Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abel, S. (1998).“Trademark issues in cyberspace: The brave new frontier” http://library.lp.findlaw.com/scripts/getfile.pl?file=/firms/fenwick/fw000023.html
Agre, P. (2001).“The market logic of information”. Knowledge,Technology, and Policy vol. 13, no. 1, p. 67–77.
Anderson, R. (2002). Personal Communication
Anderson, R. H., Bozek, T., Longstaff, T., Meitzler, W., Skroch, M. and Wyk, K. Van. (2000). Research on Mitigating the Insider Threat to Information Systems-#2:Proceedings of a Workshop Held August 2000. RAND Technical Report CF163, Santa Monica, CA: RAND.
Anderson, R. and Khattak, A. (1998). “The Use of Information Retrieval Techniques for Intrusion Detection” First International Workshop on Recent Advances in Intrusion Detection (RAID)
Atallah, M, J., McDonough, C. J., Raskin, V.,and Nirenburg, S. (2001). “Natural Language Processing for Information Assurance and Security: An Overview and Implementations” Proceedings of the 2000 Workshop on New Security Paradigms.
BBC News Online. (2001). “ Hamas hit by porn attack” http://news.bbc.co.uk/low/english/world/middle_east/newsid_1207000/1207551.stm
BBC News Online. (2001). “Sharon’ s website hacked” http://news.bbc.co.uk/low/english/world/middle_east/newsid_1146000/1146436.stm
Biber, D. (1995). “Dimensions of Register Variation: A Cross-Linguistic Comparison” Cambridge University Press. Cambridge, England
Biber, D. (1986). “Spoken and written textual dimensions in English: Resolving the contradictory findings” Language vol. 62, no. 2, p. 384–413.
Buchanan, Ingersoll, P.C. (2001). “Avoiding web site liability—Online and oh the hook?” http://library.lp.findlaw.com/scripts/getfile.pl?file=/articles/bipc/bipc000056.html.
Buller, D. B. and Burgoon, J. K. (1996). “Interpersonal deception theory” Communication Theory vol. 6 no. 3, p. 203–242
Burgoon, J. K., Blair, J.P., Qin, T and Nunamaker, J.F. (2003). “Detecting Deception through Linguistic Analysis” NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 91–101.
Burrows, J.F. 1987. “Word Patterns and Story Shapes: The Statistical Analysis of Narrative Style” Literary and Linguistic Computing, vol. 2, p. 61–70.
Cao, J, Crews, J. M., Lin, M., Burgoon, J. K. and Nunamaker, J. F. (2003). “Designing Agent99 Trainer: A Learner-Centered,Web-Based Training System for Deception Detection” NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 358–365.
Chandy, K. M. and Misra, J. (1988). Parallel Program Design: A Foundation. Addison Wesley.
Chen, H., Zeng, D.D., Schroeder, J., Miranda, R., Demchak, C. and Madhusudan, T. (eds.). (2003). Intelligence and Security Informatics: First NSF/NIJ Symposium ISI 2003 Tucson, AZ, USA, June 2003 Proceedings, Berlin: Springer-Verlag.
Chez.com. (1997). “Disinformation on the Internet.”http://www.chez.com/loran/art_danger/art_danger_on_internet.htm
Cignoli, R.L.O., D’Ottaviano, I.M.L. and Mundici, D. (1999). Algebraic Foundations of Many-Valued Reasoning Boston: Kluwer Academic
Combs, J. E. and Nimmo, D. (1993). The new propaganda: The dictatorship of palaver in contemporary politics. New York: Longman.
Cooper, W. S. and Maron, M.E. “Foundations of Probabilistic and Utility-Theoretic Indexing”. Journal of the Association for Computing Machinery vol. 25, no. 1, 1978, p. 67–80.
Cornetto, K. M. (2001). “Identity and Illusion on the Internet: Interpersonal deception and detection in interactive Internet environments” Ph.D.Thesis. University of Texas at Austin.
Cover, T. A. and Thomas, J. A. (1991). Elements of Information Theory. New York: Wiley
Cybenko, G., Giani, A. and Thompson, P. “Cognitive Hacking: A Battle for the Mind” IEEE Computer, 35(8), 2002, 50–56.
Cybenko, G., Giani, A., Heckman, C. and Thompson, P. “Cognitive Hacking: Technological and Legal Issues”, Law Tech 2002 November 7–9, 2002.
Daniels, P., Brooks, H.M. and Belkin, N.J. (1997). “Using problem structures for driving human-computer dialogues” In Sparck Jones, Karen and Willett, Peter (eds.) Readings in Information Retrieval San Francisco: Morgan Kaufmann, p. 135–142, reprinted from RIAO-85 Actes: Recherche d’Informations Assistee par Ordinateur, Grenoble, France: IMAG, p. 645–660.
Dellarocas, C. (2001). “Building trust on-line: The design of reliable reputation reporting mechanisms for online trading communities” Center for eBusiness@MIT paper 101.
Denning, D. (1999). Information warfare and security. Reading, Mass.: Addison-Wesley.
Denning, D. (1999). “The limits of formal security models”. National Computer Systems Security Award Acceptance Speech.
Doob, L. (1935). Propaganda, Its psychology and technique New York: Holt.
Drineas, P., Kerendis, I. and Raghavan, P. Competitive recommendation systems STOC’02, May 19–21 2002.
Ebay Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d 1058 (N. D. Cal., 2000)
Ellul, J. (1966). Propaganda translated from the French by Konrad Kellen and Jean Lerner New York: Knopf.
Farahat, A., Nunberg, G. and Chen, F. (2002). “AuGEAS (Authoritativeness Grading, Estimation, and Sorting)” Proceedings of the International Conference on Knowledge Management CIKM’02 4–9 November, McLean, Virginia.
Fawcett, T. and Provost, F. in W. Kloesgen and J. Zytkow (eds.). (2002) Handbook of Data Mining and Knowledge Discovery, Oxford University Press.
Felton, E. W., Balfanz, D., Dean, D., and Wallach, D. (1997). “Web spoofing: An Internet con game”. Technical Report 54–96 (revised) Department of Computer Science, Princeton University.
George, J., Biros, D. P., Burgoon, J. K. and Nunamaker, J. F. Jr. (2003). “Training Professionals to Detect Deception”. NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 366–370.
Gertz v. Robert Welch, Inc., 428 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
Google News beta. (2003). http://news.google.com/.
Grant, Tim. 2004. Ph. D. thesis, Forensic Section, School of Psychology University of Leicester (upcoming publication).
Hacktivist, The. (2001). “Fluffi Bunni hacker declares Jihad” http://thehacktivist.com/article.php?sid=40
Heckman, C. and J. Wobbrock, J. (2000) “Put Your Best Face Forward: Anthropomorphic Agents, E-Commerce Consumers, and the Law”. Fourth International Conference on Autonomous Agents, June 3–7, Barcelona, Spain.
Herlocker, J. (ed.). (2001). “Recommender Systems: Papers and Notes from the 2001 Workshop” In conjunction with the ACM SIGIR Conference on Research and Development in Information Retrieval. New Orleans.
Hofmann, T. (2001). “What People (Don’t)Want”. European Conference on Machine Learning (ECML).
Hunt, A. (2001). “Web defacement analysis”. ISTS.
Huynh, D., Karger, D. and Quan, D. (2003). “Haystack: A Platform for Creating, Organizing and Visualizing Information using RDF”. Intelligent User Interfaces (IUI)
Information Warfare Site. (2001). http://www.iwar.org.uk/psyops/index.htm
Johansson, P. (2002). “User Modeling in Dialog Systems”. St. Anna Report SAR 02-2.
Karlgren, J. and Cutting, D. (1994). “Recognizing text genres with simple metrics using discriminant analysis”
Kessler, B., Nunberg, G. and Schütze, H. (1997). “Automatic Detection of Genre” Proceedings of the Thirty-Fifth Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics
Krebs, B. (2001). “E-Mail Scam Sought To Defraud PayPal Customers” Newsbytes 19 December, http://www.newsbytes.com/news/01/173120.html
Lafferty, J. and Chengxiang, Z. (2001) Document language models, query models, and risk minimization for information retrieval. 2001 ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR).
Lafferty, J. and Chengxiang, Z. (2001). “Probabilistic relevance models based on document and query generation” Proceedings of the Workshop on Language Modeling and Information Retrieval, Carnegie Mellon University.(Kluwer volume to appear PT reviewing).
Landwehr, C. E. (1984). “A security model for military message systems” ACM Transactions on Computer Systems. vol. 9, no. 3.
Landwehr, C. E. (1981). “Formal models of computer security”. Computing Surveys, vol. 13, no. 3.
Latimes.com. (2001). “‘Hacktivists’, caught in web of hate, deface Afghan sites” http://www.latimes.com/technology/la-000077258sep27.story?coll=la%2Dheadlines%2Dtechnology
Lebed.biz (2004). http://www.lebed.biz/
Lewis, M. “Jonathan Lebed: Stock Manipulator”, S.E.C. Nemesis-and 15 New York Times Magazine 25 February 2001
Lewis, M. (2001). Next: The Future Just Happened New York: W. W. Norton p. 35–36.
Libicki, M. (1994). “The mesh and the Net: Speculations on armed conflict in an age of free silicon”. National Defense University McNair Paper 28 http://www.ndu.edu/ndu/inss/macnair/mcnair28/m028cont.html
Love, Harold. 2002. Attributing Authorship: An Introduction Cambridge, UK: Cambridge University Press.
Lynch, C. (2001). “When Documents Deceive: Trust and Provenance as New Factors for Information Retrieval in a Tangled Web” Journal of the American Society for Information Science & Technology, vol. 52, no. 1, p. 12–17.
McMenamin, Gerald R. and Choi, Dongdoo (eds.). 2002. Forensic Linguistics: dvances in Forensic Stylistics Boca Raton, Florida: CRC.
Mann, B. (2000). “Emulex fraud hurts all”. The Motley Fool. http://www.fool.com/news/foolplate/2000/foolplate000828.htm
Maron, M.E. and Kuhns, J.L. “On relevance, probabilistic indexing and information retrieval”. Journal of the ACM vol. 7 no. 3, 1960, p. 216–244.
Mateescu, G.; Sosonkina, M.; and Thompson, P. “A New Model for Probabilistic Information Retrieval on the Web” Second SIAM International Conference on Data Mining (SDM 2002) Workshop on Web Analytic
Matthew Bender and Company. (2001). Title 15. Commerce and Trade. Chapter 22. Trademarks General Provisions. United States Code Service, http://web.lexis-nexis.com/congcomp/document?_m=46a301efb7693acc36c35058bee8e97d&_docnum=l&wchp=dGLStS-lSlAA&_md5=5929f8114ela7b40bbeOa7a7ca9d7dea
Mensik, M. and Fresen, G. (1996). “Vulnerabilities of the Internet: An introduction to the basic legal issues that impact your organization” http://library.lp.findlaw.com/scripts/getfile.pl?file=/firms/bm/bm000007.html
Mosteller, F. and Wallace, D.L. 1964. Inference and Disputed Author-ship: The Federalist Reading, MA: Addison-Wesley.
MSNBC. (2001). “Hacker alters news stories on Yahoo” http://stacks.msnbc.com/news/631231.asp.
Mundici, D. and Trombetta, A. (1997). “Optimal Comparison Strategies in Ulam’s Searching Game with Two Errors”, Theoretical Computer Science, vol. 182, nos 1–2, 15 August.
Munson, J. C. and Wimer, S. “Watcher: the Missing Piece of the Security Puzzle” 17th Annual Computer Security Applications Conference (ACSAC’01). December 10–14, 2001 New Orleans, Louisiana
National Center for Digital Government. (2003). Integrating Information and Government John F.Kennedy School of Government Harvard University. http://www.ksg.harvard.edu/digitalcenter/
National Center for Digital Government: Integrating Information and Government “Identity: The Digital Government Civic Scenario Work-shop” Cambridge, MA 28–29 April 2003 John F. Kennedy School of Government Harvard University. http://www.ksg.harvard.edu/digitalcenter/conference/
Network World Fusion. (2001). “Clever fake of WTO web site harvests e-mail addresses” http://www.nwfusion.com/news/2001/1031wto.htm
Newsbytes. (2001). “Pop singer’ s death a hoax a top story at CNN” http://www.newsbytes.com/cgi-bin/udt/im.display.printable?client.id=newsbytes&story.id=170973
Pratkanis, A. R. and Aronson, E. (1992). Age of propaganda: The everyday use and abuse of persuasion New York: Freeman.
Rao, J.R. and Rohatgi, P. (2000). “Can pseudonymity really guarantee privacy?” Proceedings of the 9th USENIX Security Symposium Denver, Colorado August 14–17.
Register, The. (2001). “Intel hacker talks to The Reg” http://www.theregister.co.uk/content/archive/17000.html
Register, The. (2001). “New York Times web site sm0ked” http://www.theregister.co.uk/content/6/16964.html
Rich, E. (1983). “Users are individuals: individualizing user models” International Journal of Man-Machine Studies vol. 18 no. 3, p. 199–214.
Rieber, Robert W. and Stewart, William A. (eds.) 1990. The Language Scientist as Expert in the Legal Setting, Annals of the New York Academy of Sciences vol. 606, New York: The New York Academy of Sciences.
Rijsbergen, C.J van. Information Retrieval 2d. edition, London: Buttersworth, 1979.
Salton, G. and McGill, M. (1983). Introduction to Modern Information Retrieval New York: McGraw-Hill.
Sarwar, B., Karypis, G., Konstan, J. and Reidl, J.”Item-based collaborative filtering recommendation algorithms.” WWW10 May 1–5, 2001 Hong Kong.
Schneier, B. (2000). “Semantic attacks: The third wave of network attacks” Crypto-gram Newsletter October 15, 2000. http://www.counterpane.com/crypto-gram-0010.html.
Securities and Exchange Commission. (1999). Litigation Release No. 16391. http://www.sec.gov/litigation/litreleases/lr16391.htm.
Securities and Exchange Commission. (2000). Litigation Release No. 16620. http://www.sec.gov/litigation/litreleases/lrl6620.htm.
Securities and Exchange Commission. (2001). Litigation Release No. 16867. http://www.sec.gov/litigation/litreleases/lr16867.htm.
Securities and Exchange Commission. (2003). Litigation Release No. 18043. http://www.sec.gov/litigation/litreleases/lr18043.htm
Shuy, Roger W. 1998. The Language of Confession, Interrogation, and Deception Thousand Oaks, California: SAGE Publications.
Smith, A.K. “Trading in False Tips Exacts a Price”, U.S. News & World Report, February 5, 2001, p. 40
Smith, S. (2001). Personal communication.
Sophos. (2001). “W32/Redesi-B” http://www.sophos.com/virusinfo/analyses/w32redesib.html
SRD (2003). http://www.the3dcorp.com/prod_nora.html
Stockspot.com (2004). http://www.stockspot.com
Thompson, P. “Semantic Hacking and Intelligence and Security Informatics” NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003.
Thornton, J. (2001). “Collaborative Filtering Research Papers”. http://jamesthornton.com/cf/.
Ulam, S.M. (1991). Adventures of a Mathematician Berkeley, CA: University of California Press.
Varian, H. R. (1996). “Resources on collaborative filtering” http://www.sims.berkeley.edu/resources/collab/
Varian, H. R. and Resnik, P. eds. CACM Special issue on recommender systems, CACM vol. 40, no. 3, 1997.
WallStreetNewscast.com. (2004). “You’ve Made Your Lebed,Now Sleep in It” http://www.wallstreetnewscast.net/news/01172004.html
Washtech.com. (2001). “FTC shuts down thousands of deceptive web sites” http://www.washtech.com/news/regulation/12829-1.html
Wing, J. M. (1998). “A Symbiotic Relationship Between Formal Methods and Security” Proceedings from Workshops on Computer Security, Fault Tolerance, and Software Assurance.
Yahalom, R., Klein, B., and Beth, Th. (1993). “Trust relationships in secure systems-A distributed authentication perspective.. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland.
Yuan, Y.; Ye, E.Z.; and Smith, S. (2001). “Web spoofing 2001” Department of Computer Science/Institute for Security Technology Studies Technical Report TR2001-409
Zhou, L., Burgoon, J. K. and Twitchell, D. P. (2003). “A Longitudinal Analysis of Language Behavior of Deception in E-mail”. NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 102–110
Zhou, L., Twitchell, D.P., Qin, T., Burgoon, J. K. and Nunamaker, J.F. (2003). “An exploratory study into deception in text-based computer-mediated communications” Proceedings of the 36th Hawaii International Conference on Systems Science
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Thompson, P., Cybenko, G., Giani, A. (2004). Cognitive Hacking. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_19
Download citation
DOI: https://doi.org/10.1007/1-4020-8090-5_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8089-0
Online ISBN: 978-1-4020-8090-6
eBook Packages: Springer Book Archive