Theory Key Names
Annotated list of scholars and terms, from the Instructors Manual and margin notes in the text
Normal (click on theory name to show detail) | Show All details | Clear details
Chapter 12—Communication Privacy Management Theory
- Sandra Petronio
- Communication scholar from Indiana University-Purdue University Indianapolis who advocates for a rules-based approach to management of privacy and the disclosure of private information.
- Privacy boundaries
- A metaphor to show how people think of the borders between private and public information.
- Private information
- The content of potential disclosures; information that can be owned.
- The feeling that one has the right to own private information.
- Rule-based theory
- A theory that assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives.
- Collective privacy boundary
- An intersection of personal privacy boundaries of co-owners of private information, all of whom are responsible for the information.
- Mutual privacy boundary
- A synchronized collective privacy boundary that co-owners share because they have negotiated common privacy rules.
- Boundary ownership
- The rights and responsibilities that co-owners of private information have to control its spread.
- A confidant fully committed to handling private information according to the original owner’s privacy rules.
- A confidant who deserves access and control regrading private information and the rules for sharing it.
- Deliberate confidant
- A recipient who sought out private information.
- Reluctant confidant
- A co-owner of private information who did not seek it nor want it.
- Boundary linkage
- An alliance formed by co-owners of private information as to who else should be able to know.
- Boundary permeability
- The extent to which a boundary permits private information to flow to third parties.
- Boundary turbulence
- Disruption of privacy management and relational trust that occurs when collective privacy boundaries aren’t synchronized.
- Confidentiality dilemma
- The tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare.
You can access the Key Names for a particular chapter in several ways:
- Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
- To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
- You can also use the Theory List, which will take you directly to the theory with available options highlighted.
Back to top