The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.
Resources available to all users:
Resources available only to registered instructors who are logged in:
Information for Instructors. Read more
Resources
by Type
Instructors can get additional
resources. Read more
New to Theory Resources?
Find out more in this
short video overview (3:01).
Scholarly and artistic references from the Instructors Manual and addition to the website
List mode: Normal (click on theory name to show detail) | Show All details | Clear details
Chapter 12—Communication Privacy Management Theory
In 2013, Journal of Family Communication (Vol. 13, Issue 1) released a special issue exclusively focusing on CPM theory. Articles of note in that issue include:
CPM has been applied to a variety of contexts. In some articles/writings, the theory has gone by the name “Communication Boundary Management” (CBM).
Relational & Family
Erin D. Basinger, Erin C. Wehrman, and Kelly G. McAninch, “Grief Communication and Privacy Rules: Examining the Communication of Individuals Bereaved by the Death of a Family Member,” Journal of Family Communication, Vol. 16, 2016, pp. 285-302.
Erin A. Brummett and Keli Ryan Steuber, “To Reveal or Conceal?: Privacy Management Processes Among Interracial Romantic Partners,” Western Journal of Communication, Vol. 79, 2015, pp. 22-44.
Joshua R. Hammonds, “A Model of Privacy Control: Examining the Criteria That Predict Emerging Adults’ Likelihood to Reveal Private Information to Their Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 591-613.
Erin E. Hollenbaugh and Nichole Egbert, “A Test of Communication Privacy Management Theory in Cross-Sex Friendships,” Ohio Communication Journal, Vol. 47, 2009, pp. 113-136.
Carrie D. Kennedy-Lightsey and Brandi N. Frisby, “Parental Privacy Invasion, Family Communication Patterns, and Perceived Ownership of Private Information,” Communication Reports, Vol. 29, 2016, pp. 75-86.
Andrew M. Ledbetter, Sarah Heiss, Kenny Sibal, Eimi Lev, Michele Battle-Fisher, and Natalie Shubert, “Parental Invasive and Children’s Defensive Behaviors at Home and Away at College: Mediated Communication and Privacy Boundary Management,” Communication Studies, Vol. 61, 2010, pp. 184-204.
Keli Ryan Steuber and Rachel M. McLaren, “Privacy Recalibration in Personal Relationships: Rule Usage Before and After an Incident of Privacy Turbulence,” Communication Quarterly, Vol. 63, 2015, pp. 345-364.
LGBTQ Applications
Diana Breshears and Rebecca DiVerniero, “Communication Privacy Management Among Adult Children With Lesbian and Gay Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 573-590.
Rose Helens-Hart, “Females’ (Non)Disclosure of Minority Sexual Identities in the Workplace From a Communication Privacy Management Perspective,” Communication Studies, Vol. 68, 2017, pp. 607-623.
Tim McKenna-Buchanan, Stevie Munz, and Justin Rudnick, “To Be or Not To Be Out in the Classroom: Exploring Communication Privacy Management Strategies of Lesbian, Gay, and Queer College Teachers,” Communication Education, Vol. 64, 2015, pp. 280-300.
Zhiwen Xiao, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen, and Zhengzhu Tang, “Using Communication Privacy Management Theory to Examine HIV Disclosure to Sexual Partners/Spouses Among PLHIV in Guangxi,” AIDS Care, Vol. 27, 2015, pp. 73-82.
Computers/ Technology
Jeffrey T. Child, Paul M. Haridakis, and Sandra Petronio, “Blogging Privacy Rule Orientations, Privacy Management, and Content Deletion Practices: The Variability of Online Privacy Management Activity at Different Stages of Social Media Use,” Computers in Human Behavior, Vol. 28, 2012, pp. 1859-1872.
Ralf De Wolf, “Group Privacy Management Strategies and Challenges in Facebook: A Focus Group Study Among Flemish Youth Organizations,” Cyberpsychology,Vol. 10, 2016, pp. 17-32.
Bethany D. Frampton and Jeffrey T. Child, “Friend or Not to Friend: Coworker Facebook Friend Requests as an Application of Communication Privacy Management Theory,” Computers in Human Behavior, Vol. 29, 2013, pp. 2257-2264.
Heath Wesley Hooper, “An Investigation of the Role Communication Privacy Management Theory has in the Development of Social Media Policies,” Sport Journal, 2017, Vol. 19.
Airi Lampinen, “Hosting Together via Couchsurfing: Privacy Management in the Context of Network Hospitality,” International Journal of Communication, Vol. 10, 2016, pp. 1581-1600.
Jessica Vitak, “A Digital Path to Happiness? Applying Communication Privacy Management Theory to Mediated Interactions,” in The Routledge Handbook of Media Use and Well-Being: International Perspectives on Theory and Research on Positive Media Effects, Leonard Reinecke and Mary Beth Oliver (eds.), Routledge/Taylor & Francis Group, New York, 2017, pp. 274-287.
Kenneth C. C. Yang, Amanda Pulido, and Yowei Kang, “Exploring the Relationship between Privacy Concerns and Social Media Use among College Students: A Communication Privacy Management Perspective,” Intercultural Communication Studies, Vol. 25, 2016, pp. 46-62.
Workplace & Educational
Stephanie A. Smith and Steven R. Brunner, “To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace,” Management Communication Quarterly, Vol.31, 2017, pp. 429-446.
Jason L. Snyder, “E-Mail Privacy in the Workplace: A Boundary Regulation Perspective,” Journal of Business Communication, Vol. 47, 2010, pp. 266-294.
Jason L. Snyder and Karen M. Cornetto, “Employee Perceptions of E-mail Monitoring from a Boundary Management Perspective,” Communication Studies, Vol. 60, 2009, pp. 476-492.
Health Communication/ Cross- cultural applications
Jennifer J. Bute and Tennley A. Vik, “Privacy Management as Unfinished Business: Shifting Boundaries in the Context of Infertility,” Communication Studies, Vol. 61, 2010, pp. 1-20.
Anna R. Herrman and Kelly E. Tenzek, “Communication Privacy Management: A Thematic Analysis of Revealing and Concealing Eating Disorders in an Online Community,” Qualitative Research Reports in Communication, Vol. 18, 2017, pp. 54-63.
Masaki Matsunaga, “Individual Dispositions and Interpersonal Concerns Underlying Bullied Victims’ Self-Disclosure in Japan and the US,” Journal of Social and Personal Relationships, Vol. 27, 2010, pp. 1124-1148.
Nothando Ngwenya, Moraq Farquhar, and Gail Ewing, “Sharing Bad News of a Lung Cancer Diagnosis: Understanding Through Communication Privacy Management Theory,” Psycho-Oncology, Vol. 25, 2016, pp. 913-918.
Rauscher, E. A., & Durham, W. T. (2015). “As Long As You're Sure You Don't Want Any More Children”: Men's Collective Boundary Coordination of Information About Their Affirmative Vasectomy Decision. Communication Studies, Vol. 66, 186-203. doi:10.1080/10510974.2014.930917
Lynsey K. Romo, “How Formerly Overweight and Obese Individuals Negotiate Disclosure of Their Weight Loss. Health Communication,” Vol. 31, 2016, pp. 1145-1154.
Stephanie A. Smith and Steven R. Brunner, “The Great Whoosh: Connecting an Online Personal Health Narrative and Communication Privacy Management,” Health Communication, Vol. 31, 2016, pp. 12-21.
You can access Further Resouces for a particular chapter in several ways:
Resources
by Type
Instructors can get
additional resources.
Read more
New to Theory
Resources?
Find out more
in this short
video overview
(3:01).
Scholarly and artistic references from the Instructors Manual and addition to the website
List mode: Normal (click on theory name to show detail) | Show All details | Clear details
Chapter 12—Communication Privacy Management Theory
In 2013, Journal of Family Communication (Vol. 13, Issue 1) released a special issue exclusively focusing on CPM theory. Articles of note in that issue include:
CPM has been applied to a variety of contexts. In some articles/writings, the theory has gone by the name “Communication Boundary Management” (CBM).
Relational & Family
Erin D. Basinger, Erin C. Wehrman, and Kelly G. McAninch, “Grief Communication and Privacy Rules: Examining the Communication of Individuals Bereaved by the Death of a Family Member,” Journal of Family Communication, Vol. 16, 2016, pp. 285-302.
Erin A. Brummett and Keli Ryan Steuber, “To Reveal or Conceal?: Privacy Management Processes Among Interracial Romantic Partners,” Western Journal of Communication, Vol. 79, 2015, pp. 22-44.
Joshua R. Hammonds, “A Model of Privacy Control: Examining the Criteria That Predict Emerging Adults’ Likelihood to Reveal Private Information to Their Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 591-613.
Erin E. Hollenbaugh and Nichole Egbert, “A Test of Communication Privacy Management Theory in Cross-Sex Friendships,” Ohio Communication Journal, Vol. 47, 2009, pp. 113-136.
Carrie D. Kennedy-Lightsey and Brandi N. Frisby, “Parental Privacy Invasion, Family Communication Patterns, and Perceived Ownership of Private Information,” Communication Reports, Vol. 29, 2016, pp. 75-86.
Andrew M. Ledbetter, Sarah Heiss, Kenny Sibal, Eimi Lev, Michele Battle-Fisher, and Natalie Shubert, “Parental Invasive and Children’s Defensive Behaviors at Home and Away at College: Mediated Communication and Privacy Boundary Management,” Communication Studies, Vol. 61, 2010, pp. 184-204.
Keli Ryan Steuber and Rachel M. McLaren, “Privacy Recalibration in Personal Relationships: Rule Usage Before and After an Incident of Privacy Turbulence,” Communication Quarterly, Vol. 63, 2015, pp. 345-364.
LGBTQ Applications
Diana Breshears and Rebecca DiVerniero, “Communication Privacy Management Among Adult Children With Lesbian and Gay Parents,” Western Journal of Communication, Vol. 79, 2015, pp. 573-590.
Rose Helens-Hart, “Females’ (Non)Disclosure of Minority Sexual Identities in the Workplace From a Communication Privacy Management Perspective,” Communication Studies, Vol. 68, 2017, pp. 607-623.
Tim McKenna-Buchanan, Stevie Munz, and Justin Rudnick, “To Be or Not To Be Out in the Classroom: Exploring Communication Privacy Management Strategies of Lesbian, Gay, and Queer College Teachers,” Communication Education, Vol. 64, 2015, pp. 280-300.
Zhiwen Xiao, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen, and Zhengzhu Tang, “Using Communication Privacy Management Theory to Examine HIV Disclosure to Sexual Partners/Spouses Among PLHIV in Guangxi,” AIDS Care, Vol. 27, 2015, pp. 73-82.
Computers/ Technology
Jeffrey T. Child, Paul M. Haridakis, and Sandra Petronio, “Blogging Privacy Rule Orientations, Privacy Management, and Content Deletion Practices: The Variability of Online Privacy Management Activity at Different Stages of Social Media Use,” Computers in Human Behavior, Vol. 28, 2012, pp. 1859-1872.
Ralf De Wolf, “Group Privacy Management Strategies and Challenges in Facebook: A Focus Group Study Among Flemish Youth Organizations,” Cyberpsychology,Vol. 10, 2016, pp. 17-32.
Bethany D. Frampton and Jeffrey T. Child, “Friend or Not to Friend: Coworker Facebook Friend Requests as an Application of Communication Privacy Management Theory,” Computers in Human Behavior, Vol. 29, 2013, pp. 2257-2264.
Heath Wesley Hooper, “An Investigation of the Role Communication Privacy Management Theory has in the Development of Social Media Policies,” Sport Journal, 2017, Vol. 19.
Airi Lampinen, “Hosting Together via Couchsurfing: Privacy Management in the Context of Network Hospitality,” International Journal of Communication, Vol. 10, 2016, pp. 1581-1600.
Jessica Vitak, “A Digital Path to Happiness? Applying Communication Privacy Management Theory to Mediated Interactions,” in The Routledge Handbook of Media Use and Well-Being: International Perspectives on Theory and Research on Positive Media Effects, Leonard Reinecke and Mary Beth Oliver (eds.), Routledge/Taylor & Francis Group, New York, 2017, pp. 274-287.
Kenneth C. C. Yang, Amanda Pulido, and Yowei Kang, “Exploring the Relationship between Privacy Concerns and Social Media Use among College Students: A Communication Privacy Management Perspective,” Intercultural Communication Studies, Vol. 25, 2016, pp. 46-62.
Workplace & Educational
Stephanie A. Smith and Steven R. Brunner, “To Reveal or Conceal: Using Communication Privacy Management Theory to Understand Disclosures in the Workplace,” Management Communication Quarterly, Vol.31, 2017, pp. 429-446.
Jason L. Snyder, “E-Mail Privacy in the Workplace: A Boundary Regulation Perspective,” Journal of Business Communication, Vol. 47, 2010, pp. 266-294.
Jason L. Snyder and Karen M. Cornetto, “Employee Perceptions of E-mail Monitoring from a Boundary Management Perspective,” Communication Studies, Vol. 60, 2009, pp. 476-492.
Health Communication/ Cross- cultural applications
Jennifer J. Bute and Tennley A. Vik, “Privacy Management as Unfinished Business: Shifting Boundaries in the Context of Infertility,” Communication Studies, Vol. 61, 2010, pp. 1-20.
Anna R. Herrman and Kelly E. Tenzek, “Communication Privacy Management: A Thematic Analysis of Revealing and Concealing Eating Disorders in an Online Community,” Qualitative Research Reports in Communication, Vol. 18, 2017, pp. 54-63.
Masaki Matsunaga, “Individual Dispositions and Interpersonal Concerns Underlying Bullied Victims’ Self-Disclosure in Japan and the US,” Journal of Social and Personal Relationships, Vol. 27, 2010, pp. 1124-1148.
Nothando Ngwenya, Moraq Farquhar, and Gail Ewing, “Sharing Bad News of a Lung Cancer Diagnosis: Understanding Through Communication Privacy Management Theory,” Psycho-Oncology, Vol. 25, 2016, pp. 913-918.
Rauscher, E. A., & Durham, W. T. (2015). “As Long As You're Sure You Don't Want Any More Children”: Men's Collective Boundary Coordination of Information About Their Affirmative Vasectomy Decision. Communication Studies, Vol. 66, 186-203. doi:10.1080/10510974.2014.930917
Lynsey K. Romo, “How Formerly Overweight and Obese Individuals Negotiate Disclosure of Their Weight Loss. Health Communication,” Vol. 31, 2016, pp. 1145-1154.
Stephanie A. Smith and Steven R. Brunner, “The Great Whoosh: Connecting an Online Personal Health Narrative and Communication Privacy Management,” Health Communication, Vol. 31, 2016, pp. 12-21.
You can access Further Resouces for a particular chapter in several ways:
Copyright © Em Griffin 2025 | Web design by Graphic Impact