• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 4
  • 3
  • 1
  • 1
  • Tagged with
  • 36
  • 36
  • 29
  • 14
  • 10
  • 9
  • 9
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The Undisclosed Dangers of Parental Sharing on Social Media: A Content Analysis of Sharenting Images on Instagram

Bare, Christian 01 May 2020 (has links)
Sharenting is a new term used to define the action of parents posting about their children online. Social media provides parents with an easy to use outlet for image distribution to all family and friends that simultaneously archives the images into a digital baby book. While convenient, once publicly posted anyone can gain access to the images of the children. Instagram is a favorable social media channel for sharenting. A popular hashtag on Instagram, #letthembelittle, contains 8 million posts dedicated to child imagery. A set of 300 randomly selected images under the hashtag were coded. Images tended to contain personal information such as the child’s name, age, and location. Communication Privacy Management and Uses and Gratifications theories provided the theoretical frameworks for this study. The results suggested a possibly dangerous pattern of parental oversharing that could negatively impact the child and the child’s safety.
22

Vill jag verkligen publicera min frukost på Facebook? En kvalitativ studie om privatpersoners strategier på sociala medier

Fröberg, Emelie January 2018 (has links)
Sociala medier används i stor utsträckning var dag men frågan är vilka tankar och strategier som ligger bakom användandet av de två digitala kanalerna Facebook och Instagram. Genom en kvalitativ metod undersöks bakomliggande strategier till hur privatpersoner agerar på sina sociala medier. Den undersökande populationen är kvinnor 18-35 år och syftet är att se hur de bygger upp sin identitet och sitt personliga varumärke på sina sociala medier. Studien har genomförts med intervjuer samt ett visuellt material i form av bilder som använts till stöd vid insamling av materialet. Det visuella materialet har tagit avstamp i modellen Brand Mind Space. Den teoretiska anknytningen rör även modellerna A Brand Personality och Communication Privacy Management (CPM). Resultatet visar att Instagram är den kanal som används i störst utsträckning. Det framkommer även att det går att utläsa tendenser till strategier hos privatpersoner i den undersökta populationen. Det är av vikt dels hur privat information delges, vad som förmedlas via profilen samt vad bilderna som publiceras egentligen representerar. Studien pekar på att det viktigaste är att vara ärlig och att den digitala identiteten avspeglar vem personen är, samt att kunna kontrollera spridning av den information som delas. Det är även viktigt att inte sticka ut för mycket eller uppfattas av andra som jobbig. / Social media is widely used every day but the question is what strategies can be found behind Facebook and Instagram. Through a qualitative method research of underlying strategies on how individuals act on their social media have been made. The population is women age 18-35 and the purpose is to see how they structure their identity and personal brand on social media. The study was realized by interviews and a visual material shaped as images. The visual material is based on the Brand Mind Space model. The theory also relates to the models A Brand Personality and Communication Privacy Management (CPM).The result shows that Instagram is the channel used to the greatest extent. It also appears that trends in strategies for individuals in the population can be read out. It is important how private information is communicated, what is conveyed through the profile and what pictures that are published really represents.The study shows that the most important thing is to be honest and for the digital identity to reflect who the person is. It is also important to control the spread of information being shared and to not stand out or be perceived as annoying.
23

To Tell or not to Tell? An Examination of Stepparents' Communication Privacy Management

Hsu, Tsai-chen 08 1900 (has links)
This study examined stepparents' privacy boundary management when engaging in communicative interactions with stepchildren. I utilized Petronio's communication privacy management theory to investigate stepparents' motivations of disclosing or concealing from stepchildren as well as how stepparents' gender influences such motivations. Moreover, present research also explored types of privacy dilemma within stepfamily households from stepparent perspectives. Fifteen stepfathers and 15 stepmothers received in-depth interviews about their self-disclosing and concealment experiences with stepchildren. I identified confidant dilemma and accidental dilemma in stepfamily households from stepparents' perspectives, as well as stepparents' gender differences in self-disclosing and concealing motivations. Findings also suggest that stepparents reveal and conceal from stepchildren out of same motivations: establishing good relationships, viewing stepchildren as own children, helping stepchildren with problems resulting from the divorce and viewing stepchildren as "others." The result also indicates that stepparents experienced dialectical tensions between closedness and openness during the decision of revealing or concealing from stepchildren.
24

<b>COMMUNICATING MENTAL HEALTH DISORDERS: UNDERSTANDING THE STIGMA AND PRIVACY MANAGEMENT OF CELEBRITIES IN GHANA</b>

Lyzbeth Safoah King (19068290) 11 July 2024 (has links)
<p dir="ltr">Like physical health, mental health is equally critical. However, the symptoms of some mental health disorders coupled with how some individuals understand mental health have generated a stigma on mental health disorders. This stigma makes it uncomfortable for people to discuss mental health. Guided by communication privacy management and stigma management communication theories, the study explored how Ghanaian celebrities disclose or not disclose their mental health disorders considering that there is a stigma that is linked to mental health disorders. Twenty individual interviews were conducted with Ghanaian celebrities. Data were analyzed using a phronetic iterative approach (Tracy, 2020). Data revealed a variety of disclosure patterns that I categorized into non-traditional and traditional disclosures. Some emerging CPM patterns include masked and sequential disclosure. Further, Ghanaian celebrities use different strategies like praying to manage the stigma stemming from mental illness. Collectively, these findings extend both communication privacy and stigma management communication theories by revealing new patterns of disclosure as well as strategies for managing the stigma associated with mental illness. More theoretical contributions and practical implications of the findings are discussed in depth.</p>
25

TEACHER DISCLOSURE: DEVELOPING PRIVACY RULES, MANAGING BOUNDARIES AND BUILDING RELATIONSHIPS

Kaufmann, Renee Monique 01 January 2011 (has links)
The roles and responsibilities of middle school teachers are never ending. From instructing students on state-mandated curriculum to the enrichment of character and inquiry, teachers make daily decisions about how and what to disclose to their students. The current study reexamines Hosek and Thompson’s (2009) study on how teachers develop privacy rules and coordinate boundaries using Petronio’s Communication Privacy Management as the theoretical framework. Studying middle school teachers, in lieu of college instructors, allows for a better understanding of how privacy rules and boundaries are constructed and used within the middle school. This provides a better understanding of the important factors that influence teachers’ communicative decision making within the classroom.
26

On digital forensic readiness for information privacy incidents

Reddy, Kamil 26 September 2012 (has links)
The right to information privacy is considered a basic human right in countries that recognise the right to privacy. South Africa, and other countries that recognise this right, offer individuals legal protections for their information privacy. Individuals, organisations and even governments in these countries often have an obligation under such laws to protect information privacy. Large organisations, for example, multinational companies and government departments are of special concern when it comes to protecting information privacy as they often hold substantial amounts of information about many individuals. The protection of information privacy, therefore, has become ever more significant as technological advances enable information privacy to be breached with increasing ease. There is, however, little research on holistic approaches to protecting information privacy in large organisations. Holistic approaches take account of both technical and non-technical factors that affect information privacy. Nontechnical factors may include the management of information privacy protection measures and other factors such as manual business processes and organisational policies. Amongst the protections that can be used by large organisations to protect information privacy is the ability to investigate incidents involving information privacy. Since large organisations typically make extensive use of information technology to store or process information, such investigations are likely to involve digital forensics. Digital forensic investigations require a certain amount of preparedness or readiness for investigations to be executed in an optimal fashion. The available literature on digital forensics and digital forensic readiness (DFR), unfortunately, does not specifically deal with the protection of information privacy, which has requirements over and above typical digital forensic investigations that are more concerned with information security breaches. The aim of this thesis, therefore, is to address the lack of research into DFR with regard to information privacy incidents. It adopts a holistic approach to DFR since many of the necessary measures are non-technical. There is, thus, an increased focus on management as opposed to specific technical issues. In addressing the lack of research into information privacy-specific DFR, the thesis provides large organisations with knowledge to better conduct digital forensic investigations into information privacy incidents. Hence, it allows for increased information privacy protection in large organisations because investigations may reveal the causes of information privacy breaches. Such breaches may then be prevented in future. The ability to conduct effective investigations also has a deterrent effect that may dissuade attempts at breaching information privacy. This thesis addresses the lack of research into information privacy-specific DFR by presenting a framework that allows large organisations to develop a digital forensic readiness capability for information privacy incidents. The framework is an idealistic representation of measures that can be taken to develop such a capability. In reality, large organisations operate within cost constraints. We therefore also contribute by showing how a cost management methodology known as time-driven activity-based costing can be used to determine the cost of DFR measures. Organisations are then able to make cost versus risk decisions when deciding which measures in the framework they wish to implement. Lastly, we introduce the concept of a digital forensics management system. The management of DFR in a large organisation can be a difficult task prone to error as it involves coordinating resources across multiple departments and organisational functions. The concept of the digital forensics management system proposed here allows management to better manage DFR by providing a central system from which information is available and control is possible. We develop an architecture for such a system and validate the architecture through a proof-of-concept prototype. / Thesis (PhD)--University of Pretoria, 2012. / Computer Science / unrestricted
27

Grounds-Based and Grounds-Free Voluntarily Child Free Couples: Privacy Management and Reactions of Social Network Members

Regehr, Kelly A. 05 1900 (has links)
Voluntarily child free (VCF) individuals face stigmatization in a pronatalist society that labels those who do not want children as deviant. Because of this stigmatization, VCF couples face privacy issues as they choose to reveal or conceal their family planning decision and face a variety of reactions from social network members. Therefore, communication privacy management and communication accommodation theory was use to examine this phenomenon. Prior research found two different types of VCF couples: grounds-based and grounds-free. Grounds-based individuals cite medical or biological reasons for not having children, while grounds-free individuals cite social reasons for not having children. The purpose of this study is to examine how grounds-based and grounds-free VCF couples manage their disclosure of private information and how social network members react to their family planning decision. Findings revealed that grounds-free individuals are more likely to engage in the self-defense hypothesis and grounds-based individuals are more likely to engage in the expressive need hypothesis. Grounds-based individuals were asked about their decision in dyadic situations, whereas grounds-free individuals were asked at group gatherings. Additionally, social network members used under-accommodation strategies the most frequently and grounds-free individuals experienced more name calling than grounds-based. Finally, while grounds-free individuals experienced non-accommodation and over-accommodation strategies, grounds-based did not. Findings suggest that grounds-free individuals are more stigmatized by social network members. Implications for merging CPM and CAT are discussed.
28

Negotiating Boundaries in a Globalized World: Communication Privacy Management between Foreign English Teachers and Japanese Co-workers in Japan

Simmons, Nathaniel 24 September 2014 (has links)
No description available.
29

有影無隱?影音傳播隱私管理測量研究:以影音社交網站YouTube為例 / Tug of War, to Vlog or Not to Vlog? An Exploratory Measure Study of Communication Privacy Management Theory in Video Disclosure and Privacy: Take Online Social Networking Site YouTube for Instance

鍾佩君, Chung, Pei Chun Unknown Date (has links)
本研究應用Petronio的傳播隱私管理理論(CPM),探討在影音社交網站YouTube的情境中,使用者在資訊揭露與隱私之間的緊張關係,試圖了解使用者在影音社交網站YouTube情境中的隱私管理是如何,並從使用者的性別、使用動機、網路使用經驗、感知匿名/辨識、及感知風險程度的隱私考量,探討是否會對使用者在影音社交網站YouTube情境的隱私管理有所影響。 本研究嘗試從初探性的角度,針對上傳自己影音的使用者,發展出測量YouTube上傳自己影音的隱私測量量表在於了解目前使用者的使用現狀,而什麼樣的影響因素,會影響到這些使用者在上傳影音時的隱私管理行為,以供未來研究做為參考與指教。 本文完成有效樣本共有617位使用者,其中包含527位有上傳過自己影音的使用者,90位沒有上傳過自己影音的使用者;研究發現女性使用者會比男性使用者揭露較少,且個人資訊連結較少;而愈沒有消遣娛樂使用動機的使用者,對於個人資訊界線控制會愈多;具有自我表現使用動機的使用者,對於個人資訊揭露程度就會愈多,而不愈具有消遣娛樂使用動機的使用者,個人資訊連結會愈多,具有自我表現使用動機的使用者,個人資訊連結就會愈多。 此外在使用者自我感知與各自隱私管理行為之間關係中,發現上傳影音的使用者,不會因為個人內容所感知到的風險程度,而進行自我資訊控制等隱私管理行為;反而會因為從他人的影音內容中辨識出他人,以及因為外在環境感知到的風險程度,而進行自我資訊控制以及自我資訊揭露程度行為的隱私管理。 / This study applies Petronio’s Communication Privacy Management theory to explore how YouTubers manage their disclosure in YouTube videos; whether YouTubers’ gender, motivation, internet experience, the degree of perceived identification and perceived risk have any impact on their privacy management behaviors in social networking site, YouTube. In addition, this study uses Child, Pearson & Petronio’s (2008) WPMM scale as reference; attempts to create an explanatory scale to measure YouTubers’ privacy concern and management for future research. There are 617 YouTubers completed an online survey, including 527 YouTubers who have their video available in YouTube and 90 YouTubers who do not have their video available in YouTube. Results show female YouTubers disclose their personal information much less than male and have less linkage behavior. As for YouTubers’ motivation, users who do not regard using YouTube as entertainment will control their information; and users who often present themselves in YouTube will disclose their information. Additionally, users being used to presenting themselves will open more access and linkage to their personal information. What’s more, YouTubers who can identify others from their own videos and perceive threat or risk from internet environment have the tendency to have their information controlled and limited, not to disclose more personal information and disallow others have the access to their video in YouTube. Following the results of the present study, suggestions for future research in the online management of privacy, especially in YouTube context, are also listed and discussed.
30

The Management of Privacy Boundaries for People with Visible Disabilities

McAloon, Erin P. January 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / People who have disabilities that are visible often manage the boundaries around private information regarding their disability (Braithwaite, 1991) because the choice becomes how much should be revealed. The purpose of this study is to use Communication Privacy Management (CPM) theory to explore the way people who have a visible disability manage privacy boundaries in communicative interactions and also the way the boundaries around private information are managed over time. The study was conducted through in-depth interviews with seven individuals who have a visible disability about their experiences in managing private information. The individuals described experiences both among other people with a visible disability and with people do not have a disability. Results from a thematic analysis revealed the presence of five main themes and several sub-themes.

Page generated in 0.0582 seconds