Preventing Online Social Deception using Deception Matrix
نویسندگان
چکیده
منابع مشابه
Deception Tactics and Counterfeit Deception in Online Environments
With widespread globalization happening at an alarming speed, the manufacturing and copying of goods has become a matter of routine for counterfeiters. The Internet has provided a new advantage for counterfeiters the opportunity to sell goods without prior consumer inspection. Leveraging this opportunity, deceitful purveyors of imitation goods engage in unethical practices such as selling count...
متن کاملDeception as a Social Strategy
Deception can be advantageous to a deceiver when the truth conflicts with his or her goals be they personal or social, selfless or selfish. Thus it is that people regularly use deception to avoid conflict with others, to avoid punishment or embarrassment, to fit into a group, to harm, protect or help others, and for material or non-material benefit to themselves. While there are many ways in wh...
متن کاملOnline Auction Deception Using a Shill Bidding Agent
Shill bidding is the act of using bids in an online auction to drive up the final price for the seller, thereby defrauding legitimate bidders. While ‘shilling’ is recognized as a problem and shill bidding is strictly forbidden in online auctions, presently there is little to no established means of defense against shills. This paper presents a software bidding agent that follows a shill bidding...
متن کاملEye Gazing Behaviors in Online Deception
Psychophysiological behaviors of deceivers have been used as an effective leakage channel of face-toface deception. Among various psychophysiological behaviors, eye movement has been identified as one of the most reliable sources of deception behavior in face-to-face communication. However, empirical studies of eye movement behavior in online deception remain scarce. In this research, we invest...
متن کاملOnline Deception Attack Against Remote State Estimation
Security issue has become a new hotspot in cyber-physical systems (CPS) research field in recent years due to the vulnerability of CPS to security threats. This paper focuses on stealthy deception attack in remote state estimation, which is one typical attack in CPS. From the standpoint of deception attacker, we investigates how to design proper deception attack strategy to degrade the state es...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IAES International Journal of Artificial Intelligence (IJ-AI)
سال: 2016
ISSN: 2252-8938,2089-4872
DOI: 10.11591/ijai.v5.i1.pp35-40