The More Social Cues, The Less Trolling? An Empirical Study of Online Commenting Behavior

We examine how online commenting is affected by different degrees of commenters’ identifiability: 1) real name accounts on social networking sites (or “real name-SNS accounts”; e.g., Facebook); 2) pseudonym accounts on social networking sites (or “pseudonym-SNS account”; e.g., Twitter); 3) pseudonymous accounts outside social networking sites (or “non-SNS accounts”; e.g., an online newspaper website’s account). We first construct a conceptual model of the relationship between the degree of identifiability and commenting behavior. When users can freely choose the account type between a non-SNS account and an SNS account to write a comment, the decision determines degree of identifiablity. This decision will be correlated to the propensity of using ‘offensive’ words (classified from a comprehensive list of swear terms in the Korean language) in their comments. To take endogeneity into consideration, we estimate a bivariate probit model between the choice of account type and the choice of using offensive words. We apply our model to a unique set of data consisting in over 75,000 comments attached to news stories collected from a variety of online news media websites. Our analysis highlights interesting dynamics between the degree of identifiability and commenters’ behavior. When commenters use an SNS account (which consists in a more identifiable condition) rather than a non-SNS account, they are less likely to use offensive words. We also find that the use of real name-SNS accounts (which provide an even more identifiable condition due to the disclosure of one’s real name), is associated with lower occurrence of offensive words than the case in which commenters use a pseudonym-SNS account for commenting. While the disclosure of true identity is likely to reduce the probability of using offensive words, the greater number of users seems to prefer participating in the commenting activity by using their pseudonym accounts

[1]  P. Zimbardo The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. , 1969 .

[2]  John Short,et al.  The social psychology of telecommunications , 1976 .

[3]  D. Rubin,et al.  The central role of the propensity score in observational studies for causal effects , 1983 .

[4]  Lee Sproull,et al.  Reducing social context cues: electronic mail in organizational communication , 1986 .

[5]  Leonard M. Jessup,et al.  The Effects of Anonymity on GDSS Group Process with an Idea-Generating Task , 1990, MIS Q..

[6]  Sara B. Kiesler,et al.  The Equalization Phenomenon: Status Effects in Computer-Mediated and Face-to-Face Decision-Making Groups , 1991, Hum. Comput. Interact..

[7]  Tim O'Shea,et al.  'Flaming' in computer-mediated communication: Observations, explanations, implications. , 1992 .

[8]  Maureen S. Battistella,et al.  Connections: New Ways of Working in the Networked Organization , 1991 .

[9]  A. Michael Froomkin,et al.  Anonymity and its Enmities , 1995 .

[10]  T. Postmes,et al.  A Social Identity Model of Deindividuation Phenomena , 1995 .

[11]  A. Froomkin Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases , 1996 .

[12]  Julie E. Cohen A Right to Read Anonymously: A Closer Look at , 1997 .

[13]  A. Hollingshead Information Suppression and Status Persistence in Group Decision Making The Effects of Communication Media , 1996 .

[14]  Tom Postmes,et al.  Social influence in computer-mediated groups , 1997 .

[15]  Susan G. Straus,et al.  Technology, Group Process, and Group Outcomes: Testing the Connections in Computer-Mediated and Face-to-Face Groups , 1997, Hum. Comput. Interact..

[16]  T. Postmes,et al.  Deindividuation and antinormative behavior: A meta-analysis. , 1998 .

[17]  Helen Nissenbaum,et al.  The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..

[18]  Ian Goldberg,et al.  A pseudonymous communications infrastructure for the internet , 2000 .

[19]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[20]  T. Postmes,et al.  Social Influence in Computer-Mediated Communication: The Effects of Anonymity on Group Behavior , 2001 .

[21]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[22]  Jonathan Grudin,et al.  Group dynamics and ubiquitous computing , 2002, CACM.

[23]  Bernard C. Y. Tan,et al.  Group Polarization and Computer-Mediated Communication: Effects of Communication Cues, Social Presence, and Anonymity , 2002, Inf. Syst. Res..

[24]  J. Tirole,et al.  Some Simple Economics of Open Source , 2002 .

[25]  John F. Patterson,et al.  Identity disclosure and the creation of social capital , 2003, CHI Extended Abstracts.

[26]  Phyllis B. Gerstenfeld,et al.  Hate Online: A Content Analysis of Extremist Internet Sites , 2003 .

[27]  Tal Z. Zarsky Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society , 2004 .

[28]  Stephen Woolworth,et al.  “Destroy the scum, and then neuter their families:” the web forum as a vehicle for community discourse? , 2004 .

[29]  J. Tirole,et al.  Incentives and Prosocial Behavior , 2005 .

[30]  Paul Resnick,et al.  Slash(dot) and burn: distributed moderation in a large online conversation space , 2004, CHI.

[31]  John Suler,et al.  The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..

[32]  A. Adam Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .

[33]  J. Andreoni,et al.  Public goods experiments without confidentiality: a glimpse into fund-raising , 2004 .

[34]  Y. Amichai-Hamburger The social net : understanding human behavior in cyberspace , 2005 .

[35]  Samer Faraj,et al.  Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..

[36]  Chrysanthos Dellarocas,et al.  Reputation Mechanism Design in Online Trading Environments with Pure Moral Hazard , 2005, Inf. Syst. Res..

[37]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[38]  Stephan Meier,et al.  A Survey of Economic Theories and Field Evidence on Pro-Social Behavior , 2006 .

[39]  Lars Frederiksen,et al.  Why Do Users Contribute to Firm-Hosted User Communities? The Case of Computer-Controlled Music Instruments , 2006, Organ. Sci..

[40]  Eric T. G. Wang,et al.  Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..

[41]  Robyn M. Dawes,et al.  What you don't know won't hurt me: Costly (but quiet) exit in dictator games , 2006 .

[42]  Raymond J. Noonan,et al.  Chapter 5 – The Psychology of Sex: A Mirror from the Internet , 2007 .

[43]  R. Noonan The Psychology of Sex , 2007 .

[44]  Ben Green,et al.  Does 'cyber-conformity' vary cross-culturally? Exploring the effect of culture and communication medium on social conformity , 2007, Comput. Hum. Behav..

[45]  Kimberly M. Christopherson The positive and negative implications of anonymity in Internet social interactions: "On the Internet, Nobody Knows You're a Dog" , 2007, Comput. Hum. Behav..

[46]  Ritu Agarwal,et al.  Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities , 2007, Inf. Syst. Res..

[47]  Mark Klein,et al.  Harnessing Collective Intelligence to Address Global Climate Change , 2007, Innovations: Technology, Governance, Globalization.

[48]  Stephen A. Rains The Impact of Anonymity on Perceptions of Source Credibility and Influence in Computer-Mediated Group Communication: A Test of Two Competing Hypotheses , 2007, Commun. Res..

[49]  X. Zhang,et al.  Group Size and Incentives to Contribute: A Natural Experiment at Chinese Wikipedia , 2010 .

[50]  D. Ariely,et al.  Doing Good or Doing Well? Image Motivation and Monetary Incentives in Behaving Prosocially , 2007, SSRN Electronic Journal.

[51]  Robert E. Kraut,et al.  A Simulation for Designing Online Community : Member Motivation , Contribution , and Discussion Moderation , 2008 .

[52]  Wynne W. Chin,et al.  Anger and flaming in computer-mediated negotiation among strangers , 2009, Decis. Support Syst..

[53]  Jennifer Golbeck,et al.  Computing with Social Trust , 2008, Human-Computer Interaction Series.

[54]  Kjell Arne Brekke,et al.  Social Interaction in Responsibility Ascription: The Case of Household Recycling , 2010, Land Economics.

[55]  Bruno S. Frey,et al.  Economics and psychology : a promising new cross-disciplinary field , 2010 .

[56]  Paul Resnick,et al.  Regulating Behavior in Online Communities , 2010 .

[57]  Wang Zhongmin,et al.  Anonymity, Social Image, and the Competition for Volunteers: A Case Study of the Online Market for Reviews , 2010 .

[58]  Daegon Cho,et al.  Real Name Verification Law on the Internet: a Poison or Cure for Privacy? , 2011, WEIS.

[59]  Erik Brynjolfsson,et al.  Goodbye Pareto Principle, Hello Long Tail: The Effect of Search Costs on the Concentration of Product Sales , 2011, Manag. Sci..

[60]  Mor Naaman,et al.  Towards quality discourse in online news comments , 2011, CSCW.

[61]  Lee Sproull,et al.  Prosocial Behavior on the Net , 2011, Daedalus.

[62]  Rajeev Rastogi,et al.  Semi-supervised correction of biased comment ratings , 2012, WWW.

[63]  Alessandro Acquisti,et al.  Empirical analysis of online anonymity and user behaviors: the impact of real name policy , 2012, 2012 45th Hawaii International Conference on System Sciences.

[64]  Robert E. Kraut,et al.  Agent-Based Modeling to Inform Online Community Design: Impact of Topical Breadth, Message Volume, and Discussion Moderation on Member Commitment and Contribution , 2014, Hum. Comput. Interact..

[65]  E. Ostrom Collective action and the evolution of social norms , 2000, Journal of Economic Perspectives.