Embedded Persuasive Strategies to Obtain Visitors’ Data: Comparing Reward and Reciprocity in an Amateur, Knowledge-Based Website
This study compares the relative effectiveness of two different persuasive strategies embedded in the rationale of a website. The visitor is asked for his/her contact information either prior to or after having access to the guidelines for managing multimedia files offered by the site. Asking for personal data prior to access represents a reward strategy for obtaining such data. In contrast, asking for personal data after access represents a reciprocity strategy. In addition, the mediating effect of website features displaying “social proof” (such as visits counter) is explored. The analysis of the amount and type of contact information provided shows that a persuasive strategy based on reciprocity is more effective than one based on reward. Also, the presence of social proof features seems counterproductive when using a reciprocity strategy, while it seems to improve the visitors’ compliance with the request when using a reward strategy. The results are discussed in terms of adequacy of the persuasive strategy to the specific website genre.
Keywordsreciprocity reward persuasion personal information social proof websites
Unable to display preview. Download preview PDF.
- 1.Norman, D.A.: The Psychology of Everyday Things. Basic Books, New York (1988)Google Scholar
- 3.Bourdieu, P.: Outline of a Theory of Practice. Cambridge University Press, Cambridge (1977)Google Scholar
- 4.Fogg, B.J.: Persuasive Technology: Using Computers to Change What We Think and Do. Morgan Kaufmann, San Francisco (2003)Google Scholar
- 5.Baumer, D.L., Earp, J.B., Evers, P.S.: Tit for That in Cyberspace: Consumer and Website Responses to Anarchy in the Market for Personal Information. North Carolina Journal of Law and Technology 4(2), 217–274 (2003), http://www.jolt.unc.edu/vol4I2/pdf/v4I2-baumer.pdf Google Scholar
- 6.Cavusoglu, H., Mishra, B., Raghunathan, S.: The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers. International Journal of Electronic Commerce 9(1), 69 (2004)Google Scholar
- 9.Teo, H.H., Wan, W., Li, L.: Volunteering Personal Information on the Internet: Effects of Reputation, Privacy Initiatives, and Reward on Online Consumer Behavior. In: Teo, H.H. (ed.) Proceedings of the 37th Hawaii International Conference on System Sciences (2004) (retrived on April 5, 2006), http://csdl2.computer.org/comp/proceedings/hicss/2004/2056/07/205670181c.pdf
- 12.Smith, E.R., Mackie, D.M.: Social Psychology. Taylor and Francis, London (2000)Google Scholar
- 17.Cialdini, R.: Influence: Science and Practice. Harper Collins, New York (1993)Google Scholar
- 18.Fogg, B.J., Marshall, J., Kameda, T., Solomon, J., Rangnekar, A., Boyd, J., Brown, B.: Web Credibility Research: A Method for Online Experiments and Early Study Results. In: Proceedings of CHI 2001, Extended Abstracts on Human Factors in Computing, pp. 295–296 (2001)Google Scholar
- 20.Hemetsberger, A.: Fostering Cooperation on the Internet: Social Exchange Processes in Innovative Virtual Consumer Communities. In: Broniarczyk, S.M., Nakamoto, K. (eds.) Advances in Consumer Research, 29th edn., pp. 354–356 (2002)Google Scholar