15 resultados para cheaters


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research examined psychopathy as an evolutionary adaptation that involves cheating and deception. I theorized that this strategy should be associated with certain abilities. This research examined the association between psychopathic traits and the ability to detect cheaters, altruism, deception, and psychopathic traits. Results indicated that psychopathic traits were not significantly associated with the ability to detect cheaters or altruism. Results indicated that high Factor 1 psychopathy scores, and low Factor 2 psychopathy scores, were indicative of higher ratings of deception when viewing deceptive videos. Conversely, when viewing truthful videos, Factor 1 was a significant predictor of higher ratings of deception. Finally, our results indicated that total psychopathy scores were associated the ability to identify psychopathic traits in others. Taken together the results provide mixed support for the evolutionary perspective of psychopathy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mutualism-network studies assume that all interacting species are mutualistic partners and consider that all links are of one kind. However, the influence of different types of links, such as cheating links, on network organization remains unexplored. We studied two flower-visitation networks (Malpighiaceae and Bignoniaceae and their flower visitors), and divide the types of link into cheaters (i.e. robbers and thieves of flower rewards) and effective pollinators. We investigated if there were topological differences among networks with and without cheaters, especially with respect to nestedness and modularity. The Malpighiaceae network was nested, but not modular, and it was dominated by pollinators and had much fewer cheater species than Bignoniaceae network (28% versus 75%). The Bignoniaceae network was mainly a plant-cheater network, being modular because of the presence of pollen robbers and showing no nestedness. In the Malpighiaceae network, removal of cheaters had no major consequences for topology. In contrast, removal of cheaters broke down the modularity of the Bignoniaceae network. As cheaters are ubiquitous in all mutualisms, the results presented here show that they have a strong impact upon network topology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work addresses the problem of cheating prevention in secret sharing. Two cheating scenarios are considered. In the first one, the cheaters always submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. The paper investigates cryptographic properties of the defining function of secret sharing so the scheme is k-cheating immune. Constructions of secret sharing immune against k cheaters are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The construction is later generalised so the resulting secret sharing is resistant against the Tompa-Woll cheating.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work investigates the design of ideal threshold secret sharing in the context of cheating prevention. We showed that each orthogonal array is exactly a defining matrix of an ideal threshold scheme. To prevent cheating, defining matrices should be nonlinear so both the cheaters and honest participants have the same chance of guessing of the valid secret. The last part of the work shows how to construct nonlinear secret sharing based on orthogonal arrays.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Natural selection generally operates at the level of the individual, or more specifically at the level of the gene. As a result, individual selection does not always favour traits which benefit the population or species as a whole. The spread of an individual gene may even act to the detriment of the organism in which it finds. Thus selection at the level of the individual can affect processes at the level of the organism, group or even at the level of the species. As most behaviours ultimately affect births, deaths and the distribution of individuals, it seems inevitable that behavioural decisions will have an impact on population dynamics and population densities. Behavioural decisions can often involve costs through allocation of energy into behavioural strategies, such as the investment into armaments involved in fighting over resources or increased mortality due to injury or increased predation risk. Similarly, behaviour may act o to benefit the population, in terms of higher survival and increased fecundity. Examples include increased investment through parental care, choosing a mate based on the nuptial gifts they may supply and choosing territories in the face of competition. Investigating the impact of behaviour on population ecology may seem like a trivial task, but it is likely to have important consequences at different levels. For example, antagonistic behaviour may occasionally become so extreme that it increases the risk of extinction, and such extinction risk may have important implications for conservation. As a corollary, any such behaviour may also act as a macroevolutionary force, weeding out populations with traits which, whilst beneficial to the individuals in the short term, ultimately result in population extinction. In this thesis, I examine how behaviours, specifically conflict and competition over a resource and aspects of behaviour involved in sexual selection, can affect population densities, and what the implications are for the evolution and ecology of the populations in question. It is found that both behaviours related to individual conflict and mating strategies can have an effect at the level of the population, but that various factors, such as a feedback between selection and population densities or macroevolution caused by species extinctions, may act to limit the intensity of conflicts that we observe in nature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mutualisms are interspecific interactions in which both players benefit. Explaining their maintenance is problematic, because cheaters should outcompete cooperative conspecifics, leading to mutualism instability. Monoecious figs (Ficus) are pollinated by host-specific wasps (Agaonidae), whose larvae gall ovules in their "fruits'' (syconia). Female pollinating wasps oviposit directly into Ficus ovules from inside the receptive syconium. Across Ficus species, there is a widely documented segregation of pollinator galls in inner ovules and seeds in outer ovules. This pattern suggests that wasps avoid, or are prevented from ovipositing into, outer ovules, and this results in mutualism stability. However, the mechanisms preventing wasps from exploiting outer ovules remain unknown. We report that in Ficus rubiginosa, offspring in outer ovules are vulnerable to attack by parasitic wasps that oviposit from outside the syconium. Parasitism risk decreases towards the centre of the syconium, where inner ovules provide enemy-free space for pollinator offspring. We suggest that the resulting gradient in offspring viability is likely to contribute to selection on pollinators to avoid outer ovules, and by forcing wasps to focus on a subset of ovules, reduces their galling rates. This previously unidentified mechanism may therefore contribute to mutualism persistence independent of additional factors that invoke plant defences against pollinator oviposition, or physiological constraints on pollinators that prevent oviposition in all available ovules.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves. In this study, the decades-old computer security principle that ‘software security depends on hardware security’ is applied to a range of BYOD e-exam tools. Five potential hacks are examined, four of which are confirmed to work against at least one BYOD e-exam tool. The consequences of these hacks are significant, ranging from removal of the exam paper from the venue through to receiving live assistance from an outside expert. Potential mitigation strategies are proposed; however, these are unlikely to completely protect the integrity of BYOD e-exams. Educational institutions are urged to balance the additional affordances of BYOD e-exams for examiners against the potential affordances for cheaters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Recent work on the complexity of life highlights the roles played by evolutionary forces at different levels of individuality. One of the central puzzles in explaining transitions in individuality for entities ranging from complex cells, to multicellular organisms and societies, is how different autonomous units relinquish control over their functions to others in the group. In addition to the necessity of reducing conflict over effecting specialized tasks, differentiating groups must control the exploitation of the commons, or else be out-competed by more fit groups. Results We propose that two forms of conflict – access to resources within groups and representation in germ line – may be resolved in tandem through individual and group-level selective effects. Specifically, we employ an optimization model to show the conditions under which different within-group social behaviors (cooperators producing a public good or cheaters exploiting the public good) may be selected to disperse, thereby not affecting the commons and functioning as germ line. We find that partial or complete dispersal specialization of cheaters is a general outcome. The propensity for cheaters to disperse is highest with intermediate benefit:cost ratios of cooperative acts and with high relatedness. An examination of a range of real biological systems tends to support our theory, although additional study is required to provide robust tests. Conclusion We suggest that trait linkage between dispersal and cheating should be operative regardless of whether groups ever achieve higher levels of individuality, because individual selection will always tend to increase exploitation, and stronger group structure will tend to increase overall cooperation through kin selected benefits. Cheater specialization as dispersers offers simultaneous solutions to the evolution of cooperation in social groups and the origin of specialization of germ and soma in multicellular organisms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social desirability and the fear of sanctions can deter survey respondents from responding truthfully to sensitive questions. Self-reports on norm breaking behavior such as shoplifting, non-voting, or tax evasion may therefore be subject to considerable misreporting. To mitigate such misreporting, various indirect techniques for asking sensitive questions, such as the randomized response technique (RRT), have been proposed in the literature. In our study, we evaluate the viability of several variants of the RRT, including the recently proposed crosswise-model RRT, by comparing respondents’ self-reports on cheating in dice games to actual cheating behavior, thereby distinguishing between false negatives (underreporting) and false positives (overreporting). The study has been implemented as an online survey on Amazon Mechanical Turk (N = 6,505). Our results indicate that the forced-response RRT and the unrelated-question RRT, as implemented in our survey, fail to reduce the level of misreporting compared to conventional direct questioning. For the crosswise-model RRT, we do observe a reduction of false negatives (that is, an increase in the proportion of cheaters who admit having cheated). At the same time, however, there is an increase in false positives (that is, an increase in non-cheaters who falsely admit having cheated). Overall, our findings suggest that none of the implemented sensitive questions techniques substantially outperforms direct questioning. Furthermore, our study demonstrates the importance of distinguishing false negatives and false positives when evaluating the validity of sensitive question techniques.