Lecture Notes on Communication Privacy Management (CPM) Theory
Summary:
Professor Sandra Petronio, from Indiana University-Purdue University at Indianapolis and the author of communication privacy management theory (CPM), discussed the essence and intricacies of her theory in an interview with Glenn Sparks. CPM emphasizes how individuals perceive private information as their own property, which they control and can share, making recipients co-owners of the information. The theory explores the dynamics of how privacy is managed and what happens when these management strategies fail, introducing the concept of "turbulence" in privacy management.
Key Points from the Lecture:
Core Principles of CPM:
- Ownership of Information: Individuals believe they own and control their private information.
- Sharing and Co-ownership: Sharing information turns the recipients into co-owners, who are then expected to manage it according to mutually agreed-upon privacy rules.
- Privacy Boundaries: These can vary in permeability and thickness depending on with whom individuals want to share their information.
Managing Privacy:
- Individuals must negotiate rules for handling private information; either before or after the disclosure. Establishing these rules enhances the management of privacy.
- Once information is shared, the recipient becomes a co-owner but doesn't gain full control over the information. The original owner retains substantial rights over how the information is managed.
Concept of Turbulence:
- Definition: Turbulence refers to disturbances in the management of private information caused when co-owners do not adhere to the agreed privacy rules.
- Effects of Turbulence: Causes disruptions in the expected management of information, which might require recalibration to manage the privacy settings effectively.
- Disruption vs. Breakdown: Disruptions are manageable and often fixable deviations in expected privacy management, such as needing to "scrub" a blog post. Breakdowns are more severe, like reading someoneâs diary without permission, and can significantly damage trust and relationships.
Trust and Relationship Dynamics:
- Trust is built by accumulating "credit points," which are depleted when privacy is invaded. Rebuilding trust is usually challenging and takes a longer time than establishing it initially.
Areas for Further Research:
- Emotional Impact: Emotions play a crucial role in how people manage and react to privacy breaches. More research is necessary to understand the emotional dynamics and their impact on privacy management decisions.
This lecture offers a comprehensive understanding of how personal information is perceived, shared, and managed within interpersonal relationships, focusing on the consequences when these management practices fail.