{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

124 - Privacy - Privacy BasicAssumptions 1. o 2. o...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Privacy Basic Assumptions 1. Based upon management of private information o Change of name from CBM to CPM 2. Builds upon dialectical theory and systems theory  o Dialectical tension of openness & closedness  o Levels of boundaries—but notion of boundaries is different  3. Revealing information is risky—vulnerability o Expose self, potentially hurt relationship o --e.g., study by Petronio et al. on child abuse o Because revealing info. is risky, people construct metaphorical  boundaries around themselves 4.  Boundary structures (who is and who is not allowed access to information) o --Metaphorical boundaries that ebb and flow depending upon degree of  risk of revealing information A.  Notion of Control --Control risks  --Want to control private information because of vulnerability --Signal ownership of info.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.
  • Winter '08
  • TAMARAAFIFI
  • private information, Privacy Rule, Boundary protection rules, Boundary access rules, Privacy Basic Assumptions

{[ snackBarMessage ]}