際際滷

際際滷Share a Scribd company logo
Communication accommodation theory
WHAT IS IT?
Communication Accommodation Theory deals
with accommodating others to certain
communication interactions. It can be used in
the workplace, school, or just having a
conversation with other people. People change
the way they speak to understand others better
to accommodate to their communication needs.
WHO USES IT YOU ASK?
Howard Giles is one of the main people who uses
this theory. He's a professor at the
University of Santa Barbra!
Howard Giles Aw isnt
that nice?
WHO ELSE?
RACE
Doctors
Workplace
SCHOOL
WHATS THE POINT YOU ASK?
The point of Communication Accommodation
Theory is to be able to communicate with
others affectively! Without it, problems with
language barriers, age barriers, or
understanding people clearly can be a result
of failed communication accommodation.
I look better than you little
boy!!!
I CAN RUN
FASTER THAN
YOU SLOW POKE!!!
I talk with my hands
CRITICISM
Researchers argue that
people accommodate to
others on purpose. So you
mean sometimes people
dont accommodate others
because they dont want
to???
YES SIR!!!!!!!!!!!!!!!!!!!!!!!!
Which causes problems with
communication
Communication accommodation theory
WHAT ELSE YOU ASK?
We choose how to communicate! SO
ACCOMMODATE OTHERS TODAY! It
makes the world a happy place!!!
Communication accommodation theory
Ad

Recommended

Communication Accommodation Theory - COMM 201 Katie Davidson
Communication Accommodation Theory - COMM 201 Katie Davidson
kjdavid
Communication Accommodation Theory
Communication Accommodation Theory
cmendogni
Communication Accommodation Theory
Communication Accommodation Theory
dnlowry
Theories About Behavior An Attempt To Identify With General Situation
Theories About Behavior An Attempt To Identify With General Situation
Dr Aneek Gupta
CMS495 presentation
CMS495 presentation
alissajandreau
Communication Accommodation Theory
Communication Accommodation Theory
Andrew Siguan
Communication accommodation theory
Communication accommodation theory
behzad rafati
Types of speech context and styles
Types of speech context and styles
JezreelLindero
Expectancy violation theory
Expectancy violation theory
asricha13
Theories focusing on Social Engineering Effective Outcomes
Theories focusing on Social Engineering Effective Outcomes
Shara Guape
Interaction Adaptation Theory of Interpersonal Communication
Interaction Adaptation Theory of Interpersonal Communication
Anam Tanvir
Expectancy Violations Theory
Expectancy Violations Theory
Shinta Purnama Sugiana
Expectancy Violations Theory
Expectancy Violations Theory
Arun Jacob
Intercultural communication shpresa
Intercultural communication shpresa
iridabualli
Expectancy violation theory (evt)
Expectancy violation theory (evt)
maneicon22
Teori pelanggaran harapan (presentasi Dirman)
Teori pelanggaran harapan (presentasi Dirman)
Dirman Immangk
Communication Accommodation Theory
Communication Accommodation Theory
Sheena Bautista
Introduction to communication theories lecture 8
Introduction to communication theories lecture 8
Marvin Evangelista
Introduction to communication theories lecture 7
Introduction to communication theories lecture 7
Marvin Evangelista
Identity Negotiation Theory
Identity Negotiation Theory
University of the Philippines Diliman
Communication accommodation theory
Communication accommodation theory
sellis36
Interpersonal Communication
Interpersonal Communication
Dr. Aitza Haddad Nu単ez
Face Negotiation Theory
Face Negotiation Theory
ByMar Diversity and Communication Training
Verbal and non verbal communication
Verbal and non verbal communication
Gull Zareen Khan
Accommodation Theory
Accommodation Theory
Irsalina Viramdani
paper no 15 (Mass communication and media studies)
paper no 15 (Mass communication and media studies)
trivedidisha
Interaction adaptation - Sarah Chepregi
Interaction adaptation - Sarah Chepregi
sarahc92
Complete the University of Phoenix Material Communication Theorie.docx
Complete the University of Phoenix Material Communication Theorie.docx
donnajames55
Introduction to Communication WorksheetCOM100 Version 46.docx
Introduction to Communication WorksheetCOM100 Version 46.docx
mariuse18nolet
University of Phoenix MaterialIntroduction to Communication Work.docx
University of Phoenix MaterialIntroduction to Communication Work.docx
cargillfilberto

More Related Content

Viewers also liked (16)

Expectancy violation theory
Expectancy violation theory
asricha13
Theories focusing on Social Engineering Effective Outcomes
Theories focusing on Social Engineering Effective Outcomes
Shara Guape
Interaction Adaptation Theory of Interpersonal Communication
Interaction Adaptation Theory of Interpersonal Communication
Anam Tanvir
Expectancy Violations Theory
Expectancy Violations Theory
Shinta Purnama Sugiana
Expectancy Violations Theory
Expectancy Violations Theory
Arun Jacob
Intercultural communication shpresa
Intercultural communication shpresa
iridabualli
Expectancy violation theory (evt)
Expectancy violation theory (evt)
maneicon22
Teori pelanggaran harapan (presentasi Dirman)
Teori pelanggaran harapan (presentasi Dirman)
Dirman Immangk
Communication Accommodation Theory
Communication Accommodation Theory
Sheena Bautista
Introduction to communication theories lecture 8
Introduction to communication theories lecture 8
Marvin Evangelista
Introduction to communication theories lecture 7
Introduction to communication theories lecture 7
Marvin Evangelista
Identity Negotiation Theory
Identity Negotiation Theory
University of the Philippines Diliman
Communication accommodation theory
Communication accommodation theory
sellis36
Interpersonal Communication
Interpersonal Communication
Dr. Aitza Haddad Nu単ez
Face Negotiation Theory
Face Negotiation Theory
ByMar Diversity and Communication Training
Verbal and non verbal communication
Verbal and non verbal communication
Gull Zareen Khan
Expectancy violation theory
Expectancy violation theory
asricha13
Theories focusing on Social Engineering Effective Outcomes
Theories focusing on Social Engineering Effective Outcomes
Shara Guape
Interaction Adaptation Theory of Interpersonal Communication
Interaction Adaptation Theory of Interpersonal Communication
Anam Tanvir
Expectancy Violations Theory
Expectancy Violations Theory
Arun Jacob
Intercultural communication shpresa
Intercultural communication shpresa
iridabualli
Expectancy violation theory (evt)
Expectancy violation theory (evt)
maneicon22
Teori pelanggaran harapan (presentasi Dirman)
Teori pelanggaran harapan (presentasi Dirman)
Dirman Immangk
Communication Accommodation Theory
Communication Accommodation Theory
Sheena Bautista
Introduction to communication theories lecture 8
Introduction to communication theories lecture 8
Marvin Evangelista
Introduction to communication theories lecture 7
Introduction to communication theories lecture 7
Marvin Evangelista
Communication accommodation theory
Communication accommodation theory
sellis36
Verbal and non verbal communication
Verbal and non verbal communication
Gull Zareen Khan

Similar to Communication accommodation theory (20)

Accommodation Theory
Accommodation Theory
Irsalina Viramdani
paper no 15 (Mass communication and media studies)
paper no 15 (Mass communication and media studies)
trivedidisha
Interaction adaptation - Sarah Chepregi
Interaction adaptation - Sarah Chepregi
sarahc92
Complete the University of Phoenix Material Communication Theorie.docx
Complete the University of Phoenix Material Communication Theorie.docx
donnajames55
Introduction to Communication WorksheetCOM100 Version 46.docx
Introduction to Communication WorksheetCOM100 Version 46.docx
mariuse18nolet
University of Phoenix MaterialIntroduction to Communication Work.docx
University of Phoenix MaterialIntroduction to Communication Work.docx
cargillfilberto
Communication theory hand out for student ch-1 $ 2.docx
Communication theory hand out for student ch-1 $ 2.docx
nigistgebire
communication barrier.pptx
communication barrier.pptx
JoyBernadetteEslera1
Cat
Cat
Thantra Academy of Behavioral and Allied Sciences
The Awkward Moment
The Awkward Moment
Dan Dufour
Communication and Interaction
Communication and Interaction
Vijayalakshmi Murugesan
Communication skill
Communication skill
Vijayalakshmi Murugesan
Communicationskillunit1 170517064117
Communicationskillunit1 170517064117
Aravindharamanan S
03 ppt slides
03 ppt slides
Amy Jauman
Communication skill -Principles of Communication
Communication skill -Principles of Communication
Vijayalakshmi Murugesan
Communications skills jfl
Communications skills jfl
Jean Francois Laurette
Communication as a phenomenon of psychology
Communication as a phenomenon of psychology
Eneutron
Communication
Communication
Sharon Ng
Pellouchoud adam ignite_slideshow
Pellouchoud adam ignite_slideshow
Pillowshoe
Aac needs-assessment-(1-15-10)
Aac needs-assessment-(1-15-10)
m55mick
paper no 15 (Mass communication and media studies)
paper no 15 (Mass communication and media studies)
trivedidisha
Interaction adaptation - Sarah Chepregi
Interaction adaptation - Sarah Chepregi
sarahc92
Complete the University of Phoenix Material Communication Theorie.docx
Complete the University of Phoenix Material Communication Theorie.docx
donnajames55
Introduction to Communication WorksheetCOM100 Version 46.docx
Introduction to Communication WorksheetCOM100 Version 46.docx
mariuse18nolet
University of Phoenix MaterialIntroduction to Communication Work.docx
University of Phoenix MaterialIntroduction to Communication Work.docx
cargillfilberto
Communication theory hand out for student ch-1 $ 2.docx
Communication theory hand out for student ch-1 $ 2.docx
nigistgebire
The Awkward Moment
The Awkward Moment
Dan Dufour
Communicationskillunit1 170517064117
Communicationskillunit1 170517064117
Aravindharamanan S
03 ppt slides
03 ppt slides
Amy Jauman
Communication skill -Principles of Communication
Communication skill -Principles of Communication
Vijayalakshmi Murugesan
Communication as a phenomenon of psychology
Communication as a phenomenon of psychology
Eneutron
Communication
Communication
Sharon Ng
Pellouchoud adam ignite_slideshow
Pellouchoud adam ignite_slideshow
Pillowshoe
Aac needs-assessment-(1-15-10)
Aac needs-assessment-(1-15-10)
m55mick
Ad

Recently uploaded (20)

10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Ad

Communication accommodation theory

  • 2. WHAT IS IT? Communication Accommodation Theory deals with accommodating others to certain communication interactions. It can be used in the workplace, school, or just having a conversation with other people. People change the way they speak to understand others better to accommodate to their communication needs.
  • 3. WHO USES IT YOU ASK? Howard Giles is one of the main people who uses this theory. He's a professor at the University of Santa Barbra! Howard Giles Aw isnt that nice?
  • 6. WHATS THE POINT YOU ASK? The point of Communication Accommodation Theory is to be able to communicate with others affectively! Without it, problems with language barriers, age barriers, or understanding people clearly can be a result of failed communication accommodation. I look better than you little boy!!!
  • 7. I CAN RUN FASTER THAN YOU SLOW POKE!!!
  • 8. I talk with my hands
  • 9. CRITICISM Researchers argue that people accommodate to others on purpose. So you mean sometimes people dont accommodate others because they dont want to???
  • 10. YES SIR!!!!!!!!!!!!!!!!!!!!!!!! Which causes problems with communication
  • 12. WHAT ELSE YOU ASK? We choose how to communicate! SO ACCOMMODATE OTHERS TODAY! It makes the world a happy place!!!