Please enable JavaScript.
Coggle requires JavaScript to display documents.
C12:Communication Privacy Management Theory - Coggle Diagram
C12:Communication Privacy
Management Theory
Components Of Communication Privacy Management Theory
Privacy Ownership: This component contains our personal information that only we are aware of.
Privacy Control: This component involves sharing personal information with someone else.
Privacy Turbulence: This component comes into play when the owners of the information cannot mutually agree on the disclosure of that information.
What Are The Basic Principles Of Communication Privacy Management Theory?
Individuals believe that they have a right to own and control their personal information.
People control their personal information through a set of privacy rules.
When an individual shares his or her personal information with someone else, the other person becomes a co-owner of that particular information.
Co-owners of the personal information must negotiate and come to a mutual agreement about privacy rules about telling others.
If the co-owners do not come to a mutual agreement or follow privacy rules, boundary turbulence tends to occur.
Privacy Rules
People tend to control their private information through a set of privacy rules. The boundary permeability rule defines the amount, breadth, and depth of information disclosure. In order to maintain strong control over information, people create a stronger boundary around the information as a way to protect that particular information.
Boundary Turbulence
If the co-owners do not come to a mutual agreement or follow privacy rules, boundary turbulence tends to occur.
Disclosure-Privacy Dialectic Assumptions:
The theory asserts that people feel conflicted about disclosing information. They experience a push-and-pull mechanism in the sense that they want to share but they also want to hide. It is also known as the openness-closedness dialectic.
Applications Of Communication Privacy Management Theory
EXAMPLES
It can be applied to families, particularly, family privacy management. Issues such as parental privacy invasion, childbearing, infertility, and miscarriages can be studied and explained using this theory. Researchers can study how co-owning information can enhance trust and communication in relationships.
It can be applied to communication involving health. Disclosing an illness to family or friends, talking about symptoms, and discussing stigmatized diseases can be explained and understood through this theory. Health communication around stigmatized diseases by influential individuals can also reduce stigma and increase awareness.
It can be applied to workplaces as well. Deciding how much information the company can disclose to the employees, using company mail ids and having access to company computers can be understood and studied under this theory. Additionally, revealing information in interviews and building necessary boundaries at work can also be explained through this theory.
Disclosure in relationships and friendships can also be understood through this theory. Research can focus on turbulence due to disclosure, conflict avoidance and setting boundaries using this theory.