• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4612468)   Today's Articles (1610)   Subscriber (49386)
For: Ho SM, Hancock JT, Booth C, Liu X. Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2016.1205924] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
Number Cited by Other Article(s)
1
Jabutay F, Novio EB, Verbal XF. Strategic deception in call centers: impacts on well-being, cognition, and work motivation. THE JOURNAL OF GENERAL PSYCHOLOGY 2024:1-27. [PMID: 38459854 DOI: 10.1080/00221309.2024.2327323] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/17/2023] [Accepted: 02/27/2024] [Indexed: 03/11/2024]
2
Dando CJ. Sorting Insiders From Co-Workers: Remote Synchronous Computer-Mediated Triage for Investigating Insider Attacks. HUMAN FACTORS 2024;66:145-157. [PMID: 35249401 PMCID: PMC10756022 DOI: 10.1177/00187208211068292] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/25/2021] [Accepted: 11/27/2021] [Indexed: 06/14/2023]
3
Ayaburi EW, Andoh-Baidoo FK. How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control. EUR J INFORM SYST 2023. [DOI: 10.1080/0960085x.2023.2186275] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/08/2023]
4
Expressing uncertainty in information systems analytics research: A demonstration of Bayesian analysis applied to binary classification problems. Inf Process Manag 2023. [DOI: 10.1016/j.ipm.2022.103132] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
5
Li L, Xu L, He W. The effects of antecedents and mediating factors on cybersecurity protection behavior. COMPUTERS IN HUMAN BEHAVIOR REPORTS 2022. [DOI: 10.1016/j.chbr.2021.100165] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]  Open
6
Kumar N, Qiu L, Kumar S. A Hashtag Is Worth a Thousand Words: An Empirical Investigation of Social Media Strategies in Trademarking Hashtags. INFORMATION SYSTEMS RESEARCH 2022. [DOI: 10.1287/isre.2022.1107] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
7
Ng KC, Tang J, Lee D. The Effect of Platform Intervention Policies on Fake News Dissemination and Survival: An Empirical Examination. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2021.1990612] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
8
Zhang W, Xu Y, Zheng H, Li L. Verbal vs. Nonverbal Cues in Static and Dynamic Contexts of Fraud Detection in Crowdsourcing. JOURNAL OF GLOBAL INFORMATION MANAGEMENT 2022. [DOI: 10.4018/jgim.310928] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
9
Van Der Zee S, Poppe R, Havrileck A, Baillon A. A Personal Model of Trumpery: Linguistic Deception Detection in a Real-World High-Stakes Setting. Psychol Sci 2021;33:3-17. [PMID: 34932410 DOI: 10.1177/09567976211015941] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
10
Khan A, Brohman K, Addas S. The anatomy of ‘fake news’: Studying false messages as digital objects. JOURNAL OF INFORMATION TECHNOLOGY 2021. [DOI: 10.1177/02683962211037693] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
Liu R, Mai F, Shan Z, Wu Y. Predicting shareholder litigation on insider trading from financial text: An interpretable deep learning approach. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2020.103387] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
12
Markowitz DM. The deception faucet: A metaphor to conceptualize deception and its detection. NEW IDEAS IN PSYCHOLOGY 2020. [DOI: 10.1016/j.newideapsych.2020.100816] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
13
Twyman NW, Proudfoot JG, Cameron AF, Case E, Burgoon JK, Twitchell DP. Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1759938] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
14
Dong Y, Tang Y, Wu SXY, Dong WY, Li Z. Longitudinal Effects of Mediums of Word Explanation on L2 Vocabulary Learning Strategies Among Chinese Grade-7 Students. Front Psychol 2020;11:702. [PMID: 32390910 PMCID: PMC7193325 DOI: 10.3389/fpsyg.2020.00702] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/31/2020] [Accepted: 03/23/2020] [Indexed: 11/17/2022]  Open
15
Forsyth L, Anglim J. Using text analysis software to detect deception in written short‐answer questions in employee selection. INTERNATIONAL JOURNAL OF SELECTION AND ASSESSMENT 2020. [DOI: 10.1111/ijsa.12284] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
16
Kumar N, Venugopal D, Qiu L, Kumar S. Detecting Anomalous Online Reviewers: An Unsupervised Approach Using Mixture Models. J MANAGE INFORM SYST 2019. [DOI: 10.1080/07421222.2019.1661089] [Citation(s) in RCA: 25] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
17
Schuetzler RM, Grimes GM, Giboney JS. The effect of conversational agent skill on user behavior during deception. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.03.033] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
18
Ho SM, Hancock JT. Context in a bottle: Language-action cues in spontaneous computer-mediated deception. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2018.09.008] [Citation(s) in RCA: 17] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
19
Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation. INFORMATION SYSTEMS JOURNAL 2018. [DOI: 10.1111/isj.12231] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
20
Kumar N, Venugopal D, Qiu L, Kumar S. Detecting Review Manipulation on Online Platforms with Hierarchical Supervised Learning. J MANAGE INFORM SYST 2018. [DOI: 10.1080/07421222.2018.1440758] [Citation(s) in RCA: 50] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
21
The role of online product recommendations on customer decision making and loyalty in social shopping communities. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2018. [DOI: 10.1016/j.ijinfomgt.2017.07.006] [Citation(s) in RCA: 72] [Impact Index Per Article: 12.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
22
Ho SM, Kaarst-Brown M, Benbasat I. Trustworthiness attribution: Inquiry into insider threat detection. J Assoc Inf Sci Technol 2017. [DOI: 10.1002/asi.23938] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]
23
Ho SM, Hancock JT, Booth C. Ethical dilemma: Deception dynamics in computer‐mediated group communication. J Assoc Inf Sci Technol 2017. [DOI: 10.1002/asi.23849] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA