The screen on this device is not wide enough to display Theory Resources. Try rotating the device to landscape orientation to see if more options become available.
Resources available to all users:
Resources available only to registered instructors who are logged in:
Information for Instructors. Read more
Resources
by Type
Instructors can get additional
resources. Read more
New to Theory Resources?
Find out more in this
short video overview (3:01).
Scholarly and artistic references from the Instructors Manual and addition to the website
List mode: Normal (click on theory name to show detail) | Show All details | Clear details
Chapter 8—Social Penetration Theory
If students want to learn more about social exchange theory, Griffin’s chapter-length treatment from the Second Edition is a good place to begin (available in the theory archive at www.afirstlook.com).
For some applications of SPT in a technology-driven age, a few good articles to explore include:
Jesse Fox and Andrew Gambino. “Relationship Development with Humanoid Social Robots: Applying Interpersonal Theories to Human–Robot Interaction,” CyberPsychology, Behavior & Social Networking, Vol. 24 (5), 2021, pp.294–99.
L. Crystal Jiang, Natalya N. Bazarova, and Jeffrey T. Hancock. “From Perception to Behavior: Disclosure Reciprocity and the Intensification of Intimacy in Computer-Mediated Communication.” Communication Research, Vol. 40 (1), 2013, pp. 125–43.
Babajide Osatuyi, Katia Passerini, Aurelio Ravarini, and Sukeshini A. Grandhi, “‘Fool me once, shame on you… then, I learn.’ An examination of information disclosure in social networking sites,” Computers in Human Behavior, Vol. 83, 2018, pp. 73-86.
Babajide Osatuyi, “Is Lurking an Anxiety-masking Strategy on Social Media Sites? The Effects of Lurking and Computer Anxiety on Explaining Information Privacy Concern on Social Media Platforms,” Computers in Human Behavior, Vol. 49, pp. 324-332.
Natalie Pennington, “An Examination of Relational Maintenance and Dissolution through Social Networking Sites.” Computers in Human Behavior, Vol. 105 (April), 2020.
Erin K. Ruppel, “The Affordance Utilization Model: Communication Technology Use as Relationships Develop,” Marriage & Family Review, Vol. 51, pp. 669-686.
Jih-Hsin Tang and Cheng-Chung Wang, “Self-disclosure Among Bloggers: Re-examination of Social Penetration Theory,” CyberPsychology, Behavior & Social Networking, Vol. 15, 2012, pp. 245-250.
Sonja Utz, “The Function of Self-disclosure on Social Network Sites: Not Only Intimate, but also Positive and Entertaining Self-disclosures Increase the Feeling of Connection,” Computers in Human Behavior, Vol. 45, 2015, pp. 1-10.
Other applied settings
Jinsoo Hwang, Heesup Han, and Seongseop Kim. “How Can Employees Engage Customers?: Application of Social Penetration Theory to the Full-Service Restaurant Industry by Gender,” International Journal of Contemporary Hospitality Management, Vol. 27 (6), 2015, pp. 1117–34.
Stephaine M. Mangus, Dora E. Bock, Eli Jones, and Judith Anne Garretson Folse.“Examining the Effects of Mutual Information Sharing and Relationship Empathy: A Social Penetration Theory Perspective,” Journal of Business Research, Vol. 109 (March), 2020, pp. 375–84.
Yipeng Tang, Erica Xu, Xu Huang, and Xiaoping Pu. “When Can Display of Authenticity at Work Facilitate Coworker Interactions? The Moderating Effect of Perception of Organizational Politics.” Human Relations, 2021, July.
You can access Further Resouces for a particular chapter in several ways:
Resources
by Type
Instructors can get
additional resources.
Read more
New to Theory
Resources?
Find out more
in this short
video overview
(3:01).
Scholarly and artistic references from the Instructors Manual and addition to the website
List mode: Normal (click on theory name to show detail) | Show All details | Clear details
Chapter 8—Social Penetration Theory
If students want to learn more about social exchange theory, Griffin’s chapter-length treatment from the Second Edition is a good place to begin (available in the theory archive at www.afirstlook.com).
For some applications of SPT in a technology-driven age, a few good articles to explore include:
Jesse Fox and Andrew Gambino. “Relationship Development with Humanoid Social Robots: Applying Interpersonal Theories to Human–Robot Interaction,” CyberPsychology, Behavior & Social Networking, Vol. 24 (5), 2021, pp.294–99.
L. Crystal Jiang, Natalya N. Bazarova, and Jeffrey T. Hancock. “From Perception to Behavior: Disclosure Reciprocity and the Intensification of Intimacy in Computer-Mediated Communication.” Communication Research, Vol. 40 (1), 2013, pp. 125–43.
Babajide Osatuyi, Katia Passerini, Aurelio Ravarini, and Sukeshini A. Grandhi, “‘Fool me once, shame on you… then, I learn.’ An examination of information disclosure in social networking sites,” Computers in Human Behavior, Vol. 83, 2018, pp. 73-86.
Babajide Osatuyi, “Is Lurking an Anxiety-masking Strategy on Social Media Sites? The Effects of Lurking and Computer Anxiety on Explaining Information Privacy Concern on Social Media Platforms,” Computers in Human Behavior, Vol. 49, pp. 324-332.
Natalie Pennington, “An Examination of Relational Maintenance and Dissolution through Social Networking Sites.” Computers in Human Behavior, Vol. 105 (April), 2020.
Erin K. Ruppel, “The Affordance Utilization Model: Communication Technology Use as Relationships Develop,” Marriage & Family Review, Vol. 51, pp. 669-686.
Jih-Hsin Tang and Cheng-Chung Wang, “Self-disclosure Among Bloggers: Re-examination of Social Penetration Theory,” CyberPsychology, Behavior & Social Networking, Vol. 15, 2012, pp. 245-250.
Sonja Utz, “The Function of Self-disclosure on Social Network Sites: Not Only Intimate, but also Positive and Entertaining Self-disclosures Increase the Feeling of Connection,” Computers in Human Behavior, Vol. 45, 2015, pp. 1-10.
Other applied settings
Jinsoo Hwang, Heesup Han, and Seongseop Kim. “How Can Employees Engage Customers?: Application of Social Penetration Theory to the Full-Service Restaurant Industry by Gender,” International Journal of Contemporary Hospitality Management, Vol. 27 (6), 2015, pp. 1117–34.
Stephaine M. Mangus, Dora E. Bock, Eli Jones, and Judith Anne Garretson Folse.“Examining the Effects of Mutual Information Sharing and Relationship Empathy: A Social Penetration Theory Perspective,” Journal of Business Research, Vol. 109 (March), 2020, pp. 375–84.
Yipeng Tang, Erica Xu, Xu Huang, and Xiaoping Pu. “When Can Display of Authenticity at Work Facilitate Coworker Interactions? The Moderating Effect of Perception of Organizational Politics.” Human Relations, 2021, July.
You can access Further Resouces for a particular chapter in several ways:
Copyright © Em Griffin 2024 | Web design by Graphic Impact