1.

Record Nr.

UNINA9910824289503321

Autore

Petronio Sandra Sporbert

Titolo

Boundaries of privacy : dialectics of disclosure / / Sandra Petronio

Pubbl/distr/stampa

Albany, : State University of New York Press, c2002

ISBN

0-7914-8785-7

0-585-49246-8

Edizione

[1st ed.]

Descrizione fisica

1 online resource (290 p.)

Collana

SUNY series in communication studies

Disciplina

302.5

Soggetti

Self-disclosure

Secrecy

Privacy

Interpersonal communication

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references (p. 227-256) and index.

Nota di contenuto

""Boundaries of Privacy""; ""Contents""; ""List of Illustrations""; ""Foreword""; ""Preface""; ""1. Overview of Communication Privacy Management""; ""THEORETICAL SUPPOSITIONS""; ""Supposition 1: Private Information""; ""Supposition 2: Privacy Boundaries""; ""Supposition 3: Control and Ownership""; ""Supposition 4: Rule-Based Management System""; ""Supposition 5: Privacy Management Dialectics""; ""PRIVACY RULE MANAGEMENT PROCESSES""; ""Management Process 1: Privacy Rule Foundations""; ""Management Process 2: Boundary Coordination Operations""; ""Management Process 3: Boundary Turbulence""

""ORGANIZATION OF THE BOOK""""2. Rule Management Process 1: Privacy Rule Foundations""; ""PRIVACY RULE DEVELOPMENT""; ""Privacy Rule Development: Cultural Criteria""; ""Privacy Rule Development: Gendered Criteria""; ""Privacy Rule Development: Motivational Criteria""; ""Privacy Rule Development: Contextual Criteria""; ""Privacy Rule Development: Risk-Benefit Ratio Criteria""; ""PRIVACY RULE ATTRIBUTES""; ""Rule Acquisition""; ""Rule Properties""; ""CONCLUSION""; ""3. Rule Management Process 2: Boundary Coordination Operations""; ""COORDINATION OPERATIONS""; ""Boundary Linkages""

""Boundary Permeability""""Boundary Ownership""; ""Boundary Co-Ownership: Private Disclosure Confidants""; ""CONCLUSION""; ""4. Cases



of Boundary Coordination""; ""COLLECTIVE COORDINATION PATTERNS""; ""Inclusive Boundary Coordination""; ""Intersected Boundary Coordination""; ""Unified Boundary Coordination""; ""DYADIC PRIVACY BOUNDARIES""; ""Relational Privacy Boundaries""; ""Marital and Significant Partner Privacy Boundaries""; ""FAMILY PRIVACY BOUNDARIES""; ""Boundary Spheres""; ""Family Privacy Rule Orientations""; ""GROUP PRIVACY BOUNDARIES""; ""Group Confidences""

""Reinforcing Group Boundaries""""ORGANIZATIONAL PRIVACY BOUNDARIES""; ""Superior-Subordinate Boundaries""; ""Vagueness as Privacy Protection""; ""Employee-Employer Privacy Rights""; ""CONCLUSION""; ""5. Rule Management Process 3: Boundary Turbulence""; ""TYPES OF BOUNDARY TURBULENCE""; ""Intentional Rule Violations""; ""Boundary Rule Mistakes""; ""Fuzzy Boundaries""; ""Dissimilar Boundary Orientation""; ""Boundary Definition Predicaments""; ""Privacy Dilemmas""; ""CONCLUSION""; ""6. Practices and Praxis of Communication Privacy Management""; ""APPLICATIONS OF CPM""; ""Medical Mistakes""

""Child Sexual Abuse""""HIV/AIDS""; ""CONCLUSION AND FUTURE ISSUES""; ""References""; ""Author Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""J""; ""K""; ""L""; ""M""; ""N""; ""O""; ""P""; ""R""; ""S""; ""T""; ""U""; ""V""; ""W""; ""Y""; ""Z""; ""Subject Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""L""; ""M""; ""N""; ""O""; ""P""; ""R""; ""S""; ""T""; ""U""; ""W""

Sommario/riassunto

Offering a practical theory for why people make decisions about revealing and concealing private information, Boundaries of Privacy taps into everyday problems in our personal relationships, our health concerns, and our work to investigate the way we manage our private lives. Petronio argues that in addition to owning our own private information, we also take on the responsibility of guarding other people's private information when it is put into our trust. This can often lead to betrayal, errors in judgment, deception, gossip, and privacy dilemmas. Petronio's book serves as a guide to understanding why certain decisions about privacy succeed while others fail.