Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,165 Hits in 2.9 sec

Manipulation and the Affective Realm of Social Media [chapter]

Alexander Fischer
2022 The Philosophy of Online Manipulation  
Feelings are qualitative inner triggers that seem to be primarily responsible for making us act in a short-termed manner and can be used manipulatively by triggering impulses.  ...  In the context of coercion, an agent usually does not have the opportunity to choose between alternatives -or at least preferable alternatives -and thus to act freely in an extensive sense. 13 Coercion  ... 
doi:10.4324/9781003205425-20 fatcat:vlxxioglpjflpaov2uttea3n5i

The Strategy and Tactics of Information Warfare

Matt Bishop, Emily Goldman
2003 Contemporary Security Policy  
This requires either inserting code to delete the information (using a buffer overflow attack, for example), triggering resident code (such as resides in some servers), or acquiring privileges (for example  ...  Coercion can use threats of punishment if the adversary does not comply.  ...  Finally, Dewar notes that deception techniques can be categorized in terms of the senses. Camouflage and concealment involve visual deception. Sound can also be used to deceive.  ... 
doi:10.1080/13523260312331271839 fatcat:puhv7yl56nhqxp4kciu2uli2de

The Strategy and Tactics of Information Warfare [chapter]

Matt Bishop
2004 National Security in the Information Age  
This requires either inserting code to delete the information (using a buffer overflow attack, for example), triggering resident code (such as resides in some servers), or acquiring privileges (for example  ...  Coercion can use threats of punishment if the adversary does not comply.  ...  Finally, Dewar notes that deception techniques can be categorized in terms of the senses. Camouflage and concealment involve visual deception. Sound can also be used to deceive.  ... 
doi:10.4324/9780203005859.ch5 fatcat:db6adl4omrhrxlz67n3hwedo5i

Mindless Response or Mindful Interpretation: Examining the Effect of Message Influence on Phishing Susceptibility

Frank Kun-Yueh Chou, Abbott Po-Shun Chen, Vincent Cheng-Lung Lo
2021 Sustainability  
Influence-based deceptive messages constantly play a critical role in email phishing attacks.  ...  Our empirical evidence shows that both message influence and cognitive processing can lead to people being phished, and a combination of different influences can also trigger cognitive processing.  ...  Interactive Influence and Cognitive Processing Although attraction or coercion have the chance to trigger individuals' cognitive processing, a single form of influence sometimes may not be strong enough  ... 
doi:10.3390/su13041651 fatcat:ywlh236qvndfpomd75end5xibq

The pragmatics of manipulation: Exploiting im/politeness theories

Sandrine Sorlin
2017 Journal of Pragmatics  
It can impose some form of pressure on the target (the act becomes here less covert than in deception as the victim may be aware of the underlying discursive coercion).  ...  The deleted passage marked /…/ corresponds to the aside that is transcripted further down.22 See GarciaGómez (2008:75)'s study of its use in violent talk shows.  ... 
doi:10.1016/j.pragma.2017.10.002 fatcat:r5kqeztuszf4jmmvweaoqpij4m

Cyber Attacks and the Laws of War

Michael Gervais
2011 Social Science Research Network  
Cyber attacks provide a low-cost, remote, instantaneous, and powerful tactic of coercion or destruction, often without triggering accountability.  ...  Does a cyber attack reach the threshold of "armed attack" that triggers the right to self-defense under Article 51 of the UN Charter?  ... 
doi:10.2139/ssrn.1939615 fatcat:sszxgfgpjfeibhuyjnj5sruowe

Civil Penalties under Section 5(m) of the Federal Trade Commission Act

David O. Bickart
1977 The University of Chicago Law Review  
For the first time in its history, the FTC is empowered to enforce the law of deceptive trade practices, embodied in its rules and case determinations, through civil penalty actions against firms that  ...  suggested was the deletion of the "triggering" provision in the Administration bill which conditioned consumer actions on the existence of an outstanding Commission order or judicial decree against the  ...  Section 5(a) of the FTC Act makes certain anticompetitive practices unlawful even though they may not be unfair or deceptive to consumers, 17 but all unfair or deceptive practices are pdr se unlawful under  ... 
doi:10.2307/1599211 fatcat:flgqnlkay5fyxlcosxfpv2wv4u

An Analysis of the Interaction Between Intelligent Software Agents and Human Users

Christopher Burr, Nello Cristianini, James Ladyman
2018 Minds and Machines  
Our analysis facilitates distinguishing various subcases of interaction (i.e. deception, coercion, trading, and nudging), as well as second-order effects that might include the possibility for adaptive  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creat iveco mmons .org/licen ses/by/4.0/), which permits unrestricted use,  ...  Coercion and Deception We briefly consider below coercion and deception which are viable and popular methods to control the behaviour of a user.  ... 
doi:10.1007/s11023-018-9479-0 pmid:30930542 pmcid:PMC6404627 fatcat:742vxbnknrcm3pgxlf4q2p3g5m

Between a rock and two hard places: WhatsApp at the crossroad of competition, data protection and consumer law

Nicolo Zingales
2017 Computer Law and Security Review  
Finally, and more on the merits of the conduct under investigation, WhatsApp argued that there was none of the Òharassment, coercion, or undue influenceÓ elements required under article 25 of Code for  ...  which Facebook recently settled FTC charges of deception 8 .  ... 
doi:10.1016/j.clsr.2017.05.018 fatcat:qydtzpxjnzhofm4r5suih5usne

PROTECTION AND LAW ENFORCEMENT OF VICTIMS OF ACCOUNTING AND BANKING CRIMES

Herman Fikri
2017 Saburai International Journal of Social Sciences and Development  
It is committed by someone in order to get benefits from other people by giving wrong suggestions or using coercion of truth.  ...  Amrizal defines that "Fraud is criminal deception intended to financially benefit the impostor [1].  ... 
doi:10.24967/sji.v1i1.36 fatcat:tj3mztgljnhhzbsfklamgugiv4

An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building [article]

Colin M. Gray and Cristiana Santos and Nataliia Bielova and Thomas Mildner
2023 arXiv   pre-print
Deceptive and coercive design practices are increasingly used by companies to extract profit, harvest data, and limit consumer choice.  ...  ACKNOWLEDGMENTS This work is funded in part by the National Science Foundation under Grant No. 1909714 and the ANR 22-PECY-0002 IPOP (Interdisciplinary Project on Privacy) project of the Cybersecurity  ...  We also considered cases where the deception or manipulation was likely to be hidden to the user (e.g., cases of sneaking, obstruction, or interface interference) as well as cases where deception or coercion  ... 
arXiv:2309.09640v1 fatcat:xejeoy3hnzephcpul4y6u7hbuy

Freedom, Agency, and Information Technology [chapter]

2021 Algorithms and Autonomy  
At times, such as in the COMPAS, EVAAS, and CrimSafe cases, the practices we scrutinize shade closer to coercion than to deception.  ...  Moreover, since entirely avoiding both deception and coercion seems impossible in practice, this broad sort of conception does not justify categorical condemnation of manipulation.  ... 
doi:10.1017/9781108895057.005 fatcat:gac65exrn5dflpd67xelmo4kda

Social Engineering in a Post-Phishing Era: Ambient Tactical Deception Attacks [article]

Filipo Sharevski, Paige Treebridge, Peter Jachim, Audrey Li, Adam Babin, Jessica Westbrook
2019 arXiv   pre-print
You have been a victim of an Ambient Tactical Deception (ATD) attack. We developed and tested a proof-of-concept social engineering attack targeting web-based email users.  ...  At minimum, this would assist users in triggering the deception judgment.  ...  Of course, victims can be under-trusting and any such a change might trigger the deception judgment threshold, in which case the ATD attacker needs to race to change a strategy of politeness before it  ... 
arXiv:1908.11752v1 fatcat:zitkzjv4xvavzpwnhklzzuahki

Persuasive Technology for Improving Information Security Awareness and Behavior: Literature Review

Mohammed Abdullah Bawazir, Murni Mahmud, Nurul Nuha Abdul Molok, Jamaludin Ibrahim
2016 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M)  
or coercion.  ...  The steps in that method are "Get specific, make it easy and trigger the behavior".  ... 
doi:10.1109/ict4m.2016.054 fatcat:45cts2qtb5bclly3inc5gqo3be

The FCC's Broadcast News Distortion Rules: Regulation by Drooping Eyelid

Chad Raphael
2001 Communication Law and Policy  
In Mark Lane, the majority dismissed a complaint against a TV station for deleting a talk show guest's anti-military comments, claiming it feared they were defamatory, yet attributing the deletions on  ...  The FTC's three-part definition of deceptive advertising involves a) a representation, omission or practice likely to mislead a consumer who, b) is acting reasonably under the circumstances, when c) the  ... 
doi:10.1207/s15326926clp0603_03 fatcat:x2sgx6s7ubck3eizlybsf7m3am
« Previous Showing results 1 — 15 out of 1,165 results