scholarly journals Privasi “Pertemanan” Remaja di Media Sosial

2021 ◽  
Vol 3 (1) ◽  
pp. 78-91
Author(s):  
Festy Rahma Hidayati ◽  
Irwansyah Irwansyah

Media sosial telah mengubah cara berpikir, berkomunikasi, dan berinteraksi para remaja dengan orang lain. Namun, kemunculan media sosial juga mendorong pengungkapan privasi secara terbuka di area publik sehingga memberi dampak negatif bagi remaja. Penelitian ini merupakan penelitian kualitatif bersifat deskriptif dengan menggunakan Teori Communication Privacy Management yang diperkenalkan oleh Sandra Petronio. Dengan menggunakan Teori Communication Privacy Management, penelitian ini berupaya menjelaskan manajemen privasi komunikasi remaja dalam mengelola pengungkapan atau penyembunyian informasi pribadi terkait seks atau pornografi di media sosial. Ada tiga elemen (key word) yang menjadi dasar asumsi Teori Communication Privacy Management ini, yaitu ownership, control dan turbulence. Menurut Petronio, ketika berada dalam sebuah hubungan akan diatur batasan-batasan apa yang bersifat pribadi dan publik. Penelitian ini memperlihatkan bahwa sebagai pemilik informasi (ownership), remaja mengontrol informasi pribadi yang dimilikinya berdasarkan batasan privasi yang telah ditetapkannya. Pengungkapan dan penyembunyian informasi pribadi ini sifatnya dapat berubah dan bergantung pada aturan untuk mengontrol tingkat aksesibilitas. Pembahasan soal seks atau pornografi memiliki batasan untuk dibagikan kepada orang tua, tetapi dapat lebih terbuka dengan teman. Saat informasi pribadi remaja tersebar di media sosial yang bersifat publik, bahkan diketahui orang orang tua, maka akan terjadi turbulensi privasi (turbulence)

2016 ◽  
Vol 20 (1) ◽  
pp. 50-67 ◽  
Author(s):  
Mary Helen Millham ◽  
David Atkin

Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.


2017 ◽  
Author(s):  
◽  
Young Jin Kang

[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT AUTHOR'S REQUEST.] Parental disclosures about divorce-related topics can help children understand changes and reduce uncertainty following divorce; however, such disclosures can be often hurtful and damaging if they contain harmful and inappropriate messages. Although divorced fathers are important in children's lives, little is known about these fathers' perceptions of parental disclosures. This study examines divorced fathers' perceptions of the inappropriateness of parental disclosures, drawing upon sensitizing concepts from family systems and communication privacy management theories. Using vignette techniques, I conducted a grounded theory study of 20 divorced fathers who had shared or legal custody of a child in adolescence. Fathers' judgments about the inappropriateness of disclosures were generally consistent when discussing disclosures made by other parents. However, I found fathers were less consistent when evaluating their own disclosures. Fathers' judgments were influenced by various factors (e.g., life experiences), and these factors functioned as guiding premises for their own behaviors and disclosing strategies regarding how much and when to share information with their children.


2018 ◽  
Vol 1 (2) ◽  
pp. 39
Author(s):  
Muhammad Syaoki

Abstrak:    Penelitian ini bertujuan untuk menggambarkan perilaku komunikasi Jemaat Ahmadiyah dalam posisi mereka sebagai kelompok yang dilarang menyebarkan ajarannya.  Dengan menggunakan teori manajemen privasi komunikasi yang diperkenalkan oleh Sandra Petronio, penelitian ini berusaha menjelaskan proses dialektis yang dilakukan oleh jemaat Ahmadiyah di kota Semarang ketika berinteraksi dengan banyak orang dalam kehidupan sehari-hari. Hasil penelitian ini menunjukkan bahwa Jemaat Ahmadiyah melakukan pembukaan informasi privat dengan komunikasi langsung dan tidak langsung. Jemaat Ahmadiyah melakukan pembukaan informasi privat bertujuan untuk mengklarifikasi kesalahpahaman ghair tentang Ahmadiyah. Jemaat Ahmadiyah kota Semarang cenderung menutup informasi privat mereka kepada keluarga dan teman ketika mereka baru berbai’at. Mereka juga menutup informasi privat kepada orang-orang Muhammadiyah, serta kepada kelompok-kelompok Islam garis keras, seperti FPI, LDII, termasuk juga kader PKS. Tetapi mereka membuka informasi mengenai Ahmadiyah kepada orang-orang dari kalangan NU, dan aparatur pemerintah. Abstract :   This research aims to describe the behavior of Ahmadiyyah community in their position as a group that is prohibited from spreading its teachings. Using the communication privacy management theory introduced by Sandra Petronio, this research attempts to explain the dialectical process undertaken by the Ahmadiyah community in the Semarang city while interacting with many people in everyday life. The results of this study indicate that the Ahmadiyyah community conducts the opening of private information with direct and indirect communication. The Ahmadiyah community conducted the opening of private information aimed to clarify misunderstanding about “ghair” of Ahmadiyah. The Ahmadiyah community of Semarang tends to hide their private information from family and friends when they are newly banned. They also hide private informations to Muhammadiyah people, as well as to hard-line Islamic groups, such as FPI, LDII, as well as PKS cadres. But they do not hide information about Ahmadiyyah to people from the NU, and the government apparatus.


2020 ◽  
Vol 34 (4) ◽  
pp. 527-557 ◽  
Author(s):  
M. Chad McBride ◽  
Allison R. Thorson ◽  
Karla Mason Bergen

Despite the prevalence of work spouses, scarce empirical research has focused on the communication occurring within these relationships, leaving managers with little understanding as to whether organizations can or should communicate support for employees forming these relationships and how privacy is navigated among work spouses. Building on McBride and Bergen’s conceptualization of the work-spouse relationship, we used Communication Privacy Management theory (CPM) to understand what, if any, privacy rule decision criteria individuals used as they negotiated disclosures within their work-spouse relationships. Analysis of interviews with 41 people in work-spouse relationships suggests that participants recognized both their own core privacy rule decision criteria and when these criteria were similar to or different from the criteria influencing their work spouse’s. Furthermore, work-spouse relationships formed despite organizational efforts to keep them at bay. Theoretically, the findings add to CPM theory, such that they establish the need to examine catalyst criteria as current and previous, as well as argue for the addition of confirming criteria to account for situations in which catalysts reinforce routinized privacy rules. Overall, the findings from this study advance the literature on communication in the work-spouse relationship and CPM theory and highlight the role that workplaces play in fostering these types of relationships.


2019 ◽  
Vol 22 (6) ◽  
pp. 1058-1075
Author(s):  
Ralf De Wolf

Many researchers have been studying teens’ privacy management on social media, and how they individually control information. Employing the theoretical framework of communication privacy management (CPM) theory, I argue that individual information control in itself is desirable but insufficient, giving only a limited understanding of teens’ privacy practices. Instead, I argue that research should focus on both personal and interpersonal privacy management to ultimately understand teens’ privacy practices. Using a survey study ( n = 2000), I investigated the predictors of teens’ personal and interpersonal privacy management on social media and compared different types of boundary coordination. The results demonstrate that feelings of fatalism regarding individual control in a networked social environment, which I call networked defeatism, are positively related with interpersonal privacy management. Also, interpersonal privacy management is less important when coordinating boundaries with peers than it is when coordinating sexual materials, and dealing with personal information shared by parents.


Sign in / Sign up

Export Citation Format

Share Document