Unformatted text preview:

Chapter 2 by Child Petronio Comm 209 Exam 3 Five principles about privacy management from CPM pg 23 25 1 Individuals equate private information with personal ownership That is from a behavioral standpoint people feel they own their private information in the same way that they own other possessions For example when individuals disclose or share information on SNS they continue to retain their ownership rights over the information 2 Predicts that because people believe they own their information they also believe that they have the right to control the flow of the information to others Even though individuals may contribute private information to an SNS they still believe that they retain rights and responsibilities to regulate how much of that information is subsequently shared with others 3 Predicts that people develop and use privacy rules to control the flow of information to others For example individuals who have higher or lower self monitoring skills develop different rules governing CMC interactions and privacy management practices The use of privacy rules can be gender specific These rules are driven by motivations and frequently take into account a risk benefit ratio Finally privacy rule development and implantations are often impacted by critical incidents or situations that serve as a catalyst to change existing rules 4 Predicts that once private information is disclosed or others are granted access the information moves from individual ownership to collective ownership Collective boundaries imply a joint responsibility and obligation by the original owner and co owners together to regulate the flow of this information in a mutually agreed upon fashion The original power owner and co owners coordinate the management of information through the use of privacy boundary permeability rules privacy boundary ownership rules and privacy boundary linkage rules CPM stipulates that typically people coordinate three different types of privacy rules to manage a collective held privacy boundary These different types of rules are coordinated to control the extent to which third party dissemination of information may occur from information disclosed within the collective boundary 5 Concerns the prediction that if owners and co owners do not coordinate the privacy rules to regulate information flow disruption will occur and boundary turbulence will result When this type of disruption happens the outcome exposes implicit or taken for granted expectations that have been violated CPM also predicts that this boundary turbulence requires the owners and co owners to recalibrate and readjust privacy management practices because it becomes clear that they are not functioning adequately or as intended When boundary turbulence occurs individuals discover that information they have moved into a collective boundary is not appropriately being managed by the individuals within the collective Thus boundary turbulence occurs when violations disruptions or unintended consequences occur as a result of privacy management practices Family privacy orientation and two types of boundaries pg 27 29 Family privacy orientation refers to the rules that have been developed and endorsed overtime by a family of origin The privacy orientation represents a value structure of the family and is a whole family perspective concerning how they define privacy Family privacy orientation can range from very open to completely closed Typically family privacy orientations serve as a guideline for choices about dissemination of family private information 1 There are internal privacy cells where private information is held and controlled by only certain members These cells shift and change depending on the disclosure and privacy needs of the particular members with the privacy chamber 2 Families also have an external privacy boundary where the whole family ascribes to a rule about what can and cannot be disclosed to outsiders as well as the general level of access to information outsiders are given Boundary crossing pg 32 34 One of the most obvious issues emerging from the impact of social network site use is the challenge of drawing boundary lines that denote where relationships begin and end Essentially these are privacy boundaries that mark ownership of information When there is a transgression or boundary crossing however unintended the person feeling aggrieved makes clear that there has been a breach in some way Situations when boundary crossing takes place is when someone is attempting to manage both personal and professional boundaries but has not yet had the opportunity to negotiate mutually agreed upon piracy rules for how or if such crossing should take place What does it mean to say that Facebook s approach to privacy was initially network centric By default students content was visible to all other students on the same campus but no one else Through a series of redesigns Facebook provided users with controls for determining what could be shared with whom initially allowing them to share with No One Friends Friends of Friends or a specific Network Boyd Hargittai When Facebook became a platform upon which other companies could create applications users content could then be shared with third party developers who used Facebook data as part of the Apps that they provided The company introduced privacy settings to allow users to determine which third parties could access what content when users encountered a message whenever they chose to add an application Over time Facebook introduced the ability to share content with Everyone inside Facebook or not Increasingly the controls got more complex and media reports suggest that users found themselves uncertain about what they meant As Facebook introduced new privacy options over time what was the default setting At each point when Facebook introduced new options for sharing content the default was to share broadly For example when the site introduced a setting that allowed users to choose whether or not their basic profile content would be shared with search engines the default was yes meaning that people s profile content would come up whenever someone searched for their name on Google regardless of whether or not the person searching was logged into Facebook As with many other changes made by Facebook when Facebook chose to make the content available to search engines it simply introduced a new setting public search and enabled sharing to search engines by default


View Full Document

UA COMM 209 - Exam 3

Documents in this Course
Load more
Download Exam 3
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam 3 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam 3 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?