Insider Threat: Language-action Cues in Group Dynamics
暂无分享,去创建一个
Jung Hoon Baeg | Hengyi Fu | Cheryl Booth | Shashanka Surya Timmarajus | Muye Liu | Shuyuan Mary Ho | Shashanka S. Timmarajus | Jung Hoon Baeg | M. Burmester | Xiuwen Liu | J. Hancock | C. Booth | S. Ho | Muye Liu | Cheryl Booth | Hengyi Fu
[1] Niki Panteli,et al. Trust and conflict within virtual inter-organizational alliances: a framework for facilitating knowledge sharing , 2005, Decis. Support Syst..
[2] Frank L. Greitzer,et al. Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats , 2012, 2012 45th Hawaii International Conference on System Sciences.
[3] Gurpreet Dhillon,et al. Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..
[4] Jeremy P. Birnholtz,et al. Butler lies: awareness, deception and design , 2009, CHI.
[5] P. Ekman. Telling lies: clues to deceit in the marketplace , 1985 .
[6] Dale E. Zand. Trust and Managerial Problem Solving , 1972 .
[7] Chun-Ming Chang,et al. Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..
[8] Tammy L. Rapp,et al. Team Effectiveness 1997-2007: A Review of Recent Advancements and a Glimpse Into the Future , 2008 .
[9] Dongsong Zhang,et al. Can online behavior unveil deceivers? - an exploratory investigation of deception in instant messaging , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[10] J. Burgoon,et al. Interpersonal Deception Theory , 2015 .
[11] Shuyuan Mary Ho. Behavioral anomaly detection: A socio-technical study of trustworthiness in virtual organizations , 2009 .
[12] Jeffrey T. Hancock,et al. What Lies Beneath: The Linguistic Traces of Deception in Online Dating Profiles , 2012 .
[13] F. C. P. Motta. The theory of communicative action , 1991 .
[14] Tarek Menacere,et al. Detecting insider threats through language change. , 2013, Law and human behavior.
[15] J. Pennebaker,et al. Linguistic styles: language use as an individual difference. , 1999, Journal of personality and social psychology.
[16] Jay F. Nunamaker,et al. An exploratory study into deception detection in text-based computer-mediated communication , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[17] Richard J. Klimoski,et al. The impact of trust on creative problem solving groups. , 1976 .
[18] P. Ekman,et al. Nonverbal leakage and clues to deception. , 1969, Psychiatry.
[19] Peter Groenewegen,et al. MANAGEMENT of the LEARNING , 2003 .
[20] J. Pennebaker,et al. Psychological aspects of natural language. use: our words, our selves. , 2003, Annual review of psychology.
[21] Jeffrey T. Hancock,et al. Reading between the lines: linguistic cues to deception in online dating profiles , 2010, CSCW '10.
[22] Sirkka L. Jarvenpaa,et al. Communication and Trust in Global Virtual Teams , 1999, J. Comput. Mediat. Commun..
[23] K BurgoonJudee,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004 .
[24] Roderick M. Kramer,et al. Collective trust and collective action: The decision to trust as a social decision. , 1996 .
[25] Cindy K. Chung,et al. The development and psychometric properties of LIWC2007 , 2007 .
[26] Steve Marsh,et al. Human-computer-human interaction: trust in CSCW , 1997, SGCH.
[27] J. Habermas. The Theory of Communicative Action: Reason and the Rationalization of Society , 1986 .
[28] Youngjin Yoo,et al. Dynamic nature of trust in virtual teams , 2002, J. Strateg. Inf. Syst..
[29] Shuyuan Mary Ho. Cyber Insider Threat: Trustworthiness in Virtual Organizations , 2014 .
[30] Todd A. Mooradian,et al. Who Trusts? Personality, Trust and Knowledge Sharing , 2006 .
[31] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[32] J. Rotter. A new scale for the measurement of interpersonal trust. , 1967, Journal of personality.
[33] Mike Burmester,et al. Demystifying Insider Threat: Language-Action Cues in Group Dynamics , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[34] Mike Burmester,et al. Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).
[35] R. Lewicki,et al. Developing and Maintaining Trust in Work Relationships , 1996 .
[36] Frank L. Greitzer,et al. Toward the Development of a Psycholinguistic-based Measure of Insider Threat Risk Focusing on Core Word Categories Used in Social Media , 2013, AMCIS.
[37] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[38] Csr Young,et al. How to Do Things With Words , 2009 .
[39] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[40] L. Hosmer. TRUST: THE CONNECTING LINK BETWEEN ORGANIZATIONAL THEORY AND PHILOSOPHICAL ETHICS , 1995 .
[41] Jonathan M. Hollister,et al. Cyber Insider Threat in Virtual Organizations , 2014 .
[42] Frank L. Lars J. Christine F. Christopher R. Thomas Greitzer,et al. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis , 2013 .
[43] Jeffrey T. Hancock,et al. The truth about lying in online dating profiles , 2007, CHI.
[44] Shuyuan Mary Ho. A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations , 2009 .
[45] HsuMeng-Hsiang,et al. Knowledge sharing behavior in virtual communities , 2007 .
[46] Jeffrey T. Hancock,et al. On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication , 2007 .
[47] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[48] Steven Furnell,et al. A preliminary model of end user sophistication for insider threat prediction in IT systems , 2005, Comput. Secur..
[49] Ryan T. Wright,et al. The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived , 2010, J. Manag. Inf. Syst..
[50] P. Ekman,et al. Who can catch a liar? , 1991, The American psychologist.
[51] Frank L. Greitzer,et al. Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication , 2013, 2013 46th Hawaii International Conference on System Sciences.