...Communication privacy management theory, originally known as communication boundary management, is a communication theory first developed by Sandra Petronio.[1][2] Petronio’s conclusions are relevant to the study of communication because before Communication Boundary Management there was only one other theory that studied self-disclosure, Social Penetration Theory. While both communication privacy management theory and social penetration theory are based in self-disclosure the critical difference is that CPM focuses on understanding “the conceptual idea of disclosure [3] ” The theory evolved from boundary management to privacy management because Petronio believed that this name was more representative of the theory. This is because the theory explains how and why people regulate their privacy as opposed to their personal boundaries. Communication Privacy Management theory describes the ways in which relational actors manage their privacy boundaries and the disclosure of private information. The theory focuses heavily on the processes that people employ to determine when and how they choose to conceal or reveal private information.[4] Through this theory Petronio describes the ever-present dialectic of privacy and openness within various relationship models, explains how relationships develop as public and private boundaries are negotiated and coordinated, and demonstrates how individuals regulate revealing and concealing information through communication.[5] Dialectic of privacy...
Words: 2510 - Pages: 11
...disclosure-privacy dialectic. A. The disclosure-privacy dialectic is the tension between sharing personal information and keeping personal information confidential. B. Disclosure, or revealing private information, has related concepts. 2. Privacy is withholding confidential or secret information in order to enhance autonomy and/or minimize vulnerability. II. Each person has developed rules about what he or she will share, which is explained in more depth by the communication privacy management theory. A. Communication privacy management theory helps to explain the decision-making processes people use to manage disclosure and privacy. 1. The theory asserts that each of us has developed rules about privacy and disclosure. 2. These rules are designed to help us maximize the benefits of disclosure while minimizing risks. B. There are five factors that influence disclosure and privacy. 1. One’s culture influences rules about privacy and disclosure, with some cultures placing a higher value on privacy than others. 2. Gender is a criterion, since men or women who strongly identify themselves as masculine or feminine are likely to use rules for disclosure and privacy that correspond to sex role stereotypes. 3. Motivation is a criterion, since people differ in how eager they are to disclose to someone. 4. Context also determines privacy and disclosure rules, since people are influenced by the circumstances in which they find themselves. IV. Disclosure and privacy have...
Words: 832 - Pages: 4
... | Executive Summary According to a 2009 survey conducted by American Management Association (AMA), the top two reasons employers provided for monitoring their employees were performance evaluation and quality control. Workplace monitoring may sound wrong, but it provides many benefits to an organization and its staff members, such as lower operating costs and high production rates. However, in the process of monitoring employees, employees’ privacy rights are violated mainly through computer monitoring, telephone monitoring and background checks. Productivity is one of the main reasons cited by employers for introducing electronic surveillance and employee testing to the workplace. Employers believe that corporate survival demands continuous improvements in employee productivity. Errors, poor products, and slow service hurt business. Therefore, monitoring and testing to identify and correct these problems are considered to be sound management practices (Wright). However, the following will analyze privacy in the workplace from an ethical point of view using three workable theories: Kantianism, Act Utilitarianism, and Social Contract Theory. Privacy...
Words: 3902 - Pages: 16
...paper will evaluate how the BGCA honor their commitment to assist young people at reaching their potential of becoming productive, caring responsible citizens using motivation, education and encouragement. The ethical issue that BGCA faces is maintaining the virtues and image of the BGCA and the challenges related to disenfranchised youth of today. The ethical theories of deontology, utilitarian and relativism will be examined to resolve how BGCA will honor their mission statement with an ethically proper solution. Background The BGCA is a 501(c) 3 (nonprofit) organization and their donations are tax deductible. The BGCA’s mission is to ‘To enable all young people, especially those who need us most, to reach their full potential as productive, caring responsible citizens.’ The BGCA has over 4000 youth affiliated clubs throughout the U.S., Native lands and military installations worldwide. The BGCA started in 1860 in Hartford, Connecticut with three women and for more than 150 years, BGCA has been helping kids grow and thrive. The moral character of the three women whom started BGCA is a great example of the virtue theory. Taking boys off the streets into their homes to provide a positive alternative is a selfless act of kindness. BGCA’s purpose is to assist with motivating, educating and encouraging at risk youths of today an avenue toward a successful tomorrow at no cost to the child. The clubs of BGCA ‘provides a safe place, caring adult mentors, fun, friendship, and high-impact...
Words: 2676 - Pages: 11
...ELECTRONIC MONITORING SYSTEM. INTRODUCTION Due to the continuous evolving of surveillance technology, the firm of Just Information Communication Technology Limited (JICTL) is desirous to implement a system that will enable it monitor their employee electronically in order to measure their productivity. Since “one of the biggest issues of the information age is that of privacy” (Andrew A. Adams & Rachel J. Mccrindle, 2011, P. 211). This report will address the relevant issues on privacy with regards to implementing this project and make necessary recommendations. ELECTRONIC SURVEILLANCE OF HUMAN (EMPLOYEE) IN A WORK PLACE Electronic surveillance of employees in a work place can be described as the monitoring of the activities (work conduct) of employees by the employer by the means of electronic device. The monitoring aspect may include some or all of the following areas: • E-mail • Voice mail • Employee location • Telephone conversation • Internet usage • CCTV (Video surveillance) etc. There are various reasons why employers may want to monitor the activities of their employee. One of such reasons is to ensure system security and operation (Andrew A. Adams & Rachel J. Mccrindle, 2011, P. 212-218). The firm of JICTL is implementing this system for the purpose of measuring employee productivity. For the fact that electronic communication has become so important in the modern workplace with the use of e-mail, the internet, telecommuting, and corporate intranets, employers...
Words: 846 - Pages: 4
...Organizations - Group Think Introduction Communication is important for leadership of institutions, organizations, companies, schools, and any other group. Effective communication means the leader understand how to plan, organize, lead and control (Gandossy & Sonnenfeld, 2005). Communication assists leaders and manager to complete their responsibilities and tasks. Therefore, communication functions as the basis for all planning in the organization. Therefore, one can state that communication is composed of a speaker and a listener. For example, information is communicated from the organizational leadership. This information is communicated to the managers of the organization. Afterwards, the information is communicated to...
Words: 3152 - Pages: 13
...University of Phoenix Material Introduction to Communication Worksheet Paragraph Questions Answer the following questions in your own words. Each response must be written as an academic paragraph of at least 150 words. Be clear and concise and provide explanations for your answers. Format your sources consistent with APA guidelines. 1. According to Introducing Communication Theory (2010), what is the definition of communication? What does communication mean to you personally? Provide an example. According to introduction of Communication, defining communication can be challenging. Communication can be interpreted by many different ways. People have their own minds and so communication can be interpreted by each individual differently. At time we can be at the same lecture but somehow get a different meaning of the speaker. Communication is a social process in which individuals employ symbols to establish and interpret meaning in their environment there are five key terms in defining communication, social, environment, process, symbols and meaning. Social communication usually involves two or more people interacting face to face like having a conversation there is a sender and receiver. The process of communication is a never ending It keeps going communication changes every day including the different ways we communicate. The process of a conversation can change from beginning to the end. We may begin speaking about one thing and that conversation can lead to something...
Words: 1651 - Pages: 7
...Employment At-Will Doctrine The legal doctrine called at-will clearly states that an employer can terminate an employee at any time for any reason, except an illegal one, or for no reason without incurring legal liability. It also means that an employer can change the terms of the employment relationship with no notice and no consequences. “For example, an employer can alter wages, terminate benefits, or reduce paid time off. In its unadulterated form, the U.S. at-will rule leaves employees vulnerable to arbitrary and sudden dismissal, a limited or on-call work schedule depending on the employer’s needs, and unannounced cuts in pay and benefits (Boone, 2012).” Listed below are a few scenarios that was requires an examination of the at-will doctrine, as to whether or not an individual can be fired for the following reasons and if so, what action should be taken by the Chief Operating Officer of the company: I. Anna’s boss refused to sign her leave request for jury duty and now wants to fire her for being absent without permission. “In the state of Georgia, 34-1-3, (a) It shall be unlawful for any employer or the agent of such employer to discharge, discipline, or otherwise penalize an employee because the employee is absent from his or her employment for the purpose of attending a judicial proceeding in response to a subpoena, summons for jury duty, or other court order or process which requires the attendance of the employee at the judicial proceeding. It shall be unlawful...
Words: 1708 - Pages: 7
...Reference Material on Ethics Books and Book Chapters Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’...
Words: 1786 - Pages: 8
...Ethics and Privacy of Communications in the E-Polis Gordana Dodig-Crnkovic and Virginia Horniak Department of Computer Science and Electronics Mälardalen University Västerås, Sweden I N T R O D U C T I O N The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production, and the monitoring of persons and machines. It can also lead to new forms of social interaction [..]. However, without appropriate architecture and regulatory controls it can also subvert democratic values. Information technology is not in fact neutral in its values; we must be intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely...
Words: 3586 - Pages: 15
...Communication and Social Systems Analysis of Group Interactions Final Paper Social Analysis of Human Systems HUS 633 Section 28 Main Purpose: The main purpose of this paper is to use outside sources to describe the group helping project as a system. An analysis of Littlejohn’s theory will be discussed. Gina Townsend Professor Frank Worts June 17, 2008 HUS 633 Section 28 This paper will give a detailed explanation of the group helping project as a communications system. The sections flowing will outline systems concepts that most affect the communication in a group. With the support of Peter Segue, Littlejohn, and a host of other authors this paper will also apply three Littlejohn concepts. The concepts that will be addressed in this paper are the message, the conversation, and the relationship. Below, is a description of the constructive action group and how it relates to being a communications system. 6 African American high school students both male and female from Millville, New Jersey participated in the program. Each student had communicated that they are sexually active and at risk of not completing sufficient academic credits to maintain graduation eligibility. The main purpose for facilitating...
Words: 2504 - Pages: 11
...Questions 1. Our concern for privacy has ____ dimensions. 1. Two 2. Three 3. Four 4. Five 1. The strength of a privacy right depends on 1. The law 2. Circumstances 3. Whose right it is 4. Corporate culture 1. Enterprise Rent-A-Car lays down ____ dress-code guidelines for women. 1. 15 2. 20 3. 25 4. 30 1. Wellness programs are 1. Clearly immoral 2. Paternalistic 3. Illegal 4. Imprudent 1. Compulsion comes in 1. Packets 2. Flavors 3. Degrees 4. Bundles 1. Informed consent implies deliberation and ____ _____. 1. Free choice 2. Eager participation 3. Worker benefit 4. Employer risk 1. For consent to be legitimate, it must be 1. Coerced 2. Compensated 3. Voluntary 4. Confirmed 1. Polygraph tests record changes in 1. Psychological processes 2. Honesty 3. Physiological processes 4. Environment 1. The use of polygraphs is argued to allow business to abolish the use of 1. Audits 2. Salary decreases 3. Random firing 4. Nepotism 1. Lynn March holds that polygraphs are accurate 1. 33% of the time 2. 45% of the time 3. 78% of the time 4. 90% of the time 1. David T. Lykken holds that polygraphs have, at most, been measured as being accurate 1. 27% of the time 2. 63% of the time 3. 74% of the time 4. 90% of the time 1. Polygraphs infringe on 1. Autonomy 2. Liberty 3. Privacy 4. Property 1. Christopher Pyle holds that polygraphs infringe on 1. Autonomy 2. Liberty 3. Privacy 4. Property 1. The Employee...
Words: 699 - Pages: 3
...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...
Words: 18072 - Pages: 73
...|[pic] |Syllabus | | |College of Humanities | | |COM/310 Version 2 | | |Communication: Theories and Practice | Copyright © 2009, 2006 by University of Phoenix. All rights reserved. Course Description This course explores the various theories of communication that create the foundation for study of communications in the bachelor's degree program at the University of Phoenix. Major communication areas examined in this course include intrapersonal, interpersonal, group and teamwork, organizational, intercultural, and mass media. Each area, along with others, will be studied in greater depth in subsequent courses in the degree program. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies...
Words: 1803 - Pages: 8
...Employees and Challenges for Privacy Advocates Anna Johnston and Myra Cheng Paper delivered 28 November 2002 International Conference on Personal Data Protection Hosted by Personal Information Dispute Mediation Committee, Korea Information Security Agency Seoul, Korea Ms Anna Johnston is the NSW Deputy Privacy Commissioner. Ms Myra Cheng is a Research & Policy Officer with Privacy NSW, the Office of the NSW Privacy Commissioner. The authors gratefully acknowledge the assistance of Dr Ben Searle, Macquarie University, in providing an overview of the relevant literature from the field of organisational psychology. Introduction This paper takes up the challenge of talking about privacy in the workplace - a site of potential conflict in which there may be co-existing radically different views on whether workers can or should have any expectations of privacy. As long as there has been employment, employees have been monitored. Nebeker D M & B C Tatum, "The effects of computer monitoring, standards and rewards on work performance, job satisfaction and stress" (1993) 23(7) Journal of Applied Social Psychology 508 at 508. However, in recent years, with an environment of affordable technology, the availability of less easily observable or detectable monitoring devices, and a lack of adequate regulation, there has been an explosion in the use of electronic monitoring and surveillance in the workplace. A recent study by the American Management Association (AMA) found...
Words: 6767 - Pages: 28