Knowledge (XXG)

Communication privacy management theory

Source πŸ“

542:
and other researchers used CPM to study young adults' tendencies to manage their privacy and communicate on Facebook with different generations of family members. 383 respondents participated in a survey concerning their online and offline Facebook communication with other family members. The study found that young adults share their information mainly with their siblings followed by their parents and finally their grandparents. Another case study analyzing the responses of 240 participants revealed that the communication privacy practices by individuals using Facebook strongly impact the "amount and depth" of their self-disclosure. One more study explored how colleagues in the professional context respond to friend requests from other co-workers. The study provided evidence that co-workers' connection on Facebook improves only when each party understands the rules which govern privacy management. In an exploratory study on privacy management in two social media platforms, Facebook and Snapchat, showed that Facebook users are less likely to share their private information compared to users of other social media platforms. However, another study found that Facebook subscribers are more open and willing to share their private information with distant friends rather than the close ones. These examples demonstrate how Facebook users are aware of the fact that they do not have full control over the ownership of their information and this affects their decisions on what and how to share on Facebook.
688:
management between foreign English language teachers (ELTs) and Japanese coworkers (JCWs) in Japan. The analysis revealed that ELTs: (a) expected not to be a "free space" for privacy inquisition by JCWs, and (b) expected voluntary reciprocity in (egalitarian) workplace relationships. JCWs viewed: (a) privacy inquisitions as acts of kindness/caring and (b) soliciting help from a supervisor as providing opportunities for better care. This study calls for attention to intercultural privacy management and enhances CPM's cultural criteria." Within the same context, foreign English teachers "employed the following management strategies: (a) withdrawal, (b) cognitive restructuring, (c) independent control, (d) lying, (e) omission, (f) avoidance, and (g) gaijin smashing. Japanese co-workers defined privacy as information that should be hidden and managed such information by: (a) drawing clear boundaries by not talking or changing contexts, and (b) being pre-emptive by demarcating privacy boundaries early on within a relationship."
522:. Further, there have been investigations into parental behavior that is enacted through online social media; specifically when parents 'friend' their children and the management of privacy that ensues from that. Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. One study explored privacy in social network sites as a contextual information practice, managed by a process of boundary regulation. Disclosing private information online functions differently than disclosing private information in face to face instances. The mediated nature of social media means that it can be harder to control who sees what information and how that information can be spread. Thus, it is harder to control boundaries and linkage. Trust and 666:
that less than half of the sample offered explicit rules for information management, and the majority of participants blamed the confidant for the privacy turbulence. Findings indicated that people often do not share similar information with the violator in the future, but if they do, less than half offer explicit privacy rules during the privacy recalibration process. Confrontation efficacy was positively associated with initiating a conversation about the privacy turbulence and that people who engaged in privacy recalibration were more likely to report forgiveness and relational improvement and less likely to report relational damage than those individuals who did not.
200:
the owner of the information in a vulnerable position. Therefore, rules surrounding the boundaries must be negotiated to protect the shared information. Once private information is shared, co-owners must coordinate the boundaries of privacy and disclosure based on boundary permeability, boundary linkage, and boundary ownership. Petronio describes this mutual boundary coordination by co-owners as drawing the same borders on a map around a shared piece of information. This a difficult process, considering that each owner will approach the information from distinct viewpoints and referencing their personal criteria for privacy rule development.
293:
outcome, there has been studies which show that turbulence within relationships can lead to stronger and improved relationships. Boundary violations and boundary turbulence can be used as a learning opportunity for individuals to renegotiate existing boundaries or better form new boundaries in similar situations. Boundary turbulence is experienced differently by each individual, and reactions to violations can depend on how many new boundary linkages are created and how many new people the private information reaches. These factors can determine whether boundary turbulence can cause distress to a relationship or be a learning experience.
324: 315:
with the realization that boundaries have expanded and that they may never return to their original state. It is the responsibility of co-owners to decide and make clear if, when, and how information can or should be shared with others. Sometimes, a confidentiality agreement is not evenly shared. For instance, a client at a barber shop shares their life story with the barber, the barber may not feel as much pressure to hold up their end of the disclosure agreement since they barely know each other. However, a counselor who is bound by law to not leak private information will not be a risk to breach that trust.
679:
same token, some employees argue that companies should not be able to track what is being done on their personal devices or even on company computers even if they are in the work place. Even before stepping foot into the workplace, CPM can be applied, such as in the interviewing process. How much candidates decide to reveal within an interview and the boundaries they have in that situation is directly related to CPM. Even interviewing within a job (as a cop, for example) requires a certain sensitivity to people's boundaries and how much private information they are willing to reveal.
340:
the test. Rules are set in different social situations which dictate the type of disclosure that should be made, for example, the difference between disclosure at a family member's birthday party versus an office event at work. Petronio asserts that each situation will come with its own set of rules for managing privacy that are learned over time. The development of privacy rule characteristics has to do with the criteria implemented to decide if and how information will be shared. Communication privacy management theory general lists those criteria as the following:
235:. When working to mutually create the boundary of privacy it is key for all parties to have a clear understanding of whether information should be shared, who it should be shared with, and when it should be shared. A simple example of this is the planning of a surprise birthday party; all those involved in planning must agree on how the information about the party will be spread so as not to ruin the surprise. As new guests are invited, they become an owner of the information and are bound to the rules of privacy maintenance, or else the surprise could be ruined. 650:
identity, especially at a young age. When a person is unable to disclose information to friends or loved ones, it can exacerbate issues because they do not feel supported. Thus, researchers use CPM to understand why and how private disclosures happen in friendships. Briefly, work on conflict and topic avoidance, considering the relational impact of privacy turbulence, students and faculty relationships, and workplace relationships have all produced useful information that opens new doors regarding CPM-based research.
569:
daily lives, social identity, competence, socio-economic status, and health. Private information regarding daily lives and entertainment was disclosed easily and located at the outermost layer of the disclosure onion. In contrast, health-related private information was concealed and located within the innermost layer of the disclosure onion. What's more, there were significant differences among current Twitter users, nonusers, and dropouts with regard to personality traits and privacy concerns about Twitter.
344: 122: 506:
ownership over the information. According to one study, "Couples' privacy rules centered on issues of social support and others' need to know about the loss. Even though couples described their privacy rules as implicitly understood, they also recalled having explicit conversations to develop rules. We discuss how the management of co-owned information can improve communication and maintain relationships."
762:
dynamics. Petronio also describes communication within families and between family members and outsiders, within and outside work and social groups, and between many combinations of individuals, dyads, and others within and across social boundaries. In addition, her analysis of privacy-disclosure "turbulence", or breaches of desired communication patterns, is articulate and systematic.
133:
to what is private and whom to share it with plays a part when taking the idea of boundaries into consideration. The decision to share is ultimately left up to the process of the privacy rule management system which combines rules for coordination of information, characteristics of disclosure, and attributes of the nature of boundaries.
36:
with various communication partners depending on the perceived benefits and costs of information disclosure. Petronio believes disclosing private information will strengthen one's connections with others, and that we can better understand the rules for disclosure in relationships through negotiating privacy boundaries.
1346: 573:
significantly predict daily minutes spent on Twitter accounts. However, the same CPM variables did not predict college students' other Twitter usage behaviors (e.g., weekly inquiries and total months of using Twitter). This shows the intricate connection between students' privacy concern and their usage behavior.
498:
reaction to such issues as control attempts, solicitation of information, and conflict outcomes. Another way that family communication uses CPM is with child bearing or the lack thereof; CPM has been used to explore whom childless couples choose to disclose to that they voluntarily do not want children.
339:
The characteristics of privacy rules are divided into two sections, attributes and development. Privacy rule attributes refer to how people obtain rules of privacy and understand the properties of those rules. This is normally done through social interactions where the boundaries for rules are put to
273:
In addition, boundary turbulence occurs when a co-owner intentionally breaks the coordinated boundary of privacy to disclose private information. An example of such intentional disclosure would be a daughter revealing to a doctor that her father is indeed an active smoker when the father has told the
253:
Often, boundaries are not coordinated as well as they should be to maintain the level of privacy or exposure desired by owners – this leads to problems known as boundary turbulence. The coordination of shared boundaries is key to avoiding over-sharing. When the boundaries are unclear, owners may come
739:
explains how people establish rules for both creating and interpreting meaning. Coordinated management of meaning has stages where coordination is achieved, not achieved, or partially achieved, which are similar to CPM's boundary ownership, boundary turbulence or boundary linkage. Moreover, in order
665:
can be uncomfortable and disruptive, they have the potential for positive outcomes in relationships if addressed. Using CPM theory as a framework, a study surveyed a community sample of 273 adults to examine their retrospective accounts of privacy violations in personal relationships. Results showed
568:
Another popular SNS, Twitter, was examined as well. In the research, Twitter was regarded as an onion with multiple privacy layers. The research found out that there were significant differences at the descriptive and inferential levels among the multiple dimensions of private information, including
484:
To validate the effectiveness and feasibility of the communication privacy management theoretical frameworks, Petronio tested them using different methods including and not limited to qualitative and quantitative research. These approaches helped other researchers translate research into practice in
314:
of information is characterized by two things: heavy responsibility and a knowledge of the rules for a particular disclosure. However, ownership can be felt to different degrees, and the understanding of disclosure rules can be different from owner to owner. Also, the act of sharing is coupled along
243:
are parts of confidential information that have not been discussed in a confidentiality agreement. One or both parties are not sure if that information can be shared with outside parties. Once information is known by others who are not the original owner they may have their own interpretation of how
222:
is how owners are connected when they build associations through a boundary. For example, doctors and patients are linked to each other in such a way that private information is passed within their boundaries constantly. These linkages can be strong or weak depending on how information was shared or
199:
An individual's private information is protected by the individual's boundaries. The permeability of these boundaries are ever-changing, and allow certain parts of the public access to certain pieces of information belonging to the individual. Sharing private information is a risky decision and puts
35:
developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information. It suggests that individuals maintain and coordinate privacy boundaries (the limits of what they are willing to share)
779:
in the early versions of CPM theory. Petronio argues that CPM is not focused on balance in the psychological sense. "Instead, argues for coordination with others that does not advocate an optimum balance between disclosure and privacy. As an alternative, the theory claims there are shifting forces
770:
Some researchers have questioned whether CPM theory truly is dialectical in nature. It has argued that CPM takes a dualistic approach, treating privacy and disclosure as independent of one another and able to coexist in tandem rather than in the dynamic interplay characteristic of dialectics. This
724:
and the expectations individuals have of another person's nonverbal communication. Both expectancy violations theory and CPM are related through how they deal with physical proximity, privacy and how close individuals allow other people to come to them. Both physical and intimate proximity requires
705:
Identity plays a large part in disclosure of religion as well. A 2020 study on how and why employees disclose their religious views when they were a part of a minority religion found that employees who felt like their religion was a core part of their identity were more likely to share that part of
612:
in health care providers is an important factor in determining whether a patient is comfortable disclosing private health information. In a health context, race may be a core factor in whether or not a patient trusts medical professionals, and race can impact how privacy rules between an individual
559:
Similar research has been done on the perceptions of teachers' disclosures on Facebook and their impact on credibility. The relevance and valence of disclosures were compared between disclosures made in the classroom and those made on Facebook and were found to be significantly different. Students'
505:
could be a unique CPM case in the family setting as couples often manage this information jointly as they decide whether to share the miscarriage with people outside the dyad. The research found that couples frame miscarriage as a shared but distinct experience and that both members exert rights of
471:
exists wherever the decision is made to disclose or conceal private information. Thus, costs and benefits must be weighed and consideration must be given to how such information will be owned, used, and spread. The definition of dialectic that Petronio borrows from can be found in Leslie Baxter and
132:
inherent to private information disclosure that are not present with self-disclosure. Firstly, the motivations behind sharing are many, including but not limited to: sharing a burden, righting a wrong, and influencing others. Since private information can be about oneself or others, the decision as
691:
Cultural differences are often tied to relationships, and can move beyond differences of ethnicity or gender. A 2020 study looked at how CPM functions in mixed orientation marriages, where a heterosexual presenting couple is actually made up of one heterosexual partner and one partner who does not
678:
has stirred conversation on the concept of privacy, security and boundaries between employee and employer. Companies have had to take measures to further secure their network or even decide whether they want to have employee access personal accounts (i.e. email) or devices while on the job. By the
620:
offers the "first extensive look at celebrity health sagas, this book examines the ways in which their stories become our stories, influencing public perception and framing dialog about wellness, disease and death. These private-yet-public narratives drive fund-raising, reduce stigma and influence
541:
Since Facebook is one of the most popular social media platforms, many researchers employed communication privacy management theory as a theoretical framework to examine the individual boundary management practices and privacy concerns of self-disclosure on this important platform. Sandra Petronio
581:
Informed by principles of CPM, health communication research using CPM to explore health privacy issues has become a growth area. Earlier study investigated physician disclosure of medical mistakes. Recently there have been a number of studies focused on ways that privacy issues influence patient
330:
Petronio views boundary management as a rule based process, not an individual decision. This rule-based management system allows for management on the individual and collective levels. This system depends on three privacy rule management to regulate the process of revealing and concealing private
292:
In cases of boundary turbulence, co-owners of information can feel that their expectations have been violated and lose trust in other co-owners. In these cases, the goal of each party is to reduce turbulence by reestablishing and coordinating boundaries. Turbulence does not always have a negative
209:
is the nature of the invisible divisions that keep private information from being known outside of an individual or particular group. When private information is kept with one owner, the boundaries are said to be thick because there is less possibility for information to make its way out into the
784:
of privacy and publicness they wish to experience in any given interaction" (pp. 12–13). Thus, Petronio argues that it is legitimate to call CPM theory dialectical in nature. While boundary ownership is discussed throughout the theory there is no remedy provided for those who break boundary
731:
explains how two individuals grow in intimacy and move from one level to the next in their relationships. The popular idea behind social penetration is that individual are like onions; they have layers, and deeper layers represent greater intimacy. For this intimacy to occur, private information
653:
The mobile phone and its impact on romantic relationships is a good example. After investigating mobile phone usage rules that are negotiated by adolescents and young adults in romantic relationships, findings are that the negotiation of rules is a crucial part of young adult relationships while
761:
Altman speaks to the values of this theory as it incorporates different "levels" or combinations of participants in communication processes (Altman 2002). Whereas earlier research and theorizing on privacy-disclosure focused on dyads or individuals, Petronio enunciated a more complicated set of
572:
Young people, especially high school and college students, are an important part of SNS users. A recent study examined college students' privacy concerns and impacts on their Twitter usage behaviors. Regression analyses concluded that Control and Boundary Rules of Private Information on Twitter
309:
Communication privacy management theory understands information (as well as boundaries) as something that is owned, and each owner must decide whether or not they are willing to have a confidant, i.e. a co-owner, to that information. In some cases, it is preferable for the owner to have another
550:
Jeffrey T. Child, Judy C. Pearson and Sandra Petronio have used CPM to develop the Blogging Privacy Management Measure (BPPM), a model through which researchers can look at privacy management in blogging specifically. Because blogging is a mediated activity, the BPPM can be used to look at the
497:
feeling caught, and parents-adolescent conversations about sex. Family privacy research over the decades are also inspired specifically by the chapter of parental privacy invasion. For example, work by Hawk and his colleagues explore perceived parental invasions from the view of adolescents in
297: 696:
action, as an outsider would not be able to tell otherwise what the partners' sexualities were. After a disclosure, couples were found to manage boundaries for the owned private information in several ways: Inclusive, intersected, interrelated or unified. Dominic Pecoraro also studied privacy
687:
Several studies tested CPM within intercultural contexts. For instance, a study that examined intercultural privacy management between foreign English teachers and Japanese co-workers uncovered cultural premises. This "study highlights four cultural premises that garner intercultural privacy
649:
Many studies emphasize the use of CPM in relationships because of the concepts of disclosure and boundaries. Not only romantic relationships, but also friendships are a factor when thinking of CPM. Disclosures in friendships have been studied because of how important friendships are to one's
640:
Health related situations can include a "forced disclosure" incident, such as when young adults are still under their parents' health insurance plans and do not have full control over what private health information is shared. Because the parents support their child financially by paying for
657:
CPM also appears in the friendship. The study intended to addresses the issue of whether personal traits and predispositions can predict the tendencies to either reveal or conceal secrets shared in confidence by a best friend suggested that a combination of several traits could successfully
551:
implications of online blog disclosures, such as when the privacy boundaries are misinterpreted by readers. A study using the BPPM found that young bloggers were likely to reveal more private information online rather than in person, because the medium gives more control. Bloggers who had "
223:
whether a co-owner wanted to know or was prepared to learn a new piece of information. Case in point, the link between an organization and a spy meant to infiltrate the organization is weak because the two are not coordinated on how information will be maintained private or disclosed.
59:" can arise when clashing expectations for privacy management are identified, or when preexisting expectations are breached, intentionally or unintentionally. Having the mental image of protective boundaries is central to understanding the five core principles of Petronio's CPM: 458:
With these five criteria, personal and group privacy rules are developed, but disclosure of private information necessitates the inclusion of others within the boundary of knowledge, which demands an understanding between parties for how to coordinate ownership of knowledge.
485:
different fields and enabled CPM to be applied across different contexts, primarily include: (1) family communication, with a particular focus on parental privacy invasions, (2) online social media, (3) health, and (4) relational issues, and (5) work environments.
555:
skills" tended to be more private and careful with their disclosures. Bloggers with a high "concern for appropriateness" tended to curate the perfect desired image of who they wanted to be online, and disclosed private information to fit that image.
1325:
Petronio, S., & Reierson, J. (2009). Regulating the Privacy of Confidentiality: Grasping the Complexities through Communication Privacy Management Theory. Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications.
533:. Surveillance from family, schools and potential employers means individuals cannot fully control the boundaries and co-owners of their private information, which has implications for what is shared and how individuals present themselves online. 701:
and facework into his paradigm of why, when and how queer individuals disclose their sexual identities. Public disclosure via "coming out" normalizes different sexual identities, providing resistance to face threats due to heteronormativity.
605:
individuals handle their personal history after they become a normal weight. The result shows that the vast majority of participants perceived more benefits from disclosing their larger identity than risks, regardless of weight-loss method.
191:. An individual's private information is protected by their boundaries. The permeability of these boundaries are ever-changing. Boundaries can be relatively permeable (easy to cross) or relatively impregnable (rigid and difficult to cross). 1128:
Petronio, S., & Durham, W.T. (2008). Communication privacy management theory. In L.A. Baxter & D.O. Braithwaite (Eds.), Engaging theories in interpersonal communication: Multiple perspectives (pp. 309-322). Thousand Oaks, CA: Sage.
476:, wherein various approaches to the contradictory impulses of relational life are discussed. The theory focuses on the idea that there are not only two contradictory stances within a relationship, were weighed using multiple viewpoints. 432:
Owners of information can form certain bonds that lead to disclosure, or conversely the express interest in forming bonds may cause private information to be shared. Motivations for sharing can include reciprocity or self-clarification.
402:
American women are socialized to disclose more than men. Men are more comfortable talking to women about their private information as opposed to the same sex. However, women enjoy talking to the same sex as opposed to the opposite.
274:
doctor that he no longer smokes after his heart surgery. The daughter in this case must weigh the risks of breaking the family privacy boundary against the benefits of the doctor being better informed of her father's condition.
258:
among co-owners is caused when rules are not mutually understood by co-owners and when the management of private information comes into conflict with the expectations each owner had, which can happen for a number of reasons.
2060:
Jin, Seung-A Annie (2013-02-07). "Peeling back the multiple layers of Twitter's private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter".
658:
distinguish those who revealed secrets from those who did not. Significant discriminators included tendency to gossip and depth of disclosure. Implications of the study and suggestions for future research are discussed.
641:
insurance, individuals can feel that parents have a right to this information. For those that feel that health information should solely be under the ownership of the individual, boundary turbulence can occur.
1544:
Kanter, Maggie; Robbins, Stephanie (October 2012). "The Impact of Parents "Friending" Their Young Adult Child on Facebook on Perceptions of Parental Privacy Invasions and Parent–Child Relationship Quality".
262:
Boundary turbulence can be caused by mistakes, such as an uninvited party overhearing private information (causing weak boundary linkage) or a disclosure an owner might make under the influence of
1480:
Durham, Wesley (May 21, 2008). "The Rules-Based Process of Revealing/Concealing the Family Planning Decisions of Voluntarily Child-Free Couples: A Communication Privacy Management Perspective".
2130:
Derlega, V; Winstead, B.A.; Greene, K.; Serovich, J.; Elwood, W.N. (2004). "Reasons for HIV disclsoure/nondisclosure in close relationships: Testing a model of HIV-disclosure decision making".
748:
Communication privacy management theory utilizes a socio-cultural communication tradition within an interpersonal context, and employs both a positivistic and interpretive approach to knowing.
2157:
Derlega, V; Winstead, B.A.; Folk-Barron, L. (2000). "Reasons for and against disclosing HI-seropositive test results to an intimate partner: A functional approach". In Petronio, Sandra (ed.).
84:
Petronio's communication privacy management (CPM) theory is built on Altman's dialectical conception of privacy as a process of opening and closing a boundary to others. Altman and Taylor's
1206:
Kanter, M.; Robbins, S. (2012). "The Impact of Parents "Friending" Their Young Adult Child on Facebook on Perceptions of Parental Privacy Invasions and Parent-Child Relationship Quality".
92:
as the primary way to develop close relationships. However, Altman believed that openness was just one part belonging to a larger whole, one which expanded to include privacy with
3028:
Emmers-sommer, T. (2017). "College Student Perceptions of Hypothetical Rape Disclosures: Do Relational and Demographic Variables Pose a Risk on Disclosure Believability?".
2528:
Steuber, Keli Ryan; McLaren, Rachel M. (2015-05-27). "Privacy Recalibration in Personal Relationships: Rule Usage Before and After an Incident of Privacy Turbulence".
925:
Matthews, Alicia; Derlega, Valerien; Morrow, Jennifer (Aug 20, 2006). "What is Highly Personal Information and How Is It Related to Self-Disclosure Decision-Making?".
128:
The content of concealing and revealing is private information. Petronio favored the term "private information" over the term "self-disclosure" because there are many
2174:"The role of privacy in families created through using assisted reproductive technology: Examining existing literature using communication privacy management theory" 270:. Disclosure to a new party was not the intent, but, when it happens, other co-owners can feel that their expectations of maintaining boundaries have been violated. 2339: 740:
to achieve meaning, there needs to be an exchange of information between individuals to decipher. This exchange of private information falls directly into CPM.
210:
public sphere. Once information is shared to one or more persons, the boundaries for that private information expand, become more permeable, and are considered
2668:
Powell, Martine; Wright, Rebecca; Clark, Susan (2010). "Improving the Competency of Police Officers in Conducting Investigative Interviews with Children".
1139:
Caughlin, J.P.; Afifi, T.D. (2004). "When is topic avoidance unsatisfying? Examining moderators of the association between avoidance and dissatisfaction".
399:
Privacy boundaries are sculpted differently by men and women based on socialization, which leads to difference in how rules are understood and operated in
529:
As social media continues to develop and become an essential part in everyday life, more younger audiences are attuned to how much information is under
2774: 493:
Specific applications of CPM highlight family privacy management. Research focused on secrets and topic avoidance, such as questions of concealment to
2408:
McBride, Chad; Bergen, Karla (2008). "Communication Research: Becoming a Reluctant Confidant: Communication Privacy Management in Close Friendships".
47:
draw divisions between private information and public information. This theory argues that when people disclose private information, they depend on a
2485:
Bello, Richard S.; Brandau-Brown, Frances E.; Ragsdale, J. Donald (2014-07-28). "A Profile of Those Likely to Reveal Friends' Confidential Secrets".
898:
Petronio, S (1991). "Communication boundary management: A theoretical model of managing disclosure of private information between married couples".
721: 75:
When co-owners of private information do not effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result.
1074:
Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples.
2106:"Exploring the Relationship between Privacy Concerns and Social Media Use among College Students: A Communication Privacy Management Perspective" 2776:
Negotiating Boundaries in a Globalized World: Communication Privacy Management between Foreign English Teachers and Japanese Co-workers in Japan
785:
ownership rules. In addition CPM does not offer ways on how to negotiate boundaries between two parties, only that they must be done mutually.
3007:
Fox, K.; Ashley, A. M.; Ritter, L. J.; Martin, T. & Knox, D. (2022). "Gender Differences in Sex Secret Disclosure to a Romantic Partner".
183:. Private boundaries are the division between private information and public information. When private information is shared, there will be a 2315: 1356: 3153: 674:
CPM has become applicable in the workplace as personal mobile devices have increasingly been allowed to be brought to work. The concept of
277:
Lastly, boundary turbulence can also occur when there have not been pre-existing rules for a situation. For example, with the emergence of
582:
care, confidentiality and control over ownership, choices about disclosure, for instance, with stigmatized health-related illness such as
2005:"Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency" 3118:
Zurbriggen, E. L.; Ben Hagai, E. & Leon, G. (2016). "Negotiating privacy and intimacy on social media: Review and recommendations".
888:
Petronio, S. (2002). Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: SUNY Press.N TAEHJSFCJNDOISKXMJCKIOLJKDFER0IKFG VKTY56
323: 1445:
Afifi, T.D. (2003). "'Feeling caught' in stepfamilies: Managing boundary turbulence through appropriate communication privacy rules".
1171:
Afifi, T. D. (2003). "Feeling caught" in stepfamilies: managing boundary turbulence through appropriate communication privacy rules".
2962: 2925: 736: 159:
Someone who shares should have access to the private information based on what they have the lose if the information is disclosed.
2429:"Between Friends, an 'Implicit Trust': Exploring the (Non)Disclosure of Private Mental Health-Related Information in Friendships" 289:
their children, the children felt turbulence. There was a perception of privacy invasion between the parent-child relationship.
1075: 560:
perceptions of teacher credibility were shown to decrease as relevance of disclosures increased and as negativity increased.
2011:. Advancing Educational Research on Computer-supported Collaborative Learning (CSCL) through the use of gStudy CSCL Tools. 1576:. CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, New York, USA: ACM Press. 55:. Once a disclosure is made, the negotiation of privacy rules between the two parties is required. A distressing sense of " 3148: 1595:
Bruss, Olivia E.; Hill, Jennifer M. (2010). "Tell Me More: Online Versus Face-to-Face Communication and Self-Disclosure".
3070:
Coffelt, T. A. (2017). "Deciding to reveal sexual information and sexuality education in mother-daughter relationships".
1821:"Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory" 717: 449:
Owners of private information evaluate risks relative to the benefits of disclosure or maintaining information private.
2450:
Ngcongo, Mthobeli (2016). "Mobile communication privacy management in romantic relationships: A dialectical approach".
1233:
McLaren, R.M. (August 2013). "Emotions, Communicative responses, and relational consequences of boundary turbulence".
698: 2105: 3049:
Ngcongo, M. (2022). "To Tell or Not to Tell? Interracial Romantic Couples' Management of Social Network Influence".
626: 147:
A confidant who is fully committed to handle private information by abiding in the original owner's privacy rules.
2206:
Romo, Lynsey K (2016). "How Formerly Overweight and Obese Individuals Negotiate Disclosure of Their Weight Loss".
69:
When others are told or given access to a person's private information, they become co-owners of that information.
728: 85: 2355:"'Yes they have the right to know, but...': Young Adult Women Managing Private Health Information as Dependents" 1732: 1091:
Petronio, S (2007). "Translational Research Endeavors and the Practices of Communication Privacy Management".
964: 416:
Shaped by issues of physical and social environments that factor in whether or not information will be shared
2976:
Petronio, S. Martin; Littlefield, R. (1984). "Prerequisite conditions for self-disclosing: A gender issue".
2870:"To Come Out or Not to Come Out: Minority Religious Identity Self-Disclosure in the United States Workplace" 2780: 231:
is the responsibilities and rights each person has over the control of the spread of information that they
1917:"Exploring Privacy Management on Facebook: Motivations and Perceived Consequences of Voluntary Disclosure" 609: 1958:"Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure" 72:
Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others.
2804: 675: 473: 97: 1335:
Baxter, L.A., & Montgomery, B. (1996). Relating Dialogues and dialectics: New York: Guilford Press.
296: 2004: 1820: 1006: 436:
If you have disclosed a great deal to me, out of reciprocity, I might be motivated to disclose to you
255: 187:. When private information remains with an individual and is not disclosed, the boundary is called a 2606:
Miller, K.W.; Voas, J.; Hurlburt, G.F. (Sep–Oct 2012). "BYOD: Security and Privacy Considerations".
1758: 2949:
Petronio, S.; Martin, J.N. (1986). "Ramifications of revealing private information: A gender gap".
693: 180: 732:
needs to be shared and exchanged. As one does this, boundaries are permeated and become co-owned.
3093:"Familism values and Mexican-origin adolescents' disclosure and secrecy with fathers and mothers" 2898: 2849: 2732: 2685: 2623: 2588: 2553: 2510: 2467: 2390: 2333: 2231: 2086: 1985: 1897: 1848: 1786: 1757:
Child, Jeffrey T.; Duck, Angela R.; Andrews, Laura A.; Butauski, Maria; Petronio, Sandra (2015).
1714: 1665: 1616: 1526: 1462: 1427: 1392: 1299: 1250: 1188: 1108: 1052: 984: 942: 1499:
Bute, J. J.; Brann, M (2015). "Co-ownership of Private Information in the Miscarriage Context".
2931: 2921: 2890: 2841: 2724: 2545: 2502: 2382: 2374: 2321: 2311: 2288: 2270: 2223: 2078: 2024: 1977: 1938: 1889: 1868:"Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat" 1840: 1778: 1706: 1657: 1608: 1352: 1291: 1044: 1036: 1007:"Conceptualization and operationalization: utility of communication privacy management theory" 868: 662: 654:
enhancing trust and fostering harmony were important factors in the rule development process.
634: 311: 2704: 1759:"Young Adults' Management of Privacy on Facebook with Multiple Generations of Family Members" 419:
In a traumatic situation (e.g., surviving an earthquake together), we will develop new rules
3158: 3127: 3104: 3079: 3058: 3037: 3016: 2985: 2958: 2882: 2833: 2716: 2677: 2650: 2615: 2580: 2537: 2494: 2459: 2366: 2278: 2262: 2215: 2188: 2139: 2070: 2016: 1969: 1957: 1928: 1879: 1832: 1770: 1696: 1685:""You never really know who's looking": Imagined surveillance across social media platforms" 1647: 1636:"Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors" 1600: 1577: 1554: 1516: 1508: 1454: 1419: 1384: 1283: 1242: 1215: 1180: 1148: 1100: 1026: 1018: 976: 934: 907: 858: 622: 93: 2705:"Cultural discourses of privacy: Interrogating globalized workplace relationships in Japan" 1806:"Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook" 1375:
Petronio, Sandra (2013). "Brief Status Report on Communication Privacy Management Theory".
452:
Our rules are influenced by our assessment of the ratio of risks to benefits of disclosing
343: 331:
information: privacy rule characteristics, boundary coordination, and boundary turbulence.
51:
to control the level of accessibility. An individual's privacy boundary governs his or her
2571:
Miller, Seumas; Weckert, John (December 2000). "Privacy, the Workplace and the Internet".
799: 552: 523: 89: 52: 2751: 310:
person share the private information, though this may not be the case for the confidant.
2641:
Hackney, Michael; Kleiner, Brian (1994). "Conducting an Effective Selection Interview".
2173: 780:
with a range of privacy and disclosure that people handle by making judgments about the
2283: 911: 630: 263: 121: 2249:
Hong, Soo Jung; Drake, Bettina; Goodman, Melody; Kaphingst, Kimberly A. (2020-08-23).
3142: 2902: 2853: 2736: 2689: 2557: 2514: 2471: 2428: 2192: 1933: 1916: 1901: 1790: 1558: 1530: 1466: 1396: 1303: 1254: 1219: 1192: 1112: 1056: 988: 946: 863: 846: 519: 467:
Petronio's understanding and argument of privacy management rests on the idea that a
129: 2627: 2592: 2090: 1852: 1718: 1620: 1431: 2752:"Tales of Gaijin: Health Privacy Perspectives of Foreign English Teachers in Japan" 2394: 2235: 1989: 1669: 965:"(Mis)communicating across boundaries: Interpersonal and intergroup considerations" 591: 530: 386:
The United States favors more openness in relational communication than does Japan
278: 66:
People control their private information through the use of personal privacy rules.
3083: 3062: 2867:
Charoensap-Kelly, Piyawan; Mestayer, Colleen L.; Knight, G. Brandon (2020-05-01).
2837: 2720: 2541: 2463: 2370: 2266: 2219: 2044:"Perceptions of Teachers' Disclosures on Facebook and their Impact on Credibility" 1774: 1287: 2808: 2498: 1512: 1410:
Miller, Seumas; Weckert, John (2000). "Privacy, the Workplace and the Internet".
1388: 1022: 771:
accusation of dualistic thinking might result from the theory's use of the terms
706:
themselves with their coworkers, because religion was central to their identity.
285:, boundary rules had not been established. As parents began to join Facebook and 2821: 2354: 2251:"Race, Trust in Doctors, Privacy Concerns, and Consent Preferences for Biobanks" 2250: 2143: 2043: 1604: 1270: 502: 139: 3020: 980: 3041: 2989: 2681: 2584: 2020: 1836: 1423: 1104: 938: 598: 494: 108:, underscoring "disclosure of private information" as the crux of the theory. 63:
People believe they own and have a right to control their private information.
2935: 2894: 2886: 2845: 2728: 2654: 2549: 2506: 2378: 2325: 2274: 2082: 2074: 2028: 1981: 1942: 1893: 1884: 1867: 1844: 1782: 1710: 1701: 1684: 1661: 1652: 1635: 1612: 1458: 1295: 1246: 1184: 1040: 872: 383:
Disclosure depends on the norms for privacy and openness in a given culture.
2963:
10.1002/1097-4679(198605)42:3<499::aid-jclp2270420317>3.0.co;2-i
1581: 1271:"The Emotional, Behavioral, and Cognitive Experience of Boundary Turbulence" 468: 286: 232: 2869: 2386: 2292: 2227: 1152: 1048: 637:β€”as well as 200 others included in the studyβ€”have left a lasting legacy." 514:
Recent researchers apply CPM to investigate privacy management for online
2619: 587: 583: 282: 40: 3131: 3109: 3092: 1805: 794: 179:
To understand CPM theory it is important to follow the metaphor of the
2822:"Bridging Privacy, Face, and Heteronormativity: Stories of Coming Out" 2756:
Kaleidoscope: A Graduate Journal of Qualitative Communication Research
1973: 1962:
Journal of the American Society for Information Science and Technology
1031: 1521: 692:
identify as heterosexual. Disclosure of one's sexuality often was an
32: 28: 100:. When Petronio first developed this theory in 1991, it was called 602: 322: 295: 1574:
Friends only: examining a privacy-enhancing behavior in facebook
515: 267: 2802:
Communication privacy management in mixed orientation marriages
1599:. Psi Chi, the International Honor Society in Psychology: 3–7. 1956:
Child, Jeffrey T.; Pearson, Judy C.; Petronio, Sandra (2009).
2916:
West, Richard L. (17 September 2013). Turner, Lynn H. (ed.).
1013:. Privacy and Disclosure, Online and in Social Interactions. 697:
management among members of the LGBT community, and included
3091:
Son, D.; Updegraff, K. A. & UmaΓ±a-Taylor, A. J. (2022).
831:
Griffin, E. A., Ledbetter, A., & Sparks, G. G. (2023).
2918:
Introducing communication theory: analysis and application
963:
Petronio, S.; Ellmers, N.; Giles, H.; Gallois, C. (1998).
2003:
Child, Jeffrey T.; Agyeman-Budu, Esther A. (2010-09-01).
1124: 1122: 847:"Communication Privacy Management in Electronic Commerce" 2709:
Journal of International and Intercultural Communication
958: 956: 526:
become important factors in sharing information online.
2920:(Fifth ed.). New York, NY: McGraw-Hill Education. 1348:
The SAGE Encyclopedia of Communication Research Methods
714:
There are a few communication theories related to CPM.
1819:
Frampton, Bethany D.; Child, Jeffrey T. (2013-11-01).
2779:(PhD in Communication Studies thesis). Archived from 2042:
Coffelt, T. A.; Strayhorn J.; Tillson, L. D. (2014).
1733:"The Top 10 Social Media Sites & Platforms 2022" 1683:Duffy, Brooke Erin; Chan, Ngai Keung (2019-01-01). 618:
Celebrity Health Narratives & the Public Health
2868: 1269: 2308:Celebrity health narratives and the public health 1316:A first Look at Communication Theory 11th Edition 1005:Petronio, Sandra; Child, Jeffrey T (2020-02-01). 48: 1634:Millham, Mary Helen; Atkin, David (2018-01-01). 1086: 1084: 884: 882: 2161:. New Jersey: Lawrence Erlbaum Associates, Inc. 1915:Waters, Susan; Ackerman, James (October 2011). 1572:Stutzman, Fred; Kramer-Duffield, Jacob (2010). 1070: 1068: 1066: 590:information, reproductive information, and the 3120:Translational Issues in Psychological Science 2104:Yang, K. C. C.; Pulido, A.; Kang, Y. (2016). 1166: 1164: 1162: 8: 1447:Journal of Social and Personal Relationships 1235:Journal of Social and Personal Relationships 1173:Journal of Social and Personal Relationships 720:discusses the importance of personal space, 2159:Balancing the Secrets of Private Disclosure 171:Someone who seeks out private information. 43:to explain the privacy management process. 2338:: CS1 maint: location missing publisher ( 1921:Journal of Computer-Mediated Communication 851:Journal of Computer-Mediated Communication 3108: 2282: 2132:Journal of Social and Clinical Psychology 1932: 1883: 1700: 1651: 1597:Psi Chi Journal of Psychological Research 1520: 1501:Journal of Applied Communication Research 1093:Journal of Applied Communication Research 1030: 862: 349: 342: 120: 56: 857:(2). Oxford University Press: 335–361. 811: 725:boundaries to be crossed or permeated. 44: 2331: 1804:Chennamaneni, Anitha; Taneja, Aakash. 2353:Campbell-Salome, Gemme (2019-07-29). 2181:Journal of Family Theory & Review 1370: 1368: 827: 825: 823: 821: 819: 817: 815: 7: 2049:. Kentucky Journal of Communication. 1000: 998: 833:A First Look at Communication Theory 2113:Intercultural Communication Studies 1866:Hollenbaugh, Erin E. (April 2019). 1268:Aloia, Lindsey Susan (2018-03-15). 2875:Management Communication Quarterly 2536:(3). Informa UK Limited: 345–364. 2493:(4). Informa UK Limited: 389–406. 2410:Texas Speech Communication Journal 912:10.1111/j.1468-2885.1991.tb00023.x 300:Personal and collective boundaries 14: 2773:Nathaniel, Simmons (2014-01-01). 2750:Nathaniel, Simmons (2012-01-01). 2703:Simmons, Nathaniel (2016-08-24). 2172:Rauscher, E.; Fine, M.A. (2012). 2069:(6). SAGE Publications: 813–833. 737:coordinated management of meaning 102:communication boundary management 25:communication boundary management 2820:Pecoraro, Dominic (2020-08-07). 2193:10.1111/j.1756-2589.2012.00132.x 1934:10.1111/j.1083-6101.2011.01559.x 1559:10.1111/j.1460-2466.2012.01669.x 1220:10.1111/j.1460-2466.2012.01669.x 864:10.1111/j.1083-6101.2007.00328.x 254:into conflict with one another. 106:communication privacy management 17:Communication privacy management 1763:Journal of Family Communication 1377:Journal of Family Communication 472:Barbara Montgomery's theory of 2951:Journal of Clinical Psychology 2670:Police Practice & Research 927:Communication Research Reports 244:the information can be shared. 1: 3084:10.1080/14681811.2017.1326377 3063:10.1080/01494929.2021.1988030 2838:10.1080/10510974.2020.1776744 2721:10.1080/17513057.2016.1142601 2542:10.1080/01463373.2015.1039717 2464:10.1080/02500167.2016.1140666 2371:10.1080/10410236.2018.1452092 2267:10.1080/10410236.2019.1623644 2220:10.1080/10410236.2015.1045790 1775:10.1080/15267431.2015.1076425 1288:10.1080/10510974.2018.1426617 1011:Current Opinion in Psychology 104:. In 2002, she renamed it to 3097:Journal of Family Psychology 3051:Marriage & Family Review 2499:10.1080/10510974.2013.837082 1513:10.1080/00909882.2014.982686 1389:10.1080/15267431.2013.743426 1141:Human Communication Research 1023:10.1016/j.copsyc.2019.08.009 718:Expectancy violations theory 676:bring your own device (BYOD) 621:policy. Celebrities such as 335:Privacy rule characteristics 319:Rule-based management system 98:relational dialectics theory 49:rule-based management system 3154:Interpersonal communication 2427:Hall, Robert (March 2020). 2306:Beck, Christina S. (2015). 2144:10.1521/jscp.23.6.747.54804 2009:Computers in Human Behavior 1825:Computers in Human Behavior 1605:10.24839/1089-4136.jn15.1.3 845:Metzger, Miriam J. (2007). 683:Intercultural communication 597:One recent study about how 3175: 3021:10.1007/s12119-021-09880-3 2573:Journal of Business Ethics 2433:Ohio Communication Journal 1412:Journal of Business Ethics 1345:Allen, Mike (2017-04-11). 981:10.1177/009365098025006001 3042:10.1007/s12119-017-9411-4 2990:10.1080/03637758409390200 2682:10.1080/15614260902830070 2021:10.1016/j.chb.2010.02.009 1837:10.1016/j.chb.2013.05.006 1105:10.1080/00909880701422443 939:10.1080/08824090600668915 729:Social penetration theory 86:social penetration theory 39:Petronio uses a boundary 2978:Communication Monographs 2887:10.1177/0893318919890072 2655:10.1108/eum0000000004009 2075:10.1177/1461444812471814 1885:10.1177/2056305119855144 1702:10.1177/1461444818791318 1653:10.1177/1461444816654465 1547:Journal of Communication 1459:10.1177/0265407503206002 1247:10.1177/0265407512463997 1208:Journal of Communication 1185:10.1177/0265407503206002 699:performative face theory 3030:Sexuality & Culture 3009:Sexuality & Culture 2800:Wente-Hahn, D. (2020). 2585:10.1023/a:1006232417265 2530:Communication Quarterly 2063:New Media & Society 1689:New Media & Society 1640:New Media & Society 1582:10.1145/1753326.1753559 1424:10.1023/A:1006232417265 23:), originally known as 1878:(3): 205630511985514. 1872:Social Media + Society 969:Communication Research 613:and a doctor develop. 553:higher self-monitoring 501:Pregnancy loss due to 347: 327: 301: 125: 2826:Communication Studies 2487:Communication Studies 1737:Search Engine Journal 1482:Communication Studies 1351:. SAGE Publications. 1276:Communication Studies 518:, Facebook usage and 474:relational dialectics 463:Management dialectics 346: 326: 305:Control and ownership 299: 206:Boundary permeability 195:Boundary coordination 124: 3149:Communication theory 2620:10.1109/mitp.2012.93 2359:Health Communication 2255:Health Communication 2208:Health Communication 1153:10.1093/hcr/30.4.479 1076:Communication Theory 900:Communication Theory 744:Academic integration 577:Health communication 489:Family communication 281:and, in particular, 165:Deliberate confidant 645:Relationship issues 510:Online social media 480:Theory applications 442:Risk/benefit ratio 249:Boundary turbulence 185:collective boundary 117:Private information 57:boundary turbulence 3132:10.1037/tps0000078 3110:10.1037/fam0000986 2310:. Jefferson, N.C. 694:identity-affirming 663:privacy violations 495:stepfamily members 354:Decision Criteria 348: 328: 302: 228:Boundary ownership 175:Private boundaries 126: 94:Leslie A. Baxter's 45:Privacy boundaries 2317:978-1-4766-1907-1 2261:(10): 1219–1228. 1974:10.1002/asi.21122 1968:(10): 2079–2094. 1358:978-1-4833-8142-8 1214:(5): 900 of 917. 670:Work environments 635:Christopher Reeve 456: 455: 189:personal boundary 3166: 3135: 3114: 3112: 3103:(8): 1296–1305. 3087: 3066: 3045: 3024: 2994: 2993: 2973: 2967: 2966: 2946: 2940: 2939: 2913: 2907: 2906: 2872: 2864: 2858: 2857: 2817: 2811: 2798: 2792: 2791: 2789: 2788: 2770: 2764: 2763: 2747: 2741: 2740: 2700: 2694: 2693: 2665: 2659: 2658: 2638: 2632: 2631: 2603: 2597: 2596: 2568: 2562: 2561: 2525: 2519: 2518: 2482: 2476: 2475: 2447: 2441: 2440: 2424: 2418: 2417: 2405: 2399: 2398: 2365:(9): 1010–1020. 2350: 2344: 2343: 2337: 2329: 2303: 2297: 2296: 2286: 2246: 2240: 2239: 2214:(9): 1145–1154. 2203: 2197: 2196: 2178: 2169: 2163: 2162: 2154: 2148: 2147: 2127: 2121: 2120: 2110: 2101: 2095: 2094: 2057: 2051: 2050: 2048: 2039: 2033: 2032: 2000: 1994: 1993: 1953: 1947: 1946: 1936: 1912: 1906: 1905: 1887: 1863: 1857: 1856: 1831:(6): 2257–2264. 1816: 1810: 1809: 1801: 1795: 1794: 1754: 1748: 1747: 1745: 1744: 1729: 1723: 1722: 1704: 1680: 1674: 1673: 1655: 1631: 1625: 1624: 1592: 1586: 1585: 1569: 1563: 1562: 1541: 1535: 1534: 1524: 1496: 1490: 1489: 1477: 1471: 1470: 1442: 1436: 1435: 1407: 1401: 1400: 1372: 1363: 1362: 1342: 1336: 1333: 1327: 1323: 1317: 1314: 1308: 1307: 1273: 1265: 1259: 1258: 1230: 1224: 1223: 1203: 1197: 1196: 1168: 1157: 1156: 1136: 1130: 1126: 1117: 1116: 1088: 1079: 1072: 1061: 1060: 1034: 1002: 993: 992: 960: 951: 950: 922: 916: 915: 895: 889: 886: 877: 876: 866: 842: 836: 829: 710:Related theories 623:Mary Tyler Moore 350: 240:Fuzzy boundaries 219:Boundary linkage 53:self-disclosures 3174: 3173: 3169: 3168: 3167: 3165: 3164: 3163: 3139: 3138: 3117: 3090: 3069: 3048: 3027: 3006: 3003: 3001:Further reading 2998: 2997: 2975: 2974: 2970: 2948: 2947: 2943: 2928: 2915: 2914: 2910: 2866: 2865: 2861: 2819: 2818: 2814: 2799: 2795: 2786: 2784: 2772: 2771: 2767: 2749: 2748: 2744: 2702: 2701: 2697: 2667: 2666: 2662: 2640: 2639: 2635: 2608:IT Professional 2605: 2604: 2600: 2570: 2569: 2565: 2527: 2526: 2522: 2484: 2483: 2479: 2449: 2448: 2444: 2426: 2425: 2421: 2407: 2406: 2402: 2352: 2351: 2347: 2330: 2318: 2305: 2304: 2300: 2248: 2247: 2243: 2205: 2204: 2200: 2176: 2171: 2170: 2166: 2156: 2155: 2151: 2129: 2128: 2124: 2108: 2103: 2102: 2098: 2059: 2058: 2054: 2046: 2041: 2040: 2036: 2002: 2001: 1997: 1955: 1954: 1950: 1914: 1913: 1909: 1865: 1864: 1860: 1818: 1817: 1813: 1803: 1802: 1798: 1756: 1755: 1751: 1742: 1740: 1731: 1730: 1726: 1682: 1681: 1677: 1633: 1632: 1628: 1594: 1593: 1589: 1571: 1570: 1566: 1543: 1542: 1538: 1498: 1497: 1493: 1479: 1478: 1474: 1444: 1443: 1439: 1409: 1408: 1404: 1374: 1373: 1366: 1359: 1344: 1343: 1339: 1334: 1330: 1324: 1320: 1315: 1311: 1267: 1266: 1262: 1232: 1231: 1227: 1205: 1204: 1200: 1170: 1169: 1160: 1138: 1137: 1133: 1127: 1120: 1090: 1089: 1082: 1073: 1064: 1004: 1003: 996: 962: 961: 954: 924: 923: 919: 897: 896: 892: 887: 880: 844: 843: 839: 830: 813: 808: 800:Self-disclosure 791: 768: 759: 754: 746: 712: 685: 672: 647: 594:of healthcare. 579: 566: 548: 539: 524:risk management 512: 491: 482: 465: 337: 321: 307: 251: 197: 177: 119: 114: 112:Theory elements 90:self-disclosure 82: 12: 11: 5: 3172: 3170: 3162: 3161: 3156: 3151: 3141: 3140: 3137: 3136: 3126:(3): 248–260. 3115: 3088: 3078:(5): 571–587. 3067: 3057:(5): 471–493. 3046: 3036:(3): 664–679. 3025: 3002: 2999: 2996: 2995: 2984:(3): 268–273. 2968: 2957:(3): 499–506. 2941: 2926: 2908: 2881:(2): 213–250. 2859: 2832:(4): 669–684. 2812: 2793: 2765: 2742: 2695: 2676:(3): 211–226. 2660: 2633: 2598: 2579:(3): 255–265. 2563: 2520: 2477: 2442: 2419: 2400: 2345: 2316: 2298: 2241: 2198: 2164: 2149: 2138:(6): 747–767. 2122: 2096: 2052: 2034: 2015:(5): 957–963. 1995: 1948: 1927:(1): 101–115. 1907: 1858: 1811: 1796: 1749: 1739:. May 30, 2022 1724: 1695:(1): 119–138. 1675: 1626: 1587: 1564: 1553:(5): 900–917. 1536: 1491: 1472: 1453:(6): 729–755. 1437: 1402: 1364: 1357: 1337: 1328: 1318: 1309: 1282:(2): 180–195. 1260: 1241:(5): 606–626. 1225: 1198: 1179:(6): 729–755. 1158: 1147:(4): 479–513. 1131: 1118: 1099:(3): 218–222. 1080: 1062: 994: 952: 917: 906:(4): 311–335. 890: 878: 837: 835:. McGraw Hill. 810: 809: 807: 804: 803: 802: 797: 790: 787: 767: 764: 758: 755: 753: 750: 745: 742: 722:territoriality 711: 708: 684: 681: 671: 668: 646: 643: 631:Michael J. Fox 578: 575: 565: 562: 547: 544: 538: 535: 511: 508: 490: 487: 481: 478: 464: 461: 454: 453: 450: 447: 444: 438: 437: 434: 430: 427: 421: 420: 417: 414: 411: 405: 404: 400: 397: 394: 388: 387: 384: 381: 378: 372: 371: 366: 361: 356: 336: 333: 320: 317: 306: 303: 250: 247: 246: 245: 236: 224: 215: 196: 193: 176: 173: 169: 168: 157: 156: 145: 144: 118: 115: 113: 110: 81: 78: 77: 76: 73: 70: 67: 64: 13: 10: 9: 6: 4: 3: 2: 3171: 3160: 3157: 3155: 3152: 3150: 3147: 3146: 3144: 3133: 3129: 3125: 3121: 3116: 3111: 3106: 3102: 3098: 3094: 3089: 3085: 3081: 3077: 3073: 3072:Sex Education 3068: 3064: 3060: 3056: 3052: 3047: 3043: 3039: 3035: 3031: 3026: 3022: 3018: 3015:(1): 96–115. 3014: 3010: 3005: 3004: 3000: 2991: 2987: 2983: 2979: 2972: 2969: 2964: 2960: 2956: 2952: 2945: 2942: 2937: 2933: 2929: 2927:9780073534282 2923: 2919: 2912: 2909: 2904: 2900: 2896: 2892: 2888: 2884: 2880: 2876: 2871: 2863: 2860: 2855: 2851: 2847: 2843: 2839: 2835: 2831: 2827: 2823: 2816: 2813: 2810: 2806: 2803: 2797: 2794: 2783:on 2016-11-17 2782: 2778: 2777: 2769: 2766: 2761: 2757: 2753: 2746: 2743: 2738: 2734: 2730: 2726: 2722: 2718: 2714: 2710: 2706: 2699: 2696: 2691: 2687: 2683: 2679: 2675: 2671: 2664: 2661: 2656: 2652: 2648: 2644: 2637: 2634: 2629: 2625: 2621: 2617: 2613: 2609: 2602: 2599: 2594: 2590: 2586: 2582: 2578: 2574: 2567: 2564: 2559: 2555: 2551: 2547: 2543: 2539: 2535: 2531: 2524: 2521: 2516: 2512: 2508: 2504: 2500: 2496: 2492: 2488: 2481: 2478: 2473: 2469: 2465: 2461: 2457: 2453: 2446: 2443: 2438: 2434: 2430: 2423: 2420: 2415: 2411: 2404: 2401: 2396: 2392: 2388: 2384: 2380: 2376: 2372: 2368: 2364: 2360: 2356: 2349: 2346: 2341: 2335: 2327: 2323: 2319: 2313: 2309: 2302: 2299: 2294: 2290: 2285: 2280: 2276: 2272: 2268: 2264: 2260: 2256: 2252: 2245: 2242: 2237: 2233: 2229: 2225: 2221: 2217: 2213: 2209: 2202: 2199: 2194: 2190: 2186: 2182: 2175: 2168: 2165: 2160: 2153: 2150: 2145: 2141: 2137: 2133: 2126: 2123: 2118: 2114: 2107: 2100: 2097: 2092: 2088: 2084: 2080: 2076: 2072: 2068: 2064: 2056: 2053: 2045: 2038: 2035: 2030: 2026: 2022: 2018: 2014: 2010: 2006: 1999: 1996: 1991: 1987: 1983: 1979: 1975: 1971: 1967: 1963: 1959: 1952: 1949: 1944: 1940: 1935: 1930: 1926: 1922: 1918: 1911: 1908: 1903: 1899: 1895: 1891: 1886: 1881: 1877: 1873: 1869: 1862: 1859: 1854: 1850: 1846: 1842: 1838: 1834: 1830: 1826: 1822: 1815: 1812: 1807: 1800: 1797: 1792: 1788: 1784: 1780: 1776: 1772: 1768: 1764: 1760: 1753: 1750: 1738: 1734: 1728: 1725: 1720: 1716: 1712: 1708: 1703: 1698: 1694: 1690: 1686: 1679: 1676: 1671: 1667: 1663: 1659: 1654: 1649: 1645: 1641: 1637: 1630: 1627: 1622: 1618: 1614: 1610: 1606: 1602: 1598: 1591: 1588: 1583: 1579: 1575: 1568: 1565: 1560: 1556: 1552: 1548: 1540: 1537: 1532: 1528: 1523: 1518: 1514: 1510: 1506: 1502: 1495: 1492: 1488:(2): 132–147. 1487: 1483: 1476: 1473: 1468: 1464: 1460: 1456: 1452: 1448: 1441: 1438: 1433: 1429: 1425: 1421: 1418:(3): 255–65. 1417: 1413: 1406: 1403: 1398: 1394: 1390: 1386: 1382: 1378: 1371: 1369: 1365: 1360: 1354: 1350: 1349: 1341: 1338: 1332: 1329: 1322: 1319: 1313: 1310: 1305: 1301: 1297: 1293: 1289: 1285: 1281: 1277: 1272: 1264: 1261: 1256: 1252: 1248: 1244: 1240: 1236: 1229: 1226: 1221: 1217: 1213: 1209: 1202: 1199: 1194: 1190: 1186: 1182: 1178: 1174: 1167: 1165: 1163: 1159: 1154: 1150: 1146: 1142: 1135: 1132: 1125: 1123: 1119: 1114: 1110: 1106: 1102: 1098: 1094: 1087: 1085: 1081: 1078:, 1, 311–335. 1077: 1071: 1069: 1067: 1063: 1058: 1054: 1050: 1046: 1042: 1038: 1033: 1028: 1024: 1020: 1016: 1012: 1008: 1001: 999: 995: 990: 986: 982: 978: 974: 970: 966: 959: 957: 953: 948: 944: 940: 936: 932: 928: 921: 918: 913: 909: 905: 901: 894: 891: 885: 883: 879: 874: 870: 865: 860: 856: 852: 848: 841: 838: 834: 828: 826: 824: 822: 820: 818: 816: 812: 805: 801: 798: 796: 793: 792: 788: 786: 783: 778: 774: 765: 763: 756: 751: 749: 743: 741: 738: 733: 730: 726: 723: 719: 715: 709: 707: 703: 700: 695: 689: 682: 680: 677: 669: 667: 664: 659: 655: 651: 644: 642: 638: 636: 632: 628: 627:Robin Roberts 624: 619: 614: 611: 607: 604: 600: 595: 593: 589: 585: 576: 574: 570: 563: 561: 557: 554: 545: 543: 536: 534: 532: 527: 525: 521: 520:online dating 517: 509: 507: 504: 499: 496: 488: 486: 479: 477: 475: 470: 462: 460: 451: 448: 445: 443: 440: 439: 435: 431: 428: 426: 423: 422: 418: 415: 412: 410: 407: 406: 401: 398: 395: 393: 390: 389: 385: 382: 379: 377: 374: 373: 370: 367: 365: 362: 360: 357: 355: 352: 351: 345: 341: 334: 332: 325: 318: 316: 313: 304: 298: 294: 290: 288: 284: 280: 275: 271: 269: 265: 260: 257: 248: 242: 241: 237: 234: 230: 229: 225: 221: 220: 216: 213: 208: 207: 203: 202: 201: 194: 192: 190: 186: 182: 174: 172: 167: 166: 162: 161: 160: 155: 154: 150: 149: 148: 143: 142: 141: 136: 135: 134: 131: 123: 116: 111: 109: 107: 103: 99: 95: 91: 87: 79: 74: 71: 68: 65: 62: 61: 60: 58: 54: 50: 46: 42: 37: 34: 30: 26: 22: 18: 3123: 3119: 3100: 3096: 3075: 3071: 3054: 3050: 3033: 3029: 3012: 3008: 2981: 2977: 2971: 2954: 2950: 2944: 2917: 2911: 2878: 2874: 2862: 2829: 2825: 2815: 2801: 2796: 2785:. Retrieved 2781:the original 2775: 2768: 2759: 2755: 2745: 2712: 2708: 2698: 2673: 2669: 2663: 2646: 2642: 2636: 2614:(5): 53–55. 2611: 2607: 2601: 2576: 2572: 2566: 2533: 2529: 2523: 2490: 2486: 2480: 2455: 2452:Communicatio 2451: 2445: 2436: 2432: 2422: 2413: 2409: 2403: 2362: 2358: 2348: 2307: 2301: 2258: 2254: 2244: 2211: 2207: 2201: 2184: 2180: 2167: 2158: 2152: 2135: 2131: 2125: 2116: 2112: 2099: 2066: 2062: 2055: 2037: 2012: 2008: 1998: 1965: 1961: 1951: 1924: 1920: 1910: 1875: 1871: 1861: 1828: 1824: 1814: 1799: 1766: 1762: 1752: 1741:. Retrieved 1736: 1727: 1692: 1688: 1678: 1646:(1): 50–67. 1643: 1639: 1629: 1596: 1590: 1573: 1567: 1550: 1546: 1539: 1507:(1): 23–43. 1504: 1500: 1494: 1485: 1481: 1475: 1450: 1446: 1440: 1415: 1411: 1405: 1380: 1376: 1347: 1340: 1331: 1321: 1312: 1279: 1275: 1263: 1238: 1234: 1228: 1211: 1207: 1201: 1176: 1172: 1144: 1140: 1134: 1096: 1092: 1014: 1010: 972: 968: 933:(2): 85–92. 930: 926: 920: 903: 899: 893: 854: 850: 840: 832: 781: 776: 772: 769: 760: 747: 734: 727: 716: 713: 704: 690: 686: 673: 660: 656: 652: 648: 639: 617: 615: 608: 596: 592:digitization 580: 571: 567: 558: 549: 540: 531:surveillance 528: 513: 500: 492: 483: 466: 457: 441: 424: 408: 391: 375: 368: 363: 358: 353: 338: 329: 312:Co-ownership 308: 291: 279:social media 276: 272: 261: 252: 239: 238: 227: 226: 218: 217: 211: 205: 204: 198: 188: 184: 178: 170: 164: 163: 158: 152: 151: 146: 138: 137: 127: 105: 101: 83: 38: 24: 20: 16: 15: 2649:(7): 8–13. 2416:(1): 50–61. 2119:(2): 46–62. 975:: 571–595. 777:equilibrium 616:Using CPM, 503:miscarriage 425:Motivation 364:Definition 153:Stakeholder 140:Shareholder 88:focused on 3143:Categories 2809:2402933629 2787:2016-11-16 2643:Work Study 1769:(4): 349. 1743:2022-11-09 1032:1805/21434 806:References 599:overweight 256:Turbulence 80:Background 29:systematic 2936:844725577 2903:214268771 2895:0893-3189 2854:221324726 2846:1051-0974 2737:151394183 2729:1751-3057 2715:: 44–61. 2690:144409401 2558:147096452 2550:0146-3373 2515:145054448 2507:1051-0974 2472:147394173 2458:: 56–74. 2379:1041-0236 2334:cite book 2326:914711198 2275:1041-0236 2083:1461-4448 2029:0747-5632 1982:1532-2890 1943:1083-6101 1902:199173025 1894:2056-3051 1845:0747-5632 1791:143103850 1783:1526-7431 1711:1461-4448 1662:1461-4448 1613:1089-4136 1531:144466085 1522:1805/5627 1467:145434854 1397:143892654 1304:148990355 1296:1051-0974 1255:145799707 1193:145434854 1113:145456689 1057:202249031 1041:2352-250X 1017:: 76–82. 989:141414093 947:143956515 873:1083-6101 766:Criticism 735:Finally, 661:Although 469:dialectic 446:catalyst 429:catalyst 413:catalyst 376:Cultural 359:Category 266:or other 31:research 2805:ProQuest 2628:10885845 2593:35296871 2439:: 26–39. 2387:29565677 2293:31167570 2228:26881478 2091:28460410 1853:45621398 1719:58008319 1621:62793536 1432:35296871 1383:: 6–14. 1326:365–383. 1049:31526974 789:See also 752:Critique 588:e-health 584:HIV/AIDS 546:Blogging 537:Facebook 516:blogging 409:Context 369:Example 287:"friend" 283:Facebook 181:boundary 96:work on 41:metaphor 3159:Privacy 2395:4260003 2284:6893100 2236:4627605 1990:5376628 1670:4942207 795:Privacy 782:degrees 773:balance 564:Twitter 264:alcohol 130:caveats 27:, is a 2934:  2924:  2901:  2893:  2852:  2844:  2807:  2735:  2727:  2688:  2626:  2591:  2556:  2548:  2513:  2505:  2470:  2393:  2385:  2377:  2324:  2314:  2291:  2281:  2273:  2234:  2226:  2089:  2081:  2027:  1988:  1980:  1941:  1900:  1892:  1851:  1843:  1789:  1781:  1717:  1709:  1668:  1660:  1619:  1611:  1529:  1465:  1430:  1395:  1355:  1302:  1294:  1253:  1191:  1111:  1055:  1047:  1039:  987:  945:  871:  757:Values 633:, and 392:Gender 33:theory 2899:S2CID 2850:S2CID 2733:S2CID 2686:S2CID 2624:S2CID 2589:S2CID 2554:S2CID 2511:S2CID 2468:S2CID 2391:S2CID 2232:S2CID 2187:(3). 2177:(PDF) 2109:(PDF) 2087:S2CID 2047:(PDF) 1986:S2CID 1898:S2CID 1849:S2CID 1787:S2CID 1715:S2CID 1666:S2CID 1617:S2CID 1527:S2CID 1463:S2CID 1428:S2CID 1393:S2CID 1300:S2CID 1251:S2CID 1189:S2CID 1109:S2CID 1053:S2CID 985:S2CID 943:S2CID 610:Trust 603:obese 396:core 380:core 268:drugs 2932:OCLC 2922:ISBN 2891:ISSN 2842:ISSN 2762:(1). 2725:ISSN 2546:ISSN 2503:ISSN 2383:PMID 2375:ISSN 2340:link 2322:OCLC 2312:ISBN 2289:PMID 2271:ISSN 2224:PMID 2079:ISSN 2025:ISSN 1978:ISSN 1939:ISSN 1890:ISSN 1841:ISSN 1779:ISSN 1707:ISSN 1658:ISSN 1609:ISSN 1353:ISBN 1292:ISSN 1045:PMID 1037:ISSN 869:ISSN 775:and 601:and 212:thin 3128:doi 3105:doi 3080:doi 3059:doi 3038:doi 3017:doi 2986:doi 2959:doi 2883:doi 2834:doi 2717:doi 2678:doi 2651:doi 2616:doi 2581:doi 2538:doi 2495:doi 2460:doi 2367:doi 2279:PMC 2263:doi 2216:doi 2189:doi 2140:doi 2117:XXV 2071:doi 2017:doi 1970:doi 1929:doi 1880:doi 1833:doi 1771:doi 1697:doi 1648:doi 1601:doi 1578:doi 1555:doi 1517:hdl 1509:doi 1455:doi 1420:doi 1385:doi 1284:doi 1243:doi 1216:doi 1181:doi 1149:doi 1129:gkn 1101:doi 1027:hdl 1019:doi 977:doi 935:doi 908:doi 859:doi 233:own 21:CPM 3145:: 3122:. 3101:36 3099:. 3095:. 3076:17 3074:. 3055:58 3053:. 3034:21 3032:. 3013:26 3011:. 2982:51 2980:. 2955:42 2953:. 2930:. 2897:. 2889:. 2879:34 2877:. 2873:. 2848:. 2840:. 2830:71 2828:. 2824:. 2760:11 2758:. 2754:. 2731:. 2723:. 2713:10 2711:. 2707:. 2684:. 2674:11 2672:. 2647:43 2645:. 2622:. 2612:14 2610:. 2587:. 2577:28 2575:. 2552:. 2544:. 2534:63 2532:. 2509:. 2501:. 2491:65 2489:. 2466:. 2456:42 2454:. 2437:58 2435:. 2431:. 2414:33 2412:. 2389:. 2381:. 2373:. 2363:34 2361:. 2357:. 2336:}} 2332:{{ 2320:. 2287:. 2277:. 2269:. 2259:35 2257:. 2253:. 2230:. 2222:. 2212:31 2210:. 2183:. 2179:. 2136:23 2134:. 2115:. 2111:. 2085:. 2077:. 2067:15 2065:. 2023:. 2013:26 2007:. 1984:. 1976:. 1966:60 1964:. 1960:. 1937:. 1925:17 1923:. 1919:. 1896:. 1888:. 1874:. 1870:. 1847:. 1839:. 1829:29 1827:. 1823:. 1785:. 1777:. 1767:15 1765:. 1761:. 1735:. 1713:. 1705:. 1693:21 1691:. 1687:. 1664:. 1656:. 1644:20 1642:. 1638:. 1615:. 1607:. 1551:62 1549:. 1525:. 1515:. 1505:43 1503:. 1486:59 1484:. 1461:. 1451:20 1449:. 1426:. 1416:28 1414:. 1391:. 1381:13 1379:. 1367:^ 1298:. 1290:. 1280:69 1278:. 1274:. 1249:. 1239:30 1237:. 1212:62 1210:. 1187:. 1177:20 1175:. 1161:^ 1145:30 1143:. 1121:^ 1107:. 1097:35 1095:. 1083:^ 1065:^ 1051:. 1043:. 1035:. 1025:. 1015:31 1009:. 997:^ 983:. 973:25 971:. 967:. 955:^ 941:. 931:23 929:. 902:. 881:^ 867:. 855:12 853:. 849:. 814:^ 629:, 625:, 586:, 3134:. 3130:: 3124:2 3113:. 3107:: 3086:. 3082:: 3065:. 3061:: 3044:. 3040:: 3023:. 3019:: 2992:. 2988:: 2965:. 2961:: 2938:. 2905:. 2885:: 2856:. 2836:: 2790:. 2739:. 2719:: 2692:. 2680:: 2657:. 2653:: 2630:. 2618:: 2595:. 2583:: 2560:. 2540:: 2517:. 2497:: 2474:. 2462:: 2397:. 2369:: 2342:) 2328:. 2295:. 2265:: 2238:. 2218:: 2195:. 2191:: 2185:4 2146:. 2142:: 2093:. 2073:: 2031:. 2019:: 1992:. 1972:: 1945:. 1931:: 1904:. 1882:: 1876:5 1855:. 1835:: 1808:. 1793:. 1773:: 1746:. 1721:. 1699:: 1672:. 1650:: 1623:. 1603:: 1584:. 1580:: 1561:. 1557:: 1533:. 1519:: 1511:: 1469:. 1457:: 1434:. 1422:: 1399:. 1387:: 1361:. 1306:. 1286:: 1257:. 1245:: 1222:. 1218:: 1195:. 1183:: 1155:. 1151:: 1115:. 1103:: 1059:. 1029:: 1021:: 991:. 979:: 949:. 937:: 914:. 910:: 904:1 875:. 861:: 214:. 19:(

Index

systematic
theory
metaphor
Privacy boundaries
rule-based management system
self-disclosures
boundary turbulence
social penetration theory
self-disclosure
Leslie A. Baxter's
relational dialectics theory

caveats
Shareholder
boundary
own
Turbulence
alcohol
drugs
social media
Facebook
"friend"

Co-ownership


dialectic
relational dialectics
stepfamily members
miscarriage

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑