Cover

pdf iconDownload PDF
 

Title Page

pdf iconDownload PDF
 

Copyright

pdf iconDownload PDF
 

Contents

pdf iconDownload PDF

pp. vii-ix

List of Illustrations

pdf iconDownload PDF

p. xi

read more

Foreword

pdf iconDownload PDF

pp. xiii-17

... this foreword to Sandra Petronio’s book shortly after the terrorist attacks on September 11, 2001, when thousands of Americans and foreigners died, an estimated 10,000 children lost a parent, and thousands of family members and friends became living victims of that nightmarish day. All of our lives are now changed forever, it is said, as we in America and, ...

read more

Preface

pdf iconDownload PDF

pp. xvii-xix

... book presents the theory of Communication Privacy Management (CPM) to study private disclosures. CPM is considered a practical theory and is designed to provide an explanation for communicative issues about privacy that individuals face in the everyday world. The development of this theory has taken approximately 20 years. At this writing, the theory ...

read more

1. Overview of Communication Privacy Management

pdf iconDownload PDF

pp. 1-36

... disclosures epitomize the paradox of managing a public persona while maintaining the dignity of one’s private life (Westin, 1970). Talking about our private feelings in public is not always easy. In fact, it is often risky because we might feel embarrassed, uncomfortable, or somehow exposed. For instance, a friend of mine recently went to the doctor complaining ...

read more

2. Rule Management Process 1: Privacy Rule Foundations

pdf iconDownload PDF

pp. 37-84

... presented an overview of Communication Privacy Management, highlighting the fact that this theory depends on a rule-based management system. Thus, although boundaries provide a metaphorical structure, rules make the management process work. Accordingly, it is useful to examine the basis upon which rules are generated, developed, and the way they function to accomplish privacy management. ...

read more

3. Rule Management Process 2: Boundary Coordination Operations

pdf iconDownload PDF

pp. 85-126

... theory of Communication Privacy Management is about communicative interactions specific to private information. As such, communication to others or protection from others of private information plays a significant role. Thus, when people weigh whether to reveal or conceal private information, they often consider their knowledge about possible confidants. Because ...

read more

4. Cases of Boundary Coordination

pdf iconDownload PDF

pp. 127-176

... discussed in chapter 3, there are both personal and collective boundaries involved in managing private information. However, when we examine collective boundaries there are specific issues that help define coordination on the collective level. This chapter first considers the patterns that emerge when people are seeking boundary coordination. The ...

read more

5. Rule Management Process 3: Boundary Turbulence

pdf iconDownload PDF

pp. 177-204

... to the complexity of boundary coordination, sometimes the process fails. When coordination becomes asynchronous, turbulence erupts, disturbing the harmony of boundary management of private information. When people are unable to collectively develop, execute, or enact rules guiding permeability, ownership, and linkages, the coordinating ...

read more

6. Practices and Praxis of Communication Privacy Management

pdf iconDownload PDF

pp. 205-226

... are useful if they explain phenomena in the everyday world. Over the last few years, a number of scholars have employed Communication Privacy Management Theory in a variety of private disclosure cases. The beneficial nature of this theory is witnessed in the explanatory strength it provides these explorations. In essence, CPM is a practical theory ...

References

pdf iconDownload PDF

pp. 227-256

Author Index

pdf iconDownload PDF

pp. 257-263

Subject Index

pdf iconDownload PDF

pp. 264-268