Line 1: |
Line 1: |
− | == '''Theory Name''' == | + | == '''Elaboration Likelihood Model''' == |
− | Elaboration Likelihood Model
| |
| | | |
| == Acronym == | | == Acronym == |
Line 25: |
Line 24: |
| | | |
| == Diagram/schematic of theory == | | == Diagram/schematic of theory == |
| + | [[File:ELM_GeneralModel.jpg|400px|thumb|left|ELM model]] |
| + | <br style="clear:both" /> |
| | | |
| == Originating author(s) == | | == Originating author(s) == |
Line 32: |
Line 33: |
| | | |
| == Seminal articles == | | == Seminal articles == |
− | *
| + | Eagly, A.H., and Chaiken, S. 1993. The Psychology of Attitudes. Harcourt Brace Jovanovich College Publishers. |
| + | |
| + | Chaiken, S., and Trope, Y. 1999. Dual-Process Theories in Social Psychology. Guilford Press. |
| + | |
| == Originating area == | | == Originating area == |
| Psychology | | Psychology |
Line 40: |
Line 44: |
| | | |
| == Links to WWW sites describing theory == | | == Links to WWW sites describing theory == |
− | Elaboration Likelihood Model - Wikipedia Entry - [http://en.wikipedia.org/wiki/Elaboration_likelihood_model]
| + | Elaboration Likelihood Model - Wikipedia Entry - [http://en.wikipedia.org/wiki/Elaboration_likelihood_model] |
| | | |
| Elaboration Likelihood Model – Psychwiki.com - [http://www.psychwiki.com/wiki/Elaboration_Likelihood_Model] | | Elaboration Likelihood Model – Psychwiki.com - [http://www.psychwiki.com/wiki/Elaboration_Likelihood_Model] |
Line 48: |
Line 52: |
| Elaboration Likelihood Model – video from “The Psych Files” - [http://www.youtube.com/watch?v=VlqUPJ_LCrs] | | Elaboration Likelihood Model – video from “The Psych Files” - [http://www.youtube.com/watch?v=VlqUPJ_LCrs] |
| | | |
| + | == Links from this theory to other theories == |
| + | [[Technology acceptance model]] |
| + | |
| + | [[Theory of planned behavior]] |
| + | |
| + | [[Unified theory of acceptance and use of technology]] |
| | | |
− | == Links from this theory to other theories ==
| |
− | *
| |
| == IS articles that use the theory == | | == IS articles that use the theory == |
− | *
| + | Angst, C. M., and R. Agarwal (2009) "[http://inn.colorado.edu/Details/Paper/6317 Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion]", MIS Quarterly, (33) 2, pp. 339-370. |
| + | |
| + | Bhattacherjee, A., and C. Sanford (2006) "[http://inn.colorado.edu/Details/Paper/6722 Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model]", MIS Quarterly, pp. 805-825. |
| + | |
| + | Cheung, C. M.-Y., C.-L. Sia, and K. K. Kuan (2012) "Is This Review Believable? A Study of Factors Affecting the Credibility of Online Consumer Reviews from an ELM Perspective", Journal of the Association for Information Systems, (13) 8. |
| + | |
| + | Dinev, T. (2014) "Why Would We Care about Privacy?", European Journal of Information Systems, (23) 2, pp. 97-102. |
| + | |
| + | Fui-Hoon Nah, F., and I. Benbasat (2004) "Knowledge-based Support in a Group Decision Making Context: An Expert-Novice Comparison", Journal of the Association for Information Systems, (5) 3. |
| + | |
| + | Jahng, J., H. Jain, and K. Ramamurthy (2007) "Effects of Interaction Richness on Consumer Attitudes and Behavioral Intentions in E-commerce: Some Experimental Results", European Journal of Information Systems, (16) 3, pp. 254-269. |
| + | |
| + | Kim, D., and I. Benbasat (2006) "[http://inn.colorado.edu/Details/Paper/6915 The Effects of Trust-Assuring Arguments on Consumer Trust in Internet Stores: Application of Toulmin's Model of Argumentation]", Information Systems Research, (17) 3, pp. 286-300. |
| + | |
| + | Kim, D., and I. Benbasat (2009) "Trust-Assuring Arguments in B2C E-commerce: Impact of Content, Source, and Price on Trust", Journal of Management Information Systems, (26) 3, pp. 175-206. |
| + | |
| + | Paul Benjamin Lowry, Gregory D. Moody, Anthony Vance, Matthew L. Jensen, Jeffrey L. Jenkins, and Taylor Wells (2012). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1948055 Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers],” Journal of the Association for Information Science and Technology (JASIST), vol. 63(4), pp. 755-766 (doi: http://dx.doi.org/10.1002/asi.21705). |
| + | |
| + | Meservy, T. O., M. L. Jensen, and K. J. Fadel (2013) "Evaluation of Competing Candidate Solutions in Electronic Networks of Practice", Information Systems Research, (25) 1, pp. 15-34. |
| + | |
| + | Sussman, S. W., and W. S. Siegal (2003) "[http://inn.colorado.edu/Details/Paper/6804 Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption]", Information Systems Research, (14) 1, pp. 47-65. |
| + | |
| + | Tam, K. Y., and S. Y. Ho (2005) "[http://inn.colorado.edu/Details/Paper/6821 Web Personalization as a Persuasion Strategy: An Elaboration Likelihood Model Perspective]", Information Systems Research, (16) 3, pp. 271-291. |
| + | |
| + | Zhang, W., and S. A. Watts (2008) "Capitalizing on Content: Information Adoption in Two Online Communities", Journal of the Association for Information Systems, (9) 2. |
| + | |
| == Contributor(s) == | | == Contributor(s) == |
− | *
| + | Jeff Baker |
| + | |
| == Date last updated == | | == Date last updated == |
− | *
| + | May 26, 2014 |
| + | |
| Please feel free to make modifications to this site. In order to do so, you must register. | | Please feel free to make modifications to this site. In order to do so, you must register. |