Communication Privacy Management Theory- Ch. 12 – Flashcards

Unlock all answers in this set

Unlock answers
question
Social Penetration Theory
answer
Focused on self-disclosure as the primary way to develop close relationships
question
Example of Social Penetration Theory
answer
Suppose you visit your school's health center bc you're concerned about abnormal bleeding. Upon careful examination, the doctor says you may have cervical cancer and surgery may be necessary. Who will you tell right away- immediate family member, romantic partner, a good friend, or maybe all three, or none of them?
question
Communication privacy management theory (CPM)
answer
Description of privacy management system that contains three main parts
question
Three main parts of CPM
answer
Privacy Ownership, Privacy Control, and Privacy Turbulence
question
Privacy Ownership
answer
Contains our privacy boundaries that encompass information that we have but others don't know (1st)
question
Privacy Control
answer
Involves our decision to share private information with another person(2nd)
question
Privacy Turbulence
answer
Comes into play when managing private information doesn't go the way we expected.
question
Privacy boundaries
answer
A metaphor to show how people think of the borders between private and public information
question
Private information
answer
The content of potential disclosures; information that can be owned.
question
Five Core Principles of Petronio's CPM
answer
1. People believe they own and have a right to control their private information 2. People control their private information through the use of personal privacy rules 3. When others are told or given access to a person's private information they become co-owners of that information 4. Co-owners of private information need to negotiate mutually agreeable privacy rules about telling others 5. When co-owners of private information don't effectively negotiate and follow mutually held privacy rules, boundary turbulence is the likely result.
question
Rule based theory
answer
A theory that assumes we can best understand people's freely chosen actions if we study the system of rules they use to interpret and manage their lives.
question
Five factors of CPM
answer
Culture, gender, motivation, context, and risk/benefit ratios
question
Collective privacy boundary
answer
A intersection of personal privacy boundaries of co owners of private information, all of whom are responsible for the information
question
Example of disclosure of private information
answer
We could desire to relive a burden, prevent a wrong, make an impression, gain control, or simply enjoy self expression
question
Coordinating Mutual Privacy Boundaries
answer
Negotiation is necessary, Boundary ownership, Boundary linkage, Boundary permeability
question
Boundary permeability
answer
refers to the degree that privacy boundaries are penetrable.
question
Boundaries
answer
can be closed or tight allowing little information to pass through, or boundaries can be open or loosely held allowing information to easily pass through.
question
Permeability
answer
is a matter of degree.
question
Rules
answer
act as filters, letting some information pass easily through, while other information is closely guarded.
question
Disclosers and receivers
answer
need to negotiate mutual rules for possible third-party dissemination.
question
Boundary Turbulence
answer
Turbulence is concerning, Fuzzy boundary problems, Intentional breaches vs. mistakes
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New