scholarly journals Communication privacy management of students in Latvia

2016 ◽  
Vol 14 (2) ◽  
pp. 222-227
Author(s):  
Andris Petersons ◽  
Ilkhom Khalimzoda

The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronio’s theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to disclose it is often confronted with numerous privacy dilemmas and issues regarding their secureness, especially in universities where peers are young with different cultural backgrounds. This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management theory. Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among students

2016 ◽  
Vol 20 (1) ◽  
pp. 50-67 ◽  
Author(s):  
Mary Helen Millham ◽  
David Atkin

Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.


2018 ◽  
Vol 1 (2) ◽  
pp. 39
Author(s):  
Muhammad Syaoki

Abstrak:    Penelitian ini bertujuan untuk menggambarkan perilaku komunikasi Jemaat Ahmadiyah dalam posisi mereka sebagai kelompok yang dilarang menyebarkan ajarannya.  Dengan menggunakan teori manajemen privasi komunikasi yang diperkenalkan oleh Sandra Petronio, penelitian ini berusaha menjelaskan proses dialektis yang dilakukan oleh jemaat Ahmadiyah di kota Semarang ketika berinteraksi dengan banyak orang dalam kehidupan sehari-hari. Hasil penelitian ini menunjukkan bahwa Jemaat Ahmadiyah melakukan pembukaan informasi privat dengan komunikasi langsung dan tidak langsung. Jemaat Ahmadiyah melakukan pembukaan informasi privat bertujuan untuk mengklarifikasi kesalahpahaman ghair tentang Ahmadiyah. Jemaat Ahmadiyah kota Semarang cenderung menutup informasi privat mereka kepada keluarga dan teman ketika mereka baru berbai’at. Mereka juga menutup informasi privat kepada orang-orang Muhammadiyah, serta kepada kelompok-kelompok Islam garis keras, seperti FPI, LDII, termasuk juga kader PKS. Tetapi mereka membuka informasi mengenai Ahmadiyah kepada orang-orang dari kalangan NU, dan aparatur pemerintah. Abstract :   This research aims to describe the behavior of Ahmadiyyah community in their position as a group that is prohibited from spreading its teachings. Using the communication privacy management theory introduced by Sandra Petronio, this research attempts to explain the dialectical process undertaken by the Ahmadiyah community in the Semarang city while interacting with many people in everyday life. The results of this study indicate that the Ahmadiyyah community conducts the opening of private information with direct and indirect communication. The Ahmadiyah community conducted the opening of private information aimed to clarify misunderstanding about “ghair” of Ahmadiyah. The Ahmadiyah community of Semarang tends to hide their private information from family and friends when they are newly banned. They also hide private informations to Muhammadiyah people, as well as to hard-line Islamic groups, such as FPI, LDII, as well as PKS cadres. But they do not hide information about Ahmadiyyah to people from the NU, and the government apparatus.


Author(s):  
Sandra Petronio ◽  
Rachael Hernandez

Have you ever wondered why a complete stranger sitting next to you on a plane would tell you about a recent cancer diagnosis? Why your parents never disclosed that you were adopted, feeling shocked when you accidently find out as an adult? These and many other actions reflect decisions individuals make about managing their private information. Being aware of how individuals navigate decisions to disclose or protect their private information provides useful insights that aid in the development and sustainability of relationships with others. Given privacy plays an integral role in everyone’s life, knowing more about privacy management is critical. communication privacy management (CPM) theory was first introduced by Sandra Petronio in 2002. CPM is evidence-based and accordingly provides a dependable understanding of how decisions are made to disclose and protect private information. This theory uses plain language to understand privacy management in everyday life. CPM focuses on the relationship people have with each other in communicative contexts, such as face-to-face interactions, on social media, and in dyads or groups. CPM theory is based on a communicative-social behavioral perspective and not necessarily a legal point of view. CPM theory illustrates that privacy is not paradoxical but is sustainable through the process of a privacy management system used in everyday life. The theory of CPM has been employed in a number of contexts shedding light on antecedents, mechanisms, and outcomes of private information management. In addition, a number of researchers across multiple countries, such as the Netherlands, United Kingdom, Japan, Kenya, South Korea, and the United States, have used CPM theory in their research investigations. Learning more about the system of private information management allows for a better understanding of how people navigate managing their private information when others are involved. Literature illustrates patterns of privacy management and demonstrates the challenges as well as the positive outcomes of the way individuals regulate their private information.


2021 ◽  
Vol 3 (2) ◽  
pp. 95-104
Author(s):  
Sofa Sakinah

The development of digital media technology gave rise to social media, especially Instagram which is a site used to exchange information and fulfill social communication needs in various circles. This study specifically analyzes the use of the Close Friend feature found on Instagram social media which is used for various objectives of each user. The research method uses descriptive quantitative content analysis through text analysis from various previous studies related to the use of the Instagram feature. One study showed that the effectiveness of the Instagram feature in increasing adolescent friendships in the digital era was dominant in the Close Friends feature as much as 61.2%. Close friends feature (close friend) was promoted because of the self-disclosure factor, as well as the convenience of users in uploading Instagram stories. The level of openness to the high categorydue to the proximity selecting and content sharing on this feature. The close friends feature is considered more private for Instagram users because they are free to choose their audience and upload based on their needs and desires. It was also mentioned how users manage their privacy when using the Instastory feature on Instagram social media where the privacy management is based on the Communication Privacy Management (CPM) criteria or Communication Privacy Management and is seen in the usage strategy when using the Insta Story feature on Instagram. Informants tend to have different reasons behind their decision to reset their privacy when using their social media.


2017 ◽  
Vol 36 (2) ◽  
pp. 379-399 ◽  
Author(s):  
Jennifer J. Bute ◽  
Maria Brann ◽  
Rachael Hernandez

Communication privacy management (CPM) theory posits that culturally specific understandings of privacy guide how people manage private information in everyday conversations. We use the context of miscarriage to demonstrate how societal-level expectations about (in)appropriate topics of talk converge with micro-level decisions about privacy rules and privacy boundary management. More specifically, we explore how people’s perceptions of broad social rules about the topic of miscarriage influence their disclosure decisions. Based on interviews with 20 couples who have experienced pregnancy loss, we examined how couples described miscarriage as a topic that is bound by societal-level expectations about whether and how this subject should be discussed in interpersonal conversations. Participants reflected on their perceptions of societal-level privacy rules for protecting information about their miscarriage experiences and described how these rules affected their own privacy management decisions. We discuss these findings in terms of CPM’s theoretical tools for linking macro-level discourses to everyday talk.


Author(s):  
Jessica A. Kahlow

Sexting (the sharing of sexual messages, images, and videos via communication technologies) emerged from the development of new communication technologies (CTs). As such, CTs are a vital component of sexting, and young adults continue to have more platforms to choose from to use for sexting. This chapter uses a relational approach to technological affordances and communication privacy management (CPM) theory to understand how technologies influence sexting among young adults. Empirical evidence is provided about how the affordances of a platform moderate the relationships between self-disclosure, partner trust, privacy, and risk. As such, an additional type of mediated dyadic privacy boundary is established where shared information can belong to one or both individuals and the medium used for sexting. Finally, the moderation results imply that the features of the platform matter in young adults' decisions to sext since the features can afford them more privacy, more trust, and less risk.


Author(s):  
Elaine Wittenberg ◽  
Joy V. Goldsmith ◽  
Sandra L. Ragan ◽  
Terri Ann Parnell

Openings offers specific tools to assist the nurse in traversing the challenging yet profoundly rewarding moments of transition that require the clinical practice of intimate openings with the patient/family. Replacing evasion with an opportunity to move into tension and avoidance is essential in helping a patient/family receive palliative care. Observations of tension might be clear indications of a needed transition in care. Complex interactions with patients and families coincide with transitions in care and require intimate and disclosive exchanges among patient/family and nurses. Communication privacy management theory helps us understand more about private information and how that information depends on the relationship people share. Communicating a transition to palliative care from hospital to home or to end-of-life care and hospice requires nurses to address a patient’s/family’s fears and feelings of hopelessness and to provide education about palliative care and its services. Facilitating appropriate access to private health information, creating intimate openings to process transitions in life and care, and understanding the impact of disclosure on patient/family relationships all play an important role.


2021 ◽  
pp. 009365022199847
Author(s):  
Colleen Warner Colaner ◽  
Alyssa L. Bish ◽  
Maria Butauski ◽  
Alexie Hays ◽  
Haley Kranstuber Horstman ◽  
...  

Open adoption relationships are rife with privacy dilemmas and fuzzy boundaries, which require ongoing coordination of private disclosures as a result. The present study employed communication privacy management (CPM) theory to examine adoptive parents’ ( N = 354) private disclosures with the birth family across in-person and mediated (i.e., texting and social media) contexts. SEM analysis revealed that adoptive families who were more private and were concerned about the birth family sharing private information with others viewed disclosures to the birth family as risky. These privacy concerns related to adoptive parents being more clear with the birth family about preferences for sharing that private information with others. More social media contact between birth and adoptive parents predicted increased perceptions of risk of disclosure to birth parents. Results advance CPM theorizing by underscoring the motivational bases of perceived risk, the importance of anticipated boundary turbulence, and the nuanced privacy management processes within communication modes.


2020 ◽  
Vol 15 (3) ◽  
pp. 261-267
Author(s):  
Donna M. Elkins

Working women diagnosed with cancer face difficult decisions about disclosing personal information. A 2017 survey for Cancer and Careers, a non-profit organization assisting cancer patients and survivors with finding and continuing employment, found that women are more likely than men to share their diagnosis with work colleagues, and do so more often to feel supported by co-workers. However, disclosure guidelines for communication about having cancer are difficult to establish, as they may vary widely depending on the individual and the situation. Most research about health self-disclosure has focused on the initial decision to divulge that one has an illness and on the depth of that initial disclosure. The current study was designed to further describe how working women navigate disclosures not only during the initial diagnosis, but throughout treatment and into recovery to gain needed social support. Using the typology of social support and the tenets of Communication Privacy Management Theory, the goal of this study is to share individual narratives of how working women change privacy rules to procure the type of social support needed in each stage of their experience.


Author(s):  
Sandra Petronio ◽  
Maria K. Venetis

Communication privacy management theory (CPM) argues that disclosure is the process by which we give or receive private information. Private information is what people reveal. Generally, CPM theory argues that individuals believe they own their private information and have the right to control said information. Management of private information is not necessary until others are involved. CPM does not limit an understanding of disclosure by framing it as only about the self. Instead, CPM theory points out that when management is needed, others are given co-ownership status, thereby expanding the notion of disclosing information; the theory uses the metaphor of privacy boundary to illustrate where private information is located and how the boundary expands to accommodate multiple owners of private information. Thus, individuals can disclose not only their own information but also information that belongs to others or is owned by collectives such as families. Making decisions to disclose or protect private information often creates a tension in which individuals vacillate between sharing and concealing their private information. Within the purview of health issues, these decisions have a potential to increase or decrease risk. The choice of disclosing health matters to a friend, for example, can garner social support to cope with health problems. At the same time, the individual may have concerns that his or her friend might tell someone else about the health problem, thus causing more difficulties. Understanding the tension between disclosing and protecting private health information by the owner is only one side of the coin. Because disclosure creates authorized co-owners, these co-owners (e.g., families, friends, and partners) often feel they have right to know about the owner’s health conditions. The privacy boundaries are used metaphorically to indicate where private information is located. Individuals have both personal privacy boundaries around health information that expands to include others referred to as “authorized co-owners.” Once given this status, withholding to protect some part of the private information can risk relationships and interfere with health needs. Within the scheme of health, disclosure risks and privacy predicaments are not experienced exclusively by the individual with an illness. Rather, these risks prevail for a number of individuals connected to a patient such as providers, the patient’s family, and supportive friends. Everyone involved has a dual role. For example, the clinician is both the co-owner of a patient’s private health information and holds information within his or her own privacy boundary, such as worrying whether he or she diagnosed the symptoms correctly. Thus, there are a number of circumstances that can lead to health risks where privacy management and decisions to reveal or conceal health information are concerned. CPM theory has been applied in eleven countries and in numerous contexts where privacy management occurs, such as health, families, organizations, interpersonal relationships, and social media. This theory is unique in offering a comprehensive way to understand the relationship between the notion of disclosure and that of privacy. The landscape of health-related risks where privacy management plays a significant role is both large and complex. The situations of HIV/AIDS, cancer care, and managing patient and provider disclosure of private information help to elucidate the ways decisions of privacy potentially lead to health risks.


Sign in / Sign up

Export Citation Format

Share Document