My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

CPMT - Utley

Horizontales
The second element of CPMT explains people believe they have the right to _______ their own information, which may vary in degree from high to low.
One key assumption is: Humans are _____ makers.
Bloggers may experience boundary turbulence when they assume others will ____ share their information with others.
Who established CPMT?
After a privacy violation, during boundary turbulence, members in the relationship need to revisit, readjust, or _________ privacy expectations.
________ boundaries are information that belongs to the relationship.
We see private information as _____?
Boundary _________ exists when the rules of boundary coordination are unclear or when people's expectations for privacy management come into conflict with one another.
One key assumption is: Humans are rule ____ and rule followers.
Verticales
How many principles make up CPMT?
Which of the five factors influencing our privacy rules explains how EVENTS and SITUATIONS affect how we reveal and conceal private information?
Boundary ______: The rights and responsibilities that co-owners of private information have to control its spread.
We create _______ to control what people know.
_______ information is what matters deeply to a person.
Ownership of private information is number _____ of the 5 core principles.
The process of communicating private information to another is called: Privacy _______.
Public SNS profiles gives permission for others to become a co- _____ of that information.