Communication Privacy Management and Mediated Communication
2018, IGI Global eBooks
https://doi.org/10.4018/978-1-5225-2255-3.CH605…
3 pages
1 file
Sign up for access to the world's latest research
Abstract
(1991) introduced communication privacy management theory (CPM) to explain how individuals control and reveal private information. While it was originally developed as an organizing principle for understanding disclosure in traditional social interactions, it has since been extended to a number of contexts, most recently to evolving communication technologies and social networking sites, including online blogging (e.g.,
Related papers
1998
ED419253 - Exploring Tensions between Self-Disclosure and Privacy Needs: The Future of Communication Boundary Management Theories.
Proceedings of the …, 2011
The workload needed for managing privacy and publicness in current social network services (SNSs) is placed on individuals, yet people have few means to control what others disclose about them. This paper considers SNS-users' concerns in relation to online disclosure and the ways in which they cope with these both individually and collaboratively. While previous work has focused mainly on individual coping strategies, our findings from a qualitative study with 27 participants suggest that collaborative strategies in boundary regulation are of additional importance. We present a framework of strategies for boundary regulation that informs both theoretical work and design practice related to management of disclosure in SNSs. The framework considers disclosure as an interpersonal process of boundary regulation, in which people are dependent on what others choose to disclose about them. The paper concludes by proposing design solutions supportive of collaborative and preventive strategies in boundary regulation that facilitate the management of disclosure online.
This study applied Communication Privacy Management (CPM) theory to the context of blogging and developed a validated, theory-based measure of blogging privacy management. Across three studies, 823 college student bloggers completed an online survey. In study one (n =176), exploratory and confirmatory factor analysis techniques tested four potential models. Study two (n =291) cross-validated the final factor structure obtained in the fourth model with a separate sample. Study three (n =356) tested the discriminant and predictive validity of the measure by comparing it to the self-consciousness scale. The Blogging Privacy Management Measure (BPMM) is a multidimensional, valid, and reliable construct. Future research could explore the influence of family values about privacy on blogging privacy rule management.
International Journal of Cyber Behavior, Psychology and Learning, 2014
The present study evaluated a video-based intervention designed to permit users of social networking to make informed decisions about the information they disclosed online. The videos provided information regarding potential risks of disclosure and well as step-by-step instructions on privacy setting use. Novice (n=40) and experienced (n=40). FacebookTM users were randomly assigned to either the video intervention condition, or given the choice to watch the video intervention then were asked to construct a new FacebookTM account or work on their existing account. Viewing the video encouraged greater use of privacy settings as well as use of more restrictive privacy settings. Gender differences revealed greater use of privacy settings among women. Experienced users continued to disclose more than novice users, however, they increased their use of privacy settings which restricted the availability of the disclosed information. This study shows promising use of direct and explicit inst...
New Media & Society, 2020
In the recent decades, privacy scholarship has made significant progress. Most of it was achieved in monodisciplinary works. However, privacy has a deeply interdisciplinary nature. Most importantly, societies as well as individuals experience privacy as being influenced by legal, technical, and social norms and structures. In this article, we hence attempt to connect insights of different academic disciplines into a joint model, an Interdisciplinary Privacy and Communication Model. The model differentiates four different elements: communication context, protection needs, threat and risk analysis, as well as protection enforcement. On the one hand, with this model, we aim to describe how privacy unfolds. On the other hand, the model also prescribes how privacy can be furnished and regulated. As such, the model contributes to a general understanding of privacy as a theoretical guide and offers a practical basis to address new challenges of the digital age.
Researches on Multidisciplinary Approaches Multidisipliner Akademik Yaklaşım Araştırmaları, 2025
BA review of extant literature on digital privacy reveals a paucity of attention to the nexus between privacy and interpersonal communication, particularly among university students. This study explores the evolution of students’ interpersonal communication practices on Instagram, employing a phenomenological approach to examine privacy perceptions. The qualitative phenomenological method was selected to analyze individuals’ subjective experiences and actions related to privacy in digital interactions. A notable limitation of the study is its focus on privacy perceptions within Instagram, rather than a broader analysis of digital privacy across social media platforms. The selection of Instagram as a subject of study was driven by its widespread use and emphasis on visual content, which was deemed relevant during the research period. The findings indicate that participants place significant importance on protecting their privacy, and while users tend to observe others on Instagram, they are more reluctant to share personal content. The study also reveals that Instagram blurs the boundaries between public and private spaces. Although participants acknowledge privacy as an individual responsibility, they show less concern for controlling others’ posts, reflecting a one-sided perception of privacy. In conclusion, the impact of social media on privacy needs reconsideration at both the individual and societal levels. The continuous online presence on social media platforms challenges traditional privacy boundaries, leading to new dynamics in personal information sharing. This study underscores the necessity of reevaluating digital privacy in the evolving landscape of social media communication.
Information & Management, 2015
Users' privacy on social network sites is one of the most important and urgent issues in both industry and academic fields. This paper is intended to investigate the effect of users' demographics, social network site experience, personal social network size, and blogging productivity on privacy disclosure behaviors by analyzing the data collected from social network sites. Based on two privacy sensitivity levels of disclosed information, the textual information of a user's blog postings can be converted into a 4-tuple to represent their privacy disclosure patterns, containing disclosing breadth and depth, and frequencies of high and low sensitive disclosures. The collections of a user's privacy disclosure patterns in social network sites can well reflect the user's privacy disclosure behaviors. Applying the general linear modeling approach to the blogging data converted with the coding scheme, we find that males and females have significantly differentiated privacy disclosure patterns in the dimensions of disclosing breadth and depth. In addition, age has negative and significant relationships with disclosing breadth, disclosing depth, and high sensitive disclosure. We also find that none of social network site experience, personal social network size, and blog length is significantly related to users' privacy disclosure patterns, while blog number always has positive associations with privacy disclosure patterns.
Online social networking communities have undergone an explosion in recent years, as both the kinds and numbers of sites has grown and membership increased. As part of their participation in online communities, Internet users are revealing a large amount of personal information. This proliferation of personal data presents a variety of risks for individuals, such as identify theft, stalking, embarrassment, and blackmail. As participation in online communities increases, so does the necessity for flexible privacy mechanisms to protect user data. Despite these risks, many privacy mechanisms of online social communities are purposefully weak to facilitate joining the community and sharing information.
Modern Socio-Technical Perspectives on Privacy, 2022
With the popularity of social media, researchers and designers must consider a wide variety of privacy concerns while optimizing for meaningful social interactions and connection. While much of the privacy literature has focused on information disclosures, the interpersonal dynamics associated with being on social media make it important for us to look beyond informational privacy concerns to view privacy as a form of interpersonal boundary regulation. In other words, attaining the right level of privacy on social media is a process of negotiating how much, how little, or when we desire to interact with others, as well as the types of information we choose to share with them or allow them to share about us. We propose a framework for how researchers and practitioners can think about privacy as a form of interpersonal boundary regulation on social media by introducing five boundary types (i.e., relational, network, territorial, disclosure, and interactional) social media users manage...
Human-Computer Interaction, 2010

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.