29
Views
0
CrossRef citations to date
0
Altmetric
Research Article

How individuals discover and respond to putative secrets in the family

References

  • Afifi, W. A., & Caughlin, J. P. (2006). A close look at revealing secrets and some consequences that follow. Communication Research, 33(6), 467–488. https://doi.org/10.1177/0093650206293250
  • Afifi, T. D., Caughlin, J., & Afifi, W. A. (2007). The dark side (and light side) of avoidance andsecrets. In B. H. Spitzberg & W. R. Cupach (Eds.), The dark side of interpersonal communication (2nd ed. pp. 61–92). c.
  • Afifi, T. D., Olson, L. N., & Armstrong, C. (2005). The chilling effect and family secrets: Examining the role of self protection, other protection, and communication efficacy. Human Communication Research, 31(4), 564–598. https://doi.org/10.1111/j.1468-2958.2005.tb00883.x
  • Aldeis, D., & Afifi, T. D. (2013). College students’ willingness to reveal risky behaviors: The influence of relationship and message type. Journal of Family Communication, 13(2), 92–113. https://doi.org/10.1080/15267431.2013.768246
  • Aldeis, D., & Afifi, T. D. (2015). Putative secrets and conflict in romantic relationships over time. Communication Monographs, 82(2), 224–251. https://doi.org/10.1080/03637751.2014.986747
  • Aruguete, M. S., Huynh, H., Browne, B. L., Jurs, B., Flint, E., & McCutcheon, L. E. (2019). How serious is the ‘carelessness problem’ on mechanical turk? International Journal of Social Research Methodology, 22(5), 441–449. https://doi.org/10.1080/13645579.2018.1563966
  • Baxter, L. A., & Wilmot, W. W. (1985). Taboo topics in close relationships. Journal of Social and Personal Relationships, 2(3), 253–269. https://doi.org/10.1177/0265407585023002
  • Benoit, W. L., & Holbert, R. L. (2008). Empirical intersections in communication research: Replication, multiple quantitative methods, and bridging the quantitative-qualitative divide. Journal of Communication, 58(4), 615–628. https://doi.org/10.1111/j.1460-2466.2008.00404.x
  • Bochner, A. P. (1982). On the efficacy of openness in close relationships. In M. Burgoon (Ed.), Communication yearbook 6 (pp. 109–123). Sage.
  • Bok, S. (1983). The limits of confidentiality. The Hastings Center Report, 13(1), 24–31. https://doi.org/10.2307/3561549
  • Cahn, D. D., & Abigail, R. A. (2014). Managing conflict through communication. Pearson.
  • Caughlin, J. P., Afifi, W. A., Carpenter-Theune, K. E., & Miller, L. E. (2005). Reasons for, and consequences of, revealing personal secrets in close relationships: A longitudinal study. Personal Relationships, 12(1), 43–59. https://doi.org/10.1111/j.1350-4126.2005.00101.x
  • Caughlin, J. P., Golish, T. D., Olson, L. N., Sargent, J. E., Cook, J. S., & Petronio, S. (2000). Intrafamily secrets in various family configurations: A communication boundary management perspective. Communication Studies, 51(2), 116–134. https://doi.org/10.1080/10510970009388513
  • Caughlin, J. P., Petronio, S., & Middleton, A. V. (2012). When families manage private information. In A. L. Vangelisti (Ed.), The Routledge handbook of family communication (2nd ed. pp. 321–337). Routledge.
  • Caughlin, J. P., Scott, A. M., Miller, L. E., & Hefner, V. (2009). Putative secrets: When information is supposedly a secret. Journal of Social and Personal Relationships, 26(5), 713–743. https://doi.org/10.1177/0265407509347928
  • Colaner, C. W., Bish, A. L., Butauski, M., Hays, A., Kranstueber Horstman, H., & Nelson, L. (2022). Communication privacy management in open adoption relationships: Negotiating co-ownership across in-person and mediated communication. Communication Research, 49(6), 816–837. https://doi.org/10.1177/0093650221998474
  • Corbin, J., & Strauss, A. (2008). Basics of qualitative research: Techniques and procedures for developing grounded theory (3rd ed.). Sage.
  • Dillow, M. R., & LaBelle, S. (2014). Discussions of sexual health testing. Applying the Theory Ofmotivated Information Management.Personal Relationships, 21, 676–691. https://doi.org/10.1111/pere.12057
  • Duncan, D. F. (1996). Growing up under the gun: Children and adolescents coping with violent neighborhoods. Journal of Primary Prevention, 16(1), 343–356. https://doi.org/10.1007/bf02411740
  • Elo, S., & Kyngas, H. (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107–115. https://doi.org/10.1111/j.1365-2648.2007.04569.x
  • Goldsmith, D. J., Miller, L. E., & Caughlin, J. P. (2007). Openness and avoidance in couples communicating about cancer. Communication Yearbook, 31(1), 62–115. https://doi.org/10.1080/23808985.2007.11679065
  • Golish, T. D. (2003). Stepfamily communication strengths: Understanding the ties that bind. Human Communication Research, 29(1), 41–80. https://doi.org/10.1093/hcr/29.1.41
  • Golish, T. D., & Caughlin, J. (2002). “I’d rather not talk about it”: Adolescents’ and young adults’ use of topic avoidance in stepfamilies. Journal of Applied Communication Research, 30(1), 78–106. https://doi.org/10.1080/00909880216574
  • Hancock, G. R., & An, J. (2020). A closed-form alternative for estimating ω reliability underunidimensionality. Measurement: Interdisciplinary Research and Perspectives, 18(1), 1–14. https://doi.org/10.1080/15366367.2019.1656049
  • Harwood, J., Soliz, J., & Lin, M.-C. (2006). Communication accommodation theory: An intergroup approach to family relationships. In D. O. Braithwaite & L. Baxter (Eds.), Engaging theories in family communication: Multiple perspectives (pp. 19–34). Sage.
  • Hayes, A. F., & Krippendorff, K. (2007). Answering the call for a standard reliability measure for coding data. Communication Methods and Measures, 1(1), 77–89. https://doi.org/10.1080/19312450709336664
  • Huston, T. L., McHale, S. M., & Crouter, A. C. (1986). When the homeymoon’s over: Changes in the marital relationship over the first year. In R. Gilmour & S. Duck (Eds.), The emerging field of personal relationships (pp. 109–132). Erlbaum.
  • Jung, E., & Hecht, M. L. (2004). Elaborating the communication theory of identity: Identity gaps and communication outcomes. Communication Quarterly, 52(3), 265–283. https://doi.org/10.1080/01463370409370197
  • Keijsers, L., Branje, S. J. T., Frijns, T., Finkenauer, C., & Meeus, W. (2010). Gender differences in keeping secrets from parents in adolescence. Developmental Psychology, 46(1), 293–298. https://doi.org/10.1037/a0018115
  • Krippendorff, K. (1970). Estimating the reliability, systematic error and random error of the interval data. Educational and Psychological Measurement, 30(1), 61–70. https://doi.org/10.1177/001316447003000105
  • Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42. https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
  • McDonald, R. P. (1999). Test theory: A unified treatment. Erlbaum. https://doi.org/10.1080/03637751.2012.723809
  • O’Hari, D., & Cody, M. J. (1994). Deception. In W. R. Cupach & B. H. Spitzberg (Eds.), The dark side of interpersonal communication (pp. 181–214). Earlbaum.
  • Ow, R., & Katz, D. (1999). Family secrets and the disclosure of distressful information in Chinese families. Families in Society, 80(6), 620–628. https://doi.org/10.1606/1044-3894.1783
  • Parks, M. R. (1982). Ideology in interpersonal communication: Off the couch and into the world. In M. Burgoon (Ed.), Communication yearbook 6 (pp. 79–107). Sage.
  • Pennebaker, J. W. (1993). Putting stress into words: Health, linguistic, and therapeutic implications. Behavior Research and Therapy, 31(6), 539–548. https://doi.org/10.1016/0005-7967(93)90105-4
  • Petrie, K. J., Booth, R. J., & Pennebaker, J. W. (1998). The immunological effects of thought suppression. Journal of Personality and Social Psychology, 75(5), 1264–1272. https://doi.org/10.1037/0022-3514.75.5.1264
  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. State University of New York Press.
  • Petronio, S., & Caughlin, J. P. (2006). Communication privacy management theory: Understanding families. In D. O. Braithewaite & L. Baxter (Eds.), Engaging theories in family communication: Multiple perspectives (pp. 35–49). Sage.
  • Petronio, S., Jones, S., & Morr, M. C. (2003). Family privacy dilemmas: Managing communication boundaries within family groups. In L. Frey (Ed.), Group communication in context: Studies of bona fide groups (pp. 23–56). Erlbaum.
  • Petronio, S., & Reierson, J. (2009). Regulating the privacy of confidentiality: Grasping the complexities through CPM theory. In T. Afifi & W. Afifi (Eds.), Uncertainty and information regulation in interpersonal contexts: Theories and applications (pp. 365–383). Routledge.
  • Robins, L. N., & Tomanec, M. (1962). Closeness to blood relatives outside the immediate family. Marriage and Family Living, 24(4), 340–346. https://doi.org/10.2307/349103
  • Schrimshaw, E. W., & Siegel, K. (2002). HIV-infected mothers’ disclosure to their uninfected children: Rates, reasons, and reactions. Journal of Social and Personal Relationships, 19(1), 19–43. https://doi.org/10.1177/0265407502191002
  • Tracy, S. J. (2010). Qualitative quality: Eight “big-tent” criteria for excellent qualitative research. Qualitative Inquiry, 16(10), 837–851. https://doi.org/10.1177/1077800410383121
  • Vangelisti, A. L. (1994). Family secrets: Forms, functions and correlates. Journal of Social and Personal Relationships, 11(1), 113–135. https://doi.org/10.1177/0265407594111007
  • Vangelisti, A. L., & Caughlin, J. P. (1997). Revealing family secrets: The influence of topic, function, and relationships. Journal of Social and Personal Relationships, 14(5), 679–705. https://doi.org/10.1177/0265407597145006
  • Vangelisti, A. L., & Young, S. L. (2000). When words hurt: The effects of perceived intentionality on interpersonal relationships. Journal of Social and Personal Relationships, 17(3), 393–424. https://doi.org/10.1177/0265407500173005
  • Vangelisti, A. L., Young, S. L., Carpenter-Theune, K. E., & Alexander, A. L. (2005). Why does it hurt? The perceived causes of hurt feelings. Communication Research, 32(4), 443–477. https://doi.org/10.1177/0093650205277319

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.