-
1
-
-
84860433458
-
Cognitive-affective styles associated with position on war
-
Abe, J.A.A. (2012), "Cognitive-affective styles associated with position on war", Journal of Language and Social Psychology, Vol. 31 No. 2, pp. 212-222.
-
(2012)
Journal of Language and Social Psychology
, vol.31
, Issue.2
, pp. 212-222
-
-
Abe, J.A.A.1
-
2
-
-
38549130158
-
Phishing IQ tests measure fear, not ability
-
Anandpara, V., Dingman, A., Jakobsson, M., Liu., D. and Roinestead, D. (2007), " Phishing IQ tests measure fear, not ability ", Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, Heidelberg and Berlin, pp. 362-366.
-
(2007)
Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, Heidelberg and Berlin
, pp. 362-366
-
-
Anandpara, V.1
Dingman, A.2
Jakobsson, M.3
Liu, D.4
Roinestead, D.5
-
3
-
-
34548344520
-
-
2nd Quarter, APWG, San Francisco, CA, (accessed January 2015)
-
Anti Phishing Work Group (2014), "Phishing activity trends report", 2nd Quarter, APWG, San Francisco, CA, available at: www.apwg.org (accessed January 2015).
-
(2014)
Phishing Activity Trends Report
-
-
-
4
-
-
0030201356
-
Interpersonal deception theory
-
Buller, D.B. and Burgoon, J.K. (1996), "Interpersonal deception theory", Communication Theory, Vol. 6 No. 3, pp. 203-242.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.B.1
Burgoon, J.K.2
-
5
-
-
0038407565
-
Fear appeal motivate acceptance of action recommendation: Evidence for a positive bias in the processing of persuasive messages
-
Das, E.H.H.J., de Wit, J.B.F. and Stroebe, W. (2003), "Fear appeal motivate acceptance of action recommendation: evidence for a positive bias in the processing of persuasive messages", Personality and Social Psychology Bulletin, Vol. 29 No. 5, pp. 650-664.
-
(2003)
Personality and Social Psychology Bulletin
, vol.29
, Issue.5
, pp. 650-664
-
-
Das, E.H.H.J.1
De Wit, J.B.F.2
Stroebe, W.3
-
6
-
-
33745816410
-
Why phishing works
-
Dhamija, R., Tygar, J.D. and Hearst, M. (2006), "Why phishing works", Proceedings of Conference on Human Factors in Computing Systems, Montreal, pp. 581-590.
-
(2006)
Proceedings of Conference on Human Factors in Computing Systems, Montreal
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
7
-
-
33144474642
-
On making the right choice: The deliberation-without-attention effect
-
Dijksterhuis, A., Bos, M.W., Nordgren, L.F. and van Baaren, R.B. (2006), "On making the right choice: the deliberation-without-attention effect", Science, Vol. 311 No. 5763, pp. 1005-1007.
-
(2006)
Science
, vol.311
, Issue.5763
, pp. 1005-1007
-
-
Dijksterhuis, A.1
Bos, M.W.2
Nordgren, L.F.3
Van Baaren, R.B.4
-
8
-
-
34249856296
-
Decision strategies and susceptibility to phishing
-
Downs, J., Holbrook, M. and Cranor, L. (2006), "Decision strategies and susceptibility to phishing", Symposium on Usable Privacy and Security, Pittsburgh, PA.
-
(2006)
Symposium on Usable Privacy and Security, Pittsburgh, PA
-
-
Downs, J.1
Holbrook, M.2
Cranor, L.3
-
9
-
-
84962461768
-
One language, two grammars? Differences between British and American English
-
Dreschler, G. (2012), "One language, two grammars? Differences between British and American English", English Studies, Vol. 93 No. 2, pp. 244-246.
-
(2012)
English Studies
, vol.93
, Issue.2
, pp. 244-246
-
-
Dreschler, G.1
-
10
-
-
0003772638
-
-
W.W. Norton, New York, NY
-
Ekman, P. (1985), Telling Lies: Clues to Deceit in the Marketplace, Marriage, and Politics, W.W. Norton, New York, NY.
-
(1985)
Telling Lies: Clues to Deceit in the Marketplace, Marriage, and Politics
-
-
Ekman, P.1
-
11
-
-
84947389309
-
Nonverbal leakage and cues to deception
-
Ekman, P. and Friesen, W.V. (1969), "Nonverbal leakage and cues to deception", Psychiatry, Vol. 32 No. 1, pp. 88-105.
-
(1969)
Psychiatry
, vol.32
, Issue.1
, pp. 88-105
-
-
Ekman, P.1
Friesen, W.V.2
-
12
-
-
41549146748
-
Dual-processing accounts of reasoning, judgement and social cognition
-
Evans, J.S.B. (2008), "Dual-processing accounts of reasoning, judgement and social cognition", Annual Review of Psychology, Vol. 59, pp. 255-278.
-
(2008)
Annual Review of Psychology
, vol.59
, pp. 255-278
-
-
Evans, J.S.B.1
-
13
-
-
0001273506
-
Baseline familiarity in lie detection
-
Feeley, T.H., deTurck, M.A. and Young, M.J. (1995), "Baseline familiarity in lie detection", Communication Research Reports, Vol. 12 No. 2, pp. 160-169.
-
(1995)
Communication Research Reports
, vol.12
, Issue.2
, pp. 160-169
-
-
Feeley, T.H.1
DeTurck, M.A.2
Young, M.J.3
-
14
-
-
75649086141
-
Language style matching as a predictor of social dynamics in small groups
-
Gonzales, A.L., Hancock, J.T. and Pennebaker, J.W. (2010), "Language style matching as a predictor of social dynamics in small groups", Communication Research, Vol. 37 No. 1, pp. 3-19.
-
(2010)
Communication Research
, vol.37
, Issue.1
, pp. 3-19
-
-
Gonzales, A.L.1
Hancock, J.T.2
Pennebaker, J.W.3
-
15
-
-
84944222507
-
Examining the impact of presence on individual phishing victimization
-
doi: 0.1109/HICSS.2015.419
-
Harrison, B., Vishwanath, A., Yu, J. Ng and Rao, R. (2015), "Examining the impact of presence on individual phishing victimization", 48th Hawaii International Conference on System Sciences (HICSS), January 5-8, pp. 3483-3489. doi: 0.1109/HICSS.2015.419.
-
(2015)
48th Hawaii International Conference on System Sciences (HICSS), January 5-8
, pp. 3483-3489
-
-
Harrison, B.1
Vishwanath, A.2
Yu3
Ng, J.4
Rao, R.5
-
16
-
-
67949119113
-
Computational procedures for probing interactions in OLS and logistic regression: SPSS and SAS implementations
-
Hayes, A.F. and Matthes, J. (2009), "Computational procedures for probing interactions in OLS and logistic regression: SPSS and SAS implementations", Behavior Research Methods, Vol. 41 No. 3, pp. 924-936.
-
(2009)
Behavior Research Methods
, vol.41
, Issue.3
, pp. 924-936
-
-
Hayes, A.F.1
Matthes, J.2
-
17
-
-
38549121705
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
Ditrich, S. and Dhamija, R.R. (Eds), Springer Berlin Heidelberg, New York, NY
-
Jackson, C., Simon, D.R., Tan, D.S. and Barth, A. (2007), "An evaluation of extended validation and picture-in-picture phishing attacks", in Ditrich, S. and Dhamija, R.R. (Eds), Financial Cryptography and Data Security, Springer Berlin Heidelberg, New York, NY, pp. 281-293.
-
(2007)
Financial Cryptography and Data Security
, pp. 281-293
-
-
Jackson, C.1
Simon, D.R.2
Tan, D.S.3
Barth, A.4
-
19
-
-
38549134858
-
What instills trust? A qualitative study of phishing
-
Ditrich, S. and Dhamija, R.R. (Eds), Springer Berlin Heidelberg, New York, NY
-
Jakobsson, M., Tsow, A., Shah, A., Blevis, E. and Lim, Y. (2007), "What instills trust? A qualitative study of phishing", in Ditrich, S. and Dhamija, R.R. (Eds), Financial Cryptography and Data Security: Lecture Notes in Computer Science, Volume 4886, Springer Berlin Heidelberg, New York, NY, pp. 356-361.
-
(2007)
Financial Cryptography and Data Security: Lecture Notes in Computer Science
, vol.4886
, pp. 356-361
-
-
Jakobsson, M.1
Tsow, A.2
Shah, A.3
Blevis, E.4
Lim, Y.5
-
20
-
-
0242558072
-
Words of wisdom: Language use over the lifespan
-
Pennebaker, J.W. and Stone, L.D. (2003), "Words of wisdom: language use over the lifespan", Journal of Personality and Social Psychology, Vol. 85 No. 2, pp. 291-301.
-
(2003)
Journal of Personality and Social Psychology
, vol.85
, Issue.2
, pp. 291-301
-
-
Pennebaker, J.W.1
Stone, L.D.2
-
21
-
-
77954394307
-
-
LIWC.net, Austin, TX
-
Pennebaker, J.W., Booth, R.J. and Francis, M.E. (2007), Linguistic Inquiry and Word Count (LIWC2001), LIWC.net, Austin, TX.
-
(2007)
Linguistic Inquiry and Word Count (LIWC2001)
-
-
Pennebaker, J.W.1
Booth, R.J.2
Francis, M.E.3
-
22
-
-
77953970829
-
The elaboration likelihood model of persuasion
-
Berkowitz, L. (Ed.), Academic Press, New York, NY
-
Petty, R.E. and Cacioppo, J.T. (1986), "The elaboration likelihood model of persuasion", in Berkowitz, L. (Ed.), Advances in Experimental Social Psychology, Vol 19, Academic Press, New York, NY, pp. 123-205.
-
(1986)
Advances in Experimental Social Psychology
, vol.19
, pp. 123-205
-
-
Petty, R.E.1
Cacioppo, J.T.2
-
23
-
-
2142789297
-
How people make decisions that involve risk: A dual-processes approach
-
Reyna, V.F. (2004), "How people make decisions that involve risk: a dual-processes approach", Current Directions in Psychological Science, Vol. 13 No. 2, pp. 60-66.
-
(2004)
Current Directions in Psychological Science
, vol.13
, Issue.2
, pp. 60-66
-
-
Reyna, V.F.1
-
24
-
-
0003584083
-
-
Simon and Schuster, New York, NY
-
Rogers, E.M. (1995), Diffusion of Innovations, Simon and Schuster, New York, NY, p. 12.
-
(1995)
Diffusion of Innovations
, pp. 12
-
-
Rogers, E.M.1
-
25
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
-
Cacioppo, J. and Petty, R. (Eds), Guilford, New York, NY
-
Rogers, R.W. (1983), "Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation", in Cacioppo, J. and Petty, R. (Eds), Social Psychophysiology, Guilford, New York, NY, pp. 153-176.
-
(1983)
Social Psychophysiology
, pp. 153-176
-
-
Rogers, R.W.1
-
26
-
-
0033622231
-
The influence of negative advertising frames on political cynicism and politician accountability
-
Schenck-Hamlin, W.J., Procter, D.E. and Rumsey, D.J. (2000), "The influence of negative advertising frames on political cynicism and politician accountability", Human Communication Research, Vol. 26 No. 1, pp. 53-74.
-
(2000)
Human Communication Research
, vol.26
, Issue.1
, pp. 53-74
-
-
Schenck-Hamlin, W.J.1
Procter, D.E.2
Rumsey, D.J.3
-
27
-
-
77954007030
-
Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions
-
ACM
-
Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F. and Downs, J. (2010), "Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions", Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 373-382.
-
(2010)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 373-382
-
-
Sheng, S.1
Holbrook, M.2
Kumaraguru, P.3
Cranor, L.F.4
Downs, J.5
-
29
-
-
77649253939
-
The psychological meaning of words: LIWC and computerized text analysis methods
-
Tausczik, Y.R. and Pennebaker, J.W. (2010), "The psychological meaning of words: LIWC and computerized text analysis methods", Journal of Language and Social Psychology, Vol. 29 No. 1, pp. 24-54.
-
(2010)
Journal of Language and Social Psychology
, vol.29
, Issue.1
, pp. 24-54
-
-
Tausczik, Y.R.1
Pennebaker, J.W.2
-
30
-
-
84887501378
-
-
accessed June 25, 2014
-
Team, Verizon RISK (2013), "Verizon 2013 data breach investigations report", available at: www.verizonenterprise.com/resources/reports/rp-data-breach-investigations-report-2013-en-xg.pdf (accessed June 25, 2014).
-
(2013)
Verizon 2013 Data Breach Investigations Report
-
-
-
31
-
-
84856523527
-
What lies beneath: The linguistic traces of deception in online dating profiles
-
Toma, C.L. and Hancock, J.T. (2012), "What lies beneath: the linguistic traces of deception in online dating profiles", Journal of Communication, Vol. 62 No. 1, pp. 78-97.
-
(2012)
Journal of Communication
, vol.62
, Issue.1
, pp. 78-97
-
-
Toma, C.L.1
Hancock, J.T.2
-
33
-
-
84962364451
-
Suspicion, cognition, automaticity model (SCAM) of phishing susceptibility
-
San Juan
-
Vishwanath, A., Harrison, B. and Ng, Y.J. (2015), "Suspicion, cognition, automaticity model (SCAM) of phishing susceptibility", presented at the Annual Meeting of 65th International Communication Association Conference, San Juan.
-
(2015)
Annual Meeting of 65th International Communication Association Conference
-
-
Vishwanath, A.1
Harrison, B.2
Ng, Y.J.3
-
34
-
-
79955890012
-
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated information processing model
-
Vishwanath, A., Herath, T., Chen, R., Wang, J. and Rao, H.R. (2011), "Why do people get phished? Testing individual differences in phishing vulnerability within an integrated information processing model", Decision Support Systems, Vol. 51 No. 3, pp. 576-586.
-
(2011)
Decision Support Systems
, vol.51
, Issue.3
, pp. 576-586
-
-
Vishwanath, A.1
Herath, T.2
Chen, R.3
Wang, J.4
Rao, H.R.5
-
35
-
-
60049086497
-
A test of intervention for security threats from social engineering
-
Workman, M. (2008), "A test of intervention for security threats from social engineering", Information Management & Computer Security, Vol. 16 No. 5, pp. 463-483.
-
(2008)
Information Management & Computer Security
, vol.16
, Issue.5
, pp. 463-483
-
-
Workman, M.1
-
36
-
-
77955042436
-
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
-
Wright, R. and Marett, K. (2010), "The influence of experiential and dispositional factors in phishing: an empirical investigation of the deceived", Journal of Management Information Systems, Vol. 27 No. 1, pp. 273-303.
-
(2010)
Journal of Management Information Systems
, vol.27
, Issue.1
, pp. 273-303
-
-
Wright, R.1
Marett, K.2
-
37
-
-
3843099453
-
Automating linguistics-based cues for detecting deception in asynchronous computer-mediated communications
-
Zhou, L., Burgoon, J.K., Nunamaker, J.F. and Twitchell, D. (2004), "Automating linguistics-based cues for detecting deception in asynchronous computer-mediated communications", Group Decision and Negotiation, Vol. 13 No. 1, pp. 81-106.
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.1
, pp. 81-106
-
-
Zhou, L.1
Burgoon, J.K.2
Nunamaker, J.F.3
Twitchell, D.4
-
38
-
-
84970382124
-
Cognitive processing of fear-arousing message content
-
Hale, J.L., Lemieux, R. and Mongeau, P.A. (1995), "Cognitive processing of fear-arousing message content", Communication Research, Vol. 22 No. 4, pp. 459-474.
-
(1995)
Communication Research
, vol.22
, Issue.4
, pp. 459-474
-
-
Hale, J.L.1
Lemieux, R.2
Mongeau, P.A.3
-
39
-
-
0001957492
-
An individual differences perspective on assessing cognitive processes
-
Schwarz, N. and Sudman, S. (Eds), Jossey-Bass, San Francisco, CA
-
Petty, R.E. and Jarvis, W.B.G. (1996), "An individual differences perspective on assessing cognitive processes", in Schwarz, N. and Sudman, S. (Eds), Answering Questions: Methodology for Determining Cognitive and Communicative Processes in Survey Research, Jossey-Bass, San Francisco, CA, pp. 221-257.
-
(1996)
Answering Questions: Methodology for Determining Cognitive and Communicative Processes in Survey Research
, pp. 221-257
-
-
Petty, R.E.1
Jarvis, W.B.G.2
|