Managing Between Privacy and Sharing in Group Anti Pelakor Indonesia
Abstract
Social behavioral change about privacy is phenomenon that we concern in internet user, especially in Anti Pelakor Indonesia (API) Facebook Group. This research studied about women managing private information in social media by observing how members of API Group interpreting of privacy and managing their privacy. This study focuses on the interactivity of members, the meaning of privacy, how manage privacy and what kind of factors make members choose to reveal their privacy in the group. Using a concept of privacy and theoretical approach to Communication Privacy Management (CPM), which is providing assumptions about the system to find out how humans balance decisions about reveal private information. Netnography method used to see virtual activities that occur in groups. The results of the study show that various factors influence the process of privacy disclosure. This research produces a description of how privacy management is carried out by the group members.
Keywords
Full Text:
PDFReferences
Altman, I. (1975). The Environment and Social Behavior : Privacy, Personal Space, Territory, Crowding. Monterey: Brooks/Cole Pub. Co. Retrieved from https://search.library.uq.edu.au/primo-explore/fulldisplay?vid=61UQ&docid=61UQ_ALMA2194000340003131〈=en_US&context=L
Bateman, P. J., Pike, J. C., & Butler, B. S. (2011). To disclose or not: Publicness in social networking sites. Information Technology and People, 24(1), 78–100. https://doi.org/10.1108/09593841111109431
Beam, M. A., Child, J. T., Hutchens, M. J., & Hmielowski, J. D. (2018). Context collapse and privacy management: Diversity in Facebook friends increases online news reading and sharing. New Media and Society, 20(7), 2296–2314. https://doi.org/10.1177/1461444817714790
Bute, J. J., Brann, M., & Hernandez, R. (2017). Exploring societal-level privacy rules for talking about miscarriage. Journal of Social and Personal Relationships, 36(2), 379–399. https://doi.org/10.1177/0265407517731828
Child, J. T., & Petronio, S. (2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. Computer-Mediated Communication in Personal Relationships, (February), 21–40.
Child, J. T., Petronio, S., Agyeman-Budu, E. A., & Westermann, D. A. (2011). Blog scrubbing: Exploring triggers that change privacy rules. Computers in Human Behavior, 27(5), 2017–2027. https://doi.org/10.1016/j.chb.2011.05.009
Coopamootoo, P. L., & Ashenden, D. (2011). A systematic evaluation of the communicability of online privacy mechanisms with respect to communication privacy management. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6770 LNCS(PART 2), 384–393. https://doi.org/10.1007/978-3-642-21708-1_44
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83–108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
Dennen, V. P., & Burner, K. J. (2017). Identity, context collapse, and Facebook use in higher education: putting presence and privacy at odds. Distance Education, 38(2), 173–192. https://doi.org/10.1080/01587919.2017.1322453
Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights, 3(January), 1725–1735.
Eaton, J., & Sanders, C. B. (2012). A little help from our friends: Informal third parties and interpersonal conflict. Personal Relationships, 19(4), 623–643. https://doi.org/10.1111/j.1475-6811.2011.01381.x
Greene, K., Derlega, V. J., Yep, G. A., & Petronio, S. (2003). Privacy and Disclosure of Hiv in interpersonal Relationships: A Sourcebook for Researchers and Practitioners (Routledge Communication Series). Retrieved from https://www.amazon.com/Privacy-Disclosure-interpersonal-Relationships-Practitioners/dp/0805836950
Honan, M. (2014). What Is Doxing? Retrieved November 18, 2019, from Wired.com website: https://www.wired.com/2014/03/doxing/
Jenkins, H., Ford, S., & Green, J. (2013). Creating Value and Meaning in a Networked Culture. New York: New York University Press.
Jiang, L., Miao, Y., Yang, Y., Lan, Z., & Hauptmann, A. G. (2014). Viral video style: A closer look at viral videos on YouTube. ICMR 2014 - Proceedings of the ACM International Conference on Multimedia Retrieval 2014, 193–200. https://doi.org/10.1145/2578726.2578754
Jin, S. A. A. (2012a). Peeling back the multiple layers of Twitter’s private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter. New Media and Society, 15(6), 813–833. https://doi.org/10.1177/1461444812471814
Jin, S. A. A. (2012b). “To disclose or not to disclose, that is the question”: A structural equation modeling approach to communication privacy management in e-health. Computers in Human Behavior, 28(1), 69–77. https://doi.org/10.1016/j.chb.2011.08.012
Jones, W. H., Freemon, J. E., & Goswick, R. A. (1981). The persistence of loneliness: Self and other determinants. Journal of Personality, 49(1), 27–48. https://doi.org/10.1111/j.1467-6494.1981.tb00844.x
Kemp, S. (2019). Digital 2019: Indonesia. Retrieved July 16, 2022, from datareportal website: https://datareportal.com/reports/digital-2019-indonesia
Kim, J., & Lee, J. E. R. (2011). The facebook paths to happiness: Effects of the number of Facebook friends and self-presentation on subjective well-being. Cyberpsychology, Behavior, and Social Networking, 14(6), 359–364. https://doi.org/10.1089/cyber.2010.0374
Kozinets, R. V. (2010). Netnography: Doing Ethnographic Research Online. London; Los Angeles; New Delhi; Singapore; Washington DC: Sage.
Lubis, E. E. (2014). Potret media sosial dan perempuan. Jurnal PARALLELA, 1(2), 101–102.
Luthfia, A., Triputra, P., & Hendriyani. (2019). Indonesian Adolescents’ Online Opportunities and Risks. Jurnal ASPIKOM, 4(1), 1. https://doi.org/10.24329/aspikom.v4i1.445
Maulana, Y. (2018). Ini Asal Usul Istilah Pelakor, Ternyata Istilah Itu Dipakai Jauh Sebelum Kasus Jennifer Dunn. Retrieved July 16, 2022, from TribunNews website: https://jabar.tribunnews.com/2018/02/21/ini-asal-usul-istilah-pelakor-ternyata-istilah-itu-dipakai-jauh-sebelum-kasus-jennifer-dunn#google_vignette
Mayer-Schönberger, V. (2011). Delete :The Virtue of Forgetting in the Digital Age. Princeton University Press. Retrieved from https://books.google.co.id/books/about/Delete.html?id=frumDwAAQBAJ&redir_esc=y
Metts, S., Braithwaite, D. O., & Fine, M. A. (2009). Hurt in postdivorce relationships. Feeling Hurt in Close Relationships, 336–356. https://doi.org/10.1017/CBO9780511770548.017
Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and Social Life. In Jurimetrics (Vol. 51). Retrieved from http://search.proquest.com.strauss.uc3m.es:8080/docview/913137931
Osatuyi, B., & Turel, O. (2018). Tug of war between social self-regulation and habit: Explaining the experience of momentary social media addiction symptoms. Computers in Human Behavior, 85, 95–105. https://doi.org/10.1016/j.chb.2018.03.037
Pederson, J. R., & McLaren, R. M. (2016). Managing information following hurtful experiences: How personal network members negotiate private information. Journal of Social and Personal Relationships, 33(7), 961–983. https://doi.org/10.1177/0265407515612242
Pennebaker, J. W. (1997). Writing about Emotional Experience as A Therapeutic Process. Psychological Science, 8(3), 91–153. https://doi.org/10.4324/9780429480676-4
Petronio, S. (2002). Boundaries of privacy: dialectics of disclosure. In Choice Reviews Online (Vol. 40). https://doi.org/10.5860/choice.40-4304
Sitepu, Y. S., & Rajagukguk, M. (2022). Digital Literacy Competence Survey in Medan City. Jurnal ASPIKOM, 7(1), 173. https://doi.org/10.24329/aspikom.v7i1.1067
Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., & Cranor, L. F. (2013). The post that wasn’t. 793. https://doi.org/10.1145/2441776.2441865
Smith, S. A., & Brunner, S. R. (2017). To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace. Management Communication Quarterly, 31(3), 429–446. https://doi.org/10.1177/0893318917692896
Stiles, W. B. (1987). “I have to talk to somebody”: A fever model of disclosure. Self-Disclosure: Theory, Research, and Therapy., pp. 257–282. Retrieved from http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=reference&D=psyc3&NEWS=N&AN=1987-98248-012
Tamir, D. I., & Mitchell, J. P. (2012). Disclosing information about the self is intrinsically rewarding. Proceedings of the National Academy of Sciences of the United States of America, 109(21), 8038–8043. https://doi.org/10.1073/pnas.1202129109
Taprial , V. & Kanwar, P. (2012). Understanding Social Media, United States: Ventus Publishing. Retrieved from https://www.akdistancelearning.net/resources_files/understanding-social-media.pdf
Trepte, S. (2016). Privacy Online: Perspective on Privacy andn Self Diclosure in the social web.
Vertical Rail. (2016). What Does Going Viral Mean? Retrieved June 15, 2022, from Vertical Rail website: https://www.verticalrail.com/kb/what-does-going-viral-mean/
DOI: http://dx.doi.org/10.24329/aspikom.v8i1.1148
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License