首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

The current study explored emotional distress and comforting messages from a receiver's perspective. This approach differs from most comforting research, which focuses on the sender's ability to provide comfort. After reading a scenario that depicted a major distressing event or a daily distressing event, subjects selected the Burleson and Samter (1985) comforting strategy that would most alleviate their emotional distress. In an attempt to explain a subject's perceptions of comforting, attachment styles, likelihood of seeking support, and level of emotional discomfort were also assessed. Results indicated that subjects desired a mid‐level comforting response regardless of whether they were distressed over a daily event or major event. This result is counter to the sender oriented comforting research, which suggests that providing higher‐level comforting responses is optimal. Subjects in the death scenario were more upset by the event and more likely to seek social support. Secure attachment subjects desired a significantly higher‐level comforting message than anxious/ambivalent and avoidant individuals. Additionally, females desired a higher level comforting response, were more likely to be upset by the distress, and were more likely to seek support than males.  相似文献   

2.
This article responds critically to a recent article by Lemieux and Tighe (Communication Research Reports, 21, 144–153, 2004) in which the authors conclude that recipients of comforting efforts prefer messages that exhibit a moderate rather than high level of person centeredness. It is argued that an erroneous assumption made by Lemieux and Tighe about the status of “receiver perspective” research on the comforting process led to faulty interpretations of the data and unwarranted conclusions about recipient preferences regarding comforting messages. Alternative interpretations of Lemieux and Tighe's data are presented; these are guided by the extensive previous research that has assessed evaluations and outcomes of comforting messages.  相似文献   

3.
《Communication monographs》2012,79(2):103-111
Prior research on comforting communication from the constructivist perspective has employed a hierarchical system of message analysis to classify different comforting strategies; within this system, messages are scored for the extent to which they explicitly acknowledge, elaborate, and legitimize the feelings of distressed others. The present paper reports two studies assessing the extent to which naive actors' perceptions of comforting strategy sensitivity, effectiveness, and quality correspond with the formal analysis of comforting strategy sophistication embedded in the constructivist hierarchical coding scheme. In the first study, 73 female college students interacted with a female confederate who feigned distress over having recently been dropped by her long‐term boyfriend. These interactions were videotaped and content analyzed; in addition, both the confederate and an experimental observer rated participants' behaviors for sensitivity. Results indicated that participants employing a greater proportion of theoretically sophisticated comforting strategies were perceived as behaving more sensitively toward the confederate. In the second study, 148 college students were presented with lists of preformulated comforting strategies derived from the constructivist hierarchy and were asked to rate these strategies for “sensitivity” and “effectiveness” and to rank order them in terms of overall quality. Results indicated that respondents rated and rank ordered the strategies in a manner very consistent with the constructivist hierarchical ordering of comforting strategy types: The constructivist ordering of the strategies explained over 95% of the variance in respondents' ratings and rank orderings.  相似文献   

4.
The impact of 6 approaches to comforting (suggesting a diversion, expressing optimism, providing an external account, offering assistance, explaining the perspective of the offender, and a combination of the first 5), attributed to either a good friend or a casual acquaintance, was assessed for 2 situations by 394 students. Distressed individuals responded to comforting messages along two dimension: feeling less upset and feeling demeaned, with some indications that yet a third dimension (appreciating the concern of the comforter) may exist. The message that combined elements from the other 5 approaches yielded generally the most positive responses, but responses to specific message approaches varied with situation and dimension of response. Messages from good friends were more successful than those from casual acquaintances in helping the distressed individual to feel less upset.  相似文献   

5.
In face‐to‐face interaction, speakers often pursue secondary goals such as not hurting the other's feelings. Two studies investigated the effect of trait verbal aggressiveness (VA) on the importance of such goals. In both studies, persons higher in VA were relatively less likely to judge messages unacceptable for the reason that the message would offend or hurt the hearer. Study 1 also found that high VAs are less likely to consider messages unacceptable because the message conflicts with their principles and less likely to report chronic secondary goals to be supportive or maintain a positive relationship. In Study 2, the effect of VA on the situated importance of a goal to not offend or hurt the other depended on the situation. The implications for the manner in which high VAs anticipate the outcomes of message are considered.  相似文献   

6.

This study assessed the extent to which six individual difference variables—sex, interpersonal construct differentiation, interpersonal construct abstractness, emotional empathy, and two aspects of communication apprehension—affect the perceptions of preformulated comforting strategies. Theoretical, methodological, and pedagogical implications of the findings are discussed.  相似文献   

7.
In an experimental study conducted in Switzerland the effects of newscasters' gender and age on credibility were analyzed using a 2 × 2 × 2 factorial design. Participants (N = 160) evaluated Swiss, German, and Austrian TV news items in terms of credibility of the newscaster and credibility of the message. News items read by female newscasters were perceived as being more credible. In contrast, male newscasters were considered to be more credible persons. Furthermore, a significant interaction between the newscasters' gender and age was observed: Age had no effect on the credibility of the younger newscasters, whereas older male newscasters were perceived as being the most credible.  相似文献   

8.
Advances in technology increasingly empowered citizens to become active seekers and even co-producers of e-government information and services rather than being only passive recipients. Citizens' interactions with each other reached such a point that they could contribute to the quality and quantity of e-government services. Examples of this citizen-to-citizen (C2C) interactions adding value to current e-government services or triggering new and innovative ones are increasingly observed worldwide. Although C2C interactions is not a new phenomenon, it is a relatively overlooked topic in e-government studies. Current e-government literature is insufficient in exploring and explaining the evolving nature, increasing occurrence, and various outcomes of these interactions. This article aims to fill the gap in the e-government literature by analyzing C2C interactions in detail and discusses how to regulate the C2C interaction processes and their useful and harmful outcomes.When C2C interactions get integrated into government activities and form e-government value chains (as in C2C2G or G4C2C), they contribute to the electronic provision of government information or services. C2C interactions also create beneficial (advantages of C2C) and harmful (disadvantages of C2C) outcomes. The main advantages of C2C interactions are their support for governments in making decisions, solving problems, and improving public services. Their main disadvantages are distributing misinterpreted or manipulative information, causing uncertainty, and even digital vigilantism. The article ends with suggestions for future research, such as different scenarios of government regulation for C2C interactions.  相似文献   

9.
We conducted a random telephone survey of 182 parents to assess their reactions as well as their children's reactions to child kidnapping stories in the news. Children below age 13 experienced more fright-related feelings and more concern for their personal safety than adolescents did. Children who were heavy viewers of TV news also were more frightened. Parents rated themselves as more upset by the stories than their children were. Parents' fright responses and coping strategies were more prevalent among those who paid close attention to the high-profile news stories and those who regularly viewed TV series about missing persons. The findings are discussed in terms of cultivation theory and developmental differences in how children process information.  相似文献   

10.
This observational study examined the strategies that music students used to locate scores and media items in an academic library's online public access catalog (OPAC). During a usability test, investigators tracked students' search strategies and behaviors, and measured their success in identifying appropriate items. Students experienced briefer, less complicated, and more successful queries for media items than for music scores (the latter of which they struggled to find and properly identify). Class standing, library catalog experience, and prior library instruction had no significant effect on positive outcomes. Searches for music scores were highly sensitive to variations in query wording, and students frequently struggled to revise their searches.  相似文献   

11.
12.
《Communication monographs》2012,79(3):289-300
Relying on the fundamental assumption of violation theories that norm violations stimulate receiver thought processes, we explored receivers' symbolic cognitive processes in response to particular types of norm violations. Specifically, we reasoned that imagined interactions serve as a processing mechanism whereby individuals review the behavior of another, identify the type of norm violation, and make decisions about how to respond-all within their efforts to cope with deviations from norms. Utilizing the classroom context, we examined how teacher norm violations, operationalized as teacher misbehaviors, provoke students' imagined interaction activity. Results revealed that imagined interactions were used in respect to all three types of violations profiled and that participants were significantly more likely to engage in imagined interactions than to interact with or confront norm violators. The results are discussed in terms of implications for extending violation theories to include context-based goal attainment and power differentials between interactants.  相似文献   

13.
In today's global culture where the Internet has established itself as the main tool for communication and commerce, the capability to massively analyze and predict citizens' behavior has become a priority for governments in terms of collective intelligence and security. At the same time, in the context of novel possibilities that artificial intelligence (AI) brings to governments in terms of understanding and developing collective behavior analysis, important concerns related to citizens' privacy have emerged. In order to identify the main uses that governments make of AI and to define citizens' concerns about their privacy, in the present study, we undertook a systematic review of the literature, conducted in-depth interviews, and applied data-mining techniques. Based on our results, we classified and discussed the risks to citizens' privacy according to the types of AI strategies used by governments that may affect collective behavior and cause massive behavior modification. Our results revealed 11 uses of AI strategies used by the government to improve their interaction with citizens, organizations in cities, services provided by public institutions or the economy, among other areas. In relation to citizens' privacy when AI is used by governments, we identified 8 topics related to human behavior predictions, intelligence decision making, decision automation, digital surveillance, data privacy law and regulation, and the risk of behavior modification. The paper concludes with a discussion of the development of regulations focused on the ethical design of citizen data collection, where implications for governments are presented aimed at regulating security, ethics, and data privacy. Additionally, we propose a research agenda composed by 16 research questions to be investigated in further research.  相似文献   

14.
Weiner's (2000 Weiner , B. ( 2000 ). Intrapersonal and interpersonal theories of motivation from an attributional perspective . Educational Psychology Review , 12 , 114 . [CSA] [CROSSREF] [Crossref], [Web of Science ®] [Google Scholar]) attributional model of intrapersonal motivations suggests that attributions influence not only people's emotional experiences, but also their behavioral responses to the events that caused these emotions. The current study investigates the causal dimensions (i.e., stability, controllability, locus) of five emotions (i.e., sadness, helplessness, hurt, fear, anger) people commonly experience when they are distressed and in need of emotional support. Participants (N = 258) were asked to identify an upsetting event and subsequently talk about it with a confederate helper in a five-minute conversation. After the conversation, participants completed attribution and emotion indices scales. The events discussed were coded into nine categories (e.g., death of a relative, college performance/job problems, break-ups). Results suggested that the five emotions possess a unique attributional make-up and are uniquely tied to specific events that were discussed by participants. Implications of the results are discussed in the context of providing emotional support to people who experience distress.  相似文献   

15.
Esteem support is a particular form of social support that is provided with the intent of enhancing how others feel about themselves and their attributes, abilities, and accomplishments. This study examines the association between perceptions of esteem support message helpfulness and (a) characteristics of the esteem support situation, (b) the relationship between provider and recipient, and (c) features of the perceived esteem support message. Participants (N = 55) recalled two esteem-threatening situations, one for which they received helpful esteem support and another for which they received unhelpful esteem support. Messages and features of situations and helpers were coded. Results indicate that features of the esteem support message and the helper are related to perceptions of messages helpfulness.  相似文献   

16.
《Communication monographs》2012,79(2):154-168
An investigation of memorable messages as guides to behavior from a Control Theory perspective was conducted. Respondents were asked to recall behaviors that either exceeded or violated their personal expectations for themselves, then to recall the memorable messages that came to mind when self-assessing these behaviors. This method uses the self-assessment of prior behavior as the entry point to a feedback loop. Control Theory predicts that within the feedback loop behaviors should be compared with internal principles that come from memorable messages. This comparison should result in either a positively or negatively valenced evaluation of the behavior if it either exceeds or violates personal standards represented as internal principles. The findings include the categories of behaviors that exceeded or violated personal expectations, the co-participants and the site of the behaviors, the memorable messages, and the sources and the timing of the memorable messages that were recalled during the comparison process. In addition, significant relationships of association were found between the behaviors, their valence, and the memorable messages associated with the self-assessment of behaviors. Thus, it was possible to examine the comparison process of any of the seven classes of behaviors that were found in terms of the memorable messages that respondents recalled when self-assessing these behaviors.  相似文献   

17.
《Communication monographs》2012,79(4):350-353

This study investigates whether attributions made while observing compliance‐gaining interactions always are a matter of perspective. We propose that Construct Differentiation moderates the effects of perspective on causal judgments, such that highly differentiated individuals are more responsive than less differentiated persons to information from interaction that their psychological perspective makes salient. Participants viewed three videotaped compliance‐gaining interactions, one each while taking the perspective of the message source, the message target, and a third‐party observer. Then they rated causes for the target's actions and the target's intent. As predicted, Construct Differentiation was positively associated with intrapersonal variability in ratings of causal judgments across the three perspectives, and positively associated with actor/observer differences when taking the perspective of message source versus target. Implications for interpersonal communication, constructivism, and attribution theories are discussed.  相似文献   

18.
19.
Abstract This study reports on outcomes of an investigation of visitors' longterm memories of the 1970 Japan World Exposition, Osaka. The paper reports in two parts the emergent outcomes of a study that provides understanding of the nature of visitors' long‐term memories of their experiences in an informal leisure‐time context. First, the paper discusses the common and most dominant recollections that emerged from 48 visitors' memories of this event 34 years ago. An overall explication of visitors' memories of their experiences of the event reveals an interesting mix of reactions: wonderment about the world and the amazing technological advances of the era, blended with personal discomfort and frustrations associated with the memories. These mixed feelings are presented against the backdrop of Japanese national identity re‐emergent on the world stage. Second, an analysis and discussion of qualitative data provides case examples of how three psychological and behavioral factors (affect, agenda fulfillment, and rehearsal) shape the vividness of episodic and/or autobiographical memories of the episodes as they are recalled 34 years later. This paper vividly illustrates the power of qualitative data to illuminate understanding of visitors' long‐term memories and presents some significant issues for museum staff to consider as they plan for visitor experiences that will have lasting impact.  相似文献   

20.
Persons who stutter must conduct their daily lives by interacting with fluent speakers. A majority of fluent speakers, however, are unaware of the communicative behaviors that can increase the frequency and severity of stutterers' dysfluencies. Moreover, extant research is scant regarding the strategies used by fluent speakers to increase interactive satisfaction with persons who stutter. This investigation addresses this void by sharing an empirical study in which stutterers offer the behaviors and strategies which they suggest result in more satisfying communicative interactions among fluent persons and stutterers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号