267
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Technologies of Concealment: Appropriateness, Effectiveness, and Motivations for Hiding Organizational Identity

, , , &

References

  • Anonymous. (1998). To reveal or not to reveal: A theoretical model of anonymous communication. Communication Theory, 8(4), 381–407.
  • Berkelaar, B. (2016). How implicit theories help differentiate approaches to online impression management: A preliminary typology. New Media and Society. doi: https://doi.org/10.1177/1461444816654136
  • Brock, D., Ballweg, R., Wick, K. H., & Byorth, K. (2005). Online collaborative exercises: The implications of anonymous participation. Perspective on Physician Assistant Education, 16(1), 13–17.
  • Bronco (2004). Benefits and drawbacks of anonymous online communication: Legal challenges and communicative recommendations. In S. Drucker (Ed.), Free speech yearbook (Vol. 41, pp. 127–141). Washington, DC: National Communication Association.
  • Broom, A. (2005). Virtually he@lthy: The impact of internet use on disease experience and the doctor-patient relationship. Qualitative Health Research, 15(3), 325–345.
  • Caldwell, B. S., Uang, S. T., & Taha, L. H. (1995). Appropriateness of communications media use in organizations: Situation requirements and media characteristics. Behaviour & Information Technology, 14(4), 199–207.
  • Carlson, J. R., Carlson, D. S., & Ferguson, M. (2011). Deceptive impression management: Does deception pay in established workplace relationships? Journal of Business Ethics, 100(3), 497–514.
  • DeAndrea, D. C., Tom Tong, S., Liang, Y. J., Levine, T. R., & Walther, J. B. (2012). When do people misrepresent themselves to others? The effects of social desirability, ground truth, and accountability on deceptive self‐presentations. Journal of Communication, 62(3), 400–417.
  • Diener, E., Fraser, S. C., Beaman, A. L., & Kelem, R. T. (1976). Effects of deindividuation variables on stealing among Halloween trick-or-treaters. Journal of Personality and Social Psychology, 33(2), 178–183.
  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422.
  • Ellison, N., Heino, R., & Gibbs, J. (2006). Managing impressions online: Self‐presentation processes in the online dating environment. Journal of Computer‐Mediated Communication, 11(2), 415–441.
  • Fulk, J. (1993). Social construction of communication technology. Academy of Management Journal, 36(5), 921–950.
  • Gibson, J. J. (1986). The ecological approach to visual perception. Mahwah, NJ: Erlbaum.
  • Goffman, E. (1959). The presentation of self in everyday life. Garden City, NY: Anchor Doubleday.
  • Jessup, L. M., Connolly, T., & Galegher, J. (1990). The effects of anonymity on GDSS group process with an idea-generating task. MIS Quarterly, 14(3), 313–321.
  • King, R. C., & Xia, W. (1997). Media appropriateness: Effects of experience on communication media choice. Decision Sciences, 28(4), 877–910.
  • Leary, M. R., & Kowalski, R. M. (1990). Impression management: A literature review and two-component model. Psychological Bulletin, 107(1), 34–47.
  • Leech, N. L., Barrett, K. C., & Morgan, G. A. (2011). IBM SPSS for intermediate statistics: Use and interpretation. New York, NY: Routledge.
  • Light, B., McGrath, K., & Griffiths, M. (2008). More than just friends? Facebook, disclosive ethics and the morality of technology. ICIS 2008 Proceedings. Paper 193. Retrieved from http://aisel.aisnet.org/icis2008/193
  • Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99–112.
  • McCroskey, J. C., & Teven, J. J. (1999). Goodwill: A reexamination of the construct and its measurement. Communication Monographs, 66(1), 90–103.
  • Muller, M. J., Ehrlich, K., & Farrell, S. (2006). Social tagging and self-tagging for impression management. Banff, Canada: Submitted as an interactive poster to CSCW.
  • Porter, B. (2012,March 28). Tips and tricks to improve survey response rates. Retrieved from https://www.surveymonkey.com/blog/en/blog/2012/03/28/improve-survey-response-rate/
  • Rains, S. A. (2007). The impact of anonymity on perceptions of source credibility and influence in computer-mediated group communication: A test of two competing hypotheses. Communication Research, 34(1), 100–125.
  • Rains, S. A., & Scott, C. R. (2007). To identify or not to identify: A theoretical model of receiver responses to anonymous communication. Communication Theory, 17(1), 61–91.
  • Reiter, M. K., & Rubin, A. D. (1999). Anonymous web transactions with crowds. Communications of the ACM, 42(2), 32–48.
  • Rice, R. E. (1993). Media appropriateness. Human Communication Research, 19(4), 451–484.
  • Scott, C. R. (2013a). Anonymous agencies, backstreet businesses, and covert collectives: Rethinking organizations in the 21st century. Stanford, CA: Stanford University Press.
  • Scott, C. R. (2013b). Hidden organizations and reputation. In C. E. Carroll (Ed.), The handbook of communication and corporate reputation (pp. 545–558). Oxford, UK: Wiley-Blackwell.
  • Scott, C. R., & Rains, S. A. (2005). Anonymous communication in organizations: Assessing use and appropriateness. Management Communication Quarterly, 19(2), 157–197.
  • Scott, C. R., Rains, S. A., & Haseki, M. (2011). Anonymous communication: Unmasking findings across fields. In C. Salmon (Ed.), Communication yearbook (Vol. 35, pp. 299–342). New York, NY: Routledge.
  • Sitkin, S. B., Sutcliffe, K. M., & Barrios‐Choplin, J. R. (1992). A dual‐capacity model of communication media choice in organizations. Human Communication Research, 18(4), 563–598.
  • Sivo, S. A., Saunders, C., Chang, Q., & Jiang, J. J. (2006). How low should you go? Low response rates and the validity of inference in IS questionnaire research. Journal of the Association for Information Systems, 7(6), 351–414.
  • Spears, R., & Lea, M. (1994). Panacea or panopticon? The hidden power in computer-mediated communication. Communication Research, 21(4), 427–459.
  • Spitzberg, B. H., & Cupach, W. R. (1984). Interpersonal communication competence. Beverly Hills, CA: Sage.
  • Treem, J. W., & Leonardi, P. M. (2012). Social media use in organizations: Exploring the affordances of visibility, editability, persistence, and association. In C. T. Salmon (Ed.), Communication yearbook 36 (pp. 143–189). New York, NY: Routledge.
  • Walther, J. B. (1996). Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23, 3–43.
  • Wang, Z., Walther, J. B., Pingree, S., & Hawkins, R. P. (2008). Health information, credibility, homophily, and influence via the internet: Web sites versus discussion groups. Health Communication, 23(4), 358–368.
  • Warner, R. M. (2013). Applied statistics: From bivariate through multivariate techniques. Los Angeles, CA: Sage.
  • Westmyer, S. A., DiCioccio, R. L., & Rubin, R. B. (1998). Appropriateness and effectiveness of communication channels in competent interpersonal communication. Journal of Communication, 48(3), 27–48.
  • Zimbardo, P. G. (1969). The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. Nebraska Symposium on Motivation, Vol. 17, 237–307. Lincoln, NE.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.