Results 11 to 20 of about 296,174 (298)

Evaluating Synthetic Cyber Deception Strategies Under Uncertainty via Game Theory Approach: Linking Information Leakage and Game Outcomes in Cyber Deception [PDF]

open access: yesSensors
The study develops a game-theoretic evaluation framework for cyber deception that quantifies deception benefit relative to an otherwise matched non-deceptive baseline and links strategic outcomes to information disclosure. A defender–attacker interaction
Mohammad Shahin   +2 more
doaj   +2 more sources

Domain-independent deception: a new taxonomy and linguistic analysis [PDF]

open access: yesFrontiers in Big Data
IntroductionInternet-based economies and societies are drowning in deceptive attacks. These attacks take many forms, such as fake news, phishing, and job scams, which we call “domains of deception.” Machine learning and natural language processing ...
Rakesh M. Verma   +5 more
doaj   +2 more sources

Deception and Self-Deception [PDF]

open access: yesSSRN Electronic Journal, 2016
Why are people so often overconfident? We conduct an experiment to test the hypothesis that people become overconfident to more effectively persuade or deceive others. After performing a cognitively challenging task, half of our subjects are informed that they can earn money by convincing others of their superior performance.
Peter Schwardmann, Joël van der Weele
openaire   +7 more sources

Deception about study purpose does not affect participant behavior

open access: yesScientific Reports, 2022
The use of deception in research is divisive along disciplinary lines. Whereas psychologists argue that deception may be necessary to obtain unbiased measures, economists hold that deception can generate suspicion of researchers, invalidating measures ...
Zoe Rahwan   +2 more
doaj   +1 more source

Debates on the Use of Deception in Psychology Research

open access: yesPsikoloji Çalışmaları, 2023
Deception is often used in scientific research as it is thought to contribute to the research process. Deception basically occurs when participants are given false or incomplete information about the purpose, content, or processes of a study.
Ayşe Tuna
doaj   +1 more source

An Honest Joker reveals stereotypical beliefs about the face of deception

open access: yesScientific Reports, 2023
Research on deception detection has mainly focused on Simple Deception, in which false information is presented as true. Relatively few studies have examined Sophisticated Deception, in which true information is presented as false.
Xingchen Zhou, Rob Jenkins, Lei Zhu
doaj   +1 more source

The evolution of deception

open access: yesRoyal Society Open Science, 2021
Deception plays a critical role in the dissemination of information, and has important consequences on the functioning of cultural, market-based and democratic institutions.
Ştefan Sarkadi   +4 more
doaj   +1 more source

The role of conflict processing mechanism in deception responses

open access: yesScientific Reports, 2022
A considerable number of studies have described the potential neural mechanism of deception, but most deception studies have relied upon deception from experimental supervisor instruction. Experimental control (participants follow instructions to deceive
Jintao Wu   +4 more
doaj   +1 more source

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

open access: yesSensors, 2022
With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense.
Pilla Vaishno Mohan   +5 more
doaj   +1 more source

A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty

open access: yesGames, 2022
In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense ...
Thanh Hong Nguyen, Amulya Yadav
doaj   +1 more source

Home - About - Disclaimer - Privacy