enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Social penetration theory - Wikipedia

    en.wikipedia.org/wiki/Social_penetration_theory

    Self-disclosure is a purposeful disclosure of personal information to another person. [8] Disclosure may include sharing both high-risk and low-risk information as well as personal experiences, ideas, attitudes, feelings, values, past facts and life stories, future hopes, dreams, ambitions, and goals.

  3. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  4. Member check - Wikipedia

    en.wikipedia.org/wiki/Member_check

    Member checks completed after a study are completed by sharing all of the findings with the participants involved. This allows participants to critically analyze the findings and comment on them. The participants either affirm that the summaries reflect their views, feelings, and experiences, or that they do not reflect these experiences.

  5. Computers are social actors - Wikipedia

    en.wikipedia.org/wiki/Computers_are_social_actors

    Moon tested this principle with intimate self-disclosure of high-risk information (when disclosure makes the person feel vulnerable) to a computer, and observed how that disclosure affects future attitudes and behaviors. Participants interacted with a computer which questioned them using reciprocal wording and gradual revealing of intimate ...

  6. Adam Joinson - Wikipedia

    en.wikipedia.org/wiki/Adam_Joinson

    Adam N. Joinson (born 1970) is a British author, academic and public speaker within the area of cyberpsychology.He is Professor of Information Systems at University of Bath, following posts at the University of West of England and the Open University.

  7. Privacy for research participants - Wikipedia

    en.wikipedia.org/wiki/Privacy_for_research...

    Since privacy for research participants is a priority, though, various proposals for protecting participants have been made for different purposes. [2] Replacing the real data with synthetic data allows the researchers to show data which gives a conclusion equivalent to the one drawn by the researchers, but the data may have problems such as ...

  8. How to build a more inclusive workplace for those with ADHD ...

    www.aol.com/build-more-inclusive-workplace-those...

    The response to their disclosure or request for accommodations is often, “The job still needs to get done, and if you can’t do the job at this level, we will have to go in another direction.”

  9. Communication in small groups - Wikipedia

    en.wikipedia.org/wiki/Communication_in_small_groups

    During small group communication, interdependent participants analyze data, evaluate the nature of the problem(s), decide and provide a possible solution or procedure. Additionally, small group communication provides strong feedback, unique contributions to the group as well as a critical thinking analysis and self-disclosure from each member.