Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
7 Ergebnisse
Sortierung:
In: Routledge Communication Series
This book joins together disclosure, privacy, and secrecy to pursue a greater understanding of how people are both public and private in their interactions. To be social yet autonomous, known yet unknown, independent yet dependent on others is essential to the communicative world. How do people manage these seemingly incongruous goals? This book argues that they actively work at balancing simultaneous needs of being both public and private. It highlights many different ways that people balance their public needs with their privacy needs underscoring the multidimensional nature of balance. The
In: Journal of family theory & review: JFTR, Band 2, Heft 3, S. 175-196
ISSN: 1756-2589
For families, managing private information is challenging. Family members reveal too much, they allow more privacy access to outsiders than others desire, parents attempt to negotiate Internet disclosures with their teens, and family health issues often change the way private information is defined altogether. The complexities of privacy regulation call for a systematic way to grasp how privacy management operates in families. This article presents the evidenced‐based theory of communication privacy management (CPM) and corresponding research on family privacy regulation that provides a road map to understand the multifaceted nature of managing private information (Petronio, 2002). The article discusses contributions of CPM to conceptualizing privacy in meaningful ways, along with current research trends and future directions for CPM research and theorizing.
In: SUNY Series in Communication Studies
Intro -- Boundaries of Privacy -- Contents -- List of Illustrations -- Foreword -- Preface -- 1. Overview of Communication Privacy Management -- THEORETICAL SUPPOSITIONS -- Supposition 1: Private Information -- Supposition 2: Privacy Boundaries -- Supposition 3: Control and Ownership -- Supposition 4: Rule-Based Management System -- Supposition 5: Privacy Management Dialectics -- PRIVACY RULE MANAGEMENT PROCESSES -- Management Process 1: Privacy Rule Foundations -- Management Process 2: Boundary Coordination Operations -- Management Process 3: Boundary Turbulence -- ORGANIZATION OF THE BOOK -- 2. Rule Management Process 1: Privacy Rule Foundations -- PRIVACY RULE DEVELOPMENT -- Privacy Rule Development: Cultural Criteria -- Privacy Rule Development: Gendered Criteria -- Privacy Rule Development: Motivational Criteria -- Privacy Rule Development: Contextual Criteria -- Privacy Rule Development: Risk-Benefit Ratio Criteria -- PRIVACY RULE ATTRIBUTES -- Rule Acquisition -- Rule Properties -- CONCLUSION -- 3. Rule Management Process 2: Boundary Coordination Operations -- COORDINATION OPERATIONS -- Boundary Linkages -- Boundary Permeability -- Boundary Ownership -- Boundary Co-Ownership: Private Disclosure Confidants -- CONCLUSION -- 4. Cases of Boundary Coordination -- COLLECTIVE COORDINATION PATTERNS -- Inclusive Boundary Coordination -- Intersected Boundary Coordination -- Unified Boundary Coordination -- DYADIC PRIVACY BOUNDARIES -- Relational Privacy Boundaries -- Marital and Significant Partner Privacy Boundaries -- FAMILY PRIVACY BOUNDARIES -- Boundary Spheres -- Family Privacy Rule Orientations -- GROUP PRIVACY BOUNDARIES -- Group Confidences -- Reinforcing Group Boundaries -- ORGANIZATIONAL PRIVACY BOUNDARIES -- Superior-Subordinate Boundaries -- Vagueness as Privacy Protection -- Employee-Employer Privacy Rights -- CONCLUSION.
In: Communication research, Band 25, Heft 6, S. 571-595
ISSN: 1552-3810
The metaphor of boundary is ubiquitous and has guided much research on interpersonal and intergroup communication. This article explores the metaphor by reviewing the literature on boundaries with a focus on miscommunication and problematic talk. In particular, the tensions around privacy and self-disclosure, and rules about family communication are good examples of communication and miscommunication across interpersonal boundaries. In the intergroup arena, the negotiation of boundaries implicates the sociostructural relations between groups and the choices individuals make based on the identities that are salient to them in a given context. We argue that miscommunication can best be conceived of as indicator of tension in negotiating boundaries as they emerge and change in interaction.