SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Communication Privacy
Management Theory
Communication privacy management theory (CPM) states that
individuals own their private information and control what
information is concealed or revealed (Bridge & Schrodt,
2013). To manage their information, people construct
privacy boundaries that “protect private information,
ensuring it is unknown to others until the boundary is
opened or made permeable” (McManus & Nussbaum, 2013, p.
197). To control these boundaries, every individual creates
privacy rules to determine how and when to disclose private
information.
What is it?
There are five core principles of CPM. First, people
believe that they own their private information, and
therefore have a right to control such information.
Second, people construct and use privacy rules to
guide their sharing and concealing of private
information. Third, when others gain access to a
person’s private information, they become co-owners of
that information. Fourth, co-owners of information
need to negotiate mutually agreeable privacy rules and
boundaries about telling others this information.
Fifth, when privacy rules and boundaries are not
sufficiently discussed between the co-owners of
information, turbulence occurs (Tenzek, et al., 2013).
What is it?
Developed by Sandra Petronio in 2002, CPM applies to
multiple areas of communication studies. This theory is used
in health communication as a guideline for disclosing
medical diagnoses, and has recently been applied to online
social media as scholars investigate Facebook usage and
privacy. However, CPM is primarily used to study family
communication (Petronio, 2013).
CPM is praised for its applicability, as it is “a practical
theory constructed to ... understand everyday problems and
events that people encounter in families” (Toller &
McBride, 2013, p. 34). CPM provides guidelines that
individuals use when revealing and concealing their private
information, and this theory helps families discuss
difficult personal topics such as …
Child abuse Sexual orientation
So what?
Death
InfidelitySo what?
CPM suggests that every individual experiences tension
between revealing and concealing private information
(Tenzek, Herrman, May, Feiner, & Allen, 2013, p. 328).
While sharing information indicates trust and intimacy,
some topics are “difficult and uncomfortable for the
speaker to discuss and/or for the recipient to hear”
because they are hurtful, inappropriate, and/or stressful
(McManus & Nussbaum, 2013, p. 197). By following the
privacy rules of CPM, individuals can alleviate this
tension and determine their best strategy for disclosure.
As CPM was developed in 2002, it is
still a new communication theory that
Petronio continues to revise, refine,
and expand. A common criticism of CPM
is that the theory does not suggest how
to repair breaches of privacy. While
the theory states that turbulence
occurs when privacy boundaries are not
adequately discussed between co-owners
of information, Petronio does not
explain how to overcome and mend such
turbulence (Plander, 2013).
Furthermore, the theory offers little
explanation behind its principles and
framework, and many scholars believe
that more research needs to be done to
demonstrate its consistency (Plander,
2013).
CPM asserts that privacy rules are socially learned
and influenced by culture and gender. Most individuals
first construct their privacy rules through the family
because “parents and family members are often the
first teachers of the concept of privacy” (Serewicz,
2013, p. 2). Parents teach their children what
information can be shared and what information should
be kept private (i.e., nudity, family finances). As
individuals grow and mature, their privacy rules
evolve to reflect their peers, school, the media, and
other social influences. For example, when an
individual begins a new job or joins an organization,
they very quickly learn the appropriate privacy rules
and boundaries that they are expected to follow.
Presenter’s Choice
References
Antique envelope [Photograph]. (2005). Retrieved July 2, 2013 from:
http://www.flickr.com/photos/8078381@N03/4010252027/
Bridge, M. C., & Schrodt, P. (2013). Privacy orientations as a
function of family communication patterns. Communication
Reports, 26(1), 1-12. doi: 10.1080/08934215.2013.773054
Clarke, A. (Photographer). 3_8 [Photograph]. (2007). Retrieved July
3, 2013 from: http://www.flickr.com/photos/
50555053@N00/414607192
Gajownik, L. (Photographer). Secrets [Photograph]. (2013) Retrieved
July 6, 2013 from: http://www.flickr.com/photos/lexigajownik/
8608707816/
Huba, M. (Photographer). Whispering hope [Photograph]. (2008).
Retrieved July 6, 2013 from: http://www.flickr.com/photos/
56217767@N00/2435736761/
References
Julemiddag [Photograph]. (2011). Retrieved July 2, 2013 from:
http://www.flickr.com/photos/45270502@N06/5883733151/
Leroyer, P. (Photographer). Kiss in [Photograph]. 2010.
Retrieved July 3, 2013 from: http://www.flickr.com/
photos/52499764@N00/4362904430/
McManus, T. G., & Nussbaum, J. F. (2013). Topic valence
and ambiguity in parent-emerging adult child
postdivorce discussions. Communication Studies, 64(2),
195-217. doi: 10.1080/10510974.2011.646085
Petronio, S. (2013). Brief status report on communication
privacy management theory. Journal of Family
Communication, 13(1), 6-14. doi:
10.1080/15267431.2013.743426
References
Plander, K. L. (2013). Checking accounts: Communication privacy
management in familial financial caregiving. Journal of Family
Communication, 13(1), 17-31. doi: 10.1080/15267431.2012.742090
Serewicz, M. C. M. (2013). Introducing the special issue on
communication privacy management theory and family privacy
regulation. Journal of Family Communication, 13(1), 2-5. doi:
10.1080/15267431.2013.743424
Sevillano, H. (Photographer). Faces 5 [Photograph]. (2012).
Retrieved July 2, 2013 from: http://www.flickr.com/photos/
40117184@N03/7644606940/
Tenzek, K. E., Herman, A. R., May, A. R, Feiner, B., & Allen, B.
(2013). Examining the impact of parental disclosure of HIV on
children: A meta-analysis. Western Journal of Communication,
77(3), 323-339. doi: 10.1080/10570314.2012.719092
References
Toller, P. W., & McBride, M. C. (2013). Enacting privacy rules and
protecting disclosure recipients: Parents' communication with
children following the death of a family member. Journal of
Family Communication, 13(1), 32-45. doi:
10.1080/15267431.2012.742091
Tyson, D. (Photographer). Out with a smile [Photograph]. (2006)
Retrieved July 3, 2013 from: http://www.flickr.com/photos/
16231096@N00/126602163/
When I grow up [Photograph]. (2006). Retrieved July 3, 2013 from:
http://www.flickr.com/photos/80489788@N00/138200832/
	
  

Weitere ähnliche Inhalte

Andere mochten auch

How to Find the Right Nursing Home & Lower the Risk of Elder Abuse
How to Find the Right Nursing Home & Lower the Risk of Elder AbuseHow to Find the Right Nursing Home & Lower the Risk of Elder Abuse
How to Find the Right Nursing Home & Lower the Risk of Elder AbuseAngela Vagotis
 
AACSB Cross Campus Collaborations
AACSB Cross Campus CollaborationsAACSB Cross Campus Collaborations
AACSB Cross Campus CollaborationsGWSB
 
Interpersonal communication (outline)
Interpersonal communication (outline)Interpersonal communication (outline)
Interpersonal communication (outline)Abigail Estoesta
 
FSI Bulgarian Basic Text (Part 1)
FSI Bulgarian Basic Text (Part 1)FSI Bulgarian Basic Text (Part 1)
FSI Bulgarian Basic Text (Part 1)Chuck Anderson
 
Identifying & Reporting Elder Abuse and Neglect
Identifying & Reporting Elder Abuse and NeglectIdentifying & Reporting Elder Abuse and Neglect
Identifying & Reporting Elder Abuse and NeglectAngela Vagotis
 
Andrew loomis - the eye of the painter
Andrew loomis - the eye of the painterAndrew loomis - the eye of the painter
Andrew loomis - the eye of the painterJosselhin Moreira
 
Andrew loomis - figure drawing for all it's worth
Andrew loomis - figure drawing for all it's worthAndrew loomis - figure drawing for all it's worth
Andrew loomis - figure drawing for all it's worthJosselhin Moreira
 
Flash Storage Trends
Flash Storage TrendsFlash Storage Trends
Flash Storage TrendsOsys AG
 
Interpersonal communication (final)
Interpersonal communication (final)Interpersonal communication (final)
Interpersonal communication (final)Abigail Estoesta
 
Aqilah nafisah ulya communication privacy management
Aqilah nafisah ulya  communication privacy managementAqilah nafisah ulya  communication privacy management
Aqilah nafisah ulya communication privacy managementFaiz Sujudi
 
Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...
Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...
Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...Amila240498
 
Mahdavi Amin Article_present
Mahdavi Amin Article_presentMahdavi Amin Article_present
Mahdavi Amin Article_presentAmin Mahdavi
 

Andere mochten auch (17)

Syllabus
SyllabusSyllabus
Syllabus
 
1 a group 7 oral comm
1 a group 7 oral comm1 a group 7 oral comm
1 a group 7 oral comm
 
Solarstation
SolarstationSolarstation
Solarstation
 
How to Find the Right Nursing Home & Lower the Risk of Elder Abuse
How to Find the Right Nursing Home & Lower the Risk of Elder AbuseHow to Find the Right Nursing Home & Lower the Risk of Elder Abuse
How to Find the Right Nursing Home & Lower the Risk of Elder Abuse
 
AACSB Cross Campus Collaborations
AACSB Cross Campus CollaborationsAACSB Cross Campus Collaborations
AACSB Cross Campus Collaborations
 
Interpersonal communication (outline)
Interpersonal communication (outline)Interpersonal communication (outline)
Interpersonal communication (outline)
 
01 handout(3)
01 handout(3)01 handout(3)
01 handout(3)
 
FSI Bulgarian Basic Text (Part 1)
FSI Bulgarian Basic Text (Part 1)FSI Bulgarian Basic Text (Part 1)
FSI Bulgarian Basic Text (Part 1)
 
Identifying & Reporting Elder Abuse and Neglect
Identifying & Reporting Elder Abuse and NeglectIdentifying & Reporting Elder Abuse and Neglect
Identifying & Reporting Elder Abuse and Neglect
 
Andrew loomis - the eye of the painter
Andrew loomis - the eye of the painterAndrew loomis - the eye of the painter
Andrew loomis - the eye of the painter
 
Andrew loomis - figure drawing for all it's worth
Andrew loomis - figure drawing for all it's worthAndrew loomis - figure drawing for all it's worth
Andrew loomis - figure drawing for all it's worth
 
Flash Storage Trends
Flash Storage TrendsFlash Storage Trends
Flash Storage Trends
 
Interpersonal communication (final)
Interpersonal communication (final)Interpersonal communication (final)
Interpersonal communication (final)
 
reading and writing
 reading and writing reading and writing
reading and writing
 
Aqilah nafisah ulya communication privacy management
Aqilah nafisah ulya  communication privacy managementAqilah nafisah ulya  communication privacy management
Aqilah nafisah ulya communication privacy management
 
Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...
Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...
Bioteknologi konvensional dalam bidang pangan di universitas muhammadiyah yog...
 
Mahdavi Amin Article_present
Mahdavi Amin Article_presentMahdavi Amin Article_present
Mahdavi Amin Article_present
 

Ähnlich wie Comm201_Presentation_Chappell

DAY 22Privacy &Disclosure AgendaReview Sel
DAY 22Privacy &Disclosure AgendaReview SelDAY 22Privacy &Disclosure AgendaReview Sel
DAY 22Privacy &Disclosure AgendaReview SelOllieShoresna
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyMicah Altman
 
Facebook Privacy & Information Disclosure - Research Study
Facebook Privacy & Information Disclosure - Research StudyFacebook Privacy & Information Disclosure - Research Study
Facebook Privacy & Information Disclosure - Research StudyAlex Criswell, M.A. & M.S. Ed
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingNeville Wiles
 
Media ethics, issues and controversies
Media ethics, issues and controversiesMedia ethics, issues and controversies
Media ethics, issues and controversiesawainaarbee
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionThe Rockefeller Foundation
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
tSarah paper--textbook citation--The danger is not only that .docx
tSarah paper--textbook citation--The danger is not only that .docxtSarah paper--textbook citation--The danger is not only that .docx
tSarah paper--textbook citation--The danger is not only that .docxturveycharlyn
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
Norms of disclosure mesch&becker
Norms of disclosure mesch&beckerNorms of disclosure mesch&becker
Norms of disclosure mesch&beckereshnav
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networkseditorjournal
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishingijcisjournal
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theoryelliot7
 

Ähnlich wie Comm201_Presentation_Chappell (20)

Portfolio
PortfolioPortfolio
Portfolio
 
DAY 22Privacy &Disclosure AgendaReview Sel
DAY 22Privacy &Disclosure AgendaReview SelDAY 22Privacy &Disclosure AgendaReview Sel
DAY 22Privacy &Disclosure AgendaReview Sel
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
Facebook Privacy & Information Disclosure - Research Study
Facebook Privacy & Information Disclosure - Research StudyFacebook Privacy & Information Disclosure - Research Study
Facebook Privacy & Information Disclosure - Research Study
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social Networking
 
Media ethics, issues and controversies
Media ethics, issues and controversiesMedia ethics, issues and controversies
Media ethics, issues and controversies
 
Influence of media source on political interest;
Influence of media source on political interest;Influence of media source on political interest;
Influence of media source on political interest;
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for Action
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
tSarah paper--textbook citation--The danger is not only that .docx
tSarah paper--textbook citation--The danger is not only that .docxtSarah paper--textbook citation--The danger is not only that .docx
tSarah paper--textbook citation--The danger is not only that .docx
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Norms of disclosure mesch&becker
Norms of disclosure mesch&beckerNorms of disclosure mesch&becker
Norms of disclosure mesch&becker
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theory
 
Communication Privacy Management Theory (CPM)
Communication Privacy Management Theory (CPM)Communication Privacy Management Theory (CPM)
Communication Privacy Management Theory (CPM)
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Comm201_Presentation_Chappell

  • 2. Communication privacy management theory (CPM) states that individuals own their private information and control what information is concealed or revealed (Bridge & Schrodt, 2013). To manage their information, people construct privacy boundaries that “protect private information, ensuring it is unknown to others until the boundary is opened or made permeable” (McManus & Nussbaum, 2013, p. 197). To control these boundaries, every individual creates privacy rules to determine how and when to disclose private information. What is it?
  • 3. There are five core principles of CPM. First, people believe that they own their private information, and therefore have a right to control such information. Second, people construct and use privacy rules to guide their sharing and concealing of private information. Third, when others gain access to a person’s private information, they become co-owners of that information. Fourth, co-owners of information need to negotiate mutually agreeable privacy rules and boundaries about telling others this information. Fifth, when privacy rules and boundaries are not sufficiently discussed between the co-owners of information, turbulence occurs (Tenzek, et al., 2013). What is it?
  • 4. Developed by Sandra Petronio in 2002, CPM applies to multiple areas of communication studies. This theory is used in health communication as a guideline for disclosing medical diagnoses, and has recently been applied to online social media as scholars investigate Facebook usage and privacy. However, CPM is primarily used to study family communication (Petronio, 2013).
  • 5. CPM is praised for its applicability, as it is “a practical theory constructed to ... understand everyday problems and events that people encounter in families” (Toller & McBride, 2013, p. 34). CPM provides guidelines that individuals use when revealing and concealing their private information, and this theory helps families discuss difficult personal topics such as … Child abuse Sexual orientation So what?
  • 6. Death InfidelitySo what? CPM suggests that every individual experiences tension between revealing and concealing private information (Tenzek, Herrman, May, Feiner, & Allen, 2013, p. 328). While sharing information indicates trust and intimacy, some topics are “difficult and uncomfortable for the speaker to discuss and/or for the recipient to hear” because they are hurtful, inappropriate, and/or stressful (McManus & Nussbaum, 2013, p. 197). By following the privacy rules of CPM, individuals can alleviate this tension and determine their best strategy for disclosure.
  • 7. As CPM was developed in 2002, it is still a new communication theory that Petronio continues to revise, refine, and expand. A common criticism of CPM is that the theory does not suggest how to repair breaches of privacy. While the theory states that turbulence occurs when privacy boundaries are not adequately discussed between co-owners of information, Petronio does not explain how to overcome and mend such turbulence (Plander, 2013). Furthermore, the theory offers little explanation behind its principles and framework, and many scholars believe that more research needs to be done to demonstrate its consistency (Plander, 2013).
  • 8. CPM asserts that privacy rules are socially learned and influenced by culture and gender. Most individuals first construct their privacy rules through the family because “parents and family members are often the first teachers of the concept of privacy” (Serewicz, 2013, p. 2). Parents teach their children what information can be shared and what information should be kept private (i.e., nudity, family finances). As individuals grow and mature, their privacy rules evolve to reflect their peers, school, the media, and other social influences. For example, when an individual begins a new job or joins an organization, they very quickly learn the appropriate privacy rules and boundaries that they are expected to follow. Presenter’s Choice
  • 9. References Antique envelope [Photograph]. (2005). Retrieved July 2, 2013 from: http://www.flickr.com/photos/8078381@N03/4010252027/ Bridge, M. C., & Schrodt, P. (2013). Privacy orientations as a function of family communication patterns. Communication Reports, 26(1), 1-12. doi: 10.1080/08934215.2013.773054 Clarke, A. (Photographer). 3_8 [Photograph]. (2007). Retrieved July 3, 2013 from: http://www.flickr.com/photos/ 50555053@N00/414607192 Gajownik, L. (Photographer). Secrets [Photograph]. (2013) Retrieved July 6, 2013 from: http://www.flickr.com/photos/lexigajownik/ 8608707816/ Huba, M. (Photographer). Whispering hope [Photograph]. (2008). Retrieved July 6, 2013 from: http://www.flickr.com/photos/ 56217767@N00/2435736761/
  • 10. References Julemiddag [Photograph]. (2011). Retrieved July 2, 2013 from: http://www.flickr.com/photos/45270502@N06/5883733151/ Leroyer, P. (Photographer). Kiss in [Photograph]. 2010. Retrieved July 3, 2013 from: http://www.flickr.com/ photos/52499764@N00/4362904430/ McManus, T. G., & Nussbaum, J. F. (2013). Topic valence and ambiguity in parent-emerging adult child postdivorce discussions. Communication Studies, 64(2), 195-217. doi: 10.1080/10510974.2011.646085 Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13(1), 6-14. doi: 10.1080/15267431.2013.743426
  • 11. References Plander, K. L. (2013). Checking accounts: Communication privacy management in familial financial caregiving. Journal of Family Communication, 13(1), 17-31. doi: 10.1080/15267431.2012.742090 Serewicz, M. C. M. (2013). Introducing the special issue on communication privacy management theory and family privacy regulation. Journal of Family Communication, 13(1), 2-5. doi: 10.1080/15267431.2013.743424 Sevillano, H. (Photographer). Faces 5 [Photograph]. (2012). Retrieved July 2, 2013 from: http://www.flickr.com/photos/ 40117184@N03/7644606940/ Tenzek, K. E., Herman, A. R., May, A. R, Feiner, B., & Allen, B. (2013). Examining the impact of parental disclosure of HIV on children: A meta-analysis. Western Journal of Communication, 77(3), 323-339. doi: 10.1080/10570314.2012.719092
  • 12. References Toller, P. W., & McBride, M. C. (2013). Enacting privacy rules and protecting disclosure recipients: Parents' communication with children following the death of a family member. Journal of Family Communication, 13(1), 32-45. doi: 10.1080/15267431.2012.742091 Tyson, D. (Photographer). Out with a smile [Photograph]. (2006) Retrieved July 3, 2013 from: http://www.flickr.com/photos/ 16231096@N00/126602163/ When I grow up [Photograph]. (2006). Retrieved July 3, 2013 from: http://www.flickr.com/photos/80489788@N00/138200832/