Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Engineering
Study Set
A First Look at Communication Theory
Quiz 12: Communication Privacy Management Theory
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Sandra Petronio prefers to use which of the following terms when describing the central action of her theory?
Question 2
Multiple Choice
According to communication privacy management theory (CPM) , which of the following statements is true about the five factors that play into the way people develop their own privacy rules?
Question 3
Multiple Choice
According to communication privacy management theory (CPM) , which of the following is NOT one of the factors that play into the way people develop their own privacy rules?
Question 4
Multiple Choice
Which of the following best describes a reluctant confidant?
Question 5
Multiple Choice
A ________ refers to a confidant who deserves access and control regarding private information and the rules for sharing it.
Question 6
Multiple Choice
Pastor Rick seeks private information about the members of his church. He asks a lot of questions to be able to know the members better. In this scenario, Rick most likely exemplifies the role of a(n) ________.
Question 7
Multiple Choice
When a recipient agrees to allow the original owner of private information to make decisions regarding further disclosure and control, which of the following terms does Petronio use to describe the recipient?