2-ChildJ. T., PetronioS.(2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. In WrightK. B., WebbL. M.(Eds.), Computer-mediated communication in personal relationships(pp. 21–40).
4- BeamM. A.,& etal, (2018). Context collapse and privacy management: Diversity in Facebook friends increases online news reading and sharing. New Media & Society, 20(7), 2296–2314https://doi.org/10.1177/1461444817714790
5- MarwickA. E., boydD.(2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114–133 https://doi.org/10.1177/1461444810365313
6-DarrC. R., DossE. F.(2022). The fake one is the real one: Finstas, authenticity, and context collapse in teen friend groups. Journal of Computer-Mediated Communication, 27(4), zmac009https://doi.org/10.1093/jcmc/zmac009
7-BrandtzaegP. B., LüdersM.(2018). Time collapse in social media: extending the context collapse. Social Media+ Society, 4(1), 2056305118763349
14-Lehti L., Kallio J. (2017). Participation in an online social policy discussion: Arguments in focus. Discourse, Context & Media, 19, 58-65.
16-WisniewskiP., LipfordH., WilsonD.(2012) Fighting for my space: Coping mechanisms for SNS boundary regulation. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 609–618). NY: Association for Computing Machinery. https://doi.org/10.1145/2207676.2207761
17-AshforthB. E., KreinerG. E., FugateM.(2000). All in a day’s work: Boundaries and micro role transitions. Academy of Management Review, 25(3), 472–491
https://doi.org/10.5465/amr.2000.3363315
18-MichikyanM., DennisJ., SubrahmanyamK.(2015). Can you guess who I am? Real, ideal, and false self-presentation on Facebook among emerging adults. Emerging Adulthood, 3(1), 55–64
19-KiniS., Pathak-ShelatM., JainV.(2022). Conceptualizing “filter-ing”: Affordances, context collapse, and the social self online. International Journal of Communication, 16, 21
37-Brian E Weeks(2024) Too scared to share? Fear of social sanctions for political expression on social media Journal of Computer-Mediated Communication, Volume 29, Issue 1, January 2024, zmad041, https://doi.org/10.1093/jcmc/zmad041
41-Andrew M. Guess& etal,(2023)How do social media feed algorithms affect attitudes and behavior in an election campaign? Vol 381, Issue 6656pp. 398-404
66-Guruprasad Gadgil(2023)Mediation of transgender impression management between transgender privacy paradox and Trans Facebook Persona: A trans perspectiveComputers in Human Behavior Volume 143, June 2023, 107700
-70Pengxiang Li,etal (2023):From context adaptation to context restoration: trategies, motivations, and decision rules of managing context collapse on WeChat , Journal of Computer-Mediated Communication, Volume 29, Issue 1, January 2024, zmad043, https://doi.org/10.1093/jcmc/zmad043
75-Hinde, C. and Ophoff, J. (2020), “The technological panopticon: electronic monitoring and surveillance within the workplace: employee turbulence through perceptions of privacy infringement”, in Anthony, V. (Ed.), IFIP Working Group 8, p.
15.Proceeding of 2020 Dewald Roode Workshop on Information Systems Security ResearchAmes, IA, USA11/11.13 76-Li, K., Cheng, L. and Teng, C.-I. (2020), “Voluntary sharing and mandatory provision: private information disclosure on social networking sites”, Information Processing and Management, Vol. 57 No. 1, pp. 102-128. 77-Petronio, S. and Durham, W.T. (2015), Communication Privacy Management Theory, John Wiley & Sons, Edison, NJ. -78Kehr, F., Wentzel, D. and Mayer, P. (2013), “Rethinking the privacy calculus: on the role of dispositional factors and affect”, Proceedings of the International Conference on Information Systems (ICIS 2013), Atlanta, GA, USA, Milan, Italy, AIS Association for Information Yu Wang, Daqing Zheng, Yulin Fang(2023) op,cit.-79
80-Kehr, F., Wentzel, D. and Mayer, P. (2013) op,cit.
81-Communication Privacy Management Theory, op,cit.
85-Petronio, S. (2002),op,cit. -86Chen, J.V., Nguyen, H.V.V. and Ha, Q.-A. (2020), “Understanding location disclosure behaviour via social networks sites: a perspective of communication privacy management theory”, International Journal of Mobile Communications, Vol. 18 No. 6, pp. 690-713.
87-Ibid Communication Privacy Management Theory,op,cit. -88
-90 Petronio, S. (2002) ,op,cit.
91-Ibid
Hinde, C. and Ophoff, J. (2020)-93
-94GoffmanE.1959The presentation of self in everyday lifeDoubleday
Edition 2nd Edition2018
95-boydD, MarwickA (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114–133
boydD MarwickA(2011), ,op.cit.-97 boydD MarwickA(2011) ,op.cit.-98
-99Darr C. R., DossE. F.(2022). The fake one is the real one: Finstas, authenticity, and context collapse in teen friend groups. Journal of Computer-Mediated Communication, 27(4), zmac009. https://doi.org/10.1093/jcmc/zmac009
-100WisniewskiP., LipfordH., WilsonD.(2012). Op.cit.
101-Gil-LopezT.,& etal,(2018). One size fits all: Context collapse, self-presentation strategies and language styles on Facebook. Journal of Computer-Mediated Communication, 23(3), 127–145. https://doi.org/10.1093/jcmc/zmy006
102-HoganB.(2010). The presentation of self in the age of social media: Distinguishing performances andexhibitions online. Bulletin of Science, Technology & Society, 30(6), 377–386
103-boydD. M.(2008). Taken out of context: American teen sociality in networked publics. University of California
104-BrandtzaegP. B., LüdersM.(2018). Op.cit.
105-KiniS., Pathak-ShelatM., JainV.(2022). Op.vit.
107-DavisJ. L., JurgensonN.(2014). Context collapse: Theorizing context collusions and collisions. Information, Communication & Society, 17(4), 476–485
108-AshforthB. E., KreinerG. E., FugateM.(2000). Op.cit.
109-ZhaoX., & etal.(2013). The many faces of Facebook: Experiencing social media as performance, exhibition, and personal archive. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1–10). NY: Association for Computing Machinery. https://doi.org/10.1145/2207676.2207761
110-GoffmanE.1959The presentation of self in everyday lifeDoubleday
111-Nippert-EngC. E.(1996). Home and work: Negotiating boundaries through everyday life. University of Chicago Press
112-MichaelsenS., JohnsonD. E, (1997). Border theory: The limits of cultural politics. U of Minnesota Press
113-AshforthB. E., KreinerG. E., FugateM.(2000). Op.cit.
114-Nippert-EngC. E.(1996). Home and work: Negotiating boundaries through everyday life. University of Chicago Press
118-DarrC. R., DossE. F.(2022). Op.cit.
120-BrandtzaegP. B., LüdersM.(2018). Op.cit.
122-Stryker S., Burke P. J. (2000). The past, present, and future of an identity theory. Social Psychology Quarterly, 63, 284-297.
123-Jones S. R., McEwen M. K. (2000). A conceptual model of multiple dimensions of identity. Journal of College Student Development, 41, 405-414.
124-Li X., Hou Z. J., Jia Y. (2015). The influence of social comparison on career decision-making: Vocational identity as a moderator and regret as a mediator. Journal of Vocational Behavior, 86, 10-19.
126-Hong J., Greene B., Lowery J. (2017). Multiple dimensions of teacher identity development from pre-service to early years of teaching: A longitudinal study. Journal of Education for Teaching, 43, 84-98.
127-Jones S. R., McEwen M. K. (2000). A conceptual model of multiple dimensions of identity. Journal of College Student Development, 41, 405-414.
130-Huang-Horowitz N. C., Freberg K. (2016). Bridging organizational identity and reputation messages online: A conceptual model. Corporate Communications: An International Journal, 21, 195-212.
131-Davis J. L., Jurgenson N. (2014). Context collapse: Theorizing context collusions and collisions. Information, Communication & Society, 17, 476-485.
132-van Dijck J. (2013). “You have one identity”: Performing the self on Facebook and LinkedIn. Media, Culture & Society, 35, 199-215.
https://journals.sagepub.com/doi/abs/10.1177/0163443712468605 133-Bian L., Leslie S. J., Cimpian A. (2017). Gender stereotypes about intellectual ability emerge early and influence children’s interests. Science, 355, 389-391.https://www.science.org/doi/full/10.1126/science.aah6524 134-Pinkard N., Erete S., Martin C. K., McKinney de, Royston M. (2017). Digital Youth Divas: Exploring narrative-driven curriculum to spark middle school girls’ interest in computational activities. Journal of the Learning Sciences, 26, 477-516.https://www.tandfonline.com/doi/abs/10.1080/10508406.2017.1307199
135-Papacharissi Z. (2012). Without you, I’m nothing: Performances of the self on Twitter. International Journal of Communication, 6, 1989-2006.
136-Jameson D. A. (2014). Crossing public-private and personal-professional boundaries: How changes in technology may affect CEOs’ communication. Business and Professional Communication Quarterly, 77, 7-30.
137-Ashforth B. E., Schinoff B. S., Rogers K. M. (2016). “I identify with her,” “I identify with him”: Unpacking the dynamics of personal identification in organizations. Academy of Management Review, 41, 28-60.
138-Copes H., Leban L., Kerley K. R., Deitzer J. R. (2016). Identities, boundaries, and accounts of women methamphetamine users. Justice Quarterly, 33, 134-158.
141-Hong J., Greene B., Lowery J. (2017). Multiple dimensions of teacher identity development from pre-service to early years of teaching: A longitudinal study. Journal of Education for Teaching, 43, 84-98.https://www.tandfonline.com/doi/abs/10.1080/02607476.2017.1251111 142-Jin Y., Liu B. F., Austin L. L. (2014). Examining the role of social media in effective crisis management: The effects of crisis origin, information form, and source on publics’ crisis responses. Communication Research, 41, 74-94.https://journals.sagepub.com/doi/abs/10.1177/0093650211423918
143-Ibid.
147-Alvesson M., Sandberg J. (2013). Op.cit.
148-Grajales F. &.etal, (2014). Social media: A review and tutorial of applications in medicine and health care. Journal of Medical Internet Research, 16, e13.
150-van Dijck J. (2013). Op.cit.
151-Grajales F. &.etal, (2014). Op.cit.
152-Davis J. L., Jurgenson N. (2014). Op.cit.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4359610 154-ZhaoX., SalehiN., NaranjitS., AlwaalanS., VoidaS., CosleyD.(2013),op,cit. 155- Ibid Op,cit(Leeds-Hurwitz, 2009)156- 157-Hunter, D., McCallum, J. and Howes, D. (2019) Defining Exploratory-Descriptive Qualitative (EDQ) research and considering its application to healthcare. Journal of Nursing and Health Care, 4https://eprints.gla.ac.uk/180272/7/180272.pdf (1),
160-Raimo Streefkerk. (2023). Inductive vs. Deductive Research Approach | Steps & Example
https://www.scribbr.com/methodology/inductive-deductive-reasoning 161-Hunter, D., McCallum, J. and Howes, D. (2019) op.cit. 162-Piacentini, M. and Mailer, G. (2006) Symbolic Consumption in Teenagers’ Clothing Choices, Journal ofConsumer Behaviour 3 (3): 251–262. 163-Kvale, S. (1996) Interviews: An introduction to qualitative research interviewing, CA: Sage.
164-Michael & Jeffrey(2017)Context collapse and privacy management: Diversity in Facebook friends increases online news reading and sharing DOI:10.1177/1461444817714790
165-MøllerK., RobardsB.(2019). Walking through, going along and scrolling back: Ephemeral mobilities in digital ethnography. Nordicom Review, 40(s1), 95–109
168-Petronio, S. (2002). Op.cit.
170-Roger Clarke, " personalia page", 2008 171-Petronio, S. (2002)),op.cit 172- Ibid 173-Sandra Petronio and Wesley T. Durham(2015),op.cit.
174-Afifi, W. A., & Guerrero, L. K. (2000). Motivations underlying topic avoidance in close relationships. In S.Petronio(Ed.), Balancing the Secrets of Private Disclosures(pp. 165–179). Mahwah, NJ: Erlbuam
175-Ibid
176-Communication Privacy Management Theory,op.cit. 177-Sandra Petronio and Wesley T. Durham (2015) op.cit.
178-Altman, I., & Taylor, D. A. (1973). Social Penetration: The Development of Interpersonal Relationships. New York: Holt, Rinehart, & Winston
179-Ibid
180-Sandra Petronio and Wesley T. Durham(2015) op.cit. 181- Miriam J. Metzger(2007),op.cit. 182-Sandra Petronio and Wesley T. Durham (2015) op.cit. 183-Petronio, S. (2002) op.cit.
185-Sandra Petronio and Wesley T. Durham (2015) op.cit.
186- Miriam J. Metzger2007, op.cit.
187- Ibid 188-MøllerK., RobardsB.(2019) op.cit. 189-AshforthB. E., KreinerG. E., FugateM.(2000), op.cit. 190-Ibid 191-KiniS., Pathak-ShelatM., JainV.(2022). Op.cit.
192-BrandtzaegP. B., LüdersM.(2018). Op.cit.
193-Alvesson M., Sandberg J. (2013). op.cit. 194-DavisJ. L., JurgensonN.(2014). Op.cit. 195-Ibid. 196-DavisJ. L., JurgensonN.(2014).op.cit.
197-Jin Y., Liu B. F., Austin L. L. (2014). Op.cit.
198-AshforthB. E., KreinerG. E., FugateM.(2000). op.cit.
199-MichaelsenS., JohnsonD. E.(Eds.). (1997). Border theory: The limits of cultural politics. U of Minnesota Press
202-Kohtamäki, V., & Balbachevsky, E. (2018). University autonomy: From past to present. Theoretical and Methodological Perspectives on Higher Education Management and Transformation: An advanced reader for PhD students.https://library.oapen.org/bitstream/handle/20.500.12657/28911/Theoretical_and_Methodological_Perspectives_On_Higher_Education.pdf?sequence#page=181 203-Uerz, D., Volman, M., & Kral, M. (2018). Teacher educators’ competences in fostering student teachers’ proficiency in teaching and learning with technology: An overview of relevant research literature. Teaching and Teacher Education, 70, 12–23. https://www.webofscience.com/wos/woscc/full-record/WOS:000423641900002?SID=EUW1ED0F7886zBT9WVcfUw8HAA5UB 204-Hökkä, P., & Eteläpelto, A. (2014). Seeking new perspectives on the development of teacher education: A study of the Finnish context. Journal of Teacher Education, 65(1), 39–52. https://journals.sagepub.com/doi/abs/10.1177/0022487113504220 205-Kohtamäki, V., & Balbachevsky, E. (2018). Op.cit.