2013 46th Hawaii International Conference on System Sciences 2013
DOI: 10.1109/hicss.2013.633
|View full text |Cite
|
Sign up to set email alerts
|

Xbox 360 Hoaxes, Social Engineering, and Gamertag Exploits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Jamming communications have been used in virtual game worlds. Podhradsky et al 22 found multiplayer games in consoles can be hacked to provide access to a user's IP address. Would-be deceivers who gain access to the host can kick the player out and proceed with identity-theft deception.…”
Section: Challengesmentioning
confidence: 99%
“…Jamming communications have been used in virtual game worlds. Podhradsky et al 22 found multiplayer games in consoles can be hacked to provide access to a user's IP address. Would-be deceivers who gain access to the host can kick the player out and proceed with identity-theft deception.…”
Section: Challengesmentioning
confidence: 99%
“…Manipulating content involves tampering with images [18] or even text as can be seen in collaborative projects such as Wikipedia where special user task forces are focused on monitoring for text manipulation with the intention to spread inaccurate information [5]. Communication channels can be tampered with to disrupt communications of a user in an attempt to access his/her account or cause confusion between two parties (e.g., a case that can be observed online in video gaming consoles) [19]. Identity deception (a subcategory of deception) focuses on manipulating the sender's information [20] and can be divided into three categories: identity concealment (e.g., concealing or altering part of an individual's identity), identity theft (e.g., mimicking another person's real identity) and identity forgery (e.g., forging a fictional identity) [6].…”
Section: A Deception and Identity Deceptionmentioning
confidence: 99%
“…Information can be retrieved easily with the right tools and methods. Sometimes our colleagues can use a shoulder surfing [1] to get the information about the password which can retrieve the information. With that, it is time to think how to provide privacy and security the information.…”
Section: Introductionmentioning
confidence: 99%