The language of cyber attacks: a rhetoric of deception
"Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Bloomsbury Academic
2024
|
Schriftenreihe: | Bloomsbury studies in digital cultures
Bloomsbury collections |
Schlagworte: | |
Online-Zugang: | DE-12 Volltext |
Zusammenfassung: | "Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages? This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication." |
Beschreibung: | 1 Online-Ressource (240 Seiten) |
ISBN: | 9781350354715 9781350354692 9781350354708 |
DOI: | 10.5040/9781350354715 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV049830580 | ||
003 | DE-604 | ||
005 | 20241204 | ||
007 | cr|uuu---uuuuu | ||
008 | 240823s2024 xxk o|||| 00||| eng d | ||
020 | |a 9781350354715 |c online |9 978-1-350-35471-5 | ||
020 | |a 9781350354692 |c epdf |9 978-1-350-35469-2 | ||
020 | |a 9781350354708 |c epub |9 978-1-350-35470-8 | ||
024 | 7 | |a 10.5040/9781350354715 |2 doi | |
035 | |a (OCoLC)1454747987 | ||
035 | |a (DE-599)KEP10610036X | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c XA-GB | ||
049 | |a DE-12 | ||
084 | |a AP 15944 |0 (DE-625)6957: |2 rvk | ||
100 | 1 | |a Mauro, Aaron |e Verfasser |0 (DE-588)131683168X |4 aut | |
245 | 1 | 0 | |a The language of cyber attacks |b a rhetoric of deception |c Aaron Mauro |
264 | 1 | |a London |b Bloomsbury Academic |c 2024 | |
300 | |a 1 Online-Ressource (240 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Bloomsbury studies in digital cultures | |
490 | 0 | |a Bloomsbury collections | |
520 | 3 | |a "Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages? This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication." | |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rhetorik |0 (DE-588)4076704-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerlinguistik |0 (DE-588)4035843-4 |2 gnd |9 rswk-swf |
653 | 1 | |a Cybercrime and cybersecurity research | |
653 | 0 | |a Computational linguistics | |
653 | 0 | |a Computer security | |
653 | 0 | |a Literary studies: from c 1900 - | |
653 | 0 | |a Literary theory | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Computerlinguistik |0 (DE-588)4035843-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 1 | 1 | |a Rhetorik |0 (DE-588)4076704-8 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-188 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hbk |z 978-1-350-35468-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, pbk |z 978-1-350-35467-8 |
856 | 4 | 0 | |u https://doi.org/10.5040/9781350354715?locatt=label:secondary_bloomsburyCollections |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-162-BCL | ||
940 | 1 | |q ZDB-162-BCL24 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035170558 | |
966 | e | |u https://doi.org/10.5040/9781350354715?locatt=label:secondary_bloomsburyCollections |l DE-12 |p ZDB-162-BCL |q ZDB-162-BCL24 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1817499775990235136 |
---|---|
adam_text | |
any_adam_object | |
author | Mauro, Aaron |
author_GND | (DE-588)131683168X |
author_facet | Mauro, Aaron |
author_role | aut |
author_sort | Mauro, Aaron |
author_variant | a m am |
building | Verbundindex |
bvnumber | BV049830580 |
classification_rvk | AP 15944 |
collection | ZDB-162-BCL |
ctrlnum | (OCoLC)1454747987 (DE-599)KEP10610036X |
discipline | Allgemeines |
doi_str_mv | 10.5040/9781350354715 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV049830580</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241204</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240823s2024 xxk o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781350354715</subfield><subfield code="c">online</subfield><subfield code="9">978-1-350-35471-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781350354692</subfield><subfield code="c">epdf</subfield><subfield code="9">978-1-350-35469-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781350354708</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-350-35470-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.5040/9781350354715</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1454747987</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP10610036X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 15944</subfield><subfield code="0">(DE-625)6957:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mauro, Aaron</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131683168X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The language of cyber attacks</subfield><subfield code="b">a rhetoric of deception</subfield><subfield code="c">Aaron Mauro</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Bloomsbury Academic</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (240 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Bloomsbury studies in digital cultures</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Bloomsbury collections</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages? This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication."</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rhetorik</subfield><subfield code="0">(DE-588)4076704-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerlinguistik</subfield><subfield code="0">(DE-588)4035843-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="1"><subfield code="a">Cybercrime and cybersecurity research</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computational linguistics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Literary studies: from c 1900 -</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Literary theory</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerlinguistik</subfield><subfield code="0">(DE-588)4035843-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Rhetorik</subfield><subfield code="0">(DE-588)4076704-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hbk</subfield><subfield code="z">978-1-350-35468-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, pbk</subfield><subfield code="z">978-1-350-35467-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.5040/9781350354715?locatt=label:secondary_bloomsburyCollections</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-162-BCL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-162-BCL24</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035170558</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.5040/9781350354715?locatt=label:secondary_bloomsburyCollections</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-162-BCL</subfield><subfield code="q">ZDB-162-BCL24</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049830580 |
illustrated | Not Illustrated |
indexdate | 2024-12-04T09:00:56Z |
institution | BVB |
isbn | 9781350354715 9781350354692 9781350354708 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035170558 |
oclc_num | 1454747987 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | 1 Online-Ressource (240 Seiten) |
psigel | ZDB-162-BCL ZDB-162-BCL24 ZDB-162-BCL ZDB-162-BCL24 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Bloomsbury Academic |
record_format | marc |
series2 | Bloomsbury studies in digital cultures Bloomsbury collections |
spelling | Mauro, Aaron Verfasser (DE-588)131683168X aut The language of cyber attacks a rhetoric of deception Aaron Mauro London Bloomsbury Academic 2024 1 Online-Ressource (240 Seiten) txt rdacontent c rdamedia cr rdacarrier Bloomsbury studies in digital cultures Bloomsbury collections "Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages? This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication." Cyberattacke (DE-588)1075612675 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rhetorik (DE-588)4076704-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computerlinguistik (DE-588)4035843-4 gnd rswk-swf Cybercrime and cybersecurity research Computational linguistics Computer security Literary studies: from c 1900 - Literary theory Internetkriminalität (DE-588)7864395-8 s Computerlinguistik (DE-588)4035843-4 s DE-604 Cyberattacke (DE-588)1075612675 s Rhetorik (DE-588)4076704-8 s Computersicherheit (DE-588)4274324-2 s DE-188 Erscheint auch als Druck-Ausgabe, hbk 978-1-350-35468-5 Erscheint auch als Druck-Ausgabe, pbk 978-1-350-35467-8 https://doi.org/10.5040/9781350354715?locatt=label:secondary_bloomsburyCollections Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Mauro, Aaron The language of cyber attacks a rhetoric of deception Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd Rhetorik (DE-588)4076704-8 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerlinguistik (DE-588)4035843-4 gnd |
subject_GND | (DE-588)1075612675 (DE-588)4274324-2 (DE-588)4076704-8 (DE-588)7864395-8 (DE-588)4035843-4 |
title | The language of cyber attacks a rhetoric of deception |
title_auth | The language of cyber attacks a rhetoric of deception |
title_exact_search | The language of cyber attacks a rhetoric of deception |
title_full | The language of cyber attacks a rhetoric of deception Aaron Mauro |
title_fullStr | The language of cyber attacks a rhetoric of deception Aaron Mauro |
title_full_unstemmed | The language of cyber attacks a rhetoric of deception Aaron Mauro |
title_short | The language of cyber attacks |
title_sort | the language of cyber attacks a rhetoric of deception |
title_sub | a rhetoric of deception |
topic | Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd Rhetorik (DE-588)4076704-8 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerlinguistik (DE-588)4035843-4 gnd |
topic_facet | Cyberattacke Computersicherheit Rhetorik Internetkriminalität Computerlinguistik |
url | https://doi.org/10.5040/9781350354715?locatt=label:secondary_bloomsburyCollections |
work_keys_str_mv | AT mauroaaron thelanguageofcyberattacksarhetoricofdeception |