The document discusses duplicity games and mechanism design for cyber deception to mitigate insider threats. It proposes a game theoretic model where a defender designs a feature generator to manipulate a user's beliefs and incentivize secure actions. The generator includes components for belief manipulation and incentive modulation. The design ensures the user has no incentive to deviate from the recommended security policy. Principles are discussed for jointly designing the generator, belief manipulator, and incentive modulator to manage incentives and achieve deterrence.