A model of deception during cyber-attacks on information systems | IEEE Conference Publication | IEEE Xplore