[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/772072.772096guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

Motivating, influencing, and persuading users

Published: 01 January 2002 Publication History

Abstract

No abstract available.

References

[1]
Alessi, S. M. (1991). Fidelity in the design of instructional simulations. Journal of Computer-Based Instruction, 15, 40-47.
[2]
Balci, O. (1998, December 13-16). Verification, validation, and accreditation . Paper presented at the Winter Simulation Conference. Washington, DC.
[3]
Balci, O., Henrikson, J. O., & Roberts, S. D. (1986, December 8-10). Credibility assessment of simulation results. In J. R. Wilson, J. O. Henriksen, & S. D. Roberts (Eds.), 1986 Winter Simulation Conference Proceedings. Washington, DC.
[4]
Bandura, A. (1997). Self-efficacy: The exercise of control. New York: W. H. Freeman.
[5]
Bandura, A., Georgas, J., & Manthouli, M. (1996). Reflections on human agency. In Contemporary psychology in Europe: Theory, research, and applications. Seattle, WA: Hogrefe & Huber.
[6]
Beniger, J. R. (1987). Personalization of mass media and the growth of pseudo-community. Communication Research, 14(3), 352-371.
[7]
Berdichevsky, D., & Neunschwander, E. (1999). Towards an ethics of persuasive technology. Communications of the ACM, 42(5), 51-58.
[8]
Brehm, B. (1997, December). Self-confidence and exercise success. Fitness Management, December, 22-23.
[9]
Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6(3), 203-242.
[10]
Bullinger, A. H., Roessler, A., & Mueller-Spahn, F. (1998), From toy to tool: The development of immersive virtual reality environments for psychotherapy of specific phobias, In Studies in health technology and informatics (Vol, 58, pp. 103-111). Amsterdam: IOS Press.
[11]
Carlin, A. S., Hoffman, H. G., & Weghorst, S. (1997). Virtual reality and tactile augmentation in the treatment of spider phobia: A case report. Behaviour Research & Therapy, 35(2), 153-158.
[12]
Caruso, D. (1999, November 22). Digital commerce: Self indulgence in the Internet industry. The New York Times.
[13]
Ceci, R., & Hassmen, P. ( 1991 ). Self-monitored exercise at three different PE intensities in treadmill vs. field running. Medicine and Science in Sports and Exercise, 6(23), 732-738.
[14]
Crosbie, R. E., & Hay, J. L. (1978). The credibility of computerised models. In R. E. Crosbie (Ed.), Toward real-time simulation. Languages, models and systems. La Jolla, CA: Society of Computer Simulation.
[15]
de Jong, T. (1991 ). Learning and instruction with computer simulations. Education & Computing, 6, 217-229.
[16]
DeCharms, R. (1968). Personal causation: The internal affective determinants of behavior. New York: Academic.
[17]
Denning, P., & Metcalfe, R. (1997). Beyond calculation: The next fifty years of computing. New York: Springer-Verlag.
[18]
DeTienne, Kristen Bell (1993, September-October). Big brother or friendly coach? Computer monitoring in the 21st century. The Futurist, 27(5), 33-37.
[19]
Dijkstra, J. J., Liebrand, W. B. G., & Timminga, E. (1998). Persuasiveness of expert systems. Behaviour and Information Technology, 17(3), 155-163.
[20]
Fogg, B. J. (1997). Charismatic computers: Creating more likable and persuasive interactive technologies by leveraging principles from social psychology. Doctoral thesis, Stanford University, Stanford, CA.
[21]
Fogg, B. J. (1998). Persuasive computers: Perspectives and research directions. Proceedings of the Conference on Human Factors in Computing Systems, CHI 98. Los Angeles, CA. New York: ACM Press.
[22]
Fogg, B. J. (1999). Persuasive technologies. Communications of the ACM, 42(5), 26-29.
[23]
Fogg, B. J. (2002). Persuasive technologies: Using computer power to change attitudes and behaviors. San Francisco, CA: Morgan Kaufmann.
[24]
Fogg, B. J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., & Treinen, M. (2000). Elements that affect web credibility: Early results from a self-report study. Proceedings of the ACM CHI 2000 Conference on Human Factors in Computing Systems. New York: ACM Press.
[25]
Fogg, B. J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., & Treinen, M. (2001). What makes a web site credible? A report on a large quantitative study. Proceedings of the ACM CHI 2001 Conference on Human Factors in Computing Systems. New York: ACM Press.
[26]
Fogg, B. J., & Nass, C. (1997a). How users reciprocate to computers: An experiment that demonstrates behavior change. Proceedings of the Conference on Human Factors in Computing Systems, CHI '97. New York: ACM Press.
[27]
Fogg, B. J., & Nass, C. (1997b). Silicon sycophants: The effects of computers that flatter. International Journal of Human-Computer Studies, 46(5), 551-561.
[28]
Fogg, B. J., & Tseng, H. (1999). The elements of computer credibility. Proceedings of the Conference on Human Factors and Computing Systems, CHI 99. Pittsburgh, PA. New York: ACM Press.
[29]
Ford, M. E. (1992). Motivating humans: Goals, emotions, personal agency beliefs. Newbury Park, CA: Sage.
[30]
Friedman, B., & Grudin, J. (1998). Trust and accountability: preserving human values in interactional experience. Proceedings of the Conference on Human Factors in Computing Systems, CHI 98. Los Angeles, CA. New York: ACM Press.
[31]
Gahm, G. A. (1986). The effects of computers, source salience and credibility on persuasion. Doctoral thesis. State University of New York at Stony Brook.
[32]
Gatignon, H., & Robertson, T. S. (1991). Innovative decision processes. Englewood Cliffs, NJ: Prentice-Hall.
[33]
Ghosh, A., & Marks, I. M. (1987). Self-treatment of agoraphobia by exposure. Behavior Therapy, 18(1), 3-16.
[34]
Gouldner A. W. (1960). The norm of reciprocity: A preliminary statement. American Sociological Review, 25, 161-178.
[35]
Gredler, M. B. (1986). A taxonomy of computer simulations. Educational Technology, 26, 7-12.
[36]
Hennessy, S., & O'Shea, T. (1993). Learner perceptions of realism and magic in computer simulations. British Journal of Educational Technology, 24(2), 125-38.
[37]
Jimison, H. B., Street, R. L., Jr., & Gold, W. R. (1997). Patient-specific interfaces to health and decision-making information. LEA's communication series. Mahwah, NJ: Lawrence Erlbaum.
[38]
Johnson, T. J., & Kaye, B. K. (1998). Cruising is believing? Comparing Internet and traditional sources on media credibility measures. Journalism and Mass Communication Quarterly, 75(2), 325-340.
[39]
Jones, E. E. (1990). Interpersonal perception. New York: W. H. Freeman.
[40]
Kay, A. (1984). Computer software. Scientific American, 251, 53-59.
[41]
Kernal, H. K. (1999). Effects of design characteristics on evaluation of a home control system: A comparison of two research methodologies . Paper presented to SIGGRAPH Annual Conference 2000. New Orleans, LA.
[42]
Khaslavsky, J., & Shedroff, N. (1999). Understanding the seductive experience. Communications of the ACM, 42(5), 45-49.
[43]
Kilgore, R. (1998). Publishers must set rules to preserve credibility. Advertising Age, 69(48), 31.
[44]
Kim, N. (1999). World Wide Web credibility: What effects do advertisements and typos have on the perceived credibility of web page information? Unpublished honors thesis, Stanford University. Stanford, CA.
[45]
King, P., & Tester, J. (1999). The landscape of persuasive technologies. Communications of the ACM, 42(5), 31-38.
[46]
Kirby, K. C. (1996). Computer-assisted treatment of phobias. Psychiatric Services, 4(2), 139-140, 142.
[47]
Klein, R. A. (1999). Treating fear of flying with virtual reality exposure therapy. Innovations in Clinical Practice: A Source Handbook, 17, 449-465.
[48]
Lerch, F. J., & Prietula, M. J. (1989). How do we trust machine advice? Designing and using human-computer interfaces and knowledge based systems, in G. Salvendy & M. J. Smith (Eds.), Designing and using human-computer-interface and knowledge-based systems (pp. 411-419). Amsterdam: Elsevier.
[49]
Lerch, F. J., Prietula, M. J., & Kulik, C. T. (1997). The Turing effect: The nature of trust in expert system advice. In Expertise in context. Human and machine. Cambridge, MA: MIT Press.
[50]
Lieberman, D. (1992). The computer's potential role in health education. Health Communication, 4, 211-225.
[51]
Lieberman, D. (1997). Interactive video games for health promotion. In W. G. R. Street &T. Mannin (Eds.), Health promotion and interactive technology. Mahwah, NJ: Lawrence Earlbaum.
[52]
Machrone, B. (1998, July 1). Driving drunk. PC Magazine.
[53]
MacInnis, D. J., & Jaworski, B. J. (1989). Information processing from advertisements: Toward an integrative framework. Journal of Marketing, 53(4), 1-23.
[54]
MacInnis, D. J., Moorman, C., & Jaworski, B. J. (1991). Enhancing and measuring consumers' motivation, opportunity, and ability to process brand information from ads. Journal of Marketing, 55(4), 32-53.
[55]
Malone, T., & Lepper, M. (1987). Making learning fun: A taxonomy of intrinsic motivation for learning. In R. E. Snow & M. J. Farr (Eds.), Aptitude, learning, and instruction. Hillsdale, NJ: Lawrence Earlbaum.
[56]
Marshall, C., & Maguire, T. O. (1971). The computer as social pressure to produce conformity in a simple perceptual task. AV Communication Review, 19(1), 19-28.
[57]
McDonald, M., Schumann, D. W., & Thorson, E. (1999). Cyberhate: Extending persuasive techniques of low credibility sources to the World Wide Web. In D. W. Schumann & E. Thorson (Eds.),Advertising and the World Wide Web. Mahwah, NJ: Lawrence Erlbaum.
[58]
Moon, Y. (1998). The effects of distance in local versus remote human-computer interaction. Proceedings of the Conference on Human Factors in Computing Systems, CHI 98 (pp. 103-108). New York: ACM.
[59]
Moon, Y., & Nass, C. (1996). How "real" are computer personalities? Psychological responses to personality types in human-computer interaction. Communication Research, 23(6), 651-674.
[60]
Muehlenhard, C. L., Baldwin, L. E., Bourg, W. J., & Piper, A. M. (1988). Helping women "break the ice": A computer program to help shy women start and maintain conversations with men. Journal of Computer-Based Instruction, 15(1), 7-13.
[61]
Muller, R. L. (1974). Conforming to the computer: Social influence in computer-human interaction. Doctoral thesis. Syracuse University.
[62]
Nass, C., Fogg, B. J., & Moon, Y. (1996). Can computers be teammates? International Journal of Human-Computer Studies, 45(6), 669-678.
[63]
Nass, C., Moon, Y., & Carney, P. (1999). Are people polite to computers? Responses to computer-based interviewing systems. Journal of Applied Social Psychology, 29(5), 1093-1110.
[64]
Nass, C., Moon, Y., Fogg, B. J., Reeves, B., & Dryer, D. C. (1995). Can computer personalities be human personalities? International Journal of Human-Computer Studies, 43(2), 223-239.
[65]
Nass, C., & Steuer, J. (1993). Voices, boxes, and sources of messages: Computers and social actors. Human Communication Research, 19(4), 504-527.
[66]
Nass, C. I., Moon, Y., Morkes, J., Eun-Young, K., & Fogg, B. J. (1997). Computers are social actors: A review of current research. In B. Friedman (Ed.), Human values and the design of computer technology . Stanford, CA: CSLI & Cambridge Press.
[67]
Nielsen, J. (1997). How users read on the web. Available: www.useit. com/alertbox/9710a.html
[68]
Nowak, G.J., Shamp, S., Hollander, B., Cameron, G. T., Schumann, D. W., & Thorson, E. (1999). Interactive media: A means for more meaningful advertising? Advertising and consumer psychology. Mahwah, NJ: Lawrence Erlbaum.
[69]
Pancer, S. M., George, M., & Gebotys, R. J. (1992). Understanding and predicting attitudes toward computers. Computers in Human Behavior, 8, 211-222.
[70]
Parise, S., Kiesler, S., Sproull, L., & Waters, K. (1999). Cooperating with life-like interface agents. Computers in Human Behavior, 15(2), 123-142.
[71]
Petty, R. E., & Cacioppo, J. T. ( 1981). Attitudes and Persuasion--Classic and contemporary approaches. Dubuque, IA: W. C. Brown.
[72]
Porcari, J. P., Zedaker, M.S., & Maldari, M. S. (1998). Virtual motivation. Fitness Management, 14(13), 48-51.
[73]
Quintanar, L., Crowell, C., & Pryor, J. (1982). Human-computer interaction: A preliminary social psychological analysis. Behavior Research Methods and Instrumentation, 14(2), 210-220.
[74]
Reed, E. (1996). The necessity of experience. New Haven: Yale University Press.
[75]
Reeves, B., & Nass, C. I. (1996). The media equation: How people treat computers, television, and new media like real people aud places. New York: Cambridge University Press Center for the Study of Language and Information.
[76]
Reis, J. (1998). Research results: National data analysis. The Century Council. Available: www.centurycouncil.org/alcohol101/dem_nat. cfm
[77]
Ross, L., & Nisbett, R. E. (1991). The person and the situation: Perspectives of social psychology. New York: McGraw-Hill.
[78]
Schlosser, A. E., & Kanifer, A, (1999). Current advertising on the Internet: The benefits and usage of mixed-media advertising strategies. In D. W. Schumann & E. Thorson (Eds.), Advertising and the World Wide Web (pp. 41-62). Mahwah, NJ: Lawrence Erlbaum.
[79]
Schneider, S. J. (1985). Computer technology and persuasion: The case of smoking cessation. Proceedings of COMPINT 85: Computer Aided Technologies. Washington, DC: IEEE.
[80]
Self, C. S. (1996). Credibility. In M. Salwen & D. Stacks (Eds.), An integrated approach to communication theory and research. Mahwah, NJ: Erlbaum.
[81]
Stiff, J. B. (1994). Persuasive communication. New York: The Guilford Press.
[82]
Strecher, V.J. (1999). Computer-tailored smoking cessation materials: A review and discussion. Special Issue: Computer-tailored education. Patient Education & Counseling, 36(2), 107-117.
[83]
Strecher, V. J., DeVellis, B. M., Becker, M. H., & Rosenstock, I. M. (1986). The role of self-efficacy in achieving health behavior change. Health Education Quarterly, 13(1), 73-92.
[84]
Strecher, V. J., Kreuter, M., Den Boer, D.-J., Kobrin, S., Hospers, H. J., & Skinner, C. S. (1994). The effects of computer-tailored smoking cessation messages in family practice settings. Journal of Family Practice, 39(3), 262-270.
[85]
Sullivan, C. (1999). Newspapers must retain credibility. Editor & Publisher, 1, 4-5.
[86]
Thompson, C. A. (1992). Exercise adherence and performance: Effects on self-efficacy and outcome expectations. Doctoral thesis. Illinois Institute of Technology.
[87]
Todd, P. A., & Benbasat, I. (1994). The influence of decision aids on choice strategies under conditions of high cognitive load. IEEE Transactions on Systems, Man, & Cybernetics, 24(4), 537-547.
[88]
Tombari, M. L., Fitzpatrick, S. J., & Childress, W. (1985). Using computers as contingency managers in self-monitoring interventions: A case study. Computers in Human Behavior, 1(1), 75-82.
[89]
Tseng, S., & Fogg, B. J. (1999). Credibility and computing technology. Communications of the ACM, 42(5), 39-44.
[90]
Verplank, B., Fulton, J., Black, A., & Moggridge, B. (1993). Observation and invention: Uses of scenarios in interaction design. Handout for tutorial at INTERCHI '93, Amsterdam.
[91]
Wiederhold, B. K., Davis, R., Wiederhold, M. D., & Riva, G. (1998). The effects of immersiveness on physiology. In Studies in health technology and informatics (Vol. 58, pp. 52-60). Amsterdam: IOS.
[92]
Woodward, J. P., Carnine, D., & Davis, L. G. (1986). Health ways: A computer simulation for problem solving in personal health management. Special Issue: Technological advances in community health. Family & Community Health, 9(2), 60-63.
[93]
Zietsman, A. I., & Hewson, P. W. (1986). Effect of instruction using micro-computer simulations and conceptual change strategies on science learning. Journal of Research in Science Teaching, 23(1), 27-39.

Cited By

View all
  • (2018)Towards design recommendations for training of security critical agents in mixed reality environmentsProceedings of the 32nd International BCS Human Computer Interaction Conference10.14236/ewic/HCI2018.84(1-5)Online publication date: 4-Jul-2018
  • (2018)Using Applied Games to Engage mHealth UsersProceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play10.1145/3242671.3242686(511-522)Online publication date: 23-Oct-2018
  • (2017)Apps with BenefitsProceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems10.1145/3027063.3053276(2452-2458)Online publication date: 6-May-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide books
The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications
January 2002
1310 pages
ISBN:0805838384

Publisher

L. Erlbaum Associates Inc.

United States

Publication History

Published: 01 January 2002

Qualifiers

  • Chapter

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Towards design recommendations for training of security critical agents in mixed reality environmentsProceedings of the 32nd International BCS Human Computer Interaction Conference10.14236/ewic/HCI2018.84(1-5)Online publication date: 4-Jul-2018
  • (2018)Using Applied Games to Engage mHealth UsersProceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play10.1145/3242671.3242686(511-522)Online publication date: 23-Oct-2018
  • (2017)Apps with BenefitsProceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems10.1145/3027063.3053276(2452-2458)Online publication date: 6-May-2017
  • (2015)Redefining the fundamentals of photography with cooperative photographyProceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia10.1145/2836041.2836045(37-47)Online publication date: 30-Nov-2015
  • (2013)User requirements for gamifying sports softwareProceedings of the 3rd International Workshop on Games and Software Engineering: Engineering Computer Games to Enable Positive, Progressive Change10.5555/2662593.2662597(22-26)Online publication date: 18-May-2013
  • (2013)TiNYARMProceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies10.1145/2494188.2494207(1-8)Online publication date: 4-Sep-2013
  • (2013)A Framework for Evaluating Behavior Change Interventions through GamingProceedings of the 10th International Conference on Advances in Computer Entertainment - Volume 825310.1007/978-3-319-03161-3_27(368-379)Online publication date: 12-Nov-2013
  • (2012)Saving energy at workProceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia10.1145/2406367.2406379(1-4)Online publication date: 4-Dec-2012
  • (2012)"We've bin watching you"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/2207676.2208394(2337-2346)Online publication date: 5-May-2012
  • (2012)Reducing compensatory motions in video games for stroke rehabilitationProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/2207676.2208354(2049-2058)Online publication date: 5-May-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media