The Proteus effect is the tendency for people to be affected by their digital representations, such as avatarsdating site profiles and social networking personas. Typically, people's behavior shifts in accordance with their digital representatives. For example, in a video game, someone who creates an avatar based on a Viking warrior is likely to act more boldly within the game. Research suggests that the effect also extends into the player's real life.
One study at Stanford University's Virtual Human Interaction Lab found that players in an immersive virtual reality game who were ased superhero avatars were more likely to be helpful afterwards. Other studies have produced similar in a variety of other contexts.
The capacity of the Proteus effect is being explored for therapeutic applications including behavioral modification, phobia desensitization and personal empowerment, among other possibilities. In Greek mythology, Proteus was sometimes known as the god of elusive sea change because he transformed himself to evade capture.
From Proteus we get the adjective proteanmeaning adaptable, versatile or capable of taking many forms. OPSEC operations security is a security and risk management process and strategy that classifies information, then determines A smart contract is a decentralized application that executes business logic in response to events.
Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting Integrated risk management IRM is a set of coordinated business practices and supporting software tools that contribute to an Secure sockets layer SSL is a networking protocol deed for securing connections between web clients and web servers over an Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
Protected health information PHIalso referred to as personal health information, is the demographic information, medical Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between Disaster recovery DR is an organization's ability to respond to and recover from an event that affects business operations.
Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business. Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.
This was last updated in January Related Terms operating system OS An operating system OS is the program that, after being initially loaded into the computer by a boot program, manages all of See complete definition PaaS platform as a service PaaS platform as a service is a cloud computing model where a third-party provider delivers hardware and software tools to See complete definition. SSL secure sockets layer Secure sockets layer SSL is a networking protocol deed for securing connections between web clients and web servers over an Search Health IT protected health information PHI or personal health information Protected health information PHIalso referred to as personal health information, is the demographic information, medical Search Disaster Recovery change control Change control is a systematic approach to managing all changes made to a product or system.