• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 182
  • 20
  • 18
  • 11
  • 8
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 334
  • 58
  • 51
  • 50
  • 44
  • 28
  • 20
  • 20
  • 19
  • 19
  • 18
  • 17
  • 15
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Condescension or confrontation St. John Chrysostom's interpretation of the "incident at Antioch" (Galatians 2:11-14) /

Robinson, Timothy N. January 1999 (has links)
Thesis (Th. M.)--Holy Cross Greek Orthodox School of Theology, Brookline, Mass., 1999. / Includes bibliographical references (leaves 117-122).
42

Condescension or confrontation St. John Chrysostom's interpretation of the "incident at Antioch" (Galatians 2:11-14) /

Robinson, Timothy N. January 1999 (has links)
Thesis (Th. M.)--Holy Cross Greek Orthodox School of Theology, Brookline, Mass., 1999. / Includes bibliographical references (leaves 117-122).
43

Miscommunication and deception in Chaucer's "Franklin's tale" /

Van Heyde, Genevieve Lynn, January 1986 (has links)
Thesis (M.A.)--Ohio State University, 1986. / Includes bibliographical references (leaves 34-35). Available online via OhioLINK's ETD Center
44

A comparative analysis of deception detection between blind and sighted individuals

Sahlman, James M. 01 January 1991 (has links)
This study hypothesizes a greater ability by blind subjects in detecting deceptive communication from an audio channel only. Accuracy and confidence levels for the blind were compared with normally sighted undergraduate students' results. All subjects were requested to indicate their perception on several audible cues, including: speech errors, pauses, vocal segregates, response duration, vocal certainty, vocal tension, vocal pleasantness, speaking volume and rate. Subjects also indicated whether they thought the messages on the stimulus tapes were deceptive or truthful. Stimulus tapes containing deceptive statements were created by inducing a cheating incident. Undergraduate students in a lower-level communication course participated in a dot estimation task where they either performed on their own abilities or cheated with a confederate. Interviews immediately following the procedure resulted in deceptive responses from all subjects induced into cheating. A discussion of cheating as a methodology is presented in the final chapter. Results from this study indicate that blind participants tended to be more accurate at detecting deceptive communication than sighted subjects. Although vocal cues were rated similarly by both groups, the greater detection accuracy by the blind suggests sensory compensation may occur as a result of blindness. The final chapter suggests that with better measurement of audible cues used by the blind, future research may discover much about the importance of these deceptive cues.
45

An attributional analysis of the effect of deceptive nonverbal behaviors on simulated jurors' decisions.

Chesley, Richard Buckey 01 January 1983 (has links) (PDF)
Interpersonal communication is both verbal and nonverbal. These two channels function most often in a supplementary fashion to each other (Ekman & Friesen, 1969). For example, the message that emanates from a person's facial expression is typically consistent with that person's verbal message. However, these communication modes can sometimes be quite contradictory in the information they impart. In the present study, people's judgements when confronted with incongruent interchannel information were investigated. The focus was on observers' decisions regarding the believability of another's verbal message when delivered in conjunction with nonverbal behaviors characteristic of deception.
46

Deceptive Environments for Cybersecurity Defense on Low-power Devices

Kedrowitsch, Alexander Lee 05 June 2017 (has links)
The ever-evolving nature of botnets have made constant malware collection an absolute necessity for security researchers in order to analyze and investigate the latest, nefarious means by which bots exploit their targets and operate in concert with each other and their bot master. In that effort of on-going data collection, honeypots have established themselves as a curious and useful tool for deception-based security. Low-powered devices, such as the Raspberry Pi, have found a natural home with some categories of honeypots and are being embraced by the honeypot community. Due to the low cost of these devices, new techniques are being explored to employ multiple honeypots within a network to act as sensors, collecting activity reports and captured malicious binaries to back-end servers for later analysis and network threat assessments. While these techniques are just beginning to gain their stride within the security community, they are held back due to the minimal amount of deception a traditional honeypot on a low-powered device is capable of delivering. This thesis seeks to make a preliminary investigation into the viability of using Linux containers to greatly expand the deception possible on low-powered devices by providing isolation and containment of full system images with minimal resource overhead. It is argued that employing Linux containers on low-powered device honeypots enables an entire category of honeypots previously unavailable on such hardware platforms. In addition to granting previously unavailable interaction with honeypots on Raspberry Pis, the use of Linux containers grants unique advantages that have not previously been explored by security researchers, such as the ability to defeat many types of virtual environment and monitoring tool detection methods. / Master of Science
47

通過欺騙自己來欺騙他人: 自我欺騙的心理機制. / Deceiving yourself to deceive others: the psychology of self-deception / 自我欺騙的心理機制 / CUHK electronic theses & dissertations collection / Tong guo qi pian zi ji lai qi pian ta ren: zi wo qi pian de xin li ji zhi. / Zi wo qi pian de xin li ji zhi

January 2011 (has links)
陸慧菁. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references. / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in Chinese and English. / Lu Huijing.
48

THE DEFINITION AND FUNCTION OF DECEPTIVE COMMUNICATION IN A LABOR-MANAGEMENT NEGOTIATION SESSION (LYING, BELIEFS, GENUINE).

TUCKER, ROBERT E. January 1984 (has links)
This study attempts to bring together the fields of communication, business, philosophy and linguistics. This effort is to make known particular behaviors exhibited in a negotiation setting with a focus on understanding why these behaviors are permitted and even embraced. The communicative dimension of these behaviors warrants study within a Speech Communication Department. The primary purpose of this study was to identify the conditions necessary for untrained observers to predict successful deception in labor-management negotiations. A secondary purpose was to discover observers' descriptions most commonly associated with negotiators. The dependent variable was an observer's judgment that deception would succeed in the negotiations context, measured by a 7-point Likert-type scale. The primary set of independent variables were HEARER-BELIEFS of a speaker's intent, the propositional content of the utterance made and the speaker's sincerity, measured by a 7-point Likert-type scale. The secondary set of independent variables were ten (10) plausible characteristics of a negotiator represented as bi-polar adjectives, measured by a 7-point semantic differential scale. The statistical procedures included a three-way analysis of variance (ANOVA), Scheffe's Test and a factor analysis. The three-way ANOVA allowed for presentation of the three (3) conditions in combination, permitting maximal detection of interactions. Also, the three-way ANOVA allowed for the introduction of and adjustment for each of the four (4) covariates. A single condition emerged as necessary for observers to predict successful deception in a labor-management negotiation session (content, p < .001). No single configuration of HEARER-BELIEFS was significantly more important in a prediction of successful deception than any other configuration. The quality of genuineness emerged as a primary criterion by which negotiators were described. Union leaders were evaluated by a secondary criterion of motivation. The belief-states of negotiators is far from being thoroughly understood. Research on deceptive communication, sensitive to context, should focus on the process of how humans predict successful deception. A cognitive index of deceptive communicative acts is proposed and a framework for future research is discussed.
49

Children's understanding of deception

Edmunds, Caroline Jane January 2001 (has links)
No description available.
50

Role of children's theory of mind in the expressive behaviours accompanying everyday deceit

Polak, Alan January 1997 (has links)
No description available.

Page generated in 0.0832 seconds