Professional Documents
Culture Documents
Preview-9780791487853 A40633703
Preview-9780791487853 A40633703
Petronio
Boundaries of Privacy
Dialectics of Disclosure
Sandra Petronio
Foreword by Irwin Altman
Boundaries
Offering a practical theory for why people make decisions about revealing and con-
cealing private information, Boundaries of Privacy taps into everyday problems in our
personal relationships, our health concerns, and our work to investigate the way we
manage our private lives. Petronio argues that in addition to owning our own private
information, we also take on the responsibility of guarding other people’s private
information when it is put into our trust. This can often lead to betrayal, errors in
of Privacy
judgment, deception, gossip, and privacy dilemmas. Petronio’s book serves as a guide
Boundaries of Privacy
to understanding why certain decisions about privacy succeed while others fail.
“This is a wonderful book! It is wide-ranging in scope, carefully crafted, and scholarly. DIALECTICS OF
Sandra Petronio has set the stage for research and theorizing for a generation to come.”
— Irwin Altman, University of Utah DISCLOSURE
“Finally, a book exists that not only lays out the privacy and disclosure literature,
but also explains the rules we use to manage our private information. This is a fasci-
nating book that examines the ways we use communication to construct and manage
the multiple boundaries that exist in our daily lives. By examining the rules we use to
balance our private boundaries, Petronio provides scholars additional insights into the
personal management strategies individuals use during interpersonal interactions.”
— Jack Sargent, Kean University
“This book provides a coherent approach from which to understand the disclosure
process itself, not just disclosure decisions. The inclusion of decision rules and turbu-
lence provides new avenues for further exploration. The holistic picture of how disclo-
sure is managed in relationships will advance understanding of management of private
information.” — Kathryn Greene, Rutgers University
SANDRA PETRONIO is Professor in the Department of Communication and
School of Medicine at Wayne State University. She is the editor of Balancing the
Secrets of Private Disclosures.
F O R E WO R D BY I RW I N A LT M A N
Boundaries of Privacy
SUNY series in Communication Studies
Dudley D. Cahn, editor
Boundaries of Privacy
Dialectics of Disclosure
Sandra Petronio
10 9 8 7 6 5 4 3 2 1
To Charles and Kristen, my two anchors
This page intentionally left blank.
Contents
List of Illustrations xi
Foreword xiii
Preface xvii
vii
viii Contents
References 227
xi
This page intentionally left blank.
Foreword
I write this foreword to Sandra Petronio’s book shortly after the terrorist
attacks on September 11, 2001, when thousands of Americans and for-
eigners died, an estimated 10,000 children lost a parent, and thousands of
family members and friends became living victims of that nightmarish day.
All of our lives are now changed forever, it is said, as we in America and,
indeed, people throughout the world, face new challenges, uncertainties,
and vulnerabilities. Our shock is magnified because the American mainland
has not been attacked on such a scale by foreigners since the War of 1812;
Americans are not accustomed to facing invisible and amorphous political
or warlike threats; we are perplexed by the attack in light of our self-image
as a benevolent, freedom-loving, and well-meaning people. And we are
unsure about how to cope with the immediate and long-term specter of ter-
rorism. The September 11th catastrophe and subsequent incidents bring to
the forefront challenges that we and our children and grandchildren will
face in the twenty-first century—issues that link closely with those dis-
cussed so well by Sandra Petronio.
Two interwoven features of our lives today and in the future are tech-
nology and globalization. Aside from their obvious economic and political
aspects, and their military and scientific offshoots, we have already begun
to experience the personal and interpersonal opportunities and problems of
globalization and technology. The opportunities are spectacular and will
surely increase geometrically in the years to come. With computer and
internet technology in hand, anyone—adult or child, healthy or ill person,
rich or poor—can have unlimited access to information on any subject and
from anywhere in the world. Furthermore, interpersonal possibilities are
limitless, as people join chat groups, listservs, communicate with others
everywhere on the globe, carry on e-mail and interactive conversations
with distant relatives and friends, and capitalize on educational exchanges
with others. Surely, such opportunities will multiply in the years to come in
ways that presently are almost unimaginable.
But there is a flip side to these opportunities. Aside from concerns
about centralization of political and economic power, and exploitation
and abuse of human rights, technology and globalization have begun to
xiii
xiv Foreword
for future research that surely will be mined by researchers for years to
come. In my view, it is the most comprehensive conceptual framework
presently available, and is likely to continue to be so for years to come.
Sandra Petronio also advances our thinking by incorporating differ-
ent “levels” or combinations of participants in communication processes.
Whereas earlier research and theorizing on privacy-disclosure focused on
dyads or individuals, Petronio also describes communication within fami-
lies and between family members and outsiders, within and outside work
and social groups, and between many combinations of individuals, dyads,
and others within and across social boundaries. A most complicated set of
dynamics that is carefully enunciated by Petronio. In addition, her analysis
of privacy-disclosure “turbulence,” or breaches of desired communication
patterns, is articulate and systematic.
Sandra Petronio’s treatment of the development of privacy-disclosure
rules is also provocative and worthy of further research, as is the applica-
tion of her conceptual framework to practical issues of medical mistakes,
child abuse, and HIV/AIDS. Throughout the book, and wherever possible,
she buttresses analyses with extensive reviews of relevant literature, that
will be a valuable resource for students, teachers, researchers, and practi-
tioners interested in privacy-disclosure processes.
There is much to be gleaned from this insightful and comprehensive
book, not only in academic pursuits, but also in everyday life, as we all
struggle to cope with the opportunities and dangers of technology, global-
ization, and cultural diversity in these uncertain and turbulent years.
Thanks to Sandra Petronio for her comprehensive, creative, and construc-
tive analysis of privacy-disclosure processes.
Irwin Altman
Distinguished Professor
Department of Psychology
University of Utah
Preface
xvii
xviii Preface
example of theory application. Jason Thomas, Jeff Cook, and Ana Cruz
pushed and pulled the views I had on CPM around in so many different
ways that the theory literally grew before my eyes. A thank you is also in
order for John Caughlin. As a faculty member attending that class, he kept
me honest by limiting my wiggle room when I had no ready answers, and
Bill Seiler, as chair, for his constant support.
During the same summer, I was recognized as the Cowperthwaite
Visiting Scholar at Kent State University, where I also taught a seminar on
privacy and disclosure. This Ph.D. seminar was as instrumental as the one
in Nebraska in stimulating new ideas and inspiring innovative ways to
think about CPM. In addition, the Kent State students provided so many
stories to illustrate the concepts that I will have a ready storehouse for
years to come. I would like to thank Maria Alfano, Angie Planisek, Paula
Horvath, Susan Christopher, Sara Cornette, Kyra Rothenberg, Xi Wang,
Marcia Everett, Keren Eyal, and Narissra Punyanunt. Finally, Rebecca
and Alan Rubin deserve a hearty thank you for their invitation and open-
ing their home.
During the years at Arizona State University, I have worked with
many students on this theory. Everyone contributed; however, two stand
out. First, I would like to acknowledge Mary Claire Morr, who partici-
pated in helping to develop many of the ideas in this book, particularly the
dialectical argument. She has an excellent mind and is a delight as a col-
league. Along with Mary Claire is Susanne Jones. Now at the University of
Wisconsin, Milwaukee, Susanne also is an excellent colleague. She was a
coparticipant in developing the ideas about confidants and enthusiastically
contributed to many of the concepts of CPM theory.
Now at Wayne State University, I am again fortunate to encounter yet
more graduate students who have much to give. In particular, Laura Andea
keenly embraced the ideas of CPM and used her math background to sug-
gest applying set theory to describe coordination. She is a valuable col-
league who has assimilated the ideas of CPM into her vision of everyday
life. David Cichocki, a graduate student at Wayne State, has been a most
able assistant. Both Craig Allen Smith, the chair at Wayne State and Dean
Linda Moore have provided needed support.
Many of my coauthors are featured in this book and their contribu-
tions will become evident as the reader pages through this volume. Thanks
to all of them for their undying faith and constant support. A final note of
thanks to the artist Mircea Teodorescu for supplying artwork for the
book’s cover. He is from Romania studying at Wayne State University for
his Ph.D. in engineering. Mircea worked hard to capture the sense of ever-
changing dynamics of privacy boundaries and his efforts paid off. Thank
you Mircea. Finally, thanks to the SUNY editors, Cathleen Collins, Ronald
Helfrich, and Priscilla Ross. I wish all an enjoyable and productive read.
This page intentionally left blank.
1
Overview of
Communication Privacy Management
1
2 Overview of Communication Privacy Management
HIV/AIDS, or catastrophic illness all confirm the gains they receive from
revealing feelings (Derlega & Barbee, 1998; Pennebaker, 1995). We also
may increase social control, validate our perspectives, and become more
intimate with our relational partners when we disclose (Johnson, 1974).
The balance of privacy and disclosure has meaning because it is vital to the
way we manage our relationships. Revealing is necessary, yet we see evi-
dence that people value privacy when they lament its apparent demise. For
example, Alderman and Kennedy (1995) state that
the issues [of privacy] are especially vital today as more and
more of our privacy is stripped away. Private individuals join
public figures in decrying “tabloid journalism” and complain-
ing that the press can invade lives with impunity. Pro-choice
advocates argue that a woman’s right to make fundamental
decisions is threatened by a hostile and intrusive government.
Increasing concern about crime, terrorism, and calls for stricter
law enforcement have led to measures expanding the authority
of police to enter our homes, search our belongings, and inter-
cept our communication. Moreover, the notion that informa-
tion can be kept secret to any degree may simply vanish in
cyberspace. (p. ix)
Clearly, both disclosure and privacy are important to maintain. Until
recently, few theories have isolated a process to understand how people
manage the relationship between revealing and concealing. This book pre-
sents a theoretical approach that gives us a rule-based system to examine
the way people make decisions about balancing disclosure and privacy.
The theory of Communication Privacy Management (CPM)1 repre-
sents a map that presumes private disclosures are dialectical, that people
make choices about revealing or concealing based on criteria and condi-
tions they perceive as salient, and that individuals fundamentally believe
they have a right to own and regulate access to their private information.
In order to fully grasp the nature of private disclosures, we not only have
to consider the individual who is revealing or concealing, but we also must
focus on how the decision affects other people. Thus, unlike previous
research on “self” disclosure, CPM assumes that others are also central to
discerning the tension between being public and private.
1. The name of the theory has been adjusted in this book from “Communication
Boundary Management” to “Communication Privacy Management,” better
reflecting the focus on private disclosures. Though the theory uses a boundary
metaphor to explain the management process, the name change underscores
that the main thrust of the theory is on private disclosures.
Overview of Communication Privacy Management 3
Figure 1.1
Overview of Communication Privacy Management Theory
THEORETICAL SUPPOSITIONS
CPM theory uses the metaphor of boundaries to illustrate the lines between
being public and private. Within the boundary, people keep private infor-
mation (Petronio, Ellermers, Giles, & Gallois, 1998). However, because we
are social beings, we also reveal private matters to others. In this theory,
privacy is defined as the feeling that one has the right to own private infor-
mation, either personally or collectively; consequently, boundaries mark
ownership lines for individuals. Personal boundaries are those that manage
private information about the self, while collectively held boundaries rep-
resent many different sorts of privacy boundary types (see Figure 1.2).
Collectively held privacy boundaries are such because the informa-
tion is not solely about the self. However, they are differentiated according
to the type of private information that is being regulated. Thus, for collec-
tively held boundaries, the information may be private to a group, dyad,
family, organization, or even a society as a whole. The collective selected
becomes privy to the information that is about the group. Individuals can
be responsible for personal as well as many different kinds of collective pri-
vacy boundaries.
Boundaries may be permeable or impregnable and are linked with
other privacy boundaries. The lines of ownership may be ambiguous or clear.
People work to strengthen their boundaries surrounding private information;
they may also seek to attenuate the borders when they pursue intimacy. The
boundaries may also become weakened by events outside the control of the
owners. Thus, the boundary management may become turbulent when there
is an invasion from outside sources or the management system does not
work. Boundaries function to identify ownership of information leading to
subsequent control over who knows about private matters.
There are life span changes for a person’s privacy boundaries
(Berardo, 1974) (see Figure 1.3). Very young children in U.S. society man-
age small privacy boundaries. Bok (1982) argues that “the ability to deal
with secrecy is rooted in the child’s growing consciousness of identity, and
of being able to act, to intervene, to alter, to resist if need be” (p. 29). Being
Overview of Communication Privacy Management 7
Figure 1.2
Boundary Types: Personal and Collective
unable to differentiate between self and other at an early age and the cog-
nitive complexity of a privacy management process makes it less likely that
children are concerned about the maintenance of private information.
However, families often begin to teach their children rudimentary forms of
privacy rules when they express parameters for disclosure to others. Con-
sequently, while a child is not necessarily concerned with privacy per se,
family members begin to teach the child about privacy and ways to main-
tain it.
As children continue developing their separate identities, so too do
they come to establish boundaries around information they consider per-
sonal. During the adolescent stage, one of the chief issues in the deindivid-
uation process is the formation of privacy borders (Youniss & Smollar,
8 Overview of Communication Privacy Management
Figure 1.3
Boundary Life Span Changes