Reading this may harm your computer: The psychology of malware warnings
Tài liệu tham khảo
Akhawe, 2013, Alice in Warningland: A large-scale field study of browser security warning effectiveness
Anderson, 2003, The psychology of doing nothing: Forms of decision avoidance result from reason and emotion, Psychological Bulletin, 129, 139, 10.1037/0033-2909.129.1.139
Asch, 1956, Studies of independence and conformity: I. A minority of one against a unanimous majority, Psychological Monographs: General and Applied, 70, 1, 10.1037/h0093718
Bauer, 2013
Bearden, 1989, Measurement of consumer susceptibility to interpersonal influence, Journal of Consumer Research, 15, 473, 10.1086/209186
Beautement, 2008, The compliance budget: Managing security behaviour in organisations
Bhatnagar, 2000, On risk, convenience, and Internet shopping behavior – Why some consumers are online shoppers while others are not, Communications of the Acm, 43, 98, 10.1145/353360.353371
Box, 1964, An analysis of transformations, Journal of the Royal Statistical Society. Series B (Methodological), 26, 211, 10.1111/j.2517-6161.1964.tb00553.x
Bravo-Lillo, 2013, Your attention please: Designing security-decision UIs to make genuine risks harder to ignore, 18
Camerer, 1999, Overconfidence and excess entry: An experimental approach, The American Economic Review, 89, 306, 10.1257/aer.89.1.306
Cialdini, 2001
Cohen, 1979, Social change and crime rate trends: A routine activity approach, American Sociological Review, 44, 588, 10.2307/2094589
Egelman, 2008
Egelman, 2010, Please continue to hold: An empirical study on user tolerance of security delays
Egelman, 2013, The importance of being earnest [in security warnings]
Ert, 2008, The rejection of attractive gambles, loss aversion, and the lemon avoidance heuristic, Journal of Economic Psychology, 29, 715, 10.1016/j.joep.2007.06.003
Felson, 1998, Opportunity makes the thief: Practical theory for crime prevention, 44
Fischer, 2013, Why do individuals respond to fraudulent scam communication and lose money? The psychological determinants of scam compliance, Journal of Applied Social Psychology, 43, 2060, 10.1111/jasp.12158
Fischer, 2009, The psychology of scams: Provoking and committing errors of judgement, 260
Garbarino, 2004, Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation, Journal of Business Research, 57, 768, 10.1016/S0148-2963(02)00363-6
Gustafson, 1998, Gender differences in risk perception: Theoretical and methodological perspectives, Risk Analysis, 18, 805, 10.1023/B:RIAN.0000005926.03250.c0
Halpern, 2007, Harnessing the power of default options to improve health care, New England Journal of Medicine, 357, 1340, 10.1056/NEJMsb071595
Harwell, 2003, Summarizing monte carlo results in methodological research: The single-factor, fixed-effects ANCOVA case, Journal of Educational and Behavioral Statistics, 28, 45, 10.3102/10769986028001045
Herley, 2010, The plight of the targeted attacker in a world of scale
Herley, 2009, So long, and no thanks for the externalities: The rational rejection of security advice by users
Jagatic, 2007, Social phishing, Communications of the Acm, 50, 94, 10.1145/1290958.1290968
Johnson, 2002, Defaults, framing and privacy: Why opting in-opting out, Marketing Letters, 13, 5, 10.1023/A:1015044207315
Jost, 2004, A decade of system justification theory: Accumulated evidence of conscious and unconscious bolstering of the status quo, Political Psychology, 25, 881, 10.1111/j.1467-9221.2004.00402.x
Kahan, 1997, Social influence, social meaning, and deterrence, Virginia Law Review, 83, 349, 10.2307/1073780
Kahneman, 1991, Anomalies: The endowment effect, loss aversion, and status quo bias, Journal of Economic Perspectives, 5, 193, 10.1257/jep.5.1.193
Kahneman, 1979, Prospect theory: An analysis of decision under risk, Econometrica, 47, 263, 10.2307/1914185
Kim, 2008, Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study, Journal of Management Information Systems, 24, 13, 10.2753/MIS0742-1222240401
Kirk, 2013
Koslowsky, 2001, On the relationship between subordinates’ compliance to power sources and organisational attitudes, Applied Psychology: An International Review, 50, 455, 10.1111/1464-0597.00067
Krol, K., Moroz, M., & Sasse, M. A. (2012). Don’t work. Can’t work? Why it’s time to rethink security warnings. In: risk and security of internet and systems (CRiSIS), 2012 7th International conference on (pp. 1–8).
Lee, 2004, Trust in automation: Designing for appropriate reliance, Human Factors, 46, 50, 10.1518/hfes.46.1.50.30392
Lix, 1996, Consequences of assumption violations revisited: A quantitative review of alternatives to the one-way analysis of variance F test, Review of Educational Research, 66, 579
Mariani, 2006, Risk perception in online shopping, 207
Markus, 1991, Culture and the self: Implications for cognition, emotion, and motivation, Psychological Review, 98, 224, 10.1037/0033-295X.98.2.224
Modic, 2013
Modic, D., & Lea, S. E. G. (2013). Scam Compliance and the Psychology of Persuasion [pre-print]. Social Sciences Research Network, Available at SSRN: <http://ssrn.com/abstract=2364464>.
Munro, 2009, Hardcover ed., Vol. 12
Murphy, 2004, The role of trust in nurturing compliance: A study of accused tax avoiders, Law and Human Behavior, 28, 187, 10.1023/B:LAHU.0000022322.94776.ca
Osborne, 2010, Improving your data transformations: Applying the box-cox transformation, Practical Assessment Research and Evaluation, 15, 9
Raven, 1998, Conceptualizing and measuring a power/interaction model of interpersonal influence 1, Journal of Applied Social Psychology, 28, 307, 10.1111/j.1559-1816.1998.tb01708.x
Rubinstein, 1997
Samuelson, 1988, Status quo bias in decision making, Journal of Risk and Uncertainty, 1, 7, 10.1007/BF00055564
Schmider, 2010, Is it really robust?, Methodology: European Journal of Research Methods for the Behavioral and Social Sciences, 6, 147, 10.1027/1614-2241/a000016
Simon, 1956, Rational choice and the structure of the environment, Psychological Review, 63, 129, 10.1037/h0042769
Spool, J. (2011). Do users change their settings?. In: J. M. Spool (Ed.), User Interface Engineering (Vol. 2013). User Interface Engineering. <www.uie.com>.
Stevenson, 2000
Sunshine, 2009, Crying wolf: An empirical study of SSL warning effectiveness
Tabachnick, 2005
Thaler, 2008
Titus, 2001, Personal fraud: The victims and the scams, Crime Prevention Studies, 12, 133
Triandis, 1986, The measurement of the etic aspects of individualism and collectivism across cultures, Australian Journal of Psychology, 38, 257, 10.1080/00049538608259013
Tyler, 1995, Collective restraint in social dilemmas: Procedural justice and social identification effects on support for authorities, Journal of Personality and Social Psychology, 69, 482, 10.1037/0022-3514.69.3.482
Wu, 2008, Factors affecting members’ trust belief and behaviour intention in virtual communities, Behaviour and Information Technology, 27, 115, 10.1080/01449290600961910
Zuckoff, 2005, Annals of crime: The perfect mark, Vol. 82, 36