Article

The name remembrance effect: A test of alternative explanations

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The name remembrance effect is the tendency of students to comply more readily with the requests of a professor who remembers (versus does not remember) the students' names. A "complimentary perceptions " explanation for this effect argues that greater compliance is a reciprocal response to receipt of a perceived compliment implied by the act of name remembrance. A "fear of retribution" explanation argues that greater compliance is due to student fear of the consequences of not complying with the requests of a professor who has a powerful memory. The name remembrance effect was found to occur in both public and private compliance conditions, inconsistent with the fear of retribution but consistent with the complimentary perceptions hypothesis. Mediational testing also provided results consistent with the complimentary explanation.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... It is likely that computer users, especially those who seek online substitutes to the physical shopping experience, would value aesthetic designs just like consumers of other commodities (e.g., [13,41]). The interface is the 'facade' [33] of the information system; it is what users experience first and it is what cues users about the inside; it taints the user's perceptions of further interactions with the system. As such, the aesthetics of the interface might be as important as the aesthetics of stores and shopping malls. ...
Article
Buyer-seller interactions have significant social dimensions. Shopping on the Internet is mediated by technological inter-faces, which are thought of as tools that suppress the social nature of the shopping activity. However, Reeves and Nass argue that technological media, such as computers, are 'fun-damentally social and natural'. Thus it is both important and intriguing to understand the social characteristics being pro-jected by the interface or perceived by the Internet shopper. We draw from three domains – theories of social psychology, retail theories and practices, and the concept of computers as social actors – to provide theoretical basis for this thesis. Specifically, we demonstrate our approach by furnishing the-oretical arguments for the need to pay attention to the follow-ing social dimensions in Web-based stores: politeness, flat-tery, self-evaluation and other-evaluation, expertise and aes-thetics.
... This compliant behavior would allow the preservation of an interaction to be considered as a status-enhancing act in itself. Howard, Gengler, and Jain (1995 Jain ( , 1997) have shown to what extent a sign of valuation coming from someone of a higher status resulted in eventual compliance to his/her request. These researchers have shown that, if a teacher were to ask his students for a donation to a local charity, he was more likely to succeed under the following circumstances. ...
Article
Full-text available
Previous studies have shown that touching leads to positive behavior, particularly in an educational context. A new experiment was carried out in which students were encouraged to intervene in a course by demonstrating the solution of a statistical exercise on the blackboard. According to the experiment, students were or were not briefly touched on the forearm by the teacher during the corrective exercise. After that, the teacher asked his students to demonstrate the exercise on the blackboard. The results showed that touching increases the volunteers’ rate. Various explanations (familiarity, status and mood) were suggested to explain such results.
... Impression management through ingratiation is another means by which individuals utilize the liking principle for maximal influence. Research has demonstrated that even subtle forms of ingratiation, such as remembering a person's name (Howard et al. 1995Howard et al. , 1997), can potentially shape that person's response to a request. A great deal of the previous ingratiation research, in large part focusing on the effects of flattery, made use of an experimental paradigm in which targets' and observers' judgments of the ingratiator could be compared (Gordon 1996, Vonk 2002). ...
Article
Full-text available
This review covers recent developments in the social influence literature, focusing primarily on compliance and conformity research published between 1997 and 2002. The principles and processes underlying a target's susceptibility to outside influences are considered in light of three goals fundamental to rewarding human functioning. Specifically, targets are motivated to form accurate perceptions of reality and react accordingly, to develop and preserve meaningful social relationships, and to maintain a favorable self-concept. Consistent with the current movement in compliance and conformity research, this review emphasizes the ways in which these goals interact with external forces to engender social influence processes that are subtle, indirect, and outside of awareness.
Thesis
Full-text available
(DOKTORA TEZİ) DİJİTAL OYUN YAPISI VE Z KUŞAĞININ OYNAMA PRATİKLERİ PhD Thesis
Article
Full-text available
Social-Engineering ist eine Angriffsstrategie, die nicht die Technik als Opfer auserkorenhat. Stattdessen wird hier viel lieber – und vor allem effizienter – der Mensch, bzw.sein Verhalten angegriffen. Dieser Artikel zeigt, wie Social-Engineering funktioniert underklärt die zugrundeliegenden Tricks anhand sozialpsychologischer Studien und Experimente.Außerdem werden Beispiele, Warnsignale und Gegenmaßnahmen vorgestellt.Er richtet sich an Sicherheitsverantwortliche und Systemadministratoren, die verstehenwollen, wie Social-Engineering funktioniert und dieses Wissen in ihre Sicherheitsmaßnahmenintegrieren wollen.
Book
Full-text available
The book groups social influence techniques according to a common characteristic: for instance, early chapters describe "sequential" techniques, and techniques involving egotistic mechanisms, such as using the name of one’s interlocutor. Later chapters present techniques based on gestures and facial movements, and others based on the use of specific words, re-examining on the way whether "please" really is a magic word. In every case, author Dariusz Dolinski discusses the existing experimental studies exploring their effectiveness, and how that effectiveness is enhanced or reduced under certain conditions. The book draws on historical material as well as the most up-to-date research, and unpicks the methodological and theoretical controversies involved. The ideal introduction for psychology graduates and undergraduates studying social influence and persuasion, Techniques of Social Influence will also appeal to scholars and students in neighbouring disciplines, as well as interested marketing professionals and practitioners in related fields.
Article
Friends-they are generous and cooperative with each other in ways that appear to defy standard evolutionary expectations, frequently sacrificing for one another without concern for past behaviors or future consequences. In this fascinating multidisciplinary study, Daniel J. Hruschka synthesizes an array of cross-cultural, experimental, and ethnographic data to understand the broad meaning of friendship, how it develops, how it interfaces with kinship and romantic relationships, and how it differs from place to place. Hruschka argues that friendship is a special form of reciprocal altruism based not on tit-for-tat accounting or forward-looking rationality, but rather on mutual goodwill that is built up along the way in human relationships.
Article
Social-Engineering ist eine Angriffsstrategie, die nicht die Technik als Opfer auserkoren hat. Stattdessen wird hier viel lieber – und vor allem effizienter – der Mensch, bzw. sein Verhalten angegriffen. Dieser Artikel zeigt, wie Social-Engineering funktioniert und erklärt die zugrundeliegenden Tricks anhand sozialpsychologischer Studien und Expe- rimente. Außerdem werden Beispiele, Warnsignale und Gegenmaßnahmen vorgestellt. Er richtet sich an Sicherheitsverantwortliche und Systemadministratoren, die verstehen wollen, wie Social-Engineering funktioniert und dieses Wissen in ihre Sicherheitsmaßnah- men integrieren wollen.
Article
Parental involvement in children’s school activities is beneficial for children’s academic and social competence. However, parental involvement tends to decrease as children become older and it is therefore important to promote parental involvement at the secondary level, especially in middle schools. Frequent, positive home–school communications have been found to promote parental participation in children’s educational activities and parental perceptions of invitations for participation in school activities are positively associated with parental involvement. Consequently, the differential effect of three types of invitations (i.e., general school invitation, an additional specific teacher invitation, and an additional specific child invitation) on parents’ attendance at a special science event held at their child’s school was studied in three middle schools. Results from multilevel logistic regression analysis showed the additional specific teacher invitation to be a better predictor of parental attendance when compared to the additional child invitation and general invitation only. Parents who agreed to attend were shown to be about 14 times more likely to actually attend. Student grade level had no effect on parent attendance. Limitations and implications for schools also were presented.
Article
Names are important. Being remembered by name is universally appreciated and associated with respect. Thus, correct use of names and titles can be extremely advantageous in relationships. This is particularly true in the health care setting.
Article
Full-text available
Attempted to replicate and extend the study by M. Deutsch and L. Solomon (see record 1960-04179-001) which found that Ss who fail at a task rate negative (consistent) evaluations higher than positive (inconsistent) ones, and Ss who succeed at a task rate positive reactions from an evaluator higher than negative ones. 133 undergraduates were induced to believe that they failed or succeeded in an ambiguous ego-involving task. A control group was left uncertain as to how they performed. Ss then were evaluated by a note from a stooge. The Deutsch and Solomon results were not replicated. Contrary to consistency theory predictions, all Ss favored positive to negative evaluations, and Ss who failed at the experimental task were more appreciative of the positive feedback than were those who succeded. An alternative theoretical explanation for the results is considered. (23 ref.) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Full-text available
Presents contradictory research findings of learning theorists, clinicians, and dissonance theorists concerning the relationship of self-esteem to interpersonal attraction and receptivity to affection. An alternative explanation is proposed and tested, based on the assumption that low self-esteem individuals are unusually receptive to affection when they realize that it is being offered, but that it is most difficult for them to recognize affectionate overtures. A laboratory experiment with 151 male undergraduates provides support for this integration. (23 ref.) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Consistency and self-esteem theories make contrasting predictions about the relationship between a person's self-evaluation and his liking for an evaluator. When approval is given for a trait different from one on which the target has a clear self-evaluation, consistency theory does not logically apply, and self-esteem effects are predicted. When approval is given for a trait on which self-evaluation is clear, consistency needs are expected to influence the target's response. A laboratory experiment confirmed these predictions, and it was argued that reconciliation of the two theories is possible by careful articulation of the situations to which each applies.