{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:51:04Z","timestamp":1776099064108,"version":"3.50.1"},"reference-count":102,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>Anonymity plays a crucial role in social interactions online. Recently, a new phenomenon has emerged on Chinese social platforms where users collectively adopt a uniform avatar and nickname ''momo'', thereby achieving anonymity. However, understanding such spontaneous collective anonymity within Chinese cultural and contextual factors remains limited since much of the anonymity research focuses on Western users. Yet, it is unclear how users perceive the usage of ''momo'', their motivations, and how using this collective anonymity impacts their social interaction. To answer these questions, we conducted interviews with 20 ''momo'' users. We found that the shared identity ''momo'' provides an additional layer of anonymity on identity-constrained Chinese social platforms. Users adopted ''momo'' to engage in more inclusive discussions and to balance anonymity and self-presentation. Moreover, this collective anonymity fosters connections and forms a meaningful group identity in a loosely organized community. We also identified the benefits and risks associated with this unique collective anonymity. This work makes significant contributions to CSCW and HCI research by (1) extending the knowledge of anonymity practices and privacy concerns within non-Western and mainly Chinese contexts. (2) advancing the work on anonymity models by revealing the dual role of the Momo identity in facilitating collective anonymity and community bonds. (3) providing design implications to support future social technologies in identity design and anonymous communities.<\/jats:p>","DOI":"10.1145\/3710933","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T11:36:19Z","timestamp":1747740979000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Behind the Same Mask: Understanding the Practice of Spontaneous Collective Anonymity on Chinese Social Platforms"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4014-0872","authenticated-orcid":false,"given":"Suqi","family":"Lou","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6068-5185","authenticated-orcid":false,"given":"Weijun","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4286-8468","authenticated-orcid":false,"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3577-5725","authenticated-orcid":false,"given":"Shi","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7761-6351","authenticated-orcid":false,"given":"Zhicong","family":"Lu","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"21jingji. 2022. '' Internet User Account Information Management Regulations'' released: Displaying IP location will become the norm. http:\/\/www.21jingji.com\/article\/20220628\/herald\/49ab24bfffe0c708657bf38c51f8badc.html."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0802_2"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173732"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234942nolinkurl10.1145\/3234942"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858096"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603163.3609064"},{"key":"e_1_2_1_7_1","volume-title":"Gentile","author":"Barlett Christopher P.","year":"2012","unstructured":"Christopher P. Barlett and Douglas A. Gentile. 2012. Attacking others online: The formation of cyberbullying in late adolescence. Psychology of popular media culture, Vol. 1 (2012), 123--135. https:\/\/api.semanticscholar.org\/CorpusID:35955131"},{"key":"e_1_2_1_8_1","volume-title":"Predicting Cyberbullying From Anonymity. Psychology of popular media culture","author":"Barlett Christopher P.","year":"2014","unstructured":"Christopher P. Barlett, Douglas A. Gentile, and Chelsea Chew. 2014. Predicting Cyberbullying From Anonymity. Psychology of popular media culture, Vol. 5 (2014), 171--180. https:\/\/api.semanticscholar.org\/CorpusID:146572082"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","author":"Bernstein Michael S.","year":"2011","unstructured":"Michael S. Bernstein, A. Monroy-Hern\u00e1ndez, Drew Harry, Paul Andr\u00e9, Katrina Panovich, and Greg Vargas. 2011. 4chan and \/b\/: An Analysis of Anonymity and Ephemerality in a Large Online Community. Proceedings of the International AAAI Conference on Web and Social Media (2011). https:\/\/api.semanticscholar.org\/CorpusID:6382252"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628406nolinkurl10.1145\/2628363.2628406"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702410"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_14_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_2_1_15_1","volume-title":"Thematic analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis.American Psychological Association."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2019.1628806"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/14780887.2020.1769238"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167291175001"},{"key":"e_1_2_1_19_1","unstructured":"Marilynn B. Brewer. 1993. The role of distinctiveness in social identity and group behaviour. https:\/\/api.semanticscholar.org\/CorpusID:119803551"},{"key":"e_1_2_1_20_1","volume-title":"Brewer and Cynthia Pickett","author":"Marilynn","year":"1999","unstructured":"Marilynn B. Brewer and Cynthia Pickett. 1999. Distinctiveness Motives as a Source of the Social Self. https:\/\/api.semanticscholar.org\/CorpusID:221592803"},{"key":"e_1_2_1_21_1","volume-title":"A worked example of Braun and Clarke's approach to reflexive thematic analysis. Quality & quantity","author":"Byrne David","year":"2022","unstructured":"David Byrne. 2022. A worked example of Braun and Clarke's approach to reflexive thematic analysis. Quality & quantity, Vol. 56, 3 (2022), 1391--1412."},{"key":"e_1_2_1_22_1","unstructured":"Daegon Cho and Alessandro Acquisti. 2013. The More Social Cues The Less Trolling? An Empirical Study of Online Commenting Behavior. https:\/\/api.semanticscholar.org\/CorpusID:660372"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193120nolinkurl10.1145\/3193120"},{"key":"e_1_2_1_24_1","volume-title":"Corbin and Anselm Strauss","author":"Juliet","year":"2008","unstructured":"Juliet M. Corbin and Anselm Strauss. 2008. Basics of Qualitative Research (3rd ed.): Techniques and Procedures for Developing Grounded Theory. https:\/\/api.semanticscholar.org\/CorpusID:67424455"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.2004.00477.x"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642194"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274313"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/joms.12139"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300372"},{"key":"e_1_2_1_30_1","first-page":"205630511667067","volume":"2","author":"Ellison Nicole B","year":"2016","unstructured":"Nicole B Ellison, Lindsay Blackwell, Cliff Lampe, and Penny Trieu. 2016. \u201dThe question exists, but you don't exist with it\u201d: Strategic anonymity in the social lives of adolescents. Social Media Society, Vol. 2, 4 (2016), 2056305116670673.","journal-title":"Strategic anonymity in the social lives of adolescents. Social Media Society"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958880nolinkurl10.1145\/1958824.1958880"},{"key":"e_1_2_1_32_1","unstructured":"Sylvain Firer-Blaess. 2016. The Collective Identity of Anonymous Web of Meanings in a Digitally Enabled Movement. https:\/\/api.semanticscholar.org\/CorpusID:148032145"},{"key":"e_1_2_1_33_1","unstructured":"A. Michael Froomkin. 2015. From Anonymity to Identification. https:\/\/api.semanticscholar.org\/CorpusID:155158654"},{"key":"e_1_2_1_34_1","volume-title":"Social Theory Re-Wired","author":"Goffman Erving","unstructured":"Erving Goffman. 2016. The presentation of self in everyday life. In Social Theory Re-Wired. Routledge, 482--493."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2005.15281426"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581410"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555775"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019nolinkurl10.1016\/j.ijhcs.2005.04.019"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185593nolinkurl10.1145\/3185593"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858415"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481368"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820081"},{"key":"e_1_2_1_43_1","volume-title":"Consequences of revealing personal secrets. Psychological bulletin","author":"Kelly Anita E","year":"1996","unstructured":"Anita E Kelly and Kevin J McKillop. 1996. Consequences of revealing personal secrets. Psychological bulletin, Vol. 120, 3 (1996), 450."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.01.002nolinkurl10.1016\/j.chb.2011.01.002"},{"key":"e_1_2_1_45_1","first-page":"79","article-title":"Assessing Anonymous Communication on the Internet","volume":"15","author":"Kling Rob","year":"1999","unstructured":"Rob Kling, Ya-Ching Lee, Albert H. Teich, and Mark S. Frankel. 1999. Assessing Anonymous Communication on the Internet: Policy Deliberations. Inf. Soc., Vol. 15 (1999), 79--90. https:\/\/api.semanticscholar.org\/CorpusID:10072072","journal-title":"Policy Deliberations. Inf. Soc."},{"key":"e_1_2_1_46_1","volume-title":"User unknown: 4chan, anonymity and contingency. First Monday","author":"Knuttila Lee","year":"2011","unstructured":"Lee Knuttila. 2011. User unknown: 4chan, anonymity and contingency. First Monday (2011)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134697"},{"key":"e_1_2_1_48_1","volume-title":"Konstan","author":"Kraut Robert E.","year":"2012","unstructured":"Robert E. Kraut, Paul Resnick, Sara B. Kiesler, Yuqing Ren, Yan Chen, Moira Burke, Niki Kittur, John Riedl, and Joseph A. Konstan. 2012. Building Successful Online Communities: Evidence-Based Social Design. https:\/\/api.semanticscholar.org\/CorpusID:153091358"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.014nolinkurl10.1016\/j.chb.2011.10.014"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.09.004nolinkurl10.1016\/j.chb.2011.09.004"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675175"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445222"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610070nolinkurl10.1145\/3610070"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.18848\/1832-3669\/CGP\/v09i02\/56379"},{"key":"e_1_2_1_56_1","volume-title":"Pursuit of Perceived Anonymity through a Uniform Visual Presentation on Algorithm-driven Social Media Platforms.","author":"Li Qianyi","year":"2024","unstructured":"Qianyi Li, Mingxin Zhang, Dilang Tan, Libo Liu, and Yixin Zhang. 2024. \u201dHiding in the Crowd?\u201d In Pursuit of Perceived Anonymity through a Uniform Visual Presentation on Algorithm-driven Social Media Platforms. (2024)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531646"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134707"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025956"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858414"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--42286--729nolinkurl10.1007\/978--3-031--42286--729"},{"key":"e_1_2_1_62_1","volume-title":"The Self-Reinforcing Nature of Social Hierarchy: Origins and Consequences of Power and Status. IACM 2008 Chicago Conference (Archive)","author":"Joe","year":"2008","unstructured":"Joe C. Magee and Adam D. Galinsky. 2008. The Self-Reinforcing Nature of Social Hierarchy: Origins and Consequences of Power and Status. IACM 2008 Chicago Conference (Archive) (2008). https:\/\/api.semanticscholar.org\/CorpusID:140985517"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3573793"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128565"},{"key":"e_1_2_1_65_1","unstructured":"Jorge Nathan Matias. 2016. The Civic Labor of Online Moderators. https:\/\/api.semanticscholar.org\/CorpusID:14711263"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641999"},{"key":"e_1_2_1_67_1","unstructured":"MITtechnologyreview. 2023. How 2023 marked the death of anonymity online in China. https:\/\/www.technologyreview.com\/2023\/12\/22\/1085820\/death-of-anonymity-online-china\/."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372923.3404792"},{"key":"e_1_2_1_69_1","unstructured":"news.cctv. 2021. The Cyberspace Administration of China released the '' Regulations on the Management of Internet User Account Name Information'' . https:\/\/news.cctv.com\/2021\/10\/26\/ARTIN7yHD8TRLeqeA8GtDohF211026.shtml."},{"key":"e_1_2_1_70_1","volume-title":"Why Do People Sometimes Wear an Anonymous Mask? Motivations for Seeking Anonymity Online. Personality and Social Psychology Bulletin","author":"Nitschinsk Lewis","year":"2023","unstructured":"Lewis Nitschinsk, Stephanie J Tobin, Deanna Varley, and Eric J Vanman. 2023. Why Do People Sometimes Wear an Anonymous Mask? Motivations for Seeking Anonymity Online. Personality and Social Psychology Bulletin (2023), 01461672231210465."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517700"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2007.27169153"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445353"},{"key":"e_1_2_1_74_1","volume-title":"Breaching or building social boundaries? SIDE-effects of computer-mediated communication. Communication research","author":"Postmes Tom","year":"1998","unstructured":"Tom Postmes, Russell Spears, and Martin Lea. 1998. Breaching or building social boundaries? SIDE-effects of computer-mediated communication. Communication research, Vol. 25, 6 (1998), 689--715."},{"key":"e_1_2_1_75_1","volume-title":"A social identity model of deindividuation phenomena. European review of social psychology","author":"Reicher Stephen D","year":"1995","unstructured":"Stephen D Reicher, Russell Spears, and Tom Postmes. 1995. A social identity model of deindividuation phenomena. European review of social psychology, Vol. 6, 1 (1995), 161--198."},{"key":"e_1_2_1_76_1","unstructured":"Rest of World. 2023. Why thousands of young Chinese people use a pink dinosaur as their alias. https:\/\/restofworld.org\/2023\/social-media-privacy-momo-dinosaur\/."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025921nolinkurl10.1145\/3025453.3025921"},{"key":"e_1_2_1_78_1","volume-title":"The 2021 Yearbook of the Digital Ethics Lab","author":"Roberts Huw","unstructured":"Huw Roberts. 2022. Informational Privacy with Chinese Characteristics. In The 2021 Yearbook of the Digital Ethics Lab. Springer, 9--23."},{"key":"e_1_2_1_79_1","volume-title":"Sampling in interview-based qualitative research: A theoretical and practical guide. Qualitative research in psychology","author":"Robinson Oliver C","year":"2014","unstructured":"Oliver C Robinson. 2014. Sampling in interview-based qualitative research: A theoretical and practical guide. Qualitative research in psychology, Vol. 11, 1 (2014), 25--41."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610027"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3361855"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274771"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2013.03.017"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134920"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_2_1_88_1","volume-title":"The Online Disinhibition Effect. Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society","author":"Suler John","year":"2004","unstructured":"John Suler. 2004. The Online Disinhibition Effect. Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society, Vol. 7 3 (2004), 321--6. https:\/\/api.semanticscholar.org\/CorpusID:8136203"},{"key":"e_1_2_1_89_1","unstructured":"tagesschau. 2023. A pink dinosaur is shaking up the Chinese internet. https:\/\/www.tagesschau.de\/ausland\/asien\/china-dino-momo-internet-100.html."},{"key":"e_1_2_1_90_1","unstructured":"thepaper. 2023. Be cautious about '' hang people out'' online. https:\/\/www.thepaper.cn\/newsDetail_forward21791524."},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663728nolinkurl10.1145\/2663716.2663728"},{"key":"e_1_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Yang Wang Gregory Norcie and Lorrie Faith Cranor. 2011. Who Is Concerned about What? A Study of American Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper). In Trust and Trustworthy Computing. https:\/\/api.semanticscholar.org\/CorpusID:7959926","DOI":"10.1007\/978-3-642-21599-5_11"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819941"},{"key":"e_1_2_1_96_1","volume-title":"The Coding Manual for Qualitative Researchers","author":"Wicks David","year":"2017","unstructured":"David Wicks. 2017. The Coding Manual for Qualitative Researchers (3rd edition). Qualitative Research in Organizations and Management: An International Journal, Vol. 12 (2017), 169--170. https:\/\/api.semanticscholar.org\/CorpusID:148691613","edition":"3"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300390"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1080\/14672715.2019.1656538"},{"key":"e_1_2_1_99_1","volume-title":"Traffic scale, user distribution, and content ecology of mainstream social media platforms","year":"2022","unstructured":"www.lmtw.com. 2022. Traffic scale, user distribution, and content ecology of mainstream social media platforms in 2022. https:\/\/lmtw.com\/mzw\/content\/detail\/id\/214701."},{"key":"e_1_2_1_100_1","unstructured":"www.thepaper.cn. 2023. In order to be '' invisible'' on the Internet this generation of young people collectively changed into the same pink avatar. https:\/\/www.thepaper.cn\/newsDetail_forward23120545."},{"key":"e_1_2_1_101_1","unstructured":"Zhihu. 2023. Zhihu '' anonymous function'' offline announcement. https:\/\/zhuanlan.zhihu.com\/p\/642161677."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637415"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3710933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:22:15Z","timestamp":1755768135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":102,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3710933"],"URL":"https:\/\/doi.org\/10.1145\/3710933","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}