Many methods to analyzing dyadic information need that users of a dyad be distinguishable from one another (Kenny et al., 2006).+

Many methods to analyzing dyadic information need that users of a dyad be distinguishable from one another (Kenny et al., 2006).