Here is the synopsis of our sample research paper on The Communication Privacy Management Theory - Analysis. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 5 page paper analyzes Petronio's Communication Privacy Management theory using Littlejohn's criteria. The theory is evaluated based on scope, appropriateness, heuristic value, validity and parsimony. This is an expansion of PGcmthev.rtf and includes the premise that this theory is both a dialectical theory and a systems theory. Bibliography lists 5 sources. PGcmthevR.rtf
Page Count:
5 pages (~225 words per page)
File: MM12_PGcmthevR.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
in dialectical tension" (Petronio, 2005). Erbert, Gareis and Perez (2003) point out that communication theories have consistently and historically used dialectical theory as their basis for investigation. CPM illustrates the
tension between keeping information private and at the same time, sharing information in order to establish close relationships. It is also a systems theory because it addresses not only
the tension in the process of communication privacy management but also the many layers in this process and the different dynamic relationships involved in the attempt to manage privacy (McGraw-Hill,
2004). Furthermore, Systems Theory states that it is necessary to understand the individual relationships in the process in order to understand how the group interacts (Stow, 2004). According to Littlejohns
criteria, the scope of a theory should be general enough to cover a broad range of situations rather than just one type of event. The theory under question deals with
a specific type of communication, that of private information, but it addresses different aspects and different environments for that information. The theory explains that people feel they own their own
private information and if they should share any of this kind of information, they should still be able to control it. The theory identifies a valid metaphor, that of a
boundary. The private information falls within a boundary; the individual believes they own whatever information is included within that boundary. We each develop our own set of rules about the
private information that falls within the boundary. This means that if an individual shares private information with another person, the individual expects that other person to follow the rules.
The Communication Privacy Management Theory complies with Littlejohns criterion in terms of its theoretical scope. It deals with one issue, private information, but it addresses a number of situations related
...