378
Views
3
CrossRef citations to date
0
Altmetric
Original Article

Catalysts and motivations for change in privacy coordination: transracial, internationally adoptive parents’ coordination of private, adoption-related information

References

  • Breshears, D. (2018). Transracially adoptive families in South Africa: Parental experiences of outsider reactions. South African Review of Sociology, 49(2), 22–40. doi:10.1080/21528586.2018.1511466
  • Brodzinsky, D. (2006). Family structural openness and communication openness as predictors in the adjustment of adopted children. Adoption Quarterly, 9(4), 1–18. doi:10.1300.J145v09n04_01
  • Bute, J. J., Petronio, S., & Torke, A. M. (2015). Surrogate decision makers and proxy ownership: Challenges of privacy management in health care decision making. Health Communication, 30(8), 799–809. doi:10.1080/10410236.2014.900528
  • Bute, J. J., & Vik, T. A. (2010). Privacy management as unfinished business: Shifting boundaries in the context of infertility. Communication Studies, 61(1), 1–20. doi:10.1080/10510970903405997
  • Canzona, M. R., Peterson, E. B., Villagran, M. M., & Seehusen, D. A. (2015). Constructing and communicating privacy boundaries: How family medicine physicians manage patient requests for religious disclosure in the clinical interaction. Health Communication, 30(10), 1001–1012. doi:10.1080/10410236.2014.913222
  • Denzin, N. K. (1978). Sociological methods: A sourcebook (2nd ed.). New York, NY: McGraw-Hill.
  • Docan-Morgan, S. (2010). Korean adoptees‘ retrospective reports of intrusive interactions: Exploring boundary management in adoptive families. Journal of Family Communication, 10(3), 137–157. doi:10.1080/15267431003699603
  • Docan-Morgan, S. (2011). They don’t know what it’s like to be in my shoes”: Topic avoidance about race in transracially adoptive families. Journal of Social and Personal Relationships, 28(3), 336–355. doi:10.1177/0265407510382177
  • Galvin, K. (2014). Blood, law, and discourse: Constructing and managing family identity. In L. A. Baxter (Ed.), Remaking “family” communicatively (pp. 17–32). New York, NY: Peter Lang.
  • Hammonds, J. R. (2015). A model of privacy control: Examining the criteria that predict emerging adults’ likelihood to reveal private information to their parents. Western Journal of Communication, 79(5), 591–613. doi:10.1080/10570314.2015.1083117
  • Harrigan, M. M. (2009). The contradictions of identity-work for parents of visibly adopted children. Journal of Social and Personal Relationships, 26(5), 634–658. doi:10.1177/0265407509353393
  • Hawk, S. T., Keijsers, L., Hale, W. W., III, & Meeus, W. (2009). Mind your own business! Longitudinal relations between perceived privacy invasion and adolescent-parent conflict. Journal of Family Psychology, 23, 511–520. doi:10/1037/a0015426
  • Horstman, H. K., Butauski, M., Johnsen, L. J., & Colaner, C. W. (2017). The communication privacy management of adopted individuals in their social networks: Disclosure decisions in light of the discourse of biological normativity. Communication Studies, 68(3), 296–313. doi:10.1080/10510974.2017.1324890
  • Horstman, H. K., Colaner, C. W., & Rittenour, C. E. (2016). Contributing factors of adult adoptees’ identity work and self-esteem: Family communication patterns and adoption-specific communication. Journal of Family Communication, 16(3), 263–276. doi:10.1080/15267431.2016.1181069
  • Jacobson, H. (2009). Who’s watching?: Interracial surveillance and biological privilege. In M. K. Nelshammon & A. I. Garey (Eds.), Daily practices of surveillance among contemporary families (pp. 73–93). Nashville, TN: Vanderbilt University Press.
  • Kennedy-Lightsey, C. D., & Frisby, B. N. (2016). Parental privacy invasion, family communication patterns, and perceived ownership of private information. Communication Reports, 29(2), 75–86. doi:10.1080/08934215.2015.1048477
  • Kennedy-Lightsey, C. D., Martin, M. M., Thompson, M., Himes, K. L., & Clingerman, B. Z. (2012). Communication privacy management theory: Exploring coordination and ownership between friends. Communication Quarterly, 60(5), 665–680. doi:10.1080/01463373.2012.725004
  • Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. Newbury Park, CA: Sage.
  • Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook (2nd ed.). Thousand Oaks, CA: Sage.
  • Patton, M. Q. (2002). Qualitative research & evaluation methods (3rd ed.). Thousand Oaks, CA: Sage.
  • Petronio, S. (1994). Privacy binds in family interactions: The case of parental privacy invasion. In W. R. Cupach & B. Spitzberg (Eds.), The dark side of interpersonal communication (pp. 241–258). Hillsdale, NJ: Erlbaum.
  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany: State University of New York Press.
  • Petronio, S. (2013). Brief status update on communication privacy management theory. Journal of Family Communication, 13(1), 6–14. doi:10.1080/15267431.2013.743426
  • Petronio, S., Jones, S. M., & Morr, M. C. (2003). Family privacy dilemmas: Managing communication boundaries within family groups. In L. R. Frey (Ed.), Group communication in context: Studies of bona fide groups (2nd ed., pp. 23–56). Mahwah, NJ: Lawrence Erlbaum Associates.
  • Plander, K. L. (2013). Checking accounts: Communication privacy management in familial financial caregiving. Journal of Family Communication, 13(1), 17–31. doi:10.1080/15267431.2012.742090
  • Skinner-Drawz, B. A., Wrobel, G. M., Grotevant, H. D., & Von Korff, L. (2011). The role of adoption communicative openness in information seeking among adoptees from adolescence to emerging adulthood. Journal of Family Communication, 11(3), 181–197. doi:10.1080/15267431003656587
  • Smith, S. A., & Brunner, S. R. (2017). To reveal or conceal: Using communication privacy management theory to understand disclosures in the workplace. Management Communication Quarterly, 31(3), 429–446. doi:10.1177/0893318917692896
  • Steuber, K. R., & McLaren, R. M. (2015). Privacy recalibration in personal relationships: Rule usage before and after an incident of privacy turbulence. Communication Quarterly, 63(3), 345–364. doi:10.1080/01463373.2015.1039717
  • Suter, E. A., & Ballard, R. L. (2009). How much did you pay for her?’”: Decision-making criteria underlying adoptive parents’ responses to inappropriate remarks. Journal of Family Communication, 9(2), 107–125. doi:10.1080/15267430902773253
  • Suter, E. A., Reyes, K. L., & Ballard, R. L. (2011a). Adoptive parents‘ framing of laypersons‘ conceptions of family. Qualitative Research Reports in Communication, 12(1), 43–50. doi:10.1080/17459435.2011.601524
  • Suter, E. A., Reyes, K. L., & Ballard, R. L. (2011b). Parental management of adoptive identities during challenging encounters: Adoptive parents as “protectors” and “educators”. Journal of Social and Personal Relationships, 28(2), 242–261. doi:10.1177/0265407510384419
  • Thorson, A. R. (2015). Investigating adult children’s experiences with privacy turbulence following the discovery or parental infidelity. Journal of Family Communication, 15(1), 41–57. doi:10.1080/15267431.2014.980824
  • Toller, P. W., & McBride, M. C. (2013). Enacting privacy rules and protecting disclosure recipients: Parents‘ communication with children following the death of a family member. Journal of Family Communication, 13(1), 32–45. doi:10.1080/15267431.2012.742091
  • United States Department of Health and Human Services. (2009). Percentage distribution of children ages 0-17 by other demographic and socio-economic characteristics, by adoptive status and adoption type: United States, 2007. Retrieved from http://aspe.hhs.gov/hsp/09/NSAP/chartbook/chartbook.cfm?table=400
  • United States Department of State—Bureau of Consular Affairs. (2019). Adoption statistics. Retrieved from https://travel.state.gov/content/travel/en/Intercountry-Adoption/adopt_ref/adoption-statistics.html
  • Venetis, M. K., Magsamen-Conrad, K., Checton, M. G., & Greene, K. (2014). Cancer communication and partner burden: An exploratory study. Journal of Communication, 64(1), 82–102. doi:10.1111/jcom.12069

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.