87 resultados para Cheating


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We quickly form first impressions about newly encountered people guiding our subsequent behaviour (approach, avoidance). Such instant judgments might be innate and automatic, being performed unconsciously and independently to other cognitive processes. Lying detection might be subject to such a modular process. Unfortunately, numerous studies highlighted problems with lying detection paradigms such as high error rates and learning effects. Additionally, humans should be motivated doing both detecting others' lies and dis- guising own lies. Disguising own lies might even be more challenging than detecting other people's lies. Thus, when trying to disguise cheating behaviour, liars might display a mixture of disguising (fake) trust cues and uncontrolled lying cues making the interpretation of the expression difficult (perceivers are guessing). In two consecutive online studies, we tested whether seeing an increasing amount (range 0-4) of lying cues (LC) and non-lying cues (NLC) on a standard face results in enhanced guessing behaviour (studies 1 and 2) and that enhanced guessing is accompanied by slower responding (study 2). Results showed that pronounced guessing and slowest responding occurred for faces with an intermediate number and not with the highest number of LC and NLC. In particular, LC were more impor- tant than NLC to uncertain lying decisions. Thus, only a few LC may interfere with automatic processing of lying detection (irrespective of NLC), probably because too little lying cue information is yet available.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The production of beneficial public goods is common in the microbial world, and so is cheating - the exploitation of public goods by nonproducing mutants. Here, we examine co-evolutionary dynamics between cooperators and cheats and ask whether cooperators can evolve strategies to reduce the burden of exploitation, and whether cheats in turn can improve their exploitation abilities. We evolved cooperators of the bacterium Pseudomonas aeruginosa, producing the shareable iron-scavenging siderophore pyoverdine, together with cheats, defective in pyoverdine production but proficient in uptake. We found that cooperators managed to co-exist with cheats in 56% of all replicates over approximately 150 generations of experimental evolution. Growth and competition assays revealed that co-existence was fostered by a combination of general adaptions to the media and specific adaptions to the co-evolving opponent. Phenotypic screening and whole-genome resequencing of evolved clones confirmed this pattern, and suggest that cooperators became less exploitable by cheats because they significantly reduced their pyoverdine investment. Cheats, meanwhile, improved exploitation efficiency through mutations blocking the costly pyoverdine-signalling pathway. Moreover, cooperators and cheats evolved reduced motility, a pattern that likely represents adaptation to laboratory conditions, but at the same time also affects social interactions by reducing strain mixing and pyoverdine sharing. Overall, we observed parallel evolution, where co-existence of cooperators and cheats was enabled by a combination of adaptations to the abiotic and social environment and their interactions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bandura (1986) developed the concept of moral disengagement to explain how individuals can engage in detrimental behavior while experiencing low levels of negative feelings such as guilt-feelings. Most of the research conducted on moral disengagement investigated this concept as a global concept (e.g., Bandura, Barbaranelli, Caprara, & Pastorelli, 1996; Moore, Detert, Klebe Treviño, Baker, & Mayer, 2012) while Bandura (1986, 1990) initially developed eight distinct mechanisms of moral disengagement grouped into four categories representing the various means through which moral disengagement can operate. In our work, we propose to develop measures of this concept based on its categories, namely rightness of actions, rejection of personal responsibility, distortion of negative consequences, and negative perception of the victims, and which is not specific a particular area of research. Through our measures, we aim at better understanding the cognitive process leading individuals to behave unethically by investigating which category plays a role in explaining unethical behavior depending on the situations in which individuals are. To this purpose, we conducted five studies to develop the measures and to test its predictive validity. Particularly, we assessed the ability of the newly developed measures to predict two types of unethical behaviors, i.e. discriminatory behavior and cheating behavior. Confirmatory Factor analyses demonstrated a good fit of the model and findings generally supported our predictions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1859, Charles Darwin published his theory of evolution by natural selection, the process occurring based on fitness benefits and fitness costs at the individual level. Traditionally, evolution has been investigated by biologists, but it has induced mathematical approaches, too. For example, adaptive dynamics has proven to be a very applicable framework to the purpose. Its core concept is the invasion fitness, the sign of which tells whether a mutant phenotype can invade the prevalent phenotype. In this thesis, four real-world applications on evolutionary questions are provided. Inspiration for the first two studies arose from a cold-adapted species, American pika. First, it is studied how the global climate change may affect the evolution of dispersal and viability of pika metapopulations. Based on the results gained here, it is shown that the evolution of dispersal can result in extinction and indeed, evolution of dispersalshould be incorporated into the viability analysis of species living in fragmented habitats. The second study is focused on the evolution of densitydependent dispersal in metapopulations with small habitat patches. It resulted a very surprising unintuitive evolutionary phenomenon, how a non-monotone density-dependent dispersal may evolve. Cooperation is surprisingly common in many levels of life, despite of its obvious vulnerability to selfish cheating. This motivated two applications. First, it is shown that density-dependent cooperative investment can evolve to have a qualitatively different, monotone or non-monotone, form depending on modelling details. The last study investigates the evolution of investing into two public-goods resources. The results suggest one general path by which labour division can arise via evolutionary branching. In addition to applications, two novel methodological derivations of fitness measures in structured metapopulations are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays the Western companies are considered responsible for the social and environmental issues in their whole supply chains. To influence the practices of their suppliers the Western companies have created suppliers codes of conduct (SCCs) which express their requirements. Suppliers’ compliance with the SCCs is checked through audits. The purpose of this thesis is to analyze SCCs as a means for Western companies to ensure socially and environmentally responsible actions in their global supply chains, and the sub-objectives are to find out 1) how well do the SCCs and their auditing work at suppliers’ production sites and 2) how can possible problems related to SCCs and their auditing be solved. This is a qualitative research carried out in the form of a case study with two case companies. In this study both primary and secondary data is used. The primary data is collected in the form of interviews of the case company representatives and three external experts. Based on a theoretical framework of previous research in the fields of corporate social responsibility and supply chain management, a model with eleven factors, which influence the success of SCC implementation and the auditing of SCC –implementation, is drafted. Also several different best-practices to help to solve and avoid possible problems related to SCC -implementation and auditing have been identified from previous research. Based on the findings of this study the theoretical model has been updated adding two new influential factors. It seems that how well the SCC and its auditing work at suppliers’ production sites depends on the joint effect of thirteen influential factors: buyer’s purchasing policy, supplier’s motivation, buyer’s commitment, the solving of agency problems, the contents of the SCC, supplier’s role and the buyer-supplier –relationship, complexity of supply chain, the limitations of the smaller buyers, cooperation through a business association or multi-stakeholder system, the role of supplier’s employees, SCC –related communication and supplier’s understanding, cheating in audits and the auditors. The possible problems related to SCCs and their auditing can be solved by adopting best-practices. Nine of the theoretical best-practices stand out from the findings of this study: 1) two-way communication and collecting feedback from suppliers, 2) the philosophy of continuous improvement, 3) long-term business relationships with the supplier, 4) informing the supplier about the advantages of SCC –compliance, 5) rewarding code-compliant suppliers, 6) building collaborative, good buyer-supplier relationships, 7) supporting and advising the supplier, 8) joining a business association or multi-stakeholder system and 9) interviewing supplier’s employees as a part of the audits.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to explore the experiences of 5 stakeholder groups—students, parents, community organization representatives, guidance counsellors, and secondary school principals—in dealing with a mandatory secondary school graduation requirement in Ontario. The requirement is that students must complete 40 hours of eligible community involvement activities during their high school years in order to graduate. Ten stakeholders were interviewed regarding the nature of the community involvement program, what makes it work, and suggestions for improvement. The study found that although this program has the potential to provide a meaningful experience for students, and students are seen to gain from their experience in multiple ways, it depends substantially on the commitment of students, educators, and community organizations to make it worthwhile. Stakeholders recommended changes to the current program, which included making it a more structured process that would increase the consistency ofhow this program is implemented, finding ways to curb cheating and to reduce the administrative burden on schools, having more support from the Ontario provincial government and Ontario Ministry of Education and Training in the promotion and communication of this program, and developing partnerships between community organizations and schools to enrich the application of this program. This study concludes with a recommendation that the Ontario Ministry of Education and Training consider introducing Service-Learning, a curriculum-based experiential service and learning process, as an enhancement to the current community involvement program.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research examined psychopathy as an evolutionary adaptation that involves cheating and deception. I theorized that this strategy should be associated with certain abilities. This research examined the association between psychopathic traits and the ability to detect cheaters, altruism, deception, and psychopathic traits. Results indicated that psychopathic traits were not significantly associated with the ability to detect cheaters or altruism. Results indicated that high Factor 1 psychopathy scores, and low Factor 2 psychopathy scores, were indicative of higher ratings of deception when viewing deceptive videos. Conversely, when viewing truthful videos, Factor 1 was a significant predictor of higher ratings of deception. Finally, our results indicated that total psychopathy scores were associated the ability to identify psychopathic traits in others. Taken together the results provide mixed support for the evolutionary perspective of psychopathy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Le mémoire original s'accompagnait en annexe du livre-objet Le poids de l'oiseau sur la vitre.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Il y a des problemes qui semblent impossible a resoudre sans l'utilisation d'un tiers parti honnete. Comment est-ce que deux millionnaires peuvent savoir qui est le plus riche sans dire a l'autre la valeur de ses biens ? Que peut-on faire pour prevenir les collisions de satellites quand les trajectoires sont secretes ? Comment est-ce que les chercheurs peuvent apprendre les liens entre des medicaments et des maladies sans compromettre les droits prives du patient ? Comment est-ce qu'une organisation peut ecmpecher le gouvernement d'abuser de l'information dont il dispose en sachant que l'organisation doit n'avoir aucun acces a cette information ? Le Calcul multiparti, une branche de la cryptographie, etudie comment creer des protocoles pour realiser de telles taches sans l'utilisation d'un tiers parti honnete. Les protocoles doivent etre prives, corrects, efficaces et robustes. Un protocole est prive si un adversaire n'apprend rien de plus que ce que lui donnerait un tiers parti honnete. Un protocole est correct si un joueur honnete recoit ce que lui donnerait un tiers parti honnete. Un protocole devrait bien sur etre efficace. Etre robuste correspond au fait qu'un protocole marche meme si un petit ensemble des joueurs triche. On demontre que sous l'hypothese d'un canal de diusion simultane on peut echanger la robustesse pour la validite et le fait d'etre prive contre certains ensembles d'adversaires. Le calcul multiparti a quatre outils de base : le transfert inconscient, la mise en gage, le partage de secret et le brouillage de circuit. Les protocoles du calcul multiparti peuvent etre construits avec uniquements ces outils. On peut aussi construire les protocoles a partir d'hypoth eses calculatoires. Les protocoles construits a partir de ces outils sont souples et peuvent resister aux changements technologiques et a des ameliorations algorithmiques. Nous nous demandons si l'efficacite necessite des hypotheses de calcul. Nous demontrons que ce n'est pas le cas en construisant des protocoles efficaces a partir de ces outils de base. Cette these est constitue de quatre articles rediges en collaboration avec d'autres chercheurs. Ceci constitue la partie mature de ma recherche et sont mes contributions principales au cours de cette periode de temps. Dans le premier ouvrage presente dans cette these, nous etudions la capacite de mise en gage des canaux bruites. Nous demontrons tout d'abord une limite inferieure stricte qui implique que contrairement au transfert inconscient, il n'existe aucun protocole de taux constant pour les mises en gage de bit. Nous demontrons ensuite que, en limitant la facon dont les engagements peuvent etre ouverts, nous pouvons faire mieux et meme un taux constant dans certains cas. Ceci est fait en exploitant la notion de cover-free families . Dans le second article, nous demontrons que pour certains problemes, il existe un echange entre robustesse, la validite et le prive. Il s'effectue en utilisant le partage de secret veriable, une preuve a divulgation nulle, le concept de fantomes et une technique que nous appelons les balles et les bacs. Dans notre troisieme contribution, nous demontrons qu'un grand nombre de protocoles dans la litterature basee sur des hypotheses de calcul peuvent etre instancies a partir d'une primitive appelee Transfert Inconscient Veriable, via le concept de Transfert Inconscient Generalise. Le protocole utilise le partage de secret comme outils de base. Dans la derniere publication, nous counstruisons un protocole efficace avec un nombre constant de rondes pour le calcul a deux parties. L'efficacite du protocole derive du fait qu'on remplace le coeur d'un protocole standard par une primitive qui fonctionne plus ou moins bien mais qui est tres peu couteux. On protege le protocole contre les defauts en utilisant le concept de privacy amplication .

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La malhonnêteté académique au cours d’épreuves présente des enjeux importants quant à l’intégrité des évaluations. La présence des TIC étant de plus en plus importante en cours de passation dans les épreuves, il est important avec ce mode de récolte de données d’assurer un niveau de sécurité égal ou même supérieur à celui présent lorsqu’un mode de récolte de données traditionnel, le papier-crayon, est utilisé. Il existe plusieurs recherches sur l’utilisation des TIC dans l’évaluation, mais peu d’entre elles traitent des modalités de sécurité lors de l’utilisation des TIC. Dans ce mémoire, treize organisations québécoises ont été rencontrées: six qui utilisaient les TIC dans la passation, cinq qui utilisaient le papier-crayon dans la passation mais qui désiraient utiliser les TIC et deux qui utilisaient le papier-crayon et qui ne désiraient pas utiliser les TIC. Les organisations sont des établissements d’enseignement (primaire, secondaire, collégial, universitaire), des entreprises privées, des organismes gouvernementaux ou municipaux et des ordres professionnels. Des entrevues semi-structurées et une analyse qualitative par présence ou absence de différentes caractéristiques ont permis de documenter les modalités de sécurité liées à la récolte de données en vue de l’évaluation en utilisant les TIC. Ces modalités ont été comparées à celles utilisées lors de l’utilisation du papier-crayon dans la récolte de données en vue de l’évaluation afin de voir comment elles varient lors de l’utilisation des TIC. Les résultats révèlent que l’utilisation des TIC dans la passation complexifie et ajoute des étapes à la préparation des épreuves pour assurer un niveau de sécurité adéquat. Cependant elle permet également de nouvelles fonctions en ce qui concerne le type de questions, l’intégration de multimédia, l’utilisation de questions adaptatives et la génération aléatoire de l’épreuve qui permettent de contrer certaines formes de malhonnêteté académiques déjà présentes avec l’utilisation du papier-crayon dans la passation et pour lesquelles il était difficile d’agir. Toutefois, l’utilisation des TIC dans la passation peut aussi amener de nouvelles possibilités de malhonnêteté académique. Mais si ces dernières sont bien prises en considération, l’utilisation des TIC permet un niveau de sécurité des épreuves supérieur à celui où les données sont récoltées au traditionnel papier-crayon en vue de l’évaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The School of Geography's policy and requirements in dealing with matters related to academic integrity and plagiarism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A multiple-choice quiz to test a student's understanding of academic integrity and plagiarism. A range of quiz formats including Blackboard, IMS-QTI, plain text and Respondus is available for users to download.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Explanatory notes on why academic integrity is important for students in their professional and personal development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding what is meant by plagiarism. How to ensure that you are not accused of plagiarism or cheating. How to properly reference material you copy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This short YouTube video was produced by the University of Bergen to help their students understand the perils of plagiarism, the benefits of academic integrity and the steps they need to take to avoid plagiarism. It's in Norwegian but has subtitles - and is really funny and well-produced. A great way to introduce your students to these ideas.