Beruflich Dokumente
Kultur Dokumente
CPM is a practical theory designed to explain the “everyday” issues of a person. It argues
that disclosure is the process that people use to manage the relationship between concealing
and revealing private information. This explains how individuals believe they own their private
information and have the rights to control it. In CPM, the metaphor of privacy boundary is used
to illustrate where private information is located and how the boundary expands to give way to
multiple owners of a private information. An individual can disclose not only their own
information but also information that belongs to other people. A unique feature of this theory is
that rather than being law-based, it is a rule-based theory instead.
The basis of CPM Theory started over 20 years ago. The initial theory had limited
boundaries where it was focused only to privacy management within a marital dyad. It was
referred by Petronio as a microtheory, a theory with limited boundaries. Later, the theory has its
change in name. In 1991, Petronio called the theory “Communication Boundary Management”.
When she published the fuller statement of the theory in her book in 2002, she renamed it
“Communication Privacy Management Theory”. The name change emphasizes that the main
idea of the theory is on private disclosures. Now, she refers to CPM Theory as a macrotheory (a
theory with extensive boundaries) because its boundaries have a wide variation of interpersonal
relationships, unlike the initial theory.
Assumptions of CPM
CPM Theory is rooted in assumptions about how individuals believe that they own their
private information and assumptions about the nature of human beings regarding on how they
think and communicate. The theory makes five assumptions about human nature:
Suppositions of CPM
To fully accomplish this goal, Communication Privacy Management Theory proposes five
suppositions: private information, private boundaries, control and ownership, rule-based
management system, and management dialectics.
Private Information
The first supposition is private information. This supposition is about information that
matter deeply to an individual. It is the message which a person either keeps to themselves or
disclose it to other people.
Private boundaries
The third supposition relates to control and ownership. This supposition relies to the
idea that an individual feel they own a private information to themselves. As owners of this
information, they believe that they are in a position where they should control who else would
be allowed to gain access to it.
The fourth supposition is called rule-based management system. This system is used
for understanding the decisions an individual make about private information. With this
supposition, an individual can manage their decisions through these three processes of rule-
based management system: privacy rule characteristics, boundary coordination, and
boundary turbulence. Since there are a lot of sub-processes that are involved in each of these
three, we will discuss them in a separate section.
Management dialects
The last supposition of CPM Theory is management dialectics where it focuses between
present tensions for revealing private information and concealing it. This supposition focuses on
the tensions of boundaries that people encounter due to opposites and contradictions. An
example of this is when a student is drawn with
This process describes the nature of privacy rules. It has two main features: attribute and
development Rule attributes refers to how an individual obtain privacy rules and understand the
properties of those rules. An example of this is a person’s disclosure in family gatherings versus
on an office’s event at work. With the CPM Theory, it depicts that an individual will set up rules
that are fitted on both events for managing privacy that are learned over time.
. Rule development describes how rules come to be decided. In CPM Theory, it states that
five decision criteria are used to guide negotiation about sharing private information: cultural,
gendered, motivational, contextual, and risk-benefit ratio. According to Petronio (2017), this was
key in the CPM Theory because privacy rules are a foundational principle.
Cultural criteria deals with the norms for privacy and openness in a given culture. An
individual’s own expectation for privacy are guided by the values they learn in their culture.
Gendered criteria refers to the differences present between men and women upon
drawing privacy boundaries.
Motivational criteria involves how people make decisions about disclosing private
information based on their motivations. Either it is motives of control, manipulation, attraction,
and power for disclosing or concealing a private information.
In contextual criteria, it pertains to the experiences an individual faced which affects their
decision-making. In this criteria, it discusses two elements: social environment and physical
setting. The social environment includes special circumstances an individual faced which have
affected their decision to have disclosure or not to disclose.
Lastly, rules are developed based on the risk-benefit ratio criteria. This where an
individual evaluate risks that will benefit him/her if he/she decides to disclose or keep it private.
Boundary Coordination
The second process under the rule-based management system which describes how an
individual manage private information by the individual’s boundaries. This refers that boundaries
should be coordinated through rules to have a smooth transaction of communication and have a
viable outcome in relationships. When a private information is shared, co-owners should
coordinate with the original owner’s boundaries of privacy and disclosure based on boundary
permeability, boundary linkage, and boundary ownership.
Boundary linkage is the connections that are built by an individual’s disclosure through a
boundary. An example of this is the relationship between a doctor and a patient. The doctor form
linkages with their patient in such way to give out private information simultaneously within their
boundaries.
Lastly, boundary ownership refers to the rights and responsibilities an individual has over
to control the spread of their private information to other people. For boundary ownership to
work, rules should be clearly given. An example of this is conducting a surprise party. All those
involved in planning should agree on how the information regarding the party would be spread
so that the surprise would not be ruined.
Boundary Turbulence
This exists when the rules of boundary coordination of an individual are unclear or when
their boundaries are not coordinated. It refers to the conflicts about boundary expectations and
regulation where an individual expects an appropriate response when they share a private
information but gets violated or rejected instead.
References
Kennedy-Lightsey, Carrie & Martin, Matthew & Thompson, Michelle & Leezer Himes, Kimberly
& Zackery Clingerman, Brooke. (2012). Communication Privacy Management Theory:
Exploring Coordination and Ownership Between Friends. Communication Quarterly. 60.
10.1080/01463373.2012.725004.
Hosek, A. M., & Thompson, (2009). Communication privacy management and college
instruction: Exploring the rules and boundaries that frame instructor private disclosure.
Communication Education, 58 (3), p. 327-349
Petronio, S. & Durham, W. (2008). Communication privacy management theory: significance for
interpersonal communication. In L. A. Baxter & D. O. Braithwaite (Eds.), Engaging theories
in interpersonal communication: Multiple perspectives (pp. 309-322). Thousand Oaks, CA:
SAGE Publications, Inc. doi: 10.4135/9781483329529.n23
Petronio, S., & Venetis, M. (2017). Communication privacy management theory and health and
risk messaging. Oxford Research Encyclopedia of Communication. Retrieved 19 Aug. 2019,
from
https://oxfordre.com/communication/view/10.1093/acrefore/9780190228613.001.0001/ac
refore-9780190228613-e-513.
Turner, L., & West, R, (2010). Introducing communication theory: Analysis and application. New
York, New York: Frank Mortimer.