CMN 120 Lecture Notes - Lecture 14: Relational Dialectics

60 views5 pages
31 Jan 2017
School
Department
Course
CMN 120 Lecture 14 12/1/2016 11:10:00 PM
Privacy in Interpersonal Relationships/Communication Privacy Management
Theory
Introduction to privacy
What is private information?
o Information that is typically sensitive information that people
usually don’t share freely with everyone
What is a private disclosure?
o The process of revealing private information, yet always in
relation to concealing private information
o Sometimes we will want to reveal information to others, but
other times we would want to keep it to ourselves
Relational dialectics
o Private disclosure can be about oneself, or other people as
well
There is a difference between private disclosures and
self disclosures
Private disclosers can be self disclosures but it doesn’t
have to be, and vice versa for self disclosure
Communication Privacy Management Theory (CPM)
Presumes disclosures of private information are dialectical
People make choices about revealing or concealing based on criteria
that are important to us
And the idea of ownership is very important
o We think of our information as something that we own
Maxims (a rule) of CPM (Petronio & Durham, 2015)
Rules we use to manage our private information
o Assumption maxims
Public Private dialectical tension
Times when you reveal and times when you
conceal
Privacy management
Our private information is something that we
believe we own (we treat it just like property)
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in
We decide who gets to know it, and who doesn’t
get to know it
We believe we have control over it, since private
information is sensitive information and could
make us vulnerable if it gets out there
The way we control it is through rules
We will develop rules for who we share
information with, what information is shared,
what people could do with that information
Boundary metaphor
When we do share private information with
others, we create a symbolic boundary with us
and them
o Axiomatic maxims (help define the choices we make to
manage our information)
Private information ownership
We believe we own our information, especially
information that can make us vulnerable
Authorized (those that we allow to know our
private information) vs. Unauthorized (those that
we didn’t allow to know our information, still part
of our boundary because they know our
information)
Private information control
Develop rules where we are either motivated to
share information or motivated to conceal
information
Core criteria
Represents very stable reasons/decisions
for why we choose to either reveal or
conceal (consistent reasons)
Examples: culture where revealing is the
norm so we reveal a lot of information, or
culture where revealing is taboo so we don’t
reveal a lot of information
Catalyst criteria
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in

Get OneClass Notes+

Unlimited access to class notes and textbook notes.

YearlyBest Value
75% OFF
$8 USD/m
Monthly
$30 USD/m
You will be charged $96 USD upfront and auto renewed at the end of each cycle. You may cancel anytime under Payment Settings. For more information, see our Terms and Privacy.
Payments are encrypted using 256-bit SSL. Powered by Stripe.