• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 182
  • 20
  • 18
  • 11
  • 8
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 334
  • 58
  • 51
  • 50
  • 44
  • 28
  • 20
  • 20
  • 19
  • 19
  • 18
  • 17
  • 15
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Lie Acceptability: A Construct and Measure

Oliveira, Carrie, Levine, Timothy R. 01 January 2008 (has links)
People likely hold different opinions about deceptive communication. Lie acceptability refers to an individual's attitude about deceptive communication. A self-report measure of lie acceptability was updated and refined, and preliminary data (N = 312) consistent with validity were reported. CFA indicated acceptable fit to the a priori unidimensional model. As anticipated, the lie acceptability scale was positively related to narcissism and negatively associated with religiosity. The scale also predicted likelihood of use ratings of equivocal messages, deceptive omissions, and outright lies. An anticipated sex difference, however, was not replicated. The potential utility of the scale in communication research is discussed.
62

A Duty to Deceive? Using New and Deceptive Technologies to Enhance the Lives of Dementia Patients

Nofal, Jacob Ramsey 24 April 2023 (has links)
In this paper I propose a new type of therapy for dementia patients called AIIT. AIIT concerns using artificially intelligent programs to mimic the likeness of a dementia patients' spouse or relative in hopes of providing them comfort and an alternative solution to them constantly reliving grief or being lied to in unsatisfactory ways. I establish the moral permissibility of AIIT through the moral parity claim, which is a conditional claim stating that if current dementia care practices are permissible, then AIIT ought to be as well. This means that AIIT is no more morally problematic than current dementia care practices. To make this claim I evaluate and compare AIIT to current practices from three different perspectives/potential harms. I first find AIIT to be less harmful to dementia patients than current practices since AIIT better preserves dementia patients' beliefs, emotions, and desires. I then conclude that AIIT does not pose a unique harm to the impersonated person, since 1) Many theories of wellbeing do not support the possibility of the deceased being harmed and 2) People with dementia are not commonly creating new impressions, and therefore harms committed to the impersonated person are extremely unlikely. Finally, I claim that AIIT would not cause additional harms to society given that current practices already harm relatives in a similar manner, also have the potential to pose problems if used outside of dementia care, and don't differ from AIIT in respect to affecting trust in the medical system. Having established moral parity, I conclude with a push for a stronger claim, the superior option claim, which states that AIIT is morally permissible by arguing for the antecedent of the moral parity claim. I argue for this by denying that we have an obligation to not deceive dementia patients since they have special conditions that do not allow them to apprehend the world accurately. / Master of Arts / AI is becoming increasingly popular, especially within the healthcare industry. I explore the intersection of AI and dementia care. Dementia is a debilitating illness that affects millions of people worldwide. In this paper, I propose a new therapy for dementia patients called AIIT. AIIT involves using artificially intelligent programs to simulate the likeness of a dementia patient's spouse or relative, with the goal of providing comfort and an alternative solution to their grief. I argue that AIIT is morally permissible on the grounds that it is not any worse than current practices in dementia care. At the end of the paper, I also argue that AIIT may have significant benefits and so we should employ AIIT when it is applicable.
63

Is Telling the Truth a New Index for Deception? : An Electrophysiological Approach

Koukoura, Angeliki January 2017 (has links)
No description available.
64

The Language and Cross-Cultural Perceptions of Deception

Laing, Brent Logan 01 June 2015 (has links) (PDF)
While much research has shown that some linguistic features can indicate a person is lying, this line of research has led to conflicting results. Furthermore, very little research has been done to verify that these supposed linguistic features of deception are universal. In addition, few studies have researched the cross-cultural perceptions of deception, which knowledge could greatly improve the detection of deception across cultures. The current study addresses these gaps in the literature by analyzing and comparing truthful and deceptive discourse of eight native English-speaking Americans and eight non-native English-speaking Ghanaians. The discourse was elicited in one-on-one interviews where each interviewee spontaneously responded to questions about themselves. Later, interviewee responses were judged by 47 native English-speaking Americans and 35 non-native English-speaking Ghanaians. The results showed that Americans and Ghanaians lie differently—Americans' lies were more superfluous and redundant; had more pronoun inconsistencies, adjectives, adverbs, and modal verbs; and had fewer negative emotion words than their truths. Ghanaians' lies, on the other hand, also had more pronoun inconsistencies but had fewer negations than their truths. Furthermore, the groups' baseline speech differed in superfluousness, positive emotion words, word count, and response latency. Regarding detecting deception, Ghanaians were slightly more accurate and significantly more confident in detecting lies than Americans. Both groups were slightly more accurate and confident in judging the veracity of statements within their own cultures. Neither group, however, demonstrated truth- or lie-bias cross-culturally. These results have implications for law enforcement investigators and analysts who can learn the differences between Americans' and Ghanaians' truthful and deceptive speech so as to more accurately detect deception through language. In addition, cross-cultural deception perception research can improve cross-cultural communication and understanding.
65

Wide spectrum attribution : using deception for attribution intelligence in cyber attacks

Nicholson, Andrew January 2015 (has links)
Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click crimeware kits are widely circulated in the underground economy, while source code for sophisticated malware such as Stuxnet is available for all to download and repurpose. Despite decades of research into defensive techniques, such as firewalls, intrusion detection systems, anti-virus, code auditing, etc, the quantity of successful cyber attacks continues to increase, as does the number of vulnerabilities identified. Measures to identify perpetrators, known as attribution, have existed for as long as there have been cyber attacks. The most actively researched technical attribution techniques involve the marking and logging of network packets. These techniques are performed by network devices along the packet journey, which most often requires modification of existing router hardware and/or software, or the inclusion of additional devices. These modifications require wide-scale infrastructure changes that are not only complex and costly, but invoke legal, ethical and governance issues. The usefulness of these techniques is also often questioned, as attack actors use multiple stepping stones, often innocent systems that have been compromised, to mask the true source. As such, this thesis identifies that no publicly known previous work has been deployed on a wide-scale basis in the Internet infrastructure. This research investigates the use of an often overlooked tool for attribution: cyber de- ception. The main contribution of this work is a significant advancement in the field of deception and honeypots as technical attribution techniques. Specifically, the design and implementation of two novel honeypot approaches; i) Deception Inside Credential Engine (DICE), that uses policy and honeytokens to identify adversaries returning from different origins and ii) Adaptive Honeynet Framework (AHFW), an introspection and adaptive honeynet framework that uses actor-dependent triggers to modify the honeynet envi- ronment, to engage the adversary, increasing the quantity and diversity of interactions. The two approaches are based on a systematic review of the technical attribution litera- ture that was used to derive a set of requirements for honeypots as technical attribution techniques. Both approaches lead the way for further research in this field.
66

Network-centric strategic-level deception

Erdie, Philip B. 09 1900 (has links)
Approved for public release; distribution is unlimited / This thesis explores strategic-level deception in the context of network-centric information operations. Advances in information technology and the global connectedness of communications networks have created new opportunities and challenges for conducting strategic and operational level deception campaigns with significant utilization of cyberspace. Planning and executing concurrent strategic-level deceptions among distributed participants and against multiple targets requires speed, flexibility, and situational awareness. This thesis begins with a historical account of twentieth century use of strategic-level deception, followed by a definition of network deception, considerations for achieving network based deception, and our proposed model of command structure for network-centric planning and execution of deception campaigns in the twenty-first century. / Captain, United States Marine Corps
67

Madness and deception in Irish and Norse-Icelandic sagas

Matheson, Laura E. January 2015 (has links)
This thesis explores the representation of mental illness and mental incapacity in medieval Irish and Norse-Icelandic saga literature, with a particular focus on the theme of deception in representations of madness. These texts are compared using the methods of literary close reading. It begins (Chapters 1 and 2) with an overview of concepts of madness found in the two bodies of literature (drawing on law texts and poetry as well as the sagas) and the different narrative uses to which these concepts are put. Some general parallels and contrasts are drawn, and the cross-cultural transmission of the concept of the geilt is discussed in this context. Chapter 3 lays the ground for the thesis's analysis of deception in madness narratives by comparing two Irish and Norse-Icelandic narratives about fools and discussing links between the language of mental impairment and the notion of deception. Chapters 4 and 5 explore narrative representations of how deception is used with the aim of rehabilitating the mad person and reconnecting them with society, focusing in particular on the late Middle Irish saga Buile Shuibhne and an episode in the Icelandic family saga Egils saga Skalla-Grímssonar. Chapter 5 concludes with an extended discussion of the role of poetry and memory in representations of mental illness as seen in these two texts. Chapter 6 explores narratives in which deception is used with the purpose of destroying or humiliating the person of unsound mind, here focusing on the late Middle Irish saga Aided Muirchertaig meic Erca and an episode in the Norwegian king's saga Ágrip.
68

Self-deception

Galgut, Elisa Lynn January 1991 (has links)
A dissertation submitted to the Faculty of Arts, University of the Witwatersrand, Johannesburg, in partial fulfilment of the Degree of Master of Arts. / The topic of this dissertation is self-deception. It involves a general analysis of the problem, however, the central discussion centres on an agency-type approach to the problem, and in particular on Freudian-type approach. / Andrew Chakane 2018
69

Detection of deception in the confessional context

Bradford, Deborah, Psychology, Faculty of Science, UNSW January 2006 (has links)
The ability to successfully distinguish truthful and deceptive messages within forensic contexts is important to preserve the integrity of the legal system. Research has shown that confession evidence is highly persuasive at a trial level and that false confessions leading to wrongful convictions are problematic within the judicial system. Some recent research also suggests that that neither lay observers nor law enforcement professionals are able to successfully distinguish truths and lies in the context of confessions. Therefore, the present safeguards in the judicial system may be inadequate to detect a false confession and prevent subsequent wrongful convictions. The research presented in this thesis was designed to explore the effectiveness of methods of detecting deception within forensically relevant contexts, specifically confessions. Study One examined the impact of presentation modality and the effectiveness of indirect deception measures on credibility assessments of autobiographical accounts depicting truthful and deceptive confessions. The outcome of this study revealed that fact finders were unable to accurately classify truthful and deceptive confessions across presentation modalities and that indirect measures were unsuccessful in this context. In light of these findings, subsequent studies examined the validity of statement content analysis to discern truth from deception within the context of confessions. Study Two assessed evaluations of Criteria-based Content Analysis and the Aberdeen Report Judgment Scales, as applied by untrained observers to discriminate truthful and deceptive confessions. Findings revealed null effects and demonstrated that training in the application of content-based evaluations is an integral element of the valid application of such measures to detecting deception. Studies Three, Four and Five, therefore incorporated a comprehensive training program and focused on the application of a theoretically based method for detecting deception, the Aberdeen Report Judgement Scales, to the analysis of forensically relevant statements describing confessions, alibis and victimisation accounts. Overall, findings revealed some modest evidence for the application of this framework within deceptive contexts, however, account differences as a function of truth status were often rather small and assessments on many dimensions produced null findings. These results are discussed in terms of theoretical and practical implications for discerning truths and lies within forensic contexts.
70

Detecting deception in second-language speakers

Da Silva, Cayla S. 01 April 2011 (has links)
It is currently unknown how lie detection accuracy is affected when someone is speaking in his or her second language. We examined whether language proficiency had an impact on lie detection. We hypothesized that when judging the veracity of second-language speakers, participants would be better able to discriminate between truth- and lie-tellers and would have bias toward picking ‘lying’ since they may display cues associated with lying when communicating.We collected video footage of native- and second-language English speakers who lied or told the truth about a transgression. Undergraduate students (N = 51) then judged the veracity of these clips and indicated how confident they were in their ratings. Participants were most accurate and confident when judging native-language truth-tellers. In addition, participants were more likely to exhibit a truth-bias when observing native-language speakers, whereas they were more likely to exhibit a lie-bias when viewing second-language speakers. Implications for the justice system will be discussed. / UOIT

Page generated in 0.0741 seconds