-
1
-
-
33645003633
-
Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use
-
Ahuja, M.K., and Thatcher, J.B. Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 3 (2005), 427-459.
-
(2005)
MIS Quarterly
, vol.29
, Issue.3
, pp. 427-459
-
-
Ahuja, M.K.1
Thatcher, J.B.2
-
2
-
-
19744380329
-
Spamming Phishing authentication, and privacy
-
Bellovin, S.M. Spamming, phishing, authentication, and privacy. Communications of the ACM, 47, 12 (2004), 144.
-
(2004)
Communications of the ACM
, vol.47
, Issue.12
, pp. 144
-
-
Bellovin, S.M.1
-
3
-
-
33745186426
-
Phishing mongers and posers
-
Berghel, H. Phishing mongers and posers. Communications of the ACM, 49, 4 (2006), 21-25.
-
(2006)
Communications of the ACM
, vol.49
, Issue.4
, pp. 21-25
-
-
Berghel, H.1
-
4
-
-
9744258059
-
Inducing sensitivity to deception in order to improve decision making performance: A field study
-
Biros, D.; George, J.; and Zmud, R. Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Quarterly, 26, 2 (2002), 119-144.
-
(2002)
MIS Quarterly
, vol.26
, Issue.2
, pp. 119-144
-
-
Biros, D.1
George, J.2
Zmud, R.3
-
5
-
-
33748475729
-
Accuracy of deception judgments
-
Bond, C.F., and DePaulo, B.M. Accuracy of deception judgments. Personality and Social Psychology Review, 10, 3 (2006), 214-234.
-
(2006)
Personality and Social Psychology Review
, vol.10
, Issue.3
, pp. 214-234
-
-
Bond, C.F.1
De Paulo, B.M.2
-
7
-
-
0030201356
-
Interpersonal deception theory
-
Buller, D., and Burgoon, J.K. Interpersonal deception theory. Communication Theory, 6, 3 (1996), 203-242.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.1
Burgoon, J.K.2
-
8
-
-
0942280323
-
Communication and trust under face-to-face and mediated conditions: Implications for leading from a distance
-
S. Weisband and L. Atwater (eds.), Mahwah, NJ: Lawrence Erlbaum
-
Burgoon, J.; Bonito, J.; and Kam, K. Communication and trust under face-to-face and mediated conditions: Implications for leading from a distance. In S. Weisband and L. Atwater (eds.), Leadership at a Distance. Mahwah, NJ: Lawrence Erlbaum, 2004.
-
(2004)
Leadership at A Distance
-
-
Burgoon, J.1
Bonito, J.2
Kam, K.3
-
9
-
-
84958361681
-
Interpersonal deception: V. Accuracy in deception detection
-
Burgoon, J.; Buller, D.; Ebesu, A.; and Rockwell, P. Interpersonal deception: V. Accuracy in deception detection. Communication Monographs, 61, 4 (1994), 303-325.
-
(1994)
Communication Monographs
, vol.61
, Issue.4
, pp. 303-325
-
-
Burgoon, J.1
Buller, D.2
Ebesu, A.3
Rockwell, P.4
-
10
-
-
3843138191
-
Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity
-
Carlson, J.R., and George, J. Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity. Group Decision and Negotiation, 13, 2 (2004), 191-210.
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.2
, pp. 191-210
-
-
Carlson, J.R.1
George, J.2
-
11
-
-
0033241819
-
Channel expansion theory and the experiential nature of media richness perceptions
-
Carlson, J.R., and Zmud, R. Channel expansion theory and the experiential nature of media richness perceptions. Academy of Management Review, 42, 2 (1999), 153-170.
-
(1999)
Academy of Management Review
, vol.42
, Issue.2
, pp. 153-170
-
-
Carlson, J.R.1
Zmud, R.2
-
12
-
-
3843149546
-
Deception in computer-mediated communication
-
Carlson, J.R.; George, J.F.; Burgoon, J.K.; Adkins, M.; and White, C.H. Deception in computer-mediated communication. Group Decision and Negotiation, 13, 1 (2004), 5-28.
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.1
, pp. 5-28
-
-
Carlson, J.R.1
George, J.F.2
Burgoon, J.K.3
Adkins, M.4
White, C.H.5
-
13
-
-
44249095130
-
Online reverse auctions and the dynamics of trust
-
Spring
-
Charki, M., and Josserand, E. Online reverse auctions and the dynamics of trust. Journal of Management Information Systems, 24, 4 (Spring 2008), 175-197.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 175-197
-
-
Charki, M.1
Josserand, E.2
-
14
-
-
21344456569
-
Application of social cognitive theory to training for computer skills
-
Compeau, D.R., and Higgins, C.A. Application of social cognitive theory to training for computer skills. Information Systems Research, 6, 2 (1995), 118-143.
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 118-143
-
-
Compeau, D.R.1
Higgins, C.A.2
-
15
-
-
49149116092
-
Computer self-efficacy: Development of a measure and initial test
-
Compeau, D.R., and Higgins, C.A. Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19, 2 (1995), 189-211.
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 189-211
-
-
Compeau, D.R.1
Higgins, C.A.2
-
16
-
-
0042929813
-
Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality
-
Summer
-
Cooper, R., and Kahai, S. Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality. Journal of Management Information Systems, 20, 1 (Summer 2003), 263-299.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 263-299
-
-
Cooper, R.1
Kahai, S.2
-
17
-
-
50249186432
-
Media tasks, and communication processes: A theory of media synchronicity
-
Dennis, A.R.; Fuller, R.M.; and Valacich, J.S. Media, tasks, and communication processes: A theory of media synchronicity. MIS Quarterly, 32, 3 (2008), 575-600.
-
(2008)
MIS Quarterly
, vol.32
, Issue.3
, pp. 575-600
-
-
Dennis, A.R.1
Fuller, R.M.2
Valacich, J.S.3
-
18
-
-
85047693720
-
Cues to deception
-
DePaulo, B.; Lindsay, J.J.; Malone, B.E.; Muhlenbruck, L.; Charlton, K.; and Cooper, H. Cues to deception. Psychological Bulletin, 129, 1 (2003), 74-118.
-
(2003)
Psychological Bulletin
, vol.129
, Issue.1
, pp. 74-118
-
-
De Paulo, B.1
Lindsay, J.J.2
Malone, B.E.3
Muhlenbruck, L.4
Charlton, K.5
Cooper, H.6
-
19
-
-
33745816410
-
Why phishing works
-
R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson (eds.), New York: ACM Press
-
Dhamija, R.; Tygar, J.D.; and Hearst, M. Why phishing works. In R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson (eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2006, pp. 581-590.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
20
-
-
33645785886
-
Internet privacy concerns and social awareness as determinants of intention to transact
-
Winter
-
Dinev, T., and Hart, P. Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10, 2 (Winter 2005-2006), 7-29.
-
International Journal of Electronic Commerce
, vol.10
, Issue.2
, pp. 2005-2006
-
-
Dinev, T.1
Hart, P.2
-
22
-
-
0001727581
-
Voice, and body in detecting deceit
-
Ekman, P.; O'Sullivan, M.; Friesen, W.; and Scherer, K. Face, voice, and body in detecting deceit. Journal of Nonverbal Behavior, 15, 2 (1991), 125-135.
-
(1991)
Journal of Nonverbal Behavior
, vol.15
, Issue.2
, pp. 125-135
-
-
Ekman, P.1
O'Sullivan, M.2
Friesen, W.3
Face, S.K.4
-
23
-
-
33748583750
-
How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store
-
Everard, A., and Galletta, D.F. How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store. Journal of Management Information Systems, 22, 3 (2005), 55-95.
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.3
, pp. 55-95
-
-
Everard, A.1
Galletta, D.F.2
-
24
-
-
77955027818
-
Security expert: User education is pointless
-
available at
-
Evers, J. Security expert: User education is pointless. CNET News, 2009 (available at http://news.cnet.com/2100-7350-3-6125213.html).
-
(2009)
CNET News
-
-
Evers, J.1
-
25
-
-
0141889707
-
Predicting e-services adoption: A perceived risk facets perspective
-
Featherman, M.S., and Pavlou, P.A. Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59, 4 (2003), 451-474.
-
(2003)
International Journal of Human-Computer Studies
, vol.59
, Issue.4
, pp. 451-474
-
-
Featherman, M.S.1
Pavlou, P.A.2
-
26
-
-
0000009769
-
Evaluating structural equations models with unobservable variables and measurement error
-
Fornell, C., and Larcker, D.F. Evaluating structural equations models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (1981), 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
27
-
-
33751538239
-
Detecting phishing Web pages with visual similarity assessment based on earth mover's distance (EMD)
-
Fu, A.Y.; Wenyin, L.; and Deng, X.T. Detecting phishing Web pages with visual similarity assessment based on earth mover's distance (EMD). IEEE Transactions on Dependable and Secure Computing, 3, 4 (2006), 301-311.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Wenyin, L.2
Deng, X.T.3
-
28
-
-
51449095277
-
A cognitive map of people's online risk perceptions and attitudes: An empirical study
-
R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press available at
-
Gabrieal, I.J., and Nyshadham, E. A cognitive map of people's online risk perceptions and attitudes: An empirical study. In R.H. Sprague (ed.), Proceedings of the 41st Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2008 (available at www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2008.6).
-
(2008)
Proceedings of the 41st Annual Hawaii International Conference on System Sciences
-
-
Gabrieal, I.J.1
Nyshadham, E.2
-
29
-
-
77955032613
-
-
Gartner survey shows phishing attacks escalated in 2007 Press Release Gartner, Stamford, CT, December 17, 2007 available at
-
Gartner survey shows phishing attacks escalated in 2007; More than $3 billion lost to these attacks. Press Release Gartner, Stamford, CT, December 17, 2007 (available at www .gartner.com/it/page.jsp?id=565125).
-
More Than $3billion Lost to These Attacks
-
-
-
30
-
-
44249097827
-
A research agenda for trust in online environments
-
Spring
-
Gefen, D.; Benbasat, I.; and Pavlou, P. A research agenda for trust in online environments. Journal of Management Information Systems, 24, 4 (Spring 2008), 275-286.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 275-286
-
-
Gefen, D.1
Benbasat, I.2
Pavlou, P.3
-
31
-
-
0001178032
-
Structural equation modeling and regression: Guidelines for research practice
-
Gefen, D.; Straub, D.; and Boudreau, M. Structural equation modeling and regression: Guidelines for research practice. Communications of the AIS, 4, 7 (2000), 1-77.
-
(2000)
Communications of the AIS
, vol.4
, Issue.7
, pp. 1-77
-
-
Gefen, D.1
Straub, D.2
Boudreau, M.3
-
32
-
-
0032738937
-
Group support systems and deceptive communications
-
R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press
-
George, J.F., and Carlson, J.R. Group support systems and deceptive communications. In R.H. Sprague (ed.), Proceedings of the 32nd Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 1999, pp. 1-10.
-
(1999)
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences
, pp. 1-10
-
-
George, J.F.1
Carlson, J.R.2
-
34
-
-
77955035009
-
-
Gone phishing . . . A brief on anti-phishing exercise. New York State Office of Cyber Security & Critical Infrastructure Coordination New York 2005
-
Gone phishing . . . A brief on anti-phishing exercise. New York State Office of Cyber Security & Critical Infrastructure Coordination, New York, 2005.
-
-
-
-
35
-
-
85008020099
-
Phishing attacks rising, but dollar losses down
-
Goth, G. Phishing attacks rising, but dollar losses down. IEEE Security & Privacy, 3, 1 (2005), 8.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 8
-
-
Goth, G.1
-
36
-
-
0034226904
-
Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers
-
Grazioli, S., and Jarvenpaa, S. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on System, Man, and Cybernetics, 30, 4 (2000), 395-410.
-
(2000)
IEEE Transactions on System Man and Cybernetics
, vol.30
, Issue.4
, pp. 395-410
-
-
Grazioli, S.1
Jarvenpaa, S.2
-
37
-
-
3142664237
-
Consumer and business deception on the Internet: Content analysis of documentary evidence
-
Summer
-
Grazioli, S., and Jarvenpaa, S. Consumer and business deception on the Internet: Content analysis of documentary evidence. International Journal of Electronic Commerce, 7, 4 (Summer 2003), 93-118.
-
(2003)
International Journal of Electronic Commerce
, vol.7
, Issue.4
, pp. 93-118
-
-
Grazioli, S.1
Jarvenpaa, S.2
-
38
-
-
0000384380
-
The college sophomore as guinea pig: Setting the record straight
-
Greenberg, J. The college sophomore as guinea pig: Setting the record straight. Academy of Management Review, 12, 1 (1987), 157-159.
-
(1987)
Academy of Management Review
, vol.12
, Issue.1
, pp. 157-159
-
-
Greenberg, J.1
-
39
-
-
33846261912
-
Persuasion in recommender systems
-
Winter
-
Gretzel, U., and Fesenmaier, D.R. Persuasion in recommender systems. International Journal of Electronic Commerce, 11, 2 (Winter 2006-2007), 81-100.
-
(2006)
International Journal of Electronic Commerce
, vol.11
, Issue.2
, pp. 81-100
-
-
Gretzel, U.1
Fesenmaier, D.R.2
-
40
-
-
0033092817
-
Where do interorganizational networks come from?
-
Gulati, R., and Gargiulo, M. Where do interorganizational networks come from? American Journal of Sociology, 104, 1 (1999), 1439-1493.
-
(1999)
American Journal of Sociology
, vol.104
, Issue.1
, pp. 1439-1493
-
-
Gulati, R.1
Gargiulo, M.2
-
41
-
-
0003506109
-
-
Englewood Cliffs NJ: Prentice Hall
-
Hair, J.F., Jr.; Anderson, R.E.; Tatham, R.L.; and Black, W.C. Multivariate Data Analysis with Readings. Englewood Cliffs, NJ: Prentice Hall, 1998.
-
(1998)
Multivariate Data Analysis with Readings
-
-
Hair Jr., J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
42
-
-
33746180827
-
Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness
-
Winter
-
Hess, T.; Fuller, M.; and Mathew, J. Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness. Journal of Management Information Systems, 22, 3 (Winter 2005-2006), 15-54.
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.3
, pp. 15-54
-
-
Hess, T.1
Fuller, M.2
Mathew, J.3
-
43
-
-
0041540817
-
Building consumer trust online
-
Hoffman, D., Novak, T., and Peralta, M. Building consumer trust online. Communications of the ACM, 42, 4 (1999), 80-85.
-
(1999)
Communications of the ACM
, vol.42
, Issue.4
, pp. 80-85
-
-
Hoffman, D.1
Novak, T.2
Peralta, M.3
-
44
-
-
40749113599
-
Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged
-
Hsieh, J.J.P.-A.; Rai, A.; and Keil, M. Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. MIS Quarterly, 32, 1 (2008), 97-126.
-
(2008)
MIS Quarterly
, vol.32
, Issue.1
, pp. 97-126
-
-
Hsieh, J.J.P.-A.1
Rai, A.2
Keil, M.3
-
45
-
-
0037550861
-
Students as surrogates for managers in a decision-making environment: An experimental study
-
Fall
-
Hughes, C., and Gibson, M.L. Students as surrogates for managers in a decision-making environment: An experimental study. Journal of Management Information Systems, 8, 2 (Fall 1991), 153-166.
-
(1991)
Journal of Management Information Systems
, vol.8
, Issue.2
, pp. 153-166
-
-
Hughes, C.1
Gibson, M.L.2
-
46
-
-
34848911641
-
Social phishing
-
Jagatic, T.N.; Johnson, N.A.; Jakobsson, M.; and Menczer, F. Social phishing. Communications of the ACM, 50, 10 (2007), 94-100.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
47
-
-
20544431696
-
Consumer reactions to electronic shopping on the World Wide Web
-
Fall
-
Jarvenpaa, S.L., and Todd, P. Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 2, 1 (Fall 1997), 59-88.
-
(1997)
International Journal of Electronic Commerce
, vol.2
, Issue.1
, pp. 59-88
-
-
Jarvenpaa, S.L.1
Todd, P.2
-
48
-
-
0002135118
-
Consumer trust in an Internet store: A cross-cultural validation
-
Jarvenpaa, S.L.; Tractinsky, N.; and Saarinen, L. Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5, 2 (2000), 45-71.
-
(2000)
Journal of Computer-Mediated Communication
, vol.5
, Issue.2
, pp. 45-71
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
Saarinen, L.3
-
50
-
-
0011409951
-
Employment interview research: Internal and external validity
-
R.W. Eeder and G.R. Ferris (eds.), Newbury Park, CA: Sage
-
Kacmar, M.; Ratcliff, S.; and Ferris, G. Employment interview research: Internal and external validity. In R.W. Eeder and G.R. Ferris (eds.), The Employment Interview: Theory, Research, and Practice. Newbury Park, CA: Sage, 1989, 32-42.
-
(1989)
The Employment Interview: Theory, Research, and Practice
, pp. 32-42
-
-
Kacmar, M.1
Ratcliff, S.2
Ferris, G.3
-
52
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email systems
-
B. Begole, S. Payne, E. Churchill, R. St. Amant D. Gilmore, and M.B. Rosson (eds.), New York: ACM Press
-
Kumaraguru, P.; Rhee, Y.; Acquisti, A.; Cranor, L.; Hong, J.; and Nunge, E. Protecting people from phishing: The design and evaluation of an embedded training email systems. In B. Begole, S. Payne, E. Churchill, R. St. Amant, D. Gilmore, and M.B. Rosson (eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2007.
-
(2007)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
Nunge, E.6
-
53
-
-
33749381192
-
Gone phishing
-
Larcom, G., and Elbirt, A.J. Gone phishing. IEEE Technology and Society Magazine, 25, 3 (2006), 52-55.
-
(2006)
IEEE Technology and Society Magazine
, vol.25
, Issue.3
, pp. 52-55
-
-
Larcom, G.1
Elbirt, A.J.2
-
54
-
-
0032376858
-
Trust and distrust: New relationships and realities
-
Lewicki, R.; McAllister, D.; and Bies, R. Trust and distrust: New relationships and realities. Academy of Management Review, 23, 3 (1998), 438-458.
-
(1998)
Academy of Management Review
, vol.23
, Issue.3
, pp. 438-458
-
-
Lewicki, R.1
McAllister, D.2
Bies, R.3
-
55
-
-
33645131523
-
An antiphishing strategy based on visual similarity assessment
-
Liu, W.; Deng, X.; Huang, G.; and Fu, A.Y. An antiphishing strategy based on visual similarity assessment. IEEE Internet Computing, 10, 2 (2006), 58-65.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Deng, X.2
Huang, G.3
Fu, A.Y.4
-
56
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
Malhotra, N.K.; Kim, S.S.; and Agarwal, J. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (2004), 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
57
-
-
0042495505
-
An integrative model of organizational trust
-
Mayer, R.C.; Davis, J.H.; and Schoorman, F.D. An integrative model of organizational trust. Academy of Management Review, 20, 3 (1995), 709-734.
-
(1995)
Academy of Management Review
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
58
-
-
0037660095
-
What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology
-
Winter
-
McKnight, D.H., and Chervany, N. What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6, 2 (Winter 2001-2002), 35-59.
-
(2001)
International Journal of Electronic Commerce
, vol.6
, Issue.2
, pp. 35-59
-
-
McKnight, D.H.1
Chervany, N.2
-
59
-
-
0036737236
-
Developing and validating trust measures for e-commerce: An integrative typology
-
McKnight, D.H.; Choudhury, V.; and Kacmar, C. Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13, 3 (2002), 334-359.
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 334-359
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
60
-
-
33749643640
-
Dispositional trust and distrust distinctions in predicting high- and low-risk Internet expert advice site perceptions
-
McKnight, D.H.; Kacmar, C.; and Choudhury, V. Dispositional trust and distrust distinctions in predicting high- and low-risk Internet expert advice site perceptions. e-Service Journal, 3, 2 (2004), 35-58.
-
(2004)
E-Service Journal
, vol.3
, Issue.2
, pp. 35-58
-
-
McKnight, D.H.1
Kacmar, C.2
Choudhury, V.3
-
61
-
-
84969508865
-
Whoops . . . Did i use the wrong construct to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts
-
R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press, 2003 available at
-
McKnight, D.H.; Kacmar, C.; and Choudhury, V. Whoops . . . Did I use the wrong construct to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts. In R.H. Sprague (ed.), Proceedings of the 36th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2003 (available at www .hicss.hawaii.edu/ HICSS36/HICSSpapers/INCRM04.pdf).
-
Proceedings of the 36th Annual Hawaii International Conference on System Sciences
-
-
McKnight, D.H.1
Kacmar, C.2
Choudhury, V.3
-
62
-
-
0009925685
-
Initial trust formation in new organizational relationships
-
McKnight, H.; Cummings, L.L.; and Chervany, N. Initial trust formation in new organizational relationships. Academy of Management Review, 23, 3 (1998), 473-490.
-
(1998)
Academy of Management Review
, vol.23
, Issue.3
, pp. 473-490
-
-
McKnight, H.1
Cummings, L.L.2
Chervany, N.3
-
65
-
-
0002436931
-
Goodness of fit with categorical and other non-normal variables
-
K.A. Bollen and J.S. Long (eds.), Newbury Park, CA: Sage
-
Muthen, B. Goodness of fit with categorical and other non-normal variables. In K.A. Bollen and J.S. Long (eds.), Testing Structural Equation Models. Newbury Park, CA: Sage, 1993, 205-243.
-
(1993)
Testing Structural Equation Models
, pp. 205-243
-
-
Muthen, B.1
-
67
-
-
27544507917
-
Using distraction-conflict theory to measure the effects of distractions on individual task performance in a wireless mobile environment
-
R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press available at
-
Nicholson, D.; Nicholson, J.; Parboteeah, V.; and Valacich, J. Using distraction-conflict theory to measure the effects of distractions on individual task performance in a wireless mobile environment. In R.H. Sprague (ed.), Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2005 (available at www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2005.657).
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
-
-
Nicholson, D.1
Nicholson, J.2
Parboteeah, V.3
Valacich, J.4
-
69
-
-
0036332903
-
How people really detect lies
-
Park, H.S.; Levine, T.; McCornack, S.; Morrison, K.; and Ferrara, M. How people really detect lies. Communication Monographs, 69, 2 (2002), 144-157.
-
(2002)
Communication Monographs
, vol.69
, Issue.2
, pp. 144-157
-
-
Park, H.S.1
Levine, T.2
McCornack, S.3
Morrison, K.4
Ferrara, M.5
-
70
-
-
34548344520
-
-
Anti-Phishing Working Group. Chicago
-
Phishing activity trends report. Anti-Phishing Working Group. Chicago, 2006.
-
(2006)
Phishing Activity Trends Report
-
-
-
71
-
-
77955045302
-
Protecting against phishing by implementing strong two-factor authentication
-
RSA Security, Bedford, MA
-
Protecting against phishing by implementing strong two-factor authentication. White Paper, RSA Security, Bedford, MA, 2008.
-
(2008)
White Paper
-
-
-
72
-
-
0033892833
-
The impact of involuntary cues on media effects
-
R.H. Sprague (ed.), Los Alamitos, CA: IEEE Computer Society Press
-
Rao, S., and Lim, J. The impact of involuntary cues on media effects. In R.H. Sprague (ed.), Proceedings of the 33rd Annual Hawaii International Conference of System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2000.
-
(2000)
Proceedings of the 33rd Annual Hawaii International Conference of System Sciences
-
-
Rao, S.1
Lim, J.2
-
73
-
-
61349088607
-
Using self-regulatory learning to enhance e-learning-based information technology training
-
Santhanam, R.; Sasidharan, S.; and Webster, J. Using self-regulatory learning to enhance e-learning-based information technology training. Information Systems Research, 19, 1 (2008), 26-47.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 26-47
-
-
Santhanam, R.1
Sasidharan, S.2
Webster, J.3
-
74
-
-
60649113812
-
Anti-phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
-
L.F. Cranor (ed.), New York: ACM Press
-
Sheng, S.; Magnien, B.; Kumaraguru, P.; Acquisti, A.; Cranor, L.F.; Hong, J.; and Nunge, E. Anti-phishing Phil: The design and evaluation of a game that teaches people not to fall for phish. In L.F. Cranor (ed.), Proceedings of the Third Symposium on Usable Privacy and Security (SOUPS). New York: ACM Press, 2007.
-
(2007)
Proceedings of the Third Symposium on Usable Privacy and Security (SOUPS)
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
75
-
-
0002180672
-
Reconceptualizing the determinants of risk behavior
-
Sitkin, S., and Pablo, A. Reconceptualizing the determinants of risk behavior. Academy of Management Review, 17, 1 (1992), 9-38.
-
(1992)
Academy of Management Review
, vol.17
, Issue.1
, pp. 9-38
-
-
Sitkin, S.1
Pablo, A.2
-
76
-
-
21844524600
-
Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity
-
Sitkin, S., and Weingart, L. Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity. Academy of Management Journal, 38, 6 (1995), 1573-1592.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.6
, pp. 1573-1592
-
-
Sitkin, S.1
Weingart, L.2
-
78
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J.M.; Stam, K.R.; Mastrangelo, P.; and Jolton, J. Analysis of end user security behaviors. Computers & Security, 24, 2 (2005), 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
79
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. Effective IS security: An empirical study. Information Systems Research, 1, 2 (1990), 255-277.
-
(1990)
Information Systems Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
80
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W., and Welke, R.J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22, 4 (1998), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
82
-
-
0031062117
-
Perceived risk attitudes: Relating risk perception to risky choice
-
Weber, E., and Milliman, R. Perceived risk attitudes: Relating risk perception to risky choice. Management Science, 43, 2 (1997), 123-145.
-
(1997)
Management Science
, vol.43
, Issue.2
, pp. 123-145
-
-
Weber, E.1
Milliman, R.2
-
83
-
-
33845974484
-
Enhancing the design of web navigation systems: The influence of user disorientation on engagement and performance
-
Webster, J., and Ahuja, J.S. Enhancing the design of web navigation systems: The influence of user disorientation on engagement and performance. MIS Quarterly, 30, 3 (2006), 661-678.
-
(2006)
MIS Quarterly
, vol.30
, Issue.3
, pp. 661-678
-
-
Webster, J.1
Ahuja, J.S.2
-
84
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson (eds.), New York: ACM Press
-
Wu, M.; Miller, R.C.; and Garfinkel, S.L. Do security toolbars actually prevent phishing attacks? In R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson (eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2006.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
85
-
-
33947397191
-
Predicting user concerns about online privacy
-
Yao, M.Z.; Rice, R.E.; and Wallis, K. Predicting user concerns about online privacy. Journal of the American Society for Information Science & Technology, 58, 5 (2007), 710-722.
-
(2007)
Journal of the American Society for Information Science & Technology
, vol.58
, Issue.5
, pp. 710-722
-
-
Yao, M.Z.1
Rice, R.E.2
Wallis, K.3
-
86
-
-
21044435535
-
An empirical investigation of deception behavior in instant messaging
-
Zhou, L. An empirical investigation of deception behavior in instant messaging. IEEE Transactions on Professional Communication, 48, 2 (2005), 147-160.
-
(2005)
IEEE Transactions on Professional Communication
, vol.48
, Issue.2
, pp. 147-160
-
-
Zhou, L.1
-
87
-
-
3142747644
-
A comparison of classification methods for predicting deception in computer-mediated communication
-
Spring
-
Zhou, L.; Burgoon, J.K.; Twitchell, D.P.; Qin, T.; and Nunamaker, J.R., Jr. A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20, 4 (Spring 2004), 139-166.
-
(2004)
Journal of Management Information Systems
, vol.20
, Issue.4
, pp. 139-166
-
-
Zhou, L.1
Burgoon, J.K.2
Twitchell, D.P.3
Qin, T.4
Nunamaker Jr., J.R.5
|