SELECT AN EDITION:
9th EDITION   10th EDITION   11th EDITION
A First Look at Communication Theory Reveal main menu
 

The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.

Resources available to all users:

  • Text Comparison—theories covered in A First Look and ten other textbooks
  • Theory Overview—abstract of each chapter
  • Self-Help Quizzes—for student preparation
  • Chapter Outlines
  • Key Names—important names and terms in each chapter
  • Conversation Videos—interviews with theorists
  • Application Logs—student application of theories
  • Essay Questions—for student prepatation
  • Suggested Movie Clips—tie-in movie scenese to theories
  • Links—web resources related to each chapter
  • Primary Sources—for each theory with full chapter coverage
  • Further Resources—bibliographic and other suggestions
  • Changes—for each theory, since the previous edition
  • Theory Archive—PDF copies from the last edition in which a theory appeared

Resources available only to registered instructors who are logged in:

  • Discussion Suggestions
  • Exercises & Activities
  • PowerPoint® presentations you can use
  • Short Answer Quizzes—suggested questions and answers

Information for Instructors. Read more


CHANGE TO View by Theory
Theory Key Names
11th Edition

Annotated list of scholars and terms, from the Instructors Manual and margin notes in the text

List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12Communication Privacy Management Theory


  • Sandra Petronio
    • Communication scholar from Indiana University-Purdue University Indianapolis who advocates for a rules-based approach to management of privacy and the disclosure of private information.
  • Privacy boundaries
    • A metaphor to show how people think of the borders between private and public information.
  • Private information
    • The content of potential disclosures; information that can be owned.
  • Privacy
    • The feeling that one has the right to own private information.
  • Rule-based theory
    • A theory that assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives.
  • Collective privacy boundary
    • An intersection of personal privacy boundaries of co-owners of private information, all of whom are responsible for the information.
  • Mutual privacy boundary
    • A synchronized collective privacy boundary that co-owners share because they have negotiated common privacy rules.
  • Boundary ownership
    • The rights and responsibilities that co-owners of private information have to control its spread.
  • Shareholder
    • A confidant fully committed to handling private information according to the original owner’s privacy rules.
  • Stakeholder
    • A confidant who deserves access and control regarding private information and the rules for sharing it.
  • Deliberate confidant
    • A recipient who sought out private information.
  • Reluctant confidant
    • A co-owner of private information who did not seek it nor want it.
  • Boundary linkage
    • An alliance formed by co-owners of private information as to who else should be able to know.
  • Boundary permeability
    • The extent to which a boundary permits private information to flow to third parties.
  • Boundary turbulence
    • Disruption of privacy management and relational trust that occurs when collective privacy boundaries aren’t synchronized.
  • Confidentiality dilemma
    • The tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare.


You can access the Key Names for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



Resources
by Type


Instructors can get
additional resources.
Read more





 KEY NAMES

 VIDEOS


 ESSAY






New to Theory
Resources?

Find out more
in this short
video overview
(3:01).

CHANGE TO View by Theory
Theory Key Names
11th Edition

Annotated list of scholars and terms, from the Instructors Manual and margin notes in the text

List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12Communication Privacy Management Theory


  • Sandra Petronio
    • Communication scholar from Indiana University-Purdue University Indianapolis who advocates for a rules-based approach to management of privacy and the disclosure of private information.
  • Privacy boundaries
    • A metaphor to show how people think of the borders between private and public information.
  • Private information
    • The content of potential disclosures; information that can be owned.
  • Privacy
    • The feeling that one has the right to own private information.
  • Rule-based theory
    • A theory that assumes we can best understand people’s freely chosen actions if we study the system of rules they use to interpret and manage their lives.
  • Collective privacy boundary
    • An intersection of personal privacy boundaries of co-owners of private information, all of whom are responsible for the information.
  • Mutual privacy boundary
    • A synchronized collective privacy boundary that co-owners share because they have negotiated common privacy rules.
  • Boundary ownership
    • The rights and responsibilities that co-owners of private information have to control its spread.
  • Shareholder
    • A confidant fully committed to handling private information according to the original owner’s privacy rules.
  • Stakeholder
    • A confidant who deserves access and control regarding private information and the rules for sharing it.
  • Deliberate confidant
    • A recipient who sought out private information.
  • Reluctant confidant
    • A co-owner of private information who did not seek it nor want it.
  • Boundary linkage
    • An alliance formed by co-owners of private information as to who else should be able to know.
  • Boundary permeability
    • The extent to which a boundary permits private information to flow to third parties.
  • Boundary turbulence
    • Disruption of privacy management and relational trust that occurs when collective privacy boundaries aren’t synchronized.
  • Confidentiality dilemma
    • The tragic moral choice confidants face when they must breach a collective privacy boundary in order to promote the original owner’s welfare.


You can access the Key Names for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



 

Copyright © Em Griffin 2024 | Web design by Graphic Impact