scholarly journals Identity Asymmetries: An Experimental Investigation of Social Identity and Information Exchange in Multiteam Systems

2020 ◽  
Vol 63 (5) ◽  
pp. 1561-1590 ◽  
Author(s):  
Julija N. Mell ◽  
Leslie A. DeChurch ◽  
Roger Th. A. J. Leenders ◽  
Noshir Contractor
2012 ◽  
Vol 31 (3) ◽  
pp. 125-148 ◽  
Author(s):  
Andrew Reffett ◽  
Billy E. Brewster ◽  
Brian Ballou

SUMMARY Critics of the legal system argue that the use of lay jurors to adjudicate auditor negligence claims results in non-meritorious decisions of auditor liability. Palmrose (2006) therefore proposes that the courts rely on panels of experienced auditors to evaluate the merits of auditor negligence claims and make recommendations to the courts. There is, however, scant evidence to indicate how auditors' and lay evaluators' judgments might differ in cases of alleged auditor negligence. Our study addresses this gap in the literature by providing theory and empirical evidence that elucidates several systematic differences between auditors' and lay evaluators' judgments. Results of an experiment indicate that auditor evaluators are less reliant on plaintiff losses as evidence than lay evaluators, but—consistent with social identity theory—experience greater empathy for auditor defendants. Consequently, auditor evaluators consistently provide lower assessments of auditor liability than lay evaluators, irrespective of audit quality. In addition, results of the experiment indicate that different legally irrelevant inputs primarily determine both auditor and lay evaluators' negligence verdicts—emotional reactions for auditor evaluators and plaintiff losses for lay evaluators. Finally, results are mixed as to whether auditor evaluators' judgments are more sensitive to varying levels of audit quality than lay evaluators' judgments.


2008 ◽  
Vol 37 (4) ◽  
pp. 1293-1308 ◽  
Author(s):  
Werner Güth ◽  
M. Vittoria Levati ◽  
Matteo Ploner

2000 ◽  
Vol 31 (4) ◽  
pp. 191-203 ◽  
Author(s):  
Kelly S. Fielding ◽  
Michael A. Hogg

Summary: A social identity model of effort exertion in groups is presented. In contrast to most traditional research on productivity and performance motivation, the model is assumed to apply to groups of all sizes and nature, and to all membership contingent norms that specify group behaviors and goals. It is proposed that group identification renders behavior group-normative and encourages people to behave in line with group norms. The effect should be strengthened among people who most need consensual identity validation from fellow members, and in intergroup contexts where there is inescapable identity threat from an outgroup. Together these processes should encourage people to exert substantial effort on behalf of their group.


2013 ◽  
Vol 44 (6) ◽  
pp. 361-372 ◽  
Author(s):  
Natascha de Hoog

The underlying process of reactions to social identity threat was examined from a defense motivation perspective. Two studies measured respondents’ social identification, after which they read threatening group information. Study 1 compared positive and negative group information, attributed to an ingroup or outgroup source. Study 2 compared negative and neutral group information to general negative information. It was expected that negative group information would induce defense motivation, which reveals itself in biased information processing and in turn affects the evaluation of the information. High identifiers should pay more attention to, have higher threat perceptions of, more defensive thoughts of, and more negative evaluations of negative group information than positive or neutral group information. Findings generally supported these predictions.


2012 ◽  
Vol 43 (1) ◽  
pp. 41-46 ◽  
Author(s):  
Stefano Pagliaro ◽  
Francesca Romana Alparone ◽  
Maria Giuseppina Pacilli ◽  
Angelica Mucchi-Faina

We examined how members of a low status group react to a social identity threat. We propose that expressing an ambivalent evaluation toward the ingroup may represent a way to manage such a threatening situation. For this study, 131 undergraduates’ identification with Italians was assessed. Participants were divided into groups, according to a situational identity threat (high vs. low). In line with hypotheses, low identifiers expressed more ambivalence toward the ingroup in the high (vs. low) threat condition. The reversed pattern emerged for high identifiers. This effect was mediated by the perception of intragroup variability, a well-known social creativity strategy. Results confirmed our interpretation of ambivalence as a form of social creativity, and are discussed in terms of social identity concerns.


2012 ◽  
Vol 43 (3) ◽  
pp. 115-126 ◽  
Author(s):  
Christina Matschke ◽  
Kai Sassenberg

Entering a new group provides the potential of forming a new social identity. Starting from self-regulation models, we propose that goals (e.g., internal motivation to enter the group), strategies (e.g., approach and avoidance strategies), and events (e.g., the group’s response) affect the development of the social self. In two studies we manipulated the group’s response (acceptance vs. rejection) and assessed internal motivation as well as approach and avoidance strategies. It was expected, and we found, that when newcomers are accepted, their use of approach strategies (but not avoidance strategies) facilitates social identification. In line with self-completion theory, for highly internally motivated individuals approach strategies facilitated social identification even upon rejection. The results underline the active role of newcomers in their social identity development.


2017 ◽  
Vol 16 (1) ◽  
pp. 12-24 ◽  
Author(s):  
Nicole Behringer ◽  
Kai Sassenberg ◽  
Annika Scholl

Abstract. Knowledge exchange via social media is crucial for organizational success. Yet, many employees only read others’ contributions without actively contributing their knowledge. We thus examined predictors of the willingness to contribute knowledge. Applying social identity theory and expectancy theory to knowledge exchange, we investigated the interplay of users’ identification with their organization and perceived usefulness of a social media tool. In two studies, identification facilitated users’ willingness to contribute knowledge – provided that the social media tool seemed useful (vs. not-useful). Interestingly, identification also raised the importance of acquiring knowledge collectively, which could in turn compensate for low usefulness of the tool. Hence, considering both social and media factors is crucial to enhance employees’ willingness to share knowledge via social media.


Author(s):  
Jorge Peña ◽  
Jannath Ghaznavi ◽  
Nicholas Brody ◽  
Rui Prada ◽  
Carlos Martinho ◽  
...  

Abstract. This study explored how group identification, avatar similarity identification, and social presence mediated the effect of character type (avatars or agents) and social identity cues (presence or absence of avatars wearing participants’ school colors) on game enjoyment. Playing with teammate avatars increased enjoyment indirectly by enhancing group identification. In addition, the presence of social identity cues increased enjoyment indirectly by augmenting identification with one’s avatar. Unexpectedly, playing in multiplayer mode in the presence of social identity cues decreased enjoyment, whereas playing in multiplayer mode in the absence of social identity cues increased enjoyment. Social presence was not a reliable mediator. The findings supported media enjoyment and social identity theories, and highlighted how virtual character type and identification processes influence enjoyment.


2002 ◽  
Vol 47 (4) ◽  
pp. 384-386
Author(s):  
Thierry Devos
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document