Download presentation
Presentation is loading. Please wait.
Published byAlexandra Gilbert Modified over 5 years ago
1
Communication Privacy Management (Sandra Petronio)
Theory w/ a million names… Still S-D, but applied to established Rs
2
Fundamental Assumptions
We constantly ! vs (viewed as equally good) (disclosing info freely) Promotes intimacy Risks vulnerability (keeping info private) Promotes autonomy Risks isolation S-D defines privacy conceptual border around private info, differs in (deg. of access ease) *S-D* by one requires *response* from other Boundary coordination –
3
Things Discloser Must Consider!
Expectat’s for comm (implies level of control over partner) Message Direct, obvious, no respondent UC Can restrain respondent Indirect, vague, lots of respondent UC Freedom for respondent
4
Things the Respondent Must Consider!
Evaluation of Figure out what motivat. S-D Figure out what response they want Knowing motivat. makes response options easier (e.g., give them what they ask for/want), but still ____________ Strategy Choice Direct Message - Indirect Message -
5
Coordinations… Change based on: Over time, can become
Can be manipulated by both people to affect self, partner, or R.
6
Types of Boundary Coordination
Explicit Demand Implicit Demand Satisfactory Fit *e.g., traditional R’s Overcompensatory *e.g., withdraw/demand Deficient *e.g., demand/withdraw Equivocal *e.g., separates Direct response Indirect response Types of Boundary Coordination
7
Durham & Braithwaite (2009, p. 48)
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.