Chapter 12: Communication Privacy Management Flashcards
Who is the author of Communication Privacy Management theory?
Sandra Petronio
What are the three inherent assumptions noted by West & Turner?
1) humans are choice makers
2) humans are rule makers and followers
3) human choices and rules are based on a consideration of others as well as the self
Elaboration on “human choices and rules are based on a consideration of others as well as the self”
(a) the self is in relationship with others
b) the dialectical tension between privacy and disclosure (if we disclose everything, we have no concept of privacy
What are the three main parts of the theory?
- ownership
- control
- turbulence
Ownership:
there are boundaries between what I know and others don’t know
Turbulence:
what happens when things don’t go as expected
i.e., we get upset when someone shares our private information
Control:
we make decisions about whether to share or not
What is the “engine” of CPM?
control
- we make decisions about whether to share information or now
Finish Core principle #1: People believe they ____ and have a right to ____ ____ ____ ____.
own; control their private information
Why do people wan to believe they own and control their private information?
- feel less vulnerable
- increase autonomy
- inherent responsibility to handle private information carefully
Do people actually own their private information?
no, it’s a perception. you can physically show ownership of it
Finish Core principle # 2: People control their ____ information through the use of ____ ____ ____.
personal; personal privacy rules
Personal rules:
rules that I make for just me – not necessarily societal norms
What things impact the rules/patterns people use?
- culture
- gender
- motivation
- context
- risks/benefits
Finish Core principle #3: When others are told or discover a person’s ____ ____, they become _____ of that information
private information; co-owners
What does someone else finding out someone’s private information create?
a collective privacy boundary and a confidant
Co-owners of private information may disagree on management.
True.
What happens when reluctant receivers acquire private information?
they may not care as much about adhering to the owner’s rules for the information
Finish Core principle #4: Co-owners of private information need to negotiate ____ _____ ____ rules about telling others (relational _____).
mutually agreeable privacy; harmony
What are the three coordination activities?
1) boundary ownership
2) boundary linkage
3) boundary permeability
How you become a confidant influences the amount of control you have?
true
Deliberate confidant:
solicits information
Reluctant confidant:
less likely to follow the rules (did not ask for the information)
Shareholders:
vested/committed to the original owner’s rules
Stakeholder:
we make the rules
Boundary linkage:
forming boundary alliances to determine who else gets to know
Boundary permeability:
how strong is the boundary between us // information can be shared or it can’t
Finish Core principle #5: When ____ don’t effectively negotiate and follow jointly held privacy rules, boundary _____ is the likely result.
co-owners; turbulence
What are the conditions for turbulence?
- fuzzy boundaries
- intentional breaches
- mistake
What is the difference between an intentional breach as a personal advantage vs. a confidentiality dilemma?
personal advantage - information shared so the person gains something
confidentiality dilemma - damned if you do, damned if you don’t
What should you do if turbulence does occur?
go back and adjust the rules or clarify them
Descriptive theory
theories that describe how something is
Prescriptive theory
theories that say how people should act or how things ought to be
Marsha is a boss to Jeff and Ruthie. Marsha tells Ruthie that Marsha has been approached by a competitor to go work for them. Marsha firmly requests that Ruthie keep it just between them since she was still deciding what to do. Ruthie, who is always looking for a chance to look like she is more important than her coworkers, tells Jeff that Marsha confided in her. It made Ruthie feel powerful to be able to tell Jeff that their boss confided in her (and not him). Petronio’s CPM theory suggests this might create (a/an) ____ due to ____.
turbulence, intentional breach
What type of theory is CPM?
interpretive
What tradition(s) does CPM theory represent?
cybernetic and socio-cultural
In CPM theory, boundary linkage, ownership and permeability are
established through communication and negotiated
CPM: Griffin establishes this theory as being more ____ than ____.
interpretive, objective
CPM: This theory assumes people are
all of these are correct
- rule followers, choice makers, rule makers
CPM: When explaining CPM, I also discussed theories that say how people should act or how things ought to be. These were called ____ theories.
prescriptive
CPM: Laura tells Shondra about her pregnancy with Mike. Laura also tells Shondra not to tell anyone about the pregnancy. Shondra keeps her word and does not tell a soul. Shondra is considered to be a ____ of Laura’s private information.
Shareholder
CPM: When co-owners negotiate privacy rules, a reluctant confidant is ____ likely to follow those rules.
less