-
1
-
-
76049088642
-
Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks
-
Aral, S., Muchnik, L., & Sundararajan, A. (2009). Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences, 106(51), 21544–21549.
-
(2009)
Proceedings of the National Academy of Sciences
, vol.106
, Issue.51
, pp. 21544-21549
-
-
Aral, S.1
Muchnik, L.2
Sundararajan, A.3
-
2
-
-
84947616781
-
-
Xu, H: Optimal policy for software vulnerability disclosure
-
Arora, A., Telang, R., & Xu, H. (2005). Optimal policy for software vulnerability disclosure.
-
(2005)
-
-
Arora, A.1
Telang, R.2
-
3
-
-
84960565609
-
A simple model of herd behavior
-
Banerjee, A. V. (1992). A simple model of herd behavior. The Quarterly Journal of Economics, 107(3), 797–817.
-
(1992)
The Quarterly Journal of Economics
, vol.107
, Issue.3
, pp. 797-817
-
-
Banerjee, A.V.1
-
4
-
-
40749083825
-
Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
-
Bose, I., & Leung, A. C. M. (2007). Unveiling the mask of phishing: Threats, preventive measures, and responsibilities. Communications of AIS, 19(1), 544–566.
-
(2007)
Communications of AIS
, vol.19
, Issue.1
, pp. 544-566
-
-
Bose, I.1
Leung, A.C.M.2
-
5
-
-
84947612060
-
-
Brenner, J. (2012). Social networking. Pew Internet & American Life Project, November 13, 2012, , accessed on November 28, 2012
-
Brenner, J. (2012). Social networking. Pew Internet & American Life Project, November 13, 2012, http://pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx, accessed on November 28, 2012.
-
-
-
-
6
-
-
9744258059
-
Inducing sensitivity to deception in order to improve decision making performance: A field study
-
Brios, D. P., George, J. F., & Zmund, R. W. (2002). Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Quarterly, 26, 119–144.
-
(2002)
MIS Quarterly
, vol.26
, pp. 119-144
-
-
Brios, D.P.1
George, J.F.2
Zmund, R.W.3
-
7
-
-
85047681068
-
Heuristic versus systematic information processing and the use of source versus message cues in persuasion
-
Chaiken, S. (1980). Heuristic versus systematic information processing and the use of source versus message cues in persuasion. Journal of Personality and Social Psychology, 39(5), 752.
-
(1980)
Journal of Personality and Social Psychology
, vol.39
, Issue.5
, pp. 752
-
-
Chaiken, S.1
-
8
-
-
84947616374
-
-
Chaiken, S. (1987). The heuristic model of persuasion
-
Chaiken, S. (1987). The heuristic model of persuasion.
-
-
-
-
9
-
-
0002016719
-
Heuristic and systematic information processing within and
-
Chaiken, S., & Eagly, A. H. (1989). Heuristic and systematic information processing within and. Unintended Thought, 212.
-
(1989)
Unintended Thought
, pp. 212
-
-
Chaiken, S.1
Eagly, A.H.2
-
12
-
-
42649123893
-
Statistical methods for comparing regression coefficients between models
-
Clogg, C. C., Petkova, E., & Haritou, A. (1995). Statistical methods for comparing regression coefficients between models. American Journal of Sociology, 1261–1293.
-
(1995)
American Journal of Sociology
, pp. 1261-1293
-
-
Clogg, C.C.1
Petkova, E.2
Haritou, A.3
-
13
-
-
84977060091
-
Comparing regression coefficients across subsamples
-
Cohen, A. (1983). Comparing regression coefficients across subsamples. Sociological Methods & Research, 12(1), 77–94.
-
(1983)
Sociological Methods & Research
, vol.12
, Issue.1
, pp. 77-94
-
-
Cohen, A.1
-
14
-
-
0041527371
-
The quality of online social relationships
-
Cummings, J. N., Butler, B., & Kraut, R. (2002). The quality of online social relationships. Communications of the ACM, 45(7), 103–108.
-
(2002)
Communications of the ACM
, vol.45
, Issue.7
, pp. 103-108
-
-
Cummings, J.N.1
Butler, B.2
Kraut, R.3
-
15
-
-
0036274176
-
Auction or agent (or both)? A study of moderators of the herding bias in digital auctions
-
Dholakia, U. M., Basuroy, S., & Soltysinski, K. (2002). Auction or agent (or both)? A study of moderators of the herding bias in digital auctions. International Journal of Research in Marketing, 19(2), 115–130.
-
(2002)
International Journal of Research in Marketing
, vol.19
, Issue.2
, pp. 115-130
-
-
Dholakia, U.M.1
Basuroy, S.2
Soltysinski, K.3
-
16
-
-
84947614657
-
-
Dvorak, J. C. (2011, January 19). LinkedIn account hacked, from
-
Dvorak, J. C. (2011, January 19). LinkedIn account hacked, from http://www.pcmag.com/article2/0,2817,2375983,00.asp.
-
-
-
-
17
-
-
34548285057
-
The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites
-
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168.
-
(2007)
Journal of Computer-Mediated Communication
, vol.12
, Issue.4
, pp. 1143-1168
-
-
Ellison, N.B.1
Steinfield, C.2
Lampe, C.3
-
18
-
-
84947612124
-
-
Information technology diffusion: A review of empirical research
-
Fichman, R. G. (1992). Information technology diffusion: A review of empirical research.
-
(1992)
-
-
Fichman, R.1
-
19
-
-
84947616550
-
-
Acquisti, A: Information revelation and privacy in online social networks
-
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks.
-
(2005)
-
-
Gross, R.1
-
20
-
-
84947617205
-
Top German firms ban Facebook and Twitter from workplace over industrial espionage fears
-
Hall, A. (2010). Top German firms ban Facebook and Twitter from workplace over industrial espionage fears. Mail Online.
-
(2010)
Mail Online
-
-
Hall, A.1
-
21
-
-
84947615867
-
-
Hardworking teacher masked his sinster side, The Buffalo News
-
Herbeck, D., & Besecker, A. (2011). Hardworking teacher masked his sinster side, The Buffalo News.
-
(2011)
& Besecker, A
-
-
Herbeck, D.1
-
22
-
-
84947617576
-
Mary Meeker: Mobile Internet Will Soon Overtake Fixed Internet (Morgan Stanley Report)
-
Ingram, M. (2010). Mary Meeker: Mobile Internet Will Soon Overtake Fixed Internet (Morgan Stanley Report), from http://gigaom.com/2010/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/.
-
(2010)
from
-
-
Ingram, M.1
-
23
-
-
84947612148
-
-
IBM X-Force Trend and Risk Report (2012)
-
IBM X-Force Trend and Risk Report (2012)
-
-
-
-
24
-
-
51849144485
-
The human factor in phishing
-
Privacy &, Security of Consumer Information
-
Jakobsson, M. (2007). The human factor in phishing. Privacy & Security of Consumer Information.
-
(2007)
-
-
Jakobsson, M.1
-
25
-
-
84947615502
-
What Instills Trust? A Qualitative Study of Phishing. Paper presented at the Usable Security (USEC’07)
-
Scarborough, Trinidad/Tobago
-
Jakobsson, M., Tsow, A., Shah, A., Blevis, E., & Lim, Y.-K. (2007). What Instills Trust? A Qualitative Study of Phishing. Paper presented at the Usable Security (USEC’07), Lowlands, Scarborough, Trinidad/Tobago.
-
(2007)
Lowlands
-
-
Jakobsson, M.1
Tsow, A.2
Shah, A.3
Blevis, E.4
Lim, Y.-K.5
-
26
-
-
0035740371
-
Detecting deception: Adversarial problem solving in a Low base rate world
-
Johnson, P. E., Grazioli, S., Jamal, K., & Berryman, G. (2001). Detecting deception: Adversarial problem solving in a Low base rate world. Cognitive Science, 25(3), 355–392.
-
(2001)
Cognitive Science
, vol.25
, Issue.3
, pp. 355-392
-
-
Johnson, P.E.1
Grazioli, S.2
Jamal, K.3
Berryman, G.4
-
27
-
-
38249002176
-
Is beauty in the eye of the beholder?
-
Johnston, V. S., & Franklin, M. (1993). Is beauty in the eye of the beholder? Ethology and Sociobiology, 14(3), 183–199.
-
(1993)
Ethology and Sociobiology
, vol.14
, Issue.3
, pp. 183-199
-
-
Johnston, V.S.1
Franklin, M.2
-
28
-
-
77951243240
-
Heuristic versus systematic processing of specialist versus generalist sources in online media
-
Koh, Y. J., & Sundar, S. S. (2010). Heuristic versus systematic processing of specialist versus generalist sources in online media. Human Communication Research, 36(2), 103–124.
-
(2010)
Human Communication Research
, vol.36
, Issue.2
, pp. 103-124
-
-
Koh, Y.J.1
Sundar, S.S.2
-
30
-
-
84947617842
-
Sen. Grassley’s Twitter Account Hacked by SOPA Protesters
-
Miller, S. (2012). Sen. Grassley’s Twitter Account Hacked by SOPA Protesters, from http://abcnews.go.com/blogs/politics/2012/01/sen-grassleys-twitter-account-hacked-by-sopa-protesters/.
-
(2012)
from
-
-
Miller, S.1
-
31
-
-
84882099663
-
Your Wall Has Ears
-
Nairn, G. (2011). Your Wall Has Ears. The Wall Street Journal from http://online.wsj.com/article/SB10001424052970204226204576600531532461052.html.
-
(2011)
The Wall Street Journal from
-
-
Nairn, G.1
-
32
-
-
84947618498
-
-
Facebook’s Eroding Privacy Policy: A Timeline from Electronic Frontier Foundation
-
Opsahl, K. (2010). Facebook’s Eroding Privacy Policy: A Timeline from Electronic Frontier Foundation http://www.eff.org/deeplinks/2010/04/facebook-timeline.
-
(2010)
-
-
-
33
-
-
84889479981
-
Walking with the scarecrow: The information-processing approach to decision research
-
Koehler DJ, Harvey N, (eds), Blackwell Publishing Ltd., Malden
-
Payne, J. W., & Bettman, J. R. (2008). Walking with the scarecrow: The information-processing approach to decision research. In D. J. Koehler & N. Harvey (Eds.), Blackwell handbook of judgment and decision making (pp. 110–123). Malden: Blackwell Publishing Ltd. doi:10.1002/9780470752937.ch6.
-
(2008)
Blackwell handbook of judgment and decision making
, pp. 110-123
-
-
Payne, J.W.1
Bettman, J.R.2
-
34
-
-
84947615317
-
Phishing attacks cost millions despite low success rate
-
Prince, B. (2009). Phishing attacks cost millions despite low success rate, from http://www.eweek.com/c/a/Security/Phishing-Attacks-Cost-Millions-Despite-Low-Success-Rate-879602/.
-
(2009)
from
-
-
Prince, B.1
-
35
-
-
84947617213
-
Chinese spies used fake Facebook profile to friend NATO officials
-
Protalinski, E. (2012). Chinese spies used fake Facebook profile to friend NATO officials., from http://www.zdnet.com/blog/facebook/chinese-spies-used-fake-facebook-profile-to-friend-nato-officials/10389.
-
(2012)
from
-
-
Protalinski, E.1
-
36
-
-
84947616755
-
Fake soldiers scam Facebook users
-
Quinn, R. (2011). Fake soldiers scam Facebook users. Retrieved from http://www.newser.com/story/113000/fake-soldiers-scam-facebook-users.html.
-
(2011)
Retrieved from
-
-
Quinn, R.1
-
37
-
-
0001963251
-
Comprehension’s role in persuasion: The case of its moderating effect on the persuasive impact of source cues
-
Ratneshwar, S., & Chaiken, S. (1991). Comprehension’s role in persuasion: The case of its moderating effect on the persuasive impact of source cues. Journal of Consumer Research, 52–62.
-
(1991)
Journal of Consumer Research
, pp. 52-62
-
-
Ratneshwar, S.1
Chaiken, S.2
-
38
-
-
84947614456
-
Bank Of America Just Had The Ultimate Social Media Fail
-
Roche, J. L. (2011). Bank Of America Just Had The Ultimate Social Media Fail, from http://articles.businessinsider.com/2011-11-15/wall_street/30400487_1_google-bank-tarp.
-
(2011)
from
-
-
Roche, J.L.1
-
39
-
-
84947616835
-
-
Diffusion of innovations: Free Pr
-
Rogers, E. M. (1995). Diffusion of innovations: Free Pr.
-
(1995)
-
-
Rogers, E.1
-
40
-
-
0000620010
-
Conversation, information, and herd behavior
-
Shiller, R. J. (1995). Conversation, information, and herd behavior. The American Economic Review, 85(2), 181–185.
-
(1995)
The American Economic Review
, vol.85
, Issue.2
, pp. 181-185
-
-
Shiller, R.J.1
-
41
-
-
84959810873
-
A behavioral model of rational choice
-
Simon, H. A. (1955). A behavioral model of rational choice. Quarterly Journal of Economics, 69, 99–118.
-
(1955)
Quarterly Journal of Economics
, vol.69
, pp. 99-118
-
-
Simon, H.A.1
-
43
-
-
0015042181
-
Effects of physical attractiveness, attitude similarity, and sex on various aspects of interpersonal attraction
-
Stroebe, W., Insko, C. A., Thompson, V. D., & Layton, B. D. (1971). Effects of physical attractiveness, attitude similarity, and sex on various aspects of interpersonal attraction. Journal of Personality and Social Psychology, 18(1), 79.
-
(1971)
Journal of Personality and Social Psychology
, vol.18
, Issue.1
, pp. 79
-
-
Stroebe, W.1
Insko, C.A.2
Thompson, V.D.3
Layton, B.D.4
-
44
-
-
49849086604
-
The MAIN model: A heuristic approach to understanding technology effects on credibility. The John D. and Catherine T
-
Sundar, S. S. (2007). The MAIN model: A heuristic approach to understanding technology effects on credibility. The John D. and Catherine T. MacArthur foundation series on digital media and learning, 73–100.
-
(2007)
MacArthur foundation series on digital media and learning
, pp. 73-100
-
-
Sundar, S.S.1
-
45
-
-
33847693227
-
News cues: Information scent and cognitive heuristics
-
Sundar, S. S., Knobloch Westerwick, S., & Hastall, M. R. (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58(3), 366–378.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.3
, pp. 366-378
-
-
Sundar, S.S.1
Knobloch Westerwick, S.2
Hastall, M.R.3
-
47
-
-
33644835803
-
Managing voter impressions: The use of images on presidential candidate web sites during the 2000 campaign
-
Verser, R., & Wicks, R. H. (2006). Managing voter impressions: The use of images on presidential candidate web sites during the 2000 campaign. Journal of Communication, 56(1), 178–197.
-
(2006)
Journal of Communication
, vol.56
, Issue.1
, pp. 178-197
-
-
Verser, R.1
Wicks, R.H.2
-
48
-
-
0242719793
-
Comparing online information effects
-
Vishwanath, A. (2003). Comparing online information effects. Communication Research, 30(6), 579–598.
-
(2003)
Communication Research
, vol.30
, Issue.6
, pp. 579-598
-
-
Vishwanath, A.1
-
49
-
-
79955890012
-
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
-
Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576–586.
-
(2011)
Decision Support Systems
, vol.51
, Issue.3
, pp. 576-586
-
-
Vishwanath, A.1
Herath, T.2
Chen, R.3
Wang, J.4
Rao, H.R.5
-
50
-
-
84947612954
-
An Empirical Exploration Of The Design Pattern Of Phishing Attacks. In S. J. Upadhyaya, and H.R. Rao (Ed.)
-
Security and Privacy Services: Elsevier
-
Wang, J., Chen, R., Herath, T., and Rao, H.R. (2008). An Empirical Exploration Of The Design Pattern Of Phishing Attacks. In S. J. Upadhyaya, and H.R. Rao (Ed.), Annals of Emerging Research in Information Assurance, Security and Privacy Services: Elsevier.
-
(2008)
Annals of Emerging Research in Information Assurance
-
-
Wang, J.1
Chen, R.2
Herath, T.3
Rao, H.R.4
-
51
-
-
5144225384
-
Representations of SARS in the British newspapers
-
Washer, P. (2004). Representations of SARS in the British newspapers. Social Science & Medicine, 59(12), 2561–2571.
-
(2004)
Social Science & Medicine
, vol.59
, Issue.12
, pp. 2561-2571
-
-
Washer, P.1
-
52
-
-
84947615127
-
October 29)
-
Los Angeles Times, Retrieved from
-
Winton, A. B. A. R. (2009, October 29). More celebrities targeted by alleged ‘bling ring’, Los Angeles Times. Retrieved from http://articles.latimes.com/2009/oct/29/local/me-celebrity-burglaries29.
-
(2009)
More celebrities targeted by alleged ‘bling ring’
-
-
Winton, A.B.A.R.1
-
53
-
-
84970248954
-
Interpreting research on gender differences in friendship: a case for moderation and a plea for caution
-
Wright, P. H. (1988). Interpreting research on gender differences in friendship: a case for moderation and a plea for caution. Journal of Social and Personal Relationships, 5(3), 367–373.
-
(1988)
Journal of Social and Personal Relationships
, vol.5
, Issue.3
, pp. 367-373
-
-
Wright, P.H.1
-
54
-
-
0032186529
-
A heuristic‐systematic processing analysis of the effectiveness of product warning labels
-
Zuckerman, A., & Chaiken, S. (1998). A heuristic‐systematic processing analysis of the effectiveness of product warning labels. Psychology and Marketing, 15(7), 621–642.
-
(1998)
Psychology and Marketing
, vol.15
, Issue.7
, pp. 621-642
-
-
Zuckerman, A.1
Chaiken, S.2
|