SEARCH

SEARCH BY CITATION

References

  • Angell, D., & Heslop, B. (1994). The elements of e-mail style. Reading, MA: Addison-Wesley.
  • Baron, N. S. (2002). Who sets e-mail style? Prescriptivism, coping strategies, and democratizing communication access? The Information Society, 18, 403413.
  • Bunz, U., & Campbell, S. W. (2004). Politeness accommodation in electronic mail. Communication Research Reports, 21(1), 1125.
  • Burgess, A., Jackson, T., & Edwards, J. (2005). Email training significantly reduces e-mail deficiencies. International Journal of Information Management, 25(1), 7183.
  • Cole, J. G., & McCroskey, J. C. (2004). The association of perceived communication apprehension, shyness, and verbal aggression with perceptions of source credibility and affect in organizational and interpersonal contexts. Communication Quarterly, 51, 101110.
  • Colley, A., Todd, Z., Bland, M., Holmes, M., Khanom, N., & Pike, H. (2004). Style and content in e-mails and letters to make and female friends. Journal of Language and Social Psychology, 23(3), 369378.
  • Crowther, G., & Goldhaber, G. (2001). Face-to-face or email: The medium makes a difference. Communication World, 18, 2526.
  • Cunningham, H., & Green, B. (2002). The business style handbook: An A-Z guide to writing on the job. New York: McGraw-Hill.
  • Dennis, A. R. (1996). Information exchange and use in group decision making: You can lead a group to information but you can't make it think. MIS Quarterly, 20, 433457.
  • Dholakia, R. R. (1979). Influencing buyer behavior. European Journal of Marketing, 13(5), 282294.
  • Douglas, K. M., & McGarty, C. (2001). Identifiability and self-presentation: Computer-mediated communication and intergroup interaction. British Journal of Social Psychology, 40, 399416.
  • Ducheneaut, N., & Watts, L. A. (2005). In search of coherence: A review of e-mail research. Human-Computer Interaction, 20, 1148.
  • Farhoomand, A. F., & Drury, D. H. (2002). Managerial information overload. Communications of the ACM, 45, 127131.
  • Fiske, S. T. (1993). Controlling other people, the impact of power on stereotyping. American Psychologist, 48, 621628.
  • Focazio, M. (1997, July). How effective is your email? Getting Results… for the Hands-on Manager, 42(7), 4.
  • Hale, C., & Scanlon, J. (1999). Wired style, rev. ed. New York: Broadway Books.
  • Hall, J. A., Rosip, J. C., LeBeau, L. S., Horgan, T. G., & Carter, J. D., (2006). Attributing the sources of accuracy in unequal-power dyadic communication: Who is better and why? Journal of Experimental Social Psychology, 42, 1827.
  • Hamel, S. A. (2006). Receiver's reactions to dissonant use of communication technology in the workplace: Effects on communication strategies and the perceived usefulness of technology. Unpublished doctoral dissertation, University of Texas at Austin.
  • Harris, M. J., Lightner, R. M., & Manolis, C. (1998). Awareness of power as moderator of expectancy confirmation: Who's the boss around here? Basic and Applied Social Psychology, 20, 220229.
  • Hassini, E. (2006). Student-instructor communication: The role of email. Computers & Education, 47, 2940.
  • Hovland, C. I., Janis, I. L., & Kelley, H. H. (1953). Communication and persuasion, psychological studies of opinion change, New Haven and London: Yale University Press.
  • Huang, A. H. (2002). Email communication and superior subordinate exchange quality: An empirical study. Human Systems Management, 21, 193204.
  • Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there? The antecedents of trust in global virtual teams. Journal of Management Information Systems, 14, 2964.
  • Jarvenpaa, S. L., & Leidner, D. E. (1999). Communication and trust in global virtual teams. Organization Science, 10, 791815.
  • Kim, H., Kim, G. J., Park, H. W., & Rice, R. E. (2007). Configurations of relationships in different media: FtF, email, instant messenger, mobile phone, and SMS. Journal of Computer-Mediated Communication, 12(4). Online at http://jcmc.indiana.edu/vol12/issue4/kim.html.
  • Kirkman, B. L., Rosen, B., Gibson, C. B., Tesluk, P. E., & McPherson, S. O. (2002). Five challenges to virtual team success: Lessons from Sabre, Inc., Academy of Management Executive, 16, 6779.
  • Knoll, K. S., & Jarvanpaa, S. L. (1995). Learning virtual team collaboration. 28th Proceedings Hawaii International Conference on Systems Science, 4, 92101.
  • Lau, T., Wong, Y., Chan, K., & Law, M. (2001). Information technology and the work environment: Does IT change the way people interact at work? Human Systems Management, 20, 267279.
  • Lea, M., & Spears, R. (1991). Computer-mediated communication, deindividuation and group decision-making. International Journal of Man-Machine Studies, 34, 283301.
  • Leathers, D. G. (1998). Impression management training: Conceptualization and application to personal selling. Journal of Applied Communication Research, 16(2), 126145.
  • McCroskey, J. C. (1966). Scales for the measurement of ethos. Speech Monographs, 33, 6572.
  • McCroskey, J. C. (1982). An introduction to rhetorical communication. Englewood Cliffs, New Jersey: Prentice-Hall.
  • McCroskey, J. C. (1997). An introduction to rhetorical communication (7th edition ). Neeham Heights, MA: Allyn & Bacon.
  • McCroskey, J. C. (2006). Reliability and validity of the generalized attitude measure and the generalized belief measure. Communication Quarterly, 54, 265274.
  • McCroskey, J. C. & Jenson, T. A. (1975). Image of mass media news sources. Journal of Broadcasting, 19, 169180.
  • McCroskey, J. C., & Richmond, V. P. (1983). Power in the classroom I: Teacher and student perceptions. Communication Education, 32, 175184.
  • McCroskey, J. C., & Teven J. J. (1999). Goodwill: A reexamination of the construct and its measurement. Communication Monographs, 66, 90103.
  • McCroskey, J. C. & Young, T. J. (1981). Ethos and credibility: The construct and its measurement after three decades. Central States Speech Journal, 32, 2434.
  • Meyerson, D., Weick, K. E., & Kramer, R. M. (1996). Swift trust and temporary groups. In R. M.Kramer & T. R.Tyler (Eds.), Trust in organizations: Frontiers of theory and research (pp. 166195). Thousand Oaks, CA: Sage Publications.
  • Mottet, T. P., Beebe, S. A., Raffeld, P. C., & Pausel, M. L. (2004). The effects of student verbal and nonverbal responses on teachers' liking of students and willingness to comply with student requests. Communication Quarterly, 52, 2738.
  • Petty, R. E., & Cacioppo, J. T. (1986). Communication and persuasion. New York, NY: Springer-Verlag.
  • Pirie, R. (2000). Ask an expert: Email etiquette= e-mail effectiveness. CA Magazine, 133, 11.
  • Postmes, T. (1997). Social influence in computer-mediated groups. Unpublished doctoral dissertation, University of Amsterdam, The Netherlands.
  • Postmes, T., Spears, R., Lea, M. (2000). The formation of group norms in computer-mediated communication. Human Communication Research, 26, 341371.
  • Postmes, T., Spears, R., Lea, M. (1998a). Social identity, group norms, and “deindividuation”: Lesson from computer-mediated communication for social influence in the group. In N.Ellemers, R.Spears, & B.Doosje (Eds.), Social identity: Context, commitment, content. Oxford, UK: Basil Blackwell.
  • Postmes, T., Spears, R., & Lea, M. (1998b). Breaching or building social boundaries? SIDE effects of computer-mediated communication. Communication Research, 25, 689715.
  • Rains, S. A. (2005). What is in a name? Two studies examining the impact of anonymity on perceptions of source credibility and influence. Unpublished doctoral dissertation, University of Texas, Austin, TX.
  • Rideout, V., Roberts, D. F., & Foehr, U. (March, 2005). Generation M: Media in the lives of 8–18 year olds. A Kaiser Family Foundation Study. Online at: http://www.kaiserfamilyfoundation.org/entmedia/7250.cfm.
  • Schade, J. (2004). Did you get my email about checking your voice mail? Developing protocols for internal communications, Public Relations Tactics, 11, 14.
  • Shelby, A. N. (1986). The theoretical bases of persuasion: A critical introduction. Journal of Business Communication, 23(1), 529.
  • Smith, M. F., & Hunt, J. M. (1987). Disconfirmation of expectations: A method for enhancing the effectiveness of customer communications. Journal of Personal Selling & Sales Management, 7(1), 920.
  • Spears, R., & Lea, M. (1992). Social influence and the influence of the ‘social’ in computer-mediated communication. In M.Lea (Ed.), Context of computer-mediated communication (pp. 3065). New York: Harvester Wheatsheaf.
  • Spears, R., Lea, M., & Lee, S. (1990). De-individuation and group polarization in computer-mediated communication. British Journal of Social Psychology, 29, 121134.
  • Turman, P. D., & Schrodt, P. (2006). Student perceptions of teacher power as a function of perceived teacher confirmation. Communication Education, 55, 265279.
  • Turner, J. W., Grube, J. A., Tinsely, C. H., Lee, C., & O’Pell, C. (2006). Exploring the dominant media. How does media use reflect organizational norms and affect performance? Journal of Business Communication , 43, 220250.
  • Wilson, E. V. (2005). Persuasive effects of system features in computer-mediated communication. Journal of Organizational Computing and Electronic Commerce, 15(2), 161184.
  • Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23, 343.
  • Walther, J. B., & Parks, M. R. (2002). Cues filtered out, cues filtered in: Computer-mediated communication and relationships. In M. L.Knapp & J. A.Daly (Eds.), Handbook of Interpersonal Communication (3rd ed. ). Thousand Oaks, CA: Sage.
  • Weber, R. (2004). The grim reaper: The curse of email. MIS Quarterly, 28, iiixiii.