We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Deception Sample Clauses

Deception. Each experiment will inform subjects about the decisions they can make, and how these decisions will affect their payment for the experiment. This information will always be true. Specifically, if a standard economics experiment informs subjects that "if you take action A, then X will happen", then X will happen after the subject takes action A.
DeceptionThe protocol is designed to withhold complete information when consent is obtained. Identities of individual subjects are kept by the investigator. If subjects' identities are inseparable from data, then data is directly identifiable. If subjects' identities are kept separate from data, with information connecting them maintained by codes and a master list, then data is indirectly identifiable. In either case, the investigator must assure that confidentiality will be maintained, and must explain how subjects' identities will be protected. Direct identifiers: Direct identifiers in research data or records include names; postal address information ( other than town or city, state and zip code); telephone numbers, fax numbers, e-mail addresses; social security numbers; medical record numbers; health plan beneficiary numbers; account numbers; certificate /license numbers; vehicle identifiers and serial numbers, including license plant numbers; device identifiers and serial numbers; web universal resource locators ( URLs); internet protocol (IP) address numbers; biometric identifiers, including finger and voice prints; and full face photographic images and any comparable images. Identifiable data or records: contains information that reveals or can likely associate with the identity of the person or persons to whom the data or records pertain. Research data or records with direct identifiers removed, but which retain indirect identifiers, are still considered identifiable. In-direct identifiers: Indirect identifiers in research data or records include all geographic identifiers smaller than a state , including street address, city, county, precinct, Zip code, and their equivalent postal codes, except for the initial three digits of a ZIP code; all elements of dates ( except year ) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates ( including year) indicative of such age, except that such age and elements may be aggregated into a single category of age 90 or older. Research conducted in established or commonly accepted educational settings, involving normal educational practices, such as (i) research on regular and special education instructional strategies, or (ii) research on the effectiveness of or the comparison among instructional techniques, curricula, or classroom management method. The Common Rule codified in 45 CFR 46.101(b) specifies that rese...
Deception. ‌ How may arti cial agents deceive? Deconstructing this \ how may" question, I hereby explain in this section the meanings of its subject and predicate. In the next section, I explain the semantics of this “how may” question, given the meanings of its two components. The subject, namely artificial agents, refers to the concept of autonomous agents, which means intelligent software entities that have the capabil- ity of making decisions in order to act upon their world based on their representation of their world, e.g., a social context, a situation, or a physical, virtual or hybrid en- vironment i. The meaning of the subject is pretty much directly derived from the academic context, that is the one of MAS, from which this thesis has emerged. On a conceptual level, the idea of an agent that interacts with the system it finds itself in is grounded in the enactivist perspective of cognition. Enactivism had become popular due to its, what I dare to call, “instantiation” through the embod- ied cognition movement. Embodied cognition is the view that “Many features of cognition are embodied in that they are deeply dependent upon characteristics of the physical body of an agent, such that the agent’s beyond-the-brain body plays a significant causal role, or a physically constitutive role, in that agent’s cognitive pro- cessing” [295]. The MAS perspective is much more abstract and general than that of embodied cognition, and I would say much more encompassing because (i) it does not ontologically discriminate between different agents’ properties of embodiment, and (ii) it aims to represent not only the relation of a single agent with its system, but also the relation between multiple agents inside the same system. In MAS, an agent’s embodied properties, as well as the properties of the environment, and the ways in which that agent can act and what it can reason about, are defined through software programming. This is because MAS is based on the principles of compu- iExamples of hybrid environment would be the internet, the internet-of-things (IoT), virtual- reality (VR) games, or augmented reality (AR) environment, in which humans agents can interact with arti cial agents. tationalism. Therefore, we can say that MAS is not just a form or instantiation of the enactivist perspective, but it is the actual advancement of this perspective in Computer Science, or even a re-definition of the philosophical concept of enactivism through the application of computational scie...
Deception. It is not a defense to a paternity suit that before the parties had sexual relations the woman told the man, falsely, that there was no danger of pregnancy b/c she was taking birth control pills, even if the guy offered to pay all abortion expenses. The paternity suit is for the benefit of the child (b/c it is tied to chid support).The dad has no constitutional right to avoid child support obligation.

Related to Deception

  • Behaviour No obscene or insulting language or disorderly behaviour shall be permitted. This includes any form of entertainment that may be considered lewd or inappropriate for a public place or that may offend or cause embarrassment to others.

  • Offences 46.1. The Contractor must not commit or attempt to commit any offence: 46.1.1. under the Xxxxxxx Xxx 0000; 46.1.2. of fraud, uttering, or embezzlement at common law; or 46.1.3. of any other kind referred to in regulation 58(1) of the Public Contracts (Scotland) Regulations 2015. 46.2. Breach of clause 46.1 is a material breach for the purposes of clause 42 (Termination Rights).

  • COUNTERFEIT WORK (a) The following definitions apply to this clause:

  • Abuse You agree to immediately notify us if you suspect fraudulent or abusive activity. If you so notify us, or we otherwise suspect fraudulent or abusive activity, you agree to cooperate with us in any fraud investigation and to use any fraud prevention measures we prescribe. Your failure to cooperate or to use such measures will result in your liability for all fraudulent usage or abusive activity associated with your Equipment (as defined below).

  • SEXUAL EXPLOITATION 18.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind. 18.2 UNDP shall not apply the foregoing standard relating to age in any case in which the Contractor’s personnel or any other person who may be engaged by the Contractor to perform any services under the Contract is married to the person less than the age of eighteen years with whom sexual activity has occurred and in which such marriage is recognized as valid under the laws of the country of citizenship of such Contractor’s personnel or such other person who may be engaged by the Contractor to perform any services under the Contract.

  • Harassment The Employer and the Union recognize the right of employees to work in an environment free from harassment, including sexual harassment, as defined by the Employer’s harassment policy.

  • Assault the Employee refusing to carry out a lawful and reasonable instruction that is consistent with the Employee’s contract of employment.

  • Behavior Students must respect each other.

  • Abuse, Neglect, Exploitation Grantee will; a. take all steps necessary, to protect the health, safety and welfare of its clients and participants. b. develop and implement written policies and procedures for abuse, neglect and exploitation. c. notify appropriate authorities of any allegations of abuse, neglect, or exploitation as required by 25 TAC § 448.703.

  • Dishonesty Drinking alcoholic beverages on the job, or reporting for work while intoxicated.