InDeceit on the Road to War, John M. Schuessler examines how U.S. presidents have deceived the American public about fundamental decisions of war and peace. Deception has been deliberate, he ...suggests, as presidents have sought to shift blame for war onto others in some cases and oversell its benefits in others. Such deceit is a natural outgrowth of the democratic process, in Schuessler's view, because elected leaders have powerful incentives to maximize domestic support for war and retain considerable ability to manipulate domestic audiences. They can exploit information and propaganda advantages to frame issues in misleading ways, cherry-pick supporting evidence, suppress damaging revelations, and otherwise skew the public debate to their benefit. These tactics are particularly effective before the outbreak of war, when the information gap between leaders and the public is greatest.When resorting to deception, leaders take a calculated risk that the outcome of war will be favorable, expecting the public to adopt a forgiving attitude after victory is secured. The three cases featured in the book-Franklin Roosevelt and World War II, Lyndon Johnson and the Vietnam War, and George W. Bush and the Iraq War-test these claims. Schuessler concludes that democracies are not as constrained in their ability to go to war as we might believe and that deception cannot be ruled out in all cases as contrary to the national interest.
InDeceit on the Road to War, John M. Schuessler examines how U.S. presidents have deceived the American public about fundamental decisions of war and peace. Deception has been deliberate, he suggests, as presidents have sought to shift blame for war onto others in some cases and oversell its benefits in others. Such deceit is a natural outgrowth of the democratic process, in Schuessler's view, because elected leaders have powerful incentives to maximize domestic support for war and retain considerable ability to manipulate domestic audiences. They can exploit information and propaganda advantages to frame issues in misleading ways, cherry-pick supporting evidence, suppress damaging revelations, and otherwise skew the public debate to their benefit. These tactics are particularly effective before the outbreak of war, when the information gap between leaders and the public is greatest.
When resorting to deception, leaders take a calculated risk that the outcome of war will be favorable, expecting the public to adopt a forgiving attitude after victory is secured. The three cases featured in the book-Franklin Roosevelt and World War II, Lyndon Johnson and the Vietnam War, and George W. Bush and the Iraq War-test these claims. Schuessler concludes that democracies are not as constrained in their ability to go to war as we might believe and that deception cannot be ruled out in all cases as contrary to the national interest.
Qu'est-ce qu'une ecriture feminine ? Existe-t-il une ecriture specifiquement feminine ? (l'écriture a-t-elle un sexe ?) Peut-on parler d'une ecriture africaine veritablement feminine ? Ce probleme du ...rapport entre les sexes et une forme particuliere d'ecriture est l'une des questions controversees ayant trait aux ecrits des femmes. De ce fait, les ecrivains et critiques ont du mal a etablir des frontieres hermetiques entre ecriture feminine et ecriture masculine. Ainsi, les efforts pour trouver aux ecrits des femmes une particularite ou des traits distinctifs se sont souvent soldes par une deception. Heureusement, depuis quelques decennies, les recherches entreprises par certaines grandes theoriciennes du courant de l'ecriture feminine ont permis de degager quelques specificites. D'ailleurs, des critiques litteraires ont prouve l'existence d'une « ecriture feminine » dans leurs ecrits, ces femmes ont montre et demontre l'existence d'une « ecriture feminine » differente de l'ecriture qui a été privilegiee au sein de la tradition occidentale. Elles rejettent l'idee de l'ecriture comme exercice purement mental. Comme on peut le remarquer, ecrire au feminin deborde largement la question du theme aborde par son auteure pour prendre en compte tout le processus d'ecriture.
Full text
Available for:
CEKLJ, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
The last third of the 20th century and the first decade of the 21st century show the growth of scientific and especially, scientific-promotional papers on the problems of the particularities and ...forms of existence of deception and lie in European culture and social life. The concepts have emerged, proving the necessity and value of certain forms of lies for the preservation of the state, the family, and the implementation of the real practice of human communication: the existence of such activities as diplomacy, business, art and others. In some psychological and pedagogical papers define the idea of the importance of lie and deception for the development of the child’s intellectual abilities, and the success of the adult in the society. With almost unlimited amount of such literature of different theoretical levels, synthesizing the «philosophical and cultural studies of lies and deception» are much less. The papers devoted to the emergence of the first attempts of the theoretical explanation of the established practice of lying and deceiving with the help of rationally constructed theoretical constructions are not enough. This article is an attempt to fill this gap partially.
The traditional criticism has rarely considered the style of the great novels of Aragon. It has privileged the thematic and narratological approaches of a corpus itself which is not often covered in ...its entirety. Aurelien , The Bells of Basel and the later novels of the Lying-Real were the most often commented works, except for one year when travelers were developed aggregation program with the publication of several monographs often interesting otherwise. Some work then published it possible to approach more precisely style Travelers although as indicated Herve Bismuth and Lucien Victor in 2001: The imperial Voyageurs is perhaps the most discreet romance in the reception of works romantic Aragon and critical work on these works. The work of Gilles Philippe and some other help address a number of significant stylistic marks of this novel. The author's hypothesis is that it is possible to integrate them in a general category (collage/montage) and consequently to make of the style of this novel an interpretable position taken with regard to the trajectory of the writer.
Two dimensions form the theoretical and field framework for this study, pharmacovigilance and marketing deception. The study revealed that pharmacovigilance represents activities related to ...detecting, evaluating, understanding, and preventing harmful effects or any other related problem. While, marketing deception (henceforth MD) is marketing practices carried out by organizations or sellers in terms of distorting and misleading facts that cause the customer to be in a precarious state, and result in wrong purchasing decisions. The operating pharmacies within Mosul city were a field for conducting the field study, and the researcher sought to include several questionnaires expressing the study problem that was the basis for building the field studies, including (i) Do the pharmacovigilance contribute to eliminating MD? (ii) Is there an effective correlation between the pharmacovigilance dimension and the after-MD dimension? To answer these questions, a hypothetical scheme of the study was formulated to reflect the relationships and effects between the two dimensions of the study, which resulted in a set of main and secondary hypotheses, that were tested using several statistical means for the data collected by the questionnaire which numbered (527) and all were retrieved. The study listed a set of conclusions that were distributed in terms of theory and field sides, which the researcher presents the most important: (i) According to the answers of contributed individuals, pharmacovigilance does not contribute to eliminating MD. (ii) There is an effective relationship between pharmacovigilance and MD, but to some extent, it is weak due to the absence of adopting pharmacovigilance among the researched individuals, which negatively affected the elimination of MD practiced by some pharmacies operating in Mosul city. (iii) The relative importance of the variables of MD differs from a variable on the pharmacovigilance dimension. Depending on both theoretical and field study findings, proposals were listed consistent with these conclusions, as well as future studies related to the dimensions of the current study were suggested.
The task of discerning truth from untruth has long interested psychologists; however, methods for doing so accurately remain elusive. In this article, we provide an overview and evaluation of methods ...of detecting deception used in the laboratory and the field. We identify and discuss three broad approaches to detecting deception: measurement of non-verbal behaviour, verbal interview methods, and statement evaluation by humans and computers. Part of the problem in devising good methods for detecting deception is the absence of a sound understanding of deception in human lives. We thus consider three theories of deception – leakage, reality monitoring, and truthdefault – and conclude that although promising, they do not yet provide an adequate foundation. We review 10 extant methods of detecting deception in the second part of the article, focusing at greatest length on the most widely used method in South Africa, the polygraph test of deception. Our conclusion is that non-verbal methods that work by inducing anxiety in interviewees are fundamentally flawed, and that we ought to move away from such methods. Alternate methods of detecting deception, including statement analysis, are considered, but ultimately our view is that there are currently no methods sufficiently accurate for practitioners to rely on. We suspect that a precondition for developing such measures is a coherent and validated theory.
Full text
Available for:
NUK, OILJ, SAZU, UKNU, UL, UM, UPUK
Computer-mediated deception threatens the security of online users' private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain ...observable linguistic features can provide crucial cues to detect deception. We designed and conducted an experiment that creates spontaneous deception scenarios in an interactive online game environment. Logistic regression, and certain classification methodologies were applied to analyzing data collected during fall 2014 through spring 2015. Our findings suggest that certain language-action cues (e.g., cognitive load, affective process, latency, and wordiness) reveal patterns of information behavior manifested by deceivers in spontaneous online communication. Moreover, computational approaches to analyzing these language-action cues can provide significant accuracy in detecting computer-mediated deception.
Full text
Available for:
BFBNIB, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
This article proposes a memory-based event-triggering <inline-formula> <tex-math notation="LaTeX">H_{\infty } </tex-math></inline-formula> load frequency control (LFC) method for power systems ...through a bandwidth-constrained open network. To overcome the bandwidth constraint, a memory-based event-triggered scheme (METS) is first proposed to reduce the number of transmitted packets. Compared with the existing memoryless event-triggered schemes, the proposed METS has the advantage to utilize series of the latest released signals. To deal with the random deception attacks induced by open networks, a networked power system model is well established, which couples the effects of METS and random deception attacks in a unified framework. Then, a sufficient stabilization criterion is derived to obtain the memory <inline-formula> <tex-math notation="LaTeX">H_{\infty } </tex-math></inline-formula> LFC controller gains and event-triggered parameters simultaneously. Compared with existing memoryless LFC, the control performance is greatly improved since the latest released dynamic information is well utilized. Finally, an illustrative example is used to show the effectiveness of the proposed method.