2023 | International Conference on Information Systems | Citations: 0
Authors: Bera, Debalina; Kim, Dan
Abstract: This study investigates the effect of individuals' information processing modes ... Expand
Semantic filters: deception detection
Topics: phishing mindfulness electronic mail email phishing data security
Methods: experiment survey partial least squares regression machine learning laboratory experiment
Theories: protection motivation theory
2023 | International Conference on Business Informatics | Citations: 0
Authors: Walter, Marie Christine; Broder, Hanna Rebecca; Förster, Maximilian
Abstract: Artificial Intelligence (AI) bears the potential to inform human decision-makin ... Expand
Semantic filters: deception detection
Topics: artificial intelligence task productivity decision support explainable artificial intelligence decision support system
Methods: experimental group experiment Mann Whitney U test nonparametric test statistical hypothesis test
2023 | International Conference on Information Systems | Citations: 0
Authors: Wilson, David; Burnett, Parker; Valacich, Joseph; Jenkins, Jeff
Abstract: ... Expand
Semantic filters: deception detection
Topics: systems design artificial intelligence JavaScript systems evaluation deception detection
Methods: design artifact chatGPT design science experiment design requirement
2023 | Decision Support Systems | Citations: 0
Authors: Zhang, Dong; Li, Wenwen; Niu, Baozhuang; Wu, Chong
Abstract: Ensuring the credibility of online consumer reviews (OCRs) is a growing societal ... Expand
Semantic filters: deception detection
Topics: fake review online review electronic commerce deception detection shapley additive explanation
Methods: machine learning digital trace data experiment parametric test deep learning
2022 | Americas Conference on Information Systems | Citations: 0
Authors: Ge, Saiying
Abstract: To investigate group deception and demote insider threats, this study leverages ... Expand
Semantic filters: deception detection
Topics: social network deception detection insider threat data encryption
Methods: computational algorithm network analysis experiment survey linear regression analysis
2022 | Journal of Management Information Systems | Citations: 2
Authors: Jensen, Matthew L.; Wright, Ryan T.; Durcikova, Alexandra; Karumbaiah, Shamya
Abstract: Phishing is an increasing threat that causes billions in losses and damage to pr ... Expand
Semantic filters: deception detection
Topics: phishing gamification productivity self efficacy electronic mail
Methods: experiment factorial experiment multivariate analysis of covariance survey design artifact
Theories: cognitive evaluation theory
2022 | Electronic Markets | Citations: 4
Authors: Kollmer, Tim; Eckhardt, Andreas; Reibenspiess, Victoria
Abstract: As part of the online product and service selection and purchase process, many c ... Expand
Semantic filters: deception detection
Topics: online review electronic market deception detection electronic commerce data accuracy
Methods: product review experiment survey regression analysis method descriptive statistic
Theories: interpersonal deception theory
2022 | International Conference on Information Systems | Citations: 0
Authors: Weingart, Pablo; Wambsganss, Thiemo; Söllner, Matthias
Abstract: Argument mining (AM) represents the unique use of natural language processing ( ... Expand
Semantic filters: deception detection
Topics: information system use database system data security IT security electronic commerce
Methods: natural language processing structured literature research literature sample literature study sentiment analysis
2021 | International Journal of Information Management | Citations: 6
Authors: Ansari, Sana; Gupta, Sumeet
Abstract: With the presence of fake reviews on e-commerce platforms, the reliability of re ... Expand
Semantic filters: deception detection
Topics: online review mobile phone electronic commerce user-generated content electronic mail
Methods: survey survey design computational algorithm descriptive statistic parametric test
Theories: speech act theory
2021 | HICSS | Citations: 0
Authors: Ashenden, Debi; Black, Rob; Reid, Iain; Henderson, Simon
Abstract: Cyber deception tools are increasingly sophisticated but rely on a limited set o ... Expand
Semantic filters: deception detection
Topics: design thinking deception detection data encryption IT security systems development
Methods: design methodology design artifact