1 option
Boundaries of privacy : dialectics of disclosure / Sandra Petronio.
Van Pelt Library BF697.5.S427 P48 2002
Available
- Format:
- Book
- Author/Creator:
- Petronio, Sandra Sporbert.
- Series:
- SUNY series in communication studies
- Language:
- English
- Subjects (All):
- Self-disclosure.
- Secrecy.
- Privacy.
- Interpersonal communication.
- Physical Description:
- xix, 268 pages : illustrations ; 23 cm.
- Place of Publication:
- Albany : State University of New York Press, [2002]
- Summary:
- Offering a practical theory for why people make decisions about revealing and concealing private information. Boundaries of Privacy taps into everyday problems in our personal relationships, our health concerns, and our work to investigate the way we manage our private lives. Petronio argues that in addition to owning our own private information, we also take on the responsibility of guarding other people's private information when it is put into our trust. This can often lead to betrayal, errors in judgment, deception, gossip, and privacy dilemmas. Petronio's book serves as a guide to understanding why certain decisions about privacy succeed while others fail.
- Contents:
- 1. Overview of Communication Privacy Management 1
- Theoretical Suppositions 5
- Supposition 1 Private Information 5
- Supposition 2 Privacy Boundaries 6
- Supposition 3 Control and Ownership 9
- Supposition 4 Rule-Based Management System 10
- Supposition 5 Privacy Management Dialectics 12
- Privacy Rule Management Processes 23
- Management Process 1 Privacy Rule Foundations 23
- Management Process 2 Boundary Coordination Operations 28
- Management Process 3 Boundary Turbulence 33
- 2. Rule Management Process 1: Privacy Rule Foundations 37
- Privacy Rule Development 38
- Privacy Rule Development: Cultural Criteria 40
- Privacy Rule Development: Gendered Criteria 42
- Privacy Rule Development: Motivational Criteria 49
- Privacy Rule Development: Contextual Criteria 57
- Privacy Rule Development: Risk-Benefit Ratio Criteria 65
- Privacy Rule Attributes 71
- Rule Acquisition 72
- Rule Properties 79
- 3. Rule Management Process 2: Boundary Coordination Operations 85
- Coordination Operations 88
- Boundary Linkages 88
- Boundary Permeability 99
- Boundary Ownership 105
- Boundary Co-ownership: Private Disclosure Confidants 109
- 4. Cases of Boundary Coordination 127
- Collective Coordination Patterns 127
- Inclusive Boundary Coordination 127
- Intersected Boundary Coordination 132
- Unified Boundary Coordination 134
- Dyadic Privacy Boundaries 136
- Relational Privacy Boundaries 136
- Marital and Significant Partner Privacy Boundaries 142
- Family Privacy Boundaries 151
- Boundary Spheres 151
- Family Privacy Rule Orientations 156
- Group Privacy Boundaries 166
- Group Confidences 167
- Reinforcing Group Boundaries 169
- Organizational Privacy Boundaries 170
- Superior-Subordinate Boundaries 170
- Vagueness as Privacy Protection 171
- Employee-Employer Privacy Rights 172
- 5. Rule Management Process 3: Boundary Turbulence 177
- Types of Boundary Turbulence 177
- Intentional Rule Violations 178
- Boundary Rule Mistakes 184
- Fuzzy Boundaries 190
- Dissimilar Boundary Orientations 194
- Boundary Definition Predicaments 195
- Privacy Dilemmas 199
- 6. Practices and Praxis of Communication Privacy Management 205
- Applications of CPM 205
- Medical Mistakes 205
- Child Sexual Abuse 210
- HIV/AIDS 217.
- Notes:
- Includes bibliographical references (pages 227-256) and indexes.
- ISBN:
- 0791455157
- 0791455165
- OCLC:
- 49529880
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.