Deception in the Digital Age : Exploiting and Defending Human Targets Through Computer-Mediated Communications.

By: Malin, Cameron HContributor(s): Gudaitis, Terry | Holt, Thomas | Kilger, MaxMaterial type: TextTextSeries: eBooks on DemandPublisher: San Diego : Elsevier Science & Technology, 2017Copyright date: ©2017Description: 1 online resource (286 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780124116399Genre/Form: Electronic books.Additional physical formats: Print version:: Deception in the Digital Age : Exploiting and Defending Human Targets Through Computer-Mediated CommunicationsLOC classification: HV8079.C65 | M355 2017Online resources: Click here to view this ebook.
Contents:
Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis.
Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools.
Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Y -- Back Cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
HV8079.C65 M355 2017 (Browse shelf) https://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=5506533 Available EBC5506533

Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis.

Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools.

Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Y -- Back Cover.

Description based on publisher supplied metadata and other sources.

There are no comments on this title.

to post a comment.