scispace - formally typeset
Search or ask a question
Journal IssueDOI

Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure

TL;DR: The Blogging Privacy Management Measure (BPMM) is a multidimensional, valid, and reliable construct and could explore the influence of family values about privacy on blogging privacy rule management.
Abstract: This study applied Communication Privacy Management (CPM) theory to the context of blogging and developed a validated, theory-based measure of blogging privacy management. Across three studies, 823 college student bloggers completed an online survey. In study one (n = 176), exploratory and confirmatory factor analysis techniques tested four potential models. Study two (n = 291) cross-validated the final factor structure obtained in the fourth model with a separate sample. Study three (n = 356) tested the discriminant and predictive validity of the measure by comparing it to the self-consciousness scale. The Blogging Privacy Management Measure (BPMM) is a multidimensional, valid, and reliable construct. Future research could explore the influence of family values about privacy on blogging privacy rule management. © 2009 Wiley Periodicals, Inc.
Citations
More filters
Journal ArticleDOI
TL;DR: A research model suggests that an individual’s privacy concerns form through a cognitive process involving perceived privacy risk, privacy control, and his or her disposition to value privacy, and individuals’ perceptions of institutional privacy assurances are posited to affect the riskcontrol assessment from information disclosure.
Abstract: Organizational information practices can result in a variety of privacy problems that can increase consumers’ concerns for information privacy. To explore the link between individuals and organizations regarding privacy, we study how institutional privacy assurances such as privacy policies and industry self-regulation can contribute to reducing individual privacy concerns. Drawing on Communication Privacy Management (CPM) theory, we develop a research model suggesting that an individual’s privacy concerns form through a cognitive process involving perceived privacy risk, privacy control, and his or her disposition to value privacy. Furthermore, individuals’ perceptions of institutional privacy assurances -namely, perceived effectiveness of privacy policies and perceived effectiveness of industry privacy self-regulation -are posited to affect the riskcontrol assessment from information disclosure, thus, being an essential component of privacy concerns. We empirically tested the research model through a survey that was administered to 823 users of four different types of websites: 1) electronic commerce sites, 2) social networking sites, 3) financial sites, and 4) healthcare sites. The results provide support for the majority of the hypothesized relationships. The study reported here is novel to the extent that existing empirical research has not explored the link between individuals’ privacy perceptions and institutional privacy assurances. We discuss implications for theory and practice and provide suggestions for future research.

518 citations

Journal ArticleDOI
TL;DR: In this article, the authors present the evidenced-based theory of communication privacy management (CPM) and corresponding research on family privacy regulation that provides a road map to understand the multifaceted nature of managing private information.
Abstract: For families, managing private information is challenging. Family members reveal too much, they allow more privacy access to outsiders than others desire, parents attempt to negotiate Internet disclosures with their teens, and family health issues often change the way private information is defined altogether. The complexities of privacy regulation call for a systematic way to grasp how privacy management operates in families. This article presents the evidenced-based theory of communication privacy management (CPM) and corresponding research on family privacy regulation that provides a road map to understand the multifaceted nature of managing private information (Petronio, 2002). The article discusses contributions of CPM to conceptualizing privacy in meaningful ways, along with current research trends and future directions for CPM research and theorizing.

276 citations

Journal ArticleDOI
TL;DR: In this article, the authors developed and tested the tenets of the Communication Privacy Management (CPM) theoretical perspective, and developed a corpus of predictions from the CPM theoretical perspective.
Abstract: Over the last 35 years I have worked with gifted colleagues to develop and test the tenets of the Communication Privacy Management (CPM) theoretical perspective. 1 To date, a corpus of predictions ...

171 citations

Proceedings Article
01 Dec 2012
TL;DR: A 9-item scale was shown to reasonably represent the dimensionality of mobile users' information privacy concerns (MUIPC), categorized as perceived surveillance, perceived intrusion, and secondary use of personal information.
Abstract: The evolution of mobile network technologies and smartphones has provided mobile consumers with unprecedented access to Internet and value-added services while on the move. Privacy issues in such context become critically important because vendors may access a large volume of personal information. Although several pioneering studies have examined general privacy risks, few systematic attempts have been made to provide a theory-driven framework on the specific nature of privacy concerns among mobile consumers. To fill the gap in the literature, this article introduced a 9-item scale, which was shown to reasonably represent the dimensionality of mobile users' information privacy concerns (MUIPC), categorized as perceived surveillance, perceived intrusion, and secondary use of personal information. Through a survey study (n=310), the three-factor structure of MUIPC as revealed in exploratory factor analysis was further confirmed through confirmatory factor analysis. Further analysis revealed that the second-order model of MUIPC performed better than its first-order model.

152 citations


Cites background from "Blogging, communication, and privac..."

  • ...…Intrusion In CPM, ownership rules capture the extent to which the original owner of private information (i.e., data subjects) assumes that co-owners (i.e., data recipients) are able to make independent decisions about further possessing or soliciting information (Child et al. 2009; Petronio 2010)....

    [...]

  • ...Typically, when individuals are provided with a significant amount of control over information disclosure, they create boundary structures that reduce the amount of information collection by others or they establish boundaries with low permeability (Child et al. 2009; Petronio 2010)....

    [...]

Journal ArticleDOI
TL;DR: The findings indicate that during technology-mediated communication on social network sites, not only do traditional privacy factors relate to the technological boundaries people enact, but people's experiences with the mediating technology itself do, too.

149 citations

References
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors provide guidance for substantive researchers on the use of structural equation modeling in practice for theory testing and development, and present a comprehensive, two-step modeling approach that employs a series of nested models and sequential chi-square difference tests.
Abstract: In this article, we provide guidance for substantive researchers on the use of structural equation modeling in practice for theory testing and development. We present a comprehensive, two-step modeling approach that employs a series of nested models and sequential chi-square difference tests. We discuss the comparative advantages of this approach over a one-step approach. Considerations in specification, assessment of fit, and respecification of measurement models using confirmatory factor analysis are reviewed. As background to the two-step approach, the distinction between exploratory and confirmatory analysis, the distinction between complementary approaches for theory testing versus predictive application, and some developments in estimation methods also are discussed.

34,720 citations

Journal ArticleDOI
TL;DR: Models are proposed that show how organizations can be designed to meet the information needs of technology, interdepartmental relations, and the environment to both reduce uncertainty and resolve equivocality.
Abstract: This paper answers the question, "Why do organizations process information?" Uncertainty and equivocality are defined as two forces that influence information processing in organizations. Organization structure and internal systems determine both the amount and richness of information provided to managers. Models are proposed that show how organizations can be designed to meet the information needs of technology, interdepartmental relations, and the environment. One implication for managers is that a major problem is lack of clarity, not lack of data. The models indicate how organizations can be designed to provide information mechanisms to both reduce uncertainty and resolve equivocality.

8,674 citations

Book
01 Mar 1997
TL;DR: This ebook offers full option of this ebook in doc, DjVu, PDF, ePub, txt forms, and on the site you can reading the instructions and other artistic eBooks online, either download them as well.
Abstract: If looking for the book by Karl G. Joreskog Lisrel 8: User's Reference Guide in pdf format, then you've come to the faithful website. We furnish full option of this ebook in doc, DjVu, PDF, ePub, txt forms. You may read Lisrel 8: User's Reference Guide online by Karl G. Joreskog or download. In addition, on our site you can reading the instructions and other artistic eBooks online, either download them as well. We will to draw regard that our site not store the eBook itself, but we give ref to site where you can downloading either reading online. So if need to download pdf by Karl G. Joreskog Lisrel 8: User's Reference Guide, then you have come on to the loyal website. We own Lisrel 8: User's Reference Guide ePub, DjVu, doc, PDF, txt forms. We will be glad if you will be back over.

5,976 citations

Journal ArticleDOI
TL;DR: The authors reviewed the history of computer mediated communication and found that impersonal communication is sometimes advantageous, and strategies for the intentional depersonalization of media use are inferred, with implications for Group Decision Support Systems effects.
Abstract: While computer-mediated communication use and research are proliferating rapidly, findings offer contrasting images regarding the interpersonal character of this technology. Research trends over the history of these media are reviewed with observations across trends suggested so as to provide integrative principles with which to apply media to different circumstances. First, the notion that the media reduce personal influences—their impersonal effects—is reviewed. Newer theories and research are noted explaining normative “interpersonal” uses of the media. From this vantage point, recognizing that impersonal communication is sometimes advantageous, strategies for the intentional depersonalization of media use are inferred, with implications for Group Decision Support Systems effects. Additionally, recognizing that media sometimes facilitate communication that surpasses normal interpersonal levels, a new perspective on “hyperpersonal” communication is introduced. Subprocesses are discussed pertaining to re...

4,401 citations

Journal ArticleDOI
TL;DR: Greater use of the Internet was associated with declines in participants' communication with family members in the household, declines in the size of their social circle, and increases in their depression and loneliness.
Abstract: The Internet could change the lives of average citizens as much as did the telephone in the early part of the 20th century and television in the 1950s and 1960s. Researchers and social critics are debating whether the Internet is improving or harming participation in community life and social relationships. This research examined the social and psychological impact of the Internet on 169 people in 73 households during their first 1 to 2 years on-line. We used longitudinal data to examine the effects of the Internet on social involvement and psychological well-being. In this sample, the Internet was used extensively for communication. Nonetheless, greater use of the Internet was associated with declines in participants' communication with family members in the household, declines in the size of their social circle, and increases in their depression and loneliness. These findings have implications for research, for public policy and for the design of technology.

4,091 citations