[1] 靳高风,守佳丽,林晞楠.中国犯罪形势分析与预测(2018-2019)[J].中国人民公安大学学报(社会科学版),2019,35(3):1-11. [2] 张莹,程传杰.涉众型非法集资犯罪的实证分析与防控建议[J].中国检察官,2019(9):40-42. [3] 殷明.电信诈骗案件受害人的实证研究——基于受害人笔录的量化统计分析[J].中国刑警学院学报,2017(3):57-62. [4] 苑景惠.基于"二八定律"的电信诈骗犯罪防范机制研究[J].长春师范大学学报,2019, 38(5):34-37. [5] 高蕴嶙,周玉玲.大数据背景下电信诈骗犯罪侦防对策实证研究——以C市公安机关立案情况为分析样本[A]//中国犯罪学学会预防犯罪专业委员会,上海政法学院刑事司法学院-警务学院.犯罪学论坛(第五卷).上海:中国法制出版社,2018:880-887. [6] 马忠红.论网络犯罪案件中的抽样取证——以电信诈骗犯罪为切入点[J].中国人民公安大学学报(社会科学版),2018,34(6):69-78. [7] 纪熙全.电信网络诈骗犯罪的打击与防范——以福建省三明市为例[J].中国刑事警察, 2019(6):6-10. [8] 葛悦炜.电信网络诈骗防范宣传策略研究——基于电信网络诈骗被害人角度[J].公安学刊(浙江警察学院学报),2018(4):78-84. [9] 蔡国芹,赵增田.论电信诈骗犯罪立体防控体系的构建[J].犯罪研究,2011(4):99-105. [10] 宋平.电信网络诈骗的心理解析及其防控[J].广西警察学院学报,2017,30(1):121-125. [11] MACINNIS D J, JAWORSKI B J. Information processing from advertisements:toward an integrative framework[J]. Journal of marketing, 1989, 53(4):1-23. [12] 贾明霞,熊回香.虚拟学术社区知识交流与知识共享探究——基于整合S-O-R模型与MOA理论[J].图书馆学研究,2020(2):43-54. [13] 陈则谦.MOA模型的形成、发展与核心构念[J].图书馆学研究,2013(13):53-57. [14] MACLNNIS D J, MOORMAN C, JAWORSKI B J. Enhancing and measuring consumers' motivation, opportunity, and ability to process brand information from ads[J]. Journal of marketing, 1991, 55(4):32-53. [15] HALLAHAN K. Enhancing motivation, ability, and opportunity to process public relations messages[J]. Public relations review, 2000, 26(4):463-480. [16] HUNG K, SIRAKAYA-TURK E, INGRAM L J. Testing the efficacy of an integrative model for community participation[J]. Journal of travel research, 2011, 50(3):276-288. [17] ADLER P S, KWON S-W. Social capital:prospects for a new concept[J]. Academy of management review, 2002, 27(1):17-40. [18] 宋小康,赵宇翔,宋士杰,等.基于MOA理论的健康谣言分享意愿影响因素研究[J].情报学报,2020,39(5):511-520. [19] LUO X, ZHANG W, BURD S, et al. Investigating phishing victimization with the heuristic-systematic model:a theoretical framework and an exploration[J]. Computers & security, 2013, 38(5):28-38. [20] FISCHER P, LEA S E G, EVANS K M. Why do individuals respond to fraudulent scam communications and lose money? the psychological determinants of scam compliance[J]. Journal of applied social psychology, 2013, 43(10):2060-2072. [21] BARANOWSKI T, SMITH M, BARANOWSKI J, et al. Low validity of a seven-item fruit and vegetable food frequency questionnaire among third-grade students[J]. Journal of the American Dietetic Association, 1997, 97(1):66-68. [22] MCALEXANDER J H, SCHOUTEN J W, KOENIG H F. Building brand community[J]. Journal of marketing, 2002, 66(1):38-54. [23] VISHWANATH A. Mobile device affordance:Explicating how smartphones influence the outcome of phishing attacks[J]. Computers in human behavior, 2016, 63(5):198-207. [24] REINHOLT M, PEDERSEN T, FOSS N J. Why a central network position isn't enough:the role of motivation and ability for knowledge sharing in employee networks[J]. Academy of management journal, 2011, 54(6):1277-1297. [25] BRENNAN L L. Understanding the knowledge-sharing challenge:is a "bottleneck" perspective the answer?[J]. Academy of management perspectives, 2008, 22(3):112-114. [26] WRIGHT R T, MARETT K. The influence of experiential and dispositional factors in phishing:an empirical investigation of the deceived[J]. Journal of management information systems, 2010, 27(1):273-303. [27] MAYER R C, DAVIS J H. The effect of the performance appraisal system on trust for management:a field quasi-experiment[J]. Journal of applied psychology, 1999, 84(1):123-136. [28] GOULD-WILLIAMS J. The importance of hr practices and workplace trust in achieving superior performance:a study of public-sector organizations[J]. The international journal of human resource management, 2003, 14(1):28-54. [29] 马李芬,吕尧.高校电信诈骗犯罪的解析及治理路径[J].北京警察学院学报,2017(4):110-114. [30] WANG J, HERATH T, CHEN R, et al. Research article phishing susceptibility:an investigation into the processing of a targeted spear phishing email[J]. IEEE transactions on professional communication, 2012, 55(4):345-362. [31] 明均仁,余世英,杨艳妮,等.面向移动图书馆的技术接受模型构建[J].情报资料工作,2014, 35(5):49-55. [32] HARRISON B, SVETIEVA E, VISHWANATH A. Individual processing of phishing emails:how attention and elaboration protect against phishing[J]. Online information review, 2016, 40(2):265-281. [33] 周浩,龙立荣.共同方法偏差的统计检验与控制方法[J].心理科学进展,2004(6):942-950. [34] AHUJA G. Collaboration networks, structural holes and innovation:a longitudinal study[J]. Academy of management proceedings, 2000,45(3):425-455. |