Chapter 13- Communication Privacy Management

Privacy boundaries
a metaphor to show how people think of borders between private and public information
Private Information
The content of potential disclosures; information that can be owned.
The feeling that one has the right to own private information.
Rule-based theory
a theory that assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives
Collective privacy boundary
An intersection of personal privacy boundaries of co-owners of private information, all of whom are responsible for the information
mutual Privacy boundary
A synchronized collective privacy boundary that co-owners share because they have negotiated common privacy rules
boundary ownership
the rights and responsibilities that co-owners of private information have to control its spread
A confidant fully committed to handling private information according to the original owner’s privacy rules.
Deliberate confidant
a recipient who sought out private information
Reluctant confidant
A co-owner of private information who did not seek it nor want it
Boundary linkage
An alliance formed by co-owners of private information as to who else should be able to know.
boundary permeability
The extent to which a boundary permits private information to flow to third parties.
boundary turbulence
disruption of privacy management and relational trust that occurs when collective privacy boundaries aren’t synchronized
confidentiality dilemma
the tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare
Who is the key theorist of Communication Privacy Management Theory
Sandra Petronio
What tradition is Communication Privacy Management Theory in?
Socio-cultural and cybernetic traditions

Get access to
knowledge base

MOney Back
No Hidden
Knowledge base
Become a Member