S Greengard - Communications of the ACM, 2019 - dl.acm.org
Deep insecurities: the internet of things shifts technology risk Page 1 20 COMMUNICATIONS OF THE ACM | MAY 2019 | VOL. 62 | NO. 5 news IMA GE B Y INKED PIXEL S entered through …
Attribution is central to cybersecurity politics. It establishes a link between technical occurrences and political consequences by reducing the uncertainty about who is behind an …
The public is convinced that beliefs in conspiracy theories are increasing, and many scholars, journalists, and policymakers agree. Given the associations between conspiracy …
S Gordon - IEEE security & privacy, 2006 - ieeexplore.ieee.org
In this column, I explain why understanding the cyber adversary-virus writers, for example-is important and explore the history of both public perceptions and reality, which might not …
M Grzesiak-Feldman - The psychology of conspiracy, 2015 - api.taylorfrancis.com
In social psychology, conspiracy theories are often approached in terms of their motivational underpinnings. This chapter considers conspiracy theories as reflecting an ordinary mode of …
Objective This study disentangles the known correlates of conspiracy beliefs—such as the general predisposition toward conspiratorial thinking, authoritarianism, and partisan and …
In this introduction to the EJSP Special Issue on conspiracy theories as a social psychological phenomenon, we describe how this emerging research domain has …
Past research suggests that certain content features of conspiracy theories may foster their credibility. In two experimental studies (N= 293), we examined whether conspiracy theories …