|
白学军, 都旭, 牛宏伟, 郝嘉佳. 耐挫心理结构的探索: 基于大学生群体的测量. 心理与行为研究, 2020, 18 (5): 638- 644.
|
|
北京师范大学法学院课题组. (2022). 2022年电信网络诈骗治理报告: 以短视频平台为样本的研究. 2023-07-20 取自https://law.bnu.edu.cn/xsyj/xsdt/db33e1c2d69b46f3a5888122e09008cd.htm
|
|
陈向明. (2000). 质的研究方法与社会科学研究. 北京: 教育科学出版社.
|
|
丁妩瑶, 彭凯平. 中译人际信任量表勘误及修订. 心理月刊, 2020, 15 (6): 4- 5, 7.
|
|
杜林致. (2018). 应用心理测量学. 兰州: 兰州大学出版社.
|
|
何静秋. 电信网络诈骗犯罪被害预防的治理困境与优化进路——基于虚假投资理财类案件的实证考察. 中国人民公安大学学报(社会科学版), 2023, 39 (4): 83- 96.
|
|
凯西·卡麦兹. (2009). 建构扎根理论: 质性研究实践指南 (边国英 译). 重庆: 重庆大学出版社.
|
|
李雪峰, 王铼. 电信网络诈骗的特征与治理路径. 人民论坛, 2023, (20): 65- 67.
DOI
|
|
彭美慈, 汪国成, 陈基乐, 陈满辉, 白洪海, 李守国, … 殷磊. 批判性思维能力测量表的信效度测试研究. 中华护理杂志, 2009, 39 (9): 7- 10.
|
|
王洁. 电信网络诈骗犯罪的独特属性与治理路径. 中国人民公安大学学报(社会科学版), 2019, 35 (4): 1- 10.
|
|
温忠麟, 侯杰泰, 马什赫伯特. 结构方程模型检验: 拟合指数与卡方准则. 心理学报, 2004, 36 (2): 186- 194.
|
|
吴明隆. (2018). 问卷统计分析实务——SPSS操作与应用. 重庆: 重庆大学出版社.
|
|
新浪科技. (2022). 腾讯: 2021年电信网络诈骗治理研究报告. 2023-08-07 取自https://finance.sina.com.cn/tech/2022-02-23/doc-imcwipih4824797.shtml
|
|
许倩. 强教育与弱感知: 高校安全教育中正式和非正式制度对大学生风险感知的影响——基于电信诈骗的多案例研究. 广州大学学报(社会科学版), 2022, 21 (2): 32- 43.
|
|
许志炜, 童泽林, 郭昱琅, 李静. 诈骗受害大学生的人格特质. 中国心理卫生杂志, 2021, 35 (9): 775- 780.
DOI
|
|
赵雷, 陈红敏. 电信诈骗中青年受骗的影响因素和形成机制研究. 中国青年社会科学, 2022, 41 (3): 102- 112.
|
|
郑日昌. (2011). 心理与教育测量 (第2版). 北京: 人民教育出版社.
|
|
Alseadoon, I., Chan, T. Z., Foo, E., & Nieto, J. G. (2012). Who is more susceptible to phishing emails?: A Saudi Arabian study. Paper presented at the 23rd Australasian Conference on Information Systems, Geelong, Australia.
|
|
Arpaci, I., Karataş, K., & Baloğlu, M. The development and initial tests for the psychometric properties of the COVID-19 Phobia Scale (C19P-S). Personality and Individual Differences, 2020, 164, 110108.
DOI
|
|
Bose, I., & Leung, A. C. M. Unveiling the mask of phishing: Threats, preventive measures, and responsibilities. Communications of the Association for Information Systems, 2007, 19 (1): 544- 566.
|
|
Button, M., Lewis, C., & Tapley, J. (2009). Fraud typologies and the victims of fraud: Literature review. London: National Fraud Authority.
|
|
Etikan, I., Musa, S. A., & Alkassim, R. S. Comparison of convenience sampling and purposive sampling. American Journal of Theoretical and Applied Statistics, 2016, 5 (1): 1- 4.
|
|
Harrison, B., Svetieva, E., & Vishwanath, A. Individual processing of phishing emails: How attention and elaboration protect against phishing. Online Information Review, 2016, 40 (2): 265- 281.
DOI
|
|
Itzchakov, G., Uziel, L., & Wood, W. When attitudes and habits don’t correspond: Self-control depletion increases persuasion but not behavior. Journal of Experimental Social Psychology, 2018, 75, 1- 10.
DOI
|
|
James, B. D., Boyle, P. A., & Bennett, D. A. Correlates of susceptibility to scams in older adults without dementia. Journal of Elder Abuse & Neglect, 2014, 26 (2): 107- 122.
|
|
Janssen, L., & Fennis, B. M. Mindless resistance to persuasion: Low self-control fosters the use of resistance-promoting heuristics. Journal of Consumer Behaviour, 2017, 16 (6): 536- 549.
DOI
|
|
Jones, H. S., & Towse, J. (2018). Examinations of email fraud susceptibility: Perspectives from academic research and industry practice. In J. McAlaney, L. Frumkin, & V. Benson (Eds.), Psychological and behavioral examinations in cyber security (pp. 80–97). Hershey, PA: IGI Global.
|
|
Kirwan, G. H., Fullwood, C., & Rooney, B. (2018). Risk factors for social networking site scam victimization among malaysian students. Cyberpsychology, Behavior, and Social Networking, 21(2), 123–128.
|
|
Leung, S. O. A comparison of psychometric properties and normality in 4-, 5-, 6-, and 11-point Likert scales. Journal of Social Service Research, 2011, 37 (4): 412- 421.
DOI
|
|
Modic, D., & Lea, S. E. G. (2013). Scam compliance and the psychology of persuasion. Retrieved August 7, 2023, from http://ssrn.com/abstract=2364464
|
|
Moody, G. D., Galletta, D. F., & Dunn, B. K. Which phish get caught? An exploratory study of individuals’ susceptibility to phishing. European Journal of Information Systems, 2017, 26 (6): 564- 584.
DOI
|
|
Norris, G., & Brookes, A. Personality, emotion and individual differences in response to online fraud. Personality and Individual Differences, 2021, 169, 109847.
DOI
|
|
Schreiber, J. B., Nora, A., Stage, F. K., Barlow, E. A., & King, J. Reporting structural equation modeling and confirmatory factor analysis results: A review. The Journal of Educational Research, 2006, 99 (6): 323- 338.
DOI
|
|
Strauss, A., & Corbin, J. M. (1990). Basics of qualitative research: Grounded theory procedures and techniques. Newbury Park, CA: Sage.
|
|
Sulaiman, W. S. W., Murad, F. A., Saat, G. A. M., Khairudin, R., Mokhtar, D. M. M., Mariamdaran, S., … Kamaluddin, M. R. (2022). Development and validation of Scam Victimisation Risk Inventory (SVR-I) among Malaysian population. Journal of Legal, Ethical and Regulatory Issues, 25(5), 1–15.
|
|
Suler, J. The online disinhibition effect. CyberPsychology & Behavior, 2004, 7 (3): 321- 326.
|
|
Vishwanath, A., Harrison, B., & Ng, Y. J. Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research, 2018, 45 (8): 1146- 1166.
DOI
|
|
Vishwanath, A., Herath, T., Chen, R., Wang, J. G., & Rao, H. R. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 2011, 51 (3): 576- 586.
DOI
|
|
Wen, X., Xu, L., Wang, J., Gao, Y., Shi, J. M., Zhao, K., ... Qian, X. Y. Mental states: A key point in scam compliance and warning compliance in real life. International Journal of Environmental Research and Public Health, 2022, 19 (14): 8294.
DOI
|
|
Whittle, H., Hamilton-Giachritsis, C., Beech, A., & Collings, G. A review of young people’s vulnerabilities to online grooming. Aggression and Violent Behavior, 2013, 18 (1): 135- 146.
DOI
|
|
Williams, E. J., Beardmore, A., & Joinson, A. N. Individual differences in susceptibility to online influence: A theoretical review. Computers in Human Behavior, 2017, 72, 412- 421.
DOI
|