Chatman Outsiders
Chatman Outsiders
Chatman Outsiders
Life-World
of Outsiders
Elfreda A. Chatman
School of information and Library Science, The University of North Carolina at Chapel Hill,
Chapel Hill, NC 27599-3360. E-mail:chatman@ils.unc.edu
Drawing upon a series of studies that examines the information world of poor people, the author discovers four critical concepts that serve as the basis for defining an impoverished life-world. These concepts are risk-taking,
secrecy, deception, and situational relevance. Moving back
and forth among the worlds of janitors, single mothers, and
an aging population, the author develops a conceptual
framework that links the world of the information poorthe outsiders-with
a world of insiders. Paradoxically, the
author finds that the very existence of two worlds is in itself
a hindrance to information seeking and sharing behaviors.
Insiders, because of their status, reinforce information
poverty by neglecting to accept sources of information not
created by themselves. The authors findings thus indicate
that the world of insiders is one in which outsiders are not
sought for information and advice and is a world in which
norms and mores define what is important and what is not.
Introduction
JOURNAL
OF THE AMERICAN
SCIENCE. 47(3):193-206,
1996
CCC 0002-8231/96/030193-14
194
JOURNAL
OF THE AMERICAN
SCIENCE-March
1996
Secrecy
What are some characteristics of this discussion that
have general applicability to studies of information and
poverty? For one, the insiders/outsiders literature suggests that knowledge about our personal experiences is
secretinformation. There isnt a discussion of situational
relevance because this concept does not appear in the
sociological literature. However, one can assumethat the
relevance of information to a group might be suspect if it
originates from outside the group.
The purpose of secrecy appears to be to protect ourselves from unwanted intrusion from whatever source.
According to Simmel(l950, p. 330), the secret, in this
sense, the hiding of realities by negative or positive
means, is one of mans greatest achievements. A plausi-
JOURNAL
OF THE AMERICAN
ble explanation is the desire we all have to claim an intimate or private dimension of life that is uniquely ours.
Bok ( 1983, p. 5) defines anything as a secret if its intent is intentional concealment. She states, it may be
shared with no one, or confided on condition that it goes
no farther. However, the overall intent of secret information is the idea that it will protect a person from unwanted intrusion into private space.As well, it conveys a
secret-laden way of experiencing reality (that is knowledge about ones life) that is primarily inaccessible to
others (Luhrmann, 1989, p. 13 1). Said another way,
concealed information is intended as a separation mechanism in which a person or select group of persons view
themselves as ultimate insiders.
Ironically, secret information also includes the element of control. Ericson ( 1989, p. 208) indicates that
control has an influence on the communication process.
The closer the affinities and involvements people have
with each other, the greater their need to protect their
secretive life-worlds. In everyday life, a secret might be
viewed as that which, if disclosed, carries an enormous
amount of risk. For example, with trusted others, such
as family members, we might hide financial problems.
Why? We withhold the information to preserve our autonomy and to give ourselves some fundamental say on
our personal lives (Redlinger & Johnston, 1980, p. 387 ).
The notion that secrecy might be shared, but that this
sharing is confined to a narrow and confined insider
membership, is supported by Rigney ( 1979, p. 52). He
observes that, the mechanisms of secrecy are all the
more complex as the number of insiders grows larger
. . . the probability of disclosure increaseswith every increasein the number of secretsshared.
Secretsprovide a solemn view of information acquisition and use. The point is that, in secrecy, the objective
is to guard against disclosure; consequently, we simply
ceaseto be receptive to advice or information. It seems
that the extraordinary power of secrecyis that it is not to
inform about our true state of affairs. Even in situations
in which informing might lead to assistance,sharing is
intended to control as little as possible. In this case, a
person with a secret hopes that the incomplete or untrue
information given would take care of the problem, thus
shutting off need for further disclosure.
Deception
A second factor associated with information poverty
is deception. According to Goffman ( 1974)) deception is
falsehood intended by persons not taken in by their own
fabrication (p. 112) .2 Bok ( 1983) raises the interesting
2 For a thorough and thought-provoking discussion dealing with the
notion of deception, see Goffmans Sfigma ( 1963), The Presentation
of Self in Everyday Life ( 1959), and Relations in Public ( 197 1). For a
delightful outsiders look at Goffmans influence on students of secrecy and role distance, see Marxs Role Models and Role Distance: A
Remembrance of Erving Goffman ( 1984).
SCIENCE-March
1996
195
idea that confusion exists regarding the difference between secrecy and deception. She argues that since all
deception involves keeping something secret, the confusion is understandable. Important to this discussion is
her opinion that, while all deception requires secrecy,
all secrecy is not meant to deceive ( p. 7 ) .
I suggestthat deception is a deliberate attempt to playact, that is, to engage in activities in which our personal
reality is consciously being distorted. It is a process
meant to hide our true condition by giving false and misleading information. What this does, of course, is shrink
the possibility of receiving useful information. The fundamental result of deception leads to a remarkably precarious position in which information sought is irrelevant.
Although the link between deception and information
acquisition has not been addressed in the literature, the
impression given is interesting. A summarization of this
body of work falls into three broad categories: Research
dealing with sexual abuse of children (Mikkelsen, Guthiel, & Emens, 1992), victims of wife assault (Dutton
and Hemphill, 1992), and information deception as discussed under manipulation theory. The works include
the self in everyday reality ( Rosie, 1993; Jacobs, 1992 ),
governmental deception ( Doyle, 1992; Bordua, 199 1))
and professions and ethics (Nolan, 199 1; Solovey &
Duncan, 1992; Friedman, 1992).
The contribution these works make is to allow deception, like secrecy, to be examined within a sociology of
knowledge. One primary issue has to do with information need and factors that hinder persons from making
use of relevant knowledge that, in many cases,is not only
public (that is, known) but also accessible.
It was the populations I described and the anomalies
such as the one I just identified that led to my development of the four concepts and their subsequent propositions. What proof do I have that my research has yielded
a conceptual framework for describing information poverty? To answer that, let us start by addressing the element of risk-taking.
Risk- Taking
A principle component affecting the informationseeking and sharing behaviors process is risk-taking. In
general, the purpose of secrecy and deception is to protect someone at risk or someone who perceives that revealing information about oneself is potentially dangerous. The ultimate end of both concepts, therefore, is selfprotection.
In this light, Goffman ( 1974) asks, Where does one
find situations in which reduced information must be relied upon? (pp. 448-449 ). My answer is that it lies with
our perception that to be an outsider necessitatesheightened self-protective behavior. In doing my research, it
became clear that an assumption I had about my respondents life-worlds needed to be abandoned. I assumed
196
JOURNAL
OF THE AMERICAN
3 For several studies dealing with relative advantage, see for examples, Lindstroms Diffusion of Agricultural and Home Economics
Practices in a Japanese Rural Community: Everett M. Rogers and F.
Floyd Shoemakers, Communication of Innovations; Frank Cancians,
Stratification and Risk-Taking: A Theory Tested on Agricultural Innovation.
4 See for examples, The D@iision of Information among the Working Poor, (Chatman, 1983) and Opinion Leadership, Poverty, and
Information Sharing, (Chatman, 1987).
SCIENCE-March
1996
marked degree of trustworthiness was evident. The author found that risk-taking rests on two factors. First, the
advisors advocating the practices were trusted insiders.
Second, they were perceived to be worthy of belief because they had proven themselves to be reliable sources
of new information.
Thus, in everyday life, for people to benefit from information received from outsiders, there needs to be
trust associated with this process. What appears to be
conditional influences of information poverty is poor
peoples desperation to shield the real state of need they
are experiencing. I suspect that this is due to their perception that it is too costly to themselves to share and
becausenetworks of trust between themselves and others
have not provided trustworthy opportunities.
Ifwe were to think about a situation in which a person
was in true information need and that need was not being shared (primarily due to self-protecting behaviors),
it is reasonable to assume the person lives in an impoverished life-world.
Theory Development
As I implied earlier in this article, a characteristic factor of studies I conducted is the interplay between conceptualization and empirical testing. In my own research, I used several specific theories to understand better how ordinary people search for information; e.g.,
gratification theory (Chatman, 199 1) and alienation theory (Chatman, 1990). I am particularly curious about
ways in which poor people view information and use it,
and whether or not they care to share it. In my examination of this process, I uncovered the four concepts described earlier.
The consortium of these four concepts are an outgrowth of both deductive theory application and inductive theorizing that arose from my field experiences.The
result of this process is the creation of six propositional
statements.
Propositional statements provide an explanation
about aspectsof social reality. These explanations designate relationships between the statements, that when
taken as a whole, provide the parameters for a theory.
In this instance, their purpose is to act as a guide when
examining issues of information-seeking behaviors and
information poverty.
An impoverished information world is one in which a
person is unwilling or unable to solve a critical worry or
concern. Becauseneeds are not being met, this information world is viewed by an insider as dysfunctional. A
contributing factor to information poverty is insiders
membership. Stated more clearly, this means that our
place within a social landscape is shaped by the norms of
other insiders ( Summer, 1907) . The role of such norms
is to aid and define things that are legitimate to seek and
appropriate to share.
Sometimes those norms include standards by which
JOURNAL
to define things that are legitimate to seek and appropriate to share. For example, Whyte ( 1981) discussesthe
social worlds of two types of young men; The college
boys and the corner boys. Although they inhabited
the same social society, their norms regarding approaches to life were remarkably different. For instance,
college boys had a future orientation which would lead
to a college life style, whereas corner boys valued things
that would enhance a free-spending life. Becauseof these
two separate worldviews, the young men neither shared
information nor sought information from each other.
What this example illustrates is that our membership
within a particular social group contributes to information poverty. How? Because we can experience a need
for information but are hindered from seeking it. Thus,
we engage in self-protective behaviors to keep others
from sensing our need. These behaviors are meant to
hide our true crisis in an effort to appear normal and to
exhibit acceptable coping behaviors.
The idea that others have an enormous influence on
the way in which we behave in a social setting finds support in Parks description about human communities. In
speaking about the role others play, Park ( 1952, p. 83)
explains:
OF THE AMERICAN
Based on the focal concepts fundamental to this discussion, I devised six propositional statements. Keep in
mind that they represent a collective rather than an individualistic model of need. As a theoretical framework,
their purpose is to describe an impoverished information
world.
Theory of Information
Poverty
SCIENCE-March
1996
197
As mentioned earlier, the concepts of secrecy, deception, risk-taking, and relevance were first discovered through anomalies. For example, in an inquiry
I conducted exploring the world of CETA women
(Comprehensive Employment and Training Act)
(Chatman, 1987), I applied opinion leadership theory. I
chose the framework because of the focus of the study,
namely, information-seeking and sharing behavior.
Based on propositions comprising the theory, it seemed
reasonable that opinion leaders (persons from whom
others sought information or advice) would be present.
The results indicated that a small number of such leaders
was found. They were, however, not engaging in information sharing. This finding was particularly puzzling
because inherent in opinion leadership is the notion of
sharing. Reasons why this process was not occurring fell
outside the explanatory nature of the theory.
This anomaly led to the following observation. Not all
information is of equal value within a social system.
Some of it is more valuable than others, and some carries
some element of risk. Therefore, opinion leaders would
not share information of either type. Moreover, I concluded that if these conditions are present in the information exchange process, there will always be some degree of information hindrance.
the Attribute Model5 with its value-laden concept relative advantage. In modifying relative advantage to assume the notion of risk-taking, I was able to explain why
the CETA respondents would not share information, in
particular, job information. The reason was the information was too risky to share, especially when the CETA
respondents themselves needed information that might
result in permanent employment. I wrote an article titled
Opinion Leadership, Poverty, and Information Sharing6
as the conclusion of that inquiry.
In an earlier section I indicated the most important
finding was the discovery that the type of information
being sought influences the extent of information sharing. That is, if the information is viewed as fundamental
to ones private stock, signs of weighing consequences
regarding its sharing become obvious. An example is letting co-workers know you found a job. Thus, in situations in which the vaIue of the information is influenced
by its currency, my results revealed that most respondents saw no advantage in risking job opportunities by
sharing it. Moreover, because the women viewed themselves as essentially outsiders in the agencies in which
they were temporarily employed, they did not perceive
permanent workers as being supportive. Subsequently,
they felt the only persons who wanted to help were they
themselves.
Since I suspected the lack of sharing information in
the CETA study was due to competition for permanent
jobs, I turned to a study that focused on janitors. It was
my assumption that, in this more stable environment
(many had been at a southern university for several
years), I would have a clearer picture of risk-taking and
information-sharing. What I found, however, was that
there was an enormous need for information but that the
kind of information that could assist the people was
missing. Furthermore, they perceived themselves as outsiders even within their own social milieu.
My search for answersto explain this unexpected outcome led to alienation theory with its concepts of powerlessness,normlessness, and isolation. For example,
the data revealed that janitors did not risk sharing information, even about common problems, because they
perceived themselves to be isolated from each other.
They believed if their supervisors, neighbors, or even
friends knew of the problems they were having, that information would be used against them. They did not
trust anyone and kept their concerns private.
Risk- Taking
The CETA study was primarily guided by propositions comprising models developed in diffusion theory.
Within these models, the most relevant to my studies was
198
JOURNAL
OF THE AMERICAN
SCIENCE-March
1996
JOURNAL
OF THE AMERICAN
Secrecy
Secrecy is to guard oneself against unwanted
exposure. It is a deliberate attempt not to inform others
about ones true state of affairs. In short, the object of
secrecy is to protect as closely as possible the true picture
of ones personal reality. Even if one did share the secret, the point of secrecy is to reveal as little as possible.
The hope is that the information would have absolute
relevance, thereby, shutting down the necessity for further disclosure. For instance, in everyday conversation,
people often ask how you are. Our usual response is
pretty good or fine, which in essence,ends the conversation.
I did not find (as some researchersindicated) that interpersonal communication channels were most preferred by poor people. In my studies the data revealed
that information of the most critical kind was not being
asked for or shared. This finding produced my first critical anomaly becauseit challenged a central argument in
studies of everyday need and usages,namely, that people
will share critical information with family, neighbors,
and friends. Rather, my studies consistently showed that
it is not just coincidence that information of the most
needed type was not being shared. To understand the
reasons why I had to return to my data. The end result
was the creation of the propositions identified earlier.
In the CETA study, it became clear that an influence
on ones decision to remain secretive about a concern
was fear. This fear is seen in the following illustration,
which focuses on a respondents observation that some
members of her social milieu were undesirable as CETA
workers. She believed that their inappropriate mannerisms and behaviors not only reflected badly on them, but
had negative consequencesfor herself as well. Her decision not to voice her concerns was due to her perception
that no one, including CETA officials, took the program
seriously. Here is her remarkable narrative:
There are some things here I would want to talk over
with the officials,but Im afraid. There should be some
standardsfor people enrolled in CETA. I dont want
street people to bring street attitudes into the program.
SCIENCE-March
1996
199
hereon thejob.
In the janitorial study, the findings revealed that respondents retreated from their social world. A principal
contributor was their sense that sharing information,
even of the most general kind, might be potentially dangerous.They describedtheir information world as one in
which there was a great reliance on self and in which the
need for information was suppressed.
Although I did not initially conclude that their world
of work was a competitive one, it did not take long to
realize that, indeed, it was. Things that I might have
thought relatively easyto sharewere held tightly. In fact,
the janitors made a considerable effort to keep others
from having any advantage over them. In the example
that follows, the respondent is secretive about her relationship with her supervisor. Mingled with wanting to fit
in with other janitors regarding their negative relationships with supervisors was her desire to avoid their patronizing attitude. She begins:
Some of my co-workers teaseme about following behind
Miss T. Hey, they got to stick their head in those toilets,
same as me. They cant do nothing for me. So, if Miss T.
wants me to go to Timbuktu, Im going. You cant even
get off probationunlessshetells you to. Plus,shellmake
200
JOURNAL
OF THE AMERICAN
The results from the aging study provided several instances in which the residents perceived the need to be
secretive. For example, a phenomenon associatedwith
living at Garden Towers was that the women concealed
physical and mental failings. A hindrance to sharing this
type of information was mistrust of others to keep the
information confidential. Also, revelation would surely
lead to expulsion. Not surprisingly, fear of ending ones
life in a nursing facility, if others suspected ones true
condition, was an effective deterrent to personal
exposure. I suspectanother reasonthe residentswere not
eager to solicit assistance was a desire not to be a
bother. Residentswho were constantly asking for assistance were often avoided by others. Knowing that,
women who could appear more independent chose to
do so.
What these observations revealed is that secrecy is
necessarybecauseto trust or confide in anyone would
adversely reveal the extent of ones need. Moreover, disclosure would surely lead to dire consequences.Finally,
sharing the information would not necessarilymean that
the audience would sympathize.
Deception
In addition to secrecy,deception was found to be an
important factor in information poverty. Deception conveys a slightly different meaning from secrecy.Secrecyis
an active process of shutting down or closing off information. Deception is a deliberate attempt to act out a
SCIENCE-March
1996
false social reality. In deception, one never had the slightest intention of telling a true story. Relieved of the truth,
one engagesin activities in which personal reality is consciously and forcefully distorted. The problem with deception is that because one shares information that is
meaningless, information received is the most irrelevant
kind.
Why would someone deliberately deceive? One reason, not unexpectedly, is to appear more well-off than
one really is. The need to appear to be coping successfully, or at the very least to be coping as well as everyone
else seemsto be derived by social norms. That is, no one
wants to be viewed less capable than ones neighbors or
friends at solving problems.
As an example, consider a janitor I visited during her
lunch hour. We sat a seat apart in an auditorium. As she
began to eat her lunch, I noticed that her sandwich consisted of two pieces of white bread with nothing in between. Since lunch time is one of the few times janitors
were seen socializing together, I suspect this was her way
of not calling attention to the fact that she couldnt afford
a more substantial sandwich. In this case, therefore, the
respondent wasnt deliberately shielding information
but, rather, was deceptive in her behavior regarding her
lunch.
A brief example from my CETA study also adds to the
notion that deception is used when one perceives oneself
as needing to appear normal or making appropriate behavioral judgments. In this case, the respondent indicated that she engagesin anti-social behavior to fit inor to appear to be an insider. She remarked:
There is a lot of turmoil around here.This placeneedsa
lot of help. I talked to a friend about wanting to help
make it better if I can. There is a lot of blaming, scapegoating,and backbiting.This isnt the way I treat people.
But everybodydoesit so I go along.Nobody really tries
to help eachother. Plus,the interpersonalrelationships
leavea lot to be desired.I know that in order to have
a good working relationship,you needcommunication,
trust, and cooperation.Since none of thesethings exist
here,I know this is not a safeplaceto promote my ideas.
The respondent knows that to be successfulshe needs
to assume behavior that stems from the world outside.
Becauseher social environment has not prepared her for
some acceptable behaviors, she engagesin pretense. Or,
as she says with significant insight, the need to put on
airs:
We needto try to get off welfare.Welfareis like goingto
mental institutions. We needto seemore blacks being
visible as nurses and doctors. They should be more
placedin jobs they are qualified for. Blacksneedsto pep
up their language.They shouldact and talk like the people theyreworking with and not talk street.When white
folks comesdown here,they know enoughto slap your
hand and give you the soul handshake.We shouldlearn
JOURNAL
OF THE AMERICAN
SCIENCE-March
1996
201
202
JOURNAL
OF THE AMERICAN
SCIENCE-March
1996
Regarding relevance and its influence on self-protective behaviors, 1 found that the environment in which the
women lived played a critical role. For instance, having
a close relationship with their children was supported by
a filial norm expected by members of Garden Towers.
Even though parents might have wanted to discuss aspects of their lives that were becoming physically, emotionally, or financially dysfunctional, the most relevant
information was not in responseto these concerns. From
their point of view, rather, it was that which helped them
maintain a positive relationship with their children.
In many instances, the women chose to keep private
their most serious problems for fear of losing the affection of their children, thereby not only risking avoidance
by them, but also having the potential of being viewed
as a poor dear by other residents because they were
abandoned by their offspring.3
The result was that the women engagedin a search for
information that was relevant but of no great consequence.14I defined the degree of relevance as occurring
at three levels. The first level pertains to generalized information which occurs within the everyday lived experiences of the residents, the purpose of which is to help
the women engagein daily conversations, stay informed
about localized happenings, or stimulate some voyeur
curiosity such as discussions about media or public figures.
The second level is linked to ones personal need for
coping but within an appropriate standard or norm, such
as asking for advice about some medical problem. Sharing this information does not involve a great deal of risk.
Wishing to know more about some mental worries, such
as a fear of losing ones memory, however, was not
openly discussed,perhaps becauseit was an aspect of the
aging process of great concern to most residents. Thus,
an attitude of avoidance was the norm.
As this situation demonstrates, the notion of relevance becomes more selective the more personal the nature of the information being sought. The third level of
information is protected with the highest degree of secrecy. Because of the individualistic nature of this level
of information, if found, relevance could make a significant contribution. The women chose to shield this most
personal information from both family and friends. One
reason was the compromise to their self-esteem and independence they perceived disclosure would cost. It was
simply too risky to share. When they chose to describe
their physical or mental problems, it was to professional
caretakers. Unfortunately, in many casesthe women believed the information they received was not relevant or
they did not have a great deal of confidence in the advice
I3 Poor dear refers to women perceived to be worse off than other
residents.
I4 For a detailed discussion regarding my three levels ofinformation
and information
sharing, see The Information World of Retired
Women, Chapter 8.
JOURNAL
in a concretehistoricalsituation.
I5 See for example, the germinal work Dervin has done regarding
sense-making useful theory for librarianship: Communication, not information ( 1977), The everyday information needs ofthe average citizen ( 1976), Useful theory for Librarianship: Communication, not
Information (1977) Dervin and Greenberg The communication environment of the urban poor ( 1972).
I6 Regarding the need to recreate a worldview that is real to the individual but unable to be penetrated, even by insiders, see Goffmans
Asylums ( 196 I )
OF THE AMERICAN
SCIENCE-March
1996
203
JOURNAL
OF THE AMERICAN
the lack of adequatefood, clothing and housing commonly implies other lacks,amongwhich are poor early
training and education,the absenceof contactwith elevating and inspiring personalities,a narrow outlook
upon the world, and, in short, a generallack of social
opportunity
The absolute closure to avenues that might lead to acceptability was problematic for another reason. It meant
that interpersonal communication channels were perceived as unhelpful and the social exchangesamong the
CETA women and other workers were ones astonishingly devoid of support or mutual caring.
The work I conducted with janitors also provides convincing evidence of an outsiders worldview. The janitors
emphasized their identification in stratljied terms, e.g.,
as invisible people within the university and as helpless
in voicing their frustrations. An indication that they
viewed themselves in this light was their social dealing
with other workers and their minimal association with
members of the academic community. The results from
my janitorial research illustrate a barren information climate. With few exceptions, the overwhelming evidence
is that they had a minimal association with either coworkers or other members of the university. Significantly, the severity of their information world can be described as one in which there is a stratification of information acquisition and use. Persons most enriched by
information sources are those most removed from the
everyday life-worlds of janitors. What I concluded from
the studies is that the janitors were the most socially isolated from both formal and interpersonal sources of information. And, becauseof their position within the academic environment, there is precariously little margin
for information exchanges. The realization provided by
my work with janitors was so compelling that it led to
the formulations of alienation theory to explain the destitution of that information world.
Finally, my aging study ( 1992) provided unexpected
clues that furthered my understanding of the role that
outsider can play in information poverty. The respondents for this inquiry were Southern women. They were
intensely concerned about maintaining their heritage
and traditional values within the retirement community
that I called Garden Towers. In this process of learning
to live among strangers, they were experiencing a redefinition of their traditional roles of, for example,
mother, wife, and neighbor. More than other groups I
studied, this population was undergoing emotional, social, and psychological adjustments for which their familiar world had not prepared them.
In addition, they found that social values and norms
which had sustained them previously were not sufficient
to enhance their living among strangers. It wasnt that
others did not adhere to similar values, but rather that
private views were subsumed by open communal living
which determined appropriate behavior. The outcome
SCIENCE-March
1996
The author gratefully acknowledges the helpful suggestions of Catherine Ross and Patricia Dewdney from
the University of Western Ontario; Paul Solomon and
Victoria Pendleton from the University of North Carolina at Chapel Hill; Brenda Dervin at Ohio State University; and reviewers of JASIS.
References
Becker, H. S. ( 1973). Outsider: Studies in the sociology of deviance.
New York: The Free Press.
Berger, P. L., & Luckmann, T. ( 1967). The social construction efrealify. Garden City, NY: Anchor Books.
Bok, S. ( 1983). Secrets. New York: Random House.
Bordua, D. J. ( I99 1). The intelligence function and democratic policy:
A review of three books on intelligence. Journal ofPolitical and Military Sociology, 19. 306-3 13.
Cancian, F. ( 1967). Stratification and risk-taking: A theory tested on
agricultural innovation. American Sociological Review, 32, 9 I2926.
Caudra, C. A. & Katter, R. V. ( 1967). Opening the black box of relevance. Journal of Documentation, 23( 4)) 29 l-303.
Chatman, E. A. ( 1983). The d&Con of information among the working poor. Unpublished doctoral dissertation, University of California, Berkeley.
Chatman, E. A. ( 1986). Diffusion theory: A review and test of a conceptual model in information diffusion. Journal of the American So-
JOURNAL
OF THE AMERICAN
Chatman, E. A. ( 1992). The information world ofretired women. Westport, Conn.: Greenwood Press.
Cohen, A. ( 1975). The definition ofpublic identity: Managing margin-
SCIENCE-March
1996
205
Sociology, I. 53-74.
needs and uses. Annual Review q/
Inftirmation Science and Technology. 3, l-30.
Park, R. E. ( 1952). Human Communities Illinois: Free Press.
Paisley. W. J. ( 1968). Information
Redlinger. L. J.. &Johnston, S. ( 1980). Secrecy, informational uncertainty, and social control. Clrban Life, 8. 387-397.
Rigney, D. ( 1979). Secrecy and social cohesion. Society, 16, 52-55.
Rogers,E. M..&Beal,G. M.( 1957-1958).Theimportanceofpersonal
influence in the adoption oftechnological changes. Sociul Forces, 36.
329-335.
Rogers, E. M., & Shoemaker. F. F. ( 1971). Communication oflnnovarions. New York: The Free Press.
Rosie. A. ( 1993). Hes a liar, Im afraid: Truths and lies in a narrative
account. Sociology: 27. 144- 152.
Saracevic. T. ( I 975 ) Relevance: A review of and a framework for the
thinking on the notion in information science. Journal offhez4mer-
206
JOURNAL
OF THE AMERICAN
SCIENCE-March
1996