Journal articles on the topic 'Communication Privacy Management theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Communication Privacy Management theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Petersons, Andris, and Ilkhom Khalimzoda. "Communication privacy management of students in Latvia." Problems and Perspectives in Management 14, no. 2 (2016): 222–27. http://dx.doi.org/10.21511/ppm.14(2-1).2016.11.
Full textPetronio, Sandra. "Brief Status Report on Communication Privacy Management Theory." Journal of Family Communication 13, no. 1 (2013): 6–14. http://dx.doi.org/10.1080/15267431.2013.743426.
Full textPetronio, Sandra. "Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?" Journal of Family Theory & Review 2, no. 3 (2010): 175–96. http://dx.doi.org/10.1111/j.1756-2589.2010.00052.x.
Full textPetronio, Sandra, and Jeffrey T. Child. "Conceptualization and operationalization: utility of communication privacy management theory." Current Opinion in Psychology 31 (February 2020): 76–82. http://dx.doi.org/10.1016/j.copsyc.2019.08.009.
Full textSerewicz, Mary Claire Morr. "Introducing the Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 2–5. http://dx.doi.org/10.1080/15267431.2013.743424.
Full textKennedy-Lightsey, Carrie D., Matthew M. Martin, Michelle Thompson, Kimberly Leezer Himes, and Brooke Zackery Clingerman. "Communication Privacy Management Theory: Exploring Coordination and Ownership Between Friends." Communication Quarterly 60, no. 5 (2012): 665–80. http://dx.doi.org/10.1080/01463373.2012.725004.
Full textPetronio, Sandra. "Welcome to the Journal of Family Communication Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 1. http://dx.doi.org/10.1080/15267431.2013.743418.
Full textSmith, Stephanie A., and Steven R. Brunner. "To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace." Management Communication Quarterly 31, no. 3 (2017): 429–46. http://dx.doi.org/10.1177/0893318917692896.
Full textPetronio, Sandra, Paul R. Helft, and Jeffrey T. Child. "A case of error disclosure: a communication privacy management analysis." Journal of Public Health Research 2, no. 3 (2013): 30. http://dx.doi.org/10.4081/jphr.2013.e30.
Full textMcNealy, Jasmine, and Michaela Devyn Mullis. "Tea and turbulence: Communication privacy management theory and online celebrity gossip forums." Computers in Human Behavior 92 (March 2019): 110–18. http://dx.doi.org/10.1016/j.chb.2018.10.029.
Full textGruzd, Anatoliy, Jenna Jacobson, and Elizabeth Dubois. "Cybervetting and the Public Life of Social Media Data." Social Media + Society 6, no. 2 (2020): 205630512091561. http://dx.doi.org/10.1177/2056305120915618.
Full textSapon, Irina. "Public and Private on a Social Media Profile through the Lens of Sandra Petronio’s Theory." Ideas and Ideals 13, no. 2-1 (2021): 126–42. http://dx.doi.org/10.17212/2075-0862-2021-13.2.1-126-142.
Full textBélanger, France, and Tabitha L. James. "A Theory of Multilevel Information Privacy Management for the Digital Era." Information Systems Research 31, no. 2 (2020): 510–36. http://dx.doi.org/10.1287/isre.2019.0900.
Full textPetronio, Sandra. "Road to Developing Communication Privacy Management Theory: Narrative in Progress, Please Stand By." Journal of Family Communication 4, no. 3-4 (2004): 193–207. http://dx.doi.org/10.1080/15267431.2004.9670131.
Full textPetronio, Sandra. "Road to Developing Communication Privacy Management Theory: Narrative in Progress, Please Stand By." Journal of Family Communication 4, no. 3 (2004): 193–207. http://dx.doi.org/10.1207/s15327698jfc0403&4_6.
Full textLwin, May O., Jochen Wirtz, and Andrea J. S. Stanaland. "The privacy dyad." Internet Research 26, no. 4 (2016): 919–41. http://dx.doi.org/10.1108/intr-05-2014-0134.
Full textMcBride, M. Chad, Allison R. Thorson, and Karla Mason Bergen. "Privacy Rule Decision Criteria: An Examination of Core and Catalyst Criteria that Shape Disclosures in the Work-Spouse Relationship." Management Communication Quarterly 34, no. 4 (2020): 527–57. http://dx.doi.org/10.1177/0893318920949328.
Full textPuaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing." International Journal of Strategic Information Technology and Applications 10, no. 1 (2019): 1–22. http://dx.doi.org/10.4018/ijsita.2019010101.
Full textChen, Jengchung Victor, Ha Vy Vivien Nguyen, and Quang An Ha. "Understanding Location Disclosure Behaviour via Social Networks Sites: Perspective of Communication Privacy Management Theory." International Journal of Mobile Communications 18, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijmc.2020.10030834.
Full textNgwenya, Nothando, Morag Farquhar, and Gail Ewing. "Sharing bad news of a lung cancer diagnosis: understanding through communication privacy management theory." Psycho-Oncology 25, no. 8 (2015): 913–18. http://dx.doi.org/10.1002/pon.4024.
Full textDe Wolf, Ralf. "Contextualizing how teens manage personal and interpersonal privacy on social media." New Media & Society 22, no. 6 (2019): 1058–75. http://dx.doi.org/10.1177/1461444819876570.
Full textBute, Jennifer J., Maria Brann, and Rachael Hernandez. "Exploring societal-level privacy rules for talking about miscarriage." Journal of Social and Personal Relationships 36, no. 2 (2017): 379–99. http://dx.doi.org/10.1177/0265407517731828.
Full textMillham, Mary Helen, and David Atkin. "Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors." New Media & Society 20, no. 1 (2016): 50–67. http://dx.doi.org/10.1177/1461444816654465.
Full textRauscher, Emily A., and Mark A. Fine. "The Role of Privacy in Families Created Through Assisted Reproductive Technology: Examining Existing Literature Using Communication Privacy Management Theory." Journal of Family Theory & Review 4, no. 3 (2012): 220–34. http://dx.doi.org/10.1111/j.1756-2589.2012.00132.x.
Full textHollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.
Full textSurachmanto, Ari, Prahastiwi Utari, and Andre Novi Rahmanto. "Communication Privacy Management of Agricultural Extension Agent in Pandeglang Regency, Banten Province." International Journal of Social Science Research and Review 2, no. 4 (2019): 11–17. http://dx.doi.org/10.47814/ijssrr.v2i4.27.
Full textNorvitasari, Y., Antoni, and R. Kriyantono. "WIFE’S STRATEGY IN MAINTAINING THE STABILITY OF RELATIONSHIP WITH HUSBAND THROUGH COMMUNICATION PRIVACY MANAGEMENT THEORY." Russian Journal of Agricultural and Socio-Economic Sciences 71, no. 11 (2017): 307–11. http://dx.doi.org/10.18551/rjoas.2017-11.39.
Full textChen, Jengchung Victor, Ha Vy Vivien Nguyen, and Quang An Ha. "Understanding location disclosure behaviour via social networks sites: a perspective of communication privacy management theory." International Journal of Mobile Communications 18, no. 6 (2020): 690. http://dx.doi.org/10.1504/ijmc.2020.110889.
Full textWang, Le, Zao Sun, Xiaoyong Dai, Yixin Zhang, and Hai-hua Hu. "Retaining users after privacy invasions." Information Technology & People 32, no. 6 (2019): 1679–703. http://dx.doi.org/10.1108/itp-01-2018-0020.
Full textDianiya, Vicky. "Management Privacy dalam Penggunaan Fitur “Close Friend” di Instagram." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 5, no. 1 (2021): 249. http://dx.doi.org/10.25139/jsk.v5i1.2652.
Full textChang, Shuchih Ernest, Anne Yenching Liu, and Sungmin Lin. "Exploring privacy and trust for employee monitoring." Industrial Management & Data Systems 115, no. 1 (2015): 88–106. http://dx.doi.org/10.1108/imds-07-2014-0197.
Full textGrebelsky-Lichtman, Tsfira, Ziv Adato, and Shira Traeger. "Extending Impression Management Theory: The Need for Privacy vs. the Need to Express Information on Instant Messaging Apps." Studies in Media and Communication 8, no. 1 (2020): 72. http://dx.doi.org/10.11114/smc.v8i1.4853.
Full textLee, Yu-Hao, and Chien Wen Yuan. "The Privacy Calculus of “Friending” Across Multiple Social Media Platforms." Social Media + Society 6, no. 2 (2020): 205630512092847. http://dx.doi.org/10.1177/2056305120928478.
Full textLi, Kai, Xiaowen Wang, Kunrong Li, and Jianguo Che. "Information privacy disclosure on social network sites." Nankai Business Review International 7, no. 3 (2016): 282–300. http://dx.doi.org/10.1108/nbri-02-2015-0005.
Full textXiao, Zhiwen, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen, and Zhengzhu Tang. "Using communication privacy management theory to examine HIV disclosure to sexual partners/spouses among PLHIV in Guangxi." AIDS Care 27, sup1 (2015): 73–82. http://dx.doi.org/10.1080/09540121.2015.1055229.
Full textFrampton, Bethany D., and Jeffrey T. Child. "Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory." Computers in Human Behavior 29, no. 6 (2013): 2257–64. http://dx.doi.org/10.1016/j.chb.2013.05.006.
Full textKam, Jennifer A., Keli Steuber Fazio, and Roselia Mendez Murillo. "Privacy rules for revealing one’s undocumented status to nonfamily members: Exploring the perspectives of undocumented youth of Mexican origin." Journal of Social and Personal Relationships 36, no. 10 (2018): 3178–98. http://dx.doi.org/10.1177/0265407518815980.
Full textLiyanaarachchi, Gajendra. "Online privacy as an integral component of strategy: allaying customer fears and building loyalty." Journal of Business Strategy 41, no. 5 (2020): 47–56. http://dx.doi.org/10.1108/jbs-09-2019-0183.
Full textSagita, Virginia Ayu, Khuswatun Hasanah, Medi Trilaksono Dwi Abadi, and Gabriella Hot Marsondang Simamora. "Komunikasi Penderita Gangguan Kesehatan Mental Pada Generasi Milenial." Indonesian Journal of Communication Studies 13, no. 2 (2021): 76. http://dx.doi.org/10.31315/ijcs.v13i2.4138.
Full textWang, Hao, Shenglan Ma, Hong-Ning Dai, Muhammad Imran, and Tongsen Wang. "Blockchain-based data privacy management with Nudge theory in open banking." Future Generation Computer Systems 110 (September 2020): 812–23. http://dx.doi.org/10.1016/j.future.2019.09.010.
Full textElkins, Donna M. "How working women navigate communication privacy management boundaries when seeking social support during cancer treatment." Communication and Medicine 15, no. 3 (2020): 261–67. http://dx.doi.org/10.1558/cam.34969.
Full textLewis, Cara C., Deborah H. Matheson, and C. A. Elizabeth Brimacombe. "Factors Influencing Patient Disclosure to Physicians in Birth Control Clinics: An Application of the Communication Privacy Management Theory." Health Communication 26, no. 6 (2011): 502–11. http://dx.doi.org/10.1080/10410236.2011.556081.
Full textSukk, Marit, and Andra Siibak. "Caring dataveillance and the construction of “good parenting”: Estonian parents’ and pre-teens’ reflections on the use of tracking technologies." Communications 46, no. 3 (2021): 446–67. http://dx.doi.org/10.1515/commun-2021-0045.
Full textSantoso, Bobby Rachman. "MANAJEMEN PRIVASI KOMUNIKASI MAJLIS SEMA’AN AL-QUR’ĀN JANTIKO MANTAB DAN DZIKRUL GHŌFĪLĪN." Islamic Communication Journal 4, no. 1 (2019): 1. http://dx.doi.org/10.21580/icj.2019.4.1.3561.
Full textDiamantopoulou, Vasiliki, and Haralambos Mouratidis. "Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology." Information & Computer Security 26, no. 4 (2018): 382–400. http://dx.doi.org/10.1108/ics-12-2017-0087.
Full textOzturk, Ahmet Bulent, Anil Bilgihan, Saba Salehi-Esfahani, and Nan Hua. "Understanding the mobile payment technology acceptance based on valence theory." International Journal of Contemporary Hospitality Management 29, no. 8 (2017): 2027–49. http://dx.doi.org/10.1108/ijchm-04-2016-0192.
Full textCharoensap-Kelly, Piyawan, Colleen L. Mestayer, and G. Brandon Knight. "To Come Out or Not to Come Out: Minority Religious Identity Self-Disclosure in the United States Workplace." Management Communication Quarterly 34, no. 2 (2019): 213–50. http://dx.doi.org/10.1177/0893318919890072.
Full textWilbur, Douglas S. "Have you shot anyone? How combat veterans manage privacy with family and friends." Psychology of Language and Communication 22, no. 1 (2018): 71–89. http://dx.doi.org/10.2478/plc-2018-0004.
Full textPrescott, Edward Simpson. "Communication in Private-Information Models: Theory and Computation." Geneva Papers on Risk and Insurance Theory 28, no. 2 (2003): 105–30. http://dx.doi.org/10.1023/a:1026388604459.
Full textIevansyah, Ievansyah, and Teguh Priyo Sadono. "PERSONAL BRANDING DALAM KOMUNIKASI SELEBRITIS (STUDI KASUS PERSONAL BRANDING ALUMNI ABANG NONE JAKARTA DI MEDIA SOSIAL “INSTAGRAM”)." Bricolage : Jurnal Magister Ilmu Komunikasi 4, no. 02 (2018): 149. http://dx.doi.org/10.30813/bricolage.v4i02.1658.
Full text