Link Search Menu Expand Document

This is the mobile-friendly web version of the original article.

Assessing the Credibility of Cyber Adversaries

International Journal of Cybersecurity Intelligence & Cybercrime


Volume 4 Issue 1, Article 2


4-5-2021

Jenny A. Wells, Australian Signals Directorate, Australia

Dana S. LaFon, National Security Agency, U.S.A.

Margaret Gratian, National Security Agency, U.S.A.

Video: Inside the NSA: John Miller takes a look at agency’s inner workings

Recommended Citation Wells, J. A., LaFon, D. S., & Gratian, M. (2021). Assessing the Credibility of Cyber Adversaries, International Journal of Cybersecurity Intelligence & Cybercrime, 4(1), 3-24. https://www.doi.org/10.52306/04010221FHTE2115

This item is available as part of Virtual Commons, the open-access institutional repository of Bridgewater State University, Bridgewater, Massachusetts. Copyright © 4-5-2021 Jenny A. Wells, Dana S. LaFon, and Margaret Gratian

  1. Abstract:

Keywords; Credibility, trust, deception, online credibility

Abstract:

Online communications are ever increasing, and we are constantly faced with the challenge of whether online information is credible or not. Being able to assess the credibility of others was once the work solely of intelligence agencies. In the current times of disinformation and misinformation, understanding what we are reading and to who we are paying attention to is essential for us to make considered, informed, and accurate decisions, and it has become everyone’s business. This paper employs a literature review to examine the empirical evidence across online credibility, trust, deception, and fraud detection in an effort to consolidate this information to understand adversary online credibility – how do we know with whom we are conversing is who they say they are? Based on this review, we propose a model that includes examining information as well as user and interaction characteristics to best inform an assessment of online credibility. Limitations and future opportunities are highlighted.


Corresponding author Jenny Wells, Australian Signals Directorate, Russell Offices, Russell, ACT, 2600, Australia Email: [email protected]

Reproduction, posting, transmission or other distribution or use of the article or any material therein, in any medium as permitted by written agreement of the International Journal of Cybersecurity Intelligence and Cybercrime, requires credit to the Journal as follows: “This Article originally appeared in International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC), 2021 Vol. 4, Iss. 1, pp. 3-24” and notify the Journal of such publication.

© 2021 IJCIC 2578-3289/2021/03



Table of contents