{"title":"从人际隐私到人类技术隐私:重新审视通信隐私管理理论","authors":"Xiaoxiao Meng","doi":"10.55177/tc304825","DOIUrl":null,"url":null,"abstract":"Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing\n on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing\n it to both apply and extend CPM theory’s propositions to human-technology privacy boundary management. Results: CPM theory can be applied to understand the dynamics of human-technology information disclosure and should incorporate technological literacy as a key consideration\n in human-technology privacy boundary management. Legal ties characterize human-technology privacy boundary coordination instead of social ties. Additionally, in human-technology information disclosure contexts, CPM theory should provide guidance regarding managing third parties that may gain\n access to information. Conclusion: CPM theory is the most comprehensive framework for how individuals manage privacy boundaries, be it in interpersonal or human-technology contexts. By considering technology as a property of technological actors instead of an actor itself, CPM theory\n in human-technology contexts becomes a flexible theoretical framework for understanding information disclosure and privacy boundary management, both for existing technologies (e.g., social media, online shopping platforms, artificial intelligence, Internet of Things) and future technologies.","PeriodicalId":46338,"journal":{"name":"Technical Communication","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"From Interpersonal Privacy to HumanTechnological Privacy: Communication Privacy Management Theory Revisited\",\"authors\":\"Xiaoxiao Meng\",\"doi\":\"10.55177/tc304825\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing\\n on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing\\n it to both apply and extend CPM theory’s propositions to human-technology privacy boundary management. Results: CPM theory can be applied to understand the dynamics of human-technology information disclosure and should incorporate technological literacy as a key consideration\\n in human-technology privacy boundary management. Legal ties characterize human-technology privacy boundary coordination instead of social ties. Additionally, in human-technology information disclosure contexts, CPM theory should provide guidance regarding managing third parties that may gain\\n access to information. Conclusion: CPM theory is the most comprehensive framework for how individuals manage privacy boundaries, be it in interpersonal or human-technology contexts. By considering technology as a property of technological actors instead of an actor itself, CPM theory\\n in human-technology contexts becomes a flexible theoretical framework for understanding information disclosure and privacy boundary management, both for existing technologies (e.g., social media, online shopping platforms, artificial intelligence, Internet of Things) and future technologies.\",\"PeriodicalId\":46338,\"journal\":{\"name\":\"Technical Communication\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2024-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Technical Communication\",\"FirstCategoryId\":\"98\",\"ListUrlMain\":\"https://doi.org/10.55177/tc304825\",\"RegionNum\":4,\"RegionCategory\":\"文学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMMUNICATION\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Technical Communication","FirstCategoryId":"98","ListUrlMain":"https://doi.org/10.55177/tc304825","RegionNum":4,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMMUNICATION","Score":null,"Total":0}
From Interpersonal Privacy to HumanTechnological Privacy: Communication Privacy Management Theory Revisited
Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing
on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing
it to both apply and extend CPM theory’s propositions to human-technology privacy boundary management. Results: CPM theory can be applied to understand the dynamics of human-technology information disclosure and should incorporate technological literacy as a key consideration
in human-technology privacy boundary management. Legal ties characterize human-technology privacy boundary coordination instead of social ties. Additionally, in human-technology information disclosure contexts, CPM theory should provide guidance regarding managing third parties that may gain
access to information. Conclusion: CPM theory is the most comprehensive framework for how individuals manage privacy boundaries, be it in interpersonal or human-technology contexts. By considering technology as a property of technological actors instead of an actor itself, CPM theory
in human-technology contexts becomes a flexible theoretical framework for understanding information disclosure and privacy boundary management, both for existing technologies (e.g., social media, online shopping platforms, artificial intelligence, Internet of Things) and future technologies.