Emily Van Der Nagel Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Emily Van Der Nagel Thesis Social Media Pseudonymity: Affordances, Practices, Disruptions Emily van der Nagel Submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy 2017 Department of Media and Communication School of Arts, Social Sciences and Humanities Faculty of Health, Arts and Design Swinburne University of Technology Abstract Discussions around anonymity in social media tend to centre on themes of freedom versus harm, as anonymous people can communicate with few consequences, but anonymity can also be an element in harassment and abuse. Anonymity is rarely found within social media platforms that require personal information like email addresses and usernames. This thesis argues that anonymity on social media needs to be reframed as pseudonymity, which is identity work – or the strategic presentation of the self – and involves relationships between affordances, practices, and disruptions. The term ‘pseudonym’, meaning ‘false name’, dates back to the era of the printing press, as pseudonymity became a way for authors to make decisions about how their texts would be known. On iterations of social media, from bulletin boards to chat rooms to Facebook, pseudonyms are an important part of identity work, which is the process of creating and contextualising a self through actions and representations. Although the early 2010s saw a rise in what Bernie Hogan calls the ‘real-name web’, as a number of platforms demanded that people use their real names, pseudonymity remains a key practice within social media. After exploring these historical and contemporary forms of social media pseudonymity, this thesis presents three case studies, each drawing on a different approach to studying social media. I investigate the nymwars, the backlash to Google+’s strict real-name policy, using an affordance approach that interrogates the potential actions that various platforms offer. While platforms value names in particular ways, moving to a practice approach highlights how people negotiate platform features and rules in order to present the identity information they choose. Analysis of pseudonym practices on Reddit Gonewild reveals that people enact playful, sexualised pseudonymous identities on this subreddit. But pseudonym practices can also be disrupted, as the third case study on doxing demonstrates: there is harm in other people discovering and publicising someone’s personal information. Social media pseudonymity involves contending with networks of people and platforms when engaging in identity work that gives control over, and context to, connections and communication. ii Acknowledgements Every conversation I’ve had about my thesis over the past five years has helped build it, but there are some people in my life who deserve special thanks. My supervisors, Esther Milne, Anthony McCosker, and Rowan Wilken, have helped me grow as a scholar and a person. Esther has taught and mentored me throughout my decade at Swinburne, and she has not only brought her outstanding knowledge and sharp intellect, but also her emotional understanding, to her supervision. She always knows what I need to hear. Anthony has been dedicated to this project from the very beginning, helping to steer it in the right direction and pushing me to match his high expectations of me. He asks me hard questions and brings his own insight to the research process and it’s a better, stronger thesis because he’s been involved. Rowan’s thoughtful advice and meticulous reading of the thesis has sharpened my analysis and writing. They have guided me through the PhD as a team, and it’s because of them I’ve written a thesis of which I’m proud. My parents, Leanne and Andrew, and my sisters, Nicole and Joanna, have given me a lifetime of love, as well as mornings with coffee, afternoons with tea, and evenings with wine that have sustained me throughout the PhD. I’m especially grateful to Jenny Kennedy and James Meese, wonderful friends and collaborators who lift me up; Tama Leaver, whose unwavering belief in me kept me going when it all seemed too hard; and Robbie Fordyce, a source of patience and coffee who always makes time to listen. Alongside my supervisors, I’ve received excellent mentorship and guidance from Jean Burgess, Gerard Goggin, Jonathon Hutchinson, Ben Light, Geert Lovink, Ellie Rennie, Nic Suzor, and Julian Thomas. Thank you for taking the time to learn about my research and give me valuable advice and support. I’ve gotten to know academics near and far whose kindness and tenacity have reminded me why I took on the challenge: Ben Abraham, Tom Apperley, Diana Bossio, Angela Daly, Raya Darcy, Hugh Davis, Scott Ewing, Jordan Frith, Dan Golding, Luke Heemsburgen, Tim Highfield, Brendan Keogh, Ramon Lobato, Bjorn Nansen, Brady Robards, and Son Vivienne. You’ve supported me personally and professionally, and I’m so glad you’ve been part of the PhD. iii Thank you, too, to the members of the conferences, symposia, summer and winter schools, colloquia, committees, organisations, reading groups, writing groups, programs, seminars, masterclasses, workshops, Twitter and Facebook conversations, and social groups, who made the PhD experience worthwhile. Some of the preliminary work for this thesis has been published as: Jenny Kennedy, James Meese & Emily van der Nagel 2016, ‘Regulation and social practice’, Continuum: Journal of Media and Cultural Studies, vol. 30, no. 2. Emily van der Nagel & Jordan Frith 2015, ‘Anonymity, pseudonymity, and the agency of online identity: examining the social practices of r/Gonewild’, First Monday, vol. 20, no. 3, <http://firstmonday.org/ojs/index.php/fm/article/view/5615/4346>. Emily van der Nagel 2013, ‘Faceless bodies: negotiating technological and cultural codes on Reddit Gonewild’, Scan: Journal of Media Arts Culture, vol. 10, no. 2, <http://scan.net.au/scn/journal/vol10number2/Emily-van-der-Nagel.html>. Professional accredited editor Mary-Jo O’Rourke AE provided copyediting and proofreading services according to the university-endorsed national ‘Guidelines for editing research theses’. iv Declaration The examinable outcome: 1. contains no material which has been accepted for the award to the candidate of any other degree or diploma, except where due reference is made in the text of the examinable outcome; 2. to the best of the candidate’s knowledge contains no material previously published or written by another person except where due reference is made in the text of the examinable outcome; and 3. where the work is based on joint research or publications, discloses the relative contributions of the respective workers or authors. Signed: Emily van der Nagel Date: 22 May 2017 v Table of Contents Abstract ................................................................................................................... ii Acknowledgements ................................................................................................ iii Declaration ............................................................................................................... v List of Figures ......................................................................................................... ix INTRODUCTION ........................................................................................................ 1 Pseudonymity: Getting beyond anonymity versus real names ............................... 8 Thesis proposition and research questions ........................................................... 10 Context of the research .......................................................................................... 11 Names: Signifying connections; asserting control ................................................. 12 Social media: Connecting people; creating data .................................................... 15 In between real names and no names: Different types of pseudonymity ............. 18 Methods .................................................................................................................. 20 Data collection .................................................................................................... 21 Method: Content analysis .................................................................................. 23 Ethics .................................................................................................................. 24 Thesis outline ......................................................................................................... 26 PART 1 Historical and contemporary forms of pseudonymity ............................................... 30 CHAPTER 1 Pseudonymity history: Authorship, the author-function, and what authors mean for digital texts ................................................................................................ 31 Introduction ........................................................................................................... 31 The printing press: Where the author began ........................................................ 33 Authorship and pseudonymity .............................................................................. 35 The author-function ............................................................................................... 38 Pseudonymity and digital texts ............................................................................. 40 Authorship on social media ................................................................................... 43 Conclusion .............................................................................................................
Recommended publications
  • Identity Theft Literature Review
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
    [Show full text]
  • Taking Intellectual Property Into Their Own Hands
    Taking Intellectual Property into Their Own Hands Amy Adler* & Jeanne C. Fromer** When we think about people seeking relief for infringement of their intellectual property rights under copyright and trademark laws, we typically assume they will operate within an overtly legal scheme. By contrast, creators of works that lie outside the subject matter, or at least outside the heartland, of intellectual property law often remedy copying of their works by asserting extralegal norms within their own tight-knit communities. In recent years, however, there has been a growing third category of relief-seekers: those taking intellectual property into their own hands, seeking relief outside the legal system for copying of works that fall well within the heartland of copyright or trademark laws, such as visual art, music, and fashion. They exercise intellectual property self-help in a constellation of ways. Most frequently, they use shaming, principally through social media or a similar platform, to call out perceived misappropriations. Other times, they reappropriate perceived misappropriations, therein generating new creative works. This Article identifies, illustrates, and analyzes this phenomenon using a diverse array of recent examples. Aggrieved creators can use self-help of the sorts we describe to accomplish much of what they hope to derive from successful infringement litigation: collect monetary damages, stop the appropriation, insist on attribution of their work, and correct potential misattributions of a misappropriation. We evaluate the benefits and demerits of intellectual property self-help as compared with more traditional intellectual property enforcement. DOI: https://doi.org/10.15779/Z38KP7TR8W Copyright © 2019 California Law Review, Inc. California Law Review, Inc.
    [Show full text]
  • Systematic Review of Academic Bullying in Medical Settings: Dynamics and Consequences
    Open access Original research BMJ Open: first published as 10.1136/bmjopen-2020-043256 on 12 July 2021. Downloaded from Systematic review of academic bullying in medical settings: dynamics and consequences Tauben Averbuch ,1 Yousif Eliya,2 Harriette Gillian Christine Van Spall1,2,3 To cite: Averbuch T, Eliya Y, ABSTRACT Strengths and limitations of this study Van Spall HGC. Systematic Purpose To characterise the dynamics and consequences review of academic bullying of bullying in academic medical settings, report factors in medical settings: dynamics ► This systematic review is comprehensive, including that promote academic bullying and describe potential and consequences. BMJ Open 68 studies with 82 349 consultants and trainees, 2021;11:e043256. doi:10.1136/ interventions. across several countries and including all levels of bmjopen-2020-043256 Design Systematic review. training. We searched EMBASE and PsycINFO for Data sources ► We defined inclusion criteria a priori and used es- ► Prepublication history and articles published between 1 January 1999 and 7 February additional supplemental material tablished tools to assess the risk of bias of included for this paper are available 2021. studies. online. To view these files, Study selection We included studies conducted in ► The included studies varied in their definitions of please visit the journal online academic medical settings in which victims were bullying, sampling bias was noted among the sur- (http:// dx. doi. org/ 10. 1136/ consultants or trainees. Studies had to describe bullying veys and intervention studies were suboptimally bmjopen- 2020- 043256). behaviours; the perpetrators or victims; barriers or designed. facilitators; impact or interventions. Data were assessed Received 29 July 2020 independently by two reviewers.
    [Show full text]
  • Bullying and Suicide Prevention for LGBTQ Youth
    VISTAS Online VISTAS Online is an innovative publication produced for the American Counseling Association by Dr. Garry R. Walz and Dr. Jeanne C. Bleuer of Counseling Outfitters, LLC. Its purpose is to provide a means of capturing the ideas, information and experiences generated by the annual ACA Conference and selected ACA Division Conferences. Papers on a program or practice that has been validated through research or experience may also be submitted. This digital collection of peer-reviewed articles is authored by counselors, for counselors. VISTAS Online contains the full text of over 500 proprietary counseling articles published from 2004 to present. VISTAS articles and ACA Digests are located in the ACA Online Library. To access the ACA Online Library, go to http://www.counseling.org/ and scroll down to the LIBRARY tab on the left of the homepage. n Under the Start Your Search Now box, you may search by author, title and key words. n The ACA Online Library is a member’s only benefit. You can join today via the web: counseling.org and via the phone: 800-347-6647 x222. Vistas™ is commissioned by and is property of the American Counseling Association, 5999 Stevenson Avenue, Alexandria, VA 22304. No part of Vistas™ may be reproduced without express permission of the American Counseling Association. All rights reserved. Join ACA at: http://www.counseling.org/ Suggested APA style reference: Moe, J. L., Leggett, E. S., & Perera-Diltz, D. (2011). School counseling for systemic change: Bullying and suicide prevention for LGBTQ youth. Retrieved from http://counselingoutfitters.com/ vistas/vistas11/Article_81.pdf Article 81 School Counseling for Systemic Change: Bullying and Suicide Prevention for LGBTQ Youth Jeffry L.
    [Show full text]
  • Dod Enterpriseidentity, Credential, and Access Management (ICAM)
    UNCLASSIFIED DoD Enterprise Identity, Credential, and Access Management (ICAM) Reference Design Version 1.0 June 2020 Prepared by Department of Defense, Office of the Chief Information Officer (DoD CIO) DISTRIBUTION STATEMENT C. Distribution authorized to U.S. Government agencies and their contractors (Administrative or Operational Use). Other requests for this document shall be referred to the DCIO-CS. UNCLASSIFIED UNCLASSIFIED Document Approvals Prepared By: N. Thomas Lam IE/Architecture and Engineering Department of Defense, Office of the Chief Information Officer (DoD CIO) Thomas J Clancy, COL US Army CS/Architecture and Capability Oversight, DoD ICAM Lead Department of Defense, Office of the Chief Information Officer (DoD CIO) Approved By: Peter T. Ranks Deputy Chief Information Officer for Information Enterprise (DCIO IE) Department of Defense, Office of the Chief Information Officer (DoD CIO) John (Jack) W. Wilmer III Deputy Chief Information Officer for Cyber Security (DCIO CS) Department of Defense, Office of the Chief Information Officer (DoD CIO) ii UNCLASSIFIED UNCLASSIFIED Version History Version Date Approved By Summary of Changes 1.0 TBD TBD Renames and replaces the IdAM Portfolio Description dated August 2015 and the IdAM Reference Architecture dated April 2014. (Existing IdAM SDs and TADs will remain valid until updated versions are established.) Updates name from Identity and Access Management (IdAM) to Identity, Credential, and Access Management (ICAM) to align with Federal government terminology Removes and cancels
    [Show full text]
  • 1 Introduction
    1 Introduction I. THE PROBLEM OF ANONYMITY NONYMOUS WRITING IS both an old and a new phenomenon. Before the Renaissance most writing was anonymous; many of the Aearly poems in anthologies are ascribed to ‘ Anon ’ . The medieval auctor (the term from which the word ‘ author ’ derives) was generally little more than a scribe, transcribing earlier texts. The name of the writer was irrelevant to the readers of a text, so it was immaterial that generally he was anonymous. 1 The identifi cation or naming of authors has been associated with the development of printing, and then subsequently with the role of copyright in ascribing property rights to them and the birth of the Romantic Author as a heroic fi gure at the end of the eighteenth century. 2 But even then a high proportion of novels were anonymous; between 1770 and 1800 over 70 per cent of novels were published without a named author, and during the 1820s the proportion rose to nearly 80 per cent. 3 There has certainly been a marked decline in anonymous writing in the late nineteenth and twentieth centuries, though some notable writers in this period have always, or sometimes, used pseudonyms (see section IV of this chapter and chapter 2 , section II), among them George Orwell (the pseudonym of Eric Blair), Sylvia Plath and Doris Lessing. The Internet is responsible for the revival of anonymous writing and indeed for many of the problems now associated with it. Many blogs are written under a pseudonym, though often the identity of the author is well known, as with Paul Staines, the author of the Guido Fawkes political blog.
    [Show full text]
  • Lapp 1 the Victorian Pseudonym and Female Agency Research Thesis
    Lapp 1 The Victorian Pseudonym and Female Agency Research Thesis Presented in partial fulfillment of the requirements for graduation with research distinction in English in the undergraduate colleges of The Ohio State University by Anna Lapp The Ohio State University April 2015 Project Advisor: Professor Robyn Warhol, Department of English Lapp 2 Chapter One: The History of the Pseudonym Anonymity disguises information. For authors, disguised or changed names shrouds their circumstance and background. Pseudonyms, or pen names, have been famously used to disguise one’s identity. The word’s origin—pseudṓnymon—means “false name”. The nom de plume allows authors to conduct themselves without judgment attached to their name. Due to an author’s sex, personal livelihood, privacy, or a combination of the three, the pen name achieves agency through its protection. To consider the overall protection of the pseudonym, I will break down the components of a novel’s voice. A text is written by a flesh-and-blood, or actual, author. Second, an implied author or omnipresent figure of agency is present throughout the text. Finally, the narrator relates the story to the readers. The pseudonym offers freedom for the actual author because the author becomes two-fold—the pseudonym and the real person, the implied author and the actual author. The pseudonym can take the place of the implied author by acting as the dominant force of the text without revealing the personal information of the flesh-and-blood author. Carmela Ciuraru, author of Nom de Plume: A (Secret) History of Pseudonyms, claims, “If the authorial persona is a construct, never wholly authentic (now matter how autobiographical the material), then the pseudonymous writer takes this notion to yet another level, inventing a construct of a construct” (xiii-xiv).
    [Show full text]
  • The Legal 'Face' of Mobbing
    SEE - A Fortnight in Review February 13th legal | by Milica Janković Milica Janković specialises in targeting the victim’s congenital or ac- Labour Law at Belgrade's JPM - quired traits which are irrelevant to the Janković, Popović & Mitić Law Firm (www.jpm.rs). She may be reached performance of a specific job, since that The Typology at [email protected]. would constitute discrimination. Serbian jurisprudence, because of the insufficient level of professional expertise and difficulties in obtaining proof, is still With some variations, the following typology of behaviours has been adopted by several steps behind in this field, both as a number of academic researchers. The typology uses five different categories: The Legal ‘Face’ 4 Discrediting the victim’s profession- compared to western European methods al and work capacity: Giving the victim in determining the existence of stress and > Threat to professional status – including belittling opinions, public pro- tasks that are far below or above his/her mobbing in the workplace and in terms fessional humiliation, accusations regarding lack of effort, intimidating use of of Mobbing capabilities, or not permitting the victim of the damages awarded to the claimant. discipline or competence procedures to do anything, criticising his/her slight- The Anti-Mobbing Law is quite “fresh” > Threat to personal standing – including undermining personal integrity, est mistakes and omissions, ridiculing (enacted in 2010), so the court practice destructive innuendo and sarcasm, making inappropriate
    [Show full text]
  • Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization Ashley Bettencourt
    Bridgewater State University Virtual Commons - Bridgewater State University Master’s Theses and Projects College of Graduate Studies 12-2014 Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, And Social Networking Sites Influence Crime Victimization Ashley Bettencourt Follow this and additional works at: http://vc.bridgew.edu/theses Part of the Criminology and Criminal Justice Commons Recommended Citation Bettencourt, Ashley. (2014). Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, And Social Networking Sites Influence Crime Victimization. In BSU Master’s Theses and Projects. Item 10. Available at http://vc.bridgew.edu/theses/10 Copyright © 2014 Ashley Bettencourt This item is available as part of Virtual Commons, the open-access institutional repository of Bridgewater State University, Bridgewater, Massachusetts. Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization By: Ashley Bettencourt Thesis Submitted in fulfillment of the requirements for the degree of Master of Science in Criminal Justice in the Graduate College of Bridgewater State University, 2014 Bridgewater, Massachusetts Thesis Chair: Dr. Kyung-Shick Choi 2 Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization Thesis By Ashley Bettencourt Approved as to style and content by: ______________________________ Kyung-shick
    [Show full text]
  • Bullying and Suicide, the 2X Development of Bullying Prevention More Likely to Attempt Suicide and Intervention Programs Is Vital (Hinduja & Patchin, 2010)
    FACT SHEET 3 BULLYING What is it? Bullying Bullying is related to negative psychological, emotional and and suicide behavioural outcomes. These outcomes can eventually make youth feel as though they can no longer cope (Wade & Beran, 2011). Bullying is linked to several precursors to thoughts of suicide (Hinduja & Patchin, 2010): • depression and hopelessness; • low self-esteem; • loneliness and isolation; • anger and frustration; Bullying is a conscious, willful, deliberate, • humiliation; repeated and hostile activity marked by • embarrassment; or • trauma. an imbalance of power, intent to harm and/or threat of aggression.” % (Alberta Human Services, 2015) 85 of bullying takes place in front of Types of bullying other people (Craig & Pepler, 1997). VERBAL BULLYING CYBERBULLYING When bullying is accompanied • sarcasm; • Using electronic communication by other risk factors, it often causes • threats; (e.g., internet, social media suicidal ideation (Hinduja & Patchin, • negative, insulting, or text messaging) to: 2010; Olson, 2012; Holt et al., 2015). Risk or humiliating comments; or » intimidate; factors for suicidal ideation include: • unwanted sexual comments. » put-down; • bullying; » spread rumours; • sexual abuse; SOCIAL BULLYING » make fun of someone; or • physical abuse; • spreading rumours or damaging » disseminate private or • drug abuse; or someone’s reputation; embarrassing information • depression. • excluding others from a group; or images of a person without • humiliating others with Both bullying victims and those their permission (Alberta public gestures or graffiti; or who perpetuate bullying are at a higher Human Services, 2015). • damaging someone’s friendships. risk for suicide. Kids who are involved as both victims and perpetrators of PHYSICAL BULLYING Cyber bullying victims are bullying are at the highest risk for • intentional physical aggression suicide (Holt et al, 2015, Suicide towards another person; Prevention Resource Center, n.d).
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]