• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 182
  • 20
  • 18
  • 11
  • 8
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 334
  • 58
  • 51
  • 50
  • 44
  • 28
  • 20
  • 20
  • 19
  • 19
  • 18
  • 17
  • 15
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Telling bold lies: Martin Luther's theology of deception

Woods, Stephanie Anne 26 July 2023 (has links)
Luther’s theological and ethical consideration of lying is founded on protecting the reputation and welfare of the neighbor. In sermons, prayer books, catechisms, lectures, letters, and table talks, Luther addresses lies and secrecy in varying contexts and continually returns to the same conclusion: a person’s speech should protect the neighbor’s reputation rather than harm it. Luther first develops his thoughts on lying in catechetical literature on the eighth commandment, “You shall not bear false witness against your neighbor,” which he interprets positively as a requirement to protect the neighbor’s reputation. Diverging from an idealized Augustinian ethic which condemns all lies as sinful, Luther’s emphasis on protection of the neighbor allows him to identify truths as sinful when they harm another and lies as sinless when they protect another. Luther does draw on Augustine’s framework of three types of lies—the harmful, the playful, and the dutiful—to distinguish among sinful, harmless, and beneficial lies. Luther maintains this focus on protection and the distinction among kinds of lies in his Lectures on Genesis, where he examines lies in many different contexts, commending some and condemning others. Luther’s interpretations expand to offer application and advice to his contemporaries, including advice on how to deceive others in an appropriate way. Luther’s consistent position on deception in his catechetical and exegetical writing provides his rationale for advising lying in the case of Philipp of Hesse’s bigamy despite the disastrous consequences for both Luther and Philipp. Combined with his theology of the seal of the confessional, Luther’s view of lying provides further protection for the neighbor, whether the neighbor is a rich influential ruler or the vulnerable woman next door. As others in the Wittenberg circle wrote their own catechisms, they drew heavily on Luther’s concern for protecting the neighbor and continue to excuse lies that prevent harm. Luther’s emphasis on protection and prevention of harm thus become an enduring focus in the Lutheran ethical tradition’s treatment of lying and deception. / 2025-07-26T00:00:00Z
162

Integrity Matters: Construction and Validation of an Instrument to Assess Ethical Integrity as an Attitudinal Phenomenon

Ingerson, Marc-Charles 01 July 2014 (has links) (PDF)
This research reviews theoretical and operational concepts of integrity. After this review, an alternative theoretical and operational definition of integrity is proposed. This alternative is one that conceives of integrity in terms of high ethical concern and positive ethical consistency among thoughts, feelings, and behavioral intentions, and which conceives of integrity as more attitude-like than trait- or state-like. Utilizing this alternative conceptualization of integrity, a new label was applied (i.e. ethical integrity) and a new psychometric instrument was developed (i.e. the Ethical Integrity Scale). This dissertation reports on the initial development of the Ethical Integrity Scale and two studies aimed at validation of this instrument. Strengths, limitations, and future directions of this approach to integrity research are then discussed.
163

Deception in Super Bowl Advertisements: An Analysis of Deceptive Story Lines

Near, Christopher R. 03 May 2008 (has links) (PDF)
Many ethical studies have focused on advertising; however, they have yet to focus specifically on Super Bowl advertisements. This thesis examines the ethical issue of portraying deceptive acts within the storylines of Super Bowl advertisements from 1988-2008. Results indicate that 196 of the 2,172 advertisements studied, contain deceptive storylines. Most often the advertisements depicted white males, ages 30-64, using deception. Also, deception was usually done out of self interest at the expense of others. The deception often led to negative social, material, and emotional consequences for the person being deceived, with mostly positive outcomes being shown for the person doing the deceiving. These, and other actions, provide a model of behavior that may have a negative impact on society, which warrants future research on this subject.
164

A database for facial behavioural analysis

Yap, M.H., Ugail, Hassan, Zwiggelaar, R. January 2013 (has links)
No / There is substantial interest in detection of human behaviour that may reveal people with deliberate malicious intent, who are engaging in deceit. Technology exists that is able to detect changes in facial patterns of movement and thermal signatures on the face. However, there is data deficiency in the research community for further study. Therefore this project aims to overcome the data deficiency in psychology study and algorithms development. A within-subjects design experiment was conducted, using immigration as a scenario for investigate participants in control and experimental conditions. A random sample of 32 volunteers were recruited, their age group is within 18 - 33. The study design required participants to answer questions on two topics, one as themselves and one as a predefined character. Data regarding visible and thermal images of facial movement and behaviour were collected. A rich FACS-coded database with high quality thermal images was established. Finally, recommendations for development and subsequent implementation of the facial analysis technique were made.
165

Facial Behavioral Analysis: A Case Study in Deception Detection

Yap, Moi Hoon, Ugail, Hassan, Zwiggelaar, R. 11 November 2013 (has links)
Yes / The objective of every wind energy producer is to reduce operational costs associated to the production as a way to increase profits. One other issue that must be looked carefully is the equipment maintenance. Increase the availability of wind turbines by reducing the downtime associated to failures is a good strategy to achieve the main goal of increase profits. As a way to help in the definition of the best maintenance strategies, condition monitoring systems (CMS) have an important role to play. Informatics tools to make the condition monitoring of the wind turbines were developed and are now being installed as a way to help producers reducing the operational costs. There are a lot of developed systems to do the monitoring of a wind turbine or the whole wind park, in this paper will be made an overview of the most important systems.
166

True and intentionally fabricated memories

Justice, L.V., Morrison, Catriona M., Conway, M.A. January 2013 (has links)
yes / The aim of the experiment reported here was to investigate the processes underlying the construction of truthful and deliberately fabricated memories. Properties of memories created to be intentionally false (fabricated memories) were compared to properties of memories believed to be true (true memories). Participants recalled and then wrote or spoke true memories and fabricated memories of everyday events. It was found that true memories were reliably more vivid than fabricated memories and were nearly always recalled from a first-person perspective. In contrast, fabricated differed from true memories in that they were judged to be reliably older, were more frequently recalled from a third-person perspective, and linguistic analysis revealed that they required more cognitive effort to generate. No notable differences were found across modality of reporting. Finally, it was found that intentionally fabricated memories were created by recalling and then “editing” true memories. Overall, these findings show that true and fabricated memories systematically differ, despite the fact that both are based on true memories.
167

Linguistic Cues to Deception

Connell, Caroline 05 June 2012 (has links)
This study replicated a common experiment, the Desert Survival Problem, and attempted to add data to the body of knowledge for deception cues. Participants wrote truthful and deceptive essays arguing why items salvaged from the wreckage were useful for survival. Cues to deception considered here fit into four categories: those caused by a deceivers' negative emotion, verbal immediacy, those linked to a deceiver's attempt to appear truthful, and those resulting from deceivers' high cognitive load. Cues caused by a deceiver's negative emotions were mostly absent in the results, although deceivers did use fewer first-person pronouns than truth tellers. That indicated deceivers were less willing to take ownership of their statements. Cues because of deceivers' attempts to appear truthful were present. Deceivers used more words and more exact language than truth tellers. That showed an attempt to appear truthful. Deceivers' language was simpler than that of truth tellers, which indicated a higher cognitive load. Future research should include manipulation checks on motivation and emotion, which are tied to cue display. The type of cue displayed, be it emotional leakage, verbal immediacy, attempts to appear truthful or cognitive load, might be associated with particular deception tasks. Future research, including meta-analyses, should attempt to determine which deception tasks produce which cue type. Revised file, GMc 5/28/2014 per Dean DePauw / Master of Arts
168

Deindividuation of Drivers: Is Everyone Else a Bad Driver?

MacArthur, Keith 01 January 2014 (has links) (PDF)
Deindividuation is a psychological phenomenon that occurs when a given environment reduces the "individuality" or identifiability of a person. These environments may cause a psychological reduction in self-consciousness, potentially leading to violations of sociocultural norms (Festinger, Pepitone, & Newcomb, 1952; Singer, Brush, & Lublin, 1965). The present research sought to empirically test deindividuation theory among automobile drivers utilizing the anonymizing factor of observation. Participants (N = 31) used a driving simulator and were either in the observed condition or an unobserved condition. Analysis of driving data did not reveal significant results, however self-report data had some interesting trends. Though limited in scope, this research begins to shed light on deindividuation of drivers and may provide a foundation for future research.
169

Química mineral, petrografia, e geoquímica das rochas vulcânicas da Ilha Deception, Antártida

Lima, Rayane Gois de 24 February 2017 (has links)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / The work’s goal is the petrographic, geochemical and mineral chemistry of volcanic rocks from Deception Island, Antarctica. The interpretation of mineral chemistry data of primary minerals from volcanic rocks of pre and post caldera phases, made possible the identifying of chrysolite presence as olivine-type and augite as prevailing clinopyroxene. The plagioclase phenocrystals were classified as bytownite and labradorite. Andesine is the occurrence rare and restricted to the pre-caldera phase. In the matrix, the plagioclase microliths are prevailing labradorite. The chemical characterization of effusive deposits from pre and post caldera were worked through the processing and interpretation from whole rock chemical data. The magmatic process involved in the volcanic rock genesis was a fractionated crystallization of olivine ± clinopyroxene ±plagioclase ±opaque minerals. / Este trabalho teve como objetivo, o estudo petrográfico, geoquímico e de química mineral das rochas vulcânicas da Ilha Deception, Antártida. A interpretação dos dados de química mineral dos minerais primários, das rochas vulcânicas das fases pré e pós caldeira, permitiu identificar a presença de olivina do tipo crisólita e augita como clinopiroxênio dominante. Os fenocristais de plagioclásio foram classificados como bytownita e labradorita, sendo a andesina de ocorrência rara e restrita a fase pré-caldeira. Na matriz, os micrólitos de plagioclásio são dominantemente do tipo labradorita. A caracterização química dos depósitos efusivos das fases pré e pós caldeira foi realizado, através do tratamento e interpretação de dados químicos de rocha total. O processo magmático envolvido na gênese das rochas vulcânicas foi a cristalização fracionada de olivina ± clinopiroxênio ± plagioclásio ± minerais opacos.
170

Deception strategies for web application security: application-layer approaches and a testing platform

Izagirre, Mikel January 2017 (has links)
The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. Existing misuse and anomaly-based detection and prevention techniques fail to cope with the volume and sophistication of new attacks that are continuously appearing, which suggests that there is a need to provide new additional layers of protection. This work aims to design a new layer of defense based on deception that is employed in the context of web application-layer traffic with the purpose of detecting and preventing attacks. The proposed design is composed of five deception strategies: Deceptive Comments, Deceptive Request Parameters, Deceptive Session Cookies, Deceptive Status Codes and Deceptive JavaScript. The strategies were implemented as a software artifact and their performance evaluated in a testing environment using a custom test script, the OWASP ZAP penetration testing tool and two vulnerable web applications. Deceptive Parameter strategy obtained the best security performance results, followed by Deceptive Comments and Deceptive Status Codes. Deceptive Cookies and Deceptive JavaScript got the poorest security performance results since OWASP ZAP was unable to detect and use deceptive elements generated by these strategies. Operational performance results showed that the deception artifact could successfully be implemented and integrated with existing web applications without changing their source code and adding a low operational overhead.

Page generated in 0.0884 seconds