1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Social Penetration Theory
Focuses on self-disclosure as the primary way to develop close relationships
Communication Privacy Management Theory
A description of how people handle their private info
Privacy
“The feeling one has the right to to own private info”
Rule-based Theory
People have rules for managing their private info
Mutual Privacy Boundaries
Collective boundaries that shape people together
Boundary Ownership
Who decides?
Deliberate confidant
Intentionally seeks private info (i.e doctors)
Reluctant confidant
Didn’t want or expect disclosure
Shareholder
One fully vested in keeping info according to original owner’s privacy rules
Stakeholder
One who deserves access and control
Boundary linkage
Who else gets to know?
Boundary permeability
How much info can flow?
Boundary turbulence
Relationships at risk
Fuzzy boundaries
No recognized or mutual boundaries and a vague idea of patient’s expectations, advocates use their own privacy rules to guide what they day
Intentional boundaries
Those who blab the secret
Confidentiality dilemma
Tragic moral choice confidants face when they must reach a collective privacy boundary to promote original owner’s welfare
Private info
Content of potential disclosures; info that can be owned
Collective Privacy Boundary
An intersection of personal privacy boundaries of co-owners of private info, all of whom are responsible for the info