Coverart for item
The Resource Boundaries of privacy : dialectics of disclosure, Sandra Petronio

Boundaries of privacy : dialectics of disclosure, Sandra Petronio

Label
Boundaries of privacy : dialectics of disclosure
Title
Boundaries of privacy
Title remainder
dialectics of disclosure
Statement of responsibility
Sandra Petronio
Creator
Subject
Language
eng
Summary
Offering a practical theory for why people make decisions about revealing and concealing private information. Boundaries of Privacy taps into everyday problems in our personal relationships, our health concerns, and our work to investigate the way we manage our private lives. Petronio argues that in addition to owning our own private information, we also take on the responsibility of guarding other people's private information when it is put into our trust. This can often lead to betrayal, errors in judgment, deception, gossip, and privacy dilemmas. Petronio's book serves as a guide to understanding why certain decisions about privacy succeed while others fail
Member of
Cataloging source
DLC
http://library.link/vocab/creatorName
Petronio, Sandra Sporbert
Government publication
government publication of a state province territory dependency etc
Illustrations
illustrations
Index
index present
LC call number
BF697.5.S427
LC item number
P48 2002
Literary form
non fiction
Nature of contents
bibliography
Series statement
SUNY series in communication studies
http://library.link/vocab/subjectName
  • Self-disclosure
  • Secrecy
  • Privacy
  • Interpersonal communication
Label
Boundaries of privacy : dialectics of disclosure, Sandra Petronio
Instantiates
Publication
Copyright
Bibliography note
Includes bibliographical references (pages 227-256) and indexes
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Supposition 2.
  • Vagueness as Privacy Protection
  • p. 171.
  • Employee-Employer Privacy Rights
  • p. 172.
  • 5.
  • Rule Management Process 3: Boundary Turbulence
  • p. 177.
  • Types of Boundary Turbulence
  • p. 177.
  • Intentional Rule Violations
  • Privacy Boundaries
  • p. 178.
  • Boundary Rule Mistakes
  • p. 184.
  • Fuzzy Boundaries
  • p. 190.
  • Dissimilar Boundary Orientations
  • p. 194.
  • Boundary Definition Predicaments
  • p. 195.
  • Privacy Dilemmas
  • p. 6.
  • p. 199.
  • 6.
  • Practices and Praxis of Communication Privacy Management
  • p. 205.
  • Applications of CPM
  • p. 205.
  • Medical Mistakes
  • p. 205.
  • Child Sexual Abuse
  • p. 210.
  • Supposition 3.
  • HIV/AIDS
  • p. 217
  • Control and Ownership
  • p. 9.
  • Supposition 4.
  • Rule-Based Management System
  • p. 10.
  • Supposition 5.
  • 1.
  • Privacy Management Dialectics
  • p. 12.
  • Privacy Rule Management Processes
  • p. 23.
  • Management Process 1.
  • Privacy Rule Foundations
  • p. 23.
  • Management Process 2.
  • Boundary Coordination Operations
  • p. 28.
  • Overview of Communication Privacy Management
  • Management Process 3.
  • Boundary Turbulence
  • p. 33.
  • 2.
  • Rule Management Process 1: Privacy Rule Foundations
  • p. 37.
  • Privacy Rule Development
  • p. 38.
  • Privacy Rule Development: Cultural Criteria
  • p. 40.
  • p. 1.
  • Privacy Rule Development: Gendered Criteria
  • p. 42.
  • Privacy Rule Development: Motivational Criteria
  • p. 49.
  • Privacy Rule Development: Contextual Criteria
  • p. 57.
  • Privacy Rule Development: Risk-Benefit Ratio Criteria
  • p. 65.
  • Privacy Rule Attributes
  • p. 71.
  • Theoretical Suppositions
  • Rule Acquisition
  • p. 72.
  • Rule Properties
  • p. 79.
  • 3.
  • Rule Management Process 2: Boundary Coordination Operations
  • p. 85.
  • Coordination Operations
  • p. 88.
  • Boundary Linkages
  • p. 5.
  • p. 88.
  • Boundary Permeability
  • p. 99.
  • Boundary Ownership
  • p. 105.
  • Boundary Co-ownership: Private Disclosure Confidants
  • p. 109.
  • 4.
  • Cases of Boundary Coordination
  • p. 127.
  • Supposition 1.
  • Collective Coordination Patterns
  • p. 127.
  • Inclusive Boundary Coordination
  • p. 127.
  • Intersected Boundary Coordination
  • p. 132.
  • Unified Boundary Coordination
  • p. 134.
  • Dyadic Privacy Boundaries
  • p. 136.
  • Private Information
  • Relational Privacy Boundaries
  • p. 136.
  • Marital and Significant Partner Privacy Boundaries
  • p. 142.
  • Family Privacy Boundaries
  • p. 151.
  • Boundary Spheres
  • p. 151.
  • Family Privacy Rule Orientations
  • p. 156.
  • p. 5.
  • Group Privacy Boundaries
  • p. 166.
  • Group Confidences
  • p. 167.
  • Reinforcing Group Boundaries
  • p. 169.
  • Organizational Privacy Boundaries
  • p. 170.
  • Superior-Subordinate Boundaries
  • p. 170.
Control code
49529880
Dimensions
24 cm
Extent
xix, 268 pages
Isbn
9780791455166
Isbn Type
(pbk. : alk. paper)
Lccn
2002021055
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Label
Boundaries of privacy : dialectics of disclosure, Sandra Petronio
Publication
Copyright
Bibliography note
Includes bibliographical references (pages 227-256) and indexes
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Supposition 2.
  • Vagueness as Privacy Protection
  • p. 171.
  • Employee-Employer Privacy Rights
  • p. 172.
  • 5.
  • Rule Management Process 3: Boundary Turbulence
  • p. 177.
  • Types of Boundary Turbulence
  • p. 177.
  • Intentional Rule Violations
  • Privacy Boundaries
  • p. 178.
  • Boundary Rule Mistakes
  • p. 184.
  • Fuzzy Boundaries
  • p. 190.
  • Dissimilar Boundary Orientations
  • p. 194.
  • Boundary Definition Predicaments
  • p. 195.
  • Privacy Dilemmas
  • p. 6.
  • p. 199.
  • 6.
  • Practices and Praxis of Communication Privacy Management
  • p. 205.
  • Applications of CPM
  • p. 205.
  • Medical Mistakes
  • p. 205.
  • Child Sexual Abuse
  • p. 210.
  • Supposition 3.
  • HIV/AIDS
  • p. 217
  • Control and Ownership
  • p. 9.
  • Supposition 4.
  • Rule-Based Management System
  • p. 10.
  • Supposition 5.
  • 1.
  • Privacy Management Dialectics
  • p. 12.
  • Privacy Rule Management Processes
  • p. 23.
  • Management Process 1.
  • Privacy Rule Foundations
  • p. 23.
  • Management Process 2.
  • Boundary Coordination Operations
  • p. 28.
  • Overview of Communication Privacy Management
  • Management Process 3.
  • Boundary Turbulence
  • p. 33.
  • 2.
  • Rule Management Process 1: Privacy Rule Foundations
  • p. 37.
  • Privacy Rule Development
  • p. 38.
  • Privacy Rule Development: Cultural Criteria
  • p. 40.
  • p. 1.
  • Privacy Rule Development: Gendered Criteria
  • p. 42.
  • Privacy Rule Development: Motivational Criteria
  • p. 49.
  • Privacy Rule Development: Contextual Criteria
  • p. 57.
  • Privacy Rule Development: Risk-Benefit Ratio Criteria
  • p. 65.
  • Privacy Rule Attributes
  • p. 71.
  • Theoretical Suppositions
  • Rule Acquisition
  • p. 72.
  • Rule Properties
  • p. 79.
  • 3.
  • Rule Management Process 2: Boundary Coordination Operations
  • p. 85.
  • Coordination Operations
  • p. 88.
  • Boundary Linkages
  • p. 5.
  • p. 88.
  • Boundary Permeability
  • p. 99.
  • Boundary Ownership
  • p. 105.
  • Boundary Co-ownership: Private Disclosure Confidants
  • p. 109.
  • 4.
  • Cases of Boundary Coordination
  • p. 127.
  • Supposition 1.
  • Collective Coordination Patterns
  • p. 127.
  • Inclusive Boundary Coordination
  • p. 127.
  • Intersected Boundary Coordination
  • p. 132.
  • Unified Boundary Coordination
  • p. 134.
  • Dyadic Privacy Boundaries
  • p. 136.
  • Private Information
  • Relational Privacy Boundaries
  • p. 136.
  • Marital and Significant Partner Privacy Boundaries
  • p. 142.
  • Family Privacy Boundaries
  • p. 151.
  • Boundary Spheres
  • p. 151.
  • Family Privacy Rule Orientations
  • p. 156.
  • p. 5.
  • Group Privacy Boundaries
  • p. 166.
  • Group Confidences
  • p. 167.
  • Reinforcing Group Boundaries
  • p. 169.
  • Organizational Privacy Boundaries
  • p. 170.
  • Superior-Subordinate Boundaries
  • p. 170.
Control code
49529880
Dimensions
24 cm
Extent
xix, 268 pages
Isbn
9780791455166
Isbn Type
(pbk. : alk. paper)
Lccn
2002021055
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations

Library Locations

    • Pardee Legal Research CenterBorrow it
      5998 Alcalá Park, San Diego, CA, 92110-2492, US
      32.771471 -117.187496
Processing Feedback ...