{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:55:11Z","timestamp":1776110111602,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":103,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642241","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Mitigating Barriers to Public Social Interaction with Meronymous Communication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8846-2098","authenticated-orcid":false,"given":"Nouran","family":"Soliman","sequence":"first","affiliation":[{"name":"CSAIL, Massachusetts Institute of Technology, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1990-2050","authenticated-orcid":false,"given":"Hyeonsu B","family":"Kang","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-1277","authenticated-orcid":false,"given":"Matthew","family":"Latzke","sequence":"additional","affiliation":[{"name":"Allen Institute for AI, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5460-9047","authenticated-orcid":false,"given":"Jonathan","family":"Bragg","sequence":"additional","affiliation":[{"name":"Allen Institute for Artificial Intelligence, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0798-4351","authenticated-orcid":false,"given":"Joseph Chee","family":"Chang","sequence":"additional","affiliation":[{"name":"AI2, Allen Institute for AI, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9462-9835","authenticated-orcid":false,"given":"Amy Xian","family":"Zhang","sequence":"additional","affiliation":[{"name":"CSE, University of Washington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0024-5847","authenticated-orcid":false,"given":"David R","family":"Karger","sequence":"additional","affiliation":[{"name":"CSAIL, MIT, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"time, and personality: The human challenges to sharing scholarly work using Web 2.0. New media & society 15, 3","author":"Acord Sophia\u00a0Krzys","year":"2013","unstructured":"Sophia\u00a0Krzys Acord and Diane Harley. 2013. Credit, time, and personality: The human challenges to sharing scholarly work using Web 2.0. New media & society 15, 3 (2013), 379\u2013397."},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858096"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-018-9310-8"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(02)00007-9"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449230"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2012.01664.x"},{"key":"e_1_3_3_3_7_1","volume-title":"Faceted id\/entity: Managing representation in a digital world. Unpublished Master\u2019s Thesis","author":"Boyd Danah","year":"2002","unstructured":"Danah Boyd. 2002. Faceted id\/entity: Managing representation in a digital world. Unpublished Master\u2019s Thesis. Cambridge, MA: MIT (2002)."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441915"},{"key":"e_1_3_3_3_9_1","volume-title":"The academic caste system: Prestige hierarchies in PhD exchange networks. American sociological review 69, 2","author":"Burris Val","year":"2004","unstructured":"Val Burris. 2004. The academic caste system: Prestige hierarchies in PhD exchange networks. American sociological review 69, 2 (2004), 239\u2013264."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393647"},{"key":"e_1_3_3_3_11_1","volume-title":"Systematic inequality and hierarchy in faculty hiring networks. Science advances 1, 1","author":"Clauset Aaron","year":"2015","unstructured":"Aaron Clauset, Samuel Arbesman, and Daniel\u00a0B Larremore. 2015. Systematic inequality and hierarchy in faculty hiring networks. Science advances 1, 1 (2015), e1400005."},{"key":"e_1_3_3_3_12_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media, Vol.\u00a09. 71\u201380","author":"Correa Denzil","year":"2015","unstructured":"Denzil Correa, Leandro Silva, Mainack Mondal, Fabr\u00edcio Benevenuto, and Krishna Gummadi. 2015. The many shades of anonymity: Characterizing anonymous social media content. In Proceedings of the International AAAI Conference on Web and Social Media, Vol.\u00a09. 71\u201380."},{"key":"e_1_3_3_3_13_1","volume-title":"Context collapse: Theorizing context collusions and collisions. Information, communication & society 17, 4","author":"Davis L","year":"2014","unstructured":"Jenny\u00a0L Davis and Nathan Jurgenson. 2014. Context collapse: Theorizing context collusions and collisions. Information, communication & society 17, 4 (2014), 476\u2013485."},{"key":"e_1_3_3_3_14_1","volume-title":"Receiving competence-relevant help: Effects on reciprocity, affect, and sensitivity to the helper\u2019s nonverbally expressed needs.Journal of Personality and Social Psychology 45, 5","author":"DePaulo M","year":"1983","unstructured":"Bella\u00a0M DePaulo, Gregory\u00a0L Brittingham, and Mary\u00a0K Kaiser. 1983. Receiving competence-relevant help: Effects on reciprocity, affect, and sensitivity to the helper\u2019s nonverbally expressed needs.Journal of Personality and Social Psychology 45, 5 (1983), 1045."},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15324834basp0101_3"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958844"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316682"},{"key":"e_1_3_3_3_18_1","unstructured":"Judith\u00a0S Donath. 1999. Identity and deception in the virtual community. InCommunities in cyberspace eds. MA Smith and P. Kollock."},{"key":"e_1_3_3_3_19_1","volume-title":"Asking a child for help. Social Behavior and Personality: an international journal 5, 1","author":"Druian R","year":"1977","unstructured":"Peter\u00a0R Druian and Bella\u00a0M DePaulo. 1977. Asking a child for help. Social Behavior and Personality: an international journal 5, 1 (1977), 33\u201339."},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"crossref","unstructured":"Stefanie Duguay. 2016. \u201cHe has a way gayer Facebook than I do\u201d: Investigating sexual identity disclosure and context collapse on a social networking site. New media & society 18 6 (2016) 891\u2013907.","DOI":"10.1177\/1461444814549930"},{"key":"e_1_3_3_3_21_1","volume-title":"Anonymity and Identity Online. slides presented at NBER Summer Institute 20","author":"Ederer Florian","year":"2023","unstructured":"Florian Ederer, Paul Goldsmith-Pinkham, and Kyle Jensen. 2023. Anonymity and Identity Online. slides presented at NBER Summer Institute 20 (2023)."},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702556"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2652524.2652540"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24458"},{"key":"e_1_3_3_3_25_1","volume-title":"Diversity in open source is even worse than in tech overall. Wired Magazine Website","author":"Finley Klint","year":"2017","unstructured":"Klint Finley. 2017. Diversity in open source is even worse than in tech overall. Wired Magazine Website (2017)."},{"key":"e_1_3_3_3_26_1","volume-title":"Recipient reactions to aid.Psychological bulletin 91, 1","author":"Fisher D","year":"1982","unstructured":"Jeffrey\u00a0D Fisher, Arie Nadler, and Sheryle Whitcher-Alagna. 1982. Recipient reactions to aid.Psychological bulletin 91, 1 (1982), 27."},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950331"},{"key":"e_1_3_3_3_28_1","volume-title":"Examining the relationship between reviews and sales: The role of reviewer identity disclosure in electronic markets. Information systems research 19, 3","author":"Forman Chris","year":"2008","unstructured":"Chris Forman, Anindya Ghose, and Batia Wiesenfeld. 2008. Examining the relationship between reviews and sales: The role of reviewer identity disclosure in electronic markets. Information systems research 19, 3 (2008), 291\u2013313."},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.2014.0300"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702395"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449215"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858364"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764212469365"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038558.2038585"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985709"},{"key":"e_1_3_3_3_36_1","unstructured":"Diane Harley Sophia\u00a0Krzys Acord Sarah Earl-Novell Shannon Lawrence and C\u00a0Judson King. 2010. Assessing the future landscape of scholarly communication: An exploration of faculty values and needs in seven disciplines. (2010)."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C57518.2022.00028"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2020.1769682"},{"key":"e_1_3_3_3_39_1","volume-title":"Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy 32, 7","author":"Hertel Guido","year":"2003","unstructured":"Guido Hertel, Sven Niedner, and Stefanie Herrmann. 2003. Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy 32, 7 (2003), 1159\u20131177."},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145331"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820081"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12428"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0229446"},{"key":"e_1_3_3_3_44_1","volume-title":"\u2018To tweet or not to tweet?\u2019A comparison of academics","author":"Knight G","year":"2016","unstructured":"Charles\u00a0G Knight and Linda\u00a0K Kaye. 2016. \u2018To tweet or not to tweet?\u2019A comparison of academics\u2019 and students\u2019 usage of Twitter in academic contexts. Innovations in education and teaching international 53, 2 (2016), 145\u2013155."},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1118"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.45"},{"key":"e_1_3_3_3_47_1","volume-title":"Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior 28, 2","author":"Lapidot-Lefler Noam","year":"2012","unstructured":"Noam Lapidot-Lefler and Azy Barak. 2012. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior 28, 2 (2012), 434\u2013443."},{"key":"e_1_3_3_3_48_1","volume-title":"The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization. Computers in human behavior 28, 1","author":"Law M","year":"2012","unstructured":"Danielle\u00a0M Law, Jennifer\u00a0D Shapka, Shelley Hymel, Brent\u00a0F Olson, and Terry Waterhouse. 2012. The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization. Computers in human behavior 28, 1 (2012), 226\u2013232."},{"key":"e_1_3_3_3_49_1","volume-title":"Proceedings of the 18th ACM conference on computer supported cooperative work & social computing. 317\u2013327","author":"Leavitt Alex","year":"2015","unstructured":"Alex Leavitt. 2015. \" This is a Throwaway Account\" Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community. In Proceedings of the 18th ACM conference on computer supported cooperative work & social computing. 317\u2013327."},{"key":"e_1_3_3_3_50_1","volume-title":"When the going gets tough, do the tough ask for help? Help seeking and power motivation in organizations. Organizational behavior and human decision processes 72, 3","author":"Lee Fiona","year":"1997","unstructured":"Fiona Lee. 1997. When the going gets tough, do the tough ask for help? Help seeking and power motivation in organizations. Organizational behavior and human decision processes 72, 3 (1997), 336\u2013363."},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/0021886302381002"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/09523987.2015.1005426"},{"key":"e_1_3_3_3_53_1","volume-title":"Early coauthorship with top scientists predicts success in academic careers. Nature communications 10, 1","author":"Li Weihua","year":"2019","unstructured":"Weihua Li, Tomaso Aste, Fabio Caccioli, and Giacomo Livan. 2019. Early coauthorship with top scientists predicts success in academic careers. Nature communications 10, 1 (2019), 5170."},{"key":"e_1_3_3_3_54_1","volume-title":"Untangling the network effects of productivity and prominence among scientists. Nature communications 13, 1","author":"Li Weihua","year":"2022","unstructured":"Weihua Li, Sam Zhang, Zhiming Zheng, Skyler\u00a0J Cranmer, and Aaron Clauset. 2022. Untangling the network effects of productivity and prominence among scientists. Nature communications 13, 1 (2022), 4907."},{"key":"e_1_3_3_3_55_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 5, CSCW1","author":"Liu Michael\u00a0Xieyang","year":"2021","unstructured":"Michael\u00a0Xieyang Liu, Aniket Kittur, and Brad\u00a0A Myers. 2021. To reuse or not to reuse? A framework and system for evaluating summarized knowledge. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1\u201335."},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361119"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858414"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174160"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41239-019-0166-x"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.049"},{"key":"e_1_3_3_3_61_1","volume-title":"I tweet passionately: Twitter users, context collapse, and the imagined audience. New media & society 13, 1","author":"Marwick E","year":"2011","unstructured":"Alice\u00a0E Marwick and Danah Boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New media & society 13, 1 (2011), 114\u2013133."},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180241"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702514"},{"key":"e_1_3_3_3_65_1","volume-title":"No sense of place: The impact of electronic media on social behavior","author":"Meyrowitz Joshua","unstructured":"Joshua Meyrowitz. 1986. No sense of place: The impact of electronic media on social behavior. Oxford University Press."},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753587"},{"key":"e_1_3_3_3_67_1","volume-title":"7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17)","author":"Nekrasov Michael","year":"2017","unstructured":"Michael Nekrasov, Daniel Iland, Miriam Metzger, Ben Zhao, and Elizabeth Belding. 2017. { SecurePost} : Verified { Group-Anonymity} on Social Media. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17)."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958876"},{"key":"e_1_3_3_3_69_1","article-title":"The impact of synchronicity and civility in online political discussions on perceptions and intentions to participate","volume":"10","author":"Ng WJ","year":"2005","unstructured":"Elaine\u00a0WJ Ng and Benjamin\u00a0H Detenber. 2005. The impact of synchronicity and civility in online political discussions on perceptions and intentions to participate. Journal of Computer-Mediated Communication 10, 3 (2005), JCMC1033.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531706"},{"key":"e_1_3_3_3_71_1","volume-title":"Membership herding and network stability in the open source community: The Ising perspective. Management science 53, 7","author":"Oh Wonseok","year":"2007","unstructured":"Wonseok Oh and Sangyong Jeon. 2007. Membership herding and network stability in the open source community: The Ising perspective. Management science 53, 7 (2007), 1086\u20131101."},{"key":"e_1_3_3_3_72_1","volume-title":"edu: Academic social networks. Behavioral & social sciences librarian 33, 3","author":"Ovadia Steven","year":"2014","unstructured":"Steven Ovadia. 2014. ResearchGate and Academia. edu: Academic social networks. Behavioral & social sciences librarian 33, 3 (2014), 165\u2013169."},{"key":"e_1_3_3_3_73_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media, Vol.\u00a05. 578\u2013581","author":"Paul Sharoda","year":"2011","unstructured":"Sharoda Paul, Lichan Hong, and Ed Chi. 2011. Is twitter a good place for asking questions? a characterization study. In Proceedings of the International AAAI Conference on Web and Social Media, Vol.\u00a05. 578\u2013581."},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660467"},{"key":"e_1_3_3_3_75_1","volume-title":"The formation of group norms in computer-mediated communication. Human communication research 26, 3","author":"Postmes Tom","year":"2000","unstructured":"Tom Postmes, Russell Spears, and Martin Lea. 2000. The formation of group norms in computer-mediated communication. Human communication research 26, 3 (2000), 341\u2013371."},{"key":"e_1_3_3_3_76_1","volume-title":"Metrics 2011 Symposium on Informetric and Scientometric Research","author":"Priem Jason","year":"2011","unstructured":"Jason Priem, Kaitlin Costello, and Tyler Dzuba. 2011. First-year graduate students just wasting time? Prevalence and use of Twitter among scholars. In Metrics 2011 Symposium on Informetric and Scientometric Research, New Orleans, LA, USA. Retrieved January, Vol.\u00a021. 2013."},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2010.0155"},{"key":"e_1_3_3_3_78_1","first-page":"171","article-title":"Scholarly blogging: A new form of publishing or science journalism 2.0","volume":"7","author":"Puschmann Cornelius","year":"2012","unstructured":"Cornelius Puschmann and Merja Mahrt. 2012. Scholarly blogging: A new form of publishing or science journalism 2.0. Science and the Internet 7 (2012), 171\u2013181.","journal-title":"Science and the Internet"},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2015.2488698"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675215"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884806"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23833"},{"key":"e_1_3_3_3_84_1","volume-title":"The online disinhibition effect. Cyberpsychology & behavior 7, 3","author":"Suler John","year":"2004","unstructured":"John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior 7, 3 (2004), 321\u2013326."},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1515\/libri-2018-0120"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.111"},{"key":"e_1_3_3_3_87_1","volume-title":"personal responsibility, and DIY protection: Frustrations and solution-seeking among marginalized Twitch streamers. Convergence","author":"Tomlinson Christine","year":"2023","unstructured":"Christine Tomlinson. 2023. Community Grievances, personal responsibility, and DIY protection: Frustrations and solution-seeking among marginalized Twitch streamers. Convergence (2023), 13548565231184060."},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819890353"},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415251"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407595124001"},{"key":"e_1_3_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2015.14"},{"key":"e_1_3_3_3_92_1","volume-title":"Scholars in an increasingly open and digital world: How do education professors and students use Twitter?The Internet and Higher Education 30","author":"Veletsianos George","year":"2016","unstructured":"George Veletsianos and Royce Kimmons. 2016. Scholars in an increasingly open and digital world: How do education professors and students use Twitter?The Internet and Higher Education 30 (2016), 1\u201310."},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732140"},{"key":"e_1_3_3_3_94_1","volume-title":"Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. 461\u2013474","author":"Vitak Jessica","year":"2014","unstructured":"Jessica Vitak and Jinyoung Kim. 2014. \" You can\u2019t block people offline\" examining how facebook\u2019s affordances shape the disclosure process. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. 461\u2013474."},{"key":"e_1_3_3_3_95_1","volume-title":"To seek help or not to seek help: The risks of self-disclosure.Journal of counseling psychology 50, 3","author":"Vogel L","year":"2003","unstructured":"David\u00a0L Vogel and Stephen\u00a0R Wester. 2003. To seek help or not to seek help: The risks of self-disclosure.Journal of counseling psychology 50, 3 (2003), 351."},{"key":"e_1_3_3_3_96_1","unstructured":"Thomas\u00a0A Wills. 1976. Perceptual Consequences of Helping Another Person. (1976)."},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781473978782"},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1257\/pandp.20181101"},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376424"},{"key":"e_1_3_3_3_100_1","volume-title":"Reviewer recommendation for pull-requests in GitHub: What can we learn from code review and bug assignment?Information and Software Technology 74","author":"Yu Yue","year":"2016","unstructured":"Yue Yu, Huaimin Wang, Gang Yin, and Tao Wang. 2016. Reviewer recommendation for pull-requests in GitHub: What can we learn from code review and bug assignment?Information and Software Technology 74 (2016), 204\u2013218."},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392871"},{"key":"e_1_3_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481311"},{"key":"e_1_3_3_3_103_1","volume-title":"Social media, science communication and the academic super user in the United Kingdom. First Monday","author":"Zhu Yimei","year":"2017","unstructured":"Yimei Zhu and Kingsley Purdam. 2017. Social media, science communication and the academic super user in the United Kingdom. First Monday (2017)."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:24Z","timestamp":1750290264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":103,"alternative-id":["10.1145\/3613904.3642241","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642241","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}