- 1.Aiello, J. R. (1993). Computer-based work monitoring: Electronic surveillance and its effects. Journal of Applied Social Psychology, 23, 499-507.Google ScholarCross Ref
- 2.American Institutes for Research. (1993, July 30). Increasing the safety of the blood supply by screening donors more effectively. Final Report, Vol I. AIR, 3333 K St. Washington, DC 20007.Google Scholar
- 3.Ball, E., Ling, D. T., Pugh, D., Skelly, T., Stankosky, Thiel, D. (1994). ReActor: A system for real-time, reactive animations. Conference Companion: Demonstrations, CHI '94, Boston, Mass., April 24-28. Google ScholarDigital Library
- 4.Bashore, T. R., & Rapp, P. E. Are there alternatives to traditional polygraph procedures? Psychological Bulletin, 113, 3-22.Google Scholar
- 5.Binik, Y. M., Servan-Schreiber, D., Freiwald, S., & Hall, K. S. (1988). Intelligent computer-based assessment and psychotherapy: An expert system for sexual dysfunction. Journal of Nervous and Mental Disease, 178, 387-400.Google ScholarCross Ref
- 6.Booth-Kewely, S., Edwards, J. E., & Rosenfeld, P. (1992). Impression management, social desirability, and computer administration of attitude questionnaires: Does the computer make a difference? Journal of Applied Psychology, 77, 562-566.Google ScholarCross Ref
- 7.Catania, J. A., Gibson, D. R., Chitwood, D. D. & Coates. T. J. (1990). Methodological problems in AIDS behavioral research: Influences on measurement error and participation bias in studies of sexual behavior. Psychological Bulletin, 108, 339-362.Google ScholarCross Ref
- 8.Connolly, T., Jessup, L. M., & Valacich, J. S. (1990). Effects of anonymity and evaluative tone on idea generation in computer-mediated groups. Management Science, 36, 689-703. Google ScholarDigital Library
- 9.Crowne, D., & Marlowe, D. (1964). The approval motive. New York: Wiley.Google Scholar
- 10.Dindia, K. & Allen, M. (1992). Sex differences in self-disclosure: A meta-analysis. Psychological Bulletin, 112, 106-124.Google ScholarCross Ref
- 11.Elliott, C. (1994). Research problems in the use of a shallow artificial intelligence model of personality and emotion (pp. 9-15), Proceedings of the Twelfth National Conference on Artificial Intelligence. Google ScholarDigital Library
- 12.Gaver, W. W. (1986). Auditory icons: Using sound in computer interfaces. Human-Computer Interaction, 2, 167-177.Google ScholarDigital Library
- 13.Greist, J. H., Gustafson, D. H., Stauss, F F., Rowse, G. L., Laughren, T. P & Chiles, J. A. (1973). Computer interview for suicide-risk prediction. American Journal of Psychiatry, 130, 1327-1332.Google ScholarCross Ref
- 14.Hayes-Roth, B., Sincoff, E., Brownston, L., Huard, R., & Lent, B. (1995). Directed improvisation with animated puppets (pp. 79-80). In Human Factors in Computing Systems: CHI '95 Conference Companion (Proceedings document). May 7-10, Denver. Google ScholarDigital Library
- 15.Hedges, L V., & Olkin, I. (1985). Statistical methods for meta-analysis. San Diego: Academic PressGoogle Scholar
- 16.Itou, K. S., Hayamizu, S. & Tanaka, H. (1992). Continuous speech recognition by context-dependent phonetic HMM and an efficient algorithm for finding N-best sentence hypotheses. Proceedings of ICASSP. IEEE Press.Google Scholar
- 17.Johnson, B. (1989). Software for the meta-analytic review of research literatures. Hillsdale, NJ: Erlbaum. (Upgrade documentation, 1993)Google Scholar
- 18.Kiesler, S., & Sproull, L. S. (1986). Response effects in the electronic survey. Public Opinion Quarterly, 50, 402-413.Google ScholarCross Ref
- 19.Kiesler, S. & Sproull, L. (1992). Group decision making and communication technology. Organizational Behavior and Human Decision Processes, 96-123.Google ScholarCross Ref
- 20.Kiesler, S., Walsh, J., & Sproull, L. (1992). Computer networks in field research. In F. B. Bryant , J. Edwards, S. Tindale, E. Posavac, L. Heath, E. Henderson, & Y. Suarez-Balcazar, (Eds.), Methodological Issues in Applied Social Research (pp. 239-268). New York: Plenum.Google ScholarCross Ref
- 21.Koson, D., Kitchen, M., Kochen, M, & Stodolsky, D. (1970). Psychological testing by computer: Effect on response bias. Educational and Psychological Measurement, 30, 803-810.Google ScholarCross Ref
- 22.Locander, W., Sudman, S. & Bradburn, N. (1976). An investigation of interview method, threat and response distortion. Journal of the American Statistical Association, 71, 267-275.Google ScholarCross Ref
- 23.Locke, S. E., Kowaloff, H. B., Hoff, R. G., Safran, C., Popovsky, M. A., Cotton, D. J., Finkelstein, D. M., Page, P. L., & Slack, W. V. (1992). Computer-based interview for screening blood donors for risk of HIV infection. The Journal of the American Medical Association, 268, 1301-1305.Google ScholarCross Ref
- 24.Mead, A. D. & Drasgow, F. (1993). Equivalence of computerized and paper-and-pencil cognitive ability tsts: A meta-analysis. Psychological Bulletin, 114, 440-458.Google ScholarCross Ref
- 25.Nass, C., Moon, Y., Fogg, B. J., Reeves, B., & Dryer, D. C. (1995). Can computer personalities be human personalities? International Journal of Human-Computer Studies, 43(2), 223-239. Google ScholarDigital Library
- 26.Roese, N. J. & Jamieson, D. W. (1993). Twenty years of bogus pipeline research: A critical review and meta-analysis. Psychological Bulletin, 114, 363-375.Google ScholarCross Ref
- 27.Smith, R E. (1963). Examination by computer. Behavioral Science, 8, 76-79.Google ScholarCross Ref
- 28.Sproull, L., Walker, J., Subramani, R., Kiesler, S., & Waters, K. (in press). When the interface is a face. Human-Computer Interaction. Google ScholarDigital Library
- 29.Synodinos, N. E., & Brennan, J. M. (1988). Computer interactive interviewing in survey research. Psychology and Marketing, 5, 117-137.Google ScholarCross Ref
- 30.Weisband, S. P. & Reinig, B. A. (1995). Understanding users' perceptions of electronic mail privacy. Communications of the ACM, 38(12), 40-47. Google ScholarDigital Library
- 31.Weisband, S. P., Schneider, S. K., & Connolly, T. (1995). Computer-mediated communication and social information: Status salience and status awareness. Academy of Management Journal, 38, 1124-1151.Google ScholarCross Ref
- 32.Weizenbaum, J. (1976). Computer power and human reason. San Francisco: Freeman. Google ScholarDigital Library
- 33.Welch, R. B., Blackmon, T. T., Liu, A., Mellers, B. A., & Stark, L. W. (in press). The effects of pictorial realism, delay of visual feedback, and observer interactivity on the subjective sense of presence. Presence: Teleoperators And Virtual Environments.Google Scholar
Index Terms
- Self disclosure on computer forms: meta-analysis and implications
Recommendations
Privacy and self-disclosure in multiagent systems
AAMAS '11: The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3Agents usually encapsulate their principals' personal data attributes, which can be disclosed to other agents during agent interactions, producing a potential loss of privacy. We propose self-disclosure decision-making mechanisms for agents to decide ...
Disclosure decisions and the moderating effects of privacy feedback and choice
AbstractTo address data concealment challenges, this study considers how perceived privacy and justice might drive users' information disclosure intentions. Two contextual factors (privacy feedback and choice) also might function as moderators ...
Highlights- Perceived justice and privacy explain disclosure intentions, with perceived privacy being the most important determinant.
Voluntary Quality Disclosure and Market Interaction
Marketers disclose quality information directly to potential consumers using a variety of communication channels. This study investigates how competition may influence duopoly firms' incentive to voluntarily reveal quality information. We show that firms ...
Comments