• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 182
  • 20
  • 18
  • 11
  • 8
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 335
  • 58
  • 51
  • 50
  • 44
  • 28
  • 20
  • 20
  • 19
  • 19
  • 18
  • 17
  • 15
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

La duperie de soi et le problème de l'irrationalité / Self-deception and the problem of irrationality

Saragoça Nunes Correia, Vasco 19 May 2008 (has links)
Le problème de la duperie de soi constitue un défi majeur pour toute théorie de la rationalité, attendu que le sujet qui se dupe lui-même semble adhérer à une croyance illusoire tout en étant conscient de son caractère illusoire. C’est en tout cas ce que prétend la tradition « intentionnaliste » qui domine parmi les philosophes (Sartre, Davidson, Pears, Talbott, Scott-Kakures, Bermudez), qui tend à décrire la duperie de soi comme un acte intentionnel dont l’agent serait entièrement responsable. Nous soutenons au contraire une conception dite « émotionnaliste » selon laquelle la duperie de soi est un phénomène sub-intentionnel et involontaire d’illusion cognitive qui trouve son explication dans l’influence des émotions sur notre faculté de juger. Cela nous amène à développer une théorie « cognitivo-hédonique » des émotions qui vise à rendre compte du rôle que jouent ces dernières non seulement dans la naissance des croyances irrationnelles, mais même des actions irrationnelles (acrasia). / Self-deception poses a notable challenge for any theory of rationality, given that the self-deceiver appears to embrace a deceptive belief knowing of it’s deceptive nature. This is at least what is claimed by those who hold an « intentionalist » account (Sartre, Davidson, Pears, Talbott, Scott-Kakures, Bermudez), who tend to portray self-deception as an intentional act for which the self-deceiver should be held accountable. Instead, I hold a so-called « emotionalist » account according to which self-deception is a sub-intentional and involuntary process of cognitive illusion which stems from the influence our emotions may insidiously exert on our cognitive faculties, and thereby on our judgments. That leads me to develop a « cognitive-hedonic » theory of emotions with the purpose of showing how exactly our emotions are capable of inducing not only irrational beliefs, but even irrational actions (acrasia).
272

Tillämpningen av samtida rysk vilseledning : ett integrerat understöd

Plöen, Carl January 2019 (has links)
Russian application of deception in warfare has an extensive history. A lot of previous research has explored both its application and development through different historical conflicts. However, the 2014 Russian annexation of Crimea has raised a debate that challenges the classic application of Russian deception methods. Nevertheless, many researchers claim that Russia continues to use traditional methods of warfare and deception, albeit adapted to a modern context.   This thesis explores these claims by a concrete comparison of the application of Russian deception methods during the annexation of Crimea with a successful historical Russian deception operation, the 1979 Soviet invasion of Afghanistan. This is done by a comparative case study, which breaks down both cases with theoretical support from Barton Whaley's theory of deception. The study validates claims that traditional Russian deception methods are being applied in a contemporary context. What has changed, however, is how the different types of deception mutually support one another and are utilized to achieve synergy effects.
273

Language, Rhetoric, and Reality in Elizabethan Prose Friction

Stephanson, Raymond Alexander 09 1900 (has links)
Pages 19 to 23 have been omitted because of Revision / Elizabethan prose fiction has been virtually ignored for a long time. The question of rhetoric in this fiction is an extremely complex issue, and studies which have examined this aspect are usually stylistic analyses that fragment the works by dissecting isolated passages for stylistic data concerning an author's manipulation of particular schemes and tropes. This approach has often tended to ignore the possibility that larger ideals and attitudes may underlie the use of rhetorical figures (i.e. elocutio) in particular passages. While this dissertation does not attempt to resolve the problems of the relationship between rhetorical training in the grammar schools and Elizabethan fiction, or between the English vernacular rhetorics and Elizabethan fiction, it offers some idea about what these writers thought about rhetoric beyond its status as ornamentation. This thesis tries to discover what these writers thought about the possibilities of rhetorical training --that is, about its moral status as an art of persuasion. In my view, the major writers of Elizabethan prose fiction dramatize the abuses of verbal skills; they explore some of the techniques of deception, distortion and manipulation that are afforded by rhetorical training. The subject-matter of this fiction is largely concerned with verbal methods of persuasion that manipulate and distort, that rely on false logic and dishonesty; these writers are concerned with rhetorical attempts to change the face of the "real" world in order to justify a particular idea, action, or belief. My thesis explicates the prose fictional works of Gascoigne, Lyly, Sidney, Nashe and Deloney with this theory in mind. As well as suggesting the ways in which rhetoric is handled as a subject in a variety of fictional contexts, my thesis also explicates the rhetorical strategies which these authors themselves use to involve their reader in evaluating rhetoric. / Thesis / Doctor of Philosophy (PhD)
274

What We Hide

Bowcott, Ashley 01 January 2015 (has links)
What We Hide is a collection of memoir essays that explores the themes of mystery and deception in personal relationships, specifically within familial and romantic ones. Though the essays in the collection explore the decades from early in the narrator's childhood through her move to Florida for graduate school, the narrator's keen discernment of the world around her and her curiosity for what experiences shape a person's character remain constant. Many essays explore the extent of her father's alcoholism and the consequences of it, as well as the narrator's obsession over the possible sources of his addictions. Other essays examine the narrator's relationships with men beginning when she enters high school and question the extent to which her strained relationship with her father both excuses and/or explains the way she deceives and allows herself to be deceived in these relationships. What We Hide is endlessly implicating and looks for the accountability of these situations from all sources. The narrator delves into the sneakiness of her parents' courtship, the accusations that become commonplace during their divorce, the ways in which the narrator lies to family, friends, and boyfriends for her own selfish motives, and how each of these experiences shapes subsequent ones. What We Hide uses personal experience, emails, and newspaper articles to demonstrate the vulnerability, contradictions, and complications that are inherent in all of us as humans and how these weaknesses manifest themselves in the relationships with those we are closest with.
275

Evolution Through The Search For Novelty

Lehman, Joel 01 January 2012 (has links)
I present a new approach to evolutionary search called novelty search, wherein only behavioral novelty is rewarded, thereby abstracting evolution as a search for novel forms. This new approach contrasts with the traditional approach of rewarding progress towards the objective through an objective function. Although they are designed to light a path to the objective, objective functions can instead deceive search into converging to dead ends called local optima. As a significant problem in evolutionary computation, deception has inspired many techniques designed to mitigate it. However, nearly all such methods are still ultimately susceptible to deceptive local optima because they still measure progress with respect to the objective, which this dissertation will show is often a broken compass. Furthermore, although novelty search completely abandons the objective, it counterintuitively often outperforms methods that search directly for the objective in deceptive tasks and can induce evolutionary dynamics closer in spirit to natural evolution. The main contributions are to (1) introduce novelty search, an example of an effective search method that is not guided by actively measuring or encouraging objective progress; (2) validate novelty search by applying it to biped locomotion; (3) demonstrate novelty search’s benefits for evolvability (i.e. the ability of an organism to further evolve) in a variety of domains; (4) introduce an extension of novelty search called minimal criteria novelty search that brings a new abstraction of natural evolution to evolutionary computation (i.e. evolution as a search for many ways of iii meeting the minimal criteria of life); (5) present a second extension of novelty search called novelty search with local competition that abstracts evolution instead as a process driven towards diversity with competition playing a subservient role; and (6) evolve a diversity of functional virtual creatures in a single run as a culminating application of novelty search with local competition. Overall these contributions establish novelty search as an important new research direction for the field of evolutionary computation.
276

On Radar Deception, As Motivation For Control Of Constrained Systems

Hajieghrary, Hadi 01 January 2013 (has links)
This thesis studies the control algorithms used by a team of ECAVs (Electronic Combat Air Vehicle) to deceive a network of radars to detect a phantom track. Each ECAV has the electronic capability of intercepting the radar waves, and introducing an appropriate time delay before transmitting it back, and deceiving the radar into seeing a spurious target beyond its actual position. On the other hand, to avoid the errors and increase the reliability, have a complete coverage in various atmosphere conditions, and confronting the effort of the belligerent intruders to delude the sentinel and enter the area usually a network of radars are deployed to guard the region. However, a team of cooperating ECAVs could exploit this arrangement and plans their trajectories in a way all the radars in the network vouch for seeing a single and coherent spurious track of a phantom. Since each station in the network confirms the other, the phantom track is considered valid. This problem serves as a motivating example in trajectory planning for the multi-agent system in highly constrained operation conditions. The given control command to each agent should be a viable one in the agent limited capabilities, and also drives it in a cumulative action to keep the formation. In this thesis, three different approaches to devise a trajectory for each agent is studied, and the difficulties for deploying each one are addressed. In the first one, a command center has all information about the state of the agents, and in every step decides about the control each agent should apply. This method is very effective and robust, but needs a reliable communication. In the second method, each agent decides on its own control, and the members of the group just communicate and agree on the range of control they like to apply on the phantom. Although in this method much less data needs to communicate between the agents, it is very sensitive to the disturbances and miscalculations, and could be easily fell apart or come to a state with no feasible solution to continue. In the third method a differential geometric approach to the problem is studied. This method has a very strong backbone, and minimizes the communication needed to a binary one. However, less data provided to the agents about the system, more sensitive and infirm the system is when it faced with imperfectionalities. In this thesis, an object oriented program is developed in the Matlab software area to simulate all these three control strategies in a scalable fashion. Object oriented programming is a naturally suitable method to simulate a multi-agent system. It gives the flexibility to make the code more iv close to a real scenario with defining each agent as a separated and independent identity. The main objective is to understand the nature of the constrained dynamic problems, and examine various solutions in different situations. Using the flexibility of this code, we could simulate several scenarios, and incorporate various conditions on the system. Also, we could have a close look at each agent to observe its behavior in these situations. In this way we will gain a good insight of the system which could be used in designing of the agents for specific missions.
277

Sex and Racial Differences in Socially Desirable Responding

Van Dixhorn, Kathryn G. 07 July 2011 (has links)
No description available.
278

The validation of two social desirability questionnaires in the South African context / Ebenhaezer Coetzee

Coetzee, Ebenhaezer January 2015 (has links)
Respond bias has always been a risk when it comes to interpreting personality data. For this reason two social desirability measures were created to combat this problem during research and workplace application. The first of these measures is the Marlowe-Crowne Social Desirability Scale created to measure a need for approval. The second of these measures is Balanced Inventory of Desirable Responding, which stems from a theory that describes social desirability as both a deception towards others and towards the self. For either of these measures to be usable, however, they need to be reliable and valid. This study then is intended to validate these two instruments in a diverse South African population sample and to look at the reliability of the items in these instruments and their factor structure. The objective of this study was to investigate both of these measures and to determine their psychometric properties and how they compare to the theory in literature. A convenient and purposive sample of N = 359 individuals from across South Africa was contacted via electronic means and asked to partake in this study. A questionnaire survey was forwarded to them with the intention of measuring social desirability. This included both the Marlowe-Crowne Social Desirability Scale (MCSDS) and Balanced Inventory of Desirable Responding (BIDR) measure. In addition a demographical questionnaire was included (gender, race, language group and age). The statistical analysis was done via the SPSS program during data examination: descriptive statistics, exploratory factor analysis (with Maximum Likelihood as extraction method), Cronbach’s alpha coefficients, and product-moment correlations were conducted. The results of this analysis indicated that although these measures are widely accepted and used internationally, the full version of both the measures is not valid and reliable within this South African sample. Although not all items from the scales could be validated, there were items that indicated very acceptable psychometric properties. Various recommendations were made for the context of using these measures to ascertain an individual’s response bias and for future research. A person attempting to use these measures should only focus on using the reliable items from this study. These items could be applied in developing a shortened version of these measures. It is recommended that further research into these measures could be done by using a traditional paper-and pencil format, a larger sample or by focusing on a specific population group within South Africa. / MCom (Industrial Psychology), North-West University, Potchefstroom Campus, 2015
279

The validation of two social desirability questionnaires in the South African context / Ebenhaezer Coetzee

Coetzee, Ebenhaezer January 2015 (has links)
Respond bias has always been a risk when it comes to interpreting personality data. For this reason two social desirability measures were created to combat this problem during research and workplace application. The first of these measures is the Marlowe-Crowne Social Desirability Scale created to measure a need for approval. The second of these measures is Balanced Inventory of Desirable Responding, which stems from a theory that describes social desirability as both a deception towards others and towards the self. For either of these measures to be usable, however, they need to be reliable and valid. This study then is intended to validate these two instruments in a diverse South African population sample and to look at the reliability of the items in these instruments and their factor structure. The objective of this study was to investigate both of these measures and to determine their psychometric properties and how they compare to the theory in literature. A convenient and purposive sample of N = 359 individuals from across South Africa was contacted via electronic means and asked to partake in this study. A questionnaire survey was forwarded to them with the intention of measuring social desirability. This included both the Marlowe-Crowne Social Desirability Scale (MCSDS) and Balanced Inventory of Desirable Responding (BIDR) measure. In addition a demographical questionnaire was included (gender, race, language group and age). The statistical analysis was done via the SPSS program during data examination: descriptive statistics, exploratory factor analysis (with Maximum Likelihood as extraction method), Cronbach’s alpha coefficients, and product-moment correlations were conducted. The results of this analysis indicated that although these measures are widely accepted and used internationally, the full version of both the measures is not valid and reliable within this South African sample. Although not all items from the scales could be validated, there were items that indicated very acceptable psychometric properties. Various recommendations were made for the context of using these measures to ascertain an individual’s response bias and for future research. A person attempting to use these measures should only focus on using the reliable items from this study. These items could be applied in developing a shortened version of these measures. It is recommended that further research into these measures could be done by using a traditional paper-and pencil format, a larger sample or by focusing on a specific population group within South Africa. / MCom (Industrial Psychology), North-West University, Potchefstroom Campus, 2015
280

Lokvalbetrapping in die Suid-Afrikaanse reg

Naude, Bobby Charles 10 1900 (has links)
Text in Afrikaans / Alhoewel die lokvalstelsel as misdaadbekampingsmetode lank reeds bestaan, is die toepassing daarvan nog altyd kontroversieE!I. Hierdie omstredenheid is die laaste paar jaar op die voorgrond gedryf deur 'n Regskommissie-ondersoek, sowel as deur die aanvaarding van 'n Handves van Menseregte. Ondersoek word ingestel na hierdie omstredenheid deur te kyk na die inhoud en toepassing van die stelsel, sowel as na die rol wat private persona, die polisie en die hot by die stelsel speeL Die gevolgtrekking waartoe gekom word, is dat die omstredenheid van die stelsel te danke is aan die feit dat dit verband hou met pro-aktiewe regshandhawing, wat in wese bestaan uit die gebruik van misleiding ten einde die pleging van 'n misdaad teweeg te bring. Die probleem met pro-aktiewe regshandhawing is dat dit 'n geleentheid skep vir die uitoefening van polisiediskresie wat grootliks sonder beheer geskied, met potensiele wanoptrede aan die kant van regshandhawers en die ondermyning van die publiek se vertroue in die billikheid van die strafregspleging. Ondersoek word gevolglik ingestel na metodes om diskresie-uitoefening by die lokvalstelsel te regverdig, aangesien daar wei ruimte is vir diskresionere magte wat behoorlik begrens, gestruktureer en gekontroleer is. Die vernaamste metodes van beheer oor diskresie­ uitoefening by die lokvalstelsel, naamlik die uitsluiting van getuienis en weerstand in 'n strafgeding, word grondig ondersoek met verwysing na die Engelse-, Amerikaanse- en Kanadese reg. Dit is egter die uitgangspunt van hierdie proefskrif dat wetgewende strukturering van diskresie-uitoefening by die lokvalstelsel die mees effektiewe oplossing bied vir meeste van die problema van die stelsel. Die enigste aanvaarbare basis waarop die lokvalstelsel kan funksioneer, is om deur middel van wetgewing die trefwydte van toelaatbare lokvaltegnieke en die beperkinge waarbinne regshandhawers regsonderdane mag beweeg om misdade te pleeg, te definieer. Daar is dus 'n behoefte aan die kodifisering van standaarde waaraan voldoen moet word voordat enige lokvaloperasie behoort te begin. / Although the system of trapping has long been used as a method of preventing crime, its employment has always been controversial. In the recent past, this controversy has come to the front due to an investigation by the South African Law Commission and the acceptance of a Bill of Rights. This thesis investigates this controversy by looking at the contents and application of the system, as well as the role which private persons, the police and the court play in the system. The conclusion arrived at, is that the controversy surrounding the system is due to the fact that it has to do with pro-active law enforcement, which consists of the use of deception to induce the performance of a criminal act. The problem with pro-active law enforcement is that it creates an opportunity for the exercise of police discretion which is mainly uncontrolled, with potentialmisconduct on the part of law enforcement officials and the subversion of public trust in the reasonableness of the criminal justice system. Consequently, methods by which the exercise of discretion in the system of trapping can be justified are investigated, since there is room for discretionary powers which are properly circumscribed, structured and controlled. The main methods of control over the exercise of discretion in the system of trapping, namely the exclusion of evidence and a defence in a criminal proceeding, are fully investigated with reference to English, American and Canadian law. Having considered the above, the conclusion is advanced that legislative structuring of the exercise of discretion in the system of trapping offers the most effective solution for most of the problems underlying the system. The only acceptable basis on which the system can function, is to define the scope of acceptable trapping techniques and the confines within which law enforcement officials may prevail on someone to commit a crime. This must be done by means of legislation. Accordingly, there is a need for codification of standards which have to be complied with before any trapping operation may commence. / Criminal & Procedural Law / LL.D. (Criminal & Procedural Law)

Page generated in 0.0819 seconds