806
Views
18
CrossRef citations to date
0
Altmetric
Original Articles

“Taking Good Care of Our Health”: Parent-Adolescent Perceptions of Boundary Management About Health Information

&

References

  • Afifi, T. D. (2003). ‘Feeling caught’ in stepfamilies: Managing boundary turbulence through appropriate communication privacy rules. Journal of Social and Personal Relationships, 20, 729–755. doi:10.1177/0265407503206002
  • Afifi, T. D., & Steuber, K. (2009). The Revelation Risk Model (RRM): Factors that predict the revelation of secrets and the strategies used to reveal them. Communication Monographs, 76, 144–176. doi:10.1080/03637750902828412
  • Afifi, T. D., & Steuber, K. (2010). The cycle of concealment model. Journal of Social and Personal Relationships, 27, 1019–1034. doi:10.1177/0265407510378301
  • Brashers, D. E. (2001). Communication and uncertainty management. Journal of Communication, 51, 477–497. doi:10.1111/jcom.2001.51.issue-3
  • Bulmer, M. (1979). Concepts in the analysis of qualitative data. The Sociological Review, 27, 651–677. doi:10.1111/sore.1979.27.issue-4
  • Bute, J., & Vik, T. A. (2010). Privacy management as unfinished business: Shifting boundaries in the context of infertility. Communication Studies, 61, 1–20. doi:10.1080/10510970903405997
  • Caughlin, J. P. (2003). Family communication standards: What counts as excellent family communication and how are such standards associated with family satisfaction? Human Communication Research, 29, 5–40.
  • Caughlin, J. P., & Afifi, T. D. (2004). When is topic avoidance unsatisfying? Examining moderators of the association between avoidance and dissatisfaction. Human Communication Research, 30, 479–513.
  • Caughlin, J. P., Bute, J. J., Donovan-Kicken, E., Kosenko, K. A., Ramey, M. E., & Brashers, D. E. (2009). Do message features influence reactions to HIV disclosures? A multiple-goals perspective. Health Communication, 24, 270–283. doi:10.1080/10410230902806070
  • Caughlin, J. P., Petronio, S., & Middleton, A. V. (2013). When families manage private information. In A. L. Vangelisti (Ed.), The Routledge handbook of family communication (2nd ed., pp. 321–337). Mahwah, NJ: Erlbaum.
  • Charmaz, K. (1983). The grounded theory method: An explication and interpretation. In R. Emerson (Ed.), Contemporary field research (pp. 109–126). Boston: Little, Brown.
  • Creswell, J. W. (1998). Qualitative inquiry and research design. Choosing among five traditions. Thousand Oaks, CA: Sage.
  • Creswell, J. W., & Miller, D. L. (2000). Determining validity in qualitative inquiry. Theory into Practice, 39, 124–130. doi:10.1207/s15430421tip3903_2
  • Dailey, R. M., & Palomares, N. A. (2004). Strategic topic avoidance: An investigation of topic avoidance frequency, strategies used, and relational correlates. Communication Monographs, 71, 471–496. doi:10.1080/0363452042000307443
  • Dalzell, H. J. (2000). Whispers: The role of family secrets in eating disorders. Eating Disorders, 8(1), 43–61. doi:10.1080/10640260008251211
  • Derlega, V. J., Metts, S., Petronio, S., & Margulis, S. T. (1993). Self-disclosure. Newbury Park, CA: Sage.
  • Du Pré, A. (1997). Humor and the healing arts: A multimethod analysis of humor use in health care. Mahwah, NJ: Erlbaum.
  • Ebersole, D. S., Miller-Day, M., & Krieger, J. L. (2014). Do actions speak louder than words? Adolescent interpretations of parental substance use. Journal of Family Communication, 14, 328–351. doi:10.1080/15267431.2014.945699
  • Gewirtz, A., & Gossart-Walker, S. (2000). Home-based treatment for children and families affected by HIV and AIDS: Dealing with stigma, secrecy, disclosure, and loss. Child and Adolescent Psychiatric Clinics of North America, 9, 313–330.
  • Guerrero, L. K., & Afifi, W. A. (1995). Some things are better left unsaid: Topic avoidance in family relationships. Communication Quarterly, 43(3), 276–296. doi:10.1080/01463379509369977
  • Laursen, B., & Collins, W. A. (2004). Parent-child communication during adolescence. In A. L. Vangelisti (Ed.), Handbook of family communication (pp. 333–348). Mahwah, NJ: Erlbaum.
  • Mezey, A. G., & Cohen, S. I. (1961). The effect of depressive illness on time judgment and time experience. Journal of Neurology, Neurosurgery & Psychiatry, 24(3), 269–270. doi:10.1136/jnnp.24.3.269
  • Miller-Day, M. A. (2004). Communication among grandmothers, mothers, and adult daughters: A qualitative study of maternal relationships. Mahwah, NJ: Lawrence Erlbaum.
  • Morr Serewicz, M. C., & Canary, D. J. (2008). Assessments of disclosure from the in-laws: Links along disclosure topics, family privacy orientations, and relational quality. Journal of Social and Personal Relationships, 25, 333–357. doi:10.1177/0265407507087962
  • Morr Serewicz, M. C., Dickson, F. C., Morrison, J. H. T., & Poole, L. L. (2007). Family privacy orientation, relational maintenance, and family satisfaction in young adults’ family relationships. Journal of Family Communication, 7(2), 123–142. doi:10.1080/15267430701221578
  • Moustakas, C. (1994). Phenomenological research methods. Thousand Oaks, CA: Sage.
  • Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1, 311–335. doi:10.1111/comt.1991.1.issue-4
  • Petronio, S. (1994). Privacy binds in family interactions: The case of parental privacy invasion. In W. R. Cupach & B. H. Spitzberg (Eds.), The dark side of interpersonal communication (pp. 241–257). Mahwah, NJ: Lawrence Erlbaum Associates.
  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany: State University of New York Press.
  • Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, 2, 175–196. doi:10.1111/(ISSN)1756-2589
  • Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13(1), 6–14. doi:10.1080/15267431.2013.743426
  • Petronio, S., & Caughlin, J. P. (2006). Communication privacy management theory: Understanding families. In D. O. Braithwaite & L. A. Baxter (Eds.), Engaging theories in family communication: Multiple perspectives (pp. 35–49). Thousand Oaks, CA: Sage.
  • Rubin, H. J., & Rubin, I. S. (2005). Qualitative interviewing: The art of hearing data. Thousand Oaks, CA: Sage.
  • Schrimshaw, E. W., & Siegel, K. (2002). HIV-infected mothers’ disclosure to their uninfected children: Rates, reasons, and reactions. Journal of Social and Personal Relationships, 19, 19–43. doi:10.1177/0265407502191002
  • Sourkes, B. M. (2007). Armfuls of time: The psychological experience of the child with a life threatening illness. Medical Principles and Practice, 16, 37–41. doi:10.1159/000104546
  • Steuber, K. R., & Solomon, D. H. (2012). Relational uncertainty, partner interference, and privacy boundary turbulence: Explaining spousal discrepancies in infertility disclosures. Journal of Social and Personal Relationships, 29, 3–27. doi:10.1177/0265407511406896
  • Strauss, A., & Corbin, J. (1990). Basics of qualitative research: Grounded theory procedures and techniques. Newbury Park, CA: Sage.
  • Vangelisti, A. L. (1994). Family secrets: Forms, functions, and correlates. Journal of Social and Personal Relationships, 11, 113–135. doi:10.1177/0265407594111007
  • Vangelisti, A. L., & Caughlin, J. P. (1997). Revealing family secrets: The influence of topic, function, and relationships. Journal of Social and Personal Relationships, 14, 679–705. doi:10.1177/0265407597145006
  • Vangelisti, A. L., Caughlin, J. P., & Timmerman, L. M. (2001). Criteria for revealing family secrets. Communication Monographs, 68, 1–27. doi:10.1080/03637750128052
  • Wood, J. T. (2001). The normalization of violence in heterosexual romantic relationships: Women’s narratives of love and violence. Journal of Social and Personal Relationships, 18, 239–261. doi:10.1177/0265407501182005

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.