Chapter 12: Communication Privacy Management Flashcards

1
Q

Who is the author of Communication Privacy Management theory?

A

Sandra Petronio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three inherent assumptions noted by West & Turner?

A

1) humans are choice makers
2) humans are rule makers and followers
3) human choices and rules are based on a consideration of others as well as the self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Elaboration on “human choices and rules are based on a consideration of others as well as the self”

A

(a) the self is in relationship with others

b) the dialectical tension between privacy and disclosure (if we disclose everything, we have no concept of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three main parts of the theory?

A
  • ownership
  • control
  • turbulence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ownership:

A

there are boundaries between what I know and others don’t know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Turbulence:

A

what happens when things don’t go as expected

i.e., we get upset when someone shares our private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control:

A

we make decisions about whether to share or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the “engine” of CPM?

A

control

  • we make decisions about whether to share information or now
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Finish Core principle #1: People believe they ____ and have a right to ____ ____ ____ ____.

A

own; control their private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do people wan to believe they own and control their private information?

A
  • feel less vulnerable
  • increase autonomy
  • inherent responsibility to handle private information carefully
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Do people actually own their private information?

A

no, it’s a perception. you can physically show ownership of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Finish Core principle # 2: People control their ____ information through the use of ____ ____ ____.

A

personal; personal privacy rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Personal rules:

A

rules that I make for just me – not necessarily societal norms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What things impact the rules/patterns people use?

A
  • culture
  • gender
  • motivation
  • context
  • risks/benefits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Finish Core principle #3: When others are told or discover a person’s ____ ____, they become _____ of that information

A

private information; co-owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does someone else finding out someone’s private information create?

A

a collective privacy boundary and a confidant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Co-owners of private information may disagree on management.

A

True.

18
Q

What happens when reluctant receivers acquire private information?

A

they may not care as much about adhering to the owner’s rules for the information

19
Q

Finish Core principle #4: Co-owners of private information need to negotiate ____ _____ ____ rules about telling others (relational _____).

A

mutually agreeable privacy; harmony

20
Q

What are the three coordination activities?

A

1) boundary ownership
2) boundary linkage
3) boundary permeability

21
Q

How you become a confidant influences the amount of control you have?

A

true

22
Q

Deliberate confidant:

A

solicits information

23
Q

Reluctant confidant:

A

less likely to follow the rules (did not ask for the information)

24
Q

Shareholders:

A

vested/committed to the original owner’s rules

25
Q

Stakeholder:

A

we make the rules

26
Q

Boundary linkage:

A

forming boundary alliances to determine who else gets to know

27
Q

Boundary permeability:

A

how strong is the boundary between us // information can be shared or it can’t

28
Q

Finish Core principle #5: When ____ don’t effectively negotiate and follow jointly held privacy rules, boundary _____ is the likely result.

A

co-owners; turbulence

29
Q

What are the conditions for turbulence?

A
  • fuzzy boundaries
  • intentional breaches
  • mistake
30
Q

What is the difference between an intentional breach as a personal advantage vs. a confidentiality dilemma?

A

personal advantage - information shared so the person gains something
confidentiality dilemma - damned if you do, damned if you don’t

31
Q

What should you do if turbulence does occur?

A

go back and adjust the rules or clarify them

32
Q

Descriptive theory

A

theories that describe how something is

33
Q

Prescriptive theory

A

theories that say how people should act or how things ought to be

34
Q

Marsha is a boss to Jeff and Ruthie. Marsha tells Ruthie that Marsha has been approached by a competitor to go work for them. Marsha firmly requests that Ruthie keep it just between them since she was still deciding what to do. Ruthie, who is always looking for a chance to look like she is more important than her coworkers, tells Jeff that Marsha confided in her. It made Ruthie feel powerful to be able to tell Jeff that their boss confided in her (and not him). Petronio’s CPM theory suggests this might create (a/an) ____ due to ____.

A

turbulence, intentional breach

35
Q

What type of theory is CPM?

A

interpretive

36
Q

What tradition(s) does CPM theory represent?

A

cybernetic and socio-cultural

37
Q

In CPM theory, boundary linkage, ownership and permeability are

A

established through communication and negotiated

38
Q

CPM: Griffin establishes this theory as being more ____ than ____.

A

interpretive, objective

39
Q

CPM: This theory assumes people are

A

all of these are correct

  • rule followers, choice makers, rule makers
40
Q

CPM: When explaining CPM, I also discussed theories that say how people should act or how things ought to be. These were called ____ theories.

A

prescriptive

41
Q

CPM: Laura tells Shondra about her pregnancy with Mike. Laura also tells Shondra not to tell anyone about the pregnancy. Shondra keeps her word and does not tell a soul. Shondra is considered to be a ____ of Laura’s private information.

A

Shareholder

42
Q

CPM: When co-owners negotiate privacy rules, a reluctant confidant is ____ likely to follow those rules.

A

less