메뉴 건너뛰기




Volumn 27, Issue 1, 2010, Pages 273-303

The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived

Author keywords

computer mediated deception; electronic mail fraud; Internet security; interpersonal deception theory; phishing

Indexed keywords

ANTI-PHISHING; BEHAVIORAL FACTORS; DECEPTION DETECTION; EMPIRICAL INVESTIGATION; FIELD STUDIES; INFORMATION SYSTEMS MANAGERS; INTERNET SECURITY; INTERNET USERS; INTERPERSONAL DECEPTION THEORY; PERSONAL INFORMATION; PHISHING; RESEARCH MODELS; SENSITIVE INFORMATIONS;

EID: 77955042436     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222270111     Document Type: Conference Paper
Times cited : (200)

References (87)
  • 1
    • 33645003633 scopus 로고    scopus 로고
    • Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use
    • Ahuja, M.K., and Thatcher, J.B. Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 3 (2005), 427-459.
    • (2005) MIS Quarterly , vol.29 , Issue.3 , pp. 427-459
    • Ahuja, M.K.1    Thatcher, J.B.2
  • 2
    • 19744380329 scopus 로고    scopus 로고
    • Spamming Phishing authentication, and privacy
    • Bellovin, S.M. Spamming, phishing, authentication, and privacy. Communications of the ACM, 47, 12 (2004), 144.
    • (2004) Communications of the ACM , vol.47 , Issue.12 , pp. 144
    • Bellovin, S.M.1
  • 3
    • 33745186426 scopus 로고    scopus 로고
    • Phishing mongers and posers
    • Berghel, H. Phishing mongers and posers. Communications of the ACM, 49, 4 (2006), 21-25.
    • (2006) Communications of the ACM , vol.49 , Issue.4 , pp. 21-25
    • Berghel, H.1
  • 4
    • 9744258059 scopus 로고    scopus 로고
    • Inducing sensitivity to deception in order to improve decision making performance: A field study
    • Biros, D.; George, J.; and Zmud, R. Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Quarterly, 26, 2 (2002), 119-144.
    • (2002) MIS Quarterly , vol.26 , Issue.2 , pp. 119-144
    • Biros, D.1    George, J.2    Zmud, R.3
  • 7
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • Buller, D., and Burgoon, J.K. Interpersonal deception theory. Communication Theory, 6, 3 (1996), 203-242.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.1    Burgoon, J.K.2
  • 8
    • 0942280323 scopus 로고    scopus 로고
    • Communication and trust under face-to-face and mediated conditions: Implications for leading from a distance
    • S. Weisband and L. Atwater (eds.), Mahwah, NJ: Lawrence Erlbaum
    • Burgoon, J.; Bonito, J.; and Kam, K. Communication and trust under face-to-face and mediated conditions: Implications for leading from a distance. In S. Weisband and L. Atwater (eds.), Leadership at a Distance. Mahwah, NJ: Lawrence Erlbaum, 2004.
    • (2004) Leadership at A Distance
    • Burgoon, J.1    Bonito, J.2    Kam, K.3
  • 9
    • 84958361681 scopus 로고
    • Interpersonal deception: V. Accuracy in deception detection
    • Burgoon, J.; Buller, D.; Ebesu, A.; and Rockwell, P. Interpersonal deception: V. Accuracy in deception detection. Communication Monographs, 61, 4 (1994), 303-325.
    • (1994) Communication Monographs , vol.61 , Issue.4 , pp. 303-325
    • Burgoon, J.1    Buller, D.2    Ebesu, A.3    Rockwell, P.4
  • 10
    • 3843138191 scopus 로고    scopus 로고
    • Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity
    • Carlson, J.R., and George, J. Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity. Group Decision and Negotiation, 13, 2 (2004), 191-210.
    • (2004) Group Decision and Negotiation , vol.13 , Issue.2 , pp. 191-210
    • Carlson, J.R.1    George, J.2
  • 11
    • 0033241819 scopus 로고    scopus 로고
    • Channel expansion theory and the experiential nature of media richness perceptions
    • Carlson, J.R., and Zmud, R. Channel expansion theory and the experiential nature of media richness perceptions. Academy of Management Review, 42, 2 (1999), 153-170.
    • (1999) Academy of Management Review , vol.42 , Issue.2 , pp. 153-170
    • Carlson, J.R.1    Zmud, R.2
  • 13
    • 44249095130 scopus 로고    scopus 로고
    • Online reverse auctions and the dynamics of trust
    • Spring
    • Charki, M., and Josserand, E. Online reverse auctions and the dynamics of trust. Journal of Management Information Systems, 24, 4 (Spring 2008), 175-197.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 175-197
    • Charki, M.1    Josserand, E.2
  • 14
    • 21344456569 scopus 로고
    • Application of social cognitive theory to training for computer skills
    • Compeau, D.R., and Higgins, C.A. Application of social cognitive theory to training for computer skills. Information Systems Research, 6, 2 (1995), 118-143.
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 118-143
    • Compeau, D.R.1    Higgins, C.A.2
  • 15
    • 49149116092 scopus 로고
    • Computer self-efficacy: Development of a measure and initial test
    • Compeau, D.R., and Higgins, C.A. Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19, 2 (1995), 189-211.
    • (1995) MIS Quarterly , vol.19 , Issue.2 , pp. 189-211
    • Compeau, D.R.1    Higgins, C.A.2
  • 16
    • 0042929813 scopus 로고    scopus 로고
    • Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality
    • Summer
    • Cooper, R., and Kahai, S. Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality. Journal of Management Information Systems, 20, 1 (Summer 2003), 263-299.
    • (2003) Journal of Management Information Systems , vol.20 , Issue.1 , pp. 263-299
    • Cooper, R.1    Kahai, S.2
  • 17
    • 50249186432 scopus 로고    scopus 로고
    • Media tasks, and communication processes: A theory of media synchronicity
    • Dennis, A.R.; Fuller, R.M.; and Valacich, J.S. Media, tasks, and communication processes: A theory of media synchronicity. MIS Quarterly, 32, 3 (2008), 575-600.
    • (2008) MIS Quarterly , vol.32 , Issue.3 , pp. 575-600
    • Dennis, A.R.1    Fuller, R.M.2    Valacich, J.S.3
  • 20
    • 33645785886 scopus 로고    scopus 로고
    • Internet privacy concerns and social awareness as determinants of intention to transact
    • Winter
    • Dinev, T., and Hart, P. Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10, 2 (Winter 2005-2006), 7-29.
    • International Journal of Electronic Commerce , vol.10 , Issue.2 , pp. 2005-2006
    • Dinev, T.1    Hart, P.2
  • 23
    • 33748583750 scopus 로고    scopus 로고
    • How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store
    • Everard, A., and Galletta, D.F. How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store. Journal of Management Information Systems, 22, 3 (2005), 55-95.
    • (2005) Journal of Management Information Systems , vol.22 , Issue.3 , pp. 55-95
    • Everard, A.1    Galletta, D.F.2
  • 24
    • 77955027818 scopus 로고    scopus 로고
    • Security expert: User education is pointless
    • available at
    • Evers, J. Security expert: User education is pointless. CNET News, 2009 (available at http://news.cnet.com/2100-7350-3-6125213.html).
    • (2009) CNET News
    • Evers, J.1
  • 26
    • 0000009769 scopus 로고
    • Evaluating structural equations models with unobservable variables and measurement error
    • Fornell, C., and Larcker, D.F. Evaluating structural equations models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (1981), 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 27
    • 33751538239 scopus 로고    scopus 로고
    • Detecting phishing Web pages with visual similarity assessment based on earth mover's distance (EMD)
    • Fu, A.Y.; Wenyin, L.; and Deng, X.T. Detecting phishing Web pages with visual similarity assessment based on earth mover's distance (EMD). IEEE Transactions on Dependable and Secure Computing, 3, 4 (2006), 301-311.
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 301-311
    • Fu, A.Y.1    Wenyin, L.2    Deng, X.T.3
  • 28
    • 51449095277 scopus 로고    scopus 로고
    • A cognitive map of people's online risk perceptions and attitudes: An empirical study
    • R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press available at
    • Gabrieal, I.J., and Nyshadham, E. A cognitive map of people's online risk perceptions and attitudes: An empirical study. In R.H. Sprague (ed.), Proceedings of the 41st Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2008 (available at www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2008.6).
    • (2008) Proceedings of the 41st Annual Hawaii International Conference on System Sciences
    • Gabrieal, I.J.1    Nyshadham, E.2
  • 29
    • 77955032613 scopus 로고    scopus 로고
    • Gartner survey shows phishing attacks escalated in 2007 Press Release Gartner, Stamford, CT, December 17, 2007 available at
    • Gartner survey shows phishing attacks escalated in 2007; More than $3 billion lost to these attacks. Press Release Gartner, Stamford, CT, December 17, 2007 (available at www .gartner.com/it/page.jsp?id=565125).
    • More Than $3billion Lost to These Attacks
  • 31
    • 0001178032 scopus 로고    scopus 로고
    • Structural equation modeling and regression: Guidelines for research practice
    • Gefen, D.; Straub, D.; and Boudreau, M. Structural equation modeling and regression: Guidelines for research practice. Communications of the AIS, 4, 7 (2000), 1-77.
    • (2000) Communications of the AIS , vol.4 , Issue.7 , pp. 1-77
    • Gefen, D.1    Straub, D.2    Boudreau, M.3
  • 34
    • 77955035009 scopus 로고    scopus 로고
    • Gone phishing . . . A brief on anti-phishing exercise. New York State Office of Cyber Security & Critical Infrastructure Coordination New York 2005
    • Gone phishing . . . A brief on anti-phishing exercise. New York State Office of Cyber Security & Critical Infrastructure Coordination, New York, 2005.
  • 35
    • 85008020099 scopus 로고    scopus 로고
    • Phishing attacks rising, but dollar losses down
    • Goth, G. Phishing attacks rising, but dollar losses down. IEEE Security & Privacy, 3, 1 (2005), 8.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 8
    • Goth, G.1
  • 36
    • 0034226904 scopus 로고    scopus 로고
    • Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers
    • Grazioli, S., and Jarvenpaa, S. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on System, Man, and Cybernetics, 30, 4 (2000), 395-410.
    • (2000) IEEE Transactions on System Man and Cybernetics , vol.30 , Issue.4 , pp. 395-410
    • Grazioli, S.1    Jarvenpaa, S.2
  • 37
    • 3142664237 scopus 로고    scopus 로고
    • Consumer and business deception on the Internet: Content analysis of documentary evidence
    • Summer
    • Grazioli, S., and Jarvenpaa, S. Consumer and business deception on the Internet: Content analysis of documentary evidence. International Journal of Electronic Commerce, 7, 4 (Summer 2003), 93-118.
    • (2003) International Journal of Electronic Commerce , vol.7 , Issue.4 , pp. 93-118
    • Grazioli, S.1    Jarvenpaa, S.2
  • 38
    • 0000384380 scopus 로고
    • The college sophomore as guinea pig: Setting the record straight
    • Greenberg, J. The college sophomore as guinea pig: Setting the record straight. Academy of Management Review, 12, 1 (1987), 157-159.
    • (1987) Academy of Management Review , vol.12 , Issue.1 , pp. 157-159
    • Greenberg, J.1
  • 40
    • 0033092817 scopus 로고    scopus 로고
    • Where do interorganizational networks come from?
    • Gulati, R., and Gargiulo, M. Where do interorganizational networks come from? American Journal of Sociology, 104, 1 (1999), 1439-1493.
    • (1999) American Journal of Sociology , vol.104 , Issue.1 , pp. 1439-1493
    • Gulati, R.1    Gargiulo, M.2
  • 42
    • 33746180827 scopus 로고    scopus 로고
    • Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness
    • Winter
    • Hess, T.; Fuller, M.; and Mathew, J. Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness. Journal of Management Information Systems, 22, 3 (Winter 2005-2006), 15-54.
    • (2005) Journal of Management Information Systems , vol.22 , Issue.3 , pp. 15-54
    • Hess, T.1    Fuller, M.2    Mathew, J.3
  • 44
    • 40749113599 scopus 로고    scopus 로고
    • Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged
    • Hsieh, J.J.P.-A.; Rai, A.; and Keil, M. Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. MIS Quarterly, 32, 1 (2008), 97-126.
    • (2008) MIS Quarterly , vol.32 , Issue.1 , pp. 97-126
    • Hsieh, J.J.P.-A.1    Rai, A.2    Keil, M.3
  • 45
    • 0037550861 scopus 로고
    • Students as surrogates for managers in a decision-making environment: An experimental study
    • Fall
    • Hughes, C., and Gibson, M.L. Students as surrogates for managers in a decision-making environment: An experimental study. Journal of Management Information Systems, 8, 2 (Fall 1991), 153-166.
    • (1991) Journal of Management Information Systems , vol.8 , Issue.2 , pp. 153-166
    • Hughes, C.1    Gibson, M.L.2
  • 47
    • 20544431696 scopus 로고    scopus 로고
    • Consumer reactions to electronic shopping on the World Wide Web
    • Fall
    • Jarvenpaa, S.L., and Todd, P. Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 2, 1 (Fall 1997), 59-88.
    • (1997) International Journal of Electronic Commerce , vol.2 , Issue.1 , pp. 59-88
    • Jarvenpaa, S.L.1    Todd, P.2
  • 50
    • 0011409951 scopus 로고
    • Employment interview research: Internal and external validity
    • R.W. Eeder and G.R. Ferris (eds.), Newbury Park, CA: Sage
    • Kacmar, M.; Ratcliff, S.; and Ferris, G. Employment interview research: Internal and external validity. In R.W. Eeder and G.R. Ferris (eds.), The Employment Interview: Theory, Research, and Practice. Newbury Park, CA: Sage, 1989, 32-42.
    • (1989) The Employment Interview: Theory, Research, and Practice , pp. 32-42
    • Kacmar, M.1    Ratcliff, S.2    Ferris, G.3
  • 52
    • 35348906237 scopus 로고    scopus 로고
    • Protecting people from phishing: The design and evaluation of an embedded training email systems
    • B. Begole, S. Payne, E. Churchill, R. St. Amant D. Gilmore, and M.B. Rosson (eds.), New York: ACM Press
    • Kumaraguru, P.; Rhee, Y.; Acquisti, A.; Cranor, L.; Hong, J.; and Nunge, E. Protecting people from phishing: The design and evaluation of an embedded training email systems. In B. Begole, S. Payne, E. Churchill, R. St. Amant, D. Gilmore, and M.B. Rosson (eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2007.
    • (2007) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    • Kumaraguru, P.1    Rhee, Y.2    Acquisti, A.3    Cranor, L.4    Hong, J.5    Nunge, E.6
  • 54
    • 0032376858 scopus 로고    scopus 로고
    • Trust and distrust: New relationships and realities
    • Lewicki, R.; McAllister, D.; and Bies, R. Trust and distrust: New relationships and realities. Academy of Management Review, 23, 3 (1998), 438-458.
    • (1998) Academy of Management Review , vol.23 , Issue.3 , pp. 438-458
    • Lewicki, R.1    McAllister, D.2    Bies, R.3
  • 55
    • 33645131523 scopus 로고    scopus 로고
    • An antiphishing strategy based on visual similarity assessment
    • Liu, W.; Deng, X.; Huang, G.; and Fu, A.Y. An antiphishing strategy based on visual similarity assessment. IEEE Internet Computing, 10, 2 (2006), 58-65.
    • (2006) IEEE Internet Computing , vol.10 , Issue.2 , pp. 58-65
    • Liu, W.1    Deng, X.2    Huang, G.3    Fu, A.Y.4
  • 56
    • 13244298307 scopus 로고    scopus 로고
    • Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
    • Malhotra, N.K.; Kim, S.S.; and Agarwal, J. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (2004), 336-355.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 58
    • 0037660095 scopus 로고    scopus 로고
    • What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology
    • Winter
    • McKnight, D.H., and Chervany, N. What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6, 2 (Winter 2001-2002), 35-59.
    • (2001) International Journal of Electronic Commerce , vol.6 , Issue.2 , pp. 35-59
    • McKnight, D.H.1    Chervany, N.2
  • 59
    • 0036737236 scopus 로고    scopus 로고
    • Developing and validating trust measures for e-commerce: An integrative typology
    • McKnight, D.H.; Choudhury, V.; and Kacmar, C. Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13, 3 (2002), 334-359.
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 334-359
    • McKnight, D.H.1    Choudhury, V.2    Kacmar, C.3
  • 60
    • 33749643640 scopus 로고    scopus 로고
    • Dispositional trust and distrust distinctions in predicting high- and low-risk Internet expert advice site perceptions
    • McKnight, D.H.; Kacmar, C.; and Choudhury, V. Dispositional trust and distrust distinctions in predicting high- and low-risk Internet expert advice site perceptions. e-Service Journal, 3, 2 (2004), 35-58.
    • (2004) E-Service Journal , vol.3 , Issue.2 , pp. 35-58
    • McKnight, D.H.1    Kacmar, C.2    Choudhury, V.3
  • 61
    • 84969508865 scopus 로고    scopus 로고
    • Whoops . . . Did i use the wrong construct to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts
    • R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press, 2003 available at
    • McKnight, D.H.; Kacmar, C.; and Choudhury, V. Whoops . . . Did I use the wrong construct to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts. In R.H. Sprague (ed.), Proceedings of the 36th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2003 (available at www .hicss.hawaii.edu/ HICSS36/HICSSpapers/INCRM04.pdf).
    • Proceedings of the 36th Annual Hawaii International Conference on System Sciences
    • McKnight, D.H.1    Kacmar, C.2    Choudhury, V.3
  • 62
    • 0009925685 scopus 로고    scopus 로고
    • Initial trust formation in new organizational relationships
    • McKnight, H.; Cummings, L.L.; and Chervany, N. Initial trust formation in new organizational relationships. Academy of Management Review, 23, 3 (1998), 473-490.
    • (1998) Academy of Management Review , vol.23 , Issue.3 , pp. 473-490
    • McKnight, H.1    Cummings, L.L.2    Chervany, N.3
  • 65
    • 0002436931 scopus 로고
    • Goodness of fit with categorical and other non-normal variables
    • K.A. Bollen and J.S. Long (eds.), Newbury Park, CA: Sage
    • Muthen, B. Goodness of fit with categorical and other non-normal variables. In K.A. Bollen and J.S. Long (eds.), Testing Structural Equation Models. Newbury Park, CA: Sage, 1993, 205-243.
    • (1993) Testing Structural Equation Models , pp. 205-243
    • Muthen, B.1
  • 67
    • 27544507917 scopus 로고    scopus 로고
    • Using distraction-conflict theory to measure the effects of distractions on individual task performance in a wireless mobile environment
    • R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press available at
    • Nicholson, D.; Nicholson, J.; Parboteeah, V.; and Valacich, J. Using distraction-conflict theory to measure the effects of distractions on individual task performance in a wireless mobile environment. In R.H. Sprague (ed.), Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2005 (available at www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2005.657).
    • (2005) Proceedings of the 38th Annual Hawaii International Conference on System Sciences
    • Nicholson, D.1    Nicholson, J.2    Parboteeah, V.3    Valacich, J.4
  • 70
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group. Chicago
    • Phishing activity trends report. Anti-Phishing Working Group. Chicago, 2006.
    • (2006) Phishing Activity Trends Report
  • 71
    • 77955045302 scopus 로고    scopus 로고
    • Protecting against phishing by implementing strong two-factor authentication
    • RSA Security, Bedford, MA
    • Protecting against phishing by implementing strong two-factor authentication. White Paper, RSA Security, Bedford, MA, 2008.
    • (2008) White Paper
  • 73
    • 61349088607 scopus 로고    scopus 로고
    • Using self-regulatory learning to enhance e-learning-based information technology training
    • Santhanam, R.; Sasidharan, S.; and Webster, J. Using self-regulatory learning to enhance e-learning-based information technology training. Information Systems Research, 19, 1 (2008), 26-47.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 26-47
    • Santhanam, R.1    Sasidharan, S.2    Webster, J.3
  • 75
    • 0002180672 scopus 로고
    • Reconceptualizing the determinants of risk behavior
    • Sitkin, S., and Pablo, A. Reconceptualizing the determinants of risk behavior. Academy of Management Review, 17, 1 (1992), 9-38.
    • (1992) Academy of Management Review , vol.17 , Issue.1 , pp. 9-38
    • Sitkin, S.1    Pablo, A.2
  • 76
    • 21844524600 scopus 로고
    • Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity
    • Sitkin, S., and Weingart, L. Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity. Academy of Management Journal, 38, 6 (1995), 1573-1592.
    • (1995) Academy of Management Journal , vol.38 , Issue.6 , pp. 1573-1592
    • Sitkin, S.1    Weingart, L.2
  • 79
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. Effective IS security: An empirical study. Information Systems Research, 1, 2 (1990), 255-277.
    • (1990) Information Systems Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 80
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W., and Welke, R.J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22, 4 (1998), 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 82
    • 0031062117 scopus 로고    scopus 로고
    • Perceived risk attitudes: Relating risk perception to risky choice
    • Weber, E., and Milliman, R. Perceived risk attitudes: Relating risk perception to risky choice. Management Science, 43, 2 (1997), 123-145.
    • (1997) Management Science , vol.43 , Issue.2 , pp. 123-145
    • Weber, E.1    Milliman, R.2
  • 83
    • 33845974484 scopus 로고    scopus 로고
    • Enhancing the design of web navigation systems: The influence of user disorientation on engagement and performance
    • Webster, J., and Ahuja, J.S. Enhancing the design of web navigation systems: The influence of user disorientation on engagement and performance. MIS Quarterly, 30, 3 (2006), 661-678.
    • (2006) MIS Quarterly , vol.30 , Issue.3 , pp. 661-678
    • Webster, J.1    Ahuja, J.S.2
  • 84
    • 33745867321 scopus 로고    scopus 로고
    • Do security toolbars actually prevent phishing attacks?
    • R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson (eds.), New York: ACM Press
    • Wu, M.; Miller, R.C.; and Garfinkel, S.L. Do security toolbars actually prevent phishing attacks? In R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson (eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2006.
    • (2006) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    • Wu, M.1    Miller, R.C.2    Garfinkel, S.L.3
  • 86
    • 21044435535 scopus 로고    scopus 로고
    • An empirical investigation of deception behavior in instant messaging
    • Zhou, L. An empirical investigation of deception behavior in instant messaging. IEEE Transactions on Professional Communication, 48, 2 (2005), 147-160.
    • (2005) IEEE Transactions on Professional Communication , vol.48 , Issue.2 , pp. 147-160
    • Zhou, L.1
  • 87


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.