Podcast
Questions and Answers
What does the term 'digital self' refer to?
What does the term 'digital self' refer to?
Which of the following best describes 'online disinhibition'?
Which of the following best describes 'online disinhibition'?
What characterizes 'toxic inhibition' according to the text?
What characterizes 'toxic inhibition' according to the text?
Why do some individuals create pseudo digital identities or fake social networking accounts?
Why do some individuals create pseudo digital identities or fake social networking accounts?
Signup and view all the answers
What is the main difference between 'benign disinhibition' and 'toxic inhibition'?
What is the main difference between 'benign disinhibition' and 'toxic inhibition'?
Signup and view all the answers
What term is used to describe the reduction of sensitivity to what others feel online?
What term is used to describe the reduction of sensitivity to what others feel online?
Signup and view all the answers
In online interactions, which term refers to individuals presenting and idealizing a character rather than showing their authentic selves?
In online interactions, which term refers to individuals presenting and idealizing a character rather than showing their authentic selves?
Signup and view all the answers
What is the main purpose of asynchronous communication online?
What is the main purpose of asynchronous communication online?
Signup and view all the answers
Which concept involves individuals fragmenting their identity through countless alternatives of self-presentation?
Which concept involves individuals fragmenting their identity through countless alternatives of self-presentation?
Signup and view all the answers
What is the main motivation behind impression management in online interactions?
What is the main motivation behind impression management in online interactions?
Signup and view all the answers
Which term describes the deceptive practice of creating a false online identity for malicious purposes?
Which term describes the deceptive practice of creating a false online identity for malicious purposes?
Signup and view all the answers