Untitled Flashcards Set

Introduction to Human Communication Theory

  • Principles of Communication – Fundamental concepts that guide human communication.

  • Post-positivism, Interpretivism, and Critical Paradigms – The three primary paradigms in communication theory:

    • Post-positivism – Assumes objective reality and seeks causal explanations.

    • Interpretivism – Focuses on subjective meanings and human experience.

    • Critical Paradigm – Examines power, ideology, and societal structures.

  • Theory – A systematic explanation of communication phenomena.

  • Criteria of a Good Theory – Includes explanatory power, predictive ability, simplicity, internal consistency, and practical utility.

  • Comparing and Contrasting Theories – Evaluating similarities and differences between different communication theories.


Uncertainty Reduction Theory (URT)

  • Motivations for Reducing Uncertainty – Factors that increase our desire to reduce uncertainty:

    1. Anticipation of future interaction

    2. Incentive value

    3. Deviance (unexpected behavior)

  • Information-Seeking Strategies – Four ways people gather information:

    1. Passive (observing others)

    2. Active (asking third parties)

    3. Interactive (direct conversation)

    4. Extractive (searching online)

  • Limitations of URT – Situations where people may not want to reduce uncertainty, such as avoiding negative information.


Social Penetration Theory (SPT)

  • Personality Metaphor – The human personality is like an onion, with four layers:

    1. Superficial

    2. Intimate

    3. Personal

    4. Core

  • Penetration vs. De-penetration – The process of relationship development through disclosure versus relationship deterioration.

  • Dimensions of Disclosure – Includes breadth (range of topics) and depth (intimacy level).

  • Reciprocity in Disclosure – The norm that people match the depth of disclosure in conversations, especially early in relationships.

  • Limitations of SPT – Situations where disclosure does not follow predictable patterns.


Communication Privacy Management Theory (CPM)

  • Ownership & Co-ownership – The idea that individuals control their private information, but others may share ownership when they disclose it.

  • Boundary – The metaphorical line that separates private and shared information.

  • Implicit vs. Explicit Rules – Petronio suggests privacy rules can be stated outright (explicit) or assumed (implicit).

  • Factors Affecting Privacy Management

    • Core criteria – Stable, personal privacy rules.

    • Catalyst criteria – Situational factors that cause changes in privacy management.

  • Types of Confidants

    1. Deliberate confidant – Someone intentionally given private information.

    2. Reluctant confidant – Someone who accidentally receives private information.

    3. Boundary insider – Someone who is expected to uphold privacy rules.

  • Boundary Turbulence vs. Breakdown – Turbulence refers to conflicts in privacy management, while a breakdown is a complete failure in privacy control.

  • Limitations of CPM Theory – Situations where privacy boundaries are ambiguous or context-dependent.


Expectancy Violations Theory (EVT)

  • Expectancy Violation – When someone behaves in a way that deviates from expected norms.

  • Positive vs. Negative Valence

    • Positive valence – The unexpected behavior is perceived favorably.

    • Negative valence – The unexpected behavior is perceived unfavorably.

  • Arousal – The heightened awareness that results from an expectancy violation.

  • Communicator Reward Valence – The overall positive or negative value assigned to a communicator based on their attractiveness, credibility, or power.

  • Limitations of EVT – Situations where expectations are unclear or culturally dependent.


Politeness Theory

  • Self-Presentation – How individuals manage their image in social interactions.

  • Front Stage vs. Backstage

    • Front stage – Where individuals actively manage impressions.

    • Backstage – Where individuals can relax and be themselves.

  • Positive Face vs. Negative Face

    • Positive face – The need for approval and appreciation.

    • Negative face – The need for autonomy and freedom.

  • Face-Threatening Acts (FTAs) – Actions that challenge a person’s positive or negative face.

  • Politeness Strategies – Five ways people mitigate face-threatening acts:

    1. No comment – Avoiding the act.

    2. Off-record strategy – Indirect communication.

    3. Positive face redress – Complimenting before making a request.

    4. Negative face redress – Acknowledging imposition before making a request.

    5. Bald on-record strategy – Being direct without politeness.

  • Factors Affecting Politeness Strategy Use

    1. Power – Higher-status individuals may use fewer politeness strategies.

    2. Social distance – The closer the relationship, the less need for politeness.

    3. Rank of imposition – More threatening acts require more politeness.