User:LaRabiosa/CPMsandbox

This is my sandbox for Communication Privacy Management Theory. --LaRabiosa (talk) 00:50, 11 October 2011 (UTC)

Communication Privacy Management Theory is a communication theory first developed by Sandra Petronio in 1991 describing the ways in which relational actors manage their privacy boundaries and the disclosure of private information. The theory focuses heavily on the processes that people employ to determine when and how they choose to conceal or reveal private information. Through this theory Petronio describes the ever-present dialectic of privacy and openness within various relationship models, and explains how relationships develop as public and private boundaries are negotiated and coordinated.

Dialectic of Privacy versus Disclosure
Petronio's understanding and argument of privacy management rests on the idea that a dialectic exists wherever the decision is made to disclose or conceal private information. Thus, costs and benefits must be weighed and consideration must be given to how such information will be owned, used, and spread. The definition of dialectic that Petronio borrows from can be found in Leslie Baxter and Barbara Montgomery's theory of Relational Dialectics, wherein various approaches to the contradictory impulses of relational life are discussed. The theory focuses on the idea that there are not only two contradictory stances within a relationship, but that at any given moment decisions are weighed using multiple viewpoints. . Ergo, Petronio's system for managing privacy through communication is based on a system of rules that include and weigh the assumptions of a complex approach to dealing with the supervision of private information.

Nature of Information Sharing
To understand CPM theory it is important to follow the metaphor of the boundary that exists, dividing that which can be found in the private sphere from that which is available in the public sphere. An individual’s private information is protected by the individual’s boundaries. The permeability of these boundaries are ever changing, and allow certain parts of the public, access to certain pieces of information belonging to the individual. The extent to which boundaries are permeable, characterized as thick or thin boundaries, "varies depending on the rules for access and protection ," explains Petronio. CPM theory considers those rules for access and protection of information by examining the following about information sharing: the types of ownership of information, the circumstances under which sharing occurs, and the expectations of sharing.

Communication Privacy Management theory understands information (as well as boundaries) as something that is owned, and each owner must decide whether or not they are willing to have a confidant, a.k.a. a co-owner, to that information. With ownership comes the certainty of knowing the extent to which certain information is known, the control to do what is desired with that knowledge, but oftentimes also the added stress of carrying a weight alone. In some cases it is preferable for the owner to have another person share the private information, though this may not be the case for the confidant. Co-ownership of information is characterized by heavy responsibility and a knowledge of the rules for a particular disclosure. Ownership can be felt to different degrees, however, and the understanding of disclosure rules can be different from owner to owner. Also, the act of sharing is coupled along with the realization that boundaries have expanded and that they may never return to their original state. It is the responsibility of co-owners to decide and make clear if, when, and how information can or should be shared with others.

Petronio favored the term "private information" over the term "self disclosure" because there are many caveats inherent to private information disclosure that are not present with self disclosure. Firstly, the motivations behind sharing are many, including but not limited to sharing a burden, righting a wrong, and influencing others. Secondly, very often the private information that is shared is not about oneself but about others, thus negating the use of the term "self disclosure". Furthermore, "private information" carries a neutral implication to it, allowing such information to be considered both positive or negative, welcome or unwelcome, etc. Finally, the term focuses on the act of sharing, paying close attention to the content of the message and how this is received by others. The decision to share, Petronio says, is ultimately left up to the process of the privacy rule management system which combine rules for coordination of information, characteristics of disclosure, and attributes of the nature of boundaries.

System for Privacy Rule Management
The processes for managing privacy rules were set out by Petronio as three proposed principles that take into account the internal and external factors which shape our understanding of privacy and disclosure.

Privacy Rule Characteristics
The characteristics of privacy rules are divided into two sections, attributes and development. Privacy rule attributes refer to how people obtain rules of privacy and understand the properties of those rules. This is normally done through social interactions where the boundaries for rules are put to the test. Rules are set in different social situations which dictate the type of disclosure that should be made, for example, the difference between disclosure at a family member's birthday party versus an office event at work. Petronio asserts that each situation will come with it's own set of rules for managing privacy that are learned over time. The development of privacy rule characteristics has to do explicitly with the criteria implemented to decide if and how information will be shared. Communication privacy management theory general lists those criteria as the following: With these five criteria, personal and group privacy rules are developed, but disclosure of private information necessitates the inclusion of others within the boundary of knowledge, which demands an understanding between parties for how to coordinate ownership of knowledge.
 * Gendered criteria; privacy boundaries are sculpted differently by men and women based on socialization, which leads to difference in how rules are understood and operated in.
 * Contextual criteria; this criteria is shaped by issues of physical and social environments that factor in whether or not information will be shared.
 * Cultural criteria; disclosure within this criteria is dependent of the culture in which an owner has grown to understand expectations and attributes for sharing.
 * Motivational criteria; owners of information can form certain bonds which will lead to disclosure, or conversely the express interest in forming bonds may cause private information to be shared. Likewise, motivations for sharing can include reciprocity or self-clarification.
 * Risk-benefit criteria; owners of private information consider risks against benefits of disclosure or maintaining information private. Risks to sharing can include shame, embarrassment, and vulnerability, among others. Likewise, benefits can be a shared burden of knowledge, a feeling of social acceptance, whereas a benefit of keeping quiet is greater control of information.

Boundary Coordination
Once private information is shared, co-owners must coordinate the boundaries of privacy and disclosure based on boundary permeability, boundary linkage, and boundary ownership. Petronio describes this mutual boundary coordination by co-owners as drawing the same borders on a map around a shared piece of information. By no means is this an easy process considering that each owner will approach the information from distinct viewpoints and referencing their personal criteria for privacy rule development.
 * Boundary permeability refers to the nature of the invisible divisions that keep private information from being known outside of an individual or particular group. When private information is kept with one owner, the boundaries are said to be thick because there is less possibility for information to make its way out into the public sphere. Once information is shared to one or more persons, the boundaries for that private information expand, become more permeable, and are considered thin.
 * Boundary linkage has to do with how owners are connected when they build associations through a boundary. For example, doctors and patients are linked to each other in such a way that private information is passed within their boundaries constantly. These linkages can be strong or weak depending on how information was shared or whether a co-owner wanted to know or was prepared to learn a new piece of information. Case in point, the link between an organization and a spy meant to infiltrate the organization is weak because the two are not coordinated on how information will be maintained private or disclosed.
 * Boundary ownership refers to the responsibilities and rights each person has over the control of the spread of information that they own. When working to mutually create the boundary of privacy it is key for all parties to have a clear understanding of whether information should be shared, who it should be shared with, and when it should be shared . A simple example of this is the planning of a surprise birthday party; all those involved in planning must agree on how the information about the party will be spread so as not to ruin the surprise. As new guests are invited, they become an owner of the information and are bound to the rules of privacy maintenance, or else the surprise could be ruined.

Boundary Turbulence
Unfortunately, oftentimes boundaries are not coordinated as well as they should be to maintain the level of privacy or exposure desired by owners - this leads to problems known as boundary turbulence. Turbulence among co-owners is caused when rules are not mutually understood by co-owners and when the management of private information comes into conflict with with the expectations each owner had, which can happen for a number of reasons. As mentioned previously, the coordination of shared boundaries is key to avoiding over-sharing, when the boundaries are unclear owners may come into conflict with one another. Boundary turbulence can also be caused by mistakes, such as an uninvited party overhearing private information (causing weak boundary linkage) or a disclosure an owner might make under the influence of alcohol or drugs. Disclosure to a new party was not the intent, but when it happens other co-owners can feel that their expectations of maintaining boundaries have been violated. Finally, boundary turbulence occurs when a co-owner intentionally breaks the coordinated boundary of privacy to disclose private information. An example of such intentional disclosure would be a daughter revealing to a doctor that her father is indeed an active smoker when the father has told the doctor that he no longer smokes after his heart surgery. The daughter in this case must weigh the risks of breaking the family privacy boundary against the benefits of the doctor being better informed of her father's condition. In cases of boundary turbulence, co-owners of information can feel that their expectations have been violated and lose trust in other co-owners. In these cases, the goal of each party is to reduce turbulence by reestablishing and coordinating boundaries.

Strengths and Weaknesses
Since Communication Privacy Management Theory has been developing over time, the theorist has had the opportunity to address critiques of the theory. One critique argues that CPM is not a dialectic theory at all when compared to the theory of Relational Dialectics(1996), but rather that it is based on dualistic thinking where privacy and disclosure exist together in equilibrium. Petronio responded to these critiques in her 2002 article arguing that "Instead, [CPM] argues for coordination with others that does not advocate an optimum balance between disclosure and privacy ." Another flaw of the theory is that the basic suppositions of Communication Privacy Management theory say that humans make rules and choices that are based on others as well as the self; meaning that those persons who do not follow Petronio's model for humans would not be held to and explained by the theory. As far as the strength of the CPM, it can be seen in the great number of research articles that have been written based firmly Privacy Management theory. The theory has been employed in understanding family dynamics, the gender gap in communication, the disclosure of HIV or AIDS statuses, as well as child sexual abuse.