Wiley Encyclopedia of Management 2015
DOI: 10.1002/9781118785317.weom020039
|View full text |Cite
|
Sign up to set email alerts
|

Privacy

Abstract: In today's world, the central role of privacy in the realm of organizational and business management is evident. Although, privacy is a common factor influencing many choices organizations make, the complexity of understanding the best way to address privacy issues is not necessarily clear. However, using a theoretical lens that focuses on how, behaviorally, people manage private information holds promise for better grasping the process people use that can lead to more productive outcomes. This entry introduce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The everyday handling of personal information has been examined and modeled in communication studies through a large body of work on motivations and practices of selective revelation and concealment (Goffman 1963, Altman & Taylor 1973, Petronio 2002. More recent work in interpersonal communication has examined how various forms of power affect why people may choose to selectively reveal invisible, non-normative, and stigmatized information (Moore 2017, McDonald, et al 2020.…”
Section: Background: Bridges and Chasmsmentioning
confidence: 99%
“…The everyday handling of personal information has been examined and modeled in communication studies through a large body of work on motivations and practices of selective revelation and concealment (Goffman 1963, Altman & Taylor 1973, Petronio 2002. More recent work in interpersonal communication has examined how various forms of power affect why people may choose to selectively reveal invisible, non-normative, and stigmatized information (Moore 2017, McDonald, et al 2020.…”
Section: Background: Bridges and Chasmsmentioning
confidence: 99%
“…, 2011). The boundary thickens when public sharing is undesirable and information flow is restricted and thins when public sharing is encouraged and information flows freely (Petronio and Durham, 2015; Xu et al. , 2011).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…CPM theory articulates five boundary rules, categorized as “core” and “catalytic” (Petronio and Durham, 2015). Core rules are more durable and include cultural values and gender orientation, whereas the catalytic rules include motivation, context and risk-benefit ratio, which are more responsive to changes as circumstances require.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation