6 research outputs found

    Resisting and Persisting through Organizational Exit: An Autoethnographic Exploration of Disclosing Sexual Harassment in Collegiate Debate

    Get PDF
    Collegiate debate has documented extensive problems with sexual harassment. This manuscript uses the first author’s layered account of sexual harassment experienced as a collegiate debater, her transition to a different university, and the management of private information with her family. Communication Privacy Management (CPM) theory and a plethora of studies provide a theoretical lens of the first author’s autoethnographic experience. We advance CPM theory by examining how young adult children manage their privacy through constructing more rigid privacy boundaries than their adolescent counterparts and provide the first look at how disclosure can both enable and constrain victims/survivors of sexual harassment, as well as interrogate the way in which survivors can own their experiences and perpetrators be held accountable within the debate community

    Privacy Management as Unfinished Business: Shifting Boundaries in the Context of Infertility

    Get PDF
    Privacy dilemmas are prevalent for women who experience a fertility problem. In this study, we use communication privacy management (CPM) theory to explore how privacy boundaries shift over time as women cope with infertility. Based on interviews with 23 women, we found that women described distinctive patterns of shifting privacy boundaries, including situations in which the experience of infertility served as a change agent, patterns in which women became more or less open over time, and patterns that indicated a continuous oscillation of boundaries. These ever-changing patterns of talk indicate that managing private information about infertility is unfinished business

    “We Were Not Prepared to Tell People Yet”: Confidentiality Breaches and Boundary Turbulence on Facebook

    Get PDF
    Communication Privacy Management theory provides a framework for investigating confidentiality breaches that occur on Facebook. Open-ended online questionnaires served as mechanism for collecting data about privacy violations and the resulting boundary turbulence. Privacy violations validated three a priori categories (Petronio & Reierson, 2009) of confidentiality breaches (privacy ownership violations, discrepancy breaches of privacy, and pre-emptive privacy control). Findings indicated that the lack of established explicit privacy rules led to privacy violations and boundary turbulence. Results also provided insight regarding motivations of privacy violations, reactions to privacy violations, and the role of privacy rules in the violation

    The Burdened Burdensome Woman: A Poststructural Feminist Analysis of Discussions of The New York Times’ Homeschooling Gender (Dis)Parity Article

    No full text
    As the COVID-19 pandemic swept America in 2020, schools closed and families shifted to children learning online from home. This labor was dominantly covered by mothers, many of whom still had careers to maintain. A 2020 New York Times article reporting on the homeschooling shift concluded with the polarizing declaration that while women did most of the labor associated with homeschooling, men did not perceive the gender imbalance. Guided by a critical feminist lens, the authors examined the comments posted in the article’s comment section to unpack the discourse. Western society places pressure on women to flawlessly perform motherhood and other tasks simultaneously; as such, the COVID-19 pandemic provided a context rich for further subjugation and subordination of pink-collar work
    corecore