Privacy Management Theory
Privacy Management Theory Comm 2100-001
Popular in Intro to Communications
Popular in Communication
This 2 page Class Notes was uploaded by Annie Young on Tuesday February 9, 2016. The Class Notes belongs to Comm 2100-001 at a university taught by Margaret Quinlan Carbone in Winter 2016. Since its upload, it has received 27 views.
Reviews for Privacy Management Theory
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 02/09/16
Chapter 12 Communication Privacy Management Theory: Sandra Petronio I. Communication Privacy Management Theory (CPM)- why do we keep info private? (Interpretative theory) A. A description of a privacy management system that contains 3 parts: 1. Privacy boundary: the borders between private & public information 2. Privacy control: decision to share private information w/ another person 3. Privacy turbulence: managing private information does no go the way we expected. B. 5 core principles of Petronio’s CPM: 1. People believe they own and have a right to control their private info 2. People control their private info through the use of personal privacy rules 3. When others are told or given access to a person’s private info, they become co-owners of that info 4. Co-owners of private info need to negotiate mutually agreeable privacy rules about telling others 5. When co-owners of private info don’t effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result. II. Ownerships & control of private info A. Private information- content of potential disclosure; information that can be owned. 1. Disclosure of private information over self-disclosure: usually not about ourselves; “self-disclosure” is usually associated w/interpersonal intimacy; “disclosure of private information” has a neutral connotation whereas “self- disclosure” has a positive feel; “disclosure of private information” focuses on what’s said and how the confidant handles it not being private. 2. Privacy- the feeling that one has the right to own private information. a) Ownership leads to liability but also right & obligations B. Rule- based theory- we best understand people by remembering they have rules for managing their private information. C. 5 factors that play into the way we develop our privacy: 1. Culture 2. Gender 3. Motivation 4. Context Chapter 12 5. Risk/benefit ratio D. Disclosure = co-owners 1. Collective privacy boundary: an intersection of personal privacy boundaries of co-owners of private information which are responsible for the information. 2. Mutual privacy boundary- a mutual, common borer around the shared information a) Boundary ownership- the rights/responsibilities that co-owners of private information have to control its spread. b) Shareholder- co-owner who is fully vested in keeping the info according to the original owner’s privacy rules c) Deliberate confidant- seeks out private info to help others d) Reluctant confidant- co-owner who did not want to know the private info. 3. Boundary linkage- an alliance between co-owners that determines who else gets to know the private info a) Boundary permeability- the extent to which a boundary permits private info to flow to third parties 4. Boundary turbulence- disruptions in the way that co-owners control and regulate the flow of private info to third parties. a) Fuzzy boundaries b) Internal breaches (1) Confidentiality dilemma- the moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare. c) Mistakes III. Critique A. There is good understand of people and qualitative research to support it. B. CPM presents privacy as valuable in its own right C. Does not suggest societal reform like many theories D. Somewhat ambiguous
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'