3. CPMCommunication Privacy Management Theory How individuals maintain privacy by setting up boundary structures to control the risks inherent in disclosing private information.
4. Boundary Structures Boundary structures are based on two elements: Ownership: who has the right to control the information Permeability: rules govern who can access the information that we own
5. How do we determine what information we disclose to others? Culture Personality The Relationship Sex/Gender Needs/Motivation
6. 1 Minute Writing: List the general topics you believe most people keep private
7. State of the Relationship Conflict Issues Negative Experiences / Failures Romantic Relationship Experiences (Exes) Sexual Experiences Friendships and Family Members Dangerous Behaviors (drinking, drugs) Everyday Activities Money Deep Conversations Religion
21. Obsessive Relational Intrusion (ORI) ORI occurs when someone uses intrusive tactics to try to get closer to someone else. Common ORI situations involve unrequited love between: Friends Exs Acquaintances
38. Responses to ORI Passive Avoidant Aggressive Integrative Help Seeking Which response strategy is the most effective? Which response strategy is the least effective?