Boundaries of Privacy

Boundaries of Privacy

by Sandra Petronio

NOOK Book(eBook)

Available on Compatible NOOK Devices and the free NOOK Apps.
Want a NOOK ? Explore Now


Boundaries of Privacy by Sandra Petronio

Offering a practical theory for why people make decisions about revealing and concealing private information, Boundaries of Privacy taps into everyday problems in our personal relationships, our health concerns, and our work to investigate the way we manage our private lives. Petronio argues that in addition to owning our own private information, we also take on the responsibility of guarding other people's private information when it is put into our trust. This can often lead to betrayal, errors in judgment, deception, gossip, and privacy dilemmas. Petronio's book serves as a guide to understanding why certain decisions about privacy succeed while others fail.

Product Details

ISBN-13: 9780791487853
Publisher: State University of New York Press
Publication date: 09/18/2009
Sold by: Barnes & Noble
Format: NOOK Book
File size: 1 MB

About the Author

Sandra Petronio is Professor in the Department of Communication and School of Medicine at Wayne State University. She is the editor of Balancing the Secrets of Private Disclosures.

Table of Contents

List of Illustrationsxi
1.Overview of Communication Privacy Management1
Theoretical Suppositions5
Supposition 1Private Information5
Supposition 2Privacy Boundaries6
Supposition 3Control and Ownership9
Supposition 4Rule-Based Management System10
Supposition 5Privacy Management Dialectics12
Privacy Rule Management Processes23
Management Process 1Privacy Rule Foundations23
Management Process 2Boundary Coordination Operations28
Management Process 3Boundary Turbulence33
Organization of the Book33
2.Rule Management Process 1: Privacy Rule Foundations37
Privacy Rule Development38
Privacy Rule Development: Cultural Criteria40
Privacy Rule Development: Gendered Criteria42
Privacy Rule Development: Motivational Criteria49
Privacy Rule Development: Contextual Criteria57
Privacy Rule Development: Risk-Benefit Ratio Criteria65
Privacy Rule Attributes71
Rule Acquisition72
Rule Properties79
3.Rule Management Process 2: Boundary Coordination Operations85
Coordination Operations88
Boundary Linkages88
Boundary Permeability99
Boundary Ownership105
Boundary Co-ownership: Private Disclosure Confidants109
4.Cases of Boundary Coordination127
Collective Coordination Patterns127
Inclusive Boundary Coordination127
Intersected Boundary Coordination132
Unified Boundary Coordination134
Dyadic Privacy Boundaries136
Relational Privacy Boundaries136
Marital and Significant Partner Privacy Boundaries142
Family Privacy Boundaries151
Boundary Spheres151
Family Privacy Rule Orientations156
Group Privacy Boundaries166
Group Confidences167
Reinforcing Group Boundaries169
Organizational Privacy Boundaries170
Superior-Subordinate Boundaries170
Vagueness as Privacy Protection171
Employee-Employer Privacy Rights172
5.Rule Management Process 3: Boundary Turbulence177
Types of Boundary Turbulence177
Intentional Rule Violations178
Boundary Rule Mistakes184
Fuzzy Boundaries190
Dissimilar Boundary Orientations194
Boundary Definition Predicaments195
Privacy Dilemmas199
6.Practices and Praxis of Communication Privacy Management205
Applications of CPM205
Medical Mistakes205
Child Sexual Abuse210
Conclusion and Future Issues224
Author Index257
Subject Index264

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews