Results 31 to 40 of about 71,438 (359)
Assessing Deception in Questionnaire Surveys With Eye-Tracking
Deceit often occurs in questionnaire surveys, which leads to the misreporting of data and poor reliability. The purpose of this study is to explore whether eye-tracking could contribute to the detection of deception in questionnaire surveys, and whether ...
Xinyue Fang+5 more
doaj +1 more source
Deception and Reciprocity [PDF]
We experimentally investigate the relationship between (un)kind actions and subsequent deception in a two-player, two-stage game. The first stage involves a dictator game. In the second-stage, the recipient in the dictator game has the opportunity to lie to her counterpart.
Despoina Alempaki+2 more
openaire +4 more sources
What is political about political self-deception?
In Political Self-Deception, Galeotti considers (and rebuts) two ‘realist’ objections. Galeotti’s realist argues that there is no need for the overly complex concept of self-deception, since self-serving lies and manipulation are descriptively and ...
Lior Erez
doaj +1 more source
Deception in Amber Heard and Johnny Depp’s Trials
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence.
Nahla Mahmoud Hadi+1 more
doaj +1 more source
Modelling Strategic Deceptive Planning in Adversarial Multi-Agent Systems [PDF]
Deception is virtually ubiquitous in warfare, and should be a central consideration for military operations research. However, studies of agent behaviour in simulated operations have typically neglected to include explicit models of deception. This paper proposes that a computational model that approximates the human deceptive planning process would ...
arxiv
A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. However, shutting down the compromised component will inform the attacker that the subversion attempt was unsuccessful, and might lead ...
Jaatun, Martin Gilje+2 more
openaire +4 more sources
Intelligence support for the operational level counter-deception
Given modern warfare’s complex and dynamic nature, military deception has become a vital tool in the contemporary operating environment for gaining strategic advantage and achieving operational success.
Cristian-Octavian Stanciu+1 more
doaj +1 more source
Abstract Worker voice tools can support multinational companies to monitor social compliance within complex multi‐tier apparel supply chains. This study presents findings from an adaptation of a worker voice tool that contacted 11,555 workers in two informal ‘Ready‐made Garment’ (RMG) production hubs in Bangladesh.
Sheila Chanani+4 more
wiley +1 more source
Self-Deception Reduces Cognitive Load: The Role of Involuntary Conscious Memory Impairment
People often hear classic allusions such as plugging one’s ears while stealing a bell, drawing cakes to satisfy one’s hunger, and the emperor’s new clothes. These allusions reflect a principle that people believe in nonexistent phenomena to satisfy their
Zengdan Jian+8 more
doaj +1 more source
Abstract This study explores the quality of carbon reporting (QCR) by New Zealand (NZ) firms and its changes over time. It also explores the impact of QCR on the market reputation of firms. Using a sample of 300 company‐year observations between 2015 and 2020 from top listed firms of NZ, the study develops a 14‐item QCR index.
Habib Zaman Khan+2 more
wiley +1 more source