Linguistic style accommodation between conversationalists is associated with positive social outcomes. We examine social power and personality as factors driving the occurrence of linguistic style accommodation, and the social outcomes of accommodation. Social power was manipulated to create 144 face‐to‐face dyadic interactions between individuals of high versus low power and 64 neutral power interactions. Particular configurations of personality traits (high self‐monitoring, Machiavellianism and leadership, and low self‐consciousness, impression management and agreeableness), combined with a low‐power role, led to an increased likelihood of linguistic style accommodation. Further, greater accommodation by low‐power individuals positively influenced perceptions of subjective rapport and attractiveness. We propose individual differences interact with social context to influence the conditions under which nonconscious communication accommodation occurs.
Communication accommodation theory predicts that social power plays an important role in influencing communicative behaviors. Previous research suggests these effects extend to linguistic style, thought to be a non-conscious aspect of communication. Here, we explore if these effects hold when individuals converse using a medium limited in personal cues, computer-mediated-communication (CMC). We manipulated social power in instant messaging conversations and measured subsequent interpersonal impressions. Low power induced greater likelihood of linguistic style accommodation, across between-(Study 1) and within-subjects (Study 2) experiments. Accommodation by those in a low power role had no impact on impressions formed by their partner. In contrast, linguistic style accommodation by individuals in a high-power role was associated with negative interpersonal impressions formed by their lower power partner. The results show robust effects of power in shaping language use across CMC. Further, the interpersonal effects of linguistic accommodation depend upon the conversational norms of the social context.
Disclaimer UWE has obtained warranties from all depositors as to their title in the material deposited and as to their right to deposit such material. UWE makes no representation or warranties of commercial utility, title, or fitness for a particular purpose or any other warranty, express or implied in respect of any material deposited. UWE makes no representation that the use of the materials will not infringe any patent, copyright, trademark or other property or proprietary rights. UWE accepts no liability for any infringement of intellectual property rights in any material deposited but will remove such material from public view pending investigation in the event of an allegation of any such infringement. PLEASE SCROLL DOWN FOR TEXT. EFFECTS OF SOCIAL DISCLOSURE EFFECTS OF SOCIAL DISCLOSURE 2 AbstractThe intensity of negative emotions associated with event memories fades to a greater extent over time than positive emotions (Fading Affect Bias or FAB). In this study, we examine how the presence and behaviour of a listener during social disclosure influences the FAB and the linguistic characteristics of event narratives. Participants recalled pleasant and unpleasant events and rated each event for its emotional intensity. Recalled events were then allocated to one of three experimental conditions: no disclosure, private verbal disclosure without a listener, or social disclosure to another participant whose behaviour was experimentally manipulated. Participants again rated the emotional intensity of the events immediately after these manipulations and after a one week delay. Verbal disclosure alone was not sufficient to enhance the FAB. However, social disclosure increased positive emotional intensity, regardless of the behaviour of the listener. Whilst talking to an interactive listener led unpleasant event memories to decrease in emotional intensity, talking to a non-responsive listener increased their negative emotional intensity. Further, listener behaviour influenced the extent of emotional expression in written event narratives. This study provides original evidence that listener behaviour during social disclosure is an important factor in the effects of social disclosure in the FAB.
Given the increasingly young age that children are using technology and accessing the internet and its associated risks, it is important we understand how families manage and negotiate cyber-security within the home. We conducted an exploratory qualitative study with thirteen families (14 parents and 19 children) in the southwest of the United Kingdom about their main cyber-security concerns and management strategies. Thematic analysis of the results revealed that families were concerned about cyberbullying, online stranger danger, privacy, content, financial scams, and technical threats. Both parents and children drew on family, friends and trusted others as resources, and used a variety of strategies to manage these threats including rules and boundaries around technology, using protective functions of technology, communication and education around safety. There were tensions between parents and children over boundaries, potentially putting families at risk if children break household rules around cyber-security. Finally, parents expressed the feeling they were in a 'whole new world' of cyber-security threats, and that positive and negative aspects of technology must be constantly balanced. However, parents also felt that the challenges in managing family security are the same ones that have always faced parents-it is just that the context is now digital as well as physical.
Summary Local authorities have been seen as an important agent in the development of more sustainable economies. This paper explores the level and form of ‘greening’ taking place amongst local authorities in the Midland region of the UK. Particular attention is paid to intra‐regional variations in environmental policy‐making.
Strategic word mimicry during negotiations facilitates better outcomes. We explore mimicry of specific word categories and perceptions of rapport, trust, and liking as underlying mechanisms. Dyads took part in an online negotiation exercise in which word mimicry was manipulated: Participants were instructed to mimic each other’s words (both‐mimic), one participant mimicked the other (half‐mimic), or neither participant mimicked (neither‐mimic). When given a simple instruction to mimic their partner, participants mimicked both the style (personal pronouns, adverbs, linguistic style, interrogative terms) and the content (affiliation terms, power terms, and assents) of their partner’s messages. Mimicry was associated with greater joint and individual points gain and perceptions of rapport from the mimicked partner. Further, mimicry of interrogative terms (e.g., how, why) mediated positive effects of mimicry upon negotiation outcomes, suggesting the coordination of question asking between negotiators is an important strategy to create beneficial interactions and add value in negotiations.
People experience and understand cyber security differently. Our ongoing work aims to address the fundamental challenge of how we can understand a diverse range of cyber security experiences, attitudes and behaviours in order to design better, more effective cyber security services and educational materials. In this paper, we take a lifespan approach to study the language of cyber security across three main life stages -young people, working age, and older people. By applying text feature extraction and analysis techniques to lists of cyber security features generated by each age group, we
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.