communication privacy
Recently Published Documents


TOTAL DOCUMENTS

131
(FIVE YEARS 42)

H-INDEX

18
(FIVE YEARS 2)

2021 ◽  
Vol 3 (2) ◽  
pp. 95-104
Author(s):  
Sofa Sakinah

The development of digital media technology gave rise to social media, especially Instagram which is a site used to exchange information and fulfill social communication needs in various circles. This study specifically analyzes the use of the Close Friend feature found on Instagram social media which is used for various objectives of each user. The research method uses descriptive quantitative content analysis through text analysis from various previous studies related to the use of the Instagram feature. One study showed that the effectiveness of the Instagram feature in increasing adolescent friendships in the digital era was dominant in the Close Friends feature as much as 61.2%. Close friends feature (close friend) was promoted because of the self-disclosure factor, as well as the convenience of users in uploading Instagram stories. The level of openness to the high categorydue to the proximity selecting and content sharing on this feature. The close friends feature is considered more private for Instagram users because they are free to choose their audience and upload based on their needs and desires. It was also mentioned how users manage their privacy when using the Instastory feature on Instagram social media where the privacy management is based on the Communication Privacy Management (CPM) criteria or Communication Privacy Management and is seen in the usage strategy when using the Insta Story feature on Instagram. Informants tend to have different reasons behind their decision to reset their privacy when using their social media.


2021 ◽  
Vol 4 (1) ◽  
pp. 37-52
Author(s):  
Ratna Nurlaila

Penelitian ini mengkaji akun BagiKata di media sosial Line yang merupakan layanan konsultasi daring guna mengetahui lebih dalam faktor-faktor yang muncul saat user BagiKata berkonsultasi daring dan bagaimana user berkonsultasi, berterus terang dan mengelola masalah privasinya kepada handler BagiKata di media sosial Line dengan pendekatan teori Communication Privacy Management (CPM). Penelitian ini menggunakan metode penelitian netnografi guna mempelajari komunitas daring pada akun BagiKata di media sosial Line. Penemuan unik dalam penelitian ini adalah bahwa konsultasi daring merupakan hal yang membantu sebagai pertolongan awal (sebelum bertemu pakar) saat user BagiKata merasa terbebani dan perlu berkonsultasi guna melegakan ranah psikis mereka, sebab sifatnya yang relevan dengan Internet of Things (IoT) berupa anonim, nyaman (untuk berterus terang dan berekspresi), cepat, dan berbiaya murah ataupun gratis, memungkinkan pengguna untuk nyaman berterus terang dan mendapatkan layanan di waktu dan tempat yang fleksibel. Temuan lainnya, ada perbedaan antara konsultasi daring dan konsultasi luring di mana berkonsultasi secara langsung dengan pakar lebih holistik sebab menampilkan komunikasi nonverbal seperti      body language, ekspresi, serta intonasi. Dengan adanya konsultasi daring melalui akun BagiKata di media sosial Line, menjadikan posisi pakar dan nonpakar terkadang bias seperti konsep the death of expertise. Penemuan unik lainnya yaitu layanan konsultasi melalui akun Bagikata di media sosial Line dengan menggunakan Bahasa Inggris lebih diharapkan oleh pengguna layanan konsultasi, guna menghindari lebih banyak memori negatif yang tersimpan dalam bahasa ibu.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiangyu Liu ◽  
Lei Guo ◽  
Xuetao Wei

With the rapid development of smart cities, white light-emitting diodes (LEDs) are widely used in indoor lighting due to their characteristics of energy-saving, long lifetimes, and low cost. At the same time, the high-frequency modulated LEDs allow visible light to be used for indoor communications, positioning, and security. Visible light applications have many advantages, such as avoiding electromagnetic interference, high communication speed, great privacy, and high-precise positioning. In this paper, we will survey the application prospects and research results of visible light from scenarios such as high-speed communication, privacy security, and navigation localization and focus on analyzing and discussing the challenges and development trends encountered in visible light positioning.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Marit Sukk ◽  
Andra Siibak

Abstract Digital parenting tools, such as child-tracking technologies, play an ever-increasing role in contemporary child rearing. To explore opinions and experiences related to the use of such tracking devices, we conducted Q methodology and a semi-structured individual interview-study with Estonian parents (n=20) and their 8- to 13-year-old pre-teens (n=20). Our aim was to study how such caring dataveillance was rationalized within the families, and to explore the dominant parenting values associated with the practice. Relying upon communication privacy management theory, the issues of privacy related to such intimate surveillance were also studied. Three factors relating to the use of tracking technologies were extracted from both parents (Tech-Trusting Parent, Cautious Parent and Careful Authoritarian Parent) and pre-teens (Compliant Child, Autonomous Child, and Privacy-Sensitive Child). Tracking technologies were viewed as parental aids that made it possible to ease anxieties and provide assurance to parents and children alike. Although children did not associate the use of tracking technologies with intrusion on privacy, they expected to have a chance to coordinate their privacy boundaries.


2021 ◽  
pp. 1-11
Author(s):  
Rudolf Siegel ◽  
Cornelius J. König ◽  
Leon Porsch

Abstract. Applicants often take great care in deciding where to apply and may refrain from applying or accepting a job offer if they hear about privacy-invading practices at a future workplace. Based on communication privacy management theory, the present work examines how applicants react to different purposes of electronic monitoring. In a scenario study, we found higher privacy concerns and lower organizational attractiveness in a situation with controlling monitoring procedures as compared to supportive monitoring procedures. Furthermore, competitive participants evaluated only noncontrolling monitoring procedures more positively. This demonstrates that organizational attractiveness is harmed by controlling monitoring procedures, and decision makers should keep in mind how electronic monitoring is implemented, used, and may be perceived within and outside the organization.


2021 ◽  
Vol 5 (1) ◽  
pp. 92
Author(s):  
Nadya Kartika Lumban Tobing

Technological development like social media has been affecting the openness of communication privacy management of its users. As a result of web development from web 2.0 to web 4.0, social media has gone through changes starting with the operational aspect of the applications, the distribution of information in the form of texts, images, and videos, the relation of interaction among users, to the relation between users and the engine of the applications (symbiotic web). The engine recommends users to work based on the results of how the users’ personal data is processed, and by implication affects social media users’ personal data management. Pervasive computing (easy access and connecting devices anywhere and anytime), symbiotic web (symbiotic relationships of people and devices), emotive web (emotional feelings), and ubiquitous computing (computers are everywhere) become part of web-based social media 4.0. The purpose of this study was to find out what factors of the four web 4.0-based social media concepts that most influence the privacy management of social media users' communications. This research method uses quantitative approach and survey method on 324 respondents taken through saturated samples. The result of this study is a significant influence on web-based social media 4.0 on the privacy management of social media users' communications. The concept of emotive web becomes the most influential variable towards the changes in communication privacy management. Perkembangan teknologi seperti media sosial telah memengaruhi keterbukaan manajemen privasi komunikasi penggunanya. Perkembangan dari web 2.0 hingga web 4.0, media sosial mengalami perubahan mulai dari operasional aplikasi, distribusi informasi dari teks, gambar, dan video, hubungan interaksi antara sesama pengguna, hingga hubungan pengguna dengan mesin aplikasi (symbiotic web). Mesin memberi rekomendasi kepada pengguna untuk bekerja berdasarkan pengolahan data diri pengguna dan secara tidak langsung telah memengaruhi pengelolaan data pribadi pengguna media sosial. Pervasive computing (memudahkan akses dan menghubungkan perangkat dimana saja dan kapan saja), symbiotic web (hubungan simbiosis manusia dan perangkat), emotive web (perasaan emosi), dan ubiquitous computing (komputer berada dimana saja) menjadi bagian dari media sosial berbasis web 4.0. Tujuan penelitian ini adalah untuk mengetahui faktor apa saja dari keempat konsep media sosial berbasis web 4.0 yang paling memengaruhi manajemen privasi komunikasi pengguna media sosial. Metode penelitian ini menggunakan pendekatan kuantitatif dan metode survei terhadap 324 responden yang diambil melalui sampel jenuh. Hasil penelitian ini adalah adanya pengaruh signifikan pada media sosial berbasis web 4.0 terhadap manajemen privasi komunikasi pengguna media sosial. Konsep emotive web, yaitu konsep yang membuat pengguna media sosial dapat membagikan emosi mereka secara daring  menjadi variabel yang sangat berpengaruh terhadap perubahan manajemen privasi komunikasi.


2021 ◽  
pp. 136754942110054
Author(s):  
Ralf De Wolf ◽  
Stephanie Van Hove ◽  
Ben Robaeyst

In privacy research, much attention has been devoted to the online privacy practices of adolescents and college youth. Less is known about the privacy management of children and Muslim children in particular. In this study, we gave a voice to Muslim children in the northern Dutch-speaking region of Belgium, and how they negotiate information about their Muslim culture and identity using focus groups and interviews. The empirical studies clarify how different privacy management strategies are used to manage and hide Islam-related information. Overall, our results illustrate how besides managing boundaries around the self, Muslim children take into account the minority group they belong to as well as the representation of that particular group when sharing information. Building further on Petronio’s communication privacy management theory and Cohen’s perspective on privacy as critical and playful subjectivity, we argue to move beyond individual-centric conceptualizations to understand privacy of minority groups.


2021 ◽  
Vol 2 (2) ◽  
pp. 1-13
Author(s):  
Yamin Li ◽  
Jun Zhang ◽  
Zhongliang Yang ◽  
Ru Zhang

The core challenge of steganography is always how to improve the hidden capacity and the concealment. Most current generation-based linguistic steganography methods only consider the probability distribution between text characters, and the emotion and topic of the generated steganographic text are uncontrollable. Especially for long texts, generating several sentences related to a topic and displaying overall coherence and discourse-relatedness can ensure better concealment. In this article, we address the problem of generating coherent multi-sentence texts for better concealment, and a topic-aware neural linguistic steganography method that can generate a steganographic paragraph with a specific topic is present. We achieve a topic-controllable steganographic long text generation by encoding the related entities and their relationships from Knowledge Graphs. Experimental results illustrate that the proposed method can guarantee both the quality of the generated steganographic text and its relevance to a specific topic. The proposed model can be widely used in covert communication, privacy protection, and many other areas of information security.


Sign in / Sign up

Export Citation Format

Share Document