Library/Communication, Journalism, and Related Programs/A First Look at COMMUNICATION THEORY/Communication Privacy Management Theory of Sandra Petronio

Communication Privacy Management Theory of Sandra Petronio

50 questions available

Summary unavailable.

Questions

Question 1

According to Communication Privacy Management (CPM) theory, what are the three main parts of the privacy management system?

View answer and explanation
Question 2

What is the first of the five core principles of Communication Privacy Management (CPM) theory?

View answer and explanation
Question 3

Why does Sandra Petronio prefer the term 'disclosure of private information' over 'self-disclosure'?

View answer and explanation
Question 4

What is the fifth core principle of Communication Privacy Management theory, which deals with what happens when rules are broken?

View answer and explanation
Question 5

According to Petronio's theory, which of the following is NOT one of the five factors that influence the development of personal privacy rules?

View answer and explanation
Question 6

In the context of CPM, what is a 'collective privacy boundary'?

View answer and explanation
Question 7

What does Petronio call a recipient who sought out private information, such as a doctor or a counselor?

View answer and explanation
Question 8

In CPM theory, what is a 'shareholder'?

View answer and explanation
Question 9

What does the CPM concept of 'boundary permeability' refer to?

View answer and explanation
Question 10

What is the 'confidentiality dilemma' described in the chapter?

View answer and explanation
Question 11

Which of the following is NOT a category of factor listed by Petronio that can lead to boundary turbulence?

View answer and explanation
Question 12

How does Petronio define 'privacy' within her theory?

View answer and explanation
Question 13

What is a 'reluctant confidant'?

View answer and explanation
Question 14

According to the chapter's critique section, which interpretive criterion does CPM theory NOT meet well?

View answer and explanation
Question 15

What is the primary function of the fourth principle of CPM, which states that co-owners need to negotiate privacy rules?

View answer and explanation
Question 16

A boundary that is described as 'closed, thick, or stretched tight' would be considered what in terms of permeability?

View answer and explanation
Question 17

In the example of Nate disclosing his HIV status to his wife Becky, what term would CPM use to describe Becky's position if she believes she deserves access and control over the information due to its impact on her?

View answer and explanation
Question 18

What is 'boundary linkage' in the context of CPM theory?

View answer and explanation
Question 19

Which of the following scenarios best illustrates 'boundary turbulence' caused by a 'mistake'?

View answer and explanation
Question 20

Based on the study Petronio conducted with victims of sexual abuse, which 'context' was identified as creating initially impenetrable privacy boundaries where the sufferer first struggles to cope before talking?

View answer and explanation
Question 21

What is the third core principle of Communication Privacy Management theory?

View answer and explanation
Question 22

Petronio states that CPM is a 'rule-based theory.' What does this mean in practice?

View answer and explanation
Question 23

One of the four reasons Petronio avoids the 'self-disclosure' label is because the outcome of disclosing private information is not always positive. What is the feeling of the disclosure described as in the text?

View answer and explanation
Question 24

What is the primary characteristic of the research used to validate CPM theory, as mentioned in the chapter?

View answer and explanation
Question 25

In the study of parents managing private information with their children about a family member's terminal illness, what did the researchers find?

View answer and explanation
Question 26

What is one of the critiques of CPM theory related to its prescriptions for avoiding turbulence?

View answer and explanation
Question 27

According to the chapter, which research finding about gender and disclosure is clear?

View answer and explanation
Question 28

Which metaphor does Petronio use to describe 'boundary turbulence'?

View answer and explanation
Question 29

In what way is the research on people with physical disabilities, like paraplegia, relevant to the first principle of CPM?

View answer and explanation
Question 30

What is the second of the five core principles of Communication Privacy Management theory?

View answer and explanation
Question 31

According to the chapter, why do people who have been told private information tend to feel a sense of responsibility for it?

View answer and explanation
Question 32

The chapter mentions that 'ownership conveys rights as well as obligations.' What is the 'upside' of privacy ownership mentioned in the text?

View answer and explanation
Question 33

In the risk-benefit ratio factor for rule development, which of the following is listed as a 'realistic risk' of revealing a secret?

View answer and explanation
Question 34

What is the primary feature of a 'mutual privacy boundary'?

View answer and explanation
Question 35

What does Petronio's theory suggest about the timing of negotiating privacy rules, as illustrated by the Nate and Becky example?

View answer and explanation
Question 36

Which of the following describes a privacy boundary that is 'open, thin, or loosely held'?

View answer and explanation
Question 37

What is a major consideration in 'boundary linkage' that influences how a recipient will handle new information?

View answer and explanation
Question 38

In the discussion of doctor-patient confidentiality, what happens from a legal standpoint once a patient invites a friend or relative into the interview?

View answer and explanation
Question 39

According to the critique, what is one of the main issues regarding the clarity of CPM theory?

View answer and explanation
Question 40

What is the fourth core principle of Communication Privacy Management theory?

View answer and explanation
Question 41

Petronio suggests that one reason to prefer 'disclosure of private information' over 'self-disclosure' is that the latter is usually associated with what?

View answer and explanation
Question 42

What type of confidant is the 'hapless airplane traveler who must listen to his or her seatmate’s life story' an example of?

View answer and explanation
Question 43

In the research on health care advocates accompanying patients to doctor appointments, what was a common cause of 'fuzzy boundaries'?

View answer and explanation
Question 44

What is the consequence of a confidant perceiving an unequal sense of responsibility for shared information?

View answer and explanation
Question 45

Based on the text, what is the relationship between Petronio's theory and research from more than 100 studies?

View answer and explanation
Question 46

What does Petronio's use of qualifiers like 'may be,' 'tend to be,' and 'sometimes' indicate about the theory, according to the critique?

View answer and explanation
Question 47

When are 'fuzzy boundaries' most likely to occur according to the research on health care advocates?

View answer and explanation
Question 48

Which of the following is an example of a partial disclosure, as described in the chapter?

View answer and explanation
Question 49

What is one of the key differences in how Petronio's theory treats the disclosure of private information compared to how social penetration theory treats self-disclosure?

View answer and explanation
Question 50

When does the concept of privacy turbulence come into play within the privacy management system?

View answer and explanation

Other chapters

Launching Your Study of Communication TheoryTalk About TheoryWeighing the WordsMapping the Territory (Seven Traditions in the Field of Communication Theory)Symbolic Interactionism of George Herbert MeadCoordinated Management of Meaning (CMM) of W. Barnett Pearce & Vernon CronenExpectancy Violations Theory of Judee BurgoonSocial Penetration Theory of Irwin Altman & Dalmas TaylorUncertainty Reduction Theory of Charles BergerSocial Information Processing Theory of Joseph WaltherRelational Dialectics Theory of Leslie Baxter & Mikhail BakhtinMedia Multiplexity Theory of Caroline HaythornthwaiteSocial Judgment Theory of Muzafer SherifElaboration Likelihood Model of Richard Petty & John CacioppoCognitive Dissonance Theory of Leon FestingerFunctional Perspective on Group Decision Making of Randy Hirokawa & Dennis GouranSymbolic Convergence Theory of Ernest BormannCultural Approach to Organizations of Clifford Geertz & Michael PacanowskyCommunicative Constitution of Organizations of Robert McPheeCritical Theory of Communication in Organizations of Stanley DeetzThe Rhetoric of AristotleDramatism of Kenneth BurkeNarrative Paradigm of Walter FisherMedia Ecology of Marshall McLuhanSemiotics of Roland BarthesCultural Studies of Stuart HallUses and Gratifications of Elihu KatzCultivation Theory of George GerbnerAgenda-Setting Theory of Maxwell McCombs & Donald ShawGenderlect Styles of Deborah TannenStandpoint Theory of Sandra Harding & Julia WoodMuted Group Theory of Cheris KramaraeCommunication Accommodation Theory of Howard GilesFace-Negotiation Theory of Stella Ting-ToomeyCo-Cultural Theory of Mark OrbeCommon Threads in Comm Theories