124 - Privacy

124 - Privacy - Privacy BasicAssumptions

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Privacy Basic Assumptions 1. Based upon management of private information o Change of name from CBM to CPM 2. Builds upon dialectical theory and systems theory  o o Levels of boundaries—but notion of boundaries is different  3. Revealing information is risky—vulnerability o Expose self, potentially hurt relationship o --e.g., study by Petronio et al. on child abuse o Because revealing info. is risky, people construct metaphorical  boundaries around themselves 4.  Boundary structures (who is and who is not allowed access to information) o --Metaphorical boundaries that ebb and flow depending upon degree of  risk of revealing information A.  Notion of Control --Control risks  --Want to control private information because of vulnerability --Signal ownership of info. o
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 5

124 - Privacy - Privacy BasicAssumptions

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online