What is one of the critiques of CPM theory related to its prescriptions for avoiding turbulence?

Correct answer: The theory advocates for negotiation but doesn't offer insight on how to conduct those negotiations.

Explanation

A key critique of CPM's practical utility is that while it strongly advocates for the negotiation of mutual privacy rules (Principle 4) to prevent turbulence, it does not provide specific guidance or strategies on how individuals should conduct these crucial negotiations or how to repair relationships after turbulence occurs.

Other questions

Question 1

According to Communication Privacy Management (CPM) theory, what are the three main parts of the privacy management system?

Question 2

What is the first of the five core principles of Communication Privacy Management (CPM) theory?

Question 3

Why does Sandra Petronio prefer the term 'disclosure of private information' over 'self-disclosure'?

Question 4

What is the fifth core principle of Communication Privacy Management theory, which deals with what happens when rules are broken?

Question 5

According to Petronio's theory, which of the following is NOT one of the five factors that influence the development of personal privacy rules?

Question 6

In the context of CPM, what is a 'collective privacy boundary'?

Question 7

What does Petronio call a recipient who sought out private information, such as a doctor or a counselor?

Question 8

In CPM theory, what is a 'shareholder'?

Question 9

What does the CPM concept of 'boundary permeability' refer to?

Question 10

What is the 'confidentiality dilemma' described in the chapter?

Question 11

Which of the following is NOT a category of factor listed by Petronio that can lead to boundary turbulence?

Question 12

How does Petronio define 'privacy' within her theory?

Question 13

What is a 'reluctant confidant'?

Question 14

According to the chapter's critique section, which interpretive criterion does CPM theory NOT meet well?

Question 15

What is the primary function of the fourth principle of CPM, which states that co-owners need to negotiate privacy rules?

Question 16

A boundary that is described as 'closed, thick, or stretched tight' would be considered what in terms of permeability?

Question 17

In the example of Nate disclosing his HIV status to his wife Becky, what term would CPM use to describe Becky's position if she believes she deserves access and control over the information due to its impact on her?

Question 18

What is 'boundary linkage' in the context of CPM theory?

Question 19

Which of the following scenarios best illustrates 'boundary turbulence' caused by a 'mistake'?

Question 20

Based on the study Petronio conducted with victims of sexual abuse, which 'context' was identified as creating initially impenetrable privacy boundaries where the sufferer first struggles to cope before talking?

Question 21

What is the third core principle of Communication Privacy Management theory?

Question 22

Petronio states that CPM is a 'rule-based theory.' What does this mean in practice?

Question 23

One of the four reasons Petronio avoids the 'self-disclosure' label is because the outcome of disclosing private information is not always positive. What is the feeling of the disclosure described as in the text?

Question 24

What is the primary characteristic of the research used to validate CPM theory, as mentioned in the chapter?

Question 25

In the study of parents managing private information with their children about a family member's terminal illness, what did the researchers find?

Question 27

According to the chapter, which research finding about gender and disclosure is clear?

Question 28

Which metaphor does Petronio use to describe 'boundary turbulence'?

Question 29

In what way is the research on people with physical disabilities, like paraplegia, relevant to the first principle of CPM?

Question 30

What is the second of the five core principles of Communication Privacy Management theory?

Question 31

According to the chapter, why do people who have been told private information tend to feel a sense of responsibility for it?

Question 32

The chapter mentions that 'ownership conveys rights as well as obligations.' What is the 'upside' of privacy ownership mentioned in the text?

Question 33

In the risk-benefit ratio factor for rule development, which of the following is listed as a 'realistic risk' of revealing a secret?

Question 34

What is the primary feature of a 'mutual privacy boundary'?

Question 35

What does Petronio's theory suggest about the timing of negotiating privacy rules, as illustrated by the Nate and Becky example?

Question 36

Which of the following describes a privacy boundary that is 'open, thin, or loosely held'?

Question 37

What is a major consideration in 'boundary linkage' that influences how a recipient will handle new information?

Question 38

In the discussion of doctor-patient confidentiality, what happens from a legal standpoint once a patient invites a friend or relative into the interview?

Question 39

According to the critique, what is one of the main issues regarding the clarity of CPM theory?

Question 40

What is the fourth core principle of Communication Privacy Management theory?

Question 41

Petronio suggests that one reason to prefer 'disclosure of private information' over 'self-disclosure' is that the latter is usually associated with what?

Question 42

What type of confidant is the 'hapless airplane traveler who must listen to his or her seatmate’s life story' an example of?

Question 43

In the research on health care advocates accompanying patients to doctor appointments, what was a common cause of 'fuzzy boundaries'?

Question 44

What is the consequence of a confidant perceiving an unequal sense of responsibility for shared information?

Question 45

Based on the text, what is the relationship between Petronio's theory and research from more than 100 studies?

Question 46

What does Petronio's use of qualifiers like 'may be,' 'tend to be,' and 'sometimes' indicate about the theory, according to the critique?

Question 47

When are 'fuzzy boundaries' most likely to occur according to the research on health care advocates?

Question 48

Which of the following is an example of a partial disclosure, as described in the chapter?

Question 49

What is one of the key differences in how Petronio's theory treats the disclosure of private information compared to how social penetration theory treats self-disclosure?

Question 50

When does the concept of privacy turbulence come into play within the privacy management system?