b'
Welcome to the Social-Engineer Podcast: The Doctor Is In Series \\u2013 where we will discuss understandings and developments in the field of psychology.
\\xa0
In today\\u2019s episode, Chris and Abbie are discussing the psychology of Con Artists. What motivates them, why people fall for them, and how you can protect yourself. [Sept 4, 2023]
\\xa0
00:00 - Intro
00:30 - Dr. Abbie Maro\\xf1o Intro
01:11 - Intro Links
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 Social-Engineer.com\\xa0- http://www.social-engineer.com/
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 Managed Voice Phishing\\xa0- https://www.social-engineer.com/services/vishing-service/
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 Managed Email Phishing\\xa0- https://www.social-engineer.com/services/se-phishing-service/
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 Adversarial\\xa0Simulations\\xa0- https://www.social-engineer.com/services/social-engineering-penetration-test/
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 Social-Engineer channel on SLACK\\xa0- https://social-engineering-hq.slack.com/ssb
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 CLUTCH\\xa0- http://www.pro-rock.com/
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 innocentlivesfoundation.org\\xa0- http://www.innocentlivesfoundation.org/
04:58 - The Topic of the Day: Con Artists
06:27 - Definition & Motivation
09:10 - The Empathy Difference
14:57 - Narcissist or Machiavellian???
20:47 - A Good (Bad) Example
22:49 - Ego & Power
24:46 - The Hacker Mindset
30:54 - Cybercrime Variants
35:29 - The Power of Trust
38:43 - Take a Second
43:55 - Wrap Up
44:18 - Next Month: Mimicry\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0
44:33 - Outro
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 www.social-engineer.com
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 www.innocentlivesfoundation.org
\\xa0
Find us online:
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 Twitter: https://twitter.com/abbiejmarono
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 LinkedIn: linkedin.com/in/dr-abbie-maro\\xf1o-phd-35ab2611a
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 Twitter: https://twitter.com/humanhacker
-\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0 LinkedIn: linkedin.com/in/christopherhadnagy
\\xa0
References:
Allchin, D. (2012). Science con-artists. The american biology Teacher, 74(9), 661-666.
Benson, M.L. 1985, \\u201cDenying the guilty mind: Accounting for involvement in white collar crime\\u201d, Criminology, vol. 23, pp. 583\\u2013607
Blythe, M., Petrie, H., & Clark, J. A. (2011, May). F for fake: four studies on how we fall for phish. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 3469-3478).
Cowan, L. (2014). The Psychopath: What\'s Love Got to Do with It?. Psychological Perspectives, 57(3), 291-311.
DSM-IV Task Force 1994, Diagnostic and Statistical Manual of Mental Disorders (fourth edition), American Psychiatric Association, Washington DC
Duffield, G. M., & Grabosky, P. N. (2001). The psychology of fraud (Vol. 199). Canberra: Australian Institute of criminology.
Fisher, K. (2015). The Psychology of Fraud: What Motivates Fraudsters to Commit Crime?. Available at SSRN 2596825.
Frankel, T. (2012). The Ponzi scheme puzzle: A history and analysis of con artists and victims. Oxford University Press.
Hare, R. D. (1999). Without conscience: The disturbing world of the psychopaths among us. Guilford Press.
Konnikova, M. (2017). The confidence game: Why we fall for it... Every time. Penguin.
Krambia-Kapardis, M 2001, Enhancing the Auditor\\u2019s Fraud Detection Ability: An Interdisciplinary Approach, Peter Lang, Frankfurt am Main.
Muscanell, N. L., Guadagno, R. E., & Murphy, S. (2014). Weapons of influence misused: A social influence analysis of why people fall prey to internet scams. Social and Personality Psychology Compass, 8(7), 388-396.
Teitcher, J. E., Bockting, W. O., Bauermeister, J. A., Hoefer, C. J., Miner, M. H., & Klitzman, R. L. (2015). Detecting, preventing, and responding to \\u201cfraudsters\\u201d in internet research: ethics and tradeoffs. Journal of Law, Medicine & Ethics, 43(1), 116-133.
'