privacy

20
Privacy Management When and when not to say what is on your mind

description

 

Transcript of privacy

Page 1: privacy

Privacy Management

When and when not to say what is on your mind

Page 2: privacy

This Week

0Chapter 120 Privacy management0 Obsessive Relational Intrusions (Stalking!)

0Presenters – Friday0 Bryan0 Brooklyn0 Sarah

Page 3: privacy

Why do we value our privacy?

Page 4: privacy

CPMCommunication Privacy Management Theory

How individuals maintain privacy by setting up

boundary structures to control the risks inherent

in disclosing private information.

Page 5: privacy

Boundary Structures

0Boundary structures are based on two elements:0 Ownership: who has the right to control the information0 Permeability: rules govern who can access the information

that we own

Page 6: privacy

How do we determine what information we disclose to others?0 Culture0 Personality0 The Relationship0 Sex/Gender0 Needs/Motivation

Page 7: privacy

1 Minute Writing:

List the general topics you believe most people keep private

Page 8: privacy

0State of the Relationship0Conflict Issues0Negative Experiences / Failures0Romantic Relationship Experiences (Exes)0Sexual Experiences0Friendships and Family Members0Dangerous Behaviors (drinking, drugs)0Everyday Activities 0Money0Deep Conversations0Religion

Page 9: privacy

What happens when our privacy is violated?

Page 10: privacy

Responses to Privacy Violations

Verbal assertion: communicating in a direct and cooperative manner telling the invader not to do it again asking the invader to respect one’s privacy in the

future

Passive Aggression and Retaliation: trying to retaliate against a person through behaviors such as: making the person feel guilty getting revenge by violating their privacy

Page 11: privacy

Tempered Tolerance: outwardly accepting the privacy violation through responses such as:

grinning and bearing it acting like the incident never happened

Boundary Restructuration: adjusting public boundaries to prevent future privacy violations

putting a lock on a drawer going into another room when talking on the phone

Responses to Privacy Violations

Page 12: privacy

Get into Four Groups0Using the four responses to privacy violations, come

up with two scenarios:0 When your response may be appropriate0 When it would be in appropriate

0Act out a scene for each one.0Group A - Verbal Assertion0Group B - Passive Aggression 0Groups C - Tempered Tolerance0Group D - Boundary Restructuration

Page 13: privacy
Page 14: privacy

Obsessive Relational Intrusion (ORI)

0ORI occurs when someone uses intrusive tactics to try to get closer to someone else.

0Common ORI situations involve unrequited love between:0 Friends0 Exs0 Acquaintances

Page 15: privacy

What does ORI look like?

Page 16: privacy

Obsessive Relational Intrusion

• Common Forms: • Calling and arguing, • Calling and hanging up, • Repeatedly asking for another chance, • Watching from a distance, • Making exaggerated claims of affection

• Severe Forms: • Invading one’s home,• Damaging property, • Causing physical harm

• Problem: The “Playing-Hard-To-Get” Phenomenon.

Page 17: privacy

Why do people engage in ORI?

Page 18: privacy

Four Reasons for Continued Pursuit

cultural scripts the ambiguity of communication rumination a shift in motivation

Page 19: privacy

Responses to ORI

0Passive: waiting for the pursuer to tire of you, lose interest, or give up

0Avoidant: not answering phone calls and staying away from the pursuer

0Aggressive: being mean or rude, threatening to harm the pursuer if she or he doesn’t leave you alone

0 Integrative: communicating disinterest directly, negotiating relationship rules and boundaries

0 Help Seeking: asking others for assistance in preventing ORI behavior

Page 20: privacy

Responses to ORI0Passive0Avoidant0Aggressive0 Integrative 0Help Seeking

0Which response strategy is the most effective?0Which response strategy is the least effective?