Documente Academic
Documente Profesional
Documente Cultură
University of California Press and Society for the Study of Social Problems are collaborating with JSTOR to
digitize, preserve and extend access to Social Problems.
http://www.jstor.org
In this paper I draw on Goffman (1963) and my own fieldwork to propose the concept of
access information to help us understand the particular experience of women in public places.
Access information is information disclosed in public that can be used to locate an individual
at some future time. Knowledge of a person's home or place of work clearly can function as
access information, as can knowledge of one's full name, phone number, neighborhood, habitual routes, and hangouts. Access information between the acquainted is normally not
problematic, as such relationships presume willingness to present oneself as accessible. It is in
encounters between the unacquainted, usually in public, that such information can be
contested.
Although access information is pertinent to understanding encounters between a wide
variety of social categories, it is particularly relevant to understanding the experience of women in public because rules for disclosing such information are gender asymmetrical. Mensometimes playfully, sometimes as harassment or as a preface to crime-seek access information about women in order to intrude, to some degree, on their privacy. My observations
suggest, and women's and men's reports confirm, that access information is a significant element in public life and that women have developed strategies for dealing with possible incursions on their privacy by men. Individuals, wittingly and not, supply access information as
one element of identifying themselves. They often use it purposefully and strategically toward a variety of ends.
In what follows I describe how women, because of site or status, are especially "exposed"
to incursions on their privacy (Goffman, 1963:125-28), compare the situation of women to that
of other exposed groups and to that of men, describe the various strategies for evaluating,
presenting, and restricting access information that women from my research developed, and
suggest that these disclosure rules are one example of the enactment of women's inequality in
everyday life. An implication of this is that sociological theories of behavior in public places
can never be gender neutral.
* I am grateful to the following individuals for their helpful comments on an earlier version of this paper: Robert
Emerson, Erving Goffman, William Gronfein, Douglas Maynard, Melvin Polilner, Emanuel Schegloff, and anonymous
reviewers. As well as at those points where I specifically note it, this paper clearly owes more to Erving Goffman's
sociology than can be shown by footnotes alone. Correspondence to: Department of Sociology, Indiana University,
Indianapolis, IN 46202.
384
Access Information
385
386
GARDNER
exemplified in the nineteenth century by an intricate introduction and calling-card etiquette
(see Young, 1882:31-41, 52-83). In our own time, an individual realizes that he or she is expected to phone before visiting a friend and that, furthermore, he or she must phone only at
certain hours. Likewise, perhaps especially in small towns, the location-for at least part of
the day--of each individual in town may be well known to the town as a whole; but here
again, consensual rules for handling access information issues will have been worked out by
custom and etiquette.
In general, however, today's urban requirements for the public disclosure of access information are different than these requirements. First, they are gender asymmetrical; women
are expected to disclose such information less readily than men, and men are cautioned to
cooperate, for example, by "Never call[ing] out a woman's name in public places" (Vanderbilt,
1972:247). Second, because strangers not acquaintances are involved, persons can see disclosure of access information as possibly leading to crime, and often as leading to annoying, even
frightening, incursions on privacy. Women will be at a special disadvantage vis-A-vis men.
Required more stringently to withhold access information, they will also at times seek out
men as potential acquaintances.
Access Information
They too need be wary of releasing access information in public since a criminal might use
this disclosure for purposes like burglary. This general prohibition against giving strangers
access information insures that strangers will not be able to make criminal use of information
gained in public and, ironically, enables us to trust strangers to the extent that we do.
If there are categories of individuals guaranteed to be at risk by disclosing access information in public, then there are also categories of people whose occupation or preoccupation it is
to uncover and exploit access information: devoted fans and paparazzi, professional detectives and skiptracers, and urban men. A thief also does this when he asks what neighborhood
a stranger lives in, not necessarily wanting to gain access to the stranger's home but only to
judge if the stranger is wealthy enough to be worth robbing (see Sedgwick, 1982:37); a man
does the same when he asks a woman stranger if she is married or has a boyfriend. He does
not want access to her at this point, but only needs to judge if she is a reasonable candidate.
Men say they may at first feign disinterested curiosity about a woman; once they determine
that the woman is eligible, they can proceed in trying to gain access information.
387
388
GARDNER
man." It is important to appreciate that avoiding the appearance of accessibility is routinely
important to women in public places, not only to women attempting to prevent crime. Every
woman I interviewed said that she understood it to be important to appear to restrict access to
her company as well as access information about her destination or home. One woman said,
"If I don't actively look like I want to keep men away from me-it doesn't matter if they want
to look at me, join me, or follow me-then I'm issuing them an invitation." In this spirit, a
woman writer observed that her original joy over receiving her own handsome business cards
turned to dismay as she realized that to present them to men appeared "an unwelcome solicitation" (Jakobson, 1987:306).
Women interviewed felt that fashions available to them sometimes proclaimed a general
accessibility that then could become difficult to manage. One woman interviewed said that
she attempted to cover with a coat a necklace that displayed her first name; otherwise, it
made her feel as if she sported a "signplate." Another woman said that, in her youth, longer
skirts and high-necked long-sleeved blouses ensured her "personal privacy" in public; current
revealing fashions made her feel as if she were "out on the street on a platter," where anyone
could do what they wanted with her. In the same way, Muslim women who reside in the
West often say that they retain native clothing in public places to reduce visual access to their
bodies (Wise and Stanley, 1987:172); and, of course, in Islamic countries institutionalized
clothing like the veil is a means of signifying women's inaccessibility even when they do
venture into public places (Abu Saud, 1984:37-61; Waddy, 1980:110-39).
Preventing Crime
In popular literature on crime prevention, women are advised to curb all speech to stranit is said to signal accessibility and "invite" crime (Hair and Baker, 1970:32-33, 40;
because
gers
Mandell, 1972:30-33; Barthol, 1979:18). A wise woman will be acquainted with the dangers of
divulging access information: "Never give intimate details about yourself to strangers, women or men, with whom you strike up a casual acquaintance. It's one thing to be friendly
and cordial, but indiscriminately mentioning your address or phone number, or describing
your home may be dangerous" (Hair and Baker, 1970:165; see also Krupp, 1978; Arnold,
1975:111; Field, 1980:112,120). The women interviewed all said they felt male strangers were
more likely to use access information to harass them on the phone later, trail them to their
homes or workplaces, or plot some crime against them; 10 of the 15 women had experienced
crimes that began in just this way (one rape, seven obscene phone calls, one burglary, three
robberies, one attempted assault with a deadly weapon). Significantly, most of the men interviewed said they felt that women who believed access information had criminal potential
were "paranoid," "suspicious," or "not very trusting people."
In fact, young urban women who try to "prevent crime"-that is, who try to avoid being
selected as victims-are cautioned never to appear so suspicious of crime that they damage
their appearance as open and feminine persons (see Burg, 1979:12). As one young woman
noted, "I'd feel a lot better if I could carry a hand grenade when I walk down the street;
unfortunately, they're not in fashion." Moreover, young women will sometimes want to indicate an appropriate degree of openness to men in order to allow a modest degree of invitation
in return. Some popular advice for young women, in fact, exhorts them to exploit every small
opportunity for interaction in public places in order to prepare the way for "suitable men" to
issue invitations (see Hanson, 1982). Also, in some of the sites where women are expected to
seek acquaintance, they understand that they are expected to maintain a careful balance between appearing too accessible and not accessible enough (see Laermann, 1978; Murray,
1985).
Almost all the men interviewed said the reluctanceof the woman in public to disclose
AccessInformation
access informationwas coyness or false modesty. And so it is, from the perspectiveof a male
constrainedto appear to desire access information. For women, however, disclosing access
informationcan signal an unbecomingavailabilitythat has overtonesof sexual loosenessand
389
390
GARDNER
of residence but not her address, give the type of work she does but not her place of employment, or indulge in verbal technicalities. For example, one young woman was asked by a
man who struck up a conversation on the street, "And what might your name be?" "It might
be Christie Brinkley," she replied, "but it's not."
Another practice is to give a public name, that is, a false name for use in public places. To
do so is to create a different self-a "situated self," as Goffman would call it-to whom reluctance to disclose information can be attributed. Spirited women-usually young, since women report that the fun involved may wear thin with advancing years-may make a game
out of this, coming up with especially unlikely names (see Peck, 1978:32). Similarly, prostitutes will use fake names and phone numbers so that clients who have considerable access to
them physically and to damaging information about them will not be able to link their lives
as sex workers with their private lives (Barrows, 1986:71). In just this way, many of the
women interviewed said that they had used public names as a shield against intrusions into
their "true selves," as armor behind which they could flirt or simply "act braver than they
felt," or as opportunities for linguistic play that would test how amusing a name they could
concoct or how outrageous a name a man would appear to accept. These all are relatively
positive readings of the public name, suggesting that it provides an involvement shield
(Goffman, 1963) of a very substantial sort; the person with whom one thinks one is interacting
is in fact someone else.
A woman's cleverness can, in effect, destroy her disguise, however, if she is with women
friends who play a too appreciative or poorly controlled audience. Women who tried to pass
off a public name or other false information in the presence of female friends occasionally
reported that, although they themselves had the expressive self-control (Goffman, 1959) to
bring off the deception, their friends did not.
Further, the public name is a valuable shield for out-of-role behaviors and may even be
carefully chosen and planned as such. Some women say that, when using a public name,
they dress more daringly, initiate pickups, or simply talk more to male strangers. Sometimes
names are planned out beforehand or may lie at the back of the mind, a resource to be retrieved and employed if needed. "I'd been dying to use that one," a young woman said about
a currently popular name she despised. Its use, she said, was her only high point in an otherwise dull day at the ski lift.
With unlikely names, a factor may be the absurdity of the name, expressing, not merely
creativity and humor, but just how far the real self is from the errant prankster. Insofar as the
woman's fictitious public name contains clues to her legal name, she signals a link between
the selves, though it may be unappreciated. This may be done when the woman gives a
public name with the same initials as her true name, for instance. Three women interviewed
suggested that they gave either their real first name attached to a bland and, they hoped,
forgettable last name. Two said they gave both elements of the real name transmuted somewhat (the last name Garber became Garfield, for example). Two said they were careful to
preserve their real initials. An older woman reported that in her youth she would provide
her own first name with her mother's or aunt's, or grandmother's maiden name; and an Hispanic-surnamed woman simply translated her name into English.
For women in public places, however, there is more than merely a playful aspect to
arriving at a public name. Many women interviewed, especially younger women, felt that
for a man to know their right name was in effect for him to have the ability not just to find
them again but somehow to control them. One woman said, "If they know my real name, it's
somehow like they've got me forever." To name correctly is to control at the most, to comment on the propriety of at the least, as it may be also in other cultures (see Lauterbach, 1932;
Fortune, [1932] 1963; Price and Price, 1972).
Access Information
Undermining Contingencies
If a woman in a public place replies to requests for access information accurately, she
may find herself thought too easily obtainable, as well as being saddled with a possibly unwanted companion. As I have described, many women in Santa Fe solved this dilemma by
manipulating the information they knew they were expected to provide. They would provide
only partial or incorrect information, complying with both the requirement for respect toward a role player in a superior position and the requirement that a woman in public limit
her accessibility to strangers. The irony in this solution is that it must be one that the man
cannot appreciate, lest the game be up; in other words, she must deliver the misleading access
information with sufficient conviction and authenticity for the man to believe her.
Women reported a number of possible underminings of this solution. The first was that
the man accepted the misleading access information but sooner or later discovered it was
false, which led either to anger or chagrin on his part. Speaking of stewardesses, who are
asked for this information regularly, a flight captain reports that one stewardess gives insistent
male passengers the phone number of Dial-a-Prayer (Ashwood, 1974). In Santa Fe, one woman observed told a man she worked at the florist's in the La Fonda hotel complex, to which,
after a moment of deep thought, he accurately retorted, "There is no florist in La Fonda."
Another woman reported that she had told a man she worked for the Governor and she
had to get back to work to take dictation. After some minutes, it occurred to the politically
astute man that the Governor was currently out of the state. Other men found women out by
being given telephone exchanges or addresses that they knew did not exist. In such cases, a
man may eventually discover the correct phone number (or other access information) for
contacting the woman, to whom he will then express his indignation. One case reported to
me concerned a young woman who gave a young man the phone number of a rape crisis
center as her own, then encountered the same young man again the next night in another
restaurant bar. The provision of misleading information, then, is not a dodge to be undertaken lightly.
Another possible undermining occurred when a woman spoke or acted her misinformation in such a way that a man knew, or suspected, that he was being led astray. Unlikely
sounding information was usually a contributing factor. Here the man was left with three
options, all of which were realized in situations reported to me. First, some men chose to act
as if nothing special had occurred. Of course, it is also true that, by acting tactfully, the man
has saved himself the emotional outlay that would ensue were he to make a scene or the
possible complexities that could result were he to signal more forcefully his disbelief or disillusionment. This quite generous move on the man's part must, for the most part, remain unnoted by the observer, however, since, if it is performed correctly, secrecy is what defines it.
Again, sometimes a man gave the impression of accepting the information but did so
with a wise private smile or some other small show of amusement that let the woman know
that he realized he was being misled, yet he planned to do nothing more about it than communicate that fact. This might be coupled with a remark that consolidated the knowledge
otherwise communicated. Here men preserved for themselves the definition of perceptive
player and still let the woman off with a resolved set of role requirements.
Finally, some men chose to confront the woman openly with what they knew or suspected was her deception. Men revealed this in varying degrees of amusement, amazement,
or hostility. In particular, unfamiliar information might be mistaken for deliberate misinformation-as perhaps it was. For example, when a young woman appeared to have to think for
a moment before stating her name to a man in a bar, he thanked her sourly and asked for the
return of the drink he had bought her.
A woman who has intended to mislead may find that the man signals that he understands her reasons for doing so. These are, in fact, confrontations of the most satisfying sort,
391
392
GARDNER
for they signal the man's acceptance of a woman's necessity to deceive. One woman reported
to me that, after providing a naively false phone number, the man to whom she was speaking
in a store challenged her. "It is not!" he said with good spirits. "No," she said simply, "it isn't."
"You know," he said easily, "a girl's got to be careful." She heartily agreed, both apparently
forgetting that it was he she must be careful of.
The most disagreeable choice for the woman may be how to act when the man suggests
or even points out overtly that she has misled him. If he does so humorously, she may still
exit the encounter with some grace, especially if she is able to give an equally humorous
reply. One woman reported that she exchanged pseudonyms with a man at a bar; both chose
the names of movie stars and agreed happily that they had loved each other's latest picture.
These deceptions, once accepted, seemed to bring them closer, he having recognized and
respected her need for concealment and having signaled his respect by employing a cognate
"deceit" of his own.
When access information is not received sympathetically by the man, women sometimes
say that they are not so upset as they might have thought and meet male anger with confidence. I once watched a man in a hotel lobby reassure a reticent woman that he was not, in
fact, an ax murderer. She smiled, sighed, and said, "No, I'm sure you're not." But she offered
no substitute name and number. When a man protests, he has, from a woman's perspective,
exposed his ignorance of the social situation that has made her deceive. The man has shown
that he does not appreciate the dilemma in which she finds herself and, furthermore, that he
does not appreciate that he is the direct agent of this particular dilemma. Instead of being
chagrined at being caught, a woman may very well ask herself, if not the man, what he could
have expected her to do.
AccessInformation
durationand demonstratingto women who resent these briefbreachesthat they may, in fact,
be the lesser of two evils. A young woman at a fiesta food booth, for instance, heard two
youths compliment her looks. She ignoredthem, and they silently followed her to her car a
half block away, then resumed talk with proposalsof companionship. A young woman reportedthat her stepswere doggedthroughoutthree storeswhere she determinedlycarriedout
her errandswhile a man followed her at a distance of a step or two, occasionallyofferinga
commentary on her actions or suggestinga date. For many other men, however, it was
enough simply to follow women and let them know that they were being followed. This in
itself was sufficientto frightenwomen or annoy them. A young woman sat at a librarytable
trying to "readin peace,"but was joined-though there were other empty tables-by a young
man. She changed her table, and once again he joined her; he moved with her again and
again until at last he left. A young woman reportedthat she was followed at a supermarket
by a young man through successive aisles and finally to the same checkout line, but she
managed to leave the store with no furtherinterestby the man.
Women often say that being followed "routinely"by men in public places,inasmuchas it
is not done subtly, is unlike being followed by criminals,whose intent is truly malicious. Yet
they also reflect that they have never met "real"criminals (if they are lucky), so that they
would not know malicious intent if they saw it. The popularadvice on urban crime prevention for women counsels them that serious consequences may follow what seem mild
breaches of etiquette by men in public places. Again, women say they suspect that men
sometimes follow them in order to denote appreciation,but it is an appreciationthat a woman cannot successfullyacknowledge. If she does, she ratifiesa breachof etiquetteand initiates face-to-faceinteractionwith the man, and neither act reflectswell upon her.
Discussion
Restrictingaccess information,I have argued,is an intended control of access. Imposed
restrictionson accessinformationmay be undermined,however, by the woman'sappearance
and by male strangerswho imply that the woman who controlsaccess informationsignals
inappropriatedistrust.Yet women often combine fears about disclosing access information
with fears of rape or murderat the hands of some male stranger. Both women and men can
deal with access informationstrategically,and these strategiescan become playful;yet even
in playful instances,there remainsa fearby women of men in public placesand the suspicion
that access informationdisclosurewill, at least, reducetheir privacyand, at most, make them
victims of crime. I would now like to suggestthat accessinformationis partof a more general
supply of informationthe individualcarriesaroundthat is to be distributedor to be withheld
judiciouslyfrom othersin public places.I will referto this more generalsupply as a knowledge
preserve.
The usage of "preserve"as a metaphor for information given off by the individual is
derived from Goffman's(1971) discussion of different territorialconfigurationsas reflecting
the self, as, for instance, one's spot on a queue is, as one's space on a restaurantseat is, with
the "right"to that seat marked with a coat or hat that stands in for the absent self Access
informationis a concept pertinent to these public preserves,both as it can representdistant
spatialpreservesand in that its existence arguesfor anothersort of preservethat the individual may experience, a preservecomposedof knowledge about the individual.
No doubt the canonical varieties of personal preserve evident in public places are spatial-a person'splace in line, his or her seat at a place of business-as Goffmanpresentsthem,
and no doubt the individual will experiencestrongemotions in connection with violation of
his or her spatialpreserves. Yet the various aspectsof knowledge preserveslike access information, invisible for the most part,also play, as I have shown, a deeply importantpart in an
393
394
GARDNER
individual's life in public. The elements of access information and the practices associated
with seeking and disclosing them symbolize significant issues for their possessors and crucial
problems of the social self. One such problem is the difference between the individual's "real"
and "situated" selves (Goffman, 1959, 1963).
In a society where women find that they must manage and conceal information in different ways than men, they are bound also to feel under greater restrictions to conceal their true
selves. What restrictions on items of importance such as the name suggest are emphasized by
the restrictions on more prosaic items of information like address and workplace. Here, the
real self has no choice but to erect a barrier against others that embraces even quite basic
information; less palatable still may be the necessity of lying about this information. The felt
necessity to deceive rather than to communicate directly lack of interest in a man also perpetuates the "nice girl" as a social type and therefore imposes its own element of control (see
Fox, 1977).
Thereis the relatedquestionof what sortof socialpersonalitytypes the situationof access
informationrules and practicesentail. If both men and women disbelieve the information
given in the pursuit and divulgence of access information-indeed, if both dissemble-it is
not likely, for example, that mutual trustbetween the sexes will be encouraged. In this case,
one of the everyday enactmentsof gender inequality,a familiarstereotypecan be seen: the
appetent male seeks something of the withholding female, and both are obliged to exercise
whatever devices may be at their disposalto foil the other'squest. Insofaras this is so, access
informationpracticesreinforcesocietal requirementsfor gender stereotypy.
Access informationpracticesalso expressthe vexed position of women in public, a position with which they will be faced elsewhere: when encounters are attempted, when
breachesare committed,when servicedealingswith men go subtlyastray. Perhapsthis study
will serve in part to remedy the fact that women have been ignored in the study of public
places in general. It may fill the need some researchershave noted for studiesof interaction
that document the use of power in specific situations and with specific contingencies(see
Kramaraeet al., 1984;Sherzer,1977).
Recently,CarolA. B. Warren(1988)has written of the importanceof genderas a variable
in field research,not only as a variablethat must be taken into accountwhen judginginteractions, but as a force that enables us to test the theorieswe generate. In this context, I suggest
that the sociologyof behaviorin public places is not and cannot be genderneutral. Certainly
female and male perspectives on access information practices-just as on sexual harassment-reflect differentexperience. To help balance the male perceptionof access, I might
suggest-parallel to what Crosthwaiteand Swanton (1986) have suggestedfor the different
perspectiveswomen and men have on sexual harassment-a view that objectsto accessinformation incursionsbecause they involve inadequateconsiderationof the interestsof another.
References
Abu-Lughod,Lila
1984 QatariWomen:PastandPresent.NewYork:Longman.
Arnold,Peter
1975 LadyBeware!GardenCity,NY:Doubleday.
Ashwood,Thomas
1974 ThisIs YourCaptainSpeaking.NewYork:Stein&Day.
Barrows, Sydney Biddle
1986 Mayflower Madam: The Secret Life of Sydney Biddle Barrows. New York: Arbor House.
Bart, Pauline and Patricia O'Brien
1984 "Stopping rape: effective avoidance strategies." Signs 10:83-101.
Access Information
395
396
GARDNER
Kazin, Alfred
1978 New York Jew. New York: Knopf.
Kramarae, Cheris, Muriel Schulz, and William M. O'Barr
1984 "Toward an understanding of language and power." Pp. 9-22 in Cheris Kramarae, Muriel
Schulz, and William M. O'Barr (eds.), Language and Power. Beverly Hills, CA: Sage.
Krupp, Charla
1978 "Solving your problem: 84 ways to feel safer." Mademoiselle October:142-43, 146, 152.
Laermann, Klaus
1978 "Kommunikation an der Theke. Uber einige Interaktionsformen in Kneipen und Bars."
["Communication at a bar: on some forms of interaction in public houses and bars."]
K61ner Zeitschrift fiir Soziologie und Sozialpsychologie 20 (Supplement):420-30.
Lamb, Theodore A.
1981 "Nonverbal and and paraverbal control in dyads and triads: sex or power differences?"
Social Psychology Quarterly 44:49-53
Lauterbach, Jacob Z.
1932 "The naming of children in Jewish folklore, ritual, and practice." Central Conference of
American Rabbis 42:316-60.
Mandell, Mel
1972 Being Safe. New York: Saturday Review Press.
Mernissi, Fatima
1987 Beyond the Veil: Male-Female Dynamics in Modern Muslim Society. Bloomington, IN:
Indiana University Press.
Minai, Naila
1981 Women in Islam: Tradition and Transition in the Middle East. New York: Seaview.
Monroe, Marilyn
1974 My Story. New York: Stein & Day.
Murray, Thomas E.
1985 "The language of singles bars." American Speech 60:17-30.
Otis, Leah L.
1985 Prostitution in Medieval Society: The History of an Urban Institution in Languedoc.
Chicago: University of Chicago Press.
Peck, Arlene
1978 "The southern Jewish American princess." Pp.31-40 in Edith Blicksilver (ed.), The EthnicAmerican Woman. Dubuque, IA: Kendall/Hunt.
Price, Robert and Sally Price
1972 "Saramaka onomastics." Ethnology 11:341-67.
Reiter, Rayna R.
1975 "Men and women in the south of France: public and private domains." Pp. 252-82 in
Rayna R. Reiter (ed.), Toward an Anthropology of Women. New York: Monthly Review
Press.
Sedgwick, John
1982 Night Vision: Confessions of Gil Lewis, Private Eye. New York: Simon & Schuster.
Sheppard, Dick
1974 Elizabeth: The Life and Career of Elizabeth Taylor. New York: Doubleday.
Sherzer, Joel
1977 "The ethnography of speaking: a critical appraisal." Pp. 43-57 in Muriel Saville-Troike
(ed.), Linguistics and Anthropology. Washington, DC: Georgetown University Press.
Starr, Joyce and Donald E. Cams
1972 "Singles in the city." Trans-Action 9:43-48.
Sutherland, Edwin H., annotator
1967 The Professional Thief. Chicago: University of Chicago Press.
Taub, Diane E.
1982 "Public sociability of college-aged homosexuals: the gay bar and cruise block."
Sociological Spectrum 2:291-305.
Vanderbilt, Amy
1972 Amy Vanderbilt's Etiquette. Garden City, NY: Doubleday.
Access Information
Vrugt, Anneke and Ada Kerkstra
1984 "Sex differences in nonverbal communication." Semiotica 50:1-41.
Waddy, Cheris
1980 Women in Muslim History. New York: Longman.
Walkowitz, Judith R.
1980 Prostitution and Victorian Society: Women, Class, and the State. New York: Cambridge
University Press.
Warren, Carol A. B.
1988 Gender Issues in Field Research. Beverly Hills, CA: Sage.
West, Candace and Don Zimmerman
1983 "Small insults: a study of interruptions in cross-sex conversations between unacquainted
persons." Pp. 103-17 in Barrie Thorne, Cheris Kramarae, and Nancy Henley (eds.),
Language, Gender, and Society. Rowley, MA: Newbury House.
Wise, Sue and Liz Stanley
1987 Georgie Porgie: Sexual Harassment in Everyday Life. New York: Pandora.
Young, John
1882 Our Deportment, Or, The Manners, Conduct and Dress of the Most Refined Society.
Chicago: Union Publishing.
397