Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Communication Privacy Management Theory
Transcript of Communication Privacy Management Theory
Postsecret.com Activity Questions
1. Why do you think people feel so free to share their secrets on this type of platform?
2. How would they feel if this information was revealed?
3. What are the effects on the people who share this information anonymously?
Definition of CPM
According to Sandra Petronio, CPM is a "map of the way people navigate privacy" (Griffin, 2012, p. 168)
privacy boundaries: a metaphor of how people think of the borders between private and public information
5 Core Concepts of CPM
1. People believe they own and have a right to control their private information
2. People control their private information through the use of personal privacy rules. (culture, gender, motivation, context, risk/benefit)
3. When others are told or given access to a person's private information, they become co-owners.
4. Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others.
5. When co-owners of private information don't effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result.
Critique of CPM
Fulfills 5 of the 6 Criteria for a good interpretive theory:
1. Understanding of people
2. Qualitative Research
3. Community of agreement
4. Clarification of values
5. Reform of society
1. Which of the 5 factors (culture, gender, etc.) influence you most when developing privacy rules?
2. Is there a time that you have been a deliberate confidant? A reluctant confidant? Provide an example.
3. A man tells his cardiologist that he quit smoking after his heart surgery. His daughter, as the primary care giver, knows that he has not. In your opinion, should she respect her father's privacy, or should she intentionally breach the privacy boundary? (Griffin, 2012, p. 177)
Coordinating Mutual Privacy Boundaries
Mutual privacy boundaries- A synchronized collective privacy boundary that co-owners share because they have negotiated common privacy rules.
Negotiations of collective boundaries focus on boundary ownership, boundary linkage, and boundary permeability.
Boundary ownership- the rights and responsibilities that co-owners of private information have to control its spread.
Boundary linkage- an alliance formed by co-owners of private information as to who else should be able to know.
Boundary permeability- the extent to which a boundary permits private information to flow to third parties.
Boundary turbulence- disruption of privacy management and relational trust that occurs when collective privacy boundaries aren’t synchronized.
Confidentiality dilemma- the tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare.
In McBride and Bergen’s “Communication Research: Becoming a Reluctant Confidant: Communication Privacy Management in Close Friendships” it states that, “[w]hile it is evident that self-disclosure is important in creating, deepening, and maintaining levels of friendship, researchers have also recognized the fact that too much or too private of self-disclosures can have a negative effect on friendships.”
McBride, M., & Bergen, K. (2008). Communication Research: Becoming a Reluctant Confidant: Communication Privacy Management in Close Friendships.
Texas Speech Communication Journal
, 33(1), 50-61.