Skip to main content

False Excuses

  • Chapter
  • First Online:
Introduction to Cyberdeception
  • 1437 Accesses

Abstract

As bad children know, excuses are an excellent way to avoid doing something you do not want to do (Snyder et al. 1983). Excuses are also important for bureaucracies (Wilson 2000), and large software systems are like bureaucracies with many of the same problems. Cybersystems under attack are being asked to do things that they should not want to do, so excuses can be an excellent defensive tactic. Cybersystems already use plenty of excuses in the form of error messages during normal operations. (Carofiglio et al. 2001) provides a more general approach to verbal deception planning that includes excuses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Carofiglio V, de Rosis F, Grassano R, Castelfranchi C (2001) An interactive system for generating arguments in deceptive communication. Lecture notes in computer science, Vol. 2175, Proceedings of the 7th congress of the Italian association for artificial intelligence on advances in artificial intelligence, Springer, New York, pp 255–266

    Google Scholar 

  • Castelfranchi C (2000) Artificial liars: why computers will (necessarily) deceive us and each other. Ethics Inform Technol 2(2):113–119

    Article  Google Scholar 

  • Derrick D, Meservy T, Jenkins J, Burgoon J, Nunamaker J (2013) Detecting deceptive chat-based communication using typing behavior and message cues. ACM Trans Manag Inform Syst 4(2):9.1–9.21

    Google Scholar 

  • Dickson D, Ford R, Laval B (2005) The top ten excuses for bad service (and how to avoid needing them). Organ Dyn 34(2):168–184

    Article  Google Scholar 

  • Erbschloe M (2005) Trojans, worms, and spyware: a computer security professional’s guide to malicious code. Elsevier, Amsterdam, Netherlands

    Google Scholar 

  • Foster E (1999) Just when you thought you heard them all: Top 20 software support excuses. InfoWorld 1:89

    Google Scholar 

  • Houston P, Floyd M, Carnicero S (2013) Spy the lie: Former CIA officers teach you how to detect deception. St.Martin’s Griffin, New York

    Google Scholar 

  • Jones J, Trevino P (2007) Automated high-level reasoning for deception detection: two scenarios demonstrated. In: Proceedings of the International Conference on Systems, Man, and Cybernetics. Montreal, Quebec. pp 338–342

    Google Scholar 

  • Krawetz N (2004) Anti-honeypot technology. IEEE Secur Priv 2(1):76–79

    Article  Google Scholar 

  • Lachmann M, Bergstrom C (2004) The disadvantage of combinatorial communication. Proc R Soc Lond B 271:2337–2343

    Article  Google Scholar 

  • Macskassy S, Provost F (2005) Suspicion scoring based on guilt-by-association, collective inference, and focused data access. In: Proceedings of the intelligence analysis conference, McLean, VA, 2-4 May, 2005

    Google Scholar 

  • Nazario J (2004) Defense and detection strategies against internet worms. Artech, Boston, MA

    Google Scholar 

  • Neagoe V, Bishop M (2006) Inconsistency in deception for the defense. In: Proceedings of the new security paradigms workshop, Schloss Dagstuhl, Germany, 18–21 Sept 2006. pp 31–38

    Google Scholar 

  • Rowe N (2007) Finding logically consistent resource-deception plans for defense in cyberspace. In: Proceedings of the 3rd international symposium on security in networks and distributed systems, Niagara Falls, ON, Canada, 21–23 May. pp 563–568

    Google Scholar 

  • Snyder C, Higgins R, Stucky R (1983) Excuses: masquerades in search of grace. Wiley, New York

    Google Scholar 

  • Spalka A (1994) Formal semantics of confidentiality in multilevel logic databases. In: Proceedings of the new security paradigms workshop, Little Neck, RI, 3–5 Aug, 1994. pp 64–73

    Google Scholar 

  • Templeton S, Levitt K (2000) A requires/provides model for computer attacks. In: Proceedings of new security paradigms workshop, Cork, Ireland, 19–21 Sept, 2000. pp 31–38

    Google Scholar 

  • Wilson J (2000) Bureaucracy: what government agencies do and why they do it. Basic Books, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). False Excuses. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics