Deception Tactics and Counterfeit Deception in Online Environments

نویسندگان

  • Tamilla Mavlanova
  • Raquel Benbunan-Fich
  • Nanda Kumar
چکیده

With widespread globalization happening at an alarming speed, the manufacturing and copying of goods has become a matter of routine for counterfeiters. The Internet has provided a new advantage for counterfeiters the opportunity to sell goods without prior consumer inspection. Leveraging this opportunity, deceitful purveyors of imitation goods engage in unethical practices such as selling counterfeit goods presenting them as genuine. We propose that there are two categories of counterfeit deception mechanisms online: product level information and seller level information. In order to successfully deceive prospective buyers, sellers conceal the signals that identify the offering as a fake, and present themselves as legitimate business entities. In this research-in-progress paper, we outline several propositions to guide future research in this area. We are currently conducting an empirical study to test these propositions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space

The concepts of deception, counter-deception, and deception detection in the cyber-space domain have been the subject of little systematic analysis. Our objective was to conduct scientometric analyses of these concepts in the cyber-space domain. We observed the following: Although various deceptive tactics are addressed in the cyber-security literature, it appears they are characterized more fr...

متن کامل

Deception in defense of computer systems from cyber-attack

While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...

متن کامل

Contextual Binding and Deception Detection

Deception is frequently used in cyber attacks. Detecting deception is always a challenge, as witnessed in attacks in social media and other online environments. Contexts can help to identify deception. Unfortunately, there is not much literature available in this aspect. This paper explores the unique properties of contextual binding. It examines roles that it plays. It also proposes a novel ap...

متن کامل

Honesty as the Best Policy? An Examination of Online Chatters’ Interpersonal Deception in Taiwan

With the advent of the Internet, the impact of online deception on interpersonal communication becomes intriguing. This study focuses on twenty online chatters in Taiwan with at least 2-year online chatting experience as research targets and employed qualitative interviews to solicit information about online interpersonal deception. It is found that (1) most interviewees reported that they had ...

متن کامل

Neil C . Rowe , and Albert

Deception can be a useful tool in defending computer systems against cyberattacks because it is unexpected and offers much variety of tactics. It is particularly useful for sites of critical infrastructure for which multiple defenses are desirable. We have developed an experimental approach to finding deceptive tactics for system defense by trying a variety of tactics against live Internet traf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008