SlideShare une entreprise Scribd logo
1  sur  18
Social information processing theory(SIP) By: Joseph Walther
Summary SIP theory is all about Computer-Mediated Communication (CMC). Some examples would be email, Instant Messaging, etc. Anything text-based in which most nonverbal cues are filtered out. This theory states that CMC users can adapt to this restricted medium and use it effectively to develop close relationships.
Before SIP Before SIP theory the general consensus was that CMC was not a good medium to develop relationships through. There existed 3 theories: Social presence theory: Suggests that CMC deprives users of the sense that another actual person is involved in the interaction. Media richness theory: Purports that CMC bandwidth is too narrow to convey rich relational messages. Cues filtered out: Interpretation of CMC that regards lack of nonverbal cues as a fatal flaw for using the medium for relationship development
CMC vs. Face-to-Face:A “SIP” Instead of a Gulp If you were handed a glass of water you could choose to either gulp it straight from the glass, or through a straw one sip at a time. That’s the key difference Walther believes there to be between SIP and face-to-face communication: the amount of time it takes to develop the relationship. Walther believes that, even without the rich nonverbals present in face-to-face communication, given enough time CMC users can develop relationships just as strong as those done through face-to-face.
Verbal Cues of Affinity Replace Nonverbal cues Walther claims that CMC users rely on text-only messages to convey the information that nonverbal cues would do in face-to-face encounters. Griffin in the text uses excerpts from the movie “You’ve Got Mail” as an ongoing example of SIP in action. Kathleen and Joe meet online and develop a relationship through email, and in their email they self-disclose information about how they feel about their relationship; they communicate relational affinity messages that their nonverbals would do if they had been face-to-face.
Experimental Support for a Counterintuitive Idea Walther a two of his students ran a study to test SIP theory. You can read on page 142 of the text about the experiment in detail In summary, 28 pairs of students split into face-to-face and CMC users, with no prior relationship with one another, were asked to discuss moral dilemmas, and one person in each of the pairs was a confederate with a goal to either be friendly or unfriendly.
Experiment Results Afterwards the non-confederates were asked about their impression of their partners, and it showed that the confederates in the CMC group were able to convey friendliness  or unfriendliness just as successfully as the ones in face-to-face. The CMC users employed their text-only medium to convey a level of relational communication that eventually equaled the affect that can be expressed face-to-face through multiple channels.
Extended Time – The Crucial Variable in CMC Walther believes that any message spoken in person will take at least four times longer to say through CMC. This may explain why previous controlled lab studies showed CMC as inferior because both modes of communication was limited to the same amount of time. Walther also believed that two other temporal factors could contribute to intimacy on the internet: anticipated future interaction and chronemics.
Temporal Factors Anticipated future interaction: A way of extending psychological time; the likelihood of future interaction motivates CMC users to develop a relationship. If you know you’ll be interacting with someone, you’re more likely to disclose more information about yourself. Chronemics: The study of people’s systematic handling of time in their interaction with others. This is a nonverbal that is not filtered out in CMC. Someone can note what time of day you sent a message online, that in and of itself sends a message; how long did it take for you to respond? What does that say about how they feel about the relationship?
A Couple Examples ,[object Object],http://www.youtube.com/watch?v=UE6iAjEv9dQ
Hyperpersonal Perspective Definition: The claim that CMC relationship are often more intimate than those developed when partners are physically together.  “How senders select, receivers magnify, channels promote, and feedback increases enhanced and selective communication behaviors in CMC.”
Sender Selective Self-Presentation Online positive portrayal without fear of contradiction, which enables people to create an overwhelmingly favorable impression.  Social cues that photo realism offers can have a dampening effect on the relationship and they should be avoided.
Reciever: Overattribution of Simularity Social Identity deindividuation: CMC users overestimate their similarity with others they meet in online interest groups.  Assumption that people who are in the same interest groups are like them in some important way. Commonality is all they have to go on as they form impressions of others.
Channel: Communicating on Your Own  Time Asynchronous channel: nonsimultaneous medium of communication that each individual can use when he or she desires.  Online communication happens without having to attend to each other at the same time. You can plan, edit and contemplate what you are going to say next. Advantage when dealing with touchy issues, conflict and misunderstandings.  Also gives the chance to fabricate reasons and make up things that might not be true.
Feedback: Self-Fulfilling Prophecy Definition: Tendency for a person’s expectation of others to evoke a response from them that confirms what was originally expected.  Senders express themselves how they want and receivers create an idealized image of their partner. Channel lets users express themselves the way they want, when they want.  The person you perceive as wonderful starts acting that way.
Critique The use of online dating might actually make relationships form faster because of anticipation of future interaction makes the impression forming process go faster.  People who use CMC to join online discussion groups may have a higher need for affiliation than the typical person whose relationships are developed through multichannel modes of communication.  The theory has plenty of holes and the author openly admits that. The theory makes some claims that some may feel are farfetched but the depth of research and analysis provided by Walther make it a respected and validated theory.
Activity – WARNING: Only for brave individuals! Would you like to actively apply this theory in real life? There is a website called Omeglewhere you can chat with a random stranger one-on-one (you have the option to video chat but DO NOT choose that option…trust me).  There are several ways you can apply the theory:  You can be genuine and try to get to know the person; see how they self-disclose and if you can note any relational affinity messages (talking about what they think of the conversation).  You can put on a false persona, see if they buy into it, and note how text-base communication allows you to be whomever you want to be.
Activity (continued) Now because the person you’re chatting with knows that there is a very small chance you’ll ever talk with them again sometimes they enter the chat with a certain goal. You can note how they act if that seems the case; you can see how low anticipation of future interaction affects the quality of the communication You can also try to recreate something similar to Walther’s study. Go into the interaction with a goal to either be friendly or unfriendly, and see how they react. Maybe even ask after a few minutes what they think of you. Now, if you’re brave, go ahead and give it a try!    http://omegle.com/

Contenu connexe

Tendances

Spiral of silence
Spiral of silenceSpiral of silence
Spiral of silenceAdan Butt
 
Social Penetration Theory
Social Penetration TheorySocial Penetration Theory
Social Penetration TheoryArun Jacob
 
Powerpoint Lecture 1 - Communication and Culture
Powerpoint Lecture 1 - Communication and CulturePowerpoint Lecture 1 - Communication and Culture
Powerpoint Lecture 1 - Communication and CultureJonathon Lundy
 
Communication culture and context
Communication culture and contextCommunication culture and context
Communication culture and contextSurbhi Parashar
 
Computer mediated communication slide
Computer mediated communication slideComputer mediated communication slide
Computer mediated communication slidemoona butt
 
Interaction Adaptation Theory of Interpersonal Communication
Interaction Adaptation Theory of Interpersonal CommunicationInteraction Adaptation Theory of Interpersonal Communication
Interaction Adaptation Theory of Interpersonal CommunicationAnam Tanvir
 
Spiral of silence
Spiral of silenceSpiral of silence
Spiral of silenceAmeeza Zia
 
Models of Communication.pptx
Models of Communication.pptxModels of Communication.pptx
Models of Communication.pptxPoojaWalia6
 
Expectancy Violations Theory
Expectancy Violations TheoryExpectancy Violations Theory
Expectancy Violations TheoryArun Jacob
 
Uncertainty reduction theory
Uncertainty reduction theoryUncertainty reduction theory
Uncertainty reduction theoryAndi Torres
 
Chapter 1 - Interpersonal Communication
Chapter 1 - Interpersonal CommunicationChapter 1 - Interpersonal Communication
Chapter 1 - Interpersonal Communicationkorzolek
 
Coordinated Management of Meaning
Coordinated Management of MeaningCoordinated Management of Meaning
Coordinated Management of MeaningDada Veloso-Beltran
 
Expectancy Violations theory
Expectancy Violations theoryExpectancy Violations theory
Expectancy Violations theoryVirginia Bautista
 
7 spiral of silence 2
7 spiral of silence 27 spiral of silence 2
7 spiral of silence 2sabiha anam
 
Spiral of silence Theory
Spiral of silence TheorySpiral of silence Theory
Spiral of silence TheoryJuby Eipe
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Suchitra Patnaik
 

Tendances (20)

Spiral of silence
Spiral of silenceSpiral of silence
Spiral of silence
 
Social Penetration Theory
Social Penetration TheorySocial Penetration Theory
Social Penetration Theory
 
Powerpoint Lecture 1 - Communication and Culture
Powerpoint Lecture 1 - Communication and CulturePowerpoint Lecture 1 - Communication and Culture
Powerpoint Lecture 1 - Communication and Culture
 
Communication culture and context
Communication culture and contextCommunication culture and context
Communication culture and context
 
Computer mediated communication slide
Computer mediated communication slideComputer mediated communication slide
Computer mediated communication slide
 
Interaction Adaptation Theory of Interpersonal Communication
Interaction Adaptation Theory of Interpersonal CommunicationInteraction Adaptation Theory of Interpersonal Communication
Interaction Adaptation Theory of Interpersonal Communication
 
Spiral of silence
Spiral of silenceSpiral of silence
Spiral of silence
 
Models of Communication.pptx
Models of Communication.pptxModels of Communication.pptx
Models of Communication.pptx
 
Expectancy Violations Theory
Expectancy Violations TheoryExpectancy Violations Theory
Expectancy Violations Theory
 
Uncertainty reduction theory
Uncertainty reduction theoryUncertainty reduction theory
Uncertainty reduction theory
 
Chapter 1 - Interpersonal Communication
Chapter 1 - Interpersonal CommunicationChapter 1 - Interpersonal Communication
Chapter 1 - Interpersonal Communication
 
Coordinated Management of Meaning
Coordinated Management of MeaningCoordinated Management of Meaning
Coordinated Management of Meaning
 
Expectancy Violations theory
Expectancy Violations theoryExpectancy Violations theory
Expectancy Violations theory
 
Communication
Communication Communication
Communication
 
Interpersonal Communication
Interpersonal CommunicationInterpersonal Communication
Interpersonal Communication
 
Communication Privacy Management Theory (CPM)
Communication Privacy Management Theory (CPM)Communication Privacy Management Theory (CPM)
Communication Privacy Management Theory (CPM)
 
7 spiral of silence 2
7 spiral of silence 27 spiral of silence 2
7 spiral of silence 2
 
Spiral of silence
Spiral of silenceSpiral of silence
Spiral of silence
 
Spiral of silence Theory
Spiral of silence TheorySpiral of silence Theory
Spiral of silence Theory
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1
 

En vedette

Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013
Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013
Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013Annissa Savira II
 
information processing theory
information processing theoryinformation processing theory
information processing theoryIris Israel
 
Social Information Processing (Tin180 Com)
Social Information Processing (Tin180 Com)Social Information Processing (Tin180 Com)
Social Information Processing (Tin180 Com)Tin180 VietNam
 
Trend Analysis In Social Tagging An Lis Perspective Ecdl2007 (Tin180 Com)
Trend Analysis In Social Tagging   An Lis Perspective   Ecdl2007 (Tin180 Com)Trend Analysis In Social Tagging   An Lis Perspective   Ecdl2007 (Tin180 Com)
Trend Analysis In Social Tagging An Lis Perspective Ecdl2007 (Tin180 Com)Tin180 VietNam
 
Bella chyntia sinaga groupthink theory
Bella chyntia sinaga groupthink theoryBella chyntia sinaga groupthink theory
Bella chyntia sinaga groupthink theoryBellaCNS
 
Labelling Theory from Maifa Lionora
Labelling Theory from Maifa LionoraLabelling Theory from Maifa Lionora
Labelling Theory from Maifa LionoraFaiz Sujudi
 
Attitude Theory from Hilmi Dzakwan S.H
Attitude Theory from Hilmi Dzakwan S.HAttitude Theory from Hilmi Dzakwan S.H
Attitude Theory from Hilmi Dzakwan S.HFaiz Sujudi
 
penetration social theory
penetration social theory penetration social theory
penetration social theory diraeffendy
 
Cognitive Disonance Theory from Askita Hary Anjany
Cognitive Disonance Theory from Askita Hary AnjanyCognitive Disonance Theory from Askita Hary Anjany
Cognitive Disonance Theory from Askita Hary AnjanyFaiz Sujudi
 
Analysis Transactional Theory
Analysis Transactional TheoryAnalysis Transactional Theory
Analysis Transactional TheoryFaiz Sujudi
 
Tekomb afinarachmani
Tekomb afinarachmaniTekomb afinarachmani
Tekomb afinarachmaniapinazazel
 
Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...
Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...
Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...AqilahNafisahU
 
Cultivation Theory
Cultivation TheoryCultivation Theory
Cultivation TheoryTivani28
 
Artikel CPM (Communication Privacy Management)
Artikel CPM (Communication Privacy Management)Artikel CPM (Communication Privacy Management)
Artikel CPM (Communication Privacy Management)Faiz Sujudi
 
Humanisme Theory from Rizki Faishal
Humanisme Theory from Rizki FaishalHumanisme Theory from Rizki Faishal
Humanisme Theory from Rizki FaishalFaiz Sujudi
 
Faiz sujudi image restoration theory
Faiz sujudi   image restoration theoryFaiz sujudi   image restoration theory
Faiz sujudi image restoration theoryFaiz Sujudi
 
Social Learning Theory
Social Learning TheorySocial Learning Theory
Social Learning TheoryFaiz Sujudi
 

En vedette (20)

Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013
Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013
Uncertainty Reduction Theory - Annissa Savira Mankom B Fikom Unpad 2013
 
information processing theory
information processing theoryinformation processing theory
information processing theory
 
Social Information Processing (Tin180 Com)
Social Information Processing (Tin180 Com)Social Information Processing (Tin180 Com)
Social Information Processing (Tin180 Com)
 
Trend Analysis In Social Tagging An Lis Perspective Ecdl2007 (Tin180 Com)
Trend Analysis In Social Tagging   An Lis Perspective   Ecdl2007 (Tin180 Com)Trend Analysis In Social Tagging   An Lis Perspective   Ecdl2007 (Tin180 Com)
Trend Analysis In Social Tagging An Lis Perspective Ecdl2007 (Tin180 Com)
 
Bella chyntia sinaga groupthink theory
Bella chyntia sinaga groupthink theoryBella chyntia sinaga groupthink theory
Bella chyntia sinaga groupthink theory
 
Labelling Theory from Maifa Lionora
Labelling Theory from Maifa LionoraLabelling Theory from Maifa Lionora
Labelling Theory from Maifa Lionora
 
Attitude Theory from Hilmi Dzakwan S.H
Attitude Theory from Hilmi Dzakwan S.HAttitude Theory from Hilmi Dzakwan S.H
Attitude Theory from Hilmi Dzakwan S.H
 
penetration social theory
penetration social theory penetration social theory
penetration social theory
 
Cognitive Disonance Theory from Askita Hary Anjany
Cognitive Disonance Theory from Askita Hary AnjanyCognitive Disonance Theory from Askita Hary Anjany
Cognitive Disonance Theory from Askita Hary Anjany
 
Analysis Transactional Theory
Analysis Transactional TheoryAnalysis Transactional Theory
Analysis Transactional Theory
 
SAP TEKOM S1
SAP TEKOM S1SAP TEKOM S1
SAP TEKOM S1
 
Tekomb afinarachmani
Tekomb afinarachmaniTekomb afinarachmani
Tekomb afinarachmani
 
Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...
Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...
Aqilah nafisah ulya "Communication Privacy Management Theory oleh Sandra Petr...
 
Dramaturgy Theory
Dramaturgy TheoryDramaturgy Theory
Dramaturgy Theory
 
Cultivation Theory
Cultivation TheoryCultivation Theory
Cultivation Theory
 
Artikel CPM (Communication Privacy Management)
Artikel CPM (Communication Privacy Management)Artikel CPM (Communication Privacy Management)
Artikel CPM (Communication Privacy Management)
 
Social categories
Social categoriesSocial categories
Social categories
 
Humanisme Theory from Rizki Faishal
Humanisme Theory from Rizki FaishalHumanisme Theory from Rizki Faishal
Humanisme Theory from Rizki Faishal
 
Faiz sujudi image restoration theory
Faiz sujudi   image restoration theoryFaiz sujudi   image restoration theory
Faiz sujudi image restoration theory
 
Social Learning Theory
Social Learning TheorySocial Learning Theory
Social Learning Theory
 

Similaire à Social Information Processing theory

Final project
Final projectFinal project
Final projectkimcard
 
Week 10 lecture notes_com325
Week 10 lecture notes_com325Week 10 lecture notes_com325
Week 10 lecture notes_com325Olivia Miller
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingNeville Wiles
 
Evaluating and Strategizing Your Own Interpersonal Communi.docx
Evaluating and Strategizing Your Own Interpersonal Communi.docxEvaluating and Strategizing Your Own Interpersonal Communi.docx
Evaluating and Strategizing Your Own Interpersonal Communi.docxSANSKAR20
 
Social media Group 1 Chapter 2
Social media Group 1  Chapter 2Social media Group 1  Chapter 2
Social media Group 1 Chapter 2Julian Arias
 
Social media, group 1 chapter 2
Social media, group 1  chapter 2Social media, group 1  chapter 2
Social media, group 1 chapter 2taylkarr
 
Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2adrianaemoran
 
Social media, group 1 chapter 2
Social media, group 1  chapter 2Social media, group 1  chapter 2
Social media, group 1 chapter 2hollajan
 
Communication & TechnologyComputer-Mediated Co.docx
Communication & TechnologyComputer-Mediated Co.docxCommunication & TechnologyComputer-Mediated Co.docx
Communication & TechnologyComputer-Mediated Co.docxclarebernice
 
Essay About Joining A Sorority
Essay About Joining A SororityEssay About Joining A Sorority
Essay About Joining A SororityBrenda Higgins
 
4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docx
4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docx4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docx
4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docxgilbertkpeters11344
 
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docxYepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docxadampcarr67227
 
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docxYepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docxodiliagilby
 
Interpersonal Communication Essay
Interpersonal Communication EssayInterpersonal Communication Essay
Interpersonal Communication EssayLisa Waddell
 
Guided Response Read the arguments presented by your classmates.docx
Guided Response Read the arguments presented by your classmates.docxGuided Response Read the arguments presented by your classmates.docx
Guided Response Read the arguments presented by your classmates.docxaidaclewer
 

Similaire à Social Information Processing theory (17)

LitReview..Final
LitReview..FinalLitReview..Final
LitReview..Final
 
Final project
Final projectFinal project
Final project
 
Week 10 lecture notes_com325
Week 10 lecture notes_com325Week 10 lecture notes_com325
Week 10 lecture notes_com325
 
Relational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social NetworkingRelational Development And Maintenance on Social Networking
Relational Development And Maintenance on Social Networking
 
Evaluating and Strategizing Your Own Interpersonal Communi.docx
Evaluating and Strategizing Your Own Interpersonal Communi.docxEvaluating and Strategizing Your Own Interpersonal Communi.docx
Evaluating and Strategizing Your Own Interpersonal Communi.docx
 
Social media Group 1 Chapter 2
Social media Group 1  Chapter 2Social media Group 1  Chapter 2
Social media Group 1 Chapter 2
 
Social media, group 1 chapter 2
Social media, group 1  chapter 2Social media, group 1  chapter 2
Social media, group 1 chapter 2
 
Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2
 
Social media, group 1 chapter 2
Social media, group 1  chapter 2Social media, group 1  chapter 2
Social media, group 1 chapter 2
 
PDFPortfolioAmyHendrickson
PDFPortfolioAmyHendricksonPDFPortfolioAmyHendrickson
PDFPortfolioAmyHendrickson
 
Communication & TechnologyComputer-Mediated Co.docx
Communication & TechnologyComputer-Mediated Co.docxCommunication & TechnologyComputer-Mediated Co.docx
Communication & TechnologyComputer-Mediated Co.docx
 
Essay About Joining A Sorority
Essay About Joining A SororityEssay About Joining A Sorority
Essay About Joining A Sorority
 
4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docx
4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docx4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docx
4Stein, Scott, Albert DiBartolomeo, and Kathleen Volk Miller, .docx
 
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docxYepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
 
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docxYepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
Yepes 2Julie YepesProfessor ToumeyENC110119 February 202.docx
 
Interpersonal Communication Essay
Interpersonal Communication EssayInterpersonal Communication Essay
Interpersonal Communication Essay
 
Guided Response Read the arguments presented by your classmates.docx
Guided Response Read the arguments presented by your classmates.docxGuided Response Read the arguments presented by your classmates.docx
Guided Response Read the arguments presented by your classmates.docx
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 

Dernier (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

Social Information Processing theory

  • 1. Social information processing theory(SIP) By: Joseph Walther
  • 2. Summary SIP theory is all about Computer-Mediated Communication (CMC). Some examples would be email, Instant Messaging, etc. Anything text-based in which most nonverbal cues are filtered out. This theory states that CMC users can adapt to this restricted medium and use it effectively to develop close relationships.
  • 3. Before SIP Before SIP theory the general consensus was that CMC was not a good medium to develop relationships through. There existed 3 theories: Social presence theory: Suggests that CMC deprives users of the sense that another actual person is involved in the interaction. Media richness theory: Purports that CMC bandwidth is too narrow to convey rich relational messages. Cues filtered out: Interpretation of CMC that regards lack of nonverbal cues as a fatal flaw for using the medium for relationship development
  • 4. CMC vs. Face-to-Face:A “SIP” Instead of a Gulp If you were handed a glass of water you could choose to either gulp it straight from the glass, or through a straw one sip at a time. That’s the key difference Walther believes there to be between SIP and face-to-face communication: the amount of time it takes to develop the relationship. Walther believes that, even without the rich nonverbals present in face-to-face communication, given enough time CMC users can develop relationships just as strong as those done through face-to-face.
  • 5. Verbal Cues of Affinity Replace Nonverbal cues Walther claims that CMC users rely on text-only messages to convey the information that nonverbal cues would do in face-to-face encounters. Griffin in the text uses excerpts from the movie “You’ve Got Mail” as an ongoing example of SIP in action. Kathleen and Joe meet online and develop a relationship through email, and in their email they self-disclose information about how they feel about their relationship; they communicate relational affinity messages that their nonverbals would do if they had been face-to-face.
  • 6. Experimental Support for a Counterintuitive Idea Walther a two of his students ran a study to test SIP theory. You can read on page 142 of the text about the experiment in detail In summary, 28 pairs of students split into face-to-face and CMC users, with no prior relationship with one another, were asked to discuss moral dilemmas, and one person in each of the pairs was a confederate with a goal to either be friendly or unfriendly.
  • 7. Experiment Results Afterwards the non-confederates were asked about their impression of their partners, and it showed that the confederates in the CMC group were able to convey friendliness or unfriendliness just as successfully as the ones in face-to-face. The CMC users employed their text-only medium to convey a level of relational communication that eventually equaled the affect that can be expressed face-to-face through multiple channels.
  • 8. Extended Time – The Crucial Variable in CMC Walther believes that any message spoken in person will take at least four times longer to say through CMC. This may explain why previous controlled lab studies showed CMC as inferior because both modes of communication was limited to the same amount of time. Walther also believed that two other temporal factors could contribute to intimacy on the internet: anticipated future interaction and chronemics.
  • 9. Temporal Factors Anticipated future interaction: A way of extending psychological time; the likelihood of future interaction motivates CMC users to develop a relationship. If you know you’ll be interacting with someone, you’re more likely to disclose more information about yourself. Chronemics: The study of people’s systematic handling of time in their interaction with others. This is a nonverbal that is not filtered out in CMC. Someone can note what time of day you sent a message online, that in and of itself sends a message; how long did it take for you to respond? What does that say about how they feel about the relationship?
  • 10.
  • 11. Hyperpersonal Perspective Definition: The claim that CMC relationship are often more intimate than those developed when partners are physically together. “How senders select, receivers magnify, channels promote, and feedback increases enhanced and selective communication behaviors in CMC.”
  • 12. Sender Selective Self-Presentation Online positive portrayal without fear of contradiction, which enables people to create an overwhelmingly favorable impression. Social cues that photo realism offers can have a dampening effect on the relationship and they should be avoided.
  • 13. Reciever: Overattribution of Simularity Social Identity deindividuation: CMC users overestimate their similarity with others they meet in online interest groups. Assumption that people who are in the same interest groups are like them in some important way. Commonality is all they have to go on as they form impressions of others.
  • 14. Channel: Communicating on Your Own Time Asynchronous channel: nonsimultaneous medium of communication that each individual can use when he or she desires. Online communication happens without having to attend to each other at the same time. You can plan, edit and contemplate what you are going to say next. Advantage when dealing with touchy issues, conflict and misunderstandings. Also gives the chance to fabricate reasons and make up things that might not be true.
  • 15. Feedback: Self-Fulfilling Prophecy Definition: Tendency for a person’s expectation of others to evoke a response from them that confirms what was originally expected. Senders express themselves how they want and receivers create an idealized image of their partner. Channel lets users express themselves the way they want, when they want. The person you perceive as wonderful starts acting that way.
  • 16. Critique The use of online dating might actually make relationships form faster because of anticipation of future interaction makes the impression forming process go faster. People who use CMC to join online discussion groups may have a higher need for affiliation than the typical person whose relationships are developed through multichannel modes of communication. The theory has plenty of holes and the author openly admits that. The theory makes some claims that some may feel are farfetched but the depth of research and analysis provided by Walther make it a respected and validated theory.
  • 17. Activity – WARNING: Only for brave individuals! Would you like to actively apply this theory in real life? There is a website called Omeglewhere you can chat with a random stranger one-on-one (you have the option to video chat but DO NOT choose that option…trust me). There are several ways you can apply the theory: You can be genuine and try to get to know the person; see how they self-disclose and if you can note any relational affinity messages (talking about what they think of the conversation). You can put on a false persona, see if they buy into it, and note how text-base communication allows you to be whomever you want to be.
  • 18. Activity (continued) Now because the person you’re chatting with knows that there is a very small chance you’ll ever talk with them again sometimes they enter the chat with a certain goal. You can note how they act if that seems the case; you can see how low anticipation of future interaction affects the quality of the communication You can also try to recreate something similar to Walther’s study. Go into the interaction with a goal to either be friendly or unfriendly, and see how they react. Maybe even ask after a few minutes what they think of you. Now, if you’re brave, go ahead and give it a try! http://omegle.com/