Handbook of Research on Technoethics
DOI: 10.4018/9781605660226.ch034
|View full text |Cite
|
Sign up to set email alerts
|

The Ethics of Deception in Cyberspace

Abstract: We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on computer systems, including identity deception, Trojan horses, denial of service, eavesdropping, record manipulation, and social engineering. We then consider several types… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…The following taxonomy builds on a cyber-specific deception taxonomy proposed by Rowe and based on linguistic case theory. [23] Rowe's taxonomy identifies 32 specific kinds of deception, grouped into seven broader categories. In the following, these categories are applied to social media deception: 1) Spatial cases pertain to misleading locations, directions, etc.…”
Section: A Taxonomy Of Social Media Deceptionmentioning
confidence: 99%
“…The following taxonomy builds on a cyber-specific deception taxonomy proposed by Rowe and based on linguistic case theory. [23] Rowe's taxonomy identifies 32 specific kinds of deception, grouped into seven broader categories. In the following, these categories are applied to social media deception: 1) Spatial cases pertain to misleading locations, directions, etc.…”
Section: A Taxonomy Of Social Media Deceptionmentioning
confidence: 99%
“…Thus the most useful deception methods for directory information are repackaging and mimicking. Another taxonomy based on case grammar [13] enumerates 32 deceptions in space, time, participant, causality, quality, essence, and preconditions. Most opportunities for deception in a drive directory occur for qualities of a file, which are mainly conveyed by its path (file name and location in the directory scheme), as well as its times, flags, and fragmentation.…”
Section: Finding Deceptionmentioning
confidence: 99%
“…While these examples may be the most prevalent in national discussions, attacks designed to disrupt the behavior of human operators, often referred to as low and slow attacks, are an emerging threat (Rowe, 2006). While currently an emerging threat, these types of attacks may become more and more prevalent moving forward.…”
Section: Introductionmentioning
confidence: 97%