Bullock 1 Robyn Bullock Comm 1050 Professor Nobis April 20, 2013 Social Penetration Theory of Irwin Altman & Dalmas Taylor Social Penetration Theory developed by Irwin Altman and Dalmas Taylor, in 1973, is still a widely used communication theory today. It is also used in other fields of study such as psychology to explain the interaction between people. The social penetration theory has also been used as a starting point to develop other theories in the field of communication. The social penetration theory is an objective theory (A First Look At Communication, page 25) and is often referred to as the Onion Theory. It shows the “multilayered structure of personality.” The theory explains that as you go from stranger to a close relationship you show deeper layers of your personality and disclose more personal information, just as an onion has multiply layers. The disclosure creates a wedge of information into your personality that deepens as the relationship deepens. This is done through depth and breadth of self-disclosure. The depth of penetration is “the degree of disclosure in a specific area of an individual’s life.” The breadth of penetration is “the range of areas in an individual’s life over which disclosure takes place.” Another key point to the theory is that people regulate closeness on the basis of rewards and costs. Two other theorist John Thibaut and Harold Kelley, known for their social exchange theory, believe that “people try to predict the outcome of an interaction before it takes place.” Thereby judging the reward minus the cost of disclosure. They also feel the satisfaction and stability comparison levels play a part of whether a person will feel free to self-disclose. Communication theorist, Sandra Petronio, believes that “close relationships are much more complex than Altman and Taylor first thought.” Her answer to the simplicity of the social penetration theory is her communication privacy management theory. She believes that there are five rules that guide how much we are willing to share. They are Bullock 2 culture, gender, motives, context and risk-benefit ratio. The depth of disclosure also is determined by boundaries and privacy rules. Irwin Altman continued to explore his own social penetration theory. With the assistance of Professors Anne Vinsel and Barbara B. Brown he co-authored an article that was included in the 1982 textbook Adv Experiment Social Psychology. The article titled “Dialectic Conceptions in Social Psychology: An Application to Social Penetration and Privacy Regulation” explored how dialectics related to the social penetration theory and expounded upon it. Altman’s continued research “adopted a social unit perspective whereby one attempts to understand patterns, profiles and combinations of behaviors.” (Altman 1976 and 1977) It was also stated, “Altman’s work on privacy regulation was partially motivated by the need to escape from certain restrictive assumptions that have been made in social penetration theory.” This article also reviewed the dynamics of families, groups, teams, couples and individuals and how they change the “social unit orientation…many combinations of behaviors that differ among individuals or that differ even for the same person on various occasions.” By continuing his work in the areas of communication and psychology Irwin Altman showed that a theory is an ever evolving and changing work. Theories need to develop and grow as times change and societies perceptions of the world change. The business world also has looked to Altman & Taylor’s social penetration theory in reviewing business ethics. An article in a 2000 issue of the Journal of Business Ethics (published in the Netherlands) explored “the structure of individual ethical reasoning and the process through which personal ethical standards erode or decline.” The article was how the business world is looking at business ethics, but as of the time of publication of this article, theories on business ethical standards were lacking. The authors looked to the communication theory of Altman & Taylor to show incite as to why there is a problem. They used the theory to “examine the nature and structure of an individuals ethical and moral framework.” and to also explore and “portray the degenerations of the personal ethical code.” This work was created also to show the future of ethical business theories. The co-authors of this article, Dr. Donald Baack, Dr. Christine Fogliasso, and Dr. James Harris are all professors at Pittsburgh State University. Each has been widely published in business journals. This article shows that Bullock 3 not only is the social penetration theory applicable in the field of communication it has real world benefits in other areas of study such as business. Dr. Wayne E. Hensley wrote a theory comparison paper for Social Behavior and Personality using the looking-glass-self and social penetration. He showed how integrating Cooley’s looking-glass-self with Altman & Taylor’s social penetration can show how depth of a relationship can change the image accuracy. He feels that “strangers provide little objective data for us.” Yet he also states, “The most distorted image is likely that of the stranger. Next, but for a completely different reason, is the distortion of the intimate.” Showing that the accuracy and completeness that we see in our looking-glass-self reflection depends on the depth of social penetration. The greatest accuracy and completeness of image is that of a friend. Dr. Hensley is an Associate Professor Emeritus of Communication Studies at Virginia Tech. He is a highly regarded author in the study of communication theories. In a recent academic journal article “Self-Disclosure Among Bloggers: ReExamination of Social Penetration Theory” by Jih-Hsin Tang and Cheng-Chung Wang explored the theory as it pertains to online communication, specifically bloggers. They used the “wedge model” of Altman and Taylor to see how it describes online relationships. In their study they surveyed 1,027 Taiwanese bloggers and found that they “self-disclosed nine topics (attitude, body, money, work, feelings, personal, interest, experiences, and unclassified.)” They also asked about how much they reveal to “three target audiences (online audience, best friend, and parents.)” They found that the bloggers shared with their friends the most in depth and width. They also found the female shared more then their male counterparts. The bloggers under the age of 20 discussed a “wider range of topics; however, there was no significant difference in the depth of their disclosure.” This peer review was published CyberPsychology, Behavior & Social Networking a leading journal, for the last 15 years, in the area of social networking. Both Tang and Wang hold PhDs and are involved in academic research. Jih-Hsin Tang is an Assistant Professor and National Taipei College of Business and Cheng-Chung Wang is an Assistant Research Fellow and Academia Sinica. Critics of the social penetration theory charge that the theory may be too simplistic in its approach to how self-disclosure is a gauge of relational closeness. Other Bullock 4 critics find the reward-cost analysis does not explain the difference in social penetration. The final criticism is that the “theory doesn’t speak about the transition for me to we.” Yet with those critiques there is still wide spread use of the theory today. The above articles all used the social penetration theory as a starting point for their research and findings. Each used multiple resources and references to verify their work. The social penetration theory is still an important work today. Although the basic theory has its critics it is used in the field of communication, psychology and business. In a psychology class, I attended, we discussed Altman and Taylor’s onion model. Showing how this theory has crossed to other areas. When it was first presented as a theory in 1973 the field of social media had not yet immerged. The social penetration theory has been used to explore this new area of communication. YouTube has many videos people have created to demonstrate the theory. Other theorist and Irwin Altman himself have continued to explore and add to the theory. This is important in the every changing and advancing world arena. The social penetration theory has passed the test of time and is still very valuable in explaining human interactions today. Bullock 5 Works Cited Altman, Irwin, Vinsel, Anne, and Barbara B. Brown. "Dialectic Conceptions in Social Psychology: An Application to Social Penetration and Privacy Regulation." Advances in Experimental Social Psychology. By Leonard Berkowitz. New York: Academic., March, 22, 1982. 109-27. Print. Baack, Donald, Christine Fogliasso, and James Harris. "The Personal Impact of Ethical Decisions: A Social Penetration Theory." Journal of Business Ethics (2000): 3949. Kluwer Academic Publishing. Web. 20 Apr. 2013. Griffin, Emory A. "Chapter 9: Social Penetration Theory." A First Look at Communication Theory. Boston: McGraw-Hill Higher Education, 2009. 113-24. Print. Hensley, Wayne E. "A Theory of the Valenced Other: The Intersection of the LookingGlass-Self and Social Penetration." Social Behavior and Personality 24.3 (1996): 293-308. Web. 12 Apr. 2013. Tang, Jih-Hsin, and Cheng-Chung Wang. "Self-Disclosure Among Bloggers: ReExamination of Social Penetration Theory." CyberPsychology, Behavior & Social Networking 15.5 (2012): 245-59. May 2012. Web. 12 Apr. 2013.