研究生: |
林湘庭 Lin, Hsiang-Ting |
---|---|
論文名稱: |
臉書邊界動盪對自我揭露的影響—以印象管理為調節變數 Impact of Boundary Turbulence on Facebook Self-Disclosure — Impression Management as a Moderator |
指導教授: |
王仕茹
Wang, Shih-Ju |
口試委員: |
黃恆獎
Huang, Heng-Chiang 潘令研 Pan, Ling-Yen 王仕茹 Wang, Shih-Ju |
口試日期: | 2023/07/19 |
學位類別: |
碩士 Master |
系所名稱: |
管理研究所 Graduate Institute of Management |
論文出版年: | 2023 |
畢業學年度: | 111 |
語文別: | 中文 |
論文頁數: | 85 |
中文關鍵詞: | 邊界動盪 、自我揭露 、傳播隱私管理 、自我監控 、感知印象管理能力 |
英文關鍵詞: | Boundary Turbulence, Self-disclosure, Communication Privacy Management, Self-monitoring, Perceived Impression Management Capabilities |
研究方法: | 問卷調查 |
DOI URL: | http://doi.org/10.6345/NTNU202301306 |
論文種類: | 學術論文 |
相關次數: | 點閱:151 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,社群網路服務(Social Network Service, SNS)的興起,讓人們通過網絡的建立來維繫情感,因此成為人們在線的社交的重要平台。由於在SNS中發表文章可以讓用戶建立和維持社會關係並增強社會資本。然而,隨著線上使用的頻率愈高,越來越多地SNS用戶因為個人隱私管理不當,使得私人信息流出而產生邊界動盪。本研究要探討Facebook用戶所經歷過的邊界動盪、自我監控與傳播隱私管理、自我揭露之間的關係,並探討感知印象管理能力所扮演的調節角色。
本研究針對Facebook用戶作為研究對象,蒐集348份有效樣本,使用結構方程式模型的分析結果摘要如下:(1)邊界動盪會提升自我揭露的行為,且亦提升傳播隱私管理的程度。(2)自我監控會提升傳播隱私管理的程度。(3)感知印象管理能力會強化邊界所有權與自我揭露之間的關係。
Recently, the rise of social network service (Social Network Service, SNS) allows people to maintain their emotions through the establishment of the network, so it has become an important platform for people to socialize online. Because publishing articles in SNS allows users to establish and maintain social relationships and enhance social capital. However, with the increasing frequency of online use, more and more SNS users have boundary turmoil due to improper personal privacy management, which makes private information flow out. This study explores the relationship between border turmoil experienced by Facebook users, self-monitoring and communication privacy management, and self-disclosure, and explores the moderating role of perceived impression management ability.
This study aimed at Facebook users as the research object, and finally collected 348 valid samples. The analysis results using the structural equation model are summarized as follows: (1) Boundary turbulence enhances self-disclosure behavior and increases the degree of communication privacy management. (2) Self-monitoring increases the degree of communication privacy management. (3) Perceived impression management capabilities enhance the relationship between boundary ownership and self-disclosure.
中文文獻
丁偉倫(2019),個人特性與網站屬性對自我揭露行為之影響,國立彰化師範大學資訊管理研究所未出版之碩士論文,彰化,臺灣。
王紹蓉、梁定澎與賴誼禎(2016),揭露與隱藏之拉鋸:人氣需求與隱私顧慮對臉書隱私管理行為之影響,資訊管理學報,第23卷第4期,頁445-472。
李翊豐(2015),隱 [隱] 作祟:隱私管理對社群用戶持續使用之影響,國立中山大學行銷傳播管理研究所未出版之碩士論文,高雄,臺灣。
林亞駿(2018),以印象管理理論探討線上測驗結果對 Facebook 分享意圖之影響,國立政治大學傳播學院傳播碩士學位學程未出版之碩士論文,臺北,臺灣。
林書妤(2015),情境崩解是禍還是福?從情境崩解觀看Facebook使用者之印象管理策略,國立交通大學傳播研究所未出版之碩士論文,新竹,臺灣。
洪寅珈(2022),Facebook 使用者自我揭露對傳播隱私管理之影響,國立臺灣師範大學管理研究所未出版之碩士論文,臺北,臺灣。
郭紘村(2013),探討影響社群自我揭露之因素:以Facebook為例,私立中華大學資訊管理研究所未出版之碩士論文,新竹,臺灣。
黃麒逢(2022),自我監控與印象管理對華人同事關係之影響:知覺組織氣候的調節作用,國立臺北教育大學心理與諮商研究所未出版之碩士論文,臺北,臺灣。
廖展毅(2017),社群媒體上採行印象管理策略之影響因素之研究,私立東海大學資訊管理研究所未出版之碩士論文,臺中,臺灣。
賴俊宏(2014),臉書全都露? 臉書使用者隱私權保護之硏究,國立中山大學行銷傳播管理研究所未出版之碩士論文,高雄,臺灣。
西文文獻
Acquisti, A., and Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis and P. Golle (Eds.), Privacy Enhancing Technologies: 36-58. Berlin, Heidelberg: Springer.
Afifi, T. D. (2003). Feeling caught’ in stepfamilies: Managing boundary turbulence through appropriate communication privacy rules, Journal of Social and Personal Relationships, 20(6): 729-755.
Aladwani, A. M., and Dwivedi, Y. K. (2018). Towards a theory of SocioCitizenry: Quality anticipation, trust configuration, and approved adaptation of governmental social media. International Journal of Information Management, 43: 261–272.
Alalwan, A. A., Rana, N. P., Dwivedi, Y. K., and Algharabat, R. (2017). Social media in marketing: A review and analysis of the existing literature. Telematics and Informatics, 34(7): 1177–1190.
Aloia, L. S. (2018). The emotional, behavioral, and cognitive experience of boundary turbulence. Communication Studies, 69: 180-195.
Altman, I. (1975). The environment and social behavior: privacy, personal space, territory, and crowding. Monterey, CA: Brooks/Cole Publishing.
Altman, I., and Taylor, D. A. (1973). Social penetration: The development of interpersonal relationships. New York, NY: Holt, Rinehart & Winston.
Bazarova, N. N., and Choi, Y. H. (2014). Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication, 64(4): 635-657.
Bedeian, A. G., and Day, D. V. (2004). Can chameleons lead? The Leadership Quarterly, 15: 687–718.
Bello, R. (2005). Situational formality, personality, and avoidance‐avoidance conflict as causes of interpersonal equivocation. Southern Journal of Communication, 70(4): 285-299.
Bello, R. S., Brandau-Brown, F. E., and Ragsdale, J. D. (2016). Managing boundary turbulence through the use of information manipulation strategies: a report on two studies. Cogent Soc Sci, 2: 1-21.
Benthaus, J., Risius, M., and Beck, R. (2016). Social media management strategies for organizational impression management and their effect on public perception. The Journal of Strategic Information Systems, 25(2): 127-139.
Berger, C. R., Knapp, M. L., & Daly, J. A. (2002). Goals and knowledge structures in social interaction. Handbook of interpersonal communication, 3: 181-212.
Blanchard, A. L., and Markus, M. L. (2004). The experienced" sense" of a virtual community: Characteristics and processes. ACM SIGMIS Database: the database for advances in information systems, 35(1): 64-79.
Bok, S. (1983). Secrets: On the Ethics of Concealment and Revelation. New York, NY: Vintage Books.
Bolino, M. C., and Turnley, W. H. (2003). More than one way to make an impression: Exploring profiles of impression management. Journal of Management, 29(2): 141-160.
Bolino, M. C., Kacmar, K. M., Turnley, W. H., and Gilstrap, J. B. (2008). A multi-level review of impression management motives and behaviors. Journal of Management, 34(6): 1080-1109.
Boyd, D. M., and Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of computer‐mediated Communication, 13(1): 210-230.
Brandtzæg, P. B., Lüders, M., and Skjetne, J. H. (2010). Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Intl. Journal of Human–Computer Interaction, 26(11-12): 1006-1030.
Brannon, G. E., and Rauscher, E. A. (2018). Managing Face while Managing Privacy: Factors that Predict Young Adults’ Communication about Sexually Transmitted Infections with Romantic Partners, Health Communication, 34(14): 1833-1844.
Brown, P., and Levinson, S. C. (1978). Universals in language usage: Politeness phenomena. In Questions and politeness: Strategies in social interaction, 56-311. Cambridge, MA: Cambridge University Press.
Burgoon, J. K. (1978). A communication model of personal space violations: Explication and an initial test. Human communication research, 4(2): 129-142.
Bute, J. J., and Brann, M. (2015). Co-ownership of private information in the miscarriage context. Journal of Applied Communication Research, 43(1): 23-43.
Cappella, J. N., and Greene, J. O. (1982). A discrepancy‐arousal explanation of mutual influence in expressive behavior for adult and infant‐adult interaction. Communications Monographs, 49(2): 89-114.
Caughlin, J. P. (2002). The demand/withdraw pattern of communication as a predictor of marital satisfaction over time: Unresolved issues and future directions. Human Communication Research, 28(1), 49-85.
Caughlin, J. P. (2004). When is topic avoidance unsatisfying? Examining moderators of the association between avoidance and dissatisfaction. Human Communication Research, 30(4), 479-513.
Chennamaneni, A., and Taneja, A. (2015). Communication privacy management and self-disclosure on social media- a case of Facebook. Proceedings of the 21st Americas Conference on Information Systems, PR.
Child, J. T., and Agyeman-Budu, E. A. (2010). Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Computers in Human Behavior, 26(5): 957-963.
Child, J. T., Haridakis, P. M., and Petronio, S. (2012). Blogging privacy rule orientations, privacy management, and content deletion practices: the variability of online privacy management activity at different stages of social media use. Computers in Human Behavior, 28(5): 1859-1872.
Child, J. T., Pearson, J. C., and Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60(10): 2079-2094.
Child, J.T., Petronio, S., Agyeman-Budu, E. A., and Westermann, D.A. (2011). Blog scrubbing: exploring triggers that change privacy rules. Computers in Human Behavior, 27(5): 2017-2027.
Chung, K. C., Chen, C. H., Tsai, H. H., and Chuang, Y. H. (2021). Social media privacy management strategies: a SEM analysis of user privacy behaviors. Computer Communications, 174: 122-130.
Church, M., Thambusamy, R., and Nemati, H. (2020). User misrepresentation in online social networks: how competition and altruism impact online disclosure behaviours. Behaviour & Information Technology, 39(12): 1320-1340.
Cody, M. J., Canary, D. J., and Smith, S.W. (1994). Compliance-gaining goals: An inductive analysis of actors’ goal types, strategies, and successes. In Daly, J. A. and Wiemann, J. M. (Eds.), Strategic interpersonal communication, 33-90. Hillsdale, NJ: Erlbaum.
Cohen, J. (1992). Statistical power analysis. Current directions in psychological science, 1(3): 98-101.
Cozby, P. C. (1973). Self-disclosure: a literature review. Psychological bulletin, 79(2): 73.
Crabtree, M. A., and Pillow, D. R. (2018). Extending the Dual Factor Model of Facebook Use: Social motives and network density predict Facebook use through impression management and open self-disclosure. Personality and individual differences, 133: 34-40.
D'Agata, M. T., Kwantes, P. J., and Holden, R. R. (2021). Psychological factors related to self‐disclosure and relationship formation in the online environment. Personal Relationships, 28(2): 230-250.
Day, D. V., and Schleicher, D. J. (2006). Self‐monitoring at work: A motive‐based perspective. Journal of Personality, 74(3): 685-714.
Day, D. V., Shleicher, D. J., Unckless, A. L., and Hiller, N. J. (2002). Self-monitoring personality at work: A meta-analytic investigation of construct validity. Journal of Applied Psychology, 87(2): 390-401.
Debatin, B., Lovejoy, J. P., Horn, A.-K., and Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1): 83-108.
DeGroot, J. M., and Vik, T. A. (2017). “We were not prepared to tell people yet”: confidentiality breaches and boundary turbulence on Facebook. Computers in Human Behavior, 70: 351-359.
Dennis, A., Fuller, R. M., and Valacich, J. (2008). Media, Tasks, and Communication Processes: A Theory of Media Synchronicity. MIS Quarterly, 32(3): 575-600.
Derlega, V. J., Metts, S., Petronio, S., and Margulis, S. T. (1993). Self-disclosure. Thousand Oaks, CA: Sage Publications.
Dickerson, D., and Buckner, M. (2017). Communication Conundrums: Theories About and Tips for Effective Decanal Communication, Univ Toledo Law Rev, 48: 211-240.
Dillard, J. P. (Ed.). (1990). A goal-driven model of interpersonal influence. Scottsdale, AZ: Gorsuch Scarisbrick.
Dillard, J. P., Segrin, C., and Harden, J. M. (1989). Primary and secondary goals in the production of interpersonal influence messages. Communication Monographs, 56: 25-37.
Döring, N. (2010). Social contacts online: Identities, relations, communities [Sozialkontakte online: Identitäten, Beziehungen, Gemeinschaften]. In Schweiger W., Beck K. (Eds.), Handbook online-communication [Handbuch Online-Kommunikation]: 159-183. Wiesbaden, DE: VS Verlag für Sozialwissenschaften.
Ducol, B., Bouchard, M., Davies, G., Ouellet, M., and Neudecker, C. (2016). Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism (16-05). Waterloo, CA: TSAS The Canadian Network for Research on Terrorism, Security, and Society.
Dwivedi, Y. K., Rana, N. P., Tajvidi, M., Lal, B., Sahu, G. P., and Gupta, A. (2017). Exploring the role of social media in e-government: An analysis of emerging literature. In Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, New Delhi, IN.
Dwyer, C., Hiltz, S., and Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the 13th Americas Conference on Information Systems, Keystone, CO.
Ellison, N. B., Steinfield, C., and Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of computer‐mediated communication, 12(4): 1143-1168.
Ellison, N., Heino, R., and Gibbs, J. (2006). Managing Impressions Online: Self‐Presentation Processes in the Online Dating Environment. Journal of Computer‐Mediated Communication, 11(2): 415-441.
Fandt, P. M., and Ferris, G. R. (1990). The management of information and impressions: When employees behave opportunistically. Organizational behavior and human decision processes, 45(1): 140-158.
Flanagin, A.J., and Metzger, M.J. (2001): Internet use in the contemporary media environment. Human communication research, 27(1): 153-181.
Flynn, F. J., Reagans, R. E., Amanatullah, E. T., and Ames, D. R. (2006). Helping one's way to the top: self-monitors achieve status by helping others and knowing who helps whom. Journal of personality and social psychology, 91(6): 1123-1137.
Frampton, B.D., and Child, J.T. (2013). Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Computers in Human Behavior, 29(6): 2257-2264.
Franz, D., Marsh, H. E., Chen, J. I., and Teo, A. R. (2019). Using Facebook for qualitative research: a brief primer. Journal of medical Internet research, 21(8):1-12.
Gabrenya Jr, W. K., and Arkin, R. M. (1980). Self-monitoring scale: Factor structure and correlates. Personality and Social Psychology Bulletin, 6(1): 13-22.
Gangestad, S. W., and Snyder, M. (2000). Self-monitoring: Appraisal and reappraisal. Psychological bulletin, 126(4): 530-555.
Gilbert, E., and Karahalios, K. (2009). Predicting tie strength with social media. Proceedings of the SIGCHI conference on human factors in computing systems, New York, NY.
Goffman, E. (1967). Interaction Ritual. Garden City, NY: Anchor Doubleday.
Goffman, E. (1959). The Presentation of Self in Everyday Life. New York, NY: Doubleday.
Golish, T., and Caughlin, J. (2002). " I'd rather not talk about it": Adolescents' and young adults' use of topic avoidance in stepfamilies. Journal of Applied Communication Research, 30(1): 78-106.
Gomez-Arias, J. T., and Genin, L. (2009). Beyond Monetization: Creating Value through Online Social Networks. Int. J. Electron. Bus. Manag, 7(2): 79-85.
Greene, K., Derlega, V. J., and Mathews, A. (2006). Self-disclosure in personal relationships. In A. L. Vangelisti and D. Perlman (Eds.), The Cambridge handbook of personal relationships: 409-427. New York, NY: Cambridge University Press.
Grice, H. P. (1975). Logic and conversation. Syntax and Semantics: Speech Acts, 3: 41-58.
Gross, R., and Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA.
Guo, Y., Lu, Z., Kuang, H., and Wang, C. (2020). Information avoidance behavior on social network sites: Information irrelevance, overload, and the moderating role of time pressure. International Journal of Information Management, 52: 102067
Hagendorff, T. (2018). Privacy literacy and its problems. Journal of Information Ethics, 27 (2): 127-145.
Hagendorff, T. (2018). Übersehene Probleme des Konzepts der Privacy Literacy. In Roßnagel, A., Friedewald, M., and Hansen, M. (eds) Die Fortentwicklung des Datenschutzes: 99-120. Wiesbaden, DE: DuD-Fachbeiträge. Springer.
Hall, J. A., and Pennington, N. (2013). Self-monitoring, honesty, and cue use on Facebook: The relationship with user extraversion and conscientiousness. Computers in Human Behavior, 29(4): 1556-1564.
Hargittai, E., and Hsieh, Y. L. P. (2010). Predictors and consequences of differentiated practices on social network sites. Information, Communication & Society, 13(4): 515-536.
Hawk, S. T., Keijsers, L., Hale, W. W., and Meeus, W. (2009). Mind your own business! Longitudinal relations between perceived privacy invasion and adolescent–parent conflict. Journal of Family Psychology, 23: 511-520.
Henningsen, M. L. M., Valde, K. S., Entzminger, M. J., Dick, D. T., and Wilcher, L. B. (2019). Student disclosures about academic information: Student privacy rules and boundaries. Communication Reports, 32(1): 29-42.
Hill, C. A. (1987). Affiliation motivation: people who need people… but in different ways. Journal of personality and social psychology, 52(5): 1008-1018.
Hill, C. E., and Knox, S. (2001). Self-disclosure. Psychotherapy: Theory, Research, Practice, Training, 38(4): 413-417.
Hosman, L. A., and Tardy, C. H. (1982). Self-monitoring and self-disclosure flexibility: A research note. The Western Journal of Speech Communication, 4: 92-97.
Hossain, M. A., Dwivedi, Y. K., Chan, C., Standing, C., and Olanrewaju, A. S. (2018). Sharing political content in online social media: A planned and unplanned behaviour approach. Information Systems Frontiers, 20(3): 485-501.
James, T. L., Warkentin, M., and Collignon, S. E. (2015). A dual privacy decision model for online social networks. Information & Management, 52(8): 893-908.
Joinson, A. N. (1999). Social desirability, anonymity, and Internet-based questionnaires. Behavior Research Methods, Instruments, & Computers, 31(3): 433-438.
Joinson, A. N. (2001). Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity. European journal of social psychology, 31(2): 177-192.
Jung, Y., Pawlowski, S. D., and Kim, H. W. (2017). Exploring associations between young adults’ Facebook use and psychological well-being: A goal hierarchy approach. International Journal of Information Management, 37(1): 1391-1404.
Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., and Nerur, S. (2018). Advances in social media research: Past, present and future. Information Systems Frontiers, 20: 531-558.
Kisekka, V., Bagchi-Sen, S., and Rao, H. R. (2013). Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users. Computers in Human Behavior, 29(6): 2722-2729.
Kizgin, H., Dey, B. L., Dwivedi, Y. K., Hughes, L., Jamal, A., Jones, P., and Richard, M. O. (2020). The impact of social media on consumer acculturation: Current challenges, opportunities, and an agenda for research and practice. International Journal of Information Management, 51: Article 102026.
Kou, Y., and Gray, C. M. (2018). " What do you recommend a complete beginner like me to practice?" Professional Self-Disclosure in an Online Community. Proceedings of the ACM on Human-Computer Interaction, 2: 1-24.
Krämer, N. C., and Winter, S. (2008). Impression management 2.0: The relationship of self-esteem, extraversion, self-efficacy, and self-presentation within social networking sites. Journal of media psychology, 20(3): 106-116.
Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of information technology, 25(2): 109-125.
Lankton, N. K., McKnight, D. H., and Tripp, J. F. (2017). Facebook privacy management strategies: A cluster analysis of user privacy behaviors. Computers in Human Behavior, 76: 149-163.
Leary, M. R. (1996). Self Presentation – Impression Management and Interpersonal Behaviour. Boulder, CO: Westview.
Leary, M. R., and Kowalski, R. M. (1990). Impression management: A literature review and two-component model. Psychological bulletin, 107(1): 34-37.
Leary, M. R., Springer, C., Negel, L., Ansell, E., and Evans, K. (1998). The causes, phenomenology, and consequences of hurt feelings. Journal of Personality and Social Psychology, 74: 1225-1237.
Leary, M.R., and Kowalski, R.M. (1990). Impression Management: A Literature Review and Two-Component Model. Psychological Bulletin, 107(1): 34-47.
Lecky, P. (1945). Self-Consistency, a Theory of Personality. Washington, DC: Island Press.
Lenhart, A., and Madden, M. (2007). Social networking websites and teens: An overview. Washington, DC: Pew Internet and American Life Project.
Lennox, R. D., and Wolfe, R. N. (1984). Revision of the self-monitoring scale. Journal of Personality and Social Psychology, 46: 1349-1364.
Levinger, G. K., and Snoek, J. D. (1972). Attraction in relationship: A new look at interpersonal attraction. New York, NK: General Learning Press.
Li-Barber, K. T. (2012). Self-disclosure and student satisfaction with Facebook. Computers in Human behavior, 28(2): 624-630.
Litt, E., and Hargittai, E. (2014). A bumpy ride on the information superhighway: Exploring turbulence online. Computers in Human Behavior, 36: 520-529.
Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove, A. (2011). Analyzing Facebook privacy settings: User expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, Berlin, DE.
Liu, Z., and Wang, X. (2018). How to regulate individuals’ privacy boundaries on social network sites: A cross-cultural comparison. Information & Management, 55(8): 1005-1023.
Liu, Z., Wang, X., Min, Q., and Li, W. (2019). The effect of role conflict on self‐disclosure in social network sites: An integrated perspective of boundary regulation and dual process model. Information Systems Journal, 29(2): 279-316.
Marwell, G., and Schmitt, D. (1967). Compliance-gaining behavior: A synthesis and model. Sociological Quarterly, 8: 317-328.
Masaviru, M. (2016). Self-disclosure: Theories and model review. Journal of Culture, Society and Development, 18(1): 43-44.
Mazer, J. P., Murphy, R. E., and Simonds, C. J. (2007). I'll see you on “Facebook”: The effects of computer-mediated teacher self-disclosure on student motivation, affective learning, and classroom climate. Communication education, 56(1): 1-17.
McDonnell, M. H., and King, B. (2013). Keeping up appearances: Reputational threat and impression management after social movement boycotts. Administrative science quarterly, 58(3): 387-419.
McKenna, K. Y., Green, A. S., and Gleason, M. E. (2002). Relationship formation on the Internet: What’s the big attraction? Journal of social issues, 58(1): 9-31.
McLaren, R. M., and Steuber, K. R. (2013). Emotions, communicative responses, and relational consequences of boundary turbulence. Journal of Social and Personal Relationships, 30(5): 606-626.
Mehra, A., Kilduff, M., and Brass, D. J. (2001). The social networks of high and low self-monitors: Implications for workplace performance. Administrative Science Quarterly, 46(1): 21-146.
Merunková, L., and Šlerka, J. (2019). Goffman's theory as a framework for analysis of Self presentation on online social networks. Masaryk University Journal of Law and Technology, 13(2): 243-276.
Metts, S., and Grohskopf, E. (2003). Impression management: Goals, strategies, and skills. London, UK: Routledge
Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2): 335-361.
Min, J., and Kim, B. (2015). How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost. Journal of the Association for Information Science and Technology, 66(4): 839-857.
Nosko, A., Wood, E., and Molema, S. (2010). All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26(3): 406-418.
Nowak, K. L., and Rauh, C. (2005). The influence of the avatar on online perceptions of anthropomorphism, androgyny, credibility, homophily, and attraction. Journal of Computer-Mediated Communication, 11(1): 153-178.
Oldenburg, R., & Brissett, D. (1982). The third place. Qualitative sociology, 5(4): 265-284.
Osatuyi, B. (2013). Information sharing on social media sites. Computers in Human Behavior, 29: 2622–2631.
Osatuyi, B. (2015). Empirical examination of information privacy concerns instrument in the social media context. AIS Transactions on Replication Research, 1(1): 1-14.
Osatuyi, B., Passerini, K., Ravarini, A., and Grandhi, S. A. (2018). “Fool me once, shame on you… then, I learn.” An examination of information disclosure in social networking sites. Computers in Human Behavior, 83: 73-86.
Parks, M. R., and Floyd, K. (1996). Making friends in cyberspace. Journal of Communication, 46: 80-97.
Parks-Leduc, L., Pattie, M. W., Pargas, F., and Eliason, R. G. (2014). Self-monitoring as an aggregate construct: Relationships with personality and values. Personality and Individual Differences, 58: 3-8.
Patterson, M. L. (1976). An arousal model of interpersonal intimacy. Psychological review, 83(3): 235-245.
Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication theory, 1(4): 311-335.
Petronio, S. (2002): Boundaries of privacy: Dialects of disclosure., Albany, NY: State University of New York Press.
Petronio, S. (2004). Road to developing communication privacy management theory: Narrative in progress, please stand by. Journal of family communication, 4(3&4): 193-207.
Petronio, S. (2006). Impact of medical mistakes: Navigating work–family boundaries for physicians and their families. Communication Monographs, 73(4): 462-467.
Petronio, S. (2007). Translational research endeavors and the practices of communication privacy management. Journal of Applied Communication Research, 35(3): 218-222.
Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of family theory & review, 2(3): 175-196.
Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13(1): 6-14.
Petronio, S., and Jones, S. M. (2006). When "Friendly Advice" Becomes a Privacy Dilemma for Pregnant Couples: Applying Communication Privacy Management Theory. In Turner, L. H., and West, R. (Eds.), The family communication: Sourcebook : 201-218. Thousand Oaks, CA: Sage.
Petronio, S., and Reierson, J. (2015). Regulating the privacy of confidentiality: Grasping the complexities through communication privacy management theory. In Afifi, T., and Afifi, W. (Eds.), Uncertainty and information regulation in interpersonal contexts: Theories and applications: 365-383. New York, NY: Routledge.
Petronio, S., and Child, J. T. (2020). Conceptualization and operationalization: Utility of communication privacy management theory. Current opinion in psychology, 31: 76-82.
Petronio, S., and Gaff, C. (2010). Managing privacy ownership and disclosure. In Gaff, C., and Bylund, C. (Eds.), Family communication about genetics: Theory and practice: 120-135. London, UK: Oxford Press.
Petronio, S., and Martin, J. N. (1986). Ramifications of revealing private information: A gender gap. Journal of Clinical Psychology, 42(3): 499-506.
Petronio, S., and Reierson, J. (2009). Regulating the Privacy of Confidentiality: Grasping the Complexities through Communication Privacy Management Theory. In Afifi, T.A. and Afifi, W.A. (Eds.), In Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications: 365-383., London, UK: Routledge.
Picone, I. (2015). Impression management in social media. The international encyclopedia of digital communication and society, 36: 469-476.
Pornsakulvanich, V. (2018). Excessive use of Facebook: The influence of self-monitoring and Facebook usage on social support. Kasetsart Journal of Social Sciences, 39(1): 116-121.
Proudfoot, J. G., Wilson, D., Valacich, J. S., and Byrd, M. D. (2018). Saving face on Facebook: Privacy concerns, social benefits, and impression management. Behaviour & Information Technology, 37(1): 16-37.
Rosenberg, J., and Egbert, N. (2011). Online impression management: Personality traits and concerns for secondary goals as predictors of self-presentation tactics on Facebook. Journal of computer-mediated communication, 17(1): 1-18.
Ross, C., Orr, E. S., Sisic, M., Arseneault, J. M., Simmering, M. G., and Orr, R. R. (2009). Personality and motivations associated with Facebook use. Computers in human behavior, 25(2): 578-586.
Schlenker, B. R. (1980). Impression management: The self-concept, social identity, and interpersonal relations. Pacific Grove, CA: Brooks/Cole.
Schoeman, F. D. (1984). Philosophical dimensions of privacy: An anthology. Cambridge, MA: University Press.
Schwartz, S. H. (1977). Normative influences on altruism. In Advances in experimental social psychology (10th ed.). New York, NY: Academic Press.
Secord, P. F., and Backman, C. W. (1961). Personality theory and the problem of stability change in individual behavior: An interpersonal approach. Psychological Review, 68(1): 21-32.
Shaffer, D. R., and Pegalis, L. J. (1998). Gender and situational context moderate the relationship between self‐monitoring and induction of self‐disclosure. Journal of Personality, 66(2): 215-234.
Shaver, P. R., & Mikulincer, M. (2006). Attachment theory, individual psychodynamics, and relationship functioning. In Vangelisti, A. L., and Perlman, D. (Eds.), The Cambridge handbook of personal relationships: 251-271. New York, NY: Cambridge University Press.
Shi, S., Cao, Y., Chen, Y., and Chow, W. S. (2019). How social media brand pages contribute to functional conflict: The central role of commitment. International Journal of Information Management, 45: 95-106.
Shiau, W. L., Dwivedi, Y. K., and Lai, H. H. (2018). Examining the core knowledge on Facebook. International Journal of Information Management, 43: 52-63.
Shiau, W. L., Dwivedi, Y. K., and Yang, H. S. (2017). Co-citation and cluster analyses of extant literature on social networks. International Journal of Information Management, 37(5): 390-399.
Smith, M. B. (1990). Humanistic psychology. Journal of humanistic psychology, 30(4): 6-21.
Smith, M. J. (1982). Cognitive schemata and persuasive communication: Toward a contingency rules theory. Annals of the International Communication Association, 6(1): 330-363.
Smith, S. A., and Brunner, S. R. (2017). To reveal or conceal: Using communication privacy management theory to understand disclosures in the workplace. Management Communication Quarterly, 31(3): 429-446.
Snyder, M. (1974). Self-monitoring of expressive behavior. Journal of personality and social psychology, 30(4): 526-537.
Snyder, M., and Copeland, J. (1989). Self-monitoring processes in organizational settings. In Giacolone, R., and Rosenfeld, P. (Eds.). Impression management in the organization: 7-19. Hillsdale, NJ: Erlbaum.
Solomon, J. F., Solomon, A., Joseph, N. L., and Norton, S. D. (2013). Impression management, myth creation and fabrication in private social and environmental reporting: Insights from Erving Goffman. Accounting, organizations and society, 38(3): 195-213.
Soukup, C. (2006). Computer-mediated communication as a virtual third place: building Oldenburg’s great good places on the world wide web. New media & society, 8(3): 421-440.
Steijn, W. M., and Schouten, A. P. (2013). Information sharing and relationships on social networking sites. Cyberpsychology, Behavior, and Social Networking, 16(8): 582-587.
Steuber, K. R., and McLaren, R. M. (2015). Privacy recalibration in personal relationships: Rule usage before and after an incident of privacy turbulence. Communication Quarterly, 63(3): 345-364.
Swann, V. B. (1983). Self-Verification: Bringing Social Reality into Harmony with the Self. In Suls, J. and Greenwald, A.G. (Eds.), Psychological Perspectives on the Self: 33-66. Hillsdale, NJ: Erlbaum.
Swann, W.B. (1990). " To Be Adored or to Be Known? The Interplay of Self-Enhancement and Self-Verification," In Higgins, E. T., and Sorrentino, R. M. (Eds.), Handbook of motivation and cognition: Foundations of social behavior: 408–448. New York, NY: Guilford Press.
Swann, W.B., and Ely, R.J. 1984. "A Battle of Wills - Self-Verification Versus Behavioral Confirmation," Journal of Personality and Social Psychology, 46(6): 1287-1302.
Swann, W.B., Polzer, J.T., Seyle, D.C., and Ko, S.J. (2004). Finding Value in Diversity: Verification of Personal and Social Self-Views in Diverse Groups. Academy of Management Review, 29(1): 9-27.
Tashmin, N. (2016). Art of impression management on social media. World Scientific News, 30: 89-102.
Tedeschi, J. T., Schlenker, B. R., and Bonoma, T. V. (1971). Cognitive dissonance: Private ratiocination or public spectacle? American Psychologist, 26(8): 685-695.
Thatcher, S.M.B., and Greer, L.L. 2008. "Does It Really Matter If You Understand Me? The Implications of Identity Comprehension for Individuals in Organizations," Journal of Management, 34(1): 5-24.
Tolstedt, B. E., and Stokes, J. P. (1984). Self-disclosure, intimacy, and the depenetration process. Journal of Personality and Social Psychology, 46(1): 84-90.
Tong, S. T., Van Der Heide, B., Langwell, L., and Walther, J. B. (2008). Too much of a good thing? The relationship between number of friends and interpersonal impressions on Facebook. Journal of computer-mediated communication, 13(3): 531-549.
Trepte, S. (2015). Social media, privacy, and self-disclosure: The turbulence caused by social media’s affordances. Social Media+ Society, 1(1): 1-2.
Trepte, S., and Reinecke, L. (2011). Privacy online: Perspectives on privacy and self-disclosure in the social web. Berlin, DE: Springer.
Tseëlon, E. (1992). Is the presented self sincere? Goffman, impression management and the postmodern self. Theory, culture & society, 9(2): 115-128.
Turnley, W. H., and Bolino, M. C. (2001). Achieving desired images while avoiding undesired images: Exploring the role of self-monitoring in impression management. Journal of Applied Psychology, 86: 351-360.
Venetis, M. K., Greene, K., Magsamen-Conrad, K., Banerjee, S. C., Checton, M. G., and Bagdasarov, Z. (2012). “You can't tell anyone but…”: Exploring the use of privacy rules and revealing behaviors. Communication Monographs, 79(3): 344-365.
Wahn, J. (2003), The ethics of the high self-monitor. Paper presented at the 2008 Annual Meeting of the Academy of Management, Seattle, WA.
Wallace, P. (1999). The Psychology of the Internet Cambridge University Press. Cambridge, UK: Cambridge University Press.
Walther, J. B., Van Der Heide, B., Kim, S. Y., Westerman, D., and Tong, S. T. (2008). The role of friends’ appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep? Human communication research, 34(1): 28-49.
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., and Cranor, L. F. (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA.
Waterman, J. (1979). Family patterns of self-disclosure. In Chelune, G. J., and Associates (Eds.), Self-disclosure: Origins, patterns, and implications of openness in interpersonal relationships: 225–242. San Francisco, CA: Jossey-Bass
Waters, S., and Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1): 101-115.
Wetzels, M., Odekerken-Schroder, G., and Van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS quarterly, 33(1): 177-195.
Wheeless, L. R., and Grotz, J. (1976). Conceptualization and measurement of reported self‐disclosure. Human Communication Research, 2(4): 338-346.
Whitbourne, S.K., and Connolly, L. A. (1999). The Developing Self in Midlife. In S.L. Willis and J.D. Reid (Eds.), Life in the Middle: Psychological and Social Development in Middle Age: 25-45. New York, NY: Academic Press.
Zhao, S., Grasmuck, S., and Martin, J. (2008). Identity construction on Facebook: Digital empowerment in anchored relationships. Computers in human behavior, 24(5): 1816-1836.
Zywica, J., and Danowski, J. (2008). The faces of Facebookers: Investigating social enhancement and social compensation hypotheses; predicting Facebook™ and offline popularity from sociability and self-esteem, and mapping the meanings of popularity with semantic networks. Journal of Computer-Mediated Communication, 14(1): 1-34.