Aral, S., Muchnik, L., & Sundararajan, A. (2009). Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences, 106
Arora, A., Telang, R., & Xu, H. (2005). Optimal policy for software vulnerability disclosure.
Banerjee, A. V. (1992). A simple model of herd behavior. The Quarterly Journal of Economics, 107(3), 797–817.
Bose, I., & Leung, A. C. M. (2007). Unveiling the mask of phishing: Threats, preventive measures, and responsibilities. Communications of AIS, 19(1), 544–566.
Brenner, J. (2012). Social networking. Pew Internet & American Life Project, November 13, 2012, http://pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx
, accessed on November 28, 2012.
Brios, D. P., George, J. F., & Zmund, R. W. (2002). Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Quarterly, 26
Chaiken, S. (1980). Heuristic versus systematic information processing and the use of source versus message cues in persuasion. Journal of Personality and Social Psychology, 39
Chaiken, S. (1987). The heuristic model of persuasion.
Chaiken, S., & Eagly, A. H. (1989). Heuristic and systematic information processing within and. Unintended Thought, 212.
Chaiken, S., & Trope, Y. (1999). Dual-process theories in social psychology. New York: Guilford Press.
Chen, S., & Chaiken, S. (1999). The heuristic-systematic model in its broader context. Dual-Process Theories in Social Psychology, 73–96.
Clogg, C. C., Petkova, E., & Haritou, A. (1995). Statistical methods for comparing regression coefficients between models. American Journal of Sociology, 1261–1293.
Cohen, A. (1983). Comparing regression coefficients across subsamples. Sociological Methods & Research, 12
Cummings, J. N., Butler, B., & Kraut, R. (2002). The quality of online social relationships. Communications of the ACM, 45
Dholakia, U. M., Basuroy, S., & Soltysinski, K. (2002). Auction or agent (or both)? A study of moderators of the herding bias in digital auctions. International Journal of Research in Marketing, 19
Dvorak, J. C. (2011, January 19). LinkedIn account hacked, from http://www.pcmag.com/article2/0,2817,2375983,00.asp
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12
Fichman, R. G. (1992). Information technology diffusion: A review of empirical research.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks.
Hall, A. (2010). Top German firms ban Facebook and Twitter from workplace over industrial espionage fears. Mail Online.
Herbeck, D., & Besecker, A. (2011). Hardworking teacher masked his sinster side, The Buffalo News.
Ingram, M. (2010). Mary Meeker: Mobile Internet Will Soon Overtake Fixed Internet (Morgan Stanley Report), from http://gigaom.com/2010/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/
IBM X-Force Trend and Risk Report (2012)
Jakobsson, M. (2007). The human factor in phishing. Privacy & Security of Consumer Information.
Jakobsson, M., Tsow, A., Shah, A., Blevis, E., & Lim, Y.-K. (2007). What Instills Trust? A Qualitative Study of Phishing. Paper presented at the Usable Security (USEC’07), Lowlands, Scarborough, Trinidad/Tobago.
Johnson, P. E., Grazioli, S., Jamal, K., & Berryman, G. (2001). Detecting deception: Adversarial problem solving in a Low base rate world. Cognitive Science, 25
Johnston, V. S., & Franklin, M. (1993). Is beauty in the eye of the beholder? Ethology and Sociobiology, 14
Koh, Y. J., & Sundar, S. S. (2010). Heuristic versus systematic processing of specialist versus generalist sources in online media. Human Communication Research, 36
Madden, M. (2010). Older adults and social media: Pew Internet & American Life Project.
Payne, J. W., & Bettman, J. R. (2008). Walking with the scarecrow: The information-processing approach to decision research. In D. J. Koehler & N. Harvey (Eds.), Blackwell handbook of judgment and decision making
(pp. 110–123). Malden: Blackwell Publishing Ltd.. doi:10.1002/9780470752937.ch6
Ratneshwar, S., & Chaiken, S. (1991). Comprehension’s role in persuasion: The case of its moderating effect on the persuasive impact of source cues. Journal of Consumer Research, 52–62.
Rogers, E. M. (1995). Diffusion of innovations: Free Pr.
Shiller, R. J. (1995). Conversation, information, and herd behavior. The American Economic Review, 85(2), 181–185.
Simon, H. A. (1955). A behavioral model of rational choice. Quarterly Journal of Economics, 69
Smith, A. (2012). Nearly half of american adults are smartphone owners: Pew center & American life project.
Stroebe, W., Insko, C. A., Thompson, V. D., & Layton, B. D. (1971). Effects of physical attractiveness, attitude similarity, and sex on various aspects of interpersonal attraction. Journal of Personality and Social Psychology, 18
Sundar, S. S. (2007). The MAIN model: A heuristic approach to understanding technology effects on credibility. The John D. and Catherine T. MacArthur foundation series on digital media and learning, 73–100.
Sundar, S. S., Knobloch Westerwick, S., & Hastall, M. R. (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58
Valente, T. W. (1996). Network models of the diffusion of innovations. Computational and Mathematical Organization Theory, 2
Verser, R., & Wicks, R. H. (2006). Managing voter impressions: The use of images on presidential candidate web sites during the 2000 campaign. Journal of Communication, 56
Vishwanath, A. (2003). Comparing online information effects. Communication Research, 30
Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51
Wang, J., Chen, R., Herath, T., and Rao, H.R. . (2008). An Empirical Exploration Of The Design Pattern Of Phishing Attacks. In S. J. Upadhyaya, and H.R. Rao (Ed.), Annals of Emerging Research in Information Assurance, Security and Privacy Services: Elsevier.
Washer, P. (2004). Representations of SARS in the British newspapers. Social Science & Medicine, 59
Winton, A. B. A. R. (2009, October 29). More celebrities targeted by alleged ‘bling ring’, Los Angeles Times
. Retrieved from http://articles.latimes.com/2009/oct/29/local/me-celebrity-burglaries29
Wright, P. H. (1988). Interpreting research on gender differences in friendship: a case for moderation and a plea for caution. Journal of Social and Personal Relationships, 5(3), 367–373.
Zuckerman, A., & Chaiken, S. (1998). A heuristic‐systematic processing analysis of the effectiveness of product warning labels. Psychology and Marketing, 15