26,200 research outputs found

    Classification of adults with problematic internet experiences: Linking internet and conventional problems from a clinical perspective.

    Get PDF
    Abstract This article utilizes data from clinical reports of 929 adults to examine whether various problematic Internet experiences are distinctly different from or extensions of conventional problems. A TwoStep Cluster Analysis identified three mutually exclusive groups of adults, those with (1) online relationship problems and victimization; (2) online and offline problems; and (3) marital discord. Results suggest some initial support for the idea that problematic Internet experiences are often extensions of experiences and behaviors that pre-date the Internet. However, the Internet may be introducing some qualitatively new dimensions - such as an increased severity, an increased frequency, or unique dynamics - that require new responses or interventions

    Stealthy Deception Attacks Against SCADA Systems

    Full text link
    SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above mentioned anomaly detection. After hijacking the communication channels between the Human Machine Interface (HMI) and Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a fake view of the industrial process, deceiving the human operator into taking manual actions. Our most advanced attack also manipulates the messages generated by the operator's actions, reversing their semantic meaning while causing the HMI to present a view that is consistent with the attempted human actions. The attacks are totaly stealthy because the message sizes and timing, the command sequences, and the data values of the ICS's state all remain legitimate. We implemented and tested several attack scenarios in the test lab of our local electric company, against a real HMI and real PLCs, separated by a commercial-grade firewall. We developed a real-time security assessment tool, that can simultaneously manipulate the communication to multiple PLCs and cause the HMI to display a coherent system--wide fake view. Our tool is configured with message-manipulating rules written in an ICS Attack Markup Language (IAML) we designed, which may be of independent interest. Our semantic attacks all successfully fooled the operator and brought the system to states of blackout and possible equipment damage

    Criminal Lying, Prosecutorial Power, and Social Meaning

    Get PDF
    This article concerns the prosecution of defensive dishonesty in the course of federal investigations. It sketches a conceptual framework for violations of 18 U.S.C. § 1001 and related false-statement charges, distinguishes between harmful deception and the typical investigative interaction, and describes the range of lies that fall within the wide margins of the offense. It then places these cases in a socio-legal context, suggesting that some false-statement charges function as penalties for defendants’ refusal to expedite investigations into their own wrongdoing. In those instances, the government positions itself as the victim of the lying offense and reasserts its authority through prosecution. Enforcement decisions in marginal criminal lying cases are driven by efficiency rather than accuracy goals, which may produce unintended consequences. Using false-statement charges as pretexts for other harms can diminish transparency and mute signals to comply. Accountability also suffers when prosecutors can effectively create offenses, and when it is the interaction with the government itself rather than conduct with freestanding illegality that forms the core violation. The disjunction between prosecutions and social norms about defensive dishonesty may also result in significant credibility costs and cause some erosion of voluntary compliance. Animating the materiality requirement in the statute with attention to the harm caused or risked by particular false statements could mitigate these distortions. An inquiry into the objective impact of a false statement might account for the nature of the underlying conduct under investigation, whether the questioning at issue is pretextual, whether the lie is induced, and whether the deception succeeds or could succeed in harming the investigation. By taking materiality seriously, courts could curtail prosecutorial discretion and narrow application of the statute to cases where prosecution harmonizes with social norms

    The Costs of Deception: Evidence From Psychology

    Get PDF
    Recently, it has been argued that the evidence in social science research suggests that deceiving subjects in an experiment does not lead to a significant loss of experimental control. Based on this assessment, experimental economists were counseled to lift their de facto prohibition against deception to capture its potential benefits. To the extent that this recommendation is derived from empirical studies, we argue that it draws on a selective sample of the available evidence. Building on a systematic review of relevant research in psychology, we present two major results: First, the evidence suggests that the experience of having been deceived generates suspicion which in turn is likely to affect judgment and decision making of a non-negligible number of participants. Second, we find little evidence for reputational spillover effects that have been hypothesized by a number of authors in psychology and economics (e.g., Kelman, 1967; Davis and Holt, 1993). Based on a discussion of the methodological costs and benefits of deception, we conclude that experimental economists' prohibition of deception is a sensible convention that economists should not abandon.experimental economics; deception; reputational spillover effects

    Self-other differences in student drinking norms research: the role of impression management, self-deception and measurement methodology

    Get PDF
    Background: Data-driven student drinking norms interventions are based on reported normative overestimation of the extent and approval of an average student’s drinking. Self-reported differences between personal and perceived normative drinking behaviors and attitudes are taken at face value as evidence of actual levels of overestimation. This study investigates whether commonly used data collection methods and socially desirable responding may inadvertently impede establishing 'objective' drinking norms. Methods: UK students [N=421; 69% female; Mean age 20.22 years (SD = 2.5)] were randomly assigned to one of three versions of a drinking norms questionnaire: The standard multi-target questionnaire assessed respondents' drinking attitudes and behaviors (frequency of consumption, heavy drinking, units on a typical occasion) as well as drinking attitudes and behaviors for an ‘average student’. Two deconstructed versions of this questionnaire assessed identical behaviors and attitudes for participants themselves or an 'average student'. The Balanced Inventory of Desirable Responding was also administered. Results: Students who answered questions about themselves and peers reported more extreme perceived drinking attitudes for the average student compared with those reporting solely on the ‘average student’. Personal and perceived reports of drinking behaviors did not differ between multi- and single-target versions of the questionnaire. Among those who completed the multi-target questionnaire, after controlling for demographics and weekly drinking, socially desirable responding was related positively with the magnitude of difference between students’ own reported behaviors/attitudes and those perceived for the average student. Conclusions: Standard methodological practices and socially desirable responding may be sources of bias in peer norm overestimation research

    Forging success : Soviet managers and accounting fraud, 1943 to 1962

    Get PDF
    Attempting to satisfy their political masters in a target-driven culture, Soviet managers had to optimize on many margins simultaneously. One of these was the margin of truthfulness. False accounting for the value of production was apparently widespread in some branches of the economy and at some periods of time. A feature of accounting fraud was that cases commonly involved the aggravating element of conspiracy. The paper provides new evidence on the nature and extent of accounting fraud; the scale and optimal size of conspiratorial networks; the authorities’ willingness to penalize it and the political and social factors that secured leniency; and inefficiency in the socialist market where managers competed for political credit

    OBSTACLES TO SUCCESS IN THE WORKPLACE FOR PEOPLE WITH DISABILITIES: A REVIEW AND RESEARCH AGENDA

    Get PDF
    Our objectives in this paper were to summarize research relevant to obstacles that people with disabilities (PWD) face in the workplace and to identify directions for future research on the topic. We included review, theoretical, and empirical articles in mainstream management journals and those in psychology or rehabilitation journals if they had clear workplace implications. We argue that obstacles identified in prior research may only partially reflect organizational reality. This is because of the heavy reliance on laboratory studies, which we urge researchers to replicate in organizational settings. Better understanding of obstacles will lead to more evidence-based solutions where the payoff is a less exclusionary world in which more individuals are provided opportunities to use their talent for the benefit of all. .Disability, Workplace obstacles, Review

    Self-Deception as Affective Coping. An Empirical Perspective on Philosophical Issues

    Get PDF
    In the philosophical literature, self-deception is mainly approached through the analysis of paradoxes. Yet, it is agreed that self-deception is motivated by protection from distress. In this paper, we argue, with the help of findings from cognitive neuroscience and psychology, that self-deception is a type of affective coping. First, we criticize the main solutions to the paradoxes of self-deception. We then present a new approach to self-deception. Self-deception, we argue, involves three appraisals of the distressing evidence: (a) appraisal of the strength of evidence as uncertain, (b) low coping potential and (c) negative anticipation along the lines of Damasio’s somatic marker hypothesis. At the same time, desire impacts the treatment of flattering evidence via dopamine. Our main proposal is that self-deception involves emotional mechanisms provoking a preference for immediate reward despite possible long-term negative repercussions. In the last part, we use this emotional model to revisit the philosophical paradoxes
    • 

    corecore