communication privacy management theory
Recently Published Documents


TOTAL DOCUMENTS

55
(FIVE YEARS 23)

H-INDEX

13
(FIVE YEARS 2)

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Marit Sukk ◽  
Andra Siibak

Abstract Digital parenting tools, such as child-tracking technologies, play an ever-increasing role in contemporary child rearing. To explore opinions and experiences related to the use of such tracking devices, we conducted Q methodology and a semi-structured individual interview-study with Estonian parents (n=20) and their 8- to 13-year-old pre-teens (n=20). Our aim was to study how such caring dataveillance was rationalized within the families, and to explore the dominant parenting values associated with the practice. Relying upon communication privacy management theory, the issues of privacy related to such intimate surveillance were also studied. Three factors relating to the use of tracking technologies were extracted from both parents (Tech-Trusting Parent, Cautious Parent and Careful Authoritarian Parent) and pre-teens (Compliant Child, Autonomous Child, and Privacy-Sensitive Child). Tracking technologies were viewed as parental aids that made it possible to ease anxieties and provide assurance to parents and children alike. Although children did not associate the use of tracking technologies with intrusion on privacy, they expected to have a chance to coordinate their privacy boundaries.


2021 ◽  
pp. 1-11
Author(s):  
Rudolf Siegel ◽  
Cornelius J. König ◽  
Leon Porsch

Abstract. Applicants often take great care in deciding where to apply and may refrain from applying or accepting a job offer if they hear about privacy-invading practices at a future workplace. Based on communication privacy management theory, the present work examines how applicants react to different purposes of electronic monitoring. In a scenario study, we found higher privacy concerns and lower organizational attractiveness in a situation with controlling monitoring procedures as compared to supportive monitoring procedures. Furthermore, competitive participants evaluated only noncontrolling monitoring procedures more positively. This demonstrates that organizational attractiveness is harmed by controlling monitoring procedures, and decision makers should keep in mind how electronic monitoring is implemented, used, and may be perceived within and outside the organization.


Author(s):  
SoeYoon Choi

This study applied a novel theoretical framework of communication privacy management theory (CPM) to examine how criteria such as context, culture, and privacy motivation influence information boundary coordination rules (boundary linkage, ownership, and permeability rules) on Facebook. In particular, the current study has made an initial attempt to examine how the CPM’s boundary coordination rules are related as a process to make disclosures; how to manage connections (boundary linkage rule) and how to regulate information flow (boundary ownership rule) influence how much to disclose (boundary permeability rule) on Facebook. The study recruited active Facebook users (N = 397, Mage = 20.68, SDage = 3.63) in a large northeastern US university to complete an online survey in fall 2015. A structural equation model was proposed to test the hypothesized paths among variables proposed to build the model. Findings reveal that context (perceptions of boundless communication) and privacy motivation led to the coordination of strict boundary ownership rules for disclosure on Facebook. The context and privacy motivation however differ in their influence on the coordination of boundary linkage rule; the more individuals felt the greater need for privacy, the less likely that they attempted to create connection whereas perceiving a lack of boundaries in communication did not influence the pursuance of future connections. The culture (the goal of using Facebook for making friends) did not predict either the coordination of the boundary linkage rule or the boundary ownership rule. As expected, the coordination of the boundary linkage rule positively influenced the coordination of the permeability rule (depth of disclosure), but the coordination of the boundary ownership rule negatively influenced it. The statistical test suggested an addition of a path from the boundary ownership to the boundary linkage rule, generating an implication that the regulation of information flow (privacy desire) and managing networks (connection desire) work together in disclosure decisions. Implications of the findings on different roles of privacy motivation and context in forming privacy management and disclosure tendency are discussed to advance the modeling of comprehensive information boundary management for disclosures on SNSs.


2021 ◽  
pp. 136754942110054
Author(s):  
Ralf De Wolf ◽  
Stephanie Van Hove ◽  
Ben Robaeyst

In privacy research, much attention has been devoted to the online privacy practices of adolescents and college youth. Less is known about the privacy management of children and Muslim children in particular. In this study, we gave a voice to Muslim children in the northern Dutch-speaking region of Belgium, and how they negotiate information about their Muslim culture and identity using focus groups and interviews. The empirical studies clarify how different privacy management strategies are used to manage and hide Islam-related information. Overall, our results illustrate how besides managing boundaries around the self, Muslim children take into account the minority group they belong to as well as the representation of that particular group when sharing information. Building further on Petronio’s communication privacy management theory and Cohen’s perspective on privacy as critical and playful subjectivity, we argue to move beyond individual-centric conceptualizations to understand privacy of minority groups.


2021 ◽  
Vol 13 (2) ◽  
pp. 76
Author(s):  
Virginia Ayu Sagita ◽  
Khuswatun Hasanah ◽  
Medi Trilaksono Dwi Abadi ◽  
Gabriella Hot Marsondang Simamora

Mental health is currently a health that must be considered in addition to physical health. According to Riset Kesehatan Dasar (2018), it shows that depression is the highest mental illness and there are 450,000 people who are people with severe mental disorders (ODGJ) who have an age range of 15-29 years. This study aims to see the communication made by survivor of mental health disorders in creating millennials to their closest people. The theory used in this research is Communication Privacy Management Theory (CPM) and Contructivism Theory. CPM theory explains how a person with a health disorder communicates mental illness by considering their personal information. Meanwhile, constructivism theory supports the CPM theory to explain how sufferers of mental health disorders choose the right diction so as not to cause wrong perceptions. Constructivism theory explains how a person constructs the message to be delivered. The method used in this study is a qualitative method with purposive sampling, which is to determine the information required by the researcher. The results of this study are each information that has rules for conveying privacy information to the closest person. The informants' trust with other people still have their privacy boundaries made based on gender, culture and context. In addition, informants used proper diction to convey their mental illness to the closest people.


Author(s):  
Vicky Dianiya

Social media is basically to share information and self-disclosures by the account owner. However, there is an attitude of caution in expressing which must also be considered and needs to be considered. Technological developments make more and more new features appear on various social media platforms, one of them is the close friend feature on Instagram that can be used to limit users in sharing information that is considered more privacy. This study uses the Communication Privacy Management theory as a framework for investigating how Instagram users, especially young adults, use and respond to the use of the close friend feature. Overall, the results of interviews with five informants found evidence of five basic assumptions in using CPM implied on social media and showed that there is confidence in the disclosure of privacy when using the close friend feature.


2020 ◽  
Vol 20 (2) ◽  
Author(s):  
Davide Cino ◽  
Chiara Dalledonne Vandini

This paper reports on findings from an exploratory study on social media dilemmas (SMDs) mothers experience about their children’s social media presence when their mothers-in-law share about their offspring online, violating their boundaries expectations. The work is theoretically informed by systems theory and communication privacy management theory. A parenting forum was researched to investigate how mothers themselves frame these dilemmatic situations through a thematic analysis of a sample of 1224 posts from 38 discussion threads focusing on these issues. This work shows the disorienting nature of SMDs leading mothers to seek support through online communication. Findings from this study further suggest that sharing about minors on social media can cause dialectical tensions between interacting systems (i. e. the nuclear and the extended family), with mothers claiming and expecting first-level agency in managing their children’s digital footprints to foster systemic differentiation in the digital home.


2020 ◽  
Vol 34 (4) ◽  
pp. 527-557 ◽  
Author(s):  
M. Chad McBride ◽  
Allison R. Thorson ◽  
Karla Mason Bergen

Despite the prevalence of work spouses, scarce empirical research has focused on the communication occurring within these relationships, leaving managers with little understanding as to whether organizations can or should communicate support for employees forming these relationships and how privacy is navigated among work spouses. Building on McBride and Bergen’s conceptualization of the work-spouse relationship, we used Communication Privacy Management theory (CPM) to understand what, if any, privacy rule decision criteria individuals used as they negotiated disclosures within their work-spouse relationships. Analysis of interviews with 41 people in work-spouse relationships suggests that participants recognized both their own core privacy rule decision criteria and when these criteria were similar to or different from the criteria influencing their work spouse’s. Furthermore, work-spouse relationships formed despite organizational efforts to keep them at bay. Theoretically, the findings add to CPM theory, such that they establish the need to examine catalyst criteria as current and previous, as well as argue for the addition of confirming criteria to account for situations in which catalysts reinforce routinized privacy rules. Overall, the findings from this study advance the literature on communication in the work-spouse relationship and CPM theory and highlight the role that workplaces play in fostering these types of relationships.


Sign in / Sign up

Export Citation Format

Share Document