Deck 12: Communication Privacy Management Theory

Full screen (f)
exit full mode
Question
Sandra Petronio prefers to use which of the following terms when describing the central action of her theory?

A) disclosure of private information
B) interactive intimacy
C) self-disclosure
D) self-other revelation
Use Space or
up arrow
down arrow
to flip the card.
Question
According to communication privacy management theory (CPM), which of the following statements is true about the five factors that play into the way people develop their own privacy rules?

A) Abused children find it difficult to have an abnormal conversation when their confidants are engaged in mundane activities.
B) Attraction and liking as interpersonal motives fail to loosen privacy boundaries.
C) Both men and women feel more hesitant to reveal private information to a woman than to a man.
D) Cultures differ on the value of openness and disclosure.
Question
According to communication privacy management theory (CPM), which of the following is NOT one of the factors that play into the way people develop their own privacy rules?

A) culture
B) family background
C) motivation
D) risk-benefit ratios
Question
Which of the following best describes a reluctant confidant?

A) a confidant who deserves access and control regarding private information and the rules for sharing it
B) a confidant who is fully committed to not sharing private information if not desired by the original owner
C) a co-owner of private information who did not seek it nor want it
D) a recipient who sought out private information to help others out
Question
A ________ refers to a confidant who deserves access and control regarding private information and the rules for sharing it.

A) reluctant confidant
B) deliberate confidant
C) shareholder
D) stakeholder
Question
Pastor Rick seeks private information about the members of his church. He asks a lot of questions to be able to know the members better. In this scenario, Rick most likely exemplifies the role of a(n) ________.

A) deliberate confidant
B) intentional owner
C) induced discloser
D) reluctant confederate
Question
When a recipient agrees to allow the original owner of private information to make decisions regarding further disclosure and control, which of the following terms does Petronio use to describe the recipient?

A) participatory owner
B) secondary owner
C) shareholder
D) silent partner
Question
Erin tells her friend Keith about her intention to marry her long-distance partner and move to another country. They agree that Keith can't tell anyone in his family about this except his wife. Which of the following is illustrated in this scenario?

A) boundary activation
B) boundary linkage
C) boundary ownership
D) boundary turbulence
Question
In the context of boundary turbulence, which of the following situations best exemplifies fuzzy boundaries?

A) when Simon discusses a sensitive case with his advocate in the presence of the advocate's neighbor
B) when Keith reveals Kyra's secret relationship under the influence of alcohol to her friends
C) when Sean posts pictures of a trip that was supposed to be a secret on social media and tags all his college friends
D) when Dorothy lies about her medical condition to avoid embarrassment
Question
The interpretive criterion that CPM does NOT meet well is ________.

A) aesthetic appeal
B) clarification of values
C) communication of agreement
D) understanding of people
Question
Petronio believes that no one truly owns his or her private information.
Question
Sandra Petronio chooses to talk about the phrase "disclosure of private information" because she feels that the phrase has a positive feel as opposed to the neutral connotation of the phrase "self-disclosure."
Question
Disclosers must realize that the personal privacy boundary encompassing an information morphs into a collective boundary that seldom shrinks back to being solely personal.
Question
Once an individual becomes a co-owner of another person's private information, each party should have an equal say in how the information is managed.
Question
Not all boundary ownership is 50-50, which suggests that not all co-owners come into ownership naturally, intentionally, or willingly.
Question
As a general rule of thumb, people who are highly eager to take on the role of confidant have a high control over what they hear.
Question
In the context of boundary linkage, it is unlikely that a recipient will deal with new information the way the discloser wants when the discloser and recipient have a close, trusting relationship.
Question
Boundary turbulence is the result of failed coordination.
Question
A confidant fully committed to handling private information according to the original owner's privacy rules is called a(n) ________.
Question
The overall process of co-managing collective boundaries that Petronio envisions is not simple and focuses on boundary ________, boundary ________, and boundary ________.
Question
Instead of talking about self-disclosure, as many relational theorists do, Petronio refers to the ________.
Question
Petronio's theory is grounded in the assumption that people own their private information. What does she mean by that? Why is ownership critical to the entire theory?
Question
People become co-owners of information through different means. Explain at least two routes to becoming a co-owner. What are the implications for the sense of responsibility that one feels?
Question
According to Petronio, once you know a piece of private information, you have rights and responsibilities. What are they? What is coupled with ownership, and what must be negotiated?
Question
Explain what is meant by boundary turbulence.
Question
Is Petronio's theory a communication theory or an information-management theory? What is the difference?
Question
How does CPM reflect a perspective of disclosure, privacy, and ownership?
Question
According to Altman and Taylor's social penetration theory, intimacy is established through disclosure. Petronio seems to advocate that unmanaged disclosure is problematic. How do you reconcile these positions?
Question
How is privacy negotiated online? In keeping with Walther's SIP, what boundaries are unique to online relationships?
Question
How does uncertainty affect boundary management? Think about uncertainty in the choice to disclose or keep private, in negotiating shared information, and in turbulence. What would Berger say?
Question
Does information change when it is moved from being privately held to co-owned? According to CMM, we are persons-in-conversation. Does something change when we dump our proverbial trucks and share information with others?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/31
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Communication Privacy Management Theory
1
Sandra Petronio prefers to use which of the following terms when describing the central action of her theory?

A) disclosure of private information
B) interactive intimacy
C) self-disclosure
D) self-other revelation
A
2
According to communication privacy management theory (CPM), which of the following statements is true about the five factors that play into the way people develop their own privacy rules?

A) Abused children find it difficult to have an abnormal conversation when their confidants are engaged in mundane activities.
B) Attraction and liking as interpersonal motives fail to loosen privacy boundaries.
C) Both men and women feel more hesitant to reveal private information to a woman than to a man.
D) Cultures differ on the value of openness and disclosure.
D
3
According to communication privacy management theory (CPM), which of the following is NOT one of the factors that play into the way people develop their own privacy rules?

A) culture
B) family background
C) motivation
D) risk-benefit ratios
B
4
Which of the following best describes a reluctant confidant?

A) a confidant who deserves access and control regarding private information and the rules for sharing it
B) a confidant who is fully committed to not sharing private information if not desired by the original owner
C) a co-owner of private information who did not seek it nor want it
D) a recipient who sought out private information to help others out
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
5
A ________ refers to a confidant who deserves access and control regarding private information and the rules for sharing it.

A) reluctant confidant
B) deliberate confidant
C) shareholder
D) stakeholder
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
6
Pastor Rick seeks private information about the members of his church. He asks a lot of questions to be able to know the members better. In this scenario, Rick most likely exemplifies the role of a(n) ________.

A) deliberate confidant
B) intentional owner
C) induced discloser
D) reluctant confederate
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
7
When a recipient agrees to allow the original owner of private information to make decisions regarding further disclosure and control, which of the following terms does Petronio use to describe the recipient?

A) participatory owner
B) secondary owner
C) shareholder
D) silent partner
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
8
Erin tells her friend Keith about her intention to marry her long-distance partner and move to another country. They agree that Keith can't tell anyone in his family about this except his wife. Which of the following is illustrated in this scenario?

A) boundary activation
B) boundary linkage
C) boundary ownership
D) boundary turbulence
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
9
In the context of boundary turbulence, which of the following situations best exemplifies fuzzy boundaries?

A) when Simon discusses a sensitive case with his advocate in the presence of the advocate's neighbor
B) when Keith reveals Kyra's secret relationship under the influence of alcohol to her friends
C) when Sean posts pictures of a trip that was supposed to be a secret on social media and tags all his college friends
D) when Dorothy lies about her medical condition to avoid embarrassment
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
10
The interpretive criterion that CPM does NOT meet well is ________.

A) aesthetic appeal
B) clarification of values
C) communication of agreement
D) understanding of people
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
11
Petronio believes that no one truly owns his or her private information.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
12
Sandra Petronio chooses to talk about the phrase "disclosure of private information" because she feels that the phrase has a positive feel as opposed to the neutral connotation of the phrase "self-disclosure."
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
13
Disclosers must realize that the personal privacy boundary encompassing an information morphs into a collective boundary that seldom shrinks back to being solely personal.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
14
Once an individual becomes a co-owner of another person's private information, each party should have an equal say in how the information is managed.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
15
Not all boundary ownership is 50-50, which suggests that not all co-owners come into ownership naturally, intentionally, or willingly.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
16
As a general rule of thumb, people who are highly eager to take on the role of confidant have a high control over what they hear.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
17
In the context of boundary linkage, it is unlikely that a recipient will deal with new information the way the discloser wants when the discloser and recipient have a close, trusting relationship.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
18
Boundary turbulence is the result of failed coordination.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
19
A confidant fully committed to handling private information according to the original owner's privacy rules is called a(n) ________.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
20
The overall process of co-managing collective boundaries that Petronio envisions is not simple and focuses on boundary ________, boundary ________, and boundary ________.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
21
Instead of talking about self-disclosure, as many relational theorists do, Petronio refers to the ________.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
22
Petronio's theory is grounded in the assumption that people own their private information. What does she mean by that? Why is ownership critical to the entire theory?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
23
People become co-owners of information through different means. Explain at least two routes to becoming a co-owner. What are the implications for the sense of responsibility that one feels?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
24
According to Petronio, once you know a piece of private information, you have rights and responsibilities. What are they? What is coupled with ownership, and what must be negotiated?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
25
Explain what is meant by boundary turbulence.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
26
Is Petronio's theory a communication theory or an information-management theory? What is the difference?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
27
How does CPM reflect a perspective of disclosure, privacy, and ownership?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
28
According to Altman and Taylor's social penetration theory, intimacy is established through disclosure. Petronio seems to advocate that unmanaged disclosure is problematic. How do you reconcile these positions?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
29
How is privacy negotiated online? In keeping with Walther's SIP, what boundaries are unique to online relationships?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
30
How does uncertainty affect boundary management? Think about uncertainty in the choice to disclose or keep private, in negotiating shared information, and in turbulence. What would Berger say?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
31
Does information change when it is moved from being privately held to co-owned? According to CMM, we are persons-in-conversation. Does something change when we dump our proverbial trucks and share information with others?
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 31 flashcards in this deck.