References
- Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quartely, 34(3), 613–643. doi:10.2307/25750694
- Baltazar, A., Helm, H. W., Jr, McBride, D., Hopkins, G., & Stevens, J. V., Jr. (2010). Internet pornography use in the context of external and internal religiosity. Journal of Psychology and Theology, 38(1), 32–40. doi:10.1177/009164711003800103
- Bindu, P. V., Santhi Thilagam, P., & Ahuja, D. (2017). Discovering suspicious behavior in multilayer social networks. Computers in Human Behavior, 73, 568–682. doi:10.1016/j.chb.2017.04.001
- Bower, D. E. (1990). Sex espionage. New York, NY: Knightsbridge.
- Chung, F. (2018). ‘It speaks to the climate of women’: Sugar baby website says Andrew Broad was a #MeToo casualty. news.com.au. Retrieved from https://www.news.com.au/finance/work/leaders/it-speaks-to-the-climate-of-women-sugar-baby-website-says-andrew-broad-was-a-metoo-casualty/news-story/7e8236368f8e9deec2aa23e0eec3a72f
- Crosston, M. D. (2018). Fragile friendships: Partnerships between the academy and intelligence. International Journal of Intelligence and CounterIntelligence, 31(1), 139–158. doi:10.1080/08850607.2017.1337448
- Curtis, S. R., Rajivan, P., Jones, D. N., & Cleotilde Gonzalez, C. (2018). Phishing attempts among the dark triad: Patterns of attack and vulnerability. Computers in Human Behavior, 87, 174–182. doi:10.1016/j.chb.2018.05.037
- Fife, R. (2018). Canada arrests Huawei’s global chief financial officer in Vancouver. The Globe and Mail. Retrieved from https://www.theglobeandmail.com/canada/article-canada-has-arrested-huaweis-global-chief-financial-officer-in/
- Furnell, S., Kern-am-nuai, W., Esmael, R., Yang, W., & Li, N. (2018). Enhancing security behaviour by supporting the user. Computers & Security, 75, 1–9. doi:10.1016/j.cose.2018.01.016
- Government of Canada. (2017). Retrieved from https://pm.gc.ca/eng/news/2017/11/06/prime-minister-announces-new-national-security-and-intelligence-committee
- Guitton, M. J. (2011). Immersive role of non-required social actions in virtual settings: The example of trade role-play in the second life Gorean community. Design Principles and Practices: an International Journal, 5(1), 209–220. doi:10.18848/1833-1874/CGP/v05i01/38012
- Guitton, M. J. (2012). Living in the hutt space: Immersive process in the Star Wars role-play community of second life. Computers in Human Behavior, 28(5), 1681–1691. doi:10.1016/j.chb.2012.04.006
- Guitton, M. J. (2015). Ethical challenges in online health games. In D. Novák, B. Tulu, & H. Brendryen (Eds.), Handbook of research on holistic perspectives in gamification for clinical practice (pp. 1–9). Hershey, USA: IGI Global.
- Guitton, M. J. (2019a). Mitigation of health risks in consensual non conventional sexual pratices: Could cyberspace provide new solution? Computers in Human Behavior, 91, 346–347. doi:10.1016/j.chb.2018.04.010
- Guitton, M. J. (2019b). Facing cyberthreats: Answering the new security challenges of the digital age. Computers in Human Behavior, 95, 175–176. doi:10.1016/j.chb.2019.01.017
- Lahneman, W. J. (2016). IC data mining in the post-snowden era. International Journal of Intelligence and CounterIntelligence, 29(4), 700–723. doi:10.1080/08850607.2016.1148488
- Lewis, D. (1976). Sexpionage: The exploitation of sex by soviet intelligence. New York, NY: Harcourt Brace Jovanovich.
- Lomanowska, A. M., & Guitton, M. J. (2016). Online intimacy and well-being in the digital age. Internet Interventions, 4(2), 138–144. doi:10.1016/j.invent.2016.06.005
- Lord, J. (2015). Undercover under threat: Cover identity, clandestine activity, and covert action in the digital age. International Journal of Intelligence and CounterIntelligence, 28(4), 666–691. doi:10.1080/08850607.2015.1022464
- Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32–44. doi:10.1016/j.chb.2018.01.028
- Matz, S. C., Kosinski, M., Nave, G., & Stillwell, D. J. (2017). Psychological targeting as an effective approach to digital mass persuasion. Proceedings of the National Academy of Sciences of the U.S.A., 114(48), 12714–12719. doi:10.1073/pnas.1710966114
- McCole, P., Ramsey, E., & Williams, J. (2010). Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns. Journal of Business Research, 63(9–10), 1018–1024. doi:10.1016/j.jbusres.2009.02.025
- Ness, A. M., Johnson, G., Ault, M. K., Taylor, W. D., Griffith, J. A., Connelly, S., … Jensen, M. L. (2017). Reactions to ideological websites: The impact of emotional appeals, credibility, and pre-existing attitudes. Computers in Human Behavior, 72, 496–511. doi:10.1016/j.chb.2017.02.061
- Park, C. H., & Kim, Y. G. (2003). Identifying key factors affecting consumer purchase behavior in an online shopping context. International Journal of Retail & Distribution Management, 31(1), 16–29. doi:10.1108/09590550310457818
- Press Association. (2018). Parliament reports 24,000 attempts to access pornographic websites since election. The Guardian. Retrieved from https://www.theguardian.com/politics/2018/jan/08/parliament-reports-24000-attempts-to-access-pornographic-websites-since-election
- Price, J., Patterson, R., Regnerus, M., & Walley, J. (2016). How much more xxx is generation x consuming? Evidence of changing attitudes and behaviors related to pornography since 1973. Journal of Sex Research, 53(1), 12–20. doi:10.1080/00224499.2014.1003773
- Ratnasingham, P. (1998). The importance of trust in electronic commerce. Internet Research, 8(4), 313–321. doi:10.1108/10662249810231050
- Saramäki, J., Leicht, E. A., López, E., Roberts, S. G. B., Reed-Tsochas, F., & Dunbar, R. I. M. (2014). Persistence of social signatures in human communication. Proceedings of the National Academy of Sciences of the U.S.A., 111(3), 942–947. doi:10.1073/pnas.1308540110
- Sevastopulo, D., & Mitchell, T. (2018). US considered ban on student visas for Chinese nationals. The Financial Times. Retrieved from https://www.ft.com/content/fc413158-c5f1-11e8-82bf-ab93d0a9b321
- Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behavior. Computers & Security, 24(2), 124–133. doi:10.1016/j.cose.2004.07.001
- Stewart, H. (2017). Damian Green sacked as first secretary of state after porn allegations. The Guardian. Retrieved from https://www.theguardian.com/politics/2017/dec/20/damian-green-resigns-as-first-secretary-of-state-after-porn-allegations
- Tasker, J. P. (2018). Scheer asks Tony Clement to leave conservative caucus over sexting scandal. CBC News. Retrieved from https://www.cbc.ca/news/politics/clement-scheer-explicit-photos-1.4895295
- Tasker, J. P., & Kapelos, V. (2018). Conservative MP Tony Clement resigns commons duties over sexting scandal. CBC News. Retrieved from https://www.cbc.ca/news/politics/tony-clement-sexting-1.4894889
- Taylor, T. L. (2002). Living digitally: Embodiment in virtual worlds. In R. Schroeder (Ed.), The social life of avatars: Presence and interaction in shared virtual environments (pp. 40–62). London, UK: Springer.
- Thompson, N., McGill, T. J., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376–391. doi:10.1016/j.cose.2017.07.003
- Timmermans, E., De Caluwé, E., & Alexopoulos, C. (2018). Why are you cheating on tinder? Exploring users’ motives and (dark) personality traits. Computers in Human Behavior, 89, 129–139. doi:10.1016/j.chb.2018.07.040
- van Schaik, P., Jeske, D., Onibokun, J., Conventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547–559. doi:10.1016/j.chb.2017.05.038