{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:26:52Z","timestamp":1773156412005,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032080660","type":"print"},{"value":"9783032080677","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08067-7_2","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:20Z","timestamp":1760301440000},"page":"23-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Choice Overload to\u00a0Degrade Cyber Attacks"],"prefix":"10.1007","author":[{"given":"Asif","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Natividad","sequence":"additional","affiliation":[]},{"given":"Md Abu","family":"Sayed","sequence":"additional","affiliation":[]},{"given":"Palvi","family":"Aggarwal","sequence":"additional","affiliation":[]},{"given":"Christopher D.","family":"Kiekintveld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Gutzwiller, R., Ferguson-Walter, K., Fugate, S., Rogers, A.: \u201cOh, look, a butterfly!\u201d A framework for distracting attackers to improve cyber defense. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 62, pp. 272\u2013276. SAGE Publications, Los Angeles (2018)","DOI":"10.1177\/1541931218621063"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1086\/208579","volume":"1","author":"J Jacoby","year":"1974","unstructured":"Jacoby, J., Speller, D.E., Berning, C.K.: Brand choice behavior as a function of information load: replication and extension. J. Consum. Res. 1(1), 33\u201342 (1974)","journal-title":"J. Consum. Res."},{"issue":"1","key":"2_CR3","first-page":"1","volume":"1","author":"M Almeshekah","year":"2016","unstructured":"Almeshekah, M., Spafford, E.H.: Planning and integrating deception into computer security defenses. J. Cyber Secur. Technol. 1(1), 1\u201317 (2016)","journal-title":"J. Cyber Secur. Technol."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Heckman, M., Walsh, T., Stech, F., Thomas, R., Hernandez, J., Hilliard, R.: Cyber denial deception and counterdeception: a survey. In: Cyber Deception, pp. 9\u201339. Springer (2015)","DOI":"10.1007\/978-3-319-25133-2"},{"key":"2_CR5","unstructured":"Bowyer Bell, J., Whaley, B.: Cheating and Deception. Transaction Publishers (1975)"},{"key":"2_CR6","unstructured":"Redmiles, E.M., Kross, S., Mazurek, M.L.: The tularosa study: an experimental design and implementation for exploring cyber deception effects. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 371\u2013386. IEEE (2018)"},{"issue":"6","key":"2_CR7","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1037\/0022-3514.79.6.995","volume":"79","author":"SS Iyengar","year":"2000","unstructured":"Iyengar, S.S., Lepper, M.R.: When choice is demotivating: can one desire too much of a good thing? J. Pers. Soc. Psychol. 79(6), 995\u20131006 (2000)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"3","key":"2_CR8","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1509\/jmkr.2005.42.3.313","volume":"42","author":"K Diehl","year":"2005","unstructured":"Diehl, K., Zauberman, G.: Search and experience products: how consumer evaluations are affected by information overload and item position. J. Mark. Res. 42(3), 363\u2013375 (2005)","journal-title":"J. Mark. Res."},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Iyengar, S.S., Jiang, W., Huberman, G.: How much choice is too much? Contributions to 401(k) retirement plans. In: Pension Research Council Working Paper (2004). https:\/\/doi.org\/10.2139\/ssrn.636707","DOI":"10.2139\/ssrn.636707"},{"key":"2_CR10","unstructured":"Schwartz, B.: The Paradox of Choice: Why More is Less. Harper Perennial (2004)"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"103353","DOI":"10.1016\/j.ijhm.2022.103353","volume":"108","author":"MMH Ip","year":"2023","unstructured":"Ip, M.M.H., Chark, R.: The effect of menu design on consumer behavior: a meta-analysis. Int. J. Hosp. Manag. 108, 103353 (2023)","journal-title":"Int. J. Hosp. Manag."},{"key":"2_CR12","unstructured":"Birk, M.V., Mandryk, R.L., Atkins, C.: The impact of choice on player engagement and motivation in games. In: Proceedings of the 2016 Annual Symposium on Computer-Human Interaction in Play, pp. 299\u2013311 (2016)"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1098\/rsbl.2011.0098","volume":"4","author":"AP Lenton","year":"2008","unstructured":"Lenton, A.P., Francesconi, M., Todd, P.M.: Too much of a good thing? Variety is confusing in mate choice. Biol. Lett. 4(4), 528\u2013530 (2008)","journal-title":"Biol. Lett."},{"key":"2_CR14","unstructured":"Norman, D.A.: The Design of Everyday Things. Basic Books (2002)"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.jcps.2014.08.002","volume":"25","author":"A Chernev","year":"2015","unstructured":"Chernev, A., B\u00f6ckenholt, U., Goodman, J.: Choice overload: a conceptual review and meta-analysis. J. Consum. Psychol. 25(2), 333\u2013358 (2015)","journal-title":"J. Consum. Psychol."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Payne, J.W., Bettman, J.R., Johnson, E.J.: The Adaptive Decision Maker. Cambridge University Press (1993)","DOI":"10.1017\/CBO9781139173933"},{"issue":"4","key":"2_CR17","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1037\/0033-295X.103.4.650","volume":"103","author":"G Gigerenzer","year":"1996","unstructured":"Gigerenzer, G., Goldstein, D.G.: Reasoning the fast and frugal way: models of bounded rationality. Psychol. Rev. 103(4), 650 (1996)","journal-title":"Psychol. Rev."},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1037\/a0028085","volume":"17","author":"AW Meade","year":"2012","unstructured":"Meade, A.W., Craig, S.B.: Identifying careless responses in survey data. Psychol. Methods 17(3), 437 (2012)","journal-title":"Psychol. Methods"},{"issue":"4","key":"2_CR19","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1086\/380283","volume":"30","author":"NH Lurie","year":"2004","unstructured":"Lurie, N.H.: Decision making in information-rich environments: the role of information structure. J. Consum. Res. 30(4), 473\u2013486 (2004)","journal-title":"J. Consum. Res."},{"issue":"2","key":"2_CR20","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/0030-5073(76)90022-2","volume":"16","author":"JW Payne","year":"1976","unstructured":"Payne, J.W.: Task complexity and contingent processing in decision making: an information search and protocol analysis. Organ. Behav. Hum. Perform. 16(2), 366\u2013387 (1976)","journal-title":"Organ. Behav. Hum. Perform."},{"issue":"4481","key":"2_CR21","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1126\/science.7455683","volume":"211","author":"A Tversky","year":"1981","unstructured":"Tversky, A., Kahneman, D.: The framing of decisions and the psychology of choice. Science 211(4481), 453\u2013458 (1981)","journal-title":"Science"},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1086\/651235","volume":"37","author":"B Scheibehenne","year":"2010","unstructured":"Scheibehenne, B., Greifeneder, R., Todd, P.M.: Can there ever be too many options? A meta-analytic review of choice overload. J. Consum. Res. 37(3), 409\u2013425 (2010). https:\/\/doi.org\/10.1086\/651235","journal-title":"J. Consum. Res."},{"issue":"4","key":"2_CR23","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1037\/1089-2680.5.4.323","volume":"5","author":"RF Baumeister","year":"2001","unstructured":"Baumeister, R.F., Bratslavsky, E., Finkenauer, C., Vohs, K.D.: Bad is stronger than good. Rev. Gener. Psychol. 5(4), 323\u2013370 (2001)","journal-title":"Rev. Gener. Psychol."}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08067-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:02:35Z","timestamp":1760302955000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08067-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032080660","9783032080677"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08067-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This study involved simulated decision-making using fictitious cyber scenarios, such as File Exfiltration and NMAP Port Selection, with no real networks or sensitive systems involved. All participant data was anonymized and collected with informed consent. No real vulnerabilities were tested or disclosed. The goal of this work is to understand cognitive biases related to defensive deception rather than to support offensive activities. Future deployment recommendations are intended solely for ethical and legally compliant defense systems.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Considerations"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}