کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
351015 618461 2017 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Blog scrubbing: Exploring triggers that change privacy rules
ترجمه فارسی عنوان
وبلاگ شستشو: بررسی محرک است که تغییر قوانین حریم خصوصی
کلمات کلیدی
افشا؛ سازگاری حکومت حریم خصوصی؛ وبلاگ نویسی؛ ارتباطات حریم مدیریت (CPM) نظریه؛ وبلاگ نویسی محرک حکومت حریم خصوصی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نرم افزارهای علوم کامپیوتر
چکیده انگلیسی

An increasing number of individuals of all ages maintain important interpersonal relationships through blogs. Wide variation exists in how people disclose and manage their privacy on these blogs, particularly concerning the choices made about leaving information permanently visible on blogs or retrieving it sometime after an initial posting. This study applies Communication Privacy Management (CPM) theory to explore the process of privacy rule adaptation for blogging by examining situations that have triggered bloggers to change their privacy rules to enact blog post deletion practices (“blog scrubbing”). Overall, open-ended responses from 356 bloggers were content analyzed. Chi-square analysis revealed differences in the frequency of triggers that changed the blogging post privacy rules and the proactive versus reactive nature of blogging privacy management deletion practices. Bloggers’ critical incidents that activate privacy rule changes demonstrate that impression management triggers, personal safety identity triggers, relational triggers, and legal/disciplinary triggers resulted in greater alteration of individual privacy rules used to protect these bloggers from the privileged online community of individuals granted access to an individual’s blog. Thus, bloggers essentially “scrubbed” their blog site and adapted their typical privacy rules with new ones that better protected them from the online community regarding that particular blogged information.


► Deletion types: impression mgmt, personal identity/safety, relational, and legal/disciplinary triggers.
► More participants made impression mgmt and personal identity/safety deletions.
► Fewer participants never made deletions, allowing privacy rules to remain intact.
► Privacy rule adaptations were more often proactive versus reactive deletion practices.
► Bloggers often recalibrate their privacy rules through post deletion practices.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers in Human Behavior - Volume 27, Issue 5, September 2011, Pages 2017–2027
نویسندگان
, , , ,