Skip to main content

Professional Deception

  • Chapter
  • First Online:
Introduction to Cyberdeception
  • 1477 Accesses

Abstract

Deliberate deception of certain kinds is acceptable to most societies. These examples will not only suggest tactics for cyberspace, but some of the problems and pitfalls deceivers can encounter. We discuss here three prominent areas of acceptable deception by professionals.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Akerlof A, Shiller R (2015) Phishing for phools: the economics of manipulation and deceit. Princeton University Press, Princeton, NJ

    Book  Google Scholar 

  • Andress J, Winterfeld S (2013) Cyber warfare, second edition: techniques, tactics, and tools for security. Syngress, Waltham, MA

    Google Scholar 

  • Breuer W (1993) Hoodwinking Hitler: the Normandy deception. Praeger, London

    Google Scholar 

  • Carr J (2010) Inside cyber warfare: mapping the cyber underworld, 2nd edn. O’Reilly Media, Sebastopol, CA

    Google Scholar 

  • Dunnigan J, Nofi A (2001) Victory and deceit, second edition: deception and trickery in war. Writers Club, San Jose, CA

    Google Scholar 

  • Fowler C, Nesbit R (1995) Tactical deception in air-land warfare. Journal of Electronic Defense 18 (6): 37–44 and 76–79

    Google Scholar 

  • Heckman K, Stech F, Thomas R, Schmoker B, Tsow A (2015) Cyber denial, deception, and counter deception: a framework for supporting active cyber defense. Springer, New York

    Book  Google Scholar 

  • Holt T (2010) Deceivers: allied military deception in the Second World War. Skyhorse, New York

    Google Scholar 

  • Latimer J (2003) Deception in war; the art of the bluff, the value of deceit, and the most thrilling episodes of cunning in military history, from the Trojan Horse to the Gulf War. The Overlook, New York

    Google Scholar 

  • McCarthy J (1960) Basic marketing: a managerial approach. Richard Irwin, Homewood, IL

    Google Scholar 

  • Mintz A (ed) (2002) Web of deception: misinformation on the Internet. CyberAge, New York

    Google Scholar 

  • Nelms H (1969) Magic and showmanship: a handbook for conjurers. Dover, Mineola, NY

    Google Scholar 

  • Penny L (2005) Your call is important to us. Crown, New York

    Google Scholar 

  • Powell J (2014) Mind control mastery: successful guide to human psychology and manipulation, persuasion, and deception. CreateSpace, North Charleston, SC

    Google Scholar 

  • Rothstein H, Whaley B (eds) (2013) The art and science of military deception. Artech House, New York

    Google Scholar 

  • Schneider A (2011) The theory and practice of magic deception. CreateSpace, North Charleston, SC, US

    Google Scholar 

  • Seife C (2015) Virtual unreality: the new era of digital deception. Penguin, New York

    Google Scholar 

  • Shulsky A (1993) Silent warfare: understanding the world of intelligence, 2nd edn. Brassey’s, Washington, DC

    Google Scholar 

  • Spammer X (2004) Inside the spam cartel. Syngress, Rockland, MA, US

    Google Scholar 

  • Sundar S (ed) (2015) The handbook of the psychology of communication technology. Wiley-Blackwell, Chichester, UK

    Google Scholar 

  • Tirenin W, Faatz D (1999) A concept for strategic cyber defense. In: Proceedings of the Conference on Military Communications, Atlantic City, NJ, US, 31 Oct–3 Nov, 1999. pp. 1: 458–463

    Google Scholar 

  • Whaley B (2007) Stratagem: deception and surprise in war. Artech House, Boston, MA

    Google Scholar 

  • Whaley B, Busby J (2002) Detecting deception: practice, practitioners, and theory. In: Godson R, Wirtz J (eds) Strategic denial and deception. Transaction, New Brunswick, NJ, pp 181–219

    Google Scholar 

  • Xiao B, Benbasat I (2007) Product-related deception in e-commerce: a theoretical perspective. MIS Q 35(1):169–195

    Google Scholar 

  • Yoshihara T (2005) Chinese information warfare: a phantom menace or emerging threat? www.strategicstudiesinstitute.army.mil/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). Professional Deception. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics