메뉴 건너뛰기




Volumn 20, Issue 1, 2015, Pages 83-98

Habitual facebook use and its impact on getting deceived on social media

Author keywords

Deficient Self Regulation; Facebook Habits; Habit Strength; Media Addiction; Online Deception; Phishing; Social Media Abuse; Social Media Deception; Social Media Scams

Indexed keywords

COMPUTER CRIME;

EID: 84923039352     PISSN: None     EISSN: 10836101     Source Type: Journal    
DOI: 10.1111/jcc4.12100     Document Type: Article
Times cited : (138)

References (45)
  • 1
    • 84986665106 scopus 로고
    • The measurement and antecedents of affective, continuance and normative commitment to the organization
    • Allen, N. J., & Meyer, J. P. (1990). The measurement and antecedents of affective, continuance and normative commitment to the organization. Journal of occupational psychology, 63(1), 1-18.
    • (1990) Journal of occupational psychology , vol.63 , Issue.1 , pp. 1-18
    • Allen, N.J.1    Meyer, J.P.2
  • 2
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
    • Baron, R. M., & Kenny, D. A. (1986). The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51(6), 1173.
    • (1986) Journal of Personality and Social Psychology , vol.51 , Issue.6 , pp. 1173
    • Baron, R.M.1    Kenny, D.A.2
  • 3
    • 9744258059 scopus 로고    scopus 로고
    • Inducing sensitivity to deception in order to improve decision making performance: A field study
    • Biros, D. P., George, J. F., & Zmud, R. W. (2002). Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS quarterly, 119-144.
    • (2002) MIS quarterly , pp. 119-144
    • Biros, D.P.1    George, J.F.2    Zmud, R.W.3
  • 5
    • 0036721823 scopus 로고    scopus 로고
    • Problematic Internet use and psychosocial well-being: Development of a theory-based cognitive-behavioral measurement instrument
    • Caplan, S. E. (2002). Problematic Internet use and psychosocial well-being: Development of a theory-based cognitive-behavioral measurement instrument. Computers in Human Behavior, 18(5), 553-575.
    • (2002) Computers in Human Behavior , vol.18 , Issue.5 , pp. 553-575
    • Caplan, S.E.1
  • 6
    • 0002016719 scopus 로고
    • Heuristic and Systematic Information Processing within and
    • Chaiken, S., & Eagly, A. H. (1989). Heuristic and Systematic Information Processing within and. Unintended thought, 212.
    • (1989) Unintended thought , vol.212
    • Chaiken, S.1    Eagly, A.H.2
  • 7
    • 84887978768 scopus 로고    scopus 로고
    • Problematic use of social network sites: The interactive relationship between gratifications sought and privacy concerns
    • Chen, H. T., & Kim, Y. (2013). Problematic use of social network sites: The interactive relationship between gratifications sought and privacy concerns. Cyberpsychology, Behavior, and Social Networking, 16(11), 806-812.
    • (2013) Cyberpsychology, Behavior, and Social Networking , vol.16 , Issue.11 , pp. 806-812
    • Chen, H.T.1    Kim, Y.2
  • 8
    • 84884498851 scopus 로고    scopus 로고
    • Time perspective as a predictor of problematic Internet use: A study of Facebook users
    • Chittaro, L., & Vianello, A. (2013). Time perspective as a predictor of problematic Internet use: A study of Facebook users. Personality and Individual Differences, 55(8), 989-993.
    • (2013) Personality and Individual Differences , vol.55 , Issue.8 , pp. 989-993
    • Chittaro, L.1    Vianello, A.2
  • 11
    • 79958713862 scopus 로고    scopus 로고
    • Five clues that you are addicted to Facebook
    • Retrieved April 23, from
    • Cohen, E. (2009). Five clues that you are addicted to Facebook. Retrieved April 23, from http://www.cnn.com/2009/HEALTH/04/23/ep.facebook.addict/
    • (2009)
    • Cohen, E.1
  • 12
    • 80052714662 scopus 로고    scopus 로고
    • Social media and political participation: Are Facebook, Twitter and YouTube democratizing our political systems?
    • Springer.
    • Effing, R., van Hillegersberg, J., & Huibers, T. (2011). Social media and political participation: Are Facebook, Twitter and YouTube democratizing our political systems? Electronic Participation (pp. 25-35): Springer.
    • (2011) Electronic Participation , pp. 25-35
    • Effing, R.1    van Hillegersberg, J.2    Huibers, T.3
  • 13
    • 84922978948 scopus 로고    scopus 로고
    • Market quavers after fake AP tweet says Obama was hurt in White House explosions
    • April 23. The Washington Post. Retrieved from
    • ElBoghdady, D. (2013, April 23). Market quavers after fake AP tweet says Obama was hurt in White House explosions. The Washington Post. Retrieved from http://articles.washingtonpost.com/2013-04-23/business/38764770_1_twitter-account-stock-market-jay-carney
    • (2013)
    • ElBoghdady, D.1
  • 14
    • 34548285057 scopus 로고    scopus 로고
    • The benefits of Facebook "friends": Social capital and college students' use of online social network sites
    • Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook "friends": Social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143-1168.
    • (2007) Journal of Computer-Mediated Communication , vol.12 , Issue.4 , pp. 1143-1168
    • Ellison, N.B.1    Steinfield, C.2    Lampe, C.3
  • 15
    • 35348822468 scopus 로고    scopus 로고
    • Fostering e-mail security awareness: The West Point carronade
    • Ferguson, A. J. (2005). Fostering e-mail security awareness: The West Point carronade. EDUCASE Quarterly, 28(1), 54-57.
    • (2005) EDUCASE Quarterly , vol.28 , Issue.1 , pp. 54-57
    • Ferguson, A.J.1
  • 16
    • 85064298320 scopus 로고    scopus 로고
    • IM online: Instant messaging use among college students
    • Flanagin, A. J. (2005). IM online: Instant messaging use among college students. Communication Research Reports, 22(3), 175-187.
    • (2005) Communication Research Reports , vol.22 , Issue.3 , pp. 175-187
    • Flanagin, A.J.1
  • 22
    • 77953142299 scopus 로고    scopus 로고
    • The problem of media habits
    • LaRose, R. (2010). The problem of media habits. Communication Theory, 20(2), 194-222.
    • (2010) Communication Theory , vol.20 , Issue.2 , pp. 194-222
    • LaRose, R.1
  • 23
    • 4344573724 scopus 로고    scopus 로고
    • Is online buying out of control? Electronic commerce and consumer self-regulation
    • LaRose, R., & Eastin, M. S. (2002). Is online buying out of control? Electronic commerce and consumer self-regulation. Journal of Broadcasting & Electronic Media, 46(4), 549-564.
    • (2002) Journal of Broadcasting & Electronic Media , vol.46 , Issue.4 , pp. 549-564
    • LaRose, R.1    Eastin, M.S.2
  • 24
    • 33646516565 scopus 로고    scopus 로고
    • A social cognitive theory of Internet uses and gratifications: Toward a new model of media attendance
    • LaRose, R., & Eastin, M. S. (2004). A social cognitive theory of Internet uses and gratifications: Toward a new model of media attendance. Journal of Broadcasting & Electronic Media, 48(3), 358-377.
    • (2004) Journal of Broadcasting & Electronic Media , vol.48 , Issue.3 , pp. 358-377
    • LaRose, R.1    Eastin, M.S.2
  • 25
    • 0042074089 scopus 로고    scopus 로고
    • Unregulated Internet usage: Addiction, habit, or deficient self-regulation?
    • LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet usage: Addiction, habit, or deficient self-regulation? Media Psychology, 5(3), 225-253.
    • (2003) Media Psychology , vol.5 , Issue.3 , pp. 225-253
    • LaRose, R.1    Lin, C.A.2    Eastin, M.S.3
  • 26
    • 34748915559 scopus 로고    scopus 로고
    • Student instant message use in a ubiquitous computing environment: Effects of deficient self-regulation
    • Lee, K. C., & Perry, S. D. (2004). Student instant message use in a ubiquitous computing environment: Effects of deficient self-regulation. Journal of Broadcasting & Electronic Media, 48(3), 399-420.
    • (2004) Journal of Broadcasting & Electronic Media , vol.48 , Issue.3 , pp. 399-420
    • Lee, K.C.1    Perry, S.D.2
  • 31
    • 84923059551 scopus 로고    scopus 로고
    • March 11. Chinese spies used fake Facebook profile to friend NATO officials. Retrieved from
    • Protalinksi, E. (2012, March 11). Chinese spies used fake Facebook profile to friend NATO officials. Retrieved from http://www.zdnet.com/blog/facebook/chinese-spies-used-fake-facebook-profile-to-friend-nato-officials/10389
    • (2012)
    • Protalinksi, E.1
  • 32
    • 85055406805 scopus 로고    scopus 로고
    • Uses and gratifications of social media: A comparison of Facebook and instant messaging
    • Quan-Haase, A., & Young, A. L. (2010). Uses and gratifications of social media: A comparison of Facebook and instant messaging. Bulletin of Science, Technology & Society, 30(5), 350-361.
    • (2010) Bulletin of Science, Technology & Society , vol.30 , Issue.5 , pp. 350-361
    • Quan-Haase, A.1    Young, A.L.2
  • 33
    • 84923059550 scopus 로고    scopus 로고
    • Fake soldiers scam Facebook users
    • February 28. Retrieved from
    • Quinn, R. (2011, February 28). Fake soldiers scam Facebook users. Retrieved from http://www.newser.com/story/113000/fake-soldiers-scam-facebook-users.html
    • (2011)
    • Quinn, R.1
  • 34
    • 42349086578 scopus 로고    scopus 로고
    • MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites
    • Raacke, J., & Bonds-Raacke, J. (2008). MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites. Cyberpsychology & behavior, 11(2), 169-174.
    • (2008) Cyberpsychology & behavior , vol.11 , Issue.2 , pp. 169-174
    • Raacke, J.1    Bonds-Raacke, J.2
  • 36
    • 84923043523 scopus 로고    scopus 로고
    • U.S Colleges and Universities Become a Favored Target for Phishing
    • February. Retrieved from
    • RSA. (2010, February). U.S Colleges and Universities Become a Favored Target for Phishing. Retrieved from https://blogs.rsa.com/u-s-colleges-and-universities-become-a-favored-target-for-phishing/
    • (2010)
  • 37
    • 0017980080 scopus 로고
    • A social information processing approach to job attitudes and task design
    • Salancik, G. R., & Pfeffer, J. (1978). A social information processing approach to job attitudes and task design. Administrative science quarterly, 224-253.
    • (1978) Administrative science quarterly , pp. 224-253
    • Salancik, G.R.1    Pfeffer, J.2
  • 38
    • 84875514169 scopus 로고    scopus 로고
    • Mediation in experimental and nonexperimental studies: New procedures and recommendations
    • Shrout, P. E., & Bolger, N. (2002). Mediation in experimental and nonexperimental studies: New procedures and recommendations. Psychological methods, 7(4), 422.
    • (2002) Psychological methods , vol.7 , Issue.4 , pp. 422
    • Shrout, P.E.1    Bolger, N.2
  • 39
    • 84923056755 scopus 로고    scopus 로고
    • Syrian Electronic Army's AP Hack Just The Latest Phishing Attack On A Major News Organization
    • April 23. Retrieved from
    • Smith, G. (2013 April 23). Syrian Electronic Army's AP Hack Just The Latest Phishing Attack On A Major News Organization. Retrieved from http://www.huffingtonpost.com/2013/04/23/syrian-electronic-army-ap-twitter-hack_n_3140849.html
    • (2013)
    • Smith, G.1
  • 40
    • 0002037905 scopus 로고
    • Asymptotic confidence intervals for indirect effects in structural equation models
    • Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological methodology, 13, 290-312.
    • (1982) Sociological methodology , vol.13 , pp. 290-312
    • Sobel, M.E.1
  • 42
    • 48749099925 scopus 로고    scopus 로고
    • The 360 news experience: Audience connections with the ubiquitous news organization
    • Vishwanath, A. (2008). The 360 news experience: Audience connections with the ubiquitous news organization. Journalism & Mass Communication Quarterly, 85(1), 7-22.
    • (2008) Journalism & Mass Communication Quarterly , vol.85 , Issue.1 , pp. 7-22
    • Vishwanath, A.1
  • 43
    • 79955890012 scopus 로고    scopus 로고
    • Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
    • Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576-586.
    • (2011) Decision Support Systems , vol.51 , Issue.3 , pp. 576-586
    • Vishwanath, A.1    Herath, T.2    Chen, R.3    Wang, J.4    Rao, H.R.5
  • 44
    • 39749142244 scopus 로고    scopus 로고
    • Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
    • Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59(4), 662-674.
    • (2008) Journal of the American Society for Information Science and Technology , vol.59 , Issue.4 , pp. 662-674
    • Workman, M.1
  • 45
    • 3042869109 scopus 로고    scopus 로고
    • Internet addiction: The emergence of a new clinical disorder
    • Young, K. S. (1998). Internet addiction: The emergence of a new clinical disorder. CyberPsychology & Behavior, 1(3), 237-244.
    • (1998) CyberPsychology & Behavior , vol.1 , Issue.3 , pp. 237-244
    • Young, K.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.