Abstract
Deliberate deception of certain kinds is acceptable to most societies. These examples will not only suggest tactics for cyberspace, but some of the problems and pitfalls deceivers can encounter. We discuss here three prominent areas of acceptable deception by professionals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akerlof A, Shiller R (2015) Phishing for phools: the economics of manipulation and deceit. Princeton University Press, Princeton, NJ
Andress J, Winterfeld S (2013) Cyber warfare, second edition: techniques, tactics, and tools for security. Syngress, Waltham, MA
Breuer W (1993) Hoodwinking Hitler: the Normandy deception. Praeger, London
Carr J (2010) Inside cyber warfare: mapping the cyber underworld, 2nd edn. O’Reilly Media, Sebastopol, CA
Dunnigan J, Nofi A (2001) Victory and deceit, second edition: deception and trickery in war. Writers Club, San Jose, CA
Fowler C, Nesbit R (1995) Tactical deception in air-land warfare. Journal of Electronic Defense 18 (6): 37–44 and 76–79
Heckman K, Stech F, Thomas R, Schmoker B, Tsow A (2015) Cyber denial, deception, and counter deception: a framework for supporting active cyber defense. Springer, New York
Holt T (2010) Deceivers: allied military deception in the Second World War. Skyhorse, New York
Latimer J (2003) Deception in war; the art of the bluff, the value of deceit, and the most thrilling episodes of cunning in military history, from the Trojan Horse to the Gulf War. The Overlook, New York
McCarthy J (1960) Basic marketing: a managerial approach. Richard Irwin, Homewood, IL
Mintz A (ed) (2002) Web of deception: misinformation on the Internet. CyberAge, New York
Nelms H (1969) Magic and showmanship: a handbook for conjurers. Dover, Mineola, NY
Penny L (2005) Your call is important to us. Crown, New York
Powell J (2014) Mind control mastery: successful guide to human psychology and manipulation, persuasion, and deception. CreateSpace, North Charleston, SC
Rothstein H, Whaley B (eds) (2013) The art and science of military deception. Artech House, New York
Schneider A (2011) The theory and practice of magic deception. CreateSpace, North Charleston, SC, US
Seife C (2015) Virtual unreality: the new era of digital deception. Penguin, New York
Shulsky A (1993) Silent warfare: understanding the world of intelligence, 2nd edn. Brassey’s, Washington, DC
Spammer X (2004) Inside the spam cartel. Syngress, Rockland, MA, US
Sundar S (ed) (2015) The handbook of the psychology of communication technology. Wiley-Blackwell, Chichester, UK
Tirenin W, Faatz D (1999) A concept for strategic cyber defense. In: Proceedings of the Conference on Military Communications, Atlantic City, NJ, US, 31 Oct–3 Nov, 1999. pp. 1: 458–463
Whaley B (2007) Stratagem: deception and surprise in war. Artech House, Boston, MA
Whaley B, Busby J (2002) Detecting deception: practice, practitioners, and theory. In: Godson R, Wirtz J (eds) Strategic denial and deception. Transaction, New Brunswick, NJ, pp 181–219
Xiao B, Benbasat I (2007) Product-related deception in e-commerce: a theoretical perspective. MIS Q 35(1):169–195
Yoshihara T (2005) Chinese information warfare: a phantom menace or emerging threat? www.strategicstudiesinstitute.army.mil/
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Professional Deception. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)