{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:09:22Z","timestamp":1743152962268,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031604867"},{"type":"electronic","value":"9783031604874"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60487-4_13","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:02:20Z","timestamp":1717203740000},"page":"166-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ChatAlone: An Anonymous Messaging Application for Enhanced Privacy and Open Communication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6799-8650","authenticated-orcid":false,"given":"Jordan","family":"Yuen Jia Jun","sequence":"first","affiliation":[]},{"given":"Owen Noel Newton","family":"Fernando","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.soscij.2013.09.003","volume":"51","author":"AJ Sultan","year":"2014","unstructured":"Sultan, A.J.: Addiction to mobile text messaging applications is nothing to \u201clol\u201d about. Soc. Sci. J. 51, 57\u201369 (2014)","journal-title":"Soc. Sci. J."},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"103658","DOI":"10.1016\/j.csi.2022.103658","volume":"83","author":"H-H Huang","year":"2023","unstructured":"Huang, H.-H., Lin, C.-N.: Influencing factors of mobile instant messaging applications between single- and multi- platform use cases. Comput. Stand. Interfaces 83, 103658 (2023)","journal-title":"Comput. Stand. Interfaces"},{"key":"13_CR3","unstructured":"March, L.: Most popular messaging apps in 2023. https:\/\/www.similarweb.com\/blog\/research\/market-research\/worldwide-messaging-apps\/"},{"key":"13_CR4","unstructured":"Dixon, S.J.: Most popular messaging apps 2023. https:\/\/www.statista.com\/statistics\/258749\/most-popular-global-mobile-messenger-apps\/"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Corelli, A.: Direct vs. anonymous feedback: teacher behavior in Higher Education, with focus on technology advances. Procedia \u2013 Soc. Behav. Sci. 195, 52\u201361 (2015)","DOI":"10.1016\/j.sbspro.2015.06.329"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/08997225.2004.10556309","volume":"41","author":"CR Scott","year":"2004","unstructured":"Scott, C.R.: Benefits and drawbacks of anonymous online communication: legal challenges and communicative recommendations. Free Speech Yearbook 41, 127\u2013141 (2004)","journal-title":"Free Speech Yearbook"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Hoang, N.P., Pishva, D.: Anonymous communication and its importance in social networking. In: 16th International Conference on Advanced Communication Technology (2014)","DOI":"10.1109\/ICACT.2014.6778917"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1111\/j.1559-1816.2000.tb02462.x","volume":"30","author":"AD Ong","year":"2000","unstructured":"Ong, A.D., Weiss, D.J.: The impact of anonymity on responses to sensitive questions. J. Appl. Soc. Psychol. 30, 1691\u20131708 (2000)","journal-title":"J. Appl. Soc. Psychol."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Yang, J.-Y., Choi, C.: Enhancing interactiveness of problem-based programming course using anonymous chatting service. In: 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET) (2017)","DOI":"10.1109\/ITHET.2017.8067828"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Junio, O.M., Chavez, E.P.: Development of offline chat application: framework for resilient disaster management. In: 2018 IEEE International Conference of Safety Produce Informatization (IICSPI) (2018)","DOI":"10.1109\/IICSPI.2018.8690351"},{"key":"13_CR11","unstructured":"Offline messaging, Bridgefy. https:\/\/bridgefy.me\/"},{"key":"13_CR12","unstructured":"Verma, M., Singh, S., Kaur, B.: An overview of bluetooth technology and its communication. https:\/\/www.researchgate.net\/publication\/276251559_An_Overview_of_Bluetooth_Technology_and_its_Communication_Application"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-030-75539-3_16","volume-title":"Topics in Cryptology \u2013 CT-RSA 2021","author":"MR Albrecht","year":"2021","unstructured":"Albrecht, M.R., Blasco, J., Jensen, R.B., Marekov\u00e1, L.: Mesh messaging in large-scale protests: breaking bridgefy. In: Paterson, K.G. (ed.) CT-RSA 2021. LNCS, vol. 12704, pp. 375\u2013398. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75539-3_16"},{"key":"13_CR14","unstructured":"Dreher, H., Maurer, H.: The worth of anonymous feedback. https:\/\/www.researchgate.net\/profile\/Heinz-Dreher\/publication\/249905933_The_Worth_of_Anonymous_Feedback\/links\/542a30e20cf27e39fa8e7a87\/The-Worth-of-Anonymous-Feedback.pdf?origin=publication_detail"},{"key":"13_CR15","unstructured":"What is Black Box Testing: Techniques & Examples: Imperva. https:\/\/www.imperva.com\/learn\/application-security\/black-box-testing\/"},{"key":"13_CR16","unstructured":"Bluetooth beacons technology- how does it work in 2023, Mapsted Blog. https:\/\/mapsted.com\/blog\/what-you-must-know-about-bluetooth-beacons-before-purchasing"}],"container-title":["Lecture Notes in Computer Science","Human-Centered Design, Operation and Evaluation of Mobile Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60487-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:48:08Z","timestamp":1717206488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60487-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031604867","9783031604874"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60487-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}