To see the other types of publications on this topic, follow the link: Communication Privacy Management theory.

Journal articles on the topic 'Communication Privacy Management theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Communication Privacy Management theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Petersons, Andris, and Ilkhom Khalimzoda. "Communication privacy management of students in Latvia." Problems and Perspectives in Management 14, no. 2 (2016): 222–27. http://dx.doi.org/10.21511/ppm.14(2-1).2016.11.

Full text
Abstract:
The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronio’s theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to di
APA, Harvard, Vancouver, ISO, and other styles
2

Petronio, Sandra. "Brief Status Report on Communication Privacy Management Theory." Journal of Family Communication 13, no. 1 (2013): 6–14. http://dx.doi.org/10.1080/15267431.2013.743426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Petronio, Sandra. "Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?" Journal of Family Theory & Review 2, no. 3 (2010): 175–96. http://dx.doi.org/10.1111/j.1756-2589.2010.00052.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Petronio, Sandra, and Jeffrey T. Child. "Conceptualization and operationalization: utility of communication privacy management theory." Current Opinion in Psychology 31 (February 2020): 76–82. http://dx.doi.org/10.1016/j.copsyc.2019.08.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Serewicz, Mary Claire Morr. "Introducing the Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 2–5. http://dx.doi.org/10.1080/15267431.2013.743424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kennedy-Lightsey, Carrie D., Matthew M. Martin, Michelle Thompson, Kimberly Leezer Himes, and Brooke Zackery Clingerman. "Communication Privacy Management Theory: Exploring Coordination and Ownership Between Friends." Communication Quarterly 60, no. 5 (2012): 665–80. http://dx.doi.org/10.1080/01463373.2012.725004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Petronio, Sandra. "Welcome to the Journal of Family Communication Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 1. http://dx.doi.org/10.1080/15267431.2013.743418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Stephanie A., and Steven R. Brunner. "To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace." Management Communication Quarterly 31, no. 3 (2017): 429–46. http://dx.doi.org/10.1177/0893318917692896.

Full text
Abstract:
A sample of 103 full-time employees from various organizations and industries completed an online, open-ended survey to explore and understand the decisions people make to manage their private disclosures at work. Communication privacy management theory was used to understand the management of private information. Results indicate that core and catalyst criteria motivate people to reveal/conceal at work, such as boundary maintenance based on organizational culture, relational considerations, a desire for feedback, and risk/benefit considerations. People also used implicit/explicit rules, reite
APA, Harvard, Vancouver, ISO, and other styles
9

Petronio, Sandra, Paul R. Helft, and Jeffrey T. Child. "A case of error disclosure: a communication privacy management analysis." Journal of Public Health Research 2, no. 3 (2013): 30. http://dx.doi.org/10.4081/jphr.2013.e30.

Full text
Abstract:
To better understand the process of disclosing medical errors to patients, this research offers a case analysis using Petronios’s theoretical frame of Communication Privacy Management (CPM). Given the resistance clinicians often feel about error disclosure, insights into the way choices are made by the clinicians in telling patients about the mistake has the potential to address reasons for resistance. Applying the evidenced-based CPM theory, developed over the last 35 years and dedicated to studying disclosure phenomenon, to disclosing medical mistakes potentially has the ability to reshape t
APA, Harvard, Vancouver, ISO, and other styles
10

McNealy, Jasmine, and Michaela Devyn Mullis. "Tea and turbulence: Communication privacy management theory and online celebrity gossip forums." Computers in Human Behavior 92 (March 2019): 110–18. http://dx.doi.org/10.1016/j.chb.2018.10.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gruzd, Anatoliy, Jenna Jacobson, and Elizabeth Dubois. "Cybervetting and the Public Life of Social Media Data." Social Media + Society 6, no. 2 (2020): 205630512091561. http://dx.doi.org/10.1177/2056305120915618.

Full text
Abstract:
The article examines whether and how the ever-evolving practice of using social media to screen job applicants may undermine people’s trust in the organizations that are engaging in this practice. Using a survey of 429 participants, we assess whether their comfort level with cybervetting can be explained by the factors outlined by Petronio’s communication privacy management theory: culture, gender, motivation, and risk-benefit ratio. We find that respondents from India are significantly more comfortable with social media screening than those living in the United States. We did not find any gen
APA, Harvard, Vancouver, ISO, and other styles
12

Sapon, Irina. "Public and Private on a Social Media Profile through the Lens of Sandra Petronio’s Theory." Ideas and Ideals 13, no. 2-1 (2021): 126–42. http://dx.doi.org/10.17212/2075-0862-2021-13.2.1-126-142.

Full text
Abstract:
A profile on a social network site (SNS) containing the user’s personal information qualifies as both a personal and public space, which raises the problem of delineating, what is private and what is public in this virtual domain. The paper attempts to identify privacy boundaries in the social media environment and the actual ownership of personal information disclosed on users’ profiles. The stated problem is considered through the lens of Communication Privacy Management theory, an influential approach to the study of privacy in the online environment proposed by Sandra Petronio. The terms a
APA, Harvard, Vancouver, ISO, and other styles
13

Bélanger, France, and Tabitha L. James. "A Theory of Multilevel Information Privacy Management for the Digital Era." Information Systems Research 31, no. 2 (2020): 510–36. http://dx.doi.org/10.1287/isre.2019.0900.

Full text
Abstract:
In the digital era, it is increasingly important to understand how privacy decisions are made because information is frequently perceived as a commodity that is mismanaged. The preponderance of privacy literature focuses on individual-level information privacy concern and personal self-disclosure decisions. We propose that a more versatile multilevel description is required to enable exploration of complex privacy decisions that involve co-owned (i.e., group) information in increasingly sophisticated digital environments. We define the concepts of group and individual information privacy, “we-
APA, Harvard, Vancouver, ISO, and other styles
14

Petronio, Sandra. "Road to Developing Communication Privacy Management Theory: Narrative in Progress, Please Stand By." Journal of Family Communication 4, no. 3-4 (2004): 193–207. http://dx.doi.org/10.1080/15267431.2004.9670131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Petronio, Sandra. "Road to Developing Communication Privacy Management Theory: Narrative in Progress, Please Stand By." Journal of Family Communication 4, no. 3 (2004): 193–207. http://dx.doi.org/10.1207/s15327698jfc0403&4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lwin, May O., Jochen Wirtz, and Andrea J. S. Stanaland. "The privacy dyad." Internet Research 26, no. 4 (2016): 919–41. http://dx.doi.org/10.1108/intr-05-2014-0134.

Full text
Abstract:
Purpose – The purpose of this paper is to investigate how the business communication-related variables of reputation, communication quality and information sensitivity are mediated by trust and privacy concern to influence the privacy dyad (i.e. promotion- and prevention-focused privacy behaviors). Design/methodology/approach – Regulatory focus theory (RFT) is used to build a framework to examine antecedents of promotion- and prevention-focused privacy behaviors as well as mediators of these relationships. Hypotheses were tested using a 2 (firm reputation: strong/weak)×3 (communication quality
APA, Harvard, Vancouver, ISO, and other styles
17

McBride, M. Chad, Allison R. Thorson, and Karla Mason Bergen. "Privacy Rule Decision Criteria: An Examination of Core and Catalyst Criteria that Shape Disclosures in the Work-Spouse Relationship." Management Communication Quarterly 34, no. 4 (2020): 527–57. http://dx.doi.org/10.1177/0893318920949328.

Full text
Abstract:
Despite the prevalence of work spouses, scarce empirical research has focused on the communication occurring within these relationships, leaving managers with little understanding as to whether organizations can or should communicate support for employees forming these relationships and how privacy is navigated among work spouses. Building on McBride and Bergen’s conceptualization of the work-spouse relationship, we used Communication Privacy Management theory (CPM) to understand what, if any, privacy rule decision criteria individuals used as they negotiated disclosures within their work-spou
APA, Harvard, Vancouver, ISO, and other styles
18

Puaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing." International Journal of Strategic Information Technology and Applications 10, no. 1 (2019): 1–22. http://dx.doi.org/10.4018/ijsita.2019010101.

Full text
Abstract:
Sustainability management has originally and—to this day—primarily been focused on environmental aspects. Today, enormous data storage capacities and computational power in the e-big data era have created unforeseen opportunities for big data hoarding corporations to reap hidden benefits from an individual's information sharing, which occurs bit by bit over time. This article presents a novel angle of sustainability, which is concerned with sensitive data protection given by the recently detected trade-off predicament between privacy and information sharing in the digital big data age. When in
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Jengchung Victor, Ha Vy Vivien Nguyen, and Quang An Ha. "Understanding Location Disclosure Behaviour via Social Networks Sites: Perspective of Communication Privacy Management Theory." International Journal of Mobile Communications 18, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijmc.2020.10030834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ngwenya, Nothando, Morag Farquhar, and Gail Ewing. "Sharing bad news of a lung cancer diagnosis: understanding through communication privacy management theory." Psycho-Oncology 25, no. 8 (2015): 913–18. http://dx.doi.org/10.1002/pon.4024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

De Wolf, Ralf. "Contextualizing how teens manage personal and interpersonal privacy on social media." New Media & Society 22, no. 6 (2019): 1058–75. http://dx.doi.org/10.1177/1461444819876570.

Full text
Abstract:
Many researchers have been studying teens’ privacy management on social media, and how they individually control information. Employing the theoretical framework of communication privacy management (CPM) theory, I argue that individual information control in itself is desirable but insufficient, giving only a limited understanding of teens’ privacy practices. Instead, I argue that research should focus on both personal and interpersonal privacy management to ultimately understand teens’ privacy practices. Using a survey study ( n = 2000), I investigated the predictors of teens’ personal and in
APA, Harvard, Vancouver, ISO, and other styles
22

Bute, Jennifer J., Maria Brann, and Rachael Hernandez. "Exploring societal-level privacy rules for talking about miscarriage." Journal of Social and Personal Relationships 36, no. 2 (2017): 379–99. http://dx.doi.org/10.1177/0265407517731828.

Full text
Abstract:
Communication privacy management (CPM) theory posits that culturally specific understandings of privacy guide how people manage private information in everyday conversations. We use the context of miscarriage to demonstrate how societal-level expectations about (in)appropriate topics of talk converge with micro-level decisions about privacy rules and privacy boundary management. More specifically, we explore how people’s perceptions of broad social rules about the topic of miscarriage influence their disclosure decisions. Based on interviews with 20 couples who have experienced pregnancy loss,
APA, Harvard, Vancouver, ISO, and other styles
23

Millham, Mary Helen, and David Atkin. "Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors." New Media & Society 20, no. 1 (2016): 50–67. http://dx.doi.org/10.1177/1461444816654465.

Full text
Abstract:
Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal
APA, Harvard, Vancouver, ISO, and other styles
24

Rauscher, Emily A., and Mark A. Fine. "The Role of Privacy in Families Created Through Assisted Reproductive Technology: Examining Existing Literature Using Communication Privacy Management Theory." Journal of Family Theory & Review 4, no. 3 (2012): 220–34. http://dx.doi.org/10.1111/j.1756-2589.2012.00132.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.

Full text
Abstract:
Guided by communication privacy management theory, this study tested network size, network diversity, privacy concerns, and privacy management practices in and between Facebook and Snapchat for social media natives. A cross-sectional survey of 273 college students (predominately Caucasian, female, 18- to 20 years old) showed that audiences were larger and more diverse in Facebook than Snapchat. Snapchat users with larger friend lists and lower privacy concerns reported more shared boundary ownership, whereas those with more diverse networks reportedly used more open friending practices to expa
APA, Harvard, Vancouver, ISO, and other styles
26

Surachmanto, Ari, Prahastiwi Utari, and Andre Novi Rahmanto. "Communication Privacy Management of Agricultural Extension Agent in Pandeglang Regency, Banten Province." International Journal of Social Science Research and Review 2, no. 4 (2019): 11–17. http://dx.doi.org/10.47814/ijssrr.v2i4.27.

Full text
Abstract:
This research departs from a phenomenon that when the farmers in Pandeglang regency, Banten Province, are still carrying out farming activities outside of the recommended planting calendar issued by the Ministry of Agriculture Republic of Indonesia. The purpose of this study is to find answers to why farmers are not concerned about the planting calendar and how communication is carried out by agricultural extension workers with these farmers.
 This study uses the theory of Communication Privacy Management (CPM). The approach used is descriptive qualitative. Data is collected by means of o
APA, Harvard, Vancouver, ISO, and other styles
27

Norvitasari, Y., Antoni, and R. Kriyantono. "WIFE’S STRATEGY IN MAINTAINING THE STABILITY OF RELATIONSHIP WITH HUSBAND THROUGH COMMUNICATION PRIVACY MANAGEMENT THEORY." Russian Journal of Agricultural and Socio-Economic Sciences 71, no. 11 (2017): 307–11. http://dx.doi.org/10.18551/rjoas.2017-11.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Jengchung Victor, Ha Vy Vivien Nguyen, and Quang An Ha. "Understanding location disclosure behaviour via social networks sites: a perspective of communication privacy management theory." International Journal of Mobile Communications 18, no. 6 (2020): 690. http://dx.doi.org/10.1504/ijmc.2020.110889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Le, Zao Sun, Xiaoyong Dai, Yixin Zhang, and Hai-hua Hu. "Retaining users after privacy invasions." Information Technology & People 32, no. 6 (2019): 1679–703. http://dx.doi.org/10.1108/itp-01-2018-0020.

Full text
Abstract:
Purpose The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions. Design/methodology/approach Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users. Findings Privacy concerns are jointly determined by perceived privac
APA, Harvard, Vancouver, ISO, and other styles
30

Dianiya, Vicky. "Management Privacy dalam Penggunaan Fitur “Close Friend” di Instagram." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 5, no. 1 (2021): 249. http://dx.doi.org/10.25139/jsk.v5i1.2652.

Full text
Abstract:
Social media is basically to share information and self-disclosures by the account owner. However, there is an attitude of caution in expressing which must also be considered and needs to be considered. Technological developments make more and more new features appear on various social media platforms, one of them is the close friend feature on Instagram that can be used to limit users in sharing information that is considered more privacy. This study uses the Communication Privacy Management theory as a framework for investigating how Instagram users, especially young adults, use and respond
APA, Harvard, Vancouver, ISO, and other styles
31

Chang, Shuchih Ernest, Anne Yenching Liu, and Sungmin Lin. "Exploring privacy and trust for employee monitoring." Industrial Management & Data Systems 115, no. 1 (2015): 88–106. http://dx.doi.org/10.1108/imds-07-2014-0197.

Full text
Abstract:
Purpose – The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring. Design/methodology/approach – The research used the metaphor of boundary turbulence in the Communication Privacy Management (CPM) theory to demonstrate the psychological effect on employees. The model comprised organizational culture, CPM, trust, and employee performance in employee monitoring to further investigated the influence exerted by organizational culture and how employees viewed their trust within the organization when implementing employee monitoring. Varia
APA, Harvard, Vancouver, ISO, and other styles
32

Grebelsky-Lichtman, Tsfira, Ziv Adato, and Shira Traeger. "Extending Impression Management Theory: The Need for Privacy vs. the Need to Express Information on Instant Messaging Apps." Studies in Media and Communication 8, no. 1 (2020): 72. http://dx.doi.org/10.11114/smc.v8i1.4853.

Full text
Abstract:
Impression management (IM) is a central assertion in interpersonal communication. There is increasing interest in exploring IM in new media. However, studies exploring IM in popular instant-messaging apps are lacking. Our main aims in the present study are to fill this gap and extend IM theory toward an innovative theoretical and analytical framework of computer-mediated communication (CMC). This study analyzed the popular instant-messaging app WhatsApp, the largest app for social chatting that has users all over the world.We utilized a multi-variant design of quantitative and qualitative anal
APA, Harvard, Vancouver, ISO, and other styles
33

Lee, Yu-Hao, and Chien Wen Yuan. "The Privacy Calculus of “Friending” Across Multiple Social Media Platforms." Social Media + Society 6, no. 2 (2020): 205630512092847. http://dx.doi.org/10.1177/2056305120928478.

Full text
Abstract:
Relationship building through social network sites (SNSs) requires privacy disclosure that involves a calculus of potential benefits against privacy risks. Tie formation (e.g., friending, following, or connecting) on SNSs is one of the most significant forms of privacy disclosure that not only communicate one’s willingness to disclose but can also reveal past activity history and invite future interactions. Based on the communication privacy management theory, the current study examines how users consider the privacy calculus and tie-formation affordances of the SNSs to manage ties across mult
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Kai, Xiaowen Wang, Kunrong Li, and Jianguo Che. "Information privacy disclosure on social network sites." Nankai Business Review International 7, no. 3 (2016): 282–300. http://dx.doi.org/10.1108/nbri-02-2015-0005.

Full text
Abstract:
Purpose As social network sites (SNS) have increasingly become one of the most important channels for communication, the related privacy issues gain more and more attention in both industry and academic research fields. This study aims to connect the antecedents of information privacy disclosure on SNS. Design/methodology/approach Based on exchange theory, this study tries to investigate the decision-making process for information privacy disclosure on SNS. Factors from both user’s and website’s perspectives are taken into account in the proposed model. Findings The results suggest that an ind
APA, Harvard, Vancouver, ISO, and other styles
35

Xiao, Zhiwen, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen, and Zhengzhu Tang. "Using communication privacy management theory to examine HIV disclosure to sexual partners/spouses among PLHIV in Guangxi." AIDS Care 27, sup1 (2015): 73–82. http://dx.doi.org/10.1080/09540121.2015.1055229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Frampton, Bethany D., and Jeffrey T. Child. "Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory." Computers in Human Behavior 29, no. 6 (2013): 2257–64. http://dx.doi.org/10.1016/j.chb.2013.05.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kam, Jennifer A., Keli Steuber Fazio, and Roselia Mendez Murillo. "Privacy rules for revealing one’s undocumented status to nonfamily members: Exploring the perspectives of undocumented youth of Mexican origin." Journal of Social and Personal Relationships 36, no. 10 (2018): 3178–98. http://dx.doi.org/10.1177/0265407518815980.

Full text
Abstract:
Based on the theory of communication privacy management, we explored: (a) undocumented immigrant youth’s privacy rules for managing their undocumented status disclosures to nonfamily members, and (b) responses to disclosures by recipients and undocumented youth. Semi-structured interviews were conducted with 30 undocumented youth (10th–12th grades) who immigrated to the U.S. from Mexico. Youth managed their undocumented status with nonfamily members using criteria related to support activation, protection, acceptance, and a sense of empowerment. When disclosed, most recipients responded by pro
APA, Harvard, Vancouver, ISO, and other styles
38

Liyanaarachchi, Gajendra. "Online privacy as an integral component of strategy: allaying customer fears and building loyalty." Journal of Business Strategy 41, no. 5 (2020): 47–56. http://dx.doi.org/10.1108/jbs-09-2019-0183.

Full text
Abstract:
Purpose This paper aims to demonstrate how building competency in privacy can be used to transform the corporate strategy to generate a sustainable competitive advantage. A novel framework is presented as a guide to redesigning strategy by striking a balance between customer expectation and organizational objectives. In doing so, the paper offers four possible outcomes of accommodation, accumulation, association and affiliation, providing illustrations to each scenario for strategy formulation. Design/methodology/approach The relationship between privacy paradox and corporate strategy was exam
APA, Harvard, Vancouver, ISO, and other styles
39

Sagita, Virginia Ayu, Khuswatun Hasanah, Medi Trilaksono Dwi Abadi, and Gabriella Hot Marsondang Simamora. "Komunikasi Penderita Gangguan Kesehatan Mental Pada Generasi Milenial." Indonesian Journal of Communication Studies 13, no. 2 (2021): 76. http://dx.doi.org/10.31315/ijcs.v13i2.4138.

Full text
Abstract:
Mental health is currently a health that must be considered in addition to physical health. According to Riset Kesehatan Dasar (2018), it shows that depression is the highest mental illness and there are 450,000 people who are people with severe mental disorders (ODGJ) who have an age range of 15-29 years. This study aims to see the communication made by survivor of mental health disorders in creating millennials to their closest people. The theory used in this research is Communication Privacy Management Theory (CPM) and Contructivism Theory. CPM theory explains how a person with a health dis
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Hao, Shenglan Ma, Hong-Ning Dai, Muhammad Imran, and Tongsen Wang. "Blockchain-based data privacy management with Nudge theory in open banking." Future Generation Computer Systems 110 (September 2020): 812–23. http://dx.doi.org/10.1016/j.future.2019.09.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Elkins, Donna M. "How working women navigate communication privacy management boundaries when seeking social support during cancer treatment." Communication and Medicine 15, no. 3 (2020): 261–67. http://dx.doi.org/10.1558/cam.34969.

Full text
Abstract:
Working women diagnosed with cancer face difficult decisions about disclosing personal information. A 2017 survey for Cancer and Careers, a non-profit organization assisting cancer patients and survivors with finding and continuing employment, found that women are more likely than men to share their diagnosis with work colleagues, and do so more often to feel supported by co-workers. However, disclosure guidelines for communication about having cancer are difficult to establish, as they may vary widely depending on the individual and the situation. Most research about health self-disclosure ha
APA, Harvard, Vancouver, ISO, and other styles
42

Lewis, Cara C., Deborah H. Matheson, and C. A. Elizabeth Brimacombe. "Factors Influencing Patient Disclosure to Physicians in Birth Control Clinics: An Application of the Communication Privacy Management Theory." Health Communication 26, no. 6 (2011): 502–11. http://dx.doi.org/10.1080/10410236.2011.556081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sukk, Marit, and Andra Siibak. "Caring dataveillance and the construction of “good parenting”: Estonian parents’ and pre-teens’ reflections on the use of tracking technologies." Communications 46, no. 3 (2021): 446–67. http://dx.doi.org/10.1515/commun-2021-0045.

Full text
Abstract:
Abstract Digital parenting tools, such as child-tracking technologies, play an ever-increasing role in contemporary child rearing. To explore opinions and experiences related to the use of such tracking devices, we conducted Q methodology and a semi-structured individual interview-study with Estonian parents (n=20) and their 8- to 13-year-old pre-teens (n=20). Our aim was to study how such caring dataveillance was rationalized within the families, and to explore the dominant parenting values associated with the practice. Relying upon communication privacy management theory, the issues of priva
APA, Harvard, Vancouver, ISO, and other styles
44

Santoso, Bobby Rachman. "MANAJEMEN PRIVASI KOMUNIKASI MAJLIS SEMA’AN AL-QUR’ĀN JANTIKO MANTAB DAN DZIKRUL GHŌFĪLĪN." Islamic Communication Journal 4, no. 1 (2019): 1. http://dx.doi.org/10.21580/icj.2019.4.1.3561.

Full text
Abstract:
This research purpose to describe the communication of the Majlis Sema'an Al-Qur'ān Jantiko Mantab and Dzikrul Ghōfīlīn in their position as a group that has influential religious activities and is in the public interest.By using communication privacy management theory, the author tries to explain the dialectical process carried out by MSQ Jantiko Mantab and Dzikrul Ghōfīlīn in developing their activities.The result, that MSQ Jantiko Mantab and Dzikrul Ghōfīlīn conducted the opening of private information with direct and indirect communication.They congregation conducted the opening of private
APA, Harvard, Vancouver, ISO, and other styles
45

Diamantopoulou, Vasiliki, and Haralambos Mouratidis. "Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology." Information & Computer Security 26, no. 4 (2018): 382–400. http://dx.doi.org/10.1108/ics-12-2017-0087.

Full text
Abstract:
Purpose The purpose of this study is the analysis of a security and privacy requirements engineering methodology. Such methodologies are considered an important part of systems’ development process when they contain and process a large amount of critical information, and thus need to remain secure and ensure privacy. Design/methodology/approach These methodologies provide techniques, methods and norms for tackling security and privacy issues in information systems. In this process, the utilisation of effective, clear and understandable modelling languages with sufficient notation is of utmost
APA, Harvard, Vancouver, ISO, and other styles
46

Ozturk, Ahmet Bulent, Anil Bilgihan, Saba Salehi-Esfahani, and Nan Hua. "Understanding the mobile payment technology acceptance based on valence theory." International Journal of Contemporary Hospitality Management 29, no. 8 (2017): 2027–49. http://dx.doi.org/10.1108/ijchm-04-2016-0192.

Full text
Abstract:
Purpose This study aims to examine factors affecting restaurant customers’ intention to use near field communication (NFC)-based mobile payment (MP) technology. More specifically, based on the valence theory, this paper examined the impacts of users’ negative valence (perceived risk and privacy concern) and positive valence (utilitarian value and convenience) perceptions toward their NFC-MP technology acceptance. Furthermore, the impacts of individual difference variables (smartphone affinity and compatibility) on users’ negative and positive valences and on their behavioral intentions were an
APA, Harvard, Vancouver, ISO, and other styles
47

Charoensap-Kelly, Piyawan, Colleen L. Mestayer, and G. Brandon Knight. "To Come Out or Not to Come Out: Minority Religious Identity Self-Disclosure in the United States Workplace." Management Communication Quarterly 34, no. 2 (2019): 213–50. http://dx.doi.org/10.1177/0893318919890072.

Full text
Abstract:
Situated in communication privacy management (CPM) theory, this study found that anticipated risk was the strongest predictor of minority religious identity disclosure at work. Older workers who regarded non-Christian belief or non-belief as central to who they were and who worked in smaller organizations disclosed their identity more than other participants. The follow-up analyses also revealed that the degree of disclosure varied by ethnicity, geographic region, religion, job rank, and membership in the organization’s dominant religion. Religious accommodation policy and religious centrality
APA, Harvard, Vancouver, ISO, and other styles
48

Wilbur, Douglas S. "Have you shot anyone? How combat veterans manage privacy with family and friends." Psychology of Language and Communication 22, no. 1 (2018): 71–89. http://dx.doi.org/10.2478/plc-2018-0004.

Full text
Abstract:
Abstract This qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles of communication privacy management theory (CPM). Secondly, to provide new knowledge that can shape counseling strategies and transition programs to account for how veterans manage their privacy. Some of the significant findings are that veterans believe that merely participating in combat i
APA, Harvard, Vancouver, ISO, and other styles
49

Prescott, Edward Simpson. "Communication in Private-Information Models: Theory and Computation." Geneva Papers on Risk and Insurance Theory 28, no. 2 (2003): 105–30. http://dx.doi.org/10.1023/a:1026388604459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ievansyah, Ievansyah, and Teguh Priyo Sadono. "PERSONAL BRANDING DALAM KOMUNIKASI SELEBRITIS (STUDI KASUS PERSONAL BRANDING ALUMNI ABANG NONE JAKARTA DI MEDIA SOSIAL “INSTAGRAM”)." Bricolage : Jurnal Magister Ilmu Komunikasi 4, no. 02 (2018): 149. http://dx.doi.org/10.30813/bricolage.v4i02.1658.

Full text
Abstract:
<p>ABSTRACT<br />Abang None is a designation for Jakarta Tourism Ambassador. Researchers saw a phenomenon of self-transformation from a tourism ambassador to a celebrity. This phenomenon refers to case studies experienced by Maudy Koesnaedi, Bangpen, and Shabina Gianti. Researchers want to know the personal branding management process they want to form, and convey it to the public through Instagram social media. This study uses qualitative methods, with descriptive case studies, which depart from the Post Positivism paradigm. The concept used is personal branding, and is sharpened
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!