Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors

2016 ◽  
Vol 20 (1) ◽  
pp. 50-67 ◽  
Author(s):  
Mary Helen Millham ◽  
David Atkin

Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.

Author(s):  
Debra L. Worthington ◽  
Margaret Fitch-Hauser

Communication privacy management theory (CPM) was originally developed to explain how individuals control and reveal private information in traditional social interactions. It has since been extended to a number of contexts, most recently to evolving communication technologies and social networking sites. CPM provides a set of theoretical tools to explore the intersection of technology and individual privacy in relationship management. This chapter introduces CPM; privacy is defined, the three primary components and eight axioms of CPM are reviewed, and their application to mediated communication contexts are outlined. Areas for future research are presented.


2018 ◽  
Vol 1 (2) ◽  
pp. 39
Author(s):  
Muhammad Syaoki

Abstrak:    Penelitian ini bertujuan untuk menggambarkan perilaku komunikasi Jemaat Ahmadiyah dalam posisi mereka sebagai kelompok yang dilarang menyebarkan ajarannya.  Dengan menggunakan teori manajemen privasi komunikasi yang diperkenalkan oleh Sandra Petronio, penelitian ini berusaha menjelaskan proses dialektis yang dilakukan oleh jemaat Ahmadiyah di kota Semarang ketika berinteraksi dengan banyak orang dalam kehidupan sehari-hari. Hasil penelitian ini menunjukkan bahwa Jemaat Ahmadiyah melakukan pembukaan informasi privat dengan komunikasi langsung dan tidak langsung. Jemaat Ahmadiyah melakukan pembukaan informasi privat bertujuan untuk mengklarifikasi kesalahpahaman ghair tentang Ahmadiyah. Jemaat Ahmadiyah kota Semarang cenderung menutup informasi privat mereka kepada keluarga dan teman ketika mereka baru berbai’at. Mereka juga menutup informasi privat kepada orang-orang Muhammadiyah, serta kepada kelompok-kelompok Islam garis keras, seperti FPI, LDII, termasuk juga kader PKS. Tetapi mereka membuka informasi mengenai Ahmadiyah kepada orang-orang dari kalangan NU, dan aparatur pemerintah. Abstract :   This research aims to describe the behavior of Ahmadiyyah community in their position as a group that is prohibited from spreading its teachings. Using the communication privacy management theory introduced by Sandra Petronio, this research attempts to explain the dialectical process undertaken by the Ahmadiyah community in the Semarang city while interacting with many people in everyday life. The results of this study indicate that the Ahmadiyyah community conducts the opening of private information with direct and indirect communication. The Ahmadiyah community conducted the opening of private information aimed to clarify misunderstanding about “ghair” of Ahmadiyah. The Ahmadiyah community of Semarang tends to hide their private information from family and friends when they are newly banned. They also hide private informations to Muhammadiyah people, as well as to hard-line Islamic groups, such as FPI, LDII, as well as PKS cadres. But they do not hide information about Ahmadiyyah to people from the NU, and the government apparatus.


Author(s):  
Elaine Wittenberg ◽  
Joy V. Goldsmith ◽  
Sandra L. Ragan ◽  
Terri Ann Parnell

Openings offers specific tools to assist the nurse in traversing the challenging yet profoundly rewarding moments of transition that require the clinical practice of intimate openings with the patient/family. Replacing evasion with an opportunity to move into tension and avoidance is essential in helping a patient/family receive palliative care. Observations of tension might be clear indications of a needed transition in care. Complex interactions with patients and families coincide with transitions in care and require intimate and disclosive exchanges among patient/family and nurses. Communication privacy management theory helps us understand more about private information and how that information depends on the relationship people share. Communicating a transition to palliative care from hospital to home or to end-of-life care and hospice requires nurses to address a patient’s/family’s fears and feelings of hopelessness and to provide education about palliative care and its services. Facilitating appropriate access to private health information, creating intimate openings to process transitions in life and care, and understanding the impact of disclosure on patient/family relationships all play an important role.


Author(s):  
Sandra Petronio ◽  
Maria K. Venetis

Communication privacy management theory (CPM) argues that disclosure is the process by which we give or receive private information. Private information is what people reveal. Generally, CPM theory argues that individuals believe they own their private information and have the right to control said information. Management of private information is not necessary until others are involved. CPM does not limit an understanding of disclosure by framing it as only about the self. Instead, CPM theory points out that when management is needed, others are given co-ownership status, thereby expanding the notion of disclosing information; the theory uses the metaphor of privacy boundary to illustrate where private information is located and how the boundary expands to accommodate multiple owners of private information. Thus, individuals can disclose not only their own information but also information that belongs to others or is owned by collectives such as families. Making decisions to disclose or protect private information often creates a tension in which individuals vacillate between sharing and concealing their private information. Within the purview of health issues, these decisions have a potential to increase or decrease risk. The choice of disclosing health matters to a friend, for example, can garner social support to cope with health problems. At the same time, the individual may have concerns that his or her friend might tell someone else about the health problem, thus causing more difficulties. Understanding the tension between disclosing and protecting private health information by the owner is only one side of the coin. Because disclosure creates authorized co-owners, these co-owners (e.g., families, friends, and partners) often feel they have right to know about the owner’s health conditions. The privacy boundaries are used metaphorically to indicate where private information is located. Individuals have both personal privacy boundaries around health information that expands to include others referred to as “authorized co-owners.” Once given this status, withholding to protect some part of the private information can risk relationships and interfere with health needs. Within the scheme of health, disclosure risks and privacy predicaments are not experienced exclusively by the individual with an illness. Rather, these risks prevail for a number of individuals connected to a patient such as providers, the patient’s family, and supportive friends. Everyone involved has a dual role. For example, the clinician is both the co-owner of a patient’s private health information and holds information within his or her own privacy boundary, such as worrying whether he or she diagnosed the symptoms correctly. Thus, there are a number of circumstances that can lead to health risks where privacy management and decisions to reveal or conceal health information are concerned. CPM theory has been applied in eleven countries and in numerous contexts where privacy management occurs, such as health, families, organizations, interpersonal relationships, and social media. This theory is unique in offering a comprehensive way to understand the relationship between the notion of disclosure and that of privacy. The landscape of health-related risks where privacy management plays a significant role is both large and complex. The situations of HIV/AIDS, cancer care, and managing patient and provider disclosure of private information help to elucidate the ways decisions of privacy potentially lead to health risks.


2017 ◽  
Vol 31 (3) ◽  
pp. 429-446 ◽  
Author(s):  
Stephanie A. Smith ◽  
Steven R. Brunner

A sample of 103 full-time employees from various organizations and industries completed an online, open-ended survey to explore and understand the decisions people make to manage their private disclosures at work. Communication privacy management theory was used to understand the management of private information. Results indicate that core and catalyst criteria motivate people to reveal/conceal at work, such as boundary maintenance based on organizational culture, relational considerations, a desire for feedback, and risk/benefit considerations. People also used implicit/explicit rules, reiteration of privacy rules, and retaliation to limit and respond to turbulence. The theoretical and practical implications of these findings are discussed along with limitations and directions for future research.


2020 ◽  
Vol 6 (2) ◽  
pp. 205630512091561
Author(s):  
Anatoliy Gruzd ◽  
Jenna Jacobson ◽  
Elizabeth Dubois

The article examines whether and how the ever-evolving practice of using social media to screen job applicants may undermine people’s trust in the organizations that are engaging in this practice. Using a survey of 429 participants, we assess whether their comfort level with cybervetting can be explained by the factors outlined by Petronio’s communication privacy management theory: culture, gender, motivation, and risk-benefit ratio. We find that respondents from India are significantly more comfortable with social media screening than those living in the United States. We did not find any gender-based differences in individuals’ comfort with social media screening, which suggests that there may be some consistent set of norms, expectations, or “privacy rules” that apply in the context of employment seeking—irrespective of gender. As a theoretical contribution, we apply the communication privacy management theory to analyze information that is publicly available, which offers a unique extension of the theory that focuses on private information. Importantly, the research suggests that privacy boundaries are not only important when it comes to private information, but also with information that is publicly available on social media. The research identifies that just because social media data are public, does not mean people do not have context-specific and data-specific expectations of privacy.


2019 ◽  
Vol 4 (1) ◽  
pp. 1
Author(s):  
Bobby Rachman Santoso

This research purpose to describe the communication of the Majlis Sema'an Al-Qur'ān Jantiko Mantab and Dzikrul Ghōfīlīn in their position as a group that has influential religious activities and is in the public interest.By using communication privacy management theory, the author tries to explain the dialectical process carried out by MSQ Jantiko Mantab and Dzikrul Ghōfīlīn in developing their activities.The result, that MSQ Jantiko Mantab and Dzikrul Ghōfīlīn conducted the opening of private information with direct and indirect communication.They congregation conducted the opening of private information aimed at clarifying misunderstandings regarding the activities of the MSQ of Jantiko Mantab and Dzikrul Ghōfīlīn. Information disclosure also purpose to develop the MSQ Jantiko Mantab and Dzikrul Ghōfīlīn in various regions. It was proven that initially only a few people attended, now thousands of people followed, and their activities were carried out in various regions, especially East Java.


Sign in / Sign up

Export Citation Format

Share Document