Communication Privacy Management Theory of Sandra Petronio
50 questions available
Questions
According to Communication Privacy Management (CPM) theory, what are the three main parts of the privacy management system?
View answer and explanationWhat is the first of the five core principles of Communication Privacy Management (CPM) theory?
View answer and explanationWhy does Sandra Petronio prefer the term 'disclosure of private information' over 'self-disclosure'?
View answer and explanationWhat is the fifth core principle of Communication Privacy Management theory, which deals with what happens when rules are broken?
View answer and explanationAccording to Petronio's theory, which of the following is NOT one of the five factors that influence the development of personal privacy rules?
View answer and explanationIn the context of CPM, what is a 'collective privacy boundary'?
View answer and explanationWhat does Petronio call a recipient who sought out private information, such as a doctor or a counselor?
View answer and explanationIn CPM theory, what is a 'shareholder'?
View answer and explanationWhat does the CPM concept of 'boundary permeability' refer to?
View answer and explanationWhat is the 'confidentiality dilemma' described in the chapter?
View answer and explanationWhich of the following is NOT a category of factor listed by Petronio that can lead to boundary turbulence?
View answer and explanationHow does Petronio define 'privacy' within her theory?
View answer and explanationWhat is a 'reluctant confidant'?
View answer and explanationAccording to the chapter's critique section, which interpretive criterion does CPM theory NOT meet well?
View answer and explanationWhat is the primary function of the fourth principle of CPM, which states that co-owners need to negotiate privacy rules?
View answer and explanationA boundary that is described as 'closed, thick, or stretched tight' would be considered what in terms of permeability?
View answer and explanationIn the example of Nate disclosing his HIV status to his wife Becky, what term would CPM use to describe Becky's position if she believes she deserves access and control over the information due to its impact on her?
View answer and explanationWhat is 'boundary linkage' in the context of CPM theory?
View answer and explanationWhich of the following scenarios best illustrates 'boundary turbulence' caused by a 'mistake'?
View answer and explanationBased on the study Petronio conducted with victims of sexual abuse, which 'context' was identified as creating initially impenetrable privacy boundaries where the sufferer first struggles to cope before talking?
View answer and explanationWhat is the third core principle of Communication Privacy Management theory?
View answer and explanationPetronio states that CPM is a 'rule-based theory.' What does this mean in practice?
View answer and explanationOne of the four reasons Petronio avoids the 'self-disclosure' label is because the outcome of disclosing private information is not always positive. What is the feeling of the disclosure described as in the text?
View answer and explanationWhat is the primary characteristic of the research used to validate CPM theory, as mentioned in the chapter?
View answer and explanationIn the study of parents managing private information with their children about a family member's terminal illness, what did the researchers find?
View answer and explanationWhat is one of the critiques of CPM theory related to its prescriptions for avoiding turbulence?
View answer and explanationAccording to the chapter, which research finding about gender and disclosure is clear?
View answer and explanationWhich metaphor does Petronio use to describe 'boundary turbulence'?
View answer and explanationIn what way is the research on people with physical disabilities, like paraplegia, relevant to the first principle of CPM?
View answer and explanationWhat is the second of the five core principles of Communication Privacy Management theory?
View answer and explanationAccording to the chapter, why do people who have been told private information tend to feel a sense of responsibility for it?
View answer and explanationThe chapter mentions that 'ownership conveys rights as well as obligations.' What is the 'upside' of privacy ownership mentioned in the text?
View answer and explanationIn the risk-benefit ratio factor for rule development, which of the following is listed as a 'realistic risk' of revealing a secret?
View answer and explanationWhat is the primary feature of a 'mutual privacy boundary'?
View answer and explanationWhat does Petronio's theory suggest about the timing of negotiating privacy rules, as illustrated by the Nate and Becky example?
View answer and explanationWhich of the following describes a privacy boundary that is 'open, thin, or loosely held'?
View answer and explanationWhat is a major consideration in 'boundary linkage' that influences how a recipient will handle new information?
View answer and explanationIn the discussion of doctor-patient confidentiality, what happens from a legal standpoint once a patient invites a friend or relative into the interview?
View answer and explanationAccording to the critique, what is one of the main issues regarding the clarity of CPM theory?
View answer and explanationWhat is the fourth core principle of Communication Privacy Management theory?
View answer and explanationPetronio suggests that one reason to prefer 'disclosure of private information' over 'self-disclosure' is that the latter is usually associated with what?
View answer and explanationWhat type of confidant is the 'hapless airplane traveler who must listen to his or her seatmate’s life story' an example of?
View answer and explanationIn the research on health care advocates accompanying patients to doctor appointments, what was a common cause of 'fuzzy boundaries'?
View answer and explanationWhat is the consequence of a confidant perceiving an unequal sense of responsibility for shared information?
View answer and explanationBased on the text, what is the relationship between Petronio's theory and research from more than 100 studies?
View answer and explanationWhat does Petronio's use of qualifiers like 'may be,' 'tend to be,' and 'sometimes' indicate about the theory, according to the critique?
View answer and explanationWhen are 'fuzzy boundaries' most likely to occur according to the research on health care advocates?
View answer and explanationWhich of the following is an example of a partial disclosure, as described in the chapter?
View answer and explanationWhat is one of the key differences in how Petronio's theory treats the disclosure of private information compared to how social penetration theory treats self-disclosure?
View answer and explanationWhen does the concept of privacy turbulence come into play within the privacy management system?
View answer and explanation