Communication Privacy Management Theory
- Sandra PetronioSandra PetronioDepartment of Communication Studies, Indiana University-Purdue University
- and Rachael HernandezRachael HernandezDepartment of Communication Studies, Indiana University-Purdue University
Have you ever wondered why a complete stranger sitting next to you on a plane would tell you about a recent cancer diagnosis? Why your parents never disclosed that you were adopted, feeling shocked when you accidently find out as an adult? These and many other actions reflect decisions individuals make about managing their private information. Being aware of how individuals navigate decisions to disclose or protect their private information provides useful insights that aid in the development and sustainability of relationships with others. Given privacy plays an integral role in everyone’s life, knowing more about privacy management is critical. communication privacy management (CPM) theory was first introduced by Sandra Petronio in 2002. CPM is evidence-based and accordingly provides a dependable understanding of how decisions are made to disclose and protect private information. This theory uses plain language to understand privacy management in everyday life. CPM focuses on the relationship people have with each other in communicative contexts, such as face-to-face interactions, on social media, and in dyads or groups. CPM theory is based on a communicative-social behavioral perspective and not necessarily a legal point of view. CPM theory illustrates that privacy is not paradoxical but is sustainable through the process of a privacy management system used in everyday life. The theory of CPM has been employed in a number of contexts shedding light on antecedents, mechanisms, and outcomes of private information management. In addition, a number of researchers across multiple countries, such as the Netherlands, United Kingdom, Japan, Kenya, South Korea, and the United States, have used CPM theory in their research investigations. Learning more about the system of private information management allows for a better understanding of how people navigate managing their private information when others are involved. Literature illustrates patterns of privacy management and demonstrates the challenges as well as the positive outcomes of the way individuals regulate their private information.