References
Alrubaian, M., Al-Qurishi, M., Alamri, A., Al-Rakhami, M., Hassan, M. M., & Fortino, G. (2019). Credibility in online social networks: A survey. IEEE Access, 7. doi: 10.1109/ACCESS.2018.2886314
Arciuli, J., Mallard, D., & Villar, G. (2010). “Um, I can tell you’re lying”: Linguistic markers of deception \ versus truth-telling in speech. Applied Psycholinguistics, 31, 397–411. doi: 10.1017/S0142716410000044
Australian Cyber Security Centre. (2020). ACSC Annual Cyber Threat Report July 2019 to June 2020. Retrieved July 7, 2020, from https://www.cyber.gov.au/sites/default/files/2020-09/ACSC-Annual-Cyber-Threat-Report-2019-20.pdf
Awad, A. (2017). Collective framework for fraud detection using behavioral biometrics. In I. Traore, A. Awad, & I. Woungang (Eds.),* Information Security Practices: Emerging Threats and Perspectives* (pp. 29–37). Springer. doi: 10.1007/978-3-319-48947-6_3
Begg, I. M., Anas, A., & Farinacci, S. (1992). Dissociation of processes in belief: Source recollection, statement familiarity, and the illusion of truth. Journal of Experimental Psychology: General, 121(4), 446–458. doi: 10.1037/0096-3445.121.4.446
Bo, C., Zhang, L., Li, X. Y., Huang, Q., & Wang, Y. (2013). SilentSense: Silent user identification via touch and movement behavioral biometrics. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, 187–190. doi: 10.1145/2500423.2504572
Bond, C. F., & DePaulo, B. M. (2006). Accuracy of deception judgments. Personality and Social Psychology Review, 10, 214–234. doi: 10.1207/s15327957pspr1003_2
Brand-Gruwel, S., Wopereis, I., & Vermetten, Y. (2005). Information problem solving by experts and novices: Analysis of a complex cognitive skill. Computers in Human Behavior, 21(3), 487–508. doi: 10.1016/j.chb.2004.10.005
Cao, Q., Yang, X., Yu, J., & Palow, C. (2014). Uncovering large groups of active malicious accounts in online social networks. Proceedings of the ACM Conference on Computer and Communications Security, 477– 488. doi: 10.1145/2660267.2660269
Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on Twitter. Proceedings of the 20th International Conference Companion on World Wide Web, WWW 2011. doi: 10.1145/1963405.1963500
Chi, M. T. H., Feltovich, P. J., & Glaser, R. (1981). Categorization and representation of physics problems by experts and novices. Cognitive Science, 5(2), 121–152. doi: 10.1207/s15516709cog0502_2
Cialdini, R. (2009). Influence: The Psychology of Persuasion. New York, NY: Harper Collins.
Clement, J. (2020). *Internet usage worldwide – statistics and facts. *Retrieved from https://www.statista.com/topics/1145/internet-usage-worldwide/
Cugelman, B., Thelwall, M., & Dawes, P. (2008). Website credibility, active trust and behavioural intent. Proceedings of 3rd International Confererence Persuasive Technology, 47–57. doi: 10.1007/978-3-540- 68504-3-5
Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology, 51, 629–636. doi: 10.1037/h0046408
Donath, J. (1999). Identity and deception in the virtual community. In M. A. Smith & P. Kollock (Eds.), Communities in Cyberspace (pp. 29–59). Abingdon, UK: Routledge/Taylor & Francis Group. doi: 10.1519/JSC.0b013e3181e4f7a9
du Plessis, C., Angelopulo, G., & du Plessis, D. (2006). A conceptual framework of corporate online communication: A marketing public relations (mpr) perspective. Communicatio, 32(2), 241–263. doi: 10.1080/02500160608537972
Egelhofer, J. L., & Lecheler, S. (2019). Fake news as a two-dimensional phenomenon: A framework and research agenda. Annals of the International Communication Association, 43(2), 97–116. doi: 10.1080/23808985.2019.1602782
Flanagin, A. J., & Metzger, M. J. (2000). Perceptions of internet information credibility. Journalism and Mass Communication Quaterly, 77(3), 515–540. doi: 10.1177/107769900007700304
Fogg, B. J. (2003). Prominence-interpretation theory: Explaining how people assess credibility online. Conference on Human Factors in Computing Systems - Proceedings, 722–723. doi: 10.1145/765891.765951
Fogg, B. J., & Tseng, H. (1999). The elements of computer credibility. Conference on Human Factors in Computing Systems - Proceedings, 80–87. doi: 10.1145/302979.303001
Fukushima, Y., Hori, Y., & Sakurai, K. (2011). Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration. Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011. doi: 10.1109/TrustCom.2011.46
Gupta, A., & Kumaraguru, P. (2012). Credibility ranking of tweets during high impact events. ACM International Conference Proceeding Series. doi: 10.1145/2185354.2185356
Hancock, J. T. (2012). Digital deception: Why, when and how people lie online. In A. N. Joinson, T. McKenna, T. Postmes, & U.-D. Reips (Eds.), Oxford Handbook of Internet Psychology (pp. 287–301). Oxford, UK: Oxford University Press. doi: 10.1093/oxfordhb/9780199561803.013.0019
Hargittai, E., Fullerton, L., Menchen–Trevino, E., & Thomas, K. Y. (2010). Trust Online: Young adults’ evaluation of web content. International Journal of Communication, 4, 468–494. Retrieved July 7, 2020, from http://ijoc.org.
Hauch, V., Blandón-Gitlin, I., Masip, J., & Sporer, S. L. (2015). Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Personality and Social Psychology Review, 19(4), 307– 342. doi: 10.1177/1088868314556539
Hilligoss, B., & Rieh, S. Y. (2008). Developing a unifying framework of credibility assessment: Construct, heuristics, and interaction in context. Information Processing and Management, 44, 1467–1484. doi: 10.1016/j.ipm.2007.10.001
Hovland, C. I., Janis, I. L., & Kelley, H. H. (1953). Communication and Persuasion: Psychological Studies of Opinion Change. Yale, CT: Yale University Press. doi: 10.2307/2087772
Igartua, J. J., & Cheng, L. (2009). Moderating effect of group cue while processing news on immigration: Is the framing effect a heuristic process? Journal of Communication, 59(4), 726–749. doi: 10.1111/ j.1460-2466.2009.01454.x
Isbister, K., & Nass, C. (2000). Consistency of personality in interactive characters: Verbal cues, non-verbal cues, and user characteristics. International Journal of Human-Computer Studies, 53(2), 251–267. doi: 10.1006/ijhc.2000.0368
Jamieson, K. H. (2018). Cyber-War. Oxford, UK: Oxford University Press. Jessen, J., & Jørgensen, A. H. (2012). Aggregated trustworthiness: Redefining online credibility through social validation. First Monday, 17(1). doi: 10.5210/fm.v17i1.3731
Jones, H. S., & Moncur, W. (2018). The role of psychology in understanding online trust. In Psychological and Behavioral Examinations in Cyber Security (pp. 109–132). Hershey, PA: IGI Global.
Jupe, L. M., Leal, S., Vrij, A., & Nahari, G. (2017). Applying the verifiability approach in an international airport setting. Psychology, Crime and Law, 23(8), 812–825. doi: 10.1080/1068316X.2017.1327584
Karvonen, K. (2000). The beauty of simplicity. Proceedings of the Conference on Universal Usability, 85–90. doi: 10.1145/2133806.2133808
Kelton, K., Fleischmann, K. R., & Wallace, W. A. (2008). Trust in digital information. Journal of the American Society for Information Science and Technology, 59(3), 363–374. doi: 10.1002/asi.20722
Kleinberg, B., van der Toolen, Y., Vrij, A., Arntz, A., & Verschuere, B. (2018). Automated verbal credibility assessment of intentions: The model statement technique and predictive modeling. Applied Cognitive Psychology, 32(3), 354–366. doi: 10.1002/acp.3407
Lang, A. (2000). The limited capacity model of mediated message processing. Journal of Communication, 50, 46–70. doi: 10.1111/j.1460-2466.2000.tb02833.x
Langenderfer, J., & Shimp, T. A. (2001). Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion. Psychology and Marketing, 18(7), 763–783. doi: 10.1002/ mar.1029
Lucassen, T., & Schraagen, J. M. (2011). Factual accuracy and trust in information: The role of expertise. Journal of the American Society for Information Science and Technology, 62(7), 1232–1242. doi: 10.1002/asi.21545
Masip, J., Sporer, S. L., Garrido, E., & Herrero, C. (2005). The detection of deception with the reality monitoring approach: A review of the empirical evidence. Psychology, Crime and Law, 11(1), 99–112. doi: 10.1080/10683160410001726356
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734. doi: 10.5465/amr.1995.9508080335
McKnight, D. H., & Chervany, N. L. (2000). What is trust ? A conceptual analysis and an interdisciplinary model. Proceedings of the 2000 Americas Conference on Information Systems AMCI2000 AIS, 382. Retrieved July 7, 2020, from https://aisel.aisnet.org/amcis2000/382/
Menotti, D., Chiachia, G., Pinto, A., Schwartz, W. R., Pedrini, H., Falcão, A. X… & Rocha, A. (2015). Deep representations for iris, face, and fingerprint spoofing detection. IEEE Transactions on Information Forensics and Security, 10(4), 864–879. doi: 10.1109/TIFS.2015.2398817
Metzger, M. J. (2007). Making sense of credibility on the web: Models for evaluating online information and recommendations for future research. Journal of the American Society for Information Science and Technology, 58(13), 2078–2091. doi: 10.1002/asi.20672
Metzger, M. J., & Flanagin, A. J. (2015). Psychological approaches to credibility assessment online. In S. Sundar (Ed.), The Handbook of the Psychology of Communication Technology (pp. 445–466). Hoboken, NJ: John Wiley & Sons. doi: 10.1002/9781118426456.ch20
Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: Inferring user profiles in online social networks. WSDM 2010 - Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. doi: 10.1145/1718487.1718519
Morris, M. R., Counts, S., Roseway, A., Hoff, A., & Schwarz, J. (2012). Tweeting is believing? Understanding microblog credibility perceptions. Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, 441–450. doi: 10.1145/2145204.2145274
Moura, G. C. M., Sadre, R., & Pras, A. (2014). Bad neighborhoods on the internet. IEEE Communications Magazine, 52(7), 132–139. doi: 10.1109/MCOM.2014.6852094
Mueller, R., Helderman, R. S., & Zapotosky, M. (2019). Report on the Investigation into Russian Interference in the 2016 Presidential Election. Retrieved from https://www.justice.gov/storage/report.pdf
Nahari, G., Vrij, A., & Fisher, R. P. (2012). Does the truth come out in the writing? Scan as a lie detection tool. Law and Human Behavior, 36(1), 68–76. doi: 10.1037/h0093965
Newman, M. L., Pennebaker, J. W., Berry, D. S., & Richards, J. M. (2003). Lying words: Predicting deception from linguistic styles. Personality and Social Psychology Bulletin, 29, 665–675. doi: 10.1177/0146167203029005010
Pettingill, L. (2006). Trust without knowledge: How young person’s carry out research on the Internet. In GoodWork Project Report Series. Retrieved July 7, 2020, from http://pzweb.harvard.edu/ebookstore/pdfs/goodwork48.pdf
Pornpitakpan, C. (2004). The persuasiveness of source credibility: A critical review of five decades’ evidence. Journal of Applied Social Psychology, 34(2), 243–281. doi: 10.1111/j.1559-1816.2004.tb02547.x
Pure, R. A., Markov, A. R., Mangus, J. M., Metzger, M. J., Flanagin, A. J., & Hartsell, E. H. (2012). Understanding and evaluating source expertise in an evolving media environment. In T. Takseva (Ed.), Social Software and the Evolution of User Expertise: Future Trends in Knowledge Creation and Dissemination (pp. 37–51). Hershey, PA: IGI Global. doi: 10.4018/978-1-4666-2178-7.ch003
Purplesec. (2020). 2020 Cyber Security Statistics. The Ultimate List Of Stats, Data & Trends. Retrieved June 20, 2020, from https://purplesec.us/resources/cyber-security-statistics
Rieh, S. Y., & Danielson, D. R. (2007). Credibility: A multidisciplinary framework. Annual Review of Information Science and Technology, 41(1), 307–364. doi: 10.1002/aris.2007.1440410114
Robert, H. (2016). Spam Fighting @ Scale 2016. Retrieved from https://code.fb.com/security/spam-fighting-scale-2016/
Sillence, E., Briggs, P., Harris, P. R., & Fishwick, L. (2007). How do patients evaluate and make use of online health information? Social Science and Medicine, 644, 1853–1862. doi: 10.1016/ j.socscimed.2007.01.012
Stech, F., Heckman, K. E., Hilliard, P., & Ballo, J. R. (2011). Scientometrics of deception, counter-deception, and deception detection in cyber-space. PsychNology Journal, 9(2), 79–122.
Sundar, S. S. (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In M. J. Metzger & A. J. Flanagin (Eds.), Digital Media, Youth, and Credibility (pp. 73– 100). The MIT Press. doi: 10.1162/dmal.9780262562324.073
Sundar, S. S., Knobloch-Westerwick, S., & Hastall, M. R. (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58, 366– 378. doi: 10.1002/asi.20511
Talboom, S., & Pierson, J. (2013). Understanding trust within online discussion boards: Trust formation in the absence of reputation systems. In IFIP Advances in Information and Communication Technology (pp. 83–99). doi: 10.1007/978-3-642-38323-6_6
Taylor, R. S. (1986). Value-added processes in the information life cycle. In Journal of the American Society for Information Science. Ablex. doi: 10.1002/asi.4630330517
Toma, C. L., & Hancock, J. T. (2010). Reading between the lines: Linguistic cues to deception in online dating profiles.* Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW.* doi: 10.1145/1718918.1718921
Tsikerdekis, M., & Zeadally, S. (2014). Multiple account identity deception detection in social media using nonverbal behavior. IEEE Transactions on Information Forensics and Security, 9(8), 1311–1321. doi: 10.1109/TIFS.2014.2332820
Turner, J. C., Wetherell, M. S., & Hogg, M. A. (1989). Referent informational influence and group polarization. British Journal of Social Psychology, 28(2), 135–147. doi: 10.1111/j.2044-8309.1989. tb00855.x
Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185, 1124–1131. doi: 10.1126/science.185.4157.1124
Twitter Public Policy. (2018). Update on Twitter’s review of the 2016 US election. Retrieved June 20, 2020, from https://blog.twitter.com/official/en_us/topics/company/2018/2016-election-update.html
Utz, S., Kerkhof, P., & Van Den Bos, J. (2012). Consumers rule: How consumer reviews influence perceived trustworthiness of online stores. Electronic Commerce Research and Applications, 11(1), 49–58. doi: 10.1016/j.elerap.2011.07.010
Vishwanath, A. (2015). Diffusion of deception in social media: Social contagion effects and its antecedents. Information Systems Frontiers, 17, 1353–1367. doi: 10.1007/s10796-014-9509-2
Vishwanath, A., Harrison, B., & Ng, Y. J. (2018). Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research, 45(8), 1146–1166. doi: 10.1177/0093650215627483
Vrij, A. (2000). Detecting Lies and Deceit: The psychology of lying and its implications for professional practice. Hoboken, NJ: John Wiley and Sons. Vishwanath, A., Harrison, B., & Ng, H. (2017). A cognitive approach to lie detection: A meta-analysis. Legal and Criminological Psychology, 22(1), 1–21. doi: 10.1111/lcrp.12088
Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H., & Zhao, B. Y. (2013). You are how you click: Clickstream analysis for sybil detection. Proceedings of the 22nd USENIX Security Symposium, 241– 256. Retrieved June 20, 2020, from https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_wang_0.pdf
Wathen, C. N., & Burkell, J. (2002). Believe it or not: Factors influencing credibility on the Web. Journal of the American Society for Information Science and Technology, 53(2), 134–144. doi: 10.1002/asi.10016
Westbrook, R. A. (1987). Product/consumption-based affective responses and post-purchase process. Journal of Marketing Research, 24, 258–270. doi: 10.2307/3151636
Wierzbicki, A. (2018). Web Content Credibility. Springer International Publishing. doi: 10.1007/978-3-319- 77794-8_1
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. Y., & Dai, Y. (2011). Uncovering social network sybils in the wild. Proceedings of the ACM SIGCOMM Internet Measurement Conference, 2. doi: 10.1145/2068816.2068841
Zhou, L., & Zhang, D. (2008). Following linguistic footprints: Automatic deception detection in online communication. Communications of the ACM, 51(9), 119–122. doi: 10.1145/1378727.1389972
Table of Contents
- Introduction
- Literature Review and Methodology
- Proposed Model for Online Adversary Credibility Assessment
- Discussion
- Limitations and Future Directions
- Summary
- Declaration of Interest Statement
- References