1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
comm privacy management theory
Explains the process by which people manage the concealing and revealing of private info
Theory assumptions
Humans are choice makers
Humans are rule followers
Rules and choices are based on self & others
Private Disclosure
People think about rules when making disclosures
Can be about self or others
CPM is dialectic
Competency for desire and privacy opposing each other
5 Principles of CPMT
ownership
Conreol
Rules
Co-Ownership
Turbulence
Owenership
We believe we own info about ourselves
Control
We seek to control private info
We have private boundaries
Boundaries are preamabke = thin
Not preamabke= thick
Rules
Rules guide what private info we share
Rule developments = core criteria = more stable, catalyst/ action
Rule attributes = socialization = family friends culture / negotiation = create new rules w others
Co-ownership
Shared info becomes co owned
Collective boundary / linkage boundary = connection w private info
Boundary coordination
Managing this cowned info
Turbelnce
Conflicts about boundary expectations and regulations
Privacy dilemma
Accidental= you accidentally heart this private info
Confidant= purpose tell you
Illcit= spying
Goals
Empirical / Interpatuve
Heuirism, uselful
Explain, predict, understand