Boundaries of Privacy
Dialectics of Disclosure
Publication Year: 2002
Published by: State University of New York Press
Download PDF (103.3 KB)
List of Illustrations
Download PDF (90.4 KB)
Download PDF (106.9 KB)
... this foreword to Sandra Petronio’s book shortly after the terrorist attacks on September 11, 2001, when thousands of Americans and foreigners died, an estimated 10,000 children lost a parent, and thousands of family members and friends became living victims of that nightmarish day. All of our lives are now changed forever, it is said, as we in America and, ...
Download PDF (106.7 KB)
... book presents the theory of Communication Privacy Management (CPM) to study private disclosures. CPM is considered a practical theory and is designed to provide an explanation for communicative issues about privacy that individuals face in the everyday world. The development of this theory has taken approximately 20 years. At this writing, the theory ...
1. Overview of Communication Privacy Management
Download PDF (713.8 KB)
... disclosures epitomize the paradox of managing a public persona while maintaining the dignity of one’s private life (Westin, 1970). Talking about our private feelings in public is not always easy. In fact, it is often risky because we might feel embarrassed, uncomfortable, or somehow exposed. For instance, a friend of mine recently went to the doctor complaining ...
2. Rule Management Process 1: Privacy Rule Foundations
Download PDF (277.6 KB)
... presented an overview of Communication Privacy Management, highlighting the fact that this theory depends on a rule-based management system. Thus, although boundaries provide a metaphorical structure, rules make the management process work. Accordingly, it is useful to examine the basis upon which rules are generated, developed, and the way they function to accomplish privacy management. ...
3. Rule Management Process 2: Boundary Coordination Operations
Download PDF (535.5 KB)
... theory of Communication Privacy Management is about communicative interactions specific to private information. As such, communication to others or protection from others of private information plays a significant role. Thus, when people weigh whether to reveal or conceal private information, they often consider their knowledge about possible confidants. Because ...
4. Cases of Boundary Coordination
Download PDF (875.8 KB)
... discussed in chapter 3, there are both personal and collective boundaries involved in managing private information. However, when we examine collective boundaries there are specific issues that help define coordination on the collective level. This chapter first considers the patterns that emerge when people are seeking boundary coordination. The ...
5. Rule Management Process 3: Boundary Turbulence
Download PDF (260.7 KB)
... to the complexity of boundary coordination, sometimes the process fails. When coordination becomes asynchronous, turbulence erupts, disturbing the harmony of boundary management of private information. When people are unable to collectively develop, execute, or enact rules guiding permeability, ownership, and linkages, the coordinating ...
6. Practices and Praxis of Communication Privacy Management
Download PDF (147.7 KB)
... are useful if they explain phenomena in the everyday world. Over the last few years, a number of scholars have employed Communication Privacy Management Theory in a variety of private disclosure cases. The beneficial nature of this theory is witnessed in the explanatory strength it provides these explorations. In essence, CPM is a practical theory ...
Download PDF (174.9 KB)
Download PDF (110.2 KB)
Download PDF (832.6 KB)
Page Count: 268
Illustrations: 15 figures
Publication Year: 2002
Series Title: SUNY series in Communication Studies