Spaced Out in Cyberspace? Evaluations of Computer‐Based Information

This study draws on cognitive elaboration theory to examine when and why people evaluate computer-based information more favorably than information from a less automated source. Half of participants received information from a computer, while half received the identical information from a less automated source. Moreover, participants were induced to be more vs. less involved in the information-acquisition process. As predicted, participants in the low-involvement condition evaluated the information more favorably when it came from a computer than from a less automated source. This difference was eliminated in the high-involvement condition. Further supporting our reasoning, the interaction effect between information source and level of involvement was more pronounced for participants low, rather than high, in need for cognition.

[1]  S. Kiesler,et al.  Group and computer-mediated discussion effects in risk decision making. , 1987 .

[2]  Levin,et al.  Information Processing at Successive Stages of Decision Making: Need for Cognition and Inclusion-Exclusion Effects. , 2000, Organizational behavior and human decision processes.

[3]  P. Christopher Earley,et al.  Technology, credibility, and feedback use , 1989 .

[4]  C. F. Kao,et al.  The efficient assessment of need for cognition. , 1984, Journal of personality assessment.

[5]  Robert P. Hawkins,et al.  Predicting Selection and Activity in Television Genre Viewing , 2001 .

[6]  William P. Eveland,et al.  Examining Information Processing on the World Wide Web Using Think Aloud Protocols , 2000 .

[7]  Robert W. Zmud,et al.  AN EMPIRICAL INVESTIGATION OF THE DIMENSIONALITY OF THE CONCEPT OF INFORMATION , 1978 .

[8]  E. Langer,et al.  The effects of choice and enhanced personal responsibility for the aged: a field experiment in an institutional setting. , 1976, Journal of personality and social psychology.

[9]  Richard P. Will,et al.  True and false dependence on technology: Evaluation with an expert system , 1991 .

[10]  A. Kruglanski,et al.  Persuasion by a Single Route: A View From the Unimodel , 1999 .

[11]  Bruce Schneier,et al.  Inside risks: semantic network attacks , 2000, CACM.

[12]  B. J. Fogg,et al.  Credibility and computing technology , 1999, CACM.

[13]  E. Burton Swanson,et al.  INFORMATION CHANNEL DISPOSITION AND USE , 1987 .

[14]  John W. Payne,et al.  Task complexity and contingent processing in decision making: An information search and protocol analysis☆ , 1976 .