LEADER 05402nam 2200709Ia 450 001 9910824289503321 005 20200520144314.0 010 $a0-7914-8785-7 010 $a0-585-49246-8 035 $a(CKB)111087027856364 035 $a(EBL)3408055 035 $a(SSID)ssj0000114120 035 $a(PQKBManifestationID)11140340 035 $a(PQKBTitleCode)TC0000114120 035 $a(PQKBWorkID)10101282 035 $a(PQKB)10502725 035 $a(MiAaPQ)EBC3408055 035 $a(OCoLC)54481653 035 $a(MdBmJHUP)muse5927 035 $a(Au-PeEL)EBL3408055 035 $a(CaPaEBR)ebr10587254 035 $a(DE-B1597)684493 035 $a(DE-B1597)9780791487853 035 $a(EXLCZ)99111087027856364 100 $a20020308d2002 ub 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBoundaries of privacy $edialectics of disclosure /$fSandra Petronio 205 $a1st ed. 210 $aAlbany $cState University of New York Press$dc2002 215 $a1 online resource (290 p.) 225 0$aSUNY series in communication studies 300 $aDescription based upon print version of record. 311 $a0-7914-5515-7 320 $aIncludes bibliographical references (p. 227-256) and index. 327 $a""Boundaries of Privacy""; ""Contents""; ""List of Illustrations""; ""Foreword""; ""Preface""; ""1. Overview of Communication Privacy Management""; ""THEORETICAL SUPPOSITIONS""; ""Supposition 1: Private Information""; ""Supposition 2: Privacy Boundaries""; ""Supposition 3: Control and Ownership""; ""Supposition 4: Rule-Based Management System""; ""Supposition 5: Privacy Management Dialectics""; ""PRIVACY RULE MANAGEMENT PROCESSES""; ""Management Process 1: Privacy Rule Foundations""; ""Management Process 2: Boundary Coordination Operations""; ""Management Process 3: Boundary Turbulence"" 327 $a""ORGANIZATION OF THE BOOK""""2. Rule Management Process 1: Privacy Rule Foundations""; ""PRIVACY RULE DEVELOPMENT""; ""Privacy Rule Development: Cultural Criteria""; ""Privacy Rule Development: Gendered Criteria""; ""Privacy Rule Development: Motivational Criteria""; ""Privacy Rule Development: Contextual Criteria""; ""Privacy Rule Development: Risk-Benefit Ratio Criteria""; ""PRIVACY RULE ATTRIBUTES""; ""Rule Acquisition""; ""Rule Properties""; ""CONCLUSION""; ""3. Rule Management Process 2: Boundary Coordination Operations""; ""COORDINATION OPERATIONS""; ""Boundary Linkages"" 327 $a""Boundary Permeability""""Boundary Ownership""; ""Boundary Co-Ownership: Private Disclosure Confidants""; ""CONCLUSION""; ""4. Cases of Boundary Coordination""; ""COLLECTIVE COORDINATION PATTERNS""; ""Inclusive Boundary Coordination""; ""Intersected Boundary Coordination""; ""Unified Boundary Coordination""; ""DYADIC PRIVACY BOUNDARIES""; ""Relational Privacy Boundaries""; ""Marital and Significant Partner Privacy Boundaries""; ""FAMILY PRIVACY BOUNDARIES""; ""Boundary Spheres""; ""Family Privacy Rule Orientations""; ""GROUP PRIVACY BOUNDARIES""; ""Group Confidences"" 327 $a""Reinforcing Group Boundaries""""ORGANIZATIONAL PRIVACY BOUNDARIES""; ""Superior-Subordinate Boundaries""; ""Vagueness as Privacy Protection""; ""Employee-Employer Privacy Rights""; ""CONCLUSION""; ""5. Rule Management Process 3: Boundary Turbulence""; ""TYPES OF BOUNDARY TURBULENCE""; ""Intentional Rule Violations""; ""Boundary Rule Mistakes""; ""Fuzzy Boundaries""; ""Dissimilar Boundary Orientation""; ""Boundary Definition Predicaments""; ""Privacy Dilemmas""; ""CONCLUSION""; ""6. Practices and Praxis of Communication Privacy Management""; ""APPLICATIONS OF CPM""; ""Medical Mistakes"" 327 $a""Child Sexual Abuse""""HIV/AIDS""; ""CONCLUSION AND FUTURE ISSUES""; ""References""; ""Author Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""J""; ""K""; ""L""; ""M""; ""N""; ""O""; ""P""; ""R""; ""S""; ""T""; ""U""; ""V""; ""W""; ""Y""; ""Z""; ""Subject Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""L""; ""M""; ""N""; ""O""; ""P""; ""R""; ""S""; ""T""; ""U""; ""W"" 330 $aOffering a practical theory for why people make decisions about revealing and concealing private information, Boundaries of Privacy taps into everyday problems in our personal relationships, our health concerns, and our work to investigate the way we manage our private lives. Petronio argues that in addition to owning our own private information, we also take on the responsibility of guarding other people's private information when it is put into our trust. This can often lead to betrayal, errors in judgment, deception, gossip, and privacy dilemmas. Petronio's book serves as a guide to understanding why certain decisions about privacy succeed while others fail. 410 0$aSUNY Series in Communication Studies 606 $aSelf-disclosure 606 $aSecrecy 606 $aPrivacy 606 $aInterpersonal communication 615 0$aSelf-disclosure. 615 0$aSecrecy. 615 0$aPrivacy. 615 0$aInterpersonal communication. 676 $a302.5 700 $aPetronio$b Sandra Sporbert$01604862 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910824289503321 996 $aBoundaries of privacy$93929843 997 $aUNINA