{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:05:42Z","timestamp":1767989142466,"version":"3.49.0"},"reference-count":38,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T00:00:00Z","timestamp":1523923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p> This study focuses on the perceptions and practices of anonymous communication with friends enabled by tie-based anonymous apps. Based on qualitative analysis of in-depth interviews with users of the application Secret, the strategies deployed by interviewees in order to de-anonymize other users are emphasized and placed within the broader context of the real-name web. The article shows that Secret was not only based on pre-existing social networks but also drew on the network as a structure of thought. The concept of networked anonymity is introduced to account for the ways that anonymous actors imagine one another as \u201csomeone,\u201d rather than as an unknown \u201canyone.\u201d As such, the survivability of this communicative model is inherently limited by competing forces\u2014the drive to connectivity, on the one hand, and to anonymity, on the other. <\/jats:p>","DOI":"10.1177\/1461444818768547","type":"journal-article","created":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T10:23:59Z","timestamp":1523960639000},"page":"4177-4194","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":23,"title":["Unpacking (the) secret: Anonymous social media and the impossibility of networked anonymity"],"prefix":"10.1177","volume":"20","author":[{"given":"Tzlil","family":"Sharon","sequence":"first","affiliation":[{"name":"The Hebrew University of Jerusalem, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9955-4120","authenticated-orcid":false,"given":"Nicholas A","family":"John","sequence":"additional","affiliation":[{"name":"The Hebrew University of Jerusalem, Israel"}]}],"member":"179","published-online":{"date-parts":[[2018,4,17]]},"reference":[{"key":"bibr1-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1998.tb00226.x"},{"key":"bibr2-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"bibr3-1461444818768547","doi-asserted-by":"crossref","unstructured":"Bernstein MS, Monroy-Hern\u00e1ndez A, Harry D, et al. (2011) 4chan and \/b\/: an analysis of anonymity and ephemerality in a large online community. In: Proceeding of the fifth international AAAI conference on weblogs and social media, pp. 50\u201357. Available at: https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM11\/paper\/viewFile\/2873\/4398","DOI":"10.1609\/icwsm.v5i1.14134"},{"key":"bibr4-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702410"},{"key":"bibr5-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.043"},{"key":"bibr6-1461444818768547","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"boyd d","year":"2014"},{"key":"bibr7-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"bibr8-1461444818768547","unstructured":"Coleman G (2011) Anonymous: from the lulz to collective action. The New Everyday. Available at: http:\/\/mediacommons.futureofthebook.org\/tne\/pieces\/anonymous-lulz-collective-action (accessed January 2016)."},{"key":"bibr9-1461444818768547","first-page":"71","volume-title":"Proceedings of the ninth AAAI international conference on web and social media","author":"Correa D","year":"2015"},{"key":"bibr10-1461444818768547","first-page":"29","volume-title":"Communities in Cyberspace","author":"Donath JS","year":"1998"},{"key":"bibr11-1461444818768547","first-page":"151","volume-title":"The Oxford Handbook of Internet Studies","author":"Ellison NB","year":"2013"},{"key":"bibr12-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1177\/146144804044331"},{"key":"bibr13-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1002\/9781118321607.ch18"},{"key":"bibr14-1461444818768547","volume-title":"The Age of Sharing","author":"John NA","year":"2016"},{"key":"bibr15-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820081"},{"key":"bibr16-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1177\/1461444806069641"},{"key":"bibr17-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116633482."},{"key":"bibr18-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025956"},{"key":"bibr19-1461444818768547","doi-asserted-by":"crossref","unstructured":"Ma X, Hancock J, Naaman M (2016) Anonymity, intimacy and self-disclosure in social media. In: Proceedings of the 2016 CHI conference on human factors in computing systems, San Jose, CA, 7\u201312 May 2016, pp. 3857\u20133869. Available at: https:\/\/s.tech.cornell.edu\/assets\/papers\/anonymity-intimacy-disclosure.pdf","DOI":"10.1145\/2858036.2858414"},{"key":"bibr20-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128565"},{"key":"bibr21-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.12.005"},{"key":"bibr22-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128592"},{"issue":"4","key":"bibr23-1461444818768547","first-page":"1","volume":"2","author":"Pandit NR","year":"1996","journal-title":"The Qualitative Report"},{"key":"bibr24-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1177\/14614440222226244"},{"key":"bibr25-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00380.x"},{"key":"bibr26-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1177\/0093650206296084"},{"key":"bibr27-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-1031(75)80025-4"},{"key":"bibr28-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1177\/016344300022001001"},{"key":"bibr29-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1080\/08997225.2004.10556309"},{"key":"bibr30-1461444818768547","first-page":"687","volume-title":"Proceedings of the tenth international conference on web and social media","author":"Silva LA","year":"2016"},{"key":"bibr31-1461444818768547","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"Strauss A","year":"1998"},{"key":"bibr32-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"bibr33-1461444818768547","volume-title":"Life on the Screen: Identity in the Age of the Internet","author":"Turkle S","year":"1995"},{"key":"bibr34-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1080\/24701475.2017.1389548"},{"key":"bibr35-1461444818768547","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v20i3.5615."},{"key":"bibr36-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199970773.001.0001"},{"key":"bibr37-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010066509278"},{"key":"bibr38-1461444818768547","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663728"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444818768547","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444818768547","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444818768547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T02:23:12Z","timestamp":1740795792000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444818768547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,17]]},"references-count":38,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1177\/1461444818768547"],"URL":"https:\/\/doi.org\/10.1177\/1461444818768547","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,17]]}}}