Which listening practice is considered bad because it is a violation of peoples privacy?

4.4: Bad Listening Practices

  1. Last updated
  2. Save as PDF
  • Page ID62848
    • Text Author[s]: Victoria Leonard
    • Faculty [Communication Studies] at College of the Canyons

    \[ \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}}}\] \[ \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{#1}}} \]\[\newcommand{\id}{\mathrm{id}}\] \[ \newcommand{\Span}{\mathrm{span}}\] \[ \newcommand{\kernel}{\mathrm{null}\,}\] \[ \newcommand{\range}{\mathrm{range}\,}\] \[ \newcommand{\RealPart}{\mathrm{Re}}\] \[ \newcommand{\ImaginaryPart}{\mathrm{Im}}\] \[ \newcommand{\Argument}{\mathrm{Arg}}\] \[ \newcommand{\norm}[1]{\| #1 \|}\] \[ \newcommand{\inner}[2]{\langle #1, #2 \rangle}\] \[ \newcommand{\Span}{\mathrm{span}}\] \[\newcommand{\id}{\mathrm{id}}\] \[ \newcommand{\Span}{\mathrm{span}}\] \[ \newcommand{\kernel}{\mathrm{null}\,}\] \[ \newcommand{\range}{\mathrm{range}\,}\] \[ \newcommand{\RealPart}{\mathrm{Re}}\] \[ \newcommand{\ImaginaryPart}{\mathrm{Im}}\] \[ \newcommand{\Argument}{\mathrm{Arg}}\] \[ \newcommand{\norm}[1]{\| #1 \|}\] \[ \newcommand{\inner}[2]{\langle #1, #2 \rangle}\] \[ \newcommand{\Span}{\mathrm{span}}\]

    1. Interrupting
    2. Eavesdropping
    3. Aggressive Listening
    4. Narcissistic Listening
    5. Defensive listening
    6. Selective listening
    7. Insensitive listening
    8. Pseudo-listening
    9. Key Takeaways
    10. Exercises
    11. References
    12. Contributors and Attributions

    The previously discussed barriers to effective listening may be difficult to overcome because they are at least partially beyond our control. Physical barriers, cognitive limitations, and perceptual biases exist within all of us, and it is more realistic to believe that we can become more conscious of and lessen them than it is to believe that we can eliminate them altogether. Other “bad listening” practices may be habitual, but they are easier to address with some concerted effort. These bad listening practices include interrupting, eavesdropping, aggressive listening, narcissistic listening, defensive listening, selective listening, insensitive listening, and pseudo-listening.

    Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy

    • Marcel Becker ORCID: orcid.org/0000-0003-2848-53051

    Ethics and Information Technology volume21,pages 307–317 [2019]Cite this article

    • 18k Accesses

    • 7 Citations

    • 9 Altmetric

    • Metrics details

    Video liên quan

    Bài mới nhất

    Chủ Đề