Let's talk Theory
- What does CPM theory explain?
Communcation Privacy Management theory explains how people make choices about their private information through communication with others (Petronio, 2002, 2007, 2013).
- What do you need to know about where CPM is coming from?
CPM is a well-used theory grounded in real-world evidence. Despite how we talk about privacy sometimes, there are both benefits and risks to opening up our private information to others. Privacy management helps us balance the need to be open and receive benefits like support from others, while enjoying the autonomy that comes from keeping our private information to ourselves.
- What is privacy ownership?
People believe they own their private information. This ownership is marked by a line, a metaphorical boundary between public and private. When the metaphorical boundary is very thin and permeable, people are more likely to disclose private information. When a boundary is thick, the line between public and private is impermeable, or thick and the information is heavily guarded. When people open up a privacy boundary, allowing others access to the private information, they give authorized co-ownership of that information to others (Petronio, 2013).
- What is privacy control?
When a person tells another private information, they expect to keep total control over their private information. Therefore, when another individual gains access private information, they assume co-ownership of information, and thus, the responsibility to control the information. To manage risks of private information, people use rules to regulate the flow of private information (Petronio, 2013).
- What is privacy turbulence?
Human communication is flawed, and these communication processes do not always unfold perfectly. At times, confidants may break rules about the management of private information. When these violations occur, boundary turbulence arises. This turbulence has the potential to disrupt relationships and guide future decisions about to whom to open a privacy boundary.
- Where does CPM unfold?
CPM processes can be witnessed in contexts including computer-mediated communication, health, family, organizations, and in interpersonal and intercultural relationships. To learn more about how CPM is studied in these contexts, visit the CPM Center Practice page.
- What is recalibration?
Recalibration occurs when there is privacy turbulence. People change the privacy rules to deal with the breakdown, realigning their privacy management system.