Search results for "Deception"
showing 10 items of 40 documents
The challenge of the predatory open-access publishing outbreak
2019
NA
The meaning of biological signals.
2020
We introduce the virtual special issue on content in signalling systems. The issue explores the uses and limits of ideas from evolutionary game theory and information theory for explaining the content of biological signals. We explain the basic idea of the Lewis-Skyrms sender-receiver framework, and we highlight three key themes of the issue: (i) the challenge of accounting for deception, misinformation and false content, (ii) the relevance of partial or total common interest to the evolution of meaningful signals, and (iii) how the sender-receiver framework relates to teleosemantics.
Who Wants to Be Understood? The Desire for Social Affirmation and the Existential Challenge of Self-Understanding
2019
The guiding thesis of this chapter is that self-understanding is centrally an existential challenge. In particular, the chapter aims to lay bare the massive potential of our desire for social affirmation to influence and distort our self-understanding, mostly in a covert and unacknowledged fashion. To the extent that we are driven by this desire, we are primarily concerned with assessing, in an emotionally charged and self-deceptive manner, the social worth of our self, whereas we lack the will and ability to understand ourselves in an open and unqualified manner. Ultimately, it is argued that whatever the cognitive demands of self-understanding and our ability to meet these demands may be,…
Predatory journals and conferences: why fake counts
2020
Purpose of review Predatory publishing poses a serious educational end ethical threat to the credibility of science. The aim of this review is to discuss the main features of this deceptive open-access model, its potential consequences and relevance for the whole scientific community. Recent findings Recent reports showed that scholars and clinicians from all research fields, including anesthesiology, are facing an alarming invasion of predatory journals and, more recently, fake conferences. This review discusses key elements of these phenomena and proposes countermeasures to tackle the problem. Summary Predatory journals and conferences are two sides of the same coin. As here reviewed, the…
Deception and Abuse: Manifold Instances of Proximity Violence Against Sub-Saharan Women
2020
This chapter, by referring to the gender-violence binomial, highlights some of the dynamics between “resistant victims” and “proximate perpetrators” which characterize proximity violence. It presents the results of research consisting in participant observation of 18 sub-Saharan women residing in refugee facilities located in western Sicily and 16 non-directive interviews, from which three cases have been extracted.
The Moments Which Were Never Lost
2011
From faraway Hyperborea, the North wind blows, bringing tidings from a blissful northern people in whose very being there resides a smile. The joyful days of Finnishness were left behind in Karelia, in its beloved song-lands. It is an Arcadia that still lives on in memories, passed on, in the form of stories, from one generation to the next. Yet in those unbreakable links of longing there lurks a danger: a constant temptation to deprecate and even dismiss the present moment. If your sense of the real, of the presently passing moment of the “now” is lost, then who bears the responsibility for that? An idealization of the past results in time deception, a chronological fraud where your entire…
Information Influence in Society’s Information Environment : An Empirical Analysis Using the Grounded Theory
2020
This paper investigates information influence in society’s Information Environment. The Grounded Theory approach was used to collect and to analyse the data. A conceptual framework of the thematic categories and item categories was developed on the basis of empirical evidence and past studies that reflect the findings of the field. The most fundamental components in this conceptual framework were six thematic categories (information influence, information operations, cyber operations, psychological operations, kinetic operations, and deception), their item categories, the items themselves, and the interrelationships between the thematic categories. The propositions regarding the thematic ca…
The Linguistics of Lying
2018
This review deals with the communicative act of lying from a linguistic point of view, linguistics comprising both grammar and pragmatics. Integrating findings from the philosophy of language and from psychology, I show that the potential for lying is rooted in the language system. The tasks of providing an adequate definition of lying and of distinguishing lying from other concepts of deception (such as bald-faced lying and bullshitting) can be solved when interfaces between grammar and pragmatics are taken into account and when experimental results are used to narrow down theoretical approaches. Assuming a broadly neo-Gricean background, this review focuses on four theoretical topics: the…
Exploratory study of the hoaxes spread via WhatsApp in Spain to prevent and/or cure COVID-19
2021
Objective: To review the hoaxes’ characteristics spread through WhatsApp in Spain during COVID-19 lockdown and identify what kind of substances were promoted for consumption or application. Method: A phone number was activated to receive hoaxes via WhatsApp. A total of 2353 messages were collected, and among those 584 different hoaxes were identified and validated, between March 18 and April 18, 2020. From these 584 hoaxes, a sub-sample of 126 was selected, exclusively related to the object of study, and a content analysis table with fourteen registration fields was applied. Besides, the averages and medians of the quantitative fields were extracted. Results: Most of the messages received w…
2021
Data collected in criminal investigations may suffer from issues like: (i) incompleteness, due to the covert nature of criminal organizations; (ii) incorrectness, caused by either unintentional data collection errors or intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyze nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data, and to determine which network type is most affected by it. The networks are firstly pruned using two specific m…