Deception in Humans Sample Clauses

Deception in Humans. ‌ It is reasonable to say that a meaningful MAS approach for studying deception should be based on or derived from relevant knowledge that we have on human de- ception. If in the previous chapter I have answered the questions What is deception? and What is machine deception?, then in this section I will try to answer the ques- tions How do humans deceive?, How do we know when and if humans are deceiving? and When and why do humans deceive?. In this section we will discuss some of the relevant methodologies and research in Psychology that have been to address different aspects of human deception. This is research that I will consistently refer back to later in the thesis. First, I will discuss a well-known methodology in Intelligence Analysis, namely Xxxxxxxx Xxxxx’s Analysis of Competing Hypotheses (ACH) [122, 123], as well as more recent derivations of ACH that have been designed to address some of ACH’s limitations. Second, I will discuss what are the limitations of cue-based approaches to human deception. Based on the prevalence of these limitations, I have decided not to use them for the modelling of deceptive machines. Both ACH and cue-based approaches to deception detection have their limita- tions. These limitations are either due to the complexity of the methodology and oversight of representations that are used to establish what causes deception in the case of ACH, or due to the over-reliance on cues that indicate the presence of de- ception in the case of cue-based approaches, an over-reliance which leads to strong bias in deception detection and deception understanding. Finally, I will discuss three major theories of human deception from Commu- nication Theory that I use as a conceptual basis to model deception in this the- sis: Interpersonal Deception Theory (IDT) [38], Information Manipulation Theory 2 (IMT2) [172], and Truth-Default Theory (TDT) [153]. These three theories focus on deception in humans by trying to outline general rules or principles of how decep- tive interactions play out. Understanding the mechanics of human deception allows one to reproduce these types of interactions artificially by designing reasoning and communication protocols for artificial agents as well as designing the components of MASs where these interactions take place.
AutoNDA by SimpleDocs

Related to Deception in Humans

  • Personal Appearance All teachers shall maintain dress, grooming and personal appearance consistent with their area of teaching.

  • Abuse, Neglect, Exploitation Grantee will; a. take all steps necessary, to protect the health, safety and welfare of its clients and participants. b. develop and implement written policies and procedures for abuse, neglect and exploitation. c. notify appropriate authorities of any allegations of abuse, neglect, or exploitation as required by 25 TAC § 448.703.

  • Abuse You agree to immediately notify us if you suspect fraudulent or abusive activity. If you so notify us, or we otherwise suspect fraudulent or abusive activity, you agree to cooperate with us in any fraud investigation and to use any fraud prevention measures we prescribe. Your failure to cooperate or to use such measures will result in your liability for all fraudulent usage or abusive activity associated with your Equipment (as defined below).

  • Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.

  • Personal Harassment Harassment means engaging in a course of vexatious comment or conduct that is known or ought reasonably to be known to be unwelcome. Harassment can be either psychological or physical or it can be a combination of both. It is any behaviour, whether deliberate or negligent, which denies individuals their dignity and respect, is offensive, embarrassing or humiliating to the individual and adversely affects the working environment.

  • Screening After you sign and date the consent document, you will begin screening. The purpose of the screening is to find out if you meet all of the requirements to take part in the study. Procedures that will be completed during the study (including screening) are described below. If you do not meet the requirements, you will not be able to take part in the study. The study investigator or study staff will explain why. As part of screening, you must complete all of the items listed below: • Give your race, age, gender, and ethnicity • Give your medical history o You must review and confirm the information in your medical history questionnaire • Give your drug, alcohol, and tobacco use history • Give your past and current medication and treatment history. This includes any over-the-counter or prescription drugs, such as vitamins, dietary supplements, or herbal supplements, taken in the past 28 days • Height and weight will be measured • Physical exam will be done • Electrocardiogram (ECG) will be collected. An ECG measures the electrical activity of the heart • You may be tested for COVID-19 o Blood tests for human immunodeficiency virus (HIV), hepatitis B, and hepatitis C o Blood tests to see how your blood clots ▪ Fibrinogen ▪ PT/INR/aPTT o Blood tests for amylase and lipase (enzymes that help with digestion, Part B only) o Blood tests for a lipid (fats) panel (Part B only) ▪ Total cholesterol ▪ Triglycerides ▪ HDL ▪ Direct HDL o Blood tests to check your thyroid function (Part B and Part C only) ▪ TSH ▪ Free T4 o Urine to test for drugs of abuse (illegal and prescription) o Urine tests to check your albumin/ creatinine ratio o Females who have not had a period for at least 12 months in a row will have a blood hormone test to confirm they cannot have children • The study investigator may decide to do an alcohol breath test • The use of proper birth control will be reviewed (males only) • You will be asked “How do you feel?” HIV, hepatitis B, and hepatitis C will be tested at screening. If anyone is exposed to your blood during the study, you will have these tests done again. If you have a positive test, you cannot be in or remain in the study. HIV is the virus that causes acquired immunodeficiency syndrome (AIDS). If your HIV test is positive, you will be told about the results. It may take weeks or months after being infected with HIV for the test to be positive. The HIV test is not always right. Having certain infections or positive test results may have to be reported to the State Department of Health. This includes results for HIV, hepatitis, and other infections. If you have any questions about what information is required to be reported, please ask the study investigator or study staff. Although this testing is meant to be private, complete privacy cannot be guaranteed. For example, it is possible for a court of law to get health or study records without your permission.

  • Noncollusion I certify that the Contractor submitting this bid has not, either directly or indirectly, entered into any agreement, participated in any collusion, or otherwise taken any action, in restraint of free competitive bidding in connection with the submitted bid. HISTORY OF DEBARMENT I certify that, except as noted below, the Contractor submitting this bid and any person associated with this Contractor in the capacity of owner, partner, director, officer, principal, investigator, project director, manager, auditor, or any position involving the administration of federal funds:

  • Progressive Discipline Both parties endorse the principle of progressive discipline as applied to professionals.

  • SEXUAL EXPLOITATION 18.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind. 18.2 UNDP shall not apply the foregoing standard relating to age in any case in which the Contractor’s personnel or any other person who may be engaged by the Contractor to perform any services under the Contract is married to the person less than the age of eighteen years with whom sexual activity has occurred and in which such marriage is recognized as valid under the laws of the country of citizenship of such Contractor’s personnel or such other person who may be engaged by the Contractor to perform any services under the Contract.

  • Personal Freedom 20.1 The personal life of an Employee is not an appropriate concern for the attention of the Board except as it may directly inhibit the Employee from performing properly his/her assigned functions during the workday.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!