1,191
Views
17
CrossRef citations to date
0
Altmetric
Articles

Understanding the Effects of Stigma Messages: Danger Appraisal and Message Judgments

ORCID Icon, &

References

  • Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 10, 411–423. doi:10.1037/0033-2909.103.3.411
  • Aronson, E., Wilson, T. D., & Akert, R. M. (1994). Social psychology: The heart and the mind. New York, NY: HarperCollins.
  • Bandura, A. (1977). Social learning theory. Englewood Cliffs, NJ: Prentice Hall.
  • Banta, T. J. (1964). The Kennedy assassination: Early thoughts and emotions. Public Opinion Quarterly, 28, 216–224. doi:10.1086/267238
  • Barasch, A., & Berger, J. (2014). Broadcasting and narrowcasting: How audience size affects what people share. Journal of Marketing Research, 51, 286–299. doi:10.1509/jmr.13.0238
  • Berger, J. (2014). Word-of-mouth and interpersonal communication: An organizing framework and directions for future research. Journal of Consumer Psychology, 24, 586–607. doi:10.1016/j.jcps.2014.05.002
  • Bonacich, P. (1972). Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology, 2, 113–120. doi:10.1080/0022250X.1972.9989806
  • Boomsma, A. (1982). Robustness of LISREL against small sample sizes in factor analysis models. In K. G. Joreskog & H. Wold (Eds.), Systems under indirect observation: Causality, structure, prediction (Part I, pp. 149–173). Amsterdam, The Netherlands: North Holland.
  • Borgatti, S. P. (2005). Centrality and network flow. Social Networks, 27, 55–71. doi:10.1016/j.socnet.2004.11.008
  • Boster, F. J., Rodriguez, J. I., Cruz, M. G., & Marshall, L. (1995). The relative effectiveness of a direct request message and a pregiving message on friends and strangers. Communication Research, 22, 475–484. doi:10.1177/009365095022004005
  • Brewer, D. D., & Webster, C. M. (1999). Forgetting of friends and its effects on measuring friendship networks. Social Networks, 2, 361–373. doi:10.1016/S0378-8733(99)00018-0
  • Burnham, K. P., & Anderson, D. R. (2002). Model selection and multimodel inference (2nd ed.). New York, NY: Springer Verlag.
  • Cappella, J. N., Kim, H. S., & Albarracín, D. (2015). Selection and transmission processes for information in the emerging media environment: Psychological motives and message characteristics. Media Psychology, 18, 396–424. doi:10.1080/152132692014.941112
  • Casciaro, T., Carley, K. M., & Krackhardt, D. (1999). Positive affectivity and accuracy in social network perception. Motivation and Emotion, 23, 285–306. doi:10.1023/A:1021390826308
  • Centers for Disease Control and Prevention. (2015). 2014 Ebola outbreak in West Africa. Retrieved March 31, 2015, from http://www.cdc.gov/vhf/ebola/outbreaks/2014-west-africa/index.html
  • Cheung, E. Y. L. (2015). An outbreak of fear, rumours and stigma: Psychosocial support for the Ebola virus disease outbreak in West Africa. Intervention, 13, 70–76.
  • Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55, 591–621. doi:10.1146/annurev.psych.55.090902.142015
  • Clark, A. E., & Kashima, Y. (2007). Stereotypes help people connect with others in the community: A situated functional analysis of the stereotype consistency bias in communication. Journal of Personality and Social Psychology, 93, 1028–1039. doi:10.1037/0022-3514.93.6.1028
  • Coleman, J. S., Katz, E., & Menzel, H. (1966). Medical innovation: A diffusion study. Indianapolis, IN: Bobbs-Merrill.
  • Cosmides, L., & Tooby, J. (2015). Adaptations for reasoning about social exchange. In D. M. Buss (Ed.), The handbook of evolutionary psychology (2nd ed., Vol. 2, pp. 625–668). Hoboken, NJ: Wiley.
  • Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology, 51, 629–636. doi:10.1002/cb.338
  • Dillard, J. P. (Ed.). (1990). Seeking compliance: The production of interpersonal influence messages. Scottsdale, AZ: Gorsuch Scarisbrick.
  • Dunbar, R. I. M. (2004). Gossip in evolutionary perspective. Review of General Psychology, 8, 100–110. doi:10.1037/1089-2680.8.2.100
  • Dunbar, R. I. M., Arnaboldi, V., Conti, M., & Passarella, A. (2015). The structure of online social networks mirrors those in the offline world. Social Networks, 43, 39–47. doi:10.1016/j.socnet.2015.04.005
  • Durkheim, E. (1982). The rules of sociological method and selected texts on sociology and its method. London, UK: Macmillan.
  • Eastwick, P. W., Hunt, L. L., & Neff, L. A. (2013). External validity, why are thou externally valid? Social and Personality Psychology Compass, 7, 275–288. doi:10.1111/spc3.12026
  • Eichelberger, L. (2007). SARS and New York’s Chinatown: The politics of risk and blame during an epidemic of fear. Social Science & Medicine, 65, 1284–1295. doi:10.1016/j.socscimed.2007.04.022
  • Fink, E. L. (2009). The FAQs on data transformation. Communication Monographs, 76, 379–397. doi:10.1080/03637750903310352
  • Fink, E. L., Cai, D. A., Kaplowitz, S. A., Chung, S., Van Dyke, M. A., & Kim, J. N. (2003). The semantics of social influence: Threats vs. persuasion. Communication Monographs, 70, 295–316. doi:10.1080/0363775032000179115
  • Freeman, L. C. (1979). Centrality in networks: Conceptual clarification. Social Networks, 1, 215–239. doi:10.1016/0378-8733(78)90021-7
  • Freeman, L. C. (2000). Social network analysis: Definition and history. In A. E. Kazdan (Ed.), Encyclopedia of psychology (Vol. 7, pp. 350–351). Oxford, UK: Oxford University Press. doi:10.1037/10522-151
  • Goffman, E. (1963). Stigma: Notes on the management of spoiled identity. Englewood Cliffs, NJ: Prentice-Hall.
  • Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78, 1360–1380. doi:10.1086/225469
  • Haidt, J. (2003). The moral emotions. In R. J. Davidson, K. R. Scherer, & H. H. Goldsmith (Eds.), Handbook of affective sciences (pp. 852–870). Oxford, UK: Oxford University Press.
  • Hayes, A. F., & Scharkow, M. (2013). The relative trustworthiness of inferential tests of the indirect effect in statistical mediation analysis: Does method really matter? Psychological Science, 24, 1918–1927. doi:10.1177/0956797613480187
  • Heath, C. (1996). Do people prefer to pass along good or bad news? Valence and relevance of news as predictors of transmission propensity. Organizational Behavior and Human Decision Processes, 68, 79–94. doi:10.1006/obhd.1996.0091
  • Heath, C., Bell, C., & Sternberg, E. (2001). Emotional selections in memes: The case of urban legends. Journal of Personality and Social Psychology, 81, 1028–1041. doi:10.1037/0022-3514.81.6.1028
  • Heider, F. (1958). The psychology of interpersonal relations. New York, NY: John Wiley & Sons.
  • Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6, 1–55. doi:10.1080/10705519909540118
  • Huang, W., Hong, S. H., & Eades, P. (2005). Layout effects on sociogram perception. Proceedings of Graph Drawing, 3843, 262–273. doi:10.1007/11618058_24
  • Hubbell, C. H. (1965). An input–output approach to clique identification. Sociometry, 28, 377–399. doi:10.2307/2785990
  • Igarashi, T., & Kashima, Y. (2011). Perceived entitativity of social networks. Journal of Experimental Social Psychology, 47, 1048–1058. doi:10.1016/j.jesp.2011.04.008
  • Kass, R. E., & Raftery, A. E. (1995). Bayes factors. Journal of the American Statistical Association, 90, 773–795. doi:10.2307/2291091
  • Katz, E. (1957). The two-step flow of communication: An up-to-date report on an hypothesis. Public Opinion Quarterly, 21, 61–78. doi:10.1086/266687
  • Katz, L. (1953). A new index derived from sociometric data analysis. Psychometrika, 18, 39–43.
  • Kellermann, K., & Cole, T. (1994). Classifying compliance gaining messages: Taxonomic disorder and strategic confusion. Communication Theory, 1, 3–60. doi:10.1111/j.1468-2885.1994.tb00081.x
  • Kellermann, K., & Shea, B. C. (2009). Threats, suggestions, hints, and promises: Gaining compliance efficiently and politely. Communication Quarterly, 44, 145–165. doi:10.1080/01463379609370007
  • Kelley, H. H. (1992). Common-sense psychology and scientific psychology. Annual Review of Psychology, 43, 1–23. doi:10.1146/annurev.psych.43.1.1
  • Keltner, D., & Haidt, J. (1999). Social functions of emotion at four levels of analysis. Cognition and Emotion, 13, 505–521. doi:10.1080/026999399379168
  • Kim, H. S. (2015). Attracting views and going viral: How message features and news-sharing channels affect health news diffusion. Journal of Communication, 65, 512–534. doi:10.1111/jcom.12160
  • King, P. E. (2001). Automatic responses, target resistance, and the adaptation of compliance-seeking requests. Communication Monographs, 68, 386–399. doi:10.1080/03637750128067
  • Kline, R.B. (2005). Principles and Practice of Structural Equation Modeling (2nd ed.). New York, NY: The Guilford Press.
  • Lave, C. A., & March, J. G. (1993). An introduction to models in the social sciences (2nd ed.). Lanham, MD: University Press of America.
  • Lawler, E. J., Thye, S. R., & Yoon, J. (2000). Emotion and group cohesion in productive exchange. American Journal of Sociology, 106, 616–657. doi:10.1086/318965
  • Link, B. G., & Phelan, J. C. (2001). Conceptualizing stigma. Annual Review of Sociology, 27, 363–385. doi:10.1146/annurev.soc.27.1.363
  • MacCarron, P., Kaski, K., & Dunbar, R. (2016). Calling Dunbar’s numbers. Social Networks, 47, 151–155. doi:10.1016/j.socnet.2016.06.003
  • Marwell, G., & Schmitt, D. R. (1967). Dimensions of compliance-gaining behavior: An empirical analysis. Sociometry, 30, 350–364. doi:10.2307/2786181
  • Mason, W., & Suri, S. (2012). Conducting behavioral research on Amazon’s Mechanical Turk. Behavior Research Methods, 44, 1–23. doi:10.3758/s13428-011-0124-6
  • Moreno, J. L. (1934). Who shall survive? Washington, DC: Nervous and Mental Disease Publishing Company.
  • Neuberg, S. L., & DeScioli, P. (2015). Prejudices: Managing perceived threats to group life. In D. M. Buss (Ed.), The handbook of evolutionary psychology (pp. 669–683). Hoboken, NJ: Wiley.
  • Newcomb, T. (1961). The acquaintance process. New York, NY: Holt, Rinehardt & Winston.
  • Ortiz-Arroyo, D. (2010). Discovering sets of key players in social networks. In A. Abraham, A. Hassanien, & V. Snášel (Eds.), Computational social network analysis: Trends, tools, and research advances (pp. 27–48). London, UK: Springer-Verlag.
  • Preacher, K. J. (2015). Advances in mediation analysis: A survey and synthesis of new developments. Annual Review of Psychology, 66, 825–852. doi:10.1146/annurev-psych-010814-015258
  • Preacher, K. J., & Coffman, D. L. (2006, May). Computing power and minimum sample size for RMSEA [computer software]. Retrieved from http://quantpsy.org/
  • President’s New Freedom Commission on Mental Health. (2003). Achieving the promise: Transforming mental health care in America. Bethesda, MD: U.S. Department of Health & Human Services.
  • Rice, R. E. (1994). Using network concepts to clarify sources and mechanisms of social influence. In W. D. Richards Jr. & G. A. Barnett (Eds.), Progress in communication sciences: Vol. 12. Advances in communication network analysis (pp. 43–62). Norwood, NJ: Ablex.
  • Rimal, R. N., & Lapinski, M. K. (2015). A re-explication of social norms, ten years later. Communication Theory, 25, 393–409. doi:10.1111/comt.12080
  • Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York, NY: Free Press.
  • Rosnow, R. L. (1991). Inside rumor: A personal journey. American Psychologist, 46, 484–496. doi:10.1037/0003-066x.46.5.484
  • Smith, R. A. (2007). Language of the lost: An explication of stigma communication. Communication Theory, 17, 462–485. doi:10.1111/j.1468-2885.2007.00307.x
  • Smith, R. A. (2011). Stigma communication and health. In T. L. Thompson, R. Parrott, & J. Nussbaum (Eds.), Handbook of health communication (2nd ed., pp. 455–468). New York, NY: Taylor & Francis.
  • Smith, R. A. (2012). An experimental test of stigma communication content with a hypothetical infectious disease alert. Communication Monographs, 79, 522–538. doi:10.1080/03637751.2012.723811
  • Smith, R. A. (2014). Testing the model of stigma communication with a factorial experiment in an interpersonal context. Communication Studies, 65, 154–173. doi:10.1080/10510974.2013.851095
  • Smith, R. A., & Fink, E. L. (2015). Understanding the influential people and social structures shaping compliance. Journal of Social Structure, 16(4), 1–15. Retrieved from https://www.cmu.edu/joss/
  • Smith, R. A., & Hughes, D. (2014). Infectious disease stigmas: Maladaptive in modern society. Communication Studies, 65, 132–138. doi:10.1080/10510974.2013.851096
  • Southwell, B. G. (2013). Social networks and popular understanding of science and health: Sharing disparities. Baltimore, MD: Johns Hopkins University Press.
  • Twain, M. (1897). Following the equator. New York, NY: Dover Publications.
  • Valente, T. W. (1995). Network models of the diffusion of innovations. Cresskill, NJ: Hampton Press.
  • Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communication Monographs, 59, 329–349. doi:10.1080/03637759209376276
  • World Health Organization. (2014). Preventing suicide: A global imperative. Geneva, Switzerland: Author.
  • Yzer, M. (2012). Reasoned action theory: Persuasion as belief-based behavior change. In J. Dillard & L. Shen (Eds.), The SAGE handbook of persuasion: Developments in theory and practice (2nd ed., pp. 120–137). Thousand Oaks, CA: Sage.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.