Introduction To Communication Privacy Management Theory

Superior Essays
Lauren Jordan 3/9/15
Midterm, Question 2
Relationships take time to develop and transition from superficial to intimate. While this transition is happening, sometimes a comment can be made, or a fact can be disclosed that makes someone feel uncomfortable because they don’t know the other well enough to reach that level of disclosure. “Let me tell you a story...it involves that guy I met last night….” If you had just met this person and they dove into a story about intimacy between another person, chances are you don’t want to hear about it; too much information. However, if you were best friends with the person, you would probably want all the details. Often times, we are part of conversations that seem too personal or not personal
…show more content…
Petronio published research studies with her colleagues about the idea of rule development with systematic self-disclosure. From the publications came the development of Communication Boundary Management, a micro-theory, which was based on how people make decisions about disclosing certain information that is private. In 2002, the theory was referred to as Communication Privacy Management once it became a macro-theory and encompassed a larger variety of interpersonal relationships. Communication Privacy Management Theory explains the complexities between privacy and disclosure. It explains the process that people use to manage the relationship between concealing and revealing private information. The assumptions of the theory, based on rules and systems, are that humans are choice makers, rule makers and followers, and the rules and choices are based on a consideration of others as well as the …show more content…
Culturally, panic attacks are considered a mental disorder. I never felt like the misconceptions of mental disorder applied to me, so I didn’t want others to label me a certain way. The cultural criteria influenced me to keep the information private while I was figuring out how to control and fix it. Eventually, through contextual criteria, I had to reveal the information to my teachers since I needed to leave the room and calm down without disrupting the class. I was 15 when I had panic attacks, so I felt more comfortable sharing the information with other girls. It was at a time when we were all experiencing our bodies changing, and before we were old enough to develop stronger relationship bonds with boys, so revealing private information between girls was normal for our gender. The exception was when my student teacher in AP History was notified of my condition prior to teaching the class. He revealed privately to me that he also had suffered from panic attacks and we formed an instant bond through privacy boundaries. He may have initially felt boundary turbulence because the relational bond we formed was not an ordinary bond between a teacher and a student. However, he trusted me with his disclosure in his effort to help comfort me, and to help me overcome what was happening. Our private information became co-owned, and

Related Documents

  • Improved Essays

    Caftori and Steve (2002) conducted research on issue of privacy in the Information age. The study conducted by Lee on Trust and Privacy online revealed that people are concerned about privacy, but they are ready to share their information when they have some benefits.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    To some people, sexuality is a delicate topic that provokes feelings of vulnerability. This secret took a toll on both Tammy and Lisa. For Lisa, it caused her to completely shut out her best friend, leaving them both wounded. Lisa never objected to her feelings for Tammy, rather she objected the repercussions that awaited if the two had ever opened up about each other to the public. Lisa turned to Paul to relieve the pressure she felt.…

    • 1278 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Everyone has secrets, things we want to keep hidden from people we know and even people we don’t know. But sometimes these secrets can affect us from growing in relationships and can ultimately mess us up for the rest of our lives. The truth within us has a way of coming out despite all conscious efforts to conceal…

    • 1297 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    2005). Growing up I found it difficult to connect with people on an emotional level. Additionally, I would only share information up to a certain degree until I put up a wall and shut people out. For example, growing up I was embarrassed about my living circumstances. I immediately assumed others would judge me if they saw how I was living.…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Pillow Talk Analysis

    • 768 Words
    • 4 Pages

    Being a freshman this year, making friends was a daunting task. I knew the only way to make genuine and deep connection was through disclosure; recalling past experiences, describing my childhood and upbringing, etc. As eager as I was to make those friendships, I’ve later realized that they only come with time. Revealing too information, too soon, can not only be invasive but you become much more vulnerable.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Should We Ditch The Idea of Privacy by Don Tapscott is all about privacy and network. Now days we can see the use of different kind of social media such as Facebook, Twitter, Snapchat and Instagram. People share their intimate, personal information through these social medias. I think they must have to be aware about positive and negative both side of. Sharing personal information in social media.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Particular strategies may be used to manage these constraints. These are selection strategy, cyclic alteration, segmentation, and integration. Communication Privacy Management Theory Communication Privacy Management Theory was developed in the year 1975 by a psychologist named Irwin Altman. As the name of the theory suggests, it entails why some people prefer privacy other than having social interactions with others.…

    • 1279 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Multiple Panic Attacks

    • 192 Words
    • 1 Pages

    People who have full-blown, repeated panic attacks can become very disabled by their condition and should seek treatment. Not having treatment can lead to people who have panic disorder to avoid places or situations where panic attacks have occurred. For example, if a panic attack happened on a bus someone with panic disorder may develop a fear of busses.that could affect the there way of transportation. Leading to that person not being able to achieve medical attention. . Panic attacks can by caused by genetic predisposition to anxiety disorder.…

    • 192 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Anxiety disorders commonly exist among all of us in our everyday lives. It can be quite useful as long as it is balanced. Too little anxiety can cause one to feel sluggish or even lifeless, while too much anxiety can disrupt homeostasis causing one to be unstable. The term Anxiety is used to describe “generalized fear or dread in the absence of a specific danger”. (Morris and Coleman 117).…

    • 697 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Assignment 3 Kirstin Cain 9000736 1. How did you recognize the emotions you felt: through physiological stimuli, nonverbal behaviours, or cognitive processes? I recognized my emotions mainly through physiological stimuli, like my heart racing and my breathing increasing when experiencing anxiety or the tension in my neck when irritated or angry. There were times when it was necessary to control my nonverbal responses as to not send mixed messages during a visit, i.e. when I was amused by a cheeky response from a teenager when his parent was attempting to discipline him. After analyzing why I felt uncomfortable or discombobulated, I used cognitive processes to discern that I was feeling vulnerable while asking for help and out of sorts after missing my morning coffee.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ap Self Psychology

    • 1379 Words
    • 6 Pages

    Self disclosure was previously seen as an unwanted element, and thought to be unnecessary in the relationship between the therapist and the client; however, this philosophy has changed because therapist were no longer seen as just a blank screen (Ornstein & Ganzer, 2005). One prominent incidence of self disclosure from Dr. Wachtel during his session with Melissa was at the end of their conversation. He stated that his concern was whether she had the freedom not remain the one who is different in the family, or as she labels, the “fun” one. While he was letting her know what he was thinking about her situation, he also avoided imposing any decisions on Melissa. This was similar to the times where he offered his thoughts about the connections he made between Melissa’s current situation and her experiences.…

    • 1379 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Personal Privacy Analysis

    • 542 Words
    • 3 Pages

    In this day of age, technology is apparent everywhere. When it comes to personal privacy, technology is used for most day to day things in life helping us with tasks otherwise difficult. Technology can be used as surveillance to keep us safe, but are drawbacks to this though. As much as we would want to think that our privacy is being protected by technology, it could instead be exploited by companies if they're willing to pay the price for the information. Two articles talking about this issue, "Private License Plate Scanners…

    • 542 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    In this essay the author Solove has contends that the issue of privacy influences more than just people concealing an off-base. He clarifies how this argument originates from a lacking meaning of what privacy is and the worth that privacy has. The disciples of the nothing-to-hide argument express that in light of the fact that the information won't be uncovered to the general population, the privacy hobby is negligible, and the security enthusiasm for…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Introduction: Attention Arousing and Orienting Material: I first became aware of anxiety when I was in high school. That’s when I realized I was different than everyone else, or at least from most. I couldn’t talk in front of the class or become friends with new people because I just couldn’t talk to anyone. The idea of people watching me was terrifying. Unfortunately, I didn’t know how serious anxiety could be when I was in high school.…

    • 839 Words
    • 4 Pages
    Improved Essays