slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 10: Disclosure and Privacy PowerPoint Presentation
Download Presentation
Chapter 10: Disclosure and Privacy

Chapter 10: Disclosure and Privacy

280 Vues Download Presentation
Télécharger la présentation

Chapter 10: Disclosure and Privacy

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Inter-Act, 13th Edition Chapter 10: Disclosure and Privacy

  2. Chapter Objectives Discuss the dialectic of disclosure and privacy Explain the theory of communication privacy management (CPM) List the factors that affect people’s disclosure and privacy rules Explain how disclosure and privacy affect relationships Discuss the effects of technology on privacy boundaries Describe how to give and ask for personal feedback, both praise and constructive criticism

  3. Self-Disclosure • Revealing confidential or secret information Privacy • Withholding personal information to enhance autonomy or minimize vulnerability

  4. The Disclosure–Privacy Dialectic The tension between sharing personal information and keeping personal information confidential – also called the openness and closednessdialectic; each person has different expectations; these needs and expectations often vary over time

  5. Communication Privacy Management Theory CPM: provides a framework for understanding the decision-making process people use to manage disclosure and privacy Rules designed to maximize benefits of disclosure while minimizing risks We negotiate rules with our partner or we simply assume that our partner understands what rules apply

  6. Petronio’s 5 Disclosure Principles • Private information is “owned” and people believe they have the right to control it. • Controlis accomplished through privacy rules. • When private information is disclosed, the recipient becomes co-owner of the information. • Third-party access concerns • Permeability: how much can be told • Linkage: who else can know • Ownership: who makes third-party disclosure • We are likely to encounter boundary turbulence, privacy violations, intrusions, and dilemmas.

  7. Factors in CPM Theory Rules • Culture • Individualistic cultures value privacy more than collectivist cultures. • Americans tend to disclose more than most cultures. • Gender • Men tend to disclose less: “strong and silent” type. • Women tend to disclose more: “nurturing and sensitive” type.

  8. Factors in CPM Theory Rules • Motivation • Disclose more to people we know or want to know • May disclose secrets of those we don’t like • Risk–benefit analysis: weigh the advantages/disadvantages of disclosing • Context • Influenced by circumstances (ex: disclose to a “professional”; may “tell” when one is in danger • Disclosure during stress contributes to he

  9. Effects on Relationships • Intimacy • We cycle between periods of deep disclosure and attempts to reestablish privacy boundaries; controls relationship dev. • Disclosing secrets may damage/end relationship; opting for privacy may preserve intimacy, avoid conflict, protect feelings. • Reciprocity • Partners don’t disclose at the same time/rate. • Information Co-ownership • Disclosing to a third party may damage trust. • Families co-own info. and est. rules (personal, legal, financial)

  10. Appropriate Self-Disclosure Self-disclose the kind of information you want others to disclose to you. Self-disclose more intimate information only when you believe the disclosure represents an acceptable risk. Continue intimate self-disclosure only if it is reciprocated. • Move self-disclosure to deeper levels gradually. • Reserve intimate or very personal self-disclosure for ongoing relationships.

  11. Reciprocal self-disclosure has the greatest positive effects.

  12. Skills for Self-Disclosure and Privacy Management • Owning • Crediting yourself for feelings and opinions • Making “I” statements • Describing behavior • Recounting specific behaviors without drawing conclusions • Disclosing feelings • Owning and explaining emotions

  13. Owning • Examples: • “Lots of boys wet the bed.”/ “I was a bed wetter.” • “Everybody thinks Colin is unfair.”/ “Colin hurt my feelings with his criticism, which I perceived as unfair.” • “Nobody likes to be laughed at.”/ “Being laughed at embarrasses me.” • “Jon is a flirt.”/ “Jon has been flirting with me.”

  14. Describing Behavior Identify the overall impression you are experiencing. Recall the specific behaviors that led to the impression. Form a message to report only what you have seen or heard without drawing a conclusion about the behaviors.

  15. Describing Behavior • Examples: • “I really messed up when I was in high school handing around with gang bangers and generally acting like a tough guy.” (evaluative and vague) • “My freshman year in high school I began partying with a local gang. My grades dropped, I was arrested for shoplifting, and I got kicked off the football team. So instead of going to college on an athletic scholarship, I’m working my way through community college.” (specific without drawing conclusions; focuses on the behavior)

  16. Describing Feelings • Explaining emotions one feels in a precise and unemotional manner Displaying Feelings • Showing emotions through facial reactions, body language, or paralanguage

  17. Disclosing Feelings • Increases the likelihood of having a positive interaction with someone rather than an argument, and it decreases the chances of provoking defensiveness • “I feel…” doesn’t guarantee you will end up actually describing a feeling, but may end up evaluating, labeling, or blaming someone • Identify what triggered the feelings • Identify the particular emotion you are experiencing • Use an “I feel..” followed by naming the specific feeling • Become comfortable with describing positive feelings before trying to describe negative feelings effectively

  18. Protecting Privacy Making a conscious decision to withhold information or feelings from others • Change the subject. • Mask feelings. • Tell a “white lie.” • Describe your feelings. • Establish personal boundaries.

  19. Asking for Feedback • Think of feedback as in your best interest. • Be prepared for an honest response. • Guidelines: • Specify the kind of feedback you are seeking. • Avoid loaded questions. • Try to avoid negative verbal and nonverbal reactions to feedback. • Paraphrase what you hear. • Show gratitude for the feedback.

  20. Giving Personal Feedback Praising Recounting specific behaviors or accomplishments of another and their positive effects on others Constructive Criticism Diplomatically describes the specific negative behaviors of another and their effects

  21. Praising • When we keep our positive impressions of our partners private, we deprive them of self-concept enhancing info that encourages them to repeat the behaviors we think are praiseworthy • Guidelines: • Make note of the specific behavior you wish to reinforce • Describe the specific behavior • Describe the positive feelings or outcomes you or others experienced as a result • Phrase your response so that the level of praise appropriately reflects the significance of the behavior

  22. Giving Constructive Criticism Begin by asking your partner’s permission to disclose negative feedback. Preface a negative statement with a positive one. Describe the problematic behavior by following guidelines for describing behavior. Be as specific as possible. Suggest how the person can change the behavior.

  23. Effects of Social Media on Privacy • Social media and cell phone use in public blur the distinction between public and private communication. • Social media and the Internet are changing what people view as private and public.

  24. Awareness of Audience The Big Bang Theory “The tangerine factor” S1,e17 Discussion: How Does Penny react? How would you react? How does Personal information you read about friends on facebook impact your perception of them?

  25. Warranting Theory • We use Facebook pages to create perceptions of others: • Tags • Posts • Blog comments • Warranting theory: We find behaviors of others more credible when it cannot be easily manipulated by the person whom it describes.

  26. Digitally Managing Your Personal Information Do not carry on private phone conversations in public places. Do not post information online that you would not want your employers, enemies, or identity thieves to see. Be aware that others can digitally alter your digital image. Use social media privacy settings.

  27. Too much self-disclosure? What is on your facebookaccount?In the wrong hands your facebook account can be very revealing. see

  28. How Facebook has changed our conversations What would happen if we used our facebook lingo in our face-to-face conversations: