How can we help?

You can also find more resources in our Help Center.

Study sets matching "theory communication privacy"

Study sets
Classes
Users

Study sets matching "theory communication privacy"

33 terms
Communication Privacy Management Theory
Theorist
Revealing private information...
Even if the people you confide in resp…
Privacy Boundaries
Sandra Petronio
-Might strengthen your relationships with significant people…
-Privacy
-A metaphor to show how people think of the borders between p…
Theorist
Sandra Petronio
Revealing private information...
-Might strengthen your relationships with significant people…
18 terms
Communication Privacy Management theory
privacy boundaries
rule based theory
collective privacy boundary
mutual privacy boundary
metaphor to show how people think of the borders between priv…
a theory that assumes we can best understand peoples freely c…
an intersection of personal privacy boundaries of co owners o…
a synchronized collective privacy boundary that co owners sha…
privacy boundaries
metaphor to show how people think of the borders between priv…
rule based theory
a theory that assumes we can best understand peoples freely c…
14 terms
Communication Privacy Management Theory
Privacy boundaries
Private information
Privacy
Rule-based theory
A metaphor to show how people think of the borders between pr…
The content of potential disclosures; information that can be…
The feeling that one has the right to own private information
A theory that assumes we can best understand people's freely…
Privacy boundaries
A metaphor to show how people think of the borders between pr…
Private information
The content of potential disclosures; information that can be…
10 terms
Communication Privacy Management Theory
private information
privacy boundaries
collective boundary
personal boundary
we believe that we have the right to own and control our priv…
we control our PI through the use of personal privacy rules -…
when PI is shared, this is created
when PI is not shared, this is maintained
private information
we believe that we have the right to own and control our priv…
privacy boundaries
we control our PI through the use of personal privacy rules -…
28 terms
Communication Privacy Management Theory
communication privacy theory
both privacy and disclosure have?
main researcher?
how has CPM evolved?
managing relationship between concealing and revealing privat…
risks and rewards
Dr. Sandra Petronio
from a micro to a macro theory
communication privacy theory
managing relationship between concealing and revealing privat…
both privacy and disclosure have?
risks and rewards
38 terms
Communication Privacy Management Theory
Theory's "engine":
Theory's metaphor:
We believe we own and control our priv…
We control information through privacy…
Why we keep information private.
CPM= Boundary. Disclosure= Co-ownership
Principle 1: Private Information
Principle 2: Privacy rules
Theory's "engine":
Why we keep information private.
Theory's metaphor:
CPM= Boundary. Disclosure= Co-ownership
11 terms
Communication Privacy Management Theory
Who developed Communication Privacy Ma…
she considered openness to only be par…
Why do we have a desire to be private?
Define Private Information
Sandra Petronio - Communications
the way people navigate privacy.
Privacy increases our sense of autonomy, makes us feel less v…
Content of potential disclosures; information that can be owned
Who developed Communication Privacy Ma…
Sandra Petronio - Communications
she considered openness to only be par…
the way people navigate privacy.
22 terms
Communication Privacy Management Theory
Public-private dialectical tension
Private information
Privacy rules
Shared boundaries
We want to share information and keep it from people at the s…
Owned and controlled by the individual ... Information you can't…
Rules of thumb that we develop to manage the flow of informat…
Once you learn someone else's private information, you co own…
Public-private dialectical tension
We want to share information and keep it from people at the s…
Private information
Owned and controlled by the individual ... Information you can't…
22 terms
Communication Privacy Management Theory
Overview of CPM
Assumptions About Human Nature
Basic Suppositions of CPM
Boundary Turbulence
What to reveal and what to keep confidential is a continual b…
1. Humans are choice makers... 2. Humans are rule makers and ru…
CPM is concerned with explaining people's disclosure of priva…
Conflicts about boundary expectations and regulations... -Bounda…
Overview of CPM
What to reveal and what to keep confidential is a continual b…
Assumptions About Human Nature
1. Humans are choice makers... 2. Humans are rule makers and ru…
9 terms
Communication Privacy Management Theory
Comm Privacy Management
public-private
privacy rules
boundaries
ppl create decision making rules to help them determine when…
major tension revealing and concealing
our decisions about sharing private info are based on: gender…
a visual representation of two sides; one a person keeps info…
Comm Privacy Management
ppl create decision making rules to help them determine when…
public-private
major tension revealing and concealing
13 terms
Communication Privacy Management Theory
private information
private disclosures
private boundaries
rule development
information about things that matter deeply to a person
the process of communicating private information to another
the deciding whether an information is private information or…
one of the features of privacy rule characteristics: describe…
private information
information about things that matter deeply to a person
private disclosures
the process of communicating private information to another
10 terms
communication Privacy management theory
private information
Private boundaries
collective boundary
personal boundary
info about things that matter deeply to a person
the demarcation between private info and public info
boundary around private info that includes more than one person
boundary around private info that includes just one person
private information
info about things that matter deeply to a person
Private boundaries
the demarcation between private info and public info
14 terms
Communication Privacy Management Theory
Privacy Boundaries
Private Information
Privacy
Rule-based theory
A metaphor to show how people think of the borders between pr…
The content of potential disclosures; info that can be owned
The feeling that one has the right to own private information
A theory that assumes we can best understand people's freely…
Privacy Boundaries
A metaphor to show how people think of the borders between pr…
Private Information
The content of potential disclosures; info that can be owned
14 terms
Communication Privacy Management Theory
Who is the author of the theory?
Is this theory interpretive or objecti…
CPM
3 main parts of CPM
Sandra Petronio
interpretive
A description of a privacy management system that contains th…
1. Privacy ownership... 2. Privacy control... 3. Privacy turbulence
Who is the author of the theory?
Sandra Petronio
Is this theory interpretive or objecti…
interpretive
24 terms
Communication Privacy management Theory
Is there a specific dialectic relate t…
How do we attempt to manage privacy?
Privacy Boundaries:
Ownership & Control of Private Informa…
Inclusion and Seclusion... Openness and Closeness
There are a lot of changes in society that could affect priva…
a metaphor to show how people think of the borders between pr…
People believe they own and have a right to control their pri…
Is there a specific dialectic relate t…
Inclusion and Seclusion... Openness and Closeness
How do we attempt to manage privacy?
There are a lot of changes in society that could affect priva…
18 terms
Communication Privacy Management Theory (CPM)
Theorist
Basic Definition
Privacy Ownership
Privacy Control
Petronio
A description of a privacy management system that contains 3…
Contains our privacy boundaries that encompass information we…
Acts as the engine of the privacy system. Involves our decisi…
Theorist
Petronio
Basic Definition
A description of a privacy management system that contains 3…
11 terms
COMM THEORY Community Privacy Management
Major Researcher
Theory Definition
Context
Tradition
Sandra Petronino
Disclosure in relationships requires managing private and pub…
Intrapersonal and Interpersonal
Socio-cultural
Major Researcher
Sandra Petronino
Theory Definition
Disclosure in relationships requires managing private and pub…
16 terms
CPM: Communication Privacy Management Theory
CPM
3 assumptions of CPM
2. assumptions as a dialectic theory
Private Information
a practical theory designed to explain the everyday issue of…
1. Humans are choice makers... 2. humans are rule makers and rul…
1. relational life characterized by change... 2. contradiction i…
info about things that matter deeply to a individual
CPM
a practical theory designed to explain the everyday issue of…
3 assumptions of CPM
1. Humans are choice makers... 2. humans are rule makers and rul…
14 terms
HCOM: Communication Privacy Management Theory
Petronio
dialectic, explains rules for whether…
private info., private boundaries, con…
private information
who's theory is it?
basic idea
5 key ideas (D-CRIB)
private disclosure, revealing content/something you know
Petronio
who's theory is it?
dialectic, explains rules for whether…
basic idea
Communication - Chapter 12 Communication Privacy Management Theory
Privacy Boundaries
Private Information
Privacy
Rule-based Theory
A metaphor to show how people think of the borders between pr…
The content of potential disclosures; information that can be…
The feeling that one has the right to own private information.
A theory that assumes we can best understand people's freely…
Privacy Boundaries
A metaphor to show how people think of the borders between pr…
Private Information
The content of potential disclosures; information that can be…
16 terms
COMM Theory: Communication Privacy Management Theory
Communication Privacy Management Theory
Sandra Petronio
Assumptions
Private Information
Theory that says disclosure in relationships require managing…
Major researcher that developed CPMT as a result of research…
1. Humans are choice makers.... 2. Humans are rule makers and ru…
Information about things that matter deeply to a person.
Communication Privacy Management Theory
Theory that says disclosure in relationships require managing…
Sandra Petronio
Major researcher that developed CPMT as a result of research…
11 terms
Chapter 13 Communication Privacy Management Theory
What was communication privacy managem…
What are the three assumptions of comm…
what are the two assumptions concernin…
What is the difference between private…
Public and private disclosure in relationships.
Humans are choice makers... humans are rule makers and rule foll…
relational life is characterized by change... contradiction of t…
private disclosure is what is going on in our heads while sel…
What was communication privacy managem…
Public and private disclosure in relationships.
What are the three assumptions of comm…
Humans are choice makers... humans are rule makers and rule foll…
20 terms
Chapter 12: Communication Privacy and Management Theory.
Griffin, Ledbetter, and Sparks argue t…
Communication privacy management theor…
Communication privacy management theor…
For Petronio, privacy is:
How to resolve boundary turbulence.
Social penetration theory.
True
The feeling that one has the right to own private information.
Griffin, Ledbetter, and Sparks argue t…
How to resolve boundary turbulence.
Communication privacy management theor…
Social penetration theory.
44 terms
Communication Privacy Management Theory: Chapter 13
CPM is what kind of theory and follows…
What theorist is associated with CPM?
Petronio sees CPM as a
Privacy boundaries
Interpretive theory that follows the socio-cultural and cyber…
Sandra Petronio; agrees with Altman that revealing private in…
map of the way people navigate privacy. she wants us to think…
a metaphor to show how people think of the borders between pr…
CPM is what kind of theory and follows…
Interpretive theory that follows the socio-cultural and cyber…
What theorist is associated with CPM?
Sandra Petronio; agrees with Altman that revealing private in…
18 terms
Chap 12 - Communication Privacy Management Theory
Privacy Boundaries
Privacy Ownership
Privacy Control
Privacy Turbulence
A metaphor to show how people think of the borders between pr…
Contains our privacy boundaries that encompass information we…
Involves our decision to share private information with anoth…
Comes into play when managing private information doesn't go…
Privacy Boundaries
A metaphor to show how people think of the borders between pr…
Privacy Ownership
Contains our privacy boundaries that encompass information we…
44 terms
Communication Privacy Management Theory: Chapter 13
CPM is what kind of theory and follows…
What theorist is associated with CPM?
Petronio sees CPM as a
Privacy boundaries
Interpretive theory that follows the socio-cultural and cyber…
Sandra Petronio; agrees with Altman that revealing private in…
map of the way people navigate privacy. she wants us to think…
a metaphor to show how people think of the borders between pr…
CPM is what kind of theory and follows…
Interpretive theory that follows the socio-cultural and cyber…
What theorist is associated with CPM?
Sandra Petronio; agrees with Altman that revealing private in…
15 terms
Chapter 12 - Communication Privacy Management Theory
Privacy boundaries
5 factors of privacy rules
Privacy Turbulence
5 principles of CPM
A metaphor to show how people think of the borders between pr…
1. culture... 2. gender... 3. motivation... 4. context... 5. risk/benefit…
When managing private information doesn't go the way we expect.
1) People believe they own and have a right to control their…
Privacy boundaries
A metaphor to show how people think of the borders between pr…
5 factors of privacy rules
1. culture... 2. gender... 3. motivation... 4. context... 5. risk/benefit…
18 terms
Chapter 12-Communication Privacy Management Theory
Communication Privacy Management Theory
Privacy Ownership
Privacy Boundaries
Privacy Control
A description of privacy management systems containing privac…
Contains privacy boundaries that encompass info we have but o…
A metaphor to show how people think of the borders between pr…
Our decision to share private info info to another person.
Communication Privacy Management Theory
A description of privacy management systems containing privac…
Privacy Ownership
Contains privacy boundaries that encompass info we have but o…
14 terms
Chapter 12: Communication Privacy Management Theory
Privacy Boundaries
Private Information
Privacy
Rule-Based Theory
A metaphor to show how people think of the borders between pr…
The content or potential disclosures; information that can be…
The feeling that one has the right to own private information
A theory that assumes we can best understand people's freely…
Privacy Boundaries
A metaphor to show how people think of the borders between pr…
Private Information
The content or potential disclosures; information that can be…
Chapter 12- Communication Privacy Management Theory
Communication Privacy Managment
CPM 3 areas
Privacy Ownership
Privacy Control
-push/pull of open-closed ... *openness is only part of the stor…
1. privacy ownership... 2. privacy control... 3. privacy turbulence
-contains privacy boundaries that encompass info we have but…
-involves our decision to share private info w/ another perso…
Communication Privacy Managment
-push/pull of open-closed ... *openness is only part of the stor…
CPM 3 areas
1. privacy ownership... 2. privacy control... 3. privacy turbulence
Chp. 12 - Communication Privacy Management Theory
Privacy Boundaries
Private Information
Privacy
Rule-based Theory
A metaphor to show how people think of the borders between pr…
The content of potential disclosures; information that can be…
The feeling that one has the right to own private information.
A theory that assumes we can best understand people's freely…
Privacy Boundaries
A metaphor to show how people think of the borders between pr…
Private Information
The content of potential disclosures; information that can be…
Chapter 12: Communication Privacy Management Theory
private information
private boundaries
collective boundary
personal boundary
information about things that matter deeply to a person
the demarcation between private information and public inform…
a boundary around private information that includes more than…
a boundary around private information that includes just one…
private information
information about things that matter deeply to a person
private boundaries
the demarcation between private information and public inform…
15 terms
Chapter 12: Communication Privacy Management Theory
Privacy boundaries
Communication privacy management theory
Private Information
Privacy
A metaphor to show how people think of the borders between pr…
Privacy ownership, privacy control, and privacy turbulence
The content of potential disclosures; information that can be…
The feeling that one has the right to own private information
Privacy boundaries
A metaphor to show how people think of the borders between pr…
Communication privacy management theory
Privacy ownership, privacy control, and privacy turbulence
13 terms
Chapter 12 Communication Privacy Management Theory
Private Information
Privacy
Rule-Based Theory
Collective Privacy boundary
The content of potential disclosure; information that can be…
The feeling that one has the right to own private information
A theory that assumes we can best understand people's freely…
An intersection of personal privacy boundaries of co-owners o…
Private Information
The content of potential disclosure; information that can be…
Privacy
The feeling that one has the right to own private information
22 terms
Chapter 12: Communication Privacy Management Theory (CPM)
How does Petronio's CPM Theory differ…
How does Petronio view CPM Theory?
What are "privacy boundaries"?
What are the three parts of CPM?
Altman and Taylor's social penetration theory focused on self…
Petronio views CPM as a map of the ways in which people negot…
How people think of the boundaries between private & public i…
Privacy Ownership, Privacy Control & Privacy Turbulence
How does Petronio's CPM Theory differ…
Altman and Taylor's social penetration theory focused on self…
How does Petronio view CPM Theory?
Petronio views CPM as a map of the ways in which people negot…
Chapter 12: Communication Privacy Management Theory
How does Sandra Petronio define privacy?
Why does Sandra Petronio favor the ter…
What dialectical tension is the focus…
According to Dr. Venetis, what are exp…
...
1. A lot of the private information we tell others is not abo…
...
...
How does Sandra Petronio define privacy?
...
Why does Sandra Petronio favor the ter…
1. A lot of the private information we tell others is not abo…
24 terms
Chp 13: Communication Privacy Management Theory
1. People believe they own and have a…
"Self disclosure," a term typically us…
the feeling that one has the right to…
positive: privacy bolsters our sense o…
5 core principles of Communication Privacy Management Theory
Self-disclosure vs. Disclosure of private information
privacy
Positive and negative of privacy
1. People believe they own and have a…
5 core principles of Communication Privacy Management Theory
"Self disclosure," a term typically us…
Self-disclosure vs. Disclosure of private information
14 terms
Communication Privacy Management Theory Ch. 13
deterministic/interpretive
socio-cultural; phenomenological; cybe…
Main claim
four principles of communication priva…
What philosophical orientation?
Traditions?
A focus on one relational dialectic (openness - closedness)…
1. Privacy is owernship... 2. Social rules guide negotiation abo…
deterministic/interpretive
What philosophical orientation?
socio-cultural; phenomenological; cybe…
Traditions?
15 terms
Communication Privacy Management Theory Ch. 12
Privacy boundaries
Private information
Privacy
Rule-based theory
A metaphor to show how people think of the borders between pr…
The content of potential disclosures
The feeling that one has the right to own private information
A theory that assumes we can best understand people's freely…
Privacy boundaries
A metaphor to show how people think of the borders between pr…
Private information
The content of potential disclosures
11 terms
Ch 12 Communication Privacy Management Theory
Privacy Boundary
Boundary Ownership
Boundary Linkage
Shareholder
Metaphor to show how people think of the borders between priv…
The rights and responsibilities that co-owners of private and…
An alliance formed by co-owners of private information as to…
A confident fully committed to handling private information a…
Privacy Boundary
Metaphor to show how people think of the borders between priv…
Boundary Ownership
The rights and responsibilities that co-owners of private and…
18 terms
Chapter 12 - Communication Privacy Management Theory
Communication Privacy Management Theor…
Privacy boundaries
Privacy Turbulence
4 Principals - Privacy ownership
An interpretive theory by Sandra Petronio
A metaphor to show how people think of the borders between pr…
When managing private information doesn't go the way we expect.
1) People believe they own and have a right to control their…
Communication Privacy Management Theor…
An interpretive theory by Sandra Petronio
Privacy boundaries
A metaphor to show how people think of the borders between pr…
19 terms
Communication Privacy Management Theory: Chapter 12
Theorist(s)
Paradigm
privacy boundaries
private information
Sandra Petronio
Interpretive
a metaphor to show how people think of the borders between pr…
the content of potential disclosures; information that can be…
Theorist(s)
Sandra Petronio
Paradigm
Interpretive
21 terms
Communication Privacy Management Theory- Ch. 12
Social Penetration Theory
Example of Social Penetration Theory
Communication privacy management theor…
Three main parts of CPM
Focused on self-disclosure as the primary way to develop clos…
Suppose you visit your school's health center bc you're conce…
Description of privacy management system that contains three…
Privacy Ownership, Privacy Control, and Privacy Turbulence
Social Penetration Theory
Focused on self-disclosure as the primary way to develop clos…
Example of Social Penetration Theory
Suppose you visit your school's health center bc you're conce…
22 terms
Chapter 12: Communication Privacy Management Theory
Communication Privacy Management Theor…
CPM is a theory concerned with which k…
Private disclosure differs from self-d…
The line between public information an…
Whether to disclose private information to a relational partn…
Interpersonal
It examines how people disclose through a rule-based system.
Boundary
Communication Privacy Management Theor…
Whether to disclose private information to a relational partn…
CPM is a theory concerned with which k…
Interpersonal
16 terms
Chapter 12: Communication Privacy Management Theory
Microtheory
Macrotheory
Private Information
Private Disclosures
theory with limited boundaries
theory with extensive boundaries
information about things that matter deeply to a person
process of communicating private information to another
Microtheory
theory with limited boundaries
Macrotheory
theory with extensive boundaries
20 terms
Communication Privacy Management Theory (EXAM 2)
CPM Theory: A map of the way people na…
Privacy Boundaries
Ownership and Control of Private Infor…
"Disclosure of private information"... NE…
Sandra Petronio... Interpretive Theory... Relational Maintenance
A metaphor to show how people think of the borders between pr…
People believe they own and have a right to control their pri…
"Self-disclosure"... UNILATERAL TERM
CPM Theory: A map of the way people na…
Sandra Petronio... Interpretive Theory... Relational Maintenance
Privacy Boundaries
A metaphor to show how people think of the borders between pr…
27 terms
Communication Privacy Management Theory Ch. 12
theorist
privacy boundaries
idea of the theory
1. privacy ownership
Sandra Petronio
barriers that determine how much info one shares with another
map of the way people navigate privacy... -description of a priv…
contains our privacy boundaries that encompass info we have b…
theorist
Sandra Petronio
privacy boundaries
barriers that determine how much info one shares with another
7 terms
Comm Theory Study Guide (Communication Privacy Management)
Privacy boundaries
The five factors that influence how we…
Shareholder vs. deliberate confidant v…
Boundary ownership
how people think of the divide between private and public inf…
culture... gender... motivation... context... risk/benefits ratio
...
50/50 the co owners have control of private information and i…
Privacy boundaries
how people think of the divide between private and public inf…
The five factors that influence how we…
culture... gender... motivation... context... risk/benefits ratio
Week 4- Communication Privacy Management Theory & Politeness Theory
public-private, private information, p…
public-private
private information
privacy rules
principles of CPM
tension between revealing and concealing private information
information about things that matter deeply to a person
decisions about sharing private information regulated by this
public-private, private information, p…
principles of CPM
public-private
tension between revealing and concealing private information
Chpt. 12 Communication Privacy management theory
five factor/rules
shareholder
Reluctant confidant
deliberate confidant
-Culture... -Gender... -motivation... -context... -risk/benefit ratio
person fully committed to handleing private information
co-owner of private information who did not seek out or want it
recipient who sought out private information
five factor/rules
-Culture... -Gender... -motivation... -context... -risk/benefit ratio
shareholder
person fully committed to handleing private information
1 of 10