Vai al contenuto principale della pagina

Deception in the digital age : exploiting and defending human targets through computer-mediated communications / / Cameron H. Malin, [and three others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Malin Cameron H. Visualizza persona
Titolo: Deception in the digital age : exploiting and defending human targets through computer-mediated communications / / Cameron H. Malin, [and three others] Visualizza cluster
Pubblicazione: London, England : , : Academic Press, , 2017
Descrizione fisica: 1 online resource (286 pages)
Disciplina: 363.25968
Soggetto topico: Computer crimes - Investigation
Computer crimes - Prevention
Deception
Nota di contenuto: Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis.
Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools.
Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- Back Cover.
Titolo autorizzato: Deception in the digital age  Visualizza cluster
ISBN: 0-12-411639-6
0-12-411630-2
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910583061103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui