Preview

Communication Privacy Theory Analysis

Good Essays
Open Document
Open Document
599 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Communication Privacy Theory Analysis
If in Social Judgement Theory we have to think about other people and learn their attitudes in order to influence their thoughts and idea, but in Privacy Management Theory we are talking mostly about our own self. CPM or known as Communication Privacy Theory is a theory that gives an explanation about why people have their own privacy (Petronio, 2002). Sometimes we see on the talk shows, there is some question that being asked about the privacy information about celebrities. In Ellen show for example, when Kylie Jenner is asked about the lip injection that made her famous by Ellen, Kylie show no interest in answering the question and only smile to Ellen.
This situation showed that Kylie wants Ellen to not crossing the boundaries that she states
…show more content…
Furthermore, In order to help people to understand the hypothetical purpose, she applied the analogy to explain the theory. The first analogy also known as Private Boundaries states that people are aware that they have a private information on their own and they acknowledge the information itself belongs to them and doesn't belong to someone else. In the past, privacy information can not be accessed easily because we used to be able to differentiate between private and business matter. But now, with the help of technology and social media people can easily access our private information and cross the private boundaries. Thus, social media can destroy the boundaries of personal life and business matters.
Moving on the second analogy, it states that when people are aware of their private information as their belonging, they began to realize they can also control the information. Being familiar with our private information helps us to control the information itself, and sometimes when people are aware of their own private information, they can control and choose whoever they want to share the information

You May Also Find These Documents Helpful

  • Good Essays

    In Scott Brown’s “Facebook Friendonomics,” he establishes his concern about how social media has changed the perception globally for friendships and the way we value them. To support his argument Brown applies the devices imagery, parallelism, and simile.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the book, privatization and surveillance are what people always concern about. For instance, during a meeting at Fowler Schocken, Harvey asks: “Excuse me, Mr. Schoken, Has security checked this room?” (Cite P.5) This example illustrates that overtime people are more concern about their privacy. They are worry that they have been watched and it won’t be a safe place for them to express their thoughts about a certain subject. As a result, they have to watch their behavioral to avoid any conflict. Moreover, people also fear a process of surveillance in community. For example, Mitch fears that someone working alongside with him at the Chlorella Corporation could report his communications with the Consies (Cite Assessment). He is afraid that if someone in the community reports him, then his plan will be ruined. This type of report is an example of community surveillance. These examples reflect how privatization and surveillance affect people’s behavior…

    • 779 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mckinnell gives some examples about why people should be careful when they are sharing personal information on social media. For example, "A photo of your daughter, for instance, can tell a stalker where she parks her bike, which shortcut she takes home, and what school she attends"(Mckinnell).These kinds of situations give away valuable information of ourselves for someone to harm us. Therefore, the author makes me think that my use of social media has made my life to be unsafe. Also, social media has ultimate control of world, because it has become a tool to know where we are right now. I like Mckinnell's perspective on parents give a lot of freedom to their children at very young age without regarding all the risk they are putting…

    • 862 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The author makes a good point in his article by explaining that the violation of privacy due to technology is not something new. He backs that point up by evidence of two Boston lawyers at the Harvard Law Review who argued that privacy was under attack by inventions and also business methods in 1890.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Born at Midnight Summary

    • 475 Words
    • 2 Pages

    Kylie’s mother (a.k.a the Ice Queen as Kylie calls her) thought Kylie was being rebellious…

    • 475 Words
    • 2 Pages
    Good Essays
  • Good Essays

    She gives her readers a list of effects in the opening passage. Then, she looks at two examples, the technological devices, and online personas, to define the effects of the redefining human connection, relationships communication and the community. She does all this in order, to show how each effect of the online personas, she presents is missing some important element of it. At the end, she presents what she feels is a more definitive cause by showing us the outcome of online personas. Her audience appears to be anyone who would be concerned, about the technological devices and online personas with society and/or in themselves. They would have to agree that these online personas are a serious social problem that needs…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In his essay, “Why privacy is important,” James Rachels argues that in order to “maintain the variety of social relationships with other people that we want to have,” privacy must be thought of as a crucial to our lives (292). However, Rachels disregards the context, and most importantly, our true motives in sharing, and thus offers a less compelling argument.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The concept of privacy needs to be considered in five key areas – bodily observation (what we observe of others), bodily space (that which concerns our personal body), property (that which we own), information (documented and undocumented about ourselves) and thoughts and communication (personal thoughts and feelings). Each of these key areas has levels of privacy invasion acceptable to society. For example, bodily space invasion may be permitted when assisting those who are physically unable to perform a task by themselves.…

    • 637 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    forms, social networking sites, online transactions, et cetera. In his essay, “Why Privacy Matters Even if…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    1.3: Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy partially intersects security, including for instance the concepts of appropriate use, as well as protection, of information.…

    • 2293 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Emerson Self Reliance

    • 376 Words
    • 2 Pages

    According to the first sentence what every person realizes at some moment in his/her education is that envy is ignorance, imitation is suicide,and that he must take himself for better or for worse.…

    • 376 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The protection of civil liberties is privately funded by individual organizations, but should be endorsed by the federal government because it is significantly less expensive than national security expenditures. The American Civil Liberties Union, or the ACLU, is transparent with their stance on privacy, as their website outlines their efforts against surveillance, watchlisting, and other government spying practices (“Privacy and Surveillance,” n.d., para. 4). The total lobbying expenditures—on the issues of privacy and other freedoms—in 2016 was $966,277 (“American Civil Liberties Union,” n.d., para. 2). In contrast, Edward Snowden revealed to the Washington Post that the National Security Agency “was in line to receive $10.5 billion in 2013,”…

    • 156 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Annotated Bib

    • 335 Words
    • 2 Pages

    In this article, John Swartz explains how owners of Facebook fare more concerned with profits than protecting people’s privacy. He also explains the dangers associated with lack of privacy. This article contributes greatly to the argument that smart phones and computers have an overall negative effect on society.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Much has been written about both the importance of confidentiality and information sharing, and people are often confused by what is meant. It can also be confusing trying to decided what it is ok to share and in what circumstances.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Age Of Privacy Analysis

    • 1096 Words
    • 5 Pages

    When speaking about the age of responsibility, there isn’t a milestone birthday to determine whether someone is responsible enough to perform the responsibilities into adulthood. In some cultures, rites are what determine the responsibility one can manage, to all states, age is the key to true adulthood. These traditions can be seen or found in many cultural events, such as Quinceaneras. Identifying the age of responsibility by law, shows how the bombardment of our rights add up from juveniles, to adults, at the age of 18. But the question is, what if people under the age limit of 18 earn the same rights at an earlier age of maturity? There are many ways this can be proven, for example, neuroscientists. This would be…

    • 1096 Words
    • 5 Pages
    Good Essays