Three theories of privacy: An overview
ST Margulis - Privacy online: Perspectives on privacy and self …, 2011 - Springer
This chapter reviews the current most important theories of privacy. The review is addressed
to those unfamiliar with theories of privacy. It is my goal to provide those readers with a …
to those unfamiliar with theories of privacy. It is my goal to provide those readers with a …
[HTML][HTML] Health literacy and health information technology adoption: the potential for a new digital divide
Background Approximately one-half of American adults exhibit low health literacy and thus
struggle to find and use health information. Low health literacy is associated with negative …
struggle to find and use health information. Low health literacy is associated with negative …
Computer-mediated communication in the age of communication visibility
JW Treem, PM Leonardi… - Journal of Computer …, 2020 - academic.oup.com
This article argues that a distinctive aspect of computer-mediated communication (CMC) is
the way it can make communication visible to others in ways that were previously …
the way it can make communication visible to others in ways that were previously …
Information privacy concerns: Linking individual perceptions with institutional privacy assurances
Organizational information practices can result in a variety of privacy problems that can
increase consumers' concerns for information privacy. To explore the link between …
increase consumers' concerns for information privacy. To explore the link between …
[图书][B] Situational privacy and self-disclosure: Communication processes in online environments
PK Masur - 2018 - Springer
The following book presents my attempt to rationalize one major argument: in order to
understand people's privacy perceptions and behaviors, we need to adopt a situational …
understand people's privacy perceptions and behaviors, we need to adopt a situational …
[图书][B] Social media communication: Concepts, practices, data, law and ethics
JH Lipschultz - 2023 - taylorfrancis.com
This updated fourth edition presents a wide-scale, interdisciplinary guide to social media
communication. Examining platforms like Facebook, Instagram, Snapchat, TikTok, Twitter …
communication. Examining platforms like Facebook, Instagram, Snapchat, TikTok, Twitter …
Narcissistic adolescents' attention-seeking following social rejection: Links with social media disclosure, problematic social media use, and smartphone stress
In line with a Dynamic Self-Regulatory Processing Model of narcissism (Morf & Rhodewalt,
2001), the present study adopted a motivated self-construction perspective to examine …
2001), the present study adopted a motivated self-construction perspective to examine …
Beyond the personalization–privacy paradox: Privacy valuation, transparency features, and service personalization
S Karwatzki, O Dytynko, M Trenz… - Journal of Management …, 2017 - Taylor & Francis
Digital services need access to consumers' data to improve service quality and to generate
revenues. However, it remains unclear how such services should be configured to facilitate …
revenues. However, it remains unclear how such services should be configured to facilitate …
Brief status report on communication privacy management theory
S Petronio - Journal of Family Communication, 2013 - Taylor & Francis
Over the last 35 years I have worked with gifted colleagues to develop and test the tenets of
the Communication Privacy Management (CPM) theoretical perspective. 1 To date, a corpus …
the Communication Privacy Management (CPM) theoretical perspective. 1 To date, a corpus …
Communication privacy management theory: What do we know about family privacy regulation?
S Petronio - Journal of family theory & review, 2010 - Wiley Online Library
For families, managing private information is challenging. Family members reveal too much,
they allow more privacy access to outsiders than others desire, parents attempt to negotiate …
they allow more privacy access to outsiders than others desire, parents attempt to negotiate …