Link Search Menu Expand Document
  1. References

References

Alrubaian, M., Al-Qurishi, M., Alamri, A., Al-Rakhami, M., Hassan, M. M., & Fortino, G. (2019). Credibility in online social networks: A survey. IEEE Access, 7. doi: 10.1109/ACCESS.2018.2886314

Arciuli, J., Mallard, D., & Villar, G. (2010). “Um, I can tell you’re lying”: Linguistic markers of deception \ versus truth-telling in speech. Applied Psycholinguistics, 31, 397–411. doi: 10.1017/S0142716410000044

Australian Cyber Security Centre. (2020). ACSC Annual Cyber Threat Report July 2019 to June 2020. Retrieved July 7, 2020, from https://www.cyber.gov.au/sites/default/files/2020-09/ACSC-Annual-Cyber-Threat-Report-2019-20.pdf

Awad, A. (2017). Collective framework for fraud detection using behavioral biometrics. In I. Traore, A. Awad, & I. Woungang (Eds.),* Information Security Practices: Emerging Threats and Perspectives* (pp. 29–37). Springer. doi: 10.1007/978-3-319-48947-6_3

Begg, I. M., Anas, A., & Farinacci, S. (1992). Dissociation of processes in belief: Source recollection, statement familiarity, and the illusion of truth. Journal of Experimental Psychology: General, 121(4), 446–458. doi: 10.1037/0096-3445.121.4.446

Bo, C., Zhang, L., Li, X. Y., Huang, Q., & Wang, Y. (2013). SilentSense: Silent user identification via touch and movement behavioral biometrics. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, 187–190. doi: 10.1145/2500423.2504572

Bond, C. F., & DePaulo, B. M. (2006). Accuracy of deception judgments. Personality and Social Psychology Review, 10, 214–234. doi: 10.1207/s15327957pspr1003_2

Brand-Gruwel, S., Wopereis, I., & Vermetten, Y. (2005). Information problem solving by experts and novices: Analysis of a complex cognitive skill. Computers in Human Behavior, 21(3), 487–508. doi: 10.1016/j.chb.2004.10.005

Cao, Q., Yang, X., Yu, J., & Palow, C. (2014). Uncovering large groups of active malicious accounts in online social networks. Proceedings of the ACM Conference on Computer and Communications Security, 477– 488. doi: 10.1145/2660267.2660269

Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on Twitter. Proceedings of the 20th International Conference Companion on World Wide Web, WWW 2011. doi: 10.1145/1963405.1963500

Chi, M. T. H., Feltovich, P. J., & Glaser, R. (1981). Categorization and representation of physics problems by experts and novices. Cognitive Science, 5(2), 121–152. doi: 10.1207/s15516709cog0502_2

Cialdini, R. (2009). Influence: The Psychology of Persuasion. New York, NY: Harper Collins.

Clement, J. (2020). *Internet usage worldwide – statistics and facts. *Retrieved from https://www.statista.com/topics/1145/internet-usage-worldwide/

Cugelman, B., Thelwall, M., & Dawes, P. (2008). Website credibility, active trust and behavioural intent. Proceedings of 3rd International Confererence Persuasive Technology, 47–57. doi: 10.1007/978-3-540- 68504-3-5

Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology, 51, 629–636. doi: 10.1037/h0046408

Donath, J. (1999). Identity and deception in the virtual community. In M. A. Smith & P. Kollock (Eds.), Communities in Cyberspace (pp. 29–59). Abingdon, UK: Routledge/Taylor & Francis Group. doi: 10.1519/JSC.0b013e3181e4f7a9

du Plessis, C., Angelopulo, G., & du Plessis, D. (2006). A conceptual framework of corporate online communication: A marketing public relations (mpr) perspective. Communicatio, 32(2), 241–263. doi: 10.1080/02500160608537972

Egelhofer, J. L., & Lecheler, S. (2019). Fake news as a two-dimensional phenomenon: A framework and research agenda. Annals of the International Communication Association, 43(2), 97–116. doi: 10.1080/23808985.2019.1602782

Flanagin, A. J., & Metzger, M. J. (2000). Perceptions of internet information credibility. Journalism and Mass Communication Quaterly, 77(3), 515–540. doi: 10.1177/107769900007700304

Fogg, B. J. (2003). Prominence-interpretation theory: Explaining how people assess credibility online. Conference on Human Factors in Computing Systems - Proceedings, 722–723. doi: 10.1145/765891.765951

Fogg, B. J., & Tseng, H. (1999). The elements of computer credibility. Conference on Human Factors in Computing Systems - Proceedings, 80–87. doi: 10.1145/302979.303001

Fukushima, Y., Hori, Y., & Sakurai, K. (2011). Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration. Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011. doi: 10.1109/TrustCom.2011.46

Gupta, A., & Kumaraguru, P. (2012). Credibility ranking of tweets during high impact events. ACM International Conference Proceeding Series. doi: 10.1145/2185354.2185356

Hancock, J. T. (2012). Digital deception: Why, when and how people lie online. In A. N. Joinson, T. McKenna, T. Postmes, & U.-D. Reips (Eds.), Oxford Handbook of Internet Psychology (pp. 287–301). Oxford, UK: Oxford University Press. doi: 10.1093/oxfordhb/9780199561803.013.0019

Hargittai, E., Fullerton, L., Menchen–Trevino, E., & Thomas, K. Y. (2010). Trust Online: Young adults’ evaluation of web content. International Journal of Communication, 4, 468–494. Retrieved July 7, 2020, from http://ijoc.org.

Hauch, V., Blandón-Gitlin, I., Masip, J., & Sporer, S. L. (2015). Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Personality and Social Psychology Review, 19(4), 307– 342. doi: 10.1177/1088868314556539

Hilligoss, B., & Rieh, S. Y. (2008). Developing a unifying framework of credibility assessment: Construct, heuristics, and interaction in context. Information Processing and Management, 44, 1467–1484. doi: 10.1016/j.ipm.2007.10.001

Hovland, C. I., Janis, I. L., & Kelley, H. H. (1953). Communication and Persuasion: Psychological Studies of Opinion Change. Yale, CT: Yale University Press. doi: 10.2307/2087772

Igartua, J. J., & Cheng, L. (2009). Moderating effect of group cue while processing news on immigration: Is the framing effect a heuristic process? Journal of Communication, 59(4), 726–749. doi: 10.1111/ j.1460-2466.2009.01454.x

Isbister, K., & Nass, C. (2000). Consistency of personality in interactive characters: Verbal cues, non-verbal cues, and user characteristics. International Journal of Human-Computer Studies, 53(2), 251–267. doi: 10.1006/ijhc.2000.0368

Jamieson, K. H. (2018). Cyber-War. Oxford, UK: Oxford University Press. Jessen, J., & Jørgensen, A. H. (2012). Aggregated trustworthiness: Redefining online credibility through social validation. First Monday, 17(1). doi: 10.5210/fm.v17i1.3731

Jones, H. S., & Moncur, W. (2018). The role of psychology in understanding online trust. In Psychological and Behavioral Examinations in Cyber Security (pp. 109–132). Hershey, PA: IGI Global.

Jupe, L. M., Leal, S., Vrij, A., & Nahari, G. (2017). Applying the verifiability approach in an international airport setting. Psychology, Crime and Law, 23(8), 812–825. doi: 10.1080/1068316X.2017.1327584

Karvonen, K. (2000). The beauty of simplicity. Proceedings of the Conference on Universal Usability, 85–90. doi: 10.1145/2133806.2133808

Kelton, K., Fleischmann, K. R., & Wallace, W. A. (2008). Trust in digital information. Journal of the American Society for Information Science and Technology, 59(3), 363–374. doi: 10.1002/asi.20722

Kleinberg, B., van der Toolen, Y., Vrij, A., Arntz, A., & Verschuere, B. (2018). Automated verbal credibility assessment of intentions: The model statement technique and predictive modeling. Applied Cognitive Psychology, 32(3), 354–366. doi: 10.1002/acp.3407

Lang, A. (2000). The limited capacity model of mediated message processing. Journal of Communication, 50, 46–70. doi: 10.1111/j.1460-2466.2000.tb02833.x

Langenderfer, J., & Shimp, T. A. (2001). Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion. Psychology and Marketing, 18(7), 763–783. doi: 10.1002/ mar.1029

Lucassen, T., & Schraagen, J. M. (2011). Factual accuracy and trust in information: The role of expertise. Journal of the American Society for Information Science and Technology, 62(7), 1232–1242. doi: 10.1002/asi.21545

Masip, J., Sporer, S. L., Garrido, E., & Herrero, C. (2005). The detection of deception with the reality monitoring approach: A review of the empirical evidence. Psychology, Crime and Law, 11(1), 99–112. doi: 10.1080/10683160410001726356

Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734. doi: 10.5465/amr.1995.9508080335

McKnight, D. H., & Chervany, N. L. (2000). What is trust ? A conceptual analysis and an interdisciplinary model. Proceedings of the 2000 Americas Conference on Information Systems AMCI2000 AIS, 382. Retrieved July 7, 2020, from https://aisel.aisnet.org/amcis2000/382/

Menotti, D., Chiachia, G., Pinto, A., Schwartz, W. R., Pedrini, H., Falcão, A. X… & Rocha, A. (2015). Deep representations for iris, face, and fingerprint spoofing detection. IEEE Transactions on Information Forensics and Security, 10(4), 864–879. doi: 10.1109/TIFS.2015.2398817

Metzger, M. J. (2007). Making sense of credibility on the web: Models for evaluating online information and recommendations for future research. Journal of the American Society for Information Science and Technology, 58(13), 2078–2091. doi: 10.1002/asi.20672

Metzger, M. J., & Flanagin, A. J. (2015). Psychological approaches to credibility assessment online. In S. Sundar (Ed.), The Handbook of the Psychology of Communication Technology (pp. 445–466). Hoboken, NJ: John Wiley & Sons. doi: 10.1002/9781118426456.ch20

Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: Inferring user profiles in online social networks. WSDM 2010 - Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. doi: 10.1145/1718487.1718519

Morris, M. R., Counts, S., Roseway, A., Hoff, A., & Schwarz, J. (2012). Tweeting is believing? Understanding microblog credibility perceptions. Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, 441–450. doi: 10.1145/2145204.2145274

Moura, G. C. M., Sadre, R., & Pras, A. (2014). Bad neighborhoods on the internet. IEEE Communications Magazine, 52(7), 132–139. doi: 10.1109/MCOM.2014.6852094

Mueller, R., Helderman, R. S., & Zapotosky, M. (2019). Report on the Investigation into Russian Interference in the 2016 Presidential Election. Retrieved from https://www.justice.gov/storage/report.pdf

Nahari, G., Vrij, A., & Fisher, R. P. (2012). Does the truth come out in the writing? Scan as a lie detection tool. Law and Human Behavior, 36(1), 68–76. doi: 10.1037/h0093965

Newman, M. L., Pennebaker, J. W., Berry, D. S., & Richards, J. M. (2003). Lying words: Predicting deception from linguistic styles. Personality and Social Psychology Bulletin, 29, 665–675. doi: 10.1177/0146167203029005010

Pettingill, L. (2006). Trust without knowledge: How young person’s carry out research on the Internet. In GoodWork Project Report Series. Retrieved July 7, 2020, from http://pzweb.harvard.edu/ebookstore/pdfs/goodwork48.pdf

Pornpitakpan, C. (2004). The persuasiveness of source credibility: A critical review of five decades’ evidence. Journal of Applied Social Psychology, 34(2), 243–281. doi: 10.1111/j.1559-1816.2004.tb02547.x

Pure, R. A., Markov, A. R., Mangus, J. M., Metzger, M. J., Flanagin, A. J., & Hartsell, E. H. (2012). Understanding and evaluating source expertise in an evolving media environment. In T. Takseva (Ed.), Social Software and the Evolution of User Expertise: Future Trends in Knowledge Creation and Dissemination (pp. 37–51). Hershey, PA: IGI Global. doi: 10.4018/978-1-4666-2178-7.ch003

Purplesec. (2020). 2020 Cyber Security Statistics. The Ultimate List Of Stats, Data & Trends. Retrieved June 20, 2020, from https://purplesec.us/resources/cyber-security-statistics

Rieh, S. Y., & Danielson, D. R. (2007). Credibility: A multidisciplinary framework. Annual Review of Information Science and Technology, 41(1), 307–364. doi: 10.1002/aris.2007.1440410114

Robert, H. (2016). Spam Fighting @ Scale 2016. Retrieved from https://code.fb.com/security/spam-fighting-scale-2016/

Sillence, E., Briggs, P., Harris, P. R., & Fishwick, L. (2007). How do patients evaluate and make use of online health information? Social Science and Medicine, 644, 1853–1862. doi: 10.1016/ j.socscimed.2007.01.012

Stech, F., Heckman, K. E., Hilliard, P., & Ballo, J. R. (2011). Scientometrics of deception, counter-deception, and deception detection in cyber-space. PsychNology Journal, 9(2), 79–122.

Sundar, S. S. (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In M. J. Metzger & A. J. Flanagin (Eds.), Digital Media, Youth, and Credibility (pp. 73– 100). The MIT Press. doi: 10.1162/dmal.9780262562324.073

Sundar, S. S., Knobloch-Westerwick, S., & Hastall, M. R. (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58, 366– 378. doi: 10.1002/asi.20511

Talboom, S., & Pierson, J. (2013). Understanding trust within online discussion boards: Trust formation in the absence of reputation systems. In IFIP Advances in Information and Communication Technology (pp. 83–99). doi: 10.1007/978-3-642-38323-6_6

Taylor, R. S. (1986). Value-added processes in the information life cycle. In Journal of the American Society for Information Science. Ablex. doi: 10.1002/asi.4630330517

Toma, C. L., & Hancock, J. T. (2010). Reading between the lines: Linguistic cues to deception in online dating profiles.* Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW.* doi: 10.1145/1718918.1718921

Tsikerdekis, M., & Zeadally, S. (2014). Multiple account identity deception detection in social media using nonverbal behavior. IEEE Transactions on Information Forensics and Security, 9(8), 1311–1321. doi: 10.1109/TIFS.2014.2332820

Turner, J. C., Wetherell, M. S., & Hogg, M. A. (1989). Referent informational influence and group polarization. British Journal of Social Psychology, 28(2), 135–147. doi: 10.1111/j.2044-8309.1989. tb00855.x

Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185, 1124–1131. doi: 10.1126/science.185.4157.1124

Twitter Public Policy. (2018). Update on Twitter’s review of the 2016 US election. Retrieved June 20, 2020, from https://blog.twitter.com/official/en_us/topics/company/2018/2016-election-update.html

Utz, S., Kerkhof, P., & Van Den Bos, J. (2012). Consumers rule: How consumer reviews influence perceived trustworthiness of online stores. Electronic Commerce Research and Applications, 11(1), 49–58. doi: 10.1016/j.elerap.2011.07.010

Vishwanath, A. (2015). Diffusion of deception in social media: Social contagion effects and its antecedents. Information Systems Frontiers, 17, 1353–1367. doi: 10.1007/s10796-014-9509-2

Vishwanath, A., Harrison, B., & Ng, Y. J. (2018). Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research, 45(8), 1146–1166. doi: 10.1177/0093650215627483

Vrij, A. (2000). Detecting Lies and Deceit: The psychology of lying and its implications for professional practice. Hoboken, NJ: John Wiley and Sons. Vishwanath, A., Harrison, B., & Ng, H. (2017). A cognitive approach to lie detection: A meta-analysis. Legal and Criminological Psychology, 22(1), 1–21. doi: 10.1111/lcrp.12088

Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H., & Zhao, B. Y. (2013). You are how you click: Clickstream analysis for sybil detection. Proceedings of the 22nd USENIX Security Symposium, 241– 256. Retrieved June 20, 2020, from https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_wang_0.pdf

Wathen, C. N., & Burkell, J. (2002). Believe it or not: Factors influencing credibility on the Web. Journal of the American Society for Information Science and Technology, 53(2), 134–144. doi: 10.1002/asi.10016

Westbrook, R. A. (1987). Product/consumption-based affective responses and post-purchase process. Journal of Marketing Research, 24, 258–270. doi: 10.2307/3151636

Wierzbicki, A. (2018). Web Content Credibility. Springer International Publishing. doi: 10.1007/978-3-319- 77794-8_1

Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. Y., & Dai, Y. (2011). Uncovering social network sybils in the wild. Proceedings of the ACM SIGCOMM Internet Measurement Conference, 2. doi: 10.1145/2068816.2068841

Zhou, L., & Zhang, D. (2008). Following linguistic footprints: Automatic deception detection in online communication. Communications of the ACM, 51(9), 119–122. doi: 10.1145/1378727.1389972


Table of Contents