82
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Trust, Avatars, and Electronic Communications: Implications for E-Learning

, &
Pages 80-89 | Received 25 Jan 2012, Accepted 02 Apr 2012, Published online: 10 Dec 2015

References

  • Alavi, M., & Leidner, D. E. (2001). Research Commentary: Technology-mediated learning — a call for greater depth and breadth of research, Information Systems Research, 12 (1), 1–10.
  • Allen, J., & Dana, R.H. (2004). Methodological Issues in Cross-cultural and Multicultural Rorschach Research. Journal of Personality Assessment, 82(2), 189–206.
  • Awad, N. and A. Ragowsky (2008). Establishing Trust in Electronic Commerce through Online Word of Mouth: An Examination Across Genders. Journal of Management Information Systems, 24(4), 101–121.
  • Berry, G. R. (2006). Can computer-mediated asynchronous communication improve team processes and decision making? Journal of Business Communication, 43(4), 344–366.
  • Bhattacherjee, A. (2002). Individual Trust in Online Firms: Scale Development and Initial Test. Journal of Management Information Systems, 19, 211–241.
  • Bos, N., Olson, J., Gergle, D., Olson, G., & Wright, Z. (2002). Effects of four computer-mediated communications channels on trust development. Paper presented at the Human Factors in Computing Systems (CHI), Minneapolis MN, April 2002.
  • Bowe, H. and Martin K. (2007). Communication across Cultures: Mutual Understanding in a Global World. Cambridge: Cambridge UP.
  • Burgoon, J. K., J. P. Blair & R.E. Strom (2008) Cognitive biases and nonverbal cue availability in detecting deception. Human Communication Research 34: 572–599
  • Chouinard, T. (1970). The symbol and the archetype in analytical psychology and literary criticism. Journal of Analytical Psychology, 15(2), 155–164.
  • Dijn, H. (2003). Promise and Ritual: Profane and Sacred Symbols in Hume's Philosophy of Religion. Journal of Scottish of Philosophy, 1(1), pp. 57–67.
  • Durant, A. and Shepard, I. (2009). Culture and Communication in Intercultural Communication. European Journal of English Studies, Vol. 13, No. 2, pp. 147–162.
  • Feit, J. S. (2004). Sacred Symbols and the Depiction of Religion in Millennial Movies. Journal of Media and Religion, 3(3), pp. 133–150.
  • Gecas, V., & Libby, R. (1976). Sexual behavior as symbolic interaction. Journal of Sex Research, 12(1), 33.
  • Gefen, D., Benbasat, I. and P. Pavlou (2008). A Research Agenda for Online trust Environments, Journal of Management Information Systems, 24(4), 275–286.
  • Gefen, D. and Karahanna, E. and D. Straub (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly, 27(1), 51–90.
  • Gilbert, J.E., Arbuthnot, K., Hood, S., Grant, M.M., West, M.L., McMillian, Y., Cross, E. V., Williams, P. & Eugene, W. (2008) Teaching Algebra Using Culturally Relevant Virtual Instructors. The International Journal of Virtual Reality, 7,1, pp. 21–30.
  • Green, S. C. (2006). Computer-mediated communication in society: A study on self-disclosure. Indiana State University, Terre Haute, IN.
  • Hiltz, S. R., & Turoff, M. (2002). What makes learning networks effective? Association for Computing Machinery. Communications of the ACM, 45(4), 56–59.
  • Hunt, R. W., Kohn, P. M., & Mallozzi, C. B. (1983). Factor analysis of the Interpersonal Trust Scale with a noncollege population. Journal of Personality Assessment, 47(5), 507.
  • Isbister, K., Nakanishi, H., Ishida, T., & Nass, C. (2000, 1-6 April 2000). Helper agent: Designing an assistant for human-human interaction in a virtual meeting space. Paper presented at the International Conference on Human Factors in Computing Systems (CHI) 2000, Hague.
  • Jisu, H., DeLorme, D. E., & Reid, L. N. (2005). Factors affecting trust in on-line prescription drug information and impact of trust on behavior following exposure to DTC advertising. Journal of Health Communication, 10(8), 711–731.
  • Joseph, N. (1986). Uniforms and Nonuniforms: Communication through clothing. Westport: Greenwood Press.
  • Jung, C. G., & Stein, L. (1981). Experimental researches (1st Princeton/Bollingen paperback printing, with corrections, ed.). Princeton, N.J.: Princeton University Press.
  • Junglas, I., Johnson, N., Steel, D. Abraham, D., and P. Loughlin (2007). Identify Formation, Learning Styles and Trust in Virtual Worlds. DATA BASE for Advances in Information Systems, 38(4), 90–96.
  • Jyh-Jeng, W., & Tsang, A. S. L. (2008). Factors affecting members' trust belief and behaviour intention in virtual communities. Behaviour & Information Technology, 27(2), 115–125.
  • Kang, H.-S., & Yang, H.-D. (2006). The visual characteristics of avatars in computer-mediated communication: Comparison of Internet Relay Chat and Instant Messenger as of 2003. International Journal of Human-Computer Studies, 64(12), 1173–1183.
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.
  • Lim, V & Teo, T. (2009). Mind your e-manners: Impact of cyber incivility on employees' work attitude and behavior. Information & Management, 46, 419–425.
  • Lodree, A.W., Moore, J.L. & Gilbert, J.E. (2008) Using Animated Agents for Postsecondary Mathematics. Journal of Educational Technology, 5,1, pp. 31–37.
  • Mahlberg, A. (1987). Evidence of collective memory: A test of Sheldrake's Theory. Journal of Analytical Psychology, 32, 23–34.
  • McGrath, J. E., & Hollingshead, A. B. (1990). Effects of technological enhancements on the flow of work in groups: Preliminary report of a systematic review of the research literature (Report 90-1). Urbana: University of Illinois.
  • McKnight, D. Choudhury, V. and C. Kacmar (2002) Developing and Validating Trust Measures for E-Commerce: An integrative typology. Information Systems Research, 13, 334–359.
  • Montada, L., Filipp, S.-H., & Lerner, M. J. (1992). Life crises and experiences of loss in adulthood. Hillsdale, N.J.: L. Erlbaum Associates.
  • Morris, C. (1946). Signs, Language, and Behavior. New York, Prentice-Hall.
  • Nakanishi, H., Shimizu, S., & Isbister, K. (2005). Sensitizing social agents for virtual training. Applied Artificial Intelligence, 19(3/4), 341–361.
  • Petocz, A. (2005). Freud, psychoanalysis, and symbolism. Cambridge; New York: Cambridge University Press.
  • Qiu, L. and Benbasat, I. (2005). Online Consumer Trust and Live Help Interfaces: The Effects of Text to Speech Voice and Three-Dimensional Avatars. International Journal of Human Computer Interaction, 19(1), 75–94.
  • Rempel, J. K., & Holmes, J. G. (1986). How do I trust thee? Psychology Today, 20(2), 28–34.
  • Rosten, D. H., Smith, S. M., Huston, H. L., & Gonzalez, G. (1991). Empirical study of associations between symbols and their meanings: Evidence of collective unconscious (archetypal) memory. Journal of Analytical Psychology, 36(2), 211–228.
  • Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality, 55(4), 651–665.
  • Sheth, R. (2003). Avatar Technology: Giving a Face to the E-Learning Interface. The E-Learning Developers Journal, August 25, 1–10.
  • Stein, K. B., &, et al. (1974). Interpersonal trust and disaffected high school youth: Journal of Youth and Adolescence.
  • Wan, Z, Wang, Y., & Haggerty, N. (2008). Why people benefit from e-learning differently: The effects of psychological processes on e-learning outcomes. Information & Management, 45 513.
  • Wang, W. and I. Benbasat (2008). Attributions of Trust in Decision Support Technologies: A Study of Recommendation Agents for E-Commerce. Journal of Management Information Systems, 24(4), 249–273.
  • Zhang, D., Zhao, J., Zhou, L., and Nunamaker, J. (2004). Can e-learning Replace Classroom Learning? Communications of the ACM, Vol. 47, issue 5.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.