首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   80篇
  免费   6篇
  2022年   1篇
  2021年   4篇
  2020年   6篇
  2019年   3篇
  2018年   5篇
  2017年   5篇
  2016年   4篇
  2015年   10篇
  2014年   6篇
  2013年   9篇
  2012年   2篇
  2011年   9篇
  2010年   3篇
  2009年   7篇
  2008年   2篇
  2007年   2篇
  2006年   4篇
  2005年   1篇
  2004年   1篇
  2002年   1篇
  2001年   1篇
排序方式: 共有86条查询结果,搜索用时 31 毫秒
51.
If food pilferage has been a reliable selection pressure on food caching animals, those animals should have evolved the ability to protect their caches from pilferers. Evidence that animals protect their caches would support the argument that pilferage has been an important adaptive challenge. We observed naturally caching Eastern grey squirrels (Sciurus carolinensis) in order to determine whether they used any evasive tactics in order to deter conspecific and heterospecific pilferage. We found that grey squirrels used evasive tactics when they had a conspecific audience, but not when they had a heterospecific (corvid) audience. When other squirrels were present, grey squirrels spaced their caches farther apart and preferentially cached when oriented with their backs to other squirrels, but no such effect was found when birds were present. Our data provide the first evidence that caching mammals are sensitive to the risk of pilferage posed by an audience of conspecifics, and that they utilise evasive tactics that should help to minimise cache loss. We discuss our results in relation to recent theory of reciprocal pilferage and compare them to behaviours shown by caching birds.  相似文献   
52.
53.
This essay continues a debate about the relative scientific merits of the Park‐Levine Model (PLM) and Interpersonal Deception Theory (IDT) with regard to accuracy in deception detection. Key points of disagreement include (a) the degree to which message recipients are sensitive to sender veracity and (b) the extent to which interactivity moderates the veracity and base‐rate effects specified by PLM. According to PLM, people are truth‐biased, truth‐bias makes people insensitive to deception, and as a consequence, base rates affect accuracy regardless of interactivity. IDT, in direct contrast, holds that people are sensitive to the veracity of other's communication and that interactivity is a key moderator. Consistent with PLM, data repeatedly show that people are insensitive to other's veracity and that this insensitivity is general across media affordances including interactivity. This rejoinder uses Burgoon's (2015) own interactive data to demonstrate the empirical superiority of PLM over IDT.  相似文献   
54.
Previous studies have found that senders' personal traits may be used by others to make judgements about the senders' truthfulness. Two studies were conducted to examine whether perceived self‐control ability has an effect on deception judgement. Perceived self‐control was hypothesized to act as a motivational cue that participants would use to assess the sender's motivation to lie, which in turn would influence their deception judgement. Results revealed that when participants assessed the sender as having higher self‐control ability, they would consider the sender to be less motivated to lie in daily life (Study 1), and judge the sender more truthful in a text‐based deception judgement task (Study 2). However, the effect of perceived self‐control ability disappeared in a video‐based task (Study 2), likely due to the multitude of various cues available in audio‐visual stimuli. The theoretical and applied implications of the results are discussed.  相似文献   
55.
This study addresses the utility of the kinematics of penalty takers for goalkeepers in association football. Twelve professional and semi-professional players shot to one side of the goal with (deceptive condition) or without (non-deceptive condition) simulating a shot to the opposite side. The body kinematics of the penalty takers were registered with motion-capture apparatus. Correlation and regression techniques were used to determine the relation between the shot direction and aspects of the penalty taker’s kinematics at different moments. Several kinematic variables were strongly correlated with shot direction, especially those related to the lower part of the body. Some of these variables, including the angle of the non-kicking foot, acquired high correlations at time intervals that are useful to goalkeepers. Compound variables, here defined as linear combinations of variables, were found to be more useful than locally defined variables. Whereas some kinematic variables showed substantial differences in their relation to ball direction depending on deception, other kinematic variables were less affected by deception. Results are interpreted with the hypothesis of non-substitutability of genuine action. The study can also be interpreted as extending the correlation and regression methodology, often used to analyze variables defined at single moments, to the analysis of variables in a time continuous fashion.  相似文献   
56.
Groups and individuals were compared for their willingness to incur financial costs in order to punish dishonest behavior by others. Study 1 demonstrated that dishonesty was punished more often by groups than by individuals and that groups’ higher willingness to punish dishonesty was mediated by stronger negative affect. Study 2 provided evidence that the increase in negative affect in groups was driven by exposure to other group members’ negative feelings and opinions during group discussions. Overall, the results suggest that being part of a group increases negative emotions toward dishonest others and leads to a greater willingness to engage in costly punishment.  相似文献   
57.
Leal, Vrij, Deeb, and Jupe (2018) found—with British participants—that a model statement elicited (a) more information and (b) a cue to deceit: After exposure to a model statement, liars reported significantly more peripheral information than truth tellers. We sought to replicate these findings with Arabs living in Israel. Truth tellers and liars reported a stand‐out event that they had (truth tellers) or pretended to have (liars) experienced in the last 2 years. Half of the participants were given a model statement in the second phase of the interview. Replicating Leal et al. (2018a), (a) truth tellers reported more core details than liars initially and (b) a model statement resulted in more additional core and peripheral details in the second phase of the interview. Unlike in Leal et al. (2018a), a model statement did not have a differential effect on truth tellers in the current experiment.  相似文献   
58.
Hare B  Call J  Tomasello M 《Cognition》2006,101(3):495-514
There is little experimental evidence that any non-human species is capable of purposefully attempting to manipulate the psychological states of others deceptively (e.g., manipulating what another sees). We show here that chimpanzees, one of humans' two closest primate relatives, sometimes attempt to actively conceal things from others. Specifically, when competing with a human in three novel tests, eight chimpanzees, from their first trials, chose to approach a contested food item via a route hidden from the human's view (sometimes using a circuitous path to do so). These findings not only corroborate previous work showing that chimpanzees know what others can and cannot see, but also suggest that when competing for food chimpanzees are skillful at manipulating, to their own advantage, whether others can or cannot see them.  相似文献   
59.
This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present-day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited defense resources by using deceptive signals to trick the human mind. However, the algorithms are designed to protect against adversaries that make perfectly rational decisions. In behavioral experiments using an abstract cybersecurity game (i.e., Insider Attack Game), we examined human decision-making when paired against the defense algorithm. We developed an instance-based learning (IBL) model of an attacker using the Adaptive Control of Thought-Rational (ACT-R) cognitive architecture to investigate how humans make decisions under deception in cyber-attack scenarios. Our results show that the defense algorithm is more effective at reducing the probability of attack and protecting assets when using deceptive signaling, compared to no signaling, but is less effective than predicted against a perfectly rational adversary. Also, the IBL model replicates human attack decisions accurately. The IBL model shows how human decisions arise from experience, and how memory retrieval dynamics can give rise to cognitive biases, such as confirmation bias. The implications of these findings are discussed in the perspective of informing theories of deception and designing more effective signaling schemes that consider human bounded rationality.  相似文献   
60.
An experiment tested whether groups lie more than individuals. Groups lied more than individuals when deception was guaranteed to maximize economic outcomes, but lied relatively less than individuals when honesty could be used strategically. These results suggest that groups are more strategic than individuals in that they will adopt whatever course of action best serves their economic interest.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号