1 |
Linguistic markers of deception: um andlikeChau, Raymond Tsz-hong. January 2011 (has links)
published_or_final_version / Linguistics / Master / Master of Arts
|
2 |
Do deceptive behaviors and lie detection abilities vary as a function of the method used for eliciting lies?Hatz, Jessica L. January 2007 (has links)
Thesis (Ph. D.)--University of Wyoming, 2007. / Title from PDF title page (viewed on June 16, 2008). Includes bibliographical references (p. 52-55).
|
3 |
Building a theory of strategic deceptionKim, Brian Hahn. January 2006 (has links)
Thesis (Ph. D.)--Michigan State University. Dept. of Psychology, 2006. / Title from PDF t.p. (viewed on June 19, 2009) Includes bibliographical references (p. 276-298). Also issued in print.
|
4 |
The morality of deceptionCarter, Margaret H. January 1900 (has links)
Thesis (Ph. D.)--University of Wisconsin--Madison, 1982. / Typescript. Vita. Includes bibliographical references (leaves 173-175).
|
5 |
The Makara of Hizballah deception in the 2006 Summer War /Acosta, David A. January 2007 (has links) (PDF)
Thesis (M.S. in Information Operations)--Naval Postgraduate School, June 2007. / Thesis Advisor(s): Hy Rothstein. "June 2007." Includes bibliographical references (p. 71-75). Also available in print.
|
6 |
The state of deception detection research: two perspectives used to uncover deception detection methodsSmith, Levi L. January 1900 (has links)
Master of Arts / Department of Communications Studies / Gregory Paul / People are sometimes deceptive, meaning that they “intentionally, knowingly, or purposefully mislead another person” (Levine, 2014, p. 37), despite potential negative relational consequences (McCornack & Levine, 1990; Millar & Tesser, 1988) or harsh societal condemnation (Kleinmuntz & Szucko, 1984). In fact, people encounter deception on a daily basis (Serota, Levine, & Boster 2010). Sometimes this deception is especially destructive (Van Swol, Braun, & Malhotra, 2012). Therefore, many law enforcement agencies and academic disciplines are invested in the study of deception. Much of this research is conducted in order to uncover ways to detect deceptive messages and distinguish them from truthful ones. This deception detection research consistently yields the following three findings. First, that people are notoriously bad at distinguishing truthful messages from deceptive ones (Bond & DePaulo, 2006). Second, that people often over-estimate their ability to detect deception accurately (Burgoon & Levine, 2010). Lastly, people are more likely to judge a message as truthful rather than deceptive regardless of the message’s veracity (Levine, Kim, Park, & Hughs, 2006). However, despite these three consistent findings, deception detection research is primarily bifurcated into two different perspectives researchers take when examining the phenomenon of deception (Burgoon & Levine, 2010) which this report labels the dominant and new perspectives. These two perspectives greatly affect the results and implications of the deception detection research being conducted. Therefore, this report examines and discusses each perspective as well as their divergent and sometimes intersecting research streams. Following this discussion, some of the most notable implications for each perspective are listed. Then some remarkable applications of each perspective are also discussed. Finally, some future research directions are suggested. Such discussions lead to an enhanced understanding of deception detection research.
|
7 |
Children's understanding about prosocial liesBroomfield, Katherine Ann January 2001 (has links)
No description available.
|
8 |
Self-deceptionShea, James Marvin, January 1966 (has links)
Thesis (Ph. D.)--Cornell University, 1966. / eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaf 179).
|
9 |
Dispersed deception an examination of the impacts of computer mediation, proximity, and familiarity on truth bias /Boyle, Randall John. George, Joey F. January 1900 (has links)
Thesis (Ph. D.)--Florida State University, 2003. / Advisor: Dr. Joey F. George, Florida State University, College of Business, Dept. of Management Information Systems. Title and description from dissertation home page (viewed Nov. 20, 2003). Includes bibliographical references.
|
10 |
Das gefährdungsdelikt der aussetzungHasenberg, Walter. January 1915 (has links)
Thesis--Rostock.
|
Page generated in 0.054 seconds