The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.
Resources available to all users:
Resources available only to registered instructors who are logged in:
Information for Instructors. Read more
Resources
by Type
Instructors can get additional
resources. Read more
New to Theory Resources?
Find out more in this
short video overview (3:01).
Short abstracts of each theory that appear in Appendix A of the text
List mode: Normal (click on theory name to show detail) | Show All details | Clear details
Chapter 12—Communication Privacy Management Theory
People believe they own and have a right to control their private information; they do so by using personal privacy rules. When others are told, they become co-owners of the information. If co-owners don’t effectively negotiate mutually agreeable privacy rules about telling third parties, boundary turbulence is the likely result. (Socio-cultural and cybernetic traditions)
You can access the Theory Overview for a particular chapter in several ways:
Resources
by Type
Instructors can get
additional resources.
Read more
New to Theory
Resources?
Find out more
in this short
video overview
(3:01).
Short abstracts of each theory that appear in Appendix A of the text
List mode: Normal (click on theory name to show detail) | Show All details | Clear details
Chapter 12—Communication Privacy Management Theory
People believe they own and have a right to control their private information; they do so by using personal privacy rules. When others are told, they become co-owners of the information. If co-owners don’t effectively negotiate mutually agreeable privacy rules about telling third parties, boundary turbulence is the likely result. (Socio-cultural and cybernetic traditions)
You can access the Theory Overview for a particular chapter in several ways:
Copyright © Em Griffin 2024 | Web design by Graphic Impact