Impact of Prior Reviews on the Subsequent Review Process in Reputation Systems



Journal Title

Journal ISSN

Volume Title


Journal of Management Information Systems


Reputation systems have been recognized as successful online review communities and word-of-mouth channels. Our study draws upon the elaboration likelihood model to analyze the extent that the characteristics of reviewers and their early reviews reduce or worsen the bias of subsequent online reviews. Investigating the sources of this bias and ways to mitigate it is of considerable importance given the previously established significant impact of online reviews on consumers' purchasing decisions and on businesses' profitability. Based on a panel data set of 744 individual consumers collected from Yelp, we used the Markov chain Monte Carlo simulation method to develop and empirically test a system of simultaneous models of consumer review behavior. Our results reveal that male reviewers or those who lack experience, geographic mobility, or social connectedness are more prone to being influenced by prior reviews. We also found that longer and more frequent reviews can reduce online reviews' biases. This paper is among the first to examine the moderating effects of reviewer and review characteristics on the relationship between prior reviews and subsequent reviews. Practically, this study offers businesses effective customer relationship management strategies to improve their reputations and expand their clientele.



Consumer review, Elaboration likelihood model, Hierarchical modeling, MCMC simulation, Reputation systems, Simultaneous equations model


Copyright 2013 Journal of Management Information Systems. This is a pre-print version of a published paper available at: Recommended citation: Deng, Yun, Jinghui Hou, Xiao Ma, and Shuqin Cai. "A dual model of entertainment-based and community-based mechanisms to explore continued participation in online entertainment communities." Cyberpsychology, Behavior, and Social Networking 16, no. 5 (2013): 378-384.DOI: 10.1089/cyber.2012.0402. This item has been deposited in accordance with publisher copyright and licensing terms and with the author's permission.