Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Communication Technology and New Media

The Power Of The Virtual Platform: A Look Into Fandom Interactions Via Twitter (X), Samantha Hacker Jun 2023

The Power Of The Virtual Platform: A Look Into Fandom Interactions Via Twitter (X), Samantha Hacker

Undergraduate Theses

Using social media to communicate has become increasingly popular since the medium was created. Twitter has been a popular breeding ground for fan communities to form social spaces. Parasocial relationship theory, as well as face negotiation theory, tie heavily into the discussion of fandoms and the creation of safe spaces on the platform. How people present themselves online is entirely dependent on the user and their level of comfort on the app. One fandom in particular that utilizes this app the most is the fan base for the seven-member South Korean boy band, BTS, who in reference to the band, …


The Consent Of Man: An Examination Of Privacy Awareness, Surveillance, And Privacy Policy (Mis)Use, Will Reilley Silberman Jan 2021

The Consent Of Man: An Examination Of Privacy Awareness, Surveillance, And Privacy Policy (Mis)Use, Will Reilley Silberman

Theses and Dissertations--Communication

The problem of privacy is nuanced, pervasive, and requires an elevated approach. Given the lack of consistency with regard to privacy’s conceptualization and operationalization, research is needed that examines variables related to privacy to better understand how privacy operates in the present day. This dissertation aims to better understand nuances of privacy by gauging knowledge of online privacy, technological affordances related to privacy, and knowledge of surveillance. In this study, human subjects from a large southern University were presented with an opportunity to use a privacy-invasive smartphone application. After doing so, they viewed one of three privacy policies. Finally, they …