User:Stevenfigge/Communication privacy management theory

Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information. It suggests that individuals maintain and coordinate privacy boundaries (the limits of what they are willing to share) with various communication partners depending on the perceived benefits and costs of information disclosure. Petronio believes disclosing private information will strengthen the connections with those around you, and that we can better understand the rules for disclosure in relationships through negotiating privacy boundaries.

Petronio uses a boundary metaphor to explain the privacy management process. Privacy boundaries draw divisions between private information and public information. This theory argues that when people disclose private information, they depend on a rule-based management system to control the level of accessibility. An individual's privacy boundary governs his or her self-disclosures. Once a disclosure is made, the negotiation of privacy rules between the two parties is required. A distressing sense of "boundary turbulence" can arise when clashing expectations for privacy management are identified, or when preexisting expectations are breached, intentionally or unintentionally. Having the mental image of protective boundaries is central to understanding the five core principles of Petronio's CPM:


 * 1) People believe they own and have a right to control their private information.
 * 2) People control their private information through the use of personal privacy rules.
 * 3) When others are told or given access to a person's private information, they become co-owners of that information.
 * 4) Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others.
 * 5) When co-owners of private information don't effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result. (add textbook source)

Background
Petronio's communication privacy management (CPM) theory is built on Altman's dialectical conception of privacy as a process of opening and closing a boundary to others. Altman and Taylor's social penetration theory focused on self-disclosure as the primary way to develop close relationships. However, Altman believed that openness was just one part belonging to a larger whole, one which expanded to include privacy with Leslie A. Baxter's work on Relational Dialectics Theory. When Petronio first developed this theory in 1991, it was called communication boundary management. In 2002, she renamed it to communication privacy management, underscoring "disclosure of private information" as the crux of the theory.


 * Shareholder

A confidant who is fully committed to handle private information by abiding in the original owners privacy rules.


 * Stakeholder

Someone who shares should have access to the private information based on what they have the lose if the information is disclosed.


 * Deliberate Confidant

Someone who seeks out private information.