Repeating “Yes” in a First Request and Compliance with a Later Request: the Four Walls Technique

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Repeating “yes” in a First Request and Compliance with a Later Request: the Four Walls Technique

The commitment/consistency principle for compliance implies that people act in ways consistent with their previous behavior. Cialdini and Sagarin (2005) have stated that, according to this principle, asking individuals questions to which they would be expected to say “yes” could be associated with achieving greater compliance with a subsequent request. However, this procedure, referred to as th...

متن کامل

Improving Request Compliance through Robot Affect

This paper describes design and results of a human robot interaction study aimed at determining the extent to which affective robotic behavior can influence participants' compliance with a humanoid robot’s request in the context of a mock up search and rescue setting. The results of the study argue for inclusion of affect into robotic systems, showing that nonverbal expressions of negative mood...

متن کامل

Fund-Raising on the Web: The Effect of an Electronic Door-in-the-Face Technique on Compliance to a Request

In an attempt to test the door-in-the-face (DITF) technique in a computer-mediated context, 1,607 men and women taken at random in various e-mail lists were solicited to visit a web site for the profit of a humanitarian organization. In DITF condition, subjects were first solicited by an exaggerated request and, after refusing, were solicited for a small donation. In control condition the donat...

متن کامل

SSLSARD: A Request Distribution Technique for Distributed SSL Reverse Proxies

—Although Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) are the for transport layer security, their cryptographic operations tend to be highly CPU intensive. Web systems that support SSL/TLS often deploy several locally or globally distributed SSL reverse proxies in front of Web servers to offload SSL/TLS operations from Web servers and improve the execution perfo...

متن کامل

Request-driven GALS Technique for Datapath Architectures

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Zusammenfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . xi

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Social Behavior and Personality: an international journal

سال: 2013

ISSN: 0301-2212

DOI: 10.2224/sbp.2013.41.2.199