Lee, K., & Song, I. (n.d.). Exploring the relationship between user’s intention to manage privacy in OSN and the factors of communication under distress. IConference 2016 Proceedings . doi:10.9776/16302
In Lee’s research paper, Lee and Song identifies and explains how the Communication Privacy Management theory works in contexts of disclosure of information. The theory was established to develop an evidence-based comprehension of the way people make decisions about revealing and concealing private information. The researcher explains that to disclose or conceal an individual’s information could lead to either positive or negative outcomes. Therefore, privacy boundaries need to be established clearly to protect disclosure interests of individuals. The CPM theory according to Lee falls under the constructivist paradigm that explains that every effort made towards protecting the disclosure interests of individuals tries to understand the viewpoint of the subject being observed.
Delegate your assignment to our experts and they will do the rest.
Petronio, S., Helft, P. R., & Child, J. T. (2013). A case of error disclosure: a communication privacy management analysis. Journal of public health research , 2 (3), e30. doi:10.4081/jphr.2013.e30
In understanding better the process of disclosing medical errors to patients, the researcher explains that the case byusing Petronio’s theoretical frame of Communication Privacy Management. Clinicians face the challenge of disclosing an error to patients. This has the ability to reshape thinking about the error disclosure process. CPM implies that a shared privacy boundary exists between the disclose and the recipient of a disclosed information. Sandra Petronio identifies the challenges involved in disclosing vulnerable information and that it is often a complicated experience. The CPM theory, therefore, gives a clear apparatus to see a productive way to achieve a successful disclosure interaction, it is essential, and it is a good patient care in disclosing mistakes and errors to patients.
Petronio, S., & Venetis, M. K. (2017). Communication Privacy Management Theory, Health, and Risk Messaging. Oxford Research Encyclopedia of Communication . doi:10.1093/acrefore/9780190228613.013.513
It is one-sided in understanding the tension that is involved between disclosing private health information and protecting the same information by the owners. Disclosure of information establishes other co-owners of the same information. CPM theory plays a crucial role in understanding the relationship that exists between the privacy of information and the disclosure of that information. CPM also plays a crucial role in the health sector context especially in situations where patients have serious health conditions like HIV/AIDS, Cancer and its care, disclosure of private information will help to elucidate the ways decisions of privacy potentially lead to health risks. CPM is therefore critical in understanding the nature of decision making in the situation of health risks.
Chennamaneni, A., & Taneja, A. (2015). Communication privacy management and self-disclosure on the social media-a case of Facebook. Routledge.
The theoretical framework that the author uses is known as the privacy management theory to assess the different behavior in the social media platforms including the motives of disclosure and privacy concerns as regards to Facebook. The research model aimed at assessing five different online behaviors in Facebook including self-disclosure, boundary permeability, boundary ownership, the motive for use, and privacy concern. The measurements items utilized for the research were drawn from literature material. The method of choice for data analysis was the Partial Least Square (PLS) which analyzed the data for its effectiveness vis-à-vis the normality assumptions. The research found out that behaviors including boundary permeability, boundary ownership, and motive are directly related to the self-disclosure amount. It, therefore, meant that a majority of people using Facebook are driven by the desire for self-disclosure.
Herrman, A. R., & Tenzek, K. E. (2017). Communication Privacy Management: A Thematic Analysis of Revealing and Concealing Eating Disorders in an Online Community. Qualitative Research Reports in Communication, 18(1), 54-63.
The research study also utilized the privacy management theory as the framework of choice. It focused on a website known as the prettythin.com to assess the existing tension between concealing and revealing an eating disorder. Some of the items observed on the website included blogs, narratives, and discussion forums. The data collection led to the accumulation of up to 32 single-spaced pages containing blog posts and narratives written in October 2011. The Communication privacy management tool (CPM) was used in assessment including control, revealing/concealing, management, and boundary turbulence. The primary outcome of the study showed that individuals had the power of their private information and would eventually determine whether to release it or not. Therefore, respondents revealed that an eating disorder was a private disorder and as such, one had the power to control the distribution of information regarding the subject.
Kivunja, C., & Kuyini, A. B. (2017). Understanding and Applying Research Paradigms in Educational Contexts. International Journal of Higher Education , 6(5), 26-41.
The primary theoretical concept utilized in the research study is the research paradigm. The paper utilizes a hermeneutic and ethnographic approach to explain the experiences that lecturers in Research Methods undergo during their research studies. Some of the basic tenets that the author bases the research on include epistemology of a paradigm, ontology of a paradigm, the methodology of a paradigm, and axiology. The authors utilize literature review as the primary method of collecting information to bolster their research. It provides various suggestions on how researchers such as professors and lecturers can arrange their research into paradigms and the various factors determining the choice of an appropriate paradigm for use. In each of the discussed paradigms, the authors also provide the best way to conduct research.
Ledbetter A., Griffin E., & Sparks G (2019).A First Look at Communication Theory. 10 th Edition New York: McGraw-Hill Education.
In a book that utilizes many communication theories, the authors attempt to explain how these frameworks can provide insight into the communicational behavior of people. One of the theories that the authors dissect is known as the Social Penetration Theory postulated by two theorists including Dalmas Taylor and Irwin Altman. One of the issues assessed in the literature review is the ownership and control of private information. According to the outcome of the research, the author concludes that people believe in their right to control their private information. Self-disclosure is regarded as private information and it can either be withdrawn or withheld depending on how best the individual in question deems best.