Read Liars and Outliers Online
Authors: Bruce Schneier
zebra mussel larvae
David L. Strayer (2010), “Alien Species in Fresh Waters: Ecological Effects, Interactions With Other Stressors, and Prospects for the Future,”
Freshwater Biology,
55:152–74.
Monk parakeets
Michael A. Russello, Michael L. Avery, and Timothy F. Wright (2008), “Genetic Evidence Links Invasive Monk Parakeet Populations in the United States to the International Pet Trade,”
BMC Evolutionary Biology,
8:217.
crop damage
Eric A. Tillman (2000), “Bird Damage to Tropical Fruit in South Florida,”
The Ninth Wildlife Damage Management Conference Proceedings.
also cause fires
Michael L. Avery (2002), “Monk Parakeet Management at Electric Utility Facilities in South Florida,” Internet Center for Wildlife Damage Management, USDA National Wildlife Research Center Staff Publications. Dan Mangan and Erin Calabrese (21 Apr 2009), “Fowl Play in Qns.: Blackout Parrots' Nests Cut Electricity,”
New York Post
.
state laws vary wildly
Michael A. Russello, Michael L. Avery, and Timothy F. Wright (2008), “Genetic Evidence Links Invasive Monk Parakeet Populations in the United States to the International Pet Trade,”
BMC Evolutionary Biology,
8:217.
Chapter 10
making towels souvenirs
Lynn Yaeger (2 Jun 2009), “Stealing Hotel Amenities: Right or Wrong?”
MSNBC.
reduced towel theft
Sara J. Welch (2011), “Gee, How Did That Towel End Up in My Suitcase,”
New York Times
blog.
patterns of fraud
Yufeng Kou, Chang-Tien Lu, Sirirat Sirwongwattana, and Yo-Ping Huang (2004), “Survey of Fraud Detection Techniques,”
IEEE International Conference on Networking, Sensing and Control, vol. 2
, 749–54. Jon T.S. Quah and M. Sriganesh (2008), “Real-Time Credit Card Fraud Detection Using Computational Intelligence,”
Expert Systems with Applications,
35:1721–32. Edwin Raj Benson and A. Annie Portia (2011), “Analysis on Credit Card Fraud Detection Methods,”
2011 International Conference on Computer, Communication and Electrical Technology
, 152–6. Arturo Elias, Alberto Ochoa-Zezzatti, Alejandro Padilla, and Julio Ponce (2011), “Outlier Analysis for Plastic Card Fraud Detection: A Hybridized and Multi-Objective Approach,”
Hybrid Artificial Intelligence Systems, Lecture Notes in Computer Science,
Springer-Verlag, 6679:1–9. Amlan Kundu, Shamik Sural, and Arun K. Majumdar (2006), “Two-Stage Credit Card Fraud Detection Using Sequence Alignment,”
Information Systems Security, Lecture Notes in Computer Science,
Springer-Verlag, 4332:260–75.
predictive policing programs
Martin B. Short, Maria R. D'Orsogna, Virginia B. Pasour, George E. Tita, P. Jeffrey Brantingham, Andrea L. Bertozzi, and Lincoln B. Chayes (2008), “A Statistical Model of Criminal Behavior,”
Mathematical Models and Methods in Applied Sciences,
18 (Supplement):1249–67. Beth Pearsall (2010), “Predictive Policing: The Future of Law Enforcement?”
NIJ Journal,
266:16–9. Nancy Murray (2011), “Profiling in the Age of Total Information Awareness,”
Race & Class
, 51:3–24.
Timothy McVeigh's van
Associated Press (28 Sep 2009), “Attorney: Oklahoma City Bombing Tapes Appear Edited,”
Oklahoman.
reduce car theft
Ian Ayres and Steven Levitt (1998), “Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack,”
Quarterly Journal of Economics,
113:43–77. Marco Gonzalez-Navarro (2008), “Deterrence and Displacement in Auto Theft,” Center for Economic Policy Studies Working Paper.
confidence in vaccines
Heidi Larson, Louis Z. Cooper, Juhani Eskola, Samuel L. Katz, and Scott Ratzan (6 Aug 2011), “Addressing the Vaccine Confidence Gap,”
The Lancet,
378:526–35.
new version of Monopoly
Stephanie Clifford (16 Feb 2011), “No Dice, No Money, No Cheating. Are You Sure This is Monopoly?”
New York Times.
Crime Prevention Techniques
Ronald V. Clarke and John Eck (2003),
Become a Problem Solving Crime Analyst
, Willan Publishing. Derek B. Cornish and Ronald V. Clarke (2003) “Opportunities, Precipitators and Criminal Decisions,” in
Theory for Practice in Situational Crime Prevention, Crime Prevention Studies, Vol. 16
, Criminal Justice Press.
enforcing anti-doping
David R. Mottram, ed. (2011),
Drugs in Sport, Fifth Edition,
Taylor & Francis.
Alex Zülle
John Hoberman (20 Sep 2007), “Dopers on Wheels: The Tour's Sorry History,” MSNBC.
almost a third
Patrick Mignon (2003), “The Tour de France and the Doping Issue,”
International Journal of the History of Sport,
20:227–45.
never intended
Jamey Keaten (20 Jul 2007), “At Tour de France, Asthma Inhalers Can Be a Rider's Best Friend,”
USA Today.
stripped of her gold medal Sports Illustrated
(28 Sep 2000), “Arbitrators Uphold Decision to Strip Raducan of Gold,” CNN.
install security cameras
Bruce Schneier (26 Jun 2008), “CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere,”
The Guardian.
full-body scanners
Bruce Schneier (2 Dec 2010), “Why the TSA Can't Back Down,”
The Atlantic
.
military spends billions
New York Times (2 Oct 1984), “A Lemon the Size of the Pentagon,”
New York Times.
Michael Ditton (Aug 1988), “The DIVAD Procurement: A Weapon System Case Study,”
The Army Lawyer
, 3–9. Irene Willhite (Mar 2002), “40-mm Division Air Defense Gun: DIVAD (Sgt. York),”
Cold War Times,
15–22.
better slugs
Ronald V. Clarke, Ronald P. Cody, and Mangai Natarajan (1994), “Subway Slugs: Tracking Displacement on the London Underground,”
British Journal of Criminology,
34:122–38.
door locks and safes
Mark Weber Thomas (2000),
Locks, Safes and Security,
Second Edition, Charles Thomas Publisher, Ltd. Matt Blaze (2003), “Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks,” IEEE Security and Privacy. Matt Blaze (2004), “Safecracking for the Computer Scientist,”
U. Penn CIS Department Technical Report.
fax machines
Bruce Schneier (29 May 2008), “Why Do We Accept Signatures by Fax?”
Wired News
.
Electronic voting machines
Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten (2006), “Security Analysis of the Diebold AccuVote-TS Voting Machine,” Center for Information Technology Policy, Princeton University. Adam Aviv, Pavol Cerny, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, and Matt Blaze (2008), “Security Evaluation of ES&S Voting Machines and Election Management System,” USENIX/ACCURATE Electronic Voting Technology Workshop (EVT ‘08), paper presented at “USENIX/ACCURATE. Hari K. Prasad, J. Alex Halderman, Rop Gonggrijp, Scott Wolchok, Eric Wustrow, Arun Kankipati, Sai Krishna Sakhamuri, and Vasavya Yagati (2010), “Security Analysis of India's Electronic Voting Machines,”
Proceedings of the 17th ACM Conference on Computer and Communications Security,
Association of Computing Machinery. Doug Jones and Barbara Simons (2012),
Broken Ballots: Will Your Vote Count in the Electronic Age?
CSLI Publications.
electronics in cars
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno (2011), “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” USENIX Security.
Networked medical devices
William H. Maisel and Tadayoshi Kohno (2010), “Improving the Security and Privacy of Implantable Medical Devices,”
New England Journal of Medicine,
362:1164–6.
cursive is not being taught
Katie Zezima (28 Apr 2011), “The Case for Cursive,”
New York Times.
read trust signals
Jens Riegelsberger, M. Angela Sasse, and John D. McCarthy (2005), “The Mechanics of Trust: A Framework for Research and Design,”
International Journal of Human-Computer Studies,
62:381–422.
harder-to-forge ID
Bruce Schneier (2007), “Will REAL ID Actually Make Us Safer? An Examination of Privacy and Civil Liberties Concerns,” testimony to the Senate Judiciary Committee.
spent about $1 trillion
John Mueller and Mark Stewart (2011),
Terrorism, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security
, Oxford University Press.
doesn't count the wars
Linda J. Bilmes and Joseph E. Stiglitz (2008),
The Three Trillion Dollar War: The True Cost of the Iraq Conflict,
W.W. Norton & Co.
cost-benefit analysis
Gary Becker (1968), “Crime and Punishment: An Economic Approach,”
The Journal of Political Economy
, 76:169–217.
passion overrides rationality
Howard Engel (2001),
Crimes of Passion: An Unblinking Look at Murderous Love
, Firefly Books.
Chapter 11
Rhonda Breard embezzled
Kevin Opsahl (11 Aug 2010), “Kirkland Broker Rhonda Breard to Spend Nearly Seven Years in Prison for Fraud,”
Seattle Post-Intelligencer.
Envy can motivate
Simone Moran and Maurice E. Schweitzer (2008), “When Better is Worse: Envy and the Use of Deception,”
Negotiation & Conflict Management Research,
1:3–29.
things out of anger
Yang Wang, Saranga Komanduri, Pedro Giovanni Leon, Gregory Norcie, Alessandro Acquisti, and Lorrie Faith Cranor (2011), “'I Regretted the Minute I Pressed Share': A Qualitative Study of Regrets on Facebook,”
Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS2011).
heinous behavior
Ervin Staub (1992),
The Roots of Evil: The Origins of Genocide and Other Group Violence
, Cambridge University Press.
extreme situations
David DeSteno and Piercarlo Valdesolo (2011),
Out of Character: Surprising Truths About the Liar, Cheat, Sinner (and Saint) Lurking in All of Us
, Crown Archetype.
lethal altruists
Adolf Tobeña (2009), “Lethal Altruists: Itineraries along the Dark Outskirts of Moralistic Prosociality,”
Annals of the New York Academy of Sciences,
1167:5–15.
Abraham Maslow
Abraham H. Maslow (1943), “A Theory of Human Motivation,”
Psychological Review,
50:370–96.
Rational Choice Theory
Gary S. Becker (1976),
The Economic Approach to Human Behavior
, University of Chicago Press.
Bounded Rationality
Bryan D. Jones (1999), “Bounded Rationality,”
Annual Review of Political Science,
2:297–321. Daniel Kahneman (2003), “Maps of Bounded Rationality: Psychology for Behavioral Economics,”
The American Economic Review,
93:1449–75. Gerd Gigerenzer (2007),
Gut Feelings: The Intelligence of the Unconscious
, Viking Adult. Dan Ariely (2008),
Predictably Irrational: The Hidden Forces that Shape our Decisions
, Harper Perennial. Ori Brafman and Rom Brafman (2008),
Sway: The Irresistible Pull of Irrational Behavior
, Crown Business. Shankar Vedantam (2010),
The Hidden Brain: How Our Unconscious Minds Elect Presidents, Control Markets, Wage Wars, and Save our Lives
, Spiegel & Grau. Daniel Kahneman (2011),
Thinking Fast and Slow
, Farrar, Straus and Giroux. Duncan J. Watts (2011),
Everything is Obvious: *Once You Know the Answer
, Crown Business.
trade-off process
Bruce Schneier (2008), “The Psychology of Security,”
AFRICACRYPT 2008,
Springer-Verlag, 50–79. Daniel Gardner (2008),
The Science of Fear: Why We Fear the Things We Shouldn't—and Put Ourselves in Greater Danger,
Dutton Adult. Paul Slovic (2000),
The Perception of Risk,
Earthscan Publications Ltd. Barry Glassner (1999),
The Culture of Fear: Why Americans Are Afraid of the Wrong Things,
Basic Books.
different type of trade-off
Lawrence Kohlberg (1981),
Essays on Moral Development, Vol. I: The Philosophy of Moral Development
, Harper & Row.
Kohlberg's Stages
University of Canberra Faculty of Education (2011), “University of Canberra Graduate Diploma of Education E-reserve Lecture Notes: Ed Foundations, Module B, Part 3.”
Emily Dickinson
Emily Dickinson (1862), “The soul selects her own society,” poem 303.
morality to be central
William Damon (1984), “Self-Understanding and Moral Development from Childhood to Adolescence, “ in William M. Kurtines and Jacob L. Gewirtz, eds.,
Morality, Moral Behavior, and Moral Development,
John Wiley & Sons.
spiritual geniuses
René Girard (1999),
Je Vois Satan Tomber Comme l'Éclair,
Grasset English translation (2001),
I See Satan Fall Like Lightning,
Orbis Books.
Ralph Waldo Emerson
Ralph Waldo Emerson (1841), “Self-Reliance,” in
Essays: First Series.
Henry David Thoreau
Henry David Thoreau (1852),
Walden
.