Abstract
This chapter reviews the current most important theories of privacy. The review is addressed to those unfamiliar with theories of privacy. It is my goal to provide those readers with a foundation on which to build. To this end, the chapter summarizes the two best articulated and best supported theories of privacy (Altman 1975; Westin 1967) as well as Petronio’s (2002) communication privacy management (CPM) theory, an important extension of Altman’s theory that is particularly suited for the study of social networking. Additionally, this chapter considers two larger issues about what privacy is: issues in defining privacy and lessons to be learned from Altman’s and Westin’s theories. I begin with the three theories of privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This chapter draws heavily on two articles by the author in the Journal of Social Issues (Margulis 2003a, b). The author wishes to thank Wiley-Blackwell for allowing the use of this material. I wish to thank Sandra Petronio for her very helpful review of her theory and for providing published and unpublished material.
References
Allen AL (1988) Uneasy access: privacy for women in a free society. Rowman & Littlefield, Totowa
Altman I (1975) The environment and social behavior: privacy, personal space, territory, crowding. Brooks/Cole, Monterey
Altman I (1977) Privacy regulation: culturally universal or culturally specific? J Soc Issues 33(3):66–84
Altman I (1990) Toward a transactional perspective: a personal journey. In: Altman I, Christensen K (eds) Environment and behavior studies: emergence of intellectual traditions. Plenum, New York, pp 335–355
Bennett CJ (1995) The political economy of privacy: a review of the literature. Paper prepared for the center for social and legal research, DOE genome project (Final draft), University of Victoria, Department of Political Science, Victoria
Child JT, Agyeman-Badu E (2010) Blogging privacy management rule development: the impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Comput Hum Behav 26:957–963
Child JT, Pearson JC, Petronio S (2009) Blogging, communication, and privacy management: development of the blogging privacy management measure. J Am Soc Inf Sci Technol 60(1):2079–2094
Child JT, Petronio S (2011) Unpacking the paradoxes of privacy in CMC relationships: the challenges of blogging and relational communication on the internet. In: Wright K, Webb L (eds) Computer mediated communication in personal relationships. Hampton Press, Cresskill, pp 21–40
Davis S (2009) Privacy, rights, and moral value. In: Matheson D (ed) Contours of privacy. Cambridge Scholars Publishing, Newcastle upon Tyne, pp 153–179
Derlega V, Chaikin AL (1977) Privacy and self-disclosure in social relationships. J Soc Issues 33(3):102–115
Etzioni A (1999) The limits of privacy. Basic Books, New York
Johnson CA (1974) Privacy as personal control. In: Carson DH (ed) Man-environment interactions: evaluations and applications (Part II, Vol. 6: Privacy, S.T. Margulis, vol. ed). Environmental Design Research Association, Washington, DC, pp 83–100
Jourard SM (1971) The transparent self. (rev edn). Van Nostrand Reinhold, New York
Kelvin P (1973) A social-psychological examination of privacy. Br J Soc Clin Psychol 12:248–261
Lyon D, Zuriek E (1996) Surveillance, privacy, and the new technology. In: Lyon D, Zureik E (eds) Computers, surveillance, and privacy. University of Minnesota Press, Minneapolis, pp 1–18
Lyons D (June 7, 2010) Facebook’s false contrition. Newsweek, p 20
Margulis ST (1977) Conceptions of privacy: current status and next steps. J Soc Issues 33(3):5–21
Margulis ST (2003a) Privacy as a social issue and a behavioral concept. J Soc Issues 59(2):243–262
Margulis ST (2003b) On the status and contribution of Westin’s and Altman’s theories of privacy. J Soc Issues 59(2):411–429
Margulis ST (2009) Privacy and psychology. In: Matheson D (ed) Contours of privacy. Cambridge Scholars Publishing, Newcastle upon Tyne, pp 143–151
Margulis ST, Pope JA, Lowen A (2010) The Harris-Westin index of general concern about privacy: an exploratory conceptual replication. In: Zuriek E, Stalker LH, Smith E, Lyon D, Chan YE (eds) Surveillance, privacy, and the globalization of personal information: international comparisons. McGill-Queen’s University Press, Montreal & Kingston, pp 91–109
Newell PB (1995) Perspectives on privacy. J Environ Psychol 14:65–78
Newell PB (1998) A cross-cultural comparison of privacy definitions and functions: a systems approach. J Environ Psychol 18:357–371
Pennock JR, Chapman JW (eds) (1971) Privacy: Nomos XIII. Atherton Press, New York
Petronio S (2002) Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany
Petronio S, Durham W (2008) Understanding and applying communication privacy management theory. In: Baxter LA, Braithwaite DO (eds) Engaging theories in interpersonal communication. Sage, Thousand Oaks, pp 309–322
Petronio S, Reierson J (2009) Regulating the privacy of confidentiality: grasping the complexities through CPM theory. In: Afifi T, Afifi W (eds) Uncertainty and information regulation in interpersonal contexts: theories and applications. Routledge, New York, pp 365–383
Singleton S (1998) Privacy as censorship: a skeptical view of proposals to regulate privacy in the private sector. (Policy Analysis No. 295) The Cato Institute, Washington, DC
Sundstrom E (1986) Workplaces: the psychology of the physical environment in offices and factories. Cambridge University Press, New York
Tavani H (2007) Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy 38(1):1–22
Vargas JA (Sept 20, 2010) Letter from Palo Alto: the face of facebook. The New Yorker, pp 54–64
Warren C, Laslett B (1977) Privacy and secrecy: a conceptual comparison. J Soc Issues 33(3):43–51
Westin AF (1967) Privacy and freedom. Atheneum, New York
Westin AF (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431–453
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Margulis, S.T. (2011). Three Theories of Privacy: An Overview. In: Trepte, S., Reinecke, L. (eds) Privacy Online. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21521-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-21521-6_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21520-9
Online ISBN: 978-3-642-21521-6
eBook Packages: Computer ScienceComputer Science (R0)