The Construct of State-Level Suspicion
暂无分享,去创建一个
[1] Donald L. Ferrin,et al. Special Issue: Trust in an Organizational Context: The Use of Rewards to Increase and Decrease Trust: Mediating Processes and Differential Effects , 2003, Organ. Sci..
[2] Robert W. Lissitz,et al. A Methodological Study of the Torrance Tests of Creativity: Can Creativity Be Faked? Measurement and Statistics. , 1982 .
[3] R. Petty,et al. Source Attributions and Persuasion: Perceived Honesty as a Determinant of Message Scrutiny , 1995 .
[4] Jessie Y. C. Chen,et al. A Meta-Analysis of Factors Affecting Trust in Human-Robot Interaction , 2011, Hum. Factors.
[5] R. Simons,et al. Error-related psychophysiology and negative affect , 2004, Brain and Cognition.
[6] Christopher A. Miller,et al. Trust and etiquette in high-criticality automated systems , 2004, CACM.
[7] Jessie Y. C. Chen,et al. Supervisory Control of Multiple Robots: Human-Performance Issues and User-Interface Design , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[8] M. Tomasello,et al. Does the chimpanzee have a theory of mind? 30 years later , 2008, Trends in Cognitive Sciences.
[9] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[10] Izak Benbasat,et al. Attributions of Trust in Decision Support Technologies: A Study of Recommendation Agents for E-Commerce , 2008, J. Manag. Inf. Syst..
[11] M. Sinaceur,et al. Suspending judgment to create value: Suspicion and trust in negotiation , 2010 .
[12] R. Schlant. Treating type a behavior and your heart meyer friedman diane ulmeralfred A. Knopf, New York (1984) 285 pages, $15.95 ISBN: 0–394–52286–9 , 1985 .
[13] Xin Li,et al. Why do we trust new technology? A study of initial trust formation with organizational information systems , 2008, J. Strateg. Inf. Syst..
[14] Izak Benbasat,et al. Special Issue: Trust in Online Environments , 2008, J. Manag. Inf. Syst..
[15] Angelika Dimoka,et al. What Does the Brain Tell Us About Trust and Distrust? Evidence from a Functional Neuroimaging Study , 2010, MIS Q..
[16] Aaron M. Hoffman. The Structural Causes of Trusting Relationships: Why Rivals Do Not Overcome Suspicion Step by Step , 2007 .
[17] Joshua L. Ray,et al. Organizational Mindfulness in Business Schools , 2011 .
[18] M. Bond,et al. The Confucius connection: From cultural roots to economic growth , 1988 .
[19] Dale T. Miller,et al. Suspicion and Dispositional Inference , 1993 .
[20] David A. Hofmann,et al. Outsourcing inspiration: The performance effects of ideological messages from leaders and beneficiaries , 2011 .
[21] Dongsong Zhang,et al. Typing or messaging? Modality effect on deception detection in computer-mediated communication , 2007, Decis. Support Syst..
[22] David Goodman,et al. Performance Monitoring in the Anterior Cingulate is Not All Error Related: Expectancy Deviation and the Representation of Action-Outcome Associations , 2007, Journal of Cognitive Neuroscience.
[23] Mark W. Scerbo,et al. Automation-induced complacency for monitoring highly reliable systems: the role of task complexity, system experience, and operator trust , 2007 .
[24] D. Harrison Charles J Vivek McKnight,et al. Dispositional Trust And Distrust Distinctions in Predicting High- and Low-Risk Internet Expert Advice Site Perceptions , 2005 .
[25] N. Kriegeskorte,et al. Neural correlates of trust , 2007, Proceedings of the National Academy of Sciences.
[26] Thomas E. DeCarlo,et al. The Effects of Sales Message and Suspicion of Ulterior Motives on Salesperson Evaluation , 2005 .
[27] Ebenbach,et al. Incomplete Information, Inferences, and Individual Differences: The Case of Environmental Judgments. , 2000, Organizational behavior and human decision processes.
[28] Joseph N. Wilson,et al. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED , 1989 .
[29] Denise Potosky,et al. The Internet knowledge (iKnow) measure , 2007, Comput. Hum. Behav..
[30] Carla H. Lagorio,et al. Psychology , 1929, Nature.
[31] Miriam J. Metzger,et al. Social and Heuristic Approaches to Credibility Evaluation Online , 2010 .
[32] M. Deutsch. Trust and suspicion , 1958 .
[33] Izak Benbasat,et al. A Research Agenda for Trust in Online Environments , 2008, J. Manag. Inf. Syst..
[34] Ingrid Kurz. A look into the “black box” , 1994 .
[35] Ricky W. Griffin,et al. Organizational Behavior: Managing People and Organizations , 1992 .
[36] Daniel J. McAllister. Affect- and Cognition-Based Trust as Foundations for Interpersonal Cooperation in Organizations , 1995 .
[37] Jeffrey W. Sherman,et al. On the Encoding of Stereotype-Relevant Information Under Cognitive Load , 2000 .
[38] Carolyn M. Jagacinski,et al. Personnel decision making : the impact of missing information , 1991 .
[39] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[40] R. Lewicki,et al. Trust And Distrust: New Relationships and Realities , 1998 .
[41] Adrienne Y. Lee,et al. The darkest side of trust: validating the generalized communication suspicion scale with prison inmates , 2005 .
[42] P. Bobko. Correlation and Regression: Applications for Industrial Organizational Psychology and Management , 2001 .
[43] Agustin Echebarria-Echabe. Effects of Suspicion on Willingness to Engage in Systematic Processing of Persuasive Arguments , 2010, The Journal of social psychology.
[44] Ronald F. Piccolo,et al. Explaining the justice-performance relationship: trust as exchange deepener or trust as uncertainty reducer? , 2012, The Journal of applied psychology.
[45] M. Olson,et al. The Development of IT Suspicion as a Construct and Subsequent Measure , 2012 .
[46] David Gefen,et al. Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..
[47] Hiroki Yamamoto,et al. Judgments About Others’ Trustworthiness: An fMRI Study , 2011 .
[48] John D. Lee,et al. Trust in Automation: Designing for Appropriate Reliance , 2004, Hum. Factors.
[49] T. Levine,et al. The dark side of trust: Conceptualizing and measuring types of communicative suspicion , 1991 .
[50] R. Vonk,et al. The slime effect : Suspicion and dislike of likeable behavior toward superiors , 1998 .
[51] S. Feldman,et al. Americans respond politically to 9/11: understanding the impact of the terrorist attacks and their aftermath. , 2011, The American psychologist.
[52] Michael D Matthews,et al. Comprehensive soldier fitness: building resilience in a challenging institutional context. , 2011, The American psychologist.
[53] J. Cacioppo,et al. The need for cognition. , 1982 .
[54] Zhiyong Feng,et al. Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions , 2007, Int. J. Electron. Commer..
[55] K. Fernow. New York , 1896, American Potato Journal.
[56] Stephen B. Manuck,et al. Trait positive affect and antibody response to hepatitis B vaccination , 2006, Brain, Behavior, and Immunity.
[57] Terri D Patterson,et al. The effect of cognitive load on deception , 2009 .
[58] Raja Parasuraman,et al. Humans and Automation: Use, Misuse, Disuse, Abuse , 1997, Hum. Factors.
[59] Charles J. Kacmar,et al. The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..
[60] G. S. Reynolds. A Primer of Operant Conditioning , 1968 .
[61] A. Buss,et al. An inventory for assessing different kinds of hostility. , 1957, Journal of consulting psychology.
[62] C. Frith,et al. Functional imaging of ‘theory of mind’ , 2003, Trends in Cognitive Sciences.
[63] Gary D. Bond. Focus on basic cognitive mechanisms and strategies in deception research (and remand custody of ‘wizards’ to Harry Potter movies) , 2012 .
[64] Steven Fein. Effects of suspicion on attributional thinking and the correspondence bias , 1996 .
[65] Paul Benjamin Lowry,et al. Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites , 2007, J. Manag. Inf. Syst..
[66] M. Born,et al. Intentional response distortion on personality tests: using eye-tracking to understand response processes when faking. , 2012, The Journal of applied psychology.
[67] Paul A. Buhler,et al. Agents on the Web: Trust and Persistence , 2001, IEEE Internet Comput..
[68] Irwin P. Levin,et al. More than Meets the Eye: The Effect of Missing Information on Purchase Evaluations , 1985 .
[69] N. Schwarz,et al. The Effect of Corporate Social Responsibility (CSR) Activities on Companies With Bad Reputations , 2006 .
[70] Joseph B. Lyons,et al. Trustworthiness and IT Suspicion: An Evaluation of the Nomological Network , 2011, Hum. Factors.
[71] Daniel R. Ilgen,et al. Not All Trust Is Created Equal: Dispositional and History-Based Trust in Human-Automation Interactions , 2008, Hum. Factors.
[72] Sirkka L. Jarvenpaa,et al. Communication and Trust in Global Virtual Teams , 1999, J. Comput. Mediat. Commun..
[73] Ann M. Bisantz,et al. Assessment of operator trust in and utilization of automated decision-aids under different framing conditions , 2001 .
[74] Timothy R. Levine,et al. The Effect of Suspicion on Deception Detection Accuracy: Optimal Level or Opposing Effects? , 2011 .
[75] Amna Kirmani,et al. Consumers' Use of Persuasion Knowledge: The Effects of Accessibility and Cognitive Capacity on Perceptions of an Influence Agent , 2000 .
[76] Leonard Mlodinow,et al. Subliminal: How Your Unconscious Mind Rules Your Behavior , 2012 .
[77] Raja Parasuraman,et al. Complacency and Bias in Human Use of Automation: An Attentional Integration , 2010, Hum. Factors.
[78] A. Tversky,et al. The framing of decisions and the psychology of choice. , 1981, Science.
[79] Pierre A. Balthazard,et al. Leadership and Neuroscience: Can We Revolutionize the Way That Inspirational Leaders Are Identified and Developed? , 2011 .
[80] T. Levine,et al. When lovers become leery: The relationship between suspicion and accuracy in detecting deception , 1990 .
[81] Henriette Cramer,et al. Effects of Autonomy, Traffic Conditions and Driver Personality Traits on Attitudes and Trust towards In-Vehicle Agents , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[82] Clifford Nass,et al. Improving automotive safety by pairing driver emotion and car voice emotion , 2005, CHI Extended Abstracts.
[83] C. Neil Macrae,et al. Stereotypes as energy-saving devices: A peek inside the cognitive toolbox. , 1994 .
[84] Philip Bobko,et al. The Computer Understanding and Experience Scale: a self-report measure of computer experience , 1998 .
[85] Walter C. Borman,et al. Models of supervisory job performance ratings , 1991 .
[86] Gregory S. Kolt,et al. Eustress, distress, and interpretation in occupational stress , 2003 .
[87] D. Gilbert,et al. The trouble of thinking: Activation and application of stereotypic beliefs. , 1991 .
[88] Michael N. Huhns,et al. Trusted Autonomy , 2002, IEEE Internet Comput..
[89] A. Buss,et al. The aggression questionnaire. , 1992, Journal of personality and social psychology.
[90] Judee K. Burgoon,et al. Heuristics and Modalities in Determining Truth Versus Deception , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.