Individuals at the DFW Church publicly confess intensely personal information, such as drug and alcohol addiction, spousal and child abuse, stripping, and sexual abuse. Using communication privacy management theory (CPM), I examined the way individuals at the DFW Church manage their private information, how they make disclosure decisions, and how they manage boundaries around their private information. I interviewed 13 individuals who participated in public confession, and coded their responses to identify the common themes and tactics for making disclosure decisions. Through this process, I pioneer the application of CPM to examine public disclosure events, rather than dyadic or small group disclosures. I also expand our current understanding of motivations for disclosure; rather than focusing on selfish or therapeutic motivations, participants want to encourage others through their disclosure. In terms of boundary management, individuals at the DFW Church believe that God owns part, or all, of their information; thus, disclosing their pasts is "not about them." Participants construct a new identity through their testimony narrative, effectively putting the old person in the past and presenting a new, Christian identity to the church body for group approval. In this context, confessing a negative behavior becomes a way to build a positive image by showing the drastic reformation that has taken place in that person's life. Lastly, I propose the public disclosure model—which involves boundary testing, audience analysis, and choice of disclosure path—to be tested for use in future research.
Identifer | oai:union.ndltd.org:unt.edu/info:ark/67531/metadc271929 |
Date | 05 1900 |
Creators | Brittain, Kära Ann Caskey |
Contributors | Richardson, Brian K., Wang, Zuoming, Allison, John M., Jr. |
Publisher | University of North Texas |
Source Sets | University of North Texas |
Language | English |
Detected Language | English |
Type | Thesis or Dissertation |
Format | Text |
Rights | Public, Brittain, Kära Ann Caskey, Copyright, Copyright is held by the author, unless otherwise noted. All rights Reserved. |
Page generated in 0.002 seconds