skip to main content
research-article
Public Access

Effects of Anonymity, Ephemerality, and System Routing on Cost in Social Question Asking

Authors Info & Claims
Published:05 December 2019Publication History
Skip Abstract Section

Abstract

Online platforms provide new channels for people in need to seek help from friends and strangers. However, individuals often encounter psychological barriers that deter them from asking for help. For example, people might have different concerns about asking for help, including acknowledging incompetence, bothering others, and accruing social debt. These perceived social costs limit the potential benefits of help solicitations. In this study, we attempt to investigate whether anonymity (posting a question anonymously), ephemerality (allowing questions to be visible for only a short period), and system routing (having the system handle the question routing) could reduce social costs in a typical online help-seeking behavior-question asking. We built a platform to support these three features and conducted a controlled within-subjects experiment to test their effects on the social costs of posting questions. Results suggest that the presence of anonymity, ephemerality, and system routing reduce social costs. Further, we find that employing anonymity and system routing features did not lower the quality and quantity of answers to the questions in our system.

References

  1. Elena Agapie, Lucas Colusso, Sean A Munson, and Gary Hsieh. 2016. Plansourcing: Generating behavior change plans with friends and crowds. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 119--133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Paul D Allison. 2009. Fixed effects regression models . Vol. 160. SAGE publications.Google ScholarGoogle Scholar
  3. Nazanin Andalibi, Oliver L Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3906--3918.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Stella E Anderson and Larry J Williams. 1996. Interpersonal, job, and individual factors related to helping processes at work. Journal of Applied Psychology , Vol. 81, 3 (1996), 282.Google ScholarGoogle ScholarCross RefCross Ref
  5. Paul André, Michael Bernstein, and Kurt Luther. 2012. Who gives a tweet?: evaluating microblog content value. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, 471--474.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. James Andreoni and B Douglas Bernheim. 2009. Social image and the 50--50 norm: A theoretical and experimental analysis of audience effects. Econometrica , Vol. 77, 5 (2009), 1607--1636.Google ScholarGoogle ScholarCross RefCross Ref
  7. Earl R Babbie. 2015. The practice of social research .Nelson Education.Google ScholarGoogle Scholar
  8. Fabiola Baltar and Ignasi Brunet. 2012. Social research 2.0: virtual snowball sampling method using Facebook. Internet research , Vol. 22, 1 (2012), 57--74.Google ScholarGoogle Scholar
  9. Christopher P Barlett, Douglas A Gentile, and Chelsea Chew. 2016. Predicting cyberbullying from anonymity. Psychology of Popular Media Culture , Vol. 5, 2 (2016), 171.Google ScholarGoogle ScholarCross RefCross Ref
  10. Joseph B Bayer, Nicole B Ellison, Sarita Y Schoenebeck, and Emily B Falk. 2016. Sharing the small moments: ephemeral social interaction on Snapchat. Information, Communication & Society , Vol. 19, 7 (2016), 956--977.Google ScholarGoogle ScholarCross RefCross Ref
  11. Roland Bénabou and Jean Tirole. 2006. Incentives and prosocial behavior. American economic review , Vol. 96, 5 (2006), 1652--1678.Google ScholarGoogle Scholar
  12. Jonah Berger. 2013. Beyond viral: Interpersonal communication in the internet age. Psychological Inquiry , Vol. 24, 4 (2013), 293--296.Google ScholarGoogle ScholarCross RefCross Ref
  13. Michael S Bernstein, Andrés Monroy-Hernández, Drew Harry, Paul André, Katrina Panovich, and Gregory G Vargas. 2011. 4chan and/b: An Analysis of Anonymity and Ephemerality in a Large Online Community.. In ICWSM. 50--57.Google ScholarGoogle Scholar
  14. Vanessa K Bohns and Francis J Flynn. 2010. "Why didn't you just ask?" Underestimating the discomfort of help-seeking. Journal of Experimental Social Psychology , Vol. 46, 2 (2010), 402--409.Google ScholarGoogle ScholarCross RefCross Ref
  15. Erin L Brady, Yu Zhong, Meredith Ringel Morris, and Jeffrey P Bigham. 2013. Investigating the appropriateness of social network question asking as a resource for blind users. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 1225--1236.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Leonardo Bursztyn and Robert Jensen. 2017. Social image and economic behavior in the field: Identifying, understanding, and shaping social pressure. Annual Review of Economics , Vol. 9 (2017), 131--153.Google ScholarGoogle ScholarCross RefCross Ref
  17. Sandro Casal and Luigi Mittone. 2016. Social esteem versus social stigma: The role of anonymity in an income reporting game. Journal of Economic Behavior & Organization , Vol. 124 (2016), 55--66.Google ScholarGoogle ScholarCross RefCross Ref
  18. Richard Chalfen. 2009. `It's only a picture': Sexting,`smutty' snapshots and felony charges. Visual Studies , Vol. 24, 3 (2009), 258--268.Google ScholarGoogle ScholarCross RefCross Ref
  19. Boreum Choi, Kira Alexander, Robert E Kraut, and John M Levine. 2010. Socialization tactics in wikipedia and their effects. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. ACM, 107--116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jacob Cohen. 2013. Statistical power analysis for the behavioral sciences .Routledge.Google ScholarGoogle Scholar
  21. Nicola Cornally and Geraldine McCarthy. 2011. Help-seeking behaviour: A concept analysis. International journal of nursing practice , Vol. 17, 3 (2011), 280--288.Google ScholarGoogle Scholar
  22. Bella M DePaulo. 1978. Accepting help from teachers-when the teachers are children. Human Relations , Vol. 31, 5 (1978), 459--474.Google ScholarGoogle ScholarCross RefCross Ref
  23. Bella M DePaulo, Gregory L Brittingham, and Mary K Kaiser. 1983. Receiving competence-relevant help: Effects on reciprocity, affect, and sensitivity to the helper's nonverbally expressed needs. Journal of Personality and Social Psychology , Vol. 45, 5 (1983), 1045.Google ScholarGoogle ScholarCross RefCross Ref
  24. Bella M DePaulo and Jeffrey D Fisher. 1980. The costs of asking for help. Basic and Applied Social Psychology , Vol. 1, 1 (1980), 23--35.Google ScholarGoogle ScholarCross RefCross Ref
  25. Michael A DeVito. 2017. From editors to algorithms: A values-based approach to understanding story selection in the Facebook news feed. Digital Journalism , Vol. 5, 6 (2017), 753--773.Google ScholarGoogle ScholarCross RefCross Ref
  26. Nicholas Diakopoulos. 2015. Algorithmic accountability: Journalistic investigation of computational power structures. Digital journalism , Vol. 3, 3 (2015), 398--415.Google ScholarGoogle Scholar
  27. Nicholas Diakopoulos and Mor Naaman. 2011. Towards quality discourse in online news comments. In Proceedings of the ACM 2011 conference on Computer supported cooperative work. ACM, 133--142.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Peter R Druian and Bella M DePaulo. 1977. Asking a child for help. Social Behavior and Personality: an international journal , Vol. 5, 1 (1977), 33--39.Google ScholarGoogle Scholar
  29. Catherine Dwyer, Starr Hiltz, and Katia Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings (2007), 339.Google ScholarGoogle Scholar
  30. Motahhare Eslami, Aimee Rickman, Kristen Vaccaro, Amirhossein Aleyasen, Andy Vuong, Karrie Karahalios, Kevin Hamilton, and Christian Sandvig. 2015. I always assumed that I wasn't really that close to [her]: Reasoning about Invisible Algorithms in News Feeds. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. ACM, 153--162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Jeffrey D Fisher, Arie Nadler, and Sheryle Whitcher-Alagna. 1982. Recipient reactions to aid. Psychological Bulletin , Vol. 91, 1 (1982), 27.Google ScholarGoogle ScholarCross RefCross Ref
  32. Andrea Forte, Michael Dickard, Rachel Magee, and Denise E Agosto. 2014. What do teens ask their online social networks?: social search practices among high school students. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 28--37.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Darren Gergle and Desney S Tan. 2014. Experimental research in HCI. In Ways of Knowing in HCI . Springer, 191--227.Google ScholarGoogle Scholar
  34. Lisa M Given. 2008. The Sage encyclopedia of qualitative research methods .Sage publications.Google ScholarGoogle Scholar
  35. Alvin W Gouldner. 1960. The norm of reciprocity: A preliminary statement. American sociological review (1960), 161--178.Google ScholarGoogle Scholar
  36. Rebecca Gray, Nicole B Ellison, Jessica Vitak, and Cliff Lampe. 2013. Who wants to know?: question-asking and answering practices among facebook users. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 1213--1224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Oliver L Haimson and Anna Lauren Hoffmann. 2016. Constructing and enforcing" authentic" identity online: Facebook, real names, and non-normative identities. First Monday , Vol. 21, 6 (2016).Google ScholarGoogle ScholarCross RefCross Ref
  38. F Maxwell Harper, Daphne Raban, Sheizaf Rafaeli, and Joseph A Konstan. 2008. Predictors of answer quality in online Q&A sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 865--874.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Brent Hecht, Jaime Teevan, Meredith Ringel Morris, and Daniel J Liebling. 2012. SearchBuddies: Bringing Search Engines into the Conversation. ICWSM , Vol. 12, 138--145 (2012), 2.Google ScholarGoogle Scholar
  40. Bernie Hogan. 2012. Pseudonyms and the rise of the real-name web. A companion to new media dynamics (2012), 290--308.Google ScholarGoogle Scholar
  41. Damon Horowitz and Sepandar D Kamvar. 2010. The anatomy of a large-scale social search engine. In Proceedings of the 19th international conference on World wide web. ACM, 431--440.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Homa Hosseinmardi, Richard Han, Qin Lv, Shivakant Mishra, and Amir Ghasemianlangroodi. 2014. Analyzing negative user behavior in a semi-anonymous social network. CoRR abs , Vol. 1404 (2014).Google ScholarGoogle Scholar
  43. Joey Chiao-Yin Hsiao, Mei-Hua Pan, Hao-Chuan Wang, and Jane Yung-Jen Hsu. 2015. The Price of the Priceless: Understanding Estimated Costs of Work in Friendsourcing. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 1893--1898.Google ScholarGoogle Scholar
  44. Adam Joinson. 1999. Social desirability, anonymity, and Internet-based questionnaires. Behavior Research Methods, Instruments, & Computers , Vol. 31, 3 (1999), 433--438.Google ScholarGoogle ScholarCross RefCross Ref
  45. Ruogu Kang, Stephanie Brown, and Sara Kiesler. 2013. Why do people seek anonymity on the internet?: informing policy and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2657--2666.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Fiona Lee. 1997. When the going gets tough, do the tough ask for help? Help seeking and power motivation in organizations. Organizational behavior and human decision processes , Vol. 72, 3 (1997), 336--363.Google ScholarGoogle Scholar
  47. Fiona Lee. 2002. The social costs of seeking help. The Journal of Applied Behavioral Science , Vol. 38, 1 (2002), 17--35.Google ScholarGoogle ScholarCross RefCross Ref
  48. Bruno Lepri, Nuria Oliver, Emmanuel Letouzé, Alex Pentland, and Patrick Vinck. 2018. Fair, transparent, and accountable algorithmic decision-making processes. Philosophy & Technology , Vol. 31, 4 (2018), 611--627.Google ScholarGoogle ScholarCross RefCross Ref
  49. Michael Lewis-Beck, Alan E Bryman, and Tim Futing Liao. 2003. The Sage encyclopedia of social science research methods .Sage Publications.Google ScholarGoogle Scholar
  50. Baichuan Li and Irwin King. 2010. Routing questions to appropriate answerers in community question answering services. In Proceedings of the 19th ACM international conference on Information and knowledge management. ACM, 1585--1588.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Jo ao Martins, José Carilho, Oliver Schnell, Carlos Duarte, Francisco M Couto, Lu'is Carricc o, and Tiago Guerreiro. 2014. Friendsourcing the unmet needs of people with dementia. In Proceedings of the 11th Web for All Conference. ACM, 35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. John H McDonald. 2009. Handbook of biological statistics . Vol. 2. Sparky House Publishing Baltimore, MD.Google ScholarGoogle Scholar
  53. Katelyn YA McKenna and John A Bargh. 2000. Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and social psychology review , Vol. 4, 1 (2000), 57--75.Google ScholarGoogle Scholar
  54. Sarah McRoberts, Haiwei Ma, Andrew Hall, and Svetlana Yarosh. 2017. Share first, save later: Performance of self through Snapchat stories. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 6902--6911.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Miriam J Metzger. 2004. Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication , Vol. 9, 4 (2004), JCMC942.Google ScholarGoogle Scholar
  56. Meredith Ringel Morris, Jaime Teevan, and Katrina Panovich. 2010a. A comparison of information seeking using search engines and social networks. In Fourth International AAAI Conference on Weblogs and Social Media .Google ScholarGoogle Scholar
  57. Meredith Ringel Morris, Jaime Teevan, and Katrina Panovich. 2010b. What do people ask their social networks, and why?: a survey study of status message q&a behavior. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 1739--1748.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Sean A Munson, Debra Lauterbach, Mark W Newman, and Paul Resnick. 2010. Happier together: integrating a wellness application into a social network site. In International Conference on Persuasive Technology. Springer, 27--39.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Mark W Newman, Debra Lauterbach, Sean A Munson, Paul Resnick, and Margaret E Morris. 2011. It's not that I don't have problems, I'm just not putting them on Facebook: challenges and opportunities in using online social networks for health. In Proceedings of the ACM 2011 conference on Computer supported cooperative work. ACM, 341--350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Jeffrey Nichols and Jeon-Hyung Kang. 2012. Asking questions of targeted strangers on social networks. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, 999--1002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Blair Nonnecke and Jenny Preece. 2003. Silent participants: Getting to know lurkers better. In From usenet to CoWebs . Springer, 110--132.Google ScholarGoogle Scholar
  62. Blair Nonnecke, Jenny Preece, Dorine Andrews, and Russell Voutour. 2004. Online lurkers tell why. AMCIS 2004 Proceedings (2004), 321.Google ScholarGoogle Scholar
  63. Anne Oeldorf-Hirsch, Brent Hecht, Meredith Ringel Morris, Jaime Teevan, and Darren Gergle. 2014. To search or to ask: the routing of information needs between traditional search engines and social networks. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 16--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Anne Oeldorf-Hirsch and S Shyam Sundar. 2015. Posting, commenting, and tagging: Effects of sharing news stories on Facebook. Computers in Human Behavior , Vol. 44 (2015), 240--249.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Steven Ovadia. 2011. Quora. com: another place for users to ask questions. Behavioral & Social Sciences Librarian , Vol. 30, 3 (2011), 176--180.Google ScholarGoogle ScholarCross RefCross Ref
  66. Katrina Panovich, Rob Miller, and David Karger. 2012. Tie strength in question & answer on social network sites. In Proceedings of the ACM 2012 conference on computer supported cooperative work. ACM, 1057--1066.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Sharoda A Paul, Lichan Hong, and Ed H Chi. 2011. Is Twitter a Good Place for Asking Questions? A Characterization Study.. In ICWSM .Google ScholarGoogle Scholar
  68. Sharoda A Paul, Lichan Hong, and Ed H Chi. 2012. Who is authoritative? understanding reputation mechanisms in quora. arXiv preprint arXiv:1204.3724 (2012).Google ScholarGoogle Scholar
  69. Nicole A Poltash. 2012. Snapchat and sexting: A snapshot of baring your bare essentials. Rich. JL & Tech. , Vol. 19 (2012), 1.Google ScholarGoogle Scholar
  70. Jenny Preece, Blair Nonnecke, and Dorine Andrews. 2004. The top five reasons for lurking: improving community experiences for everyone. Computers in human behavior , Vol. 20, 2 (2004), 201--223.Google ScholarGoogle Scholar
  71. Emilee Rader and Rebecca Gray. 2015. Understanding user beliefs about algorithmic curation in the Facebook news feed. In Proceedings of the 33rd annual ACM conference on human factors in computing systems . ACM, 173--182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Beatrice Rammstedt and Oliver P John. 2007. Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German. Journal of research in Personality , Vol. 41, 1 (2007), 203--212.Google ScholarGoogle ScholarCross RefCross Ref
  73. Sabirat Rubya and Svetlana Yarosh. 2017. Video-Mediated Peer Support in an Online Community for Recovery from Substance Use Disorders. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 1454--1469.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Jeffrey M Rzeszotarski and Meredith Ringel Morris. 2014. Estimating the social costs of friendsourcing. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2735--2744.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Saiph Savage, Andres Monroy-Hernandez, Kasturi Bhattacharjee, and Tobias Höllerer. 2015. Tag me maybe: Perceptions of public targeted sharing on facebook. In Proceedings of the 26th ACM Conference on Hypertext & Social Media. ACM, 299--303.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Ari Schlesinger, Eshwar Chandrasekharan, Christina A Masden, Amy S Bruckman, W Keith Edwards, and Rebecca E Grinter. 2017. Situated anonymity: Impacts of anonymity, ephemerality, and hyper-locality on social media. In Proceedings of the 2017 CHI conference on human factors in computing systems. ACM, 6912--6924.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Sarita Yardi Schoenebeck. 2013. The Secret Life of Online Moms: Anonymity and Disinhibition on YouBeMom. com.. In ICWSM . Citeseer.Google ScholarGoogle Scholar
  78. E Gary Shapiro. 1980. Is seeking help from a friend like seeking help from a stranger? Social Psychology Quarterly (1980), 259--263.Google ScholarGoogle Scholar
  79. Charles Steinfield, Nicole B Ellison, and Cliff Lampe. 2008. Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. Journal of Applied Developmental Psychology , Vol. 29, 6 (2008), 434--445.Google ScholarGoogle ScholarCross RefCross Ref
  80. John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior , Vol. 7, 3 (2004), 321--326.Google ScholarGoogle Scholar
  81. John R Suler and Wende L Phillips. 1998. The bad boys of cyberspace: Deviant behavior in a multimedia chat community. CyberPsychology & Behavior , Vol. 1, 3 (1998), 275--294.Google ScholarGoogle ScholarCross RefCross Ref
  82. Zeynep Tufekci. 2015. Algorithmic harms beyond Facebook and Google: Emergent challenges of computational agency. Colo. Tech. LJ , Vol. 13 (2015), 203.Google ScholarGoogle Scholar
  83. Edwina S Uehara. 1995. Reciprocity reconsidered: Gouldner'smoral norm of reciprocity'and social support. Journal of Social and Personal Relationships , Vol. 12, 4 (1995), 483--502.Google ScholarGoogle ScholarCross RefCross Ref
  84. Sonja Utz, Nicole Muscanell, and Cameran Khalid. 2015. Snapchat elicits more jealousy than Facebook: a comparison of Snapchat and Facebook use. Cyberpsychology, Behavior, and Social Networking , Vol. 18, 3 (2015), 141--146.Google ScholarGoogle ScholarCross RefCross Ref
  85. J Mitchell Vaterlaus, Kathryn Barnett, Cesia Roche, and Jimmy A Young. 2016. "Snapchat is more personal": An exploratory study on Snapchat behaviors and young adult interpersonal relationships. Computers in Human Behavior , Vol. 62 (2016), 594--601.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. David L Vogel and Stephen R Wester. 2003. To seek help or not to seek help: The risks of self-disclosure. Journal of Counseling Psychology , Vol. 50, 3 (2003), 351.Google ScholarGoogle ScholarCross RefCross Ref
  87. Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, and Ben Y Zhao. 2013. Wisdom in the social crowd: an analysis of quora. In Proceedings of the 22nd international conference on World Wide Web. ACM, 1341--1352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y Zhao. 2014. Whispers in the dark: analysis of an anonymous social network. In Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 137--150.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Zhongmin Wang. 2010. Anonymity, social image, and the competition for volunteers: a case study of the online market for reviews. The BE Journal of Economic Analysis & Policy , Vol. 10, 1 (2010).Google ScholarGoogle Scholar
  90. Molly McLure Wasko, Samer Faraj, et almbox. 2005. Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS quarterly , Vol. 29, 1 (2005), 35--57.Google ScholarGoogle Scholar
  91. Julia Shuppert West, Lynda Kayser, Paul Overton, and Robert Saltmarsh. 1991. Student perceptions that inhibit the initiation of counseling. The School Counselor , Vol. 39, 2 (1991), 77--83.Google ScholarGoogle Scholar
  92. Thomas A Wills. 1976. Perceptual Consequences of Helping Another Person. (1976).Google ScholarGoogle Scholar
  93. Pamela Wisniewski, Heng Xu, Heather Lipford, and Emmanuel Bello-Ogunu. 2015. Facebook apps and tagging: The trade-off between personal privacy and engaging with friends. Journal of the Association for Information Science and Technology , Vol. 66, 9 (2015), 1883--1896.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Bin Xu, Pamara Chang, Christopher L Welker, Natalya N Bazarova, and Dan Cosley. 2016. Automatic Archiving versus Default Deletion: What Snapchat Tells Us About Ephemerality in Design. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1662--1675.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Bo Xu, Yun Huang, Haewoon Kwak, and Noshir Contractor. 2013. Structures of broken ties: exploring unfollow behavior on twitter. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 871--876.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Jurui Zhang, Yong Liu, and Yubo Chen. 2015. Social learning in networks of friends versus strangers. Marketing Science , Vol. 34, 4 (2015), 573--589.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Xuan Zhao, Niloufar Salehi, Sasha Naranjit, Sara Alwaalan, Stephen Voida, and Dan Cosley. 2013. The many faces of Facebook: Experiencing social media as performance, exhibition, and personal archive. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1--10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Yanhong Zhou, Gao Cong, Bin Cui, Christian S Jensen, and Junjie Yao. 2009. Routing questions to the right users in online communities. In 2009 IEEE 25th International Conference on Data Engineering. IEEE, 700--711.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Haiyi Zhu, Sauvik Das, Yiqun Cao, Shuang Yu, Aniket Kittur, and Robert Kraut. 2016. A Market in Your Social Network: The Effects of Extrinsic Rewards on Friendsourcing and Relationships. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 598--609.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Effects of Anonymity, Ephemerality, and System Routing on Cost in Social Question Asking

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!