communication management theory Flashcards

1
Q

What is Communication Privacy Management (CPM) Theory?

A

A theory that explains how people manage the balance between concealing and revealing private information in relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of research approach does CPM follow?

A

Empirical/Positivistic & Interpretive – it aims to explain, understand, and predict human behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main tension in CPM?

A

The contradiction between wanting privacy and wanting to share personal information to build relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the key assumptions of CPM?

A

Humans are choice makers – We decide when to share or withhold information.
Humans are rule followers – We follow learned rules about privacy.
Rules & choices are based on self and others – Context matters.
Humans have contradictory needs – The need for privacy vs. the need for connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a private disclosure in CPM?

A

Sharing private information, either about oneself or others, based on specific rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the five core principles of CPM?

A

Ownership – People perceive they own private information.
Control – People create boundaries to regulate sharing.
Rules – Guidelines determine what info is shared.
Co-ownership – Information can be shared and managed collectively.
Turbulence – Disruptions in privacy boundaries can create conflicts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are core criteria in rule development?

A

Stable rules that operate across contexts (e.g., a person with an STI may choose to keep that information private).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are catalyst criteria in rule development?

A

Changing conditions that affect disclosure (e.g., entering a relationship may prompt sharing STI status).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where do people learn privacy rules from?

A

Socialization – Learning from family, culture, or society.
Negotiation – Developing new privacy rules with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is co-ownership in CPM?

A

When private information is shared with someone else, creating a collective boundary of privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is boundary coordination in CPM?

A

Deciding how co-owned information is managed, including who else can know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is boundary turbulence in CPM?

A

Conflicts over privacy expectations that arise when co-owners of information disagree on boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three types of privacy dilemmas in CPM?

A

Accidental – Inadvertently discovering private information.
Confidant – Being told private information unexpectedly.
Illicit – Discovering information through spying or snooping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the main goals of CPM?

A

To explain, understand, and predict how people manage private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is CPM considered to have high heurism and utility?

A

Heurism: It applies to various real-world situations.
Utility: It helps understand and improve communication about privacy in relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly