287
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Impact of Information Seeking and Warning Frames on Online Deception:A Quasi-Experiment

, &

References

  • Ajzen I. 1991. The theory of planned behavior. Organizational Behav Hum Decis Processes 50(2):179–211.
  • Ajzen I, Fishbein M. 1977. Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological Bull Psychological Bull 84(5):888.
  • Angst CM, Agarwal R. 2009. Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Q 33(2):339–370.
  • Bates M. 2003. Toward An Integrated Model of Information Seeking and Searching. Los Angeles: Graduate School of Education and Information Studies, University of California, Los Angeles.
  • Bhattacherjee A, Sanford C. 2006. Influence processes for information technology acceptance: An elaboration likelihood model. MIS Q 30(4):805–825.
  • Biros DP, George JF, Zmud RW. 2002. Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Q 26:119–144.
  • Bose I, Leung ACM. 2008. Assessing anti-phishing preparedness: A study of online banks in Hong Kong. Decis Support Syst. 45(4):897–912.
  • Brunswik E. 1956. Perception and the representative design of psychological experiments. Berkeley: Univ of California Press.
  • Burgoon JK, Buller DB. 1996. Interpersonal deception theory. Commun Theory 6(3):311–328.
  • Byström K, Järvelin K. 1995. Task complexity affects information seeking and use. Inf Process Manage 31(2):191–213.
  • Case DO. 2012. Looking for information: A survey of research on information seeking, needs, and behavior. Bingley, UK: Emerald Group Publishing.
  • Chaiken S. 1980. Heuristic versus systematic information processing and the use of source versus message cues in persuasion. J Personality Social Psychol. 39(5):752.
  • Choo CW, Detlor B, Turnbull D. 1988. A Behavioral Model of Information Seeking on the Web - Preliminary Results of a Study of How Managers and IT Specialists Use the Web. In Proceedings of the 61st Annual Meeting of the American Society of Information Science, Pittsburgh, PA.
  • Cook TD, Campbell DT, Day A. 1979. Quasi-experimentation: Design & analysis issues for field settings. Boston, MA: Houghton Mifflin.
  • Davis FD. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319–340.
  • Dickson GW, Senn JA, Chervany NL. 1977. Research in management information systems: The Minnesota experiments. Manage Sci 23(9):913–934.
  • Eagly AH, Chaiken S. 1993. The psychology of attitudes. Orlando, FL: Harcourt Brace Jovanovich College Publishers.
  • Ekman P. 2009. Telling lies: Clues to deceit in the marketplace, politics, and marriage. New York: WW Norton & Company.
  • Ellis D. 1989. A behavioural model for information retrieval system design. J Inf Sci 15(4–5):237–248.
  • Fishbein M, Raven BH. 1962. The AB scales: An operational definition of belief and attitude. Hum Relations 15(1):35–44.
  • Gefen D, Karahanna E, Straub DW. 2003. Trust and TAM in online shopping: An integrated model. MIS Q, 27(1):51–90.
  • George JF, Marett K, Tilley P. 2004. Deception Detection under Varying Electronic Media and Warning Conditions, presented at the Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS’04) – Track 1 – Volume 1.
  • George JF, Marett K, Tilley P. 2004. Deception detection under varying electronic media and warning conditions. In System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on, 2004, p. 9 pp.
  • Grazioli S. 2004. Where did they go wrong? an analysis of the failure of knowledgeable internet consumers to detect deception over the internet. Group Decis Negotiation 13(2):149–172.
  • Grazioli S, Wang A. 2001. Looking Without Seeing: Understanding Unsophisticated Consumers’ Success and Failure to Detect Internet Deception, in ICIS 2001. http://aisel.aisnet.org/icis2001/23
  • Howard F, Komili O. 2010. Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware. Sophos Technical Papers. https://www.sophos.com/medialibrary/PDFs/technical%20papers/sophosseoinsights.pdf
  • Ivaturi K, Janczewski L. 2013. Social engineering preparedness of online banks: An Asia-Pacific perspective. J Global Inf Technol Manage 16(4):21–46.
  • Ivaturi K, Janczewski L. 2012. A typology of social engineering attacks – an information science perspective. In PACIS 2012 Proceedings. Paper 219, Ho Chi Minh city, Vietnam.
  • Jakobsson M, Tsow A, Shah A, Blevis E, Lim Y-K. 2007. What instills trust? a qualitative study of phishing. presented at the Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, Scarborough, Trinidad and Tobago.
  • John JP, Yu F, Xie Y, Krishnamurthy A, Abadi M. 2011. deSEO: Combating search-result poisoning. In Proceedings of the 20th USENIX conference on Security, 2011, pp. 20–20.
  • Johnson PE, Grazioli S, Jamal K, Zualkernan IA. 1992. Success and failure in expert reasoning. Organizational Behav Hum Decis Processes 53(2):173–203.
  • Kelley CA, Gaidis WC, Reingen PH. 1989. The use of vivid stimuli to enhance comprehension of the content of product warning messages. J Consum Affairs 23(2):243–266.
  • Kshetri N. 2010. The global cybercrime industry: economic, institutional and strategic perspectives. New York: Springer.
  • Kwasnik BH. 1992. A Descriptive Study of the Functional Components of Browsing. presented at the Proceedings of the IFIP TC2/WG2.7 Working Conference on Engineering for Human-Computer Interaction.
  • Marett K, George JF. 2005. Group Deception in Computer-Supported Environments. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS), 2005., Hawaii, p. 19b.
  • McKenzie P. 2003. A model of information practices in accounts of everyday-life information seeking. J Doc 59(1) : 19–40.
  • Menn J. 2010. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. New York: PublicAffairs.
  • Mitnick KD, Simon WL. 2003. The Art of Deception: Controlling the Human Element of Security. Hoboken, NJ: John Wiley & Sons.
  • Norton. 2010. Norton’s Cybercrime Report: The Human Impact. Available from: http://community.norton.com/t5/Ask-Marian/Norton-s-Cybercrime-Report-The-Human-Impact-Reveals-Global/ba-p/282432, [24/3/2015].
  • Pew. 2012. Demographics of Internet Users. Available from: http://pewinternet.org/Trend-Data-(Adults)/Whos-Online.aspx, [1/04/2013].
  • Provos N, McNamee D, Mavrommatis P, Wang K, and Modadugu N. 2007. The ghost in the browser analysis of web-based malware. In Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp. 4–4.
  • Ross SC. 1999. Finding without seeking: the information encounter in the context of reading for pleasure. Inf Process Manage 35(6):783–799.
  • Rothman AJ, Bartels RD, Wlaschin J, Salovey P. 2006. The strategic use of gain‐and loss‐framed messages to promote healthy behavior: How theory can inform practice. J Commun 56(s1):S202–S220.
  • Rothman AJ, Salovey P. 1997. Shaping perceptions to motivate healthy behavior: The role of message framing. Psychological Bull 121(1):3.
  • Rubin AM. 1994. Media uses and effects: A uses-and-gratifications perspective. In Media effects: Advances in theory and research, Eds: Zillmann, J. B. D., Hillsdale, NJ, England Lawrence Erlbaum Associates, Inc, 417–436.
  • Schneier B. 2008. The psychology of security, presented at the Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology, Casablanca, Morocco.
  • Stiff JB, Kim HJ, Ramesh CN. 1992. Truth biases and aroused suspicion in relational deception. Commun Res 19(3):326–345.
  • Strahan EJ, White K, Fong GT, Fabrigar LR, Zanna MP, Cameron R. 2002. Enhancing the effectiveness of tobacco package warning labels: A social psychological perspective. Tobacco control 11(3):183–190.
  • Toms EG. 2000. Serendipitous Information Retrieval. In: Proceedings of DELOS Workshop: Information Seeking, Searching and Querying in Digital Libraries, Zurich, Switzerland, December, 11–12, 2000.
  • Townsend K. 2010. The art of social engineering. Infosecurity 7(4):32–35.
  • Tversky A, Kahneman D. 1974. Judgment under uncertainty: Heuristics and biases. Science 185(4157):1124–1131.
  • Venkatesh V, Morris MG, Davis GB, Davis FD. 2003. User acceptance of information technology: Toward a unified view. MIS Q 27(3):425–478.
  • Vishwanath A, Herath T, Chen R, Wang J, Rao HR. 2011. “Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis Support Syst 51(3): 576–586.
  • Wilson M, Stine K, Bowen P. 2009. Information Security Training Requirements: A Role- and Performance-Based Model. https://www2.nist.gov/node/585036
  • Wilson TD. 2000. Human information behavior. Informing Sci 3(2):49–56.
  • Wilson TD. 1999. Models in information behaviour research. J Doc 55(3):249–270.
  • Xu H, Teo H-H, Tan BCY, Agarwal R. 2009. The role of push-pull technology in privacy calculus: the case of location-based services. J Manage Inf Syst 26(3):135–174.
  • Zipf GK. 1949. Human behavior and the principle of least effort. Addison-Wesley Press, Oxford, England.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.