메뉴 건너뛰기




Volumn 17, Issue 6, 2015, Pages 1353-1367

Diffusion of deception in social media: Social contagion effects and its antecedents

Author keywords

Computer mediated communication and collaboration; IT diffusion and adoption; Laboratory experiments; Online deception; Phishing; Social contagion; Social media

Indexed keywords

COMPUTER CRIME; INFORMATION DISSEMINATION; SOCIAL NETWORKING (ONLINE);

EID: 84947612191     PISSN: 13873326     EISSN: 15729419     Source Type: Journal    
DOI: 10.1007/s10796-014-9509-2     Document Type: Article
Times cited : (39)

References (54)
  • 1
    • 76049088642 scopus 로고    scopus 로고
    • Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks
    • Aral, S., Muchnik, L., & Sundararajan, A. (2009). Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences, 106(51), 21544–21549.
    • (2009) Proceedings of the National Academy of Sciences , vol.106 , Issue.51 , pp. 21544-21549
    • Aral, S.1    Muchnik, L.2    Sundararajan, A.3
  • 2
    • 84947616781 scopus 로고    scopus 로고
    • Xu, H: Optimal policy for software vulnerability disclosure
    • Arora, A., Telang, R., & Xu, H. (2005). Optimal policy for software vulnerability disclosure.
    • (2005)
    • Arora, A.1    Telang, R.2
  • 3
  • 4
    • 40749083825 scopus 로고    scopus 로고
    • Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
    • Bose, I., & Leung, A. C. M. (2007). Unveiling the mask of phishing: Threats, preventive measures, and responsibilities. Communications of AIS, 19(1), 544–566.
    • (2007) Communications of AIS , vol.19 , Issue.1 , pp. 544-566
    • Bose, I.1    Leung, A.C.M.2
  • 5
    • 84947612060 scopus 로고    scopus 로고
    • Brenner, J. (2012). Social networking. Pew Internet & American Life Project, November 13, 2012, , accessed on November 28, 2012
    • Brenner, J. (2012). Social networking. Pew Internet & American Life Project, November 13, 2012, http://pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx, accessed on November 28, 2012.
  • 6
    • 9744258059 scopus 로고    scopus 로고
    • Inducing sensitivity to deception in order to improve decision making performance: A field study
    • Brios, D. P., George, J. F., & Zmund, R. W. (2002). Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Quarterly, 26, 119–144.
    • (2002) MIS Quarterly , vol.26 , pp. 119-144
    • Brios, D.P.1    George, J.F.2    Zmund, R.W.3
  • 7
    • 85047681068 scopus 로고
    • Heuristic versus systematic information processing and the use of source versus message cues in persuasion
    • Chaiken, S. (1980). Heuristic versus systematic information processing and the use of source versus message cues in persuasion. Journal of Personality and Social Psychology, 39(5), 752.
    • (1980) Journal of Personality and Social Psychology , vol.39 , Issue.5 , pp. 752
    • Chaiken, S.1
  • 8
    • 84947616374 scopus 로고    scopus 로고
    • Chaiken, S. (1987). The heuristic model of persuasion
    • Chaiken, S. (1987). The heuristic model of persuasion.
  • 9
    • 0002016719 scopus 로고
    • Heuristic and systematic information processing within and
    • Chaiken, S., & Eagly, A. H. (1989). Heuristic and systematic information processing within and. Unintended Thought, 212.
    • (1989) Unintended Thought , pp. 212
    • Chaiken, S.1    Eagly, A.H.2
  • 12
    • 42649123893 scopus 로고
    • Statistical methods for comparing regression coefficients between models
    • Clogg, C. C., Petkova, E., & Haritou, A. (1995). Statistical methods for comparing regression coefficients between models. American Journal of Sociology, 1261–1293.
    • (1995) American Journal of Sociology , pp. 1261-1293
    • Clogg, C.C.1    Petkova, E.2    Haritou, A.3
  • 13
    • 84977060091 scopus 로고
    • Comparing regression coefficients across subsamples
    • Cohen, A. (1983). Comparing regression coefficients across subsamples. Sociological Methods & Research, 12(1), 77–94.
    • (1983) Sociological Methods & Research , vol.12 , Issue.1 , pp. 77-94
    • Cohen, A.1
  • 14
  • 15
    • 0036274176 scopus 로고    scopus 로고
    • Auction or agent (or both)? A study of moderators of the herding bias in digital auctions
    • Dholakia, U. M., Basuroy, S., & Soltysinski, K. (2002). Auction or agent (or both)? A study of moderators of the herding bias in digital auctions. International Journal of Research in Marketing, 19(2), 115–130.
    • (2002) International Journal of Research in Marketing , vol.19 , Issue.2 , pp. 115-130
    • Dholakia, U.M.1    Basuroy, S.2    Soltysinski, K.3
  • 16
    • 84947614657 scopus 로고    scopus 로고
    • Dvorak, J. C. (2011, January 19). LinkedIn account hacked, from
    • Dvorak, J. C. (2011, January 19). LinkedIn account hacked, from http://www.pcmag.com/article2/0,2817,2375983,00.asp.
  • 17
    • 34548285057 scopus 로고    scopus 로고
    • The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites
    • Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168.
    • (2007) Journal of Computer-Mediated Communication , vol.12 , Issue.4 , pp. 1143-1168
    • Ellison, N.B.1    Steinfield, C.2    Lampe, C.3
  • 18
    • 84947612124 scopus 로고
    • Information technology diffusion: A review of empirical research
    • Fichman, R. G. (1992). Information technology diffusion: A review of empirical research.
    • (1992)
    • Fichman, R.1
  • 19
    • 84947616550 scopus 로고    scopus 로고
    • Acquisti, A: Information revelation and privacy in online social networks
    • Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks.
    • (2005)
    • Gross, R.1
  • 20
    • 84947617205 scopus 로고    scopus 로고
    • Top German firms ban Facebook and Twitter from workplace over industrial espionage fears
    • Hall, A. (2010). Top German firms ban Facebook and Twitter from workplace over industrial espionage fears. Mail Online.
    • (2010) Mail Online
    • Hall, A.1
  • 21
    • 84947615867 scopus 로고    scopus 로고
    • Hardworking teacher masked his sinster side, The Buffalo News
    • Herbeck, D., & Besecker, A. (2011). Hardworking teacher masked his sinster side, The Buffalo News.
    • (2011) & Besecker, A
    • Herbeck, D.1
  • 22
    • 84947617576 scopus 로고    scopus 로고
    • Mary Meeker: Mobile Internet Will Soon Overtake Fixed Internet (Morgan Stanley Report)
    • Ingram, M. (2010). Mary Meeker: Mobile Internet Will Soon Overtake Fixed Internet (Morgan Stanley Report), from http://gigaom.com/2010/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/.
    • (2010) from
    • Ingram, M.1
  • 23
    • 84947612148 scopus 로고    scopus 로고
    • IBM X-Force Trend and Risk Report (2012)
    • IBM X-Force Trend and Risk Report (2012)
  • 24
    • 51849144485 scopus 로고    scopus 로고
    • The human factor in phishing
    • Privacy &, Security of Consumer Information
    • Jakobsson, M. (2007). The human factor in phishing. Privacy & Security of Consumer Information.
    • (2007)
    • Jakobsson, M.1
  • 25
    • 84947615502 scopus 로고    scopus 로고
    • What Instills Trust? A Qualitative Study of Phishing. Paper presented at the Usable Security (USEC’07)
    • Scarborough, Trinidad/Tobago
    • Jakobsson, M., Tsow, A., Shah, A., Blevis, E., & Lim, Y.-K. (2007). What Instills Trust? A Qualitative Study of Phishing. Paper presented at the Usable Security (USEC’07), Lowlands, Scarborough, Trinidad/Tobago.
    • (2007) Lowlands
    • Jakobsson, M.1    Tsow, A.2    Shah, A.3    Blevis, E.4    Lim, Y.-K.5
  • 26
    • 0035740371 scopus 로고    scopus 로고
    • Detecting deception: Adversarial problem solving in a Low base rate world
    • Johnson, P. E., Grazioli, S., Jamal, K., & Berryman, G. (2001). Detecting deception: Adversarial problem solving in a Low base rate world. Cognitive Science, 25(3), 355–392.
    • (2001) Cognitive Science , vol.25 , Issue.3 , pp. 355-392
    • Johnson, P.E.1    Grazioli, S.2    Jamal, K.3    Berryman, G.4
  • 27
    • 38249002176 scopus 로고
    • Is beauty in the eye of the beholder?
    • Johnston, V. S., & Franklin, M. (1993). Is beauty in the eye of the beholder? Ethology and Sociobiology, 14(3), 183–199.
    • (1993) Ethology and Sociobiology , vol.14 , Issue.3 , pp. 183-199
    • Johnston, V.S.1    Franklin, M.2
  • 28
    • 77951243240 scopus 로고    scopus 로고
    • Heuristic versus systematic processing of specialist versus generalist sources in online media
    • Koh, Y. J., & Sundar, S. S. (2010). Heuristic versus systematic processing of specialist versus generalist sources in online media. Human Communication Research, 36(2), 103–124.
    • (2010) Human Communication Research , vol.36 , Issue.2 , pp. 103-124
    • Koh, Y.J.1    Sundar, S.S.2
  • 30
    • 84947617842 scopus 로고    scopus 로고
    • Sen. Grassley’s Twitter Account Hacked by SOPA Protesters
    • Miller, S. (2012). Sen. Grassley’s Twitter Account Hacked by SOPA Protesters, from http://abcnews.go.com/blogs/politics/2012/01/sen-grassleys-twitter-account-hacked-by-sopa-protesters/.
    • (2012) from
    • Miller, S.1
  • 31
    • 84882099663 scopus 로고    scopus 로고
    • Your Wall Has Ears
    • Nairn, G. (2011). Your Wall Has Ears. The Wall Street Journal from http://online.wsj.com/article/SB10001424052970204226204576600531532461052.html.
    • (2011) The Wall Street Journal from
    • Nairn, G.1
  • 32
    • 84947618498 scopus 로고    scopus 로고
    • Facebook’s Eroding Privacy Policy: A Timeline from Electronic Frontier Foundation
    • Opsahl, K. (2010). Facebook’s Eroding Privacy Policy: A Timeline from Electronic Frontier Foundation http://www.eff.org/deeplinks/2010/04/facebook-timeline.
    • (2010)
  • 33
    • 84889479981 scopus 로고    scopus 로고
    • Walking with the scarecrow: The information-processing approach to decision research
    • Koehler DJ, Harvey N, (eds), Blackwell Publishing Ltd., Malden
    • Payne, J. W., & Bettman, J. R. (2008). Walking with the scarecrow: The information-processing approach to decision research. In D. J. Koehler & N. Harvey (Eds.), Blackwell handbook of judgment and decision making (pp. 110–123). Malden: Blackwell Publishing Ltd. doi:10.1002/9780470752937.ch6.
    • (2008) Blackwell handbook of judgment and decision making , pp. 110-123
    • Payne, J.W.1    Bettman, J.R.2
  • 34
    • 84947615317 scopus 로고    scopus 로고
    • Phishing attacks cost millions despite low success rate
    • Prince, B. (2009). Phishing attacks cost millions despite low success rate, from http://www.eweek.com/c/a/Security/Phishing-Attacks-Cost-Millions-Despite-Low-Success-Rate-879602/.
    • (2009) from
    • Prince, B.1
  • 35
    • 84947617213 scopus 로고    scopus 로고
    • Chinese spies used fake Facebook profile to friend NATO officials
    • Protalinski, E. (2012). Chinese spies used fake Facebook profile to friend NATO officials., from http://www.zdnet.com/blog/facebook/chinese-spies-used-fake-facebook-profile-to-friend-nato-officials/10389.
    • (2012) from
    • Protalinski, E.1
  • 36
    • 84947616755 scopus 로고    scopus 로고
    • Fake soldiers scam Facebook users
    • Quinn, R. (2011). Fake soldiers scam Facebook users. Retrieved from http://www.newser.com/story/113000/fake-soldiers-scam-facebook-users.html.
    • (2011) Retrieved from
    • Quinn, R.1
  • 37
    • 0001963251 scopus 로고
    • Comprehension’s role in persuasion: The case of its moderating effect on the persuasive impact of source cues
    • Ratneshwar, S., & Chaiken, S. (1991). Comprehension’s role in persuasion: The case of its moderating effect on the persuasive impact of source cues. Journal of Consumer Research, 52–62.
    • (1991) Journal of Consumer Research , pp. 52-62
    • Ratneshwar, S.1    Chaiken, S.2
  • 38
    • 84947614456 scopus 로고    scopus 로고
    • Bank Of America Just Had The Ultimate Social Media Fail
    • Roche, J. L. (2011). Bank Of America Just Had The Ultimate Social Media Fail, from http://articles.businessinsider.com/2011-11-15/wall_street/30400487_1_google-bank-tarp.
    • (2011) from
    • Roche, J.L.1
  • 39
    • 84947616835 scopus 로고
    • Diffusion of innovations: Free Pr
    • Rogers, E. M. (1995). Diffusion of innovations: Free Pr.
    • (1995)
    • Rogers, E.1
  • 40
    • 0000620010 scopus 로고
    • Conversation, information, and herd behavior
    • Shiller, R. J. (1995). Conversation, information, and herd behavior. The American Economic Review, 85(2), 181–185.
    • (1995) The American Economic Review , vol.85 , Issue.2 , pp. 181-185
    • Shiller, R.J.1
  • 41
    • 84959810873 scopus 로고
    • A behavioral model of rational choice
    • Simon, H. A. (1955). A behavioral model of rational choice. Quarterly Journal of Economics, 69, 99–118.
    • (1955) Quarterly Journal of Economics , vol.69 , pp. 99-118
    • Simon, H.A.1
  • 43
    • 0015042181 scopus 로고
    • Effects of physical attractiveness, attitude similarity, and sex on various aspects of interpersonal attraction
    • Stroebe, W., Insko, C. A., Thompson, V. D., & Layton, B. D. (1971). Effects of physical attractiveness, attitude similarity, and sex on various aspects of interpersonal attraction. Journal of Personality and Social Psychology, 18(1), 79.
    • (1971) Journal of Personality and Social Psychology , vol.18 , Issue.1 , pp. 79
    • Stroebe, W.1    Insko, C.A.2    Thompson, V.D.3    Layton, B.D.4
  • 44
    • 49849086604 scopus 로고    scopus 로고
    • The MAIN model: A heuristic approach to understanding technology effects on credibility. The John D. and Catherine T
    • Sundar, S. S. (2007). The MAIN model: A heuristic approach to understanding technology effects on credibility. The John D. and Catherine T. MacArthur foundation series on digital media and learning, 73–100.
    • (2007) MacArthur foundation series on digital media and learning , pp. 73-100
    • Sundar, S.S.1
  • 47
    • 33644835803 scopus 로고    scopus 로고
    • Managing voter impressions: The use of images on presidential candidate web sites during the 2000 campaign
    • Verser, R., & Wicks, R. H. (2006). Managing voter impressions: The use of images on presidential candidate web sites during the 2000 campaign. Journal of Communication, 56(1), 178–197.
    • (2006) Journal of Communication , vol.56 , Issue.1 , pp. 178-197
    • Verser, R.1    Wicks, R.H.2
  • 48
    • 0242719793 scopus 로고    scopus 로고
    • Comparing online information effects
    • Vishwanath, A. (2003). Comparing online information effects. Communication Research, 30(6), 579–598.
    • (2003) Communication Research , vol.30 , Issue.6 , pp. 579-598
    • Vishwanath, A.1
  • 49
    • 79955890012 scopus 로고    scopus 로고
    • Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
    • Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576–586.
    • (2011) Decision Support Systems , vol.51 , Issue.3 , pp. 576-586
    • Vishwanath, A.1    Herath, T.2    Chen, R.3    Wang, J.4    Rao, H.R.5
  • 50
    • 84947612954 scopus 로고    scopus 로고
    • An Empirical Exploration Of The Design Pattern Of Phishing Attacks. In S. J. Upadhyaya, and H.R. Rao (Ed.)
    • Security and Privacy Services: Elsevier
    • Wang, J., Chen, R., Herath, T., and Rao, H.R. (2008). An Empirical Exploration Of The Design Pattern Of Phishing Attacks. In S. J. Upadhyaya, and H.R. Rao (Ed.), Annals of Emerging Research in Information Assurance, Security and Privacy Services: Elsevier.
    • (2008) Annals of Emerging Research in Information Assurance
    • Wang, J.1    Chen, R.2    Herath, T.3    Rao, H.R.4
  • 51
    • 5144225384 scopus 로고    scopus 로고
    • Representations of SARS in the British newspapers
    • Washer, P. (2004). Representations of SARS in the British newspapers. Social Science & Medicine, 59(12), 2561–2571.
    • (2004) Social Science & Medicine , vol.59 , Issue.12 , pp. 2561-2571
    • Washer, P.1
  • 53
    • 84970248954 scopus 로고
    • Interpreting research on gender differences in friendship: a case for moderation and a plea for caution
    • Wright, P. H. (1988). Interpreting research on gender differences in friendship: a case for moderation and a plea for caution. Journal of Social and Personal Relationships, 5(3), 367–373.
    • (1988) Journal of Social and Personal Relationships , vol.5 , Issue.3 , pp. 367-373
    • Wright, P.H.1
  • 54
    • 0032186529 scopus 로고    scopus 로고
    • A heuristic‐systematic processing analysis of the effectiveness of product warning labels
    • Zuckerman, A., & Chaiken, S. (1998). A heuristic‐systematic processing analysis of the effectiveness of product warning labels. Psychology and Marketing, 15(7), 621–642.
    • (1998) Psychology and Marketing , vol.15 , Issue.7 , pp. 621-642
    • Zuckerman, A.1    Chaiken, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.