-
作者:Wolff, Josephine
作者单位:Rochester Institute of Technology
摘要:With computer security spending on the rise, organizations seem to have accepted the notion that buying more-and more expensive-defenses allows them to better protect their computer systems. In the context of complex computer systems, however, defenses can also have the opposite effect, creating new, unforeseen vulnerabilities in the systems they are intended to protect. Advocacy for defense-in-depth and diverse security measures has contributed to this more is better mentality for defending c...
-
作者:Ho, Shuyuan Mary; Hancock, Jeffrey T.; Booth, Cheryl; Liu, Xiuwen
作者单位:State University System of Florida; Florida State University; Stanford University; State University System of Florida; Florida State University; State University System of Florida; Florida State University
摘要:Computer-mediated deception threatens the security of online users' private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can provide crucial cues to detect deception. We designed and conducted an experiment that creates spontaneous deception scenarios in an interactive online game environment. Logistic regression, and certain classification methodologies were applied to analyzing data col...
-
作者:Proudfoot, Jeffrey G.; Jenkins, Jeffrey L.; Burgoon, Judee K.; Nunamaker, Jay F., Jr.
作者单位:Bentley University; Brigham Young University; University of Arizona; University of Arizona; National Science Foundation (NSF); University of Arizona
摘要:Eye-tracking technology has exhibited promise for identifying deception in automated screening systems. Prior deception research using eye trackers has focused on the detection and interpretation of brief oculometric variations in response to stimuli (e.g., specific images or interview questions). However, more research is needed to understand how variations in oculometric behaviors evolve over the course of an interaction with a deception detection system. Using latent growth curve modeling, ...
-
作者:Liang, Nan (Peter); Biros, David P.; Luse, Andy
作者单位:Oklahoma State University System; Oklahoma State University - Stillwater; Oklahoma State University System; Oklahoma State University - Stillwater; Oklahoma State University System; Oklahoma State University - Stillwater
摘要:Malicious insiders continue to pose a great threat to organizations. With their knowledge and access to organizational resources, malicious insiders could launch attacks more easily that result in more damaging impacts compared to outsiders. However, empirical research about malicious insiders is rare due to the unavailability of data. With few exceptions, many studies focus on a small number of cases. In order to identify common characteristics of a large number of malicious insiders, this st...
-
作者:Siering, Michael; Koch, Jascha-Alexander; Deokar, Amit V.
作者单位:Goethe University Frankfurt; University of Massachusetts System; University of Massachusetts Lowell
摘要:Crowdfunding platforms offer founders the possibility to collect funding for project realization. With the advent of these platforms, the risk of fraud has risen. Fraudulent founders provide inaccurate information or pretend interest toward a project. Within this study, we propose deception detection support mechanisms to address this novel type of Internet fraud. We analyze a sample of fraudulent and nonfraudulent projects published at a leading crowdfunding platform. We examine whether the a...
-
作者:Benjamin, Victor; Zhang, Bin; Nunamaker, Jay F., Jr.; Chen, Hsinchun
作者单位:Arizona State University; Arizona State University-Tempe; University of Arizona; University of Arizona; University of Arizona; University of Arizona; University of Arizona
摘要:To further cybersecurity, there is interest in studying online cybercriminal communities to learn more about emerging cyber threats. Literature documents the existence of many online Internet Relay Chat (IRC) cybercriminal communities where cybercriminals congregate and share hacking tools, malware, and more. However, many cybercriminal community participants appear unskilled and have fleeting interests, making it difficult to detect potential long-term or key participants. This is a challenge...
-
作者:Zhang, Dongsong; Zhou, Lina; Kehoe, Juan Luo; Kilic, Isil Yakut
作者单位:University System of Maryland; University of Maryland Baltimore County
摘要:The value and credibility of online consumer reviews are compromised by significantly increasing yet difficult-to-identify fake reviews. Extant models for automated online fake review detection rely heavily on verbal behaviors of reviewers while largely ignoring their nonverbal behaviors. This research identifies a variety of nonverbal behavioral features of online reviewers and examines their relative importance for the detection of fake reviews in comparison to that of verbal behavioral feat...
-
作者:Ludwig, Stephan; Van Laer, Tom; De Ruyter, Ko; Friedman, Mike
作者单位:City St Georges, University of London; Universite Catholique Louvain
摘要:Safeguarding organizations against opportunism and severe deception in computer-mediated communication (CMC) presents a major challenge to chief information officers and information technology managers. New insights into linguistic cues of deception derive from the speech acts innate to CMC. Applying automated text analysis to archival e-mail exchanges in a CMC system as part of a reward program, we assess the ability of word use (micro level), message development (macro level), and intertextu...
-
作者:Weber, Thomas A.
作者单位:Swiss Federal Institutes of Technology Domain; Ecole Polytechnique Federale de Lausanne; Swiss Federal Institutes of Technology Domain; Ecole Polytechnique Federale de Lausanne; Universite Paris Saclay; RWTH Aachen University
摘要:The emergence of a collaborative economy has been driven by advances in information technology that allow consumers to borrow and rent goods among peers on a secondary sharing market. In a dynamic setting, consumers make intertemporal decisions about purchases and their participation in the sharing market. This study introduces an overlapping-generations model to analyze product pricing and consumer choice with and without a sharing market. The model quantifies the impacts of a peer-to-peer ec...
-
作者:Nunamaker, Jay F., Jr.; Burgoon, Judee K.; Giboney, Justin Scott
作者单位:University of Arizona; University of Arizona; University of Arizona; National Science Foundation (NSF); State University of New York (SUNY) System; University at Albany, SUNY