Completed
Detecting deception
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Every ROSE Has Its Thorn - The Dark Art of Remote Online Social Engineering
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Traditional online deception types
- 3 Catfishing
- 4 Case study I: Mark and John (UK, 2003)
- 5 Case study II: Robin Sage (US, 2010)
- 6 Chapter II: Attack
- 7 Filters
- 8 Methodology outline
- 9 Persona construction
- 10 Establishing credibility
- 11 Building a synthetic network
- 12 The hook
- 13 Maintenance
- 14 Priming
- 15 The pay-off
- 16 Case study IV: Mia Ash (Middle East, 2017)
- 17 Case study V: Syria, 2015
- 18 Ethics and legality
- 19 Chapter III: Defence
- 20 Challenges for defenders
- 21 Understanding deception
- 22 Why do we fall for it?
- 23 Interpersonal deception theory
- 24 Expanded prominence-interpretation theory
- 25 Media richness theory
- 26 Media synchronicity theory
- 27 Communication accommodation theory
- 28 Cognitive load
- 29 Strategies, processes and detection
- 30 Detecting deception
- 31 Linguistic markers
- 32 Forensic linguistics
- 33 Case study VI: Diederik Stapel
- 34 Passive detection
- 35 Active detection
- 36 Chapter IV: Fighting back
- 37 Turning the tables
- 38 Case study VII: Shannen Rossmiller
- 39 Chapter V: Conclusions
- 40 ROSE detection checklist
- 41 Future research
- 42 Shameless plug
- 43 Black Hat Sound Bytes
- 44 Feedback, questions, collaboration
- 45 References