Monday, March 9, 2015

Communication Privacy Management: An overview

This blog is focused on the theory of Communication Privacy Management (which will be commonly referred to as CPM for the rest of the blog), which was created by Sandra Petronio in 1991. This theory focuses on the importance of knowing the appropriate channels, people and times to disclose information. Petronio’s theory is seen as a management system and is contains three main fragments: privacy ownership, privacy control and privacy turbulence. Petronio describes these as,
·         Privacy Ownership is the boundaries we set up to encompass our information that we do not disclose to others. The boundaries set up by an individual can range from easily broken, information we are more likely to share with others, to impenetrable, information we keep secret to ourselves.
·         Privacy Control is the decision making process one goes through when deciding what information we disclose, when we disclose it and who we disclose it to. These decisions often reflect or affect our boundaries in Privacy Ownership.
·         Privacy Turbulence is when our control and ownership of our privacy boundaries are violated or do not go the way we had planned. This can be a friend who let’s your secret slip or an email gets sent to the wrong person, etc. The decisions you make post-turbulence are also a factor in reducing turbulence in general.
There are five principles of CPM; the first four handle privacy ownership and privacy control, the fifth works with privacy turbulence: “1. People believe they own and have a right to control their private information. 2. People control their private information through the use of personal privacy rules. 3. When others are told or given access to a person’s private information, they become co-owners of that information. 4. Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others. 5. When co-owners of private information don’t effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result” (Griffin, Ledbetter, & Sparks, 2015, p. 150).
There are a few terms that will come up in the following blog posts, these include: private information which is the information that can be potentially disclosed or owned, privacy which is the feeling of ownership that individuals have over their private information, rule-based theory is the “…theory that assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives” (Griffin et al., 2015, p. 153). This theory has to do with the second principle “People control their private information through the use of personal privacy rules” (Griffin et al., 2015, p. 151), and it can differ between gender, culture, motivation, context and the risk/benefit ration of the situation. A collective privacy boundary is the intersection of privacy boundaries of co-owners of private information. A mutual privacy boundary is the synchronization of the collective privacy boundaries negotiated by the group. There are two types of confidant; a reluctant one and a deliberate one. In terms of turbulence, an important term to know is confidentiality dilemma, which is when a confidant must choose between keeping a collective secret, and breaching the privacy boundary for the good of the original owner’s wellbeing. (Griffin et al., 2015, Chapter 12)

 The remainder of this blog will use videos, real-world examples and studies done in the realm of CPM to further investigate and describe the many facets of Petronio’s theory. 

Communication Privacy Management Theory Studies

Many studies have been done on the subject of CPM, subjects ranging from online privacy to familial privacy, and so on. The first peer reviewed article I researched was on CPM in social media, and the motivations behind and consequences of voluntary disclosure on the internet. The study was done by Susan Waters and James Ackerman in 2011. The study took 59 completed voluntary and anonymous surveys from active Facebook users over the age of 18 (meaning they had signed on in the past 30 days). 61% of the responders were female and 39% were male, all participants were undergraduates and the average age of subjects was 19-20. The study found that there are four main motivations for users to disclose private information on Facebook: sharing information on Facebook can be seen as fun, it can be a form of entertainment, to keep up with trends, or to publicize events and/or their popularity. The first perceived consequence of information disclosure on Facebook found from the study was a positive one: it makes the user feel they are managing their relationships more efficiently and care for the psychological wellbeing better. The second perceived consequence of information disclosure on Facebook was negative: the subjects of the study often find themselves spending too much time on the site. This study also found that Facebook has changed who we consider a “friend” or a confidant drastically (Waters & Ackerman, 2011). As time goes on private information disclosure is changing rapidly with the increased dependency on social media as a tool of confidant mediation. It lends the ability to confide private information rapidly to as many people as one would like, creating a vast net of co-ownership and mutual boundaries.
The second journal I researched was titled “Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory” written by Bethany D. Frampton and Jeffrey T. Child in 2013, regarding Facebook in terms of the workplace, rather than in general. 312 working professional, Facebook users completed online surveys. The study showed that most people will accept co-worker invitations on Facebook, but it varied based on current Facebook disclosure practices by the owner, workspace privacy boundaries. Only 25% of users change their privacy settings after accepting a friend request from a co-worker. The study found that the atmosphere of the workplace, the real-world relationship between co-workers, and the owner’s disclosure techniques on Facebook prior to co-worker online friendships, all affect the likelihood of one accepting a co-workers friend request (Frampton & Child, 2013, p. 2261). Many theories dive into the topic of work relationships, and some even work with computer/social media relations in a work setting, but CPM talks about what boundaries co-workers set up for themselves online and in real life in terms of personal information disclosure.
         The third study used CPM as a theoretical framework in an article titled “‘To disclose or not to disclose, that is the question’’: A structural equation modeling approach to communication privacy management in e-health” by Seung-A. Annie Jin. She recruited 134 undergraduate students, and had them access an e-health website while filling out a survey. It found that in terms of e-health communication, showed that majority of users are truthful in their private health information disclosure. The study also found that users are focused on prevention of future health problems, and this was the main motivation behind truthful health disclosure online (Jin, 2012, p. 75). This study shows that disclosure motivations behind an owner’s confidant are often truthful when it comes to one’s future and health. It also is another example of a confidant not necessarily being a human, but a system or internet database instead.
            The fourth study took interviews from 136 children aged 8-17 in a Southwest summer camp, inquiring about the communication methods their parents adopted in regards to financial topics. The article is titled “Money Matters: Children's Perceptions of Parent-Child Financial Disclosure” . The interviews showed that 93% of children reported their parents openly discussing saving, spending and earning with their children. The study also found that there was a significant amount of difference in parent’s disclosure of investment information between boys and girls, with boys getting more information than girls on this topic. More girls than boys reported their parents concealing information about finances. Most children reported that their parents disclosed financial information with them to teach them good money management skills. The least amount of motivation for parent to child financial disclosure was rooted from children’s curiosity for the information (Romo & Vangelisti, 2014). This shows that disclosure to a confidant that is one’s child is much different than to a peer or friend. This shows the theory’s variability, and difficulty to generalize the ability to quantify the theory in general. It has to be done in specific relationships and specific contexts, as each disclosure partnership/ownership is different.
The final study, “Privacy Orientations as a Function of Family Communication Patterns”, was on 382 young adults in the Southwest, who performed an online questionnaire about demographic topics and the measures given in the study. The measures were conformity orientation (meaning they parents expect them to obey without question/they do not solicit permission from their parents) and conversation orientation (whether or not they disclose their private information to their parents). Then they were asked questions about privacy orientation, including seclusion, intimacy, and time needed alone, etc. The study found that, after they accounted for sex a variable, family conformity and conversation orientation affects a child’s privacy orientation and how they choose to spend their time and disclose their private information (Bridge & Schrodt, 2013). This shows that how one is brought up in terms of conformity expectations and disclosure of information to parents as a child, can affect one’s decision to disclose private information and who you disclose to as an adult, which changes boundaries of a person’s individual communication privacy management. 

Paradigmatic Continuum of Communication Theory

On the paradigmatic continuum of communication theory, Communication Privacy Management Theory falls under the socio-cultural tradition or the cybernetic tradition depending on how a study is conducted, or the situation is evaluated. This means that CPM can fall under an objective or interpretive study.

A cybernetic tradition is one in which a system of information and a network of communication are analyzed. This can include the workplace; families, etc. so it is highly applicable to some studies of CPM, like the “Privacy Orientations as a Function of Family Communication Patterns” study, studies on Facebook use in the office, etc. A socio-cultural study can include any study where communication in terms of language effect on culture and vice versa is analyzed, as well as when cultural norms are analyzed. The study on family also is a sociocultural study, as well as the study on familial financial matters, and e-health disclosure. 

Real World Problems with CPM

There are many real-world problems involving this theory. One is who you choose to disclose private information to; choosing a confidant can be tricky depending on the content of the private information that can be potentially disclosed and there’s a chance the confidant is reluctant to hear the information.
Also, the issue of breaking of mutual privacy boundaries being broken after one discloses information with another is always possible. When people do not set up specific privacy boundaries between one another, discrepancies in the private information can occur, and these can have consequences: broken friendships, personal secrets or information being made public, etc. The turbulence after a breach in privacy can differ in severity, but there are many real-world applications of turbulence as well. If one co-owner of private information discloses it against the boundaries set, the other co-owner(s) can respond in non-constructive ways, but that is their right. Here’s an example of boundary breaking and turbulence: 

Advice For CPM Use

While there are many real-world problems that can arise due to breaking the Communication Privacy Management theory boundaries, but there are also ways to prevent these problems from arising. First and foremost: set up clear boundaries with co-owners on private information to avoid turbulence:
·         Setting up exactly who cannot know information, and ways to avoid disclosing information, (in layman terms: spilling the beans) will be beneficial to everyone involved.
·         Another way is to be careful of who you deliberately disclose information to, and make sure they would like to be a deliberate confidant. The more understanding both owners of the information are, the more likely the private information will stay private, and the relationship will stay maintained.
·         As a confidant, being sure that you can handle the keeping a secret is important. If you know you aren’t equipped to follow the privacy boundaries, then if you can, try to assess by the tone, atmosphere, etc. and the person disclosing, and decide if it’s a good idea to be a deliberate confidant (if you can).
·         As a confidant, it’s also important to know when it’s necessary to break privacy boundaries. If the other co-owner is in danger, or someone else is in danger, if you don’t disclose the information, tell a trusted family member, friend, authority, etc. 

Conclusion

Overall, while the tradition when used in studies can have ambiguous meanings and traditions, Communication Privacy Management theory can have very beneficial implications. Using the theory, or understanding the theory, can benefit everyone. Everyone discloses information whether it’s with friends, family, co-workers or on the internet, and everyone at some point is a confidant, whether deliberate or reluctant, to information, whether negative or positive. Using CPM can aid in the right action when making mutual and personal privacy boundaries, and in turn aid in more efficient communication and healthier relationships. 

References