Communication Privacy Management
2,783 Followers
Recent papers in Communication Privacy Management
This paper analyzes the role of ethics, privacy and technology in Netflix's South Korean survival drama, Squid Game (2021). The show's popularity hinges on its mordant critique of capitalism, particularly the global disappearance of the... more
Internet Privacy and Myths Third Edition 2016
A sample of 103 full-time employees from various organizations and industries completed an online, open-ended survey to explore and understand the decisions people make to manage their private disclosures at work. Communication privacy... more
Given that Facebook.com is a social networking tool used by a diverse audience, this study employs Communication Privacy Management (CPM) theory as a framework to investigate how working professionals respond to co-worker Facebook friend... more
To better understand the process of disclosing medical errors to patients, this research offers a case analysis using Petronios's theoretical frame of Communication Privacy Management (CPM). Given the resistance clinicians often feel... more
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
Il 25 maggio il Regolamento (UE) 2016/679 in materia di protezione dei dati personali delle persone fisiche ha iniziato definitivamente ad avere efficacia. Questo nuovo Regolamento mira a uniformare e a rafforzare la disciplina... more
Ao analisar os comportamentos dos utilizadores através das mídias sociais, Hermida (2014) conclui que nestes ambientes observa-se claramente a natural predisposição humana para partilhar. Neste sentido, Rheingold (2012) discrimina cinco... more
Social media has become an integral part of connecting with others and sharing personal information. As more individuals use social media to express themselves, organizations have begun using these same sites to make hiring decisions in a... more
Ta'aruf aims to get blessings of Allah SWT and safeguard for their faith from commit adultery. Marriage through ta'aruf increase rampanlty in societies after celebrities find their life partner through ta'aruf and best seller novels about... more
In our fast-changing technological world, the line between the offline and online world has become blurred and individuals are faced with constant opportunities to divulge personal details. The process of disclosing sensitive information... more
To better understand ways in which globalization influences intercultural communication, this study examines ways in which foreign English teachers in Japan manage privacy with Japanese co-workers. Using Petronio’s (2002) communication... more
This study applied Communication Privacy Management (CPM) theory to the context of blogging and developed a validated, theory-based measure of blogging privacy management. Across three studies, 823 college student bloggers completed an... more
Patient information recorded in electronic medical records is the most significant set of information of the healthcare system. It assists healthcare providers to introduce high quality care for patients. The aim of this study identifies... more
Protection of personal information in online environments is vital to most individuals, including those of varying ages in the three distinct age groups of children, adolescents and emerging adults. As each group interacts online, they... more
Young adults may interact on Facebook in ways that makes them feel vulnerable about parental Facebook friend requests. This study utilizes Communication Privacy Management theory as a framework to investigate how young adult Facebook... more
Few would deny that monitoring employees is a necessary part of doing business. The very act of paying someone for services would necessitate, in a competitive environment, that the product produced or time spent working be observed.... more
An online survey conducted among participants in the US (n = 248) and Estonia (n=225) examined willingness to disclose and perceived risks pertaining to disclosing personally identifying information (PII, also referred to as personal data... more
In this paper I will offer several arguments in support of the view that individuals have moral claims to control personal information. Coupled with rights to control access to one's body, capacities, and powers, or physical privacy... more
This chapter explores social networking website (SNS) research related to communication and the management of private information. The chapter examines CPM Theory, SNS disclosure practices, and the influence of several factors of... more
The current study utilized communication privacy management (CPM) theory to examine how individuals’ blogging privacy management rules are related to their communication-based personality dispositions (self-monitoring skills and concern... more
The existence of social media has changed the landscape of human's relationship. Through social media, people are able to present many versions of themselves in many platforms. In this era of polymediation of the self, the discussion... more
The purpose of this study was to examine social media users’ blogging privacy rule orientations, privacy management regulation, and content deletion practices as distinct types of activity occurring at different stages of the blogging... more
FACEBOOK PRIVACY VIOLATION SCANDAL IN BROADER CONTEXT May -10-2018 In April, the CEO of Facebook, Mark Zuckerberg, testified in Congress about the alleged user privacy violations that occurred at Facebook. Several weeks later,Cambridge... more
An increasing number of individuals of all ages maintain important interpersonal relationships through blogs. Wide variation exists in how people disclose and manage their privacy on these blogs, particularly concerning the choices made... more
I have argued elsewhere that individuals have moral privacy rights that limit the surveillance activities of governments. While not absolute, privacy rights shield individuals from the prying eyes and ears of neighbors, corporations, and... more
This qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The twofold purpose of this study was to determine... more
Online privacy management research related to e-commerce mainly focuses on whether or not to disclose information. Online social networking on the other hand, offers a broader set of privacy management behaviors such as using... more
AMAZON ECHO IN DORM ROOMS AND PRIVACY CONCERNS Aug-28-2018 As the fall semester begins, students of Saint Louis University will soon find a new amenity, the Amazon Echo Dot, in each of their dorm rooms. Echo Dot is a voice assistant... more
As Editor-in-Chief at The Freelance Netizen™ online magazine, I edit, peer-review and supervise peer review services for all article and editorial submissions. The Freelance Netizen™ explores the interdisciplinary connections between... more
An increasing number of individuals of all ages maintain important interpersonal relationships through blogs.Wide variation exists in how people disclose and manage their privacy on these blogs, particularlyconcerning the choices made... more
Lawful access to information is a broad and complex field raising significant civil rights and privacy issues for the Canadian public. The concept refers to intercepting communications and the legal authority to engage in the search and... more
Coming out is a significant moment. This is especially true for college students attempting to integrate into a new community, diverse people and ideas, and new social challenges. This study aims to explore the processes by which college... more
Abstract Prior research shows that a root cause of many privacy concerns in location-sharing social media is people's desire to preserve offline relationship boundaries. Other literature recognizes lying as an... more
This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy,... more