Communication privacy management theory

Communication privacy management theory


Communication Privacy Management Theory is a communication theory first developed by Sandra Petronio[1][2] in 1991 describing the ways in which relational actors manage their privacy boundaries and the disclosure of private information. The theory focuses heavily on the processes that people employ to determine when and how they choose to conceal or reveal private information[3]. Through this theory Petronio describes the ever-present dialectic of privacy and openness within various relationship models, explains how relationships develop as public and private boundaries are negotiated and coordinated, and demonstrates how individuals regulate revealing and concealing information through communication[4].


Contents

Dialectic of Privacy versus Disclosure

Petronio's understanding and argument of privacy management rests on the idea that a dialectic exists wherever the decision is made to disclose or conceal private information. Thus, costs and benefits must be weighed and consideration must be given to how such information will be owned, used, and spread.[5] The definition of dialectic that Petronio borrows from can be found in Leslie Baxter and Barbara Montgomery's theory of Relational Dialectics, wherein various approaches to the contradictory impulses of relational life are discussed. The theory focuses on the idea that there are not only two contradictory stances within a relationship, but that at any given moment decisions are weighed using multiple viewpoints.[6] Ergo, Petronio's system for managing privacy through communication is based on a system of rules that include and weigh the assumptions of a complex approach to dealing with the supervision of private information.

Nature of Information Sharing

To understand CPM theory it is important to follow the metaphor of the boundary that exists, dividing that which can be found in the private sphere from that which is available in the public sphere[7]. An individual’s private information is protected by the individual’s boundaries. The permeability of these boundaries are ever changing, and allow certain parts of the public, access to certain pieces of information belonging to the individual. The extent to which boundaries are permeable, characterized as thick or thin boundaries, "varies depending on the rules for access and protection[8]," explains Petronio. CPM theory considers those rules for access and protection of information by examining the following about information sharing: the types of ownership of information, the circumstances under which sharing occurs, and the expectations of sharing[9].

Communication Privacy Management theory understands information (as well as boundaries) as something that is owned, and each owner must decide whether or not they are willing to have a confidant, a.k.a. a co-owner, to that information. With ownership comes the certainty of knowing the extent to which certain information is known, the control to do what is desired with that knowledge, but oftentimes also the added stress of carrying a weight alone[10]. In some cases it is preferable for the owner to have another person share the private information, though this may not be the case for the confidant. Co-ownership of information is characterized by heavy responsibility and a knowledge of the rules for a particular disclosure. Ownership can be felt to different degrees, however, and the understanding of disclosure rules can be different from owner to owner. Also, the act of sharing is coupled along with the realization that boundaries have expanded and that they may never return to their original state. It is the responsibility of co-owners to decide and make clear if, when, and how information can or should be shared with others[11].

Petronio favored the term "private information" over the term "self disclosure" because there are many caveats inherent to private information disclosure that are not present with self disclosure[12]. Firstly, the motivations behind sharing are many, including but not limited to sharing a burden, righting a wrong, and influencing others[13]. Secondly, very often the private information that is shared is not about oneself but about others, thus negating the use of the term "self disclosure". Furthermore, "private information" carries a neutral implication to it, allowing such information to be considered both positive or negative, welcome or unwelcome, etc. Finally, the term focuses on the act of sharing, paying close attention to the content of the message and how this is received by others[14]. The decision to share, Petronio says, is ultimately left up to the process of the privacy rule management system which combine rules for coordination of information, characteristics of disclosure, and attributes of the nature of boundaries.

System for Privacy Rule Management

Petronio views boundary management as a rule based process, not an individual decision. The processes for managing privacy rules were set out by Petronio[15] as three proposed principles that take into account the internal and external factors which shape our understanding of privacy and disclosure.

Privacy Rule Characteristics

The characteristics of privacy rules are divided into two sections, attributes and development. Privacy ruleattributes refer to how people obtain rules of privacy and understand the properties of those rules[16]. This is normally done through social interactions where the boundaries for rules are put to the test. Rules are set in different social situations which dictate the type of disclosure that should be made, for example, the difference between disclosure at a family member's birthday party versus an office event at work. Petronio asserts that each situation will come with it's own set of rules for managing privacy that are learned over time. The development of privacy rule characteristics has to do with the criteria implemented to decide if and how information will be shared[17]. Communication privacy management theory general lists those criteria as the following:

  • Gendered criteria; privacy boundaries are sculpted differently by men and women based on socialization, which leads to difference in how rules are understood and operated in[18].
  • Contextual criteria; this criteria is shaped by issues of physical and social environments that factor in whether or not information will be shared[19].
  • Cultural criteria; disclosure within this criteria is dependent of the culture in which an owner has grown to understand expectations and attributes for sharing.
  • Motivational criteria; owners of information can form certain bonds which will lead to disclosure, or conversely the express interest in forming bonds may cause private information to be shared. Likewise, motivations for sharing can include reciprocity or self-clarification.
  • Risk-benefit criteria; owners of private information consider risks against benefits of disclosure or maintaining information private. Risks to sharing can include shame, embarrassment, and vulnerability, among others. Likewise, benefits can be a shared burden of knowledge, a feeling of social acceptance, whereas a benefit of keeping quiet is greater control of information[20].

With these five criteria, personal and group privacy rules are developed, but disclosure of private information necessitates the inclusion of others within the boundary of knowledge, which demands an understanding between parties for how to coordinate ownership of knowledge.

Boundary Coordination

An individual’s private information is protected by the individual’s boundaries. The permeability of these boundaries are ever changing, and allow certain parts of the public, access to certain pieces of information belonging to the individual. Once private information is shared, co-owners must coordinate the boundaries of privacy and disclosure based on boundary permeability, boundary linkage, and boundary ownership[21]. Petronio describes this mutual boundary coordination by co-owners as drawing the same borders on a map around a shared piece of information[22]. By no means is this an easy process considering that each owner will approach the information from distinct viewpoints and referencing their personal criteria for privacy rule development.

  • Boundary permeability refers to the nature of the invisible divisions that keep private information from being known outside of an individual or particular group. When private information is kept with one owner, the boundaries are said to be thick because there is less possibility for information to make its way out into the public sphere. Once information is shared to one or more persons, the boundaries for that private information expand, become morepermeable, and are considered thin[23].
  • Boundary linkage has to do with how owners are connected when they build associations through a boundary. For example, doctors and patients are linked to each other in such a way that private information is passed within their boundaries constantly. These linkages can be strong or weak depending on how information was shared or whether a co-owner wanted to know or was prepared to learn a new piece of information. Case in point, the link between an organization and a spy meant to infiltrate the organization is weak because the two are not coordinated on how information will be maintained private or disclosed[24].
  • Boundary ownership refers to the responsibilities and rights each person has over the control of the spread of information that they own. When working to mutually create the boundary of privacy it is key for all parties to have a clear understanding of whether information should be shared, who it should be shared with, and when it should be shared[25]. A simple example of this is the planning of a surprise birthday party; all those involved in planning must agree on how the information about the party will be spread so as not to ruin the surprise. As new guests are invited, they become an owner of the information and are bound to the rules of privacy maintenance, or else the surprise could be ruined.

Boundary Turbulence

Unfortunately, oftentimes boundaries are not coordinated as well as they should be to maintain the level of privacy or exposure desired by owners - this leads to problems known as boundary turbulence. Turbulenceamong co-owners is caused when rules are not mutually understood by co-owners and when the management of private information comes into conflict with with the expectations each owner had[26], which can happen for a number of reasons. As mentioned previously, the coordination of shared boundaries is key to avoiding over-sharing, when the boundaries are unclear owners may come into conflict with one another. Boundary turbulence can also be caused by mistakes, such as an uninvited party overhearing private information (causing weak boundary linkage) or a disclosure an owner might make under the influence of alcohol or drugs. Disclosure to a new party was not the intent, but when it happens other co-owners can feel that their expectations of maintaining boundaries have been violated. Finally, boundary turbulence occurs when a co-owner intentionally breaks the coordinated boundary of privacy to disclose private information[27]. An example of such intentional disclosure would be a daughter revealing to a doctor that her father is indeed an active smoker when the father has told the doctor that he no longer smokes after his heart surgery. The daughter in this case must weigh the risks of breaking the family privacy boundary against the benefits of the doctor being better informed of her father's condition. In cases of boundary turbulence, co-owners of information can feel that their expectations have been violated and lose trust in other co-owners. In these cases, the goal of each party is to reduce turbulence by reestablishing and coordinating boundaries[28][29].

Strengths and Weaknesses

Since Communication Privacy Management Theory has been developing over time, the theorist has had the opportunity to address critiques of the theory. One critique argues that CPM is not a dialectic theory at all when compared to the theory of Relational Dialectics(1996), but rather that it is based on dualistic thinking where privacy and disclosure exist together in equilibrium. Petronio responded to these critiques in her 2002 article arguing that "Instead, [CPM] argues for coordination with others that does not advocate an optimum balance between disclosure and privacy[30]." Another flaw of the theory is that the basic suppositions of Communication Privacy Management theory say that humans make rules and choices that are based on others as well as the self; meaning that those persons who do not follow Petronio's model for humans would not be held to and explained by the theory. As far as the strength of the CPM, it can be seen in the great number of research articles that have been written based firmly Privacy Management theory. The theory has been employed in understanding family dynamics, the gender gap in communication, the disclosure of HIV or AIDS statuses, as well as child sexual abuse[31][32][33][34][35][36].

References

  1. ^ Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples. Communication Theory, 1, 311-335.
  2. ^ Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: SUNY Press.
  3. ^ Petronio, S. (2002). Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: SUNY Press.
  4. ^ Baxter, L., Braithwaite, D. (2008). Engaging theories in interpersonal communication: Multiple perspectives. Thousand Oaks, CA: Sage.
  5. ^ Petronio, S., & Reierson, J. (2009). Regulating the Privacy of Confidentiality: Grasping the Complexities through Communication Privacy Management Theory. Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications. 365-383.
  6. ^ Baxter, L.A., & Montgomery, B. (1996). Relating Dialogues and dialectics: New York: Guilford Press.
  7. ^ Petronio, S., Ellmers, N., Giles, H., Gallois, C. (1998). (Mis)communicating across boundaries: Interpersonal and intergroup considerations. Communication Research, 25, 571-595.
  8. ^ Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. 29. Albany, NY: SUNY Press.
  9. ^ Jourard, S. M. (1971). The transparent self (rev. ed.). New York: Van Nostrand.
  10. ^ Petronio, S., & Reierson, J. (2009). Regulating the Privacy of Confidentiality: Grasping the Complexities through Communication Privacy Management Theory. Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications. 365-383.
  11. ^ Petronio, S., & Durham, W.T. (2008). Communication privacy management theory. In L.A. Baxter & D.O. Braithwaite (Eds.), Engaging theories in interpersonal communication: Multiple perspectives (pp. 309-322). Thousand Oaks, CA: Sage.
  12. ^ Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: SUNY Press.
  13. ^ Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples. Communication Theory, 1, 311-335.
  14. ^ Petronio, S. (2007). Translational Research Endeavors and the Practices of Communication Privacy Management. Journal of Applied Communication Research, 35, 218-222.
  15. ^ Petronio, S. (2004). Road to developing communication privacy management theory: Narrative in progress, please stand by. Journal of Family Communication, 4, 193-207.
  16. ^ Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples. Communication Theory, 1, 311-335.
  17. ^ Petronio, S. (2007). Translational Research Endeavors and the Practices of Communication Privacy Management. Journal of Applied Communication Research, 35, 218-222.
  18. ^ Petronio, S., & Martin, J.N. (1986). Ramifications of revealing private information: A gender gap. Journal of Clinical Psychology, 42, 499-506.
  19. ^ Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: SUNY Press.
  20. ^ Petronio, S. Martin, J.N., & Littlefield, R. (1984). Prerequisite conditions for self-disclosing: A gender issue. Communication Monographs, 51, 268-273.
  21. ^ Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples. Communication Theory, 1, 311-335.
  22. ^ Petronio, S. (2007). Translational Research Endeavors and the Practices of Communication Privacy Management. Journal of Applied Communication Research, 35, 218-222.
  23. ^ Petronio, S., & Durham, W.T. (2008). Communication privacy management theory. In L.A. Baxter & D.O. Braithwaite (Eds.), Engaging theories in interpersonal communication: Multiple perspectives (pp. 309-322). Thousand Oaks, CA: Sage.
  24. ^ Caughlin, J.P., & Afifi, T.D. (2004). When is topic avoidance unsatisfying? Examining moderators of the association between avoidance and dissatisfaction. Human Communication Research, 30, 479-513.
  25. ^ Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples. Communication Theory, 1, 311-335.
  26. ^ Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: SUNY Press.
  27. ^ Afifi, T. D. (2003). “Feeling caught” in stepfamilies: managing boundary turbulence through appropriate communication privacy rules. Journal of Social and Personal Relationships, 20, 729-755.
  28. ^ Afifi, T. D. (2003). “Feeling caught” in stepfamilies: managing boundary turbulence through appropriate communication privacy rules. Journal of Social and Personal Relationships, 20, 729-755.
  29. ^ Petronio, S., Ellmers, N., Giles, H., Gallois, C. (1998). (Mis)communicating across boundaries: Interpersonal and intergroup considerations. Communication Research, 25, 571-595.
  30. ^ Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: SUNY Press.
  31. ^ Afifi, T. D. (2003). “Feeling caught” in stepfamilies: managing boundary turbulence through appropriate communication privacy rules. Journal of Social and Personal Relationships, 20, 729-755.
  32. ^ Caughlin, J.P., & Petronio, S. (2004). Privacy in families. In A. Vangelisti (Ed.), Handbook of family communication (pp. 379-412). Mahwah, NJ:Erlbaum.
  33. ^ Petronio, S., & Martin, J.N. (1986). Ramifications of revealing private information: A gender gap. Journal of Clinical Psychology, 42, 499-506.
  34. ^ Petronio, S. Martin, J.N., & Littlefield, R. (1984). Prerequisite conditions for self-disclosing: A gender issue. Communication Monographs, 51, 268-273.
  35. ^ Cline, R.J. & McKenzie, N.J. (200), Dilemmas of disclosure in the age of HIV/AIDS: Balancing privacy and protection in the health care context. In S. Petronio (Ed.), Balancing the secrets of private disclosures (pp. 71-82). Mahwah, NJ:Erlbaum.
  36. ^ Petronio, S., Reeder, H.M., Hecht, M.L., & Rose-Mendoza, T. M. (1996). Disclosure of sexual abuse by children and adolescents. Journal of Applied Communication Research, 24, 181-199.

Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Privacy regulation theory — was developed by social psychologist Irwin Altman in 1975(1975, 1977). This theory aims to explain why people sometimes prefer staying alonebut sometimes like get involved in social interactions. Traditionally, privacy isregarded as a state of… …   Wikipedia

  • Privacy — For other uses, see Privacy (disambiguation). Privacy (from Latin: privatus separated from the rest, deprived of something, esp. office, participation in the government , from privo to deprive ) is the ability of an individual or group to seclude …   Wikipedia

  • Customer relationship management — (CRM) is a widely implemented strategy for managing a company’s interactions with customers, clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes principally sales activities, but… …   Wikipedia

  • Face Negotiation Theory — is a theory first postulated by Stella Ting Toomey in 1985 to explain how different cultures manage conflict and communicate. The theory has gone through multiple iterations since that time, and has been updated most recently in 2005.1 In essence …   Wikipedia

  • Risk management — For non business risks, see risk, and the disambiguation page risk analysis Example of risk management: A NASA model showing areas at high risk from impact for the International Space Station. Risk management is the identification, assessment,… …   Wikipedia

  • New World Order (conspiracy theory) — This article is about the use of the term New World Order in conspiracy theory. For other uses, see New World Order. The reverse side of the Grea …   Wikipedia

  • Choice theory — This article is about choice theory in psychology and education. For choice theory in economics, see rational choice theory. The term choice theory is the work of William Glasser, MD, author of the book so named, and is the culmination of some 50 …   Wikipedia

  • Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses …   Wikipedia

  • Business ethics — For the episode from the American television series The Office, see Business Ethics (The Office). Business ethics (also corporate ethics) is a form of applied ethics or professional ethics that examines ethical principles and moral or ethical… …   Wikipedia

  • Culture — For other uses, see Culture (disambiguation). Petroglyphs in modern day Gobustan, Azerbaijan, dating back to 10 000 BCE indicating a thriving culture …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”