{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:29:34Z","timestamp":1776090574470,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"AOL","award":["Connected Experience Lab"],"award-info":[{"award-number":["Connected Experience Lab"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025956","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"1781-1793","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["\"People Are Either Too Fake or Too Real\""],"prefix":"10.1145","author":[{"given":"Xiao","family":"Ma","sequence":"first","affiliation":[{"name":"Cornell Tech, New York, USA"}]},{"given":"Nazanin","family":"Andalibi","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Louise","family":"Barkhuus","sequence":"additional","affiliation":[{"name":"The IT University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Mor","family":"Naaman","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858096"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998243"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00247"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753347"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0028113"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000055"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.117.3.497"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.8.2.111"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2012.01664.x"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM '11)","author":"Bernstein Michael S","unstructured":"Michael S Bernstein , Andr\u00e9s Monroy-Hern\u00e1ndez , Drew Harry , Paul Andr\u00e9 , Katrina Panovich , and Gregory G Vargas . 4chan and\/b : An analysis of anonymity and ephemerality in a large online community . In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM '11) . Michael S Bernstein, Andr\u00e9s Monroy-Hern\u00e1ndez, Drew Harry, Paul Andr\u00e9, Katrina Panovich, and Gregory G Vargas. 4chan and\/b: An analysis of anonymity and ephemerality in a large online community. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM '11)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702410"},{"key":"e_1_3_2_2_13_1","volume-title":"It's complicated: The social lives of networked teens","unstructured":"danah boyd. 2014. It's complicated: The social lives of networked teens . Yale University Press . danah boyd. 2014. It's complicated: The social lives of networked teens. Yale University Press."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.116.3.457"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 9th International AAAI Conference on Weblogs and Social Media (ICWSM '15)","author":"Correa Denzil","unstructured":"Denzil Correa , Leandro Araujo Silva , Mainack Mondal , Fabr\u00edcio Benevenuto , and Krishna P Gummadi . The many shades of anonymity: Characterizing anonymous social media content . In Proceedings of the 9th International AAAI Conference on Weblogs and Social Media (ICWSM '15) . Denzil Correa, Leandro Araujo Silva, Mainack Mondal, Fabr\u00edcio Benevenuto, and Krishna P Gummadi. The many shades of anonymity: Characterizing anonymous social media content. In Proceedings of the 9th International AAAI Conference on Weblogs and Social Media (ICWSM '15)."},{"key":"e_1_3_2_2_16_1","volume-title":"Self-disclosure and starting a close relationship. Handbook of Relationship","author":"Derlega Valerian J","year":"1997","unstructured":"Valerian J Derlega , Barbara A Winstead , and Kathryn Greene . 1997. Self-disclosure and starting a close relationship. Handbook of Relationship ( 1997 ), 153--174. Valerian J Derlega, Barbara A Winstead, and Kathryn Greene. 1997. Self-disclosure and starting a close relationship. Handbook of Relationship (1997), 153--174."},{"key":"e_1_3_2_2_17_1","unstructured":"Judith S Donath. 1999. Identity and deception in the virtual community. In Communities in Cyberspace. 29--59.  Judith S Donath. 1999. Identity and deception in the virtual community. In Communities in Cyberspace. 29--59."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116670673"},{"key":"e_1_3_2_2_19_1","volume-title":"The Handbook of Communication Skills","author":"Foot Hugh C","unstructured":"Hugh C Foot and May McCreaddie . 1997. Humour and laughter . In The Handbook of Communication Skills . Routledge , 259--285. Hugh C Foot and May McCreaddie. 1997. Humour and laughter. In The Handbook of Communication Skills. Routledge, 259--285."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998273"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1086\/200378"},{"key":"e_1_3_2_2_22_1","unstructured":"Erving Goffman. 1959. The presentation of self in everyday life. (1959).  Erving Goffman. 1959. The presentation of self in everyday life. (1959)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702270"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985709"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12008"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675259"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208535"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481368"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820081"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v16i10.3665"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099203.1099206"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985761"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.014"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.09.004"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675175"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145230"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858414"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/009365087014005003"},{"key":"e_1_3_2_2_39_1","volume-title":"Marwick and danah boyd","author":"Alice","year":"2011","unstructured":"Alice E. Marwick and danah boyd . 2011 . The drama! Teen conflict, gossip, and bullying in networked publics. A Decade in Internet Time : Symposium on the Dynamics of the Internet and Society . Available from SSRN. (2011). http:\/\/ssrn.com\/abstract=1926349 Alice E. Marwick and danah boyd. 2011. The drama! Teen conflict, gossip, and bullying in networked publics. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society. Available from SSRN. (2011). http:\/\/ssrn.com\/abstract=1926349"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958876"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0402_05"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.2307\/2799493"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1973.tb00958.x"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660467"},{"key":"e_1_3_2_2_45_1","volume-title":"Opening up: The healing power of expressing emotions","author":"Pennebaker James W","unstructured":"James W Pennebaker . 2012. Opening up: The healing power of expressing emotions . Guilford Press . James W Pennebaker. 2012. Opening up: The healing power of expressing emotions. Guilford Press."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2000.tb00761.x"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(98)00056-3"},{"key":"e_1_3_2_2_48_1","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP '11)","author":"Qazvinian Vahed","year":"2011","unstructured":"Vahed Qazvinian , Emily Rosengren , Dragomir R Radev , and Qiaozhu Mei . 2011 . Rumor has it: Identifying misinformation in microblogs . In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP '11) . Association for Computational Linguistics, Stroudsburg, PA, USA, 1589--1599. Vahed Qazvinian, Emily Rosengren, Dragomir R Radev, and Qiaozhu Mei. 2011. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP '11). Association for Computational Linguistics, Stroudsburg, PA, USA, 1589--1599."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1988.tb02033.x"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1037\/10365-008"},{"key":"e_1_3_2_2_51_1","volume-title":"Rumor and gossip research. Psychological Science Agenda 19, 4","author":"Rosnow Ralph L","year":"2005","unstructured":"Ralph L Rosnow and Eric K Foster . 2005. Rumor and gossip research. Psychological Science Agenda 19, 4 ( 2005 ). Ralph L Rosnow and Eric K Foster. 2005. Rumor and gossip research. Psychological Science Agenda 19, 4 (2005)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3523-6_12"},{"key":"e_1_3_2_2_53_1","volume-title":"Grounded theory in practice","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet M Corbin . 1997. Grounded theory in practice . Sage . Anselm Strauss and Juliet M Corbin. 1997. Grounded theory in practice. Sage."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v19i2.4819"},{"key":"e_1_3_2_2_56_1","volume-title":"Life on the screen: Identity in the age of the Internet","author":"Turkle Sherry","unstructured":"Sherry Turkle . 1995. Life on the screen: Identity in the age of the Internet . Simon & Schuster Trade . Sherry Turkle. 1995. Life on the screen: Identity in the age of the Internet. Simon & Schuster Trade."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/009365096023001001"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663728"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145329"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1977.tb01817.x"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:17Z","timestamp":1750215797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025956"}},"subtitle":["Opportunities and Challenges in Tie-Based Anonymity"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":60,"alternative-id":["10.1145\/3025453.3025956","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025956","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}