SELECT AN EDITION:
9th EDITION   10th EDITION

 

Theory Resources

DEEPEN YOUR UNDERSTANDING OF THE THEORIES IN THE 10TH EDITION

 

Resources
by Type







 APPLICATION LOGS



 LINKS





Instructors can get additional
resources. Read more


New to Theory Resources?
Find out more in this
short video overview (3:01).

Application Logs
10th Edition
CHANGE TO
View by Theory

Student comments on practical use of a theory, from the Instructors Manual and additions to the website


List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12—Communication Privacy Management Theory

Andy
My girlfriend Rissa and I share many intimate details with each other. I remember this one occasion when she was telling me something that was super secretive and super private. Before she told me, she specified for about ten minutes that I could not tell anyone, not my best friend Ryan, not my parents, no one. I had to swear on my life that I would not let this piece of information get out. After all this hassle, she finally told me. Communication Privacy Management theory explains Rissa and my behavior. She felt that she owned this piece of information. It was hers to share or hers not to share. Even after she told me, she still wanted to have the power and control to do with it how she wanted to. When she decided to tell me this information, she was bringing me into her circle, and we were now co-owners of the information. When she specified that I couldn’t tell anyone, she was setting privacy boundaries and we were negotiating the privacy of the information that both of us now know. But no matter how carefully you set up the boundaries, it doesn’t mean the other person will follow through on your wishes.



You can access Application Logs for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



Resources
by Type






 VIDEOS

 APP LOGS

 ESSAY


 LINKS





Instructors can get
additional resources.
Read more

New to Theory
Resources?

Find out more
in this short
video overview
(3:01).

Application Logs
10th Edition
CHANGE TO
View by Theory

Student comments on practical use of a theory, from the Instructors Manual and additions to the website


List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter 12—Communication Privacy Management Theory

Andy
My girlfriend Rissa and I share many intimate details with each other. I remember this one occasion when she was telling me something that was super secretive and super private. Before she told me, she specified for about ten minutes that I could not tell anyone, not my best friend Ryan, not my parents, no one. I had to swear on my life that I would not let this piece of information get out. After all this hassle, she finally told me. Communication Privacy Management theory explains Rissa and my behavior. She felt that she owned this piece of information. It was hers to share or hers not to share. Even after she told me, she still wanted to have the power and control to do with it how she wanted to. When she decided to tell me this information, she was bringing me into her circle, and we were now co-owners of the information. When she specified that I couldn’t tell anyone, she was setting privacy boundaries and we were negotiating the privacy of the information that both of us now know. But no matter how carefully you set up the boundaries, it doesn’t mean the other person will follow through on your wishes.



You can access Application Logs for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.
Resources available to all users:

  • Theory Overview—abstract of each chapter
  • Self-Help Quizzes—for student preparation
  • Chapter Outlines
  • Key Names—important names and terms in each chapter
  • Conversation Videos—interviews with theorists
  • Application Logs—student application of theories
  • Essay Questions—for student prepatation
  • Suggested Movie Clips—tie-in movie scenese to theories
  • Links—web resources related to each chapter
  • Primary Sources—for each theory with full chapter coverage
  • Further Resources—bibliographic and other suggestions
  • Changes—for each theory, since the previous edition
  • Theory Archive—PDF copies from the last edition in which a theory appeared

Resources available only to registered instructors who are logged in:

  • Discussion Suggestions
  • Exercises & Activities
  • PowerPoint® presentations you can use
  • Short Answer Quizzes—suggested questions and answers
  • Compare Texts—comparison of theories covered in A First Look and ten other textbooks

Information for Instructors. Read more


 

Copyright © Em Griffin 2020 | Web design by Graphic Impact