Deception Sample Clauses

Deception. Each experiment will inform subjects about the decisions they can make, and how these decisions will affect their payment for the experiment. This information will always be true. Specifically, if a standard economics experiment informs subjects that "if you take action A, then X will happen", then X will happen after the subject takes action A. Payments STUDIES CONDUCTED WITH SONA SUBJECTS. Participants will be paid $5 for appearing at the Stanford Economics Research Lab (XXXX). Participants will be paid at least $10 per hour for completing the experiment. Participants will be paid $20-$25 per hour on average. For experiments in which a participant takes part in more than a single study session, sessions other than the last will pay at least the $5 show-up payment. All other payments for the study may be deferred to the last session. Subjects may be paid at a pre-specified date after the study, either by using xxxxxx.xxx gift cards emailed to them, by asking them to come to the lab at a pre-specified point in time and paying them in cash, or by mailing a check to them. STUDIES CONDUCTED ONLINE. Participants will be paid an average of $10 per hour. For experiments in which a participant takes part in more than a single study session, all payments for the study may be deferred to the last session. Identifiable data STUDIES CONDUCTED AT XXXX: You may obtain the participants' names, email addresses and SUIDs for payment purposes. STUDIES CONDUCTED ONLINE: No identifiable data may be collected. Handling identifiable data: • Analysis of identifiable data will happen on password-protected computers; • Identifiable data will be stored on password-protected computers, or, if on paper, in the locked cabinets in the lab, or, temporarily, in the researcher's own locked cabinets; • Identifiable data may be accessed by the research team, and by the administrators of the Economics department. • Identifiable data will be transferred using USB memory devices, Stanford's email system, and DropBox. The electronic transmission mechanisms are password protected. Consent and subjects' rights STUDIES CONDUCTED AT XXXX. Subjects will be given written information about the experiment. After the information is read, the subjects will be told that they consent to participating in the study by continuing with it. Subjects will be informed that participation is voluntary. Subjects may refuse to participate or withdraw at any time. Non-participation will not affect students' grades or...
AutoNDA by SimpleDocs
Deception. The protocol is designed to withhold complete information when consent is obtained. DIRECTLY OR INDIRECTLY IDENTIFIABLE: Identities of individual subjects are kept by the investigator. If subjects' identities are inseparable from data, then data is directly identifiable. If subjects' identities are kept separate from data, with information connecting them maintained by codes and a master list, then data is indirectly identifiable. In either case, the investigator must assure that confidentiality will be maintained, and must explain how subjects' identities will be protected. • Direct identifiers: Direct identifiers in research data or records include names; postal address information ( other than town or city, state and zip code); telephone numbers, fax numbers, e-mail addresses; social security numbers; medical record numbers; health plan beneficiary numbers; account numbers; certificate /license numbers; vehicle identifiers and serial numbers, including license plant numbers; device identifiers and serial numbers; web universal resource locators ( URLs); internet protocol (IP) address numbers; biometric identifiers, including finger and voice prints; and full face photographic images and any comparable images. • Identifiable data or records: contains information that reveals or can likely associate with the identity of the person or persons to whom the data or records pertain. Research data or records with direct identifiers removed, but which retain indirect identifiers, are still considered identifiable. • In-direct identifiers: Indirect identifiers in research data or records include all geographic identifiers smaller than a state , including street address, city, county, precinct, Zip code, and their equivalent postal codes, except for the initial three digits of a ZIP code; all elements of dates ( except year ) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates ( including year) indicative of such age, except that such age and elements may be aggregated into a single category of age 90 or older. EDUCATIONAL SETTING: Research conducted in established or commonly accepted educational settings, involving normal educational practices, such as (i) research on regular and special education instructional strategies, or (ii) research on the effectiveness of or the comparison among instructional techniques, curricula, or classroom management method. ...
Deception. It is not a defense to a paternity suit that before the parties had sexual relations the woman told the man, falsely, that there was no danger of pregnancy b/c she was taking birth control pills, even if the guy offered to pay all abortion expenses. The paternity suit is for the benefit of the child (b/c it is tied to chid support).The dad has no constitutional right to avoid child support obligation.
Deception. ‌ How may arti cial agents deceive? Deconstructing this \ how may" question, I hereby explain in this section the meanings of its subject and predicate. In the next section, I explain the semantics of this “how may” question, given the meanings of its two components. The subject, namely artificial agents, refers to the concept of autonomous agents, which means intelligent software entities that have the capabil- ity of making decisions in order to act upon their world based on their representation of their world, e.g., a social context, a situation, or a physical, virtual or hybrid en- vironment i. The meaning of the subject is pretty much directly derived from the academic context, that is the one of MAS, from which this thesis has emerged. On a conceptual level, the idea of an agent that interacts with the system it finds itself in is grounded in the enactivist perspective of cognition. Enactivism had become popular due to its, what I dare to call, “instantiation” through the embod- ied cognition movement. Embodied cognition is the view that “Many features of cognition are embodied in that they are deeply dependent upon characteristics of the physical body of an agent, such that the agent’s beyond-the-brain body plays a significant causal role, or a physically constitutive role, in that agent’s cognitive pro- cessing” [295]. The MAS perspective is much more abstract and general than that of embodied cognition, and I would say much more encompassing because (i) it does not ontologically discriminate between different agents’ properties of embodiment, and (ii) it aims to represent not only the relation of a single agent with its system, but also the relation between multiple agents inside the same system. In MAS, an agent’s embodied properties, as well as the properties of the environment, and the ways in which that agent can act and what it can reason about, are defined through software programming. This is because MAS is based on the principles of compu- iExamples of hybrid environment would be the internet, the internet-of-things (IoT), virtual- reality (VR) games, or augmented reality (AR) environment, in which humans agents can interact with arti cial agents. tationalism. Therefore, we can say that MAS is not just a form or instantiation of the enactivist perspective, but it is the actual advancement of this perspective in Computer Science, or even a re-definition of the philosophical concept of enactivism through the application of computational scie...

Related to Deception

  • DEFAMATION The Parties covenant and agree that in no event, and at no time during the Term or at any time thereafter, shall either of them disparage, denigrate, slander, libel or otherwise defame the other or the other’s businesses, services, properties or assets, or employees, personnel, agents, or representatives.

  • Behaviour No obscene or insulting language or disorderly behaviour shall be permitted. This includes any form of entertainment that may be considered lewd or inappropriate for a public place or that may offend or cause embarrassment to others.

  • Perception An action or behaviour can become harassment if the receiver perceives it as such, regardless of the intentions of the initiator.

  • Offences 46.1. The Contractor must not commit or attempt to commit any offence:

  • COUNTERFEIT WORK (a) The following definitions apply to this clause:

  • Abuse You agree to immediately notify us if you suspect fraudulent or abusive activity. If you so notify us, or we otherwise suspect fraudulent or abusive activity, you agree to cooperate with us in any fraud investigation and to use any fraud prevention measures we prescribe. Your failure to cooperate or to use such measures will result in your liability for all fraudulent usage or abusive activity associated with your Equipment (as defined below).

  • SEXUAL EXPLOITATION 22.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind.

  • Harassment The Employer and the Union recognize the right of employees to work in an environment free from harassment, including sexual harassment, as defined by the Employer’s harassment policy.

  • Collusive practices We hereby certify and confirm that the tender is genuine, non-collusive and made with the intention of accepting the contract if awarded. To this effect we have signed the “Certificate of Independent tender Determination” attached below.

  • Assault Any case of assault upon a teacher which occurs in the line of duty shall promptly be 20 rights and obligations with respect to such assault, and its legal assistance to the teacher in 21 connection with handling of the incident by law enforcement and judicial authorities. In such 22 event, the following shall apply:

Time is Money Join Law Insider Premium to draft better contracts faster.