Communication Privacy Management Theory- Ch. 12

Social Penetration Theory
Focused on self-disclosure as the primary way to develop close relationships
Example of Social Penetration Theory
Suppose you visit your school’s health center bc you’re concerned about abnormal bleeding. Upon careful examination, the doctor says you may have cervical cancer and surgery may be necessary. Who will you tell right away- immediate family member, romantic partner, a good friend, or maybe all three, or none of them?
Communication privacy management theory (CPM)
Description of privacy management system that contains three main parts
Three main parts of CPM
Privacy Ownership, Privacy Control, and Privacy Turbulence
Privacy Ownership
Contains our privacy boundaries that encompass information that we have but others don’t know (1st)
Privacy Control
Involves our decision to share private information with another person(2nd)
Privacy Turbulence
Comes into play when managing private information doesn’t go the way we expected.
Privacy boundaries
A metaphor to show how people think of the borders between private and public information
Private information
The content of potential disclosures; information that can be owned.
Five Core Principles of Petronio’s CPM
1. People believe they own and have a right to control their private information
2. People control their private information through the use of personal privacy rules
3. When others are told or given access to a person’s private information they become co-owners of that information
4. Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others
5. When co-owners of private information don’t effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result.
Rule based theory
A theory that assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives.
Five factors of CPM
Culture, gender, motivation, context, and risk/benefit ratios
Collective privacy boundary
A intersection of personal privacy boundaries of co owners of private information, all of whom are responsible for the information
Example of disclosure of private information
We could desire to relive a burden, prevent a wrong, make an impression, gain control, or simply enjoy self expression
Coordinating Mutual Privacy Boundaries
Negotiation is necessary, Boundary ownership, Boundary linkage, Boundary permeability
Boundary permeability
refers to the degree that privacy boundaries are penetrable.
can be closed or tight allowing little information to pass through, or boundaries can be open or loosely held allowing information to easily pass through.
is a matter of degree.
act as filters, letting some information pass easily through, while other information is closely guarded.
Disclosers and receivers
need to negotiate mutual rules for possible third-party dissemination.
Boundary Turbulence
Turbulence is concerning, Fuzzy boundary problems, Intentional breaches vs. mistakes