Why and how to deceive: game results with sociological evidence
暂无分享,去创建一个
[1] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[2] Cindy K. Chung,et al. Revealing Dimensions of Thinking in Open-Ended Self-Descriptions: An Automated Meaning Extraction Method for Natural Language. , 2008, Journal of research in personality.
[3] Cliff Lampe,et al. A familiar face(book): profile elements as signals in an online social network , 2007, CHI.
[4] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[5] E. Goffman. Presentation of Self , 2006 .
[6] S. Racunas,et al. An Algorithm for Searching An Alternative Hypothesis Space , 2009 .
[7] Joseph Bonneau,et al. The Privacy Jungle: On the Market for Data Protection in Social Networks , 2009, WEIS.
[8] J. Pennebaker,et al. Psychological aspects of natural language. use: our words, our selves. , 2003, Annual review of psychology.
[9] Sun-Ki Chai,et al. Social Computing, Behavioral-Cultural Modeling and Prediction , 2014, Lecture Notes in Computer Science.
[10] George Kesidis,et al. A sybil-proof referral system based on multiplicative reputation chains , 2009, IEEE Communications Letters.
[11] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[12] George Kesidis,et al. Sybil Detection via Distributed Sparse Cut Monitoring , 2011, 2011 IEEE International Conference on Communications (ICC).
[13] Shay David,et al. Six degrees of reputation: The use and abuse of online review and recommendation systems , 2006, First Monday.
[14] Guoqiang Tian,et al. Characterizations of the Existence of Equilibria in Games with Discontinuous and Non-quasiconcave Payoffs , 1993 .
[15] Adam L. Berger,et al. A Maximum Entropy Approach to Natural Language Processing , 1996, CL.
[16] Christopher Griffin,et al. An Algorithm for Constructing and Searching Spaces of Alternative Hypotheses , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[17] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[18] John Suler,et al. The Bad Boys of Cyberspace: Deviant Behavior in a Multimedia Chat Community , 1998, Cyberpsychology Behav. Soc. Netw..
[19] Gilad Mishne,et al. Finding high-quality content in social media , 2008, WSDM '08.
[20] L. Gillam,et al. “I Don’t Know Where He is Not”: Does Deception Research yet Offer a Basis for Deception Detectives? , 2012 .
[21] Anna Cinzia Squicciarini,et al. Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[22] Alex Hai Wang,et al. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.
[23] Huan Liu,et al. Information Provenance in Social Media , 2011, SBP.
[24] George Kesidis,et al. Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players , 2013, ArXiv.
[25] J. Giles. Internet encyclopaedias go head to head , 2005, Nature.
[26] Bernie Mulgrew,et al. Proceedings IEEE International Conference on Communications , 1989 .
[27] Teng-Sheng Moh,et al. Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers , 2010, ICISTM.
[28] K. Strater,et al. Strategies and struggles with privacy in an online social networking community , 2008 .
[29] Barbara Poblete,et al. Information credibility on twitter , 2011, WWW.
[30] Paul E. Johnson,et al. Detecting deception: adversarial problem solving in a low base-rate world , 2001, Cogn. Sci..
[31] John L. Bell,et al. A course in mathematical logic , 1977 .
[32] Ashish Sureka. Mining User Comment Activity for Detecting Forum Spammers in YouTube , 2011, ArXiv.
[33] Eugene Santos,et al. Toward detecting deception in intelligent systems , 2004, SPIE Defense + Commercial Sensing.
[34] Michael D. Intriligator,et al. Mathematical optimization and economic theory , 1971 .
[35] P. Reny. On the Existence of Pure and Mixed Strategy Nash Equilibria in Discontinuous Games , 1999 .
[36] Anna Cinzia Squicciarini,et al. An Informed Model of Personal Information Release in Social Networking Sites , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[37] Anna Cinzia Squicciarini,et al. Two Species Evolutionary Game Model of User and Moderator Dynamics , 2012, 2012 International Conference on Social Informatics.
[38] Avner Caspi,et al. Online Deception: Prevalence, Motivation, and Emotion , 2006, Cyberpsychology Behav. Soc. Netw..