Professional Documents
Culture Documents
10.attribution Accuracy When Using Anonymity in Group Support Systems
10.attribution Accuracy When Using Anonymity in Group Support Systems
10.attribution Accuracy When Using Anonymity in Group Support Systems
1. Introduction
Organizational work style and pace are changing, with greater reliance on the use of
teams, cross-functional and inter-organizational interactions involving groups of skilled
workers with diverse (Keltner, 1989). To maintain coordination and communication
amongst these teams, companies hold meetings. While such meetings are the most
critical communication forum for many organizations, frequently they are time-
consuming and unproductive experiences (Hackman & Kaplan, 1974; Mosvick &
Nelson, 1987; Rice & Shook, 1990; Pollard & Hayne, 1996).
A fairly new set of technologies designed to assist groups is called group support
systems (GSS) (Jessup & Valacich, 1993). GSS support a range of different group
activities such as brainstorming, categorization, decision-making and voting (Hackman
& Kaplan, 1974; DeSanctis & Gallupe, 1987; Dennis, George, Jessup, Nunamaker &
Vogel, 1988; Zigurs, Poole & DeSanctis, 1988; Nunamaker, Dennis, Valacich, Vogel &
George, 1991; Hiltz & Turoff, 1993).
One difference between a GSS meeting and a face-to-face meeting is that a GSS can
provide the option for group members to contribute comments or messages anonym-
ously, i.e. without revealing the author’s identity. Anonymity in GSS is interesting for
several reasons. First, prior research indicates that anonymity is an important variable
in studying, evaluating and managing GSS. Second, there is increasing interest in
examining anonymity as a determinant of a variety of group outcomes, in particular idea
generation. Third, anonymity is a complex construct. For example, is anonymity simply
429
1071-5819/97/090429#24$25.00/0/hc 970134 ( 1997 Academic Press Limited
430 S. C. HAYNE AND R. E. RICE
a feature of the technology that can be turned ‘‘on’’ or ‘‘off ’’ or are there more social
components?.
This paper describes results from surveys of seven groups’ responses concerning their
GSS use of anonymous brainstorming GSS for real organizational discussions. We have
conducted over 200 meetings using GSS of various types with the anonymity feature
engaged. It is our experience that during coffee breaks, participants repeatedly attempt to
decipher ‘‘who said what’’, and often attribute certain comments to other individuals
(frequently incorrectly), based on social cues in the textual comments. In this context, the
two basic questions considered here are (1) can we accept the assumption that using the
technical ‘‘anonymity’’ feature of a GSS will truly preserve ‘‘anonymity’’ and (2) what might
influence attributions of identity even under conditions of ‘‘anonymity’’?
2.2. ANONYMITY
A major feature of some GSS is an ‘‘anonymity’’ condition: individuals can create
messages and vote or express preferences without identifying themselves and thus
without being able to identify the authors of contributions to the GSS discussion
(Nunamaker et al., 1991). Different ‘‘levels’’ of anonymity could be achieved in several
ways, i.e. by not introducing participants who have not previously met, not requiring or
posting author identity, or allowing participants to use ‘‘pen names’’ or aliases (Hiltz,
Turoff & Johnson, 1989; Jessup, Connolly & Galegher, 1990; Connolly, Jessup & Val-
acich, 1991; Lim & Benbasat, 1991). Much of the prior GSS research is equivocal on the
effects of anonymity. This ambiguity may be due to the wide variety of research
paradigms and settings employed, the variability of the technology and its use, and
different conceptualizations of anonymity.
ATTRIBUTION ACCURACY IN GROUP SUPPORT SYSTEMS 431
Efforts by many researchers (Hackman & Kaplan, 1974; Kerr & Bruun, 1981; Siegal,
Dubrovsky, Kiesler & McGuire, 1986; George, Easton, Nunamaker & Northcraft, 1990;
Jessup et al., 1990a; Pinsonneault & Kraemer, 1990; Connolly et al., 1991; Jessup &
Tansik, 1991; McLeod, 1992; Jessup & Valacich, 1993) have generally found an increase
in production and satisfaction when anonymous group brainstorming is used. Other
advantages of anonymous participation include decreased evaluation apprehension,
decreased member domination, decreased conformance pressure and decreased status
competition, which can lead to increased exploration of alternatives and surfacing of
assumptions.
However, potential disadvantages include social loafing, failure to listen, disinhibition,
deindividuation and poor socialization, which can lead to decreased effectiveness and
group dissatisfaction. Anonymity may not affect the ability to contribute, but it does
seem to affect what a participant is willing to say, and how it is said.
Valacich, Jessup, Dennis and Nunamaker (1992) provide a major review and concep-
tual framework which discusses the role of anonymity in GSS. They propose two types of
anonymity: process and content. Process anonymity promises a participant that others
will not know whether or not the particular participant is in fact participating. (Process
anonymity is not often available during same time, same place GSS meetings, because
participants can readily see who is there.) Content anonymity prevents others from
knowing who contributes particular messages. Content anonymity may be either local
(during the process) or global (extended even to later analysis of transcripts or logs). An
individual can take advantage of process anonymity, but inadvertently or intentionally
reveal themselves with their message content. Both of these forms of anonymity focus on
the technical aspect of anonymity.
Such emphasis on technical anonymity tends to ignore group members’ cognitive and
social processes, seeing individuals instead as minimediators of larger group processes.
This is inappropriate, because individuals bring with them a myriad of information that
can be brought to bear upon anonymously entered text to uncover cues and then
associate text with other group members.
Further, Licker (1992a, b) proposed that anonymity is a state of the individual,
experienced either as Identitylessness or Source Dissociation. Identitylessness is the
perception that one does not have an identifiable locus in a setting—i.e. others do not
know I am a participant or what my role is—whereas Source Dissociation is a feeling
that others cannot identify one as the source of specific messages—i.e. others do not
know I entered this comment. It is the source dissociation aspect of anonymity, a social
and not a technical condition, that we find interesting.
However, most GSS researchers adopt a definition of anonymity that treats anonym-
ity as a purely technical feature. This techno-centric definition hides the more social
nature of anonymity in communication settings; we feel anonymity is not just a switch
that can be turned on and off. First, people are seldom unidentified in every way. Second,
it is generally artificial to be an anonymous participant in most kinds of non-GSS
meetings (George et al., 1990), although we acknowledge that short-lived anonymous
situations such as expressing preferences through blind balloting do exist. Moreover,
Mennecke, Hoffer and Wynne (1992) suggest that even during GSS sessions, ‘‘extra-
meeting’’ influences, such as those discussions during coffee breaks, may serve as inputs
into future interactions and overcome anonymity.
432 S. C. HAYNE AND R. E. RICE
Consequently, we argue that there are two types of anonymity, technical and social.
¹echnical anonymity occurs when any meaningful identifying information about others
(or yourself ) is removed from any material exchanged. Thus, even content can be
technically anonymous if it cannot be linked (and therefore associated with prior
content) as coming from the same author, especially if that author is not specifically
identifiable. This may be enacted through the use of technical GSS features such as using
‘‘pen names’’, unsigned messages or removal of all account and participant identity in
any communication exchanged through the system (one can imagine voice signatures
and tones being removed from audio conferencing, etc.). Even asynchronous interaction
may reduce, to some extent, the identity of participants, by delaying responses and
ongoing contexts for identifying authors. Technical anonymity supposedly removes all
evaluations and responses based on social cues or personal identity and allows the
content alone to influence subsequent comments and decisions.
Social anonymity occurs when users actually perceive others (and perhaps even
oneself ) to be deindividuated or unidentifiable, perhaps because they do not perceive any
cues or contexts available to use in attributing the identities of others in relating multiple
messages. In GSS, technical anonymity seems to be a necessary, but not sufficient,
condition for social anonymity. As noted above, users may perceive others to be
identifiable, even under conditions of technical anonymity. Hence, technical anonymity
may be high, but social anonymity may be low.
Given the possibility of low social anonymity in technically anonymous GSS, we find
no prior research that empirically considers either the level or accuracy of attributions.
Group communication, membership, task, proximity, synchroneity, process, identity and
concern for anonymity are all issues that may influence levels of social anonymity, as
discussed below. (By the way, this is a general concern, not necessarily limited to
computer-mediated anonymity. For example, pieces of paper used by group members to
record their vote for later tabulation might be considered as the ‘‘technical’’ aspect of
voting anonymity. There are many situations where this ‘‘technically’’ anonymous voting
is highly charged with attributions and, thus, not ‘‘socially’’ anonymous.)
we successfully decode, the more accurate our attribution. Thus, available or perceived
cues can affect the social anonymity of participants in technically anonymous GSS,
evaluations of specific participants and their contributions and perhaps general decision
outcomes. But on what could these attributions be based, if people are using not only
a technically anonymous, but also a text-based, GSS?
Two somewhat similar theories focus on the interaction between social cues and use of
new organizational media: social presence (Short, Williams & Christie, 1976; Rice, 1987)
and media richness (Daft & Lengel, 1984, 1986). Both emphasize how communication
media differ in the extent to which (1) they can overcome various communication
constraints of time, location, permanence, distribution and distance, (2) transmit the
social, symbolic and nonverbal cues of human communication and (3) allow interpreta-
tion of equivocal information. Rice (1987) also discusses these and other attributes of
media.
According to these two theories, computer-mediated communication generally trans-
mits fewer social and nonverbal cues. This is because text-based media such as electronic
mail and group support systems have limited technical bandwidth compared to face-to-
face communication. In many cases, especially for tasks that require high social presence
or information richness, this cue reduction is associated with negative effects such as
disinhibition (flaming), misunderstandings, lack of consensus and feelings of imperson-
ality (Kiesler, Siegel & McGuire, 1984; Rice, 1984). However, the reduction of such cues
may also lessen status differences and domination based on appearance, oral skills, etc.,
that are common in face-to-face group discussions (Krauss, Apple, Morency, Wenzel
& Winton, 1981). In computer-mediated communication, this reduction of cues is often
reflected in more equal participation, more reciprocal communication and less sequential
or linear comments (Rice, 1984; Dennis et al., 1988; Hiltz & Turoff, 1993).
This proposed ability of new media to reduce the communication of social cues is one
reason for the development and testing of anonymity features in group support systems.
For certain group activities, such as brainstorming or airing disagreements, it is the-
oretically advantageous to allow participants to offer comments simultaneously and
anonymously, to further decrease possible negative effects of social, status and authority
cues (Jessup et al., 1990b). Thus, a participant’s internal and public responses to the
comments are disassociated from responses to specific others, as well as from attributions
of others’ motivations behind the comments. As a result, in medium to large groups,
electronic brainstorming and similar techniques (such as the nominal group—Moore,
1987) seem to stimulate more diverse, more numerous and more honest comments.
Especially for certain politically charged or difficult group issues, this anonymity of
authorship can be a crucial component of group success (that the difficulty of making
accurate attributions under these conditions has been presumed to imply that people do
not make attributions under these conditions).
In spite of the research summarized earlier that presume CMC and GSS filter out
most such social cues, some researchers argue that text-based media may still convey
substantial emotional and personal content (see reviews in Kiesler et al., 1984; Culnan
& Markus, 1987; Rice & Love, 1987). Further, CMC users may develop richer relations
and ways of increasing social cues in their electronic mail messages over time (Sproull
& Kiesler, 1986; Walther, 1992). In attempts to improve one’s relational understanding of
other communicators, users may ‘‘develop distinctive impressions of other interactants
ATTRIBUTION ACCURACY IN GROUP SUPPORT SYSTEMS 435
3. Hypotheses
Thus, the two general research questions for this study are: (1) can we accept the
assumption that using the technical ‘‘anonymity’’ feature of a GSS will truly preserve
‘‘anonymity’’ and (2) what might influence attributions of identity even under conditions of
‘‘anonymity’’? Three sets of directional hypotheses follow from the prior discussions:
H1. Group members can accurately identify the source of technically anonymous
comments.
H2a. Longer membership in a group is positively associated with one’s mean percent
correct identification of authorship of technically anonymous comments.
H2b. The total amount of one’s prior communication within a group is positively
associated with one’s mean percent correct identification of authorship of technically
anonymous comments.
H2c. One’s position in the prior communication network, as measured by be-
tweenness centrality, is positively associated with one’s mean percent correct identifica-
tion of authorship of technically anonymous comments.
H3. The prior pairwise communication among group members is positively asso-
ciated with the percentage correct identification of authorship of technically anonymous
comments between those pairs of group members.
Hypothesis H1 is conceptually independent from the other hypotheses. That is, if
people cannot accurately make attributions, the attribution process itself might still be
predictable.
4. Methods
We have engaged in an exploratory study involving a ‘‘real-time’’ survey of GSS use. The
groups studied herein are not highly controlled laboratory, student or simulated groups
(as critiqued by McGrath & Hollingshead, 1993), but are field groups attempting to
resolve actual business problems. Natural groups are often part of a larger organization,
are likely to have worked together previously and may be working on several projects
simultaneously. Groups do not, of course, have to represent projects or teams—they may
be any set of people with regular interaction and a common goal.
4.1. PARTICIPANTS
The seven organizational units involved here are all operations divisions of mid-
sized firms—i.e. subjects were staff, managers and executives, not faculty or stu-
dents. All groups consisted of people who had worked together previously—some
for up to 15 yrs—and contained members who worked together daily. All were
meeting and using a GSS to resolve real, salient and ongoing business problems. These
groups were not standing ‘‘committees’’ or ‘‘task forces’’ assigned to assess a particular
project; the groups were made up of almost all the members of their respective business
unit.
The first four groups (‘‘PE’’ 1—4) were departments belonging to the physical educa-
tion (PE) unit in a large university meeting to deal with budget cutbacks. Managers of the
438 S. C. HAYNE AND R. E. RICE
4.3. DATA
Three forms of data were collected. The first was a communication network roster
administered before each group began its session. This roster simply listed the names of
participants, and asked each participant to indicate the extent to which they communic-
ated with each other listed person about any topic, using any communication channel
(from 0"never, 1"once every few months, to 7"several times a day).
The second form of data were a sample of the actual comments participants entered.
Comments were restricted to those longer than 65 characters in length in order to reduce
comments like ‘‘Me, too!’’. Our intention was to provide comments with at least
a minimal amount of social cues.
Fifteen minutes before the end of the GSS session, one of the researchers used a simple
macro to select up to 50 comments from the issue areas with the most comments entered
into them at that time (potentially different across sessions), in order to maximize the
chance that the comments had been seen by everyone in the group. The comments were
randomly chosen in proportion to the numbers of total comments in each issue window,
yet the original order of the comments from Topic Commenter was preserved. Some of
the issues received more attention than did the others. We assumed that more comments
in an issue area might mean that more people had browsed the comments. Note that we
have no basis to assert that any particular comment was read by any particular member.
These selected comments were copied into a word-processing file and included in the
survey to create and print a ‘‘comment’’ questionnaire that was distributed immediately
at the end of the phase.
The comment questionnaire was the third form of data. First it asked several indi-
vidual-level questions about group membership and attitudes toward anonymity. These
were followed by a list of each of the participants with an assigned sequential letter, and
a listing of the selected comments for that group. Since Topic Commenter is designed to
maintain and guarantee anonymity, it could not record who actually entered each
comment. So, the participants were first asked to indicate which comments were theirs (if
any), by entering their own letter alongside them. Note that we have no basis to assert
that each such self-identification was correct. However, there are two bounds to this
assertion: (1) very few comments were claimed by more than one participant and
(2) very few people did not claim any comments (see Table 1, from 1 to 9). Then the
TABLE 1
Comment totals
PE1 228 52 1 1 21
PE2 352 26 3 2 21
PE3 200 39 3 1 9
PE4 156 50 1 1 23
Consult 134 35 1 3 70
Pipe 159 40 1 9 34
Oil 122 39 1 1 17
440 S. C. HAYNE AND R. E. RICE
participants were asked to make their best guess as to which other participants contrib-
uted the listed comments, by entering the other participant’s letter alongside the com-
ment. The instructions indicated it was okay not to enter a person’s letter if one was
unsure. This questionnaire was completed in less than 20 min and returned before the
participants engaged in any other activities.
4.4. MEASURES
The data were used to create the following measures for each group: prior communica-
tion, accuracy of attribution and individual-level survey variables. Few other GSS
studies involving anonymity have developed any related measures associated with
anonymity, other than the ‘‘treatment’’ of anonymity itself. Therefore, most of our
measures of attribution accuracy and attitudes about anonymity were developed for this
study. The communication network measures, however, are typical operationalizations
of sociometric interaction (Rice, 1993).
Prior communication ( from pre-session communication roster).
1. The sum of the communication frequency for each member. This is the row total of
the square, asymmetric scalar matrix of communication frequency among all members of
a group, constructed from the communication roster on the pre-session survey. This is
simply a ‘‘who-to-whom’’ matrix indicating the level of interaction (from 0 to 7) person
i reported having with person j. As j might report a different level of interaction with i,
such matrices are inherently asymmetric (cell i, j of the matrix is not necessarily equal to j,
i). The row total ignores the diagonal (which is 0), and represents the total extent of each
individual’s reported communication with other members of the group.† The mean
communication frequency for each individual, across all the other group members (to
control for the different sizes of each group), was also calculated for descriptive purposes.
2. The standardized betweenness centrality of each person in that person’s group. As
derived by Freeman (1979), betweenness centrality measures the extent to which each
group member lies on the shortest communication paths between all other pairs in the
group. A communication path is the set of interactions needed to connect person i with
person j; the shortest such path is called a ‘‘geodesic’’. The resulting betweenness
† Self-reported measures of a wide range of behaviors—including responses to network questions about the
number and intensity of linkages with other individuals—often disagree with comparable measures of observed
(possibly ‘‘actual’’) behavior, including comparable computer-monitored measures, even when respondents are
surveyed on-line within minutes of actual system use (Bernard, Killworth & Sailer, 1982). Thus, we would be
reluctant to claim that this self-reported frequency measure necessarily accurately reflects prior communication
as opposed to perceived prior communication. It cannot be taken as a necessarily valid indicator of prior
exposure to impression development.
Thus, the column totals of the communication network matrix may be more reliable measures of exposure to
cues from one’s group members than the row totals. That is because one’s reported communication frequencies
with each other group member are not independent; each is systematically biased by the respondent’s recall or
other reporting errors (Bernard et al., 1982). But the total column frequency measures how frequently each
other person indicated he communicated with the respondent. This should average out individual biases,
increasing the reliability of this measure of exposure through communication frequency. To the extent that row
totals and column totals are highly correlated (see footnote ‡), however, not only would any effects be similar,
but our trust in the reliability of the respondent’s reported communication frequency, and the validity of both
measures, would increase.
ATTRIBUTION ACCURACY IN GROUP SUPPORT SYSTEMS 441
TABLE 2
Duration in group, anonymity attitudes, attribution and accuracy
Group N Mean S.D. Mean S.D. Mean S.D. Mean S.D. Mean S.D.
PE1 14 56.6 54.9 5.9 1.1 4.8 2.2 12.3 14.1 0.08 0.14
PE2 19 99.7 66.2 4.8 1.4 5.5 1.3 5.5 6.2 0.11 0.24
PE3 14 39.3 34.4 5.0 1.2 5.4 1.4 3.6 5.2 0.01 0.03
PE4 13 40.0 32.0 5.3 1.8 5.7 1.8 11.6 20.6 0.02 0.05
Consult 14 55.7 44.5 5.4 1.5 4.1 1.7 24.6 11.8 0.29 0.16
Pipe 26 51.6 46.7 5.8 1.1 6.0 1.1 10.2 9.0 0.23 0.28
Oil 17 38.9 32.9 5.3 1.5 5.2 1.6 6.7 9.1 0.01 0.03
Overall 117 55.9* 50.1 5.4 1.4 5.3 1.6 10.5* 12.6 0.12* 0.21
TABLE 3
Network measures
In the first PE group, two people refused to complete the comment questionnaire; they
were very concerned that their comments might find a way back to their managers
(implying anonymity was very important to them!). These were dropped from both the
network and the accuracy matrices before analyses were conducted. Tables 2 and 3
summarize the descriptive statistics for the individual-level variables, and the network
and accuracy variables, respectively.
ATTRIBUTION ACCURACY IN GROUP SUPPORT SYSTEMS 443
5. Results
The percent of all comments attributed by the group ranged from a low of 9% for PE3 to
a high of 70% for the Consult group, with a similar range in mean number of attributions
by individuals from 3.6 in PE3 to 24.6 in Consult. That is, groups ranged widely in the
percentage and frequency of attributions. People felt they were mostly anonymous
(M"5.4), and about equally concerned that these comments should be anonymous in
these meetings (M"5.3). There was no overall statistically significant difference among
the groups on these two perceptions. On average, members belonged to these groups for
almost 5 yr (M"55.9 months), with only PE2 having a significantly higher mean.
Very few people provided any indication (other than the content of the comments) that
there were events that could make it easy to identify comments: most either left the
question blank or wrote ‘‘no’’ or ‘‘none’’. Five people mentioned that it was occasionally
possible to see others’ screens. The following remarks came from the Consult particip-
ants: ‘‘certain comments have been made in the office and appear here’’; ‘‘fluency in
typing’’; ‘‘through joking discussion or the last person was still typing’’; ‘‘the person uses
many words not normally used by others’’; ‘‘recognize some people’s English or lack
thereof ’’ and one person in the Consult group apparently added his initials to his GSS
(not on the survey) comments, which two other respondents from the group mentioned.
As noted below, this group had the second-highest level of perceived anonymity,
a medium level of anonymity importance and was by far the most accurate group! The
remaining comments came from the PE groups (each of which, remember, included
people from the other three PE areas): ‘‘how people express themselves’’; ‘‘strong opinion
that serves their area’’; ‘‘people naming their areas’’ and ‘‘just the type of answers that
were given led me to assume I knew the person who answered’’. Each of these comments
about cues, except for being able to see another’s screen and seeing who’s left typing,
presumes prior knowledge of the other person from communication cues or associated
issue positions.
Notice that we are not able to determine what percentage would be below, equal to or
above chance guessing. Due to the nature of this commercial anonymous GSS, we
cannot capture the number of comments each participant contributed, and it would be
unwise to assume that the proportion of comments claimed by a group member would
hold for the totals in the session. Thus, we are not assessing guesses or errors of omission,
only the accuracy of attributions that are made.
TABLE 4
»ariable and matrix correlations with accuracy
Pipe (r"0.58). Two other (nonsignificant) correlations were positive and two were
negative (PE2 and Consult). Hypothesis 2a received moderate support.
With respect to Hypothesis 2b (total prior communication and attribution accuracy),
only one group showed a significant correlation. The Pipe group members’ total
communication was negatively correlated r"!0.36 (p(0.1) with their percentage
accuracy. Note that this means that the more intensely communicative, the more likely
the group members were to make attributions that were not accurate! As noted in the
methods section, the members of this group may have developed exceptionally close
communication relations due to the emotionally gripping nature of their situation.
Indeed, from Table 3, their mean individual network strength (4.43) was significantly
higher than all other groups’ means except for PE1 (R2"0.21, F "5.2, p(0.001).
6,121
Other than the Pipe group, only the Oil group even approached a significant positive
correlation of network strength with attribution accuracy (r"0.25). Merging the seven
group data sets, the overall correlation was r"0.16 (p(0.1). Hypothesis 2b is not
supported.†
Hypothesis 2c predicted that location in the group’s communication network struc-
ture (centrality) would influence the accuracy of comment attribution. Network central-
ity was marginally significant and positively correlated only in PE1 (r"0.43, p(0.1).
The overall correlation was r"!0.11 and not significant. Hypothesis 2c is not
supported.
In addition, within any specific group, neither perceived anonymity nor importance of
anonymity was correlated with accuracy of attributions.
† The communication row (person i’s rated level of interaction with all j’s) and column (the level of
interaction person j receives from all i’s) totals are significantly correlated for all groups (r"0.56—0.88,
p(0.001) [the shared variance is in the same range reported in the prior studies of self-reported network
communication accuracy (see fn. †)] except for the Consult group (r"0.31, n.s.). So we would not expect much
difference in their effects. The row and column means, of course, equal each other, for each particular group.
ATTRIBUTION ACCURACY IN GROUP SUPPORT SYSTEMS 445
TABLE 5
Regressions of accuracy on network, duration and anonym-
ity variables
Equation parameters
work. As an informal comparison, correlations for matrices that had those values in all
the cells were significant at p(0.05 for values of r"0.15 and greater.
Table 4 shows that only PE4 exhibited a clearly significant association (r"!0.40)
between (less) pairwise prior communication and accuracy of attributions. Groups PE1,
Pipe and Oil showed a slightly (positive) association between more pairwise prior
communication and accuracy of attributions (r"0.15). These results reject Hypothesis 3.
6. Conclusions
Table 6 summarizes the results. Based on our preliminary attempt to see whether the
technical anonymity (the mere suppressing of information about the identity of comment
authors) can be overcome by users’ attempts to identify authors, and whether this is
influenced by different forms of prior communication among groups with history, we
may make several conclusions.
This study provides evidence that users of technically anonymous GSS may not feel
other users are completely socially anonymous, and may make attributions about the
identity of authors of anonymous text-based comments. However, even in this condition
not everyone made attributions, and not everyone made attributions about every
comment. On their own, people may not always be concerned about figuring out who
wrote which comment. We also ignore the issue of what, exactly, might be naturally
occurring attribution stimuli in anonymous GSS. We did not attempt to measure or
manipulate those stimuli. Such stimuli are either latent variables or perhaps something
that cannot be controlled for. That is, how would one be able to find out about silent
attributions without asking people if they made them?
However, when participants in these seven naturally occurring groups did attempt to
attribute authorship to technically anonymous comments, they were incorrect about
90% of the time. It is worth noting that these groups were working on a difficult problem
that was quite salient to them. Some of the comments selected were lengthy and complex
while others were quite short and simple. It may be that certain ‘‘path-breaking’’
comments—those that establish agendas for subsequent comments—might stand out
much better and be more accurately attributed. Further studies of anonymity might
examine attributions of ‘‘path-breaking’’ statements. Perhaps most of the ‘‘other’’ com-
ments are merely noise that the group filters out.
TABLE 6
Summary of results
presumed benefits of using the anonymity feature of a GSS (reducing social cues to
increase diversity of comments and to reduce a priori evaluations of comments based on
the identity of the author), but it appears that to the extent that participants do make
such identifications, they would be biasing their evaluations based on largely incorrect
authorship attributions. This is extremely disconcerting because we have little idea how
their judgments, and thus subsequent decisions, are being influenced by this mis-
attribution. Clearly, a topic for future research would be to analyse the decision-making
process and decision outcomes based on inaccurate vs. accurate, attributions, especially
when participants are socially contentious and the issues salient.
It may seem that GSS contexts are rather atypical for most groups, and thus the
disconcertingly low levels of accuracy, as well as the counterpredicted relationships of
prior communication with accuracy, could be dismissed as technological artefacts. After
all, few groups are anonymous when not using GSS to accomplish real tasks. However,
there are instances of naturally occurring, well-established groups with varying levels of
prior communication, that do generate and evaluate separate, anonymous comments
from specific authors. Many social environments that involve refereeing or making
judgments, such as classrooms or academic publishing, also involve power differentials.
If, in these environments, people are attempting to make attributions, it may suppress the
free exchange of ideas, bias those judgments or punish others based on incorrect or
atypical responses.
For example, the principle behind double-blind journal submissions is one motivating
the use of GSS noted earlier: the reduction of social, status and other cues that could bias
one’s judgment of the manuscript. However, anonymity of evaluations has some prob-
lems. The current peer review system, e.g. has been described as one in which power
relations have become dominant (Garfield, 1986; Blank, 1991). In such social systems, as
well as in anonymous conferencing systems, the anonymity of the author may in fact
encourage (unintentionally) irresponsible behavior. Other instances come to mind, such
as the familiar ‘‘suggestion box’’ in an organizational department, paper-based voting to
make decisions or graffiti on the wall of an office lavatory. However, our focus here is
the GSS context—i.e. the situation with which we are theoretically and empirically
concerned.
There are at least two possibly disconcerting implications of these (admittedly
inconsistent) results. First, most GSS designers, facilitators, researchers and users
seem to assume that technical anonymity implies social anonymity. This study
raises doubts about this assumption. From a facilitator’s perspective, it may be
helpful to advise anonymous GSS participants not to make attributions or to try
to change their writing styles. Further, comments could be randomized before
being presented to the whole group, with a note and a discussion that they have been
changed.
Second, one would like to think that social anonymity is influenced by contextual
variables such as cues derived from prior communication and on-line content. Here,
based on the hour or so of comments produced by other group members, we did not find
much evidence for this; rather, the comments generated mis-attributions. It may be that
CMC users, in general, do attempt to make judgments about others’ identities but have
more ongoing contextual cues such as cross-comment references, so that such attribu-
tions could be more accurate than those based on the fragmented nature of brainstorm-
ATTRIBUTION ACCURACY IN GROUP SUPPORT SYSTEMS 449
ing in GSS. Consequently, the level of inaccuracy reported here may not be as high in
technically anonymous computer-mediated communication in general.
While our results are clearly not definitive, they do raise and clarify some previously
hidden assumptions about GSS anonymity, and arouse concerns about subtle con-
sequences of the use of GSS anonymity features. It is apparent from this preliminary
study that the social aspect of GSS anonymity needs to be explored more fully; it is not
the same thing as technical anonymity. We plan on attempting to resolve several
problems with this study in future experiments that achieve the following.
We feel that this initial study has uncovered some assumptions in prior GSS anonym-
ity research that should be reconsidered.
We would like to acknowledge the intellectual contribution and access to meetings provided by
Paul Licker (University of Calgary, Alberta), and the insightful comments provided by Joe Walther
(NorthWestern University, Illinois) and various anonymous reviewers on an earlier version of this
paper.
References
ARKES, H. (1981). Impediments to accurate clinical judgment and possible ways to minimize their
impact. Journal of Consulting and Clinical Psychology, 49, 323—330.
BERNARD, H., KILLWORTH, P. & SAILER, L. (1982). Informant accuracy in social-network data V.
An experimental attempt to predict actual communication from recall data. Social Science
Research, 11, 30—66.
BLANK, R. (1991). The effects of double-blind versus single-blind reviewing: experimental evidence
from ¹he American Economic Review. The American Economic Review, 81, 1041—1067.
CONNOLLY, T., JESSUP, L. & VALACICH, J. (1991). Effects of anonymity and evaluative tone on idea
generation in computer-mediated groups. Management Science, 36, 689—703.
CULNAN, M. & MARKUS, M. (1987). Information technologies: electronic media and intra-
organizational communication. In F. JABLIN, L. PUTNAM, K. ROBERTS & L. PORTER,
Eds. Handbook of Organizational Communication, pp. 420—443. Newbury Park, CA: Sage.
DAFT, R. & LENGEL, R. (1984). Information richness: a new approach to managerial behavior and
organization design. Research in Organizational Behavior, 6, 191—233.
DAFT, R. & LENGEL, R. (1986). Organizational information requirements, media richness and
structural design. Management Science, 32, 554—571.
DENNIS, A., GEORGE, J., JESSUP, L., NUNAMAKER, J. & VOGEL, D. (1988). Information technology
to support electronic meetings. MIS Quarterly, 12, 591—624.
DESANCTIS, G. & GALLUPE, B. (1987). A foundation for the study of group decision support
systems. Management Science, 33, 589—609.
FREEMAN, L. (1979). Centrality in social networks: conceptual clarification. Social Networks, 1,
215—239.
GARFIELD, E. (1986). Refereeing and peer review: part 1. Current Contents, 31, 3—11.
450 S. C. HAYNE AND R. E. RICE
GEORGE, J., EASTON, G., NUNAMAKER, J. & NORTHCRAFT, G. (1990). A study of collaborative
group work with and without computer-based support. Information Systems Research, 1,
394—415.
HACKMAN, J. & KAPLAN, R. (1974). Interventions into group process: an approach to improving
the effectiveness of groups. Decision Sciences, 5, 459—480.
HAMIL, R., WILSON, T. & NISBETT, R. (1979). Insensitivity to sample bias: generalizing from
atypical cases. Journal of Personality and Social Psychology, 39, 578—589.
HAYES, B. & HESKETH, B. (1989). Attribution theory, judgmental biases and cognitive behavior
modification: prospects and problems. Cognitive Therapy and Research, 13, 211—230.
HEIDER, F. (1958). ¹he Psychology of Interpersonal Relations. New York, NY: Wiley.
HENRION, M. (1980). Assessing Probabilities: A Review. Pittsburgh: Carnegie-Mellon University
Press.
HEWSTONE, M. & JASPARS, J. (1987). Covariation and causal attribution: a logical model of the
intuitive analysis of variance. Journal of Personality and Social Psychology, 53, 663—672.
HILTON, D. & JASPARS, J. (1987). The explanations of occurrences and non-occurrences: a test of
the inductive logic model of causal attribution. British Journal of Social Psychology, 26,
189—201.
HILTZ, S. & TUROFF, M. (1993). ¹he Network Nation, 2nd edn. Cambridge, MA: MIT Press.
HILTZ, S., TUROFF, M. & JOHNSON, K. (1989). Experiments in group decision making: disinhibi-
tion, de-individuation and group process in pen name and real name computer conferences.
Decision Support Systems, 5, 217—232.
HUBERT, L. & SCHULTZ, J. (1976). Quadratic assignment as a general data analysis strategy. British
Journal of Mathematical and Statistical Psychology, 29, 190—241.
IACOBUCCI, D. & McGILL, A. (1990). Analysis of attribution data: theory testing and effects
estimation. Journal of Personality and Social Psychology, 59, 426—441.
JESSUP, L., CONNOLLY, T. & GALEGHER, J. (1990a). Group process with an idea-generating task.
MIS Quarterly, 14, 313—321.
JESSUP, L., CONNOLLY, T. & TANSIK, D. (1990b). Toward a theory of automated group work: the
de-individuating effects of anonymity. Small Group Research, 21, 333—348.
JESSUP, L. & TANSIK, D. (1991). Decision making in an automated environment: the effects of
anonymity and proximity with a group decision support system. Decision Sciences, 22,
266—279.
JESSUP, L. & VALACICH, J., Eds. (1993). Group Support Systems: New Perspectives. New York, NY:
Macmillan.
JONES, E. & NISBETT, R. (1972). The actor and the observer: divergent perceptions of the causes of
behavior. In E. JONES, D. KANOUSE, H. KELLEY, R. NISBETT, S. VALINS & B. WEIDER, Eds.
Attribution: Perceiving the Causes of Behavior. Morristown, NJ: General Learning Press.
KAHNEMAN, D. & TVERSKY, A. (1973). Intuitive prediction. biases and corrective procedures. In
D. KAHNEMAN, P. SLOVIC & A. TVERSKY, Eds. Judgment ºnder ºncertainty: Heuristics
and Biases, New York, NY: Cambridge University Press.
KELLEY, H. (1955). ¹he Psychology of Personal Constructs, Vols. 1 and 2. New York, NY: Norton.
KELLEY, H. (1967). Attribution in social psychology. In D. LEVINE, Ed., Nebraska Symposium on
Motivation, Vol 15, pp. 192—238. Lincoln, NE: Lincoln University of Nebraska Press.
KELLEY, H. (1973). The process of causal attribution. American Psychologist, 28, 103—128.
KELTNER, J. (1989). Facilitation: catalyst for group problem-solving. Management Communication
Quarterly, 3, 8—31.
KERR, N. & BRUUN, S. (1981). Ringelman revisited: alternative explanations for the social loafing
effect. Personality and Social Psychology Bulletin, 7, 224—231.
KIESLER, S., SIEGEL, J. & McGUIRE, T. (1984). Social psychological aspects of computer-mediated
communication. American Psychologist, 39, 1123—1134.
KORIAT, A., LICHTENSTEIN, S. & FISCHOFF, B. (1980). Reasons for confidence. Journal of Experi-
mental Psychology: Human Learning and Memory, 6, 107—118.
KRAUSS, R., APPLE, W., MORENCY, N., WENZEL, C. & WINTON, W. (1981). Verbal, vocal and
visible factors in judgments of another’s affect. Journal of Personality and Social Psychology,
40, 312—320.
ATTRIBUTION ACCURACY IN GROUP SUPPORT SYSTEMS 451
TVERSKY, A. & KAHNEMAN, D. (1974). Judgment under uncertainty: heuristics and biases. Science,
185, 1124—1131.
VALACICH, J., JESSUP, L., DENNIS, A. & NUNAMAKER, J. (1992). A conceptual framework of
anonymity in group support systems. Proceedings of the 25th Hawaii International Conference
on Systems Sciences, Kauai, Hawaii: IEEE Press, pp. 101—112.
WALTHER, J. (1992). Interpersonal effects in computer-mediated interaction: a relational perspect-
ive. Communication Research, 19, 52—90.
WALTHER, J. (1993). Impression development in computer-mediated interaction. Western Journal
of Communication, 57, 381—398.
WEINER, B. (1985). Spontaneous causal search. Psychological Bulletin, 97, 74—84.
ZIGURS, I., POOLE, M. & DESANCTIS, G. (1988). A study of influence in computer-mediated
communication. MIS Quarterly, 12, 625—644.