Understanding Key Communication Theories in Social Interaction
Symbolic Interactionism (Chapter 5)
Symbolic interaction: The idea that people create meaning through language and symbols in social interaction.
Minding: The inner dialogue we use to rehearse how others might react to our actions before we act.
Taking the role of the other: Imagining how another person sees a situation to guide our behavior.
Looking-glass self: The idea that our self-concept is shaped by how we think others view us.
“I” vs “Me”:
“I” = spontaneous, unpredictable, creative part of the self (subject).
“Me” = reflective, socially shaped, rule-following part of the self (object).
Self-fulfilling prophecy: A belief or expectation that leads people to act in ways that make the belief come true.
Social Penetration Theory (Chapter 8)
Social penetration: The process of developing deeper intimacy with another through mutual self-disclosure.
Personality structure: Layers of self, like an onion, from outer (public) to inner (private) aspects.
Self-disclosure: Sharing personal information with others to build closeness.
Depth of penetration: Degree of intimacy of shared information (how personal it is).
Law of reciprocity: People tend to match each other’s self-disclosures in both depth and breadth.
Breadth of penetration: Range of topics discussed.
Social exchange: Relationships are based on cost–benefit analysis.
Outcome: Net result of rewards minus costs in a relationship.
Minimax principle: People seek to maximize rewards and minimize costs.
Comparison level (CL): Personal standard for what we expect/deserve in a relationship.
Comparison level of alternatives (CLalt): Evaluation of whether alternatives are better than the current relationship.
Expectancy Violation Theory (Chapter 6)
Theory definition: EVT explains how people respond to unexpected behaviors that violate social norms or expectations.
Personal space: The invisible, variable zone around us that defines preferred distance.
Relational arousal: Heightened attention and awareness due to expectancy violation.
Expectancy: What people predict will happen in a given context.
Context: Situation or environment shaping expectations.
Relationship: Type of relationship (intimate, formal, casual) influences expectations.
Communicator characteristics: Traits like age, gender, style, and personality that affect expectations.
Violation valence: Whether the unexpected behavior is perceived positively or negatively.
Communicator reward valence: Overall value of the violator (attractiveness, credibility, power) that shapes how the violation is interpreted.
Uncertainty Reduction Theory (Chapter 9)
Uncertainty reduction: The process of gaining knowledge to predict and explain others’ behavior.
Axiom: A foundational truth or assumption of the theory.
Three factors driving uncertainty reduction:
Anticipation of future interaction (expect to meet again)
Incentive value (the other has something we want)
Deviance (the other acts in unexpected ways)
Eight axioms:
↑ Verbal communication → ↓ uncertainty
↑ Nonverbal warmth → ↓ uncertainty
↑ Information seeking → ↑ uncertainty reduction
↑ Self-disclosure → ↓ uncertainty
↑ Reciprocity → ↑ uncertainty reduction
↑ Similarity → ↓ uncertainty
↑ Liking → ↓ uncertainty
↑ Shared networks → ↓ uncertainty
Relational anxiety: Stress from not knowing what will happen in a relationship.
Efficacy: Belief in your ability to gather and use information effectively.
Strategies to reduce uncertainty:
Passive: Observing others.
Active: Asking others or seeking indirect information.
Interactive: Direct conversation with the person.
Extractive: Searching online or through digital traces.
Emotion & uncertainty: Emotions (e.g., fear, hope) influence motivation and strategies for reducing uncertainty.
Relational uncertainty: Doubts about relationship involvement, norms, or future.
Partner interference: When a partner’s actions obstruct personal goals, creating turbulence.
Relational turbulence: Periods of heightened relational uncertainty and interference, often during transitions.
Communication Privacy Management (Chapter 12)
Theory definition: Explains how people manage private information by setting boundaries about disclosure.
Private information: Personal details people decide to share or withhold.
Privacy ownership: The sense of control people feel over their private information.
Authorized vs unauthorized co-owners: Authorized are given permission; unauthorized receive information without consent.
Deliberate confidant: Someone intentionally chosen to share information.
Reluctant confidant: Someone who learns private information unintentionally or unwillingly.
Shareholder: A confidant who has a clear responsibility to manage private information carefully.
Stakeholder: Someone affected by private information, even if not directly told.
Privacy rules: Guidelines for sharing or withholding private information.
Core criteria: Stable values and cultural norms guiding privacy rules.
Catalyst criteria: Temporary, situation-based factors influencing disclosure.
Boundary ownership: Rights and responsibilities of those who know the information.
Mutual privacy boundary: Shared control of information once it’s disclosed.
Boundary permeability: Degree of openness or closeness of privacy boundaries.
Smooth boundary coordination: When co-owners manage information successfully.
Boundary linkage: Connection among people who share the information.
Three ways of managing collective boundaries: Negotiating, coordinating, or ignoring rules.
Boundary turbulence: Breakdown in privacy management due to mistakes, rule violations, or conflicting expectations.
