27,461 research outputs found

    Social Media’s impact on Intellectual Property Rights

    Get PDF
    This is a draft chapter. The final version is available in Handbook of Research on Counterfeiting and Illicit Trade, edited by Peggy E. Chaudhry, published in 2017 by Edward Elgar Publishing Ltd, https://doi.org/10.4337/9781785366451. This material is for private use only, and cannot be used for any other purpose without further permission of the publisher.Peer reviewe

    Costly hide and seek pays: Unexpected consequences of deceit in a social dilemma

    Get PDF
    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatial patterns that give rise to fascinating phase transitions, which in turn reveal the hidden complexity behind the evolution of deception.Comment: 16 pages, 8 figures; accepted for publication in New Journal of Physic

    The Use of Marketing Knowledge in Formulating and Enforcing Consumer Protection Policy

    Get PDF
    The purpose of this first chapter of the handbook is to discuss how the findings and approaches offered by the marketing discipline are used in consumer protection policy

    Online Deception Detection Refueled by Real World Data Collection

    Full text link
    The lack of large realistic datasets presents a bottleneck in online deception detection studies. In this paper, we apply a data collection method based on social network analysis to quickly identify high-quality deceptive and truthful online reviews from Amazon. The dataset contains more than 10,000 deceptive reviews and is diverse in product domains and reviewers. Using this dataset, we explore effective general features for online deception detection that perform well across domains. We demonstrate that with generalized features - advertising speak and writing complexity scores - deception detection performance can be further improved by adding additional deceptive reviews from assorted domains in training. Finally, reviewer level evaluation gives an interesting insight into different deceptive reviewers' writing styles.Comment: 10 pages, Accepted to Recent Advances in Natural Language Processing (RANLP) 201

    A New Role for Human Resource Managers: Social Engineering Defense

    Get PDF
    [Excerpt] The general risk of social engineering attacks to organizations has increased with the rise of digital computing and communications, while for an attacker the risk has decreased. In order to counter the increased risk, organizations should recognize that human resources (HR) professionals have just as much responsibility and capability in preventing this risk as information technology (IT) professionals. Part I of this paper begins by defining social engineering in context and with a brief history pre-digital age attacks. It concludes by showing the intersection of HR and IT through examples of operational attack vectors. In part II, the discussion moves to a series of measures that can be taken to help prevent social engineering attacks

    An Army of Me: Sockpuppets in Online Discussion Communities

    Full text link
    In online discussion communities, users can interact and share information and opinions on a wide variety of topics. However, some users may create multiple identities, or sockpuppets, and engage in undesired behavior by deceiving others or manipulating discussions. In this work, we study sockpuppetry across nine discussion communities, and show that sockpuppets differ from ordinary users in terms of their posting behavior, linguistic traits, as well as social network structure. Sockpuppets tend to start fewer discussions, write shorter posts, use more personal pronouns such as "I", and have more clustered ego-networks. Further, pairs of sockpuppets controlled by the same individual are more likely to interact on the same discussion at the same time than pairs of ordinary users. Our analysis suggests a taxonomy of deceptive behavior in discussion communities. Pairs of sockpuppets can vary in their deceptiveness, i.e., whether they pretend to be different users, or their supportiveness, i.e., if they support arguments of other sockpuppets controlled by the same user. We apply these findings to a series of prediction tasks, notably, to identify whether a pair of accounts belongs to the same underlying user or not. Altogether, this work presents a data-driven view of deception in online discussion communities and paves the way towards the automatic detection of sockpuppets.Comment: 26th International World Wide Web conference 2017 (WWW 2017
    • …
    corecore