Search results for "cheating"

showing 10 items of 25 documents

Social Interactions Among Bacteriophages

2020

Although viruses lack many of the social adaptations shown by more complex organisms, different types of social interactions have been unraveled in viruses. Phage research has contributed significantly to the development of this field, called sociovirology, with the discovery of processes such as intracellular and extracellular public good production, prudent host exploitation, cheating, and inter-phage communication. We here review and discuss these processes from a social evolution approach. Similar to other organisms, the origin and maintenance of phage-phage interactions can be explained using kin selection, group selection and game theory approaches. Key determinants of phage social ev…

Group selectionEvolutionary biologyvirusesField (Bourdieu)CheatingKin selectionPublic goodSocial evolutionBiologyGame theorySelection (genetic algorithm)
researchProduct

Moral Disengagement in Youth Athletes: A Narrative Review

2022

The sports environment can be considered as a context characterized by interactions typical of social groups, where children have the chance to learn good values. Positive and negative behaviours in sports, also called prosocial and antisocial behaviours, have been studied according to a moral perspective, as has doping behaviour, taking into consideration the concept of moral disengagement. Moral disengagement in children has been associated with maladaptive behaviours later in life, even though it should disappear with growth. Concerning the sports environment, previous reviews on the topic have extensively illustrated the role of moral variables in sport and their relation to antisocial …

HistologychildrenRheumatologyaggressionmoral developmentadolescencePhysical Therapy Sports Therapy and RehabilitationOrthopedics and Sports Medicinemoral disengagementAnatomycheatingphysical activity.Journal of Functional Morphology and Kinesiology
researchProduct

Do proctored online University exams in Covid-19 era affect final grades respect face-to-face exams?

2021

The Covid-19 pandemic forced universities to convert their traditional face-to-face exams to online exams with doubts as to whether student cheating or technical difficulties would affect their final grades. After taking three of these exams online, we considered comparing their grades with those of previous years on traditional exams. The average mark of the traditional exams before the pandemic was 6.95 over 10, while the average mark of the three exams carried out in the Covid-19 era is 6.64. The student's t test indicated that there are no significant differences between the two types of exams in the mean (p = 0.408), the median (p = 0.378), the range (p = 0.307), the minimum (p = 0.410…

Medical educationHigher educationCoronavirus disease 2019 (COVID-19)business.industryCheatingTeachingTestsEducational systemsHigher EducationAffect (psychology)Face-to-faceCheatingGradesLearningExamsOnlinebusinessPsychologyProctoringEducational systems
researchProduct

Crafting messages to fight dishonesty: A field investigation of the effects of social norms and watching eye cues on fare evasion

2021

Abstract The impact of watching eyes cues and descriptive social norm messages on fare evasion was studied in two experiments that were conducted in two railway stations in France. In Study 1, a natural field experiment, passengers were exposed for a two-week period to either a control eye-cues poster or to an experimental eye-cues with a social norm messaging campaign. In Study 2, an artefactual experiment in the field, participants in the experimental train station were asked to participate in a lying task before and after they were exposed to the messaging campaign. The results from both studies suggest that although watching eye cues alone are not effective in a crowded train station, e…

Organizational Behavior and Human Resource ManagementDishonestymedia_common.quotation_subjectCheating05 social sciencesControl (management)050109 social psychologyScale (social sciences)0502 economics and business0501 psychology and cognitive sciencesBehavioral ethicsPsychologyEnforcementSocial psychologyLying050203 business & managementApplied PsychologyFare evasionmedia_commonOrganizational Behavior and Human Decision Processes
researchProduct

Mechanism change in a simulation of peer review: from junk support to elitism

2014

Abstract Peer review works as the hinge of the scientific process, mediating between research and the awareness/acceptance of its results. While it might seem obvious that science would regulate itself scientifically, the consensus on peer review is eroding; a deeper understanding of its workings and potential alternatives is sorely needed. Employing a theoretical approach supported by agent-based simulation, we examined computational models of peer review, performing what we propose to call redesign, that is, the replication of simulations using different mechanisms. Here, we show that we are able to obtain the high sensitivity to rational cheating that is present in literature. In additio…

Rational cheatingComputer scienceCheatingmedia_common.quotation_subjectSocial Sciences(all)PrudenceLibrary and Information Sciences050905 science studiesArticlePeer reviewRestrained cheatersmedia_commonComputational modelAgent-based simulationMechanism (biology)05 social sciencesGeneral Social SciencesBDI approachData scienceReplication (computing)EpistemologyComputer Science ApplicationsMechanism change0509 other social sciences050904 information & library sciencesLawElitismScientometrics
researchProduct

Properties and constraints of cheating-immune secret sharing schemes

2006

AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…

TheoryofComputation_MISCELLANEOUSHomomorphic secret sharingCryptography0102 computer and information sciences02 engineering and technologyShared secretComputer securitycomputer.software_genre01 natural sciencesSecret sharingCheating0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsSecret sharingMathematicsbusiness.industryApplied MathematicsCryptographic protocol16. Peace & justiceShamir's Secret Sharing010201 computation theory & mathematicsResilient functionsCryptographySecure multi-party computation020201 artificial intelligence & image processingVerifiable secret sharingbusinesscomputerDiscrete Applied Mathematics
researchProduct

Teaching Programming to Large Student Groups through Test Driven Development - Comparing Established Methods with Teaching based on Test Driven Devel…

2016

This paper presents an approach for teaching programming in large university classes based on test driven development (TDD) methods. The approach aims at giving the students an industry-like environment already in their education and introduces full automation and feedback programming classes through unit testing. The focus for this paper is to compare the novel approach with existing teaching methods. It does so by comparing introduction to programming classes in two institutions. One university ran a TDD teaching process with fully automated assessments and feedback, while the other ran a more traditional on-line environment with manual assessments and feedback. The TDD approach has clear…

Unit testingMultimediaProcess (engineering)business.industryComputer scienceCheatingmedia_common.quotation_subjectTeaching methodCreativityTest-driven developmentcomputer.software_genreAutomationInductive programmingbusinessSoftware engineeringcomputermedia_commonProceedings of the 8th International Conference on Computer Supported Education
researchProduct

A Risk-Based Approach for Mitigating Ethical Lapses

2019

In early 2008, the CEO of Volkswagen announced a 10-year plan that called for tripling the company’s U.S. sales by 2018. The executive gave marching orders to engineers to come up with a new technology that would enable VW to lower emissions of the new cars. The engineers failed to come up with a device that could do the job. Instead they deployed a defeating software would defeat the testing process. The 2009 VW Jetta clean diesel was launched in April 2008 and followed by the introduction of similarly equipped VW Golfs and Audi A3s. Over 145,000 vehicles were sold in the U.S. in three years. The scheme was eventually exposed, costing the company millions of dollars. This paper describes t…

Volkswagenemissions cheatingethical trapsethical lapsesrisk-based approach
researchProduct

Multi-Authored Manuscripts and Speedup in Academic Publishing

2014

It is unfair to count a n-authored paper as one paper for each coauthor, i.e., as n papers: this is “feeding the multitude”. Sharing the credit among coauthors by percentages or by simply dividing by n is fairer but somewhat harsh. So, we propose to take into account the productivity gains of parallelization by introducing a team bonus function that multiplies the allocation thereby increasing the credit allocated to each coauthor.The degree of parallelization cannot be determined exogenously discipline by discipline. So, one may propose that each team of coauthors indicates how the labor was organized to produce the paper. Unfortunately, the coauthors may systematically bias their answers …

business.industryComputer scienceCheatingmedia_common.quotation_subjectComputingMilieux_PERSONALCOMPUTINGParallel computingLimitingN-rulePublishingOrder (exchange)Bounded functionbusinessFunction (engineering)media_commonSSRN Electronic Journal
researchProduct

The Risks of WiFi Flexibility: Enabling and Detecting Cheating

2013

Flexibility is an important paradigm for future WiFi networks. However, it also opens the possibility for diverse methods of cheating, which users can perform to increase their throughput. Therefore, it is important to develop the necessary tools to mitigate such efforts. In this paper we first discuss the risks of flexibility in terms of misbehaviour. We then propose an architecture to detect misbehaviour and react by punishing the cheaters. The proposed architecture utilizes advanced passive monitoring, flexible WiFi software, and appropriate reasoning to detect cheating. We validate its performance and discuss means of punishment

flexibilitymisbehaviorSettore ING-INF/03 - TelecomunicazioniWiFicheating
researchProduct