Chapter 12 – Communication Privacy Management Theory – Flashcards

Unlock all answers in this set

Unlock answers
question
An interpretive theory by Sandra Petronio
answer
Communication Privacy Management Theory...
question
A metaphor to show how people think of the borders between private and public information.
answer
Privacy boundaries
question
When managing private information doesn't go the way we expect.
answer
Privacy Turbulence
question
1) People believe they own and have a right to control their private information. 2) People control their private information through the use of personal privacy rules. 3) When others are told or given access to a person's private information, they became co-owners of that information. 4) Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others.
answer
4 Principals - Privacy ownership
question
5) When co-owners of private information don't effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result.
answer
A 5th principal that involves privacy turbulence...
question
The content of potential disclosures; information that can be owned.
answer
Private Information
question
The feeling that one has the right to own private information.
answer
Privacy
question
A theory that assumes we can best understand people's freely chosen actions if we study the system of rules they use to interpret and manage their lives.
answer
Rule-based theory
question
An intersection of personal privacy boundaries of co-owners of private information, all of whom are responsible for the information.
answer
Collective privacy boundary
question
A synchronized collective privacy boundary that co-owners share because they have negotiated common privacy rules.
answer
Mutual privacy boundary
question
The rights and responsibilities that co-owners of private information have to control its spread
answer
Boundary Ownership
question
A confidant fully committed to handling private information according to the original owner's privacy rules.
answer
Shareholder
question
A recipient who sought out private information.
answer
Deliberate confidant
question
A co-owner of private information who did not seek it nor want it.
answer
Reluctant confidant
question
An alliance formed by co-owners of private information as to who else should be able to know.
answer
Boundary linkage
question
The extent to which a boundary permits private information to flow to third parties.
answer
Boundary permeability
question
Disruption of privacy management and relational trust that occurs when collective privacy boundaries aren't synchronized.
answer
Boundary turbulence
question
The tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner's welfare.
answer
Confidentiality dilemma
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New