Abstract
Online platforms provide new channels for people in need to seek help from friends and strangers. However, individuals often encounter psychological barriers that deter them from asking for help. For example, people might have different concerns about asking for help, including acknowledging incompetence, bothering others, and accruing social debt. These perceived social costs limit the potential benefits of help solicitations. In this study, we attempt to investigate whether anonymity (posting a question anonymously), ephemerality (allowing questions to be visible for only a short period), and system routing (having the system handle the question routing) could reduce social costs in a typical online help-seeking behavior-question asking. We built a platform to support these three features and conducted a controlled within-subjects experiment to test their effects on the social costs of posting questions. Results suggest that the presence of anonymity, ephemerality, and system routing reduce social costs. Further, we find that employing anonymity and system routing features did not lower the quality and quantity of answers to the questions in our system.
- Elena Agapie, Lucas Colusso, Sean A Munson, and Gary Hsieh. 2016. Plansourcing: Generating behavior change plans with friends and crowds. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 119--133.Google Scholar
Digital Library
- Paul D Allison. 2009. Fixed effects regression models . Vol. 160. SAGE publications.Google Scholar
- Nazanin Andalibi, Oliver L Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3906--3918.Google Scholar
Digital Library
- Stella E Anderson and Larry J Williams. 1996. Interpersonal, job, and individual factors related to helping processes at work. Journal of Applied Psychology , Vol. 81, 3 (1996), 282.Google Scholar
Cross Ref
- Paul André, Michael Bernstein, and Kurt Luther. 2012. Who gives a tweet?: evaluating microblog content value. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, 471--474.Google Scholar
Digital Library
- James Andreoni and B Douglas Bernheim. 2009. Social image and the 50--50 norm: A theoretical and experimental analysis of audience effects. Econometrica , Vol. 77, 5 (2009), 1607--1636.Google Scholar
Cross Ref
- Earl R Babbie. 2015. The practice of social research .Nelson Education.Google Scholar
- Fabiola Baltar and Ignasi Brunet. 2012. Social research 2.0: virtual snowball sampling method using Facebook. Internet research , Vol. 22, 1 (2012), 57--74.Google Scholar
- Christopher P Barlett, Douglas A Gentile, and Chelsea Chew. 2016. Predicting cyberbullying from anonymity. Psychology of Popular Media Culture , Vol. 5, 2 (2016), 171.Google Scholar
Cross Ref
- Joseph B Bayer, Nicole B Ellison, Sarita Y Schoenebeck, and Emily B Falk. 2016. Sharing the small moments: ephemeral social interaction on Snapchat. Information, Communication & Society , Vol. 19, 7 (2016), 956--977.Google Scholar
Cross Ref
- Roland Bénabou and Jean Tirole. 2006. Incentives and prosocial behavior. American economic review , Vol. 96, 5 (2006), 1652--1678.Google Scholar
- Jonah Berger. 2013. Beyond viral: Interpersonal communication in the internet age. Psychological Inquiry , Vol. 24, 4 (2013), 293--296.Google Scholar
Cross Ref
- Michael S Bernstein, Andrés Monroy-Hernández, Drew Harry, Paul André, Katrina Panovich, and Gregory G Vargas. 2011. 4chan and/b: An Analysis of Anonymity and Ephemerality in a Large Online Community.. In ICWSM. 50--57.Google Scholar
- Vanessa K Bohns and Francis J Flynn. 2010. "Why didn't you just ask?" Underestimating the discomfort of help-seeking. Journal of Experimental Social Psychology , Vol. 46, 2 (2010), 402--409.Google Scholar
Cross Ref
- Erin L Brady, Yu Zhong, Meredith Ringel Morris, and Jeffrey P Bigham. 2013. Investigating the appropriateness of social network question asking as a resource for blind users. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 1225--1236.Google Scholar
Digital Library
- Leonardo Bursztyn and Robert Jensen. 2017. Social image and economic behavior in the field: Identifying, understanding, and shaping social pressure. Annual Review of Economics , Vol. 9 (2017), 131--153.Google Scholar
Cross Ref
- Sandro Casal and Luigi Mittone. 2016. Social esteem versus social stigma: The role of anonymity in an income reporting game. Journal of Economic Behavior & Organization , Vol. 124 (2016), 55--66.Google Scholar
Cross Ref
- Richard Chalfen. 2009. `It's only a picture': Sexting,`smutty' snapshots and felony charges. Visual Studies , Vol. 24, 3 (2009), 258--268.Google Scholar
Cross Ref
- Boreum Choi, Kira Alexander, Robert E Kraut, and John M Levine. 2010. Socialization tactics in wikipedia and their effects. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. ACM, 107--116.Google Scholar
Digital Library
- Jacob Cohen. 2013. Statistical power analysis for the behavioral sciences .Routledge.Google Scholar
- Nicola Cornally and Geraldine McCarthy. 2011. Help-seeking behaviour: A concept analysis. International journal of nursing practice , Vol. 17, 3 (2011), 280--288.Google Scholar
- Bella M DePaulo. 1978. Accepting help from teachers-when the teachers are children. Human Relations , Vol. 31, 5 (1978), 459--474.Google Scholar
Cross Ref
- Bella M DePaulo, Gregory L Brittingham, and Mary K Kaiser. 1983. Receiving competence-relevant help: Effects on reciprocity, affect, and sensitivity to the helper's nonverbally expressed needs. Journal of Personality and Social Psychology , Vol. 45, 5 (1983), 1045.Google Scholar
Cross Ref
- Bella M DePaulo and Jeffrey D Fisher. 1980. The costs of asking for help. Basic and Applied Social Psychology , Vol. 1, 1 (1980), 23--35.Google Scholar
Cross Ref
- Michael A DeVito. 2017. From editors to algorithms: A values-based approach to understanding story selection in the Facebook news feed. Digital Journalism , Vol. 5, 6 (2017), 753--773.Google Scholar
Cross Ref
- Nicholas Diakopoulos. 2015. Algorithmic accountability: Journalistic investigation of computational power structures. Digital journalism , Vol. 3, 3 (2015), 398--415.Google Scholar
- Nicholas Diakopoulos and Mor Naaman. 2011. Towards quality discourse in online news comments. In Proceedings of the ACM 2011 conference on Computer supported cooperative work. ACM, 133--142.Google Scholar
Digital Library
- Peter R Druian and Bella M DePaulo. 1977. Asking a child for help. Social Behavior and Personality: an international journal , Vol. 5, 1 (1977), 33--39.Google Scholar
- Catherine Dwyer, Starr Hiltz, and Katia Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings (2007), 339.Google Scholar
- Motahhare Eslami, Aimee Rickman, Kristen Vaccaro, Amirhossein Aleyasen, Andy Vuong, Karrie Karahalios, Kevin Hamilton, and Christian Sandvig. 2015. I always assumed that I wasn't really that close to [her]: Reasoning about Invisible Algorithms in News Feeds. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. ACM, 153--162.Google Scholar
Digital Library
- Jeffrey D Fisher, Arie Nadler, and Sheryle Whitcher-Alagna. 1982. Recipient reactions to aid. Psychological Bulletin , Vol. 91, 1 (1982), 27.Google Scholar
Cross Ref
- Andrea Forte, Michael Dickard, Rachel Magee, and Denise E Agosto. 2014. What do teens ask their online social networks?: social search practices among high school students. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 28--37.Google Scholar
Digital Library
- Darren Gergle and Desney S Tan. 2014. Experimental research in HCI. In Ways of Knowing in HCI . Springer, 191--227.Google Scholar
- Lisa M Given. 2008. The Sage encyclopedia of qualitative research methods .Sage publications.Google Scholar
- Alvin W Gouldner. 1960. The norm of reciprocity: A preliminary statement. American sociological review (1960), 161--178.Google Scholar
- Rebecca Gray, Nicole B Ellison, Jessica Vitak, and Cliff Lampe. 2013. Who wants to know?: question-asking and answering practices among facebook users. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 1213--1224.Google Scholar
Digital Library
- Oliver L Haimson and Anna Lauren Hoffmann. 2016. Constructing and enforcing" authentic" identity online: Facebook, real names, and non-normative identities. First Monday , Vol. 21, 6 (2016).Google Scholar
Cross Ref
- F Maxwell Harper, Daphne Raban, Sheizaf Rafaeli, and Joseph A Konstan. 2008. Predictors of answer quality in online Q&A sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 865--874.Google Scholar
Digital Library
- Brent Hecht, Jaime Teevan, Meredith Ringel Morris, and Daniel J Liebling. 2012. SearchBuddies: Bringing Search Engines into the Conversation. ICWSM , Vol. 12, 138--145 (2012), 2.Google Scholar
- Bernie Hogan. 2012. Pseudonyms and the rise of the real-name web. A companion to new media dynamics (2012), 290--308.Google Scholar
- Damon Horowitz and Sepandar D Kamvar. 2010. The anatomy of a large-scale social search engine. In Proceedings of the 19th international conference on World wide web. ACM, 431--440.Google Scholar
Digital Library
- Homa Hosseinmardi, Richard Han, Qin Lv, Shivakant Mishra, and Amir Ghasemianlangroodi. 2014. Analyzing negative user behavior in a semi-anonymous social network. CoRR abs , Vol. 1404 (2014).Google Scholar
- Joey Chiao-Yin Hsiao, Mei-Hua Pan, Hao-Chuan Wang, and Jane Yung-Jen Hsu. 2015. The Price of the Priceless: Understanding Estimated Costs of Work in Friendsourcing. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 1893--1898.Google Scholar
- Adam Joinson. 1999. Social desirability, anonymity, and Internet-based questionnaires. Behavior Research Methods, Instruments, & Computers , Vol. 31, 3 (1999), 433--438.Google Scholar
Cross Ref
- Ruogu Kang, Stephanie Brown, and Sara Kiesler. 2013. Why do people seek anonymity on the internet?: informing policy and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2657--2666.Google Scholar
Digital Library
- Fiona Lee. 1997. When the going gets tough, do the tough ask for help? Help seeking and power motivation in organizations. Organizational behavior and human decision processes , Vol. 72, 3 (1997), 336--363.Google Scholar
- Fiona Lee. 2002. The social costs of seeking help. The Journal of Applied Behavioral Science , Vol. 38, 1 (2002), 17--35.Google Scholar
Cross Ref
- Bruno Lepri, Nuria Oliver, Emmanuel Letouzé, Alex Pentland, and Patrick Vinck. 2018. Fair, transparent, and accountable algorithmic decision-making processes. Philosophy & Technology , Vol. 31, 4 (2018), 611--627.Google Scholar
Cross Ref
- Michael Lewis-Beck, Alan E Bryman, and Tim Futing Liao. 2003. The Sage encyclopedia of social science research methods .Sage Publications.Google Scholar
- Baichuan Li and Irwin King. 2010. Routing questions to appropriate answerers in community question answering services. In Proceedings of the 19th ACM international conference on Information and knowledge management. ACM, 1585--1588.Google Scholar
Digital Library
- Jo ao Martins, José Carilho, Oliver Schnell, Carlos Duarte, Francisco M Couto, Lu'is Carricc o, and Tiago Guerreiro. 2014. Friendsourcing the unmet needs of people with dementia. In Proceedings of the 11th Web for All Conference. ACM, 35.Google Scholar
Digital Library
- John H McDonald. 2009. Handbook of biological statistics . Vol. 2. Sparky House Publishing Baltimore, MD.Google Scholar
- Katelyn YA McKenna and John A Bargh. 2000. Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and social psychology review , Vol. 4, 1 (2000), 57--75.Google Scholar
- Sarah McRoberts, Haiwei Ma, Andrew Hall, and Svetlana Yarosh. 2017. Share first, save later: Performance of self through Snapchat stories. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 6902--6911.Google Scholar
Digital Library
- Miriam J Metzger. 2004. Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication , Vol. 9, 4 (2004), JCMC942.Google Scholar
- Meredith Ringel Morris, Jaime Teevan, and Katrina Panovich. 2010a. A comparison of information seeking using search engines and social networks. In Fourth International AAAI Conference on Weblogs and Social Media .Google Scholar
- Meredith Ringel Morris, Jaime Teevan, and Katrina Panovich. 2010b. What do people ask their social networks, and why?: a survey study of status message q&a behavior. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 1739--1748.Google Scholar
Digital Library
- Sean A Munson, Debra Lauterbach, Mark W Newman, and Paul Resnick. 2010. Happier together: integrating a wellness application into a social network site. In International Conference on Persuasive Technology. Springer, 27--39.Google Scholar
Digital Library
- Mark W Newman, Debra Lauterbach, Sean A Munson, Paul Resnick, and Margaret E Morris. 2011. It's not that I don't have problems, I'm just not putting them on Facebook: challenges and opportunities in using online social networks for health. In Proceedings of the ACM 2011 conference on Computer supported cooperative work. ACM, 341--350.Google Scholar
Digital Library
- Jeffrey Nichols and Jeon-Hyung Kang. 2012. Asking questions of targeted strangers on social networks. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, 999--1002.Google Scholar
Digital Library
- Blair Nonnecke and Jenny Preece. 2003. Silent participants: Getting to know lurkers better. In From usenet to CoWebs . Springer, 110--132.Google Scholar
- Blair Nonnecke, Jenny Preece, Dorine Andrews, and Russell Voutour. 2004. Online lurkers tell why. AMCIS 2004 Proceedings (2004), 321.Google Scholar
- Anne Oeldorf-Hirsch, Brent Hecht, Meredith Ringel Morris, Jaime Teevan, and Darren Gergle. 2014. To search or to ask: the routing of information needs between traditional search engines and social networks. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 16--27.Google Scholar
Digital Library
- Anne Oeldorf-Hirsch and S Shyam Sundar. 2015. Posting, commenting, and tagging: Effects of sharing news stories on Facebook. Computers in Human Behavior , Vol. 44 (2015), 240--249.Google Scholar
Digital Library
- Steven Ovadia. 2011. Quora. com: another place for users to ask questions. Behavioral & Social Sciences Librarian , Vol. 30, 3 (2011), 176--180.Google Scholar
Cross Ref
- Katrina Panovich, Rob Miller, and David Karger. 2012. Tie strength in question & answer on social network sites. In Proceedings of the ACM 2012 conference on computer supported cooperative work. ACM, 1057--1066.Google Scholar
Digital Library
- Sharoda A Paul, Lichan Hong, and Ed H Chi. 2011. Is Twitter a Good Place for Asking Questions? A Characterization Study.. In ICWSM .Google Scholar
- Sharoda A Paul, Lichan Hong, and Ed H Chi. 2012. Who is authoritative? understanding reputation mechanisms in quora. arXiv preprint arXiv:1204.3724 (2012).Google Scholar
- Nicole A Poltash. 2012. Snapchat and sexting: A snapshot of baring your bare essentials. Rich. JL & Tech. , Vol. 19 (2012), 1.Google Scholar
- Jenny Preece, Blair Nonnecke, and Dorine Andrews. 2004. The top five reasons for lurking: improving community experiences for everyone. Computers in human behavior , Vol. 20, 2 (2004), 201--223.Google Scholar
- Emilee Rader and Rebecca Gray. 2015. Understanding user beliefs about algorithmic curation in the Facebook news feed. In Proceedings of the 33rd annual ACM conference on human factors in computing systems . ACM, 173--182.Google Scholar
Digital Library
- Beatrice Rammstedt and Oliver P John. 2007. Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German. Journal of research in Personality , Vol. 41, 1 (2007), 203--212.Google Scholar
Cross Ref
- Sabirat Rubya and Svetlana Yarosh. 2017. Video-Mediated Peer Support in an Online Community for Recovery from Substance Use Disorders. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 1454--1469.Google Scholar
Digital Library
- Jeffrey M Rzeszotarski and Meredith Ringel Morris. 2014. Estimating the social costs of friendsourcing. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2735--2744.Google Scholar
Digital Library
- Saiph Savage, Andres Monroy-Hernandez, Kasturi Bhattacharjee, and Tobias Höllerer. 2015. Tag me maybe: Perceptions of public targeted sharing on facebook. In Proceedings of the 26th ACM Conference on Hypertext & Social Media. ACM, 299--303.Google Scholar
Digital Library
- Ari Schlesinger, Eshwar Chandrasekharan, Christina A Masden, Amy S Bruckman, W Keith Edwards, and Rebecca E Grinter. 2017. Situated anonymity: Impacts of anonymity, ephemerality, and hyper-locality on social media. In Proceedings of the 2017 CHI conference on human factors in computing systems. ACM, 6912--6924.Google Scholar
Digital Library
- Sarita Yardi Schoenebeck. 2013. The Secret Life of Online Moms: Anonymity and Disinhibition on YouBeMom. com.. In ICWSM . Citeseer.Google Scholar
- E Gary Shapiro. 1980. Is seeking help from a friend like seeking help from a stranger? Social Psychology Quarterly (1980), 259--263.Google Scholar
- Charles Steinfield, Nicole B Ellison, and Cliff Lampe. 2008. Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. Journal of Applied Developmental Psychology , Vol. 29, 6 (2008), 434--445.Google Scholar
Cross Ref
- John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior , Vol. 7, 3 (2004), 321--326.Google Scholar
- John R Suler and Wende L Phillips. 1998. The bad boys of cyberspace: Deviant behavior in a multimedia chat community. CyberPsychology & Behavior , Vol. 1, 3 (1998), 275--294.Google Scholar
Cross Ref
- Zeynep Tufekci. 2015. Algorithmic harms beyond Facebook and Google: Emergent challenges of computational agency. Colo. Tech. LJ , Vol. 13 (2015), 203.Google Scholar
- Edwina S Uehara. 1995. Reciprocity reconsidered: Gouldner'smoral norm of reciprocity'and social support. Journal of Social and Personal Relationships , Vol. 12, 4 (1995), 483--502.Google Scholar
Cross Ref
- Sonja Utz, Nicole Muscanell, and Cameran Khalid. 2015. Snapchat elicits more jealousy than Facebook: a comparison of Snapchat and Facebook use. Cyberpsychology, Behavior, and Social Networking , Vol. 18, 3 (2015), 141--146.Google Scholar
Cross Ref
- J Mitchell Vaterlaus, Kathryn Barnett, Cesia Roche, and Jimmy A Young. 2016. "Snapchat is more personal": An exploratory study on Snapchat behaviors and young adult interpersonal relationships. Computers in Human Behavior , Vol. 62 (2016), 594--601.Google Scholar
Digital Library
- David L Vogel and Stephen R Wester. 2003. To seek help or not to seek help: The risks of self-disclosure. Journal of Counseling Psychology , Vol. 50, 3 (2003), 351.Google Scholar
Cross Ref
- Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, and Ben Y Zhao. 2013. Wisdom in the social crowd: an analysis of quora. In Proceedings of the 22nd international conference on World Wide Web. ACM, 1341--1352.Google Scholar
Digital Library
- Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y Zhao. 2014. Whispers in the dark: analysis of an anonymous social network. In Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 137--150.Google Scholar
Digital Library
- Zhongmin Wang. 2010. Anonymity, social image, and the competition for volunteers: a case study of the online market for reviews. The BE Journal of Economic Analysis & Policy , Vol. 10, 1 (2010).Google Scholar
- Molly McLure Wasko, Samer Faraj, et almbox. 2005. Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS quarterly , Vol. 29, 1 (2005), 35--57.Google Scholar
- Julia Shuppert West, Lynda Kayser, Paul Overton, and Robert Saltmarsh. 1991. Student perceptions that inhibit the initiation of counseling. The School Counselor , Vol. 39, 2 (1991), 77--83.Google Scholar
- Thomas A Wills. 1976. Perceptual Consequences of Helping Another Person. (1976).Google Scholar
- Pamela Wisniewski, Heng Xu, Heather Lipford, and Emmanuel Bello-Ogunu. 2015. Facebook apps and tagging: The trade-off between personal privacy and engaging with friends. Journal of the Association for Information Science and Technology , Vol. 66, 9 (2015), 1883--1896.Google Scholar
Digital Library
- Bin Xu, Pamara Chang, Christopher L Welker, Natalya N Bazarova, and Dan Cosley. 2016. Automatic Archiving versus Default Deletion: What Snapchat Tells Us About Ephemerality in Design. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1662--1675.Google Scholar
Digital Library
- Bo Xu, Yun Huang, Haewoon Kwak, and Noshir Contractor. 2013. Structures of broken ties: exploring unfollow behavior on twitter. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 871--876.Google Scholar
Digital Library
- Jurui Zhang, Yong Liu, and Yubo Chen. 2015. Social learning in networks of friends versus strangers. Marketing Science , Vol. 34, 4 (2015), 573--589.Google Scholar
Digital Library
- Xuan Zhao, Niloufar Salehi, Sasha Naranjit, Sara Alwaalan, Stephen Voida, and Dan Cosley. 2013. The many faces of Facebook: Experiencing social media as performance, exhibition, and personal archive. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1--10.Google Scholar
Digital Library
- Yanhong Zhou, Gao Cong, Bin Cui, Christian S Jensen, and Junjie Yao. 2009. Routing questions to the right users in online communities. In 2009 IEEE 25th International Conference on Data Engineering. IEEE, 700--711.Google Scholar
Digital Library
- Haiyi Zhu, Sauvik Das, Yiqun Cao, Shuang Yu, Aniket Kittur, and Robert Kraut. 2016. A Market in Your Social Network: The Effects of Extrinsic Rewards on Friendsourcing and Relationships. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 598--609.Google Scholar
Digital Library
Index Terms
Effects of Anonymity, Ephemerality, and System Routing on Cost in Social Question Asking
Recommendations
Situated Anonymity: Impacts of Anonymity, Ephemerality, and Hyper-Locality on Social Media
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsAnonymity, ephemerality, and hyper-locality are an uncommon set of features in the design of online communities. However, these features were key to Yik Yak's initial success and popularity. In an interview-based study, we found that these three ...
Anonymity, Intimacy and Self-Disclosure in Social Media
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsSelf-disclosure is rewarding and provides significant benefits for individuals, but it also involves risks, especially in social media settings. We conducted an online experiment to study the relationship between content intimacy and willingness to self-...
Understanding Social Costs in Online Question Asking
CHI EA '19: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing SystemsVarious social media sites and online communities provide new channels for people in need to ask questions and seek help. However, individuals may still encounter psychological barriers that deter solicitation for assistance, which is more formally ...






Comments