The Influence of Technology on Privacy Boundary Management in Young Adults' Sexting Relationships

Author(s):  
Jessica A. Kahlow

Sexting (the sharing of sexual messages, images, and videos via communication technologies) emerged from the development of new communication technologies (CTs). As such, CTs are a vital component of sexting, and young adults continue to have more platforms to choose from to use for sexting. This chapter uses a relational approach to technological affordances and communication privacy management (CPM) theory to understand how technologies influence sexting among young adults. Empirical evidence is provided about how the affordances of a platform moderate the relationships between self-disclosure, partner trust, privacy, and risk. As such, an additional type of mediated dyadic privacy boundary is established where shared information can belong to one or both individuals and the medium used for sexting. Finally, the moderation results imply that the features of the platform matter in young adults' decisions to sext since the features can afford them more privacy, more trust, and less risk.

2021 ◽  
Vol 3 (2) ◽  
pp. 95-104
Author(s):  
Sofa Sakinah

The development of digital media technology gave rise to social media, especially Instagram which is a site used to exchange information and fulfill social communication needs in various circles. This study specifically analyzes the use of the Close Friend feature found on Instagram social media which is used for various objectives of each user. The research method uses descriptive quantitative content analysis through text analysis from various previous studies related to the use of the Instagram feature. One study showed that the effectiveness of the Instagram feature in increasing adolescent friendships in the digital era was dominant in the Close Friends feature as much as 61.2%. Close friends feature (close friend) was promoted because of the self-disclosure factor, as well as the convenience of users in uploading Instagram stories. The level of openness to the high categorydue to the proximity selecting and content sharing on this feature. The close friends feature is considered more private for Instagram users because they are free to choose their audience and upload based on their needs and desires. It was also mentioned how users manage their privacy when using the Instastory feature on Instagram social media where the privacy management is based on the Communication Privacy Management (CPM) criteria or Communication Privacy Management and is seen in the usage strategy when using the Insta Story feature on Instagram. Informants tend to have different reasons behind their decision to reset their privacy when using their social media.


2020 ◽  
Vol 15 (3) ◽  
pp. 261-267
Author(s):  
Donna M. Elkins

Working women diagnosed with cancer face difficult decisions about disclosing personal information. A 2017 survey for Cancer and Careers, a non-profit organization assisting cancer patients and survivors with finding and continuing employment, found that women are more likely than men to share their diagnosis with work colleagues, and do so more often to feel supported by co-workers. However, disclosure guidelines for communication about having cancer are difficult to establish, as they may vary widely depending on the individual and the situation. Most research about health self-disclosure has focused on the initial decision to divulge that one has an illness and on the depth of that initial disclosure. The current study was designed to further describe how working women navigate disclosures not only during the initial diagnosis, but throughout treatment and into recovery to gain needed social support. Using the typology of social support and the tenets of Communication Privacy Management Theory, the goal of this study is to share individual narratives of how working women change privacy rules to procure the type of social support needed in each stage of their experience.


2016 ◽  
Vol 14 (2) ◽  
pp. 222-227
Author(s):  
Andris Petersons ◽  
Ilkhom Khalimzoda

The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronio’s theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to disclose it is often confronted with numerous privacy dilemmas and issues regarding their secureness, especially in universities where peers are young with different cultural backgrounds. This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management theory. Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among students


Author(s):  
Debra L. Worthington ◽  
Margaret Fitch-Hauser

Communication privacy management theory (CPM) was originally developed to explain how individuals control and reveal private information in traditional social interactions. It has since been extended to a number of contexts, most recently to evolving communication technologies and social networking sites. CPM provides a set of theoretical tools to explore the intersection of technology and individual privacy in relationship management. This chapter introduces CPM; privacy is defined, the three primary components and eight axioms of CPM are reviewed, and their application to mediated communication contexts are outlined. Areas for future research are presented.


2016 ◽  
Vol 20 (1) ◽  
pp. 50-67 ◽  
Author(s):  
Mary Helen Millham ◽  
David Atkin

Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.


2017 ◽  
Author(s):  
◽  
Young Jin Kang

[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT AUTHOR'S REQUEST.] Parental disclosures about divorce-related topics can help children understand changes and reduce uncertainty following divorce; however, such disclosures can be often hurtful and damaging if they contain harmful and inappropriate messages. Although divorced fathers are important in children's lives, little is known about these fathers' perceptions of parental disclosures. This study examines divorced fathers' perceptions of the inappropriateness of parental disclosures, drawing upon sensitizing concepts from family systems and communication privacy management theories. Using vignette techniques, I conducted a grounded theory study of 20 divorced fathers who had shared or legal custody of a child in adolescence. Fathers' judgments about the inappropriateness of disclosures were generally consistent when discussing disclosures made by other parents. However, I found fathers were less consistent when evaluating their own disclosures. Fathers' judgments were influenced by various factors (e.g., life experiences), and these factors functioned as guiding premises for their own behaviors and disclosing strategies regarding how much and when to share information with their children.


2018 ◽  
Vol 1 (2) ◽  
pp. 39
Author(s):  
Muhammad Syaoki

Abstrak:    Penelitian ini bertujuan untuk menggambarkan perilaku komunikasi Jemaat Ahmadiyah dalam posisi mereka sebagai kelompok yang dilarang menyebarkan ajarannya.  Dengan menggunakan teori manajemen privasi komunikasi yang diperkenalkan oleh Sandra Petronio, penelitian ini berusaha menjelaskan proses dialektis yang dilakukan oleh jemaat Ahmadiyah di kota Semarang ketika berinteraksi dengan banyak orang dalam kehidupan sehari-hari. Hasil penelitian ini menunjukkan bahwa Jemaat Ahmadiyah melakukan pembukaan informasi privat dengan komunikasi langsung dan tidak langsung. Jemaat Ahmadiyah melakukan pembukaan informasi privat bertujuan untuk mengklarifikasi kesalahpahaman ghair tentang Ahmadiyah. Jemaat Ahmadiyah kota Semarang cenderung menutup informasi privat mereka kepada keluarga dan teman ketika mereka baru berbai’at. Mereka juga menutup informasi privat kepada orang-orang Muhammadiyah, serta kepada kelompok-kelompok Islam garis keras, seperti FPI, LDII, termasuk juga kader PKS. Tetapi mereka membuka informasi mengenai Ahmadiyah kepada orang-orang dari kalangan NU, dan aparatur pemerintah. Abstract :   This research aims to describe the behavior of Ahmadiyyah community in their position as a group that is prohibited from spreading its teachings. Using the communication privacy management theory introduced by Sandra Petronio, this research attempts to explain the dialectical process undertaken by the Ahmadiyah community in the Semarang city while interacting with many people in everyday life. The results of this study indicate that the Ahmadiyyah community conducts the opening of private information with direct and indirect communication. The Ahmadiyah community conducted the opening of private information aimed to clarify misunderstanding about “ghair” of Ahmadiyah. The Ahmadiyah community of Semarang tends to hide their private information from family and friends when they are newly banned. They also hide private informations to Muhammadiyah people, as well as to hard-line Islamic groups, such as FPI, LDII, as well as PKS cadres. But they do not hide information about Ahmadiyyah to people from the NU, and the government apparatus.


Sign in / Sign up

Export Citation Format

Share Document