Sample Essay on:
The Communication Privacy Management Theory - Analysis

Here is the synopsis of our sample research paper on The Communication Privacy Management Theory - Analysis. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 5 page paper analyzes Petronio's Communication Privacy Management theory using Littlejohn's criteria. The theory is evaluated based on scope, appropriateness, heuristic value, validity and parsimony. This is an expansion of PGcmthev.rtf and includes the premise that this theory is both a dialectical theory and a systems theory. Bibliography lists 5 sources. PGcmthevR.rtf

Page Count:

5 pages (~225 words per page)

File: MM12_PGcmthevR.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

in dialectical tension" (Petronio, 2005). Erbert, Gareis and Perez (2003) point out that communication theories have consistently and historically used dialectical theory as their basis for investigation. CPM illustrates the tension between keeping information private and at the same time, sharing information in order to establish close relationships. It is also a systems theory because it addresses not only the tension in the process of communication privacy management but also the many layers in this process and the different dynamic relationships involved in the attempt to manage privacy (McGraw-Hill, 2004). Furthermore, Systems Theory states that it is necessary to understand the individual relationships in the process in order to understand how the group interacts (Stow, 2004). According to Littlejohns criteria, the scope of a theory should be general enough to cover a broad range of situations rather than just one type of event. The theory under question deals with a specific type of communication, that of private information, but it addresses different aspects and different environments for that information. The theory explains that people feel they own their own private information and if they should share any of this kind of information, they should still be able to control it. The theory identifies a valid metaphor, that of a boundary. The private information falls within a boundary; the individual believes they own whatever information is included within that boundary. We each develop our own set of rules about the private information that falls within the boundary. This means that if an individual shares private information with another person, the individual expects that other person to follow the rules. The Communication Privacy Management Theory complies with Littlejohns criterion in terms of its theoretical scope. It deals with one issue, private information, but it addresses a number of situations related ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now