• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 4
  • 3
  • 1
  • 1
  • Tagged with
  • 36
  • 36
  • 29
  • 14
  • 10
  • 9
  • 9
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Examining factors that influence subordinates’ willingness to connect with supervisors on Facebook through the lens of communication privacy management theory

Akin, Kazim Yigit January 1900 (has links)
Master of Arts / Department of Communication Studies / Gregory Paul / Over the last decade, people have been able to access and use the Internet quickly and easily though several types of advanced technologies. Social networking sites (SNS) have attracted millions of users from all over the word and have become a part of their social and work lives. As the most popular SNS, Facebook.com has been leading the SNS market with 1.86 billion monthly active users (Facebook, 2017). Facebook has also been adopted by workplaces. Individuals in the workplace use Facebook for several reasons, such as staying in touch with colleagues. This integration of SNSs into people’s work life has led to personal and professional boundaries being blurred and created privacy dilemmas. This study examines factors that influence subordinate’s willingness to accept a Facebook friend request from their supervisor, using the theoretical lens of communication privacy management (CPM). Overall, 231 individuals who have a Facebook account and work at either a full-time or part-time job completed an online survey. A positive relationship was found between subordinates’ willingness to accept a Facebook friend request from a supervisor and subordinate communication satisfaction with a supervisor. This study’s results indicate that alterations in Facebook content, and being more open through privacy management practices do not predict subordinates’ willingness to accept supervisors’ Facebook friend request. Further, subordinates’ communication satisfaction with their supervisor did not influence subordinates’ content alterations of Facebook, such as deleting previously posted media content, wall posts, modifying profile information, or removing status updates. This thesis ends with a discussion of the implications of Facebook connections between subordinates and supervisors. This study also provides insights on the intersections of use of SNS, workplace use of SNSs, workplace relationships, and communication privacy management theory.
2

THE MISMANGEMENT OF MARITAL DISCLOSURES IN THE REAL HOUSEWIVES OF BEVERLY HILLS

Campbell, Randi Cariella 01 January 2012 (has links)
Reality television is unique from other television programming because its format is less scripted than typical entertainment television programs, but not as candid as documentary style shows. Aspects of cast members’ private lives are publicly aired as “real.” The consequences for airing one’s private life in the public sphere are unclear. This may be especially important to study when the private disclosures reveal activities that may be unethical, immoral, illegal, or abusive. Petronio’s (date) communication privacy management theory was used to examine the martial disclosures that occurred between Taylor and Russell Armstrong, cast members of the reality television show The Real Housewives of Beverly Hills. Two seasons of the show were analyzed and coded according to the five suppositions of CPM. Results revealed several aspects of Walker’s cycle of violence theory being played out in the public sphere without consequence. Additionally, co-ownership of information appeared to constitute a license to gossip freely about private disclosures shared in confidence between certain individuals with any and all other cast members.
3

"This is inappropriate! I'm your daughter, not your friend!": South Asian American Daughters' Roles as Reluctant Confidant and Parental Mediator in Emerging Adult Child-Parent Relationships

January 2012 (has links)
abstract: This dissertation explores South Asian American (SAA) emerging adult daughters' roles as their parents' reluctant confidants and mediators of conflict. Using Petronio's (2002) communication privacy management theory (CPM) as a framework, this dissertation investigates daughters' communicative strategies when engaged in familial roles. Findings from 15 respondent interviews with SAA women between the ages of 18 and 29 reveal daughters' intrinsic and extrinsic motivations for role-playing within their families, such as inherent satisfaction and parental expectations, respectively. Additionally, findings highlight daughters' use of coping and thwarting strategies after they become the recipients of their parents' unsolicited private information. Namely, daughters engaged in coping strategies (e.g., giving advice) to help their parents manage private information. Likewise, they enacted thwarting strategies (e.g., erecting territorial markers) to restore boundaries after their parents (the disclosers) violated them. Consequently, serving as parental confidants and mediators contributed to parent-child boundary dissolution and adversely affected daughters' well-being as well as their progression toward adulthood. This study provides theoretical contributions by extending CPM theory regarding reluctant confidants within the contexts of emerging adult child-parent relationships and ethnic minority groups in America. Practically, this study offers emerging adult children insight into how they might renegotiate boundaries when their parents change the relationship by disclosing personal information. Information gleaned from this study provides SAA emerging adult daughters with an understanding of the ramifications of prioritizing their familial roles and being a reluctant confidant, in addition to potential avenues for remediation. / Dissertation/Thesis / Ph.D. Communication Studies 2012
4

Predicting Disclosure of Student Mental Health Problems to Instructors: A Communication Privacy Management Perspective

Haverkamp, Emily Marie January 2020 (has links)
The transitional period of attending college marks a shift towards personal independence for students. The management of conversational topics requires students to determine how they share information. Management of mental health information is a critical topic that cannot be overlooked during these re-negotiation periods. The goal of this study was to examine how the five privacy rule development criteria (culture, context, motivation, risk/benefit gender) of Communication Privacy Management Theory predict a college student’s likelihood to reveal a mental health problem to their instructor. Using multiple regression, bivariate linear regression, and factorial ANOVA, this study revealed that the CPM rule development criteria variables (culture, context, motivation, and gender) are predictors of college students disclosing a mental health problem to their instructors. Findings suggest that predictors of privacy management center on communication and relational factors between students and instructors as well as perceptions of an open conversation-oriented classroom culture, and gender.
5

"I'm Spoon-feeding him my Trauma": An Analysis of Sexual Assault Survivors' Privacy Management in Romantic Relationships

Unruh, Margret 05 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Survivors of sexual assault make difficult privacy management decisions regarding their experiences, particularly in romantic relationships where physical intimacy makes these sensitive disclosures even more complex. As fever is an indicator of illness and a part of healing from the illness, disclosure can be an indicator of underlying disturbance and a part of the restorative process. Additionally, communication privacy management (CPM) theory considers ownership, control, and turbulence to illustrate how private information is regulated. Through qualitative, semi-structured interviews (n=19) and a phronetic iterative approach to data analysis, I examined the ways survivors of sexual assault managed their private information regarding their experiences in a romantic relationship and if disclosure relieved any psychological distress of the survivor. Results of this study offer insight into the ways participants controlled their personal information through the privacy management process; the establishment of boundaries surrounding ongoing disclosures; and the emotional effect of various privacy management strategies on participants, their partners, and the relationship. Reaching across theoretical concepts, this research offers a comprehensive understanding of the factors salient when managing private information regarding sexual assault. This research also provides practical applications for considering the influence of various privacy management approaches and their influence on the physical and psychological health of the survivor and the health of the relationship.
6

Mom, Dad, Let’s Be (Facebook) Friends: Exploring Parent/Child Facebook Interaction from a Communication Privacy Management Perspective

Westermann, David A. 29 April 2011 (has links)
No description available.
7

Parental Caregiving and Sibling Topic Avoidance: An Application of Communication Privacy Management Theory

Helen M Lillie (6755585) 14 August 2019 (has links)
<p>The current study empirically tested a model of sibling caregiving topic avoidance, including privacy rule criteria as predictors of topic avoidance and both relationship satisfaction and depression as outcomes of topic avoidance. Associations between topic avoidance and its predictors and outcomes were compared for primary and non-primary caregivers. Additionally, the study tested privacy expectations, including information ownership and caregiving talk preference, as moderators of the associations between topic avoidance and both relationship satisfaction and depression. The current study is grounded in communication privacy management theory, conceptualizing topic avoidance as a strategy for maintaining privacy (CPM; Petronio, 2002). Findings validate CPM propositions related to privacy rule development and privacy turbulence. Findings also further understanding of informal caregiving, sibling communication, and topic avoidance.</p> <p>Over 75% of all eldercare in the United States is provided by unpaid, non-professionals (Family Caregiver Alliance, n.d.). Providing unpaid care has been linked to diminished well-being, including negative physical and mental health effects (Cooper, Balamurali, & Livingston, 2007). However, some scholars argue that caregiving is only detrimental in particular circumstances with some caregivers experiencing more benefits than burdens (Roth, Fredman, & Haley, 2015). The current study proposes that sibling communication is a key factor in determining when caregiving is harmful. </p> <p>Specifically, the current study examines topic avoidance about parent well-being and sibling’s contributions to parental care, including predictors of topic avoidance and the association of topic avoidance with sibling relationship satisfaction and depression. The current study includes a pilot study of 207 participants to develop CPM measures of caregiving topic avoidance, benefit-risk analysis, and information ownership as well as a measure of caregiving involvement (including personal care, routine tasks, and emotional support). The resulting measures are utilizing in a main study of 415 participants, testing models of middle-aged siblings’ topic avoidance.</p> <p>Findings contribute to understanding of informal care, sibling communication, and CPM. Privacy rule criteria, including context, motivation, and risk-benefit analysis, were associated with topic avoidance. Surprisingly, gender and family culture were not strongly associated with topic avoidance. Topic avoidance resulted in relationship dissatisfaction and greater depression when topic avoidance did not align with privacy expectations, resulting in privacy turbulence. Differences emerged for primary caregivers compared with non-primary caregivers, including predictors of topic avoidance and direct effects of caregiving involvement on relationship satisfaction and depression. For primary caregivers, involvement in personal care was associated with greater depression, and involvement in emotional support was associated with less depression. Overall, findings further understanding of privacy management, caregiving, and sibling communication and provide interesting avenues for future research.</p>
8

A framework for measuring organizational information security vulnerability

Zhang, Changli 30 October 2019 (has links)
In spite of the ever-growing technology in information security, organizations are still vulnerable to security attacks due to mistakes made by their employees. To evaluate organizational security vulnerability and keep organizations alert on their security situation, in this dissertation, we developed a framework for measuring the security vulnerability of organizations based on online behaviours analysis of their employees. In this framework, the behavioural data of employees for their online privacy are taken as input, and the personal vulnerability profiles of them are generated and represented as confusion matrices. Then, by incorporating the personal vulnerability data into the local social network of interpersonal security influence in the workplace, the overall security vulnerability of each organization is evaluated and rated as a percentile value representing its position to all other organizations. Through evaluation with real-world data and simulation, this framework is verified to be both effective and efficient in estimating the actual security vulnerability status of organizations. Besides, a demo application is developed to illustrate the feasibility of this framework in the practice of improving information security for organizations. / Graduate
9

Privacy paradox or bargained-for-exchange : capturing the relationships among privacy concerns, privacy management, self-disclosure, and social capital

Hsu, Shih-Hsien 16 January 2015 (has links)
The dissertation seeks to bridge the gap between privacy and social capital on SNS use by bringing the essential elements of social networking, privacy concerns, privacy management, self-disclosure, and social capital together to examine their complex relationships and the daily challenges every SNS user faces. The major purposes of this dissertation were to revisit the privacy paradox phenomenon, update the current relationships among privacy concerns, self-disclosure, and social capital on Facebook, integrate these relationships into a quantitative model, and explore the role of privacy management in these relationships. The goal was realized by using Amazon.com’s Mechanical Turk to test a theoretical model that used survey data from 522 respondents. The findings from the dissertation show the impact of the structural factor—Facebook social network intensity and diversity—and the impact of individuals’ self-disclosure on Facebook on their perceived bridging and bonding social capital. This dissertation employed various measurements of key variables to update the current status of the privacy paradox phenomenon—the disconnection between privacy concerns and self- disclosure on social media—and found the break of the traditional privacy paradox and the existence of the social privacy paradox. Findings also show that private information about personal information, thoughts, and ideas shared on Facebook become assets in using Facebook and accumulating social capital. Meanwhile, higher privacy concerns reduce the level of self-disclosure on Facebook. Therefore, privacy concerns become a barrier in Facebook use and in accumulating social capital within these networks. This dissertation further examined the mediating role of privacy management to solve the dilemma. Findings confirmed that privacy management is important in redirecting the relationships among privacy concerns, self-disclosure, and social capital. People who have higher privacy concerns tend to disclose fewer personal thoughts and ideas on Facebook and miss the opportunity to accumulate social capital. However, when they employ more privacy management strategies, they are more willing to self-disclose and thus accumulate more social capital on Facebook networks. Lastly, the proposed integrated model examined through SEM analysis confirms the delicate relationships among the social networking characteristics, privacy concerns, privacy management, self-disclosure, and social capital. / text
10

I Can't Hear You But I'm Not Sure I'm Going to Tell You: Perceptions of Stigma and Disclosure for Individuals who are Deaf or Hard of Hearing

Lash, Brittany Nicole 01 January 2014 (has links)
Communication processes can be affected by stigma – a negative evaluation of an individual’s attributes that discredits or identifies the individual as not normal (Goffman, 1963). One such communicative process that is affected by stigma is disclosure. Disclosure is when individuals share personal information that reveals something not previously known (Charmaz, 1991). One such group of individuals who may be forced to choose between disclosing (to get accommodations or social support) and avoiding stigma (by not disclosing) is individuals with disabilities (Braithwaite, 1991; Charmaz, 1991). This study focuses on one particular population of individuals with disabilities – those with a hearing loss. Through the use of interactive interviewing and Communication Privacy Management (CPM) theory, this study examines hard of hearing and deaf individuals’ perceptions of both the disclosure process and stigma. CPM examines how and why people conceal or reveal private information, such as hearing loss (Petronio, 1991, 2002). Using CPM, this study poses research questions surrounding how hard of hearing individuals disclose and manage turbulence surrounding their hearing loss. Further, participants’ perceptions and responses to stigma surrounding hearing loss are also examined. Based on the participants’ responses, managing the boundaries surrounding their hearing loss includes considerations of identity, the other person/people in the interaction, risks of not disclosing, timing, and how much to disclose. Further, participants viewed boundary turbulence as positive only when it was helpful; otherwise, they reported a feeling of a loss of control. In examining stigma and other consequences of disclosure, participants talked about being labeled, not being worth others’ time, and being seen as incapable. Finally, participants reported a wide variety of responses to stigma surrounding their hearing loss. In this study, I also discuss the implications of these findings, both theoretical and practical implications, and how they reflect the lives of the deaf and hard of hearing. Finally, I address the directions for future research on this topic as well as the limitations to this study.

Page generated in 0.1065 seconds