Motivating, influencing, and persuading users

[1]  Julie Khaslavsky,et al.  Understanding the seductive experience , 1999, CACM.

[2]  L. Ross,et al.  The Person and the Situation: Perspectives of Social Psychology , 1991 .

[3]  S. Weghorst,et al.  Virtual reality and tactile augmentation in the treatment of spider phobia: a case report. , 1997, Behaviour research and therapy.

[4]  I. Rosenstock,et al.  The Role of Self-Efficacy in Achieving Health Behavior Change , 1986, Health education quarterly.

[5]  Izak Benbasat,et al.  The influence of decision aids on choice strategies under conditions of high cognitive load , 1994, IEEE Trans. Syst. Man Cybern..

[6]  Miriam J. Metzger,et al.  College student Web use, perceptions of information credibility, and verification behavior , 2003, Comput. Educ..

[7]  Peter W. Hewson,et al.  Effect of instruction using microcomputer simulations and conceptual change strategies on science learning , 1986 .

[8]  Clifford Nass,et al.  The media equation - how people treat computers, television, and new media like real people and places , 1996 .

[9]  John L. Hay,et al.  Toward real-time simulation : languages, models, and systems , 1978 .

[10]  J. Cacioppo,et al.  Attitudes and Persuasion: Classic and Contemporary Approaches , 1981 .

[11]  Johanna D. Moore,et al.  Proceedings of the Conference on Human Factors in Computing Systems , 1989 .

[12]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[13]  D. R. Danielson,et al.  How do users evaluate the credibility of Web sites?: a study with over 2,500 participants , 2003, DUX '03.

[14]  B K Wiederhold,et al.  The effects of immersiveness on physiology. , 1998, Studies in health technology and informatics.

[15]  Ellen Timminga,et al.  Persuasiveness of expert systems , 1998, Behav. Inf. Technol..

[16]  B. J. Fogg,et al.  The elements of computer credibility , 1999, CHI '99.

[17]  Bernard J. Jaworski,et al.  Enhancing and Measuring Consumers’ Motivation, Opportunity, and Ability to Process Brand Information from Ads , 1991 .

[18]  R. Decharms Personal causation : the internal affective determinants of behavior , 1968 .

[19]  Peter J. Denning,et al.  Beyond calculation - the next fifty years of computing , 1997 .

[20]  C. Nass,et al.  Are People Polite to Computers? Responses to Computer-Based Interviewing Systems1 , 1999 .

[21]  B. J. Fogg,et al.  Can computer personalities be human personalities? , 1995, Int. J. Hum. Comput. Stud..

[22]  Roderick M. Chisholm Reflections on Human Agency , 1971 .

[23]  Sara Hennessy,et al.  Learner perceptions of realism and magic in computer simulations , 1993, Br. J. Educ. Technol..

[24]  B. J. Fogg,et al.  Elements that affect web credibility: early results from a self-report study , 2000, CHI Extended Abstracts.

[25]  B. J. Fogg,et al.  Can computers be teammates? , 1996, Int. J. Hum. Comput. Stud..

[26]  C. Nass,et al.  How “Real” Are Computer Personalities? , 1996 .

[27]  B. J. Fogg,et al.  What makes Web sites credible?: a report on a large quantitative study , 2001, CHI.

[28]  Thomas J. Johnson,et al.  Cruising is Believing?: Comparing Internet and Traditional Sources on Media Credibility Measures , 1998 .

[29]  D. Lieberman,et al.  The Computer's Potential Role in Health Education , 1992 .

[30]  Charles R. Crowell,et al.  Human-computer interaction: A preliminary social psychological analysis , 1982 .

[31]  B. J. Fogg,et al.  Prominence-interpretation theory: explaining how people assess credibility online , 2003, CHI Extended Abstracts.

[32]  Michael J. Prietula,et al.  The Turing effect: the nature of trust in expert systems advice , 1997 .

[33]  Charlene L. Muehlenhard,et al.  Helping women “break the ice: a computer program to help shy women start and maintain conversations with men , 1988 .

[34]  B. J. Fogg,et al.  Persuasive computers: perspectives and research directions , 1998, CHI.

[35]  C. Nass,et al.  Voices, boxes, and sources of messages: Computers and social actors. , 1993 .

[36]  A. Gouldner THE NORM OF RECIPROCITY: A PRELIMINARY STATEMENT * , 1960 .

[37]  Jonathan Grudin,et al.  Trust and accountability: preserving human values in interactional experience , 1998, CHI Conference Summary.

[38]  Batya Friedman,et al.  Human values and the design of computer technology , 1997 .

[39]  B. J. Fogg,et al.  Credibility and computing technology , 1999, CACM.

[40]  Douglas Carnine,et al.  Health ways: a computer simulation for problem solving in personal health management , 1986 .

[41]  Jason Tester,et al.  The landscape of persuasive technologies , 1999, CACM.

[42]  Jennifer Greer Evaluating the Credibility of Online Information: A Test of Source and Advertising Influence , 2003 .

[43]  Youngme Moon,et al.  The effects of distance in local versus remote human-computer interaction , 1998, CHI.

[44]  I. Marks,et al.  Self-treatment of agoraphobia by exposure , 1987 .

[45]  B. J. Fogg,et al.  How users reciprocate to computers: an experiment that demonstrates behavior change , 1997, CHI Extended Abstracts.

[46]  B. J. Fogg,et al.  Computers are social actors: a review of current research , 1997 .

[47]  B. J. Fogg,et al.  Charismatic computers: creating more likable and persuasive interactive technologies by leveraging principles from social psychology , 1998 .

[48]  Daniel Berdichevsky,et al.  Toward an ethics of persuasive technology , 1999, CACM.

[49]  Esther Thorson,et al.  CyberHate: Extending Persuasive Techniques of Low Credibility Sources to the World Wide Web , 1999 .

[50]  V. Strecher Computer-tailored smoking cessation materials: a review and discussion. , 1999, Patient education and counseling.

[51]  Paul J. Feltovich,et al.  Expertise in context: human and machine , 1997 .

[52]  Martin L. Tombari,et al.  Using computers as contingency managers in self-monitoring interventions: A case study , 1985 .

[53]  B. J. Fogg,et al.  Silicon sycophants: the effects of computers that flatter , 1997, Int. J. Hum. Comput. Stud..

[54]  Osman Balci Credibility assessment of simulation results , 1986, WSC '86.

[55]  Esther Thorson,et al.  Current Advertising on the Internet: The Benefits and Usage of Mixed-Media Advertising Strategies , 1999 .

[56]  F. Javier Lerch,et al.  How do we trust machine advice , 1989 .

[57]  A H Bullinger,et al.  From toy to tool: the development of immersive virtual reality environments for psychotherapy of specific phobias. , 1998, Studies in health technology and informatics.

[58]  Bernard J. Jaworski,et al.  Information Processing from Advertisements: Toward an Integrative Framework , 1989 .

[59]  M. S. George,et al.  Understanding and predicting attitudes towards computers , 1992 .

[60]  V. Strecher,et al.  The effects of computer-tailored smoking cessation messages in family practice settings. , 1994, The Journal of family practice.

[61]  B. J. Fogg,et al.  Persuasive technologie301398 , 1999, CACM.

[62]  Osman Balci,et al.  Verification, validation, and accreditation , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).

[63]  Edward S. Reed,et al.  The necessity of experience , 1996 .

[64]  Ton de Jong,et al.  Learning and instruction with computer simulations , 1991 .

[65]  Margaret Bell Gredler A Taxonomy of Computer Simulations. , 1986 .

[66]  Stephen M. Alessi,et al.  Fidelity in the design of instructional simulations , 1988 .

[67]  M. Ford Motivating Humans: Goals, Emotions, and Personal Agency Beliefs , 1992 .

[68]  Lee Sproull,et al.  Cooperating with life-like interface agents , 1999 .

[69]  J. Beniger Personalization of Mass Media and the Growth of Pseudo-Community , 1987 .

[70]  K. Kirkby Computer-assisted treatment of phobias. , 1996, Psychiatric services.

[71]  Nicholas C. Burbules,et al.  Paradoxes of the Web: The Ethical Dimensions of Credibility , 2001, Libr. Trends.

[72]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[73]  Thomas O. Maguire,et al.  The computer as social pressure to produce conformity in a simple perceptual task , 1971 .