2021
DOI: 10.1111/cogs.13013
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Cognitive Theory of Cyber Deception

Abstract: This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present-day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
30
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(35 citation statements)
references
References 47 publications
(103 reference statements)
1
30
0
Order By: Relevance
“…For instance, humans find it difficult to detect an attacker's intentions in the context of cybersecurity teams 89 due to human biases. 90 Human biases are often used by cybercriminals to conduct phishing attacks and obtain credentials to access an organization's systems, for example. 91 The use of AI biases can also be used by cybercriminals as a means of attack.…”
Section: Human-autonomy Teaming Biasmentioning
confidence: 99%
“…For instance, humans find it difficult to detect an attacker's intentions in the context of cybersecurity teams 89 due to human biases. 90 Human biases are often used by cybercriminals to conduct phishing attacks and obtain credentials to access an organization's systems, for example. 91 The use of AI biases can also be used by cybercriminals as a means of attack.…”
Section: Human-autonomy Teaming Biasmentioning
confidence: 99%
“…Contextual cues also feature centrally in models of end‐user response to phishing emails (Cranford et al., 2019) based on instance‐based learning theory (IBLT) (Gonzalez et al., 2003). The latter, which is a model of dynamic decision making in cognitive science, also draws on instance‐based learning algorithms (IBLAs) (Aha et al., 1991) from machine learning.…”
Section: Phishing Targets the Human Elementmentioning
confidence: 99%
“…As noted above, Equations () through () build on the conceptual apparatus introduced in the SDT‐based phishing susceptibility literature (Kaivanto, 2014). There are close parallels between the concepts employed here—histories of decision contexts {Zi}<t$\lbrace Z_i\rbrace _{&lt;t}$, decision‐attributes {bold-italicα}<t$\lbrace {\bm{\alpha }}\rbrace _{&lt;t}$, decision‐outcomes {Di}<t$\lbrace D_i\rbrace _{&lt;t}$, as well as match quality mic(bold-italicα)$m_i^c(\bm{\alpha })$—and those employed in IBLT (Cranford et al., 2019; Gonzalez et al., 2003). Hence, the machine learning and NLP techniques developed in IBLT can in principle be used in computation implementation of ().…”
Section: Incorporating Intuitive Emotional and Fallible Decision Makingmentioning
confidence: 99%
“…Importantly, phishing emails often mimic benign emails-meaning that decision makers, who are influenced by typical memory effects such as recency and frequency of past instances, are susceptible to the cognitive biases that emerge from these very processes (Singh et al, 2019). An IBL model was built to emulate end-used classification decisions of emails (i.e., as phishing or benign), and the results from this model were compared to the classification decisions of humans in an email-processing task (Cranford et al, 2021). The model has turned out to be very accurate at predicting human's classification decisions.…”
Section: Phishing Detection and Trainingmentioning
confidence: 99%