- Communication Privacy Management Theory
- Navigation menu
- Communication privacy management theory
- Communication Privacy Management Theory: Chapter 13
- Sandra Petronio and Maria K. Venetis
- In This Article
- Communication privacy management theory pdf995
- Communication Privacy Management Theory
- Managing communication privacy
Communication Privacy Management CPM is a communication theory that focuses on the idea of why and how people manage private disclosures. The theory was created by Sandra Petronio in and its persistence in the world of theory lends it credibility in application.
Communication Privacy Management Theory
While some people are comfortable sharing all information with their significant other, some couples may not share more personal details about their life. CPM also incorporates ideas of self-disclosure. This theory hinges upon the idea of weighing and comparing pros and cons in order to decide courses of action in communication when considering privacy boundaries in different relationships. Self-disclosure is an ongoing, dynamic process with communicators making daily decisions of what to disclose with others.
As a rule-based theory, CPM allows for in-depth conclusions and understandings to be reached concerning personal beliefs held by people surrounding their privacy rights. Lending itself to an abstract understanding of privacy, this theory is unique in its lack of suppositions and assumptions that would otherwise prevent the theory from growing and responding to the environment of communication being evaluated.
This theory is especially useful in evaluating the disclosure of information in communication environments like healthcare, relationships, media, and work environments.
According to Petronio, the first iteration of CPM was developed over 20 years ago, and it was designed to create a theoretical framework for understanding and categorizing disclosure. The expansion of this theory created the macro, rule-based CPM theory. The rule-based nature of the theory implies that Privacy is not just one choice, but a series of choices that create a process in which people manage their personal risks and benefits of disclosure.
CPM is dependent on three main rules. Second, for information that is shared with two or more people, boundaries are coordinated. Last, once disclosure occurs, groups create collective management that must be coordinated. The five core theory elements factor in personal understandings, and how they fall under the theory.
Communication privacy management theory
All of these elements focus on conscious efforts made by people to protect their privacy and their own interests. The listed elements provide understanding of how we can better understand communication between people about their own information. The five core theory elements are private information, private boundaries, control and ownership, rule-based management, and privacy management.
Theory element number one is the idea of private information. This element serves the purpose of how deeply information affects a person; essentially revealing itself as the revealing of information. Private information encompasses known and unknown, as well as private information concerning self and others.
Studies show that when individuals sense that a private matter will align with a current conversation, they are likely to disclose that information. The second element is the element of private boundaries which helps to draw the line between what qualifies as private, and what falls under the public sphere.
This line is important to help people realize what may be shared does not fall under open discussion. When private information is shared, it changes the boundary of the sphere. Some private boundaries can become collective understanding, and as such fall under the support of collective boundary of information.
Communication Privacy Management Theory: Chapter 13
Following private boundaries is the element of control and ownership. This element is important because it acknowledges the public perception of ownership over information, and how this manifests in communication. Petronio acknowledges that most people equate preserving privacy with dignity and safety of self.
This element directly ties into personal and private boundaries. The fourth element is rule-based management, and it operates as a clear framework for understanding decisions made concerning privacy. Rule-based management operates on three basic processes: privacy rule characteristics, boundary coordination, and boundary turbulence.
Sandra Petronio and Maria K. Venetis
All three of these processes lend stability to the operation of the theory and its core elements. This rule based management, with the implication of these three processes, is increasingly complex and can be used on both individual and collective levels. The final element is the idea of privacy management. Privacy management is the idea that focuses on the opposing arguments that advocate for revealing private information, and the side that opposes that.
In This Article
The importance of the final element offers understanding of how privacy is perceived by other people, and what it means in a societal sphere.
Privacy rules are dictated by a criteria surrounding the motivation to conceal or reveal a piece of information based on a series of cultural norms and expectations. There are various real world applications for CPM theory.
A series of articles have applied this theory to social media, intimate interpersonal relationships, and interpersonal peer relationships.
Communication privacy management theory pdf995
Yang, Pulido, and Kang studied the impact of privacy concerns on social media, specifically Twitter. They used a quantitative approach, an online questionnaire, to test the privacy management variables among college students based on the premise of CPM Theory.
They discovered that CPM can predict the time spent on Twitter, but could not predict their usage behaviors. The article proposed that individuals manage their Twitter privacy similarly to their personal privacy boundaries.
The negotiation of social media in this case is a management of information disclosure and parallels CPM. The research found that the friends were more in depth in their boundary coordination when the information was more important or risky.
Receivers were also more likely to share information when they felt they had more ownership over the information.
Communication Privacy Management Theory
The activity seeks to replicate the Postsecret blog which posts anonymous secrets. In this activity, students are asked to disclose a secret, and analyze their perspectives of those secrets objectively.
They then take the tenets of CPM and apply them to the activity. CPM is consistently being developed, with regard to new application. The theory is developed and modified by each new article that evaluates and analyzes its use and purpose in the context of communication.
The main aspect to consider in the case of this theory is that the foundation for CPM is rule-based, not law-based. Most recent advances of CPM include making the theory more accessible, and capitalizing on the viability of the theory.
This created a system that identifies allowances for access to information, and how addressing privacy management in communication can help reach goals in different realms. One major criticism of CPM is the dualistic nature applied to the concepts of privacy and disclosure create an opposition to define the theory as dialectical.
Specifically, theorists argue that the separation between the ideas of privacy and disclosure does not create the dynamic relationships inherent in dialectic theories.
Managing communication privacy
Petronio argues that this is because the early format of the theory used ideas about balance as a framework and that is no longer the goal of the theory, which invalidates the concern for "coexistence" between the ideas of privacy and disclosure.
Jump to: navigation , search. Navigation menu Personal tools Log in. Namespaces Page Discussion. Views Read View source View history. Navigation Home Recent changes Random page Help.