Tuesday, March 3, 2015

Introduction to CPM



Communication Privacy Management Theory (CPM)
Sandra Petronio 
Socio-Cultural Tradition 
Cybernetic Tradition 


* Through out this Blog Entry and teaching of Communication Privacy Management Theory I am getting my information from First Look at Communication Theory the Ninth Edition. Chapter 12 pages 151-163.

  


 Communication privacy theory focus on sharing private information might strengthen your relationship like in self-disclosure where you become closer with one other. But Peronio took a different aspect on disclosure that showed it could give someone a change to comfort you and help with your course of action but it could also burden/harm a relationship.

Communication Privacy Management Theory is both cybernetic and socio-culutre which makes for both. CPM is cybernated because it is made up of moments, private information that connects things. Cybernetics is the way things are connected through networks, private information is what connects people through talking, whether that private information is kept private between two parties or told to the world it is a connection. However, CPM is also socio-cultural because private information that is told can affect the environment and the communication between people. If you get told something private there is a lot of things it could change for the good and/or the bad, changing the environment and possibly your communication styles. 

Privacy Management Theory has three main parts that makes up a privacy management system:

Privacy Ownership- Privacy boundaries that has information we know but others do not.
Privacy Control- Our decisions to share private information with someone else.
Privacy Turbulence- When managing private information does not go the way we planned.

Understanding that three main parts of privacy management theory they will help you understand the Five Core Principals of Petonion's CPM
  1. People believe they own and have the right to control their private information 
  2. People control their private information through the use of personal privacy rules
  3. When others are told or given access to a person's private information, they become co-owners of that information.
  4. Co-owners of private information need to negotiation mutually agreeable privacy rules about telling others 
  5. When co-owners of private information do not effectively negotiate and follow mutually held privacy rules, boundary turbulence us the likely result.
* Principals 1-4 are issues of privacy ownership and control 
*Principal 5 is issue of privacy turbulence 





No comments:

Post a Comment