Deck 12: Communication Privacy Management Theory

ملء الشاشة (f)
exit full mode
سؤال
Sandra Petronio prefers to use which of the following terms when describing the central action of her theory?

A) disclosure of private information
B) interactive intimacy
C) self-disclosure
D) self-other revelation
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
According to communication privacy management theory (CPM), which of the following statements is true about the five factors that play into the way people develop their own privacy rules?

A) Abused children find it difficult to have an abnormal conversation when their confidants are engaged in mundane activities.
B) Attraction and liking as interpersonal motives fail to loosen privacy boundaries.
C) Both men and women feel more hesitant to reveal private information to a woman than to a man.
D) Cultures differ on the value of openness and disclosure.
سؤال
According to communication privacy management theory (CPM), which of the following is NOT one of the factors that play into the way people develop their own privacy rules?

A) culture
B) family background
C) motivation
D) risk-benefit ratios
سؤال
Which of the following best describes a reluctant confidant?

A) a confidant who deserves access and control regarding private information and the rules for sharing it
B) a confidant who is fully committed to not sharing private information if not desired by the original owner
C) a co-owner of private information who did not seek it nor want it
D) a recipient who sought out private information to help others out
سؤال
A ________ refers to a confidant who deserves access and control regarding private information and the rules for sharing it.

A) reluctant confidant
B) deliberate confidant
C) shareholder
D) stakeholder
سؤال
Pastor Rick seeks private information about the members of his church. He asks a lot of questions to be able to know the members better. In this scenario, Rick most likely exemplifies the role of a(n) ________.

A) deliberate confidant
B) intentional owner
C) induced discloser
D) reluctant confederate
سؤال
When a recipient agrees to allow the original owner of private information to make decisions regarding further disclosure and control, which of the following terms does Petronio use to describe the recipient?

A) participatory owner
B) secondary owner
C) shareholder
D) silent partner
سؤال
Erin tells her friend Keith about her intention to marry her long-distance partner and move to another country. They agree that Keith can't tell anyone in his family about this except his wife. Which of the following is illustrated in this scenario?

A) boundary activation
B) boundary linkage
C) boundary ownership
D) boundary turbulence
سؤال
In the context of boundary turbulence, which of the following situations best exemplifies fuzzy boundaries?

A) when Simon discusses a sensitive case with his advocate in the presence of the advocate's neighbor
B) when Keith reveals Kyra's secret relationship under the influence of alcohol to her friends
C) when Sean posts pictures of a trip that was supposed to be a secret on social media and tags all his college friends
D) when Dorothy lies about her medical condition to avoid embarrassment
سؤال
The interpretive criterion that CPM does NOT meet well is ________.

A) aesthetic appeal
B) clarification of values
C) communication of agreement
D) understanding of people
سؤال
Petronio believes that no one truly owns his or her private information.
سؤال
Sandra Petronio chooses to talk about the phrase "disclosure of private information" because she feels that the phrase has a positive feel as opposed to the neutral connotation of the phrase "self-disclosure."
سؤال
Disclosers must realize that the personal privacy boundary encompassing an information morphs into a collective boundary that seldom shrinks back to being solely personal.
سؤال
Once an individual becomes a co-owner of another person's private information, each party should have an equal say in how the information is managed.
سؤال
Not all boundary ownership is 50-50, which suggests that not all co-owners come into ownership naturally, intentionally, or willingly.
سؤال
As a general rule of thumb, people who are highly eager to take on the role of confidant have a high control over what they hear.
سؤال
In the context of boundary linkage, it is unlikely that a recipient will deal with new information the way the discloser wants when the discloser and recipient have a close, trusting relationship.
سؤال
Boundary turbulence is the result of failed coordination.
سؤال
A confidant fully committed to handling private information according to the original owner's privacy rules is called a(n) ________.
سؤال
The overall process of co-managing collective boundaries that Petronio envisions is not simple and focuses on boundary ________, boundary ________, and boundary ________.
سؤال
Instead of talking about self-disclosure, as many relational theorists do, Petronio refers to the ________.
سؤال
Petronio's theory is grounded in the assumption that people own their private information. What does she mean by that? Why is ownership critical to the entire theory?
سؤال
People become co-owners of information through different means. Explain at least two routes to becoming a co-owner. What are the implications for the sense of responsibility that one feels?
سؤال
According to Petronio, once you know a piece of private information, you have rights and responsibilities. What are they? What is coupled with ownership, and what must be negotiated?
سؤال
Explain what is meant by boundary turbulence.
سؤال
Is Petronio's theory a communication theory or an information-management theory? What is the difference?
سؤال
How does CPM reflect a perspective of disclosure, privacy, and ownership?
سؤال
According to Altman and Taylor's social penetration theory, intimacy is established through disclosure. Petronio seems to advocate that unmanaged disclosure is problematic. How do you reconcile these positions?
سؤال
How is privacy negotiated online? In keeping with Walther's SIP, what boundaries are unique to online relationships?
سؤال
How does uncertainty affect boundary management? Think about uncertainty in the choice to disclose or keep private, in negotiating shared information, and in turbulence. What would Berger say?
سؤال
Does information change when it is moved from being privately held to co-owned? According to CMM, we are persons-in-conversation. Does something change when we dump our proverbial trucks and share information with others?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/31
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Communication Privacy Management Theory
1
Sandra Petronio prefers to use which of the following terms when describing the central action of her theory?

A) disclosure of private information
B) interactive intimacy
C) self-disclosure
D) self-other revelation
A
2
According to communication privacy management theory (CPM), which of the following statements is true about the five factors that play into the way people develop their own privacy rules?

A) Abused children find it difficult to have an abnormal conversation when their confidants are engaged in mundane activities.
B) Attraction and liking as interpersonal motives fail to loosen privacy boundaries.
C) Both men and women feel more hesitant to reveal private information to a woman than to a man.
D) Cultures differ on the value of openness and disclosure.
D
3
According to communication privacy management theory (CPM), which of the following is NOT one of the factors that play into the way people develop their own privacy rules?

A) culture
B) family background
C) motivation
D) risk-benefit ratios
B
4
Which of the following best describes a reluctant confidant?

A) a confidant who deserves access and control regarding private information and the rules for sharing it
B) a confidant who is fully committed to not sharing private information if not desired by the original owner
C) a co-owner of private information who did not seek it nor want it
D) a recipient who sought out private information to help others out
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
5
A ________ refers to a confidant who deserves access and control regarding private information and the rules for sharing it.

A) reluctant confidant
B) deliberate confidant
C) shareholder
D) stakeholder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
6
Pastor Rick seeks private information about the members of his church. He asks a lot of questions to be able to know the members better. In this scenario, Rick most likely exemplifies the role of a(n) ________.

A) deliberate confidant
B) intentional owner
C) induced discloser
D) reluctant confederate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
7
When a recipient agrees to allow the original owner of private information to make decisions regarding further disclosure and control, which of the following terms does Petronio use to describe the recipient?

A) participatory owner
B) secondary owner
C) shareholder
D) silent partner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
8
Erin tells her friend Keith about her intention to marry her long-distance partner and move to another country. They agree that Keith can't tell anyone in his family about this except his wife. Which of the following is illustrated in this scenario?

A) boundary activation
B) boundary linkage
C) boundary ownership
D) boundary turbulence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
9
In the context of boundary turbulence, which of the following situations best exemplifies fuzzy boundaries?

A) when Simon discusses a sensitive case with his advocate in the presence of the advocate's neighbor
B) when Keith reveals Kyra's secret relationship under the influence of alcohol to her friends
C) when Sean posts pictures of a trip that was supposed to be a secret on social media and tags all his college friends
D) when Dorothy lies about her medical condition to avoid embarrassment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
10
The interpretive criterion that CPM does NOT meet well is ________.

A) aesthetic appeal
B) clarification of values
C) communication of agreement
D) understanding of people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
11
Petronio believes that no one truly owns his or her private information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
12
Sandra Petronio chooses to talk about the phrase "disclosure of private information" because she feels that the phrase has a positive feel as opposed to the neutral connotation of the phrase "self-disclosure."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
13
Disclosers must realize that the personal privacy boundary encompassing an information morphs into a collective boundary that seldom shrinks back to being solely personal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
14
Once an individual becomes a co-owner of another person's private information, each party should have an equal say in how the information is managed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
15
Not all boundary ownership is 50-50, which suggests that not all co-owners come into ownership naturally, intentionally, or willingly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
16
As a general rule of thumb, people who are highly eager to take on the role of confidant have a high control over what they hear.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
17
In the context of boundary linkage, it is unlikely that a recipient will deal with new information the way the discloser wants when the discloser and recipient have a close, trusting relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
18
Boundary turbulence is the result of failed coordination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
19
A confidant fully committed to handling private information according to the original owner's privacy rules is called a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
20
The overall process of co-managing collective boundaries that Petronio envisions is not simple and focuses on boundary ________, boundary ________, and boundary ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
21
Instead of talking about self-disclosure, as many relational theorists do, Petronio refers to the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
22
Petronio's theory is grounded in the assumption that people own their private information. What does she mean by that? Why is ownership critical to the entire theory?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
23
People become co-owners of information through different means. Explain at least two routes to becoming a co-owner. What are the implications for the sense of responsibility that one feels?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
24
According to Petronio, once you know a piece of private information, you have rights and responsibilities. What are they? What is coupled with ownership, and what must be negotiated?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
25
Explain what is meant by boundary turbulence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
26
Is Petronio's theory a communication theory or an information-management theory? What is the difference?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
27
How does CPM reflect a perspective of disclosure, privacy, and ownership?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
28
According to Altman and Taylor's social penetration theory, intimacy is established through disclosure. Petronio seems to advocate that unmanaged disclosure is problematic. How do you reconcile these positions?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
29
How is privacy negotiated online? In keeping with Walther's SIP, what boundaries are unique to online relationships?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
30
How does uncertainty affect boundary management? Think about uncertainty in the choice to disclose or keep private, in negotiating shared information, and in turbulence. What would Berger say?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
31
Does information change when it is moved from being privately held to co-owned? According to CMM, we are persons-in-conversation. Does something change when we dump our proverbial trucks and share information with others?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.