Open Access. Powered by Scholars. Published by Universities.®
Communication Technology and New Media Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 2 of 2
Full-Text Articles in Communication Technology and New Media
The Power Of The Virtual Platform: A Look Into Fandom Interactions Via Twitter (X), Samantha Hacker
The Power Of The Virtual Platform: A Look Into Fandom Interactions Via Twitter (X), Samantha Hacker
Undergraduate Theses
Using social media to communicate has become increasingly popular since the medium was created. Twitter has been a popular breeding ground for fan communities to form social spaces. Parasocial relationship theory, as well as face negotiation theory, tie heavily into the discussion of fandoms and the creation of safe spaces on the platform. How people present themselves online is entirely dependent on the user and their level of comfort on the app. One fandom in particular that utilizes this app the most is the fan base for the seven-member South Korean boy band, BTS, who in reference to the band, …
The Consent Of Man: An Examination Of Privacy Awareness, Surveillance, And Privacy Policy (Mis)Use, Will Reilley Silberman
The Consent Of Man: An Examination Of Privacy Awareness, Surveillance, And Privacy Policy (Mis)Use, Will Reilley Silberman
Theses and Dissertations--Communication
The problem of privacy is nuanced, pervasive, and requires an elevated approach. Given the lack of consistency with regard to privacy’s conceptualization and operationalization, research is needed that examines variables related to privacy to better understand how privacy operates in the present day. This dissertation aims to better understand nuances of privacy by gauging knowledge of online privacy, technological affordances related to privacy, and knowledge of surveillance. In this study, human subjects from a large southern University were presented with an opportunity to use a privacy-invasive smartphone application. After doing so, they viewed one of three privacy policies. Finally, they …