2.2 Discussion Systems and Forums
Forum systems such as auditorium (Beier et al., 2014)
or our Graphicuss (Chen, 2016; Hara et al., 2017)
provide users with the possibility to discuss topics in
a linear, chronologically ordered fashion. An under-
lying tree structure consisting of the posts (partially)
ordered within threads, which again are organised by
topics or categories
2
allows for intuitive cognition of
posts belonging together as a discussion, as well as
related or unrelated post, threads, and topics. Within
a thread, users can discuss the main subject as well
as answers other users have posted before. This tree
structure can have a large number of levels if the cre-
ation of sub-threads within threads is allowed.
Forums commonly require users to register an
identity/pseudonym under which their posts are dis-
tinguished from others’. Participation of anonymous
users is generally not desired, as this invites spam and
various forms of vandalism, such as trolling.
Forum systems that support anonymous particip-
ation attribute all anonymous posts to one indistin-
guishable pseudonym, e.g. ‘anonymous’, making
it difficult to follow individual contributors’ argu-
mentations. Attribution to distinguishable anonym-
ous users, as available in other collaboration systems
like Google Docs
3
is is not implemented in any forum
system to the authors’ knowledge.
Verified identities, as implemented in popular so-
cial media platforms like Facebook
4
and Twitter
5
, are
uncommon. Nevertheless, verified identities, or to the
least verified pseudonyms, are imperative for a well-
structured and believable discussion culture. Access
control must be established in a privacy-respecting
fashion (P
¨
otzsch and Borcea-Pfitzmann, 2009) while
enabling effective deflection of spam and vandalism,
or sh%t-storms
6
(Rost et al., 2016). At the same time,
users’ contributions must remain trustworthy and be-
lievable, especially allowing other users to assess the
value and truthfulness of a contribution (Kartal et al.,
2011). Accordingly, product recension platforms of-
ten only allow negative feedback if the users attach
their name to their recension.
2
In general, a post is a single contribution of a user.
Multiple posts, e.g. a question and corresponding answers,
are organised in threads. Finally, multiple threads can be at-
tached to a topic spanning multiple discussions on a broader
subject.
3
https://docs.google.com/ – They use animals; e.g., ‘an-
onymous elephant’ or ‘anonymous cat’.
4
https://facebook.com/
5
https://twitter.com/
6
The four-letter word was censored at an offended re-
viewer’s request. We wish to emphasise that it is a common,
properly cited term in this context.
2.3 Anonymity
As discussed in the previous sections, self-assessment
and peer influences are an important factor for stu-
dents’ learning success. Therefore, these are amongst
the most important influence factors identified in the
Visible Learning meta-studies (Hattie, 2009; Hattie,
2013). Nevertheless, exposure should also be con-
sidered, especially if it leads to students being forced
to concede to a lack of knowledge or wrong under-
standing thereof. We identified anonymity as a strong
motivating factor to free students of fears of exposure
(Hara, 2016).
Giving students the option to contribute anonym-
ously can be desirable to lower users’ inhibitions to
contribute. However, in common systems anonym-
ity is generally only provided in regard to what other
users are presented.
The problem with anonymity is its double-edged
nature. On on hand, it provides strong incentives for
students to contribute without fear of exposure, on
the other hand it inhibits strong students from con-
tributing, as they cannot attribute their contributions
to themselves. The strong motivation for attribution
is ‘showing off’: at some point, students want their
peers to know who has authored well-received contri-
butions. Prestige is a strong motivation after all.
Another problem with anonymity is system sus-
ceptibility to trolling and other malicious activities.
Under the cover of anonymity, users loose restraint to
negatively or destructively contribute to the system.
Therefore, systems commonly store identifying meta-
data (e.g., IP address, e-mail address) in order to ret-
roactively reprimand users or revoke system access.
This in return leads to an underlying fear of exposure
as users must trust that the system does not divulge
their identifying information unnecessarily.
Regardless the problems, anonymity remains a
strong motivating factor for system utilisation. Al-
lowing students to remove the constraints of anonym-
ity retro-actively can address strong students and mo-
tivate them to contribute even more. Trust must be
established between the system and the students, only
providing (desirably strong) anonymity amongst the
students themselves.
Similar considerations apply to the relations
between students and teaching staff. Knowing that
lecturers are unable to identify students within a sys-
tem can foster ‘stupid questions’
7
, which students
would normally not dare to ask. In reverse, lectur-
ers might want to be able to identify weaker students
7
Questions students perceive to be stupid. However,
this is a common misconception: any question helps
strengthen a correct understanding of knowledge.
CSEDU 2018 - 10th International Conference on Computer Supported Education
304