Ethical dilemma: Deception dynamics in computer‐mediated group communication
Author
Abstract
Suggested Citation
DOI: 10.1002/asi.23849
Download full text from publisher
References listed on IDEAS
- Shuyuan Mary Ho & Izak Benbasat, 2014. "Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 65(8), pages 1555-1576, August.
- Jeffrey T. Hancock & Michael T. Woodworth & Saurabh Goorha, 2010. "See No Evil: The Effect of Communication Medium and Motivation on Deception Detection," Group Decision and Negotiation, Springer, vol. 19(4), pages 327-343, July.
- Victoria L. Rubin & Tatiana Lukoianova, 2015. "Truth and deception at the rhetorical structure level," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 66(5), pages 905-917, May.
- Shuyuan Mary Ho & Merrill Warkentin, 2017. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 19(2), pages 377-396, April.
- Monica T. Whitty & Tom Buchanan & Adam N. Joinson & Alex Meredith, 2012. "Not all lies are spontaneous: An examination of deception across different modes of communication," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 63(1), pages 208-216, January.
- Monica T. Whitty & Tom Buchanan & Adam N. Joinson & Alex Meredith, 2012. "Not all lies are spontaneous: An examination of deception across different modes of communication," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 63(1), pages 208-216, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jussi Palomäki & Jeff Yan & David Modic & Michael Laakasuo, 2016. ""To Bluff like a Man or Fold like a Girl?" – Gender Biased Deceptive Behavior in Online Poker," PLOS ONE, Public Library of Science, vol. 11(7), pages 1-13, July.
- Sumeet Kumar & Binxuan Huang & Ramon Alfonso Villa Cox & Kathleen M. Carley, 2021. "An anatomical comparison of fake-news and trusted-news sharing pattern on Twitter," Computational and Mathematical Organization Theory, Springer, vol. 27(2), pages 109-133, June.
- Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
- Shuyuan Mary Ho & Merrill Warkentin, 2017. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 19(2), pages 377-396, April.
- Shuyuan Mary Ho & Merrill Warkentin, 0. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
- Cockrell, Cam & Stone, Dan N., 2011. "Team discourse explains media richness and anonymity effects in audit fraud cue brainstorming," International Journal of Accounting Information Systems, Elsevier, vol. 12(3), pages 225-242.
- Sunita Goel & Ozlem Uzuner, 2016. "Do Sentiments Matter in Fraud Detection? Estimating Semantic Orientation of Annual Reports," Intelligent Systems in Accounting, Finance and Management, John Wiley & Sons, Ltd., vol. 23(3), pages 215-239, July.
- Viju Raghupathi & Raquel Benbunan-Fich, 2020. "A Social Capital Perspective on Computer-Mediated Group Communication and Performance: An Empirical Study," Group Decision and Negotiation, Springer, vol. 29(4), pages 747-801, August.
- Roozmehr Safi & Glenn J. Browne, 2023. "Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects," Information Systems Frontiers, Springer, vol. 25(3), pages 1277-1292, June.
- Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
- Zhang, Chaowei & Gupta, Ashish & Kauten, Christian & Deokar, Amit V. & Qin, Xiao, 2019. "Detecting fake news for reducing misinformation risks using analytics approaches," European Journal of Operational Research, Elsevier, vol. 279(3), pages 1036-1052.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jinfst:v:68:y:2017:i:12:p:2729-2742. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.