نتایج جستجو برای: deception

تعداد نتایج: 3829  

2003
Jinwei Cao Janna M. Crews Ming Lin Judee K. Burgoon Jay F. Nunamaker

Research has long recognized that many biases and shortcomings of humans severely limit their ability to accurately detect deception, and this may lead to great risks in government or military operations. One possible method to improve humans’ deception detection ability is to train them to recognize cues of deception. To do this, we need to create effective training curricula and educational t...

Journal: :Social cognitive and affective neuroscience 2014
Qian Cui Eric J Vanman Dongtao Wei Wenjing Yang Lei Jia Qinglin Zhang

The ability of a deceiver to track a victim's ongoing judgments about the truthfulness of the deceit can be critical for successful deception. However, no study has yet investigated the neural circuits underlying receiving a judgment about one's lie. To explore this issue, we used a modified Guilty Knowledge Test in a mock murder situation to simultaneously record the neural responses involved ...

Journal: :The Journal of psychology 2015
Clea Wright Whelan Graham F Wagstaff Jacqueline M Wheatcroft

The low ecological validity of much of the research on deception detection is a limitation recognized by researchers in the field. Consequently, the present studies investigated subjective cues to deception using the real life, high stakes situation of people making public appeals for help with missing or murdered relatives. It was expected that cues related to affect would be particularly sali...

2003
Ming Lin Janna M. Crews Jinwei Cao Jay F. Nunamaker Judee K. Burgoon

Although detection of malicious deception is important to prevention of possible harm to individuals or organizations, human deception detection accuracy is poor (around 40%-60%) because people lack deception detection knowledge. Therefore it is important to create strategies and tools for making effective transfer of deception detection knowledge readily available to the masses. This paper des...

2013
Wei Wang Jeffrey Bickford Ilona Murynets Ramesh Subbaraman Andrea G. Forte Gokul Singaraju

Over the past few years, enterprises are facing a growing number of highly customized and targeted attacks that use sophisticated techniques and seek after important company assets, such as customer data and intellectual property. Unlike conventional attacks, targeted attacks are operated by experts who use multiple steps to gain access to sensitive assets, and most of time, leave very few netw...

2013
Ryan McKay Danica Mijović-Prelec Dražen Prelec

Von Hippel & Trivers (VH&T) propose that self-deception has evolved to facilitate the deception of others. However, they ignore the subjective moral costs of deception and the crucial issue of credibility in self-deceptive speech. A self-signaling interpretation can account for the ritualistic quality of some self-deceptive affirmations and for the often-noted gap between what self-deceivers sa...

Journal: :Biological reviews of the Cambridge Philosophical Society 2006
Jana Jersáková Steven D Johnson Pavel Kindlmann

The orchid family is renowned for its enormous diversity of pollination mechanisms and unusually high occurrence of non-rewarding flowers compared to other plant families. The mechanisms of deception in orchids include generalized food deception, food-deceptive floral mimicry, brood-site imitation, shelter imitation, pseudoantagonism, rendezvous attraction and sexual deception. Generalized food...

2018
Marina Del Rey Olu Popoola

This study explores the potential of a theory of discourse coherence relations to distinguish between truth and deception. It uses Rhetorical Structure Theory and logistic regression to build a deception model that achieves 78% accuracy on a sample of goldstandard Amazon book reviews drawn from the Deceptive Review corpus. It finds Contrast discourse relations to be a significant predictor of v...

2007
Amanda J. Norris Larry Powell Mark Hickson Ross

This study examined the relationship between self-deception and religiosity in two different samples: (1) fifty members of a non-denominational church, and (2) 54 students at a state university. The participants responded to Allport and Ross (1967) Religious Orientation Scale and the Paulhus (1984, 1998) Deception Scale. The results indicated that the nature of the relationship depends upon at ...

2008
Begona Perez-Mira

Over 29,000 phishing emails are reported each month on average to the AntiPhishing Working Group. If we consider that at least 5% of these emails achieve their target, at least 1,450 distinct email users a month are caught in the phisher’s net. This study attempts to understand the basic deception techniques utilized by phishers when creating the phishing emails. Exploratory content and linguis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید