Communication privacy management theory

Last updated

Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information. It suggests that individuals maintain and coordinate privacy boundaries (the limits of what they are willing to share) with various communication partners depending on the perceived benefits and costs of information disclosure. Petronio believes disclosing private information will strengthen one's connections with others, and that we can better understand the rules for disclosure in relationships through negotiating privacy boundaries.

Contents

Petronio uses a boundary metaphor to explain the privacy management process. Privacy boundaries draw divisions between private information and public information. This theory argues that when people disclose private information, they depend on a rule-based management system to control the level of accessibility. An individual's privacy boundary governs his or her self-disclosures. Once a disclosure is made, the negotiation of privacy rules between the two parties is required. A distressing sense of "boundary turbulence" can arise when clashing expectations for privacy management are identified, or when preexisting expectations are breached, intentionally or unintentionally. Having the mental image of protective boundaries is central to understanding the five core principles of Petronio's CPM:

  1. People believe they own and have a right to control their private information.
  2. People control their private information through the use of personal privacy rules.
  3. When others are told or given access to a person's private information, they become co-owners of that information.
  4. Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others.
  5. When co-owners of private information do not effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result. [1]

Background

Petronio's communication privacy management (CPM) theory is built on Altman's dialectical conception of privacy as a process of opening and closing a boundary to others. [2] Altman and Taylor's social penetration theory focused on self-disclosure as the primary way to develop close relationships. However, Altman believed that openness was just one part belonging to a larger whole, one which expanded to include privacy with Leslie A. Baxter's work on relational dialectics theory. [1] When Petronio first developed this theory in 1991, it was called communication boundary management. In 2002, she renamed it to communication privacy management, underscoring "disclosure of private information" [1] as the crux of the theory.

Theory elements

Private information

CPM Basic Suppositions.png

The content of concealing and revealing is private information. Petronio favored the term "private information" over the term "self-disclosure" because there are many caveats inherent to private information disclosure that are not present with self-disclosure. [3] Firstly, the motivations behind sharing are many, including but not limited to: sharing a burden, righting a wrong, and influencing others. [4] Since private information can be about oneself or others, the decision as to what is private and whom to share it with plays a part when taking the idea of boundaries into consideration. [5] The decision to share is ultimately left up to the process of the privacy rule management system which combines rules for coordination of information, characteristics of disclosure, and attributes of the nature of boundaries.

A confidant who is fully committed to handle private information by abiding in the original owner's privacy rules. [1]

Someone who shares should have access to the private information based on what they have the lose if the information is disclosed. [1]

Someone who seeks out private information. [1]

Private boundaries

To understand CPM theory it is important to follow the metaphor of the boundary. Private boundaries are the division between private information and public information. [6] When private information is shared, there will be a collective boundary. When private information remains with an individual and is not disclosed, the boundary is called a personal boundary. An individual's private information is protected by their boundaries. The permeability of these boundaries are ever-changing. Boundaries can be relatively permeable (easy to cross) or relatively impregnable (rigid and difficult to cross).

Boundary coordination

An individual's private information is protected by the individual's boundaries. The permeability of these boundaries are ever-changing, and allow certain parts of the public access to certain pieces of information belonging to the individual. Sharing private information is a risky decision and puts the owner of the information in a vulnerable position. Therefore, rules surrounding the boundaries must be negotiated to protect the shared information. [7] Once private information is shared, co-owners must coordinate the boundaries of privacy and disclosure based on boundary permeability, boundary linkage, and boundary ownership. [8] Petronio describes this mutual boundary coordination by co-owners as drawing the same borders on a map around a shared piece of information. [9] This a difficult process, considering that each owner will approach the information from distinct viewpoints and referencing their personal criteria for privacy rule development.

  • Boundary permeability is the nature of the invisible divisions that keep private information from being known outside of an individual or particular group. When private information is kept with one owner, the boundaries are said to be thick because there is less possibility for information to make its way out into the public sphere. Once information is shared to one or more persons, the boundaries for that private information expand, become more permeable, and are considered thin. [10]
  • Boundary linkage is how owners are connected when they build associations through a boundary. For example, doctors and patients are linked to each other in such a way that private information is passed within their boundaries constantly. These linkages can be strong or weak depending on how information was shared or whether a co-owner wanted to know or was prepared to learn a new piece of information. Case in point, the link between an organization and a spy meant to infiltrate the organization is weak because the two are not coordinated on how information will be maintained private or disclosed. [11]
  • Boundary ownership is the responsibilities and rights each person has over the control of the spread of information that they own. When working to mutually create the boundary of privacy it is key for all parties to have a clear understanding of whether information should be shared, who it should be shared with, and when it should be shared. [8] A simple example of this is the planning of a surprise birthday party; all those involved in planning must agree on how the information about the party will be spread so as not to ruin the surprise. As new guests are invited, they become an owner of the information and are bound to the rules of privacy maintenance, or else the surprise could be ruined.
  • Fuzzy boundaries are parts of confidential information that have not been discussed in a confidentiality agreement. One or both parties are not sure if that information can be shared with outside parties. Once information is known by others who are not the original owner they may have their own interpretation of how the information can be shared. [1]

Boundary turbulence

Often, boundaries are not coordinated as well as they should be to maintain the level of privacy or exposure desired by owners – this leads to problems known as boundary turbulence. The coordination of shared boundaries is key to avoiding over-sharing. When the boundaries are unclear, owners may come into conflict with one another. Turbulence among co-owners is caused when rules are not mutually understood by co-owners and when the management of private information comes into conflict with the expectations each owner had, [3] which can happen for a number of reasons.

Boundary turbulence can be caused by mistakes, such as an uninvited party overhearing private information (causing weak boundary linkage) or a disclosure an owner might make under the influence of alcohol or other drugs. Disclosure to a new party was not the intent, but, when it happens, other co-owners can feel that their expectations of maintaining boundaries have been violated.

In addition, boundary turbulence occurs when a co-owner intentionally breaks the coordinated boundary of privacy to disclose private information. [12] An example of such intentional disclosure would be a daughter revealing to a doctor that her father is indeed an active smoker when the father has told the doctor that he no longer smokes after his heart surgery. The daughter in this case must weigh the risks of breaking the family privacy boundary against the benefits of the doctor being better informed of her father's condition.

Lastly, boundary turbulence can also occur when there have not been pre-existing rules for a situation. For example, with the emergence of social media and, in particular, Facebook, boundary rules had not been established. As parents began to join Facebook and "friend" their children, the children felt turbulence. There was a perception of privacy invasion between the parent-child relationship. [13]

In cases of boundary turbulence, co-owners of information can feel that their expectations have been violated and lose trust in other co-owners. In these cases, the goal of each party is to reduce turbulence by reestablishing and coordinating boundaries. [6] [12] Turbulence does not always have a negative outcome, there has been studies which show that turbulence within relationships can lead to stronger and improved relationships. [14] Boundary violations and boundary turbulence can be used as a learning opportunity for individuals to renegotiate existing boundaries or better form new boundaries in similar situations. [7] Boundary turbulence is experienced differently by each individual, and reactions to violations can depend on how many new boundary linkages are created and how many new people the private information reaches. These factors can determine whether boundary turbulence can cause distress to a relationship or be a learning experience. [15]

Personal and collective boundaries Personal and Collective Boundaries.png
Personal and collective boundaries

Control and ownership

Communication privacy management theory understands information (as well as boundaries) as something that is owned, and each owner must decide whether or not they are willing to have a confidant, i.e. a co-owner, to that information. In some cases, it is preferable for the owner to have another person share the private information, though this may not be the case for the confidant. Co-ownership of information is characterized by two things: heavy responsibility and a knowledge of the rules for a particular disclosure. However, ownership can be felt to different degrees, and the understanding of disclosure rules can be different from owner to owner. Also, the act of sharing is coupled along with the realization that boundaries have expanded and that they may never return to their original state. It is the responsibility of co-owners to decide and make clear if, when, and how information can or should be shared with others. Sometimes, a confidentiality agreement is not evenly shared. For instance, a client at a barber shop shares their life story with the barber, the barber may not feel as much pressure to hold up their end of the disclosure agreement since they barely know each other. However, a counselor who is bound by law to not leak private information will not be a risk to breach that trust. [10]

Rule-based management system

Three processes in communication privacy management theory.png

Petronio views boundary management as a rule based process, not an individual decision. This rule-based management system allows for management on the individual and collective levels. This system depends on three privacy rule management to regulate the process of revealing and concealing private information: privacy rule characteristics, boundary coordination, and boundary turbulence.

Privacy rule characteristics

The characteristics of privacy rules are divided into two sections, attributes and development. Privacy rule attributes refer to how people obtain rules of privacy and understand the properties of those rules. [8] This is normally done through social interactions where the boundaries for rules are put to the test. Rules are set in different social situations which dictate the type of disclosure that should be made, for example, the difference between disclosure at a family member's birthday party versus an office event at work. Petronio asserts that each situation will come with its own set of rules for managing privacy that are learned over time. The development of privacy rule characteristics has to do with the criteria implemented to decide if and how information will be shared. [9] Communication privacy management theory general lists those criteria as the following:

Boundaries in a Life Span.png

Decision Criteria

Category

Definition

Example

Cultural coreDisclosure depends on the norms for privacy and openness in a given culture.The United States favors more openness in relational communication than does Japan
GendercorePrivacy boundaries are sculpted differently by men and women based on socialization, which leads to difference in how rules are understood and operated inAmerican women are socialized to disclose more than men. Men are more comfortable talking to women about their private information as opposed to the same sex. However, women enjoy talking to the same sex as opposed to the opposite. [16]
Context catalystShaped by issues of physical and social environments that factor in whether or not information will be sharedIn a traumatic situation (e.g., surviving an earthquake together), we will develop new rules
Motivation catalystOwners of information can form certain bonds that lead to disclosure, or conversely the express interest in forming bonds may cause private information to be shared. Motivations for sharing can include reciprocity or self-clarification.If you have disclosed a great deal to me, out of reciprocity, I might be motivated to disclose to you
Risk/benefit ratio catalystOwners of private information evaluate risks relative to the benefits of disclosure or maintaining information private.Our rules are influenced by our assessment of the ratio of risks to benefits of disclosing

With these five criteria, personal and group privacy rules are developed, but disclosure of private information necessitates the inclusion of others within the boundary of knowledge, which demands an understanding between parties for how to coordinate ownership of knowledge.

Management dialectics

Petronio's understanding and argument of privacy management rests on the idea that a dialectic exists wherever the decision is made to disclose or conceal private information. Thus, costs and benefits must be weighed and consideration must be given to how such information will be owned, used, and spread. [17] The definition of dialectic that Petronio borrows from can be found in Leslie Baxter and Barbara Montgomery's theory of relational dialectics, wherein various approaches to the contradictory impulses of relational life are discussed. The theory focuses on the idea that there are not only two contradictory stances within a relationship, were weighed using multiple viewpoints. [18]

Theory applications

To validate the effectiveness and feasibility of the communication privacy management theoretical frameworks, Petronio tested them using different methods including and not limited to qualitative and quantitative research. [19] These approaches helped other researchers translate research into practice in different fields and enabled CPM to be applied across different contexts, primarily include: (1) family communication, with a particular focus on parental privacy invasions, (2) online social media, (3) health, and (4) relational issues, [20] and (5) work environments. [21]

Family communication

Specific applications of CPM highlight family privacy management. Research focused on secrets and topic avoidance, such as questions of concealment to stepfamily members feeling caught, and parents-adolescent conversations about sex. [22] Family privacy research over the decades are also inspired specifically by the chapter of parental privacy invasion. For example, work by Hawk and his colleagues explore perceived parental invasions from the view of adolescents in reaction to such issues as control attempts, solicitation of information, and conflict outcomes. [20] Another way that family communication uses CPM is with child bearing or the lack thereof; CPM has been used to explore whom childless couples choose to disclose to that they voluntarily do not want children. [23]

Pregnancy loss due to miscarriage could be a unique CPM case in the family setting as couples often manage this information jointly as they decide whether to share the miscarriage with people outside the dyad. The research found that couples frame miscarriage as a shared but distinct experience and that both members exert rights of ownership over the information. According to one study, "Couples' privacy rules centered on issues of social support and others' need to know about the loss. Even though couples described their privacy rules as implicitly understood, they also recalled having explicit conversations to develop rules. We discuss how the management of co-owned information can improve communication and maintain relationships." [24] [25] Another study examines obstetric fistulas’ effects in developing countries. The study looks at how women handle their diagnosis and how they share the information they receive. The study found that the majority of women hide their diagnosis due to the effects that come after others know. [26]

Online social media

Recent researchers apply CPM to investigate privacy management for online blogging, Facebook usage and online dating. Further, there have been investigations into parental behavior that is enacted through online social media; specifically when parents 'friend' their children and the management of privacy that ensues from that. [27] Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. One study explored privacy in social network sites as a contextual information practice, managed by a process of boundary regulation. [28] Disclosing private information online functions differently than disclosing private information in face to face instances. [29] The mediated nature of social media means that it can be harder to control who sees what information and how that information can be spread. Thus, it is harder to control boundaries and linkage. Trust and risk management become important factors in sharing information online. [30]

As social media continues to develop and become an essential part in everyday life, more younger audiences are attuned to how much information is under surveillance. Surveillance from family, schools and potential employers means individuals cannot fully control the boundaries and co-owners of their private information, which has implications for what is shared and how individuals present themselves online. [31]

An issue that often can arise within families is the amount of information posted to the internet by one's parents without their permission. Parents often post family photos of their children or accomplishments without contacting their children first. One study, in particular, analyzed the children's responses to the information being posted by their parents. [32] The results depended on the type of information posted and the details and photos included.

Facebook

Since Facebook is one of the most popular social media platforms, [33] many researchers employed communication privacy management theory as a theoretical framework to examine the individual boundary management practices and privacy concerns of self-disclosure on this important platform. [34] Sandra Petronio and other researchers used CPM to study young adults' tendencies to manage their privacy and communicate on Facebook with different generations of family members. [35] [36] 383 respondents participated in a survey concerning their online and offline Facebook communication with other family members. The study found that young adults share their information mainly with their siblings followed by their parents and finally their grandparents. Another case study analyzing the responses of 240 participants revealed that the communication privacy practices by individuals using Facebook strongly impact the "amount and depth" of their self-disclosure. [37] One more study explored how colleagues in the professional context respond to friend requests from other co-workers. [38] The study provided evidence that co-workers' connection on Facebook improves only when each party understands the rules which govern privacy management. In an exploratory study on privacy management in two social media platforms, Facebook and Snapchat, showed that Facebook users are less likely to share their private information compared to users of other social media platforms. [39] A related study showed that the more “friends” one had on their social media platform, the lass they were willing to share. [40] A differing study found that Facebook subscribers are more open and willing to share their private information with distant friends rather than the close ones. [41] These examples demonstrate how Facebook users are aware of the fact that they do not have full control over the ownership of their information and this affects their decisions on what and how to share on Facebook.

Blogging

Jeffrey T. Child, Judy C. Pearson and Sandra Petronio have used CPM to develop the Blogging Privacy Management Measure (BPPM), a model through which researchers can look at privacy management in blogging specifically. Because blogging is a mediated activity, the BPPM can be used to look at the implications of online blog disclosures, such as when the privacy boundaries are misinterpreted by readers. [42] A study using the BPPM found that young bloggers were likely to reveal more private information online rather than in person, because the medium gives more control. Bloggers who had "higher self-monitoring skills" tended to be more private and careful with their disclosures. Bloggers with a high "concern for appropriateness" tended to curate the perfect desired image of who they wanted to be online, and disclosed private information to fit that image. [43]

Similar research has been done on the perceptions of teachers' disclosures on Facebook and their impact on credibility. The relevance and valence of disclosures were compared between disclosures made in the classroom and those made on Facebook and were found to be significantly different. Students' perceptions of teacher credibility were shown to decrease as relevance of disclosures increased and as negativity increased. [44]

Twitter

Another popular SNS, Twitter, was examined as well. In the research, Twitter was regarded as an onion with multiple privacy layers. The research found out that there were significant differences at the descriptive and inferential levels among the multiple dimensions of private information, including daily lives, social identity, competence, socio-economic status, and health. Private information regarding daily lives and entertainment was disclosed easily and located at the outermost layer of the disclosure onion. In contrast, health-related private information was concealed and located within the innermost layer of the disclosure onion. What's more, there were significant differences among current Twitter users, nonusers, and dropouts with regard to personality traits and privacy concerns about Twitter. [45]

Young people, especially high school and college students, are an important part of SNS users. A recent study examined college students' privacy concerns and impacts on their Twitter usage behaviors. Regression analyses concluded that Control and Boundary Rules of Private Information on Twitter significantly predict daily minutes spent on Twitter accounts. However, the same CPM variables did not predict college students' other Twitter usage behaviors (e.g., weekly inquiries and total months of using Twitter). This shows the intricate connection between students' privacy concern and their usage behavior. [46]

Health communication

Informed by principles of CPM, health communication research using CPM to explore health privacy issues has become a growth area. Earlier study investigated physician disclosure of medical mistakes. Recently there have been a number of studies focused on ways that privacy issues influence patient care, confidentiality and control over ownership, choices about disclosure, for instance, with stigmatized health-related illness such as HIV/AIDS, [47] [48] e-health information, reproductive information, [49] and the digitization of healthcare.

One recent study about how overweight and obese individuals handle their personal history after they become a normal weight. The result shows that the vast majority of participants perceived more benefits from disclosing their larger identity than risks, regardless of weight-loss method. [50]

Trust in health care providers is an important factor in determining whether a patient is comfortable disclosing private health information. In a health context, race may be a core factor in whether or not a patient trusts medical professionals, and race can impact how privacy rules between an individual and a doctor develop. [51]

Using CPM, Celebrity Health Narratives & the Public Health offers the "first extensive look at celebrity health sagas, this book examines the ways in which their stories become our stories, influencing public perception and framing dialog about wellness, disease and death. These private-yet-public narratives drive fund-raising, reduce stigma and influence policy. Celebrities such as Mary Tyler Moore, Robin Roberts, Michael J. Fox, and Christopher Reeve—as well as 200 others included in the study—have left a lasting legacy." [52]

Health related situations can include a "forced disclosure" incident, such as when young adults are still under their parents' health insurance plans and do not have full control over what private health information is shared. Because the parents support their child financially by paying for insurance, individuals can feel that parents have a right to this information. For those that feel that health information should solely be under the ownership of the individual, boundary turbulence can occur. [53]

Relationship issues

Many studies emphasize the use of CPM in relationships because of the concepts of disclosure and boundaries. Not only romantic relationships, but also friendships are a factor when thinking of CPM. [54] In any relationship, it has been found that men are less willing to share their private information with others. [55] It has also been found that those within the LGBTQ+ community are less likely to share their feelings with anyone. [56] Disclosures in friendships have been studied because of how important friendships are to one's identity, especially at a young age. When a person is unable to disclose information to friends or loved ones, it can exacerbate issues because they do not feel supported. Thus, researchers use CPM to understand why and how private disclosures happen in friendships. [57] Briefly, work on conflict and topic avoidance, considering the relational impact of privacy turbulence, students and faculty relationships, and workplace relationships have all produced useful information that opens new doors regarding CPM-based research.

The mobile phone and its impact on romantic relationships is a good example. After investigating mobile phone usage rules that are negotiated by adolescents and young adults in romantic relationships, findings show that the negotiation of rules is a crucial part of young adult relationships while enhancing trust and fostering harmony are important factors in the rule development process. [58]

CPM also appears in the friendship. The study intended to addresses the issue of whether personal traits and predispositions can predict the tendencies to either reveal or conceal secrets shared in confidence by a best friend suggested that a combination of several traits could successfully distinguish those who revealed secrets from those who did not. Significant discriminators included tendency to gossip and depth of disclosure. Implications of the study and suggestions for future research are discussed. [59]

Although privacy violations can be uncomfortable and disruptive, they have the potential for positive outcomes in relationships if addressed. Using CPM theory as a framework, a study surveyed a community sample of 273 adults to examine their retrospective accounts of privacy violations in personal relationships. Results showed that less than half of the sample offered explicit rules for information management, and the majority of participants blamed the confidant for the privacy turbulence. Findings indicated that people often do not share similar information with the violator in the future, but if they do, less than half offer explicit privacy rules during the privacy recalibration process. Confrontation efficacy was positively associated with initiating a conversation about the privacy turbulence and that people who engaged in privacy recalibration were more likely to report forgiveness and relational improvement and less likely to report relational damage than those individuals who did not. [60]

Voice-Based Assistants

With an increase in technological advancement, voice-based assistants have become more frequently used. A recent study was conducted to see whether consumers want to reveal or conceal their information to these voice-based assistants. [61]   We often believe only a certain amount of our information is shared, but we are unaware of what is being given to different companies. [62] Another study looked into how much information is shared with companies without our knowledge or permission and found that almost all of our information is shared without getting permission. [63] Many countries have laws regarding personal information and what companies can or cannot use, but the United States is not within that realm. [64]

Work environments

CPM has become applicable in the workplace as personal mobile devices are increasingly allowed to be brought to work. The concept of bringing your own device (BYOD) has stirred conversation on the concept of privacy, security, and boundaries between employees and employers. Companies have had to take measures to secure their network further or even decide whether they want employees to access personal accounts (i.e., email) or devices while on the job. By the same token, some employees argue that companies should not be able to track what is being done on their personal devices or even on company computers even if they are in the work place. [65] [66] Even before stepping foot into the workplace, CPM can be applied, such as in the interviewing process. How much candidates decide to reveal within an interview and their boundaries in that situation is directly related to CPM. [67] [68] Even interviewing within a job (as a cop, for example) requires a certain sensitivity to people's boundaries and how much private information they are willing to reveal. [69] Various athletic teams use this approach as well, limiting the amount of time an athlete can spend online, as well as monitoring what they can share online. [70]

Intercultural communication

Several studies tested CPM within intercultural contexts. For instance, a study that examined intercultural privacy management between foreign English teachers and Japanese co-workers uncovered cultural premises. This "study highlights four cultural premises that garner intercultural privacy management between foreign English language teachers (ELTs) and Japanese coworkers (JCWs) in Japan [71] The analysis revealed that ELTs: (a) expected not to be a "free space" for privacy inquisition by JCWs, and (b) expected voluntary reciprocity in (egalitarian) workplace relationships. JCWs viewed: (a) privacy inquisitions as acts of kindness/caring and (b) soliciting help from a supervisor as providing opportunities for better care. This study calls for attention to intercultural privacy management and enhances CPM's cultural criteria." [72] Within the same context, foreign English teachers "employed the following management strategies: (a) withdrawal, (b) cognitive restructuring, (c) independent control, (d) lying, (e) omission, (f) avoidance, and (g) gaijin smashing. Japanese co-workers defined privacy as information that should be hidden and managed such information by: (a) drawing clear boundaries by not talking or changing contexts, and (b) being pre-emptive by demarcating privacy boundaries early on within a relationship." [71] [73]

Cultural differences are often tied to relationships, and can move beyond differences of ethnicity or gender. A 2020 study looked at how CPM functions in mixed orientation marriages, where a heterosexual presenting couple is actually made up of one heterosexual partner and one partner who does not identify as heterosexual. Disclosure of one's sexuality often was an identity-affirming action, as an outsider would not be able to tell otherwise what the partners' sexualities were. After a disclosure, couples were found to manage boundaries for the owned private information in several ways: Inclusive, intersected, interrelated or unified. [74] Dominic Pecoraro also studied privacy management among members of the LGBT community, and included performative face theory and facework into his paradigm of why, when and how queer individuals disclose their sexual identities. Public disclosure via "coming out" normalizes different sexual identities, providing resistance to face threats due to heteronormativity. [75]

Identity plays a large part in disclosure of religion as well. A 2020 study on how and why employees disclose their religious views when they were a part of a minority religion found that employees who felt like their religion was a core part of their identity were more likely to share that part of themselves with their coworkers, because religion was central to their identity. [76]

There are a few communication theories related to CPM.

Expectancy violations theory discusses the importance of personal space, territoriality and the expectations individuals have of another person's nonverbal communication. Both expectancy violations theory and CPM are related through how they deal with physical proximity, privacy and how close individuals allow other people to come to them. Both physical and intimate proximity requires boundaries to be crossed or permeated.

Social penetration theory explains how two individuals grow in intimacy and move from one level to the next in their relationships. The popular idea behind social penetration is that individual are like onions; they have layers, and deeper layers represent greater intimacy. For this intimacy to occur, private information needs to be shared and exchanged. As one does this, boundaries are permeated and become co-owned.

Finally, coordinated management of meaning explains how people establish rules for both creating and interpreting meaning. Coordinated management of meaning has stages where coordination is achieved, not achieved, or partially achieved, which are similar to CPM's boundary ownership, boundary turbulence or boundary linkage. Moreover, in order to achieve meaning, there needs to be an exchange of information between individuals to decipher. This exchange of private information falls directly into CPM.

Academic integration

Communication privacy management theory utilizes a socio-cultural communication tradition within an interpersonal context, and employs both a positivistic and interpretive approach to knowing. [77]

Critique

Values

Altman speaks to the values of this theory as it incorporates different "levels" or combinations of participants in communication processes (Altman 2002). Whereas earlier research and theorizing on privacy-disclosure focused on dyads or individuals, Petronio enunciated a more complicated set of dynamics. Petronio also describes communication within families and between family members and outsiders, within and outside work and social groups, and between many combinations of individuals, dyads, and others within and across social boundaries. In addition, her analysis of privacy-disclosure "turbulence", or breaches of desired communication patterns, is articulate and systematic. [12] [78] [79]

Criticism

Some researchers have questioned whether CPM theory truly is dialectical in nature. It has argued that CPM takes a dualistic approach, treating privacy and disclosure as independent of one another and able to coexist in tandem rather than in the dynamic interplay characteristic of dialectics. This accusation of dualistic thinking might result from the theory's use of the terms balance and equilibrium in the early versions of CPM theory. Petronio argues that CPM is not focused on balance in the psychological sense. "Instead, [CPM] argues for coordination with others that does not advocate an optimum balance between disclosure and privacy. As an alternative, the theory claims there are shifting forces with a range of privacy and disclosure that people handle by making judgments about the degrees [emphasis in original] of privacy and publicness they wish to experience in any given interaction" (pp. 12–13). Thus, Petronio argues that it is legitimate to call CPM theory dialectical in nature. While boundary ownership is discussed throughout the theory there is no remedy provided for those who break boundary ownership rules. In addition CPM does not offer ways on how to negotiate boundaries between two parties, only that they must be done mutually.

See also

Related Research Articles

<span class="mw-page-title-main">Privacy</span> Seclusion from unwanted attention

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

Medical privacy, or health privacy, is the practice of maintaining the security and confidentiality of patient records. It involves both the conversational discretion of health care providers and the security of medical records. The terms can also refer to the physical privacy of patients from other patients and providers while in a medical facility, and to modesty in medical settings. Modern concerns include the degree of disclosure to insurance companies, employers, and other third parties. The advent of electronic medical records (EMR) and patient care management systems (PCMS) have raised new concerns about privacy, balanced with efforts to reduce duplication of services and medical errors.

Impression management is a conscious or subconscious process in which people attempt to influence the perceptions of other people about a person, object or event by regulating and controlling information in social interaction. It was first conceptualized by Erving Goffman in 1956 in The Presentation of Self in Everyday Life, and then was expanded upon in 1967.

<span class="mw-page-title-main">Social exchange theory</span> Generalization theory explaining social behaviour regarding society and economics

Social exchange theory is a sociological and psychological theory that studies the social behavior in the interaction of two parties that implement a cost-benefit analysis to determine risks and benefits. The theory also involves economic relationships—the cost-benefit analysis occurs when each party has goods that the other parties value. Social exchange theory suggests that these calculations occur in a variety of relationships, from romantic relationships and friendships to professional relationships, and even in ephemeral interactions, such as exchanging words with a customer at the cash register. Social exchange theory says that if the costs of the relationship are higher than the rewards, such as if a lot of effort or money were put into a relationship and not reciprocated, then the relationship may be terminated or abandoned.

Expectancy violations theory (EVT) is a theory of communication that analyzes how individuals respond to unanticipated violations of social norms and expectations. The theory was proposed by Judee K. Burgoon in the late 1970s and continued through the 1980s and 1990s as "nonverbal expectancy violations theory", based on Burgoon's research studying proxemics. Burgoon's work initially analyzed individuals' allowances and expectations of personal distance and how responses to personal distance violations were influenced by the level of liking and relationship to the violators. The theory was later changed to its current name when other researchers began to focus on violations of social behavior expectations beyond nonverbal communication.

The uncertainty reduction theory, also known as initial interaction theory, developed in 1975 by Charles Berger and Richard Calabrese, is a communication theory from the post-positivist tradition. It is one of the few communication theories that specifically looks into the initial interaction between people prior to the actual communication process. Uncertainty reduction theory originators' main goal when constructing it was to explain how communication is used to reduce uncertainty between strangers during a first interaction. Berger explains uncertainty reduction theory as an "Increased knowledge of what kind of person another is, which provides an improved forecast of how a future interaction will turn out". Uncertainty reduction theory claims that everyone activates two processes in order to reduce uncertainty. The first being a proactive process, which focuses on what someone might do. The second being a retroactive process, which focuses on how people understand what another does or says. This theory's main claim is that people must receive information about another party in order to reduce their uncertainty and, that people want to do so. While uncertainty reduction theory claims that communication will lead to reduced uncertainty, it is important to note that this is not always the case. Dr. Dale E. Brashers of the University of Illinois argues that in some scenarios, more communication may lead to greater uncertainty.

Self-disclosure is a process of communication by which one person reveals information about themselves to another. The information can be descriptive or evaluative, and can include thoughts, feelings, aspirations, goals, failures, successes, fears, and dreams, as well as one's likes, dislikes, and favorites.

The social penetration theory (SPT) proposes that as relationships develop, interpersonal communication moves from relatively shallow, non-intimate levels to deeper, more intimate ones. The theory was formulated by psychologists Irwin Altman of the University of Utah and Dalmas Taylor of the University of Delaware in 1973 to understand relationship development between individuals. Altman and Taylor noted that relationships "involve different levels of intimacy of exchange or degree of social penetration". SPT is known as an objective theory as opposed to an interpretive theory, meaning it is based on data drawn from actual experiments and not simply from conclusions based on individuals' specific experiences.

For other uses, see Family Secret (disambiguation).

<span class="mw-page-title-main">Social information processing (theory)</span> Theory of human interactions

Social information processing theory, also known as SIP, is a psychological and sociological theory originally developed by Salancik and Pfeffer in 1978. This theory explores how individuals make decisions and form attitudes in a social context, often focusing on the workplace. It suggests that people rely heavily on the social information available to them in their environments, including input from colleagues and peers, to shape their attitudes, behaviors, and perceptions.

Privacy regulation theory was developed by social psychologist Irwin Altman in 1975. This theory aims to explain why people sometimes prefer staying alone but at other times like get involved in social interactions, discussing privacy as "a selective control of access to the self or to one's group".

In the social sciences, coordinated management of meaning (CMM) provides an understanding of how individuals create, coordinate and manage meanings in their process of communication. Generally, CMM is "how individuals establish rules for creating and interpreting the meaning and how those rules are enmeshed in a conversation where meaning is constantly being coordinated", and where "human communication is viewed as a flexible, open and mutable process evolving in an ongoing joint interaction, which enables movement, shifts and evolving ways with each other". CMM embodies this vision and allows interpersonal connection and open conversation among individuals or groups, and can be applicable across multiple academic fields and social scenarios.

<span class="mw-page-title-main">Gender differences in social network service use</span> Differences between genders with regard to use of social media and social network service

Men and women use social network services (SNSs) differently and with different frequencies. In general, several researchers have found that women tend to use SNSs more than men and for different and more social purposes.

<span class="mw-page-title-main">Interpersonal communication</span> Exchange of information among people

Interpersonal communication is an exchange of information between two or more people. It is also an area of research that seeks to understand how humans use verbal and nonverbal cues to accomplish several personal and relational goals. Communication includes utilizing communication skills within one's surroundings, including physical and psychological spaces. It is essential to see the visual/nonverbal and verbal cues regarding the physical spaces. In the psychological spaces, self-awareness and awareness of the emotions, cultures, and things that are not seen are also significant when communicating.

<span class="mw-page-title-main">Digital privacy</span>

Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy, a crucial aspect of modern online interactions and services, can be defined under three sub-related categories: information privacy, communication privacy, and individual privacy.

Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.

Stigma management is the process of concealing or disclosing aspects of one's identity to minimize social stigma.

Privacy in education refers to the broad area of ideologies, practices, and legislation that involve the privacy rights of individuals in the education system. Concepts that are commonly associated with privacy in education include the expectation of privacy, the Family Educational Rights and Privacy Act (FERPA), the Fourth Amendment, and the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Most privacy in education concerns relate to the protection of student data and the privacy of medical records. Many scholars are engaging in an academic discussion that covers the scope of students’ privacy rights, from student in K-12 and even higher education, and the management of student data in an age of rapid access and dissemination of information.

Privacy settings are "the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you". With the growing prevalence of social networking services, opportunities for privacy exposures also grow. Privacy settings allow a person to control what information is shared on these platforms.

<span class="mw-page-title-main">Jessica Vitak</span> American information scientist

Jessica Vitak is an American information scientist who is an associate professor at the University of Maryland. She is faculty in the University of Maryland College of Information Studies (iSchool) and Communication Department. She serves as Director of the University of Maryland Human–Computer Interaction Lab (HCIL) and an Associate Member of the Social Data Science Center (SoDa).

References

  1. 1 2 3 4 5 6 7 Griffin, E. A., Ledbetter, A., & Sparks, G. G. (2023). A First Look at Communication Theory. McGraw Hill.
  2. Metzger, Miriam J. (2007). "Communication Privacy Management in Electronic Commerce". Journal of Computer-Mediated Communication. 12 (2). Oxford University Press: 335–361. doi: 10.1111/j.1083-6101.2007.00328.x . ISSN   1083-6101.
  3. 1 2 Petronio, S. (2002). Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: SUNY Press.N TAEHJSFCJNDOISKXMJCKIOLJKDFER0IKFG VKTY56
  4. Petronio, S (1991). "Communication boundary management: A theoretical model of managing disclosure of private information between married couples". Communication Theory. 1 (4): 311–335. doi:10.1111/j.1468-2885.1991.tb00023.x.
  5. Matthews, Alicia; Derlega, Valerien; Morrow, Jennifer (Aug 20, 2006). "What is Highly Personal Information and How Is It Related to Self-Disclosure Decision-Making?". Communication Research Reports. 23 (2): 85–92. doi:10.1080/08824090600668915. S2CID   143956515.
  6. 1 2 Petronio, S.; Ellmers, N.; Giles, H.; Gallois, C. (1998). "(Mis)communicating across boundaries: Interpersonal and intergroup considerations". Communication Research. 25: 571–595. doi:10.1177/009365098025006001. S2CID   141414093.
  7. 1 2 Petronio, Sandra; Child, Jeffrey T (2020-02-01). "Conceptualization and operationalization: utility of communication privacy management theory". Current Opinion in Psychology. Privacy and Disclosure, Online and in Social Interactions. 31: 76–82. doi:10.1016/j.copsyc.2019.08.009. hdl: 1805/21434 . ISSN   2352-250X. PMID   31526974. S2CID   202249031.
  8. 1 2 3 Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples. Communication Theory, 1, 311–335.
  9. 1 2 Petronio, S (2007). "Translational Research Endeavors and the Practices of Communication Privacy Management". Journal of Applied Communication Research. 35 (3): 218–222. doi:10.1080/00909880701422443. S2CID   145456689.
  10. 1 2 Petronio, S., & Durham, W.T. (2008). Communication privacy management theory. In L.A. Baxter & D.O. Braithwaite (Eds.), Engaging theories in interpersonal communication: Multiple perspectives (pp. 309-322). Thousand Oaks, CA: Sage. gkn
  11. Caughlin, J.P.; Afifi, T.D. (2004). "When is topic avoidance unsatisfying? Examining moderators of the association between avoidance and dissatisfaction". Human Communication Research. 30 (4): 479–513. doi:10.1093/hcr/30.4.479 (inactive 3 December 2024).{{cite journal}}: CS1 maint: DOI inactive as of December 2024 (link)
  12. 1 2 3 Afifi, T. D. (2003). "Feeling caught" in stepfamilies: managing boundary turbulence through appropriate communication privacy rules". Journal of Social and Personal Relationships. 20 (6): 729–755. doi:10.1177/0265407503206002. S2CID   145434854.
  13. Kanter, M.; Robbins, S. (2012). "The Impact of Parents "Friending" Their Young Adult Child on Facebook on Perceptions of Parental Privacy Invasions and Parent-Child Relationship Quality". Journal of Communication. 62 (5): 900 of 917. doi:10.1111/j.1460-2466.2012.01669.x.
  14. McLaren, R.M. (August 2013). "Emotions, Communicative responses, and relational consequences of boundary turbulence". Journal of Social and Personal Relationships. 30 (5): 606–626. doi:10.1177/0265407512463997. S2CID   145799707.
  15. Aloia, Lindsey Susan (2018-03-15). "The Emotional, Behavioral, and Cognitive Experience of Boundary Turbulence" . Communication Studies. 69 (2): 180–195. doi:10.1080/10510974.2018.1426617. ISSN   1051-0974. S2CID   148990355.
  16. A first Look at Communication Theory 11th Edition
  17. Petronio, S., & Reierson, J. (2009). Regulating the Privacy of Confidentiality: Grasping the Complexities through Communication Privacy Management Theory. Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications. 365–383.
  18. Baxter, L.A., & Montgomery, B. (1996). Relating Dialogues and dialectics: New York: Guilford Press.
  19. Allen, Mike (2017-04-11). The SAGE Encyclopedia of Communication Research Methods. SAGE Publications. ISBN   978-1-4833-8142-8.
  20. 1 2 Petronio, Sandra (2013). "Brief Status Report on Communication Privacy Management Theory". Journal of Family Communication. 13: 6–14. doi:10.1080/15267431.2013.743426. S2CID   143892654.
  21. Miller, Seumas; Weckert, John (2000). "Privacy, the Workplace and the Internet". Journal of Business Ethics. 28 (3): 255–65. doi:10.1023/A:1006232417265. S2CID   35296871.
  22. Afifi, T.D. (2003). "'Feeling caught' in stepfamilies: Managing boundary turbulence through appropriate communication privacy rules". Journal of Social and Personal Relationships. 20 (6): 729–755. doi:10.1177/0265407503206002. S2CID   145434854.
  23. Durham, Wesley (May 21, 2008). "The Rules-Based Process of Revealing/Concealing the Family Planning Decisions of Voluntarily Child-Free Couples: A Communication Privacy Management Perspective". Communication Studies. 59 (2): 132–147.
  24. Bute, J. J.; Brann, M (2015). "Co-ownership of Private Information in the Miscarriage Context". Journal of Applied Communication Research. 43 (1): 23–43. doi:10.1080/00909882.2014.982686. hdl: 1805/5627 . S2CID   144466085.
  25. Kingsley Westerman, Catherine Y.; Haverkamp, Emily M.; Zeng, Cheng (October 2022). "Understanding Disclosure of Health Information to Workplace Friends". Behavioral Sciences. 12 (10): 355. doi: 10.3390/bs12100355 . ISSN   2076-328X. PMC   9598753 . PMID   36285924.
  26. Wood, Sandra Freda; Kwamena Aidoo, Ebenezer Ato; Orleans Lindsay, Kweku Ewusie; Tuleassi, Jessica Afful; Nukunu, Frank; Afoakwa-Acheampong, Cindy (October 2024). "Unveiling the silent suffering: Examining the complexities of disclosure and concealment strategies in women living with obstetric fistula". Heliyon. 10 (19): e38824. doi: 10.1016/j.heliyon.2024.e38824 . ISSN   2405-8440. PMC   11489373 . PMID   39430444.
  27. Kanter, Maggie; Robbins, Stephanie (October 2012). "The Impact of Parents "Friending" Their Young Adult Child on Facebook on Perceptions of Parental Privacy Invasions and Parent–Child Relationship Quality". Journal of Communication. 62 (5): 900–917. doi:10.1111/j.1460-2466.2012.01669.x.
  28. Stutzman, Fred; Kramer-Duffield, Jacob (2010). Friends only: examining a privacy-enhancing behavior in facebook. CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, New York, USA: ACM Press. doi:10.1145/1753326.1753559.
  29. Bruss, Olivia E.; Hill, Jennifer M. (2010). "Tell Me More: Online Versus Face-to-Face Communication and Self-Disclosure". Psi Chi Journal of Psychological Research. Psi Chi, the International Honor Society in Psychology: 3–7. doi:10.24839/1089-4136.jn15.1.3. ISSN   1089-4136. S2CID   62793536.
  30. Millham, Mary Helen; Atkin, David (2018-01-01). "Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors". New Media & Society. 20 (1): 50–67. doi: 10.1177/1461444816654465 . ISSN   1461-4448. S2CID   4942207.
  31. Duffy, Brooke Erin; Chan, Ngai Keung (2019-01-01). ""You never really know who's looking": Imagined surveillance across social media platforms". New Media & Society. 21 (1): 119–138. doi: 10.1177/1461444818791318 . ISSN   1461-4448. S2CID   58008319.
  32. Walrave, Michel; Verswijvel, Karen; Ouvrein, Gaëlle; Staes, Luna; Hallam, Lara; Hardies, Kris (2022-03-31). "The Limits of Sharenting: Exploring Parents' and Adolescents' Sharenting Boundaries Through the Lens of Communication Privacy Management Theory". Frontiers in Education. 7. doi: 10.3389/feduc.2022.803393 . ISSN   2504-284X.
  33. "The Top 10 Social Media Sites & Platforms 2022". Search Engine Journal. May 30, 2022. Retrieved 2022-11-09.
  34. Al-laymoun, O’la Hmoud; Aljaafreh, Ali (2020). "Examining Users' Willingness to Post Sensitive Personal Data on Social Media". International Journal of Advanced Computer Science and Applications. 11 (12). doi: 10.14569/IJACSA.2020.0111255 .
  35. Child, Jeffrey T.; Duck, Angela R.; Andrews, Laura A.; Butauski, Maria; Petronio, Sandra (2015). "Young Adults' Management of Privacy on Facebook with Multiple Generations of Family Members". Journal of Family Communication. 15 (4): 349. doi:10.1080/15267431.2015.1076425. ISSN   1526-7431. S2CID   143103850.
  36. Lee, Yu-Hao; Yuan, Chien Wen (April 2020). "The Privacy Calculus of "Friending" Across Multiple Social Media Platforms". Social Media + Society. 6 (2). doi: 10.1177/2056305120928478 . ISSN   2056-3051.
  37. Chennamaneni, Anitha; Taneja, Aakash. "Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook".
  38. Frampton, Bethany D.; Child, Jeffrey T. (2013-11-01). "Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory". Computers in Human Behavior. 29 (6): 2257–2264. doi:10.1016/j.chb.2013.05.006. ISSN   0747-5632. S2CID   45621398.
  39. Hollenbaugh, Erin E. (April 2019). "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat". Social Media + Society. 5 (3): 205630511985514. doi: 10.1177/2056305119855144 . ISSN   2056-3051. S2CID   199173025.
  40. Choi, SoeYoon (2021-04-26). "Criteria and rules for privacy management prior to self-disclosures on social network sites (SNSs)". Cyberpsychology: Journal of Psychosocial Research on Cyberspace. 15 (2). doi: 10.5817/CP2021-2-2 . ISSN   1802-7962.
  41. Waters, Susan; Ackerman, James (October 2011). "Exploring Privacy Management on Facebook: Motivations and Perceived Consequences of Voluntary Disclosure". Journal of Computer-Mediated Communication. 17 (1): 101–115. doi: 10.1111/j.1083-6101.2011.01559.x . ISSN   1083-6101.
  42. Child, Jeffrey T.; Pearson, Judy C.; Petronio, Sandra (2009). "Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure". Journal of the American Society for Information Science and Technology. 60 (10): 2079–2094. doi:10.1002/asi.21122. ISSN   1532-2890. S2CID   5376628.
  43. Child, Jeffrey T.; Agyeman-Budu, Esther A. (2010-09-01). "Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency". Computers in Human Behavior. Advancing Educational Research on Computer-supported Collaborative Learning (CSCL) through the use of gStudy CSCL Tools. 26 (5): 957–963. doi:10.1016/j.chb.2010.02.009. ISSN   0747-5632.
  44. Coffelt, T. A.; Strayhorn J.; Tillson, L. D. (2014). "Perceptions of Teachers' Disclosures on Facebook and their Impact on Credibility" (PDF). Kentucky Journal of Communication.
  45. Jin, Seung-A Annie (2013-02-07). "Peeling back the multiple layers of Twitter's private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter". New Media & Society. 15 (6). SAGE Publications: 813–833. doi:10.1177/1461444812471814. ISSN   1461-4448. S2CID   28460410.
  46. Yang, K. C. C.; Pulido, A.; Kang, Y. (2016). "Exploring the Relationship between Privacy Concerns and Social Media Use among College Students: A Communication Privacy Management Perspective" (PDF). Intercultural Communication Studies. XXV (2): 46–62.
  47. Derlega, V; Winstead, B.A.; Greene, K.; Serovich, J.; Elwood, W.N. (2004). "Reasons for HIV disclsoure/nondisclosure in close relationships: Testing a model of HIV-disclosure decision making". Journal of Social and Clinical Psychology. 23 (6): 747–767. doi:10.1521/jscp.23.6.747.54804.
  48. Derlega, V; Winstead, B.A.; Folk-Barron, L. (2000). "Reasons for and against disclosing HI-seropositive test results to an intimate partner: A functional approach". In Petronio, Sandra (ed.). Balancing the Secrets of Private Disclosure. New Jersey: Lawrence Erlbaum Associates, Inc.
  49. Rauscher, E.; Fine, M.A. (2012). "The role of privacy in families created through using assisted reproductive technology: Examining existing literature using communication privacy management theory" (PDF). Journal of Family Theory & Review. 4 (3). doi:10.1111/j.1756-2589.2012.00132.x.
  50. Romo, Lynsey K (2016). "How Formerly Overweight and Obese Individuals Negotiate Disclosure of Their Weight Loss". Health Communication. 31 (9): 1145–1154. doi:10.1080/10410236.2015.1045790. PMID   26881478. S2CID   4627605.
  51. Hong, Soo Jung; Drake, Bettina; Goodman, Melody; Kaphingst, Kimberly A. (2020-08-23). "Race, Trust in Doctors, Privacy Concerns, and Consent Preferences for Biobanks". Health Communication. 35 (10): 1219–1228. doi:10.1080/10410236.2019.1623644. ISSN   1041-0236. PMC   6893100 . PMID   31167570.
  52. Beck, Christina S. (2015). Celebrity health narratives and the public health. Jefferson, N.C. ISBN   978-1-4766-1907-1. OCLC   914711198.{{cite book}}: CS1 maint: location missing publisher (link)
  53. Campbell-Salome, Gemme (2019-07-29). "'Yes they have the right to know, but...': Young Adult Women Managing Private Health Information as Dependents". Health Communication. 34 (9): 1010–1020. doi:10.1080/10410236.2018.1452092. ISSN   1041-0236. PMID   29565677. S2CID   4260003.
  54. McBride, Chad; Bergen, Karla (2008). "Communication Research: Becoming a Reluctant Confidant: Communication Privacy Management in Close Friendships". Texas Speech Communication Journal. 33 (1): 50–61.
  55. Wagner, Anna; Reifegerste, Doreen (2024-04-22). "Gender-Specific Non-Disclosure of Mental Distress: A Cross-Sectional Survey on Reasons and Associated Factors". European Journal of Health Communication. 5 (2): 60–80. doi: 10.47368/ejhc.2024.204 . ISSN   2673-5903.
  56. Yao, Xinlin; Zhao, Yuxiang Chris; Song, Shijie; Wang, Xiaolun (2022-01-01). "Beyond disclosure: the role of self-identity and context collapse in privacy management on identified social media for LGBTQ+ people". Journal of Documentation. 79 (3): 718–742. doi:10.1108/JD-04-2022-0080. ISSN   0022-0418.
  57. Hall, Robert (March 2020). "Between Friends, an 'Implicit Trust': Exploring the (Non)Disclosure of Private Mental Health-Related Information in Friendships". Ohio Communication Journal. 58: 26–39.
  58. Ngcongo, Mthobeli (2016). "Mobile communication privacy management in romantic relationships: A dialectical approach". Communicatio. 42: 56–74. doi:10.1080/02500167.2016.1140666. S2CID   147394173.
  59. Bello, Richard S.; Brandau-Brown, Frances E.; Ragsdale, J. Donald (2014-07-28). "A Profile of Those Likely to Reveal Friends' Confidential Secrets". Communication Studies. 65 (4). Informa UK Limited: 389–406. doi:10.1080/10510974.2013.837082. ISSN   1051-0974. S2CID   145054448.
  60. Steuber, Keli Ryan; McLaren, Rachel M. (2015-05-27). "Privacy Recalibration in Personal Relationships: Rule Usage Before and After an Incident of Privacy Turbulence". Communication Quarterly. 63 (3). Informa UK Limited: 345–364. doi:10.1080/01463373.2015.1039717. ISSN   0146-3373. S2CID   147096452.
  61. Cao, Gaohui; Wang, Ping (2022-01-01). "Revealing or concealing: privacy information disclosure in intelligent voice assistant usage- a configurational approach". Industrial Management & Data Systems. 122 (5): 1215–1245. doi:10.1108/IMDS-08-2021-0485. ISSN   0263-5577.
  62. Liu, Tingting; Li, Wenqian; Jia, Xingping (2022-01-01). "Consumer data vulnerability, peer privacy concerns and continued usage intention of sharing accommodation platforms: the moderating roles of perceived benefits". Information Technology & People. 36 (6): 2234–2258. doi:10.1108/ITP-05-2021-0365. ISSN   0959-3845.
  63. Vitak, Jessica; Kumar, Priya; Liao, Yuting; Zimmer, Michael (2023-07-14). "Boundary Regulation Processes and Privacy Concerns With (Non-)Use of Voice-Based Assistants". Human-Machine Communication. 6 (1): 183–201. doi: 10.30658/hmc.6.10 . ISSN   2638-6038.
  64. Neubaum, German; Metzger, Miriam; Krämer, Nicole; Kyewski, Elias (July 2023). "How Subjective Norms Relate to Personal Privacy Regulation in Social Media: A Cross-National Approach". Social Media + Society. 9 (3). doi:10.1177/20563051231182365. ISSN   2056-3051.
  65. Miller, Seumas; Weckert, John (December 2000). "Privacy, the Workplace and the Internet". Journal of Business Ethics. 28 (3): 255–265. doi:10.1023/a:1006232417265. S2CID   35296871.
  66. Miller, K.W.; Voas, J.; Hurlburt, G.F. (Sep–Oct 2012). "BYOD: Security and Privacy Considerations". IT Professional. 14 (5): 53–55. doi:10.1109/mitp.2012.93. S2CID   10885845.
  67. Hackney, Michael; Kleiner, Brian (1994). "Conducting an Effective Selection Interview". Work Study. 43 (7): 8–13. doi:10.1108/eum0000000004009.
  68. Gruzd, Anatoliy; Jacobson, Jenna; Dubois, Elizabeth (April 2020). "Cybervetting and the Public Life of Social Media Data". Social Media + Society. 6 (2). doi:10.1177/2056305120915618. ISSN   2056-3051.
  69. Powell, Martine; Wright, Rebecca; Clark, Susan (2010). "Improving the Competency of Police Officers in Conducting Investigative Interviews with Children". Police Practice & Research. 11 (3): 211–226. doi:10.1080/15614260902830070. S2CID   144409401.
  70. Hayes, Michelle; Filo, Kevin; Riot, Caroline; Geurin, Andrea N. (2021-12-03). "Using Communication Boundaries to Minimize Athlete Social Media Distractions During Events". Event Management. 25 (6): 683–704. doi:10.3727/152599521X16106577965215.
  71. 1 2 Nathaniel, Simmons (2012-01-01). "Tales of Gaijin: Health Privacy Perspectives of Foreign English Teachers in Japan". Kaleidoscope: A Graduate Journal of Qualitative Communication Research. 11 (1).
  72. Simmons, Nathaniel (2016-08-24). "Cultural discourses of privacy: Interrogating globalized workplace relationships in Japan". Journal of International and Intercultural Communication. 10: 44–61. doi:10.1080/17513057.2016.1142601. ISSN   1751-3057. S2CID   151394183.
  73. Nathaniel, Simmons (2014-01-01). Negotiating Boundaries in a Globalized World: Communication Privacy Management between Foreign English Teachers and Japanese Co-workers in Japan (PhD in Communication Studies thesis). Archived from the original on 2016-11-17. Retrieved 2016-11-16.
  74. Wente-Hahn, D. (2020). Communication privacy management in mixed orientation marriages ProQuest   2402933629
  75. Pecoraro, Dominic (2020-08-07). "Bridging Privacy, Face, and Heteronormativity: Stories of Coming Out". Communication Studies. 71 (4): 669–684. doi:10.1080/10510974.2020.1776744. ISSN   1051-0974. S2CID   221324726.
  76. Charoensap-Kelly, Piyawan; Mestayer, Colleen L.; Knight, G. Brandon (2020-05-01). "To Come Out or Not to Come Out: Minority Religious Identity Self-Disclosure in the United States Workplace" . Management Communication Quarterly. 34 (2): 213–250. doi:10.1177/0893318919890072. ISSN   0893-3189. S2CID   214268771.
  77. West, Richard L. (17 September 2013). Turner, Lynn H. (ed.). Introducing communication theory: analysis and application (Fifth ed.). New York, NY: McGraw-Hill Education. ISBN   9780073534282. OCLC   844725577.
  78. Petronio, S.; Martin, J.N. (1986). "Ramifications of revealing private information: A gender gap". Journal of Clinical Psychology. 42 (3): 499–506. doi:10.1002/1097-4679(198605)42:3<499::aid-jclp2270420317>3.0.co;2-i.
  79. Petronio, S. Martin; Littlefield, R. (1984). "Prerequisite conditions for self-disclosing: A gender issue". Communication Monographs. 51 (3): 268–273. doi:10.1080/03637758409390200.

Further reading