Managing Between Privacy and Sharing in Group Anti Pelakor Indonesia

Augustin Mustika Chairil, Dwi Masrina

Abstract


Social behavioral change about privacy is phenomenon that we concern in internet user, especially in Anti Pelakor Indonesia (API) Facebook Group. This research studied about women managing private information in social media by observing how members of API Group interpreting of privacy and managing their privacy. This study focuses on the interactivity of members, the meaning of privacy, how manage privacy and what kind of factors make members choose to reveal their privacy in the group. Using a concept of privacy and theoretical approach to Communication Privacy Management (CPM), which is providing assumptions about the system to find out how humans balance decisions about reveal private information. Netnography method used to see virtual activities that occur in groups. The results of the study show that various factors influence the process of privacy disclosure. This research produces a description of how privacy management is carried out by the group members.


Keywords


Privacy, Social Media, Communication Privacy Management Theory, Netnography Study, Facebook Group

Full Text:

PDF

References


Altman, I. (1975). The Environment and Social Behavior : Privacy, Personal Space, Territory, Crowding. Monterey: Brooks/Cole Pub. Co. Retrieved from https://search.library.uq.edu.au/primo-explore/fulldisplay?vid=61UQ&docid=61UQ_ALMA2194000340003131〈=en_US&context=L

Bateman, P. J., Pike, J. C., & Butler, B. S. (2011). To disclose or not: Publicness in social networking sites. Information Technology and People, 24(1), 78–100. https://doi.org/10.1108/09593841111109431

Beam, M. A., Child, J. T., Hutchens, M. J., & Hmielowski, J. D. (2018). Context collapse and privacy management: Diversity in Facebook friends increases online news reading and sharing. New Media and Society, 20(7), 2296–2314. https://doi.org/10.1177/1461444817714790

Bute, J. J., Brann, M., & Hernandez, R. (2017). Exploring societal-level privacy rules for talking about miscarriage. Journal of Social and Personal Relationships, 36(2), 379–399. https://doi.org/10.1177/0265407517731828

Child, J. T., & Petronio, S. (2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. Computer-Mediated Communication in Personal Relationships, (February), 21–40.

Child, J. T., Petronio, S., Agyeman-Budu, E. A., & Westermann, D. A. (2011). Blog scrubbing: Exploring triggers that change privacy rules. Computers in Human Behavior, 27(5), 2017–2027. https://doi.org/10.1016/j.chb.2011.05.009

Coopamootoo, P. L., & Ashenden, D. (2011). A systematic evaluation of the communicability of online privacy mechanisms with respect to communication privacy management. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6770 LNCS(PART 2), 384–393. https://doi.org/10.1007/978-3-642-21708-1_44

Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83–108. https://doi.org/10.1111/j.1083-6101.2009.01494.x

Dennen, V. P., & Burner, K. J. (2017). Identity, context collapse, and Facebook use in higher education: putting presence and privacy at odds. Distance Education, 38(2), 173–192. https://doi.org/10.1080/01587919.2017.1322453

Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights, 3(January), 1725–1735.

Eaton, J., & Sanders, C. B. (2012). A little help from our friends: Informal third parties and interpersonal conflict. Personal Relationships, 19(4), 623–643. https://doi.org/10.1111/j.1475-6811.2011.01381.x

Greene, K., Derlega, V. J., Yep, G. A., & Petronio, S. (2003). Privacy and Disclosure of Hiv in interpersonal Relationships: A Sourcebook for Researchers and Practitioners (Routledge Communication Series). Retrieved from https://www.amazon.com/Privacy-Disclosure-interpersonal-Relationships-Practitioners/dp/0805836950

Honan, M. (2014). What Is Doxing? Retrieved November 18, 2019, from Wired.com website: https://www.wired.com/2014/03/doxing/

Jenkins, H., Ford, S., & Green, J. (2013). Creating Value and Meaning in a Networked Culture. New York: New York University Press.

Jiang, L., Miao, Y., Yang, Y., Lan, Z., & Hauptmann, A. G. (2014). Viral video style: A closer look at viral videos on YouTube. ICMR 2014 - Proceedings of the ACM International Conference on Multimedia Retrieval 2014, 193–200. https://doi.org/10.1145/2578726.2578754

Jin, S. A. A. (2012a). Peeling back the multiple layers of Twitter’s private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter. New Media and Society, 15(6), 813–833. https://doi.org/10.1177/1461444812471814

Jin, S. A. A. (2012b). “To disclose or not to disclose, that is the question”: A structural equation modeling approach to communication privacy management in e-health. Computers in Human Behavior, 28(1), 69–77. https://doi.org/10.1016/j.chb.2011.08.012

Jones, W. H., Freemon, J. E., & Goswick, R. A. (1981). The persistence of loneliness: Self and other determinants. Journal of Personality, 49(1), 27–48. https://doi.org/10.1111/j.1467-6494.1981.tb00844.x

Kemp, S. (2019). Digital 2019: Indonesia. Retrieved July 16, 2022, from datareportal website: https://datareportal.com/reports/digital-2019-indonesia

Kim, J., & Lee, J. E. R. (2011). The facebook paths to happiness: Effects of the number of Facebook friends and self-presentation on subjective well-being. Cyberpsychology, Behavior, and Social Networking, 14(6), 359–364. https://doi.org/10.1089/cyber.2010.0374

Kozinets, R. V. (2010). Netnography: Doing Ethnographic Research Online. London; Los Angeles; New Delhi; Singapore; Washington DC: Sage.

Lubis, E. E. (2014). Potret media sosial dan perempuan. Jurnal PARALLELA, 1(2), 101–102.

Luthfia, A., Triputra, P., & Hendriyani. (2019). Indonesian Adolescents’ Online Opportunities and Risks. Jurnal ASPIKOM, 4(1), 1. https://doi.org/10.24329/aspikom.v4i1.445

Maulana, Y. (2018). Ini Asal Usul Istilah Pelakor, Ternyata Istilah Itu Dipakai Jauh Sebelum Kasus Jennifer Dunn. Retrieved July 16, 2022, from TribunNews website: https://jabar.tribunnews.com/2018/02/21/ini-asal-usul-istilah-pelakor-ternyata-istilah-itu-dipakai-jauh-sebelum-kasus-jennifer-dunn#google_vignette

Mayer-Schönberger, V. (2011). Delete :The Virtue of Forgetting in the Digital Age. Princeton University Press. Retrieved from https://books.google.co.id/books/about/Delete.html?id=frumDwAAQBAJ&redir_esc=y

Metts, S., Braithwaite, D. O., & Fine, M. A. (2009). Hurt in postdivorce relationships. Feeling Hurt in Close Relationships, 336–356. https://doi.org/10.1017/CBO9780511770548.017

Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and Social Life. In Jurimetrics (Vol. 51). Retrieved from http://search.proquest.com.strauss.uc3m.es:8080/docview/913137931

Osatuyi, B., & Turel, O. (2018). Tug of war between social self-regulation and habit: Explaining the experience of momentary social media addiction symptoms. Computers in Human Behavior, 85, 95–105. https://doi.org/10.1016/j.chb.2018.03.037

Pederson, J. R., & McLaren, R. M. (2016). Managing information following hurtful experiences: How personal network members negotiate private information. Journal of Social and Personal Relationships, 33(7), 961–983. https://doi.org/10.1177/0265407515612242

Pennebaker, J. W. (1997). Writing about Emotional Experience as A Therapeutic Process. Psychological Science, 8(3), 91–153. https://doi.org/10.4324/9780429480676-4

Petronio, S. (2002). Boundaries of privacy: dialectics of disclosure. In Choice Reviews Online (Vol. 40). https://doi.org/10.5860/choice.40-4304

Sitepu, Y. S., & Rajagukguk, M. (2022). Digital Literacy Competence Survey in Medan City. Jurnal ASPIKOM, 7(1), 173. https://doi.org/10.24329/aspikom.v7i1.1067

Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., & Cranor, L. F. (2013). The post that wasn’t. 793. https://doi.org/10.1145/2441776.2441865

Smith, S. A., & Brunner, S. R. (2017). To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace. Management Communication Quarterly, 31(3), 429–446. https://doi.org/10.1177/0893318917692896

Stiles, W. B. (1987). “I have to talk to somebody”: A fever model of disclosure. Self-Disclosure: Theory, Research, and Therapy., pp. 257–282. Retrieved from http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=reference&D=psyc3&NEWS=N&AN=1987-98248-012

Tamir, D. I., & Mitchell, J. P. (2012). Disclosing information about the self is intrinsically rewarding. Proceedings of the National Academy of Sciences of the United States of America, 109(21), 8038–8043. https://doi.org/10.1073/pnas.1202129109

Taprial , V. & Kanwar, P. (2012). Understanding Social Media, United States: Ventus Publishing. Retrieved from https://www.akdistancelearning.net/resources_files/understanding-social-media.pdf

Trepte, S. (2016). Privacy Online: Perspective on Privacy andn Self Diclosure in the social web.

Vertical Rail. (2016). What Does Going Viral Mean? Retrieved June 15, 2022, from Vertical Rail website: https://www.verticalrail.com/kb/what-does-going-viral-mean/




DOI: http://dx.doi.org/10.24329/aspikom.v8i1.1148

Refbacks

  • There are currently no refbacks.


     


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License

Web Analytics