SELECT AN EDITION:
9th EDITION   10th EDITION

 

Theory Resources

DEEPEN YOUR UNDERSTANDING OF THE THEORIES IN THE 10TH EDITION

 

Resources
by Type








 ESSAY QUESTIONS


 LINKS





Instructors can get additional
resources. Read more


New to Theory Resources?
Find out more in this
short video overview (3:01).

Essay Questions
10th Edition

A self-help tool to aid in the study of the First Look text (started with the 9th Edition)


List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12—Communication Privacy Management Theory

  1. Define the five core principles of communication privacy management theory in your own words. Which principle is most important? Least important? Why did you choose these two?
     
  2. Describe your privacy management regarding the following items: where you live, your major, your class schedule, your romantic status, and your GPA. Who can have access to this information? How permeable are these boundaries? Why do you manage privacy in this way?
     
  3. Griffin, Ledbetter, and Sparks classify CPM as an interpretive theory, yet the critique section notes the use of quantitative research to support the theory. Explain why CPM theory might be more amenable to quantitative/objective research than some other interpretive theories. Relational dialectics or coordinated management of meaning could serve as effective contrasts in your answer.
     
  4. One of the most vexing experiences described in this chapter is the confidentiality dilemma. Drawing on the ethical reflections in the textbook, define three guiding ethical principles for how to decide when to disclose information against a person’s wishes. Be sure to clearly connect these principles to the ideas of the ethical theorists.
     
  5. Principle 2 mentions five factors that influence privacy rule formation: culture, gender, motivation, context, and risk/benefit ratios. Which factor do you believe is most important in the formation of your privacy rules? Least important? Identify two additional influences on your privacy rule formation that do not appear on this list.

You can access the Essay Questions for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



Resources
by Type






 VIDEOS


 ESSAY


 LINKS





Instructors can get
additional resources.
Read more

New to Theory
Resources?

Find out more
in this short
video overview
(3:01).

Essay Questions
10th Edition

A self-help tool to aid in the study of the First Look text (started with the 9th Edition)


List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12—Communication Privacy Management Theory

  1. Define the five core principles of communication privacy management theory in your own words. Which principle is most important? Least important? Why did you choose these two?
     
  2. Describe your privacy management regarding the following items: where you live, your major, your class schedule, your romantic status, and your GPA. Who can have access to this information? How permeable are these boundaries? Why do you manage privacy in this way?
     
  3. Griffin, Ledbetter, and Sparks classify CPM as an interpretive theory, yet the critique section notes the use of quantitative research to support the theory. Explain why CPM theory might be more amenable to quantitative/objective research than some other interpretive theories. Relational dialectics or coordinated management of meaning could serve as effective contrasts in your answer.
     
  4. One of the most vexing experiences described in this chapter is the confidentiality dilemma. Drawing on the ethical reflections in the textbook, define three guiding ethical principles for how to decide when to disclose information against a person’s wishes. Be sure to clearly connect these principles to the ideas of the ethical theorists.
     
  5. Principle 2 mentions five factors that influence privacy rule formation: culture, gender, motivation, context, and risk/benefit ratios. Which factor do you believe is most important in the formation of your privacy rules? Least important? Identify two additional influences on your privacy rule formation that do not appear on this list.

You can access the Essay Questions for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.
Resources available to all users:

  • Theory Overview—abstract of each chapter
  • Self-Help Quizzes—for student preparation
  • Chapter Outlines
  • Key Names—important names and terms in each chapter
  • Conversation Videos—interviews with theorists
  • Application Logs—student application of theories
  • Essay Questions—for student prepatation
  • Suggested Movie Clips—tie-in movie scenese to theories
  • Links—web resources related to each chapter
  • Primary Sources—for each theory with full chapter coverage
  • Further Resources—bibliographic and other suggestions
  • Changes—for each theory, since the previous edition
  • Theory Archive—PDF copies from the last edition in which a theory appeared

Resources available only to registered instructors who are logged in:

  • Discussion Suggestions
  • Exercises & Activities
  • PowerPoint® presentations you can use
  • Short Answer Quizzes—suggested questions and answers
  • Compare Texts—comparison of theories covered in A First Look and ten other textbooks

Information for Instructors. Read more


 

Copyright © Em Griffin 2019 | Web design by Graphic Impact