منابع مشابه
What Is Deception? What Is Military Deception?
DECEPTION All warfare is based upon deception. Deception, the employment of trickery or guile, is equal parts art and science. It is typically defined as " causing another to believe what is not true; to mislead or ensnare " (Webster's, 1999). Deception aims to deliberately induce misperception in another. Deception is a deliberate enterprise; it is not the result of chance, nor the by-product ...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملInformation Warfare and Deception
This paper examines the history of the phenomenon of Information Warfare and the increasingly dominant role that deception is taking within its framework. The concept of information warfare began as a technology oriented tactic to gain information dominance by superior command and control. This soon developed into a realization of the power of information as both a ‘weapon’ as well as a ‘target...
متن کاملInformation asymmetry and deception
Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (...
متن کاملDeception Detection: Study of Information Manipulation through Electronic Identity Theft – Email Forgery in the U.s Military Thesis
Computer users have depended on email communication since its advent. This dependency has created an increased level of system trust within email systems. Individuals can verify where an email came from and who sent the email by simply looking at the senders’ email address. The sender’s email address can be hidden from unsuspecting individuals who do not know how to verify an email address and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vojenské rozhledy
سال: 2013
ISSN: 1210-3292
DOI: 10.3849/2336-2995.22.2013.01.160-164