ATTRIBUTION THEORY APPLIED TO INFORMATION TECHNOLOGY or How Attribution Theory can be applied to Rehumanize the Information Age By Sheila Sherlock Chinn Due: December 9, 2002 CIS 703, Dr Bill Remus TABLE OF CONTENTS INTRODUCTION SIGNIFICANCE OF THIS RESEARCH THEORETICAL BACKGROUND OF ATTRIBUTION THEORY Table A: Kelley’s contributions to Attribution Theory: further discrimination between Internal and External Attribution Table B: Weiner’s Causal Dimensions of Attribution broken down by SelfAttribution REGRESSION EQUATION RESEARCH QUESTION PROPOSED HYPOTHESIS EXPERIMENTAL DESIGN TREATMENT VALIDATED MEASURES Attributional Style Questionnaire Causal Dimension Survey Computer Operator Aptitude Computer Related Anxiety DESIGN RANDOMIZATION IN DESIGN EXPECTED FINDINGS RESEARCH CONTRIBUTIONS LIMITATIONS OF THIS RESEARCH CONCLUSION APPENDICES APPENDIX A: Attribution Theory Timeline APPENDIX B: Other Important Names / Contributions to Attribution Theory APPENDIX C: Attribution Theory and the Experimental IT Model APPENDIX D: Prerecorded video instructions APPENDIX E: Task Description APPENDIX F: Experimental Design REFERENCES INTRODUCTION The premise of this document is to describe a theoretically grounded experimental research project in the emerging field of Communication and Information Science. The research undertaken is a result of applying the well-validated psychological theory of Attribution to Information Technology (IT). This document begins with the importance of this research, and then provides and extensive overview of attribution theory as it relates to the field of social psychology. In the theoretical background section, Attribution Theory is explained and elucidated. Following this, the experimental design section explicates the research question, regression equation, hypothesis, design including treatment explanation and elucidation) , process and anticipated analysis and results. Finally, anticipated findings and research contributions round out this report. Theory driven research allows us to predict, describe and express causal relationships. Good theoretical experiments consist of a substantive hypothesis, validated measurement instruments, empirical and expert arguments and conceptual and operational definitions for variables. The expected performance motivates the statistical hypothesis (Ho). Operational definitions should include scales, physical measurements and / or self-reports; however instruments should always be validated. Construct validity and content validity must be equivocally designed and maintained. This experiment applying Attribution Theory to a specific area of Information Technology use has been fastidiously designed to meet these criteria. Attribution is “an individuals understanding of (the) causal structure of the world;(and) it is an important determinant of interaction with that world.”1 Attribution Theory has been defined as “How the social perceiver uses information to arrive at causal explanations for events.” 2 And Attributional Theories are “specific causal attribution processes that people employ in a particular life domain. There are six different traditions at the core of Attribution Theory: Heider’s naïve psychology, Jones & Davis’ correspondent inference, Kelley’s Covariation principle and causal schemas, Schacter’s emotional identity, Bem’s self-perception and Weine's achievement motivation.” 3 1 SOURCE: http://blue.csbs.albany.edu:8000/730/lect4.html SOURCE: http://blue.csbs.albany.edu:8000/730/lect4.html 3 SOURCE: http://blue.csbs.albany.edu:8000/730/lect4.html 2 Attribution theory focuses on the way that individuals explain behavior) others and their own). The study of Attribution is important for psychological and personal reasons. Psychologically, an observers thoughts, feelings, behaviors and attitudes towards another person (actor) depends on what the observer thinks is the cause of the actors behavior. From a personal standpoint, attribution theory can help to inform us of the reasons behind an actor’s action, thus allowing us to surmise of a “true reason” given the actors “reality”. SIGNIFICANCE OF THIS RESEARCH The research design suggested is formative, and before being implemented would be refined to a granularity sufficient to provide scientific formalism and objective data. This research is extremely important; Attribution theory (while partially integrated into Human Computer Interface (HCI) studies) has never been formally applied to information technology. Human-computer interaction is defined as “a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them”.4 Attribution theory focuses on the “human” and views the technology as a tool, whose use is beneficial or damaging, depending upon the human interface. Attribution theory and the new positive psychologies [culminating in the theories of Martin Seligman (Authentic happiness and learned optimism) and William Glasser (Choice theory and Reality Theory)] are contributing to a paradigm shift consistent with individual actualization and self-realization. HCI focuses on the computer and how to best design it for human use. Attribution theory applied to IT focuses on the human, and why they use or fail to use computers. While computing technologies remain ubiquitous, the combined theories emerging from HCI, Agent theory and Social Actor theories serve to remind us that the human factor in computing is indeed important. It is the human actor, not the technology, that determines whether real business productivity gains or looses are realized. 4 http://sigchi.org/cdg/cdg2.html#2_1. The scientific-rational viewpoint, which emerged from Enlightenment schools of thought, has abandoned some fundamental aspects of humanity. “The discovery of labor power – and its subsequent elaboration in political economy, medicine, physiology, psychology and politics – was emblematic of a society that idealized the endless productivity of nature… Work was universalized to include the expenditures of energy…the Promethean power of industry (cosmic, technical and human) could be encompassed in a single productivist metaphysic in which the concept of energy. united with matter, …(transcendental materialism)… was a totaling framework that subordinated all social activities to production.”5 As the industrial age becomes the information age6, individuals further propagate the myth of limited resources, survival of the fittest and the individual as a machine, or a poor equivalent. Until humanity once again can grasp and appreciate humanities advantages over machines; when society stops venerating massproductions’ endlessly similar units and begin to appreciate diversity and actual ingenuity, then people can view machines and computers as tools. At this point, humanity will once again come into it’s own, as the key element within the world, and the determining factor of all things. IT tools are neither inherently good nor bad, but are enablers, which allow us to propagate whatever we choose. Attribution theory is key, because it allows us to focus on the critical factor – the individual and group verses the machine (information technology). Psychology as a science began in the nineteenth century, with the competing schools of structuralism7 and functionalism8. As both schools of thought faded, functionalism left a practical orientation that fostered the development of applied psychology and behaviorism9. Gestalt10 psychology contributed to the emergence of two contemporary psychological perspectives: humanism and cognitive psychology. Freud, Jung and Adler 5 Rabinbach, 1990. Castells, 2000. 7 An early school in psychology concerned with the anatomy or structure of conscious processing; attributed to Wilhelm Wundt. 8 The school of psychology concerned with the fundamental utilities of consciousness. It was out of this school of psychology that applied psychology developed; attributed to William James. 9 Behaviorism is an approach to the study of behavior that assumes it must be possible, in principle, to secure a full, lawful explanation of behavior, including verbal behavior in humans, in terms of present and past behavioral, physiological, and environmental variables, in ways that do not require mention of the mental; attributed to B.F. Skinner. 10 The school of psychology concerned with studying unitary function, such as perceiving, learning, and thinking. The term "gestalt" is most accurately translated as "form" or "configuration." 6 contributed the unconscious. Humanism is a theoretical orientation that emphasizes the unique qualities of humans, especially their freedom and potential for growth. Cognitive Psychology is the study of the mind - how it works. It focuses on mental process that operate on a stimuli, that contributes as whether or not a response is made, when, and what it is. Attribution Theory is steeped in cognitive psychology. In early 1965, Marty Seligman, while studying the relationship between fear and learning, accidentally discovered an unexpected phenomenon while doing experiments on dogs using Pavlovian (classical conditioning). He discovered that a conditioned dog learned inescapability, and when later presented with an escapable condition was unable to enact escape. The theory of learned helplessness started a scientific revolution resulting in the displacement of behaviorism by cognitive psychology. What you are thinking determines your behavior (not only the visible rewards or punishments). The theory of learned helplessness was then extended to human behavior, providing a model for explaining depression, a state characterized by a lack of affect and feeling. Depressed people became that way because they learned to be helpless; they learned that whatever they did, their actions were futile. During the course of their lives, depressed people apparently learned that they have no control. Learned helplessness explained a lot of things, but then researchers began to find exceptions, of people who did not get depressed, even after many bad life experiences. Seligman discovered that a depressed person thought about the bad event in more pessimistic ways than a nondepressed person did. Seligman called this thinking, "explanatory style," borrowing ideas from attribution theory. In today’s ubiquitous computing age, scientists can benefit from applying the principles of cognitive psychology, and for our purposes Attribution Theory, to industry. There has been a vast amount of disparate research (of varying degrees of soundness) on the “Productivity Paradox”. MISQ has devoted many issues to this, and the leading researcher Eric Brynjolfsson at MIT Sloan School of Management concludes that the lack of comprehensive models of the internal organizations of firms is a core deficiency in being able to determine if the productivity paradox exists. HCI does not provide such comprehensive analysis of organizational issues and social psychology. HCI’s fundamental flaw is an inordinate focus on the machine and a totalizing view of the human user (while scientists all know that humans are diverse, dynamic and chameleon like creatures). Human behavior often seems mysterious and unpredictable, until the place where the actions occur is considered. Social Psychology is the branch of psychology concentrating on any and all aspects of human behavior that involve persons and their relationships to other persons, groups, social institutions and to society as a whole. As Lewin's formula, B = ƒ (P, E), maintains, behavior is a function of both the person (P) and the environment (E): the physical characteristics of the place the individual occupies. The person- environment relationship shapes all manner of action, and many disciplines, including environmental psychology, ethnology, human ecology, demography, and ecological psychology, examine the relationship between individuals and the environment Bell, Fisher, Baum, & Green, 1990; Darley & Gilbert, 1985; Stokols & Altman, 1987; Sundstrom, Bell, Busby, & Asmus, 1996). Social Cognition (circa 1970) has a few basic assumptions: (1) that cognitive process general across types of stimuli and (2) that experience is codified and stored in orderly fashion (schemata, knowledge structures, frames or stereotypes). Bias exists because it allows humans to process routine data more efficiently; here individuals base present decisions on past occurrences. This schemata works well in static or slowly changing situations, however it is neither necessarily efficient nor effective in dynamic environments. In 1986, Lewicki uncovered that humans ascribe personality attributes based upon physical attributes. Social Psychology has developed numerous cognitive theories to explain why people act the way they do. Most of them have added to the attribution theory development including Heider's Balance Theory and naïve psychology, Leon Festinger's Cognitive Dissonance, Attributional discounting/augmenting, Fundamental Attribution Error, Seligman’s Theory of Learned Helplessness, Covariation Principle and the Logical Model of Expectation and Attribution. Attribution theory shows us that people do not follow rational rules for the processing of informational behavior. Additionally, cognitive psychology illustrates that our cognitions are inherently biased. Memory research during 1970s and 80s documented memory errors through the tendency to make incoming information consistent with our schemata, because homo sapiens have limited cognitive resources so they compress and abstract incoming data. Additionally, Tversky & Kahneman (1974) found that in an informationally rich world, people adopt simplified strategies (heuristics) for information processing: many of which produce inherent individualized biases and inaccuracies. Furthermore, the availability heuristic models and the commonality with which we are more likely to see those things for which we can find readily available examples (in memory or publicly) but underestimate those less salient in memory. For example, a leading cause of death in the United States is automobile accidents, however almost every adult drives every day without giving it a second thought, while the risk of death from terrorist attack seems potentially large after 9/11. Thus, social psychology, especially theories from social cognition are valuable for internal organizational research. Attribution theory can be used to partially explain the productivity paradox, to describe why some systems fail while others are successful and through better understanding enable us to build better systems. While HCI addresses these issues, this research will focus on a more human-centric approach. THEORETICAL BACKGROUND OF ATTRIBUTION THEORY Attribution theory, originally based in psychology, has been applied to a diverse array of social sciences. Attribution theory in its most common form attempts to describe individual (and groups) causal explanations for events (Martiniko, M.J in The Blackwell Dictionary of Organizational Behavior, N. Nicholson (Ed.), London: Blackwell Publishers.) Attribution theory stems from the work on: dyadic relationships of Fritz Heider (1958), dispositional ascriptions of Edward Jones (1972), relationship dyadics of Keith Davis, personal interdependence and inferential processes by Harold Kelley (1967) and individual differences in casual perceptions by Julian Rotter (1966). Attribution theory is an extension of expectancy Theory and is a theory of perception and motivation. A basic assumption of Attribution Theory is that performance attributions shape future achievement related behaviors. Appendix a represents an Attribution Theory time line, which summarizes the major theories and developments described herein. Attribution theory attempts to describe how we explain (to others) and ourselves the causes of things that happen to us. The classical example is Miller, Brickman and Bolen (1975); in a study, two classrooms of children were given candy before lunch and the amount of candy wrappers on the floor was counted. In class A, positive attribution theory was utilized, the teacher, principal and or other figures of prestige and authority said several times “My what a neat classroom this is, the students must be very neat and clean”. The control classroom did not receive any comments. Candy was handed out again a week later, in classroom A there was a significant decrease in the amount of candy wrappers on the floor: Why? Attribution theory leads us to the assumption that the students had internalized the attribution that they were neat and therefore threw their wrappers in the basket. People generate attributions (explanations) for events to predict and control future events and the attribution that a person makes influences their future behavior. The Miller et al studies had three treatment groups: attribution, persuasion and control; however the only statistical difference found was in the attribution group. Additional studies on external attributions using 3-5 year olds and magic markers had similar results (Lepper, Greene and Nisbett, 1975). Many noteworthy individuals have contributed to attribution theory. Aristotle argued that people seek for meaning in the world. Hume (1739) contended that assuming there are causes for everything that happens is an inherent part of observing the world, because it makes the world more meaningful. We have always sought meaning in life Attribution theory is one way of ascribing meaning. We observe, assume a cause and thus attribute meaning. Thus, attribution is a three step process: (1) perception of the action (we ask why did this happen), (2) judgment of the intention (we imbue meaning), and (3) attribution of disposition (which effects our future actions). The foremost attribution theory expert, Weiner (1985, 1986, 1993) has established that perceptions of individual responsibility are influenced by variables such as freedom of choice, personal controllability, intentionality, foresight and the ability to follow societal norms, rules, and laws (distinguish right from wrong as determined by the society and governing bodies). English Common law justice systems are based on these premises of volitional control, intent, envisioned outcome and controllability (i.e. if a criminal act is intentional, premediditated or an act of passion, insanity or accident). These factors affect the justice system ruling. Allocation of responsibility, controllability and intentionality are not particularly clear-cut, and individuals are many times victims of conjunctural history11, self-delusionary and or intentionally malicious. Perceptions of responsibility are not always directly related to “reality”. From a reality standpoint, the scientific rational-objective viewpoint attempts to describe things as they really are; without the human associations and interpretations, yet this objective viewpoint is hard if not impossible to attain. Group perceptions are complicated by groupthink, mob mentality and a need to ascribe blame and apportion punishment. As soon as we attach emotions, feelings, thoughts, associations, and other human frailties, we change the reality into our perception. Our perception is no longer reflective of the objective reality. To complicate matters, because everyone has their own perceptions, which they view as reality, objective reality ceases to exist (or at least to matter). Einstein's early theory of time and space, Special Relativity, proposed that distance and time are not absolute. The ticking rate of a clock depends on the motion of the observer of that clock; likewise for the length of a "yard stick." “Reality” is also relative, what is perceived by individuals and groups becomes the “reality”. Reality is the actuality of things, what is really happening, without interpretation; Perception is the interpretation of experience. Perceptions can be the cause of misunderstandings, because everyone’s perceptions of a single event may be different and yet we believe they are the same. It is a common human failing to believe that others have the same view as we do; then we base our reality on that misperception and this creates predicaments. Realizing that everyone has different perceptions, and that perception of reality is subjective and to a large extent independent of actuality, would decrease conflicts. Attribution theory, by focusing on analyzing individual and group perceptions, while neither judging nor negating the perceptions, can help us to better understand the world around us. Heider began his seminal Attribution theory work in 1958. He studied how the “common” man attributes causality, and argued that in order to have a complete picture of individuals functioning we need to understand their “naïve psychology” which is 11 The post-modern concept of time is a circular, ever returning time, and history is viewed as conjunctural not linear. We thus imbue interest in the past not to include it in historical linear process but to regain it to the present. (Castells, 1999). motivated by (1) the individuals need to form a coherent understanding of the world and (2) the individuals need to control the environment. A major theme of Heider's Naive psychology is casual attributions, which state that: 1. Explaining one set of relationships allow us to generalize to a basic behavioral principle 2. Belief that we will uncover new causal relationships 3. Seek to maintain an orderly perception of the world. In 1967, Harold Kelley discretized the Internal-External locus of control by defining three constructs consensus information, behavior consistency and behavior distinctiveness. Within the eight possible configurations of these constructs, three become relevant to the distinction between internal and external causality (see Table A). Given that an individual has had particular past experiences and personality based upon genetic and environmental factors, each individual is somewhat unique in attribution, though (as with all scientific disciplines) certain defining categories can be established. Table A: Kelley’s contributions to Attribution Theory: further discrimination between Internal and External Attribution HIGH HIGH Internal External Consensus Information Low High Behavior consistency Low High Behavior distinctiveness High High Dispositional attributions Kelley’s forms of Information The basis of Attribution theory is that individual responsibility is influenced by the variables of (1) free choice, (2) personal controllability, (3) intentionality, (4) foresight and (5) the ability to tell right from wrong. Attribution theory is concerned with individual’s casual explanations for events: how people explain their successes and failures and those of others. Heider’s basic premise that people have an innate need to understand and control (explain) their environment allows us to surmise that individual beliefs about causation influence expectations and their subsequent behavior. Attribution theory evaluates the perceived causes of events and the consequences of those perceptions. It is normally divided into self and other attribution theories. In 1987, Brewin et al derived the non-mutually exclusive functions of attributions as (1) casual analysis, (2) labeling or description, (3) moral evaluation and (4) self-presentation. In 1983, Lord and Smith explicated three categories of attributions: (1) identification of the cause of and event, (2) identification of the response for an event and (3) reference to personal qualities. In general, Attribution theorists agree on the four self-attributions for achievement and that they have three different casual dimensions (as identified and classified by Weiner, 1971). The self-attributions are ability, effort, task difficulty and luck. The causal dimensions which act upon the self-attributions are (1) locus of causality (whether we attribute causality to internal or external forces), (2) stability / instability and (3) globality vs. specificity12. The three dimensions of causality define the critical issue of controllability; whether an individual perceives that the causes are within or outside of their control. The relationship between the attributions and dimensions are identified in the Table B below. Table B: Weiner’s Causal Dimensions of Attribution broken down by Self-Attribution Self attributions for Casual dimensions achievement Locus of causality Stability Controllability Ability Internal Stable Low Effort Internal Unstable High Task difficulty External Stable Low Chance/luck External Unstable Low Thus, according to Weiner (1980) a high achiever will approach rather than avoid tasks related to succeeding, because he13 believes that success is due to high ability and 12 These categories from which The CDS scale are derived are based on Rotter’s (1954) definitions of measures of event attribution: Locus of causality (Internal/External), Stability (Stable/Unstable) and Controllability (High/Low). 13 Throughout this report, we assume the masculine when discussing an individual to avoid the repetitious and verbose use of he/she. No negative insinuations are intended. effort and failure is caused by bad luck or other external forces. Thus, for the high achiever, failure doesn't hurt his self-esteem; yet success builds his pride and confidence. High achievers persist when the work gets hard rather than giving up, because failure is assumed to be caused by a lack of effort, which he can change by trying harder. Additionally, they select challenges of moderate difficulty, because the feedback from those tasks tells him more about how well he is doing, rather than very difficult or very easy tasks, which tell little about ability or effectiveness. The high achiever will also work with a lot of energy because he believes that the results are determined by how hard he tries. For the low achiever, attributions and performance are exactly opposite. The low achiever will avoid success-related chores, because of doubts regarding ability and/or because he assumes success is related to luck or other uncontrollable factors. When successful, the low achiever does not find success as rewarding because he does not feel responsible. Therefore success doesn't increase the low achievers pride or confidence. The low achiever tends to quit when having difficulty because he believes that failure is caused by a lack of ability, which he can't do anything about. Low achievers tend to choose very easy or very hard tasks to work on because the results will not tell anything about performance. Moreover, they work with little drive or enthusiasm because the outcome isn't thought to be related to effort. Other possible performance attributions indicated are: mood, health, strategy, fatigue, controllability, universality vs. specificity and intentionality. Attributions are measured by (1) casual explanations ((actual attributions made by the individual) or casual dimensions (structure underlying the attributions) or (2) attributional style. Research shows that we have an Attitudinal style, constant over time. Events also have attitudinal differences created by differences in time and space. The most commonly utilized measure of Attributions, causal explanations or causal dimensions is derived from Weiner’s 5 underlying causal dimensions of self-attribution: 1. Internal/external locus14 (which is empirically well-supported and has been substantially validated) 2. Stability or change in cause over time (which is empirically wellsupported) 3. Controllability 4. Global/specific (which has been shown to have face validity), and 5. Intentionality or difference between effort and strategy/ability. The Causal Dimension Scale (CDS) measures attribution as a function of the underlying causal dimension. Causal dimensions are task specific and are what success/failure is attributed to. Causal explanations or reasoning is most appropriately assessed by evaluating casual dimensions (which are believed to influence expectancies). There is some variability of scales measuring causal explanation. While most of the scales force a single cause, in reality individuals perceive multiple causes. The CDS scale allows for multiple causes. The dimensions for assessment are likely to change depending upon the domain of interest. The validated test for causal dimensions evaluates the causal dimensions of self-attribution for achievement using the Causal Dimension Scale (CDS) (Russell, 1982; McAuley, et al, 1992). Attribution as a style is individual specific, consistent over the long term (much like a personality trait) and commonly measured by the Attribution Style Questionnaire (ASQ). Attributional style is a construct derived from reformulated theory of learned helplessness. Individual differences refer to systematic ways in which people explain their own successes and failures. Individual differences in Attributional style may be motivational, performance and / or affective reactions to various life experiences. Individuals who attribute failure to internal, stable and global factors are more prone to depression and depression-prone individuals are more likely to attribute success to external, unstable and global factors. Therefore, Attribution style is debilitating as that it permits integration of bad but not good outcomes into the structure of beliefs about the self. There is evidence of Attribution style construct validity, as the relationship between attributions and depression as hypothesized in the reformulated learned helplessness model. Sweeny’s (1986) meta-analysis concluded that Attribution style has convergent 14 Rotter termed this “locus of control” in his social learning theory (1954), however since Weiner added “controllability, the term was changed to Internal/external locus to avoid confusion. and discriminant validity, though it is not totally cross-situationally consistent for predictive validity. Henry, et al (1996) provides direct empirical evidence of the potential impact of attributional style on computer related performance using the Attributional Style Questionnaire (ASQ).15 REGRESSION EQUATION It is expected that individual attributions towards information technology will directly correlate to future IT use success and / or failure. The experimental variables will be as follows. The independent variable of treatment (having a functional vs. dysfunctional PC) will effect the dependent variable of Information technology Attribution (as measured by the Causal dimension scale). Additionally, Covariates of attitude style (as measured by the ASQ), computer operator ability (COA) and computer related anxiety (CRA) will be tested for as direct (primary) and secondary confounding effects16. Thus, the regression equation is: CDS = a 0 + a 1 T + a 2 ASQ + a 3 ASQ*T + a 4 CRA + a 5 CRA*T + a 6 COA + a 7 COA*T In addition, the experiment will statistically control for computer operator ability and attributional style (which is consistent over short periods) so the resultant equation is: CDS = a 0 + a 1 T + a 3 ASQ*T + a 4 CRA + a 5 CRA*T + a 7 COA*T In summary, the experiment expects an individuals attributions to be a function of a specific IT event. RESEARCH QUESTION: PROPOSED HYPOTHESIS This experiment proposes that individual attributions towards information technology directly correlate to future success / failure. Specifically, it proposes to evaluate the causal dimensions of self-attribution for achievement using the Causal Dimension Scale 15 16 Developed by Peterson et al, 1982. We ignore tertiary and quartiary confounding effects. (CDS) (Russell, 1982; McAuley, et al, 1992). And the potential impact of attributional style on computer related performance using the Attributional Style Questionnaire (ASQ). The hypotheses are as follows: H0: Computer attributions (as measured by causal dimension style) are NOT significantly different in the two treatments (normal vs. dysfunctional PC) and the treatment does NOT interact with attribution style, computer anxiety and computer ability. HA: Computer attributions (as measured by causal dimension style) are significantly different in the two treatments (normal vs. dysfunctional PC) and the treatment interacts with attribution style, computer anxiety and computer ability. Each individual has a certain level of computer expertise and a set attribution style (because attribution style has long term stability and is not directly effected by individual events), as well as, some level of computer anxiety (which may or may not be effected by the treatment). The Attribution and IT Model is seen in Appendix B. EXPERIMENTAL DESIGN Subjects are junior level Business majors (MBA students) enrolled in an required MIS course. They should all have adequate knowledge of Excel and some financial background (at least FIN 101). The experiment will require at least 60 students to prove significance (if it exists). On the first day of class students will be told that they have a special assignment in which they will participate and be taped. After the experiment has concluded voluntary consent forms will be required; students who do not wish to sign the consent form will not be included in the study. All students will be asked to complete the measures attributional style, computer operator aptitude and computer related anxiety several weeks before the experiment (in order to avoid sensitization) as well as demographic information. Because we are pretesting, there may be significant difference, however we attempt to avoid sensitization by leaving a few weeks between the pretest and the experiment. It is possible that individuals may do naturally better due to maturation, however since our pretestexperiment interval is only 2-3 weeks, it is not expected that this will occur. It is difficult to generalize from a pretested to a non-pretested group because of the effects of time dependence (maturation), regression (increases) and history and or memory. Several weeks into the course, students will be randomly assigned to either the control or treatment group. The experimental environment consists of multiple small rooms with a single equivalent PC and a TV/VCR combination. Students will enter a room where they will watch prerecorded video instructions. See Appendix C for Pre-recorded video instructions and Appendix D for Task Description During a pilot test the task will be tested. A subject group similar yet distinct from the experimental group will be run through the instructions, task and experiment in order to check for errors or problems. The pilot test will determine the task length and depth, as well as the variation between treatment (functional vs. dysfunctional). The students will be handled individually and students will be randomized. Normal PC treatment will be given on Day 1 of the experiment and Dysfunctional PC treatment will be provided on Day 2 (in order to prevent contamination). Additional contamination measures are that students will be sequestered and paid for a full day. Furthermore, once the student has completed the task he will not be returned to the sample population. If students who participate in Day 1 experiment speak with students who will participate in Day 2 of the experiment, because Day 1 is all functional PCs, the Day 2 students will not be sensitized to dysfunctional PC. The Experimenter will have a live video feed into each room, and the main room will be setup with one monitor for each room, so that all participants will be monitored and taped (for possible adhoc qualitative analysis) from the “control center”. TREATMENT The experimental environment consists of multiple small rooms with a single equivalent PC and a TV/VCR combination. Each PC will be autonomous (not connected to a network, Internet, printer or other peripheral device) and devoid of games, screen savers, extra programs or other distracting features. The PCs will be equivalent in speed, memory, screen appearance and processing power. Each room is likewise similar and unimpressive, painted an unimpressive institutional color and lacking windows, pictures or other personal paraphernalia. Each room contains a simple desk structure on which the PC sits, a chair and a table with a combination TV/VCR. The TV/VCR is arranged to only run the prerecorded instructions. Room temperature is normal, and subjects are made as comfortable as possible within a testing environment. After students exit the test room, they will be asked to sign a consent form. Those who do not wish to sign the consent form will not be included in the study. The students who sign the release form are then required to complete the postests. These pencil and paper tests require approximately 40 minutes, and are outlined in the “Validated Measures” section of this document. The experimental Design is outlined in Appendix F. While computers are beneficial to individuals and society, frequently, users encounter frustrating experiences when using computers. This study will measure, through approximately 60 subjects, the attribution of frustrating experiences as explained by attributional style and causal dimensions. Data shows that the most-cited causes of frustrating computer experiences are error messages, application crashing, long response times, and hard-to-find features. (Ceaparu, I., Lazar, J., Bessiere, K., Robinson, J., and Shneiderman, B. May 2002) Determining Causes and Severity of EndUser Frustration17) For this experiment the treatment will be a dysfunctional PC where dysfunctionality is defined as experimenter manipulated glitches including but not limited to nonresponsiveness, application crashing, going to the wrong applications, long response times and hard-to-find features. These dysfunctionalities will take the experience of a computer programmer to create functionality. The control group will experience “normal” PC (that is a properly functioning PC). While the dysfunctionality may seem unethical to subject the subjects to, ether exists a vast amount of IT organizational literature, which argues that these very failures are normal within the average work environment. In addition, all subjects will be debriefed after, and it will be explained to 17 HCIL-2002-11 , CS-TR-4371 , UMIACS-TR-2002-51 them that some of the PCs were dysfunctional, and that there performance in no way reflected upon the PC performance. VALIDATED MEASURES In a scientific experiment, it is necessary to use validated instruments. Several techniques are available including the modification (substitutions due to changes in domain of interest and or population, addition of more questions.18 Processes are not always a two variable model, they may be multivariate. Additionally, when discretizing a continuous variable, the experiment looses information and the estimate is not as good of a measurement. One looses variance going from continuous to discrete categories. There are many types of experimental variables including intervening variables, intermediary variables, moderating variables and mediating variables. For a full explanation see Kerlinger and Lee, 1992. The types of research are theory driven and problem driven. Theory driven research adds knowledge to a specific field, allows generalizability and the manipulation of causality; problem driven research researches applied phenomena, such as in a survey (field research). Problem driven research has many problems including the loss of control, difficulty in replication and manipulation, inability to prove causality, nongeneralizablity and inability to control extraneous variables. Theory driven research either reapplies theory, augments existing Theory or establishes a conflicting theory resolution (Kuhn). In all research constructs are defined and operationalied. The applicability of theory is argued, the instruments are constructed and empirically validated, modified from validated instruments and/or modified in operationalization. The experiment uses 4 well-validated scales: 1. The Attributional Style Questionnaire ASQ) which measures the potential impact of attributional style on computer related performance (Peterson, et al, 1982). 2. The Causal Dimension Scale which measures the causal dimensions of self-attribution for achievement (Russell, 1982; McAuley, et al, 1992) 18 The “M” factor establish causality through lab experiment with control 3. The Computer Operator Aptitude (COA) Battery which measures 3 skills related to operator performance on Computers, and 4. The Computer Related Anxiety Scale (CRA) developed by Marcoulides in 1989. THE ASQ SCALE ASQ explains an individual’s attritibutional style. There are systematic ways of explaining successes and failures based on the four recognized categories for selfattributions for achievement: ability, effort, task difficulty and luck. Additionally, individuals are subject to their past experiences and the interpretations (attributions) of these experiences. Individual differences refer to systematic ways in which people explain their own successes and failures. There may be motivational, performance and / or affective reactions to various life experiences. Attributional style is a construct derived from reformulated theory of learned helplessness. Attributional style is characterized by locus of causality, stability and controllability; where locus of causality is internal or external; events are viewed as stable or unstable over time; and are said to have a low or high level of individual controllability. Individuals who attribute failure to internal, stable and global factors are more prone to depression and depression-prone individuals are more likely to attribute success to external, unstable and global factors. There is some evidence of Attribution style construct validity. Sweeny’s (1986) meta-analysis concluded that Attribution style has convergent and discriminant validity, though it is not totally cross-situationally consistent for predictive validity. Henry, et al (1996) provides direct empirical evidence of the potential impact of attributional style on computer related performance using the Attributional Style Questionnaire (ASQ) (developed by Peterson et al, 1982.) There is evidence of Attribution style (ASQ) construct validity, convergent validity, discriminant validity and cross-situationally consistency for predictive validity. THE CDS SCALE According to models of Weiner (1986), Abrahmsom (1978) and Martiniko and Gardner (1982) causal dimensions, rather than specific attributional explanations influence expectancies. For example, it is not my belief in my lack of ability as much as it is in my focus on the stability and my inability to change this lacking. In addition, while Attributional style tends to lock an individual into a certain way of thinking (I.e. pessimistic), causal dimensions provide for variability in environments and differing situations. Validated test for causal dimensions evaluate the causal dimensions of selfattribution for achievement. Thus, there exist a variety of scales, most of which force a single cause, while in reality individuals perceive multiple causes. The dimensions for assessment change depending upon the domain of interest. Causal reasoning is most appropriately assessed by evaluating causal dimensions (which are believed to influence expectancies). The validated test for causal dimensions evaluates the causal dimensions of self-attribution for achievement using the Causal Dimension Scale (CDS) (Russell, 1982; McAuley, et al, 1992). This test has been applied in numerous studies and shows construct and content validity across domains. THE COA BATTERY To measure Computer Operator Aptitude (i.e. ability), this experiment will use the well validated Computer Operator Aptitude Battery (COAB). The three subtasks measured: sequence recognition, format checking and logical thinking, relate to the task requirements of simple financial analyses using Excel spread sheet. The COAB has a discriminant reliability of r=0.94 and 0.91 and an internal consistency of r=0.95. Developed by A.J Halloway in 1974, it has been extensively tested. Our experimental task is well tailored to the instrument. In addition, we may perform other computer related performance exams within the pretesting period to more accurately ascertain individual subject’s knowledge of computers and computer skills. Lastly, a scale created by Murphy et al (1989) has been used to measure computer selfefficacy (CSE). The thirty-two item CSE questionnaire appraises the extent to which subjects believe they are successful in their encounters with computers. This test maintains a coefficient alpha of 0.96. THE CRA SCALE Feelings of anxiety toward computers and computer use, is common, affecting 30 to 40% of the population (Tseng, Tiplady, Macleod, Wright, 1997). It has been reported that one third of all college students experience some type of technophobe (DeLoughry, 1993). While IT researchers dispute the depth of this phobia, they content that it is genuine aversion toward computers and computer use. Rosen and Weil (1987) believe that students with this phobia may have done well using card catalogs in the library or blackboards in the classrooms. Yet, with technology moving into these libraries and classroom, and computers ubiquitous, technophobes are struggling (DeLoughry, 1993). Computer anxiety levels have been found to be better predictors of success in using computers that is extent of prior computer experience (Marcoulides, 1988), but computer anxiety scores are not related to amounts of computer experience (Rosen, Sears & Weil, 1987; Marcoulides). Computer experience appears to effect attitudes about computers, rather than computer anxiety (Gressard & Loyd, 1986, Igbaria & Chakrabarti, 1990). Again we must agree that it is paramount to change negative attitudes in order to reduce anxiety. The Computer Related Anxiety (CRA) scale developed by Marcoulides (1989) features 20 items that reflect features of computer anxiety. It has been successfully used to measure computer anxiety and has a reliability coefficient of 0.91. DESIGN The design is a standard pre-test post-test control group randomized experiment. Without a control group, an experiment is forced to measure relative to them (having no baseline) and is subject to maturation and test sensitivity. Regression effects occur when the results move towards the mean due to measurement error. Potential regression for error not a problem unless F=Vb/Ve (inc) shows significant difference in ratio. For a full discussion, refer to Kerlinger. Partition regression problems contribute to the experimenter effect (Hawthorne effect), attribution (mortality) and instrumentation error (non-equivalency). Treatment interactions include confounding threats to internal validity. To overcome these effects, the experimenter attempts to establish equivalence by matching demographics (age, gender) and other possible contaminating variables. Only variables measured are equivalent. Non-quasi-experimental research (such as the experiment explicated within this document) is much more scientifically valid. These research experiments include a control group and randomization. While most things are ephemeral, it is hard to establish long-term effects; as such longitudinal studies also more subject to experimenter bias (sustainability). The proposed Attribution Experiment in Information Technology is non-longitudinal, thus avoids this pitfall. The population size of 60 allows for two treatments groups of 30 each, which should prove valid to establish whether there is a statistical significance or not at the accepted 0.05 level. The experiment can be replicated, thus establishing internal validity (replicatability of results within the same population). If the experiment is non-replicable than it is a scientific artifact, perhaps due to experiment error, bias or confounding factors. External validity (the ability to generalize to other populations) is not inherent within this research, and additional populations would have to be tested in order to achieve sound externally valid results. RANDOMIZATION IN DESIGN Because every experimenter wants the two groups (control and treatment) to be homogeneous with respect to the groups, randomization is necessary within scientific design. Randomization controls for uncontrollable variance (within group variance), and equalizes for variables that might effect the dependent variable. External validity means that an experiment is replicatable (internal) and generalizable. A random sample of substantial size allows results to be generalized to a given population. Randomization takes care of the confounding effects of history, demographic differences, motivations and pre-existing conditions. Randomization does not necessarily control for group attitudes, group dynamics, group norms, subgroups, and individual relationships. It is much more scientifically valid to randomize on the basis of individuals; this allows generalization to populations of individuals. Generally an experimenter can generalize from individuals to groups, but not the reverse. EXPECTED FINDINGS OF THIS EXPERIMENT The dysfunctional PC effects the way individuals perceive the IT event, once we control for computer ability, computer anxiety and attributional style (which is relatively stable over long periods of time). It is expected that the experiment will evidence that attribution theory, with control for the confounding factors of computer anxiety, computer expertise and attribution style is applicable to IT. RESEARCH CONTRIBUTIONS OF THIS EXPERIMENT The application of Attribution Theory to Information technology in general, and ubiquitous business PC functionalities in particular is extremely important. A decade ago, computers were the realms of the “technogeeks”. Today, computers are ubiquitous in society, manufacturing, service sectors, medicine, law and general everyday life. Most individuals have accepted and use electronic banking including purchases of everyday items at grocery stores, drug stores, supermarkets and specialty retailers. Most workplaces have instituted widespread use of Personal computers for all personnel, from administrative individuals to the CEOs and CFOs. Students, at increasingly younger ages, are being required to use computers for word processing, spreadsheet analysis and research. Those of us who are early adopters, those who are enamored of technology and those who have the physical and intellectual means to adopt technologies are at an advantage. Twenty-percent of the world’s population controls over eight-five percent of it’s resources. It is estimated that 3 billion people live on less than $2 a day19. Technophobia is real. The digital divide is real. Everyday, in organizations and institutions around the world, individuals are faced with these issues. The attributions that they make towards technology will affect future rates of adoption and use. While HCI addresses usability, Attribution theory adds a human dimension. Attribution theory tells scientists that not all individuals like and accept technology, regardless of how well it has been designed and implemented. Computer anxiety and negative computer attributions will in part determine the success or failure of the systems of today and tomorrow. Attribution theory allows scientists a venue to evaluate why some systems fail and others succeed, and may allow a partial explanation of the productivity paradox. Within our workplaces, as we expect individual workers to adopt, accept and appreciate technology, we must understand that individual attributions towards technology will reflect upon future adoption and utilization. LIMITATIONS OF THIS RESEARCH Because this is a single experiment within a confined environment and population, there is little generalizability to larger samples and different populations. As discussed earlier in this document, gender, culture and other variables may influence IT Attribution. While the experiment is designed to allow some post hoc analyses (gender, culture, qualitative analysis and possible age), further large-scale studies in different countries and of different populations (students vs. teachers vs. workers vs. managers vs. homemakers, etc.) are required. CONCLUSION The suggested research applies the well-validated psychological theory of Attribution to Information Technology (IT), and, as theory driven research, allows us to predict, describe and express causal relationships. Attribution theory focuses on the way that individuals explain behavior. Attribution Theory applied to IT is extremely important as that it focuses on the “human” and views the technology as a tool, whose use is beneficial or damaging, depending upon the human interface. Attribution theory and the new positive psychologies contribute to a paradigm shift towards individual actualization and self-realization. Attribution theory applied to IT focuses on the human, and why they use or fail to use computers. While computing technologies remain ubiquitous, the combined theories emerging from HCI, Agent theory and Social Actor theories serve to remind us that the human factor in computing is indeed important. Attribution theory is key, because it allows us to focus on the critical factor – the individual and group verses the machine (information technology). In today’s ubiquitous computing age, scientists can benefit from applying the principles of Attribution Theory, to industry. This theory illustrates that people do not follow rational 19 World Health Organization, www.who.org, 2002. rules for the processing of informational behavior and that our cognitions are inherently biased. The experiment utilizes a dysfunctional PC and effects are measured against individual attributions (perceptions) of the IT event. Control is exercised for computer ability, computer anxiety and attributional style. The expected experimental result is that attribution theory, with control for the confounding factors of computer anxiety, computer expertise and attribution style, is applicable to IT. The application of Attribution Theory to Information technology in general, and ubiquitous business PC functionalities in particular is extremely important. A decade ago, computers were the realms of the rich and powerful. Today, computers are ubiquitous in all areas of society and everyday life. Workplaces have instituted widespread use of Personal computers for all personnel and students are required to use computers daily. Yet, everyday, in organizations and institutions around the world, individuals are faced with negative IT attributions. The attributions that they make towards technology affect future rates of adoption and use. Attribution theory tells scientists that not all individuals like and accept technology, regardless of how well it has been designed and implemented. Computer anxiety and negative computer attributions will in part determine the success or failure of the systems of today and tomorrow. Attribution theory allows scientists a venue to evaluate why some systems fail and others succeed, and may allow a partial explanation of the productivity paradox. APPENDIX A Attribution Theory Timeline Jones & Davis Theory of Correspondent Inference: People infer based upon C I s (attribute behaviors underlying dispositions. AND Leon Festinger’s Cognitive Dissonance ~ 1958 1965 Fritz Heider’s Naïve Psychology: People’s beliefs influence their behavior, individuals intuitively construct causal theories of human behavior Harold Kelley combines information consensus, consistency & distinctiveness to explain Internal and external attributions AND Bem, Self perception Theory 1966 1967 Social Learning Theory of Julian Rotter, which integrated learning theory with personality theory: individual differences in causal perceptions Abrason, et al developed ASQ from Seligman’s reformulated learned helplessness model. 1) Locus of causality: I-E 2) Stability of causal explanation (CE) 3) Globality of CE 1972 1978 Jones & Nisbett dispositional ascriptions. Bias to downplay information about the situational causes of behavior: others behavior as less situational determined, ours as more so. Gilbert (1989) Hilton & Slugoski: Abnormal Conditions Model: Consensus information effects primarily internal attributions, distinctiveness info plays a major role in situation attributions & consistency affects attributions to circumstance 1979 1981 Weiner’s Attributional Theory of achievement (I-E locus, stability, controllability, globality & intentionality) 1986 Norman Anderson: judgments are weighted avgs of information. Skowronski & Carlston (89) perceived disgnsoticity & negative amplitude APPENDIX B: Other Important Names / Contributions to Attribution Theory IMPORTANT CONTRIBUTORS • Kelley’s Model of Attribution (I) (1967) • People use logical thought processes to attribute causes of behavior. • Identifies three important factors of attribution: consistency (stability of behavior over time), distinctiveness (uniqueness of behavior to situation) and consensus (stability of individual response too similar / same situations). • Kelley’s Model of Attribution (II) • Individuals take into account all three factors of attribution when making judgements of others. • People pay less attention to consensus information than consistency and distinctiveness. • When people observe someone’s behavior on ONLY ONE occasion, then: • Discounting principle applies: They don’t make a dispositional attribution when the situation requires a particular behavior. • Augmenting principle: They make a dispositional attribution when the behavior does not match the situation. • When distinctiveness and consensus are LOW, attributions tend to be INTERNAL. • When distinctiveness and consensus are HIGH, attributions tend to be EXTERNAL. • Schneider (1973): implicit personality theory. • Nisbett & Wilson (1977): the halo effect (positive characteristics go with positive attributions). • Anderson (1981) weighing information. • Anderson (1981): Information Integration Model: weighing information in order to make attributions. • Skowronski & Carlston (1989): negative information weighs more than positive. • Gilbert (1989): perceivers identify behavior and then assume disposition. OTHER THEORIES • Fundamental Attribution Bias (a.k.a. Fundamental Attribution Error (FAE)): individuals tend to over attribute behavior to dispositional causes and under attribute it to situational causes. In other words, perceivers tend to underestimate the impact of a situation on people’s behaviors and attribute behaviors to personal causes. • Cognitive Motivations such as the Actor observer effect and sequential operations effect. • Motivational Reasons such as The Just World Hypothesis, Ethnocentrism and Gender Bias. • Actor-observer bias: People tend to attribute our own behavior to external factors, and other people’s behavior to internal factors. Also, the tendency for observers to make attributions based upon personality for an actors behaviors and to make circumstantial explanations for their own behaviors. • • • Attributions differ based upon social desirability of action. • Individuals attribute MORE dispositional or internal attributions for their OWN socially desirable behaviors. • Individuals attribute MORE situational or external attributions for their OWN socially undesirable behaviors. Actor and observer have different perspectives (attributions) on behavior, which lead to different explanations. • Actors focus more on situation. • Observers focus more on individual (dispositions). Sequential Operations Theory (Gilbert): Dispositional attributions are made automatically and then (perhaps) corrected for (cognitively). • Correspondent Inference Theory: Is behavior expected, voluntary and repeated? • Salience: We tend to notice the most obvious features of a situation, people rather than environment. • Locality of reference principle: Temporal locality of reference and physical locality of reference take precedence over others. • Covariation Principle: When two things occur together, we tend to assume a causal link between them; and we may overlook other variables (direct or indirect). • False consensus: People see their own behavior as typical, and feel that others will agree with them. • Reinforcing consensus: Individuals tend to interact with people similar to themselves (those who hold similar views) therefore beliefs tend to be “justified” by those around them. • • Motivation: Attributions are affected by other factors such as: • Whether an individual likes or dislikes a person or group. • Stereotypes. • Mood. • Perceived attractiveness. • Relationships. “Just-World” Theory (Melvin Lerner): Individuals believe in a “just and fair” world. This leads to a belief in “justice” (i.e. people get what they deserve). • • Individuals believe that “bad things happen to bad people and good things happen to good people.” • Tendency to blame victims for their plight. • Victim blaming is an example of FAE (attribution of negative life situations with internal factors). • Victim blaming may reduce our own fears (i.e. because we are “good” no such negative consequences will befall us). Perceptual Assimilation Theory (Trope): Individuals have expectations about how others should behave in certain situations and those expectations influence what people perceive. • Self/Other bias: Human beings are inclined to regard others behavior as more stable and predictable than their own. INTERCULTURAL ASPECTS • Intercultural Results are varied in results. • Miller found that Hindu people were more likely than Americans to make external attributions. • Chinese students were found to make attributions similar to American students. • Thomas & Nikora found that ethnocentrism20 within New Zealand groups (Pakeha and Maori) teenagers. GENDER ASPECTS • It is suggested by several studies that women have accepted or internalized their “inferiority” • • Women tend to deny the extent to which they are discriminated against (even when discrimination is obvious) • Women that admit discrimination, tend to ascribe it to other women and not themselves. • Women tend to devalue their own worth (attribute positive factors more to luck/chance than ability and effort). • Women have higher rates of depression and suicide. Gender stereotypes are important in making attributions. • Women’s nurturing behavior is often attributed to biology (internal attribution). • However, nurturing is partially learned, and women may be socialized to be more nurturing (external attribution). • Female “sensitivity and ability to openly express emotions is also attributed to internal attribution (biology and hormones) while it also has an external / socialization factor. • 20 Male violence is attributed to internal factors, while it to may be a socialization issue. The tendency of members of a cultural group to evaluate in-group members more positively than outgroup members. There is a tendency to internally attribute bad outgroup and good in-group behavior and to externally attribute good outgroup and bad in-group behavior. APPENDIX C Attribution and Experimental IT Model Attribution Style (ASQ) Ability Effort Task Difficulty Luck Event Computer Expertise (COA) Attribution, (as measured by CDS) Treatment Computer Anxiety (CRA) Locus of causality Controllability Stability APPENDIX D Prerecorded video instructions One copy, multiple tapes, each student views exactly same instructions. Bland, instructorly individual reads following script from teleprompter: “Hello. You have been chosen to participate in an experiment regarding financial analyses. You have 25 minutes to complete the task. You may or may not have enough time to complete the task, however it is extremely important that you follow these instructions.” (Typed on Screen and read by voice) “Do NOT start until you are told to do so. “Once you begin, you must not exit the room for any reason, or ask for any help from the experimenter.” “STOP when you are told to do so.” (Individual reappears) “You will find that the computer is turned on and is a Normal Windows Operating system with Excel on the desktop. You are expected to know how to use excel; for simple tasks and have been pretested to this effect. You will find a sheet of paper with task instructions on the left side of the PC. Sit down at the PC now, and turn the paper over when you hear the word “Start”.” (Few minutes, screen shows “Sit down and Wait) “START” (Elapsed time 25 minutes) “STOP” Thank you for your participation, please immediately exit the test room, where you will be given further instructions by the experimenter.” APPENDIX E TASK DESCRIPTION A normal financial analysis using the fx Financial Functions will be used. Mean item to completion: 17.5 minutes, allowed time for completion 25 minutes Detailed description of task to be performed, down to what button to push, along with screen shots will be provided. In initial pretesting of task phase, several Excel financial analyses will be tested on totally functional PCs. The task with most completions within the allotted time of 17.5 minutes plus or minus two sigma will be used. This task will be detailed and then a second group will be used to test the direction for clarity, completeness, logic and flow. The last pretest that will be done is a random sample using half functional and half dysfunctional PCs. In this way, the dysfunctionalities of the PCs will be tested and user reactions and perceptions will be recorded. APPENDIX F Experimental Design Pretests: ASQ, CRA, COAB Treatment ~ X Postests: CDS, ASQ, CRA,COAB Ya1 (Normal PC) R X (Dysfunctional PC) Ya2 REFERENCES Abramson, L. , Seligman, M and Teasdale J. (1978). “Learned Helplessness in humans: Critique and Reformulation.” Journal of Abnormal Psychology, 87:4974. Adler, S. (1980). “Self-esteem and causal attributions for job satisfaction and dissatisfaction.” Journal of Applied Psychology, 65:327-332. Alloy, L. Peterson, Abrahmson, L. and Seligman M. (1984) “Attributional Style and the generality of learned helplessness.” Journal of Personality and Social Psychology, 46(3):681-687. Anderson, C, Jennings, D and Arnoult, L. (1988). “Validity and utility of the attributional style construct at a moderate level of specificity.” Journal of Personality and Social Psychology, 55(6):979-990. Anderson, C. (1983). “The causal structure of situations: The generation of plausible causal attributions as a function of type of event situation.” Journal of Experimental Social Psychology, 55(4):876-888. Anderson, J. R. (1985). Cognitive psychology and its implications [Second Edition]. New York: Freeman. Antaki, and Brewin, C (eds). (1982) Attributions and Psychological Change, New York: Academic Press. Baron, L. (May 1993). “Narcissism, interpersonal adjustment, and coping in children of holocaust survivors.” The Journal of Psychology, 127(3), 257-270. Bartlett, F. C. (1932). Remembering. Cambridge, England: Cambridge University Press. Bem, D. (1972). “Self-perception theory.” In L. Berkowitz (Ed.), Advances in experimental social psychology, (Vol. 6). New York: Academic Press. Blashoff, J. A. & Snow, R. (1971). Pygmalion reconsidered. Worthington, OH: Charles A. Jones. Booth-Butterfield, S., et al. (1994). “Simultaneous versus exclusive processing of persuasion arguments and cues.” Communication Quarterly, 42, 21-45. Boruchovitch, E. (1993, August). “Causal attributions for health and illness: A cross-cultural contribution.” Paper presented at the Annual Convention of the American Psychological Association, Toronto, Canada. Boutsen, F. R. (1991). “Single-parent college students' attributions toward academic success.” Psychology in the Schools, 28(4), 360-64. Bozionelos, N. (1997) “Cognitive Spontaneity as a Correlate of Computer Anxiety Towards Computer Use.” Psychological Reports, 80:395-402. Bransford, J. D., & Franks, J. J. (1971). “The abstraction of linguistic ideas.” Cognitive Psychology, 2, 331-350. Brewin, L.R. and Anataki, C. (1987) Journal of Social And Clinical Psychology, 5(1): 79-98 Brown, J.S. and Duguid, P. (2000). The Social Life of Information. Boston: Harvard Business School Press. Brown, S.E. & Vician, C. "An Examination of the Relationship Between Computer Anxiety, Communication Apprehension and Student Experiences With Electronic Mail”, 11 November 1997. Buros: 12th Mental Measurements Yearbook, 1998. Buros: Tests in Print V, 1998. Castells, Manuel. (2000). The Information Age: Economy, Society and Culture: The Network Society Vol. 1, The Power of Identity Vol. 2, The End of Millennium Vol. 3. Malden, MA: Blackwell. Castells, Manuel. (1999). The Informational City. Cambridge Ma: Blackwell. Castells, Manuel. (2001). The Internet Galaxy. New York: Oxford Press. Cattell, R. B., & Dreger, R. M. (Eds.). (1978). Handbook of modern personality theory. New York: Wiley. Cattell, R. B., & Horn, J. L. “A check on the theory of fluid and crystallized intelligence with description of new subtest designs.” Journal of Educational Measurement, 15, 139-164. Cattell, R. B., & Schuerger, J. M. (1978). Personality theory in action: Handbook for the Objective-Analytic Test Kit. Champaign, Illinois: IPAT. Chaiken, S. (1987). “The heuristic model of persuasion.” In M. Zanna, J. Olson, & C. Herman (Eds.) Social influence: The Ontario symposium, Volume 5 (pp. 3-40). Hillsdale, NJ: Erlbaum. Chaiken, S., Liberman, A., & Eagly, A. (1989). “Heuristic and systematic information processing within and beyond the persuasion context.” In J. Uleman & J. Bargh (Eds.), Unintended thought, (pp.212-252). New York: Guilford. Cialdini, R. (1980). Influence: Science and practice, (2nd Ed.). Glenview, IL: Scott, Foresman, & Company. Cofer, C. N. (1976). The structure of human memory. San Francisco: W. H. Freeman. Cooper, J. & Fazio, R.(1984). “A new look at dissonance.” In L. Berkowitz (Ed.), Advances in experimental social psychology, Vol. 17, (pp. 229-266). New York: Academic Press. Cotton, J. (1985). “Cognitive dissonance in selective exposure.” In D. Zillmann & J. Bryant (Eds.), Selective exposure to communication, (pp. 11-33). Hillsdale, NJ: Erlbaum. Covington, M. V., & Beery, R. G. (1976). Self-worth and school learning. New York: Holt, Rinehart and Winston. Deloughry, T.J. (1993) “Two Researchers Say Technophobia May Afflict Millions of Students", The Chronicle of Higher Education (28 April) :A25-A26. Desprels-Frayssee, A. (September, 1993). “Referential set presentation effects on complementation by 6 year olds.” Journal of Genetic Psychology, 154(3) 339346. Down, A.C., & Lyons, P. (1991). “Natural observations of the links between attractiveness and initial legal judgements.” Personality and Social Psychology Bulletin, 17, 541-547. Dreyfus, H. L. (1979). What computers can't do: The limits of artificial intelligence [Revised Edition]. New York: Harper and Row, Harper Colophon. Dreyfus, H. L., & Dreyfus, S. E. (1984). “Putting computers in their proper place: Analysis versus intuition in the classroom.” Teachers College Record, 85(4), 578601. Ebbinghaus, H. (1964). (New York: Teachers College, 1913). Memory [Reprint] (H. A. Ruger & C. E. Bussenius, Trans.). New York: Dover. Ellul, J. (1990). The technological bluff. Grand Rapids, MI: Eerdmans. Fajou, S. "Computer Anxiety", Computer Anxiety, 28 October, 1997. Fazio, R., (1990). “Multiple processes by which attitudes guide behavior: The MODE model as an integrative framework.” In M. Zanna (Ed.) Advances in Experimental Social Psychology, vol 23, (pp. 75-109). San Diego, CA: Academic Press. Fiedler, K. (1995). “Actor-observer bias in close relationships: The role of selfknowledge and self-related language.” Personality and Social Psychology Bulletin, 21(5), 525-38. Forester, John. (1989). Planning in the Face of Power. Berkeley: University of California Press. Fullen, C., & Mills, B. D. (1995, July). “Attribution theory in sport: Problems and solutions.” ERIC microfiche. Garson, B. (1988). The electronic sweatshop: How computers are transforming the office of the future into the factory of the past. New York: Simon and Schuster. Glass, C.R., & Knight, L.A. (1988) “Cognitive Factors in Computer Anxiety, Cognitive Therapy and Research.” 12:351-365. Glasser, William (1989). Choice Theory: A New Psychology of Personal Freedom. New York: Harper. Glasser, William (1999). Reality Theory: A New Approach to Psychiatry. New York: Harper. Gos, M.W. "Computer Anxiety and Computer Experience: A New Look at an Old Relationship.” The Clearinghouse, May-June 1996 69(5) :271-277. Graham, S. And Folkes, V.S. (eds.) (1990). Attribution Theory: Applications to Achievement, Mental Health and Interpersonal Conflict, Hillsdale, N.J.: Erlbaum. Gredler, Margaret E. Learning and Instruction: Theory into Practice, 2nd edition. (New York, N.Y.; Macmillan Publishing Company, 1992). Gressard, C.P. & Loyd, B.H. “The Nature and Correlates of Computer Anxiety in College Students.” Journal of Human Behavior and Learning, 3:28-33. Hakstian, A. R., & Cattell, R. B. (1978). “An examination of interdomain relationships among some ability and personality traits.” Educational and Psychological Measurement, 38, 275-290. Hakstian, A. R., & Cattell, R. B. (1978). “Higher stratum ability structures on a basis of twenty primary abilities.” Journal of Educational Psychology, 70, 657669. Harris, J. & Grandgenett, N. "Writing Apprehension, Computer Anxiety and Telecomputing: a pilot study", 29 September 1997. Heider, F. (1958) The Psychology of Interpersonal Relationships, New York: Wiley. Hinsz, V., & Tomhave, J. (1991). “Smile and (half) the world smiles with you, frown and you frown alone.” Personality and Social Psychology Bulletin, 17, 586592. Hoge, R.D. & Renzulli, J.S. (1994). “Exploring the link between giftedness and self-concept.” Review of Educational Research, 63(4), 449-465. Howard, G.S. & Smith, R.D. “Computer Anxiety in Management: Myth or Reality?” Communications of the ACM 29:611-615. Igbaria, M. & Chakrabarti, A. “Computer Anxiety and Attitudes Towards Microcomputer Use, Behavior and Information Technology.” 9:229-241. Jaspars, J, Finchman, F.D. and Hewstone, M (eds). (1983) Attribution Theory and Research: Conceptual, Developmental and Social Dimensions. New York: Academic Press. Jones, E. E. and Davis, K. E. (1965). "From Acts to Dispositions: The Attribution Process in Person Perception." In L. Berkowitz (ed.), Advances in Experimental Social Psychology, vol. 2, Orlando, FL: Academic Press. Jones, E.E. and Nisbett, R.E.. (1972). The actor and the observer: Divergent perceptions of the causes of behavior in Attribution: Perceiving the causes of Behavior. Jones,E.E., et al (eds) (1971). Attribution: Percieving the causes of Behavior. Morristown, N.J.: General Learning Press. Kelley, H. H. (1967). “Attribution in social psychology.” Nebraska Symposium on Motivation, 15, 192-238. Kelley, H. H. “The processes of causal attribution.” American Psychologist, 73(28): 107-128. Kerlinger, F and Lee, H. (2000). Foundations of Behavioral Research, 4th Edition. United States: Wadsworth. Kintsch, W. (1976).”Memory for prose.” In C. N. Cofer (Ed.), The structure of human memory. San Francisco: W. H. Freeman. Lash, S. Szerwzynski, B and Wynne, B (eds). (2000). Risk, Environment and Modernity: Towards a New Ecology. London: Sage. Lepper, M., Greene, D., & Nisbett, R. “Undermining children's intrinsic interest with extrinsic reward: A test of the "overjustification" hypothesis.” Journal of Personality and Social Psychology, 28, 129-137. Lewis, F. M. and Daltroy, L. H. (1990). "How Causal Explanations Influence Health Behavior: Attribution Theory." In Glanz, K., Lewis, F.M. and Rimer, B.K. (eds.) Health Education and Health Behavior: Theory , Research and Practice. San Francisco, CA: Jossey-Bass Publishers, Inc. Lindsay, P. H., & Norman, D. A. (1977). Human information processing: An introduction to psychology. New York: Academic Press. Loyd, B.H. & Gressard, C.P. (1984) “The Effects of Sex, Age and Computer Experience on Computer Attitudes”, AEDS Journal 40:67-77. Magnusson, J., & Perry, R. P. (1992). “Academic help-seeking in the university setting: The effects of motivational set, attributional style, and help source characteristics.” Research in Higher Education, 33(2), 227-45. Maltby, J. (December 1996). “Attribution style and projection.” Journal of Genetic Psychology, 157(4), 505-507. Margolis, Howard. (1993). Paradigms and Barriers: How Habits of Mind Govern Scientific Beliefs. Chicago: The University of Chicago Press. Marcoulides, G.A. “The Relationship between Computer Anxiety & Computer Achievement”, Journal of Educational Computing Research, 1980(4):151-158. Martiniko, Mark J (ed), Attribution Theory: An Organizational Perspective, St Lucie Press, 1995. Mayer, R. E. (1987). Educational Psychology: A cognitive approach. Boston: Little, Brown. McClure, J. (April 1993). “Discounting attributions and multiple determinants.” The Journal of General Psychology, 120(2), 99-123. McGuire, W. (1964). “Inducing resistance to persuasion: Some contemporary approaches.” In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 1, pp.191-229). New York: Academic Press. McKibben, B. (1992). The age of missing information. New York: Random House. Miller, R., Brickman, P., & Bolen, D. (1975). “Attribution versus persuasion as a means of modifying behavior.” Journal of Personality and Social Psychology, 31, 430-441. Necessary, J.R. & Parish, T.H. "The Relationship between Computer Usage and Computer-Related Attitudes and Behaviors, Education, Spring 1996, v116 n3: 384-387. Neisser, U. (1967). Cognitive psychology. New York: AppletonCentury-Crofts. Neisser, U. (1976). Cognition and reality. San Francisco: W. H. Freeman. Petty, R., & Cacioppo, J. (1986). Communication and persuasion: The central and peripheral routes to attitude change. Springer-Verlag: New York. Pfau, M., & Burgoon, M. (1986). “Inoculation in political campaign communication.” Human Communication Research, 15, 99-111. Pfau, M., Kenski, H., Nitz, M., & Sorenson, J. (1990). “Efficacy of inoculation strategies in promoting resistance to political attack messages: Application to direct mail.” Communication Monographs, 57, 25-43. Piaget, J. (1950). The psychology of intelligence (M. Piercy & D. E. Berlyne, Trans.). London: Routledge and Kegan Paul. Piaget, J., & Inhelder, B. (1973). Memory and intelligence. New York: Basic Books. Postman, N. (1992). Technopoly: The surrender of culture to technology. New York: Knopf. Prochaska, J. & DiClemente, C. (1983). “Stages and processes of self-change in smoking: Toward an integrative model of change.” Journal of Consulting and Clinical Psychology, 51, 390-395. Prochaska, J. (1994). “Strong and weak principles for progressing from precontemplation to action on the basis of twelve problem behaviors.” Health Psychology, 13, 47-51. Rabinbach, Anson, (1990). The Human Motor, Berkeley: University of CA Press. Rifkin, Jeremy. (2000). The Age of Access: The new culture of hypercapitalism. New York: Penguin Putnam. Rosen, L.D., Sears, D.C. & Weil, M.M. (1987) “Computerphobia, Behavior Research Methods, Instruments and Computers,” 19:167-179. Ross, M. and Fletcher, G. J. O. (1985). "Attribution and Social Perception." In G. Lindsey & E. Aronson (eds.), The Handbook of Social Psychology, vol. 2, 73-114. Roszak, T. (1986). The cult of information: The folklore of computers and the true art of thinking. New York: Pantheon Books. Rothman, A., Salovey, P., Turvey, C., & Fishkin, S. (1993). “Attributions of responsibility and persuasion: Increasing mammography utilization among women over 40 with an internally oriented message.” Health Psychology, 12, 3947. Schank, R. C. (1984). The cognitive computer: On language, learning, and artificial intelligence. Reading, MA: Addison-Wesley. Scott, C. (June 1997). “Gender and attribution of control over health and physical size.” Journal of Social Psychology, (137) 387-389. Segalowitz, S. J. (1983). Two sides of the brain: Brain lateralization explored. Englewood Cliffs, NJ: Prentice-Hall. Seligman, M (1991). Learned Optimism. New York: Alfred A Knopf. Seligman, M (2002). Authentic Happiness. New York: Simon & Schuster Audio. Sherif, M., Sherif, K., & Nebergall, R. (1965). Attitude and attitude change: The social judgment-involvement approach. Philadelphia: Saunders. Sherman, S., & Gorkin, L. (1980). “Attitude bolstering when behavior is inconsistent with central attitudes.” Journal of Experimental Social Psychology, 16, 388-403. Shneiderman, Ben. (2002). Leonardo’s Laptop: Human Needs and the New Computing Technologies. Cambridge, MA: The MIT Press. Simonson, M.R., Maaurer, M., Montag-Torard, M., & Whitaker, M. (1987) “Development of a Standardized Test of Computer Literacy and a Computer Anxiety Index,” Journal of Educational Computing Research, 3:231-247. Smith, F. (1988). Insult to intelligence: The bureaucratic invasion of our classrooms. Portsmouth, NH: Heinemann. Snyder, M. (1982). “When believing means doing: Creating links between attitudes and behavior.” In M. Zanna, E. Higgins, & C. Herman (Eds.) Consistency in Social Behavior: The Ontario Symposium, vol 2 (pp. 105-130). Hillsdale, NJ: Lawrence Erlbaum. Speier, C., Morris, M.G., Briggs, G.M. "Attitudes Toward Computers: The Impact of Performance", 11 November 1997. Tseng, H.M., Tiplady, B., Macleod, H., Wright, P. "Computer Anxiety and the Assessment of Mood and Cognitive Function" , 24 November 1997. Urdan, T.C. & Maehr, M.L. (1995). Beyond a two-goal theory of motivation and achievement: A case for social goals. Review of Educational Research, 65(3), 213-243. Wallace, S. R. & Thompson, T. E. (1995, October). “Preservice teachers' changing attributions for elementary students success of failure.” Paper presented at the Annual Meeting of the Mid-West Educational Research Association, Chicago, IL. Weiner B. (1986). An Attribution Theory of Motivation and Emotion. New York: Springer-Verlag. Weiner, B. (1994). “Integrating social and personal theories of achievement striving.” Review of Educational Research, 64(4), 557-573. Weiner, B. (Ed.). (1974). Achievement motivation and attribution theory. Morristown, NJ: General Learning Press. Weiner, B., Frieze, I , Kukla, A., Reed, L, Rest, S. and Rosenblum, R.M. (1971). Perceiving the causes of success and Failure in Attribution: Perceiving the Causes of Behavior. Weizenbaum, J. (1984, June). Another view from MIT. Byte, 9(6), 225. Wessells, M., G. (1990). Computer, self, and society. Englewood Cliffs, NJ: Prentice-Hall. Wiener, N. (1950). The human use of human beings: Cybernetics and society. Boston: Houghton Mifflin. Witkowski, T. (April 1997). “Performance level in situations of helplessness, threat, and group affiliation: egotistic mechanisms in helplessness deficits.” The Journal of Social Psychology, 137(2), 229-235. Wong-On-Wing, Bernard, "User Involvement in Systems Development: An Attributional Approach" Journal of Information Systems, Spring 1988, pp.3-14. Yan, W., & Gaier, E. L. (1994). Causal attributions for college success and failure: An Asian-American comparison. Journal of Cross-Cultural Psychology, 25(1), 146-58. Zelen, S.L. (ed). (1991). New Model: New Extensions of Attribution Theory. New York: Springer-Verlag. Zuboff, S. (1988). In the age of the smart machine: The future of work and power. New York: Basic Books. Zuboff, S and Maxmin, J. (2002). The Support Economy: Why Corporations are Failing Individuals and the Next Episode of Capitalism. New York: Penguin Putnam. WEBSITES, accessed Sept – December 2002. www.afirstlook.com/archive/ attribut.cfm?source=archther www.hsc.usf.edu/~kmbrown/Attribution_Theory_Overview.htm www.unite.ukans.edu/explorer/explorer-db/ html/783751634-447DED81.html www.hbg.psu.edu/faculty/jxr11/glass1sp.html www.alpha1.fmarion.edu/mjord/socpsylectures/attrsocpsy. www.cultsock.ndirect.co.uk/MUHome/ cshtml/perception/percep5. www.as.wvu.edu/~sbb/comm221/chapters/attrib.htm www.awc.cc.az.us/psy/dgershaw/lol/Attribution.html www.blue.csbs.albany.edu:8000/730/lect4.html www.blue.csbs.albany.edu:8000/730/lect4.html www.cba.uri.edu/Scholl/WebTexts/Notes/Attribution.html www.chiron.valdosta.edu/mawhatley/767/attribut.htm www.chadwick.jlmc.iastate.edu/theory/attrib.html www.cognet.mit.edu/MITECS/Articles/ www.ericps.crc.uiuc.edu/naeyctec/current/0002.html www.katz.pitt.edu/wpsd/2002-09.pdf www.mentalhelp.net/psyhelp/chap4/chap4k.htm www.myschoolonline.com/page/ 0,1871,999-126152-1-58860,00.html www.newalbany.tech.purdue.edu/ ols/Courses/252/Chapter03.ppt www.personal.umich.edu/~barbra/attribution.htm www.psych.ucsb.edu/~swinth/teach/social/lecture5.rtf www.psych.ufl.edu/~karney/attribut.html www.psychclassics.yorku.ca/index.htm www.psychology.waikato.ac.nz/LectureNotes/102/102OHP.pdf www.indiana.edu/~lrs/lrs95/cmcdonald95.html www.psynts.dur.ac.uk/notes/Year1/ developmental/soc/SOC2.html www.ship.edu/~ambart/Psy_220/attributionol.htm www.staffs.ac.uk/schools/sciences/psychology/ coursematerials/selves/atthenot.html www.bc.edu/centers/ccc/Media/2002_mbawinner. www.sigchi.org/cdg/cdg2.html#2_1. www.unite.ukans.edu/explorer/explorer-db/ rsrc/783751634-447DED81.2.PDF www.webref.org/psychology/g.htm www.who.org, World Health Organization.
© Copyright 2026 Paperzz