181 |
Pollinator-mediated selection, reproductive isolation and the evolution of floral traits in Ophrys (Orchidaceae)Vereecken, Nicolas J 15 May 2008 (has links)
Cette thèse aborde l’écologie et l’évolution des relations qu’entretiennent les orchidées du genre Ophrys avec leurs pollinisateurs. L’approche comparative et la combinaison (i)
d’analyses chimiques de phéromones sexuelles et de parfums floraux, (ii) d’analyses génétiques avec des outils moléculaires, et (ii) de tests de comportement réalisés sur les insectes in situ nous ont permis d’éclairer certains aspects méconnus de ces interactions inter-spécifiques. La pollinisation des orchidées du genre Ophrys est assurée par des mâles d'abeilles ou de guêpes solitaires qui opèrent une tentative d’accouplement (pseudocopulation) sur le labelle des fleurs. L'attraction des pollinisateurs est généralement hautement spécifique, régie par un mimétisme des signaux (chimiques, visuels, tactiles) des femelles des espèces d'insectes concernés. Malgré cette spécificité, des hybrides se forment occasionnellement en conditions naturelles, témoignant de la perméabilité partielle des barrières d'isolement reproductif entre espèces. Au cours de
ce programme de recherche, nous avons entrepris l’étude des interactions Ophryspollinisateurs en mettant l’accent sur trois aspects spécifiques, à savoir (i) la sélection des caractères floraux par les pollinisateurs, (ii) l'isolement reproductif entre espèces d'Ophrys sympatriques, et enfin (iii) l'évolution des caractères floraux au sein d'un complexe d'espèces-soeurs d'Ophrys associées à différents pollinisateurs. Les principaux
résultats de ce travail sont repris ci-dessous, ponctués de références aux articles qui rassemblent l’intégralité des études réalisées.
|
182 |
A system of deception and fraud detection using reliable linguistic cues including hedging, disfluencies, and repeated phrasesHumpherys, Sean L. January 2010 (has links)
Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines. Decision support systems can help. But the success of the system depends on reliable cues that can distinguish deceptive/truthful behavior and on a proven classification algorithm. This investigation aims to identify linguistic cues that distinguish deceivers from truthtellers; and it aims to demonstrate how the cues can successfully classify deception and truth.Three new datasets were gathered: 202 fraudulent and nonfraudulent financial disclosures (10-Ks), a laboratory experiment that asked twelve questions of participants who answered deceptively to some questions and truthfully to others (Cultural Interviews), and a mock crime experiment where some participants stole a ring from an office and where all participants were interviewed as to their guilt or innocence (Mock Crime). Transcribed participant responses were investigated for distinguishing cues and used for classification testing.Disfluencies (e.g., um, uh, repeated phrases, etc.), hedging words (e.g., perhaps, may, etc.), and interjections (e.g., okay, like, etc.) are theoretically developed as potential cues to deception. Past research provides conflicting evidence regarding disfluency use and deception. Some researchers opine that deception increases cognitive load, which lowers attentional resources, which increases speech errors, and thereby increases disfluency use (i.e., Cognitive-Load Disfluency theory). Other researchers argue against the causal link between disfluencies and speech errors, positing that disfluencies are controllable and that deceivers strategically avoid disfluencies to avoid appearing hesitant or untruthful (i.e., Suppression-Disfluency theory). A series of t-tests, repeated measures GLMs, and nested-model design regressions disconfirm the Suppression-Disfluency theory. Um, uh, and interjections are used at an increased rate by deceivers in spontaneous speech. Reverse order questioning did not increase disfluency use. Fraudulent 10-Ks have a higher mean count of hedging words.Statistical classifiers and machine learning algorithms are demonstrated on the three datasets. A feature reduction by backward Wald stepwise with logistic regression had the highest classification accuracies (69%-87%). Accuracies are compared to professional interviewers and to previously researched classification models. In many cases the new models demonstrated improvements. 10-Ks are classified with 69% overall accuracy.
|
183 |
Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection SystemsElkins, Aaron Chaim January 2011 (has links)
This dissertation investigates vocal behavior, measured using standard acoustic and commercial vocal analysis software, as it occurs naturally while lying, experiencing cognitive dissonance, or receiving a security interview conducted by an Embodied Conversational Agent (ECA).In study one, vocal analysis software used for credibility assessment was investigated experimentally. Using a repeated measures design, 96 participants lied and told the truth during a multiple question interview. The vocal analysis software's built-in deception classifier performed at the chance level. When the vocal measurements were analyzed independent of the software's interface, the variables FMain (Stress), AVJ (Cognitive Effort), and SOS (Fear) significantly differentiated between truth and deception. Using these measurements, a logistic regression and machine learning algorithms predicted deception with accuracy up to 62.8%. Using standard acoustic measures, vocal pitch and voice quality was predicted by deception and stress.In study two, deceptive vocal and linguistic behaviors were investigated using a direct manipulation of arousal, affect, and cognitive difficulty by inducing cognitive dissonance. Participants (N=52) made verbal counter-attitudinal arguments out loud that were subjected to vocal and linguistic analysis. Participants experiencing cognitive dissonance spoke with higher vocal pitch, response latency, linguistic Quantity, and Certainty and lower Specificity. Linguistic Specificity mediated the dissonance and attitude change. Commercial vocal analysis software revealed that cognitive dissonance induced participants exhibited higher initial levels of Say or Stop (SOS), a measurement of fear.Study three investigated the use of the voice to predict trust. Participants (N=88) received a screening interview from an Embodied Conversational Agent (ECA) and reported their perceptions of the ECA. A growth model was developed that predicted trust during the interaction using the voice, time, and demographics.In study four, border guards participants were randomly assigned into either the Bomb Maker (N = 16) or Control (N = 13) condition. Participants either did or did not assemble a realistic, but non-operational, improvised explosive device (IED) to smuggle past an ECA security interviewer. Participants in the Bomb Maker condition had 25.34% more variation in their vocal pitch than the control condition participants.This research provides support that the voice is potentially a reliable and valid measurement of emotion and deception suitable for integration into future technologies such as automated security screenings and advanced human-computer interactions.
|
184 |
Automated Human Screening for Detecting Concealed KnowledgeTwyman, Nathan W. January 2012 (has links)
Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation and empirical evaluation of a non-invasive, automated system for human screening. The screening system design (termed an automated screening kiosk or ASK) is patterned after a standard interviewing method called the Concealed Information Test (CIT), which is built on theories explaining psychophysiological and behavioral effects of human orienting and defensive responses. As part of testing the ASK proof of concept, I propose and empirically examine alternative indicators of concealed knowledge in a CIT. Specifically, I propose kinesic rigidity as a viable cue, propose and instantiate an automated method for capturing rigidity, and test its viability using a traditional CIT experiment. I also examine oculomotor behavior using a mock security screening experiment using an ASK system design. Participants in this second experiment packed a fake improvised explosive device (IED) in a bag and were screened by an ASK system. Results indicate that the ASK design, if implemented within a highly controlled framework such as the CIT, has potential to overcome barriers to more widespread application of concealed knowledge testing in government and business settings.
|
185 |
Social Learning of Attitudes toward Deception in Adult Survivors of Child VictimizationDunivan, Michelle January 2012 (has links)
Child maltreatment is extremely prevalent and leads to a host of negative effects, both immediately and long term. Instances of maltreatment are often accompanied by deception, both by the perpetrator, as well as by the victim in order to avoid stigma and protect family. Thus, this study investigated social learning of deception through instances of maltreatment. 413 young adults completed an online survey assessing current attitudes toward deception, childhood maltreatment including child sexual abuse, child physical abuse, witnessing interparental violence, psychological abuse, neglect and parental addiction, social support, and participant addiction. Results indicated that neglect and psychological abuse during childhood, and current addiction were associated with a positive attitude toward deception. Severity of CSA and severity of neglect each interacted with role (agent or target) in the deceptive scenario to determine attitude toward deception. Severity of CPA interacted with perceived social support to determine attitude toward deception. Furthermore, victim's awareness of deception by perpetrators of CSA was associated with a more negative attitude toward deception. These findings support both attachment theory and social learning explanations for adulthood attitude toward deception. Attachment theory explains why neglected and psychologically abused individuals find their own deception more acceptable and other's deception less acceptable than their non-neglected counterparts, and why the opposite pattern is true for victims of CSA; and social learning theory's emphasis on attention and reinforcement to motivate behavior are supported by these findings.
|
186 |
Kan militär vilseledning skapa förtroende? / Can military deception build trust?Miller, Emil January 2011 (has links)
Syftet med uppsatsen är att undersöka om teorin för ”Hearts and Minds” kan nå framgång med militär vilseledning. De teorier som finns sedan tidigare berör inte hur teorierna om att vinna befolkningens stöd skall gå till när militär vilseledning och upprorsbekämpning används. För att undersöka om militär vilseledning kan användas framgångsrikt inom arbetet att vinna ”Hearts and Minds” blir teorier för militär vilseledning och teorier för upprorsbekämpning beskrivna. Undersökningen analyserar den genomförda vilseledning som finns inom konflikterna på Nordirland, Algeriet 1954-1962 och Malaysia 1948-1960 för att belysa de fall av vilseledning som funnits inom upprorsbekämpningen i konflikterna. Slutsatserna av uppsatsen visar att vilseledning sannolikt inte hjälper arbetet med ”Hearts and Minds” på ett framgångsrikt sätt. Dock kan vilseledning skapa förutsättningar för ”Hearts and Minds”-operationer om det går att säkerställa att effekten av vilseledningen är isolerad till rebellerna och inte befolkningen. / The purpose of this essay is to explore whether or not military deception can aid the work with “Hearts and Minds”. The theory that already exist do not deal with the incorporation of how the work with “Hearts and Minds” should be done with regards to military deception. Theorys for counterinsurgency and military deception are described in order to explore whether deception could be used usefully within a “Hearts and Minds”-operation. The study analyzes the executed deception found in the conflicts in Northern Ireland, Algeria and Malaysia, 1954-1962 1948-1960, to show the cases of military deception within the insurrectionperformed by the counterinsurgent. The conclusions of the thesis shows that deception is unlikely to help work on "Hearts and Minds" in a successful manner. However, deception may create conditions for "Hearts and Minds" operations if it is possible to ensure that the effect of deception is isolated to the rebels and not to the people.
|
187 |
Decision-Making in the Primate BrainDrucker, Caroline Beth January 2016 (has links)
<p>Making decisions is fundamental to everything we do, yet it can be impaired in various disorders and conditions. While research into the neural basis of decision-making has flourished in recent years, many questions remain about how decisions are instantiated in the brain. Here we explored how primates make abstract decisions and decisions in social contexts, as well as one way to non-invasively modulate the brain circuits underlying decision-making. We used rhesus macaques as our model organism. First we probed numerical decision-making, a form of abstract decision-making. We demonstrated that monkeys are able to compare discrete ratios, choosing an array with a greater ratio of positive to negative stimuli, even when this array does not have a greater absolute number of positive stimuli. Monkeys’ performance in this task adhered to Weber’s law, indicating that monkeys—like humans—treat proportions as analog magnitudes. Next we showed that monkeys’ ordinal decisions are influenced by spatial associations; when trained to select the fourth stimulus from the bottom in a vertical array, they subsequently selected the fourth stimulus from the left—and not from the right—in a horizontal array. In other words, they begin enumerating from one side of space and not the other, mirroring the human tendency to associate numbers with space. These and other studies confirmed that monkeys’ numerical decision-making follows similar patterns to that of humans, making them a good model for investigations of the neurobiological basis of numerical decision-making. </p><p>We sought to develop a system for exploring the neuronal basis of the cognitive and behavioral effects observed following transcranial magnetic stimulation, a relatively new, non-invasive method of brain stimulation that may be used to treat clinical disorders. We completed a set of pilot studies applying offline low-frequency repetitive transcranial magnetic stimulation to the macaque posterior parietal cortex, which has been implicated in numerical processing, while subjects performed a numerical comparison and control color comparison task, and while electrophysiological activity was recorded from the stimulated region of cortex. We found tentative evidence in one paradigm that stimulation did selectively impair performance in the number task, causally implicating the posterior parietal cortex in numerical decisions. In another paradigm, however, we manipulated the subject’s reaching behavior but not her number or color comparison performance. We also found that stimulation produced variable changes in neuronal firing and local field potentials. Together these findings lay the groundwork for detailed investigations into how different parameters of transcranial magnetic stimulation can interact with cortical architecture to produce various cognitive and behavioral changes.</p><p>Finally, we explored how monkeys decide how to behave in competitive social interactions. In a zero-sum computer game in which two monkeys played as a shooter or a goalie during a hockey-like “penalty shot” scenario, we found that shooters developed complex movement trajectories so as to conceal their intentions from the goalies. Additionally, we found that neurons in the dorsolateral and dorsomedial prefrontal cortex played a role in generating this “deceptive” behavior. We conclude that these regions of prefrontal cortex form part of a circuit that guides decisions to make an individual less predictable to an opponent.</p> / Dissertation
|
188 |
Saul Bellow's Creation of Ambiguity and Deception in Herzog and The Dean's DecemberBanks, Paul J. (Paul Jerome) 08 1900 (has links)
Argues that Bellow purposefully creates ambiguity and deception using impersonal narration and free indirect discourse in order to present Herzog and The Dean's December as reflections of an ambiguous and deceptive world. The discussion of impersonal narration is based on Wayne Booth's theories about the confusion of distance resulting from impersonal narration; the discussion of free indirect discourse is drawn from a number of definitions. Utilizes a number of specific references to the texts and to criticisms of the texts to demonstrate the absence of norms and the effect that the ambiguity and deception may have on readers.
|
189 |
Donner et utiliser des conseils en situation de conflit d'intérêts / Giving and taking advice when interests are in conflictLeblois, Sylvie 22 October 2012 (has links)
Cette thèse traite de l'utilisation et de la dispense de conseils dans un contexte de conflit d'intérêts avéré ou suspecté entre le juge et le conseiller. Une première partie s'intéresse aux conseils vagues et explore les différentes interprétations que le juge peut en faire. Le résultat principal est la mise en évidence du rôle prépondérant joué par la bienveillance perçue chez le conseiller dans l'interprétation de ce type de conseils. Une deuxième partie étudie les effets de la bienveillance et de la compétence du conseiller sur la confiance qui lui est accordée mais également sur la fiabilité de ses conseils en comparant une situation où les intérêts du juge et du conseiller sont en conflit à une situation où ils ne le sont pas. Nos résultats montrent que les participants ne sont pas sensibles au conflit lorsqu'ils utilisent des conseils: ils se basent uniquement sur les paramètres individuels du conseiller. Par contre, ils se montrent attentifs au conflit lorsqu'ils dispensent des conseils: dans ce cas, leur bienveillance détermine la hauteur de l'aide qu'ils apportent au juge; leur compétence détermine la qualité et l'honnêteté de leurs conseils. La dernière partie traite exclusivement de la dispense de conseils en situation de conflit d'intérêts et approfondit l'étude du lien entre compétence du conseiller et honnêteté des conseils. Nos résultats montrent que l'incertitude ressentie par les conseillers les moins compétents vis à vis de leurs conseils peut les pousser à donner des conseils malhonnêtes car elle réduit la probabilité que ces conseils aient des conséquences néfastes. Ce même phénomène se manifeste lorsque l'incertitude est générée par la situation. / This phD thesis studies advice-giving and advice-taking in a situation of conflicting interests between judges and advisors. The first part looks more specifically at vague advice and examines all possible interpretations advisors can make of this vagueness. Our main result shows that perceived benevolence positively influences advice-taking. The second part investigates the effects of advisors' benevolence and competence on judges' trust when they use advice and on advisors' actual trustworthiness when they give advice. We compare situations with and without conflict of interests. Our results show that people are not sensitive to conflict of interests for advice-taking: they only use dispositional cues concerning the advisor. By contrast, they take into account the conflict when they give advice: the amount of help given to the judge depends on benevolence; the quality and sincerity of advice depend on advisors' competence. In the last part, we only study advice-giving in a situation of conflicting interests and we investigate more deeply the relation between advisors' competence and their sincerity. Our results show that uncertainty experienced by the least competent advisors about their advice can lead them to give unsincere advice because it less likely has a negative impact on judge. This phenomenon also occurs when uncertainty comes from the situation.
|
190 |
Online Deceit:The Use of Idiosyncratic Cues in Identifying Duplicitous User-generated ContentChristopher R Roland (7011581) 15 August 2019 (has links)
The emergence of online information-seekers harnessing the aggregated experiences of others to evaluate online information has coincided with deceptive entities exploiting this tool to bias judgments. One method through which deceit about user-generated content can occur is through single entities impersonating multiple, independent content providers to saturate content samples. Two studies are introduced to explore how idiosyncratic indicators, features co-occurring between content messages that implicate a higher probability of deceit, can be used as a criterion to identify content that is not independently authored. In Study 1, analyses of a pairwise comparison of hypothetical reviews revealed that ratings of content independence were significantly lower when review pairs co-occurred in the attributes, text, and usernames compared to being heterogenous. In a high-fidelity experiment, Study 2 assessed if the effect of idiosyncratic indicators on independence is increased in the presence of multiple indicators, if it is attenuated with a high number of reviews, and if it impacts factors relevant to the choice selection process. As expected, the findings of Study 1 were replicated in addition to further revealing that the presence of multiple idiosyncratic cues yielded lower independence ratings. An interaction effect with idiosyncratic indicators and high review number was observed such that the effect of the former on independence was attenuated when there were a high number of reviews to obscure the presence of these indicators.
|
Page generated in 0.0914 seconds