Communication Privacy Management Flashcards
What is Communication Privacy Management Theory?
Description of how people handle their private information
What are privacy boundaries?
Metaphor to show how people think of the borders between private and public information
What is private information?
Content of potential disclosures; information that can be owned.
What is privacy?
The feeling that no one has the right to own private information.
How do people control their private information?
People control their private information through the use of personal privacy rules
What is rule based theory?
Assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives
What are the 5 factors that play a part in the way we develop our own privacy rules?
Culture, gender, motivation, context, and risk/benefit ratio
What is a collective privacy boundary?
Intersection of personal privacy boundaries of co-owners of private information, all of whom are responsible for the information
What is a mutual privacy boundary?
Collective understanding about information. Cow-owners need to draw the same borders are their information
What is a share holder?
Confidant fully committed to handling private information according to the original owners privacy rules
What is a deliberate confidant?
People who sought out private information
What is a reluctant confidant?
Co-owner of private information who did not seek it
What is boundary permeability?
How much information to flow to third parties
What is boundary turbulence?
Disruption of privacy management and relational trust occurs
What is confidentiality dilemma?
Tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare (multiple motivations)