1. Francia III, G., & McKerchar, T. L. (2015). Social and behavioral modeling for a trustworthy cyberspace: A research framework. In Proceedings of the International Symposium on Psychology and Behavior in China’s Social Transformation Under the Background of Informatization (pp. 23–31). Jiaxing, Zhejiang, China: American Scholars Press.
2. Goodman, S., & Lin, H. S. (2007). Toward a safer and more secure cyberspace. Washington, DC: National Academies Press.
3. Farahmand, F., Attallah, M., & Konsynski, B. (2008). Incentives and perceptions of information security risks. In 29th International Conference on Information Systems (ICIS). Paris, France.
4. Kesan, J., & Shah, R. (2006). Setting software defaults: Perspectives from law, computer science and behavioral economics. Notre Dame Law Review, 82(2), 583–634.
5. Bolton, G., Katok, E., & Ockenfels, A. (2004). How effective are electronic reputation mechanisms? An experimental investigation. Management Science, 50(11), 1587–1602.