Communications Privacy Management Theory

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Communications Privacy Management Theory

Assumes:

  • People have a right to own thier private information

  • Builds upon dialectical theory and social penetration theory

  • Revealing information is risky/ vunerable

  • People have a right to contriol their private information

  • Boundaries occur across levels of people

  • Permability of bounaries

2
New cards

Boundary Structure w in CPM

Who is allowed and who is not allowed access to information

3
New cards

Control Risks

  • Individuals want to control their private information to reduce vulnerability.

  • Sharing private information can expose them to risks like judgment, embarrassment, or exploitation.

  • By managing access, they mitigate these risks.

4
New cards

Single Ownership of Information

  • People feel they have a right to their own private information.

  • This sense of ownership raises questions about where these rights originate—whether from personal values, culture, or societal norms.

5
New cards

Permeabilty of boundary

  • The level of perceived risk affects how open a person is with their private information.

  • Lower risk → More permeability: If a person believes sharing information will not lead to negative consequences, they are more likely to have open boundaries.

  • Higher risk → Less permeability: If sharing information could lead to vulnerability or harm, the person will maintain stricter boundaries.

6
New cards

Rule management systems

  • Decision rules to monitor flow of information

  • 1.  Boundary access rules (i.e., rules about when information will be shared)

  • 2.  Boundary protection rules (i.e., rules about when information will not be shared)

7
New cards

Privacy Rule Development

Development of these rules is based upon a number of criteria:

  • 1.  Cultural values/norms

  • 2.  Individual motivations or reasons

  • 3.  Gender

  • 4.  Context

  • 5.  Generational differences—social media?

8
New cards

Rule acquisition

  • How we come to understand rules

  • Learn exsisting rules or have to negotiate new ones

  • Learn through explicity or implicit norms in a family

9
New cards

Rule Properties

  • Characteristics of the privacy rules

  • Often become habitual

  • Can change when event or action triggers change

10
New cards

Bondary Coordination

  1. Linkages

    1. Internal linkages: Sharing private information within the family (e.g., telling a sibling about personal struggles).

    2. External linkages: Sharing private information outside the family (e.g., parents revealing financial difficulties to a school counselor).

  2. Permiability

    1. Once private information is shared, its flow is regulated through different privacy mechanisms:

  3. Co-ownership

    1. Once someone shares private information, co-ownership is established—both the original owner and the recipient now have responsibility over that information.

11
New cards

Boundary Turbulence

  • complications in boundary coordination

--e.g., when one person decides not to follow the rules for privacy

12
New cards

How has CPM been tested

  • Social media

  • Health

  • Family

13
New cards

Critiques of CPM

  • Broad framework (also a strength)

    • Explanatory rather than predictive 

  • Tested primarily qualitatively rather than quantitatively

  • Emphasis is on individual privacy rights—is privacy always individually owned?

  • Cultural differences?