TY - JOUR
T1 - The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage
AU - Tsikerdekis, Michail
AU - Zeadally, Sherali
PY - 2014/9
Y1 - 2014/9
N2 - Deception is concerned as a deliberate act intended to mislead others, while targets are not aware or do not expect such acts might be taking place and where the deceiver aims to transfer a false belief to the deceived. Social media provide new environments and technologies for potential deceivers, involving content, sender, and communication channel or all three together. In most social media platforms, communication is generally text-based and asynchronous, giving deceivers an advantage for altering content. The underlying software design of social media can also affect the degree of suspicion; the level of perceived security by potential victims increases the likelihood of success for would-be deceivers. The social media industry must design applications with rules and norms lacking in traditional physical space. Various hybrid deception techniques that manipulate a sender's information have been reported in the literature, and are highly effective in social media that highlight user identity and provide one-to-one or one-to-many communications.
AB - Deception is concerned as a deliberate act intended to mislead others, while targets are not aware or do not expect such acts might be taking place and where the deceiver aims to transfer a false belief to the deceived. Social media provide new environments and technologies for potential deceivers, involving content, sender, and communication channel or all three together. In most social media platforms, communication is generally text-based and asynchronous, giving deceivers an advantage for altering content. The underlying software design of social media can also affect the degree of suspicion; the level of perceived security by potential victims increases the likelihood of success for would-be deceivers. The social media industry must design applications with rules and norms lacking in traditional physical space. Various hybrid deception techniques that manipulate a sender's information have been reported in the literature, and are highly effective in social media that highlight user identity and provide one-to-one or one-to-many communications.
UR - http://www.scopus.com/inward/record.url?scp=84906706163&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906706163&partnerID=8YFLogxK
U2 - 10.1145/2629612
DO - 10.1145/2629612
M3 - Article
AN - SCOPUS:84906706163
SN - 0001-0782
VL - 57
SP - 72
EP - 80
JO - Communications of the ACM
JF - Communications of the ACM
IS - 9
ER -