1.

Record Nr.

UNINA9910456195203321

Autore

Petronio Sandra Sporbert

Titolo

Boundaries of privacy [[electronic resource] ] : dialectics of disclosure / / Sandra Petronio

Pubbl/distr/stampa

Albany, : State University of New York Press, c2002

ISBN

0-7914-8785-7

0-585-49246-8

Descrizione fisica

1 online resource (290 p.)

Collana

SUNY series in communication studies

Disciplina

302.5

Soggetti

Self-disclosure

Secrecy

Privacy

Interpersonal communication

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references (p. 227-256) and index.

Nota di contenuto

""Boundaries of Privacy""; ""Contents""; ""List of Illustrations""; ""Foreword""; ""Preface""; ""1. Overview of Communication Privacy Management""; ""THEORETICAL SUPPOSITIONS""; ""Supposition 1: Private Information""; ""Supposition 2: Privacy Boundaries""; ""Supposition 3: Control and Ownership""; ""Supposition 4: Rule-Based Management System""; ""Supposition 5: Privacy Management Dialectics""; ""PRIVACY RULE MANAGEMENT PROCESSES""; ""Management Process 1: Privacy Rule Foundations""; ""Management Process 2: Boundary Coordination Operations""; ""Management Process 3: Boundary Turbulence""

""ORGANIZATION OF THE BOOK""""2. Rule Management Process 1: Privacy Rule Foundations""; ""PRIVACY RULE DEVELOPMENT""; ""Privacy Rule Development: Cultural Criteria""; ""Privacy Rule Development: Gendered Criteria""; ""Privacy Rule Development: Motivational Criteria""; ""Privacy Rule Development: Contextual Criteria""; ""Privacy Rule Development: Risk-Benefit Ratio Criteria""; ""PRIVACY RULE ATTRIBUTES""; ""Rule Acquisition""; ""Rule Properties""; ""CONCLUSION""; ""3. Rule Management Process 2: Boundary Coordination Operations""; ""COORDINATION OPERATIONS""; ""Boundary Linkages""



""Boundary Permeability""""Boundary Ownership""; ""Boundary Co-Ownership: Private Disclosure Confidants""; ""CONCLUSION""; ""4. Cases of Boundary Coordination""; ""COLLECTIVE COORDINATION PATTERNS""; ""Inclusive Boundary Coordination""; ""Intersected Boundary Coordination""; ""Unified Boundary Coordination""; ""DYADIC PRIVACY BOUNDARIES""; ""Relational Privacy Boundaries""; ""Marital and Significant Partner Privacy Boundaries""; ""FAMILY PRIVACY BOUNDARIES""; ""Boundary Spheres""; ""Family Privacy Rule Orientations""; ""GROUP PRIVACY BOUNDARIES""; ""Group Confidences""

""Reinforcing Group Boundaries""""ORGANIZATIONAL PRIVACY BOUNDARIES""; ""Superior-Subordinate Boundaries""; ""Vagueness as Privacy Protection""; ""Employee-Employer Privacy Rights""; ""CONCLUSION""; ""5. Rule Management Process 3: Boundary Turbulence""; ""TYPES OF BOUNDARY TURBULENCE""; ""Intentional Rule Violations""; ""Boundary Rule Mistakes""; ""Fuzzy Boundaries""; ""Dissimilar Boundary Orientation""; ""Boundary Definition Predicaments""; ""Privacy Dilemmas""; ""CONCLUSION""; ""6. Practices and Praxis of Communication Privacy Management""; ""APPLICATIONS OF CPM""; ""Medical Mistakes""

""Child Sexual Abuse""""HIV/AIDS""; ""CONCLUSION AND FUTURE ISSUES""; ""References""; ""Author Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""J""; ""K""; ""L""; ""M""; ""N""; ""O""; ""P""; ""R""; ""S""; ""T""; ""U""; ""V""; ""W""; ""Y""; ""Z""; ""Subject Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""L""; ""M""; ""N""; ""O""; ""P""; ""R""; ""S""; ""T""; ""U""; ""W""