scholarly journals The Privacy Calculus of “Friending” Across Multiple Social Media Platforms

2020 ◽  
Vol 6 (2) ◽  
pp. 205630512092847
Author(s):  
Yu-Hao Lee ◽  
Chien Wen Yuan

Relationship building through social network sites (SNSs) requires privacy disclosure that involves a calculus of potential benefits against privacy risks. Tie formation (e.g., friending, following, or connecting) on SNSs is one of the most significant forms of privacy disclosure that not only communicate one’s willingness to disclose but can also reveal past activity history and invite future interactions. Based on the communication privacy management theory, the current study examines how users consider the privacy calculus and tie-formation affordances of the SNSs to manage ties across multiple SNSs. Using an online survey of 630 Facebook and/or Instagram users, the study revealed that individuals with higher privacy concerns strategically manage their privacy by connecting with different relationship ties through different SNSs as a way to construct sociotechnical boundaries between networks. The findings have implications for understanding privacy management online and provide a potential explanation for the privacy paradox.

2021 ◽  
pp. 1-11
Author(s):  
Rudolf Siegel ◽  
Cornelius J. König ◽  
Leon Porsch

Abstract. Applicants often take great care in deciding where to apply and may refrain from applying or accepting a job offer if they hear about privacy-invading practices at a future workplace. Based on communication privacy management theory, the present work examines how applicants react to different purposes of electronic monitoring. In a scenario study, we found higher privacy concerns and lower organizational attractiveness in a situation with controlling monitoring procedures as compared to supportive monitoring procedures. Furthermore, competitive participants evaluated only noncontrolling monitoring procedures more positively. This demonstrates that organizational attractiveness is harmed by controlling monitoring procedures, and decision makers should keep in mind how electronic monitoring is implemented, used, and may be perceived within and outside the organization.


Author(s):  
Vicky Dianiya

Social media is basically to share information and self-disclosures by the account owner. However, there is an attitude of caution in expressing which must also be considered and needs to be considered. Technological developments make more and more new features appear on various social media platforms, one of them is the close friend feature on Instagram that can be used to limit users in sharing information that is considered more privacy. This study uses the Communication Privacy Management theory as a framework for investigating how Instagram users, especially young adults, use and respond to the use of the close friend feature. Overall, the results of interviews with five informants found evidence of five basic assumptions in using CPM implied on social media and showed that there is confidence in the disclosure of privacy when using the close friend feature.


2019 ◽  
Vol 5 (3) ◽  
pp. 205630511985514
Author(s):  
Erin E. Hollenbaugh

Guided by communication privacy management theory, this study tested network size, network diversity, privacy concerns, and privacy management practices in and between Facebook and Snapchat for social media natives. A cross-sectional survey of 273 college students (predominately Caucasian, female, 18- to 20 years old) showed that audiences were larger and more diverse in Facebook than Snapchat. Snapchat users with larger friend lists and lower privacy concerns reported more shared boundary ownership, whereas those with more diverse networks reportedly used more open friending practices to expand their connections. Higher privacy concerns were related to more restrictive privacy management practices in both mediums, and participants were overall more open on Snapchat than on Facebook. Theoretical and practical implications were presented in efforts to inform future research.


Author(s):  
SoeYoon Choi

This study applied a novel theoretical framework of communication privacy management theory (CPM) to examine how criteria such as context, culture, and privacy motivation influence information boundary coordination rules (boundary linkage, ownership, and permeability rules) on Facebook. In particular, the current study has made an initial attempt to examine how the CPM’s boundary coordination rules are related as a process to make disclosures; how to manage connections (boundary linkage rule) and how to regulate information flow (boundary ownership rule) influence how much to disclose (boundary permeability rule) on Facebook. The study recruited active Facebook users (N = 397, Mage = 20.68, SDage = 3.63) in a large northeastern US university to complete an online survey in fall 2015. A structural equation model was proposed to test the hypothesized paths among variables proposed to build the model. Findings reveal that context (perceptions of boundless communication) and privacy motivation led to the coordination of strict boundary ownership rules for disclosure on Facebook. The context and privacy motivation however differ in their influence on the coordination of boundary linkage rule; the more individuals felt the greater need for privacy, the less likely that they attempted to create connection whereas perceiving a lack of boundaries in communication did not influence the pursuance of future connections. The culture (the goal of using Facebook for making friends) did not predict either the coordination of the boundary linkage rule or the boundary ownership rule. As expected, the coordination of the boundary linkage rule positively influenced the coordination of the permeability rule (depth of disclosure), but the coordination of the boundary ownership rule negatively influenced it. The statistical test suggested an addition of a path from the boundary ownership to the boundary linkage rule, generating an implication that the regulation of information flow (privacy desire) and managing networks (connection desire) work together in disclosure decisions. Implications of the findings on different roles of privacy motivation and context in forming privacy management and disclosure tendency are discussed to advance the modeling of comprehensive information boundary management for disclosures on SNSs.


2021 ◽  
pp. 146144482110266
Author(s):  
Hyunjin Kang ◽  
Jeeyun Oh

Smart speakers can transform interactions with users into retrievable data, posing new challenges to privacy management. Privacy management in smart speakers can be more complex than just making decisions about disclosure based on the risk–benefit analysis. Hence, this study attempts to integrate privacy self-efficacy and the multidimensional view of privacy management behaviors into the privacy calculus model and proposes an extended privacy calculus model for smart speaker usage. The study explicates three types of privacy management strategies in smart speaker usage: privacy disclosure, boundary linkage, and boundary control. A survey of smart speaker users ( N = 474) finds that perceived benefits are positively associated with privacy disclosure and boundary linkage, whereas perceived privacy risks are negatively related to these two strategies. Also, perceived privacy risks are positively related to boundary control. Finally, privacy self-efficacy promotes all three strategies while mitigating the impact of perceived privacy risks and boosting the impact of perceived benefits on privacy management.


2016 ◽  
Vol 20 (1) ◽  
pp. 50-67 ◽  
Author(s):  
Mary Helen Millham ◽  
David Atkin

Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.


2018 ◽  
Vol 1 (2) ◽  
pp. 39
Author(s):  
Muhammad Syaoki

Abstrak:    Penelitian ini bertujuan untuk menggambarkan perilaku komunikasi Jemaat Ahmadiyah dalam posisi mereka sebagai kelompok yang dilarang menyebarkan ajarannya.  Dengan menggunakan teori manajemen privasi komunikasi yang diperkenalkan oleh Sandra Petronio, penelitian ini berusaha menjelaskan proses dialektis yang dilakukan oleh jemaat Ahmadiyah di kota Semarang ketika berinteraksi dengan banyak orang dalam kehidupan sehari-hari. Hasil penelitian ini menunjukkan bahwa Jemaat Ahmadiyah melakukan pembukaan informasi privat dengan komunikasi langsung dan tidak langsung. Jemaat Ahmadiyah melakukan pembukaan informasi privat bertujuan untuk mengklarifikasi kesalahpahaman ghair tentang Ahmadiyah. Jemaat Ahmadiyah kota Semarang cenderung menutup informasi privat mereka kepada keluarga dan teman ketika mereka baru berbai’at. Mereka juga menutup informasi privat kepada orang-orang Muhammadiyah, serta kepada kelompok-kelompok Islam garis keras, seperti FPI, LDII, termasuk juga kader PKS. Tetapi mereka membuka informasi mengenai Ahmadiyah kepada orang-orang dari kalangan NU, dan aparatur pemerintah. Abstract :   This research aims to describe the behavior of Ahmadiyyah community in their position as a group that is prohibited from spreading its teachings. Using the communication privacy management theory introduced by Sandra Petronio, this research attempts to explain the dialectical process undertaken by the Ahmadiyah community in the Semarang city while interacting with many people in everyday life. The results of this study indicate that the Ahmadiyyah community conducts the opening of private information with direct and indirect communication. The Ahmadiyah community conducted the opening of private information aimed to clarify misunderstanding about “ghair” of Ahmadiyah. The Ahmadiyah community of Semarang tends to hide their private information from family and friends when they are newly banned. They also hide private informations to Muhammadiyah people, as well as to hard-line Islamic groups, such as FPI, LDII, as well as PKS cadres. But they do not hide information about Ahmadiyyah to people from the NU, and the government apparatus.


2018 ◽  
Vol 62 (10) ◽  
pp. 1392-1412 ◽  
Author(s):  
Hsuan-Ting Chen

This study builds on the privacy calculus model to revisit the privacy paradox on social media. A two-wave panel data set from Hong Kong and a cross-sectional data set from the United States are used. This study extends the model by incorporating privacy self-efficacy as another privacy-related factor in addition to privacy concerns (i.e., costs) and examines how these factors interact with social capital (i.e., the expected benefit) in influencing different privacy management strategies, including limiting profile visibility, self-disclosure, and friending. This study proposed and found a two-step privacy management strategy in which privacy concerns and privacy self-efficacy prompt users to limit their profile visibility, which in turn enhances their self-disclosing and friending behaviors in both Hong Kong and the United States. Results from the moderated mediation analyses further demonstrate that social capital strengthens the positive–direct effect of privacy self-efficacy on self-disclosure in both places, and it can mitigate the direct effect of privacy concerns on restricting self-disclosure in Hong Kong (the conditional direct effects). Social capital also enhances the indirect effect of privacy self-efficacy on both self-disclosure and friending through limiting profile visibility in Hong Kong (the conditional indirect effects). Implications of the findings are discussed.


2020 ◽  
Vol 34 (4) ◽  
pp. 527-557 ◽  
Author(s):  
M. Chad McBride ◽  
Allison R. Thorson ◽  
Karla Mason Bergen

Despite the prevalence of work spouses, scarce empirical research has focused on the communication occurring within these relationships, leaving managers with little understanding as to whether organizations can or should communicate support for employees forming these relationships and how privacy is navigated among work spouses. Building on McBride and Bergen’s conceptualization of the work-spouse relationship, we used Communication Privacy Management theory (CPM) to understand what, if any, privacy rule decision criteria individuals used as they negotiated disclosures within their work-spouse relationships. Analysis of interviews with 41 people in work-spouse relationships suggests that participants recognized both their own core privacy rule decision criteria and when these criteria were similar to or different from the criteria influencing their work spouse’s. Furthermore, work-spouse relationships formed despite organizational efforts to keep them at bay. Theoretically, the findings add to CPM theory, such that they establish the need to examine catalyst criteria as current and previous, as well as argue for the addition of confirming criteria to account for situations in which catalysts reinforce routinized privacy rules. Overall, the findings from this study advance the literature on communication in the work-spouse relationship and CPM theory and highlight the role that workplaces play in fostering these types of relationships.


Sign in / Sign up

Export Citation Format

Share Document