The Effect of Anonymity on Virtual Team Performance in Online Communities

Un-Kon Lee, Aeri Lee, Kyong Kyu Kim

Abstract


One of the challenges in online community management is what level of perceived anonymity can be granted to encourage active participation from members while discouraging unhealthy activities. Few studies developed a scheme of anonymity and investigated how different levels of anonymity influence community activities. This study develops a classification scheme of anonymity encompassing the following three different levels: (1) real name(no

anonymity), (2) nickname (partial anonymity), and (3) random assignment of a temporal ID (complete anonymity). Then, it examines how different levels of anonymity influence trust and perceived risk, which in turn affect virtual team performance. A series of laboratory experiments were performed, manipulating the levels of anonymity, in the context of well-structured communities that allow prior interactions among community members. The data was collected from 364 laboratory participants and analyzed using ANOVA and PLS. The results indicate that the difference of anonymity between (2) and (3) had not be significant and the only (1) could not guarantee the anonymity. The impact of anonymity on trust and perceived risk could not be significant in this situation. These findings could contribute to make more beneficial member identification strategies in online community practice.


Full Text:

PDF

References


Ahuja, M., Galletta, D., and Carley, K., “Individual Centrality and Performance in Virtual R&D Groups : An Empirical Study,” Management Science, Vol. 49, No. 1. pp. 21-38, 2003.

Alnuaimi, O. A., Robert, L. P. Jr., and Maruping, L. M., “Team Size, Dispersion, and Social Loafing in Technology-Supported Teams : A Perspective on the Theory of Moral Disengagement,” Journal of Management Information Systems, Vol. 27, No. 1, pp. 203-230, 2010.

Altschuller, S. and Benbunan-Fish, R., “The Pursuit of Trust in ad hoc Virtual Teams : How Much Electronic Portrayal in Too Much?,” European Journal of Information Systems, Vol. 22, pp. 619-636, 2013.

Barclay, D., Higgins, C, and Thompson, R., “The Partial Least Squares (PLS) Approach to Causal Modeling : Personal Computer Adoption and Use as an Illustration, Technology Studies,” Vol. 2, No. 2, pp. 285-309, 1995.

Bhattacherjee, A., “Understanding Information Systems Continuance : An Expectation-Confirmation Model,” MIS Quarterly, Vol. 25, No. 3, pp. 351-370, 2001.

Campbell, D. T. and J. C. Stanley, “Experimental and Quasi-Experimental Designs for Research, Rand McNally & Company,” Chicago, 1963.

Chesney, T., Coyne, I., Logan, B., and Madden, N., “Creifing in Virtual Worlds : Causes, Casualities and Coping Stretagies,” Information Systems Journal, Vol. 19, pp. 525-548, 2009.

Chin, W. W. and Todd, P. A., “On the Use, Usefulness, and Ease of Use of Structural Equation Modeling in MIS Research : A Note of Caution,” MIS Quarterly, Vol. 19, No. 2, pp. 237-246, 1995.

Chin, W. W., “The Partial Least Squares Approach for Structural Equation Modeling,” In : G. A. Marcoulides (eds.), Modern Methods for Business Research Lawrence Erlbaum Associates, 1998.

Chin, W. W. and Frye, T., “PLS Graph, 2.91,” University of Calgary, Calgary, Canada, 1996.

Christopherson, K., “The Positive and Negative Implications of Anonymity in Internet Social Interactions : ‘On the Internet, Nobody Knows You’re a Dog,” Computers in Human Behavior, Vol. 23, pp. 3038-3056, 2007.

Churchill, G. A. Jr., “A Paradigm for Developing Better Measures of Marketing Constructs,” Journal of Marketing Research, Vol. 16, pp. 64-73, 1979.

Connolly, T., Jessup, L. M., and Valacich, J. S., “Effects of Anonymity and Evaluative Tone on Idea Generation in Computer-Mediated Groups,” Management Sciences, Vol. 36, No. 6, pp. 689-703, 1990.

Dirks, K. T. and Ferrin, D. L., “The Role of Trust in Organizational Settings,” Organizational Science, Vol. 12, No. 4, pp. 450-467, 2001.

Dubrovsky, V. J., Kiesler, B. N., and Sethna, B. N., “The Equalization Phenomenon : Status Effect in Computer-Mediated and Face-to-Face Decision-making Groups,” Human-Computer Interaction, Vol. 2, No. 2, pp. 119-146, 1991.

En.wikipedia.com, “Anonymity and Minerva Syndrome,” 2014.

Fang, Y. and Neufeld, D., “Understanding Sustained Participation in Open Source Software Projects,” Journal of Management Information Systems, Vol. 25, No. 4, pp. 9-50, 2009.

Fishbein, M. and Ajzen, A. I., “Belief, Attitude, Intention, and Behavior : An Introduction to Theory and Research,” Addison-Wesley, Reading, MA, 1975.

Fornell, C. and Larcker, D. F., “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.

Garfield, M. J. and Dennis, A. R., “Toward an Integrated Model of Group Development : Disruption of Routines by Technology-Induced Change,” Journal of Management Information Systems, Vol. 29, No. 3, pp. 43-86, 2013.

Gersick, C. J. G., “Time and Transition in Work Teams : Toward a New Model of Group Development,” Academic Management Journal, Vol. 31, No. 1, pp. 9-41, 1988.

Ha, T., “Statistics of Online Community Activity and Social, Economic issue participation in Korea,” KISDI STAT Report, KISDI ICT Statistic Center, 13-06-02, 2013.

Hahn, J. P., Moon, J. Y., and Zhang, C., “Emergence of New Project Teams from Open Source Software Developer Networks : Impact of Prior Collaboration Ties,” Information Systems Research, Vol. 19, No. 3, pp. 369-391, 2008.

Haines, R. and Mann, J. E. C., “A New Perspective on De-individuation via Computer-mediated Communication,” European Journal of Information Systems, Vol. 20, pp. 156-167, 2011.

Haraway, D., “A Manifesto for Cyborgs : Science, Technology, and Socialist Feminism in the 1908’s,” In L. J. Nicholson (Ed.), Feminism/postmodernism (pp. 190-233). London : Routledge, 1990.

Hatfield, E. and Sprecher, S., “Mirror, Mirror, The Importance of Looks in Everyday Life,” Albany : State University of New York Press, 1986.

Hayne, S. C. and Rice, R. E., “Attribution Accuracy when Using Anonymity in Group Support Systems,” International Journal of Human-Computer Studies, Vol. 47, No. 3, pp. 429-452, 1997.

Jarvenpaa, S. L., Shaw, T. R., and Staples, D. S., “Toward Contextualized Theories of Trust : The Role of Trust in Global Virtual Teams,” Information Systems Research, Vol. 15, No. 3, pp. 250-267, 2004.

Jessup, L. M., Connolly, T., and Galegher, J., “The Effects of Anonymity on GDSS Group Process with an Idea Generating Task,” MIS Quarterly, Vol. 14, No. 3, pp. 312-321, 1990.

Kim, C., “Besides of Human Right in Online Privacy Invasion : Online Abuser Could Find Even the Human Relationship in 35 minutes by Identity Chasing using a Photo,” Kukmin newspaper, 2012.

Koufaris, M., “Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior,” Information Systems Research, Vol. 13, No. 2, pp. 205-223, 2002.

Leimeister, J. M., Ebner, W., and Krcmar, H., “Design, Implementation and Evaluation of Trust-Supporting Components in Virtual Communities for Patients,” Journal of Management Information Systems, Vol. 21, No. 4, pp. 101-135, 2005.

Lockheed, M. E. and Hall, K. P., “Conceptualizing Sex as a Status Characteristic : Applications to Leadership Training Strategies,” Journal of Social Issues, Vol. 32, pp. 111-124, 1976.

Ma, M. and Agarwal, R., “Through a Glass Darkly : Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities,” Information Systems Research, Vol. 18, No. 1, pp. 42-67, 2007.

McKnight, D. H., Choudhury, V., and Kacmar, C., “Developing and Validating Trust Measures for E-Commerce : An Integrative Typology,” Information Systems Research, Vol. 13, pp. 334-359, 2002.

Miller, F. G. and Rowold, K. L., “Halloween Masks and Deindividuation,” Psychological Reports, Vol. 44, p. 422, 1979.

Nunamaker, J. F., Dennis, A. R., Valacich, J. S., Vogel, D., and George, J. F., “Electronic Meeting Systems to Support Group Work,” Communication of ACM, Vol. 34 No. 7, pp. 40-61, 1991.

Park, S., “SNS make the Mass Communication from the Basic Sharing of Individual Issues to the Political Participation and Discussion,” Hankuk newspaper, 2011.

Park, S., “Framing and Unproven Rumors to the Stars under the Shade of Anonymity,” Hankuk Economics, 2013.

Pavlou, P. A. and Gefen, D., “Psychological Contract Violation in Online Marketplaces : Antecedents, Consequences, and Moderating Role,” Information Systems Research, Vol. 16, No. 4, pp. 372-399, 2005.

Pavlou, P. A. and Gefen, D., “Building Effective Online Marketplaces with Institution-Based Trust,” Information Systems Research, Vol. 15, No 1, pp. 37-59, 2004.

Pfitzmann, A. and Hansen, M., “Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management a Proposal for Terminology,” Paper presented at the International Workshop on Designing Privacy Enhancing Technologies, 2008.

Pinsonneault, A. and Heppel, N., “Anonymity in Group Support Systems Research : A New Conceptualization, Measure, and Contingency Framework,” Journal of Management Information Systems, Vol. 14, No. 3, pp. 89-108, 1997.

Postmes, T., Spears, R., and Lea, M., “Breaching or Building Social Boundaries? SIDE-Effects of Computer-Mediated Communication,” Communication Research, Vol. 25, No. 6, pp. 689-715, 1998.

Postmes, T., Spears, R., Sakhel, K., and de Groot, D., “Social Influence in Computer-Mediated Communication : The Effects of Anonymity on Group Behavior,” Personality and Social Psychology Bulletin, Vol. 27, No. 10, pp. 1243-1254, 2001.

Prentice-Dunn, S. and Rogers, R. W., “Effects of Public and Private Self-Awareness on Deindividuation and Aggression,” Journal of Personality and Social Psychology, Vol. 43, pp. 503-513, 1982.

Seddon, P. B., “A Respecification and Extension of the DeLone and McLean Model of IS Success,” Information Systems Research, Vol. 8, No 3, pp. 240-253, 1997.

Simons, T., Pelled, L. P., and Smith, K. A., “Making Use of Difference : Diversity, Debate, and Decision Comprehensiveness in Top Management Teams,” Academy of Management Journal, Vol. 42, No. 6, pp. 662-673, 1999.

Shin, J., Kim, K., and Park, J., “The Effect of Social Anonymity on Community Quality : Mediated by Self Expression, Self Control, and Community Ties,” The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 257-281, 2011.

Son, J. Y. and Kim, S. S., “Internet Users’ Information Privacy-Protective Responses : A Taxonomy and a Nomological Model,” MIS Quarterly, Vol. 32, No. 3, pp. 503-529, 2008.

Spears, R. and Lea, M., “Social Influence and the Influence of the ‘Social’ in Computer-Mediated Communication,” In M. Lea (Ed.), Contexts of computer-mediated communication (pp. 30-65). London : Harvester-Wheatsheaf, 1992.

Stewart, K. L., “Trust Transfer on the World Wide Web,” Organizational Science, Vol. 14, No. 1, pp. 5-17, 2003.

Stone, E. F., “Research Methods in Organizational Behavior,” Santa Monica, CA, Goodyear, 1978.

Turner, J. C., “The Analysis of Social Influence. In J. C. Turner, M. A. Hogg, P. J. Oakes, S. D. Reicher, and M. S. Wetherell (Eds.), Rediscovering the Social Group : A Self-Categorization Theory,” Oxford, UK : Basil Blackwell, 1987.

Valacich, J. S., Dennis, A. R., and Nunamaker, J. F., Jr., “Group Size and Anonymity Effects on Computer-Mediated Idea Generation,” Small Group Research, Vol. 23, No. 1, pp. 49-73, 1992.

Walther, J. B., “Group and Interpersonal Effects in International Computer-Mediated Collaboration,” Human Communication Research, Vol. 23, No. 3, pp. 342-369, 1997.

Werts, C. E., Linn, R. L., and Joreskog, K. G., “Intra-class Reliability Estimates : Testing Structural Assumptions,” Educational and Psychological Measurement, Vol. 34, pp. 25-33, 1973.

Wold, H., “Systems Under Indirect Observation Using PLS, in A Second Generation of Multivariate Analysis,” C. Fornell (Ed.), Praeger, New York, pp. 325-347, 1982.

Zimbardo, P. G., “The Human Choice : Individuation, Reason, and Order vs. Deindividuation, Impulse, and Chaos,” In W. J. Arnold and D. Levine(Eds.), Nebraska symposium on motivation Vol. 17, pp. 237-307, Lincoln : University of Nebraska Press, 1969.


Refbacks

  • There are currently no refbacks.