-
1
-
-
34548344520
-
-
Anti-Phishing Working Group, Anti-Phishing Working Group, (30 Jan 2006)
-
Anti-Phishing Working Group (2006) Phishing Activity Trends Report. Anti-Phishing Working Group, www. antiphishing. org(30 Jan 2006).
-
(2006)
Phishing Activity Trends Report
-
-
-
2
-
-
0030201356
-
Interpersonal deception theory
-
Buller D, Burgoon JK (1996) Interpersonal deception theory. Commun Theory 6(3): 203-242.
-
(1996)
Commun Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.1
Burgoon, J.K.2
-
3
-
-
0022140702
-
Pragmatic reasoning schemas
-
Cheng P, Holoyoak K (1985) Pragmatic reasoning schemas. Cogn Psychol 17: 391-416.
-
(1985)
Cogn Psychol
, vol.17
, pp. 391-416
-
-
Cheng, P.1
Holoyoak, K.2
-
4
-
-
0002042337
-
Issues and opinion on structural equation modeling
-
Chin WW (1998) Issues and opinion on structural equation modeling. Manag Inform Syst Q 22(1): vii-xvi.
-
(1998)
Manag Inform Syst Q
, vol.22
, Issue.1
-
-
Chin, W.W.1
-
5
-
-
21344456569
-
Application of social cognitive theory to training for computer skills
-
Compeau DR, Higgins CA (1995) Application of social cognitive theory to training for computer skills. Inform Syst Res 6(2): 118-143.
-
(1995)
Inform Syst Res
, vol.6
, Issue.2
, pp. 118-143
-
-
Compeau, D.R.1
Higgins, C.A.2
-
6
-
-
33745816410
-
-
Dhamija R, Tygar JD, Hearst M (2006) Why Phishing Works. Computer human interaction conference Montreal, QB, Canada, 2006, pp 581-90.
-
-
-
-
7
-
-
33645785886
-
Internet privacy concerns and social awareness as determinants of intention to transact
-
Dinev T, Hart P (2006) Internet privacy concerns and social awareness as determinants of intention to transact. Int J Elec Comm 10(2): 7-29.
-
(2006)
Int J Elec Comm
, vol.10
, Issue.2
, pp. 7-29
-
-
Dinev, T.1
Hart, P.2
-
9
-
-
33748469967
-
Phishing update, and how to avoid getting hooked
-
Emm D (2006) Phishing update, and how to avoid getting hooked. Netw Sec 8: 13-15.
-
(2006)
Netw Sec
, vol.8
, pp. 13-15
-
-
Emm, D.1
-
10
-
-
33748583750
-
How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store
-
Everard A, Galletta DF (2006) How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store. J Manag Inform Syst 22(3): 55-96.
-
(2006)
J Manag Inform Syst
, vol.22
, Issue.3
, pp. 55-96
-
-
Everard, A.1
Galletta, D.F.2
-
11
-
-
0000009769
-
Evaluating structural equations models with unobservable variables and measurement error
-
Fornell C, Larcker DF (1981) Evaluating structural equations models with unobservable variables and measurement error. J Mark Res 18(1): 39-50.
-
(1981)
J Mark Res
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
12
-
-
0001178032
-
Structural equation modeling and regression: Guidelines for research practice
-
Gefen D, Straub D, Boudreau M (2000) Structural equation modeling and regression: guidelines for research practice. Commun Assoc Inform Syst 4(7): 1-77.
-
(2000)
Commun Assoc Inform Syst
, vol.4
, Issue.7
, pp. 1-77
-
-
Gefen, D.1
Straub, D.2
Boudreau, M.3
-
13
-
-
77953536940
-
-
George JF, Carlson JR (1999) Group support systems and deceptive communications. 32nd Hawaii international conference on system science, Hawaii, 1999, pp 1-10.
-
-
-
-
14
-
-
0344154593
-
A very brief measure of the big five personality domains
-
Gosling SD, Rentfrow PJ, Swann WB Jr (2003) A very brief measure of the big five personality domains. J Res Pers 37: 504-528.
-
(2003)
J Res Pers
, vol.37
, pp. 504-528
-
-
Gosling, S.D.1
Rentfrow, P.J.2
Swann Jr., W.B.3
-
15
-
-
3843130753
-
Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the internet
-
Grazioli S (2004) Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the internet. Gr Dec Negot 13: 149-172.
-
(2004)
Gr Dec Negot
, vol.13
, pp. 149-172
-
-
Grazioli, S.1
-
16
-
-
0034226904
-
Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
-
Grazioli S, Jarvenpaa S (2000) Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers. IEEE Transac Syst Man Cybern 30(4): 395-410.
-
(2000)
IEEE Transac Syst Man Cybern
, vol.30
, Issue.4
, pp. 395-410
-
-
Grazioli, S.1
Jarvenpaa, S.2
-
17
-
-
7244252734
-
Decieved: Under target online
-
Grazioli S, Jarvenpaa S (2003) Decieved: under target online. Commun ACM 46(12): 196-205.
-
(2003)
Commun ACM
, vol.46
, Issue.12
, pp. 196-205
-
-
Grazioli, S.1
Jarvenpaa, S.2
-
18
-
-
0000214518
-
The psychology of deception
-
Hyman R (1989) The psychology of deception. Ann Rev Psychol 40: 133-154.
-
(1989)
Ann Rev Psychol
, vol.40
, pp. 133-154
-
-
Hyman, R.1
-
19
-
-
34848911641
-
Social phishing
-
Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10): 94-100.
-
(2007)
Commun ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
20
-
-
85140348575
-
-
Jarvenpaa SL, Tractinsky N, Saarinen L (2000) Consumer trust in an Internet store: a cross-cultural validation. J Comp Med Commun 5(2).
-
-
-
-
22
-
-
0001537059
-
Fraud detection: Intentionality and deception in cognition
-
Johnson P, Grazioli S, Jamal K (1993) Fraud detection: intentionality and deception in cognition. Accoun Organ Soc 18(5): 467-488.
-
(1993)
Accoun Organ Soc
, vol.18
, Issue.5
, pp. 467-488
-
-
Johnson, P.1
Grazioli, S.2
Jamal, K.3
-
23
-
-
0035740371
-
Detecting deception: Adversarial problem solving in a low base-rate world
-
Johnson PE, Grazioli S, Jamal K, Berryman RG (2001) Detecting deception: adversarial problem solving in a low base-rate world. Cogn Sci 25: 355-392.
-
(2001)
Cogn Sci
, vol.25
, pp. 355-392
-
-
Johnson, P.E.1
Grazioli, S.2
Jamal, K.3
Berryman, R.G.4
-
25
-
-
33645131523
-
An antiphishing strategy based on visual similarity assessment
-
Liu W, Deng X, Huang G, Fu AY (2006) An antiphishing strategy based on visual similarity assessment. IEEE Internet Comput 10(2): 58-65.
-
(2006)
IEEE Internet Comput
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Deng, X.2
Huang, G.3
Fu, A.Y.4
-
26
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
Malhotra NK, Kim SS, Agarwal J (2004) Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform Syst Res 15(4): 336-355.
-
(2004)
Inform Syst Res
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
27
-
-
84969508865
-
-
McKnight DH, Kacmar C, Choudhury V (2003) Whoops-did i use the wrong construct to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts. Proceeding of the thirty-sixth Hawaii international conference on social systems, 2003.
-
-
-
-
31
-
-
1642542168
-
Using an adapted grounded theory approach for inductive theory building about virtual team development
-
Sarker S, Lau F, Sahay S (2001) Using an adapted grounded theory approach for inductive theory building about virtual team development. Database Adv Inform Syst 32(1): 38.
-
(2001)
Database Adv Inform Syst
, vol.32
, Issue.1
, pp. 38
-
-
Sarker, S.1
Lau, F.2
Sahay, S.3
-
32
-
-
0031066695
-
Assessing the unidimensionality of measurement: A paradigm and illustration within the context of information systems research
-
Segars AH (1997) Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research. Omega 25(1): 107-121.
-
(1997)
Omega
, vol.25
, Issue.1
, pp. 107-121
-
-
Segars, A.H.1
-
34
-
-
0002654732
-
Lying as a skill: The development of deception in children
-
R. W. Mitchell (Ed.), New York, NY: State University of New York Publishing
-
Vasek ME (1986) Lying as a skill: the development of deception in children. In: Mitchell RW(eds) Deception, perspectives on human and non-human deceit. State University of New York Publishing, New York, NY.
-
(1986)
Deception, Perspectives on Human and Non-Human Deceit
-
-
Vasek, M.E.1
-
35
-
-
77953538011
-
-
Wu M, Miller RC, Garfinkel SL (2006) Do security toolbars actually prevent phishing attacks? Computer human interaction conference Montreal, QB, Canada, 2006.
-
-
-
-
36
-
-
3142747644
-
A comparison of classification methods for predicting deception in computer-mediated communication
-
Zhou L, Burgoon JK, Twitchell DP, Qin T et al (2004) A comparison of classification methods for predicting deception in computer-mediated communication. J Manag Inform Syst 20(4): 139-166.
-
(2004)
J Manag Inform Syst
, vol.20
, Issue.4
, pp. 139-166
-
-
Zhou, L.1
Burgoon, J.K.2
Twitchell, D.P.3
Qin, T.4
|