Communication Theory Essay: Social Penetration Theory

Paper Type:  Essay
Pages:  7
Wordcount:  1793 Words
Date:  2022-07-03

Introduction

Communication theories are significant to learn and appreciate them. Learning the theories is essential in the daily life, as they describe people and how they interact and communicate with one another. Also, through the theories, we understand how people in the society can express their impression to one another; besides, the theories help in developing critical thinking skills and benefits one to appreciate the value of research that has been fulfilled in this field. The communication theories investigate both the verbal and non-verbal communication, and they are beneficial for both the professional and personal communication styles. As stated by Baack, Fogliasso and Harris, (2000), it is known that the communication theory promotes work relationship as well as the strong bond between the families. The following research seeks to critically discuss Social Penetration theory, as one of the communication theories and how effective they are together with how it is applied in the daily work activities.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Social penetration theory was developed by Irwin Altman and Dalmas Taylor in 1973 when studying the interpersonal relationship. According to Altman and Taylor (1973) definition on social penetration theory, it is the relationship that develops, as communication transforms from relatively shallow and non-intimate level, into a deeper, intimate and personal one. The theory is more based on the degree and development of the self-disclosure in communication by voluntary sharing or revealing oneself on both the unconscious and conscious level with another person. During the conversation, the communication topic shifts to more private and personal issues whereby both parties develop confidence and become more honest with one another through expression leading to some arousal of argument, personal opinion, criticism, desire or personal motives, thoughts, feelings, experience as well as personal disposition (Griffin, Ledbetter & Sparks, 2015). The assumption that is in Social Penetration theory is that the relationship advancement is predictable and systematic. Through self-disclosure, relationship advancement pursues a specific course, moving from shallow layers of exchange to a deeper level. Self-disclosure is considered as a means to transform a relationship into a new level of intimacy.

Why were you drawn to this theory? What enthralled you to want to write about it?

I was attracted to discuss on Social penetration theory because of its commonness in every communication, unlike the rest of the theories. Everyone practices this communication theory at all times. The theory is essential when people develop some sense of trust and affection for one another. Additionally, I was enthralled to the theory due to its wide application and the possessiveness it brings in every conversation, it brings a working environment, hence promoting the flow of information from one level to another without any basic restrictions. As mentioned by Stokes, and Tolstedt (1984), Social penetration theory describes the series of socializing when people meet as strangers for the first time, the communication is reciprocal, risky and it involves a lot of trusts.

What have you learned about the theory?

In the theory of social penetration, I learned that people communicate gradually up to the point they gain confidence in the conversation and to one another, and be able to exchange critical information. When individuals meet for the first time, they opt to share general and impersonal information only; therefore, they restrict the scope of topics they are discussing. As time moves by, they tend to learn more about one another deeper on their personal information. The depth of disclosure of personal information reciprocates, and the persons can now discuss a range of topics without any limits as in the initial stages.

On the other hand, I realized that there is the linear relationship between disclosure and intimacy. For instance, partners experience dialectical tensions between disclosure and intimacy on what they exchange through communication. Furthermore, an important assumption that evolves, in theory, is that the mutual profit from the partners' communication acts as the vessel to the level of exchange and develops with time in a particular relationship.

Moreover, situational influence, rewards, and personality are the factors that help in stimulating social penetration process which is retarding. Likewise, the extent and intensity of self-disclosure act as operation measure of social penetration (Ayres, 1979). Self-disclosure gauges the personal character that affects disclosure, therefore, offering the deep information regarding the individual. Situational factors concentrate on the ability to enter or leave the relationship freely. Also, it is concerned with the level of such relationship to another individual.

However, I discovered that the essence of the theory could be misused by the people who have malicious intent against the person or the organization. The social penetration theory can be used by people to gather some sensitive information with the aim of causing harm in the future. In that case, when exchanging information, it is important to assess the credibility of the person and interest towards the information you are sharing. Also, since the communication will involve sensitive information, it is important to consider face-to-face rather than the other modes to avoid leaking of information and be certain of the recipient of the information.

How do you relate to it? Have you seen it used in the media, such as in news coverage, speeches, political advertisements or commercials for products?

The Social Penetration theory relates to different levels of life where people interact and seek to get personalized and familiarized with different issues. The theory relates to the prolonged discussion between people rather than the brief ones. Social penetration theory is applicable in many forms of communications. Examples of Social Penetration that encounter on a daily basis include online dating, social networking, and online chatting. People are more interested in social media and online chatting. Through the online platforms, people tend to provide limited information about myself, since they will be communicating anonymously with strangers. But when they familiarize and get personal attention to one another, they will be able to disclose themselves more as times moves on, since there will be trust between them.

Secondly, the Social Penetration theory relates to the presentation of the speech especially by the politician; there is a barrier of interaction between the political party delegates who have been there for long and those who have just joined the party. There are some kinds of information that are never shared until when the party members gain confidence with their new members. Also, during the in commercial sales and marketing, the company give some in-depth information about the products, and if the salesperson has the personal relationship with the customer, they will intermingle with one another the salesperson will expose more about the products compared with those of the competitors.

Thirdly Social Penetration theory of communication relates to the interview, covered through the public media and news. When the interviewer asks the interviewee some question before the camera, there are some of the information that will not be disclosed since there are several people who are watching the interview and the relationship between the interviewee and the audience is not yet established. Therefore, the relationship is not socially acceptable for an interment self-disclosure. The information that will be given by the interviewee during the interview will be public rather than private. The transition to exchange private information starts from a small talk before getting too intimate conversations. But behind the scene, the interviewee will interact with those who are familiar with, and there will be a lot of self-exposure.

Is the theory still applicable today? Does it still have meaning? How is it reflected in the workplace? In the social setting?

Social penetration theory is still applicable even in our daily activities, and its meaning is still intact in different level s of life. This theory not only applies to the individual levels of life but also, it is seen applying in the workplace. In order to have a successfully operating and profit effective business, Social Penetration theory has to come in handy. Business activities involve more of the selling of goods and services, there is a lot of persuasions that needs to be involved, and both the seller and the buyer needs to win the trust of one another so that they can have a long business relationship. Social Penetration theory is practiced in the workplace when different departments come together to share some critical information about the organization's performance (Ayres, 1979). At this point, everyone has the trust of one another and their exchange both the professional and personal perceptions regarding the operation at the workplace. There will be more transparency when the workers interact at the workplace since they know one another.

Also, this theory communication is appreciated within the business environment, especially when two organizations with mutual interest tend to collaborate for their organizational growth. The business organization will be forced to be open and confident with one another as they gain trust in business activities. Furthermore, social penetration is also applied in networking and marketing as people interact with one another. It is important to be equipped with the social penetration theory principles both at the personal and organizational levels to promote ties with one another (Carpenter & Greene, 2016).

In the case where the Social Penetration is not applied in the workplace, the employees will be reserving their ideas and suggestion about the operations, and there will be ineffective business activities part the workplace (Griffin, Ledbetter, and Sparks, 2015).

What have the critics said about the theory?

Several critics have surrounded the application of the theory, some of them include the following according to Stokes and Tolstedt (1984):

  • It is possible to have a deterioration of the relationship while there are disclosure increases.
  • The theory needs to put into consideration the gender issues, male are less open.
  • There is the high tendency of the occurrence of reciprocity; there can be at the middle levels, can either be reserve or cycle of the disclosure.
  • Other critics state that the metaphor "Penetration" is overused an unhelpful as it sounds lie sexual overtone and power.

Conclusion

Indeed the Social Penetration theory is fundamental in all basis of life and especially at the workplace. It is vital for one to be equipped with the principles of the Social Penetration theory while operating their workplace to enhance confidence in their dealings. The theory revolves more on self-disclosure to one another after gaining trust. The theory is characterized by steps, whereby people have to get to know each other slowly as they gain self-confidence in the process. The theory makes us understand the reason why people will take the time to tell more information about themselves, sentiments, opinions or suggestions.

References

Altman, I., & Taylor, D. A. (1973). Social penetration: The development of interpersonal relationships. Holt, Rinehart & Winston.

Ayres, J. (1979). Uncertainty and Social Penetration Theory Expectations About Relationship Communication: A Comparative Test. Western Journal of Speech Communication, vol. 43, 192-200.

Baack, D., Fogliasso, C., & Har...

Cite this page

Communication Theory Essay: Social Penetration Theory. (2022, Jul 03). Retrieved from https://proessays.net/essays/communication-theory-essay-social-penetration-theory

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism