Austin, W. G., & Worchel, S. (1979). The Social psychology of intergroup relations. Monterey, Calif.: Brooks/Cole Pub. Co.
Benveniste, E. (1986). Subjectivity in Language. In H. Adams & L. Searle (Eds.), (p. 901). University Press of Florida.
Berger, C. R., & Calabrese, R. (1975). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Theory. Human Communication Research, 1(2), 99-112.
Bowker, G. C., & Star, S. L. (1999).
Boyd, D., & Heer, J. Profiles as Conversation: Networked Identity Performance on Friendster. In (Vol. 39).
Christopherson, K. M., 23(6), 3038-3056.
Dibbell, J. (1993, December 23). A rape in cyberspace. The Village Voice.
Donath, J. S. (1999). Identity and Deception in the Virtual Community. Communities in Cyberspace, 29–59.
Ellison, N., Heino, R., & Gibbs, J. Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. , 11(2), 415-441.
Foucault, M. Discipline and Punish: The Birth of the Prison. Pantheon Books.
Gibbs, J. L., Ellison, N. B., & Heino, R. D. Self-Presentation in Online Personals: The Role of Anticipated Future Interaction, Self-Disclosure, and Perceived Success in Internet Dating. Communication Research, 33(2), 152.
Goffman, E. (1978). Harmondsworth.
Gutman, H. (1988).In Technologies of the Self: A Seminar with Michel Foucault. University of Massachusetts Press.
Hacking, I. (1998). University of Virginia Press.
Hayne, S. C., & Rice, R. E. Attribution accuracy when using anonymity in group support systems. International Journal of Human-Computer Studies, 47, 429-452.
Lea, M., & Spears, R.Journal of Organizational Computing, 2, 321-341.
Levine, C. G. (2002). Lawrence Erlbaum Associates.
McAdams, D. P. (1996). Personality, Modernity, and the Storied Self: A Contemporary Framework for Studying Persons. Psychological Inquiry, 7(4), 295-321.
Mead, G. H. (1925). The Genesis of the Self and Social Control. , 35.
Negroponte, N. (1998, October). Being Anonymous. Wired. Retrieved May 7, 2008, from http://www.wired.com/wired/archive/6.10/negroponte.html.
Nowak, K. L., & Rauh, C. The Influence of the Avatar on Online Perceptions of Anthropomorphism, Androgyny, Credibility, Homophily, and Attraction. , 11(1).
Pfitzmann, A., & Kohntopp, M. (2001).
Postmes, T., Spears, R., & Lea, M. (2002)., 6, 3-16.
Postmes, T., Spears, R., & Lea, M. (1998).Communication Research, 25(6), 689.
Rigby, K. Anonymity on the Internet Must be Protected. . Retrieved from http://swissnet.ai.mit.edu/6095/student-papers/fall95-papers/rigby-anonymity.html.
Sproull, L., & Kiesler, S. Reducing social context cues: electronic mail in organizational communication. Management Science, (11), 1492-1512.
Van Gelder, L.Ms. Magazine, XIV, 94–124.
Wallace, J. D. (1999)., CATO Institute Briefing Papers. (p. 8). Washington, D.C.
Walther, J. B. (1996).Communication Research, 23(1).