DOI QR코드

DOI QR Code

The Effect of Anonymity on Virtual Team Performance in Online Communities

온라인 커뮤니티 내 익명성이 가상 팀 성과에 미치는 영향

  • Lee, Un-Kon (College of Economics and Business Administration, The University of Suwon) ;
  • Lee, Aeri (Department of Management Information Systems, Yuhan University) ;
  • Kim, Kyong Kyu (Graduate School of Information, Yonsei University)
  • Received : 2015.02.02
  • Accepted : 2015.02.20
  • Published : 2015.02.28

Abstract

One of the challenges in online community management is what level of perceived anonymity can be granted to encourage active participation from members while discouraging unhealthy activities. Few studies developed a scheme of anonymity and investigated how different levels of anonymity influence community activities. This study develops a classification scheme of anonymity encompassing the following three different levels : (1) real name(no anonymity), (2) nickname (partial anonymity), and (3) random assignment of a temporal ID (complete anonymity). Then, it examines how different levels of anonymity influence trust and perceived risk, which in turn affect virtual team performance. A series of laboratory experiments were performed, manipulating the levels of anonymity, in the context of well-structured communities that allow prior interactions among community members. The data was collected from 364 laboratory participants and analyzed using ANOVA and PLS. The results indicate that the difference of anonymity between (2) and (3) had not be significant and the only (1) could not guarantee the anonymity. The impact of anonymity on trust and perceived risk could not be significant in this situation. These findings could contribute to make more beneficial member identification strategies in online community practice.

온라인 커뮤니티 구성원들의 참여를 독려하고 비행을 막기 위해 어느 수준의 익명성을 보장하여야 하는지에 대한 연구가 시급하다. 그러나, 선행연구들은 익명성의 개념이나 구분에 대한 체계적인 연구를 진행하지 못하였을 뿐만 아니라, 온라인 커뮤니티의 가상 팀 활동에 익명성이 어떠한 영향을 미칠 수 있는지에 대한 연구가 부족하였다. 본 연구에서는 익명성의 개념 및 효과에 대한 선행연구를 종합하고, 익명성을 1) 실명(무익명), 2) 별명(부분 익명), 3) 임의의 숫자 아이디를 임시로 부여(완전 익명)의 세 가지 수준으로 구분하였다. 이러한 익명성의 차이가 온라인 커뮤니티 구성원들의 신뢰 및 인지된 신원 노출 위험에 영향을 미침으로써, 결과적으로 가상 팀 성과에 어떠한 영향을 미치는지를 실증적으로 검증하였다. 실험실 실험이 수행되었으며, 온라인 커뮤니티의 실제 모습을 반영하기 위해 정착된 커뮤니티의 가상 팀 상황을 만들어 자료를 수집하였다. 총 364개의 응답이 수집된 가운데, ANOVA와 PLS를 활용하여 자료를 분석하였다. 연구 결과, 실명과 별명을 부여한 익명성 집단간 차이는 유의하지 않았으며, 임의의 아이디를 임시로 부여하였던 집단만이 인지된 익명성에 유의한 차이를 보였다. 동시에 익명성의 효과는 정착된 커뮤니티의 가상 팀 상황에서는 신뢰, 인지된 위험에 유의한 영향을 미치지 못하는 것으로 조사되었다. 이러한 연구 결과는 온라인 커뮤니티 실무에서 보다 전략적인 커뮤니티 구성원의 익명성 보호 전략을 수립하는데 도움을 줄 수 있을 것으로 판단한다.

Keywords

References

  1. Ahuja, M., Galletta, D., and Carley, K., "Individual Centrality and Performance in Virtual R&D Groups : An Empirical Study," Management Science, Vol. 49, No. 1. pp. 21-38, 2003. https://doi.org/10.1287/mnsc.49.1.21.12756
  2. Alnuaimi, O. A., Robert, L. P. Jr., and Maruping, L. M., "Team Size, Dispersion, and Social Loafing in Technology-Supported Teams : A Perspective on the Theory of Moral Disengagement," Journal of Management Information Systems, Vol. 27, No. 1, pp. 203-230, 2010. https://doi.org/10.2753/MIS0742-1222270109
  3. Altschuller, S. and Benbunan-Fish, R., "The Pursuit of Trust in ad hoc Virtual Teams : How Much Electronic Portrayal in Too Much?," European Journal of Information Systems, Vol. 22, pp. 619-636, 2013. https://doi.org/10.1057/ejis.2012.39
  4. Barclay, D., Higgins, C, and Thompson, R., "The Partial Least Squares (PLS) Approach to Causal Modeling : Personal Computer Adoption and Use as an Illustration, Technology Studies," Vol. 2, No. 2, pp. 285-309, 1995.
  5. Bhattacherjee, A., "Understanding Information Systems Continuance : An Expectation-Confirmation Model," MIS Quarterly, Vol. 25, No. 3, pp. 351-370, 2001. https://doi.org/10.2307/3250921
  6. Campbell, D. T. and J. C. Stanley, "Experimental and Quasi-Experimental Designs for Research, Rand McNally & Company," Chicago, 1963.
  7. Chesney, T., Coyne, I., Logan, B., and Madden, N., "Creifing in Virtual Worlds : Causes, Casualities and Coping Stretagies," Information Systems Journal, Vol. 19, pp. 525-548, 2009. https://doi.org/10.1111/j.1365-2575.2009.00330.x
  8. Chin, W. W. and Todd, P. A., "On the Use, Usefulness, and Ease of Use of Structural Equation Modeling in MIS Research : A Note of Caution," MIS Quarterly, Vol. 19, No. 2, pp. 237-246, 1995. https://doi.org/10.2307/249690
  9. Chin, W. W., "The Partial Least Squares Approach for Structural Equation Modeling," In : G. A. Marcoulides (eds.), Modern Methods for Business Research Lawrence Erlbaum Associates, 1998.
  10. Chin, W. W. and Frye, T., "PLS Graph, 2.91," University of Calgary, Calgary, Canada, 1996.
  11. Christopherson, K., "The Positive and Negative Implications of Anonymity in Internet Social Interactions : 'On the Internet, Nobody Knows You're a Dog," Computers in Human Behavior, Vol. 23, pp. 3038-3056, 2007. https://doi.org/10.1016/j.chb.2006.09.001
  12. Churchill, G. A. Jr., "A Paradigm for Developing Better Measures of Marketing Constructs," Journal of Marketing Research, Vol. 16, pp. 64-73, 1979. https://doi.org/10.2307/3150876
  13. Connolly, T., Jessup, L. M., and Valacich, J. S., "Effects of Anonymity and Evaluative Tone on Idea Generation in Computer- Mediated Groups," Management Sciences, Vol. 36, No. 6, pp. 689-703, 1990. https://doi.org/10.1287/mnsc.36.6.689
  14. Dirks, K. T. and Ferrin, D. L., "The Role of Trust in Organizational Settings," Organizational Science, Vol. 12, No. 4, pp. 450-467, 2001. https://doi.org/10.1287/orsc.12.4.450.10640
  15. Dubrovsky, V. J., Kiesler, B. N., and Sethna, B. N., "The Equalization Phenomenon : Status Effect in Computer- Mediated and Face-to-Face Decisionmaking Groups," Human-Computer Interaction, Vol. 2, No. 2, pp. 119-146, 1991.
  16. En.wikipedia.com, "Anonymity and Minerva Syndrome," 2014.
  17. Fang, Y. and Neufeld, D., "Understanding Sustained Participation in Open Source Software Projects," Journal of Management Information Systems, Vol. 25, No. 4, pp. 9-50, 2009. https://doi.org/10.2753/MIS0742-1222250401
  18. Fishbein, M. and Ajzen, A. I., "Belief, Attitude, Intention, and Behavior : An Introduction to Theory and Research," Addison-Wesley, Reading, MA, 1975.
  19. Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981. https://doi.org/10.2307/3151312
  20. Garfield, M. J. and Dennis, A. R., "Toward an Integrated Model of Group Development : Disruption of Routines by Technology- Induced Change," Journal of Management Information Systems, Vol. 29, No. 3, pp. 43-86, 2013. https://doi.org/10.2753/MIS0742-1222290302
  21. Gersick, C. J. G., "Time and Transition in Work Teams : Toward a New Model of Group Development," Academic Management Journal, Vol. 31, No. 1, pp. 9-41, 1988. https://doi.org/10.2307/256496
  22. Ha, T., "Statistics of Online Community Activity and Social, Economic issue participation in Korea," KISDI STAT Report, KISDI ICT Statistic Center, 13-06-02, 2013.
  23. Hahn, J. P., Moon, J. Y., and Zhang, C., "Emergence of New Project Teams from Open Source Software Developer Networks : Impact of Prior Collaboration Ties," Information Systems Research, Vol. 19, No. 3, pp. 369-391, 2008. https://doi.org/10.1287/isre.1080.0192
  24. Haines, R. and Mann, J. E. C., "A New Perspective on De-individuation via Computer-mediated Communication," European Journal of Information Systems, Vol. 20, pp. 156-167, 2011. https://doi.org/10.1057/ejis.2010.70
  25. Haraway, D., "A Manifesto for Cyborgs : Science, Technology, and Socialist Feminism in the 1908's," In L. J. Nicholson (Ed.), Feminism/postmodernism (pp. 190- 233). London : Routledge, 1990.
  26. Hatfield, E. and Sprecher, S., "Mirror, Mirror, The Importance of Looks in Everyday Life," Albany : State University of New York Press, 1986.
  27. Hayne, S. C. and Rice, R. E., "Attribution Accuracy when Using Anonymity in Group Support Systems," International Journal of Human-Computer Studies, Vol. 47, No. 3, pp. 429-452, 1997. https://doi.org/10.1006/ijhc.1997.0134
  28. Jarvenpaa, S. L., Shaw, T. R., and Staples, D. S., "Toward Contextualized Theories of Trust : The Role of Trust in Global Virtual Teams," Information Systems Research, Vol. 15, No. 3, pp. 250-267, 2004. https://doi.org/10.1287/isre.1040.0028
  29. Jessup, L. M., Connolly, T., and Galegher, J., "The Effects of Anonymity on GDSS Group Process with an Idea Generating Task," MIS Quarterly, Vol. 14, No. 3, pp. 312-321, 1990.
  30. Kim, C., "Besides of Human Right in Online Privacy Invasion : Online Abuser Could Find Even the Human Relationship in 35 minutes by Identity Chasing using a Photo," Kukmin newspaper, 2012.
  31. Koufaris, M., "Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior," Information Systems Research, Vol. 13, No. 2, pp. 205-223, 2002. https://doi.org/10.1287/isre.13.2.205.83
  32. Leimeister, J. M., Ebner, W., and Krcmar, H., "Design, Implementation and Evaluation of Trust-Supporting Components in Virtual Communities for Patients," Journal of Management Information Systems, Vol. 21, No. 4, pp. 101-135, 2005. https://doi.org/10.1080/07421222.2005.11045825
  33. Lockheed, M. E. and Hall, K. P., "Conceptualizing Sex as a Status Characteristic : Applications to Leadership Training Strategies," Journal of Social Issues, Vol. 32, pp. 111-124, 1976. https://doi.org/10.1111/j.1540-4560.1976.tb02600.x
  34. Ma, M. and Agarwal, R., "Through a Glass Darkly : Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities," Information Systems Research, Vol. 18, No. 1, pp. 42-67, 2007. https://doi.org/10.1287/isre.1070.0113
  35. McKnight, D. H., Choudhury, V., and Kacmar, C., "Developing and Validating Trust Measures for E-Commerce : An Integrative Typology," Information Systems Research, Vol. 13, pp. 334-359, 2002. https://doi.org/10.1287/isre.13.3.334.81
  36. Miller, F. G. and Rowold, K. L., "Halloween Masks and Deindividuation," Psychological Reports, Vol. 44, p. 422, 1979. https://doi.org/10.2466/pr0.1979.44.2.422
  37. Nunamaker, J. F., Dennis, A. R., Valacich, J. S., Vogel, D., and George, J. F., "Electronic Meeting Systems to Support Group Work," Communication of ACM, Vol. 34 No. 7, pp. 40-61, 1991.
  38. Park, S., "SNS make the Mass Communication from the Basic Sharing of Individual Issues to the Political Participation and Discussion," Hankuk newspaper, 2011.
  39. Park, S., "Framing and Unproven Rumors to the Stars under the Shade of Anonymity," Hankuk Economics, 2013.
  40. Pavlou, P. A. and Gefen, D., "Psychological Contract Violation in Online Marketplaces : Antecedents, Consequences, and Moderating Role," Information Systems Research, Vol. 16, No. 4, pp. 372-399, 2005. https://doi.org/10.1287/isre.1050.0065
  41. Pavlou, P. A. and Gefen, D., "Building Effective Online Marketplaces with Institution- Based Trust," Information Systems Research, Vol. 15, No 1, pp. 37-59, 2004. https://doi.org/10.1287/isre.1040.0015
  42. Pfitzmann, A. and Hansen, M., "Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management a Proposal for Terminology," Paper presented at the International Workshop on Designing Privacy Enhancing Technologies, 2008.
  43. Pinsonneault, A. and Heppel, N., "Anonymity in Group Support Systems Research : A New Conceptualization, Measure, and Contingency Framework," Journal of Management Information Systems, Vol. 14, No. 3, pp. 89-108, 1997. https://doi.org/10.1080/07421222.1997.11518176
  44. Postmes, T., Spears, R., and Lea, M., "Breaching or Building Social Boundaries? SIDE-Effects of Computer-Mediated Communication," Communication Research, Vol. 25, No. 6, pp. 689-715, 1998. https://doi.org/10.1177/009365098025006006
  45. Postmes, T., Spears, R., Sakhel, K., and de Groot, D., "Social Influence in Computer- Mediated Communication : The Effects of Anonymity on Group Behavior," Personality and Social Psychology Bulletin, Vol. 27, No. 10, pp. 1243-1254, 2001. https://doi.org/10.1177/01461672012710001
  46. Prentice-Dunn, S. and Rogers, R. W., "Effects of Public and Private Self- Awareness on Deindividuation and Aggression," Journal of Personality and Social Psychology, Vol. 43, pp. 503-513, 1982. https://doi.org/10.1037/0022-3514.43.3.503
  47. Seddon, P. B., "A Respecification and Extension of the DeLone and McLean Model of IS Success," Information Systems Research, Vol. 8, No 3, pp. 240-253, 1997. https://doi.org/10.1287/isre.8.3.240
  48. Simons, T., Pelled, L. P., and Smith, K. A., "Making Use of Difference : Diversity, Debate, and Decision Comprehensiveness in Top Management Teams," Academy of Management Journal, Vol. 42, No. 6, pp. 662-673, 1999. https://doi.org/10.2307/256987
  49. Shin, J., Kim, K., and Park, J., "The Effect of Social Anonymity on Community Quality : Mediated by Self Expression, Self Control, and Community Ties," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 257-281, 2011. https://doi.org/10.7838/jsebs.2011.16.4.257
  50. Son, J. Y. and Kim, S. S., "Internet Users' Information Privacy-Protective Responses : A Taxonomy and a Nomological Model," MIS Quarterly, Vol. 32, No. 3, pp. 503-529, 2008. https://doi.org/10.2307/25148854
  51. Spears, R. and Lea, M., "Social Influence and the Influence of the 'Social' in Computer- Mediated Communication," In M. Lea (Ed.), Contexts of computer-mediated communication (pp. 30-65). London : Harvester-Wheatsheaf, 1992.
  52. Stewart, K. L., "Trust Transfer on the World Wide Web," Organizational Science, Vol. 14, No. 1, pp. 5-17, 2003. https://doi.org/10.1287/orsc.14.1.5.12810
  53. Stone, E. F., "Research Methods in Organizational Behavior," Santa Monica, CA, Goodyear, 1978.
  54. Turner, J. C., "The Analysis of Social Influence. In J. C. Turner, M. A. Hogg, P. J. Oakes, S. D. Reicher, and M. S. Wetherell (Eds.), Rediscovering the Social Group : A Self-Categorization Theory," Oxford, UK : Basil Blackwell, 1987.
  55. Valacich, J. S., Dennis, A. R., and Nunamaker, J. F., Jr., "Group Size and Anonymity Effects on Computer-Mediated Idea Generation," Small Group Research, Vol. 23, No. 1, pp. 49-73, 1992. https://doi.org/10.1177/1046496492231004
  56. Walther, J. B., "Group and Interpersonal Effects in International Computer-Mediated Collaboration," Human Communication Research, Vol. 23, No. 3, pp. 342-369, 1997. https://doi.org/10.1111/j.1468-2958.1997.tb00400.x
  57. Werts, C. E., Linn, R. L., and Joreskog, K. G., "Intra-class Reliability Estimates : Testing Structural Assumptions," Educational and Psychological Measurement, Vol. 34, pp. 25-33, 1973.
  58. Wold, H., "Systems Under Indirect Observation Using PLS, in A Second Generation of Multivariate Analysis," C. Fornell (Ed.), Praeger, New York, pp. 325-347, 1982.
  59. Zimbardo, P. G., "The Human Choice : Individuation, Reason, and Order vs. Deindividuation, Impulse, and Chaos," In W. J. Arnold and D. Levine(Eds.), Nebraska symposium on motivation Vol. 17, pp. 237-307, Lincoln : University of Nebraska Press, 1969.

Cited by

  1. Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception vol.26, pp.2, 2016, https://doi.org/10.13089/JKIISC.2016.26.2.475
  2. 오픈마켓에서 구매자의 신뢰와 불신의 역할: 중개업체와 판매자간 전이를 중심으로 vol.17, pp.2, 2015, https://doi.org/10.5392/jkca.2017.17.02.360
  3. Investigating Moderators of the Influence of Enablers on Participation in Knowledge Sharing in Virtual Communities vol.13, pp.17, 2015, https://doi.org/10.3390/su13179883