To see the other types of publications on this topic, follow the link: Communication Privacy Management theory.

Journal articles on the topic 'Communication Privacy Management theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Communication Privacy Management theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Petersons, Andris, and Ilkhom Khalimzoda. "Communication privacy management of students in Latvia." Problems and Perspectives in Management 14, no. 2 (2016): 222–27. http://dx.doi.org/10.21511/ppm.14(2-1).2016.11.

Full text
Abstract:
The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronio’s theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to disclose it is often confronted with numerous privacy dilemmas and issues regarding their secureness, especially in universities where peers are young with different cultural backgrounds. This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management theory. Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among students
APA, Harvard, Vancouver, ISO, and other styles
2

Petronio, Sandra. "Brief Status Report on Communication Privacy Management Theory." Journal of Family Communication 13, no. 1 (2013): 6–14. http://dx.doi.org/10.1080/15267431.2013.743426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Petronio, Sandra. "Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?" Journal of Family Theory & Review 2, no. 3 (2010): 175–96. http://dx.doi.org/10.1111/j.1756-2589.2010.00052.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Petronio, Sandra, and Jeffrey T. Child. "Conceptualization and operationalization: utility of communication privacy management theory." Current Opinion in Psychology 31 (February 2020): 76–82. http://dx.doi.org/10.1016/j.copsyc.2019.08.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Serewicz, Mary Claire Morr. "Introducing the Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 2–5. http://dx.doi.org/10.1080/15267431.2013.743424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kennedy-Lightsey, Carrie D., Matthew M. Martin, Michelle Thompson, Kimberly Leezer Himes, and Brooke Zackery Clingerman. "Communication Privacy Management Theory: Exploring Coordination and Ownership Between Friends." Communication Quarterly 60, no. 5 (2012): 665–80. http://dx.doi.org/10.1080/01463373.2012.725004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Petronio, Sandra. "Welcome to the Journal of Family Communication Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 1. http://dx.doi.org/10.1080/15267431.2013.743418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Stephanie A., and Steven R. Brunner. "To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace." Management Communication Quarterly 31, no. 3 (2017): 429–46. http://dx.doi.org/10.1177/0893318917692896.

Full text
Abstract:
A sample of 103 full-time employees from various organizations and industries completed an online, open-ended survey to explore and understand the decisions people make to manage their private disclosures at work. Communication privacy management theory was used to understand the management of private information. Results indicate that core and catalyst criteria motivate people to reveal/conceal at work, such as boundary maintenance based on organizational culture, relational considerations, a desire for feedback, and risk/benefit considerations. People also used implicit/explicit rules, reiteration of privacy rules, and retaliation to limit and respond to turbulence. The theoretical and practical implications of these findings are discussed along with limitations and directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
9

Petronio, Sandra, Paul R. Helft, and Jeffrey T. Child. "A case of error disclosure: a communication privacy management analysis." Journal of Public Health Research 2, no. 3 (2013): 30. http://dx.doi.org/10.4081/jphr.2013.e30.

Full text
Abstract:
To better understand the process of disclosing medical errors to patients, this research offers a case analysis using Petronios’s theoretical frame of Communication Privacy Management (CPM). Given the resistance clinicians often feel about error disclosure, insights into the way choices are made by the clinicians in telling patients about the mistake has the potential to address reasons for resistance. Applying the evidenced-based CPM theory, developed over the last 35 years and dedicated to studying disclosure phenomenon, to disclosing medical mistakes potentially has the ability to reshape thinking about the error disclosure process. Using a composite case representing a surgical mistake, analysis based on CPM theory is offered to gain insights into conversational routines and disclosure management choices of revealing a medical error. The results of this analysis show that an underlying assumption of health information ownership by the patient and family can be at odds with the way the clinician tends to control disclosure about the error. In addition, the case analysis illustrates that there are embedded patterns of disclosure that emerge out of conversations the clinician has with the patient and the patient’s family members. These patterns unfold privacy management decisions on the part of the clinician that impact how the patient is told about the error and the way that patients interpret the meaning of the disclosure. These findings suggest the need for a better understanding of how patients manage their private health information in relationship to their expectations for the way they see the clinician caring for or controlling their health information about errors.
APA, Harvard, Vancouver, ISO, and other styles
10

McNealy, Jasmine, and Michaela Devyn Mullis. "Tea and turbulence: Communication privacy management theory and online celebrity gossip forums." Computers in Human Behavior 92 (March 2019): 110–18. http://dx.doi.org/10.1016/j.chb.2018.10.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gruzd, Anatoliy, Jenna Jacobson, and Elizabeth Dubois. "Cybervetting and the Public Life of Social Media Data." Social Media + Society 6, no. 2 (2020): 205630512091561. http://dx.doi.org/10.1177/2056305120915618.

Full text
Abstract:
The article examines whether and how the ever-evolving practice of using social media to screen job applicants may undermine people’s trust in the organizations that are engaging in this practice. Using a survey of 429 participants, we assess whether their comfort level with cybervetting can be explained by the factors outlined by Petronio’s communication privacy management theory: culture, gender, motivation, and risk-benefit ratio. We find that respondents from India are significantly more comfortable with social media screening than those living in the United States. We did not find any gender-based differences in individuals’ comfort with social media screening, which suggests that there may be some consistent set of norms, expectations, or “privacy rules” that apply in the context of employment seeking—irrespective of gender. As a theoretical contribution, we apply the communication privacy management theory to analyze information that is publicly available, which offers a unique extension of the theory that focuses on private information. Importantly, the research suggests that privacy boundaries are not only important when it comes to private information, but also with information that is publicly available on social media. The research identifies that just because social media data are public, does not mean people do not have context-specific and data-specific expectations of privacy.
APA, Harvard, Vancouver, ISO, and other styles
12

Sapon, Irina. "Public and Private on a Social Media Profile through the Lens of Sandra Petronio’s Theory." Ideas and Ideals 13, no. 2-1 (2021): 126–42. http://dx.doi.org/10.17212/2075-0862-2021-13.2.1-126-142.

Full text
Abstract:
A profile on a social network site (SNS) containing the user’s personal information qualifies as both a personal and public space, which raises the problem of delineating, what is private and what is public in this virtual domain. The paper attempts to identify privacy boundaries in the social media environment and the actual ownership of personal information disclosed on users’ profiles. The stated problem is considered through the lens of Communication Privacy Management theory, an influential approach to the study of privacy in the online environment proposed by Sandra Petronio. The terms and concepts of the theory are applied to analyze the peculiarities of privacy management of the user’s personal information on the pages of the social network VKontakte (i.e. in the context of ‘one-to-many’ communication). The peculiarities noted are as follows: the presence of social media administration as a co-owner of the data (i.e. the user is not granted exclusive ownership of their personal information); difficulties with discussing information ownership rules with other social media participants; the presence of such phenomena as ‘online friends’ and ‘the imagined audience’ making it difficult for the user to recognize the composition of their actual audience and set proper privacy boundaries. It is also shown that the social network provides what can only be described as rather vague collective privacy boundaries (if the term privacy is even applicable to the social media environment). All the information shared by the user on the social media profile crosses the personal privacy boundaries and is moved almost uncontrollably to the collective ownership domain. The further theoretical research of privacy management of personal information on social media profiles should aim to critically examine the concept of collective privacy in the digital space and determine the ownership rights of original owners of personal information gone public.
APA, Harvard, Vancouver, ISO, and other styles
13

Bélanger, France, and Tabitha L. James. "A Theory of Multilevel Information Privacy Management for the Digital Era." Information Systems Research 31, no. 2 (2020): 510–36. http://dx.doi.org/10.1287/isre.2019.0900.

Full text
Abstract:
In the digital era, it is increasingly important to understand how privacy decisions are made because information is frequently perceived as a commodity that is mismanaged. The preponderance of privacy literature focuses on individual-level information privacy concern and personal self-disclosure decisions. We propose that a more versatile multilevel description is required to enable exploration of complex privacy decisions that involve co-owned (i.e., group) information in increasingly sophisticated digital environments. We define the concepts of group and individual information privacy, “we-privacy” and “I-privacy” respectively, as the ability of an individual or group to construct, regulate, and apply the rules for managing their information and interaction with others. We develop the theory of multilevel information privacy (TMIP), which uses the theory of communication privacy management and the developmental theory of privacy as foundations for a social rule-based (i.e., normative) process of making privacy decisions that evolve over time with experience. The TMIP contributes to the privacy literature by drawing from prominent social psychology theories of group behavior (i.e., social identity and self-categorization theories) to explain how privacy decisions can be made by individuals or groups (i.e., social units) or social units acting as members of a particular group. We contend that technology complicates the privacy decision-making process by adding unique environmental characteristics that can influence the social identity assumed for a particular privacy decision, the estimation of the cost-benefit components of the privacy calculus, and the application and evolution of the norms that define the rules for information and interaction management. We discuss the implications of the TMIP for information systems research and provide a research agenda.
APA, Harvard, Vancouver, ISO, and other styles
14

Petronio, Sandra. "Road to Developing Communication Privacy Management Theory: Narrative in Progress, Please Stand By." Journal of Family Communication 4, no. 3-4 (2004): 193–207. http://dx.doi.org/10.1080/15267431.2004.9670131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Petronio, Sandra. "Road to Developing Communication Privacy Management Theory: Narrative in Progress, Please Stand By." Journal of Family Communication 4, no. 3 (2004): 193–207. http://dx.doi.org/10.1207/s15327698jfc0403&4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lwin, May O., Jochen Wirtz, and Andrea J. S. Stanaland. "The privacy dyad." Internet Research 26, no. 4 (2016): 919–41. http://dx.doi.org/10.1108/intr-05-2014-0134.

Full text
Abstract:
Purpose – The purpose of this paper is to investigate how the business communication-related variables of reputation, communication quality and information sensitivity are mediated by trust and privacy concern to influence the privacy dyad (i.e. promotion- and prevention-focused privacy behaviors). Design/methodology/approach – Regulatory focus theory (RFT) is used to build a framework to examine antecedents of promotion- and prevention-focused privacy behaviors as well as mediators of these relationships. Hypotheses were tested using a 2 (firm reputation: strong/weak)×3 (communication quality: high/neutral/low)×2 (data sensitivity: high/low) between-subjects factorial design. Findings – The findings support the proposed model. Specifically, high reputation and communication quality increased promotion-focused behaviors and were mediated by trust. In contrast, low communication quality and high data sensitivity increased prevention-focused behaviors and were mediated by privacy concern. Consistent with RFT, higher trust led to promotion-focused behaviors such as willingness to invest in the relationship (e.g., by providing information to the service provider and investing time and energy) and loyalty behaviors. Furthermore, higher privacy concerns led to prevention-focused behaviors such as deflective (e.g., using privacy protection measures such as disguising one’s IP address and disabling cookies) and defensive behaviors (e.g., taking action to have one’s name removed from mailing lists). Originality/value – This study contributes to the literature on customer relationship management, RFT and trust and privacy in an online context.
APA, Harvard, Vancouver, ISO, and other styles
17

McBride, M. Chad, Allison R. Thorson, and Karla Mason Bergen. "Privacy Rule Decision Criteria: An Examination of Core and Catalyst Criteria that Shape Disclosures in the Work-Spouse Relationship." Management Communication Quarterly 34, no. 4 (2020): 527–57. http://dx.doi.org/10.1177/0893318920949328.

Full text
Abstract:
Despite the prevalence of work spouses, scarce empirical research has focused on the communication occurring within these relationships, leaving managers with little understanding as to whether organizations can or should communicate support for employees forming these relationships and how privacy is navigated among work spouses. Building on McBride and Bergen’s conceptualization of the work-spouse relationship, we used Communication Privacy Management theory (CPM) to understand what, if any, privacy rule decision criteria individuals used as they negotiated disclosures within their work-spouse relationships. Analysis of interviews with 41 people in work-spouse relationships suggests that participants recognized both their own core privacy rule decision criteria and when these criteria were similar to or different from the criteria influencing their work spouse’s. Furthermore, work-spouse relationships formed despite organizational efforts to keep them at bay. Theoretically, the findings add to CPM theory, such that they establish the need to examine catalyst criteria as current and previous, as well as argue for the addition of confirming criteria to account for situations in which catalysts reinforce routinized privacy rules. Overall, the findings from this study advance the literature on communication in the work-spouse relationship and CPM theory and highlight the role that workplaces play in fostering these types of relationships.
APA, Harvard, Vancouver, ISO, and other styles
18

Puaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing." International Journal of Strategic Information Technology and Applications 10, no. 1 (2019): 1–22. http://dx.doi.org/10.4018/ijsita.2019010101.

Full text
Abstract:
Sustainability management has originally and—to this day—primarily been focused on environmental aspects. Today, enormous data storage capacities and computational power in the e-big data era have created unforeseen opportunities for big data hoarding corporations to reap hidden benefits from an individual's information sharing, which occurs bit by bit over time. This article presents a novel angle of sustainability, which is concerned with sensitive data protection given by the recently detected trade-off predicament between privacy and information sharing in the digital big data age. When individual decision makers face the privacy versus information sharing predicament in their corporate leadership, dignity and utility considerations could influence risk management and sustainability operations. Yet, to this day, there has not been a clear connection between dignity and utility of privacy and information sharing as risk management and sustainability drivers. The chapter unravels the legal foundations of dignity in privacy but also the behavioral economics of utility in communication and information sharing in order to draw a case of dignity and utility to be integrated into contemporary corporate governance, risk management and sustainability considerations of e-innovation.
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Jengchung Victor, Ha Vy Vivien Nguyen, and Quang An Ha. "Understanding Location Disclosure Behaviour via Social Networks Sites: Perspective of Communication Privacy Management Theory." International Journal of Mobile Communications 18, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijmc.2020.10030834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ngwenya, Nothando, Morag Farquhar, and Gail Ewing. "Sharing bad news of a lung cancer diagnosis: understanding through communication privacy management theory." Psycho-Oncology 25, no. 8 (2015): 913–18. http://dx.doi.org/10.1002/pon.4024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

De Wolf, Ralf. "Contextualizing how teens manage personal and interpersonal privacy on social media." New Media & Society 22, no. 6 (2019): 1058–75. http://dx.doi.org/10.1177/1461444819876570.

Full text
Abstract:
Many researchers have been studying teens’ privacy management on social media, and how they individually control information. Employing the theoretical framework of communication privacy management (CPM) theory, I argue that individual information control in itself is desirable but insufficient, giving only a limited understanding of teens’ privacy practices. Instead, I argue that research should focus on both personal and interpersonal privacy management to ultimately understand teens’ privacy practices. Using a survey study ( n = 2000), I investigated the predictors of teens’ personal and interpersonal privacy management on social media and compared different types of boundary coordination. The results demonstrate that feelings of fatalism regarding individual control in a networked social environment, which I call networked defeatism, are positively related with interpersonal privacy management. Also, interpersonal privacy management is less important when coordinating boundaries with peers than it is when coordinating sexual materials, and dealing with personal information shared by parents.
APA, Harvard, Vancouver, ISO, and other styles
22

Bute, Jennifer J., Maria Brann, and Rachael Hernandez. "Exploring societal-level privacy rules for talking about miscarriage." Journal of Social and Personal Relationships 36, no. 2 (2017): 379–99. http://dx.doi.org/10.1177/0265407517731828.

Full text
Abstract:
Communication privacy management (CPM) theory posits that culturally specific understandings of privacy guide how people manage private information in everyday conversations. We use the context of miscarriage to demonstrate how societal-level expectations about (in)appropriate topics of talk converge with micro-level decisions about privacy rules and privacy boundary management. More specifically, we explore how people’s perceptions of broad social rules about the topic of miscarriage influence their disclosure decisions. Based on interviews with 20 couples who have experienced pregnancy loss, we examined how couples described miscarriage as a topic that is bound by societal-level expectations about whether and how this subject should be discussed in interpersonal conversations. Participants reflected on their perceptions of societal-level privacy rules for protecting information about their miscarriage experiences and described how these rules affected their own privacy management decisions. We discuss these findings in terms of CPM’s theoretical tools for linking macro-level discourses to everyday talk.
APA, Harvard, Vancouver, ISO, and other styles
23

Millham, Mary Helen, and David Atkin. "Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors." New Media & Society 20, no. 1 (2016): 50–67. http://dx.doi.org/10.1177/1461444816654465.

Full text
Abstract:
Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.
APA, Harvard, Vancouver, ISO, and other styles
24

Rauscher, Emily A., and Mark A. Fine. "The Role of Privacy in Families Created Through Assisted Reproductive Technology: Examining Existing Literature Using Communication Privacy Management Theory." Journal of Family Theory & Review 4, no. 3 (2012): 220–34. http://dx.doi.org/10.1111/j.1756-2589.2012.00132.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.

Full text
Abstract:
Guided by communication privacy management theory, this study tested network size, network diversity, privacy concerns, and privacy management practices in and between Facebook and Snapchat for social media natives. A cross-sectional survey of 273 college students (predominately Caucasian, female, 18- to 20 years old) showed that audiences were larger and more diverse in Facebook than Snapchat. Snapchat users with larger friend lists and lower privacy concerns reported more shared boundary ownership, whereas those with more diverse networks reportedly used more open friending practices to expand their connections. Higher privacy concerns were related to more restrictive privacy management practices in both mediums, and participants were overall more open on Snapchat than on Facebook. Theoretical and practical implications were presented in efforts to inform future research.
APA, Harvard, Vancouver, ISO, and other styles
26

Surachmanto, Ari, Prahastiwi Utari, and Andre Novi Rahmanto. "Communication Privacy Management of Agricultural Extension Agent in Pandeglang Regency, Banten Province." International Journal of Social Science Research and Review 2, no. 4 (2019): 11–17. http://dx.doi.org/10.47814/ijssrr.v2i4.27.

Full text
Abstract:
This research departs from a phenomenon that when the farmers in Pandeglang regency, Banten Province, are still carrying out farming activities outside of the recommended planting calendar issued by the Ministry of Agriculture Republic of Indonesia. The purpose of this study is to find answers to why farmers are not concerned about the planting calendar and how communication is carried out by agricultural extension workers with these farmers.
 This study uses the theory of Communication Privacy Management (CPM). The approach used is descriptive qualitative. Data is collected by means of observation and in-depth interviews which are then presented descriptively. The results showed that farmers in Pandeglang district tended to use the traditional planting season, which was planting time from April to September. Farmers are not likely to get comprehensive information from extension officers because of technical issues such as limited seed varieties, fertilizers and medicines as idealized from the planting calendar. It was suggested that the Ministry of Agriculture should balance the idealism of farming as stated in the frog with the amount of agricultural logistics needed.
APA, Harvard, Vancouver, ISO, and other styles
27

Norvitasari, Y., Antoni, and R. Kriyantono. "WIFE’S STRATEGY IN MAINTAINING THE STABILITY OF RELATIONSHIP WITH HUSBAND THROUGH COMMUNICATION PRIVACY MANAGEMENT THEORY." Russian Journal of Agricultural and Socio-Economic Sciences 71, no. 11 (2017): 307–11. http://dx.doi.org/10.18551/rjoas.2017-11.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Jengchung Victor, Ha Vy Vivien Nguyen, and Quang An Ha. "Understanding location disclosure behaviour via social networks sites: a perspective of communication privacy management theory." International Journal of Mobile Communications 18, no. 6 (2020): 690. http://dx.doi.org/10.1504/ijmc.2020.110889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Le, Zao Sun, Xiaoyong Dai, Yixin Zhang, and Hai-hua Hu. "Retaining users after privacy invasions." Information Technology & People 32, no. 6 (2019): 1679–703. http://dx.doi.org/10.1108/itp-01-2018-0020.

Full text
Abstract:
Purpose The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions. Design/methodology/approach Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users. Findings Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances. Research limitations/implications Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated. Originality/value This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.
APA, Harvard, Vancouver, ISO, and other styles
30

Dianiya, Vicky. "Management Privacy dalam Penggunaan Fitur “Close Friend” di Instagram." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 5, no. 1 (2021): 249. http://dx.doi.org/10.25139/jsk.v5i1.2652.

Full text
Abstract:
Social media is basically to share information and self-disclosures by the account owner. However, there is an attitude of caution in expressing which must also be considered and needs to be considered. Technological developments make more and more new features appear on various social media platforms, one of them is the close friend feature on Instagram that can be used to limit users in sharing information that is considered more privacy. This study uses the Communication Privacy Management theory as a framework for investigating how Instagram users, especially young adults, use and respond to the use of the close friend feature. Overall, the results of interviews with five informants found evidence of five basic assumptions in using CPM implied on social media and showed that there is confidence in the disclosure of privacy when using the close friend feature.
APA, Harvard, Vancouver, ISO, and other styles
31

Chang, Shuchih Ernest, Anne Yenching Liu, and Sungmin Lin. "Exploring privacy and trust for employee monitoring." Industrial Management & Data Systems 115, no. 1 (2015): 88–106. http://dx.doi.org/10.1108/imds-07-2014-0197.

Full text
Abstract:
Purpose – The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring. Design/methodology/approach – The research used the metaphor of boundary turbulence in the Communication Privacy Management (CPM) theory to demonstrate the psychological effect on employees. The model comprised organizational culture, CPM, trust, and employee performance in employee monitoring to further investigated the influence exerted by organizational culture and how employees viewed their trust within the organization when implementing employee monitoring. Variables were measured empirically by administrating questionnaires to full-time employees in organizations that currently practice employee monitoring. Findings – The findings showed that a control-oriented organizational culture raised communication privacy turbulence in CPM. The communication privacy turbulence in CPM mostly had negative effects on trust in employee monitoring policy, but not on trust in employee monitoring members. Both trust in employee monitoring policy and trust in employee monitoring members had positive effects on employee commitment and compliance to employee monitoring. Research limitations/implications – This research applied the CPM theory in workplace privacy to explore the relationship between employees’ privacy and trust. The results provide insights of why employees feel psychological resistance when they are forced to accept the practice of employee monitoring. In addition, this study explored the relationship between CPM and trust, and offer support and verification to prior studies. Practical implications – For practitioners, the findings help organizations to improve the performance of their employees and to design a more effective environment for employee monitoring. Originality/value – A research model was proposed to study the impacts of CPM on employee monitoring, after a broad survey on related researches. The validated model and its corresponding study results can be referenced by organization managers and decision makers to make favorable tactics for achieving their goals of implementing employee monitoring.
APA, Harvard, Vancouver, ISO, and other styles
32

Grebelsky-Lichtman, Tsfira, Ziv Adato, and Shira Traeger. "Extending Impression Management Theory: The Need for Privacy vs. the Need to Express Information on Instant Messaging Apps." Studies in Media and Communication 8, no. 1 (2020): 72. http://dx.doi.org/10.11114/smc.v8i1.4853.

Full text
Abstract:
Impression management (IM) is a central assertion in interpersonal communication. There is increasing interest in exploring IM in new media. However, studies exploring IM in popular instant-messaging apps are lacking. Our main aims in the present study are to fill this gap and extend IM theory toward an innovative theoretical and analytical framework of computer-mediated communication (CMC). This study analyzed the popular instant-messaging app WhatsApp, the largest app for social chatting that has users all over the world.We utilized a multi-variant design of quantitative and qualitative analysis, and conducted content analysis of WhatsApp profiles (n=546); an online survey of WhatsApp users (n=600); and in-depth interpersonal interviews (n=30). The findings demonstrate the structure, motivations, and communication functions of CMC IM. The proposed framework provides composite theoretical explanations, of psychological and sociological perspectives, for the IM’s conflicting motivations: the need for privacy and the need to express information. Moreover, this study delineates the effect of gender and marital status on IM through instant-messaging app. The theoretical and analytical framework develops an impression construct that both reduces and increases information, which activates synchronous and asynchronous features of instant-messaging apps, which affects interpersonal communication.
APA, Harvard, Vancouver, ISO, and other styles
33

Lee, Yu-Hao, and Chien Wen Yuan. "The Privacy Calculus of “Friending” Across Multiple Social Media Platforms." Social Media + Society 6, no. 2 (2020): 205630512092847. http://dx.doi.org/10.1177/2056305120928478.

Full text
Abstract:
Relationship building through social network sites (SNSs) requires privacy disclosure that involves a calculus of potential benefits against privacy risks. Tie formation (e.g., friending, following, or connecting) on SNSs is one of the most significant forms of privacy disclosure that not only communicate one’s willingness to disclose but can also reveal past activity history and invite future interactions. Based on the communication privacy management theory, the current study examines how users consider the privacy calculus and tie-formation affordances of the SNSs to manage ties across multiple SNSs. Using an online survey of 630 Facebook and/or Instagram users, the study revealed that individuals with higher privacy concerns strategically manage their privacy by connecting with different relationship ties through different SNSs as a way to construct sociotechnical boundaries between networks. The findings have implications for understanding privacy management online and provide a potential explanation for the privacy paradox.
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Kai, Xiaowen Wang, Kunrong Li, and Jianguo Che. "Information privacy disclosure on social network sites." Nankai Business Review International 7, no. 3 (2016): 282–300. http://dx.doi.org/10.1108/nbri-02-2015-0005.

Full text
Abstract:
Purpose As social network sites (SNS) have increasingly become one of the most important channels for communication, the related privacy issues gain more and more attention in both industry and academic research fields. This study aims to connect the antecedents of information privacy disclosure on SNS. Design/methodology/approach Based on exchange theory, this study tries to investigate the decision-making process for information privacy disclosure on SNS. Factors from both user’s and website’s perspectives are taken into account in the proposed model. Findings The results suggest that an individual’s perceived benefits will increase their willingness to disclose information privacy on SNS, but perceived risks decrease this kind of willingness. The authors also find social network size, personal innovativeness and incentive provision positively affect people’s perceived benefits. Originality/value Moreover, privacy invasion experience enhances perceived personal risks, but website reputation helps to reduce perceived risks.
APA, Harvard, Vancouver, ISO, and other styles
35

Xiao, Zhiwen, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen, and Zhengzhu Tang. "Using communication privacy management theory to examine HIV disclosure to sexual partners/spouses among PLHIV in Guangxi." AIDS Care 27, sup1 (2015): 73–82. http://dx.doi.org/10.1080/09540121.2015.1055229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Frampton, Bethany D., and Jeffrey T. Child. "Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory." Computers in Human Behavior 29, no. 6 (2013): 2257–64. http://dx.doi.org/10.1016/j.chb.2013.05.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kam, Jennifer A., Keli Steuber Fazio, and Roselia Mendez Murillo. "Privacy rules for revealing one’s undocumented status to nonfamily members: Exploring the perspectives of undocumented youth of Mexican origin." Journal of Social and Personal Relationships 36, no. 10 (2018): 3178–98. http://dx.doi.org/10.1177/0265407518815980.

Full text
Abstract:
Based on the theory of communication privacy management, we explored: (a) undocumented immigrant youth’s privacy rules for managing their undocumented status disclosures to nonfamily members, and (b) responses to disclosures by recipients and undocumented youth. Semi-structured interviews were conducted with 30 undocumented youth (10th–12th grades) who immigrated to the U.S. from Mexico. Youth managed their undocumented status with nonfamily members using criteria related to support activation, protection, acceptance, and a sense of empowerment. When disclosed, most recipients responded by providing emotional support and advice. Youth felt positively toward recipient reactions that were nonjudgmental. Lastly, most participating youth felt better after revealing their undocumented status because the youth learned that the recipient was in a similar situation or because the youth experienced catharsis. Our results show the extent to which preexisting privacy management research applies to an understudied, marginalized group and provides new insights on privacy management.
APA, Harvard, Vancouver, ISO, and other styles
38

Liyanaarachchi, Gajendra. "Online privacy as an integral component of strategy: allaying customer fears and building loyalty." Journal of Business Strategy 41, no. 5 (2020): 47–56. http://dx.doi.org/10.1108/jbs-09-2019-0183.

Full text
Abstract:
Purpose This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation. Design/methodology/approach The relationship between privacy paradox and corporate strategy was examined through a qualitative research study. The author conducted 30 in-depth interviews on grounded theory methodology investigating customer insights on the nature and extent of privacy protection associated with e-commerce and organizational approach. Findings The customers are dissatisfied with existing data security strategies adopted by firms in protecting privacy. The over-reliance on systems has negatively influenced the communication between the organization and customers, leading to a possible competitive disadvantage. The firms need to redesign privacy strategy shifting from a system-driven approach to providing personalized service. Originality/value This paper presents a novel framework the privacy strategy matrix (PSM), introducing privacy as a strategic expedient in transforming corporate strategy facilitating privacy protection as a metaphor for differentiation. PSM framework provides a standard to evaluate the effectiveness of the corporate strategy in managing privacy manifesting a path toward deriving a sustainable competitive advantage.
APA, Harvard, Vancouver, ISO, and other styles
39

Sagita, Virginia Ayu, Khuswatun Hasanah, Medi Trilaksono Dwi Abadi, and Gabriella Hot Marsondang Simamora. "Komunikasi Penderita Gangguan Kesehatan Mental Pada Generasi Milenial." Indonesian Journal of Communication Studies 13, no. 2 (2021): 76. http://dx.doi.org/10.31315/ijcs.v13i2.4138.

Full text
Abstract:
Mental health is currently a health that must be considered in addition to physical health. According to Riset Kesehatan Dasar (2018), it shows that depression is the highest mental illness and there are 450,000 people who are people with severe mental disorders (ODGJ) who have an age range of 15-29 years. This study aims to see the communication made by survivor of mental health disorders in creating millennials to their closest people. The theory used in this research is Communication Privacy Management Theory (CPM) and Contructivism Theory. CPM theory explains how a person with a health disorder communicates mental illness by considering their personal information. Meanwhile, constructivism theory supports the CPM theory to explain how sufferers of mental health disorders choose the right diction so as not to cause wrong perceptions. Constructivism theory explains how a person constructs the message to be delivered. The method used in this study is a qualitative method with purposive sampling, which is to determine the information required by the researcher. The results of this study are each information that has rules for conveying privacy information to the closest person. The informants' trust with other people still have their privacy boundaries made based on gender, culture and context. In addition, informants used proper diction to convey their mental illness to the closest people.
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Hao, Shenglan Ma, Hong-Ning Dai, Muhammad Imran, and Tongsen Wang. "Blockchain-based data privacy management with Nudge theory in open banking." Future Generation Computer Systems 110 (September 2020): 812–23. http://dx.doi.org/10.1016/j.future.2019.09.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Elkins, Donna M. "How working women navigate communication privacy management boundaries when seeking social support during cancer treatment." Communication and Medicine 15, no. 3 (2020): 261–67. http://dx.doi.org/10.1558/cam.34969.

Full text
Abstract:
Working women diagnosed with cancer face difficult decisions about disclosing personal information. A 2017 survey for Cancer and Careers, a non-profit organization assisting cancer patients and survivors with finding and continuing employment, found that women are more likely than men to share their diagnosis with work colleagues, and do so more often to feel supported by co-workers. However, disclosure guidelines for communication about having cancer are difficult to establish, as they may vary widely depending on the individual and the situation. Most research about health self-disclosure has focused on the initial decision to divulge that one has an illness and on the depth of that initial disclosure. The current study was designed to further describe how working women navigate disclosures not only during the initial diagnosis, but throughout treatment and into recovery to gain needed social support. Using the typology of social support and the tenets of Communication Privacy Management Theory, the goal of this study is to share individual narratives of how working women change privacy rules to procure the type of social support needed in each stage of their experience.
APA, Harvard, Vancouver, ISO, and other styles
42

Lewis, Cara C., Deborah H. Matheson, and C. A. Elizabeth Brimacombe. "Factors Influencing Patient Disclosure to Physicians in Birth Control Clinics: An Application of the Communication Privacy Management Theory." Health Communication 26, no. 6 (2011): 502–11. http://dx.doi.org/10.1080/10410236.2011.556081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sukk, Marit, and Andra Siibak. "Caring dataveillance and the construction of “good parenting”: Estonian parents’ and pre-teens’ reflections on the use of tracking technologies." Communications 46, no. 3 (2021): 446–67. http://dx.doi.org/10.1515/commun-2021-0045.

Full text
Abstract:
Abstract Digital parenting tools, such as child-tracking technologies, play an ever-increasing role in contemporary child rearing. To explore opinions and experiences related to the use of such tracking devices, we conducted Q methodology and a semi-structured individual interview-study with Estonian parents (n=20) and their 8- to 13-year-old pre-teens (n=20). Our aim was to study how such caring dataveillance was rationalized within the families, and to explore the dominant parenting values associated with the practice. Relying upon communication privacy management theory, the issues of privacy related to such intimate surveillance were also studied. Three factors relating to the use of tracking technologies were extracted from both parents (Tech-Trusting Parent, Cautious Parent and Careful Authoritarian Parent) and pre-teens (Compliant Child, Autonomous Child, and Privacy-Sensitive Child). Tracking technologies were viewed as parental aids that made it possible to ease anxieties and provide assurance to parents and children alike. Although children did not associate the use of tracking technologies with intrusion on privacy, they expected to have a chance to coordinate their privacy boundaries.
APA, Harvard, Vancouver, ISO, and other styles
44

Santoso, Bobby Rachman. "MANAJEMEN PRIVASI KOMUNIKASI MAJLIS SEMA’AN AL-QUR’ĀN JANTIKO MANTAB DAN DZIKRUL GHŌFĪLĪN." Islamic Communication Journal 4, no. 1 (2019): 1. http://dx.doi.org/10.21580/icj.2019.4.1.3561.

Full text
Abstract:
This research purpose to describe the communication of the Majlis Sema'an Al-Qur'ān Jantiko Mantab and Dzikrul Ghōfīlīn in their position as a group that has influential religious activities and is in the public interest.By using communication privacy management theory, the author tries to explain the dialectical process carried out by MSQ Jantiko Mantab and Dzikrul Ghōfīlīn in developing their activities.The result, that MSQ Jantiko Mantab and Dzikrul Ghōfīlīn conducted the opening of private information with direct and indirect communication.They congregation conducted the opening of private information aimed at clarifying misunderstandings regarding the activities of the MSQ of Jantiko Mantab and Dzikrul Ghōfīlīn. Information disclosure also purpose to develop the MSQ Jantiko Mantab and Dzikrul Ghōfīlīn in various regions. It was proven that initially only a few people attended, now thousands of people followed, and their activities were carried out in various regions, especially East Java.
APA, Harvard, Vancouver, ISO, and other styles
45

Diamantopoulou, Vasiliki, and Haralambos Mouratidis. "Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology." Information & Computer Security 26, no. 4 (2018): 382–400. http://dx.doi.org/10.1108/ics-12-2017-0087.

Full text
Abstract:
Purpose The purpose of this study is the analysis of a security and privacy requirements engineering methodology. Such methodologies are considered an important part of systems’ development process when they contain and process a large amount of critical information, and thus need to remain secure and ensure privacy. Design/methodology/approach These methodologies provide techniques, methods and norms for tackling security and privacy issues in information systems. In this process, the utilisation of effective, clear and understandable modelling languages with sufficient notation is of utmost importance, as the produced models are used not only among IT experts or among security specialists but also for communication among various stakeholders, in business environments or among novices in an academic environment. Findings The qualitative analysis revealed a partial satisfaction of these principles. Originality/value This paper evaluates the effectiveness of a security and privacy requirements engineering methodology, namely, Secure Tropos, on the nine principles of the theory of notation.
APA, Harvard, Vancouver, ISO, and other styles
46

Ozturk, Ahmet Bulent, Anil Bilgihan, Saba Salehi-Esfahani, and Nan Hua. "Understanding the mobile payment technology acceptance based on valence theory." International Journal of Contemporary Hospitality Management 29, no. 8 (2017): 2027–49. http://dx.doi.org/10.1108/ijchm-04-2016-0192.

Full text
Abstract:
Purpose This study aims to examine factors affecting restaurant customers’ intention to use near field communication (NFC)-based mobile payment (MP) technology. More specifically, based on the valence theory, this paper examined the impacts of users’ negative valence (perceived risk and privacy concern) and positive valence (utilitarian value and convenience) perceptions toward their NFC-MP technology acceptance. Furthermore, the impacts of individual difference variables (smartphone affinity and compatibility) on users’ negative and positive valences and on their behavioral intentions were analyzed. Design/methodology/approach A self-administered online questionnaire was used to collect the data of the study from 412 restaurant customers. A confirmatory factor analysis (CFA) was used to validate the measurement model. To test the hypothesized model, structural equation modeling (SEM) was used. Findings The study findings demonstrated that privacy concern, utilitarian value and convenience significantly affected individuals’ NFC-MP technology acceptance. In addition, compatibility significantly influenced negative and positive valance constructs and smartphone affinity had a positive impact on positive valance constructs only. Practical implications This study provides valuable practical implications for restaurant operators and hospitality technology vendors in the context of mobile payment systems. Originality/value This study successfully extended the valence framework by adding individual difference constructs to it.
APA, Harvard, Vancouver, ISO, and other styles
47

Charoensap-Kelly, Piyawan, Colleen L. Mestayer, and G. Brandon Knight. "To Come Out or Not to Come Out: Minority Religious Identity Self-Disclosure in the United States Workplace." Management Communication Quarterly 34, no. 2 (2019): 213–50. http://dx.doi.org/10.1177/0893318919890072.

Full text
Abstract:
Situated in communication privacy management (CPM) theory, this study found that anticipated risk was the strongest predictor of minority religious identity disclosure at work. Older workers who regarded non-Christian belief or non-belief as central to who they were and who worked in smaller organizations disclosed their identity more than other participants. The follow-up analyses also revealed that the degree of disclosure varied by ethnicity, geographic region, religion, job rank, and membership in the organization’s dominant religion. Religious accommodation policy and religious centrality were associated with increased anticipation of benefits, which in turn was linked to increased disclosure. Finally, sense of belonging was associated with increased anticipation of benefits and decreased anticipation of risks, which also indirectly impacted disclosure. This study added more depth to CPM privacy rules and provided a broader understanding of minority religious identity disclosure at work. Recommendations for creating a religiously inclusive workplace and directions for future studies are provided.
APA, Harvard, Vancouver, ISO, and other styles
48

Wilbur, Douglas S. "Have you shot anyone? How combat veterans manage privacy with family and friends." Psychology of Language and Communication 22, no. 1 (2018): 71–89. http://dx.doi.org/10.2478/plc-2018-0004.

Full text
Abstract:
Abstract This qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles of communication privacy management theory (CPM). Secondly, to provide new knowledge that can shape counseling strategies and transition programs to account for how veterans manage their privacy. Some of the significant findings are that veterans believe that merely participating in combat implicitly creates a collective boundary that all veterans must maintain to protect the group. Secondly, the veterans did not use boundary coordination or privacy rule development. Instead, they relied upon internal rules that helped them craft a disclosure that minimized risk. Veterans reported having dense privacy boundaries by default, even towards members of their own family. These dense boundaries present significant obstacles to therapists working with veterans and their families.
APA, Harvard, Vancouver, ISO, and other styles
49

Prescott, Edward Simpson. "Communication in Private-Information Models: Theory and Computation." Geneva Papers on Risk and Insurance Theory 28, no. 2 (2003): 105–30. http://dx.doi.org/10.1023/a:1026388604459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ievansyah, Ievansyah, and Teguh Priyo Sadono. "PERSONAL BRANDING DALAM KOMUNIKASI SELEBRITIS (STUDI KASUS PERSONAL BRANDING ALUMNI ABANG NONE JAKARTA DI MEDIA SOSIAL “INSTAGRAM”)." Bricolage : Jurnal Magister Ilmu Komunikasi 4, no. 02 (2018): 149. http://dx.doi.org/10.30813/bricolage.v4i02.1658.

Full text
Abstract:
<p>ABSTRACT<br />Abang None is a designation for Jakarta Tourism Ambassador. Researchers saw a phenomenon of self-transformation from a tourism ambassador to a celebrity. This phenomenon refers to case studies experienced by Maudy Koesnaedi, Bangpen, and Shabina Gianti. Researchers want to know the personal branding management process they want to form, and convey it to the public through Instagram social media. This study uses qualitative methods, with descriptive case studies, which depart from the Post Positivism paradigm. The concept used is personal branding, and is sharpened by the theory of Communication Private Management (CPM Theory). Data collection techniques are observation, interviews, and documentation analysis. The concept of personal branding proposed by Peter Montoya, refers to eight laws, namely the law of specialization, the law of leadership, the law of personality, the law of distinctiveness. , the law of appearance (the law of visibility), the law of unity, the law of persistence, and the law of good intentions. From these eight laws, the researcher saw that the three sources had different features, were consistent in managing personal branding, and were able to demonstrate good ethics in using social media. The theory of Communication Private Management (CPM Theory), proposed by Sandra Petronio, has five basic assumptions to see how they manage personal information in the public domain. The five assumptions are private information, private boundaries, control and ownership, rule-based management systems, and management dialectics. The three informants in general have known the limitations of their privacy with the public, so they understand the information that is allowed and not to be shared with the public. They have good management, between them and netizens. Researchers hope that further research can further develop the concept of personal branding, and CPM theory. Hopefully this research can be a reference, to be better developed from all aspects.<br /><strong>Keywords:</strong> Personal Branding, Abang None, Celebrity, Instagram</p><p><br />ABSTRAK<br />Abang None merupakan sebutan untuk Duta Pariwisata DKI Jakarta. Peneliti melihat adanya fenomena transformasi diri dari duta pariwisata menjadi seorang selebritis. Fenomena ini mengacu pada studi kasus yang dialami oleh Maudy Koesnaedi, Bangpen, dan Shabina Gianti. Peneliti ingin mengetahui proses pengelolaan personal branding yang ingin mereka bentuk, dan sampaikan ke publik lewat media sosial Instagram. Penelitian ini menggunakan metode kualitatif, dengan studi kasus deskriptif, yang berangkat dari paradigma Post Positivisme. Konsep yang digunakan adalah personal branding, dan dipertajam dengan teori Communication Private Management (CPM Theory). Teknik pengumpulan datanya ialah observasi, wawancara, dan analisis dokumentasi. Konsep personal branding yang dikemukakan oleh Peter Montoya, mengacu pada delapan hukum, yaitu hukum spesialisasi (the law of specialization), hukum kepemimpinan (the law of leadership), hukum kepribadian (the law of personality), hukum perbedaan (the law of distinctiveness), hukum kenampakan (the law of visibility), hukum kesatuan (the law of unity), hukum keteguhan (the law of persistence), dan hukum maksud baik (the law of good will). Dari kedelapan hukum ini, peneliti melihat bahwa ketiga narsumber memiliki keistimewaan yang berbeda-beda, konsisten dalam mengelola personal branding, dan mampu menunjukkan etika yang baik dalam sosial. Teori Communication Private Management (CPM Theory), yang dikemukakan oleh Sandra Petronio, memiliki lima asumsi dasar untuk melihat bagaimana mereka mengelola informasi yang bersifat pribadi di wilayah publik. Lima asumsi itu ialah informasi privat, batasan privat, kontrol dan kepemilikan, sistem manajemen berdasarkan aturan, dan dialektika manajemen. Ketiga narasumber secara garis besar sudah mengetahui batasan privasi mereka dengan publik, sehingga mereka memahami informasi yang boleh dan tidak untuk dibagikan kepada publik. Mereka memiliki manajemen yang baik, antara mereka dan netizen. Peneliti berharap semoga penelitian selanjutnya bisa lebih mengembangkan konsep personal branding, dan teori CPM. Semoga penelitian ini bisa menjadi rujukan, untuk dikembangkan lebih baik lagi dari segala aspek.</p><p><strong>Kata Kunci:</strong> Personal Branding, Abang None, Selebritis, Instagram</p>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography