本章参考文献
[1]商务部网站.三部门联合发布《电子商务“十三五”发展规划》[EB/OL].(2016-12-30)[2021-02-01]. http://www.gov.cn/xinwen/2016-12/30/content_5154715.htm.
[2]陶冉.第三方电子商务平台的价值选择及其法律责任研究[J].商场现代化,2016(27):68-69.
[3]李盼盼.“双11”电商信用治理持续加强新反不正当竞争法营造放心网购环境[N].中国经济导报,2017-11-07.
[4]蹇洁,刘松,张谧.电子商务监管系统绩效评价体系研究[J].商业经济研究,2015(23):68-70.
[5]ALGARNI A, XU Y. Social engineering in social networking sites: phase-based and source-based models[J]. International Journal of e-Education, e-Business, e-Management and e-Learning, 2013, 3 (6).
[6]中华人民共和国中央人民政府.网络交易管理办法[EB/OL]. http://www.gov.cn/gongbao/content/2014/content_2671526.htm.
[7]CHEN C D, HUANG L T. Online deception investigation: Content analysis and cross-cultural comparison[J]. International Journal of Business and Information, 2011, 6 (1): 91-111.
[8]快懂百科.社会工程攻击[EB/OL].(2014-12-07)[2021-02-01]. http://www.baike.com/wikiid/5506882685736936987?prd=home_search&search_id=04tunut3ku800&view_id=36a9nar2e2000#catalog_1.
[9]猎网平台.2016年网络诈骗趋势研究报告[EB/OL].(2017-01-13)[2021-02-01]. http://zt.360.cn/1101061855.php?dtid=1101062366&did=210142130.html.
[10]CROSS C. "Nobody's holding a gun to your head…" examining current discourses surrounding victims of online fraud[C]//Crime, Justice and Social Democracy: Proceedings of the 2nd International Conference. 2013, Volume 1. Crime and Justice Research Centre, Queensland University of Technology, 2013: 25-32.
[11]LEUKFELDT E R. Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization[J]. Cyberpsychology, Behavior, and Social Networking, 2014, 17(8): 551-555.
[12]ALGARNI A, XU Y, CHAN T, et al. Social engineering in social networking sites:how good becomes evil[C]//Proceedings of the 18th Pacific Asia conference on information systems(PACIS 2014). The Association for Information Systems (AIS), 2014.
[13]ALSEADOON I, OTHMAN M F I, CHAN T. What Is the Influence of Users' Characteristics on Their Ability to Detect Phishing Emails?[M]//Advanced Computer and Communication Engineering Technology. Springer, Cham, 2015: 949-962.
[14]PRATT T, HOLTFRETER K, REISIG M. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory[J]. Journal of Research in Crime & Delinquency, 2010, 47(3): 267-296.
[15]MAVLANOVA T, BENBUNAN-FICH R, KOUFARIS M, et al. The effect of positive and negative signals on perceived deceptiveness of websites in online markets[J]. Journal of Theoretical & Applied Electronic Commerce Research, 2015, 10 (1): 19-34.
[16]ZHUANG. Buyer beware:consumer response to manipulations of online product reviews[J].2014.
[17]ZHANG J, KO M. Current State of the Digital Deception Studies in IS[J]. AMCIS, 2013.
[18]ROCHA FLORES W, HOLM H, NOHLBERG M, et al. Investigating personal determinants of phishing and the effect of national culture[J]. Information & Computer Security, 2015.
[19]HADNAGY C. Social engineering: the art of human hacking[J].2011.
[20]WORKMAN M. Gaining access with social engineering: An empirical study of the threat[J]. Information Systems Security, 2007, 16(6): 315-331.
[21]ALGARNI A, XU Y, CHAN T, et al. Social engineering in social networking sites: How good becomes evil[C]//Proceedings of the 18th Pacific Asia conference on information systems(PACIS 2014). The Association for Information Systems (AIS), 2014.
[22]MITNICK K D, SIMON W L. The art of deception: Controlling the human element of security[M]. John Wiley&Sons, 2003.
[23]ALLEN M, CURRIE L M, BAKKEN S, et al. Heuristic evaluation of paperbased Web pages: a simplified inspection usability methodology [J]. Journal of biomedical informatics, 2006, 39 (4): 412-423.
[24]HUMPHERYS S L, MOFFITT K C, BURNS M B, et al. Identification of fraudulent financial statements using linguistic credibility analysis[J]. Decision Support Systems, 2011, 50(3): 585-594.
[25]BASS F M. A new product growth for model consumer durables[J]. Management science, 2004, 50(12_supplement): 1825-1832.
[26]NASH R, BOUCHARD M, MALM A. Investing in people: The role of social networks in the diffusion of alarge-scale fraud [J]. Social Networks, 2013, 35(4): 686-698.
[27]NASH R, BOUCHARD M, MALM A. ERON Mortgage Corporation: Diffusion of Fraud through Social Networks[J].Unpublished article, 2011.
[28]LÓPEZ-PINTADO D. Diffusion in complex social networks[J]. Games and Economic Behavior, 2008, 62 (2): 573-590.
[29]BAKER W E, FAULKNER R R. Diffusion of fraud: Intermediate economic crime and investor dynamics[J]. Criminology, 2003, 41(4): 1173-1206.
[30]ZHANG J, KO M. Current State of the Digital Deception Studies in IS[J]. 2013.
[31]CENTOLA D. The spread of behavior in an online social network experiment[J]. science, 2010, 329(5996): 1194-1197.
[32]ALGARNI A, XU Y et al. Social engineering in social networking sites: Affect-based model[C]//Internet Technology and Secured Transactions(ICITST), 2013.
[33]马燕.大学生微博虚拟社交的传播效果分析——基于“准社会交往”理论视角[J].传媒,2014(23):77-78.
[34]马芳,晁钢令.基于SIR模型的消费者购买行为人际扩散研究[J].现代管理科学,2011(06):92-112.
[35]王核成,应波.基于消费者采纳网络的网上购物扩散模型——以中国网上购物为例[J].系统工程,2013,31(01):78-84.
[36]何俊辉.我国C2C电子商务欺诈影响因素的实证研究[J].情报杂志,2010,29(05):204-207.
[37]任国平.网络交易欺诈行为法律规制研究[D].重庆:西南政法大学,2014.
[38]杨燮蛟,张怡静.网络犯罪预防新途径——以犯罪心理为切入点[J].南都学坛,2016,36(5):73-76.
[39]王雨.网络犯罪心理初探[J].法制与社会,2016(14):251-252.
[40]陈显友.网络购物中欺诈行为分析及防范策略[J].黑龙江科技信息,2009(30):102.
[41]邹蕴.复杂网络上利他行为的产生规律及演化过程研究[D].吉林:吉林大学,2014.
[42]张博.复杂社会网络传播模式的研究[D].南京:南京邮电大学,2013.
[43]焦玥.消费者口碑传播行为及交互影响的模拟仿真研究[J].计算机应用研究,2014,31(11):3234-3239.
[44]李建勋,解建仓,姜仁贵,杨明祥.不良行为在团队网络中传播的动力学仿真及实例分析[J].计算机应用与软件,2012,29(06):57-60.
[45]赵海峰,曹晓怡.地铁突发事件中官方信息的扩散[J].系统工程,2016,34(7):131-137.
[46]魏玖长,周磊,赵定涛.基于BASS模型的危机信息扩散模式[J].系统工程,2011,29(9):16-22.
[47]陈玟宇,贾贞,祝光湖.社交网络上基于信息驱动的行为传播研究[J].电子科技大学学报,2015,44(2):172-182.
[48]周涛.评《社交网络上基于信息驱动的行为传播研究》[J].电子科技大学学报,2015,44(02):162.
[49]杨义先.安全通论[EB/OL].(2016-09-08)[2021-02-01]. http://blog.sciencenet.cn/blog-453322-1001684.html.
[50]李光正,李琼.基于传染病模型的受贿行为传播过程分析[J].中国科技信息,2009(19):175-188
[51]吴怡萍,蔡恒进.造假行为的传播与遏制——基于进化博弈模拟的研究[J].武汉大学学报(哲学社会科学版),2014,67(03):112-118.