{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T21:45:03Z","timestamp":1771883103833,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,5]],"date-time":"2014-11-05T00:00:00Z","timestamp":1415145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1224100"],"award-info":[{"award-number":["CNS-1224100"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-1321083"],"award-info":[{"award-number":["IIS-1321083"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0916307"],"award-info":[{"award-number":["IIS-0916307"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["BAA-12-01"],"award-info":[{"award-number":["BAA-12-01"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,5]]},"DOI":"10.1145\/2663716.2663728","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"137-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Whispers in the dark"],"prefix":"10.1145","author":[{"given":"Gang","family":"Wang","sequence":"first","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Bolun","family":"Wang","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Tianyi","family":"Wang","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ana","family":"Nika","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441878"},{"key":"e_1_3_2_1_2_1","volume-title":"Twitter","author":"ANDREESEN M.","year":"2014","unstructured":"ANDREESEN , M. Public tweets . Twitter , March 2014 . ANDREESEN, M. Public tweets. Twitter, March 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-003-0240-0"},{"key":"e_1_3_2_1_4_1","volume-title":"USA Today","author":"ASSOCIATED PRESS","year":"2014","unstructured":"ASSOCIATED PRESS . Whispers, secrets and lies? anonymity apps rise . USA Today , March 2014 . ASSOCIATED PRESS. Whispers, secrets and lies? anonymity apps rise. USA Today, March 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of ICWSM","author":"BERNSTEIN M. S.","year":"2011","unstructured":"BERNSTEIN , M. S. , MONROY-HERN\u00c1NDEZ , A. , HARRY , D. , ANDR\u00c9 , P. , PANOVICH , K. , AND VARGAS , G. G. 4chan and\/b : An analysis of anonymity and ephemerality in a large online community . In Proc. of ICWSM ( 2011 ). BERNSTEIN, M. S., MONROY-HERN\u00c1NDEZ, A., HARRY, D., ANDR\u00c9, P., PANOVICH, K., AND VARGAS, G. G. 4chan and\/b: An analysis of anonymity and ephemerality in a large online community. In Proc. of ICWSM (2011)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_8_1","volume-title":"K. Measuring User Influence in Twitter: The Million Follower Fallacy. In Proc. of ICWSM","author":"CHA M.","year":"2010","unstructured":"CHA , M. , HADDADI , H. , BENVENUTO , F. , AND GUMMADI , K. Measuring User Influence in Twitter: The Million Follower Fallacy. In Proc. of ICWSM ( 2010 ). CHA, M., HADDADI, H., BENVENUTO, F., AND GUMMADI, K. Measuring User Influence in Twitter: The Million Follower Fallacy. In Proc. of ICWSM (2010)."},{"key":"e_1_3_2_1_9_1","volume-title":"A statistical overview and comparison. CoRR abs\/1403.5206","author":"CHANG Y.","year":"2014","unstructured":"CHANG , Y. , TANG , L. , INAGAKI , Y. , AND LIU , Y. What is tumblr : A statistical overview and comparison. CoRR abs\/1403.5206 ( 2014 ). CHANG, Y., TANG, L., INAGAKI, Y., AND LIU, Y.What is tumblr: A statistical overview and comparison. CoRR abs\/1403.5206 (2014)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512946"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481336"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398792"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9865-2"},{"key":"e_1_3_2_1_16_1","article-title":"Secrets and lies: Whisper and the return of the anonymous app","author":"GROVE J. V","year":"2014","unstructured":"GROVE , J. V . Secrets and lies: Whisper and the return of the anonymous app . CNet News , January 2014 . GROVE, J. V. Secrets and lies: Whisper and the return of the anonymous app. CNet News, January 2014.","journal-title":"CNet News"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557064"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944968"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_10"},{"key":"e_1_3_2_1_21_1","volume-title":"Analyzing negative user behavior in a semi-anonymous social network. CoRR abs\/1404.3839","author":"HOSSEINMARDI H.","year":"2014","unstructured":"HOSSEINMARDI , H. , HAN , R. , LV , Q. , MISHRA , S. , AND GHASEMIANLANGROODI , A. Analyzing negative user behavior in a semi-anonymous social network. CoRR abs\/1404.3839 ( 2014 ). HOSSEINMARDI, H., HAN, R., LV, Q., MISHRA, S., AND GHASEMIANLANGROODI, A. Analyzing negative user behavior in a semi-anonymous social network. CoRR abs\/1404.3839 (2014)."},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Inferring tie strength from online directed behavior","volume":"8","author":"JONES J. J.","year":"2013","unstructured":"JONES , J. J. , SETTLE , J. E. , BOND , R. M. , FARISS , C. J. , MARLOW , C. , AND FOWLER , J. H . Inferring tie strength from online directed behavior . PLoS ONE 8 , 1 ( 2013 ), e52168. JONES, J. J., SETTLE, J. E., BOND, R. M., FARISS, C. J., MARLOW, C., AND FOWLER, J. H. Inferring tie strength from online directed behavior. PLoS ONE 8, 1 (2013), e52168.","journal-title":"PLoS ONE"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v16i10.3665"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644930"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601602103"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.208701"},{"key":"e_1_3_2_1_30_1","volume-title":"I wish i didn't say that! analyzing and predicting deleted messages in twitter. CoRR abs\/1305.3107","author":"PETROVIC S.","year":"2013","unstructured":"PETROVIC , S. , OSBORNE , M. , AND LAVRENKO , V. I wish i didn't say that! analyzing and predicting deleted messages in twitter. CoRR abs\/1305.3107 ( 2013 ). PETROVIC, S., OSBORNE, M., AND LAVRENKO, V. I wish i didn't say that! analyzing and predicting deleted messages in twitter. CoRR abs\/1305.3107 (2013)."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of FC","author":"ROESNER F.","year":"2014","unstructured":"ROESNER , F. , GILL , B. T. , AND KOHNO , T. Sex, lies, or kittens' investigating the use of snapchat's self-destructing messages . In Proc. of FC ( 2014 ). ROESNER, F., GILL, B. T., AND KOHNO, T. Sex, lies, or kittens' investigating the use of snapchat's self-destructing messages. In Proc. of FC (2014)."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of ICWSM","author":"SCHOENEBECK S. Y.","year":"2013","unstructured":"SCHOENEBECK , S. Y. The secret life of online moms: Anonymity and disinhibition on youbemom.com . In Proc. of ICWSM ( 2013 ). SCHOENEBECK, S. Y. The secret life of online moms: Anonymity and disinhibition on youbemom.com. In Proc. of ICWSM (2013)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of LREC","author":"STRAPPARAVA C.","year":"2004","unstructured":"STRAPPARAVA , C. , AND VALITUTTI , A. Wordnet affect: an affective extension of wordnet . In Proc. of LREC ( 2004 ). STRAPPARAVA, C., AND VALITUTTI, A. Wordnet affect: an affective extension of wordnet. In Proc. of LREC (2004)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"e_1_3_2_1_35_1","first-page":"3","article-title":"The bad boys of cyberspace: Deviant behavior in a multimedia chat community. Cyberpsy., Behavior, and Soc","volume":"1","author":"SULER J.","year":"1998","unstructured":"SULER , J. , AND PHILLIPS , W. L . The bad boys of cyberspace: Deviant behavior in a multimedia chat community. Cyberpsy., Behavior, and Soc . Networking 1 , 3 ( 1998 ), 275--294. SULER, J., AND PHILLIPS, W. L. The bad boys of cyberspace: Deviant behavior in a multimedia chat community. Cyberpsy., Behavior, and Soc. Networking 1, 3 (1998), 275--294.","journal-title":"Networking"},{"key":"e_1_3_2_1_36_1","volume-title":"The anatomy of the facebook social graph. CoRR abs\/1111.4503","author":"UGANDER J.","year":"2011","unstructured":"UGANDER , J. , KARRER , B. , BACKSTROM , L. , AND MARLOW , C. The anatomy of the facebook social graph. CoRR abs\/1111.4503 ( 2011 ). UGANDER, J., KARRER, B., BACKSTROM, L., AND MARLOW, C. The anatomy of the facebook social graph. CoRR abs\/1111.4503 (2011)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242805"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"e_1_3_2_1_40_1","volume-title":"NY Times","author":"WORTHAM J.","year":"2014","unstructured":"WORTHAM , J. New social app has juicy posts, all anonymous . NY Times , March 2014 . WORTHAM, J. New social app has juicy posts, all anonymous. NY Times, March 2014."},{"key":"e_1_3_2_1_41_1","volume-title":"NY Times","author":"WORTHAM J.","year":"2014","unstructured":"WORTHAM , J. Whatsapp deal bets on a few fewer \"friends \". NY Times , February 2014 . WORTHAM, J. Whatsapp deal bets on a few fewer \"friends\". NY Times, February 2014."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25821-3_2"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030626"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"}],"event":{"name":"IMC '14: Internet Measurement Conference","location":"Vancouver BC Canada","acronym":"IMC '14","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2014 Conference on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663728","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663716.2663728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:49Z","timestamp":1750227169000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663728"}},"subtitle":["analysis of an anonymous social network"],"short-title":[],"issued":{"date-parts":[[2014,11,5]]},"references-count":44,"alternative-id":["10.1145\/2663716.2663728","10.1145\/2663716"],"URL":"https:\/\/doi.org\/10.1145\/2663716.2663728","relation":{},"subject":[],"published":{"date-parts":[[2014,11,5]]},"assertion":[{"value":"2014-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}