Deck 12: Communication Privacy Management Theory

ملء الشاشة (f)
exit full mode
سؤال
The earlier studies of Communication Privacy Management (CPM) Theory looked at

A) initial encounters
B) rule development
C) reasons for relationship termination
D) friendship formation
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Originally, Petronio referred to her theory as a _________ because its boundaries were confined to privacy within a marital relationship.

A) macrotheory
B) microtheory
C) macrocosm
D) microcosm
سؤال
All of the following are assumptions of Communication Privacy Management Theory EXCEPT

A) Humans are choice makers.
B) Humans are rule makers and rule followers.
C) Humans believe that life is always in flux.
D) The choices humans make are based on others and the self.
سؤال
If Miranda was concerned about disclosing information that mattered deeply to her, she is wary of communicating which of the following?

A) intimate information
B) personal information
C) a dialectical rationale
D) private information
سؤال
Which of the following is NOT one of the features of boundaries as discussed by Petronio?

A) Boundaries can be personal.
B) Boundaries are normally set by those in power.
C) Boundaries can be rigid.
D) Boundaries can change across the life span.
سؤال
Caughlin and Afifi's (2004) research speaks to the issue of ownership. In their research on relationships between college students and their parents, as well as research on boyfriend/girlfriend relationships, they found that

A) relational partners are unwilling to take responsibility for their decisions
B) avoiding disclosures can sometimes be helpful to relationships
C) it is never a good idea to restrict open communication
D) relational partners usually reveal more information than they should
سؤال
Petronio believes that the basic thesis of Communication Privacy Management Theory is "grounded in the unity of ________"

A) social exchange principles
B) communication systems
C) communication symbols
D) dialectics
سؤال
Sharma is close to her gynecologist, frequently telling her physician some personal information. The bond formed between Sharma and her physician represents which concept of Communication Privacy Management Theory?

A) boundary coordination
B) boundary linkage
C) integrative bonding
D) collegial bonding
سؤال
The communication tradition to which CPM is related is

A) socio-cultural
B) socio-phenomenological
C) socio-psychological
D) socio-semiotic
سؤال
Tucker and Sophie have been roommates for 2 months. Although they feel quite close, they still find themselves in conflicts. For instance, Tucker has accused Sophie of telling others about some personal information he revealed to her a few months ago. Sophie, however, felt that Tucker didn't clearly state that the information should be kept private. This episode represents which concept of Communication Privacy Management Theory?

A) boundary ambiguity
B) boundary permeability
C) boundary ownership
D) boundary turbulence
سؤال
Which of the following statements accurately expresses the relationship between people and rules?

A) People have little respect for rules in close relationships.
B) People learn rules by negotiation.
C) People's rules reflect their personal values.
D) Rules are critical in determining relationship satisfaction.
سؤال
Which of the following is NOT considered to be a decision criterion for rule development?

A) gender
B) motivation
C) class
D) context
سؤال
When access to private information is closed, boundaries are said to be _____ when access is open, people have ______ boundaries.

A) thin; thick
B) thick; thin
C) limited; expansive
D) expansive; limited
سؤال
As partners for over a decade, Carmen and Lucy have clear rules about information that they are to keep between themselves and information available to close friends. The couple is practicing which concept of Communication Boundary Management Theory?

A) boundary permeability
B) boundary explicitness
C) boundary ownership
D) boundary communication
سؤال
CPM relies on the boundary metaphor to make the point that there is a line between being public and being private. When private information is shared, the boundary around it is called a

A) collective boundary
B) personal boundary
C) private boundary
D) disclosure boundary
سؤال
Which communication context is the focus of CPM?

A) intrapersonal
B) small group
C) public
D) interpersonal
سؤال
Which approach to knowing characterizes the research undertaken with CPM?

A) positivistic/empirical
B) interpretive/hermeneutic
C) critical
D) phenomenological
سؤال
Which of the following statements accurately captures the main criticism of CPM?

A) Critics question its logical consistency because it claims to be a dialectical theory but appears to take a dualistic approach.
B) Critics question its heurism because of the lack of research that has been undertaken using CPM.
C) Critics question its utility because it does not appear to explain the phenomenon under consideration very well.
D) Critics question its parsimony because it seems unnecessarily complex in nature given the simple processes it attempts to explain.
سؤال
All of the following are decision-making criteria for developing privacy rules EXCEPT

A) gender criteria
B) motivation criteria
C) boundary criteria
D) risk-benefit ratio criteria
سؤال
Communication Privacy Management Theory has its roots in economics.
سؤال
Human beings, in Communication Privacy Management Theory, are viewed as choice makers who make decisions regarding rule-making and rule-following.
سؤال
Private disclosures, rather than self-disclosures, are emphasized in communication privacy management.
سؤال
Boundary ownership refers to a person's decision to cross over appropriate relational guidelines.
سؤال
When private information is shared, the boundary around it is called a collective boundary.
سؤال
Petronio is convinced that despite what others believe, all relationships are essentially the same in terms of intimacy.
سؤال
CPM Theory is a dialectic theory, although it has been criticized for reflecting more of a dualistic approach.
سؤال
The theorists argue that privacy can only be understood in a dialectical tension with disclosure; if we disclosed everything, we wouldn't have a concept of privacy, and vice versa.
سؤال
Explain the role of rules in Communication Boundary Management Theory. How are they interpreted by Petronio and how do they function?
سؤال
Apply Communication Privacy Management Theory to on-line relationships.
سؤال
How does boundary ownership exist in work relationships?
سؤال
Differentiate between private disclosures and self-disclosures. Are they basically the same? Different? Use examples.
سؤال
What does Petronio mean by "intimacy?"
سؤال
Define boundary turbulence and describe an instance in which you experienced it. What adjustments were made in order to reduce turbulence and achieve coordination? Were they effective? Why or why not?
سؤال
How would you go about studying Communication Privacy Management in a particular relationship or context? Formulate a hypothesis or research question based on the theory, and describe your method for investigating it.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/34
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Communication Privacy Management Theory
1
The earlier studies of Communication Privacy Management (CPM) Theory looked at

A) initial encounters
B) rule development
C) reasons for relationship termination
D) friendship formation
rule development
2
Originally, Petronio referred to her theory as a _________ because its boundaries were confined to privacy within a marital relationship.

A) macrotheory
B) microtheory
C) macrocosm
D) microcosm
microtheory
3
All of the following are assumptions of Communication Privacy Management Theory EXCEPT

A) Humans are choice makers.
B) Humans are rule makers and rule followers.
C) Humans believe that life is always in flux.
D) The choices humans make are based on others and the self.
Humans believe that life is always in flux.
4
If Miranda was concerned about disclosing information that mattered deeply to her, she is wary of communicating which of the following?

A) intimate information
B) personal information
C) a dialectical rationale
D) private information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT one of the features of boundaries as discussed by Petronio?

A) Boundaries can be personal.
B) Boundaries are normally set by those in power.
C) Boundaries can be rigid.
D) Boundaries can change across the life span.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
6
Caughlin and Afifi's (2004) research speaks to the issue of ownership. In their research on relationships between college students and their parents, as well as research on boyfriend/girlfriend relationships, they found that

A) relational partners are unwilling to take responsibility for their decisions
B) avoiding disclosures can sometimes be helpful to relationships
C) it is never a good idea to restrict open communication
D) relational partners usually reveal more information than they should
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
7
Petronio believes that the basic thesis of Communication Privacy Management Theory is "grounded in the unity of ________"

A) social exchange principles
B) communication systems
C) communication symbols
D) dialectics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
8
Sharma is close to her gynecologist, frequently telling her physician some personal information. The bond formed between Sharma and her physician represents which concept of Communication Privacy Management Theory?

A) boundary coordination
B) boundary linkage
C) integrative bonding
D) collegial bonding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
9
The communication tradition to which CPM is related is

A) socio-cultural
B) socio-phenomenological
C) socio-psychological
D) socio-semiotic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
10
Tucker and Sophie have been roommates for 2 months. Although they feel quite close, they still find themselves in conflicts. For instance, Tucker has accused Sophie of telling others about some personal information he revealed to her a few months ago. Sophie, however, felt that Tucker didn't clearly state that the information should be kept private. This episode represents which concept of Communication Privacy Management Theory?

A) boundary ambiguity
B) boundary permeability
C) boundary ownership
D) boundary turbulence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following statements accurately expresses the relationship between people and rules?

A) People have little respect for rules in close relationships.
B) People learn rules by negotiation.
C) People's rules reflect their personal values.
D) Rules are critical in determining relationship satisfaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is NOT considered to be a decision criterion for rule development?

A) gender
B) motivation
C) class
D) context
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
13
When access to private information is closed, boundaries are said to be _____ when access is open, people have ______ boundaries.

A) thin; thick
B) thick; thin
C) limited; expansive
D) expansive; limited
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
14
As partners for over a decade, Carmen and Lucy have clear rules about information that they are to keep between themselves and information available to close friends. The couple is practicing which concept of Communication Boundary Management Theory?

A) boundary permeability
B) boundary explicitness
C) boundary ownership
D) boundary communication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
15
CPM relies on the boundary metaphor to make the point that there is a line between being public and being private. When private information is shared, the boundary around it is called a

A) collective boundary
B) personal boundary
C) private boundary
D) disclosure boundary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which communication context is the focus of CPM?

A) intrapersonal
B) small group
C) public
D) interpersonal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which approach to knowing characterizes the research undertaken with CPM?

A) positivistic/empirical
B) interpretive/hermeneutic
C) critical
D) phenomenological
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following statements accurately captures the main criticism of CPM?

A) Critics question its logical consistency because it claims to be a dialectical theory but appears to take a dualistic approach.
B) Critics question its heurism because of the lack of research that has been undertaken using CPM.
C) Critics question its utility because it does not appear to explain the phenomenon under consideration very well.
D) Critics question its parsimony because it seems unnecessarily complex in nature given the simple processes it attempts to explain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
19
All of the following are decision-making criteria for developing privacy rules EXCEPT

A) gender criteria
B) motivation criteria
C) boundary criteria
D) risk-benefit ratio criteria
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
20
Communication Privacy Management Theory has its roots in economics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
21
Human beings, in Communication Privacy Management Theory, are viewed as choice makers who make decisions regarding rule-making and rule-following.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
22
Private disclosures, rather than self-disclosures, are emphasized in communication privacy management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
23
Boundary ownership refers to a person's decision to cross over appropriate relational guidelines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
24
When private information is shared, the boundary around it is called a collective boundary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
25
Petronio is convinced that despite what others believe, all relationships are essentially the same in terms of intimacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
26
CPM Theory is a dialectic theory, although it has been criticized for reflecting more of a dualistic approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
27
The theorists argue that privacy can only be understood in a dialectical tension with disclosure; if we disclosed everything, we wouldn't have a concept of privacy, and vice versa.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
28
Explain the role of rules in Communication Boundary Management Theory. How are they interpreted by Petronio and how do they function?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
29
Apply Communication Privacy Management Theory to on-line relationships.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
30
How does boundary ownership exist in work relationships?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
31
Differentiate between private disclosures and self-disclosures. Are they basically the same? Different? Use examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
32
What does Petronio mean by "intimacy?"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
33
Define boundary turbulence and describe an instance in which you experienced it. What adjustments were made in order to reduce turbulence and achieve coordination? Were they effective? Why or why not?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
34
How would you go about studying Communication Privacy Management in a particular relationship or context? Formulate a hypothesis or research question based on the theory, and describe your method for investigating it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.