메뉴 건너뛰기




Volumn 19, Issue 4, 2010, Pages 391-416

Where did they go right? understanding the deception in phishing communications

Author keywords

Deception detection; Interpersonal deception theory; Online deception; Phishing

Indexed keywords


EID: 77953540367     PISSN: 09262644     EISSN: 15729907     Source Type: Journal    
DOI: 10.1007/s10726-009-9167-9     Document Type: Article
Times cited : (53)

References (36)
  • 1
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, Anti-Phishing Working Group, (30 Jan 2006)
    • Anti-Phishing Working Group (2006) Phishing Activity Trends Report. Anti-Phishing Working Group, www. antiphishing. org(30 Jan 2006).
    • (2006) Phishing Activity Trends Report
  • 2
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • Buller D, Burgoon JK (1996) Interpersonal deception theory. Commun Theory 6(3): 203-242.
    • (1996) Commun Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.1    Burgoon, J.K.2
  • 3
    • 0022140702 scopus 로고
    • Pragmatic reasoning schemas
    • Cheng P, Holoyoak K (1985) Pragmatic reasoning schemas. Cogn Psychol 17: 391-416.
    • (1985) Cogn Psychol , vol.17 , pp. 391-416
    • Cheng, P.1    Holoyoak, K.2
  • 4
    • 0002042337 scopus 로고    scopus 로고
    • Issues and opinion on structural equation modeling
    • Chin WW (1998) Issues and opinion on structural equation modeling. Manag Inform Syst Q 22(1): vii-xvi.
    • (1998) Manag Inform Syst Q , vol.22 , Issue.1
    • Chin, W.W.1
  • 5
    • 21344456569 scopus 로고
    • Application of social cognitive theory to training for computer skills
    • Compeau DR, Higgins CA (1995) Application of social cognitive theory to training for computer skills. Inform Syst Res 6(2): 118-143.
    • (1995) Inform Syst Res , vol.6 , Issue.2 , pp. 118-143
    • Compeau, D.R.1    Higgins, C.A.2
  • 6
    • 33745816410 scopus 로고    scopus 로고
    • Dhamija R, Tygar JD, Hearst M (2006) Why Phishing Works. Computer human interaction conference Montreal, QB, Canada, 2006, pp 581-90.
  • 7
    • 33645785886 scopus 로고    scopus 로고
    • Internet privacy concerns and social awareness as determinants of intention to transact
    • Dinev T, Hart P (2006) Internet privacy concerns and social awareness as determinants of intention to transact. Int J Elec Comm 10(2): 7-29.
    • (2006) Int J Elec Comm , vol.10 , Issue.2 , pp. 7-29
    • Dinev, T.1    Hart, P.2
  • 9
    • 33748469967 scopus 로고    scopus 로고
    • Phishing update, and how to avoid getting hooked
    • Emm D (2006) Phishing update, and how to avoid getting hooked. Netw Sec 8: 13-15.
    • (2006) Netw Sec , vol.8 , pp. 13-15
    • Emm, D.1
  • 10
    • 33748583750 scopus 로고    scopus 로고
    • How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store
    • Everard A, Galletta DF (2006) How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store. J Manag Inform Syst 22(3): 55-96.
    • (2006) J Manag Inform Syst , vol.22 , Issue.3 , pp. 55-96
    • Everard, A.1    Galletta, D.F.2
  • 11
    • 0000009769 scopus 로고
    • Evaluating structural equations models with unobservable variables and measurement error
    • Fornell C, Larcker DF (1981) Evaluating structural equations models with unobservable variables and measurement error. J Mark Res 18(1): 39-50.
    • (1981) J Mark Res , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 12
    • 0001178032 scopus 로고    scopus 로고
    • Structural equation modeling and regression: Guidelines for research practice
    • Gefen D, Straub D, Boudreau M (2000) Structural equation modeling and regression: guidelines for research practice. Commun Assoc Inform Syst 4(7): 1-77.
    • (2000) Commun Assoc Inform Syst , vol.4 , Issue.7 , pp. 1-77
    • Gefen, D.1    Straub, D.2    Boudreau, M.3
  • 13
    • 77953536940 scopus 로고    scopus 로고
    • George JF, Carlson JR (1999) Group support systems and deceptive communications. 32nd Hawaii international conference on system science, Hawaii, 1999, pp 1-10.
  • 14
    • 0344154593 scopus 로고    scopus 로고
    • A very brief measure of the big five personality domains
    • Gosling SD, Rentfrow PJ, Swann WB Jr (2003) A very brief measure of the big five personality domains. J Res Pers 37: 504-528.
    • (2003) J Res Pers , vol.37 , pp. 504-528
    • Gosling, S.D.1    Rentfrow, P.J.2    Swann Jr., W.B.3
  • 15
    • 3843130753 scopus 로고    scopus 로고
    • Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the internet
    • Grazioli S (2004) Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the internet. Gr Dec Negot 13: 149-172.
    • (2004) Gr Dec Negot , vol.13 , pp. 149-172
    • Grazioli, S.1
  • 16
    • 0034226904 scopus 로고    scopus 로고
    • Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
    • Grazioli S, Jarvenpaa S (2000) Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers. IEEE Transac Syst Man Cybern 30(4): 395-410.
    • (2000) IEEE Transac Syst Man Cybern , vol.30 , Issue.4 , pp. 395-410
    • Grazioli, S.1    Jarvenpaa, S.2
  • 17
    • 7244252734 scopus 로고    scopus 로고
    • Decieved: Under target online
    • Grazioli S, Jarvenpaa S (2003) Decieved: under target online. Commun ACM 46(12): 196-205.
    • (2003) Commun ACM , vol.46 , Issue.12 , pp. 196-205
    • Grazioli, S.1    Jarvenpaa, S.2
  • 18
    • 0000214518 scopus 로고
    • The psychology of deception
    • Hyman R (1989) The psychology of deception. Ann Rev Psychol 40: 133-154.
    • (1989) Ann Rev Psychol , vol.40 , pp. 133-154
    • Hyman, R.1
  • 20
    • 85140348575 scopus 로고    scopus 로고
    • Jarvenpaa SL, Tractinsky N, Saarinen L (2000) Consumer trust in an Internet store: a cross-cultural validation. J Comp Med Commun 5(2).
  • 22
    • 0001537059 scopus 로고
    • Fraud detection: Intentionality and deception in cognition
    • Johnson P, Grazioli S, Jamal K (1993) Fraud detection: intentionality and deception in cognition. Accoun Organ Soc 18(5): 467-488.
    • (1993) Accoun Organ Soc , vol.18 , Issue.5 , pp. 467-488
    • Johnson, P.1    Grazioli, S.2    Jamal, K.3
  • 23
    • 0035740371 scopus 로고    scopus 로고
    • Detecting deception: Adversarial problem solving in a low base-rate world
    • Johnson PE, Grazioli S, Jamal K, Berryman RG (2001) Detecting deception: adversarial problem solving in a low base-rate world. Cogn Sci 25: 355-392.
    • (2001) Cogn Sci , vol.25 , pp. 355-392
    • Johnson, P.E.1    Grazioli, S.2    Jamal, K.3    Berryman, R.G.4
  • 25
    • 33645131523 scopus 로고    scopus 로고
    • An antiphishing strategy based on visual similarity assessment
    • Liu W, Deng X, Huang G, Fu AY (2006) An antiphishing strategy based on visual similarity assessment. IEEE Internet Comput 10(2): 58-65.
    • (2006) IEEE Internet Comput , vol.10 , Issue.2 , pp. 58-65
    • Liu, W.1    Deng, X.2    Huang, G.3    Fu, A.Y.4
  • 26
    • 13244298307 scopus 로고    scopus 로고
    • Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
    • Malhotra NK, Kim SS, Agarwal J (2004) Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform Syst Res 15(4): 336-355.
    • (2004) Inform Syst Res , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 27
    • 84969508865 scopus 로고    scopus 로고
    • McKnight DH, Kacmar C, Choudhury V (2003) Whoops-did i use the wrong construct to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts. Proceeding of the thirty-sixth Hawaii international conference on social systems, 2003.
  • 31
    • 1642542168 scopus 로고    scopus 로고
    • Using an adapted grounded theory approach for inductive theory building about virtual team development
    • Sarker S, Lau F, Sahay S (2001) Using an adapted grounded theory approach for inductive theory building about virtual team development. Database Adv Inform Syst 32(1): 38.
    • (2001) Database Adv Inform Syst , vol.32 , Issue.1 , pp. 38
    • Sarker, S.1    Lau, F.2    Sahay, S.3
  • 32
    • 0031066695 scopus 로고    scopus 로고
    • Assessing the unidimensionality of measurement: A paradigm and illustration within the context of information systems research
    • Segars AH (1997) Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research. Omega 25(1): 107-121.
    • (1997) Omega , vol.25 , Issue.1 , pp. 107-121
    • Segars, A.H.1
  • 34
    • 0002654732 scopus 로고
    • Lying as a skill: The development of deception in children
    • R. W. Mitchell (Ed.), New York, NY: State University of New York Publishing
    • Vasek ME (1986) Lying as a skill: the development of deception in children. In: Mitchell RW(eds) Deception, perspectives on human and non-human deceit. State University of New York Publishing, New York, NY.
    • (1986) Deception, Perspectives on Human and Non-Human Deceit
    • Vasek, M.E.1
  • 35
    • 77953538011 scopus 로고    scopus 로고
    • Wu M, Miller RC, Garfinkel SL (2006) Do security toolbars actually prevent phishing attacks? Computer human interaction conference Montreal, QB, Canada, 2006.
  • 36
    • 3142747644 scopus 로고    scopus 로고
    • A comparison of classification methods for predicting deception in computer-mediated communication
    • Zhou L, Burgoon JK, Twitchell DP, Qin T et al (2004) A comparison of classification methods for predicting deception in computer-mediated communication. J Manag Inform Syst 20(4): 139-166.
    • (2004) J Manag Inform Syst , vol.20 , Issue.4 , pp. 139-166
    • Zhou, L.1    Burgoon, J.K.2    Twitchell, D.P.3    Qin, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.