You searched for subject:(Warning messages)
.
Showing records 1 – 6 of
6 total matches.
No search limiters apply to these results.
1.
Gibson, Anthony.
Stop what you’re doing, right now! Effects of interactive
messages on careless responding.
Degree: PhD, Human Factors and Industrial/Organizational Psychology
PhD, 2019, Wright State University
URL: http://rave.ohiolink.edu/etdc/view?acc_num=wright1564759093082937
► Careless responding (CR) can negatively affect the quality of self-report data and thus the resulting conclusions researchers draw from the data. The purpose of the…
(more)
▼ Careless responding (CR) can negatively affect the
quality of self-report data and thus the resulting conclusions
researchers draw from the data. The purpose of the current study
was to investigate whether interactive warnings, which alert
careless respondents in real time, reduce CR more than traditional,
non-interactive warnings. I used a 4 x 4 mixed factorial design to
examine these relationships. The between group factor was the type
of
warning used, which consisted of four levels (i.e., a control,
no
warning group, a traditional, non-interactive
warning, an
interactive threatening
warning message, and an interactive
encouraging message), and the within person factor consisted of CR
measurements across four questionnaire sections. The results showed
that the interactive consequence message failed to reduce CR scores
compared to a traditional
warning message. Implications for these
findings include the general ineffectiveness of techniques based on
motivational theories to deter CR. Future research should continue
investigating different CR prevention techniques.
Advisors/Committee Members: Bowling, Nathan (Advisor).
Subjects/Keywords: Psychology; Careless Responding; Insufficient Effort Responding; Warning Messages
…techniques to reduce the
incidence of CR including (a) warning messages (Gibson… …on warning messages in the current
study. The underlying rationale for the effectiveness of… …warning messages in the research
has been scant. In order to address this omission, I use social… …warning messages reduce
CR.
Social Power Theory and Warning Messages
Social power theory seeks… …successfully (Elias,
2007). Careless responding warning messages have stated that remaining…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Gibson, A. (2019). Stop what you’re doing, right now! Effects of interactive
messages on careless responding. (Doctoral Dissertation). Wright State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=wright1564759093082937
Chicago Manual of Style (16th Edition):
Gibson, Anthony. “Stop what you’re doing, right now! Effects of interactive
messages on careless responding.” 2019. Doctoral Dissertation, Wright State University. Accessed January 26, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=wright1564759093082937.
MLA Handbook (7th Edition):
Gibson, Anthony. “Stop what you’re doing, right now! Effects of interactive
messages on careless responding.” 2019. Web. 26 Jan 2021.
Vancouver:
Gibson A. Stop what you’re doing, right now! Effects of interactive
messages on careless responding. [Internet] [Doctoral dissertation]. Wright State University; 2019. [cited 2021 Jan 26].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1564759093082937.
Council of Science Editors:
Gibson A. Stop what you’re doing, right now! Effects of interactive
messages on careless responding. [Doctoral Dissertation]. Wright State University; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1564759093082937
2.
Benaidja, Amira.
Echange d'informations en temps réel dans les réseaux de véhicules : Real-time information exchange in vehicular networks.
Degree: Docteur es, Informatique, 2016, Sorbonne Paris Cité; Université des sciences et de la technologie Houari Boumediene (Alger)
URL: http://www.theses.fr/2016USPCB045
► Les réseaux véhiculaires, connus sous le terme VANETs, sont des réseaux impliquant des communications entre deux ou plusieurs véhicules et éventuellement une communication avec des…
(more)
▼ Les réseaux véhiculaires, connus sous le terme VANETs, sont des réseaux impliquant des communications entre deux ou plusieurs véhicules et éventuellement une communication avec des éléments d’infrastructure sur la route. Récemment, le concept de systèmes de transport intelligents (STI) a connu beaucoup d’intérêt. Les STI sont des systèmes utilisant les nouvelles technologies de communication sans fil appliquées au domaine du transport pour améliorer la sécurité routière, la logistique et les services d’information. Des défis majeurs ont besoin cependant d'être abordés pour offrir une communication sur la route sécurisée et fiable dans des environnements anonymes et quelquefois hostiles à la communication. Comme dans tout système de communication, les réseaux véhiculaires doivent opérer en respectant des contraintes en termes de qualité de service. Ces contraintes sont d’autant plus strictes quand il s’agit de fournir des services de sécurité sur la route. Ce projet vise à développer des techniques de communication véhiculaires pour le transfert des informations de manière fiable entre véhicules roulant à grande vitesse tout en contrôlant la surcharge du réseau. Ces techniques visent la prise en compte des contraintes temporelles sur les délais de transfert afin d’envisager leur utilisation dans des applications critiques telle que la sécurité sur la route. Pour ce faire, cette thèse propose d’abord un protocole optimal de dissémination de
messages d’urgence pour les VANETs. Il est basé sur une stratégie de diffusion qui exploite les véhicules sur la direction opposée afin d’accélérer la dissémination du message d’urgence tout en réduisant le nombre de transmissions. Ainsi, et dans le but d’assurer une dissémination fiable et à faible surcoût, une technique de retransmission périodique intelligente permettant l’adaptation du protocol proposé à différentes densités du trafic routier est proposée. Dans un second volet, ce projet propose une approche hybride de dissémination de
messages d’urgence qui combine alternativement les avantages des deux principales approches de dissémination existantes (Sender-oriented et Receiver-oriented dont notre première proposition fait partie) afin de garantir une transmission fiable des alertes tout en réduisant les délais. Les approches Receiver-Oriented qui sont les plus adaptées pour les applications de sécurité dans les VANETs peuvent minimiser la latence et les limitations des approches Sender-Oriented. Mais, ilsdoivent aussi mieux exploiter les apports des
messages hello (beacons) échangés dans la technologie IEEE802.11P. Ainsi, et dans le but de surmonter les limites des approches de retransmissions périodiques et celles de relais- multiples afin d’assurer des échanges fiables de
messages de sécurité tout en réduisant la surcharge de la bande passante, nous introduisons un nouveau mécanisme DR/BDR (Designated Relay/Backup Designated Relay). Le BDR, dans ce mécanisme, doit remplacer le DR et assurer sa tâche quand il détecte, à travers les beacons colorés échangés,l’échec de ce…
Advisors/Committee Members: Naït-Abdesselam, Farid (thesis director), Moussaoui, Samira (thesis director).
Subjects/Keywords: VANETs; Applications de sécurité; Messages d’urgence; Délai; Fiabilité; IEEE802.11p; Approche hybride; Mécanisme DR/BDR; VANETs; Safety applications; Warning messages; Delay; Reliability; Hybrid alternative Receiver- Sender approach; IEEE802.11p; Colored DR/BDR mechanism; 004
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Benaidja, A. (2016). Echange d'informations en temps réel dans les réseaux de véhicules : Real-time information exchange in vehicular networks. (Doctoral Dissertation). Sorbonne Paris Cité; Université des sciences et de la technologie Houari Boumediene (Alger). Retrieved from http://www.theses.fr/2016USPCB045
Chicago Manual of Style (16th Edition):
Benaidja, Amira. “Echange d'informations en temps réel dans les réseaux de véhicules : Real-time information exchange in vehicular networks.” 2016. Doctoral Dissertation, Sorbonne Paris Cité; Université des sciences et de la technologie Houari Boumediene (Alger). Accessed January 26, 2021.
http://www.theses.fr/2016USPCB045.
MLA Handbook (7th Edition):
Benaidja, Amira. “Echange d'informations en temps réel dans les réseaux de véhicules : Real-time information exchange in vehicular networks.” 2016. Web. 26 Jan 2021.
Vancouver:
Benaidja A. Echange d'informations en temps réel dans les réseaux de véhicules : Real-time information exchange in vehicular networks. [Internet] [Doctoral dissertation]. Sorbonne Paris Cité; Université des sciences et de la technologie Houari Boumediene (Alger); 2016. [cited 2021 Jan 26].
Available from: http://www.theses.fr/2016USPCB045.
Council of Science Editors:
Benaidja A. Echange d'informations en temps réel dans les réseaux de véhicules : Real-time information exchange in vehicular networks. [Doctoral Dissertation]. Sorbonne Paris Cité; Université des sciences et de la technologie Houari Boumediene (Alger); 2016. Available from: http://www.theses.fr/2016USPCB045

University of Cambridge
3.
Vetterl, Alexander.
Honeypots in the age of universal attacks and the Internet of Things.
Degree: PhD, 2020, University of Cambridge
URL: https://www.repository.cam.ac.uk/handle/1810/303171
► Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on…
(more)
▼ Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on recent advances in Internet-wide scanning and device discovery. The speed at which (vulnerable) devices can be discovered, and the device monoculture, mean that a single exploit, potentially trivial, can affect millions of devices across brands and continents.
In an attempt to detect and profile the growing threat of autonomous and Internet-scale attacks against the Internet of Things, we revisit honeypots, resources that appear to be legitimate systems. We show that this endeavour was previously limited by a fundamentally flawed generation of honeypots and associated misconceptions.
We show with two one-year-long studies that the display of warning messages has no deterrent effect in an attacked computer system. Previous research assumed that they would measure individual behaviour, but we find that the number of human attackers is orders of magnitude lower than previously assumed.
Turning to the current generation of low- and medium-interaction honeypots, we demonstrate that their architecture is fatally flawed. The use of off-the-shelf libraries to provide the transport layer means that the protocols are implemented subtly differently from the systems being impersonated. We developed a generic technique which can find any such honeypot at Internet scale with just one packet for an established TCP connection.
We then applied our technique and conducted several Internet-wide scans over a one-year period. By logging in to two SSH honeypots and sending specific commands, we not only revealed their configuration and patch status, but also found that many of them were not up to date. As we were the first to knowingly authenticate to honeypots, we provide a detailed legal analysis and an extended ethical justification for our research to show why we did not infringe computer-misuse laws.
Lastly, we present honware, a honeypot framework for rapid implementation and deployment of high-interaction honeypots. Honware automatically processes a standard firmware image and can emulate a wide range of devices without any access to the manufacturers' hardware. We believe that honware is a major contribution towards re-balancing the economics of attackers and defenders by reducing the period in which attackers can exploit vulnerabilities at Internet scale in a world of ubiquitous networked `things'.
Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/303171
Chicago Manual of Style (16th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 26, 2021.
https://www.repository.cam.ac.uk/handle/1810/303171.
MLA Handbook (7th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 26 Jan 2021.
Vancouver:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 26].
Available from: https://www.repository.cam.ac.uk/handle/1810/303171.
Council of Science Editors:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://www.repository.cam.ac.uk/handle/1810/303171
4.
Murdock, Mitchel Richard.
Two Essays On The Effects Of Emphasizing Social Consequences In Warning Messages.
Degree: PhD, Moore School of Business, 2016, University of South Carolina
URL: https://scholarcommons.sc.edu/etd/3448
► This dissertation examines the effects of warning messages that emphasize the social consequences of negative health outcomes and demonstrates that highlighting social (versus health)…
(more)
▼ This dissertation examines the effects of
warning messages that emphasize the social consequences of negative health outcomes and demonstrates that highlighting social (versus health) consequences leads to greater perceived temporal proximity of the outcome, increased perceived vulnerability to the outcome, and less favorable consumption experiences. Oftentimes health
messages are ineffective at altering risk perceptions and eliciting long-term behavior change because the health consequence seems very distant and unlikely to happen (e.g. mouth cancer from smoking). However, when a negative health outcome is seen through a social lens (e.g. mouth cancer makes a person unattractive) versus a health lens (e.g. mouth cancer weakens the immune system) the health outcome (e.g. mouth cancer) appears closer in time and individuals feel more vulnerable to it.
Across two essays I investigate how social consequences influence perceptions of risk (essay 1) and delayed consumption experiences (essay 2). In the first essay, I document that when social consequences are emphasized individuals see the health outcome as more temporally proximate and feel more vulnerable to the outcome. In the second essay, I demonstrate that
warning messages that emphasize social consequences can alter the enjoyment and favorability of the targeted health behavior. These findings suggest that the use of social consequences may have long term, subtle effects on consumer experiences, thereby increasing the likelihood of compliance with the message.
Advisors/Committee Members: Priyali Rajagopal.
Subjects/Keywords: Business; Business Administration, Management, and Operations; Effects; Emphasizing; Social Consequences; Warning Messages
…corporations have
spent billions of dollars on warning messages that are meant to inform individuals… …typically
displayed in warning messages can influence perceptions of risk of the negative health… …social consequence in
warning messages influences perceptions of temporal distance and… …social vs.
health) highlighted in a warning messages influence perceptions of experiences… …ABSTRACT
This research examines the effects of warning messages that emphasize the social…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Murdock, M. R. (2016). Two Essays On The Effects Of Emphasizing Social Consequences In Warning Messages. (Doctoral Dissertation). University of South Carolina. Retrieved from https://scholarcommons.sc.edu/etd/3448
Chicago Manual of Style (16th Edition):
Murdock, Mitchel Richard. “Two Essays On The Effects Of Emphasizing Social Consequences In Warning Messages.” 2016. Doctoral Dissertation, University of South Carolina. Accessed January 26, 2021.
https://scholarcommons.sc.edu/etd/3448.
MLA Handbook (7th Edition):
Murdock, Mitchel Richard. “Two Essays On The Effects Of Emphasizing Social Consequences In Warning Messages.” 2016. Web. 26 Jan 2021.
Vancouver:
Murdock MR. Two Essays On The Effects Of Emphasizing Social Consequences In Warning Messages. [Internet] [Doctoral dissertation]. University of South Carolina; 2016. [cited 2021 Jan 26].
Available from: https://scholarcommons.sc.edu/etd/3448.
Council of Science Editors:
Murdock MR. Two Essays On The Effects Of Emphasizing Social Consequences In Warning Messages. [Doctoral Dissertation]. University of South Carolina; 2016. Available from: https://scholarcommons.sc.edu/etd/3448

University of Cambridge
5.
Vetterl, Alexander.
Honeypots in the age of universal attacks and the Internet of Things.
Degree: PhD, 2020, University of Cambridge
URL: https://doi.org/10.17863/CAM.50250
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825
► Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on…
(more)
▼ Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on recent advances in Internet-wide scanning and device discovery. The speed at which (vulnerable) devices can be discovered, and the device monoculture, mean that a single exploit, potentially trivial, can affect millions of devices across brands and continents. In an attempt to detect and profile the growing threat of autonomous and Internet-scale attacks against the Internet of Things, we revisit honeypots, resources that appear to be legitimate systems. We show that this endeavour was previously limited by a fundamentally flawed generation of honeypots and associated misconceptions. We show with two one-year-long studies that the display of warning messages has no deterrent effect in an attacked computer system. Previous research assumed that they would measure individual behaviour, but we find that the number of human attackers is orders of magnitude lower than previously assumed. Turning to the current generation of low- and medium-interaction honeypots, we demonstrate that their architecture is fatally flawed. The use of off-the-shelf libraries to provide the transport layer means that the protocols are implemented subtly differently from the systems being impersonated. We developed a generic technique which can find any such honeypot at Internet scale with just one packet for an established TCP connection. We then applied our technique and conducted several Internet-wide scans over a one-year period. By logging in to two SSH honeypots and sending specific commands, we not only revealed their configuration and patch status, but also found that many of them were not up to date. As we were the first to knowingly authenticate to honeypots, we provide a detailed legal analysis and an extended ethical justification for our research to show why we did not infringe computer-misuse laws. Lastly, we present honware, a honeypot framework for rapid implementation and deployment of high-interaction honeypots. Honware automatically processes a standard firmware image and can emulate a wide range of devices without any access to the manufacturers' hardware. We believe that honware is a major contribution towards re-balancing the economics of attackers and defenders by reducing the period in which attackers can exploit vulnerabilities at Internet scale in a world of ubiquitous networked 'things'.
Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825
Chicago Manual of Style (16th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 26, 2021.
https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.
MLA Handbook (7th Edition):
Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 26 Jan 2021.
Vancouver:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 26].
Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.
Council of Science Editors:
Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825
6.
Bradley, Lindsey.
Induced Moods, Warning Messages, and Gambling Behavior.
Degree: MSin Experimental Psychology (M.S.), Department of Psychology, 2018, Georgia Southern University
URL: https://digitalcommons.georgiasouthern.edu/etd/1791
► Gambling behavior is maintained by cognitive biases (Ladouceur & Walker, 1996; Sharpe, 2002) which stem from an automatic level of thinking, referred to as…
(more)
▼ Gambling behavior is maintained by cognitive biases (Ladouceur & Walker, 1996; Sharpe, 2002) which stem from an automatic level of thinking, referred to as System 1 (Kahneman, 2011). System 2 thinking is more deliberative than System 1, but requires more cognitive effort. System 2 is only activated when necessary. Positive affect increases reliance on System 1, often leading to an increase in risky behavior. Negative affect increases reliance on System 2, often leading to a decrease in risky behavior. Researchers argue that mandatory
warning messages should be implemented in gambling venues to caution patrons against the dangers of problem gambling (Blaszczynski, Ladouceur, & Shaffer, 2004; Ginley, Whelan, Pfund, Peter, & Meyers, 2017; Steenbergh, Whelan, Meyers, May, & Floyd, 2004). Pop-up
warning messages (Monaghan & Blaszczynski, 2010) containing information meant to correct gambling-related cognitive biases (Ginley et al., 2017) are most effective. The current study sought to bridge a gap between the literature on gambling
warning messages and literature on the effect of affect on risky decision-making. If a case is to be made for implementing mandatory gambling
warning messages, it is important to examine if the effectiveness of
warning messages is modulated by affect. Participants were randomly assigned to be induced with either positive or negative affect, and to either receive gambling
warning messages or not receive gambling
warning messages. It was hypothesized that those induced with positive affect would have higher levels of risk-taking than those induced with negative affect. It was also hypothesized that there would be an interaction effect between affect condition and
warning message condition. Results showed that there was not a significant difference in risk-taking behavior between those who received
warning messages and those who did not receive
warning messages. There was a trend towards a significant difference based on affect condition, in that those induced with negative affect had slightly higher levels of risk-taking than those induced with positive affect. No significant interaction effects were detected.
Advisors/Committee Members: Jeffrey Klibert, Lindsay Larson.
Subjects/Keywords: Gambling; Risk-taking; Warning messages; Positive affect; Negative affect; System 1; System 2; Psychology; Jack N. Averitt College of Graduate Studies, Electronic Theses & Dissertations, ETDs, Student Research
…Gambling Warning Messages €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦â€¦
Current Study €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦â€¦.
2 METHOD… …Manipulation Check €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦
Warning Messages and Affect €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦ €¦...
DOSPERT… …many decisions and judgments.
Gambling Warning Messages
There are many opportunities for… …believe that gambling venues should have mandatory
warning messages to caution patrons against… …effective warning messages. Compared to
static warnings, pop-up warning messages were found to be…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Bradley, L. (2018). Induced Moods, Warning Messages, and Gambling Behavior. (Masters Thesis). Georgia Southern University. Retrieved from https://digitalcommons.georgiasouthern.edu/etd/1791
Chicago Manual of Style (16th Edition):
Bradley, Lindsey. “Induced Moods, Warning Messages, and Gambling Behavior.” 2018. Masters Thesis, Georgia Southern University. Accessed January 26, 2021.
https://digitalcommons.georgiasouthern.edu/etd/1791.
MLA Handbook (7th Edition):
Bradley, Lindsey. “Induced Moods, Warning Messages, and Gambling Behavior.” 2018. Web. 26 Jan 2021.
Vancouver:
Bradley L. Induced Moods, Warning Messages, and Gambling Behavior. [Internet] [Masters thesis]. Georgia Southern University; 2018. [cited 2021 Jan 26].
Available from: https://digitalcommons.georgiasouthern.edu/etd/1791.
Council of Science Editors:
Bradley L. Induced Moods, Warning Messages, and Gambling Behavior. [Masters Thesis]. Georgia Southern University; 2018. Available from: https://digitalcommons.georgiasouthern.edu/etd/1791
.