首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 734 毫秒
1.
《Communication monographs》2012,79(3):344-365
This three-part study examines how privacy rules function to protect shared information from further revelation. Communication Privacy Management served as a theoretical framework to investigate issues related to boundary management. In the pilot study, college students (N = 409) described privacy rules and their use, and participants reported not further revealing the information when privacy rules were expressed by disclosers. In Study 1, participants (N = 167) reported on disclosing health-related information, and participants did not anticipate that recipients would further reveal especially when they used a privacy rule. In Study 2, dyads (dyad N = 257) reported on shared disclosure experiences, including both anticipated and actual boundary management. Study 2 findings include that privacy rules have limited effectiveness. The article discusses implications of privacy rule use when sharing private information.  相似文献   

2.
Although adoptees are often stigmatized for their nonnormative identity, adopted individuals must communicate with nonfamily members to integrate their adoptive identity into their definition of self. In the current study, adult adoptees (n = 25) were interviewed about their processes for disclosing their adoptive status in their social networks. Drawing upon communication privacy management (CPM) theory, inductive analyses demonstrated that adoptees created motivational and contextual criteria to enact privacy rules surrounding adoption. Adoptees maintained privacy to avoid messages of “difference,” insensitive comments, imperviousness, and negative opinions about adoption. Adoptees disclosed about their adoption to build relational closeness and to educate/advocate for adoption. These privacy decisions were undergirded by the societal assumption that families are biologically linked or the discourse of biological normativity (Suter et al., 2014).  相似文献   

3.
Alcohol-related posts on social-networking sites (SNS) can damage college students’ reputations and relationships and contribute to risky behavior. However, little is known about how college drinkers engage in privacy management involving alcohol content. Through 48 interviews and a Communication Privacy Management lens, this study uncovered criteria on which students relied to develop relatively impermeable boundaries around alcohol posts, the ways they collectively negotiated privacy with peers, and how participants implicitly and explicitly communicatively negotiated privacy turbulence. Findings suggest important connections between the co-occurrence of online privacy management and identity management, including how facework is involved in remediating privacy breaches and the co-opting of privacy. Findings also inform efforts to educate college drinkers about on-and-offline strategies to manage alcohol-related SNS content.  相似文献   

4.
SUMMARY

The privacy and confidentiality of library use are often at odds with efficiency in and customization of library public services. When librarians make decisions about services and privacy, they should consider strategic approaches to defining and discussing privacy and become familiar with the law of library privacy and their ethical commitment to privacy in library use. A wide range of library services and efficiencies threaten privacy and introduce the potential for secondary uses of personally identifying information collected by the library. Market failure for privacy weakens the value of consumer surveys and consent as substitutes for librarians' choices between privacy and services. Compromises such as those outlined by the ALA Intellectual Freedom Committee offer reasonable approaches to libraries and librarians struggling with the uncertainties that characterize the challenge of meeting both service and privacy interests.  相似文献   

5.
A growing number of Americans are living with chronic health conditions that require informal, ongoing care from family members who are also in the paid labor force. In this exploratory study, communication privacy management is used to make sense of chronic caregiving (N = 48–64) and noncaregiving (N = 174–178) employees’ disclosure preferences, intentions, and behaviors in the workplace. We find that workers in general anticipate that they would disclose to many individuals at work about their caregiving, but employees actually disclose much less information to far fewer people at work when they occupy the chronic caregiver role. For chronic caregivers, positive perceptions about coworker supportiveness predict increased disclosure behaviors. Finally, future research directions as employers, workers, and policy makers prepare for the complex challenges associated with negotiating paid work and unpaid chronic caregiving are provided.  相似文献   

6.
Guided by Communication Privacy Management (CPM), the goal of the current study was to examine parental infidelity and to learn what, if any, rules were enacted by participants to either provide access to or protect the information of their parent's infidelity. Rules used by participants to manage this information inside their family were labeled as internal, while rules used to manage this information outside their family were labeled as external. Participants included 13 adult children whose still married parents' relationship involved infidelity. Results indicated that participants created protection rules including two internal (maintenance and cultural) rules and one external (protecting the family from outside scrutiny) rule. Five access rules (context, sex, age, physical environment, and code terms), all internal, were also identified. The results of this study highlight the usefulness of CPM when examining how the knowledge of a parent's infidelity is managed by their children.  相似文献   

7.
Providing free HIV screening within public housing sites offers the potential for increased participation of at-risk populations. Residential-based screening, however, raises concerns about privacy because of the stigma attached to HIV/AIDS and even to the testing for HIV. This study examined the effectiveness of offering HIV screening within a public housing high-rise in upstate New York. Through interviews with both women who obtained testing and those who did not, this study explored the tension between convenience and privacy concerns. The findings suggest that offering HIV screening where people live could encourage participation in the screenings, as well as lead to a destigmatization of HIV testing over time. Some women chose to eschew the convenience of on-site testing in favor of a more private venue for screening, whereas some women responded positively to the accessibility of on-site testing, using communicative strategies to manage privacy concerns.  相似文献   

8.
隐私权是信息时代的一项基本人权.文章在简要阐释欧盟隐私管理政策与体制的基础上,分别介绍了英、法、德、意等欧盟成员国各自关于隐私权问题的法律规定,并通过对比分析从中挖掘对我国档案隐私权问题的有益启示.  相似文献   

9.
In this study, communication privacy management theory (CPM) provides a theoretical framework for investigating the development of privacy rules and strategies for females disclosing a minority sexual identity (MSI) in the workplace. Analysis of in-depth interviews indicated that participants’ rules were influenced primarily by role and relational risk evaluations. Findings nuance CPM’s conceptualization of role risk to identify 3 variations: risk to employment status, professional image, and ability to complete tasks. In addition, connections between workplace relational and role risks and how gender identities influence risk assessments and disclosure are demonstrated. Despite risk, participants disclosed personal information at work and often did so utilizing implicit disclosure strategies in everyday interactions to test confidants’ reactions and normalize their MSI in the workplace.  相似文献   

10.
Communication privacy management theory maintains permeability rules manifest as communication strategies used during conversation. Although postdivorce families tend to privilege openness, this conclusion is based on recalled reports and single discussions about negatively valenced topics. To determine whether ambiguity functions as a manifestation of permeability rules and its effects on relational satisfaction and psychological well-being, 39 parent-emerging adult child dyads discussed one negatively valenced and one positively valenced postdivorce topic. Results indicated parents were ambiguous while discussing negatively and positively valenced topics, and children were perceptive of parents' ambiguity during the conversations. No differences were found between parents' use and children's perceptions of parents' ambiguity. Further, children's relational satisfaction and psychological well-being were affected by ambiguity in both discussions.  相似文献   

11.
《Communication monographs》2012,79(4):293-299
By the year 2000, up to 40 million workers are expected to be surveilled electronically in American workplaces. Management often views surveillance as an attempt to achieve certain organizational goals better by more fully utilizing time and other resources. This article adopts the alternative perspective, that of employees/members, from which surveillance can be understood as an attempt to create new power relationships based on an electronic version of Bentham's panopticon. The study postulated four elements of such panoptic relationships and tested the first and most important of these, perception of being surveilled, in a state‐wide survey of information workers (n = 465). Results supported the hypotheses that the more surveilled workers perceive themselves to be the less a) privacy, b) certainty about their role in the work place, c) self‐esteem, and d) workplace communication they experience.  相似文献   

12.
Though seldom read or consulted, privacy statements are often the only means for users to know how their personal data will be used by collecting organizations. While the length and the legalistic nature of most privacy statements are often blamed for people's reluctance to consult such documents, studies on the factors that influence users' intention to read privacy statements are still non-existent. For this survey, respondents from the Netherlands were presented with the situation of registering a child for a basic school through their municipalities' websites. The scenario was selected since it was assumed that it would be one that would require a significant amount of personal data from registrants, and not just the usual contact information. Results of the conducted online survey reveal that although not all users consult a privacy statement on a municipal website before they would disclose personal data, the availability and the ease of finding them on a municipal website strongly contribute to users' belief that a municipality can be trusted with their personal data whenever they are shared for a particular online transaction. This study also shows that users' perceptions of the risks involved in the online disclosure of their personal data influenced their intention to read online privacy statements on municipal websites. Older users were also more likely to consult privacy statements than their younger counterparts, while those with lower levels of education and internet experience expressed a higher tendency to read such online documents than those with higher levels of education and internet experience.  相似文献   

13.
This study draws upon the revelation risk model and the disclosure decision-making model to deduce hypotheses linking perceived stigma, communication efficacy, and relational closeness to married partners’ tendencies to disclose information about their infertility experiences to members of the couple's social network. Data from 50 couples reporting on disclosures to a total of 250 social network members were analyzed using multilevel modeling. Results indicated that aspects of stigma, communication efficacy, and closeness impact infertility-related disclosures. The discussion highlights how the application of these theories sheds light on the multiple factors that influence the extent to which husbands and wives engage their social network when coping with infertility.  相似文献   

14.
网络的发展使图书馆信息服务逐渐向个性化信息服务过渡,引发了用户隐私信息的保护问题.论文阐述了用户隐私保护的必要性,从法律、技术、人员自律等方面介绍了中关个性化信息服务隐私保护的区别.最后结合我国实际情况,确定个性化信息服务隐私保护的发展方向,以便该主题的深入研究.  相似文献   

15.
Money is critical for financial and relational well-being, yet financial communication is often considered taboo, and most Americans receive little financial guidance. Not surprisingly, romantic couples experience financial uncertainty, which has been negatively correlated with satisfaction and trust. Through in-depth, semi-structured interviews of 40 individuals in married or cohabitating relationships and the lens of Uncertainty Management Theory (UMT), this investigation examines how people are (un)able to manage financial uncertainty. The study uncovers tangible ways individuals can negotiate financial uncertainty via uncertainty reduction, maintenance, and adaption, as well as information, communication, time-management, and/or sociocultural barriers that can impede uncertainty management. The investigation suggests the extension of UMT to consider the role of the dyad and offers practical implications for financial literacy and communication efforts.  相似文献   

16.
This study analyzed the discourse of a pro-anorexia website, prettythin.com. Narratives and posts were thematically analyzed using communication privacy management as a framework to understand the tension between revealing and concealing an eating disorder. Two themes were constructed during data analysis: (a) personal ownership and control, with the subtheme strategies for maintaining control and (b) communication choices surrounding disclosure and two subthemes, (i) seeking to fulfill needs face-to-face and (ii) positive fulfillment of needs online. Theoretical and practical contributions are addressed in terms of how communication theory can help understand people living with eating disorders. Specifically, how these individuals manage their personal information online and face-to-face and how prettythin.com provides support to men and women with eating disorders.  相似文献   

17.
This research employed Q methodology to examine how much privacy the public wants and what regulation it wants to impose on on-line companies. Respondents were 23 adults who sorted 40 Q-sample statements. Results revealed three factors or types: “absolute privacy advocates”, “consumer first advocates” and “objective privacy advocates”. The three types shared some viewpoints: All strongly agreed that consumers deserve notice and choice when a company uses personal information on themselves, even after they provide personal information for the company. Beyond this overlap, they had their own traits. Absolute privacy advocates believed in absolute privacy protection. They also understood power of on-line technology and were suspicious of companies selling data without considering consumer's benefits, but still did not want to regulate the private sector. Consumer first advocates were interested in consumer protection of privacy while ignoring companies' need to collect data on consumers. Objective privacy advocates wanted to restrict a company in its use of personal data while acknowledging the company's need to collect personal data. Who should be an on-line privacy regulator didn't seem to be a salient issue to the adult groups yet. Direct government intervention or legislation as a privacy protection method did not register strongly with the three groups. Ages and occupations seemed to be no type determiner. But when it comes to on-line purchasing experience, consumer first advocates and objective privacy advocates seemed to do more on-line shopping than absolute privacy advocates.  相似文献   

18.
This study explored the meanings that people attribute to talking about their cancer. Framed by interpersonal and health communication scholarship on privacy management and multiple meanings, we asked cancer survivors to describe how and why they discussed their cancer with others. Interviews (focus group or one-on-one) were conducted with 40 survivors. Using a grounded theory approach, we developed a conceptual framework that describes how communication about cancer may be particularly meaningful because it is something that people feel as though they can control during a highly stressful and turbulent time. However, attempts to manage communication are challenged by constraints imposed by others, such as unfavorable and unpredictable reactions to disclosure, which ultimately place limits on survivors’ control.  相似文献   

19.
This research employed Q methodology to examine how much privacy the public wants and what regulation it wants to impose on on-line companies. Respondents were 23 adults who sorted 40 Q-sample statements. Results revealed three factors or types: “absolute privacy advocates”, “consumer first advocates” and “objective privacy advocates”. The three types shared some viewpoints: All strongly agreed that consumers deserve notice and choice when a company uses personal information on themselves, even after they provide personal information for the company. Beyond this overlap, they had their own traits. Absolute privacy advocates believed in absolute privacy protection. They also understood power of on-line technology and were suspicious of companies selling data without considering consumer's benefits, but still did not want to regulate the private sector. Consumer first advocates were interested in consumer protection of privacy while ignoring companies' need to collect data on consumers. Objective privacy advocates wanted to restrict a company in its use of personal data while acknowledging the company's need to collect personal data. Who should be an on-line privacy regulator didn't seem to be a salient issue to the adult groups yet. Direct government intervention or legislation as a privacy protection method did not register strongly with the three groups. Ages and occupations seemed to be no type determiner. But when it comes to on-line purchasing experience, consumer first advocates and objective privacy advocates seemed to do more on-line shopping than absolute privacy advocates.  相似文献   

20.
This paper demonstrates the divergent requestor privacy policies of professional librarians and the administration of the Freedom of Information Act (FOIA), and urges the federal government to adhere to librarian ethics in order to protect FOIA requestors. Section 1 of the paper provides information about the origins and purpose of the FOIA. Section 2 offers an overview of the philosophical and historical origins of library patron privacy ethics, discussing both the ethical basis for patron privacy and actual instances where library records have been sought for government surveillance of private citizens. Section 3 describes the state library laws that protect library requestors, as well as federal laws that protect non-FOIA requestor privacy rights, including the Video Privacy Protection Act (VPPA), which protects video rental records. Section 4 of the paper warns that, in the digital era, it is more important than ever to safeguard personal information like that contained in FOIA requests to prevent the stifling of information seeking activities in the United States. By modifying laws tomeet the needs of the “information age,” the United States government can embrace and utilize the ethical standards that are at the foundation of librarianship, and protect the principle that information should be free and available to the American populace.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号