Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 8 Lecture/Recap.  “…personal information, shared intentionally, that another person would have trouble finding out without being told” (p.

Similar presentations


Presentation on theme: "Chapter 8 Lecture/Recap.  “…personal information, shared intentionally, that another person would have trouble finding out without being told” (p."— Presentation transcript:

1 Chapter 8 Lecture/Recap

2

3  “…personal information, shared intentionally, that another person would have trouble finding out without being told” (p. 153).  “I decided to wear pink today”  “I decided to wear pink today in support of my loved ones who have battled breast cancer”  Verbal behaviors (intentional)  “I really have a crush on Will but no one knows because I’m afraid he won’t like me back” VERSUS  “You blush every time Will comes around—you must have a crush on him!”

4  Must be INTENTIONAL  What, how, how much  Must trust the individual  How do we know?  Disclosing private information  Private (reflection of self-concept) vs. public (our public image)  Level of risk involved -- WHY?

5  Private vs. Public  History vs. Story  More risk associated with story

6  Individual differences (ties to subjectivity)  The need for openness and disclosure  Culture  Sex and Gender  Type and life of relationship (3 patterns—p. 16o)  Disclosure often levels off or decreases  Framing disclosure -- based on relationship type Example:(8:00 mark) http://www.youtube.com/watch?v=puObmB1Ga3Q

7  Great deal of disclosure in few interactions  Usually occurs between 2 people in close relationships  Exceptions?  Ex: 3 friends discussing a break up; the bus rider phenomenon http://www.youtube.com/watch?v=H8p2dYpeO6U

8  Reciprocal process  Immediate?  Matching self-disclosure vs. concern  Example: Clip (Charlotte and Miranda)  Occurs over time  Relationship development linked with self- disclosure

9  Social Penetration Theory/Model  http://www.youtube.com/watch?v=_bMcXVe8zIs – why is this an example of penetration theory? http://www.youtube.com/watch?v=_bMcXVe8zIs  Breadth vs. Depth  Activity, -Part 1: Draw your onion! Consider each level as more information. Also consider different relationships. Where would you put discussions of: Your relationship with a significant other Your political views Your religious views Your goals and aspirations General information about your family Detailed information about your family Detailed information about your medical history Your hobbies, interest, favorite things Your pet peeves and dislikes  What would it take for you to peel back each layer?

10  Johari (Joseph + Harry) Window  Four panes: Open, Hidden, Blind, and Unknown  Activity, Part 2: Draw out your Johari Window for these different encounters/relationships: With your parent With your best friend With your professor

11  Psychological (e.g. catharsis) or physical well being  Self awareness  Relationships  Begin a relationship  Maintain a relationship  Satisfy expectations of a good relationship  Escalate a relationship

12  To avoid hurt/rejection  Consider “ambushing” from our discussion on listening  To avoid conflict/protect a relationship  To keep image and/or individuality  To reduce stress

13  Owning (I-Statements)  Honesty  Consistency  Non-distracting verbal cues  Relevancy (consider the context)  To situation and conversation  Risks vs. Benefits analysis  Predict reactions/responses (of the receiver) and effects (on the relationship)  Appropriateness  Amount, type, receiver


Download ppt "Chapter 8 Lecture/Recap.  “…personal information, shared intentionally, that another person would have trouble finding out without being told” (p."

Similar presentations


Ads by Google