234 research outputs found

    Going down the slippery slope of legitimacy lies in early‑stage ventures: the role of moral disengagement

    Get PDF
    It would seem, on the surface, logical that entrepreneurs would treat stakeholders with honesty and respect. However, this is not always the case—at times, entrepreneurs lie to stakeholders in order to take a step closer to achieving legitimacy. It is these legitimacy lies that are the focus of the current work. Overall, while we know that legitimacy lies are told, we know very little about the psychological processes at work that may make it more likely for someone to tell a legitimacy lie. Thus, we theorize about the pressure to pursue legitimacy, the situational and individual factors that affect this pursuit, as well as how this context can lead to moral disengagement and the telling of legitimacy lies. Our theorizing advances the existing literature and provides a dynamic framework by which future research can delve more deeply into the nuanced context that breeds the escalation of legitimacy lies

    The Missouri Miner, April 10, 1985

    Get PDF
    https://scholarsmine.mst.edu/missouri_miner/3398/thumbnail.jp

    “My Mum was a cop…”: A mixed methods exploration of deceptive performance using the General Expertise Framework.

    Get PDF
    The General Expertise Framework (GEF) explains the phenomenon that regardless of domain, experts have certain features in common, such as a high volume of accumulated practice, performance consistency across time and situation, accuracy of calibration between perceived and actual performance, and well-developed metaawareness which facilitates adaptability of performance in response to feedback. Interpersonal Deception Theory (IDT) and Activation-Decision-Construction- ActionTheory (ADCAT) present lying as a cognitively challenging act requiring skill to perform well. So, it makes sense that deception should show the same features as other areas of expertise. However, this has never been systematically tested. This programme of research involved four empirical studies, across a range of channels and contexts including interactive in-person interviews and online written deception, which sought to answer an overarching question. Can deceptive performance be conceptualised as a skill, as defined by the GEF? To obtain an objective measure of deceptive performance uncontaminated by possible receiver biases, a Matrix of measures was constructed which included only the most reliable cues. The results suggest that deception is a particular example of expertise, learned in a wicked environment, poorly practiced by most and situationally contingent. Expert liars show an effect of practice, but a high volume of accumulated practice is not sufficient to confer expertise, rather focused, strategic use of lying is required. Expert liars demonstrate superior calibration of perceived and actual performance even though feedback on lying is almost nonexistent in everyday life. This may be why responsiveness to feedback is the most challenging element of expertise in the domain of deception. The unique insights provided by the mixed-methods approach means future research must continue to explore these techniques

    Carolina Gothic

    Get PDF
    This creative thesis will contain several interconnected short stories. They exist in the same literary world populated by a revolving cast of characters. Some of them remain innocent and emotionally progressing, while others are flawed and morally stagnant. Class and religion coalesce or vanish within their unusual encounters that often only occur on the written page. Under the context of tourism, rehab, or violence, characters' masks are dropped, revealing their deeper inner selves. This display of grace or cowardice under pressure will constantly be revealing character. Redemption will be a key element. Both its acceptance and dismissal depending on the narrator. The settings range from the Carolinas, Nashville, and Key West. Themes include people compromised by community, the momentum of past failures, addiction, familial or neighborly obligation, petty revenge, and love. These writings will strive to stir readers into facing points of view from uncomfortable narrators in order to round out their worldview. Told in mostly first-person snapshot vignettes, my craft will focus mostly on colloquial language and rhythm to avoid similar or basic narration. Relying on slang, misspoken words, and the precise use of specific similes that offer insight into each narrator’s worldview. These distinct voices will contradict one another and subtly inform a plot that is never handed to the reader linearly. Offering layered unreliability which encourages rereadability. Each sentence will strive to offer plot forwarding energy alongside the aesthetically pleasing oddity of sharp, specific word choices. Always towing the line between humor and sorrow. Bridging the abstract and the absurd. The depths of depravity explored will reflect the hills and valleys of human emotion and meaning. Natural settings are a key character in each story, both violent and transcendental. Works consulted range from Denis Johnson, Barry Hannah, Ron Rash, David Foster Wallace, Mark Z. Danielewski, Ann Pancake, and Flannery O’Connor. To name a fraction of influences. These stories will honor the rich tradition of southern literature while complicating it into new directions. Hopefully filling gaps between writers far better than me. These stories will encourage radical empathy through gallows humor, friction from opposing perspectives, and forgiveness in the face of violence and injustice. These stories will attempt to contribute to reader's reality and remind them to enjoy life more introspectively

    Fast talk & flush times : the confidence man as a literary convention

    Get PDF
    Includes bibliographical references (pages 221-232) and index.Lenz provides a historical overview of the American confidence man, and its role as a literary convention.The new country -- The early tradition of confidence games -- The emergence of the confidence-man convention -- Four variations of the confidence man -- The war, Mark Twain, and the flush-times confidence man -- From the new country to the twentieth century.Digitized at the University of Missouri--Columbia MU Libraries Digitization Lab in 2012. Digitized at 600 dpi with Zeutschel, OS 15000 scanner. Access copy, available in MOspace, is 400 dpi, grayscale

    The Fictions of Satire

    Get PDF
    Originally published in 1967. In this study of the English Augustan satirists, and the Roman and subsequent authors who were their models, Professor Paulson shows how rhetoric relates to imitation, persuasion to presentation, and the imitation of the satirist to the imitation of the satiric object. He illustrates the tendency of the satirist to invade his own fiction and imitate not the prime object of his satire but the satiric persona, which consequently takes on a life of its own. By analyzing the satiric fictions of the precursors of the Augustans, the author reveals the elements they bequeathed to those who rode the high crest of the satiric wave in England, before the art of satire became submerged in the deepening trough of sentimental romanticism.Paulson shows the Tories Dryden, Pope, and Swift and the Whigs Addison and Steele to be the heirs of a long line of satirists ancient and modern, from Horace, Juvenal, Lucian, Apuleius, and Petronius to Rabelais, Cervantes and the English Elizabethan and Civil War poets. Taking Swift as his main example, Paulson examines the dualism of satire in its most interesting and ambiguous modes, and as the embodiment of rhetorical devices that are as complex mimetically as they are rhetorically

    Greedy Cheating Liars and the Fools who Believe Them

    No full text
    Evolutionary algorithms based on \u201ctags\u201d can be adapted to induce cooperation in selfish environments such as peer-to-peer systems. In this approach, nodes periodically compare their utilities with random other peers and copy their behavior and links if they appear to have better utilities. Although such algorithms have been shown to posses many of the attractive emergent properties of previous tag models, they rely on the honest reporting of node utilities, behaviors and neighbors. But what if nodes do not follow the specified protocol and attempt to subvert it for their own selfish ends? We examine the robustness of a simple algorithm under two types of cheating behavior: a) when a node can lie and cheat in order to maximize its own utility and b) when a node acts nihilistically in an attempt to destroy cooperation in the network. For a test case representing an abstract cooperative application, we observe that in the first case, a certain percentage of such \u201cgreedy cheating liars\u201d can actually improve certain performance measures, and in the second case, the network can maintain reasonable levels of cooperation even in the presence of a limited number of nihilist nodes

    Greedy Cheating Liars and the Fools Who Believe Them

    No full text

    The Carroll Quarterly, vol. 19, no. 3 and no. 4

    Get PDF
    https://collected.jcu.edu/carrollquarterly/1056/thumbnail.jp

    Greedy Cheating Liars and the Fools Who Believe Them

    No full text
    Recently, evolutionary algorithms based on "tags" have been adapted for application in peer-to-peer (P2P) systems. Using this approach nodes compare their utilities with random others and copy behaviours and links based on which node has the higher utility. Although such algorithms have been shown to posses many of the attractive emergent properties of the previous tag models, they rely on the honest reporting of node utilities, behaviours and links. But what if a node does not follow the specified protocol and attempts to subvert it for its own selfish ends? We examine the robustness of the SLACER algorithm to two kinds of cheating behaviour in the nodes: a) when nodes lie and cheat to maximize their own utility and b) when nodes act nihalistically to try to destroy cooperation in the network. We find that in a) a certain percentage of such "greedy cheating liars" actually can improve system performance and in b) the network can still function even containing high levels of such nodes
    • …
    corecore