Vai al contenuto principale della pagina
Autore: | Malin Cameron H. |
Titolo: | Deception in the digital age : exploiting and defending human targets through computer-mediated communications / / Cameron H. Malin, [and three others] |
Pubblicazione: | London, England : , : Academic Press, , 2017 |
Descrizione fisica: | 1 online resource (286 pages) |
Disciplina: | 363.25968 |
Soggetto topico: | Computer crimes - Investigation |
Computer crimes - Prevention | |
Deception | |
Nota di contenuto: | Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis. |
Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools. | |
Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- Back Cover. | |
Titolo autorizzato: | Deception in the digital age |
ISBN: | 0-12-411639-6 |
0-12-411630-2 | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910583061103321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |