This manuscript reports three experiments investigating the impact of television programming context on the processing of a fear-appeal message. This is done using a dual-motivation system theory conceptualizing emotion as arising from activation of the appetitive and/or aversive motivational systems. Results show that, as predicted, sad programming activates viewers' aversive motivational systems, whereas comedic programming activates their appetitive motivational systems. Furthermore, by activating these systems through programming context, we were able to predict both retrospective self-report and real-time physiological reactions to a persuasive message employing a fear-appeal strategy. Theoretical and practical implications are discuss...
Mass media investigations on public service announcements (PSAs) have failed to fully examine how af...
A significant focus of behavioral security research has been on understanding employees’ motives for...
Individual users can create vulnerabilities in an organization’s information security by carelessnes...
ABSTRACT: This manuscript reports three experiments investigating the impact of television programmi...
The purpose of this study was to assess how emotions elicited by television programs influence the w...
This paper investigates differences in overtime processing of television messages with three types o...
This paper investigates differences in overtime processing of television messages with three types o...
Thesis (PhD) - Indiana University, Mass Communications/Telecommunications, 2007The goal of this stud...
Thesis (PhD) - Indiana University, Mass Communications/Telecommunications, 2006Video games are becom...
This dissertation deals with the study of fear appeals, i.e. messages in which people are presented ...
The purpose of this study was to assess how emotions elicited by television programs influence the w...
In an experimental design with 213 participants, the impact of an interactive TV public service anno...
In two studies we examined whether people can “catch” the motivations and emotions expressed by anot...
The current research was designed to examine if motivation to engage in exercise can change in respo...
This study examined the effect of moderately repeated exposure (three times) to a fear appeal messag...
Mass media investigations on public service announcements (PSAs) have failed to fully examine how af...
A significant focus of behavioral security research has been on understanding employees’ motives for...
Individual users can create vulnerabilities in an organization’s information security by carelessnes...
ABSTRACT: This manuscript reports three experiments investigating the impact of television programmi...
The purpose of this study was to assess how emotions elicited by television programs influence the w...
This paper investigates differences in overtime processing of television messages with three types o...
This paper investigates differences in overtime processing of television messages with three types o...
Thesis (PhD) - Indiana University, Mass Communications/Telecommunications, 2007The goal of this stud...
Thesis (PhD) - Indiana University, Mass Communications/Telecommunications, 2006Video games are becom...
This dissertation deals with the study of fear appeals, i.e. messages in which people are presented ...
The purpose of this study was to assess how emotions elicited by television programs influence the w...
In an experimental design with 213 participants, the impact of an interactive TV public service anno...
In two studies we examined whether people can “catch” the motivations and emotions expressed by anot...
The current research was designed to examine if motivation to engage in exercise can change in respo...
This study examined the effect of moderately repeated exposure (three times) to a fear appeal messag...
Mass media investigations on public service announcements (PSAs) have failed to fully examine how af...
A significant focus of behavioral security research has been on understanding employees’ motives for...
Individual users can create vulnerabilities in an organization’s information security by carelessnes...