The use of deception in systems
نویسندگان
چکیده
Deception is an important element in all natural and organisational systems. This paper outlines the fundamental principles of deception, and applies them to general information systems. It examines the two fundamental methods of deception: data and context manipulation. It also briefly examines the motives for deception.
منابع مشابه
Invoking the Feigner in Us Methodological Approaches for Investigating Deception in fMRI Setting
The attempt to find out if someone is telling a lie has been of human's interest. One of the techniques which is believed to be efficient in future is fMRI (functional Magnetic Resonance Imaging), using which the changes of regional blood flow during the designed paradigm can be recorded. This method has been considered as a better technique for studying lie and deception. For investigating th...
متن کاملThe Degree of Faithfulness to the Norms of Islamic Ethics A Case Study on the Sellers of Home Supplies in Tehran
In this study, the most considerable moral characters were decided on the basis of Islamic sources at first and then, performing a field test based upon buyers` opinions, the degree of the home supplies sellers` faithfulness to them has been decided. In first stage 21 cases of moral characters were decided and then, they were classified in six main characters including lack of deception, honest...
متن کاملRobustness of Multiple Indicators in Automated Screening Systems for Deception Detection
This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and track multiple indicators of deception si...
متن کاملIndividual Determinants of Media Choice for Deception
Recent research has found that deceivers are extremely difficult to detect in computer-mediated work settings. However, it is unclear which individuals are likely to use computer systems for deception in these settings. This study looked at how 172 upper-level business students’ political skill, social skill, and tendency to use impression management was related to their deception media choice ...
متن کاملUsing Bayesian Attack Detection Models to Drive Cyber Deception
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason ...
متن کامل