2015
DOI: 10.1080/10510974.2015.1034875
|View full text |Cite
|
Sign up to set email alerts
|

Instructor Privacy Management in the Classroom: Exploring Instructors’ Ineffective Communication and Student Communication Satisfaction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 77 publications
1
8
0
Order By: Relevance
“…This theory makes use of a boundary metaphor for explaining the motivations behind information disclosure governed by certain boundary rules. Majority of the CPM theory based research has been done for interpersonal scenarios like patient-doctor or parent-child relationships [28,29], though recently this theory has been used for explaining the privacy concerns in various information and communication technology (ICT) contexts like e-commerce [30], e-health [31], social networking sites [32,33] and e-learning [34]. Therefore, although the root of this theory is based in an offline environment, yet it has been used, empirically tested and validated for online contexts too.…”
Section: Communication Privacy Management (Cpm) Theorymentioning
confidence: 99%
See 1 more Smart Citation
“…This theory makes use of a boundary metaphor for explaining the motivations behind information disclosure governed by certain boundary rules. Majority of the CPM theory based research has been done for interpersonal scenarios like patient-doctor or parent-child relationships [28,29], though recently this theory has been used for explaining the privacy concerns in various information and communication technology (ICT) contexts like e-commerce [30], e-health [31], social networking sites [32,33] and e-learning [34]. Therefore, although the root of this theory is based in an offline environment, yet it has been used, empirically tested and validated for online contexts too.…”
Section: Communication Privacy Management (Cpm) Theorymentioning
confidence: 99%
“…To the best of our knowledge, applying CPM theory as the base framework and extending it with the trust concept for explaining the willingness of information disclosure in any ICT context is rather few. As pointed out in the literature review section, the basic essence of this theory was to apply it in various inter-personal contexts [28][29], although later it was used for certain ICT contexts also [30][31][32][33][34]. Considering the importance of this theory, particularly in privacy-oriented research, we strongly feel that it has not been investigated much.…”
Section: B Implications For Researchmentioning
confidence: 99%
“…Distracting behaviors are often attributed to students, but instructors have the potential to create distractions as well. For example, instructor disclosures that are negative, irrelevant, occur too frequently, contain intimate or sensitive information, or are otherwise perceived by students as inappropriate may distract students from focusing on course or learning objectives (Sidelinger, Nyeste, Madlock, Pollak, & Wilkinson, 2015;Zhang, Shi, Tonelson, & Robinson, 2009). Thus, this study examines both students and instructors as sources of distraction in the college classroom.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Professors risk losing their ability to enforce rules, hold students accountable, and lead the classroom. For instance, research shows that instructors who engage in inappropriate self-disclosure with students have students who are less satisfied with the instructor’s communication (Sidelinger et al, 2015). Likewise, students reported feeling less positively disposed toward swearing instructors they perceived as trying “too hard to be funny in an inappropriate way” (Generous, Houser, & Frei, 2015, p. 221).…”
Section: Hypothesesmentioning
confidence: 99%