Three theories of privacy: An overview
ST Margulis - Privacy online: Perspectives on privacy and self …, 2011 - Springer
This chapter reviews the current most important theories of privacy. The review is addressed
to those unfamiliar with theories of privacy. It is my goal to provide those readers with a …
to those unfamiliar with theories of privacy. It is my goal to provide those readers with a …
Brief status report on communication privacy management theory
S Petronio - Journal of Family Communication, 2013 - Taylor & Francis
Over the last 35 years I have worked with gifted colleagues to develop and test the tenets of
the Communication Privacy Management (CPM) theoretical perspective. 1 To date, a corpus …
the Communication Privacy Management (CPM) theoretical perspective. 1 To date, a corpus …
Communication privacy management theory: What do we know about family privacy regulation?
S Petronio - Journal of family theory & review, 2010 - Wiley Online Library
For families, managing private information is challenging. Family members reveal too much,
they allow more privacy access to outsiders than others desire, parents attempt to negotiate …
they allow more privacy access to outsiders than others desire, parents attempt to negotiate …
The psychology of privacy in the digital age
Privacy is a psychological topic suffering from historical neglect—a neglect that is
increasingly consequential in an era of social media connectedness, mass surveillance, and …
increasingly consequential in an era of social media connectedness, mass surveillance, and …
Understanding social network site users' privacy tool use
E Litt - Computers in Human Behavior, 2013 - Elsevier
Every day hundreds of millions of people log into social network sites and deposit terabytes
of data as they share status updates, photographs, and more. This article explores how …
of data as they share status updates, photographs, and more. This article explores how …
Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of …
The purpose of this study was to examine social media users' blogging privacy rule
orientations, privacy management regulation, and content deletion practices as distinct types …
orientations, privacy management regulation, and content deletion practices as distinct types …
Facebook privacy management strategies: A cluster analysis of user privacy behaviors
Online privacy management research related to e-commerce mainly focuses on whether or
not to disclose information. Online social networking on the other hand, offers a broader set …
not to disclose information. Online social networking on the other hand, offers a broader set …
[PDF][PDF] Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet
JT Child, S Petronio - Computer-mediated communication in …, 2011 - heinz.cmu.edu
In a recent posting, a parent uploaded and tagged a picture of their 18 year old son as a little
boy dressed in a tutu. Once tagged, the photo became accessible to the son's entire …
boy dressed in a tutu. Once tagged, the photo became accessible to the son's entire …
Let's be Facebook friends: Exploring parental Facebook friend requests from a communication privacy management (CPM) perspective
JT Child, DA Westermann - Journal of Family Communication, 2013 - Taylor & Francis
Young adults may interact on Facebook in ways that makes them feel vulnerable about
parental Facebook friend requests. This study utilizes Communication Privacy Management …
parental Facebook friend requests. This study utilizes Communication Privacy Management …
An empirical analysis of users' privacy disclosure behaviors on social network sites
K Li, Z Lin, X Wang - Information & management, 2015 - Elsevier
Users' privacy on social network sites is one of the most important and urgent issues in both
industry and academic fields. This paper is intended to investigate the effect of users' …
industry and academic fields. This paper is intended to investigate the effect of users' …