{"title":"From Interpersonal Privacy to HumanTechnological Privacy: Communication Privacy Management Theory Revisited","authors":"Xiaoxiao Meng","doi":"10.55177/tc304825","DOIUrl":null,"url":null,"abstract":"Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing\n on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing\n it to both apply and extend CPM theory’s propositions to human-technology privacy boundary management. Results: CPM theory can be applied to understand the dynamics of human-technology information disclosure and should incorporate technological literacy as a key consideration\n in human-technology privacy boundary management. Legal ties characterize human-technology privacy boundary coordination instead of social ties. Additionally, in human-technology information disclosure contexts, CPM theory should provide guidance regarding managing third parties that may gain\n access to information. Conclusion: CPM theory is the most comprehensive framework for how individuals manage privacy boundaries, be it in interpersonal or human-technology contexts. By considering technology as a property of technological actors instead of an actor itself, CPM theory\n in human-technology contexts becomes a flexible theoretical framework for understanding information disclosure and privacy boundary management, both for existing technologies (e.g., social media, online shopping platforms, artificial intelligence, Internet of Things) and future technologies.","PeriodicalId":46338,"journal":{"name":"Technical Communication","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Technical Communication","FirstCategoryId":"98","ListUrlMain":"https://doi.org/10.55177/tc304825","RegionNum":4,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMMUNICATION","Score":null,"Total":0}
引用次数: 0
Abstract
Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing
on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing
it to both apply and extend CPM theory’s propositions to human-technology privacy boundary management. Results: CPM theory can be applied to understand the dynamics of human-technology information disclosure and should incorporate technological literacy as a key consideration
in human-technology privacy boundary management. Legal ties characterize human-technology privacy boundary coordination instead of social ties. Additionally, in human-technology information disclosure contexts, CPM theory should provide guidance regarding managing third parties that may gain
access to information. Conclusion: CPM theory is the most comprehensive framework for how individuals manage privacy boundaries, be it in interpersonal or human-technology contexts. By considering technology as a property of technological actors instead of an actor itself, CPM theory
in human-technology contexts becomes a flexible theoretical framework for understanding information disclosure and privacy boundary management, both for existing technologies (e.g., social media, online shopping platforms, artificial intelligence, Internet of Things) and future technologies.