Classical approaches to cyber-security—isolation, monitoring, and the like—are a good starting point for defending against attacks, regardless of perpetrator. But implementations of those approaches in hardware and/or software can invariably be circumvented by insiders, individuals who abuse privileges and access their trusted status affords.Read More
Dark patterns are user interfaces that benefit an online service by leading users into making decisions they might not otherwise make. Some dark patterns deceive users while others covertly manipulate or coerce them into choices that are not in their best interests.Read More
In this article, we focus on a set of pathological personality traits known as the dark triad. Evidence from recent insider threat cases leads us to believe these traits may correlate with intentions to engage in malicious behavior.23 After discussing insider threats and the dark triad traits, we present results from an empirical study that illustrate the relationship between the dark triad traits and malicious intent. We then discuss the importance of these results and make recommendations for security managers and practitioners based on our findings.Read More
For the first time, the Cambridge Analytica whistleblower tells the inside story of the data mining and psychological manipulation behind the election of Donald Trump and the Brexit referendum, connecting Facebook, WikiLeaks, Russian intelligence, and international hackers.Read More
Communications of the ACM, June 2018, Vol. 61 No. 6, Pages 18-19
By Logan Kugler
“Facebook and Google lead the way in this arena. Facebook allows users to customize their personal profile to their liking and indicate their interests by engaging with content. Every reaction a user has to a post teaches Facebook’s algorithms his/her preferences; these algorithms then serve more content that even better matches the user’s preferences.
The result? The user visits and revisits the site, staying for longer, making them a richer target for advertising.”Read More