Gotowa bibliografia na temat „Deception”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Deception”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Deception"

1

Beahrs, John O. "Ritual Deception: A Window to the Hidden Determinants of Human Politics". Politics and the Life Sciences 15, nr 1 (marzec 1996): 3–12. http://dx.doi.org/10.1017/s0730938400019559.

Pełny tekst źródła
Streszczenie:
Political leaders of all persuasions are known to make public statements of affiliative allegiance with more form than substance, and to disavow political motivations obvious to the public. Such “ritual deceptions” are better understood in the same light as social etiquette—as partly deceptive behaviors that help to bond individuals with conflicting interests. Those who are more open and honest are often punished, more for breaking unspoken rules and taboos than for the actual content revealed. The functions of ritual deception are explicated by sociobiological theory, and the process, by understanding hypnotic transactions. Political deceptions require the active collaboration of subjects, achieved through the same skills used by experienced hypnotists. Deceptive transactions are more likely to occur in internally traumatized societies, and occur along a continuum from ritual deception to overt disinformation. Examples are taken from recent American history. That the content of ritual deception is so close to full awareness suggests its value as a focal point, both for studying the hidden determinants within human politics, and for policy intervention when appropriate.
Style APA, Harvard, Vancouver, ISO itp.
2

Twisha Patel, Et al. "Deception/Truthful Prediction Based on Facial Feature and Machine Learning Analysis". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 10 (2.11.2023): 797–803. http://dx.doi.org/10.17762/ijritcc.v11i10.8595.

Pełny tekst źródła
Streszczenie:
The Automatic Deception detection refers to the investigative practices used to determine whether person is telling you Truth or lie. Automatic deception detection has been studied extensively as it can be useful in many real-life scenarios in health, justice, and security systems. Many psychological studies have been reported for deception detection. Polygraph testing is a current trending technique to detect deception, but it requires human intervention and training. In recent times, many machine learning based approaches have been applied to detect deceptions. Various modalities like Thermal Imaging, Brain Activity Mapping, Acoustic analysis, eye tracking. Facial Micro expression processing and linguistic analyses are used to detect deception. Machine learning techniques based on facial feature analysis look like a promising path for automatic deception detection. It also works without human intervention. So, it may give better results because it does not affect race or ethnicity. Moreover, one can do covert operation to find deceit using facial video recording. Covert Operation may capture the real personality of deceptive persons. By making combination of various facial features like Facial Emotion, Facial Micro Expressions and Eye blink rate, pupil size, Facial Action Units we can get better accuracy in Deception Detection.
Style APA, Harvard, Vancouver, ISO itp.
3

von Hippel, William, i Robert Trivers. "The evolution and psychology of self-deception". Behavioral and Brain Sciences 34, nr 1 (luty 2011): 1–16. http://dx.doi.org/10.1017/s0140525x10001354.

Pełny tekst źródła
Streszczenie:
AbstractIn this article we argue that self-deception evolved to facilitate interpersonal deception by allowing people to avoid the cues to conscious deception that might reveal deceptive intent. Self-deception has two additional advantages: It eliminates the costly cognitive load that is typically associated with deceiving, and it can minimize retribution if the deception is discovered. Beyond its role in specific acts of deception, self-deceptive self-enhancement also allows people to display more confidence than is warranted, which has a host of social advantages. The question then arises of how the self can be both deceiver and deceived. We propose that this is achieved through dissociations of mental processes, including conscious versus unconscious memories, conscious versus unconscious attitudes, and automatic versus controlled processes. Given the variety of methods for deceiving others, it should come as no surprise that self-deception manifests itself in a number of different psychological processes, and we discuss various types of self-deception. We then discuss the interpersonal versus intrapersonal nature of self-deception before considering the levels of consciousness at which the self can be deceived. Finally, we contrast our evolutionary approach to self-deception with current theories and debates in psychology and consider some of the costs associated with self-deception.
Style APA, Harvard, Vancouver, ISO itp.
4

Hasan, Syed Akif, Muhammad Imtiaz Subhani i Ana Mateen. "Effects of Deceptive Advertising on Consumer Loyalty in Telecommunication Industry of Pakistan". Information Management and Business Review 3, nr 5 (15.11.2011): 261–64. http://dx.doi.org/10.22610/imbr.v3i5.942.

Pełny tekst źródła
Streszczenie:
This study is an attempt to interrogate the effects of deceptive advertising on consumer loyalty in telecommunication industry of Pakistan. Four variables, Call Charges (CC), Network Coverage (NC), Network Quality (NQ) and Customer Service (CS) were used to measure deception in Telecom Ads and then its effect on consumer loyalty while the consumer preference is used as the proxy of consumer loyalty. 10,000 random individuals from telecom industry were selected to conclude the results. Testing specification confirmed that the deception overwhelmingly exists in telecom ads and none of the telecom companies were providing exactly the same quality of service in terms of Call Charges, Network Coverage, Network Quality and Customer Service, as they promise in their advertisements, while, the consumers are inclined towards the services where the deceptions are seemingly meager.
Style APA, Harvard, Vancouver, ISO itp.
5

McKay, Ryan, Danica Mijović-Prelec i Dražen Prelec. "Protesting too much: Self-deception and self-signaling". Behavioral and Brain Sciences 34, nr 1 (luty 2011): 34–35. http://dx.doi.org/10.1017/s0140525x10002608.

Pełny tekst źródła
Streszczenie:
AbstractVon Hippel & Trivers (VH&T) propose that self-deception has evolved to facilitate the deception of others. However, they ignore the subjective moral costs of deception and the crucial issue of credibility in self-deceptive speech. A self-signaling interpretation can account for the ritualistic quality of some self-deceptive affirmations and for the often-noted gap between what self-deceivers say and what they truly believe.
Style APA, Harvard, Vancouver, ISO itp.
6

Donato, Shane B. "Expectation vs. Reality: Food Service, Price, and Promotion of a Fast-Food Restaurant". International Journal of Research and Innovation in Social Science VIII, nr IV (2024): 1498–516. http://dx.doi.org/10.47772/ijriss.2024.804110.

Pełny tekst źródła
Streszczenie:
In the Philippines, deceptive advertising has been present in the market. The presence of ads from fast-food restaurants has also made consumers wonder if it is accurate in what they offer. With this evident deception in the market, consumers of a certain fast-food chain may face a similar problem in buying their food, whether they are getting what they are paying for. This study used a quantitative descriptive method that includes administering survey questionnaires in Likert form to diners of the fast-food chain who are aged 18-59 years old, excluding those who buy through the drive-thru and take-out. In the conducted study on February 2023, the findings reveal that among the 103 respondents, female emerging adults and young adults are mostly consumers of a fast-food chain in Bambang and dine occasionally. In terms of service, it shows that crew members who are not friendly have the highest frequency in the items. In price, the item that got the highest agreement was the additional fees when upgrading drinks, which the cashier did not disclose, and respondents consider it a deception. Regarding promotion, not receiving the same item as advertised got the highest agreement. Also, respondents did not experience other deceptions, resulting in them not doing any actions to address identified deception. The results have shown that there is no evident deception in terms of service, price, and promotions other than those identified as it receives a high frequency; nonetheless, it still falls under no perceived deception. It demonstrates that the mentioned fast-food restaurant fulfills its promised advertisements and continues improving its service and avoiding deception for customer retention.
Style APA, Harvard, Vancouver, ISO itp.
7

Bagnall, Ralph, Ailsa Russell, Mark Brosnan i Katie Maras. "Deceptive behaviour in autism: A scoping review". Autism 26, nr 2 (26.11.2021): 293–307. http://dx.doi.org/10.1177/13623613211057974.

Pełny tekst źródła
Streszczenie:
The ability to deceive is a key milestone in social cognitive development for typically developing individuals. In this scoping review, we systematically searched the literature to summarise research on deceptive behaviour in autism and identify gaps in knowledge. Across the 28 studies identified, three main themes were synthesised, with seven subthemes: (1) Deception ability and prevalence (1a) gameplay deception; (1b) naturalistic deception; (2) Psychological correlates of deception (2a) verbal, intellectual and social ability; (2b) theory of mind (ToM) behaviours; (2c) executive function; and (3) Social learning (3a) training; (3b) social contexts. The findings challenge common stereotypes, showing that autistic individuals can and do engage in deception. However, many do so less frequently and less adeptly than typically developing individuals. Emerging evidence also suggests that autistic individuals (without co-occurring intellectual disability) may use compensatory strategies when engaging in deception, and that more skilled deceptive behaviour may arise later in life. Implications and directions for future research are discussed. Lay abstract The ability to deceive others is an important skill that usually develops in early childhood. In this review, we give an overview of studies that have examined deceptive behaviour in autistic children, adolescents and adults. We separated the study findings into three main categories and seven sub-categories: (1) Deception ability and prevalence (1a) gameplay deception; (1b) naturalistic deception; (2) Psychological processes in deception (2a) verbal, intellectual and social ability; (2b) ability to understand others’ thoughts and beliefs; (2c) cognitive ability; and (3) Social learning (3a) training; (3b) social contexts. Contrary to some stereotypes, we found that autistic people can and do deceive but often find this more difficult than non-autistic people. We also found that autistic people may use different psychological processes than non-autistic people when deceiving and may get better at deception in adulthood.
Style APA, Harvard, Vancouver, ISO itp.
8

Khoiroh, Miftakhul. "Deceptive Utterances Captured in Rian Johnson's Knives Out". JoLLA: Journal of Language, Literature, and Arts 1, nr 9 (27.09.2021): 1232–44. http://dx.doi.org/10.17977/um064v1i92021p1232-1244.

Pełny tekst źródła
Streszczenie:
Abstract: This research aims to analyze the deceptive utterances in a movie entitled Knives Out (2019). Different from previous research, this research does not only focus on one character, but also the other characters who are potentially being deceptive. By doing analysis based on theory of types of deception, this qualitative research analyzed the video of the movie along with the script to solve the research problems regarding how the utterances in the movie can be categorized as deceptive utterances. Moreover, this research also used the theory of deception motive to investigate the relationship between motive and the type of deception employed by the characters. The results show that the movie contains 23 deceptive utterances, and the motive influences the characters in determining what type of deception strategy they should use. This research contributes to the existing knowledge of deception by pointing out that each character uses deception in two different kinds of purposes: deception to achieve their goal, and deception to save them in unfavorable circumstances. Keywords: deceptive utterances, motives, types of deception strategy, Knives Out Abstrak: Penelitian ini bertujuan untuk menganalisis ujaran-ujaran menipu dalam film berjudul “Knives Out” (2019). Berbeda dengan penelitian sebelumnya, penelitian ini tidak hanya fokus pada satu karakter saja, tetapi juga pada karakter lain yang juga berpotensi menipu. Dengan melakukan analisis berdasarkan teori jenis-jenis penipuan, penelitian kualitatif ini menganalisis video film beserta naskahnya untuk memecahkan masalah penelitian tentang bagaimana ujaran-ujaran dalam film dapat dikategorikan sebagai ujaran-ujaran menipu. Selain itu, penelitian ini juga menggunakan teori motif penipuan untuk menyelidiki hubungan antara motif dan jenis penipuan yang digunakan oleh karakter. Hasil penelitian menunjukkan bahwa film tersebut mengandung 23 ujaran penipuan dan motif mempengaruhi karakter dalam menentukan jenis penipuan apa yang harus mereka terapkan. Secara umum, motif dibagi menjadi dua: penipuan untuk mencapai tujuan mereka, dan penipuan untuk menyelamatkan mereka dalam keadaan yang tidak menguntungkan. Kata kunci: ujaran menipu; motif; jenis strategi penipuan; “Knives Out”
Style APA, Harvard, Vancouver, ISO itp.
9

Chappell, Sophie Grace. "POLITICAL DELIBERATION UNDER CONDITIONS OF DECEPTION: THE CASE OF BREXIT". Think 15, nr 44 (2016): 7–13. http://dx.doi.org/10.1017/s147717561600021x.

Pełny tekst źródła
Streszczenie:
Individual deliberations under conditions of serious deception are generally agreed to be invalidated by that deception. So political deliberations under conditions of serious deception should also be agreed to be invalidated. The UK’s referendum on membership of the EU was a flawed process of public deliberation precisely for this reason – that the public debate about the referendum involved serious deception. I raise the question what should be done about such public deceptions, and suggest a restrained form of legal remedy.
Style APA, Harvard, Vancouver, ISO itp.
10

Fridland, Ellen. "Reviewing the logic of self-deception". Behavioral and Brain Sciences 34, nr 1 (luty 2011): 22–23. http://dx.doi.org/10.1017/s0140525x10002566.

Pełny tekst źródła
Streszczenie:
AbstractI argue that framing the issue of motivated belief formation and its subsequent social gains in the language of self-deception raises logical difficulties. Two such difficulties are that (1) in trying to provide an evolutionary motive for viewing self-deception as a mechanism to facilitate other-deception, the ease and ubiquity of self-deception are undermined, and (2) because after one has successfully deceived oneself, what one communicates to others, though untrue, is not deceptive, we cannot say that self-deception evolved in order to facilitate the deception of others.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Deception"

1

Enblad, Lina, i Evelina Öhlander. "Deception and Self Deception : An investigation of Multi-level marketing distributors and their deceptive practices on social media". Thesis, Linköpings universitet, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158218.

Pełny tekst źródła
Streszczenie:
Background: Multi-level marketing (MLM) is a specific type of direct selling where distribution and sales are facilitated through various levels of independent distributors. The MLM industry has changed through social media and it has become a channel for the distributors to communicate with customers and potential distributors. The downside to this development is that Internet and social media has made lies and exaggerations, digital deception, more common. Purpose and research questions: The purpose of this research is to investigate deceptive social media practices done by distributors of MLM firms operating in Sweden and discuss them from an ethical perspective. 1. What characteristics drive distributors in MLM firms to participate in practices that can be perceived as deceptive? 2. What deceptive practices on social media by distributors can be identified? 3. How do former distributors view the ethics of their own practices versus the practices of other distributors? Is self deception an aspect to consider? Method: The study applies a qualitative method to an explorative, cross-sectional research design. The collection of empirical data was done by conducting 9 semi-structured interviews with former MLM distributors. Result: Characteristics that drive deceptive practices are training, authority, transferal of norms and validating behaviour. Six deceptive practices were identified: pretending to be consumers on other distributors’ posts, manipulating before and after pictures, lying and exaggerating about the benefits of the products, pretending to be potential recruits, falsely describing the benefits of the business opportunity and charging extra for shipping. Former distributors were more willing to blame other distributors for unethical behaviour than themselves, which may be due to self deception. Contribution of the study: This study contributes with a modern perspective of MLM distributors. It extends existing research of ethical issues within MLM and contributes with the addition of self deception to provide deeper understanding.
Style APA, Harvard, Vancouver, ISO itp.
2

McBain, Candice. "Deception and Deception Detection of Feigned Trauma Symptoms". Thesis, Griffith University, 2019. http://hdl.handle.net/10072/390064.

Pełny tekst źródła
Streszczenie:
Through this research project we assessed the ability of psychology students to enact and detect deception enacted through feigning symptoms of Post Traumatic Stress Disorder (PTSD). Psychometric and psychophysiological testing are often used to assess the feigning or malingering of mental health disorders in forensic settings. However, clinicians do not always have these tools readily available to them. Therefore, we have focused our investigation on verbal and nonverbal behaviours that may be indicators of deception used to identify cases of feigning or malingering. Despite the large body of existing research on cues to deception, we currently have no reliable cues that proceed or accompany deception related to feigning or malingering a psychological disorder. Through a series of four studies we aimed to identify cues to deception that are exhibited when feigning symptoms of PTSD. The aim of Study 1 was to examine: personality traits (i.e., Introversion / Extroversion and Psychoticism) that may moderate the ability to deceive; emotional and physiological arousal (i.e., heart rate variability [HRV]) associated with deception; and the influence of these variables on peoples’ confidence in their own ability to deceive. Our findings indicated that emotional and physiological arousal related to the thought of enacting deception correlated with emotional and physiological arousal related to stress. However, emotional arousal associated with stress or deception was not correlated with physiological arousal associated with stress or deception. Therefore, we were unable to identify a consistent pattern of emotional and physiological responding associated with the thought of being deceitful. In addition: deception confidence was not correlated to the physiological arousal (i.e., HRV) associated with deceit; Psychoticism had no impact on emotional or physiological arousal associated with deception or deception confidence; and Introversion / Extroversion was not correlated to physiological arousal associated with deception. However, people higher on Extraversion reported more subjective distress after thinking about enacting deception than people higher on Introversion. During this study we identified the trait of Psychoticism as needing further investigation. Subsequently, in Study 2 we further examined deceivers who were low and higher in Psychoticism. We examined: verbal and nonverbal behaviours displayed when telling the truth and deceiving; verbal and nonverbal behaviours of deceivers who were low and higher in Psychoticism; and verbal and nonverbal behaviours of more and less credible deceivers. Deception confidence and perceived credibility (as judged by raters) were also considered. Most notably, we found that people smile less when deceiving. This is different to evidential deception research. Findings indicated that deceivers higher in Psychoticism displayed unique behavioural cues. However, Psychoticism did not moderate deception confidence or perceived credibility (as judged by raters). In Study 3, we again examined verbal and nonverbal behaviours displayed when telling the truth and enacting deceit. We also assessed the verbal and nonverbal behaviors of differentially motivated deceivers, and people who were more and less prepared to deceive. Deception confidence and perceived credibility were again considered. Findings indicated that participants in this sample displayed less eye movements, raised their eyebrows less, were less facially expressive, smiled less, and pursed their lips more when deceiving. More motivated deceivers and more prepared deceivers displayed unique behaviours and motivated deceivers spent more time preparing to deceive. However, deception preparation did not impact deception confidence or perceived credibility. The main aim of Study 4 was to examine the deception detection ability of psychology students, and the difference in deception detection ability between undergraduate and postgraduate psychology students. We also investigated the impact of law enforcement experience, legal experience, and psychology work experience on the ability to detect deception. Findings indicated: students were not better than chance (if we assume chance is 50%) at making lie / truth judgments; postgraduates were better deception detectors than undergraduates; experience with law enforcement and psychology work experience were positively correlated to deception detection ability; deception detectors were better able to identify deceivers who were less motivated to feign PTSD; confidence in people’s own ability to detect deception was not related to their actual ability to detect deception; and deception detectors did not rate truthtellers as more credible than deceivers. Overall, we find that deception of mental health symptoms leads to different cues than those found in evidential research. We also conclude that Psychoticism may lead to differential behavioural cues when deceiving, as do motivation and preparation time. People are not good at detecting deceit, but experience with psychology and life experience seems to be predictors in the case of detecting feigned trauma symptoms. Methodological limitations of the current studies include: the failure of the deception task to evoke strong physiological arousal in Study 1; the lack of high psychoticism deceivers in Study 2; the disparity in the duration of the two videos used in experiments 2 and 3; the disparity in credibility scores of the more credible deceivers group between Studies 2 and 3; and the inclusion of only one independent rater in Studies 2 and 3. Additionally, in comparison to the financial remuneration often gained through successful feigning or malingering of PTSD, the financial incentive offered in Studies 2 and 3 is nominal. These limitations are addressed in the general discussion of this thesis.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Applied Psychology
Griffith Health
Full Text
Style APA, Harvard, Vancouver, ISO itp.
3

Boddington, P. R. "Self-deception". Thesis, University of Oxford, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.381766.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Clarke, Bernard. "Self-deception". Thesis, University of Warwick, 1992. http://wrap.warwick.ac.uk/110590/.

Pełny tekst źródła
Streszczenie:
There is a reflexive paradox (or set of paradoxes) associated with self-deception, and a variety of theories have been proposed in response, to explain self-deception. The study of reflexive paradoxes has been fruitful in the history of philosophy. Such a paradox may appear to be no more than a minor puzzle, which we will easily be able to mop up after having formulated solutions to more major problems. Sometimes the minor puzzle turns out to be surprisingly resistant to our "mopping up" operations; it may force us to re-think our major theories. For example the "truth-teller" paradox and other paradoxes of self-reference have been viewed initially as minor puzzles, while later on they have provoked major theories, e.g. theories of truth; in mathematics, Godel's theorem.
Style APA, Harvard, Vancouver, ISO itp.
5

Li, Li. "Sex Differences in Deception Detection". Scholarly Repository, 2011. http://scholarlyrepository.miami.edu/oa_theses/261.

Pełny tekst źródła
Streszczenie:
While deception is a common strategy in interpersonal communication, most research on interpersonal deception treats the sex as irrelevant in the ability to detect deceptive messages. This study examines the truth and deception detection ability of both male and female receivers when responding to both true and deceptive messages from both male and female speakers. Results suggest that sex may be an important variable in understanding the interpersonal detection probabilities of truth and of lies. An interaction of variables including speakers’ sex, receivers’ sex, and whether the message is truthful or deceptive is found to relate to detection ability. Both women and men were found to be significantly less accurate than chance in judging the veracity of statements made by men, especially when those statements are lies. On the other hand, both women and men were significantly more accurate than chance in judging the veracity of statements made by women, especially when those statements are truthful. This may suggest that men are better deceivers than women, while women seem more transparent in exhibiting feelings about their messages whether being truthful or deceptive. In recalling real life deceptions discovered previously, women reported that they discovered significantly more lies from female sources than from men they knew. This finding may reflect the previous finding that discovering lies told by women is more likely than is discovering lies told by men.
Style APA, Harvard, Vancouver, ISO itp.
6

Near, Christopher R. "Deception in Super Bowl Advertisements: An Analysis of Deceptive Story Lines". Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2388.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Henson, Jayne R. "Texas hold'em : deception and deception detection in a poker game". Virtual Press, 2004. http://liblink.bsu.edu/uhtbin/catkey/1292993.

Pełny tekst źródła
Streszczenie:
This study introduces Texas Hold'em Poker as a research interest and discusses the use of poker in studying interpersonal deception. The first section reviews relevant literature in the study of deception and detection in order to answer: 1) What is the base rate of deceptive attempts for poker players? 2A) What types of tells are exhibited? 2B) What inconsistent nonverbal behavior does each player exhibit? This research also hypothesizes that bluffers will engage in consistent nonverbal behavior in bluffing and non bluffing sets. The second section describes the methods used. A videotaped poker game was recorded and analyzed. Twenty nonverbal behaviors were coded and frequency of behavior was calculated. The third section describes the results of the analysis: base rate, tells, and inconsistencies. Finally, the last section discusses the results, conclusions, limitations, and further avenues of study.
Department of Communication Studies
Style APA, Harvard, Vancouver, ISO itp.
8

Martin, Charmine L. "Military deception reconsidered". Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Jun%5FMartin.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Operations)--Naval Postgraduate School, June 2008.
Thesis Advisor(s): Arquilla, John. "June 2008." Description based on title screen as viewed on August 21, 2008. Includes bibliographical references (p. 43-45). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
9

White, David C. J. "Maintaining deception in a rewarding landscape; the pollination biology of deceptive orchids". Thesis, University of East Anglia, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527630.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Starke, Mary Lynn. "Self-deception and other-deception in personality assessment detection and implications /". Diss., St. Louis, Mo. : University of Missouri--St. Louis, 2006. http://etd.umsl.edu/r1121.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Deception"

1

Caddell, Joseph William. Deception 101: Primer on deception. [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wiseman, Richard. Deception & self-deception: Investigating psychics. Amherst, N.Y: Prometheus Books, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Quick, Amanda. Deception. New York: Bantam Books, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Meehan, Michael. Deception. Crows Nest, N.S.W: Allen & Unwin, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

LANGAN, RUTH. Deception. Richmond, Surrey: Mills &Boon, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chase, Naomi. Deception. New York, NY: Kensington Pub. Corp., 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Cavendish, Grace. Deception. New York: Random House Children's Books, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Deception. New York: Jove Books, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mina, Denise. Deception. Waterville, Me: Wheeler Pub., 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

John, Altman. Deception. Waterville, Me: Thorndike Press, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Deception"

1

Pettit, Michael. "Deception". W Encyclopedia of Critical Psychology, 370–73. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5583-7_69.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Levesque, Roger J. R. "Deception". W Encyclopedia of Adolescence, 626–28. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-1695-2_473.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Calvey, David. "Deception". W Handbook of Research Ethics and Scientific Integrity, 1–23. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-76040-7_15-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Calvey, David. "Deception". W Handbook of Research Ethics and Scientific Integrity, 345–67. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-16759-2_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Levine, David P. "Deception". W Politics without Reason, 97–111. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230615519_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Fisher, Thomas. "Deception". W The Architecture of Ethics, 48–51. New York : Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9781351065740-12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Gass, Robert H., i John S. Seiter. "Deception". W Persuasion, 283–308. Sixth edition. | New York, NY : Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781315209302-12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Weik, Martin H. "deception". W Computer Science and Communications Dictionary, 368. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4482.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Pozzulo, Joanna, Craig Bennell i Adelle Forth. "Deception". W Forensic Psychology, 80–108. New York: Psychology Press, 2021. http://dx.doi.org/10.4324/9781315665153-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Gass, Robert H., i John S. Seiter. "Deception". W Persuasion, 301–26. Wyd. 7. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003081388-12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Deception"

1

Sarkadi, Stefan. "Deception". W Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/834.

Pełny tekst źródła
Streszczenie:
Recent events that revolve around fake news indicate that humans are more susceptible than ever to mental manipulation by powerful technological tools. In the future these tools may become autonomous. One crucial property of autonomous agents is their potential ability to deceive. From this research we hope to understand the potential risks and benefits of deceptive artificial agents. The method we propose to study deceptive agents is by making them interact with agents that detect deception and analyse what emerges from these interactions given multiple setups such as formalisations of scenarios inspired from historical cases of deception.
Style APA, Harvard, Vancouver, ISO itp.
2

Nguyen, Thanh H., Arunesh Sinha i He He. "Partial Adversarial Behavior Deception in Security Games". W Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/40.

Pełny tekst źródła
Streszczenie:
Learning attacker behavior is an important research topic in security games as security agencies are often uncertain about attackers' decision making. Previous work has focused on developing various behavioral models of attackers based on historical attack data. However, a clever attacker can manipulate its attacks to fail such attack-driven learning, leading to ineffective defense strategies. We study attacker behavior deception with three main contributions. First, we propose a new model, named partial behavior deception model, in which there is a deceptive attacker (among multiple attackers) who controls a portion of attacks. Our model captures real-world security scenarios such as wildlife protection in which multiple poachers are present. Second, we introduce a new scalable algorithm, GAMBO, to compute an optimal deception strategy of the deceptive attacker. Our algorithm employs the projected gradient descent and uses the implicit function theorem for the computation of gradient. Third, we conduct a comprehensive set of experiments, showing a significant benefit for the attacker and loss for the defender due to attacker deception.
Style APA, Harvard, Vancouver, ISO itp.
3

Rowe, Neil C. "Detecting Suspicious Behavior From Only Positional Data With Distributed Sensor Networks". W ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84420.

Pełny tekst źródła
Streszczenie:
Wireless sensor networks are increasingly popular, and are being used to measure simple properties of their environment. In many applications such as surveillance, we would like them to distinguish “suspicious” behavior automatically. We distinguish here between suspicious and anomalous behavior, and develop a mathematical model which we illustrate on some sample data. We show the model predicts six classic deception strategies. We conclude with analysis of more sophisticated deceptions that exploit system responses to simpler deceptions.
Style APA, Harvard, Vancouver, ISO itp.
4

Masters, Peta, i Sebastian Sardina. "Deceptive Path-Planning". W Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/610.

Pełny tekst źródła
Streszczenie:
Deceptive path-planning involves finding a path such that the probability of an observer identifying the path's final destination - before it has been reached - is minimised. This paper formalises deception as it applies to path-planning and introduces the notion of a last deceptive point (LDP) which, when measured in terms of 'path completion', can be used to rank paths by their potential to deceive. Building on recent developments in probabilistic goal-recognition, we propose a formula to calculate an optimal LDP and present strategies for the generation of deceptive paths by both simulation ('showing the false') and dissimulation ('hiding the real').
Style APA, Harvard, Vancouver, ISO itp.
5

Mihalcea, Rada. "Deception Detection". W CIKM '17: ACM Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3132847.3137174.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Eppstein, Margaret J., i C. Brandon Ogbunugafor. "Quantifying Deception". W GECCO '16: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2908812.2908821.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Achleitner, Stefan, Thomas La Porta, Patrick McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy i Ritu Chadha. "Cyber Deception". W CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2995959.2995962.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Farley, David, Zoe Gastelum i Timothy Shead. "Deep deception." W Proposed for presentation at the Artificial intelligence and machine learning for IAEA safeguards. US DOE, 2022. http://dx.doi.org/10.2172/2002007.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Fan, Cheng, Heming Zhao, Xueqin Chen, Xiaohe Fan i Shuxi Chen. "Distinguishing deception from non-deception in Chinese speech". W 2015 Sixth International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2015. http://dx.doi.org/10.1109/icicip.2015.7388181.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Diana, Barbara, Massimiliano Elia, Valentino Zurloni, Annibale Elia, Alessandro Maisto i Serena Pelosi. "Multimodal Deception Detection". W ICMI '15: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2823465.2823466.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Deception"

1

Caddell, Joseph W. Deception 101 - Primer on Deception. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2004. http://dx.doi.org/10.21236/ada429106.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Heuser, Stephen J. Operational Deception and Counter Deception. Fort Belvoir, VA: Defense Technical Information Center, luty 1996. http://dx.doi.org/10.21236/ada307594.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

JOINT CHIEFS OF STAFF WASHINGTON DC. Military Deception. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2006. http://dx.doi.org/10.21236/ada498865.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bjorge, Gary J. Deception Operations. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1986. http://dx.doi.org/10.21236/ada445768.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Courand, Gregory J. Counter Deception. Fort Belvoir, VA: Defense Technical Information Center, grudzień 1989. http://dx.doi.org/10.21236/ada215931.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Breitenbach, Daniel L. Operation Desert Deception: Operational Deception in the Ground Campaign. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 1991. http://dx.doi.org/10.21236/ada253245.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Buller, David B., Judee K. Burgoon, Aileen Buslig i James Roiger. Interpersonal Deception Theory: Examining Deception From a Communication Perspective. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 1998. http://dx.doi.org/10.21236/ada354018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Grefenstette, John J. Deception Considered Harmful. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1993. http://dx.doi.org/10.21236/ada294072.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Terrell, Richard L. Deception Plan Bodyguard: Deception Modeling as a Means to Benchmark Risk. Fort Belvoir, VA: Defense Technical Information Center, maj 2002. http://dx.doi.org/10.21236/ada409153.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Smith, Jerald L. Digital Deception: Implications of Pursuing Decision Superiority Using Deception in Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, maj 2001. http://dx.doi.org/10.21236/ada390378.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii