Ipc lesson plan 17 privacy


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ipc lesson plan 17 privacy

  1. 1. Privacy Management<br />When and when not to say what is on your mind<br />
  2. 2. Why do we value our privacy?<br />
  3. 3. CPMCommunication Privacy Management Theory<br />How individuals maintain privacy by setting up boundary structures to control the risks inherent in disclosing private information. <br />
  4. 4. Boundary Structures<br />Boundary structures are based on two elements:<br />Ownership: who has the right to control the information<br />Permeability: rules govern who can access the information that we own <br />
  5. 5. How do we determine what information we disclose to others?<br />Culture<br /> Personality<br /> The Relationship<br /> Sex/Gender<br /> Needs/Motivation <br />
  6. 6. 1 Minute Writing:<br />List the general topics you believe most people keep private<br />
  7. 7. State of the Relationship<br />Conflict Issues<br />Negative Experiences / Failures<br />Romantic Relationship Experiences (Exes)<br />Sexual Experiences<br />Friendships and Family Members<br />Dangerous Behaviors (drinking, drugs)<br />Everyday Activities <br />Money<br />Deep Conversations<br />Religion <br />
  8. 8. What happens when our privacy is violated?<br />
  9. 9. Responses to Privacy Violations<br /><ul><li>Verbal assertion: communicating in a direct and cooperative manner
  10. 10. telling the invader not to do it again
  11. 11. asking the invader to respect one’s privacy in the future
  12. 12. Passive Aggression and Retaliation: trying to retaliate against a person through behaviors such as:
  13. 13. making the person feel guilty
  14. 14. getting revenge by violating their privacy</li></li></ul><li>Responses to Privacy Violations<br /><ul><li>Tempered Tolerance: outwardly accepting the privacy violation through responses such as:
  15. 15. grinning and bearing it
  16. 16. acting like the incident never happened
  17. 17. Boundary Restructuration: adjusting public boundaries to prevent future privacy violations
  18. 18. putting a lock on a drawer
  19. 19. going into another room when talking on the phone</li></li></ul><li>Get into Four Groups<br />Using the four responses to privacy violations, come up with two scenarios:<br />When your response may be appropriate<br />When it would be in appropriate<br />Act out a scene for each one.<br />Group A - Verbal Assertion<br />Group B - Passive Aggression <br />Groups C - Tempered Tolerance<br />Group D - Boundary Restructuration<br />
  20. 20.
  21. 21. Obsessive Relational Intrusion (ORI)<br />ORI occurs when someone uses intrusive tactics to try to get closer to someone else. <br />Common ORI situations involve unrequited love between:<br />Friends<br />Exs<br />Acquaintances <br />
  22. 22. What does ORI look like? <br />
  23. 23. Obsessive Relational Intrusion<br /><ul><li>Common Forms:
  24. 24. Calling and arguing,
  25. 25. Calling and hanging up,
  26. 26. Repeatedly asking for another chance,
  27. 27. Watching from a distance,
  28. 28. Making exaggerated claims of affection
  29. 29. Severe Forms:
  30. 30. Invading one’s home,
  31. 31. Damaging property,
  32. 32. Causing physical harm
  33. 33. Problem: The “Playing-Hard-To-Get” Phenomenon.</li></li></ul><li>Why do people engage in ORI? <br />
  34. 34. Four Reasons for Continued Pursuit<br /><ul><li>cultural scripts
  35. 35. the ambiguity of communication
  36. 36. rumination
  37. 37. a shift in motivation </li></li></ul><li>Responses to ORI<br />Passive: waiting for the pursuer to tire of you, lose interest, or give up <br />Avoidant: not answering phone calls and staying away from the pursuer<br />Aggressive: being mean or rude, threatening to harm the pursuer if she or he doesn’t leave you alone<br />Integrative: communicating disinterest directly, negotiating relationship rules and boundaries<br />Help Seeking: asking others for assistance in preventing ORI behavior<br />
  38. 38. Responses to ORI<br />Passive<br />Avoidant<br />Aggressive<br />Integrative<br />Help Seeking<br />Which response strategy is the most effective?<br />Which response strategy is the least effective?<br />