Communication Privacy Management Flashcards

1
Q

What is Communication Privacy Management Theory?

A

Description of how people handle their private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are privacy boundaries?

A

Metaphor to show how people think of the borders between private and public information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is private information?

A

Content of potential disclosures; information that can be owned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is privacy?

A

The feeling that no one has the right to own private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do people control their private information?

A

People control their private information through the use of personal privacy rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is rule based theory?

A

Assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 factors that play a part in the way we develop our own privacy rules?

A

Culture, gender, motivation, context, and risk/benefit ratio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a collective privacy boundary?

A

Intersection of personal privacy boundaries of co-owners of private information, all of whom are responsible for the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a mutual privacy boundary?

A

Collective understanding about information. Cow-owners need to draw the same borders are their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a share holder?

A

Confidant fully committed to handling private information according to the original owners privacy rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a deliberate confidant?

A

People who sought out private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a reluctant confidant?

A

Co-owner of private information who did not seek it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is boundary permeability?

A

How much information to flow to third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is boundary turbulence?

A

Disruption of privacy management and relational trust occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is confidentiality dilemma?

A

Tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare (multiple motivations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role to mistakes have in such information?

A

People can create turmoil by making mistakes
- errors of judgement
- miscalculation of timing
- bungling of topic rules

17
Q

What six criteria for good interpretive theory are fulfilled with Communication Privacy Management Theory?

A
  1. Understanding of people
  2. Qualitative Research
  3. Community of agreement
  4. Clarification of values
  5. Reform of society
  6. Aesthetic appeal