메뉴 건너뛰기




Volumn 57, Issue 9, 2014, Pages 72-80

The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER APPLICATIONS;

EID: 84906706163     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/2629612     Document Type: Article
Times cited : (100)

References (31)
  • 1
    • 84906672306 scopus 로고    scopus 로고
    • Pew Internet & American Life Project, Washington, D.C., Aug.
    • Brenner, J. and Smith, A. 72% of Online Adults are Social Networking Site Users. Pew Internet & American Life Project, Washington, D.C., Aug. 5, 2013; http://pewinternet.org/Reports/2013/socialnetworking-sites.aspx
    • 72% of Online Adults are Social Networking Site Users , vol.5 , pp. 2013
    • Brenner, J.1    Smith, A.2
  • 2
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • Aug.
    • Buller, D.B. and Burgoon, J.K. Interpersonal deception theory. Communication Theory 6, 3 (Aug. 1996), 203-242.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.B.1    Burgoon, J.K.2
  • 7
    • 79960710443 scopus 로고    scopus 로고
    • Maximising opportunities to detect verbal deception: Training police officers to interview tactically
    • (July
    • Dando, C.J. and Bull, R. Maximising opportunities to detect verbal deception: Training police officers to interview tactically. Journal of Investigative Psychology and Offender Profiling 8, 2 (July 2011), 189-202.
    • (2011) Journal of Investigative Psychology and Offender Profiling , vol.8 , Issue.2 , pp. 189-202
    • Dando, C.J.1    Bull, R.2
  • 8
    • 0002603702 scopus 로고    scopus 로고
    • Identity and deception in the virtual community
    • M.A. Smith and P. Kollock, Eds. Routledge, New York
    • Donath, J.S. Identity and deception in the virtual community. In Communities in Cyberspace, M.A. Smith and P. Kollock, Eds. Routledge, New York, 1999, 29-59.
    • (1999) Communities in Cyberspace , pp. 29-59
    • Donath, J.S.1
  • 10
    • 34447563931 scopus 로고    scopus 로고
    • Deception in cyberspace: A comparison of text-only vs. Avatar-supported medium
    • Sept.
    • Galanxhi, H. and Nah, F.F.-H. Deception in cyberspace: A comparison of text-only vs. avatar-supported medium. International Journal of Human-Computer Studies 65, 9 (Sept. 2007), 770-783.
    • (2007) International Journal of Human-Computer Studies , vol.65 , Issue.9 , pp. 770-783
    • Galanxhi, H.1    Nah, F.F.-H.2
  • 11
    • 0034226904 scopus 로고    scopus 로고
    • Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
    • July
    • Grazioli, S. and Jarvenpaa, S.L. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man and Cybernetics 30, 4 (July 2000), 395-410.
    • (2000) IEEE Transactions on Systems, Man and Cybernetics , vol.30 , Issue.4 , pp. 395-410
    • Grazioli, S.1    Jarvenpaa, S.L.2
  • 14
    • 78651081431 scopus 로고    scopus 로고
    • Identification of fraudulent financial statements using linguistic credibility analysis
    • Feb.
    • Humpherys, S.L., Moffitt, K.C., Burns, M.B., Burgoon, J.K., and Felix, W.F. Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems 50, 3 (Feb. 2011), 585-594.
    • (2011) Decision Support Systems , vol.50 , Issue.3 , pp. 585-594
    • Humpherys, S.L.1    Moffitt, K.C.2    Burns, M.B.3    Burgoon, J.K.4    Felix, W.F.5
  • 15
    • 79551630751 scopus 로고    scopus 로고
    • The early bird catches the news: Nine things you should know about microblogging
    • Mar.-Apr.
    • Kaplan, A.M. and Haenlein, M. The early bird catches the news: Nine things you should know about microblogging. Business Horizons 54, 2 (Mar.-Apr. 2011), 105-113.
    • (2011) Business Horizons , vol.54 , Issue.2 , pp. 105-113
    • Kaplan, A.M.1    Haenlein, M.2
  • 16
    • 71149088987 scopus 로고    scopus 로고
    • Users of the world, unite! The challenges and opportunities of social media
    • Jan.-Feb.
    • Kaplan, A.M. and Haenlein, M. Users of the world, unite! The challenges and opportunities of social media. Business Horizons 53, 1 (Jan.-Feb. 2010), 59-68.
    • (2010) Business Horizons , vol.53 , Issue.1 , pp. 59-68
    • Kaplan, A.M.1    Haenlein, M.2
  • 17
    • 0032852362 scopus 로고    scopus 로고
    • I'm innocent!': Effects of training on judgments of truth and deception in the interrogation room
    • Oct.
    • Kassin, S. and Fong, C. 'I'm innocent!': Effects of training on judgments of truth and deception in the interrogation room. Law and Human Behavior 23, 5 (Oct. 1999), 499-516.
    • (1999) Law and Human Behavior , vol.23 , Issue.5 , pp. 499-516
    • Kassin, S.1    Fong, C.2
  • 23
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of resampling
    • Feb.
    • Popescu, A.C. and Farid, H. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53, 2 (Feb. 2005), 758-767.
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 24
    • 84875678913 scopus 로고    scopus 로고
    • Security and privacy in mobile social network
    • Sept.-Oct.
    • Shen, X. Security and privacy in mobile social network. IEEE Network 27, 5 (Sept.-Oct. 2013), 2-3.
    • (2013) IEEE Network , vol.27 , Issue.5 , pp. 2-3
    • Shen, X.1
  • 25
    • 84904660110 scopus 로고    scopus 로고
    • A case study of sockpuppet detection in wikipedia
    • A. Farzindar, M. Gamon, M. Nagarajan, D. Inkpen, and C. Danescu-Niculescu-Mizil, Eds. (Atlanta, June 3). Association for Computational Linguistics, Stroudsburg, PA
    • Solorio, T., Hasan, R., and Mizan, M. A case study of sockpuppet detection in Wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media, A. Farzindar, M. Gamon, M. Nagarajan, D. Inkpen, and C. Danescu-Niculescu-Mizil, Eds. (Atlanta, June 3). Association for Computational Linguistics, Stroudsburg, PA, 2013, 59-68.
    • (2013) Proceedings of the Workshop on Language Analysis in Social Media , pp. 59-68
    • Solorio, T.1    Hasan, R.2    Mizan, M.3
  • 26
    • 84873679115 scopus 로고    scopus 로고
    • An informed model of personal information release in social networking sites
    • (Amsterdam, Sept. 3-5). IEEE, New York
    • Squicciarini, A.C. and Grifn, C. An informed model of personal information release in social networking sites. In Proceedings of the 2012 International Conference on Social Computing (Amsterdam, Sept. 3-5). IEEE, New York, 2012, 636-645.
    • (2012) Proceedings of the 2012 International Conference on Social Computing , pp. 636-645
    • Squicciarini, A.C.1    Grifn, C.2
  • 27
    • 64549084442 scopus 로고    scopus 로고
    • Natural-language processing for intrusion detection
    • Dec.
    • Stone, A. Natural-language processing for intrusion detection. Computer 40, 12 (Dec. 2007), 103-105.
    • (2007) Computer , vol.40 , Issue.12 , pp. 103-105
    • Stone, A.1
  • 28
    • 3042815772 scopus 로고    scopus 로고
    • The online disinhibition effect
    • June
    • Suler, J. The online disinhibition effect. CyberPsychology & Behavior 7, 3 (June 2004), 321-326.
    • (2004) CyberPsychology & Behavior , vol.7 , Issue.3 , pp. 321-326
    • Suler, J.1
  • 29
    • 0004186420 scopus 로고
    • (translated by Samuel B. Griffith). Oxford University Press, New York
    • Tzu, S. The Art of War (translated by Samuel B. Griffith). Oxford University Press, New York, 1963.
    • (1963) The Art of War
    • Tzu, S.1
  • 30
    • 85008018414 scopus 로고    scopus 로고
    • Automatically detecting criminal identity deception: An adaptive detection algorithm
    • Sept.
    • Wang, G.A., Chen, H., Xu, J.J., and Atabakhsh, H. Automatically detecting criminal identity deception: An adaptive detection algorithm. IEEE Transactions on Systems, Man, and Cybernetics 36, 5 (Sept. 2006), 988-999.
    • (2006) IEEE Transactions on Systems, Man, and Cybernetics , vol.36 , Issue.5 , pp. 988-999
    • Wang, G.A.1    Chen, H.2    Xu, J.J.3    Atabakhsh, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.