Author:
Rowe Neil C.,Rrushi Julian
Publisher
Springer International Publishing
Reference18 articles.
1. Carofiglio V, de Rosis F, Grassano R, Castelfranchi C (2001) An interactive system for generating arguments in deceptive communication. Lecture notes in computer science, Vol. 2175, Proceedings of the 7th congress of the Italian association for artificial intelligence on advances in artificial intelligence, Springer, New York, pp 255–266
2. Castelfranchi C (2000) Artificial liars: why computers will (necessarily) deceive us and each other. Ethics Inform Technol 2(2):113–119
3. Derrick D, Meservy T, Jenkins J, Burgoon J, Nunamaker J (2013) Detecting deceptive chat-based communication using typing behavior and message cues. ACM Trans Manag Inform Syst 4(2):9.1–9.21
4. Dickson D, Ford R, Laval B (2005) The top ten excuses for bad service (and how to avoid needing them). Organ Dyn 34(2):168–184
5. Erbschloe M (2005) Trojans, worms, and spyware: a computer security professional’s guide to malicious code. Elsevier, Amsterdam, Netherlands