Females' Perspectives on Emergence to Adulthood: The

Total Page:16

File Type:pdf, Size:1020Kb

Females' Perspectives on Emergence to Adulthood: The View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by ASU Digital Repository Females’ Perspectives on Emergence to Adulthood: The Role of Information Communication Technologies by Megan Lindsay A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved February 2016 by the Graduate Supervisory Committee: Judy Krysik, Chair Walter LaMendola Ann MacEachron ARIZONA STATE UNIVERSITY May 2016 ABSTRACT Young women ages 18-29 are the highest users of Information Communication Technology (ICT) in the United States. As a group, they curate and create more online content than any other adult user group (Duggan, 2014). Throughout the research literature, scholars claim that the high rate of technology use among young people is related to their developmental stage (boyd, 2014; Kuper & Mustaki, 2014; Subrahmanyam & Greenfield, 2008; Turkle, 2010). The primary developmental tasks of young adults include forming an adult identity, and sustaining intimate relationships. Developmental psychologists and sociologist hypothesize that ICT’s influence developmental trajectories and outcomes (Jensen & Arnett, 2012). Given the breadth of discussion in the literature about development, and ICT use, there is relatively little research focusing on how young women interpret and internalize these experiences. The primary purpose of this study was to understand the interaction between young adults frequent online use and developmental tasks — identity formation and intimate relationships. Interviews were conducted with young women (18-29) who qualified as high users (N=22). Participants’ were interviewed twice; the initial interview used a structured schedule, providing uniformity across participants. The second interview was an informal conversation personalized to the participant’s’ interests, experiences, and opinions about the topic. Participants were recruited from across the country, and the diversity in the sample mirrors the heterogeneous nature of the emerging adult population. Two forms of qualitative analysis were used, open thematic coding and narrative analysis. i Findings demonstrated the shift of the networked culture creates a highly individualized life trajectory for young people. Identity and intimacy are still the salient developmental tasks for young adults, but continue evolve throughout the life course. Narrative analyses were used to show strengths of the critical realism theory, especially the reflexive modes, by using case examples. Lastly, the role of ICT are discussed using four primary themes— augmented relationships, disruptive networks, defining moments, and driven agency. Ultimately, this research study helps provide evidence that online spaces are relational and the interactions a part of sociality. For social workers ability to understand development experiences and other facets of social life, further research is needed. ii For Charles, Beckie, and Bob. Thank you for the unconditional support. iii ACKNOWLEDGMENTS To begin I would like to thank my chair, Judy Krysik. You have done so much to help with my dissertation, and go far beyond that. Thank you for being a professional mentor, friend, and world-class travel guide as you brought me into a whole new life. My work will always be indebted to your generosity and kindness. Dr. LaMendola you have helped to walk me through places in the literature that no one else could have done. You are a true expert and philosopher in the area of social work and technology. Mostly, thank you for pioneering as a social work researcher and imagining a place for this type of work. Dr. MacEachron, you have been a wonderful support and cheerleader throughout my PhD studies. I appreciate your insight and encouragement; you had a unique way of encouraging me to dream big, and helping to keep my feet firmly planted. Thank you to my committee, I sincerely appreciate your time and expertise. Next, I want to acknowledge the many important people I connected with through the PhD program. I was fortunate to have an extraordinary cohort making our first years of PhD life bearable, thank you to Jana, Marcos, Elisa, Jyl, Jaime and Jonel. An extra debt of gratitude for Jonel’s time and efforts helping to work through my data collection and analysis as a debriefing partner. I have been fortunate to work closely with other PhD students, especially Alex, Heidi, Jen, Andrea, Meredith, John, and Chris. Both Mary Lutes and Laura Orr have helped me to survive; I can never pay back the multiple favors you two bestowed over the years. Dr. Jill Messing has been gracious enough to let me come onto her research team and work for her the past 3.5 years. Jill, thank you for keeping the lights on in my house and offering mentorship when no one was watching. Dr. Hodge and Dr. Segal, I know it was your job to help; I appreciate all you have done. iv Lastly, I want to thank my friends from the Oxford Internet Institute Summer Doctoral Program 2014. Thank you Dr. Nash, Angela, Crystal, Kelly, Renee, and many more. Thank you to the 22 amazing young people who shared a part of their world, you all told amazing personal stories and this work honors those experiences. Each of you knows how and why our time together was special, thank you for being a part of this process. For my family and friends, thanks for sticking by me even though there are times you did not know what I needed or how long this would take. To the Lindsay crew, you all make life what it is. Thank you Mom and Dad for a long-list of reasons, the main one being your love and patience. To my dear siblings, Russ, Adria, Beth, Josh, Rachel, Mari, Levi, Laura, and William, please call me Dr. from now on. Cali Ann and James Jr., thanks for the smiles— your pictures and videos do help! To my friends Tori, Vanessa, Amanda, Natalie, Sara, Natasha M., Notosha W., and LaShawn, let us all go celebrate. Lastly, to my dear husband and new family, Charles. No doubt, I would not be here without you. For the past 3 years, you have listened to me theorize, helped me to transcribe, worked as my personal editor, bought me office supplies, cooked meals, and provided endless encouragement. Thank you my heart. Thank you to the Graduate College for the Doctoral Completion Fellowship, Graduate Professional Student Association, OneLove Foundation, the School of Social Work, and the Dean’s Office in the College of Public Programs and Community Solutions. Through your generosity and financial support, I have been fortunate to focus on my studies and have the experiences that shaped my scholarship. v TABLE OF CONTENTS Page LIST OF TABLES x LIST OF FIGURES xi CHAPTER 1 INTRODUCTION 1 Transition to Adulthood 2 Theoretical Framework 10 Research Questions 12 2 LITERATURE REVIEW 17 Development Theories 17 Emerging Adulthood 19 Critical Realism 21 ICT Use & Development Research 27 Identity 28 Intimacy 38 Summary 53 3 METHODS 56 Ethics 58 Record Storage 60 Sample 60 Eligibility 61 Data Collection 65 Phase One 67 vi CHAPTER Page Phase Two 68 Analysis 69 Steps for Rigor 72 Summary 75 4 EXPERIENCES OF IDENTITY & INTIMACY 77 Identity 78 Generational Identity 78 Living Independently 82 Customized Moral Commitments 86 Intimacy 92 Adjusted Womanhood 94 Authentic Relationships 99 Summary 106 5 EXPLORING THE REFLEXIVITY FRAMEWORK 107 Communicative: Contextual Continuity 110 Carly 112 Stephanie 115 Autonomous Reflexives: The Entrepreneurs 118 Brooke 119 Olivia 122 Meta-Reflexive: The Analytical Voice 126 Holly 127 Tina 130 vii CHAPTER Page Fractured Reflexive: Disoriented Transitions 134 Brianna 135 Jennifer 139 Complicating Reflexive Modes: Challenging the Analysis 142 Summary 147 Disruptive Networks 148 Defining Moments 150 Driven Agency 152 6 THE ROLE OF ICT 156 Augment Personal Relationships 157 Family Relationships 158 Dating Relationships & ICT 161 Intimate Relationship Communication & ICT 166 Disruptive Networks 170 Daily ICT routine 171 Pluralist Societies 174 Multifaceted Social Media Use 177 Defining Moments 181 Influential ICT Use 181 Abuse experiences 185 Driven Agency 189 Online Presence 189 Social Justice Causes 192 viii CHAPTER Page Summary 201 7 CONCLUSION 202 Key Findings 202 Identity & Intimacy 203 Theoretical Implications 204 Role of ICT 206 Study Limitations 207 Grappling with data 207 Determining Rigor 209 Implications for Social Work 210 Practice 210 Policy 211 Research 212 REFERENCES 215 APPENDIX Page A IRB SUBMISSION 226 B CONSENT FORM 233 C PERFORMANCE RELEASE 236 D STUDY PROCEDURES 239 E INITIAL INTERVIEW SCHEDULE 240 F INTERVIEW TWO OUTLINE 243 G RESEARCH SOCIAL MEDIA SITES INSTRUCTION SHEET 245 ix LIST OF TABLES Table Page 1. Sample Demographic Information 74 x LIST OF FIGURES Figure Page 1. Reflexive Processes Before ICT 109 2. Reflexive Processes After ICT 110 3. Carly’s Reflexive Style 113 4. Lea’s Reflexive Style 147 5. Traditional Network Interactions 159 6. Augmented Relationships 170 7. Disruptive Networks 181 8. Defining Moments 189 9. Agency through Online Interaction 201 xi CHAPTER ONE: INTRODUCTION Taylor is a 22-year-old woman who lives in San Francisco. Today she woke up, and like any other day, the first thing she did was check her text messages to see if Anthony had contacted her. They met two weeks ago on Tinder, a smartphone dating application, and since then they have communicated regularly. Their communication started off promising; a few days ago Anthony started following her on Instagram and added her as a Facebook friend. However, several days have passed since she last heard from him, and Taylor is unsure if she did something wrong. Perhaps she appeared too opinionated; she often posted blogs and comments about the upcoming Presidential election. Or maybe he did not like one of the pictures on her Instagram page. Taylor is unsure whether she should contact Anthony again or wait to hear from him. Eventually, Taylor decides her best option is to focus on her studies and avoid using Tinder for the time being.
Recommended publications
  • An Exploration of the Role of Social Media Platforms in the Employee Recruitment Process
    An Exploration of the Role of Social Media Platforms in the Employee Recruitment Process Nadine Munro PhD Thesis 2018 i Contents Contents .............................................................................................................................ii List of Figures .................................................................................................................... vi List of Tables .................................................................................................................... vii Acknowledgements ............................................................................................................. viii Abstract................................................................................................................................. ix Chapter 1 – Introduction ........................................................................................................ 1 1.1 Introduction ............................................................................................................. 1 1.2 Research Aim and Objectives and Research Questions ......................................... 4 1.3 The Significance of the Study ................................................................................. 6 1.4 Summary of Literature Themes ............................................................................... 9 1.5 Overview of the Methodology ................................................................................ 17 1.6 Considerations for the Methodological
    [Show full text]
  • The Influence of Online Social Networking Sites on Selection Into a Dietetic Internship
    Illinois State University ISU ReD: Research and eData Theses and Dissertations 3-8-2017 The Influence of Online Social Networking Sites on Selection into a Dietetic Internship Noel Lorraine Konken Illinois State University, [email protected] Follow this and additional works at: https://ir.library.illinoisstate.edu/etd Part of the Human and Clinical Nutrition Commons Recommended Citation Konken, Noel Lorraine, "The Influence of Online Social Networking Sites on Selection into a Dietetic Internship" (2017). Theses and Dissertations. 688. https://ir.library.illinoisstate.edu/etd/688 This Thesis is brought to you for free and open access by ISU ReD: Research and eData. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of ISU ReD: Research and eData. For more information, please contact [email protected]. THE INFLUENCE OF ONLINE SOCIAL NETWORKING SITES ON SELECTION INTO A DIETETIC INTERNSHIP Noel L Konken 49 Pages Background: Acceptance into a Dietetic Internship (DI) Program is a competitive application process where the growing number of applicants exceeds the number of available positions. Because of this, Dietetic Internship (DI) directors may need to outsource external applicant information on social networking sites (SNS) to better differentiate among top candidates. Objective: The purpose of this study surveying didactic program in dietetics (DPD) directors and DI directors was to evaluate the effects of SNS education on DPD match rate and how DI directors utilize SNS while reviewing potential candidates’ application materials. Design: DPD and DI directors were emailed a link to an anonymous, web-based survey to obtain information from DPD directors regarding spring 2016 DI match data and DI directors regarding the frequency and beliefs for online vetting of potential candidates.
    [Show full text]
  • A Semantic‑Based Analysis of Android Malware for Detection, Generation, and Trend Analysis
    This document is downloaded from DR‑NTU (https://dr.ntu.edu.sg) Nanyang Technological University, Singapore. A semantic‑based analysis of Android malware for detection, generation, and trend analysis Meng, Guozhu 2017 Meng, G. (2017). A semantic‑based analysis of Android malware for detection, generation, and trend analysis. Doctoral thesis, Nanyang Technological University, Singapore. http://hdl.handle.net/10356/72122 https://doi.org/10.32657/10356/72122 Downloaded on 27 Sep 2021 00:23:01 SGT NANYANG TECHNOLOGICAL UNIVERSITY A SEMANTIC-BASED ANALYSIS OF ANDROID MALWARE FOR DETECTION, GENERATION, AND TREND ANALYSIS GUOZHU MENG School of Computer Science and Engineering A thesis submitted to the Nanyang Technological University in partial fulfilment of the requirements for the degree of Doctor of Philosophy 2017 THESIS ABSTACT A Semantic-based Analysis of Android Malware for Detection, Generation, and Trend Analysis by GUOZHU MENG Doctor of Philosophy School of Computer Science and Engineering Nanyang Technological University, Singapore Android has grown to be the most popular mobile operating system since its release in 2008. Due to its openness and ease of use, it attracts thousands of vendors and devel- opers working on Android application development. Millions of apps provide a variety of functionalities to Android users, such as online shopping, instant messaging, gaming and map service. However, Android becomes a hot attack target of cybercriminals due to its prevalence. According to the security report of Symantec in 2016, the number of Android malware has reached 13 million in 2015. Android malware is uploaded into ei- ther Google official market or unofficial markets everyday by cybercriminals which put users under a high risk.
    [Show full text]
  • Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong Martin R
    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Mareková, Royal Holloway, University of London https://www.usenix.org/conference/usenixsecurity21/presentation/albrecht This paper is included in the Proceedings of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to the Proceedings of the 30th USENIX Security Symposium is sponsored by USENIX. Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong Martin R. Albrecht Jorge Blasco Royal Holloway, University of London Royal Holloway, University of London [email protected] [email protected] Rikke Bjerg Jensen Lenka Mareková Royal Holloway, University of London Royal Holloway, University of London [email protected] [email protected] Abstract a “smart mob” facilitated by digital technology [104]. Plat- forms such as Telegram and LIHKG worked to mobilise and The Anti-Extradition Law Amendment Bill protests in Hong establish a sense of community among young activists [87] Kong present a rich context for exploring information secu- and created a “symbiotic network” of protesters [61]. Social rity practices among protesters due to their large-scale ur- media was used to maintain “protest potential” over time [68]. ban setting and highly digitalised nature. We conducted in- To design and build secure communication technologies depth, semi-structured interviews with 11 participants of these that meet the needs of participants in large-scale protest move- protests. Research findings reveal how protesters favoured ments, it is critical that designers and technologists under- Telegram and relied on its security for internal communica- stand protesters’ specific security concerns, notions, practices tion and organisation of on-the-ground collective action; were and perceptions.
    [Show full text]
  • Uarterly Vol
    ON COLOR BACKGROUND QUARTERLY VOL. 63, NO. 2 ON WHITE BACKGROUNDWINTER, 2013 SIDESTEPPING PREEMPTION: GENERIC DRUG LITIGATION IN THE AFTERMATH OF MENSING Jeffrey R. Pilkington and James R. Henderson MORTGAGE LENDING REFORM UNDER THE DODD-FRANK WALL STREET REFORM AND CONSUMER PROTECTION ACT John P. Scott, Jr. TAKE THIS AND GOOGLE THAT: THE ETHICS OF LAWYERS, JUDGES AND JURORS MEETING IN CYBERSPACE Brian L. Calistri, Jennifer E. Johnsen and Phil R. Richards TRYING A CASE IN CYBERSPACE Walter W. Dukes BROWSE THIS EDITION FEDERATION OF DEFENSE & CORPORATE COUNSEL PRESIDENT SENIOR DIRECTORS DIRECTORS EDWARD M. KAPLAN BRUCE D. CELEBREZZE EDWARD J. CURRIE, JR. Sulloway & Hollis PLLC Sedgwick LLP Currie Johnson Griffin Gaines Concord, NH San Francisco, CA & Myers PA 603-224-2341 [email protected] Jackson, MS [email protected] [email protected] STEVEN E. FARRAR PRESIDENT-ELECT Smith Moore Leatherwood LLP ANDREW B. DOWNS TIMOTHY A. PRATT Greenville, SC Bullivant Houser Bailey, PC Boston Scientifc Corporation [email protected] San Francisco, CA Natick, MA [email protected] 508-650-8616 H. MILLS GALLIVAN [email protected] Gallivan, White & Boyd, PA WALTER DUKES Greenville, SC Dukes Dukes Keating Faneca PA SECRETARY-TREASURER [email protected] Gulfport, MS VICTORIA H. ROBERTS [email protected] Meadowbrook Insurance Group J. SCOTT KREAMER Scottsdale, AZ Baker, Sterchi, Cowden MICHAEL T. GLASCOTT 602-445-5920 & Rice, LLC Goldberg Segalla, LLP [email protected] Kansas City, MO Buffalo, NY [email protected] [email protected] BOARD CHAIR MICHAEL I. NEIL DEBORAH D. KUCHLER SUSAN B. HARWOOD Neil, Dymott, Frank, McFall Kuchler Polk Schell Weiner Boehm, Brown, Harwood, Kelly & Trexler APLC & Richeson, LLC & Scheihing, P.A.
    [Show full text]
  • Lewis, Hughes, Segal, Greer | Program on Extremism & Anti-Defamation League
    LEWIS, HUGHES, SEGAL, GREER | PROGRAM ON EXTREMISM & ANTI-DEFAMATION LEAGUE WHITE SUPREMACIST TERROR: MODERNIZING OUR APPROACH TO TODAY’S THREAT 1 | Page LEWIS, HUGHES, SEGAL, GREER | PROGRAM ON EXTREMISM & ANTI-DEFAMATION LEAGUE About the Program on Extremism The Program on Extremism at George Washington University provides analysis on issues related to violent and non-violent extremism. The Program spearheads innovative and thoughtful academic inquiry, producing empirical work that strengthens extremism research as a distinct field of study. The Program aims to develop pragmatic policy solutions that resonate with policymakers, civic leaders, and the general public. About the Center on Extremism at the Anti-Defamation League ADL’s Center on Extremism (COE) is the agency’s research and investigative arm, and a clearinghouse of valuable, up-to-the minute information about extremism of all types— from white supremacists to Islamic extremists. For decades, COE analysts have tracked extremist activity in the U.S. and abroad, assisted law enforcement with countless investigations, and helped disrupt and prevent multiple terror attacks. Their law enforcement trainings provide officers with the information they need to protect our country—and themselves—against extremist violence. WHITE SUPREMACIST TERROR: MODERNIZING OUR APPROACH TO TODAY’S THREAT 2 | Page LEWIS, HUGHES, SEGAL, GREER | PROGRAM ON EXTREMISM & ANTI-DEFAMATION LEAGUE Introduction “Basically, they’re domestic terrorists. That's why we’re here,” stated a Georgia Assistant District Attorney on February 14, 2020.1 The prosecutor was attempting to explain to a judge why two members of The Base, a violent white supremacist group, should not be let out on bond.
    [Show full text]
  • Why Talk When You Can Swipe?
    WHY TALK WHEN YOU CAN SWIPE? A QUALITATIVE INVESTIGATION OF COLLEGE HETEROSEXUALS USING SMARTPHONES TO HOOKUP AND DATE A thesis submitted to Kent State University in partial fulfillment of the requirements for the degree of Master of Arts by Kenneth R. Hanson May, 2017 Thesis written by Kenneth R. Hanson B.A., Seattle University, 2015 M.A., Kent State University, 2017 Approved by __________________________________________, Advisor, Department of Sociology Clare Stacey __________________________________________, Chair, Department of Sociology Richard Serpe __________________________________________, Dean, College of Arts and Sciences James Blank TABLE OF CONTENTS INTRODUCTION ...............................................................................................................1 DATING APPS ....................................................................................................................4 Dating Apps .............................................................................................................4 Layout ......................................................................................................................5 LITERATURE REVIEW ....................................................................................................7 Media Coverage .......................................................................................................7 Hookup Culture ........................................................................................................8 Dating and Long-term Pairing
    [Show full text]
  • Online Teaching and Learning Guideline During Covid-19 Pandemic by Universiti Malaya
    ONLINE TEACHING AND LEARNING GUIDELINE DURING COVID-19 PANDEMIC BY UNIVERSITI MALAYA #UMTeachOnline Online Teaching and Learning Guideline During COVID-19 Pandemic Prepared by: Provost/ Deputy Vice-Chancellor (Academic & International), Universiti Malaya Academic Enhancement and Leadership Development Centre (ADeC), Universiti Malaya Quality Management and Enhancement Centre (QMEC), Universiti Malaya Academic Strategic Planning Centre (ASPC), Universiti Malaya Academic Administration and Services Centre (AASC), Universiti Malaya Centre for Internship Training and Academic enrichment (CITrA), Universiti Malaya First Edition 2nd April 2020 CC BY-NC-SA Cover design by: Ferlynda Jamaludin Table of contents 1.0 Purpose ......................................................................................................................... 2 2.0 About the Guideline....................................................................................................... 2 3.0 Guideline ....................................................................................................................... 2 3.1 Online Teaching and Learning Design ....................................................................... 2 3.1.1 Student Learning Time (SLT) ............................................................................... 4 3.2 Online Teaching and Learning Delivery ..................................................................... 4 3.2.1 Synchronous teaching and learning ..................................................................
    [Show full text]
  • Privacy Concerns Over Employer Access to Employee Social Media
    PRIVACY CONCERNS OVER EMPLOYER ACCESS TO EMPLOYEE SOCIAL MEDIA MURRAY BROWN* AND CHRIS DENT** Amid increasing concerns about the encroachment of work on private life, this article examines the extent to which Australian employers should be able to access their employees’ personal social media posts, with specific reference to ongoing surveillance and the forced disclosure of passwords. Both the federal workplace and privacy legislation are discussed to consider the extent to which they offer appropriate protections. Given their limitations, other options, including a tort of privacy and a workplace privacy regulator, are raised that may better protect the privacy and freedom of expression of employees. Black’s notion of ‘decentred regulation’ is applied to the current, and proposed, law in order to better understand the positives, and negatives, of the legal controls over employer access to the social media of their employees. I INTRODUCTION ‘Social media’ is an umbrella term for various websites that integrate technology, user-generated content and social interaction. These sites generally allow users to create, download and share content, publish a profile and other personal information, and connect with others.1 Social media use is verging on the ubiquitous in Australia. There were, for example, 13 million active Facebook users each month in 2015.2 There are other more specialised social media sites. Twitter is aimed at the communication of 140 character-long messages as contributions to debate (via hashtags) or to ‘followers’. Tinder and Grindr facilitate ‘hook-ups’ * School of Law, Murdoch University. This article was begun while the author was on sabbatical at Jesus College, Cambridge in 2013.
    [Show full text]
  • Online Teaching and Learning Guideline Version 2.Pdf
    Online Teaching and Learning Guideline Prepared by: Provost/ Deputy Vice-Chancellor (Academic & International), Universiti Malaya Academic Enhancement and Leadership Development Centre (ADeC), Universiti Malaya In collaboration with: Quality Management and Enhancement Centre (QMEC), Universiti Malaya Academic Strategic Planning Centre (ASPC), Universiti Malaya Academic Administration and Services Centre (AASC), Universiti Malaya Centre for Internship Training and Academic enrichment (CITrA), Universiti Malaya Second Edition, September 2020. Cover design by: Ferlynda Jamaludin Table of contents 1.0 Purpose ................................................................................................................................... 4 2.0 About the Guideline ................................................................................................................. 4 3.0 Guideline ....................................................................................................................................... 4 3.1 Online Teaching and Learning Design ................................................................................... 4 3.1.1 Student Learning Time (SLT) ................................................................................................. 5 3.2 Online Teaching and Learning Delivery ................................................................................. 6 3.2.1 Synchronous teaching and learning ....................................................................................... 7 3.2.2
    [Show full text]
  • Using Social Media to Facilitate Health Communication
    #OvarianCancer: Using Social Media to Facilitate Health Communication Tara Coffin A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2019 Reading Committee: Deborah Bowen, Chair Malia Fullerton Hilary Karasz Program Authorized to Offer Degree: Public Health Genetics 1 ©Copyright 2019 Tara Coffin 2 University of Washington Abstract # OvarianCancer: Using Social Media to Facilitate Health Communication Tara Coffin Chair of the Supervisory Committee: Deborah Bowen Bioethics & Humanities Ovarian cancer is the fifth leading cause of cancer death among women. Women with a personal or family history of breast and ovarian cancer are encouraged to seek genetic testing, but fewer than 15 to 30% of eligible patients are ever offered genetic testing. Social media may be well positioned to address this area of need. This research seeks to improve our understanding of social media as a platform for public health research and communication, in the context of familial ovarian cancer susceptibility. In Aim 1, I explored how ovarian cancer and ovarian cancer risk is discussed over Twitter, collecting and analyzing tweets to identify structural features of a tweet and describe how social media users publicly exchange and engage with ovarian cancer information over Twitter. In Aim 2, I conducted a series of contextual interviews to describe the online health information-seeking behaviors of internet users at risk for ovarian cancer. Finally, in Aim 3, I evaluated innovative methods for recruiting research participants for an ovarian cancer genetic testing study, using paid targeted advertisements and unpaid posts over Facebook. Findings from this research illustrate what structural components of a social media 3 post may help improve message reach, describe how internet users with a risk of ovarian cancer assess online health information, and demonstrate that Facebook is an effective tool for reaching women over the age of 30 with an increased risk of ovarian cancer.
    [Show full text]
  • Determining Current Judicial Trends in Defining Parameters of Privacy at the Workplace in Relation to Social Media Use by Employ
    DETERMINING CURRENT JUDICIAL TRENDS IN DEFINING PARAMETERS OF PRIVACY AT THE WORKPLACE IN RELATION TO SOCIAL MEDIA USE BY EMPLOYEES — AN AUSTRALIAN CONTEXT AJANTHA THINKARAN Lawyer Admitted to Practice in the Supreme Court of Western Australia and High Court of Australia Bachelor of Laws with Honours (University of London) This thesis is presented for the degree of Master in Laws by Research of Murdoch University February 2018 Student number: 31696343 Declaration I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution. This Thesis was submitted for professional editing by Capstone Editing Pty Ltd of 15 Moore Street, Cannberra, ACT 2601 and that the editing and proof-reading by professional editors complies with the approved standards as set out on the GR website. …………………………………………………………… (Ajantha Thinakaran) ii Abstract The legal issues that relate to the realm of privacy, social media communication and technology are ever growing. In Australia, over the past five years or so, there have been a series of dismissals resulting from the use of personal social media communications by employees. One area of dismissals is employers terminating employees for complaining about their colleagues in the employee’s personal social media space. Another example is employees discussing workplace processes and procedures in the employee’s personal social media space leading to alleged disclosures of confidential information. Several questions concern these dismissals. These include determining how courts view individual employees’ personal social media sites, either as a private space or a public space.
    [Show full text]