版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
CHAPTER8InfluenceTheTitlesTwoRoutestoInfluence:AnOrganizingModel?TheCentralRoutestoInfluence:TheMessageandItsDeliveryPeripheralRoutestoInfluenceTheRoleofReceivers—TargetsofInfluenceChapterSummary1.TwoRoutestoInfluence:AnOrganizingModelAnalternativewayisbasedonamorecontemporaryunderstandingofhowpersuasionworks.ThisapproachdevelopedinastreamofresearchbyRichardPrettyandJohnCacioppo,suggeststhattherearetwogeneralpathsbywhichpeoplearepersuaded.Thefirstoneoccursconsciouslyandinvolvesintegratingthemessageintotheindividual’spreviouslyexistingcognitivestructures.Thesecondroutetopersuasion,theperipheralroute,ischaracterizedbysubtlecuesandcontext,withlesscognitiveprocessingofmessage.2.TheCentralRoutestoInfluence:TheMessageandItsDeliveryFactsandideasareclearlyimportantinchanginganotherperson’sopinionsandperceptions,buttheeffectivenessofpersuasioneffortdependsonhowthefactsandideasareselected,organized,andpresented.Therearethreemajorissuestoconsiderwhenconstructingamessage:thecontentofthemessage,thestructureofthemessage,andthedeliverystyle.2.1MessageContent-1(1)MaketheOfferAttractivetotheOtherParty
Negotiatorsshouldemphasizetheadvantagetheotherpartygainsfromacceptingtheproposal.
Thebetternegotiatorunderstandstheother’srealneedsandconcerns,themorehecananticipatetheother’sobjectionsandstructurethepresentationtocounteractthem.(2)FrametheMessageSotheOtherPartywillSay“Yes”
Ifyoucangettheotherpartytoagreetosomething—almostanything—thenyouhavelaidthefoundationforsubsequentagreements.2.1MessageContent-2(3)MaketheMessageNormative
Peoplearemotivatedtobehaveconsistentlywiththeirvalues,thatis,theirreligious,social,orethicalstandards.
Theotherpersonthatbyfollowingacourseofaction,shewillbeactinginaccordancebothwithhervaluesandwithsomehighercodeofconduct.(4)Suggestan“AgreementinPrinciple”
Principlessoundgood,andmostpeoplemayagreewithwhattheyadvocate,butthereisusuallygreatuncertaintyabouthowaprincipleappliestoaspecificsituation.2.2MessageStructure-1(1)One-andTwo-SidedMessages
Onesideapproach:manypeopledealwiththisproblembyignoringargumentandopinionsthatmightsupporttheotherparty’sposition.Twosideapproach:ignoringthecompetitionistomentionanddescribetheopposingpointofview,andthenshowhowandwhyitislessdesirablethanthepresenter’spointofview.(2)MessageComponentNegotiatorscanhelptheotherpartyunderstandandaccepttheirargumentbybreakingthemintosmaller,moreunderstandablepieces.(Fisher,1964;Ikle,1964)2.2MessageStructure-2(3)RepetitionRepetitionencouragescentral-routeprocessingandthusenhancesthelikelihoodthatthemessageswillbeunderstood.However,repeatingapointiseffectiveonlyforthefirstfewtimes.
(4)ConclusionsIngeneral,donotassumethatgivenasetoffactsorarguments,theotherpartywillreachthesameconclusionyouwouldreach;drawexplicitconclusionsforlistenerstoensurethattheyhaveunderstoodtheargumentcompletely.2.2PersuasiveStyle:HowtoPitchtheMessage-1(1)EncourageActiveParticipation
Negotiatorswhocanusactiveapproachesaregenerallymorepersuasivethanthosewhodon’tbecauseanactiveapproachrequiresthereceivertoexerteffort,whichleadstoattitudechange.(2)UseVividLanguageandMetaphors
Thevividnessandintensityoflanguagesnegotiatorsusehaveamajoreffectontheirpersuasiveness.Theintensityoflanguagecanalsobeincreasedthroughtheuseoffcolorfulmetaphors,swearwords,orachanginginintonation—fromquitetoloudorloudtoquite.2.2PersuasiveStyle:HowtoPitchtheMessage-2(3)InciteFears
Inessence,threatsareif-thenstatementswithseriousnegativeconsequencesattached:“IfyoudoX,ThenIwillforcedtodoY”.Infact,Threatsareprobablyusedlessfrequentlythanonemightexpect,forseveralreasons.Fear-arousingmessagesmaybesentwithoutissuingthreats.
2.2PersuasiveStyle:HowtoPitchtheMessage-3(4)ViolatetheReceiver’sExpectations
Peoplewhoarguepositionsthatarethoughttobecountertotheirself-interestaregenerallymorepersuasivebecausetheyviolatethereceiver’sexpectationaboutwhatthesendershouldbeadvocating.Anotherwaythatreceivers’expectationscanbeviolatedoccurswhentheyexpectedonestyleofdeliveryfromthespeakerandthenexperienceaverydifferentstyle.Moregenerally,Barryproposedamodelofinfluencethatrevolvesaroundviolatingexpectationsofinfluencetargetsasawaytoincreaseone’seffectivenessasaninfluencer.2.4SectionSummaryInsummary,negotiatorsneedtotakecarewhentheyconstructamessagetopersuadeanotherpartytotheirpointofview.Aspectsofthemessagecontent,messagestructure,anddeliverystylecanallinfluencetheextenttowhichamessagesispersuasive.Whenmessagesarewellcraftedandinfluencedoessuccessfullyoccurthroughthe“centralroute”,thechangeinthetarget’sattitudesismorelikelytobelonglastingandresistantcounterinfluence.3.PeripheralRoutestoInfluenceInthissectionwewillconsiderwaysthatapersoncaninfluenceothersthroughthe“peripheral”route.Insuchcases,thereceiverattendslesstothesubstanceofpersuasiveargumentsandisinsteadsusceptibletomore“automatic”influencethroughsubtlecues.Ourdiscussionofperipheralroutestoinfluencewillconsiderthreesetsofstrategies:messageaspects,attributesofthepersuader,andelementsoftheinfluencecontext.3.1AspectsofMessagesThatFosterPeripheralInfluenceMessageorder
Donotplacetheimportantpointinthemiddleofthemessage(Bettinghaus,1966).Primacyeffect&RecencyeffectFormat
Onewaythatachoiceofmessageformatcaninduceperipheralinfluenceisifitelicitsasnapjudgmentregardingthelegitimacyofargument.
Distractions
Distractionapparentlyabsorbtheeffortthattheotherpartynormallywouldputintobuildingcounterarguments.3.2SourceCharacteristicsThatForsterPeripheralInfluenceWhentherecipientsofapersuasivemessageareunmotivatedorunabletoattendcloselytothesubstanceofthepersuasiveappeal,theybecomevulnerabletosourceeffect.Awidevarietyofsourceeffectscanpotentiallyhaveaneffectontherecipientofapersuasivemessage.Wegroupthemhereintothreebroadcategories:Credibility,Attractiveness,andAuthoritySourceCredibilitySourcecredibilitydependsmostlyonthreethings:thequalificationsofsources,theperceivedtrustworthinessofsource,andself-presentation.Manyotherfactorscontributetosourcecredibility.(1)PersonalReputationforIntegrity(2)“Benefit-of-the-Doubt”FirstImpression(3)IntensiontoPersuade(4)UseorMinimizeStatusDifferences(5)AppearanceandSelf-Presentation(6)Associates(7)PerceivedExpertise(8)PersistenceandTenacityPersonalAttractivenessSomewaysthatanindividualcanenhancehispersonalattractivenesstoatargetofinfluenceoranegotiatingopponent:(1)Friendliness(2)Ingratiation(3)Likeability(4)HelpingtheOtherParty(5)PerceivedSimilarity(6)EmotionAuthority
Theprincipleofauthorityisquitesimple:Peoplewithauthorityhavemoreinfluencethanthosewithoutauthority.Classicstudiesofobediencetoauthoritysuggestthatpeoplewillgotogreatlengthswhentheirbehaviorislegitimizedbyanauthorityfigure.Esteemwithwhichsometitles(orpositions)areheldinsociety.Authoritycantakedifferentformsandyielddifferentoutcomes.3.3AspectsofContextThatFosterPeripheralInfluence-1Reciprocity
Thisnormsuggeststhatwhenyoureceivesomethingfromanotherperson,youshouldrespondinfuturewithafavorinreturn.Thenormofreciprocityplaysanimportantroleinnegotiation.Negotiatorsgiveconcessionsandexpectconcessionsinreturn.Commitment
Oncepeoplehavedecidedsomething,theycanberemarkablypersistentintheirbeliefs,thisprocesshasbeenlabeledcommitmenttoaposition,anditreliesheavilyonthecommonneedthatpeoplehavetoappearconsistent,bothtothemselvesandothers.3.3AspectsofContextThatFosterPeripheralInfluence-2SocialProof
Theprincipleofsocialproofsuggeststhatpeoplelooktootherstodeterminethecorrectresponseinmanysituations,andoftenbehaveincertainwaysbecauseeveryoneelseisdoingso.Theprincipleofsocialproofworksbecausequestionableinformationisgivenweightindecisions.Scarcity
Theprincipleofscarcitysuggeststhatwhenthatwhenthingsarelessavailable,theywillhavemoreinfluence.Innegotiations,thescarcityinfluencestrategymaybeoperatingwheneverthereappearstobeagreatdemandforaproduct.
3.3AspectsofContextThatFosterPeripheralInfluence-3UseofRewardandPunishment
Theseresourcescanbeusedinatleasttwomajorways.(1)negotiatorcanuseexchange—theprocessofofferingresourcesoffavorstosecuretheother’scomplianceandcooperation.(2)negotiatorsattempttousethispoweristhroughpressure—thatis,bythethreatofpunishment.Pressuretacticsproduce,atbest,short-termcompliancewithrequest,buttheyalsoarelikelytoelicitresistancefromtheotherparty.3.4SectionSummaryInthissection,weexaminedseveralwaysthatpersuaderscanusetheperipheralroutetoachieveinfluence.Wediscussedfactorsrelatedtothemessageitself,characteristicsofthemessagesource,andaspectsoftheinfluencecontextthatcanresultininfluence.Influencetargetsareparticularlysusceptibletoperipheralformsofinfluencetotheextentthattheyareunmotivatedand/orunabletopaycarefulattentiontotheargumentativesubstanceoftheinfluence-seeker’smessage.4.TheRoleofReceivers—TargetsofInfluenceJustasnegotiators-as-message-senderscanworktoincreasetheircredibilityandattractiveness,receiverscansignalthesenderaboutthegeneralacceptabilityandfavorablenessofthemessagebeingsent,andsenderscanmonitorthereceiver’sreceptivenessandadaptthemessagesaccordingly.4.1ExploringorIgnoringtheOther’sPositionSelectivelyParaphrase
Paraphrasingensuresthatbothpartieshaveunderstoodeachotheraccurately.Itcanbeveryhelpfulinmovingadiscussionforward.ReinforcePositionsYouLikeintheOtherParty’sProposalsSeveralclassicaltheoriesofbehaviormakethesamepoint:Peoplearemorelikelytorepeatbehaviorthatisrewardedthanbehaviorthatisnotrewarded.(Homans,1962;Skinner,1953)Thereareseveralwaystorewardpeopleforwhattheysayduringanegotiation.4.2ResistingtheOther’sInfluence-1HaveaBATNA,andKnowHowtoUseit-1TouseaBATNAeffectively,anegotiatormustaccesstheotherparty’sawarenessthatitexistsand,ifnecessary,sharethatfact.MakeaPublicCommitment
Oneofthemostwaystogetsomeonetostandfirmonapositionistohavehimmake
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 技術(shù)規(guī)范:物聯(lián)網(wǎng)數(shù)據(jù)傳輸安全標(biāo)準(zhǔn)
- 2026年物流管理供應(yīng)鏈優(yōu)化與倉(cāng)儲(chǔ)管理試題
- 2026年職業(yè)素養(yǎng)與實(shí)踐能力提升試題
- 2026年食品衛(wèi)生安全法規(guī)考試題庫(kù)確保食品安全與健康
- 2026年電子通信電子設(shè)備調(diào)試與維護(hù)實(shí)操考試題
- 2026年5S環(huán)境管理標(biāo)準(zhǔn)下的辦公室管理測(cè)試
- 2026年機(jī)械原理與機(jī)械設(shè)計(jì)專(zhuān)業(yè)知識(shí)題庫(kù)
- 2026年語(yǔ)言矯治模擬題目發(fā)音糾正與語(yǔ)音清晰度訓(xùn)練
- 2026年AI技術(shù)專(zhuān)家認(rèn)證考試題集與答案詳解
- 2026年拼多多市場(chǎng)營(yíng)銷(xiāo)應(yīng)屆生面試題集
- 2026年齊齊哈爾高等師范專(zhuān)科學(xué)校單招職業(yè)技能測(cè)試題庫(kù)必考題
- 物業(yè)項(xiàng)目綜合服務(wù)方案
- 胖東來(lái)管理制度全公開(kāi)執(zhí)行標(biāo)準(zhǔn)
- 2025-2026學(xué)年北京市西城區(qū)初二(上期)期末考試物理試卷(含答案)
- 書(shū)法培訓(xùn)班安全制度
- 企業(yè)管理 華為會(huì)議接待全流程手冊(cè)SOP
- 供水企業(yè)制度流程規(guī)范
- 框架柱混凝土澆筑施工方案(完整版)
- 電廠?;钒踩嘤?xùn)課件
- 酸馬奶加工技術(shù)
- 護(hù)士常用設(shè)備儀器培訓(xùn)
評(píng)論
0/150
提交評(píng)論