How working women navigate communication privacy management boundaries when seeking social support during cancer treatment

2020 ◽  
Vol 15 (3) ◽  
pp. 261-267
Author(s):  
Donna M. Elkins

Working women diagnosed with cancer face difficult decisions about disclosing personal information. A 2017 survey for Cancer and Careers, a non-profit organization assisting cancer patients and survivors with finding and continuing employment, found that women are more likely than men to share their diagnosis with work colleagues, and do so more often to feel supported by co-workers. However, disclosure guidelines for communication about having cancer are difficult to establish, as they may vary widely depending on the individual and the situation. Most research about health self-disclosure has focused on the initial decision to divulge that one has an illness and on the depth of that initial disclosure. The current study was designed to further describe how working women navigate disclosures not only during the initial diagnosis, but throughout treatment and into recovery to gain needed social support. Using the typology of social support and the tenets of Communication Privacy Management Theory, the goal of this study is to share individual narratives of how working women change privacy rules to procure the type of social support needed in each stage of their experience.

Author(s):  
Sandra Petronio ◽  
Maria K. Venetis

Communication privacy management theory (CPM) argues that disclosure is the process by which we give or receive private information. Private information is what people reveal. Generally, CPM theory argues that individuals believe they own their private information and have the right to control said information. Management of private information is not necessary until others are involved. CPM does not limit an understanding of disclosure by framing it as only about the self. Instead, CPM theory points out that when management is needed, others are given co-ownership status, thereby expanding the notion of disclosing information; the theory uses the metaphor of privacy boundary to illustrate where private information is located and how the boundary expands to accommodate multiple owners of private information. Thus, individuals can disclose not only their own information but also information that belongs to others or is owned by collectives such as families. Making decisions to disclose or protect private information often creates a tension in which individuals vacillate between sharing and concealing their private information. Within the purview of health issues, these decisions have a potential to increase or decrease risk. The choice of disclosing health matters to a friend, for example, can garner social support to cope with health problems. At the same time, the individual may have concerns that his or her friend might tell someone else about the health problem, thus causing more difficulties. Understanding the tension between disclosing and protecting private health information by the owner is only one side of the coin. Because disclosure creates authorized co-owners, these co-owners (e.g., families, friends, and partners) often feel they have right to know about the owner’s health conditions. The privacy boundaries are used metaphorically to indicate where private information is located. Individuals have both personal privacy boundaries around health information that expands to include others referred to as “authorized co-owners.” Once given this status, withholding to protect some part of the private information can risk relationships and interfere with health needs. Within the scheme of health, disclosure risks and privacy predicaments are not experienced exclusively by the individual with an illness. Rather, these risks prevail for a number of individuals connected to a patient such as providers, the patient’s family, and supportive friends. Everyone involved has a dual role. For example, the clinician is both the co-owner of a patient’s private health information and holds information within his or her own privacy boundary, such as worrying whether he or she diagnosed the symptoms correctly. Thus, there are a number of circumstances that can lead to health risks where privacy management and decisions to reveal or conceal health information are concerned. CPM theory has been applied in eleven countries and in numerous contexts where privacy management occurs, such as health, families, organizations, interpersonal relationships, and social media. This theory is unique in offering a comprehensive way to understand the relationship between the notion of disclosure and that of privacy. The landscape of health-related risks where privacy management plays a significant role is both large and complex. The situations of HIV/AIDS, cancer care, and managing patient and provider disclosure of private information help to elucidate the ways decisions of privacy potentially lead to health risks.


2016 ◽  
Vol 20 (1) ◽  
pp. 50-67 ◽  
Author(s):  
Mary Helen Millham ◽  
David Atkin

Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.


2018 ◽  
Vol 1 (2) ◽  
pp. 39
Author(s):  
Muhammad Syaoki

Abstrak:    Penelitian ini bertujuan untuk menggambarkan perilaku komunikasi Jemaat Ahmadiyah dalam posisi mereka sebagai kelompok yang dilarang menyebarkan ajarannya.  Dengan menggunakan teori manajemen privasi komunikasi yang diperkenalkan oleh Sandra Petronio, penelitian ini berusaha menjelaskan proses dialektis yang dilakukan oleh jemaat Ahmadiyah di kota Semarang ketika berinteraksi dengan banyak orang dalam kehidupan sehari-hari. Hasil penelitian ini menunjukkan bahwa Jemaat Ahmadiyah melakukan pembukaan informasi privat dengan komunikasi langsung dan tidak langsung. Jemaat Ahmadiyah melakukan pembukaan informasi privat bertujuan untuk mengklarifikasi kesalahpahaman ghair tentang Ahmadiyah. Jemaat Ahmadiyah kota Semarang cenderung menutup informasi privat mereka kepada keluarga dan teman ketika mereka baru berbai’at. Mereka juga menutup informasi privat kepada orang-orang Muhammadiyah, serta kepada kelompok-kelompok Islam garis keras, seperti FPI, LDII, termasuk juga kader PKS. Tetapi mereka membuka informasi mengenai Ahmadiyah kepada orang-orang dari kalangan NU, dan aparatur pemerintah. Abstract :   This research aims to describe the behavior of Ahmadiyyah community in their position as a group that is prohibited from spreading its teachings. Using the communication privacy management theory introduced by Sandra Petronio, this research attempts to explain the dialectical process undertaken by the Ahmadiyah community in the Semarang city while interacting with many people in everyday life. The results of this study indicate that the Ahmadiyyah community conducts the opening of private information with direct and indirect communication. The Ahmadiyah community conducted the opening of private information aimed to clarify misunderstanding about “ghair” of Ahmadiyah. The Ahmadiyah community of Semarang tends to hide their private information from family and friends when they are newly banned. They also hide private informations to Muhammadiyah people, as well as to hard-line Islamic groups, such as FPI, LDII, as well as PKS cadres. But they do not hide information about Ahmadiyyah to people from the NU, and the government apparatus.


2020 ◽  
Vol 34 (4) ◽  
pp. 527-557 ◽  
Author(s):  
M. Chad McBride ◽  
Allison R. Thorson ◽  
Karla Mason Bergen

Despite the prevalence of work spouses, scarce empirical research has focused on the communication occurring within these relationships, leaving managers with little understanding as to whether organizations can or should communicate support for employees forming these relationships and how privacy is navigated among work spouses. Building on McBride and Bergen’s conceptualization of the work-spouse relationship, we used Communication Privacy Management theory (CPM) to understand what, if any, privacy rule decision criteria individuals used as they negotiated disclosures within their work-spouse relationships. Analysis of interviews with 41 people in work-spouse relationships suggests that participants recognized both their own core privacy rule decision criteria and when these criteria were similar to or different from the criteria influencing their work spouse’s. Furthermore, work-spouse relationships formed despite organizational efforts to keep them at bay. Theoretically, the findings add to CPM theory, such that they establish the need to examine catalyst criteria as current and previous, as well as argue for the addition of confirming criteria to account for situations in which catalysts reinforce routinized privacy rules. Overall, the findings from this study advance the literature on communication in the work-spouse relationship and CPM theory and highlight the role that workplaces play in fostering these types of relationships.


2019 ◽  
Vol 22 (6) ◽  
pp. 1058-1075
Author(s):  
Ralf De Wolf

Many researchers have been studying teens’ privacy management on social media, and how they individually control information. Employing the theoretical framework of communication privacy management (CPM) theory, I argue that individual information control in itself is desirable but insufficient, giving only a limited understanding of teens’ privacy practices. Instead, I argue that research should focus on both personal and interpersonal privacy management to ultimately understand teens’ privacy practices. Using a survey study ( n = 2000), I investigated the predictors of teens’ personal and interpersonal privacy management on social media and compared different types of boundary coordination. The results demonstrate that feelings of fatalism regarding individual control in a networked social environment, which I call networked defeatism, are positively related with interpersonal privacy management. Also, interpersonal privacy management is less important when coordinating boundaries with peers than it is when coordinating sexual materials, and dealing with personal information shared by parents.


2012 ◽  
Vol 60 (5) ◽  
pp. 665-680 ◽  
Author(s):  
Carrie D. Kennedy-Lightsey ◽  
Matthew M. Martin ◽  
Michelle Thompson ◽  
Kimberly Leezer Himes ◽  
Brooke Zackery Clingerman

2021 ◽  
pp. 1-11
Author(s):  
Rudolf Siegel ◽  
Cornelius J. König ◽  
Leon Porsch

Abstract. Applicants often take great care in deciding where to apply and may refrain from applying or accepting a job offer if they hear about privacy-invading practices at a future workplace. Based on communication privacy management theory, the present work examines how applicants react to different purposes of electronic monitoring. In a scenario study, we found higher privacy concerns and lower organizational attractiveness in a situation with controlling monitoring procedures as compared to supportive monitoring procedures. Furthermore, competitive participants evaluated only noncontrolling monitoring procedures more positively. This demonstrates that organizational attractiveness is harmed by controlling monitoring procedures, and decision makers should keep in mind how electronic monitoring is implemented, used, and may be perceived within and outside the organization.


Sign in / Sign up

Export Citation Format

Share Document