{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T05:56:47Z","timestamp":1776146207923,"version":"3.50.1"},"reference-count":90,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>Authenticity, generally regarded as coherence between one's inner self and outward behavior, is associated with myriad social values (e.g., integrity) and beneficial outcomes, such as psychological well-being. Scholarship suggests, however, that behaving authentically online is complicated by self-presentation norms that make it difficult to present a complex self as well as encourage sharing positive emotions and facets of self and discourage sharing difficult emotions. In this paper, we position authenticity as a self-presentation norm and identify the sociomaterial factors that contribute to the learning, enactment, and enforcement of authenticity on the short-video sharing platform TikTok. We draw on interviews with 15 U.S. TikTok users to argue that normative authenticity and understanding of TikTok as a \"fun\" platform are mutually constitutive in supporting a \"just be you\" attitude on TikTok that in turn normalizes expressions of both positive and difficult emotions and experiences. We consider the social context of TikTok and use an affordance lens to identify anonymity, of oneself and one's audience; association between content and the \"For You\" landing page; and video modality of TikTok as factors informing authenticity as a self-presentation norm. We argue that these factors similarly contribute to TikTok's viability as a space for social support exchange and address the utility of the comments section as a site for both supportive communication and norm judgment and enforcement. We conclude by considering the limitations of authenticity as social norm and present implications for designing online spaces for social support and connection.<\/jats:p>","DOI":"10.1145\/3479574","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:46:19Z","timestamp":1634611579000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":112,"title":["Constructing Authenticity on TikTok: Social Norms and Social Support on the \"Fun\" Platform"],"prefix":"10.1145","volume":"5","author":[{"given":"Kristen","family":"Barta","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Nazanin","family":"Andalibi","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386600"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173732"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241044"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449201"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234942"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468--2885.1998.tb00226.x"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1437204"},{"key":"e_1_2_1_8_1","volume-title":"Carl Rogers' Helping System: Journey and Substance","author":"Barrett-Lennard Godfrey T.","unstructured":"Godfrey T. Barrett-Lennard. 1998. Carl Rogers' Helping System: Journey and Substance. Sage, London, UK."},{"key":"e_1_2_1_9_1","unstructured":"Kristen Barta. 2019. Reclaiming Publicness in the Face of Sexual Assault: Social Media Disclosure and Visibility (Communication). PhD Dissertation. University of Washington Seattle WA."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-010419-050944"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675297"},{"key":"e_1_2_1_12_1","unstructured":"Elena Botella. 4 Dec 2019. TikTok admits it suppressed videos by disabled queer and fat creators. Slate. Retrieved from https:\/\/slate.com\/technology\/2019\/12\/tiktok-disabled-users-videos-suppressed.html"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518847"},{"key":"e_1_2_1_14_1","volume-title":"MacGeorge","author":"Burleson R.","year":"2002","unstructured":"Brant. R. Burleson and Erina L. MacGeorge. 2002. Supportive communication. In Handbook of Interpersonal Communication, 3rd ed., Mark L. Knapp and John A. Daly, Eds. Sage, Thousand Oaks, CA, 374--424.","edition":"3"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/15456870.2015.972282"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.087"},{"key":"e_1_2_1_17_1","volume-title":"Trost","author":"Cialdini Robert B.","year":"1998","unstructured":"Robert B. Cialdini and Melanie R. Trost. 1998. Social influence: Social norms, conformity and compliance. In The Handbook of Social Psychology, Daniel T. Gilbert, Susan T. Fiske, and Gardner Lindzey (Eds.). McGraw Hill, Boston, MA, 151--192."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467617714944"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313033"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116670673"},{"key":"e_1_2_1_21_1","volume-title":"The Oxford Handbook of Internet Studies","author":"Nicole","unstructured":"Nicole B. Ellison and danah m. boyd. (2013). Sociality through social network sites. In The Oxford Handbook of Internet Studies. Oxford University Press, Oxford, UK, 151--172."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12180"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872675400700202"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797611429709"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2017.1332418"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v20i1.4985"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/13632541011064526"},{"key":"e_1_2_1_28_1","volume-title":"Strauss","author":"Glaser Barney G.","year":"1967","unstructured":"Barney G. Glaser and Ansel L. Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine, Chicago, IL."},{"key":"e_1_2_1_29_1","volume-title":"Communicating Social Support","author":"Goldsmith Daena J.","unstructured":"Daena J. Goldsmith. 2004. Communicating Social Support. Cambridge University Press, Cambridge, UK."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2011.642401"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v18i4.4269"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i6.6791"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/15295039309366848"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2015.1127248"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Natalie Ann Hendry. 2020. Young women's mental illness and (in-)visible social media practices of control and emotional recognition. Social Media + Society 6 4. DOI: https:\/\/doi.org\/10.1177\/2056305120963832","DOI":"10.1177\/2056305120963832"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12008"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/13675494030063008"},{"key":"e_1_2_1_39_1","unstructured":"How TikTok recommends videos #ForYou. 18 June 2020. TikTok. Retrieved from https:\/\/newsroom.tiktok.com\/en-us\/how-tiktok-recommends-videos-for-you"},{"key":"e_1_2_1_40_1","volume-title":"Sociology: A Systematic Introduction. Harcourt, Brace and World","author":"Johnson Harry M.","year":"1960","unstructured":"Harry M. Johnson. 1960. Sociology: A Systematic Introduction. Harcourt, Brace and World, New York, NY."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/gpr0000157"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/1367549417722092"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476046"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/1367549420945341"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(06)38006-9"},{"key":"e_1_2_1_46_1","volume-title":"Kraut and Paul Resnick","author":"Robert","year":"2011","unstructured":"Robert E. Kraut and Paul Resnick. 2011. Building Successful Online Communities: Evidence-based Social Design. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/1556035X.2015.1066725"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.014"},{"key":"e_1_2_1_49_1","volume-title":"Self-presentation: Impression Management and Interpersonal Behavior","author":"Leary Mark R.","year":"1996","unstructured":"Mark R. Leary. 1996. Self-presentation: Impression Management and Interpersonal Behavior. Westview Press, Boulder, CO."},{"key":"e_1_2_1_50_1","volume-title":"Leary and June Price Tangney","author":"Mark","year":"2003","unstructured":"Mark R. Leary and June Price Tangney. 2003. The self as an organizing construct in the behavioral and social sciences. In Handbook of Self and Identity, Mark R. Leary and June Price Tangney (Eds.). Guilford Press, New York, NY, 3--14."},{"key":"e_1_2_1_51_1","volume-title":"Taylor","author":"Lindlof Thomas R.","year":"2011","unstructured":"Thomas R. Lindlof and Bryan C. Taylor. 2011. Qualitative Communication Research Methods (3rd ed). Sage, Los Angeles, CA."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.705195"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.053"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025956"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"e_1_2_1_56_1","unstructured":"Megan McCluskey. 22 July 2020. Black TikTok creators say their content is being suppressed. Time. Retrieved from https:\/\/time.com\/5863350\/tiktok-black-creators\/"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811412712"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460--2466.1999.tb02821.x"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1108\/13632541011064508"},{"key":"e_1_2_1_60_1","unstructured":"Our mission. 2020. TikTok. Retrieved from https:\/\/www.tiktok.com\/about?lang=en"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/0090552685163011"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468--2958.2000.tb00761.x"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083--6101.2007.00380.x"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.030"},{"key":"e_1_2_1_65_1","volume-title":"Exclusive: U.S. opens national security investigation into TikTok - sources","author":"Roumeliotis Greg","year":"2019","unstructured":"Greg Roumeliotis, Yingzhi Yang, Echo Wang, and Alexandra Alper. 1 Nov. 2019. Exclusive: U.S. opens national security investigation into TikTok - sources. Reuters. Retrieved from https:\/\/www.reuters.com\/article\/us-tiktok-cfius-exclusive\/exclusive-u-s-opens-national-security-investigation-into-tiktok-sources-idUSKBN1XB4IL"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820066"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794104041109"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.73.6.1380"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432951"},{"key":"e_1_2_1_70_1","unstructured":"Susan Sontag. 1977. On Photography. Farrar Straus and Giroux United Kingdom."},{"key":"e_1_2_1_71_1","volume-title":"Handbook of Qualitative Research","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet Corbin. 1994. Grounded theory methodology-an overview. In Handbook of Qualitative Research, Norman K. Denzin and Yvonna S. Lincoln (Eds). Sage, Thousand Oaks, CA, 273--285."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022146510395592"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2129853"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543164"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","unstructured":"Sonya Utz. 2011. Social network site use among Dutch students: Effects of time and platform. In Networked Sociability and Individualism: Technology for Personal and Professional Relationships Francesca Comunello (Ed.) IGI Global 103--125. DOI: https:\/\/doi.org\/10.4018\/978--1--61350--338--6.ch006","DOI":"10.4018\/978--1--61350--338--6.ch006"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2014.989251"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","unstructured":"Jessica Vitak and Jinyoung Kim. 2014. \"'You can't block people offline.\" In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '14) February 15--19 2014 Baltimore MD USA. ACM New York NY 461--474. DOI: https:\/\/doi.org\/10.1145\/2531602.2531672","DOI":"10.1145\/2531602.2531672"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000047"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/146144481770734"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","unstructured":"Gabriel Weimann and Natalie Masri. 2020. Research note: Spreading hate on TikTok. Studies in Conflict and Terrorism 14 pages. DOI: https:\/\/doi.org\/10.1080\/1057610X.2020.1780027","DOI":"10.1080\/1057610X.2020.1780027"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.141954"},{"key":"e_1_2_1_83_1","volume-title":"Langdon Winner (Ed","author":"Winner Langdon","unstructured":"Langdon Winner. 1986. Do artifacts have politics? In In the Whale and the Reactor: A Search for Limits in an Age of High Technology, Langdon Winner (Ed.) University of Chicago Press, Chicago, IL, 19--39."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.55.3.385"},{"key":"e_1_2_1_85_1","volume-title":"Amy Janan Johnson","author":"Wright Kevin B.","year":"2011","unstructured":"Kevin B. Wright, Amy Janan Johnson, Daniel R. Bernard, and Joshua Averbeck. 2011. Computer-mediated social support: Promises and pitfalls for individuals coping with health concerns. In The Routledge Handbook of Health Communication (2nd ed.), Teresa L. Thompson, Roxanne Parrott, and Jon F. Nussbaum (Eds.). Routledge, New York, NY, 349--362."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376424"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1111\/jora.12376"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858333"},{"key":"e_1_2_1_89_1","unstructured":"Raymond Zhong and Sheera Frenkel. 2020. A third of TikTok's U.S. users may be 14 or under raising safety questions. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2020\/08\/14\/technology\/tiktok-underage-users-ftc.html"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17010192"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479574","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:05:51Z","timestamp":1752469551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":90,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3479574"],"URL":"https:\/\/doi.org\/10.1145\/3479574","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}