Social network migration and anonymity expectations: What anonymous social network apps offer

Abstract Social networking is not a new phenomenon, but what outlet people use continues to evolve. Recently, anonymous social networking applications (SNAs) have gained in popularity, particularly among young people who are reducing use of traditional social networking sites (SNSs). Anonymous SNAs prevent other users from identifying individuals, which is the most marketed appeal. Despite the popularity, little research investigates why people are moving from traditional SNSs to anonymous SNAs. Using migration theory, we consider the transition through push, pull, and mooring factors. Findings indicate social norms, not anonymity features, drive migration. These findings have important implications for developers and researchers.

[1]  Ronald E. Rice,et al.  Attribution accuracy when using anonymity in group support systems , 1997, Int. J. Hum. Comput. Stud..

[2]  F. Mishna,et al.  Ongoing and Online: Children and youth's perceptions of cyber bullying , 2009 .

[3]  David Davenport,et al.  Anonymity on the Internet: why the price may be too high , 2002, CACM.

[4]  John Hulland,et al.  Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .

[5]  Ben Y. Zhao,et al.  Whispers in the dark: analysis of an anonymous social network , 2014, Internet Measurement Conference.

[6]  R. MacCallum,et al.  THE APPLICATION OF EXPLORATORY FACTOR ANALYSIS IN APPLIED PSYCHOLOGY: A CRITICAL REVIEW AND ANALYSIS , 1986 .

[7]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[8]  Sarah Flicker,et al.  Ethical Dilemmas in Research on Internet Communities , 2004, Qualitative health research.

[9]  Pamela J. Wisniewski,et al.  Making privacy personal: Profiling social network users to inform privacy education and nudging , 2017, Int. J. Hum. Comput. Stud..

[10]  Azy Barak,et al.  Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition , 2012, Comput. Hum. Behav..

[11]  R. Rosenthal The file drawer problem and tolerance for null results , 1979 .

[12]  Jung-Kuei Hsieh,et al.  Post-adoption switching behavior for online service substitutes: A perspective of the push-pull-mooring framework , 2012, Comput. Hum. Behav..

[13]  Matthew K. O. Lee,et al.  Online social networks: Why do students use facebook? , 2011, Comput. Hum. Behav..

[14]  Alain Pinsonneault,et al.  Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework , 1997, J. Manag. Inf. Syst..

[15]  D G Altman,et al.  Statistics notes: Absence of evidence is not evidence of absence , 1995 .

[16]  Rui Chen,et al.  Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan , 2013, Inf. Manag..

[17]  Sabina Misoch,et al.  Stranger on the internet: Online self-disclosure and the role of visual anonymity , 2015, Comput. Hum. Behav..

[18]  Mehrdad Koohikamali,et al.  Location disclosure on LB-SNAs: The role of incentives on sharing behavior , 2015, Decis. Support Syst..

[19]  Rui Chen,et al.  An investigation of email processing from a risky decision making perspective , 2011, Decis. Support Syst..

[20]  Leonard M. Jessup,et al.  The Effects of Anonymity on GDSS Group Process with an Idea-Generating Task , 1990, MIS Q..

[21]  John Lim,et al.  Cyber Migration: An Empirical Investigation on Factors that Affect Users' Switch Intentions in Social Networking Sites , 2009 .

[22]  Anol Bhattacherjee,et al.  Why end-users move to the cloud: a migration-theoretic analysis , 2014, Eur. J. Inf. Syst..

[23]  Gayle Brewer,et al.  Cyberbullying, self-esteem, empathy and loneliness , 2015, Comput. Hum. Behav..

[24]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[25]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[26]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[27]  Paulo B. Góes,et al.  Editor's comments: information systems research and behavioral economics , 2013 .

[28]  Vitaly Shmatikov,et al.  Information Hiding, Anonymity and Privacy: a Modular Approach , 2004, J. Comput. Secur..

[29]  Alessandro Acquisti,et al.  Empirical analysis of online anonymity and user behaviors: the impact of real name policy , 2012, 2012 45th Hawaii International Conference on System Sciences.

[30]  Tatsuya Suda,et al.  Anonymity and roles associated with aggressive posts in an online forum , 2012, Comput. Hum. Behav..

[31]  Zhangxi Lin,et al.  An empirical analysis of users' privacy disclosure behaviors on social network sites , 2015, Inf. Manag..

[32]  Cynthia K. Riemenschneider,et al.  An Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site , 2010, AMCIS.

[33]  E. Lee A theory of migration , 1966, Demography.

[34]  Nicola Petrocchi,et al.  Differences Between People Who Use Only Facebook and Those Who Use Facebook Plus Twitter , 2015, Int. J. Hum. Comput. Interact..

[35]  Kerk F. Kee,et al.  Is There Social Capital in a Social Network Site?: Facebook Use and College Students’ Life Satisfaction, Trust, and Participation 1 , 2009 .

[36]  D. Campbell,et al.  Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.

[37]  Matthew K. O. Lee,et al.  How to keep members using the information in a computer-supported social network , 2009, Comput. Hum. Behav..

[38]  Rui Chen,et al.  Living a private life in public social networks: An exploration of member self-disclosure , 2013, Decis. Support Syst..

[39]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[40]  Caitlin Byrne Anonymous Social Media and Qualitative Inquiry: Methodological Considerations and Implications for Using Yik Yak as a Qualitative Data Source , 2017 .

[41]  Azy Barak,et al.  Degree and Reciprocity of Self-Disclosure in Online Forums , 2007, Cyberpsychology Behav. Soc. Netw..

[42]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[43]  Hassan A. Karimi,et al.  SoNavNet: a framework for social navigation networks , 2009, LBSN '09.

[44]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[45]  Chen-Nee Chuah,et al.  Unveiling facebook: a measurement study of social network based applications , 2008, IMC '08.

[46]  John Lim,et al.  Retaining and attracting users in social networking services: An empirical investigation of cyber migration , 2014, J. Strateg. Inf. Syst..

[47]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[48]  Zhenhui Jiang,et al.  Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..

[49]  Judy K. Frels,et al.  Consumer switching costs: A typology, antecedents, and consequences , 2003 .

[50]  Yaman Akdeniz Anonymity, Democracy, and Cyberspace , 2015 .

[51]  E. Ravenstein The Laws of Migration , 1885, Encyclopedia of Gerontology and Population Aging.

[52]  Mehrdad Koohikamali,et al.  Yaks versus Tweets: Sentiment Discrepancy During a Social Crisis , 2018, HICSS.

[53]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[54]  J. Mirsky,et al.  Return migration of Americans: Personal narratives and psychological perspectives , 2014 .

[55]  Rudolf R. Sinkovics,et al.  The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .

[56]  Viswanath Venkatesh,et al.  Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead , 2016, J. Assoc. Inf. Syst..

[57]  Weiguo Fan,et al.  Determinants of users' continuance of social networking sites: A self-regulation perspective , 2014, Inf. Manag..

[58]  Fred D. Davis,et al.  Dead Or Alive? The Development, Trajectory And Future Of Technology Adoption Research , 2007, J. Assoc. Inf. Syst..

[59]  Varun Grover,et al.  Technostress: Technological Antecedents and Implications , 2011, MIS Q..

[60]  Tao Hu,et al.  Nonadopters of Online Social Network Services: Is It Easy to Have Fun Yet? , 2011, Commun. Assoc. Inf. Syst..

[61]  John R. Venable,et al.  Understanding information disclosure behaviour in Australian Facebook users , 2010, J. Inf. Technol..

[62]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[63]  H. Bansal,et al.  “Migrating” to new service providers: Toward a unifying framework of consumers’ switching behaviors , 2005 .

[64]  Erik W. Black,et al.  Anonymous social media - Understanding the content and context of Yik Yak , 2016, Comput. Hum. Behav..

[65]  Roger Dingledine,et al.  On the Economics of Anonymity , 2003, Financial Cryptography.

[66]  Corien Prins,et al.  New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity , 2001, Journal of Information, Law and Technology.

[67]  Carmela Troncoso,et al.  On the Impact of Social Network Profiling on Anonymity , 2008, Privacy Enhancing Technologies.

[68]  Kimberly M. Christopherson The positive and negative implications of anonymity in Internet social interactions: "On the Internet, Nobody Knows You're a Dog" , 2007, Comput. Hum. Behav..

[69]  Elena Karahanna,et al.  Shackled to the Status Quo: The Inhibiting Effects of Incumbent System Habit, Switching Costs, and Inertia on New System Acceptance , 2012, MIS Q..

[70]  Anna Sidorova,et al.  The Effect of Network Characteristics on Online Identity Management Practices , 2017, J. Comput. Inf. Syst..

[71]  Sara B. Kiesler,et al.  Why do people seek anonymity on the internet?: informing policy and design , 2013, CHI.

[72]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[73]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[74]  Axel Küpper,et al.  Anonymous User Tracking for Location-Based Community Services , 2006, LoCA.

[75]  C. Scott Benefits and Drawbacks of Anonymous Online Communication: Legal Challenges and Communicative Recommendations , 2004 .

[76]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[77]  Chiao-Chen Chang,et al.  Examining users′ intention to continue using social network games: A flow experience perspective , 2013, Telematics Informatics.

[78]  Nathan W. Twyman,et al.  Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM) , 2012, J. Assoc. Inf. Syst..

[79]  John Dimmick,et al.  The Theory of the Niche: Quantifying Competition Among Media Industries , 1984 .

[80]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..