Skip to main content
Social Sci LibreTexts

10.2: Relationship Interactions

  • Page ID
    90719
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    LEARNING OUTCOMES

    • Describe the importance of affectionate communication in relationship interactions.
    • Explain how interaction expectations affect interpersonal communication.
    • Discuss how individuals manage private information in their everyday interactions.

    RELATIONSHIP INTERACTIONS

    We engage in social interaction every day with many different people, such as friends, family members, romantic partners, classmates, and even strangers. Each of those interactions and relationships brings with it a host of complexities that influence our communication.

    For example, think about how your relationship with someone influences your expectations for the kind of affection you want to share with them. With a family member, sharing affection may not be weird at all and likely welcomed. However, sharing affection with strangers is likely not something we would be as comfortable with in most cases. So what it is about some relationships that make us okay with receiving affection, but in other relationships it is not okay?

    Furthermore, consider what information you are willing to share with people. Does that differ based on our relationship with them? If you’re like most people, the answer is yes. For example, you would probably be willing to share your name, hometown, and maybe your favorite ice cream flavor with mostly anyone. But what about your religious views, family history, or personal insecurities? That type of information would likely be more closely guarded.

    So we come back to the question of why and how. Why do we engage in affectionate communication with some people and not others? Why might it bother us if someone violates our expectations for who can share affection with us? How do we determine what information we are okay sharing with people (e.g., name, hometown) and what information we are not okay sharing with people (e.g., religious views, personal insecurities)?

    To help address these questions, this module will introduce three theories that explain important aspects of everyday relationship interactions. The three theories we will discuss are 1) affection exchange theory, 2) expectancy violations theory, and 3) communication privacy management theory.

    Affection Exchange Theory

    Affection Exchange Theory (AET) focuses on questions about why humans communicate affection to each other, as well as why affectionate communication is important (Floyd, 2001). To answer these questions of “Why?”, AET relies on two different ideas:

    Idea #1: From an evolutionary perspective, developing close relationships is a fundamental need for us to achieve two critical evolutionary objectives: survival and procreation.

    Idea #2: Affectionate communication helps facilitate relationship development and thus, improves chances of survival and procreation (Floyd, 2006).

    But what does “affectionate communication” look like? As you might imagine, affection can be communicated in various ways. However, Floyd and Morman (1998) identified three distinct categories of affectionate communication.

    Type Example
    Nonverbal
    • Hold hands
    • Kiss on lips or cheek
    • Sit close together
    • Hug each other
    Verbal
    • Say “You’re my best friend.”
    • Say “You’re a good friend.”
    • Say “I love you”
    • Say “I like you”
    Support
    • Help each other with problems
    • Give each other compliments
    • Praise each other’s accomplishments
    • Acknowledge each other’s birthday

    Table \(\PageIndex{1}\): Categories of Affection Communication

    Take a moment and consider these examples. Can you think of a time when someone said or did something like this for you or with you? How did it make you feel? If you’re like most people, receiving these types of affectionate communication usually makes us feel really good!

    Actually, beyond just “good feelings”, research shows that both giving and receiving affectionate communication yields significant benefits. But it is also important to note that receiving less affectionate communication than you desire can also be detrimental.

    When People… They Tend to Experience… Research Citation
    Receive affection often…
    • Better mental health
    • Greater self-esteem
    • Being less depressed
    • Being less stressed
    Aloia & Brecht, 2017
    Give affection often…
    • Greater happiness
    • Greater self-esteem
    • Being less depressed
    • Being less stressed
    Floyd, 2002
    Don’t receive as much affection as they desire…
    • More feelings of loneliness
    • More routine physical pain
    • Being more stressed
    • Lower quality sleep
    Floyd, 2014; 2016

    Table \(\PageIndex{2}\): Benefits of Giving and Receiving Affection

    In summary, AET provides a compelling explanation for why affectionate communication is so important to us as humans. Specifically, we have learned that affectionate communication is not only important to developing and maintaining close relationships, but it also yields significant physical, mental, and emotional benefits as well.

    So does that mean we should start hugging everybody? No, not necessarily. All of us have different “limits” for how much affection we desire. For example, you might have a very high limit of desired affection with a romantic partner (i.e., we prefer more affection from people we are close to). But with a stranger, you probably have a very low limit of desired affection (i.e., we prefer less affection from people we don’t know).

    Therefore, the type of relationship we have with other people (e.g., friends, co-workers, romantic partners, etc.) will likely influence how much affectionate communication we desire from them, as well as what our expectations are for how they communicate affection to us. In turn, to experience the benefits of affectionate communication, we need to make sure it fits within the expectations of our relationships and the affection limits of the people in those relationships.

    But what if someone gives us more affectionate communication than we expect or want? In other words, what happens when those expectations or limits are broken? Would that bother you? If your romantic partner gives you more affectionate communication than you expect, that would probably be viewed positively. However, if this happens with a classmate, you might not appreciate that very much, especially if its nonverbal in nature.

    To dig into this deeper, we might question why it is okay when some people break these types of expectations, but not okay when others do it. How do we make those determinations? These types of questions about when people break communication expectations are quite common, yet difficult to answer at times. To help find some potential answers, we turn to our attention to the second theory in this module: expectancy violations theory.

    Expectancy Violations Theory

    Think about the last time you flew on an airplane. What were your expectations for how that would go? What would the flight be like? Specifically, what would the flight attendants do or say?

    We generally have expectations for what flight attendants should do before taking off, such as making sure everyone finds their seat, reminding all passengers to fasten their seat belts, and performing the safety instructions. Some of us could probably even predict what they will say if we’ve traveled quite a bit.

    However, imagine if your flight attendant did not make any announcement about seat belts or communicate any safety instructions. What if they performed no safety checks? What if all they did was say, “Welcome!” and then make a few jokes about crash landings. How would you feel? What would you do? If you’re like most people, you might be pretty concerned and even scared! Why? This would most likely be due to the flight attendants drastically violating your expectations of what they should be doing.

    Expectancy violations theory (EVT; Burgoon, 1978; Burgoon & Jones, 1976; Burgoon & Hale, 1988) initially explained the consequences of when people violate social norms and expectations about individuals’ nonverbal behaviors, specifically those about personal space. For example, think of the time when a coworker stands awkwardly close to you. EVT would say that the way they handle personal space certainly violates your expectations.

    EVT was later applied to both verbal and nonverbal encounters in a variety of communication contexts, such as emotional communication (Burgoon, 1993) and computer-mediated communication (e.g., Ramirez & Wang, 2008). The primary assumption of EVT is that individuals hold expectations/expectancies for interpersonal encounters and use them as frameworks to make sense of the world around them.

    These expectations are influenced by individual, relational, and contextual factors. When individuals’ expectations are violated (i.e., expectancy violations), their attention is deviated from the event to the violation; they experience heightened emotional and physiological reactions, and they try to assess and explain the violation (Burgoon & Hale, 1988). In essence, EVT explains both how people respond to unexpected communication incidents and why they do so.

    Let’s go back to the example presented at the beginning. The unusual behaviors of the flight attendant will certainly violate your expectations, and you probably will stop what you are doing (deviate your attention to the violation), start to feel knots in your stomach (heightened emotional and physiological reactions), and try to figure out what is going on about the flight attendant (assess and explain the violation). Hopefully no one would ever experience something like this!

    According to Burgoon (1993), communicator reward valence, or the extent to which a communicator is positively or negatively perceived, encompasses an array of characteristics, such as physical attractiveness, competence, and intelligence. People often make a quick calculation of all the available characteristics of a communicator and then assess the potential benefits interaction with the communicator might offer.

    But why does this matter? Communicator reward valence affects how people interpret and evaluate expectancy violations (i.e., whether the violation is important or unimportant and if it is desirable or undesirable). The result of the interpretation and evaluation process is what is called violation valence, which refers to how positive or negative we view a violation to be. It entails both the direction (i.e., positive or negative) and the magnitude (e.g., how much a violation deviates from an individual’s expectation) of the valence.

    Let’s think about an example here to illustrate the process. You unexpectedly find out that your friend, Bob, who you have perceived as kind and trustworthy (communication reward valence), is cheating on his girlfriend. You’ve tried your best to figure out why Bob is doing this (interpretation and evaluation). Maybe he is unhappy with his relationship? Maybe his girlfriend is also cheating on him? Regardless of the reasons for his infidelity, you believe that Bob’s behavior is quite unacceptable and wrongful (violation valence), and you decide to talk with him and give him a wake-up call.

    It is important to note that early literature on relationship violations generally views violations as negative, but EVT explains that not all violations are negative and some are even favorable (Burgoon, 2015). Think about that time when an attractive stranger pays for your Starbucks order. That would be quite an unexpected, but delightful, surprise, right? So keep in mind that “expectancy violations” can be both positive and negative.

    In summary, EVT provides a helpful perspective in understanding situations in which our expectations about social interactions are violated in some way. To help tie together a lot of what you have learned here, check out this video that provides a summary of the concepts and principles of EVT.

    As you have likely experienced, our expectations are often violated by many different people, such as our friends, family members, romantic partners, and even strangers. One way that our expectations are often violated is in how people manage or share our private information. For example, if your friend were to share one of your biggest secrets with someone else, that might violate your expectation for how your friend was supposed to behave and specifically how they were supposed to protect your information.

    In order to reduce the chance of this type of expectancy violation, you may engage in conversations with your friend to set up rules to about how they should protect your private information. But how would we come up with these types of rules? Why would we feel those rules even necessary?

    To help answer some of these questions about how we manage our private information, we turn to our third theory in this module: communication privacy management theory.

    Communication Privacy Management Theory

    Put yourself into this scenario: Your best friend, Anna, came up to you. She took a deep breath and said, “Okay, I am gonna tell you something, but you must promise that you won’t tell anyone else. Jake and I just broke up.” How would you feel? What would you say to her?

    Communication privacy management (CPM) theory (Petronio, 2002) addresses the process of disclosing private information to others. Grounded in the assumption that individuals experience consistent tensions between revealing and concealing private information, CPM presents a rule-based system in which individuals make decisions to disclose or conceal private information and coordinate privacy management with others (Petronio, 2002).

    CPM uses a boundary metaphor to explain the mechanisms through which individuals and collectives manage private information and coordinate privacy management. Unlike other theories on disclosure and privacy, it particularly highlights the role confidants play in the privacy management process.

    Petronio (2004) has articulated five core principles of CPM explaining how a rule-based privacy management system functions. The first two principles lay out the foundational assumption of CPM by presuming individuals’ perceptions about private information. Principle one states that people believe they have the ownership of their private information.

    Due to the perception of possessing private information, people believe they have the right to control and regulate the dissemination of their private information, as principle two claims. For instance, when you are back home during winter break, your uncle may welcome you with all kinds of questions about your study, your social life at college, and your romantic relationship. You may feel a bit irritated as you believe that you own your private information and you have the right to choose whom you want to disclose the information to.

    The third principle centers around privacy rule development. It proposes that people develop certain rules regarding whether to make the privacy boundary open or to keep it closed. Petronio (2002) identifies five criteria (i.e., culture, gender, motivation, risk and benefit ratio, specific contexts) people use to set up privacy management rules.

    The culture we belong to, our gender and that of the confidant influence whether we choose to disclose or not. For example, there might be specific reasons why Anna decides to tell you about her breakup (e.g., to seek support). Additionally, she probably has considered the risks and benefits associated with disclosing and the context in which the disclosure should happen.

    The fourth principle explains what happens when people disclose private information to others. According to CPM, individuals who reveal private information to others make others the co-owners of the private information. New privacy rules are thus needed to be negotiated so that all stakeholders are clear about their roles in managing the private information. According to CPM, there are three types of rules that are often discussed and negotiated: boundary linkage, boundary ownership, and boundary permeability (Petronio, 2010).

    Boundary linkage refers to the considerations about whether co-owners of private information are allowed to grant access to others into the privacy boundary, and if so, the criteria for selecting new confidants privy to the information. Boundary ownership represents how much control co-owners independently have with regard to the management of private information. Boundary permeability involves concerns about how much private information can flow out of the boundary.

    Going back to the example we talked about at the beginning of this module. Your best friend Anna told you that she broke up with her boyfriend Jake but did not want you to tell anyone else. This is an effort to establish privacy rules. Maybe a few days later, you said to Anna: “Kelly has been worrying about you since she hasn’t seen you at the sorority gatherings. Do you think I can tell her that you broke up with Jake? Or at least you are having some issues with your relationship?”

    Here, you are negotiating existing privacy rules with Anna, particularly about whether you have the control to distribute the information (boundary ownership), whether you can grant Kelly the access to the private information (boundary linkage), and if so, how much you can share (boundary permeability).

    The fifth principle considers the consequences of ineffective and unsuccessful boundary coordination. CPM predicts that boundary turbulence (e.g., unwanted intrusion, misunderstanding, interpersonal conflicts) will occur when expectations for privacy management are unmet; when privacy rules are violated by one or more of the co-owners, or when the privacy rules are unclear (e.g., fuzzy boundaries).

    CPM has been a helpful perspective for researchers studying the management of private information in various contexts. For example, Brannon and Rauscher’s (2019) study indicated that that boundary permeability was associated with how individuals responded to discussions about sexually transmitted infections (e.g., caring more for the partner or protecting oneself). Ledbetter’s (2019) research suggested that family communication patterns were associated with the degree of parental privacy invasions and children’s privacy defense during the first year of college.

    At this point, you have been able to learn quite a bit about CPM, as well as the way this theory explains the processes and rules for how we manage our private information. To help tie this all together, let’s take a look at the following video, which summarizes the main ideas discussed in this video.

    With all of this in mind, the next time your friend tells you some private information and expect you to keep it to yourself, hopefully you can remember CPM. You can realize that you are included as the co-owner of your friend’s private information and that it’s better to clearly communicate about privacy rules for that information so that you don’t get into trouble later!

    LEARNING ACTIVITIES

    Activity 1: Identifying Factors of Expectancy Violations

    1. Review the video clip from the movie “Love Actually:" https://youtu.be/2y-8vxObugM
    2. Gather student perceptions of the context and what is happening.
    • In short, Karen accidentally finds out a fancy gold necklace in her husband, Harry’s coat pocket, and assumes that it is his Christmas gift for her. However, she ends up unwrapping a Joni Mitchell CD from Harry. Clearly, the gold necklace is not meant for her but for someone else. Although Karen is not fully aware of what is going on, we as audience know that Harry has an extramarital relationship with his secretary Mia.

    3. Ask students to apply expectancy violations theory to this situation using the following prompt:

    • Based on what we know about EVT, what factors might influence Karen’s interpretation and evaluation of the fact that her husband gives a fancy necklace to someone other than her?

    Activity 2: Comparing Affection Exchange Theory & the Pop Culture “5 Love Languages”

    1. Introduce the concept of the “5 Love Languages” to student. The concept may be verbally introduced or students can individually have review the “5 Love Languages” website: https://www.5lovelanguages.com/
    2. Review how each love language is defined.
    3. Ask students to compare the categories of affectionate communication described by AET and the five love languages.
    • What similarities do you see?
    • How do they match up?

    4. An additional step to this exercise might be to have students complete…

    REFERENCES

    Aloia, L. S., & Brecht, D. (2017). Psychological well-being as a function of affectionate communication and emotional intelligence. Communication Research Reports, 34(4), 297-306. https://doi.org/10.1080/08824096.2017.1350570

    Brannon, G., & Rauscher, E. (2019). Managing Face while Managing Privacy: Factors that Predict Young Adults’ Communication about Sexually Transmitted Infections with Romantic Partners. Health Communication, 34, 1833–1844. https://doi.org/10.1080/10410236.2018.1536951

    Burgoon, J. K. (1978). A communication model of personal space violations: Explication and an initial test. Human Communication Research, 4, 129–142.

    Burgoon, J. K. (1993). Interpersonal expectations, expectancy violations, and emotional communication. Journal of Language and Social Psychology, 12, 30-48. https://doi.org/10.1177/0261927X93121003

    Burgoon, J. K. (2015). Expectancy violations theory. In C. R. Berger & M. E. Roloff (Eds), The international encyclopedia of interpersonal communication (pp. 1-9). Hoboken, NJ: Wiley Blackwell.

    Burgoon, J. K., & Hale, J. L. (1988). Nonverbal expectancy violations: Model elaboration and application to immediacy behaviors. Communications Monographs, 55, 58-79. https://doi.org/10.1080/03637758809376158

    Burgoon, J. K., & Jones, S. B. (1976). Toward a theory of personal space expectations and their violations. Human Communication Research, 2, 131–146.

    Floyd, K. (2001). Human affection exchange: I. Reproductive probability as a predictor of men's affection with their sons. The Journal of Men's Studies, 10(1), 39-50. https://doi.org/10.3149/jms.1001.39

    Floyd, K. (2002). Human affection exchange: V. attributes of the highly affectionate. Communication Quarterly, 50(2), 135-152. https://doi.org/10.1080/01463370209385653

    Floyd, K. (2006). Communicating affection: Interpersonal behavior and social context. Cambridge University Press.

    Floyd, K. (2014). Relational and health correlates of affection deprivation. Western Journal of Communication, 78(4), 383-403. doi:10.1080/10570314.2014.927071

    Floyd, K. (2016). Affection deprivation is associated with physical pain and poor sleep quality. Communication Studies, 67(4), 379-398. doi:10.1080/10510974.2016.1205641

    Floyd, K., & Morman, M. (1998). The measurement of affectionate communication. Communication Quarterly, 46(2), 144–162. https://doi.org/10.1080/01463379809370092

    Ledbetter, A. (2019). Parent-child privacy boundary conflict patterns during the first year of college: Mediating family communication patterns, predicting psychosocial distress. Human Communication Research, 45, 255–285. https://doi.org/10.1093/hcr/hqy018

    Petronio, S. (2002). The boundaries of privacy: Dialectics of disclosure. State University of New York Press.

    Petronio, S. (2004). Road to developing communication privacy management theory: Narrative in progress, please stand by. Journal of Family Communication, 4, 193-207. https://doi.org/10.1080/15267431.2004.9670131

    Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, 2, 175-196. doi.org/10.1111/j.1756-2589.2010.00052.x

    Ramirez Jr, A., & Wang, Z. (2008). When online meets offline: An expectancy violations theory perspective on modality switching. Journal of Communication, 58, 20-39. https://doi.org/10.1111/j.1460-2466.2007.00372.x

    GLOSSARY

    Affection: Feelings of liking, fondness.

    Boundary turbulence: The relational outcomes that occur when expectations for privacy management are unfulfilled.

    Communicator reward valence: The extent to which a communicator is positively or negatively perceived.

    Expectancy violations: Specific communication behaviors that are recognizably discrepant from one’s expectations and cause heightened emotional and psychological reactions.

    Expectations/expectancies: The collection of one’s judgments on and perceptions about what communication behaviors are feasible, appropriate, and typical in a particular setting.

    Violation valence: The degree to which an unexpected behavior is perceived as positive or negative.

    Co-owners: Individuals who have access to others’ private information; also called confidants.

    Ownership: The right and entitlement one perceives to have regarding the possession and dissemination of their private information.

    Rule-based system: Refers to the systematic process of private information management as explained by CPM theory.


    This page titled 10.2: Relationship Interactions is shared under a CC BY-NC-SA license and was authored, remixed, and/or curated by Daniel Usera & contributing authors.

    • Was this article helpful?