Deck 12: Communication Privacy Management Theory

Full screen (f)
exit full mode
Question
The earlier studies of Communication Privacy Management (CPM) Theory looked at

A) initial encounters
B) rule development
C) reasons for relationship termination
D) friendship formation
Use Space or
up arrow
down arrow
to flip the card.
Question
Originally, Petronio referred to her theory as a _________ because its boundaries were confined to privacy within a marital relationship.

A) macrotheory
B) microtheory
C) macrocosm
D) microcosm
Question
All of the following are assumptions of Communication Privacy Management Theory EXCEPT

A) Humans are choice makers.
B) Humans are rule makers and rule followers.
C) Humans believe that life is always in flux.
D) The choices humans make are based on others and the self.
Question
If Miranda was concerned about disclosing information that mattered deeply to her, she is wary of communicating which of the following?

A) intimate information
B) personal information
C) a dialectical rationale
D) private information
Question
Which of the following is NOT one of the features of boundaries as discussed by Petronio?

A) Boundaries can be personal.
B) Boundaries are normally set by those in power.
C) Boundaries can be rigid.
D) Boundaries can change across the life span.
Question
Caughlin and Afifi's (2004) research speaks to the issue of ownership. In their research on relationships between college students and their parents, as well as research on boyfriend/girlfriend relationships, they found that

A) relational partners are unwilling to take responsibility for their decisions
B) avoiding disclosures can sometimes be helpful to relationships
C) it is never a good idea to restrict open communication
D) relational partners usually reveal more information than they should
Question
Petronio believes that the basic thesis of Communication Privacy Management Theory is "grounded in the unity of ________"

A) social exchange principles
B) communication systems
C) communication symbols
D) dialectics
Question
Sharma is close to her gynecologist, frequently telling her physician some personal information. The bond formed between Sharma and her physician represents which concept of Communication Privacy Management Theory?

A) boundary coordination
B) boundary linkage
C) integrative bonding
D) collegial bonding
Question
The communication tradition to which CPM is related is

A) socio-cultural
B) socio-phenomenological
C) socio-psychological
D) socio-semiotic
Question
Tucker and Sophie have been roommates for 2 months. Although they feel quite close, they still find themselves in conflicts. For instance, Tucker has accused Sophie of telling others about some personal information he revealed to her a few months ago. Sophie, however, felt that Tucker didn't clearly state that the information should be kept private. This episode represents which concept of Communication Privacy Management Theory?

A) boundary ambiguity
B) boundary permeability
C) boundary ownership
D) boundary turbulence
Question
Which of the following statements accurately expresses the relationship between people and rules?

A) People have little respect for rules in close relationships.
B) People learn rules by negotiation.
C) People's rules reflect their personal values.
D) Rules are critical in determining relationship satisfaction.
Question
Which of the following is NOT considered to be a decision criterion for rule development?

A) gender
B) motivation
C) class
D) context
Question
When access to private information is closed, boundaries are said to be _____ when access is open, people have ______ boundaries.

A) thin; thick
B) thick; thin
C) limited; expansive
D) expansive; limited
Question
As partners for over a decade, Carmen and Lucy have clear rules about information that they are to keep between themselves and information available to close friends. The couple is practicing which concept of Communication Boundary Management Theory?

A) boundary permeability
B) boundary explicitness
C) boundary ownership
D) boundary communication
Question
CPM relies on the boundary metaphor to make the point that there is a line between being public and being private. When private information is shared, the boundary around it is called a

A) collective boundary
B) personal boundary
C) private boundary
D) disclosure boundary
Question
Which communication context is the focus of CPM?

A) intrapersonal
B) small group
C) public
D) interpersonal
Question
Which approach to knowing characterizes the research undertaken with CPM?

A) positivistic/empirical
B) interpretive/hermeneutic
C) critical
D) phenomenological
Question
Which of the following statements accurately captures the main criticism of CPM?

A) Critics question its logical consistency because it claims to be a dialectical theory but appears to take a dualistic approach.
B) Critics question its heurism because of the lack of research that has been undertaken using CPM.
C) Critics question its utility because it does not appear to explain the phenomenon under consideration very well.
D) Critics question its parsimony because it seems unnecessarily complex in nature given the simple processes it attempts to explain.
Question
All of the following are decision-making criteria for developing privacy rules EXCEPT

A) gender criteria
B) motivation criteria
C) boundary criteria
D) risk-benefit ratio criteria
Question
Communication Privacy Management Theory has its roots in economics.
Question
Human beings, in Communication Privacy Management Theory, are viewed as choice makers who make decisions regarding rule-making and rule-following.
Question
Private disclosures, rather than self-disclosures, are emphasized in communication privacy management.
Question
Boundary ownership refers to a person's decision to cross over appropriate relational guidelines.
Question
When private information is shared, the boundary around it is called a collective boundary.
Question
Petronio is convinced that despite what others believe, all relationships are essentially the same in terms of intimacy.
Question
CPM Theory is a dialectic theory, although it has been criticized for reflecting more of a dualistic approach.
Question
The theorists argue that privacy can only be understood in a dialectical tension with disclosure; if we disclosed everything, we wouldn't have a concept of privacy, and vice versa.
Question
Explain the role of rules in Communication Boundary Management Theory. How are they interpreted by Petronio and how do they function?
Question
Apply Communication Privacy Management Theory to on-line relationships.
Question
How does boundary ownership exist in work relationships?
Question
Differentiate between private disclosures and self-disclosures. Are they basically the same? Different? Use examples.
Question
What does Petronio mean by "intimacy?"
Question
Define boundary turbulence and describe an instance in which you experienced it. What adjustments were made in order to reduce turbulence and achieve coordination? Were they effective? Why or why not?
Question
How would you go about studying Communication Privacy Management in a particular relationship or context? Formulate a hypothesis or research question based on the theory, and describe your method for investigating it.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/34
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Communication Privacy Management Theory
1
The earlier studies of Communication Privacy Management (CPM) Theory looked at

A) initial encounters
B) rule development
C) reasons for relationship termination
D) friendship formation
rule development
2
Originally, Petronio referred to her theory as a _________ because its boundaries were confined to privacy within a marital relationship.

A) macrotheory
B) microtheory
C) macrocosm
D) microcosm
microtheory
3
All of the following are assumptions of Communication Privacy Management Theory EXCEPT

A) Humans are choice makers.
B) Humans are rule makers and rule followers.
C) Humans believe that life is always in flux.
D) The choices humans make are based on others and the self.
Humans believe that life is always in flux.
4
If Miranda was concerned about disclosing information that mattered deeply to her, she is wary of communicating which of the following?

A) intimate information
B) personal information
C) a dialectical rationale
D) private information
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT one of the features of boundaries as discussed by Petronio?

A) Boundaries can be personal.
B) Boundaries are normally set by those in power.
C) Boundaries can be rigid.
D) Boundaries can change across the life span.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
6
Caughlin and Afifi's (2004) research speaks to the issue of ownership. In their research on relationships between college students and their parents, as well as research on boyfriend/girlfriend relationships, they found that

A) relational partners are unwilling to take responsibility for their decisions
B) avoiding disclosures can sometimes be helpful to relationships
C) it is never a good idea to restrict open communication
D) relational partners usually reveal more information than they should
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
7
Petronio believes that the basic thesis of Communication Privacy Management Theory is "grounded in the unity of ________"

A) social exchange principles
B) communication systems
C) communication symbols
D) dialectics
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
8
Sharma is close to her gynecologist, frequently telling her physician some personal information. The bond formed between Sharma and her physician represents which concept of Communication Privacy Management Theory?

A) boundary coordination
B) boundary linkage
C) integrative bonding
D) collegial bonding
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
9
The communication tradition to which CPM is related is

A) socio-cultural
B) socio-phenomenological
C) socio-psychological
D) socio-semiotic
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
10
Tucker and Sophie have been roommates for 2 months. Although they feel quite close, they still find themselves in conflicts. For instance, Tucker has accused Sophie of telling others about some personal information he revealed to her a few months ago. Sophie, however, felt that Tucker didn't clearly state that the information should be kept private. This episode represents which concept of Communication Privacy Management Theory?

A) boundary ambiguity
B) boundary permeability
C) boundary ownership
D) boundary turbulence
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following statements accurately expresses the relationship between people and rules?

A) People have little respect for rules in close relationships.
B) People learn rules by negotiation.
C) People's rules reflect their personal values.
D) Rules are critical in determining relationship satisfaction.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT considered to be a decision criterion for rule development?

A) gender
B) motivation
C) class
D) context
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
13
When access to private information is closed, boundaries are said to be _____ when access is open, people have ______ boundaries.

A) thin; thick
B) thick; thin
C) limited; expansive
D) expansive; limited
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
14
As partners for over a decade, Carmen and Lucy have clear rules about information that they are to keep between themselves and information available to close friends. The couple is practicing which concept of Communication Boundary Management Theory?

A) boundary permeability
B) boundary explicitness
C) boundary ownership
D) boundary communication
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
15
CPM relies on the boundary metaphor to make the point that there is a line between being public and being private. When private information is shared, the boundary around it is called a

A) collective boundary
B) personal boundary
C) private boundary
D) disclosure boundary
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
16
Which communication context is the focus of CPM?

A) intrapersonal
B) small group
C) public
D) interpersonal
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
17
Which approach to knowing characterizes the research undertaken with CPM?

A) positivistic/empirical
B) interpretive/hermeneutic
C) critical
D) phenomenological
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following statements accurately captures the main criticism of CPM?

A) Critics question its logical consistency because it claims to be a dialectical theory but appears to take a dualistic approach.
B) Critics question its heurism because of the lack of research that has been undertaken using CPM.
C) Critics question its utility because it does not appear to explain the phenomenon under consideration very well.
D) Critics question its parsimony because it seems unnecessarily complex in nature given the simple processes it attempts to explain.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
19
All of the following are decision-making criteria for developing privacy rules EXCEPT

A) gender criteria
B) motivation criteria
C) boundary criteria
D) risk-benefit ratio criteria
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
20
Communication Privacy Management Theory has its roots in economics.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
21
Human beings, in Communication Privacy Management Theory, are viewed as choice makers who make decisions regarding rule-making and rule-following.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
22
Private disclosures, rather than self-disclosures, are emphasized in communication privacy management.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
23
Boundary ownership refers to a person's decision to cross over appropriate relational guidelines.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
24
When private information is shared, the boundary around it is called a collective boundary.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
25
Petronio is convinced that despite what others believe, all relationships are essentially the same in terms of intimacy.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
26
CPM Theory is a dialectic theory, although it has been criticized for reflecting more of a dualistic approach.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
27
The theorists argue that privacy can only be understood in a dialectical tension with disclosure; if we disclosed everything, we wouldn't have a concept of privacy, and vice versa.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
28
Explain the role of rules in Communication Boundary Management Theory. How are they interpreted by Petronio and how do they function?
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
29
Apply Communication Privacy Management Theory to on-line relationships.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
30
How does boundary ownership exist in work relationships?
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
31
Differentiate between private disclosures and self-disclosures. Are they basically the same? Different? Use examples.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
32
What does Petronio mean by "intimacy?"
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
33
Define boundary turbulence and describe an instance in which you experienced it. What adjustments were made in order to reduce turbulence and achieve coordination? Were they effective? Why or why not?
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
34
How would you go about studying Communication Privacy Management in a particular relationship or context? Formulate a hypothesis or research question based on the theory, and describe your method for investigating it.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 34 flashcards in this deck.