19 Jan 2023

131

Communication Privacy Management Annotated Bibliography

Format: APA

Academic level: College

Paper type: Annotated Bibliography

Words: 861

Pages: 3

Downloads: 0

Lee, K., & Song, I. (n.d.). Exploring the relationship between user’s intention to manage privacy in OSN and the factors of communication under distress. IConference 2016 Proceedings . doi:10.9776/16302 

In Lee’s research paper, Lee and Song identifies and explains how the Communication Privacy Management theory works in contexts of disclosure of information. The theory was established to develop an evidence-based comprehension of the way people make decisions about revealing and concealing private information. The researcher explains that to disclose or conceal an individual’s information could lead to either positive or negative outcomes. Therefore, privacy boundaries need to be established clearly to protect disclosure interests of individuals. The CPM theory according to Lee falls under the constructivist paradigm that explains that every effort made towards protecting the disclosure interests of individuals tries to understand the viewpoint of the subject being observed. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Petronio, S., Helft, P. R., & Child, J. T. (2013). A case of error disclosure: a communication privacy management analysis. Journal of public health research , 2 (3), e30. doi:10.4081/jphr.2013.e30 

In understanding better the process of disclosing medical errors to patients, the researcher explains that the case byusing Petronio’s theoretical frame of Communication Privacy Management. Clinicians face the challenge of disclosing an error to patients. This has the ability to reshape thinking about the error disclosure process. CPM implies that a shared privacy boundary exists between the disclose and the recipient of a disclosed information. Sandra Petronio identifies the challenges involved in disclosing vulnerable information and that it is often a complicated experience. The CPM theory, therefore, gives a clear apparatus to see a productive way to achieve a successful disclosure interaction, it is essential, and it is a good patient care in disclosing mistakes and errors to patients. 

Petronio, S., & Venetis, M. K. (2017). Communication Privacy Management Theory, Health, and Risk Messaging. Oxford Research Encyclopedia of Communication . doi:10.1093/acrefore/9780190228613.013.513 

It is one-sided in understanding the tension that is involved between disclosing private health information and protecting the same information by the owners. Disclosure of information establishes other co-owners of the same information. CPM theory plays a crucial role in understanding the relationship that exists between the privacy of information and the disclosure of that information. CPM also plays a crucial role in the health sector context especially in situations where patients have serious health conditions like HIV/AIDS, Cancer and its care, disclosure of private information will help to elucidate the ways decisions of privacy potentially lead to health risks. CPM is therefore critical in understanding the nature of decision making in the situation of health risks. 

Chennamaneni, A., & Taneja, A. (2015). Communication privacy management and self-disclosure on the social media-a case of Facebook. Routledge. 

The theoretical framework that the author uses is known as the privacy management theory to assess the different behavior in the social media platforms including the motives of disclosure and privacy concerns as regards to Facebook. The research model aimed at assessing five different online behaviors in Facebook including self-disclosure, boundary permeability, boundary ownership, the motive for use, and privacy concern. The measurements items utilized for the research were drawn from literature material. The method of choice for data analysis was the Partial Least Square (PLS) which analyzed the data for its effectiveness vis-à-vis the normality assumptions. The research found out that behaviors including boundary permeability, boundary ownership, and motive are directly related to the self-disclosure amount. It, therefore, meant that a majority of people using Facebook are driven by the desire for self-disclosure. 

Herrman, A. R., & Tenzek, K. E. (2017). Communication Privacy Management: A Thematic Analysis of Revealing and Concealing Eating Disorders in an Online Community. Qualitative Research Reports in Communication, 18(1), 54-63. 

The research study also utilized the privacy management theory as the framework of choice. It focused on a website known as the prettythin.com to assess the existing tension between concealing and revealing an eating disorder. Some of the items observed on the website included blogs, narratives, and discussion forums. The data collection led to the accumulation of up to 32 single-spaced pages containing blog posts and narratives written in October 2011. The Communication privacy management tool (CPM) was used in assessment including control, revealing/concealing, management, and boundary turbulence. The primary outcome of the study showed that individuals had the power of their private information and would eventually determine whether to release it or not. Therefore, respondents revealed that an eating disorder was a private disorder and as such, one had the power to control the distribution of information regarding the subject. 

Kivunja, C., & Kuyini, A. B. (2017). Understanding and Applying Research Paradigms in Educational Contexts. International Journal of Higher Education , 6(5), 26-41. 

The primary theoretical concept utilized in the research study is the research paradigm. The paper utilizes a hermeneutic and ethnographic approach to explain the experiences that lecturers in Research Methods undergo during their research studies. Some of the basic tenets that the author bases the research on include epistemology of a paradigm, ontology of a paradigm, the methodology of a paradigm, and axiology. The authors utilize literature review as the primary method of collecting information to bolster their research. It provides various suggestions on how researchers such as professors and lecturers can arrange their research into paradigms and the various factors determining the choice of an appropriate paradigm for use. In each of the discussed paradigms, the authors also provide the best way to conduct research. 

Ledbetter A., Griffin E., & Sparks G (2019).A First Look at Communication Theory. 10 th Edition New York: McGraw-Hill Education. 

In a book that utilizes many communication theories, the authors attempt to explain how these frameworks can provide insight into the communicational behavior of people. One of the theories that the authors dissect is known as the Social Penetration Theory postulated by two theorists including Dalmas Taylor and Irwin Altman. One of the issues assessed in the literature review is the ownership and control of private information. According to the outcome of the research, the author concludes that people believe in their right to control their private information. Self-disclosure is regarded as private information and it can either be withdrawn or withheld depending on how best the individual in question deems best. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Communication Privacy Management Annotated Bibliography.
https://studybounty.com/communication-privacy-management-annotated-bibliography

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

What Makes an Effective Executive?

Contrary to popular opinion that all executives are leaders, Peter Drucker presents a different view pointing out that not all executives are leaders, but most of the executives are only made effective through eight...

Words: 705

Pages: 2

Views: 418

Student Satisfaction in Higher Education

Advanced educational institutions are perpetually keen on the improvement of instruments that empower them to assess and deal with the desires of their students with the reason for drawing in and keeping them...

Words: 1336

Pages: 5

Views: 125

Importance of friends in an individual’s life

Friends are seen as vital components of an individual’s life because they come to the rescue when one is in a crisis by providing emotional and physical support. The relationships made between lovers, friends, and...

Words: 580

Pages: 2

Views: 62

Regulatory and Imaginative Functions of Language

I use the regulatory and imaginative functions of language mostly when I am at home. The regulatory function applies when I am asking someone to do something. For instance, statements such as; pass the salt, turn on...

Words: 258

Pages: 1

Views: 156

Quality Journalism Ridiculed as Fake News

All Fourth estate institutions have a level of biasness when it comes to different stories that are disseminated to the public domain: this level of bias dictates whether a media house will take a conservative or...

Words: 1346

Pages: 5

Views: 412

Mean Girls: The Movie That Defined a Generation

The Victorian era saw the start of feminism that would proliferate in the 1970s. Feminists were fed-up with the continued gender discriminations that depicted them as inferior to their male colleagues (Han, 2017)....

Words: 1508

Pages: 5

Views: 157

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration