SELECT AN EDITION:
9th EDITION   10th EDITION   11th EDITION
A First Look at Communication Theory Reveal main menu
 

The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.

Resources available to all users:

  • Text Comparison—theories covered in A First Look and ten other textbooks
  • Theory Overview—abstract of each chapter
  • Self-Help Quizzes—for student preparation
  • Chapter Outlines
  • Key Names—important names and terms in each chapter
  • Conversation Videos—interviews with theorists
  • Application Logs—student application of theories
  • Essay Questions—for student prepatation
  • Suggested Movie Clips—tie-in movie scenese to theories
  • Links—web resources related to each chapter
  • Primary Sources—for each theory with full chapter coverage
  • Further Resources—bibliographic and other suggestions
  • Changes—for each theory, since the previous edition
  • Theory Archive—PDF copies from the last edition in which a theory appeared

Resources available only to registered instructors who are logged in:

  • Discussion Suggestions
  • Exercises & Activities
  • PowerPoint® presentations you can use
  • Short Answer Quizzes—suggested questions and answers

Information for Instructors. Read more


CHANGE TO View by Theory
Further Resources
10th Edition

Scholarly and artistic references from the Instructors Manual and addition to the website

List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter  8Social Penetration Theory


  • If students want to learn more about social exchange theory, Griffin’s chapter-length treatment from the Second Edition is a good place to begin (available in the theory archive at www.afirstlook.com). 
  • For some applications of SPT in a technology-driven age, a few good articles to explore include:
    • Babajide Osatuyi, Katia Passerini, Aurelio Ravarini, and Sukeshini A. Grandhi, “‘Fool me once, shame on you… then, I learn.’ An examination of information disclosure in social networking sites,” Computers in Human Behavior, Vol. 83, 2018, pp. 73-86.
    • Babajide Osatuyi, “Is Lurking an Anxiety-masking Strategy on Social Media Sites? The Effects of Lurking and Computer Anxiety on Explaining Information Privacy Concern on Social Media Platforms,” Computers in Human Behavior, Vol. 49, pp. 324-332.
    • Erin K. Ruppel, “The Affordance Utilization Model: Communication Technology Use as Relationships Develop,” Marriage & Family Review, Vol. 51, pp. 669-686.
    • Jih-Hsin Tang and Cheng-Chung Wang, “Self-disclosure Among Bloggers: Re-examination of Social PenetrationTheory,” CyberPsychology, Behavior & Social Networking, Vol. 15, 2012, pp. 245-250.
    • Sonja Utz, “The Function of Self-disclosure on Social Network Sites: Not Only Intimate, but also Positive and Entertaining Self-disclosures Increase the Feeling of Connection,” Computers in Human Behavior,Vol. 45, 2015, pp. 1-10. 

Johari window

  • If you present the Johari window to complement and contrast with social penetration, see:
    • Terry R. Armstrong, “Revisiting the Johari Window: Improving Communications Through Self-disclosure and Feedback,” Human Development, Vol. 27, 2006, pp. 10-14.
    • Moshe Bensimon, and Dorit Amir, “Sharing My Music with You: The Musical Presentation as a Tool for Exploring, Examining and Enhancing Self-awareness in a Group Setting,” The Journal of Creative Behavior, Vol. 44, 2010, pp. 259-277.
    • Lynn Little, “Leadership Communication and the Johari Window,” Administrator, Vol. 24, 2005, p. 4.


You can access Further Resouces for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



Resources
by Type


Instructors can get
additional resources.
Read more






 VIDEOS


 ESSAY


 LINKS


 RESOURCES



New to Theory
Resources?

Find out more
in this short
video overview
(3:01).

CHANGE TO View by Theory
Further Resources
10th Edition

Scholarly and artistic references from the Instructors Manual and addition to the website

List mode: Normal (click on theory name to show detail) | Show All details | Clear details

Chapter  8Social Penetration Theory


  • If students want to learn more about social exchange theory, Griffin’s chapter-length treatment from the Second Edition is a good place to begin (available in the theory archive at www.afirstlook.com). 
  • For some applications of SPT in a technology-driven age, a few good articles to explore include:
    • Babajide Osatuyi, Katia Passerini, Aurelio Ravarini, and Sukeshini A. Grandhi, “‘Fool me once, shame on you… then, I learn.’ An examination of information disclosure in social networking sites,” Computers in Human Behavior, Vol. 83, 2018, pp. 73-86.
    • Babajide Osatuyi, “Is Lurking an Anxiety-masking Strategy on Social Media Sites? The Effects of Lurking and Computer Anxiety on Explaining Information Privacy Concern on Social Media Platforms,” Computers in Human Behavior, Vol. 49, pp. 324-332.
    • Erin K. Ruppel, “The Affordance Utilization Model: Communication Technology Use as Relationships Develop,” Marriage & Family Review, Vol. 51, pp. 669-686.
    • Jih-Hsin Tang and Cheng-Chung Wang, “Self-disclosure Among Bloggers: Re-examination of Social PenetrationTheory,” CyberPsychology, Behavior & Social Networking, Vol. 15, 2012, pp. 245-250.
    • Sonja Utz, “The Function of Self-disclosure on Social Network Sites: Not Only Intimate, but also Positive and Entertaining Self-disclosures Increase the Feeling of Connection,” Computers in Human Behavior,Vol. 45, 2015, pp. 1-10. 

Johari window

  • If you present the Johari window to complement and contrast with social penetration, see:
    • Terry R. Armstrong, “Revisiting the Johari Window: Improving Communications Through Self-disclosure and Feedback,” Human Development, Vol. 27, 2006, pp. 10-14.
    • Moshe Bensimon, and Dorit Amir, “Sharing My Music with You: The Musical Presentation as a Tool for Exploring, Examining and Enhancing Self-awareness in a Group Setting,” The Journal of Creative Behavior, Vol. 44, 2010, pp. 259-277.
    • Lynn Little, “Leadership Communication and the Johari Window,” Administrator, Vol. 24, 2005, p. 4.


You can access Further Resouces for a particular chapter in several ways:

  • Switch to View by Theory, then select the desired theory/chapter from the drop-down list at the top of the page. Look in the list of available resources.
  • To quickly find a theory by chapter number, use the Table of Contents and link from there. It will take you directly to the theory with available options highlighted.
  • You can also use the Theory List, which will take you directly to the theory with available options highlighted.

Back to top



 

Copyright © Em Griffin 2024 | Web design by Graphic Impact