M. Markus. 2002. Sense of Virtual Community-Maintaining the Experience of Belonging. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 -- Volume 8 (HICSS '02), 270.2--. Retrieved April 21, 2017 from http://dl.acm.org/citation.cfm?id=820746.821187 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Catherine F. Brooks. 2010. Toward "hybridised" faculty development for the twenty-first century: blending online communities of practice and face-to-face meetings in instructional and professional support programmes. Innov. Educ. Teach. Int. 47, 3 (August 2010), 261--270.Google ScholarGoogle ScholarCross RefCross Ref
  13. Jenna Chang. 2008. The role of anonymity in deindividuated behavior: A comparison of deindividuation theory and the social identity model of deindividuation effects (SIDE). The Pulse 6, 1 (2008), 2--8.Google ScholarGoogle Scholar
  14. Gary Charness and Uri Gneezy. 2008. What's in a name? Anonymity and social distance in dictator and ultimatum games. J. Econ. Behav. Organ. 68, 1 (October 2008), 29--35.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. Cho, S. Kim, and A. Acquisti. 2012. Empirical analysis of online anonymity and user behaviors: the impact of real name policy. In 2012 45th Hawaii International Conference on System Sciences, 3041--3050. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kimberly M. Christopherson. 2007. The Positive and Negative Implications of Anonymity in Internet Social Interactions: "On the Internet, Nobody Knows You'Re a Dog." Comput Hum Behav 23, 6 (November 2007), 3038--3056. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Angela M. Cirucci. 2015. Facebook's Affordances, Visible Culture, and Anti-anonymity. In Proceedings of the 2015 International Conference on Social Media & Society (SMSociety '15), 11:1--11:5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Denzil Correa, Leandro Araújo Silva, Mainack Mondal, Fabricio Benevenuto, and Krishna Gummadi. 2015. The Many Shades of Anonymity: Characterizing Anonymous Social Media Content. In Proceedings of the 9th International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  19. K. P. Davison, J. W. Pennebaker, and S. S. Dickerson. 2000. Who talks? The social psychology of illness support groups. Am. Psychol. 55, 2 (February 2000), 205--217.Google ScholarGoogle ScholarCross RefCross Ref
  20. Munmun De Choudhury and Sushovan De. 2014. Mental Health Discourse on reddit: Self-Disclosure, Social Support, and Anonymity. In ICWSM. Retrieved July 5, 2017 from http://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/download/8075/8107Google ScholarGoogle Scholar
  21. Ed Diener. 1979. Deindividuation, self-awareness, and disinhibition. J. Pers. Soc. Psychol. 37, 7 (1979), 1160--1171.Google ScholarGoogle ScholarCross RefCross Ref
  22. Edward Diener, Scott C. Fraser, Arthur L. Beaman, and Roger T. Kelem. 1976. Effects of deindividuation variables on stealing among Halloween trick-or-treaters. J. Pers. Soc. Psychol. 33, 2 (1976), 178--183.Google ScholarGoogle ScholarCross RefCross Ref
  23. Vitaly J. Dubrovsky, Sara Kiesler, and Beheruz N. Sethna. 1991. The Equalization Phenomenon: Status Effects in Computer-Mediated and Face-to-Face Decision-Making Groups. Human-Computer Interact. 6, 2 (June 1991), 119--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nicole B. Ellison, Lindsay Blackwell, Cliff Lampe, and Penny Trieu. 2016. "The Question Exists, but You Don't Exist With It": Strategic Anonymity in the Social Lives of Adolescents. Soc. Media Soc. 2, 4 (November 2016), 2056305116670673.Google ScholarGoogle Scholar
  25. Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt. 2017. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 1800--1811. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jeana Frost, Ivar E Vermeulen, and Nienke Beekers. 2014. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities. J. Med. Internet Res. 16, 5 (May 2014).Google ScholarGoogle ScholarCross RefCross Ref
  27. Bernhard Hoisl, Wolfgang Aigner, and Silvia Miksch. 2007. Social Rewarding in Wiki Systems -- Motivating the Community. In Online Communities and Social Computing (Lecture Notes in Computer Science), 362--371. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Hsiu-Fang Hsieh and Sarah E. Shannon. 2005. Three Approaches to Qualitative Content Analysis. Qual. Health Res. 15, 9 (November 2005), 1277--1288.Google ScholarGoogle ScholarCross RefCross Ref
  29. Deborah G. Johnson and Keith Miller. 1998. Anonymity, Pseudonymity, or Inescapable Identity on the Net (Abstract). In Proceedings of the Ethics and Social Impact Component on Shaping Policy in the Information Age (ACM POLICY '98), 37--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ruogu Kang, Stephanie Brown, and Sara Kiesler. 2013. Why Do People Seek Anonymity on the Internet?: Informing Policy and Design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 2657--2666. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Ruogu Kang, Laura Dabbish, and Katherine Sutton. 2016. Strangers on Your Phone: Why People Use Anonymous Communication Applications. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 359--370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Peter G. Kilner and Christopher M. Hoadley. 2005. Anonymity Options and Professional Participation in an Online Community of Practice. In Proceedings of th 2005 Conference on Computer Support for Collaborative Learning: Learning 2005: The Next 10 Years! (CSCL '05), 272--280. Retrieved March 29, 2017 from http://dl.acm.org/citation.cfm?id=1149293.1149328 Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Per E. Kummervold, Deede Gammon, Svein Bergvik, Jan-Are K. Johnsen, Toralf Hasvold, and Jan H. Rosenvinge. 2002. Social support in a wired world: use of online mental health forums in Norway. Nord. J. Psychiatry 56, 1 (2002), 59--65.Google ScholarGoogle ScholarCross RefCross Ref
  34. J. Richard Landis and Gary G. Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (1977), 159--174.Google ScholarGoogle ScholarCross RefCross Ref
  35. Noam Lapidot-Lefler and Azy Barak. 2012. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Comput. Hum. Behav. 28, 2 (March 2012), 434--443. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Martin Lea, Russell Spears, and Daphne de Groot. 2001. Knowing Me, Knowing You: Anonymity Effects on Social Identity Processes within Groups. Pers. Soc. Psychol. Bull. 27, 5 (May 2001), 526--537.Google ScholarGoogle ScholarCross RefCross Ref
  37. Alex Leavitt. 2015. "This is a Throwaway Account": Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 317--327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Bingdong Li, Esra Erdin, Mehmet Hadi Gunes, George Bebis, and Todd Shipley. 2013. An overview of anonymity technology usage. Comput. Commun. 36, 12 (July 2013), 1269--1283. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Xiao Ma, Jeff Hancock, and Mor Naaman. 2016. Anonymity, Intimacy and Self-Disclosure in Social Media. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3857--3869. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Gary T. Marx. 1999. What's in a Name? Some Reflections on the Sociology of Anonymity. Inf. Soc. 15, 2 (May 1999), 99--112.Google ScholarGoogle ScholarCross RefCross Ref
  41. Christiane Moser, Michaela Peterhansl, Thomas Kargl, and Manfred Tscheligi. 2015. The Potentials of Gamification to Motivate Older Adults to Participate in a P2P Support Exchange Platform. In Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (CHI PLAY '15), 655--660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Michael Muller. 2014. Curiosity, Creativity, and Surprise as Analytic Tools: Grounded Theory Method. In Ways of Knowing in HCI, Judith S. Olson and Wendy A. Kellogg (eds.). Springer New York, 25--48.Google ScholarGoogle Scholar
  43. Mark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, and Margaret E. Morris. 2011. It's Not That I Don'T Have Problems, I'M Just Not Putting Them on Facebook: Challenges and Opportunities in Using Online Social Networks for Health. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (CSCW '11), 341--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Helen Nissenbaum. 1999. The Meaning of Anonymity in an Information Age. Inf. Soc. 15, 2 (May 1999), 141--144.Google ScholarGoogle ScholarCross RefCross Ref
  45. Stina Nylander. 2012. Changing My Life One Step at a Time: Using the Twelve Step Program As Design Inspiration for Long Term Lifestyle Change. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (NordiCHI '12), 711--720. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. E. Omernick and S. O. Sood. 2013. The Impact of Anonymity in Online Communities. In 2013 International Conference on Social Computing, 526--535. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Akiko Orita and Hisakazu Hada. 2009. Is That Really You?: An Approach to Assure Identity Without Revealing Real-name Online. In Proceedings of the 5th ACM Workshop on Digital Identity Management (DIM '09), 17--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Carina Paine, Adam N. Joinson, Tom Buchanan, and Ulf-Dietrich Reips. 2006. Privacy and Self-disclosure Online. In CHI '06 Extended Abstracts on Human Factors in Computing Systems (CHI EA '06), 1187--1192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Malte Paskuda and Myriam Lewkowicz. 2015. Anonymous Quorans Are Still Quorans, Just Anonymous. In Proceedings of the 7th International Conference on Communities and Technologies (C&T '15), 9--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Umashanthi Pavalanathan and Munmun De Choudhury. 2015. Identity Management and Mental Health Discourse in Social Media. In Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion), 315--321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Sandra Petronio. 2015. Communication Privacy Management Theory. In The International Encyclopedia of Interpersonal Communication. John Wiley & Sons, Inc.Google ScholarGoogle Scholar
  52. Jared Piazza and Jesse M. Bering. 2008. The Effects of Perceived Anonymity on Altruistic Punishment. Evol. Psychol. 6, 3 (July 2008), 147470490800600320.Google ScholarGoogle Scholar
  53. John Powell, Nadia Inglis, Jennifer Ronnie, and Shirley Large. 2011. The Characteristics and Motivations of Online Health Information Seekers: Cross-Sectional Survey and Qualitative Interview Study. J. Med. Internet Res. 13, 1 (2011), e20.Google ScholarGoogle ScholarCross RefCross Ref
  54. Hua Qian and Craig R. Scott. 2007. Anonymity and Self-Disclosure on Weblogs. J. Comput.-Mediat. Commun. 12, 4 (July 2007), 1428--1451.Google ScholarGoogle ScholarCross RefCross Ref
  55. S. D. Reicher, R. Spears, and T. Postmes. 1995. A Social Identity Model of Deindividuation Phenomena. Eur. Rev. Soc. Psychol. 6, 1 (January 1995), 161--198.Google ScholarGoogle ScholarCross RefCross Ref
  56. Stephen P. Robbins and Timothy A. Judge. 2010. Organizational Behavior. Prentice Hall.Google ScholarGoogle Scholar
  57. Sabirat Rubya and Svetlana Yarosh. 2017. Video-Mediated Peer Support in an Online Community for Recovery from Substance Use Disorders. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 1454--1469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Ari Schlesinger, Eshwar Chandrasekharan, Christina A. Masden, Amy S. Bruckman, W. Keith Edwards, and Rebecca E. Grinter. 2017. Situated Anonymity: Impacts of Anonymity, Ephemerality, and Hyper-Locality on Social Media. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 6912--6924. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. William C. Schmidt. 1997. World-Wide Web survey research: Benefits, potential problems, and solutions. Behav. Res. Methods Instrum. Comput. 29, 2 (June 1997), 274--279.Google ScholarGoogle ScholarCross RefCross Ref
  60. Sarita Yardi Schoenebeck. 2013. The Secret Life of Online Moms: Anonymity and Disinhibition on YouBeMom. com. In Proceedings of the International AAAI Conference on Weblogs and Social Media. Retrieved March 30, 2017 from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.592.7868&rep=rep1&type=pdfGoogle ScholarGoogle Scholar
  61. John Suler. 2004. The online disinhibition effect. Cyberpsychology Behav. Impact Internet Multimed. Virtual Real. Behav. Soc. 7, 3 (June 2004), 321--326.Google ScholarGoogle ScholarCross RefCross Ref
  62. Max Van Kleek, Daniel Smith, Nigel R. Shadbolt, Dave Murray-Rust, and Amy Guy. 2015. Self Curation, Social Partitioning, Escaping from Prejudice and Harassment: The Many Dimensions of Lying Online. In Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion), 371--372. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Alex B. Van Zant and Laura J. Kray. 2014. "I can't lie to your face": Minimal face-to-face interaction promotes honesty. J. Exp. Soc. Psychol. 55, (November 2014), 234--238.Google ScholarGoogle ScholarCross RefCross Ref
  64. Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2014. Whispers in the Dark: Analysis of an Anonymous Social Network. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14), 137--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Kevin Wright. 2000. Perceptions of on-line support providers: An examination of perceived homophily, source credibility, communication and social support within on-line support groups. Commun. Q. 48, 1 (January 2000), 44--59.Google ScholarGoogle ScholarCross RefCross Ref
  66. Kevin B. Wright, Sally B. Bell, Kevin B. Wright, and Sally B. Bell. 2003. Health-related Support Groups on the Internet: Linking Empirical Findings to Social Support and Computer-mediated Communication Theory. J. Health Psychol. 8, 1 (January 2003), 39--54.Google ScholarGoogle ScholarCross RefCross Ref
  67. Svetlana Yarosh. 2013. Shifting Dynamics or Breaking Sacred Traditions?: The Role of Technology in Twelve-step Fellowships. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3413--3422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Haejin Yun. 2006. The creation and validation of a perceived anonymity scale based on the social information processing model and its nomological network test in an online social support community.Google ScholarGoogle Scholar
  69. Philip G. Zimbardo. 1969. The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. Nebr. Symp. Motiv. 17, (1969), 237--307.Google ScholarGoogle Scholar
  70. Gregory D. Zimet, Nancy W. Dahlem, Sara G. Zimet, and Gordon K. Farley. 1988. The Multidimensional Scale of Perceived Social Support. J. Pers. Assess. 52, 1 (March 1988), 30--41.Google ScholarGoogle ScholarCross RefCross Ref
  71. Adam G. Zimmerman and Gabriel J. Ybarra. 2016. Online aggression: The influences of anonymity and social modeling. Psychol. Pop. Media Cult. 5, 2 (April 2016), 181.Google ScholarGoogle Scholar
  72. 2017. Wikipedia:Awards. Wikipedia. Retrieved April 23, 2017 from https://en.wikipedia.org/w/index.php?title=Wikipedia:Awards&oldid=762810081Google ScholarGoogle Scholar
  73. Alcoholics Anonymous: Twelve Steps and Twelve Traditions. Retrieved July 7, 2017 from http://www.aa.org/pages/en_US/twelve-steps-and-twelve-traditionsGoogle ScholarGoogle Scholar
  74. Understanding Anonymity. Retrieved from http://www.aa.org/assets/en_US/p-47_understandinganonymity.pdfGoogle ScholarGoogle Scholar
  75. AA MEETING STRUCTURE. Retrieved April 21, 2017 from http://www.darvsmith.com/dox/aa.htmlGoogle ScholarGoogle Scholar
  76. Microsoft Cognitive Services - Face API. Retrieved April 27, 2017 from https://www.microsoft.com/cognitive-services/en-us/face-apiGoogle ScholarGoogle Scholar

Index Terms

  1. Interpretations of Online Anonymity in Alcoholics Anonymous and Narcotics Anonymous

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Human-Computer Interaction
          Proceedings of the ACM on Human-Computer Interaction  Volume 1, Issue CSCW
          November 2017
          2095 pages
          EISSN:2573-0142
          DOI:10.1145/3171581
          Issue’s Table of Contents

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 December 2017
          Published in pacmhci Volume 1, Issue CSCW

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader