scispace - formally typeset
Search or ask a question
Book ChapterDOI

Impact of Anonymity and Identity Deception on Social Media eWOM

TL;DR: The current study looks closely on the impact of anonymity in typical eWOM behaviour context on social media by drawing observations from a recent case in point and literature and concludes with a list of relevant factors and propositions that must be tested empirically to draw greater understanding of the phenomenon.
Abstract: Brand-related consumer to consumer communication, eWOM, is taking place in many forms across the social media space. Rules that governed credibility assessment of brand-related communication, WOM, in the Face to Face context may vary on social media, specifically because of anonymity that is afforded on different social media sites. The current study looks closely on the impact of anonymity in typical eWOM behaviour context on social media by drawing observations from a recent case in point and literature. The paper concludes with a list of relevant factors and propositions that must be tested empirically to draw greater understanding of the phenomenon.

Summary (2 min read)

1 Introduction

  • Communication and interaction using social media has spread across cultures globally.
  • This has enabled users’ of the world to seek and share brand-related experiences and opinions (eWOM) with the click of a few buttons which in turn has significantly altered consumer decision process [4,15].
  • Therefore while interacting on social media users are hugely influenced by other outside their known circle [10].

2.2 After Effects

  • The anonymous blog went viral and the next day, users across social media sites like Facebook and Twitter woke up to the blog post trending as “How a lunch at Lemp Brewpub turned out to be the most horrid experience ever” ( Exhibit 4) .
  • The Facebook page and Twitter handle of Lemp saw no response for a very long time.
  • Within a few hours, most of the users of social media, who had read the blog were completely consumed by it.
  • As the anonymous blog went viral, it pulled the ratings of Lemp down drastically on Zomato.

2.3 Epilogue

  • Even after months , Lemp failed to recover.
  • Post this incident whenever similar instances are shared on social media, users of social media are prone to say “don’t do another Lemp!”.
  • Anonymous bloggers, who concealed their identity, not personally known to many, successfully influenced thousands of social media users and stained the reputation of an establishment in the most serious manner.

3.1 Computer-Mediated Communication and Anonymity

  • Web 2.0 and new media now provide many virtual avenues for users to engage and indulge in eWOM, both negative and positive [8].
  • The above case is an example of other similar cases that have gone viral on social media in the recent times.
  • EWOM via social media has intrigued researchers in the recent times for several reasons.
  • Weblogs on the other hand provide “a more remote space with less interactivity that may reduce users’ awareness of their audiences”, hence anonymity varies [9, p 285]: user identity information may be completely anonymous, pseudonymous, or identifiable.
  • Therefore the critical question that needs to be asked is -.

3.2 Credibility of Anonymous Social Media eWOM

  • The traditional understanding of credibility, based on the extant literature on the subject, is that it may be derived as a result of interaction of source characteristics, message characteristics and receiver characteristics [20].
  • Credibility may not be derived solely from familiarity of source or believing others as they part of a physical social network, it will be assessed using all the other information available on the platform itself [2].
  • The bloggers described themselves as “young, 25-year old, working, well educated, aware, well-travelled, well spoken”.
  • Users are influenced if language characteristics meet or voilate the expected norms even if the message is anonymous [11].
  • Message characteristics and alternate heuristics together made the anonymous blog believable and credible.

3.3 eWOM Behaviour - Why share and reshare an anonymous Blog?

  • Receiver Charecteristics – Social conformity, Subjective Norms.
  • Where there are numbers the others will join!.
  • To that extend there may have been a “flow of source credibility” derived from the immediate network of “friends” who have shared the blog on their timeline, whoes behavioural expectation had to be met .
  • Therefore the following proposition is iterated: P4 – In the absence of identity information subjective norms are positively associated with behaviour of resharing by the user Homophily.
  • Therefore homophily, perception of similarity, further influenced the reshare behaviour.

4 Conclusion and Future Research

  • This article discussed the behavioural impact of anonymous communication as observed in the case of Lemp.
  • New media has altered several aspects of interpersonal communication and influence.
  • A single bad experience is capable of damaging an organisations reputation severely, as was seen in the case sited.
  • Therefore this paper is an attempt to have greater understanding of this phenomenon.
  • Empirical verification of the propositions can lead to greater understanding of behavioural impacts of anonymous communication.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

HAL Id: hal-01702146
https://hal.inria.fr/hal-01702146
Submitted on 6 Feb 2018
HAL is a multi-disciplinary open access
archive for the deposit and dissemination of sci-
entic research documents, whether they are pub-
lished or not. The documents may come from
teaching and research institutions in France or
abroad, or from public or private research centers.
L’archive ouverte pluridisciplinaire HAL, est
destinée au dépôt et à la diusion de documents
scientiques de niveau recherche, publiés ou non,
émanant des établissements d’enseignement et de
recherche français ou étrangers, des laboratoires
publics ou privés.
Distributed under a Creative Commons Attribution| 4.0 International License
Impact of Anonymity and Identity Deception on Social
Media eWOM
Payal Kapoor, Srinivas Gunta
To cite this version:
Payal Kapoor, Srinivas Gunta. Impact of Anonymity and Identity Deception on Social Media eWOM.
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom.
pp.360-370, �10.1007/978-3-319-45234-0_33�. �hal-01702146�

Impact of Anonymity and Identity Deception on Social
Media eWOM
Payal Shrivastava Kapoor
1
, Srinivas Gunta
2
1
Assistant Professor, FORE School of Management, New Delhi, India
{payal@fsm.ac.in}
2
Assistant Professor, Indian Institute of Management Indore, India
Abstract. Brand-related consumer to consumer communication, eWOM, is
taking place in many forms across the social media space. Rules that governed
credibility assessment of brand-related communication, WOM, in the Face to
Face context may vary on social media, specifi-cally because of anonymity that
is afforded on different social media sites. The current study looks closely on the
impact of anonymity in typical eWOM behaviour context on social media by
drawing observations from a recent case in point and literature. The paper
concludes with a list of relevant factors and propositions that must be tested
empirically to draw greater understanding of the phenomenon.
Keywords: Anonymous communication, eWOM, credibility, computer-
mediated Communication.
1 Introduction
Communication and interaction using social media has spread across cultures globally.
Survey data suggests that more than 1.5 billion people, worldwide, are connected via
social media communities . Users converse and interact via social media communities,
discussion boards, weblogs, social networking sites etc. Increasingly they are turning to
social media to socialize and broadcast their views. This has enabled users’ of the world
to seek and share brand-related experiences and opinions (eWOM) with the click of a
few buttons which in turn has significantly altered consumer decision process [4,15].
It is averred that social media is changing the fundamentals of communication in several
ways. Intimacy of a face to face (FtF) communication has been replaced with a
“broadcast-like ability to communicate with the masses” [ 1, p. 3]. Technology has
enabled interpersonal communication to be visible on a more transparent public domain,
simultaneously accessible to a very large set of audience. It abundantly supports
consumer to consumer conversations, participation, interaction and collaboration which
in turn influence behaviour. Therefore while interacting on social media users are
hugely influenced by other outside their known circle [10]. Moreover, user interaction,
quite like other computer mediated-communication (CMC), may be influenced by

disinhibition, enabling them to communicate and behave freely, feel “less restrained,
and express themselves more openly[15, p. 321]. At the same time, similar to other
forms of CMC, communication via social media may vary in the degree of anonymity.
Anonymity, a social condition, permits user to conceal her identity which further
complicates the process of communication on social media. Different social media
interface permit different levels of anonymity, which may further reinforce the impact
of deindividualisation and hyperpersonal [14].
This article explores the behavioural impact of anonymous eWOM communication by
building on a recently observed case of a local establishment - Lemp Brewpub &
Kitchen, Gurgaon, India. An anonymous weblog detailing a bad experience faced by a
set of customers went viral which tarnished the reputation of the establishment beyond
repair and resulted in its shutting down. This case, simlar to many other recent cases,
raises the question of how an anonymous communication (blog post in Lemp’s case),
reshared by many via various Social Networking Sites(SNSs), can cause serious harm
to a brick and mortar establishment ? A single bad experience shared in form of an
anonymous blog, damaged Lemp’s reputation permanently. This article enquires why
despite of anonymity, deindividualisation and possible threat of identity deception,
anonymous communication is influential, believable and gathers credibility. The paper
explores how in the absence of traditional sources of credibility, users of social media
explore alternate heuristics to assess credibility. It is further suggested that these subtle
embedded alternate heuristics not only influence user disposition but also their
behaviour, observed by the act of resharing of the anonymous blog post. Network-
related features like homophily and perceived social conformity further provide
explanation to the behaviour of resharing. The article concludes with several
propositions derived from the experience of Lemp and support found in literature which
may be further tested as future research.
The remainder of the article is organised like this: it starts with the details of the Lemp
case followed with review of related literature and concludes with propositions.
2 The Case - Lemp brewpub, Gurgaon, Haryana, India
2.1 Anonymous Blog
On Monday, 10th June 2013, an anonymous blog was posted by a group of eight friends
who called themselves “Gurgaon victims” (from here on – group of friends). According
to their blog on Sunday, 9th June 2013, based on a promotion they read on a
www.zomato.com (a popular online restaurant database and review site, Zomato from
here on, Exhibit 1), they decided to go to Lemp Brewpub & Kitchen, a local pub located
in Gurgaon ( satellite city to New Delhi, India), to enjoy a fun filled Hawaiian Brunch.

Unfortunately Lemp could not deliver the Hawaiian Brunch and a series of occurrences
led to altercation between the group of friends and staff. The anonymous blog post
recounted how, as the events unfolded, the expected fun filled Hawaiian Brunch turned
into a harrowing experience that ended for the group of friends at the local police station,
with their parents having to settle the matters. Blog iterated the chronological
occurrences of the incident along with photographs of the incident taking place (Exhibit
3). There were no photographs of the group of friends themselves. The tonality, flow of
details and the facts mentioned in the blog post clearly portrayed the group of friends
as victims and denounce the staff of Lemp as a bunch of goons.
2.2 After Effects
The anonymous blog went viral and the next day, users across social media sites like
Facebook and Twitter woke up to the blog post trending as “How a lunch at Lemp
Brewpub turned out to be the most horrid experience ever” ( Exhibit 4) . Users, many
who had never dined at Lemp, were sharing and resharing the blog post in abundance.
The Facebook page and Twitter handle of Lemp saw no response for a very long time.
Within a few hours, most of the users of social media, who had read the blog were
completely consumed by it. They had declared Lemp to be the villain. They not only
empathised with the group of friends but they extended support by action : posting
supportive comments on the blog; sharing police information on where a formal
complaint can be lodged; re-sharing the blog with more and more people; cracking
“Lemp” jokes on Twitter and elsewhere (Exhibit 5), there by spreading negativity about
it; posting bad reviews on Zomato despite having no first hand experience of the pub.
As the anonymous blog went viral, it pulled the ratings of Lemp down drastically on
Zomato. Within few hours, the number of reviews rose from 382 (before blog) to 900
plus (after blog) with majority of them being negative. The ratings dropped to a poor
1.3 based on 2975 votes (Exhibit 2). Users not only wholeheartedly believe the
anonymous blog, they also indulged in supportive behaviour by resharing the post.
2.3 Epilogue
Even after months , Lemp failed to recover. On Zomato the ratings stood at a poor 1.3,
based on 2101 reviewers . Post this incident whenever similar instances are shared on
social media, users of social media are prone to say “don’t do another Lemp!
Anonymous bloggers, who concealed their identity, not personally known to many,
successfully influenced thousands of social media users and stained the reputation of an
establishment in the most serious manner.
3 Theoretical Understanding

3.1 Computer-Mediated Communication and Anonymity
. Web 2.0 and new media now provide many virtual avenues for users to engage and
indulge in eWOM, both negative and positive [8]. The above case is an example of other
similar cases that have gone viral on social media in the recent times. A single bad
experience of a consumer is read, shared and reshared by thousands significantly
damaging brand reputation With the spread of internet and the changing media
consumption habits, several studies have found eWOM to be more credible, therefore
influential, than traditional marketer generated communication [7].
eWOM via social media has intrigued researchers in the recent times for several reasons.
From traditional FtF ( face to face) WOM interactions, CMC eWOM diverges
significantly. As already stated, users that connect via social media are diverse and the
environment “opens up the WOM network from one’s immediate contacts to the entire
Internet world”[3, p. 9] therefore eWOM may take place between users who have no
significant prior relationship. Furthermore, just like other CMCs, eWOM via social
media may lack both non-verbal and social context cues, yet users adjust to the new
environment and use alternative linguistic and other forms of heuristics for judgement
[16, 17].
Critical enquiry of the current research is the influence of anonymity. Social media
interactions take place in environment which may afford different degrees of anonymity
to users. SNS like Facebook enables “social interactions through profile-based user
accounts”, identity creation is quite integral to the site hence user anonymity is lower
[12,p 439, 22]. Weblogs on the other hand provide “a more remote space with less
interactivity that may reduce users’ awareness of their audiences”, hence anonymity
varies [9, p 285]: user identity information may be completely anonymous,
pseudonymous, or identifiable. Completely anonymous blogs may still offer a few
selective self-disclosures [16], as was seen in this case of anonymous blog against
Lemp. The anonymous blog revealed no identity information about the bloggers. Level
of anonymity of a social media site may further lead to identity deception. Since Identity
is separated from physical Self “One can have as many electronic personas as one has
time and energy to create” generating convenient possibilities for online deception [5 p.
2, 22, 9]
Therefore the critical question that needs to be asked is - Why did the users of social
media, who read the anonymous blog, felt positively assured of the intentions and
motives of a group of unknowns who reveal no personal information about themselves?
In other words , why do anonymous eWOM communication on social media influence
when source information is either not shared or could be incorrect?
3.2 Credibility of Anonymous Social Media eWOM
The traditional understanding of credibility, based on the extant literature on the subject,
is that it may be derived as a result of interaction of source characteristics, message
characteristics and receiver characteristics [20]. According to Metzger (2007, p. 2078)

Citations
More filters
Book ChapterDOI
01 Jan 2017
TL;DR: Hennig-Thurau et al. as discussed by the authors described the emergence of eWOM as a powerful tool for information seeking about a product or a company, which is seen as more powerful because it has significant reach and is publicly available.
Abstract: With the growth of Internet technologies more and more consumers are using it as a tool for information seeking about a product or a company. Enhancement of the Internet, popularity of e-commerce, and widespread diffusion of social media applications led to the emergence of eWOM. Although eWOM may be less personal than traditional WOM, it is seen as more powerful because it has significant reach and is publicly available (Hennig-Thurau et al. 2004).

12 citations

Journal ArticleDOI
Ahmed Alharbi1, Hai Dong1, Xun Yi1, Zahir Tari1, Ibrahim Khalil1 
TL;DR: This survey analyzes various identity deception attacks, which can be categorized into fake profile, identity theft, and identity cloning, and provides a detailed review of social media identity deception detection techniques.
Abstract: Social media have been growing rapidly and become essential elements of many people’s lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. This survey analyzes various identity deception attacks, which can be categorized into fake profile, identity theft, and identity cloning. This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques. This article is expected to benefit both researchers and social media providers.

10 citations


Cites background from "Impact of Anonymity and Identity De..."

  • ...Kapoor and Gunta [46] discussed the behavioural effects of anonymous communication....

    [...]

Book ChapterDOI
01 Jan 2019
TL;DR: In this paper, the authors investigated the traditional WOM and eWOM literature to explore its status and the factors responsible for the effectiveness of electronic word of mouth (eWOM) communication.
Abstract: In the digital age, consumers have changed their roles from passive receivers of marketing messages to active information suppliers about products through various digital media. The communication between consumers which occurs online is termed electronic word of mouth (eWOM) communication. Electronic word of mouth communication is an integral part of e-commerce. With the exponential growth of internet users and their adoption of eWOM for product information, it has become important to study the factors responsible for the effectiveness of eWOM. This chapter investigates the traditional WOM and eWOM literature to explore its status. A summary of eWOM communication has been presented to summarize prior studies of eWOM which is aligned with basic communication processes. The research papers (literature) have been segregated into eight categories: WOM, eWOM, eWOM impact, source credibility, message characteristics, receiver characteristics, eWOM platform, and response after eWOM adoption. Finally, several strategies are discussed for theoretical and empirical exploration.

7 citations

Book ChapterDOI
01 Jan 2021
TL;DR: A conceptual model that categorizes source credibility, trustability, knowledge, tie strength, and homophily are identified as the drivers of eWOM source credibility in SNSs.
Abstract: The technological advancement in the usage of social networking sites (SNSs) has grown beyond boundaries. This expansion helps organizations to capture the attention of online customers towards their products and services. The primary purpose of the study is to list the drivers of eWOM credibility and explore its role in customer engagement at SNSs. A conceptual model that categorizes source credibility, trustability, knowledge, tie strength, and homophily are identified as the drivers of eWOM source credibility in SNSs. Similarly, valence, volume, consistency, emotions, quality, and rating are listed as the drivers of eWOM message credibility. This study suggested that drivers of eWOM will impact on customer engagement and that will, in turn, result in building a positive attitude, brand image, and behaviour towards the product or service listed in the SNSs. Further, the study discusses the theoretical and managerial implications in engaging customers through eWOM.

5 citations

Journal ArticleDOI
Ahmed Alharbi1, Hai Dong1, Xun Yi1, Zahir Tari1, Ibrahim Khalil1 
TL;DR: A detailed review of social media identity deception detection techniques is presented in this paper, which can be classified into three categories: fake profile, identity theft and identity cloning, and identifies primary research challenges and issues in the existing detection techniques.
Abstract: Social media have been growing rapidly and become essential elements of many people's lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. This survey analyses various identity deception attacks, which can be categorized into fake profile, identity theft and identity cloning. This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques. This article is expected to benefit both researchers and social media providers.

3 citations

References
More filters
Journal ArticleDOI
TL;DR: In this article, a typology for motives of consumer online articulation is proposed, drawing on findings from research on virtual communities and traditional word-of-mouth literature, which is based on the same authors' work.

4,881 citations


"Impact of Anonymity and Identity De..." refers background in this paper

  • ...0 and new media now provide many virtual avenues for users to engage and indulge in eWOM, both negative and positive [8]....

    [...]

Journal ArticleDOI
TL;DR: The authors reviewed the history of computer mediated communication and found that impersonal communication is sometimes advantageous, and strategies for the intentional depersonalization of media use are inferred, with implications for Group Decision Support Systems effects.
Abstract: While computer-mediated communication use and research are proliferating rapidly, findings offer contrasting images regarding the interpersonal character of this technology. Research trends over the history of these media are reviewed with observations across trends suggested so as to provide integrative principles with which to apply media to different circumstances. First, the notion that the media reduce personal influences—their impersonal effects—is reviewed. Newer theories and research are noted explaining normative “interpersonal” uses of the media. From this vantage point, recognizing that impersonal communication is sometimes advantageous, strategies for the intentional depersonalization of media use are inferred, with implications for Group Decision Support Systems effects. Additionally, recognizing that media sometimes facilitate communication that surpasses normal interpersonal levels, a new perspective on “hyperpersonal” communication is introduced. Subprocesses are discussed pertaining to re...

4,401 citations

Journal ArticleDOI
TL;DR: This review covers recent developments in the social influence literature, focusing primarily on compliance and conformity research published between 1997 and 2002, and emphasizes the ways in which these goals interact with external forces to engender social influence processes that are subtle, indirect, and outside of awareness.
Abstract: This review covers recent developments in the social influence literature, focusing primarily on compliance and conformity research published between 1997 and 2002. The principles and processes underlying a target's susceptibility to outside influences are considered in light of three goals fundamental to rewarding human functioning. Specifically, targets are motivated to form accurate perceptions of reality and react accordingly, to develop and preserve meaningful social relationships, and to maintain a favorable self-concept. Consistent with the current movement in compliance and conformity research, this review emphasizes the ways in which these goals interact with external forces to engender social influence processes that are subtle, indirect, and outside of awareness.

4,223 citations

Journal ArticleDOI
John R. Suler1
TL;DR: Six factors that interact with each other in creating this online disinhibition effect are explored: dissociative anonymity, invisibility, asynchronicity, solipsistic introjection, dissociable imagination, and minimization of authority.
Abstract: While online, some people self-disclose or act out more frequently or intensely than they would in person. This article explores six factors that interact with each other in creating this online disinhibition effect: dissociative anonymity, invisibility, asynchronicity, solipsistic introjection, dissociative imagination, and minimization of authority. Personality variables also will influence the extent of this disinhibition. Rather than thinking of disinhibition as the revealing of an underlying "true self," we can conceptualize it as a shift to a constellation within self-structure, involving clusters of affect and cognition that differ from the in-person constellation.

2,876 citations


"Impact of Anonymity and Identity De..." refers background in this paper

  • ...Furthermore, just like other CMCs, eWOM via social media may lack both non-verbal and social context cues, yet users adjust to the new environment and use alternative linguistic and other forms of heuristics for judgement [16, 17]....

    [...]

Proceedings ArticleDOI
28 Mar 2011
TL;DR: There are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.
Abstract: We analyze the information credibility of news propagated through Twitter, a popular microblogging service. Previous research has shown that most of the messages posted on Twitter are truthful, but the service is also used to spread misinformation and false rumors, often unintentionally.On this paper we focus on automatic methods for assessing the credibility of a given set of tweets. Specifically, we analyze microblog postings related to "trending" topics, and classify them as credible or not credible, based on features extracted from them. We use features from users' posting and re-posting ("re-tweeting") behavior, from the text of the posts, and from citations to external sources.We evaluate our methods using a significant number of human assessments about the credibility of items on a recent sample of Twitter postings. Our results shows that there are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.

2,123 citations


"Impact of Anonymity and Identity De..." refers background in this paper

  • ...Credibility may not be derived solely from familiarity of source or believing others as they part of a physical social network, it will be assessed using all the other information available on the platform itself [2]....

    [...]

Frequently Asked Questions (6)
Q1. What have the authors contributed in "Impact of anonymity and identity deception on social media ewom" ?

The paper concludes with a list of relevant factors and propositions that must be tested empirically to draw greater understanding of the phenomenon. 

It further explained how receiver network-related features like homophily, subjective norms and social conformity may be responsible for the anonymous blog going viral. With the help of the observations of this case and literature the article posites several research directions that can be explored. 

This article enquires why despite of anonymity, deindividualisation and possible threat of identity deception, anonymous communication is influential, believable and gathers credibility. 

Technology has enabled interpersonal communication to be visible on a more transparent public domain, simultaneously accessible to a very large set of audience. 

The traditional understanding of credibility, based on the extant literature on the subject, is that it may be derived as a result of interaction of source characteristics, message characteristics and receiver characteristics [20]. 

The paper explores how in the absence of traditional sources of credibility, users of social media explore alternate heuristics to assess credibility. 

Trending Questions (1)
How does the context of the situation effect wheher anonymity should be allowed on social media?

The provided paper does not directly address the question of how the context of the situation affects whether anonymity should be allowed on social media. The paper focuses on the impact of anonymity on eWOM behavior and the need for a better understanding of this phenomenon.