StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Application paper 1 - Essay Example

Cite this document
Summary
Application paper 1 INTRODUCTION The Symbolic Convergence Theory of communication (SCT) was introduced by Ernest Bormann, based on the principles earlier propagated by Robert Bales regarding communication. This theory consists of certain basic tenets that imply towards the various numbers of features associated with the regular group life wherein communication plays a major role to examining the gradual emergence of leadership qualities, decision making skills, normative behavioral traits, and cohesiveness within the team…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Application paper 1
Read Text Preview

Extract of sample "Application paper 1"

Download file to see previous pages

Correspondingly, the fundamental features of the theory will be elaborated in this thesis, along with their application in the real life experiences. Criticisms of the theory will also be paid due significance in context to assess the applicability of the theory. DISCUSSION Key elements of the theory. SCT, as described by Griffin (247-250), is a universal theory within the broad framework that accounts for human communication. Precisely, SCT focuses on learning the sharing process of emotions and values in a small group, defining those as fantasies.

The SCT communication is also used to observe the cohesiveness of a small group, wherein it is assumed that individuals will tend to dramatize their messages to a larger extent when confident in the group. Notably, communication is used to create a bond between small groups of people. The theory revolves around the emotions and fantasies of the people in a group wherein the conceptual framework of the theory attempts to analyze shared symbolic meaning, which lies at the fantasy theme a person desires.

The conversation begins with a fantasy of a person and continues with different opinions of the people in the group. SCT also helps to identify the symbolic reality that the member of the group shares through his/her conversation (Young, “Bormann's Symbolic Convergence Theory”). As argued by Griffin (247-250), SCT can be extremely useful to obtain critical understanding of the views and the thoughts of different persons in a group. SCT is principally based on the ideas of the member in a group who exchange their fantasies in order to formulate a cohesive group framework.

The fantasies involve the emotion of the person supported by the group; it helps to understand the feeling and emotions of different individuals. Contextually, the fantasy chain can be considered as a positive response to the initial fantasy by the member of the group. It is in this context that symbolic convergence helps to form a cohesive bond and create a sense of togetherness in the group through the symbolic communication as described in SCT. The views and opinions of every individual are given emphasis based on the initial fantasy.

Conceptually, SCT aids to recognize how the group associates, interacts and offers a way of inspecting small group culture. Also, this theory also makes it easier to understand who the active member is and is supporting the theme of the fantasy, building a fantasy chain (Young, “Bormann's Symbolic Convergence Theory”). A brief background of the situation. It was a normal working day when I, with my colleagues, was discussing about the upcoming salary hikes that were to be declared on the basis of our performances throughout the year.

Undoubtedly, everyone in the group had great expectations and desires with the salary hike. In the middle of the conversation, one of my colleagues suddenly fantasized that with the aid of his increased salary and some help from loan facilities, he plans to purchase a duplex in one of the posh areas of the US within the next two years. This fantasy statement made the atmosphere in the work environment much informal, where the conversation was turning to a more comfortable level and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Application paper 1 Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Application paper 1 Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/journalism-communication/1488141-application-paper
(Application Paper 1 Essay Example | Topics and Well Written Essays - 1250 Words)
Application Paper 1 Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/journalism-communication/1488141-application-paper.
“Application Paper 1 Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/journalism-communication/1488141-application-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Application paper 1

Ripley: Automatically Securing Web Applications through Replicated Execution

The paper presents an alternative and easy solution in form of RIPLEY through which the integrity of server is ensured.... Rather than the full replication of client as done in the paper, partial replication can also be done in view to the overheads of RIPLEY.... If the application involves interacting with database at the server, introducing RIPLEY would not change anything.... ET application is fed into Volta.... Volta tier splits it into server application and the client replica and optionally the JavaScript based client tier....
5 Pages (1250 words) Research Paper

How to Extract Evidence in Relation to HTTP, FTP, and SMTP Application Layer Protocols

In this paper, I present the techniques used to extract data sent from one host to another over a TCP-based network like the internet using FTP protocol, an e-mail sent over an IP network using SMTP protocol and the one sent over web-based applications using HTTP protocol.... How to extract evidence in relation to HTTP, FTP and SMTP application layer protocols Name Institution Instructor Date Abstract Digital investigation methods are becoming more and more important due to the proliferation of digital crimes and crimes involving digital evidence....
7 Pages (1750 words) Research Paper

Some Aplication of Mechanical Engineering

The paper discusses the application of mechanical engineering with a focus on mechatronics, nonotechnology and Mechanical engineering demonstrates its diversity in solving various challenges as mechatronics shows by providing a platform where sensors, actuators, signaling, electrical control, algorithms alongside computing assistance to provide stability to various connectivity needs in engineering systems.... Four main systems are managed in mechatronics namely, information, mechanical, computer and electrical, to provide a composite application in which mechanical engineering is put to test....
5 Pages (1250 words) Term Paper

Role of Middleware in the App Integration in a Distributed Application Environment

The paper “Role of Middleware in the App Integration in a Distributed Application Environment” examined the importance of Middleware in integrating application in a distributed application environment.... This paper examines the importance and role of Middleware in distributed computing.... The paper concludes that it would be very difficult to integrate the vast variety of applications without Middleware applications.... When systems are not fully compatible, there is a delay in understanding and processing requests from one application to another....
9 Pages (2250 words) Term Paper

TWeb-Based Enterprise Applications Security Guidelines

The paper "Web-Based Enterprise Applications Security Guidelines" discusses that proper approaches that can provide comprehensive protection from security breaches comprising intrusion detection and control of information access are required for developing secure web-based enterprise applications.... Additionally, the paper also intends to discuss approaches in order to enhance the security of web based applications (IBM Corporation, “Understanding Web Application Security Challenges”)....
7 Pages (1750 words) Research Paper

Enterprise Web Application Security Issues and Guidelines

The paper "Enterprise Web Application Security Issues and Guidelines" discusses that in the past few years, the majority of organizations have shifted their businesses over the internet.... hellip; This paper has discussed some of the important security issues that enterprise application developers experience while implementing these web applications.... This paper has also discussed the strategies and solutions to deal with these security issues....
13 Pages (3250 words) Research Paper

Analysis of Rich Internet Applications

This paper explores and analyzes the different development options for Rich Internet Applications development.... We need a better development option for Rich Internet application development.... This research is intended to present a detailed analysis of the RIA (Rich Internet Applications) development technologies....
10 Pages (2500 words) Research Paper

Rich Internet Applications Development

This paper highlights the Rich Internet Application.... Rich Internet application is a model of modern technology that describes a new type of application linked with the Internet cloud and client.... A rich Internet application (RIA) is a web application developed to deliver similar characteristics and tasks that are offered by desktop applications (TechTarget, 2007).... RIAs normally divide the functions athwart the Internet/network split by positioning the user interface and associated action and ability on the client-side, and the data handling and process on the application server side (TechTarget, 2007)....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us