Academic literature on the topic 'Communication Privacy Management theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Communication Privacy Management theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Communication Privacy Management theory"

1

Petersons, Andris, and Ilkhom Khalimzoda. "Communication privacy management of students in Latvia." Problems and Perspectives in Management 14, no. 2 (2016): 222–27. http://dx.doi.org/10.21511/ppm.14(2-1).2016.11.

Full text
Abstract:
The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronio’s theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to disclose it is often confronted with numerous privacy dilemmas and issues regarding their secureness, especially in universities where peers are young with different cultural backgrounds. This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management theory. Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among students
APA, Harvard, Vancouver, ISO, and other styles
2

Petronio, Sandra. "Brief Status Report on Communication Privacy Management Theory." Journal of Family Communication 13, no. 1 (2013): 6–14. http://dx.doi.org/10.1080/15267431.2013.743426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Petronio, Sandra. "Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?" Journal of Family Theory & Review 2, no. 3 (2010): 175–96. http://dx.doi.org/10.1111/j.1756-2589.2010.00052.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Petronio, Sandra, and Jeffrey T. Child. "Conceptualization and operationalization: utility of communication privacy management theory." Current Opinion in Psychology 31 (February 2020): 76–82. http://dx.doi.org/10.1016/j.copsyc.2019.08.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Serewicz, Mary Claire Morr. "Introducing the Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 2–5. http://dx.doi.org/10.1080/15267431.2013.743424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kennedy-Lightsey, Carrie D., Matthew M. Martin, Michelle Thompson, Kimberly Leezer Himes, and Brooke Zackery Clingerman. "Communication Privacy Management Theory: Exploring Coordination and Ownership Between Friends." Communication Quarterly 60, no. 5 (2012): 665–80. http://dx.doi.org/10.1080/01463373.2012.725004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Petronio, Sandra. "Welcome to the Journal of Family Communication Special Issue on Communication Privacy Management Theory and Family Privacy Regulation." Journal of Family Communication 13, no. 1 (2013): 1. http://dx.doi.org/10.1080/15267431.2013.743418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Stephanie A., and Steven R. Brunner. "To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace." Management Communication Quarterly 31, no. 3 (2017): 429–46. http://dx.doi.org/10.1177/0893318917692896.

Full text
Abstract:
A sample of 103 full-time employees from various organizations and industries completed an online, open-ended survey to explore and understand the decisions people make to manage their private disclosures at work. Communication privacy management theory was used to understand the management of private information. Results indicate that core and catalyst criteria motivate people to reveal/conceal at work, such as boundary maintenance based on organizational culture, relational considerations, a desire for feedback, and risk/benefit considerations. People also used implicit/explicit rules, reiteration of privacy rules, and retaliation to limit and respond to turbulence. The theoretical and practical implications of these findings are discussed along with limitations and directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
9

Petronio, Sandra, Paul R. Helft, and Jeffrey T. Child. "A case of error disclosure: a communication privacy management analysis." Journal of Public Health Research 2, no. 3 (2013): 30. http://dx.doi.org/10.4081/jphr.2013.e30.

Full text
Abstract:
To better understand the process of disclosing medical errors to patients, this research offers a case analysis using Petronios’s theoretical frame of Communication Privacy Management (CPM). Given the resistance clinicians often feel about error disclosure, insights into the way choices are made by the clinicians in telling patients about the mistake has the potential to address reasons for resistance. Applying the evidenced-based CPM theory, developed over the last 35 years and dedicated to studying disclosure phenomenon, to disclosing medical mistakes potentially has the ability to reshape thinking about the error disclosure process. Using a composite case representing a surgical mistake, analysis based on CPM theory is offered to gain insights into conversational routines and disclosure management choices of revealing a medical error. The results of this analysis show that an underlying assumption of health information ownership by the patient and family can be at odds with the way the clinician tends to control disclosure about the error. In addition, the case analysis illustrates that there are embedded patterns of disclosure that emerge out of conversations the clinician has with the patient and the patient’s family members. These patterns unfold privacy management decisions on the part of the clinician that impact how the patient is told about the error and the way that patients interpret the meaning of the disclosure. These findings suggest the need for a better understanding of how patients manage their private health information in relationship to their expectations for the way they see the clinician caring for or controlling their health information about errors.
APA, Harvard, Vancouver, ISO, and other styles
10

McNealy, Jasmine, and Michaela Devyn Mullis. "Tea and turbulence: Communication privacy management theory and online celebrity gossip forums." Computers in Human Behavior 92 (March 2019): 110–18. http://dx.doi.org/10.1016/j.chb.2018.10.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography