2018 ◽  
Vol 1 (2) ◽  
pp. 39
Author(s):  
Muhammad Syaoki

Abstrak:    Penelitian ini bertujuan untuk menggambarkan perilaku komunikasi Jemaat Ahmadiyah dalam posisi mereka sebagai kelompok yang dilarang menyebarkan ajarannya.  Dengan menggunakan teori manajemen privasi komunikasi yang diperkenalkan oleh Sandra Petronio, penelitian ini berusaha menjelaskan proses dialektis yang dilakukan oleh jemaat Ahmadiyah di kota Semarang ketika berinteraksi dengan banyak orang dalam kehidupan sehari-hari. Hasil penelitian ini menunjukkan bahwa Jemaat Ahmadiyah melakukan pembukaan informasi privat dengan komunikasi langsung dan tidak langsung. Jemaat Ahmadiyah melakukan pembukaan informasi privat bertujuan untuk mengklarifikasi kesalahpahaman ghair tentang Ahmadiyah. Jemaat Ahmadiyah kota Semarang cenderung menutup informasi privat mereka kepada keluarga dan teman ketika mereka baru berbai’at. Mereka juga menutup informasi privat kepada orang-orang Muhammadiyah, serta kepada kelompok-kelompok Islam garis keras, seperti FPI, LDII, termasuk juga kader PKS. Tetapi mereka membuka informasi mengenai Ahmadiyah kepada orang-orang dari kalangan NU, dan aparatur pemerintah. Abstract :   This research aims to describe the behavior of Ahmadiyyah community in their position as a group that is prohibited from spreading its teachings. Using the communication privacy management theory introduced by Sandra Petronio, this research attempts to explain the dialectical process undertaken by the Ahmadiyah community in the Semarang city while interacting with many people in everyday life. The results of this study indicate that the Ahmadiyyah community conducts the opening of private information with direct and indirect communication. The Ahmadiyah community conducted the opening of private information aimed to clarify misunderstanding about “ghair” of Ahmadiyah. The Ahmadiyah community of Semarang tends to hide their private information from family and friends when they are newly banned. They also hide private informations to Muhammadiyah people, as well as to hard-line Islamic groups, such as FPI, LDII, as well as PKS cadres. But they do not hide information about Ahmadiyyah to people from the NU, and the government apparatus.


2020 ◽  
Vol 34 (4) ◽  
pp. 527-557 ◽  
Author(s):  
M. Chad McBride ◽  
Allison R. Thorson ◽  
Karla Mason Bergen

Despite the prevalence of work spouses, scarce empirical research has focused on the communication occurring within these relationships, leaving managers with little understanding as to whether organizations can or should communicate support for employees forming these relationships and how privacy is navigated among work spouses. Building on McBride and Bergen’s conceptualization of the work-spouse relationship, we used Communication Privacy Management theory (CPM) to understand what, if any, privacy rule decision criteria individuals used as they negotiated disclosures within their work-spouse relationships. Analysis of interviews with 41 people in work-spouse relationships suggests that participants recognized both their own core privacy rule decision criteria and when these criteria were similar to or different from the criteria influencing their work spouse’s. Furthermore, work-spouse relationships formed despite organizational efforts to keep them at bay. Theoretically, the findings add to CPM theory, such that they establish the need to examine catalyst criteria as current and previous, as well as argue for the addition of confirming criteria to account for situations in which catalysts reinforce routinized privacy rules. Overall, the findings from this study advance the literature on communication in the work-spouse relationship and CPM theory and highlight the role that workplaces play in fostering these types of relationships.


2012 ◽  
Vol 60 (5) ◽  
pp. 665-680 ◽  
Author(s):  
Carrie D. Kennedy-Lightsey ◽  
Matthew M. Martin ◽  
Michelle Thompson ◽  
Kimberly Leezer Himes ◽  
Brooke Zackery Clingerman

2021 ◽  
pp. 1-11
Author(s):  
Rudolf Siegel ◽  
Cornelius J. König ◽  
Leon Porsch

Abstract. Applicants often take great care in deciding where to apply and may refrain from applying or accepting a job offer if they hear about privacy-invading practices at a future workplace. Based on communication privacy management theory, the present work examines how applicants react to different purposes of electronic monitoring. In a scenario study, we found higher privacy concerns and lower organizational attractiveness in a situation with controlling monitoring procedures as compared to supportive monitoring procedures. Furthermore, competitive participants evaluated only noncontrolling monitoring procedures more positively. This demonstrates that organizational attractiveness is harmed by controlling monitoring procedures, and decision makers should keep in mind how electronic monitoring is implemented, used, and may be perceived within and outside the organization.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Marit Sukk ◽  
Andra Siibak

Abstract Digital parenting tools, such as child-tracking technologies, play an ever-increasing role in contemporary child rearing. To explore opinions and experiences related to the use of such tracking devices, we conducted Q methodology and a semi-structured individual interview-study with Estonian parents (n=20) and their 8- to 13-year-old pre-teens (n=20). Our aim was to study how such caring dataveillance was rationalized within the families, and to explore the dominant parenting values associated with the practice. Relying upon communication privacy management theory, the issues of privacy related to such intimate surveillance were also studied. Three factors relating to the use of tracking technologies were extracted from both parents (Tech-Trusting Parent, Cautious Parent and Careful Authoritarian Parent) and pre-teens (Compliant Child, Autonomous Child, and Privacy-Sensitive Child). Tracking technologies were viewed as parental aids that made it possible to ease anxieties and provide assurance to parents and children alike. Although children did not associate the use of tracking technologies with intrusion on privacy, they expected to have a chance to coordinate their privacy boundaries.


Sign in / Sign up

Export Citation Format

Share Document