Open Access. Powered by Scholars. Published by Universities.®

Communication Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Communication

College Students And Online Political Expression During The 2016 Election, Kenneth W. Moffett, Laurie L. Rice Jul 2017

College Students And Online Political Expression During The 2016 Election, Kenneth W. Moffett, Laurie L. Rice

SIUE Faculty Research, Scholarship, and Creative Activity

While college students traditionally exhibit low levels of political participation and interest in politics, they are more likely to engage in some forms of political expression than their elders. Their greater familiarity with online forms of political expression and engagement potentially lowers their barriers for political involvement. In turn, this potentially draws more young adults into the political process. We compare the precursors of expressive forms of online political engagement to those of talking to someone offline and trying to persuade them to vote for or against a candidate or party among college students. We find that both activities are …


“We Were Not Prepared To Tell People Yet”: Confidentiality Breaches And Boundary Turbulence On Facebook, Jocelyn M. Degroot, Tennley A. Vik May 2017

“We Were Not Prepared To Tell People Yet”: Confidentiality Breaches And Boundary Turbulence On Facebook, Jocelyn M. Degroot, Tennley A. Vik

SIUE Faculty Research, Scholarship, and Creative Activity

Communication Privacy Management theory provides a framework for investigating confidentiality breaches that occur on Facebook. Open-ended online questionnaires served as mechanism for collecting data about privacy violations and the resulting boundary turbulence. Privacy violations validated three a priori categories (Petronio & Reierson, 2009) of confidentiality breaches (privacy ownership violations, discrepancy breaches of privacy, and pre-emptive privacy control). Findings indicated that the lack of established explicit privacy rules led to privacy violations and boundary turbulence. Results also provided insight regarding motivations of privacy violations, reactions to privacy violations, and the role of privacy rules in the violation.