The interpretive criterion that CPM does not meet well is aesthetic appeal,which is a matter of both style and clarity. Petronio’s organizational style is one of arranging her insights into multiple lists. The result is a confusing array of classifications where the connection between the lists isn’t always apparent, nor is the relationship among items within a given category. Clarity is a problem as well. For example, in Principle 4 and throughout much of her writing, Petronio indicates that people who co-own private information should negotiate mutual privacy rules. Yet in another summary version of CPM, Petronio seems to directly contradict this principle. She writes, “As co-owners, the recipients have a responsibility to care for the information in the way that the original owner desires.” 26 That’s acquiescence or submission, not negotiation. It’s also confusing, as is Petronio’s frequent use of qualifiers such as may be, tend to be, possibly, perhaps, and sometimes.
Petronio is aware of these problems. In 2004, she wrote a wonderfully transparent article entitled “Road to Developing Communication Privacy Management Theory: Narrative in Process, Please Stand By.” She describes “a stage of theory building where much is in place and many of the conceptual blocks are identifed, yet the way they fi t together shift and change, rendering the connections temporarily ambiguous.” 27 I regard that as an accurate description of where
the theory was then, but since that time she has further developed CPM to reduce the ambiguity. For example, her recent repackaging of the theory under the five basic principles I’ve presented is a major organizational improvement.And the three subtitle questions I used to clarify the functions of boundary ownership, linkage, and permeability came straight from that same chapter, which she co-authored with Ashley Duggan in 2009. 28
There are two gaps in the theory coverage that bear mention. Petronio writes convincingly about the value of co-owner negotiation and how quickly trust can be lost when privacy rules are breached. 29 Yet she currently doesn’t offer insight on how to conduct those negotiations, nor does she describe after-the-fact remedies for the mistrust that boundary turbulence stirs up. I believe Petronio needs to expand CPM to suggest how to effectively negotiate mutual boundaries and
offer ways and means to settle the turbulence that occurs when collective privacy boundaries are violated. Petronio is now working on a new book about CPM, with chapters entitled “Diagnostic Method” and “Repair Tool” that will address these thorny issues. In the spirit of her 2004 narrative cited above, she urges us to “stay tuned.” 30
The interpretive criterion that CPM does not meet well is aesthetic appeal,which is a matter of both style and clarity. Petronio’s organizational style is one of arranging her insights into multiple lists. The result is a confusing array of classifications where the connection between the lists isn’t always apparent, nor is the relationship among items within a given category. Clarity is a problem as well. For example, in Principle 4 and throughout much of her writing, Petronio indicates that people who co-own private information should negotiate mutual privacy rules. Yet in another summary version of CPM, Petronio seems to directly contradict this principle. She writes, “As co-owners, the recipients have a responsibility to care for the information in the way that the original owner desires.” 26 That’s acquiescence or submission, not negotiation. It’s also confusing, as is Petronio’s frequent use of qualifiers such as may be, tend to be, possibly, perhaps, and sometimes.Petronio is aware of these problems. In 2004, she wrote a wonderfully transparent article entitled “Road to Developing Communication Privacy Management Theory: Narrative in Process, Please Stand By.” She describes “a stage of theory building where much is in place and many of the conceptual blocks are identifed, yet the way they fi t together shift and change, rendering the connections temporarily ambiguous.” 27 I regard that as an accurate description of wherethe theory was then, but since that time she has further developed CPM to reduce the ambiguity. For example, her recent repackaging of the theory under the five basic principles I’ve presented is a major organizational improvement.And the three subtitle questions I used to clarify the functions of boundary ownership, linkage, and permeability came straight from that same chapter, which she co-authored with Ashley Duggan in 2009. 28There are two gaps in the theory coverage that bear mention. Petronio writes convincingly about the value of co-owner negotiation and how quickly trust can be lost when privacy rules are breached. 29 Yet she currently doesn’t offer insight on how to conduct those negotiations, nor does she describe after-the-fact remedies for the mistrust that boundary turbulence stirs up. I believe Petronio needs to expand CPM to suggest how to effectively negotiate mutual boundaries andoffer ways and means to settle the turbulence that occurs when collective privacy boundaries are violated. Petronio is now working on a new book about CPM, with chapters entitled “Diagnostic Method” and “Repair Tool” that will address these thorny issues. In the spirit of her 2004 narrative cited above, she urges us to “stay tuned.” 30
การแปล กรุณารอสักครู่..
