The Role of Social Influence in Security Feature Adoption
暂无分享,去创建一个
[1] Eric Sun,et al. Gesundheit! Modeling Contagion through Facebook News Feed , 2009, ICWSM.
[2] Damon Centola,et al. The Spread of Behavior in an Online Social Network Experiment , 2010, Science.
[3] D. Rubin,et al. The central role of the propensity score in observational studies for causal effects , 1983 .
[4] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[5] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[6] Cosma Rohilla Shalizi,et al. Homophily and Contagion Are Generically Confounded in Observational Social Network Studies , 2010, Sociological methods & research.
[7] Rick Wash,et al. Stories as informal lessons about security , 2012, SOUPS.
[8] Arun Sundararajan,et al. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks , 2009, Proceedings of the National Academy of Sciences.
[9] Damon Centola. Damon Centola Behavior An Experimental Study of Homophily in the Adoption of Health , 2011 .
[10] Martina Angela Sasse,et al. Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery , 2003 .
[11] Damon Centola. An Experimental Study of Homophily in the Adoption of Health Behavior , 2011, Science.
[12] Lada A. Adamic,et al. The role of social networks in information diffusion , 2012, WWW.
[13] Noah J. Goldstein,et al. The Constructive, Destructive, and Reconstructive Power of Social Norms , 2007, Psychological science.
[14] A Bandura,et al. Vicarious extinction of avoidance behavior. , 1967, Journal of personality and social psychology.
[15] Jon Kleinberg,et al. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter , 2011, WWW.
[16] Adam D. I. Kramer. The spread of emotion via facebook , 2012, CHI.
[17] M. Macy,et al. Complex Contagions and the Weakness of Long Ties1 , 2007, American Journal of Sociology.
[18] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.
[19] Cameron Marlow,et al. A 61-million-person experiment in social influence and political mobilization , 2012, Nature.
[20] S. Milgram,et al. Note on the drawing power of crowds of different size. , 1969 .
[21] Noah J. Goldstein,et al. A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels , 2008 .
[22] L. J. Chapman. Illusory correlation in observational report. , 1967 .
[23] Jie Gao,et al. Complex contagion and the weakness of long ties in social networks: revisited , 2013, EC '13.
[24] Laura A. Dabbish,et al. The Effect of Social Influence on Security Sensitivity , 2014, SOUPS.
[25] Edward W. Felten,et al. Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.
[26] Lars Backstrom,et al. Structural diversity in social contagion , 2012, Proceedings of the National Academy of Sciences.
[27] Nicholas A. Christakis,et al. Cooperative behavior cascades in human social networks , 2009, Proceedings of the National Academy of Sciences.
[28] Daniel Kahneman,et al. Availability: A heuristic for judging frequency and probability , 1973 .