-
1
-
-
84986665106
-
The measurement and antecedents of affective, continuance and normative commitment to the organization
-
Allen, N. J., & Meyer, J. P. (1990). The measurement and antecedents of affective, continuance and normative commitment to the organization. Journal of occupational psychology, 63(1), 1-18.
-
(1990)
Journal of occupational psychology
, vol.63
, Issue.1
, pp. 1-18
-
-
Allen, N.J.1
Meyer, J.P.2
-
2
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
-
Baron, R. M., & Kenny, D. A. (1986). The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51(6), 1173.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.6
, pp. 1173
-
-
Baron, R.M.1
Kenny, D.A.2
-
3
-
-
9744258059
-
Inducing sensitivity to deception in order to improve decision making performance: A field study
-
Biros, D. P., George, J. F., & Zmud, R. W. (2002). Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS quarterly, 119-144.
-
(2002)
MIS quarterly
, pp. 119-144
-
-
Biros, D.P.1
George, J.F.2
Zmud, R.W.3
-
4
-
-
33846372664
-
Development of measures of online privacy concern and protection for use on the Internet
-
Buchanan, T., Paine, C., Joinson, A. N., & Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 157-165
-
-
Buchanan, T.1
Paine, C.2
Joinson, A.N.3
Reips, U.D.4
-
5
-
-
0036721823
-
Problematic Internet use and psychosocial well-being: Development of a theory-based cognitive-behavioral measurement instrument
-
Caplan, S. E. (2002). Problematic Internet use and psychosocial well-being: Development of a theory-based cognitive-behavioral measurement instrument. Computers in Human Behavior, 18(5), 553-575.
-
(2002)
Computers in Human Behavior
, vol.18
, Issue.5
, pp. 553-575
-
-
Caplan, S.E.1
-
6
-
-
0002016719
-
Heuristic and Systematic Information Processing within and
-
Chaiken, S., & Eagly, A. H. (1989). Heuristic and Systematic Information Processing within and. Unintended thought, 212.
-
(1989)
Unintended thought
, vol.212
-
-
Chaiken, S.1
Eagly, A.H.2
-
7
-
-
84887978768
-
Problematic use of social network sites: The interactive relationship between gratifications sought and privacy concerns
-
Chen, H. T., & Kim, Y. (2013). Problematic use of social network sites: The interactive relationship between gratifications sought and privacy concerns. Cyberpsychology, Behavior, and Social Networking, 16(11), 806-812.
-
(2013)
Cyberpsychology, Behavior, and Social Networking
, vol.16
, Issue.11
, pp. 806-812
-
-
Chen, H.T.1
Kim, Y.2
-
8
-
-
84884498851
-
Time perspective as a predictor of problematic Internet use: A study of Facebook users
-
Chittaro, L., & Vianello, A. (2013). Time perspective as a predictor of problematic Internet use: A study of Facebook users. Personality and Individual Differences, 55(8), 989-993.
-
(2013)
Personality and Individual Differences
, vol.55
, Issue.8
, pp. 989-993
-
-
Chittaro, L.1
Vianello, A.2
-
11
-
-
79958713862
-
Five clues that you are addicted to Facebook
-
Retrieved April 23, from
-
Cohen, E. (2009). Five clues that you are addicted to Facebook. Retrieved April 23, from http://www.cnn.com/2009/HEALTH/04/23/ep.facebook.addict/
-
(2009)
-
-
Cohen, E.1
-
12
-
-
80052714662
-
Social media and political participation: Are Facebook, Twitter and YouTube democratizing our political systems?
-
Springer.
-
Effing, R., van Hillegersberg, J., & Huibers, T. (2011). Social media and political participation: Are Facebook, Twitter and YouTube democratizing our political systems? Electronic Participation (pp. 25-35): Springer.
-
(2011)
Electronic Participation
, pp. 25-35
-
-
Effing, R.1
van Hillegersberg, J.2
Huibers, T.3
-
13
-
-
84922978948
-
Market quavers after fake AP tweet says Obama was hurt in White House explosions
-
April 23. The Washington Post. Retrieved from
-
ElBoghdady, D. (2013, April 23). Market quavers after fake AP tweet says Obama was hurt in White House explosions. The Washington Post. Retrieved from http://articles.washingtonpost.com/2013-04-23/business/38764770_1_twitter-account-stock-market-jay-carney
-
(2013)
-
-
ElBoghdady, D.1
-
14
-
-
34548285057
-
The benefits of Facebook "friends": Social capital and college students' use of online social network sites
-
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook "friends": Social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143-1168.
-
(2007)
Journal of Computer-Mediated Communication
, vol.12
, Issue.4
, pp. 1143-1168
-
-
Ellison, N.B.1
Steinfield, C.2
Lampe, C.3
-
15
-
-
35348822468
-
Fostering e-mail security awareness: The West Point carronade
-
Ferguson, A. J. (2005). Fostering e-mail security awareness: The West Point carronade. EDUCASE Quarterly, 28(1), 54-57.
-
(2005)
EDUCASE Quarterly
, vol.28
, Issue.1
, pp. 54-57
-
-
Ferguson, A.J.1
-
16
-
-
85064298320
-
IM online: Instant messaging use among college students
-
Flanagin, A. J. (2005). IM online: Instant messaging use among college students. Communication Research Reports, 22(3), 175-187.
-
(2005)
Communication Research Reports
, vol.22
, Issue.3
, pp. 175-187
-
-
Flanagin, A.J.1
-
19
-
-
41949126461
-
Why and how to perform fraud experiments
-
Jakobsson, M., Finn, P., & Johnson, N. (2008). Why and how to perform fraud experiments. Security & Privacy, IEEE, 6(2), 66-68.
-
(2008)
Security & Privacy, IEEE
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Finn, P.2
Johnson, N.3
-
20
-
-
57049169158
-
-
Paper presented at the CHI'08 Extended Abstracts on Human Factors in Computing Systems.
-
Joinson, A. N., Hancock, J., & Briggs, P. (2008). Secrets and lies in computer-mediated interaction: theory, methods and design. Paper presented at the CHI'08 Extended Abstracts on Human Factors in Computing Systems.
-
(2008)
Secrets and lies in computer-mediated interaction: theory, methods and design
-
-
Joinson, A.N.1
Hancock, J.2
Briggs, P.3
-
22
-
-
77953142299
-
The problem of media habits
-
LaRose, R. (2010). The problem of media habits. Communication Theory, 20(2), 194-222.
-
(2010)
Communication Theory
, vol.20
, Issue.2
, pp. 194-222
-
-
LaRose, R.1
-
23
-
-
4344573724
-
Is online buying out of control? Electronic commerce and consumer self-regulation
-
LaRose, R., & Eastin, M. S. (2002). Is online buying out of control? Electronic commerce and consumer self-regulation. Journal of Broadcasting & Electronic Media, 46(4), 549-564.
-
(2002)
Journal of Broadcasting & Electronic Media
, vol.46
, Issue.4
, pp. 549-564
-
-
LaRose, R.1
Eastin, M.S.2
-
24
-
-
33646516565
-
A social cognitive theory of Internet uses and gratifications: Toward a new model of media attendance
-
LaRose, R., & Eastin, M. S. (2004). A social cognitive theory of Internet uses and gratifications: Toward a new model of media attendance. Journal of Broadcasting & Electronic Media, 48(3), 358-377.
-
(2004)
Journal of Broadcasting & Electronic Media
, vol.48
, Issue.3
, pp. 358-377
-
-
LaRose, R.1
Eastin, M.S.2
-
25
-
-
0042074089
-
Unregulated Internet usage: Addiction, habit, or deficient self-regulation?
-
LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet usage: Addiction, habit, or deficient self-regulation? Media Psychology, 5(3), 225-253.
-
(2003)
Media Psychology
, vol.5
, Issue.3
, pp. 225-253
-
-
LaRose, R.1
Lin, C.A.2
Eastin, M.S.3
-
26
-
-
34748915559
-
Student instant message use in a ubiquitous computing environment: Effects of deficient self-regulation
-
Lee, K. C., & Perry, S. D. (2004). Student instant message use in a ubiquitous computing environment: Effects of deficient self-regulation. Journal of Broadcasting & Electronic Media, 48(3), 399-420.
-
(2004)
Journal of Broadcasting & Electronic Media
, vol.48
, Issue.3
, pp. 399-420
-
-
Lee, K.C.1
Perry, S.D.2
-
31
-
-
84923059551
-
-
March 11. Chinese spies used fake Facebook profile to friend NATO officials. Retrieved from
-
Protalinksi, E. (2012, March 11). Chinese spies used fake Facebook profile to friend NATO officials. Retrieved from http://www.zdnet.com/blog/facebook/chinese-spies-used-fake-facebook-profile-to-friend-nato-officials/10389
-
(2012)
-
-
Protalinksi, E.1
-
32
-
-
85055406805
-
Uses and gratifications of social media: A comparison of Facebook and instant messaging
-
Quan-Haase, A., & Young, A. L. (2010). Uses and gratifications of social media: A comparison of Facebook and instant messaging. Bulletin of Science, Technology & Society, 30(5), 350-361.
-
(2010)
Bulletin of Science, Technology & Society
, vol.30
, Issue.5
, pp. 350-361
-
-
Quan-Haase, A.1
Young, A.L.2
-
33
-
-
84923059550
-
Fake soldiers scam Facebook users
-
February 28. Retrieved from
-
Quinn, R. (2011, February 28). Fake soldiers scam Facebook users. Retrieved from http://www.newser.com/story/113000/fake-soldiers-scam-facebook-users.html
-
(2011)
-
-
Quinn, R.1
-
34
-
-
42349086578
-
MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites
-
Raacke, J., & Bonds-Raacke, J. (2008). MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites. Cyberpsychology & behavior, 11(2), 169-174.
-
(2008)
Cyberpsychology & behavior
, vol.11
, Issue.2
, pp. 169-174
-
-
Raacke, J.1
Bonds-Raacke, J.2
-
35
-
-
0003568349
-
-
Sage Publications Beverly Hills, CA.
-
Rosengren, K. E., Wenner, L. A., & Palmgreen, P. (1985). Media gratifications research: Current perspectives: Sage Publications Beverly Hills, CA.
-
(1985)
Media gratifications research: Current perspectives
-
-
Rosengren, K.E.1
Wenner, L.A.2
Palmgreen, P.3
-
36
-
-
84923043523
-
U.S Colleges and Universities Become a Favored Target for Phishing
-
February. Retrieved from
-
RSA. (2010, February). U.S Colleges and Universities Become a Favored Target for Phishing. Retrieved from https://blogs.rsa.com/u-s-colleges-and-universities-become-a-favored-target-for-phishing/
-
(2010)
-
-
-
37
-
-
0017980080
-
A social information processing approach to job attitudes and task design
-
Salancik, G. R., & Pfeffer, J. (1978). A social information processing approach to job attitudes and task design. Administrative science quarterly, 224-253.
-
(1978)
Administrative science quarterly
, pp. 224-253
-
-
Salancik, G.R.1
Pfeffer, J.2
-
38
-
-
84875514169
-
Mediation in experimental and nonexperimental studies: New procedures and recommendations
-
Shrout, P. E., & Bolger, N. (2002). Mediation in experimental and nonexperimental studies: New procedures and recommendations. Psychological methods, 7(4), 422.
-
(2002)
Psychological methods
, vol.7
, Issue.4
, pp. 422
-
-
Shrout, P.E.1
Bolger, N.2
-
39
-
-
84923056755
-
Syrian Electronic Army's AP Hack Just The Latest Phishing Attack On A Major News Organization
-
April 23. Retrieved from
-
Smith, G. (2013 April 23). Syrian Electronic Army's AP Hack Just The Latest Phishing Attack On A Major News Organization. Retrieved from http://www.huffingtonpost.com/2013/04/23/syrian-electronic-army-ap-twitter-hack_n_3140849.html
-
(2013)
-
-
Smith, G.1
-
40
-
-
0002037905
-
Asymptotic confidence intervals for indirect effects in structural equation models
-
Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological methodology, 13, 290-312.
-
(1982)
Sociological methodology
, vol.13
, pp. 290-312
-
-
Sobel, M.E.1
-
42
-
-
48749099925
-
The 360 news experience: Audience connections with the ubiquitous news organization
-
Vishwanath, A. (2008). The 360 news experience: Audience connections with the ubiquitous news organization. Journalism & Mass Communication Quarterly, 85(1), 7-22.
-
(2008)
Journalism & Mass Communication Quarterly
, vol.85
, Issue.1
, pp. 7-22
-
-
Vishwanath, A.1
-
43
-
-
79955890012
-
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
-
Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576-586.
-
(2011)
Decision Support Systems
, vol.51
, Issue.3
, pp. 576-586
-
-
Vishwanath, A.1
Herath, T.2
Chen, R.3
Wang, J.4
Rao, H.R.5
-
44
-
-
39749142244
-
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
-
Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59(4), 662-674.
-
(2008)
Journal of the American Society for Information Science and Technology
, vol.59
, Issue.4
, pp. 662-674
-
-
Workman, M.1
-
45
-
-
3042869109
-
Internet addiction: The emergence of a new clinical disorder
-
Young, K. S. (1998). Internet addiction: The emergence of a new clinical disorder. CyberPsychology & Behavior, 1(3), 237-244.
-
(1998)
CyberPsychology & Behavior
, vol.1
, Issue.3
, pp. 237-244
-
-
Young, K.S.1
|