Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 12))

  • 553 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abel, S. (1998).“Trademark issues in cyberspace: The brave new frontier” http://library.lp.findlaw.com/scripts/getfile.pl?file=/firms/fenwick/fw000023.html

  • Agre, P. (2001).“The market logic of information”. Knowledge,Technology, and Policy vol. 13, no. 1, p. 67–77.

    Google Scholar 

  • Anderson, R. (2002). Personal Communication

    Google Scholar 

  • Anderson, R. H., Bozek, T., Longstaff, T., Meitzler, W., Skroch, M. and Wyk, K. Van. (2000). Research on Mitigating the Insider Threat to Information Systems-#2:Proceedings of a Workshop Held August 2000. RAND Technical Report CF163, Santa Monica, CA: RAND.

    Google Scholar 

  • Anderson, R. and Khattak, A. (1998). “The Use of Information Retrieval Techniques for Intrusion Detection” First International Workshop on Recent Advances in Intrusion Detection (RAID)

    Google Scholar 

  • Atallah, M, J., McDonough, C. J., Raskin, V.,and Nirenburg, S. (2001). “Natural Language Processing for Information Assurance and Security: An Overview and Implementations” Proceedings of the 2000 Workshop on New Security Paradigms.

    Google Scholar 

  • BBC News Online. (2001). “ Hamas hit by porn attack” http://news.bbc.co.uk/low/english/world/middle_east/newsid_1207000/1207551.stm

  • BBC News Online. (2001). “Sharon’ s website hacked” http://news.bbc.co.uk/low/english/world/middle_east/newsid_1146000/1146436.stm

  • Biber, D. (1995). “Dimensions of Register Variation: A Cross-Linguistic Comparison” Cambridge University Press. Cambridge, England

    Google Scholar 

  • Biber, D. (1986). “Spoken and written textual dimensions in English: Resolving the contradictory findings” Language vol. 62, no. 2, p. 384–413.

    Google Scholar 

  • Buchanan, Ingersoll, P.C. (2001). “Avoiding web site liability—Online and oh the hook?” http://library.lp.findlaw.com/scripts/getfile.pl?file=/articles/bipc/bipc000056.html.

  • Buller, D. B. and Burgoon, J. K. (1996). “Interpersonal deception theory” Communication Theory vol. 6 no. 3, p. 203–242

    Google Scholar 

  • Burgoon, J. K., Blair, J.P., Qin, T and Nunamaker, J.F. (2003). “Detecting Deception through Linguistic Analysis” NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 91–101.

    Google Scholar 

  • Burrows, J.F. 1987. “Word Patterns and Story Shapes: The Statistical Analysis of Narrative Style” Literary and Linguistic Computing, vol. 2, p. 61–70.

    Article  Google Scholar 

  • Cao, J, Crews, J. M., Lin, M., Burgoon, J. K. and Nunamaker, J. F. (2003). “Designing Agent99 Trainer: A Learner-Centered,Web-Based Training System for Deception Detection” NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 358–365.

    Google Scholar 

  • Chandy, K. M. and Misra, J. (1988). Parallel Program Design: A Foundation. Addison Wesley.

    Google Scholar 

  • Chen, H., Zeng, D.D., Schroeder, J., Miranda, R., Demchak, C. and Madhusudan, T. (eds.). (2003). Intelligence and Security Informatics: First NSF/NIJ Symposium ISI 2003 Tucson, AZ, USA, June 2003 Proceedings, Berlin: Springer-Verlag.

    Google Scholar 

  • Chez.com. (1997). “Disinformation on the Internet.”http://www.chez.com/loran/art_danger/art_danger_on_internet.htm

  • Cignoli, R.L.O., D’Ottaviano, I.M.L. and Mundici, D. (1999). Algebraic Foundations of Many-Valued Reasoning Boston: Kluwer Academic

    Google Scholar 

  • Combs, J. E. and Nimmo, D. (1993). The new propaganda: The dictatorship of palaver in contemporary politics. New York: Longman.

    Google Scholar 

  • Cooper, W. S. and Maron, M.E. “Foundations of Probabilistic and Utility-Theoretic Indexing”. Journal of the Association for Computing Machinery vol. 25, no. 1, 1978, p. 67–80.

    MathSciNet  Google Scholar 

  • Cornetto, K. M. (2001). “Identity and Illusion on the Internet: Interpersonal deception and detection in interactive Internet environments” Ph.D.Thesis. University of Texas at Austin.

    Google Scholar 

  • Cover, T. A. and Thomas, J. A. (1991). Elements of Information Theory. New York: Wiley

    Google Scholar 

  • Cybenko, G., Giani, A. and Thompson, P. “Cognitive Hacking: A Battle for the Mind” IEEE Computer, 35(8), 2002, 50–56.

    Google Scholar 

  • Cybenko, G., Giani, A., Heckman, C. and Thompson, P. “Cognitive Hacking: Technological and Legal Issues”, Law Tech 2002 November 7–9, 2002.

    Google Scholar 

  • Daniels, P., Brooks, H.M. and Belkin, N.J. (1997). “Using problem structures for driving human-computer dialogues” In Sparck Jones, Karen and Willett, Peter (eds.) Readings in Information Retrieval San Francisco: Morgan Kaufmann, p. 135–142, reprinted from RIAO-85 Actes: Recherche d’Informations Assistee par Ordinateur, Grenoble, France: IMAG, p. 645–660.

    Google Scholar 

  • Dellarocas, C. (2001). “Building trust on-line: The design of reliable reputation reporting mechanisms for online trading communities” Center for eBusiness@MIT paper 101.

    Google Scholar 

  • Denning, D. (1999). Information warfare and security. Reading, Mass.: Addison-Wesley.

    Google Scholar 

  • Denning, D. (1999). “The limits of formal security models”. National Computer Systems Security Award Acceptance Speech.

    Google Scholar 

  • Doob, L. (1935). Propaganda, Its psychology and technique New York: Holt.

    Google Scholar 

  • Drineas, P., Kerendis, I. and Raghavan, P. Competitive recommendation systems STOC’02, May 19–21 2002.

    Google Scholar 

  • Ebay Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d 1058 (N. D. Cal., 2000)

    Google Scholar 

  • Ellul, J. (1966). Propaganda translated from the French by Konrad Kellen and Jean Lerner New York: Knopf.

    Google Scholar 

  • Farahat, A., Nunberg, G. and Chen, F. (2002). “AuGEAS (Authoritativeness Grading, Estimation, and Sorting)” Proceedings of the International Conference on Knowledge Management CIKM’02 4–9 November, McLean, Virginia.

    Google Scholar 

  • Fawcett, T. and Provost, F. in W. Kloesgen and J. Zytkow (eds.). (2002) Handbook of Data Mining and Knowledge Discovery, Oxford University Press.

    Google Scholar 

  • Felton, E. W., Balfanz, D., Dean, D., and Wallach, D. (1997). “Web spoofing: An Internet con game”. Technical Report 54–96 (revised) Department of Computer Science, Princeton University.

    Google Scholar 

  • George, J., Biros, D. P., Burgoon, J. K. and Nunamaker, J. F. Jr. (2003). “Training Professionals to Detect Deception”. NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 366–370.

    Google Scholar 

  • Gertz v. Robert Welch, Inc., 428 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).

    Google Scholar 

  • Google News beta. (2003). http://news.google.com/.

  • Grant, Tim. 2004. Ph. D. thesis, Forensic Section, School of Psychology University of Leicester (upcoming publication).

    Google Scholar 

  • Hacktivist, The. (2001). “Fluffi Bunni hacker declares Jihad” http://thehacktivist.com/article.php?sid=40

  • Heckman, C. and J. Wobbrock, J. (2000) “Put Your Best Face Forward: Anthropomorphic Agents, E-Commerce Consumers, and the Law”. Fourth International Conference on Autonomous Agents, June 3–7, Barcelona, Spain.

    Google Scholar 

  • Herlocker, J. (ed.). (2001). “Recommender Systems: Papers and Notes from the 2001 Workshop” In conjunction with the ACM SIGIR Conference on Research and Development in Information Retrieval. New Orleans.

    Google Scholar 

  • Hofmann, T. (2001). “What People (Don’t)Want”. European Conference on Machine Learning (ECML).

    Google Scholar 

  • Hunt, A. (2001). “Web defacement analysis”. ISTS.

    Google Scholar 

  • Huynh, D., Karger, D. and Quan, D. (2003). “Haystack: A Platform for Creating, Organizing and Visualizing Information using RDF”. Intelligent User Interfaces (IUI)

    Google Scholar 

  • Information Warfare Site. (2001). http://www.iwar.org.uk/psyops/index.htm

  • Johansson, P. (2002). “User Modeling in Dialog Systems”. St. Anna Report SAR 02-2.

    Google Scholar 

  • Karlgren, J. and Cutting, D. (1994). “Recognizing text genres with simple metrics using discriminant analysis”

    Google Scholar 

  • Kessler, B., Nunberg, G. and Schütze, H. (1997). “Automatic Detection of Genre” Proceedings of the Thirty-Fifth Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics

    Google Scholar 

  • Krebs, B. (2001). “E-Mail Scam Sought To Defraud PayPal Customers” Newsbytes 19 December, http://www.newsbytes.com/news/01/173120.html

  • Lafferty, J. and Chengxiang, Z. (2001) Document language models, query models, and risk minimization for information retrieval. 2001 ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR).

    Google Scholar 

  • Lafferty, J. and Chengxiang, Z. (2001). “Probabilistic relevance models based on document and query generation” Proceedings of the Workshop on Language Modeling and Information Retrieval, Carnegie Mellon University.(Kluwer volume to appear PT reviewing).

    Google Scholar 

  • Landwehr, C. E. (1984). “A security model for military message systems” ACM Transactions on Computer Systems. vol. 9, no. 3.

    Google Scholar 

  • Landwehr, C. E. (1981). “Formal models of computer security”. Computing Surveys, vol. 13, no. 3.

    Google Scholar 

  • Latimes.com. (2001). “‘Hacktivists’, caught in web of hate, deface Afghan sites” http://www.latimes.com/technology/la-000077258sep27.story?coll=la%2Dheadlines%2Dtechnology

  • Lebed.biz (2004). http://www.lebed.biz/

  • Lewis, M. “Jonathan Lebed: Stock Manipulator”, S.E.C. Nemesis-and 15 New York Times Magazine 25 February 2001

    Google Scholar 

  • Lewis, M. (2001). Next: The Future Just Happened New York: W. W. Norton p. 35–36.

    Google Scholar 

  • Libicki, M. (1994). “The mesh and the Net: Speculations on armed conflict in an age of free silicon”. National Defense University McNair Paper 28 http://www.ndu.edu/ndu/inss/macnair/mcnair28/m028cont.html

  • Love, Harold. 2002. Attributing Authorship: An Introduction Cambridge, UK: Cambridge University Press.

    Google Scholar 

  • Lynch, C. (2001). “When Documents Deceive: Trust and Provenance as New Factors for Information Retrieval in a Tangled Web” Journal of the American Society for Information Science & Technology, vol. 52, no. 1, p. 12–17.

    Google Scholar 

  • McMenamin, Gerald R. and Choi, Dongdoo (eds.). 2002. Forensic Linguistics: dvances in Forensic Stylistics Boca Raton, Florida: CRC.

    Google Scholar 

  • Mann, B. (2000). “Emulex fraud hurts all”. The Motley Fool. http://www.fool.com/news/foolplate/2000/foolplate000828.htm

  • Maron, M.E. and Kuhns, J.L. “On relevance, probabilistic indexing and information retrieval”. Journal of the ACM vol. 7 no. 3, 1960, p. 216–244.

    Article  Google Scholar 

  • Mateescu, G.; Sosonkina, M.; and Thompson, P. “A New Model for Probabilistic Information Retrieval on the Web” Second SIAM International Conference on Data Mining (SDM 2002) Workshop on Web Analytic

    Google Scholar 

  • Matthew Bender and Company. (2001). Title 15. Commerce and Trade. Chapter 22. Trademarks General Provisions. United States Code Service, http://web.lexis-nexis.com/congcomp/document?_m=46a301efb7693acc36c35058bee8e97d&_docnum=l&wchp=dGLStS-lSlAA&_md5=5929f8114ela7b40bbeOa7a7ca9d7dea

  • Mensik, M. and Fresen, G. (1996). “Vulnerabilities of the Internet: An introduction to the basic legal issues that impact your organization” http://library.lp.findlaw.com/scripts/getfile.pl?file=/firms/bm/bm000007.html

  • Mosteller, F. and Wallace, D.L. 1964. Inference and Disputed Author-ship: The Federalist Reading, MA: Addison-Wesley.

    Google Scholar 

  • MSNBC. (2001). “Hacker alters news stories on Yahoo” http://stacks.msnbc.com/news/631231.asp.

  • Mundici, D. and Trombetta, A. (1997). “Optimal Comparison Strategies in Ulam’s Searching Game with Two Errors”, Theoretical Computer Science, vol. 182, nos 1–2, 15 August.

    Google Scholar 

  • Munson, J. C. and Wimer, S. “Watcher: the Missing Piece of the Security Puzzle” 17th Annual Computer Security Applications Conference (ACSAC’01). December 10–14, 2001 New Orleans, Louisiana

    Google Scholar 

  • National Center for Digital Government. (2003). Integrating Information and Government John F.Kennedy School of Government Harvard University. http://www.ksg.harvard.edu/digitalcenter/

  • National Center for Digital Government: Integrating Information and Government “Identity: The Digital Government Civic Scenario Work-shop” Cambridge, MA 28–29 April 2003 John F. Kennedy School of Government Harvard University. http://www.ksg.harvard.edu/digitalcenter/conference/

  • Network World Fusion. (2001). “Clever fake of WTO web site harvests e-mail addresses” http://www.nwfusion.com/news/2001/1031wto.htm

  • Newsbytes. (2001). “Pop singer’ s death a hoax a top story at CNN” http://www.newsbytes.com/cgi-bin/udt/im.display.printable?client.id=newsbytes&story.id=170973

  • Pratkanis, A. R. and Aronson, E. (1992). Age of propaganda: The everyday use and abuse of persuasion New York: Freeman.

    Google Scholar 

  • Rao, J.R. and Rohatgi, P. (2000). “Can pseudonymity really guarantee privacy?” Proceedings of the 9th USENIX Security Symposium Denver, Colorado August 14–17.

    Google Scholar 

  • Register, The. (2001). “Intel hacker talks to The Reg” http://www.theregister.co.uk/content/archive/17000.html

  • Register, The. (2001). “New York Times web site sm0ked” http://www.theregister.co.uk/content/6/16964.html

  • Rich, E. (1983). “Users are individuals: individualizing user models” International Journal of Man-Machine Studies vol. 18 no. 3, p. 199–214.

    Google Scholar 

  • Rieber, Robert W. and Stewart, William A. (eds.) 1990. The Language Scientist as Expert in the Legal Setting, Annals of the New York Academy of Sciences vol. 606, New York: The New York Academy of Sciences.

    Google Scholar 

  • Rijsbergen, C.J van. Information Retrieval 2d. edition, London: Buttersworth, 1979.

    Google Scholar 

  • Salton, G. and McGill, M. (1983). Introduction to Modern Information Retrieval New York: McGraw-Hill.

    Google Scholar 

  • Sarwar, B., Karypis, G., Konstan, J. and Reidl, J.”Item-based collaborative filtering recommendation algorithms.” WWW10 May 1–5, 2001 Hong Kong.

    Google Scholar 

  • Schneier, B. (2000). “Semantic attacks: The third wave of network attacks” Crypto-gram Newsletter October 15, 2000. http://www.counterpane.com/crypto-gram-0010.html.

  • Securities and Exchange Commission. (1999). Litigation Release No. 16391. http://www.sec.gov/litigation/litreleases/lr16391.htm.

  • Securities and Exchange Commission. (2000). Litigation Release No. 16620. http://www.sec.gov/litigation/litreleases/lrl6620.htm.

  • Securities and Exchange Commission. (2001). Litigation Release No. 16867. http://www.sec.gov/litigation/litreleases/lr16867.htm.

  • Securities and Exchange Commission. (2003). Litigation Release No. 18043. http://www.sec.gov/litigation/litreleases/lr18043.htm

  • Shuy, Roger W. 1998. The Language of Confession, Interrogation, and Deception Thousand Oaks, California: SAGE Publications.

    Google Scholar 

  • Smith, A.K. “Trading in False Tips Exacts a Price”, U.S. News & World Report, February 5, 2001, p. 40

    Google Scholar 

  • Smith, S. (2001). Personal communication.

    Google Scholar 

  • Sophos. (2001). “W32/Redesi-B” http://www.sophos.com/virusinfo/analyses/w32redesib.html

  • SRD (2003). http://www.the3dcorp.com/prod_nora.html

  • Stockspot.com (2004). http://www.stockspot.com

  • Thompson, P. “Semantic Hacking and Intelligence and Security Informatics” NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003.

    Google Scholar 

  • Thornton, J. (2001). “Collaborative Filtering Research Papers”. http://jamesthornton.com/cf/.

  • Ulam, S.M. (1991). Adventures of a Mathematician Berkeley, CA: University of California Press.

    Google Scholar 

  • Varian, H. R. (1996). “Resources on collaborative filtering” http://www.sims.berkeley.edu/resources/collab/

  • Varian, H. R. and Resnik, P. eds. CACM Special issue on recommender systems, CACM vol. 40, no. 3, 1997.

    Google Scholar 

  • WallStreetNewscast.com. (2004). “You’ve Made Your Lebed,Now Sleep in It” http://www.wallstreetnewscast.net/news/01172004.html

  • Washtech.com. (2001). “FTC shuts down thousands of deceptive web sites” http://www.washtech.com/news/regulation/12829-1.html

  • Wing, J. M. (1998). “A Symbiotic Relationship Between Formal Methods and Security” Proceedings from Workshops on Computer Security, Fault Tolerance, and Software Assurance.

    Google Scholar 

  • Yahalom, R., Klein, B., and Beth, Th. (1993). “Trust relationships in secure systems-A distributed authentication perspective.. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland.

    Google Scholar 

  • Yuan, Y.; Ye, E.Z.; and Smith, S. (2001). “Web spoofing 2001” Department of Computer Science/Institute for Security Technology Studies Technical Report TR2001-409

    Google Scholar 

  • Zhou, L., Burgoon, J. K. and Twitchell, D. P. (2003). “A Longitudinal Analysis of Language Behavior of Deception in E-mail”. NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 102–110

    Google Scholar 

  • Zhou, L., Twitchell, D.P., Qin, T., Burgoon, J. K. and Nunamaker, J.F. (2003). “An exploratory study into deception in text-based computer-mediated communications” Proceedings of the 36th Hawaii International Conference on Systems Science

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

Thompson, P., Cybenko, G., Giani, A. (2004). Cognitive Hacking. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_19

Download citation

  • DOI: https://doi.org/10.1007/1-4020-8090-5_19

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-8089-0

  • Online ISBN: 978-1-4020-8090-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics