social penetration theory, social exchange theory, & communication privacy management theory

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

understanding relationships

  • mutual influence

  • repeated frequencies

  • unique interactional patterns

  • need fufillment

  • emotional attachment

  • irreplacement

2
New cards

social penetration theory can be compared to an ___ metaphor

onion

3
New cards

social penetration theory stage #1

superficial information is exchanged

4
New cards

social penetration theory stage #2

self-disclosure is reciprocal

5
New cards

social penetration theory stage #3

penetration is fast at the beginning, slows with each layer

6
New cards

social penetration theory stage #4

depenetration is the gradual process of layer-by-layer withdrawal

7
New cards

2 characteristics of self-disclosure

depth and breadth

8
New cards

depth of penetration

degree of intimacy

9
New cards

breadth

different topics/subjects disclosed (range)

10
New cards

idiosyncratic (SPT)

up to the individual on what they think is deep self-disclosure

11
New cards

valence (SPT)

things can be positively or negatively valenced, feeling we’re getting from self-disclosure

12
New cards

veracity (SPT)

is this true self-disclosure

13
New cards

social exchange theory

how people form relationships by weighing costs and benefits

14
New cards

minimax principle

we want to maximize benefits, minimize costs

15
New cards

comparison level

what we imagine a good relationship can be by compariosn to relationships we know

16
New cards

comparison level of alternatives

the best outcome available in other relationships; a standard for relational stability

17
New cards

communication privacy management theory

how people make choices about their private information through communication with others

18
New cards

cpmt ownership

we consider ourselves as owners of private information and who gets it

19
New cards

factors that affect personal privacy rules

  • cultural criteria

  • gender criteria

  • motivational criteria

  • contextual criteria

  • risk-benefit ratio

20
New cards

privacy boundaries

divisions between private information and public information

21
New cards

co-owners

might make someone a co-owner for private info

22
New cards

negotiation of privacy rules

expecting co-owners to follow the rules but they may not be governed by some criteria we are

23
New cards

boundary permeability

how thick is boundary around private info

24
New cards

boundary turbulence

disruptions/conflicts that arise when people try to organize management of private info