首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
A growing number of Americans are living with chronic health conditions that require informal, ongoing care from family members who are also in the paid labor force. In this exploratory study, communication privacy management is used to make sense of chronic caregiving (N = 48–64) and noncaregiving (N = 174–178) employees’ disclosure preferences, intentions, and behaviors in the workplace. We find that workers in general anticipate that they would disclose to many individuals at work about their caregiving, but employees actually disclose much less information to far fewer people at work when they occupy the chronic caregiver role. For chronic caregivers, positive perceptions about coworker supportiveness predict increased disclosure behaviors. Finally, future research directions as employers, workers, and policy makers prepare for the complex challenges associated with negotiating paid work and unpaid chronic caregiving are provided.  相似文献   

2.
This study combines the fever model with communication privacy management to examine the conditions under which military wives are likely to disclose their family stressors or engage in protective buffering with their deployed husbands. Military wives (N =105) whose husbands were deployed and who had at least one child completed a web-based survey about the communication of family stressors during deployment. Protective buffering was associated with negative health symptoms, and disclosure was related to marital satisfaction. Wives' perceptions that their husbands were in dangerous situations as well as their perceptions that husbands were supportive of their disclosures were both related to protective buffering and disclosure.  相似文献   

3.
In this study, communication privacy management theory (CPM) provides a theoretical framework for investigating the development of privacy rules and strategies for females disclosing a minority sexual identity (MSI) in the workplace. Analysis of in-depth interviews indicated that participants’ rules were influenced primarily by role and relational risk evaluations. Findings nuance CPM’s conceptualization of role risk to identify 3 variations: risk to employment status, professional image, and ability to complete tasks. In addition, connections between workplace relational and role risks and how gender identities influence risk assessments and disclosure are demonstrated. Despite risk, participants disclosed personal information at work and often did so utilizing implicit disclosure strategies in everyday interactions to test confidants’ reactions and normalize their MSI in the workplace.  相似文献   

4.
Pregnancy loss due to miscarriage is a pervasive health issue. Although talking about the miscarriage experience with friends and family members has been linked to better adjustment, revealing this loss can be difficult because discussing a miscarriage often makes people uncomfortable. Moreover, couples often manage this information jointly as they decide whether to share the miscarriage with people outside the dyad. We conducted in-depth interviews with couples to explore the nature of co-ownership in the miscarriage context and to identify the privacy rules that couples develop to manage this information. We found that couples frame miscarriage as a shared but distinct experience and that both members exert rights of ownership over the information. Couples' privacy rules centered on issues of social support and others' need to know about the loss. Even though couples described their privacy rules as implicitly understood, they also recalled having explicit conversations to develop rules. We discuss how the management of co-owned information can improve communication and maintain relationships.  相似文献   

5.
Alcohol-related posts on social-networking sites (SNS) can damage college students’ reputations and relationships and contribute to risky behavior. However, little is known about how college drinkers engage in privacy management involving alcohol content. Through 48 interviews and a Communication Privacy Management lens, this study uncovered criteria on which students relied to develop relatively impermeable boundaries around alcohol posts, the ways they collectively negotiated privacy with peers, and how participants implicitly and explicitly communicatively negotiated privacy turbulence. Findings suggest important connections between the co-occurrence of online privacy management and identity management, including how facework is involved in remediating privacy breaches and the co-opting of privacy. Findings also inform efforts to educate college drinkers about on-and-offline strategies to manage alcohol-related SNS content.  相似文献   

6.
Ethnic identity (EI) has long been known to supersede race as a predictor for attitudes and behaviors. However, little is known about the constituent parts that comprise and influence ethnic identity. In order to improve communications that target EI, we examine both demographic and communication variables to determine which have a greater pull on people’s attitudes and actions. Race appears to moderate the effects of age on ethnic identity, whereby age was negatively related to ethnic-identity exploration among White participants and positively related to ethnic identity commitment among Black participants (< .05). Having a higher income, print-media use, and information-engagement orientation were also positively correlated with ethnic identity; education and gender were not. Implications and future directions are discussed.  相似文献   

7.
Grounded in the communication theory of identity, the present study explores how adoptive identity—an individual's understanding of what it means to be an adopted person—is influenced by the relational layer of his or her adoptive and birth family relationships. Seven focus group interviews were conducted in which participants were prompted to engage in a dialog about their experiences as an adopted individual. Analyses revealed that adoptees' relational identity with both their adoptive and birth families contributed in meaningful ways to their adoptive identity, but these relationships at times come into conflict with one another and with the adoptees' personal layer of identity, generating relational–relational and personal–relational identity gaps.  相似文献   

8.
《Communication monographs》2012,79(3):344-365
This three-part study examines how privacy rules function to protect shared information from further revelation. Communication Privacy Management served as a theoretical framework to investigate issues related to boundary management. In the pilot study, college students (N = 409) described privacy rules and their use, and participants reported not further revealing the information when privacy rules were expressed by disclosers. In Study 1, participants (N = 167) reported on disclosing health-related information, and participants did not anticipate that recipients would further reveal especially when they used a privacy rule. In Study 2, dyads (dyad N = 257) reported on shared disclosure experiences, including both anticipated and actual boundary management. Study 2 findings include that privacy rules have limited effectiveness. The article discusses implications of privacy rule use when sharing private information.  相似文献   

9.
The present study explores practitioner perceptions of and observations about the adoptive parent, birth parent, and adoptee interactions that regulate open adoption relationships. Grounded in family systems theory, practitioner interviews (N = 19) were analyzed to understand the degree to which open adoption shapes the family system as well as the opportunities, challenges, and considerations experienced by individuals in open adoption. Findings reveal that open adoption relationships consist of numerous complex relationships. This complexity generates significant opportunities for connection. At the same time, the complexity of the system generates challenges. Social networking provides costs and rewards that require consideration on an individual basis. Findings offer implications for the utility of family systems theory in illuminating diverse family construction as well as open adoption communication research.  相似文献   

10.
Based on traditional theories of interpersonal relationship development and on the hyperpersonal communication theory, this study examined predictors of relationship satisfaction for individuals involved in online romantic relationships. One hundred-fourteen individuals (N = 114) involved in online romantic relationships, and who had only engaged in computer-mediated communication (CMC) with their partners, completed an online questionnaire about their relationships. Intimacy, trust, and communication satisfaction were found to be the strongest predictors of relationship satisfaction for individuals involved in online romances. Additionally, perceptions of relationship variables differed depending on relationship length and time spent communicating. Implications for interpersonal and hyperpersonal communication theories, and future investigation of online relationships, are discussed.  相似文献   

11.
Guided by Communication Privacy Management (CPM), the goal of the current study was to examine parental infidelity and to learn what, if any, rules were enacted by participants to either provide access to or protect the information of their parent's infidelity. Rules used by participants to manage this information inside their family were labeled as internal, while rules used to manage this information outside their family were labeled as external. Participants included 13 adult children whose still married parents' relationship involved infidelity. Results indicated that participants created protection rules including two internal (maintenance and cultural) rules and one external (protecting the family from outside scrutiny) rule. Five access rules (context, sex, age, physical environment, and code terms), all internal, were also identified. The results of this study highlight the usefulness of CPM when examining how the knowledge of a parent's infidelity is managed by their children.  相似文献   

12.
This study examined adolescents' and young adults' use of topic avoidance with their mothers, fathers, stepmothers, and stepfathers. The types of topics avoided differed according to the type of parent-child relationship. Specifically, adolescents and young adults engaged in the most topic avoidance with their stepparents (regardless of whether the stepparent was a stepmother or stepfather), followed by their fathers, and then their mothers. Quantitative measures indicated that sex was the most frequently avoided topic across all relationship types. Open-ended responses revealed additional commonly avoided topics, including talking about the other parent/family, deep conversations, and money (e.g., child support payments). The most frequently reported reasons for this avoidance were self protection, relationship protection, and conflict. This research suggests that children in stepfamilies face unique decisions about topic avoidance. Communication Boundary Management Theory (Petronio, 1991) was used to explain how adolescents and young adults might engage in topic avoidance to regulate their personal boundaries, constructing relatively impermeable boundaries with some adults while maintaining looser boundaries with others. Finally, numerous practical suggestions are offered for understanding the balance between openness and closedness in stepfamilies and for promoting healthy stepfamily functioning.  相似文献   

13.
Lesbian, gay, and bisexual (LGB) adolescents are avid users of computer-mediated communication (CMC), but few empirical studies have investigated the function of CMC in the lives of LGB youth. Grounded in the media practice model, the present study explored the relationships among CMC, sexual identity commitment, and well-being by surveying LGB adolescents (N = 570). Results indicated that a positive relationship existed between time spent on social network sites and well-being that was mediated by sexual identity commitment. Time spent instant messaging, sending/receiving e-mail, or in chat rooms was not related to sexual identity commitment or well-being. Social network sites may aid LGB youth in understanding their sexual identities in ways that other CMC modalities cannot.  相似文献   

14.
This study explored relationships between argumentativeness and collectivism/individualism in Finland and the United States. Data were gathered in the United States (n = 412) and Finland (n = 261). The analysis suggested: (a) collectivism was negatively correlated with argumentativeness, (b) individualism was positively correlated with argumentativeness, and (c) Finnish participants reported lower levels of argumentativeness than Americans. Cultural differences between the United States and Finland are discussed as reasons for the differences between the nations on argumentativeness.  相似文献   

15.
This study analyzed the discourse of a pro-anorexia website, prettythin.com. Narratives and posts were thematically analyzed using communication privacy management as a framework to understand the tension between revealing and concealing an eating disorder. Two themes were constructed during data analysis: (a) personal ownership and control, with the subtheme strategies for maintaining control and (b) communication choices surrounding disclosure and two subthemes, (i) seeking to fulfill needs face-to-face and (ii) positive fulfillment of needs online. Theoretical and practical contributions are addressed in terms of how communication theory can help understand people living with eating disorders. Specifically, how these individuals manage their personal information online and face-to-face and how prettythin.com provides support to men and women with eating disorders.  相似文献   

16.
SUMMARY

The privacy and confidentiality of library use are often at odds with efficiency in and customization of library public services. When librarians make decisions about services and privacy, they should consider strategic approaches to defining and discussing privacy and become familiar with the law of library privacy and their ethical commitment to privacy in library use. A wide range of library services and efficiencies threaten privacy and introduce the potential for secondary uses of personally identifying information collected by the library. Market failure for privacy weakens the value of consumer surveys and consent as substitutes for librarians' choices between privacy and services. Compromises such as those outlined by the ALA Intellectual Freedom Committee offer reasonable approaches to libraries and librarians struggling with the uncertainties that characterize the challenge of meeting both service and privacy interests.  相似文献   

17.
A growing aspect of e-government is healthcare-related. Although preventative e-health services provided by governments like proximity tracing applications (PTAs) can bring important benefits, their adoption is lagging behind expectations. Researchers and policymakers need a better understanding of the factors that influence their adoption. The paper draws from the Unified Theory of Acceptance and Use of Technology (UTAUT) model and extends it by including privacy concerns as an explanatory factor regarding the intention to use PTAs. The study empirically evaluates the impact of privacy concerns together with two of its antecedents – trust in government and trust in technology – on the intention to use a PTA. Data from 762 adult respondents from Slovenia and Germany were collected and analysed using partial least squares structural equation modelling (PLS-SEM). The main findings are: (1) even in the unique context of a PTA the universal predictors of UTAUT have a significant impact; (2) privacy concerns have a direct impact on intention to use; and (3) trust in government and trust in technology both have a significant impact on privacy concerns. The theoretical implications are important for technology adoption research on e-health services provided by the government generally and PTAs in particular.  相似文献   

18.
隐私权是信息时代的一项基本人权.文章在简要阐释欧盟隐私管理政策与体制的基础上,分别介绍了英、法、德、意等欧盟成员国各自关于隐私权问题的法律规定,并通过对比分析从中挖掘对我国档案隐私权问题的有益启示.  相似文献   

19.
This study examined gaps between students’ personal, enacted, relational, and communal identities. The particular interest was students’ intentions to leave the university as a function of their identity gaps, self-esteem, communication satisfaction, motivation, and general affect. Participants (N = 209 undergraduate students) completed self-report measures while reflecting on their communication with others at the university (e.g., faculty, staff, and peers). Results of path analysis models indicated that personal-communal identity gaps are predictive of students’ communication satisfaction, motivation, general affect, and their intentions to leave the university. This predictive ability is enhanced by the presence of personal-relational gaps.  相似文献   

20.
This study explores Facebook users’ management behaviors related to their—and their friends'—political communication via social media, utilizing the concepts of context collapse and self-presentation. A new two-factor measure of Facebook management was developed, pilot tested (N = 139) and implemented in a survey utilizing a national sample (N = 352) of individuals aged 18–29. Results indicated Facebook users are not generally engaging in the strategic management of political disclosures or the political content to which they are exposed. However, as network sizes increase, participants engage in more disclosure behaviors and make greater efforts to manage content exposure. Additionally, participants with strong political beliefs engage in more Facebook management behaviors, possibly indicating an effort to limit cognitive dissonance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号