Abstract
As bad children know, excuses are an excellent way to avoid doing something you do not want to do (Snyder et al. 1983). Excuses are also important for bureaucracies (Wilson 2000), and large software systems are like bureaucracies with many of the same problems. Cybersystems under attack are being asked to do things that they should not want to do, so excuses can be an excellent defensive tactic. Cybersystems already use plenty of excuses in the form of error messages during normal operations. (Carofiglio et al. 2001) provides a more general approach to verbal deception planning that includes excuses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Carofiglio V, de Rosis F, Grassano R, Castelfranchi C (2001) An interactive system for generating arguments in deceptive communication. Lecture notes in computer science, Vol. 2175, Proceedings of the 7th congress of the Italian association for artificial intelligence on advances in artificial intelligence, Springer, New York, pp 255–266
Castelfranchi C (2000) Artificial liars: why computers will (necessarily) deceive us and each other. Ethics Inform Technol 2(2):113–119
Derrick D, Meservy T, Jenkins J, Burgoon J, Nunamaker J (2013) Detecting deceptive chat-based communication using typing behavior and message cues. ACM Trans Manag Inform Syst 4(2):9.1–9.21
Dickson D, Ford R, Laval B (2005) The top ten excuses for bad service (and how to avoid needing them). Organ Dyn 34(2):168–184
Erbschloe M (2005) Trojans, worms, and spyware: a computer security professional’s guide to malicious code. Elsevier, Amsterdam, Netherlands
Foster E (1999) Just when you thought you heard them all: Top 20 software support excuses. InfoWorld 1:89
Houston P, Floyd M, Carnicero S (2013) Spy the lie: Former CIA officers teach you how to detect deception. St.Martin’s Griffin, New York
Jones J, Trevino P (2007) Automated high-level reasoning for deception detection: two scenarios demonstrated. In: Proceedings of the International Conference on Systems, Man, and Cybernetics. Montreal, Quebec. pp 338–342
Krawetz N (2004) Anti-honeypot technology. IEEE Secur Priv 2(1):76–79
Lachmann M, Bergstrom C (2004) The disadvantage of combinatorial communication. Proc R Soc Lond B 271:2337–2343
Macskassy S, Provost F (2005) Suspicion scoring based on guilt-by-association, collective inference, and focused data access. In: Proceedings of the intelligence analysis conference, McLean, VA, 2-4 May, 2005
Nazario J (2004) Defense and detection strategies against internet worms. Artech, Boston, MA
Neagoe V, Bishop M (2006) Inconsistency in deception for the defense. In: Proceedings of the new security paradigms workshop, Schloss Dagstuhl, Germany, 18–21 Sept 2006. pp 31–38
Rowe N (2007) Finding logically consistent resource-deception plans for defense in cyberspace. In: Proceedings of the 3rd international symposium on security in networks and distributed systems, Niagara Falls, ON, Canada, 21–23 May. pp 563–568
Snyder C, Higgins R, Stucky R (1983) Excuses: masquerades in search of grace. Wiley, New York
Spalka A (1994) Formal semantics of confidentiality in multilevel logic databases. In: Proceedings of the new security paradigms workshop, Little Neck, RI, 3–5 Aug, 1994. pp 64–73
Templeton S, Levitt K (2000) A requires/provides model for computer attacks. In: Proceedings of new security paradigms workshop, Cork, Ireland, 19–21 Sept, 2000. pp 31–38
Wilson J (2000) Bureaucracy: what government agencies do and why they do it. Basic Books, New York
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). False Excuses. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)