logo image

Chapter 13 Communication Privacy Management Theory

What was communication privacy management theory designed to explain?
Public and private disclosure in relationships.
What are the three assumptions of communication privacy management theory concerning human nature?
Humans are choice makers
humans are rule makers and rule followers
human’s choices and rules are based off of the consideration of others as well as self.
what are the two assumptions concerning relational dialectics
relational life is characterized by change
contradiction of the fundamental fact of life.
What is the difference between private information and private disclosures?
private disclosure is what is going on in our heads while self disclosure is what category we are put under(private is within and deeply matter to a person, self is what other people
Why does this theory use the term “private disclosure” instead of “self-disclosure”?
Because self disclosures are just things about us that people know, private disclosure is something more intimate
In what way is Communication Privacy Management theory a rule-based theory?
By certain societal rules we chose to or not to private disclosure some things.
How does a privacy management system identify ways privacy boundaries are coordinated between and among individuals?
private information is about things that matter deeply to a person, private boundaries are the line in the sand where between private info that only that certain person should tell and public info. This is linked to Boundary coordination, linkage, ownership. Also how permeability(think or thin) the boundaries are, and if there is any boundary turbulence. Control and ownership is when it is that person’s information that is theirs to tell.
What is the privacy rule management process?
the nature of the disclosure[privacy of the characteristics] whether we solely own it or it is co-owned info[boundary coordination] and if there is any conflicts in expectations on how private it is[boundary turbulence.]
How do the five decision-making criteria help us develop rules for privacy management?
Cultural[what culture a person is from.[ Gendered [women and men way of PM] motivational [how much you want to disclosure.] contextual [our environment affects if we want to disclosure something] Risk-benefit, [assessments of risks of benefits of disclosing.]
What is boundary coordination, and what are its features?
Boundary linkage the connections forming a boundary alliances between people
boundary ownership-right and privileges accruing to co-owners of private information.
boundary permeability-how much information is able to be passed through the boundary.
boundary turbulence: conflicts about boundary expectations and regulation.
In terms of criticism of this theory, how is Communication Privacy Management evaluated in terms of utility and heurism?
much promise of utility, and is heuristic.

Need essay sample on "Chapter 13 Communication Privacy Management Theory"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy