Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Deception in the digital age : exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6)
Date Reviewed: Jul 11 2018

Psychology and sociology may be surpassing technology as the key to online deception. This book reminds me of the old adage that access through personal interaction is often more effective than other techniques in espionage. While not always true, there is a strong argument to be made in that direction--and that is where this book is headed.

Chapter 1 is an interesting introduction to “The Psychology of Deception,” followed by a review of “Virtual Myths: Urban Legend, Chain Letters and Warnings” (chapter 2), “Virtual Influence: Deceptive Computing Attacks Through Persuasion” (chapter 3), and “Social Dynamics of Deceptions: Cyber Underground Markets and Cultures” (chapter 4). Chapters 5 and 6, “Phishing, Watering Holes, and Scareware” and “Seeing is Not Believing: Deceptive Internet Video Communications,” are interesting from a mental and user perspective, but have no technical content.

Perhaps the weakest portions, from perspectives both technical and anthropological, are the chapters on cyber jihad (chapter 7) and nation-sponsored cyberattacks (chapter 8). They are long on macro scares and short on specifics, perhaps a textual mini-example of what is being written about. A short chapter (9) on honeypots is an interesting antidote to problems, while the concluding “Looking Forward: Deception in the Future” (chapter 10) adds little to the analysis.

The index is sufficient but lacks names well known in the field, and end-of-chapter references are also sufficient but not much more. “The Cyberanthropology of Deception” is the title of the introduction, which sets the tone for the book with an interesting explanation of the term and novel perspectives. There is some material for those in the fields of policy, psychology, and anthropology (including the cyber kind) here, but little for computer scientists.

More reviews about this item: Amazon

Reviewer:  David Bellin Review #: CR146141 (1809-0498)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Security and Protection (K.6.5 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy