• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • Tagged with
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information

Proudfoot, Jeffrey Gainer January 2014 (has links)
Concealing information, one of the many forms of deception, is a pervasive phenomenon as it is present in virtually every facet of interpersonal communication. In some cases, information concealment can have profound implications (e.g., insider threats in organizations, security screening at the border, and criminal interviews). New technologies are under development to aid in identifying concealed information, however, additional research is needed in three key areas to increase the feasibility of using these technologies in real-world credibility assessment contexts. First, research is needed to investigate the accuracy of new credibility assessment technologies relative to existing deception-detection systems. Demonstrating that new technologies meet or exceed detection accuracies of existing systems (e.g., the polygraph) is critical. Second, research is needed to determine if a targetless Concealed Information Test (CIT) is feasible. Existing CIT research supports the presence of main effect differences between persons concealing information and the control group. These behaviors may permit the detection of concealed information without the use of customized sets of stimuli. Eliminating the need to create customized sets of stimuli for each examinee would drastically increase the ease with which an automated system can be used to conduct a CIT. Finally, research is needed to illuminate various elements of the human-computer interaction that occurs during automated credibility assessments. This is a new domain of human-computer interaction as system users in this context are not instigating the interaction, and in many cases, they may be seeking to limit the effectiveness of the system. Before novel systems designed to conduct credibility assessments can be adopted, further research is needed to illuminate how users perceive, respond to, and strategically manage their behaviors when interacting with systems of this nature. This dissertation contains the results of a research program designed to address each of these areas. First, an experiment was designed to investigate the accuracy rates of two promising noncontact measures of concealed information (oculometrics and vocalics) relative to electrodermal activity (EDA). Second, an experiment was designed to evaluate the feasibility of using a targetless CIT to elicit main effect differences between concealers and the control group to identify concealed information. And third, a thorough analysis of examinees' general perceptions, self-reported stress and arousal, perceived effort and performance, and use of countermeasures within the context of an automated credibility assessment interview was conducted. This research effort has yielded the following findings. First, eye tracking and vocalics can be used to identify significant differences in the behaviors and physiology of examinees concealing information, however, the accuracy with which truth tellers and information concealers can be classified remains impractical for an applied setting. Second, there are main effect differences between persons concealing information and telling the truth, however, the use of countermeasures may limit the accuracy with which concealers can be identified. Finally, the presence of concealed information and the use of crime-relevant questions alter how examinees perceive and react to a system designed to identify concealed information. The limitations of this research, as well as directions for future research, are discussed.
2

A behavioural and cognitive neuroscience investigation of deceptive communication

Hsu, Chun-Wei January 2018 (has links)
There is a rich literature on how people tell lies and detect them in others, but the underlying mechanisms are still poorly understood. The first aim of this thesis was to elucidate key cognitive and neural processes underlying cued (i.e., instructed) and uncued lies. The second aim, based on recent research suggesting a link between dishonesty and creativity, was to determine whether creative cognition contributes to deceptive communication. In a first behavioural study, performance on generating and detecting lies was measured in a socially interactive setting involving cued and uncued lies. Results of a multiple regression analysis showed that creativity predicted lying generation ability: more creative individuals were better liars than less creative people. In contrast, the ability to detect lies showed no association with creativity measures, suggesting that generating and detecting lies are distinct abilities. A second event-related potential (ERP) study investigated the neural mechanisms underlying the generation of uncued lies using a novel bluffing paradigm where participants lied at will. Results showed no stimulus-locked differences between uncued lies and truths, suggesting that decision processes leading to both required comparable cognitive resources. Once the uncued decision has been made, it requires strategic monitoring to keep track of the responses in order to maximize the gains regardless of whether the outcome is a lie or the truth as indexed by no response-locked differences between uncued lies and truths. Finally, parallel functional magnetic resonance imaging (fMRI) and ERP studies were conducted to determine the role of creativity in countermeasure use in a concealed information paradigm requiring cued lying. Results showed that countermeasures degraded the neural signatures of deception and more so for more creative individuals. This work advances understanding of the cognitive and neural mechanisms underlying deception as well as their dependence on individual differences in creative cognition.
3

Information behaviour in health-care of home-based elderly people in Nakuru District, Kenya

Khayesi, Marie K. (Marie Khanyanji) 07 1900 (has links)
This study investigated access and use of information in the health-care of home-based elderly people (EPs) in Nakuru District, Kenya. The literature review revealed a gap with respect to information behaviour in health-care of EPs in a development context. The researcher used qualitative methods; with exploratory and descriptive research design because the focus of the study was on the littleknown and socially disadvantaged community of EPs in Nakuru District. Respondents were sampled by using the snowball technique. At the end of an interview session, each respondent was encouraged to nominate someone who either shared the same or had different experiences, views, socio-economic levels and gender. The researcher collected data through face-to-face interviews with EPs, informal care providers (ICPs) and formal health-care providers (FHCPs), in order to gain insight of information behaviour in health-care of EPs, by focusing on aspects of information needs; sources; use of information and factors that influence the respective groups of respondents to access and use health-care information health-care of EPs. The findings showed that the respective groups of respondents had similar as well as diversified needs for information for health-care. The groups used both formal and informal sources of information and channels of communication to access information for health-care, with FHCPs using authoritative sources more than the EPs and ICPs. Factors such as being a professional or a lay person, cost, ease of accessibility, availability of sources and channels of communication, time and trustworthiness of a source or channel of communication determined preference for use of information. The major contribution of the study is to the theory about information behaviour: some EPs and ICPs used CAM services without informing FHCPs, thereby revealing a form of concealed information use behaviour (CIUB). / Information Science / D. Litt. et Phil. (Information Science)
4

Information behaviour in health-care of home-based elderly people in Nakuru District, Kenya

Khayesi, Marie K. (Marie Khanyanji) 07 1900 (has links)
This study investigated access and use of information in the health-care of home-based elderly people (EPs) in Nakuru District, Kenya. The literature review revealed a gap with respect to information behaviour in health-care of EPs in a development context. The researcher used qualitative methods; with exploratory and descriptive research design because the focus of the study was on the littleknown and socially disadvantaged community of EPs in Nakuru District. Respondents were sampled by using the snowball technique. At the end of an interview session, each respondent was encouraged to nominate someone who either shared the same or had different experiences, views, socio-economic levels and gender. The researcher collected data through face-to-face interviews with EPs, informal care providers (ICPs) and formal health-care providers (FHCPs), in order to gain insight of information behaviour in health-care of EPs, by focusing on aspects of information needs; sources; use of information and factors that influence the respective groups of respondents to access and use health-care information health-care of EPs. The findings showed that the respective groups of respondents had similar as well as diversified needs for information for health-care. The groups used both formal and informal sources of information and channels of communication to access information for health-care, with FHCPs using authoritative sources more than the EPs and ICPs. Factors such as being a professional or a lay person, cost, ease of accessibility, availability of sources and channels of communication, time and trustworthiness of a source or channel of communication determined preference for use of information. The major contribution of the study is to the theory about information behaviour: some EPs and ICPs used CAM services without informing FHCPs, thereby revealing a form of concealed information use behaviour (CIUB). / Information Science / D. Litt. et Phil. (Information Science)

Page generated in 0.1059 seconds