A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Manipulation and the Affective Realm of Social Media
[chapter]
2022
The Philosophy of Online Manipulation
Feelings are qualitative inner triggers that seem to be primarily responsible for making us act in a short-termed manner and can be used manipulatively by triggering impulses. ...
In the context of coercion, an agent usually does not have the opportunity to choose between alternatives -or at least preferable alternatives -and thus to act freely in an extensive sense. 13 Coercion ...
doi:10.4324/9781003205425-20
fatcat:vlxxioglpjflpaov2uttea3n5i
The Strategy and Tactics of Information Warfare
2003
Contemporary Security Policy
This requires either inserting code to delete the information (using a buffer overflow attack, for example), triggering resident code (such as resides in some servers), or acquiring privileges (for example ...
Coercion can use threats of punishment if the adversary does not comply. ...
Finally, Dewar notes that deception techniques can be categorized in terms of the senses. Camouflage and concealment involve visual deception. Sound can also be used to deceive. ...
doi:10.1080/13523260312331271839
fatcat:puhv7yl56nhqxp4kciu2uli2de
The Strategy and Tactics of Information Warfare
[chapter]
2004
National Security in the Information Age
This requires either inserting code to delete the information (using a buffer overflow attack, for example), triggering resident code (such as resides in some servers), or acquiring privileges (for example ...
Coercion can use threats of punishment if the adversary does not comply. ...
Finally, Dewar notes that deception techniques can be categorized in terms of the senses. Camouflage and concealment involve visual deception. Sound can also be used to deceive. ...
doi:10.4324/9780203005859.ch5
fatcat:db6adl4omrhrxlz67n3hwedo5i
Mindless Response or Mindful Interpretation: Examining the Effect of Message Influence on Phishing Susceptibility
2021
Sustainability
Influence-based deceptive messages constantly play a critical role in email phishing attacks. ...
Our empirical evidence shows that both message influence and cognitive processing can lead to people being phished, and a combination of different influences can also trigger cognitive processing. ...
Interactive Influence and Cognitive Processing Although attraction or coercion have the chance to trigger individuals' cognitive processing, a single form of influence sometimes may not be strong enough ...
doi:10.3390/su13041651
fatcat:ywlh236qvndfpomd75end5xibq
The pragmatics of manipulation: Exploiting im/politeness theories
2017
Journal of Pragmatics
It can impose some form of pressure on the target (the act becomes here less covert than in deception as the victim may be aware of the underlying discursive coercion). ...
The deleted passage marked /…/ corresponds to the aside that is transcripted further down.22 See GarciaGómez (2008:75)'s study of its use in violent talk shows. ...
doi:10.1016/j.pragma.2017.10.002
fatcat:r5kqeztuszf4jmmvweaoqpij4m
Cyber Attacks and the Laws of War
2011
Social Science Research Network
Cyber attacks provide a low-cost, remote, instantaneous, and powerful tactic of coercion or destruction, often without triggering accountability. ...
Does a cyber attack reach the threshold of "armed attack" that triggers the right to self-defense under Article 51 of the UN Charter? ...
doi:10.2139/ssrn.1939615
fatcat:sszxgfgpjfeibhuyjnj5sruowe
Civil Penalties under Section 5(m) of the Federal Trade Commission Act
1977
The University of Chicago Law Review
For the first time in its history, the FTC is empowered to enforce the law of deceptive trade practices, embodied in its rules and case determinations, through civil penalty actions against firms that ...
suggested was the deletion of the "triggering" provision in the Administration bill which conditioned consumer actions on the existence of an outstanding Commission order or judicial decree against the ...
Section 5(a) of the FTC Act makes certain anticompetitive practices unlawful even though they may not be unfair or deceptive to consumers, 17 but all unfair or deceptive practices are pdr se unlawful under ...
doi:10.2307/1599211
fatcat:flgqnlkay5fyxlcosxfpv2wv4u
An Analysis of the Interaction Between Intelligent Software Agents and Human Users
2018
Minds and Machines
Our analysis facilitates distinguishing various subcases of interaction (i.e. deception, coercion, trading, and nudging), as well as second-order effects that might include the possibility for adaptive ...
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creat iveco mmons .org/licen ses/by/4.0/), which permits unrestricted use, ...
Coercion and Deception We briefly consider below coercion and deception which are viable and popular methods to control the behaviour of a user. ...
doi:10.1007/s11023-018-9479-0
pmid:30930542
pmcid:PMC6404627
fatcat:742vxbnknrcm3pgxlf4q2p3g5m
Between a rock and two hard places: WhatsApp at the crossroad of competition, data protection and consumer law
2017
Computer Law and Security Review
Finally, and more on the merits of the conduct under investigation, WhatsApp argued that there was none of the Òharassment, coercion, or undue influenceÓ elements required under article 25 of Code for ...
which Facebook recently settled FTC charges of deception 8 . ...
doi:10.1016/j.clsr.2017.05.018
fatcat:qydtzpxjnzhofm4r5suih5usne
PROTECTION AND LAW ENFORCEMENT OF VICTIMS OF ACCOUNTING AND BANKING CRIMES
2017
Saburai International Journal of Social Sciences and Development
It is committed by someone in order to get benefits from other people by giving wrong suggestions or using coercion of truth. ...
Amrizal defines that "Fraud is criminal deception intended to financially benefit the impostor [1]. ...
doi:10.24967/sji.v1i1.36
fatcat:tj3mztgljnhhzbsfklamgugiv4
An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building
[article]
2023
arXiv
pre-print
Deceptive and coercive design practices are increasingly used by companies to extract profit, harvest data, and limit consumer choice. ...
ACKNOWLEDGMENTS This work is funded in part by the National Science Foundation under Grant No. 1909714 and the ANR 22-PECY-0002 IPOP (Interdisciplinary Project on Privacy) project of the Cybersecurity ...
We also considered cases where the deception or manipulation was likely to be hidden to the user (e.g., cases of sneaking, obstruction, or interface interference) as well as cases where deception or coercion ...
arXiv:2309.09640v1
fatcat:xejeoy3hnzephcpul4y6u7hbuy
Freedom, Agency, and Information Technology
[chapter]
2021
Algorithms and Autonomy
At times, such as in the COMPAS, EVAAS, and CrimSafe cases, the practices we scrutinize shade closer to coercion than to deception. ...
Moreover, since entirely avoiding both deception and coercion seems impossible in practice, this broad sort of conception does not justify categorical condemnation of manipulation. ...
doi:10.1017/9781108895057.005
fatcat:gac65exrn5dflpd67xelmo4kda
Social Engineering in a Post-Phishing Era: Ambient Tactical Deception Attacks
[article]
2019
arXiv
pre-print
You have been a victim of an Ambient Tactical Deception (ATD) attack. We developed and tested a proof-of-concept social engineering attack targeting web-based email users. ...
At minimum, this
would assist users in triggering the deception judgment. ...
Of course, victims can be under-trusting and
any such a change might trigger the deception judgment threshold, in which case
the ATD attacker needs to race to change a strategy of politeness before it ...
arXiv:1908.11752v1
fatcat:zitkzjv4xvavzpwnhklzzuahki
Persuasive Technology for Improving Information Security Awareness and Behavior: Literature Review
2016
2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
or coercion. ...
The steps in that method are "Get specific, make it easy and trigger the behavior". ...
doi:10.1109/ict4m.2016.054
fatcat:45cts2qtb5bclly3inc5gqo3be
The FCC's Broadcast News Distortion Rules: Regulation by Drooping Eyelid
2001
Communication Law and Policy
In Mark Lane, the majority dismissed a complaint against a TV station for deleting a talk show guest's anti-military comments, claiming it feared they were defamatory, yet attributing the deletions on ...
The FTC's three-part definition of deceptive advertising involves a) a representation, omission or practice likely to mislead a consumer who, b) is acting reasonably under the circumstances, when c) the ...
doi:10.1207/s15326926clp0603_03
fatcat:x2sgx6s7ubck3eizlybsf7m3am
« Previous
Showing results 1 — 15 out of 1,165 results