enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Anonymity - Wikipedia

    en.wikipedia.org/wiki/Anonymity

    An important example for anonymity being not only protected, but enforced by law is the vote in free elections. In many other situations (like conversation between strangers, buying some product or service in a shop), anonymity is traditionally accepted as natural.

  3. Social identity model of deindividuation effects - Wikipedia

    en.wikipedia.org/wiki/Social_identity_model_of...

    The SIDE model provides an alternative explanation for effects of anonymity and other "deindividuating" factors that classic deindividuation theory [1] [2] cannot adequately explain. The model suggests that anonymity changes the relative salience of personal vs. social identity, and thereby can have a profound effect on group behavior.

  4. Online disinhibition effect - Wikipedia

    en.wikipedia.org/wiki/Online_disinhibition_effect

    The online disinhibition effect refers to the lack of restraint one feels when communicating online in comparison to communicating in-person. [1] People tend to feel safer saying things online that they would not say in real life because they have the ability to remain completely anonymous and invisible when on particular websites, and as a result, free from potential consequences. [2]

  5. Deindividuation - Wikipedia

    en.wikipedia.org/wiki/Deindividuation

    This study by Nadler, Goldberg, and Jaffe measured the effects that deindividuating conditions (anonymity vs. identifiable) had on two subject conditions (self-differentiated vs. undifferentiated individuals). The self-differentiated individual is said to have definite boundaries between inner characteristics identified as self and the social ...

  6. Anonymous social media - Wikipedia

    en.wikipedia.org/wiki/Anonymous_social_media

    Historically, these controversies and the rise of cyberbullying have been blamed on the anonymous aspect of many social media platforms, [31] but about half of US adult online harassment cases do not involve anonymity, [32] and researchers have found that if targeted harassment exists offline it will also be found online, because online ...

  7. Wikipedia:Manual of Style/Music examples - Wikipedia

    en.wikipedia.org/.../Music_examples

    Music examples are an obviously valuable and necessary addition to Wikipedia, often superior to text. These are both far more valuable and far more free than music samples being abstract categories applicable to multiple examples without any of the copyright or other law applicable to samples.

  8. Musical cryptogram - Wikipedia

    en.wikipedia.org/wiki/Musical_cryptogram

    Randy Gurule** is a contemporary steganographer and musical speculativist known for blending cryptographic methods with music composition. His work draws on the medieval tradition of **Musica Speculativa**, which explored the philosophical, mathematical, and symbolic aspects of music as a reflection of the cosmos and human existence.

  9. Voice exchange - Wikipedia

    en.wikipedia.org/wiki/Voice_exchange

    Voice exchange is also used in Schenkerian analysis to refer to a pitch class exchange involving two voices across registers, one of which is usually the bass. In this sense, it is a common secondary structural feature found in the music of a wide variety of composers. [12]