In this Book

buy this book Buy This Book in Print
summary
Offering a practical theory for why people make decisions about revealing and concealing private information, Boundaries of Privacy taps into everyday problems in our personal relationships, our health concerns, and our work to investigate the way we manage our private lives. Petronio argues that in addition to owning our own private information, we also take on the responsibility of guarding other people’s private information when it is put into our trust. This can often lead to betrayal, errors in judgment, deception, gossip, and privacy dilemmas. Petronio’s book serves as a guide to understanding why certain decisions about privacy succeed while others fail.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page
  2. restricted access
    • Download PDF Download
  1. Copyright
  2. restricted access
    • Download PDF Download
  1. Contents
  2. pp. vii-ix
  3. restricted access
    • Download PDF Download
  1. List of Illustrations
  2. p. xi
  3. restricted access
    • Download PDF Download
  1. Foreword
  2. pp. xiii-17
  3. restricted access
    • Download PDF Download
  1. Preface
  2. pp. xvii-xix
  3. restricted access
    • Download PDF Download
  1. 1. Overview of Communication Privacy Management
  2. pp. 1-36
  3. restricted access
    • Download PDF Download
  1. 2. Rule Management Process 1: Privacy Rule Foundations
  2. pp. 37-84
  3. restricted access
    • Download PDF Download
  1. 3. Rule Management Process 2: Boundary Coordination Operations
  2. pp. 85-126
  3. restricted access
    • Download PDF Download
  1. 4. Cases of Boundary Coordination
  2. pp. 127-176
  3. restricted access
    • Download PDF Download
  1. 5. Rule Management Process 3: Boundary Turbulence
  2. pp. 177-204
  3. restricted access
    • Download PDF Download
  1. 6. Practices and Praxis of Communication Privacy Management
  2. pp. 205-226
  3. restricted access
    • Download PDF Download
  1. References
  2. pp. 227-256
  3. restricted access
    • Download PDF Download
  1. Author Index
  2. pp. 257-263
  3. restricted access
    • Download PDF Download
  1. Subject Index
  2. pp. 264-268
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.