Motivating, influencing, and persuading users
暂无分享,去创建一个
[1] Julie Khaslavsky,et al. Understanding the seductive experience , 1999, CACM.
[2] L. Ross,et al. The Person and the Situation: Perspectives of Social Psychology , 1991 .
[3] S. Weghorst,et al. Virtual reality and tactile augmentation in the treatment of spider phobia: a case report. , 1997, Behaviour research and therapy.
[4] I. Rosenstock,et al. The Role of Self-Efficacy in Achieving Health Behavior Change , 1986, Health education quarterly.
[5] Izak Benbasat,et al. The influence of decision aids on choice strategies under conditions of high cognitive load , 1994, IEEE Trans. Syst. Man Cybern..
[6] Miriam J. Metzger,et al. College student Web use, perceptions of information credibility, and verification behavior , 2003, Comput. Educ..
[7] Peter W. Hewson,et al. Effect of instruction using microcomputer simulations and conceptual change strategies on science learning , 1986 .
[8] Clifford Nass,et al. The media equation - how people treat computers, television, and new media like real people and places , 1996 .
[9] John L. Hay,et al. Toward real-time simulation : languages, models, and systems , 1978 .
[10] J. Cacioppo,et al. Attitudes and Persuasion: Classic and Contemporary Approaches , 1981 .
[11] Johanna D. Moore,et al. Proceedings of the Conference on Human Factors in Computing Systems , 1989 .
[12] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[13] D. R. Danielson,et al. How do users evaluate the credibility of Web sites?: a study with over 2,500 participants , 2003, DUX '03.
[14] B K Wiederhold,et al. The effects of immersiveness on physiology. , 1998, Studies in health technology and informatics.
[15] Ellen Timminga,et al. Persuasiveness of expert systems , 1998, Behav. Inf. Technol..
[16] B. J. Fogg,et al. The elements of computer credibility , 1999, CHI '99.
[17] Bernard J. Jaworski,et al. Enhancing and Measuring Consumers’ Motivation, Opportunity, and Ability to Process Brand Information from Ads , 1991 .
[18] R. Decharms. Personal causation : the internal affective determinants of behavior , 1968 .
[19] Peter J. Denning,et al. Beyond calculation - the next fifty years of computing , 1997 .
[20] C. Nass,et al. Are People Polite to Computers? Responses to Computer-Based Interviewing Systems1 , 1999 .
[21] B. J. Fogg,et al. Can computer personalities be human personalities? , 1995, Int. J. Hum. Comput. Stud..
[22] Roderick M. Chisholm. Reflections on Human Agency , 1971 .
[23] Sara Hennessy,et al. Learner perceptions of realism and magic in computer simulations , 1993, Br. J. Educ. Technol..
[24] B. J. Fogg,et al. Elements that affect web credibility: early results from a self-report study , 2000, CHI Extended Abstracts.
[25] B. J. Fogg,et al. Can computers be teammates? , 1996, Int. J. Hum. Comput. Stud..
[26] C. Nass,et al. How “Real” Are Computer Personalities? , 1996 .
[27] B. J. Fogg,et al. What makes Web sites credible?: a report on a large quantitative study , 2001, CHI.
[28] Thomas J. Johnson,et al. Cruising is Believing?: Comparing Internet and Traditional Sources on Media Credibility Measures , 1998 .
[29] D. Lieberman,et al. The Computer's Potential Role in Health Education , 1992 .
[30] Charles R. Crowell,et al. Human-computer interaction: A preliminary social psychological analysis , 1982 .
[31] B. J. Fogg,et al. Prominence-interpretation theory: explaining how people assess credibility online , 2003, CHI Extended Abstracts.
[32] Michael J. Prietula,et al. The Turing effect: the nature of trust in expert systems advice , 1997 .
[33] Charlene L. Muehlenhard,et al. Helping women “break the ice: a computer program to help shy women start and maintain conversations with men , 1988 .
[34] B. J. Fogg,et al. Persuasive computers: perspectives and research directions , 1998, CHI.
[35] C. Nass,et al. Voices, boxes, and sources of messages: Computers and social actors. , 1993 .
[36] A. Gouldner. THE NORM OF RECIPROCITY: A PRELIMINARY STATEMENT * , 1960 .
[37] Jonathan Grudin,et al. Trust and accountability: preserving human values in interactional experience , 1998, CHI Conference Summary.
[38] Batya Friedman,et al. Human values and the design of computer technology , 1997 .
[39] B. J. Fogg,et al. Credibility and computing technology , 1999, CACM.
[40] Douglas Carnine,et al. Health ways: a computer simulation for problem solving in personal health management , 1986 .
[41] Jason Tester,et al. The landscape of persuasive technologies , 1999, CACM.
[42] Jennifer Greer. Evaluating the Credibility of Online Information: A Test of Source and Advertising Influence , 2003 .
[43] Youngme Moon,et al. The effects of distance in local versus remote human-computer interaction , 1998, CHI.
[44] I. Marks,et al. Self-treatment of agoraphobia by exposure , 1987 .
[45] B. J. Fogg,et al. How users reciprocate to computers: an experiment that demonstrates behavior change , 1997, CHI Extended Abstracts.
[46] B. J. Fogg,et al. Computers are social actors: a review of current research , 1997 .
[47] B. J. Fogg,et al. Charismatic computers: creating more likable and persuasive interactive technologies by leveraging principles from social psychology , 1998 .
[48] Daniel Berdichevsky,et al. Toward an ethics of persuasive technology , 1999, CACM.
[49] Esther Thorson,et al. CyberHate: Extending Persuasive Techniques of Low Credibility Sources to the World Wide Web , 1999 .
[50] V. Strecher. Computer-tailored smoking cessation materials: a review and discussion. , 1999, Patient education and counseling.
[51] Paul J. Feltovich,et al. Expertise in context: human and machine , 1997 .
[52] Martin L. Tombari,et al. Using computers as contingency managers in self-monitoring interventions: A case study , 1985 .
[53] B. J. Fogg,et al. Silicon sycophants: the effects of computers that flatter , 1997, Int. J. Hum. Comput. Stud..
[54] Osman Balci. Credibility assessment of simulation results , 1986, WSC '86.
[55] Esther Thorson,et al. Current Advertising on the Internet: The Benefits and Usage of Mixed-Media Advertising Strategies , 1999 .
[56] F. Javier Lerch,et al. How do we trust machine advice , 1989 .
[57] A H Bullinger,et al. From toy to tool: the development of immersive virtual reality environments for psychotherapy of specific phobias. , 1998, Studies in health technology and informatics.
[58] Bernard J. Jaworski,et al. Information Processing from Advertisements: Toward an Integrative Framework , 1989 .
[59] M. S. George,et al. Understanding and predicting attitudes towards computers , 1992 .
[60] V. Strecher,et al. The effects of computer-tailored smoking cessation messages in family practice settings. , 1994, The Journal of family practice.
[61] B. J. Fogg,et al. Persuasive technologie301398 , 1999, CACM.
[62] Osman Balci,et al. Verification, validation, and accreditation , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).
[63] Edward S. Reed,et al. The necessity of experience , 1996 .
[64] Ton de Jong,et al. Learning and instruction with computer simulations , 1991 .
[65] Margaret Bell Gredler. A Taxonomy of Computer Simulations. , 1986 .
[66] Stephen M. Alessi,et al. Fidelity in the design of instructional simulations , 1988 .
[67] M. Ford. Motivating Humans: Goals, Emotions, and Personal Agency Beliefs , 1992 .
[68] Lee Sproull,et al. Cooperating with life-like interface agents , 1999 .
[69] J. Beniger. Personalization of Mass Media and the Growth of Pseudo-Community , 1987 .
[70] K. Kirkby. Computer-assisted treatment of phobias. , 1996, Psychiatric services.
[71] Nicholas C. Burbules,et al. Paradoxes of the Web: The Ethical Dimensions of Credibility , 2001, Libr. Trends.
[72] A. Bandura. Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.
[73] Thomas O. Maguire,et al. The computer as social pressure to produce conformity in a simple perceptual task , 1971 .