-
1
-
-
0344583648
-
How people watch television as investigated using focus group techniques
-
W. Adams How people watch television as investigated using focus group techniques Journal of Broadcasting & Electronic Media 44 2000 78 94
-
(2000)
Journal of Broadcasting & Electronic Media
, Issue.44
, pp. 78-94
-
-
Adams, W.1
-
3
-
-
0028693130
-
Environmental control of goal directed action: Automatic and strategic contingencies between situation and behavior
-
J.A. Bargh, and P.M. Gollwitzer Environmental control of goal directed action: automatic and strategic contingencies between situation and behavior W.D. Spaulding, Nebraska symposium on motivation 1994 University of Nebraska Press Lincoln 71 124
-
(1994)
Nebraska Symposium on Motivation
, pp. 71-124
-
-
Bargh, J.A.1
Gollwitzer, P.M.2
-
4
-
-
0036721985
-
Cognitive style may mitigate the impact of communication channel
-
R. Barkhi Cognitive style may mitigate the impact of communication channel Information Management 39:8 2002 677
-
(2002)
Information Management
, Issue.8-39
, pp. 677
-
-
Barkhi, R.1
-
5
-
-
36148987716
-
The impact of personality types on purchasing decisions in virtual stores
-
R. Barkhi, and L. Wallace The impact of personality types on purchasing decisions in virtual stores Information Technology and Management 8 4 2007 313 330
-
(2007)
Information Technology and Management
, vol.8
, Issue.4
, pp. 313-330
-
-
Barkhi, R.1
Wallace, L.2
-
7
-
-
84867973432
-
Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
-
F. Belanger, J.S. Hiller, and W.J. Smith Trustworthiness in electronic commerce: the role of privacy, security, and site attributes The Journal of Strategic Information Systems 11 3/4 2002 245 270
-
(2002)
The Journal of Strategic Information Systems
, vol.11
, Issue.3-4
, pp. 245-270
-
-
Belanger, F.1
Hiller, J.S.2
Smith, W.J.3
-
8
-
-
40749083825
-
Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
-
I. Bose, and A.C.M. Leung Unveiling the mask of phishing: threats, preventive measures, and responsibilities Communications of the AIS 19 24 2007 544 566
-
(2007)
Communications of the AIS
, vol.19
, Issue.24
, pp. 544-566
-
-
Bose, I.1
Leung, A.C.M.2
-
9
-
-
53749084373
-
Assessing anti-phishing preparedness: A study of online banks in Hong Kong
-
I. Bose, and A.C.M. Leung Assessing anti-phishing preparedness: a study of online banks in Hong Kong Decision Support Systems 45 4 2008 897 912
-
(2008)
Decision Support Systems
, vol.45
, Issue.4
, pp. 897-912
-
-
Bose, I.1
Leung, A.C.M.2
-
10
-
-
84988266348
-
What Drives the Adoption of Anti-phishing Measures by Hong King Banks
-
I. Bose and A.C.M. Leung. What Drives the Adoption of Anti-phishing Measures by Hong King Banks, Communications of the ACM 52 (8), 2009 141-143.
-
(2009)
Communications of the ACM
, vol.52
, Issue.8
, pp. 141-143
-
-
Bose, I.1
Leung, A.C.M.2
-
11
-
-
9744258059
-
Inducing sensitivity to deception in order to improve decision making performance: A field study
-
D.P. Brios, J.F. George, and R.W. Zmund Inducing sensitivity to deception in order to improve decision making performance: a field study MIS Quarterly 26 2002 119 144
-
(2002)
MIS Quarterly
, Issue.26
, pp. 119-144
-
-
Brios, D.P.1
George, J.F.2
Zmund, R.W.3
-
14
-
-
49149116092
-
Computer self efficacy: Development of a measure and initial test
-
D. Compeau, and C. Higgins Computer self efficacy: development of a measure and initial test MIS Quarterly 19 1995 189 211
-
(1995)
MIS Quarterly
, Issue.19
, pp. 189-211
-
-
Compeau, D.1
Higgins, C.2
-
15
-
-
33845307462
-
The reflex arc concept in psychology
-
J. Dewey The reflex arc concept in psychology Psychological Review 3 1896 357 370
-
(1896)
Psychological Review
, Issue.3
, pp. 357-370
-
-
Dewey, J.1
-
16
-
-
33745816410
-
Why phishing works
-
R. Dhamija, J.D. Tygar, and M. Hearst Why phishing works Conference on Human Factors in Computing Systems, CHI-2006, Montreal, Quebec, Canada 2006
-
(2006)
Conference on Human Factors in Computing Systems, CHI-2006, Montreal, Quebec, Canada
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
20
-
-
0042709232
-
Assessing causality in the cognitive mediation model: A panel study of motivations, information processing, and learning during campaign 2000
-
DOI 10.1177/0093650203253369
-
W.P. Eveland, D.V. Shah, and N. Kwak Assessing causality in the cognitive mediation model: a panel study of motivations, information processing, and learning during campaign 2000 Communication Research 30 2003 359 386 (Pubitemid 36946152)
-
(2003)
Communication Research
, vol.30
, Issue.4
, pp. 359-386
-
-
Eveland Jr., W.P.1
Shah, D.V.2
Kwak, N.3
-
21
-
-
0042331985
-
Ad mediation: New horizons in effective email advertising
-
R. Gopal, Z. Walter, and A. Tripathi Ad mediation: new horizons in effective email advertising Communications of the ACM 44 2 2001 91 96
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 91-96
-
-
Gopal, R.1
Walter, Z.2
Tripathi, A.3
-
22
-
-
3843130753
-
Where did they go wrong? An analysis of the failure of knowledgeable Internet consumers to detect deception over the internet
-
DOI 10.1023/B:GRUP.0000021839.04093.5d
-
S. Grazioli Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the internet Group Decision and Negotiation 13 2 2004 149 172 (Pubitemid 39045882)
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.2
, pp. 149-172
-
-
Grazioli, S.1
-
23
-
-
4544220415
-
Risk profile and consumer shopping behavior in electronic and traditional channels
-
A. Gupta, B.-C. Su, and Z. Walter Risk profile and consumer shopping behavior in electronic and traditional channels Decision Support Systems 38 3 2004 347 367
-
(2004)
Decision Support Systems
, vol.38
, Issue.3
, pp. 347-367
-
-
Gupta, A.1
Su, B.-C.2
Walter, Z.3
-
24
-
-
0036415080
-
Structural Equation Modeling in the Communication Sciences, 1995-2000
-
DOI 10.1093/hcr/28.4.531
-
R.L. Holbert, and M.T. Stephenson Structural equation modeling in the communication sciences, 1995-2000 Human Communication Research 28 2002 531 551 (Pubitemid 37496218)
-
(2002)
Human Communication Research
, vol.28
, Issue.4
, pp. 531-551
-
-
Holbert, R.L.1
Stephenson, M.T.2
-
25
-
-
34848911641
-
Social phishing
-
DOI 10.1145/1290958.1290968, 1290968
-
T. Jagatic, N. JohnSon, M. Jakobsson, and F. Menczer Social phishing Communications of the ACM 50 10 2007 94 100 (Pubitemid 47505005)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
27
-
-
51849146436
-
What instills trust? A qualitative study of phishing
-
M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y.-K. Lim What instills trust? A qualitative study of phishing Usable Security (USEC'07), Lowlands, Scarborough, Trinidad/Tobago 2007
-
(2007)
Usable Security (USEC'07), Lowlands, Scarborough, Trinidad/Tobago
-
-
Jakobsson, M.1
Tsow, A.2
Shah, A.3
Blevis, E.4
Lim, Y.-K.5
-
30
-
-
84890731603
-
-
Carnegie Mellon University
-
P. Kamaraguru, Y.W. Rhee, A. Acquisti, L. Cranor, E. Hong, and E. Nunge Protecting people from phishing: The design and evaluation of an embedded training email system 2006 Carnegie Mellon University
-
(2006)
Protecting People from Phishing: The Design and Evaluation of An Embedded Training Email System
-
-
Kamaraguru, P.1
Rhee, Y.W.2
Acquisti, A.3
Cranor, L.4
Hong, E.5
Nunge, E.6
-
32
-
-
33646516565
-
A social cognitive theory of Internet uses and gratifications: Toward a new model of media attendance
-
R. LaRose, and M.S. Eastin A social cognitive theory of Internet uses and gratifications: toward a new model of media attendance Journal of Broadcasting & Electronic Media 48 2004 358 377
-
(2004)
Journal of Broadcasting & Electronic Media
, Issue.48
, pp. 358-377
-
-
Larose, R.1
Eastin, M.S.2
-
33
-
-
0042074089
-
Unregulated Internet usage: Addiction, habit, or deficient self-regulation?
-
R. LaRose, C.A. Lin, and M.S. Eastin Unregulated internet usage: addiction, habit or deficient self-regulation? Media Psychology 2003 225 253 (Pubitemid 36964261)
-
(2003)
Media Psychology
, vol.5
, Issue.3
, pp. 225-253
-
-
LaRose, R.1
Lin, C.A.2
Eastin, M.S.3
-
35
-
-
0000778441
-
The cognitive perspective in social psychology
-
H. Markus, and R.B. Zajonc The cognitive perspective in social psychology G. Lindzey, E. Aronson, The handbook of social psychology 1985 Random House New York 137 230
-
(1985)
The Handbook of Social Psychology
, pp. 137-230
-
-
Markus, H.1
Zajonc, R.B.2
-
37
-
-
33847694241
-
The effects of electronic monitoring type on procedural justice, interpersonal justice, and privacy
-
L.A. McNall, and S.G. Roch The effects of electronic monitoring type on procedural justice, interpersonal justice, and privacy Journal of Applied Social Psychology 37 2007 658 682
-
(2007)
Journal of Applied Social Psychology
, Issue.37
, pp. 658-682
-
-
McNall, L.A.1
Roch, S.G.2
-
38
-
-
84965682854
-
Audience selectivity and involvement in the newer media environment
-
E.M. Perse Audience selectivity and involvement in the newer media environment Communication Research 17 1990 675 697
-
(1990)
Communication Research
, Issue.17
, pp. 675-697
-
-
Perse, E.M.1
-
40
-
-
0000428577
-
Central and peripheral routes to advertising effectiveness: The moderating role of involvement
-
R.E. Petty, J.T., C., and D. Schumann Central and peripheral routes to advertising effectiveness: the moderating role of involvement The Journal of Consumer Research 10 2 1983 135 146
-
(1983)
The Journal of Consumer Research
, vol.10
, Issue.2
, pp. 135-146
-
-
R.E. Petty1
J.T.C.D. Schumann2
-
41
-
-
0010947733
-
Learning strategies: A theoretical perspective
-
J.W. Rigney Learning strategies: a theoretical perspective H.F. O'Neill Jr. Learning strategies 1978 Academic Press New York 165 205
-
(1978)
Learning Strategies
, pp. 165-205
-
-
Rigney, J.W.1
-
43
-
-
4043114236
-
The interplay of news frames on cognitive complexity
-
DOI 10.1093/hcr/30.1.102
-
D.V. Shah, N. Kwak, M. Schmierbach, and J. Zubric The interplay of news frames on cognitive complexity Human Communication Research 30 2004 102 120 (Pubitemid 39056977)
-
(2004)
Human Communication Research
, vol.30
, Issue.1
, pp. 102-120
-
-
Shah, D.V.1
Kwak, N.2
Schmierbach, M.3
Zubric, J.4
-
45
-
-
84878277951
-
An empirical exploration of the design pattern of phishing attacks
-
S.J. Upadhyaya, H.R. Rao, Emerald Publishers
-
J. Wang, R. Chen, T. Herath, and H.R. Rao An empirical exploration of the design pattern of phishing attacks S.J. Upadhyaya, H.R. Rao, Annals of emerging research in information assurance, security and privacy services 2009 Emerald Publishers
-
(2009)
Annals of Emerging Research in Information Assurance, Security and Privacy Services
-
-
Wang, J.1
Chen, R.2
Herath, T.3
Rao, H.R.4
-
46
-
-
39749142244
-
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
-
DOI 10.1002/asi.20779
-
M. Workman Wisecrackers: a theory grounded investigation of phishing and pretext social engineering threats to information security Journal of the American Society of Information Science and Technology 59 2007 662 674 (Pubitemid 351310585)
-
(2008)
Journal of the American Society for Information Science and Technology
, vol.59
, Issue.4
, pp. 662-674
-
-
Workman, M.1
-
47
-
-
39749142244
-
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
-
DOI 10.1002/asi.20779
-
M. Workman Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security Journal of the American Society for Information Science and Technology 59 4 2008 662 674 (Pubitemid 351310585)
-
(2008)
Journal of the American Society for Information Science and Technology
, vol.59
, Issue.4
, pp. 662-674
-
-
Workman, M.1
|