Chapter 13 Communication Privacy Management Theory – Flashcards

Unlock all answers in this set

Unlock answers
question
What was communication privacy management theory designed to explain?
answer
Public and private disclosure in relationships.
question
What are the three assumptions of communication privacy management theory concerning human nature?
answer
Humans are choice makers humans are rule makers and rule followers human's choices and rules are based off of the consideration of others as well as self.
question
what are the two assumptions concerning relational dialectics
answer
relational life is characterized by change contradiction of the fundamental fact of life.
question
What is the difference between private information and private disclosures?
answer
private disclosure is what is going on in our heads while self disclosure is what category we are put under(private is within and deeply matter to a person, self is what other people
question
Why does this theory use the term "private disclosure" instead of "self-disclosure"?
answer
Because self disclosures are just things about us that people know, private disclosure is something more intimate
question
In what way is Communication Privacy Management theory a rule-based theory?
answer
By certain societal rules we chose to or not to private disclosure some things.
question
How does a privacy management system identify ways privacy boundaries are coordinated between and among individuals?
answer
private information is about things that matter deeply to a person, private boundaries are the line in the sand where between private info that only that certain person should tell and public info. This is linked to Boundary coordination, linkage, ownership. Also how permeability(think or thin) the boundaries are, and if there is any boundary turbulence. Control and ownership is when it is that person's information that is theirs to tell.
question
What is the privacy rule management process?
answer
the nature of the disclosure[privacy of the characteristics] whether we solely own it or it is co-owned info[boundary coordination] and if there is any conflicts in expectations on how private it is[boundary turbulence.]
question
How do the five decision-making criteria help us develop rules for privacy management?
answer
Cultural[what culture a person is from.[ Gendered [women and men way of PM] motivational [how much you want to disclosure.] contextual [our environment affects if we want to disclosure something] Risk-benefit, [assessments of risks of benefits of disclosing.]
question
What is boundary coordination, and what are its features?
answer
Boundary linkage the connections forming a boundary alliances between people boundary ownership-right and privileges accruing to co-owners of private information. boundary permeability-how much information is able to be passed through the boundary. boundary turbulence: conflicts about boundary expectations and regulation.
question
In terms of criticism of this theory, how is Communication Privacy Management evaluated in terms of utility and heurism?
answer
much promise of utility, and is heuristic.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New