69
Views
0
CrossRef citations to date
0
Altmetric
Research Article

“I would not want to be viewed as someone that complains”: a mixed methods analysis of the factors that contribute to concealment and disclosure of workplace cyberbullying

& ORCID Icon

References

  • Burleson, B. R., & MacGeorge, E. L. (2002). Supportive communication. In M. L. Knapp & J. A. Daly (Eds.), Handbook of interpersonal communication (pp. 374–424). Sage.
  • Charoensap-Kelly, P., Mestayer, C. L., & Knight, G. B. (2020). To come out or not to come out: Minority religious identity self-disclosure in the United States workplace. Management Communication Quarterly, 34(2), 213–250. doi:10.1177/0893318919890072
  • Checton, M. G., & Greene, K. (2012). Beyond initial disclosure: The role of prognosis and symptom uncertainty in patterns of disclosure in relationships. Health Communication, 27(2), 145–157. doi:10.1080/10410236.2011.571755
  • Cohen, S., & Wills, T. A. (1985). Stress, social support, and the buffering hypothesis. Psychological Bulletin, 98(2), 310–357. doi:10.1037/0033-2909.98.2.310
  • Compton, C. A. (2016). Managing mixed messages: Sexual identity management in a changing U.S. workplace. Management Communication Quarterly, 30(4), 415–440. doi:10.1177/0893318916641215
  • Cowan, R. L., & Bochantin, J. E. (2018). Understanding workplace cyberbullying from two perspectives. In R. West & C. S. Beck (Eds.), The Routledge Handbook of Communication and bullying (pp. 93–102). Routledge. https://www.routledgehandbooks.com/doi/10.4324/9781315148113-11
  • Derlega, V. J., Winstead, B. A., Mathews, A., & Braitman, A. L. (2008). Why does someone reveal highly personal information? Attributions for and against self-disclosure in close relationships. Communication Research Reports, 25(2), 115–130. doi:10.1080/08824090802021756
  • Einarsen, S., & Skogstad, A. (1996). Bullying at work: Epidemiological findings in public and private organizations. European Journal of Work & Organizational Psychology, 5(2), 185–201. doi:10.1080/13594329608414854
  • Farley, S., Coyne, I., Axtell, C., & Sprigg, C. (2016). Design, development and validation of a workplace cyberbullying measure, the WCM. Work & Stress: An International Journal of Work, Health & Organisations, 30(4), 293–317. doi:10.1080/02678373.2016.1255998
  • Glaser, B., & Strauss, A. (1967). The discovery of grounded theory: Strategies for qualitative research. Mill Valley, CA: Sociology Press.
  • Goldsmith, D. J., & TL Albrecht. (2011). Social support, social networks, and health: A guiding framework. In T. L. Thompson, R. Parrott, & J. F. Nussbaum (Eds.), The Routledge handbook of health communication (2nd ed., pp. 335–348). New York: Routledge.
  • Hammonds, J. R. (2015). A model of privacy control: Examining the criteria that predict emerging adults’ likelihood to reveal private information to their parents. Western Journal of Communication, 79(5), 591–613. doi:10.1080/10570314.2015.1083117
  • Helens-Hart, R. (2017). Females’ (non)disclosure of minority sexual identities in the workplace from a communication privacy management perspective. Communication Studies, 68(5), 607–623. doi:10.1080/10510974.2017.1388827
  • High, A. C., & Young, R. (2018). Supportive communication from bystanders of cyberbullying: Indirect effects and interactions between source and message characteristics. Journal of Applied Communication Research, 46(1), 28–51. doi:10.1080/00909882.2017.1412085
  • Lindlof, T. R., & Taylor, B. C. (2002). Qualitative communication research methods. Thousand Oaks, CA: SAGE Publications.
  • Lutgen-Sandvik, P., & McDermott, V. (2011). Making sense of supervisory bullying: Perceived powerlessness, empowered possibilities. The Southern Communication Journal, 76(4), 342–368. doi:10.1080/10417941003725307
  • Lutgen-Sandvik, P., & Sypher, B. D. (2009). Destructive organizational communication: Processes, consequences, and constructive ways of organizing. New York: NY: Routledge.
  • Lutgen-Sandvik, P., Tracy, S. J., & Alberts, J. K. (2007). Burned by bullying in the American Workplace: Prevalence, perception, degree, and impact. Journal of Management Studies, 44(6), 837–862. doi:10.1111/j.1467-6486.2007.00715.x
  • Magsamen-Conrad, K., Venetis, M. K., Checton, M. G., & Greene, K. (2019). The role of response perceptions in couples’ ongoing cancer-related disclosure. Health Communication, 34(9), 999–1009. doi:10.1080/10410236.2018.1452091
  • McBride, M. C., & Bergen, K. M. (2015). Work spouses: Defining and understanding a “new” relationship. Communication Studies, 66(5), 487–508. doi:10.1080/10510974.2015.1029640
  • Meluch, A. L. (2023). Core and catalyst criteria for disclosing one’s burnout in the workplace. Qualitative Research Reports in Communication, 24(1), 61–67. doi:10.1080/17459435.2022.2074528
  • Meluch, A. L., LeBlanc, S. S., Hannah, M., & Starcher, S. (2023). Student-instructor communication during a crisis: College students’ disclosures about academic struggles and perceived instructor supportiveness and flexibility during the COVID-19 pandemic. Atlantic Journal of Communication, 31(4), 325–341. doi:10.1080/15456870.2022.2063865
  • Miller, K. I., Considine, J., & Garner, J. (2007). “Let me tell you about my job”: Exploring the terrain of emotion in the workplace. Management Communication Quarterly, 20(3), 231–260. doi:10.1177/0893318906293589
  • Nielsen, M. B., & Einarsen, S. (2012). Outcomes of exposure to workplace bullying: A meta-analytic review. Work & Stress: An International Journal of Work, Health & Organisations, 26(4), 309–332. doi:10.1080/02678373.2012.734709
  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: State University of New York Press.
  • Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13(1), 6–14. doi:10.1080/15267431.2013.743426
  • Petronio, S., & Caughlin, J. P. (2006). Communication privacy management theory:Understanding families. In D. O. Braithwaite & L. A. Baxter (Eds.), Engaging theories in family communication: Multiple perspectives (pp. 35–48). Sage Publications, Inc.
  • Petronio, S., & Durham, W. T. (2015). Communication privacy management theory: Significance for interpersonal communication. In D. O. Braithwaite & P. Schrodt (Eds.), Engaging theories in interpersonal communication: Multiple perspectives (2nd ed., pp. 335–347). Sage.
  • Rains, S. A. (2016). Social support. In D. K. Kim & J. W. Dearing (Eds.), Health communication research measures (pp. 223–232). Peter Lang.
  • Rook, K. S. (2003). Exposure and reactivity to negative social exchanges: A preliminary investigation using daily diary data. Journal of Gerontology: Psychological Sciences, 58(2), 100–P111. doi:10.1093/geronb/58.2.P100
  • Scarduzio, J. A., Redden, S. M., & Fletcher, J. (2021). Everyone’s ‘uncomfortable’ but only some people report: Privacy management, threshold levels, and reporting decisions stemming from coworker online sexual harassment. Journal of Applied Communication Research, 49(1), 66–85. doi:10.1080/00909882.2020.1849771
  • Sias, P. M. (2009). Organizing relationships: Traditional and emerging perspectives on workplace relationships. Sage Publications.
  • Smith, S. A., & Brunner, S. R. (2017). To reveal or conceal: Using communication privacy management theory to understand disclosures in the workplace. Management Communication Quarterly, 31(3), 429–446. doi:10.1177/0893318917692896
  • Steimel, S. (2021). Communication privacy management and pregnancy loss in interpersonal workplace communication. Women’s Studies in Communication, 44(3), 397–418. doi:10.1080/07491409.2020.1843579
  • Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory. Thousand Oaks, CA: SAGE Publications.
  • Tracy, S. J., Lutgen-Sandvik, P., & Alberts, J. K. (2006). Nightmares, demons and slaves: Exploring the painful metaphors of workplace bullying. Management Communication Quarterly, 20(2), 148–185. doi:10.1177/0893318906291980
  • Tye-Williams, S. (2018). Disciplining the office. In R. West & C. S. Beck, (Eds.), The Routledge Handbook of Communication and bullying (pp. 73–80). Routledge. https://www.routledgehandbooks.com/doi/10.4324/9781315148113-9
  • Tye-Williams, S., Carbo, J., D’Cruz, P., Hollis, L. P., Keashly, L., Mattice, C., & Tracy, S. J. (2020). Exploring workplace bullying from diverse perspectives: A journal of applied communication research forum. Journal of Applied Communication Research, 48(6), 637–653. doi:10.1080/00909882.2020.1830148
  • Tye-Williams, S., & Krone, K. J. (2017). Identifying and re-imaging the paradox of workplace bullying advice. Journal of Applied Communication Research, 45(2), 218–235. doi:10.1080/00909882.2017.1288291
  • Tye-Williams, S., & Ruble, R. (2017). Perceptions of workplace bullying narratives: Exploring attributions. Ohio Communication Journal, 55, 1–15.
  • Vangelisti, A. L., Caughlin, J. P., & Timmerman, L. (2001). Criteria for revealing family secrets. Communication Monographs, 68(1), 1–27. doi:10.1080/03637750128052
  • Westerman, C. Y. K., Currie-Mueller, J. L., Motto, J. S., & Curti, L. C. (2017). How supervisor relationships and protection rules affect employees’ attempts to manage health information at work. Health Communication, 32(12), 1520–1528. doi:10.1080/10410236.2016.1234538
  • Westerman, C. Y. K., Haverkamp, E. M., & Zeng, C. (2022). Understanding disclosure of health information to workplace friends. Behavioral Sciences, 12(10), 1–20. doi:10.3390/bs12100355
  • Westerman, C. Y. K., Miller, L. E., Reno, K. M., & Spates, S. A. (2015). Sharing personal health information at work: What is appropriate and expected in organizations? Communication Studies, 66(3), 378–397. doi:10.1080/10510974.2015.1019157
  • Workplace Bullying Institute. (2021). 2021 WBI U.S. workplace bullying survey. https://workplacebullying.org/wp-content/uploads/2021/04/2021-Full-Report.pdf
  • Zimet, G. D., Dahlem, N. W., Zimet, S. G., & Farley, G. K. (1988). The multidimensional scale of perceived social support. Journal of Personality Assessment, 52(1), 30–41. doi:10.1207/s15327752jpa5201_2

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.