The use of deception in systems

نویسندگان

  • William Hutchinson
  • Matthew J. Warren
چکیده

Deception is an important element in all natural and organisational systems. This paper outlines the fundamental principles of deception, and applies them to general information systems. It examines the two fundamental methods of deception: data and context manipulation. It also briefly examines the motives for deception.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Invoking the Feigner in Us Methodological Approaches for Investigating Deception in fMRI Setting

 The attempt to find out if someone is telling a lie has been of human's interest. One of the techniques which is believed to be efficient in future is fMRI (functional Magnetic Resonance Imaging), using which the changes of regional blood flow during the designed paradigm can be recorded. This method has been considered as a better technique for studying lie and deception. For investigating th...

متن کامل

The Degree of Faithfulness to the Norms of Islamic Ethics A Case Study on the Sellers of Home Supplies in Tehran

In this study, the most considerable moral characters were decided on the basis of Islamic sources at first and then, performing a field test based upon buyers` opinions, the degree of the home supplies sellers` faithfulness to them has been decided. In first stage 21 cases of moral characters were decided and then, they were classified in six main characters including lack of deception, honest...

متن کامل

Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection

This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and track multiple indicators of deception si...

متن کامل

Individual Determinants of Media Choice for Deception

Recent research has found that deceivers are extremely difficult to detect in computer-mediated work settings. However, it is unclear which individuals are likely to use computer systems for deception in these settings. This study looked at how 172 upper-level business students’ political skill, social skill, and tendency to use impression management was related to their deception media choice ...

متن کامل

Using Bayesian Attack Detection Models to Drive Cyber Deception

We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000