Communication privacy management theory information
Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information. It suggests that individuals maintain and coordinate privacy boundaries (the limits of what they are willing to share) with various communication partners depending on the perceived benefits and costs of information disclosure. Petronio believes disclosing private information will strengthen one's connections with others, and that we can better understand the rules for disclosure in relationships through negotiating privacy boundaries.
Petronio uses a boundary metaphor to explain the privacy management process. Privacy boundaries draw divisions between private information and public information. This theory argues that when people disclose private information, they depend on a rule-based management system to control the level of accessibility. An individual's privacy boundary governs his or her self-disclosures. Once a disclosure is made, the negotiation of privacy rules between the two parties is required. A distressing sense of "boundary turbulence" can arise when clashing expectations for privacy management are identified, or when preexisting expectations are breached, intentionally or unintentionally. Having the mental image of protective boundaries is central to understanding the five core principles of Petronio's CPM:
People believe they own and have a right to control their private information.
People control their private information through the use of personal privacy rules.
When others are told or given access to a person's private information, they become co-owners of that information.
Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others.
When co-owners of private information do not effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result.[1]
^Griffin, E. A., Ledbetter, A., & Sparks, G. G. (2023). A First Look at Communication Theory. McGraw Hill.
and 28 Related for: Communication privacy management theory information
Communicationprivacymanagement (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio...
within it. Communicationprivacymanagementtheory, from the socio-cultural tradition, is concerned with how people negotiate openness and privacy in relation...
family secrets is partially explained through the communicationprivacymanagementtheory. The theory argues that people like to conceal information in...
personalizing privacy settings. Privacy settings are situated in the framework of the communicationprivacymanagementtheory. This theory states that privacy management...
Privacy regulation theory was developed by social psychologist Irwin Altman in 1975. This theory aims to explain why people sometimes prefer staying alone...
new and current technologies. Many scholars have used communicationprivacymanagement (CPM) theory as a way to define control over private information...
movement Colonial Police Medal Communicationprivacymanagementtheory, a theory of privacy in interpersonal communication Compton/Woodley Airport (IATA...
2010). Contingency theory of strategic conflict management: Unearthing factors that influence ethical elocution in crisis communication. 13th International...
parents' toxic relationship. Financial socialization theory and communicationprivacymanagementtheory sheds light on how the feelings and attitudes about...
Expectancy violations theory (EVT) is a theory of communication that analyzes how individuals respond to unanticipated violations of social norms and...
invade privacy without any scrutiny, because the actual content of the communication is left untouched. While workplace communications are, in theory, protected...
needed] Internet privacyCommunicationprivacymanagementtheory Participatory surveillance Garcia, David (August 2017). "Leaking privacy and shadow profiles...
cope by reducing unexpected events. Impression managementtheory can also be used in health communication. It can be used to explore how professionals 'present'...
gratifications theory is a communicationtheory that describes the reasons and means by which people seek out media to meet specific needs. The theory postulates...
reduction theory, also known as initial interaction theory, developed in 1975 by Charles Berger and Richard Calabrese, is a communicationtheory from the...
aspect Privacy as an economic aspect, particularly game theoryPrivacy as a sociological aspect The impetus for technological progress in privacy engineering...
Physician communication in the operating room: expanding application of face-negotiation theory to the health communication context. Health communication, 27(3)...
skills and knowledge such as colour theory, page layout, typography, and creating visual hierarchies. Communication designers translate ideas and information...
The theory of constraints (TOC) is a management paradigm that views any manageable system as being limited in achieving more of its goals by a very small...
and Zeynep Cemalcilar. "Online privacy concerns and privacymanagement: A meta-analytical review." Journal of Communication 67.1 (2017): 26-53. Majid, Abdul...
right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals...
The social penetration theory (SPT) proposes that as relationships develop, interpersonal communication moves from relatively shallow, non-intimate levels...
Likewise, differential privacy (DP) attains to improve the protection of data privacy by measuring the privacy loss in the communication among the elements...
Wehrle, Klaus (10 June 2013). "Privacy in the Internet of Things: threats and challenges". Security and Communication Networks. 7 (12): 2728–2742. arXiv:1505...
people's medical health privacy. However, many of these health-securing privacy laws have proven less effective in practice than in theory. In 1996, the United...
intellectual property, contract law, criminal law and fundamental rights like privacy, the right to self-determination and freedom of expression. IT law does...