Analysis Of Sleepless In Seattle

Good Essays
Sleepless In Seattle

• Sam Baldwin (played by Tom Hanks) is a recently widowed dad who is trying to get over the loss of his wife and considering dating women again.
• Jonah Baldwin (played by Ross Malinger) is the son of Sam who calls a radio show to talk about his dad and how he needs to marry another woman.
• Annie Reed (played by Meg Ryan) a Baltimore woman that is recently engaged to a man named Walter, who tunes in to the radio show and realizes she is smitten with Sam.
• Walter (played by Bill Pullman) is a quirky man with many allergies who is engaged to Annie.
• Becky (played by Rosie O’Donnell) is Annie’s co-worker and best friend who she confides in about her secret crush on Sam, whom she’s never met. She also sends Annie’s
…show more content…
• Greg (played by Victor Garber) is married to Suzy and is also Sam’s close friend who goes to Seattle for a visit.
• Maggie Baldwin (played by Carey Lowell) is the deceased wife and mother of Sam and Jonah.
There are several relevant communication theories that are exhibited throughout the film Sleepless in Seattle, three of which are communication privacy theory, uncertainty reduction theory, and cognitive dissonance theory.
Communication privacy theory is described as a privacy management system. It’s quite opposite of the social penetration theory, which states that self-disclosure is the way to strengthen relationships. The communication privacy theory focuses on privacy boundaries and what information one chooses to withhold from another person. This privacy management system is focused on three parts: privacy ownership, privacy control, and privacy turbulence. Privacy ownership is our private information that only we know and others do not. This also encompasses our personal privacy boundaries. Depending on the person, our privacy boundaries could either be thin and porous, or thick and hard to break through (Griffin p. 151). Privacy control consists of one’s decision to either disclose or not disclose their private information with another. When you decide to share your private information or secret, you are giving up some sort of control. The boundaries have changed and the other person has now become a co-owner in your information. Privacy turbulence is what happens when sharing your information doesn’t go as you planned. You might expect the other person to keep your information between the two of you, but they decide to divulge your information to another person. When our privacy management system is thrown off balance and our privacy rules are broken, it creates

Related Documents

  • Decent Essays

    Privacy ownership consists of boundaries that surround ones information that they have that other’s do not. These boundaries can be either small and penetrable or thick and unbreakable. These boundaries help the owner of this private information keep this information secure and secret. The next part of the Communication Privacy Management Theory…

    • 356 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    As per EPIC, the default setting should not violate user expectations, diminish user privacy, and contradict Facebook’s own representations. Facebook should give users a meaningful control over personal information, and seek appropriate injunctive and compensatory relief if user’s private data is compromised. Also, the default setting should not make user to go and check that if the information shared is public or not. The privacy setting must be a global setting with capabilities to override only if user wants to. The user should be given control to share or not their information, in only groups they like to and users must be able to block people from accessing their information.…

    • 1044 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    In “Towards a Theory of Privacy in the information Age,” James H. Moor explains greased information, the foundation and nature of privacy, and the adjustment of policies to ensure privacy under certain situations before proposing a control/restricted access theory of privacy. Moor argues that one of the problems of privacy is that once information is exposed, others can have access to it and use it, sometimes without consent. He then claims that privacy is not a core value, or an essential value shared by all cultures, but that privacy is indeed essential in what he calls our system of values. Overall, Moor argues that it is important for us to think of privacy as a control/restricted access account because it encourages informed consent and…

    • 1065 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Although I agree with his proposed value of privacy, Rachels limits his theory to general application of social implications on why privacy is important and doesn’t take into account the specifics ideas of privacy. A model of privacy that integrates different aspects into account is needed to capture a wholesome description that is applicable to specific situations in addition to the mundane situations that were outlines in this…

    • 974 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    In my critical opinion, their objective was to try and concern how a social right (the right to privacy) can be as crucial as legal right (such as the right to property). Although, their main focus was to explain a better way of understanding an individual’s right to their privacy, the better way of implementing this law is to relate it to “the right to be let alone” which they have addressed in their article (205). Warren and Brandeis’ theory and concept of an individual’s right to be left alone is more severe, since it essentially has to do with the individual’s fundamental right to be able to live life freely. The “right to be let alone” is part of the American legal act. However, this still does not relate to an individual’s right to privacy under the law, this has to do with one’s right to liberty.…

    • 765 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    • Privilege is a special condition granted that allows access to something that others are not. Privilege communication is interaction between parties that is recognized as a protected relationship such as a psychologist and client (Fisher,2008). Whatever is said between these two parties should remain confidential and the law cannot force the psychologist to disclose information said in their conversations. However, privilege is lost or waived when all or part of the communication is disclosed to a third person (Foell,…

    • 1730 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Kick The Habit Essay

    • 768 Words
    • 4 Pages

    “Privacy” is defined as one’s right to keep personal information private. Yes! It is a right. As stated by the UN Declaration of Human Rights, the International Covenant on Civil and Political Rights, and many other treaties; privacy is a basic and fundamental human right. Many people believe that our right to privacy must be forgotten…

    • 768 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Self-disclosure is the conscious and subconscious deed of revealing more about oneself to others. This includes goals, failures, fears, dreams as well as likes and dislikes. Self-disclosure typically occurs when an individual initially meets someone and continues as the relationship establishes and develops. As the relationship progresses, the disclosure of information begins to come naturally and more candidly. If one person is not open to self-disclosing then the other person may cease to disclose information about themselves.…

    • 743 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Relationships come and go over time, but there is always external factors that directly influence how our relationships with people end and or how new relationships start up. Our relationships can be altered by simply the distance between one another, for with a new location, we create new relationships and old relationships may remain or change. Relationships can also change by our demands and interests, for if we have a girlfriend or boyfriend or an intensive job, we may have to choose one over another relationship. Distance, interest, and demand affect our relationships, pertaining to communication, and thus meaning that these external factors contribute to whether we maintain a steady communication, have issues with communicating with…

    • 1965 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Policy’s such as the P3P are introduced under certain websites visited to reduce unneeded information or data without the user’s approval. Privacy and anonymity can be broken up into several different subtopics, depending on what areas of technology they affect. Data anonymity focuses on personal devices such as tablets and smart phones, the data collected on these devices need to be protected or deleted, sensitive information in the wrong hands could be detrimental to the individual. Like data anonymity, connectivity anonymity allows users have to take steps protecting their privacy when connecting to the…

    • 776 Words
    • 4 Pages
    Decent Essays