Managing Between Privacy and Sharing in Group Anti Pelakor Indonesia

Augustin Mustika Chairil, Dwi Masrina


Social behavioral change about privacy is phenomenon that we concern in internet user, especially in Anti Pelakor Indonesia (API) Facebook Group. This research studied about women managing private information in social media by observing how members of API Group interpreting of privacy and managing their privacy. This study focuses on the interactivity of members, the meaning of privacy, how manage privacy and what kind of factors make members choose to reveal their privacy in the group. Using a concept of privacy and theoretical approach to Communication Privacy Management (CPM), which is providing assumptions about the system to find out how humans balance decisions about reveal private information. Netnography method used to see virtual activities that occur in groups. The results of the study show that various factors influence the process of privacy disclosure. This research produces a description of how privacy management is carried out by the group members.


Privacy, Social Media, Communication Privacy Management Theory, Netnography Study, Facebook Group

Full Text:



Altman, I. (1975). The Environment and Social Behavior : Privacy, Personal Space, Territory, Crowding. Monterey: Brooks/Cole Pub. Co. Retrieved from〈=en_US&context=L

Bateman, P. J., Pike, J. C., & Butler, B. S. (2011). To disclose or not: Publicness in social networking sites. Information Technology and People, 24(1), 78–100.

Beam, M. A., Child, J. T., Hutchens, M. J., & Hmielowski, J. D. (2018). Context collapse and privacy management: Diversity in Facebook friends increases online news reading and sharing. New Media and Society, 20(7), 2296–2314.

Bute, J. J., Brann, M., & Hernandez, R. (2017). Exploring societal-level privacy rules for talking about miscarriage. Journal of Social and Personal Relationships, 36(2), 379–399.

Child, J. T., & Petronio, S. (2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. Computer-Mediated Communication in Personal Relationships, (February), 21–40.

Child, J. T., Petronio, S., Agyeman-Budu, E. A., & Westermann, D. A. (2011). Blog scrubbing: Exploring triggers that change privacy rules. Computers in Human Behavior, 27(5), 2017–2027.

Coopamootoo, P. L., & Ashenden, D. (2011). A systematic evaluation of the communicability of online privacy mechanisms with respect to communication privacy management. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6770 LNCS(PART 2), 384–393.

Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83–108.

Dennen, V. P., & Burner, K. J. (2017). Identity, context collapse, and Facebook use in higher education: putting presence and privacy at odds. Distance Education, 38(2), 173–192.

Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights, 3(January), 1725–1735.

Eaton, J., & Sanders, C. B. (2012). A little help from our friends: Informal third parties and interpersonal conflict. Personal Relationships, 19(4), 623–643.

Greene, K., Derlega, V. J., Yep, G. A., & Petronio, S. (2003). Privacy and Disclosure of Hiv in interpersonal Relationships: A Sourcebook for Researchers and Practitioners (Routledge Communication Series). Retrieved from

Honan, M. (2014). What Is Doxing? Retrieved November 18, 2019, from website:

Jenkins, H., Ford, S., & Green, J. (2013). Creating Value and Meaning in a Networked Culture. New York: New York University Press.

Jiang, L., Miao, Y., Yang, Y., Lan, Z., & Hauptmann, A. G. (2014). Viral video style: A closer look at viral videos on YouTube. ICMR 2014 - Proceedings of the ACM International Conference on Multimedia Retrieval 2014, 193–200.

Jin, S. A. A. (2012a). Peeling back the multiple layers of Twitter’s private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter. New Media and Society, 15(6), 813–833.

Jin, S. A. A. (2012b). “To disclose or not to disclose, that is the question”: A structural equation modeling approach to communication privacy management in e-health. Computers in Human Behavior, 28(1), 69–77.

Jones, W. H., Freemon, J. E., & Goswick, R. A. (1981). The persistence of loneliness: Self and other determinants. Journal of Personality, 49(1), 27–48.

Kemp, S. (2019). Digital 2019: Indonesia. Retrieved July 16, 2022, from datareportal website:

Kim, J., & Lee, J. E. R. (2011). The facebook paths to happiness: Effects of the number of Facebook friends and self-presentation on subjective well-being. Cyberpsychology, Behavior, and Social Networking, 14(6), 359–364.

Kozinets, R. V. (2010). Netnography: Doing Ethnographic Research Online. London; Los Angeles; New Delhi; Singapore; Washington DC: Sage.

Lubis, E. E. (2014). Potret media sosial dan perempuan. Jurnal PARALLELA, 1(2), 101–102.

Luthfia, A., Triputra, P., & Hendriyani. (2019). Indonesian Adolescents’ Online Opportunities and Risks. Jurnal ASPIKOM, 4(1), 1.

Maulana, Y. (2018). Ini Asal Usul Istilah Pelakor, Ternyata Istilah Itu Dipakai Jauh Sebelum Kasus Jennifer Dunn. Retrieved July 16, 2022, from TribunNews website:

Mayer-Schönberger, V. (2011). Delete :The Virtue of Forgetting in the Digital Age. Princeton University Press. Retrieved from

Metts, S., Braithwaite, D. O., & Fine, M. A. (2009). Hurt in postdivorce relationships. Feeling Hurt in Close Relationships, 336–356.

Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and Social Life. In Jurimetrics (Vol. 51). Retrieved from

Osatuyi, B., & Turel, O. (2018). Tug of war between social self-regulation and habit: Explaining the experience of momentary social media addiction symptoms. Computers in Human Behavior, 85, 95–105.

Pederson, J. R., & McLaren, R. M. (2016). Managing information following hurtful experiences: How personal network members negotiate private information. Journal of Social and Personal Relationships, 33(7), 961–983.

Pennebaker, J. W. (1997). Writing about Emotional Experience as A Therapeutic Process. Psychological Science, 8(3), 91–153.

Petronio, S. (2002). Boundaries of privacy: dialectics of disclosure. In Choice Reviews Online (Vol. 40).

Sitepu, Y. S., & Rajagukguk, M. (2022). Digital Literacy Competence Survey in Medan City. Jurnal ASPIKOM, 7(1), 173.

Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., & Cranor, L. F. (2013). The post that wasn’t. 793.

Smith, S. A., & Brunner, S. R. (2017). To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace. Management Communication Quarterly, 31(3), 429–446.

Stiles, W. B. (1987). “I have to talk to somebody”: A fever model of disclosure. Self-Disclosure: Theory, Research, and Therapy., pp. 257–282. Retrieved from

Tamir, D. I., & Mitchell, J. P. (2012). Disclosing information about the self is intrinsically rewarding. Proceedings of the National Academy of Sciences of the United States of America, 109(21), 8038–8043.

Taprial , V. & Kanwar, P. (2012). Understanding Social Media, United States: Ventus Publishing. Retrieved from

Trepte, S. (2016). Privacy Online: Perspective on Privacy andn Self Diclosure in the social web.

Vertical Rail. (2016). What Does Going Viral Mean? Retrieved June 15, 2022, from Vertical Rail website:



  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License

Web Analytics