Detecting Deception by Analyzing Written Statements in Korean
نویسندگان
چکیده
منابع مشابه
Analysing Deception in Written Witness Statements
Written witness statements are a unique source for the study of high-stakes textual deception. To date, however, there is no distinction in the way that they and other forms of verbal deception have been analysed, with written statements treated as extensions of transcribed versions of oral reports. Given the highly context-dependent nature of cues, it makes sense to take the characteristics of...
متن کاملAnalyzing Financial Statements
1. Describe the balanced scorecard and dashboard reporting. 2. Describe the four key elements of dashboard reporting. 3. Explain what the most important measure of financial success is. 4. Explain what a health care firm’s primary financial objective should be. 5. Describe the critical drivers of financial performance. 6. Discuss relevant healthcare financial performance measures. 7. Describe t...
متن کاملDetecting deception by loading working memory∗
Compared to truthful answers, deceptive responses to queries are expected to take longer to initiate. Yet attempts to detect lies through reaction time (RT) have met with limited success. We describe a new procedure that seems to increase the RT difference between truth-telling and lies. It relies on a Stroop-like procedure in which responses to the labels true and false are sometimes reversed....
متن کاملDetecting deception by manipulating cognitive load.
distracters are eliminated from what is defined as the nodistraction condition. It also is important to determine whether behavioral results can be extended to procedures involving non-spatial memoranda [2,3,5]. In addition to the specific results, the Vogel et al. study [8] shows that a combination of experimental, psychometric and physiological methods can strengthen our understanding of how ...
متن کاملDetecting Targeted Attacks by Multilayer Deception
Over the past few years, enterprises are facing a growing number of highly customized and targeted attacks that use sophisticated techniques and seek after important company assets, such as customer data and intellectual property. Unlike conventional attacks, targeted attacks are operated by experts who use multiple steps to gain access to sensitive assets, and most of time, leave very few netw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Linguistic Evidence in Security, Law and Intelligence
سال: 2014
ISSN: 2327-5596
DOI: 10.5195/lesli.2014.13