763
Views
5
CrossRef citations to date
0
Altmetric
Articles

Information asymmetry and social exchange: exploring compliance gaining online

, , &
Pages 376-389 | Received 17 Apr 2014, Accepted 04 Aug 2014, Published online: 01 Sep 2014

References

  • Ackerloff, G. A. (1970). The market for “lemons”: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84, 488–500. doi:10.2307/1879431
  • Adams, J. S. (1965). Inequity in social exchange. In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 2, pp. 267–299). New York: Academic Press.
  • Aune, R. K., & Basil, M. D. (1994). A relational obligations approach to the foot-in-the-mouth effect. Journal of Applied Social Psychology, 24, 546–556. doi:10.1111/j.1559-1816.1994.tb00598.x
  • Barker, V. (2009). Older adolescents’ motivations for social network site use: The influence of gender, group identity, and collective self-esteem. Cyberpsychology & Behavior, 12(2), 209–213. doi:10.1089/cpb.2008.0228
  • Berger, C. R., & Calabrese, R. J. (1975). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1(2), 99–112. doi:10.1111/j.1468-2958.1975.tb00258.x
  • Brandt, D. R., Miller, G. R., & Hocking, J. E. (1980). Effects of self-monitoring and familiarity on deception detection. Communication Quarterly, 28(3), 3–10. doi:10.1080/01463378009369370
  • Burger, J. M., & Caldwell, D. F. (1997). Personality and social influence strategies in the workplace. Personality and Social Psychology Bulletin, 23, 1003–1012. doi:10.1177/01461672972310001
  • Burger, J. M., Messian, N., Patel, S., del Prado, A., & Anderson, C. (2004). What a coincidence! The effects of incidental similarity on compliance. Personality and Social Psychology Bulletin, 30, 35–43. doi:10.1177/0146167203258838
  • Burger, J. M., Soroka, S., Gonzago, K., Murphy, E., & Somervell, E. (2001). The effect of fleeting attraction on compliance to requests. Personality and Social Psychology Bulletin, 27, 1578–1586. doi:10.1177/01461672012712002
  • Byrne, D. (1971). The attraction paradigm. New York: Academic Press.
  • Charnigo, L., & Barnett-Ellis, P. (2007). Checking out Facebook.com: The impact of a digital trend on academic libraries. Information Technology and Libraries, 26(1), 23–34.
  • Claes, N., Hurley, C. M., & Stefanone, M. A. (2012). Do me a solid? Information asymmetry, liking, and compliance gaining online. Proceedings of the 2012 45th Hawaii international conference on systems science (pp. 4417–4426). Washington, DC: IEEE Computer Society. doi:10.1109/HICSS.2012.226
  • Clarkson, G., Jacobsen, T. E., & Batcheller, A. L. (2007). Information asymmetry and information sharing. Government Information Quarterly, 24, 827–839. doi:10.1016/j.giq.2007.08.001
  • Deeter-Schmelz, D. R., & Ramsey, R. P. (2010). A psychometric assessment of the Lennox and Wolfe self-monitoring scale in the sales force. Industrial Marketing Management, 39, 1162–1169. doi:10.1016/j.indmarman.2009.12.004
  • Emswiller, T., Deaux, K., & Willis, J. E. (1971). Similarity, sex and requests for small favors. Journal of Applied Social Psychology, 1, 284–291. doi:10.1111/j.1559-1816.1971.tb00367.x
  • Facebook. (2013). Retrieved November 3, 2013, from newsroom.fb.com/Advertising
  • Finch, J. F., & Cialdini, R. B. (1989). Another indirect tactic of (self-) image management: Boosting. Personality and Social Psychology Bulletin, 15, 222–232. doi:10.1177/0146167289152009
  • Garrity, K., & Degelman, D. (2006). Effect of server introduction on restaurant tipping. Journal of Applied Social Psychology, 20, 168–172. doi:10.1111/j.1559-1816.1990.tb00405.x
  • González-Ibáñez, R., Muresan, S., & Wacholder, N. (2011). Identifying sarcasm in Twitter: A closer look. Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies (Vol. 2, pp. 581–586). Stroudsburg, PA: Association for Computational Linguistics.
  • Hancock, J. T., Toma, C. L., & Fenner, K. (2008). I know something you don't: The use of asymmetric personal information for interpersonal advantage. Proceedings of the 2008 ACM conference on computer supported cooperative work (pp. 413–416). New York: ACM. doi:10.1145/1460563.1460629
  • Heider, F. (1958). The psychology of interpersonal relations. New York: John Wiley. doi:10.1037/10628-000
  • Hoffman, M., Richomond, J., Morrow, J., & Salomone, K. (2002). Investigating “sense of belonging” in first-year college students. Journal of College Student Retention: Research, Theory and Practice, 4(3), 227–256. doi: 10.2190/DRYC-CXQ9-JQ8V-HT4V
  • Hogue, M., Levashina, J., & Hang, H. (2013). Will I fake it? The interplay of gender, Machiavellianism and self-monitoring on strategies for honestly in job interviews. Journal of Business Ethics, 117, 399–411. doi:10.1007/s10551-012-1525-x
  • Holtgraves, T. (2011). Text messaging, personality, and the social context. Journal of Research in Personality, 45, 92–99. doi:10.1016/j.jrp.2010.11.015
  • Kelman, H. C. (1958). Compliance, identification and internalization three processes of attitude change. Journal of Conflict Resolution, 2, 51–60. doi:10.1177/002200275800200106
  • Key, M. S., Edlund, J. E., Sagarin, B. J., & Bizer, G. Y. (2009). Individual differences in susceptibility to mindlessness. Personality and Individual Differences, 46, 261–264. doi:10.1016/j.paid.2008.10.001
  • Lennox, R. D., & Wolfe, R. N. (1984). Revision of the self-monitoring scale. Journal of Personality and Social Psychology, 46, 1349–1364. doi:10.1037/0022-3514.46.6.1349
  • McCroskey, J. C., & McCain, T. A. (1974). The measurement of interpersonal attraction. Speech Monographs, 41, 261–266. doi:10.1080/03637757409375845
  • McLaren, S., & Challis, C. (2009). Resilience among men farmers: The protective roles of social support and sense of belonging in the depression-suicidal ideation relation. Death Studies, 33(3), 262–276. doi:10.1080/07481180802671985
  • Nguyen, T., Phung, D. Q., Adams, B., & Venkatesh, S. (2011). Towards discovery of influence and personality traits through social link prediction. In L. A. Adamic, R. A. Baeza-Yates, & S. Counts (Eds.), ICWSM (pp. 566–569). Menlo Park, CA: The AAAI Press.
  • Olson, J., Ouyang, Y., Poe, J., Trantham, A., & Waterman, R. W. (2012). The teleprompter presidency: Comparing Obama's campaign and governing rhetoric. Social Science Quarterly, 93, 1402–1423. doi:10.1111/j.1540-6237.2012.00925.x
  • Pennebaker, J. W., Booth, R. J., & Francis, M. E. (2007). Linguistic Inquiry and Word Count: LIWC [computer software]. Austin, TX: LIWC.net.
  • Pennebaker, J. W., Mehl, M. R., & Niederhoffer, K. (2003). Psychological aspects of natural language use: Our words, our selves. Annual Review of Psychology, 54, 547–577. doi:10.1146/annurev.psych.54.101601.145041
  • Rosen, D., Stefanone, M. A., & Lackaff, D. (2010). Online and offline social networks: Investigating culturally-specific behavior and satisfaction. Proceedings of the 43rd Hawaii international conference on system sciences (pp. 1–10). Washington, DC: IEEE Computer Society Press.
  • Sanchez-Cortes, D., Motlicek, P., & Gatica-Perez, D. (2012, December). Assessing the impact of language style on emergent leadership perception from ubiquitous audio. Proceedings of the 11th international conference on mobile and ubiquitous multimedia (p. 33). Ulm: ACM. doi:10.1145/2406367.2406408
  • Santos, M. D., Leve, C., & Pratkanis, A. R. (1994). Hey buddy, can you spare seventeen cents? Mindful persuasion and the pique technique. Journal of Applied Social Psychology, 24, 755–764. doi:10.1111/j.1559-1816.1994.tb00610.x
  • Simmons, R., Chambless, D., & Gordon, P. C. (2008). How do hostile and emotionally over-involved relatives view their relationships? What relatives’ pronoun use tells us. Family Process, 47, 405–419. doi:10.1111/j.1545-5300.2008.00261.x
  • Snyder, M. (1974). The self-monitoring of expressive behavior. Journal of Personality and Social Psychology, 30, 526–537. doi:10.1037/h0037039
  • Sprecher, S. (2014). Effects of actual (manipulated) and perceived similarity on liking in get-acquainted interactions: The role of communication. Communication Monographs, 81(1), 4–27. doi:10.1080/03637751.2013.839884
  • Stefanone, M. A., Hurley, C. M., & Yang, J. (2013). Antecedents of online information seeking. Information, Communication, and Society, 16, 61–81. doi:10.1080/1369118X.2012.656137
  • Stefanone, M. A., Lackaff, D., & Rosen, D. (2010). The relationship between traditional mass media and ‘social media’: Reality television as a model for social network site behavior. Journal of Broadcasting and Electronic Media, 54(3), 508–525. doi:10.1080/08838151.2010.498851
  • Stefanone, M. A., Lackaff, D., & Rosen, D. (2011). Contingencies of self-worth and social networking site behavior. Cyberpsychology, Behavior, and Social Networking, 14(1–2), 41–49. doi:10.1089/cyber.2010.0049
  • Storbeck, J., Robinson, M. D., & McCourt, M. (2006). Semantic processing precedes affect retrieval: The neurological case for cognitive primacy in visual processing. Review of General Psychology, 10, 41–55. doi:10.1037/1089-2680.10.1.41
  • Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185, 1124–1131. doi:10.1126/science.185.4157.1124
  • Vohs, K. D., Baumeister, R. F., & Chin, J. (2007). Feeling duped: Emotional, motivation, and cognitive aspects of being exploited by others. Review of General Psychology, 11(2), 127–141. doi:10.1037/1089-2680.11.2.127

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.