Global Information Lookup Global Information

Communication privacy management theory information


Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information. It suggests that individuals maintain and coordinate privacy boundaries (the limits of what they are willing to share) with various communication partners depending on the perceived benefits and costs of information disclosure. Petronio believes disclosing private information will strengthen one's connections with others, and that we can better understand the rules for disclosure in relationships through negotiating privacy boundaries.

Petronio uses a boundary metaphor to explain the privacy management process. Privacy boundaries draw divisions between private information and public information. This theory argues that when people disclose private information, they depend on a rule-based management system to control the level of accessibility. An individual's privacy boundary governs his or her self-disclosures. Once a disclosure is made, the negotiation of privacy rules between the two parties is required. A distressing sense of "boundary turbulence" can arise when clashing expectations for privacy management are identified, or when preexisting expectations are breached, intentionally or unintentionally. Having the mental image of protective boundaries is central to understanding the five core principles of Petronio's CPM:

  1. People believe they own and have a right to control their private information.
  2. People control their private information through the use of personal privacy rules.
  3. When others are told or given access to a person's private information, they become co-owners of that information.
  4. Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others.
  5. When co-owners of private information do not effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result.[1]
  1. ^ Griffin, E. A., Ledbetter, A., & Sparks, G. G. (2023). A First Look at Communication Theory. McGraw Hill.

and 28 Related for: Communication privacy management theory information

Request time (Page generated in 0.8766 seconds.)

Communication privacy management theory

Last Update:

Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio...

Word Count : 7516

Interpersonal communication

Last Update:

within it. Communication privacy management theory, from the socio-cultural tradition, is concerned with how people negotiate openness and privacy in relation...

Word Count : 10286

Blind item

Last Update:

blackmail. Communication privacy management theory relates to the ideas of information privacy that influence this form of communication. The advent...

Word Count : 255

Family secret

Last Update:

family secrets is partially explained through the communication privacy management theory. The theory argues that people like to conceal information in...

Word Count : 1483

Privacy settings

Last Update:

personalizing privacy settings. Privacy settings are situated in the framework of the communication privacy management theory. This theory states that privacy management...

Word Count : 4484

Privacy regulation theory

Last Update:

Privacy regulation theory was developed by social psychologist Irwin Altman in 1975. This theory aims to explain why people sometimes prefer staying alone...

Word Count : 1057

Digital privacy

Last Update:

new and current technologies. Many scholars have used communication privacy management (CPM) theory as a way to define control over private information...

Word Count : 3871

CPM

Last Update:

movement Colonial Police Medal Communication privacy management theory, a theory of privacy in interpersonal communication Compton/Woodley Airport (IATA...

Word Count : 442

Privacy

Last Update:

2017). "Online Privacy Concerns and Privacy Management: A Meta-Analytical Review: Privacy Concerns Meta-Analysis". Journal of Communication. 67 (1): 26–53...

Word Count : 13519

Mass communication

Last Update:

2010). Contingency theory of strategic conflict management: Unearthing factors that influence ethical elocution in crisis communication. 13th International...

Word Count : 4989

Financial independence

Last Update:

parents' toxic relationship. Financial socialization theory and communication privacy management theory sheds light on how the feelings and attitudes about...

Word Count : 1891

Expectancy violations theory

Last Update:

Expectancy violations theory (EVT) is a theory of communication that analyzes how individuals respond to unanticipated violations of social norms and...

Word Count : 13411

Electronic Communications Privacy Act

Last Update:

invade privacy without any scrutiny, because the actual content of the communication is left untouched. While workplace communications are, in theory, protected...

Word Count : 1741

Shadow profile

Last Update:

needed] Internet privacy Communication privacy management theory Participatory surveillance Garcia, David (August 2017). "Leaking privacy and shadow profiles...

Word Count : 263

Impression management

Last Update:

cope by reducing unexpected events. Impression management theory can also be used in health communication. It can be used to explore how professionals 'present'...

Word Count : 8372

Uses and gratifications theory

Last Update:

gratifications theory is a communication theory that describes the reasons and means by which people seek out media to meet specific needs. The theory postulates...

Word Count : 5977

Uncertainty reduction theory

Last Update:

reduction theory, also known as initial interaction theory, developed in 1975 by Charles Berger and Richard Calabrese, is a communication theory from the...

Word Count : 9008

Privacy engineering

Last Update:

aspect Privacy as an economic aspect, particularly game theory Privacy as a sociological aspect The impetus for technological progress in privacy engineering...

Word Count : 1644

Face negotiation theory

Last Update:

Physician communication in the operating room: expanding application of face-negotiation theory to the health communication context. Health communication, 27(3)...

Word Count : 7190

Communication design

Last Update:

skills and knowledge such as colour theory, page layout, typography, and creating visual hierarchies. Communication designers translate ideas and information...

Word Count : 1168

Theory of constraints

Last Update:

The theory of constraints (TOC) is a management paradigm that views any manageable system as being limited in achieving more of its goals by a very small...

Word Count : 5953

Privacy concerns with social networking services

Last Update:

and Zeynep Cemalcilar. "Online privacy concerns and privacy management: A meta-analytical review." Journal of Communication 67.1 (2017): 26-53. Majid, Abdul...

Word Count : 19522

Right to privacy

Last Update:

right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals...

Word Count : 6463

Social penetration theory

Last Update:

The social penetration theory (SPT) proposes that as relationships develop, interpersonal communication moves from relatively shallow, non-intimate levels...

Word Count : 9628

Local differential privacy

Last Update:

Likewise, differential privacy (DP) attains to improve the protection of data privacy by measuring the privacy loss in the communication among the elements...

Word Count : 2968

Internet of things

Last Update:

Wehrle, Klaus (10 June 2013). "Privacy in the Internet of Things: threats and challenges". Security and Communication Networks. 7 (12): 2728–2742. arXiv:1505...

Word Count : 19741

Medical privacy

Last Update:

people's medical health privacy. However, many of these health-securing privacy laws have proven less effective in practice than in theory. In 1996, the United...

Word Count : 8102

Information technology law

Last Update:

intellectual property, contract law, criminal law and fundamental rights like privacy, the right to self-determination and freedom of expression. IT law does...

Word Count : 4759

PDF Search Engine © AllGlobal.net