Filters








51 Hits in 9.5 sec

The Detection of Cheating on E-Exams in Higher Education—The Performance of Several Old and Some New Indicators

Jochen Ranger, Nico Schmidt, Anett Wolgast
2020 Frontiers in Psychology  
The experimental setting was a computer assisted mock exam in an introductory course on psychology conducted at a university.  ...  The indicators were evaluated with respect to their capability to separate the subgroup of the cheaters from the remaining examinees.  ...  AUTHOR CONTRIBUTIONS All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.  ... 
doi:10.3389/fpsyg.2020.568825 pmid:33123049 pmcid:PMC7573546 fatcat:6wo6ercggvh25cu2z7gozqow2a

Online crime and internet gambling

John L. McMullan, Aunshul Rege
2010 Journal of Gambling Issues  
Rather surprisingly, however, there has been little in the way of research regarding online crime and Internet gambling even though it is an urgent priority.  ...  The spread of Internet gambling has raised several issues concerning motivations to gamble, consumer behaviour online, problem gambling, security of Web sites, and fairness and integrity of the games.  ...  There were, of course, many differences in the online crimes we studied. However, they all had one thing in common.  ... 
doi:10.4309/jgi.2010.24.5 fatcat:xkzirh6uwvbtzisxtsnoxcg6mm

Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip [chapter]

Jakub Muszyński, Sébastien Varrette, Pascal Bouvry
2016 Lecture Notes in Computer Science  
Merelo, Aranzazu San-Gines, Angel Fernandez-Cabezas The procedural generation of massive subplots and backstories in secondary characters that inhabit Open World videogames usually lead to stereotyped  ...  This can be used for anomaly detection: query points are classed as anomalies if their density is below some threshold.  ... 
doi:10.1007/978-3-319-31204-0_20 fatcat:27rnwllk75cv5kncys2u7utreq

Symposium Abstracts

2017 Clinical Chemistry and Laboratory Medicine  
Moreover, CTC research opens a new avenue for understanding the biology of metastasis in cancer patients.  ...  Next Generation Flow cytometry (NGF) is an advantageous method for monitoring MRD, combining high sensitivity with applicability to all patients and incorporating internal controls for quality assessment  ...  We have seen a massive increase in web based traffic as a major education resource allowing networking between organizations and individuals on the web for the purpose of education.  ... 
doi:10.1515/cclm-2017-5001 fatcat:2x3ddzmfkbexhfjuidxab7zq6i

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  Third, there is the question of technical capacity to detect regulatory compliance cheaters.  ...  could be a means that cybercriminal traders develop further to evade detection if regulation makes proceeds generated by other methods of payment more difficult to launder and cash out.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

The hierarchically mechanistic mind: an evolutionary systems theory of the human brain, cognition, and behavior

Paul B. Badcock, Karl J. Friston, Maxwell J. D. Ramstead, Annemie Ploeger, Jakob Hohwy
2019 Cognitive, Affective, & Behavioral Neuroscience  
The purpose of this review was to integrate leading paradigms in psychology and neuroscience with a theory of the embodied, situated human brain, called the Hierarchically Mechanistic Mind (HMM).  ...  The HMM describes the brain as a complex adaptive system that functions to minimize the entropy of our sensory and physical states via action-perception cycles generated by hierarchical neural dynamics  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.3758/s13415-019-00721-3 pmid:31115833 pmcid:PMC6861365 fatcat:ejmvrf476jgsflwpdr4eowbnxy

Risk and Anxiety: A Theory of Data Breach Harms

Daniel J. Solove, Danielle Keats Citron
2016 Social Science Research Network  
A sound and principled approach to harm has yet to emerge.  ...  In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their legal claims are viable.  ...  to detect and respond to a recurrence or complications." 135 For example, in Petriello v.  ... 
doi:10.2139/ssrn.2885638 fatcat:ni3u3quzjjaf7mmj34ks2ra5fm

Why Parties Enter into Unfair Deals: The Resentment Factor

Justin E. Malbon
2012 Social Science Research Network  
A fuller context for the quote is as follows: But man has almost constant occasion for the help of his brethren, and it is in vain for him to expect it from their benevolence only.  ...  He will be more likely to prevail if he can interest their self-love in his favour, and shew them that it is for their own advantage to do for him what he requires of them … It is not from the benevolence  ...  Evolutionary psychologists hypothesise that humans have evolved 'mental algorithms for identifying and punishing defectors'. 38 Humans apparently adapted to identify cheaters and to be identified as a  ... 
doi:10.2139/ssrn.2142205 fatcat:hdlkzz35xrdbvijlruvdm77dte

III Advanced Topics [chapter]

2016 Soft Computing Applications in Sensor Networks  
Acknowledgments This work has been supported in part by AGAUR Project under Grant  ...  In other words, ANNs can identify new objects without training. • ANNs possess the capability to generalize.  ...  : the collected data are transmitted wirelessly to an external device (e.g., a smartphone or a PDA) 9.4 WBANs: Challenges and Open IssuesThe main purpose of WBANs is to efficiently manage the data communica  ... 
doi:10.1201/9781315372020-13 fatcat:ze5voikcfbfi5lubz5t5oismua

JSE 24:4 Full Version

Various Authors
2011 Journal of Scientific Exploration  
Acknowledgments The authors wish to thank T. G. for providing assistance in fi nding interested individuals to serve as sitters in the experiment, A.  ...  To reach Crete, a minimum water crossing of 64 kilometers (40 miles) of open sea would have been required, strongly suggesting use of watercraft.  ...  cheater.  ... 
doaj:52cd5afa18654845bdfa6ac56c143672 fatcat:g5ah5l5wf5hsrh7nyodd23njky

What exists in the environment that motivates the emergence, transmission, and sophistication of tool use?

Tetsushi Nonaka
2012 Behavioral and Brain Sciences  
The occurrence of a particular behavior is a result of how that behavior has evolved in a complex and changing environment selected by a unique population.  ...  AbstractIn his attempt to find cognitive traits that set humans apart from nonhuman primates with respect to tool use, Vaesen overlooks the primacy of the environment toward the use of which behavior evolves  ...  ., cheater detection, punishment, and reputation recognition), there is little to no evidence in nonhuman primates. The last two are borderline cases: numerical discrimination and memory.  ... 
doi:10.1017/s0140525x11002056 pmid:22697316 fatcat:qz4f4smw2zc4hcmxxqmbpqvyny

Neurocognitive anthropology: What are the options?

Guy Vingerhoets
2012 Behavioral and Brain Sciences  
AbstractInvestigation of the cerebral organization of cognition in modern humans may serve as a tool for a better understanding of the evolutionary origins of our unique cognitive abilities.  ...  This commentary suggests three approaches that may serve this purpose: (1) cross-task neural overlap, referred to by Vaesen; but also (2) co-lateralization of asymmetric cognitive functions and (3) cross-functional  ...  ., cheater detection, punishment, and reputation recognition), there is little to no evidence in nonhuman primates. The last two are borderline cases: numerical discrimination and memory.  ... 
doi:10.1017/s0140525x11002111 pmid:22697608 fatcat:ybwz6ns3jfa5rkta3s5jucuw4m

What Does You Life Mean? With Clara Hill, PhD

Ashley Garcia
2017 Eye on Psi Chi Magazine  
A novel theory of experiential us to be more open-minded about finding avoidance in generalized anxiety disorder: A review and synthesis bad when  ...  Manage Your Resumé Upload or build a Public Resumé for employers to search for and view online.  ... 
doi:10.24839/1092-0803.eye21.4.14 fatcat:x6yv5rutq5ckfaxf4c3iphobuq

Beyond WEIRD: Towards a broad-based behavioral science

Joseph Henrich, Steven J. Heine, Ara Norenzayan
2010 Behavioral and Brain Sciences  
Overall, these empirical patterns suggests that we need to be less cavalier in addressing questions of human nature on the basis of data drawn from this particularly thin, and rather unusual, slice of  ...  We close by proposing ways to structurally re-organize the behavioral sciences to best tackle these challenges.  ...  A C K N O W L E D G M E N T S We thank several anonymous reviewers and the following colleagues for their very helpful comments on earlier versions of this manuscript: Nicholas Epley, Alan Fiske, Simon  ... 
doi:10.1017/s0140525x10000725 fatcat:behr3kzhdvfeveutdqx5wtvlwa

Getting beyond the "convenience sample" in research on early cognitive development

Anne Fernald
2010 Behavioral and Brain Sciences  
Overall, these empirical patterns suggests that we need to be less cavalier in addressing questions of human nature on the basis of data drawn from this particularly thin, and rather unusual, slice of  ...  We close by proposing ways to structurally re-organize the behavioral sciences to best tackle these challenges.  ...  A C K N O W L E D G M E N T S We thank several anonymous reviewers and the following colleagues for their very helpful comments on earlier versions of this manuscript: Nicholas Epley, Alan Fiske, Simon  ... 
doi:10.1017/s0140525x10000294 pmid:20546649 pmcid:PMC2905660 fatcat:5mf76qohmvbvvhlk2xz3gmrfri
« Previous Showing results 1 — 15 out of 51 results