Communication Privacy Management Theory (CPM) has the basic premise that people create decision-making rules to help them determine when to reveal and when to conceal private information (Dainton and Zelley 2015, 86). CPM is based in six principles: public-private dialectical tension, nature of private information, privacy rules (cultural, gender, motivational contextual and risk- benefit criteria), boundaries, boundary coordination and boundary permeability. How does this concepts work? To understand their functionality we must look at the following case study from Dainton and Zelley: Case Study 5: With Friends like This.
Arden Financial Services hired Mia and Lily at the same time and they went through orientation together. They worked in different business sectors but their departments were on the same floor so eventually they became good friends. They shared during lunch many personal things about dating and even the general workplace gossip. Lily, having a higher education than Mia, advanced in the workplace faster and was promoted to management. This didn’t stop their friendship and they would meet in the cafeteria for lunch, at the pub for drinks and eventually after both being married with their respective husbands outside ...
... middle of paper ...
...ivacy Management lead way to research in many concepts like gossip in the workplace or even expanding on its ‘”possession” concept within others. How ethical is it for one to own information that is not about oneself? Can it be used as leverage for advancement? How much does gossip in the workplace distracts from productivity? Is the boundary permeability affected only by context or are there any other factors that would directly influence it?
Lily learned late in her relationship with Mia that holding and disclosing information could affect her own job. Maybe in a way it was karma that she had to fire her own friend after disclosing information about other people. One thing is for sure, Lily would be more careful next time she decides to share information with someone since not only it could affect her job but also other’s perception of her ethics as a manger.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- During my brother’s freshman year at TCU, he made the decision to join ROTC, a college military program that TCU offered its’ students in which the students would receive a full tuition scholarship if they joined. However, my brother did not want to disclose this information to our whole family and unfortunately I was unaware of this when my mother and I arrived at TCU for an unexpected visit. Upon the arrival of my mother and me, I fortuitously made the mistake of revealing my brother’s decision to join ROTC, which as a result enraged my mother to a new height.... [tags: Communication]
1729 words (4.9 pages)
- As a manager, you can be responsible for not only managing a business and its employees but also hiring those employees, leading them, planning and organizing various things, as well as the overall responsibility of making sure what needs to be done- gets done. It is obvious that while completing these duties, communication plays a huge role in the management field. Rather a manager is conducting a staff meeting, speaking with a customer, or discussing business ideas with executives, it is vital their communication skills are top notch.... [tags: managers, communication skills, management]
1347 words (3.8 pages)
1145 words (3.3 pages)
- The CPM/PERT Network path Critical Path Method (CPM) is a one of the tool used to identify the paths through the project and the other way is through PERT tool which is also called as program evaluation review technique. The critical path uses one time estimate when the duration of the task is solid, whereas PERT uses three time estimates and uses probabilistic activity times. The three time estimates for each activity are the most likely time (m), the optimistic time (a), and the pessimistic time (b) (Russell and Taylor, 2014).... [tags: Project management, Critical path method]
1151 words (3.3 pages)
- Protecting privacy is considered an essential human right, crucial and important to the protection of liberty. Although privacy is such a massive part of our lives, today’s technology is threatening the safety and privacy of many people (Rotenberg). Cell phones, social media, government, and other forms of technology threaten the lives of many both in their personal life and their life in the workplace (Lazar). We must start to consider ways to help protect privacy more efficiently to protect the lives of people all across the globe.... [tags: Facebook, Privacy, Twitter, Internet]
1407 words (4 pages)
- Communication Management Choosing a topic for this paper was very difficult. Many topics seemed very interesting, but after reviewing many topics the choice was clear. I also took into consideration the fact that we would be presenting these topics to the class. So, I choose the communication process. It is very important in management. Having been a manager for three years, I felt I would be able to explain this topic well to the class. Communication is the process of transmitting information and meaning.... [tags: Business Management Communicating]
1298 words (3.7 pages)
- Privacy in a Digital World The history of privacy in the United States is a storied one. The context of the 4 th Amendment to the Constitution has been debated for years to determine if the “right to privacy” is a constitutionally guaranteed right. Additionally, many people are technologically ignorant of what behaviors and activities will put them at risk. The “Carnivore” is a good example of an historic digital technology that generated privacy concerns. The Carnivore was a digital intelligence gathering tool that was supposed to be used by the FBI to fight crime.... [tags: Privacy America]
855 words (2.4 pages)
- Electronic Monitoring and Workplace Privacy Workplace privacy is one of the biggest issues facing businesses today. Do you feel like you are being watched all the time, all your e-mails being read, and every key stroke is being monitored by your boss. Some people feel this way and that is why privacy in the workplace is a problem with many businesses today. Employees feel like they are not being trusted, or feel the company invades on their personal privacy, or violates their fourth amendment rights.... [tags: Business Work Place Privacy]
1727 words (4.9 pages)
- Ethical Management of E-mail Privacy As I am sitting at my work station in a crowded office building, I hear the wonderful sound of "You've got mail." In turn I open my E-mail mailbox and find a letter from a nearby employee. This letter contains the usual funny joke of the day and a short joke ridiculing the boss, as usual. Who was to know that my supervisor would eventually find this letter, which would lead to both the termination of my job and my fellow employee. Do you feel this is right.... [tags: Privacy Electronic Email ]
2392 words (6.8 pages)
- Privacy Globalization is the tendency of businesses to spread throughout the world to offer their products and services. To reflect their global market presence, multi-national companies have adopted management models such as region-specific management, and product-specific management to maximize the potential to offer efficient products and services to their customers. One such management model that has been successful in the past few years is the business process outsourcing model. Businesses outsource processes such as back office operations and customer support services offshore.... [tags: Business Information Essays]
2203 words (6.3 pages)
- The Rights Of The Right Of Marriage
- A Rose For Emily By William Golding
- Wuthering Heights By Emily Bronte
- Should Standardized Testing Be Qualified For Higher Educational Opportunities?
- Social Work Values And Ethics
- Divorce, Marriage, And Wedlock Are All Words That Describe The Union Between Two People