首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
One of the most popular ways to initiate romantic relationships today is through online dating. Typical dating systems follow one of three formats, see‐and‐screen (e.g., Match.com ), algorithm (e.g., eHarmony.com ), and blended (e.g., OkCupid.com ), which differ in the amount of individual control and algorithmic involvement they offer users. Do different features affect daters' decisions and expectations regarding relational development with selected partners? Study 1 indicated that although daters appreciated the personal control over mate selection afforded by see‐and‐screen systems, they also enjoyed using algorithmic systems. Study 2 found that blended systems provided “the best of both worlds” by offering dual benefits of control and algorithmic validation during mate selection. Findings shed light on self‐determination theory, decision making, and relationship formation more broadly.  相似文献   

2.
Two studies were conducted to investigate the role of social identity in appraisals of the purpose and acceptance of surveillance. In Study 1 (N = 112), a survey study demonstrated that there is a negative relationship between identification with one's city and the extent to which public closed circuit television (CCTV) surveillance is perceived as an invasion of privacy. This relationship was mediated by perceptions that the purpose of surveillance is to ensure safety. Study 2 (N = 139) manipulated identity salience at the sub‐group and superordinate level and the source of surveillance. Results demonstrated that surveillance originating from fellow sub‐group members was perceived as less privacy invading than surveillance originating from the superordinate group, but only when that sub‐group identity was salient. No differences in perceptions of privacy invasion were found when the more inclusive identity was made salient. We argue that whether surveillance is perceived as an invasion of privacy depends on the perceived social relationship with the source of the surveillance—surveillance is perceived as more acceptable when it originates from a group with which one identifies or shares an identity. Practical implications are discussed. Copyright © 2009 John Wiley & Sons, Ltd. This article was published online on 25 February 2009. An error was subsequently identified. This notice is included in the online and print versions to indicate that both have been corrected 12 January 2010.  相似文献   

3.
Two studies examine narrative persuasion in the context of fantastical narratives viewed on a computer. In Study 1, participants (N = 160) used a personal computer to watch one of two short films that dealt with a contemporary social issue (privacy or the environment) set in an imaginary future. Neither film resulted in those who viewed it holding stronger story-consistent beliefs. However, viewers of the film about privacy who experienced higher levels of transportation were more likely to possess story-consistent privacy beliefs than those less transported or than viewers of the environmental film. Additionally, higher need for cognition was associated with stronger beliefs and intentions across both films, and viewers of the privacy film who were higher in need for cognition were most likely to endorse story-consistent privacy beliefs, perhaps due to extra cognitive effort demanded by the online delivery mode of the narrative. To explore this, in Study 2 (N = 126), participants were shown the privacy-themed film in either a low or high distraction condition. This successfully manipulated transportation, but in high distraction conditions, transportation was not significantly related to endorsement of story-consistent beliefs.  相似文献   

4.
Affective forecasting in public transport was investigated in 2 studies. Study 1 revealed differences in satisfaction between users (n = 870) and non‐users (n = 137). Users were more satisfied than were non‐users with regard to reliability and safety, as well as with regard to overall satisfaction. It was also found that non‐users mispredicted their satisfaction with public transport. Study 2 revealed that habitual car users (n = 106) reported greater satisfaction after using public transport for 1 month than they had predicted initially, which provided additional support for the hypothesis that habitual car users would mispredict their satisfaction with public transport. Satisfaction with public transport also increased in comparison with a random sample of car users (n = 63).  相似文献   

5.
Employers' selection practices sometimes involve reviewing applicants' profile on social networking websites (SNWs) and invading applicants' privacy (e.g., asking for their passwords). Applicants can be eliminated because of faux pas (i.e., inappropriate content) they post online. Yet, little research has examined factors related to faux pas postings. The present study examines employers' use of SNWs in selection, participants' internet and SNWs use, personality, and SNWs self‐promotion as predictors of the likelihood of faux pas postings. Results show lower likelihood of faux pas postings when participants are informed that a high proportion of employers use SNWs in selection, but mainly when it includes invasion of applicants' privacy. Moreover, participants' age, privacy settings, extraversion, and SNWs self‐promotion are related to faux pas.  相似文献   

6.
Who is likely to have a false memory? Does being in a certain transient state, such as a negative mood, mean that a person is more like to have a false memory? These important questions are examined using the Deese‐Roediger‐McDermott (DRM) procedure. The amount of false memories was compared with people's score on a dissociation measure and by mood. Unlike past research, which has used different procedures to explore false memories, we found that dissociation was not associated with false memories. We argue that this is because the DRM procedure requires two processes for a false memory (the generation of the critical lure and mistaking its source), while most false memory procedures only require one process (source monitoring error) because the errant information is suggested to the participant. This pattern of results suggests that only errors with the source monitoring process are associated with dissociation. We found that mood was related to false memories, but it was dependent on the specific task demands. If participants were told to recall as many words as they could, then people in a negative mood had more false memories. However, if they were told to recall as many words as they felt like recalling, then there were more false memories for people in a positive mood. This can be explained by the mood‐as‐input hypothesis. Results are discussed in relation to both theories and applications of memory.  相似文献   

7.
Companies consider social media‐based consumer engagement behaviors such as sharing, content creation, and reviews for brands as more valuable than “liking” or consuming brand content. Studies show that branded content shared or created by consumers on social media may drive more brand awareness and loyalty than “likes” (Adweek, 2013). Global companies are increasingly focusing their efforts on motivating consumer‐driven content creation (e.g., Coca‐Cola #shareacoke and Apple #ShotoniPhone; Sprout Index, 2018). However, marketing practitioners are only recently beginning to understand social media audiences who engage in such activities (Adweek, 2018). This study posits that human values can be used to identify and segment audiences for social media‐based valuable brand activities. Three online surveys were conducted with Facebook, Twitter, and Instagram users (ages 18–34) on Amazon Mechanical Turk (N = 491). The relationship between social media users' values and their reported social media activities was examined. Findings indicate that the human values examined (conservation, self‐enhancement, openness to change and self‐transcendence) are significant drivers of valuable brand‐related social media activities. Companies should address conservation‐driven users in order to elicit brand sharing and creation activities. Companies should target conservation‐driven users for sharing promotions, self‐enhancement‐driven users for sharing informational content and writing of product reviews, and openness to change‐driven users for user‐generated content. Bussinesses should further highlight their corporate social responsibility efforts as a negative relationship is found between users' self‐transcendence values and brand activities. Recommendations are provided on how brandscan address users' values in their social media marketing to motivate sharing of branded content and content creation.  相似文献   

8.
With their capacity to track geo-specific location information rapidly expanding, the practice of location-based advertising (LBA) is becoming increasingly prevalent. While LBA can provide relevant and financial benefits, concerns about data collection and privacy are also on the rise. In the following two experiments, based on the privacy calculus theory and parallel mediation analyses, an explanatory framework is presented to lay out how consumers choose to disclose their personal information and accept LBA depending on location congruent levels of a mobile ad message by assessing the benefits as well as costs of disclosing personal information. In Study 1 (N = 186), it was found that both perceived benefits and costs fully mediated the experimental effects of location congruence (congruent vs. incongruent) on intentions to disclose personal information as well as accept LBA practice. In Study 2 (N = 230), a 2 (location congruence: congruent vs. incongruent) × 2 (sales promotion: yes vs. no) factorial experiment was conducted. The results from moderated mediation analysis showed that privacy concerns due to location tracking disappeared when sales promotion was offered. These results indicate that consumers' information disclosure and LBA acceptance can be understood as a trade-off between incentives and privacy issues in which privacy concerns can be alleviated when financial benefits are offered.  相似文献   

9.
Based on terror management theory, previous research has shown that terrorism threat increases prejudice against Muslims and is mediated by death‐related thoughts. Because this effect was found on a correlational level, it remains unclear whether terrorism threat increases prejudice against Muslims because of enhanced death‐related thoughts or the opposite: terrorism threat increases death‐related thoughts because of stronger prejudice against Muslims. To disentangle this shortcoming, we varied death‐related thoughts by systematically manipulating the belief in literal immortality. Using two studies, we found that participants exposed to terrorism pictures (vs. controls) had increased prejudice against both Muslims (Study 1) and immigrants (Study 2) when they were led to believe that literal immortality does not exist but not when they were led to believe that it does exist. Mediation analysis indicated that this effect was mediated by death‐related thoughts. This provides further evidence that terrorism threat increases prejudice because of death‐related thoughts.  相似文献   

10.
Abstract Many people ascribe great value to self‐esteem, but how much value? Do people value self‐esteem more than other pleasant activities, such as eating sweets and having sex? Two studies of college students ( Study 1 : N=130; Study 2 : N=152) showed that people valued boosts to their self‐esteem more than they valued eating a favorite food and engaging in a favorite sexual activity. Study 2 also showed that people valued self‐esteem more than they valued drinking alcohol, receiving a paycheck, and seeing a best friend. Both studies found that people who highly valued self‐esteem engaged in laboratory tasks to boost their self‐esteem. Finally, personality variables interacted with these value ratings. Entitled people thought they were more deserving of all pleasant rewards, even though they did not like them all that much (both studies), and people who highly value self‐esteem pursued potentially maladaptive self‐image goals, presumably to elevate their self‐esteem ( Study 2 ).  相似文献   

11.
This study summarizes the development and validation of a multidimensional privacy orientation scale designed for measuring privacy attitudes of Social Network Site (SNS) users. Findings confirm the existence of four dimensions: (1) belief in the value of “privacy as a right”; (2) “other-contingent privacy”; (3) “concern about own informational privacy” and (4) “concern about privacy of others.” Moreover, a segmentation of SNS users based on these attitude scores reveals three types of users: (1) privacy advocates, who are concerned about both their own and other people’s privacy; (2) privacy individualists, who are concerned mostly about their own privacy, and (3) privacy indifferents, whose score on all dimensions are lower than other segments. The results indicate that the four privacy orientation dimensions and three user segments predict key differences in terms of privacy protective behavior, information disclosure, and viewing personal information of others.  相似文献   

12.
Research on conditional positive regard (CPR) has shown that this seemingly benign practice has maladaptive correlates when used by parents. However, there is no research on the correlates of this practice in romantic relationships or on the processes mediating its effects. Building on self‐determination theory (Deci & Ryan, 2000 ), three studies tested the hypothesis that perceived CPR impairs relationship quality, partly because it undermines the fulfillment of the basic psychological needs for autonomy and relatedness. Study 1 (N = 125) examined perceived CPR and relationship quality across four relationship targets: mother, father, romantic partner, and best friend. Study 2, involving romantic partners (N = 142), examined whether needs fulfillment mediated the association between perceived CPR and relationship quality. Study 3, involving romantic dyads (N = 85), also included partner reports on CPR. Across the three studies, CPR was linked with poor relationship quality between relationships, between people, and between dyadic partners. Moreover, results of Study 2 and Study 3 revealed that the inverse association between perceived CPR and relationship quality was mediated by dissatisfaction of autonomy but not relatedness. Despite its seemingly benign nature, CPR is detrimental to relationship quality, partly because it thwarts the basic need for autonomy.  相似文献   

13.
Two studies examined aspects of the validity of self‐report and performance‐based measures of emotional intelligence (EI) relevant to their use in personnel selection. In Study 1, structural equation modeling indicated that a two‐factor model with separate factors for the two types of EI measures fit better than a one‐factor solution. The performance‐based EI factor was more related to cognitive ability (R=.38) than personality (R=.26), whereas the self‐report EI factor was more related to personality (R=.85) than cognitive ability (R=.09). Although the performance‐based EI factor correlated more strongly with job performance (ρ=.24) than did that of the self‐report (ρ=.05), it provided little incremental validity beyond cognitive ability and conscientiousness. In Study 2, participants were asked to complete the measures as if applying for a job, and mean scores were then compared with those of Study 1. Results indicated that self‐report EI measures were more vulnerable to distortion than were the performance‐based measures. Implications for the assessment of EI in personnel selection contexts are discussed.  相似文献   

14.
The purpose of this study was to examine differences in self‐disclosure goals, privacy concerns, and self‐disclosure characteristics between Facebook and Twitter. These sites were compared in terms of audience representations, based on structural cues that suggest potential audiences for a user. We conceptualized audience representations in 2 ways: based on privacy boundaries that imply bounded versus unbounded audiences, and on network characteristics such as size and diversity for audiences within the boundary. Results revealed that self‐disclosure goals, privacy concerns, and self‐disclosure intimacy were different depending on the privacy boundary. Network characteristics were also important, but effects were moderated by the privacy boundary type, suggesting a complex interplay between the 2 types of audience representations in shaping self‐disclosure in social media.  相似文献   

15.
Pro‐social behaviors have been associated with enhanced well‐being, but what psychological mechanisms explain this connection? Some theories suggest that beneficence—the sense of being able to give—inherently improves well‐being, whereas evidence from self‐determination theory (Weinstein & Ryan, 2010) shows that increases in well‐being are mediated by satisfaction of innate psychological needs for autonomy, competence, and relatedness. Here we simultaneously assess these two explanations. Study 1 (N = 335) used a cross‐sectional survey with an Internet sample to develop a measure to assess beneficence satisfaction. The next two cross‐sectional Internet‐sample studies tested mediators between pro‐social behavior and general well‐being (Study 2, N = 332) and situational peak moment well‐being (Study 3, N = 180). A fourth study (N = 85) used a diary method with university students to assess daily fluctuations in well‐being associated with needs and beneficence. It was shown across all studies that both the three psychological needs and beneficence satisfaction mediate the relations between pro‐social actions and well‐being, with all four factors emerging as independent predictors. Together, these studies underscore the role of autonomy, competence, and relatedness in explaining the well‐being benefits of benevolence, and they also point to the independent role of beneficence as a source of human wellness.  相似文献   

16.
This article analyses the influence of accent on discrimination against immigrants by examining the hypothesis that accent leads to discrimination only in more prejudiced individuals, merely because people speaking with a native accent are perceived to be better qualified than those whose accent is non‐standard. In Study 1 (N = 71), we found that only prejudiced individuals use accent to discriminate against immigrants. In Study 2 (N = 124), we replicated this effect and found that the influence of accent on discrimination is mediated by the perceived quality of the accent. Study 3 (N = 105) replicated the previous results even after controlling for the effect of stereotyping. These results are the first experimental illustration of the hypothesis that accent triggers intergroup discrimination only among prejudiced individuals because they evaluate native accents as being qualitatively better than accents of immigrants, thereby legitimizing ingroup bias.  相似文献   

17.
Because all research methods have strengths and weaknesses, a multimethod approach often provides the best way to understand human behavior in applied settings. We describe how a multimethod approach was employed in a series of studies designed to examine usability issues associated with two aspects of online privacy: comprehension of privacy policies and configuration of privacy preferences for an online user agent. Archival research, user surveys, data mining, quantitative observations, and controlled experiments each yielded unique findings that, together, contributed to increased understanding of online-privacy issues for users. These findings were used to evaluate the accessibility of Web privacy policies to computer-literate users, determine whether people can configure user agents to achieve specific privacy goals, and discover ways in which the usability of those agents can be improved.  相似文献   

18.
How do children resolve conflicts between a self-generated belief and what they are told? Four studies investigated the circumstances under which toddlers would trust testimony that conflicted with their expectations about the physical world. Thirty-month-olds believed testimony that conflicted with a naive bias (Study 1), and they also repeatedly trusted testimony that conflicted with an event they had just seen (Study 2)—even when they had an incentive to ignore the testimony (Study 3). Children responded more skeptically if they could see that the testimony was wrong as it was being delivered (Study 3), or if they had the opportunity to accumulate evidence confirming their initial belief before hearing someone contradict it (Study 4). Together, these studies demonstrate that toddlers have a robust bias to trust even surprising testimony, but this trust can be influenced by how much confidence they have in their initial belief.  相似文献   

19.
Two studies examined the relationship between identification with a high‐position group in organizational settings (managers) and bias toward immigrants. In Study 1, (N = 182; N = 145), results showed positive relationships between identification with the managers' group and both in‐group bias and prejudiced attitudes, indirectly through assimilation endorsement. In Study 2 (N = 117), in addition to replicating the results of Study 1, we found a significant interaction, revealing that power moderated the link between identification with a high‐position group and bias. Moderated mediation analysis indicated that linking managers' group identification to bias and prejudiced attitudes through assimilation was only significant for high perceived power. Results are discussed in light of interethnic ideologies and the social identity theory. Some practical implications are provided.  相似文献   

20.
ABSTRACT

This study applies social contract theory to examine whether perceptions of a social contract explains adaptive behavior to safeguard online privacy. We (1) identify and (2) estimate the prevalence of subgroups that differ in their perceived “social contract” (based on privacy concerns, trust, and risk), and (3) measure how this perceived social contract affects adaptive online behavior. Using a representative two-wave panel survey (N = 1,222), we distinguished five subgroups of internet users; the highly-concerned, wary, ambivalent, neutral (the largest group), and carefree users. The former three were more likely to adapt their behavior than the latter two subgroups. We argue that the implied social contract represents an important construct that helps to identify whether individuals engage in privacy protection behavior.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号