Search results
Results from the WOW.Com Content Network
Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.
He proposed that it was intrinsically a social process. It was a psychological process involved people's interaction, their social world and environment. It stimulated researchers to think about self disclosure and privacy regulations; an example is Petronio's study on communication privacy management. [6]
Self-disclosure is an important building block for intimacy, which cannot be achieved without it. Reciprocal and appropriate self-disclosure is expected. Self-disclosure can be assessed by an analysis of cost and rewards which can be further explained by social exchange theory. Most self-disclosure occurs early in relational development, but ...
Territory coordination, the access to an individual's virtual territory which can be a Facebook profile or a Twitter page, influences user privacy management more than informational disclosure. [24] More fine-grain privacy settings are recommended by Lin et al . to better suit a wide collection of territorial and informational privacy ...
The online disinhibition effect refers to the lack of restraint one feels when communicating online in comparison to communicating in-person. [1] People tend to feel safer saying things online that they would not say in real life because they have the ability to remain completely anonymous and invisible when on particular websites, and as a result, free from potential consequences. [2]
Control over the "permeability" of the self's boundaries enables one to control what constitutes the self and thus to define what is the self. [ 129 ] In addition, privacy may be seen as a state that fosters personal growth, a process integral to the development of self-identity.
Currently security messages are designed for the "average user", i.e. the same message for everyone. Researchers have posited that individualized messages and security "nudges", crafted based on users' individual differences and personality traits, can be used for further improvements for each person's compliance with computer security and privacy.
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. [1] It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.