• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
a type of self-disclosure presenting one's attitudes, opinions, assessments of person/place or thing (reciprocated)
Evaluative Intimacy
type of self-disclosure objective observation, self-revelations, personal info
Descriptive Intimacy
Theory with each relationship assessed in terms of rewards and costs developing more intimacy over time, depth(content) and breadth (number)
Social Penetration Theory
refers to behavior so common its expected, offering communicative response that matches a partner's previous communication
The Norm of Reciprocity
phenomenon of communicator matching partner's previous disclosure at a similar level of intimacy (part of norm of reciprocity)
Dyadic Effect
Reasons to reciprocate (match)
1. appropriate in context
2. when you trust person
3. exchange so you don't feel indebted to other person
Reasons for Topic Avoidance
Relationship-based motivation (effects)
Individual based (your image)
Information based (what you have to say)
types of family secrets
Taboo (substance, suicide)
Rule Violation (partying, premarital)
Conventional (traditions)
says ppl balance protecting themselves and protecting others
degree of expressiveness and protectiveness
Model of Disclosure Decision Rules
Decision rules stating we need to be open and the degree of trust because disclosure makes us susceptible to hurt
Tolerance of Vulnerability
decision rule discussing infor about some feature of our partner compromising
perceived need to be honest about issue at hand
our restraint that certain topics should be avoided
Likelihood of Candor
how ppl in various relationships create and coordinate their privacy boundaries, the amount of disclosure defines our privacy
Communication Privacy Management
criteria/standards, help decide whether to disclose or the keep private
Privacy rule foundations
how boundaries are created and used
Boundary coordination operations
negotiating boundaries how ppl respond to private disclosure from others
Boundary coordination
Five Suppositions of communication privacy management
1. private info constitutes content of disclosure
2. boundaries how what is personal and shared
3. private info something they own and control
4. rules to coordinate what is personally and collectively controlled
5. assumes people experience dialectical tensions
variation between not revealing info and revealing a lot of info
permeability
reflect opposing means giving up our privacy and that ppl fluctuate between desire to be open and desire to be private
Dialectical tensions
Privacy rule Foundations
cultural criteria
gendered criteria
contextual criteria
motivational criteria
risk-benefit criteria
when private info becomes collectively shared
Boundary linkages
how boundary linkages occur
transformation
appropriation