Results for 'Theft detection and deterrence'

992 found
Order:
  1.  22
    A Family Affair: A Case of Altruism or Aggrandizement? [REVIEW]David P. Boyd, Jay A. Halfond, Peder C. Johnson & Timm L. Kainen - 2013 - Journal of Business Ethics 113 (1):157-161.
    The case recounts an incident of theft at a CEOs home during a company party. The rogue may well be an employee, and the CEO considers his options: should he let the matter pass and preserve the good will generated by the party, or should he stand on principle and engage the issue frontally? Three commentators provide perspective on an optimal response. They consider whether the CEOs true intent is to show appreciation or showcase opulence. In addition, the aberrant (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  23
    Plagiarism, Beyond CrossCheck, Figure and Conceptual Theft.Viroj Wiwanitkit - 2014 - Science and Engineering Ethics 20 (2):613-614.
    Sir, The recent report by Zhang et al. (2013) is very interesting. For sure, using CrossCheck might help identify some plagiarisms, especially for those with verbatim copy. However, the plagiarism can be seen in other forms including to figure and conceptual plagiarism (Wiwanitkit 2008, 2011). The figure plagiarism is a challenging thing for the journal since it is more difficult to detect than textual plagiarism (Wiwanitkit 2011). In addition, there are also more difficult cases of figure plagiarisms to be discussed. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  6
    Social Mechanisms in Norm-relevant Situations: Explanations for Theft by Finding in High-cost, and Low-cost Situation.Stefanie Eifier - 2016 - Analyse & Kritik 38 (1):91-120.
    At the centre of this study is the theoretical and empirical analysis of action-formation mechanisms in norm-relevant, situations. Basically two mechanisms are employed, namely action according to a) moral principles and b) the principle of deterrence. Conflicting assumptions concerning the way these mechanisms work are deduced from two theoretical perspectives, the high-cost/low-cost. hypothesis and Situational Action Theory (SAT). While the high-cost/low-cost. hypothesis leads to the assumption that, criminal action is explained by the principle of deterrence in high-cost, situations (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  87
    Attentional state: From automatic detection to willful focused concentration.Andrew And Alexander Fingelkurts - 2015 - In G. Marchetti, G. Benedetti & A. Alharbi (eds.), Attantion and Meaning. The Attentional Basis of Meaning. Nova Science Publishers. pp. 133-150.
    Despite the fact that attention is a core property of all perceptual and cognitive operations, our understanding of its neurophysiological mechanisms is far from complete. There are many theoretical models that try to fill this gap in knowledge, though practically all of them concentrate only on either involuntary (bottom-up) or voluntarily (top-down) aspect of attention. At the same time, both aspects of attention are rather integrated in the living brain. In this chapter we attempt to conceptualise both aspects of attentional (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. First impressions count: serious detections arising from criminal justice samples.Michael Townsley, Chloe Smith & Ken Pease - 2006 - Genomics, Society and Policy 2 (1):28-40.
    DNA samples on the England and Wales national database matching those found at scenes of serious violent or sexual crimes were identified. The earlier offence leading the sample to appear on the database was noted. The bulk involved theft, drug or other offending. The result, indicating offender versatility, is consistent with most research on criminal careers. Its importance for operational police lies in identifying the contribution made by DNA samples taken after less serious offences in clearing subsequent serious crime, (...)
     
    Export citation  
     
    Bookmark  
  6.  18
    Attentional State : From Automatic Detection to Willful Focused Concentration.Andrew And Alexander Fingelkurts - 2015 - In Giorgio Marchetti, Giulio Benedetti & Ahlam Alharbi (eds.), Attention and Meaning. The Attentional Basis of Meaning. Nova Science Publishers. pp. 133-150.
    Despite the fact that attention is a core property of all perceptual and cognitive operations, our understanding of its neurophysiological mechanisms is far from complete. There are many theoretical models that try to fill this gap in knowledge, though practically all of them concentrate only on either involuntary (bottom-up) or voluntarily (top-down) aspect of attention. At the same time, both aspects of attention are rather integrated in the living brain. In this chapter we attempt to conceptualise both aspects of attentional (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  13
    A machine learning approach to detecting fraudulent job types.Marcel Naudé, Kolawole John Adebayo & Rohan Nanda - 2023 - AI and Society 38 (2):1013-1024.
    Job seekers find themselves increasingly duped and misled by fraudulent job advertisements, posing a threat to their privacy, security and well-being. There is a clear need for solutions that can protect innocent job seekers. Existing approaches to detecting fraudulent jobs do not scale well, function like a black-box, and lack interpretability, which is essential to guide applicants’ decision-making. Moreover, commonly used lexical features may be insufficient as the representation does not capture contextual semantics of the underlying document. Hence, this paper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  7
    Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors.Jin Ree Lee & Thomas J. Holt - 2020 - Frontiers in Psychology 11.
    Research on delinquency reduction often highlights the importance of identifying and sanctioning antisocial and illegal activities so as to reduce the likelihood of future offending. The rise of digital technology complicates the process of detecting cybercrimes and technology enabled offenses, as individuals can use devices from anywhere to engage in various harmful activities that may appear benign to an observer. Despite the growth of cybercrime research, limited studies have examined the extent to which technology enabled offenses are detected, or the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. The Butter Battle Book and Deterrence and Escalation.Sam J. Tangredi - 2024 - In Montgomery McFate (ed.), Dr. Seuss and the art of war: secret military lessons. Lanham: Rowman & Littlefield.
     
    Export citation  
     
    Bookmark  
  10.  16
    Canadian securities regulation and foreign blocking legislation.Andrew Gray & Graeme Hamilton - 2010 - International Journal of Business Governance and Ethics 5 (1/2):87.
    Knowing who benefits financially from a securities trade is necessary for the detection, prosecution and deterrence of illegal securities trading. Foreign jurisdictions with banking or securities secrecy laws are frequently used as a platform for illegal activity to frustrate law enforcement. This paper considers the extent to which Canadian law gives effect to so-called foreign blocking legislation. We conclude that while Canadian law does not generally give effect to foreign blocking legislation, it imposes only limited requirements on market (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  41
    Morality and deterrence.Robert W. Tucker - 1985 - Ethics 95 (3):461-478.
  12.  21
    “I’m not an investigator and I’m not a police officer" - a faculty’s view on academic integrity in an undergraduate nursing degree.Lucie M. Ramjan, Paul Glew, Yenna Salamonson & Joan Lynch - 2021 - International Journal for Educational Integrity 17 (1).
    In nursing, expectations of honesty and integrity are clearly stipulated throughout professional standards and codes of conduct, thus the concept of academic integrity has even more impetus in preparing students for graduate practice. However, a disparity between policy and practice misses the opportunity to instil the principles of academic integrity, and at its core honesty, a pivotal trait in the nursing profession. This study draws upon the experience of the nursing faculty to explore how academic integrity policy of deterrence (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Deontology and deterrence for free will deniers.Benjamin Vilhauer - 2019 - In Elizabeth Shaw, Derk Pereboom & Gregg D. Caruso (eds.), Free Will Skepticism in Law and Society: Challenging Retributive Justice. Cambridge University Press.
  14.  11
    Theft, Law and Society.Jerome Hall - 1937 - International Journal of Ethics 47 (3):390-393.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  1
    Theft, Law and Society. Jerome Hall.Malcolm Sharp - 1937 - International Journal of Ethics 47 (3):390-393.
  16.  11
    Concept systems and frames: Detecting and managing terminological gaps between languages.Rossella Resi - 2024 - Applied ontology 19 (1):47-71.
    This paper examines the concept of “terminological gaps” and strives to identify suitable methods for dealing with them during translation. The analysis begins with an investigation of the contended notion of gaps in terminology based on empirical examples drawn from a German-Italian terminological database specifically designed for translation purposes. Two macro categories of gaps are identified, conceptual and linguistic level gaps, which only partially correspond to previous observations in the literature. The paper uses examples to explore the advantages of ontological (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  14
    Detecting and explaining unfairness in consumer contracts through memory networks.Federico Ruggeri, Francesca Lagioia, Marco Lippi & Paolo Torroni - 2021 - Artificial Intelligence and Law 30 (1):59-92.
    Recent work has demonstrated how data-driven AI methods can leverage consumer protection by supporting the automated analysis of legal documents. However, a shortcoming of data-driven approaches is poor explainability. We posit that in this domain useful explanations of classifier outcomes can be provided by resorting to legal rationales. We thus consider several configurations of memory-augmented neural networks where rationales are given a special role in the modeling of context knowledge. Our results show that rationales not only contribute to improve the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  18.  19
    The Biological Roots of Music and Dance.Edward H. Hagen - 2022 - Human Nature 33 (3):261-279.
    After they diverged from panins, hominins evolved an increasingly committed terrestrial lifestyle in open habitats that exposed them to increased predation pressure from Africa’s formidable predator guild. In the Pleistocene, _Homo_ transitioned to a more carnivorous lifestyle that would have further increased predation pressure. An effective defense against predators would have required a high degree of cooperation by the smaller and slower hominins. It is in the interest of predator and potential prey to avoid encounters that will be costly for (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  6
    Independence and Deterrence. Britain and Atomic Energy 1945-1952. Volume I: Policy MakingMargaret Gowing Lorna Arnold.Lawrence Badash - 1978 - Isis 69 (2):314-315.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  21
    Conflict detection and social perception: bringing meta-reasoning and social cognition together.André Mata - 2019 - Thinking and Reasoning 26 (1):140-149.
    Research on implicit conflict detection suggests that people are sensitive to violations of logical principles. When they make reasoning errors, their epistemic radar presumably detects an anomaly....
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  44
    Retribution and deterrence in the moral judgments of common sense.F. C. Sharp & M. C. Otto - 1910 - International Journal of Ethics 20 (4):438-453.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22.  10
    Retribution and Deterrence in the Moral Judgments of Common Sense.F. C. Sharp & M. C. Otto - 1909 - International Journal of Ethics 20 (4):438.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  16
    Retribution and Deterrence in the Moral Judgments of Common Sense.F. C. Sharp & M. C. Otto - 1910 - International Journal of Ethics 20 (4):438-453.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  17
    Detection and recognition.David M. Green & Theodore G. Birdsall - 1978 - Psychological Review 85 (3):192-206.
  25.  4
    Detecting and Quantifying Mind Wandering during Simulated Driving.Carryl L. Baldwin, Daniel M. Roberts, Daniela Barragan, John D. Lee, Neil Lerner & James S. Higgins - 2017 - Frontiers in Human Neuroscience 11.
  26.  11
    Detection and Adaptive Video Processing of Hyperopia Scene in Sports Video.Qingjie Chen & Minkai Dong - 2021 - Complexity 2021:1-13.
    In the research of motion video, the existing target detection methods are susceptible to changes in the motion video scene and cannot accurately detect the motion state of the target. Moving target detection technology is an important branch of computer vision technology. Its function is to implement real-time monitoring, real-time video capture, and detection of objects in the target area and store information that users are interested in as an important basis for exercise. This article focuses on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  37
    Heartbeat detection and the experience of emotions.Stefan Wiens, Elizabeth S. Mezzacappa & Edward S. Katkin - 2000 - Cognition and Emotion 14 (3):417-427.
  28.  18
    Euthanasia and palliative care in pulmonology.Е.В Яковлева & Е.А Бородулина - 2022 - Bioethics 15 (1):58-62.
    Currently, euthanasia is officially allowed only in a number of countries, in most countries, as well as in the Russian Federation, it is prohibited by law. However, in clinical practice, there are a large number of incurable patients who experience intractable pain, so the problem of euthanasia is relevant. Aim: to analyze the current state of the problem of euthanasia and palliative care in pulmonology. Material and methods: review of domestic and foreign literature on the problem of euthanasia over the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Detection and recognition.R. Duncan Luce - 1963 - In D. Luce (ed.), Handbook of Mathematical Psychology. John Wiley & Sons.. pp. 1--103.
     
    Export citation  
     
    Bookmark   28 citations  
  30.  4
    Students’ perceptions of plagiarism and relevant policies in Cyprus.Melpo Iakovidou, Catherine Demoliou & Angelika I. Kokkinaki - 2015 - International Journal for Educational Integrity 11 (1).
    BackgroundEffective plagiarism deterrence in the Republic of Cyprus, requires the identification of any gaps, best practices and case studies relating to plagiarism across the Higher Educational Institutions in the country. This paper discusses the findings of the first research conducted among university students and faculty in Cyprus and focuses on students’ awareness of and perceptions towards academic plagiarism.MethodologyThe research instrument for students was initially designed based on experts’ feedback, as part of the IPPHEAE project. It was translated into the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  11
    Detecting and Visualizing the Communities of Innovation in Beijing-Tianjin-Hebei Urban Agglomeration Based on the Patent Cooperation Network.Fang Zhou & Bo Zhang - 2021 - Complexity 2021:1-14.
    For a deep understanding of Beijing-Tianjin-Hebei collaborative innovation, we detected and visualized the communities of innovation in BTH Urban Agglomeration based on the patent cooperation network. China Patent Database was connected with Business Registration Database and the Tianyan Check to achieve the geographical information of organizational innovators. Spinglass algorithm was applied and ultimately 12 communities of innovation were detected. Based on the different structure characteristics, we further clustered the 12 communities into four typical structures that are hierarchical, single-center, polycentric, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  11
    Flood Detection and Susceptibility Mapping Using Sentinel-1 Time Series, Alternating Decision Trees, and Bag-ADTree Models.Ayub Mohammadi, Khalil Valizadeh Kamran, Sadra Karimzadeh, Himan Shahabi & Nadhir Al-Ansari - 2020 - Complexity 2020:1-21.
    Flooding is one of the most damaging natural hazards globally. During the past three years, floods have claimed hundreds of lives and millions of dollars of damage in Iran. In this study, we detected flood locations and mapped areas susceptible to floods using time series satellite data analysis as well as a new model of bagging ensemble-based alternating decision trees, namely, bag-ADTree. We used Sentinel-1 data for flood detection and time series analysis. We employed twelve conditioning parameters of elevation, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  26
    A structured review and theme analysis of financial frauds in the banking industry.Pallavi Sood & Puneet Bhushan - 2020 - Asian Journal of Business Ethics 9 (2):305-321.
    Organizations of all types are vulnerable to frauds. Banks contribute to a significant extent in a country’s economic development by generating a large part of revenue in the service sector. Deterrence of fraud is impossible without understanding it. The present study attempts to extract themes by highlighting the major areas of the bank fraud literature within a specific time frame of 2000–2019 and finding the research gaps citing the future scope for research. Post the review of existing literature, using (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  63
    Methods of cheating and deterrents to classroom cheating: An international study.Richard A. Bernardi, Ania V. Baca, Kristen S. Landers & Michael B. Witek - 2008 - Ethics and Behavior 18 (4):373 – 391.
    This study examines the methods students use to cheat on class examinations and suggests ways of deterring using an international sample from Australia, China, Ireland, and the United States. We also examine the level of cheating and reasons for cheating that prior research has highlighted as a method of demonstrating that our sample is equivalent to those in prior studies. Our results confirm the results of prior research that primarily employs students from the United States. The data indicate that actions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  35.  4
    Detection and Recognition of Asynchronous Auditory/Visual Speech: Effects of Age, Hearing Loss, and Talker Accent.Sandra Gordon-Salant, Maya S. Schwartz, Kelsey A. Oppler & Grace H. Yeni-Komshian - 2022 - Frontiers in Psychology 12.
    This investigation examined age-related differences in auditory-visual integration as reflected on perceptual judgments of temporally misaligned AV English sentences spoken by native English and native Spanish talkers. In the detection task, it was expected that slowed auditory temporal processing of older participants, relative to younger participants, would be manifest as a shift in the range over which participants would judge asynchronous stimuli as synchronous. The older participants were also expected to exhibit greater declines in speech recognition for asynchronous AV (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. On Detection and Attribution.H. von Storch - 2014 - Constructivist Foundations 10 (1):131-132.
    Open peer commentary on the article “On Climate Change Research, the Crisis of Science and Second-order Science” by Philipp Aufenvenne, Heike Egner & Kirsten von Elverfeldt. Upshot: I discuss the concepts of detection and attribution as they are used in scientific discussions about the cause of global warming.
     
    Export citation  
     
    Bookmark  
  37. The detection and generation of sequences as a key to cerebellar function: Experiments and theory.Valentino Braitenberg, Detlef Heck & Fahad Sultan - 1997 - Behavioral and Brain Sciences 20 (2):229-245.
    Starting from macroscopic and microscopic facts of cerebellar histology, we propose a new functional interpretation that may elucidate the role of the cerebellum in movement control. The idea is that the cerebellum is a large collection of individual lines (Eccles's : Eccles et al. 1967a) that respond specifically to certain sequences of events in the input and in turn produce sequences of signals in the output. We believe that the sequence-in/sequence-out mode of operation is as typical for the cerebellar cortex (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  38.  23
    Visual detection and visual imagery.M. J. Peterson & S. E. Graham - 1974 - Journal of Experimental Psychology 103 (3):509.
  39.  60
    Crime detection and criminal identification in India using data mining techniques.Devendra Kumar Tayal, Arti Jain, Surbhi Arora, Surbhi Agarwal, Tushar Gupta & Nikhil Tyagi - 2015 - AI and Society 30 (1):117-127.
  40.  10
    Editorial: Detection and Estimation of Working Memory States and Cognitive Functions Based on Neurophysiological Measures.Felix Putze, Christian Mühl, Fabien Lotte, Stephen Fairclough & Christian Herff - 2018 - Frontiers in Human Neuroscience 12:426802.
  41.  44
    Two treatises of government: in the former, the false principles and foundation of Sir Robert Filmer, and his followers are detected and overthrown; the latter is an essay concerning the true original, extent, and end of civil-government.John Locke - 1698 - Clark, N.J.: Lawbook Exchange.
    ... i . La very is so vile and miserable an Estate of Man,and so directly opposite to the generous Temper and Courage of our Nation ; that 'tis hardly to be ...
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  42.  57
    True Detective and Philosophy.Tom Sparrow & Jacob Graham (eds.) - 2017 - New York: Wiley.
    Investigating the trail of philosophical leads in HBO’s chilling True Detective series, an elite team of philosophers examine far-reaching riddles including human pessimism, Rust’s anti-natalism, the problem of evil, and the ‘flat circle’.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  65
    Depiction, Detection, and the Epistemic Value of Photography.Laura Perini - 2012 - Journal of Aesthetics and Art Criticism 70 (1):151-160.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Kantianism, Consequentialism and Deterrence.Steven Sverdlik - 2019 - In Christian Seidel (ed.), Consequentialism: New Directions, New Problems? Oxford: Oxford University Press. pp. 237-57.
    It is often argued that Kantian and consequentialist approaches to the philosophy of punishment differ on the question of whether using punishment to achieve deterrence is morally acceptable. I show that this is false: both theories judge it to be acceptable. Showing this requires attention to what the Formula of Humanity in Kant requires agents to do. If we use the correct interpretation of this formula we can also see that an anti-consequentialist moral principle used by Victor Tadros to (...)
     
    Export citation  
     
    Bookmark   1 citation  
  45.  9
    Detecting and prosecuting contract cheating with evidence – a “Doping Test” approach.Pauli Alin - 2020 - International Journal for Educational Integrity 16 (1).
    Contract cheating – outsourcing student assignments for a fee – presents a growing threat to the integrity of higher education. As contract cheating is based on students purchasing assignments that are original, traditional plagiarism detection tools remain insufficient to detect contract cheating. Part of the problem is that proving contract cheating is difficult. As a result, instructors may find it hard to prosecute students. To help address the problem, this conceptual paper builds upon extant scholarship on contract cheating and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  13
    Who detects and why: how do individual differences in cognitive characteristics underpin different types of responses to reasoning tasks?Nikola Erceg, Zvonimir Galić, Andreja Bubić & Dino Jelić - 2023 - Thinking and Reasoning 29 (4):594-642.
    One of the most famous problems in the decision-making literature is the “bat and a ball” problem from the cognitive reflection test (CRT; Frederick, 2005). The problem goes as follows: „A bat and...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  46
    Identity Theft: Doubles and Masquerades in Cassius Dio's Contemporary History.Maud Gleason - 2011 - Classical Antiquity 30 (1):33-86.
    The contemporary books of Cassius Dio's Roman History are known for their anecdotal quality and lack of interpretive sophistication. This paper aims to recuperate another layer of meaning for Dio's anecdotes by examining episodes in his contemporary books that feature masquerades and impersonation. It suggests that these themes owe their prominence to political conditions in Dio's lifetime, particularly the revival, after a hundred-year lapse, of usurpation and damnatio memoriae, practices that rendered personal identity problematic. The central claim is that narratives (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  13
    Signal detection and threshold modeling of confidence-rating ROCs: A critical test with minimal assumptions.David Kellen & Karl Christoph Klauer - 2015 - Psychological Review 122 (3):542-557.
  49.  17
    Detection and nudge-intervention on sensitive information in social networks.J. Alemany, V. Botti-Cebriá, E. Del Val & A. García-Fornes - 2022 - Logic Journal of the IGPL 30 (6):942-953.
    Detecting sensitive information considering privacy is a relevant issue on Online Social Networks (OSNs). It is often difficult for users to manage the privacy associated with their posts on social networks taking into account all the possible consequences. The aim of this work is to provide information about the sensitivity of the content of a publication when a user is going to share it in OSN. For this purpose, we developed a privacy-assistant agent that detects sensitive information. Based on this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  5
    Detecting and Preventing Defensive Reactions Toward Persuasive Information on Fruit and Vegetable Consumption Using Induced Eye Movements.Arie Dijkstra & Sarah P. Elbert - 2021 - Frontiers in Psychology 11.
    Objective: Persuasive messages regarding fruit and vegetable consumption often meet defensive reactions from recipients, which may lower message effectiveness. Individual differences in emotion regulation and gender are expected to predict these reactions. In the working memory account of persuasion, inducing voluntary eye movements during the processing of the auditory persuasive information might prevent defensiveness and thereby increase message effectiveness.Methods: Participants in two independently recruited samples from the general population listened to a negatively framed auditory persuasive message advocating fruit and vegetable (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 992