5.4 Communication Privacy Management Theory
CPM is under a boarder context as compared to only disclosure. It’s the dialectical tension of private information between revealing and concealing under a rule management system.
Guiding maxims:
Assumption maxims:
public-private dialectical assumptions: dialectical nature of revealing and concealing
privacy management assumptions:
- We are entitled to our private information
- people should control the flow of private information
- managing private information is not absolute
boundary metaphor assumptions
Axiomatic maxims:
Conceptualizing private information ownership: one can be authorized, or unauthorized co-owners of information.
conceptualizing private information control: privacy rules are applied based
- core criteria: culture, gender, privacy orientations
- catalyst: privacy rules adapt to changes.
conceptualizing private information turbulence: gossip breaks privacy
Interaction maxims:
shared privacy boundaries: there is a boundary around the shared information.
coordinating privacy boundaries: co-own, co-manage, 3 operations:
privacy boundary linkages: alliances between a discloser and recipients
private information co-ownership rights: privileges and expected responsibility for co-owners of private information.
privacy boundary permeability: the amount of openness within a privacy boundary. managed boundary in
- disproportionate way
- intersected way
- Unified way
ramifications of privacy boundary turbulence
Application:
- (Petronio 2007): translational aspect
- (Bute, Brann, and Hernandez 2017): Orgasm and alcohol on communication after sexual activity.
- (Brummett and Steuber 2014): interracial partners disclose relational information to social network members. They both experience power struggles while managing private and relational information.
- (Denes and Afifi 2014): miscarriages are bound by societal-level expectations about how they should be talked in interpersonal communication.