Investigating Deception in Cyberspace
نویسندگان
چکیده
The use of anthropomorphic avatars provides Internet users the opportunity and freedom to present their desired identity. As cyberspace becomes a heaven for deceptive behavior, human-computer interaction research will need to be carried out to study and understand these deceptive behaviors. The objective of this research is to investigate the behavior of deceivers and truthtellers in the cyberspace environment and to examine how their intention to deceive may influence the choice of their avatars. The effect of using avatars to support communication will also be studied. This research provides insights on communication and trust issues in avatar environments.
منابع مشابه
Using Deception to Shield Cyberspace Sensors
The U.S. President’s Comprehensive National Cybersecurity Initiative calls for the deployment of sensors to help protect federal enterprise networks. Because of the reported cyber intrusions into America’s electric power grid and other utilities, there is the possibility that sensors could also be positioned in key privately-owned infrastructure assets and the associated cyberspace. Sensors pro...
متن کاملDeception in defense of computer systems from cyber-attack
While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...
متن کاملCan Online Behavior Unveil Deceivers?
Deception has been extensively studied in many disciplines in social science. With the increasing use of instant messaging (IM) in both informal communication and performing tasks in work place, deception in IM is emerging as an important issue. In this study, we aimed to explore the online behavior of deception in a group IM setting. The empirical results from triadic groups showed that two ty...
متن کاملDeception by Design: Evidence-Based Signaling Games for Network Defense
Deception plays a critical role in the financial industry, online markets, national defense, and countless other areas. Understanding and harnessing deception especially in cyberspace is both crucial and difficult. Recent work in this area has used game theory to study the roles of incentives and rational behavior. Building upon this work, we employ a game-theoretic model for the purpose of mec...
متن کامل