{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:57:11Z","timestamp":1776117431175,"version":"3.50.1"},"reference-count":114,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1253302"],"award-info":[{"award-number":["1253302"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2018,10,31]]},"abstract":"<jats:p>Seeking and providing support is challenging. When people disclose sensitive information, audience responses can substantially impact the discloser's wellbeing. We use mixed methods to understand<jats:italic>responses to<\/jats:italic>online sexual abuse-related disclosures on Reddit. We characterize disclosure responses, then investigate relationships between post content, comment content, and anonymity. We illustrate what types of support sought and provided in posts and comments co-occur. We find that posts seeking support receive more comments, and comments from \u201cthrowaway\u201d (i.e., anonymous) accounts are more likely on posts also from throwaway accounts. Anonymous commenting enables commenters to share intimate content such as reciprocal disclosures and supportive messages, and commenter anonymity is not associated with aggressive or unsupportive comments. We argue that anonymity is an essential factor in designing social technologies that facilitate support seeking<jats:italic>and<\/jats:italic>provision in socially stigmatized contexts, and provide implications for social media site design. CAUTION: This article includes content about sexual abuse.<\/jats:p>","DOI":"10.1145\/3234942","type":"journal-article","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T12:15:55Z","timestamp":1538396155000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":170,"title":["Social Support, Reciprocity, and Anonymity in Responses to Sexual Abuse Disclosures on Social Media"],"prefix":"10.1145","volume":"25","author":[{"given":"Nazanin","family":"Andalibi","sequence":"first","affiliation":[{"name":"Drexel University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6552-4540","authenticated-orcid":false,"given":"Oliver L.","family":"Haimson","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Munmun De","family":"Choudhury","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Andrea","family":"Forte","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA"}]}],"member":"320","published-online":{"date-parts":[[2018,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702205"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702324"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","volume-title":"Self-Disclosure and Response Behaviors in Socially Stigmatized Contexts On Social Media","author":"Andalibi Nazanin","DOI":"10.17918\/D8N66N"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of Position Paper at the CHI 2016 Ethical Encounters in HCI: Research in Sensitive and Complex Settings Workshop.","author":"Andalibi Nazanin","year":"2016"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173732"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858096"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998243"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.02.004"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9938"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.1995.11678921"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00247"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0028113"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000055"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/014616727800400425"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702410"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-7358(00)00062-3"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958881"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12162"},{"key":"e_1_2_1_19_1","first-page":"374","article-title":"Supportive communication","volume":"3","author":"Burleson Brant R.","year":"2002","journal-title":"Handbook of Interpersonal Communication"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0018193"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 12th Workshop on the Economics of Information Security (WEIS\u201913)","author":"Cho Daegon","year":"2013"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the International Conference on Web and Social Media (ICWSM\u201917)","author":"Choudhury Munmun De","year":"2017"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.019"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1089\/15246090260137644"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2005.8.580"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pec.2007.06.002"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/009365092019002002"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00938035"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media.","author":"Choudhury Munmun De","year":"2014"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858207"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958844"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"e_1_2_1_33_1","volume-title":"Interpersonal Communication Research: Advances through Meta-analysis","author":"Dindia Kathryn"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134676"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Nicole B. Ellison Lindsay Blackwell Cliff Lampe and Penny Trieu. 2016. \u201cThe question exists but you don't exist with it\u201d: Strategic anonymity in the social lives of adolescents. Social Media + Society 2 4 (2016). Nicole B. Ellison Lindsay Blackwell Cliff Lampe and Penny Trieu. 2016. \u201cThe question exists but you don't exist with it\u201d: Strategic anonymity in the social lives of adolescents. Social Media + Society 2 4 (2016).","DOI":"10.1177\/2056305116670673"},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Joanne Everill and Glenn Waller. 1995. Disclosure of sexual abuse and psychological adjustment in female undergraduates. Child Abuse and Neglect 19 1 (36) 93--100. Joanne Everill and Glenn Waller. 1995. Disclosure of sexual abuse and psychological adjustment in female undergraduates. Child Abuse and Neglect 19 1 (36) 93--100.","DOI":"10.1016\/0145-2134(94)00102-Z"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998223"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/016128400248068"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998273"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786451.2786459"},{"key":"e_1_2_1_41_1","first-page":"121","article-title":"From anonymity to identification","volume":"1","author":"Froomkin A. Michael","year":"2015","journal-title":"Journal of Self-Regulation and Regulation"},{"key":"e_1_2_1_42_1","unstructured":"Tiffany Gagnon. 2013. The Disinhibition of Reddit Users. Adele Richardson's Spring. Tiffany Gagnon. 2013. The Disinhibition of Reddit Users. Adele Richardson's Spring."},{"key":"e_1_2_1_43_1","doi-asserted-by":"crossref","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman Erving","DOI":"10.4324\/9781003320609-59"},{"key":"e_1_2_1_44_1","volume-title":"Stigma: Notes on the Management of Spoiled Identity. Simon 8 Schuster","author":"Goffman Erving","year":"1986"},{"key":"e_1_2_1_45_1","volume-title":"Self Disclosure on Social Networking Websites and Relationship Quality in Late Adolescence. Dissertation\/Thesis","author":"Goldner Kimberly R."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-010-1526-3"},{"key":"e_1_2_1_47_1","volume-title":"Self-disclosure in personal relationships","author":"Greene Kathryn"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1300\/J070v09n01_03"},{"key":"e_1_2_1_49_1","volume-title":"The Social Complexities of Transgender Identity Disclosure on Social Media","author":"Haimson Oliver L."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675152"},{"key":"e_1_2_1_51_1","volume-title":"Lee Rainie, and Kristen Purcell.","author":"Hampton Keith","year":"2011"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985709"},{"key":"e_1_2_1_53_1","volume-title":"Lamb","author":"Hershkowitz Irit","year":"2007"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1986.tb01427.x"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12008"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650210376191"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211405313"},{"key":"e_1_2_1_58_1","volume-title":"Paine","author":"Joinson Adam N.","year":"2007"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077559504264263"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208552"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/088626094009003002"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.014"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.5.1238"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.09.004"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675175"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:CASW.0000035221.78729.d6"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025956"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858414"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.77.4.735"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128565"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_2_1_74_1","unstructured":"Marifran Mattson and Jennifer Gibb Hall. 2011. Health as Communication Nexus\u202f: A Service-Learning Approach. Kendall Hunt. Marifran Mattson and Jennifer Gibb Hall. 2011. Health as Communication Nexus\u202f: A Service-Learning Approach. Kendall Hunt."},{"key":"e_1_2_1_75_1","volume-title":"Retrieved","author":"McCammon Sarah","year":"2018"},{"key":"e_1_2_1_76_1","volume-title":"Retrieved","author":"McCammon Sarah","year":"2018"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765950"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466248"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/1473325012464383"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819959"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461445606061876"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958876"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2743049"},{"key":"e_1_2_1_84_1","volume-title":"Responding to Young People Disclosing Sexual Assault: A Resource For Schools","author":"Quadara Antonia"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650206296084"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2009.01353.x"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02506992"},{"key":"e_1_2_1_88_1","volume-title":"Online Deliberation: Design, Research, and Practice","author":"Rhee June Woong"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025921"},{"key":"e_1_2_1_90_1","first-page":"27","article-title":"The \u201chelper\u201d therapy principle","volume":"10","author":"Riessman Frank","year":"1965","journal-title":"Social Work"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1177\/1754073908097189"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1359-1789(99)00011-7"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.06.006"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998246"},{"key":"e_1_2_1_95_1","volume-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media.","author":"Schoenebeck Sarita Yardi","year":"2013"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1188\/02.CJON.219-222"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998221"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858109"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.6.1061"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441865"},{"key":"e_1_2_1_101_1","volume-title":"Staller and Debra Nelson-Gardell","author":"Karen","year":"2005"},{"key":"e_1_2_1_102_1","first-page":"321","article-title":"The online disinhibition effect. Cyberpsychology 8 Behavior\u202f","volume":"7","author":"Suler John","year":"2004","journal-title":"The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/08824099609362085"},{"key":"e_1_2_1_104_1","volume-title":"Tichon and Margaret Shapiro","author":"Jennifer","year":"2003"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1300\/J070v16n01_02"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1359-1789(98)00006-8"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1300\/J070v12n01_05"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1111\/1471-6402.t01-2-00006"},{"key":"e_1_2_1_109_1","volume-title":"Upvoting the audience: A Burkean analysis of Reddit","author":"Urbanski Doug"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820010"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3558"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145329"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02506983"},{"key":"e_1_2_1_114_1","unstructured":"Reddit API. Retrieved from http:\/\/www.reddit.com\/dev\/api. Reddit API. Retrieved from http:\/\/www.reddit.com\/dev\/api."}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3234942","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3234942","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3234942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:20Z","timestamp":1750210760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3234942"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":114,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10,31]]}},"alternative-id":["10.1145\/3234942"],"URL":"https:\/\/doi.org\/10.1145\/3234942","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"value":"1073-0516","type":"print"},{"value":"1557-7325","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]},"assertion":[{"value":"2017-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}