We create information boundaries by monitoring the private information we disclose to others, according to
A) relational maintenance theory.
B) relational dialectics theory.
C) social penetration theory.
D) communication privacy management theory.