首页 | 本学科首页   官方微博 | 高级检索  
     


Blogging privacy rule orientations,privacy management,and content deletion practices: The variability of online privacy management activity at different stages of social media use
Authors:Jeffrey T Child  Paul M Haridakis  Sandra Petronio
Affiliation:1. Kent State University, School of Communication Studies, PO Box 5190, Kent, OH 44242, United States;2. Department of Communication, IU School of Medicine, Indiana University – Purdue University Indianapolis, United States
Abstract:The purpose of this study was to examine social media users’ blogging privacy rule orientations, privacy management regulation, and content deletion practices as distinct types of activity occurring at different stages of the blogging process (before, during, and after blogging) that may aid in understanding the functioning of blogging disclosure activity overall. The study was guided by a complementary application of both the uses and gratifications perspective and communication privacy management (CPM) theory. A central tenet of both theories suggests that people are variably active in their communication behavior. We identified five discrete blogger privacy rule orientations explaining different online choice-making practices: the self-centric, the utilitarian, the planner, the protector, and the unworried orientations toward blogging. We also identified six different motives for deleting previously-posted information: conflict management, protection of personal identity/safety, fear of retribution, employment security, impression management, emotional regulation, and relational cleansing. Path analysis revealed several direct and indirect paths among bloggers’ motives for deleting previously posted material and their level of disinhibition, blogging privacy rule orientations, amount of time blogging, and privacy management practices. As use of social media increases, exploring variations in privacy management regulation practices is critical.
Keywords:Communication privacy management (CPM) theory  Media use activity  Blogging  Social media  Uses and gratifications  Deletion motives
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号