skip to main content
10.1145/238386.238387acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article
Free Access

Self disclosure on computer forms: meta-analysis and implications

Authors Info & Claims
Published:13 April 1996Publication History
First page image

References

  1. 1.Aiello, J. R. (1993). Computer-based work monitoring: Electronic surveillance and its effects. Journal of Applied Social Psychology, 23, 499-507.Google ScholarGoogle ScholarCross RefCross Ref
  2. 2.American Institutes for Research. (1993, July 30). Increasing the safety of the blood supply by screening donors more effectively. Final Report, Vol I. AIR, 3333 K St. Washington, DC 20007.Google ScholarGoogle Scholar
  3. 3.Ball, E., Ling, D. T., Pugh, D., Skelly, T., Stankosky, Thiel, D. (1994). ReActor: A system for real-time, reactive animations. Conference Companion: Demonstrations, CHI '94, Boston, Mass., April 24-28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.Bashore, T. R., & Rapp, P. E. Are there alternatives to traditional polygraph procedures? Psychological Bulletin, 113, 3-22.Google ScholarGoogle Scholar
  5. 5.Binik, Y. M., Servan-Schreiber, D., Freiwald, S., & Hall, K. S. (1988). Intelligent computer-based assessment and psychotherapy: An expert system for sexual dysfunction. Journal of Nervous and Mental Disease, 178, 387-400.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6.Booth-Kewely, S., Edwards, J. E., & Rosenfeld, P. (1992). Impression management, social desirability, and computer administration of attitude questionnaires: Does the computer make a difference? Journal of Applied Psychology, 77, 562-566.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7.Catania, J. A., Gibson, D. R., Chitwood, D. D. & Coates. T. J. (1990). Methodological problems in AIDS behavioral research: Influences on measurement error and participation bias in studies of sexual behavior. Psychological Bulletin, 108, 339-362.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.Connolly, T., Jessup, L. M., & Valacich, J. S. (1990). Effects of anonymity and evaluative tone on idea generation in computer-mediated groups. Management Science, 36, 689-703. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Crowne, D., & Marlowe, D. (1964). The approval motive. New York: Wiley.Google ScholarGoogle Scholar
  10. 10.Dindia, K. & Allen, M. (1992). Sex differences in self-disclosure: A meta-analysis. Psychological Bulletin, 112, 106-124.Google ScholarGoogle ScholarCross RefCross Ref
  11. 11.Elliott, C. (1994). Research problems in the use of a shallow artificial intelligence model of personality and emotion (pp. 9-15), Proceedings of the Twelfth National Conference on Artificial Intelligence. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Gaver, W. W. (1986). Auditory icons: Using sound in computer interfaces. Human-Computer Interaction, 2, 167-177.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Greist, J. H., Gustafson, D. H., Stauss, F F., Rowse, G. L., Laughren, T. P & Chiles, J. A. (1973). Computer interview for suicide-risk prediction. American Journal of Psychiatry, 130, 1327-1332.Google ScholarGoogle ScholarCross RefCross Ref
  14. 14.Hayes-Roth, B., Sincoff, E., Brownston, L., Huard, R., & Lent, B. (1995). Directed improvisation with animated puppets (pp. 79-80). In Human Factors in Computing Systems: CHI '95 Conference Companion (Proceedings document). May 7-10, Denver. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.Hedges, L V., & Olkin, I. (1985). Statistical methods for meta-analysis. San Diego: Academic PressGoogle ScholarGoogle Scholar
  16. 16.Itou, K. S., Hayamizu, S. & Tanaka, H. (1992). Continuous speech recognition by context-dependent phonetic HMM and an efficient algorithm for finding N-best sentence hypotheses. Proceedings of ICASSP. IEEE Press.Google ScholarGoogle Scholar
  17. 17.Johnson, B. (1989). Software for the meta-analytic review of research literatures. Hillsdale, NJ: Erlbaum. (Upgrade documentation, 1993)Google ScholarGoogle Scholar
  18. 18.Kiesler, S., & Sproull, L. S. (1986). Response effects in the electronic survey. Public Opinion Quarterly, 50, 402-413.Google ScholarGoogle ScholarCross RefCross Ref
  19. 19.Kiesler, S. & Sproull, L. (1992). Group decision making and communication technology. Organizational Behavior and Human Decision Processes, 96-123.Google ScholarGoogle ScholarCross RefCross Ref
  20. 20.Kiesler, S., Walsh, J., & Sproull, L. (1992). Computer networks in field research. In F. B. Bryant , J. Edwards, S. Tindale, E. Posavac, L. Heath, E. Henderson, & Y. Suarez-Balcazar, (Eds.), Methodological Issues in Applied Social Research (pp. 239-268). New York: Plenum.Google ScholarGoogle ScholarCross RefCross Ref
  21. 21.Koson, D., Kitchen, M., Kochen, M, & Stodolsky, D. (1970). Psychological testing by computer: Effect on response bias. Educational and Psychological Measurement, 30, 803-810.Google ScholarGoogle ScholarCross RefCross Ref
  22. 22.Locander, W., Sudman, S. & Bradburn, N. (1976). An investigation of interview method, threat and response distortion. Journal of the American Statistical Association, 71, 267-275.Google ScholarGoogle ScholarCross RefCross Ref
  23. 23.Locke, S. E., Kowaloff, H. B., Hoff, R. G., Safran, C., Popovsky, M. A., Cotton, D. J., Finkelstein, D. M., Page, P. L., & Slack, W. V. (1992). Computer-based interview for screening blood donors for risk of HIV infection. The Journal of the American Medical Association, 268, 1301-1305.Google ScholarGoogle ScholarCross RefCross Ref
  24. 24.Mead, A. D. & Drasgow, F. (1993). Equivalence of computerized and paper-and-pencil cognitive ability tsts: A meta-analysis. Psychological Bulletin, 114, 440-458.Google ScholarGoogle ScholarCross RefCross Ref
  25. 25.Nass, C., Moon, Y., Fogg, B. J., Reeves, B., & Dryer, D. C. (1995). Can computer personalities be human personalities? International Journal of Human-Computer Studies, 43(2), 223-239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.Roese, N. J. & Jamieson, D. W. (1993). Twenty years of bogus pipeline research: A critical review and meta-analysis. Psychological Bulletin, 114, 363-375.Google ScholarGoogle ScholarCross RefCross Ref
  27. 27.Smith, R E. (1963). Examination by computer. Behavioral Science, 8, 76-79.Google ScholarGoogle ScholarCross RefCross Ref
  28. 28.Sproull, L., Walker, J., Subramani, R., Kiesler, S., & Waters, K. (in press). When the interface is a face. Human-Computer Interaction. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29.Synodinos, N. E., & Brennan, J. M. (1988). Computer interactive interviewing in survey research. Psychology and Marketing, 5, 117-137.Google ScholarGoogle ScholarCross RefCross Ref
  30. 30.Weisband, S. P. & Reinig, B. A. (1995). Understanding users' perceptions of electronic mail privacy. Communications of the ACM, 38(12), 40-47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. 31.Weisband, S. P., Schneider, S. K., & Connolly, T. (1995). Computer-mediated communication and social information: Status salience and status awareness. Academy of Management Journal, 38, 1124-1151.Google ScholarGoogle ScholarCross RefCross Ref
  32. 32.Weizenbaum, J. (1976). Computer power and human reason. San Francisco: Freeman. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. 33.Welch, R. B., Blackmon, T. T., Liu, A., Mellers, B. A., & Stark, L. W. (in press). The effects of pictorial realism, delay of visual feedback, and observer interactivity on the subjective sense of presence. Presence: Teleoperators And Virtual Environments.Google ScholarGoogle Scholar

Index Terms

  1. Self disclosure on computer forms: meta-analysis and implications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '96: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        April 1996
        524 pages
        ISBN:0897917774
        DOI:10.1145/238386

        Copyright © 1996 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 April 1996

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        CHI '96 Paper Acceptance Rate55of256submissions,21%Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format