From Interpersonal Privacy to HumanTechnological Privacy: Communication Privacy Management Theory Revisited

IF 1.5 4区 文学 Q2 COMMUNICATION
Xiaoxiao Meng
{"title":"From Interpersonal Privacy to HumanTechnological Privacy: Communication Privacy Management Theory Revisited","authors":"Xiaoxiao Meng","doi":"10.55177/tc304825","DOIUrl":null,"url":null,"abstract":"Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing\n on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing\n it to both apply and extend CPM theory’s propositions to human-technology privacy boundary management. Results: CPM theory can be applied to understand the dynamics of human-technology information disclosure and should incorporate technological literacy as a key consideration\n in human-technology privacy boundary management. Legal ties characterize human-technology privacy boundary coordination instead of social ties. Additionally, in human-technology information disclosure contexts, CPM theory should provide guidance regarding managing third parties that may gain\n access to information. Conclusion: CPM theory is the most comprehensive framework for how individuals manage privacy boundaries, be it in interpersonal or human-technology contexts. By considering technology as a property of technological actors instead of an actor itself, CPM theory\n in human-technology contexts becomes a flexible theoretical framework for understanding information disclosure and privacy boundary management, both for existing technologies (e.g., social media, online shopping platforms, artificial intelligence, Internet of Things) and future technologies.","PeriodicalId":46338,"journal":{"name":"Technical Communication","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Technical Communication","FirstCategoryId":"98","ListUrlMain":"https://doi.org/10.55177/tc304825","RegionNum":4,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMMUNICATION","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing it to both apply and extend CPM theory’s propositions to human-technology privacy boundary management. Results: CPM theory can be applied to understand the dynamics of human-technology information disclosure and should incorporate technological literacy as a key consideration in human-technology privacy boundary management. Legal ties characterize human-technology privacy boundary coordination instead of social ties. Additionally, in human-technology information disclosure contexts, CPM theory should provide guidance regarding managing third parties that may gain access to information. Conclusion: CPM theory is the most comprehensive framework for how individuals manage privacy boundaries, be it in interpersonal or human-technology contexts. By considering technology as a property of technological actors instead of an actor itself, CPM theory in human-technology contexts becomes a flexible theoretical framework for understanding information disclosure and privacy boundary management, both for existing technologies (e.g., social media, online shopping platforms, artificial intelligence, Internet of Things) and future technologies.
从人际隐私到人类技术隐私:重新审视通信隐私管理理论
目的:传播隐私管理(CPM)理论是解释人际传播中披露和隐藏隐私信息之间矛盾的一个重要理论。本文通过考虑人际信息披露和人与技术信息披露的差异,并借鉴与隐私和技术相关的现有研究成果,提出了 CPM 理论作为人与技术隐私边界管理的广泛理论框架。研究方法:本研究采用一种推测性理论方法,借鉴现有文献并加以综合,将 CPM 理论的命题应用于人类-技术隐私边界管理并加以扩展。研究结果CPM 理论可用于理解人类-技术信息披露的动态,并应将技术素养作为人类-技术隐私边界管理的一个关键考虑因素。人与技术隐私边界协调的特点是法律关系,而不是社会关系。此外,在人类-技术信息披露的背景下,CPM 理论应为管理可能获取信息的第三方提供指导。结论:CPM 理论是个人如何管理隐私边界的最全面的框架,无论是在人际交往还是在人类-技术背景下。通过将技术视为技术行为者的属性而非行为者本身,CPM 理论在人类-技术语境中成为理解信息披露和隐私边界管理的灵活理论框架,既适用于现有技术(如社交媒体、在线购物平台、人工智能、物联网),也适用于未来技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Technical Communication
Technical Communication COMMUNICATION-
CiteScore
1.40
自引率
20.00%
发文量
15
文献相关原料
公司名称 产品信息 采购帮参考价格
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信