Skip to main content

Three Theories of Privacy: An Overview

  • Chapter
  • First Online:
Privacy Online

Abstract

This chapter reviews the current most important theories of privacy. The review is addressed to those unfamiliar with theories of privacy. It is my goal to provide those readers with a foundation on which to build. To this end, the chapter summarizes the two best articulated and best supported theories of privacy (Altman 1975; Westin 1967) as well as Petronio’s (2002) communication privacy management (CPM) theory, an important extension of Altman’s theory that is particularly suited for the study of social networking. Additionally, this chapter considers two larger issues about what privacy is: issues in defining privacy and lessons to be learned from Altman’s and Westin’s theories. I begin with the three theories of privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This chapter draws heavily on two articles by the author in the Journal of Social Issues (Margulis 2003a, b). The author wishes to thank Wiley-Blackwell for allowing the use of this material. I wish to thank Sandra Petronio for her very helpful review of her theory and for providing published and unpublished material.

References

  • Allen AL (1988) Uneasy access: privacy for women in a free society. Rowman & Littlefield, Totowa

    Google Scholar 

  • Altman I (1975) The environment and social behavior: privacy, personal space, territory, crowding. Brooks/Cole, Monterey

    Google Scholar 

  • Altman I (1977) Privacy regulation: culturally universal or culturally specific? J Soc Issues 33(3):66–84

    Article  Google Scholar 

  • Altman I (1990) Toward a transactional perspective: a personal journey. In: Altman I, Christensen K (eds) Environment and behavior studies: emergence of intellectual traditions. Plenum, New York, pp 335–355

    Google Scholar 

  • Bennett CJ (1995) The political economy of privacy: a review of the literature. Paper prepared for the center for social and legal research, DOE genome project (Final draft), University of Victoria, Department of Political Science, Victoria

    Google Scholar 

  • Child JT, Agyeman-Badu E (2010) Blogging privacy management rule development: the impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Comput Hum Behav 26:957–963

    Article  Google Scholar 

  • Child JT, Pearson JC, Petronio S (2009) Blogging, communication, and privacy management: development of the blogging privacy management measure. J Am Soc Inf Sci Technol 60(1):2079–2094

    Article  Google Scholar 

  • Child JT, Petronio S (2011) Unpacking the paradoxes of privacy in CMC relationships: the challenges of blogging and relational communication on the internet. In: Wright K, Webb L (eds) Computer mediated communication in personal relationships. Hampton Press, Cresskill, pp 21–40

    Google Scholar 

  • Davis S (2009) Privacy, rights, and moral value. In: Matheson D (ed) Contours of privacy. Cambridge Scholars Publishing, Newcastle upon Tyne, pp 153–179

    Google Scholar 

  • Derlega V, Chaikin AL (1977) Privacy and self-disclosure in social relationships. J Soc Issues 33(3):102–115

    Article  Google Scholar 

  • Etzioni A (1999) The limits of privacy. Basic Books, New York

    Google Scholar 

  • Johnson CA (1974) Privacy as personal control. In: Carson DH (ed) Man-environment interactions: evaluations and applications (Part II, Vol. 6: Privacy, S.T. Margulis, vol. ed). Environmental Design Research Association, Washington, DC, pp 83–100

    Google Scholar 

  • Jourard SM (1971) The transparent self. (rev edn). Van Nostrand Reinhold, New York

    Google Scholar 

  • Kelvin P (1973) A social-psychological examination of privacy. Br J Soc Clin Psychol 12:248–261

    Article  Google Scholar 

  • Lyon D, Zuriek E (1996) Surveillance, privacy, and the new technology. In: Lyon D, Zureik E (eds) Computers, surveillance, and privacy. University of Minnesota Press, Minneapolis, pp 1–18

    Google Scholar 

  • Lyons D (June 7, 2010) Facebook’s false contrition. Newsweek, p 20

    Google Scholar 

  • Margulis ST (1977) Conceptions of privacy: current status and next steps. J Soc Issues 33(3):5–21

    Article  Google Scholar 

  • Margulis ST (2003a) Privacy as a social issue and a behavioral concept. J Soc Issues 59(2):243–262

    Google Scholar 

  • Margulis ST (2003b) On the status and contribution of Westin’s and Altman’s theories of privacy. J Soc Issues 59(2):411–429

    Article  Google Scholar 

  • Margulis ST (2009) Privacy and psychology. In: Matheson D (ed) Contours of privacy. Cambridge Scholars Publishing, Newcastle upon Tyne, pp 143–151

    Google Scholar 

  • Margulis ST, Pope JA, Lowen A (2010) The Harris-Westin index of general concern about privacy: an exploratory conceptual replication. In: Zuriek E, Stalker LH, Smith E, Lyon D, Chan YE (eds) Surveillance, privacy, and the globalization of personal information: international comparisons. McGill-Queen’s University Press, Montreal & Kingston, pp 91–109

    Google Scholar 

  • Newell PB (1995) Perspectives on privacy. J Environ Psychol 14:65–78

    Article  Google Scholar 

  • Newell PB (1998) A cross-cultural comparison of privacy definitions and functions: a systems approach. J Environ Psychol 18:357–371

    Article  Google Scholar 

  • Pennock JR, Chapman JW (eds) (1971) Privacy: Nomos XIII. Atherton Press, New York

    Google Scholar 

  • Petronio S (2002) Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany

    Google Scholar 

  • Petronio S, Durham W (2008) Understanding and applying communication privacy management theory. In: Baxter LA, Braithwaite DO (eds) Engaging theories in interpersonal communication. Sage, Thousand Oaks, pp 309–322

    Google Scholar 

  • Petronio S, Reierson J (2009) Regulating the privacy of confidentiality: grasping the complexities through CPM theory. In: Afifi T, Afifi W (eds) Uncertainty and information regulation in interpersonal contexts: theories and applications. Routledge, New York, pp 365–383

    Google Scholar 

  • Singleton S (1998) Privacy as censorship: a skeptical view of proposals to regulate privacy in the private sector. (Policy Analysis No. 295) The Cato Institute, Washington, DC

    Google Scholar 

  • Sundstrom E (1986) Workplaces: the psychology of the physical environment in offices and factories. Cambridge University Press, New York

    Google Scholar 

  • Tavani H (2007) Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy 38(1):1–22

    Article  Google Scholar 

  • Vargas JA (Sept 20, 2010) Letter from Palo Alto: the face of facebook. The New Yorker, pp 54–64

    Google Scholar 

  • Warren C, Laslett B (1977) Privacy and secrecy: a conceptual comparison. J Soc Issues 33(3):43–51

    Article  Google Scholar 

  • Westin AF (1967) Privacy and freedom. Atheneum, New York

    Google Scholar 

  • Westin AF (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431–453

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephen T. Margulis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Margulis, S.T. (2011). Three Theories of Privacy: An Overview. In: Trepte, S., Reinecke, L. (eds) Privacy Online. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21521-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21521-6_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21520-9

  • Online ISBN: 978-3-642-21521-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics