1,966
Views
72
CrossRef citations to date
0
Altmetric
Original Articles

Toward a general theory of deception

Pages 178-192 | Published online: 24 Jan 2008

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (13)

John-Paul Riordan, Lynn Revell, Bob Bowie, Mary Woolley, Sabina Hulbert & Caroline Thomas. (2023) Understanding and explaining pedagogical problem solving: a video-based grounded theory study of classroom pedagogy. Research in Science & Technological Education 41:4, pages 1309-1329.
Read now
Daniel Arce. (2023) Cybersecurity For Defense Economists. Defence and Peace Economics 34:6, pages 705-725.
Read now
John-Paul Riordan, Mark Hardman & David Cumbers. (2023) Pedagogy Analysis Framework: a video-based tool for combining teacher, pupil & researcher perspectives. Research in Science & Technological Education 41:3, pages 906-927.
Read now
Hwee-rhak Park. (2023) North Korea’s nuclear armament strategy and deception. Defence Studies 23:1, pages 126-147.
Read now
John-Paul Riordan. (2022) A method and framework for video-based pedagogy analysis. Research in Science & Technological Education 40:1, pages 53-75.
Read now
Deqing Li & Eugene Santos$suffix/text()$suffix/text(). (2020) Discriminating deception from truth and misinformation: an intent-level approach. Journal of Experimental & Theoretical Artificial Intelligence 32:3, pages 373-407.
Read now
Sebastiaan Rietjens. (2019) Unraveling Disinformation: The Case of Malaysia Airlines Flight MH17. The International Journal of Intelligence, Security, and Public Affairs 21:3, pages 195-218.
Read now
Hedvig Ördén. (2019) Deferring substance: EU policy and the information threat. Intelligence and National Security 34:3, pages 421-437.
Read now
Amr G. E. Sabet. (2017) Geopolitics of identity: Egypt’s lost peace. Contemporary Arab Affairs 10:1, pages 51-92.
Read now
J. Bowyer Bell. (1995) Dragonworld (II): Deception, tradecraft, and the provisional IRA. International Journal of Intelligence and CounterIntelligence 8:1, pages 21-50.
Read now
Daniel Arce. Disinformation Strategies. Defence and Peace Economics 0:0, pages 1-14.
Read now
Giangiuseppe Pili. A new theory of surprise – unraveling the logic of uncertainty and knowledge. Intelligence and National Security 0:0, pages 1-14.
Read now

Articles from other publishers (59)

Amir Javadpour, Forough Ja'fari, Tarik Taleb, Mohammad Shojafar & Chafika Benzaïd. (2024) A comprehensive survey on cyber deception techniques to improve honeypot performance. Computers & Security 140, pages 103792.
Crossref
Kantwon Rogers, Reiden John Allen Webber, Jinhee Chang, Geronimo Gorostiaga Zubizarreta & Ayanna Howard. (2024) Lie, Repent, Repeat: Exploring Apologies after Repeated Robot Deception. Lie, Repent, Repeat: Exploring Apologies after Repeated Robot Deception.
Qingfeng Xu, Yingnan Shi, Junchao Wang, Tim Miller, Hangding Xu, Tianmu Wang, Hongbin Lin, Xin-Jun Liu & Zhenguo Nie. 2023. Advances in Mechanism, Machine Science and Engineering in China. Advances in Mechanism, Machine Science and Engineering in China 2271 2284 .
Amirhossein Asgharnia, Howard Schwartz & Mohamed Atia. (2022) Learning Deception Using Fuzzy Multi-Level Reinforcement Learning in a Multi-Defender One-Invader Differential Game. International Journal of Fuzzy Systems 24:7, pages 3015-3038.
Crossref
Gordon H. McCormick & Guillermo Owen. (2022) The Role of Deception in a Game of ‘Hide and Seek’. International Game Theory Review 24:03.
Crossref
Demi Harmse. (2022) Propaganda and the war on truth: examining informational inconsistencies governing South Africa’s Covid-19 policy response. EUREKA: Social and Humanities:3, pages 70-90.
Crossref
Ding Xu, Laurie Murphy, Tingzhen Chen & Philip L. Pearce. (2022) Differentiating tourist scam cases: Towards a taxonomy of deceptive schemes. Journal of Hospitality and Tourism Management 50, pages 159-167.
Crossref
Andrew Chadwick & James Stanyer. (2022) Deception as a Bridging Concept in the Study of Disinformation, Misinformation, and Misperceptions: Toward a Holistic Framework. Communication Theory 32:1, pages 1-24.
Crossref
David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland & Keerth Rathakumar. (2021) Deception for Cyber Defence: Challenges and Opportunities. Deception for Cyber Defence: Challenges and Opportunities.
Peta Masters, Wally Smith & Michael Kirley. (2021) Extended Goal Recognition: Lessons from Magic. Frontiers in Artificial Intelligence 4.
Crossref
Ştefan Sarkadi, Alex Rutherford, Peter McBurney, Simon Parsons & Iyad Rahwan. (2021) The evolution of deception. Royal Society Open Science 8:9.
Crossref
Daniel Reti, David Klaasen, Simon Duque Anton & Hans Dieter Schotten. (2021) Secure (S)Hell: Introducing an SSH Deception Proxy Framework. Secure (S)Hell: Introducing an SSH Deception Proxy Framework.
Yoori Hwang & Se-Hoon Jeong. (2021) Consumers’ Response to Format Characteristics in Native Advertising. Journal of Advertising Research 61:2, pages 212-224.
Crossref
Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong & Tanushree Mitra. (2021) Online Social Deception and Its Countermeasures: A Survey. IEEE Access 9, pages 1770-1806.
Crossref
Peta Masters, Wally Smith, Liz Sonenberg & Michael Kirley. 2021. Deceptive AI. Deceptive AI 3 16 .
Kuntal Das, Ellen Gethner, Ersin Dincelli & J. Haadi Jafarian. 2021. Advances in Information and Communication. Advances in Information and Communication 756 771 .
Amirhossein Asgharnia, Howard M. Schwartz & Mohamed Atia. (2020) Deception In The Game of Guarding Multiple Territories: A Machine Learning Approach. Deception In The Game of Guarding Multiple Territories: A Machine Learning Approach.
Ronal Singh, Tim Miller, Joshua Newn, Eduardo Velloso, Frank Vetere & Liz Sonenberg. (2020) Combining gaze and AI planning for online human intention recognition. Artificial Intelligence 284, pages 103275.
Crossref
Zimin Cai, Rusheng Ju, Yunxiu Zeng & Xu Xie. (2020) Deceptive Path Planning in Dynamic Environment. Deceptive Path Planning in Dynamic Environment.
Kai Xu, Yue Hu, Yunxiu Zeng, Quanjun Yin & Mei Yang. (2020) Improving the Scalability of the Magnitude-Based Deceptive Path-Planning Using Subgoal Graphs. Entropy 22:2, pages 162.
Crossref
Kai Xu, Yunxiu Zeng, Long Qin & Quanjun Yin. (2020) Single Real Goal, Magnitude-Based Deceptive Path-Planning. Entropy 22:1, pages 88.
Crossref
Anna Gorbenko & Vladimir Popov. 2020. Biologically Inspired Cognitive Architectures 2019. Biologically Inspired Cognitive Architectures 2019 105 109 .
Palvi Aggarwal, Cleotilde Gonzalez & Varun Dutt. 2020. Handbook of Computer Networks and Cyber Security. Handbook of Computer Networks and Cyber Security 949 959 .
Palvi Aggarwal, Aksh Gautam, Vaibhav Agarwal, Cleotilde Gonzalez & Varun Dutt. 2020. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity 109 121 .
Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis & Michael Bailey. (2019) Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Mohd Alif Erfan Mohd Efendi, Zul-Azri Ibrahim, Md Nabil Ahmad Zawawi, Fiza Abdul Rahim, Nor' Azuwa Muhamad Pahri & Anuar Ismail. (2019) A Survey on Deception Techniques for Securing Web Application. A Survey on Deception Techniques for Securing Web Application.
A. Krasov, R. Petriv, D. Sakharov, N. Storozhuk & I. Ushakov. (2019) Scalable Honeypot Solution for Corporate Networks Security Provision. Proceedings of Telecommunication Universities 5:3, pages 86-97.
Crossref
Cristiano De Faveri & Ana Moreira. (2018) Visual Modeling of Cyber Deception. Visual Modeling of Cyber Deception.
Cristiano De Faveri, Ana Moreira & Vasco Amaral. (2018) Multi-paradigm deception modeling for cyber defense. Journal of Systems and Software 141, pages 32-51.
Crossref
Amin Kharraz, William Robertson & Engin Kirda. (2018) Surveylance: Automatically Detecting Online Survey Scams. Surveylance: Automatically Detecting Online Survey Scams.
Joshua Newn, Fraser Allison, Eduardo Velloso & Frank Vetere. (2018) Looks Can Be Deceiving. Looks Can Be Deceiving.
Mark Hoffman & Martin O. Hofmann. 2018. Advances in Cross-Cultural Decision Making. Advances in Cross-Cultural Decision Making 156 166 .
Cristiano De Faveri, Ana Moreira & Eric Souza. (2017) Deception planning models for cyber security. Deception planning models for cyber security.
Palvi Aggarwal, Cleotilde Gonzalez & Varun Dutt. (2017) Modeling the effects of amount and timing of deception in simulated network scenarios. Modeling the effects of amount and timing of deception in simulated network scenarios.
Albert Galvany. (2017) The court as a battlefield: the art of war and the art of politics in the Han Feizi . Bulletin of the School of Oriental and African Studies 80:1, pages 73-96.
Crossref
Han Bouwmeester. 2017. Netherlands Annual Review of Military Studies 2017. Netherlands Annual Review of Military Studies 2017 125 153 .
Jeffrey Avery & Eugene H. Spafford. 2017. ICT Systems Security and Privacy Protection. ICT Systems Security and Privacy Protection 399 412 .
Nicholas G. Hall. 2016. Optimization Challenges in Complex, Networked and Risky Systems. Optimization Challenges in Complex, Networked and Risky Systems 329 388 .
Cristiano De Faveri, Ana Moreira & Vasco Amaral. (2016) Goal-Driven Deception Tactics Design. Goal-Driven Deception Tactics Design.
Elisabeth Paulson, Booz Allen Hamilton & Christopher Griffin. (2016) Deriving an optimally deceptive policy in two-player iterated games. Deriving an optimally deceptive policy in two-player iterated games.
Palvi Aggarwal, Cleotilde Gonzalez & Varun Dutt. (2016) Looking from the hacker's perspective: Role of deceptive strategies in cyber security. Looking from the hacker's perspective: Role of deceptive strategies in cyber security.
Maryam Kouzehgar, Mohammadali Badamchizadeh & Mohammad-Reza Feizi-Derakhshi. (2016) Ant-Inspired Fuzzily Deceptive Robots. IEEE Transactions on Fuzzy Systems 24:2, pages 374-387.
Crossref
Ricky Cooper, Michael Davis & Ben Van Vliet. (2016) The Mysterious Ethics of High-Frequency Trading. Business Ethics Quarterly 26:1, pages 1-22.
Crossref
Anca Dragan, Rachel Holladay & Siddhartha Srinivasa. (2015) Deceptive robot motion: synthesis, analysis and experiments. Autonomous Robots 39:3, pages 331-345.
Crossref
Mohammed H. Almeshekah & Eugene H. Spafford. (2014) Using Deceptive Information in Computer Security Defenses. International Journal of Cyber Warfare and Terrorism 4:3, pages 63-80.
Crossref
M. Kouzehgar & M.A. Badamchizadeh. (2014) Fuzzy deception game using ant-inspired meta-heuristics. Fuzzy deception game using ant-inspired meta-heuristics.
Mohammed H. Almeshekah & Eugene H. Spafford. (2014) Planning and Integrating Deception into Computer Security Defenses. Planning and Integrating Deception into Computer Security Defenses.
Claire Ferguson. 2014. Profiling and Serial Crime. Profiling and Serial Crime 141 165 .
Samuel T. Trassare, Robert Beverly & David Alderson. (2013) A Technique for Network Topology Deception. A Technique for Network Topology Deception.
Jaeeun Shim & Ronald C. Arkin. (2013) A Taxonomy of Robot Deception and Its Benefits in HRI. A Taxonomy of Robot Deception and Its Benefits in HRI.
Kristin E. Heckman, Michael J. Walsh, Frank J. Stech, Todd A. O'Boyle, Stephen R. DiCato & Audra F. Herber. (2013) Active cyber defense with denial and deception: A cyber-wargame experiment. Computers & Security 37, pages 72-77.
Crossref
Les Humphreys & Moira Peelo. (2012) Understanding Deception: Disentangling Skills from Conviction. The Howard Journal of Criminal Justice 52:1, pages 55-64.
Crossref
Deqing Li & Eugene Santos. (2011) Deception detection in human reasoning. Deception detection in human reasoning.
Alan R. Wagner & Ronald C. Arkin. (2010) Acting Deceptively: Providing Robots with the Capacity for Deception. International Journal of Social Robotics 3:1, pages 5-26.
Crossref
Miles A. McQueen & Wayne F. Boyer. (2009) Deception used for cyber defense of control systems. Deception used for cyber defense of control systems.
Neil C. Rowe. (2007) Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace.
N.C. Rowe. (2004) A model of deception during cyber-attacks on information systems. A model of deception during cyber-attacks on information systems.
N.C. Rowe. (2004) Designing Good Deceptions in Defense of Information Systems. Designing Good Deceptions in Defense of Information Systems.
Gregory Johnson & Eugene Santos. 2004. Advances in Artificial Intelligence. Advances in Artificial Intelligence 339 354 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.