首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41篇
  免费   0篇
教育   14篇
科学研究   5篇
各国文化   1篇
体育   1篇
综合类   1篇
文化理论   1篇
信息传播   18篇
  2019年   1篇
  2018年   1篇
  2017年   4篇
  2016年   2篇
  2013年   18篇
  2012年   6篇
  2009年   2篇
  2008年   2篇
  2007年   3篇
  2003年   1篇
  2002年   1篇
排序方式: 共有41条查询结果,搜索用时 15 毫秒
1.
This article explores people’s susceptibility to political deception. Participants watched a news interview in which a politician either answered all the questions or deceptively evaded a question. In Study 1 (n = 202), deception is perceived through the dodge being irrelevant for voters who do not identify with the politician. In Study 2 (n = 618), partisan voters consider the politician more deceptive, and acting more deceptively, when the politician has their opposing party affiliation, independent of whether he dodges. When the politician shares their party identification, voters identify with the politician more and consider his responses more relevant. Findings are consistent with theoretical positions of identification, the cooperative principle, and social identity.  相似文献   
2.
Research has found discrepancies among folk beliefs about lie detection, deception cue utility, and retrospective accounts of detected lies. Elite customs agents (N = 37) were surveyed regarding their overall beliefs about how to detect lies (general strategy), their opinions about best practices (best strategy), and about a successfully detected lie (actual strategy). Responses were coded in three nonexclusive broad categories: (a) behavioral cues, (b) communication content and evidence, and (c) interactive-questioning approaches. Behavioral cues, especially nonverbal cues, were listed most frequently as general beliefs. Opinions about the best approach were evenly split across the three categories. Communication content and evidence was the most frequently reported actual detection method and was mentioned in 97% of the responses. The results are discussed in relation to Truth-Default Theory and their implications for lie detection practice.  相似文献   
3.
To Catch a Liar: Challenges for Research in Lie Detection Training   总被引:1,自引:0,他引:1  
Can we train people to detect deception? It is the contention of this article that communication scholars should learn how to train law enforcement professionals on how to detect high stake lies, like those faced by police, judges, customs officials, immigration officials, and so forth. It is proposed that in order to know whether we can train or should bother to train people to detect deception, each training study must meet 6 challenges: (1) relevance, (2) high stakes, (3) proper training, (4) proper testing, (5) generalizability across situations, and (6) generalizability over time. Our quantitative review of the literature suggests that training does significantly raise lie detection accuracy rates. Meta-analytic findings indicate a mean effect size of r = .20 across 20 (11 published studies) paired comparisons of lie detection training versus the control group (i.e., those without some type of training). It should be noted that the majority of the studies that attempt to train lie detectors fall short on many of the above challenges. Current research in lie detection training may actually underestimate the ability to train lie detectors due to the stimulus materials employed in most experiments.  相似文献   
4.
A common phenomenon in online discussion groups is the individual who baits and provokes other group members, often with the result of drawing them into fruitless argument and diverting attention from the stated purposes of the group. This study documents a case in which the members of an online community--a feminist web-based discussion forum--are targeted by a "troll" attempting to disrupt their discussion space. We analyze the strategies that make the troller successful and the targeted group largely ineffectual in responding to his attack, as a means to understand how such behavior might be minimized and managed in general. The analysis further suggests that feminist and other nonmainstream online forums are especially vulnerable, in that they must balance inclusive ideals against the need for protection and safety, a tension that can be exploited by disruptive elements to generate intragroup conflict.  相似文献   
5.
目前利用TCP/IP协议安全漏洞进行欺骗攻击的事件经常发生,攻击者通过对主机的ARP欺骗,使其网络在正常连接的情况下出现无法打开网页、频繁断网、IE浏览器出错等问题,极大影响用户使用计算机网络。通过ARP协议原理分析揭示ARP协议欺骗,并给出相应的防御方法。  相似文献   
6.
《Communication monographs》2012,79(3):269-285
If a listener becomes suspicious during a conversation, and asks questions (probes) of a speaker, the listener tends to judge the speaker's message as honest. This result has been termed the probing effect (McCornack, Levine, Aleman, Oetzel, & Miller, ). This study hypothesized that an untested decision‐making phenomenon, an opposite probing effect, or a post‐probe tendency to judge a message as deceptive, might occur when lie‐biased individuals judge statement veracity. Prison inmates and non‐inmates participated in dyads as judges and speakers. Speakers watched a video, and then lied or told the truth to judges. Judges covertly showed thumbs up or down before asking questions, and subsequently made post‐probe judgments. Findings indicate that inmates use heuristic processing to a greater extent than non‐inmates, and that inmates, surprisingly, exhibit a probing effect, and not an opposite probing effect, when heuristic processing is employed to decide message veracity.  相似文献   
7.
《Communication monographs》2012,79(2):224-251
When people discover their romantic partner is keeping a secret from them but allow their partner to believe the secret is still unknown (creating what Caughlin, Scott, Miller, and Hefner referred to as a putative secret), this can have negative implications for their relationship. This study examined how putative secrets influence conflict in romantic relationships over time and whether certain factors (including perceived reasons for the secrecy, use of deception, and relationship satisfaction) moderate this association. The sample consisted of 305 dating individuals. Participants reported on a current putative secret, a putative secret kept in the past, or no secret, and then completed 3-week online diary entries tracking their conflict. The results revealed that individuals who were currently managing a putative secret had higher levels of conflict and more changes in conflict in their relationship over time than individuals who experienced a putative secret in the past or no putative secrets at all. Although individuals' attributions for their partner's secret keeping were important, they often depended on relationship satisfaction and currency of the putative secret. Relationship satisfaction significantly moderated the association between putative secrets and conflict, such that individuals who reported current putative secrets and were more dissatisfied reported the most intense conflict and the greatest changes in conflict over time.  相似文献   
8.
《Communication monographs》2012,79(1):115-137
This exploratory study examined sensemaking of peer co-worker deception from the perception of the deceived. A total of 58 narrative accounts of deception were collected via face-to-face interviews with 23 employed adults. Analysis revealed four primary narratives of co-worker deception: corrupt system narratives, “cover your ass” (CYA) narratives, personal gain narratives, and personality trait narratives. Perceived motives and consequences were primary considerations in the sensemaking process and employees reported changing their communication patterns to avoid deceptive co-workers or hold them more accountable for their actions. The theoretical and practical implications of these results are discussed and suggestions for future research are posited.  相似文献   
9.
This investigation examined the effects of attachment styles and efficacy of communication on avoidance following a relational partner's deceptive communication. Efficacy of communication was explored as a mediating variable. Students (n = 123) who reported being deceived by their relational partner were recruited for the study. The data revealed that, compared to individuals with other attachment styles, those with a high anxious/ambivalent attachment tendency were more likely to avoid discussing the deception with their partner. In addition, efficacy of communication was negatively associated with avoidance. The results further revealed, however, that efficacy of communication mediated the link between attachment and avoidance. More specifically, highly anxious/ambivalent individuals were more likely to perceive relatively low efficacy of communication, and such perception, in turn, influenced their avoidance. Findings of the study provide an explanation for the association between attachment and avoidance.  相似文献   
10.
Recently, deception research has focused primarily on micro‐analytic methods of lie detection (e.g., eye contact duration, response latency, vocal errors). This study adopted a macro‐assessment approach, where deception detection is based on global evaluations of communication, specifically honesty evaluation based on communicator style. 385 subjects viewed four different videotape segments of individuals participating in a simulated job interview. Two of the individuals were truthful throughout the interview, and two fabricated false information on some questions. Subjects were asked to evaluate or assess the honesty level of these individuals, as well as assess a number of communicator style dimensions. Multiple regression analyses revealed that honesty assessments can be predicted from communication style characterized by high friendliness, attentiveness, and preciseness, and low animated and dramatic styles. Some differences were observed for communicator style predictions of honesty based on liars/truthers, subject gender, target gender, and deceit‐orientation differences. Implications for future research are noted.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号