172 resultados para deception
Resumo:
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.
Resumo:
We investigate how email users' characteristics influence their response to phishing emails. A user generally goes through three stages of behaviour upon receiving a phishing email: suspicion of the legitimacy of the email, confirmation of its legitimacy and response by either performing the action requested in the phishing email or not. Using a mixed method approach combining experiments, surveys and semi-structured interviews, we found that a user's behaviour at each stage varies with their personal characteristics such as personality traits and ability to perceive information in an email beyond its content. We found, for example, that users who are submissive, extraverted or open tend to be less suspicious of phishing emails while users who can identify cues such as inconsistent IP address, can avoid falling victim to phishing emails. Our findings enable us to draw practical implications for educating and potentially reducing the incidence of phishing emails victimisation.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
Social networking sites have become increasingly popular destinations for people wishing to chat, play games, make new friends or simply stay in touch. Furthermore, many organizations have been quick to grasp the potential they offer for marketing, recruitment and economic activities. Nevertheless, counterclaims depict such spaces as arenas where deception, social grooming and the posting of defamatory content flourish. Much research in this area has focused on the ends to which people deploy the technology, and the consequences arising, with a view to making policy recommendations and ethical interventions. In this paper, we argue that tracing where morality lies is more complex than these efforts suggest. Using the case of a popular social networking site, and concepts about the morality of technology, we disclose the ethics of Facebook as diffuse and multiple. In our conclusions we provide some reflections on the possibilities for action in light of this disclosure.
Resumo:
Staged crime scenes involve an offender deliberately altering evidence to simulate events to mislead investigators. Despite likely occurring more often than reported in the literature due to success in offender deception, the exact frequency of staged crime scenes is unknown. In an attempt to bridge this gap, a legal database was searched for detected staged scenes. A total of 115 cases were examined, and this study reports on 16 staged suicides that were examined through descriptive analysis. Findings indicate the frequent involvement of firearms, hanging, or asphyxia; and that offenders are usually known to victims, although not necessarily intimately.
Resumo:
Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment.
Resumo:
Past research has suggested that social networking sites are the most common source for social engineering-based attacks. Persuasion research shows that people are more likely to obey and accept a message when the source’s presentation appears to be credible. However, many factors can impact the perceived credibility of a source, depending on its type and the characteristics of the environment. Our previous research showed that there are four dimensions of source credibility in terms of social engineering on Facebook: perceived sincerity, perceived competence, perceived attraction, and perceived worthiness. Because the dimensionalities of source credibility as well as their measurement scales can fluctuate from one type of source to another and from one type of context to another, our aim in this study includes validating the existence of those four dimensions toward the credibility of social engineering attackers on Facebook and developing a valid measurement scale for every dimension of them.
Resumo:
Data on catch sizes, catch rates, length-frequency and age composition from the Australian east coast tailor fishery are analysed by three different population dynamic models: a surplus production model, an age-structured model, and a model in which the population is structured by both age and length. The population is found to be very heavily exploited, with its ability to reproduce dependent on the fishery’s incomplete selectivity of one-year-old fish. Estimates of recent harvest rates (proportion of fish available to the fishery that are actually caught in a single year) are over 80%. It is estimated that only 30–50% of one-year-old fish are available to the fishery. Results from the age-length-structured model indicate that both exploitable biomass (total mass of fish selected by the fishery) and egg production have fallen to about half the levels that prevailed in the 1970s, and about 40% of virgin levels. Two-year-old fish appear to have become smaller over the history of the fishery. This is assumed to be due to increased fishing pressure combined with non-selectivity of small one-year-old fish, whereby the one-year-old fish that survive fishing are small and grow into small two-year-old fish the following year. An alternative hypothesis is that the stock has undergone a genetic change towards smaller fish; the true explanation is unknown. The instantaneous natural mortality rate of tailor is hypothesised to be higher than previously thought, with values between 0.8 and 1.3 yr–1 consistent with the models. These values apply only to tailor up to about three years of age, and it is possible that a lower value applies to fish older than three. The analysis finds no evidence that fishing pressure has yet affected recruitment. If a recruitment downturn were to occur, however, under current management and fishing pressure there is a strong chance that the fishery would need a complete closure for several years to recover, and even then recovery would be uncertain. Therefore it is highly desirable to better protect the spawning stock. The major recommendations are • An increase in the minimum size limit from 30cm to 40cm in order to allow most one-year-old fish to spawn, and • An experiment on discard mortality to gauge the proportion of fish between 30cm and 40cm that are likely to survive being caught and released by recreational line fishers (the dominant component of the fishery, currently harvesting roughly 1000t p.a. versus about 200t p.a. from the commercial fishery).
Resumo:
In my master thesis I analyse Byzantine warfare in the late period of the empire. I use military operations between Byzantines and crusader Principality of Achaia (1259–83) as a case study. Byzantine strategy was based (in “oriental manner”) on using ambushes, diplomacy, surprise attacks, deception etc. Open field battles that were risky in comparison with their benefits were usually avoided, but the Byzantines were sometimes forced to seek open encounter because their limited ability to keep strong armies in field for long periods of time. Foreign mercenaries had important place in Byzantine armies and they could simply change sides if their paymasters ran out of resources. The use of mercenaries with short contracts made it possible that the composition of an army was flexible but on the other hand heterogeneous – in result Byzantine armies were sometimes ineffective and prone to confusion. In open field battles Byzantines used formation that was made out from several lines placed one after another. This formation was especially suitable for cavalry battles. Byzantines might have also used other kinds of formations. The Byzantines were not considered equal to Latins in close combat. West-Europeans saw mainly horse archers and Latin mercenaries on Byzantine service as threats to themselves in battle. The legitimacy of rulers surrounding the Aegean sea was weak and in many cases political intrigues and personal relationships can have resolved the battles. Especially in sieges the loyalty of population was decisive. In sieges the Byzantines used plenty of siege machines and archers. This made fast conquests possible, but it was expensive. The Byzantines protected their frontiers by building castles. Military operations against the Principality of Achaia were mostly small scale raids following an intensive beginning. Byzantine raids were mostly made by privateers and mountaineers. This does not fit to the traditional picture that warfare belonged to the imperial professional army. It’s unlikely that military operations in war against the Principality of Achaia caused great demographic or economic catastrophe and some regions in the warzone might even have flourished. On the other hand people started to concentrate into villages which (with growing risks for trade) probably caused disturbance in economic development and in result birth rates might have decreased. Both sides of war sought to exchange their prisoners of war. These were treated according to conventional manners that were accepted by both sides. It was possible to sell prisoners, especially women and children, to slavery, but the scale of this trade does not seem to be great in military operations treated in this theses.
Resumo:
A highly polymorphic genetic locus of Stout Whiting was examined for evidence of geographical subdivision amongst samples collected from three locales in southern Queensland waters. Statistical indicators of subdivision were not significantly different from zero, suggesting that it is unlikely that the Stout Whiting resource in southern Queensland is genetically subdivided into separate stocks. It is recommended that the full-scale genetic program not proceed and that the resource be managed as a single stock.
Resumo:
The philosophical problem of self-deception focuses the relation between desire, advantage, evidence and harm. A self-deceptive person is irrational because he or she belives or wants to belive contrary to the available evidence. The study focuses on different forms of self-deception that come out in certain classical Western dramas. The first self-deception forms are: "S knows that ~p but still belives that p because he wants that ~p", "S wants that p and therefore belives that p.", "S belives that p against evidence t because he wants to belive that p.", "S belives that p if t but S would belive that p even if ~t because S wants to belive that p.", "S belives that p (even if there is t that ~p) because S is ignorant of it." and "S belives that p (even if there is t that ~p) because of ignorant of t due to an internal deception." The main sources on self-deception are the views of contemporary researchers of the subject, such as Robert Audi, Marcia Baron, Bas C. van Fraassen, Mark Johnston, Mike W. Martin, Brian MaLaughlin, Alfred Mele, Amélie Oksenberg Rorty, William Ruddick and Stephen L. White. In this study it is claimed that Shakespeare´s Othello presents self-deception as a tragic phenomenom from witch it follows deceptions and murders. Moliére´s Tartuffe deals with a phony hypocrite´s attempts at cheating. Ibsen´s Wild Duck defends the necessity of vital lies. Beckett´s Waiting for Godot deals with the self-deception witch is related to the waiting of the supernatural rescuer. Miller´s The Death of a Salesman tells about a man who, while pursuing the American myth of success, winds both himself and his family into the skeins of self-deception. They are studied with a Barthesian method that emphasizes the autonomy of literary work and its interpretation independently of the author´s personal history and social conditions. Self-deception has been regarded as an immoral way of thinking or way of action. However, vital lies show the necessity or necessity of the self-deception when it brings joy and optimism to the human being and supports his or her self-esteem and does not cause a suffering or damage, either to self or others. In the study, the processual character of self-deception is brought out.
Resumo:
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Resumo:
As disparities in wealth levels between and within countries become greater many poor people migrate in search of better earning opportunities. Some of this migration is legal but, in many cases, the difficulties involved in securing the necessary documentation mean that would-be migrants resort to illegal methods. This, in turn, makes them vulnerable to human trafficking, a phenomenon that has received growing attention from NGOs, governments and the media in recent years. Despite the attention being given to human trafficking, however, there remains a certain amount of confusion over what exactly it entails though it is generally understood to refer to the transportation and subsequent exploitation of vulnerable people through means of force or deception. The increased attention that has been given to the issue of human trafficking over the last decade has resulted in new discourses emerging which attempt to explain what human trafficking entails, what the root causes of the phenomenon are and how best to tackle the problem. While a certain degree of conceptual clarity has been attained since human trafficking rose to prominence in the 1990s, it could be argued that human trafficking remains a poorly defined concept and that there is frequently confusion concerning the difference between it and related concepts such as people smuggling, migration and prostitution. The thesis examines the ways in which human trafficking has been conceptualised or framed in a specific national context- that of Lao PDR. Attention is given to the task of locating the major frames within which the issue has been situated, as well as considering the diagnoses and prognoses that the various approaches to trafficking suggest. The research considers which particular strands of trafficking discourse have become dominant in Lao PDR and the effect this has had on the kinds of trafficking interventions that have been undertaken in the country. The research is mainly qualitative and consists of an analysis of key texts found in the Lao trafficking discourse.
Resumo:
Genetic algorithms provide an alternative to traditional optimization techniques by using directed random searches to locate optimal solutions in complex landscapes. We introduce the art and science of genetic algorithms and survey current issues in GA theory and practice. We do not present a detailed study, instead, we offer a quick guide into the labyrinth of GA research. First, we draw the analogy between genetic algorithms and the search processes in nature. Then we describe the genetic algorithm that Holland introduced in 1975 and the workings of GAs. After a survey of techniques proposed as improvements to Holland's GA and of some radically different approaches, we survey the advances in GA theory related to modeling, dynamics, and deception