Abstract
It's a war out there. Security of our computer systems and networks (“cybersystems”) is under serious attack these days from a variety of malicious people: cybercriminals, spies (both government and industrial), disgruntled insiders within organizations, amateur “hackers” (Poulsen 2012), and terrorists (Colarik 2006). They exploit flaws in software to misuse it for their own ends of making money, advancing their agendas, and enjoying power over others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bailey F (1988) Humbuggery and manipulation: the art of leadership. Cornell University Press, Ithaca, NY
Bell J, Whaley B (1991) Cheating. Transaction, New York
Berghel H (2006) Phishing mongers and posers. Commun ACM 49(4):21–25
Bodmer S, Kilger A, Carpenter G, Jones J (2012) Reverse deception: organized cyber threat counter-exploitation. McGraw-Hill Education, New York
Bok S (1978) Lying: moral choice in public and private life. Pantheon, New York
Carson T (2010) Lying and deception: theory and practice. Oxford University Press, Oxford, UK
Castelfranchi C (2000) Artificial liars: why computers will (necessarily) deceive us and each other. Ethics Inf Technol 2(2):113–119
Chapple M, Ballad B, Ballad T, Banks E (2013) Access control, authentication, and public key infrastructure, 2nd edn. Jones and Bartlett, New York
Colarik A (2006) Cyber terrorism: political and economic implications. IGI Global, Hershey, PA
Elisan C (2012) Malware, rootkits, and botnets: a beginner’s guide. McGraw-Hill Education, New York
Granhag P, Vrij A, Verschuere B (eds) (2015) Detecting deception: current challenges and cognitive approaches. Wiley-Blackwell, Chichester, UK
Hoglund G, McGraw G (2007) Exploiting online games: cheating massively distributed systems. Addison-Wesley, Upper Saddle River, NJ
Lucasik S, Goodman S, Longhurst D (2003) National strategies for protection of critical infrastructures from cyber-attack. London, Oxford
Poulsen K (2012) Kingpin: how one hacker took over the billion-dollar cybercrime underground. Broadway, New York
Quinn M (2006) Ethics for the information age. Pearson Addison-Wesley, Boston, MA
Rothstein H, Whaley B (eds) (2013) The art and science of military deception. Artech House, New York
Smith D (2007) Why we lie: the evolutionary roots of deception and the unconscious mind. St. Martin’s Griffin, New York
Trost R (2009) Practical intrusion analysis: prevention and detection for the twenty-first century. Addison-Wesley, Upper Saddle River, NJ
Vidalis S, Kazmi S (2007) Security through deception. Inf Syst Secur 16:34–41
Weidman G (2014) Penetration testing: a hands-on introduction to hacking. No Starch, New York
Wyler N (ed) (2005) Aggressive network self-defense. Syngress, Rockland, MA
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Introduction. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)