Altman [4, cf. 24], Derlega and Chaikin [11] and Petronio [27] have elaborated privacy as a boundary regulation process. This analysis in this paper will draw primarily on Petronio's theory of Communications Privacy Management (hereafter, CPM). According to Petronio, CPM is an iterative process of rule development, boundary coordination, and boundary turbulence. Rule development is the process of developing regulation about who to tell what. These regulations guide our everyday disclosures, and are a function of context and disclosure goals. As ties of differing strength have varying disclosure norms, we operationalize rule development as a function of network composition. For example, a network that is more heavily focused on strong ties may require higher levels of privacy, as disclosures among strong ties are more personal in nature [33]. Boundary coordination refers to the process of developing and applying disclosure ownership and permeability rules in one's network. A disclosure about a medical condition to a trusted friend, for example, may be considered non- permeable (the friend is not expected to share the news with others), whereas office gossip may be permeable (communicants have expectancy of third-party transmission). We test boundary coordination by looking at the effect a communications expectancy violation, in which disclosure is perceived to escape one's intended audience. An individual who has experienced such a violation may coordinate boundaries through the use of enhanced privacy settings. Finally, boundary turbulence refers to the
dynamic process of maintaining and negotiating boundaries to manage personal disclosures [27]. We operationalize boundary turbulence as a function of interpersonal privacy management in the social network site. In the following research, we test each stage of the CPM process using demographic, network, and behavioral data. We believe that each stage of the CPM process can be uniquely supported in HCI, and our goal is to identify and prioritize the most salient stages of CPM for developers of privacy systems.
Altman [4, cf. 24], Derlega and Chaikin [11] and Petronio [27] have elaborated privacy as a boundary regulation process. This analysis in this paper will draw primarily on Petronio's theory of Communications Privacy Management (hereafter, CPM). According to Petronio, CPM is an iterative process of rule development, boundary coordination, and boundary turbulence. Rule development is the process of developing regulation about who to tell what. These regulations guide our everyday disclosures, and are a function of context and disclosure goals. As ties of differing strength have varying disclosure norms, we operationalize rule development as a function of network composition. For example, a network that is more heavily focused on strong ties may require higher levels of privacy, as disclosures among strong ties are more personal in nature [33]. Boundary coordination refers to the process of developing and applying disclosure ownership and permeability rules in one's network. A disclosure about a medical condition to a trusted friend, for example, may be considered non- permeable (the friend is not expected to share the news with others), whereas office gossip may be permeable (communicants have expectancy of third-party transmission). We test boundary coordination by looking at the effect a communications expectancy violation, in which disclosure is perceived to escape one's intended audience. An individual who has experienced such a violation may coordinate boundaries through the use of enhanced privacy settings. Finally, boundary turbulence refers to thedynamic process of maintaining and negotiating boundaries to manage personal disclosures [27]. We operationalize boundary turbulence as a function of interpersonal privacy management in the social network site. In the following research, we test each stage of the CPM process using demographic, network, and behavioral data. We believe that each stage of the CPM process can be uniquely supported in HCI, and our goal is to identify and prioritize the most salient stages of CPM for developers of privacy systems.
การแปล กรุณารอสักครู่..
