Nobody downloaded yet

Social Penetration Theory of Irwin Altman & Dalmas Taylor - Term Paper Example

Comments (0) Cite this document
Abstract In today’s modern technological age, new forms of communication have arisen. Cyberspace, as life on the Internet is known, is full of different Social Media platforms that people ranging from young adolescents to the elderly participate in. While interacting with each other, they form relationships with people they would never have come into contact with…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Social Penetration Theory of Irwin Altman & Dalmas Taylor
Read TextPreview

Extract of sample "Social Penetration Theory of Irwin Altman & Dalmas Taylor"

Download file to see previous pages Similar to Altman and Taylor’s Social Penetration Theory of exposing more of themselves as levels of intimacy grew over time and interaction, the study of the Taiwanese adolescents indicated some similar patterns but some differences as well. As in the case of the popular onion peel model, the group comprised of males and females primarily teenagers, stated that they did engage more fully with members of the opposite sex as time progressed. Thus, as is the case where people go from revealing basic information to more and more personal information about themselves as they share degrees of companionship, so did the adolescents involved in the test. The results were comparable in real life to the Social Penetration Model. The results differed though with female participants compared to their male counterparts in cyberspace. The males progressed gradually, increasing as time and nature of the relationship grew. The females however, at first establishing a guarded level of self disclosure, gradually revealed more about themselves but then once again became more guarded when the relationship became that of a romantic or sexual one. The interaction performed solely in the realm of cyberspace was done only on the computer so physical and non-verbal communications were absent. While interacting with only a still photograph and written communication, the interaction between the participants would be far less intense than if they were together in person. Still another point that should be made, is that with the degree of anonymity and less vulnerability, the participants may have engaged in more forthright communication. The results also vary according to social norms, customs and cultural background. The females in Taiwan may have retreated when the degree of interaction became one of a sexual nature because of their upbringing and ideas about sexual involvement before marriage. This may not necessarily be the case among adolescents from other countries and cultures where promiscuity and sexual interaction are more widely accepted. Methods Used to Conduct this Research The survey used to compare the adolescents’ self-disclosure both in real life and in cyberspace consisted of a variety of questions about their desire to engage in conversation about different sexual topics at varying degrees of intimacy. Due to the anonymity, a deindividuated state is induced in cyberspace. The individuals then seem to be more apt to engage in sexual self-disclosure in cyberspace than in real life (Chiou andWan 2006). Therefore, sexual disclosure on the Internet may not be dependent on the level of intimacy in a relationship as it is in real life. The Taiwanese adolescents were divided into three groups from different demographic areas: Northern, Central and Southern Taiwan. An equal proportion of male and female subjects were used and also pertaining to the region they lived in. Therefore a broad cross section represented the participants in the study. The questionnaire used an 11-point scale and was comprised of 15 questions pertaining to feelings about pornography, sexually transmitted diseases, masturbation, sexual harassment and cybersex among others (Chiou and Wan 2006). Conclusions Found in the Study The researchers used mathematical formulas and computations to analyze the results. The ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Social Penetration Theory of Irwin Altman & Dalmas Taylor Term Paper”, n.d.)
Retrieved from
(Social Penetration Theory of Irwin Altman & Dalmas Taylor Term Paper)
“Social Penetration Theory of Irwin Altman & Dalmas Taylor Term Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Social Penetration Theory of Irwin Altman & Dalmas Taylor

Comparing Two Penetration Testing Methodologies. Penetration Testing versus Vulnerability Assessment

...? Comparing Two Penetration Testing Methodologies and Their Associated Tools By of Learning: Date: Comparing Two Penetration Testing Methodologies and Their Associated Tools Introduction Penetration Testing, which is commonly termed to as PenTest, refers to a process that is normally followed during the auditing or assessment of hardcore security. This methodology consists of a set of practices, rules, methods and procedures which are normally followed and later implemented in the process of auditing programs on any information security in an operating system environment. Penetration testing methodology explains the roadmap by defining the practical ideas and practices...
19 Pages(4750 words)Dissertation

Social penetration theory

...not happen and they are overlooking the other person’s inequity, the relationship may only hold for a small period of time before breaking apart. This is a part of the depenetration stage of social penetration process(Atman, & Taylor 116) Interactions happen at every level of the relationships from the orientation stage and intensify with time. Most relationships only end before the exploratory stage however, when they are still casual. And those that go down to the deeper levels remain at that point pulling back and forth at themselves and growing from time to time. The important concept at this point is the cost reward concept that allows for a person in his or her...
4 Pages(1000 words)Essay

Social Penetration Theory

...? Social penetration theory (Altman and Taylor) Lecturer: World Count: 826 Applying social penetration theory to personal experiences Introduction Social penetration (Irwin Altman and Dalmas Taylor) is the process of developing deeper intimacy with other people through self-disclosure and other forms of vulnerability. According to the theory, two people would end up being great friends if they proceeded in gradual fashion from superficial to deeper and intimate relationship....
4 Pages(1000 words)Essay

Penetration Pricing

...? 23rd November Penetration pricing One of the pricing strategies that is described by Tellis article is penetration pricing. Penetration pricing is a marketing strategy used by firm s to attract customers when there is a new product or services in the market. This method of marketing strategy aim is to lower the price of new products or services thus making the customers to be attracted to the firm. Lowering of prices makes competition stiff in the market and this makes rivals to look for other alternatives to compete with the firm that lowers the prices of products and services. This pricing strategy makes the customers to come in large numbers to buy the products due to its lower price...
3 Pages(750 words)Essay

Theory Of Social Penetration: Breakfast Club Movie

... Theory Of Social Penetration: Breakfast Club Movie One of the major theories used in the movie is referred to as theory of social penetration. This is depicted from relationship which develops from communication and moves from what is considered relatively shallow non-intimate levels to deeper and more personal intimacy. As demonstrated in the movie, social penetration theory gives description of human beings as those made up like onion layers. Each layer is representation of person’s character and eagerness towards self-disclosure of information which must be peeled...
6 Pages(1500 words)Essay

Market Penetration and Branding

... Market Penetration and Branding Sales promotion activities refer to a set of marketing mechanisms that are normally embraced by organizations or service providers in an attempt to boost the sales of their products or services. Sales promotion activities are often classified into either trade promotions or consumer sales promotions (Davis 169). Consumer sales promotions are activities, majorly advertisements that are used to make the consumers aware of specific products thereby drawing their attention into purchasing the products or services. Trade promotions, on the other hand, refer to incentives such as discounts, schemes, commissions and freebies that are meant to ensure that the traders stock up, and that...
1 Pages(250 words)Coursework

Social penetration theory

...section/# Cognitive Dissonance: Theory and Practice as it Relates to Human Interaction and Behavior It is without question that advertising and marketing heavily relies upon psychological instruments in order to integrate with the potential consumer. The fact of the matter is that advertising has become something of an art form in which marketers have sought to leverage various aspects of human psychological mechanisms as a way of convincing the potential buyer that they should buy a particular product or utilize a particular service. One of the most effective means by which this can be leveraged is with regards to what is known as cognitive dissonance. For purposes of this analysis, cognitive dissonance will be...
8 Pages(2000 words)Essay

Penetration Testing

...Penetration Testing al Affiliation Penetration testing hopes to achieve flawless systems thathave an all-round protection from any kind of intrusion. This is a report to show the findings and recommendations for penetration tests conducted to a high-end financial firm that deals with processing of loans for college students. The penetration tests conducted in the firm’s business system follow the (Trusted Computer System Evaluation Criteria, (TCSEC) standards of security testing (Department of Defense, 1985). In the standards documentation, of importance will be the testing of behavioral aspects of the system to identify possible security control breaches. E-commerce systems tend to be high-end targets to security breaches... and...
6 Pages(1500 words)Essay

Social Penetration Theory

...Social Penetration Theory Social Penetration Theory Altman and Taylor introduced social penetration theory in 1973 (Altman $ Taylor, 1973). The theory states that as tictiveiveme goes by, the relationship between individuals gradually changes from casual and shallow to the formal and intimate association. The entire theory was based on a view that trust has to be developed in the process of relationship. The objective of this theory was to explain the relationship and...
2 Pages(500 words)Essay

James Irwin

...James Irwin was a Colorado resident born on March 17, 1930 Pennsylvania in the United s of America.Irwin later started his career at the naval academy where he received a science bachelors degree in naval science and later went to the University of Michigan for his postgraduate degree in aeronautical engineering. He later on went to receive an honorary doctorate on the same from Stanford University. From the naval academy, Irwin joined the Air Force where he trained as a pilot. He started as a test pilot with the Air Force experimental school and the Air Force Aerospace pilot school. Irwin received the distinguished service and commendation medals during his time with the Air Force....
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Social Penetration Theory of Irwin Altman & Dalmas Taylor for FREE!

Contact Us