NMC Library
Image from Google Jackets

Phishing for phools : the economics of manipulation and deception / George A. Akerlof and Robert J. Shiller.

By: Contributor(s): Publisher: Princeton : Princeton University Press, [2015]Description: xvi, 272 pages ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780691168319 (hbk. : alk. paper)
Subject(s): DDC classification:
  • 330.01/9 23
LOC classification:
  • HB74.P8 A49443 2015
Contents:
Introduction. Expect to be manipulated: phishing equilibrium -- Part one: Unpaid bills and financial crash -- 1. Temptation strews our path -- 2. Reputation mining and financial crisis -- Part two: Phishing in many contexts -- 3. Advertisers discover how to zoom in on our weak spots -- 4. Rip-offs regarding cars, houses, and credit cards -- 5. Phishing in politics -- 6. Phood, pharma, and phishing -- 7. Innovation: the good, the bad, and the ugly -- 8. Tobacco and alcohol -- 9. Bankruptcy for profit -- 10. Michael Milken phishes with junk bonds as bait -- 11. The resistance and its heroes -- Part three: Conclusion and afterword -- Conclusion: examples and general lessons. New story in America and its consequences -- Afterword. The significance of phishing equilibrium.

Includes bibliographical references (pages 233-256) and index.

Introduction. Expect to be manipulated: phishing equilibrium -- Part one: Unpaid bills and financial crash -- 1. Temptation strews our path -- 2. Reputation mining and financial crisis -- Part two: Phishing in many contexts -- 3. Advertisers discover how to zoom in on our weak spots -- 4. Rip-offs regarding cars, houses, and credit cards -- 5. Phishing in politics -- 6. Phood, pharma, and phishing -- 7. Innovation: the good, the bad, and the ugly -- 8. Tobacco and alcohol -- 9. Bankruptcy for profit -- 10. Michael Milken phishes with junk bonds as bait -- 11. The resistance and its heroes -- Part three: Conclusion and afterword -- Conclusion: examples and general lessons. New story in America and its consequences -- Afterword. The significance of phishing equilibrium.

Powered by Koha