5,671 research outputs found

    The Effects of Computer-Mediation, Training, and Warning on False Alarms in an Interview Setting

    Get PDF
    Deception in applicant résumés is a major business problem. With the rapid growth of Internet job websites and computer-mediated communication, organizations are more at risk than ever before. Researchers have tried to improve individuals\u27 deception detection accuracy to minimize the impact of deception, including warning individuals about deception and training individuals to detect deception. However, evidence was found that trained and warned individuals might make more incorrect judgments about true information, which are known as false alarms. Further, few previous studies focused on the computer-mediated settings that are now a central part of business communication. After conducting an experiment to understand these and other causes of false alarms in computer-mediated interview settings, we found that individuals performing interviews over an audio-based communication channel incorrectly judged interviewees as being deceptive more often than did individuals performing interviews via e-mail. We found that while the number of lies detected was low for both types of communication, individuals communicating over an audio-based channel had more false alarms. We also found that the combination of in-advance training and a just-in-time warning did not affect receivers\u27 judgments about deception in our computer-mediated interview setting

    Detecting Deception in Computer-Mediated Interviewing

    Get PDF

    Effect of Frame of Mind on Users’ Deception Detection Attitudes and Behaviours

    Get PDF
    As the World Wide Web grows, the number and variety of deceptive attacks targeting online consumers likewise increases. Extant research has examined online deception from an information processing perspective, that is, how users process information when they encounter deceptive attacks. However, users’ ability to process information is based on what the users are thinking or their frame of mind while engaged with that information. Frame of mind has not been well studied in the security domain. This study proposes the effect of users’ frame of mind on their attitude towards online deception and their actual deception detection behaviour. Specifically, we propose that human information needs and the framing (positive or negative) of important information such as warnings are significant components of users’ frames of mind that impact their vulnerability to online attacks. We conclude the paper by discussing in detail the experimental setup and expected contributions from the analysis

    A deception based framework for the application of deceptive countermeasures in 802.11b wireless networks

    Get PDF
    The advance of 802.11 b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and stealthily, making organisations highly vulnerable to attack. Therefore, it is incumbent upon defending organisations to take initiative and implement proactive defences against common network attacks. Deception is an essential element of effective security that has been widely used in networks to understand attack methods and intrusions. However, little thought has been given to the type and the effectiveness of the deception. Deceptions deployed in nature, the military and in cyberspace were investigated to provide an understanding of how deception may be used in network security. Deceptive network countermeasures and attacks may then be tested on a wireless honeypot as an investigation into the effectiveness of deceptions used in network security. A structured framework, that describes the type of deception and its modus operandi, was utilised to deploy existing honeypot technologies for intrusion detection. Network countermeasures and attacks were mapped to deception types in the framework. This enabled the honeypot to appear as a realistic network and deceive targets in varying deceptive conditions. The investigation was to determine if particular deceptive countermeasures may reduce the effectiveness of particular attacks. The effectiveness of deceptions was measured, and determined by the honeypot\u27s ability to fool the attacking tools used. This was done using brute force network attacks on the wireless honeypot. The attack tools provided quantifiable forensic data from network sniffing, scans, and probes of the wireless honeypot. The aim was to deceive the attack tools into believing a wireless network existed, and contained vulnerabilities that may be further exploited by the naive attacker

    Intended Deception in the Virtual World

    Get PDF
    This study explores how people intend to deceive in the virtual world. Previous research has focused the intent and behavior of online deception, but has rarely looked into specific aspects of online deception including strategy, magnitude, and seriousness. We answered research questions about people’s selection of deception strategies, perceived seriousness of deception, and magnitude of deception in the virtual world via a survey study. Additionally, we examined possible influence of age and gender on deception. The findings are interesting and offer implications for designing deception detection strategies

    A Cybernetic Perspective on Escalation: Lessons from the Volkswagen Emissions Scandal

    Get PDF
    This paper examines how and why initially well-intentioned organizations can find themselves ethically adrift. Drawing on a qualitative analysis of the Volkswagen emissions scandal, we investigate what planted the seed of deception, why the company’s deceptive behavior changed from one stage to the next, and which factors catalyzed these shifts. Furthermore, we scrutinize the management’s response to the disclosure of their misconduct. We employ a cybernetic perspective, envisioning the dynamics of deception as a multi-stage, goal-directed process, in which shifts in behavior are driven by a need to resolve discrepancies between past and anticipated future states. Our analysis reveals two dominant dysfunctional feedback loops underlying the company’s ethical descent. We conclude by discussing the theoretical implications of this case study and derive propositions about the emergence of such dysfunctional feedback loops, as well as strategies that may help to de-escalate such situations by strengthening ethical feedback loops

    Fake-Website Detection Tools: Identifying Elements that Promote Individuals’ Use and Enhance Their Performance

    Get PDF
    By successfully exploiting human vulnerabilities, fake websites have emerged as a major source of online fraud. Fake websites continue to inflict exorbitant monetary losses and also have significant ramifications for online security. We explore the process by which salient performance-related elements could increase the reliance on protective tools and, thus, reduce the success rate of fake websites. We develop the theory of detection tool impact (DTI) for this investigation by borrowing and contextualizing the protection motivation theory. Based on the DTI theory, we conceptualize a model to investigate how salient performance and cost-related elements of detection tools could influence users’ perceptions of the tools and threats, efficacy in dealing with threats, and reliance on such tools. The research method was a controlled lab experiment with a novel and extensive experimental design and protocol in two distinct domains: online pharmacies and banks. We found that the detector accuracy and speed, reflecting in response efficacy as perceived by users, form the pivotal coping mechanism in dealing with security threats and are major conduits for transforming salient performance-related elements into increased reliance on the detector. Furthermore, reported reliance on the detector showed a significant impact on the users’ performance in terms of self-protection. Therefore, users’ perceived response efficacy should be used as a critical metric to evaluate the design, assess the performance, and promote the use of fake-website detectors. We also found that cost of detector error had profound impacts on threat perceptions. We discuss the significant theoretical and empirical implications of the findings

    Opposing Force Operations

    Get PDF
    Opposing Force Operations, United States Army Field Manual FM 7-100.

    Deception Detection: An Exploration of Annotated Text-Based Cues

    Get PDF
    Do embedded textual cues in asynchronous communication affect deceptive message detection? The expanded use of social media and rich media applications in business make this an important issue. Prior research indicates deception commonly occurs in all forms of communication and people have difficulty detecting its use. Asynchronous online communications are no exception and offer users a variety of media choices which may complicate deception detection, particularly if the sender has strategically selected a channel intended to disguise their intentions. The current study investigated whether embedded, non-verbal cues in common media forms found in asynchronous online venues influenced deception detection. Drawing on media synchronicity theory, results suggest embedding non-verbal cues in the form of annotated text can enhance deception detection. Overall, the findings suggest managers must be wary of sender motivations, which can influence message veracity, particularly in low synchronicity environments where media is subject to edits and manipulations

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp
    • …
    corecore