Long-term, I’m not even done compiling my research outline yet! I’m sure I will make many references to the classic book by Influence by Robert B. Cialdini, and ultimately intend to do some real scholarly research, especially on defensive techniques.
For this week, I’m just cross-referencing and filtering some of the points from this one malware writer’s popular post (and possibly a few more points from a former car salesman friend of mine) with studies from Thinking, Fast and Slow. For defense, this week we’re mostly going to talk about recognizing situations where someone is most likely to consciously use some of these techniques on you, and the warning signs of someone using them. Mostly situations where the best defense is to discontinue conversation and leave.
This sounds like an interesting topic! Could you link to any sources you’re using?
Long-term, I’m not even done compiling my research outline yet! I’m sure I will make many references to the classic book by Influence by Robert B. Cialdini, and ultimately intend to do some real scholarly research, especially on defensive techniques.
For this week, I’m just cross-referencing and filtering some of the points from this one malware writer’s popular post (and possibly a few more points from a former car salesman friend of mine) with studies from Thinking, Fast and Slow. For defense, this week we’re mostly going to talk about recognizing situations where someone is most likely to consciously use some of these techniques on you, and the warning signs of someone using them. Mostly situations where the best defense is to discontinue conversation and leave.