enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  3. Privacy regulation theory - Wikipedia

    en.wikipedia.org/wiki/Privacy_regulation_theory

    He proposed that it was intrinsically a social process. It was a psychological process involved people's interaction, their social world and environment. It stimulated researchers to think about self disclosure and privacy regulations; an example is Petronio's study on communication privacy management. [6]

  4. Self-disclosure - Wikipedia

    en.wikipedia.org/wiki/Self-disclosure

    Self-disclosure is an important building block for intimacy, which cannot be achieved without it. Reciprocal and appropriate self-disclosure is expected. Self-disclosure can be assessed by an analysis of cost and rewards which can be further explained by social exchange theory. Most self-disclosure occurs early in relational development, but ...

  5. Privacy settings - Wikipedia

    en.wikipedia.org/wiki/Privacy_settings

    Territory coordination, the access to an individual's virtual territory which can be a Facebook profile or a Twitter page, influences user privacy management more than informational disclosure. [24] More fine-grain privacy settings are recommended by Lin et al . to better suit a wide collection of territorial and informational privacy ...

  6. Online disinhibition effect - Wikipedia

    en.wikipedia.org/wiki/Online_disinhibition_effect

    The online disinhibition effect refers to the lack of restraint one feels when communicating online in comparison to communicating in-person. [1] People tend to feel safer saying things online that they would not say in real life because they have the ability to remain completely anonymous and invisible when on particular websites, and as a result, free from potential consequences. [2]

  7. Privacy - Wikipedia

    en.wikipedia.org/wiki/Privacy

    Control over the "permeability" of the self's boundaries enables one to control what constitutes the self and thus to define what is the self. [ 129 ] In addition, privacy may be seen as a state that fosters personal growth, a process integral to the development of self-identity.

  8. Information privacy - Wikipedia

    en.wikipedia.org/wiki/Information_privacy

    Currently security messages are designed for the "average user", i.e. the same message for everyone. Researchers have posited that individualized messages and security "nudges", crafted based on users' individual differences and personality traits, can be used for further improvements for each person's compliance with computer security and privacy.

  9. Information security - Wikipedia

    en.wikipedia.org/wiki/Information_security

    Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. [1] It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.