1
|
Jabutay F, Novio EB, Verbal XF. Strategic deception in call centers: impacts on well-being, cognition, and work motivation. THE JOURNAL OF GENERAL PSYCHOLOGY 2024:1-27. [PMID: 38459854 DOI: 10.1080/00221309.2024.2327323] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/17/2023] [Accepted: 02/27/2024] [Indexed: 03/11/2024]
Abstract
The literature indicated that deceivers in face-to-face communication experience psychological strains derived from guilt or distress associated with violating conversational rules. We proposed that this also applies to telephone-mediated deception. Drawing insights from the theoretical and empirical literature, we surmised that strategic trickery utilized by outsourced call center agents would elicit adverse psychological reactions that have unfavorable impacts on their well-being, cognition, and work motivation. We used structural equation modeling to test our hypotheses using data from a sample of 554 outsourced Filipino call service agents who worked graveyard shifts to cater to mainly American customers. The results suggested that strategic deception increases the experience of cognitive dissonance while negatively impacting psychological well-being and intrinsic work motivation. The results also showed that dissonance negatively influences well-being and intrinsic motivation and partially mediates the deception-motivation relationship. Unlike previous findings, however, our multivariate analyses revealed that well-being and motivation were not correlated. Our original findings have theoretical and practical implications.
Collapse
|
2
|
Dando CJ. Sorting Insiders From Co-Workers: Remote Synchronous Computer-Mediated Triage for Investigating Insider Attacks. HUMAN FACTORS 2024; 66:145-157. [PMID: 35249401 PMCID: PMC10756022 DOI: 10.1177/00187208211068292] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/25/2021] [Accepted: 11/27/2021] [Indexed: 06/14/2023]
Abstract
OBJECTIVE Develop and investigate the potential of a remote, computer-mediated and synchronous text-based triage, which we refer to as InSort, for quickly highlighting persons of interest after an insider attack. BACKGROUND Insiders maliciously exploit legitimate access to impair the confidentiality and integrity of organizations. The globalisation of organisations and advancement of information technology means employees are often dispersed across national and international sites, working around the clock, often remotely. Hence, investigating insider attacks is challenging. However, the cognitive demands associated with masking insider activity offer opportunities. Drawing on cognitive approaches to deception and understanding of deception-conveying features in textual responses, we developed InSort, a remote computer-mediated triage. METHOD During a 6-hour immersive simulation, participants worked in teams, examining password protected, security sensitive databases and exchanging information during an organized crime investigation. Twenty-five percent were covertly incentivized to act as an 'insider' by providing information to a provocateur. RESULTS Responses to InSort questioning revealed insiders took longer to answer investigation relevant questions, provided impoverished responses, and their answers were less consistent with known evidence about their behaviours than co-workers. CONCLUSION Findings demonstrate InSort has potential to expedite information gathering and investigative processes following an insider attack. APPLICATION InSort is appropriate for application by non-specialist investigators and can be quickly altered as a function of both environment and event. InSort offers a clearly defined, well specified, approach for use across insider incidents, and highlights the potential of technology for supporting complex time critical investigations.
Collapse
Affiliation(s)
- Coral J. Dando
- Department of Psychology, University of Westminster, London
| |
Collapse
|
3
|
Ayaburi EW, Andoh-Baidoo FK. How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control. EUR J INFORM SYST 2023. [DOI: 10.1080/0960085x.2023.2186275] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/08/2023]
Affiliation(s)
- Emmanuel W. Ayaburi
- Department of Information Systems, Cleveland State University, Cleveland, Ohio, USA
| | | |
Collapse
|
4
|
Expressing uncertainty in information systems analytics research: A demonstration of Bayesian analysis applied to binary classification problems. Inf Process Manag 2023. [DOI: 10.1016/j.ipm.2022.103132] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
|
5
|
Li L, Xu L, He W. The effects of antecedents and mediating factors on cybersecurity protection behavior. COMPUTERS IN HUMAN BEHAVIOR REPORTS 2022. [DOI: 10.1016/j.chbr.2021.100165] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022] Open
|
6
|
Kumar N, Qiu L, Kumar S. A Hashtag Is Worth a Thousand Words: An Empirical Investigation of Social Media Strategies in Trademarking Hashtags. INFORMATION SYSTEMS RESEARCH 2022. [DOI: 10.1287/isre.2022.1107] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
Abstract
Firms of all sizes are “joining the conversation” on social media platforms and increasingly trademarking hashtags related to their products and brands. This added effort to protect intellectual property and its impact on social media engagement have not been investigated in the literature. In this study, we find that trademarking hashtags plays a pivotal role in increasing social media audience engagement and information dissemination. More importantly, this positive effect is stronger for firms with fewer Twitter followers. Digging deeper into the underlying mechanisms, we find that trademarking hashtags makes composing tweets with certain linguistic styles more critical: It can amplify the positive effects of trademarking hashtags on social media audience engagement. Our findings highlight important managerial implications of trademarking hashtags. First of all, we examine whether trademarking a hashtag helps or hurts a firm in terms of its social media audience engagement. Further, we show, to maximize the effectiveness of trademarking hashtags, how firms should develop the right social media engagement strategies by taking specific communication and linguistic styles into account. Our results provide useful insights to firms in understanding the key benefits of signaling through trademarking hashtags on social media engagement.
Collapse
Affiliation(s)
- Naveen Kumar
- Division of Management Information Systems, Price College of Business, University of Oklahoma, Norman, Oklahoma 73019
| | - Liangfei Qiu
- Department of Information Systems and Operations Management, Warrington College of Business, University of Florida, Gainesville, Florida 32611
| | - Subodha Kumar
- Department of Statistics, Operations, and Data Science, Fox School of Business, Temple University, Philadelphia, Pennsylvania 19122
| |
Collapse
|
7
|
Ng KC, Tang J, Lee D. The Effect of Platform Intervention Policies on Fake News Dissemination and Survival: An Empirical Examination. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2021.1990612] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Affiliation(s)
- Ka Chung Ng
- Department of Information Systems, Business Statistics and Operations Management, School of Business and Management, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, HONG KONG
- Department of Management and Marketing, Faculty of Business, Hong Kong Polytechnic University, Hung Hom, Kowloon, HONG KONG
| | - Jie Tang
- HKU Business School, The University of Hong Kong, Pok Fu Lam, Hong Kong, HONG KONG
| | - Dongwon Lee
- Department of Information Systems, Business Statistics and Operations Management, School of Business and Management, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, HONG KONG
| |
Collapse
|
8
|
Zhang W, Xu Y, Zheng H, Li L. Verbal vs. Nonverbal Cues in Static and Dynamic Contexts of Fraud Detection in Crowdsourcing. JOURNAL OF GLOBAL INFORMATION MANAGEMENT 2022. [DOI: 10.4018/jgim.310928] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
As an important mode of open innovation, crowdsourcing can effectively integrate external resources, enabling enterprises to obtain stronger competitiveness and more benefits at a faster speed and lower cost. However, this mode has inevitable intellectual property protection challenges, especially on contest-based crowdsourcing platforms. Previous studies mostly focused on the protection of the rights of sponsors while ignoring the rights of workers, rarely paying attention to sponsor fraud, which may reduce the enthusiasm of participants and eventually turn crowdsourcing;' into a lemon market. This study proposes several fraud detection models to address this problem on contest-based crowdsourcing platforms. Furthermore, this paper explores and compares the value of four types of information as deception cues in crowdsourcing contexts via data mining technology and machine learning methods. The results benefit participants in crowdsourcing markets and contribute to fraud detection research and open innovation in the knowledge economy.
Collapse
Affiliation(s)
- Wenjie Zhang
- School of Public Administration, Southwestern University of Finance and Economics, China
| | - Yun Xu
- School of Management Science and Engineering, Southwestern University of Finance and Economics, China & The Collaborative Innovation Centre for the Innovation and Regulation of Internet-based Finance, China
| | - Haichao Zheng
- School of Management Science and Engineering, Southwestern University of Finance and Economics; & The Key Laboratory of Financial Intelligence and Financial Engineering of Sichuan Province, China
| | - Liting Li
- School of Management Science and Engineering, Southwestern University of Finance and Economics, China
| |
Collapse
|
9
|
Van Der Zee S, Poppe R, Havrileck A, Baillon A. A Personal Model of Trumpery: Linguistic Deception Detection in a Real-World High-Stakes Setting. Psychol Sci 2021; 33:3-17. [PMID: 34932410 DOI: 10.1177/09567976211015941] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
Language use differs between truthful and deceptive statements, but not all differences are consistent across people and contexts, complicating the identification of deceit in individuals. By relying on fact-checked tweets, we showed in three studies (Study 1: 469 tweets; Study 2: 484 tweets; Study 3: 24 models) how well personalized linguistic deception detection performs by developing the first deception model tailored to an individual: the 45th U.S. president. First, we found substantial linguistic differences between factually correct and factually incorrect tweets. We developed a quantitative model and achieved 73% overall accuracy. Second, we tested out-of-sample prediction and achieved 74% overall accuracy. Third, we compared our personalized model with linguistic models previously reported in the literature. Our model outperformed existing models by 5 percentage points, demonstrating the added value of personalized linguistic analysis in real-world settings. Our results indicate that factually incorrect tweets by the U.S. president are not random mistakes of the sender.
Collapse
Affiliation(s)
- Sophie Van Der Zee
- Department of Applied Economics, Erasmus School of Economics, Erasmus University Rotterdam
| | - Ronald Poppe
- Department of Information and Computing Sciences, Utrecht University
| | - Alice Havrileck
- Department of Applied Economics, Erasmus School of Economics, Erasmus University Rotterdam.,Department of Economics and Management, École Normale Supérieure Paris-Saclay
| | - Aurélien Baillon
- Department of Applied Economics, Erasmus School of Economics, Erasmus University Rotterdam
| |
Collapse
|
10
|
Khan A, Brohman K, Addas S. The anatomy of ‘fake news’: Studying false messages as digital objects. JOURNAL OF INFORMATION TECHNOLOGY 2021. [DOI: 10.1177/02683962211037693] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Public concern about ‘fake news’ skyrocketed following the 2016 US presidential election and the Brexit referendum, and has only intensified since then. A burgeoning body of research on the topic is emerging, and conceptual clarity is vital for this research to converge into a cumulative body of knowledge; the purpose of this article is to underline and address some of the conceptual clutter and ambiguities around the concept of fake news and situate it within its social context. To do so, we first discuss the problems with current terminology and conceptualisation, and then draw on recent developments on the ontology of digital objects and their attributes to shift the focus from fake news to false messages, a type of syntactic digital objects comprised of content and structure and characterised by attributes of editability, openness, interactivity, and distributedness. Then we expand this concept further by placing it within a network of actors and digital objects. Our analysis uncovers several areas of research that have been overlooked in the study of fake news.
Collapse
|
11
|
Liu R, Mai F, Shan Z, Wu Y. Predicting shareholder litigation on insider trading from financial text: An interpretable deep learning approach. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2020.103387] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
12
|
Markowitz DM. The deception faucet: A metaphor to conceptualize deception and its detection. NEW IDEAS IN PSYCHOLOGY 2020. [DOI: 10.1016/j.newideapsych.2020.100816] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
13
|
Twyman NW, Proudfoot JG, Cameron AF, Case E, Burgoon JK, Twitchell DP. Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1759938] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
Affiliation(s)
- Nathan W. Twyman
- Department of Information Systems, Marriott School of Business, Brigham Young University, Provo, UT, USA
| | - Jeffrey G. Proudfoot
- Information and Process Management Department, Bentley University, Waltham, MA, USA
| | | | - Eric Case
- Ira A. Fulton Schools of Engineering, Arizona State University, Tucson, AZ, USA
- Information Security, TuSimple, Inc., Tucson, AZ, USA
| | - Judee K. Burgoon
- Center for the Management of Information, Eller College of Management, University of Arizona, Tucson, AZ, USA
| | - Douglas P. Twitchell
- Information Technology Management, College of Business and Economics, Boise State University, Boise, ID, USA
| |
Collapse
|
14
|
Dong Y, Tang Y, Wu SXY, Dong WY, Li Z. Longitudinal Effects of Mediums of Word Explanation on L2 Vocabulary Learning Strategies Among Chinese Grade-7 Students. Front Psychol 2020; 11:702. [PMID: 32390910 PMCID: PMC7193325 DOI: 10.3389/fpsyg.2020.00702] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/31/2020] [Accepted: 03/23/2020] [Indexed: 11/17/2022] Open
Abstract
This longitudinal study investigated how different mediums of word explanation affected the use of English vocabulary strategies among Chinese Grade-7 students. 170 students were tested on their English receptive vocabulary size and vocabulary strategy application before and after an 8.33-month intervention. Students were divided into three experimental groups and one control group. The three experimental groups were provided with learning materials that explained the target vocabulary in three mediums, respectively: English-only, English-and-Chinese, and Chinese-only. Results showed that, after the intervention, receptive vocabulary size did not have any direct significant impact on vocabulary strategy development, whereas mediums of word explanation materials impacted students' application of vocabulary learning strategies (VLS) in different ways. Our findings showed that the English-only mediums significantly enhanced students' use of metacognition, cognition, and memorization strategies, but decreased social strategy development. Chinese-only mediums significantly facilitated cognition and memorization strategy development. Implications for L2 vocabulary education are discussed.
Collapse
Affiliation(s)
- Yang Dong
- Department of Social and Behavioural Sciences, City University of Hong Kong, Kowloon, Hong Kong
| | - Yi Tang
- School of Economics and Management, China University of Petroleum, Qingdao, China
| | - Sammy Xiao-Ying Wu
- Department of Special Education and Counselling, The Education University of Hong Kong, Tai Po, Hong Kong
| | - Wei-Yang Dong
- Department of Asian Policy Studies, The Education University of Hong Kong, Tai Po, Hong Kong
| | - Zhen Li
- Department of Chinese Language Studies, The Education University of Hong Kong, Tai Po, Hong Kong
| |
Collapse
|
15
|
Forsyth L, Anglim J. Using text analysis software to detect deception in written short‐answer questions in employee selection. INTERNATIONAL JOURNAL OF SELECTION AND ASSESSMENT 2020. [DOI: 10.1111/ijsa.12284] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Affiliation(s)
- Loch Forsyth
- School of Psychology Deakin University Geelong Australia
| | - Jeromy Anglim
- School of Psychology Deakin University Geelong Australia
| |
Collapse
|
16
|
Kumar N, Venugopal D, Qiu L, Kumar S. Detecting Anomalous Online Reviewers: An Unsupervised Approach Using Mixture Models. J MANAGE INFORM SYST 2019. [DOI: 10.1080/07421222.2019.1661089] [Citation(s) in RCA: 25] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
17
|
Schuetzler RM, Grimes GM, Giboney JS. The effect of conversational agent skill on user behavior during deception. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.03.033] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
18
|
Ho SM, Hancock JT. Context in a bottle: Language-action cues in spontaneous computer-mediated deception. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2018.09.008] [Citation(s) in RCA: 17] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
19
|
Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation. INFORMATION SYSTEMS JOURNAL 2018. [DOI: 10.1111/isj.12231] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
20
|
Kumar N, Venugopal D, Qiu L, Kumar S. Detecting Review Manipulation on Online Platforms with Hierarchical Supervised Learning. J MANAGE INFORM SYST 2018. [DOI: 10.1080/07421222.2018.1440758] [Citation(s) in RCA: 50] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
|
21
|
The role of online product recommendations on customer decision making and loyalty in social shopping communities. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2018. [DOI: 10.1016/j.ijinfomgt.2017.07.006] [Citation(s) in RCA: 72] [Impact Index Per Article: 12.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
|
22
|
Ho SM, Kaarst-Brown M, Benbasat I. Trustworthiness attribution: Inquiry into insider threat detection. J Assoc Inf Sci Technol 2017. [DOI: 10.1002/asi.23938] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]
Affiliation(s)
- Shuyuan Mary Ho
- School of Information; Florida State University; 142 Collegiate Loop, Tallahassee FL 32306-2100 USA
| | - Michelle Kaarst-Brown
- School of Information Studies; Syracuse University; 218 Hinds Hall, Syracuse NY 13244-1190 USA
| | - Izak Benbasat
- Management Information Systems, Sauder School of Business; University of British Colombia; Vancouver BC V6T 1Z2 Canada
| |
Collapse
|
23
|
Ho SM, Hancock JT, Booth C. Ethical dilemma: Deception dynamics in computer‐mediated group communication. J Assoc Inf Sci Technol 2017. [DOI: 10.1002/asi.23849] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Affiliation(s)
- Shuyuan Mary Ho
- School of InformationFlorida State University, 142 Collegiate LoopTallahassee FL32306‐2100
| | - Jeffrey T. Hancock
- Department of CommunicationStanford University, Building 120, 450 Serra MallStanford CA94305‐2050
| | - Cheryl Booth
- Department of CommunicationStanford University, Building 120, 450 Serra MallStanford CA94305‐2050
| |
Collapse
|