SELECT AN EDITION:
9th EDITION   10th EDITION

 

Theory Resources

DEEPEN YOUR UNDERSTANDING OF THE THEORIES IN THE 10TH EDITION

 

Resources
by Type










 LINKS


 FURTHER RESOURCES



Instructors can get additional
resources. Read more


New to Theory Resources?
Find out more in this
short video overview (3:01).

Further Resources
10th Edition
CHANGE TO
View by Theory

Scholarly and artistic references from the Instructors Manual and addition to the website


List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12—Communication Privacy Management Theory

In 2013, Journal of Family Communication (Vol. 13, Issue 1) released a special issue exclusively focusing on CPM theory.  Articles of note in that issue include:
  • A status report on the theory (Petronio)
  • Parent/child communication privacy (Toller & McBride)
  • Family finances (Plander)
  • Parental Facebook friend requests (Child & Westermann)
  • Same-sex marriage (Lannutti)

CPM has been applied to a variety of contexts.  In some articles/writings, the theory has gone by the name “Communication Boundary Management” (CBM).


Relational & Family

Erin D. Basinger, Erin C. Wehrman, and Kelly G. McAninch, “Grief Communication and Privacy Rules: Examining the Communication of Individuals Bereaved by the Death of a Family Member,” Journal of Family Communication, Vol. 16, 2016, pp. 285-302.

Erin A. Brummett and Keli Ryan Steuber, “To Reveal or Conceal?: Privacy Management Processes Among Interracial Romantic Partners,” Western Journal of Communication, Vol. 79, 2015, pp. 22-44.

Joshua R. Hammonds, “A Model of Privacy Control: Examining the Criteria That Predict Emerging Adults’ Likelihood to Reveal Private Information to Their Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 591-613.

Erin E. Hollenbaugh and Nichole Egbert, “A Test of Communication Privacy Management Theory in Cross-Sex Friendships,” Ohio Communication Journal, Vol. 47, 2009, pp. 113-136.

Carrie D. Kennedy-Lightsey and Brandi N. Frisby, “Parental Privacy Invasion, Family Communication Patterns, and Perceived Ownership of Private Information,” Communication Reports, Vol. 29, 2016, pp. 75-86.

Andrew M. Ledbetter, Sarah Heiss, Kenny Sibal, Eimi Lev, Michele Battle-Fisher, and Natalie Shubert, “Parental Invasive and Children’s Defensive Behaviors at Home and Away at College: Mediated Communication and Privacy Boundary Management,” Communication Studies, Vol. 61, 2010, pp. 184-204.

Keli Ryan Steuber and Rachel M. McLaren, “Privacy Recalibration in Personal Relationships: Rule Usage Before and After an Incident of Privacy Turbulence,” Communication Quarterly, Vol. 63, 2015, pp. 345-364.

 

LGBTQ Applications

Diana Breshears and Rebecca DiVerniero, “Communication Privacy Management Among Adult Children With Lesbian and Gay Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 573-590.

Rose Helens-Hart, “Females’ (Non)Disclosure of Minority Sexual Identities in the Workplace From a Communication Privacy Management Perspective,” Communication Studies, Vol. 68, 2017, pp. 607-623.

Tim McKenna-Buchanan, Stevie Munz, and Justin Rudnick, “To Be or Not To Be Out in the Classroom: Exploring Communication Privacy Management Strategies of Lesbian, Gay, and Queer College Teachers,” Communication Education, Vol. 64, 2015, pp. 280-300.

Zhiwen Xiao, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen, and Zhengzhu Tang, “Using Communication Privacy Management Theory to Examine HIV Disclosure to Sexual Partners/Spouses Among PLHIV in Guangxi,” AIDS Care, Vol. 27, 2015, pp. 73-82.

 

Computers/ Technology

Jeffrey T. Child, Paul M. Haridakis, and Sandra Petronio, “Blogging Privacy Rule Orientations, Privacy Management, and Content Deletion Practices: The Variability of Online Privacy Management Activity at Different Stages of Social Media Use,” Computers in Human Behavior, Vol. 28, 2012, pp. 1859-1872.

Ralf De Wolf, “Group Privacy Management Strategies and Challenges in Facebook: A Focus Group Study Among Flemish Youth Organizations,” Cyberpsychology,Vol. 10, 2016, pp. 17-32.

Bethany D. Frampton and Jeffrey T. Child, “Friend or Not to Friend: Coworker Facebook Friend Requests as an Application of Communication Privacy Management Theory,” Computers in Human Behavior, Vol. 29, 2013, pp. 2257-2264.

Heath Wesley Hooper, “An Investigation of the Role Communication Privacy Management Theory has in the Development of Social Media Policies,” Sport Journal, 2017, Vol. 19.

Airi Lampinen, “Hosting Together via Couchsurfing: Privacy Management in the Context of Network Hospitality,” International Journal of Communication, Vol. 10, 2016, pp. 1581-1600.

Jessica Vitak, “A Digital Path to Happiness? Applying Communication Privacy Management Theory to Mediated Interactions,” in The Routledge Handbook of Media Use and Well-Being: International Perspectives on Theory and Research on Positive Media Effects, Leonard Reinecke and Mary Beth Oliver (eds.), Routledge/Taylor & Francis Group, New York, 2017, pp. 274-287.

Kenneth C. C. Yang, Amanda Pulido, and Yowei Kang, “Exploring the Relationship between Privacy Concerns and Social Media Use among College Students: A Communication Privacy Management Perspective,” Intercultural Communication Studies, Vol. 25, 2016, pp. 46-62.

 

Workplace & Educational

Stephanie A. Smith and Steven R. Brunner, “To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace,” Management Communication Quarterly, Vol.31, 2017, pp. 429-446.

Jason L. Snyder, “E-Mail Privacy in the Workplace: A Boundary Regulation Perspective,” Journal of Business Communication, Vol. 47, 2010, pp. 266-294.

Jason L. Snyder and Karen M. Cornetto, “Employee Perceptions of E-mail Monitoring from a Boundary Management Perspective,” Communication Studies, Vol. 60, 2009, pp. 476-492.

 

Health Communication/ Cross- cultural applications

Jennifer J. Bute and Tennley A. Vik, “Privacy Management as Unfinished Business: Shifting Boundaries in the Context of Infertility,” Communication Studies, Vol. 61, 2010, pp. 1-20.

Anna R. Herrman and Kelly E. Tenzek, “Communication Privacy Management: A Thematic Analysis of Revealing and Concealing Eating Disorders in an Online Community,” Qualitative Research Reports in Communication, Vol. 18, 2017, pp. 54-63.

Masaki Matsunaga, “Individual Dispositions and Interpersonal Concerns Underlying Bullied Victims’ Self-Disclosure in Japan and the US,” Journal of Social and Personal Relationships, Vol. 27, 2010, pp. 1124-1148.

Nothando Ngwenya, Moraq Farquhar, and Gail Ewing, “Sharing Bad News of a Lung Cancer Diagnosis: Understanding Through Communication Privacy Management Theory,” Psycho-Oncology, Vol. 25, 2016, pp. 913-918.

Rauscher, E. A., & Durham, W. T. (2015). “As Long As You're Sure You Don't Want Any More Children”: Men's Collective Boundary Coordination of Information About Their Affirmative Vasectomy Decision. Communication Studies, Vol. 66, 186-203. doi:10.1080/10510974.2014.930917

Lynsey K. Romo, “How Formerly Overweight and Obese Individuals Negotiate Disclosure of Their Weight Loss. Health Communication,” Vol. 31, 2016, pp. 1145-1154.

Stephanie A. Smith and Steven R. Brunner, “The Great Whoosh: Connecting an Online Personal Health Narrative and Communication Privacy Management,” Health Communication, Vol. 31, 2016, pp. 12-21.



You can access Further Resouces for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



Resources
by Type






 VIDEOS


 ESSAY


 LINKS


 RESOURCES



Instructors can get
additional resources.
Read more

New to Theory
Resources?

Find out more
in this short
video overview
(3:01).

Further Resources
10th Edition
CHANGE TO
View by Theory

Scholarly and artistic references from the Instructors Manual and addition to the website


List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12—Communication Privacy Management Theory

In 2013, Journal of Family Communication (Vol. 13, Issue 1) released a special issue exclusively focusing on CPM theory.  Articles of note in that issue include:
  • A status report on the theory (Petronio)
  • Parent/child communication privacy (Toller & McBride)
  • Family finances (Plander)
  • Parental Facebook friend requests (Child & Westermann)
  • Same-sex marriage (Lannutti)

CPM has been applied to a variety of contexts.  In some articles/writings, the theory has gone by the name “Communication Boundary Management” (CBM).


Relational & Family

Erin D. Basinger, Erin C. Wehrman, and Kelly G. McAninch, “Grief Communication and Privacy Rules: Examining the Communication of Individuals Bereaved by the Death of a Family Member,” Journal of Family Communication, Vol. 16, 2016, pp. 285-302.

Erin A. Brummett and Keli Ryan Steuber, “To Reveal or Conceal?: Privacy Management Processes Among Interracial Romantic Partners,” Western Journal of Communication, Vol. 79, 2015, pp. 22-44.

Joshua R. Hammonds, “A Model of Privacy Control: Examining the Criteria That Predict Emerging Adults’ Likelihood to Reveal Private Information to Their Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 591-613.

Erin E. Hollenbaugh and Nichole Egbert, “A Test of Communication Privacy Management Theory in Cross-Sex Friendships,” Ohio Communication Journal, Vol. 47, 2009, pp. 113-136.

Carrie D. Kennedy-Lightsey and Brandi N. Frisby, “Parental Privacy Invasion, Family Communication Patterns, and Perceived Ownership of Private Information,” Communication Reports, Vol. 29, 2016, pp. 75-86.

Andrew M. Ledbetter, Sarah Heiss, Kenny Sibal, Eimi Lev, Michele Battle-Fisher, and Natalie Shubert, “Parental Invasive and Children’s Defensive Behaviors at Home and Away at College: Mediated Communication and Privacy Boundary Management,” Communication Studies, Vol. 61, 2010, pp. 184-204.

Keli Ryan Steuber and Rachel M. McLaren, “Privacy Recalibration in Personal Relationships: Rule Usage Before and After an Incident of Privacy Turbulence,” Communication Quarterly, Vol. 63, 2015, pp. 345-364.

 

LGBTQ Applications

Diana Breshears and Rebecca DiVerniero, “Communication Privacy Management Among Adult Children With Lesbian and Gay Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 573-590.

Rose Helens-Hart, “Females’ (Non)Disclosure of Minority Sexual Identities in the Workplace From a Communication Privacy Management Perspective,” Communication Studies, Vol. 68, 2017, pp. 607-623.

Tim McKenna-Buchanan, Stevie Munz, and Justin Rudnick, “To Be or Not To Be Out in the Classroom: Exploring Communication Privacy Management Strategies of Lesbian, Gay, and Queer College Teachers,” Communication Education, Vol. 64, 2015, pp. 280-300.

Zhiwen Xiao, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen, and Zhengzhu Tang, “Using Communication Privacy Management Theory to Examine HIV Disclosure to Sexual Partners/Spouses Among PLHIV in Guangxi,” AIDS Care, Vol. 27, 2015, pp. 73-82.

 

Computers/ Technology

Jeffrey T. Child, Paul M. Haridakis, and Sandra Petronio, “Blogging Privacy Rule Orientations, Privacy Management, and Content Deletion Practices: The Variability of Online Privacy Management Activity at Different Stages of Social Media Use,” Computers in Human Behavior, Vol. 28, 2012, pp. 1859-1872.

Ralf De Wolf, “Group Privacy Management Strategies and Challenges in Facebook: A Focus Group Study Among Flemish Youth Organizations,” Cyberpsychology,Vol. 10, 2016, pp. 17-32.

Bethany D. Frampton and Jeffrey T. Child, “Friend or Not to Friend: Coworker Facebook Friend Requests as an Application of Communication Privacy Management Theory,” Computers in Human Behavior, Vol. 29, 2013, pp. 2257-2264.

Heath Wesley Hooper, “An Investigation of the Role Communication Privacy Management Theory has in the Development of Social Media Policies,” Sport Journal, 2017, Vol. 19.

Airi Lampinen, “Hosting Together via Couchsurfing: Privacy Management in the Context of Network Hospitality,” International Journal of Communication, Vol. 10, 2016, pp. 1581-1600.

Jessica Vitak, “A Digital Path to Happiness? Applying Communication Privacy Management Theory to Mediated Interactions,” in The Routledge Handbook of Media Use and Well-Being: International Perspectives on Theory and Research on Positive Media Effects, Leonard Reinecke and Mary Beth Oliver (eds.), Routledge/Taylor & Francis Group, New York, 2017, pp. 274-287.

Kenneth C. C. Yang, Amanda Pulido, and Yowei Kang, “Exploring the Relationship between Privacy Concerns and Social Media Use among College Students: A Communication Privacy Management Perspective,” Intercultural Communication Studies, Vol. 25, 2016, pp. 46-62.

 

Workplace & Educational

Stephanie A. Smith and Steven R. Brunner, “To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace,” Management Communication Quarterly, Vol.31, 2017, pp. 429-446.

Jason L. Snyder, “E-Mail Privacy in the Workplace: A Boundary Regulation Perspective,” Journal of Business Communication, Vol. 47, 2010, pp. 266-294.

Jason L. Snyder and Karen M. Cornetto, “Employee Perceptions of E-mail Monitoring from a Boundary Management Perspective,” Communication Studies, Vol. 60, 2009, pp. 476-492.

 

Health Communication/ Cross- cultural applications

Jennifer J. Bute and Tennley A. Vik, “Privacy Management as Unfinished Business: Shifting Boundaries in the Context of Infertility,” Communication Studies, Vol. 61, 2010, pp. 1-20.

Anna R. Herrman and Kelly E. Tenzek, “Communication Privacy Management: A Thematic Analysis of Revealing and Concealing Eating Disorders in an Online Community,” Qualitative Research Reports in Communication, Vol. 18, 2017, pp. 54-63.

Masaki Matsunaga, “Individual Dispositions and Interpersonal Concerns Underlying Bullied Victims’ Self-Disclosure in Japan and the US,” Journal of Social and Personal Relationships, Vol. 27, 2010, pp. 1124-1148.

Nothando Ngwenya, Moraq Farquhar, and Gail Ewing, “Sharing Bad News of a Lung Cancer Diagnosis: Understanding Through Communication Privacy Management Theory,” Psycho-Oncology, Vol. 25, 2016, pp. 913-918.

Rauscher, E. A., & Durham, W. T. (2015). “As Long As You're Sure You Don't Want Any More Children”: Men's Collective Boundary Coordination of Information About Their Affirmative Vasectomy Decision. Communication Studies, Vol. 66, 186-203. doi:10.1080/10510974.2014.930917

Lynsey K. Romo, “How Formerly Overweight and Obese Individuals Negotiate Disclosure of Their Weight Loss. Health Communication,” Vol. 31, 2016, pp. 1145-1154.

Stephanie A. Smith and Steven R. Brunner, “The Great Whoosh: Connecting an Online Personal Health Narrative and Communication Privacy Management,” Health Communication, Vol. 31, 2016, pp. 12-21.



You can access Further Resouces for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.
Resources available to all users:

  • Theory Overview—abstract of each chapter
  • Self-Help Quizzes—for student preparation
  • Chapter Outlines
  • Key Names—important names and terms in each chapter
  • Conversation Videos—interviews with theorists
  • Application Logs—student application of theories
  • Essay Questions—for student prepatation
  • Suggested Movie Clips—tie-in movie scenese to theories
  • Links—web resources related to each chapter
  • Primary Sources—for each theory with full chapter coverage
  • Further Resources—bibliographic and other suggestions
  • Changes—for each theory, since the previous edition
  • Theory Archive—PDF copies from the last edition in which a theory appeared

Resources available only to registered instructors who are logged in:

  • Discussion Suggestions
  • Exercises & Activities
  • PowerPoint® presentations you can use
  • Short Answer Quizzes—suggested questions and answers
  • Compare Texts—comparison of theories covered in A First Look and ten other textbooks

Information for Instructors. Read more


 

Copyright © Em Griffin 2020 | Web design by Graphic Impact