Hancock et al., 2015 - Google Patents
Deception with technologyHancock et al., 2015
View PDF- Document ID
 - 2533141807551027985
 - Author
 - Hancock J
 - Guillory J
 - Publication year
 - Publication venue
 - The handbook of the psychology of communication technology
 
External Links
Snippet
This chapter proposes that there are several key factors that need to be considered to  understand deception in the networked age, including biases and heuristics unique to  deception, the transformation of the interaction space. The cues heuristic, though a powerful … 
    - 238000005516 engineering process 0 title abstract description 43
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q30/00—Commerce, e.g. shopping or e-commerce
 - G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
 - G06Q30/0241—Advertisement
 - G06Q30/0251—Targeted advertisement
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q10/00—Administration; Management
 - G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
 - G06Q10/107—Computer aided management of electronic mail
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q10/00—Administration; Management
 - G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
 - G06Q10/109—Time management, e.g. calendars, reminders, meetings, time accounting
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
 - G06Q50/01—Social networking
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
 - H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
 - H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
 - G06Q50/10—Services
 - G06Q50/20—Education
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q20/00—Payment architectures, schemes or protocols
 - G06Q20/38—Payment protocols; Details thereof
 - G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L12/00—Data switching networks
 - H04L12/54—Store-and-forward switching systems
 - H04L12/58—Message switching systems, e.g. electronic mail systems
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
 - H04L67/24—Presence management
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
 - H04L67/22—Tracking the activity of the user
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Hancock et al. | The social impact of deepfakes | |
| Hancock et al. | Deception with technology | |
| Davis et al. | Tweens' conceptions of privacy online: Implications for educators | |
| Kopp et al. | The role of love stories in romance scams: A qualitative analysis of fraudulent profiles | |
| WO2008141255A1 (en) | Secure social networking system with anti-predator monitoring | |
| Hockin et al. | The revolution might not be televised (but it will be lived streamed) future directions for research on police–minority relations | |
| Ordoñez et al. | “Tipping point” in the SoS? Minority-supportive opinion climate proportion and perceived hostility in uncivil online discussion | |
| Marret et al. | Victimization after meeting with online acquaintances: A cross-sectional survey of adolescents in Malaysia | |
| Hellmann et al. | Talking about visually perceived events: Communication effects on eyewitness memory | |
| Markowitz et al. | Interpersonal dynamics in online dating: Profiles, matching, and discovery | |
| Schellmann | The Algorithm: How AI decides who gets hired, monitored, promoted, and fired and why we need to fight back now | |
| Boscarino | Is seeing believing? Comparing the influence of textual and visual policy narratives on public opinion | |
| Turnbull | Media audiences: is anybody watching? | |
| Carpenter | Imagine me and you, I do: Characteristics and functions of imagined interactions during online dating | |
| Anderson et al. | Exploring the roles played by trust and technology in the online investment fraud victimisation process | |
| Nabeth | Identity of identity | |
| Ghani et al. | Cybercrime experience's impact on women's emotions: A case study in Penang | |
| Cole | Radicalisation in virtual worlds: Second Life through the eyes of an avatar | |
| Lohmann et al. | 15-Minute Focus: Digital Citizenship: Supporting Youth Navigating Technology in a Rapidly Changing World | |
| Bettencourt | Empirical assessment of risk factors: How online and offline lifestyle, social learning, and social networking sites influence crime victimization | |
| Buford | The dark triad and dark behaviors: an analysis of the relationship between social networking sites, deviant behaviors, and the dark triad | |
| Mwangi | The influence of Social Media on the maintenance of romantic relationships among college students: A case of undergraduate students in the United States International University-Africa | |
| Green et al. | Trust, deception, and identity on the internet | |
| JAMES | INFLUENCE OF SOCIAL MEDIA ON SECONDARY SCHOOL STUDENTS’BEHAVIOUR IN MACHAKOS SUB-COUNTY, MACHAKOS COUNTY, KENYA | |
| Reddy | Higher Education Students' Awareness Of The Risk Associated With Using Facebook. |