1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
understanding relationships
mutual influence
repeated frequencies
unique interactional patterns
need fufillment
emotional attachment
irreplacement
social penetration theory can be compared to an ___ metaphor
onion
social penetration theory stage #1
superficial information is exchanged
social penetration theory stage #2
self-disclosure is reciprocal
social penetration theory stage #3
penetration is fast at the beginning, slows with each layer
social penetration theory stage #4
depenetration is the gradual process of layer-by-layer withdrawal
2 characteristics of self-disclosure
depth and breadth
depth of penetration
degree of intimacy
breadth
different topics/subjects disclosed (range)
idiosyncratic (SPT)
up to the individual on what they think is deep self-disclosure
valence (SPT)
things can be positively or negatively valenced, feeling we’re getting from self-disclosure
veracity (SPT)
is this true self-disclosure
social exchange theory
how people form relationships by weighing costs and benefits
minimax principle
we want to maximize benefits, minimize costs
comparison level
what we imagine a good relationship can be by compariosn to relationships we know
comparison level of alternatives
the best outcome available in other relationships; a standard for relational stability
communication privacy management theory
how people make choices about their private information through communication with others
cpmt ownership
we consider ourselves as owners of private information and who gets it
factors that affect personal privacy rules
cultural criteria
gender criteria
motivational criteria
contextual criteria
risk-benefit ratio
privacy boundaries
divisions between private information and public information
co-owners
might make someone a co-owner for private info
negotiation of privacy rules
expecting co-owners to follow the rules but they may not be governed by some criteria we are
boundary permeability
how thick is boundary around private info
boundary turbulence
disruptions/conflicts that arise when people try to organize management of private info